SECTION 41: TECHNOLOGICAL PROTECTION MEASURES
September 2019
THE RISE OF THE INTERNET
Y2K! THE END IS NIGH!
THE RISE OF THE INTERNET
©?
WIPO
THE WIPO COPYRIGHT TREATY
Article 11: “Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention.”
THE WIPO COPYRIGHT TREATY
THE WIPO COPYRIGHT TREATY
TECHNOLOGICAL PROTECTION MEASURES (TPMs)
s. 41
2012 END OF DAYS!
TECHNOLOGICAL PROTECTION MEASURES (TPMs)
“Any effective technology, device or component” that controls access to a work or that restricts any activity, such as copying, that violates the rights of a copyright holder” (s.41).
TPMs:
“Digital lock” = TPM
THE CIRCUMVENTION OF TPMs
s. 41
Circumvention
Descrambling
Decrypting
Avoiding
Bypassing
Removing
Deactivating
Impairing
THE CIRCUMVENTION OF TPMs
What acts of circumvention are prohibited?
s. 41.1
No person may:
CIRCUMVENTION EXCEPTIONS
If you are in law enforcement, working for the purposes of national security
You need to get pieces of software to interoperate with one another
You are engaged in research related to encryption technologies
You need to prevent software from collecting personal information
1
2
3
4
Yep. There are only seven.
CIRCUMVENTION EXCEPTIONS
You are broadcasting a copyright-protected work and the rights-holder has not given you a TPM-free way to do the broadcast
You have perceptual disabilities or provide support services to people with perceptual disabilities
You need to circumvent a TPM on radio equipment in order to get access to a telecommunications service
5
6
7
CIRCUMVENTION EXCEPTIONS
CONTROVERSY
“Archivists and librarians cannot preserve locked content without breaking the law; filmmakers, news reporters, and other innovative creators cannot legally access the content they need. These restrictions undermine Canadian innovation and the public domain. Furthermore, those who would infringe can easily access and use circumvention software through the Internet–almost all digital lock mechanisms are eventually broken. The locks thus do not stop those determined to break the law. Instead, they merely frustrate legitimate consumers and creators.”
DUDE, THERE SHOULD BE EXCEPTIONS WHEN IT IS FOR NON-INFRINGING PURPOSES!
YOU GOT THAT RIGHT, JTT.
MUAHHAHAHAHA!
DIFFERING PERSPECTIVES
“…while anti-circumvention rules should support the use of TPMs to enable the remuneration of rights-holders and prevent copyright infringement, they should generally not prevent someone from committing an act otherwise authorized under the [Copyright] Act” (INDU Committee, 2019).
CONTROVERSY
RIGHTS OF CREATORS RIGHTS OF USERS
LEARNING OBJECTIVES
You should now be able to:
THANK YOU FOR YOUR ATTENTION
QUESTIONS
1. The Act defines a technological protection measure as “any effective technology, device or component” that:
a. Controls access to a work or that restricts any activity that violates the rights of a copyright holder
b. Is completely effective in preventing this misuse of copyright protected materials
c. Informs potential users that they are accessing copyright protected works
d. Prevents the modification of works that are both covered under copyright and in the public domain
�2. Section 41.1 of the Copyright Act states that no person may:
a. Circumvent a TPM
b. Offer a service to circumvent a TPM
c. Make, import, distribute, sell or rent any technology or device primarily intended to circumvent TPMs
d. All of these.
QUESTIONS
�3. Under which of the following conditions is it okay to circumvent a TPM:
a. When the purpose of using the material is covered under fair dealing
b. When a library or archive is attempting to preserve locked content
c. If you are in law enforcement, working for the purposes of national security
d. If you are a news reporter and you require access in order to verify the facts of your story
4. Controversy around TPMs in the Copyright Act often centers around the argument that:
a. There should be exceptions to circumvention in cases where the digital lock is being bypassed for non-infringing purposes
b. Anyone can get around a digital lock, so what is the point?
c. TPMs mean that the rich get richer
d. TPMs are really annoying
QUESTIONS
5. Which of the following is not one of the seven reasons you can circumvent a TPM:
a. You are engaged in research related to encryption technologies
b. You need to prevent software from collecting personal information
c. An evil mastermind is broadcasting a hypnotic mind-control signal over the airwaves which will brainwash millions and you need to stop them, by jingo!
d. You have perceptual disabilities
�6. Canada implemented TPM protection in s. 41 of the Copyright Act in 2012 in order to comply with which international treaty:
a. Berne Convention
b. TRIPS Agreement
c. World Copyright Treaty (WCT)
d. Treaty of Versailles
e. The Nairobi Treaty
Virctorhfs (2019). Computer sounds (chuck generated). CC 0. https://freesound.org/people/victorhfs/sounds/469782/
MavsFan28 (1998). Jonathan Taylor Thomas. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:Jonathan_Taylor_Thomas.jpg
RCA Records (1998). N’sync logo. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:%27N_Sync_Logo.svg
Αγγελική Κώνστα (2019). [Fresh Prince logo]. Wikimedia Commons. CC BY-SA 4.0. https://upload.wikimedia.org/wikipedia/commons/9/9d/Fresh_Prince_Bel_Aire_logo.svg.png
Marco_Livolski (n.d.). [megaphone]. Pixabay. https://pixabay.com/illustrations/megaphone-icon-symbol-design-3790264/
Jacques_Barrette (2018). [code video]. Pixabay. https://pixabay.com/videos/technology-computer-network-17077/
Stu Pendousmat (2008). A blockbuster location in Moncton. Wikimedia Commons. CC BY- SA. https://commons.wikimedia.org/wiki/File:BlockbusterMoncton.JPG
Thomasz Sienicki (2005). [Tamogatchi]. Wikimedia Commons. CC BY-SA. https://commons.wikimedia.org/wiki/File:Tamagotchi_0124_ubt.jpeg
Crz1990 (2011). Keyboard typing sounds. CC BY. https://freesound.org/people/crz1990/sounds/135872/
IMAGE AND SOUND REFERENCES
Tommyvideo (2016) [computer video]. Pixabay. https://pixabay.com/videos/computer-keyboard-technology-5399/
Adrian Coquet. (n.d.) Unlock. The Noun Project. CC BY. https://thenounproject.com/term/unlock/1862800/
Mohamad_hassan (n.d.). [Copyright thief]. Pixabay. https://pixabay.com/illustrations/copyright-stealing-asset-bag-3197524/
Nick Bluth (n.d.). Avoid. The Noun Project. CC BY. https://thenounproject.com/search/?q=CIRCUMVENTION&i=337011
OpenClipart-Vectors (n.d.). [Prohibited symbol]. Pixabay. https://pixabay.com/vectors/prohibited-don-t-do-not-ban-155486/
Qubodup (2008). Whoosh. Free Sound. CC 0. https://freesound.org/people/qubodup/sounds/60013/
Rflor (n.d.). Police investigation. The Noun Project. CC BY. https://thenounpro
ject.com/search/?q=investigate&i=286692
Arthur Bauer. (n.d.). Interoperate. The Noun Project. CC BY. https://thenounproject.com/search/?q=interoperate&i=1624548
Edwin PM (n.d.). Lock The Noun Project. CC BY. https://thenounproject.com/search/?q=encryption&i=1786028
IMAGE AND SOUND REFERENCES
Eliricon (n.d.). Big data. The Noun Project. CC BY. https://thenounproject.com/search/?q=personal%20information&i=1434542
Gregor Creson (n.d.). Help. The Noun Project. CC BY. https://thenounproject.com/search/?q=help&i=1616214
Montu Yadav (n.d.). Broadcast. The Noun Project. CC BY. https://thenounproject.com/search/?q=broadcast&i=201837
Ocha Visual (n.d.). Emergency telecommuniations. The Noun Project. CC BY. https://thenounproject.com/search/?q=telecommunications&i=4213
European Parliament (2012). “ACTA workshop at the EP”. [Michael Geist]. Flickr. (CC BY-NC-ND 2.0). https://www.flickr.com/photos/european_parliament/6944244255/
Crosswell, Rob. (n.d.). Library. The Noun Project. CC BY. https://thenounproject.com/crosswellrob/uploads/?i=1122689
Basadev4 (n.d.). [Andre]. Pixabay. https://pixabay.com/illustrations/black-avatar-cute-cheerful-3025348/
Raditya Cadwraight (n.d.). Microphone. The Noun Project. https://thenounproject.com/search/?q=microphone&i=1685533
IMAGE AND SOUND REFERENCES
DigestContent (2019). Thump. Freesound. https://freesound.org/people/DigestContent/sounds/458877/
Tommyvideo (n.d.). [Data locked video]. Pixabay. https://pixabay.com/videos/electronics-circuit-component-5364/
[Screenshot of Canadian Publishers Council logo]. Retrieved from: https://pubcouncil.ca/
[Screenshot of INDU Report cover page]. Retrieved from: https://www.ourcommons.ca/Content/Committee/421/INDU/Reports/RP10537003/indurp16/indurp16-e.pdf
Unattributed materials are contributions from the Opening Up Copyright Project Team and placed in the Public Domain
Closing Slides Music: Rybak, Nazar. “Corporate Inspired.” HookSounds. N.d. http://www.hooksounds.com (used under a CC-BY 4.0 Licence)
IMAGE AND SOUND REFERENCES
Carlson, N. (2014). “ Presenting: This is what the internet looked like in 1996”. Business Insider. Retrieved from: https://www.businessinsider.com/the-coolest-web-sites-from-1996-2014-4-
Copyright Act, Statutes of Canada 1985, c. C-42. https://laws-lois.justice.gc.ca/eng/acts/c-42/page-1.html
IFPI (2003). “The WIPO Treaties: Technological Measures.” Retrieved from: https://www.ifpi.org/content/library/wipo-treaties-technical-measures.pdf.
INDU Committee (2019). “Statutory review of the Copyright Act”. Retrieved from: https://www.ourcommons.ca/Content/Committee/421/INDU/Reports/RP10537003/indurp16/indurp16-e.pdf
Samuelson, P. (1996). The US digital agenda at WIPO. Virginia Journal of International Law, 3(369), 369-440. Retrieved from: https://scholarship.law.berkeley.edu/facpubs/882/
Sheinblatt, J. (1998). “The WIPO Copyright Treaty.” Berkeley Technology Law Journal, 13(1): 535-550. Retrieved from: https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1188&context=btlj
World Intellectual Property Organization (n.d.). “WIPO Copyright Treaty (WCT).” Retrieved from: https://www.wipo.int/treaties/en/ip/wct/.
REFERENCES AND RESOURCES
University of Alberta (2019). “S.41: Technological Protection Measures/Digital Locks.” Opening Up Copyright Instructional Module. https://sites.library.ualberta.ca/copyright/
Suggested Citation:
For the project overview and complete list of modules please visit the project website at: https://sites.library.ualberta.ca/copyright/
Questions, comments, and suggestions should be directed to the University of Alberta’s Copyright Office at: copyright@ualberta.ca
This module is made available and licensed under a Creative Commons Attribution 4.0 International Licence
LICENSING AND ATTRIBUTION
Copyright Office
Technologies in Education
Centre for Teaching and Learning
University of Alberta Libraries
School of Library and Information Studies
Adrian Sheppard
Amanda Wakaruk
Anwen Burk
Cosette Lemelin
Graeme Pate
Krysta McNutt
Michelle Brailey
Julia Guy
Michael B. McNally
CONTRIBUTORS
Opening Up Copyright modules were initially funded through the University of Alberta, Centre for Teaching and Learning’s Teaching and Learning Enhancement Fund (TLEF) with in kind contributions from the Copyright Office and the School of Library and Information Studies.
ACKNOWLEDGMENT