This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Enforcement * The source (e.g. the manufacture of a counterfeit watch) * The intermediary (the Chinatown shops) * And the target (the purchaser) Examples of Allowed Circumventions * Law enforcement and intelligence agencies * Reverse engineering to achieve interoperability * Encryption research. The researcher has to make a good faith effort to obtain authorization * Protection of personally identifying information Techies Objection to DMCA * What is an effective technological protection measure?- If a skilled hacker can break it, is it effective?- If an average computer-literate person can break it, but few do, is it effective? * Weakens incentives for content owners to pay for good IP-management technology * Shifts costs from content owners to society at large, by shifting responsibility from TPSs to courts and police * Exceptions for R&D are vague 2010 DMCA New Allowances * Films on DVD that are being copied in order to accomplish the incorporation of short portions of...
View Full Document
This note was uploaded on 01/25/2012 for the course INTA 2040 taught by Professor Staff during the Fall '08 term at Georgia Institute of Technology.
- Fall '08