Oct 25 - Enforcement * The source (e.g. the manufacture of...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Enforcement * The source (e.g. the manufacture of a counterfeit watch) * The intermediary (the Chinatown shops) * And the target (the purchaser) Examples of Allowed Circumventions * Law enforcement and intelligence agencies * Reverse engineering to achieve interoperability * Encryption research. The researcher has to make a good faith effort to obtain authorization * Protection of personally identifying information Techies Objection to DMCA * What is an effective technological protection measure?- If a skilled hacker can break it, is it effective?- If an average computer-literate person can break it, but few do, is it effective? * Weakens incentives for content owners to pay for good IP-management technology * Shifts costs from content owners to society at large, by shifting responsibility from TPSs to courts and police * Exceptions for R&D are vague 2010 DMCA New Allowances * Films on DVD that are being copied in order to accomplish the incorporation of short portions of...
View Full Document

This note was uploaded on 01/25/2012 for the course INTA 2040 taught by Professor Staff during the Fall '08 term at Georgia Institute of Technology.

Page1 / 2

Oct 25 - Enforcement * The source (e.g. the manufacture of...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online