how to regulate tpm/drms? the information and communications regime april 7-8, 2006 the...

22
How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State University College of Law Manon Ress, CPTech

Upload: margaret-bruce

Post on 12-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

How to Regulate TPM/DRMs?

The Information and Communications Regime

April 7-8, 2006

The International Intellectual Property Regime complex

Michigan State University College of Law

Manon Ress, CPTech

Page 2: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

OUTLINE

Background What is protected legally? Hacking, contracts and expectations Some implementations Rethinking the legal regime for TPM/DRM Proposal

Page 3: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Background digital information technologies has created

uncertainly re access to knowledge goods it is now inexpensive (free?) to copy distribute works

to millions of persons there's a large degree of insecurity among publishers

or producers

rise of new efforts to control or limit the copying, or uses, of creative works and data.

Page 4: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

TPM/DRM characteristics operate with or without standardization

depending upon the nature of the publishing standardized for recorded performances of music or

motion pictures but not for all uses if effective, provide possibility of managing

works in ways not possible in print or analogue (eliminate all unauthorized copying or uses of works)

system of private rules for the use of information designed by and for publishers to control

Page 5: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Description

strategy for controlling the uses of the works is both technological and legal.

It involves effort to promote both public and private standards combination of (1) effective technological locks on

uses of information, (2) a system of tracking and controlling uses, and (3) legal prohibitions against anti-circumvention of (1) and (2).

Page 6: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

What is protected legally? 1996 WIPO Copyright Treaty (WCT) & WIPO

Performances and Phonogram Treaty (WPPT) NOTE: These treaties are unusual: that they did not seek to harmonize global laws on copyright, but rather created new and untested standards to be implemented by national governments

These treaties require that member states: “provide adequate legal protection and effective legal

remedies" against the circumvention of effective technological measures and against any person knowingly removing, altering, distributing…

these obligations require a legal environment to protect the TPM/DRM regime

Page 7: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Issues Hacking is possible so success in limiting access

depends upon actions of governments to prohibit anti-circumvention

Contracts that should be enforced by governments? Expectations are changing but there is Public Interest in

Unauthorized Uses of Works Knowledge goods are “non-rival in consumption” and

can become (as defined by economists) public goods (to everyone at no cost)

Page 8: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

More Issues for Knowledge Goods K.G. (2)

But unlike pure public goods (national defense), it is both possible and common to limit access. Scarcity of k.g. is a function of private and government efforts to protect barriers to access.

Justifications: k. g. will not be created without barriers to access, or a moral or ethical obligation to give creators/publishers control over the use of their works

Page 9: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

More Issues for Knowledge Goods

K.G. (3) types of k. g. highly heterogeneous in character

& costs syllabus, publishing of laws and regulations, reports

of the activities of government agencies etc. feature films, design of computer semi conductor

chips, the creation and maintenance of certain databases etc.

These are less likely to be undertaken without an expectation of revenue from the sale of the work

Page 10: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Implementations in high-income countries

US: the Digital Millennium Copyright Act, known as the DMCA (1998). As the first model, it is influential.

• basic approach was to provide for the automatic protection of all TPM/DRM regimes, but to provide for limited areas where there exceptions to the anti-circumvention rules.

EU’s system includes an "Internet Copyright Directive," or Directive 2001/29/EC , as well as other directives that set out the regulatory framework for TPM/DRM regimes. Implementation is not harmonized.

Japan, Australia …and Canada soon

Page 11: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Implementations in Developing

countries 58 contracting parties to the WCT and 57 to the WPPT

largest numbers of countries that have signed the treaties are from the developing world, including many countries with very limited use of the Internet or computer

Five are defined by the UN as Least Developed Countries (LDCs), including Burkina Faso, Guinea, Mali, Senegal and Togo

In 2004, nine of the WCT members had a per capita gross national income (GNI) of less than $1,000, and more than half (31) had per capita incomes of less than $3,000 per year.

response to trade pressures from the United States or other high-income countries & mimic the legal approaches now used in high-income countries

Page 12: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Rethinking the legal regime for TPM/DRM Many concerns but at the core: predictable & harmful

impact of having private parties -- publishers -- determine the default rules for access to k.g.

The starting point is that the TPM/DRM itself must be protected from circumvention, independent of the work that is protected, and without regard to the likely impact on the uses of the works.

Let's explore alternative ways of regulating the TPM/DRM regimes more consistent with protecting access to knowledge goods

Page 13: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Proposal No automatic legal protections to TPM/DRMs but

system requiring vendors and users to register to apply for protection against circumvention

Need to explain how the regime will respond to legitimate uses of the works under public (rather than private) standards for access

Legal protection would not be forthcoming, until the regulator was satisfied that regime does not inappropriately restrict access to the work

Page 14: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Registration

Instead of providing automatic protection, a system requiring vendors or publishers to register

It could involve a fee It could involved negotiations to protect

user rights It could be for specific uses

Page 15: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Conditions

Obligations for protection of copyrighted works are different from obligations regarding TPM/DRM The “lock” does not need broader rights Not every use of copyrighted goods Not use that are against public policy

Page 16: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Conditions (2)

Protection should not be extended to DRM on works not protected by copyright

Protection only for interest of the CR owner

Term can be shorter Lock only when needed to protect

legitimate interests of CR owner

Page 17: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Conditions (3)

DRM is a contract and should be subject to public policy before being enforceable

Review of DRM can be different from one for TPM For ex. DRM that prohibit private copy, time

shift Major concerns for non-negotiated contracts

Page 18: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Fora

New systems could be proposed and implemented in countries willing to experiment and promote policies of protecting access to knowledge

Page 19: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Specific area

Entire copyright field? Special area

Public science where norms re access are esp. important

Publicly funded science based upon a different economic model

Examples in copyleft type rules see HapMap licenses

Page 20: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

EXCERPTS FROM THE ORIGINAL HAPMAP TERMS AND CONDITIONS FOR ACCESS TO AND USE OF THE GENOTYPE DATABASE

2. You may access and conduct queries of the Genotype Database and copy, extract, distribute or otherwise use copies of the whole or any part of the Genotype Database's data as you receive it, in any medium and for all (including for commercial) purposes, provided always that:

a. by your actions (whether now or in the future), you shall not restrict the access to, or the use which may be made by others of, the Genotype Database or the data that it contains;

b. in particular, but without limitation, i. you shall not file any patent applications that contain claims to any composition of matter of

any single nucleotide polymorphism ("SNP"), genotype or haplotype data obtained from the Genotype Database or any SNP, haplotype or haplotype block based on data obtained from the Genotype Database; and

ii. you shall not file any patent applications that contain claims to particular uses of any SNP, genotype or haplotype data obtained from the Genotype Database or any SNP, haplotype or haplotype block based on data obtained from, the Genotype Database, unless such claims do not restrict, or are licensed on such terms that that they do not restrict, the ability of others to use at no cost the Genotype Database or the data that it contains for other purposes; and . . .

See http://www.hapmap.org/cgi-perl/registration

Page 21: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

Conclusion

A new “default setting” is needed Nothing is protected unless registration is

approved by public authorities TPM/DRM as exceptions for which

enforcement depends on uses and effects

Page 22: How to Regulate TPM/DRMs? The Information and Communications Regime April 7-8, 2006 The International Intellectual Property Regime complex Michigan State

For more information

Consumer Project on Technology www.cptech.org Tel.: 1 202 332 2670 [email protected]