Copy protection can sometimes be bypassed


Users will be allowed to bypass media copy protection on copyrighted works in certain cases, according to a new ruling from the Library of Congress' Copyright Office.

The copyright office has ruled on six exemptions or situational applications to digital copyright protection. In those six cases, breaking those digital protections is permissible, according to a notice in today's Federal Register.

Digital copyright protection refers to techniques such as disc encryption or keys to block the illegal copying of copyrighted works. The rule identifies situations in which such protections might inadvertently limit access to legally acquired material and permits users to bypass copyright protection in those special situations.

The purpose of the final rule "is to determine whether users of particular classes of copyrighted works are...adversely affected by the prohibition in their ability to make noninfringing uses of copyrighted works,' the Federal Register states. 

The rule cites the example of Sony BMG Music Entertainment's use of copyright protection software on CDs, which sometimes can limit the computer's functionality.

Other categories of use for which the rule provides bypass protection include obsolete computer programs that require their original hardware as a condition of access and programs that are protected by obsolete security dongles that have been damaged.

The rule cited additional special cases such as audiovisual media for an educational library or media studies department at a university, e-books whose entire printing runs are copyright-protected and cell phone firmware.

The register entry gives no indication or instructions on how to bypass copyright protection for each of the six cases.

Featured

  • automated processes (Nikolay Klimenko/Shutterstock.com)

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected