Verified Document

Information Security Term Paper

DMCA The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management law enacted October 28, 1998. The intent behind the DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. Broadly, the goal of the DMCA is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization (WIPO) Copyright Treaty and the WIPO Performances and Phonograms Treaty, both of which were ratified by over fifty countries in 1996.

This paper discusses the controversy surrounding the DMCA and why attempts to resolve these issues are now necessary.

The impact of the DMCA on organizations is far reaching. Key highlights include the DMCA's enforcement to:

Make it a crime to circumvent anti-piracy measures built into most commercial software.

Prevent the manufacture, sale, or distribution of code-cracking devices used to illegally copy software. Cracking of copyright protection devices is allowed to conduct encryption research, assess product interoperability, and test computer security systems.

Require service providers to remove material from users' Web sites that appears to constitute copyright infringement.

Require that "webcasters" pay licensing fees to record companies.

Require that the Register of Copyrights, after consultation with relevant parties, submit to Congress recommendations regarding how to promote distance education through digital technologies while "maintaining an appropriate balance between the rights of copyright owners and the needs of users."

The DMCA provides exemptions from anti-circumvention provisions for nonprofit libraries, archives, and educational institutions under certain circumstances. And, it limits liability of nonprofit institutions of higher education -- when they serve as online service providers and under certain circumstances --...

The DMCA also limits Internet service providers from copyright infringement liability for simply transmitting information over the Internet.
The DMCA exemptions, in many areas, are not broad enough such as the case with reverse engineering. The DMCA generally prohibits circumvention of technological protection measures such as reverse engineering. The DMCA contains a limited exception to the ban on circumvention, which permits reverse engineering of the technology by specific classes of people for limited purposes. For example, the exception allows reverse engineering of computer programs if the reverse engineer lawfully obtains the program, seeks permission from the copyright owner, only uses the results of their efforts to create an interoperable computer program and does not publish the results. Further, the resulting program must only interoperate with the reverse engineered software and cannot interoperate with the technologically protected content such as movies, books and videos. Under the DMCA, engineers may also develop programs that facilitate reverse engineering for their own use or the use of others if they meet the above test.

In many instances, experts argue that the DMCA exceptions are far too narrow to be useful for many reverse engineering needs. While the reverse engineering exemption permits software programmers to develop and distribute circumvention tools as part of their projects, there are significant limitations over who can do so and in what manner they can do it. The DMCA mandates that only the person who performs the reverse engineering can provide the information necessary to achieve interoperability to others. Therefore, collaborative project environments conducted over the Internet, such as those used by many open source software developers may be considered illegal. Even if the sharing of information regarding circumvention is done for the purpose of developing an interoperable product, its…

Sources used in this document:
Bibliography

'Digital Millennium Copyright Act." TechTarget. 27 Oct. 2004. <http://searchcio.techtarget.com/sDefinition/0,,sid19_gci904632,00.html>.

Rapoza, Jim. "Fair (Use) Is Fair." eWeek 24 May 2004. 27 Oct. 2004. <http://www.eweek.com/article2/0,1759,1596911,00.asp>.

"Reverse Engineering." Chilling Effects. 27 Oct. 2004. <http://www.chillingeffects.org/reverse/>.

"The Digital Millennium Copyright Act." The UCLA Online Institute for Cyberspace Law and Policy. 27 Oct. 2004. <http://www.gseis.ucla.edu/iclp/dmca1.htm>.
"Digital Millennium Copyright Act." TechTarget. 27 Oct. 2004. <http://searchcio.techtarget.com/sDefinition/0,,sid19_gci904632,00.html>.
"The Digital Millennium Copyright Act." The UCLA Online Institute for Cyberspace Law and Policy. 27 Oct. 2004. <http://www.gseis.ucla.edu/iclp/dmca1.htm>.
"Reverse Engineering." Chilling Effects. 27 Oct. 2004. <http://www.chillingeffects.org/reverse/>.
"Reverse Engineering." Chilling Effects. 27 Oct. 2004. <http://www.chillingeffects.org/reverse/>.
"Digital Millennium Copyright Act." TechTarget. 27 Oct. 2004. <http://searchcio.techtarget.com/sDefinition/0,,sid19_gci904632,00.html>.
Rapoza, Jim. "Fair (Use) Is Fair." eWeek 24 May 2004. 27 Oct. 2004. <http://www.eweek.com/article2/0,1759,1596911,00.asp>.
Rapoza, Jim. "Fair (Use) Is Fair." eWeek 24 May 2004. 27 Oct. 2004. <http://www.eweek.com/article2/0,1759,1596911,00.asp>.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Information Security Is a Primary Concern
Words: 809 Length: 2 Document Type: Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the

Information Security Management
Words: 549 Length: 2 Document Type: Essay

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

Security Information Security and Risk Management in
Words: 1322 Length: 5 Document Type: Term Paper

SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the

Security at Work Information Security Within the
Words: 576 Length: 2 Document Type: Essay

Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be

Information Security and Employees
Words: 1440 Length: 4 Document Type: Term Paper

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now