SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Copyright and Technology 2011

        November 30, 2011




                 1
Opening Remarks

          Bill Rosenblatt
GiantSteps Media Technology Strategies
        www.giantstepsmts.com
        www giantstepsmts com
        billr@giantstepsmts.com
       Twitter: @copyrightandtec
             +1 212 956 1045
                    2
www.giantstepsmts.com




           3
www.copyrightandtechnology.com




               4
www.gothammediaventures.com




              5
What Are We Discussing Today?




               8
Interface between Copyright and
              Technology
              T h l
Digital technology used to make and distribute copies
 at virtually no cost
Copyright i d t responses, all i t l t d
C      i ht industry           ll interrelated:
  – Legal
  – Technological
  – Economic
  – Education



                           9
Technologies to Affect Copyright

     Content access control
        – DRM
        – Conditional Access
     Content identification
        – Filtering
        – License/royalty management
     Rights registries


                     10
Legal Concepts that Affect These
         Technologies
         T h l i
    Fair Use
    First Sale
    Secondary infringement liability
    Network service provider liability
                      p               y
    Anticircumvention legislation
    Blanket licensing of content


                     11
Technologies




      12
Digital Rights Management




            13
DRM is a “troubled”* technology…

             Why?



                     *Jaron Lanier, You Are Not a Gadget, 2010

                14
Factors Inhibiting DRM Success*

 Market:                                 Architecture:
   – Economic incentives                       – Technological innovation
     misaligned                                  hampered
   – Commercial content must
     compete with free/illegal
 Norms:                                  Laws:
   – Users don’t see value in                  – Laws not amenable to
     choices of offers                           technological implementation
   – Norms distorted by
     architecture (technology)

                  *Based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90
                                       15
Market:
   Economic Incentives Misaligned
   E     i I     ti    Mi li d
Content owners demand DRM but rarely pay for it
Device makers and network operators use it to suit
 their
 th i own purposes
Consumers have only indirect market influence




                         16
Norms:
Consumers Don’t Yet See Value in N Models
C         D ’t Y t S V l i New M d l
                             Radio
  ulations




                      Record Store
 Legacy




                              VCR
Emu




                         Bookstore
                 Free/Limited VOD
Dig Native




             Paid Subscription VOD
    New,
  gital




             Free/Limited OD Music
                Paid Sub OD Music
                                     0    10      20     30      40      50     60   70

                                               Million U.S. Users (estimated)

                                     17
Norms:
 Users Influenced towards Infringing B h i
 U     I fl     dt     d I f i i Behavior
Definition of DRM commandeered by the press
      – Narrower than original definitions
      – Yet broadened to apply to any technology that restricts user
        behavior in any way1
Notion that DRM  Big Media  Evil/Obsolete
Romanticism & rationalization of hacker/pirate ethic
“Lords f the Cloud” t the “free d
“L d of th Cl d”2 get th “f and open” PR3  ”
1C. Doctorow, M. Masnick, etc.
2J
 Jaron Lanier, Y A Not a Gadget
       L i You Are N t G d t
3Robert Levine, Free Ride
                                     18
Architecture:
Technological I
T h l i l Innovation Hampered
                    ti H    d
  Lack of revenue for DRM vendors
  Venture capital scared off
    – B d press
      Bad
    – Non-sexy topic
  Researchers scared off
  R      h         d ff
    – RIAA actions against Prof. Ed Felten in 1999
    – DRM research “politically incorrect” in U S
                     politically incorrect    U.S.



                         19
The Rights Technologies R&D Imbalance
450                                          70


400
                                             60

350
                                             50
300


250                                          40


200                                          30
                                                  2009 Gross Expen‐
                                                  ditures on R&D 
150                                               ($Billion)
                                             20   RT R&D Output 
                                                  RT R&D Output
100                                               (Research Papers)

                                             10
 50                                               RT R&D Index

  0                                          0




      Device Producers   Content Producers
                                                       Sources: O C IMF
                                                       S        OECD,


                         20
Laws Not Amenable to
      Technological Implementation
      T h l i lI l          t ti
 Fair Use laws not amenable to automation
 Privacy and due process are important but become obstacles
 Anticircumvention laws reduce incentive to develop effective
  technologies
   – Liability solely on the hacker
             y      y
   – Effectiveness of TPM/DRM irrelevant to applicability of law
     (per Universal v Reimerdes, 2000)




                                   21
Yet DRM Is Alive Today…

          Downloads            Real Time Delivery
E-books   Yes                  “Screenshot DRM”
                               (page images)

Music     Mobile device        Usually
          “offline listening   (stream encryption)
          mode”
             d ”
Video     Yes                  In most release
                               windows
                               (stream encryption)
                               (t             ti )




                     22
Will DRM Die?
Not Wh
N t When It Enables N Models
            E bl New M d l
  Digital music downloads: iTunes (originally)
  Premium pay-per-view TV
  E l release window fil
   Early l        i d films
  Music subscription services:*
   Rhapsody, MOG Rdi S tif P i
   Rh      d MOG, Rdio, Spotify Premium
  Subsidized-content ecosystems:
   boinc (music) Amazon Prime (e book a month)
         (music),                (e-book-a-month)
  Library e-book lending: OverDrive, BlueFire
                              *Yes they do – they just don’t call it “DRM”
                         23
Content Identification




           24
Techniques for Identifying Content

           Watermarking
           Fingerprinting




                  25
Watermarking

Inserting/embedding data into “noise” portions of
                                  noise
 image, audio, or video signal
Data capacity: typically a few dozen bytes
Technology appeared in mid-to-late 1990s
  – First for digital images
  – Audio and video later




                               26
Fingerprinting
Examining content to determine its identity
   – Compute a set of numbers (“fingerprints”)
   – Look up in database, see if there’s a match
Based on mathematical concept of hashing
   – But allows for different files that look/sound the same
   – Can compensate for certain transformations:
     excerpting, cropping, audio distortion, etc.
History:
       y
   – 2002: Introduced for music during Napster litigation
   – 2006: Video fingerprinting introduced
   – 2007 “T t fi
     2007: “Text fingerprinting” (Att ib t ) adopted b AP
                         i ti ” (Attributor) d t d by
                              27
Content Identification
        Business B fit
        B i      Benefits
Detecting and deterring unauthorized use
Tracking content usage
Discovery & recommendations
Increasing Internet ad revenue
          g
Managing assets and integrating systems
Monetizing transformational content uses


                    28
Legal Developments
…and their Technical Solutions




               29
Legal Developments

Network operator liability
“Free riding”
Digital First Sale




             30
Network Operator Liability

Secondary liability
   – Contributory: aiding and abetting infringement
   – Vicarious: “looking the other way” and benefiting from it
                 looking           way
   – Inducement: inducing others to infringe as business model
ISP Liability
   – Notice and takedown (DMCA 512)
   – Graduated/Progressive Response a/k/a “three strikes”
                   g            p
     (France, South Korea, Taiwan, New Zealand, UK)
   – Center for Copyright Information, USA

                               31
Technical Solutions

   Fingerprinting
   Watermarking
   Traffic analysis




           32
“Free Riding”

Monetizing links to copyrighted content
Posting links to illegal content (e.g. in cyberlockers)
Monetizing content appearing in search results
“Cloud sync” services(?)
         y              ()




                            33
Technical Solutions

Fingerprinting & search
Tagging content with “beacon” metatags – AP hNews
Tagging content with rules for indexing and search
 results – ACAP




                         34
Digital First Sale

First Sale: Section 109 of U.S. copyright law
                             US
Known as “Exhaustion” in other countries
If you obtain a copyrighted work legally,
 you can do what you want with it
Applicability to digital downloads is unclear
Copyright Office punted on it in 2001 report
Downloads covered under licenses, not copyright

                        35
Technical Solutions

 Forward
“Forward and delete” DRM like functionality
               delete DRM-like
Described in 2001 Copyright Office paper
Implemented by startup ReDigi
Described in IEEE P1817 standard for
 “Consumer Ownable Digital Personal Property”




                      36
Thanks to our Sponsors




           40
Thanks to our Media Sponsors




              41
And finally…




      42
Recommended Reading




   Robert Levine, Free Ride
               43

Más contenido relacionado

La actualidad más candente

BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...imec.archive
 
Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019Paperjam_redaction
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-CommerceCat Van Khoi
 
Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008Oisin Lunny
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Chris Upjohn
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsBob Rhubart
 

La actualidad más candente (7)

Drm
DrmDrm
Drm
 
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
BlackBerry - A Teaching Case for WIPO by Intellectual Property Research Insti...
 
Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019Deloitte-family-business-survey-2019
Deloitte-family-business-survey-2019
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
 
Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008Oisin Lunny Radio & Web conference Zaragosa 2008
Oisin Lunny Radio & Web conference Zaragosa 2008
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and Directions
 

Similar a Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt

iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009Gerd Leonhard
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsFrancois Lefebvre
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the lawSu Little
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updatedJyrki Kasvi
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
CoDe RTD - Presentation Deck
CoDe RTD - Presentation DeckCoDe RTD - Presentation Deck
CoDe RTD - Presentation DeckPaolo Costanzo
 
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
Api days 2014  from theatrophone to ap is_the 2020 telco challenge_Api days 2014  from theatrophone to ap is_the 2020 telco challenge_
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_Luis Borges Quina
 
Free Software for Radio Broadcasting
Free Software for Radio BroadcastingFree Software for Radio Broadcasting
Free Software for Radio BroadcastingFrancois Lefebvre
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source PanelMike Linksvayer
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 

Similar a Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt (20)

Policy Challenges Around Digital Copyright
Policy Challenges Around Digital CopyrightPolicy Challenges Around Digital Copyright
Policy Challenges Around Digital Copyright
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Chapter14.ppt
Chapter14.pptChapter14.ppt
Chapter14.ppt
 
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
Compensation Not Control Music 2.0 Gerd Leonhard Midem Net 2009
 
Update on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB ToolsUpdate on CRC Open and Free DAB Tools
Update on CRC Open and Free DAB Tools
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updated
 
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_sourceCc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
CoDe RTD - Presentation Deck
CoDe RTD - Presentation DeckCoDe RTD - Presentation Deck
CoDe RTD - Presentation Deck
 
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
Api days 2014  from theatrophone to ap is_the 2020 telco challenge_Api days 2014  from theatrophone to ap is_the 2020 telco challenge_
Api days 2014 from theatrophone to ap is_the 2020 telco challenge_
 
Free Software for Radio Broadcasting
Free Software for Radio BroadcastingFree Software for Radio Broadcasting
Free Software for Radio Broadcasting
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source Panel
 
E commerce
E commerceE commerce
E commerce
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 

Más de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

Más de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Ben Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & MangesBen Marks, Weil Gotshal & Manges
Ben Marks, Weil Gotshal & Manges
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt

  • 1. Copyright and Technology 2011 November 30, 2011 1
  • 2. Opening Remarks Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com www giantstepsmts com billr@giantstepsmts.com Twitter: @copyrightandtec +1 212 956 1045 2
  • 6. What Are We Discussing Today? 8
  • 7. Interface between Copyright and Technology T h l Digital technology used to make and distribute copies at virtually no cost Copyright i d t responses, all i t l t d C i ht industry ll interrelated: – Legal – Technological – Economic – Education 9
  • 8. Technologies to Affect Copyright Content access control – DRM – Conditional Access Content identification – Filtering – License/royalty management Rights registries 10
  • 9. Legal Concepts that Affect These Technologies T h l i Fair Use First Sale Secondary infringement liability Network service provider liability p y Anticircumvention legislation Blanket licensing of content 11
  • 12. DRM is a “troubled”* technology… Why? *Jaron Lanier, You Are Not a Gadget, 2010 14
  • 13. Factors Inhibiting DRM Success*  Market:  Architecture: – Economic incentives – Technological innovation misaligned hampered – Commercial content must compete with free/illegal  Norms:  Laws: – Users don’t see value in – Laws not amenable to choices of offers technological implementation – Norms distorted by architecture (technology) *Based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90 15
  • 14. Market: Economic Incentives Misaligned E i I ti Mi li d Content owners demand DRM but rarely pay for it Device makers and network operators use it to suit their th i own purposes Consumers have only indirect market influence 16
  • 15. Norms: Consumers Don’t Yet See Value in N Models C D ’t Y t S V l i New M d l Radio ulations Record Store Legacy VCR Emu Bookstore Free/Limited VOD Dig Native Paid Subscription VOD New, gital Free/Limited OD Music Paid Sub OD Music 0 10 20 30 40 50 60 70 Million U.S. Users (estimated) 17
  • 16. Norms: Users Influenced towards Infringing B h i U I fl dt d I f i i Behavior Definition of DRM commandeered by the press – Narrower than original definitions – Yet broadened to apply to any technology that restricts user behavior in any way1 Notion that DRM  Big Media  Evil/Obsolete Romanticism & rationalization of hacker/pirate ethic “Lords f the Cloud” t the “free d “L d of th Cl d”2 get th “f and open” PR3 ” 1C. Doctorow, M. Masnick, etc. 2J Jaron Lanier, Y A Not a Gadget L i You Are N t G d t 3Robert Levine, Free Ride 18
  • 17. Architecture: Technological I T h l i l Innovation Hampered ti H d Lack of revenue for DRM vendors Venture capital scared off – B d press Bad – Non-sexy topic Researchers scared off R h d ff – RIAA actions against Prof. Ed Felten in 1999 – DRM research “politically incorrect” in U S politically incorrect U.S. 19
  • 18. The Rights Technologies R&D Imbalance 450 70 400 60 350 50 300 250 40 200 30 2009 Gross Expen‐ ditures on R&D  150 ($Billion) 20 RT R&D Output  RT R&D Output 100 (Research Papers) 10 50 RT R&D Index 0 0 Device Producers Content Producers Sources: O C IMF S OECD, 20
  • 19. Laws Not Amenable to Technological Implementation T h l i lI l t ti  Fair Use laws not amenable to automation  Privacy and due process are important but become obstacles  Anticircumvention laws reduce incentive to develop effective technologies – Liability solely on the hacker y y – Effectiveness of TPM/DRM irrelevant to applicability of law (per Universal v Reimerdes, 2000) 21
  • 20. Yet DRM Is Alive Today… Downloads Real Time Delivery E-books Yes “Screenshot DRM” (page images) Music Mobile device Usually “offline listening (stream encryption) mode” d ” Video Yes In most release windows (stream encryption) (t ti ) 22
  • 21. Will DRM Die? Not Wh N t When It Enables N Models E bl New M d l  Digital music downloads: iTunes (originally)  Premium pay-per-view TV  E l release window fil Early l i d films  Music subscription services:* Rhapsody, MOG Rdi S tif P i Rh d MOG, Rdio, Spotify Premium  Subsidized-content ecosystems: boinc (music) Amazon Prime (e book a month) (music), (e-book-a-month)  Library e-book lending: OverDrive, BlueFire *Yes they do – they just don’t call it “DRM” 23
  • 23. Techniques for Identifying Content Watermarking Fingerprinting 25
  • 24. Watermarking Inserting/embedding data into “noise” portions of noise image, audio, or video signal Data capacity: typically a few dozen bytes Technology appeared in mid-to-late 1990s – First for digital images – Audio and video later 26
  • 25. Fingerprinting Examining content to determine its identity – Compute a set of numbers (“fingerprints”) – Look up in database, see if there’s a match Based on mathematical concept of hashing – But allows for different files that look/sound the same – Can compensate for certain transformations: excerpting, cropping, audio distortion, etc. History: y – 2002: Introduced for music during Napster litigation – 2006: Video fingerprinting introduced – 2007 “T t fi 2007: “Text fingerprinting” (Att ib t ) adopted b AP i ti ” (Attributor) d t d by 27
  • 26. Content Identification Business B fit B i Benefits Detecting and deterring unauthorized use Tracking content usage Discovery & recommendations Increasing Internet ad revenue g Managing assets and integrating systems Monetizing transformational content uses 28
  • 27. Legal Developments …and their Technical Solutions 29
  • 28. Legal Developments Network operator liability “Free riding” Digital First Sale 30
  • 29. Network Operator Liability Secondary liability – Contributory: aiding and abetting infringement – Vicarious: “looking the other way” and benefiting from it looking way – Inducement: inducing others to infringe as business model ISP Liability – Notice and takedown (DMCA 512) – Graduated/Progressive Response a/k/a “three strikes” g p (France, South Korea, Taiwan, New Zealand, UK) – Center for Copyright Information, USA 31
  • 30. Technical Solutions Fingerprinting Watermarking Traffic analysis 32
  • 31. “Free Riding” Monetizing links to copyrighted content Posting links to illegal content (e.g. in cyberlockers) Monetizing content appearing in search results “Cloud sync” services(?) y () 33
  • 32. Technical Solutions Fingerprinting & search Tagging content with “beacon” metatags – AP hNews Tagging content with rules for indexing and search results – ACAP 34
  • 33. Digital First Sale First Sale: Section 109 of U.S. copyright law US Known as “Exhaustion” in other countries If you obtain a copyrighted work legally, you can do what you want with it Applicability to digital downloads is unclear Copyright Office punted on it in 2001 report Downloads covered under licenses, not copyright 35
  • 34. Technical Solutions  Forward “Forward and delete” DRM like functionality delete DRM-like Described in 2001 Copyright Office paper Implemented by startup ReDigi Described in IEEE P1817 standard for “Consumer Ownable Digital Personal Property” 36
  • 35. Thanks to our Sponsors 40
  • 36. Thanks to our Media Sponsors 41
  • 38. Recommended Reading Robert Levine, Free Ride 43