SlideShare una empresa de Scribd logo
1 de 24
TPMs and Access Rights

                                      Carolina Rossini
           International Intellectual Property Director
                                     carolina@eff.org

     Trans-Pacific Partnership Stakeholder Forum
                    San Diego, USA - July 02, 2012
Key Points
• Countries’ policy choices on TPMs scope and policy significant
  implications for education, scientific research, free
  expression, competition policy, and innovation.


• 12 years of US-DMCA shows: overbroad TPMs policy cause
  harm to important public policy interests outside the copyright
  sphere.


• The TPP agreement should leave the choice of how to structure
  TPM provisions to member economies, as prescribed by the
  international standards established at WIPO.
Like ACTA, the TPP Agreement is a plurilateral agreement that
will be used to create new heightened global IP enforcement
                           norms.

 Countries that are not parties to the negotiation will likely be
  asked to accede to the TPP as a condition of bilateral trade
    agreements with the U.S. and other TPP members, or
evaluated against the TPP's standards in the annual Special 301
     process administered by the Office of the U.S. Trade
                        Representative.
“Digital locks” that exist on many types of copyrighted goods allegedly to prevent people
from pirating that content, but also that end up preventing legally allowed uses such of
content in the public domain, fair use or under exceptions and limitations provisions or even
under consumer rights (not copyright infringing activities) ;

                                 UNINTENDED CONSEQUENCES!!!

Visually impaired people who need to use software to convert text of their e-books to speech/audio
  could not legally do so where the text is technologically protected despite the existing statutory
exception in US law and in other countries that permits the creation of accessible format copies for
                                     visually impaired persons.

Teachers need to excerpt part of an e-book or make a clip of a movie released on DVD for use in their
          classroom under fair use or quotation exception would not be allowed to do so

                                            And remember:

In the U.S., this sort of use for education would be considered fair use, and is currently the subject of
  a three year exemption granted by the Librarian of Congress, but without an appropriately tailored
and balanced administrative rulemaking digital locks exemption procedure, under the TPP, this would
    violate the digital locks provisions, and could subject the school to crippling statutory damages
International Standards


•   Article 11- WIPO Copyright Treaty


•   Article 18 of WIPO Performance And Phonograms
    Treaty (WPPT)
WIPO Copyright Treaty - Article 11
  Contracting Parties shall provide adequate legal
   protection and effective legal remedies against
     the circumvention of effective technological
 measures that are used by authors in connection
  with the exercise of their rights under this Treaty
 or the Berne Convention and that restrict acts, in
 respect of their works, which are not authorized
 by the authors concerned or permitted by law.
Article 18 of WPPT
   Obligations concerning Technological Measures

 Contracting Parties shall provide adequate legal protection
  and effective legal remedies against the circumvention of
effective technological measures that are used by performers
or producers of phonograms in connection with the exercise
   of their rights under this Treaty and that restrict acts, in
respect of their performances or phonograms, which are not
      authorized by the performers or the producers of
        phonograms concerned or permitted by law.
U.S. Digital Millennium Copyright Act of 1998 (DMCA). Anti-circumvention provisions
based on those in the DMCA have been included in the IP chapters of the last 10
bilateral or regional free trade agreements (FTAs) that the U.S. has concluded – as
trade off for market access interests.

As the U.S. experience with the similar provisions in the DMCA over the last 12 years
has demonstrated, overbroad legal protection for TPMs has restricted fair use and
other lawful uses of copyrighted material for education and a variety of socially
beneficial purposes, chilled scientific research and progress in computer security,
impeded legitimate competition, and stifled innovation.


    See: Unintended Consequences: Twelve Years Under the DMCA, Electronic Frontier
              Foundation (February 2010) @ http://www.eff.org/files/eff-unintended-
                                                       consequences-12-years.pdf
Impacts of DMCA extension
• Overrides national copyright law exceptions.
• Chilling effect on scientific research and publication.
• Anti-competitive misuse.
• Stifled technological innovation and creation of
  interoperable devices.
• Threatened free and open source software
    .
• See: “Unintended Consequences: 12 Years Under the
  DMCA @ http://www.eff.org/unintendedconsequences
Article 4.9 requires countries joining the TPP to - In particular, it requires countries to create:

    • a legal ban on the act of circumventing a technological protection measure that controls
      access to a protected work (Article 4.9(a)(i));
    • a broad legal ban on the manufacture and distribution of certain tools, technologies
      and devices that can be used to circumvent any TPMs, including access control TPMs
      and copy control TPMs (Article 4.9(a)(ii) and the definition of “effective technological
      measure in Article 4.9(f));
    • limited exceptions to these bans for a specified set of 8 purposes mirroring those in the
      U.S. DMCA (Article 4.9(d) and (e));
    • criminal sanctions for violation of the TPM provisions (Article 4.9(a) final sentence and
      Articles 15.5); and
    • specific civil penalties for violation of the TPM provisions, including the ability for
      judicial authorities to order that a party who loses a civil lawsuit challenging whether
      there has been a TPM violation be required to pay the court costs and reasonable
      attorney fees of a prevailing rightsholder (Article 12.2).
Since access control TPMs control all access to a
  copyrighted work, including access for lawful, non
     copyright-infringing purposes, a legal ban on
    circumventing access control TPMs would give
  rightsholders a new right of controlling access to
  copyrighted works, separate from and potentially
  unconnected to, the enumerated copyright rights
granted to authors under the Berne Convention, the
   WCT and the WPPT. Thus, a legal prohibition on
circumventing access control TPMs could effectively
override the traditional boundaries of copyright law.
• Knowledge Requirement (liability where a person accidentally circumvented or had no
  subjective knowledge of having circumvented a TPM)
     Actual and constructive knowledge of circumvention should be required to impose civil and
       criminal liability for circumvention of a technological protection measure
        **Problematic for US-Chile/ korus/ US-Australia
     Permit flexibility to exclude civil and criminal liability for innocent infringers.

• Allow flexibility based on multilateral agreements
     more flexible regulations governing access to circumvention tools and services that preserve
      the ability to obtain access to circumvention tools and services to make lawful non-infringing
      uses of copyrighted works
        ** Problematic for New Zeland
        **See also http://www.eff.org/files/filenode/FTAA/20040830_uschile_fta.pdf

• Sanctions: there are other ways!
     The U.S.-Chile FTA contains a number of additional flexibilities for structuring penalties for
      TPM violations that are less likely to result in harm to other public policy goals;
     Limit criminal and monetary liability for scientific research and educational purposes;
• Limit Scope! - Art. 4.9© - requires countries to treat violation of the TPM measures
  as a separate cause of action, independent of any infringement that might occur
  under the Party’s law on copyright and related rights = laws are required to prohibit
  bypassing rightsholder TPMs even if the circumvention is not tied to any illegal
  action (SLIPT COURT DECISIONS IN USA!)

     Amend Article 4.9(a)(i) to read “knowingly circumvents, for the purpose of infringing a
      right protected under TPP countries’ national copyright law, without authority any
      effective technological measure ...”

• Allow innovation! - TPM Provisions Should Incorporate a Legislative or
  Administrative Review and Exemption Process that Permits Exemptions to be
  Granted for Both the Act of Circumvention and the Tools Necessary to Do So
Conclusions
• TPP Agreement should not include specific TPM provisions,
but leave policy choices on how to structure TPM laws to
member economies.

• If the TPP Agreement includes TPM provisions they should
be based on the WCT and WPPT provisions, and give
member economies discretion in how to implement.
Conclusions - Key principles:
• Circumvention should only be unlawful if results in copyright
  infringement.

• TPM laws should not hinder creation of new copyright exceptions
  and limitations to meet domestic needs.

• TPM laws should permit use of circumvention devices/ services for
  non copyright-infringing purposes.

• Give member economies discretion to regulate anti-competitive
  misuse of TPMs and structure penalties to minimize chill on
  innovation and socially beneficial activities.
And remember – the USTR does not represent consensus within the USA

                     For instance, opposition to SOPA

https://www.cdt.org/report/list-organizations-and-individuals-opposing-sopa

                  And it is important to understand why…
Thank you!

                                 Carolina Rossini
      International Intellectual Property Director
                                carolina@eff.org

Trans-Pacific Partnership Stakeholder Forum
               San Diego, USA - July 02, 2012
Further info…
Lawful Use Restricted
• TPMs can prevent lawful non-infringing uses.
• U.S. copyright law’s balanced set of rights replaced
by “anti-circumvention” law:
  - new access right - protection beyond copyright
  - no right to circumvent to make fair use
  - device ban - downstream fair use no defense
  - U.S. statutory exceptions overridden - as documented
  by those who have had to apply for exemptions every 3 years:
     • Libraries and Archives not able to make copies of TPM
     protected works to preserve cultural heritage;
     • Educators sought exemption to make DVD clips for film class;
     • American Federation of Blind for e-book text to speech.
Chilled Scientific Research
• Chilling effect on scientific researchers, journalists,
publishers:
   - 2000 Music industry group threatened to sue
      Princeton Professor Felten and research team for
      publishing research paper on security vulnerabilities.
• Ongoing effect - computer security weakened:
   - 2005 Researcher discovered Sony BMG music CD
   “Rootkit” software security risk but consulted with
   lawyers for several weeks before raising alarm.
   - 2006 exemption for good faith security testing of music
   CD access TPMs.
Technology Innovation Stifled
• Overbroad TPM laws give control over
  pace and nature of technology innovation:
  • TPMs and license conditions control DVD player
  feature set.
  • Prevent creation of interoperable new technologies.
     - DVD movie jukeboxes (DVD-CCA v. Kaleidescape)
     - iTunes on iPods (Apple v. RealNetworks)
Anti-Competitive Misuse
• Blocked aftermarkets, product lock-in at monopoly prices:

    - printer cartridges (Lexmark v. SCC)
    - garage remote controls (Chamberlain Group v. Skylink
    Technologies)
    - computer maintenance service (Storage Tek v. CHE)
    - cell phone unlocking (TracFone v. SOL Wireless)
       • recent administrative exemption, but not for tools

 • Geographic market segmentation:
    - Sony Playstation MOD chips (Sony v. Gamemasters;
    Sony v. Stevens)

Más contenido relacionado

La actualidad más candente

How International IP Laws Affect PR Practice in the Digital Age
How International IP Laws Affect PR Practice in the Digital AgeHow International IP Laws Affect PR Practice in the Digital Age
How International IP Laws Affect PR Practice in the Digital AgeSarah Jackson
 
Chap 14 Power Point
Chap 14 Power PointChap 14 Power Point
Chap 14 Power PointDJ Glosey
 
Registration of trademark
Registration of trademarkRegistration of trademark
Registration of trademarkSree Lekshmi
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William BoothbyHanah Croft
 
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...SHIMOKAJI IP
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPBananaIP Counsels
 
Lecture 8 ib 404 institutional framework for international business
Lecture 8 ib 404 institutional framework for international businessLecture 8 ib 404 institutional framework for international business
Lecture 8 ib 404 institutional framework for international businessMahir Jawad
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Olact Cafta Presentation
Olact Cafta PresentationOlact Cafta Presentation
Olact Cafta PresentationFNian
 
Combating Counterfeits: Legal Enforcement ‘Tools’ Available - Trainer
Combating Counterfeits: Legal Enforcement ‘Tools’ Available -  TrainerCombating Counterfeits: Legal Enforcement ‘Tools’ Available -  Trainer
Combating Counterfeits: Legal Enforcement ‘Tools’ Available - Trainerpzulueta
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Alan Sutin - Privacy
Alan Sutin - PrivacyAlan Sutin - Privacy
Alan Sutin - PrivacyBen Allen
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property RightsMalihaaaa
 
Exemption to prohibition on circumvention of copyright protection systems for...
Exemption to prohibition on circumvention of copyright protection systems for...Exemption to prohibition on circumvention of copyright protection systems for...
Exemption to prohibition on circumvention of copyright protection systems for...Soynadie Periodismo Urbano
 

La actualidad más candente (20)

Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmmMidwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
 
How International IP Laws Affect PR Practice in the Digital Age
How International IP Laws Affect PR Practice in the Digital AgeHow International IP Laws Affect PR Practice in the Digital Age
How International IP Laws Affect PR Practice in the Digital Age
 
Chap 14 Power Point
Chap 14 Power PointChap 14 Power Point
Chap 14 Power Point
 
Registration of trademark
Registration of trademarkRegistration of trademark
Registration of trademark
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
 
File000167
File000167File000167
File000167
 
Lecture 8 ib 404 institutional framework for international business
Lecture 8 ib 404 institutional framework for international businessLecture 8 ib 404 institutional framework for international business
Lecture 8 ib 404 institutional framework for international business
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
International patent law
International patent law International patent law
International patent law
 
Olact Cafta Presentation
Olact Cafta PresentationOlact Cafta Presentation
Olact Cafta Presentation
 
Combating Counterfeits: Legal Enforcement ‘Tools’ Available - Trainer
Combating Counterfeits: Legal Enforcement ‘Tools’ Available -  TrainerCombating Counterfeits: Legal Enforcement ‘Tools’ Available -  Trainer
Combating Counterfeits: Legal Enforcement ‘Tools’ Available - Trainer
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Alan Sutin - Privacy
Alan Sutin - PrivacyAlan Sutin - Privacy
Alan Sutin - Privacy
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Exemption to prohibition on circumvention of copyright protection systems for...
Exemption to prohibition on circumvention of copyright protection systems for...Exemption to prohibition on circumvention of copyright protection systems for...
Exemption to prohibition on circumvention of copyright protection systems for...
 

Similar a Eff presentation on_tp_ms_and_civil_rights_sd

Impact of Trade Agreements on IP
Impact of Trade Agreements on IPImpact of Trade Agreements on IP
Impact of Trade Agreements on IPCarolina Rossini
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_bsookman
 
Intellectual Property Rights Seminar Report
Intellectual Property Rights Seminar ReportIntellectual Property Rights Seminar Report
Intellectual Property Rights Seminar ReportAjay Poshak
 
Philippine Franchising Law
Philippine Franchising LawPhilippine Franchising Law
Philippine Franchising LawJDP Consulting
 
Trade Related Aspects Of Intellectual Property Rights (TRIPS)
Trade Related Aspects Of Intellectual Property Rights (TRIPS)Trade Related Aspects Of Intellectual Property Rights (TRIPS)
Trade Related Aspects Of Intellectual Property Rights (TRIPS)Anjita Khadka
 
Business law : Intellectual property right: Patents, trademarks, geographical...
Business law : Intellectual property right: Patents, trademarks, geographical...Business law : Intellectual property right: Patents, trademarks, geographical...
Business law : Intellectual property right: Patents, trademarks, geographical...Renzil D'cruz
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...Evangeline
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineeringwelcometofacebook
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)StudsPlanet.com
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
International legislation and uae legislation
International legislation and uae legislationInternational legislation and uae legislation
International legislation and uae legislationwritingessayz
 
Negotiating development oriented intellectual property rights provisions in t...
Negotiating development oriented intellectual property rights provisions in t...Negotiating development oriented intellectual property rights provisions in t...
Negotiating development oriented intellectual property rights provisions in t...T. Alexander Puutio
 
International business law ch. 17
International business law ch. 17International business law ch. 17
International business law ch. 17Frank Cavaliere
 
Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Pravin Asar
 
Technology Transfer: Global trends in Tech Transfer
Technology Transfer: Global trends in Tech TransferTechnology Transfer: Global trends in Tech Transfer
Technology Transfer: Global trends in Tech TransferBananaIP Counsels
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)Nits Kedia
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)StudsPlanet.com
 
Ownership rights in map products - an Intellectual Property perspective.
Ownership rights in map products - an Intellectual Property perspective.Ownership rights in map products - an Intellectual Property perspective.
Ownership rights in map products - an Intellectual Property perspective.Lou Milrad
 
Intellectual property in_federal_contracts
Intellectual property in_federal_contractsIntellectual property in_federal_contracts
Intellectual property in_federal_contractsPravin Asar
 

Similar a Eff presentation on_tp_ms_and_civil_rights_sd (20)

Impact of Trade Agreements on IP
Impact of Trade Agreements on IPImpact of Trade Agreements on IP
Impact of Trade Agreements on IP
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 
Intellectual Property Rights Seminar Report
Intellectual Property Rights Seminar ReportIntellectual Property Rights Seminar Report
Intellectual Property Rights Seminar Report
 
Philippine Franchising Law
Philippine Franchising LawPhilippine Franchising Law
Philippine Franchising Law
 
Trade Related Aspects Of Intellectual Property Rights (TRIPS)
Trade Related Aspects Of Intellectual Property Rights (TRIPS)Trade Related Aspects Of Intellectual Property Rights (TRIPS)
Trade Related Aspects Of Intellectual Property Rights (TRIPS)
 
Business law : Intellectual property right: Patents, trademarks, geographical...
Business law : Intellectual property right: Patents, trademarks, geographical...Business law : Intellectual property right: Patents, trademarks, geographical...
Business law : Intellectual property right: Patents, trademarks, geographical...
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineering
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Lecture-4.pptx
Lecture-4.pptxLecture-4.pptx
Lecture-4.pptx
 
International legislation and uae legislation
International legislation and uae legislationInternational legislation and uae legislation
International legislation and uae legislation
 
Negotiating development oriented intellectual property rights provisions in t...
Negotiating development oriented intellectual property rights provisions in t...Negotiating development oriented intellectual property rights provisions in t...
Negotiating development oriented intellectual property rights provisions in t...
 
International business law ch. 17
International business law ch. 17International business law ch. 17
International business law ch. 17
 
Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.Intellectual property in_federal_contracts.
Intellectual property in_federal_contracts.
 
Technology Transfer: Global trends in Tech Transfer
Technology Transfer: Global trends in Tech TransferTechnology Transfer: Global trends in Tech Transfer
Technology Transfer: Global trends in Tech Transfer
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Ownership rights in map products - an Intellectual Property perspective.
Ownership rights in map products - an Intellectual Property perspective.Ownership rights in map products - an Intellectual Property perspective.
Ownership rights in map products - an Intellectual Property perspective.
 
Intellectual property in_federal_contracts
Intellectual property in_federal_contractsIntellectual property in_federal_contracts
Intellectual property in_federal_contracts
 

Más de Carolina Rossini

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
REA no mundo / OER in the World
REA no mundo / OER in the World REA no mundo / OER in the World
REA no mundo / OER in the World Carolina Rossini
 
Tratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetTratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetCarolina Rossini
 
Ciberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCiberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCarolina Rossini
 
Participation for Open Internet - The Case of Marco Civil
Participation for  Open Internet - The Case of Marco Civil Participation for  Open Internet - The Case of Marco Civil
Participation for Open Internet - The Case of Marco Civil Carolina Rossini
 
Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Carolina Rossini
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Carolina Rossini
 
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...Carolina Rossini
 
REA no workshop da FEA./USP
REA no workshop da FEA./USP REA no workshop da FEA./USP
REA no workshop da FEA./USP Carolina Rossini
 
USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014   USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014 Carolina Rossini
 
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Carolina Rossini
 
Open Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesOpen Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesCarolina Rossini
 
Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Carolina Rossini
 
Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Carolina Rossini
 

Más de Carolina Rossini (20)

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
REA no mundo / OER in the World
REA no mundo / OER in the World REA no mundo / OER in the World
REA no mundo / OER in the World
 
Tratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetTratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la Internet
 
Ciberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCiberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad Civil
 
Participation for Open Internet - The Case of Marco Civil
Participation for  Open Internet - The Case of Marco Civil Participation for  Open Internet - The Case of Marco Civil
Participation for Open Internet - The Case of Marco Civil
 
Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Links for #sif12u Marco Civil
Links for #sif12u Marco Civil
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms
 
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
 
REA no workshop da FEA./USP
REA no workshop da FEA./USP REA no workshop da FEA./USP
REA no workshop da FEA./USP
 
USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014   USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014
 
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
 
Open Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesOpen Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar series
 
Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02
 
Cr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_editCr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_edit
 
Ip luncheon
Ip luncheonIp luncheon
Ip luncheon
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr knol gov4gc
Cr knol gov4gcCr knol gov4gc
Cr knol gov4gc
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações
 
Croi4 hc
Croi4 hcCroi4 hc
Croi4 hc
 

Eff presentation on_tp_ms_and_civil_rights_sd

  • 1. TPMs and Access Rights Carolina Rossini International Intellectual Property Director carolina@eff.org Trans-Pacific Partnership Stakeholder Forum San Diego, USA - July 02, 2012
  • 2. Key Points • Countries’ policy choices on TPMs scope and policy significant implications for education, scientific research, free expression, competition policy, and innovation. • 12 years of US-DMCA shows: overbroad TPMs policy cause harm to important public policy interests outside the copyright sphere. • The TPP agreement should leave the choice of how to structure TPM provisions to member economies, as prescribed by the international standards established at WIPO.
  • 3. Like ACTA, the TPP Agreement is a plurilateral agreement that will be used to create new heightened global IP enforcement norms. Countries that are not parties to the negotiation will likely be asked to accede to the TPP as a condition of bilateral trade agreements with the U.S. and other TPP members, or evaluated against the TPP's standards in the annual Special 301 process administered by the Office of the U.S. Trade Representative.
  • 4. “Digital locks” that exist on many types of copyrighted goods allegedly to prevent people from pirating that content, but also that end up preventing legally allowed uses such of content in the public domain, fair use or under exceptions and limitations provisions or even under consumer rights (not copyright infringing activities) ; UNINTENDED CONSEQUENCES!!! Visually impaired people who need to use software to convert text of their e-books to speech/audio could not legally do so where the text is technologically protected despite the existing statutory exception in US law and in other countries that permits the creation of accessible format copies for visually impaired persons. Teachers need to excerpt part of an e-book or make a clip of a movie released on DVD for use in their classroom under fair use or quotation exception would not be allowed to do so And remember: In the U.S., this sort of use for education would be considered fair use, and is currently the subject of a three year exemption granted by the Librarian of Congress, but without an appropriately tailored and balanced administrative rulemaking digital locks exemption procedure, under the TPP, this would violate the digital locks provisions, and could subject the school to crippling statutory damages
  • 5.
  • 6. International Standards • Article 11- WIPO Copyright Treaty • Article 18 of WIPO Performance And Phonograms Treaty (WPPT)
  • 7. WIPO Copyright Treaty - Article 11 Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.
  • 8. Article 18 of WPPT Obligations concerning Technological Measures Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by performers or producers of phonograms in connection with the exercise of their rights under this Treaty and that restrict acts, in respect of their performances or phonograms, which are not authorized by the performers or the producers of phonograms concerned or permitted by law.
  • 9. U.S. Digital Millennium Copyright Act of 1998 (DMCA). Anti-circumvention provisions based on those in the DMCA have been included in the IP chapters of the last 10 bilateral or regional free trade agreements (FTAs) that the U.S. has concluded – as trade off for market access interests. As the U.S. experience with the similar provisions in the DMCA over the last 12 years has demonstrated, overbroad legal protection for TPMs has restricted fair use and other lawful uses of copyrighted material for education and a variety of socially beneficial purposes, chilled scientific research and progress in computer security, impeded legitimate competition, and stifled innovation. See: Unintended Consequences: Twelve Years Under the DMCA, Electronic Frontier Foundation (February 2010) @ http://www.eff.org/files/eff-unintended- consequences-12-years.pdf
  • 10. Impacts of DMCA extension • Overrides national copyright law exceptions. • Chilling effect on scientific research and publication. • Anti-competitive misuse. • Stifled technological innovation and creation of interoperable devices. • Threatened free and open source software . • See: “Unintended Consequences: 12 Years Under the DMCA @ http://www.eff.org/unintendedconsequences
  • 11. Article 4.9 requires countries joining the TPP to - In particular, it requires countries to create: • a legal ban on the act of circumventing a technological protection measure that controls access to a protected work (Article 4.9(a)(i)); • a broad legal ban on the manufacture and distribution of certain tools, technologies and devices that can be used to circumvent any TPMs, including access control TPMs and copy control TPMs (Article 4.9(a)(ii) and the definition of “effective technological measure in Article 4.9(f)); • limited exceptions to these bans for a specified set of 8 purposes mirroring those in the U.S. DMCA (Article 4.9(d) and (e)); • criminal sanctions for violation of the TPM provisions (Article 4.9(a) final sentence and Articles 15.5); and • specific civil penalties for violation of the TPM provisions, including the ability for judicial authorities to order that a party who loses a civil lawsuit challenging whether there has been a TPM violation be required to pay the court costs and reasonable attorney fees of a prevailing rightsholder (Article 12.2).
  • 12. Since access control TPMs control all access to a copyrighted work, including access for lawful, non copyright-infringing purposes, a legal ban on circumventing access control TPMs would give rightsholders a new right of controlling access to copyrighted works, separate from and potentially unconnected to, the enumerated copyright rights granted to authors under the Berne Convention, the WCT and the WPPT. Thus, a legal prohibition on circumventing access control TPMs could effectively override the traditional boundaries of copyright law.
  • 13. • Knowledge Requirement (liability where a person accidentally circumvented or had no subjective knowledge of having circumvented a TPM)  Actual and constructive knowledge of circumvention should be required to impose civil and criminal liability for circumvention of a technological protection measure **Problematic for US-Chile/ korus/ US-Australia  Permit flexibility to exclude civil and criminal liability for innocent infringers. • Allow flexibility based on multilateral agreements  more flexible regulations governing access to circumvention tools and services that preserve the ability to obtain access to circumvention tools and services to make lawful non-infringing uses of copyrighted works ** Problematic for New Zeland **See also http://www.eff.org/files/filenode/FTAA/20040830_uschile_fta.pdf • Sanctions: there are other ways!  The U.S.-Chile FTA contains a number of additional flexibilities for structuring penalties for TPM violations that are less likely to result in harm to other public policy goals;  Limit criminal and monetary liability for scientific research and educational purposes;
  • 14. • Limit Scope! - Art. 4.9© - requires countries to treat violation of the TPM measures as a separate cause of action, independent of any infringement that might occur under the Party’s law on copyright and related rights = laws are required to prohibit bypassing rightsholder TPMs even if the circumvention is not tied to any illegal action (SLIPT COURT DECISIONS IN USA!)  Amend Article 4.9(a)(i) to read “knowingly circumvents, for the purpose of infringing a right protected under TPP countries’ national copyright law, without authority any effective technological measure ...” • Allow innovation! - TPM Provisions Should Incorporate a Legislative or Administrative Review and Exemption Process that Permits Exemptions to be Granted for Both the Act of Circumvention and the Tools Necessary to Do So
  • 15. Conclusions • TPP Agreement should not include specific TPM provisions, but leave policy choices on how to structure TPM laws to member economies. • If the TPP Agreement includes TPM provisions they should be based on the WCT and WPPT provisions, and give member economies discretion in how to implement.
  • 16. Conclusions - Key principles: • Circumvention should only be unlawful if results in copyright infringement. • TPM laws should not hinder creation of new copyright exceptions and limitations to meet domestic needs. • TPM laws should permit use of circumvention devices/ services for non copyright-infringing purposes. • Give member economies discretion to regulate anti-competitive misuse of TPMs and structure penalties to minimize chill on innovation and socially beneficial activities.
  • 17. And remember – the USTR does not represent consensus within the USA For instance, opposition to SOPA https://www.cdt.org/report/list-organizations-and-individuals-opposing-sopa And it is important to understand why…
  • 18.
  • 19. Thank you! Carolina Rossini International Intellectual Property Director carolina@eff.org Trans-Pacific Partnership Stakeholder Forum San Diego, USA - July 02, 2012
  • 21. Lawful Use Restricted • TPMs can prevent lawful non-infringing uses. • U.S. copyright law’s balanced set of rights replaced by “anti-circumvention” law: - new access right - protection beyond copyright - no right to circumvent to make fair use - device ban - downstream fair use no defense - U.S. statutory exceptions overridden - as documented by those who have had to apply for exemptions every 3 years: • Libraries and Archives not able to make copies of TPM protected works to preserve cultural heritage; • Educators sought exemption to make DVD clips for film class; • American Federation of Blind for e-book text to speech.
  • 22. Chilled Scientific Research • Chilling effect on scientific researchers, journalists, publishers: - 2000 Music industry group threatened to sue Princeton Professor Felten and research team for publishing research paper on security vulnerabilities. • Ongoing effect - computer security weakened: - 2005 Researcher discovered Sony BMG music CD “Rootkit” software security risk but consulted with lawyers for several weeks before raising alarm. - 2006 exemption for good faith security testing of music CD access TPMs.
  • 23. Technology Innovation Stifled • Overbroad TPM laws give control over pace and nature of technology innovation: • TPMs and license conditions control DVD player feature set. • Prevent creation of interoperable new technologies. - DVD movie jukeboxes (DVD-CCA v. Kaleidescape) - iTunes on iPods (Apple v. RealNetworks)
  • 24. Anti-Competitive Misuse • Blocked aftermarkets, product lock-in at monopoly prices: - printer cartridges (Lexmark v. SCC) - garage remote controls (Chamberlain Group v. Skylink Technologies) - computer maintenance service (Storage Tek v. CHE) - cell phone unlocking (TracFone v. SOL Wireless) • recent administrative exemption, but not for tools • Geographic market segmentation: - Sony Playstation MOD chips (Sony v. Gamemasters; Sony v. Stevens)