{"id":3367,"date":"2003-10-14T11:26:59","date_gmt":"2003-10-14T15:26:59","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cmusings\/2003\/10\/14\/no-exemptions-for-copy-protection-hu"},"modified":"2003-10-14T11:26:59","modified_gmt":"2003-10-14T15:26:59","slug":"no-exemptions-for-copy-protection-huh","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cmusings\/2003\/10\/14\/no-exemptions-for-copy-protection-huh\/","title":{"rendered":"No Exemptions for Copy-Protection? Huh?"},"content":{"rendered":"<p><a name='a414'><\/a><\/p>\n<p><P>Am I having a braino or is this&nbsp;assertion (from <A href=\"http:\/\/www.wired.com\/news\/culture\/0,1284,60770-2,00.html\">this Wired article<\/A>) incorrect?<\/P><br \/>\n<BLOCKQUOTE><br \/>\n<P>&#8220;But the DMCA has no provision allowing exemptions in cases where software was designed with copy controls, such as encryption.<\/P><br \/>\n<P>Even if the Copyright Office grants the Internet Archive&#8217;s request [for an access control exemption], under current circumstances archivists would only be able to back up software that had no built-in copy protections.&#8221;<\/P><\/BLOCKQUOTE><br \/>\n<P dir=\"ltr\">The DMCA has no such exemption because there is no ban on circumvention of copy-protections<STRONG>.<\/STRONG> There is a ban on trafficking, but not on circumvention.<\/P><br \/>\n<P dir=\"ltr\">So what&#8217;s the problem with circumventing copy controls to archive?<\/P><br \/>\n<P dir=\"ltr\"><STRONG>Update: <\/STRONG>BTW, I&#8217;m not saying that they don&#8217;t need an exemption. They do, but for access controls.&nbsp;Wired&#8217;s assertion is bogus because they&#8217;re saying there&#8217;s no way you can get an exemption for circumvention copy controls, when you don&#8217;t even need one. But, do see Ernest&#8217;s comment about the conflation of access and copy controls.<\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Am I having a braino or is this&nbsp;assertion (from this Wired article) incorrect? &#8220;But the DMCA has no provision allowing exemptions in cases where software was designed with copy controls, such as encryption. Even if the Copyright Office grants the Internet Archive&#8217;s request [for an access control exemption], under current circumstances archivists would only be [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[],"class_list":["post-3367","post","type-post","status-publish","format-standard","hentry","category-general-news"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/comments?post=3367"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3367\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/media?parent=3367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/categories?post=3367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/tags?post=3367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}