Come for the quick hacks, stay for the epiphanies. | |
PerlMonks |
Re: (ichimunki) Re x 3: Security, is it to much to ask?by tachyon (Chancellor) |
on Jul 19, 2001 at 04:58 UTC ( [id://97950]=note: print w/replies, xml ) | Need Help?? |
Not being a lawyer and having only read the summary of the DCMA here it seems that it is not as bad as suggested. Here is the relevant section: DMCA ExceptionsFinally, the prohibitions contained in section 1201 are subject to a number of exceptions. One is an exception to the operation of the entire section, for law enforcement, intelligence and other governmental activities. (Section 1201(e)). The others relate to section 1201(a), the provision dealing with the category of technological measures that control access to works. The broadest of these exceptions, section 1201(a)(1)(B)-(E), establishes an ongoing administrative rule-making proceeding to evaluate the impact of the prohibition against the act of circumventing such access-control measures. This conduct prohibition does not take effect for two years. Once it does, it is subject to an exception for users of a work which is in a particular class of works if they are or are likely to be adversely affected by virtue of the prohibition in making noninfringing uses. The applicability of the exemption is determined through a periodic rulemaking by the Librarian of Congress, on the recommendation of the Register of Copyrights, who is to consult with the Assistant Secretary of Commerce for Communications and Information. The six additional exceptions are as follows: 1. Nonprofit library, archive and educational institution exception (section 1201(d)). The prohibition on the act of circumvention of access control measures is subject to an exception that permits nonprofit libraries, archives and educational institutions to circumvent solely for the purpose of making a good faith determination as to whether they wish to obtain authorized access to the work. 2. Reverse engineering (section 1201(f)). This exception permits circumvention, and the development of technological means for such circumvention, by a person who has lawfully obtained a right to use a copy of a computer program for the sole purpose of identifying and analyzing elements of the program necessary to achieve interoperability with other programs, to the extent that such acts are permitted under copyright law. 3. Encryption research (section 1201(g)). An exception for encryption research permits circumvention of access control measures, and thedevelopment of the technological means to do so, in order to identify flaws and vulnerabilities of encryption technologies. 4. Protection of minors (section 1201(h)). This exception allows a court applying the prohibition to a component or part to consider the necessity for its incorporation in technology that prevents access of minors to material on the Internet. 5. Personal privacy (section 1201(i)). This exception permits circumven-tion when the technological measure, or the work it protects, is capable of collecting or disseminating personally identifying information about the online activities of a natural person. 6. Security testing (section 1201(j)). This exception permits circumven-tion of access control measures, and the development of technological means for such circumvention, for the purpose of testing the security of a computer, computer system or computer network, with the authorization of its owner or operator. It would seem that what was done is permitted under clauses 2,3 and 6. cheers tachyon s&&rsenoyhcatreve&&&s&n.+t&"$'$`$\"$\&"&ee&&y&srve&&d&&print
In Section
Meditations
|
|