Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 43825-43839 [2010-18339]
Download as PDF
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
Taking of Private Property
This rule will not cause a taking of
private property or otherwise have
taking implications under Executive
Order 12630, Governmental Actions and
Interference with Constitutionally
Protected Property Rights.
Civil Justice Reform
This rule meets applicable standards
in sections 3(a) and 3(b)(2) of Executive
Order 12988, Civil Justice Reform, to
minimize litigation, eliminate
ambiguity, and reduce burden.
Protection of Children
We have analyzed this rule under
Executive Order 13045, Protection of
Children from Environmental Health
Risks and Safety Risks. This rule is not
an economically significant rule and
does not create an environmental risk to
health or risk to safety that may
disproportionately affect children.
Indian Tribal Governments
This rule does not have tribal
implications under Executive Order
13175, Consultation and Coordination
with Indian Tribal Governments,
because it does not have a substantial
direct effect on one or more Indian
tribes, on the relationship between the
Federal Government and Indian tribes,
or on the distribution of power and
responsibilities between the Federal
Government and Indian tribes.
jdjones on DSK8KYBLC1PROD with RULES
Energy Effects
We have analyzed this rule under
Executive Order 13211, Actions
Concerning Regulations That
Significantly Affect Energy Supply,
Distribution, or Use. We have
determined that it is not a ‘‘significant
energy action’’ under that order because
it is not a ‘‘significant regulatory action’’
under Executive Order 12866 and is not
likely to have a significant adverse effect
on the supply, distribution, or use of
energy. The Administrator of the Office
of Information and Regulatory Affairs
has not designated it as a significant
energy action. Therefore, it does not
require a Statement of Energy Effects
under Executive Order 13211.
Technical Standards
The National Technology Transfer
and Advancement Act (NTTAA) (15
U.S.C. 272 note) directs agencies to use
voluntary consensus standards in their
regulatory activities unless the agency
provides Congress, through the Office of
Management and Budget, with an
explanation of why using these
standards would be inconsistent with
applicable law or otherwise impractical.
Voluntary consensus standards are
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
technical standards (e.g., specifications
of materials, performance, design, or
operation; test methods; sampling
procedures; and related management
systems practices) that are developed or
adopted by voluntary consensus
standards bodies.
This rule does not use technical
standards. Therefore, we did not
consider the use of voluntary consensus
standards.
Environment
We have analyzed this rule under
Department of Homeland Security
Management Directive 023–01 and
Commandant Instruction M16475.lD,
which guide the Coast Guard in
complying with the National
Environmental Policy Act of 1969
(NEPA) (42 U.S.C. 4321–4370f), and
have concluded this action is one of a
category of actions which do not
individually or cumulatively have a
significant effect on the human
environment. This rule is categorically
excluded, under figure 2–1, paragraph
(34)(g), of the Instruction. This rule
involves establishing, disestablishing, or
changing Regulated Navigation Areas
and security or safety zones. An
environmental analysis checklist and a
categorical exclusion determination are
available in the docket where indicated
under ADDRESSES.
List of Subjects in 33 CFR Part 165
Harbors, Marine safety, Navigation
(water), Reporting and recordkeeping
requirements, Security measures,
Waterways.
■ For the reasons discussed in the
preamble, the Coast Guard is amending
33 CFR part 165 as follows:
PART 165—REGULATED NAVIGATION
AREAS AND LIMITED ACCESS AREAS
1. The authority citation for part 165
continues to read as follows:
■
Authority: 33 U.S.C. 1226, 1231; 46 U.S.C.
Chapter 701, 3306, 3703; 50 U.S.C. 191, 195;
33 CFR 1.05–1, 6.04–1, 6.04–6, and 160.5;
Pub. L. 107–295, 116 Stat. 2064; Department
of Homeland Security Delegation No. 0170.1.
2. Add § 165.T14–199 to read as
follows:
43825
Light #2); 21°26′40.9″ N, 157°48′10.5″
W, and 21°26′30.4″ N, 157°48′20.57″ W
(aka Kealohi Pt) thence along the coast
to the beginning point. This safety zone
extends from the surface of the water to
the ocean floor.
These coordinates are based upon the
National Oceanic and Atmospheric
Administration Coast Survey, Pacific
Ocean, Oahu, Hawaii, chart 19359.
(b) Regulations. (1) Entry into or
remaining in the safety zone described
in paragraph (a) of this section is
prohibited unless authorized by the
Coast Guard Captain of the Port
Honolulu zone.
(2) Persons desiring to transit in the
safety zone may contact the Honolulu
Captain of the Port on VHF channel 81A
(157.075 MHz), VHF channel 16
(156.800 MHz), or at telephone numbers
1–808–563–9906 and 808–842–2600 to
seek permission to transit the area with
a designated escort vessel. If permission
is granted, all persons and vessels must
comply with the instructions of the
Captain of the Port or his or her
designated representative.
(c) Effective period. This rule is
effective from 5:00 a.m. local (HST) time
on July 16, 2010 through 7:00 p.m. local
(HST) time on August 13, 2010.
(d) Regulations. In accordance with
the general regulations in 33 CFR part
165, Subpart C, no person or vessel may
enter or remain in the zone except for
support vessels and personnel, or other
vessels authorized by the Captain of the
Port or his designated representatives.
(e) Penalties. Vessels or persons
violating this rule would be subject to
the penalties set forth in 33 U.S.C. 1232
and 50 U.S.C. 192.
Dated: June 24, 2010.
R.E. McFarland,
Commander, U.S. Coast Guard, Acting
Captain of the Port Honolulu.
[FR Doc. 2010–18268 Filed 7–26–10; 8:45 am]
BILLING CODE 9110–04–P
LIBRARY OF CONGRESS
Copyright Office
■
§ 165.T14–205 Safety Zone; He’eia Kea
Small Boat Harbor, Kaneohe Bay, Oahu,
Hawaii.
(a) Location. The following area is a
temporary safety zone: All waters
contained within a specified area
around five moored vessels in the He’eia
Kea Small Boat Harbor located in
Kaneohe Bay, Oahu, Hawaii. This safety
zone is bounded by the points:
21°26′30.9″ N, 157°48′40.4″ W;
21°26′53.4″ N, 157°48′33.8″ W (aka
PO 00000
Frm 00027
Fmt 4700
Sfmt 4700
37 CFR Part 201
[Docket No. RM 2008–8]
Exemption to Prohibition on
Circumvention of Copyright Protection
Systems for Access Control
Technologies
Copyright Office, Library of
Congress.
ACTION: Final rule.
AGENCY:
The Librarian of Congress
announces that the prohibition against
SUMMARY:
E:\FR\FM\27JYR1.SGM
27JYR1
43826
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
circumvention of technological
measures that effectively control access
to copyrighted works shall not apply to
persons who engage in noninfringing
uses of six classes of copyrighted works.
EFFECTIVE DATE: July 27, 2010.
FOR FURTHER INFORMATION CONTACT:
Robert Kasunic, Assistant General
Counsel, and David O. Carson, General
Counsel, Copyright GC/I&R, P.O. Box
70400, Washington, D.C. 20024.
Telephone: (202) 707–8380. Telefax:
(202) 707–8366.
SUPPLEMENTARY INFORMATION: In this
notice, the Librarian of Congress, upon
the recommendation of the Register of
Copyrights, announces that the
prohibition against circumvention of
technological measures that effectively
control access to copyrighted works
shall not apply to persons who engage
in noninfringing uses of six classes of
works. This announcement is the
culmination of a rulemaking proceeding
commenced by the Register on October
6, 2008. A more comprehensive
statement of the background and legal
requirements of the rulemaking, a
discussion of the record and the
Register’s analysis may be found in the
Register’s memorandum to the Librarian
of Congress dated June 11, 2010, which
contains the full explanation of the
Register’s recommendation. A copy of
the Register’s memorandum may be
found at https://www.copyright.gov/
1201. This notice summarizes the
Register’s recommendation, announces
the Librarian’s determination, and
publishes the regulatory text codifying
the six exempted classes of works.
jdjones on DSK8KYBLC1PROD with RULES
I. Background
A. Legislative Requirements for
Rulemaking Proceeding
The Digital Millennium Copyright Act
(‘‘DMCA’’) was enacted to implement
certain provisions of the WIPO
Copyright Treaty and WIPO
Performances and Phonograms Treaty. It
established a wide range of rules that
govern not only copyright owners in the
marketplace for electronic commerce,
but also consumers, manufacturers,
distributors, libraries, educators, and
on–line service providers. It defined
whether consumers and businesses may
engage in certain conduct, or use certain
devices, in the course of transacting
electronic commerce.
Chapter 12 of title 17 of the United
States Code prohibits circumvention of
certain technological measures
employed by or on behalf of copyright
owners to protect their works (i.e.,
‘‘access controls’’). Specifically, Section
1201(a)(1)(A) provides, in part, that no
person shall circumvent a technological
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
measure that effectively controls access
to a work protected under this title. In
order to ensure that the public will have
continued ability to engage in
noninfringing uses of copyrighted
works, such as fair use, subparagraph
(B) limits this prohibition. It provides
that the prohibition against
circumvention shall not apply to
persons who are users of a copyrighted
work which is in a particular class of
works, if such persons are, or are likely
to be in the succeeding three–year
period, adversely affected by virtue of
such prohibition in their ability to make
noninfringing uses of that particular
class of works under this title as
determined in a rulemaking. The
proceeding is conducted by the Register
of Copyrights, who is to provide notice
of the rulemaking, seek comments from
the public, consult with the Assistant
Secretary for Communications and
Information of the Department of
Commerce, and recommend final
regulations to the Librarian of Congress.
The regulations, to be issued by the
Librarian of Congress, announce ‘‘any
class of copyrighted works for which the
Librarian has determined, pursuant to
the rulemaking conducted under
subparagraph (c), that noninfringing
uses by persons who are users of a
copyrighted work are, or are likely to be,
adversely affected, and the prohibition
contained in subparagraph (A) shall not
apply to such users with respect to such
class of works for the ensuing 3–year
period.’’ This is the fourth Section 1201
rulemaking.
B. Responsibilities of Register of
Copyrights and Librarian of Congress
The primary responsibility of the
Register and the Librarian in this
rulemaking proceeding was to assess
whether the implementation of access
control measures is diminishing the
ability of individuals to use copyrighted
works in ways that are not infringing
and to designate any classes of works
with respect to which users have been
adversely affected in their ability to
make noninfringing uses. Congress
intended that the Register solicit input
that would enable consideration of a
broad range of current or likely future
adverse impacts. The statute directs that
in conducting the rulemaking, the
Register and the Librarian shall
examine:
(1) The availability for use of
copyrighted works;
(2) The availability for use of works
for nonprofit archival, preservation, and
educational purposes;
(3) The impact that the prohibition on
the circumvention of technological
measures applied to copyrighted works
PO 00000
Frm 00028
Fmt 4700
Sfmt 4700
has on criticism, comment, news
reporting, teaching, scholarship, or
research;
(4) The effect of circumvention of
technological measures on the market
for or value of copyrighted works; and
(5) Such other factors as the Librarian
considers appropriate.
These factors to be considered in the
rulemaking process require the Register
and the Librarian to carefully balance
the availability of works for use, the
effect of the prohibition on particular
uses, and the effect of circumvention on
copyrighted works.
C. The Purpose and Focus of the
Rulemaking
1. Purpose of the Rulemaking
The task of this rulemaking is to
determine whether the availability and
use of access control measures has
already diminished or is about to
diminish the ability of the users of any
particular classes of copyrighted works
to engage in noninfringing uses of those
works similar or analogous to those that
the public had traditionally been able to
make prior to the enactment of the
DMCA. In examining the factors set
forth in Section 1201(a)(1)(C), the focus
is on whether the implementation of
technological protection measures has
had an adverse impact on the ability of
users to make lawful uses.
2. The Necessary Showing
Proponents of a class of works have
the burden of proof. In order to make a
prima facie case for designation of a
class of works, proponents must show
by a preponderance of the evidence that
there has been or is likely to be a
substantial adverse effect on
noninfringing uses by users of
copyrighted works. De minimis
problems, isolated harm or mere
inconveniences are insufficient to
provide the necessary showing.
Similarly, for proof of ‘‘likely’’ adverse
effects on noninfringing uses, a
proponent must prove by a
preponderance of the evidence that the
harm alleged is more likely than not; a
proponent may not rely on speculation
alone to sustain a prima facie case of
likely adverse effects on noninfringing
uses. It is also necessary to show a
causal nexus between the prohibition on
circumvention and the alleged harm.
Proposed classes are reviewed de
novo. The existence of a previously
designated class creates no presumption
for consideration of a new class, but
rather the proponent of such a class of
works must make a prima facie case in
each three–year period.
E:\FR\FM\27JYR1.SGM
27JYR1
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
3. Determination of ‘‘Class of Works’’
The starting point for any definition
of a ‘‘particular class’’ of works in this
rulemaking must be one of the
categories of works set forth in section
102 of the Copyright Act. However,
those categories are only a starting point
and a ‘‘class’’ will generally constitute
some subset of a section 102 category.
The determnation of the appropriate
scope of a ’’class of works’’;
recommended for exemption will also
take into account the likely adverse
effects on noninfringing uses and the
adverse effects that designation of the
class may have on the market for or
value of copyrighted works.
While starting with a section 102
category of works, or a subcategory
thereof, the description of a ‘‘particular
class’’of works ordinarily should be
further refined by reference to other
factors that assist in ensuring that the
scope of the class addresses the scope of
the harm to noninfringing uses. For
example, the class might be defined in
part by reference to the medium on
which the works are distributed, or even
to the access control measures applied
to them. The description of a class of
works may also be refined, in
appropriate cases, by reference to the
type of user who may take advantage of
the designation of the class of works or
by reference to the type of use of the
work that may be made pursuant to the
designation. The ‘‘class’’ must be
properly tailored not only to address the
harm demonstrated, but also to limit the
adverse consequences that may result
from the creation of an exempted class.
In every case, the contours of a ‘‘class’’
will depend on the unique factual
circumstances established in the
rulemaking record on a case–by–case
basis.
jdjones on DSK8KYBLC1PROD with RULES
D. Consultation with the Assistant
Secretary for Communications and
Information
Section 1201(a)(1)(C) requires the
Register of Copyrights to consult with
the Assistant Secretary for
Communications and Information of the
Department of Commerce (who is also
the Administrator of the National
Telecommunications and Information
Administration) and report and
comment on the views of the Assistant
Secretary (‘‘NTIA’’) when she makes her
recommendation to the Librarian of
Congress.
In addition to informal consultations
throughout the course of the rulemaking
proceeding, NTIA formally
communicated its views in letters to the
Register on November 4, 2009, and
April 16, 2010. NTIA’s views were
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
considered by the Register in forming
her recommendation. A discussion of
NTIA’s substantive analysis of
particular proposals is presented in the
relevant sections of the Register’s
recommendation.
II. Solicitation of Public Comments and
Hearings
On October 6, 2008, the Register
initiated this rulemaking proceeding
pursuant to Section 1201(a)(1)(C) with
publication of a Notice of Inquiry. The
NOI requested written comments from
all interested parties, including
representatives of copyright owners,
educational institutions, libraries and
archives, scholars, researchers, and
members of the public.
During the initial comment period
that ended on December 2, 2008, the
Copyright Office received nineteen
written comments proposing twenty–
five classes of works, all of which were
posted on the Office’s website. Because
some of the initial comments contained
similar or overlapping proposals, the
Copyright Office arranged related
classes into groups, and set forth and
summarized all proposed classes in a
Notice of Proposed Rulemaking
(‘‘NPRM’’) published on December 29,
2008. This NPRM did not present the
initial classes in the form of proposed
rule, but merely as ‘‘a starting point for
further consideration.’’
The NPRM asked interested parties to
submit comments providing support,
opposition, clarification, or correction
regarding the proposals, and to provide
factual and/or legal arguments in
support of their positions. The
Copyright Office received a total of
fifty–six responsive comments before
the comment period closed on February
2, 2009, all of which were posted on the
Copyright Office website.
Four days of public hearings were
conducted by the Register in May 2009
at Stanford University and the Library of
Congress. Thirty–seven witnesses,
representing proponents and opponents
of proposed classes of works, testified
on twenty–one proposed classes.
Following the hearings, the Copyright
Office sent follow–up questions to some
of the hearing witnesses, and responses
were received during the summer. The
entire record in this and the previous
section 1201(a)(1)(C) rulemakings are
available on the Office’s website, https://
www.copyright.gov/1201/.
On October 27, 2009, the Librarian of
Congress published in the Federal
Register a Notice of an interim rule,
extending the existing classes of works
exempted from the prohibition until the
conclusion of the current rulemaking
proceeding and the designation of any
PO 00000
Frm 00029
Fmt 4700
Sfmt 4700
43827
classes of works to be exempt from the
prohibition for the ensuing three–year
period by the Librarian of Congress.
III. The Designated Classes
A. Motion pictures on DVDs that are
lawfully made and acquired and that
are protected by the Content
Scrambling System when
circumvention is accomplished solely
in order to accomplish the
incorporation of short portions of
motion pictures into new works for the
purpose of criticism or comment, and
where the person engaging in
circumvention believes and has
reasonable grounds for believing that
circumvention is necessary to fulfill the
purpose of the use in the following
instances:
• Educational uses by college and
university professors and by college
and university film and media studies
students;
• Documentary filmmaking;
• Noncommercial videos.
DVDs protected by the Content
Scrambling System (CSS) have been an
issue in this rulemaking proceeding
since its inception in 2000. In the 2006
rulemaking proceeding, the Librarian
designated a class of ‘‘[a]udiovisual
works included in the educational
library of a college or university’s film
or media studies department, when
circumvention is accomplished for the
purpose of making compilations of
portions of those works for educational
use in the classroom by media studies
or film professors.’’
In the current rulemaking, educators
sought to renew and, in a number of
ways, to expand the existing class of
works designated in the last proceeding.
The proposed expansions of the class
involved extending the class to include
all of the motion pictures on CSS–
protected DVDs contained in a college
or university library (rather than just a
film or media studies department) and
to encompass classroom use by all
college and university professors and
students as well as elementary and
secondary school teachers and students.
Apart from educators, others sought
designation of similar classes of works
to address what they contended are
adverse impacts on their ability to
engage in noninfringing uses of
copyrighted works. Documentary
filmmakers argued that the prohibition
on circumvention adversely affects their
ability to use portions of motion
pictures in documentary films, many of
which would qualify as noninfringing
uses for the purposes of criticism or
comment. Creators of noncommercial
videos that incorporate portions of
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43828
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
motion pictures contained on CSS–
protected DVDs also alleged that the
prohibition on circumvention adversely
affected their ability to engage in
noninfringing criticism or comment.
Based on the record in this
proceeding, the Register determines that
CSS is a technological measure that
protects access to copyrighted motion
pictures. She also determined that a
substantial number of uses in the record
with respect to education, documentary
filmmaking, and noncommercial videos
qualify as noninfringing uses.
NTIA supports expansion of the
existing class of audiovisual works to
include all college and university level
instructors and students but does not
believe the record justifies an expansion
that would include elementary and
secondary school teachers and students.
NTIA also recommended limiting the
class to address the use of DVDs
included in the educational library or
departments of the academic
institutions. It also supported the
proposal to designate a class of works
for the benefit of documentary
filmmakers. Finally, it expressed general
support for the request to designate a
class that would permit extraction of
film clips for use in noncommercial
videos, but suggested a requirement that
the clips from the audiovisual work
must be for remix videos that are used
for social comment or criticism, or that
are used in transformative–type works
according to established fair use
principles.
Given that all of these proposed
classes at issue involved motion
pictures on CSS–protected DVDs, the
Register recommends that the Librarian
designate a single class addressing all of
these adversely affected uses of DVDs.
However, the Register concludes that
the record does not support all of the
proposed expansions of the existing
class of audiovisual works and that in
at least one respect, the record
supported a contraction of that class.
What the record does demonstrate is
that college and university educators,
college and university film and media
studies students, documentary
filmmakers, and creators of
noncommercial videos frequently make
and use short film clips from motion
pictures to engage in criticism or
commentary about those motion
pictures, and that in many cases it is
necessary to be able to make and
incorporate high–quality film clips in
order effectively to engage in such
criticism or commentary. In such cases,
it will be difficult or impossible to
engage in the noninfringing use without
circumventing CSS in order to make
high–quality copies of short portions of
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
the motion pictures. Because not all
uses by educators, documentary
filmmakers or makers of noncommerical
videos will be noninfringing or will
require such high–quality copies, the
class of works recommended by the
Register is not as extensive as what was
requested by some proponents, and the
class contains some limitations. First,
proponents for educators failed to
demonstrate that high–quality
resolution film clips are necessary for
K–12 teachers and students, or for
college and university students other
than film and media studies students.
Because other means, such as the use of
screen capture software, exist that
permit the making of lower–quality film
clips without circumventing access
controls, the Register finds no
justification in the record for expanding
the class of works to include such
persons as express beneficiaries of the
designation of this class of works.
Second, the circumvention of access
controls must be accomplished solely in
order to enable incorporation of short
portions of motion pictures into new
works for purposes of criticism of
comment. The justification offered by
proponents for designating a class of
audiovisual works, and a key element of
the Register’s conclusion that the
intended uses will frequently be
noninfringing fair uses, was that the
uses that justify designation of the class
were for purposes of criticism and
commentary, which are classic ‘‘fair use’’
purposes. Moreover, all of the evidence
in the rulemaking demonstrating
noninfringing uses involved the use of
short portions of motion pictures. While
the Register is persuaded that it would
be difficult and imprudent to quantify
the precise contours of what constitutes
a ‘‘short portion,’’ there was no evidence
in the record to support the conclusion
that anything more than incorporating
relatively short portions of motion
pictures into a new work for purposes
of criticism or commentary would be a
fair use. Similarly, in order to meet the
requirements of the designated class of
works, a new work must be created,
whether that work is a compilation of
clips for use in the classroom, or a
documentary or video incorporating a
clip or clips from a copyrighted motion
picture.
The final requirement of the
recommended class is that the person
engaging in the circumvention must
reasonably believe that the
circumvention is necessary in order to
fulfill the purpose of the use – i.e., the
noninfringing criticism or commentary.
Because alternatives to circumvention
such as video capture may suffice in
many, and perhaps the vast majority of
PO 00000
Frm 00030
Fmt 4700
Sfmt 4700
situations, users must make a reasonable
determination that heightened quality is
necessary to achieve the desired goal.
The justification for designating this
class of works is that some criticism
and/or commentary requires the use of
high–quality portions of motion pictures
in order to adequately present the
speech–related purpose of the use.
Where alternatives to circumvention can
be used to achieve the noninfringing
purpose, such non–circumventing
alternatives should be used. Thus, this
limitation seeks to avoid an overly
broad class of works given the limited
number of uses that may require
circumvention to achieve the intended
noninfringing end.
The class has also been limited to
include only motion pictures rather
than all audiovisual works. Because
there was no evidence presented that
addressed any audiovisual works other
than motion pictures, there was no basis
for including the somewhat broader
class of audiovisual works (which
includes not only motion pictures, but
also works such as video games and
slide presentations).
B. Computer programs that enable
wireless telephone handsets to execute
software applications, where
circumvention is accomplished for the
sole purpose of enabling
interoperability of such applications,
when they have been lawfully obtained,
with computer programs on the
telephone handset.
The Electronic Frontier Foundation
(EFF) proposed a class that would allow
circumvention of the technological
measures contained on certain wireless
phone handsets (known as
‘‘smartphones’’) that prevent third–party
software applications from being
installed and run on such phones. This
circumvention activity is colloquially
referred to as ‘‘jailbreaking’’ a phone.
The factual record with respect to this
proposed class focused primarily on
Apple’s iPhone, although there are
allegations in the record involving other
mobile phone manufacturers as well.
EFF asserted, and Apple’s testimony
confirmed, that any software or
application to be used on the iPhone
must be validated with the firmware
that controls the iPhone’s operation.
This validation process is intended to
make it impossible for an owner of an
iPhone to install and use third–party
applications on the iPhone that have not
been approved for distribution through
Apple’s iTunes App Store.
EFF argued that jailbreaking is a
noninfringing activity for three reasons.
First, it alleged that at least in some
cases, jailbreaking can be done within
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
the scope of what is authorized under
the license Apple grants to every iPhone
user. It stated that ‘‘[t]o the extent a
jailbreaking technique does not modify
any of the individual software programs
that comprise the iPhone firmware
collection, but instead simply adds
additional software components to the
collection, the practice may not exceed
the scope of the license to ‘use the
iPhone software’ or constitute a
‘modification’ of any Apple software
components, any more than the addition
of a new printer driver to a computer
constitutes a ‘modification’ of the
operating system already installed on
the computer.’’
Second, EFF asserted that ‘‘to the
extent a jailbreak technique requires the
reproduction or adaptation of existing
firmware beyond the scope of any
license or other authorization by the
copyright owner, it would fall within
the ambit of 17 U.S.C. § 1l7(a).’’ EFF
contended that the iPhone owner is also
the owner of the copy of the firmware
on the iPhone and that jailbreaking falls
within the owner’s privilege ‘‘to adapt
those copies to add new capabilities, so
long as the changes do not ‘‘harm the
interests of the copyright proprietor.’’
Finally, EFF contended that in any
event, jailbreaking constitutes fair use of
the firmware because jailbreaking is a
purely noncommercial, private use of
computer software, a largely functional
work that operates the phone, and that
the phone owner must reuse the vast
majority of the original firmware in
order for the phone to operate. Because
the phone owner is simply modifying
the firmware for her own use on the
phone, there is no harm to the market
for the firmware.
Apple responded that jailbreaking by
purchasers of the iPhone is a violation
of the prohibition against circumvention
of access controls. It stated that its
validation system is necessary to protect
consumers and Apple from harm. Apple
further contended that modifying
Apple’s operating system constituted
the creation of an infringing derivative
work. Specifically, Apple argued that
because purchasers of an iPhone are
licensees, not owners, of the computer
programs contained on the iPhone,
Section 117 of the Copyright Act is
inapplicable as an exemption to the
adaptation right. Apple further argued
that the fair use defense codified in
§ 107 would not apply to jailbreaking
activity under the statutory factors.
Based on the record, the Register has
determined that the encryption and
authentication processes on the
iPhone’s computer programs are
technological measures that control
access to the copyrighted work (the
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
firmware) for purposes of § 1201(a)(1).
Moreover, the Register finds that the
evidence supports the contention that a
technological protection measure is
adversely affecting adding applications
to the iPhone. The critical question is
whether jailbreaking an iPhone in order
to add applications to the phone
constitutes a noninfringing use.
The Register does not find that the
contract between Apple and purchasers
of the iPhone authorize modification of
the iPhone. Moreover, the Register
cannot clearly determine whether the
various versions of the iPhone contracts
with consumers constituted a sale or
license of a copy of the computer
programs contained on the iPhone. The
contractual language is unclear with
respect to particular copies of the
computer programs. Although Apple
retains ownership of the computer
programs, the contracts also expressly
grant users ownership of the device.
Since the ‘‘copy’’ of the computer
program is fixed in hardware of the
device, it is unclear what ownership
status is to be given to the particular
copy of the computer program
contained in the device. Apple
unquestionably has retained ownership
of the intangible works, but the
ownership of the particular copies of
those works is unclear.
Moreover, the state of the law with
respect to the determination of
ownership is in a state of flux in the
courts. Both proponents and opponents
cited case law in support of their
respective positions, but the Register
finds it impossible to determine how a
court would resolve the issue of
ownership on the facts presented here.
While both parties agreed that the
Second Circuit’s decision in Krause v.
Titleserv, 402 F.3d 119 (2d Cir. 2005) is
‘‘good law,’’ that case dealt with a
situation that is distinguishable in many
respects from the present situation. The
Register finds that the Krause case does
not provide clear guidance as to how
resolve the current issue.
However, the Register does find that
the proponent’s fair use argument is
compelling and consistent with the
congressional interest in
interoperability. The four fair use factors
tend to weigh in favor of a finding of fair
use.
Under the first factor in Section 107,
it appears fair to say that the purpose
and character of the modification of the
operating system is to engage in a
private, noncommercial use intended to
add functionality to a device owned by
the person making the modification,
albeit beyond what Apple has
determined to be acceptable. The user is
not engaging in any commercial
PO 00000
Frm 00031
Fmt 4700
Sfmt 4700
43829
exploitation of the firmware, at least not
when the jailbreaking is done for the
user’s own private use of the device.
The fact that the person engaging in
jailbreaking is doing so in order to use
Apple’s firmware on the device that it
was designed to operate, which the
jailbreaking user owns, and to use it for
precisely the purpose for which it was
designed (but for the fact that it has
been modified to run applications not
approved by Apple) favors a finding that
the purpose and character of the use is
innocuous at worst and beneficial at
best. Apple’s objections to the
installation and use of ‘‘unapproved’’
applications appears to have nothing to
do with its interests as the owner of
copyrights in the computer programs
embodied in the iPhone, and running
the unapproved applications has no
adverse effect on those interests. Rather,
Apple’s objections relate to its interests
as a manufacturer and distributor of a
device, the iPhone.
Moreover, Congress has determined
that reverse engineering for the purpose
of making computer programs
interoperable is desirable when certain
conditions are met, and has crafted a
specific exemption from Section
1201(a)’s prohibition on circumvention
in such cases. While an iPhone owner
who ‘‘jailbreaks’’ does not fall within the
four corners of the statutory exemption
in Section 1201(f), the fact that he or she
is engaging in jailbreaking in order to
make the iPhone’s firmware
interoperable with an application
specially created for the iPhone suggests
that the purpose and character of the
use are favored.
Turning to the second fair use factor,
it is customary for operating systems –
functional works – to enable third party
programs to interoperate with them. It
does not and should not infringe any of
the exclusive rights of the copyright
owner to run an application program on
a computer over the objections of the
owner of the copyright in the
computer’s operating system. Thus, if
Apple sought to restrict the computer
programs that could be run on its
computers, there would be no basis for
copyright law to assist Apple in
protecting its restrictive business model.
The second factor decisively favors a
finding of fair use.
Turning to the third factor, ‘‘the
amount and substantiality of the portion
used in relation to the copyrighted work
as a whole,’’ EFF admitted that because
the Apple firmware is necessary in
order to operate the iPhone, it is
necessary for individuals who jailbreak
their phones to reuse the vast majority
of the original firmware. However, the
amount of the copyrighted work
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43830
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
modified in a typical jailbreaking
scenario is fewer than 50 bytes of code
out of more than 8 million bytes, or
approximately 1/160,000 of the
copyrighted work as a whole. Where the
alleged infringement consists of the
making of an unauthorized derivative
work, and the only modifications are so
de minimis, the fact that iPhone users
are using almost the entire iPhone
firmware for the purpose for which it
was provided to them by Apple
undermines the significance of this
factor. While the third factor arguably
disfavors a fair use finding, the weight
to be given to it under the circumstances
is slight.
Addressing the fourth factor, ‘‘the
effect of the use upon the potential
market for or value of the copyrighted
work,’’ EFF asserted that the firmware
has no independent economic value,
pointing out that the iPhone firmware is
not sold separately, but is simply
included when one purchases an
iPhone. EFF also argued that the ability
to lawfully jailbreak a phone will
increase, not decrease, overall sales of
the phones because users will know that
by jailbreaking, they can ‘‘take advantage
of a wider array of third party
applications.
Apple responded that unauthorized
uses diminish the value of the
copyrighted works to Apple. However,
Apple is not concerned that the practice
of jailbreaking will displace sales of its
firmware or of iPhones; indeed, since
one cannot engage in that practice
unless one has acquired an iPhone, it
would be difficult to make that
argument. Rather, the harm that Apple
fears is harm to its reputation. Apple is
concerned that jailbreaking will breach
the integrity of the iPhone’s
‘‘ecosystem.’’ The Register concludes
that such alleged adverse effects are not
in the nature of the harm that the fourth
fair use factor is intended to address.
NTIA does not support designating
the proposed class. While
acknowledging that permitting iPhone
jailbreaking could facilitate innovation,
better serve customers, and encourage
the market to utilize open platforms,
NTIA believes ‘‘it might just as likely
deter innovation by not allowing the
developer to recoup its development
costs and to be rewarded for its
innovation.’’ NTIA also believes that the
proponents’ ‘‘public policy’’ arguments
should properly be considered by expert
regulatory agencies, the Department of
Justice, and the Congress. It concludes
that the ‘‘Register ought only to consider
recommending the proposed class if she
concludes that the access control
measure would be a bar to actions that
the above bodies might take in response
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
to policy judgments made at those
agencies.
The Register appreciates that many
regulatory and policy issues pertaining
to jailbreaking and smartphones fall
within the competence of other
agencies, and the Register has no desire
to interfere with those agencies’
jurisdiction. However, the only question
before the Register and the Librarian is
whether Section 1201(a)(1)’s prohibition
on circumvention is adversely affecting
the ability of users of smartphones from
engaging in noninfringing uses of the
firmware on their devices. No other
agency has the power to limit the
application of the prohibition on
circumvention in this (or any other)
context. Any future action by a federal
agency to permit jailbreaking will be
futile without an exemption from
liability under Section 1201(a)(1), but if
a class is not designated in this
rulemaking, all that it will mean is that
Section 1201 cannot be used to prevent
jailbreaking, without prejudice to any
other legal or regulatory authority that
might limit or prohibit jailbreaking.
On balance, the Register concludes
that when one jailbreaks a smartphone
in order to make the operating system
on that phone interoperable with an
independently created application that
has not been approved by the maker of
the smartphone or the maker of its
operating system, the modifications that
are made purely for the purpose of such
interoperability are fair uses. Case law
and Congressional enactments reflect a
judgment that interoperability is
favored. The Register also finds that
designating a class of works that would
permit jailbreaking for purposes of
interoperability will not adversely affect
the market for or value of the
copyrighted works to the copyright
owner.
Accordingly, the Register
recommends that the Librarian
designate the following class of works:
PO 00000
Computer programs that enable wireless
communication handsets to execute
software applications, where
circumvention is accomplished for the
sole purpose of enabling interoperability
of such applications, when they have
been lawfully obtained, with computer
programs on the telephone handset.
Frm 00032
Fmt 4700
Sfmt 4700
C. Computer programs, in the form of
firmware or software, that enable used
wireless telephone handsets to connect
to a wireless telecommunications
network, when circumvention is
initiated by the owner of the copy of the
computer program solely in order to
connect to a wireless
telecommunications network and
access to the network is authorized by
the operator of the network.
In 2006, the Librarian designated a
class of ‘‘Computer programs in the form
of firmware that enable wireless
telephone handsets to connect to a
wireless telephone communication
network, when circumvention is
accomplished for the sole purpose of
lawfully connecting to a wireless
telephone communication network,’’ in
order to permit the circumvention of
access controls that prevent the owner
of a cellphone from switching service on
that cellphone to another wireless
communication network. The access
controls in question are embedded in
the mobile phone’s firmware or software
and prevent the mobile phone owner
from gaining access to the settings that
connect the mobile phone to a network
(e.g., Verizon’s) other than the original
network (e.g., AT&T’s). Beneficiaries of
that designation have now requested
that the Librarian again designate a
similar class of works. Representatives
of wireless communication networks
have opposed the request.
As she did three years ago, the
Register recognizes that the requests fall
within the zone of interest subject to
this rulemaking. That is, circumventing
a mobile phone lock, without the
authority of the copyright owner, to gain
access to the protected work (i.e., the
firmware) is likely actionable under
Section 1201(a)(1) of the Act. Further, a
wireless carrier who is harmed by the
circumvention of the software lock may
bring an action for violation of Section
1201(a)(1) against anyone who
circumvents such a technological
protection measure.
The proponents of this class have
presented a prima facie case that the
prohibition on circumvention has had
an adverse effect on noninfringing uses
of firmware on wireless telephone
handsets. Proponents have shown that
mobile phone locks prevent consumers
from legally accessing alternative
wireless networks with the phone of
their choice. This is the same type of
activity that was at issue when the
existing class of works was being
considered in 2006.
The wireless networks asserted that
by using a cellphone on another
network, an act that is not authorized
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
under their contracts, the customers
infringe the exclusive right to reproduce
copies of the computer software,
because use of the mobile phones
necessarily involves the making of
copies in the random access memory of
the mobile phone. Moreover, they
asserted that the alteration of the
computer programs in order enable the
mobile phones to connect to another
network constituted the unlawful
making of derivative works, in violation
of the copyright owner’s exclusive right
to prepare derivative works.
Proponents of the class asserted that
the owners of mobile phones are also
the owners of the copies of the
computer programs on those phones
and that as owners they are entitled to
exercise their privileges under Section
117 of the Copyright Act, which gives
the owner of a copy of a computer
program the privilege to make or
authorize the making of another copy or
adaptation of that computer program
under certain circumstances. The
wireless networks responded that their
contracts with their customers restrict
the uses of the customers’ mobile
phones and retain ownership of the
copies of the computer programs that
are loaded onto the mobile phones and
enable the phones to operate. They also
asserted those contractual restrictions
make the networks – and not the
customers – the owners of the copies of
the computer programs, and therefore
the privilege under Section 117 to make
copies and adaptations of computer
programs does not apply because that
privilege is enjoyed only by the owner
of the copy of the computer program.
They also argued that the privilege does
not extend to the customers’ conduct
because the making of a new copy or
adaptation in order to use the mobile
phone on a network other than the
original network is not, as the statute
requires, ‘‘an essential step in the
utilization of the computer program in
conjunction with a machine.‘‘
The Register has reviewed the
appropriate case law with respect to
who is the ‘‘owner’’ of a copy of a
computer program for purposes of
Section 117 when a license or
agreement imposes restrictions on the
use of the computer program and has
concluded that the state of the law is
unclear. The Register cannot determine
whether most mobile phone owners are
also the owners of the copies of the
computer programs on their mobile
phones. However, based on the record
in this proceeding, the Register finds
that the proponents of the class have
made a prima facie case that mobile
phone owners are the owners of those
copies. While the wireless networks
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
have made a case that many mobile
phone owners may not own the
computer program copies because the
wireless network’s contract with the
consumer retains ownership of the
copies, they have not presented
evidence that this is always the case
even if their interpretation of the law
governing ownership is correct. The
record therefore leads to the conclusion
that a substantial portion of mobile
phone owners also own the copies of
the software on their phones.
The Register also concludes that when
the owner of a mobile makes RAM
copies of the software in order to
operate the phone – even if she is
operating it on another network – she is
making a noninfringing use of the
software under Section 117 because the
making of that copy is an essential step
in the utilization of that software in
conjunction with a machine.
Similarly, the making of
modifications in the computer program
in order to enable the mobile phone to
operate on another network would be a
noninfringing act under Section 117. As
a general rule, anyone who wishes to
switch her mobile phone from one
network to another must alter some
information embedded in the device.
However, in a substantial number of
cases those alterations do not appear to
implicate Section 117 because the
elimination and insertion of codes or
digits, or completely reflashing a phone,
cannot be considered an infringement of
the computer program controlling the
device. When specific codes or digits
are altered to identify the new network
to which the phone will connect, those
minor alterations of data also do not
implicate any of the exclusive rights of
copyright owners. And complete
reflashing does not even constitute
circumvention of an access control
because it actually deletes the copy of
the entire work that had been protected
by the access control, thereby
permanently denying access to that
work.
In those cases where more substantial
changes must be made to the computer
program in order to enable use of the
mobile phone on another network, those
changes might implicate the exclusive
right to prepare derivative works.
However, those changes would be
privileged under Section 117, which
permits the making of ‘‘a new copy or
adaptation’’ that is created as an
essential step in the utilization of the
computer program in conjunction with
a machine.
Section 1201(a)(1)(C) factors. As was
the case in 2006, the Register finds that
the four factors enumerated in Section
1201(a)(1)(C)(i)–(iv) do not weigh either
PO 00000
Frm 00033
Fmt 4700
Sfmt 4700
43831
in favor of or against designation of the
proposed class of works. Moreover,
because it appears that the opposition to
designating the proposed class is based
primarily on the desires of wireless
carriers to preserve an existing business
model that has little if anything to do
with protecting works of authorship, it
is appropriate to address the additional
factor (‘‘such other factors as the
Librarian considers appropriate’’) set
forth in Section 1201(a)(1)(C)(v). It
seems clear that the primary purpose of
the locks is to keep consumers bound to
their existing networks, rather than to
protect the rights of copyright owners in
their capacity as copyright owners. This
observation is not a criticism of the
mobile phone industry’s business plans
and practices, which may well be
justified for reasons having nothing to
do with copyright law and policy, but
simply a recognition of existing
circumstances. Because there appear to
be no copyright–based reasons why
circumvention under these
circumstances should not be permitted,
the Register recommends that the
Librarian designate a class of works
similar to the class designated in 2006.
The Register notes that the 2006 class,
and the new one designated herein, are
both narrow, apply only to claims under
Section 1201(a)(1), and do not establish
a general federal policy of ensuring that
customers have the freedom to switch
wireless communications service
providers. The designated classes, both
new and old, simply reflect a
conclusion that unlocking a mobile
phone to be used on another wireless
network does not ordinarily constitute
copyright infringement and that Section
1201(a)(1), a statute intended to protect
copyright interests, should not be used
to prevent mobile phone owners from
engaging in such noninfringing activity.
NTIA supported designation of a class
similar to the class designated in 2006,
but proposed that while non–profit
entities should be permitted to take
advantage of the exemption, commercial
users should not. The Register’s
recommendation, in contrast, would
permit some commercial activity, so
long as it (1) involves only used
handsets, (2) is done by the owner of the
copy of the computer program, and (3)
is done ‘‘solely in order to access such
a wireless telecommunications network
and access to the network is authorized
by the operator of the network.’’ The
Register believes that these limitations
ensure that the designation of this class
will not benefit those who engage in the
type of commercial activity that is at the
heart of the objections of opponents of
the proposed class: the ‘‘bulk resellers’’
who purchase new mobile phone
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43832
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
handsets at subsidized prices and,
without actually using them on the
networks of the carriers who market
those handsets, resell them for profit.
The type of commercial activity that
would be permitted would be the resale
of used handsets after the owners of the
handsets have used them and then given
or sold them to somebody else, who
then resells them just as a used
bookstore sells used books. The Register
acknowledges that NTIA’s general view
that the class should not extend to any
commercial activity is inconsistent with
aspects of the Register’s
recommendation, but believes that to
the extent her recommendation goes
beyond what NTIA was willing to
endorse, it does so in a way that, in
NTIA’s words, ‘‘prevents unlawful use
by those that would misuse the
exemption for commercial purposes.’’
However, the applicability of the
proposed class to commercial recyclers,
such as the ones who had proposed the
original class of works, is limited. When
the commercial recycler has made a
derivative work that is within Section
117’s privilege for making ‘‘adaptations,’’
the recycler is subject to a significant
limitation contained within Section 117:
such adaptations may be transferred
only with the authorization of the
copyright owner. Thus, a recycler who
prepares such an adaptation may not
transfer ownership of the copy of the
adapted computer program to anybody
else without the authorization of the
copyright owner. On the other hand, a
recycler who has not prepared an
adaptation is free to resell the mobile
phone along with the copy of the
computer program contained within it.
The new class is also cabined by
existing law in two important respects.
First, as with any regulation under
Section 1201(a)(1)(C) and (D), the
designation of this class offers no safe
harbor from liability under Section
1201(a)(2) which strictly prohibits an
entity from offering a circumvention
service. Second, a wireless carrier’s
‘‘Terms of Purchase’’ and ‘‘Terms of
Service’’, which are binding contracts,
still impose use restrictions on
consumers notwithstanding the
designation of this class. However, the
wireless carrier must seek a remedy by
asserting a claim of breach of contract,
and not a claim under Section
1201(a)(1).
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
D. Video games accessible on personal
computers and protected by
technological protection measures that
control access to lawfully obtained
works, when circumvention is
accomplished solely for the purpose of
good faith testing for, investigating, or
correcting security flaws or
vulnerabilities, if:
•The information derived from the
security testing is used primarily to
promote the security of the owner or
operator of a computer, computer
system, or computer network; and
•The information derived from the
security testing is used or maintained in
a manner that does not facilitate
copyright infringement or a violation of
applicable law.
Professor J. Alex Halderman proposed
two classes of works relating to
investigating and correcting security
flaws or vulnerabilities created or
exploited by technological measures
protecting certain kinds of works. The
Register concludes that Halderman has
made the case for a class pertaining to
video games, but has not made the case
for a broader class pertaining to literary
works, sound recordings and
audiovisual works.
In each case, Halderman qualified the
scope of the proposed class by
restricting it to (1) lawfully obtained
works protected by access control
measures that create or exploit security
flaws or vulnerabilities that compromise
the security of personal computers, and
(2) cases where circumvention is
accomplished solely for the purpose of
good faith testing, investigating, or
correcting such security flaws or
vulnerabilities.
In the current proceeding, Halderman
did not present any evidence that the
prohibition on circumvention is
adversely affecting or is likely, in the
next three years, to adversely affect the
ability to engage in noninfringing uses
of sound recordings or audiovisual
works, or of literary works except to the
extent that video games may be
considered, in part, to constitute
audiovisual works associated with such
sound recordings. There is no
information in the record that would
justify again exempting the class
designated three years ago.
However, Halderman did present
evidence and legal analysis in support
of a class of works limited to video
games. Under Section 102(a) of the
Copyright Act, video games are ‘‘hybrid’’
in that they fall within two statutory
classes of works. Video games typically
are, in part, computer programs, which
are a subset of the statutory category of
‘‘literary works.’’ The evidence related to
PO 00000
Frm 00034
Fmt 4700
Sfmt 4700
two types of access controls applied to
video games: Macrovision’s SafeDisc
software and Sony’s SecuRom software.
Halderman asserted that the measures
constitute access controls because, in
both cases, the measures authenticate
discs and enforce access policies.
The alleged underlying noninfringing
use involved is two–fold. First,
purchasers of video games (including
researchers) are engaged in
noninfringing use when they install,
access, and play authorized copies of
such video games while further seeking
to protect the security of their
computers. Second, researchers in
lawful possession of copies of games are
engaged in noninfringing uses when
they seek solely to research and
investigate whether a video game, or the
technological measure protecting it,
creates security vulnerabilities or flaws.
Professor Halderman asserted that such
good faith research that does not cause
or promote infringement generally
constitutes fair use.
Halderman alleged that SecuROM
may create security flaws or
vulnerabilities. He referred to a number
of articles and class action lawsuits
suggesting that SecuROM may contain
flaws or cause vulnerabilities. He
further stated that a single definitive
scientific study might quell the ‘‘panic,
protests, and litigation’’ to ‘‘what may
turn out to be nonexistent or easily
reparable faults.’’
Halderman also alleged that harm is
caused by Macrovision’s SafeDisc. He
alleged that SafeDisc was pre–installed
on ‘‘nearly every copy of the Microsoft
Windows XP and Windows 2003
operating systems, [and that] the
vulnerability affected nearly one billion
PCs, two thousand times more than the
[Sony] rootkit,’’‘‘ the security
vulnerability that serviced as the factual
basis for designating a class in the last
rulemaking. He claimed that the
security flaw created by SafeDisc was
much more dangerous than the Sony
rootkit flaw involved in the previous
rulemaking that concluded in 2006,
because this flaw allowed attackers to
execute unrestricted ‘kernel–level’ code
and read or write to any area of the hard
disk or memory of the PC, thus
facilitating the complete compromise of
the security of the PC.
Opponents raised three principal
arguments against Halderman’s
proposal. First, they argued that he
provided little concrete or documented
evidence that any security flaws or
vulnerabilities associated with access
control mechanisms used in connection
with video games exist. Second, they
argued that there is no evidence that
research has been chilled, pointing to
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
what they called a robust ecosystem
within which security experts routinely
identify such flaws, collaborate on
remedies, and disseminate information
to alert computer users of the problems
and them to solutions. Third, they
argued that Professor Halderman failed
to establish that the conduct at issue is
prohibited by Section 1201(a)(1), since a
statutory exemption (in particular, 17
U.S.C. 1201(j) might apply to the
security research.
NTIA has advised the Register that he
believes the record supports designating
the requested class relating to video
games and other works accessible on
personal computers. NTIA believed that
the proponents have ‘‘persuasively
argued that without a research
exemption, research into all current and
future vulnerabilities will be and is
chilled now,’’ and concurred with the
Librarian’s conclusion in 2006 that the
research may not be covered completely
by the existing statutory exemptions.
NTIA further believes that although the
Sony Rootkit vulnerability no longer
exists, ‘‘it seems to be a certainty that
new vulnerabilities will emerge in the
next three years.’’
Overall, the Register has concluded
that the factors set forth in 17 U.S.C. 107
tend to strongly support a finding that
such good faith research constitutes fair
use. The socially productive purpose of
investigating computer security and
informing the public do not involve use
of the creative aspects of the work and
are unlikely to have an adverse effect on
the market for or value of the
copyrighted work itself. The proponents
established an underlying noninfringing
use.
The next question is whether the
prohibition is causing an adverse effect
on such noninfringing uses. The record
is essentially limited to SecuRom and
SafeDisc. The evidence relating to
SecuRom tends to be highly speculative,
but Professor Halderman asserted that
‘‘this situation has been crying out for an
investigation by reputable security
researchers in order to rigorously
determine the nature of the problem that
this system cause[s], and dispel this
uncertainty about exactly what’s going
on.’’ He believed that the prohibition on
circumvention is at least in part to
blame for the lack of rigorous,
independent analysis.
In contrast to SecuROM, SafeDisc has
created a verifiable security
vulnerability on a large number of
computers. Opponents of the proposed
class did not dispute that SafeDisc
created a security vulnerability, but they
argued that the security flaw was
patched by Microsoft in 2007, without
the need of an exemption. However,
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
SafeDisc was pre–loaded on nearly
every copy of Microsoft’s Windows XP
and Windows 2003 operating systems
and was on the market for over six years
before a security researcher discovered
malware exploiting the security. The
vulnerability had the capacity to affect
nearly one billion PCs.
The record supports the conclusion
that since the 2006 rulemaking,
substantial vulnerabilities have existed
with respect to video games – certainly
with respect to SafeDisc and possibly
with respect to SecuROM. Within the
same class of works, security
researchers have proposed investigation
of unconfirmed allegations of security
vulnerabilities on another technological
protection measure (SecureROM) that
protects access, but have expressed
unwillingness to do so without clear
legal authority. Aggregating the
evidentiary record, the proponents have
shown that they need to be able to fix
flaws that are identified in this class of
works and they need to be able to
investigate other alleged security
vulnerabilities in this class.
Opponents argued that there may be
no need to designate a class in this
proceeding because circumvention may
already be excused pursuant to Section
1201(j), which provides an exemption
for security testing. However, the
Register has concluded, as she did three
years ago, that it is unclear whether
Section 1201(j) applies in cases where
the person engaging in security testing
is not seeking to gain access to, in the
words of Section 1201(j), ‘‘a computer,
computer system, or computer
network.’’ Therefore, it is appropriate to
designate a class of works in this
proceeding.
Section 1201(j) does, however,
influence both the decision to
recommend designation of a class and
the decision on how to fashion the class.
Section 1201(j) is evidence of Congress’s
general concern to permit
circumvention under appropriate
circumstances for purposes of security
testing, and it also is evidence of the
conditions Congress believes should be
imposed on those who take advantage of
an exemption for security testing.
Accordingly the Register recommends
that the Librarian designate a class of
video games protected by access
controls, when circumvention is done
for the purpose of good faith testing for,
investigating, or correcting security
flaws or vulnerabilities. Further
refinements to the class include a
requirement that the information
derived from the testing be used
primarily to promote the security of the
owner or operator of a computer,
computer system, or computer network;
PO 00000
Frm 00035
Fmt 4700
Sfmt 4700
43833
and a requirement that that information
be used or maintained in a manner that
does not facilitate copyright
infringement or a violation of applicable
law.
E. Computer programs protected by
dongles that prevent access due to
malfunction or damage and which are
obsolete. A dongle shall be considered
obsolete if it is no longer manufactured
or if a replacement or repair is no
longer reasonably available in the
commercial marketplace.
Three years ago, the Librarian
designated the above–referenced class of
works, which is similar to classes of
works designated in each of the
previous rulemakings. In the current
proceeding the proponent of that class,
Joseph V. Montoro, Jr., on behalf of
Spectrum Software, Inc., has proposed
an expanded class of works related to
dongles. Dongles are a type of hardware
that attach to either the printer port or
the USB port of a computer in order to
make secured software function.
Montoro stated that dongles are sold
along with certain types of software and
are necessary for the user to access that
software on a computer. He further
explained that in order for the dongle to
operate properly, the operating system
must support the hardware and the
required device driver must be installed.
Montoro submitted that there are four
situations where an exemption is
necessary to rectify actual harm: (1)
when dongles become obsolete; (2)
when dongles fail; (3) where there are
incompatibilities between the dongle
and the operating system, and (4) where
there are incompatibilities between the
dongle and certain hardware. Montoro
had stressed that his proposal is as
much about the computer ecosystem as
it is about dongles, in particular. He said
that it is important to realize that the
dongle, the operating system software
and the computer hardware work in
tandem and that the proposed class
necessarily covers all of these parts.
Representatives of the computer
software industry stated that they do not
oppose renewing the existing class of
works, but object to expanding it
beyond its current terms.
As in 2006, the Register finds that the
case has been made for designation of a
class of works protected by dongles.
Montoro has effectively met his burden
of proof for a class relating to dongles
that are malfunctioning or damaged and
that are obsolete, a point on which there
is no disagreement in the record. When
the dongle no longer functions and is
obsolete, there is a substantial adverse
effect on noninfringing uses because
there is no other means to access the
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43834
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
lawfully acquired software. When a
dongle malfunctions or becomes
obsolete, a person lawfully entitled to
access the software should be able to
rely on self–help if remedial measures
are not reasonably available in the
commercial marketplace. Moreover, the
record reveals no evidence of harm to
the market for, or value of, copyrighted
works protected by dongles since the
designation of the original class of
works in 2000.
The class, however, should not
include cases where a replacement
dongle is reasonably available or can be
easily repaired. Some copyright owners
legitimately use dongles to control
access to a computer program by
unauthorized users and are entitled to
the full benefit of the prohibition as long
as reasonable accommodations are
offered for malfunctioning or damaged
dongles. Montoro has not demonstrated
that the standard previously applied –
reasonably available in the marketplace
– is insufficient to meet the needs of
users of copyrighted works whose
dongles malfunction or are damaged.
Montoro also argues that the current
class should be expanded to reach
situations involving incompatibility
between the dongle and a new or
upgraded version of an operating
system. The Register finds that he has
failed to submit cogent evidence to
support an expanded class in this
context. A sufficient record would
require more detail about the precise
cause of the problems, the scope of the
problem, and the noninfringing means
available to resolve the problem.
The evidence presented in the record
also does not support Montoro’s request
to expand the class in relation to
obsolete hardware, specifically parallel
ports on computers. While it appears to
be the case that parallel ports may be
obsolescent, there is insufficient
evidence in the record to support the
conclusion that parallel ports are
currently, or in the next three years will
be, obsolete. In order to make a case for
an expanded class in relation to obsolete
hardware, Montoro would have to
demonstrate that the hardware is, or is
likely to be, obsolete in the next three
year period (either as a pre–installed
item or as an optional configuration),
that the unavailability of this obsolete
hardware would adversely affect
noninfringing uses, and that copyright
owners are not meeting the legitimate
needs of existing users.
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
IV. Other Classes Considered, but Not
Recommended
A. Subscription based services that
offer DRM–protected streaming video
where the provider has only made
available players for a limited number
of platforms, effectively creating an
access control that requires a specific
operating system version and/or set of
hardware to view purchased material;
and Motion pictures protected by anti–
access measures, such that access to the
motion picture content requires use of
a certain platform.
Two proposals sought designation of
classes of works that would allow
circumvention of technological
protection measures in order to provide
access to motion pictures on platforms
other than those authorized by content
providers or their licensees.
Megan Carney proposed a class of
works in order to allow circumvention
of DRM–protected streaming videos
offered by subscription based services,
where the provider has made players
available only for a limited number of
platforms. She argued that this
restriction of viewing options effectively
constitutes an access control by
requiring a specific operating system
version and/or set of hardware to view
purchased material. She sought to use
Netflix’s ‘‘Watch Instantly’’ streaming
video feature, which installs digital
rights management and runs only on
certain platforms of computer software
and hardware. ‘‘Watch Instantly’’ is
included, at no charge, in the monthly
Netflix membership, but Carney said
that she is unable to use it because she
does not own a computer that operates
on a compatible platform (PCs running
Windows or Apple computers with Intel
chips). Carney proposed that the
Librarian designate a class or works in
order to allow a user in her situation to
create a separate program to circumvent
the DRM on the streaming service
system in order to view streaming video
content made available by Netflix.
Another proponent, Mark Rizik,
proposed a class of works to allow the
circumvention of motion pictures on
DVDs protected by the CSS access
control system, which requires the use
of a certain platform for access.
Specifically, Rizik would like to view,
on a Linux–based computer that does
not have a CSS–licensed video player,
DVDs that are only viewable on CSS–
licensed players. Rizik sought
designation of a class in order to permit
the creation of an unencrypted digital
copy of the DVD by decrypting and
extracting contents of DVDs for personal
viewing purposes on Linux operating
systems.
PO 00000
Frm 00036
Fmt 4700
Sfmt 4700
The Motion Picture Association of
America, Time Warner, and a coalition
of copyright industry trade associations
(the ‘‘Joint Creators’’) opposed these
requests. NTIA has advised that it
believes that the record does not
support granting the requests.
The proponents of both classes of
works sought to circumvent the access
controls because, they contended, it is
too expensive to acquire the hardware
and software with the minimum
requirements necessary to view motion
pictures on the distribution mechanism
of their choice. They also argued that
there are no reasonable, noninfringing
alternatives to circumvention for those
wishing to engage in the activity
affected by these platform requirements.
Similar classes to those proposed by
Carney and Rizik have been requested
and denied in the past three
rulemakings. Although the streaming
video proposal presents a new factual
situation, the Register concludes that
the legal arguments are fundamentally
similar to the proposals relating to the
viewing of DVDs on computers with
Linux operating systems that were
advanced in the previous three
rulemakings, when those proposals
were rejected. Likewise, arguments for
the streaming video and Linux classes
fail for fundamentally the same reasons
as the earlier Linux proposals, and the
Register cannot recommend that the
Librarian designate either of these
proposed classes of works.
In these rulemakings, proposed
classes have regularly been rejected in
cases where a user who wished to
engage in a noninfringing use of a work
using a particular device already had
the ability lawfully to engage in the
same noninfringing use of the work
using a different device. The same
principle applies here. Alternative
means exist to gain access to and view
the motion pictures that Carney and
Rizik wish to view after circumventing
access controls. In any event, it is
unclear from the record regarding
streaming videos what is actually
prohibiting Carney from being able to
access the Netflix ‘‘Watch Instantly’’
feature and, in particular, whether the
technological issue is centered around
an access control. It cannot be discerned
from the record whether Carney cannot
gain access due to digital rights
management or due to software and/or
hardware incompatibility.
Regarding DVD circumvention, many
operating systems on the market enable
authorized access to the works
contained on CSS–protected DVDs.
Moreover, CSS–compatible DVD players
are in fact available for some Linux
systems.
E:\FR\FM\27JYR1.SGM
27JYR1
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
Further, many alternatives exist for
both Carney and Rizik, including other
streaming video alternatives and online
content download sites. There are many
reasonably–priced alternatives that may
fulfill consumers’ wants and needs,
including purchasing a DVD player.
Mere consumer inconvenience is not
sufficient to support the designation of
a class of works. The statute does not
provide that this rulemaking is to enable
the most convenient method of
consuming video content. The
proponents have merely advanced
requests in order to satisfy their
convenience and preferences as to how
they would like to access media and
have failed to demonstrate a need for
remedial action. Accordingly, the
Register cannot recommend the
Librarian designate either proposed
class in light of the alternatives that
exist in the marketplace today.
jdjones on DSK8KYBLC1PROD with RULES
B. Lawfully purchased sound
recordings, audiovisual works, and
software programs distributed
commercially in digital format by
online music and media stores and
protected by technological measures
that depend on the continued
availability of authenticating servers,
when such authenticating servers cease
functioning because the store fails or
for other reasons; and
Lawfully purchased sound
recordings, audiovisual works, and
software programs distributed
commercially in digital format by
online music and media stores and
protected by technological measures
that depend on the continued
availability of authenticating servers,
prior to the failure of the servers for
technologists and researchers studying
and documenting how the
authenticating servers that effectuate
the technological measures function.
Christopher Soghoian of the Berkman
Center for Internet & Society at Harvard
University has proposed two classes of
works to allow the circumvention of
technological measures that depend on
the continued availability of
authenticating servers (or ‘‘DRM
servers’’) for the following uses: (1) by
consumers, for access to and ordinary
enjoyment of purchased works, and (2)
by technologists and researchers,
documenting the function of the
technological measures. The
technological measures in question
regulate user access to copyrighted
works via connections to remote online
authenticating servers, and therefore
always require that the server be
operational; if the server is shut down,
the authentication process cannot take
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
place and access for the user will be
denied.
Joint Creators and Time Warner
opposed Soghoian’s requests, and NTIA
has advised the Register that it believes
that the record does not support them.
Soghoian’s first proposal, regarding
DRM servers that control access to
lawfully purchased sound recordings,
audiovisual works and software
programs, was based upon several
recent instances where ‘‘online music
and media stores’’ that tethered their
commercial distribution of digital works
to DRM servers ceased operations. The
proposal would not permit
circumvention of operational DRM
servers, but would cover only situations
in which the particular authentication
server has ceased to function. Soghoian
argued that when the DRM servers
malfunction or are shut down by their
operators, consumers lose the ability to
engage in the legitimate, noninfringing
usage of content that they lawfully
purchased and reasonably expected to
continue using. However, there is no
evidence that such a loss of rights has
actually occurred thus far.
Soghoian argued that, given the
record he presents of digital media
stores shutting down their DRM servers,
and given the increased migration of
customers from physical CDs to
downloads, it is likely that in the next
three years at least one DRM–media
store and/or its authenticating servers
will shut down, adversely affecting the
ability to engage in noninfringing use of
the protected works by those who
purchased them. He proposed that
exempting circumvention of DRM server
technology after a server has stopped
functioning is a reasonable remedy for
these adverse effects under three of the
four Section 1201(a)(1)(C) factors.
The Register cannot recommend this
proposed class for the simple reason
that the proponent has not sustained his
burden of demonstrating that the
prohibition on circumvention of access
controls either has produced, or is likely
to produce, any adverse effects on
noninfringing uses of the proposed class
of works. Here, no such instances of
adverse effects have been shown. If, in
the absence of current adverse effect,
designation of a class of works is to be
based solely upon anticipated harm,
‘‘the evidence of likelihood of future
adverse impact during that time period
[must be] highly specific, strong and
persuasive.’’ Evidence of such a
compelling nature is lacking here as
well.
The fundamental question in
evaluating this proposal is whether the
adverse effects complained of by the
proponent, ‘‘DRM–based stores that
PO 00000
Frm 00037
Fmt 4700
Sfmt 4700
43835
cease to operate or abandon their
authenticating server system cause their
customers to lose full, and often any,
access to, and thus use of, their lawfully
purchased works,’’ are real, verifiable
and reasonably likely to recur. There are
several persuasive reasons in the record
to answer this question in the negative.
Regarding the three categories of
copyrighted works that Soghoian
identified in his proposal, he presented
no information that one of them,
software in this instance, is even being
sold by online retailers using
authentication servers. Thus, the
Register’s review of adverse effects must
be restricted to sound recordings and
audiovisual works. Soghain asserts that
such works were sold by two entities,
Circuit City and Google, who, upon
deciding to withdraw from the market,
fully refunded their customers’
purchase costs. In his testimony,
Soghoian stated that he was willing to
narrow the proposed class to permit
circumvention only ‘‘in the event that
the service does not provide any remedy
for consumers.’’ He further stated that a
‘‘refund is a totally appropriate and
satisfactory remedy.’’ Since the record of
DRM–protected audiovisual works
reveal only two defunct services and
reveals that both provided acceptable
remedies, there is no reason for the
Register to consider this category of
works in her determination.
With regard to sound recordings, of
the three retailers who stopped selling
DRM–protected works, Yahoo Music
has provided full refunds. The two
others, MSN Music and Walmart,
announced in response to consumer
backlash that they would keep their
servers operational. The record
demonstrates that, thus far, there have
been no adverse effects on the
noninfringing use of DRM–protected
sound recording downloads since
purchasers retain identical access and
use abilities.
Soghoian’s proposed class focused
more on future harm, arguing that ‘‘there
is no reason to believe that other
companies or services that fail or are
shut down in the future will provide
similar corrective steps.’’ He predicted
that companies smaller than Microsoft
and Walmart will not have the resources
to provide refunds or keep
authentication servers operating and
that given the state of the economy,
more companies will be jettisoning their
DRM–protected music businesses and
may decide simply to deactivate their
authentication servers without advance
warning. This appears to be pure
conjecture. Soghoian presented no
evidence supporting his claim that if
another online retailer decides to
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43836
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
disable its authentication server, it will
leave affected consumers without a
remedy. To the contrary, the record
shows that the two companies (MSN
Music and Walmart) that have
discontinued their services are still
keeping the servers operational. Thus,
the prediction that, within the next
three years, consumers will be
prevented from accessing and using
DRM–protected works due to the
cessation of operations by an
authentication server is purely
hypothetical.
The Register therefore recommends
rejection of this proposed class.
Soghoian’s second proposal relates to
circumvention of the same DRM servers
controlling access to the same categories
of works as his first proposal. However,
instead of being for the direct benefit of
consumers, it would aid ‘‘technologists
and researchers studying and
documenting how the authenticating
servers that effectuate the technological
measures function.’’ Such study and
documentation, the proposal states,
would take place ‘‘prior to the failure of
the servers.’’ This is intended to support
Soghoian’s first proposed user class by
providing consumers with
documentation about how DRM servers
function, so that they can actually
understand how to engage in
circumvention of works in his first
proposed class.
Soghoian’s legal argument in support
of the ‘‘researcher’’ class rested upon a
comparison with a similar class relating
to ‘‘rootkits’’ that was designated in the
2006 rulemaking, where the Librarian
designated a class to permit
circumvention technological measures
that (1) control access to lawfully
purchased sound recordings and
associated audiovisual works on CDs
and (2) create or exploit security flaws
or vulnerabilities that compromise the
security of personal computers, when
circumvention is accomplished solely
for the purpose of good faith testing,
investigating, or correcting such security
flaws or vulnerabilities. Soghoian’s
proposal focused on the purpose of the
existing ‘‘rootkit’’ class, contending that
because his researcher class is also
intended solely for good faith testing,
investigation, and correction, it too
meets the requirements for exemption
from the anti–circumvention statute. He
did point out, however, that the cases of
failed DRM and copy protection systems
do not easily fit into the category of
‘‘security flaw or vulnerability.’’
Soghoian’s proposed ‘‘research’’ class
of works ultimately rests upon the same
speculative argument as his ‘‘user’’ class.
Since the record makes clear that the
purpose of designating the research
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
class is to facilitate circumvention of
works in the ‘‘user’’ class, the arguments
supporting the research class fail on the
same basis as those supporting the user
class. Accordingly, the Register
recommends the rejection of this
proposed class.
C. Software and information recorded,
produced, stored, manipulated or
delivered by the software, that a
forensic investigator seeks to copy,
activate, or reverse engineer in order to
obtain evidence in a court proceeding.
Glenn Pannenborg proposed
designating a class of works for the
benefit of forensic investigators (i.e.,
court–appointed evidence examiners)
seeking evidence in a court proceeding.
According to Pannenborg, forensic
examiners practicing in the fields of
financial or information technology may
be faced with evidence that is recorded,
produced, stored, manipulated or
delivered by software covered under 17
U.S.C. 1201, or evidence that may be the
software itself, as in a patent or
licensing dispute. He asserted that in
order to obtain access to such evidence,
a forensic investigator may have to
circumvent a technological protection
measure in violation of Section
1201(a)(1)(A).
Joint Creators opposed Pannenborg’s
proposal, and NTIA has advised the
Register that it believes the record does
not support granting the request.
The Register finds that the proponent
in this case has not met the statutory
burden of proof. Pannenborg failed to
intelligibly describe the nature of
authorship of the proposed class of
works. Moreover, he presented no
compelling evidence, and provides no
concrete examples, that noninfringing
uses of works in the proposed class have
been or will be affected by the
circumvention ban. Indeed, he provided
little information about the works to
which he has apparently been denied
access. Because of the lack of such
information in the record, an evaluation
of whether and the extent to which the
prohibition on circumvention caused an
adverse effect on noninfringing uses was
not possible. The Register, therefore,
declines to recommend that the
Librarian designate this proposed class
of works.
PO 00000
Frm 00038
Fmt 4700
Sfmt 4700
D. Audiovisual works delivered by
digital television (‘‘DTV’’) transmission
intended for free, over–the–air
reception by anyone, which are marked
with a ‘‘broadcast flag’’ indicator that
prevents, restricts, or inhibits the
ability of recipients to access the work
at a time of the recipient’s choosing and
subsequent to the time of transmission,
or using a machine owned by the
recipient but which is not the same
machine that originally acquired the
transmission.
In the 2006 rulemaking, a number of
commenters sought the designation of
classes of works that target broadcast
flags for television and radio broadcasts,
noting that such restrictions could
possibly interfere with the personal
recording of digital broadcast content
for time–shifting and format–shifting
purposes. The Register rejected those
requests, stating that there was no
broadcast flag mandate in effect for
either television or radio at that time
and concluding that no relief could be
granted based upon non–existent
regulations. The broadcast flag can be
described as a digital code embedded in
a digital television (‘‘DTV’’) broadcasting
stream, which prevents digital
television reception equipment from
redistributing broadcast content. The
FCC had broadcast flag restrictions, but
they were overturned by the United
States Court of Appeals for the District
of Columbia Circuit.
In the current proceeding, Matt
Perkins proposed a new ‘‘broadcast flag’’
class based upon the belief that
broadcasters and copyright owners will
experiment with copy protection
measures to restrict the recording of
broadcast television content after the
completion of the transition to DTV. He
asserted that consumers will experience
frustration if their television recording
privileges are in any way restricted.
The National Association of
Broadcasters (‘‘NAB’’) opposed this
request, and NTIA advised the Register
that it believes the record does not
support the request.
Perkins has failed to make his case for
designating the proposed class. He has
generally stated that a broadcast flag
would interfere with the recording of
digital television programming for
personal use. However, he has not met
his burden of proof in showing that
regulatory action by the Librarian is
warranted. There is no broadcast flag
mandate for digital television broadcasts
in effect, and it is highly speculative as
to whether broadcasters and copyright
owners will work to implement
measures to restrict consumer recording
privileges in the new DTV era.
E:\FR\FM\27JYR1.SGM
27JYR1
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
jdjones on DSK8KYBLC1PROD with RULES
In addition, the record does not
indicate that there currently are any
devices that include broadcast flags.
Furthermore, Perkins’ theory in support
of his request lacks any explanation or
justification as to what noninfringing
use would be prevented by the
prohibition on circumvention with
respect to the broadcast flag and fails to
provide evidence that actual harm exists
or that it is ‘‘likely’’ to occur in the
ensuing three year period. The proposed
class is also misguided because it affects
redistribution of content and does not
appear to be related to an access control
technology measure for purposes of
Section 1201(a)(1). For the reasons
stated above, the Register cannot
recommend that the proposed request
be granted.
E. Audiovisual works embedded in a
physical medium (such as Blu–ray
discs) which are marked for ‘‘down–
conversion’’ or ‘‘down–resolutioning’’
(such as by the presence of an Image
Constraint Token ‘‘ICT‘‘) when the work
is to be conveyed through any of a
playback machine’s existing audio or
visual output connectors, and therefore
restricts the literal quantity of the
embedded work available to the user
(measured by visual resolution,
temporal resolution, and color fidelity).
Matt Perkins proposed a class of
works based on audiovisual works
embedded in Blu–ray discs. He stated
that the Blu–ray disc’s data structure
allows a disc publisher to assign an
image constraint token to an audiovisual
work. He further explained that a
licensed Blu–ray disc player responds to
that token by ‘‘down–rezzing’’ the
electronic video signal when conveyed
over an ‘‘untrusted’’ analog connection
(i.e., a trio of RCA cables). He asserted
that no such constraints occur when the
signal is conveyed over the preferred,
‘‘trusted’’ digital pathway (High–
Definition Multimedia Interface
[‘‘HDMI’’] incorporating High–
bandwidth Digital Content Protection
[‘‘HDCP’’]). He argued that ICT denies
access to discarded video details until a
condition is satisfied (HDMI
connectivity), and therefore that ICT
qualifies as an access control measure
under Section 1201. He admitted that
there is little evidence that ICTs are
currently embedded in available Blu–
ray discs, but nevertheless asserted that
the possible inclusion of an image
constraint token will cause user
frustration because program content will
not be seen in the promised high
definition format.
Advanced Access Content System
Licensing Administrator, LLC (‘‘AACS
LA’’) opposed the request, and NTIA has
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
advised the Register that it believes the
record does not support granting the
request.
Perkins’ request cannot withstand
scrutiny. He has failed to meet his
burden of proof demonstrating that
relief is warranted with regard to the
willful down–conversion of high
definition programming recorded on
Blu–ray discs. He has not shown that
the prohibition on circumvention has
had or is likely to have a substantial
adverse effect on a clearly identifiable
noninfringing use. Similarly, he has not
demonstrated the existence of actual
harm, or the likelihood of future harm
that designation of the proposed class
would necessarily rectify. Specifically,
he has not provided evidence that ICTs
are currently being used on Blu–ray
discs to restrict users from accessing the
highest resolution format offered by
Blu–ray discs. Further, the request is
unnecessary because the potential
problem described by Perkins is a
rapidly disappearing legacy issue
related to early generation high
definition televisions. The Register
recommends that the proposed class of
works be rejected.
F. Literary works distributed in ebook
format when all existing ebook editions
of the work (including digital text
editions made available by authorized
entities) contain access controls that
prevent the enabling either of the
book’s read–aloud function or of screen
readers that render the text into a
specialized format.
In 2006, the Librarian designated a
class consisting of ‘‘Literary works
distributed in ebook format when all
existing electronic book (‘‘ebook’’)
editions of the work (including digital
text editions made available by
authorized entities) contain access
controls that prevent the enabling either
of the book’s read–aloud function or of
screen readers that render the text into
a specialized format.’’ The American
Foundation for the Blind (‘‘AFB’’),
which was the principal proponent of
ebook exemptions in 2003 and 2006, has
proposed that the Librarian redesignate
the existing class to ensure that people
who are blind or visually impaired are
not excluded from the digital revolution
in education, information and
entertainment.
In support of its proposal, AFB
offered an examination of five ebooks,
two which it tested in the PDF format
and three which it tested in the
Microsoft Lit format. AFB stated that of
these five books, only one—or twenty
percent of the sample—was accessible.
In order to make its case, the AFB had
to demonstrate that the prohibition on
PO 00000
Frm 00039
Fmt 4700
Sfmt 4700
43837
circumvention has adversely affected, or
is likely to adversely affect, users’
ability to make noninfringing uses of a
particular class of works. There was no
dispute that making an ebook accessible
to blind and visually impaired persons
is a noninfringing use. Therefore, the
main question is whether the
prohibition on circumvention of
technological measures that control
access has adversely affected the ability
of blind and visually impaired persons
to gain access to the literary content in
ebooks.
In short, the proponents surveyed five
ebook titles and found that three
(Brian’s Hunt, The Bridges of Madison
County, and The Einstein Theory of
Relativity) were not accessible in
editions published in the Microsoft Lit
format, one (The Sign of the Fish) was
not accessible in an edition published in
the Adobe PDF format, and one (The
Complete Works of Edgar Alan Poe
Volume 1) was accessible in the Adobe
PDF format. Thus, four out of the five
titles sampled were available in formats
that were not accessible.
Proponents of the class presented no
other factual information relating to
whether (and the extent to which) the
prohibition on circumvention actually
has had an adverse effect on the ability
of blind and visually impaired persons
to engage in the noninfringing use of
reading ebooks by using screen readers
and the read–aloud function offered in
many ebooks.
Joint Creators did not oppose the
request, but did question whether the
prohibition on circumvention of access
controls was to blame for the
discrepancy between access for the fully
sighted and access for the visually
impaired. NTIA has advised the Register
that it believes that an exemption based
on this proposals should be renewed.
NTIA did not state that the record
supports granting the requested
exemption; in fact, it observed that the
case made by proponents is weak.
Nevertheless, NTIA concluded that
despite the limited level of information
provided, it is persuaded that harm to
these uses and users is likely to exist.
In reviewing the evidence presented
in support of designating the proposed
class, the first issue that is readily
apparent is that two of the five works
examined by AFB (The Einstein Theory
of Relativity and The Complete Works of
Edgar Alan Poe Volume 1) are in the
public domain. Section 1201 does not
prohibit circumvention of a
technological protection measure when
it simply controls access to a public
domain work; in such a case, it is lawful
to circumvent the technological
protection measure and there is no need
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
43838
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
for an exemption. Thus, the two works
in the public domain included in the
tiny sample – forty percent of the entire
sample – are irrelevant to the case for
an exemption. Even though one of these
two public domain works was found to
be inaccessible, the prohibition on
circumvention cannot be said to be
adversely affecting uses of that work
given that the prohibition does not
apply to public domain works.
Two of the other ebooks cited in
support of designating the class ––
Brian’s Hunt and The Bridges of
Madison County, –– are alleged to be
inaccessible in Microsoft Lit format.
However, the proponents did not state
whether those titles are accessible and
available in other formats, such as the
widely–used PDF format. Because the
proposed class, like the classes
approved in 2003 and 2006, requires
that ‘‘all existing ebook editions of the
work (including digital text editions
made available by authorized entities)
contain access controls that prevent the
enabling either of the book’s read–aloud
function or of screen readers that render
the text into a specialized format,’’ the
evidence relating to these two titles is
insufficient to justify the designation of
the proposed class. If Brian’s Hunt and
The Bridges of Madison County are
available in other editions that provide
read–aloud and screen reader
accessibility, then they are not examples
of works justifying redesignation of the
class. In failing to even check to see
whether Brian’s Hunt and The Bridges
of Madison County are available in an
accessible format, the proponents failed
to meet their burden of proof with
respect to those two titles.
The final book offered as an example
of inaccessibility was The Sign of the
Fish, by Joann Klusmeyer. The
proponents of the class stated that the
book ‘‘opened in Acrobat, but content
was not accessible.’’ Nothing was said
about whether the book was also
available in other formats (and, if so,
whether those formats were accessible).
Again, the proponents presented
insufficient evidence to evaluate
whether yet another of the limited
number of titles in their sample was
inaccessible in all ebook formats.
Although the Register could
recommend against designation of the
proposed class based simply upon the
proponents’ failure to provide sufficient
evidence to evaluate whether any of the
three non–public domain books cited by
the proponents are inaccessable in all
ebook formats, the Register’s staff
conducted some additional research to
determine whether the case could be
made that any or all of those books are
inaccessible in all formats. With respect
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
to Brian’s Hunt and The Bridges of
Madison County, a quick review of the
market revealed that both of these works
are available as digital texts through
Bookshare.org. However, The Sign of
the Fish is not available in any edition
that permits the enabling of the ebook
read–aloud function or of screen
readers. However, the Register cannot
conclude that the prohibition on
circumvention has had an adverse effect
on the noninfringing use of reading
ebooks with screen readers or the read–
aloud function when the evidence
reveals the case is built upon a single
obscure book.
The Register fully supports universal
accessibility to ebooks for the blind and
visually impaired. However, the
rulemaking established by Congress
requires proponents to demonstrate, de
novo, in each rulemaking proceeding,
that relief relating to a particular class
of works is warranted for the ensuing
three–year period. The Register is
sympathetic to the needs of the blind
and visually impaired, and agrees that
as a matter of policy, access to e–books
for the visually impaired should be
encouraged and that, when there is
evidence that the prohibition on
circumvention is having an adverse
impact on that goal, an appropriate class
of works should be designated in this
rulemaking. The Register has not
hesitated to recommend such classes
when the record has supported such a
recommendation. However, unless the
burden of presenting a prima facie case
is met, the statutory standard
established for this rulemaking does not
permit the designation of a class of
works. Presenting strong policy
arguments in favor of exempting a class
of works from the prohibition on
circumvention is only part of the battle
that a proponent must wage; it is also
necessary to provide sufficient facts to
justify a finding that the prohibition
actually is having or is likely to have an
adverse effect on noninfringing uses.
For all of the reasons set forth above,
the Register finds no factual basis for
designating the proposed class of works.
While the Register’s recommendations
in previous rulemakings made clear that
the Register understands and accepts
the legal and policy reasons for such an
exemption, the constraints established
by Congress in this rulemaking
proceeding do not permit the
designation of a class of works in the
absence of a factual record that supports
the need for the designation. No such
showing has been made in this
proceeding.
PO 00000
Frm 00040
Fmt 4700
Sfmt 4700
IV. Conclusion
Having considered the evidence in the
record, the contentions of the parties,
and the statutory objectives, the Register
of Copyrights recommends that the
Librarian of Congress publish the five
classes of copyrighted works designated
above, so that the prohibition against
circumvention of technological
measures that effectively control access
to copyrighted works shall not apply to
persons who engage in noninfringing
uses of those particular classes of works.
Dated: July 19, 2010
Marybeth Peters,
Register of Copyrights.
Determination of the Librarian of
Congress
Having duly considered the
recommendation of the Register of
Copyrights as summarized above and
having accepted that recommendation
with respect to all but one of the classes
of works under consideration, the
Librarian of Congress is exercising his
authority under 17 U.S.C. 1201(a)(1)(C)
and (D) and is publishing as a new rule
the six classes of copyrighted works that
shall be subject to the exemption found
in 17 U.S.C. 1201(a)(1)(B) from the
prohibition against circumvention of
technological measures that effectively
control access to copyrighted works set
forth in 17 U.S.C. 1201(a)(1)(A).
The Librarian has considered but
rejected the Register’s recommendation
with respect to the proposed class of
works consisting of literary works
distributed in ebook format. This class
of works was proposed by the American
Foundation for the Blind (AFB) and is
identical to that for which an exemption
was granted in 2006 and similar to the
class for which an exemption was
granted in 2003.
The Librarian understands, and agrees
with, the Register regarding the
requirement that a decision on a
proposed class of works be made based
on the record developed in the
rulemaking proceeding. In the view of
the Librarian, the proposed exemption
should be granted because: (1) the
record includes statements on the
likelihood of access not being available
to blind individuals, (2) no one opposed
the exemption, and (3) there are broad
benefits to society in making works
accessible to the visually impaired. The
Librarian notes that, in contrast with its
actions in both 2003 and 2006, the
Copyright Office did not submit any
post–hearing questions on this proposed
exemption. Such development of the
record would have been helpful. The
Librarian also notes that the Assistant
Secretary for Communications and
Information of the Department of
E:\FR\FM\27JYR1.SGM
27JYR1
jdjones on DSK8KYBLC1PROD with RULES
Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Rules and Regulations
Commerce, with whom the Register is
required by Section 1201(a)(l)(C) to
consult when she makes her
recommendation, supports granting the
exemption.
Accordingly, the Librarian is
designating the class of works relating to
literary works distributed in ebook
format.
Notwithstanding the above, the
Librarian is aware that, in the past two
years, the Register and her legal staff
have invested a great deal of time in
analyzing the myriad of issues that
combine to make it difficult for blind
and print–disabled persons to obtain
access to certain e–books. The Copyright
Office has hosted comprehensive
meetings with stakeholders, solicited
public comment on the application of
domestic and international law to
accessibility, participated in interagency
and intergovernmental meetings in
Washington, DC and Geneva, and, with
the World Intellectual Property
Organization, co–sponsored a major
international training program for
experts from developing countries.
Through this work, the Register has
come to believe that more general
Congressional attention on the issue of
accessibility is merited. I agree with the
Register in this determination.
The section 1201 process is a
regulatory process that is at best ill–
suited to address the larger challenges of
access for blind and print–disabled
persons. The exemption that the
Librarian is approving here offers a
solution to specific concerns that were
raised in the narrow context of the
rulemaking. Moreover, it is a temporary
solution, as the 1201 process begins
anew every three years.
Outside of section 1201and the issue
of technological protection measures,
the Register has been examining
whether copyright law, and to some
extent related disabilities and education
laws, adequately serve the blind and
print–disabled population in the digital
age. In particular, the Register has
learned that, even where books are
published electronically for the general
public, the digital format used or
licensed may be employed in a way that
is incompatible with Braille readers and
other assistive technologies on which
blind and print-disabled persons rely. In
the long run, this incompatibility may
lead to delays, cost challenges and
standards issues that may off-set the
long-awaited benefits of digital media.
Copyright and content issues cannot be
divorced from the general goal of
ensuring that hardware devices are
designed with accessibility in mind.
The Librarian fully supports the Register
in her examination of these issues and
VerDate Mar<15>2010
15:25 Jul 26, 2010
Jkt 220001
urges Congress to work with the
Copyright Office to consider
accessibility beyond the contours of this
1201 rulemaking.
List of Subjects in 37 CFR 201
Copyright, Exemptions to prohibition
against circumvention.
Final Regulations
For the reasons set forth in the
preamble, 37 CFR part 201 is amended
as follows:
PART 201–GENERAL PROVISIONS
1. The authority citation for part 201
continues to read as follows:
■
Authority: 17 U.S.C. 702
2. Section 201.40 is amended by
revising paragraph (b) to read as follows:
■
§ 201.40 Exemption to prohibition
against circumvention.
*
*
*
*
*
(b) Classes of copyrighted works.
Pursuant to the authority set forth in 17
U.S.C. 1201(a)(1)(C) and (D), and upon
the recommendation of the Register of
Copyrights, the Librarian has
determined that the prohibition against
circumvention of technological
measures that effectively control access
to copyrighted works set forth in 17
U.S.C. 1201(a)(1)(A) shall not apply to
persons who engage in noninfringing
uses of the following five classes of
copyrighted works:
(1) Motion pictures on DVDs that are
lawfully made and acquired and that are
protected by the Content Scrambling
System when circumvention is
accomplished solely in order to
accomplish the incorporation of short
portions of motion pictures into new
works for the purpose of criticism or
comment, and where the person
engaging in circumvention believes and
has reasonable grounds for believing
that circumvention is necessary to fulfill
the purpose of the use in the following
instances:
(i) Educational uses by college and
university professors and by college and
university film and media studies
students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos.
(2) Computer programs that enable
wireless telephone handsets to execute
software applications, where
circumvention is accomplished for the
sole purpose of enabling interoperability
of such applications, when they have
been lawfully obtained, with computer
programs on the telephone handset.
(3) Computer programs, in the form
of firmware or software, that enable
used wireless telephone handsets to
PO 00000
Frm 00041
Fmt 4700
Sfmt 9990
43839
connect to a wireless
telecommunications network, when
circumvention is initiated by the owner
of the copy of the computer program
solely in order to connect to a wireless
telecommunications network and access
to the network is authorized by the
operator of the network.
(4) Video games accessible on
personal computers and protected by
technological protection measures that
control access to lawfully obtained
works, when circumvention is
accomplished solely for the purpose of
good faith testing for, investigating, or
correcting security flaws or
vulnerabilities, if:
(i) The information derived from the
security testing is used primarily to
promote the security of the owner or
operator of a computer, computer
system, or computer network; and
(ii) The information derived from the
security testing is used or maintained in
a manner that does not facilitate
copyright infringement or a violation of
applicable law.
(5) Computer programs protected by
dongles that prevent access due to
malfunction or damage and which are
obsolete. A dongle shall be considered
obsolete if it is no longer manufactured
or if a replacement or repair is no longer
reasonably available in the commercial
marketplace.
(6) Literary works distributed in
ebook format when all existing ebook
editions of the work (including digital
text editions made available by
authorized entities) contain access
controls that prevent the enabling either
of the book’s read–aloud function or of
screen readers that render the text into
a specialized format.
Dated: July 20, 2010
James H. Billington,
The Librarian of Congress.
[FR Doc. 2010–18339 Filed 7–26–10; 8:45 am]
BILLING CODE 1410–30–S
E:\FR\FM\27JYR1.SGM
27JYR1
Agencies
[Federal Register Volume 75, Number 143 (Tuesday, July 27, 2010)]
[Rules and Regulations]
[Pages 43825-43839]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-18339]
=======================================================================
-----------------------------------------------------------------------
LIBRARY OF CONGRESS
Copyright Office
37 CFR Part 201
[Docket No. RM 2008-8]
Exemption to Prohibition on Circumvention of Copyright Protection
Systems for Access Control Technologies
AGENCY: Copyright Office, Library of Congress.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Librarian of Congress announces that the prohibition
against
[[Page 43826]]
circumvention of technological measures that effectively control access
to copyrighted works shall not apply to persons who engage in
noninfringing uses of six classes of copyrighted works.
EFFECTIVE DATE: July 27, 2010.
FOR FURTHER INFORMATION CONTACT: Robert Kasunic, Assistant General
Counsel, and David O. Carson, General Counsel, Copyright GC/I&R, P.O.
Box 70400, Washington, D.C. 20024. Telephone: (202) 707-8380. Telefax:
(202) 707-8366.
SUPPLEMENTARY INFORMATION: In this notice, the Librarian of Congress,
upon the recommendation of the Register of Copyrights, announces that
the prohibition against circumvention of technological measures that
effectively control access to copyrighted works shall not apply to
persons who engage in noninfringing uses of six classes of works. This
announcement is the culmination of a rulemaking proceeding commenced by
the Register on October 6, 2008. A more comprehensive statement of the
background and legal requirements of the rulemaking, a discussion of
the record and the Register's analysis may be found in the Register's
memorandum to the Librarian of Congress dated June 11, 2010, which
contains the full explanation of the Register's recommendation. A copy
of the Register's memorandum may be found at https://www.copyright.gov/1201. This notice summarizes the Register's recommendation, announces
the Librarian's determination, and publishes the regulatory text
codifying the six exempted classes of works.
I. Background
A. Legislative Requirements for Rulemaking Proceeding
The Digital Millennium Copyright Act (``DMCA'') was enacted to
implement certain provisions of the WIPO Copyright Treaty and WIPO
Performances and Phonograms Treaty. It established a wide range of
rules that govern not only copyright owners in the marketplace for
electronic commerce, but also consumers, manufacturers, distributors,
libraries, educators, and on-line service providers. It defined whether
consumers and businesses may engage in certain conduct, or use certain
devices, in the course of transacting electronic commerce.
Chapter 12 of title 17 of the United States Code prohibits
circumvention of certain technological measures employed by or on
behalf of copyright owners to protect their works (i.e., ``access
controls''). Specifically, Section 1201(a)(1)(A) provides, in part,
that no person shall circumvent a technological measure that
effectively controls access to a work protected under this title. In
order to ensure that the public will have continued ability to engage
in noninfringing uses of copyrighted works, such as fair use,
subparagraph (B) limits this prohibition. It provides that the
prohibition against circumvention shall not apply to persons who are
users of a copyrighted work which is in a particular class of works, if
such persons are, or are likely to be in the succeeding three-year
period, adversely affected by virtue of such prohibition in their
ability to make noninfringing uses of that particular class of works
under this title as determined in a rulemaking. The proceeding is
conducted by the Register of Copyrights, who is to provide notice of
the rulemaking, seek comments from the public, consult with the
Assistant Secretary for Communications and Information of the
Department of Commerce, and recommend final regulations to the
Librarian of Congress. The regulations, to be issued by the Librarian
of Congress, announce ``any class of copyrighted works for which the
Librarian has determined, pursuant to the rulemaking conducted under
subparagraph (c), that noninfringing uses by persons who are users of a
copyrighted work are, or are likely to be, adversely affected, and the
prohibition contained in subparagraph (A) shall not apply to such users
with respect to such class of works for the ensuing 3-year period.''
This is the fourth Section 1201 rulemaking.
B. Responsibilities of Register of Copyrights and Librarian of Congress
The primary responsibility of the Register and the Librarian in
this rulemaking proceeding was to assess whether the implementation of
access control measures is diminishing the ability of individuals to
use copyrighted works in ways that are not infringing and to designate
any classes of works with respect to which users have been adversely
affected in their ability to make noninfringing uses. Congress intended
that the Register solicit input that would enable consideration of a
broad range of current or likely future adverse impacts. The statute
directs that in conducting the rulemaking, the Register and the
Librarian shall examine:
(1) The availability for use of copyrighted works;
(2) The availability for use of works for nonprofit archival,
preservation, and educational purposes;
(3) The impact that the prohibition on the circumvention of
technological measures applied to copyrighted works has on criticism,
comment, news reporting, teaching, scholarship, or research;
(4) The effect of circumvention of technological measures on the
market for or value of copyrighted works; and
(5) Such other factors as the Librarian considers appropriate.
These factors to be considered in the rulemaking process require
the Register and the Librarian to carefully balance the availability of
works for use, the effect of the prohibition on particular uses, and
the effect of circumvention on copyrighted works.
C. The Purpose and Focus of the Rulemaking
1. Purpose of the Rulemaking
The task of this rulemaking is to determine whether the
availability and use of access control measures has already diminished
or is about to diminish the ability of the users of any particular
classes of copyrighted works to engage in noninfringing uses of those
works similar or analogous to those that the public had traditionally
been able to make prior to the enactment of the DMCA. In examining the
factors set forth in Section 1201(a)(1)(C), the focus is on whether the
implementation of technological protection measures has had an adverse
impact on the ability of users to make lawful uses.
2. The Necessary Showing
Proponents of a class of works have the burden of proof. In order
to make a prima facie case for designation of a class of works,
proponents must show by a preponderance of the evidence that there has
been or is likely to be a substantial adverse effect on noninfringing
uses by users of copyrighted works. De minimis problems, isolated harm
or mere inconveniences are insufficient to provide the necessary
showing. Similarly, for proof of ``likely'' adverse effects on
noninfringing uses, a proponent must prove by a preponderance of the
evidence that the harm alleged is more likely than not; a proponent may
not rely on speculation alone to sustain a prima facie case of likely
adverse effects on noninfringing uses. It is also necessary to show a
causal nexus between the prohibition on circumvention and the alleged
harm.
Proposed classes are reviewed de novo. The existence of a
previously designated class creates no presumption for consideration of
a new class, but rather the proponent of such a class of works must
make a prima facie case in each three-year period.
[[Page 43827]]
3. Determination of ``Class of Works''
The starting point for any definition of a ``particular class'' of
works in this rulemaking must be one of the categories of works set
forth in section 102 of the Copyright Act. However, those categories
are only a starting point and a ``class'' will generally constitute
some subset of a section 102 category. The determnation of the
appropriate scope of a ''class of works''; recommended for exemption
will also take into account the likely adverse effects on noninfringing
uses and the adverse effects that designation of the class may have on
the market for or value of copyrighted works.
While starting with a section 102 category of works, or a
subcategory thereof, the description of a ``particular class''of works
ordinarily should be further refined by reference to other factors that
assist in ensuring that the scope of the class addresses the scope of
the harm to noninfringing uses. For example, the class might be defined
in part by reference to the medium on which the works are distributed,
or even to the access control measures applied to them. The description
of a class of works may also be refined, in appropriate cases, by
reference to the type of user who may take advantage of the designation
of the class of works or by reference to the type of use of the work
that may be made pursuant to the designation. The ``class'' must be
properly tailored not only to address the harm demonstrated, but also
to limit the adverse consequences that may result from the creation of
an exempted class. In every case, the contours of a ``class'' will
depend on the unique factual circumstances established in the
rulemaking record on a case-by-case basis.
D. Consultation with the Assistant Secretary for Communications and
Information
Section 1201(a)(1)(C) requires the Register of Copyrights to
consult with the Assistant Secretary for Communications and Information
of the Department of Commerce (who is also the Administrator of the
National Telecommunications and Information Administration) and report
and comment on the views of the Assistant Secretary (``NTIA'') when she
makes her recommendation to the Librarian of Congress.
In addition to informal consultations throughout the course of the
rulemaking proceeding, NTIA formally communicated its views in letters
to the Register on November 4, 2009, and April 16, 2010. NTIA's views
were considered by the Register in forming her recommendation. A
discussion of NTIA's substantive analysis of particular proposals is
presented in the relevant sections of the Register's recommendation.
II. Solicitation of Public Comments and Hearings
On October 6, 2008, the Register initiated this rulemaking
proceeding pursuant to Section 1201(a)(1)(C) with publication of a
Notice of Inquiry. The NOI requested written comments from all
interested parties, including representatives of copyright owners,
educational institutions, libraries and archives, scholars,
researchers, and members of the public.
During the initial comment period that ended on December 2, 2008,
the Copyright Office received nineteen written comments proposing
twenty-five classes of works, all of which were posted on the Office's
website. Because some of the initial comments contained similar or
overlapping proposals, the Copyright Office arranged related classes
into groups, and set forth and summarized all proposed classes in a
Notice of Proposed Rulemaking (``NPRM'') published on December 29,
2008. This NPRM did not present the initial classes in the form of
proposed rule, but merely as ``a starting point for further
consideration.''
The NPRM asked interested parties to submit comments providing
support, opposition, clarification, or correction regarding the
proposals, and to provide factual and/or legal arguments in support of
their positions. The Copyright Office received a total of fifty-six
responsive comments before the comment period closed on February 2,
2009, all of which were posted on the Copyright Office website.
Four days of public hearings were conducted by the Register in May
2009 at Stanford University and the Library of Congress. Thirty-seven
witnesses, representing proponents and opponents of proposed classes of
works, testified on twenty-one proposed classes. Following the
hearings, the Copyright Office sent follow-up questions to some of the
hearing witnesses, and responses were received during the summer. The
entire record in this and the previous section 1201(a)(1)(C)
rulemakings are available on the Office's website, https://www.copyright.gov/1201/.
On October 27, 2009, the Librarian of Congress published in the
Federal Register a Notice of an interim rule, extending the existing
classes of works exempted from the prohibition until the conclusion of
the current rulemaking proceeding and the designation of any classes of
works to be exempt from the prohibition for the ensuing three-year
period by the Librarian of Congress.
III. The Designated Classes
A. Motion pictures on DVDs that are lawfully made and acquired and that
are protected by the Content Scrambling System when circumvention is
accomplished solely in order to accomplish the incorporation of short
portions of motion pictures into new works for the purpose of criticism
or comment, and where the person engaging in circumvention believes and
has reasonable grounds for believing that circumvention is necessary to
fulfill the purpose of the use in the following instances:
Educational uses by college and university
professors and by college and university film and media studies
students;
Documentary filmmaking;
Noncommercial videos.
DVDs protected by the Content Scrambling System (CSS) have been an
issue in this rulemaking proceeding since its inception in 2000. In the
2006 rulemaking proceeding, the Librarian designated a class of
``[a]udiovisual works included in the educational library of a college
or university's film or media studies department, when circumvention is
accomplished for the purpose of making compilations of portions of
those works for educational use in the classroom by media studies or
film professors.''
In the current rulemaking, educators sought to renew and, in a
number of ways, to expand the existing class of works designated in the
last proceeding. The proposed expansions of the class involved
extending the class to include all of the motion pictures on CSS-
protected DVDs contained in a college or university library (rather
than just a film or media studies department) and to encompass
classroom use by all college and university professors and students as
well as elementary and secondary school teachers and students.
Apart from educators, others sought designation of similar classes
of works to address what they contended are adverse impacts on their
ability to engage in noninfringing uses of copyrighted works.
Documentary filmmakers argued that the prohibition on circumvention
adversely affects their ability to use portions of motion pictures in
documentary films, many of which would qualify as noninfringing uses
for the purposes of criticism or comment. Creators of noncommercial
videos that incorporate portions of
[[Page 43828]]
motion pictures contained on CSS-protected DVDs also alleged that the
prohibition on circumvention adversely affected their ability to engage
in noninfringing criticism or comment.
Based on the record in this proceeding, the Register determines
that CSS is a technological measure that protects access to copyrighted
motion pictures. She also determined that a substantial number of uses
in the record with respect to education, documentary filmmaking, and
noncommercial videos qualify as noninfringing uses.
NTIA supports expansion of the existing class of audiovisual works
to include all college and university level instructors and students
but does not believe the record justifies an expansion that would
include elementary and secondary school teachers and students. NTIA
also recommended limiting the class to address the use of DVDs included
in the educational library or departments of the academic institutions.
It also supported the proposal to designate a class of works for the
benefit of documentary filmmakers. Finally, it expressed general
support for the request to designate a class that would permit
extraction of film clips for use in noncommercial videos, but suggested
a requirement that the clips from the audiovisual work must be for
remix videos that are used for social comment or criticism, or that are
used in transformative-type works according to established fair use
principles.
Given that all of these proposed classes at issue involved motion
pictures on CSS-protected DVDs, the Register recommends that the
Librarian designate a single class addressing all of these adversely
affected uses of DVDs. However, the Register concludes that the record
does not support all of the proposed expansions of the existing class
of audiovisual works and that in at least one respect, the record
supported a contraction of that class.
What the record does demonstrate is that college and university
educators, college and university film and media studies students,
documentary filmmakers, and creators of noncommercial videos frequently
make and use short film clips from motion pictures to engage in
criticism or commentary about those motion pictures, and that in many
cases it is necessary to be able to make and incorporate high-quality
film clips in order effectively to engage in such criticism or
commentary. In such cases, it will be difficult or impossible to engage
in the noninfringing use without circumventing CSS in order to make
high-quality copies of short portions of the motion pictures. Because
not all uses by educators, documentary filmmakers or makers of
noncommerical videos will be noninfringing or will require such high-
quality copies, the class of works recommended by the Register is not
as extensive as what was requested by some proponents, and the class
contains some limitations. First, proponents for educators failed to
demonstrate that high-quality resolution film clips are necessary for
K-12 teachers and students, or for college and university students
other than film and media studies students. Because other means, such
as the use of screen capture software, exist that permit the making of
lower-quality film clips without circumventing access controls, the
Register finds no justification in the record for expanding the class
of works to include such persons as express beneficiaries of the
designation of this class of works.
Second, the circumvention of access controls must be accomplished
solely in order to enable incorporation of short portions of motion
pictures into new works for purposes of criticism of comment. The
justification offered by proponents for designating a class of
audiovisual works, and a key element of the Register's conclusion that
the intended uses will frequently be noninfringing fair uses, was that
the uses that justify designation of the class were for purposes of
criticism and commentary, which are classic ``fair use'' purposes.
Moreover, all of the evidence in the rulemaking demonstrating
noninfringing uses involved the use of short portions of motion
pictures. While the Register is persuaded that it would be difficult
and imprudent to quantify the precise contours of what constitutes a
``short portion,'' there was no evidence in the record to support the
conclusion that anything more than incorporating relatively short
portions of motion pictures into a new work for purposes of criticism
or commentary would be a fair use. Similarly, in order to meet the
requirements of the designated class of works, a new work must be
created, whether that work is a compilation of clips for use in the
classroom, or a documentary or video incorporating a clip or clips from
a copyrighted motion picture.
The final requirement of the recommended class is that the person
engaging in the circumvention must reasonably believe that the
circumvention is necessary in order to fulfill the purpose of the use -
i.e., the noninfringing criticism or commentary. Because alternatives
to circumvention such as video capture may suffice in many, and perhaps
the vast majority of situations, users must make a reasonable
determination that heightened quality is necessary to achieve the
desired goal. The justification for designating this class of works is
that some criticism and/or commentary requires the use of high-quality
portions of motion pictures in order to adequately present the speech-
related purpose of the use. Where alternatives to circumvention can be
used to achieve the noninfringing purpose, such non-circumventing
alternatives should be used. Thus, this limitation seeks to avoid an
overly broad class of works given the limited number of uses that may
require circumvention to achieve the intended noninfringing end.
The class has also been limited to include only motion pictures
rather than all audiovisual works. Because there was no evidence
presented that addressed any audiovisual works other than motion
pictures, there was no basis for including the somewhat broader class
of audiovisual works (which includes not only motion pictures, but also
works such as video games and slide presentations).
B. Computer programs that enable wireless telephone handsets to execute
software applications, where circumvention is accomplished for the sole
purpose of enabling interoperability of such applications, when they
have been lawfully obtained, with computer programs on the telephone
handset.
The Electronic Frontier Foundation (EFF) proposed a class that
would allow circumvention of the technological measures contained on
certain wireless phone handsets (known as ``smartphones'') that prevent
third-party software applications from being installed and run on such
phones. This circumvention activity is colloquially referred to as
``jailbreaking'' a phone.
The factual record with respect to this proposed class focused
primarily on Apple's iPhone, although there are allegations in the
record involving other mobile phone manufacturers as well. EFF
asserted, and Apple's testimony confirmed, that any software or
application to be used on the iPhone must be validated with the
firmware that controls the iPhone's operation. This validation process
is intended to make it impossible for an owner of an iPhone to install
and use third-party applications on the iPhone that have not been
approved for distribution through Apple's iTunes App Store.
EFF argued that jailbreaking is a noninfringing activity for three
reasons. First, it alleged that at least in some cases, jailbreaking
can be done within
[[Page 43829]]
the scope of what is authorized under the license Apple grants to every
iPhone user. It stated that ``[t]o the extent a jailbreaking technique
does not modify any of the individual software programs that comprise
the iPhone firmware collection, but instead simply adds additional
software components to the collection, the practice may not exceed the
scope of the license to `use the iPhone software' or constitute a
`modification' of any Apple software components, any more than the
addition of a new printer driver to a computer constitutes a
`modification' of the operating system already installed on the
computer.''
Second, EFF asserted that ``to the extent a jailbreak technique
requires the reproduction or adaptation of existing firmware beyond the
scope of any license or other authorization by the copyright owner, it
would fall within the ambit of 17 U.S.C. Sec. 1l7(a).'' EFF contended
that the iPhone owner is also the owner of the copy of the firmware on
the iPhone and that jailbreaking falls within the owner's privilege
``to adapt those copies to add new capabilities, so long as the changes
do not ``harm the interests of the copyright proprietor.''
Finally, EFF contended that in any event, jailbreaking constitutes
fair use of the firmware because jailbreaking is a purely
noncommercial, private use of computer software, a largely functional
work that operates the phone, and that the phone owner must reuse the
vast majority of the original firmware in order for the phone to
operate. Because the phone owner is simply modifying the firmware for
her own use on the phone, there is no harm to the market for the
firmware.
Apple responded that jailbreaking by purchasers of the iPhone is a
violation of the prohibition against circumvention of access controls.
It stated that its validation system is necessary to protect consumers
and Apple from harm. Apple further contended that modifying Apple's
operating system constituted the creation of an infringing derivative
work. Specifically, Apple argued that because purchasers of an iPhone
are licensees, not owners, of the computer programs contained on the
iPhone, Section 117 of the Copyright Act is inapplicable as an
exemption to the adaptation right. Apple further argued that the fair
use defense codified in Sec. 107 would not apply to jailbreaking
activity under the statutory factors.
Based on the record, the Register has determined that the
encryption and authentication processes on the iPhone's computer
programs are technological measures that control access to the
copyrighted work (the firmware) for purposes of Sec. 1201(a)(1).
Moreover, the Register finds that the evidence supports the contention
that a technological protection measure is adversely affecting adding
applications to the iPhone. The critical question is whether
jailbreaking an iPhone in order to add applications to the phone
constitutes a noninfringing use.
The Register does not find that the contract between Apple and
purchasers of the iPhone authorize modification of the iPhone.
Moreover, the Register cannot clearly determine whether the various
versions of the iPhone contracts with consumers constituted a sale or
license of a copy of the computer programs contained on the iPhone. The
contractual language is unclear with respect to particular copies of
the computer programs. Although Apple retains ownership of the computer
programs, the contracts also expressly grant users ownership of the
device. Since the ``copy'' of the computer program is fixed in hardware
of the device, it is unclear what ownership status is to be given to
the particular copy of the computer program contained in the device.
Apple unquestionably has retained ownership of the intangible works,
but the ownership of the particular copies of those works is unclear.
Moreover, the state of the law with respect to the determination of
ownership is in a state of flux in the courts. Both proponents and
opponents cited case law in support of their respective positions, but
the Register finds it impossible to determine how a court would resolve
the issue of ownership on the facts presented here. While both parties
agreed that the Second Circuit's decision in Krause v. Titleserv, 402
F.3d 119 (2d Cir. 2005) is ``good law,'' that case dealt with a
situation that is distinguishable in many respects from the present
situation. The Register finds that the Krause case does not provide
clear guidance as to how resolve the current issue.
However, the Register does find that the proponent's fair use
argument is compelling and consistent with the congressional interest
in interoperability. The four fair use factors tend to weigh in favor
of a finding of fair use.
Under the first factor in Section 107, it appears fair to say that
the purpose and character of the modification of the operating system
is to engage in a private, noncommercial use intended to add
functionality to a device owned by the person making the modification,
albeit beyond what Apple has determined to be acceptable. The user is
not engaging in any commercial exploitation of the firmware, at least
not when the jailbreaking is done for the user's own private use of the
device.
The fact that the person engaging in jailbreaking is doing so in
order to use Apple's firmware on the device that it was designed to
operate, which the jailbreaking user owns, and to use it for precisely
the purpose for which it was designed (but for the fact that it has
been modified to run applications not approved by Apple) favors a
finding that the purpose and character of the use is innocuous at worst
and beneficial at best. Apple's objections to the installation and use
of ``unapproved'' applications appears to have nothing to do with its
interests as the owner of copyrights in the computer programs embodied
in the iPhone, and running the unapproved applications has no adverse
effect on those interests. Rather, Apple's objections relate to its
interests as a manufacturer and distributor of a device, the iPhone.
Moreover, Congress has determined that reverse engineering for the
purpose of making computer programs interoperable is desirable when
certain conditions are met, and has crafted a specific exemption from
Section 1201(a)'s prohibition on circumvention in such cases. While an
iPhone owner who ``jailbreaks'' does not fall within the four corners
of the statutory exemption in Section 1201(f), the fact that he or she
is engaging in jailbreaking in order to make the iPhone's firmware
interoperable with an application specially created for the iPhone
suggests that the purpose and character of the use are favored.
Turning to the second fair use factor, it is customary for
operating systems - functional works - to enable third party programs
to interoperate with them. It does not and should not infringe any of
the exclusive rights of the copyright owner to run an application
program on a computer over the objections of the owner of the copyright
in the computer's operating system. Thus, if Apple sought to restrict
the computer programs that could be run on its computers, there would
be no basis for copyright law to assist Apple in protecting its
restrictive business model. The second factor decisively favors a
finding of fair use.
Turning to the third factor, ``the amount and substantiality of the
portion used in relation to the copyrighted work as a whole,'' EFF
admitted that because the Apple firmware is necessary in order to
operate the iPhone, it is necessary for individuals who jailbreak their
phones to reuse the vast majority of the original firmware. However,
the amount of the copyrighted work
[[Page 43830]]
modified in a typical jailbreaking scenario is fewer than 50 bytes of
code out of more than 8 million bytes, or approximately 1/160,000 of
the copyrighted work as a whole. Where the alleged infringement
consists of the making of an unauthorized derivative work, and the only
modifications are so de minimis, the fact that iPhone users are using
almost the entire iPhone firmware for the purpose for which it was
provided to them by Apple undermines the significance of this factor.
While the third factor arguably disfavors a fair use finding, the
weight to be given to it under the circumstances is slight.
Addressing the fourth factor, ``the effect of the use upon the
potential market for or value of the copyrighted work,'' EFF asserted
that the firmware has no independent economic value, pointing out that
the iPhone firmware is not sold separately, but is simply included when
one purchases an iPhone. EFF also argued that the ability to lawfully
jailbreak a phone will increase, not decrease, overall sales of the
phones because users will know that by jailbreaking, they can ``take
advantage of a wider array of third party applications.
Apple responded that unauthorized uses diminish the value of the
copyrighted works to Apple. However, Apple is not concerned that the
practice of jailbreaking will displace sales of its firmware or of
iPhones; indeed, since one cannot engage in that practice unless one
has acquired an iPhone, it would be difficult to make that argument.
Rather, the harm that Apple fears is harm to its reputation. Apple is
concerned that jailbreaking will breach the integrity of the iPhone's
``ecosystem.'' The Register concludes that such alleged adverse effects
are not in the nature of the harm that the fourth fair use factor is
intended to address.
NTIA does not support designating the proposed class. While
acknowledging that permitting iPhone jailbreaking could facilitate
innovation, better serve customers, and encourage the market to utilize
open platforms, NTIA believes ``it might just as likely deter
innovation by not allowing the developer to recoup its development
costs and to be rewarded for its innovation.'' NTIA also believes that
the proponents' ``public policy'' arguments should properly be
considered by expert regulatory agencies, the Department of Justice,
and the Congress. It concludes that the ``Register ought only to
consider recommending the proposed class if she concludes that the
access control measure would be a bar to actions that the above bodies
might take in response to policy judgments made at those agencies.
The Register appreciates that many regulatory and policy issues
pertaining to jailbreaking and smartphones fall within the competence
of other agencies, and the Register has no desire to interfere with
those agencies' jurisdiction. However, the only question before the
Register and the Librarian is whether Section 1201(a)(1)'s prohibition
on circumvention is adversely affecting the ability of users of
smartphones from engaging in noninfringing uses of the firmware on
their devices. No other agency has the power to limit the application
of the prohibition on circumvention in this (or any other) context. Any
future action by a federal agency to permit jailbreaking will be futile
without an exemption from liability under Section 1201(a)(1), but if a
class is not designated in this rulemaking, all that it will mean is
that Section 1201 cannot be used to prevent jailbreaking, without
prejudice to any other legal or regulatory authority that might limit
or prohibit jailbreaking.
On balance, the Register concludes that when one jailbreaks a
smartphone in order to make the operating system on that phone
interoperable with an independently created application that has not
been approved by the maker of the smartphone or the maker of its
operating system, the modifications that are made purely for the
purpose of such interoperability are fair uses. Case law and
Congressional enactments reflect a judgment that interoperability is
favored. The Register also finds that designating a class of works that
would permit jailbreaking for purposes of interoperability will not
adversely affect the market for or value of the copyrighted works to
the copyright owner.
Accordingly, the Register recommends that the Librarian designate
the following class of works:
Computer programs that enable wireless communication handsets
to execute software applications, where circumvention is
accomplished for the sole purpose of enabling interoperability of
such applications, when they have been lawfully obtained, with
computer programs on the telephone handset.
C. Computer programs, in the form of firmware or software, that enable
used wireless telephone handsets to connect to a wireless
telecommunications network, when circumvention is initiated by the
owner of the copy of the computer program solely in order to connect to
a wireless telecommunications network and access to the network is
authorized by the operator of the network.
In 2006, the Librarian designated a class of ``Computer programs in
the form of firmware that enable wireless telephone handsets to connect
to a wireless telephone communication network, when circumvention is
accomplished for the sole purpose of lawfully connecting to a wireless
telephone communication network,'' in order to permit the circumvention
of access controls that prevent the owner of a cellphone from switching
service on that cellphone to another wireless communication network.
The access controls in question are embedded in the mobile phone's
firmware or software and prevent the mobile phone owner from gaining
access to the settings that connect the mobile phone to a network
(e.g., Verizon's) other than the original network (e.g., AT&T's).
Beneficiaries of that designation have now requested that the Librarian
again designate a similar class of works. Representatives of wireless
communication networks have opposed the request.
As she did three years ago, the Register recognizes that the
requests fall within the zone of interest subject to this rulemaking.
That is, circumventing a mobile phone lock, without the authority of
the copyright owner, to gain access to the protected work (i.e., the
firmware) is likely actionable under Section 1201(a)(1) of the Act.
Further, a wireless carrier who is harmed by the circumvention of the
software lock may bring an action for violation of Section 1201(a)(1)
against anyone who circumvents such a technological protection measure.
The proponents of this class have presented a prima facie case that
the prohibition on circumvention has had an adverse effect on
noninfringing uses of firmware on wireless telephone handsets.
Proponents have shown that mobile phone locks prevent consumers from
legally accessing alternative wireless networks with the phone of their
choice. This is the same type of activity that was at issue when the
existing class of works was being considered in 2006.
The wireless networks asserted that by using a cellphone on another
network, an act that is not authorized
[[Page 43831]]
under their contracts, the customers infringe the exclusive right to
reproduce copies of the computer software, because use of the mobile
phones necessarily involves the making of copies in the random access
memory of the mobile phone. Moreover, they asserted that the alteration
of the computer programs in order enable the mobile phones to connect
to another network constituted the unlawful making of derivative works,
in violation of the copyright owner's exclusive right to prepare
derivative works.
Proponents of the class asserted that the owners of mobile phones
are also the owners of the copies of the computer programs on those
phones and that as owners they are entitled to exercise their
privileges under Section 117 of the Copyright Act, which gives the
owner of a copy of a computer program the privilege to make or
authorize the making of another copy or adaptation of that computer
program under certain circumstances. The wireless networks responded
that their contracts with their customers restrict the uses of the
customers' mobile phones and retain ownership of the copies of the
computer programs that are loaded onto the mobile phones and enable the
phones to operate. They also asserted those contractual restrictions
make the networks - and not the customers - the owners of the copies of
the computer programs, and therefore the privilege under Section 117 to
make copies and adaptations of computer programs does not apply because
that privilege is enjoyed only by the owner of the copy of the computer
program. They also argued that the privilege does not extend to the
customers' conduct because the making of a new copy or adaptation in
order to use the mobile phone on a network other than the original
network is not, as the statute requires, ``an essential step in the
utilization of the computer program in conjunction with a machine.``
The Register has reviewed the appropriate case law with respect to
who is the ``owner'' of a copy of a computer program for purposes of
Section 117 when a license or agreement imposes restrictions on the use
of the computer program and has concluded that the state of the law is
unclear. The Register cannot determine whether most mobile phone owners
are also the owners of the copies of the computer programs on their
mobile phones. However, based on the record in this proceeding, the
Register finds that the proponents of the class have made a prima facie
case that mobile phone owners are the owners of those copies. While the
wireless networks have made a case that many mobile phone owners may
not own the computer program copies because the wireless network's
contract with the consumer retains ownership of the copies, they have
not presented evidence that this is always the case even if their
interpretation of the law governing ownership is correct. The record
therefore leads to the conclusion that a substantial portion of mobile
phone owners also own the copies of the software on their phones.
The Register also concludes that when the owner of a mobile makes
RAM copies of the software in order to operate the phone - even if she
is operating it on another network - she is making a noninfringing use
of the software under Section 117 because the making of that copy is an
essential step in the utilization of that software in conjunction with
a machine.
Similarly, the making of modifications in the computer program in
order to enable the mobile phone to operate on another network would be
a noninfringing act under Section 117. As a general rule, anyone who
wishes to switch her mobile phone from one network to another must
alter some information embedded in the device. However, in a
substantial number of cases those alterations do not appear to
implicate Section 117 because the elimination and insertion of codes or
digits, or completely reflashing a phone, cannot be considered an
infringement of the computer program controlling the device. When
specific codes or digits are altered to identify the new network to
which the phone will connect, those minor alterations of data also do
not implicate any of the exclusive rights of copyright owners. And
complete reflashing does not even constitute circumvention of an access
control because it actually deletes the copy of the entire work that
had been protected by the access control, thereby permanently denying
access to that work.
In those cases where more substantial changes must be made to the
computer program in order to enable use of the mobile phone on another
network, those changes might implicate the exclusive right to prepare
derivative works. However, those changes would be privileged under
Section 117, which permits the making of ``a new copy or adaptation''
that is created as an essential step in the utilization of the computer
program in conjunction with a machine.
Section 1201(a)(1)(C) factors. As was the case in 2006, the
Register finds that the four factors enumerated in Section
1201(a)(1)(C)(i)-(iv) do not weigh either in favor of or against
designation of the proposed class of works. Moreover, because it
appears that the opposition to designating the proposed class is based
primarily on the desires of wireless carriers to preserve an existing
business model that has little if anything to do with protecting works
of authorship, it is appropriate to address the additional factor
(``such other factors as the Librarian considers appropriate'') set
forth in Section 1201(a)(1)(C)(v). It seems clear that the primary
purpose of the locks is to keep consumers bound to their existing
networks, rather than to protect the rights of copyright owners in
their capacity as copyright owners. This observation is not a criticism
of the mobile phone industry's business plans and practices, which may
well be justified for reasons having nothing to do with copyright law
and policy, but simply a recognition of existing circumstances. Because
there appear to be no copyright-based reasons why circumvention under
these circumstances should not be permitted, the Register recommends
that the Librarian designate a class of works similar to the class
designated in 2006.
The Register notes that the 2006 class, and the new one designated
herein, are both narrow, apply only to claims under Section 1201(a)(1),
and do not establish a general federal policy of ensuring that
customers have the freedom to switch wireless communications service
providers. The designated classes, both new and old, simply reflect a
conclusion that unlocking a mobile phone to be used on another wireless
network does not ordinarily constitute copyright infringement and that
Section 1201(a)(1), a statute intended to protect copyright interests,
should not be used to prevent mobile phone owners from engaging in such
noninfringing activity.
NTIA supported designation of a class similar to the class
designated in 2006, but proposed that while non-profit entities should
be permitted to take advantage of the exemption, commercial users
should not. The Register's recommendation, in contrast, would permit
some commercial activity, so long as it (1) involves only used
handsets, (2) is done by the owner of the copy of the computer program,
and (3) is done ``solely in order to access such a wireless
telecommunications network and access to the network is authorized by
the operator of the network.'' The Register believes that these
limitations ensure that the designation of this class will not benefit
those who engage in the type of commercial activity that is at the
heart of the objections of opponents of the proposed class: the ``bulk
resellers'' who purchase new mobile phone
[[Page 43832]]
handsets at subsidized prices and, without actually using them on the
networks of the carriers who market those handsets, resell them for
profit. The type of commercial activity that would be permitted would
be the resale of used handsets after the owners of the handsets have
used them and then given or sold them to somebody else, who then
resells them just as a used bookstore sells used books. The Register
acknowledges that NTIA's general view that the class should not extend
to any commercial activity is inconsistent with aspects of the
Register's recommendation, but believes that to the extent her
recommendation goes beyond what NTIA was willing to endorse, it does so
in a way that, in NTIA's words, ``prevents unlawful use by those that
would misuse the exemption for commercial purposes.''
However, the applicability of the proposed class to commercial
recyclers, such as the ones who had proposed the original class of
works, is limited. When the commercial recycler has made a derivative
work that is within Section 117's privilege for making ``adaptations,''
the recycler is subject to a significant limitation contained within
Section 117: such adaptations may be transferred only with the
authorization of the copyright owner. Thus, a recycler who prepares
such an adaptation may not transfer ownership of the copy of the
adapted computer program to anybody else without the authorization of
the copyright owner. On the other hand, a recycler who has not prepared
an adaptation is free to resell the mobile phone along with the copy of
the computer program contained within it.
The new class is also cabined by existing law in two important
respects. First, as with any regulation under Section 1201(a)(1)(C) and
(D), the designation of this class offers no safe harbor from liability
under Section 1201(a)(2) which strictly prohibits an entity from
offering a circumvention service. Second, a wireless carrier's ``Terms
of Purchase'' and ``Terms of Service'', which are binding contracts,
still impose use restrictions on consumers notwithstanding the
designation of this class. However, the wireless carrier must seek a
remedy by asserting a claim of breach of contract, and not a claim
under Section 1201(a)(1).
D. Video games accessible on personal computers and protected by
technological protection measures that control access to lawfully
obtained works, when circumvention is accomplished solely for the
purpose of good faith testing for, investigating, or correcting
security flaws or vulnerabilities, if:
The information derived from the security testing is used
primarily to promote the security of the owner or operator of a
computer, computer system, or computer network; and
The information derived from the security testing is used
or maintained in a manner that does not facilitate copyright
infringement or a violation of applicable law.
Professor J. Alex Halderman proposed two classes of works relating
to investigating and correcting security flaws or vulnerabilities
created or exploited by technological measures protecting certain kinds
of works. The Register concludes that Halderman has made the case for a
class pertaining to video games, but has not made the case for a
broader class pertaining to literary works, sound recordings and
audiovisual works.
In each case, Halderman qualified the scope of the proposed class
by restricting it to (1) lawfully obtained works protected by access
control measures that create or exploit security flaws or
vulnerabilities that compromise the security of personal computers, and
(2) cases where circumvention is accomplished solely for the purpose of
good faith testing, investigating, or correcting such security flaws or
vulnerabilities.
In the current proceeding, Halderman did not present any evidence
that the prohibition on circumvention is adversely affecting or is
likely, in the next three years, to adversely affect the ability to
engage in noninfringing uses of sound recordings or audiovisual works,
or of literary works except to the extent that video games may be
considered, in part, to constitute audiovisual works associated with
such sound recordings. There is no information in the record that would
justify again exempting the class designated three years ago.
However, Halderman did present evidence and legal analysis in
support of a class of works limited to video games. Under Section
102(a) of the Copyright Act, video games are ``hybrid'' in that they
fall within two statutory classes of works. Video games typically are,
in part, computer programs, which are a subset of the statutory
category of ``literary works.'' The evidence related to two types of
access controls applied to video games: Macrovision's SafeDisc software
and Sony's SecuRom software. Halderman asserted that the measures
constitute access controls because, in both cases, the measures
authenticate discs and enforce access policies.
The alleged underlying noninfringing use involved is two-fold.
First, purchasers of video games (including researchers) are engaged in
noninfringing use when they install, access, and play authorized copies
of such video games while further seeking to protect the security of
their computers. Second, researchers in lawful possession of copies of
games are engaged in noninfringing uses when they seek solely to
research and investigate whether a video game, or the technological
measure protecting it, creates security vulnerabilities or flaws.
Professor Halderman asserted that such good faith research that does
not cause or promote infringement generally constitutes fair use.
Halderman alleged that SecuROM may create security flaws or
vulnerabilities. He referred to a number of articles and class action
lawsuits suggesting that SecuROM may contain flaws or cause
vulnerabilities. He further stated that a single definitive scientific
study might quell the ``panic, protests, and litigation'' to ``what may
turn out to be nonexistent or easily reparable faults.''
Halderman also alleged that harm is caused by Macrovision's
SafeDisc. He alleged that SafeDisc was pre-installed on ``nearly every
copy of the Microsoft Windows XP and Windows 2003 operating systems,
[and that] the vulnerability affected nearly one billion PCs, two
thousand times more than the [Sony] rootkit,''`` the security
vulnerability that serviced as the factual basis for designating a
class in the last rulemaking. He claimed that the security flaw created
by SafeDisc was much more dangerous than the Sony rootkit flaw involved
in the previous rulemaking that concluded in 2006, because this flaw
allowed attackers to execute unrestricted `kernel-level' code and read
or write to any area of the hard disk or memory of the PC, thus
facilitating the complete compromise of the security of the PC.
Opponents raised three principal arguments against Halderman's
proposal. First, they argued that he provided little concrete or
documented evidence that any security flaws or vulnerabilities
associated with access control mechanisms used in connection with video
games exist. Second, they argued that there is no evidence that
research has been chilled, pointing to
[[Page 43833]]
what they called a robust ecosystem within which security experts
routinely identify such flaws, collaborate on remedies, and disseminate
information to alert computer users of the problems and them to
solutions. Third, they argued that Professor Halderman failed to
establish that the conduct at issue is prohibited by Section
1201(a)(1), since a statutory exemption (in particular, 17 U.S.C.
1201(j) might apply to the security research.
NTIA has advised the Register that he believes the record supports
designating the requested class relating to video games and other works
accessible on personal computers. NTIA believed that the proponents
have ``persuasively argued that without a research exemption, research
into all current and future vulnerabilities will be and is chilled
now,'' and concurred with the Librarian's conclusion in 2006 that the
research may not be covered completely by the existing statutory
exemptions. NTIA further believes that although the Sony Rootkit
vulnerability no longer exists, ``it seems to be a certainty that new
vulnerabilities will emerge in the next three years.''
Overall, the Register has concluded that the factors set forth in
17 U.S.C. 107 tend to strongly support a finding that such good faith
research constitutes fair use. The socially productive purpose of
investigating computer security and informing the public do not involve
use of the creative aspects of the work and are unlikely to have an
adverse effect on the market for or value of the copyrighted work
itself. The proponents established an underlying noninfringing use.
The next question is whether the prohibition is causing an adverse
effect on such noninfringing uses. The record is essentially limited to
SecuRom and SafeDisc. The evidence relating to SecuRom tends to be
highly speculative, but Professor Halderman asserted that ``this
situation has been crying out for an investigation by reputable
security researchers in order to rigorously determine the nature of the
problem that this system cause[s], and dispel this uncertainty about
exactly what's going on.'' He believed that the prohibition on
circumvention is at least in part to blame for the lack of rigorous,
independent analysis.
In contrast to SecuROM, SafeDisc has created a verifiable security
vulnerability on a large number of computers. Opponents of the proposed
class did not dispute that SafeDisc created a security vulnerability,
but they argued that the security flaw was patched by Microsoft in
2007, without the need of an exemption. However, SafeDisc was pre-
loaded on nearly every copy of Microsoft's Windows XP and Windows 2003
operating systems and was on the market for over six years before a
security researcher discovered malware exploiting the security. The
vulnerability had the capacity to affect nearly one billion PCs.
The record supports the conclusion that since the 2006 rulemaking,
substantial vulnerabilities have existed with respect to video games -
certainly with respect to SafeDisc and possibly with respect to
SecuROM. Within the same class of works, security researchers have
proposed investigation of unconfirmed allegations of security
vulnerabilities on another technological protection measure (SecureROM)
that protects access, but have expressed unwillingness to do so without
clear legal authority. Aggregating the evidentiary record, the
proponents have shown that they need to be able to fix flaws that are
identified in this class of works and they need to be able to
investigate other alleged security vulnerabilities in this class.
Opponents argued that there may be no need to designate a class in
this proceeding because circumvention may already be excused pursuant
to Section 1201(j), which provides an exemption for security testing.
However, the Register has concluded, as she did three years ago, that
it is unclear whether Section 1201(j) applies in cases where the person
engaging in security testing is not seeking to gain access to, in the
words of Section 1201(j), ``a computer, computer system, or computer
network.'' Therefore, it is appropriate to designate a class of works
in this proceeding.
Section 1201(j) does, however, influence both the decision to
recommend designation of a class and the decision on how to fashion the
class. Section 1201(j) is evidence of Congress's general concern to
permit circumvention under appropriate circumstances for purposes of
security testing, and it also is evidence of the conditions Congress
believes should be imposed on those who take advantage of an exemption
for security testing. Accordingly the Register recommends that the
Librarian designate a class of video games protected by access
controls, when circumvention is done for the purpose of good faith
testing for, investigating, or correcting security flaws or
vulnerabilities. Further refinements to the class include a requirement
that the information derived from the testing be used primarily to
promote the security of the owner or operator of a computer, computer
system, or computer network; and a requirement that that information be
used or maintained in a manner that does not facilitate copyright
infringement or a violation of applicable law.
E. Computer programs protected by dongles that prevent access due to
malfunction or damage and which are obsolete. A dongle shall be
considered obsolete if it is no longer manufactured or if a replacement
or repair is no longer reasonably available in the commercial
marketplace.
Three years ago, the Librarian designated the above-referenced
class of works, which is similar to classes of works designated in each
of the previous rulemakings. In the current proceeding the proponent of
that class, Joseph V. Montoro, Jr., on behalf of Spectrum Software,
Inc., has proposed an expanded class of works related to dongles.
Dongles are a type of hardware that attach to either the printer port
or the USB port of a computer in order to make secured software
function. Montoro stated that dongles are sold along with certain types
of software and are necessary for the user to access that software on a
computer. He further explained that in order for the dongle to operate
properly, the operating system must support the hardware and the
required device driver must be installed. Montoro submitted that there
are four situations where an exemption is necessary to rectify actual
harm: (1) when dongles become obsolete; (2) when dongles fail; (3)
where there are incompatibilities between the dongle and the operating
system, and (4) where there are incompatibilities between the dongle
and certain hardware. Montoro had stressed that his proposal is as much
about the computer ecosystem as it is about dongles, in particular. He
said that it is important to realize that the dongle, the operating
system software and the computer hardware work in tandem and that the
proposed class necessarily covers all of these parts.
Representatives of the computer software industry stated that they
do not oppose renewing the existing class of works, but object to
expanding it beyond its current terms.
As in 2006, the Register finds that the case has been made for
designation of a class of works protected by dongles. Montoro has
effectively met his burden of proof for a class relating to dongles
that are malfunctioning or damaged and that are obsolete, a point on
which there is no disagreement in the record. When the dongle no longer
functions and is obsolete, there is a substantial adverse effect on
noninfringing uses because there is no other means to access the
[[Page 43834]]
lawfully acquired software. When a dongle malfunctions or becomes
obsolete, a person lawfully entitled to access the software should be
able to rely on self-help if remedial measures are not reasonably
available in the commercial marketplace. Moreover, the record reveals
no evidence of harm to the market for, or value of, copyrighted works
protected by dongles since the designation of the original class of
works in 2000.
The class, however, should not include cases where a replacement
dongle is reasonably available or can be easily repaired. Some
copyright owners legitimately use dongles to control access to a
computer program by unauthorized users and are entitled to the full
benefit of the prohibition as long as reasonable accommodations are
offered for malfunctioning or damaged dongles. Montoro has not
demonstrated that the standard previously applied - reasonably
available in the marketplace - is insufficient to meet the needs of
users of copyrighted works whose dongles malfunction or are damaged.
Montoro also argues that the current class should be expanded to
reach situations involving incompatibility between the dongle and a new
or upgraded version of an operating system. The Register finds that he
has failed to submit cogent evidence to support an expanded class in
this context. A sufficient record would require more detail about the
precise cause of the problems, the scope of the problem, and the
noninfringing means available to resolve the problem.
The evidence presented in the record also does not support
Montoro's request to expand the class in relation to obsolete hardware,
specifically parallel ports on computers. While it appears to be the
case that parallel ports may be obsolescent, there is insufficient
evidence in the record to support the conclusion that parallel ports
are currently, or in the next three years will be, obsolete. In order
to make a case for an expanded class in relation to obsolete hardware,
Montoro would have to demonstrate that the hardware is, or is likely to
be, obsolete in the next three year period (either as a pre-installed
item or as an optional configuration), that the unavailability of this
obsolete hardware would adversely affect noninfringing uses, and that
copyright owners are not meeting the legitimate needs of existing
users.
IV. Other Classes Considered, but Not Recommended
A. Subscription based services that offer DRM-protected streaming video
where the provider has only made available players for a limited number
of platforms, effectively creating an access control that requires a
specific operating system version and/or set of hardware to view
purchased material; and Motion pictures protected by anti-access
measures, such that access to the motion picture content requires use
of a certain platform.
Two proposals sought designation of classes of works that would
allow circumvention of technological protection measures in order to
provide access to motion pictures on platforms other than those
authorized by content providers or their licensees.
Megan Carney proposed a class of works in order to allow
circumvention of DRM-protected streaming videos offered by subscription
based services, where the provider has made players available only for
a limited number of platforms. She argued that this restriction of
viewing options effectively constitutes an access control by requiring
a specific operating system version and/or set of hardware to view
purchased material. She sought to use Netflix's ``Watch Instantly''
streaming video feature, which installs digital rights management and
runs only on certain platforms of computer software and hardware.
``Watch Instantly'' is included, at no charge, in the monthly Netflix
membership, but Carney said that she is unable to use it because she
does not own a computer that operates on a compatible platform (PCs
running Windows or Apple computers with Intel chips). Carney proposed
that the Librarian designate a class or works in order to allow a user
in her situation to create a separate program to circumvent the DRM on
the streaming service system in order to