Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 65944-65964 [2015-27212]
Download as PDF
65944
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
(iv) Foreign relations or foreign activities of
the United States, including confidential
sources;
(v) Scientific, technological, or economic
matters relating to the national security;
(vi) U.S. Government programs for
safeguarding nuclear materials or facilities;
(vii) Vulnerabilities or capabilities of
systems, installations, infrastructures,
projects, plans, or protection services relating
to the national security; or
(viii) The development, production, or use
of weapons of mass destruction.
(b) [Reserved]
Dated: October 22, 2015.
Aaron Siegel,
Alternate OSD Federal Register Liaison
Officer, Department of Defense.
[FR Doc. 2015–27393 Filed 10–27–15; 8:45 am]
BILLING CODE 5001–06–P
LIBRARY OF CONGRESS
Copyright Office
I. Background
37 CFR Part 201
[Docket No. 2014–07]
Exemption to Prohibition on
Circumvention of Copyright Protection
Systems for Access Control
Technologies
U.S. Copyright Office, Library
of Congress.
ACTION: Final rule.
AGENCY:
In this final rule, the Librarian
of Congress adopts exemptions to the
provision of the Digital Millennium
Copyright Act (‘‘DMCA’’) that prohibits
circumvention of technological
measures that control access to
copyrighted works, codified in section
1201(a)(1) of title 17 of the United States
Code. As required under the statute, the
Register of Copyrights, following a
public proceeding, submitted a
Recommendation concerning proposed
exemptions to the Librarian of Congress.
After careful consideration, the
Librarian adopts final regulations based
upon the Register’s Recommendation.
DATES: Effective October 28, 2015.
FOR FURTHER INFORMATION CONTACT:
Jacqueline C. Charlesworth, General
Counsel and Associate Register of
Copyrights, by email at
jcharlesworth@loc.gov or by telephone
at 202–707–8350; Sarang V. Damle,
Deputy General Counsel, by email at
sdam@loc.gov or by telephone at 202–
707–8350; or Stephen Ruwe, Assistant
General Counsel, by email at
sruwe@loc.gov or by telephone at 202–
707–8350.
SUPPLEMENTARY INFORMATION: The
Librarian of Congress, pursuant to
Lhorne on DSK5TPTVN1PROD with RULES
SUMMARY:
VerDate Sep<11>2014
15:03 Oct 27, 2015
section 1201(a)(1) of title 17, United
States Code, has determined in this
sixth triennial rulemaking proceeding
that the prohibition against
circumvention of technological
measures that effectively control access
to copyrighted works shall not apply to
persons who engage in noninfringing
uses of certain classes of such works.
This determination is based upon the
Recommendation of the Register of
Copyrights, which was transmitted to
the Librarian on October 8, 2015.1
The below discussion summarizes the
rulemaking proceeding and Register’s
Recommendation, announces the
Librarian’s determination, and
publishes the regulatory text specifying
the exempted classes of works. A more
complete discussion of the rulemaking
process, the evidentiary record, and the
Register’s analysis can be found in the
Register’s Recommendation, which is
posted at www.copyright.gov/1201/.
Jkt 238001
A. Statutory Requirements
Congress enacted the DMCA in 1998
to implement certain provisions of the
WIPO Copyright and WIPO
Performances and Phonograms Treaties.
Among other things, title I of the DMCA,
which added a new chapter 12 to title
17 of the U.S. Code, prohibits
circumvention of technological
measures employed by or on behalf of
copyright owners to protect access to
their works. In enacting this aspect of
the law, Congress observed that
technological protection measures
(‘‘TPMs’’) can ‘‘support new ways of
disseminating copyrighted materials to
users, and . . . safeguard the
availability of legitimate uses of those
materials by individuals.’’ 2
Section 1201(a)(1) provides in
pertinent part that ‘‘[n]o person shall
circumvent a technological measure that
effectively controls access to a work
protected under [title 17].’’ Under the
statute, to ‘‘circumvent a technological
measure’’ means ‘‘to descramble a
scrambled work, to decrypt an
encrypted work, or otherwise to avoid,
bypass, remove, deactivate, or impair a
technological measure, without the
authority of the copyright owner.’’ 3 A
technological measure that ‘‘effectively
1 Register of Copyrights, Section 1201
Rulemaking: Sixth Triennial Proceeding to
Determine Exemptions to the Prohibition on
Circumvention, Recommendation of the Register of
Copyrights (Oct. 2015) (‘‘Register’s
Recommendation’’).
2 Staff of H. Comm. on the Judiciary, 105th Cong.,
Section-by-Section Analysis of H.R. 2281 as Passed
by the United States House of Representatives on
August 4, 1998, at 6 (Comm. Print 1998).
3 17 U.S.C. 1201(a)(3)(A).
PO 00000
Frm 00064
Fmt 4700
Sfmt 4700
controls access to a work’’ is one that
‘‘in the ordinary course of its operation,
requires the application of information,
or a process or a treatment, with the
authority of the copyright owner, to gain
access to the work.’’ 4
Section 1201(a)(1), however, also
includes what Congress characterized as
a ‘‘fail-safe’’ mechanism,5 which
requires the Librarian of Congress,
following a rulemaking proceeding, to
publish any class of copyrighted works
as to which the Librarian has
determined that noninfringing uses by
persons who are users of a copyrighted
work are, or are likely to be, adversely
affected by the prohibition against
circumvention in the succeeding threeyear period, thereby exempting that
class from the prohibition for that
period.6 The Librarian’s determination
to grant an exemption is based upon the
recommendation of the Register of
Copyrights, who conducts the
rulemaking proceeding.7 Congress
directed the Register, in turn, to consult
with the Assistant Secretary for
Communications and Information of the
Department of Commerce, who oversees
the National Telecommunications and
Information Administration (‘‘NTIA’’),
in the course of formulating her
recommendation.8
The primary responsibility of the
Register and the Librarian in the
rulemaking proceeding is to assess
whether the implementation of access
controls impairs the ability of
individuals to make noninfringing uses
of copyrighted works within the
meaning of section 1201(a)(1). To do
this, the Register develops a
comprehensive administrative record
using information submitted by
interested members of the public, and
makes recommendations to the
Librarian concerning whether
exemptions are warranted based on that
record.
Under the statutory framework, the
Librarian, and thus the Register, must
consider ‘‘(i) the availability for use of
copyrighted works; (ii) the availability
for use of works for nonprofit archival,
preservation, and educational purposes;
(iii) the impact that the prohibition on
the circumvention of technological
measures applied to copyrighted works
has on criticism, comment, news
reporting, teaching, scholarship, or
research; (iv) the effect of circumvention
of technological measures on the market
for or value of copyrighted works; and
4 17
U.S.C. 1201(a)(3)(B).
H.R. Rep. No. 105–551, pt. 2, at 36 (1998).
6 See 17 U.S.C. 1201(a)(1).
7 17 U.S.C. 1201(a)(1)(C).
8 Id.
5 See
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
(v) such other factors as the Librarian
considers appropriate.’’ 9 As noted
above, the Register must also consult
with the Assistant Secretary who
oversees NTIA, and report and comment
on his views, in providing her
Recommendation. Upon receipt of the
Recommendation, the Librarian is
responsible for promulgating the final
rule setting forth any exempted classes
of works.
Significantly, exemptions adopted by
rule under section 1201(a)(1) apply only
to the conduct of circumventing a
technological measure that controls
access to a copyrighted work. Other
parts of section 1201, by contrast,
address the manufacture and provision
of—or ‘‘trafficking’’ in—products and
services designed for purposes of
circumvention. Section 1201(a)(2) bars
trafficking in products and services that
are used to circumvent technological
measures that control access to
copyrighted works (for example, a
password needed to open a media
file),10 while section 1201(b) bars
trafficking in products and services used
to circumvent technological measures
that protect the exclusive rights of the
copyright owner in their works (for
example, technology that prevents the
work from being reproduced).11 The
Librarian of Congress has no authority
to adopt exemptions for the antitrafficking prohibitions contained in
section 1201(a)(2) or (b).12
More broadly, activities conducted
under the regulatory exemptions must
still comply with other applicable laws,
including non-copyright provisions.
Thus, while an exemption may
specifically reference other laws of
particular concern, any activities
conducted under an exemption must be
otherwise lawful.
Also significant is the fact that the
statute contains certain permanent
exemptions to permit specified uses.
These include: Section 1201(d), which
exempts certain activities of nonprofit
libraries, archives, and educational
institutions; section 1201(e), which
exempts ‘‘lawfully authorized
investigative, protective, information
security, or intelligence activity’’ of a
state or the federal government; section
1201(f), which exempts certain ‘‘reverse
engineering’’ activities to facilitate
interoperability; section 1201(g), which
exempts certain types of research into
encryption technologies; section
1201(h), which exempts certain
activities to prevent the ‘‘access of
minors to material on the Internet’’;
section 1201(i), which exempts certain
activities ‘‘solely for the purpose of
preventing the collection or
dissemination of personally identifying
information’’; and section 1201(j),
which exempts certain acts of ‘‘security
testing’’ of computers and computer
systems.
B. The Unlocking Consumer Choice and
Wireless Competition Act
In 2014, Congress enacted the
Unlocking Consumer Choice and
Wireless Competition Act (‘‘Unlocking
Act’’), effective as of August 1, 2014.13
The Unlocking Act did three things.
First, it replaced the exemption adopted
in the 2012 triennial proceeding to
enable certain wireless telephone
handsets (i.e., cellphones) to connect to
wireless communication networks—a
process commonly known as cellphone
‘‘unlocking’’—with a broader version of
the exemption adopted by the Librarian
in 2010. Second, the legislation
provided that the circumvention
permitted under the reinstated 2010
exemption, as well as any future
exemptions to permit wireless
telephone handsets or other wireless
devices to connect to wireless
telecommunications networks, may be
initiated by the owner of the handset or
device, by another person at the
direction of the owner, or by a provider
of commercial mobile radio or data
services to enable such owner or a
family member to connect to a wireless
network when authorized by the
network operator.14 This directive is
permanent, and is now reflected in the
relevant regulations.15 Third, the
legislation directed the Librarian of
Congress to consider as part of the
current triennial proceeding whether to
‘‘extend’’ the cellphone unlocking
exemption ‘‘to include any other
category of wireless devices’’ based
upon the recommendation of the
Register, who in turn is to consult with
the Assistant Secretary.16 Accordingly,
as part of this rulemaking proceeding,
9 Id.
Lhorne on DSK5TPTVN1PROD with RULES
10 17
U.S.C. 1201(a)(2).
U.S.C. 1201(b).
12 See 17 U.S.C. 1201(a)(1)(E) (‘‘Neither the
exception under subparagraph (B) from the
applicability of the prohibition contained in
subparagraph (A), nor any determination made in
a rulemaking conducted under subparagraph (C),
may be used as a defense in any action to enforce
any provision of this title other than this
paragraph.’’).
11 17
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
13 Public Law 113–144, 128 Stat. 1751 (2014).
Subsequently, the Librarian adopted regulatory
amendments to reflect the new legislation. See
Exemption to Prohibition on Circumvention of
Copyright Protection Systems for Wireless
Telephone Handsets, 79 FR 50552 (Aug. 25, 2014)
(codified at 37 CFR 201.40(b)(3), (c)).
14 Unlocking Act sec. 2(a), (c).
15 See 79 FR at 50554; see also 37 CFR 201.40(c).
16 Unlocking Act sec. 2(b).
PO 00000
Frm 00065
Fmt 4700
Sfmt 4700
65945
the Copyright Office solicited and
evaluated several proposed unlocking
exemptions for devices other than
cellphones, as addressed in Proposed
Classes 12 through 15 below.
C. Rulemaking Standards
In adopting the DMCA, Congress
imposed legal and evidentiary
requirements for the section 1201
rulemaking proceeding, as discussed in
greater detail in the Register’s
Recommendation.17 Those who seek an
exemption from the prohibition on
circumvention bear the burden of
establishing that the requirements for
granting an exemption have been
satisfied by a preponderance of the
evidence. In addition, the basis for an
exemption must be established de novo
in each triennial proceeding. That said,
however, where a proponent is seeking
the readoption of an existing exemption,
it may attempt to satisfy its burden by
demonstrating that the conditions that
led to the adoption of the prior
exemption continue to exist today (or
that new conditions exist to justify the
exemption). Assuming the proponent
succeeds in making such a
demonstration, it is incumbent upon
any opponent of that exemption to rebut
such evidence by showing that the
exemption is no longer justified.
To establish a case for an exemption,
proponents must show at a minimum
(1) that uses affected by the prohibition
on circumvention are or are likely to be
noninfringing; and (2) that as a result of
a technological measure controlling
access to a copyrighted work, the
prohibition is causing, or in the next
three years is likely to cause, an adverse
impact on those uses. In addition, the
Librarian must also examine the
statutory factors listed in section
1201(a)(1): (1) The availability for use of
copyrighted works; (2) the availability
for use of works for nonprofit archival,
preservation, and educational purposes;
(3) the impact that the prohibition on
the circumvention of technological
measures applied to copyrighted works
has on criticism, comment, news
reporting, teaching, scholarship, or
research; (4) the effect of circumvention
of technological measures on the market
for or value of copyrighted works; and
(5) such other factors as the Librarian
considers appropriate. In some cases,
weighing these factors requires the
consideration of the benefits that the
technological measure brings with
respect to the overall creation and
dissemination of works in the
marketplace, in addition to any negative
impact.
17 See
E:\FR\FM\28OCR1.SGM
Register’s Recommendation at 13–18.
28OCR1
65946
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
Finally, when granting an exemption,
section 1201(a)(1) specifies that the
exemption adopted as part of this
rulemaking must be defined based on ‘‘a
particular class of works.’’ 18 Among
other things, the determination of the
appropriate scope of a ‘‘class of works’’
recommended for exemption may also
take into account the adverse effects an
exemption may have on the market for
or value of copyrighted works.
Accordingly, ‘‘it can be appropriate to
refine a class by reference to the use or
user in order to remedy the adverse
effect of the prohibition and to limit the
adverse consequences of an
exemption.’’ 19
II. History of the Sixth Triennial
Proceeding
As the Register explains in the
Recommendation, the administrative
process employed in the rulemaking
was revised for this triennial
proceeding. In particular, the Copyright
Office implemented certain procedural
changes to make the process more
accessible and understandable to the
public, allow greater opportunity for
participants to coordinate their efforts,
encourage participants to submit
effective factual and legal support for
their positions, and reduce
administrative burdens on both the
participants and the Office. Among
other things, the procedural changes
included providing commenters with
recommended template forms to use
when submitting comments, and
requiring commenters to submit
separate comments for each proposed
class.
On September 17, 2014, the Copyright
Office published a Notice of Inquiry
(‘‘NOI’’) in the Federal Register to
initiate the sixth triennial rulemaking
proceeding.20 The NOI invited
interested parties to submit petitions for
proposed exemptions that set forth the
essential elements of the exemption.
The Office received forty-four petitions
for proposed exemptions in response to
the NOI.
Next, on December 12, 2014, the
Office issued a Notice of Proposed
Rulemaking (‘‘NPRM’’) that reviewed
and grouped the proposed exemptions
set forth in the petitions.21 In the NPRM,
18 17
U.S.C. 1201(a)(1)(B).
of the Register of Copyrights
in RM 2005–11, Rulemaking on Exemptions from
Prohibition on Circumvention of Copyright
Protection Systems for Access Control Technologies
19 (Nov. 17, 2006).
20 Exemption to Prohibition on Circumvention of
Copyright Protection Systems for Access Control
Technologies, 79 FR 55687 (Sept. 17, 2014)
(‘‘NOI’’).
21 Exemption to Prohibition on Circumvention of
Copyright Protection Systems for Access Control
Lhorne on DSK5TPTVN1PROD with RULES
19 Recommendation
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
the Copyright Office concluded that
three of the petitions sought exemptions
that could not be granted as a matter of
law, and declined to put those proposals
forward for public comment.22 The
Office grouped the remaining proposed
exemptions into twenty-seven proposed
classes of works. In some cases,
overlapping proposals were merged into
a single combined proposed class. In
other cases, individual proposals that
encompassed multiple proposed uses
were subdivided into multiple classes to
aid in the process of review. The Office
then provided detailed guidance on the
submission of comments, including a
number of specific legal and factual
areas of interest with respect to each
proposed class.
The Office received nearly 40,000
comments in response to the NPRM, the
vast majority of which consisted of
relatively short statements of support or
opposition without substantial legal
argument or supporting evidence. A
number of the longer submissions
included multimedia evidence to
illustrate points made in the written
comments.
After receiving and studying the
written comments, the Office held seven
days of public hearings: In Los Angeles,
at the UCLA School of Law, from May
19 to 21, 2015; and in Washington, DC,
at the Library of Congress, from May 26
to 29, 2015. The Office heard testimony
from sixty-three witnesses at the
hearings, and received additional
multimedia evidence. After the
hearings, the Office issued a number of
follow-up questions to participants, and
received responses that have been made
part of the administrative record.
As observed by various commenting
parties, certain of the proposed
exemptions presented issues potentially
of concern to the Department of
Transportation (‘‘DOT’’), the
Environmental Protection Agency
(‘‘EPA’’), and the Food and Drug
Administration (‘‘FDA’’), and perhaps
other regulatory agencies as well. The
Copyright Office therefore sent letters to
DOT, EPA and FDA informing them of
Technologies, 79 FR 73856, 73859 (Dec. 12, 2014)
(‘‘NPRM’’).
22 NPRM, 79 FR at 73859. Each of these petitions
sought to permit circumvention of any and all
TPMs that constituted ‘‘digital rights management’’
with respect to unspecified types of copyrighted
works for the purpose of engaging in unidentified
personal and/or consumer uses. Id. The Office
explained that these proposed exemptions ran afoul
of the statutory requirement that ‘‘any exemptions
adopted as part of this rulemaking must be defined
based on ‘a particular class of works.’ ’’ Id. (quoting
17 U.S.C. 1201(a)(1)(B) (emphasis added)). The
Office thus concluded that ‘‘the sweeping type of
exemption proposed by these three petitions’’ could
not be granted consistent with the standards of
section 1201(a)(1). Id.
PO 00000
Frm 00066
Fmt 4700
Sfmt 4700
the pendency of the rulemaking
proceeding in case they wished to
comment on the proposals. In response
to these letters, the Office received
responses from those agencies, and also
from the California Air Resources Board
(‘‘California ARB’’), which are also
included in the record.
Throughout this triennial proceeding,
as required under section 1201(a)(1), the
Register has consulted with NTIA. In
addition to providing procedural and
substantive input throughout the
rulemaking process, NTIA was
represented along with Copyright Office
staff at the public hearings held in Los
Angeles and Washington, DC NTIA
formally communicated its views on
each of the proposed exemptions in
recommendations delivered to the
Register on September 18, 2015. NTIA’s
recommendations can be viewed at
copyright.gov/1201/2015/2015_NTIA_
Letter.pdf.
III. Summary of Register’s
Recommendation
A. Designated Classes
Based upon the record in this
proceeding, the Register of Copyrights
recommends that the Librarian
determine that the classes of works
described below be exempt from the
prohibition against circumvention of
technological measures set forth in
section 1201(a)(1):
1. Proposed Classes 1 to 7: Audiovisual
Works—Educational and Derivative
Uses 23
Proponents of Proposed Classes 1
through 7 share the desire to circumvent
technological protection measures
employed on DVDs, Blu-ray discs and/
or by various online streaming services
to access motion pictures—a category
under the Copyright Act that includes
television programs and videos—in
order to engage in noninfringing uses.
Past rulemakings have granted
exemptions relating to uses of motion
picture excerpts for commentary or
criticism by college and university
faculty and staff and by kindergarten
through twelfth-grade educators, as well
as in noncommercial videos,
documentary films, and nonfiction
multimedia e-books offering film
analysis. Past exemptions have been
limited to circumvention of DVDs,
online distribution services, and as a
result of using screen-capture
technology.
23 The Register’s analysis and conclusions for
these classes, including citations to the record and
relevant legal authority, can be found in the
Recommendation at 24–106.
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
The petitions filed in this rulemaking
sought to readopt and to some extent
expand the previously granted
exemptions, including to encompass
Blu-ray discs (on the ground that a highdefinition format is required for certain
uses), to access audiovisual works that
may not be motion pictures (such as
video games), to permit the use of more
than ‘‘short portions’’ of motion picture
excerpts, and to extend to all ‘‘fair uses’’
rather than limiting the uses to criticism
or comment. Some proponents sought to
expand filmmaking uses to include
narrative (or fictional) film, in addition
to documentaries. Some proposals were
focused on expanding the category of
potential users of an exemption, such as
to uses by museums, libraries and
nonprofits, or by students and faculty
participating in massive online open
courses (‘‘MOOCs’’). The Copyright
Office grouped these proposals into
seven classes.
Proposed Class 1: This proposed class
would allow college and university faculty
and students to circumvent access controls
on lawfully made and acquired motion
pictures and other audiovisual works for
purposes of criticism and comment.
Class 1 was proposed by Professor
Peter Decherney, the College Art
Association, the International
Communication Association, and the
Society for Cinema and Media Studies
(collectively, ‘‘Joint Educators’’) to
allow, for example, film studies
professors to circumvent DVDs in order
to use motion picture clips in class
lectures. A class covering such uses was
adopted in the 2010 and 2012
rulemakings. Joint Educators asked that
the exemption be expanded to include
the ability to circumvent Blu-ray discs,
to remove the limitation to ‘‘short
portions’’ of motion picture excerpts,
and to broaden the class to cover all
‘‘audiovisual works’’ for all
‘‘educational purposes.’’
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 2: This proposed class
would allow kindergarten through twelfthgrade educators and students to circumvent
access controls on lawfully made and
acquired motion pictures and other
audiovisual works for educational purposes.
Petitions for Proposed Class 2 were
submitted by Professor Renee Hobbs
and the Library Copyright Alliance
(‘‘LCA’’), to allow, for example, a high
school teacher to circumvent DVDs of
various adaptations of Shakespeare’s
works in order to create a compilation
of clips demonstrating the lasting
influence of these works. Hobbs and
LCA requested that the existing
exemption for grades K–12 be expanded
to include student uses rather than only
uses by educators, to allow
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
circumvention of Blu-ray discs, to
remove the limitation to ‘‘short
portions’’ of works, and to broaden the
class to cover all ‘‘audiovisual works’’
for all ‘‘educational purposes.’’
Proposed Class 3: This proposed class
would allow students and faculty
participating in massive online open courses
(‘‘MOOCs’’) to circumvent access controls on
lawfully made and acquired motion pictures
and other audiovisual works for purposes of
criticism and comment.
Joint Educators proposed Class 3,
essentially seeking to expand the
exemption for college and university
faculty and students in Class 1 to
include MOOCs, or online distance
education courses offered on a broad
scale. The exemption would, for
example, allow a professor preparing an
online lecture about the evolution of
Chinese society to circumvent access
controls in order to incorporate video
clips documenting Chinese history and
geography. Joint Educators’ proposal
included the ability to circumvent Bluray discs, to permit use of more than
‘‘short portions’’ of motion picture
excerpts, and to allow use of all
‘‘audiovisual works’’ for all
‘‘educational purposes.’’ Joint Educators
contended that the prohibition on
circumvention of TPMs is inhibiting the
introduction of certain types of courses,
such as film studies, on MOOC
platforms.
Proposed Class 4: This proposed class
would allow educators and learners in
libraries, museums and nonprofit
organizations to circumvent access controls
on lawfully made and acquired motion
pictures and other audiovisual works for
educational purposes.
Professor Hobbs proposed Class 4 to
allow, for example, educators in a
community center adult education
program to circumvent access controls
in order to create video clips for
purposes of discussing the portrayal of
African-American women in a popular
television show. The proposal
encompassed ‘‘audiovisual works’’ for
all ‘‘educational uses,’’ as well as the
ability to circumvent Blu-ray discs.
Hobbs expressed concern that the
prohibition on circumvention prevents
participants in digital and media
literacy programs in informal learning
settings from engaging in projects
similar to those conducted on college
and university campuses.
Proposed Class 5: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
motion pictures used in connection with
multimedia e-book authorship.
Class 5 was jointly proposed by
Authors Alliance and Bobette Buster to
PO 00000
Frm 00067
Fmt 4700
Sfmt 4700
65947
allow, for example, a sound editor and
e-book author to circumvent DVDs or
Blu-ray discs to incorporate brief film
excerpts in an e-book entitled Listening
to Movies. Proponents requested
renewal of the previously granted
exemption, and expansion of that
exemption to encompass any genre of
multimedia e-book (as opposed to uses
only in nonfiction multimedia e-books
offering film analysis), to allow
circumvention of Blu-ray discs, to
remove the limitation to ‘‘short
portions’’ of motion picture excerpts,
and to broaden the class to cover all
‘‘audiovisual works.’’ In general,
proponents argued that the prohibition
on circumvention hinders e-book
authors’ ability to criticize and comment
on audiovisual works, some of which
may only be accessible through DVD,
Blu-ray or digitally transmitted sources.
Proposed Class 6: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
motion pictures for filmmaking purposes.
Class 6 was proposed by the
International Documentary Association,
Film Independent, Kartemquin
Educational Films, Inc., and National
Alliance for Media Arts and Culture
(collectively, ‘‘Joint Filmmakers’’) to
allow, for example, filmmakers to
circumvent access controls on material
streamed online in order to incorporate
excerpts of news footage into
documentaries. The proposal sought
readoption of the existing exemption for
documentary filmmaking uses, and its
expansion to include narrative (or
fictional) films, to permit circumvention
of Blu-ray discs, and to remove the
limitation to short portions of works.
Joint Filmmakers stressed that much
material is only available on DVD, Bluray and digitally transmitted video, and
that circumvention of Blu-ray discs is
necessary because, among other things,
distribution standards require films to
incorporate clips of high-definition
quality.
Proposed Class 7: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
audiovisual works for the sole purpose of
extracting clips for inclusion in
noncommercial videos that do not infringe
copyright.
Class 7 was proposed by Electronic
Frontier Foundation (‘‘EFF’’) and the
Organization for Transformative Works.
Proponents sought to permit, for
example, a fan of James Bond films to
circumvent access controls on DVDs of
these films in order to incorporate brief
excerpts into a noncommercial video
commenting on the portrayal of female
characters in those films. The proposal
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
65948
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
sought renewal of the existing
exemption, and expansion of that
exemption to Blu-ray discs and all
‘‘noninfringing’’ or ‘‘fair’’ uses.
Proponents argued that the existing
exemption has resulted in the creation
of a wide variety of new, noninfringing
works, and expansion of that exemption
to Blu-ray discs is necessary because,
among other things, there is a significant
amount of material that can only be
found in that format.
For each exemption, proponents
argued that the requested exemption
would facilitate fair uses of the accessed
works—for example, because of the
educational nature of the uses, or
because it would permit the creation of
a new work of authorship providing
commentary on the underlying work.
Specifically, Joint Educators argued that
teaching, criticism, and commentary are
enumerated as favored uses under
section 107 and therefore, that the
proposed uses in Classes 1 and 3 for
colleges, universities, and MOOCs were
highly likely to be fair. For Class 2,
Hobbs provided examples of educators
using film clips as teaching tools in
connection with media literacy, history,
literature, and film theory, and of
students using excerpts in connection
with National History Day projects,
arguing that these uses were fair. Hobbs
also contended that out-of-classroom
educational programs should be able to
make the same uses in Class 4.
Proponents of Class 5 argued that uses
of excerpts of motion picture clips in
multimedia e-books intended for
educational purposes are likely to be
fair, citing examples of actual or
prospective uses of motion picture
excerpts in multimedia e-books for
purposes of film criticism or analysis.
For Class 6, Joint Filmmakers stated that
the proposed uses in both documentary
and narrative films are noninfringing
fair uses that provide criticism and
commentary, education about, and
reporting on news and current events—
activities that Congress has explicitly
identified as fair uses. Finally, Class 7
proponents asserted that the purposes
and character of noncommercial videos
are highly transformative, and in
support, submitted scholarly analysis of
remix videos and evidence relating to
fan video remixes that purportedly
criticize and recontextualize the
underlying narrative works.
For all of these audiovisual classes,
the Office received no opposition to the
renewal of the current exemptions;
instead, opponents opposed expansion
of those exemptions. The same parties
opposed all seven classes—Joint
Creators (representing the Motion
Picture Association of America, the
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
Entertainment Software Association
(‘‘ESA’’) and the Recording Industry
Association of America), DVD Copy
Control Association, and the Advanced
Access Content System Licensing
Administrator (‘‘AACS LA’’). Opponents
voiced parallel concerns across most of
these audiovisual classes. In general,
they contended that there are viable
alternatives to circumvention that are
adequate for many of the proposed uses,
including clip licensing, screen-capture
technology, streaming platforms such as
TV Everywhere, disc-to-digital services,
and digital rights libraries like
UltraViolet. With respect to proposals to
expand the exemptions to include Bluray discs, AACS LA and Joint Creators
argued that the authorized
circumvention of DVDs or online
material provides a ready alternative to
obtain material of sufficiently high
quality for all the proposed uses.
Opponents also urged that any
expansion of the existing exemptions
would likely harm the market for DVDs,
Blu-ray discs, and other licensed uses.
Beyond these general points,
opponents also made specific arguments
concerning the individual proposed
classes. In Class 1, opponents urged that
alternatives to circumvention, including
screen capture, were adequate for
classroom uses outside film studies
classes. In Class 2, opponents argued
that the record lacks persuasive
examples of K–12 student projects that
require circumvention and that the
record did not show a need to access
material on Blu-ray discs. Opponents
opposed granting any exemption for
MOOCs in Class 3 arguing, among other
things, that the uses are not likely to be
noninfringing because the exemption
would allow widespread distribution of
works over the internet. With respect to
museum, library or nonprofit
educational programs in Class 4,
opponents argued, among other things,
that proponents had failed adequately to
demonstrate specific adverse effects
flowing from the prohibition on
circumvention. In Class 5, opponents
urged that no examples were presented
to support expanding the exemption to
fictional e-books or to circumvention of
Blu-ray discs. In Class 6, opponents
asserted that an exemption for fictional
films would negatively impact the
existing market for licensing of film
clips. Finally, in Class 7, opponents
argued that screen-capture software is
an adequate alternative to proposed uses
of Blu-ray material in noncommercial
remix videos and that the existing
regulatory language should be refined so
as not to overlap with other classes
addressing educational uses.
PO 00000
Frm 00068
Fmt 4700
Sfmt 4700
NTIA recommended renewing the
current exemptions for educational and
derivative uses, and expanding those
exemptions in several respects. As a
general matter, NTIA proposed that all
of the exemptions should encompass
‘‘motion pictures and similar
audiovisual works’’ on DVDs and Bluray discs, or obtained via online
distribution services. NTIA rejected
proposals to encompass all
‘‘noninfringing’’ or ‘‘fair uses,’’ instead
recommending a more tailored
approach. In Class 1, NTIA
recommended an exemption for
educational uses by college and
university faculty and students, without
limiting it to film studies and other
courses requiring close analysis of
works, although it did not explain why
elimination of that distinction was
warranted. In Class 2, NTIA
recommended an exemption for K–12
educators, and for students in grades 6–
12 engaging in video projects actively
overseen by an instructor. In Class 3,
NTIA recommended an exemption for
MOOCs involving film and media
analysis, but not for students enrolled in
such MOOCs. In Class 4, NTIA
recommended an exemption for
instructors and students engaged in
digital media and literacy programs in
libraries, museums, and nonprofit
organizations with an educational
mission. In Classes 5 and 7, NTIA
proposed renewing the exemptions for
nonfiction or educational multimedia ebooks offering film analysis, and for
noncommercial videos, respectively,
and expanding them to include Blu-ray
discs, as with the other classes. Finally,
in Class 6, NTIA proposed an exemption
both for documentary films and for
‘‘[n]arrative films portraying real events,
where the prior work is used for its
biographical or historically significant
nature.’’
In general, the Register recommended
granting exemptions for almost all of
these classes; in each case, the Register
concluded that the uses are likely to be
fair, that alternatives to circumvention
were inadequate, and that the statutory
factors taken together weighed in favor
of the exemption. In each of Classes 1
through 7, the Register recommended
retaining the requirement in the current
exemptions that only ‘‘short portions’’
of works be used for purposes of
‘‘criticism or comment.’’ The Register
explained that broader exemptions—
covering longer portions for purposes of
all ‘‘fair’’ or ‘‘noninfringing’’ uses—were
unsupported by the record. The Register
also explained that the exemptions
should provide reasonable guidance to
the public in terms of what uses are
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
likely to be fair, while at the same time
mitigating undue consequences for
copyright owners. The Register also
found the record to not support an
exemption for ‘‘audiovisual works,’’ as
opposed to the somewhat narrower
category of ‘‘motion pictures,’’ because
proponents had failed to demonstrate a
need to circumvent non-motion-picture
audiovisual works (such as video
games) in any of the proposed classes.
With respect to Class 1 in particular,
the Register recommended granting an
exemption for circumvention of TPMs
on DVDs, Blu-ray discs, and digital
transmissions of motion pictures by
college and university faculty and
students engaged in film studies classes
or other courses requiring close analysis
of film and media excerpts. The Register
recommended an exemption to facilitate
use of screen-capture technology for all
types of courses, to address the
possibility of circumvention when using
this technology. The Register reasoned
that this class (and Class 2) should
continue to distinguish between
purposes requiring close analysis of film
and media excerpts and more general
educational uses, on the ground that
screen-capture technology is an
adequate substitute for the latter uses.
With respect to Class 2, the Register
recommended granting an exemption
limited to circumvention of DVDs and
digital transmissions for educators in
grades K–12, including accredited
general educational development
(‘‘GED’’) programs, in film studies or
other courses requiring close analysis of
film and media excerpts. The Register
found, however, that proponents
submitted no examples where Blu-ray
quality or Blu-ray-unique content was
required for uses in K–12 classrooms.
The Register also recommended an
exemption to facilitate use of screencapture technologies by educators in all
types of courses. The Register found the
evidentiary record of proposed uses by
K–12 students to be insufficiently well
developed to recommend an exemption
for DVDs, digital transmissions, or Bluray discs because screen-capture
software was likely to provide a ready
alternative for those uses. Accordingly,
the Register recommended a screencapture exemption to facilitate uses by
K–12 students.
With respect to Class 3, the Register
recommended granting an exemption
for circumvention of TPMs on DVDs,
Blu-ray discs, and digital transmissions
of motion pictures by faculty of MOOCs
involving film studies or other courses
requiring close analysis of film and
media excerpts, under specified
conditions borrowed from the TEACH
Act, codified at 17 U.S.C. 110(2). The
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
Register explained that key elements of
the TEACH Act—such as the
requirements that uses be limited to
nonprofit educational institutions and
transmissions be limited to enrolled
students—should be incorporated into
the exemption to ensure that the
exemption is appropriately limited. The
Register further found that the record
did not support an exemption for
student uses.
With respect to Class 4, the Register
concluded that the record did not
support an exemption permitting
circumvention of DVDs, Blu-ray discs,
or digital transmissions in connection
with after-school or adult education
media literacy programs (apart from
GED programs). The Register found that
the proposed uses in the record could be
satisfied via screen capture, and thus
recommended an exemption to facilitate
uses of screen-capture software.
With respect to Classes 5 to 7, the
Register recommended granting an
exemption for circumvention of TPMs
on DVDs, Blu-ray discs, and digital
transmissions of motion pictures for use
in nonfiction multimedia e-books
offering film analysis, in documentary
filmmaking, and in noncommercial
videos. The Register also recommended
an exemption to facilitate use of screencapture technologies for these uses. For
the multimedia e-books exemption
(Class 5), the Register recommended
maintaining the limitation to e-books
offering film analysis, finding that the
record did not support an exemption for
other uses. With respect to the
filmmaking exemption (Class 6), the
Register could not conclude, based on
the record, that the use of motion
picture clips in narrative films was, on
balance, likely to be noninfringing,
especially in light of the potential
effects on existing licensing markets for
motion picture excerpts. Finally, in
considering the noncommercial video
exemption (Class 7), the Register
rejected proponents’ suggestion to
expand the exemption to encompass
‘‘primarily noncommercial’’ videos, as
well as opponents’ suggestion to narrow
the exemption to certain specified
categories of noncommercial videos,
finding neither change to be necessary.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Motion pictures (including television
shows and videos), as defined in 17 U.S.C.
101, where circumvention is undertaken
solely in order to make use of short portions
of the motion pictures for the purpose of
criticism or comment in the following
instances:
(i) For use in documentary filmmaking,
PO 00000
Frm 00069
Fmt 4700
Sfmt 4700
65949
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) Where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, on a Blu-ray
disc protected by the Advanced Access
Control System, or via a digital transmission
protected by a technological measure, and
where the person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(ii) For use in noncommercial videos
(including videos produced for a paid
commission if the commissioning entity’s use
is noncommercial),
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) Where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, on a Blu-ray
disc protected by the Advanced Access
Control System, or via a digital transmission
protected by a technological measure, and
where the person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(iii) For use in nonfiction multimedia ebooks offering film analysis,
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) Where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, on a Blu-ray
disc protected by the Advanced Access
Control System, or via a digital transmission
protected by a technological measure, and
where the person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(iv) By college and university faculty and
students, for educational purposes,
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) In film studies or other courses
requiring close analysis of film and media
excerpts where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, on a Blu-ray
disc protected by the Advanced Access
Control System, or via a digital transmission
protected by a technological measure, and
where the person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(v) By faculty of massive open online
courses (MOOCs) offered by accredited
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
65950
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
nonprofit educational institutions to
officially enrolled students through online
platforms (which platforms themselves may
be operated for profit), for educational
purposes, where the MOOC provider through
the online platform limits transmissions to
the extent technologically feasible to such
officially enrolled students, institutes
copyright policies and provides copyright
informational materials to faculty, students
and relevant staff members, and applies
technological measures that reasonably
prevent unauthorized further dissemination
of a work in accessible form to others or
retention of the work for longer than the
course session by recipients of a transmission
through the platform, as contemplated by 17
U.S.C. 110(2),
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) In film studies or other courses
requiring close analysis of film and media
excerpts where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, on a Blu-ray
disc protected by the Advanced Access
Control System, or via a digital transmission
protected by a technological measure, and
where the person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(vi) By kindergarten through twelfth-grade
educators, including of accredited general
educational development (GED) programs,
for educational purposes,
(A) Where the circumvention is undertaken
using screen-capture technology that appears
to be offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted, or
(B) In film studies or other courses
requiring close analysis of film and media
excerpts where the motion picture is lawfully
made and acquired on a DVD protected by
the Content Scramble System, or via a digital
transmission protected by a technological
measure, and where the person engaging in
circumvention reasonably believes that
screen-capture software or other noncircumventing alternatives are unable to
produce the required level of high-quality
content;
(vii) By kindergarten through twelfth-grade
students, including those in accredited
general educational development (GED)
programs, for educational purposes, where
the circumvention is undertaken using
screen-capture technology that appears to be
offered to the public as enabling the
reproduction of motion pictures after content
has been lawfully acquired and decrypted;
and
(viii) By educators and participants in
nonprofit digital and media literacy programs
offered by libraries, museums and other
nonprofit entities with an educational
mission, in the course of face-to-face
instructional activities for educational
purposes, where the circumvention is
undertaken using screen-capture technology
that appears to be offered to the public as
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
enabling the reproduction of motion pictures
after content has been lawfully acquired and
decrypted.
2. Proposed Class 9: Literary Works
Distributed Electronically—Assistive
Technologies 24
Proponents of Proposed Class 9 seek
to allow circumvention of technological
measures protecting literary works
distributed in electronic form (including
e-books, digital textbooks, and PDF
articles) so that such works can be
accessed by persons who are blind,
visually impaired, or print disabled. The
Librarian, upon the recommendation of
the Register, granted an exemption in
2012 for these purposes.
The American Foundation for the
Blind, American Council for the Blind,,
Samuelson-Glushko Technology Law &
Policy Clinic at Colorado Law, and LCA
filed petitions seeking to have the
Librarian renew the existing exemption.
Based on these petitions, the
Copyright Office proposed the following
class:
Proposed Class 9: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
literary works distributed electronically for
purposes of accessibility for persons who are
print disabled. This exemption has been
requested for literary works distributed
electronically, including e-books, digital
textbooks, and PDF articles.
Proponents argued that reproducing
copies in accessible formats is a
noninfringing use, and that, while
improvements have been made to make
literary works more accessible since the
last triennial rulemaking, there are still
a substantial number of works that
cannot be accessed using accessibility
technologies such as text-to-speech
programs.
There was no opposition to renewing
the 2012 exemption. Significantly, the
Association of American Publishers,
representing book publishers, filed
supportive comments indicating that it
had no objection to a renewal of the
existing exemption, explaining that the
market does not yet offer sufficient
accessibility to literary works.
NTIA supported renewal of the
current exemption, finding that the
record regarding the state of
accessibility of literary works is not
substantially different than it was three
years ago.
The Register recommended granting
the exemption. According to the
Register, the need to ensure that persons
who are blind, visually impaired or
24 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 127–37.
PO 00000
Frm 00070
Fmt 4700
Sfmt 4700
print disabled are not impeded from
accessing books in electronic formats
presents a quintessential case for an
exemption. The Register determined
that converting e-books into accessible
formats is likely a noninfringing use
both as a matter of fair use and under
17 U.S.C. 121, also known as the
‘‘Chafee Amendment,’’ which allows
authorized entities to create accessible
versions of works exclusively for use by
persons who are blind, visually
impaired, or print disabled. The Register
also found that TPMs are likely to have
an adverse effect on noninfringing
activities, as many e-book titles and
literary works in electronic format (such
as electronic textbooks and PDF articles)
are currently unavailable in accessible
formats. The Register further concluded
that all five statutory factors favored the
exemption. Finally, like the existing
exemption, the recommended
exemption allows the intended
beneficiaries of section 121 to benefit
from the waiver on circumvention.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Literary works, distributed electronically,
that are protected by technological measures
that either prevent the enabling of read-aloud
functionality or interfere with screen readers
or other applications or assistive
technologies,
(i) When a copy of such a work is lawfully
obtained by a blind or other person with a
disability, as such a person is defined in 17
U.S.C. 121; provided, however, that the rights
owner is remunerated, as appropriate, for the
price of the mainstream copy of the work as
made available to the general public through
customary channels, or
(ii) When such work is a nondramatic
literary work, lawfully obtained and used by
an authorized entity pursuant to 17 U.S.C.
121.
3. Proposed Classes 11 to 15: Computer
Programs That Enable Devices To
Connect to a Wireless Network That
Offers Telecommunications and/or
Information Services (’’Unlocking’’) 25
Proposed Classes 11 through 15
would allow circumvention of access
controls on wireless devices such as
cellphones and all-purpose tablet
computers to allow them to connect to
the network of a different mobile
wireless carrier, a process commonly
known as ‘‘unlocking.’’ Wireless carriers
typically lock wireless devices to their
networks when they have subsidized
the cost of a device at the time of
purchase; carriers then recoup that
25 The Register’s analysis and conclusions for
these classes, including citations to the record and
relevant legal authority, can be found in the
Recommendation at 138–71.
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
subsidy through wireless service
charges paid by the purchaser.
The Register has recommended, and
the Librarian has adopted, exemptions
permitting unlocking of cellphones in
three prior rulemakings. Based on the
evidentiary record in the last triennial
proceeding, the 2012 version of the
exemption was limited to cellphones
obtained on or before January 26, 2013.
Congress enacted the Unlocking Act to
reinstate the cellphone unlocking
exemption that was adopted in 2010,
which lacked such a limitation. In the
Unlocking Act, Congress also instructed
the Librarian to review any future
proposal for a cellphone unlocking
exemption according to the usual
process in this triennial rulemaking, as
well as to consider in this rulemaking
whether to extend the cellphone
unlocking exemption to other categories
of wireless devices. As noted above, the
Unlocking Act also defines, on a
permanent basis, categories of persons
and entities that can take advantage of
any unlocking exemption.
Consistent with Congress’s directive
in the Unlocking Act, the Copyright
Office invited proposals to continue an
unlocking exemption for wireless
telephone handsets and/or to extend the
exemption to other categories of
wireless devices. The petitions received
generally asked for continuation of the
current cellphone unlocking exemption,
and expansion of that exemption to
cover additional types of devices.
The Office grouped the petitions into
five distinct classes based on the type of
device at issue, as described below:
Proposed Class 11: This proposed class
would allow the unlocking of wireless
telephone handsets. ‘‘Wireless telephone
handsets’’ includes all mobile telephones
including feature phones, smart phones, and
‘‘phablets’’ that are used for two-way voice
communication.
Lhorne on DSK5TPTVN1PROD with RULES
Class 11, covering cellphones, was
proposed by Consumers Union, the
Competitive Carriers Association
(‘‘CCA’’), the Institute of Scrap
Recycling Industries (‘‘ISRI’’),
Pymatuning Communications
(‘‘Pymatuning’’), and the Rural Wireless
Association (‘‘RWA’’).
Proposed Class 12: This proposed class
would allow the unlocking of all-purpose
tablet computers. This class would
encompass devices such as the Apple iPad,
Microsoft Surface, Amazon Kindle Fire, and
Samsung Galaxy Tab, but would exclude
specialized devices such as dedicated e-book
readers and dedicated handheld gaming
devices.
Class 12, covering all-purpose tablets,
was proposed by Consumers Union,
CCA, ISRI, Pymatuning, and RWA. As
reflected in the proposal, the petitions
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
were limited to ‘‘all-purpose’’ tablet
computers—that is, tablet computers
that can run a wide variety of
programs—as opposed to devices
dedicated to the consumption of
particular types of content such as ebook readers.
Proposed Class 13: This proposed class
would allow the unlocking of mobile
connectivity devices. ‘‘Mobile connectivity
devices’’ are devices that allow users to
connect to a mobile data network through
either a direct connection or the creation of
a local Wi-Fi network created by the device.
The category includes mobile hotspots and
removable wireless broadband modems.
Class 13, covering mobile
connectivity devices, was proposed
CCA and RWA.
Proposed Class 14: This proposed class
would allow the unlocking of wearable
wireless devices. ‘‘Wearable wireless
devices’’ include all wireless devices that are
designed to be worn on the body, including
smart watches, fitness devices, and health
monitoring devices.
Class 14, covering wearable wireless
devices, was proposed by CCA and
RWA.
Proposed Class 15: This proposed class
would allow the unlocking of all wireless
‘‘consumer machines,’’ including smart
meters, appliances, and precision-guided
commercial equipment.
Class 15 was proposed by CCA, and
encompassed a broad and diverse range
of devices and equipment, including
any ‘‘smart’’ device utilizing a data
connection to connect to the internet or
interact with other smart devices. CCA,
however, failed to further define the
kinds of ‘‘smart’’ devices the exemption
would cover beyond those already
encompassed by Classes 11 through 14,
let alone the types of TPMs used by
such devices, or the methods of
circumvention. Indeed, it was not
apparent from the record whether any
such devices actually exist. For
instance, while CCA suggested that
smart power meters would be
encompassed by the proposal, evidence
at the public hearing (at which CCA did
not participate) indicated that smart
meters generally do not have mobile
data (i.e., 3G/4G) connections, rendering
the concept of ‘‘unlocking’’ irrelevant to
that type of device.
In general, proponents argued that
unlocking was permitted under section
117 of the Copyright Act, which allows
the owners of computer programs to
make certain reproductions of or
adaptations to those programs, and as a
matter of fair use. They explained that
the inability to unlock one’s wireless
device leads to adverse effects by
impeding consumers’ ability to choose
PO 00000
Frm 00071
Fmt 4700
Sfmt 4700
65951
their preferred wireless carriers,
harming the resale value of used
devices, and harming the environment
by encouraging disposal rather than
reuse of devices.
No party opposed Proposed Class 12
(all-purpose tablet computers) or
Proposed Class 14 (wearable computing
devices). Prepaid wireless carrier
TracFone nominally filed comments in
opposition to the cellphone unlocking
exemption in Class 11, though at bottom
it was not opposed to renewal of the
exemption, so long as it was clear that
the exemption did not permit
illegitimate phone trafficking—a
practice where subsidized prepaid
cellphones are purchased, unlocked,
and resold (often abroad) at a profit. The
Alliance of Automobile Manufacturers
(‘‘Auto Alliance’’) and General Motors
LLC (‘‘GM’’) filed opposition comments
in Class 13 solely to stress that any
exemption should exclude ‘‘mobile’’
connectivity devices embedded in
motor vehicles, and Class 13 proponents
agreed that such a limitation would be
appropriate. Auto Alliance opposed
Class 15 on the ground that it is illdefined and could inadvertently sweep
in cars and trucks.
NTIA proposed adopting an
exemption encompassing all used
wireless devices, without enumerating
the types of devices to which the
exemption applies. At the same time,
NTIA acknowledged that based on the
record in the rulemaking, it would be
appropriate to exclude one type of
wireless device—vehicle-based
hotspots—from the exemption.
The Register recommended adopting
an unlocking exemption covering
wireless telephone handsets (i.e.,
cellphones), all-purpose tablet
computers, mobile connectivity devices,
and wearable wireless devices.
According to the Register, the unlocking
exemption is likely to facilitate
noninfringing uses both under section
117 and as a matter of fair use. The
Register further explained that, unlike
the section 117 privilege, fair use is not
limited to the owner of the computer
program, and so there is no need to limit
the exemption to the owner of the
device software. The Register also found
that, as to the devices encompassed by
Classes 11 to 14, proponents had
provided sufficient evidence of adverse
effects flowing from the inability to
unlock a device due to a TPM; in
contrast, proponents of Class 15,
encompassing a broad and undefined
range of ‘‘consumer machines’’ and
‘‘smart’’ devices, failed to make a
showing of actual adverse effects. In
addition, the Register concluded that
three of the five statutory factors tended
E:\FR\FM\28OCR1.SGM
28OCR1
65952
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
to favor the proponents, while the other
two were neutral.
The recommended exemption is
limited to ‘‘used’’ devices. A ‘‘used’’
device is defined as a device that has
been lawfully acquired and previously
activated on a wireless network. The
recommended exemption permits
charities and commercial enterprises
(including bulk recyclers) to unlock
used cellphones, while excluding
illegitimate trafficking that seeks to
profit from the subsidized phones sold
by prepaid wireless carriers. Although
some proponents called for elimination
of the ‘‘used’’ requirement for
cellphones and tablets—which in theory
would permit unlocking of new,
subsidized devices—the Register
concluded that the record did not
support extending the exemption in this
respect as the evidence did not establish
a practical ability to unlock subsidized
devices that had never been connected
to a carrier. Finally, the recommended
exemption excludes devices embedded
in motor vehicles from the exemption
for mobile connectivity devices by
including the condition that the devices
be ‘‘portable.’’
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
(i) Computer programs that enable the
following types of wireless devices to
connect to a wireless telecommunications
network, when circumvention is undertaken
solely in order to connect to a wireless
telecommunications network and such
connection is authorized by the operator of
such network, and the device is a used
device:
(A) Wireless telephone handsets (i.e.,
cellphones);
(B) All-purpose tablet computers;
(C) Portable mobile connectivity devices,
such as mobile hotspots, removable wireless
broadband modems, and similar devices; and
(D) Wearable wireless devices designed to
be worn on the body, such as smartwatches
or fitness devices.
(ii) A device is considered ‘‘used’’ for
purposes of this exemption when it has
previously been lawfully acquired and
activated on the wireless telecommunications
network of a wireless carrier.
Lhorne on DSK5TPTVN1PROD with RULES
4. Proposed Classes 16 and 17:
Jailbreaking—Smartphones and AllPurpose Mobile Computing Devices 26
Proposed Classes 16 and 17 address
an activity commonly known as
‘‘jailbreaking,’’ which is the process of
gaining access to the operating system of
a computing device, such as a
smartphone or tablet, to install and
26 The Register’s analysis and conclusions for
these classes, including citations to the record and
relevant legal authority, can be found in the
Recommendation at 172–92.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
execute software that could not
otherwise be installed or run on that
device, or to remove pre-installed
software that could not otherwise be
uninstalled. The Register has twice
before recommended, and the Librarian
has twice adopted, an exemption
permitting jailbreaking of smartphones.
EFF filed a petition seeking a
jailbreaking exemption for all ‘‘mobile
computing devices,’’ including wireless
telephone handsets that are capable of
running a wide range of applications
(i.e., ‘‘smartphones’’) and tablet
computers (‘‘tablets’’). EFF explained
that its requested exemption is not
intended to extend to devices designed
primarily for the consumption of a
single type of media, such as dedicated
e-book readers, or to desktop or laptop
computers. Maneesh Pangasa filed a
separate petition seeking an exemption
for tablet computers. The Copyright
Office divided these proposals into two
proposed classes to ensure an adequate
administrative record on which to make
a recommendation. Based on these
petitions, the Office included the
following proposed exemptions in the
NPRM:
Proposed Class 16: This proposed class
would permit the jailbreaking of wireless
telephone handsets to allow the devices to
run lawfully acquired software that is
otherwise prevented from running, or to
remove unwanted preinstalled software from
the device.
Proposed Class 17: This proposed class
would permit the jailbreaking of all-purpose
mobile computing devices to allow the
devices to run lawfully acquired software
that is otherwise prevented from running, or
to remove unwanted preinstalled software
from the device. The category ‘‘all-purpose
mobile computing device’’ includes allpurpose non-phone devices (such as the
Apple iPod touch) and all-purpose tablets
(such as the Apple iPad or the Google
Nexus). The category does not include
specialized devices such as e-book readers or
handheld gaming devices, or laptop or
desktop computers.
Relying on case law and prior
determinations of the Register,
proponents argued that jailbreaking of
smartphones and all-purpose mobile
computing devices constitutes fair use
of the device software. Proponents also
pointed to a series of benefits that have
resulted from the existing smartphone
jailbreaking exemption, such as the
ability to install otherwise unsupported
operating system upgrades and the rapid
growth in the market for legitimate, nonmanufacturer-approved apps, and
argued that similar benefits would result
if the exemption included all-purpose
mobile computing devices.
The Business Software Alliance
(‘‘BSA’’) opposed both classes. In
PO 00000
Frm 00072
Fmt 4700
Sfmt 4700
neither case, however, did BSA dispute
the noninfringing nature of jailbreaking.
Instead, BSA argued that the existence
of alternatives to jailbreaking, such as
‘‘developer editions’’ of devices that do
not need to be jailbroken, obviate the
need for an exemption. In addition, with
respect to the exemption for all-purpose
mobile computing devices in Class 17,
BSA disputed EFF’s effort to distinguish
between all-purpose mobile computing
devices on the one hand, and desktops
and laptops on the other, arguing that
the distinction is not sufficiently clear.
In response, EFF offered two further
criteria to define these devices: First,
that they be portable, in the sense that
they are ‘‘designed to be carried or
worn’’; and second, that they ‘‘come
equipped with an operating system that
is primarily designed for mobile use,’’
such as Android, iOS, Blackberry OS or
Windows Phone.
Commenters representing automobile
manufacturers filed comments under
Class 17 raising the concern that the
class could arguably encompass
computing systems that are embedded
in ‘‘mobile’’ automobiles and other
vehicles. EFF clarified, however, that
Class 17 was not intended to include
software running on vehicle electronics,
but only portable devices designed to be
carried or worn by a person.
NTIA favored a jailbreaking
exemption for all ‘‘mobile computing
devices,’’ a category which (contrary to
EFF’s proposal) would appear to
include devices that are designed
primarily for the consumption of a
single type of media, including
dedicated e-book readers, which are
separately addressed in Proposed Class
18 below. Although NTIA asserted that
the works and TPMs at issue are
strikingly similar and in many cases
identical, it cited no evidence to support
that claim with respect to dedicated ebook readers, handheld video game
consoles, or other dedicated media
consumption devices.
The Register recommended
continuing the existing jailbreaking
exemption for smartphones, and
extending it to all-purpose mobile
computing devices. As in previous
rulemakings, the Register concluded
that jailbreaking to facilitate
interoperability is likely to constitute a
noninfringing fair use, and that the
prohibition on circumvention is having
an adverse effect on this type of use.
Further, the Register concluded that
three of the statutory factors (availability
for use of copyrighted works, the impact
on criticism, comment, news reporting,
teaching, scholarship, or research, and
the effect of circumvention of
technological measures on the market
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
for or value of the copyrighted works)
favored an exemption, while the other
two were not implicated by these
classes.
The Register also concluded, based on
the overall record, that the category of
‘‘all-purpose mobile computing
devices’’ in Class 17 has been
meaningfully defined, but that certain
refinements were appropriate to address
concerns regarding its scope. The
recommended exemption thus
incorporates EFF’s suggestion to specify
that the devices be portable, that they be
designed to run a wide variety of
applications, and that they come
equipped with an operating system
primarily designed for mobile use. The
recommended exemption thus excludes
vehicle-embedded systems, devices
designed primarily for consumption of a
specific type of media (such as e-book
readers and handheld gaming devices),
and computers confined to desktop or
laptop operating systems, such as
Windows 8 or Mac OS. If a hybrid
device can act either as a laptop or a
tablet, the user will need to investigate
what type of operating system it
contains in order to determine whether
the exemption applies.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Lhorne on DSK5TPTVN1PROD with RULES
Computer programs that enable
smartphones and portable all-purpose mobile
computing devices to execute lawfully
obtained software applications, where
circumvention is accomplished for the sole
purpose of enabling interoperability of such
applications with computer programs on the
smartphone or device, or to permit removal
of software from the smartphone or device.
For purposes of this exemption, a ‘‘portable
all-purpose mobile computing device’’ is a
device that is primarily designed to run a
wide variety of programs rather than for
consumption of a particular type of media
content, is equipped with an operating
system primarily designed for mobile use,
and is intended to be carried or worn by an
individual.
5. Proposed Class 20: Jailbreaking—
Smart TVs 27
In addition to their traditional
functionality, many modern televisions
(‘‘TVs’’) have built-in software features
that can stream content over the
internet, interact with other devices in
the home, or run applications. These
internet-enabled TVs are often referred
to as ‘‘Smart TVs.’’ Smart TV firmware
is often protected by TPMs that prevent
owners of those TVs from installing
third-party software on them. The
27 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 202–17.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
Software Freedom Conservancy (‘‘SFC’’)
proposed an exemption to permit
circumvention of access controls on
firmware (i.e., the operating system) of
such smart TVs to enable installation of
third-party software.
The Copyright Office included the
following proposed exemption in the
NPRM:
Proposed Class 20: This proposed class
would permit the jailbreaking of computerembedded televisions (‘‘smart TVs’’).
Asserted noninfringing uses include
accessing lawfully acquired media on
external devices, installing user-supplied
licensed applications, enabling the operating
system to interoperate with local networks
and external peripherals, and enabling
interoperability with external devices, and
improving the TV’s accessibility features
(e.g., for hearing-impaired viewers). The
TPMs at issue include firmware encryption
and administrative access controls that
prevent access to the TV’s operating system.
According to SFC, access to the
firmware would allow various
noninfringing uses, including improving
accessibility features (such as the size of
closed captioning), enabling or
expanding the TV’s compatibility with
peripheral hardware and external
storage devices, and making changes to
display features such as the aspect ratio.
SFC argued that the majority of smart
TV firmware incorporates the
manufacturer’s own proprietary
applications along with free, libre and
open source software (‘‘FLOSS’’)
applications produced by third parties.
SFC argued that, under the relevant
FLOSS licenses, smart TV owners are
authorized to modify the FLOSS
applications and to run them without
restriction. SFC also argued that fair use
permits reproduction and alteration of
proprietary applications to the extent
necessary to permit interoperability
with lawfully acquired programs.
Proposed Class 20 was opposed by
Joint Creators and LG Electronics U.S.A.
(‘‘LG’’), a manufacturer of smart TVs.
Opponents argued that an exemption
would not facilitate noninfringing uses,
and was unnecessary because a laptop
can be connected to TV sets to view the
output of any applications and because
LG smart TVs already provide all of the
features that SFC claims can be added
only by jailbreaking. In addition, Joint
Creators raised concerns that
jailbreaking would allow the installation
of infringing software as well as
software such as ‘‘Popcorn Time,’’ an
application that facilitates access to and
viewing of pirated movies.
NTIA supported the proposed
exemption, on the ground that it is not
materially different than the exemptions
that have been granted in the past for
jailbreaking of smartphones.
PO 00000
Frm 00073
Fmt 4700
Sfmt 4700
65953
The Register recommended granting
the proposed exemption, explaining that
circumvention of access controls on
smart TV firmware is likely to enable
noninfringing uses of that firmware.
First, it appears to be undisputed that
smart TV firmware incorporates FLOSS
applications, and that modification of
those applications would constitute a
licensed, and therefore noninfringing,
use. Second, with respect to non-FLOSS
proprietary software included in the
firmware, the Register concluded that
modifications to that firmware to enable
interoperability with third-party
software are likely to constitute a fair
use. The Register also found that the
prohibition on circumvention is
adversely affecting legitimate
noninfringing uses of smart TV
firmware, and that the proposed
alternatives to circumvention, such as
connecting a laptop computer to the TV,
are inadequate, because they would not
allow installation of software on the
smart TV to improve its functioning as
a TV, such as facilitating more
prominent subtitles. The Register also
concluded that no evidence was
submitted to illustrate opponents’ claim
that jailbreaking of smart TVs will make
it easier to gain unauthorized access to
copyrighted content, or that it would
otherwise undermine smart TVs as a
platform for the consumption of
expressive works.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Computer programs that enable smart
televisions to execute lawfully obtained
software applications, where circumvention
is accomplished for the sole purpose of
enabling interoperability of such applications
with computer programs on the smart
television.
6. Proposed Class 21: Vehicle
Software—Diagnosis, Repair or
Modification 28
Modern automobiles and agricultural
vehicles and machinery are equipped
with systems of interconnected
computers that monitor and control a
variety of vehicle functions. These
computers are referred to as electronic
control units, or ‘‘ECUs,’’ which are
protected by TPMs. EFF requested an
exemption to permit circumvention of
TPMs protecting ECU computer
programs for the purposes of diagnosis,
repair and modification of vehicles. The
Intellectual Property & Technology Law
Clinic of the University of Southern
California Gould School of Law (‘‘IPTC
28 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 218–49.
E:\FR\FM\28OCR1.SGM
28OCR1
65954
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
U.S.C.’’) proposed two similar
exemptions for agricultural machinery
specifically.
Based on these petitions, the Office
included the following proposed
exemption in the NPRM:
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 21: This proposed class
would allow circumvention of TPMs
protecting computer programs that control
the functioning of a motorized land vehicle,
including personal automobiles, commercial
motor vehicles, and agricultural machinery,
for purposes of lawful diagnosis and repair,
or aftermarket personalization, modification,
or other improvement. Under the exemption
as proposed, circumvention would be
allowed when undertaken by or on behalf of
the lawful owner of the vehicle.
Proponents explained that
circumvention of TPMs protecting
copyrighted computer programs in
ECUs may be necessary to make
noninfringing uses of those programs to
diagnose and repair automobiles and
agricultural equipment, and to make
modifications, such as enhancing a
vehicle’s suspension or installing a gear
with a different radius. They assert that
vehicle owners are entitled to use the
computer programs in ECUs to
diagnose, repair or modify vehicles as a
matter of fair use, or under section 117.
EFF argues that absent an exemption,
vehicle owners must take their cars to
authorized repair shops, or purchase
expensive manufacturer-authorized
tools, to diagnose and repair their
vehicles. Similarly, IPTC U.S.C.
explained that TPMs restricting access
to computer programs that run
agricultural vehicles and machinery
place the livelihoods of farmers and
other business owners at risk, because
vehicle owners must sometimes wait
significant periods of time before their
disabled vehicles can be repaired by an
authorized technician.
The proposed exemption was
opposed by the Association of
Equipment Manufacturers, Association
of Global Automakers (‘‘Global
Automakers’’), Auto Alliance, Eaton
Corporation, GM, John Deere, and Motor
& Equipment Manufacturers Association
(‘‘MEMA’’). In general, opponents
argued that an exemption would not
facilitate noninfringing uses, and was
unnecessary in any event because
vehicle owners have alternative options,
such as manufacturer-authorized repair
shops and tools. They also asserted that
the proposal presented serious public
health, safety and environmental
concerns. For example, users might
circumvent in order to avoid restrictions
on vehicle emissions imposed by federal
and state law.
In light of the commenters’
observations, the Copyright Office
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
notified DOT and EPA of the pendency
of the rulemaking. DOT and EPA, as
well as California ARB, responded with
varying degrees of concern about the
potential impact of an exemption. EPA
opposed any exemption, while DOT and
California ARB expressed significant
reservations. The agencies’ concerns
were focused on potential adverse
effects on safety and the environment.
For example, EPA explained that
vehicle modifications are often
performed to increase engine power or
boost fuel economy, but that these
modifications increase vehicle
emissions and thus violate the Clean Air
Act.
In contrast to these other agencies,
NTIA fully supported adoption of the
proposed exemption. NTIA believed
that an exemption was necessary to
allow consumers to continue to engage
in the longstanding practice of working
on their own vehicles, and that the noncopyright concerns raised by opponents
and other agencies could be addressed
by those agencies in the exercise of their
respective regulatory authorities. NTIA
acknowledged, however, that a delay in
implementation—as recommended by
the Register and discussed below—
might nonetheless be appropriate to
permit other agencies to consider and
prepare for the new rule, and urged that
any such delay be as short as
practicable.
Based on the record, the Register
recommended granting an exemption.
The Register concluded that
reproducing and altering the computer
programs on ECUs for purposes of
facilitating diagnosis, repair and
modification of vehicles may constitute
a noninfringing activity as a matter of
fair use and/or under the exception set
forth in section 117 of the Copyright
Act, which permits the owner of a copy
of a computer program to make certain
copies and adaptations of the program.
The Register also concluded that owners
of vehicles and agricultural machinery
are adversely impacted as a result of
TPMs that protect the copyrighted
computer programs on the ECUs that
control the functioning of their vehicles.
The Register further found that while
two of the statutory factors weighed in
favor of the exemption (availability for
use of copyrighted works and impact on
criticism, comment, news reporting,
teaching, scholarship or research), and
two of the factors were neutral
(availability for use for nonprofit
archival, preservation and educational
purposes and the effect on the market
for or value of copyrighted works), the
fifth factor—under which commenting
parties and federal agencies raised
serious safety and environmental
PO 00000
Frm 00074
Fmt 4700
Sfmt 4700
concerns—tended to weigh against an
exemption.
Overall, the Register concluded that
while from a copyright perspective
proponents had made the case for an
exemption, based on the record, the
exemption needed to be carefully
tailored to address a number of
concerns. Accordingly, the
recommended exemption excludes
computer programs in ECUs that are
chiefly designed to operate vehicle
entertainment and telematics systems
due to insufficient evidence
demonstrating a need to access such
ECUs, and out of concern that such
circumvention might enable
unauthorized access to creative or
proprietary content. The exemption also
excludes circumvention ‘‘on behalf of’’
vehicle owners, as a broader exception
allowing third parties to engage in
circumvention activities on behalf of
others is in tension with the antitrafficking provisions of section
1201(a)(2) and (b). Moreover, by passing
the Unlocking Act—which amended
section 1201 to allow unlocking of
cellphones and other devices to be
carried out by third parties ‘‘at the
direction of’’ device owners—Congress
indicated its view that extending the
reach of an exemption to cover thirdparty actors requires a legislative
amendment. The exemption also
expressly excludes acts of
circumvention that would violate any
other law, including regulations
promulgated by DOT or EPA. Finally, in
light of the significant concerns raised
by DOT and EPA, the recommended
exemption will become operative twelve
months from the effective date of the
new regulation to provide these and
other potentially interested agencies an
opportunity to consider and prepare for
the lifting of the DMCA prohibition.
Acknowledging the views of the NTIA,
the Register determined that a twelvemonth delay was the shortest period
that would reasonably permit other
agencies to consider appropriate action.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Computer programs that are contained in
and control the functioning of a motorized
land vehicle such as a personal automobile,
commercial motor vehicle or mechanized
agricultural vehicle, except for computer
programs primarily designed for the control
of telematics or entertainment systems for
such vehicle, when circumvention is a
necessary step undertaken by the authorized
owner of the vehicle to allow the diagnosis,
repair or lawful modification of a vehicle
function; and where such circumvention
does not constitute a violation of applicable
law, including without limitation regulations
promulgated by the Department of
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
Transportation or the Environmental
Protection Agency; and provided, however,
that such circumvention is initiated no
earlier than 12 months after the effective date
of this regulation.
7. Proposed Classes To Permit Research
of Software Flaws, Proposed Class 25:
Software—Security Research; Proposed
Class 22: Vehicle Software—Security
and Safety Research; Proposed Class
27A: Medical Device Software—
Security and Safety Research 29
The Office received a number of
petitions for proposed exemptions to
permit circumvention of TPMs for
purposes of conducting good-faith
testing for and the identification,
disclosure and correction of
malfunctions, security flaws and
vulnerabilities in computer programs.
The proponents of these security
exemptions observed as a general matter
that computer programs are pervasive in
modern machines and devices,
including vehicles, home appliances
and medical devices, and that
independent security research is
necessary to uncover flaws in those
computer programs. The Copyright
Office grouped the security-related
petitions into three proposed classes.
First, the Office received two
submissions from academic researchers
seeking an exemption to permit goodfaith research into malfunctions,
security flaws or vulnerabilities in
computer programs installed on all
types of systems and devices. The
NPRM described the proposed class as
follows:
Proposed Class 25: This proposed class
would allow researchers to circumvent
access controls in relation to computer
programs, databases, and devices for
purposes of good-faith testing, identifying,
disclosing, and fixing of malfunctions,
security flaws, or vulnerabilities.
Lhorne on DSK5TPTVN1PROD with RULES
Second, EFF filed a petition seeking
an exemption to allow the
circumvention of TPMs on computer
programs that are embedded in
motorized land vehicles for purposes of
researching the security or safety of that
vehicle. The NPRM described the
proposed class as follows:
Proposed Class 22: This proposed class
would allow circumvention of TPMs
protecting computer programs that control
the functioning of a motorized land vehicle
for the purpose of researching the security or
safety of such vehicles. Under the exemption
as proposed, circumvention would be
allowed when undertaken by or on behalf of
the lawful owner of the vehicle.
29 The Register’s analysis and conclusions for
these classes, including citations to the record and
relevant legal authority, can be found in the
Recommendation at 250–320.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
Third, the Medical Device Research
Coalition (‘‘MDRC’’), a group of patients
and researchers, filed a petition seeking
an exemption to allow the
circumvention of TPMs on computer
programs on implanted medical devices,
such as pacemakers, implantable
cardioverter defibrillators, insulin
pumps, and continuous glucose
monitors, and their corresponding
personal monitoring systems. MDRC’s
petition covered two proposed uses—
allowing research into software flaws
that adversely affect the safety, security
and efficacy of medical devices, and
allowing a patient to access the
information generated by his or her own
device. The Office originally categorized
the petition into a single class. The
NPRM thus described the class as
follows:
Proposed Class 27: This proposed class
would allow circumvention of TPMs
protecting computer programs in medical
devices designed for attachment to or
implantation in patients and in their
corresponding monitoring devices, as well as
the outputs generated through those
programs. As proposed, the exemption would
be limited to cases where circumvention is at
the direction of a patient seeking access to
information generated by his or her own
device, or at the direction of those
conducting research into the safety, security,
and effectiveness of such devices. The
proposal would cover devices such as
pacemakers, implantable cardioverter
defibrillators, insulin pumps, and continuous
glucose monitors.
Based on the record as it developed in
the course of the proceeding, the
Register came to the conclusion that
Proposed Class 27 should be divided
into Proposed Class 27A, concerning
security research on medical devices,
and Proposed Class 27B, concerning
access to patient data generated by
medical devices. Class 27A is addressed
with the other security research classes,
while 27B is separately discussed
below.
Proponents maintained that the
security of software and the devices that
execute software is of critical
importance because security flaws pose
potentially serious threats, including
physical injury and death of
individuals, property damage, and
financial harm. Proponents argued that
security research is noninfringing as a
matter of fair use and, in the case of
vehicle security research, under the
exceptions set forth in section 117 as
well. They further asserted that the
permanent statutory exemptions to
section 1201(a)(1)’s prohibition that are
directed to reverse engineering (section
1201(f)), encryption research (section
1201(g)), and security testing (section
1201(j)) are inadequate for their
PO 00000
Frm 00075
Fmt 4700
Sfmt 4700
65955
purposes, because these provisions do
not provide sufficient assurance that the
activities in which the researchers seek
to engage will be considered exempt.
The Office received comments in
opposition to these proposed classes
from a wide range of companies and
organizations representing copyright
owners. The general software security
research exemption in Class 25 was
opposed by AdvaMed, Auto Alliance,
BSA, GM, Intellectual Property Owners
Association (‘‘IPO’’), LifeScience Alley,
Medical Device Innovation Safety and
Security Consortium, and Software
Information Industry Association. The
vehicle software security research
exemption in Class 22 was opposed by
Global Automakers, Auto Alliance, GM,
John Deere, and MEMA. The medical
device software security exemption in
Class 27A was opposed by AdvaMed,
IPO, Jay Schulman, LifeScience Alley,
and National Association of
Manufacturers (‘‘NAM’’). In general,
opponents argued that proponents had
failed to establish that security research
activities encompassed by the
exemption are noninfringing, and that,
in any event, an exemption was
unnecessary both because of the
permanent exemptions in sections
1201(f), 1201(g), and 1201(j), and
because manufacturers frequently
authorize independent security
research. Opponents also argued that
any exemption for software security
research should also include an express
disclosure requirement, so that the
software developer or product
manufacturer has sufficient time to
correct any flaw before its existence
becomes more widely known and thus
more susceptible to exploitation by
malicious actors. Relatedly, opponents
asserted that the proposal presented
serious public health and safety
concerns. For example, opponents
claimed that information obtained by
engaging in security research could be
used by bad actors to hack into highly
regulated machines and devices,
including medical devices and vehicles.
In light of commenters’ observations,
the Copyright Office notified DOT, EPA
and FDA of the pendency of the
rulemaking. All three agencies
responded and expressed significant
reservations. The agencies voiced
concerns about the potential effects on
public health and safety; for example,
DOT expressed concern that
independent security researchers may
not fully appreciate the potential
ramifications of their acts of
circumvention on automobile safety or
the logistical limitations affecting
potential remedial actions.
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
65956
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
By contrast, NTIA fully supported
adoption of a broad exemption for all
computer programs, regardless of the
device on which they are run, so that
good-faith security researchers can
engage in socially beneficial work. NTIA
believed that the concerns of other
agencies could adequately be addressed
by stating explicitly in the exemption
that it does not obviate compliance with
other applicable laws. NTIA nonetheless
acknowledged the possibility that a
delay in implementation—as
recommended by the Register and
discussed below—could be appropriate
to permit other agencies to consider and
prepare for the new rule.
The Register found that while the
Class 25 proposal to allow research on
computer programs generally was very
broad (and potentially swallowed the
proposals in Class 22 and Class 27A),
the record focused primarily on
consumer-facing products rather than
large-scale industrial or government
systems such as power or transit
systems. The record also included
specific evidence concerning motor
vehicles, implanted medical devices
such as pacemakers and glucose
monitors, and electronic voting
machines.
Based on this record, the Register
recommended adopting an exemption to
enable good-faith security research on
computer programs within devices or
machines primarily designed for use by
individual consumers (including voting
machines), motorized land vehicles, and
implanted medical devices and their
corresponding monitoring systems. At
the same time, the Register concluded
that the record did not support the
open-ended exemption urged by Class
25 proponents, encompassing all
computer programs on all systems and
devices, including highly sensitive
systems such as nuclear power plants
and air traffic control systems, and that
the exemption should be limited to the
consumer-oriented uses that were the
focus of proponents’ submissions.
The Register concluded that goodfaith security research into computer
programs used to operate such devices
and machines is likely a noninfringing
fair use of those programs or, in the case
of vehicle software, may be a
noninfringing use under section 117.
The Register also concluded that the
permanent exemptions in sections
1201(f), 1201(g), and 1201(j) are
inadequate to accommodate the
proposed research activities due to
various limitations and conditions
contained in those provisions. Further,
with respect to computer programs used
to operate the types of devices and
machines encompassed by the
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
recommended exemption, the Register
additionally found that legitimate
security research has been hindered by
TPMs that limit access to those
programs.
The Register also noted that different
parts of the Administration appear to
hold divergent views on issues
surrounding security research and the
wisdom of granting an exemption for
this purpose, and that the exemption
could cover any number of highly
regulated products. Accordingly, to give
other parts of the government sufficient
opportunity to respond, the Register
recommended that, as a general matter,
the exemption should not go into effect
until twelve months after the effective
date of the new regulation (as noted
above, the Register found that twelve
months was the shortest period that
would reasonably permit other agencies
to respond). The Register, however,
recommended immediate
implementation of the exemption for
voting machines, on the ground that
there was no public safety issue or other
proffered justification for delay of this
aspect of the exemption.
The Register also noted the specific
concern expressed by other agencies
that acts of security research must not
put members of the public at risk. The
recommended exemption thus provides
that security research must be
conducted in a controlled setting
designed to avoid harm to individuals
or the public. In the case of medical
devices specifically, the recommended
exemption incorporates FDA’s
suggestion to exclude research on
medical devices that are being used, or
could be used, by patients.
As explained above, a significant
issue with respect to the security
exemptions involves the proper
disclosure of security research findings,
as the interests of the manufacturer and
the public may both be affected by the
nature and timing of disclosure of
software flaws. Indeed, Congress
included disclosure to the system
developer as one of the factors to be
considered in determining a person’s
eligibility for the security testing
exemption in section 1201(j). Although
the Register expressed support for
responsible disclosure of security flaws,
she acknowledged the difficulty of
attempting to define disclosure
standards in the context of this
rulemaking, as opinions seem sharply
divided on this point. Accordingly,
rather than incorporating an express
disclosure rule, the recommended
exemption draws upon what the
Register perceives to be the basic intent
of section 1201(j) by specifying that the
information derived from the research
PO 00000
Frm 00076
Fmt 4700
Sfmt 4700
activity be used primarily to promote
the security or safety of the devices
containing the computer programs on
which the research is conducted, or of
those who use those devices.
The Register noted that in the interest
of adhering to Congress’s basic purpose
in section 1201(j), where appropriate,
the recommended exemption tracks
Congress’s language rather than
alternative formulations suggested by
proponents, including by expressly
excluding acts that violate any other
law, such as the Computer Fraud and
Abuse Act of 1986.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
(i) Computer programs, where the
circumvention is undertaken on a lawfully
acquired device or machine on which the
computer program operates solely for the
purpose of good-faith security research and
does not violate any applicable law,
including without limitation the Computer
Fraud and Abuse Act of 1986, as amended
and codified in title 18, United States Code;
and provided, however, that, except as to
voting machines, such circumvention is
initiated no earlier than 12 months after the
effective date of this regulation, and the
device or machine is one of the following:
(A) A device or machine primarily
designed for use by individual consumers
(including voting machines);
(B) A motorized land vehicle; or
(C) A medical device designed for whole or
partial implantation in patients or a
corresponding personal monitoring system,
that is not and will not be used by patients
or for patient care.
(ii) For purposes of this exemption, ‘‘goodfaith security research’’ means accessing a
computer program solely for purposes of
good-faith testing, investigation and/or
correction of a security flaw or vulnerability,
where such activity is carried out in a
controlled environment designed to avoid
any harm to individuals or the public, and
where the information derived from the
activity is used primarily to promote the
security or safety of the class of devices or
machines on which the computer program
operates, or those who use such devices or
machines, and is not used or maintained in
a manner that facilitates copyright
infringement.
8. Proposed Class 23: Abandoned
Software—Video Games Requiring
Server Communication 30
Many modern video games—which
may be played on a personal computer
or a dedicated gaming console—require
a network connection to a remote server
operated by the game’s developer to
enable core functionalities. Before some
games can be played at all, including in
30 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 321–53.
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
single-player mode, the game must
connect to an ‘‘authentication server’’ to
verify that the game is a legitimate copy.
Other games require a connection to a
‘‘matchmaking server’’ to enable users to
play the game with other people over
the internet in multiplayer mode. In the
case of a game that relies on an
authentication server, the game may be
rendered entirely unplayable if the
server connection is lost. When a
matchmaking server is taken offline, the
game may still be playable, though with
online multiplayer play disabled.
EFF and Kendra Albert, a student at
Harvard Law School, jointly filed a
petition seeking an exemption to enable
those who have lawfully acquired
copies of video games to access and play
those games when authentication or
matchmaking servers have been
permanently taken offline. As the record
developed, it became evident that the
proposal focused on two types of use:
(1) People who wish to continue to play
physical or downloaded copies of video
games they have lawfully acquired
(referred to in the Recommendation as
‘‘gamers’’); and (2) those who seek to
preserve individual video games and
make them available for research and
study (referred to in the
Recommendation as ‘‘preservationists’’).
The Copyright Office set forth the
following proposed exemption in the
NPRM:
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 23: This proposed class
would allow circumvention of TPMs on
lawfully acquired video games consisting of
communication with a developer-operated
server for the purpose of either
authentication or to enable multiplayer
matchmaking, where developer support for
those server communications has ended. This
exception would not apply to video games
whose audiovisual content is primarily
stored on the developer’s server, such as
massive multiplayer online role-playing
games.
Proponents of Class 23 argued that
uses to enable continued gameplay or
multiplayer play constitute fair use, but
that the prohibition on circumvention
prevents owners from restoring access to
games they have lawfully acquired.
They also stressed that the inability to
restore access has adverse effects on
efforts to preserve video games and
make them available for research and
study.
The proposed class was opposed by
ESA and Joint Creators. They argued
that the proposed exemption was too
broad, would not facilitate any
noninfringing uses, and could adversely
impact the market for video games. ESA
expressed particular concern about the
potential for piracy as a result of
circumvention activities, explaining that
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
if the exemption were to permit
circumvention of TPMs on video game
consoles, those consoles could be used
to play pirated video games. Opponents
also urged that petitioners had failed to
demonstrate cognizable adverse effects,
arguing, for example, that the vast
majority of games can continue to be
played in single-player mode when
server support has ended, and that there
are other alternative means of playing
games in multiplayer mode without a
matchmaking server, including by using
a local area network. ESA also argued
that, at the point of sale, consumers
receive ample notice that server support
may be discontinued.
NTIA supported adoption of the
proposed exemption for continued
gameplay and for preservation uses,
both for single-player and multiplayer
play. NTIA argued that gamers should
be permitted to restore access to a work
that they had originally been allowed to
use. In addition, according to NTIA,
consumers receive inconsistent notice at
best that developers may discontinue
support for multiplayer use, and LANenabled multiplayer play is an
inadequate substitute to play over the
internet.
Based on a review of the evidentiary
record, the Register recommended an
exemption to allow continued gameplay
and preservation activities when
developer server support for a video
game has ended, though one more
circumscribed than that proposed. With
respect to gamers, the Register
concluded that the record supported
granting an exemption for video games
that require communication with an
authentication server to allow gameplay
when the requisite server is taken
offline. The Register explained that the
inability to circumvent the TPM would
preclude all gameplay, a significant
adverse effect, and that circumvention
to restore access would qualify as a
noninfringing fair use. At the same time,
the Register determined that proponents
had failed to provide persuasive support
for an exemption for online multiplayer
play, in large part because it is not clear
on the current record how the provision
of circumvention tools to multiple users
to facilitate an alternative matchmaking
service could be accomplished without
running afoul of the anti-trafficking
provision in section 1201(a)(2). The
Register also confirmed that the
exemption for gamers should not extend
to jailbreaking of console software
because such jailbreaking is strongly
associated with video game piracy.
With respect to preservation uses,
looking to certain aspects of section 108
of the Copyright Act for guidance, the
Register found that the record supported
PO 00000
Frm 00077
Fmt 4700
Sfmt 4700
65957
an exemption for libraries and archives,
as well as for museums, to allow
circumvention of TPMs so that video
games can be preserved in playable
condition when authentication servers
are discontinued. In accordance with
section 108, such institutions must be
open to the public and/or to unaffiliated
researchers, and the activities at issue
must not be for commercial purposes.
As with gamers generally, the
recommended exemption for
preservationists does not extend to
circumvention to enable online
multiplayer play, which is an activity
that would extend beyond the walls of
the preserving institution. But because
the risk of piracy is much lower in a
preservationist setting than with respect
to gamers at large, the Register
recommended that preservationists have
the ability to circumvent TPMs
controlling access to video game console
software when necessary to maintain a
console game in playable form.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
(i) Video games in the form of computer
programs embodied in physical or
downloaded formats that have been lawfully
acquired as complete games, when the
copyright owner or its authorized
representative has ceased to provide access to
an external computer server necessary to
facilitate an authentication process to enable
local gameplay, solely for the purpose of:
(A) Permitting access to the video game to
allow copying and modification of the
computer program to restore access to the
game for personal gameplay on a personal
computer or video game console; or
(B) Permitting access to the video game to
allow copying and modification of the
computer program to restore access to the
game on a personal computer or video game
console when necessary to allow
preservation of the game in a playable form
by an eligible library, archives or museum,
where such activities are carried out without
any purpose of direct or indirect commercial
advantage and the video game is not
distributed or made available outside of the
physical premises of the eligible library,
archives or museum.
(ii) Computer programs used to operate
video game consoles solely to the extent
necessary for an eligible library, archives or
museum to engage in the preservation
activities described in paragraph (i)(B).
(iii) For purposes of the exemptions in
paragraphs (i) and (ii), the following
definitions shall apply:
(A) ‘‘Complete games’’ means video games
that can be played by users without accessing
or reproducing copyrightable content stored
or previously stored on an external computer
server.
(B) ‘‘Ceased to provide access’’ means that
the copyright owner or its authorized
representative has either issued an
affirmative statement indicating that external
server support for the video game has ended
E:\FR\FM\28OCR1.SGM
28OCR1
65958
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
and such support is in fact no longer
available or, alternatively, server support has
been discontinued for a period of at least six
months; provided, however, that server
support has not since been restored.
(C) ‘‘Local gameplay’’ means gameplay
conducted on a personal computer or video
game console, or locally connected personal
computers or consoles, and not through an
online service or facility.
(D) A library, archives or museum is
considered ‘‘eligible’’ when the collections of
the library, archives or museum are open to
the public and/or are routinely made
available to researchers who are not affiliated
with the library, archives or museum.
9. Proposed Class 26: Software—3D
Printers 31
3D printing—also known as
‘‘additive’’ manufacturing—is a
technology that translates digital files
into physical objects by adding
successive layers of material. Some 3D
printer manufacturers use TPMs to limit
the types of material—or ‘‘feedstock’’—
that can be used in their 3D printers to
manufacturer-approved feedstock.
Proponent Public Knowledge sought
an exemption to permit the
circumvention of access controls on
computer programs on 3D printers with
chip-based verification systems to
enable the use of non-manufacturerapproved feedstock in such printers.
The requested exemption would
encompass both the modifications
necessary to make a 3D printer accept
alternative feedstock, and potentially
further modifications to allow the use of
feedstock consisting of material that is
different from what a 3D printer has
been designed to use (e.g., metal instead
of plastic).
The Copyright Office set forth the
following proposed exemption in the
NPRM:
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 26: This proposed class
would allow circumvention of TPMs on
firmware or software in 3D printers to allow
use of non-manufacturer-approved feedstock
in the printer.
According to Public Knowledge, nonmanufacturer-approved feedstock is
often much less expensive than that
provided by the manufacturer. In
addition, use of feedstock composed of
a different material may require
modification of the printer’s operating
system software, for example, to change
preset variables such as the rate at
which the heated feedstock is extruded
to create the object or the temperature
of the extrusion nozzle. According to
Public Knowledge, the reproductions
and adaptations necessary to engage in
31 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 356–77.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
these uses are noninfringing under
either the fair use doctrine or section
117. Public Knowledge asserts that
absent an exemption, 3D printer owners
will be forced to pay more for feedstock,
and innovation in the 3D printing space
will be adversely affected.
This proposed class was opposed by
Stratasys, Inc. (‘‘Stratasys’’), a 3D printer
manufacturer. Among other things,
Stratasys contended that the proposed
uses do not qualify as noninfringing
under section 117 because 3D printer
owners license rather than own the
software that is installed on the 3D
printer. Stratasys also argued that
proponents had failed adequately to
demonstrate cognizable adverse effects.
Stratasys explained that 3D printers are
used to produce medical implants,
aerospace parts, and other goods that are
subject to safety or regulatory
guidelines, and expressed concern that
an exemption could permit use of
inferior materials in such applications.
Notably, this concern was reinforced by
FDA, which, in a letter to the Office,
worried that an exemption for this class
might create unintended public health
and safety risks in relation to medical
devices. Stratasys also expressed the
concern that an exemption could be
used to access proprietary design
software, design files, or data.
NTIA favored granting the proposed
exemption, on the ground that it would
benefit consumers and fuel innovation
by reducing costs of feedstock and by
allowing the use of new types of
feedstock. Although NTIA
acknowledged concerns that 3D-printed
parts might use inferior materials, it
concluded that the exemption should
not attempt to address concerns about
quality control.
The Register recommended granting
an exemption for 3D printers with chipbased verification systems, explaining
that the proposed uses of operating
system software to permit the use of
alternative feedstock are likely
noninfringing as a matter of fair use or
under section 117, and that the
prohibition on circumvention appears to
be adversely affecting the proposed
uses. At the same time, the Register
observed that proponents’ proposal—
and the evidence offered in support—
was focused largely on nonindustrial
uses of printers rather than the sorts of
uses that could present the types of
safety and regulatory concerns
highlighted by Stratasys and FDA. In
light of the record, and to address the
safety and regulatory issues, the
recommended exemption excludes
circumvention of TPMs on 3D printers
that are used to print objects that are
subject to legal or regulatory oversight.
PO 00000
Frm 00078
Fmt 4700
Sfmt 4700
The recommended exemption also
excludes circumvention for the purpose
of accessing design software, design
files or proprietary data.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Computer programs that operate 3D
printers that employ microchip-reliant
technological measures to limit the use of
feedstock, when circumvention is
accomplished solely for the purpose of using
alternative feedstock and not for the purpose
of accessing design software, design files or
proprietary data; provided, however, that the
exemption shall not extend to any computer
program on a 3D printer that produces goods
or materials for use in commerce the physical
production of which is subject to legal or
regulatory oversight or a related certification
process, or where the circumvention is
otherwise unlawful.
10. Proposed Class 27B: Networked
Medical Devices—Patient Data 32
Many modern implanted medical
devices, such as pacemakers,
implantable cardioverter defibrillators,
insulin pumps and continuous glucose
monitors, measure and record data
about physiological developments
taking place within the body, and
communicate that data wirelessly to a
corresponding personal monitoring
system. Some personal monitoring
systems, in turn, transmit data to a
hospital or monitoring company, and
ultimately to the patient’s physician.
Increasingly, these transmissions of data
are protected by TPMs, including
encryption schemes. MDRC requested
an exemption that would allow a
patient, or persons acting on behalf of
the patient, to circumvent TPMs on
these transmissions so that the patient is
able to access the data generated by his
or her own medical device and any
corresponding personal monitoring
system, without the need to visit a
hospital or doctor’s office.
As explained above, MDRC’s petition
also encompassed security research into
medical device software. The Office
accordingly set forth the following class
in the NPRM:
Proposed Class 27: The proposed class
would allow circumvention of TPMs
protecting computer programs in medical
devices designed for attachment to or
implantation in patients and in their
corresponding monitoring devices, as well as
the outputs generated through those
programs. As proposed, the exemption would
be limited to cases where circumvention is at
the direction of a patient seeking access to
information generated by his or her own
32 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 378–403.
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
Lhorne on DSK5TPTVN1PROD with RULES
device, or at the direction of those
conducting research into the safety, security,
and effectiveness of such devices. The
proposal would cover devices such as
pacemakers, implantable cardioverter
defibrillators, insulin pumps, and continuous
glucose monitors.
As also noted above, the Register
concluded that Proposed Class 27
should be divided into Proposed Class
27A, concerning security research, and
Proposed Class 27B, concerning patient
data, to allow the two types of uses to
be separately analyzed. Class 27A is
addressed with the other security
research-related classes above. A
discussion of Class 27B follows.
MDRC explained that an exemption to
circumvent TPMs protecting medical
device data would give patients realtime access to their own health data,
allowing them, for example, to
immediately detect major health risks or
facilitate highly personalized treatment.
As framed by MDRC, the exemption
would provide access only to TPMprotected data outputs of medical
devices, not to computer programs
contained within medical devices or
their corresponding monitoring systems.
Although MDRC explained that such
data is uncopyrightable to the extent it
merely consists of physiological facts,
such as a patient’s blood glucose level,
it expressed concern that the data
outputs of some devices may constitute
copyrightable compilations. MDRC
asserted that the proposed use of such
compilations would be a fair use, and
urged the Office to adopt an exemption
covering such circumstances. MDRC
explained that the prohibition on
circumvention adversely affects
patients’ ability to monitor their own
health in real time, and that those
adverse effects are likely to increase
because FDA has encouraged
manufacturers to impose TPMs on data
outputs. Responding to concerns about
the impact of such an exemption on the
battery life of implanted devices, MDRC
explained that the exemption could be
limited to passive monitoring of data
that is already being transmitted by the
medical device or monitoring system.
The Office received comments in
opposition to the proposed exemption
from AdvaMed, IPO, LifeScience Alley,
and NAM. AdvaMed agreed with MDRC
that in certain circumstances, the
selection and arrangement of data
generated by a medical device might be
copyrightable as a compilation.
Opponents, however, provided little
argument to counter MDRC’s claim that
patient access to such medical data
constitutes a noninfringing fair use.
Indeed, they conceded that patients
have an ‘‘inherent right’’ to access their
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
own medical data, but argued that this
right is satisfied by obtaining data via
authorized means, such as through a
patient’s health care provider.
Opponents also relied heavily on the
claim that the exemption would create
health and safety concerns. For
example, opponents contended that
requesting data from implanted devices
at an abnormally high rate could reduce
the battery life of such devices.
Opponents suggested that the Copyright
Office allow an opportunity for FDA to
provide input on the proposed
exemption.
In light of opponents’ comments, the
Office advised FDA of the pendency of
this proceeding. In a responsive letter to
the Office, FDA expressed concern
about facilitating access to data that
includes patient health information or
personally identifiable information,
noting that the use of such data is
subject to government regulation. FDA
recommended that any exemption
indicate that it was not intended to
override the regulations of other federal
agencies.
NTIA supported the proposed
exemption, explaining among other
things that the exemption would allow
patients to see and react to data
collected by their devices in real time.
NTIA also concluded that the
exemption is unlikely to adversely affect
the operation of the medical device
itself, based on MDRC’s assertion that
data would be passively intercepted as
it is wirelessly transmitted from the
device or monitoring system.
The Register recommended granting
the proposed exemption. The Register
observed that in many cases, data
outputs generated by devices would
likely be uncopyrightable, and that in
such cases, section 1201(a)(1)—which is
limited to works protected under title
17—would not apply. The Register
noted, however, that some data outputs
could qualify for protection as literary
works if they reflect a sufficiently
original selection and presentation of
data, and that opponents themselves
agreed that such outputs could be
subject to copyright. Accordingly, the
Register concluded that an exemption
would be appropriate to enable patients’
access to their own medical data as
embodied in protectable data
compilations generated by implanted
medical devices and corresponding
personal monitoring systems. The
Register concluded that accessing one’s
own medical data is likely to be a fair
and noninfringing use, and that TPMs
on that data are likely to have an
adverse impact on such access,
especially as TPMs become more
prevalent in response to FDA guidance.
PO 00000
Frm 00079
Fmt 4700
Sfmt 4700
65959
In addition, the Register concluded that
the statutory factors favor an exemption.
In light of concerns about the effect of
circumvention on the battery life of
implanted medical devices, the Register
recommended that the exemption reflect
the approach suggested by MDRC, so it
is limited to passively accessing data
that is already being generated or
transmitted by the device. Further, as
suggested by FDA, the recommended
exemption expressly provides that any
actions taken under the exemption must
be compliant with all applicable laws
and regulations. The recommended
exemption does not permit
circumvention ‘‘at the direction of a
patient,’’ as a broader exception
allowing third parties to engage in
circumvention activities on behalf of
others could implicate the antitrafficking provisions of section
1201(a)(2) and (b). Unlike the
recommended exemptions for security
research and vehicle diagnosis, repair
and modification, the Register
recommended that the exemption for
access to patient data be effective
without delay because the passive
monitoring of data transmissions did
not appear to present any immediate
safety or health concerns.
Accordingly, based on the Register’s
recommendation, the Librarian adopts
the following exemption:
Literary works consisting of compilations
of data generated by medical devices that are
wholly or partially implanted in the body or
by their corresponding personal monitoring
systems, where such circumvention is
undertaken by a patient for the sole purpose
of lawfully accessing the data generated by
his or her own device or monitoring system
and does not constitute a violation of
applicable law, including without limitation
the Health Insurance Portability and
Accountability Act of 1996, the Computer
Fraud and Abuse Act of 1986 or regulations
of the Food and Drug Administration, and is
accomplished through the passive
monitoring of wireless transmissions that are
already being produced by such device or
monitoring system.
B. Classes Considered but Not
Recommended
Based upon the record in this
proceeding, the Register of Copyrights
recommends that the Librarian
determine that the following classes of
works shall not be exempt from the
prohibition against circumvention of
technological measures set forth in
section 1201(a)(1):
E:\FR\FM\28OCR1.SGM
28OCR1
65960
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
reaffirmed judicial reluctance to
embrace a general space-shifting
privilege.
At the same time, the Register
recognized the consumer appeal of the
proposals, and marketplace efforts to
meet consumer demand for accessing
movies and books in a wide variety of
formats. According to the Register, the
policy judgments surrounding the
creation of a novel exception for spaceor format-shifting of copyrighted works
are complex and thus best left to
Congress or the courts.
For both classes, proponents argued
that space- and format-shifting for
personal, noncommercial uses are fair
uses. In the past four rulemakings, the
Register has declined to recommend,
and the Librarian has declined to adopt,
an exemption for such uses because the
proponents had failed to establish a
legal or factual record sufficient to
establish that the space- or formatshifting of audiovisual works, e-books,
and other copyrighted works constitutes
a noninfringing use. In this rulemaking,
proponents argued that reconsideration
of that position was warranted in light
of a recent district court decision, Fox
Broadcasting Co. v. Dish Network LLC,34
as well as certain statements from
legislative history of certain aspects of
the Copyright Act, including a
discussion of how the creation of a
limited copyright in sound recordings
might impact home audio recording.
Opponents urged that noncommercial
space- and format-shifting are not
established fair uses under the law.
They further argued that, in any event,
an exemption is unwarranted in light of
the continued growth of licensed digital
distribution services that provide
meaningful alternatives to
circumvention, including digital rights
locker services such as UltraViolet and
Disney Movies Anywhere and disc-todigital services such as VUDU and
Flixter that allow consumers to convert
previously purchased DVDs or Blu-ray
discs into high-quality digital files.
According to opponents, an exemption
that allowed broad-based space- or
format-shifting would undermine not
only the existing markets for DVDs and
Blu-ray discs but also these emerging
online distribution models.
NTIA, as it has in the past, supported
what it termed a ‘‘narrowed version’’ of
an exemption to allow circumvention
when the work is not accompanied by
an additional copy of the work in an
alternate digital format. In NTIA’s view,
the exemption is an issue of consumer
protection, although NTIA
acknowledged the broader debate about
the merits and legality of
noncommercial space-shifting.
The Register recommended against
the adoption of a proposed exemption,
on the ground that the law of fair use,
as it stands today, does not sanction
broad-based space-shifting or formatshifting. The Register rejected
proponents’ attempt to rely on the Dish
Network case, explaining that the uses at
issue there were much more
circumscribed than the uses proposed
for this exemption. In particular, the
service at issue in Dish Network
included many safeguards to prevent
unfettered use of the relevant content,
including limitations on the length of
time content would be available on the
device to which a work is transferred.
Accordingly, the Register concluded
that the case was both factually and
legally distinguishable. On the other
hand, the recent case of Fox News
Network, LLC v. TVEyes Inc.,35
33 The Register’s analysis and conclusions for
these classes, including citations to the record and
relevant legal authority, can be found in the
Recommendation at 107–26.
34 No. CV 12–4529 DMG (SHx), 2015 WL
1137593, at *30–31 (C.D. Cal. Jan. 20, 2015).
35 No. 13 Civ. 5315 (AKH), 2015 WL 5025274
(S.D.N.Y. Aug. 25, 2015).
36 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 193–94.
1. Proposed Classes 8 and 10:
Audiovisual Works and Literary Works
Distributed Electronically—SpaceShifting and Format-Shifting 33
Proposed Classes 8 and 10 would
have permitted circumvention of
technological measures protecting
motion pictures, e-books, and other
audiovisual or literary works to allow
users to view the materials on alternate
devices for personal use or to create
back-up copies. Broadly speaking, this
activity is referred to as ‘‘space-shifting’’
and, in some cases, ‘‘format-shifting.’’
Public Knowledge requested an
exemption to engage broadly in
noncommercial space-shifting of motion
pictures distributed on DVDs, Blu-ray
discs, and downloaded files. Alpheus
Madsen requested an exemption to
allow circumvention of access controls
on DVDs specifically in order to play
the DVDs on the Linux operating
system. These overlapping exemptions
were combined into the following class:
Proposed Class 8: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
audiovisual works for the purpose of
noncommercial space-shifting or formatshifting. This exemption has been requested
for audiovisual material made available on
DVDs protected by CSS, Blu-ray discs
protected by AACS, and TPM-protected
online distribution services.
Christopher Meadows, in turn,
proposed an exemption to engage in
noncommercial space- or format-shifting
of e-books, to allow consumers to view
TPM-protected e-books on alternate
viewing platforms and to create back-up
copies. The proposed exemption was
described as follows:
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 10: This proposed class
would allow circumvention of access
controls on lawfully made and acquired
literary works distributed electronically for
the purpose of noncommercial space-shifting
or format-shifting. This exemption has been
requested for literary works distributed
electronically [as] e-books.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
PO 00000
Frm 00080
Fmt 4700
Sfmt 4700
2. Proposed Class 18: Jailbreaking—
Dedicated E-Book Readers 36
This class would have allowed
circumvention of technological
measures protecting dedicated e-book
readers, such as Amazon’s Kindle
Paperwhite, to run lawfully acquired
third-party applications or software on
such devices. Maneesh Pangasa filed a
petition seeking this exemption, and the
NPRM described the class as follows:
Proposed Class 18: This proposed class
would permit the jailbreaking of dedicated ebook readers to allow those devices to run
lawfully acquired software that is otherwise
prevented from running.
Pangasa, however, failed to submit
further written comments or evidentiary
material in support of the petition and
did not participate in the public
hearings. The written comments that
were received in connection with this
class were abbreviated and did not offer
specific factual information or legal
argument in support of the exemption.
At the public hearing, proponent Jay
Freeman briefly mentioned that people
have jailbroken e-book readers to install
screen savers or achieve other
functionality, but no further evidence
was presented in relation to this class.
There were no opposition comments
filed.
Although, as part of its discussion of
the jailbreaking exemptions for
smartphones and all-purpose mobile
computing devices, NTIA expressed
support for a jailbreaking exemption for
dedicated e-book readers, NTIA did not
point to anything specific in the record
to support the requested exemption.
In light of the insufficiency of factual
or legal support for the proposed
exemption, the Register declined to
recommend it.
E:\FR\FM\28OCR1.SGM
28OCR1
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
3. Proposed Class 19: Jailbreaking—
Video Game Consoles 37
Maneesh Pangasa filed a petition
proposing an exemption to permit
jailbreaking of home video game
consoles for an assortment of asserted
noninfringing uses, including installing
alternative operating systems. The
Librarian rejected a similar exemption
in 2012 because of substantial concerns
about video game piracy. The Copyright
Office set forth the following proposal
in the NPRM:
Lhorne on DSK5TPTVN1PROD with RULES
Proposed Class 19: This proposed class
would permit the jailbreaking of home video
game consoles. Asserted noninfringing uses
include installing alternative operating
systems, running lawfully acquired
applications, preventing the reporting of
personal usage information to the
manufacturer, and removing region locks.
The requested exemption would apply both
to older and currently marketed game
consoles.
NTIA concluded that the record did not
support a broader exemption, as the
record is ‘‘significantly less robust and
detailed than it was in the last
rulemaking.’’
The Register concluded that the
record in this rulemaking did not
provide a basis for departing from her
2012 recommendation that an
exemption for video game console
jailbreaking should be denied.
According to the Register, the record
was not materially different from that
considered in 2012, and included
evidence demonstrating that
jailbreaking of video game consoles
continues to be closely associated with
video game piracy, thus undermining
the value of console software as a secure
distribution platform. The Register also
concluded that the need to engage in
console repair did not provide a basis
for an exemption in light of the
availability of authorized repair services
and the ability of proponents and others
to perform repairs without the need to
circumvent.
Pangasa failed to file supporting
comments or participate in the public
hearings, and the brief written
comments filed by other parties
provided scant support for the
exemption. The limited amount of
factual support offered in written
comments—concerning academic
research projects and ‘‘homebrew’’
video games—largely mirrored factual
claims that were not persuasive in the
2012 proceeding. At the public hearing,
the representative of commenting party
iFixit provided some additional
information regarding certain types of
video game console repairs for which
jailbreaking might be useful. At the
same time, however, he acknowledged
that the referenced repairs could be
undertaken without circumvention.
Class 19 was opposed by ESA and
Joint Creators. As in 2012, opponents
provided substantial evidence that
console jailbreaking is closely tied to
video game piracy. In response to
iFixit’s concerns about console repair,
ESA observed that all major console
manufacturers offer repair services for
consoles still under warranty at no
charge, and for out-of-warranty consoles
for prices ranging from $99 to $149.
iFixit agreed with this assessment.
NTIA supported an exemption limited
to repair of malfunctioning hardware for
systems that are obsolete or no longer
covered by manufacturer warranty, on
the ground that to use an authorized
repair service, the owner must send the
console to the manufacturer and pay a
‘‘substantial’’ fee. At the same time,
Proposed Class 24: This proposed class
would allow circumvention of access
controls consisting of the PACE content
protection system, which restricts access to
the full functionality of lawfully acquired
Ensoniq PARIS music recording software.
37 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 195–201.
38 The Register’s analysis and conclusions for this
class, including citations to the record and relevant
legal authority, can be found in the
Recommendation at 354–55.
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
4. Proposed Class 24: Abandoned
Software—Music Recording Software 38
This proposed exemption would have
allowed circumvention of a dongle-like
access control that is allegedly no longer
supported by the developer or copyright
owner and protects a specific type of
music recording software, Ensoniq
PARIS. Three individuals proposed this
exemption, Richard Kelley, James
McCloskey, and Michael Yanoska, and
the Copyright Office set forth the
following proposal in the NPRM:
No evidence or argument to support
this exemption was submitted after the
initial petition phase of the proceeding.
The class was opposed by Joint Creators,
who raised concerns about the lack of
supporting evidence.
In light of the incomplete record,
NTIA and the Register declined to
recommend granting the exemption.
C. Conclusion
Having considered the evidence in the
record, the contentions of the
commenting parties, and the statutory
objectives, the Register of Copyrights
has recommended that the Librarian of
Congress publish certain classes of
PO 00000
Frm 00081
Fmt 4700
Sfmt 4700
65961
works, as designated above, so that the
prohibition against circumvention of
technological measures that effectively
control access to copyrighted works
shall not apply to persons who engage
in noninfringing uses of those particular
classes of works.
Dated: October 20, 2015.
Maria A. Pallante,
Register of Copyrights and Director of the
U.S. Copyright Office.
Determination of the Librarian of
Congress
Having duly considered and accepted
the Recommendation of the Register of
Copyrights, which Recommendation is
hereby incorporated by reference, the
Librarian of Congress, pursuant to 17
U.S.C. 1201(a)(1)(C) and (D), hereby
publishes as a new rule the classes of
copyrighted works that shall for a threeyear period be subject to the exemption
provided in 17 U.S.C. 1201(a)(1)(B) from
the prohibition against circumvention of
technological measures that effectively
control access to copyrighted works set
forth in 17 U.S.C. 1201(a)(1)(A).
List of Subjects in 37 CFR Part 201
Copyright, Exemptions to prohibition
against circumvention.
Final Regulations
For the reasons set forth in the
preamble, 37 CFR part 201 is amended
as follows:
PART 201—GENERAL PROVISIONS
1. The authority citation for part 201
continues to read as follows:
■
Authority: 17 U.S.C. 702
2. Section 201.40 is amended by
revising paragraph (b) and removing
paragraph (d).
The revision reads as follows:
■
§ 201.40 Exemption to prohibition against
circumvention.
*
*
*
*
*
(b) Classes of copyrighted works.
Pursuant to the authority set forth in 17
U.S.C. 1201(a)(1)(C) and (D), and upon
the recommendation of the Register of
Copyrights, the Librarian has
determined that the prohibition against
circumvention of technological
measures that effectively control access
to copyrighted works set forth in 17
U.S.C. 1201(a)(1)(A) shall not apply to
persons who engage in noninfringing
uses of the following classes of
copyrighted works:
(1) Motion pictures (including
television shows and videos), as defined
in 17 U.S.C. 101, where circumvention
is undertaken solely in order to make
use of short portions of the motion
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
65962
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
pictures for the purpose of criticism or
comment in the following instances:
(i) For use in documentary
filmmaking,
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) Where the motion picture is
lawfully made and acquired on a DVD
protected by the Content Scramble
System, on a Blu-ray disc protected by
the Advanced Access Control System, or
via a digital transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(ii) For use in noncommercial videos
(including videos produced for a paid
commission if the commissioning
entity’s use is noncommercial),
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) Where the motion picture is
lawfully made and acquired on a DVD
protected by the Content Scramble
System, on a Blu-ray disc protected by
the Advanced Access Control System, or
via a digital transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(iii) For use in nonfiction multimedia
e-books offering film analysis,
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) Where the motion picture is
lawfully made and acquired on a DVD
protected by the Content Scramble
System, on a Blu-ray disc protected by
the Advanced Access Control System, or
via a digital transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(iv) By college and university faculty
and students, for educational purposes,
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) In film studies or other courses
requiring close analysis of film and
media excerpts where the motion
picture is lawfully made and acquired
on a DVD protected by the Content
Scramble System, on a Blu-ray disc
protected by the Advanced Access
Control System, or via a digital
transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(v) By faculty of massive open online
courses (MOOCs) offered by accredited
nonprofit educational institutions to
officially enrolled students through
online platforms (which platforms
themselves may be operated for profit),
for educational purposes, where the
MOOC provider through the online
platform limits transmissions to the
extent technologically feasible to such
officially enrolled students, institutes
copyright policies and provides
copyright informational materials to
faculty, students and relevant staff
members, and applies technological
measures that reasonably prevent
unauthorized further dissemination of a
work in accessible form to others or
retention of the work for longer than the
course session by recipients of a
transmission through the platform, as
contemplated by 17 U.S.C. 110(2),
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) In film studies or other courses
requiring close analysis of film and
media excerpts where the motion
picture is lawfully made and acquired
on a DVD protected by the Content
Scramble System, on a Blu-ray disc
protected by the Advanced Access
Control System, or via a digital
transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(vi) By kindergarten through twelfthgrade educators, including of accredited
PO 00000
Frm 00082
Fmt 4700
Sfmt 4700
general educational development (GED)
programs, for educational purposes,
(A) Where the circumvention is
undertaken using screen-capture
technology that appears to be offered to
the public as enabling the reproduction
of motion pictures after content has
been lawfully acquired and decrypted,
or
(B) In film studies or other courses
requiring close analysis of film and
media excerpts where the motion
picture is lawfully made and acquired
on a DVD protected by the Content
Scramble System, or via a digital
transmission protected by a
technological measure, and where the
person engaging in circumvention
reasonably believes that screen-capture
software or other non-circumventing
alternatives are unable to produce the
required level of high-quality content;
(vii) By kindergarten through twelfthgrade students, including those in
accredited general educational
development (GED) programs, for
educational purposes, where the
circumvention is undertaken using
screen-capture technology that appears
to be offered to the public as enabling
the reproduction of motion pictures
after content has been lawfully acquired
and decrypted; and
(viii) By educators and participants in
nonprofit digital and media literacy
programs offered by libraries, museums
and other nonprofit entities with an
educational mission, in the course of
face-to-face instructional activities for
educational purposes, where the
circumvention is undertaken using
screen-capture technology that appears
to be offered to the public as enabling
the reproduction of motion pictures
after content has been lawfully acquired
and decrypted.
(2) Literary works, distributed
electronically, that are protected by
technological measures that either
prevent the enabling of read-aloud
functionality or interfere with screen
readers or other applications or assistive
technologies,
(i) When a copy of such a work is
lawfully obtained by a blind or other
person with a disability, as such a
person is defined in 17 U.S.C. 121;
provided, however, that the rights
owner is remunerated, as appropriate,
for the price of the mainstream copy of
the work as made available to the
general public through customary
channels, or
(ii) When such work is a nondramatic
literary work, lawfully obtained and
used by an authorized entity pursuant to
17 U.S.C. 121.
(3)(i) Computer programs that enable
the following types of wireless devices
E:\FR\FM\28OCR1.SGM
28OCR1
Lhorne on DSK5TPTVN1PROD with RULES
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
to connect to a wireless
telecommunications network, when
circumvention is undertaken solely in
order to connect to a wireless
telecommunications network and such
connection is authorized by the operator
of such network, and the device is a
used device:
(A) Wireless telephone handsets (i.e.,
cellphones);
(B) All-purpose tablet computers;
(C) Portable mobile connectivity
devices, such as mobile hotspots,
removable wireless broadband modems,
and similar devices; and
(D) Wearable wireless devices
designed to be worn on the body, such
as smartwatches or fitness devices.
(ii) A device is considered ‘‘used’’ for
purposes of this exemption when it has
previously been lawfully acquired and
activated on the wireless
telecommunications network of a
wireless carrier.
(4) Computer programs that enable
smartphones and portable all-purpose
mobile computing devices to execute
lawfully obtained software applications,
where circumvention is accomplished
for the sole purpose of enabling
interoperability of such applications
with computer programs on the
smartphone or device, or to permit
removal of software from the
smartphone or device. For purposes of
this exemption, a ‘‘portable all-purpose
mobile computing device’’ is a device
that is primarily designed to run a wide
variety of programs rather than for
consumption of a particular type of
media content, is equipped with an
operating system primarily designed for
mobile use, and is intended to be
carried or worn by an individual.
(5) Computer programs that enable
smart televisions to execute lawfully
obtained software applications, where
circumvention is accomplished for the
sole purpose of enabling interoperability
of such applications with computer
programs on the smart television.
(6) Computer programs that are
contained in and control the functioning
of a motorized land vehicle such as a
personal automobile, commercial motor
vehicle or mechanized agricultural
vehicle, except for computer programs
primarily designed for the control of
telematics or entertainment systems for
such vehicle, when circumvention is a
necessary step undertaken by the
authorized owner of the vehicle to allow
the diagnosis, repair or lawful
modification of a vehicle function; and
where such circumvention does not
constitute a violation of applicable law,
including without limitation regulations
promulgated by the Department of
Transportation or the Environmental
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
Protection Agency; and provided,
however, that such circumvention is
initiated no earlier than 12 months after
the effective date of this regulation.
(7)(i) Computer programs, where the
circumvention is undertaken on a
lawfully acquired device or machine on
which the computer program operates
solely for the purpose of good-faith
security research and does not violate
any applicable law, including without
limitation the Computer Fraud and
Abuse Act of 1986, as amended and
codified in title 18, United States Code;
and provided, however, that, except as
to voting machines, such circumvention
is initiated no earlier than 12 months
after the effective date of this regulation,
and the device or machine is one of the
following:
(A) A device or machine primarily
designed for use by individual
consumers (including voting machines);
(B) A motorized land vehicle; or
(C) A medical device designed for
whole or partial implantation in
patients or a corresponding personal
monitoring system, that is not and will
not be used by patients or for patient
care.
(ii) For purposes of this exemption,
‘‘good-faith security research’’ means
accessing a computer program solely for
purposes of good-faith testing,
investigation and/or correction of a
security flaw or vulnerability, where
such activity is carried out in a
controlled environment designed to
avoid any harm to individuals or the
public, and where the information
derived from the activity is used
primarily to promote the security or
safety of the class of devices or
machines on which the computer
program operates, or those who use
such devices or machines, and is not
used or maintained in a manner that
facilitates copyright infringement.
(8)(i) Video games in the form of
computer programs embodied in
physical or downloaded formats that
have been lawfully acquired as
complete games, when the copyright
owner or its authorized representative
has ceased to provide access to an
external computer server necessary to
facilitate an authentication process to
enable local gameplay, solely for the
purpose of:
(A) Permitting access to the video
game to allow copying and modification
of the computer program to restore
access to the game for personal
gameplay on a personal computer or
video game console; or
(B) Permitting access to the video
game to allow copying and modification
of the computer program to restore
access to the game on a personal
PO 00000
Frm 00083
Fmt 4700
Sfmt 4700
65963
computer or video game console when
necessary to allow preservation of the
game in a playable form by an eligible
library, archives or museum, where
such activities are carried out without
any purpose of direct or indirect
commercial advantage and the video
game is not distributed or made
available outside of the physical
premises of the eligible library, archives
or museum.
(ii) Computer programs used to
operate video game consoles solely to
the extent necessary for an eligible
library, archives or museum to engage in
the preservation activities described in
paragraph (i)(B).
(iii) For purposes of the exemptions in
paragraphs (i) and (ii), the following
definitions shall apply:
(A) ‘‘Complete games’’ means video
games that can be played by users
without accessing or reproducing
copyrightable content stored or
previously stored on an external
computer server.
(B) ‘‘Ceased to provide access’’ means
that the copyright owner or its
authorized representative has either
issued an affirmative statement
indicating that external server support
for the video game has ended and such
support is in fact no longer available or,
alternatively, server support has been
discontinued for a period of at least six
months; provided, however, that server
support has not since been restored.
(C) ‘‘Local gameplay’’ means
gameplay conducted on a personal
computer or video game console, or
locally connected personal computers or
consoles, and not through an online
service or facility.
(D) A library, archives or museum is
considered ‘‘eligible’’ when the
collections of the library, archives or
museum are open to the public and/or
are routinely made available to
researchers who are not affiliated with
the library, archives or museum.
(9) Computer programs that operate
3D printers that employ microchipreliant technological measures to limit
the use of feedstock, when
circumvention is accomplished solely
for the purpose of using alternative
feedstock and not for the purpose of
accessing design software, design files
or proprietary data; provided, however,
that the exemption shall not extend to
any computer program on a 3D printer
that produces goods or materials for use
in commerce the physical production of
which is subject to legal or regulatory
oversight or a related certification
process, or where the circumvention is
otherwise unlawful.
(10) Literary works consisting of
compilations of data generated by
E:\FR\FM\28OCR1.SGM
28OCR1
65964
Federal Register / Vol. 80, No. 208 / Wednesday, October 28, 2015 / Rules and Regulations
medical devices that are wholly or
partially implanted in the body or by
their corresponding personal monitoring
systems, where such circumvention is
undertaken by a patient for the sole
purpose of lawfully accessing the data
generated by his or her own device or
monitoring system and does not
constitute a violation of applicable law,
including without limitation the Health
Insurance Portability and
Accountability Act of 1996, the
Computer Fraud and Abuse Act of 1986
or regulations of the Food and Drug
Administration, and is accomplished
through the passive monitoring of
wireless transmissions that are already
being produced by such device or
monitoring system.
*
*
*
*
*
Dated: October 20, 2015.
David S. Mao,
Acting Librarian of Congress.
[FR Doc. 2015–27212 Filed 10–27–15; 8:45 am]
BILLING CODE 1410–30–P
ENVIRONMENTAL PROTECTION
AGENCY
40 CFR Part 180
[EPA–HQ–OPP–2014–0591; FRL–9934–14]
Methoxyfenozide; Pesticide Tolerances
Environmental Protection
Agency (EPA).
ACTION: Final rule.
AGENCY:
This regulation establishes
tolerances for residues of
methoxyfenozide in or on multiple
commodities which are identified and
discussed later in this document.
Interregional Research Project Number 4
(IR–4) requested these tolerances under
the Federal Food, Drug, and Cosmetic
Act (FFDCA).
DATES: This regulation is effective
October 28, 2015. Objections and
requests for hearings must be received
on or before December 28, 2015, and
must be filed in accordance with the
instructions provided in 40 CFR part
178 (see also Unit I.C. of the
SUPPLEMENTARY INFORMATION).
ADDRESSES: The docket for this action,
identified by docket identification (ID)
number EPA–HQ–OPP–2014–0591, is
available at https://www.regulations.gov
or at the Office of Pesticide Programs
Regulatory Public Docket (OPP Docket)
in the Environmental Protection Agency
Docket Center (EPA/DC), West William
Jefferson Clinton Bldg., Rm. 3334, 1301
Constitution Ave. NW., Washington, DC
20460–0001. The Public Reading Room
Lhorne on DSK5TPTVN1PROD with RULES
SUMMARY:
VerDate Sep<11>2014
15:03 Oct 27, 2015
Jkt 238001
is open from 8:30 a.m. to 4:30 p.m.,
Monday through Friday, excluding legal
holidays. The telephone number for the
Public Reading Room is (202) 566–1744,
and the telephone number for the OPP
Docket is (703) 305–5805. Please review
the visitor instructions and additional
information about the docket available
at https://www.epa.gov/dockets.
FOR FURTHER INFORMATION CONTACT:
Susan Lewis, Registration Division
(7505P), Office of Pesticide Programs,
Environmental Protection Agency, 1200
Pennsylvania Ave. NW., Washington,
DC 20460–0001; main telephone
number: (703) 305–7090; email address:
RDFRNotices@epa.gov.
SUPPLEMENTARY INFORMATION:
I. General Information
A. Does this action apply to me?
You may be potentially affected by
this action if you are an agricultural
producer, food manufacturer, or
pesticide manufacturer. The following
list of North American Industrial
Classification System (NAICS) codes is
not intended to be exhaustive, but rather
provides a guide to help readers
determine whether this document
applies to them. Potentially affected
entities may include:
• Crop production (NAICS code 111).
• Animal production (NAICS code
112).
• Food manufacturing (NAICS code
311).
• Pesticide manufacturing (NAICS
code 32532).
B. How can I get electronic access to
other related information?
You may access a frequently updated
electronic version of EPA’s tolerance
regulations at 40 CFR part 180 through
the Government Printing Office’s e-CFR
site at https://www.ecfr.gov/cgi-bin/textidx?&c=ecfr&tpl=/ecfrbrowse/Title40/
40tab_02.tpl.
C. How can I file an objection or hearing
request?
Under FFDCA section 408(g), 21
U.S.C. 346a, any person may file an
objection to any aspect of this regulation
and may also request a hearing on those
objections. You must file your objection
or request a hearing on this regulation
in accordance with the instructions
provided in 40 CFR part 178. To ensure
proper receipt by EPA, you must
identify docket ID number EPA–HQ–
OPP–2014–0591 in the subject line on
the first page of your submission. All
objections and requests for a hearing
must be in writing, and must be
received by the Hearing Clerk on or
before December 28, 2015. Addresses for
PO 00000
Frm 00084
Fmt 4700
Sfmt 4700
mail and hand delivery of objections
and hearing requests are provided in 40
CFR 178.25(b).
In addition to filing an objection or
hearing request with the Hearing Clerk
as described in 40 CFR part 178, please
submit a copy of the filing (excluding
any Confidential Business Information
(CBI)) for inclusion in the public docket.
Information not marked confidential
pursuant to 40 CFR part 2 may be
disclosed publicly by EPA without prior
notice. Submit the non-CBI copy of your
objection or hearing request, identified
by docket ID number EPA–HQ–OPP–
2014–0591, by one of the following
methods:
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the online
instructions for submitting comments.
Do not submit electronically any
information you consider to be CBI or
other information whose disclosure is
restricted by statute.
• Mail: OPP Docket, Environmental
Protection Agency Docket Center (EPA/
DC), (28221T), 1200 Pennsylvania Ave.
NW., Washington, DC 20460–0001.
• Hand Delivery: To make special
arrangements for hand delivery or
delivery of boxed information, please
follow the instructions at https://
www.epa.gov/dockets/contacts.html.
Additional instructions on
commenting or visiting the docket,
along with more information about
dockets generally, is available at https://
www.epa.gov/dockets.
II. Summary of Petitioned-For
Tolerance
In the Federal Register of March 4,
2015 (80 FR 11611) (FRL–9922–68),
EPA issued a document pursuant to
FFDCA section 408(d)(3), 21 U.S.C.
346a(d)(3), announcing the filing of a
pesticide petition (PP 4E8298) by IR–4,
500 College Road East, Suite 201W,
Princeton, NJ 08540. The petition
requested that 40 CFR part 180 be
amended by establishing tolerances for
residues of the insecticide
methoxyfenozide, (3-methoxy-2methylbenzoic acid 2-(3,5dimethylbenzoyl)-2-(1,1-dimethylethyl)
hydrazide), under paragraph (a) in or
on: Chive, fresh leaves at 30.0 parts per
million (ppm); fruit, stone, group 12–12,
except plum, prune, fresh at 3.0 ppm;
and nut, tree, group 14–12 at 0.10 ppm.
The petition also proposed the
following tolerances under paragraph (a)
be removed upon approval of the
proposed tolerances listed above: Fruit,
stone, group 12, except plum, prune,
fresh at 3.0 ppm; nut, tree, group 14 at
0.10 ppm; pistachio at 0.10 ppm; and in
paragraph (d), chive at 4.5 ppm be
removed. The petition additionally
E:\FR\FM\28OCR1.SGM
28OCR1
Agencies
[Federal Register Volume 80, Number 208 (Wednesday, October 28, 2015)]
[Rules and Regulations]
[Pages 65944-65964]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-27212]
=======================================================================
-----------------------------------------------------------------------
LIBRARY OF CONGRESS
Copyright Office
37 CFR Part 201
[Docket No. 2014-07]
Exemption to Prohibition on Circumvention of Copyright Protection
Systems for Access Control Technologies
AGENCY: U.S. Copyright Office, Library of Congress.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: In this final rule, the Librarian of Congress adopts
exemptions to the provision of the Digital Millennium Copyright Act
(``DMCA'') that prohibits circumvention of technological measures that
control access to copyrighted works, codified in section 1201(a)(1) of
title 17 of the United States Code. As required under the statute, the
Register of Copyrights, following a public proceeding, submitted a
Recommendation concerning proposed exemptions to the Librarian of
Congress. After careful consideration, the Librarian adopts final
regulations based upon the Register's Recommendation.
DATES: Effective October 28, 2015.
FOR FURTHER INFORMATION CONTACT: Jacqueline C. Charlesworth, General
Counsel and Associate Register of Copyrights, by email at
jcharlesworth@loc.gov or by telephone at 202-707-8350; Sarang V. Damle,
Deputy General Counsel, by email at sdam@loc.gov or by telephone at
202-707-8350; or Stephen Ruwe, Assistant General Counsel, by email at
sruwe@loc.gov or by telephone at 202-707-8350.
SUPPLEMENTARY INFORMATION: The Librarian of Congress, pursuant to
section 1201(a)(1) of title 17, United States Code, has determined in
this sixth triennial rulemaking proceeding that the prohibition against
circumvention of technological measures that effectively control access
to copyrighted works shall not apply to persons who engage in
noninfringing uses of certain classes of such works. This determination
is based upon the Recommendation of the Register of Copyrights, which
was transmitted to the Librarian on October 8, 2015.\1\
---------------------------------------------------------------------------
\1\ Register of Copyrights, Section 1201 Rulemaking: Sixth
Triennial Proceeding to Determine Exemptions to the Prohibition on
Circumvention, Recommendation of the Register of Copyrights (Oct.
2015) (``Register's Recommendation'').
---------------------------------------------------------------------------
The below discussion summarizes the rulemaking proceeding and
Register's Recommendation, announces the Librarian's determination, and
publishes the regulatory text specifying the exempted classes of works.
A more complete discussion of the rulemaking process, the evidentiary
record, and the Register's analysis can be found in the Register's
Recommendation, which is posted at www.copyright.gov/1201/.
I. Background
A. Statutory Requirements
Congress enacted the DMCA in 1998 to implement certain provisions
of the WIPO Copyright and WIPO Performances and Phonograms Treaties.
Among other things, title I of the DMCA, which added a new chapter 12
to title 17 of the U.S. Code, prohibits circumvention of technological
measures employed by or on behalf of copyright owners to protect access
to their works. In enacting this aspect of the law, Congress observed
that technological protection measures (``TPMs'') can ``support new
ways of disseminating copyrighted materials to users, and . . .
safeguard the availability of legitimate uses of those materials by
individuals.'' \2\
---------------------------------------------------------------------------
\2\ Staff of H. Comm. on the Judiciary, 105th Cong., Section-by-
Section Analysis of H.R. 2281 as Passed by the United States House
of Representatives on August 4, 1998, at 6 (Comm. Print 1998).
---------------------------------------------------------------------------
Section 1201(a)(1) provides in pertinent part that ``[n]o person
shall circumvent a technological measure that effectively controls
access to a work protected under [title 17].'' Under the statute, to
``circumvent a technological measure'' means ``to descramble a
scrambled work, to decrypt an encrypted work, or otherwise to avoid,
bypass, remove, deactivate, or impair a technological measure, without
the authority of the copyright owner.'' \3\ A technological measure
that ``effectively controls access to a work'' is one that ``in the
ordinary course of its operation, requires the application of
information, or a process or a treatment, with the authority of the
copyright owner, to gain access to the work.'' \4\
---------------------------------------------------------------------------
\3\ 17 U.S.C. 1201(a)(3)(A).
\4\ 17 U.S.C. 1201(a)(3)(B).
---------------------------------------------------------------------------
Section 1201(a)(1), however, also includes what Congress
characterized as a ``fail-safe'' mechanism,\5\ which requires the
Librarian of Congress, following a rulemaking proceeding, to publish
any class of copyrighted works as to which the Librarian has determined
that noninfringing uses by persons who are users of a copyrighted work
are, or are likely to be, adversely affected by the prohibition against
circumvention in the succeeding three-year period, thereby exempting
that class from the prohibition for that period.\6\ The Librarian's
determination to grant an exemption is based upon the recommendation of
the Register of Copyrights, who conducts the rulemaking proceeding.\7\
Congress directed the Register, in turn, to consult with the Assistant
Secretary for Communications and Information of the Department of
Commerce, who oversees the National Telecommunications and Information
Administration (``NTIA''), in the course of formulating her
recommendation.\8\
---------------------------------------------------------------------------
\5\ See H.R. Rep. No. 105-551, pt. 2, at 36 (1998).
\6\ See 17 U.S.C. 1201(a)(1).
\7\ 17 U.S.C. 1201(a)(1)(C).
\8\ Id.
---------------------------------------------------------------------------
The primary responsibility of the Register and the Librarian in the
rulemaking proceeding is to assess whether the implementation of access
controls impairs the ability of individuals to make noninfringing uses
of copyrighted works within the meaning of section 1201(a)(1). To do
this, the Register develops a comprehensive administrative record using
information submitted by interested members of the public, and makes
recommendations to the Librarian concerning whether exemptions are
warranted based on that record.
Under the statutory framework, the Librarian, and thus the
Register, must consider ``(i) the availability for use of copyrighted
works; (ii) the availability for use of works for nonprofit archival,
preservation, and educational purposes; (iii) the impact that the
prohibition on the circumvention of technological measures applied to
copyrighted works has on criticism, comment, news reporting, teaching,
scholarship, or research; (iv) the effect of circumvention of
technological measures on the market for or value of copyrighted works;
and
[[Page 65945]]
(v) such other factors as the Librarian considers appropriate.'' \9\ As
noted above, the Register must also consult with the Assistant
Secretary who oversees NTIA, and report and comment on his views, in
providing her Recommendation. Upon receipt of the Recommendation, the
Librarian is responsible for promulgating the final rule setting forth
any exempted classes of works.
---------------------------------------------------------------------------
\9\ Id.
---------------------------------------------------------------------------
Significantly, exemptions adopted by rule under section 1201(a)(1)
apply only to the conduct of circumventing a technological measure that
controls access to a copyrighted work. Other parts of section 1201, by
contrast, address the manufacture and provision of--or ``trafficking''
in--products and services designed for purposes of circumvention.
Section 1201(a)(2) bars trafficking in products and services that are
used to circumvent technological measures that control access to
copyrighted works (for example, a password needed to open a media
file),\10\ while section 1201(b) bars trafficking in products and
services used to circumvent technological measures that protect the
exclusive rights of the copyright owner in their works (for example,
technology that prevents the work from being reproduced).\11\ The
Librarian of Congress has no authority to adopt exemptions for the
anti-trafficking prohibitions contained in section 1201(a)(2) or
(b).\12\
---------------------------------------------------------------------------
\10\ 17 U.S.C. 1201(a)(2).
\11\ 17 U.S.C. 1201(b).
\12\ See 17 U.S.C. 1201(a)(1)(E) (``Neither the exception under
subparagraph (B) from the applicability of the prohibition contained
in subparagraph (A), nor any determination made in a rulemaking
conducted under subparagraph (C), may be used as a defense in any
action to enforce any provision of this title other than this
paragraph.'').
---------------------------------------------------------------------------
More broadly, activities conducted under the regulatory exemptions
must still comply with other applicable laws, including non-copyright
provisions. Thus, while an exemption may specifically reference other
laws of particular concern, any activities conducted under an exemption
must be otherwise lawful.
Also significant is the fact that the statute contains certain
permanent exemptions to permit specified uses. These include: Section
1201(d), which exempts certain activities of nonprofit libraries,
archives, and educational institutions; section 1201(e), which exempts
``lawfully authorized investigative, protective, information security,
or intelligence activity'' of a state or the federal government;
section 1201(f), which exempts certain ``reverse engineering''
activities to facilitate interoperability; section 1201(g), which
exempts certain types of research into encryption technologies; section
1201(h), which exempts certain activities to prevent the ``access of
minors to material on the Internet''; section 1201(i), which exempts
certain activities ``solely for the purpose of preventing the
collection or dissemination of personally identifying information'';
and section 1201(j), which exempts certain acts of ``security testing''
of computers and computer systems.
B. The Unlocking Consumer Choice and Wireless Competition Act
In 2014, Congress enacted the Unlocking Consumer Choice and
Wireless Competition Act (``Unlocking Act''), effective as of August 1,
2014.\13\ The Unlocking Act did three things. First, it replaced the
exemption adopted in the 2012 triennial proceeding to enable certain
wireless telephone handsets (i.e., cellphones) to connect to wireless
communication networks--a process commonly known as cellphone
``unlocking''--with a broader version of the exemption adopted by the
Librarian in 2010. Second, the legislation provided that the
circumvention permitted under the reinstated 2010 exemption, as well as
any future exemptions to permit wireless telephone handsets or other
wireless devices to connect to wireless telecommunications networks,
may be initiated by the owner of the handset or device, by another
person at the direction of the owner, or by a provider of commercial
mobile radio or data services to enable such owner or a family member
to connect to a wireless network when authorized by the network
operator.\14\ This directive is permanent, and is now reflected in the
relevant regulations.\15\ Third, the legislation directed the Librarian
of Congress to consider as part of the current triennial proceeding
whether to ``extend'' the cellphone unlocking exemption ``to include
any other category of wireless devices'' based upon the recommendation
of the Register, who in turn is to consult with the Assistant
Secretary.\16\ Accordingly, as part of this rulemaking proceeding, the
Copyright Office solicited and evaluated several proposed unlocking
exemptions for devices other than cellphones, as addressed in Proposed
Classes 12 through 15 below.
---------------------------------------------------------------------------
\13\ Public Law 113-144, 128 Stat. 1751 (2014). Subsequently,
the Librarian adopted regulatory amendments to reflect the new
legislation. See Exemption to Prohibition on Circumvention of
Copyright Protection Systems for Wireless Telephone Handsets, 79 FR
50552 (Aug. 25, 2014) (codified at 37 CFR 201.40(b)(3), (c)).
\14\ Unlocking Act sec. 2(a), (c).
\15\ See 79 FR at 50554; see also 37 CFR 201.40(c).
\16\ Unlocking Act sec. 2(b).
---------------------------------------------------------------------------
C. Rulemaking Standards
In adopting the DMCA, Congress imposed legal and evidentiary
requirements for the section 1201 rulemaking proceeding, as discussed
in greater detail in the Register's Recommendation.\17\ Those who seek
an exemption from the prohibition on circumvention bear the burden of
establishing that the requirements for granting an exemption have been
satisfied by a preponderance of the evidence. In addition, the basis
for an exemption must be established de novo in each triennial
proceeding. That said, however, where a proponent is seeking the
readoption of an existing exemption, it may attempt to satisfy its
burden by demonstrating that the conditions that led to the adoption of
the prior exemption continue to exist today (or that new conditions
exist to justify the exemption). Assuming the proponent succeeds in
making such a demonstration, it is incumbent upon any opponent of that
exemption to rebut such evidence by showing that the exemption is no
longer justified.
---------------------------------------------------------------------------
\17\ See Register's Recommendation at 13-18.
---------------------------------------------------------------------------
To establish a case for an exemption, proponents must show at a
minimum (1) that uses affected by the prohibition on circumvention are
or are likely to be noninfringing; and (2) that as a result of a
technological measure controlling access to a copyrighted work, the
prohibition is causing, or in the next three years is likely to cause,
an adverse impact on those uses. In addition, the Librarian must also
examine the statutory factors listed in section 1201(a)(1): (1) The
availability for use of copyrighted works; (2) the availability for use
of works for nonprofit archival, preservation, and educational
purposes; (3) the impact that the prohibition on the circumvention of
technological measures applied to copyrighted works has on criticism,
comment, news reporting, teaching, scholarship, or research; (4) the
effect of circumvention of technological measures on the market for or
value of copyrighted works; and (5) such other factors as the Librarian
considers appropriate. In some cases, weighing these factors requires
the consideration of the benefits that the technological measure brings
with respect to the overall creation and dissemination of works in the
marketplace, in addition to any negative impact.
[[Page 65946]]
Finally, when granting an exemption, section 1201(a)(1) specifies
that the exemption adopted as part of this rulemaking must be defined
based on ``a particular class of works.'' \18\ Among other things, the
determination of the appropriate scope of a ``class of works''
recommended for exemption may also take into account the adverse
effects an exemption may have on the market for or value of copyrighted
works. Accordingly, ``it can be appropriate to refine a class by
reference to the use or user in order to remedy the adverse effect of
the prohibition and to limit the adverse consequences of an
exemption.'' \19\
---------------------------------------------------------------------------
\18\ 17 U.S.C. 1201(a)(1)(B).
\19\ Recommendation of the Register of Copyrights in RM 2005-11,
Rulemaking on Exemptions from Prohibition on Circumvention of
Copyright Protection Systems for Access Control Technologies 19
(Nov. 17, 2006).
---------------------------------------------------------------------------
II. History of the Sixth Triennial Proceeding
As the Register explains in the Recommendation, the administrative
process employed in the rulemaking was revised for this triennial
proceeding. In particular, the Copyright Office implemented certain
procedural changes to make the process more accessible and
understandable to the public, allow greater opportunity for
participants to coordinate their efforts, encourage participants to
submit effective factual and legal support for their positions, and
reduce administrative burdens on both the participants and the Office.
Among other things, the procedural changes included providing
commenters with recommended template forms to use when submitting
comments, and requiring commenters to submit separate comments for each
proposed class.
On September 17, 2014, the Copyright Office published a Notice of
Inquiry (``NOI'') in the Federal Register to initiate the sixth
triennial rulemaking proceeding.\20\ The NOI invited interested parties
to submit petitions for proposed exemptions that set forth the
essential elements of the exemption. The Office received forty-four
petitions for proposed exemptions in response to the NOI.
---------------------------------------------------------------------------
\20\ Exemption to Prohibition on Circumvention of Copyright
Protection Systems for Access Control Technologies, 79 FR 55687
(Sept. 17, 2014) (``NOI'').
---------------------------------------------------------------------------
Next, on December 12, 2014, the Office issued a Notice of Proposed
Rulemaking (``NPRM'') that reviewed and grouped the proposed exemptions
set forth in the petitions.\21\ In the NPRM, the Copyright Office
concluded that three of the petitions sought exemptions that could not
be granted as a matter of law, and declined to put those proposals
forward for public comment.\22\ The Office grouped the remaining
proposed exemptions into twenty-seven proposed classes of works. In
some cases, overlapping proposals were merged into a single combined
proposed class. In other cases, individual proposals that encompassed
multiple proposed uses were subdivided into multiple classes to aid in
the process of review. The Office then provided detailed guidance on
the submission of comments, including a number of specific legal and
factual areas of interest with respect to each proposed class.
---------------------------------------------------------------------------
\21\ Exemption to Prohibition on Circumvention of Copyright
Protection Systems for Access Control Technologies, 79 FR 73856,
73859 (Dec. 12, 2014) (``NPRM'').
\22\ NPRM, 79 FR at 73859. Each of these petitions sought to
permit circumvention of any and all TPMs that constituted ``digital
rights management'' with respect to unspecified types of copyrighted
works for the purpose of engaging in unidentified personal and/or
consumer uses. Id. The Office explained that these proposed
exemptions ran afoul of the statutory requirement that ``any
exemptions adopted as part of this rulemaking must be defined based
on `a particular class of works.' '' Id. (quoting 17 U.S.C.
1201(a)(1)(B) (emphasis added)). The Office thus concluded that
``the sweeping type of exemption proposed by these three petitions''
could not be granted consistent with the standards of section
1201(a)(1). Id.
---------------------------------------------------------------------------
The Office received nearly 40,000 comments in response to the NPRM,
the vast majority of which consisted of relatively short statements of
support or opposition without substantial legal argument or supporting
evidence. A number of the longer submissions included multimedia
evidence to illustrate points made in the written comments.
After receiving and studying the written comments, the Office held
seven days of public hearings: In Los Angeles, at the UCLA School of
Law, from May 19 to 21, 2015; and in Washington, DC, at the Library of
Congress, from May 26 to 29, 2015. The Office heard testimony from
sixty-three witnesses at the hearings, and received additional
multimedia evidence. After the hearings, the Office issued a number of
follow-up questions to participants, and received responses that have
been made part of the administrative record.
As observed by various commenting parties, certain of the proposed
exemptions presented issues potentially of concern to the Department of
Transportation (``DOT''), the Environmental Protection Agency
(``EPA''), and the Food and Drug Administration (``FDA''), and perhaps
other regulatory agencies as well. The Copyright Office therefore sent
letters to DOT, EPA and FDA informing them of the pendency of the
rulemaking proceeding in case they wished to comment on the proposals.
In response to these letters, the Office received responses from those
agencies, and also from the California Air Resources Board
(``California ARB''), which are also included in the record.
Throughout this triennial proceeding, as required under section
1201(a)(1), the Register has consulted with NTIA. In addition to
providing procedural and substantive input throughout the rulemaking
process, NTIA was represented along with Copyright Office staff at the
public hearings held in Los Angeles and Washington, DC NTIA formally
communicated its views on each of the proposed exemptions in
recommendations delivered to the Register on September 18, 2015. NTIA's
recommendations can be viewed at copyright.gov/1201/2015/2015_NTIA_Letter.pdf.
III. Summary of Register's Recommendation
A. Designated Classes
Based upon the record in this proceeding, the Register of
Copyrights recommends that the Librarian determine that the classes of
works described below be exempt from the prohibition against
circumvention of technological measures set forth in section
1201(a)(1):
1. Proposed Classes 1 to 7: Audiovisual Works--Educational and
Derivative Uses \23\
---------------------------------------------------------------------------
\23\ The Register's analysis and conclusions for these classes,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 24-106.
---------------------------------------------------------------------------
Proponents of Proposed Classes 1 through 7 share the desire to
circumvent technological protection measures employed on DVDs, Blu-ray
discs and/or by various online streaming services to access motion
pictures--a category under the Copyright Act that includes television
programs and videos--in order to engage in noninfringing uses. Past
rulemakings have granted exemptions relating to uses of motion picture
excerpts for commentary or criticism by college and university faculty
and staff and by kindergarten through twelfth-grade educators, as well
as in noncommercial videos, documentary films, and nonfiction
multimedia e-books offering film analysis. Past exemptions have been
limited to circumvention of DVDs, online distribution services, and as
a result of using screen-capture technology.
[[Page 65947]]
The petitions filed in this rulemaking sought to readopt and to
some extent expand the previously granted exemptions, including to
encompass Blu-ray discs (on the ground that a high-definition format is
required for certain uses), to access audiovisual works that may not be
motion pictures (such as video games), to permit the use of more than
``short portions'' of motion picture excerpts, and to extend to all
``fair uses'' rather than limiting the uses to criticism or comment.
Some proponents sought to expand filmmaking uses to include narrative
(or fictional) film, in addition to documentaries. Some proposals were
focused on expanding the category of potential users of an exemption,
such as to uses by museums, libraries and nonprofits, or by students
and faculty participating in massive online open courses (``MOOCs'').
The Copyright Office grouped these proposals into seven classes.
Proposed Class 1: This proposed class would allow college and
university faculty and students to circumvent access controls on
lawfully made and acquired motion pictures and other audiovisual
works for purposes of criticism and comment.
Class 1 was proposed by Professor Peter Decherney, the College Art
Association, the International Communication Association, and the
Society for Cinema and Media Studies (collectively, ``Joint
Educators'') to allow, for example, film studies professors to
circumvent DVDs in order to use motion picture clips in class lectures.
A class covering such uses was adopted in the 2010 and 2012
rulemakings. Joint Educators asked that the exemption be expanded to
include the ability to circumvent Blu-ray discs, to remove the
limitation to ``short portions'' of motion picture excerpts, and to
broaden the class to cover all ``audiovisual works'' for all
``educational purposes.''
Proposed Class 2: This proposed class would allow kindergarten
through twelfth-grade educators and students to circumvent access
controls on lawfully made and acquired motion pictures and other
audiovisual works for educational purposes.
Petitions for Proposed Class 2 were submitted by Professor Renee
Hobbs and the Library Copyright Alliance (``LCA''), to allow, for
example, a high school teacher to circumvent DVDs of various
adaptations of Shakespeare's works in order to create a compilation of
clips demonstrating the lasting influence of these works. Hobbs and LCA
requested that the existing exemption for grades K-12 be expanded to
include student uses rather than only uses by educators, to allow
circumvention of Blu-ray discs, to remove the limitation to ``short
portions'' of works, and to broaden the class to cover all
``audiovisual works'' for all ``educational purposes.''
Proposed Class 3: This proposed class would allow students and
faculty participating in massive online open courses (``MOOCs'') to
circumvent access controls on lawfully made and acquired motion
pictures and other audiovisual works for purposes of criticism and
comment.
Joint Educators proposed Class 3, essentially seeking to expand the
exemption for college and university faculty and students in Class 1 to
include MOOCs, or online distance education courses offered on a broad
scale. The exemption would, for example, allow a professor preparing an
online lecture about the evolution of Chinese society to circumvent
access controls in order to incorporate video clips documenting Chinese
history and geography. Joint Educators' proposal included the ability
to circumvent Blu-ray discs, to permit use of more than ``short
portions'' of motion picture excerpts, and to allow use of all
``audiovisual works'' for all ``educational purposes.'' Joint Educators
contended that the prohibition on circumvention of TPMs is inhibiting
the introduction of certain types of courses, such as film studies, on
MOOC platforms.
Proposed Class 4: This proposed class would allow educators and
learners in libraries, museums and nonprofit organizations to
circumvent access controls on lawfully made and acquired motion
pictures and other audiovisual works for educational purposes.
Professor Hobbs proposed Class 4 to allow, for example, educators
in a community center adult education program to circumvent access
controls in order to create video clips for purposes of discussing the
portrayal of African-American women in a popular television show. The
proposal encompassed ``audiovisual works'' for all ``educational
uses,'' as well as the ability to circumvent Blu-ray discs. Hobbs
expressed concern that the prohibition on circumvention prevents
participants in digital and media literacy programs in informal
learning settings from engaging in projects similar to those conducted
on college and university campuses.
Proposed Class 5: This proposed class would allow circumvention
of access controls on lawfully made and acquired motion pictures
used in connection with multimedia e-book authorship.
Class 5 was jointly proposed by Authors Alliance and Bobette Buster
to allow, for example, a sound editor and e-book author to circumvent
DVDs or Blu-ray discs to incorporate brief film excerpts in an e-book
entitled Listening to Movies. Proponents requested renewal of the
previously granted exemption, and expansion of that exemption to
encompass any genre of multimedia e-book (as opposed to uses only in
nonfiction multimedia e-books offering film analysis), to allow
circumvention of Blu-ray discs, to remove the limitation to ``short
portions'' of motion picture excerpts, and to broaden the class to
cover all ``audiovisual works.'' In general, proponents argued that the
prohibition on circumvention hinders e-book authors' ability to
criticize and comment on audiovisual works, some of which may only be
accessible through DVD, Blu-ray or digitally transmitted sources.
Proposed Class 6: This proposed class would allow circumvention
of access controls on lawfully made and acquired motion pictures for
filmmaking purposes.
Class 6 was proposed by the International Documentary Association,
Film Independent, Kartemquin Educational Films, Inc., and National
Alliance for Media Arts and Culture (collectively, ``Joint
Filmmakers'') to allow, for example, filmmakers to circumvent access
controls on material streamed online in order to incorporate excerpts
of news footage into documentaries. The proposal sought readoption of
the existing exemption for documentary filmmaking uses, and its
expansion to include narrative (or fictional) films, to permit
circumvention of Blu-ray discs, and to remove the limitation to short
portions of works. Joint Filmmakers stressed that much material is only
available on DVD, Blu-ray and digitally transmitted video, and that
circumvention of Blu-ray discs is necessary because, among other
things, distribution standards require films to incorporate clips of
high-definition quality.
Proposed Class 7: This proposed class would allow circumvention
of access controls on lawfully made and acquired audiovisual works
for the sole purpose of extracting clips for inclusion in
noncommercial videos that do not infringe copyright.
Class 7 was proposed by Electronic Frontier Foundation (``EFF'')
and the Organization for Transformative Works. Proponents sought to
permit, for example, a fan of James Bond films to circumvent access
controls on DVDs of these films in order to incorporate brief excerpts
into a noncommercial video commenting on the portrayal of female
characters in those films. The proposal
[[Page 65948]]
sought renewal of the existing exemption, and expansion of that
exemption to Blu-ray discs and all ``noninfringing'' or ``fair'' uses.
Proponents argued that the existing exemption has resulted in the
creation of a wide variety of new, noninfringing works, and expansion
of that exemption to Blu-ray discs is necessary because, among other
things, there is a significant amount of material that can only be
found in that format.
For each exemption, proponents argued that the requested exemption
would facilitate fair uses of the accessed works--for example, because
of the educational nature of the uses, or because it would permit the
creation of a new work of authorship providing commentary on the
underlying work. Specifically, Joint Educators argued that teaching,
criticism, and commentary are enumerated as favored uses under section
107 and therefore, that the proposed uses in Classes 1 and 3 for
colleges, universities, and MOOCs were highly likely to be fair. For
Class 2, Hobbs provided examples of educators using film clips as
teaching tools in connection with media literacy, history, literature,
and film theory, and of students using excerpts in connection with
National History Day projects, arguing that these uses were fair. Hobbs
also contended that out-of-classroom educational programs should be
able to make the same uses in Class 4. Proponents of Class 5 argued
that uses of excerpts of motion picture clips in multimedia e-books
intended for educational purposes are likely to be fair, citing
examples of actual or prospective uses of motion picture excerpts in
multimedia e-books for purposes of film criticism or analysis. For
Class 6, Joint Filmmakers stated that the proposed uses in both
documentary and narrative films are noninfringing fair uses that
provide criticism and commentary, education about, and reporting on
news and current events--activities that Congress has explicitly
identified as fair uses. Finally, Class 7 proponents asserted that the
purposes and character of noncommercial videos are highly
transformative, and in support, submitted scholarly analysis of remix
videos and evidence relating to fan video remixes that purportedly
criticize and recontextualize the underlying narrative works.
For all of these audiovisual classes, the Office received no
opposition to the renewal of the current exemptions; instead, opponents
opposed expansion of those exemptions. The same parties opposed all
seven classes--Joint Creators (representing the Motion Picture
Association of America, the Entertainment Software Association
(``ESA'') and the Recording Industry Association of America), DVD Copy
Control Association, and the Advanced Access Content System Licensing
Administrator (``AACS LA''). Opponents voiced parallel concerns across
most of these audiovisual classes. In general, they contended that
there are viable alternatives to circumvention that are adequate for
many of the proposed uses, including clip licensing, screen-capture
technology, streaming platforms such as TV Everywhere, disc-to-digital
services, and digital rights libraries like UltraViolet. With respect
to proposals to expand the exemptions to include Blu-ray discs, AACS LA
and Joint Creators argued that the authorized circumvention of DVDs or
online material provides a ready alternative to obtain material of
sufficiently high quality for all the proposed uses. Opponents also
urged that any expansion of the existing exemptions would likely harm
the market for DVDs, Blu-ray discs, and other licensed uses.
Beyond these general points, opponents also made specific arguments
concerning the individual proposed classes. In Class 1, opponents urged
that alternatives to circumvention, including screen capture, were
adequate for classroom uses outside film studies classes. In Class 2,
opponents argued that the record lacks persuasive examples of K-12
student projects that require circumvention and that the record did not
show a need to access material on Blu-ray discs. Opponents opposed
granting any exemption for MOOCs in Class 3 arguing, among other
things, that the uses are not likely to be noninfringing because the
exemption would allow widespread distribution of works over the
internet. With respect to museum, library or nonprofit educational
programs in Class 4, opponents argued, among other things, that
proponents had failed adequately to demonstrate specific adverse
effects flowing from the prohibition on circumvention. In Class 5,
opponents urged that no examples were presented to support expanding
the exemption to fictional e-books or to circumvention of Blu-ray
discs. In Class 6, opponents asserted that an exemption for fictional
films would negatively impact the existing market for licensing of film
clips. Finally, in Class 7, opponents argued that screen-capture
software is an adequate alternative to proposed uses of Blu-ray
material in noncommercial remix videos and that the existing regulatory
language should be refined so as not to overlap with other classes
addressing educational uses.
NTIA recommended renewing the current exemptions for educational
and derivative uses, and expanding those exemptions in several
respects. As a general matter, NTIA proposed that all of the exemptions
should encompass ``motion pictures and similar audiovisual works'' on
DVDs and Blu-ray discs, or obtained via online distribution services.
NTIA rejected proposals to encompass all ``noninfringing'' or ``fair
uses,'' instead recommending a more tailored approach. In Class 1, NTIA
recommended an exemption for educational uses by college and university
faculty and students, without limiting it to film studies and other
courses requiring close analysis of works, although it did not explain
why elimination of that distinction was warranted. In Class 2, NTIA
recommended an exemption for K-12 educators, and for students in grades
6-12 engaging in video projects actively overseen by an instructor. In
Class 3, NTIA recommended an exemption for MOOCs involving film and
media analysis, but not for students enrolled in such MOOCs. In Class
4, NTIA recommended an exemption for instructors and students engaged
in digital media and literacy programs in libraries, museums, and
nonprofit organizations with an educational mission. In Classes 5 and
7, NTIA proposed renewing the exemptions for nonfiction or educational
multimedia e-books offering film analysis, and for noncommercial
videos, respectively, and expanding them to include Blu-ray discs, as
with the other classes. Finally, in Class 6, NTIA proposed an exemption
both for documentary films and for ``[n]arrative films portraying real
events, where the prior work is used for its biographical or
historically significant nature.''
In general, the Register recommended granting exemptions for almost
all of these classes; in each case, the Register concluded that the
uses are likely to be fair, that alternatives to circumvention were
inadequate, and that the statutory factors taken together weighed in
favor of the exemption. In each of Classes 1 through 7, the Register
recommended retaining the requirement in the current exemptions that
only ``short portions'' of works be used for purposes of ``criticism or
comment.'' The Register explained that broader exemptions--covering
longer portions for purposes of all ``fair'' or ``noninfringing''
uses--were unsupported by the record. The Register also explained that
the exemptions should provide reasonable guidance to the public in
terms of what uses are
[[Page 65949]]
likely to be fair, while at the same time mitigating undue consequences
for copyright owners. The Register also found the record to not support
an exemption for ``audiovisual works,'' as opposed to the somewhat
narrower category of ``motion pictures,'' because proponents had failed
to demonstrate a need to circumvent non-motion-picture audiovisual
works (such as video games) in any of the proposed classes.
With respect to Class 1 in particular, the Register recommended
granting an exemption for circumvention of TPMs on DVDs, Blu-ray discs,
and digital transmissions of motion pictures by college and university
faculty and students engaged in film studies classes or other courses
requiring close analysis of film and media excerpts. The Register
recommended an exemption to facilitate use of screen-capture technology
for all types of courses, to address the possibility of circumvention
when using this technology. The Register reasoned that this class (and
Class 2) should continue to distinguish between purposes requiring
close analysis of film and media excerpts and more general educational
uses, on the ground that screen-capture technology is an adequate
substitute for the latter uses.
With respect to Class 2, the Register recommended granting an
exemption limited to circumvention of DVDs and digital transmissions
for educators in grades K-12, including accredited general educational
development (``GED'') programs, in film studies or other courses
requiring close analysis of film and media excerpts. The Register
found, however, that proponents submitted no examples where Blu-ray
quality or Blu-ray-unique content was required for uses in K-12
classrooms. The Register also recommended an exemption to facilitate
use of screen-capture technologies by educators in all types of
courses. The Register found the evidentiary record of proposed uses by
K-12 students to be insufficiently well developed to recommend an
exemption for DVDs, digital transmissions, or Blu-ray discs because
screen-capture software was likely to provide a ready alternative for
those uses. Accordingly, the Register recommended a screen-capture
exemption to facilitate uses by K-12 students.
With respect to Class 3, the Register recommended granting an
exemption for circumvention of TPMs on DVDs, Blu-ray discs, and digital
transmissions of motion pictures by faculty of MOOCs involving film
studies or other courses requiring close analysis of film and media
excerpts, under specified conditions borrowed from the TEACH Act,
codified at 17 U.S.C. 110(2). The Register explained that key elements
of the TEACH Act--such as the requirements that uses be limited to
nonprofit educational institutions and transmissions be limited to
enrolled students--should be incorporated into the exemption to ensure
that the exemption is appropriately limited. The Register further found
that the record did not support an exemption for student uses.
With respect to Class 4, the Register concluded that the record did
not support an exemption permitting circumvention of DVDs, Blu-ray
discs, or digital transmissions in connection with after-school or
adult education media literacy programs (apart from GED programs). The
Register found that the proposed uses in the record could be satisfied
via screen capture, and thus recommended an exemption to facilitate
uses of screen-capture software.
With respect to Classes 5 to 7, the Register recommended granting
an exemption for circumvention of TPMs on DVDs, Blu-ray discs, and
digital transmissions of motion pictures for use in nonfiction
multimedia e-books offering film analysis, in documentary filmmaking,
and in noncommercial videos. The Register also recommended an exemption
to facilitate use of screen-capture technologies for these uses. For
the multimedia e-books exemption (Class 5), the Register recommended
maintaining the limitation to e-books offering film analysis, finding
that the record did not support an exemption for other uses. With
respect to the filmmaking exemption (Class 6), the Register could not
conclude, based on the record, that the use of motion picture clips in
narrative films was, on balance, likely to be noninfringing, especially
in light of the potential effects on existing licensing markets for
motion picture excerpts. Finally, in considering the noncommercial
video exemption (Class 7), the Register rejected proponents' suggestion
to expand the exemption to encompass ``primarily noncommercial''
videos, as well as opponents' suggestion to narrow the exemption to
certain specified categories of noncommercial videos, finding neither
change to be necessary.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Motion pictures (including television shows and videos), as
defined in 17 U.S.C. 101, where circumvention is undertaken solely
in order to make use of short portions of the motion pictures for
the purpose of criticism or comment in the following instances:
(i) For use in documentary filmmaking,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a
DVD protected by the Content Scramble System, on a Blu-ray disc
protected by the Advanced Access Control System, or via a digital
transmission protected by a technological measure, and where the
person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable
to produce the required level of high-quality content;
(ii) For use in noncommercial videos (including videos produced
for a paid commission if the commissioning entity's use is
noncommercial),
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a
DVD protected by the Content Scramble System, on a Blu-ray disc
protected by the Advanced Access Control System, or via a digital
transmission protected by a technological measure, and where the
person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable
to produce the required level of high-quality content;
(iii) For use in nonfiction multimedia e-books offering film
analysis,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a
DVD protected by the Content Scramble System, on a Blu-ray disc
protected by the Advanced Access Control System, or via a digital
transmission protected by a technological measure, and where the
person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable
to produce the required level of high-quality content;
(iv) By college and university faculty and students, for
educational purposes,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made
and acquired on a DVD protected by the Content Scramble System, on a
Blu-ray disc protected by the Advanced Access Control System, or via
a digital transmission protected by a technological measure, and
where the person engaging in circumvention reasonably believes that
screen-capture software or other non-circumventing alternatives are
unable to produce the required level of high-quality content;
(v) By faculty of massive open online courses (MOOCs) offered by
accredited
[[Page 65950]]
nonprofit educational institutions to officially enrolled students
through online platforms (which platforms themselves may be operated
for profit), for educational purposes, where the MOOC provider
through the online platform limits transmissions to the extent
technologically feasible to such officially enrolled students,
institutes copyright policies and provides copyright informational
materials to faculty, students and relevant staff members, and
applies technological measures that reasonably prevent unauthorized
further dissemination of a work in accessible form to others or
retention of the work for longer than the course session by
recipients of a transmission through the platform, as contemplated
by 17 U.S.C. 110(2),
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made
and acquired on a DVD protected by the Content Scramble System, on a
Blu-ray disc protected by the Advanced Access Control System, or via
a digital transmission protected by a technological measure, and
where the person engaging in circumvention reasonably believes that
screen-capture software or other non-circumventing alternatives are
unable to produce the required level of high-quality content;
(vi) By kindergarten through twelfth-grade educators, including
of accredited general educational development (GED) programs, for
educational purposes,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made
and acquired on a DVD protected by the Content Scramble System, or
via a digital transmission protected by a technological measure, and
where the person engaging in circumvention reasonably believes that
screen-capture software or other non-circumventing alternatives are
unable to produce the required level of high-quality content;
(vii) By kindergarten through twelfth-grade students, including
those in accredited general educational development (GED) programs,
for educational purposes, where the circumvention is undertaken
using screen-capture technology that appears to be offered to the
public as enabling the reproduction of motion pictures after content
has been lawfully acquired and decrypted; and
(viii) By educators and participants in nonprofit digital and
media literacy programs offered by libraries, museums and other
nonprofit entities with an educational mission, in the course of
face-to-face instructional activities for educational purposes,
where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted.
2. Proposed Class 9: Literary Works Distributed Electronically--
Assistive Technologies \24\
---------------------------------------------------------------------------
\24\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 127-37.
---------------------------------------------------------------------------
Proponents of Proposed Class 9 seek to allow circumvention of
technological measures protecting literary works distributed in
electronic form (including e-books, digital textbooks, and PDF
articles) so that such works can be accessed by persons who are blind,
visually impaired, or print disabled. The Librarian, upon the
recommendation of the Register, granted an exemption in 2012 for these
purposes.
The American Foundation for the Blind, American Council for the
Blind,, Samuelson-Glushko Technology Law & Policy Clinic at Colorado
Law, and LCA filed petitions seeking to have the Librarian renew the
existing exemption.
Based on these petitions, the Copyright Office proposed the
following class:
Proposed Class 9: This proposed class would allow circumvention
of access controls on lawfully made and acquired literary works
distributed electronically for purposes of accessibility for persons
who are print disabled. This exemption has been requested for
literary works distributed electronically, including e-books,
digital textbooks, and PDF articles.
Proponents argued that reproducing copies in accessible formats is
a noninfringing use, and that, while improvements have been made to
make literary works more accessible since the last triennial
rulemaking, there are still a substantial number of works that cannot
be accessed using accessibility technologies such as text-to-speech
programs.
There was no opposition to renewing the 2012 exemption.
Significantly, the Association of American Publishers, representing
book publishers, filed supportive comments indicating that it had no
objection to a renewal of the existing exemption, explaining that the
market does not yet offer sufficient accessibility to literary works.
NTIA supported renewal of the current exemption, finding that the
record regarding the state of accessibility of literary works is not
substantially different than it was three years ago.
The Register recommended granting the exemption. According to the
Register, the need to ensure that persons who are blind, visually
impaired or print disabled are not impeded from accessing books in
electronic formats presents a quintessential case for an exemption. The
Register determined that converting e-books into accessible formats is
likely a noninfringing use both as a matter of fair use and under 17
U.S.C. 121, also known as the ``Chafee Amendment,'' which allows
authorized entities to create accessible versions of works exclusively
for use by persons who are blind, visually impaired, or print disabled.
The Register also found that TPMs are likely to have an adverse effect
on noninfringing activities, as many e-book titles and literary works
in electronic format (such as electronic textbooks and PDF articles)
are currently unavailable in accessible formats. The Register further
concluded that all five statutory factors favored the exemption.
Finally, like the existing exemption, the recommended exemption allows
the intended beneficiaries of section 121 to benefit from the waiver on
circumvention.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Literary works, distributed electronically, that are protected
by technological measures that either prevent the enabling of read-
aloud functionality or interfere with screen readers or other
applications or assistive technologies,
(i) When a copy of such a work is lawfully obtained by a blind
or other person with a disability, as such a person is defined in 17
U.S.C. 121; provided, however, that the rights owner is remunerated,
as appropriate, for the price of the mainstream copy of the work as
made available to the general public through customary channels, or
(ii) When such work is a nondramatic literary work, lawfully
obtained and used by an authorized entity pursuant to 17 U.S.C. 121.
3. Proposed Classes 11 to 15: Computer Programs That Enable Devices To
Connect to a Wireless Network That Offers Telecommunications and/or
Information Services (''Unlocking'') \25\
---------------------------------------------------------------------------
\25\ The Register's analysis and conclusions for these classes,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 138-71.
---------------------------------------------------------------------------
Proposed Classes 11 through 15 would allow circumvention of access
controls on wireless devices such as cellphones and all-purpose tablet
computers to allow them to connect to the network of a different mobile
wireless carrier, a process commonly known as ``unlocking.'' Wireless
carriers typically lock wireless devices to their networks when they
have subsidized the cost of a device at the time of purchase; carriers
then recoup that
[[Page 65951]]
subsidy through wireless service charges paid by the purchaser.
The Register has recommended, and the Librarian has adopted,
exemptions permitting unlocking of cellphones in three prior
rulemakings. Based on the evidentiary record in the last triennial
proceeding, the 2012 version of the exemption was limited to cellphones
obtained on or before January 26, 2013. Congress enacted the Unlocking
Act to reinstate the cellphone unlocking exemption that was adopted in
2010, which lacked such a limitation. In the Unlocking Act, Congress
also instructed the Librarian to review any future proposal for a
cellphone unlocking exemption according to the usual process in this
triennial rulemaking, as well as to consider in this rulemaking whether
to extend the cellphone unlocking exemption to other categories of
wireless devices. As noted above, the Unlocking Act also defines, on a
permanent basis, categories of persons and entities that can take
advantage of any unlocking exemption.
Consistent with Congress's directive in the Unlocking Act, the
Copyright Office invited proposals to continue an unlocking exemption
for wireless telephone handsets and/or to extend the exemption to other
categories of wireless devices. The petitions received generally asked
for continuation of the current cellphone unlocking exemption, and
expansion of that exemption to cover additional types of devices.
The Office grouped the petitions into five distinct classes based
on the type of device at issue, as described below:
Proposed Class 11: This proposed class would allow the unlocking
of wireless telephone handsets. ``Wireless telephone handsets''
includes all mobile telephones including feature phones, smart
phones, and ``phablets'' that are used for two-way voice
communication.
Class 11, covering cellphones, was proposed by Consumers Union, the
Competitive Carriers Association (``CCA''), the Institute of Scrap
Recycling Industries (``ISRI''), Pymatuning Communications
(``Pymatuning''), and the Rural Wireless Association (``RWA'').
Proposed Class 12: This proposed class would allow the unlocking
of all-purpose tablet computers. This class would encompass devices
such as the Apple iPad, Microsoft Surface, Amazon Kindle Fire, and
Samsung Galaxy Tab, but would exclude specialized devices such as
dedicated e-book readers and dedicated handheld gaming devices.
Class 12, covering all-purpose tablets, was proposed by Consumers
Union, CCA, ISRI, Pymatuning, and RWA. As reflected in the proposal,
the petitions were limited to ``all-purpose'' tablet computers--that
is, tablet computers that can run a wide variety of programs--as
opposed to devices dedicated to the consumption of particular types of
content such as e-book readers.
Proposed Class 13: This proposed class would allow the unlocking
of mobile connectivity devices. ``Mobile connectivity devices'' are
devices that allow users to connect to a mobile data network through
either a direct connection or the creation of a local Wi-Fi network
created by the device. The category includes mobile hotspots and
removable wireless broadband modems.
Class 13, covering mobile connectivity devices, was proposed CCA
and RWA.
Proposed Class 14: This proposed class would allow the unlocking
of wearable wireless devices. ``Wearable wireless devices'' include
all wireless devices that are designed to be worn on the body,
including smart watches, fitness devices, and health monitoring
devices.
Class 14, covering wearable wireless devices, was proposed by CCA
and RWA.
Proposed Class 15: This proposed class would allow the unlocking
of all wireless ``consumer machines,'' including smart meters,
appliances, and precision-guided commercial equipment.
Class 15 was proposed by CCA, and encompassed a broad and diverse
range of devices and equipment, including any ``smart'' device
utilizing a data connection to connect to the internet or interact with
other smart devices. CCA, however, failed to further define the kinds
of ``smart'' devices the exemption would cover beyond those already
encompassed by Classes 11 through 14, let alone the types of TPMs used
by such devices, or the methods of circumvention. Indeed, it was not
apparent from the record whether any such devices actually exist. For
instance, while CCA suggested that smart power meters would be
encompassed by the proposal, evidence at the public hearing (at which
CCA did not participate) indicated that smart meters generally do not
have mobile data (i.e., 3G/4G) connections, rendering the concept of
``unlocking'' irrelevant to that type of device.
In general, proponents argued that unlocking was permitted under
section 117 of the Copyright Act, which allows the owners of computer
programs to make certain reproductions of or adaptations to those
programs, and as a matter of fair use. They explained that the
inability to unlock one's wireless device leads to adverse effects by
impeding consumers' ability to choose their preferred wireless
carriers, harming the resale value of used devices, and harming the
environment by encouraging disposal rather than reuse of devices.
No party opposed Proposed Class 12 (all-purpose tablet computers)
or Proposed Class 14 (wearable computing devices). Prepaid wireless
carrier TracFone nominally filed comments in opposition to the
cellphone unlocking exemption in Class 11, though at bottom it was not
opposed to renewal of the exemption, so long as it was clear that the
exemption did not permit illegitimate phone trafficking--a practice
where subsidized prepaid cellphones are purchased, unlocked, and resold
(often abroad) at a profit. The Alliance of Automobile Manufacturers
(``Auto Alliance'') and General Motors LLC (``GM'') filed opposition
comments in Class 13 solely to stress that any exemption should exclude
``mobile'' connectivity devices embedded in motor vehicles, and Class
13 proponents agreed that such a limitation would be appropriate. Auto
Alliance opposed Class 15 on the ground that it is ill-defined and
could inadvertently sweep in cars and trucks.
NTIA proposed adopting an exemption encompassing all used wireless
devices, without enumerating the types of devices to which the
exemption applies. At the same time, NTIA acknowledged that based on
the record in the rulemaking, it would be appropriate to exclude one
type of wireless device--vehicle-based hotspots--from the exemption.
The Register recommended adopting an unlocking exemption covering
wireless telephone handsets (i.e., cellphones), all-purpose tablet
computers, mobile connectivity devices, and wearable wireless devices.
According to the Register, the unlocking exemption is likely to
facilitate noninfringing uses both under section 117 and as a matter of
fair use. The Register further explained that, unlike the section 117
privilege, fair use is not limited to the owner of the computer
program, and so there is no need to limit the exemption to the owner of
the device software. The Register also found that, as to the devices
encompassed by Classes 11 to 14, proponents had provided sufficient
evidence of adverse effects flowing from the inability to unlock a
device due to a TPM; in contrast, proponents of Class 15, encompassing
a broad and undefined range of ``consumer machines'' and ``smart''
devices, failed to make a showing of actual adverse effects. In
addition, the Register concluded that three of the five statutory
factors tended
[[Page 65952]]
to favor the proponents, while the other two were neutral.
The recommended exemption is limited to ``used'' devices. A
``used'' device is defined as a device that has been lawfully acquired
and previously activated on a wireless network. The recommended
exemption permits charities and commercial enterprises (including bulk
recyclers) to unlock used cellphones, while excluding illegitimate
trafficking that seeks to profit from the subsidized phones sold by
prepaid wireless carriers. Although some proponents called for
elimination of the ``used'' requirement for cellphones and tablets--
which in theory would permit unlocking of new, subsidized devices--the
Register concluded that the record did not support extending the
exemption in this respect as the evidence did not establish a practical
ability to unlock subsidized devices that had never been connected to a
carrier. Finally, the recommended exemption excludes devices embedded
in motor vehicles from the exemption for mobile connectivity devices by
including the condition that the devices be ``portable.''
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
(i) Computer programs that enable the following types of
wireless devices to connect to a wireless telecommunications
network, when circumvention is undertaken solely in order to connect
to a wireless telecommunications network and such connection is
authorized by the operator of such network, and the device is a used
device:
(A) Wireless telephone handsets (i.e., cellphones);
(B) All-purpose tablet computers;
(C) Portable mobile connectivity devices, such as mobile
hotspots, removable wireless broadband modems, and similar devices;
and
(D) Wearable wireless devices designed to be worn on the body,
such as smartwatches or fitness devices.
(ii) A device is considered ``used'' for purposes of this
exemption when it has previously been lawfully acquired and
activated on the wireless telecommunications network of a wireless
carrier.
4. Proposed Classes 16 and 17: Jailbreaking--Smartphones and All-
Purpose Mobile Computing Devices \26\
---------------------------------------------------------------------------
\26\ The Register's analysis and conclusions for these classes,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 172-92.
---------------------------------------------------------------------------
Proposed Classes 16 and 17 address an activity commonly known as
``jailbreaking,'' which is the process of gaining access to the
operating system of a computing device, such as a smartphone or tablet,
to install and execute software that could not otherwise be installed
or run on that device, or to remove pre-installed software that could
not otherwise be uninstalled. The Register has twice before
recommended, and the Librarian has twice adopted, an exemption
permitting jailbreaking of smartphones.
EFF filed a petition seeking a jailbreaking exemption for all
``mobile computing devices,'' including wireless telephone handsets
that are capable of running a wide range of applications (i.e.,
``smartphones'') and tablet computers (``tablets''). EFF explained that
its requested exemption is not intended to extend to devices designed
primarily for the consumption of a single type of media, such as
dedicated e-book readers, or to desktop or laptop computers. Maneesh
Pangasa filed a separate petition seeking an exemption for tablet
computers. The Copyright Office divided these proposals into two
proposed classes to ensure an adequate administrative record on which
to make a recommendation. Based on these petitions, the Office included
the following proposed exemptions in the NPRM:
Proposed Class 16: This proposed class would permit the
jailbreaking of wireless telephone handsets to allow the devices to
run lawfully acquired software that is otherwise prevented from
running, or to remove unwanted preinstalled software from the
device.
Proposed Class 17: This proposed class would permit the
jailbreaking of all-purpose mobile computing devices to allow the
devices to run lawfully acquired software that is otherwise
prevented from running, or to remove unwanted preinstalled software
from the device. The category ``all-purpose mobile computing
device'' includes all-purpose non-phone devices (such as the Apple
iPod touch) and all-purpose tablets (such as the Apple iPad or the
Google Nexus). The category does not include specialized devices
such as e-book readers or handheld gaming devices, or laptop or
desktop computers.
Relying on case law and prior determinations of the Register,
proponents argued that jailbreaking of smartphones and all-purpose
mobile computing devices constitutes fair use of the device software.
Proponents also pointed to a series of benefits that have resulted from
the existing smartphone jailbreaking exemption, such as the ability to
install otherwise unsupported operating system upgrades and the rapid
growth in the market for legitimate, non-manufacturer-approved apps,
and argued that similar benefits would result if the exemption included
all-purpose mobile computing devices.
The Business Software Alliance (``BSA'') opposed both classes. In
neither case, however, did BSA dispute the noninfringing nature of
jailbreaking. Instead, BSA argued that the existence of alternatives to
jailbreaking, such as ``developer editions'' of devices that do not
need to be jailbroken, obviate the need for an exemption. In addition,
with respect to the exemption for all-purpose mobile computing devices
in Class 17, BSA disputed EFF's effort to distinguish between all-
purpose mobile computing devices on the one hand, and desktops and
laptops on the other, arguing that the distinction is not sufficiently
clear. In response, EFF offered two further criteria to define these
devices: First, that they be portable, in the sense that they are
``designed to be carried or worn''; and second, that they ``come
equipped with an operating system that is primarily designed for mobile
use,'' such as Android, iOS, Blackberry OS or Windows Phone.
Commenters representing automobile manufacturers filed comments
under Class 17 raising the concern that the class could arguably
encompass computing systems that are embedded in ``mobile'' automobiles
and other vehicles. EFF clarified, however, that Class 17 was not
intended to include software running on vehicle electronics, but only
portable devices designed to be carried or worn by a person.
NTIA favored a jailbreaking exemption for all ``mobile computing
devices,'' a category which (contrary to EFF's proposal) would appear
to include devices that are designed primarily for the consumption of a
single type of media, including dedicated e-book readers, which are
separately addressed in Proposed Class 18 below. Although NTIA asserted
that the works and TPMs at issue are strikingly similar and in many
cases identical, it cited no evidence to support that claim with
respect to dedicated e-book readers, handheld video game consoles, or
other dedicated media consumption devices.
The Register recommended continuing the existing jailbreaking
exemption for smartphones, and extending it to all-purpose mobile
computing devices. As in previous rulemakings, the Register concluded
that jailbreaking to facilitate interoperability is likely to
constitute a noninfringing fair use, and that the prohibition on
circumvention is having an adverse effect on this type of use. Further,
the Register concluded that three of the statutory factors
(availability for use of copyrighted works, the impact on criticism,
comment, news reporting, teaching, scholarship, or research, and the
effect of circumvention of technological measures on the market
[[Page 65953]]
for or value of the copyrighted works) favored an exemption, while the
other two were not implicated by these classes.
The Register also concluded, based on the overall record, that the
category of ``all-purpose mobile computing devices'' in Class 17 has
been meaningfully defined, but that certain refinements were
appropriate to address concerns regarding its scope. The recommended
exemption thus incorporates EFF's suggestion to specify that the
devices be portable, that they be designed to run a wide variety of
applications, and that they come equipped with an operating system
primarily designed for mobile use. The recommended exemption thus
excludes vehicle-embedded systems, devices designed primarily for
consumption of a specific type of media (such as e-book readers and
handheld gaming devices), and computers confined to desktop or laptop
operating systems, such as Windows 8 or Mac OS. If a hybrid device can
act either as a laptop or a tablet, the user will need to investigate
what type of operating system it contains in order to determine whether
the exemption applies.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Computer programs that enable smartphones and portable all-
purpose mobile computing devices to execute lawfully obtained
software applications, where circumvention is accomplished for the
sole purpose of enabling interoperability of such applications with
computer programs on the smartphone or device, or to permit removal
of software from the smartphone or device. For purposes of this
exemption, a ``portable all-purpose mobile computing device'' is a
device that is primarily designed to run a wide variety of programs
rather than for consumption of a particular type of media content,
is equipped with an operating system primarily designed for mobile
use, and is intended to be carried or worn by an individual.
5. Proposed Class 20: Jailbreaking--Smart TVs \27\
---------------------------------------------------------------------------
\27\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 202-17.
---------------------------------------------------------------------------
In addition to their traditional functionality, many modern
televisions (``TVs'') have built-in software features that can stream
content over the internet, interact with other devices in the home, or
run applications. These internet-enabled TVs are often referred to as
``Smart TVs.'' Smart TV firmware is often protected by TPMs that
prevent owners of those TVs from installing third-party software on
them. The Software Freedom Conservancy (``SFC'') proposed an exemption
to permit circumvention of access controls on firmware (i.e., the
operating system) of such smart TVs to enable installation of third-
party software.
The Copyright Office included the following proposed exemption in
the NPRM:
Proposed Class 20: This proposed class would permit the
jailbreaking of computer-embedded televisions (``smart TVs'').
Asserted noninfringing uses include accessing lawfully acquired
media on external devices, installing user-supplied licensed
applications, enabling the operating system to interoperate with
local networks and external peripherals, and enabling
interoperability with external devices, and improving the TV's
accessibility features (e.g., for hearing-impaired viewers). The
TPMs at issue include firmware encryption and administrative access
controls that prevent access to the TV's operating system.
According to SFC, access to the firmware would allow various
noninfringing uses, including improving accessibility features (such as
the size of closed captioning), enabling or expanding the TV's
compatibility with peripheral hardware and external storage devices,
and making changes to display features such as the aspect ratio. SFC
argued that the majority of smart TV firmware incorporates the
manufacturer's own proprietary applications along with free, libre and
open source software (``FLOSS'') applications produced by third
parties. SFC argued that, under the relevant FLOSS licenses, smart TV
owners are authorized to modify the FLOSS applications and to run them
without restriction. SFC also argued that fair use permits reproduction
and alteration of proprietary applications to the extent necessary to
permit interoperability with lawfully acquired programs.
Proposed Class 20 was opposed by Joint Creators and LG Electronics
U.S.A. (``LG''), a manufacturer of smart TVs. Opponents argued that an
exemption would not facilitate noninfringing uses, and was unnecessary
because a laptop can be connected to TV sets to view the output of any
applications and because LG smart TVs already provide all of the
features that SFC claims can be added only by jailbreaking. In
addition, Joint Creators raised concerns that jailbreaking would allow
the installation of infringing software as well as software such as
``Popcorn Time,'' an application that facilitates access to and viewing
of pirated movies.
NTIA supported the proposed exemption, on the ground that it is not
materially different than the exemptions that have been granted in the
past for jailbreaking of smartphones.
The Register recommended granting the proposed exemption,
explaining that circumvention of access controls on smart TV firmware
is likely to enable noninfringing uses of that firmware. First, it
appears to be undisputed that smart TV firmware incorporates FLOSS
applications, and that modification of those applications would
constitute a licensed, and therefore noninfringing, use. Second, with
respect to non-FLOSS proprietary software included in the firmware, the
Register concluded that modifications to that firmware to enable
interoperability with third-party software are likely to constitute a
fair use. The Register also found that the prohibition on circumvention
is adversely affecting legitimate noninfringing uses of smart TV
firmware, and that the proposed alternatives to circumvention, such as
connecting a laptop computer to the TV, are inadequate, because they
would not allow installation of software on the smart TV to improve its
functioning as a TV, such as facilitating more prominent subtitles. The
Register also concluded that no evidence was submitted to illustrate
opponents' claim that jailbreaking of smart TVs will make it easier to
gain unauthorized access to copyrighted content, or that it would
otherwise undermine smart TVs as a platform for the consumption of
expressive works.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Computer programs that enable smart televisions to execute
lawfully obtained software applications, where circumvention is
accomplished for the sole purpose of enabling interoperability of
such applications with computer programs on the smart television.
6. Proposed Class 21: Vehicle Software--Diagnosis, Repair or
Modification \28\
---------------------------------------------------------------------------
\28\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 218-49.
---------------------------------------------------------------------------
Modern automobiles and agricultural vehicles and machinery are
equipped with systems of interconnected computers that monitor and
control a variety of vehicle functions. These computers are referred to
as electronic control units, or ``ECUs,'' which are protected by TPMs.
EFF requested an exemption to permit circumvention of TPMs protecting
ECU computer programs for the purposes of diagnosis, repair and
modification of vehicles. The Intellectual Property & Technology Law
Clinic of the University of Southern California Gould School of Law
(``IPTC
[[Page 65954]]
U.S.C.'') proposed two similar exemptions for agricultural machinery
specifically.
Based on these petitions, the Office included the following
proposed exemption in the NPRM:
Proposed Class 21: This proposed class would allow circumvention
of TPMs protecting computer programs that control the functioning of
a motorized land vehicle, including personal automobiles, commercial
motor vehicles, and agricultural machinery, for purposes of lawful
diagnosis and repair, or aftermarket personalization, modification,
or other improvement. Under the exemption as proposed, circumvention
would be allowed when undertaken by or on behalf of the lawful owner
of the vehicle.
Proponents explained that circumvention of TPMs protecting
copyrighted computer programs in ECUs may be necessary to make
noninfringing uses of those programs to diagnose and repair automobiles
and agricultural equipment, and to make modifications, such as
enhancing a vehicle's suspension or installing a gear with a different
radius. They assert that vehicle owners are entitled to use the
computer programs in ECUs to diagnose, repair or modify vehicles as a
matter of fair use, or under section 117. EFF argues that absent an
exemption, vehicle owners must take their cars to authorized repair
shops, or purchase expensive manufacturer-authorized tools, to diagnose
and repair their vehicles. Similarly, IPTC U.S.C. explained that TPMs
restricting access to computer programs that run agricultural vehicles
and machinery place the livelihoods of farmers and other business
owners at risk, because vehicle owners must sometimes wait significant
periods of time before their disabled vehicles can be repaired by an
authorized technician.
The proposed exemption was opposed by the Association of Equipment
Manufacturers, Association of Global Automakers (``Global
Automakers''), Auto Alliance, Eaton Corporation, GM, John Deere, and
Motor & Equipment Manufacturers Association (``MEMA''). In general,
opponents argued that an exemption would not facilitate noninfringing
uses, and was unnecessary in any event because vehicle owners have
alternative options, such as manufacturer-authorized repair shops and
tools. They also asserted that the proposal presented serious public
health, safety and environmental concerns. For example, users might
circumvent in order to avoid restrictions on vehicle emissions imposed
by federal and state law.
In light of the commenters' observations, the Copyright Office
notified DOT and EPA of the pendency of the rulemaking. DOT and EPA, as
well as California ARB, responded with varying degrees of concern about
the potential impact of an exemption. EPA opposed any exemption, while
DOT and California ARB expressed significant reservations. The
agencies' concerns were focused on potential adverse effects on safety
and the environment. For example, EPA explained that vehicle
modifications are often performed to increase engine power or boost
fuel economy, but that these modifications increase vehicle emissions
and thus violate the Clean Air Act.
In contrast to these other agencies, NTIA fully supported adoption
of the proposed exemption. NTIA believed that an exemption was
necessary to allow consumers to continue to engage in the longstanding
practice of working on their own vehicles, and that the non-copyright
concerns raised by opponents and other agencies could be addressed by
those agencies in the exercise of their respective regulatory
authorities. NTIA acknowledged, however, that a delay in
implementation--as recommended by the Register and discussed below--
might nonetheless be appropriate to permit other agencies to consider
and prepare for the new rule, and urged that any such delay be as short
as practicable.
Based on the record, the Register recommended granting an
exemption. The Register concluded that reproducing and altering the
computer programs on ECUs for purposes of facilitating diagnosis,
repair and modification of vehicles may constitute a noninfringing
activity as a matter of fair use and/or under the exception set forth
in section 117 of the Copyright Act, which permits the owner of a copy
of a computer program to make certain copies and adaptations of the
program. The Register also concluded that owners of vehicles and
agricultural machinery are adversely impacted as a result of TPMs that
protect the copyrighted computer programs on the ECUs that control the
functioning of their vehicles. The Register further found that while
two of the statutory factors weighed in favor of the exemption
(availability for use of copyrighted works and impact on criticism,
comment, news reporting, teaching, scholarship or research), and two of
the factors were neutral (availability for use for nonprofit archival,
preservation and educational purposes and the effect on the market for
or value of copyrighted works), the fifth factor--under which
commenting parties and federal agencies raised serious safety and
environmental concerns--tended to weigh against an exemption.
Overall, the Register concluded that while from a copyright
perspective proponents had made the case for an exemption, based on the
record, the exemption needed to be carefully tailored to address a
number of concerns. Accordingly, the recommended exemption excludes
computer programs in ECUs that are chiefly designed to operate vehicle
entertainment and telematics systems due to insufficient evidence
demonstrating a need to access such ECUs, and out of concern that such
circumvention might enable unauthorized access to creative or
proprietary content. The exemption also excludes circumvention ``on
behalf of'' vehicle owners, as a broader exception allowing third
parties to engage in circumvention activities on behalf of others is in
tension with the anti-trafficking provisions of section 1201(a)(2) and
(b). Moreover, by passing the Unlocking Act--which amended section 1201
to allow unlocking of cellphones and other devices to be carried out by
third parties ``at the direction of'' device owners--Congress indicated
its view that extending the reach of an exemption to cover third-party
actors requires a legislative amendment. The exemption also expressly
excludes acts of circumvention that would violate any other law,
including regulations promulgated by DOT or EPA. Finally, in light of
the significant concerns raised by DOT and EPA, the recommended
exemption will become operative twelve months from the effective date
of the new regulation to provide these and other potentially interested
agencies an opportunity to consider and prepare for the lifting of the
DMCA prohibition. Acknowledging the views of the NTIA, the Register
determined that a twelve-month delay was the shortest period that would
reasonably permit other agencies to consider appropriate action.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Computer programs that are contained in and control the
functioning of a motorized land vehicle such as a personal
automobile, commercial motor vehicle or mechanized agricultural
vehicle, except for computer programs primarily designed for the
control of telematics or entertainment systems for such vehicle,
when circumvention is a necessary step undertaken by the authorized
owner of the vehicle to allow the diagnosis, repair or lawful
modification of a vehicle function; and where such circumvention
does not constitute a violation of applicable law, including without
limitation regulations promulgated by the Department of
[[Page 65955]]
Transportation or the Environmental Protection Agency; and provided,
however, that such circumvention is initiated no earlier than 12
months after the effective date of this regulation.
7. Proposed Classes To Permit Research of Software Flaws, Proposed
Class 25: Software--Security Research; Proposed Class 22: Vehicle
Software--Security and Safety Research; Proposed Class 27A: Medical
Device Software--Security and Safety Research \29\
---------------------------------------------------------------------------
\29\ The Register's analysis and conclusions for these classes,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 250-320.
---------------------------------------------------------------------------
The Office received a number of petitions for proposed exemptions
to permit circumvention of TPMs for purposes of conducting good-faith
testing for and the identification, disclosure and correction of
malfunctions, security flaws and vulnerabilities in computer programs.
The proponents of these security exemptions observed as a general
matter that computer programs are pervasive in modern machines and
devices, including vehicles, home appliances and medical devices, and
that independent security research is necessary to uncover flaws in
those computer programs. The Copyright Office grouped the security-
related petitions into three proposed classes. First, the Office
received two submissions from academic researchers seeking an exemption
to permit good-faith research into malfunctions, security flaws or
vulnerabilities in computer programs installed on all types of systems
and devices. The NPRM described the proposed class as follows:
Proposed Class 25: This proposed class would allow researchers
to circumvent access controls in relation to computer programs,
databases, and devices for purposes of good-faith testing,
identifying, disclosing, and fixing of malfunctions, security flaws,
or vulnerabilities.
Second, EFF filed a petition seeking an exemption to allow the
circumvention of TPMs on computer programs that are embedded in
motorized land vehicles for purposes of researching the security or
safety of that vehicle. The NPRM described the proposed class as
follows:
Proposed Class 22: This proposed class would allow circumvention
of TPMs protecting computer programs that control the functioning of
a motorized land vehicle for the purpose of researching the security
or safety of such vehicles. Under the exemption as proposed,
circumvention would be allowed when undertaken by or on behalf of
the lawful owner of the vehicle.
Third, the Medical Device Research Coalition (``MDRC''), a group of
patients and researchers, filed a petition seeking an exemption to
allow the circumvention of TPMs on computer programs on implanted
medical devices, such as pacemakers, implantable cardioverter
defibrillators, insulin pumps, and continuous glucose monitors, and
their corresponding personal monitoring systems. MDRC's petition
covered two proposed uses--allowing research into software flaws that
adversely affect the safety, security and efficacy of medical devices,
and allowing a patient to access the information generated by his or
her own device. The Office originally categorized the petition into a
single class. The NPRM thus described the class as follows:
Proposed Class 27: This proposed class would allow circumvention
of TPMs protecting computer programs in medical devices designed for
attachment to or implantation in patients and in their corresponding
monitoring devices, as well as the outputs generated through those
programs. As proposed, the exemption would be limited to cases where
circumvention is at the direction of a patient seeking access to
information generated by his or her own device, or at the direction
of those conducting research into the safety, security, and
effectiveness of such devices. The proposal would cover devices such
as pacemakers, implantable cardioverter defibrillators, insulin
pumps, and continuous glucose monitors.
Based on the record as it developed in the course of the
proceeding, the Register came to the conclusion that Proposed Class 27
should be divided into Proposed Class 27A, concerning security research
on medical devices, and Proposed Class 27B, concerning access to
patient data generated by medical devices. Class 27A is addressed with
the other security research classes, while 27B is separately discussed
below.
Proponents maintained that the security of software and the devices
that execute software is of critical importance because security flaws
pose potentially serious threats, including physical injury and death
of individuals, property damage, and financial harm. Proponents argued
that security research is noninfringing as a matter of fair use and, in
the case of vehicle security research, under the exceptions set forth
in section 117 as well. They further asserted that the permanent
statutory exemptions to section 1201(a)(1)'s prohibition that are
directed to reverse engineering (section 1201(f)), encryption research
(section 1201(g)), and security testing (section 1201(j)) are
inadequate for their purposes, because these provisions do not provide
sufficient assurance that the activities in which the researchers seek
to engage will be considered exempt.
The Office received comments in opposition to these proposed
classes from a wide range of companies and organizations representing
copyright owners. The general software security research exemption in
Class 25 was opposed by AdvaMed, Auto Alliance, BSA, GM, Intellectual
Property Owners Association (``IPO''), LifeScience Alley, Medical
Device Innovation Safety and Security Consortium, and Software
Information Industry Association. The vehicle software security
research exemption in Class 22 was opposed by Global Automakers, Auto
Alliance, GM, John Deere, and MEMA. The medical device software
security exemption in Class 27A was opposed by AdvaMed, IPO, Jay
Schulman, LifeScience Alley, and National Association of Manufacturers
(``NAM''). In general, opponents argued that proponents had failed to
establish that security research activities encompassed by the
exemption are noninfringing, and that, in any event, an exemption was
unnecessary both because of the permanent exemptions in sections
1201(f), 1201(g), and 1201(j), and because manufacturers frequently
authorize independent security research. Opponents also argued that any
exemption for software security research should also include an express
disclosure requirement, so that the software developer or product
manufacturer has sufficient time to correct any flaw before its
existence becomes more widely known and thus more susceptible to
exploitation by malicious actors. Relatedly, opponents asserted that
the proposal presented serious public health and safety concerns. For
example, opponents claimed that information obtained by engaging in
security research could be used by bad actors to hack into highly
regulated machines and devices, including medical devices and vehicles.
In light of commenters' observations, the Copyright Office notified
DOT, EPA and FDA of the pendency of the rulemaking. All three agencies
responded and expressed significant reservations. The agencies voiced
concerns about the potential effects on public health and safety; for
example, DOT expressed concern that independent security researchers
may not fully appreciate the potential ramifications of their acts of
circumvention on automobile safety or the logistical limitations
affecting potential remedial actions.
[[Page 65956]]
By contrast, NTIA fully supported adoption of a broad exemption for
all computer programs, regardless of the device on which they are run,
so that good-faith security researchers can engage in socially
beneficial work. NTIA believed that the concerns of other agencies
could adequately be addressed by stating explicitly in the exemption
that it does not obviate compliance with other applicable laws. NTIA
nonetheless acknowledged the possibility that a delay in
implementation--as recommended by the Register and discussed below--
could be appropriate to permit other agencies to consider and prepare
for the new rule.
The Register found that while the Class 25 proposal to allow
research on computer programs generally was very broad (and potentially
swallowed the proposals in Class 22 and Class 27A), the record focused
primarily on consumer-facing products rather than large-scale
industrial or government systems such as power or transit systems. The
record also included specific evidence concerning motor vehicles,
implanted medical devices such as pacemakers and glucose monitors, and
electronic voting machines.
Based on this record, the Register recommended adopting an
exemption to enable good-faith security research on computer programs
within devices or machines primarily designed for use by individual
consumers (including voting machines), motorized land vehicles, and
implanted medical devices and their corresponding monitoring systems.
At the same time, the Register concluded that the record did not
support the open-ended exemption urged by Class 25 proponents,
encompassing all computer programs on all systems and devices,
including highly sensitive systems such as nuclear power plants and air
traffic control systems, and that the exemption should be limited to
the consumer-oriented uses that were the focus of proponents'
submissions.
The Register concluded that good-faith security research into
computer programs used to operate such devices and machines is likely a
noninfringing fair use of those programs or, in the case of vehicle
software, may be a noninfringing use under section 117. The Register
also concluded that the permanent exemptions in sections 1201(f),
1201(g), and 1201(j) are inadequate to accommodate the proposed
research activities due to various limitations and conditions contained
in those provisions. Further, with respect to computer programs used to
operate the types of devices and machines encompassed by the
recommended exemption, the Register additionally found that legitimate
security research has been hindered by TPMs that limit access to those
programs.
The Register also noted that different parts of the Administration
appear to hold divergent views on issues surrounding security research
and the wisdom of granting an exemption for this purpose, and that the
exemption could cover any number of highly regulated products.
Accordingly, to give other parts of the government sufficient
opportunity to respond, the Register recommended that, as a general
matter, the exemption should not go into effect until twelve months
after the effective date of the new regulation (as noted above, the
Register found that twelve months was the shortest period that would
reasonably permit other agencies to respond). The Register, however,
recommended immediate implementation of the exemption for voting
machines, on the ground that there was no public safety issue or other
proffered justification for delay of this aspect of the exemption.
The Register also noted the specific concern expressed by other
agencies that acts of security research must not put members of the
public at risk. The recommended exemption thus provides that security
research must be conducted in a controlled setting designed to avoid
harm to individuals or the public. In the case of medical devices
specifically, the recommended exemption incorporates FDA's suggestion
to exclude research on medical devices that are being used, or could be
used, by patients.
As explained above, a significant issue with respect to the
security exemptions involves the proper disclosure of security research
findings, as the interests of the manufacturer and the public may both
be affected by the nature and timing of disclosure of software flaws.
Indeed, Congress included disclosure to the system developer as one of
the factors to be considered in determining a person's eligibility for
the security testing exemption in section 1201(j). Although the
Register expressed support for responsible disclosure of security
flaws, she acknowledged the difficulty of attempting to define
disclosure standards in the context of this rulemaking, as opinions
seem sharply divided on this point. Accordingly, rather than
incorporating an express disclosure rule, the recommended exemption
draws upon what the Register perceives to be the basic intent of
section 1201(j) by specifying that the information derived from the
research activity be used primarily to promote the security or safety
of the devices containing the computer programs on which the research
is conducted, or of those who use those devices.
The Register noted that in the interest of adhering to Congress's
basic purpose in section 1201(j), where appropriate, the recommended
exemption tracks Congress's language rather than alternative
formulations suggested by proponents, including by expressly excluding
acts that violate any other law, such as the Computer Fraud and Abuse
Act of 1986.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
(i) Computer programs, where the circumvention is undertaken on
a lawfully acquired device or machine on which the computer program
operates solely for the purpose of good-faith security research and
does not violate any applicable law, including without limitation
the Computer Fraud and Abuse Act of 1986, as amended and codified in
title 18, United States Code; and provided, however, that, except as
to voting machines, such circumvention is initiated no earlier than
12 months after the effective date of this regulation, and the
device or machine is one of the following:
(A) A device or machine primarily designed for use by individual
consumers (including voting machines);
(B) A motorized land vehicle; or
(C) A medical device designed for whole or partial implantation
in patients or a corresponding personal monitoring system, that is
not and will not be used by patients or for patient care.
(ii) For purposes of this exemption, ``good-faith security
research'' means accessing a computer program solely for purposes of
good-faith testing, investigation and/or correction of a security
flaw or vulnerability, where such activity is carried out in a
controlled environment designed to avoid any harm to individuals or
the public, and where the information derived from the activity is
used primarily to promote the security or safety of the class of
devices or machines on which the computer program operates, or those
who use such devices or machines, and is not used or maintained in a
manner that facilitates copyright infringement.
8. Proposed Class 23: Abandoned Software--Video Games Requiring Server
Communication \30\
---------------------------------------------------------------------------
\30\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 321-53.
---------------------------------------------------------------------------
Many modern video games--which may be played on a personal computer
or a dedicated gaming console--require a network connection to a remote
server operated by the game's developer to enable core functionalities.
Before some games can be played at all, including in
[[Page 65957]]
single-player mode, the game must connect to an ``authentication
server'' to verify that the game is a legitimate copy. Other games
require a connection to a ``matchmaking server'' to enable users to
play the game with other people over the internet in multiplayer mode.
In the case of a game that relies on an authentication server, the game
may be rendered entirely unplayable if the server connection is lost.
When a matchmaking server is taken offline, the game may still be
playable, though with online multiplayer play disabled.
EFF and Kendra Albert, a student at Harvard Law School, jointly
filed a petition seeking an exemption to enable those who have lawfully
acquired copies of video games to access and play those games when
authentication or matchmaking servers have been permanently taken
offline. As the record developed, it became evident that the proposal
focused on two types of use: (1) People who wish to continue to play
physical or downloaded copies of video games they have lawfully
acquired (referred to in the Recommendation as ``gamers''); and (2)
those who seek to preserve individual video games and make them
available for research and study (referred to in the Recommendation as
``preservationists'').
The Copyright Office set forth the following proposed exemption in
the NPRM:
Proposed Class 23: This proposed class would allow circumvention
of TPMs on lawfully acquired video games consisting of communication
with a developer-operated server for the purpose of either
authentication or to enable multiplayer matchmaking, where developer
support for those server communications has ended. This exception
would not apply to video games whose audiovisual content is
primarily stored on the developer's server, such as massive
multiplayer online role-playing games.
Proponents of Class 23 argued that uses to enable continued
gameplay or multiplayer play constitute fair use, but that the
prohibition on circumvention prevents owners from restoring access to
games they have lawfully acquired. They also stressed that the
inability to restore access has adverse effects on efforts to preserve
video games and make them available for research and study.
The proposed class was opposed by ESA and Joint Creators. They
argued that the proposed exemption was too broad, would not facilitate
any noninfringing uses, and could adversely impact the market for video
games. ESA expressed particular concern about the potential for piracy
as a result of circumvention activities, explaining that if the
exemption were to permit circumvention of TPMs on video game consoles,
those consoles could be used to play pirated video games. Opponents
also urged that petitioners had failed to demonstrate cognizable
adverse effects, arguing, for example, that the vast majority of games
can continue to be played in single-player mode when server support has
ended, and that there are other alternative means of playing games in
multiplayer mode without a matchmaking server, including by using a
local area network. ESA also argued that, at the point of sale,
consumers receive ample notice that server support may be discontinued.
NTIA supported adoption of the proposed exemption for continued
gameplay and for preservation uses, both for single-player and
multiplayer play. NTIA argued that gamers should be permitted to
restore access to a work that they had originally been allowed to use.
In addition, according to NTIA, consumers receive inconsistent notice
at best that developers may discontinue support for multiplayer use,
and LAN-enabled multiplayer play is an inadequate substitute to play
over the internet.
Based on a review of the evidentiary record, the Register
recommended an exemption to allow continued gameplay and preservation
activities when developer server support for a video game has ended,
though one more circumscribed than that proposed. With respect to
gamers, the Register concluded that the record supported granting an
exemption for video games that require communication with an
authentication server to allow gameplay when the requisite server is
taken offline. The Register explained that the inability to circumvent
the TPM would preclude all gameplay, a significant adverse effect, and
that circumvention to restore access would qualify as a noninfringing
fair use. At the same time, the Register determined that proponents had
failed to provide persuasive support for an exemption for online
multiplayer play, in large part because it is not clear on the current
record how the provision of circumvention tools to multiple users to
facilitate an alternative matchmaking service could be accomplished
without running afoul of the anti-trafficking provision in section
1201(a)(2). The Register also confirmed that the exemption for gamers
should not extend to jailbreaking of console software because such
jailbreaking is strongly associated with video game piracy.
With respect to preservation uses, looking to certain aspects of
section 108 of the Copyright Act for guidance, the Register found that
the record supported an exemption for libraries and archives, as well
as for museums, to allow circumvention of TPMs so that video games can
be preserved in playable condition when authentication servers are
discontinued. In accordance with section 108, such institutions must be
open to the public and/or to unaffiliated researchers, and the
activities at issue must not be for commercial purposes. As with gamers
generally, the recommended exemption for preservationists does not
extend to circumvention to enable online multiplayer play, which is an
activity that would extend beyond the walls of the preserving
institution. But because the risk of piracy is much lower in a
preservationist setting than with respect to gamers at large, the
Register recommended that preservationists have the ability to
circumvent TPMs controlling access to video game console software when
necessary to maintain a console game in playable form.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
(i) Video games in the form of computer programs embodied in
physical or downloaded formats that have been lawfully acquired as
complete games, when the copyright owner or its authorized
representative has ceased to provide access to an external computer
server necessary to facilitate an authentication process to enable
local gameplay, solely for the purpose of:
(A) Permitting access to the video game to allow copying and
modification of the computer program to restore access to the game
for personal gameplay on a personal computer or video game console;
or
(B) Permitting access to the video game to allow copying and
modification of the computer program to restore access to the game
on a personal computer or video game console when necessary to allow
preservation of the game in a playable form by an eligible library,
archives or museum, where such activities are carried out without
any purpose of direct or indirect commercial advantage and the video
game is not distributed or made available outside of the physical
premises of the eligible library, archives or museum.
(ii) Computer programs used to operate video game consoles
solely to the extent necessary for an eligible library, archives or
museum to engage in the preservation activities described in
paragraph (i)(B).
(iii) For purposes of the exemptions in paragraphs (i) and (ii),
the following definitions shall apply:
(A) ``Complete games'' means video games that can be played by
users without accessing or reproducing copyrightable content stored
or previously stored on an external computer server.
(B) ``Ceased to provide access'' means that the copyright owner
or its authorized representative has either issued an affirmative
statement indicating that external server support for the video game
has ended
[[Page 65958]]
and such support is in fact no longer available or, alternatively,
server support has been discontinued for a period of at least six
months; provided, however, that server support has not since been
restored.
(C) ``Local gameplay'' means gameplay conducted on a personal
computer or video game console, or locally connected personal
computers or consoles, and not through an online service or
facility.
(D) A library, archives or museum is considered ``eligible''
when the collections of the library, archives or museum are open to
the public and/or are routinely made available to researchers who
are not affiliated with the library, archives or museum.
9. Proposed Class 26: Software--3D Printers \31\
---------------------------------------------------------------------------
\31\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 356-77.
---------------------------------------------------------------------------
3D printing--also known as ``additive'' manufacturing--is a
technology that translates digital files into physical objects by
adding successive layers of material. Some 3D printer manufacturers use
TPMs to limit the types of material--or ``feedstock''--that can be used
in their 3D printers to manufacturer-approved feedstock.
Proponent Public Knowledge sought an exemption to permit the
circumvention of access controls on computer programs on 3D printers
with chip-based verification systems to enable the use of non-
manufacturer-approved feedstock in such printers. The requested
exemption would encompass both the modifications necessary to make a 3D
printer accept alternative feedstock, and potentially further
modifications to allow the use of feedstock consisting of material that
is different from what a 3D printer has been designed to use (e.g.,
metal instead of plastic).
The Copyright Office set forth the following proposed exemption in
the NPRM:
Proposed Class 26: This proposed class would allow circumvention
of TPMs on firmware or software in 3D printers to allow use of non-
manufacturer-approved feedstock in the printer.
According to Public Knowledge, non-manufacturer-approved feedstock
is often much less expensive than that provided by the manufacturer. In
addition, use of feedstock composed of a different material may require
modification of the printer's operating system software, for example,
to change preset variables such as the rate at which the heated
feedstock is extruded to create the object or the temperature of the
extrusion nozzle. According to Public Knowledge, the reproductions and
adaptations necessary to engage in these uses are noninfringing under
either the fair use doctrine or section 117. Public Knowledge asserts
that absent an exemption, 3D printer owners will be forced to pay more
for feedstock, and innovation in the 3D printing space will be
adversely affected.
This proposed class was opposed by Stratasys, Inc. (``Stratasys''),
a 3D printer manufacturer. Among other things, Stratasys contended that
the proposed uses do not qualify as noninfringing under section 117
because 3D printer owners license rather than own the software that is
installed on the 3D printer. Stratasys also argued that proponents had
failed adequately to demonstrate cognizable adverse effects. Stratasys
explained that 3D printers are used to produce medical implants,
aerospace parts, and other goods that are subject to safety or
regulatory guidelines, and expressed concern that an exemption could
permit use of inferior materials in such applications. Notably, this
concern was reinforced by FDA, which, in a letter to the Office,
worried that an exemption for this class might create unintended public
health and safety risks in relation to medical devices. Stratasys also
expressed the concern that an exemption could be used to access
proprietary design software, design files, or data.
NTIA favored granting the proposed exemption, on the ground that it
would benefit consumers and fuel innovation by reducing costs of
feedstock and by allowing the use of new types of feedstock. Although
NTIA acknowledged concerns that 3D-printed parts might use inferior
materials, it concluded that the exemption should not attempt to
address concerns about quality control.
The Register recommended granting an exemption for 3D printers with
chip-based verification systems, explaining that the proposed uses of
operating system software to permit the use of alternative feedstock
are likely noninfringing as a matter of fair use or under section 117,
and that the prohibition on circumvention appears to be adversely
affecting the proposed uses. At the same time, the Register observed
that proponents' proposal--and the evidence offered in support--was
focused largely on nonindustrial uses of printers rather than the sorts
of uses that could present the types of safety and regulatory concerns
highlighted by Stratasys and FDA. In light of the record, and to
address the safety and regulatory issues, the recommended exemption
excludes circumvention of TPMs on 3D printers that are used to print
objects that are subject to legal or regulatory oversight. The
recommended exemption also excludes circumvention for the purpose of
accessing design software, design files or proprietary data.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Computer programs that operate 3D printers that employ
microchip-reliant technological measures to limit the use of
feedstock, when circumvention is accomplished solely for the purpose
of using alternative feedstock and not for the purpose of accessing
design software, design files or proprietary data; provided,
however, that the exemption shall not extend to any computer program
on a 3D printer that produces goods or materials for use in commerce
the physical production of which is subject to legal or regulatory
oversight or a related certification process, or where the
circumvention is otherwise unlawful.
10. Proposed Class 27B: Networked Medical Devices--Patient Data \32\
---------------------------------------------------------------------------
\32\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 378-403.
---------------------------------------------------------------------------
Many modern implanted medical devices, such as pacemakers,
implantable cardioverter defibrillators, insulin pumps and continuous
glucose monitors, measure and record data about physiological
developments taking place within the body, and communicate that data
wirelessly to a corresponding personal monitoring system. Some personal
monitoring systems, in turn, transmit data to a hospital or monitoring
company, and ultimately to the patient's physician. Increasingly, these
transmissions of data are protected by TPMs, including encryption
schemes. MDRC requested an exemption that would allow a patient, or
persons acting on behalf of the patient, to circumvent TPMs on these
transmissions so that the patient is able to access the data generated
by his or her own medical device and any corresponding personal
monitoring system, without the need to visit a hospital or doctor's
office.
As explained above, MDRC's petition also encompassed security
research into medical device software. The Office accordingly set forth
the following class in the NPRM:
Proposed Class 27: The proposed class would allow circumvention
of TPMs protecting computer programs in medical devices designed for
attachment to or implantation in patients and in their corresponding
monitoring devices, as well as the outputs generated through those
programs. As proposed, the exemption would be limited to cases where
circumvention is at the direction of a patient seeking access to
information generated by his or her own
[[Page 65959]]
device, or at the direction of those conducting research into the
safety, security, and effectiveness of such devices. The proposal
would cover devices such as pacemakers, implantable cardioverter
defibrillators, insulin pumps, and continuous glucose monitors.
As also noted above, the Register concluded that Proposed Class 27
should be divided into Proposed Class 27A, concerning security
research, and Proposed Class 27B, concerning patient data, to allow the
two types of uses to be separately analyzed. Class 27A is addressed
with the other security research-related classes above. A discussion of
Class 27B follows.
MDRC explained that an exemption to circumvent TPMs protecting
medical device data would give patients real-time access to their own
health data, allowing them, for example, to immediately detect major
health risks or facilitate highly personalized treatment. As framed by
MDRC, the exemption would provide access only to TPM-protected data
outputs of medical devices, not to computer programs contained within
medical devices or their corresponding monitoring systems. Although
MDRC explained that such data is uncopyrightable to the extent it
merely consists of physiological facts, such as a patient's blood
glucose level, it expressed concern that the data outputs of some
devices may constitute copyrightable compilations. MDRC asserted that
the proposed use of such compilations would be a fair use, and urged
the Office to adopt an exemption covering such circumstances. MDRC
explained that the prohibition on circumvention adversely affects
patients' ability to monitor their own health in real time, and that
those adverse effects are likely to increase because FDA has encouraged
manufacturers to impose TPMs on data outputs. Responding to concerns
about the impact of such an exemption on the battery life of implanted
devices, MDRC explained that the exemption could be limited to passive
monitoring of data that is already being transmitted by the medical
device or monitoring system.
The Office received comments in opposition to the proposed
exemption from AdvaMed, IPO, LifeScience Alley, and NAM. AdvaMed agreed
with MDRC that in certain circumstances, the selection and arrangement
of data generated by a medical device might be copyrightable as a
compilation. Opponents, however, provided little argument to counter
MDRC's claim that patient access to such medical data constitutes a
noninfringing fair use. Indeed, they conceded that patients have an
``inherent right'' to access their own medical data, but argued that
this right is satisfied by obtaining data via authorized means, such as
through a patient's health care provider. Opponents also relied heavily
on the claim that the exemption would create health and safety
concerns. For example, opponents contended that requesting data from
implanted devices at an abnormally high rate could reduce the battery
life of such devices. Opponents suggested that the Copyright Office
allow an opportunity for FDA to provide input on the proposed
exemption.
In light of opponents' comments, the Office advised FDA of the
pendency of this proceeding. In a responsive letter to the Office, FDA
expressed concern about facilitating access to data that includes
patient health information or personally identifiable information,
noting that the use of such data is subject to government regulation.
FDA recommended that any exemption indicate that it was not intended to
override the regulations of other federal agencies.
NTIA supported the proposed exemption, explaining among other
things that the exemption would allow patients to see and react to data
collected by their devices in real time. NTIA also concluded that the
exemption is unlikely to adversely affect the operation of the medical
device itself, based on MDRC's assertion that data would be passively
intercepted as it is wirelessly transmitted from the device or
monitoring system.
The Register recommended granting the proposed exemption. The
Register observed that in many cases, data outputs generated by devices
would likely be uncopyrightable, and that in such cases, section
1201(a)(1)--which is limited to works protected under title 17--would
not apply. The Register noted, however, that some data outputs could
qualify for protection as literary works if they reflect a sufficiently
original selection and presentation of data, and that opponents
themselves agreed that such outputs could be subject to copyright.
Accordingly, the Register concluded that an exemption would be
appropriate to enable patients' access to their own medical data as
embodied in protectable data compilations generated by implanted
medical devices and corresponding personal monitoring systems. The
Register concluded that accessing one's own medical data is likely to
be a fair and noninfringing use, and that TPMs on that data are likely
to have an adverse impact on such access, especially as TPMs become
more prevalent in response to FDA guidance. In addition, the Register
concluded that the statutory factors favor an exemption.
In light of concerns about the effect of circumvention on the
battery life of implanted medical devices, the Register recommended
that the exemption reflect the approach suggested by MDRC, so it is
limited to passively accessing data that is already being generated or
transmitted by the device. Further, as suggested by FDA, the
recommended exemption expressly provides that any actions taken under
the exemption must be compliant with all applicable laws and
regulations. The recommended exemption does not permit circumvention
``at the direction of a patient,'' as a broader exception allowing
third parties to engage in circumvention activities on behalf of others
could implicate the anti-trafficking provisions of section 1201(a)(2)
and (b). Unlike the recommended exemptions for security research and
vehicle diagnosis, repair and modification, the Register recommended
that the exemption for access to patient data be effective without
delay because the passive monitoring of data transmissions did not
appear to present any immediate safety or health concerns.
Accordingly, based on the Register's recommendation, the Librarian
adopts the following exemption:
Literary works consisting of compilations of data generated by
medical devices that are wholly or partially implanted in the body
or by their corresponding personal monitoring systems, where such
circumvention is undertaken by a patient for the sole purpose of
lawfully accessing the data generated by his or her own device or
monitoring system and does not constitute a violation of applicable
law, including without limitation the Health Insurance Portability
and Accountability Act of 1996, the Computer Fraud and Abuse Act of
1986 or regulations of the Food and Drug Administration, and is
accomplished through the passive monitoring of wireless
transmissions that are already being produced by such device or
monitoring system.
B. Classes Considered but Not Recommended
Based upon the record in this proceeding, the Register of
Copyrights recommends that the Librarian determine that the following
classes of works shall not be exempt from the prohibition against
circumvention of technological measures set forth in section
1201(a)(1):
[[Page 65960]]
1. Proposed Classes 8 and 10: Audiovisual Works and Literary Works
Distributed Electronically--Space-Shifting and Format-Shifting \33\
---------------------------------------------------------------------------
\33\ The Register's analysis and conclusions for these classes,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 107-26.
---------------------------------------------------------------------------
Proposed Classes 8 and 10 would have permitted circumvention of
technological measures protecting motion pictures, e-books, and other
audiovisual or literary works to allow users to view the materials on
alternate devices for personal use or to create back-up copies. Broadly
speaking, this activity is referred to as ``space-shifting'' and, in
some cases, ``format-shifting.''
Public Knowledge requested an exemption to engage broadly in
noncommercial space-shifting of motion pictures distributed on DVDs,
Blu-ray discs, and downloaded files. Alpheus Madsen requested an
exemption to allow circumvention of access controls on DVDs
specifically in order to play the DVDs on the Linux operating system.
These overlapping exemptions were combined into the following class:
Proposed Class 8: This proposed class would allow circumvention
of access controls on lawfully made and acquired audiovisual works
for the purpose of noncommercial space-shifting or format-shifting.
This exemption has been requested for audiovisual material made
available on DVDs protected by CSS, Blu-ray discs protected by AACS,
and TPM-protected online distribution services.
Christopher Meadows, in turn, proposed an exemption to engage in
noncommercial space- or format-shifting of e-books, to allow consumers
to view TPM-protected e-books on alternate viewing platforms and to
create back-up copies. The proposed exemption was described as follows:
Proposed Class 10: This proposed class would allow circumvention
of access controls on lawfully made and acquired literary works
distributed electronically for the purpose of noncommercial space-
shifting or format-shifting. This exemption has been requested for
literary works distributed electronically [as] e-books.
For both classes, proponents argued that space- and format-shifting
for personal, noncommercial uses are fair uses. In the past four
rulemakings, the Register has declined to recommend, and the Librarian
has declined to adopt, an exemption for such uses because the
proponents had failed to establish a legal or factual record sufficient
to establish that the space- or format-shifting of audiovisual works,
e-books, and other copyrighted works constitutes a noninfringing use.
In this rulemaking, proponents argued that reconsideration of that
position was warranted in light of a recent district court decision,
Fox Broadcasting Co. v. Dish Network LLC,\34\ as well as certain
statements from legislative history of certain aspects of the Copyright
Act, including a discussion of how the creation of a limited copyright
in sound recordings might impact home audio recording.
---------------------------------------------------------------------------
\34\ No. CV 12-4529 DMG (SHx), 2015 WL 1137593, at *30-31 (C.D.
Cal. Jan. 20, 2015).
---------------------------------------------------------------------------
Opponents urged that noncommercial space- and format-shifting are
not established fair uses under the law. They further argued that, in
any event, an exemption is unwarranted in light of the continued growth
of licensed digital distribution services that provide meaningful
alternatives to circumvention, including digital rights locker services
such as UltraViolet and Disney Movies Anywhere and disc-to-digital
services such as VUDU and Flixter that allow consumers to convert
previously purchased DVDs or Blu-ray discs into high-quality digital
files. According to opponents, an exemption that allowed broad-based
space- or format-shifting would undermine not only the existing markets
for DVDs and Blu-ray discs but also these emerging online distribution
models.
NTIA, as it has in the past, supported what it termed a ``narrowed
version'' of an exemption to allow circumvention when the work is not
accompanied by an additional copy of the work in an alternate digital
format. In NTIA's view, the exemption is an issue of consumer
protection, although NTIA acknowledged the broader debate about the
merits and legality of noncommercial space-shifting.
The Register recommended against the adoption of a proposed
exemption, on the ground that the law of fair use, as it stands today,
does not sanction broad-based space-shifting or format-shifting. The
Register rejected proponents' attempt to rely on the Dish Network case,
explaining that the uses at issue there were much more circumscribed
than the uses proposed for this exemption. In particular, the service
at issue in Dish Network included many safeguards to prevent unfettered
use of the relevant content, including limitations on the length of
time content would be available on the device to which a work is
transferred. Accordingly, the Register concluded that the case was both
factually and legally distinguishable. On the other hand, the recent
case of Fox News Network, LLC v. TVEyes Inc.,\35\ reaffirmed judicial
reluctance to embrace a general space-shifting privilege.
---------------------------------------------------------------------------
\35\ No. 13 Civ. 5315 (AKH), 2015 WL 5025274 (S.D.N.Y. Aug. 25,
2015).
---------------------------------------------------------------------------
At the same time, the Register recognized the consumer appeal of
the proposals, and marketplace efforts to meet consumer demand for
accessing movies and books in a wide variety of formats. According to
the Register, the policy judgments surrounding the creation of a novel
exception for space- or format-shifting of copyrighted works are
complex and thus best left to Congress or the courts.
2. Proposed Class 18: Jailbreaking--Dedicated E-Book Readers \36\
---------------------------------------------------------------------------
\36\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 193-94.
---------------------------------------------------------------------------
This class would have allowed circumvention of technological
measures protecting dedicated e-book readers, such as Amazon's Kindle
Paperwhite, to run lawfully acquired third-party applications or
software on such devices. Maneesh Pangasa filed a petition seeking this
exemption, and the NPRM described the class as follows:
Proposed Class 18: This proposed class would permit the
jailbreaking of dedicated e-book readers to allow those devices to
run lawfully acquired software that is otherwise prevented from
running.
Pangasa, however, failed to submit further written comments or
evidentiary material in support of the petition and did not participate
in the public hearings. The written comments that were received in
connection with this class were abbreviated and did not offer specific
factual information or legal argument in support of the exemption. At
the public hearing, proponent Jay Freeman briefly mentioned that people
have jailbroken e-book readers to install screen savers or achieve
other functionality, but no further evidence was presented in relation
to this class. There were no opposition comments filed.
Although, as part of its discussion of the jailbreaking exemptions
for smartphones and all-purpose mobile computing devices, NTIA
expressed support for a jailbreaking exemption for dedicated e-book
readers, NTIA did not point to anything specific in the record to
support the requested exemption.
In light of the insufficiency of factual or legal support for the
proposed exemption, the Register declined to recommend it.
[[Page 65961]]
3. Proposed Class 19: Jailbreaking--Video Game Consoles \37\
---------------------------------------------------------------------------
\37\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 195-201.
---------------------------------------------------------------------------
Maneesh Pangasa filed a petition proposing an exemption to permit
jailbreaking of home video game consoles for an assortment of asserted
noninfringing uses, including installing alternative operating systems.
The Librarian rejected a similar exemption in 2012 because of
substantial concerns about video game piracy. The Copyright Office set
forth the following proposal in the NPRM:
Proposed Class 19: This proposed class would permit the
jailbreaking of home video game consoles. Asserted noninfringing
uses include installing alternative operating systems, running
lawfully acquired applications, preventing the reporting of personal
usage information to the manufacturer, and removing region locks.
The requested exemption would apply both to older and currently
marketed game consoles.
Pangasa failed to file supporting comments or participate in the
public hearings, and the brief written comments filed by other parties
provided scant support for the exemption. The limited amount of factual
support offered in written comments--concerning academic research
projects and ``homebrew'' video games--largely mirrored factual claims
that were not persuasive in the 2012 proceeding. At the public hearing,
the representative of commenting party iFixit provided some additional
information regarding certain types of video game console repairs for
which jailbreaking might be useful. At the same time, however, he
acknowledged that the referenced repairs could be undertaken without
circumvention.
Class 19 was opposed by ESA and Joint Creators. As in 2012,
opponents provided substantial evidence that console jailbreaking is
closely tied to video game piracy. In response to iFixit's concerns
about console repair, ESA observed that all major console manufacturers
offer repair services for consoles still under warranty at no charge,
and for out-of-warranty consoles for prices ranging from $99 to $149.
iFixit agreed with this assessment.
NTIA supported an exemption limited to repair of malfunctioning
hardware for systems that are obsolete or no longer covered by
manufacturer warranty, on the ground that to use an authorized repair
service, the owner must send the console to the manufacturer and pay a
``substantial'' fee. At the same time, NTIA concluded that the record
did not support a broader exemption, as the record is ``significantly
less robust and detailed than it was in the last rulemaking.''
The Register concluded that the record in this rulemaking did not
provide a basis for departing from her 2012 recommendation that an
exemption for video game console jailbreaking should be denied.
According to the Register, the record was not materially different from
that considered in 2012, and included evidence demonstrating that
jailbreaking of video game consoles continues to be closely associated
with video game piracy, thus undermining the value of console software
as a secure distribution platform. The Register also concluded that the
need to engage in console repair did not provide a basis for an
exemption in light of the availability of authorized repair services
and the ability of proponents and others to perform repairs without the
need to circumvent.
4. Proposed Class 24: Abandoned Software--Music Recording Software \38\
---------------------------------------------------------------------------
\38\ The Register's analysis and conclusions for this class,
including citations to the record and relevant legal authority, can
be found in the Recommendation at 354-55.
---------------------------------------------------------------------------
This proposed exemption would have allowed circumvention of a
dongle-like access control that is allegedly no longer supported by the
developer or copyright owner and protects a specific type of music
recording software, Ensoniq PARIS. Three individuals proposed this
exemption, Richard Kelley, James McCloskey, and Michael Yanoska, and
the Copyright Office set forth the following proposal in the NPRM:
Proposed Class 24: This proposed class would allow circumvention
of access controls consisting of the PACE content protection system,
which restricts access to the full functionality of lawfully
acquired Ensoniq PARIS music recording software.
No evidence or argument to support this exemption was submitted
after the initial petition phase of the proceeding. The class was
opposed by Joint Creators, who raised concerns about the lack of
supporting evidence.
In light of the incomplete record, NTIA and the Register declined
to recommend granting the exemption.
C. Conclusion
Having considered the evidence in the record, the contentions of
the commenting parties, and the statutory objectives, the Register of
Copyrights has recommended that the Librarian of Congress publish
certain classes of works, as designated above, so that the prohibition
against circumvention of technological measures that effectively
control access to copyrighted works shall not apply to persons who
engage in noninfringing uses of those particular classes of works.
Dated: October 20, 2015.
Maria A. Pallante,
Register of Copyrights and Director of the U.S. Copyright Office.
Determination of the Librarian of Congress
Having duly considered and accepted the Recommendation of the
Register of Copyrights, which Recommendation is hereby incorporated by
reference, the Librarian of Congress, pursuant to 17 U.S.C.
1201(a)(1)(C) and (D), hereby publishes as a new rule the classes of
copyrighted works that shall for a three-year period be subject to the
exemption provided in 17 U.S.C. 1201(a)(1)(B) from the prohibition
against circumvention of technological measures that effectively
control access to copyrighted works set forth in 17 U.S.C.
1201(a)(1)(A).
List of Subjects in 37 CFR Part 201
Copyright, Exemptions to prohibition against circumvention.
Final Regulations
For the reasons set forth in the preamble, 37 CFR part 201 is
amended as follows:
PART 201--GENERAL PROVISIONS
0
1. The authority citation for part 201 continues to read as follows:
Authority: 17 U.S.C. 702
0
2. Section 201.40 is amended by revising paragraph (b) and removing
paragraph (d).
The revision reads as follows:
Sec. 201.40 Exemption to prohibition against circumvention.
* * * * *
(b) Classes of copyrighted works. Pursuant to the authority set
forth in 17 U.S.C. 1201(a)(1)(C) and (D), and upon the recommendation
of the Register of Copyrights, the Librarian has determined that the
prohibition against circumvention of technological measures that
effectively control access to copyrighted works set forth in 17 U.S.C.
1201(a)(1)(A) shall not apply to persons who engage in noninfringing
uses of the following classes of copyrighted works:
(1) Motion pictures (including television shows and videos), as
defined in 17 U.S.C. 101, where circumvention is undertaken solely in
order to make use of short portions of the motion
[[Page 65962]]
pictures for the purpose of criticism or comment in the following
instances:
(i) For use in documentary filmmaking,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a DVD
protected by the Content Scramble System, on a Blu-ray disc protected
by the Advanced Access Control System, or via a digital transmission
protected by a technological measure, and where the person engaging in
circumvention reasonably believes that screen-capture software or other
non-circumventing alternatives are unable to produce the required level
of high-quality content;
(ii) For use in noncommercial videos (including videos produced for
a paid commission if the commissioning entity's use is noncommercial),
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a DVD
protected by the Content Scramble System, on a Blu-ray disc protected
by the Advanced Access Control System, or via a digital transmission
protected by a technological measure, and where the person engaging in
circumvention reasonably believes that screen-capture software or other
non-circumventing alternatives are unable to produce the required level
of high-quality content;
(iii) For use in nonfiction multimedia e-books offering film
analysis,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) Where the motion picture is lawfully made and acquired on a DVD
protected by the Content Scramble System, on a Blu-ray disc protected
by the Advanced Access Control System, or via a digital transmission
protected by a technological measure, and where the person engaging in
circumvention reasonably believes that screen-capture software or other
non-circumventing alternatives are unable to produce the required level
of high-quality content;
(iv) By college and university faculty and students, for
educational purposes,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made and
acquired on a DVD protected by the Content Scramble System, on a Blu-
ray disc protected by the Advanced Access Control System, or via a
digital transmission protected by a technological measure, and where
the person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable to
produce the required level of high-quality content;
(v) By faculty of massive open online courses (MOOCs) offered by
accredited nonprofit educational institutions to officially enrolled
students through online platforms (which platforms themselves may be
operated for profit), for educational purposes, where the MOOC provider
through the online platform limits transmissions to the extent
technologically feasible to such officially enrolled students,
institutes copyright policies and provides copyright informational
materials to faculty, students and relevant staff members, and applies
technological measures that reasonably prevent unauthorized further
dissemination of a work in accessible form to others or retention of
the work for longer than the course session by recipients of a
transmission through the platform, as contemplated by 17 U.S.C. 110(2),
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made and
acquired on a DVD protected by the Content Scramble System, on a Blu-
ray disc protected by the Advanced Access Control System, or via a
digital transmission protected by a technological measure, and where
the person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable to
produce the required level of high-quality content;
(vi) By kindergarten through twelfth-grade educators, including of
accredited general educational development (GED) programs, for
educational purposes,
(A) Where the circumvention is undertaken using screen-capture
technology that appears to be offered to the public as enabling the
reproduction of motion pictures after content has been lawfully
acquired and decrypted, or
(B) In film studies or other courses requiring close analysis of
film and media excerpts where the motion picture is lawfully made and
acquired on a DVD protected by the Content Scramble System, or via a
digital transmission protected by a technological measure, and where
the person engaging in circumvention reasonably believes that screen-
capture software or other non-circumventing alternatives are unable to
produce the required level of high-quality content;
(vii) By kindergarten through twelfth-grade students, including
those in accredited general educational development (GED) programs, for
educational purposes, where the circumvention is undertaken using
screen-capture technology that appears to be offered to the public as
enabling the reproduction of motion pictures after content has been
lawfully acquired and decrypted; and
(viii) By educators and participants in nonprofit digital and media
literacy programs offered by libraries, museums and other nonprofit
entities with an educational mission, in the course of face-to-face
instructional activities for educational purposes, where the
circumvention is undertaken using screen-capture technology that
appears to be offered to the public as enabling the reproduction of
motion pictures after content has been lawfully acquired and decrypted.
(2) Literary works, distributed electronically, that are protected
by technological measures that either prevent the enabling of read-
aloud functionality or interfere with screen readers or other
applications or assistive technologies,
(i) When a copy of such a work is lawfully obtained by a blind or
other person with a disability, as such a person is defined in 17
U.S.C. 121; provided, however, that the rights owner is remunerated, as
appropriate, for the price of the mainstream copy of the work as made
available to the general public through customary channels, or
(ii) When such work is a nondramatic literary work, lawfully
obtained and used by an authorized entity pursuant to 17 U.S.C. 121.
(3)(i) Computer programs that enable the following types of
wireless devices
[[Page 65963]]
to connect to a wireless telecommunications network, when circumvention
is undertaken solely in order to connect to a wireless
telecommunications network and such connection is authorized by the
operator of such network, and the device is a used device:
(A) Wireless telephone handsets (i.e., cellphones);
(B) All-purpose tablet computers;
(C) Portable mobile connectivity devices, such as mobile hotspots,
removable wireless broadband modems, and similar devices; and
(D) Wearable wireless devices designed to be worn on the body, such
as smartwatches or fitness devices.
(ii) A device is considered ``used'' for purposes of this exemption
when it has previously been lawfully acquired and activated on the
wireless telecommunications network of a wireless carrier.
(4) Computer programs that enable smartphones and portable all-
purpose mobile computing devices to execute lawfully obtained software
applications, where circumvention is accomplished for the sole purpose
of enabling interoperability of such applications with computer
programs on the smartphone or device, or to permit removal of software
from the smartphone or device. For purposes of this exemption, a
``portable all-purpose mobile computing device'' is a device that is
primarily designed to run a wide variety of programs rather than for
consumption of a particular type of media content, is equipped with an
operating system primarily designed for mobile use, and is intended to
be carried or worn by an individual.
(5) Computer programs that enable smart televisions to execute
lawfully obtained software applications, where circumvention is
accomplished for the sole purpose of enabling interoperability of such
applications with computer programs on the smart television.
(6) Computer programs that are contained in and control the
functioning of a motorized land vehicle such as a personal automobile,
commercial motor vehicle or mechanized agricultural vehicle, except for
computer programs primarily designed for the control of telematics or
entertainment systems for such vehicle, when circumvention is a
necessary step undertaken by the authorized owner of the vehicle to
allow the diagnosis, repair or lawful modification of a vehicle
function; and where such circumvention does not constitute a violation
of applicable law, including without limitation regulations promulgated
by the Department of Transportation or the Environmental Protection
Agency; and provided, however, that such circumvention is initiated no
earlier than 12 months after the effective date of this regulation.
(7)(i) Computer programs, where the circumvention is undertaken on
a lawfully acquired device or machine on which the computer program
operates solely for the purpose of good-faith security research and
does not violate any applicable law, including without limitation the
Computer Fraud and Abuse Act of 1986, as amended and codified in title
18, United States Code; and provided, however, that, except as to
voting machines, such circumvention is initiated no earlier than 12
months after the effective date of this regulation, and the device or
machine is one of the following:
(A) A device or machine primarily designed for use by individual
consumers (including voting machines);
(B) A motorized land vehicle; or
(C) A medical device designed for whole or partial implantation in
patients or a corresponding personal monitoring system, that is not and
will not be used by patients or for patient care.
(ii) For purposes of this exemption, ``good-faith security
research'' means accessing a computer program solely for purposes of
good-faith testing, investigation and/or correction of a security flaw
or vulnerability, where such activity is carried out in a controlled
environment designed to avoid any harm to individuals or the public,
and where the information derived from the activity is used primarily
to promote the security or safety of the class of devices or machines
on which the computer program operates, or those who use such devices
or machines, and is not used or maintained in a manner that facilitates
copyright infringement.
(8)(i) Video games in the form of computer programs embodied in
physical or downloaded formats that have been lawfully acquired as
complete games, when the copyright owner or its authorized
representative has ceased to provide access to an external computer
server necessary to facilitate an authentication process to enable
local gameplay, solely for the purpose of:
(A) Permitting access to the video game to allow copying and
modification of the computer program to restore access to the game for
personal gameplay on a personal computer or video game console; or
(B) Permitting access to the video game to allow copying and
modification of the computer program to restore access to the game on a
personal computer or video game console when necessary to allow
preservation of the game in a playable form by an eligible library,
archives or museum, where such activities are carried out without any
purpose of direct or indirect commercial advantage and the video game
is not distributed or made available outside of the physical premises
of the eligible library, archives or museum.
(ii) Computer programs used to operate video game consoles solely
to the extent necessary for an eligible library, archives or museum to
engage in the preservation activities described in paragraph (i)(B).
(iii) For purposes of the exemptions in paragraphs (i) and (ii),
the following definitions shall apply:
(A) ``Complete games'' means video games that can be played by
users without accessing or reproducing copyrightable content stored or
previously stored on an external computer server.
(B) ``Ceased to provide access'' means that the copyright owner or
its authorized representative has either issued an affirmative
statement indicating that external server support for the video game
has ended and such support is in fact no longer available or,
alternatively, server support has been discontinued for a period of at
least six months; provided, however, that server support has not since
been restored.
(C) ``Local gameplay'' means gameplay conducted on a personal
computer or video game console, or locally connected personal computers
or consoles, and not through an online service or facility.
(D) A library, archives or museum is considered ``eligible'' when
the collections of the library, archives or museum are open to the
public and/or are routinely made available to researchers who are not
affiliated with the library, archives or museum.
(9) Computer programs that operate 3D printers that employ
microchip-reliant technological measures to limit the use of feedstock,
when circumvention is accomplished solely for the purpose of using
alternative feedstock and not for the purpose of accessing design
software, design files or proprietary data; provided, however, that the
exemption shall not extend to any computer program on a 3D printer that
produces goods or materials for use in commerce the physical production
of which is subject to legal or regulatory oversight or a related
certification process, or where the circumvention is otherwise
unlawful.
(10) Literary works consisting of compilations of data generated by
[[Page 65964]]
medical devices that are wholly or partially implanted in the body or
by their corresponding personal monitoring systems, where such
circumvention is undertaken by a patient for the sole purpose of
lawfully accessing the data generated by his or her own device or
monitoring system and does not constitute a violation of applicable
law, including without limitation the Health Insurance Portability and
Accountability Act of 1996, the Computer Fraud and Abuse Act of 1986 or
regulations of the Food and Drug Administration, and is accomplished
through the passive monitoring of wireless transmissions that are
already being produced by such device or monitoring system.
* * * * *
Dated: October 20, 2015.
David S. Mao,
Acting Librarian of Congress.
[FR Doc. 2015-27212 Filed 10-27-15; 8:45 am]
BILLING CODE 1410-30-P