Section 1201 Study: Request for Additional Comments, 66296-66299 [2016-23167]

Download as PDF 66296 Federal Register / Vol. 81, No. 187 / Tuesday, September 27, 2016 / Notices On August 29, 2016, Creative filed a petition for review and on September 1, 2016, Respondents, Intervenor, and OUII filed replies in opposition to Creative’s petition. The Commission has determined not to review the ID. The investigation is terminated. The authority for the Commission’s determination is contained in section 337 of the Tariff Act of 1930, as amended (19 U.S.C. 1337), and in Part 210 of the Commission’s Rules of Practice and Procedure (19 CFR part 210). By order of the Commission. Issued: September 21, 2016. Lisa R. Barton, Secretary to the Commission. [FR Doc. 2016–23243 Filed 9–26–16; 8:45 am] BILLING CODE 7020–02–P LIBRARY OF CONGRESS U.S. Copyright Office [Docket No. 2015–8] Section 1201 Study: Request for Additional Comments U.S. Copyright Office, Library of Congress. ACTION: Notice of Inquiry. AGENCY: The United States Copyright Office is requesting additional written comments in connection with its ongoing study on the operation of the statutory provisions regarding the circumvention of copyright protection systems. This request provides an opportunity for interested parties to address certain issues raised by various members of the public in response to the Office’s initial Notice of Inquiry. DATES: Written comments must be received no later than 11:59 p.m. Eastern Time on October 27, 2016. Written reply comments must be received no later than 11:59 p.m. Eastern Time on November 16, 2016. ADDRESSES: The Copyright Office is using the regulations.gov system for the submission and posting of public comments in this proceeding. All comments are therefore to be submitted electronically through regulations.gov. Specific instructions for submitting comments are available on the Copyright Office Web site at https:// copyright.gov/policy/1201/ commentsubmission/. If electronic submission of comments is not feasible, please contact the Office using the contact information below for special instructions. asabaliauskas on DSK3SPTVN1PROD with NOTICES SUMMARY: VerDate Sep<11>2014 17:08 Sep 26, 2016 Jkt 238001 FOR FURTHER INFORMATION CONTACT: Kevin R. Amer, Senior Counsel for Policy and International Affairs, by email at kamer@loc.gov or by telephone at 202–707–8350; or Regan A. Smith, Associate General Counsel, by email at resm@loc.gov or by telephone at 202– 707–8350. SUPPLEMENTARY INFORMATION: I. Background At the request of the Ranking Member of the House Committee on the Judiciary, the Copyright Office is conducting a study to assess the operation of section 1201 of title 17. In December 2015, the Office issued a Notice of Inquiry identifying several aspects of the statutory and regulatory framework that the Office believes are ripe for review, and inviting public comment on those and any other pertinent issues.1 The Notice provided for two rounds of written comments. In response, the Office received sixty-eight initial comments and sixteen reply comments.2 The Office then announced public roundtables on the topics addressed in the Notice and comments.3 These sessions, held in Washington, DC and San Francisco, California in May 2016, involved participation by more than thirty panelists, representing a wide range of interests and perspectives. Transcripts of the roundtables are available at https://copyright.gov/policy/ 1201/, and video recordings will be available at that location at a later date. In the written comments and during the roundtables, parties expressed a variety of views regarding whether legislative amendments to section 1201 may be warranted. Among other suggested changes, commenters discussed proposals to update the statute’s permanent exemption framework and to amend the antitrafficking provisions to permit thirdparty assistance with lawful circumvention activities. At this time, as explained below, the Office is interested in receiving additional stakeholder input on particular aspects of those proposals. In addition, parties submitted numerous and varied views regarding the triennial rulemaking process under section 1201(a)(1)(C); while the Office continues to thoroughly evaluate these comments in conducting its study, this 1 Section 1201 Study: Notice and Request for Public Comment, 80 FR 81369 (Dec. 29, 2015). 2 All comments may be accessed from the Copyright Office Web site at https://copyright.gov/ policy/1201/ by clicking the ‘‘Public Comments’’ tab, followed by the ‘‘Comments’’ link. 3 Software-Enabled Consumer Products Study and Section 1201 Study: Announcement of Public Roundtables, 81 FR 17206 (Mar. 28, 2016). PO 00000 Frm 00044 Fmt 4703 Sfmt 4703 second Notice of Inquiry does not specifically address those issues. A party choosing to respond to this Notice of Inquiry need not address every topic below, but the Office requests that responding parties clearly identify and separately address those subjects for which a response is submitted. Parties also are invited to address any other pertinent issues that the Office should consider in conducting its study. II. Subjects of Inquiry 1. Proposals for New Permanent Exemptions a. Assistive Technologies for Use by Persons Who Are Blind, Visually Impaired, or Print Disabled. The written comments and roundtable discussions revealed widespread support for adoption of a permanent exemption to facilitate access to works in electronic formats by persons who are blind, visually impaired, or print disabled. The Office invites comment regarding specific provisions that commenters believe should be included in legislation proposing such an exemption. For example, the exemption for this purpose granted in the 2015 rulemaking permits circumvention of access controls applied to literary works distributed electronically, where the access controls ‘‘either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies.’’ 4 The exemption applies in the following circumstances: (i) When a copy of such a work is lawfully obtained by a blind or other person with a disability, as such a person is defined in 17 U.S.C. 121; provided, however, that the rights owner is remunerated, as appropriate, for the price of the mainstream copy of the work as made available to the general public through customary channels, or (ii) When such work is a nondramatic literary work, lawfully obtained and used by an authorized entity pursuant to 17 U.S.C. 121.5 The Office is interested in commenters’ views on whether this language would be appropriate for adoption as a permanent exemption, or whether there are specific changes or additional provisions that Congress may wish to consider. b. Device Unlocking. Some commenters advocated the adoption of a permanent exemption to permit circumvention of access controls on wireless devices for purposes of 4 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 80 FR 65944, 65950 (Oct. 28, 2015) (‘‘2015 Final Rule’’). 5 Id. E:\FR\FM\27SEN1.SGM 27SEN1 Federal Register / Vol. 81, No. 187 / Tuesday, September 27, 2016 / Notices ‘‘unlocking’’ such devices—i.e., enabling them to connect to the network of a different mobile wireless carrier. Since 2006, the rulemaking process has involved consideration of exemptions permitting unlocking of cellphones, and in the 2015 rulemaking, pursuant to Congress’s direction,6 the Register considered whether to extend the exemption to other categories of wireless devices. At the conclusion of the 2015 proceeding, the Librarian, upon the Register’s recommendation, adopted an unlocking exemption that applies to used wireless devices of the following types: asabaliauskas on DSK3SPTVN1PROD with NOTICES (A) Wireless telephone handsets (i.e., cellphones); (B) All-purpose tablet computers; (C) Portable mobile connectivity devices, such as mobile hotspots, removable wireless broadband modems, and similar devices; and (D) Wearable wireless devices designed to be worn on the body, such as smartwatches or fitness devices.7 The Office invites comment on whether an unlocking exemption would be appropriate for adoption as a permanent exemption or whether such activities are more properly considered as part of the triennial rulemaking. For commenters who favor consideration of a permanent exemption, the Office is interested in commenters’ views on whether the language of the 2015 unlocking exemption would be appropriate for adoption as a permanent exemption, or whether there are specific changes or additional provisions that Congress may wish to consider. c. Computer Programs. Several commenters expressed concern over the scope of section 1201 in the context of copyrighted computer programs that enable the operation of a machine or device. These commenters suggested that by prohibiting the circumvention of access controls on such programs, the statute prevents the public from engaging in legitimate activities, such as the repair of automobiles or the use of third-party device components, that seem far removed from the protection of creative expression that section 1201 was intended to address. To respond to this concern, some commenters argued that Congress should establish a statutory exemption that would permit circumvention of technological protection measures (‘‘TPM’’s) controlling access to such software in appropriate circumstances. The Office is interested in additional views on such proposals. 6 See Unlocking Consumer Choice and Wireless Competition Act, Public Law 113–144, sec. 2(b), 128 Stat. 1751, 1751 (2014). 7 2015 Final Rule, 80 FR at 65952. VerDate Sep<11>2014 17:08 Sep 26, 2016 Jkt 238001 For purposes of focusing the discussion, the Office invites comment on whether there are specific formulations of such an exemption that could serve as helpful starting points for further consideration of legislation. For example, Congress could consider adoption of a permanent exemption for purposes of diagnosis, maintenance, and repair. Such legislation could provide that a person who has lawfully obtained the right to use a computer program may circumvent a TPM controlling access to that program, so long as the circumvention is undertaken for purposes of diagnosis, maintenance, or repair. Are existing legal doctrines or statutes, such as the current language addressing machine maintenance and repair in section 117(c),8 the doctrine of repair and reconstruction in patent law,9 case law addressing refurbishment under trademark law,10 or ‘‘right to repair’’ bills introduced into various state legislatures,11 helpful to inform the appropriate scope of repair in this context? To what extent would the combination of such an exemption with the current language of 1201(f) 12— which allows circumvention for purposes of facilitating interoperability under certain circumstances— adequately address users’ concerns regarding section 1201’s impact on consumer activities? Please also comment upon whether it would be advisable to consider, in addition to diagnosis, maintenance, or repair, an exemption to explicitly permit circumvention for purposes of engaging in any lawful modification of a computer program. Such an exemption could allow circumventions undertaken to make non-infringing adaptations, including, for example, uses permitted under section 117(a) and/or the fair use doctrine.13 Please address whether this broader formulation would, or would not, be 8 17 U.S.C. 117(c). Aro Mfg. Co. v. Convertible Top Replacement Co., 365 U.S. 336 (1961); see also Aro Mfg. Co. v. Convertible Top Replacement Co., 377 U.S. 476 (1964). 10 See Champion Spark Plug Co. v. Sanders, 331 U.S. 125 (1947); see also Karl Storz EndoscopyAmerica, Inc. v. Fiber Tech Med., Inc., 4 F. App’x 128, 131–32 (4th Cir. 2001) (‘‘[T]he Lanham Act does not apply in the narrow category of cases where a trademarked product is repaired, rebuilt or modified at the request of the product’s owner,’’ so long as ‘‘the owner is not, to the repairer’s knowledge, merely obtaining modifications or repairs for purposes of resale.’’). 11 See, e.g., H.R. 3383, 189th Gen. Ct. (Mass. 2015); S. 3998B, 2015 Leg., Reg. Sess. (N.Y. 2015); Assemb. 6068A, 2015 Leg., Reg. Sess. (N.Y. 2015); Legis. B. 1072, 104th Leg., 2d Sess. (Neb. 2016); H.R. 1048, 89th Leg., Reg. Sess. (Minn. 2015); see also Mass. Gen. Laws ch. 93K (2013). 12 17 U.S.C. 1201(f). 13 See 17 U.S.C. 117(a), 107. 9 See PO 00000 Frm 00045 Fmt 4703 Sfmt 4703 66297 likely to result in economically harmful unauthorized uses of copyrighted works. With either formulation, would concerns over enabling unauthorized uses be mitigated by conditioning the exemption on the circumventing party not engaging in any unauthorized use of a copyrighted work other than the accessed computer program, or by limiting the exemption to computer programs that are ‘‘not a conduit to protectable expression’’—i.e., those that do ‘‘not in turn create any protected expression’’ when executed? 14 In the United Kingdom, for example, the prohibition on circumvention specifically excludes TPMs applied to computer programs, but does apply in at least some circumstances where copyrighted content is generated by a computer program (e.g., graphical content in video games).15 The Office is particularly interested in any information or perspectives on the impact of the UK law and how operating under it contrasts or not with the U.S. experience. Alternatively, should the exemption be limited to computer programs in particular categories of devices? The Office is interested in commenters’ views on the advisability of these various approaches. Which of these models, if any, would facilitate users’ ability to engage in permissible uses of software, while preserving congressional intent in supporting new ways of disseminating copyrighted materials to users? 16 Responding parties are also encouraged to suggest alternate formulations, keeping in mind the Office’s goal of focusing discussion on this topic. d. Obsolete Technologies. In prior rulemakings, the Copyright Office and the Librarian of Congress have considered multiple petitions to permit circumvention of an access control mechanism protecting a given class of works that fails to permit access because of malfunction, damage, or obsoleteness.17 The Office has 14 Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 548 (6th Cir. 2004). 15 Copyright, Designs and Patents Act 1988, c. 48, § 296ZA (UK); see Nintendo Co. Ltd. v. Playables Ltd. [2010] EWHC 1932 (Ch) (Eng.) (construing related anti-trafficking provision). 16 See Staff of H. Comm. on the Judiciary, 105th Cong., Section-by-Section Analysis of H.R. 2281 as Passed by the United States House of Representatives on August 4th, 1998, at 6 (Comm. Print 1998). 17 See, e.g., Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 65 FR 64556, 64564– 66, 64574 (Oct. 27, 2000) (‘‘2000 Recommendation and Final Rule’’); Exemption to Prohibition on Circumvention of Copyright Protection Systems for E:\FR\FM\27SEN1.SGM Continued 27SEN1 66298 Federal Register / Vol. 81, No. 187 / Tuesday, September 27, 2016 / Notices recommended, and the Librarian has adopted, multiple exemptions after finding that the definition of ‘‘obsolete’’ in section 108 captures the circumstances under which such an exemption was justified, i.e., where the access control ‘‘is no longer manufactured or is no longer reasonably available in the commercial marketplace.’’ 18 The Office is interested in commenters’ views on whether Congress should consider a legislative amendment to permit circumvention of such faulty access controls, or whether there are other specific changes or additional provisions that Congress may wish to consider to address this issue. e. International Considerations. In addition to the questions on specific proposals provided above, please discuss the interaction of these proposals with existing international obligations of the United States, including free trade agreements. 2. Proposed Amendments to Existing Permanent Exemptions asabaliauskas on DSK3SPTVN1PROD with NOTICES Some parties expressed the view that the existing permanent exemptions for security testing, encryption research, and reverse engineering 19 do not adequately accommodate good-faith research into malfunctions, security flaws, and vulnerabilities in computer programs.20 The Office invites comment on whether legislation to address this concern may be warranted, and if so, on specific changes that should be considered. In particular, the Office Access Control Technologies, Final Rule, 68 FR 62011, 62013–16 (Oct. 31, 2003) (‘‘2003 Final Rule’’); Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68474–75, 68480 (Nov. 27, 2006) (‘‘2006 Final Rule’’); Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 75 FR 43825, 43833–34, 43839 (July 27, 2010) (‘‘2010 Final Rule’’); 2015 Final Rule, 80 FR at 65955, 65961. 18 17 U.S.C. 108(c); see, e.g., 2000 Recommendation and Final Rule, 65 FR at 64565– 66; Recommendation of the Register of Copyrights in RM 2002–4; Rulemaking on Exemptions from Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies 40 (Oct. 27, 2003); 2003 Final Rule, 68 FR at 62013– 14; Recommendation of the Register of Copyrights in RM 2005–11; Rulemaking on Exemptions from Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies 36 & n.105 (Nov. 17, 2006); 2006 Final Rule, 71 FR at 68475. 19 17 U.S.C. 1201(f), (g), (j). 20 Similarly, in the 2015 rulemaking, the Register noted that section 1201(j) ‘‘does not seem sufficiently robust in light of the perils of today’s connected world.’’ U.S. Copyright Office, Section 1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention 3 (2015), https://copyright.gov/1201/ 2015/registersrecommendation.pdf (‘‘2015 Recommendation’’). VerDate Sep<11>2014 17:08 Sep 26, 2016 Jkt 238001 requests commenters’ views on the following topics: a. In the 2015 rulemaking, the Register recommended, and the Librarian of Congress adopted, an exemption that permits circumvention of TPMs controlling access to computer programs in the following circumstances: (i) . . . the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law, including without limitation the Computer Fraud and Abuse Act of 1986, as amended and codified in title 18, United States Code; . . . and the device or machine is one of the following: (A) A device or machine primarily designed for use by individual consumers (including voting machines); (B) A motorized land vehicle; or (C) A medical device designed for whole or partial implantation in patients or a corresponding personal monitoring system, that is not and will not be used by patients or for patient care. (ii) For purposes of this exemption, ‘‘goodfaith security research’’ means accessing a computer program solely for purposes of good-faith testing, investigation and/or correction of a security flaw or vulnerability, where such activity is carried out in a controlled environment designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices or machines on which the computer program operates, or those who use such devices or machines, and is not used or maintained in a manner that facilitates copyright infringement.21 The Office is interested in commenters’ views on whether this language would be appropriate for adoption as a permanent exemption, or whether there are specific changes or additional provisions that Congress may wish to consider. b. The exemption for security testing under section 1201(j) is limited to activities undertaken ‘‘with the authorization of the owner or operator of [the] computer, computer system, or computer network.’’ 22 In the 2015 rulemaking, the Register noted that in some cases ‘‘it may be difficult to identify the relevant owner’’ for purposes of this requirement and that ‘‘it may not be feasible to obtain authorization even where there is an identifiable owner.’’ 23 Echoing those concerns, one group of commenters argued that the authorization requirement should be eliminated, while another urged Congress to provide 21 2015 Recommendation at 319–20; 2015 Final Rule, 80 FR at 65956. 22 17 U.S.C. 1201(j)(1). 23 2015 Recommendation at 309. PO 00000 Frm 00046 Fmt 4703 Sfmt 4703 greater clarity in situations involving multiple owners. Please assess whether legislation may be appropriate in this area and discuss any specific legislative proposals that you believe should be considered. c. Section 1201(j) provides a twofactor framework to determine whether a person qualifies for the security testing exemption.24 In the 2015 rulemaking, the Register noted that these factors ‘‘would appear to be of uncertain application to at least some’’ security research activities.25 Some commenters advocated the removal of one or both of these factors from the statute.26 Please assess the advisability of such changes, or discuss any other specific legislative proposals you believe should be considered. d. The exemption for encryption research in section 1201(g) is similarly limited to activities qualifying under a four-factor framework that includes making ‘‘a good faith effort to obtain authorization’’ before the circumvention.27 In the 2015 rulemaking, the Register noted that meeting these requirements ‘‘may not always be feasible’’ for researchers.28 Please assess whether legislation may be appropriate in this area and discuss any specific legislative proposals that you believe should be considered. e. Section 1201(f) permits circumvention for the ‘‘sole purpose’’ of identifying and analyzing elements of computer programs necessary to achieve interoperability.29 In the 2015 rulemaking, the Register noted that ‘‘section 1201(f)(1) is limited to circumvention solely for the identification and analysis of program elements necessary for interoperability, and does not address circumvention after that analysis has been performed.’’ 30 Please assess whether legislation may be appropriate in this area and discuss any specific legislative proposals that you believe should be considered. 3. Anti-Trafficking Provisions Commenters offered differing views regarding the role of the anti-trafficking provisions under sections 1201(a)(2) and 1201(b). User groups expressed 24 17 U.S.C. 1201(j)(3). Recommendation at 309. 26 The proposed Breaking Down Barriers to Innovation Act of 2015 would eliminate the twofactor framework, as well as the multifactor framework under section 1201(g)(3). H.R. 1883, 114th Cong. sec. 3(c)(3), 3(e)(2) (2015); S. 990, 114th Cong. sec. 3(c)(3), 3(e)(2) (2015). 27 17 U.S.C. 1201(g)(2)(C). 28 2015 Recommendation at 307. 29 17 U.S.C. 1201(f). 30 2015 Recommendation at 337 n.2295. 25 2015 E:\FR\FM\27SEN1.SGM 27SEN1 Federal Register / Vol. 81, No. 187 / Tuesday, September 27, 2016 / Notices concern that, to the extent these provisions prohibit third parties from providing assistance to beneficiaries of exemptions, or prohibit the making and distribution of necessary tools, they undermine beneficiaries’ practical ability to engage in the permitted conduct. Copyright owners, however, cautioned against amendment of the anti-trafficking provisions, arguing that because circumvention tools may be used for lawful and unlawful purposes alike, it would be impossible to ensure that tools manufactured and distributed pursuant to an exemption, once available in the marketplace, would be employed solely for authorized uses. The Office is interested in receiving additional views on this topic, and specifically invites comment on the following issues: a. A few parties argued that section 1201 contains an implied right permitting a beneficiary of a statutory or administrative exemption to make a tool for his or her own use in engaging in the permitted circumvention. What are commenters’ views regarding this interpretation of the statute? To what extent, if any, does the statutory prohibition on the ‘‘manufacture’’ of circumvention tools affect the analysis? 31 If such a right is not currently implied, or the question is uncertain, should Congress consider amending the statute to expressly permit such activity, while maintaining the prohibition against trafficking in such tools? b. Some parties suggested that, in certain circumstances, third-party assistance may fall outside the scope of the anti-trafficking provisions and therefore may be permissible under current law. What are commenters’ views regarding this interpretation of the statute? Are there forms of thirdparty assistance that do not qualify as a ‘‘service’’ within the meaning of sections 1201(a)(2) and 1201(b)(1)? If so, what considerations are relevant to this analysis? asabaliauskas on DSK3SPTVN1PROD with NOTICES Dated: September 21, 2016. Maria A. Pallante, Register of Copyrights, U.S. Copyright Office. [FR Doc. 2016–23167 Filed 9–26–16; 8:45 am] BILLING CODE 1410–30–P 31 See 17 U.S.C. 1201(a)(2), (b)(1). VerDate Sep<11>2014 17:08 Sep 26, 2016 Jkt 238001 NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (16–068)] NASA International Space Station Advisory Committee; Meeting National Aeronautics and Space Administration (NASA). ACTION: Notice of meeting. AGENCY: In accordance with the Federal Advisory Committee Act, Public Law 92–463, as amended, the National Aeronautics and Space Administration announces a meeting of the NASA International Space Station (ISS) Advisory Committee. The purpose of the meeting is to review all aspects related to the safety and operational readiness of the ISS, and to assess the possibilities for using the ISS for future space exploration. DATES: Monday, October 31, 2016, 2:00– 3:00 p.m., Local Time. ADDRESSES: NASA Headquarters, Glennan Conference Room (1Q39), 300 E Street SW., Washington, DC 20546. Note: 1Q39 is located on the first floor of NASA Headquarters. FOR FURTHER INFORMATION CONTACT: Mr. Patrick Finley, Office of International and Interagency Relations, (202) 358– 5684, NASA Headquarters, Washington, DC 20546–0001. SUPPLEMENTARY INFORMATION: This meeting will be open to the public up to the seating capacity of the room. This meeting is also accessible via teleconference. To participate telephonically, please contact Mr. Finley at (202) 358–5684 before 4:30 p.m., Local Time, October 26, 2016. You will need to provide your name, affiliation, and phone number. Attendees will be requested to sign a register and to comply with NASA security requirements, including the presentation of a valid picture ID to Security before access to NASA Headquarters. Due to the Real ID Act, Public Law 109–13, any attendees with driver’s licenses issued from noncompliant states/territories must present a second form of ID. [Federal employee badge; passport; active military identification card; enhanced driver’s license; U.S. Coast Guard Merchant Mariner card; Native American tribal document; school identification accompanied by an item from LIST C (documents that establish employment authorization) from the ‘‘List of the Acceptable Documents’’ on Form I–9]. Non-compliant states/territories are: American Samoa, Minnesota, Missouri, and Washington. Foreign nationals attending this meeting will be required SUMMARY: PO 00000 Frm 00047 Fmt 4703 Sfmt 4703 66299 to provide a copy of their passport and visa in addition to providing the following information no less than 10 working days prior to the meeting: Full name; gender; date/place of birth; citizenship; passport information (number, country, telephone); visa information (number, type, expiration date); employer/affiliation information (name of institution, address, country, telephone); title/position of attendee; and home address to Mr. Finley via email at patrick.t.finley@nasa.gov or by telephone at (202) 358–5684. U.S. citizens and Permanent Residents (Green Card holders) can provide full name and citizenship status 3 working days prior to the meeting to Mr. Finley. It is imperative that the meeting be held on this date to accommodate the scheduling priorities of the key participants. Patricia D. Rausch, Advisory Committee Management Officer, National Aeronautics and Space Administration. [FR Doc. 2016–23242 Filed 9–26–16; 8:45 am] BILLING CODE 7510–13–P NATIONAL SCIENCE FOUNDATION Agency Information Collection Activities: Comment Request National Science Foundation. Submission for OMB review; comment request. AGENCY: ACTION: The National Science Foundation (NSF) has submitted the following information collection requirement to OMB for review and clearance under the Paperwork Reduction Act of 1995, Public Law 104– 13. This is the second notice for public comment; the first was published in the Federal Register at 81 FR 36962, and no comments were received. NSF is forwarding the proposed renewal submission to the Office of Management and Budget (OMB) for clearance simultaneously with the publication of this second notice. The full submission (including comments) may be found at: https://www.reginfo.gov/public/do/ PRAMain. Comments regarding (a) whether the collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (b) the accuracy of the agency’s estimate of burden including the validity of the methodology and assumptions used; (c) ways to enhance the quality, utility and clarity of the information to be collected; (d) ways to minimize the burden of the collection of information on those who are to SUMMARY: E:\FR\FM\27SEN1.SGM 27SEN1

Agencies

[Federal Register Volume 81, Number 187 (Tuesday, September 27, 2016)]
[Notices]
[Pages 66296-66299]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-23167]


=======================================================================
-----------------------------------------------------------------------

LIBRARY OF CONGRESS

U.S. Copyright Office

[Docket No. 2015-8]


Section 1201 Study: Request for Additional Comments

AGENCY: U.S. Copyright Office, Library of Congress.

ACTION: Notice of Inquiry.

-----------------------------------------------------------------------

SUMMARY: The United States Copyright Office is requesting additional 
written comments in connection with its ongoing study on the operation 
of the statutory provisions regarding the circumvention of copyright 
protection systems. This request provides an opportunity for interested 
parties to address certain issues raised by various members of the 
public in response to the Office's initial Notice of Inquiry.

DATES: Written comments must be received no later than 11:59 p.m. 
Eastern Time on October 27, 2016. Written reply comments must be 
received no later than 11:59 p.m. Eastern Time on November 16, 2016.

ADDRESSES: The Copyright Office is using the regulations.gov system for 
the submission and posting of public comments in this proceeding. All 
comments are therefore to be submitted electronically through 
regulations.gov. Specific instructions for submitting comments are 
available on the Copyright Office Web site at https://copyright.gov/policy/1201/commentsubmission/. If electronic submission of comments is 
not feasible, please contact the Office using the contact information 
below for special instructions.

FOR FURTHER INFORMATION CONTACT: Kevin R. Amer, Senior Counsel for 
Policy and International Affairs, by email at kamer@loc.gov or by 
telephone at 202-707-8350; or Regan A. Smith, Associate General 
Counsel, by email at resm@loc.gov or by telephone at 202-707-8350.

SUPPLEMENTARY INFORMATION:

I. Background

    At the request of the Ranking Member of the House Committee on the 
Judiciary, the Copyright Office is conducting a study to assess the 
operation of section 1201 of title 17. In December 2015, the Office 
issued a Notice of Inquiry identifying several aspects of the statutory 
and regulatory framework that the Office believes are ripe for review, 
and inviting public comment on those and any other pertinent issues.\1\ 
The Notice provided for two rounds of written comments. In response, 
the Office received sixty-eight initial comments and sixteen reply 
comments.\2\ The Office then announced public roundtables on the topics 
addressed in the Notice and comments.\3\ These sessions, held in 
Washington, DC and San Francisco, California in May 2016, involved 
participation by more than thirty panelists, representing a wide range 
of interests and perspectives. Transcripts of the roundtables are 
available at https://copyright.gov/policy/1201/, and video recordings 
will be available at that location at a later date.
---------------------------------------------------------------------------

    \1\ Section 1201 Study: Notice and Request for Public Comment, 
80 FR 81369 (Dec. 29, 2015).
    \2\ All comments may be accessed from the Copyright Office Web 
site at https://copyright.gov/policy/1201/ by clicking the ``Public 
Comments'' tab, followed by the ``Comments'' link.
    \3\ Software-Enabled Consumer Products Study and Section 1201 
Study: Announcement of Public Roundtables, 81 FR 17206 (Mar. 28, 
2016).
---------------------------------------------------------------------------

    In the written comments and during the roundtables, parties 
expressed a variety of views regarding whether legislative amendments 
to section 1201 may be warranted. Among other suggested changes, 
commenters discussed proposals to update the statute's permanent 
exemption framework and to amend the anti-trafficking provisions to 
permit third-party assistance with lawful circumvention activities. At 
this time, as explained below, the Office is interested in receiving 
additional stakeholder input on particular aspects of those proposals. 
In addition, parties submitted numerous and varied views regarding the 
triennial rulemaking process under section 1201(a)(1)(C); while the 
Office continues to thoroughly evaluate these comments in conducting 
its study, this second Notice of Inquiry does not specifically address 
those issues.
    A party choosing to respond to this Notice of Inquiry need not 
address every topic below, but the Office requests that responding 
parties clearly identify and separately address those subjects for 
which a response is submitted. Parties also are invited to address any 
other pertinent issues that the Office should consider in conducting 
its study.

II. Subjects of Inquiry

1. Proposals for New Permanent Exemptions

    a. Assistive Technologies for Use by Persons Who Are Blind, 
Visually Impaired, or Print Disabled. The written comments and 
roundtable discussions revealed widespread support for adoption of a 
permanent exemption to facilitate access to works in electronic formats 
by persons who are blind, visually impaired, or print disabled. The 
Office invites comment regarding specific provisions that commenters 
believe should be included in legislation proposing such an exemption. 
For example, the exemption for this purpose granted in the 2015 
rulemaking permits circumvention of access controls applied to literary 
works distributed electronically, where the access controls ``either 
prevent the enabling of read-aloud functionality or interfere with 
screen readers or other applications or assistive technologies.'' \4\ 
The exemption applies in the following circumstances:
---------------------------------------------------------------------------

    \4\ Exemption to Prohibition on Circumvention of Copyright 
Protection Systems for Access Control Technologies, 80 FR 65944, 
65950 (Oct. 28, 2015) (``2015 Final Rule'').

    (i) When a copy of such a work is lawfully obtained by a blind 
or other person with a disability, as such a person is defined in 17 
U.S.C. 121; provided, however, that the rights owner is remunerated, 
as appropriate, for the price of the mainstream copy of the work as 
made available to the general public through customary channels, or
    (ii) When such work is a nondramatic literary work, lawfully 
obtained and used by an authorized entity pursuant to 17 U.S.C. 
121.\5\
---------------------------------------------------------------------------

    \5\ Id.

The Office is interested in commenters' views on whether this language 
would be appropriate for adoption as a permanent exemption, or whether 
there are specific changes or additional provisions that Congress may 
wish to consider.
    b. Device Unlocking. Some commenters advocated the adoption of a 
permanent exemption to permit circumvention of access controls on 
wireless devices for purposes of

[[Page 66297]]

``unlocking'' such devices--i.e., enabling them to connect to the 
network of a different mobile wireless carrier. Since 2006, the 
rulemaking process has involved consideration of exemptions permitting 
unlocking of cellphones, and in the 2015 rulemaking, pursuant to 
Congress's direction,\6\ the Register considered whether to extend the 
exemption to other categories of wireless devices. At the conclusion of 
the 2015 proceeding, the Librarian, upon the Register's recommendation, 
adopted an unlocking exemption that applies to used wireless devices of 
the following types:
---------------------------------------------------------------------------

    \6\ See Unlocking Consumer Choice and Wireless Competition Act, 
Public Law 113-144, sec. 2(b), 128 Stat. 1751, 1751 (2014).

    (A) Wireless telephone handsets (i.e., cellphones);
    (B) All-purpose tablet computers;
    (C) Portable mobile connectivity devices, such as mobile 
hotspots, removable wireless broadband modems, and similar devices; 
and
    (D) Wearable wireless devices designed to be worn on the body, 
such as smartwatches or fitness devices.\7\
---------------------------------------------------------------------------

    \7\ 2015 Final Rule, 80 FR at 65952.

    The Office invites comment on whether an unlocking exemption would 
be appropriate for adoption as a permanent exemption or whether such 
activities are more properly considered as part of the triennial 
rulemaking. For commenters who favor consideration of a permanent 
exemption, the Office is interested in commenters' views on whether the 
language of the 2015 unlocking exemption would be appropriate for 
adoption as a permanent exemption, or whether there are specific 
changes or additional provisions that Congress may wish to consider.
    c. Computer Programs. Several commenters expressed concern over the 
scope of section 1201 in the context of copyrighted computer programs 
that enable the operation of a machine or device. These commenters 
suggested that by prohibiting the circumvention of access controls on 
such programs, the statute prevents the public from engaging in 
legitimate activities, such as the repair of automobiles or the use of 
third-party device components, that seem far removed from the 
protection of creative expression that section 1201 was intended to 
address. To respond to this concern, some commenters argued that 
Congress should establish a statutory exemption that would permit 
circumvention of technological protection measures (``TPM''s) 
controlling access to such software in appropriate circumstances. The 
Office is interested in additional views on such proposals.
    For purposes of focusing the discussion, the Office invites comment 
on whether there are specific formulations of such an exemption that 
could serve as helpful starting points for further consideration of 
legislation. For example, Congress could consider adoption of a 
permanent exemption for purposes of diagnosis, maintenance, and repair. 
Such legislation could provide that a person who has lawfully obtained 
the right to use a computer program may circumvent a TPM controlling 
access to that program, so long as the circumvention is undertaken for 
purposes of diagnosis, maintenance, or repair. Are existing legal 
doctrines or statutes, such as the current language addressing machine 
maintenance and repair in section 117(c),\8\ the doctrine of repair and 
reconstruction in patent law,\9\ case law addressing refurbishment 
under trademark law,\10\ or ``right to repair'' bills introduced into 
various state legislatures,\11\ helpful to inform the appropriate scope 
of repair in this context? To what extent would the combination of such 
an exemption with the current language of 1201(f) \12\--which allows 
circumvention for purposes of facilitating interoperability under 
certain circumstances--adequately address users' concerns regarding 
section 1201's impact on consumer activities?
---------------------------------------------------------------------------

    \8\ 17 U.S.C. 117(c).
    \9\ See Aro Mfg. Co. v. Convertible Top Replacement Co., 365 
U.S. 336 (1961); see also Aro Mfg. Co. v. Convertible Top 
Replacement Co., 377 U.S. 476 (1964).
    \10\ See Champion Spark Plug Co. v. Sanders, 331 U.S. 125 
(1947); see also Karl Storz Endoscopy-America, Inc. v. Fiber Tech 
Med., Inc., 4 F. App'x 128, 131-32 (4th Cir. 2001) (``[T]he Lanham 
Act does not apply in the narrow category of cases where a 
trademarked product is repaired, rebuilt or modified at the request 
of the product's owner,'' so long as ``the owner is not, to the 
repairer's knowledge, merely obtaining modifications or repairs for 
purposes of resale.'').
    \11\ See, e.g., H.R. 3383, 189th Gen. Ct. (Mass. 2015); S. 
3998B, 2015 Leg., Reg. Sess. (N.Y. 2015); Assemb. 6068A, 2015 Leg., 
Reg. Sess. (N.Y. 2015); Legis. B. 1072, 104th Leg., 2d Sess. (Neb. 
2016); H.R. 1048, 89th Leg., Reg. Sess. (Minn. 2015); see also Mass. 
Gen. Laws ch. 93K (2013).
    \12\ 17 U.S.C. 1201(f).
---------------------------------------------------------------------------

    Please also comment upon whether it would be advisable to consider, 
in addition to diagnosis, maintenance, or repair, an exemption to 
explicitly permit circumvention for purposes of engaging in any lawful 
modification of a computer program. Such an exemption could allow 
circumventions undertaken to make non-infringing adaptations, 
including, for example, uses permitted under section 117(a) and/or the 
fair use doctrine.\13\ Please address whether this broader formulation 
would, or would not, be likely to result in economically harmful 
unauthorized uses of copyrighted works.
---------------------------------------------------------------------------

    \13\ See 17 U.S.C. 117(a), 107.
---------------------------------------------------------------------------

    With either formulation, would concerns over enabling unauthorized 
uses be mitigated by conditioning the exemption on the circumventing 
party not engaging in any unauthorized use of a copyrighted work other 
than the accessed computer program, or by limiting the exemption to 
computer programs that are ``not a conduit to protectable 
expression''--i.e., those that do ``not in turn create any protected 
expression'' when executed? \14\ In the United Kingdom, for example, 
the prohibition on circumvention specifically excludes TPMs applied to 
computer programs, but does apply in at least some circumstances where 
copyrighted content is generated by a computer program (e.g., graphical 
content in video games).\15\ The Office is particularly interested in 
any information or perspectives on the impact of the UK law and how 
operating under it contrasts or not with the U.S. experience. 
Alternatively, should the exemption be limited to computer programs in 
particular categories of devices?
---------------------------------------------------------------------------

    \14\ Lexmark Int'l, Inc. v. Static Control Components, Inc., 387 
F.3d 522, 548 (6th Cir. 2004).
    \15\ Copyright, Designs and Patents Act 1988, c. 48, Sec.  296ZA 
(UK); see Nintendo Co. Ltd. v. Playables Ltd. [2010] EWHC 1932 (Ch) 
(Eng.) (construing related anti-trafficking provision).
---------------------------------------------------------------------------

    The Office is interested in commenters' views on the advisability 
of these various approaches. Which of these models, if any, would 
facilitate users' ability to engage in permissible uses of software, 
while preserving congressional intent in supporting new ways of 
disseminating copyrighted materials to users? \16\ Responding parties 
are also encouraged to suggest alternate formulations, keeping in mind 
the Office's goal of focusing discussion on this topic.
---------------------------------------------------------------------------

    \16\ See Staff of H. Comm. on the Judiciary, 105th Cong., 
Section-by-Section Analysis of H.R. 2281 as Passed by the United 
States House of Representatives on August 4th, 1998, at 6 (Comm. 
Print 1998).
---------------------------------------------------------------------------

    d. Obsolete Technologies. In prior rulemakings, the Copyright 
Office and the Librarian of Congress have considered multiple petitions 
to permit circumvention of an access control mechanism protecting a 
given class of works that fails to permit access because of 
malfunction, damage, or obsoleteness.\17\ The Office has

[[Page 66298]]

recommended, and the Librarian has adopted, multiple exemptions after 
finding that the definition of ``obsolete'' in section 108 captures the 
circumstances under which such an exemption was justified, i.e., where 
the access control ``is no longer manufactured or is no longer 
reasonably available in the commercial marketplace.'' \18\ The Office 
is interested in commenters' views on whether Congress should consider 
a legislative amendment to permit circumvention of such faulty access 
controls, or whether there are other specific changes or additional 
provisions that Congress may wish to consider to address this issue.
---------------------------------------------------------------------------

    \17\ See, e.g., Exemption to Prohibition on Circumvention of 
Copyright Protection Systems for Access Control Technologies, 65 FR 
64556, 64564-66, 64574 (Oct. 27, 2000) (``2000 Recommendation and 
Final Rule''); Exemption to Prohibition on Circumvention of 
Copyright Protection Systems for Access Control Technologies, Final 
Rule, 68 FR 62011, 62013-16 (Oct. 31, 2003) (``2003 Final Rule''); 
Exemption to Prohibition on Circumvention of Copyright Protection 
Systems for Access Control Technologies, 71 FR 68472, 68474-75, 
68480 (Nov. 27, 2006) (``2006 Final Rule''); Exemption to 
Prohibition on Circumvention of Copyright Protection Systems for 
Access Control Technologies, 75 FR 43825, 43833-34, 43839 (July 27, 
2010) (``2010 Final Rule''); 2015 Final Rule, 80 FR at 65955, 65961.
    \18\ 17 U.S.C. 108(c); see, e.g., 2000 Recommendation and Final 
Rule, 65 FR at 64565-66; Recommendation of the Register of 
Copyrights in RM 2002-4; Rulemaking on Exemptions from Prohibition 
on Circumvention of Copyright Protection Systems for Access Control 
Technologies 40 (Oct. 27, 2003); 2003 Final Rule, 68 FR at 62013-14; 
Recommendation of the Register of Copyrights in RM 2005-11; 
Rulemaking on Exemptions from Prohibition on Circumvention of 
Copyright Protection Systems for Access Control Technologies 36 & 
n.105 (Nov. 17, 2006); 2006 Final Rule, 71 FR at 68475.
---------------------------------------------------------------------------

    e. International Considerations. In addition to the questions on 
specific proposals provided above, please discuss the interaction of 
these proposals with existing international obligations of the United 
States, including free trade agreements.

2. Proposed Amendments to Existing Permanent Exemptions

    Some parties expressed the view that the existing permanent 
exemptions for security testing, encryption research, and reverse 
engineering \19\ do not adequately accommodate good-faith research into 
malfunctions, security flaws, and vulnerabilities in computer 
programs.\20\ The Office invites comment on whether legislation to 
address this concern may be warranted, and if so, on specific changes 
that should be considered. In particular, the Office requests 
commenters' views on the following topics:
---------------------------------------------------------------------------

    \19\ 17 U.S.C. 1201(f), (g), (j).
    \20\ Similarly, in the 2015 rulemaking, the Register noted that 
section 1201(j) ``does not seem sufficiently robust in light of the 
perils of today's connected world.'' U.S. Copyright Office, Section 
1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions 
to the Prohibition on Circumvention 3 (2015), https://copyright.gov/1201/2015/registersrecommendation.pdf (``2015 Recommendation'').
---------------------------------------------------------------------------

    a. In the 2015 rulemaking, the Register recommended, and the 
Librarian of Congress adopted, an exemption that permits circumvention 
of TPMs controlling access to computer programs in the following 
circumstances:

    (i) . . . the circumvention is undertaken on a lawfully acquired 
device or machine on which the computer program operates solely for 
the purpose of good-faith security research and does not violate any 
applicable law, including without limitation the Computer Fraud and 
Abuse Act of 1986, as amended and codified in title 18, United 
States Code; . . . and the device or machine is one of the 
following:
    (A) A device or machine primarily designed for use by individual 
consumers (including voting machines);
    (B) A motorized land vehicle; or
    (C) A medical device designed for whole or partial implantation 
in patients or a corresponding personal monitoring system, that is 
not and will not be used by patients or for patient care.
    (ii) For purposes of this exemption, ``good-faith security 
research'' means accessing a computer program solely for purposes of 
good-faith testing, investigation and/or correction of a security 
flaw or vulnerability, where such activity is carried out in a 
controlled environment designed to avoid any harm to individuals or 
the public, and where the information derived from the activity is 
used primarily to promote the security or safety of the class of 
devices or machines on which the computer program operates, or those 
who use such devices or machines, and is not used or maintained in a 
manner that facilitates copyright infringement.\21\
---------------------------------------------------------------------------

    \21\ 2015 Recommendation at 319-20; 2015 Final Rule, 80 FR at 
65956.

    The Office is interested in commenters' views on whether this 
language would be appropriate for adoption as a permanent exemption, or 
whether there are specific changes or additional provisions that 
Congress may wish to consider.
    b. The exemption for security testing under section 1201(j) is 
limited to activities undertaken ``with the authorization of the owner 
or operator of [the] computer, computer system, or computer network.'' 
\22\ In the 2015 rulemaking, the Register noted that in some cases ``it 
may be difficult to identify the relevant owner'' for purposes of this 
requirement and that ``it may not be feasible to obtain authorization 
even where there is an identifiable owner.'' \23\ Echoing those 
concerns, one group of commenters argued that the authorization 
requirement should be eliminated, while another urged Congress to 
provide greater clarity in situations involving multiple owners. Please 
assess whether legislation may be appropriate in this area and discuss 
any specific legislative proposals that you believe should be 
considered.
---------------------------------------------------------------------------

    \22\ 17 U.S.C. 1201(j)(1).
    \23\ 2015 Recommendation at 309.
---------------------------------------------------------------------------

    c. Section 1201(j) provides a two-factor framework to determine 
whether a person qualifies for the security testing exemption.\24\ In 
the 2015 rulemaking, the Register noted that these factors ``would 
appear to be of uncertain application to at least some'' security 
research activities.\25\ Some commenters advocated the removal of one 
or both of these factors from the statute.\26\ Please assess the 
advisability of such changes, or discuss any other specific legislative 
proposals you believe should be considered.
---------------------------------------------------------------------------

    \24\ 17 U.S.C. 1201(j)(3).
    \25\ 2015 Recommendation at 309.
    \26\ The proposed Breaking Down Barriers to Innovation Act of 
2015 would eliminate the two-factor framework, as well as the 
multifactor framework under section 1201(g)(3). H.R. 1883, 114th 
Cong. sec. 3(c)(3), 3(e)(2) (2015); S. 990, 114th Cong. sec. 
3(c)(3), 3(e)(2) (2015).
---------------------------------------------------------------------------

    d. The exemption for encryption research in section 1201(g) is 
similarly limited to activities qualifying under a four-factor 
framework that includes making ``a good faith effort to obtain 
authorization'' before the circumvention.\27\ In the 2015 rulemaking, 
the Register noted that meeting these requirements ``may not always be 
feasible'' for researchers.\28\ Please assess whether legislation may 
be appropriate in this area and discuss any specific legislative 
proposals that you believe should be considered.
---------------------------------------------------------------------------

    \27\ 17 U.S.C. 1201(g)(2)(C).
    \28\ 2015 Recommendation at 307.
---------------------------------------------------------------------------

    e. Section 1201(f) permits circumvention for the ``sole purpose'' 
of identifying and analyzing elements of computer programs necessary to 
achieve interoperability.\29\ In the 2015 rulemaking, the Register 
noted that ``section 1201(f)(1) is limited to circumvention solely for 
the identification and analysis of program elements necessary for 
interoperability, and does not address circumvention after that 
analysis has been performed.'' \30\ Please assess whether legislation 
may be appropriate in this area and discuss any specific legislative 
proposals that you believe should be considered.
---------------------------------------------------------------------------

    \29\ 17 U.S.C. 1201(f).
    \30\ 2015 Recommendation at 337 n.2295.
---------------------------------------------------------------------------

3. Anti-Trafficking Provisions

    Commenters offered differing views regarding the role of the anti-
trafficking provisions under sections 1201(a)(2) and 1201(b). User 
groups expressed

[[Page 66299]]

concern that, to the extent these provisions prohibit third parties 
from providing assistance to beneficiaries of exemptions, or prohibit 
the making and distribution of necessary tools, they undermine 
beneficiaries' practical ability to engage in the permitted conduct. 
Copyright owners, however, cautioned against amendment of the anti-
trafficking provisions, arguing that because circumvention tools may be 
used for lawful and unlawful purposes alike, it would be impossible to 
ensure that tools manufactured and distributed pursuant to an 
exemption, once available in the marketplace, would be employed solely 
for authorized uses. The Office is interested in receiving additional 
views on this topic, and specifically invites comment on the following 
issues:
    a. A few parties argued that section 1201 contains an implied right 
permitting a beneficiary of a statutory or administrative exemption to 
make a tool for his or her own use in engaging in the permitted 
circumvention. What are commenters' views regarding this interpretation 
of the statute? To what extent, if any, does the statutory prohibition 
on the ``manufacture'' of circumvention tools affect the analysis? \31\ 
If such a right is not currently implied, or the question is uncertain, 
should Congress consider amending the statute to expressly permit such 
activity, while maintaining the prohibition against trafficking in such 
tools?
---------------------------------------------------------------------------

    \31\ See 17 U.S.C. 1201(a)(2), (b)(1).
---------------------------------------------------------------------------

    b. Some parties suggested that, in certain circumstances, third-
party assistance may fall outside the scope of the anti-trafficking 
provisions and therefore may be permissible under current law. What are 
commenters' views regarding this interpretation of the statute? Are 
there forms of third-party assistance that do not qualify as a 
``service'' within the meaning of sections 1201(a)(2) and 1201(b)(1)? 
If so, what considerations are relevant to this analysis?

    Dated: September 21, 2016.
Maria A. Pallante,
Register of Copyrights, U.S. Copyright Office.
[FR Doc. 2016-23167 Filed 9-26-16; 8:45 am]
 BILLING CODE 1410-30-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.