Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, Circular 92 eBook

This eBook from the Gutenberg Project consists of approximately 350 pages of information about Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, Circular 92.

Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, Circular 92 eBook

This eBook from the Gutenberg Project consists of approximately 350 pages of information about Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, Circular 92.

(4) For purposes of this subsection, the term “interoperability” means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.

(g) Encryption Research.

(1) Definitions.  For purposes of this subsection-

(A) the term “encryption research” means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products; and

(B) the term “encryption technology” means the scrambling and descrambling of information using mathematical formulas or algorithms.

(2) Permissible Acts of Encryption Research.  Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to circumvent a technological measure as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research if-

(A) the person lawfully obtained the encrypted copy, phonorecord, performance, or display of the published work;

(B) such act is necessary to conduct such encryption research;

(C) the person made a good faith effort to obtain authorization before the circumvention; and

(D) such act does not constitute infringement under this title or a violation of applicable law other than this section, including section 1030 of title 18 and those provisions of title 18 amended by the Computer Fraud and Abuse Act of 1986.

(3) Factors in Determining Exemption.  In determining whether a person qualifies for the exemption under paragraph (2), the factors to be considered shall include-

(A) whether the information derived from the encryption research was disseminated, and if so, whether it was disseminated in a manner reasonably calculated to advance the state of knowledge or development of encryption technology, versus whether it was disseminated in a manner that facilitates infringement under this title or a violation of applicable law other than this section, including a violation of privacy or breach of security;

(B) whether the person is engaged in a legitimate course of study, is employed, or is appropriately trained or experienced, in the field of encryption technology; and

(C) whether the person provides the copyright owner of the work to which the technological measure is applied with notice of the findings and documentation of the research, and the time when such notice is provided.

(4) Use of Technological Means for Research Activities.  Notwithstanding the provisions of subsection (a)(2), it is not a violation of that subsection for a person to-

(A) develop and employ technological means to circumvent a technological measure for the sole purpose of that person performing the acts of good faith encryption research described in paragraph (2); and

Copyrights
Project Gutenberg
Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, Circular 92 from Project Gutenberg. Public domain.