On Tue, 29 May 2001, Declan McCullagh wrote:
>>Of course. But the question is still interesting when making the copy falls
>>under fair use. Does DMCA protection somehow propagate to the decrypted
>>data?
>
>I don't see why it would. This really isn't a question that we need to
>speculate about; you should just read the text of the DMCA. Again, it seems
>to me that "traditional, boring" pre-DMCA copyright law would apply.
How about contributory involvement? Or something from �1202
(http://www.loc.gov/copyright/legislation/hr2281.pdf), like �1202(a)(2),
�1202(b)(2) or �1202(b)(3):
<quote>
� 1202. Integrity of copyright management information
(a) FALSE COPYRIGHT MANAGEMENT INFORMATION.
No person shall knowingly and with the intent to induce, enable,
facilitate, or conceal infringement --
(1) provide copyright management information that is false, or
(2) distribute or import for distribution copyright management
information that is false.
(b) REMOVAL OR ALTERATION OF COPYRIGHT MANAGEMENT INFORMATION.
No person shall, without the authority of the copyright owner or the law
(1) intentionally remove or alter any copyright management information,
(2) distribute or import for distribution copyright management information
knowing that the copyright management information has been removed or
altered without authority of the copyright owner or the law, or
(3) distribute, import for distribution, or publicly perform works, copies
of works, or phonorecords, knowing that copyright management
information has been removed or altered without authority of the
copyright owner or the law,
</quote>
The definition of copyright management information includes, among other
stuff:
<quote>
(6) Terms and conditions for use of the work.
(7) Identifying numbers or symbols referring to such information or links
to such information.
</quote>
which most likely covers permission bits etc. that are used by a protection
scheme.
Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front