FREE BOOKS

Author's List




PREV.   NEXT  
|<   226   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250  
251   252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   >>   >|  
rk is not reasonably available in another form. (3) A nonprofit library, archives, or educational institution that willfully for the purpose of commercial advantage or financial gain violates paragraph (1)- (A) shall, for the first offense, be subject to the civil remedies under section 1203; and (B) shall, for repeated or subsequent offenses, in addition to the civil remedies under section 1203, forfeit the exemption provided under paragraph (1). (4) This subsection may not be used as a defense to a claim under subsection (a)(2) or (b), nor may this subsection permit a nonprofit library, archives, or educational institution to manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, component, or part thereof, which circumvents a technological measure. (5) In order for a library or archives to qualify for the exemption under this subsection, the collections of that library or archives shall be- (A) open to the public; or (B) available not only to researchers affiliated with the library or archives or with the institution of which it is a part, but also to other persons doing research in a specialized field. (e) Law Enforcement, Intelligence, and Other Government Activities. This section does not prohibit any lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee of the United States, a State, or a political subdivision of a State, or a person acting pursuant to a contract with the United States, a State, or a political subdivision of a State. For purposes of this subsection, the term "information security" means activities carried out in order to identify and address the vulnerabilities of a government computer, computer system, or computer network. (f) Reverse Engineering. (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not
PREV.   NEXT  
|<   226   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250  
251   252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   >>   >|  



Top keywords:

subsection

 

computer

 
archives
 

library

 

program

 

person

 

section

 
institution
 

exemption

 

technological


measure

 

public

 

remedies

 
States
 
political
 

purpose

 

United

 
nonprofit
 

lawfully

 

educational


subdivision
 

paragraph

 
security
 

information

 

system

 

government

 

officer

 

network

 

Reverse

 
employee

acting

 

purposes

 

pursuant

 
contract
 

activities

 
identify
 
address
 

Engineering

 

carried

 
vulnerabilities

programs

 
previously
 
created
 

independently

 

achieve

 

interoperability

 

readily

 
identification
 
analysis
 

engaging