FREE BOOKS

Author's List




PREV.   NEXT  
|<   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251  
252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   >>   >|  
constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term "interoperability" means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged. (g) Encryption Research. (1) Definitions. For purposes of this subsection- (A) the term "encryption research" means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products; and (B) the term "encryption technology" means the scrambling and descrambling of information using mathematical formulas or algorithms. (2) Permissible Acts of Encryption Research. Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to circumvent a technological measure as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research if- (A) the person lawfully obtained the encrypted copy, phonorecord, performance, or display of the published work; (B) such act is necessary to conduct such encryption research; (C) the person made a good faith effort to obtain authorization before the
PREV.   NEXT  
|<   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251  
252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   >>   >|  



Top keywords:

encryption

 

information

 

person

 

interoperability

 

technological

 

subsection

 

programs

 
paragraph
 

computer

 

research


circumvent

 

measure

 
infringement
 
constitute
 
published
 
activities
 

performance

 

display

 

permitted

 

Research


purposes

 

technology

 

phonorecord

 
Encryption
 

purpose

 
enabling
 
independently
 

Notwithstanding

 

provisions

 

created


extent

 

program

 

applied

 
effort
 

obtain

 

knowledge

 
advance
 

conducted

 

assist

 
authorization

copyrighted
 

scrambling

 

algorithms

 

formulas

 

Permissible

 

violation

 

mathematical

 

conduct

 

products

 

encrypted