FREE BOOKS

Author's List




PREV.   NEXT  
|<   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252  
253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   >>   >|  
circumvention; and (D) such act does not constitute infringement under this title or a violation of applicable law other than this section, including section 1030 of title 18 and those provisions of title 18 amended by the Computer Fraud and Abuse Act of 1986. (3) Factors in Determining Exemption. In determining whether a person qualifies for the exemption under paragraph (2), the factors to be considered shall include- (A) whether the information derived from the encryption research was disseminated, and if so, whether it was disseminated in a manner reasonably calculated to advance the state of knowledge or development of encryption technology, versus whether it was disseminated in a manner that facilitates infringement under this title or a violation of applicable law other than this section, including a violation of privacy or breach of security; (B) whether the person is engaged in a legitimate course of study, is employed, or is appropriately trained or experienced, in the field of encryption technology; and (C) whether the person provides the copyright owner of the work to which the technological measure is applied with notice of the findings and documentation of the research, and the time when such notice is provided. (4) Use of Technological Means for Research Activities. Notwithstanding the provisions of subsection (a)(2), it is not a violation of that subsection for a person to- (A) develop and employ technological means to circumvent a technological measure for the sole purpose of that person performing the acts of good faith encryption research described in paragraph (2); and (B) provide the technological means to another person with whom he or she is working collaboratively for the purpose of conducting the acts of good faith encryption research described in paragraph (2) or for the purpose of having that other person verify his or her acts of good faith encryption research described in paragraph (2). (5) Report to Congress. Not later than 1 year after the date of the enactment of this chapter, the Register of Copyrights and the Assistant Secretary for Communications and Information of the Department of Commerce shall jointly report to the Congress on the effect this subsection has had on- (A) encryption research and the development of encryption technology; (B) the adequacy and effectiveness of technological measures designed to protect copyrighted works; and (C) protectio
PREV.   NEXT  
|<   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252  
253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   >>   >|  



Top keywords:

encryption

 

person

 
research
 

technological

 

paragraph

 

violation

 

technology

 
disseminated
 

section

 

purpose


subsection

 

notice

 

measure

 
development
 
manner
 

Congress

 

including

 
applicable
 

infringement

 

provisions


effectiveness
 

performing

 
provide
 

measures

 

Notwithstanding

 

protectio

 

Activities

 

Research

 

Technological

 
develop

circumvent

 

working

 

employ

 
protect
 

copyrighted

 
designed
 
conducting
 

Information

 

Department

 
Assistant

Register

 
Secretary
 
chapter
 

enactment

 

Communications

 

Commerce

 

jointly

 
verify
 
adequacy
 

Copyrights