FREE BOOKS

Author's List




PREV.   NEXT  
|<   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253  
254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   278   >>   >|  
n of copyright owners against the unauthorized access to their encrypted copyrighted works. The report shall include legislative recommendations, if any. (h) Exceptions Regarding Minors. In applying subsection (a) to a component or part, the court may consider the necessity for its intended and actual incorporation in a technology, product, service, or device, which- (1) does not itself violate the provisions of this title; and (2) has the sole purpose to prevent the access of minors to material on the Internet. (i) Protection of Personally Identifying Information. (1) Circumvention Permitted. Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to circumvent a technological measure that effectively controls access to a work protected under this title, if- (A) the technological measure, or the work it protects, contains the capability of collecting or disseminating personally identifying information reflecting the online activities of a natural person who seeks to gain access to the work protected; (B) in the normal course of its operation, the technological measure, or the work it protects, collects or disseminates personally identifying information about the person who seeks to gain access to the work protected, without providing conspicuous notice of such collection or dissemination to such person, and without providing such person with the capability to prevent or restrict such collection or dissemination; (C) the act of circumvention has the sole effect of identifying and disabling the capability described in subparagraph (A), and has no other effect on the ability of any person to gain access to any work; and (D) the act of circumvention is carried out solely for the purpose of preventing the collection or dissemination of personally identifying information about a natural person who seeks to gain access to the work protected, and is not in violation of any other law. (2) Inapplicability to Certain Technological Measures. This subsection does not apply to a technological measure, or a work it protects, that does not collect or disseminate personally identifying information and that is disclosed to a user as not having or using such capability. (j) Security Testing. (1) Definition. For purposes of this subsection, the term "security testing" means accessing a computer, computer system, or computer network, solely for the purp
PREV.   NEXT  
|<   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253  
254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   278   >>   >|  



Top keywords:

person

 

access

 
subsection
 

identifying

 

technological

 

personally

 

information

 
capability
 

measure

 

protected


collection

 

dissemination

 

protects

 
computer
 
provisions
 

effect

 

purpose

 
prevent
 

providing

 

circumvention


natural
 

solely

 
violation
 

conspicuous

 

Testing

 

notice

 

Definition

 

Security

 

security

 
operation

system

 

network

 

collects

 
accessing
 

testing

 
disseminates
 
purposes
 

carried

 

ability

 
normal

Inapplicability

 
Technological
 
Measures
 

preventing

 

collect

 

restrict

 

Certain

 
disabling
 
disseminate
 

disclosed