skip to main content
10.1145/1102546.1102548acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Fairer usage contracts for DRM

Published:07 November 2005Publication History

ABSTRACT

DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond the restrictions provided by copyright laws. In this paper we argue that DRM does not actually implement the fundamentals of copyright law, and is rather a mechanism for enforcing licence and contract restrictions on digital data. However, we believe that DRM does have a place in the digital distribution of copyrighted works and present two mechanisms that would allow users to get a more balanced deal from the rights holders. The mechanisms we present also allow for newer business models that cannot be easily implemented with current DRM systems.

References

  1. Copyright act 98 of 1978. 2000 ed., vol. 2 of Statutes of South Africa. Juta, 2001, pp. 2--214--2--234. As ammended by (acts/year): 56/1980, 66/1983, 52/1984, 39/1986, 13/1988, 61/1989, 125/1992, 38/1997, 9/2002.Google ScholarGoogle Scholar
  2. Directive 2001/29/EC Of the European Parliament and Of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society. Online, 2001. Also known as the "European Copyright Directive".Google ScholarGoogle Scholar
  3. DRM From the Viewpoint of the Electronic Industry. Slashdot (2003). URL: http://slashdot.org/article.pl?sid=03/11/25/1821218.Google ScholarGoogle Scholar
  4. Linux and DRM? Slashdot (2004). URL: http://ask.slashdot.org/article.pl? sid=04/02/10/2329229&mode=thread.Google ScholarGoogle Scholar
  5. Give and yea shall receive -- The Bittorrent Revolution. SA Computer Magazine 12, 10 (February 2005), 38 -- 43.Google ScholarGoogle Scholar
  6. Arnab, A., and Hutchison, A. Extending ODRL and XrML to enable Bi-directional communication. Departmental Technical Report, No. CS04-28-00, University of Cape Town, 2004.Google ScholarGoogle Scholar
  7. Arnab, A., and Hutchison, A. Security Considerations for an Idealised DRM Framework. In Proceedings of the South African Telecomunication Networks and Applications (SATNAC) Conference 2004/ (2004).Google ScholarGoogle Scholar
  8. Arnab, A., and Hutchison, A. Extending ODRL to Enable Bi-Directional Communication. In Proceedings of the 2nd International ODRL Workshop, Lisbon, Portugal (2005).Google ScholarGoogle Scholar
  9. Bechtold, S. Reconciling DRM Technology with Copyright Limitations. IVir, Buma/Stemra - Copyright and the Music Industry: Digital Dilemmas.Google ScholarGoogle Scholar
  10. Cohen, J. DRM and Privacy. Communications of the ACM 46, 4 (2003), 47--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dusollier, S. Fair Use By Design in the European Copyright Directive of 2001. Communications of the ACM 46, 4 (2003), 51--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Erickson, J. Fair Use, DRM and Trusted Computing. Communications of the ACM 46, 4 (2003), 34--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Felten, E. Skeptical view of DRM and Fair Use. Communications of the ACM 46, 4 (2003), 57--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Harper, G. Will we need fair use in the twenty-first century? Copyright Crash Course, University of Texas (2004). URL: http://www.utsystem.edu/OGC/IntellectualProperty/fair_use.htm.Google ScholarGoogle Scholar
  15. Jamkhedkar, P. A., and Heileman, G. L. DRM as a Layered System. In Proceedings of the Fourth ACM Workshop on Digital Rights Management (2004), A. Kiayias and M. Yung, Eds., ACM, pp. 11 -- 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Masango, C. Digital license agreements and its effects on academic library users. In LIASA Acquisitions Interest Group (LACIG) - Third Southern African Library Acquisitions Conference/ (2004).Google ScholarGoogle Scholar
  17. Microsoft. Microsoft windows media data session toolkit, 2003.Google ScholarGoogle Scholar
  18. Mulligan, D., and Burstein, A. Implementing Copyright Limitations in Right Expression Languages. In Proceedings of the 2002 ACM workshop on Digital Rights Management (2002), ACM.Google ScholarGoogle Scholar
  19. Mulligan, D., Han, J., and Burstein, A. How DRM Based Content Delivery Systems Disrupt Expectations of "Personal Use". In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 77--89. URL: http://doi.acm.org/10.1145/947380.947391. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Park, J., Sandhu, R., and Schifalacqua, J. Security architectures for controlled digital information dissemination. In Proceedings of the 16th Annual Computer Security Applications Conference (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rosenblatt, B. DRM for the Enterprise, 2004.Google ScholarGoogle Scholar
  22. Samuelson, P. DRM AND, OR, VS. The Law. Communications of the ACM 46, 4 (2003), 41--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Stallings, W. Network Security Essentials -- Applications and Standards, international second ed. Prentice Hall, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fairer usage contracts for DRM

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DRM '05: Proceedings of the 5th ACM workshop on Digital rights management
        November 2005
        126 pages
        ISBN:1595932305
        DOI:10.1145/1102546

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader