ABSTRACT
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond the restrictions provided by copyright laws. In this paper we argue that DRM does not actually implement the fundamentals of copyright law, and is rather a mechanism for enforcing licence and contract restrictions on digital data. However, we believe that DRM does have a place in the digital distribution of copyrighted works and present two mechanisms that would allow users to get a more balanced deal from the rights holders. The mechanisms we present also allow for newer business models that cannot be easily implemented with current DRM systems.
- Copyright act 98 of 1978. 2000 ed., vol. 2 of Statutes of South Africa. Juta, 2001, pp. 2--214--2--234. As ammended by (acts/year): 56/1980, 66/1983, 52/1984, 39/1986, 13/1988, 61/1989, 125/1992, 38/1997, 9/2002.Google Scholar
- Directive 2001/29/EC Of the European Parliament and Of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society. Online, 2001. Also known as the "European Copyright Directive".Google Scholar
- DRM From the Viewpoint of the Electronic Industry. Slashdot (2003). URL: http://slashdot.org/article.pl?sid=03/11/25/1821218.Google Scholar
- Linux and DRM? Slashdot (2004). URL: http://ask.slashdot.org/article.pl? sid=04/02/10/2329229&mode=thread.Google Scholar
- Give and yea shall receive -- The Bittorrent Revolution. SA Computer Magazine 12, 10 (February 2005), 38 -- 43.Google Scholar
- Arnab, A., and Hutchison, A. Extending ODRL and XrML to enable Bi-directional communication. Departmental Technical Report, No. CS04-28-00, University of Cape Town, 2004.Google Scholar
- Arnab, A., and Hutchison, A. Security Considerations for an Idealised DRM Framework. In Proceedings of the South African Telecomunication Networks and Applications (SATNAC) Conference 2004/ (2004).Google Scholar
- Arnab, A., and Hutchison, A. Extending ODRL to Enable Bi-Directional Communication. In Proceedings of the 2nd International ODRL Workshop, Lisbon, Portugal (2005).Google Scholar
- Bechtold, S. Reconciling DRM Technology with Copyright Limitations. IVir, Buma/Stemra - Copyright and the Music Industry: Digital Dilemmas.Google Scholar
- Cohen, J. DRM and Privacy. Communications of the ACM 46, 4 (2003), 47--49. Google ScholarDigital Library
- Dusollier, S. Fair Use By Design in the European Copyright Directive of 2001. Communications of the ACM 46, 4 (2003), 51--55. Google ScholarDigital Library
- Erickson, J. Fair Use, DRM and Trusted Computing. Communications of the ACM 46, 4 (2003), 34--39. Google ScholarDigital Library
- Felten, E. Skeptical view of DRM and Fair Use. Communications of the ACM 46, 4 (2003), 57--59. Google ScholarDigital Library
- Harper, G. Will we need fair use in the twenty-first century? Copyright Crash Course, University of Texas (2004). URL: http://www.utsystem.edu/OGC/IntellectualProperty/fair_use.htm.Google Scholar
- Jamkhedkar, P. A., and Heileman, G. L. DRM as a Layered System. In Proceedings of the Fourth ACM Workshop on Digital Rights Management (2004), A. Kiayias and M. Yung, Eds., ACM, pp. 11 -- 21. Google ScholarDigital Library
- Masango, C. Digital license agreements and its effects on academic library users. In LIASA Acquisitions Interest Group (LACIG) - Third Southern African Library Acquisitions Conference/ (2004).Google Scholar
- Microsoft. Microsoft windows media data session toolkit, 2003.Google Scholar
- Mulligan, D., and Burstein, A. Implementing Copyright Limitations in Right Expression Languages. In Proceedings of the 2002 ACM workshop on Digital Rights Management (2002), ACM.Google Scholar
- Mulligan, D., Han, J., and Burstein, A. How DRM Based Content Delivery Systems Disrupt Expectations of "Personal Use". In Proceedings of the 2003 ACM workshop on Digital Rights Management (2003), ACM, pp. 77--89. URL: http://doi.acm.org/10.1145/947380.947391. Google ScholarDigital Library
- Park, J., Sandhu, R., and Schifalacqua, J. Security architectures for controlled digital information dissemination. In Proceedings of the 16th Annual Computer Security Applications Conference (2000). Google ScholarDigital Library
- Rosenblatt, B. DRM for the Enterprise, 2004.Google Scholar
- Samuelson, P. DRM AND, OR, VS. The Law. Communications of the ACM 46, 4 (2003), 41--45. Google ScholarDigital Library
- Stallings, W. Network Security Essentials -- Applications and Standards, international second ed. Prentice Hall, 2003. Google ScholarDigital Library
Index Terms
- Fairer usage contracts for DRM
Recommendations
Lessons in Copyright Activism: K-12 Education and the DMCA 1201 Exemption Rulemaking Process
Digital learning is being transformed by changes in copyright law. This article discusses the author's personal journey as a copyright education activist through two rounds of rulemaking proceedings before the Copyright Office concerning the anti-...
DRM: doesn't really mean digital copyright management
CCS '02: Proceedings of the 9th ACM conference on Computer and communications securityCopyright is a legal system embedded in a larger technological system. In order to examine the functions of copyright it is critical to examine the larger technological context of copyright: analog media and printed paper in particular. The copyright ...
A New Rights Processing Method for DRM Systems
CAR '09: Proceedings of the 2009 International Asia Conference on Informatics in Control, Automation and RoboticsThere are many solutions and standards about digital rights management(DRM) now. Almost all the solutions used cryptography and rights processing technologies to protect contents. Only legal users can decrypt and enjoy contents under the control of ...
Comments