skip to main content
10.1145/3313831.3376745acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Lawful Users: Copyright Circumvention and Legal Constraints on Technology Use

Published:23 April 2020Publication History

ABSTRACT

The study of human-computer interaction requires consideration of aspects of interactions with technology that may be outside of the control of both user and designer. One example of when a user's question of "can I do this?" may have an answer beyond technological affordances is that of legal constraints. This paper considers an example of this phenomenon: section 1201 of the Digital Millennium Copyright Act (DMCA) in the United States, which criminalizes circumventing copyright protection such as digital rights management (DRM). The DMCA also includes a triennial policymaking process that considers exemptions to the law to protect "lawful users" from adverse effects. Through an analysis of public comments of support for exemptions, this paper explores the ways in which users see the law as a hindrance to desired uses of technology. This analysis sheds light on users' expectations for rights of use, how these expectations clash with policy, and what this might mean for technology designers. Drawing lessons from the infrastructure problem in HCI, this paper concludes with laying out solutions that can both work within policy constraints, and more importantly, work to change them.

References

  1. Mark Ackerman. 2000. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction 15, (sep 2000), 179--203.Google ScholarGoogle Scholar
  2. Todd C Adelmann. 2010. Are Your Bits Worn Out: The DMCA, Replacement Parts, and Forced Repeat Software Purchases. Journal on Telecommunications and High Technology Law 8 (2010), 185--214.Google ScholarGoogle Scholar
  3. Nate Anderson. 2009. Landmark Study: DRM Truly Does Make Pirates Out of Us All. (2009). https://arstechnica.com/tech-policy/2009/05/ landmark-study-drm-truly-does-make-pirates-out-of-us-all/Google ScholarGoogle Scholar
  4. Krzyztof Bebenek. 2016. Strong Wills, Weak Locks: Consumer Expectations and the DMCA Anticircumvention Regime. Berkeley Technology Law Journal 26, 3 (2016), 1457--1488.Google ScholarGoogle Scholar
  5. Marek Bell, Matthew Chalmers, Louise Barkhuus, Malcolm Hall, Scott Sherwood, Paul Tennent, Barry Brown, Duncan Rowland, Steve Benford, Mauricio Capra, and others. 2006. Interweaving mobile games with everyday life. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. ACM, 417--426.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Berco Beute. 2005. Mobile DRM - Usability Out the Door? Telematics and Informatics 22, 1--2 (2005), 83--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Alan F. Blackwell. 2006. The reification of metaphor as a design tool. ACM Transactions on Computer-Human Interaction 13, 4 (2006), 490--530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (apr 2006), 77--101.Google ScholarGoogle ScholarCross RefCross Ref
  9. Joyram Chakraborty and Nirali M Chakraborty. 2015. Public policy and violence in video games. interactions 22, 1 (2015), 64--67.Google ScholarGoogle Scholar
  10. Karen Temple Claggett. 2017. Section 1201 of Title 17: A Report of the Register of Copyrights. Technical Report. United States Copyright Office. https://www.copyright. gov/policy/1201/section-1201-full-report.pdfGoogle ScholarGoogle Scholar
  11. W. Keith Edwards, Mark W. Newman, and Erika Shehan Poole. 2010. The Infrastructure Problem in HCI. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Atlanta, GA, 423--432.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Casey Fiesler and Amy S. Bruckman. 2014. Remixers' Understandings of Fair Use Online. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. ACM Press, Baltimore, MD, 1023--1032.Google ScholarGoogle Scholar
  13. Casey Fiesler, Jessica Feuston, and Amy S. Bruckman. 2015. Understanding Copyright Law in Online Creative Communities. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. Vancouver, BC, Canada, 116--129.Google ScholarGoogle Scholar
  14. Casey Fiesler, Cliff Lampe, and Amy S. Bruckman. 2016. Reality and Perception of Copyright Terms of Service for Online Content Creation. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. 1450--1461.Google ScholarGoogle Scholar
  15. Casey Fiesler and Nicholas Proferes. 2018. "Participant" Perceptions of Twitter Research Ethics. Social Media+ Society 4, 1 (2018), 2056305118763366.Google ScholarGoogle Scholar
  16. Jon Garon. 2008. What If DRM Fails?: Seeking Patronage in the iWasteland and the Virtual O. Michigan State Law Review (2008), 103--151.Google ScholarGoogle Scholar
  17. Urs Gasser and John Palfrey. 2007. Case Study: DRM-protected Music Interoperability and e-Innovation. Technical Report. Berkman Center Publication Series. 1--61 pages.Google ScholarGoogle Scholar
  18. Anthony G. Giannoumi, Molly Land, Wondwossen M. Beyene, and Peter Blanck. 2017. Web Accessibility and Technology Protection Measures: Harmonizing the Rights of Persons with Cognitive Disabilities and Copyright Protections on the Web. Cyberpsychology 11, 1 (2017).Google ScholarGoogle Scholar
  19. Dan Goldstein, Eve Hill, Jonathan Lazar, David Lepofsky, Alice Siempelkamp, and Anne Taylor. 2011. Increasing Legal Requirements for Interface Accessibility. In Extended Abstracts of the ACM CHI Conference on Human Factors in Computing Systems. Vancouver, BC, Canada, 745--748.Google ScholarGoogle Scholar
  20. James Grimmelmann. 2005. Regulation By Software. Yale Law Journal 114, 7 (2005), 1719--1758.Google ScholarGoogle Scholar
  21. Alan Hedge. 2013. Ergonomics and US public policy. interactions 20, 1 (2013), 64--67.Google ScholarGoogle Scholar
  22. Bill D. Herman and Oscar H. Gandy. 2006. Catch 2101: A Legislative History and Content Analysis of the DMCA Exemption Proceedings. Cardozo Arts & Entertainment Law Journal 24 (2006), 121--190.Google ScholarGoogle Scholar
  23. Philip Inglesant and M Angela Sasse. 2007. Usability is the best policy: public policy and the lived experience of transport systems in London. In Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI... but not as we know it-Volume 1. British Computer Society, 35--44.Google ScholarGoogle ScholarCross RefCross Ref
  24. Steven J Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The Policy Knot: Re-integrating Policy , Practice and Design in CSCW Studies of Social Computing. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. Baltimore, MD, 588--602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Christopher Kelty. 2005. Trust Among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information. In CODE: Collaborative Ownership and the Digital Economy. 127--154.Google ScholarGoogle Scholar
  26. Jonathan Lazar. 2014. Engaging in Information Science Research That Informs Public Policy. The Library Quarterly: Information, Community, Policy 84, 4 (2014), 451--459.Google ScholarGoogle Scholar
  27. Jonathan Lazar, Paul T Jaeger, Anthony Adams, Anthony Angelozzi, John Manohar, James Marciniak, Justin Murphy, Pouria Norasteh, Charles Olsen, Evangelos Poneres, and others. 2010. Up in the air: Are airlines following the new DOT rules on equal pricing for people with disabilities when websites are inaccessible? Government Information Quarterly 27, 4 (2010), 329--336.Google ScholarGoogle ScholarCross RefCross Ref
  28. Lawrence Lessig. 2006. Code: And other Laws of Cyberspace, Version 2.0. Basic Books, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ewa Luger, Lachlan Urquhart, Tom Rodden, and Michael Golembewski. 2015. Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Seoul, Korea, 457--466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jennifer A Nekuda Malik. 2017. Scientists initiate grassroots efforts to show importance of STEM to US government. MRS Bulletin 42, 8 (2017), 554--556.Google ScholarGoogle ScholarCross RefCross Ref
  31. Corinne L. Miller. 2008. The Video Game Industry and Video Game Culture Dichotomy: Reconciling Gaming Culture Norms with the Anti-Circumvention Measures of the DMCA. Texas Intellectual Property Law Journal 16, 453--480 (2008).Google ScholarGoogle Scholar
  32. Deirde K. Mulligan, John Han, and Aaron J. Burstein. 2003. How DRM-based Content Delivery Systems Disrupt Expectations of Personal uUe. Proceedings of the ACM Workshop on Digital Rights Management (2003), 77--89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. William Odom, Abi Sellen, Richard Harper, and Eno Thereska. 2012. Lost in Translation: Understanding the Possession of Digital Things in the Cloud. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Austin, TX, 781--790.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Stephen J. Payne. 2003. Users' Mental Models: The Very Ideas. In HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science, John M. Carroll (Ed.). Morgan Kaufmann Publishers, San Francisco, CA, 135--156.Google ScholarGoogle Scholar
  35. R. Anthony Reese. 2003. The First Sale Doctrine in the Era of Digital Networks. Boston University Law Review 44 (2003), 577--652.Google ScholarGoogle Scholar
  36. P Samuelson. 1989. Protecting User Interfaces through Copyright: The Debate. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (1989), 97--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Pamela Samuelson. 2016a. Freedom to Tinker. Theoretical Inquiries in Law 17, 2 (2016), 563--600.Google ScholarGoogle ScholarCross RefCross Ref
  38. Pamela Samuelson. 2016b. New Exemptions to Anti-Circumvention Rules. Commun. ACM 59, 3 (2016), 24--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Molly Sauter. 2014. The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury Publishing, New York, NY.Google ScholarGoogle Scholar
  40. Truan Savage. 2014. Avoiding the Next Napster: Copyright Infringement and Investor Liability in the Age of User Generated Content. Michigan Business & Entrepreneurial Law Review 4, 2 (2014), 261--292.Google ScholarGoogle Scholar
  41. Priti Trivedi. 2010. Writing The Wrong: What The E-Book Industry Can Learn From Digital Music's Mistakes With DRM. Journal of Law and Policy 18, 2 (2010), 925--967.Google ScholarGoogle Scholar
  42. Lachlan Urquhart and Tom Rodden. 2017. New directions in information technology law: learning from human?computer interaction. International Review of Law, Computers and Technology 31, 2 (2017), 150--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Jessica Vitak, Katie Shilton, and Z. Ashktorab. 2016. Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. In Proceedings of the ACM CSCW Conference on Computer Supported Cooperative Work & Social Computing. San Franciso, CA, 941--953.Google ScholarGoogle Scholar
  44. Rick Wash. 2010. Folk Models of Home Computer Security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Redmond, WA, 1--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Katherine Weigle. 2017. How the Digital Millennium Copyright Act Affects Cybersecurity. American University Intellectual Property Brief 9, 1 (2017), 1--24.Google ScholarGoogle Scholar
  46. Langdon Winner. 1986. Do Artifacts Have Politics? In The Whale and the Reactor: A Search for Limits in the Age of High Technology. University of Chicago Press, Chicago, IL, 19--39.Google ScholarGoogle Scholar

Index Terms

  1. Lawful Users: Copyright Circumvention and Legal Constraints on Technology Use

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
      April 2020
      10688 pages
      ISBN:9781450367080
      DOI:10.1145/3313831

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 April 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format