Jump to content

Digital rights management: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Ww (talk | contribs)
m they didn't until it became public after the sysinternals ancmnt
Daveydweeb (talk | contribs)
m Created "See also" section per Alistair's comments on the talk page, moved all internal link-only subsections to it.
Line 170: Line 170:
* XCP / [[Extended Copy Protection]] used by [[Sony BMG Music Entertainment|Sony BMG]]
* XCP / [[Extended Copy Protection]] used by [[Sony BMG Music Entertainment|Sony BMG]]


==Related concepts==
==See also==
===Related concepts===
*[[Copyleft]]
*[[Copyleft]]
*[[Copyright]]
*[[Copyright]]
Line 184: Line 185:
*[[Cyberpunk]]
*[[Cyberpunk]]
*[[Smart contracts]]
*[[Smart contracts]]

===Software that removes DRM===
*[[DeCSS]] – Decrypts CSS from DVDs
*[[DVD Decrypter]] – Comprehensive suite of DVD decrypting tools
*[[Hymn (software)|Hymn]], [[PlayFair]] – Removes [[iTunes Music Store]]'s [[FairPlay|DRM]]
*[[FreeMe]], [[Unfuck]], [[DRM2WMV]] and [[DRMDBG]] for WMA and WMV files
* Most Anti-Virus products, such as Symantec Norton AntiVirus, will now remove Sony's XCP DRM

===Devices that use DRM===
* [[Xbox]] and [[Xbox 360]]
* [[DVD player|DVD Players]]
* [[Apple iPod]]
* [[Microsoft PlaysForSure]] devices

===Lobbying organizations===
* [[European Information, Communications and Consumer Electronics Technology Industry Associations]]
* [[Trusted Computing Group]]
* [http://www.futureofmusic.org/ The future of music]
* [[Motion Picture Association of America]]
* [[Recording Industry Association of America]]
* [[Electronic Frontier Foundation]]
* [[Open Rights Group]]
* [http://defectivebydesign.org/ Defective by Design], a campaign of [[Free Software Foundation]]


==References==
==References==
Line 219: Line 243:
* [http://itpolicy.princeton.edu/pub/sonydrm-ext.pdf "Lessons from the Sony CD DRM Episode"] ([[Portable Document Format|PDF]] format), by J. Alex Halderman and [[Edward Felten]], [[February 14]], 2006
* [http://itpolicy.princeton.edu/pub/sonydrm-ext.pdf "Lessons from the Sony CD DRM Episode"] ([[Portable Document Format|PDF]] format), by J. Alex Halderman and [[Edward Felten]], [[February 14]], 2006
* [http://campaigns.wikia.com/wiki/Digital_Rights Digital Rights] at [[Wikia]]
* [http://campaigns.wikia.com/wiki/Digital_Rights Digital Rights] at [[Wikia]]

===Software that removes DRM===
*[[DeCSS]] – Decrypts CSS from DVDs
*[[DVD Decrypter]] – Comprehensive suite of DVD decrypting tools
*[[Hymn (software)|Hymn]], [[PlayFair]] – Removes [[iTunes Music Store]]'s [[FairPlay|DRM]]
*[[FreeMe]], [[Unfuck]], [[DRM2WMV]] and [[DRMDBG]] for WMA and WMV files
* Most Anti-Virus products, such as Symantec Norton AntiVirus, will now remove Sony's XCP DRM

===Devices that use DRM===
* [[Xbox]] and [[Xbox 360]]
* [[DVD player|DVD Players]]
* [[Apple iPod]]
* [[Microsoft PlaysForSure]] devices

===Lobbying organizations===
* [[European Information, Communications and Consumer Electronics Technology Industry Associations]]
* [[Trusted Computing Group]]
* [http://www.futureofmusic.org/ The future of music]
* [[Motion Picture Association of America]]
* [[Recording Industry Association of America]]
* [[Electronic Frontier Foundation]]
* [[Open Rights Group]]
* [http://defectivebydesign.org/ Defective by Design], a campaign of [[Free Software Foundation]]


[[Category:Business law]]
[[Category:Business law]]

Revision as of 23:50, 20 July 2006

Digital Rights Management (often abbreviated to DRM) is any of several technologies used by publishers to control access to digital data (such as software, music, movies) and hardware, handling usage restrictions associated with a specific instance of a digital work. The term is often confused with copy protection and technical protection measures (TPM). These two terms refer to technologies that control or restrict the use and access of digital media content on electronic devices with such technologies installed.

Digital Rights Management is a controversial topic, with advocates arguing that DRM is necessary to allow copyright holders to prevent revenue loss due to unauthorised duplication of their works. As a rhetorical device, critics occasionally refer to the system by alternative names, such as "Digital Restrictions Management"[1], noting that DRM enables publishers to enforce any arbitrary restrictions they desire, restrictions which may or may not be in accord with publishers' actual legal rights. They argue that DRM allows copyright holders to infringe on existing consumer rights and stifle innovation in software and cultural productions.

Enterprise Digital Rights Management (E-DRM or ERM) refers to the use of DRM technology to control access to corporate documentation (Word, PDF, TIFF, AutoCAD files, etc), rather than consumer playable media. The technology usually requires a Policy Server to authenticate users rights to access certain files. EDRM vendors include Microsoft, Adobe, EMC/Authentica and a number of smaller private companies.

Introduction

DRM vendors and publishers coined the term digital rights management to refer to the types of technical measures discussed here, applying it only to digital media (and analog media that has been released in digital form). While analog media loses quality with each copy generation, and often even during normal use, digital media files may be copied an unlimited number of times without any degradation in the quality of subsequent copies. The advent of personal computers, combined with the Internet and popular file sharing tools, have made unauthorised sharing of digital files (often referred to as digital piracy) increasingly common.

Although technical controls on the reproduction and use of software have been common since the 1980s, the term DRM has come to primarily mean the use of similar measures to control artistic works or content. Beyond the existing restrictions imposed by copyright law, most DRM schemes are able to enforce additional restrictions at the discretion of the content's publisher, which may or may not be the same entity as the copyright holder.

DRM may be enforced by numerous technologies, such as digital media player software. Since such implementations can be reverse engineered, resulting in a general move toward the Mandatory Access Control system (as opposed to Discretionary access control) wherein usage restrictions set by an administrator are enforced by software buried in an operating system, by hardware, or both. However, some implementations of this type of DRM are vulnerable to an additional class of attacks, due to a requirement to run on tamper-resistant hardware.

While digital rights management is most commonly used by the film industry, it has found use in other media as well. Many online music stores, such as Apple’s iTunes Music Store, as well as certain e-books producers, have adopted various DRM schemes in recent times. In mid-2005, a number of television producers began demanding implementation of DRM measures to control access to the content of their shows in connection with the popular TiVo system, and its equivalents.[citation needed]

Content Scrambling System

An early example of a DRM system is the Content Scrambling System (CSS) employed by the DVD Forum on movie DVDs since circa 1996. The scheme used a simple encryption algorithm, and required device manufacturers to sign a license agreement restricting the inclusion of certain features in their players, such as a digital output which could be used to extract a high-quality digital copy of the movie. Thus, the only consumer hardware capable of decoding DVD movies was controlled by the DVD Forum, restricting the unauthorised use of DVD media until the release of DeCSS by Jon Lech Johansen in 1999. An unsuccessful variant of this scheme is the now-defunct DIVX format.

Digital Rights Management holds an uncertain legal status in most countries, as the rights of users and producers regarding content are rarely defined clearly enough for legal regulation to be feasible. In most countries, particularly those without a fair use doctrine, users' ability to use copyrighted material is ill-defined and difficult to enforce.

The 2001 European directive on copyright forces member states of the European Union to implement legal protections for DRM. In 2006, the lower house of the French parliament adopted such legislation as part of the controversial DADVSI law, but added that protected DRM techniques should be made interoperable, a move which caused widespread controversy in the United States.

Problems associated with some well-known systems include:

  • DIVX: Proposed as a rental-only system, DIVX required a phone line, and thus inhibited the use of media offline. To relocate a work for which unlimited plays had been purchased (called DIVX Silver), it was necessary to carry the DVD player that first played the disk with it, or manually request that another player be authorised to play that disc. Consumers were denied certain fair use rights in countries with such a doctrine, such as the ability to create compilations of purchased material and to re-sell their copy. DIVX should not be confused with DivX.
  • CSS: Restricts owners' use of purchased content, such as the creation of compilations or full quality reproductions, where such actions would ordinarily be permissible in certain countries as fair use. The system also prevents the user from playing encrypted DVDs on any computer platform, although this restriction can be easily circumvented at the risk of prosecution under laws such as the DMCA. CSS is an example of certificate-based encryption.
  • Product activation: Restricts a product's functionality until it is registered with a publisher by means of a special identification code, often recording information about the specific computer the software it is installed on to prevent its use across multiple machines. Activation schemes may place some users at risk by incorrectly identifying their purchased software as unauthorised. An example of this vulnerability occured in 2003, when Intuit's use of a flawed product activation scheme angered thousands of customers who were denied legitimate use of the product, resulting in a formal apology by Intuit and their cancellation of the system.
  • Digital watermarking: Allows hidden data, such as a unique disc ID, to be placed on the media. The system allows such information as the name and address of the purchaser to be taken at the point of sale, and entered into a database along with the unique disc ID. This system does not prevent copying, but ensures that any copies made of the media will be traceable to a particular copy and perhaps to a particular user. However, the scheme relies largely on authenticating the purchaser's identity at the point of sale, and can be easily circumvented by a customer that provides false information.

The Digital Millennium Copyright Act (DMCA) is a United States copyright law passed unanimously on May 14, 1988, that criminalizes the production and dissemination of technology that allows users to circumvent copyright protection methods, rendering all forms of DRM-stripping and circumvention software illegal. On 22 May, 2001, the European Union passed the EU Copyright Directive, an implementation of the 1996 WIPO Copyright Treaty that addressed many of the same issues as the DMCA.

The DMCA was largely ineffective in enforcing DRM systems, as software allowing users to circumvent copyright restrictions remains readily available over the Internet. However, the Act has been used to restrict the spread of such software by limiting its distribution and development, as in the case of DeCSS.

The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicised example of the law's use in preventing the further development of anti-DRM measures. While working for Elcomsoft, he developed The Advanced eBook Processor, an application that allowed authorised users to strip usage restriction information from protected e-books. Sklyarov was arrested in the United States after presenting a speech at DEF CON, and subsequently spent several months in jail. The DMCA has also been cited as detrimental to legitimate users, such as students of cryptanalysis, and security professionals such as Niels Ferguson, who declined to publish information about vulnerbilities he discovered in an Intel secured computing scheme because of his concern about being arrested under the DMCA when he travels to the US.

While DRM systems are ostensibly designed to protect an owner's right to control copying, after a statutorily-defined period of time any copyrighted work becomes part of the public domain for anyone to use freely. DRM systems currently employed are not time limited in this way, and although it would be possible to create such a system (under compulsory escrow agreements, for example), there is currently no mechanism to remove the copy control systems embedded into works once the copyright term expires and they enter the public domain.

Furthermore, copyright law does not restrict the resale of copyrighted works (provided those copies were made by or with the permission of the copyright holder), so it is perfectly legal to resell a copyrighted work provided a copy is not retained by the seller—a doctrine known as the first-sale doctrine in the US, which applies equally in most other countries under various names. Similarly, some forms of copying are permitted under copyright law, under the doctrine of fair use (US) or fair dealing (many other countries). DRM technology restricts or prevents the purchaser of copyrighted material from exercising their legal rights in these respects.

Moreover, the scope of legal rights cannot, in principle, be fully encoded in technical access/copying restrictions. For example, a photograph generally falls under the copyright of its photographer, and may not be reproduced in an unlimited way by other persons. A photographer wishing to enforce her copyright might attach some DRM codes to a digital version of her photograph that indicate "may not be copied." However, the photographer might subsequently sign an agreement with another party authorizing such duplication (the reason for doing so is irrelevant). Under law, the moment such an agreement is signed, copying (under the new terms) becomes legal; but the DRM software will not (has not so far, in any case) been adjustable to reflect the new legal reality established by those whose choice it is.

An oft-cited example of DRM overreach is Adobe Systems' release in 2000 of a public domain work, Lewis Carroll's Alice in Wonderland, with DRM controls asserting that "this book cannot be read aloud" and so disabling use of the text-to-speech feature normally available in Adobe's eBook Reader.

DRM has been used by organizations such as the British Library in its secure electronic delivery service to permit worldwide access to substantial numbers of rare (and in many cases unique) documents which, for legal reasons, were previously only available to authorized individuals actually visiting the Library's document centre at Boston Spa in England. This is an interesting case, one in which DRM has actually increased public access to restricted material rather than diminished it.

An early example of a DRM scheme is one that is currently being used on textbooks required in some American Dental Schools including New York University College of Dentistry. The textbooks are available only on DVD and students are forced to purchase the DVD. The DVDs are readable only on an authorized computer and only for a limited time, after which the DVD "expires" and the information in the "DVD book" becomes unavailable. Some of these books are not available on paper at all.[2]

DRM advocates

Some DRM advocates have taken the position that the operational contexts and design goals of DRM, security, software engineering and cryptography are sufficiently well understood that it is already possible to achieve the desired ends without causing unrelated problems for users or their computers.

Others have taken the position that creators of digital works should have the power to control the distribution or replication of copies of their works, and to assign limited control over such copies. Without this power, they argue, there will be a chilling effect on creative efforts in the digital space. This has been and remains the underlying argument for copyright. DRM is one means by which creators of digital works may obtain this power.

A similar view states that DRM's advent is the first time large-scale digital distribution has been reasonably achievable, which proponents claim to be a benefit both to content creators and their customers that far outweighs the typical problems that arise. This argument cannot be applied to physical media, however.

Furthermore, advocates of DRM believe that its opponents advocate the rights of hardware and media owners, but at the expense of the privileges of artists and their designated copyright holders. Consumers of hardware and media voluntarily and knowingly agree to the grant of limited use of the content exhibited using their physical media.

DRM opponents

Many organizations, prominent individuals, and computer scientists are already opposed to DRM in its various currently proposed forms. Two notable opponents are John Walker in his article, The Digital imprimatur: How big brother and big media can put the Internet genie back in the bottle[3], and Richard Stallman in his article/story The Right to Read and in public statements "DRM is an example of a malicious feature - a feature designed to hurt the user of the software, and therefore, it's something for which there can never be toleration"[4]. Professor Ross Anderson of Cambridge University heads a British organization which opposes DRM and similar efforts in the UK.

The Electronic Frontier Foundation and similar civil rights organizations, including http://boycott-riaa.com and http://www.ihatedrm.com, also hold positions which are characterized as opposed to DRM.

The Foundation for a Free Information Infrastructure criticizes DRM's impact as a trade barrier from a free market perspective.

The first draft of the GNU General Public License version 3, released by the Free Software Foundation, prohibits using DRM to restrict free redistribution and modification of works covered by the license, and has a clause stating that the license's provisions shall be interpreted as disfavoring usage of DRM. Also, in May 2006, FSF launched a "Defective by Design" campaign against DRM.

Free Creations has published a license against DRM: Against DRM 2.0.

In France, in order to inform the consumers about the DRM threat, the citizen group StopDRM is regularly organizing protests in general stores (like Virgin or La Fnac) in different cities.

The use of DRM may also be a barrier to future historians, since technologies designed to permit data to be read only on particular machines may well make future data recovery impossible - see Digital Revolution. This argument connects the issue of DRM with that of asset management and archive technology.

DRM opponents argue that presence of DRM infringes private property rights and criminalizes a range of normal user activities. A DRM component would take control over the rest of the user's device which they rightfully own (for example MP3 player) and restricts how it may act, regardless of the user's wishes (for example, preventing the user from copying a song). All forms of DRM depend on the DRM enabled device (eg, computer, DVD player, TV, ...) imposing restrictions that cannot be disabled or modified by the user, regardless of existing rights. In other words, the user has no choice.

DRM and Internet music

Most internet music stores employ DRM to restrict the usage of music purchased and downloaded online. There are many options for consumers buying digital music over the internet, in terms of both stores and purchase options. Two examples of music stores and their functionality follow:

  • The iTunes Music Store, the industry leader, allows users to purchase a track online for under a dollar, to burn that song to an unlimited number of CDs, and transfer it to an unlimited number of iPods. The purchased music files are encoded as AAC, a format supported by iPods, and DRM is applied through FairPlay. Many music devices are not compatible with the AAC format, and only the iPod itself can play FairPlay-encoded files. Apple also reserves the right to alter its DRM restrictions on the music a user has downloaded at any time. For example, Apple recently decided to restrict the number of times a user can copy a playlist from ten to seven. Songs can be played on only five computers at a time, and users cannot edit or sample the songs they purchased. Despite these restrictions, the iTMS DRM is often seen as lenient, and can be easily bypassed through programs such as Hymn. Apple provides iTunes software for copying the downloaded music to iPods in AAC format or to conventional music CD (CDDA format). No copy restrictions are recorded onto the CD and many programs can read and convert music from CD to other music formats, such as MP3 used by competing digital music players.
  • Napster music store, which offers a subscription based approach to DRM alongside permanent purchases. Users of the subscription service can download and stream an unlimited amount of music encoded to Windows Media Audio (WMA) while subscribed to the service. But as soon as the user misses a payment the service renders all music downloaded unusable. Napster also charges users who wish to use the music on their portable device an additional $5 per month. Furthermore, Napster requires users to pay an additional $.99 per each track to burn a track to CD or to listen to the track after the subscription expires. Songs bought through Napster can be played on players carrying the Microsoft PlaysForSure logo (notably excluding iPod players).
  • CryptoGateway Software Inc., which develops global scale declarative security and identity management technology, offers services for content publishers/authors regarding DRM media player, digital media processing, hosting and sale on its peer to peer dynamic virtual private network.

The various services are currently not interoperable, though those that use the same DRM scheme (for instance the various Windows Media DRM stores, which include Napster) all provide songs that can be played side by side through the same program. Almost all stores require client software of some sort to be downloaded, and some also need plug-ins. Several colleges and universities, for example Princeton, have made arrangements with assorted Internet music suppliers to provide access (typically DRM protected) to music files for their students, to less than univerasl popularity, sometimes making payments from student activity fee funds. (See Nick Timeros's article in the WSJ: Free Legal, And Ignored) One of the problems is that the music becomes unplayable after leaving school, unless the student continues to pay individually. Another is that few of these vendors are compatible with the most common portable music player, the Apple iPod.

DRM and Libraries

Denver Public, Cuyahoga County and San José Public libraries join Cleveland Public Library, King County Library System, Public Library of Youngstown & Mahoning County, Wright Memorial Public Library and many others who enable the downloading of best-selling e-book 24/7 from their library website using the OverDrive service. The service features a growing collection of best-selling e-book from popular authors and publishers including HarperCollins, Time Warner, McGraw-Hill, Zondervan, Scholastic, John Wiley and Sons, and more. These audio books are downloadable in the WMA DRM format.[5]

See also: Digital distribution, Perpetual access

Controversies, consequences, and examples

File:DRM is killing music.png
A parodied Home Taping is Killing Music logo from an anti-DRM point of view.

Several DRM schemes have been implemented. Many see them as "abuse" of copyright (often called eSlavery in Europe); DRM proponents have seen them as a "reasonable balance of consumer concerns and artist rights."

Examples include:

  • Digital imprimatur
  • Inclusion of commercials on the "unskippable track" on DVDs reserved for the copyright notice;
  • Using the DMCA to restrict access to items that do not qualify for copyright, such as garage door openers and printer ink cartridges;
  • Adding restrictions on text-to-speech conversion in the EULA of e-books;
  • BBC IMP trial for downloads of DRM-encrypted audio and video files; uses the Kontiki peer to peer file distribution system. Allows no user control of the background up and downloading, leading to considerable slowing of user PCs and potential exhaustion of allowed data transfers without warning due to the nature of peer to peer type operations, with only the option to shut down the user's computer or disconnect from the Internet. BBC content is time-limited and will only play on the machine to which it was downloaded or an officially authenticated device participating in Microsoft's DRM scheme.
  • Sky's 'Sky By Broadband' scheme also uses Kontiki with similar results.
  • Using Copy Control schemes to thwart the existing statutory and common law exceptions to copyright holder control (such as fair use), as for instance in regional coding of media (such as in DVDs);
  • The possibility of dominant DRM-inclusive recording and playback technology being used uncritically by users unaware of the dangers and consequences thereof, and potentially later locking them out of their own creations, as with SCMS in consumer-grade DAT equipment;
  • Preventing academic publication and distribution of information relating to flaws in computer security in the absence of the permission of the creators of said technologies;
  • Silencing individuals who have found serious flaws in software used in electronic voting.[6]
  • Restriction of medical records and personal financial information using DRM to protect consumer rights. Insurers, lawyers and loan companies have strongly objected to the use of these technologies to prevent patient, hospital and practitioner records being more freely accessible due to copy and forward restriction applied to patient or customer records.
  • As of 2005, in American dental schools students are required to purchase textbooks on DVD. The DVDs are readable only on an authorized computer and only for a limited time, after which the DVD expires and the information in the "DVD book" becomes unreadable. Some of these books are not available on paper at all. The New York Association of Copyright Stakeholders have protested and documented this at http://fairuse.nylxs.com with the help of NYLXS.
  • Stopping or making archival of the content, even allowed such like in libraries, hard or impossible to do due to practical and technical reasons - especially when considering that the content should still be accessible even if the publisher disappears (bankruptcies etc).
  • TiVo 7.2 OS adds content access restrictions, blocks transfers, and auto-deletes some shows
  • The 2005 Sony CD copy protection scandal
  • Aesthetic objections to onscreen DRM threats interfering with relaxing and watching a movie.
  • The Swedish Pirate Party wants to outlaw most forms of DRM.
  • The legal inability to disable DRM restrictions, even if they "threaten critical infrastructure and potentially endanger lives" [7]
  • Many DRM systems restrict playback to a single device and, to date, no provider has offered to renew this licence when the device is upgraded.

Copyright law has been defined in terms of general definitions of infringement in any concrete medium. This classic approach focused such law on whether or not there is infringement, rather than focus on particular engineering techniques. Legislators have in several instances chosen not to prohibit new technologies (for example piano rolls, radio broadcasting, and audio tape recording in both Congress and the Supreme Court in the US). Critics of DRM assert that detecting and prosecuting infringement within the social and legal system avoids a legacy of outlawing generic, universal, popular, widespread, useful, and possibly uncontrollable in any case engineering techniques in response to specific misuses.

European dialogues on DRM concerns

In Europe, there are several dialog activities that are uncharacterized by its consensus-building intention:

  • Workshop on Digital Rights Management of the World Wide Web Consortium (W3C), January 2001. [1]
  • Participative preparation of the European Committee for Standardization/Information Society Standardisation System (CEN/ISSS) DRM Report, 2003 (finished). [2]
  • DRM Workshops of DG Information Society, European Commission (finished), and the work of the DRM working groups (finished), as well as the work of the High Level Group on DRM (ongoing). [3]
  • Consultation process of the European Commission, DG Internal Market, on the Communication COM(2004)261 by the European Commission on "Management of Copyright and Related Rights" (closed). [4]
  • The INDICARE project is an ongoing dialogue on consumer acceptability of DRM solutions in Europe. It is an open and neutral platform for exchange of facts and opinions, mainly based on articles by authors from science and practice.
  • The AXMEDIS project is a European Commission Integrated Project of the FP6. The main goal of AXMEDIS is atomating the content production, protection and distribution, reducing the related costs and supporting DRM at both B2B and B2C areas harmonising them.

The European Community is expected to produce a recommendation on DRM in 2006, phasing out the use of levies (compensation to rights holders charged on media sales for lost revenue due to unauthorized copying) given the advances in DRM/TPM technology.

Inclusion within GNU General Public License version 3

The first proposed draft of the GPLv3 (released on 2006-01-16) contains language intended to neutralize the harmful effects of DRM (intereference with users' rights to examine, alter, and redistribute) when implemented using GPL'd software. Although the draft in no way prohibits the use of GPL'd code in DRM systems, it does require binaries (or source code) to be distributed not only with source code, but also with the necessary cryptographic keys and other required mechanisms needed to modify the software and still have it interoperate. It also contains language intended to exclude GPL'd DRM code from the scope of the DMCA (and similar statutes elsewhere) anti-circumvention provisions.

DRM systems and implementations

Examples of existing "digital rights management" and "copy protection" systems:

See also

Software that removes DRM

Devices that use DRM

Lobbying organizations

References

  1. ^ Stallman, Richard. "Some Confusing or Loaded Words and Phrases that are Worth Avoiding". Retrieved 2006-06-26.
  2. ^ Fleisher, Lisa (April 2002). "DVD texts make lukewarm debut at NYU". Washington Square News.
  3. ^ Walker, John (September 13, 2003). "The Digital Imprimatur: How big brother and big media can put the Internet genie back in the bottle".
  4. ^ O'Riordan, Ciaran (January 16 2006). "Transcript of Opening session of first international GPLv3 conference". {{cite web}}: Check date values in: |year= (help)
  5. ^ OverDrive (December 16, 2003). "Top Libraries Select OverDrive eBook System".
  6. ^ "Online Policy Group v. Diebold, Inc". Electronic Frontier Foundation. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  7. ^ Felten, Ed (March 8, 2006). "RIAA Says Future DRM Might "Threaten Critical Infrastructure and Potentially Endanger Lives"".

Further reading

  • Lawrence Lessig's Free Culture, published by Basic Books in 2004, is available for free download in PDF format. The book is a legal and social history of copyright. Lessig is well known, in part, for arguing recent landmark cases on copyright law. A Professor of law at Stanford University, Lessig writes for an educated lay audience, including for non-lawyers. He is, for the most part, an opponent of DRM techologies.
  • Eberhard Becker, Willms Buhse, Dirk Günnewig, Niels Rump: Digital Rights Management - Technological, Economic, Legal and Political Aspects. An 800 page compendium from 60 different authors on DRM.
  • Bound by Law, by James Boyle et al, at Duke Universtiy Law School (http://www.law.duke.edu/cspd/comics/zoomcomic.html), a comic book treatment of the US Fair Use doctrine (with some relevance to other jurisdictions, for example in the Commonwealth usually called Fair Dealing). that is license fee free, under stature and common law precedent, use of copyrighted material without permission from the copyright holder.
  • DRM on Open Platforms - A paper by Hagai Bar-El and Yoav Weiss on ways to augment open platforms to make them suitable for DRM implementations.