In the information society, digital content is king. Whether ring tones, video clips, music files or the copy for this article (and others more worthy), the speed and simplicity of sending and accessing digitised information is one of the defining aspects of modern life.
The rapid development of digital technology has changed the business environment for industries reliant upon copyright protection, including new possibilities to exploit the value of copyright works. Digital technology has enabled new ways of distribution of copyright works and new ways of charging for them. Apple’s on-line iTunes Music Store sold 800,000 songs in its first week, and even now continues to sell hundreds of thousands weekly. In fact, the potential online music market is so valuable that traditional music retailers are being joined by most unconventional entrants into the online market. Newspapers, drinks companies, software companies and (it seems) any other high profile business with a strong youth brand have joined the rush to offer music content from their Web sites.
But the development of technology has not only enhanced potential markets for copyright industries, but also caused serious new threats. The ability to make perfect copies of digital works and the ease of distribution at low cost have caused vast losses. Whilst Napster have now “gone legal” and pay for content, there are plenty of other peer-to-peer networks who do not pay for delivering or sharing content.
These problems appear greater for the music industry than the film industry. The latter has collaborated with distributors and electronics manufacturers to develop the Content Scramble System (CSS), which is software loaded onto DVDs which prevents unlawful copying and permits authorised playback. The DVD players themselves contain circuitry which recognises CSS and follows its instruction. The investment in such systems and the collaboration required to establish them is huge – the standards set for DVD players on behalf of the consumer electronics industry are extensive, and the fall in price of DVD players over the last few years is breathtaking: from well over £100 a few years ago to £25 now. It is no surprise that the
But existing DVD machines are not limited to playback – even now, DVD recorders are available for about £150. It is clear that technology protection measures (TPMs), such as CSS for DVD, are increasingly important to copyright industries. The demand for greater legal protection for TPMs has been high for many years, and recent legislation seeks to address this.
At the international level, the World Intellectual Property Organization’s (WIPO) Copyright Treaty and the Performances and Phonograms Treaty (WIPO Treaties) require contracting states to provide for an adequate legal protection of TPMs. In
1. The UK’s anti-circumvention law before October 2003
It is worth recalling that, even before the implementation of the Information Society Directive, UK law (unlike the laws of most other countries) already prohibited (in old s296 of the CDPA) the dealing in devices specifically designed or adapted to circumvent copy protection, and was applicable to all categories of copyright works in digital form. The old law gave protection to the copyright owner, and any person issuing legitimate copies of the work to the public, against any person who, knowing or having reason to believe that it would be used to make infringing copies, either (a) made available any device specifically designed to circumvent the form of copy-protection employed, or (b) published information intended to assist persons to circumvent that form of copy-protection.
The effect of this law was considered earlier this year by the
The defendants were involved in dealing in devices which enable the circumvention of Sony’s copy protection system. The devices, when attached to Sony’s game console, tricks the console to believe that any inserted disc contains the required embedded copy control code, and thus allows the playing of pirate copies and games from different regions.
As the defendants’ acts spanned the period when the old and new laws were in force, the Court had to decide whether those acts were in violation of both. In relation to the old law, the Court held that each time a game is inserted into the console, a copy of it is made in the console’s Random Access Memory and the RAM chip therefore constitutes an article representing the infringing copy, which was made using the device.
Under English law, in general an infringing copy must at some stage be either made in or imported into the
2. The “new” anti-circumvention law
The law changed on
2.1 Protection of computer programs
It is prohibited (under the new s 296 of the CDPA) for a person to (i) deal with products for which the sole intended purpose is to facilitate the unauthorised removal or circumvention of a technical device applied to a computer program; and (ii) publish information intended to enable or assist persons in removing or circumventing such technical device, where that person knows or has reason to believe that it will be used to make infringing copies.
The technical device here means any device that is intended to prevent or restrict copyright infringement – these can include simple encryption, password protection, copy protection devices, use control systems and access control systems.
The copyright owner may enforce these provisions, as can a wide group of others. These include those issuing to the public copies of the program containing the technical device; those communicating such program to the public; the copyright owner’s exclusive licensee; and the owner or exclusive licensee of any intellectual property right in the technical device applied to the computer program.
However, like the old law, the new law does not outlaw the actual acts of circumvention of copy protection devices, merely the dealing in circumvention devices. Circumvention itself is permissible, unless it is itself an infringement of copyright, and further liability is incurred only if the work is then copied without consent.
These provisions are strongly in favour of rights holders. They further enable the rights holders to seize relevant products from temporary sales outlets (eg market stalls) or apply to the court for an order for delivery up of the relevant products.
In the Sony case (Kabushiki Kaisha Sony Computer Entertainment Inc v Ball [2004] EWHC 1738 Ch), the court had the opportunity to consider the new law. It held that all the points made about infringing copies and activities directed outside the UK under the old law applied similarly to the new law insofar as it relates to circumvention devices applied to computer programs (new s 296) and actual circumvention in relation to other works (s 296ZA – see below). A defendant may therefore be liable under these sections only in respect of circumvention devices supplied for use in the
Further, in relation to the prohibition on publishing, it is clear that if someone publishes on its Web site information which enables the circumvention of a copy protection system, that information would be published simultaneously to both British and foreign users of the device, and so be actionable in the UK. That follows from the standard English principles of availability of information in the UK of Web-based material, but any such action would relate to the publication in the
2.2 Protection of other works – music, films, etc
Preventing circumvention
The provisions relating to the protection of other digital content (ss 296ZA-ZF) are more complex than for computer programs, and reflect the close attention which content received in the Information Society Directive. They apply if effective technological measures have been applied to a copyright work (other than a computer program) or a work protected by right in performance, publication right or database right, and a person does something that circumvents such technological measures. It is prohibited (under s 296ZA) for a person to circumvent the technological measure if he knows or has reason to believe that what he does will result in that circumvention.
Technological measure is defined as any technology, device or component which is designed, in the normal course of its operation, to protect a work protected by copyright (or any other above-mentioned right). And the technological measure is effective if the use of the work is controlled through an access control or protection process (eg encryption or scrambling), or a copy control mechanism which achieves the intended protection.
It is interesting to note that these provisions (relating to content, amongst other things, but not computer programs) apply only if the technological measure is effective – ie achieves some form of protection of the copyright work. Incompetently designed or applied technological measures will not have the benefit of this protection – they can be circumvented with impunity; that seems sensible because by definition they would not need to be circumvented in the first place. This may be contrasted with the position relating to computer programs above: for those, technical devices which are incompetently designed but were intended to prevent copying cannot be circumvented, even though they may be useless.
As with computer programs, a wide group of others may enforce these provisions as well as the copyright owner. This group largely corresponds to the group listed for computer programs above, being those issuing to the public copies of the work containing the technical measures; those communicating such work to the public; and the copyright owner’s exclusive licensee.
But there is an express exception to these provisions which permits circumvention for research purposes carried out in the field of cryptography, deemed necessary to protect the cryptographic industry. This exception applies, however, only if circumvention or the later publication of the results of such research does not prejudicially affect the rights of the copyright owner. Clearly, this exception was introduced in order to protect those legitimately involved in studying cryptography. However, in the author’s view, the limitation is likely to chill down research (both commercial and academic) in the field of cryptography as it seems likely that any publication or use of cryptographic analysis results may be prejudicial to the copyright owner.
In Sony, the Court held that, to the extent that the defendant installed devices to game consoles and such consoles were then used, there is no defence to the allegation that Sony’s technological measures had been circumvented. For this provision to bite, it is irrelevant whether any copyright has actually been infringed. However, as before, any possible circumvention outside the
Dealing in circumvention devices
Further provisions of the new law (s 296ZD) are concerned with dealing in devices enabling or facilitating the circumvention. It is prohibited to deal in any product or provide services which (1) are promoted for the purpose of the circumvention of effective technological measures, (2) have only a limited commercially significant purpose or use other than circumvention, or (3) are primarily designed to enable the circumvention.
Again, the copyright owner and a wide group of others may enforce these provisions, the wider group corresponding exactly with the group listed for computer programs above. Also, as for the computer program provisions above, these provisions further enable the rights holders to seize relevant products from temporary sales outlets or apply to the court for an order for delivery up of the relevant products.
The wrong which this provision addresses is summarised above as “dealing” in these devices. More specifically, the section prohibits the manufacture, importation, distribution, selling or letting for hire (or offering or advertising to do so), and the possession for commercial purposes of devices. As with the other sections, the actual circumvention must occur in the
Criminal offences
Clearly, these provisions are designed to grant wider powers to the rights holders. This is amplified further in the establishment of criminal offences for those dealing in any product designed to enable the circumvention of effective technological measures, or offering such a circumvention service. These new offences carry similar potential prison terms as the existing offences of copyright infringement itself (up to 2 years), and reflect the Government’s position that the offences of both copyright infringement and copy protection circumvention should be treated consistently.
2.3 Rights management information
Electronics rights management (ERM) information is also protected under the new law. If ERM information is altered or removed by anyone knowing or with reason to believe that this would enable or conceal copyright infringement, that person may be sued by the copyright owner, its exclusive licensee or anyone legitimately issuing copies or communicating the work to the public. Similar liability will attach to anyone knowingly dealing with a copyright work from which ERM information has been altered or removed who knows or has reason to believe that this would enable or conceal copyright infringement.
2.4 Copy protection and fair dealing
Copyright is not an exclusive right. Since it was first introduced into English law, legislators have tried to strike a careful balance between the rights of copyright owners to prevent copying of their works and the reality that members of the public should be able to use some works for some purposes. This is done by providing certain limitations to copyright owners’ exclusive rights. The CDPA limits copyright owners’ rights, for instance by allowing fair dealing for the purposes of private study, research for a non-commercial purpose and for the purposes of criticism and review where (if possible) there is sufficient acknowledgement.
Of course, technical devices and technological measures such as encryption, password protection, copy protection devices and use and access control systems are capable of restricting not only illegal uses of copyright works but also permitted uses (eg fair dealing). But without further legislation, the anti-circumvention measures described above would catch those trying to circumvent protection devices even for permitted uses. Therefore, the Information Society Directive requires Member States to take appropriate measures to ensure that copyright owners enable the beneficiaries of certain copyright exceptions to benefit from those exceptions.
The
As the right to complain to the Secretary of State is the sole remedy available to permitted users in these circumstances, it is questionable whether this qualifies as an “appropriate measure” required by the Information Society Directive. It is anticipated that the remedy will be time-consuming and frustrating, if used at all.
Conclusion
The new law grants wider protection to rights holders than was the case before October 2003. Due to the legislative history, rather elaborate differences in wording and definitions exist between the regimes for (1) computer program protection, (2) other copyright work protection, and (3) electronic rights management. However, there is no doubt that the interests of copyright owners are being protected by the law, and upheld by the court.
For both computer programs or other works it is interesting to note that, where the dealing in products is actionable, no actual copyright infringement, or even actual circumvention of technical measures is required for the provisions to apply. The provisions are violated simply by dealing (ie importing, selling, advertising etc.) in an anti-circumvention device, whether or not there is any actual infringement. Therefore, the protection given to copyright owners and others by these provisions goes beyond traditional copyright protection as such, and represents an additional layer of protection. It represents a powerful weapon for rights holders.
However, the distinction between the provisions for computer programs and other works is artificial, arising as it does from the implementation of two different European directives. There seems to be no policy reason why actual circumvention of computer program protection devices is lawful but actual circumvention of protection devices for other works is unlawful. Similarly, it is a legislative oddity why the marketing in the
On the latter point, however, the
William Cook is a Solicitor in the Intellectual Property Department of Simmons & Simmons.
Copyright Simmons & Simmons