FREE BOOKS

Author's List




PREV.   NEXT  
|<   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251  
252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   >>   >|  
constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term "interoperability" means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged. (g) Encryption Research. (1) Definitions. For purposes of this subsection- (A) the term "encryption research" means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products; and (B) the term "encryption technology" means the scrambling and descrambling of information using mathematical formulas or algorithms. (2) Permissible Acts of Encryption Research. Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to circumvent a technological measure as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research if- (A) the person lawfully obtained the encrypted copy, phonorecord, performance, or display of the published work; (B) such act is necessary to conduct such encryption research; (C) the person made a good faith effort to obtain authorization before the
PREV.   NEXT  
|<   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251  
252   253   254   255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   >>   >|  



Top keywords:

encryption

 

information

 

person

 

interoperability

 

technological

 

subsection

 
programs
 
paragraph
 

computer

 

research


circumvent

 

measure

 

infringement

 

constitute

 

published

 

activities

 

performance

 

display

 

permitted

 
Research

purposes

 

technology

 

phonorecord

 

Encryption

 

purpose

 

enabling

 

independently

 

Notwithstanding

 
provisions
 

created


extent

 

program

 

applied

 

effort

 

obtain

 
knowledge
 

advance

 

conducted

 

assist

 

authorization


copyrighted

 
scrambling
 

algorithms

 

formulas

 

Permissible

 

violation

 
mathematical
 

conduct

 

products

 
encrypted