FREE BOOKS

Author's List




PREV.   NEXT  
|<   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254  
255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   278   279   >>   >|  
ose of good faith testing, investigating, or correcting, a security flaw or vulnerability, with the authorization of the owner or operator of such computer, computer system, or computer network. (2) Permissible Acts of Security Testing. Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to engage in an act of security testing, if such act does not constitute infringement under this title or a violation of applicable law other than this section, including section 1030 of title 18 and those provisions of title 18 amended by the Computer Fraud and Abuse Act of 1986. (3) Factors in Determining Exemption. In determining whether a person qualifies for the exemption under paragraph (2), the factors to be considered shall include- (A) whether the information derived from the security testing was used solely to promote the security of the owner or operator of such computer, computer system or computer network, or shared directly with the developer of such computer, computer system, or computer network; and (B) whether the information derived from the security testing was used or maintained in a manner that does not facilitate infringement under this title or a violation of applicable law other than this section, including a violation of privacy or breach of security. (4) Use of Technological Means for Security Testing. Notwithstanding the provisions of subsection (a)(2), it is not a violation of that subsection for a person to develop, produce, distribute or employ technological means for the sole purpose of performing the acts of security testing described in subsection (2), provided such technological means does not otherwise violate section (a)(2). (k) Certain Analog Devices and Certain Technological Measures. (1) Certain Analog Devices. (A) Effective 18 months after the date of the enactment of this chapter, no person shall manufacture, import, offer to the public, provide or otherwise traffic in any- (i) VHS format analog video cassette recorder unless such recorder conforms to the automatic gain control copy control technology; (ii) 8mm format analog video cassette camcorder unless such camcorder conforms to the automatic gain control technology; (iii) Beta format analog video cassette recorder, unless such recorder conforms to the automatic gain control copy control technology, except that this requirement shall not apply until there a
PREV.   NEXT  
|<   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254  
255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   273   274   275   276   277   278   279   >>   >|  



Top keywords:

computer

 

security

 

subsection

 

violation

 
control
 
testing
 

section

 

person

 

recorder

 

automatic


cassette

 
technology
 

conforms

 

format

 
network
 

system

 
Certain
 
provisions
 
analog
 

Technological


including

 

technological

 
derived
 

information

 

Devices

 
Analog
 

camcorder

 

Testing

 
operator
 
Security

Notwithstanding
 

applicable

 
infringement
 
Measures
 

violate

 

performing

 

purpose

 

Effective

 
provided
 

requirement


traffic

 
provide
 

public

 

employ

 

import

 

enactment

 

chapter

 

manufacture

 

months

 

amended