[9071] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Effective and ineffective technological measures

daemon@ATHENA.MIT.EDU (Greg Broiles)
Sun Jul 29 18:48:35 2001

Message-Id: <5.1.0.14.2.20010729133337.037d9ce0@pop3.norton.antivirus>
Date: Sun, 29 Jul 2001 13:34:54 -0700
To: Alan Barrett <apb@cequrux.com>, <cryptography@wasabisystems.com>
From: Greg Broiles <gbroiles@well.com>
In-Reply-To: <Pine.NEB.4.33.0107291052560.375-100000@apb.cequrux.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 11:20 AM 7/29/2001 +0200, Alan Barrett wrote:

>The DMCA said:
> > 1201(a)(1)(A):
> >    No person shall circumvent a technological measure that effectively
> >    controls access to a work protected under this title.
>
>What does "effectively" mean here?

1201(b)(2)(B):

a technological measure ''effectively protects a right of a
copyright owner under this title'' if the measure, in the
ordinary course of its operation, prevents, restricts, or
otherwise limits the exercise of a right of a copyright owner
under this title.


--
Greg Broiles
gbroiles@well.com
"We have found and closed the thing you watch us with." -- New Delhi street kids




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post