home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Oct 11, 1992 Volume 4 : Issue 50
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivist: Dan Carosone
- Copy Editor: Etaion Jhrdleau, Sr.
-
- CONTENTS, #4.50 (Oct 11, 1992)
- File 1--More Ah, Sordid administrivia
- File 2--Senate Bill 893 (Anti-Piracy) Passes
- File 3--Anti-Piracy Legisla<tion (S 893)
- File 4--Sofware Copyright/License Quiz
- File 5--Correction on Clarkson article in CuD #4.46
- File 6--Is Cyberspace a "Culture?"
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
- anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 11 Oct 92 15:55:50
- From: Moderators (tk0jut2@mvs.cso.niu.edu)
- Subject: File 1--More Ah, Sordid administrivia
-
- CuD IS IN THE COMP.SOCIETY USENET HIERARCHY
-
- We continue to receive queries about the change-over from
- alt.society.cu-digest TO COMP.SOCIETY.CU-DIGEST. By now, your system
- should have switched over. It appears that there are glitches (or
- sysad tardiness) on some systems. If your system IS NOT receiving the
- comp version, check with your sys ad.
-
- WEEKLY SCHEDULE:
-
- CuD remains committed to a weekly schedule intended to publish about
- 50 issues a year (with a two week break over Christmas). The recent
- twice-a-week schedule is temporary, owing in part to a surge of
- material. The anticipated issue on the Software Publisher's
- Association (SPA) will be out in about two weeks followed by a second
- issue of responses.
-
- SUBMITTING ARTICLES TO CuD:
-
- The switch to the comp hierarchy has led to an increase in inquiries
- about submitting articles. A summary of guidelines for longer articles
- is available on request and may also be obtained from the FAQ
- (frequently asked questions) list provided when requesting a mail
- subscription. In general, we encourage all reasonable articles related
- to some aspect of "cyber-culture" that have something substantive to
- say. We do not publish 2-line "me too" agreements or 1-line "the
- previous poster should be shot" flames. We encourage opinions,
- debates, news summaries, book reviews, conference notices, conference
- summaries, legal information, research summaries or articles,
- technical blurbs, or other issues that are of interest to the diverse
- interests of computer culture.
-
- MAILING LIST GLITCHES:
-
- We apologize to those on the mailing list for the occasional mailing
- glitches (empty mail, garbled subject). The mailing list has increased
- by nearly 25 percent in the past two months. We had assumed that the
- change to the comp hierarchy would reduce the list, but for every
- reader that's switched to Usenet, we've added two who can't access
- Usenet. So, we've experimented with a primitive batch mailer that's
- not yet perfected. Let us know if there are any problems.
-
- ------------------------------
-
- Date: 11 Oct 11 16:29: 34
- From: Moderators (tk0jut2@mvs.cso.niu.edu)
- Subject: File 2--Senate Bill 893 (Anti-Piracy) Passes
-
- The Senate Thursday night passed a series of Bills that included
- S 893, anti-piracy legislation, that criminalizes and creates severe
- sentences for anyone convicted under the statute.
-
- The law's language essentially makes it a crime to make copies of
- unauthorized software, whether by backup or for distribution on a BBS.
- Two provisions seem especially questionable: (1) The provision that
- criminalizes reproducing or distributing at least 50 copies of
- copyright-infringing software in a 180 day period; and (2) The
- provision that criminalizes reproduction or distribution of more than
- 10 but less than 50 copies of one or more offending programs with a
- value of $2,500 or more. Depending on the nature of an offense or
- whether it is a second offense, a violator could face a prison term of
- up to 10 years. The law seems to target the "hobby pirate" rather
- than professional bootleggers. As written, it seems that a user who
- possesses an unauthorized copy of Word Perfect 5.1 and backs it up
- once every two weeks to tape would violate the "more than ten copies"
- provision. The "cost" would presumably exceed the $2,500 threshold.
- Or, If a user downloaded 11 different word processing programs from a
- BBS to test them before purchase, there is a risk of federal
- prosecution even if one of them is purchased.
-
- As with all new laws involving new technology, the scope and nuances
- will be worked out in the courts over time. But, this may not prevent
- abuse of the law by prosecutors and investigators. There is little
- reason to trust in the good faith of prosecutors in alleged crimes
- involving new technology (as Sun Devil and other cases demonstrate).
- It is hardly unreasonable to create a scenario where one's computer
- equipment is confiscated for "evidence" or for a minor offense and
- then, if several unauthorized programs are found, to pursue more
- serious charges. The wording of the law seems to create considerable
- latitude for abuse by law enforcement and for excessive prosecution.
- We would guess that, under the new law, a substantial portion of the
- computer community has just become criminals.
-
- The law also raises trickier questions. If the sysop of a small
- neighborhood BBS has a program on the board, such as Windows 3.1, and
- 15 people download it, would this make the sysop vulnerable? Has the
- sysop actually distributed that single copy? What if a single program
- were distributed in a single post over the nets and received by 1,000
- people? How about the case where a company's legitimate program, with
- serial number intact, were spread to 50 other people by an employee
- and then traced back to the legitimate purchaser? Even if the answers
- are benign, the potential for over-zealous use of the law risks havoc
- for those who, like Steve Jackson Games, ultimately must prove their
- innocence to clear their name and have their equipment returned.
-
- The law will likely to little to stifle the bootleggers--those who
- profit from resale of unauthorized software. The relatively low
- threshold of offense clearly seems to target the casual, "small-time"
- computer user and pirate board. It is simply a bad law.
-
- Perhaps it is not coincidental that the Bill's sponsor, Orrin Hatch of
- Utah, is from the same state as Word Perfect. It would be convenient
- to blame Congress, the SPA, large software manufacturers, or groups
- such as the EFF for not taking a strong (or any) stand. In this case,
- however, the computer community has only itself to blame. Discussions
- with two Senators' aides indicated that IF THEY HAD RECEIVED SOME
- REASONABLE RATIONALE DURING DELIBERATIONS, they would have been more
- likely to oppose the Bill for further consideration. Senate sources
- indicated that the bulk of the opposition came at the 11th hour, too
- late to be of significant impact in a highly charged election year.
- An aide to Senator Simon, who is normally highly sensitive to
- potentially abusive legislation, indicated that the Senator did not
- receive a single word of opposition to the Bill until our own call
- about two hours prior to the final vote.
-
- If groups like the EFF and CPSR have done nothing else, they have
- demonstrated the value of and need for developing a quasi-organized
- political constituency for cyber issues. Many of us (CuD included)
- assumed that "George would do it." We goofed. If there is any lesson
- to be taken from S 893, it is that we should all pay closer attention
- to legislation that affects the bulk of the cyber community and not
- simply sit back when we have the opportunity to provide input.
-
- The Bill below *IS NOT* the final version, and we are told that there
- was some minor last minute changes in wording to reconcile House and
- Senate versions. For those wondering if the bill will affect them, we
- include in file #4 a "piracy quiz." Take it, then re-read S 893.
-
- ------------------------------
-
- Date: 8 Oct 92 12:40:51
- From: Anonymous@anon.ymous.com
- Subject: File 3--Anti-Piracy Legisla<tion (S 893)
-
- ((MODERATORS' COMMENT: The following is not the Bill's final wording.
- Some minor changes were made at the last minute. However, it is
- substantively the same Bill that is now law)).
-
-
-
- BILL TRACKING REPORT
-
-
- 102nd Congress
- 1st Session
-
- U. S. Senate
-
- S 893
-
- 1991 S. 893
-
- AMENDMENT, TITLE 18, UNITED STATES CODE
-
- DATE-INTRO: April 23, 1991
-
- LAST-ACTION-DATE: October 5, 1992
-
- FINAL STATUS: Pending
-
- SPONSOR: Senator Orrin G. Hatch R-UT
-
- TOTAL-COSPONSORS: 2 Cosponsors: 1 Democrats / 1 Republicans
-
- SYNOPSIS: A bill to amend title 18, United States Code, to impose criminal
- sanctions for violation of software copyright.
-
- ACTIONS: Committee Referrals:
- 04/23/91 Senate Judiciary Committee
- 06/09/92 House Judiciary Committee
-
- Legislative Chronology:
-
- 1st Session Activity:
- 04/23/91 137 Cong Rec S 4837 Referred to the Senate Judiciary Committee
- 04/23/91 137 Cong Rec S 4862 Remarks by Sen. Hatch
- 07/25/91 137 Cong Rec D 972 Senate Subcommittee on Patents, Copyrights
- and Trademarks approved for full Committee
- consideration
- 08/01/91 137 Cong Rec D 1036 Senate Judiciary Committee ordered favorably
- reported
- 09/23/91 137 Cong Rec S 13465 Cosponsors added
-
- 2nd Session Activity:
- 04/07/92 138 Cong Rec S 4931 Reported in the Senate (S. Rept. No.
- 102-268)
- 06/04/92 138 Cong Rec S 7580 Passed in the Senate, after agreeing to
- an amendment proposed thereto, by voice
- vote
- 06/04/92 138 Cong Rec S 7580 Senate adopted Specter (for Hatch)
- Amendment No. 1868, to make a technical
- correction, by voice vote
- 06/04/92 138 Cong Rec S 7613 Hatch Amendment No. 1868, submitted
- 06/09/92 138 Cong Rec H 4338 Senate requested the concurrence of the
- House
- 06/09/92 138 Cong Rec H 4445 Referred to the House Judiciary Committee
- 08/12/92 138 Cong Rec D 1066 House Subcommittee on Intellectual Property
- and Judicial Administration held a hearing
- 09/10/92 138 Cong Rec D 1094 House Subcommittee on Intellectual Property
- and Judicial Administration approved for
- full Committee action amended
- 09/30/92 138 Cong Rec D 1246 House Judiciary Committee ordered reported,
- amended
- 10/03/92 138 Cong Rec H 11129 House voted to suspend the rules and pass,
- amended, by voice vote
- 10/03/92 138 Cong Rec H 11129 House agreed to amend the title, by voice
- vote
- 10/03/92 138 Cong Rec H 11196 Reported in the House, amended (H. Rept.
- 102-997)
- 10/05/92 138 Cong Rec S 16975 House requested the concurrence of the
- Senate
-
- BILL-DIGEST: (from the CONGRESSIONAL RESEARCH SERVICE)
- 0604/92 (Measure passed Senate, amended ) Amends the Federal criminal code
- to impose criminal sanctions for copyright violations involving the
- reproduction or distribution, during any 180-day period, of specified
- numbers of copies infringing the copyright in one or more computer programs.
-
- CRS Index Terms:
-
- Crime and criminals; Computer software; Copyright infringement; Fines
- (Penalties)
-
- CO-SPONSORS:
-
- Original Cosponsors:
-
- DeConcini D-AZ
-
- Added 09/23/91:
-
- Gorton R-WA
-
-
-
- FULL TEXT OF BILLS
-
- 102ND CONGRESS; 2ND SESSION
- IN THE HOUSE OF REPRESENTATIVES
- AS REPORTED IN THE HOUSE
-
- S. 893
-
- 1991 S. 893;
-
- SYNOPSIS:
- AN ACT
- To amend title 18, United States Code, to impose criminal sanctions for
- violation of software copyright.
-
- DATE OF INTRODUCTION: FEBRUARY 28, 1991
-
- DATE OF VERSION: OCTOBER 5, 1992 -- VERSION: 5
-
- SPONSOR(S):
- Sponsor not included in this printed version.
-
- TEXT:
- 102D CONGRESS
- 2D SESSION
- S. 893
-
- Report No. 102-997
- To amend title 18, United States Code, to impose criminal sanctions for
- violation of software copyright.
-
- -------------------------------------
-
- IN THE HOUSE OF REPRESENTATIVES
-
- JUNE 9, 1992
- Referred to the Committee on the Judiciary
-
- OCTOBER 3, 1992
- Reported with amendments, committed to the Committee of the Whole House
- on the State of the Union, and ordered to be printed
-
- Strike out all after the enacting clause and insert the part printed in
- italic
- -------------------------------------
-
- AN ACT
- To amend title 18, United States Code, to impose criminal sanctions for
- violation of software copyright.
-
- * Be it enacted by the Senate and House of Representatives of the United*
- *States of America in Congress assembled, *
- ** That (a) section 2319(b)(1) of title 18, United States Code, is
- amended-
- (1) in paragraph (B) by striking "or" after the semicolon;
- (2) redesignating paragraph (C) as paragraph (D);
- (3) by adding after paragraph (B) the following:
- "(C) involves the reproduction or distribution, during any
- 180-day period, of at least 50 copies infringing the copyright
- in one or more computer programs (including any tape, disk, or
- other medium embodying such programs); or";
- (4) in new paragraph (D) by striking "or" after "recording,"; and
- (5) in new paragraph (D) by adding ", or a computer program",
- before the semicolon.
- (b) Section 2319(b)(2) of title 18, United States Code, is amended-
- (1) in paragraph (A) by striking "or" after the semicolon;
- (2) in paragraph (B) by striking "and" at the end thereof and
- inserting "or"; and
- (3) by adding after paragraph (B) the following:
- "(C) involves the reproduction or distribution, during any
- 180-day period, of more than 10 but less than 50 copies
- infringing the copyright in one or more computer programs
- (including any tape, disk, or other medium embodying such
- programs); and".
- (c) Section 2319(c) of title 18, United States Code, is amended-
- (1) in paragraph (1) by striking "and" after the semicolon;
- (2) in paragraph (2) by striking the period at the end thereof and
- inserting "; and"; and
- (3) by adding at the end thereof the following:
- "(3) the term 'computer program' has the same meaning as set forth
- in section 101 of title 17, United States Code.".
- *SECTION 1. CRIMINAL PENALTIES FOR COPYRIGHT INFRINGEMENT. *
- * Section 2319(b) of title 18, United States Code, is amended to read as*
- *follows: *
- * "(b) Any person who commits an offense under subsection (a) of this *
- *section- *
- * "(1) shall be imprisoned not more than 5 years, or fined in the *
- * amount set forth in this title, or both, if the offense consists of *
- * the reproduction or distribution, during any 180-day period, of at *
- * least 10 copies or phonorecords, of 1 or more copyrighted works, *
- * with a retail value of more than $2,500; *
- * "(2) shall be imprisoned not more than 10 years, or fined in the *
- * amount set forth in this title, or both, if the offense is a second *
- * or subsequent offense under paragraph (1); and *
- * "(3) shall be imprisoned not more than 1 year, or fined in the *
- * amount set forth in this title, or both, in any other case.". *
- *SEC. 2. CONFORMING AMENDMENTS. *
- * Section 2319(c) of title 18, United States Code, is amended- *
- * (1) in paragraph (1) by striking " 'sound recording', 'motion *
- * picture', 'audiovisual work', 'phonorecord'," and inserting " *
- * 'phonorecord' "; and *
- * (2) in paragraph (2) by striking "118" and inserting "120". *
- Amend the title so as to read: "An Act to amend title 18, United States
- Code, with respect to the criminal penalties for copyright
- infringement.".
- Passed the Senate June 4 (legislative day, March 26), 1992.
- Attest:
- WALTER J. STEWART,
- * Secretary.*
-
- ------------------------------
-
- Date: 04 Oct 92 21:26:21 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 4--Sofware Copyright/License Quiz
-
- SOFTWARE COPYRIGHT/LICENSE QUIZ
- by Albert Silverman
-
- Introduction
-
- This is the second article in a series on "piracy"--with a reverse
- twist. This series currently includes the following articles:
- (1) Great Software Licensing Hoax (PIRACY1.TXT)
- (2) Software Copyright/License Quiz (PIRACY2.TXT)
- (3) Great School Copyright Robbery (PIRACY3.TXT)
- (4) San Diego County--Truth Squad (PIRACY4.TXT)
- (5) ADAPSO and SPA--Trade Pirates (PIRACY5.TXT)
- (6) Aldus--Snaring a Pirate Chief! (PIRACY6.TXT)
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- You cannot reject the computer software industry's attempted piracy of
- YOUR legal rights in the handling of your computer software, while at
- the same time avoiding committing piracy yourself, unless you
- understand the basic applicable laws. Please note that the following
- quiz goes somewhat beyond these basic legal principles; hence the
- knowledge which is required to answer many of these questions does not
- fit the "basic" description. Answer "YES" or "NO," based upon your
- understanding of these laws. Although several of these questions have
- not been specifically addressed in the courts, the answers (which are
- given following the list of questions) reflect a highly probable
- decision if the question were to reach the courts. Answer as many of
- the questions that you can (or that you can even understand!) before
- looking up the answers. Good luck!
-
- ___ (01) Do you violate the copyright law by making a backup copy
- of a copy-protected program, even though the software publisher
- furnishes a second (pseudo-backup) copy labeled "archival" or
- "backup"?
- ___ (02) Do you violate the copyright law by having (as opposed to
- using simultaneously) more than a single backup copy of one program
- on hand?
- ___ (03) Do you violate the copyright law by using a backup copy
- which you have made instead of using the purchased copy, even
- though the purchased copy has not been damaged?
- ___ (04) Do you violate the copyright law by paying someone else
- to make a backup copy FOR you, rather than making it yourself?
- ___ (05) You have purchased a single copy of a copy-protected
- program. In order to make a backup copy, it is necessary to alter the
- scheme of copy-protection. However, this alteration cannot be
- detected while using the program; apart from the "invisible" altered
- copy-protection, the backup copy is identical with the original copy
- from which it was prepared. Do you violate the copyright law by
- transferring this backup copy along with the original copy?
- ___ (06) You are licensing the use of a computer program and the
- license agreement forbids you from adapting and/or modifying the
- program in any manner. Can you be successfully prosecuted for
- violating the license agreement if you choose to disregard this
- prohibition?
- ___ (07) A school loads a copy of a computer program which it
- owns onto a network for distribution to ten computers for use by ten
- students in its computer classroom. Is the school guilty of violating
- the copyright law?
- ___ (08) You are licensing the use of a program and the license
- agreement forbids you from using the software on more than one CPU
- (central processing unit) at a time. Can you be successfully
- prosecuted for violating the license agreement if you disregard this
- restriction?
- ___ (09) You are licensing the use of a program and the license
- agreement forbids you from lending it. Can you be successfully
- prosecuted for violating the license agreement if you lend this
- program to a friend, without charge?
- ___ (10) Do you violate the copyright law by lending to a friend,
- without charge, the original copy of a computer program to which
- you own the title?
- ___ (11) Do you violate the copyright law by copying a single
- purchased program to hard disks on several computers within a
- business establishment?
- ___ (12) If you purchase the title to a computer program and the
- package contains two otherwise-identical disks, one of which is
- labeled "archival" or "backup," do you violate the copyright law by
- using both disks at the same time on separate computers?
- ___ (13) You are licensing the use of a copy-protected computer
- program. Two copies of the program are supplied by the publisher,
- one of which is labeled "archival." The license agreement forbids
- the simultaneous use of both copies on separate computers. Can you
- be successfully prosecuted for violating the agreement if you fail to
- heed this prohibition?
- ___ (14) If you purchase the title to a computer program and the
- package contains two otherwise identical disks, one of which is
- labeled "archival" (or "backup"), do you violate the copyright law by
- selling the archival (or backup) disk while retaining ownership of
- the other disk?
- ___ (15) Do you violate the copyright law by possessing a copy of a
- computer program when you do not rightfully possess the original
- from which the copy was prepared?
- ___ (16) You are licensing the use of a program and the license
- agreement forbids you from making more than two backup copies of
- the software. Can you be successfully prosecuted for violation of
- the license agreement if you make three backup copies?
- ___ (17) You are licensing the use of a program and the license
- agreement forbids you from making more than two backup copies of
- the software. Are you guilty of copyright infringement if you make
- three backup copies?
- ___ (18) You are licensing the use of a program and the license
- agreement forbids you from creating a derivative work based upon
- the program. Can you be successfully prosecuted for violation of the
- license agreement if you disregard this prohibition?
- ___ (19) You are licensing the use of a program and the license
- agreement forbids you from creating a derivative work based upon
- the program. Do you violate the copyright law if you disregard this
- prohibition?
- ___ (20) You agree with a software publisher, in writing, that you
- will place a copyright notice on the disk label of a backup copy
- which you make of the program. Do you violate ANY law (i.e., either
- breach the agreement or infringe the copyright) by failing to do so?
- ___ (21) You purchase a computer program and find, after you open
- the package, that there is a plain, sealed envelope containing the
- program disk. There is also, printed on a separate sheet among the
- various papers enclosed with the program, a license agreement
- containing a clause that prohibits you from selling it. The document
- of agreement states that the software publisher is retaining the
- title to the software. Can you be successfully prosecuted for
- violating the license agreement if you sell the program?
- ___ (22) You are licensing the use of a computer program and are
- provided with a 5 1/4" disk and a 3 1/2" disk, both of which contain
- the same program. The license agreement states that you cannot use
- these two disks simultaneously on different computers. Can you be
- successfully prosecuted for violating the license agreement if you
- fail to obey this restriction?
- ___ (23) You purchase a computer program which is recorded on
- both a 5-1/4" disk and a 3-1/2" disk that are contained in a plain,
- sealed envelope inside the software package. You are not able to use
- the 3-1/2" disk and therefore give it to a friend. Impatient to use
- the program, you do not open the instruction manual before you load
- the program from the 5-1/4" disk into your computer. Later, during
- the use of this program, you decide to look up in the manual some
- point about the operation of the program. Upon opening the manual,
- you find a license agreement inside, which prohibits you from using
- both disks simultaneously on separate computers. Have you violated
- ANY law by giving away the 3-1/2" disk?
- ___ (24) You purchase the title to an upgrade of a computer
- program but are not required to exchange the earlier version for the
- upgraded version. Do you violate ANY law if you sell the earlier
- version, for which you no longer have any use?
- ___ (25) You work for a newspaper and are preparing to write an
- article about a particular computer program. Your friend, who is
- licensing the use of a copy of this program, makes a copy and gives
- it to you for your use in preparing this article. The license
- agreement restricts the use of the program to one CPU at a time. Is
- either of you guilty of violating ANY law?
- ___ (26) You are licensing the use of a program and the license
- agreement prohibits you from disassembling the program source
- code. Do you violate ANY law if you fail to heed this prohibition?
- ___ (27) You are licensing the use of a computer program and the
- license agreement prohibits you from exporting the software to a
- country to which the United States bans such exports. Can you be
- successfully prosecuted for violation of the agreement if you export
- the software?
- ___ (28) Do you violate the copyright law by renting a computer
- program to which you own the title?
- ___ (29) You have received a free copy of a copyrighted program
- over an electronic bulletin board. The operator of the bulletin board
- has been given permission by the copyright owner to distribute the
- program in this manner. You are also warned in an accompanying
- notice that you are not permitted to sell this copy. Do you violate
- ANY law by selling the program against the wishes of the copyright
- owner?
- ___ (30) Do you violate the copyright law by making a backup copy
- of an unprotected (i.e., not copy-protected) program and lending it to
- a friend, without charge, while retaining but not using the original
- copy as long as your friend is in possession of the borrowed backup
- copy?
- ___ (31) You are licensing the use of a computer program and the
- license agreement contains a clause which states that you must
- destroy a backup copy that you have made if you sell the program. Do
- you violate ANY law if you sell the program and transfer, along with
- the original copy, an exact copy which you made for backup
- purposes?
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ANSWERS
-
- The "Section" numbers referred to in these answers refer to the
- applicable portions of the copyright laws.
- (01) NO:
- Your right to make backup copies of a program under Section 117 is
- not affected by the presence of copy-protection nor by the number of
- copies of the program which you own.
- (02) NO:
- Paragraph (2) of Section 117 contains the phrase: "all archival
- copies are destroyed." The closing paragraph of Section 117
- contains the phrase: "the copy from which such copies were
- prepared." The CONTU report that provides the intent of this statute
- also contains the phrase: "and to prepare archival copies of it."
- Since you are permitted to make more than one backup copy, it
- follows that you may have more than one copy on hand at one time.
- (03) NO:
- The intent of Section 117 of the copyright law is to protect the
- purchased copy of the program from damage by mechanical or
- electrical failure. This is most easily accomplished by the day-to-
- day use of a backup copy in place of the purchased copy.
- (04) NO:
- The opening sentence of Section 117 contains the phrase: "to make or
- authorize the making of."
- (05) NO:
- Since a program that is "altered" by modifying or removing the
- scheme of copy-protection cannot be distinguished in its operation
- from the original program from which it was prepared, it contains
- all of the information about the content of the copyrighted material.
- Hence it may be transferred along with the original copy; in
- accordance with the transfer provision of Section 117, it is an
- "exact" copy of the program.
- (06) NO:
- The adaptation and/or modification of a copyrighted work belongs
- within the exclusive province of the federal copyright law and
- cannot be restricted within an agreement.
- (07) YES:
- Since the simultaneous use of unauthorized copies in an educational
- setting negatively impacts the market for the program, it violates
- the doctrine of "fair use."
- (08) NO:
- In order to use a single program on several computers
- simultaneously, you must make copies (either permanent or
- temporary, via a network) of that program. Since the making and/or
- use of copies is regulated under the copyright law, such conduct
- cannot be restricted within a license agreement.
- (09) YES:
- Section 109(d) permits the one who owns the title to a program to
- control its transfer by means of an agreement.
- (10) NO:
- Section 109(a) permits the one who owns the title to a computer
- program to transfer it without the permission of the copyright
- owner. Section 109(b)(1)(A) does not prohibit the one who owns the
- title from lending the program without charge; rather, it forbids the
- lending of software for the purpose of direct or indirect commercial
- advantage.
- (11) YES:
- A hard disk copy is equivalent to a backup copy which is used as a
- working copy in place of the original copy. Thus using a single
- program simultaneously from several hard disks is equivalent to the
- simultaneous use of backup copies. This is forbidden by the doctrine
- of "fair use" in Section 107, due to the negative impact upon the
- market for the program.
- (12) NO:
- Since you rightfully own two copies of the program, you do not
- violate the copyright law by using these copies as you see fit,
- despite the labeling by the software publisher of one of the copies
- as "archival" or "backup."
- (13) YES:
- Since you do not own the title to the program, you must obey any
- restrictions imposed by the title owner upon the use of publisher-
- furnished copies of the program.
- (14) NO:
- Section 109(a) permits the title owner to transfer either disk,
- without regard to its labeling.
- (15) NO:
- Mere possession of an "orphaned" copy does not violate the copyright
- law, since its intended use may qualify for a "fair use" exception. If
- there is no "fair use" exception, the purchased original from which
- the copy was prepared may have been destroyed, in which case the
- use of the orphaned copy does not violate the copyright law.
- (16) NO:
- Since the making of backup copies is regulated under the copyright
- law, this conduct cannot be restricted within a license agreement.
- Since Section 117 does not limit the number of backup copies which
- can be made, you are not guilty of copyright infringement if you
- make more than a single backup copy.
- (17) NO:
- Section 117 places no limit upon the number of backup copies which
- can be made.
- (18) NO:
- The creation of a derivative work is regulated under the copyright
- law and cannot be restricted within a license agreement.
- (19) YES:
- Under Section 106, the copyright owner has the exclusive right to
- create a derivative work.
- (20) NO:
- Since matters involving the copyright notice are regulated under the
- copyright law, your failure to heed a copyright notice requirement
- imposed by the software publisher cannot be prosecuted as a
- violation of the agreement. Since you may make backup copies, free
- from any requirement to add anything to whatever copyright notice
- might exist on the original copy, you do not violate the copyright law
- by failing to supplement the copyright notice that exists on the
- original copy.
- (21) NO:
- Since you were able to access the program disk without being aware
- of the existence of a license agreement, the execution of the
- agreement is defective. Therefore you have purchased the title to
- the program, even though the so-called "license agreement" states
- that the software publisher is retaining the title. Thus you are free
- to sell the program without his permission, in accordance with the
- provisions of Section 109(a).
- (22) YES:
- Since you do not own the software, you are bound to obey and use
- restrictions which are imposed upon you by the one who owns the
- title.
- (23) NO:
- You own the title to the software since you were able to gain access
- to the program without being aware of the existence of both a
- license agreement and the fact that the software publisher is
- retaining the title. Any so-called "license agreement" which appears
- only in the instruction manual and is not referenced before you can
- gain access to the program disk is not a valid document of
- agreement. Hence you are free to transfer either one or both of the
- disks without permission from the copyright owner.
- (24) NO:
- Since you are not licensing the use of the program, Section 109(a)
- permits you to sell EITHER version of the program without the
- permission of the copyright owner.
- (25) NO:
- Since the making and/or use of copies is regulated under the
- copyright law, this conduct cannot be restricted within a license
- agreement. You are not guilty of violating the copyright law, since
- the copyright law permits the use of an unauthorized copy for
- journalistic use under the doctrine of "fair use."
- (26) NO:
- Disassembly of a program may be required as one step in creating a
- derivative work, which is conduct that is regulated under the
- copyright law. Hence disassembly cannot be prohibited within a
- license agreement. Yet the mere act of disassembling a computer
- program does not, in itself, constitute the creation of a derivative
- work. Hence you may do so without violating the copyright law.
- (27) NO:
- The export of software is regulated under federal law. Hence it
- cannot be prohibited within a license agreement.
- (28) YES:
- Section 109(b)(1)(A) prohibits the rental of software, whether or
- not you own the title to it.
- (29) NO:
- You have acquired the title to the software, by virtue of the method
- which you have obtained it. Section 109(a) permits the one who
- owns the title to a computer program to sell it without the
- permission of the copyright owner.
- (30) YES:
- Section 117 requires that any backup copy that is transferred must
- accompany the original copy from which it was prepared.
- (31) NO:
- The transfer of backup copies is regulated under the copyright law
- and cannot be restricted within an agreement. You are not guilty of
- copyright infringement, since Section 117 permits any exact copies
- to be transferred along with the original from which they were
- prepared.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Read all about it in "THE COPYRIGHT GAME, ETC.--A Strategic Guide
- for the Computer Software User," by Albert Silverman. ISBN
- 0-9527435-1-8. 330 pages in nominal 8-1/2"x11" format,
- softbound with an attractive cover.
-
- What is the purpose of this book? Replacing the legal Mumbo-Jumbo
- with plain English, it provides an all-inclusive, detailed, and
- impartial explanation of the computer software copyright laws,
- using past court cases for clarification of obscure language in the
- written letter of the law. Since there is NO commercially-generated
- distortion, it is likely that you will find some surprises; i.e., which
- run contrary to the industry's self-serving "interpretation" of the
- law. Thoroughly debunked is the industry's attempt to pirate your
- legal rights by the use of a phony "licensing strategy." Included is a
- detailed and entertaining analysis of several leading Software
- License Agreements. In summary, you are provided with sufficient
- and accurate information (i.e., the legal FACTS) to permit you to
- handle your computer software in the manner intended by the U.S.
- Congress, while safely ignoring those industry perversions of the
- law which seek to gain for it an unfair advantage--at YOUR expense.
- Exposed in great detail is the outrageous software industry piracy of
- the legal rights of unsophisticated software users (directed by
- unconcerned educational administrators) within the California
- public schools. For the first time ever, this well-hidden scheme has
- been unearthed (with supporting and incriminating documentation
- from my extensive research into the inner educational sanctum) and
- is being made public. Although this ongoing effort is particularly
- well-organized in California, the premier "computer state," it
- blankets the entire nation, leaving no educational level uncovered.
-
- The disastrous result of this exceptionally cozy relationship
- between the computer software industry and the California
- Department of Education is explained. If you are at all concerned
- about the way in which this illicit educational-commercial
- "partnership" affects the integrity of computer education in your
- public schools and drains away your tax money to line the software
- industry's pockets with unwarranted profits, this book is essential
- reading.
-
- What will NOT be found in this book? Since its sole purpose is to
- ensure that you understand precisely what conduct is required for
- your (simultaneous) compliance with federal copyright law and state
- licensing law, there are no sermons about your "moral" or "ethical"
- obligations. That is, it is only your hard and fast LEGAL obligations
- which are addressed. The industry's "moral suasion" is most often
- an attempt to get the software user to obey the law; i.e., it is a
- substitute for the economically-unfeasible prosecution of small-
- scale violations of the copyright law. On the other hand, there may
- also be a piratical attempt to make an end-run around the law. That
- is, when there is NO ground for legal action against the software
- user, the industry may seek to gain its own way, either by shaming
- the user with claims of immoral and/or unethical conduct or by the
- use of a phony (and usually coercive) "license." This book sorts it
- all out for you.
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- The price of $19.92 (check or money order) includes $4.50 for
- handling, shipping by UPS, and sales tax if shipped to a California
- address. A street address is required for shipping purposes. Off-
- the-shelf delivery from:
- INTELLOGIC PRESS
- P.O. Box 3322
- La Mesa CA 91944
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Any questions? If you want information about the subject matter of
- this article, or if you want more information about my book, send me
- a message by GE Mail. My GEnie mail address is A.SILVERMAN4.
- Or you may write to me at the above address, enclosing a stamped, self-
- addressed envelope if you would like a reply.
-
- ------------------------------
-
- Date: Sun, 11 Oct 92 16:44:51 -0400
- From: sross@CRAFT.CAMP.CLARKSON.EDU(SUSAN M. ROSS)
- Subject: File 5--Correction on Clarkson article in CuD #4.46
-
- In CuD #4.46 (September 27, 1992) File #4 was a reprint of the most
- recent Clarkson Closeup with a question about the "CompuServe Case"
- mentioned in the "Close-up" write-up. There are inaccuracies in the
- description of the case which may be the reason the case sounded like
- news to Rob Woiccak -- and, perhaps, others. The alleged nature of the
- objectional language was defamatory rather than obscene and the
- material appeared in an independent newsletter "Rumorville" a "gossip"
- feature about broadcast journalists. The alleged offense was
- disparaging comments made about another "gossip" feature called
- "Skuttlebut." This was the case in which Judge Leisure ruled that
- CompuServe, like a library or bookstore, is not considered responsible
- for what it carries. Therefore, CompuServe won its fight to be removed
- from the suit. I never learned whether the complaint against the
- "writer" of "Rumorville" was pursued further. I believe his name is
- Mr. Fitzpatrick. Does anyone know the outcome of the case?
-
- Thank you for letting me attempt to correct the inaccuracies. And
- thanks, Rob, for taking notice and suggesting sources of information.
- A first paper on my research will be presented at a conference later
- this month.
-
- Susan Ross, Technical Communications
- Clarkson U. (sross@craft.camp.clarkson.edu)
-
- P.S. Another case about which I'd be interested in additional info is
- Alana Shoars vs Epsom, a case I believe to have been about
- employer electronic monitoring of an employee or employees.
-
- ------------------------------
-
- Date: 11 Oct 92 15:58:19
- From: Moderators (tk0jut2@mvs.cso.niu.edu)
- Subject: File 6--Is Cyberspace a "Culture?"
-
- The following comments may be of interest primarily to social
- scientists, especially students doing research. They derive from
- discussions especially with grad students and a professors who have
- experienced difficulty in convincing potential dissertation committee
- members or editors that cyberspace constitutes a "culture" and is,
- therefore, a legitimate topic for research for cultural analysis.
- Ethnographers--those who study the meanings of a culture from the
- natives' point of view--seem especially vulnerable to the criticism by
- outsiders that little in the net-world is of cultural significance.
- Although based on ignorance of the nets, this criticism dismisses as
- legitimate the intents of potential scholars. These comments are
- simply an attempt to provide the initial basis for the question: "Can
- studies of cyberspace be cultural or ethnographic?"
-
- The concept of "culture" is one of the broadest and vaguest in use by
- social scientists. Whether a given group does or does not constitute a
- culture is usually a determination made by the researcher. Although
- I'm not convinced that culture is simply anything a researcher says it
- is, I do agree that it is an ambiguous concept. At a minimum, a
- "culture" includes some identifiable set(s) of norms, language,
- expectations, boundary mechanisms, identity formation processes,
- entry/exit rituals, and other identifying symbolic artifacts and
- social processes that link participants. A culture of "garage sales,"
- "bar rooms," "little league baseball," or BBSes would surely qualify
- as a culture. As would some specific newsgroups or "the internet
- culture."
-
- If we define culture broadly as a complex system of signs and codes,
- then the def of Van Maanen and Barley is useful:
-
- In crude relief, culture can be understood as a set of solutions
- devised by a group of people to meet specific problems posed by
- situations they face in common. . .This notion of culture as a
- living, historical product of group problem solving allows an
- approach to cultural study that is applicable to any group, be it
- a society, a neighborhood, a family, a dance band, or an
- organization and its segments.
-
- For social ethnographers, Chicago School ethnography provides the basic
- model for how cultural studies of micro-cultures (or subcultures)
- within a broader culture might proceed. Named after the University of
- Chicago, where anthropological culture methods analysis were applied
- to small-scale urban scenes in the 1920s and 1930s, the Chicago
- School of ethnography emphasized, but was not restricted to,
- participation with and interviews of participants in the chosen
- research site. There are some who feel that cyberspace is not only not
- a culture, even if it were it could not be studied as one because of
- the absence of face-to-face contact.
-
- In my view, the judgment that "Chicago school ethnography" is limited
- to taxi-dance halls or hookers in hotels, as it is for many
- conventional Chicago school adherents is abysmally narrow. Early
- Chicago ethnographers illustrated how documents can be used to
- reconstruct cultural processes and meanings (eg, The Polish Peasant),
- suggesting that cultural artifacts hardly need depend on participant
- observation. More recent Chicago-influenced ethnographers, such as the
- "Chicago Irregulars" of the 1960s and their followers, have expanded
- the data sources dramatically. Hence, neither the method (participant
- observation ((PO)) nor the data source (a face-to-face setting) are
- the defining characteristics of ethnography.
-
- However, even if PO were a necessary criterion (which it's not), then
- BBS/cyber-related research could certainly qualify. It should also be
- noted that the early Chicago ethnographers themselves revised the
- then-conventional view of ethnography as defined primarily by
- anthropologists as they applied broad cultural studies to a more
- narrow urban scene. Changing technology creates and opens up for
- analysis new terrains that were not anticipated by the "originals." A
- "hacker culture," for example, cannot be studied by hanging out in a
- conventional locale requiring f2f interaction, which changes the
- definition of PO, which normally presumes f2f interaction.
-
- Cyber-culture (culture that exists in an electronic medium) provides a
- number of artifacts by which to establish "the meaning of activity from
- the participants' point of view"--on-line interactions (logs),
- newsletters and other documents, clothes (t-shirts) and other stuff by
- which to "read off" and analyze it. The works of semioticians and
- postmodernists expand theoretical and conceptual methods by which to
- do this (for those who want to move beyond the past).
-
- Guess if I had to make a short response to editors or others who
- claimed that analysis of cyber-culture is not (Chicago) ethnography,
- it would be "Get a clue!"
-
- Comments?
-
- ------------------------------
-
- End of Computer Underground Digest #4.50
- ************************************
-