13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

or policies upon which the contractual regime is founded.Overall, let me make this simple point. Contract is a vitalstrategy in creating and defining digital property.V. TECHNOLOGICALLY DEFINED DIGITAL PROPERTYMore and more, technology is being used as a means <strong>of</strong>regulating our behaviour in relation to informational products. Inhis seminal book, Code and Other <strong>Law</strong>s <strong>of</strong> Cyberspace,375Stanford <strong>University</strong> law pr<strong>of</strong>essor Larry Lessig highlights how thedigital environment is not a given, but rather a construction <strong>of</strong>code writers. The “nature” we inhabit in the digital world is oneconstructed through technology and technologists. In Lessig’stheory, there are four modalities <strong>of</strong> regulation: customary norms;the market; law; and architecture. If I want to stop someone fromspeeding, I can employ the four modalities <strong>of</strong> regulation byencouraging a customary norm that speeding is bad through:advertising; raising the price <strong>of</strong> petrol; enacting a law to sayspeeding is an <strong>of</strong>fence; and building a restraining architecturesuch as a mechanical limit in the car or speed bumps. It is assimple as speed bumps. Just as architecture in real space canconstrain our action, Lessig explains architecture in the digitalworld (code) can regulate what we do.Therefore, instead <strong>of</strong> relying solely on law (e.g., copyright law)to protect my informational value (e.g., s<strong>of</strong>tware), I shouldconsider what technological mechanisms are available to regulateaccess and use <strong>of</strong> my informational product. The big players havealready begun this process and we will hear more and more aboutthe role encryption will serve in the distribution <strong>of</strong> digitalentertainment informational products through a framework <strong>of</strong>digital rights management. And while many advocate thattechnological restraints need to be principled and give balancedaccess to the public—in the way copyright legislation does—thelegislatures have enacted laws like the DMCA in the UnitedStates and the Copyright Amendment (Digital Agenda) Act inAustralia that serve to buttress technological constraints bymaking it a crime to deal in or provide devices that circumventtechnological protection measures. These types <strong>of</strong> laws, combinedwith code, will make technological protection measures crucial in375. Lessig, supra note 42.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!