13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the new environment.For example, the latest version <strong>of</strong> a popular s<strong>of</strong>tware productcontains technological or coded restraints that make it verydifficult to copy and load the s<strong>of</strong>tware on to a second machine.This technological constraint is designed to enforce copyright inthe s<strong>of</strong>tware. Likewise, DVDs are distributed with anti-copyingCSS encryption, which will only allow them to be accessed throughan authorised player. Some fear that coded restraints couldbecome a law unto themselves and slant protection too far infavour <strong>of</strong> the property holder.The Reimerdes case highlights the notion <strong>of</strong> “code as law.”376The thrust <strong>of</strong> Lessig’s argument, in contrast to that <strong>of</strong> early digitallibertarians, was that governments should regulate cyberspace tocounteract the negative effects <strong>of</strong> code.377 He argued that thepublic values inserted into everyday life by legislation and thecommon law (for example the fair use doctrine in copyright law),were at risk in a code based world where private corporationsregulated activity according to their private values.378 The world<strong>of</strong> code needed to be infused with public values through law. TheDMCA, in essence, does the opposite, in that it is a law that hasbeen enacted to preserve the power <strong>of</strong> the code by prohibitingpeople from breaking through or cracking code. In Lessig’sschema, there should now be another law that sits on top <strong>of</strong> theDMCA that inserts values into the system.Imagine a world where an informational product can bedistributed to the consumer in a way that copying <strong>of</strong> and access tothe informational product can be severely restricted. Imagine aworld in which chapters <strong>of</strong> a book can be downloaded or streamed,but not printed or copied. In this type <strong>of</strong> scenario, or “pay-perview”world, encryption will be used as the technologicalmechanism for limiting use <strong>of</strong> informational products. A largenumber <strong>of</strong> people are concerned that such a state <strong>of</strong> affairs wouldlead to the demise <strong>of</strong> our current fair use rights to copy a chapter<strong>of</strong> a book or to read a book in a library. It could be argued that weshould jettison fair use rights and reconceptualize the way publicinterest will be served in a world <strong>of</strong> code. Perhaps things mightwork better without fair use and that holding on to such a376. See id.377. See id.378. See id.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!