13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

communication while it is in electronic storage in such a system.48Database developers have also sought protection under theLanham Act. Claims for false designation <strong>of</strong> origin under section43(a), passing <strong>of</strong>f, and trademark dilution under section 43(c) arepotential causes <strong>of</strong> action for database developers againstpirates.49 When the source and reliability <strong>of</strong> data is significant tothe intended users, these Lanham Act claims may proveefficacious.With the enactment <strong>of</strong> the Digital Millennium Copyright Act(DMCA) <strong>of</strong> 1999,50 yet another form <strong>of</strong> protection becameavailable to database producers. The DMCA implements theWorld Intellectual Property Organization Copyright Treaty51 byprohibiting circumvention <strong>of</strong> copyright protection systems andprotecting the integrity <strong>of</strong> copyright management informationsystems, including terms and conditions for use <strong>of</strong> a work.52 Theanti-circumvention provision <strong>of</strong> the DMCA prohibits (1) thecircumvention <strong>of</strong> technological measures that effectively controlaccess to or a work protected under U.S. copyright law and (2) themanufacture <strong>of</strong>, importation <strong>of</strong>, <strong>of</strong>fering to the public <strong>of</strong>, providing<strong>of</strong>, or trafficking in any technology, product, service, device,component, or part there<strong>of</strong>, that is primarily designed or producedfor the purpose <strong>of</strong> circumventing either anti-access or anti-copyingtechnological measures.53 The copyright managementinformation provision prohibits the unauthorized removal oralteration <strong>of</strong> copyright management information or providing,distributing, or importing for distribution, false copyrightmanagement information, which is defined to include any termsand conditions for use <strong>of</strong> the work.54The DMCA explicitly limits its prohibitions to circumvention<strong>of</strong> technological measures that effectively control access to or48. Id. § 2701(a). An “electronic communications service” is defined as “anyservice which provides to the users there<strong>of</strong> the ability to send or receive wire orelectronic communications,” id. § 2510(15), while the term “electronic storage” isdefined as “any temporary, intermediate storage <strong>of</strong> a wire or electronic communicationincidental to the electronic transfer there<strong>of</strong> . . . .” Id. § 2510(17).49. 15 U.S.C. § 1125(a) (1994).50. 17 U.S.C. § 1201 (Supp. IV 1998).51. The World Intellectual Property Organization Copyright Treaty, Apr. 12,1997, S. Treaty Doc. <strong>No</strong>. 105-17 (1997).52. 17 U.S.C. §§ 1201, 1202 (Supp. IV 1998).53. Id. § 1201.54. Id. § 1202.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!