You are on page 1of 10

Ethics and Information Technology 2: 201–209, 2000.

© 2001 Kluwer Academic Publishers. Printed in the Netherlands.

The Privatization of Information Policy

Niva Elkin-Koren
University of Haifa School of Law, Mount Carmel 31905, Haifa, Israel

Abstract. Copyright law in recent years has undergone a process of privatization. While weakening the enforce-
ability of conventional legislation (copyright rules), cyberspace facilitates alternative types of regulation such as
contracts and technical self-help measures. Regulation by the code is significantly different from traditional types
of public ordering (copyright law) and private ordering (contracts). Norms that technically regulate the use of
information are not merely self-made they are also self-enforced. Furthermore, the law was recruited to uphold
the superiority of such technical self-help measures. The recently adopted U.S. Digital Millenium Copyright Act
(DMCA) 1998 prohibits the development and use of technologies designed to circumvent copyright management
systems. The underlying assumption of this legislation is that in Cyberspace, the target of regulation should
become the technologies that affect users’ behavior rather than the behaviors themselves. This paper critically
examines this regulatory approach and highlights its shortcomings.

Key words: copyright, information policy, privatization

Introduction ing such systems against any competing technology.


The law prohibits the development and use of tech-
In his 1994 seminal paper “The Economy of Ideas” nologies designed to circumvent protection measures
John Perry Barlow proclaimed the end of copyright employed by rightholders to control access to infor-
law. It is inevitable, he argued, that the current system mation distributed digitally. The privileged status
of intellectual property law would collapse. A law that awarded to copyright management systems under the
is based on the physical parameters in which intel- DMCA gives rightholders much stronger legal protec-
lectual property protection has resided is incompatible tion than the rights they hold under traditional copy-
with the virtual environment of cyberspace. The chal- right regime.2
lenges created by digital technology are simply too Privatization by technology introduces a unique set
great to be overcome by existing laws. of issues. While both contracts and copyright manage-
Copyright law, as we know it, may indeed come ment systems are self-help means, contracts must be
to an end, yet for very different reasons than those enforced by courts, and may therefore be subject to
predicted by Barlow. Copyright law was never over- legal review. Courts could potentially mitigate any
thrown by digital technology. Instead it was recruited negative effects of contracts on information policy by
to uphold the superiority of technologies that facil- applying existing legal doctrines on a case-by-case
itate control over access and use of information. basis.3
Digital distribution extensively enhances the ability 2 See Pamela Samuelson. The Copyright Grab. Wired, 4.01,
of rightholders to control the use of their informa-
January 1996.
tion. Copyright management systems allow owners 3 Mark A. Lemley. Symposium: Beyond Preemption: The
to physically control and manage information and Law and Policy of Intellectual Property Licensing. California
to set the terms of use by means of contracts. Law Review, 87: 111–172, 1999; Lorin Brennan. The Public
Consequently, the copyright landscape is displaced by Policy of Information Licensing. Houston Law Review, 36:
privately generated norms, the enforceability of which 61–119, 1999; this approach was also adopted by the drafters
is supported by legislation. The law has never really of UCITA as further discussed below. Elsewhere I argued,
abandoned the copyright scene in cyberspace. Indeed however, that current contract law is ill-equipped for address-
the recently enacted U.S. Digital Millennium Copy- ing the threats raised by such licensing strategies to the public
right Act (DMCA)1 introduces novel rights related domain. See Niva Elkin-Koren. A Public Regarding Approach
to copyright management systems that are protect- to Contracting Copyrights. In Rochelle Dryfuss and Dianne
Zimmerman, editors, Expanding the Bounds of Intellectual
1 Digital Millennium Copyright Act, Pub. L. No. 105-304, Property: Innovation Policy for the Knowledge Society. Oxford
112 Stat. 2860 (1998) (“DMCA”). University Press, forthcoming 2000.
202 N IVA E LKIN -KOREN

Right management systems are not subject to any their works, they would lack sufficient incentives to
equivalent legal scrutiny. Quite the contrary. Protec- create. While the narrative of the individual author is
tive technologies are self-enforced. Moreover, once still proclaimed, the modern reality of copyright law
adopted by a rightholder, these technological self- is concerned with providing incentives to the content
help means are no longer vulnerable to circumvent- industries.6
ing technologies because these technologies are now Copyright law secures incentives by granting copy-
prohibited by law. right owners the legal right to exclude others from
This paper critically examines the regulatory using their materials. For instance, distributing copies
approach adopted by the DMCA. It argues that this of a computer program by email may infringe upon
law overlooks the unique regulatory environment that the exclusive rights of copyright owners to repro-
exists in cyberspace. Cyberspace is not merely a duce and publicly distribute the work. Copyright law
web of interconnected communication networks in the further affects access to information by defining the
technical sense. It also constitutes a complex web privileges of users with respect to copyrighted works.
of norms that regulate behavior. This web of norms For instance, the use of copyrighted materials for the
is comprised of laws generated by territorial states; purpose of criticism would usually be privileged under
contracts that rely on a state’s enforcement institu- fair use doctrine.
tions, netiquette and, finally, norms embodied in the Cyberspace challenges traditional regulation by the
technology itself. The technical means that regulate territorial state. Conventional enforcement by the state
the use of information in cyberspace are not merely is much less effective in cyberspace, where it is
self-made; they are also self-enforced. As such they always possible to cross geographical boundaries or
pose distinctive challenges to traditional regulatory to disguise the physical identity of the infringer.7 The
framework. enforcement of copyright law becomes particularly
difficult due to the low cost of copying and distribut-
ing information on the net. Tracking down copyright
The privatization of copyright law violators and taking legal action becomes prohibitively
expensive.
Copyright law in recent years has undergone a process Yet while weakening the enforceability of conven-
of privatization. The use of information is no longer tional legislation (copyright rules), cyberspace facilit-
governed by legislation alone; it is also regulated by ates alternative types of regulation. The terms of use
private parties acting in the market. for information in cyberspace are increasingly defined
Not long ago it was copyright alone that defined by contracts. Content providers are increasingly rely-
the terms of use for information. Copyright law itself ing on standard form contracts for expanding the rights
is a property rule defined by the legislative bodies granted to them under copyright law. The pervasive
of territorial states and applied by their enforcement use of form contracts for distributing content is chan-
systems. It provides owners with the legal power to ging the terms of access to information. Contracts
control access to their works by granting them a set are employed to restrict or prohibit altogether certain
of exclusive rights to use their copyrighted materials.4 uses of the work that are otherwise permissible under
The standard justification of copyright law perceives it copyright law.
as a response to a market failure.5 This instrumental- For instance, a contractual provision may limit
ist perspective views the purpose of law as providing the use of search results, which are factual infor-
sufficient incentives to invest in the production of mation that may not be copyrighted.8 Copyright law
content. The traditional copyright narrative assumes currently offers limited protection to search engines.
that since authors cannot effectively control the use of The results returned by a search engine in response to
4 Section 106 of the 1976 Copyright Act defines the set of a user’s query are facts indicating the URLs of web
pages that match the user’s request. Facts, as such,
exclusive rights granted to copyright owners under the law: the
exclusive right to reproduce, prepare derivative works, distrib- are not protected by copyright law and are purposely
ute copies to the public, publicly perform, and publicly display left in the public domain. Metacrawlers, which enable
the copyrighted work. See 17 U.S.C. § 106 (1976). 6 Debora J. Halbert. Intellectual Property in the Informa-
5 See Paul Goldstein. Copyright (2nd ed.). Little, Brown,
tion Age: The Politics of Expanding Ownership Rights. Quorum
Boston, 1996, §§ 1.14–1.15, pp. 1:40–1:45. Other justifications Books, Westport, Connecticut, 1999.
emphasize the natural rights of the author in her work reflecting 7 I. Trotter Hardy. The Proper Legal Regime for ‘Cyber-
her personality or her entitlement to receive just reward for her space’. University of Pittsburgh Law Review, 55: 993–1055,
labor. See Kevin Garnett, Jonathan Rayner, Gillian Davies, edit- 1994.
ors. Copinger and Skone James on Copyright (14th ed., volume 8 Feist Publications v. Rural Tel. Services, 499 U.S. 340, 111
one), Sweet & Maxwell, London, 1999, para. 2–04, p. 29.
S.Ct. 1282, 113 L.Ed.2d 358 (1991).
T HE P RIVATIZATION OF I NFORMATION P OLICY 203

users to submit their query to several search engines imposes a heavy burden on providers, requiring them
simultaneously, threaten to reduce potential revenues to exercise legal discretion ascertaining whether any
received by search engines from advertisers who pay particular content is infringing. To reduce liability
according to the number of hits on the page where the providers have exercised inspection policies to monitor
banner is posted. Thus, search engines seek to restrict and supervise the use of content.
the use of their output by Metacrawlers. Therefore, Recent legislation, which created “safe harbors”
many license agreements of search engines limit the for online service providers, further induces private
license to personal use and prohibit automated queries enforcement policies by intermediaries. Even though
and use for commercial purposes.9 Similarly, soft- the DMCA imposes no duty to monitor the service
ware licenses may prohibit reverse engineering of the for copyright infringements,13 it requires providers to
computer program. Such provisions, if enforceable, implement enforcement policies. Under safe harbor
may restrict users from accessing unprotected parts provisions of the DMCA, online service providers14
of the program or developing legitimate compatible are exempt from liability for infringing materials
products.10 posted by others on their system, provided that they
The pervasiveness of license agreements reflects undertake some enforcement responsibilities.15 To be
one form of privatization of information policy. eligible for the exemptions, an online service provider
Indeed, contracts apply only to the parties of the agree- must accommodate the technical measures adopted by
ment. Yet when the content distributed is subject to copyright owners, adapt a copyright policy that would
standard form contracts, the applicability of such terms allow termination of users who are repeat infringers,
is universal. The technical ability to make access to and handle infringement complaints by an appointed
informational products contingent upon accepting the Copyright Agent implementing a “Notice and Take-
terms of a license allows information providers to Down Policy.”16
govern the use of information by standardized terms By implementing copyright enforcement policies,
of use. online service providers are enrolled in protecting the
Enforcement itself is also privatized. New inter- interests of rightholders. Thus enforcement functions,
mediaries are becoming potential players in the once performed exclusively by courts and the police,
enforcement process. Online service providers may are increasingly assigned to online service providers.17
often control a gateway to their system or services. Aware of the downsides of delegating such discretion
Consequently, providers may technically monitor the and monitoring responsibilities, the U.S. Congress and
content posted on their facility and detect copyright courts limited the liability of online service providers
infringements. This potential for monitoring made for other types of harm caused by their users, such as
online service providers a particularly attractive target harm caused by defamatory statements.18
for rightholders seeking enforcement of their copy- 13 17 U.S.C.A. § 512(m) (“Nothing in this section shall
rights. Consequently, during the 1990’s online service
be construed to condition the applicability of subsections (a)
providers were increasingly exposed to legal liab- through (d) on – (1) a service provider monitoring its service or
ility for copyright infringement committed by their affirmatively seeking facts indicating infringing activity, except
users. Several courts in the United States held online to the extent consistent with a standard technical measure
providers liable under copyright law, primarily under complying with the provisions of subsection (i);”).
the legal doctrines of “vicarious liability” or “contrib- 14 Online Service Providers are broadly defined by the
utory liability,” which hold liable a party who helps DMCA to cover “(a) An entity offering the transmission, rout-
someone else infringe copyright under certain circum- ing, or providing of connections for digital online communica-
stances.11 Several courts in Europe have reached tions between or among points specified by a user, of material
similar outcomes.12 The potential copyright liability of the user’s choosing without modification as to the content
to the material as sent or received; and (b) Provider of online
9 See, e.g., the terms of service of Google.com at www. services or network access, or the operator of facilities therefor”
google.com/terms_of_service.html; Yahoo! (docs.yahoo.com/ 17 U.S.C Section 512(k)(1) (1998).
info/terms – term 10); AltaVista (doc.altavista.com/legal/ 15 17 U.S.C Section 512 (1998) (“Limitations on liability
termsofuse.html) (last visited on August 2000). relating to material online”).
10 Sony Computer Entertainment v. Connectix Corp., 203 16 17 U.S.C Sections 512(a)–(d), and (i) (1998).
F.3d 596 (9th Cir. 2000). 17 See, for instance news.cnet.com/news/0-1007-200-
11 Religious Technology Center v. Netcom Online Communi-
1995157.html?tag=st.ne.1.srchres.ni (reporting claims against
cation Services Inc, 907 F. Supp 1361 (N.D. Cal. 1995); Sega eBay for censoring the sale of products copyrighted by
Enterprises v. Maphia, 948 F. Supp. 923 (N.D.Cal 1996). Microsoft).
12 Scientology, President of District Court of Hague, 12 18 Communications Decency Act 1996, 47 U.S.C 230(c)(1)
March 1996. See Koelman, Online Intermediary Liability, at (“no provider or user of an interactive computer service shall be
20–21. treated as the publisher or speaker of any information provided
204 N IVA E LKIN -KOREN

Finally, the technology itself is employed to set cyberspace a computer program may simply prevent
limits on the use of information. Digital distribu- the creation of uncompensated copies by employing
tion allows information providers to define the terms copyright management systems,20 encryption, digital
of use for informational products, in the code that watermark or other types of technologies that restrict
provides them. The computer programs, communi- access. Such means may substitute reliance on copy-
cation design and network architecture that consti- right laws.
tute cyberspace, define the potential choices of action Technology in cyberspace allows efficient enforce-
available to information users. The same system that ment to a degree that never existed in the non-virtual
provides the service (such as the computer program world. Enforcement by the code involves relatively
that facilitates access to a website) also defines the lower costs than enforcement by the legal system. It
terms of access and usage by preventing some uses, avoids the costs of identifying, seizing and prosecuting
such as copying, and permitting other uses, such as violators and the administrative costs of maintaining
browsing. The distribution system may allow access to the legal enforcement system, such as the police and
information only after payments have been made. A the courts. While the costs of self-enforcement by
computer program may prevent the creation of copies the code are usually borne by users, the burden of
or may disable unauthorized copies. Only uses that are administrative costs involved in enforcing copyright
licensed by providers become technically available to law via the legal system would be distributed among
users. taxpayers.21
This type of regulation (by the code) is signific- Means for technological self-help also entail
antly different from traditional types of public order- perfect performance. Such means do not offer users
ing (copyright law) and private ordering (contracts). a choice of whether to go by the rule or to violate it.22
Rather than defining undesirable behaviors by law, or Terms of use implemented by technological means
providing incentives for a desirable behavior, regula- are automatically enforced. The architecture simply
tion by the code makes it possible to prevent certain prevents any undesirable behavior from occurring in
behaviors while allowing others.19 Copyright law the first place. Consequently, the level of enforce-
prohibits the creation of copies without authorization ment and its success do not depend on the extent to
by the copyright owner. A copier will pay the owner which the public comprehends and internalizes the
damages for the infringing copies she has made. In rules.23 Compliance is particularly crucial for copy-
by another information content provider”); Zeran v. AOL, 985 F. right law that creates abstract “fences” around virtual
Supp. 1124 (E.D.Va 1997), aff’d 129 F. 3d 327 (4th Cir. 1997); informational goods (such as musical compositions
Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998). and television broadcasts), which often lack phys-
19 See Lawrence Lessig. Symposium: Surveying Law and ical boundaries. Copyright law is therefore very much
Borders: The Zones of Cyberspace. Stanford Law Review, 48: dependent on compliance and self-restraint.24
1403–1411, 1996, 1407-08; Joel R. Reidenberg. Lex Inform- 20 See Tom W. Bell. Fair Use v. Fared Use: The Impact
atica: The Formulation of Information Policy Rules Through
Technology. Texas Law Review, 76: 553–593, 1998. These of Automated Rights Management on Copyright’s Fair Use
differences between the traditional system of law enforcement Doctrine. North Carolina Law Review, 76: 557–619, 1998.
21 Niva Elkin-Koren and Eli M. Salzberger. Law and
and enforcement by the code raise conceptual issues regarding
the notions of enforcement and regulations. The literature on Economics in Cyberspace. International Review of Law and
technological self-enforcement, regards the code as a type of Economics, 19: 553–581, 1999.
22 Joel R. Reidenberg. Lex Informatica: The Formulation
regulation. A preliminary question is whether it is justified to
talk about regulation by the code and enforcement by the code of Information Policy Rules Through Technology. Texas Law
as part of the law. Economic theory may treat technology as Review, 76: 553–593, 1998; Lawrence Lessig. Symposium:
simply design or an architectural constraint because the notion Surveying Law and Borders: The Zones of Cyberspace. Stan-
of regulation under economic analysis of law assumes a choice. ford Law Review, 48: 1403–1411, 1996.
23 Somewhat similar questions are addressed by social norms
The underlying assumption of the economic approach to rules
is that rational agents are able to control their behavior. They economic literature, see in Cass R. Sunstein. Emerging Media
are motivated by their wish to maximize their utility. Rules are Technology and the First Amendment: The First Amendment in
sometimes necessary to correct an otherwise distorted set of Cyberspace. Yale Law Journal, 104: 1757–1804, 1995; Mark A.
incentives (due to market failures), and provide individuals with Lemley. The Law and Economics of Internet Norms. Chicago-
appropriate incentives so they will choose to act efficiently. If Kent Law Review, 73: 1257–1294, 1998.
24 See Debora J. Halbert. Intellectual Property in the Infor-
a design simply prevents a certain behavior we can no longer
talk about regulations and incentives since there is no longer a mation Age: The Politics of Expanding Ownership Rights.
choice by individuals for the law to promote or prevent. See Quorum Books, Westport, Connecticut, 1999, pp. 93–94
Niva Elkin-Koren and Eli M. Salzberger. Law and Economics (discussing the significance of copyright narrative for establish-
in Cyberspace. International Review of Law and Economics, 19: ing a public basis for compliance, self-restraint and enforce-
553–581, 1999. ment).
T HE P RIVATIZATION OF I NFORMATION P OLICY 205

To the extent self-enforcement is perfect, it may implement the anti-circumvention provisions in the
reduce the price of information products. Consider, for 1996 Geneva Internet Treaties. The DMCA prohib-
instance, the price of copyrighted works. The price its the circumvention as well as manufacturing and
has to cover not only the large investment in creating distribution of technologies designed to circumvent
and marketing the work, but also the cost of enforce- protection measures employed by copyright righthold-
ment and the expected loss from failure to enforce the ers.26 The underlying assumption of this legislation
rights of the copyright holder. If the expected market is that in cyberspace, the target of regulation should
for a music publisher is substantially reduced due become the technologies that affect users’ behavior
to the creation of unauthorized copies, the publisher rather than the behaviors themselves.
will raise the price per copy in order to cover its Indeed, considering the significant market power of
expenses. If enforcement by the code prevents the the American Internet industry, the anti-circumvention
creation of unauthorized copies, it will reduce the price provisions are likely to become prevalent and shape the
of copyrighted works.25 online legal regime. Even if foreign legislators fail to
What are the implications of self-enforcing means adopt the new law, industry is likely to comply with the
for the legislators of territorial states? Should this U.S. legal requirements to minimize its legal exposure.
privatization leave the legislators out of the regulatory Title I of the DMCA amends U.S. copyright law
picture? The law is deeply involved in the enforce- by adding section 1201, which addresses circumven-
ment of contracts. For a contract to be enforceable tion of copyright protection systems. This section
it must comply with (minimal) legal requirements. prohibits unauthorized access by circumvention and
Thus courts will not enforce an illegal contract or a the manufacturing and distribution of technological
contract that jeopardizes public welfare. Regulation by means designed to circumvent either access control or
the code seems, however, free from such legal scru- copyright control. It provides for civil remedies and in
tiny since it is not dependent on a state’s enforcement addition imposes criminal penalties for willful viola-
procedures. Self-help technological means would not tions committed for commercial advantage or private
normally provide an opportunity for legal review. They financial gain.
do not require any law enforcement institutions such as In essence the law prohibits the following:
courts and the legal system. They are self-executed and
A. Gaining unauthorized access to works by cir-
self-implemented. Since terms of use are automatically
cumventing27 a technological protection meas-
enforced, they are not subject to legal review.
ure put by the copyright owner.28
Nevertheless, regulators did address self-help tech-
B. The manufacturing or making available “tech-
nological means in the DMCA. The underlying
nology, product, service, device, component”
rationale of this legislation was that enforcement by
technology can be violated by technology of counter 26 This approach is also reflected in the World Intellec-
coding. The development of exclusion measures is tual Property Organization (WIPO) Copyright Treaty and the
likely to encourage users to develop counter code- WIPO Performances and Phonograms Treaty, adopted at the
breaking and hacking tools. For every protection meas- WIPO Diplomatic Conference in December 1996. Under the
ure there is always a counter-technology to crack it. treaty contracting parties are required to provide legal remedies
against circumventing protection measures and against tamper-
Therefore the efficacy of technological protection of
ing with copyright management information.
copyrighted works depends on the absence of circum- 27 Circumventing a technological measure is defined by the
vention means. law as “to descramble a scrambled work, to decrypt an encryp-
After reviewing the legal approach toward self-help ted work, or otherwise to avoid, bypass, remove, deactivate,
technologies reflected in the DMCA, I will discuss the or impair a technological measure, without the authority of the
appropriate scope of regulating self-help technological copyright owner;” 17 U.S.C. Section 1201(a)(3)(A)(1998).
means. 28 “No person shall circumvent a technological measure that
effectively controls access to a work protected under this title”.
Indeed this provision will only become effective two years after
Regulating technologies: the anti-circumvention enactment during which Librarian of Congress is to conduct a
legislation rulemaking proceeding to determine the appropriate exceptions
to the prohibitions. However, other provisions that prohibit the
manufacturing and making available of technologies that are
In October 1998 the U.S. Congress passed the Digital
used to defeat technological measures controlling access, and
Millennium Copyright Act. This legislation sought to other rights of a copyright owner, took immediate effect. 17
25 See Tom W. Bell. Fair Use v. Fared Use: The Impact U.S.C. Section 1201(a)(1)(1998).
of Automated Rights Management on Copyright’s Fair Use
Doctrine. North Carolina Law Review, 76: 557–619, 1998.
206 N IVA E LKIN -KOREN

that is used to defeat technological measures’29 be allowed when it is done for a legitimate cause.36
controlling access.30 The broad prohibition and limited scope of exceptions
C. The manufacturing or making available the create a comprehensive all-encompassing protection to
means of circumventing protection afforded by rightholders.
technological measures that effectively protect The DMCA sought to adopt copyright law to the
the rights of a copyright owner.31 novel needs of the digital era. The anti-circumvention
legislation protects the right to control access to copy-
The limitation on manufacturing (or otherwise
righted works, which some believe should be an
making available) circumventing devices applies only
integral part of the copyright in the digital era.37
to devices that are “primarily designed or produced for
Digital distribution is no longer dependent on material
the purpose of circumventing”; have only a “limited
copies but rather on constant availability of works in
commercially significant purpose or use other than
a non-material form. The law should therefore award
to circumvent”; or are marketed “for use in circum-
rightholders with the right to control the manner in
venting”. The DMCA further prohibits tampering with
which the work is accessed. Nevertheless, in contrast
Copyright Management Information (CMI).32 This
to the classic exclusive rights, the scope of which is
includes the terms and conditions for using the work.33
explicitly defined by legislation, the so-called “right
The law also covers circumvention under circum-
to control access” is a by-product of regulating tech-
stances that do not otherwise constitute a copyright
nologies. Even if one agrees that copyright owners
infringement. This would be the case, for instance,
should be accorded the right to control access, such
when a particular use of the work is privileged
right could have been simply added to the bundle of
under the fair use doctrine.34 A defense to a copy-
rights defined by law. Yet, the DMCA went further
right infringement is not a defense to the prohib-
and prohibited any act of circumvention for acquiring
ition established under the DMCA. This view was
access, and restricted the manufacturing and distribu-
recently adopted by the court in one of the first cases
tion of technologies that enable it.
which applied the anti-circumvention legislation. This
Others believe the DMCA is designed to serve
case involved the distribution of a computer program
an economic purpose. The economic rationale for
designed to decrypt a DVD encryption system CSS
the DMCA anti-circumvention provisions seems pretty
(Content Scrambling System). The DeCSS allowed
simple. The development of exclusion measures is
a non-CSS-Compliant DVD player to play copies
likely to encourage users to develop counter code-
with DVD content. In Universal City Studios, Inc v.
breaking and hacking tools. This in turn will lead to
Reimerdes, an action filed by film distributors against
sophistication of the exclusion tools and a continuous
DeCSS distributors, the court found the defendants
technology race between the two sorts of devices. Such
liable under the anti-circumvention provisions. Judge
a race increases the cost of employing protection meas-
Kaplan rejected the defendants’ claim that their actions
ures by requiring rightholders to invest in preserving
constitute fair use and therefore could not be illegal
their technological superiority. This may divert funds
under the anti-circumvention laws. While stating that
that might otherwise be invested in more productive
this argument could be correct in some cases, it held
directions; in other words, so it is argued, this infertile
that Congress intentionally left anti-circumvention
outside of the reach of fair use doctrine.35 36 The exceptions include reverse engineering. 17 U.S.C.
The law recognizes a limited number of exemp- Section 1201(f). Reverse engineering was recognized by U.S.
tions, narrowly defined, in which circumvention would courts as “fair use” and therefore does not constitute a copyright
infringement even if unauthorized by the copyright owner. Note,
29 A technological measure that effectively controls access to
however, that the exception defined by the law is very limited
a work is defined as a measure that “in the ordinary course of its and does not cover all types of circumvention that were found by
operation, requires the application of information, or a process the courts as fair use. Other exceptions include an exception for
or a treatment, with the authority of the copyright owner, to gain law enforcement and intelligence activities, encryption research
access to the work.” 17 U.S.C. Section 1201(a)(3)(B)(1998). (if it satisfies a fairly strict requirements defined by the law),
30 17 U.S.C. Section 1201(a)(2) (1998).
security testing, the manufacture of circumvention measures for
31 17 U.S.C. Section 1201(b)(A) (1998). the sole purpose of supervising the use of the internet by minors,
32 This includes providing false copyright management infor- protection against invasion of privacy, nonprofit libraries and
mation and removing or altering CMI. 17 U.S.C. Section 1202 educational institutions for the purpose of determining whether
(a)(b)(1998). to acquire a work.
33 17 U.S.C. Section 1202 (1998). 37 Jane Ginsburg. From Having Copies to Experiencing
34 17 U.S.C Section 107. Works: the development of An Access Right in U.S. Copyright
35 Universal City Studios v. Reimerdes, 111 F. Supp. 2d 294 Law. In Hugh Hansen, editor, U.S. Intellectual Property: Law
(S.D.N.Y. 2000). and Policy. Sweet & Maxwell (forthcoming 2000).
T HE P RIVATIZATION OF I NFORMATION P OLICY 207

race is sheer waste. It may require central intervention, more significant concern raised by the DMCA’s anti-
which is very different from government intervention circumvention provisions has to do with the question
in the form of copyright law. Central legislation is of how, and by whom, terms of access to information
no longer necessary to create copyright, namely to are defined in our society.
provide the legal means of exclusion to make possible
the production of information products by private
firms. Central intervention may now be necessary to Letting the cats watch over the cream
stop the wasteful technological race between exclu-
sion tools and their counter technologies.38 In other The DMCA allocates decision-making power regard-
words, intervention by regulation might be needed as ing the most important resource in our information
a second-degree enforcement control.39 society in private hands. The law provides a privileged
The DMCA thus demonstrates a new regulatory status to restrictions on access to information that were
strategy in information policy. Rather than directly defined unilaterally by information providers. Restric-
regulating the behavior of users (prohibiting unau- tions enforced by copyright management systems are
thorized copying of a copyrighted work) the DMCA not subject to legal review.
regulates technologies. It seeks to govern the use of It is the very availability of protective technolo-
content by directly regulating the technologies that gies that gives copyright owners such power to regu-
enable access and use of informational products. Regu- late the use of information. Yet were it not for the
lation thus focuses on the technologies that affect DMCA, those who are technologically skilled could
users’ behavior rather than the behaviors themselves. resist such restrictions. If it were legal to develop
A major concern in regulating technology is and distribute circumventing technologies, the market
the risk of throwing out the proverbial baby with effect could mitigate the power of copyright owners. A
the bathwater. Regulating technology may impede, rule that prevents the development of circumventing
rather than induce, technological development.40 The means accords a privileged status to such self-made
DMCA’s regulatory approach overlooks the signific- regulation.
ance of a technology race and competition between Suppose that a new technology allows landowners
protective systems and hacking technologies as the to prevent an airplane from flying above their land and
driving forces of technological innovation. In fact, ensure that only authorized airplanes are able to pass.
development of circumventing means to bypass, Some landowners may use the new device to collect
remove or disable other technological measures is an fees from airplanes that fly over their plot. Imagine
integral part of the hacker culture that contributed to that air carriers have managed to develop a device that
the development of cyberspace. Investments in devel- would circumvent the virtual fee-collecting air-gate.
oping measures and anti-measures may contribute to So, the landlords develop more sophisticated air-gates
technological development, in that some inventions and correspondingly air carriers develop circumvent-
sometimes have other uses. The purpose of intellectual ing devices. Then the government decides to prohibit
property laws is to promote the development of new the manufacture and use of circumventing devices by
technologies. Regulating technological development air carriers. The property rule that defines the propriet-
may impair this objective. ary rights of landowners is intact. It still provides that
But the danger reflected in such regulation goes ownership in land, in and of itself, does not extend to
beyond its impact on technological development. A the right of passage in the sky. Yet, in fact, landowners
38 Kenneth. W. Dam. Self-help in the Digital Jungle. The are now able to collect fees for every such use.
The special immunity provided by the law to copy-
Journal of Legal Studies, 28: 393–412, 1999 (arguing that it
is inevitable that counter technologies which defeat self-help right management systems suggests that such systems
system will arise. Dam believes that such a race requires govern- will increasingly displace copyright law in governing
ment intervention in prohibiting circumventing means, though the use of information. What are the consequences of
suggesting that such regulation should carefully drafted to avoid replacing the regulatory regime of copyright law by
hindering technological development altogether). terms of access to information generated by informa-
39 Niva Elkin-Koren and Eli M. Salzberger. Law and tion providers?
Economics in Cyberspace. International Review of Law and The privatization of information policy under the
Economics, 19: 553–581, 1999. patronage of law, not only privatizes the rule-making,
40 See Pamela Samueslon. Intellectual Property and the
but it is also likely to privatize the information itself.
Digital Economy: Why the Anti-Circumvention Regulations Once a copyright owner uses a technology to restrict
Need to be Revised. Berkeley Technology Law Journal, 14:
access to his or her materials, it becomes a violation
519–566, 1999 (arguing that the anti-circumvention regulation
may obstruct the progress of technology).
of the law to attempt to bypass the protective meas-
ures. This legal outcome remains the same even when
208 N IVA E LKIN -KOREN

a user who circumvented the system was entitled to party, is currently available for information in the
access the materials under copyright law. The list of public domain. It is unlikely that information providers
exceptions defined by the law does not cover all legi- will preserve such a level of privileged usage.
timate uses of information. However, unless permitted The new legal regime under the DMCA protects
under one of the exceptions, any access to a work by the claim of rightholders to maximize their profits and
circumvention becomes illegal. utilize every economic potential related to their work.
If terms of access to information are exclusively If copyright law had once created islands of infor-
defined by rightholders, it is expected that more infor- mation that were subject to the sovereign control of
mation will be subject to private control. Informa- copyright owners, these islands are now turning into a
tion providers are likely to use technology to maxi- continent leaving little available space in between. The
mize their control over the use of their informational totality of restrictions on access is what makes such a
products, including those currently unprotected under regime risky from a democratic perspective.
copyright law. Copyright law leaves out a pool of infor-
mation that is publicly accessible, immune from the
power of any private party to exclude its use. Informa- Where do we go from here?
tion in the public domain, under a copyright regime, is
therefore legally accessible in the sense that its use is Information policy that is configured by copyright
privileged to all. owners, enforced by technology and backed by anti-
The privatization of this public domain may circumvention rules could not sufficiently protect the
entail some negative effects for creation and inno- public interest. The DMCA has distorted the long
vation. Information is often developed increment- tradition of balancing the economic interests of owners
ally and therefore widespread access to informa- and public access to information. I do not intend to
tion may increase the chances of further innovation. claim here that copyright law necessarily reflects the
Existing cultural artifacts build on the works of the right balance under all circumstances. Indeed, it seems
past.41 Exposure to current innovations may stimu- that digital distribution would require us to draw a
late the creation of new technological developments. different balance – to better accommodate the different
So extensive use of information may increase the information environment.
likelihood of further innovation. A pay-per-access Copyright law, however, provided a framework for
regime, in which every access to information is fared, balancing in the old regime. It had some legal mech-
may impede innovation. That is because innovative anisms for introducing public considerations into the
developments are not necessarily tied to any finan- rules that govern the use of information, such as the
cial resources and may depend instead on intellectual idea/expression distinction, the fair use defense and
capability, circumstances, level of cooperation and other limitations on the owner’s exclusive rights. Such
luck.42 mechanisms are completely absent under the new legal
Some level of free access to information is further- regime.
more essential for democracy. Information has social Powerful technologies of exclusion seem to intro-
and political significance. It affects the shaping of duce a greater threat to the continuous existence of the
preferences and identities and may be essential for public domain. If the greatest threat in our information
individuals to participate in political deliberation. If we age is blocking – withholding information and restrict-
believe that democracy is not simply about securing ing access – we must rethink our rights paradigm. The
equal voting rights but also requires equal access to challenge for regulators is therefore to secure uncon-
the political process in a more substantial way, then the strained access to information in the technologically
tenets of democracy must also apply to these will form- regulated environment.
ation processes. This requires reasonable access to It is one thing to keep your information secret
information and some freedom to transform and shape or physically (and technologically) guard it against
informational works so that they reflect one’s political unauthorized use. It is quite another to ask that the
agenda, belief system and identity. Public access to law would enforce such self-help means. When the
information, freed from any veto power of any private (public) legal system is asked to enforce norms created
41 William M. Lands and Richard A. Posner. An Economic by private parties (such as in contracts), these norms
would normally be subject to scrutiny. Courts could
Analysis of Copyright Law. Journal of Legal Studies, 18: 325–
363, 1989, p. 332. make certain that the public enforcement system is
42 See Jessica Litman. The Public Domain. Emory Law not abused to achieve goals that conflict with public
Journal, 39: 965–1023, 1990, fn 264–265 and accompanying policy.
text (arguing that authorship processes may be inadvertent). Regulation by technology introduces a harder case.
Under the traditional copyright regime, information
T HE P RIVATIZATION OF I NFORMATION P OLICY 209

in the public domain was only legally accessible, in Kevin Garnett, Jonathan Rayner, Gillian Davies, editors.
the sense that its use is privileged to all. It was not, Copinger and Skone James on Copyright (14th ed., volume
however, physically accessible. Copyright law never one). Sweet & Maxwell, London, 1999.
imposed a legal obligation to provide access. Protec- Kamiel J. Koelman, Online Intermediary Liability. In P. Bern
tive technologies require us to rethink the boundaries Hugenholtz, editors, Copyright and Electronic Commerce,
Legal Aspects of Electronic Copyright Management, pages
of access rights. How to secure access without forcing
1–57. Kluwer Law International, 2000.
rightholders to provide access to content? To what Paul Goldstein. Copyright (2nd ed.). Little, Brown, Boston,
extent should the law intervene in securing access? 1996.
To what extent should limits on access to information Debora J. Halbert. Intellectual Property in the Information Age:
be permissible? The real challenge for regulators is to The Politics of Expanding Ownership Rights. Quorum Books,
define not merely new access rights of owners but also Westport, Connecticut, 1999.
access privileges of users. I. Trotter Hardy. The Proper Legal Regime for ‘Cyberspace’.
University of Pittsburgh Law Review, 55: 993–1055, 1994.
William M. Lands and Richard A. Posner. An Economic
Acknowledgement Analysis of Copyright Law. Journal of Legal Studies, 18:
325–363, 1989.
Mark A. Lemley. Symposium: Beyond Preemption: The Law
I am indebted to Matan Goldblatt for his useful and and Policy of Intellectual Property Licensing. California Law
thoughtful research assistance. Review, 87: 111–172, 1999.
Mark A. Lemley. The Law and Economics of Internet Norms.
Chicago-Kent Law Review, 73: 1257–1294, 1998.
References Lawrence Lessig. Symposium: Surveying Law and Borders:
The Zones of Cyberspace. Stanford Law Review, 48: 1403–
John Perry Barlow. The Economy of Ideas: A Framework for 1411, 1996.
Patents and Copyrights in the Digital Age (Everything You Jessica Litman. The Public Domain. Emory Law Journal, 39:
Know About Intellectual Property Is Wrong). Wired, 2.03: 965–1023, 1990.
Mar. 1994. Joel R. Reidenberg. Lex Informatica: The Formulation of Infor-
Tom W. Bell. Fair Use v. Fared Use: The Impact of Automated mation Policy Rules Through Technology. Texas Law Review,
Rights Management on Copyright’s Fair Use Doctrine. North 76: 553–593, 1998.
Carolina Law Review, 76: 557–619, 1998. Pamela Samuelson. The Copyright Grab. Wired, 4.01, January
Lorin Brennan. The Public Policy of Information Licensing. 1996.
Houston Law Review, 36: 61–119, 1999. Pamela Samueslon. Intellectual Property and the Digital
Kenneth. W. Dam. Self-help in the Digital Jungle. The Journal Economy: Why the Anti-Circumvention Regulations Need to
of Legal Studies, 28: 393–412, 1999. be Revised. Berkeley Technology Law Journal, 14: 519–566,
Niva Elkin-Koren and Eli M. Salzberger. Law and Economics 1999.
in Cyberspace. International Review of Law and Economics, Cass R. Sunstein. Emerging Media Technology and the First
19: 553–581, 1999. Amendment: The First Amendment in Cyberspace. Yale Law
Journal, 104: 1757–1804, 1995.

You might also like