{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:26:48Z","timestamp":1744086408554,"version":"3.40.3"},"reference-count":12,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Report"],"published-print":{"date-parts":[[2004,9]]},"DOI":"10.1016\/s0267-3649(04)00066-4","type":"journal-article","created":{"date-parts":[[2004,12,15]],"date-time":"2004-12-15T22:22:15Z","timestamp":1103149335000},"page":"364-369","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using technology to protect copyright works"],"prefix":"10.1016","volume":"20","author":[{"given":"David","family":"Bainbridge","sequence":"first","affiliation":[]}],"member":"78","reference":[{"doi-asserted-by":"crossref","unstructured":"OJ L 167, 22.06.2001, p.10.","key":"10.1016\/S0267-3649(04)00066-4_bib1","DOI":"10.1080\/714866604"},{"unstructured":"Council Directive 91\/250\/EEC of 14 May 1991, OJ L 122, 17.05.1991, p.42.","key":"10.1016\/S0267-3649(04)00066-4_bib2"},{"unstructured":"The Supply of Goods and Services Act 1982 does not attempt to define what a service is.","key":"10.1016\/S0267-3649(04)00066-4_bib3"},{"unstructured":"A maximum of 10 years imprisonment and\/or a fine; section 92 Trade Marks Act 1994. Similar considerations apply in respect of the copyright offences under section 107 of the Copyright, Designs and Patents Act 1988, recently increased to match the trade mark offences. However, the new form of infringement by communicating to the public under section 107(2A) only carries a maximum of two years imprisonment and\/or a fine.","key":"10.1016\/S0267-3649(04)00066-4_bib4"},{"unstructured":"IBCOS Computers Ltd v Barclays Highland Mercantile Finance Ltd [1994] FSR 275.","key":"10.1016\/S0267-3649(04)00066-4_bib5"},{"unstructured":"\u00a71204 also imposed criminal liability for any violation of the protection afforded to electronic rights management information under \u00a71202.","key":"10.1016\/S0267-3649(04)00066-4_bib6"},{"doi-asserted-by":"crossref","unstructured":"See, for example, Seville, C. \u2018Current Developments \u2013 European Union Law\u2019, (2004) International and Comparative Law Quarterly, Vol 53(2), p.487.","key":"10.1016\/S0267-3649(04)00066-4_bib7","DOI":"10.1093\/iclq\/53.2.487"},{"unstructured":"New York Times, 18 July 2001.","key":"10.1016\/S0267-3649(04)00066-4_bib8"},{"unstructured":"No CV-01-2669 (D NJ 6 June 2001).","key":"10.1016\/S0267-3649(04)00066-4_bib9"},{"unstructured":"The wording of section 296ZD is not as clear as it might be and it is arguable that the acts of manufacture, import or distribution do not have to be for the purpose of sale or hire. However, application of the esjudem generis rule might overcome that ambiguity.","key":"10.1016\/S0267-3649(04)00066-4_bib10"},{"key":"10.1016\/S0267-3649(04)00066-4_bib11","series-title":"Networking in the Humanities","first-page":"173","article-title":"\u2018Copyright in Relation to Electronic Publishing in the Humanities\u2019","author":"Bainbridge","year":"1995"},{"unstructured":"Inserted by the Copyright (Visually Impaired Persons) Act 2002, which came into force on 31 October 2003.","key":"10.1016\/S0267-3649(04)00066-4_bib12"}],"container-title":["Computer Law &amp; Security Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364904000664?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364904000664?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:12:20Z","timestamp":1744067540000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364904000664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,9]]}},"alternative-id":["S0267364904000664"],"URL":"https:\/\/doi.org\/10.1016\/s0267-3649(04)00066-4","relation":{},"ISSN":["0267-3649"],"issn-type":[{"type":"print","value":"0267-3649"}],"subject":[],"published":{"date-parts":[[2004,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Using technology to protect copyright works","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Report","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S0267-3649(04)00066-4","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2004 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}