{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:28:17Z","timestamp":1744172897034,"version":"3.40.3"},"reference-count":62,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Report"],"published-print":{"date-parts":[[2004,11]]},"DOI":"10.1016\/s0267-3649(04)00089-5","type":"journal-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T16:59:21Z","timestamp":1100365161000},"page":"445-452","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Business implications of anti-circumvention legislation and recommendations"],"prefix":"10.1016","volume":"20","author":[{"given":"YiJun","family":"Tian (George)","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0267-3649(04)00089-5_bib1","unstructured":"Rastogi, S. (2003), \u2018WCT & WPPT Background and Purpose\u2019 Available: http:\/\/www.techlex.org\/Library\/Summary%20WCT%20WPPT.pdf"},{"key":"10.1016\/S0267-3649(04)00089-5_bib2","doi-asserted-by":"crossref","unstructured":"See Newton, J. (2001). \u2018Notes: Global Solutions to Prevent Copyright Infringement of Music over the Internet: The Need to Supplement the WIPO Internet Treaties with Self-Imposed Mandates\u2019 in 12 Indiana International and Comparative Law Review at 125.","DOI":"10.18060\/17744"},{"key":"10.1016\/S0267-3649(04)00089-5_bib3","unstructured":"Newton, J. (2001) at 149\u2013150."},{"key":"10.1016\/S0267-3649(04)00089-5_bib4","unstructured":"Bolinger, B. (2002). \u2018Comment: Focusing on Infringement: Why Limitations on Decryption Technology are Not the Solution to Policing Copyright\u2019 in 52 Case Western Reserve Law Review 1091at 1092."},{"key":"10.1016\/S0267-3649(04)00089-5_bib5","unstructured":"Ginsburg, J.C. (2003). \u2018Book Review: Achieving Balance in International Copyright Law \u2013 The WIPO Treaties 1996: The WIPO Copyright Treaty and The WIPO Performances and Phonograms Treaty: Commentary and Legal Analysis. By J\u00e4rg Reinbothe and Silke von Lewinski, 2002. Pp 581\u2019 in 26 Columbia Journal of Law & the Arts, at 201."},{"key":"10.1016\/S0267-3649(04)00089-5_bib6","unstructured":"See Lipton, J. (2001). \u2018Symposium: E-Commerce In The Digital Millennium \u2013 Copyright in the Digital Age: A Comparative Survey\u2019 in 27 Rutgers Computer and Technology Law Journal 333 at 338. See also Article 11 of WIPO Copyright Treaty (WCT); Article 18 of WIPO Performances and Phonograms Treaty (WPPT)."},{"key":"10.1016\/S0267-3649(04)00089-5_bib7","unstructured":"Newton, J. (2001).at 144."},{"key":"10.1016\/S0267-3649(04)00089-5_bib8","doi-asserted-by":"crossref","unstructured":"Samuelson P, (2003) \u2018Digital Rights Management and, or, vs. the Law\u2019 in Communications of the ACM, vol. 46, no. 4, April 2003, http:\/\/www.sims.berkeley.edu\/~pam\/papers\/acm_v46_p41.pdf at 41.","DOI":"10.1145\/641205.641229"},{"key":"10.1016\/S0267-3649(04)00089-5_bib9","unstructured":"Ibid. As the U.S. Copyright Office observed, these obligations serve as technological adjuncts to the exclusive rights \u2018granted by copyright law\u2019. The U.S. Copyright Office (1998), The Digital Millennium Copyright Act of 1998 \u2013 U.S. Copyright Office Summary [online] available: http:\/\/www.loc.gov\/copyright\/legislation\/dmca.pdf at 3."},{"key":"10.1016\/S0267-3649(04)00089-5_bib10","unstructured":"Rastogi, S. (2003), \u2018WCT & WPPT Background and Purpose\u2019 in [Online] Available: http:\/\/www.techlex.org\/Library\/Summary%20WCT%20WPPT.pdf at 5."},{"key":"10.1016\/S0267-3649(04)00089-5_bib11","unstructured":"Newton, J. (2001) at 144."},{"key":"10.1016\/S0267-3649(04)00089-5_bib12","unstructured":"Schack, H. (2002) at 322."},{"key":"10.1016\/S0267-3649(04)00089-5_bib13","unstructured":"Schack, H. (2002) at 323."},{"key":"10.1016\/S0267-3649(04)00089-5_bib14","unstructured":"See Cohen, T.B. (2003). \u2018Notes: Anti-Circumvention: Has Technology' Child Turned Against its Mother?\u201d in 36 Vanderbilt Journal of Transnational Law 961 at 984."},{"key":"10.1016\/S0267-3649(04)00089-5_bib15","unstructured":"S 1201 (a)(1) of the DMCA"},{"key":"10.1016\/S0267-3649(04)00089-5_bib16","unstructured":"S 1201 (a)(2), (b)(1) of the DMCA. See also Schack, H. (2002) at 323."},{"key":"10.1016\/S0267-3649(04)00089-5_bib17","unstructured":"The three anti-circumvention rules in the DMCA are: section 1201(a)(1)(A); section 1201 (a)(2); and section 1201 (b)(2)."},{"key":"10.1016\/S0267-3649(04)00089-5_bib18","unstructured":"Lipton, J. (2001). \u2018Symposium: E-Commerce In The Digital Millennium \u2013 Copyright in the Digital Age: A Comparative Survey\u2019 in 27 Rutgers Computer and Technology Law Journal 333 at 342."},{"key":"10.1016\/S0267-3649(04)00089-5_bib19","unstructured":"See the Westlaw password page: www.westlaw.com"},{"key":"10.1016\/S0267-3649(04)00089-5_bib20","unstructured":"However, it should be noted that, considering the negative impact that s1201(a)(1)(A) might have on non-infringing uses of copyrighted works, the US Congress decided that this rule should not take effect until October of 2000 (two years after the DMCA was enacted). See Samuelson, P. (2000). \u2018More Sensible Anti-Circumvention Regulations\u2019 in Proceedings of Financial Cryptography 2000 Conference [Online] Available: http:\/\/www.sims.berkeley.edu\/~pam\/papers\/fincrypt2.pdf at 3."},{"key":"10.1016\/S0267-3649(04)00089-5_bib21","unstructured":"Singer, P. (2002). \u2018Comments: Mounting a Fair Use Defence to the Anti-Circumvention Provisions of the Digital Millennium Copyright Act\u2019 in 28 University of Dayton Law Review 111at 116."},{"key":"10.1016\/S0267-3649(04)00089-5_bib22","unstructured":"Samuelson, P. (1999), \u2018Symposium: The Legal and Policy Framework for Global Electronic Commerce: A Progress Report \u2013 Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to be Revised\u2019 in 14 Berkeley Technology Law Journal 519 at 534. see also Lipton, J. (2001) at 343."},{"key":"10.1016\/S0267-3649(04)00089-5_bib23","unstructured":"For more details, see Samuelson, P. (2000). at 4."},{"key":"10.1016\/S0267-3649(04)00089-5_bib24","doi-asserted-by":"crossref","unstructured":"Burk, D.L. (2003) \u2018Anticircumvention Misuse\u2019 in 50 UCLA Law Review 1095 at 1104.","DOI":"10.7551\/mitpress\/5932.003.0015"},{"key":"10.1016\/S0267-3649(04)00089-5_bib25","unstructured":"The U.S. Copyright Office, (1998) at 6."},{"key":"10.1016\/S0267-3649(04)00089-5_bib26","unstructured":"Lipton, J. (2001) at343."},{"key":"10.1016\/S0267-3649(04)00089-5_bib27","unstructured":"The U.S. Copyright Office, (1998) at 5."},{"key":"10.1016\/S0267-3649(04)00089-5_bib28","unstructured":"S 1201(1)(C) of the DMCA"},{"key":"10.1016\/S0267-3649(04)00089-5_bib29","unstructured":"Ibid."},{"key":"10.1016\/S0267-3649(04)00089-5_bib30","unstructured":"See Hammond, H.J., H.C. Brunelli, et al. (2002) at 596-597. See also Burk, D.L. (2003) at 1105."},{"key":"10.1016\/S0267-3649(04)00089-5_bib31","unstructured":"Samuelson, P. (2000). \u2018More Sensible Anti-Circumvention Regulations\u2019 in Proceedings of Financial Cryptography 2000 Conference [Online] Available: http:\/\/www.sims.berkeley.edu\/~pam\/papers\/fincrypt2.pdf at 4."},{"key":"10.1016\/S0267-3649(04)00089-5_bib32","doi-asserted-by":"crossref","unstructured":"Burk, D.L. (2003) \u2018Anticircumvention Misuse\u2019 in 50 UCLA Law Review 1095 at 1105.","DOI":"10.7551\/mitpress\/5932.003.0015"},{"key":"10.1016\/S0267-3649(04)00089-5_bib33","unstructured":"Ibid. For more details, refer to s 1201(g)(4) and (j)(4)"},{"key":"10.1016\/S0267-3649(04)00089-5_bib34","unstructured":"Samuelson, P. (2000) at 4."},{"key":"10.1016\/S0267-3649(04)00089-5_bib35","unstructured":"But it should be noted that, \u201cdespite this general \u2018no mandate\u2019 rule (s1201(c)(3)), section 1201(k) does mandate an affirmative response for one particular type of technology: within 18 months of enactment, all analog videocassette recorders must be designed to conform to certain defined technologies, commonly known as Macrovision, currently in use for preventing unauthorized copying of analog videocassettes and certain analog signals.\u201d See The U.S. Copyright Office, (1998) at 4. See also Samuelson, P. (1999) at 541."},{"key":"10.1016\/S0267-3649(04)00089-5_bib36","unstructured":"Samuelson, P. (2000).at 4."},{"key":"10.1016\/S0267-3649(04)00089-5_bib37","unstructured":"Pete Singer, in 2002, summarized most adjectives used to criticize anti-circumvention provisions from 10 different articles, and he stated \u2018\u201cSucks,\u201d \u201cevil,\u201d \u201cwrongheaded,\u201d \u201cmuch-hated,\u201d \u201cunpredictable,\u201d \u201cunsound,\u201d \u201cugly and inelegant,\u201d \u201cinconsistent,\u201d \u201cill- conceived,\u201d \u201ccumbersome,\u201d \u201coverbroad,\u201d and \u201cunconstitutional\u201d are just a few of the adjectives that have been used to describe the anti-circumvention provisions of the Digital Millennium Copyright Act (\u201cDMCA\u201d).\u2019 See Singer, P. (2002) at 111."},{"key":"10.1016\/S0267-3649(04)00089-5_bib38","unstructured":"Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 303 (S.D.N.Y. 2000)."},{"key":"10.1016\/S0267-3649(04)00089-5_bib39","unstructured":"Samuelson, P. (2003) at 42."},{"key":"10.1016\/S0267-3649(04)00089-5_bib40","doi-asserted-by":"crossref","unstructured":"Samuelson, P. (2003) at 43.","DOI":"10.14746\/ssp.2003.2.03"},{"key":"10.1016\/S0267-3649(04)00089-5_bib41","unstructured":"Schack, H. (2002) at 327."},{"key":"10.1016\/S0267-3649(04)00089-5_bib42","unstructured":"See section 107 in Title 17 of the United States Code. Available: http:\/\/www.copyright.gov\/title17\/92chap1.html"},{"key":"10.1016\/S0267-3649(04)00089-5_bib43","unstructured":"See also section 3.3.2. Problem I: Fair Use v Different Treatments in Anti-Circumvention Rules of this article."},{"key":"10.1016\/S0267-3649(04)00089-5_bib44","unstructured":"This exception and other limited exceptions are the outcomes of the debate in the US Congress when the DMCA was enacted."},{"key":"10.1016\/S0267-3649(04)00089-5_bib45","unstructured":"Samuelson, P. (1999) at 545."},{"key":"10.1016\/S0267-3649(04)00089-5_bib46","unstructured":"See also Samuelson, P. (1999) at 543. Samuelson provided an analogue example."},{"key":"10.1016\/S0267-3649(04)00089-5_bib47","unstructured":"Ibid."},{"key":"10.1016\/S0267-3649(04)00089-5_bib48","unstructured":"Civil Action No. 02-571-KSF (E.D. Ky. Dec. 30, 2002)."},{"key":"10.1016\/S0267-3649(04)00089-5_bib49","unstructured":"Burk, D.L.(2003) at 1110. Moreover, Burk provides many examples about how anti-circumvention rules were abused in non-copyright issues."},{"key":"10.1016\/S0267-3649(04)00089-5_bib50","unstructured":"Burk, D.L. (2003) at 1106 to 1107."},{"key":"10.1016\/S0267-3649(04)00089-5_bib51","unstructured":"Schack, H. (2002) at 324. See also Burk, D.L. (2003) at 1095."},{"key":"10.1016\/S0267-3649(04)00089-5_bib52","unstructured":"See \u2018section 3.3.2. Problem I: Fair Use v Different Treatments in Anti-Circumvention Rules\u2019 of this article."},{"key":"10.1016\/S0267-3649(04)00089-5_bib53","unstructured":"Samuelson, P. (2000) at 7."},{"key":"10.1016\/S0267-3649(04)00089-5_bib54","unstructured":"Directive 2001\/29\/EC of the European Parliament and of the Council of 22 May 2001 on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society, 2001 O.J. (L 167) 10."},{"key":"10.1016\/S0267-3649(04)00089-5_bib55","unstructured":"Schack, H. (2002) at 324."},{"key":"10.1016\/S0267-3649(04)00089-5_bib56","unstructured":"including agreements between copyright holders and other parties concerned"},{"key":"10.1016\/S0267-3649(04)00089-5_bib57","unstructured":"Article 6, para 4 of the EU Information Society Directive."},{"key":"10.1016\/S0267-3649(04)00089-5_bib58","unstructured":"However, the directive does not provide any specific explanation on what \u2018appropriate measures\u2019 would be. Further, Schack criticized, \u2018as the EU did not know how to square the circle of protecting anti-circumvention measures and fair use at the same time, it hopes that the Member States will find the solution.\u2019 See Schack, H. (2002) at 325 and 326."},{"key":"10.1016\/S0267-3649(04)00089-5_bib59","unstructured":"More specific suggestion on \u2018appropriate measures\u2019 (legal mechanism) will be introduced next sections."},{"key":"10.1016\/S0267-3649(04)00089-5_bib60","unstructured":"This has been demonstrated by many cases introduced above."},{"key":"10.1016\/S0267-3649(04)00089-5_bib61","unstructured":"An analogue approach can be found in the counterpart of \u2018Notice and Takedown regime\u2019 in the DMCA. In that regime, in order to lodge an effective \u2018takedown notice\u2019, the aggrieved party (copyright holder) is required to submit a \u2018formal notice\u2019 to the ISP's agent. Further s512(c)(3) of the DMCA provides a effective notice must contain six specific identifying elements, such as a signature of a person authorized to act on behalf of the owner of the copyright allegedly infringed, etc."},{"key":"10.1016\/S0267-3649(04)00089-5_bib62","unstructured":"Schack, H. (2002) at 332."}],"container-title":["Computer Law &amp; Security Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364904000895?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364904000895?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:26:01Z","timestamp":1744147561000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364904000895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,11]]},"references-count":62,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2004,11]]}},"alternative-id":["S0267364904000895"],"URL":"https:\/\/doi.org\/10.1016\/s0267-3649(04)00089-5","relation":{},"ISSN":["0267-3649"],"issn-type":[{"type":"print","value":"0267-3649"}],"subject":[],"published":{"date-parts":[[2004,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Business implications of anti-circumvention legislation and recommendations","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Report","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S0267-3649(04)00089-5","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2004 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}