C:\Documents and Settings\Daca\Desktop\1201-2009

Total Page:16

File Type:pdf, Size:1020Kb

C:\Documents and Settings\Daca\Desktop\1201-2009 The Register ofCopyrights United States Copyright Office· Library of Congress • 101 Independence Avenue SE· Washington., DC 20559-6000 TO: James H.Billington DATE: June 11,2010 The Librarian of congr~ FROM: Marybeth Peters ~ Register ofCopyrIghts SUBJECT: Recommendation ofthe Register of Copyrights in RM 2008-8; Rulemaking on Exemptions from Prohibition on Circumvention ofCopyright Protection Systems for Access Control Technologies I am pleased to present my recommendation relating to the rulemaking on exemptions from the prohibition on circumvention oftechnological measures that control access to copyrighted works. This document constitutes my formal recommendation., as required pursuant to 17 U.S.C. § 1201(a)(I)(C). Outline of the Recommendation I. BACKGROUND A. Legislative Requirements for Rulemaking Proceeding B. Responsibilities ofRegister of Copyrights and Librarian of Congress C. The Purpose and Focus of the Rulemaking 1. Purpose ofthe Rulemaking 2. The Necessary Showing 3. Determination of"Class o.fWorks" D. Consultation with the Assistant Secretary for Communications and Information II. SOLICITATION OF PUBLIC COMMENTS AND HEARINGS III. THE DESIGNATED CLASSES A. Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: Recommendation of the Register of Copyrights June 11, 2010 Page 2 • Educational uses by college and university professors and by college and university film and media studies students; • Documentary filmmaking; • Noncommercial videos B. Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. C. Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. D. Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: • The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and • The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. E. Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. IV. OTHER CLASSES CONSIDERED, BUT NOT RECOMMENDED A. Subscription based services that offer DRM-protected streaming video where the provider has only made available players for a limited number of platforms, effectively creating an access control that requires a specific Recommendation of the Register of Copyrights June 11, 2010 Page 3 operating system version and/or set of hardware to view purchased material; and Motion pictures protected by anti-access measures, such that access to the motion picture content requires use of a certain platform. B. Lawfully purchased sound recordings, audiovisual works, and software programs distributed commercially in digital format by online music and media stores and protected by technological measures that depend on the continued availability of authenticating servers, when such authenticating servers cease functioning because the store fails or for other reasons; and Lawfully purchased sound recordings, audiovisual works, and software programs distributed commercially in digital format by online music and media stores and protected by technological measures that depend on the continued availability of authenticating servers, prior to the failure of the servers for technologists and researchers studying and documenting how the authenticating servers that effectuate the technological measures function. C. Software and information recorded, produced, stored, manipulated or delivered by the software, that a forensic investigator seeks to copy, activate, or reverse engineer in order to obtain evidence in a court proceeding. D. Audiovisual works delivered by digital television ("DTV") transmission intended for free, over-the-air reception by anyone, which are marked with a "broadcast flag" indicator that prevents, restricts, or inhibits the ability of recipients to access the work at a time of the recipient's choosing and subsequent to the time of transmission, or using a machine owned by the recipient but which is not the same machine that originally acquired the transmission. E. Audiovisual works embedded in a physical medium (such as Blu-Ray discs) which are marked for "down-conversion" or "down-resolutioning" (such as by the presence of an Image Constraint Token "ICT") when the work is to be conveyed through any of a playback machine's existing audio or visual output connectors, and therefore restricts the literal quantity of the embedded work available to the user (measured by visual resolution, temporal resolution, and color fidelity). F. Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format. Recommendation of the Register of Copyrights June 11, 2010 Page 4 I. BACKGROUND A. Legislative Requirements for Rulemaking Proceeding The Digital Millennium Copyright Act (“DMCA”), Pub. L. No. 105-304 (1998), was enacted to implement certain provisions of the WIPO Copyright Treaty (“WCT”) and WIPO Performances and Phonograms Treaty (“WPPT”). It established “a wide range of rules that will govern not only copyright owners in the marketplace for electronic commerce, but also consumers, manufacturers, distributors, libraries, educators, and on-line service providers”; it “define[d] whether consumers and businesses may engage in certain conduct, or use certain devices, in the course of transacting electronic commerce.”1 Title I of the Act, which added a new Chapter 12 to title 17 of the United States Code, prohibits circumvention of certain technological measures employed by or on behalf of copyright owners to protect their works ( i.e. “access controls”). Specifically, Section 1201(a)(1)(A)2 provides, in part, that “[n]o person shall circumvent a technological measure that effectively controls access to a work protected under this title.” In order to ensure that the public will have continued ability to engage in noninfringing uses of copyrighted works, such as fair use,3 subparagraph (B) limits this prohibition. It provides that the prohibition against circumvention “shall not apply to persons who are users of a copyrighted work which is in a particular class of works, if such persons are, or are likely to be in the succeeding three-year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works under this title” as determined in a rulemaking proceeding. The rulemaking proceeding is conducted by the Register of Copyrights, who is to provide notice of the rulemaking, seek comments from the public, consult with the Assistant Secretary for Communications and Information of the Department of Commerce, and recommend final regulations to the Librarian of Congress.4 The regulations, to be issued by the Librarian of Congress, announce “any class of copyrighted works for which the Librarian has determined, 1 Report of the House Committee on Commerce on the Digital Millennium Copyright Act of 1998, H.R. Rep. No. 105-551, pt. 2, at 22 (1998) (“Commerce Comm. Report”). 2 Unless otherwise stated, all statutory references hereinafter are to sections of title 17, United States Code. 3 See Commerce Comm. Report at 25-26, 35. 4 Report of the Committee of Conference on the Digital Millennium Copyright Act, H.R. Conf. Rep. No. 105-796, at 64 (1998) (“Conf. Report”). In addition, a number of statutory exceptions are codified at Section 1201(d)-(j). Recommendation of the Register of Copyrights June 11, 2010 Page 5 pursuant to the rulemaking conducted under subparagraph (C), that noninfringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected, and the prohibition contained in subparagraph (A) shall not apply to such users with respect to such class of works for the ensuing 3-year period.”5 This is the fourth Section 1201 rulemaking. The first rulemaking culminated in the Librarian’s issuance of a regulation
Recommended publications
  • Intelligent Multimedia Danièle Bourcier, Melanie Dulong De Rosnay, Pompeu Casanovas, Maracke Catharina
    Intelligent Multimedia Danièle Bourcier, Melanie Dulong de Rosnay, Pompeu Casanovas, Maracke Catharina To cite this version: Danièle Bourcier, Melanie Dulong de Rosnay, Pompeu Casanovas, Maracke Catharina. Intelligent Multimedia. Danièle Bourcier, Pompeu Casanovas, Mélanie Dulong de Rosnay, Catharina Maracke. European Press Academic Publishing, pp.412, 2010, Series in Legal Information and Communication Technologies. halshs-00671623 HAL Id: halshs-00671623 https://halshs.archives-ouvertes.fr/halshs-00671623 Submitted on 17 Feb 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Series in Legal Information and Communication Technologies Volume 8 IntelligentMultimedia.tex; 28/05/2010; 20:00; p.1 Volume Editors’ Biographies Daniele Bourcier, doctorate in Public Law, is director of research at the Centre National de la Recherche Scientifique, CERSA, Paris. She is associ- ated professor at the University of Paris 1 in eGovernment. Scientific lead of CC France, she works on Commons Governance and Regulation. She wrote 16 books (collective or not) and many papers in the field of IT, Cognition and Law. She is an appointed member of the Comite d’Éthique des Sciences (CNRS). Pompeu Casanovas, director of the UAB Institute of Law and Technol- ogy (http://idt.uab.cat) and professor of Philosophy of Law at the Universitat Autònoma de Barcelona.
    [Show full text]
  • Understanding Microsoft Virtualization Solutions Ebook
    MICROSOFT LICENSE TERMS MICROSOFT EBOOK These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the licensed content named above, which includes the media on which you received it, if any. By using the licensed content, you accept these terms. If you do not accept them, do not use the licensed content. If you comply with these license terms, you have the rights below. 1. OVERVIEW. Licensed Content. The licensed content includes the eBook and associated media. License Model. The licensed content is licensed on a per user per device basis. 2. INSTALLATION AND USE RIGHTS. a. General. One user may install and use one copy of the licensed content on a single computer. b. Portable Device. You may install an additional copy of the licensed content on a portable device for the exclusive use of the primary user of the first copy of the licensed content. 3. SCOPE OF LICENSE. The licensed content is licensed, not sold. This agreement only gives you some rights to use the licensed content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the licensed content only as expressly permitted in this agreement. You agree Not to make copies of the licensed content; Not to distribute, rent, lease, lend, reproduce, transit, adapt, modify, link to, post, forward, make derivative works based upon, disseminate, publish or sublicense the licensed content or combine the licensed content with
    [Show full text]
  • Abuse of Dominantposition and Switching Costs
    UNIVERSITY OF LONDON REFUSAL TO LICENSE: ABUSE OF DOMINANT POSITION AND SWITCHING COSTS NET LE SUBMITTED TO THE LAW DEPARTMENT OF THE LONDON SCHOOL OF ECONOMICS AND POLITICAL SCIENCE FOR THE DEGREE OF DOCTOR OF PHILOSOPHY LONDON, MAY 2004 U /« 3 L \ * f LONDIU) \ WtfV. / UMI Number: U615726 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615726 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 Th e s e s F 353£ . Library British Library of Political and Economic Science IJW 5S 5 II ACKNOWLEDGEMENT Foremost, I wish to express my deep gratitude to my supervisors, Professor William T. Murphy and Mr. Andrew Murray for their continual support throughout this thesis. Their comments have helped to essentially improve the accuracy of my research. Further, I wish to thank Mr. Giorgio Monti for reviewing my drafts, sharing with me books, giving me invaluable feedback and assistance. Others from LSE whom I would like to thank include Doctors Carsten Sorensen and Ole Hanseth (Department of Information System), Professors Max Steuer, Dany Quah and Michele Picione (Department of Economics) for reading my drafts, generously sharing with me their knowledge, improving my understanding and moreover providing me with excellent research inspiration.
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • The Fuzzy Software Patent Debate Rages On
    OPINION The Fuzzy Software Patent Debate Rages On By Heather J. Meeker LinuxInsider 02/23/05 5:00 AM PT Once upon a time, we intellectual property lawyers got to live peacefully in our ivory towers. Now it seems that intellectual property policy issues have become fraught with partisan rhetoric. Most open-source promoters are against software patents. Most corporate spokesmen side with patents, period, whether they cover software or not. But it is worth looking beyond the rhetoric. The European Commission recently tolled the death knell for the EU Software Patent Directive, or more precisely, the "Directive on the Patentability of Computer- Implemented Inventions." Like most Americans, I am fairly clueless about the EU political process, and I wouldn't presume to write about exactly how it was killed. But the decision may have been swayed by an eleventh-hour public relations pitch against the directive by open-source spokesmen from the United States. On that aspect, I will add my two cents. A delegation of open-source leaders, led by Linus Torvalds, published an "Appeal" at softwarepatents.com, calling software patents "dangerous to the economy at large, and particularly to the European economy." Look Beyond the Rhetoric Leaders of the open-source software movement have long been harsh critics of software patents. The GPL [license] itself says, "any free program is threatened constantly by software patents." The appeal contends that copyright provides adequate protection for the creations of software authors. The Appeal advocated reliance on copyright law, rather than patent law, for the protection of software. Not long afterward, in late January, the European Parliament's Legal Affairs Committee recommended scrapping the pending directive, extending the debate until at least the end From www.linuxinsider.com/story/40676.html 1 April 2011 of the year.
    [Show full text]
  • Bright Ideas a Publication of the Intellectual Property Law Section of the New York State Bar Association
    NYSBA SPRING/SUMMER 2011 | VOL. 20 | NO. 1 Bright Ideas A publication of the Intellectual Property Law Section of the New York State Bar Association Message from the Chair I am pleased to report on but has never quite been able to fi nd the right place. I am a number of exciting develop- excited to report that we will be trying something differ- ments and activities of our ent this year: the Section’s 2011 Fall Meeting will be held Section. First, we had another at the Rittenhouse Hotel in Philadelphia from October great Annual Meeting in January. 20-23. We hope that moving the Meeting to an urban Kudos to our Annual Meeting venue will mix things up a bit and help keep the program Co-Chairs, Chuck Miller and Phil fresh. There are many fun things for our families (and Furgang, for putting together ourselves) to do in Philadelphia, and the city is easy to a fascinating program, which get to by train or by car from most points within New covered diverse and cutting-edge York. We are planning special events to take advantage of intellectual property topics Paul M. Fakler what the city has to offer, hopefully including an event at such as the latest developments the Franklin Institute (a wonderful museum named for in patent litigation, counterfeiting, intellectual property inventor and statesman Benjamin Franklin and dedi- legislation, ethical issues raised by cloud computing, and cated to science and technology). Traditionalists need not intellectual property protection in China. We also had the worry: we plan to return to one of our traditional upstate distinct honor of hosting a thought-provoking luncheon venues for the 2012 Fall Meeting.
    [Show full text]
  • Magazines Such As "Sassy," Which Theymaintain Are Not Sassy at All but Sexist and Oppressive in Theirideas About Who Women Should Be
    DOCUMENT RESUME ED 376 510 CS 214 644 AUTHOR Livingston-Webber, Joan TITLE How Sassy Are Grrrl Zines? PUB DATE 17 Mar 94 NOTE 13p.; Paper presented at the AnnualMeeting of the Conference on College Composition andCommunication (45th, Nashville, TN, March 16-19, 1994). Project supported in part by a grant from theUniversity of Nebraska at Omaha Committee on Research. PUB TYPE Viewpoints (Opinion/Position Papers, Essays,etc.) (120) Speeches/Conference Papers (150) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS Audience Awareness; *Creative Writing; Females; *Feminism; Higher Education; Language Role;*Literary Genres; *Periodicals; *Popular Culture;*Sex Role; Writing Instruction IDENTIFIERS Empowerment; *Zines ABSTRACT According to Lawrence Chua, "zines" are"xeroxed broadsides" which "make marginality theirstarting point, empowering voices excluded from the slickerjournals." According to "Ms," they are "downsized stapledrags...often defiantly tasteless." A subgenre of zines, "Grrrl zines" are thosewritten, produced, and distributed by young women, usually those of the20-something generation and younger. Swearing, obscenities,scandalous, provocative language are important elements in the arsenal the grrrlzines throw at the mainstream window from their fringe. Theirstatements of purpose say, in essence, that they exist to give young women avoice, to find others, to build community, to reassure andbe reassured. Exhorting women to "do something?"is an element of almost all the grrrlzines. Feminist in their orientation, zines are verycritical
    [Show full text]
  • Fictious Flattery: Fair Use, Fan Fiction, and the Business of Imitation
    Intellectual Property Brief Volume 8 Issue 2 Article 1 2016 Fictious Flattery: Fair Use, Fan Fiction, and the Business of Imitation Mynda Rae Krato George Washington University Follow this and additional works at: https://digitalcommons.wcl.american.edu/ipbrief Part of the Intellectual Property Law Commons Recommended Citation Krato, Mynda Rae (2016) "Fictious Flattery: Fair Use, Fan Fiction, and the Business of Imitation," Intellectual Property Brief: Vol. 8 : Iss. 2 , Article 1. Available at: https://digitalcommons.wcl.american.edu/ipbrief/vol8/iss2/1 This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Intellectual Property Brief by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Fictious Flattery: Fair Use, Fan Fiction, and the Business of Imitation This article is available in Intellectual Property Brief: https://digitalcommons.wcl.american.edu/ipbrief/vol8/iss2/1 FICTITIOUS FLATTERY: FAIR USE, FANFICTION, AND THE BUSINESS OF IMITATION Mynda Rae Krato INTRODUCTION ............. 92 L Background............................................................. 94 A. Foundational Statutory and Case Law..................................94 B. Fanfiction Case Law..............................................96 C. Popular Culture and the Power of Fandoms .............................
    [Show full text]
  • Locating and Extracting Digital Evidence from Hosted Virtual Desktop Infrastructures: Cloud Context
    Locating and Extracting Digital Evidence from Hosted virtual desktop Infrastructures: Cloud Context NIRBHAY JAWALE B.C.I.S (AUT University) New Zealand A thesis submitted to the graduate faculty of Design and Creative Technologies AUT University in partial fulfilment of the Requirements for the degree of Master of Forensic Information Technology School of Computing and Mathematical Sciences Auckland, New Zealand 2010 II Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Signature III Acknowledgements This thesis was conducted at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at AUT University, New Zealand. During the course of writing this thesis, I have received a valuable support from many people. Firstly, I would like to thank my family for their blessings, encouragement and believing that I could get through this study. Secondly, I am deeply thankful and honored by having Professor Ajit Narayanan as my thesis supervisor. This thesis would not have been possible without his guidance, encouragement and interest; he took to supervise my thesis topic. I very much enjoyed the critical discussions and comments on my research topic with Professor Ajit Narayanan, this thesis would not have been in the present form without his valuable contribution.
    [Show full text]
  • Intellectual Property Part 2 Pornography
    Intellectual Property Part 2 Pornography By Jeremy Parmenter What is pornography Pornography is the explicit portrayal of sexual subject matter Can be found as books, magazines, videos The web has images, tube sites, and pay sites scattered with porn Statistics 12% of total websites are pornography websites 25% of total daily search engine requests are pornographic requests 42.7% of internet users who view pornography 34% internet users receive unwanted exposure to sexual material $4.9 billion in internet pornography sales 11 years old is the average age of first internet exposure to pornography Innovations ● Richard Gordon created an e-commerce start up in mid- 90s that was used on many sites, most notably selling Pamela Anderson/Tommey Lee sex tape ● Danni Ashe founded Danni's Hard Drive with one of the first streaming video without requiring a plug-in ● Adult content sites were one of the first to use traffic optimization by linking to similar sites ● Live chat during the early days of the web ● Pornographic companies were known to give away broadband devices to promote faster connections Negative Impacts ● Between 2001-2002 adult-oriented spam rose 450% ● Malware such as Trojans and video codecs occur most often on porn sites ● Domain hijacking, using fake documents and information to steal a site ● Pop-ups preventing users from leaving the site or infecting their computer ● Browser hijacking adware or spyware manipulating the browser to change home page or search engine to a bogus site, including pay-per-click adult site ● Accessibility
    [Show full text]
  • Representations and Reality: Defining the Ongoing Relationship Between Anime and Otaku Cultures By: Priscilla Pham
    Representations and Reality: Defining the Ongoing Relationship between Anime and Otaku Cultures By: Priscilla Pham Submitted to OCAD University in partial fulfillment of the requirements for the degree of Master of Arts in Contemporary Art, Design, and New Media Art Histories Toronto, Ontario, Canada, April 2021 © Priscilla Pham, 2021 Abstract This major research paper investigates the ongoing relationship between anime and otaku culture through four case studies; each study considers a single situation that demonstrates how this relationship changes through different interactions with representation. The first case study considers the early transmedia interventions that began to engage fans. The second uses Takashi Murakami’s theory of Superflat to connect the origins of the otaku with the interactions otaku have with representation. The third examines the shifting role of the otaku from that of consumer to producer by means of engagement with the hierarchies of perception, multiple identities, and displays of sexualities in the production of fan-created works. The final case study reflects on the 2.5D phenomenon, through which 2D representations are brought to 3D environments. Together, these case studies reveal the drivers of the otaku evolution and that the anime–otaku relationship exists on a spectrum that teeters between reality and representation. i Acknowledgements I would like to express my deepest gratitude to my primary advisor, Ala Roushan, for her continued support and confidence in my writing throughout this paper’s development. Her constructive advice, constant guidance, and critical insights helped me form this paper. Thank you to Dr. David McIntosh, my secondary reader, for his knowledge on anime and the otaku world, which allowed me to change my perspective of a world that I am constantly lost in.
    [Show full text]
  • An Unhurried Critique of Copyright and the Potential for Alternatives
    University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2007 DON'T PANIC!: an unhurried critique of copyright and the potential for alternatives. Christopher L. Moore Dr University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/theses University of Wollongong Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorise you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: This work is copyright. Apart from any use permitted under the Copyright Act 1968, no part of this work may be reproduced by any process, nor may any other exclusive right be exercised, without the permission of the author. Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. A court may impose penalties and award damages in relation to offences and infringements relating to copyright material. Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong. Recommended Citation Moore, Christopher L., DON'T PANIC!: an unhurried critique of copyright and the potential for alternatives, PhD thesis, School of Social Sciences, Media and Communication, University of Wollongong, 2007.
    [Show full text]