Recommendation of the Register of Copyrights in RM 2008-8

Total Page:16

File Type:pdf, Size:1020Kb

Recommendation of the Register of Copyrights in RM 2008-8 The Register ofCopyrights United States Copyright Office· Library of Congress • 101 Independence Avenue SE· Washington., DC 20559-6000 TO: James H.Billington DATE: June 11,2010 The Librarian of congr~ FROM: Marybeth Peters ~ Register ofCopyrIghts SUBJECT: Recommendation ofthe Register of Copyrights in RM 2008-8; Rulemaking on Exemptions from Prohibition on Circumvention ofCopyright Protection Systems for Access Control Technologies I am pleased to present my recommendation relating to the rulemaking on exemptions from the prohibition on circumvention oftechnological measures that control access to copyrighted works. This document constitutes my formal recommendation., as required pursuant to 17 U.S.C. § 1201(a)(I)(C). Outline of the Recommendation I. BACKGROUND A. Legislative Requirements for Rulemaking Proceeding B. Responsibilities ofRegister of Copyrights and Librarian of Congress C. The Purpose and Focus of the Rulemaking 1. Purpose ofthe Rulemaking 2. The Necessary Showing 3. Determination of"Class o.fWorks" D. Consultation with the Assistant Secretary for Communications and Information II. SOLICITATION OF PUBLIC COMMENTS AND HEARINGS III. THE DESIGNATED CLASSES A. Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: Recommendation of the Register of Copyrights June 11, 2010 Page 2 • Educational uses by college and university professors and by college and university film and media studies students; • Documentary filmmaking; • Noncommercial videos B. Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. C. Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. D. Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: • The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and • The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. E. Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. IV. OTHER CLASSES CONSIDERED, BUT NOT RECOMMENDED A. Subscription based services that offer DRM-protected streaming video where the provider has only made available players for a limited number of platforms, effectively creating an access control that requires a specific Recommendation of the Register of Copyrights June 11, 2010 Page 3 operating system version and/or set of hardware to view purchased material; and Motion pictures protected by anti-access measures, such that access to the motion picture content requires use of a certain platform. B. Lawfully purchased sound recordings, audiovisual works, and software programs distributed commercially in digital format by online music and media stores and protected by technological measures that depend on the continued availability of authenticating servers, when such authenticating servers cease functioning because the store fails or for other reasons; and Lawfully purchased sound recordings, audiovisual works, and software programs distributed commercially in digital format by online music and media stores and protected by technological measures that depend on the continued availability of authenticating servers, prior to the failure of the servers for technologists and researchers studying and documenting how the authenticating servers that effectuate the technological measures function. C. Software and information recorded, produced, stored, manipulated or delivered by the software, that a forensic investigator seeks to copy, activate, or reverse engineer in order to obtain evidence in a court proceeding. D. Audiovisual works delivered by digital television ("DTV") transmission intended for free, over-the-air reception by anyone, which are marked with a "broadcast flag" indicator that prevents, restricts, or inhibits the ability of recipients to access the work at a time of the recipient's choosing and subsequent to the time of transmission, or using a machine owned by the recipient but which is not the same machine that originally acquired the transmission. E. Audiovisual works embedded in a physical medium (such as Blu-Ray discs) which are marked for "down-conversion" or "down-resolutioning" (such as by the presence of an Image Constraint Token "ICT") when the work is to be conveyed through any of a playback machine's existing audio or visual output connectors, and therefore restricts the literal quantity of the embedded work available to the user (measured by visual resolution, temporal resolution, and color fidelity). F. Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format. Recommendation of the Register of Copyrights June 11, 2010 Page 4 I. BACKGROUND A. Legislative Requirements for Rulemaking Proceeding The Digital Millennium Copyright Act (“DMCA”), Pub. L. No. 105-304 (1998), was enacted to implement certain provisions of the WIPO Copyright Treaty (“WCT”) and WIPO Performances and Phonograms Treaty (“WPPT”). It established “a wide range of rules that will govern not only copyright owners in the marketplace for electronic commerce, but also consumers, manufacturers, distributors, libraries, educators, and on-line service providers”; it “define[d] whether consumers and businesses may engage in certain conduct, or use certain devices, in the course of transacting electronic commerce.”1 Title I of the Act, which added a new Chapter 12 to title 17 of the United States Code, prohibits circumvention of certain technological measures employed by or on behalf of copyright owners to protect their works ( i.e. “access controls”). Specifically, Section 1201(a)(1)(A)2 provides, in part, that “[n]o person shall circumvent a technological measure that effectively controls access to a work protected under this title.” In order to ensure that the public will have continued ability to engage in noninfringing uses of copyrighted works, such as fair use,3 subparagraph (B) limits this prohibition. It provides that the prohibition against circumvention “shall not apply to persons who are users of a copyrighted work which is in a particular class of works, if such persons are, or are likely to be in the succeeding three-year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works under this title” as determined in a rulemaking proceeding. The rulemaking proceeding is conducted by the Register of Copyrights, who is to provide notice of the rulemaking, seek comments from the public, consult with the Assistant Secretary for Communications and Information of the Department of Commerce, and recommend final regulations to the Librarian of Congress.4 The regulations, to be issued by the Librarian of Congress, announce “any class of copyrighted works for which the Librarian has determined, 1 Report of the House Committee on Commerce on the Digital Millennium Copyright Act of 1998, H.R. Rep. No. 105-551, pt. 2, at 22 (1998) (“Commerce Comm. Report”). 2 Unless otherwise stated, all statutory references hereinafter are to sections of title 17, United States Code. 3 See Commerce Comm. Report at 25-26, 35. 4 Report of the Committee of Conference on the Digital Millennium Copyright Act, H.R. Conf. Rep. No. 105-796, at 64 (1998) (“Conf. Report”). In addition, a number of statutory exceptions are codified at Section 1201(d)-(j). Recommendation of the Register of Copyrights June 11, 2010 Page 5 pursuant to the rulemaking conducted under subparagraph (C), that noninfringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected, and the prohibition contained in subparagraph (A) shall not apply to such users with respect to such class of works for the ensuing 3-year period.”5 This is the fourth Section 1201 rulemaking. The first rulemaking culminated in the Librarian’s issuance of a regulation
Recommended publications
  • Understanding Microsoft Virtualization Solutions Ebook
    MICROSOFT LICENSE TERMS MICROSOFT EBOOK These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the licensed content named above, which includes the media on which you received it, if any. By using the licensed content, you accept these terms. If you do not accept them, do not use the licensed content. If you comply with these license terms, you have the rights below. 1. OVERVIEW. Licensed Content. The licensed content includes the eBook and associated media. License Model. The licensed content is licensed on a per user per device basis. 2. INSTALLATION AND USE RIGHTS. a. General. One user may install and use one copy of the licensed content on a single computer. b. Portable Device. You may install an additional copy of the licensed content on a portable device for the exclusive use of the primary user of the first copy of the licensed content. 3. SCOPE OF LICENSE. The licensed content is licensed, not sold. This agreement only gives you some rights to use the licensed content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the licensed content only as expressly permitted in this agreement. You agree Not to make copies of the licensed content; Not to distribute, rent, lease, lend, reproduce, transit, adapt, modify, link to, post, forward, make derivative works based upon, disseminate, publish or sublicense the licensed content or combine the licensed content with
    [Show full text]
  • CI Plus DEVICE INTERIM LICENSE AGREEMENT
    CI Plus DEVICE INTERIM LICENSE AGREEMENT THIS CI Plus DEVICE INTERIM LICENSE AGREEMENT (the “Agreement”) entitles Licensee to access and use certain security elements, authentication certificates, specifications, software and test materials, to develop and manufacture compliant Hosts (as defined below) and/ or Modules (as defined below). The Agreement also includes an optional Logo (as defined below) license to the CI Plus mark for use on Registered Devices (as defined below). The Agreement is by and between CI Plus LLP (“CI Plus TA”) a United Kingdom limited liability partnership, and the Licensee identified below. The Agreement is effective as of the last date signed below (the “Effective Date”). CI PLUS LLP: Pannell House, Park Street, Guildford, Surrey, GU1 4HN. United Kingdom Registered in England and Wales. Registered No: OC341596 Individual Authorised Signatory: Title: Phone: Fax: E-Mail: Signed: Name: Title: Date: LICENSEE: Company Name: Address: City: State: Postal Code: Country: Individual Authorised Signatory: Title: Phone: Fax: E-Mail: Signed: Name: Title: Date: Note to Licensee: Licensee shall elect either or both “Host” and/or “Module” in the definition of “Licensed Product” or “Licensed Component” by their selection in accordance with product category to be licensed at sections 1.25 or 1.26 CI Plus Interim Device License Agreement 1 Issued: 1st January 2012 WHEREAS, the group of companies that has established CI Plus TA has developed certain technology and methods for data encryption, encryption key management, and encryption
    [Show full text]
  • Closing Note Issued by Media Development Authority Of
    CLOSING NOTE ISSUED BY MEDIA DEVELOPMENT AUTHORITY OF SINGAPORE CONTENT PROTECTION SECURITY REQUIREMENTS in support of the CROSS-CARRIAGE MEASURE IN THE PAY TV MARKET ISSUED ON: 1 July 2011 1. Introduction 2. MDA’s Responses to Comments Received 3. Conclusion and Issuance of Guidelines Annex A – References Annex B – Glossary of Terms Closing Note on Guidelines on Content Protection Security Requirements in Support of the Cross-Carriage Measure 1. Introduction 1.1. On 12 March 2010, the Media Development Authority (“ MDA ”) introduced the cross-carriage measure (“ Measure ”) to address MDA’s concerns over the nature of competition developing in the Singapore pay TV market and, in particular, the high degree of content fragmentation which had resulted in increased inconvenience and attendant costs for consumers and created significant barriers to entry for new entrants. The Measure imposes an obligation on Supplying Qualified Licensees (“ SQLs ”) (as defined in the Code of Practice for Market Conduct in the Provision of Media Services, also known as Media Market Conduct Code 2010 (“ MMCC 2010 ”)) to widen the distribution of their channels or programming content which are Qualified Content 1 (“ QC ”), by offering such content for access by SQLs’ subscribers over the Relevant Platforms 2 of Receiving Qualified Licensees (“ RQLs ”). 1 “Qualified Content” means: (i) any channel or programming content (whether in a linear or non-linear format), including any basic function in support of such channel or programming content that is specified in
    [Show full text]
  • Locating and Extracting Digital Evidence from Hosted Virtual Desktop Infrastructures: Cloud Context
    Locating and Extracting Digital Evidence from Hosted virtual desktop Infrastructures: Cloud Context NIRBHAY JAWALE B.C.I.S (AUT University) New Zealand A thesis submitted to the graduate faculty of Design and Creative Technologies AUT University in partial fulfilment of the Requirements for the degree of Master of Forensic Information Technology School of Computing and Mathematical Sciences Auckland, New Zealand 2010 II Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Signature III Acknowledgements This thesis was conducted at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at AUT University, New Zealand. During the course of writing this thesis, I have received a valuable support from many people. Firstly, I would like to thank my family for their blessings, encouragement and believing that I could get through this study. Secondly, I am deeply thankful and honored by having Professor Ajit Narayanan as my thesis supervisor. This thesis would not have been possible without his guidance, encouragement and interest; he took to supervise my thesis topic. I very much enjoyed the critical discussions and comments on my research topic with Professor Ajit Narayanan, this thesis would not have been in the present form without his valuable contribution.
    [Show full text]
  • Microsoft Corporation As Amicus Curiae in Support of Petitioner ————
    No. 18-956 IN THE Supreme Court of the United States ———— GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. ———— On Writ of Certiorari to the United States Court of Appeals for the Federal Circuit ———— BRIEF OF MICROSOFT CORPORATION AS AMICUS CURIAE IN SUPPORT OF PETITIONER ———— LISA W. BOHL JEFFREY A. LAMKEN MOLOLAMKEN LLP Counsel of Record 300 N. LaSalle St. MICHAEL G. PATTILLO, JR. Chicago, IL 60654 MOLOLAMKEN LLP (312) 450-6700 The Watergate, Suite 660 600 New Hampshire Ave., NW LEONID GRINBERG Washington, DC 20037 MOLOLAMKEN LLP (202) 556-2000 430 Park Ave. [email protected] New York, NY 10022 (212) 607-8160 Counsel for Amicus Curiae :,/621(3(635,17,1*&2,1&± ±:$6+,1*721'& TABLE OF CONTENTS Page Interest of Amicus Curiae ......................................... 1 Summary of Argument ............................................... 3 Argument ...................................................................... 6 I. Innovation in Today’s Computer Industry Depends on Collaborative Development and Seamless Interoperability—Both of Which Require Reuse of Functional Code .............................. 7 A. Innovation in the Modern Computer Industry Relies on Collaborative Development ..................... 7 B. Interoperability Is a Key Component of Technological Innovation Today ....................................... 10 C. Reuse of Functional Software Code, Including APIs, Is Critical To Promoting Collaborative Development and Interoperability ......... 12 II. Courts Have Long Applied a Flexible Fair Use Doctrine To Address Software’s Unique Nature ............................. 15 A. Software’s Collaborative and Functional Elements Distinguish It from Traditional Creative Works Subject to Copyright Protection ............. 16 B. A Flexible Fair Use Doctrine Is Essential To Promoting Collaboration and Interoperability in Modern Software Development— As Courts Have Long Recognized .......... 18 (i) ii TABLE OF CONTENTS—Continued Page C.
    [Show full text]
  • SCRAPING PHOTOGRAPHS Maggie King
    SCRAPING PHOTOGRAPHS Maggie King INTRODUCTION ................................................................ 188 I. TECHNICAL BACKGROUND ON SCRAPING ................................... 190 A. How to Scrape a Photograph ....................................... 190 B. Why Scrape a Photograph? ......................................... 192 II. THE LAW OF SCRAPING ................................................... 193 A. CFAA Claims ......................................................... 194 1. CFAA Background: Ambiguous Statutory Language ......... 194 2. CFAA Scraping Claims in Caselaw .............................. 195 B. Contract Claims ..................................................... 197 C. Copyright Claims .................................................... 198 III. SCRAPING PHOTOGRAPHS ............................................. 200 A. Copyright and Photographs ........................................ 201 1. Analogous scraping activities are fair use ..................... 202 2. Face Scans are not protectible derivative works. ............ 203 B. Data Ownership ..................................................... 205 1. Non-exclusive licenses bar platforms from asserting claims for user-generated data ............................................... 205 2. Paths to asserting user claims directly ........................ 206 IV. UNRESTRICTED SURVEILLANCE AND STRONGER PROTECTIONS FOR CYBERPROPERTY .............................................................. 207 CONCLUSION .................................................................
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • Copyright and Copy-Reliant Technology. Matthew As G Loyola University Chicago, [email protected]
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2009 Copyright and Copy-Reliant Technology. Matthew aS g Loyola University Chicago, [email protected] Follow this and additional works at: http://lawecommons.luc.edu/facpubs Part of the Law Commons Recommended Citation Sag, Matthew, Copyright and Copy-Reliant Technology,103 NU L.R. 1607 (2009) This Article is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Faculty Publications & Other Works by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. Copyright 2009 by Northwestern University School of Law Printed in U.S.A. Northwestern University Law Review Vol. 103, No. 4 COPYRIGHT AND COPY-RELIANT TECHNOLOGY Matthew Sag* INTRODUCTION ........................................................................................................... 1607 I. COPY-RELIANT TECHNOLOGIES AND THE INTERNET ............................................ 1610 A. New Technologies, Copyright Markets, and Copyright Law ..................... 1611 B. Four Case Studies of Copy-Reliant Technology ........................................ 1616 II. THE DOCTRINAL IMPLICATIONS OF NONEXPRESSIVE USE .................................... 1624 A. The Principle of Nonexpressive Use ......................................................... 1624 B. Doctrinal Incorporation of Nonexpressive Use ......................................... 1639 C. Fair Use and Nonexpressive Use .............................................................
    [Show full text]
  • Rethinking Anticircumvention's Interoperability Policy
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2009 Rethinking Anticircumvention's Interoperability Policy Aaron K. Perzanowski Case Western University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Intellectual Property Law Commons Repository Citation Perzanowski, Aaron K., "Rethinking Anticircumvention's Interoperability Policy" (2009). Faculty Publications. 44. https://scholarlycommons.law.case.edu/faculty_publications/44 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. Rethinking Anticircumvention’s Interoperability Policy Aaron K. Perzanowski* Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act (“DMCA”) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA’s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. However, both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA’s impact on interoperability.
    [Show full text]
  • Hdfury3 USER MANUAL
    HDfury3 USER MANUAL 2 HDfury3 User Manual Table of Contents Table of Contents .......................................................................................................... 2 Overview ........................................................................................................................ 3 Connecting Cables ........................................................................................................ 4 Power/Status LED ......................................................................................................... 5 HDMI Input Selection .................................................................................................... 6 RGB Shift (Image Centering) ........................................................................................ 7 DIP Switch Settings ....................................................................................................... 8 RGB/Component Output ............................................................................................ 10 RGB Sync .................................................................................................................. 11 Enhanced Colour Depth ............................................................................................ 13 RGB Shift ................................................................................................................... 14 Power/Status LED ..................................................................................................... 15 Limiting Resolution
    [Show full text]
  • Matthew Sag* Abstract This Article Studies the Rise
    COPYRIGHT AND COPY-RELIANT TECHNOLOGIES Matthew Sag* Abstract This article studies the rise of copy-reliant technologies – technologies such as Internet search engines and plagiarism detection software that, although they do not read, understand or enjoy copyrighted works, necessarily copy them in large quantities. This article provides a unifying theoretical framework for the legal analysis of topics that tend to be viewed discretely. Search engines, plagiarism detection software, reverse engineering and Google’s nascent library cataloging effort, are each part of a broader phenomenon brought about by digitization, that of copy-reliant technologies. These technologies raise two novel, yet central, questions of copyright law. First, whether a non-expressive use that nonetheless requires copying the entirety of a copyright work should be found to infringe the exclusive rights of the copyright owner. Second, whether the transaction costs associated with copy-reliant technologies justify switching copyright’s default rule that no copying may take place without permission to one in which copyright owners must affirmatively opt-out of specific uses of their works. Keywords: Internet, Copyright, Non-expressive use, Opt-out, Fair use, Transaction costs. Word-count: 34,987. * Visiting Assistant Professor, University of Virginia School of Law & Assistant Professor, DePaul University College of Law. Please address comments to [email protected]. Thanks to Tonja Jacobi, Adam Mossoff, Dotan Oliar, Glen Robinson, and Christopher Sprigman and to participants at the American Intellectual Property Law Association Annual Meeting, and the Intellectual Property Scholars Conference for their comments and suggestions. Special thanks to the University of Virginia School of Law Library staff for their invaluable assistance.
    [Show full text]
  • 01}March 02} Issue Volume
    VolumeVolume 02}05} Issue 01}March 2013 Editorials Editorial 1 Daniel M. German Articles Copyleft, -right and the case law on APIs on both sides of the Atlantic 5 Walter van Holst Lisping Copyleft: A Close Reading of the Lisp LGPL 15 Eli Greenbaum Platform The Rise and Evolution of the Open Source Software Foundation 31 Paula Hunter, Stephen Walli Legislative Review FOSS in the Italian public administration: fundamental law principles 43 Simone Aliprandi, Carlo Piana Available online at: http://www.ifosslr.org Volume 02}05} Issue 01} March 2013 Editorial Committee !aniel German Daniel German is is Associate Professor, Computer Science, This publication is managed by a rotating Editorial Committee. University of Victoria. His main area of research is software The membership of the Committee for this issue is as follows: engineering. In particular, software evolution, open source and intellectual property. Daniel teaches several courses at Uvic, Malcolm Bain primarily Database Systems (CSC370), Social and Professional Malcolm is partner at id law partners, a Barcelona based law Issues (SENG401), Media Applications (SENG410) and more firm specialising in IT law, with a focus on FOSS projects. As recently Intro to Software Engineering (SENG265). well as his private practice, Malcolm participates pro bono in a number of FOSS related initiatives and teaches the legal "ilayne #o$e%oy aspects of FOSS at university. Jilayne Lovejoy is corporate counsel at OpenLogic, a provider of open source software support, provisioning, and compliance Amanda Brock solutions to enterprises. In addition to traditional corporate Amanda Brock is Director at the international technology law counsel responsibilities, Jilayne helps develop OpenLogic’s firm, Origin, www.origin.co.uk.
    [Show full text]