The Present and Future of DRM - Musings on Emerging Legal Problems

This article presents a roadmap of emerging legal problems in the area of Digital Rights Management (DRM). It argues against adopting fundamentalist viewpoints in the DRM policy debate. In particular, DRM technology is much more flexible than many DRM critics acknowledge. The article covers various problems that are less frequently discussed in legal and policy circles. It analyzes the relationship between DRM, fair use, and innovation, using rights locker architectures, dynamic DRM systems, the Creative Commons project, DRM technology license agreements, and security research as examples. It addresses the alleged dichotomy between DRM and copyright levy systems as well as the implications of DRM for privacy protection. By analyzing various technology platforms, it describes the implications DRM has for competition in platform markets as well as in complementary aftermarkets. Finally, the article assesses recent efforts to standardize DRM technology, both by the private sector (in particular TCPA and Palladium), and by the legislature.

[1]  John S. Erickson Fair use, DRM, and trusted computing , 2003, CACM.

[2]  Randall Davis,et al.  The digital dilemma , 2001, CACM.

[3]  Larry Korba,et al.  Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..

[4]  Wendy E. Mackay,et al.  Triggers and barriers to customizing software , 1991, CHI.

[5]  Stefan Bechtold Governance in Namespaces , 2003 .

[6]  Deirdre K. Mulligan,et al.  Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.

[7]  Lunney,et al.  The Death of Copyright: Digital Technology, Private Copying, and the Digital Millennium Copyright Act , 2001 .

[8]  Stefan Bechtold Vom Urheber- zum Informationsrecht : Implikationen des Digital Rights Management , 2002 .

[9]  Paul England,et al.  Authenticated Operation of Open Computing Devices , 2002, ACISP.

[10]  Scott Stern,et al.  Innovation Policy and the Economy, Volume 2 , 2002 .

[11]  Dale A. Stirling,et al.  Information rules , 2003, SGMD.

[12]  Ralph Katz,et al.  Shifting Innovation to Users via Toolkits , 2002, Manag. Sci..

[13]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .

[14]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[15]  Andrew Huang,et al.  Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.

[16]  P Samuelson,et al.  Anticircumvention Rules: Threat to Science , 2001, Science.

[17]  H. Varian,et al.  A STRATEGIC GUIDE TO THE NETWORK ECONOMY , 2002 .

[18]  M. Heller,et al.  Can Patents Deter Innovation , 1998 .

[19]  Ethan M. Preston,et al.  Computer Security Publications: Information Economics, Shifting Liability and the First Amendment , 2002 .

[20]  Barbara Fox,et al.  Encouraging recognition of fair uses in DRM systems , 2003, CACM.

[21]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[22]  Eugene Volokh,et al.  The Mechanisms of the Slippery Slope , 2003 .

[23]  Phil Weiser Networks Unplugged: Towards A Model of Compatibility Regulation Between Information Platforms , 2001, ArXiv.

[24]  Masayuki Kumazawa,et al.  Relationship among copyright holders for use and reuse of digital contents , 2000, DL '00.

[25]  G. Calabresi,et al.  Property Rules, Liability Rules, and Inalienability: One View of the Cathedral , 1972 .

[26]  Chris DiBona,et al.  Open Sources: Voices from the Open Source Revolution , 1999 .

[27]  Herbert J. Hovenkamp Market Power in Aftermarkets: Antitrust Policy and the Kodak Case , 1993 .

[28]  Andrew Huang The Trusted PC: Skin-Deep Security , 2002, Computer.

[29]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[30]  Eric R. Emch Does Opportunism Explain Markups in Laser Printer Toner and Memory? - No and Yes. Evidence on Pricing in Laser Printer Aftermarkets , 2002 .

[31]  Mark A. Lemley Intellectual Property Rights and Standard-Setting Organizations , 2002 .

[32]  William A. Arbaugh,et al.  Improving the TCPA Specification , 2002, Computer.

[33]  Stefan Bechtold The Problems of Perfection , 2002 .

[34]  J. Zittrain What the publisher can teach the patient: intellectual property and privacy in an era of trusted privication. , 2000, Stanford law review.

[35]  Pamela Samuelson,et al.  Why the Anti-Circumvention Regulations Need to be Revised , 1999 .

[36]  D. Lichtman Property Rights in Emerging Platform Technologies , 1999, The Journal of Legal Studies.

[37]  Steven J. Vaughan-Nichols How trustworthy is trusted computing? , 2003, Computer.

[38]  Benjamin Klein,et al.  Market Power in Antitrust: Economic Analysis after Kodak , 1993, Supreme Court Economic Review.

[39]  Cassandra Imfeld,et al.  Playing Fair With Fair Use? The Digital Millennium Copyright Act's Impact on Encryption Researchers and Academicians , 2003 .

[40]  Wendy J. Gordon,et al.  Excuse and Justification in the Law of Fair Use: Commodification and Market Perspectives , 2002 .

[41]  Lawrence Lessig,et al.  The future of ideas - the fate of the commons in a connected world , 2002 .

[42]  Stefan Bechtold Digital Rights Management in the United States and Europe , 2004 .

[43]  Vincent Chiappetta,et al.  The Desirability of Agreeing to Disagree: The WTO, Trips, International IPR Exhaustion and a Few Other Things , 2000 .

[44]  Yochai Benkler,et al.  Intellectual Property and the Organization of Information Production , 2002 .

[45]  Dawn Xiaodong Song,et al.  A Cryptanalysis of the High-Bandwidth Digital Content Protection System , 2001, Digital Rights Management Workshop.

[46]  Lee A. Bygrave,et al.  Privacy, Data Protection and Copyright: Their Interaction in the Context of Electronic Copyright Management Systems , 1998 .

[47]  Peter Lyman,et al.  Intellectual Property: In the Information Age , 1989 .

[48]  Stan Karas,et al.  Sony Computer Entertainment, Inc. v. Connectix Corp. , 2001 .

[49]  Lee A. Bygrave,et al.  Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management , 2000 .

[50]  Julie E. Cohen Lochner in Cyberspace: The New Economic Orthodoxy of 'Rights Management' , 1998 .

[51]  B. Schneier,et al.  Electronic commerce and the street performer protocol , 1998 .

[52]  Michiko Yasukawa A Dynamic License Agreement System for Reuse of Web Contents , 2001, DS-9.

[53]  Hal R. Varian,et al.  Information rules - a strategic guide to the network economy , 1999 .

[54]  Margaret Jane Radin,et al.  Online Standardization and the Integration of Text and Machine , 2002 .

[55]  Wendy J. Gordon,et al.  Intellectual Property as Price Discrimination: Implications for Contract , 1999 .

[56]  C. Shapiro,et al.  Network Externalities, Competition, and Compatibility , 1985 .

[57]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[58]  Johann Bizer Datenschutzgerechte Gestaltung des technischen Urheberschutzes , 2001, Datenschutz und Datensicherheit.

[59]  Stephen E. Margolis,et al.  Network externality : an uncommon tragedy , 1994 .

[60]  Joan Feigenbaum,et al.  Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.

[61]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[62]  Christian Neubauer,et al.  Technical Aspects of Digital Rights Management Systems , 2002 .

[63]  Neil Weinstock Netanel,et al.  The Commodification of Information , 2002 .

[64]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[65]  Molly Shaffer Van Houweling Cultivating Open Information Platforms: A Land Trust Model , 2002, J. Telecommun. High Technol. Law.

[66]  Pm Schwartz,et al.  Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .

[67]  Philip J. Weiser Law and Information Platforms , 2002, J. Telecommun. High Technol. Law.

[68]  Aggelos Kiayias,et al.  On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.

[69]  Yahiko Kambayashi,et al.  Representation of reuse mechanisms for digital work with multiple right-holders , 2001, Proceedings 2001 Symposium on Applications and the Internet Workshops (Cat. No.01PR0945).

[70]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[71]  Oz Shy The Economics of Network Industries , 2001 .

[72]  Simson L. Garfinkel The Web's Unelected Government. , 1998 .

[73]  Barbara Gengler Reports: Trusted Computing Platform Alliance , 2001 .

[74]  Richard Stallman Can you trust your computer , 2002 .

[75]  P. Weiser Internet Governance, Standard Setting, and Self-Regulation , 2001 .

[76]  Martin Kretschmer,et al.  The failure of property rules in collective administration: rethinking copyright societies as regulatory instruments , 2002 .

[77]  R. Nelson,et al.  On the Complex Economics of Patent Scope , 1990 .

[78]  E. Kitch,et al.  The Nature and Function of the Patent System , 1977, The Journal of Law and Economics.

[79]  J. Boyle Cruel, Mean, or Lavish? Economic Analysis, Price Discrimination and Digital Intellectual Property , 2000 .

[80]  Jonathan Weinberg Digital TV, Copy Control, and Public Policy , 2002 .

[81]  Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.

[82]  Jeffrey K. MacKie-Mason,et al.  Exercising Market Power in Proprietary Aftermarkets , 2000 .

[83]  Mark Gimbel Some Thoughts on the Implications of Trusted Systems for Intellectual Property Law , 1998 .

[84]  Joseph P. Liu The DMCA and the Regulation of Scientific Research , 2003 .

[85]  Janet Hope,et al.  Open Source Licensing , 2004 .

[86]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[87]  E. Kitch,et al.  Elementary and Persistent Errors in the Economic Analysis of Intellectual Property , 2000 .

[88]  L. Guibault Copyright Limitations and Contracts: An Analysis of the Contractual Overridability of Limitations on Copyright , 2002 .

[89]  A. Kroon Protection of Copyright Management Information , 1998 .

[90]  Suzanne Scotchmer,et al.  Intellectual Property: When Is It the Best Incentive System? , 2002, Innovation Policy and the Economy.

[91]  Siani Pearson,et al.  Trusted Computing Platforms: TCPA Technology in Context , 2002 .

[92]  Julie E. Cohen Copyright and the Perfect Curve , 2000 .

[93]  Edward W. Felten,et al.  A skeptical view of DRM and fair use , 2003, CACM.

[94]  Eric R. Emch Price Discrimination Via Proprietary Aftermarkets , 2000 .

[95]  P. Samuelson,et al.  The Law and Economics of Reverse Engineering , 2002 .

[96]  Robert P. Merges,et al.  Contracting into Liability Rules: Intellectual Property Rights and Collective Rights Organizations , 1996 .

[97]  C. Dennis Allen,et al.  User customization of a word processor , 1996, CHI.

[98]  Wendy J. Gordon,et al.  Market failure and intellectual property: a response to Professor Lunney , 2002 .

[99]  Lucie Guibault Computer und Recht International , 2000 .