When copyrighted works are distributed in digital form, publishers sometimes attach "technical access control"such as encryptionthat controls the mode of use. For example, an electronic book could be viewed but not printed, or a movie could be shown on a screen but not copied. However, technical access control prevents many kinds of uses of the material that would not be considered copyright infringementmaking a copy for personal use, searching the material, and so on. Therefore, until 1998 it was legal for the owner of a copy of a copyrighted work to circumvent the access control for a noninfringing use. (Circumvention for the purpose of infringing on the copyright, for instance, redistributing copies, has never been legal.)
The Digital Millennium Copyright Act of 1998 provides that "no person shall circumvent a technological measure that effectively controls access to a work protected under this title" and makes circumvention a federal felony. However, the Librarian of Congress is given regulatory power to exempt certain classes of work from the prohibition on circumvention of technical access restrictions. (It is interesting to note there is a quadruple negative in the law.)
The Copyright Office of the Library of Congress has solicited public comment as part of the process of determining whether there are particular classes of copyrighted works that shall be exempted from the prohibition because persons who are users of those classes of works "are, or are likely to be in the succeeding three-year period, adversely affected by virtue of the prohibition in their ability to make noninfringing uses of that particular class of works under this title." Public comments (including this one) can be viewed at the Library of Congress Web site (lcweb.loc.gov/copyright/1201).
Suppose Alice, a scholar who owns a roomful of books, wants to search all of the books for references to Francis Bacon, accumulating a list of citations. Alice may employ an assistant to skim through the books and collect this information. Similarly, if Alice owns a collection of copyrighted books on digital media, she may want to perform a similar search electronically. Whether a human assistant or a computer program searches the books is legally immaterial; employing a computer program to search the books is fair use.
Computers offer many practical advantages for search applications. It might be prohibitively expensive to search a large collection by hand, but doing the same search on an inexpensive computer might provide an instant result. Thus, manual searches cannot substitute for computerized searches.
Laws prohibiting scholars from using computerized assistants artificially impede the progress of scholarship and science. If the digital works are technically protected in such a way that they can be viewed on the screen but not electronically searched, then the technical protection interferes with noninfringing uses.
In this scenario, the publisher may meet Alice's needs by providing a generic text search facility. Alice could search for the words "Francis Bacon" or perhaps "Bacon" and sort through the results of the search manually. Although a generic publisher-provided search facility can satisfy Alice, we will see how such a facility fails to meet the needs of many other scholars.
Thematic search of musical scores. Suppose Bob, a scholar who owns a collection of musical scores, wants to search for the occurrence of a particular musical theme. Copyright law permits Bob to do this; whether a human assistant or a computer program performs the search is legally immaterial. Technical protections on digital works that prevent computerized searches (on privately owned copies) interfere with noninfringing uses of copyrighted works.
Searches of this type have many research uses in musicology. Indeed, entire research centers, such as the Center for Computer Assisted Research in the Humanities (at Stanford University), focus on technological search and analysis of music. There is a great deal of active research on how to encode musical scores for computerized analysis and how to perform the analyses. (Selfridge-Field's book  summarizes research in this area and provides many citations to the research literature.)
Musicology researchers perform several kinds of operations on musical scores: they translate the scores into different electronic formats to facilitate analysis; they develop novel search and analysis criteria to represent abstract concepts such as "musical themes"; and they develop novel search techniques to efficiently find certain patterns in encoded musical scores.
These activities all require the ability to write computer programs that analyze a score directly. Unless the publisher of an electronic musical score provides scholars with the ability to write computer programs that directly access the score, scholars will lose the ability to perform these kinds of analyses.
Note that generic publisher-provided search facilities cannot possibly meet this need. Researchers are constantly developing new and better search methodologies. Confining scholars to any particular search facility impedes research on new search methods.
Thematic search of a musical work. Suppose Claire, a scholar who owns a collection of musical recordings, wants to search for a particular musical theme. Like Alice and Bob, Claire has the right under copyright law to do this, using either a human assistant or a computer program.
Claire finds herself facing a more difficult research problem than Bob. Effective searching through audio recordings of music is a very difficult research problem that has seen steady but slow progress over the last 20 years, for example, in the research on "structured audio" . Active research groups in this area need access to a wide variety of recorded musical works in order to prototype, test, and improve their technology. Like Bob, Claire needs to write computer programs that access the original work directly.
Video. Suppose David, a public-health researcher who owns a collection of recorded movies, wants to search for depictions of cigarettes and related paraphernalia. David has this right under copyright law.
The algorithms for doing this automatically are not yet mature, but an active and robust discipline of "video content analysis"  or "object-based video coding"  seeks to provide tools for this kind of query. Research in these areas progresses by devising computer programs that take video content as input. Research would be severely inhibited if scientists cannot access the actual video content of the works they purchase, but are limited by restrictive interface mechanisms to on-screen viewing or specific kinds of searches.
Innovative text searches and analysis. Modern scholars of Shakespeare analyze the frequency of word usage in the playwright's different works. Shakespeare is known to have acted the role of the ghost in "Hamlet." Donald Foster of Vassar College used statistical computations and noticed that specific words the ghost speaks appear more frequently in Shakespeare's next playit's as if the words were on Shakespeare's mind while writing it. In each play, there seems to be one role whose words appear more frequently in all roles of the next play .
This particular kind of statistical analysis could not be foreseen by a publisher of the texts of Shakespeare's plays. Almost any generic search-engine interface would be too limited to calculate the specific correlations necessary for this analysis. To efficiently perform a computerized test of the theory that Shakespeare acted in all his own plays, the full text of the plays must be readable by a computer program of the scholar's own devising.
Innovative analysis of computer programs. The same kind of analysis Foster applied to Shakespeare can be applied to computer programs. A large computer program is typically written by many programmers, each contributing a part. An automatic analysis of the program might correlate this data with the engineering practices used to develop the program. Such data is useful in developing codes of engineering practice. Technical mechanisms that restrict access to the computer software inhibit scholarly research on the program.
Computer programs are usually protected not just by copyright law, but by licenses. The license contracts may prohibit the kind of analysis described. We do not wish to address the legitimacy of such constructs. However, copyright law would naturally consider such analysis to be a noninfringing use, and therefore the regulations of copyright should not sanction technical protection mechanisms that interfere with this use.
Technical protection mechanisms that prevent computer programs from accessing the underlying content of copyrighted materials will hinder legitimate noninfringing uses vital to scholarship and science, specifically in the domains of natural language text (such as books), musical scores, musical performance, other audio material, video and movies, and computer programs.
2. Library of Congress Copyright office. Exemption to prohibition on circumvention of copyright protection systems for access control technologies. Federal Register 64 226, 6613966143, (Nov. 1999); lcweb.loc.gov/copyright/fedreg/64fr66139.pdf.
This "Viewpoint" is a response to the Copyright Office's request for comments  on what classes of works should be exempted from the Digital Millennium Copyright Act's prohibition on circumventing technological measures that control access to copyrighted works.
©2000 ACM 0002-0782/00/0900 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2000 ACM, Inc.
No entries found