PAGE 1 1 LIBRARY OF CONGRESS 2 3 + + + + + 4 5 UNITED STATES COPYRIGHT OFFICE 6 7 + + + + + 8 9 HEARING ON EXEMPTION TO PROHIBITION ON 10 CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS 11 FOR ACCESS CONTROL TECHNOLOGIES 12 13 + + + + + 14 15 DOCKET NO. RM 9907 16 17 + + + + + 18 19 Tuesday, May 2, 2000 20 21 + + + + + 22 23 The hearing in the above-entitled matter 24 was held in Room 202, Adams Building, Library of 25 Congress, 110 Second Street, S.E., Washington, D.C., 26 at 10:00 a.m. 27 28 BEFORE: 29 30 MARYBETH PETERS, Register of Copyrights 31 32 DAVID CARSON, ESQ., General Counsel 33 34 RACHEL GOSLINS, ESQ, Attorney Advisor 35 36 CHARLOTTE DOUGLASS, ESQ., Principal Legal 37 38 39 ROBERT KASUNIC, ESQ., Senior Attorney Advisor PAGE 2 1 I-N-D-E-X 2 3 4 5 Panel I: 6 7 Peter Jaszi 8 8 Digital Future Coalition 9 Sarah Wiant 19 10 American Association of Law Libraries 11 Betty Landesman 30 12 D.C. Library Association 13 14 15 16 17 18 Panel II: 19 20 Christopher A. Mohr, Esquire 89 21 American Business Pres, et al. 22 David Mirchin 98 23 SilverPlatter 24 Joseph Montoro 110 25 Spectrum Software 26 Keith Kupferschmid 134 27 Software & Information Industry Assoc. 28 PAGE 3 1 P-R-O-C-E-E-D-I-N-G-S 2 10:10 a.m. 3 MS. PETERS: Good morning. My name is 4 Marybeth Peters. I am the Register of Copyrights, 5 which means Director of the United States Copyright 6 Office. I welcome you to the first of three days of 7 hearings here at the Library of Congress. Today, 8 tomorrow and Thursday we will hear testimony which 9 generally we'll begin at 10:00 in the morning and 10 generally will begin at 2:00 in the afternoon, 11 although I have a crisis this afternoon, so this 12 afternoon we're actually going to begin at 2:30. 13 Two weeks from Thursday we will hold 14 another day and a half of hearings at Stanford 15 University in Palo Alto. Those dates are May 18th 16 and 19th. A schedule for all five days of the 17 hearings is available today and is also available on 18 the Copyright Office web site. 19 As I think all of you who are here know, 20 these hearings are part of an ongoing rule making 21 process mandated by Congress under Section 22 1201(a)(1) of Title 17 of the United States Code. 23 Section 1201 was enacted in 1998 as part of a 24 Digital Millennium Copyright Act. It provides that 25 no person shall circumvent a technological measure 26 that effectively controls access to a copyrighted PAGE 4 1 2 not go into effect until October 28, 2000, two years 3 after the date of enactment of the DMCA. 4 Section 1201(a)(1) provides that the 5 Librarian of Congress may exempt certain classes of 6 works from the prohibition against circumvention of 7 technological measures that control access to 8 copyrighted works through this rule making 9 procedures. The purpose of our proceeding is to 10 determine whether there are particular classes of 11 works as to which users are or likely to be 12 adversely effected in their ability to make non- 13 infringing uses. They are prohibited from 14 circumventing technological access control measures. 15 Pursuant to the Copyright Offices' 16 notice of inquiry published in the Federal Register 17 on November 24, 1999 the Office has receive 235 18 initial comments and 129 reply comments. All of 19 these are available on our web site for viewing and 20 for downloading. 21 After the hearings here and at Stanford 22 we will accept a final round of post-hearing 23 comments. These post-hearing comments are due 24 Friday, June 23rd. In order to allow interested 25 parties adequate time to respond the hearing 26 testimony the Copyright Office intends to post the PAGE 5 1 transcripts of all of the hearings on our web site 2 as soon as they are available. We also intend to 3 record the testimony for streaming and/or 4 downloading from our web site and we expect that 5 those recordings will be available before the 6 transcript. The transcripts will be posted on the 7 web site as they are originally transcribed, but the 8 office will give persons testifying an opportunity 9 to correct any errors in the transcripts and when 10 those corrections are received we will put the 11 corrected transcripts on the web site. 12 Those of you who are here to testify 13 have already been advised what we intend to do. 14 And, by you appearance we understand that we have 15 your consent to do this. The comments, reply 16 comments, hearing testimony and post-hearing 17 comments will form the basis of evidence for my 18 recommendation to the Librarian of Congress. 19 Before making that recommendation I am 20 to consult with the Assistant Secretary for 21 Communications and Information of the Department of 22 Commerce's National Telecommunications and 23 Information Administration. We have already begun 24 those consultations and expect to have more 25 discussions with NTIA after the hearings. 26 After receiving my recommendation the PAGE 6 1 Librarian will determine by the October 28th 2 deadline whether or not there are any classes of 3 works that shall be exempted from the prohibition 4 against circumvention of the access control measures 5 during the three years, beginning October 28, 2000 6 to October 28, 2003. 7 It is clear from the legislative history 8 that this proceeding is to focus on distinct, 9 verifiable and measurable impacts. Isolated or de 10 minimus effects, speculation or conjecture, and mere 11 inconvenience do not rise to the requisite level of 12 proof. Any recommendations for exemptions must be 13 based on specific impacts of particular classes of 14 works. 15 The panel will be asking some tough 16 questions of the participants in an effort to define 17 the issues. I stress that both sides will receive 18 difficult questions and none of the questions should 19 be seen as expressing a particular view by the 20 panel. It's merely a way to elicit more 21 information. This is an ongoing proceeding and no 22 decisions have been made yet as to any critical 23 issues in this rule making. The purpose of these 24 hearings is to further refine the issues and to get 25 as much evidence as possible from both sides. 26 In an effort to obtain all the relevant PAGE 7 1 evidence the Copyright Office reserves the right to 2 ask questions in writing of any participant in these 3 proceedings after the close of the hearings. Any 4 such written questions that we ask and the answers 5 that we receive will be posted on our web site. 6 What I would now like to do is introduce 7 our panel. To my immediate left is Davis Carson, 8 the general counsel of the Copyright Office. To my 9 immediate right is Charlotte Douglass who is a 10 principal legal advisor to the general counsel. To 11 her right is Rob Kasunic, senior attorney in the 12 office of the general counsel. And, to my extreme 13 left is Rachel Goslins, attorney advisor in our 14 Office of Policy and International Affairs. 15 Having begun the hearing with my 16 introductory statement and our introduction of the 17 panel, let me now turn to our first panel of 18 witnesses and I'm very pleased that you are all in 19 place and we have Peter Jaszi, who is representing 20 the Digital Future Coalition. We have Sarah Wiant, 21 who is representing the American Association of Law 22 Libraries and from the D.C. Library Association we 23 have Betty Landesman. 24 I assume that you have worked out an 25 order amongst yourselves or if not, do you want to 26 go in the order that I -- PAGE 8 1 MR. JASZI: We'll go with the order -- 2 MS. PETERS: With the order I announced. 3 Okay. Peter, it's yours. Thank you. 4 MR. JASZI: Thank you very much. 5 The Digital Future Coalition consists of 6 42 national organizations, including a wide range of 7 for profit and non-profit entities. Our members, a 8 list of whom is attached to my written testimony, 9 represent educators, computer and telecommunication 10 industry companies, librarians, artists, software 11 and hardware producers, and scientists, among 12 others. 13 Organized in the fall of 1995, the DFC 14 took an active part in the discussions that led up 15 to the conclusion of World Intellectual Property 16 Organization Treaties in December 1996, and to the 17 final passage of the Digital Millennium Copyright 18 Act implementing those treaties in October 1998. 19 I speak for the membership of DFC when I 20 say that throughout the process our paramount 21 concern was to assure that however the United States 22 Copyright Law might be modified to suit the 23 conditions of the new technological environment it 24 would maintain its traditional balance between 25 proprietors' control rights and consumers' use 26 privileges, including, but not limited to, so-called PAGE 9 1 fair use. Thus, we were gratified when the WIPO 2 treaties, in language unprecedented in the annals of 3 international intellectual property law, 4 specifically recognized the need to maintain a 5 balance between the rights of authors and the larger 6 public interest, in addition to calling for party 7 states to provide protection for and, remedies 8 against the circumvention of, technological 9 protection measures. 10 At the same time we were concerned that 11 so-called anti-circumvention legislation had the 12 potential to disturb that balance significantly, as 13 least at where the law of the United States was 14 concerned. Section 1201(a)(1) of the DMCA, if 15 enforced as enacted, would do just that. As it 16 stands, Section 1201(a)(1), bolstered by the 17 provisions of succeeding sections provides content 18 owners with the legal infrastructure required to 19 implement a ubiquitous system of pay-per-use 20 electronic information commerce. 21 The basis for this statement is simple 22 and self-evident. Technologies now exist that 23 permit information proprietors to continue to 24 regulate access to digitized copies of content after 25 those copies have been lawfully acquired by others, 26 whether on pre-recorded media or via an Internet PAGE 10 1 download. In today's technological environment the 2 fact that Section 1201(a)(1) prohibits circumvention 3 of technological measures controlling access to 4 information, rather than those protecting against 5 its unauthorized use is of little real significance 6 to consumers. 7 Indeed, in this proceeding the joint 8 reply comments of the American Film Marketing 9 Association and 16 other content industry 10 associations make it clear (at page 21) that their 11 business plans go beyond implementation of access 12 controls for initial binary permissions or denials 13 of access. In addition, they describe ``second 14 level'' access controls that allow, and I quote, 15 "management of who can have access, when, how much 16 and from where." 17 At the heart of this rule making is the 18 inquiry into whether users of copyrighted works are 19 likely to be adversely effected by the full 20 implementation of Section 1201(a)(1). Necessarily, 21 such an inquiry must be speculative since it entails 22 a prediction about the future. However, the stated 23 commitment of the content industries to the 24 technological implementation and legal defense of 25 second level access controls is the best available 26 evidence of the potential for adverse affectation. PAGE 11 1 This is because if circumvention of 2 second level technological access controls were 3 prohibited, the use of such controls would enable 4 content owners to deny consumers the practical and 5 legal ability to make the various kinds of uses now 6 permitted under copyright law, including those 7 authorized under the fair use doctrine of Section 8 107 and the various exemptions provided in Section 9 110. 10 Indeed, the implications of full 11 enforcement of Section 1201(a)(1) are potentially 12 even more far reaching. Access controls could be 13 employed to prevent consumers from passively reading 14 or viewing the content of digital information 15 products they had purchased, unless, of course, they 16 were willing to pay again and again for the 17 privilege. 18 Lest these concerns seem farfetched, I 19 would point out that under current fair use 20 precedents a purchaser of digitized entertainment 21 context that has been packaged with technological 22 access controls are permitted to copy, read and 23 analyze the security software in order to achieve 24 inter-operability by means of their circumvention. 25 Notwithstanding this, in Universal Studios v. 26 Reimerdes the member companies of the Motion Picture PAGE 12 1 Association currently are employing provisions of 2 Section 1201 not involved in this rule making to 3 frustrate what is asserted by the defendants to be 4 just such a privileged practice. 5 Whatever the merits of this particular 6 case, it raises a number of issues concerning the 7 interaction between Chapter 12 and traditional 8 copyright doctrine. Thus, for example, it has been 9 the plaintiffs' argument that because Section 1201 10 defines rights, wrongs and penalties that are 11 independent from those provided for in the copyright 12 law itself fair use is inapposite to the analysis of 13 their claims. 14 To date the judge has concurred. Of 15 course, because Section 1201(a)(1) is not in effect, 16 individual limits users who have employed the DeCSS 17 patch to play back DVDs on their computers have not 18 been sued in the Reimerdes case had the provision 19 been operative, there is no reason to believe that 20 they would have been omitted from the complaint. 21 Cases such as this one highlight the importance of 22 Section 1201(a)(1)(B) through (E), pursuant to which 23 this rule making is taking place. 24 While there are other provisions of 25 Chapter 12 intended to preserve aspects of the 26 traditional balance between owners and users of PAGE 13 1 protected works, most are so drafted that they can 2 be read not to reach many real world situations that 3 are covered by the more flexible exceptions and 4 exemptions of copyright law. Thus, for example, in 5 the Reimerdes case Judge Lewis Kaplan has ruled that 6 the defendants' activities did not qualify under the 7 Section 1201(f)(2) exception related to reverse 8 engineering, because, among other things, the 9 entertainment software products contained in DVDs 10 are not ``computer programs.'' 11 More generally, with respect to the 12 DMCA's specific exemptions as a whole, a recent NRC 13 study concluded that more legitimate reasons to 14 circumvent access control systems exist than are 15 currently recognized in the Digital Millennium 16 Copyright Act. 17 For example, a copyright owner might 18 need to circumvent an access control system to 19 investigate whether someone else is hiding 20 infringement by encrypting a copy of that owner's 21 works, or a firm might need to circumvent an access 22 control system to determine whether a software virus 23 was about to infect its computer system. 24 Now, by contrast with these specific 25 exemptions, Section 1201(c)(1) is generously 26 formulated: ``Nothing in this section shall effect PAGE 14 1 rights, remedies, limitations or defenses to 2 copyright infringement, including fair use under 3 this title.'' Given its plain meaning, this 4 provision would require judges to interpret and 5 apply Section 1201(a)(1) so as to preserve fair use 6 and other traditional limits on copyright. In the 7 event of such an interpretation many of the concerns 8 just expressed about the specific exemptions would 9 become at least somewhat less urgent. 10 However, this does not appear to be the 11 interpretation of Section 1201(c)(1) preferred by 12 the content industries. Although courts ultimately 13 may recognize the importance and appropriateness of 14 preserving fair use and other traditional copyright 15 defenses pursuant to Section 1201(c)(1), this is not 16 a foregone conclusion, as David Nimmer has recently 17 pointed out. 18 At least until such time as this point 19 is clarified, the Librarian of Congress' rule making 20 function under the DMCA remains critical. Its 21 importance is reinforced by a consideration of the 22 legislative history of the relevant provisions. 23 Here, the House Commerce Committee's July 22nd 24 report is of particular significance, since it 25 accompanied the first version of the legislation to 26 contain in substance the provisions which ultimately PAGE 15 1 became Section 1201(a)(1)(B) through (E). 2 In my written testimony I quote at 3 length from that report. I will do so only briefly 4 here. 0 5 example, that the principle of fair use involves a 6 balancing process ``whereby the exclusive interests 7 of copyright owners are balanced against the 8 competing needs of users....'' It dwells on the 9 importance of fair use to scholarship, education, 10 the interests of consumers and those of American 11 business, and it concludes for the passage in 12 question that the committee felt ``compelled to 13 address'' risks that new legislation posed to fair 14 use, including the ``risk that the enactment of the 15 bill could establish the legal framework that would 16 inexorably create a `pay-for-use' society.'' 17 The report continued by stating that ``the committee 18 has struck a balance that is now embodied in Section 19 1201(a)(1) of the bill.'' As the passage makes 20 clear, it falls to this rule making to consider how 21 fair use in particular and the principle of balance 22 in the United States' copyright law in general, can 23 best be preserved in the near term. 24 If it is likely that implementation of 25 technological measures backed by legal sanctions 26 against circumvention will fundamentally alter and PAGE 16 1 thus adversely effect the information consumer's 2 experience, and I believe it is, the remaining 3 challenge is how to craft meaningful exceptions that 4 are cast, as the statute specifies, in terms of 5 classes of works. 6 Some of the suggestions made by other 7 participants in the comment phase of the rule 8 making, for example, the American Association of 9 Universities' proposals to exempt ``thin copyright'' 10 works have considerable merit. Standing alone, 11 however, these suggestions do not fully respond to 12 the most likely adverse effect on consumers' 13 welfare: Their loss of the ability to make free 14 choices about how, when and to what extent to use 15 copyrighted works embodied in lawfully acquired 16 copies (subject, of course, to the constraints 17 imposed by traditional copyright law itself). 18 And, that leads to the proposal with 19 which I would like to close my statement: a 20 proposal, which I should make clear, represents my 21 personal view and not necessarily that of all the 22 DFC's member organizations, although I think that 23 ultimately they will support it. It is that the 24 Librarian should exempt from the operation of 25 Section 1201(a)(1) works embodied in copies which 26 have been lawfully acquired by users who PAGE 17 1 subsequently seek to make non-infringing uses 2 thereof. 3 The proposed language focuses on a class 4 of works that cuts across the various categories 5 defined in Section 102(a). Significantly, it would 6 exclude from its operation works the proprietors had 7 chosen to make available by means other than the 8 distribution of copies (as, for example, by 9 providing limited electronic access only). Indeed, 10 as electronic information commerce evolves the 11 proposed exemption might become less and less 12 significant in practice, just as new business models 13 might require other or additional exemptions in 14 future triennial rule makings. 15 For the moment, however, limited though 16 the proposed class is, its exemption would provide a 17 safeguard against the most imminent and easily 18 foreseeable harms to otherwise law abiding 19 information consumers that full implementation of 20 Section 1201(a)(1) otherwise is likely to generate. 21 At the same time, by emphasizing the purpose of the 22 intended use, the proposal would provide no safe 23 harbor to those who seek to override access controls 24 for illegitimate purposes, even if they are the 25 owners of the copies subject to such controls. 26 The proposal has one further advantage. PAGE 18 1 Its adoption would bring the reach of Section 2 1201(a)(1) into conformity with what the legislative 3 history of the DMCA suggests was the original 4 understanding of its Congressional sponsors as to 5 the section's proper scope. The record reflects 6 that as conceived of by its proponents, the section 7 was intended to apply to the activities of 8 individuals who engaged in circumvention in order to 9 acquire unauthorized initial access to copyrighted 10 works, and not to fair and other non-infringing uses 11 made by those already in possession of copies. 12 Thus, for example, the House Manager's 13 report, at page 5, explains Section 1201(a)(1) by 14 stating that, and I quote, "the act of circumventing 15 a technological protection measure put in place by a 16 copyright owner to control access to a copyrighted 17 work is the electronic equivalent of breaking into a 18 lock room to steal a book." And, in a letter dated 19 June 16, 1998 the Judiciary Sub-Committee Chairman, 20 Representative Howard Coble, stated that the anti- 21 circumvention measures of H.R. 2281, as the 22 legislation then was denominated, were intended to 23 leave users, and I quote, "free to circumvent 24 technological protection measures to make fair use 25 copies." 26 This sensible vision of the Section PAGE 19 1 1201(a)(1) prohibition now deserves attention and 2 respect. The future of fair use and other 3 traditional copyright defenses will be determined in 4 significant part by the outcome of the current rule 5 making. By adopting the proposed exemption, the 6 Librarian could take an important step towards 7 stabilizing the balance of copyright law in the new 8 electronic information environment. Thank you. 9 MS. PETERS: Thank you very much. 10 Sarah. 11 MS. WIANT: Good morning. My name is 12 Sarah Wiant. I'm the director of the Law Library 13 and a professor of law at Washington and Lee 14 University School of Law. Among the subjects that I 15 teach there include intellectual property and 16 copyrights. 17 I appreciate the opportunity to testify 18 this morning on Section 1201(a)(1), anti- 19 circumvention provisions of the DMCA. This is an 20 issue critical to the future of copyright law 21 because it determines whether public policy, such as 22 fair use and other exemptions, will survive in fact 23 in the digital world. 24 I am here today as a representative of 25 the American Association of Law Libraries and while 26 I'm primarily here on behalf of AALL, I also speak PAGE 20 1 for libraries in general and in some sense, a very 2 real sense for the American public. 3 Law libraries serve their 4 constituencies, law students and faculty, 5 researchers, the general public, the legal 6 community, bench and bar, in our Nation's more than 7 1,900 law libraries. Our members are committed to 8 the principles of public access to government 9 information that are a fundamental requirement of 10 our democratic society. For most American citizens 11 their local law library is the only source of access 12 to comprehensive federal, state and local law and 13 law related materials. 0 14 important publications are becoming increasingly 15 available only in electronic formats. 16 My statement this morning is going to 17 focus on three areas. First, I will describe the 18 adverse effect of the new anti-circumvention 19 prohibitions on faculties, students and legal 20 researchers in their ability to make non-infringing 21 uses of works legitimately acquired by our 22 institutions. 23 Second, I will highlight the legal 24 community's concerns regarding limitations of access 25 or on access to federal government publications for 26 which no copyright protection is available. PAGE 21 1 And, third, I would like to discuss our 2 concerns that as more and more information becomes 3 available only on-line, the ability of libraries to 4 provide permanent access to some publications and to 5 preserve and achieve them has been and will continue 6 to be adversely effected. 7 As to my first point, in the formal 8 comments provided by AALL and other major library 9 associations, we explained the unique role of our 10 Nation's libraries in serving the information needs 11 of the American public. Millions of users walk into 12 libraries each day looking for information across a 13 broad span of topics and academic disciplines. 14 Their needs are met through a variety of formats. 15 These may be print, it may be microfiche, it may be 16 video, sound recorders, computer discs, CDs, DDDs 17 and, yes indeed, the Internet. 18 Federal copyright law has for more than 19 200 years provided the historic balance between the 20 rights of copyright owners and users. We believe a 21 broad exemption from the 1201(a) restriction against 22 accessing and using copyrighted works protected by 23 technological measures, is essential to insure that 24 the public continues to enjoy uses of information 25 provided by libraries. 26 The anti-circumvention technologies now PAGE 22 1 in place and those under development have a purpose 2 beyond that of controlling unlawful access. They 3 are a mechanism for controlling all uses of work. 4 For both libraries and our users, they will limit 5 use of legally acquired digital information by 6 effectively destroying the first sale doctrine. 7 They will prevent libraries from fulfilling their 8 mission to achieve and provide long term access to 9 information resources and they will impeded all 10 other non-infringing activities that advance the 11 fundamental public good purposes of the copyright 12 law. 13 From our joint library communities' 14 initial comments I would like to summary just a 15 couple of comments. The role of libraries is to 16 insure fair access and use to copyrighted works and 17 part of our responsibility is to bridge the digital 18 divide. 19 Every community in the nation is served 20 by libraries and these libraries spend billions of 21 dollars annually to provide their users with access 22 to electronic information. Many of the 23 technological measures will erase the distinction 24 between access and use, regulating the exploitation 25 of the work. Any rollback to preserving fair use in 26 the digital information environment will further PAGE 23 1 increase the digital divide. 2 Fair use, the library achieves and 3 educational institution exemptions to the Copyright 4 Act are key to the ability of libraries to serve 5 social needs and public policy. Copyright law is 6 the very foundation by which libraries and 7 educational institutions provide the public with 8 products and services necessary to meet their 9 information needs. 10 The first sale doctrine allows libraries 11 to load information products they have purchased. 12 The fair use provisions allow users to exploit fully 13 their access to information resources for the 14 legitimate purposes of education, research, 15 criticism and other socially beneficial purposes. 16 Section 108 allows libraries to make single copies 17 of works in their collections available to patrons 18 engaged in private study, research and scholarship 19 and to achieve and preserve these works for long 20 term access. Section 110 includes provisions to 21 facilitate classroom and distant learning. And, 22 Section 121 contains limitations that insure the 23 reproduction and distribution of copyrighted 24 material for the use by the blind and disabled. 25 These principles must be preserved in 26 the digital environment just as they have applied PAGE 24 1 historically to print resources. Any technological 2 measures limiting these principles will seriously 3 and irreparably harm the ability of libraries to 4 serve the public good. 5 Another point we made is that Section 6 1201 expands the boundaries of criminal laws in ways 7 that are vague and poorly defined and that cover 8 acts that are legal and acceptable behavior. Our 9 initial comments describe in greater detail the 10 language of 1201(a). It contains troubling 11 ambiguities in such key terms as technological 12 measures, circumvent, access and class of works. 13 There are few legal precedents 14 interpreting these terms to guide libraries and 15 their users in the application, nor is the 16 legislative record particularly helpful. Court 17 decisions may help clarify some meanings, but in the 18 meantime library users face criminal and civil 19 penalties for exploitations that have been 20 considered until now to be legal and non-infringing. 21 The threat of litigation will serve as the deterrent 22 from uses, some of which may be lawful, perhaps 23 maybe most which may be lawful. 24 As a practical matter most libraries 25 could not afford the high cost of litigation to 26 determine the definition of these terms. This PAGE 25 1 uncertainty will have a chilling effect on users and 2 will inhibit legitimate non-infringing uses for 3 education, research, criticism and other public 4 information uses. 5 As to the second focus of my comments 6 this morning, I would like to now address the legal 7 community's concerns regarding limitations on access 8 to federal government publications for which no 9 copyright protection is available. As previously 10 noted, the purpose of technological measures is to 11 limit or control access and use of digital 12 information. 13 In the earlier comments, on March 20, 14 2000, in comments filed by Kent Smith, Deputy 15 Director of the National Library of Medicine, reply 16 comment 75, he notes circumstances in which works 17 by government scientists receive copyright 18 protection. Technological measures to control the 19 use of copyrighted works have also limited the 20 ability of this library, as well as all other 21 libraries, to achieve, preserve and provide 22 continuing access to some publications. This rule 23 making seeks to determine classes of works that 24 might be adversely effected by such technological 25 protections. Clearly all forms of scientific 26 technical information dissemination would be PAGE 26 1 adversely effected. 2 Most blatant would be the limitation on 3 access to publications of government scientists for 4 which no copy right protection is available, but 5 which constantly appear within the copy premature 6 and under technological barriers of published works. 7 While these comments from the National 8 Library of Medicine define the problem only from the 9 perspective of government funded scientific and 10 medical research, the identical situation exists 11 with many other subject areas of government 12 information, particularly, legal information, which 13 is aggregated into large electronic databases. 14 Law libraries are in the unique role of 15 serving the American public by providing access to 16 print and electronic law and law related resources. 17 More and more government information is being 18 published only electronically under licenses that 19 restrict access and use. The technological measures 20 which may be as simple as a password place 21 restrictions on who can use the digital information 22 and often disenfranchise the public. Whereas the 23 public may use the same print resource in a law 24 library, in the digital arena law libraries are no 25 longer able to provide equal access to all users. 26 While many students and colleges and PAGE 27 1 universities and their libraries and other 2 institutions do have access to legal and other 3 information through consortia agreements or other 4 forms of licensing agreements to online information, 5 other students and members of the bar and equally 6 important members of the public who are served by 7 these institutions are able to neither access nor 8 use information in online systems such as West Law 9 and Lexis due to licensing arrangements. 10 In the paper world these individuals 11 would be permitted to make their use copy of 12 information. Most state college and university 13 libraries and many non-profit organizations has as a 14 part of their mission the obligation to provide 15 members of the public with access to information and 16 to make available the information for the public's 17 use. 18 There is no distinction among the 19 classes of works needed by users, only the use to 20 which the information is put can be distinguished. 21 That is to say the uses may be educational, personal 22 or commercial purposes. There must be no 23 restrictions on the uses of federal government 24 information because it falls outside of copyright 25 protection. 26 Finally, we are concerned that as more PAGE 28 1 and more information becomes available only online 2 the ability of law libraries to provide permanent 3 access to some publications and to preserve and 4 achieve them will be adversely effected. A 5 preponderance of comments from users' communities in 6 the initial rule making including those from the 7 National Library of Medicine and the National 8 Achieves raise very legitimate concerns about the 9 loss of digital information and the need to provide 10 permanent access and to achieve and preserve 11 electronic information. 12 The anti-circumvention systems create 13 another injustice by denying libraries access to 14 works which they previously and lawfully acquired. 15 In the print world the issues of archiving and 16 preservation are much clearer. Libraries have the 17 historic and important role of preserving and 18 archiving knowledge and our cultural heritage. It 19 is critically important that the electronic 20 information produced today will be readily available 21 to future generations. 22 Of particular concern to the law library 23 community is the loss of important information 24 content when the publisher of an online resource 25 either ceases publication or goes out of business 26 with no advance warning, such as legalline.com or PAGE 29 1 instances when CD products protected by 2 technological measures can no longer be reformatted 3 and, therefore, are unreadable. 4 Technical obsolescence is an equally 5 important aspect of the problem. When an 6 educational institution or achieve for library buys 7 a subscription or has print copy of the book, the 8 library can make a copy. However, if the 9 technological measures prohibitive producing a work 10 in the electronic world, then no archival copy may 11 exist. Although publishers should achieve their 12 works, and in fact some do, more often than not 13 publishers fail to achieve their works. Moreover, 14 when publishers are the sole source for archival 15 copies of their works, replacing the political, 16 social and cultural mission of many libraries and 17 achieves, there is a greater risk of selective 18 archiving. 19 The judgment of what to preserve and 20 whether or not to preserve should not be solely in 21 the hands of publishers. Unlike in the print world, 22 because there may be no secondary market for 23 electronic works, libraries and educational 24 institutions may be unable to acquire works that 25 they were initially able to acquire, furthermore 26 exacerbating he problem of preservation. PAGE 30 1 During the lengthy debate over the most 2 contentious provisions of the Digital Millennium 3 Copyright Act. Distinctions were blurred between 4 the act of circumvention and the act of digital 5 piracy. They are not the same. 6 The need to circumvent technological 7 measures for legitimate purposes of fair use, first 8 sale, inter-library loan, permitted access, 9 archiving and preservation are needed to permit 10 libraries to serve their users in the digital world. 11 Libraries adhere strongly to the limitation of 12 copyright law while providing their users with 13 access to information within the rights allowed 14 users under the law. 15 We believe that it is essential for the 16 librarian to create a meaningful exemption before 17 Section 1201 does irreversible harm to the rights of 18 users allowed under the statute based on public 19 policy. 20 Thank you for allowing me to testify 21 this morning. 22 MS. PETERS: Thank you. Betty. 23 MS. LANDESMAN: I'm afraid I'm real new 24 at this. Like my colleagues I do have written 25 testimony. Would you like it? 26 MS. PETERS: Certainly. Yes. PAGE 31 1 MS. LANDESMAN: Good morning. My name 2 is Betty Landesman and I am a librarian with the 3 Research Information Center, which is what we call 4 our library, of the AARP, which was formerly known 5 as the American Association of Retired Persons. 6 It's now just the AARP for official records, by the 7 way. 8 MS. PETERS: That makes me happy since 9 I'm a member. 10 MS. LANDESMAN: The membership age is 11 now 50 and there are not a lot of retired 50 year 12 old people. 13 Prior to taking this position, which 14 will be a year ago tomorrow, happy anniversary to 15 me, it's a brand new job, I worked at a number of 16 college, university and research libraries, as well 17 as for a vendor of computer systems for libraries. 18 So, you may think I'm here today because I've been 19 around, which I have, but in fact I am wearing the 20 hat today of president of the District of Columbia 21 Library Association. DCLA is one of the chapters of 22 the American Library Association. They like to call 23 us a state chapter, but, okay. And, we have members 24 from all of the many diverse types of libraries in 25 the District, including public, school, academic, 26 medical, law, special and government libraries. PAGE 32 1 I want to talk today not about the legal 2 aspects of the new provisions of the Copyright Act, 3 for which fortunately I can rely on my colleagues, 4 but about the practical effects of the new Section 5 1201(a) and the need for a broad exemption that 6 takes those practical effects on libraries into 7 account. 8 Without an exemption by the Librarian 9 from the anti-circumvention prohibition, libraries 10 will not be able to carry out their primary mission, 11 which is providing access to information resources 12 for the communities of patrons that they serve. 13 At all of the institutions that DCLA 14 represents, as is true all over the country, 15 electronic services have become an integral part of 16 the services that we provide. As you are already 17 aware from the comments provided during the rule 18 making process, electronic information is invaluable 19 to all kinds of research from the youngest school 20 child to the most in depth medical and legal 21 research. But, much of the material that is 22 necessary to support the information, education and 23 research goals of our library users is increasingly 24 available only in electronic form or where 25 electronic versions of a print counterpart provide 26 additional and valuable research tools that are PAGE 33 1 simply not available in the print. My written 2 testimony gives some examples of specific titles. 3 All libraries, whether directly or 4 indirectly, serve the public. I work in a library 5 that is part of a non-profit organization and my 6 clientele are the staff of the association. We 7 support the research on aging that is done by those 8 staff members. That research is then made available 9 to the public through published studies which are 10 available free of charge and also through a database 11 called Age Line, which we produce. 12 Library materials are available to any 13 patrons outside of our association through inter- 14 library loan in which we participate very actively. 15 And, our library itself is accessible to researchers 16 who need to use our collections or our research 17 expertise. For many people in the communities we 18 serve, particularly the poor, the elderly and school 19 age children, the public library serves as the 20 primary access point for information, both printed 21 and electronic that they need. 22 In the non-public environment the 23 library, like mine for example, is accountable to 24 the members of its organization, whether that be 25 students, faculty, or staff for the support of their 26 education and research needs. My written testimony PAGE 34 1 has some statistics on the number of libraries and 2 so forth. So, our concern about the technological 3 protection measures and their potential restrictions 4 on use is the threat that they pose our library's 5 ability to serve our users in the way that we have 6 always done. 7 We note that some content providers 8 during their comments have suggested that librarians 9 want information for free. That couldn't be further 10 from the case. We spend an enormous amount of 11 money, according to my colleague, millions. 12 According to my date, hundred of millions. A lot of 13 money in fees every year to provide access to 14 databases and electronic materials and services. 15 In my library, for example, last year 16 the amount, the number of dollars which I will not 17 disclose, but the number of dollars that was 18 budgeted for electronic services was more than 19 double the number of dollars budgeted for print 20 materials. And, I fully expect that this proportion 21 will continue to grow. 22 My concerns are in three main areas 23 which in many ways will echo my colleagues: cost, 24 inter-library lending and access to information. 25 First, we expect that technological 26 measures will be used in ways that increase the PAGE 35 1 overall cost of the information that we already 2 purchased. As the library associations pointed out 3 in their comments, we are very concerned that the 4 effect of these technological measures will be to 5 move us toward a pay-for-use pricing model, as well 6 as the charge for uses that are legitimate and non- 7 infringing under copyright law. That would put 8 additional pressure that I don't think we can bear 9 on already strained acquisitions, budgets and reduce 10 the level of services that we can provide. 11 Secondly, the first sale and fair use 12 provisions of the Copyright Act provide libraries 13 with the ability to lend the information products 14 that they purchase and to make copies available of 15 these works to patrons engaged in research and 16 scholarship. In addition to supporting the 17 information needs of their own users, libraries 18 share their resources by participating in inter- 19 library loan. Since no library is able to own all 20 the materials that are needed to support the 21 information needs of their users, certainly not 22 mine, it is only by cooperating and helping each 23 other that we have been able to provide the 24 information that our patrons need. 25 Persistent access control, such as 26 electronic books with limits imposed on PAGE 36 1 redistribution, would undermine the basic concept of 2 the library as an institution that lends information 3 resources to users. 4 Finally, I'm concerned that these 5 protection schemes will seriously reduce our library 6 users' ability to make full and non-infringing use 7 of the material that we already purchase, 8 legitimately acquire. The restricts that we already 9 see in electronic resources, licensing arrangements, 10 include limiting access to a particular resource to 11 one computer in the library, to restricting use to a 12 specific number of simultaneous or even consecutive 13 users and precluding access to material after a 14 certain period of time. And, as noted above, the 15 harm these restrictions pose to our communities will 16 fall particularly heavily on those who have no 17 alternative sources for access. 18 A related aspect of this concern is that 19 technological measures will hamper or negate the 20 ability of libraries to achieve and preserve 21 information products so that they will continue to 22 be available to our users in the future. 23 Researchers of all types need to be able to depend 24 on having access to materials that may not be this 25 years. They may be a few years older and yet these 26 products or access to them may disappear at some PAGE 37 1 future time, either because they are no longer 2 available from that particular vendor or that vendor 3 has gone out of business or they are simply taken 4 out of the date base and the library is not able to 5 make an archival copy, or because the library no 6 longer subscribes to the product, but is barred 7 access to the information that they did subscribe to 8 in the past. 9 So, as I ask that as you consider the 10 breadth and focus of an exemption for Section 11 1201(a) you will keep in mind the importance of 12 libraries in serving all aspects of our society. 13 Since all types of materials are used in research, 14 not only books and journals, but photographs, motion 15 pictures, sound recordings, you need it, it would be 16 impossible to identify specific classes of works 17 that should be exempted. So, I encourage a broad 18 exemption. 19 Technological measures that control both 20 initial access to a product and also its continued 21 use prevent libraries from providing necessary and 22 non-infringing information to our users. So, please 23 make sure we can continue to do our job. Thank you. 24 MS. PETERS: Thank you. Now the panel 25 gets to ask the questions and we're actually going 26 to start with Rob and the questions could be PAGE 38 1 directed to a particular person or to the panel as a 2 whole. Even if it is directed to a particular 3 person, if one of the three of you wants to say, you 4 know, I want to answer that, too, please feel free 5 to jump in. 6 Let's start with you, Rob. 7 MR. KASUNIC: A number of you have 8 discussed a broad exemption cutting across the 9 categories and over a number of potential classes of 10 works. What would be the basis for that in the 11 statute and in the legislative history? We do have a 12 legislative history that specifies some pretty 13 narrow interpretations of what a class of work would 14 be: something narrower than a category of work, but 15 not so narrow as an individual type of work as in 16 western movies or something that narrow. How do we 17 deal with this broader exemption that cuts across 18 various categories? 19 MR. JASZI: If I could start, I think 20 the problem is a real one, although I might quarrel 21 a little bit with the suggestion that some of the 22 exemptions that have been explicitly or implicitly 23 suggested in the last few minutes are ``broad'' 24 exemptions as distinct from exemptions which are 25 oriented at least in part toward the nature of use, 26 rather than exclusively toward the nature of the PAGE 39 1 work as such. And the suggestion that it might be 2 possible to cast a definition of a class of works in 3 terms of the nature of use was, of course, one that 4 was raised by your initial notice of inquiry in this 5 rule making. 6 As I read the legislative history it 7 calls for the class of works defined in this rule 8 making to be one that is focused, and cites as 9 examples of the way in which such a focus might be 10 achieved, the subdivision (if you will) of existing 11 categories: audio visual works broken down to 12 western movies example. I do not read the 13 legislative history as excluding the possibility of 14 the Librarian, in his discretion and taking into 15 account all of the material adduced in the rule 16 making hearings, conceiving of other classes of 17 works which have in other ways their own specific 18 focuses. 19 So, that would be my initial response 20 and I would add another response, too. To some 21 extent, given the nature of the problems that 22 Section 1201(a)(1) potentially gives rise to, as 23 they have been revealed in the record so far, any 24 approach to the rule making that is strictly limited 25 to sub-divisions of existing statutory categories of 26 works will almost certainly fail to meet the real PAGE 40 1 issues. 2 MS. WIANT: Can I just add? I would add 3 to what Peter says and I also would suggest that 4 when we start speaking of categories we have 5 categories of works within the statute that 6 organizes works that are eligible for copyright 7 protection within the subject matter portion of the 8 statute. But, there is nothing in there that 9 suggests that we should further define those by 10 classes of works and indeed if we do do that it will 11 be very difficult to figure out what specific kind 12 of work that a researcher could look at, based 13 specifically on a redivision of, I hate to use the 14 word categories and classes, because it leads us 15 down a road that I think is untenable and, so, 16 therefore, I would reiterate what Peter had said 17 about I think it's more important to look at the 18 uses of the works. Because anybody has a legitimate 19 need for a wide range of information needs and if we 20 narrow these by what one can or cannot look at, we 21 will redirect research in some very limiting ways. 22 MR. KASUNIC: In terms of the specific 23 requirements under the statute, requesting that the 24 Librarian publish a particular class of works, how 25 do we get to that step? If there is a possible 26 exemption, how do we exempt the type of use that is PAGE 41 1 being made of a particular class of works? How does 2 that fit in with the requirements that Congress put 3 on the Librarian: to specifically publish a class of 4 works? 5 MR. JASZI: In fact, to begin again, in 6 the proposal that I suggested, for example, the 7 suggested class is one which, by virtue of being 8 keyed to the forum in which the works in question 9 are represented or fixed, cuts across the statutory 10 categories of Title 17. Also inherent in that 11 proposal is the limitation on the exemption to 12 situations of otherwise lawful use. So, the nature 13 of the use enters into the latter part of the 14 suggestion or recommendation. That's one 15 possibility. 16 I think another possibility is to think 17 about classes in which the use factor is, so to 18 speak, implicit. The proposals to provide 19 exemptions for ``thin copyright'' works or for 20 copyrighted works that contain significant amounts 21 of public domain government information, are ones 22 which, although they do not directly reference use, 23 do so by implication, since works of those kinds and 24 categories are, as we have heard, of special 25 interest and importance to the research community. 26 So, I think there are a number of PAGE 42 1 different ways, both explicit and implicit, in which 2 the consideration of potential or actual use might 3 come into the definition of an exemption. 4 MS. PETERS: Charlotte. 5 MS. DOUGLASS: My question is whether 6 the First Sale Doctrine has any special application 7 to use of encrypted works that are purchased for 8 personal use? Does that make any sense? How does 9 the First Sale Doctrine impact encrypted works where 10 you have bought a DVD for your personal use, for 11 example? Are there any implied assumptions that go 12 with purchasing a work, which would seem to flow 13 from the First Sale Doctrine? 14 MS. WIANT: Do you want me to start on 15 this? It seems to me that if we keep the exemption, 16 unless we clarify the exemption, that -- clarify an 17 exemption, that the anti-circumvention could indeed 18 do away with the First Sale Doctrine. It seems to 19 me that if we believe, as a matter of public policy 20 that when somebody has lawfully acquired a piece of 21 intellectual property, that we have historically 22 allowed them to share uses and without this there 23 couldn't even be a sharing of use arguably, whether 24 it's a DVD, whether it's an E-book and that would 25 present a critical problem, I think, for the public 26 and I think it would present a critical problem for PAGE 43 1 libraries to acquire this information that 2 historically they would at least be allowed to use 3 that the public wouldn't be allowed to make a copy, 4 necessarily, but they would at least be allowed to 5 use the information in whatever its electronic 6 format. 7 MS. LANDESMAN: I think the E-book is a 8 very good example, in fact. What I'm seeing, what 9 we're all seeing, actually, is that in this new 10 digital age the pricing of all the new products, 11 like E-books, and even the conception of the 12 producers of these and who their audience might be 13 is very directed with the individual consumer in 14 mind. And, I've been to conferences about E-books 15 and ever so often, you know, someone will say what 16 about, you know, if I play it for my library, can I 17 lend it? And, we're going, lend? No, no, you buy a 18 single -- and we're going libraries. And, they go, 19 oh, right. So, we have no objection to pricing it 20 in a way that will allow more than one use, as we 21 have always paid more for a subscription to a print 22 journal for a library will cost typically -- well, 23 more, certainly than for an individual, because part 24 of that is because many people are going to use it 25 and that's the understanding under which we acquire 26 it, that we can then share it with our legitimate PAGE 44 1 patrons for whom we buy that and if I were seeing E- 2 books priced in a way that says here's the library 3 version and this gains -- you can now lend this out, 4 we wouldn't be having a discussion. 5 MR. JASZI: I would just add that full 6 implementation of Section 1201(a)(1), coupled with 7 the use of so-called second level access controls on 8 electronic information products has the potential 9 for hollowing out all sorts of traditional copyright 10 doctrines, of which first sale is clearly one. 11 Although there might remain a literal first sale 12 right to pass on the physical medium to another 13 person, to the extent that there was no possibility 14 of that other person achieving the ability to read 15 or view the content recorded on that physical 16 medium, the first sale right, which has been a very 17 critical engine of cultural development throughout 18 the history of the United States, would be formally 19 preserved but substantively empty. 20 And, that I think is true of many of the 21 traditional limiting doctrines of copyright law, 22 that are put under pressure, so to speak, or would 23 be, by full implementation of Section 1201(a)(1). 24 MS. PETERS: Let me just make a note 25 that there is a separate study that is being done by 26 the Copyright Office in conjunction with NTIA, which PAGE 45 1 is to look at the effect of electronic commerce and 2 the DMCA on Section 1201(a)(1), the First Sale 3 Doctrine. And, so that is an inquiry that was 4 mandated. 5 Those arguments that you're making now 6 were made before Congress. Congress is interested 7 in that effect and so we will be studying that 8 particular topic separately from this. 9 Okay. Rachel. 10 MS. GOSLINS: Yes. I just had a couple 11 of questions. One is more practical and the other 12 is a little more esoteric so we'll start with the 13 practical one. And, this is for the whole panel, 14 although I'm specifically interested in the 15 experience of the people who had experience actually 16 working in libraries in the recent past. 17 I think it's fair to say that access 18 protection is probably the oldest form of 19 technological protections we've seen on digital 20 works. Of course, oldest is relative when we're 21 talking about the Internet, but password protections 22 and I.D. and I.P. domain validations have been 23 around pretty much since the Internet. So, in a way 24 we're lucky that we have some historical experience 25 with these kind of protections. 26 I participated in a study the Copyright PAGE 46 1 Office gave on distance education where we were 2 trying to look at copy control protections and it 3 was impossible to draw too many conclusions, because 4 there really wasn't a lot of experience with them. 5 But, as librarians you are perhaps the best suited 6 to educate us about your experience thus far with 7 access control protections. 8 So, I'm curious to know whether in the 9 current world in which there is not a prohibition on 10 circumventing access control protections there are 11 situations in which you have to do that, you have to 12 circumvent access control protections in order to 13 make what you consider a fair use of the work and if 14 you currently experience problems where you face a 15 choice of either circumventing an access control 16 protection or foregoing use of the work? 17 MS. LANDESMAN: Well, I can -- I can't 18 say I've ever done anything along those lines. And, 19 I think most people haven't either, but I could give 20 a couple examples of why our inability to do that is 21 a real problem. One, is in fact, the I.P. 22 recognition is not the panacea that everyone would 23 like it to be. It isn't just for distance learning. 24 That's typically the context, but the fact is that 25 in most libraries our patrons, whoever they may be, 26 are not in the building or not all in the building. PAGE 47 1 In my specific case there are 2,000 staff working 2 for the AARP. About half of them are here in 3 headquarter's building in D.C. and the other half 4 are all over the country. 5 And, they're coming in through an intra- 6 net so it's a very secure environment, but we are 7 still really unable to negotiate an appropriate use 8 of things, because they're coming in from a 9 different I.P. address or because licensing is 10 still, much to my surprise, here it is 2000, is very 11 geographically oriented. I'm looking at a potential 12 license now to acquire some materials for use by the 13 association and the price quote, it says very 14 specifically, this is for a single building. Call 15 us for a quote. 16 So, we really have a huge long way to go 17 on that. The most concrete example I could give you 18 where our inability to -- even if were to wish to 19 "crack into it" or whatever, has to do with the 20 leasing, whether than actually owning of the 21 information. Most electronic journals or other 22 databases you have the right to whatever is on the 23 database for the term of your subscription. 24 Now, let's say I subscribe today to 25 Journel of XYX and in three years I need to cancel 26 that subscription or let's say Journel XYZ goes out PAGE 48 1 of business, okay, but I can the print of Journel 2 XYZ in 2000 because I can't afford both. The 3 literal truth is my users will have no -- we have 4 nothing to show for those three years. We don't 5 have the electronic version. We don't have the 6 print version. We don't have anything. And, most 7 licenses at this point preclude that or for those 8 databases that have a rolling effect, so you 9 subscribe and what you have access to is what's in 10 the database at that time, but every year they roll 11 off an earlier year. And, this is fairly common. 12 When that goes you have nothing. We've 13 paid a lot of money, but we do not have the 14 information to give to our patrons. Some libraries, 15 certainly bigger than mine, might wish to -- well, 16 there is a lot of issues with this. We want the 17 publishers to do the archiving and the publishers 18 and saying, why should we archive? The fact is that 19 right now nobody, whether you're doing it or not, 20 you just don't have the access to get at it. 21 I don't know how concrete that is, but 22 that's what we're up against and I don't have the 23 solution, but that's the problem. 24 MS. GOSLINS: That's -- 25 MS. WIANT: There are a couple of things 26 I would like to add to that. Yes, it's true that in PAGE 49 1 many cases that password protection works and I.P. 2 protection works and even those of us in 3 universities with a high level of technological 4 support have difficulty in serving students and 5 faculty from home unless we have something of a 6 proxy server, but we can figure out ways to deal 7 with those. The more critical problem is I'm in a 8 private university, but we still have as part of our 9 mission serving anybody who has need of legal 10 information on the western part of the state. And, 11 for a very long time we were the only significant 12 law library in the state west of the Blue Ridge. 13 If we have any member of the public who 14 comes in and physically comes to the library for 15 legal information, if that legal information happens 16 to be electronic, typically we cannot serve those 17 individuals unless it's just on a web base, because 18 the licensing agreements typically cover only 19 students and faculty and sometimes those are 20 limiting so that they only cover the law student and 21 law faculty, not even the undergraduate faculty. 22 So, that's problematic, but more problematic is the 23 member of the public who comes to us for legal 24 information and whom we cannot serve because they're 25 restricted. They can't search themselves and even 26 if we were to do it, the licensing agreements would PAGE 50 1 say you can't have access to this information. It 2 might well be information that is federal government 3 information and of value at a database. It matters 4 not to them that the value is added, they simply 5 want access to information and we can't -- we can't 6 provide it and it is nowhere else available to them 7 in any other form as more and more information 8 becomes available electronically. 9 Then we have the additional problem that 10 information that has, on occasion, been available to 11 us as was mentioned, disappears from a database. 12 The most significant example that I can think of 13 that is in my written testimony, is an example of 14 one of the major legal databases which for a period 15 of time had a French database and one day it was 16 there and the next day it was not. 17 Now, many of us cannot maintain 18 collections of primary legal information in either 19 its original language or even an English translation 20 and so our only access would be to that and suddenly 21 it's gone and totally gone. And, for many of us an 22 access would be one of the few major law libraries 23 in the country that have foreign legal collections. 24 So, that becomes problematic for us when that 25 disappears. 26 And, another example, and while it's not PAGE 51 1 legal information, just points up the problem of not 2 only access, but when we're talking access we are -- 3 if you control the access, in point of fact you are 4 controlling the use. There is no way, unless we 5 figure out some way to do read only, there is no way 6 that somebody could look at that information. 7 But, this is a separate point, but it 8 actually speaks in some ways to the preservation 9 problem and this example came up sort of repeatedly 10 during CONFU, but it's an example that I think very 11 clearly does represent, although a situation in 12 which we are all facing, and I would hate to be in 13 20 years the person who cite checks for a law review 14 article and then finds that the electronic sites are 15 not there to be cite checked. 16 The example that was given in CONFU 17 happened to be in the software world. For instance, 18 if you had somebody who had, as their research, the 19 development of software programs, I want to say 20 computer scientists. I would not be the person who 21 would be studying the development of software 22 programs, but in the event that that happened there 23 isn't anyone, including the software developers, who 24 are keeping the really early versions of operating 25 systems. 26 Now, if we don't figure out a way that PAGE 52 1 libraries are authorized not only to access, but to 2 make copies for preservation copies, there is a lot 3 of that information that simply will be totally 4 unavailable, whether it's licensing or any other way 5 that would restrict access. 6 MS. GOSLINS: I have one brief follow-up 7 question and then I'll get to my esoteric question, 8 which actually all of you have started to answer 9 already, which makes me very happy. 10 I just wanted to follow-up briefly on 11 the French database. I guess I want to understand 12 better how that's a problem of access, as opposed to 13 a problem of a producer deciding to no longer 14 maintain a database. It's not that there is an 15 access control that is then preventing you from 16 accessing the French party's databases, but it no 17 longer exists. Right? I just want to make sure I'm 18 not missing something. 19 MS. WIANT: In that particular instance 20 it is less one of access than one of the library's 21 responsibility to preserve its collection and had we 22 been able to continue to have access to a collection 23 of information that we had acquired lawfully, even 24 after they ceased to maintain it, if for instance we 25 had been given notice, we might have been able to 26 take over the responsibility or collectively we PAGE 53 1 might have been able to work with say even the law 2 library of the Library of Congress, so that somebody 3 would have kept that information. 4 MS. GOSLINS: Okay. I love you. You're 5 leading right into my next question. And, I would 6 like to spend a little time understanding the 7 panel's view on the inter-relation between the 8 1201(a)(1) prohibition on circumventing access 9 control protections and circumventing controls on 10 copying, which is not prohibited under the DMCA, the 11 conduct of circumventing the copy control. All of 12 you in someway have identified concerns about 13 abilities to preserve and archive works. 14 I believe, Mr. Jaszi, you made a 15 suggestion for types of works that should be 16 exempted, which involved uses made after a 17 legitimately acquired copy is obtained. Ms. Wiant, 18 you talked about when a library buys a print 19 subscription there is an ability to make a copy and 20 that might not be the case in the digital world. 21 And, Ms. Landesman, you've also identified archiving 22 as one of your three major concerns. 23 And, I guess what I would like to 24 understand a little more is what is it about 25 1201(a)(1) that would prevent you from making a copy 26 once you have access to work? Because again we have PAGE 54 1 to remember the distinction between access control 2 technologies and copy control technologies. And, 3 after you have access to a work, how is your ability 4 to copy that work for non-infringing uses, effected 5 by the prohibition on access control? 6 MR. JASZI: Well, if I might begin, I 7 think the answer to that question lies in 8 fundamental definitions. And, one of those is the 9 definitional distinction between copy and work. The 10 person who has purchased a fixation of a particular 11 work or works has of course now achieved access to 12 that physical copy, but not necessarily access to 13 the works contained in it. And, as the record in 14 this rule making makes clear, the content industries 15 look at the question of access control as having two 16 dimensions, initial access and second level access. 17 In other words, in the vision of the 18 content industries, the access controls, to which 19 Section 1201(a)(1) speaks include not only controls 20 that would, for instance, control whether someone 21 could initially download an electronic work from the 22 Internet, but also embedded code within that 23 download that would require reauthorization for 24 subsequent consultations of its content. 25 In effect, in that vision, access and 26 use merge, and access controls -- so-called second PAGE 55 1 level access controls -- become effectively a means 2 for regulating use. The burden of my suggestion for 3 an exemption today was really that as far as it is 4 possible to accomplish within the scope of this rule 5 making, the thrust of Section 1201(a)(1) should be 6 focused toward issues of controls on initial access, 7 and not toward issues of second level access 8 controls which functionally merge with controls on 9 use. 10 MS. WIANT: I think Peter said it as 11 well as I could have said it. 12 MS. GOSLINS: Thank you very much. 13 MR. CARSON: I would like to follow-up 14 on a question Rachel asked. And, first of all I 15 guess I need to make sure we all understand and 16 maybe that I understand correctly the question 17 Rachel asked. What I think Rachel was asking a 18 couple of questions ago, was basically for whatever 19 evidence any of you have, that up to now, in any 20 way, the technological measures currently in place 21 that control access to works have been impediments, 22 have actually in practice been impediments to lawful 23 uses of those works. 24 And, if that wasn't how you understood 25 it, I guess I would like to re-ask the question and 26 just make sure we have the universe of experiences PAGE 56 1 that you are aware of up to now with respect to 2 those impediments that have been imposed by 3 technological measures controlling access. 4 Does anyone have anything to add to 5 what's already been said? 6 MR. JASZI: Well, I guess the only 7 addition I would make, although I'm the least well- 8 qualified person, because I'm not in the day to day 9 information use business, is that it seems to me 10 that although the inquiry is a very important one, 11 it goes to only part of what should be the factual 12 foundation for whatever action is taken in this rule 13 making. That is because it's not clear to me, by any 14 means, that we have yet seen the most aggressive, 15 likely implementation of technological controls on 16 access, especially the second level controls to 17 which I referred earlier. 18 In fact, I think we are likely to see 19 more aggressive implementation of second level 20 technological access controls when Section 1201 21 takes full effect. So, what I've heard from many 22 information professionals is that there are a 23 variety of situations in which their ability to do 24 their jobs today is to some extent frustrated by 25 access controls, some of which were detailed a 26 moment ago, but I fear that there is every reason to PAGE 57 1 believe that the worst is yet to come. 2 MS. LANDESMAN: I think we haven't 3 really seen the impact quite yet, but I keep my eye 4 on the E-book analogy that I mentioned before, 5 because there just aren't that many of them yet, but 6 every meeting I've been to where the E-book 7 producers are discussing our new product and our new 8 this and our new that, has very clearly got a -- I 9 don't know how they do it, but it's a technological 10 thing that gives rights for use to the purchaser 11 only of the book and precludes any other -- lending 12 it to anybody for that matter. And, that is the 13 direction that they're going. And, I think that's 14 going to really start hitting, you know, as the E- 15 book becomes more prevalent than it current is, 16 which should be anytime now. 17 MS. PETERS: Can I ask you a question 18 with regard to the E-book, or any of you? It really 19 has to do with where you use access versus licensing 20 terms and conditions. It is very clear that when 21 Steven King's book was made available most of the 22 purchasers were individuals. If a library wanted to 23 acquire for its patrons the Steven King E-book, is 24 there any way that you could have worked with the 25 publisher to have access for that? In other words, 26 to what extent can libraries, following what you say PAGE 58 1 is, you've got to serve the public, you're the place 2 of last resort, work with the publisher to get, 3 through an agreement, what you believe is the access 4 that you need to serve your patrons. 5 MS. LANDESMAN: I think that's an 6 evolving thing, too. I can only keep going back to 7 the meetings that I go to and the look of 8 astonishment on the publisher's face when the word 9 library is mentioned. 10 So, I think part of that is I would love 11 to work with the publishers, but the publishers are 12 going down another path. Not all of them. There 13 are exceptions to this, but the development may 14 already be in place that doesn't allow for this. I 15 can't actually answer your question. Certainly we 16 would be happy to negotiate with the publishers, but 17 I'm also seeing -- going back to my licensing 18 question, it's all moving toward a pay-for-use and I 19 guess our fear of the technological measures of that 20 just lets that happen before you can negotiate it 21 out. 22 MR. CARSON: We're heard the term pay- 23 for-use a lot and I guess to what degree are we 24 there already? To what degree is that a reality 25 today? And, if it is a reality today, what problems 26 does that impose? PAGE 59 1 MS. LANDESMAN: The definition of use 2 can be very broad. What I've seen so far have been 3 a little broader maybe than that literal thing, but 4 the next effect is say when you have to negotiate a 5 license for use of a product it can be for a certain 6 number of people or -- every vendor has its own 7 version of how that happens and it's either by 8 blocking unauthorized users or providing you only 9 with a certain number of passwords and when that's 10 exceeded the next person can't get on or the CD ROM 11 that we've mentioned, you know, if you buy a CD -- 12 if the information is on a CD or will be a DVD, and 13 the software and the way that works it has to 14 physically be used at one specific computer, because 15 there is all this other stuff that has to get loaded 16 along with it. And, so that certainly effects the 17 use limiting to one person at a time that specific 18 computer. 19 I don't have personal experience with a, 20 oh, you're the next user, click here and pay us, you 21 know, X amount of dollars, because I'm not sure how 22 far along that is and I can't speak to it 23 personally. 24 MS. WIANT: I guess in my mind your 25 question raises for me the issue about the extent to 26 which a contract could prohibit legitimate uses PAGE 60 1 which the copyright law has historically provided. 2 And, I guess I find that an equally unclear area to 3 provide any guidance to libraries about the extent 4 to which any use that's not spelled out, but which 5 otherwise might have been made, they continue to be 6 legal. 7 I was just trying to think of an example 8 and I haven't played this out completely, so let me 9 just put it on the table and we'll see where it 10 goes. Suppose an academic law school chooses or has 11 faculty among us who typically teach from an 12 electronic course book. Typically that would be 13 licensed for, I guess, for the term in which or if 14 it was a couple terms in any year, would be licensed 15 for use by the students who are specified to be in 16 that class for that particular time. 17 Now, historically libraries, some of 18 them, choose to keep earlier versions of case books, 19 because the faculty choose to go back for varying 20 reasons or if you're developing a historical area 21 you would want to have that in the collection. Case 22 books are typically licensed annually or by the 23 term, so how does an academic library or any other 24 library maintain an access which might have been a 25 fair use some years down the road, presuming that 26 they still had an electronic file of that particular PAGE 61 1 information, now would that be a fair use? I would 2 argue it would indeed be a fair use for a faculty 3 member to look at an electronic file that was used 4 in a class X years earlier, but we would have had it 5 only for those students and that faculty in that 6 particular window of time. 7 It's likely that any negotiated 8 agreement might not even contemplated the use by 9 that or if your school used it and another school 10 was contemplating using a future edition and wanted 11 to looked at an earlier edition, where it wasn't 12 maintained any place else, would that be a 13 legitimate use for someone to actually access and 14 use that? 15 Now, the access controls would say, no, 16 you couldn't have access. That's where access and 17 use, I think, merge in the secondary use. So, I 18 think there could be -- that's just one that came to 19 mind while I was sitting here thinking about, well, 20 how would you make these pieces fit? And, I think 21 we -- I presume that's why we're here today, to talk 22 about how we might make these pieces fit, but this 23 is one aspect of the problem. 24 The intersection between how the 25 copyright law and license agreements merge I think 26 is another area that we can't overlook as we talk PAGE 62 1 about how access controls would effect subsequent 2 uses. 3 MR. JASZI: In my view we are not there 4 yet. In my view we are only on the threshold, 5 trembling on the brink of a pay-per-use universe. 6 And one of the reasons why we're not there is that 7 legal support does not currently exist for the 8 aggressive implementation of second level access 9 controls. 10 Whether we would be disadvantaged if all 11 information or much information were to become in 12 the future, available to consumers only on a pay- 13 per-use, or by the drink, formula is, I think, an 14 issue that brings us back to questions of what I 15 might call cultural faith. There is a set of deep 16 underlying assumptions about cultural practice with 17 respect to information use, which I think we might 18 discover many of us share. One is the notion that 19 there is something good -- something positive -- 20 about the kind of ability to use information that 21 comes to us under existing law and existing 22 technology when we purchase or otherwise lawfully 23 acquire a copy of a copyrighted work. 24 Under those circumstances we are 25 permitted to make use of the contents of that work 26 that's comprehensive, that's repeated, that's PAGE 63 1 perhaps inefficient, but ultimately productive. I 2 think that the concern about the coming of a pay- 3 for-use information environment is not only a 4 concern about cost, although cost is certainly an 5 issue to be considered, but a concern about the ways 6 in which the requirement to make more parsimonious, 7 more efficient and more restricted use of 8 information in various electronic media would effect 9 our cultural practice. 10 I realize that that's a very difficult 11 thing to get at in a rule making proceeding of this 12 kind, but I also think that to fail to consider 13 questions about the effects of the implementation of 14 second level access controls on existing cultural 15 practice would be to overlook what might may 16 ultimately be the most important area of adverse 17 affectation likely to arise in connection with the 18 full enforcement of Section 1201(a)(1). 19 MR. CARSON: Well, on a couple of things 20 Professor Wiant said. First of all I'm not 21 persuaded how relevant it is, but I just want to 22 explore it a little bit anyway. It's going a bit 23 far afield, perhaps. You gave the example of a 24 situation where a university or library might 25 acquire rights for a limited time and then 26 subsequent to the termination of that period may PAGE 64 1 discover that it has ultimate need to have access 2 again to that work. 3 Typically, if there is anything typical 4 about this, in those situations does the library or 5 university have the option of negotiating for 6 permanent rights or rights for a limited time and 7 make a choice, no, we only need it for this limited 8 time, so we'll pay the lesser price? Or do you just 9 not have a choice? 10 MS. WIANT: I think it's fair to say 11 both proprietors and libraries are becoming more 12 sophisticated in their negotiations, but for a long 13 period of time there wasn't a choice because they 14 were not preserving the files and if we chose not to 15 or we were not given the option to even decide that 16 we were going to figure out a way to preserve that 17 information, it wasn't available. So, I would say 18 that the answer to your question is not clear. 19 MR. CARSON: I had that feeling. I 20 wanted to follow-up on your responses to Rachel as 21 well. You gave a situation where some of your 22 license agreements permit use only by students and 23 faculty. So, if someone else walks into the library 24 you couldn't give them access. I want to make sure 25 in the context of this rule making whether that's a 26 problem in the context of this rule making. In PAGE 65 1 other words, to what degree are the technological 2 controls preventing you from giving access to that 3 outsider and to what degree is it simply the terms 4 of the license? If you wanted to breach the license 5 you could give them access, I assume. Nothing 6 prevents you in the technology from getting that 7 access. 8 MS. WIANT: I suppose that is -- in the 9 instance again that's coming to mind, I suppose it 10 is one in which one could violate a provision to do 11 so, it may not be the technological controls, but I 12 can think of -- simply because the piece of 13 information that I'm thinking of happens to be in 14 one of the major legal databases and the way we 15 access that is different. But, the example that is 16 immediately coming to mind is one of let's say a 17 local attorney who has a tax question and needs a 18 private letter ruling, the full text of which are 19 not in print and the access to which is in a major 20 legal aggregated database and because of the 21 restrictions on that we couldn't legitimately supply 22 a walk-in attorney who is not a member of our 23 immediate community. 24 Now, it is true that that would be -- in 25 that particular instance, because of the database in 26 which I happen to know there was full text opinions PAGE 66 1 available, that would be a licensing scenario. 2 That's not to say though that if that same 3 information were in some other database on the 4 Internet that it would not be an access problem, as 5 well as again we're back to the secondary use of 6 could one even look at it to decide whether or not 7 that was the private letter ruling they wanted 8 before you actually got to the level of getting a 9 copy. 10 How one goes about making sure that 11 you've actually located the piece of information 12 that you need, particularly when you can't see it in 13 any other way in a whole text scenario and I'm 14 thinking conceivably that could be in a database for 15 which the access is technologically controlled and 16 therefore the use is controlled. But, because I 17 don't know whether the private letter rulings in 18 full text are in such a database, I can't answer the 19 question in the situation it was a licensing 20 limitation. 21 MR. CARSON: Okay. What I'm trying to 22 get out is what could we do to help you in that 23 situation and I think what I'm hearing is confusion 24 at best and perhaps there is nothing we could do in 25 the context of this rule making that would help you 26 in that situation. PAGE 67 1 MS. WIANT: What you could do to help us 2 is figure out an exemption that would at least allow 3 us to look at the information to decide whether it's 4 information that we go to the second level and get a 5 copy. 6 MR. JASZI: And, I might add that I 7 think one thing you could do to help in the rule 8 making is to make it clear that the use of access 9 controls will not supersede the use of licensing in 10 the future, because I think there is a real 11 possibility that the terms and of use that are open 12 to be negotiated between suppliers and consumers in 13 the present environment would in the conditions of 14 the full implementation of Section 1201(a)(1) come 15 simply to be dictated by technological means. 16 MS. PETERS: My question had to do with 17 kind of where part of the problem is when we say 18 that there is not fair use at all. What we're 19 really talking only about is access control and your 20 example had a member of the public who presumably 21 was not a student trying to look at a database for a 22 class project, but more likely a practicing attorney 23 who was trying to look at it for a client. 24 MS. WIANT: But a federal government -- 25 a piece of federal government information that 26 otherwise would not be available for copyright PAGE 68 1 protection I believe was my example there. 2 MS. PETERS: Yes. And, you're saying 3 the only place that this is available is in this one 4 database? 5 MS. WIANT: That I can think of at the 6 given moment. 7 MS. PETERS: Okay. Because that -- with 8 a lot of information with Lexis and Nexus, I mean 9 almost all the court opinions are available 10 elsewhere. 11 MS. WIANT: Elsewhere now. 12 MS. PETERS: Yes. 13 MS. WIANT: Or becoming increasingly 14 available, yes. But, as I say, there are many 15 examples and there are many examples of federal 16 government information that has historically been in 17 print and that are not becoming only electronically 18 available as well. But, some of those are still 19 available electronically from the government, but 20 there are examples, such as the one I just raised, 21 that don't fall into that category. 22 MR. CARSON: Let me follow-up on your 23 example, the French database where it suddenly 24 disappeared. First of all are you talking about 25 something where you actually had the physical copy 26 or are you talking about something where you had it PAGE 69 1 online. 2 MS. WIANT: No. I'm talking about an 3 electronic database. One day it was there and then 4 without notice was not. 5 MR. CARSON: Okay. What could we do in 6 the context of this rule making to resolve that, to 7 help you out with that situation? How would 8 anything we do permit you to get access to that when 9 it's no longer there? Okay, that's the wrong way 10 to put it, perhaps, because I think I answered my 11 own question. What could we do that would resolve 12 the problem? 13 MS. WIANT: As in other formats, when 14 publishers are no longer maintaining in print and 15 now lets say in access, historically libraries if 16 after making a reasonable search in the market, 17 libraries have been able then to make a copy for 18 preservation purposes. Maybe a similar pattern if 19 the proprietors are no longer going to maintain 20 electronic copies, that if libraries were allowed, 21 as they are under Section 108, if libraries are able 22 to make preservation copies if after a reasonable 23 venture into the market that they cannot find a 24 replacement copy at a reasonable cost, that 25 libraries be allowed to make some preservation 26 copies. PAGE 70 1 MR. CARSON: In this rule making all we 2 can do, I think, is determine whether there are 3 particular classes of work for which the anti- 4 circumvention prohibition, with respect to access, 5 is exempted. How does that solve this problem? Do 6 we have a tool that will really solve the problem 7 for you? 8 MS. WIANT: I guess I come back to 9 Peter's comment that when you look at access you are 10 in fact looking at use in many ways. I mean, if we 11 can't get access to it, we can't use it. If the 12 restrictions control the access, they therefore 13 control the use and therefore it simply doesn't 14 exist to us. 15 MR. JASZI: In other words it would be 16 possible in a rule making such as this one, to 17 enable the archival copying of potentially ephemeral 18 electronic information products, despite the fact 19 that those products might bear technological 20 protection measures which would otherwise bar such 21 archival copying. 22 MR. CARSON: So, you're saying even 23 though this is in a remote database you would 24 download it somehow and then after it is no longer 25 available in that database, if there is any 26 technological protection to access you should be PAGE 71 1 able to circumvent that protection? 2 MR. JASZI: Well, I don't know enough 3 about the library technology involved to be able to 4 go to that level of specificity, but my 5 understanding of the problem is that one reason it 6 exists is that under current arrangements, in part 7 because of the use of technological protection 8 measures, archival copying of these materials is not 9 a possibility. Thus, when the materials are gone 10 they're gone. 11 Again, I don't have the library 12 expertise necessary to answer at the level of 13 precision that I would like, but I think in more 14 general terms the answer to your question is that it 15 would seem to be within the scope of this rule 16 making potentially to enable some forms of archival 17 copying, despite the fact that those forms of 18 archival copying might involve circumvention of 19 access controls. 20 MR. CARSON: One final line of question. 21 I would like each of you to put yourselves in the 22 place of the register right now. And, it's time to 23 make your recommendation to the Librarian and it's 24 time to tell the Librarian that this is the class or 25 these are the classes of work which you should 26 exempt. PAGE 72 1 Now, you have all, I think, to varying 2 degrees, sort of hinted or perhaps explicitly stated 3 this in your testimony, but I guess I would like to 4 hear it succinctly now from each of you, what class 5 or classes would you advise the Librarian to exempt? 6 MR. JASZI: What I've heard today, if I 7 can recap from our testimony, is a series of 8 recommendations. There is the class of works to 9 which I referred in my testimony; that is, works 10 embodied in lawfully acquired copies, which are 11 sought to be used for otherwise lawful and non- 12 infringing purposes. 13 I think we're also heard that works 14 embodying significant amounts of otherwise public 15 domain -- and particularly government -- information 16 are an area of special concern. Those are two that 17 immediately spring to mind, based on today's 18 testimony. Perhaps as well my colleagues have 19 others to suggest. 20 MS. LANDESMAN: I would support what he 21 said. I think we get a little hung up between 22 what's in it and the format that it's in. And, I 23 guess a lot of -- it's no different than it was in 24 print, so as he very ably described. This is the 25 type of thing that should be exempted. Whether it's 26 now in a digital format should not be the negating PAGE 73 1 factor. So, if it were in print then we would 2 legitimately be able to make use of it. 3 MS. WIANT: I would encourage the 4 Librarian to define classes as classes of legitimate 5 uses of works of lawfully acquired materials and to 6 look at the relationship between 1201(c) and 7 1201(a). 8 MR. CARSON: One question for Professor 9 Jaszi. I just want to get a little clarification so 10 I understand what you meant when you talked about 11 works embodied in copies that have been lawfully 12 acquired by users. A typical example, I suppose, 13 would be you get a CD ROM with something on it. I 14 can understand that. Would you also include a 15 situation where you're on the Internet and you're 16 able to download something from the Internet so it's 17 now sitting on your hard drive? Is that a work that 18 you have now acquired that would be subject to this? 19 MR. JASZI: Yes, it is. 20 MR. CARSON: Okay. Tell me what 21 wouldn't be subject to that? 22 MR. JASZI: Any work that is provided 23 electronically in a format which limits the ability 24 to fully download or acquire a copy; for instance, 25 when I go on line I cannot with Lexis and Nexis, 26 download the Lexis/Nexis database. It's not a PAGE 74 1 facility they provide to me. They provide me the 2 ability to read and the ability to capture portions 3 of the database, but not the ability to capture the 4 collection as a whole. 5 And, I think we're going to see, as my 6 testimony indicates, a great many other 7 implementations of that kind of limited access 8 electronic information commerce, so much so that 9 three years from now we may well be back talking 10 about the necessity of further qualifying the reach 11 of 1201(a)(1) with respect to those emerging 12 business models. The distinction is between the 13 business model, which depends on the enabling the 14 consumer, by one means or another, to acquire a 15 lawful copy and the many emerging business models 16 which are based on more limited forms of electronic 17 access. 18 MR. CARSON: It sounds like you're 19 willing to define the scope of your exemption by 20 reference to an almost acquiescence in the 21 technological controls that the provider puts on 22 copying and reproduction and so on, if I understand 23 you correctly. If the content provider won't let 24 you copy the work, then you're willing to say fine, 25 I don't have it, and I'm not entitled to the 26 exemption. If the content provider is willing to PAGE 75 1 let you copy it, then you have it and you're 2 entitled to the exemption. Is that the effect of 3 what you're suggesting or am I missing something? 4 MR. JASZI: I don't think you're missing 5 anything. I think that the goal of this, if I can 6 go back to first premises, the goal that the Digital 7 Future Coalition has had from its formation in this 8 process has been that of preserving the existing 9 balance of forces between proprietary control and 10 use privileges in copyright law. One of the central 11 features or aspects of that balance is that existing 12 copyright doctrine facilitates wide ranges of 13 legitimate uses of information by individuals who 14 have purchased or otherwise lawfully acquired copies 15 thereof. 16 The model of information commerce that 17 involves the distribution of copies has been and 18 continues to be a very important part of the 19 information commerce picture overall. The specific 20 exemption that I'm proposing is one which would be 21 designed to assure that insofar as that model of 22 information commerce is perpetuated its consequences 23 for the consumer remain functionally similar, 24 although the media involved may change. 25 I absolutely concede the possibility 26 that as new business models are implemented further PAGE 76 1 issues about the adverse effects from the 2 implementation of Section 1201(a)(1) may arise with 3 respect to those new business models. But the 4 proposal that I'm making today is one that is 5 specifically concerned with, the perpetuation of 6 traditional models of information distribution, 7 which I think will continue to have some vitality in 8 the new information environment. 9 MS. PETERS: I'm struggling to try to 10 figure out where our direct charge is with relation 11 to all what we're hearing as a whole. Much of what 12 we've heard with regard to the problems that 13 libraries are encountering are problems that we 14 could sit here and discuss whether or not there ever 15 was an enactment of Section 1201. We have said 16 access controls have been in place for a long time. 17 Copyright owners have licensed libraries to a 18 variety of things. 19 To date, to your knowledge, even though 20 the provisions of the DMCA are not in place, you're 21 not aware of the fact that libraries have basically 22 downloaded like CD ROMs and for preservation 23 purposes because the CD ROM may have an expiration 24 date with regard to the access to the information. 25 I guess, so I'm struggling with where we are today 26 and where we will be in three years, because that's PAGE 77 1 the period of time that this rule making will cover 2 where there is, because of control of access 3 provision, will not be able to get certain 4 information any other way. Because I think it 5 really is an issue about, as we mentioned in the 6 beginning, it's not how inconvenient it is to get 7 the information, but whether or not you can get the 8 information and I guess I'm still struggling because 9 some of the concerns that you have, which are very 10 legitimate concerns, I'm just not at the point where 11 I can figure out that they really directly relate to 12 our activity with regard to excepts for access 13 controls. 14 So, I'm kind of back where David is. 15 Given the scope of what our direction is -- having 16 read the -- let me back up. Having read legislative 17 history, when you're directed to create exemptions 18 for classes of works and we know that exemptions are 19 crafted narrowly to address a certain problem, and 20 yet what we hear with regard to the scope of what 21 you think the exemption would be, I have a concern 22 that you vacillate the very protection that Congress 23 intended. 24 So, I guess my question is, if we exempt 25 broadly, then what happens to the protection that 26 Congress intended to give copyright owners with PAGE 78 1 respect to the access controls that they would be 2 using? 3 MR. JASZI: Well, I think that, in fact, 4 the exemption that I have proposed is one which, as 5 I suggested in my testimony, might effectively 6 restore Section 1201 to what was the original 7 Congressional intent. 8 My reading of the legislative history -- 9 not only the legislative history relating to this 10 rule making, but the legislative history relating to 11 the DMC as a whole -- is that throughout the access 12 control/use control distinction was taken seriously, 13 and that it was the understanding of the principal 14 proponents of the legislation that the term ``access'' 15 as employed in Section 1201(a)(1) was in effect 16 limited in scope to what might be called initial 17 access or first level access controls. 18 The exemption that I have proposed is 19 one which would, if employed, in effect restore that 20 understanding of Section 1201(a)(1). I'm not sure 21 that that would by any means cure all of the 22 potential difficulties with the effect of access 23 controls on information consumers. But it would 24 certainly have the effect of bringing the 1201(a)(1) 25 provisions back to their roots or origins, so to 26 speak. PAGE 79 1 So, far from representing a departure 2 from the original understanding of the legislation 3 as represented by the legislative history, it would, 4 in my view, represent a return to that 5 understanding. 6 MS. PETERS: My question you were 7 focused on, initial access, if I am a library and 8 I'm negotiating for use for a particular year, I can 9 basically say I want unrestricted access to my 10 patrons, on the premises, for X dollars. It's a 11 fair amount because it's for the whole year for 12 everybody who comes in. Is it not possible that the 13 business model that says I'm going to basically bill 14 you per month, based on usage, could be cheaper or 15 less than the per year projection for the whole? 16 That was anyone. 17 MS. WIANT: I can think of scenarios 18 where that might be cheaper. Well, one of the 19 problems of this is an inconvenience problem though. 20 I recognize that. If you're in an academic 21 environment where you're being billed on how many 22 times a student chooses to look at whatever and each 23 one of those are charged, particularly when we're 24 wanting an environment where inquiring minds want to 25 know. We would like them to be inquiring and some 26 of that may be an environment in which say school PAGE 80 1 boards or at the universities or whatever, would 2 have a very hard time estimating cost of how many 3 times somebody is going to look at something. 4 So, yes, it is a changing business model 5 and probably the other -- 6 MS. PETERS: I'm just trying to get at 7 that per se it not necessarily is a bad model. I 8 mean, obviously with the Internet within a 9 transition and we're going to see many, many new 10 business models and in any business model it's the 11 consumers who ultimately accept or don't accept the 12 business model. So, I was just getting at your 13 focus on, you know, we really should only be talking 14 about initial access versus later access. 15 MR. JASZI: I see no difficulty with a 16 situation in which consumers, library consumers in 17 this case, or as it might be individual consumers in 18 some other case, can freely accept the consequences 19 of their choice as to the form of access that they 20 receive, provided that there is, in fact, a 21 meaningful opportunity to negotiate that issue. But 22 I am very concerned about the possibility that terms 23 of access will in effect be technologically imposed 24 rather than made subject to that kind of 25 negotiation. It's there, I think, that the role of 26 this rule making, in creating exemptions which may PAGE 81 1 have an effect on shaping the market environment in 2 which those choices are made, is so important. 3 MS. PETERS: One of the beauties, I 4 think, of what Congress did is by imposing a three 5 year kind of a look see. It's a way in which you 6 continue to look at what happens and you strike the 7 balance as you see it. I guess I was a little 8 surprised at some of the comments that we received, 9 because working in a library where all of us who 10 work here access to the Internet and I don't have 11 authority to go on bill anything to the Library of 12 Congress. I can spend most of my day going on the 13 Internet and getting a lot of stuff free. So, I 14 haven't seen it as a locking up necessarily of 15 information, but in many ways too much information 16 that was out there and yet we're focusing, you know, 17 the locking up. 18 So, I guess what I'm trying to get at is 19 what I've sort of heard is, except for some examples 20 that you gave where certain information, whether 21 it's public domain or federal that isn't really 22 available openly, in the next three years what 23 information do we actually think is not going to be 24 available to people who want to use libraries? Is 25 it as broad as you -- I mean, do you -- I want to 26 say, do you honestly -- in the next three years do PAGE 82 1 you actually predict that we are going to see this 2 massive locking up of information in all categories 3 of works? 4 MS. WIANT: The short answer is yes. 5 MS. PETERS: Okay. Does anyone else 6 have any questions? 7 MR. KASUNIC: A couple of things. Are 8 there any particular technological control measures 9 that seem to be more restrictive than any other? 10 Are there certain things that are less objectionable 11 or controlling in terms of secondary uses or 12 secondary access of works? 13 MS. WIANT: I'm having a difficult time 14 of answering that, because I think technological 15 measures is one of those totally undefined terms on 16 the one hand and, two, I also am not sure I know 17 enough technologically to answer that. 18 MS. LANDESMAN: Yes, I'm not quite sure, 19 you know, quite where that is. I personally have a 20 real problem with having to enter a password. And, 21 the reason I say that is that you really don't want 22 to be giving out this password to thousands of 23 people and saying keep this a secret. You also 24 don't want them to have to come to you and you have 25 to log them on. It's just a very difficult, you 26 know, arrangement, but I'm not sure if that's where PAGE 83 1 you were going. 2 MR. JASZI: My response is that I don't 3 think so. I'm by no means a very good technologist, 4 but the little I know about the different levels of 5 intensity of access controls, actual or potential, 6 suggest to me that the real distinction among them 7 is not one based on technology, but based on the 8 purposes for which they're implemented. Many of the 9 available forms of technological access control can 10 be implemented for a variety of different purposes, 11 and that to the extent there are distinctions to be 12 made, they ought to be made in terms of the purpose 13 for which the controls are implemented, what they 14 are designed to restrict, rather than on the basis 15 of the technology itself. 16 MR. KASUNIC: I think that some of the 17 comments stated that certain measures were merely an 18 obstacle to obtaining initial access and that some 19 of those measures were -- in terms of passwords -- 20 less restrictive. That once you had enabled initial 21 access, then it was only a question of using the 22 work. A technology or protection measure didn't 23 really have any other effect on uses. So, I guess 24 part of my question is: are the technological 25 measures distinguishing in anyway between access and 26 the use of works? PAGE 84 1 MR. JASZI: Well, just to give a simple 2 example, perhaps over simplified from a 3 technological standpoint, but illustrative, let's 4 take the simple measure of the password. We could 5 imagine an implementation of password security which 6 would permit the user, once the password has been 7 requested and given in the first instance, to make 8 continuous and free use of content thereafter. We 9 could, by contrast, imagine an implementation of 10 password security that would require that every time 11 the individual revisited the work embodied in that 12 physical medium or download, the password would be 13 requested again or that the password would be 14 requested every few minutes, so that the use of the 15 work could be billed in five minute periods or two 16 minute periods. 17 In other words, we could imagine -- at 18 least theoretically and perhaps there would be 19 practical difficulties -- the implementation of a 20 measure like a password as a first level access 21 control or as a relatively comprehensive second 22 level access control. The distinction is not in the 23 technology, but in the manner and purpose of its 24 implementation. 25 MS. PETERS: Anyone else? 26 MS. DOUGLASS: I just wanted to make PAGE 85 1 sure that I got your answer correctly about whether 2 or not we should be looking at 1201(f) fixed this or 3 1201(g) fixes, like reverse engineering or 4 encryption in the course of doing exemptions or 5 possible exemptions of 1201(a) or should we stick to 6 our knitting and vote that 1201(a) only? I think I 7 heard your answer, if you would clarify it or did 8 you answer that? 9 MR. JASZI: Well, I'm not sure I 10 answered that. 11 MS. DOUGLASS: Okay. 12 MR. JASZI: I would be pleased to try to 13 do so. Your charge, as I understand it, relates to 14 1201(a)(1) as such, but the question of how that 15 charge should be considered and executed seems to me 16 inevitably related, to some extent, to your 17 understanding of the specific exemptions. In other 18 words, since the specific exemptions of Section 1201 19 bear on the scope of Section 1201(a)(1) itself, 20 providing in some cases potential carve outs from 21 1201(a)(1)'s scope, then the question of how 22 adequate or complete those exemptions are with 23 respect to the kinds of legitimate activities to 24 which they were originally addressed seems relevant 25 to your undertaking. 26 If we were to decide, for example, that PAGE 86 1 one of the specific exemptions was in fact so 2 narrowly cast that it failed to provide scope for 3 otherwise important and legitimate activities that 4 potentially fell within the Section 1201(a)(1) 5 prohibition, then that conclusion would bear on the 6 discharge of your rule making responsibility. 7 MS. PETERS: Anyone else? If not, I 8 want to thank our witnesses for their testimony. We 9 really did appreciate it. And, to all of the rest 10 of you, we will resume around 2:30. If you know any 11 of the witnesses who are not and you can tell them 12 that, for this afternoon, it will be around 2:30. 13 It depends on my emergency that I have to resolve. 14 Thank you very much. 15 (Whereupon, the hearing was recessed at 16 12:30 p.m. to reconvene at 2:30 p.m. this same day.) 17 18 19 20 21 22 23 24 25 26 PAGE 87 1 2 3 4 PAGE 88 1 A-F-T-E-R-N-O-O-N S-E-S-S-I-O-N 2 2:30 p.m. 3 MR. CARSON: Unfortunately, the Register 4 is not going to be able to be with us, at least 5 initially. She is still attending to some other 6 urgent business that she needs to attend to. We're 7 hoping we'll see her before we say good-bye to you 8 today. 9 I'm not going to repeat the Register's 10 introductory remarks. For those of you on the panel 11 who were not here this morning, I've provided copies 12 for you so you have an understanding of the basic 13 ground rules are. I'm sure you already do, but if 14 there is any doubt in your mind have a quick read of 15 this thing. 16 And, I guess we'll get started with the 17 panel. This afternoon -- actually do we have 18 everyone here? I see three people up there and I 19 thought we had four -- 20 MR. KUPFERSCHMID: David is here. We 21 can start and -- 22 MR. CARSON: Okay. 23 MR. KASUNIC: David Mirchin is doing the 24 slide show. 25 MR. CARSON: He's number one on our 26 list, although I don't -- do we have any agreement PAGE 89 1 among the people as to who is going to go first? If 2 not, I'll just follow the order on the list, which 3 means we're waiting for David. 4 MR. KUPFERSCHMID: We were just thinking 5 we would go from, I guess, right to left. 6 MR. CARSON: Okay. Let's just give 7 David a moment to come and catch his breath. 8 (Whereupon, at 12:35 p.m. a recess until 9 12:36 p.m.) 10 MR. CARSON: This afternoon's panel is 11 first of all David Mirchin from SilverPlatter, Keith 12 Kupferschmid from the Software and Information 13 Industry Association, Joseph Montoro, Spectrum 14 Software and Chris Mohr representing the American 15 Business Press and a number of others. 16 And, you decided you would go from which 17 side to which side? 18 MR. KUPFERSCHMID: That way. 19 MS. DOUGLASS: Okay. Then, Chris, I 20 guess you're on. 21 MR. MOHR: Good afternoon. My name is 22 Chris Mohr. I'm an attorney in private practice 23 with the firm of Meyer and Klipper. I am here today 24 on behalf of the McGraw-Hill Companies, American 25 Business Press, the Newspaper Association of 26 American, Phillips International, the National PAGE 90 1 Association of Securities Dealers, Reed Elsevier, 2 SilverPlatter Information, Skinder Strauss 3 Associates, the Software and Information Industry 4 Association and the Thompson Corporation. 5 These vastly different organizations, 6 some of whom have filed statements and are 7 testifying on their own account, all have one thing 8 in common. They create and commercial market 9 databases. As database producers we, therefore, 10 feel compelled to respond to attempts by certain 11 university and library associations to have 12 databases excluded from the scope of Section 13 1201(a)(1)(A)'s protection. 14 More specifically, the argument that 15 databases should be excluded under the, in our view, 16 flawed rubrics of thin copyright works and fair use 17 works seems at odds with the legal frameworks set 18 forth in the NOI and the statute. We also believe 19 that such a determination would be ill-advised as a 20 matter of public policy. 21 The world of databases is not a 22 homogenous one. Databases vary greatly in their 23 subject matter, methods of organization and the 24 manner in which protected expression is integrated 25 within them. Databases also feed the needs of a 26 variety of organizations in both the non-profit and PAGE 91 1 for profit markets. The companies I represent today 2 from small businesses to much larger corporations 3 collectively invest billions in the creation and 4 distribution of material in nearly every field of 5 human endeavor. 6 The Internet has conferred tremendous 7 benefits on the database business. It has made 8 distribution of these products possible on a scale 9 and in a manner never imagined just 10 years ago. 10 In all likelihood increases in band width and 11 processing power will make today's technologies seem 12 hopelessly slow and archaic just a decade hence. 13 The other side of this equation is, as you well 14 know, that digital technology enables unscrupulous 15 users to make perfect and instantaneously 16 distributed copies of a work at a fraction of the 17 cost of creation. 18 Congress, therefore, concluded that the 19 threat caused by unauthorized access to such works 20 would result in publishers refusing to fully embrace 21 digital media, unless legal protection from 22 circumvention existed. Congress enacted the DMCA to 23 "facilitate the robust development and world-wide 24 expansion of electronic commerce communication, 25 research development and education by making digital 26 networks safe places to discriminate and exploit PAGE 92 1 copyrighted material." 2 Our position is more fully set forth in 3 the reply comment we filed and I will not go through 4 all of it here. In short, nothing we have seen in 5 either the initial round or the reply comments leads 6 us to believe that an exemption is warranted for any 7 class of works, much less one made up of databases. 8 The reasons for this belief are as follows. 9 First, as a general matter, as both the 10 legislative history and the notice of inquiry make 11 very clear, proponents of an accepted class of works 12 bear the burden of demonstrating the necessity of a 13 delay in Section 1201(a)(1)'s effective date. This 14 point is set forth extensively in the NOI and 15 legislative history and it sets the framework for 16 the Librarian's determination. Nonetheless, many 17 comments have viewed the burden to be on copyright 18 owners. This view is simply mistaken, but so 19 strongly espoused that we felt it necessary to 20 repeat it here. 21 The burden extends to several areas. 22 First, the proponent of an exemption must properly 23 identify a class of works. The legislative history 24 instructs us that this category must be carefully 25 drawn in order to preserve the incentives Congress 26 intended the statute to foster. Despite the PAGE 93 1 enormous diversity of the database, the association 2 comments have attempted to lump these products 3 together under the umbrellas of fair use works and 4 thin copyright works. This approach, in our view, 5 has several fatal defects. 6 First, one cannot blindly lump databases 7 into one category. The argument rests on the 8 premise of because certain works of authorship, 9 specifically scientific and academic databases or 10 databases, generally contain large amounts of 11 information and unprotected expression they should 12 be exempt from the access control provision. This 13 argument is boundless. Every copyrighted work 14 contains material to which the copyright does not 15 adhere and by the nature of the regime itself every 16 work is potentially subject to fair use. 17 What Professor Jaszi's comments this 18 morning seemed to me did was to attempt to create a 19 reverse presumption that because a work is subject 20 to fair use -- because a work is potentially subject 21 to fair use, that that work should be excluded. 22 This effectively eviscerates the protection and 23 repeals Section 1201(a)(1)(A). We believe that that 24 answers essentially a question that was not asked in 25 this proceeding. 26 With respect to the definitions of works PAGE 94 1 proffered by the AAU, the universities offer no 2 method by which thin works may be distinguished from 3 their thicker counterparts. Not all databases 4 contain a thin protection or material. Some contain 5 great originality and section coordination and 6 arrangement. Others contain works composed entirely 7 of the "thicker" copyright in photograph, new 8 stories or paintings. We believe that such a 9 distinctions would be unworkable in practice. 10 Moreover, if one look looks at the list 11 in the comment, the list ends with the word et 12 cetera, which is not, in our view, a good way to 13 develop a narrow and focused class. 14 Third, there seemed to be an assertion 15 that because a non-profit user makes use of the 16 materials it is entitled to an exemption from the 17 prohibition against unauthorized access. We did not 18 find support in the language of the legislative 19 history that a class of user can define a class of 20 works. The flaws in the class of user distinction 21 become more apparent when one considers that 22 database producers, such as SilverPlatter, market 23 their products primarily to the non-profit 24 educational communities. 25 The adoption of that kind of framework 26 effectively penalizes certain publishers that derive PAGE 95 1 most of their revenue from these markets. Given 2 Congress's stated desire to make content richly 3 available in all markets, such a result seems to run 4 contrary to legislative intent. 5 Finally, we believe that adoption of the 6 AAU's recommendations with respect to either fair 7 use or thin works would have disastrous practical 8 effects for database producers. Database publishers 9 typically invest tremendous effort into producing 10 products that are thorough, accurate and 11 comprehensive. The current scope of copy right 12 protection and compilations has caused several 13 entities to modify their business plans and they 14 question the manner in which these products and 15 services are offered making investment in future 16 products increasingly risky. 0 17 infringer from eviscerating the fruits of their 18 labor is the originality surrounding selection 19 coordination and arrangement. Once the egg shell 20 has shattered the yolk is free for the taking. 21 Protection from unauthorized circumvention of 22 the technological measure preserves incentives and 23 current law to create and distribute these valuable 24 products. 25 In short, neither the university 26 comments, the library comments or, in fact, any PAGE 96 1 other comments have identified a class of work with 2 the precision that Congress asked for. This is an 3 element of the case that must be proved and it is 4 one that has not been proven. 5 The next point of proof borne by 6 proponents of an exception is that of showing 7 substantial adverse effects. The universities in 8 advocating that databases as a class be exempted 9 have not documented a single instance of an adverse 10 effect. With respect to the libraries, we believe 11 that the adverse effects listed simply do not meet 12 the test of causation. 13 Now, the legislative history here is 14 instructive and as it was said earlier this morning, 15 that adverse effects means more than inconvenience 16 or individual antidotal cases. Moreover, in this 17 situation the proponents of an exemption must show 18 actual "extraordinary circumstances," that's from 19 the manager's report, where non-infringing use is 20 likely to be curtailed. 21 The libraries' claims, for example, that 22 many databases include technological measures that 23 limit the number of users. If five users are 24 allowed access, number six cannot make any fair use. 25 The same is true if one of them gets there after the 26 library closes. These so-called adverse effects PAGE 97 1 cataloged revolve around inconvenience, not around 2 any chilling effect of the prohibition of non- 3 infringing use. 4 Finally, the proponent of an exemption 5 must show that on balance the positive effects of 6 the statute are outweighed -- rather, that the 7 negative effects are outweighed by the positive 8 effects. Now, we've heard a lot about potential 9 negative effects that might occur and statements by 10 the librarians that bad things might happen and 11 maybe some of those concerns are justified and maybe 12 they're not. But, we heard nothing about the 13 positive effects that security measures have 14 allowed. 15 For example, password controls and more 16 sophisticated technology enabled Reed Elsevier to 17 embark on its academic universe program. And, they 18 submitted a separate comment to the library 19 detailing the way that that program works. Secure 20 web access has enabled Lexis and West Law to be 21 available from any computer on the plant, via the 22 World Wide Web. Ninety percent of daily newspapers 23 have online web sites and lots of them don't charge 24 subscription fees. 25 Maps, another class singled out by the 26 universities for exemption are routinely available PAGE 98 1 on numerous web sites. We don't see on balance the 2 substantial adverse effects referenced in the 3 legislative history, which warrant exercise of the 4 discretion to issue an exemption. 5 For these reasons and those more fully 6 laid out in reply, we believe that the record does 7 not support an exemption specifically for databases 8 of any kind. Thank you for the opportunity to 9 present our views and I'll be happy to answer any 10 questions that you might have. 11 MR. CARSON: Thank you. Next is Mr. 12 Montoro, I believe. No, Mr. Mirchin. 13 MR. MIRCHIN: Okay. Thanks. So, here 14 you are in the middle of the afternoon, the trough 15 point of energy in the day and you're sort of 16 wondering, you know, should I join Marybeth in her 17 important meeting. I can hear this on the audio feed 18 later, why do I need to stay here? So, I just 19 wanted to tell you that I was recently at a talk and 20 there were fewer people than here, but fortunately I 21 was able to get a picture of them and I thought I 22 would share that with you. 23 Now, I can't say that actually if you 24 were to stay here you would have the same benefit as 25 these nine people, but hopefully what you will get 26 out this afternoon's presentation is an overview of PAGE 99 1 SilverPlatter Information, what our company does, 2 what access controls we use, how those access 3 controls benefit the users, how we would be harmed 4 by the suggestion to exempt so-called ``thin 5 copyright'' works and ``fair use works'' and finally 6 just to say that these two classes, as well as the 7 other classes that were mentioned this morning, are 8 not really the definable classes of works that I see 9 as part of this rule making. 10 First of all, SilverPlatter. What do we 11 do? We're a small but globally oriented electronic 12 publishing company. We were founded in 1985. We 13 employ about 175 people, mostly software developers, 14 librarians, database designers, a lawyer. Our main 15 office is in Norwood, Massachusetts. As I say there 16 are many charming New England villages and then 17 there is Norwood. And, then we have offices in 18 London, Amsterdam, Berlin, Paris, Hong Kong and 19 Sidney and I work in Norwood. Okay. So, there you 20 have it. 21 We publish about 250 reference databases 22 in electronic format. Typically they're abstracts 23 of articles and full text of articles in areas like 24 medicine, humanities, sciences. An example, 25 actually, is AgeLine mentioned this morning by Betty 26 Landesman, published by the AARP. They licensed it PAGE 100 1 to us and then we do some database formatting. We 2 have a consistent look and feel for all 250 3 databases. You can search across all of them and we 4 do the marketing and the search and retrieval 5 software. 6 Some of the other organizations that we 7 would license from would be professional societies 8 like the American Psychological Association. It has 9 PsycLit, which is a database of about maybe 1,000 10 psychology journals. We also license from private 11 companies like Bell and Howell Information and 12 Learning. They publish a product called 13 Dissertation Abstracts. It's a database containing 14 abstracts and full text of dissertations and 15 master's theses. Our primary markets are university 16 libraries and medical libraries. Basically we're 17 marketing to libraries. Our smaller markets are 18 public libraries and then research libraries inside 19 corporations like biotech companies, pharmaceutical 20 companies, engineering companies. And, most of our 21 sales are outside North America. 22 So, that's what our company does. Now, 23 I want to tell you about what access controls we 24 use. Our databases are accessible via the Internet 25 or servers that are located at the customers' 26 premises. We have networking software we call PAGE 101 1 SilverPlatter's ERL, electronic reference library, 2 software. The customers choose how they want the 3 information. Do they want it over the Net or do 4 they want it typically on a CD ROM, which they can 5 then load onto the servers? We've used access 6 controls since our earliest days, since 1985. So, 7 if you get the product on the ERL servers or the 8 Internet our networking software allows access both 9 from local area networks, as well as wide area 10 networks. The access controls that we use are IP 11 filtering, Internet protocol filtering, as well as 12 password and user name. 13 The customer receives a Database 14 Authorization Sheet, and I'll just show you what one 15 looks like, which indicates the numbers of 16 simultaneous users that they can have. So, this is 17 an example where we have a license ID number and 18 then we have the customer name, okay. And, then we 19 have a particular server ID. It could actually be 20 many servers at a university. And, then we give the 21 maximum number of users that they can have access 22 the database. Ninety-nine is our unlimited use 23 number. 24 I should add here that the price per 25 user drops dramatically as you increase the amount 26 of access. So, if you have one simultaneous user PAGE 102 1 that can access the database at one time it is a 2 certain price and as you go up to 2-4, 5-8, 9-12 the 3 price per user goes down dramatically. The Database 4 Authorization Sheet says whether you are allowed to 5 install it to a hard drive and then finally there is 6 an expire date when you can us it until and then 7 there is an authorization code. And, that code, 8 that 40477182. It's a unique code for each 9 university and it's generated randomly. They have to 10 enter that into the servers and that indicates which 11 databases they can have access to and the maximum 12 number of simultaneous users simultaneous users who 13 can access the database. 14 So, that's the access controls that we 15 use. To insure access from a particular university, 16 we use Internet protocol filtering, so it says all 17 of these people who are accessing are coming from 18 harvard.edu or stateuniversity.edu, but the problem 19 with that is that it can be very restrictive, 20 because the faculty members who are on sabbatical, 21 there are students who are accessing it from their 22 AOL account, so we say, fine. This allows them to 23 access it from anywhere in the world, because if 24 they are not coming from harvard.edu, then they just 25 type in user name and password and they can access 26 it from anywhere. PAGE 103 1 So, the advantage here is that the 2 technology controls actually are allowing us to 3 provide much broader availability of the information 4 than was formerly available. 5 So, what are some of the benefits of 6 these technological protection measures? Because, 7 one of the things that Congress instructed the 8 Librarian in this rule making is, I know there is 9 all this negative stuff out there, but maybe there 10 are some positives. So, I just want to tell you -- 11 go over the five habits of highly effect access 12 control technologies. 13 First, this allows us to meet the varied 14 needs of different institutions. For some large 15 institutions, research institutions, they can have 16 an unlimited level of access or they can have a 17 specified level of access. And institutions in fact 18 are all over the board. We have a lot that have 19 unlimited -- have chosen unlimited access, some 5-8 20 users, et cetera. And, some down to one 21 simultaneous user. 22 The fees are fixed for a year for any of 23 those bands, so there is no additional pay-per-view 24 or pay-for-use. You decide, okay, I want five to 25 eight paid simultaneous users. That's it. You 26 don't pay any more the rest of the year. We're not PAGE 104 1 charging for any of the additional users. 2 Secondly, we don't dictate at all what 3 use is made of the information. It is really access 4 control. When they get access to it they can do 5 whatever they're permitted to do by law. We're not 6 controlling subsequent use, how they're using it. 7 We're not controlling fair use. 8 Thirdly, this allows remote access and 9 more convenient access to information. So, if 10 you're sailing you can then get access to our data. 11 Unlike some of the comments made in the -- the 12 initial written comments, we don't tether it to a 13 specific computer in the library. We really free it 14 up to allow the information to be accessed from 15 anywhere. 16 Fourth is we, contrary to what some of 17 the statements made, we're not exacerbating the 18 digital divide. By limiting unauthorized use we 19 actually allow anyone who walks into a library or 20 uses the library to use it. So, for example, if 21 that person wanted to go into Sarah Wiant's library 22 at Washington and Lee, they could do that. We're 23 just saying you can only have five paid simultaneous 24 users. You decide, do you want to have walk-ins 25 allowed to use the database? That's up to you. 26 You, the library, are allowed to do that. Our PAGE 105 1 technology certainly is not preventing that. 2 And, finally, I think what is important 3 to realize is that the access controls are not new. 4 I mean, these are not new things -- I think it was 5 the American Library Association that said that -- 6 they worried that there was going to be a wide range 7 of controls just now being deployed by content 8 providers. We have priced our products on the 9 concurrent model for 15 years. We've used our 10 current access control technologies, essentially 11 unchanged, for the last six years. This is a model 12 that's really been worked out with the libraries and 13 I would urge that it doesn't make too much sense to 14 be meddling with this scheme, which has actually 15 worked out pretty well. 16 The other thing that I would raise is 17 that what's here in today's rule making is a three 18 year time window. We're not saying what will happen 19 forever. There were a lot of comments this morning 20 saying, like Peter Jaszi was saying, the worst is 21 yet to come with access control or you haven't seen 22 the most aggressive use of access controls, but you 23 will starting October 28th of the year 2000. And, 24 sorry, this was the most aggressive guy that I could 25 think of, James Carville, if you remember him. 26 In other words these are words from this PAGE 106 1 morning, as you know, we're on the brink of bad 2 access control. We're on the threshold of it. Betty 3 Landesman mentioned that we haven't seen the impact 4 yet. And, we talked about the E-book example. I 5 guess what I see is that in terms of actual real 6 harm that we see today, I'm not saying that there 7 are no examples that you can find, but it's not 8 really there. And, in fact, even the panel this 9 morning said we think it's going to get worse. I 10 would say, let's see what happens, because in the 11 past there have been also a lot of these things that 12 they talked about, which is geographic location of 13 the information tethered to computers. That all was 14 true five and 10 years ago, but the publishers 15 responded. So, if you looked at a license 16 agreement, for example, SilverPlatter five and 10 17 years ago, you actually would see lots of geographic 18 boundaries, but over the course of time our market 19 was saying, well, wait a second, we don't want that 20 anymore. We want remote learning. We want 21 professors on sabbaticals to have access to it and, 22 in fact, the licenses and the technology in sync 23 have allowed that that wider access. 24 So, I would say, even in the E-book 25 example there is not -- really E-books are not being 26 used all that much. Let's see what happens and PAGE 107 1 let's see how the market accepts the idea if you 2 can't pass it along to someone. I am sure that 3 there will be other competitors that say, you know, 4 my book you can pass along to someone else. 5 And, fourth, I would just like to say in 6 the written comments that the Association of 7 American of Universities stated that it should be 8 permissible to circumvent access for thin copyright 9 works. So, what they called thin copyright works 10 are works like scholarly journals law reviews, 11 databases primarily valuable for the information 12 they contain. I guess I would just like to say, for 13 a company like SilverPlatter, in our self-interest, 14 all of our SilverPlatter products are databases. 15 That is all we sell. We license these from database 16 producers who have been slaving away in dimly lit 17 basements since 1911, putting together their 18 databases. All we're trying to do is have some 19 access protection and someone comes along and tries 20 to circumvent that access protection they scream, 21 but can they help it? No, because based on the 22 comments here, even if a customer pays for only one 23 simultaneous access, it will be permissible to 24 circumvent and permit unlimited use. 25 What I would say is that Silver Platter 26 was successful in our business model because we PAGE 108 1 specifically moved away from the idea that every 2 single minute the clock was ticking in the 3 background for every use. I mean, what we really 4 wanted to have, and as we've done, it's a model of 5 unlimited use within a certain access level. So, my 6 conclusion would be that the access controls really 7 increase the availability of copyrighted materials. 8 If we couldn't use access controls, that's exactly 9 what would lead to pay-per-view because we couldn't 10 enforce the concurrent user model. We couldn't 11 enforce even our other access controls -- or I 12 should say not that we couldn't enforce, but that it 13 would be permissible to circumvent the Internet 14 protocol filtering, the user name. Then we wouldn't 15 be able to say to a university, you can have 16 unlimited access, because they could let in anyone 17 from any other university in the world. From an 18 economic point of view, it simply doesn't work. I 19 mean, we cannot have -- instead of having our 15,000 20 subscriptions out there, to have one university 21 having a single subscription and letting everyone 22 else in for free. It's just not going to work 23 practically in the market. 24 And, the losers are not just 25 SilverPlatter, its employees, its investors, but 26 also the customers. I mean the whole thing we're PAGE 109 1 about here is providing good, high quality databases 2 for our users. The other problem is there is not 3 really a narrow and focused sub-set. It's impossible 4 to distinguish who's who here. What's a thin 5 copyright work, what's a thick copyright work? You 6 can't really tell the disguises from what's beneath 7 it. 8 It's not something in the Copyright 9 Office that you check off. Oh, hey, I'm registering 10 a thin copyright work. And, then there are other 11 aspects here that are really problematic in this 12 supposed class of works, which is why should 13 scholarly journals not be protected? To me that 14 seems like the stuff you do want to protect rather 15 than the checkouts, the stuff that you see on the 16 check-out line of the supermarket. 17 Finally, the ``fair use works'' has the 18 exact same problem. This is not a class of works. 19 This is a defense to infringement. Our entire 20 market would be considered fair use works. It's the 21 scientific, educational and research community and 22 it would undermine a company's viability, like 23 SilverPlatter. 24 So, in conclusion the final answer is 25 that we feel that the people, the proponents have 26 not met their burden of proof of saying why there PAGE 110 1 should be an exemption, why there should be a class 2 of works. There is no basis for permitting 3 circumvention for scholarly journals or other 4 databases under the rubric of fair use works or thin 5 copyright works. These works contain a significant 6 amount of copyrighted material and so I just say 7 there is really no defined class that I see yet -- 8 I've seen some defined classes. I don't think those 9 make sense, like fair use works, and I haven't seen 10 any other defined classes that I think are 11 appropriate for this rule making. And, finally, 12 there are benefits from access controls that 13 facilitates remote access, allows sharing of 14 resources between universities and consortia, permit 15 smaller universities and medical schools to pay a 16 small amount and larger universities to pay a larger 17 amount and we do, in fact, permit walk-ins. 18 Thank you very much. 19 MR. CARSON: Thank you. We'll move 20 across the isle to Mr. Montoro. 21 MR. MONTORO: Thank you, sir. My name 22 is Joe Montoro, and my presentation is not as 23 colorful, unfortunately, but I will try to get in 24 some reasons why I think there should be some 25 exemptions to the copyright, 1201(a). 26 Thank you for inviting me to come before PAGE 111 1 you today. As a software developer and a U.S. 2 citizen it is a great honor for me to take part in 3 our legislative process and I deeply appreciate the 4 opportunity. 5 While do not officially represent any 6 trade groups or organizations, I do represent the 7 views of numerous individuals, businesses and 8 universities that have expressed first hand problems 9 with various technological means. I will also echo 10 the opinions of several well-known authors such as 11 Ed Foster of InfoWorld Magazine, who has written 12 about computer and technological issues for over 20 13 years, as well as Jim Seymour of PC Week Magazine. 14 Reading the DMCA and its legislative 15 history has raised some areas of concern. As per 16 the summary of the DMCA from Copyright Office, 17 Section 1201 divides technological measures into two 18 categories: measures that prevent unauthorized 19 access to a copyrighted work and measures that 20 prevent unauthorized copying of a copyrighted work. 21 Copying is used in this context as a shorthand for 22 the exercise of any of the exclusive rights of an 23 author under Section 106 of the Copyright Act. 24 Consequently a technological measure that prevents 25 unauthorized distribution or public performance of a 26 work would fall in this second category. PAGE 112 1 Making or selling devices or services 2 that are used to circumvent either category of 3 technology measure is prohibited in certain 4 circumstances described below. As to the act of 5 circumvention in itself, prohibition prohibits 6 circumventing in the first category of technical 7 measures, but not the second. And, where I actually 8 have a problem is trying to draw that line in what 9 is access and what is copy control. 10 Distinction was employed to assure the 11 public will have the continued ability to make fair 12 use of copyrighted works. Since copying of a work 13 may be a fair use under appropriate circumstances, 14 Section 1201 does not prohibit the act of 15 circumventing a technological measure that prevents 16 copying. By contrast, since the Fair Use Doctrine 17 is not a defense to the act of gaining unauthorized 18 access to a work, the act of circumventing a 19 technological measure in order to gain access 20 prohibited. 21 My understanding of Congress's intent in 22 establishing the prohibition on circumvention of 23 access control technologies is to primarily to 24 prevent cable and satellite theft and to control 25 illegal access to software, primarily over the 26 Internet. An example would be downloading a trial PAGE 113 1 program such as Norton's Anti-Virum, that requires a 2 password or a serial number to make it a registered 3 version. Once the program has been purchased or 4 registered, the access control technology is no 5 longer in effect. The consumer is no longer 6 burdened by the protection measure and can run and 7 make a backup of the program. Someone selling or 8 distributing a serial number that would illegally 9 create an authorized version of that trial program 10 -- or excuse me, create an illegally authorized 11 version of that trial program, would violate this 12 act. With Section 1201 implemented in this manner, 13 I have no objection whatsoever. 14 What does concern me, however, is when 15 one purchases a software program or DVD, becomes an 16 authorized user and the access control measure 17 remains in effect. These are similar to Mr. Jaszi's 18 comments this morning. In a case such as this will 19 the lawful user be able to make a fair use of this 20 work? 21 The issue before us is whether persons 22 who are users of a copyrighted work are or are 23 likely to be adversely effected in their ability to 24 make a non-infringing use of copyrighted access 25 controlled works and the answer to that question is 26 yes. PAGE 114 1 In the world of computer software there 2 exists something called the hardware lock or dongle. 3 It is a small device that goes on the back of an IBM 4 compatible printer port and prevents unauthorized 5 copying or distribution of the software. As a class 6 of work, these fall under category two and it is not 7 a violation to circumvent these devices under this 8 act. 9 It is important to distinguish and make 10 clear that the large majority of these devices are 11 used simply to prevent unauthorized copying or 12 distribution. We are starting to see, however, some 13 devices that control the number of uses, the number 14 of times you can use a program. Here a user has 15 paid up front for a specific number of uses. A good 16 example might be the software that this Copyright 17 Office used to scan our 364 letters in response to 18 this hearing. The software Adobe Acrobat Capture is 19 priced from $699.00 and includes the ability to scan 20 20,000 pages. It comes with a dongle or hardware 21 lock. Under ideal conditions, when 20,000 page have 22 been scanned the device no longer functions and you 23 may purchase the additional pages or buy an 24 unlimited page version for $7,000.00. 25 A typical user has received 26 authorization to access this work, but this device PAGE 115 1 also prevents one from making unauthorized copies or 2 the distribution of software. As implemented it 3 prevents the authorized user from making a 4 functional archival copy of the program because of 5 the usage control device. This would be a fair use 6 under previous copyright law, but not under Section 7 1201(a). 8 The intent of Congress and the courts 9 was clear before 1201(a) that if anything happens to 10 the original software program the archival copy can 11 be used and the user can continue with the quiet use 12 and enjoyment of the program. With these hardware 13 lock devices that is not possible and these works 14 cannot be preserved. If the lock were damaged and 15 could not be replaced, then the user would not be 16 able to use the remaining pages that they had 17 already paid for. 18 The same problem exists with DVDs, 19 unfortunately because of the Content Scrambling 20 System. A consumer that lawfully acquired a DVD is 21 not able to make a backup of that media. Media and 22 hardware can be damaged and I would ask who has not 23 come across a bad floppy disk, a chewed up 24 videotape, a scratched record or a damaged compact 25 disk? 26 I am not suggesting that the rights of PAGE 116 1 manufacturers be ignored. I am a software 2 developer. I hold six registered copyrights with 3 this office, a manufacturer and of course a 4 consumer. If a software manufacturer wants to 5 protect their software with a hardware lock, so be 6 it, providing the authorized user has a way to use 7 that software in an unencumbered, non-infringing way 8 once they have made a purchase. Circumvention or 9 replacement technologies should be made available to 10 them providing they can provide the proper 11 authentication. 12 The reason an exemption for fair us is 13 needed, on October 12, 1998 in a statement by the 14 President, Mr. Clinton said "This bill will extend 15 intellectual protection into the digital era while 16 preserving fair use." Fair use policies are 17 intended to protect the public interest and I hope 18 that during my testimony I can show you why they are 19 needed in this case. 20 There are numerous problems a consumer 21 faces when using these devices. While most 22 manufacturers will replace a damaged lock device, as 23 a general rule they will not simply replace lost or 24 stolen lock devices. They require the end user to 25 purchase another program at whatever the retail cost 26 may be. This could be devastating to a small PAGE 117 1 business, a library or educational facility. 2 Harvard locked software programs can be 3 very expensive. A program called 3D Studio by 4 AutoDesk cost $3,000.00. Another called Mastercam 5 by CNC Software is over $13,000.00. Surfcam by 6 Surfware is priced around $22,000.00. Others are 7 priced even higher. Some companies are honest and 8 up front about their replacement policy, such as 3D 9 Studio. To replace a hardware lock that is lost or 10 stolen or destroyed you need to purchase another 11 copy of 3D Studio Max. Another company, Cadlink 12 Technology said if the security device is lost, 13 stolen or damaged by whatever means, a replacement 14 must be obtained from Cadlink before the software 15 will function properly. Cadlink can charge the full 16 current list price of the original software to 17 replace the security device. Others make no mention 18 of it in their documentation or their web sites. 19 Can you imagine Ford Motor Company telling a 20 consumer, Ford will not replace a lost or stolen 21 ignition key and that the consumer must purchase a 22 new automobile at the regular price? Would anyone 23 tolerate this, but yet we do here in the computer 24 industry. 25 Computer theft and damage is a very real 26 concern and if the authorized user of a program has PAGE 118 1 a hardware lock device on the computer they are 2 simply out of luck. According to statistic 26 3 percent of all notebook reported losses in units 4 were due to theft in 1998. An estimated 1.5 million 5 computers were stolen, damaged or otherwise 6 destroyed during 1998. An estimated $2.3 billion in 7 computer equipment was lost, or stolen or damaged by 8 accidents, power surges, natural disasters and other 9 mishaps during 1998 and the numbers were even higher 10 for 1999. In a library or university setting there 11 are many people who have access to these devices and 12 it is these institutions that are the least likely 13 to be able to afford purchasing another program. 14 Technology changes very fast. What is 15 current today my be old technology tomorrow. It 16 wasn't too long ago that we all used 5\274 inch floppy 17 disks. Even Time Warner concedes "many technical 18 protections are still in their infancy." It is 19 reasonable then to believe that just as in the past 20 today's media and technical protections will become 21 obsolete. Examples of this include vinyl records, 22 8-track tapes, laser disks, DIVX, which was Circuit 23 City's failed attempt at the pay-per-use CVD, and 5\274 24 inch floppies. High Definition Television is also 25 on the way. The current DVDs are not of HDTV 26 quality. Is there any guarantee that future DVD PAGE 119 1 players will be able to pay today's movies? 2 Considering that just two weeks ago the FCC began 3 proceedings to resolve compatibility and copy 4 protection issues involving digital television 5 receivers and cable systems, it is not very likely. 6 The National Library of Medicine has 7 experienced problems where they have computer 8 programs on obsolete disk formats that incorporate 9 technological measures that do not permit the 10 information to be restored or archived to other 11 platforms. They are forced to maintain obsolete 12 operating systems and equipment to access these 13 materials. This is not a cost effective way to 14 enter the 21st century. 15 All of the concern regarding the year 16 2000 and its effect on computer systems and software 17 was brought about because of the real possibilities 18 of network and computer shutdowns and errors in 19 software. Jason Mahler, vice president and general 20 counsel of the Computer and Communications Industry 21 Association whose members include AT&T, Bell 22 Atlantic, Intuit, Oracle, Verisign and Yahoo said 23 "the year 2000 problem demonstrated software 24 programs of all types can require error 25 correction.... Once one has lawfully obtained a copy 26 of a software program, he or she should certainly PAGE 120 1 have the opportunity to repair that program so that 2 it functions properly." 3 Many of these devices have a limited 4 life span since they use a small proprietary built 5 in battery. When the battery dies, the hardware 6 lock becomes non-functional and once again a program 7 that costs thousands of dollars is worthless if the 8 device cannot be replaced. 9 Technology companies are constantly 10 being bought and sold and some simply are forced to 11 go out of business. If a company goes out of 12 business, there is no one to support the authorized 13 customer when a hardware lock is damaged and needs 14 to be replaced. Here a perfectly good software 15 program becomes worthless without the hardware lock 16 and the consumer suffers. Steven Jacobs, president 17 of Individuals with Disabilities at National Cash 18 Register Corporation used dongled software from 19 Microsystems Software. Every member of that 20 division works on a volunteer basis and the software 21 evaluates the abilities of children with 22 disabilities. Microsystems was sold to the Learning 23 Company, who no longer supports these products and 24 Mr. Jacobs wrote "one of our dongles is broken 25 leaving us out in the cold." Another letter says 26 "We are a manufacturer that has a program called PAGE 121 1 "NSEE verify" that was sold through 2 Microcompatibles. It has a black dongle block. The 3 company was sold to Preditor Software and Preditor 4 has discontinued the software product and does not 5 support it anymore. WE have had hardware lock 6 burnouts in the past and almost could not get a 7 replacement last year." 8 In another example once a company has 9 been acquired their software program is generally 10 phased out. After a period of time, the program and 11 lock device is no longer supported because companies 12 either want the customer to upgrade to the newer 13 combined product or they are using a different 14 hardware lock device. So, even though the software 15 they purchased for $6,000 some five years ago still 16 serves all their needs, they are being forced to 17 upgrade at nearly twice the cost. This says nothing 18 of the costs associated with training employees to 19 use the new computer program. One example is a 20 gentleman named Bill Hendershot. He won an Emmy 21 Award for his creation of time base correctors in 22 the video industry. He quotes "he had a hardware 23 lock fail..... and we had no success in dealing with 24 the company to replace it. They tried to find 25 another old key, but none would work. Our PADS 26 systems has now been down for over 30 days." I PAGE 122 1 don't think we can ask consumers to tolerate this 2 kind of problem. 3 Some, such as the Software and 4 Information Industry Association have suggested "at 5 first blush.....these examples appear to justify the 6 creation of an exemption to Section 1201(a)." The 7 SIIA goes on to say that other options make this 8 exception unnecessary. The first option they list 9 is "if consumers are concerned about having access 10 to code due to irreparable damage to the access 11 control technology or the demise of the copyright 12 owners' business, they an use trusted 3rd parties to 13 escrow the software code in confidence to ensure 14 future access to the content if such events occur." 15 That was reply comment number 59. The mistake made 16 here is simple and obvious; consumers do not have 17 access to the source code written by a developer. 18 Further, developers are not required to escrow their 19 materials with any 3rd party and even if they were, 20 it does not overcome the issues of fair use, 21 interoperability, theft and security testing and 22 research. The second solution the SIIA offers is 23 "to get the copyright owner or the manufacturer of 24 the access-control technology to "fix" the 25 technology." The problem with this logic is 26 twofold. First, the question was what do we do when PAGE 123 1 the copyright holder is out of business or the 2 product is no longer being supported? Second, 3 because of the secure nature of the technological 4 measure, only the developer of the software, not the 5 manufacturer of the hardware lock, can program the 6 dongle or fix the application. The reason is 7 because these devices have unique information 8 embedded in them from the developer and there are 9 also unique codes that are embedded in the software 10 program that only the developer would know. 11 Jim Seymour in PC Week Magazine wrote 12 about another reason we cannot depend on the 13 manufacturers to fix a problem. PC Week Labs does 14 product evaluations and AutoDesk sent in their 15 software 3D Studio, an animation program, to be 16 evaluated. The techs couldn't get the program to 17 run with the security device, so AutoDesk sent 18 another one, but it wouldn't run either. They tried 19 another computer with the same results. When they 20 contacted AutoDesk again they were told, "Buy 21 another computer." Reminiscent of earlier testimony 22 today, Mr. Seymour goes on to say that "dongle 23 makers and the software vendors that support them 24 argue that dongles are essentially trouble fee, no 25 burden at all to honest users." He goes on to say, 26 "Ahh, if only that were so.....dongles cause a world PAGE 124 1 of trouble for those unlucky enough to buy 2 applications using them." 3 When AutoDesk's customer satisfaction 4 director said to Ed Foster of InfoWorld magazine, 5 AutoDesk has found dongle type hardware locks more 6 annoying than authorization code schemes, Mr. Foster 7 received a wave of dongle hell letters from readers 8 that had similar experiences. One reader from an 9 academic institution reports that out of 16 10 computers the school had recently upgraded from 11 AutoCAD version 13 to version 14, 5 were put out of 12 action when the dongles failed. Many readers report 13 having to put up with multiple dongles, a situation 14 that can lead to trouble. Another reader wrote 15 "some vendors always say, "If you have multiple 16 dongles be sure to put ours on first or else the 17 computer might hang or crash"." 18 The availability for use of copyrighted 19 works. The availability of dongle-protected works 20 for use by libraries, companies and universities is 21 also diminishing. Some refuse to use software that 22 is protected in this manager. The loss to our 23 students is that schools will be forced to select 24 alternative software that may not be the most common 25 or the best in the field. For example, AutoCAD is 26 the largest and most used CAD program and often PAGE 125 1 comes with a hardware lock. It is used to design 2 anything from houses to gears. By schools selecting 3 another program that is not dongled, the students 4 really don't learn on the platform they need to, in 5 order to prepare them for entry into the job market. 6 I have some quotes here from people. 7 I'm going to try to move through these. 8 Incompatibility problems. While the 9 manufacturers of these devices claim that they are 10 trouble-free and transparent to the user, they are 11 anything but. On the companies' web sites are many 12 examples of incompatibilities and conflicts. Often 13 months will go by before a solution is found, in 14 some cases there is no solution. Incompatibility 15 problems and hardware conflicts exist, hardware 16 conflicts such as not being compatible with new 17 Hewlett Packard printers, where the lock device 18 cannot support bi-directional printing, the computer 19 is too fast, so it can't find the lock device, too 20 many lock devices on the parallel port, so the lock 21 device can't be located, the lock device won't work 22 with a certain chip set, the driver is not 23 compatible with a new service pack release of 24 Windows NT. 25 One fear many people have is that not 26 only expensive high end applications will use these PAGE 126 1 technologies, but everyday software and even kid 2 games will come with these devices. Unfortunately, 3 these people are correct. In a document by Hewlett 4 Packard, "My Interactive Pooh," that's Winnie the 5 Pooh, comes with a dongle. This device causes 6 incompatibilities with Hewlett Packard DeskJet 7 printers. They've gone on to say that they actually 8 found problems with the dongles and that you should 9 contact the Mattel Company to try to get your 10 product replaced. 11 I don't think I'm exaggerating when I 12 say that we are inviting a technological nightmare 13 and soon will see a protection device on every piece 14 of software we use. In anther HP document two-way 15 communication cannot be established with a printer 16 using a dongle. HP's solution is to simply remove 17 the dongle. So, now you can print, but cannot run 18 your program. And, sometimes a hardware lock driver 19 will be updated by a new application, cause the 20 older application not to work. 21 It's the consumer that suffers while 22 they wait for some software genius to figure out 23 what the problem is and/or if it can be fixed. One 24 of the lock companies commissioned a study to use 25 the findings as a sales tool against competitors. 26 The results was the Rainbow's documentation and PAGE 127 1 frequently asked questions on their web site 2 specifically mentioned security key daisy-chaining 3 constraints and hardware revision incompatibilities 4 among selected security keys. And, we've got 5 documents under here to back that up. 6 The interoperability is another issue. 7 In an age where interoperability between computer 8 platforms is more and more important these devices 9 force us to take a giant step backwards. One 10 customer was referred to me a software manufacturer, 11 PADS, who sent the customer a demo of their product 12 which he like enough to purchase. After the 13 customer purchased it he was surprised to find the 14 full working version came with a parallel port 15 hardware lock device. The customer called PADS to 16 inform them that a Macintosh computer does not have 17 a parallel port in which to put the lock and that he 18 was running IBM compatible software on his Macintosh 19 through a program called Soft Windows. Rather than 20 lose a $4,500.00 sale, the software manufacturer 21 referred him to my company to purchase one of my 22 programs. 23 Several companies view a cross platform 24 solution as important. Insignia software has 25 developed Soft Windows for the Power Mac which 26 allows you to run your Windows and DOS programs. PAGE 128 1 They've also develop soft-UNIX as well. 2 The same statements are true for DVD. 3 Being able to view or operate a DVD on other 4 platforms such as Linux is also at issue. The 5 Justice Department has spent a considerable amount 6 of time and money investigating MicroSoft and one of 7 the reasons given by the Assistant Attorney General 8 of the United States for splitting up MicroSoft was 9 that they would not make their office software 10 available on a competing platform like Linux. 11 There are physical problems as well. 12 for a university, library or other facility that 13 must run some of its software on a server or a 14 laptop, there is a physical problem. When a 15 business such as Durham Electric Company in North 16 Carolina has 6 dongles hanging off the back of a 17 computer, imagine the number that a university or 18 library has or will have in making works available 19 to the public. 20 Today's laptops are as powerful as any 21 desktop computer and more people than ever before 22 either commute or take their laptops on the road. 23 What is it like having 5 to 10 inches of hardware 24 sticking out of your laptop? And, if I may, I would 25 like to show you. These are 6 dongles that the man 26 in North Carolina had to put up with to use his PAGE 129 1 computer and let's take a look and see what it looks 2 like on the back of a laptop. Okay. That will give 3 us some idea of what we're looking at. 4 Now a library or an educational facility 5 that has multiple programs, that has multiple 6 software that they're trying to instruct with or 7 databases -- I'm not sure about the databases, 8 Chris, but this is a real concern. This is only 6 9 from one electric company, yet alone a library or 10 any other kind of educational facility will just go 11 further and further. And, it gets to the point 12 where it is ridiculous. 13 In addition, these companies also say 14 that the lock device, as you've heard earlier, needs 15 to be first. So, okay, when I want to run this one 16 program, this one needs to be the first one, but 17 when I want to run the second program I've got to go 18 over here and it's just a physical nightmare. 19 Does the act of circumvention effect the 20 value or price of copyrighted works? Not paying for 21 software you obtained illegally wrong and it 22 deprives the developer the fruits of their labor, 23 but we need to distinguish this act from an 24 authorized user gaining access to a product they are 25 authorized to use and have already paid for. Here 26 the only negative impart would be to the company or PAGE 130 1 individual if they were not able to use what they 2 paid for. The effect of circumvention for 3 authorized users will increase the sale of DVDs and 4 software, where previously unsupported platforms are 5 now available and those institutions that have 6 policies against using dongled software will once 7 again become users. 8 No one wants to see computer software 9 pirated, however, there are other ways to protect 10 software besides hardware lock devices, such as pass 11 codes, software license files where the program 12 checks for the presence of the file and the software 13 protection systems that permit functional archival 14 backups and fair use. Perhaps we should follow the 15 lead of a company called Unisoft of Milford, 16 Connecticut. Unisoft is a software developer that 17 used dongles on their software from day one. When 18 the manufacturer of the dongle discontinued the 19 model, they considered other brands. Their 20 conclusion, "A determined pirate can make an 21 unauthorized copy of software and make it run 22 regardless of dongles. To a legitimate user, 23 however, a dongle is an inconvenience at best, and 24 at worst makes completely legal software completely 25 useless." ".....we are more interested in 26 satisfying our legitimate customers than foiling PAGE 131 1 pirates.....we will, however, aggressively 2 investigate and prosecute any and all illegal 3 copying of our software, but will not do it at the 4 expense of our honest customers." They now usa a 5 simple license file and pay a referral fee to the 6 customers if the customer gives a copy of the 7 software to someone and they end up purchasing. 8 They value their support, their subscriptions and 9 feel that that adds significant value to their 10 software and that it is reasonably priced. "Most of 11 all, we don't think that our customers would try to 12 cheat us." 13 In my conversation yesterday with Mr. 14 Lareau, the vice president of sales at Unisoft, he 15 confirmed that customer satisfaction has increased 16 and there are less headaches for the company and was 17 not able to identify any decrease by using this 18 policy, any decrease in sales. 19 An independent study that was done in 20 Canada bears this out. Of those polled 48 percent 21 had an unfavorable opinion of hardware lock software 22 and 52 percent felt that there was a need for a 23 replacement device. 24 I'd like to stress again that most of 25 these devices are primarily used to control 26 unauthorized copying or distribution, however, the PAGE 132 1 rights of the consumer to use and enjoy software in 2 a trouble-free manner must be of foremost concern, 3 whether the technological measure controls access or 4 controls unauthorized copying or distribution. The 5 computer industry needs an alternative to hardware 6 lock devices and the problems they pose and should 7 let the marketplace determine what is effective and 8 what is not. As Mr. Leahy stated in the conference 9 report on the DMCA dated October 8, 1998, this 10 legislation should not establish or be interpreted 11 as establishing a precedent for Congress to 12 legislate specific standards or specific 13 technologies to be used as technological protection 14 measures, particularly with respect to computers and 15 software. Generally, technology develops best and 16 most rapidly in response to marketplace forces. 17 To date we have only looked at this 18 issue tin terms of black and white, either access 19 control technology is circumvented or it is not. I 20 submit we should look at it in a third way. We 21 should let the industry develop legitimate ways to 22 replace troublesome access control and/or copy 23 prevention technologies if one can do so and 24 preserve the rights of the copyright holder. 25 Through my software development I have 26 been able to create a one for one hardware lock PAGE 133 1 replacement that is done in software, that has all 2 the functionality of the original device, yet cannot 3 be copied unless you are authorized to do so. 4 Through this product I have been able to overcome 5 every objection raised regarding software, including 6 interoperability, compatibility and fair use while 7 still protecting the rights of the copyright holder. 8 I would respectfully submit that an 9 exemption be made so that once a person has lawfully 10 acquired access to a work subsequent uses of that 11 work will be exempt under fair use. At the very 12 least this should be applied to computer software 13 and DVDs where media can be damaged and there will 14 always be an issue of compatibility and 15 interoperability. 16 Lastly, it would be a waste of resources 17 for any institution, agency or user that my qualify 18 under current or future exemptions to bypass or 19 replace a technological measure themselves when this 20 is not their field of expertise, therefore, 21 companies should be permitted to advertise and 22 provide these services providing certain criteria 23 that you decide is met. 24 Once again, thank you for the 25 opportunity to appear before you and I look forward 26 to answering any questions you may have. Thank yo. PAGE 134 1 MR. CARSON: Thank you, Mr. Montoro. 2 Mr. Kupferschmid. 3 MR. KUPFERSCHMID: Good afternoon. I'm 4 Keith Kupferschmid, Intellectual Property Counsel 5 for the Software & Information Industry Association. 6 I appreciate the opportunity to testify here today 7 and would like to thank the Copyright Office and the 8 panelists in particular for both conducting these 9 hearings and for creating what I consider to be a 10 very open and efficient rule making process. 11 By way of background, I would like to 12 talk a little bit about SIIA, which is the principle 13 trade association of the software and information 14 industry. We represent about 1,400 high tech 15 companies that develop and market software, 16 electronic content for business, for education, for 17 consumers, for Internet, and for entertainment 18 purposes. Our membership is quite diverse. In 19 fact, especially in relation to other trade 20 associations, we have information companies as our 21 members, such as Reed Elsevier, the West Group, the 22 McGraw-Hill Companies. We have software companies, 23 such as Oracle and Sun, hardware companies like 24 Hewlett Packard and Apple and many e-commerce 25 companies, such as America OnLine and Cybersource. 26 So, as you can see, just from this diverse interest, PAGE 135 1 diverse membership that we have, our members 2 represent a wide range of business and consumer 3 interests. 4 Our members create and develop new and 5 valuable access control technologies for use by 6 others. They also use access control technologies 7 to protect their proprietary content. And they 8 purchase and license software and information 9 products and other content and services that utilize 10 these access control technologies. So, our members 11 basically span the gambit of all the effected 12 interests that might be at issue here in this rule 13 making process. 14 Consequently, our members are extremely 15 interested in the issues relating to the protection 16 and use of access control technologies and the 17 relationship between fair use of copyrighted content 18 as it relates to the anti-circumvention provisions 19 in Section 1201(a)(1) of the Digital Millennium 20 Copyright Act. Because of the many interests of the 21 SIIA members and because of time constraints, I will 22 divide my testimony into two separate sections. The 23 first section of my testimony will focus on general 24 concerns of SIIA and its membership and in the 25 second half I will attempt to address four specific 26 concerns raised by the comments that were filed. PAGE 136 1 Because of the time constraints, however, I will 2 just summarize our comments and hopefully expand 3 upon them with some of the questions that are asked. 4 A more detailed discussion of our comments can be 5 found in our written reply comments and in any post- 6 hearing comments that we may file and based on some 7 of the comments I've heard today, I think we 8 probably will be filing some post-hearing comments. 9 In sum, we concluded that none of the 10 initial or reply comments submitted, either 11 individually or taken as a whole, provide sufficient 12 concrete evidence to justify the creation of an 13 exemption to Section 1201(a)(1). 14 Let me go into my three general 15 comments. First and foremost, several commentators 16 contend that the burden of persuading the Copyright 17 Office in the rule making is on proponents of the 18 prohibition. I am not going to go into a detailed 19 discussion of the statute, of the legislative 20 history or the notice of inquiry itself, but if you 21 review those sources or review our written 22 statements or the other written statements of those 23 in the copyright industry, you will see that each of 24 these documents, each of these three sources clearly 25 establish that number one, the burden of persuading 26 the Copyright Office that a certain class of work PAGE 137 1 should be exempt from the prohibition in Section 2 1201(a)(1) is on those who seek to establish an 3 exemption, not on the proponents of the prohibition. 4 And, then number two, these resources 5 also establish that the burden of persuasion is 6 extremely, extremely high and based on what we have 7 seen the proponents of an exemption have not met 8 this burden at all. Those who seek to establish an 9 exemption must prove that the prohibition has a 10 substantial adverse effect on non-infringing use and 11 those words, each of them, have a very significant 12 meaning. In this regard mere inconvenience or 13 individual cases are insufficient evidence. 14 Proponents of an exemption rather must come forth 15 with evidence that establishes distinct, verifiable 16 and measurable impacts. None of the proponents 17 provide this evidence. 18 Those who seek to establish an exemption 19 must also establish a causal connection between 20 alleged substantial adverse effects and the 21 prohibition in Section 1201(a)(1). If the adverse 22 effects are caused by factors other than Section 23 1201(a)(1), then the Copyright Office should 24 disregard such effects and I think this mandate is 25 especially important given that the prohibition in 26 Section 1201(a)(1) has not yet come into effect. We PAGE 138 1 fail to see how any of the alleged existing adverse 2 impacts complained of in the comments can be caused 3 by a provision that has not come into effect yet. 4 In fact, because the prohibition is yet 5 to become effective, to the extent that any alleged 6 existing adverse impacts complained of in the 7 comments are bona fide, I'm not saying they are, but 8 to the extent that they are, they must have been 9 caused by some factor other than the prohibition 10 itself, because the prohibition is not in effect. 11 It is SIIA's view that none of the 12 comments submitted to the Copyright Office comes 13 even remotely close to meeting the high burden 14 established by the law. The comments fail to 15 provide distinct, verifiable and measurable impacts 16 and none of the comments establish a causal 17 connection between the supposed adverse impacts and 18 the prohibition. 19 My second general comment deals with, I 20 guess as the Library Association has suggested, the 21 right of fair access. We consider this to be 22 somewhat a twisted view of the fair use exception, 23 one that is sweeping enough to allow hackers to 24 circumvent access control technologies in order to 25 make fair use of protected copyrighted content. 26 Now, in thinking about what my comments PAGE 139 1 were going to be here today, I did consider 2 characterizing the views of these commentators as 3 perhaps overly broad, but I thought that that might 4 actually suggest that this narrow interpretation has 5 some basis in law and fact. I want to be absolutely 6 clear, it does not. In fact, Congress clearly 7 considered these issues and rejected the Library 8 Association's interpretation on its face. Fair use 9 is an affirmative defense. As such it is a 10 privilege, not a right. The fair use privilege has 11 never been used to allow a party to get access to 12 copyrighted work where the party does not otherwise 13 have the authority to access that work. 14 In fact, because the fair use privilege 15 is an equitable defense to infringement, case law 16 has shown that no fair use defense may be had where 17 access to the copyrighted work has been gained 18 illegally. SIIA supports the Fair Use Doctrine. We 19 recognize the important societal good, as well as 20 the public and private benefit that results from the 21 doctrine. Now, while SIIA supports the Fair Use 22 Doctrine, we cannot support the twisted 23 interpretation supported by the libraries and the 24 other commentators. 25 My third and final general comment 26 relates to the general lack of understanding of the PAGE 140 1 scope of the rule making and the prohibition itself. 2 In particular, several commentators failed to 3 distinguish between the protections afforded by 4 Section 1201(b) and 1201(a)(2), which are not 5 subject to this rule making and those in Section 6 1201(a)(1) which are. Several commentators also 7 incorrectly believe that Section 1201(a)(1) covered 8 public domain and other non-copyrightable materials 9 when, in fact, it does not. 10 And, finally, several commentators 11 failed to consider the existing exemptions in 12 Section 1201, such as those that exist for security 13 testing and for reverse engineering. Given the 14 limited time today, I will merely direct you to our 15 formal written comments submitted by SIIA for a 16 detailed explanation of why these arguments are 17 either incorrect or immaterial to this rule making. 18 With that let me move on to my specific 19 comments. The first one I would like to deal with 20 is the American Association of Universities and to a 21 lesser extent the Library Association's 22 recommendation that an exemption for so-called thin 23 copyrighted works and fair use works be created. 24 There are several problems with this so-called 25 classes of works, I guess if you can call them that. 26 First, these so-called classes are PAGE 141 1 extremely broad and indefinite. As a result they do 2 not comply with the congressional mandate that the 3 class of works be a sub-set of the categories of 4 works in Section 102 and be narrow and focused. So, 5 it fails on two accounts. 6 Second, the AAU provides no means to 7 distinguish between works that qualify as thin 8 copyrighted works or fair use works and works that 9 do not qualify. In fact, as Mr. Mohr mentioned, 10 they even have an et cetera thrown in there in case 11 they may have forgotten to throw anything in there. 12 The AAU also failed to provide even a 13 single example of how its members would be adversely 14 effected in their ability to make non-infringing 15 uses of these works. Presumably, if the works are 16 causing a substantial adverse effect, they should be 17 able to come up with at least one example, but 18 nevertheless the comments, as far as I can see, 19 don't have one example in them. 20 And, finally, with regard to this 21 categorization of thin copyrighted works and fair 22 use works, I should mention that adoption of a thin 23 copyrighted work exemption or a fair use work 24 exemption would clearly adversely effect the 25 availability of these works. Because databases and 26 other fact intensive works are accorded a lesser PAGE 142 1 level of protection by the courts as compared to 2 other types of copyrighted works, the owners of 3 these works are more reliant on technological 4 protections to protect against illegal uses of these 5 works. As the result, exempting so-called thin 6 copyrighted works from Section 1201(a)(1) would 7 lessen the incentive for owners of these works to 8 distribute them to the public. 9 The second set of specific comments I 10 would like to discuss is related to concurrent 11 access. The Library Association suggests an 12 exemption is appropriate to ensure that their users 13 are able to concurrently access the works they 14 license. To the extent that there is any adverse 15 impact resulting from a work being protected by 16 technology that controls the number of concurrent 17 users, this impact is insignificant and more than 18 offset by the numerous benefits libraries and their 19 users have gained from having greater access and 20 less expensive access to these works. 21 While technological measures may impose 22 certain limitations on concurrent access, these 23 limitations pale in comparison to those libraries 24 and their users have been and are currently subject 25 to with regard to non-electronic copies of works. 26 In particular, the suggestion that there should be PAGE 143 1 an exemption for concurrent access is of great, 2 great concern to SIIA's software and information 3 company members. Many of these companies routinely 4 license their copyrighted products to consumers in a 5 way that limit the number of concurrent users. 6 Consumers enjoy this licensing option 7 and find it beneficial to their business model. If 8 people were permitted to circumvent the technologies 9 that allow such limitations on concurrent access, 10 the concurrent access licensing system would quickly 11 become ineffective and obsolete. In its place 12 software and information companies would be forced 13 to use other licensing alternatives, perhaps to the 14 detriment of consumers of these products. 15 The third set of specific comments I 16 would like to discuss relate to preservation and 17 archiving. Some comments suggested an exemption be 18 created for preservation and archiving when a user 19 has initial lawful access to a work. This 20 recommendation is based on a perceived concern that 21 access control technology will prevent libraries 22 from archiving or preserving works protected by such 23 measures. If an entity has initial lawful access to 24 a work and desires to make a copy of it for 25 preservation or archival purposes, to the extent it 26 is prevented from making such a copy, it will be a PAGE 144 1 result of a copy control technology protected under 2 Section 1201(b), not access control technology 3 protected under 1201(a). 4 Thus, the preservation and archival 5 issue is actually one that falls outside the scope 6 of this rule making. If, however, the Copyright 7 Office should conclude that the preservation and 8 archiving issue falls within the scope of this rule 9 making, we assert that the commentators have failed 10 to provide the requisite evidence to establish that 11 an archival and preservation exemption to Section 12 1201(a)(1) is necessary. 13 In this regard we point out that one of 14 the focuses of this rule making is whether copyright 15 content is available to persons who desire to make 16 non-infringing uses of such content. Accordingly, 17 if copies of a work are available for non-infringing 18 uses through a license, then there would be no 19 reason whatsoever to create a statutory exemption to 20 Section 1201(a)(1). Because none of the 21 commentators have demonstrated an inability to 22 license the materials and, in fact, the commentators 23 say the opposite, they are able to license the 24 materials, we find no justification for a so-called 25 preservation or archival exemption. 26 My final set of specific comments relate PAGE 145 1 to hardware locks. Several commentators recommended 2 that exemptions be created to address situations 3 where a company goes out of business and there is no 4 one to support the authorized customer when a 5 hardware lock is damaged, it is lost or is stolen. 6 The first point I should make in response to these 7 comments, and I cannot make this emphatically 8 enough, is that it is extremely rare, I mean 9 extremely rare for someone to lose a hardware lock. 10 The reason for this is because the locks and the 11 software that it protects are just too darn 12 expensive and too valuable. Therefore, people who 13 own these locks and software products take the 14 utmost care in protecting the software and the locks 15 against theft, against loss and against damage. 16 In the unlikely situation where a 17 hardware lock is damaged, lost or stolen, there are 18 real life solutions to these problems that are 19 easily implemented without the need to establish an 20 exemption. The best of these solutions is for the 21 consumer to protect his or her investment in the 22 software by taking out an insurance policy. The 23 software that is protected by the hardware locks is 24 not inexpensive. Contrary to Mr. Montoro's comments 25 and with apologies to my colleagues in the recording 26 industry, this software is not a scratch record. It PAGE 146 1 is a lot more expensive than a scratch record. It 2 is a lot more valuable than a scratch record. A 3 single program can cost as much as $22,000.00 or 4 even more. It is, therefore, extremely reasonable 5 for any business or university to protect its 6 investment in such valuable items, just as it does 7 with other property that has similar significant 8 value. 9 In addition, there are numerous third 10 party companies that offer to escrow software and 11 hardware locks, in confidence. As Mr. Montoro 12 mentioned, this is not required. But if companies 13 are really concerned about these products being lost 14 or stolen or destroyed, then this is something they 15 should negotiate, in their license agreement. 16 Another option is to get the copyright 17 owner or manager of the access control technology to 18 fix the damaged technologies. In talking to our 19 members, in virtually all cases, if we're talking 20 about damaged technology and I think Mr. Montoro 21 from his comments does not dispute this, if we're 22 talking about damaged technology, then they will in 23 fact, in most cases, fix that technology. In the 24 rare instance that a fix is necessary, this is often 25 the solution that software companies and their 26 customers come to. PAGE 147 1 Now, where the copyright owner is out of 2 business, I guess I thought the question is to, well 3 then who has standing in this 1201(a)(1) to begin 4 with? So, I just throw that out for consideration. 5 And, just touching upon very quickly 6 some of Mr. Montoro's other comments, he mentioned 7 things about printer problems with printer 8 complaints and other interoperability problems. I'm 9 not exactly sure what this has to do with defining a 10 class of works or trying to create an exemption 11 under 1201(a)(1). Another thing I think is worth 12 mentioning is that regardless of Section 1201(a)(1), 13 these companies will continue to use dongles, so 14 they will continue to have these problems if in fact 15 these problems are accurately reflected and I have 16 significant doubts that they are, of course. 17 And, then also, something also worth 18 mentioning how it is explicitly considered whether 19 to make any of the rights or the exceptions 20 technology specific. And, they said no, that's not 21 a wise way to go. Congress decided to not make any 22 of these an exemption or a right specific to a 23 certain type of technology, realizing that 24 technology is going to change over time. 25 So, anyway, that's the extent of my 26 comments. I would like to again thank the Copyright PAGE 148 1 Office and the panel for giving me the opportunity 2 to testify here today. And, I will be pleased to 3 answer any questions the panel might have, either 4 here today or following this hearing, in writing 5 later. Thank you very much. 6 MR. CARSON: Thank you. And, once 7 again, thanks to everybody. We'll now move on to 8 questions and we'll start with Rachel Goslins. 9 MS. GOSLINS: Hi. For those of you that 10 were here this morning my questions are going to 11 follow a similar path and start at the practical end 12 and move to the esoteric. But, actually to begin I 13 would just like to ask a fairly simple question, 14 just for my own personal edification while anybody 15 on the panel can answer them. I'm particularly 16 interested in the answers with the software experts 17 here. 18 And, that is, how easy is it to 19 circumvent these kinds of access control protections 20 that you're talking about? Mr. Mirchin, you 21 detailed technologies that I'm not anywhere near 22 understanding, but they seem to be pretty 23 sophisticated authentication systems. And, what I 24 would need to circumvent that? And, what kind of 25 time and resources will I need, just a computer 26 program and I guess that goes for you as well, Mr. PAGE 149 1 Montoro, with the famous dongle, sort of what does 2 it take to get around them? 3 MR. MIRCHIN: The authorization code, we 4 don't know of any examples where people are 5 circumventing it, which doesn't mean that they're 6 not. Our technology people tell me that that's 7 pretty secure. Using a password I would say is sort 8 of the other end of the spectrum in that typically 9 it's administered by the institution itself. Our 10 view is that it's in the institution's interest, 11 because they have limitations on server capacity, to 12 typically limit it to people who are actually 13 somehow related to the institution. So, we're 14 really relying on them. You know, that really is 15 something that is much easier to circumvent. 16 MS. GOSLINS: And, how do you decide 17 when you use one or when you use the other? 18 MR. MIRCHIN: Oh, we actually use both 19 in every instance. The using of a password is a way 20 if people are not coming from 21 universityofmaryland.edu. It allows those people 22 who are not local to be able to access the database. 23 If you're coming from the institution, you don't 24 need to use a password. So, it's another way of 25 access in, really, rather than preventing anyone 26 from getting access. PAGE 150 1 MR. MONTORO: I can only speak as to the 2 dongle incident. There is a couple of ways to do 3 that and one way to circumvent the dongle is to 4 modify the actual application itself, where you 5 would go in and when the dongle or when the program 6 goes to look for the lock device, you would modify 7 the program portion of that so it no longer looks 8 for the lock device. That's certainly is, 9 obviously, illegal to do, because you're violating 10 the owner's copyright when you enter that program. 11 The other way is a different way. It's 12 what we've been able to do by no circumventing, but 13 replacing. And, the way I do that is my writing 14 software that actually knows the contents of what's 15 inside one of these devices. It responds in the 16 appropriate manner when the software program looks 17 for the actual device and instead it finds our 18 software and that's all we've been able to not 19 circumvent, but replace the technology. The 20 technology that I have also then relocks itself back 21 to the computer, which protects the copyright 22 holder. So, it can't be redistributed and you're 23 not going to see 500 copies of that same program 24 out. 25 MR. MIRCHIN: May I say one other thing 26 on using the password? We also monitor logs to see PAGE 151 1 some general usage from a particular community. So, 2 to the extent that we were getting a sense that that 3 -- that the user name and password was not 4 effectively controlling it to a particular 5 community, there are a lot of things that we could 6 do. For example, change the user name and password 7 and require that to be redistributed. So, there are 8 things that we could do if we felt that it was being 9 abused. 10 MS. GOSLINS: I guess what I'm trying to 11 get at is we're heard a lot about how adversely 12 effected the date base industry would be if we 13 crafted any kind of an exemption to the prohibition 14 access control that effected databases and one thing 15 I would like to talk about in a second is how that 16 would be different from the last six years of 17 experience that your company has had in using access 18 control protections, it seems pretty effectively. 19 Even were we to exempt all databases from the access 20 control protection, you're still better off then you 21 were before the passage of the DMCA because you have 22 the prohibition on the manufacturer and marketing 23 design of devices and it sounds like, from what 24 you're talking about, that when you have 25 sophisticated access control protections, you're 26 going to need some kind of software, some kind of PAGE 152 1 device to circumvent -- anyway, so I guess what I 2 would like to hear you talk a little bit about is 3 how much value added the conduct prohibition really 4 gives you if a librarian is not really going to be 5 able to get around your user ID authentication 6 servicer. 7 MR. MIRCHIN: I guess a couple of things 8 come to mind. One is I would say that probably 9 applies not just to us, but applies actually to 10 every copyright owner. Congress decided that if a 11 copyright owner decided that they wanted to use 12 access control technology, then they should be 13 allowed to do it and that it should generally be 14 prohibited to circumvent it. So our situation is 15 actually no different than anyone else's. And, I 16 would say though, my sense is in terms of how it 17 would be interpreted, which is when you start 18 getting carved out, when everybody gets protected 19 except you, I have to believe that the way the 20 courts might interpret it would be, in a way to be 21 detrimental to database owners or my sense is that 22 the court could very well find ways to carve out and 23 say, well, it's clear that the Copyright Office in 24 this rule making felt that you were entitled to a 25 lower level of protection. So, I am a little 26 worried about what would happen. PAGE 153 1 MR. MOHR: I'd like to add to that a 2 little bit. I mean, I think also there is a 3 practical concern and that what has changed in the 4 last several years is the ability of competitors. 5 If a database compiler invests a lot of money 6 verifying information and being sure it's accurate, 7 if someone can get in -- if someone can get access 8 to that, the remedies for using the material that 9 was invested in are very, very scant. And, that is 10 certainly a concern of the companies that I 11 represent. 12 MS. GOSLINS: Ah hah. That brings me to 13 my next more esoteric question. Many of you and 14 your member countries or the entities that you 15 represent have been active in the progression of the 16 database bills before Congress. And, as I'm sure 17 you're all aware there is no bill yet. So, my 18 concern or a concern that has been raised in a 19 number of the comments, is it by prohibiting 20 circumvention of access controls on largely 21 factually based databases, which have a sort of 22 thin, I know, I apologize for using the word, I know 23 it's touchy, selection and arrangement copyright. 24 We are, in fact, creating de facto database 25 protection. This is not going to be true for a lot 26 of databases that have copyrightable content in PAGE 154 1 them, but I believe as, I think it was you, Keith, 2 talked about databases that are not as protected in 3 the courts, precisely because of this issue and then 4 have to rely more severely, more strongly on 5 technological protections. 6 I'm not saying that someone who puts a 7 tremendous amount of effort in selecting and 8 arranging factual or public domain material is not 9 entitled to a return on his or her investment or to 10 some kind of protection under the law. My concern 11 is that the pretext of protecting the copyright and 12 that's the appropriate vehicle to do that. 13 Congressional intent is always a bit obscure. It's 14 hard to know what Congress intended in any case and 15 especially sometimes in the context of 1201, but I'm 16 pretty sure that they didn't intend to circumvent 17 the process of the database bill. So, I would be 18 just interested in hearing your responses to that. 19 MR. KUPFERSCHMID: Let me -- first I 20 think my colleagues here also to respond, but let me 21 first also actually -- I didn't get a chance to 22 respond to your previous question, which is that, 23 you know, we're dealing with big new technology like 24 the Internet and so distribution mechanisms and 25 business models are going to be changing over time, 26 along with technology. So, while we have, our PAGE 155 1 companies have certainly used these technologies in 2 the past, perhaps they have not used them as they do 3 today and certainly not as they're going to use them 4 in the future. You know, big things certainly now 5 days in the software industries if you go on to find 6 these warez web sites and they will tell you exactly 7 how to crack -- how to get behind some technology or 8 crack some code or something like that. So, that's 9 exactly why we need 1201(a)(1) for that type of 10 thing, where maybe someone is not providing a device 11 or a service. 12 To get to the second part or the next 13 question or the question that is actually on the 14 floor right now, is, if I understand your question 15 correctly, I think if you look toward what the 16 Congress's intent was, Congress's intent is -- 17 especially when it comes to the exemptions and 18 exceptions, you see right there on the papers what 19 they thought the reasonable exceptions or the 20 appropriate exceptions that are put in, such as 21 reverse engineering and security testing and things 22 like that and the fact that, you know, this was 23 never discussed or proposed that there be sort of -- 24 I guess, certain works such as, I could say so- 25 called thin copyrighted works or fair use works, be 26 exempted at that time and if it was, I'm sure it PAGE 156 1 would have been shot down for the fact that how do 2 you -- as I mentioned in my comments and I think 3 others mentioned in their comments, well, how do you 4 define those works? I mean, I have no idea how to 5 define those works. I read the comments; I still 6 have no clue how to define those works. 7 And, as I mentioned earlier, the burden 8 of proof is on the proponents of an exemption to 9 define how these works, you know, what these classes 10 of works are. So, I'm still sort of waiting to hear 11 from them as to what exactly -- what works we're 12 talking -- we're actually talking about. 13 I think -- I hope that sort of gets to 14 your question -- the answer to your question. 15 MR. CARSON: Would you be more 16 comfortable if we just exempted databases? It's easy 17 to define. 18 MR. KUPFERSCHMID: No. But, then as I 19 think David mentioned in a previous question, what 20 you do is you're creating this negative implication, 21 certainly, that databases are not, you know, worthy 22 of copyright protection, not worthy of the 23 protection the other words are afforded. What's 24 next, are you going to limit the term of protection 25 for databases to five years perhaps? I don't want 26 to give you any ideas, but, I mean, what path do we PAGE 157 1 go in 20 years? 2 MS. GOSLINS: Do you -- 3 MR. MOHR: Yes, I would like to add a 4 couple of things. I mean, part of the concern is 5 really that 1201(a)(1) only applies if there is an 6 access control and there are people who still, for 7 example, put out printed compilations. That 8 increases improvements in scanning technology, for 9 example. It's very easy to scan that in and put it 10 on a CD ROM. I mean one of the, you know, best 11 known cases in this area arose from someone simply 12 keying a compilation, extracting the facts and 13 keying the compilation into a computer and then 14 selling it on CD ROM. 15 Secondly, it does not, in that same 16 vein, it does not protect people who adopt a 17 broadcast model and sell advertising on a web site. 18 That has nothing to do with 1201(a)(1). 19 MR. MIRCHIN: And, I would just add that 20 I actually don't think that it would expand or 21 contract the amount of protection that databases 22 would have. The same standard that's been applied 23 to this string of database cases would apply here, 24 which is is it a copyrightable work? If it is, you 25 can have access control technology which can't be 26 circumvented. Is it not copyrightable, not part of PAGE 158 1 1201 and, therefore, it's not illegal to circumvent? 2 So, I think actually I don't see that as -- 3 MS. GOSLINS: That brings up an 4 interesting question that we've talked about. How 5 should we think about a user who circumvents access 6 control protections to a database sole to get access 7 to a public domain work? How do we think about 8 that? Is that not to get access to selection and 9 arrangement, but just wants the text of Feist? 10 MR. MONTORO: They're not a lawful user, 11 correct? 12 MS. GOSLINS: What? 13 MR. MONTORO: They are not a lawful 14 user? 15 MS. GOSLINS: What do you mean by lawful 16 user? 17 MR. MONTORO: They're gaining access 18 improperly, not -- 19 MS. GOSLINS: They're circumventing 20 access control protections to a primarily factual 21 database, but that has a layer of copyright 22 protection, but just to get access to the text of 23 the public domain document. 24 MR. KUPFERSCHMID: I guess, and I'll let 25 Chris take over in a second, from a technology 26 standpoint, I don't know how this is done. I mean, PAGE 159 1 if you're accessing the database you're accessing 2 the database. And, especially if you don't have 3 access in it, how do you determine beforehand what 4 is the government information and what isn't? 5 MS. GOSLINS: Well, in the case of a 6 legal database you could tell what is -- you know, 7 what are the head notes and what are the actual text 8 of the case. 9 MR. KUPFERSCHMID: And, I guess what I'm 10 saying is I -- just knowing how our members at least 11 or many of our members distribute their content or 12 databases, I just don't know how you would make that 13 division, how you would draw that line between -- I 14 mean, I understand how you can see what is the 15 government information and what is not, but when 16 you're talking about the access control measures, 17 how do you circumvent and not get to the protected 18 coordination, selection and arrangement? Because 19 you are circumventing to get to that. They're 20 intertwined. You can't separate one from the other. 21 MR. MOHR: And, I would also -- I mean, 22 I'd also like to add to add to this. I mean, that 23 this information -- I mean, the sort of common sense 24 answer that comes, is why does this person need 25 FEIST from us when it's, you know, readily available 26 through a host of other sources? PAGE 160 1 MS. GOSLINS: Maybe that was a bad 2 example. We heard one of the librarians this 3 morning talk about tax decision, I guess, that are 4 not available online, that are not available 5 anywhere else, even though they are public domain 6 documents, other than through a research database 7 that the library had access to. 8 MR. MOHR: Well, if it's, I mean, if 9 it's government information I don't know exactly -- 10 I mean I'm not a tax lawyer. I don't know how one 11 goes about finding such things, but I do know that 12 there are obligations on the government to disclose 13 certain things and to make certain things available. 14 If a private service aggregates that material has 15 value to it and makes it more convenient to users to 16 get it, I would think that conditions under which 17 those materials are made available are a licensing 18 issue between the library and the publishing company 19 and have nothing whatsoever to do with 1201(a). 20 MR. MIRCHIN: I would say also there is 21 a real practical economic impact. I mean, some of 22 our largest databases are arguably government domain 23 databases, Medline put out by the National Library 24 of Medicine. The reason I say arguably is, the 25 question is, are those abstracts that are written in 26 that database by the publishers or individual PAGE 161 1 authors? It is not clear to me if that is public 2 domain or not, but let's take other examples by the 3 Government Printing Office. 4 But, if you allowed databases that 5 contain government information, public domain 6 information, to be circumvented, then really you're 7 saying that companies can't have any pricing model 8 at all based on usage. So, for our situation we 9 would be in a situation where we can't say, okay, 10 you, University of Michigan, a large user, you might 11 want to have unlimited use and you, small Western 12 University might want to just have a single 13 simultaneous user. If we can't have different 14 pricing, then we're going to have to do something in 15 the middle, essentially. So, the result is not 16 going to be beneficial to users. I see that's not 17 very convincing to you. 18 MS. GOSLINS: I think it's a great 19 argument for database protection. I'm just not sure 20 it's a great argument for using a few copyrightable 21 elements of a factual database that's concerned 22 primarily with public domain information, to 23 consider that a work protected under this title, the 24 title being the act. Then again, nobody is saying 25 you can't use your own -- do whatever pricing law 26 you want and employ vigorous access control PAGE 162 1 protections that nobody -- that it wouldn't be in 2 anybody's time or interest to break. It would be 3 more cost effective to pay your licensing fees. 4 And, we're talking about a very narrow value added 5 here to the arsenal that you already have as a 6 database producer of protecting your investment. 7 MR. MIRCHIN: Then you're saying that 8 the selection coordination and arrangement that 9 compilation copyright is the class of works that's 10 not protected. I mean, that's sort of what you're 11 saying. And, that really -- to me flies -- you 12 know, Congress could have said, compilation 13 copyrights are the class, is one of those 14 exemptions. They didn't do that. 15 MR. CARSON: We could say that. 16 MS. GOSLINS: Sorry. Christopher, 17 comment? 18 MR. MOHR: Yes. I just wanted to add 19 one more point. I mean, again, I come back to the 20 burden of proof. I mean, there is no evidence that 21 this is necessary. I mean the -- you've heard 22 testimony today that it's, you know, basically about 23 inconvenience. And, that, as the legislative 24 history stated, does not warrant the issuance of an 25 exemption, now at least in our view. 26 MS. GOSLINS: I see we're losing a lot PAGE 163 1 of audience members, so I'm going to turn over the 2 mic so it will be more entertaining. 3 MR. KASUNIC: Okay. Following up on some 4 of those same comments then, in fear of losing more 5 audience... If something is protected, you're 6 talking about there being no showing, for Chris, of 7 there being any adverse effect. But, something 8 that's clearly in the public domain, when we're 9 taking about factual material, it's not something 10 that -- you don't have to make a showing of an 11 adverse effect for something that's not protected 12 under Title 17. That's not something that is 13 covered by 1201(a)(1). When the factual materials 14 itself is not necessarily something that falls 15 within the scope of 1201(a)(1), which only protects 16 works that are protected within Title 17. So, who 17 should really -- when we talk about burdens, who 18 should bear the risk of this technology now that's 19 currently in place? Some of this technology is not 20 really discriminating between the copyrightable 21 elements of these databases or compilation which 22 would be the selection and arrangement, or I believe 23 you said that for SilverPlatter, that the 24 protectible elements and there is the search engine 25 within the database. That would be something that 26 is copyrightable and would be protected under the PAGE 164 1 scope of 1201(a)(1), but some of these masses of 2 facts are just not within the scope of copyrightable 3 material that would be protected. So, if the 4 technology that is currently in existence and this 5 is within the current period, right now, we're 6 talking about what adverse effects are going to be 7 in the future. But we're also looking forward to 8 what some of the changes in technology are going to 9 be. The technology could become more discriminating 10 at some period of time and be applied to only the 11 copyrightable elements as opposed to both the 12 copyrightable and the non-copyrightable elements. 13 Who should bear the burden of this current state of 14 non-discriminating technology? Should it be the 15 public that are the ones who should not be able to 16 gain access to these public domain elements at this 17 point, because the technology right now is not 18 discriminating and is just broadly protecting both 19 copyrightable and uncopyrightable elements? 20 MR. KUPFERSCHMID: Let me take a stab at 21 that one. I think it is very, very clear that, 22 based on the statute, the legislative history we 23 have, that the burden is on, should be on, 24 proponents of an exemption. I'm a little concerned 25 that the fact that the creativity in the selection, 26 arrangement, coordination of databases is being PAGE 165 1 somewhat discounted here. Where there is sufficient 2 creativity to warrant copyright protection in the 3 selection, arrangement, coordination of a database, 4 I mean, why is that creativity any less worthy of 5 any less protection than any other creative work 6 just because it happens to include public domain 7 material? 8 If the selection, arrangement, 9 coordination is not worthy of copyright protection, 10 is not sufficiently creative, well, then it's not 11 covered by 1201(a)(1). Now, maybe we'll have a 12 database bill and the investment, rather than the 13 creativity will be protected, but I just -- I'm 14 concerned also that we're kind of skipping over the 15 fact, which is ignoring the fact that -- about the 16 creativity that is involved in the selection, 17 coordination, arrangement and there is, I know, just 18 from talking to our member companies, how much 19 effort they put in and creativity is involved in 20 these databases. And, I would really -- and that 21 worries me if we just sort of skip over that and 22 talk about the material that's in the databases. 23 It's copyrightable, maybe owned by somebody else, or 24 maybe it's public domain information or maybe it's 25 government information. 26 So, I think the burden of proof does not PAGE 166 1 change here. It remains on the proponents of an 2 exemption. 3 MR. MIRCHIN: And, I don't -- I haven't 4 seen in the record any need for it. I mean, I 5 haven't seen people saying they can't get access, 6 information isn't available, they can't get to 7 Medline. In fact, a lot of the products that are 8 done in the private sector are also done, often for 9 free, in the public sector and actually an example 10 is Medline, put out by the National Library of 11 Medicine. You can go to Pubmed and yet a lot of the 12 private providers, like SilverPlatter, still license 13 a lot of it and the reason is because we provide 14 some other benefits. 15 The other benefits might be that you can 16 search across a whole range of databases, so in 17 other words, I think there really needs to be some 18 showing that people are not being able to get at 19 this material, that there is a real problem that 20 needs to be addressed. 21 MR. KASUNIC: There was a lot of 22 discussion about what is not a class of works and I 23 heard a lot of specifics about what things that were 24 claimed to be classes of works and how they didn't 25 fit in. Can you offer any assistance in what 26 criteria we would use to figure out what is a class PAGE 167 1 of works? 2 MR. KUPFERSCHMID: I think I'll leave 3 that up to those who want an exemption. I mean, I 4 really -- I don't. I don't think an exemption is 5 appropriate and I honestly don't have any helpful 6 hints to help these proponents of the exemption out. 7 MR. KASUNIC: If we decide that 8 databases is a class of works that fits in there, 9 then would the exemption be something that should be 10 related to a particular use of that database, or 11 should we just exempt all databases per se. 12 MR. KUPFERSCHMID: I'm not sure I follow 13 your question, but certainly if you're talking about 14 exempting all databases per se, I would have a 15 problem with that. I think you certainly have the 16 definitional problems with databases, or at least as 17 some would have you think that we have definitional 18 problems defining a database, so, I don't think you 19 resolve any issues by just saying okay, databases 20 are not, you know, aren't -- don't warrant the 21 protection here and as I mentioned before, I think 22 we're going down a really bad path here by creating 23 some negative implication and if we start off with 24 databases, well what category of works might be 25 next? You know, in that vein I should add that 26 databases is sort of a -- is not really a very PAGE 168 1 narrow sub-set as required by the Congressional 2 mandate, as a sub-set of a class of works. 3 MR. MIRCHIN: Yes, I would just say, 4 again, as a practical matter, you're talking about a 5 lot of organizations that put a huge amount of time 6 selecting, you know, these are the economics 7 journals we're going to include; these are the ones 8 we're not; these are the proceedings we're going to 9 include from various economic conferences; these are 10 the ones that are not, as an example. And, saying 11 that that selection and arrangement is entitled to 12 no copyright protection would sort of write that out 13 of the copyright law. 14 You know, there is nothing here that 15 says that that's entitled to less copyright 16 protection. 17 MR. CARSON: And, yet you have a 18 database let's say of -- well, let's take one that 19 I'm more familiar with and that's easy for most 20 people in this room to relate to I suppose, because 21 you have a database of judicial opinions. You may 22 have engaged in a great deal of selectivity and 23 creativity in determining which judicial opinions to 24 put in that database. If I have access to that 25 database and I decide I am going to reproduce one of 26 those judicial opinions in whole and in fact I'm PAGE 169 1 going to distribute that opinion to everyone I know, 2 you wouldn't have a leg to stand on in a copyright 3 infringement suit, would you? Your copyright 4 doesn't protect that. Your copyright protects the 5 overall selection, coordination and arrangement, not 6 the individual work within that database. 7 MR. MIRCHIN: I think in the 8th Circuit 8 it's still okay. 9 MR. KUPFERSCHMID: But, I mean, we're 10 still talking about access here and what you're 11 talking about is reproduction and distributing, 12 which is something entirely different. 13 MR. CARSON: Granted. 0 14 sometimes how we do it. But, I think maybe I'm 15 hearing an overstatement in terms of what the 16 copyright is protecting and that's what I'm trying 17 to get at right here. 18 MR. MIRCHIN: I mean, it's clear we're 19 taking about the access, distinguishing between the 20 access and the further use down -- 21 MR. CARSON: No question. No question. 22 MR. MIRCHIN: Okay. Okay. 23 MR. KASUNIC: Well, I think we're going 24 full circle back to some of the original questions 25 that were asked. So, if we understand that there is 26 copyright protection -- and not demeaning that PAGE 170 1 protection in anyway by saying that databases or 2 compilations of any sort are not deserving of that 3 creativity. While I don't know about using the term 4 ``effort'', which is something that we've been told is 5 not a consideration in this, but rather whether 6 there is originality in compilations or in the 7 creation of these works. But that copyright is 8 limited. Whether we like it or not, it's a thin 9 copyright that is involved here. And should these 10 technological access control measures be allowed to 11 lock up these entire works, including things that 12 maybe should be accessible to the public. There is 13 a claim that the public has a right to access, at 14 least -- not the creative original parts that is 15 entitled to copyright protection -- but some of the 16 other elements that are part of the public domain. 17 MR. KUPFERSCHMID: But, once again, I 18 don't know how you separate the creativity selection 19 and arrangement, which protectable by copyright and 20 if it's not we're talking about some other issue. 21 But, I don't see how you separate that and the 22 particular work. I mean, if you're talking about 23 accessing one work of many works, then you're 24 talking about a different situation, because the 25 access control technologies that we're talking about 26 generally they would cover the entire database, not PAGE 171 1 a particular work, because then you're talking about 2 a different issue. 3 I mean, if you're talking about an act 4 to circumvent an access control technology that 5 covers, that protects only one particular work of 6 the database, then you're not talking about 7 protecting the database. 8 MR. KASUNIC: I'm talking about the one 9 particular work in the database, unless there could 10 be something that would obtain copyright protection 11 if you were talking about collective work, and you 12 have individually protected works within that. 13 MR. KUPFERSCHMID: Yes. 14 MR. KASUNIC: We're talking about a 15 compilation of facts in terms of a database. 16 MR. KUPFERSCHMID: And, you're trying -- 17 if I understand you correctly, you're talking about, 18 well, why shouldn't people be able to get at that 19 one fact, right? 20 MR. KASUNIC: At the factual material, 21 as opposed to any particular selection or 22 arrangement. If you have a database that has a 23 search -- the search engine would be the tool that 24 would select and arrange the data within a database. 25 Isn't that -- 26 MR. KUPFERSCHMID: If you're talking PAGE 172 1 about circumventing an access control, technological 2 measure that's protecting a database, in order to 3 get at the underlying facts, I don't see how you 4 circumvent that technology without also accessing 5 the selection, arrangement and coordination of that 6 database. That's what I'm saying, they're two -- 7 they're intermingled. And, that's talking about 8 access control technology protecting a particular 9 fact and that's outside the range of what we're 10 talking about here. 11 We're talking about when a user protects 12 a database. By circumventing that you're -- not 13 only are you -- well, I mean, you're getting out the 14 underlying factual information that's incorporated 15 into the database, but you're also getting at the 16 selection, coordination and arrangement of the 17 database. They're intertwined. 18 MS. DOUGLASS: Does it have to be? 19 MR. KUPFERSCHMID: I'm not a technology 20 expert, so I don't really know the answer to that 21 question, although -- I mean, that's what database 22 owners are concerned with, protecting their 23 database, so that's what they're going to protect. 24 MS. DOUGLASS: Can't you code it 25 separately? Can't you code separately the 26 uncopyrightable material and then hold the other PAGE 173 1 part differently? 2 MR. KUPFERSCHMID: Well, I mean for one 3 thing I think you're talking about -- that is 4 obviously on a case by case basis, depending on the 5 database you're talking about and secondly that's a 6 tremendous burden to put on -- to put on any 7 copyright owner, especially, certainly database 8 owners where you can have fields upon fields upon 9 fields of information and, you know, determining and 10 labeling exactly what may or may not be public 11 domain. I mean that's a unbelievable amount of 12 effort. 13 MR. KASUNIC: So, should the public bear 14 that burden now to try and make that determination, 15 which they can't make, because they can't access it 16 to begin with, so that this really becomes circular? 17 Who should bear that burden of making that decision 18 of only protecting the appropriate material which 19 would be the copyrightable material, at least to 20 gain protection under 1201(a)(1)? 21 MR. KUPFERSCHMID: Going back to my 22 original statement. The burden is on the proponents 23 of an exemption here. The law is what it is and 24 it's proponents of an exemption or an exception, 25 they're the ones that need to go forward and prove 26 their case and I haven't seen it yet. I mean, I PAGE 174 1 think that's why we're having some difficulty here, 2 because maybe if we had some facts from which to 3 work with, we could have more detailed conversation, 4 but we're sort of talking in theory. 5 MS. DOUGLASS: The law is what it is, 6 but a lot of people say on one side that the law 7 provides for fair use and on the other side people 8 say that you don't really need to talk about fair 9 use, you need to talk about negotiated use. 10 As a matter of fact, I believe I heard 11 you say that you really are not necessarily 12 referring to fair use as much as you are referring 13 to negotiated use or use that you have to have -- 14 that provides for a contract. 15 In other words, what I really want to 16 know is how does fair use figure in the 1201(a)(1) 17 calculation? Some people say that there is no such 18 thing as fair use unless you tried to make an 19 agreement and you failed to make an agreement. How 20 does fair use actually figure into 1201(a)(1)? Are 21 you always talking about first obtaining permission? 22 MR. KUPFERSCHMID: Fair use has nothing 23 to do with this inquiry at all on 1201(a)(1). It 24 really doesn't. We're talking about circumvention 25 of access control technologies. We're not talking 26 about copying, distributing, anything like that. PAGE 175 1 We're talking about access. To give you an example, 2 I have tons of stuff back in my office that a lot of 3 which is protected by copyright. That doesn't give 4 you any right to break down my door and access that 5 information under the guise of fair use. And, so 6 when we're talking about 1201(a)(1), fair use has 7 absolutely nothing to do with the consideration 8 here. 9 I mean, you'll see from the library 10 comments, they don't even call it fair use. They 11 call it a right of fair access, which sort of comes 12 out of nowhere. 13 MR. MOHR: I would also add to that that 14 this was something that was considered by Congress 15 and rejected. 16 MS. DOUGLASS: So, fair use is out the 17 window as far as access control is concerned. 18 MR. KUPFERSCHMID: I wouldn't say it's 19 out the window. It's never been in there to begin 20 with. 21 MS. DOUGLASS: It's not part of the 22 calculus at all. 23 MR. MONTORO: Well, I think it does make 24 a difference though after you have lawful access to 25 the program. After you have a lawful access then 26 fair use does come into play. PAGE 176 1 MR. KUPFERSCHMID: I would agree, but 2 then, of course, you're talking about a different 3 situation and one that is not within the scope of 4 the rule making. 5 MS. DOUGLASS: I have a hypothetical. 6 Suppose that you suspected someone had taken part of 7 your encrypted -- taken part of your copyrighted 8 material, one of our databases, and put it in some 9 encrypted material. Should you be able to 10 circumvent that technological measure to find out 11 whether or not your material was contained in that 12 encrypted material? Suppose you think -- 13 MR. MIRCHIN: So, what would be -- 14 MS. DOUGLASS: Suppose SIIA has a flashy 15 database and, not that SIIA publishes databases, you 16 know, members do, but anyway, suppose they did. 17 And, suppose you, SilverPlatter, thought that hey, 18 they've got Psyclit in that database, would you be 19 able to circumvent any access control SIIA had in 20 order to find out? Should you be able to, would you 21 be able to? 22 MR. MIRCHIN: We would never be 23 circumventing any access control. 24 MS. DOUGLASS: So, you shouldn't be able 25 to? 26 MR. MIRCHIN: Well, I guess I'm not sure PAGE 177 1 why that should be different. Yes, I guess it just 2 doesn't seem to me like that, the fact that they use 3 encryption should make it different that I should be 4 able to do that or not. 5 MS. DOUGLASS: Shouldn't be able to, 6 even if it's for what you might think would be a 7 legitimate purpose? 8 MR. MIRCHIN: Well, I mean, there is an 9 exception on the encryption research and all that. 10 MS. DOUGLASS: So, you would be 11 conducting encryption research to find out whether 12 they had a -- 13 MR. KUPFERSCHMID: I think what he's 14 trying to get at is is that there is -- I mean there 15 -- you basically you look to the law. You look to 16 the what the exceptions are. If you want to get at 17 the underlying database and it falls within one of 18 those exceptions, great, but I mean I don't think 19 the situation you state does. 20 MS. DOUGLASS: So, you wouldn't be able 21 to do it? 22 MR. KUPFERSCHMID: No. I mean, 23 according to my reading of the law, no. 24 MS. DOUGLASS: And, you shouldn't be 25 able to do that sort of thing? 26 MR. KUPFERSCHMID: There are other ways PAGE 178 1 to find out whether somebody is taking your 2 material. 3 MS. DOUGLASS: Okay. I just want to 4 have a -- I just have one final just general 5 question, just sort of a -- for my information. You 6 license your databases or do you sell them? 7 MR. MIRCHIN: We license them, largely. 8 I mean, there are actually some exceptions where 9 they actually are sold, but that's really rare. 10 MS. DOUGLASS: And, do you register them 11 for copyright protection? I don't want to put you 12 on the spot. Maybe you don't know. 13 MR. MIRCHIN: Well, we have a really 14 small legal department and we personally don't 15 register them. I actually believe probably the 16 database producers do. The problem of the dynamic 17 databases and registration is that some of them are 18 changing on a daily basis or more frequently than 19 that. And, there is always the question of, you 20 know, how are you going to register them. We 21 personally do not register the databases. We have 22 probably in excess of 2,000 updates a year in 23 various databases. So, we don't. 24 MS. DOUGLASS: I'm just trying to find 25 out whether you registered them as published works 26 or whether you considered them as published works, PAGE 179 1 whether you considered them as unpublished works, et 2 cetera, et cetera. 3 MR. MIRCHIN: I would say -- I mean, 4 SilverPlatter's interest in this, as well as, 5 obviously, database protection, you know, we're all 6 fellow travelers, is that -- the issue for us is 7 it's our supply. It's our life blood. I mean, if 8 there is not protection, if the database producers 9 cannot make a reasonable living, there simply is no, 10 you know, there would be -- there would be no supply 11 for us. So, that's -- that would be our interest in 12 that sort of thing. So, how they register in terms 13 of copyright, actually I don't know. 14 MS. DOUGLASS: I'm just trying to 15 generally get at the idea of whether these are 16 considered to be published works, are they 17 considered to be unpublished works? Are they then 18 -- do you have any -- as a published work are there 19 any things that sort of follow as far as use is 20 concerned, in terms of what should a purchaser be 21 able to do with the work once he purchases it? I 22 guess that's my point. 23 MR. MIRCHIN: I guess you know, that 24 really raises sort of a general issue which is, you 25 know, in -- also in terms of this rule making, that 26 there are a lot of things that are happening well PAGE 180 1 outside the access control technology, in terms of 2 the use that people make. I mean, often that's very 3 much a licensing question and a lot of these issues 4 actually come up very much in the licensing context, 5 rather then the access control context. 6 MR. CARSON: Chris or Keith, do you want 7 to add any views at whether in general databases 8 should be considered published or unpublished? 9 Obviously that depends on a case by case basis. I 10 mean I don't -- I never asked actually what our 11 members' practice is, but I'm sure it also -- for 12 them it's on a case by case basis. 13 MR. KUPFERSCHMID: No. 14 MR. MOHR: I mean, it seems that -- I 15 would echo that. 16 MS. DOUGLASS: So, you -- so, they might 17 be published, they might be unpublished. Is that 18 what you're saying? 19 MR. MOHR: Yes. Just like any other 20 work. 21 MR. CARSON: My memory is failing me, 22 but my notes, assisted by a vague recollection, tell 23 me that at least one of you made a point that you 24 can't define a class of works by reference to the 25 type of use someone is making of it. And, I'm 26 wondering if anyone would like to champion that PAGE 181 1 point of view and explain to me why you can't do 2 that? 3 MR. MOHR: I believe the point was class 4 of user. 5 MR. CARSON: All right. Let's do it 6 that way. 7 MR. MOHR: I mean, the problem with 8 doing it that way is basically that the way this 9 issue has been phrased is in terms of education, 10 library, other miscellaneous uses, that they use the 11 entire gambit of copyrighted works. It's basically 12 a way of writing the prohibition out of the statute, 13 in our view. 14 MR. KUPFERSCHMID: If I could just -- 15 I'm sorry, just stop for a second, just because this 16 was actually considered by Congress and rejected and 17 they went with the other approach, which is to 18 define class of works. So, they actually reviewed 19 the legislative history and the proposals -- this 20 was actually proposed and rejected and instead when 21 with the class of works option. So, that's, at 22 least from my understanding, was actually considered 23 at one point and decided that was not the way to go. 24 But, anyhow, I didn't mean to cut you off, Chris. 25 MR. CARSON: Is there anything in the 26 statutory language that forbids us from deciding, PAGE 182 1 all right, we're going to decide that one class of 2 works is databases when used in an academic library. 3 I'm just -- I'm making this up on the fly, so that 4 may not be a good example, but let's just say that 5 that's -- someone comes forward with evidence that 6 that's where there is a real problem. Why can't we 7 narrowly define a class in that respect? 8 MR. KUPFERSCHMID: I think that if 9 somebody and that's a big, big if, somebody were to 10 come up with that evidence, then we would certainly 11 have to determine if that evidence corresponded 12 with, number one, if there is a causal connection 13 between that evidence and the prohibition, if that 14 evidence was substantial and that that evidence did 15 correspond with the class of works, but once again 16 we're sort of talking about this all in theory 17 because you don't have any actual information to 18 deal with. But, I would be happy when they come 19 forward with the information to talk about it in 20 detail then. 21 MR. MIRCHIN: I know I just say again, 22 would sort of say, just wait a second. It says 23 class of works. Now, you're talking about class of 24 works, but in terms of the users that are -- and the 25 uses that are being made of it. And, I wouldn't 26 want to make your job anymore difficult. PAGE 183 1 MR. CARSON: All right. That's a 2 question that has been asked a number of times. 3 What on earth is a class of works in the context of 4 Section 1201(a)(1)? How do we determine what a 5 class of works is? 6 MR. KUPFERSCHMID: Right about now I'm 7 glad I don't work at the Copyright Office. 8 MR. CARSON: Would you take my resume? 9 MR. MOHR: I would just like to add one 10 more thing to that. I mean, another thing is that 11 on balance there has to be a balancing and the 12 benefit from these measures, you know, is outweighed 13 by the negative effects. I mean, again, that's a 14 burden that the proponents of an exception bear and 15 that is something, at least in our view, that has 16 not been shown. 17 MR. MIRCHIN: This isn't a test. You 18 don't fail by coming up with the empty slate here. 19 In other words, what I really mean is that it is not 20 incumbent on you to sort of, you know, I think it is 21 incumbent on people who want to propose an exemption 22 to propose some genuine exemption and see what the 23 evidence is behind it. And, then we can actually 24 address it, but I mean I guess I haven't seen the 25 evidence of people genuinely being harmed that they 26 can't get at the information because of it. PAGE 184 1 MR. CARSON: Mr. Montoro, I don't want 2 you to feel ignored. 3 MR. MONTORO: That's all right. 4 MR. CARSON: So, I'm going to ask Mr. 5 Kupferschmid some questions. I'm picking on you as 6 the punitive representative of the software 7 industry. 8 Let me first ask you whether SIIA has 9 any particular point of view with respect to whether 10 people should, as a general proposition, be able to 11 circumvent the protections that dongles provide with 12 respect to software? 13 MR. KUPFERSCHMID: In our written 14 comments and also I tried to address them a little 15 bit today, I mean, the answer to that is no, unless 16 of course, like I mentioned before, for some reason 17 it falls under -- within one of the exemptions. 18 And, I can actually cite an example and I think this 19 is backed up by Mr. Montoro's comments. He 20 discusses the fact that universities like to use the 21 AutoCAD programs and which cost a lot of money, but 22 the fact is that the dongles for these programs keep 23 in getting stolen. And, guess what, they're being 24 stolen by students and the software is also being 25 stolen. 26 I mean, that's exactly the type of thing PAGE 185 1 we're trying to prevent. And, if there is an 2 exemption for lost, damage or stolen dongles, then 3 universities aren't going to take any precautions at 4 all to make sure that their dongles aren't stolen. 5 But, if the burden falls on those who actually 6 purchase the software and the dongles, then they 7 will take out insurance to protect themselves and 8 maybe they'll lock up the dongles when there is no 9 one, you know, watching the computer, the security 10 guard or whatever they use. They're lock them, that 11 type of thing. So, it's best here, certainly, from 12 this standpoint to put the burden on those who 13 actually are purchasing the software to make sure 14 it's not stolen or lost. 15 MR. CARSON: Mr. Montoro, you're raising 16 your hand. I gather you would like to say 17 something. 18 MR. MONTORO: Thank you, Mr. Carson. 19 And, sorry, Rachel. 20 It's amusing and it's amusing, I guess, 21 because for those that are really in the situation, 22 educational facilities and to take a lock device, to 23 take it back whether you've got 30 computers, 24 perhaps, in a shop, is not a real practical 25 solution. What I suggested perhaps of having a 26 replacement technology made available is something PAGE 186 1 viable, of course. That could be used and that 2 could be used effectively. 3 I might agree with Keith, I'm not so 4 sure that what I have talked about with these 5 dongles is actually access control. But, I never 6 quite heard and I would like the Copyright Office 7 maybe to clarify that what we are talking about is 8 copy protection instead. 9 MR. CARSON: Let me ask you, Keith, do 10 you have a viewpoint on whether dongles are access 11 control measures? Are they something that fall 12 within the scope of Section 1201? 13 MR. KUPFERSCHMID: I think -- I mean, I 14 think they are access control measures from what I 15 understand about the technology, but I do -- would 16 like to leave the opportunity open, because of my 17 more technical experts back in the office and what 18 have you. But, my understanding is they are in fact 19 access control technological measures, you know, but 20 obviously if you don't have access you can't copy 21 either. 22 MR. MONTORO: I believe what Keith, what 23 he had said earlier in his testimony, however, was 24 that he believed that these devices were copy 25 protection devices unless the Copyright Office ruled 26 otherwise, if I characterize that correctly. PAGE 187 1 But, the problem, again -- 2 MR. KUPFERSCHMID: I'm not sure I said 3 that, but go ahead. 4 MR. MONTORO: So, there is a problem 5 with these devices. They cannot be backed up. If 6 they are -- what happens after you receive your 7 first access? Let's say this is -- I purchase a 8 program. It comes with a lock device. Now, I am a 9 lawful authorized user to use that program, but 10 without this device I cannot use that program. Does 11 it mean that I -- is it then an access device or is 12 it copy protection device. And, I think that's what 13 Mr. Jaszi was trying to get at this morning, where 14 he was talking about second usage and that's where 15 I'm going also. 16 MR. CARSON: Keith, I would like to 17 follow up on a comment you made. I can understand 18 the fear of a potential for abuse if someone just 19 says we lost it, it was stolen, go back and get 20 another one or being able to circumvent in those 21 case. I understand the potential for abuse there. 22 But, at least what we're hearing from Mr. Montoro is 23 there are cases where it's damaged. And, you can't 24 get the company to replace it. A, what on earth 25 would justify a company in refusing to replace it 26 and second, if that company refuses to replace it, PAGE 188 1 when it is demonstratively proven that the thing is 2 just damaged. Here it is, it's damaged. I didn't 3 give it to someone else. 4 What on earth would justify not 5 permitting a person in that position to circumvent? 6 MR. KUPFERSCHMID: A couple of things. 7 One, as I mentioned, is that there are third parties 8 that will agree to escrows and this happens all the 9 time. Will escrow software. Will escrow hardware 10 locks, that type of thing. They will do that, so if 11 that's a concern of yours, certainly you can do 12 that. But, that's beside the point. 13 MS. GOSLINS: Although that requires the 14 permission and effort on the part of the software 15 publisher, right? 16 MR. KUPFERSCHMID: Oh, sure. 17 MS. GOSLINS: There is no guarantee 18 that -- 19 MR. KUPFERSCHMID: Without a doubt. 20 MS. GOSLINS: -- that they would make 21 that available to the third party. 22 MR. MONTORO: Hindsight is 20/20. After 23 somebody has gone out of business, trying to say 24 that they should escrow this material for future 25 people to use is a little too late at that point. 26 MR. KUPFERSCHMID: Escrow is something PAGE 189 1 you would do at the time of agreement, certainly, 2 and that is actually a practice that is somewhat 3 common. We have a lot of members, a matter of fact 4 -- 5 MR. CARSON: Can I stop you right there? 6 MR. KUPFERSCHMID: Yes. 7 MR. CARSON: Just for a second. I've 8 got another point. This may be my ignorance. How 9 do you meaningful escrow a piece of hardware and 10 what does that mean? 11 MR. KUPFERSCHMID: You would just get a 12 third party who would basically hold that hardware 13 and if the dongle wasn't operable, then you would 14 have this other, this other hardware that sort of 15 been, sort of in storage, I guess, for lack of a 16 better term. 17 MR. MONTORO: It's not possible. I'm 18 sorry, it's not possible to do that. The hardware 19 piece is unique to each customer. That would mean 20 that the manufacturer would have to send out one 21 dongle, one of these pieces to the customer when he 22 gets the software package and one to a third party 23 escrow person to hold onto it in the eventuality 24 something happened. 25 MR. KUPFERSCHMID: But, that's exactly 26 what we're talking about. That does happen. PAGE 190 1 MR. CARSON: Is that a typical practice? 2 MR. KUPFERSCHMID: For dongles, I really 3 don't know. With software, it is. Let me take that 4 back, depending on the software, okay, it could be a 5 typical practice. I mean, we're talking about many 6 different software products here. 7 MR. CARSON: Okay. Let's assume that 8 that didn't happen. You know, there wasn't a, I 9 guess another dongle in the hands of some third 10 party escrow. The user's dongle is broken. And, he 11 goes back to the software company, if it still 12 exists, and says, hey, it's broken. Here, I'll ship 13 it to you. You can look at it. You can find out 14 for yourself. And, the software company says, too 15 bad, buy another $7,000.00 software package. Why, 16 under those circumstances, should the user not be 17 permitted to circumvent? 18 MR. KUPFERSCHMID: And, this actually was 19 -- now, you're getting back to the very first point 20 I wanted to make, which is what I read in Mr. 21 Montoro's comments, I said -- I mean, gee, is this 22 right and when I called our software companies that 23 have an interest here and use dongles and, I mean, 24 they informed me that is actually not the case. I 25 mean, if -- and I think actually there is one line, 26 although I don't have it handy, in Mr. Montoro's PAGE 191 1 testimony where it says, if you're talking about 2 lost or stolen, but if you're talking damaged 3 dongles, in most cases the software provider will 4 actually replace that or work with the customer. 5 I mean, they don't want to lose 6 customers it's bad business. So, they will actually 7 work with the customer in virtually all cases. In 8 talking to our members this was confirmed. 9 MR. CARSON: Let me make sure I'm not 10 misunderstanding what you said. Have there been 11 cases? Are you aware of cases where you have the 12 damaged dongle and there is simply no recourse from 13 the software company? 14 MR. MONTORO: Well, the first instance 15 would be if a company went out of business and there 16 was nobody to go back to and I mentioned that 17 already. 18 MR. CARSON: Right. 19 MR. MONTORO: Generally, companies will 20 replace one that is damaged, if they are still 21 around to do so. The problems come up, of course, 22 that if the lock device is lost, there is a burglary 23 and I think Keith raised earlier the point that you 24 should go ahead and you take your software and you 25 lock it up, you lock up your hardware lock at night. 26 Well, the truth is that most people will obviously PAGE 192 1 lock up their software and keep it in a certain 2 spot. The software, however, is already install on 3 your computer. Once it's installed on the computer 4 with the hardware lock, you don't ever touch it. 5 You don't climb behind your desk every night before 6 you go home to remove a device. 7 And, so those are real problems and 8 we've had people actually call us, hey, I've got a 9 police report, this is exactly what happened. It's 10 to the dealers, typically that deal the software 11 that's out there, they -- generally it's up to them 12 if they're going to replace something or not and the 13 problem is that they are motivated by making another 14 sale. And, I've come across this once before, where 15 they had no incentive really to help out somebody if 16 it's actually been lost. They will say you simply 17 can go ahead and try to claim it on your insurance. 18 And, I've had customers come back to me 19 and tell me my insurance does not cover this. 20 MR. CARSON: Okay. Let's take your 21 scenario where the software company is out of 22 business. What's your response to Mr. 23 Kupferschmid's point that if a software company is 24 out of business, who on earth has got a claim 25 against you under Section 1201(a)? What's your 26 problem? PAGE 193 1 MR. MONTORO: It's still breaking the 2 law as I understand the way 1201(a) would be. 3 You're still circumventing a device -- a copyright 4 protection device or even maybe an access control 5 device, depending on how we define it. So, whether 6 you're breaking the law and no body knows about it 7 or you still maybe breaking the law and that's why 8 we need the exemption. 9 MR. CARSON: That's all I have. I want 10 to thank you all for sharing your thought with us. 11 Our work still -- we still have a lot left to do, 12 just in the next two days. I apologize on behalf of 13 the Register who really did want to be here. She 14 will have the opportunity of reading the transcript 15 and/or hearing the audio tape of your testimony. As 16 we mentioned at the outset, it may well be that 17 after you've all left we'll realize, oh, my God, we 18 really should have asked you this question or that 19 question or the Register herself may well have some 20 questions that none of us thought of and we are 21 certainly reserving the right to get those to you 22 and ask you to get back to us in writing in 23 sufficient time that that can be made part of this 24 record and hopefully in time for others to comment 25 upon that in their post-hearing comments. 26 So, with that we will adjourn until PAGE 194 1 tomorrow morning at 10:00 a.m. Thank you, everyone. 2 (Whereupon, the hearing was adjourned to 3 reconvene tomorrow at 10:00 a.m.)