PAGE 1

                 LIBRARY OF CONGRESS
 
                      + + + + +
 
           UNITED STATES COPYRIGHT OFFICE
 
                      + + + + +
 
        HEARING ON EXEMPTION TO PROHIBITION ON
    CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS
           FOR ACCESS CONTROL TECHNOLOGIES
 
                      + + + + +
 
                  DOCKET NO. RM 9907
 
                      + + + + +
 
               Wednesday, May 3, 2000
 
                      + + + + +
 
             The hearing in the above-entitled matter
 was held in Room 202, Adams Building, Library of
 Congress, 110 Second Street, S.E., Washington, D.C.,
 at 10:00 a.m.
 
 BEFORE:
 
      MARYBETH PETERS, Register of Copyrights
 
      DAVID CARSON, ESQ., General Counsel
 
      RACHEL GOSLINS, ESQ, Attorney Advisor
 
      CHARLOTTE DOUGLASS, ESQ., Principal Legal
      
 
      ROBERT KASUNIC, ESQ., Senior Attorney Advisor







                                                   PAGE 2
                       I-N-D-E-X

WITNESS     page no.

Cary Sherman, Recording Industry
Association of America                    4

Robert Hildeman
Streambox                                 12

Questions                                 16

Rodney Petersen, University of Maryland   51

Aline Soules, University of Michigan      63

Consortium of College and University
Media Centers:

Diana Vogelsong                           69

Jeff Clark                                72

Dan Hamby                                 80

Questions                                 81




                                                   PAGE 3
  1                  P-R-O-C-E-E-D-I-N-G-S
  2                                          (10:05 a.m.)
  3              MS. PETERS:  Good morning.  We come to
  4  our second day of hearings on the potential
  5  exception to the protection of access control
  6  technology.
  7              Yesterday I had a fairly lengthy
  8  introductory remark that is at the back for people
  9  who didn't get it.  It basically sets out the time
 10  table for what we're doing and the fact that we will
 11  be making the transcript available online as soon as
 12  we get it and, when the witnesses have had a chance
 13  to correct their statement, we will be putting
 14  substitute statements out.  The fact is that we are
 15  capturing this and hope to have it streamed on our
 16  website as soon as technologically possible.  That
 17  means as soon as the Library's technology people
 18  figure out how to ensure that we are able to do it.
 19              MR. CARSON:  Will you be encrypting
 20  that, Marybeth?
 21              MS. PETERS:  No, we are not encrypting
 22  that.  The access will be totally open.
 23              This morning we have two witnesses.  The
 24  first one will be Cary Sherman representing the
 25  Recording Industry Association of America.  The
 26  second one is Robert Hildeman representing






                                                   PAGE 4
  1  Streambox.  And so let's start with you, Cary.
  2              MR. SHERMAN:  Thank you very much.
  3              My name is Cary Sherman.  I'm Senior
  4  Executive Vice President and General Counsel of the
  5  Recording Industry Association of America.  I would
  6  like to thank the Copyright Office for giving me the
  7  chance to speak today and for your hard work in both
  8  helping to enact the Digital Millennium Copyright
  9  Act and in conducting this proceeding.
 10              As you know, RIAA is a trade association
 11  whose members are responsible for the creation of
 12  over 90 percent of the legitimate sound recordings
 13  sold in this country.  RIAA's members are very
 14  interested in the outcome of this proceeding as it
 15  becomes more and more clear that new digital
 16  technologies like the Internet will revolutionize
 17  the way recorded music is enjoyed by consumers.
 18              My prepared remarks today will be brief
 19  and will address two key points.  First, I will
 20  explain RIAA's support for the Joint Reply Comments
 21  filed by the 17 copyright owner groups.  Second, I
 22  will give a short description of the application of
 23  technological protection measures to the electronic
 24  distribution of recorded music, in particular
 25  focusing on the work of the Secure Digital Music
 26  Initiative, or SDMI, which was referenced in some of






                                                   PAGE 5
  1  the comments filed in this proceeding.  I would also
  2  be happy to answer any questions the Office might
  3  have about these issues.
  4              On the first point, RIAA joins the other
  5  copyright owner groups in urging the Office ad
  6  Librarian to allow the prohibition against
  7  circumvention of access controls to come into effect
  8  in October without any exemptions.  We think the
  9  question that the Librarian must answer in this
 10  proceeding is straightforward:  Is there evidence
 11  that the prohibition is likely to affect adversely
 12  non-infringing uses of any particular class of
 13  works?
 14              There's no question that Congress placed
 15  the burden of producing such evidence on the parties
 16  who seek an exemption.  It is also clear to us that
 17  Congress expected a claimed exemption to be
 18  supported by more than speculation, guesswork or
 19  vague predictions.  Indeed, legislative history
 20  clearly requires highly specific, strong and
 21  persuasive evidence to be produced.  That kind of
 22  evidence has not been produced for any class of
 23  works and certainly not for sound recordings.
 24              As explained in the Joint Comments, much
 25  of the commentary in this proceeding strays from the
 26  confines of this proceeding and asks the Librarian






                                                   PAGE 6
  1  to do things well beyond his authority, such as
  2  repeal provisions of the DMCA or overturn court
  3  rulings applying provisions of the DMCA other than
  4  those at issue here.  Even the comments that address
  5  the general question before the Librarian have taken
  6  liberty with and confused the scope of this
  7  proceeding.  For example, rather than propose
  8  particular classes of works that might be subject to
  9  an exemption, they instead offer general categories
 10  of users who could rely on an exemption for all
 11  types of works.
 12              Also, it has been argued that the
 13  Librarian should not consider the very benefits the
 14  DMCA was intended to bring about;  increased access
 15  to and availability of digital copyrighted works
 16  through the use of technological protection
 17  measures.  When the proper question is considered
 18  and the proper standard applied, an exemption is not
 19  warranted.
 20              This result should not be a surprise.
 21  The House Judiciary Committee specifically
 22  contemplated just that outcome and explained, and I
 23  quote, "such an outcome would reflect that the
 24  digital information market place is developing in
 25  the manner which is most likely to occur, with the
 26  availability of copyrighted materials for lawful






                                                   PAGE 7
  1  uses being enhanced, not diminished, by the
  2  implementation of technological measures and the
  3  establishment of carefully targeted legal
  4  prohibitions against acts of circumvention."
  5              This result is especially appropriate
  6  for sound recordings because there is no evidence of
  7  any adverse effect on access to recorded music.
  8              To the contrary, the market place is
  9  working to develop new ways to enjoy recorded music
 10  and increase access by consumers, which brings me to
 11  the second point of my remarks.  Some commenters
 12  mentioned SDMI as an example of something that might
 13  restrict access to copyrighted music.  Nothing is
 14  further from the truth.  Recording artists and
 15  record companies make their living by providing
 16  access to their copyrighted works in the broadest
 17  possible way. For example, right now consumers can
 18  enjoy their favorite music in a wide variety of
 19  ways, including from CDs, cassettes, radio air play,
 20  juke boxes, music videos, digital cable services
 21  and, more recently, through Internet-based sources
 22  like webcasting.
 23              The Internet and digital technologies
 24  are making significant changes in the music business
 25  but, unfortunately, not always in a good way.
 26  Access to pirated copies of popular music has






                                                   PAGE 8
  1  flourished on the Internet and, because of that,
  2  record companies have been reluctant to make
  3  available over the Internet legitimate downloads of
  4  the world's favorite music.  This lack of access to
  5  legitimate forms of new digital music is not the
  6  result of an excess of security measures or over-
  7  zealous enforcement of the DMCA.  Rather, it is the
  8  lack of widely supported security standards and the
  9  legal means to back them up that has created this
 10  situation.  And that is, in large measure, what
 11  prompted SDMI.
 12              What we are trying to do with SDMI is
 13  exactly what Congress envisioned in the DMCA:  a
 14  voluntary, multi-industry endeavor that has the
 15  ultimate goal of improving access to sound
 16  recordings for consumers.  SDMI is truly a ground-
 17  breaking effort.  Over 160 companies representing a
 18  broad spectrum of information technology and
 19  consumer electronics businesses, Internet service
 20  providers, security technology companies, and
 21  members of the world-wide recording industry have
 22  come together in SDMI to develop open technological
 23  standards for digital music distribution.
 24              SDMI is not an effort by record
 25  companies to lock up their music so that it will
 26  unavailable to consumers.  Such a broad array of






                                                   PAGE 9
  1  companies would not be participating if that were
  2  the case.  The reason there has been such widespread
  3  participation in SDMI is because they all see in
  4  SDMI the promise of increased availability of music
  5  in digital form.
  6              SDMI began its work by developing a
  7  specification for portable devices that record and
  8  play digital music, but its ultimate goal is much
  9  broader than that.  We hope it will eventually
 10  develop a framework for playing, storing and
 11  distributing secure digital music in many different
 12  ways and on many different devices.  This will
 13  enable the emergence of a new market that meets
 14  consumer demand for high quality digital music.
 15              One of the core principles of SDMI is
 16  that its standards are open and voluntary, and SDMI
 17  does not require the use of protection technology or
 18  exclude unprotected formats.  Copyright owners are
 19  free to distribute their music in an unprotected
 20  format if they so choose, and both protected and
 21  unprotected music will play on SDMI-compliant
 22  devices.
 23              I should note that although some
 24  commenters mentioned SDMI along with the DVD copy
 25  protection scheme known as CSS, the two are
 26  fundamentally different.  CSS is a specific security






                                                   PAGE 10
  1  technology, while SDMI is an organization to develop
  2  certain voluntary minimum security standards that
  3  may be implemented in any number of specific
  4  technologies or products.
  5              As further evidence that SDMI is all
  6  about improving the consumer experience, SDMI also
  7  seeks to provide consumers the access and uses to
  8  which they have become accustomed with traditional
  9  media.  For example, the SDMI Portable Device
 10  Specification permits a user to make an unlimited
 11  number of copies from an original CD for personal
 12  use on his or her PC, portable device or portable
 13  media.
 14              I must stress, however, that the point
 15  of SDMI is not simply to improve the access to music
 16  afforded by CDs.  Electronic music delivery will
 17  only succeed if it creates new business models and
 18  consumer experiences that are simply not possible
 19  today.  In other words, those who distribute music
 20  electronically need to be able to offer consumers
 21  entirely new ways to enjoy even more convenient
 22  access to music delivered in SDMI-compliant formats.
 23              One good example of such a completely
 24  new experience is a "try before you buy" program.
 25  This would give a consumer access to music for free
 26  for a limited time while the consumer decides






                                                   PAGE 11
  1  whether to purchase a permanent copy.  This new
  2  consumer experience is made possible by delivering a
  3  protected digital version of a recording.  What is
  4  important for this proceeding is that this business
  5  model would be impossible if the Librarian were to
  6  authorize consumers to hack SDMI-compliant security
  7  systems to keep promotional copies without paying
  8  for permanent retention.
  9              Another example of new opportunities
 10  possible with SDMI involves the huge back catalogs
 11  of music owned by many record companies.  These
 12  works can not be promoted and sold cost effectively
 13  through traditional retail channels.  Digital
 14  distribution, with no limits on shelf space or
 15  inventory and the ability to target niche markets,
 16  can unlock this music and give its fans access where
 17  none was possible before.  These are just the kinds
 18  of developments that Congress directed the Office to
 19  consider on the positive side of the equation in
 20  this proceeding.
 21              It must be stressed, however, that
 22  access only can be achieved if technological
 23  protections that respect the copyright in these
 24  works are available and effective.  Thus, Section
 25  1201(a) promotes new forms of access to digital
 26  music, and delaying its effectiveness would hamper






                                                   PAGE 12
  1  such access.  Indeed, press reports are issued
  2  almost daily announcing record company plans to
  3  begin electronic music distribution services.
  4  Nothing would have a greater chilling effect on
  5  those plans than a decision by the Librarian
  6  excluding sound recordings from the protection of
  7  Section 1201(a)(1).  No evidence for such an
  8  exemption has been produced, and no such exemption
  9  should be adopted.
 10              Again, thank you for the opportunity to
 11  appear before you today, and I welcome any questions
 12  you might have about RIAA's comments or my remarks.
 13              MS. PETERS:  Thank you.
 14              Mr. Hildeman.
 15              MR. HILDEMAN:  Thank you.  I want to
 16  thank the Copyright Office for this invitation.  My
 17  name is Bob Hildeman.  I'm the CEO of Streambox,
 18  Inc.  The purpose I'm here today is to discuss with
 19  this body several components.  One is Streambox
 20  fully supports adequate and effective copyright
 21  protection.  The second is that we want to see a
 22  balanced approach for fair use and also our ability
 23  as technology companies for reverse engineering.
 24              Streambox is an Internet and broadband
 25  technology company focused on developing the
 26  building blocks for Internet and broadband markets.






                                                   PAGE 13
  1  We are a technology enabler and an infrastructure
  2  builder.  Our technologies are open and flexible,
  3  and we work with real networks, Microsoft, Apple,
  4  MP3 and others, and Streambox.com is the leading
  5  media search technology for searching, indexing and
  6  categorizing streaming media content on the
  7  Internet.
  8              Streambox TV is a family of broadband
  9  technologies that contain consumer software and
 10  hardware devices, encoding and aggregation engine
 11  and digital delivery components.  Stream VCR the
 12  client side technology contained within Streambox TV
 13  contains streaming and recording technology that
 14  allows consumers to record live and on demand
 15  streaming content for later view.  Streambox VCR
 16  works just like a regular VCR that is used by
 17  hundreds of millions of consumers in the U.S.
 18              And again, I want to thank this office
 19  for hearing some of the comments that I have to
 20  provide.  As far as my testimony on rulemaking
 21  process for Section 201(a)(1) of the Digital
 22  Millennium Copyright Act, let me say at the outset
 23  that Streambox fully supports the desires of content
 24  owners to effectively protect their copyrighted
 25  material in the digital realm.  At the same time, we
 26  believe that it is very important that the






                                                   PAGE 14
  1  traditional copyright principles of first sale and
  2  fair use also survive in the digital realm.
  3              As part of the Section 1201(a)(1)
  4  rulemaking, the Copyright Office has a difficult
  5  task of maintaining the balance between the rights
  6  of content owners and consumers in the digital
  7  realm.
  8              The focus of the Copyright Office in its
  9  Section 1201(a)(1) rulemaking is clearly centered on
 10  the task, described by the House Commerce Committee
 11  Chairman Bliley, of "creating a mechanism that would
 12  ensure that libraries, universities and consumers
 13  would generally continue to be able to exercise fair
 14  use rights and other exceptions that have ensured
 15  access to copyrighted works."
 16              There is no doubt that the protection of
 17  fair use rights in the digital realm would be a
 18  benefit to content owners, consumers and companies
 19  such as Streambox.
 20              This brings me to the most important
 21  issue that I wish to stress to the Copyright Office.
 22  In its quest to satisfy the legitimate concerns of
 23  both content owners and users in its deliberations
 24  on Section 1201(a)(1), the Copyright Office must
 25  also protect the legitimate fair use rights of
 26  technological innovators and solutions providers.






                                                   PAGE 15
  1  In its commentary on fair use in the digital
  2  environment, the House Commerce Committee Report
  3  accompanying the DMCA astutely notes that:
  4              "Fair use is no less vital to American
  5  industries, which leads the world in technological
  6  innovation.  As more and more industries migrate to
  7  electronic commerce, fair use becomes critical to
  8  promoting a robust electronic marketplace."
  9              Specifically, what I am advocating is a
 10  point that has already been raised and several of
 11  the comments bear repeating.  Whatever the final
 12  Section 1201(a)(1)(A) rulemaking may or may not
 13  allow in terms of circumventing technological
 14  measures controlling access to copyrighted works, it
 15  is vitally important that the legitimate rights of
 16  companies to reverse engineering be protected.
 17  While there is a specific exception to Section
 18  1201(a)(1)(A) for reverse engineering contained in
 19  Section 1201(f), the Copyright Office will need to
 20  enhance this exception in the Section 1201(a)(1)(A)
 21  rulemaking in order not to adversely affect the non-
 22  infringing right of companies to reverse engineer
 23  copyrighted material to which access is prohibited.
 24              System interoperability is the driving
 25  force behind the continuing evolution and growth of
 26  the Internet industry, and the ability to innovate






                                                   PAGE 16
  1  is directly tied to the ability to reverse engineer.
  2  Companies must have access to other systems, and the
  3  law can not favor one system over another.
  4              Thank you.
  5              MS. PETERS:  Thank you.
  6              Now we get to start the questions.
  7  Robert, you get to start.
  8              MR. KASUNIC:  Thank you.  Good morning.
  9              My first questions are for Mr. Sherman.
 10  As you might have noticed, we received a few
 11  comments from DVD users throughout this proceeding.
 12  Some expressed concerns about the interoperability
 13  issues and the access and use controls involved with
 14  CSS encryption on DVDs containing, among other
 15  things, audiovisual works.
 16              I noticed on the RIAA's website that
 17  there is the intention of beginning to develop -- or
 18  you're in the development stage -- of implementing
 19  DVD audio and/or super audio CDs.  Will CSS
 20  encryption be used on audio DVDs?
 21              MR. SHERMAN:  Given what has happened
 22  with CSS, I would feel confident in saying no.  In
 23  fact, it was the very hack of CSS that caused a
 24  delay in introduction of DVD audio into the
 25  marketplace.  The music companies and the technology
 26  companies all came to the conclusion that they






                                                   PAGE 17
  1  needed to beef up the security system for this new
  2  format before it was released and, as a result, they
  3  have an example of a situation in which
  4  circumvention of a technological protection measure
  5  has actually impeded access to a wonderful new
  6  format that consumers are going to love.
  7              There will be something else.  Exactly
  8  what it is, I do not yet know.  It is being studied
  9  and tested, but there will be some form of
 10  protection in DVD audio and, I assume, in super
 11  audio CD as well.
 12              MR. KASUNIC:  Following that up, will
 13  those audio DVDs be something that will be
 14  compatible with currently sold DVD devices that are
 15  authorized to decrypt CSS?  Will those devices be
 16  able to play audio DVDs?
 17              MR. SHERMAN:  They will not be
 18  compatible, but that has nothing to do with the
 19  protection technology.  That has to do with the
 20  format of the DVD technology itself.  DVD video is
 21  one standard.  DVD audio is a completely different
 22  standard.  We expect that the devices that will be
 23  sold in the marketplace will be universal players
 24  that will play both DVD video and DVD audio, but the
 25  new DVD audio format will not play on existing DVD
 26  video players.






                                                   PAGE 18
  1              MR. KASUNIC:  So new devices will need
  2  to be purchased.
  3              MR. SHERMAN:  Right.  I should mention
  4  that there is the possibility of record companies
  5  releasing content that would be backward compatible
  6  because it's a fairly flexible format, and the sound
  7  version, the audio track of DVD video, could be used
  8  by record companies so that that same music would be
  9  available in DVD -- DVD audio might be playable on
 10  the DVD video if they used the same compression
 11  technology that is presently being used on DVD
 12  video.  That would not take full advantage, however,
 13  of the extraordinary improvement in sound quality
 14  that will be possible with DVD audio disks.
 15              MR. KASUNIC:  I read recently that Sony
 16  Music is beginning to offer digital music over the
 17  Internet that incorporates the SDMI technology.
 18  What specific access control technologies or
 19  measures are included with this distribution?
 20              MR. SHERMAN:  One really has to
 21  distinguish between SDMI standards and ordinary
 22  protection technologies that are available in the
 23  marketplace.  At this point, there is no SDMI
 24  standard for protected content.  There is no
 25  specific standard with regard to what makes content
 26  SDMI-compliant.  Therefore, the only thing that






                                                   PAGE 19
  1  would be relevant in terms of SDMI to the content
  2  being provided by Sony is that at some point in the
  3  future a Watermark would be incorporated in that
  4  content.  That is not something that is to happen
  5  now.  That is something that is to happen only later
  6  when certain Phase 2 technology becomes available
  7  and is ready for implementation and, at that point,
  8  Watermarks will be incorporated in the content.
  9              Therefore, what Sony is doing now is
 10  simply providing its music in some kind of protected
 11  format that would be compatible generally with the
 12  SDMI system of protection.  That will include things
 13  like encryption, it will include digital rights
 14  management systems and so on and so forth, but these
 15  are just technological protection measures that are
 16  available in the marketplace.  They're not SDMI-
 17  specific.
 18              MR. KASUNIC:  So SDMI is a group of
 19  different organizations that compose this initiative
 20  and that initiative involves a number of different
 21  technologies.  Can you be any more specific about
 22  what the specific access control technologies are
 23  that will be used?  There'll be encryption and --
 24              MR. SHERMAN:  Well, this is not SDMI
 25  now, but most of the delivery systems that are being
 26  contemplated involve some form of encryption and






                                                   PAGE 20
  1  some form of digital rights management system.
  2  There are also decisions to be made about which code
  3  to use.  That is, a compression, decompression,
  4  algorithm, that is the mechanism by which a very
  5  high, very large file is reduced to a very small
  6  file so that it can be transmitted quickly over the
  7  Internet and other mechanisms.  And then there are
  8  decisions about file formats, as well.  So there are
  9  lots of different factors that go into a delivery
 10  system.  But the protection elements are largely
 11  encryption and digital rights management.
 12              The digital rights management component
 13  is what enables entirely new types of business
 14  transactions between content providers and users.
 15  One could sell, for example, the right just to
 16  listen to a song rather than the way we do it now,
 17  which is to sell a copy.  Right now we have a very
 18  limited form of making music available to consumers.
 19  We basically either sell it to them on a disk that
 20  they keep forever, or they don't get it other than
 21  radio and things like that.  And that's really a
 22  very limited business model when you think about it.
 23              With digital rights management, you
 24  would be able to sell a single listen or a week of
 25  listens or a month of listens or a rental thing
 26  where, after a certain point, you can buy it for a






                                                   PAGE 21
  1  small additional price.  You could do "try before
  2  you buy" where you'd be able to listen to something
  3  for a day or so and then it would time out, and then
  4  you could decide whether you want to buy it.  You
  5  have the possibility of super distribution where you
  6  can email things to a friend and a friend can decide
  7  whether he's interested in it and wants to buy it as
  8  well.
  9              You can have subscription models where
 10  you can have all the music that you can consume but
 11  for a certain period of time, at the end of which
 12  that subscription can either go on or end.  All
 13  those would be new ways of allowing consumers to
 14  tailor their particular interest in the particular
 15  business transaction for how that music gets
 16  consumed. And digital rights management systems are
 17  very flexible ways of implementing those business
 18  models, and that's why they'll be a key element in
 19  electronic delivery systems in the future.
 20              MR. KASUNIC:  Can you just briefly
 21  explain what the difference is between -- you had
 22  mentioned Phase 2 technology.  What is Phase 1
 23  technology and what is Phase 2?
 24              MR. SHERMAN:  Okay.  As part of the
 25  effort to arrive at a system that would enable the
 26  variety of new portable devices coming to market to






                                                   PAGE 22
  1  be able to obtain SDMI-compliant music, that is
  2  music that is going to be compatible with SDMI-
  3  compliant systems, the idea was to come up with a
  4  mechanism by which pirated versions of music could
  5  be filtered out.  The underlying concept here was
  6  that personal use of music would be okay.  If you
  7  want to rip your CD to a hard drive and then load it
  8  from the hard drive to a portable device or to
  9  multiple portable devices for your own use, that
 10  would all be fine.  But to rip it to your hard drive
 11  and then distribute it on the Internet to your
 12  million best friends for free and become a worldwide
 13  publisher, that was not okay.
 14              And the idea was to find a way to
 15  distinguish between the legitimate personal uses
 16  versus the illicit Internet distribution.  The
 17  mechanism that is being used for that is a screen
 18  technology that will filter out pirated content. And
 19  I won't bother going into how that might be done,
 20  but there are mechanisms for identifying that which
 21  was distributed on the Internet without
 22  authorization.  That technology is now being
 23  developed.  There's a call for proposals out.
 24  Preliminary responses have been received and further
 25  evaluation will be done through the next several
 26  months and a technology will be selected.






                                                   PAGE 23
  1              Once that screen technology is available
  2  for implementation, that is the Phase 2 technology
  3  and, in order to be SDMI-compliant, a portable
  4  device will have to incorporate that technology so
  5  as to filter out pirated music that is distributed
  6  illicitly.
  7              We are presently in Phase 1, and Phase 1
  8  simply requires portable device manufacturers to
  9  incorporate a technology to look for a signal that
 10  the Phase 2 technology is now available.  That's a
 11  Watermark Reader, and when the Watermark is included
 12  in content in the future saying Phase 2 technology
 13  is now available, it will basically encourage
 14  consumers to upgrade to the Phase 2 technology
 15  because content that's marked with that Watermark
 16  will not play in the new generation of -- will only
 17  play in the new generation of devices.  It won't
 18  play in the old generation of devices.
 19              So the idea is that you could buy
 20  portable devices now.  You can use them to listen to
 21  anything and everything and then you will be
 22  encouraged to upgrade the software that accompanies
 23  the new portable device so that you will get all the
 24  benefits of the new music that's distributed that is
 25  compatible with SDMI but that will filter out
 26  pirated content.  That's the Phase 2 that's in






                                                   PAGE 24
  1  development right now.
  2              I apologize for the complexity of this,
  3  but it is complex.
  4              MR. KASUNIC:  Just one last question for
  5  Mr. Hildeman.  How has fair use been adversely
  6  affected or is it likely to be adversely affected by
  7  access control measures?
  8              MR. HILDEMAN:  Probably a number of
  9  ways.  One, if it's freely available on the
 10  Internet, I think that devices would view or record
 11  should have some compatibility or interoperability.
 12  I think that in order to fair use that content, the
 13  technology companies need to first publish what it
 14  is that their protection mechanism may be.  In many
 15  cases, as technology companies, we do not know
 16  another company's technological measure.  So again,
 17  access will be critical that systems will be
 18  published or systems will be acknowledged that it is
 19  in existence.
 20              MS. PETERS:  Thank you.  Before I turn
 21  to Charlotte, I wanted to follow up with a question
 22  to you, Cary.  When you were talking about the
 23  delivery mechanisms and you were talking about that
 24  there would be some encryption and some rights
 25  management schemes, I wanted to go to libraries.  We
 26  heard yesterday that libraries are kind of like






                                                   PAGE 25
  1  where people go when they can't afford to buy.  It's
  2  the alternate method of getting material, so it's
  3  critical to access information.  In your delivery
  4  mechanisms that have some encryption and some rights
  5  management, what's going to be the model for sale or
  6  delivery to libraries for the use of library
  7  patrons?
  8              MR. SHERMAN:  I don't know.  I mean this
  9  is the marketplace at work.  The companies are just
 10  beginning to come online with their digital
 11  delivery.  It's a very, very complicated thing to
 12  do.  There are patent issues associated with all
 13  these as well as with whom you're going to be the
 14  technology partner, what kind of portable devices
 15  will the music play in.  I mean these are very, very
 16  complex issues.  The licensing issues are complex.
 17  So it's taken a long time.
 18              Now that they are finally coming online,
 19  the question is, how is the marketplace going to
 20  respond?  I think that we're going to see a period
 21  of pricing experimentation where you're going to see
 22  lots of different pricing approaches to see what
 23  consumers want.  You're going to see the added value
 24  of lyrics and album art and photographs and other
 25  graphics and audio/video material that will
 26  accompany some of the content to see what kind of






                                                   PAGE 26
  1  change that makes in consumer response.
  2              So I think we're in a period of
  3  experimentation, and there are many different
  4  marketplaces that one might be appealing to, the
  5  library community being only one of them.  I think
  6  it will be a while before this becomes a routine
  7  mechanism by which libraries obtain their content.
  8  The CD world is going to be with us for a very long
  9  time to come.  There are some 600 million CD players
 10  around the world, and the worldwide industry is not
 11  about to stop serving that marketplace.
 12              So I think that libraries will probably
 13  continue to get most of their content in the old-
 14  fashioned way, and it will be a little while before
 15  the system is up and running sufficiently where
 16  libraries will want to get into the digital
 17  distribution system itself.
 18              MS. PETERS:  Is your estimate that
 19  within the next three years that the traditional
 20  marketplace will be the dominant form for libraries?
 21  In other words, that they will be purchasing CDs
 22  which they can then lend and make available to
 23  patrons under the conditions that they do today?
 24              MR. SHERMAN:  At the very least, the
 25  next year.  I would say for the next decade minimum,
 26  maybe two decades.  I think CDs are going to be with






                                                   PAGE 27
  1  us for a very long time to come, and the gradual
  2  introduction of digital delivery mechanisms is
  3  really very, very slow upward.
  4              MS. PETERS:  Okay.  Thank you.
  5              Charlotte.
  6              MS. DOUGLASS:  Thank you.
  7              Cary, I understand your comment to say
  8  that you don't believe that there's been any adverse
  9  effect with respect to technological measures on
 10  sound recordings.  Congress asked us to, however,
 11  specify particular classes of works.  Do you think
 12  that if there were any effect, adverse effect, the
 13  category should be sound recordings, or should it be
 14  something narrower, or should it be sound recordings
 15  combined with anything else?
 16              MR. SHERMAN:  I really don't have an
 17  answer to that question because I regard the fact
 18  that Congress didn't provide too much guidance on
 19  this as an opportunity be innovative in how you
 20  respond to the problem.  Certainly, the category
 21  should be no broader than something like sound
 22  recordings.  But if one is able to find that there's
 23  a particular problem in a particular genre or a
 24  particular type of sound recording, that might be an
 25  appropriate response, and I think that the Copyright
 26  Office should retain the discretion to figure out






                                                   PAGE 28
  1  how best to respond to the need.
  2              The idea here is to effect an
  3  appropriate balance and, until you know what the
  4  particular facts are that you're worried about, you
  5  shouldn't hem yourselves in with an interpretation
  6  about how you have to define those categories.  I
  7  would leave it open as much as you can.
  8              MS. DOUGLASS:  Thank you.
  9              Mr. Hildeman, do you believe that sound
 10  recordings, if there were an adverse effect, would
 11  be an appropriate category, or should there be
 12  something else?
 13              MR. HILDEMAN:  I think it probably
 14  should be much broader.  I think when a person looks
 15  at that issue, it should be addressed with probably
 16  three components:  content owners, copyright
 17  protection, one; second, as a consumer to fair use;
 18  and third, the solution provider like us as
 19  technology innovators.  So as such, I think that
 20  looking at all three, the technology innovator needs
 21  full access to all the content where I think by
 22  providing better solutions, the consumers benefit
 23  greatly.  In that sense, there's a fair use issue.
 24              MS. DOUGLASS:  So you think that sound
 25  recordings as a broad class is okay?
 26              MR. HILDEMAN:  Yes.






                                                   PAGE 29
  1              MS. DOUGLASS:  Another question I have
  2  is that Congress asked us to consider not just the
  3  adverse effects of using technological measures but
  4  also positive effects of using technological
  5  measures.  For example, availability of works or
  6  enhancing lawful use.  How should that be calibrated
  7  in trying to determine overall whether there is any
  8  particular class of works which there has been an
  9  adverse effect?  In other words, how do we factor in
 10  or account for or work with the positive effects
 11  from technological uses?
 12              MR. SHERMAN:  In the case of sound
 13  recordings, I've sort of addressed that in my
 14  previous comments about the multiple new business
 15  models that will be enabled and, therefore, looking
 16  at those business models and whether consumers will
 17  actually be using them to gain access would be
 18  something to be weighed into the balance, just like
 19  the availability of a new format like DVD audio,
 20  because of the availability of some technological
 21  protection measure, should be weighed in the
 22  balance.
 23              How you do it with respect to other
 24  classes of works I think would depend upon the
 25  particular category of work.  When you think about
 26  scientific journals, for example, the fact that they






                                                   PAGE 30
  1  are available now -- I mean I have a basement filled
  2  with scientific journals because my wife is a
  3  scientist and we have years of these bound volumes
  4  of things that she never goes down to look for
  5  because there would only be one article every three
  6  issues or so that she had any interest in, but she
  7  had to subscribe to a year's worth of journals.
  8  Well, she doesn't subscribe any more because she has
  9  database access to get just the article that she
 10  needs.
 11              I think that that kind of capability is
 12  one of the great things that technological
 13  protection measures are enabling, and that would
 14  need to be weighed in the balance.  But that would
 15  be a little different kind of analysis than would be
 16  the case for sound recordings.
 17              MS. DOUGLASS:  Do you have a comment,
 18  Mr. Hildeman?
 19              MR. HILDEMAN:  Again, I guess going back
 20  to the needs of all three parties:  copyright
 21  owners, the technology innovators, and consumers.
 22  When we look at a file format, when we look at
 23  technological solution, we're looking at essentially
 24  one solution that contains -- it may be a
 25  copyrighted work.  So it's difficult from our
 26  perspective to separate the two out, that when you






                                                   PAGE 31
  1  look at technological measure, that that
  2  technological measure is a container for copyrighted
  3  work to be digitally delivered.
  4              So to look at a class of work in just
  5  recording, I think it's a good place to start, but
  6  it needs to be broadened.
  7              MS. DOUGLASS:  Thank you.
  8              MS. PETERS:  Anything else?
  9              MS. DOUGLASS:  No.
 10              MS. PETERS:  Rachel.
 11              MS. GOSLINS:  Mr. Hildeman, in your
 12  testimony you are concerned with the ability of
 13  technology companies to reverse engineer in order
 14  for interoperability.  You note that there is
 15  already an exception in Section 1201 for reverse
 16  engineering but say that we need to enhance that.
 17  I'm just curious.  In what way should we enhance it
 18  and how is the existing exemption deficient?
 19              MR. HILDEMAN:  Section 1201(f)
 20  physically addresses that in order for me to reverse
 21  engineer a product, I must gain access to that
 22  product legitimately.  As you know, many times
 23  there's issues involved where companies do not share
 24  proprietary information.  In our case, I think that
 25  innovations come about because we're able to figure
 26  out how that system works independently.  So I think






                                                   PAGE 32
  1  in that sense it needs to be broadened.
  2  Essentially, the 1201(f) states almost that you need
  3  to be licensed to reverse engineer, and I think it
  4  needs to be broadened since they should be open.
  5              MS. GOSLINS:  All right.  I just want to
  6  follow up on that a little bit so I'm sure I
  7  understand what you're saying.  Subsection (f)
  8  requires that the person has lawfully obtained the
  9  right to use a copy of the computer program.  And so
 10  your assertion is that somebody who has not lawfully
 11  obtained the right to use a computer program should
 12  also be allowed to reverse engineer it?  Is that
 13  what you want us to do with the rulemaking?
 14              MR. HILDEMAN:  Yes.  Again, proprietary
 15  secrets are not exchanged so, therefore, in order to
 16  figure out how that system may work is that, you
 17  know, it comes down to innovations of that engineer
 18  as to how that --
 19              MS. GOSLINS:  I'm not a computer expert
 20  at all, but is what's necessary to reverse engineer
 21  an exchange of proprietary information or only that
 22  you have access to a copy that you can then --
 23              MR. HILDEMAN:  The question that comes
 24  about is if I were to take a product or if I was to
 25  develop a product that was compatible with another
 26  existing product and that compatibility came about






                                                   PAGE 33
  1  becAUse my innovation or our innovation.  According
  2  to 1201(f), what is the standard that would be
  3  measured whether my product is legitimate or
  4  illegitimate.  I think that's the issue.  If I
  5  haven't gone through the steps of gaining a proper
  6  license for that, does that make my product
  7  illegitimate?
  8              MS. GOSLINS:  Are you talking about
  9  gaining a license to reverse engineer or a license
 10  to have a copy of the work?
 11              MR. HILDEMAN:  I'm saying whenever you
 12  buy a product, essentially there's end user license.
 13  But many times companies do not buy a product.  They
 14  essentially figure out a system because of the tools
 15  that's available so, therefore, you do not have --
 16  it's not a licensed product.  So according to DMCA,
 17  would that make my product illegitimate because I
 18  innovate it without getting a license.
 19              MS. GOSLINS:  I'm sorry.  I'm just going
 20  to ask one more question.  I'm just still a little
 21  confused.
 22              MR. HILDEMAN:  Sure.
 23              MS. GOSLINS:  Is your concern that if
 24  you did not have a license to reverse engineer that
 25  your product, the product you ultimately arrived at,
 26  would be illegitimate or that if you did not have a






                                                   PAGE 34
  1  license to actually just open the computer program?
  2              MR. HILDEMAN:  I think it's the first.
  3  My concern would be that I should not have to
  4  license a product to reverse engineer a product for
  5  the fact I think innovation many times that you
  6  understand the compatible systems so, therefore, you
  7  tend to or you do come about with solutions that
  8  would be compatible.
  9              MS. GOSLINS:  Mr. Sherman, I have a
 10  couple of questions for you.  As you may have noted
 11  reading through the comments, many commentators have
 12  actually pointed to the recording industry as an
 13  example of why criminalizing access control
 14  protections are not necessary and specifically they
 15  point to the availability of CDs, which is a high
 16  quality form of digital music which have been around
 17  for many years without any demonstrative negative
 18  impact on the recording industry and without any
 19  access control protections.  I'm just curious as to
 20  how you would respond to that argument.
 21              MR. SHERMAN:  That argument may have
 22  been true five years ago, but it ain't true today.
 23  The fact is that CDs have become the source for an
 24  entire generation of kids who think that they're in
 25  the publishing business and that it's okay for them
 26  to publish somebody else's work for free worldwide.






                                                   PAGE 35
  1  CDs are the source.
  2              In SDMI when we ask for help in creating
  3  technological measures that will expand the market
  4  for everyone, the response is, well, you've got to
  5  stop selling CDs.  Why put in technical measures if
  6  somebody can get the same thing on a CD?  Well,
  7  they're right.  We should just stop selling CDs, but
  8  that's not going to happen.  It's not the
  9  marketplace at work and, in fact, it's a very good
 10  illustration of why the marketplace really does
 11  control and why the notion that technical measures
 12  are going to be used to lock up works is really
 13  mistaken.
 14              Record companies are making available
 15  works, even though they know that that continues to
 16  be the source of the piracy problem on the Internet
 17  because they are in the business of making the works
 18  available to the public.  They don't benefit from
 19  creating something wonderful and then not allowing
 20  people to gain access to it.  So they continue to
 21  sell CDs, notwithstanding the impact on the piracy.
 22              But there's no question but that the
 23  piracy will have a devastating long-term impact on
 24  this industry if it's not reigned in at some point.
 25  We think that we've done a great job in terms of
 26  beginning to do that, but new technologies keep






                                                   PAGE 36
  1  arising that make the problem greater once again.
  2  This will be a continuing challenge.  It's not going
  3  to be responded to by laws.  It's not going to be
  4  responded to just by technical protection measures.
  5  It's going to be responded to in the marketplace
  6  with legitimate businesses that are somehow going to
  7  attract consumers towards the convenience and
  8  greater value of participating in the legitimate
  9  marketplace rather than in the illegal one.  But I
 10  hardly regard CDs as a model for the fact that we
 11  continue to sell CDs indicating that there shouldn't
 12  be criminal liability for circumvention.
 13              MS. GOSLINS:  Maybe you could just help
 14  me with a chronological matter.  When did recordable
 15  CDs and CD burners become widely available in the
 16  marketplace?
 17              MR. SHERMAN:  Well, they became
 18  available a number of years ago, but they were very,
 19  very expensive and their performance was uneven.
 20  They've become more of a mass market phenomenon over
 21  the past two to three years, and they are increasing
 22  by leaps and bounds every year.
 23              MS. GOSLINS:  And I just have one final
 24  question about the kind of technologies concerned or
 25  involved in the SDMI.  Yesterday, we heard from some
 26  commentators who distinguished between first level






                                                   PAGE 37
  1  access control protections, which just controlled
  2  access to the content but wasn't actually embedded
  3  in the content itself and so, once you had access to
  4  the content, then you had to have a copy control or
  5  use restriction in place if you wanted to control
  6  that, and what they called second level access
  7  protections, which is an initial level of access
  8  control and then a second level that actually
  9  remained with the content and so, even if you
 10  downloaded it or made a fair use copy of it, the
 11  embedded commands would still require
 12  reauthorization every time you tried to open that
 13  up.
 14              You've talked about a couple of
 15  different kinds of technologies, the Watermark
 16  technology, the digital rights management systems,
 17  and I'm just curious.  Do those all involve an
 18  element of the second level access protection?  I
 19  was hearing you say that, but I just wanted to make
 20  sure that I was correct.
 21              MR. SHERMAN:  For the most part, yes.
 22  They are designed essentially to protect rights
 23  against copying that isn't authorized or rights
 24  against copying in numbers that aren't authorized.
 25  I mean one of the beauties of these things is you
 26  can sell a copy that has unlimited copying






                                                   PAGE 38
  1  capability or you're allowed to make 10 copies or
  2  you're allowed to make five copies, you're allowed
  3  to make two copies or no copies.  That could then be
  4  reflected in the price that you pay for the product.
  5              So there will be some element where
  6  digital rights management systems enable that kind
  7  of business model flexibility, and that would be a
  8  copyright right rather than just access.
  9              MS. GOSLINS:  Thank you.
 10              MR. CARSON:  Mr. Hildeman, I think I
 11  understand that you would like us to create some
 12  form of exemption to the anti-circumvention
 13  provision.  Is that correct?
 14              MR. HILDEMAN:  I think the provisions
 15  should be expanded on.
 16              MR. CARSON:  I'm sorry.  You think what
 17  should be expanded?
 18              MR. HILDEMAN:  Provisions should be
 19  expanded.
 20              MR. CARSON:  Are you saying you think
 21  Congress should expand it, or do you think we should
 22  expand it?
 23              MR. HILDEMAN:  I think we should look at
 24  ways to expand on that.  I think it should include
 25  additional language for reverse engineering.  I
 26  think the reverse engineering portion is too






                                                   PAGE 39
  1  limiting.  It's too general right now.
  2              MR. CARSON:  Okay.  Let's first make
  3  sure we have a common understanding of what the
  4  mission of this particular rulemaking proceeding is
  5  and then figure out whether there's something we can
  6  do for you.  Section 1201(a)(1), which is all we're
  7  really concerned with, is all we have a mandate to
  8  do anything with, says that we are to make a
  9  recommendation to the Librarian, who will then
 10  determine whether there are any classes of works,
 11  particular classes of works with respect to which
 12  persons will be adversely affected by virtue of the
 13  prohibition on circumvention of access control
 14  devices and their ability to make non-infringing
 15  uses.
 16              We don't have the ability to expand any
 17  of the statutory language you see.  We have a
 18  specific mandate to find out whether there are
 19  particular classes of works with respect to which
 20  people are adversely affected.
 21              So I guess my question is, in the
 22  context of what we are being told by Congress we
 23  must do, what are you asking us to do, if anything?
 24              MR. HILDEMAN:  I think I'm here to share
 25  with you market information from technology's point
 26  of view.  I'm not sure what needs done to correct






                                                   PAGE 40
  1  the language of the law.  I think that's for the
  2  body to figure out.  I think I'm here to share with
  3  you from technology point of view that there needs
  4  to be a balanced approach, right now that the laws
  5  are not balanced.
  6              MR. CARSON:  Then I think I understand
  7  but I just want to make sure I'm clear.  You're not
  8  asking us to find any particular class of works that
  9  is to be exempted from the provision.  Is that
 10  correct?
 11              MR. HILDEMAN:  That's right.
 12              MR. CARSON:  Okay.  Mr. Sherman,
 13  yesterday we heard from Professor Jaszi who had a
 14  proposal I just want to run by you and get your
 15  reaction to.  He suggested that we exempt from the
 16  operation of Section 1201(a)(1) works embodied in
 17  copies which have been lawfully acquired by users
 18  who subsequently seek to make non-infringing uses
 19  thereof.  Do you follow the proposition?
 20              MR. SHERMAN:  If you could repeat it
 21  once.
 22              MR. CARSON:  Sure.  Exempt works
 23  embodied in copies which have been lawfully acquired
 24  by users who subsequently seek to make non-
 25  infringing uses thereof.  If you want Rachel to put
 26  it in front of you, she's got a copy of his






                                                   PAGE 41
  1  testimony.  If you want to take a moment to reflect
  2  on it, I'd just like to get your reaction to that.
  3              MR. SHERMAN:  I guess my initial
  4  reaction is that would sure be a far cry from the
  5  particular classes of works that I think Congress
  6  had in mind in the enactment of Section 1201 and the
  7  mandate for this proceeding where the idea was to
  8  look at particular situations where there were
  9  adverse effects that were clearly going to be
 10  incurred and could be clearly demonstrated.  This
 11  would include any kind of work, just because it had
 12  to be embodied in a copy which has been lawfully
 13  acquired by users.  That's every work.
 14              I'm also wondering what would be the
 15  basis for demonstrating that there was really good
 16  cause to believe that there was going to be an
 17  adverse effect on those non-infringing uses.  Take,
 18  for example, sound recordings.  If somebody were to
 19  download a protected file of music that didn't
 20  enable that person to make copies -- which, by the
 21  way, is not a foregone conclusion at all because
 22  SDMI and our member companies have been extremely
 23  focused on consumer expectations and what consumers
 24  want to do with their music.  SDMI specifically
 25  allows the making of an unlimited number of copies
 26  from an original disk.  We can't assume that there






                                                   PAGE 42
  1  would be any inhibition.
  2              But assume that there was.  Assume that
  3  a particular downloaded file could not be copied.
  4  What about the fact that that same thing is
  5  available at the corner store in CD form?  Does this
  6  mean that there would be now a circumvention right
  7  with respect to the downloaded copy when the person
  8  could have gone to the corner store and gotten an
  9  unprotected copy from which fair use would be able
 10  to be exercised?  What about the fact that you might
 11  just ask permission?  I want to make a fair use.
 12  I'm writing a review.  I'm doing a multimedia
 13  project.  What about asking?
 14              I mean all of those things seem to be
 15  prerequisites before finding that there is such a
 16  certainty that there's going to be an adverse effect
 17  that we should exempt the application of the anti-
 18  circumvention rule to all works.  So I guess I come
 19  to the conclusion that this is over-broad,
 20  premature, and probably not supported by the
 21  evidence.
 22              MR. CARSON:  To be fair, of course,
 23  you've just read an excerpt and you might want to
 24  take a look at the rest of his testimony and, if
 25  appropriate, you can comment later.  But I gather
 26  your first impression is not necessarily favorable.






                                                   PAGE 43
  1              We received comments from the Public
  2  Broadcasting System I'd like to get your reaction
  3  to.  They point out that under Section 114(b) of
  4  Title 17 the reproduction, distribution and
  5  derivative work rights in Section 106 do not apply
  6  to sound recordings included in educational
  7  television and radio programs, and they express a
  8  concern, and I think that's probably as far as it
  9  goes, but a concern at the very least that their
 10  ability to make non-infringing uses of published
 11  non-dramatic musical works, which they say depends
 12  in part on access to sound recordings, that might be
 13  endangered by technological protection devices.
 14              What can you tell them to allay their
 15  fears and what can you tell us to deter us from
 16  deciding that there's anything we need to do in the
 17  context of this rulemaking?
 18              MR. SHERMAN:  CDs in unprotected form
 19  are going to be available for a very long time to
 20  come and, therefore, the traditional mechanism by
 21  which they've gained that kind of access is going to
 22  continue.  Furthermore, record companies are in the
 23  business of promoting their works in every work
 24  possible.  That includes on public broadcasting as
 25  well as commercial radio.  Record companies have
 26  been accused of being too generous in terms of






                                                   PAGE 44
  1  providing their music to radio stations and the
  2  like, and there doesn't seem to be any cause for
  3  anybody to be alarmed that this commercial
  4  imperative is going to change just because
  5  technology enables protection measures to exist.
  6              MS. PETERS:  I just want to follow up on
  7  one of the questions that David had which had to do
  8  with Peter Jaszi's proposal and your answer that CDs
  9  are available maybe at the corner store and they're
 10  going to be available for a long time.  In the DVD
 11  context, what we heard is that that's not an answer
 12  with regard to videos and getting videotapes because
 13  the DVD always has more stuff.  It's got out-takes,
 14  it's got multiple languages.
 15              With regard to the product that's going
 16  to be delivered with regard to sound recordings, if
 17  there's a distinction between the product and only
 18  the encrypted product has the extra stuff, what
 19  would your response be?  In other words, it's not
 20  the equivalent product that you can go out and buy
 21  on the market.  There's more in the access
 22  controlled product.
 23              MR. SHERMAN:  I'm sort of mystified by
 24  the proposition.  It seems to start from the
 25  proposition that the Salinger case was all wrong,
 26  that if you write a letter, that it's got to be






                                                   PAGE 45
  1  available to the world because you wrote it and,
  2  therefore, there's an obligation to libraries and
  3  anybody else to have access to it and to be able to
  4  use it for all the beneficent purposes that are
  5  somehow embodied in fair use doctrine and the like.
  6              I don't see it that way.  I mean it
  7  seems to me that there's a balancing between the
  8  right of the copyright owner to create something
  9  that's never published or that's published with
 10  restrictions versus the right of the public to use
 11  that which the public acquires.  And just because
 12  additional content is made available because the
 13  medium allows for it doesn't mean that there should
 14  be a concomitant obligation to never impose
 15  restrictions on that.  So I just don't buy into the
 16  fundamental underpinning of the position.
 17              MS. PETERS:  Thank you.  Does anyone
 18  else here have any other questions?  If not --
 19              MR. HILDEMAN:  I would like to comment
 20  on that, just regarding Mr. Carson's question.  I
 21  would like a class of work that added to -- would be
 22  reverse engineering.  Okay.  That under Section
 23  1201(a)(1) should be copyrighted material which can
 24  be reverse engineered for legitimate interoperable
 25  uses.  Okay.
 26              MR. CARSON:  So that would be






                                                   PAGE 46
  1  copyrighted material of any kind --
  2              MR. HILDEMAN:  Right, for the reverse
  3  engineering.  Yes.
  4              MR. CARSON:  So that suggests that if a
  5  piece of music was available in an intertrust DRM,
  6  it would be okay to reverse engineer that DRM.
  7              MR. HILDEMAN:  I think in order to
  8  develop a compatible DRM system for legitimate
  9  purposes only.
 10              MR. CARSON:  But it's the conduct that
 11  would be allowed by a 1201(a)(1) and how would we
 12  know that that was the legitimate purpose for that
 13  particular use and that this was a legitimate user
 14  action intended to make compatible DRMs or whatever?
 15              MR. HILDEMAN:  As you know, when we talk
 16  about copyright content, in software and the
 17  copyright content all in one.  So in order for a
 18  company to reverse engineer, I think they need to
 19  have full access.
 20              MR. SHERMAN:  I guess I would just
 21  comment broadly that I thought that this was a
 22  debate that had already occurred.  It occurred in
 23  Congress where a great deal of time was spent by a
 24  great many people trying to figure out the right
 25  balance and what this 1201(a)(1) proceeding should
 26  be all about, and the statute speaks pretty clearly






                                                   PAGE 47
  1  to the fact that one is looking at particular
  2  classes of works and, instead, we're hearing that
  3  particular classes of users should be given certain
  4  rights and, when it comes down to works, we're being
  5  told that it's basically all works that somehow fall
  6  into some broad category, whether it's the category
  7  of copies which have been lawfully acquired by users
  8  or whether it's copies that can be reverse
  9  engineered.
 10              I really do not think that that was the
 11  balance that was struck by the Congress, and I think
 12  it would be a dis-service to the law, as well as to
 13  policy, to go in that direction.
 14              MR. CARSON:  Mr. Hildeman, do you have
 15  any response to -- I think part of what Mr. Sherman
 16  was saying was Congress set up the rules with
 17  respect to reverse engineering.  Given that Congress
 18  certainly does have a specific provision on that,
 19  what empowers us to broaden -- in effect, isn't it
 20  fair to say you're asking us to broaden Section
 21  1201(f) and, if that is what you're asking us to do,
 22  why should we think we have the power to do that
 23  when Congress has arguably written the ground rules
 24  on the first engineering?
 25              MR. HILDEMAN:  I guess I'm just pointing
 26  out conditions we would like to see.  I guess I






                                                   PAGE 48
  1  don't have any clear answer for you how --
  2              MS. PETERS:  It is his wish.
  3              MR. CARSON:  Sure.  Putting myself in
  4  your chair, the Copyright Office will do it for you
  5  and the Librarian will do it for you.  Then why not?
  6              MR. HILDEMAN:  Sure.
  7              MS. PETERS:  Rob has one question.
  8              MR. KASUNIC:  I had one more question,
  9  just following up about Marybeth's question about
 10  access and talking about the underpinnings of a
 11  right to access for a work and mention of the
 12  Salinger type situation.  But isn't there a
 13  distinction that we're dealing, as in Salinger, with
 14  an unpublished work where here we're dealing with
 15  works that are distributed and available and we're
 16  also talking about, in that particular example, of a
 17  sole source situation where that is distributed and
 18  it's not something that is kept in a locked box?
 19              MR. SHERMAN:  You're certainly right,
 20  and I was over-stating the proposition when
 21  comparing unpublished with published works.  But the
 22  principle really ought to be the same.  A copyright
 23  owner might want his or her copyrighted work to only
 24  be available in certain forms.  When the Director's
 25  Guild came in and said they hate the reformatting
 26  for TV because it is a disgrace to their work which






                                                   PAGE 49
  1  was designed for a different kind of screen and that
  2  it reflected on their capabilities as directors and
  3  cinematographers and so on, people respected their
  4  right to have some ability to at least let it be
  5  known that this was not their original work or
  6  whatever.
  7              Recording artists might want their music
  8  to be available or seen only in a certain way.
  9  There might be video footage that they only want to
 10  see when it's combined with the music itself because
 11  it makes a certain kind of statement to them, or
 12  they might want it only heard in its entirety, or
 13  they might want the photographs limited in certain
 14  kinds of ways.
 15              Artists feel very strongly when they
 16  create an album that it is a form of their
 17  expression, and they don't like it when a particular
 18  piece is plucked out of context and the album isn't
 19  viewed as a work in its entirety.  They regard the
 20  graphics as an integral part of the music and so on
 21  and so forth, and I think that we have an obligation
 22  to try and respect those kinds of creator's wishes
 23  and, if that means that not every piece of
 24  everything can be taken separate and apart, I think
 25  that's part of the calculus that would go into a
 26  fair use analysis.  But the mere fact that it's out






                                                   PAGE 50
  1  there doesn't mean that there are obligations with
  2  respect it forever being made available in any form
  3  to anybody.
  4              MR. KASUNIC:  1201(a)(1) will then begin
  5  to protect moral rights in terms of that integrity
  6  and respecting the artists' wishes? Whereas with
  7  fair use, you could take a portion of the work,
  8  rather than that particular view that the artist
  9  might have wanted portrayed?
 10              MR. SHERMAN:  That's a discussion that
 11  we can have in three years, six years, nine years,
 12  12 years, at such point as there's even a glimmer of
 13  risk that there would be an adverse effect on users
 14  being able to enjoy fair use.  Thus far, that just
 15  hasn't happened.  It is a good, long-term issue that
 16  we could talk about, and the moral rights component
 17  will be very interesting.  But that certainly isn't
 18  a present day issue.
 19              MS. PETERS:  Thank you very much.
 20              The hearings will resume this afternoon
 21  at 2:00.
 22              (Whereupon, the hearing was recessed at
 23  11:10 a.m. to resume at 2:00 p.m.)
 24              MS. PETERS:  Good afternoon.  Welcome to
 25  the afternoon session of our second day of hearings.
 26  This afternoon, we have actually I guess five






                                                   PAGE 51
  1  separate speakers, although a number of you
  2  represent CCMC.  I'm going to go in the order that
  3  it shows on our witness list, which is to start with
  4  the University of Maryland and then go to the
  5  University of Michigan and then move over CCUMC.  So
  6  why don't we start.
  7              MR. PETERSEN:  Thank you.  Good
  8  afternoon.  My name is Rodney Petersen.  I'm the
  9  Director of Policy and Planning in the Office of
 10  Information Technology at the University of
 11  Maryland, College Park.  Although I hold a law
 12  degree, my role there is as an administrator and
 13  educator.
 14              In my administrative role, I'm
 15  responsible for our polices and practices as they
 16  relate to the legal and ethical uses of information
 17  technology.  In that capacity, I have the
 18  distinction of being the University's registered
 19  agent under Title II of the DMCA, and I also direct
 20  a team called Project NEThics, and attached to the
 21  written testimony is some further information about
 22  that group who responds to allegations of
 23  information technology misuse including copyright
 24  infringement.  So as you can imagine, some very
 25  interesting things come my way on a regular basis.
 26              Similarly, my responsibilities entail an






                                                   PAGE 52
  1  educational and outreach function that include
  2  conducting workshops, lecturing in classes,
  3  consulting and writing for publications on a variety
  4  of topics that concern Internet law and policy.
  5  Issues of intellectual property, especially the
  6  application of copyright law in institutional
  7  policies in the digital environment, are an ever-
  8  increasing part of my portfolio.
  9              In case you're not aware, the University
 10  of Maryland, College Park is the flagship
 11  institution of the university system of Maryland.
 12  The University is a land grant Research I
 13  institution and a member of the Association of
 14  American Universities, the Association of Research
 15  Libraries and the National Association of State
 16  Universities and Land Grant Colleges.
 17              The Office of Information Technology
 18  supports the teaching, research and outreach mission
 19  of the University through the provision of
 20  information technology infrastructure and support
 21  services necessary for the educational enterprise.
 22              While I'm here today principally to
 23  support the concerns that have been raised by the
 24  library community, I'm also here to share some of my
 25  views of how the outcome of the rulemaking process
 26  will impact on higher education information






                                                   PAGE 53
  1  technology community as well as the faculty and
  2  staff and students that we serve at our institution.
  3              It should be exceedingly obvious by now
  4  that each of the people who testify before you or
  5  who have written testimony that you've reviewed
  6  bring a certain set of biases or values that are
  7  shaped by our training, by our experiences or by our
  8  institutional cultures.  So, therefore, I should
  9  disclose in advance of my discussion of the issues
 10  what are perhaps some obvious but important points
 11  of reference.
 12              The higher education IT community, as I
 13  view it in general, is, as you can imagine, very
 14  enthusiastic about the use of technology to enable
 15  intellectual discovery, the use of technology to
 16  support scholarship and the creation of new content,
 17  the use of technology to facilitate the distribution
 18  of copyrighted works, and the use of technology to
 19  manage access and control to information and
 20  services.
 21              On the other hand, I think the IT
 22  community, in general, as I see it, also disapproves
 23  of certain uses of the technology including uses
 24  that engage in illegal activities, technology to
 25  invade personal privacy, technology to interfere
 26  with open access to information, and technology to






                                                   PAGE 54
  1  unduly regulate the free exchange of ideas.
  2              In my conversations with colleagues
  3  about the impact of this Section 1201(a)(1) --
  4  which, by the way, I wouldn't dare call it that to
  5  them, they wouldn't begin to understand what I was
  6  referring to-- but when I talk to people about the
  7  issues of general concern, the discussions center
  8  around three themes, and I recognize, having been
  9  here yesterday and reading a lot of the testimony,
 10  that some of these themes are much broader than the
 11  issue before you, but I feel they're important to
 12  put on the record, particularly from a person who
 13  works in information technology perhaps in addition
 14  to what you've already heard the Librarian say.
 15              The first thing I would emphasize is
 16  that any time any place learning necessitates access
 17  to digital information.  You right away think I'm
 18  probably going to go off into your distance
 19  education study, and I recognize that work has
 20  already been done, but it's a very important issue.
 21  Many colleges and universities are developing online
 22  degree programs, seeking ways to expand their
 23  student base or enhancing their current curriculum
 24  through distributed learning techniques.
 25              At the University of Maryland, for
 26  example, we expect that our primary mission will






                                                   PAGE 55
  1  continue to be fulfilled as a residential campus.
  2  Nonetheless, we are aggressively seeking ways to use
  3  technology to enhance the learning experience for
  4  our residential community, although I must note that
  5  a majority of our students are still commuter
  6  students who don't actually live on campus.  As well
  7  as we're looking at ways we can do outreach to the
  8  citizens of the state that helps us fulfill our land
  9  grant mission.
 10              Other institutions such as our
 11  neighboring university system of Maryland
 12  Institution University College, who I believe
 13  testified before you on the distance education
 14  study, they're already conducting a majority of
 15  their courses online and will continue to move in
 16  that direction.  So the system of distributed
 17  learning that's being anticipated at our university,
 18  the University of Maryland, and several other
 19  research institutions will increasingly depend upon
 20  information that's accessible on the Internet and
 21  through our digital libraries.
 22              Consequently, the legal and public
 23  policy framework that governs access preservation
 24  and the use of digital information is of paramount
 25  interest to the higher education and IT communities.
 26              Secondly, the difference between buying






                                                   PAGE 56
  1  a work and licensing it is significant.  A recent
  2  report of the National Research Council summarizes
  3  this development as follows.  "The sale of a
  4  physical copy of a work has been the dominant model
  5  for transferring intellectual property to the
  6  consumer for more than 200 years.  Sales involve the
  7  complete transfer of ownership rights in the copy.
  8  Copyright law explicitly anticipates the sale of
  9  intellectual property products and, by the first
 10  sale rule, constrains a copyright holder's rights in
 11  copies of the work that have been sold.
 12              So, for example, the purchaser is to
 13  free to lend, rent, or resell the purchased copy.
 14  In that sense, copyright law follow IP products into
 15  the marketplace and promotes the continued
 16  dissemination of information."  And I'm still
 17  quoting from this report where it goes on to say,
 18  "Licensing, however, constitutes a limited transfer
 19  of rights to use an item on stated terms and
 20  conditions.  Licenses are governed by contract law
 21  and, as such, are essentially a private agreement
 22  between two parties.  That agreement can involve a
 23  wide range of terms and conditions and need not
 24  incorporate any public policy considerations beyond
 25  some basic limits on what constitutes an enforceable
 26  contract."  And that ends the quote from that






                                                   PAGE 57
  1  report.
  2              While the higher education community has
  3  become accustomed to the use of sight licenses for
  4  computer software programs, an area that in the
  5  Office of Information Technology we deal with quite
  6  regularly, the concept of licensing books, journals
  7  and databases is a proposition that we have not
  8  fully embraced.  And at the core of our resistance
  9  is that in the fear of the process of shifting from
 10  a paradigm of buying a work to one where we license
 11  its use may also lead to the forfeiture of the
 12  exemptions we presently enjoy under the federal
 13  copyright law.
 14              Accordingly, access control technologies
 15  further erodes our confidence that the balances
 16  contemplated under the copyright law will be
 17  maintained when it comes to access and use of
 18  digital works.
 19              Thirdly and finally, the move to
 20  commercialize information must work for the public
 21  good.  The oft-cited phrase from the United States
 22  Constitution in support of copyright protections
 23  claim that its intended purpose is to, quote, "To
 24  promote the progress of science and the useful
 25  arts."  Unquote.
 26              Yet, the exclusive rights under the






                                                   PAGE 58
  1  Copyright Act or the limited monopoly in vision by
  2  the framers of the Constitution often resides, not
  3  with the original author or creator, but commercial
  4  publishers or information distributors.  The present
  5  effect has been to misappropriate the protections of
  6  copyright law to, quote, "To promote corporate
  7  profits and protect commercial interest."  Unquote.
  8              The higher education community has
  9  fallen victim to this present state of affairs when
 10  its own faculty scholars who generate copyrightable
 11  works assign the rights to for profit publishers who
 12  turn around and resell the publication back, at
 13  considerable cost, I might add, to the same colleges
 14  and universities that generated the intellectual
 15  capital.
 16              Another troubling aspect is the
 17  placement of public domain materials, including
 18  facts and government information into digital
 19  formats that proclaim a form of legal protection not
 20  heretofore acknowledged under federal copyright law.
 21  The exploitation and commercialization of
 22  information accessible by means of a computer
 23  network and information technology is precisely what
 24  the Uniform Computer Information Transactions Act,
 25  or UCITA, that is being proposed to the 50 states as
 26  a uniform state law anticipates.






                                                   PAGE 59
  1              The State of Maryland General Assembly
  2  recently voted to be among the first in the country
  3  to adopt UCITA, with significant amendments, I might
  4  add, and UCITA will establish a new legal framework
  5  centered around state contract law for transaction
  6  in computer information, which would include classes
  7  of works already covered under federal copyright law
  8  and then some.
  9              As I said at the outset, I recognize
 10  that these broader themes are part of other debates
 11  in the states as well as recent studies under the
 12  purview of this office, the Copyright Office.  But
 13  while these themes touch on issues much broader and
 14  more philosophical than the specific purpose for
 15  this rulemaking, it is an important backdrop as to
 16  why the higher education and IT communities seek to
 17  secure an exemption to prohibition and circumvention
 18  of copyright protection systems for access control
 19  technologies.  So I will now comment very briefly on
 20  some of the specific questions identified in your
 21  Notice of Inquiry.
 22              First, a majority of the questions seek
 23  information pertaining to the present effects of
 24  technological measures, and the University of
 25  Maryland has employed technological measures to
 26  limit access to its online resources in an effort to






                                                   PAGE 60
  1  comply with its license agreements.  We have also
  2  devised simple and secure methods to restrict access
  3  to course websites that make fair use of copyrighted
  4  works as well as that contain private information in
  5  the form of student education records.
  6              We are becoming increasingly
  7  sophisticated in our ability to use password
  8  protection, certificate authorities, and proxy
  9  servers for our own purposes of authentication and
 10  authorization.
 11              On the other hand, the technology that
 12  Section 1201(a)(1) anticipates is still in its
 13  infancy, and we expect to see further developments
 14  and ongoing introduction of such measures as the
 15  technology matures.  For example, public key
 16  infrastructure, or PKI, is still a clumsy and not
 17  well understood technology, but there are
 18  experimentations under way that could make it a more
 19  widely used technology in the near future.
 20              Additionally, the rapid adoption in the
 21  states of the Uniform Electronic Transfers Act, UETA
 22  as opposed to UCITA, is likely to further facilitate
 23  commercial Internet transactions, including access
 24  to digital information.  So, in other words, we are
 25  on the verge of seeing an explosion of the uses of
 26  technological measures not realized today.






                                                   PAGE 61
  1              Second, questions 11 and 16 specifically
  2  ask, quote, "Should any classes of works be defined,
  3  in part, based on whether the works are being used
  4  for nonprofit archival, preservation, and/or
  5  educational purposes or purposes of criticism,
  6  comment, news reporting, teaching, scholarship or
  7  research?"  And my obvious reply is, yes.  And the
  8  purpose for my response is that these very types of
  9  uses that are already contemplated and given special
 10  protections under existing sections of the Copyright
 11  Act, including the provisions for fair use.  Digital
 12  materials should be treated the same as their analog
 13  counterparts for purposes of copyright protections
 14  and determining acceptable uses.
 15              It would seem that the, quote, "the
 16  promotion of science and useful arts," unquote, is
 17  most likely to flourish if we ensure an exemption
 18  that fully addresses the teaching, scholarship and
 19  research functions of our nation's research
 20  universities.
 21              And finally, question 17 asks, quote,
 22  "should any classes of works be defined, in part,
 23  based on whether the works are being produced in
 24  ways that do not constitute copyright infringement?
 25  For example, is fair use in a manner permitted by
 26  exemptions prescribed by law?"  Unquote.






                                                   PAGE 62
  1              Again, my answer is yes.  The
  2  Association for Computing Machinery, in their
  3  comments dated February 17, said it best when they
  4  urged you to prohibit the circumvention of
  5  technological measures only when it is done with the
  6  intent to infringe.  Criminal intent has always been
  7  an important foundation for our criminal justice
  8  system and seems to be an essential limiting factor
  9  as you further define the exemption.
 10              The University of Maryland remains
 11  committed to policies and educational efforts that
 12  denounce infringing activities and will continue to
 13  condemn acts of piracy.  On the other hand, we
 14  vigorously defend the right of the members of our
 15  education and research community to take full
 16  advantage of the rights and exemptions ensured under
 17  the Federal Copyright Law.
 18              In conclusion, the February 10th comment
 19  submitted by the National Association of Independent
 20  Schools observes, and I quote, "Copyright law in the
 21  21st century should enhance the ability of schools
 22  to lawfully access information for appropriate
 23  education purposes, not create barriers that will
 24  discourage the use of new technologies in the
 25  classroom."  Unquote.
 26              On some days I feel like  a technology






                                                   PAGE 63
  1  evangelist in my role at the University and, believe
  2  me, encouraging some of our faculty to use
  3  technology in their instruction and research is
  4  likely to require a higher power.  On the other
  5  hand, the faculty and students at our nation's
  6  research universities are both creators and
  7  consumers of copyrighted works.  Therefore, there's
  8  no questioning the interest of research universities
  9  in maintaining the careful balances under federal
 10  copyright law that have developed over time.  And to
 11  keep that balance in check, a broad exemption to the
 12  prohibition on circumvention of copyright protection
 13  systems for access control technologies is therefore
 14  essential to allow access and promote use of
 15  copyrighted works for educational, scholarly, and
 16  research purposes.
 17              MS. PETERS:  Thank you very much.
 18              Aline.
 19              MS. SOULES:  Thank you.  Thank you for
 20  this opportunity to speak.  I am Aline Soules, and
 21  I'm currently the Librarian at the University of
 22  Michigan's Business School.  However, I am not
 23  speaking today on behalf of my employer, but on my
 24  own behalf.
 25              In my summary of intended testimony, I
 26  advocated that we focus on the original intent of






                                                   PAGE 64
  1  copyright law, namely the promotion of learning and
  2  the creation of new knowledge.  We should also
  3  strive to achieve a balance among the needs of
  4  authors, creators, publishers, vendors, educators,
  5  librarians, learners, and others engaged in these
  6  endeavors.  In the digital environment, this balance
  7  should be preserved as well.
  8              I would like to address some of the
  9  activities in which librarians engage to provide
 10  access to digital resources for our users.  One of
 11  the common misconceptions about electronic
 12  information is that everything on the Internet is
 13  free, but libraries across the country are spending
 14  more and more dollars to subscribe legally to
 15  electronic resources that our users demand.
 16              Last fiscal year, our small business
 17  library spent over $230,000 out of an $800,000
 18  materials budget on electronic resources, and this
 19  trend toward electronic access will continue.  This
 20  proportion would increase if vendors did not require
 21  my library to maintain print in addition to
 22  electronic formats.
 23              The digital environment holds great
 24  promise for libraries.  The benefits to our users
 25  are great.  Digital technology allows users greater
 26  ability to seek and to find information.  Obviously,






                                                   PAGE 65
  1  searching the Web or a CD-Rom using a sophisticated
  2  search engine is preferable to the traditional
  3  methods of searching in print indexes.  However,
  4  enhanced digital capabilities should not come at the
  5  cost of a user's legal right to access nor should
  6  fair use protections be dependent on format.
  7              As a business librarian, I work with
  8  vendors regularly to negotiate licenses for access
  9  to electronic resources.  Some vendors are
 10  aggregators of information, some are original
 11  creators, and some are both.  Sometimes they call on
 12  me to help them decide on what information to
 13  include in their databases, which I am glad to do as
 14  a professional courtesy and to further the interests
 15  of my library customers.  Some of them just try to
 16  sell me their products.  All of them, however,
 17  charge me for the end result.
 18              With many of these vendors, we come to
 19  an agreement that we can both live with.  As I work
 20  in a public university, I seek contractual uses for
 21  faculty, students, staff, and walk-ins.  I am,
 22  however, dependent on vendors' accommodations for
 23  some of these access rights, and there have been
 24  some occasions where I have not been successful.
 25              Sometimes restrictions are related to
 26  who can use the database.  Sometimes the database






                                                   PAGE 66
  1  can be used for teaching but not research.  In an
  2  environment where the two are so intertwined, they
  3  should be seamless.  And sometimes the vendor
  4  permits information to be used in class but not for
  5  projects.  Further, we assume fair use rights but
  6  often the original contract explicitly prohibits
  7  such use, and we have to negotiate that, as well.
  8              Within this licensing environment,
  9  negotiation between the interested parties is still
 10  relatively open.  Once contracts are signed,
 11  technological protection measures are cleared by the
 12  vendor to make the product available.  As was
 13  described by David Mirshin, representing
 14  SilverPlatter, librarians and vendors have worked
 15  for years with passwords and other technological
 16  protection measures.  Librarians are concerned that
 17  if Section 1201(a) is implemented without an
 18  exemption, existing problems with negotiations will
 19  be even more difficult to resolve.  Moreover,
 20  vendors will then have the strength of criminal
 21  penalties to enforce their contracts.
 22              For example, we have faced situations
 23  where we pay for the use of a database but, through
 24  the course of the year's contract, information in
 25  the database disappears.  Sometimes we are told,
 26  sometimes we are not.  The vendor will ascribe this






                                                   PAGE 67
  1  to a publisher decision.  Regardless of the reason,
  2  we do not get a refund and we have lost the
  3  information.
  4              There are several problems here.  The
  5  database is paid for with public money, and the
  6  public sometimes gets no access.  We rent this
  7  information because we can't buy it, which means we
  8  pay for it over and over again.  Should we be unable
  9  to pay at some point, we have nothing, not even the
 10  years we paid for.
 11              Content is not guaranteed, even through
 12  the life of the contract.  Vendors are generally
 13  unable to supply or guarantee that information will
 14  be archived.  Vendors, on occasion, choose to
 15  examine our activity and exercise controls without
 16  discussion or question.  What happens when the
 17  vendor can visit simply by examining our computer
 18  activity?
 19              My next example comes from my private
 20  life.  My brother-in-law is co-principal at an inner
 21  city Detroit school.  The budget for the little
 22  library in his school is $500 for the year, money
 23  that comes from Title VI.  His librarian buys a few
 24  magazines, a couple of other items, and relies on
 25  donations of material from other sources.  According
 26  to him, it seems to work.  If he weren't going to






                                                   PAGE 68
  1  retire this year, I would suggest that he's probably
  2  in for a surprise.  I could donate some books or old
  3  journals to his library through the right of first
  4  sale, but what do I do with electronic information?
  5  What do these students do as they fall further
  6  behind the digital divide?   If technological
  7  measures are applied so tightly that libraries can
  8  not exercise first sale rights, smaller libraries
  9  with restricted budgets will suffer
 10  disproportionately.
 11              It is obvious that our environment is
 12  changing rapidly.  Access, use, and content are
 13  integrated in a way they haven't been in the past.
 14  As a result, we have polarization between those
 15  seeking control of their products and those who need
 16  access, and we have growing distrust among these
 17  various groups and the individuals within them.
 18              We are not finished with this
 19  technological revolution.  Until we are farther
 20  along, we can not afford to introduce restrictions
 21  that will damage the abilities of each of us to
 22  access information for the legitimate purposes of
 23  learning and creating new knowledge.  We need to
 24  work together to create the technological means that
 25  will maintain the balance inherent in the original
 26  concept of copyright.  To tip the balance too much






                                                   PAGE 69
  1  in any one direction will deter our efforts to learn
  2  and create new knowledge and will not provide the
  3  incentive for us to work together, nor to continue
  4  developing technology for the best interests of all.
  5              Thank you again for this opportunity to
  6  speak.
  7              MS. PETERS:  Thank you.
  8              Let's turn to CCUMC and whatever order
  9  works for you is fine with us.
 10              MS. VOGELSONG:  The Consortium of
 11  College and University Media Centers appreciates
 12  this opportunity to speak on the rulemaking
 13  regarding Section 1201(a)(1) of the Copyright Act
 14  which was added by the Digital Millennium Copyright
 15  Act.  Our members have important concerns regarding
 16  the question of whether there are classes of works
 17  as to which users are or are likely to be adversely
 18  affected in their ability to make non-infringing
 19  uses if they are prohibited from circumventing
 20  technological measures that control access to
 21  copyrighted work.
 22              Representing our organization today are
 23  three members of CCUMC's Government Regulations and
 24  Public Policy Committee:  Jeff Clark to my right and
 25  your left from James Madison University, Dan Hamby
 26  representing the Public Broadcasting Service, and






                                                   PAGE 70
  1  myself, Diana Vogelsong from American University.
  2  I'm actually substituting here for Lisa Livingston
  3  from the University of Wisconsin.
  4              The Consortium of College and University
  5  Media Centers, or CCUMC as we are known, represents
  6  institutions of higher education primarily in the
  7  United States as well as a number of media producers
  8  and distributors.  In fact, many of our members are
  9  involved in both creation and use of media materials
 10  in the our educational institutions.  Many of the
 11  distributor members work closely with our academic
 12  institutions to support their educational
 13  objectives.
 14              As Dan Hamby, my colleague here, and
 15  representing PBS, has stated, "We're wrestling with
 16  issues from enhanced content to new delivery
 17  systems.  Protecting the copyright but still making
 18  the material available to as wide a base of users as
 19  possible is still a key goal."
 20              CCUMC's educational members acquire and
 21  manage collections of material in a broad range of
 22  formats.  They also provide curriculum support for
 23  faculty and others who wish to make effective use of
 24  these materials in teaching and learning.  Members
 25  play an active role in educating users about respect
 26  for intellectual property.






                                                   PAGE 71
  1              Issues related to use of and access to
  2  materials for educational purpose are at the core of
  3  CCUMC's mission.  Our organization led the
  4  development of the Fair Use Guidelines for
  5  Educational Multimedia in conjunction with a
  6  Conference on Fair Use of the National Information
  7  Infrastructure's Working Group on Intellectual
  8  Property Rights.  These guidelines were published as
  9  part of a non-legislative report of the Subcommittee
 10  on Courts and Intellectual Property of the Committee
 11  of the Judiciary, U.S. House of Representatives on
 12  September 27, 1996.
 13              We would like to preserve the gains that
 14  we made through that document by helping to define
 15  fair uses, as well as other non-infringing uses.
 16              The guidelines meet educators' needs for
 17  better understanding and application of fair use.
 18  They deal with integrated presentations created and
 19  used by faculty and students, composed of their
 20  original materials such as course notes or
 21  commentary, together with various copyrighted,
 22  lawfully acquired media formats, including motion
 23  media, music, text material, graphics,
 24  illustrations, photographs and digital software.
 25              The purposes for which faculty and
 26  students can apply these guidelines cover






                                                   PAGE 72
  1  curriculum, instruction and study, including some
  2  limited distance education application over secure
  3  networks, peer conference presentation for faculty,
  4  and portfolio evidence for both faculty and
  5  students.
  6              I'd like to now turn this over to my
  7  colleague, Jeff Clark, to talk about our particular
  8  concerns.
  9              MR. CLARK:  On the issue of possible
 10  exemptions to the prohibition against circumvention
 11  of technological measures that control access to
 12  copyrighted works, CCUMC testimony will focus on the
 13  following areas.  First, the feasibility of
 14  identifying classes of work to be considered for
 15  exemption under this rulemaking procedure.  Second,
 16  concern about the ability to distinguish access from
 17  use in technological implementation.  Third,
 18  identification of examples where educational
 19  activity is or may be constrained under the anti-
 20  circumvention rule if exemptions are not permitted.
 21  And fourth, a recommendation for an exemption for
 22  instructional media centers.
 23              First, this rulemaking procedure has
 24  been established in part to determine whether
 25  classes of works are likely to be adversely affected
 26  by the prohibition against circumvention of






                                                   PAGE 73
  1  technological controls on access to copyrighted
  2  works.  The CCUMC questions the requirement to
  3  restrict exemptions to only certain classes of work.
  4              When examining this issue in light of
  5  teaching and learning requirements, distinction
  6  between classes of works affected becomes difficult
  7  to determine.  Some works are created expressly for
  8  use in the classroom as dedicated instructional
  9  materials. Some of the materials provided by my
 10  colleagues at PBS fall into that category.  Their
 11  express purpose is to enhance the teaching and
 12  learning process.
 13              Other classes of works represent
 14  cultural expressions which have other primary
 15  purposes in the market but are useful as
 16  instructional resources in two broad ways.  They
 17  provide rich content for teachers to draw upon to
 18  achieve instructional objectives similar to those
 19  achieved by so-called instructional resources and,
 20  again, some of the general audience programs that
 21  are produced by organizations like PBS fall into
 22  that category for educators, as well.  And secondly,
 23  they can be analyzed and studied as cultural,
 24  social, and political artifacts which reveal
 25  important meaning about their human sources and
 26  uses.






                                                   PAGE 74
  1              As front line educators and producers of
  2  educational materials, CCUMC recognizes the valuable
  3  role that anti-circumvention technologies plays in
  4  assuring protection of the rights of creators and
  5  producers.  However, we also recognize the value of
  6  all types of media as educational resources.  When
  7  selecting teaching resources, educators must first
  8  identify their teaching objectives and understand
  9  the varied learning styles of their students.  Only
 10  then is the medium or delivery format effectively
 11  selected.
 12              Indeed, recent theories of multiple
 13  intelligences stress that educators recognize the
 14  importance of using a variety of teaching approaches
 15  to meet student needs.  With this in mind, it is
 16  evident that any attempt to identify classes of
 17  works to be exempted under the anti-circumvention
 18  ruling imposes a burden on the educational process.
 19              Two: the difficulty of distinguishing
 20  access and use in the digital environment places
 21  educators at a disadvantage.  A distinction is made
 22  in the new Section 1201(a)(1) of the copyright title
 23  between access to works, circumvention of whose
 24  security measures is prohibited, and the non-
 25  infringing uses or effectively fair uses that may be
 26  made of them which is not.  This makes sense in






                                                   PAGE 75
  1  terms of controlling circumvention of protective
  2  measures for purposes of illegal access to
  3  copyrighted materials that have not been properly
  4  licensed. Publishers and producers have argued that
  5  fair uses would be permitted, therefore, for those
  6  who have acquired materials lawfully.  In this
  7  scenario, where a broad-based license encompasses or
  8  even goes beyond the fair use criteria to meet
  9  educational needs, few would have concerns about
 10  protection for copyright holders.
 11              The dilemma arises from evolving
 12  technologies where technological measures for
 13  controlling both are blended or even bound
 14  inseparably.  This trend may grow as the market aim
 15  of some copyright holders becomes a pay per use
 16  model that comprimises the ability to educate
 17  freely.  The Committee on Commerce, House of
 18  Representatives, H.R. Report No. 105-551 in 1998
 19  recognized this risk in considering the DMCA when
 20  it, quote, "felt compelled to address the risk that
 21  enactment of the bill could establish the legal
 22  framework that would inexorably create a 'pay per
 23  use' society."  Unquote.
 24              Both of these issues are important
 25  because the rulemaking proceeding will determine
 26  whether classes of work are likely to be adversely






                                                   PAGE 76
  1  affected by encryption, secure envelopes, or other
  2  means of control from the digital realm.
  3  Increasingly, materials are available only in
  4  electronic formats and traditional media can not be
  5  relied upon as back-up resources when educators seek
  6  to exercise fair use options.  Because decisions
  7  made on this matter would hold for three years until
  8  the next review process, educators will be at risk
  9  if projections regarding access measures,
 10  marketplace changes, or even teaching needs and
 11  methodologies do not track as anticipated and pay
 12  per use technologies become the norm.
 13              The rulemaking process, therefore, puts
 14  the counter-balancing operation of fair use as it's
 15  traditionally understood and applied at a clear and
 16  unnecessary disadvantage.  Such an unfortunate legal
 17  restriction may not be immediately quantifiable in
 18  monetary terms but could substantially restrain the
 19  effectiveness of educational efforts over the
 20  intervening period that they may be in effect until
 21  the next Copyright Office review.
 22              Third, to illustrate the above issues,
 23  CCUMC offers the following examples of educational
 24  situations involving protected copyrighted materials
 25  where fair use is or might be compromised if
 26  educational activity is unreasonably constrained






                                                   PAGE 77
  1  under the anti-circumvention rule of the DCMA.
  2              First example.  The in-process legal
  3  action, or I should say actions of several types,
  4  against the DeCSS decryption of DVD software is
  5  relevant to the following teaching method that was
  6  cited by a CCUMC member.  Quote.  "One very popular
  7  method used in visual media studies is the direct
  8  side-by-side comparison of two similar pieces.  In
  9  this instructional style, the two examples are
 10  placed side by side in Quicktime windows and the
 11  clips are played first on one side, then on the
 12  other.  The instructor then has the ability to line
 13  up exact points in the two scenes to demonstrate
 14  visual differences.  With the proposed DMCA's
 15  provisions, we would be unable to do this simple
 16  task because the visual media would be protected."
 17  Unquote.
 18              If the provision under review in these
 19  hearings applies in full force, the DVD, which is
 20  the highest quality video format that's readily
 21  available right now, would be unavailable for use in
 22  the teaching method described here.
 23              Another CCUMC colleague experienced one
 24  of the unexpected effects  that technological
 25  security measures can have on occasion.  The CD-Rom
 26  version of the Oxford English Dictionary, though






                                                   PAGE 78
  1  usable on an individual PC workstation, would not
  2  output to a data projector for group instructional
  3  purposes.  While perhaps unusual, this speaks to the
  4  unpredictability factor that can sometimes be
  5  introduced when software security measures are
  6  implemented.
  7              Another example involves image databases
  8  in general.  They are licensed by many institutions
  9  through their libraries or media centers.
 10  Currently, some may not offer a full range of
 11  manipulation tools for their contents that
 12  accommodate different teaching goals and styles, and
 13  they may not allow extraction of content to achieve
 14  this manipulation, under fair instructional use,
 15  through other software means.
 16              For example, a sophisticated form of
 17  such need for manipulation is offered by another
 18  CCUMC member.  In a pilot project involving an art
 19  image database, images were loaded by students into
 20  Adobe Photoshop software and manipulated to create
 21  new designs for museum posters.  Similarly, students
 22  could combine the images with other materials in
 23  other software to create virtual exhibitions.  The
 24  instructional aim met by this form of working with
 25  the images was to allow students to study their
 26  formal meaning and content in ways that could not be






                                                   PAGE 79
  1  pursued had they been limited to viewing the images
  2  in the original format and database only.
  3              Even should databases used to meet this
  4  sort of teaching and learning purpose not currently
  5  prohibit this method, this manipulation
  6  technologically, this status quo could change
  7  unexpectedly in the future, thereby jeopardizing an
  8  effective instructional method that had become an
  9  integral part of instruction.
 10              Many media, statistical and text
 11  databases used in group instruction are currently
 12  and in future will continue to be subject to
 13  licensing restrictions on the number of simultaneous
 14  users that are implemented technologically and often
 15  rigidly.  This may mean that for instructional
 16  purposes the database may not be dependably
 17  available for display when needed.  When the primary
 18  aim of the class instruction is to demonstrate how
 19  to use the database features and locate or
 20  manipulate its elements, the intellectual content
 21  isn't an issue.  Nonetheless, such a use is being
 22  counted as one of the simultaneous users and subject
 23  to restrictions that may make the teaching process
 24  difficult if restrictions can not be readily
 25  circumvented.
 26              In their submitted remarks, libraries






                                                   PAGE 80
  1  have already identified examples where off-campus
  2  access by enrolled students to legally acquired
  3  databases may pose a problem under the new ruling.
  4  As all formats are migrating to digital and
  5  electronic delivery, these restrictions have the
  6  potential to inhibit access to a full range of
  7  media, including music, speeches, and other recorded
  8  sound, video, and still images.  Circumvention
  9  measures such as proxy servers can provide access to
 10  legitimate users for educational purposes without
 11  violating the rights of the copyright holders.
 12              And finally, fourth, an exemption of
 13  instructional media centers.  Given these
 14  aforementioned concerns,  CCUMC proposes
 15  consideration of an exemption for educational media
 16  centers in the use of materials lawfully acquired by
 17  the institution.  Like libraries, of which many of
 18  our members are organizationally affiliated, medica
 19  centers provide many forms of curricular support
 20  that generally have been acknowledged as appropriate
 21  fair uses.  It seems reasonable to assure that this
 22  activity continue under the DMCA.
 23              MS. PETERS:  Thank you.
 24              MR. CLARK:  Thank you.
 25              MS. PETERS:  Okay.
 26              MR. HAMBY:  I'm just here to provide any






                                                   PAGE 81
  1  answers.
  2              MS. PETERS:  Okay.  We'll start the
  3  questioning.  We'll start with Rachel.
  4              MS. GOSLINS:  First, I'd like to ask
  5  some questions of CCUMC.  I was gratified to see
  6  specific examples in your testimony because that's
  7  something that's very helpful to us as we try and
  8  figure out impact as we go along.  I had some
  9  questions about the specific examples you were
 10  citing to, so if I could just ask you some questions
 11  about those.
 12              The first bullet point in your examples
 13  is the DVD example of needing to play clips
 14  simultaneously in Quicktime windows.  I guess I was
 15  unclear about how access controls are a problem in
 16  doing this.
 17              MR. CLARK:  Well, until the advent of
 18  the decryption, because of a key that was left open
 19  in the DVD encryption and the cases that have
 20  resulted from that, you could not copy DVD either in
 21  an analog format or a digital format into another
 22  piece of software like Quicktime to perform this
 23  kind of teaching purpose.  I guess the access issue
 24  involved in this, was that that broken code is
 25  what's under litigation along with the people who
 26  have disseminated it.






                                                   PAGE 82
  1              MS. GOSLINS:  All right.  Just so I can
  2  clarify, so you needed -- the instructor in this
  3  case needed to use the DeCSS in order to copy the --
  4              MR. CLARK:  I'm sorry.  Yes, that's
  5  right.  In the case a teacher could use it for the
  6  purpose that was cited in the example \226 to copy into
  7  another software application \226 not the purpose that
  8  was given by the people who had found the decryption
  9  and publicized it, which was so they could play it
 10  on their Linux-based computers.
 11              MS. GOSLINS:  Yes, we've heard of that
 12  issue.  So the issue there was that --
 13              MR. CLARK: The mechanism that would
 14  allow this purpose, teaching purpose, as well as the
 15  Linux playback.  Yes.
 16              MR. CARSON:  Let me just get some
 17  further clarification.  Was the problem there -- the
 18  problem there wasn't one of access but of the
 19  inability to copy to another medium.  Is that the
 20  problem?
 21              MR. CLARK:  Well, it has to be accessed
 22  before it can be copied.  In this case, clips for
 23  comparative purposes into a different piece of
 24  software.  But do to that, you have to get into the
 25  DVD which, until this DeCSS came along, was not
 26  possible.






                                                   PAGE 83
  1              MR. CARSON:  Okay.  We're going to be
  2  talking about that issue with some other people
  3  who'll be testifying specifically on that later, but
  4  let me see if I can get some clarification so I can
  5  understand the nature of the problem here.  Had this
  6  instructor been using Windows 98 operating system
  7  rather than Linux, would that instructor have been
  8  able to accomplish what he or she wanted to do or
  9  would he or she still have had to circumvent
 10  something somehow?
 11              MR. CLARK:  Right.  No, they would not
 12  be able to do that because this involved focusing on
 13  simultaneous comparative playback of just specific
 14  instances that had to be lined up.  It's not, to my
 15  knowledge -- and I'm the only one here currently
 16  who's at a media center that offers some technology
 17  support for these things in classroom.  I don't even
 18  know of a cumbersome way yet to do exactly what's
 19  done in this teaching method without recopying and
 20  manipulating by virtue of another piece of software
 21  the clips that are needed.
 22              MR. CARSON:  So someone using a Windows
 23  98 machine, for example, would not have been able to
 24  accomplish that without in some way circumventing
 25  some form of technological protection?
 26              MR. CLARK:  Well, what they would be






                                                   PAGE 84
  1  able to do is, if they had Windows 98 and a DVD Rom
  2  drive in their computer, they could play back the
  3  DVD as they would in a normal DVD video player and
  4  not have the problem that people who had a computer
  5  with Linux do.  But basically they'd be playing it
  6  back like you'd play back two videotapes, too,
  7  trying to jockey them around when the purpose of the
  8  lesson is more exact -- and it may be embedded in a
  9  larger presentational context, the kind of thing
 10  that these fair use guidelines have outlined for
 11  educational media.  They'd be putting it in another
 12  piece of software and having just clips of what they
 13  needed lined up and replayable at certain points,
 14  calibrated and set up -- rather than just
 15  simultaneously spinning two disks, which is less
 16  exact.
 17              MS. GOSLINS:  Okay.  The second bullet
 18  point talks about problems working the Oxford
 19  English Dictionary on a data projector.  And while
 20  I'm entirely sympathetic to the problems of trying
 21  to get technologies to work together, I guess I'm a
 22  little unclear on how that's an access control
 23  problem.  Was it that they couldn't access -- there
 24  was access controls that were preventing them from
 25  projecting?
 26              MR. CLARK:  It was an unidentified






                                                   PAGE 85
  1  problem \226 perhaps should be limited and not
  2  generalized too much as an example.  It's an
  3  unidentified control problem of some kind in the
  4  set-up they use repeatedly for other CD-Roms that
  5  worked fine, but it would not play back this
  6  particular title.
  7              MS. GOSLINS:  So it's not clear whether
  8  that was a problem of access controls or inability.
  9              MR. CLARK:  It's not clear entirely, or
 10  could be another anomaly in the software encoding.
 11              MS. VOGELSONG:  I think one of the
 12  things that media centers are constantly dealing
 13  with is trying to anticipate all the needs at your
 14  educational institution and buy a range of software
 15  that's going to fit the classroom, but you find
 16  yourself in unusual situations where there is a
 17  disabled student in a class and suddenly the class
 18  gets shifted to another classroom and it's coming up
 19  in the next afternoon and you have to prepare the
 20  material that the faculty member is anticipating so
 21  you might not be using the equipment you thought you
 22  were using and you need to exercise fair use to be
 23  able to make it accessible. Those are the kinds of
 24  unexpected situations that come up where if you're
 25  dealing with encrypted information, you can't have
 26  any flexibility in having access to it.  You're






                                                   PAGE 86
  1  really limited in what you can do for that class.
  2              MS. GOSLINS:  The third bullet point
  3  talks about the Adobe Photoshop software and, as far
  4  as I can tell, students were copying images out of a
  5  database to which they had licensed access into
  6  another program and then manipulating the images in
  7  that program.  Is that correct?
  8              MS. VOGELSONG:  In that particular case,
  9  yes.
 10              MS. GOSLINS:  So again -- I'm sorry to
 11  keep harping on the same thing but again, my
 12  question is how is access control at issue there?
 13  Assuming you had licensed access to the database, if
 14  you're copying the images into another program, that
 15  would seem to be an issue about copy controls.
 16              MS. VOGELSONG:  Actually, in that
 17  particular case, it wasn't but the person who
 18  brought this example forward was saying for some
 19  other image databases, if there were encryptions or
 20  limits on their ability to put it in other software,
 21  then that would preclude that kind of study.
 22              MS. GOSLINS:  But that would be a
 23  copying issue.  Right?  I mean controls that
 24  precluded you from taking an image out of one
 25  database and putting it somewhere else would be a
 26  control that affected your ability to copy it and






                                                   PAGE 87
  1  not your ability to access it.  Right?
  2              MS. VOGELSONG:  I suppose to some
  3  degree.  I have problems sorting that out as a media
  4  facilitator.
  5              MS. GOSLINS:  On the fourth bullet
  6  point, which is the restrictions on number of
  7  simultaneous users, you describe these as licensing
  8  restrictions and I just want to make sure that I
  9  understand whether these are restrictions operating
 10  through contract or whether these are actually
 11  technological restrictions, you know, after 20 users
 12  are on the server, it refuses access.
 13              MR. CLARK:  They can be both kinds of
 14  restrictions, both technological and licensing.
 15              MR. CARSON:  To clarify, I assume that
 16  the technological restriction, if it's there, is
 17  there because you had a license which said you can
 18  use up to X users and a technological restriction
 19  was placed on that saying, after X users, nobody
 20  else gets on.
 21              MR. CLARK:  Right.
 22              MR. CARSON:  And, therefore, I assume
 23  there would have been freedom to contract for more
 24  users had you determined it was necessary.  Is that
 25  accurate or not?
 26              MR. CLARK:  That would be accurate, but






                                                   PAGE 88
  1  the example we were trying to point up is that the
  2  in-class instruction on how to use the database is
  3  more comparable to a fair use of it.  It is not
  4  using its intellectual property for the content but
  5  showing the students how to use it -- now, when you
  6  go to the reference area, this is how you do it.
  7  But if they can't access it while they're in class,
  8  they're losing real time because there are already
  9  too many users in the reference area on the
 10  database.
 11              MS. GOSLINS:  And then my last point is
 12  actually a different question but it's based on the
 13  last bullet point.  The suggestion was interesting
 14  to me of using circumvention measures such as proxy
 15  servers to gain access for remote students who would
 16  not otherwise have access, and it's great to hear
 17  that because I asked the question to another panel
 18  about in what instances now under the state of the
 19  laws that exist now in which it's not criminal to
 20  circumvent access control protections are libraries
 21  being forced to either circumvent these access
 22  controls or forego what they consider a fair use.
 23  And I think I phrased the question wrong because
 24  nobody wanted to admit to circumventing anything
 25  because I was going to make a citizen's arrest or
 26  something.






                                                   PAGE 89
  1              But putting it on the table that you're
  2  not confessing to anything, it would be very helpful
  3  for me to know from the functioning librarians in
  4  the group what situations you currently find, given
  5  that access controls are around and have been around
  6  already for a little while, you find it necessary to
  7  circumvent these kind of controls in order to make
  8  what you consider fair uses of the work.
  9              MR. CARSON:  And we know you won't be
 10  doing it after October -- don't worry about it.
 11              MS. VOGELSONG:  Clearly, it's the same
 12  situation.  Most of the databases that we acquire
 13  are run off a campus server and are identified by IP
 14  address or it could be password, and the only way
 15  our users, who increasingly work from home or even
 16  campuses that are not adjacent to our main campus,
 17  even though we've licensed for that number of users
 18  or to accommodate them, can reach those databases
 19  and is to resort (in my particular case, on a
 20  consortium-wide university basis) to using proxy
 21  servers to help provide access to those materials.
 22  I don't think any of the people we're licensing
 23  products from have any problem with that, but it, as
 24  I read the provision, would technically be a
 25  circumvention.
 26              MS. SOULES:  You're looking to me now, I






                                                   PAGE 90
  1  can see.  I think the difficulty here is -- well, in
  2  one of my examples, when I'm talking about vendors
  3  who say, well, you can use this for teaching but you
  4  can't use it for research.  How is a faculty member
  5  or a Ph.D. student or an MBA or even a BBA student
  6  supposed to make such a distinction?  It gets
  7  tougher and tougher as you get up through the higher
  8  education ladder, you know, once you get to Ph.D.
  9  And if you're a faculty member and you're in an
 10  institution like the University of Michigan, whose
 11  primary mandate is research and secondary mandate is
 12  teaching, how do you  make the distinction?
 13  Besides, the one feeds on the other.  You're sitting
 14  there and you're saying, well, I'm preparing this
 15  class but, you know, I was doing this research and I
 16  need to find out XYZ, and then they find that out
 17  and think, hey, I can put that in my class.
 18              I mean life is synergistic, seems to me,
 19  and I'm sure that all of us do that.  I mean I learn
 20  things from reading the New Yorker, for example,
 21  that I bring to work as a librarian in a business
 22  library, which you wouldn't necessarily think would
 23  happen.  I mean there are synergies taking place
 24  and, in deed, your life is seamless.  You don't
 25  compartmentalize it to the extent that you make
 26  decisions that this is for a class, this is for a






                                                   PAGE 91
  1  project, this is for research, this is for teaching.
  2              And some of it comes from the fact that
  3  vendors, some of the vendors I deal with have not
  4  perhaps dealt with the academic market before and
  5  don't understand how it works and, of course, it
  6  becomes part of my job, at any rate, to try to
  7  educate them about that.  But there have been
  8  occasions where vendors have been quite recalcitrant
  9  about these things and have been extremely insistent
 10  that it's only to be used for this narrow purpose.
 11              How am I going to help anybody, my
 12  students, my faculty, to understand when they can
 13  use it, when they can not, and how are they going to
 14  continue to do their work and really learn from this
 15  synergistic environment when those kind of
 16  restrictions are put on?
 17              MS. GOSLINS:  And in those situations,
 18  do you find yourself in a situation where you have
 19  to actually circumvent the access control
 20  protections that these database owners or publishers
 21  put on their works or do you try and forego those
 22  uses?
 23              MS. SOULES:  It's always been an ad hoc
 24  case-by-case basis.  Okay.  I'm thinking of one
 25  example in the past where we had a vendor who was
 26  quite insistent on a database being used only for






                                                   PAGE 92
  1  certain purpose and, as a result, a library in
  2  California actually put up a posted sign.  I'm
  3  talking about posterboard right next to the
  4  computer.  I'm not talking about anything
  5  electronic. It explained this in their choice of
  6  words to their patrons walking in the door.  We
  7  didn't have remote access in those days.  And the
  8  vendor representative happened to be visiting the
  9  library, saw the sign, didn't like it.  Next thing
 10  you knew, the contract was canceled and they were
 11  not allowed to use the database at all.  It was
 12  taken away.  And the end result was they had to get
 13  their own institutional lawyers to go to bat for
 14  them in order to have it restored.
 15              MS. PETERS:  That sounds more like a
 16  contract issue than an issue of a technological
 17  protection measure that a content provider adds to
 18  his work in order to restrict access, like
 19  passwords.  So I guess this really runs through a
 20  lot of when I hear you can't separate access from
 21  use in a lot of the comments.
 22              MS. SOULES:  That's right.
 23              MS. PETERS:  But I guess my question has
 24  to do with in many ways, isn't it really the terms
 25  of the contract that you're having great difficulty
 26  with as opposed to an access control?  I mean there






                                                   PAGE 93
  1  isn't access control #1 for teaching, access control
  2  #2 for research, and when I go into the database, I
  3  hit teaching and then when I go to do research, I
  4  hit a different one.  Isn't it really the contract
  5  itself that has the restrictions?
  6              MS. SOULES:  May I ask a question back?
  7              MS. PETERS:  Oh, sure.
  8              MS. SOULES:  I guess my question back is
  9  technically I think you're quite right.  It is a
 10  contract issue.  There's no doubt about that.  But
 11  what I'm concerned about here is -- well, I guess
 12  I'm concerned about two things.  First of all, I
 13  don't know how to separate them out any more.  I get
 14  a contract that tells me I don't have fair use
 15  rights.  The vendor says, well, tough petuties, you
 16  don't get them.  That vendor perhaps is the sole
 17  source provider of information that my faculty and
 18  students need.  I don't think I should have to go
 19  back time and time again and argue for my fair use
 20  rights.  So I feel that I would have to circumvent
 21  technologically in order to exercise that fair use
 22  right to allow a student or a faculty member to cite
 23  from that work in order to do what he or she is
 24  doing.
 25              MS. PETERS:  Okay.  Take your example.
 26              MS. SOULES:  Okay.






                                                   PAGE 94
  1              MS. PETERS:  You wanted access to the
  2  work, you resent tremendously that it says you can't
  3  do what you believe to be fair use.  If you sign the
  4  contract, you then have, quote, "access to the
  5  work."  Isn't it separate from the gaining of that
  6  access how you use that work and whether or not that
  7  use violates your contract?
  8              MS. SOULES:  Well, the truth is if the
  9  vendor has total control over the content and will
 10  only give you use of that content under restrictions
 11  entirely controlled by the vendor -- I'm back to my
 12  balance issue again -- and that's all the vendor
 13  will give you, then you have two choices.  You can
 14  sign the contract and completely give up all your
 15  rights to fair use and everything else, or you have
 16  to go without that information.
 17              MR. CARSON:  Here's the problem I think
 18  we're having though.  I could agree with everything
 19  you've said up until now, and I agree with a good
 20  deal of what I've heard, but I don't think
 21  technological protection measures are so
 22  sophisticated that they can detect the nature of the
 23  use you're engaging in and shut you out when it's
 24  for teaching and not when it's for research or vice
 25  versa.  You may have a very valid point about the
 26  contractual restrictions that are being imposed upon






                                                   PAGE 95
  1  you.  It doesn't sound to me like it has anything to
  2  do with technological measures that restrict access.
  3  You either have access or you don't in terms of the
  4  technology.  You've got contractual restrictions
  5  that say you don't.  What am I missing?
  6              MS. SOULES:  I listened to testimony
  7  this morning where a gentleman was talking
  8  futuristically at your request about the things that
  9  they're going to put into place.  I can assure you
 10  those technological capabilities are going to be
 11  here long before three years is up.
 12              MR. CARSON:  Sounds like science fiction
 13  to me, but I need more than your word for it, I
 14  think, to take it seriously.
 15              MS. SOULES:  Okay.  What do you think?
 16  You're the IT guy here.  I'm really being mean now.
 17              MR. PETERSEN:  I was waiting for that
 18  question, IT guy, because that's the danger of being
 19  with the Office of Information Technology, even
 20  though I'm really a lawyer by training and the like.
 21  One of the things that occurs to me -- and again, I
 22  hate to keep harping on this relationship with the
 23  UCITA experience and the contract issue, but we had
 24  grave concerns during those debates about the issue
 25  of self help and the ability, and I think a lot of
 26  the focus here is on these negotiated licenses that






                                                   PAGE 96
  1  are going to kind of be centrally controlled and
  2  turning them on or off is going to be kind of
  3  centrally managed whereas I think the reality is in
  4  the very near future we're not going to have central
  5  access to everything, that we're going to have
  6  individuals buying their e-books or their textbooks
  7  or their computer software, and so those
  8  technological measures are going to be on the
  9  computer, on the work station.
 10              And so I think there's a very fine line
 11  and I anticipate there'll be a relationship of how
 12  technological measures are used, A) to enforce the
 13  contract and, B) to possibly eliminate the access
 14  altogether.  And that's an issue I think that can --
 15  and by the way, in Maryland, the self help
 16  provisions, that was one of the significant
 17  amendments wherefore those mass market purchases,
 18  which would be the individual faculty, staff member,
 19  student, self help was not an option, and so we're
 20  happy to know that hopefully won't affect us.  It
 21  may affect other people.  So it's a fuzzy
 22  relationship and I think we will begin to see that
 23  as a management control, not necessarily just at the
 24  digital library level, but at the individual work
 25  station information access level.
 26              MS. GOSLINS:  I just have another brief






                                                   PAGE 97
  1  question for Ms. Soules.  I just wanted to clarify.
  2  You mentioned in your testimony that vendors require
  3  your library to maintain print in addition to
  4  electronic formats, and I'm just curious as to why.
  5  Do you know why that is?
  6              MS. SOULES:  Well, I can speculate,
  7  although I suspect you should ask publishers about
  8  that.  But I suppose my speculation would be along
  9  the following order.  First of all, I think some of
 10  it is fear.  They're afraid that they will lose
 11  their revenue stream.  I think that's one reason.
 12              MS. GOSLINS:  Wouldn't it just be
 13  substituted?  You're paying for the electronic
 14  version instead of the print version?  The reason
 15  that I'm focusing on this is we've heard the
 16  opposite.  We've heard there's strong fear that all
 17  media formats are going to move to electronic and
 18  then people will not have any print backups from
 19  which they can make fair uses or which they can
 20  archive and preserve.  So it was just interesting to
 21  me to see the opposite, to see a publisher-initiated
 22  opposite result occurring in your library.  So I
 23  just wanted to know a little more about that.
 24              MS. SOULES:  Well, first of all, I think
 25  there is a fear that eventually there will be
 26  electronic -- first of all, I should say there






                                                   PAGE 98
  1  really are three categories of journals now.  There
  2  are print ones, there are electronic ones, and then
  3  there are ones where it's available in both formats.
  4  But in cases where the campus at large has
  5  negotiated licenses with -- I can think of three
  6  publishers now, they have required us not only to
  7  maintain print, they have also required us to
  8  guarantee that over a certain length of time of the
  9  contract -- two years, three years -- we will not,
 10  we will agree not to cancel journals if we find that
 11  they are not -- let's say I decide I don't need
 12  journal X any more.  It's not being used or whatever
 13  reason.  I'm not going to be able to cancel it.
 14  Usually, what happens is you find that the way they
 15  price it, and pricing models, as the gentleman
 16  mentioned this morning, there are going to be
 17  experimentations of the pricing models all over the
 18  place. But the reality is that when you get a
 19  pricing model, generally what they do is they'll
 20  charge you so much for one format and then you get a
 21  discount on the other format.  But the reality is if
 22  you just want the electronic format and not the
 23  print format, the price is out of reach.  So you end
 24  up signing a contract where you guarantee you will
 25  keep the print.
 26              I have always thought that some of it






                                                   PAGE 99
  1  was based on fear of loss of revenue stream.  Also,
  2  I think some of it has to do with the fact that
  3  there are some environments where print is really
  4  what the customer wants and they can only make that
  5  print fiscally viable if there are sufficient copies
  6  sold, and I think that's perhaps another driver.
  7  But I'm saying that with the caveat that it's a
  8  question the publisher preferably should be
  9  answering for you.
 10              MS. GOSLINS:  And does that not allay
 11  any of your fair use fears?
 12              MS. SOULES:  Not in the slightest
 13  because I can't --
 14              MS. GOSLINS:  Even though you will
 15  always have the physical version.
 16              MS. SOULES:  Well, first of all, I don't
 17  think I always will have the physical volume.  And
 18  secondly, don't forget in one sense, strange as this
 19  may seem, part of these package deals force me to
 20  aggregate my selection rights.  Let's say I have a
 21  publisher and the publisher has 50 journals and he
 22  makes available an electronic version in a package
 23  deal.  The truth is I may only carry certain ones of
 24  those in print form, but I'm required to keep those
 25  on.  I have to take on the rest of the other 50, but
 26  I have to keep the others on.  I may not need all 50






                                                   PAGE 100
  1  of them in my particular library setting.  So I
  2  usually have to take them all though, and then I
  3  have to guarantee that I won't cancel the print.
  4              Well, let's say I have 20 of them in
  5  print form.  So I get 30 that would only be in
  6  electronic form because I never carried them in
  7  print before, and I have the remaining 20 in both
  8  electronic and print form.  But the truth is I need
  9  maybe three or four of them, those core ones, in
 10  both print and electronic form but I really don't
 11  need the other ones in both print and electronic
 12  form and, in my ideal world, I would choose which
 13  format I wanted.  But I aggregate that in order to
 14  get the contract for the electronic.  It sounds a
 15  little confusing.
 16              MS. GOSLINS:  I think I understand.
 17              MS. SOULES:  Thank goodness I've made
 18  something clear to you.
 19              MS. GOSLINS:  I'm done with my
 20  questions.
 21              MS. PETERS:  Okay.  Charlotte.
 22              MS. DOUGLASS:  I just have a couple of
 23  general questions.  Yesterday we heard about -- on
 24  applicability of fair use to 1201(a)(1) in terms of
 25  there being a distinction between non-infringing
 26  uses and fair uses, and on a certain level you can






                                                   PAGE 101
  1  see that because there are specific non-infringing
  2  uses in 108, 109, specific narrow fair uses --
  3  narrow non-infringing uses rather -- and then fair
  4  use is a different kind of quantity because the
  5  determination might be made after the fact that
  6  something is or is not infringing.
  7              So my question is, how do you respond to
  8  the statement that fair use does not apply to the
  9  anti-circumvention part of our deliberations, that
 10  we're really talking about non-infringing uses and
 11  perhaps licensed use?
 12              MS. SOULES:  Can I ask a question and
 13  ask how are those distinctions made between fair use
 14  and non-infringing use?
 15              MS. DOUGLASS:  Fair use, some people
 16  say, is something that a court has to decide.  First
 17  of all, you have to decide it's infringing and then
 18  the court has to decide, based on applying the
 19  factors.  So I'm just asking whether you agree that
 20  fair use is not at issue but we're really talking
 21  about non-infringing uses and we're talking about
 22  perhaps licensed use.
 23              MR. PETERSON:  The reaction I have to
 24  that statement is that perhaps the way it's -- and I
 25  think it's referred to in the notice as non-
 26  infringing uses comma including fair use, because --






                                                   PAGE 102
  1  and I see this in my education and discussion of
  2  what fair use is.  I used the word exemptions
  3  because in education we have many exemptions above
  4  and beyond fair use.  So I guess that would be the
  5  distinction I would make is that fair use is
  6  probably the preeminent issue, but there are many
  7  more non-infringing uses like the face-to-face
  8  teaching, etcetera, that we would want to equally
  9  preserve.
 10              MS. VOGELSONG:  I would also say that,
 11  although fair use is technically a defense, that
 12  very few educators understand it as such and, in
 13  fact, that the way it is taught at our institutions
 14  is that we teach people - or try to teach people -
 15  to make that analysis before they make the use, so
 16  it seems appropriate.
 17              MS. DOUGLASS:  I guess another question
 18  that I have is I know you have given some specific
 19  examples of where you feel there has been an adverse
 20  effect.  Do you feel that those adverse effects are
 21  because of the anti-circumvention provisions or
 22  could those adverse effects be for some other
 23  reason?  The adverse effects that you mentioned.
 24              MR. CLARK:  I think we feel that most of
 25  them are.  I've been thinking about this since we
 26  were talking about access and use and trying to






                                                   PAGE 103
  1  think of the problem a little differently, and this
  2  may have a bearing on the examples, too.  There were
  3  a couple of key sentences when we got to that point
  4  related to sometimes access and use provisions or
  5  security measures being inextricably bound together
  6  sometimes.
  7              There's a question, and I think a real
  8  concern, among educators here.  I know I have a
  9  concern that there may be semantic differences which
 10  will reach the stage of legal actions when some
 11  things are done in the name of fair use.  When we're
 12  talking about access, for example.  My institution
 13  buys an image database, to go back to that one.  We
 14  have access to it in the form it's in.  Now, if we
 15  want to do some of the manipulations that we
 16  mentioned in the example of taking the images out
 17  for using them as source material and designs or
 18  comparative side-by-side, that sort of thing, yes,
 19  that's copying if they're removed from the database.
 20  That could also be considered another level of
 21  access.  Oh, your license didn't provide that sort
 22  of access.  Your access is the database.  Why are
 23  you removing them from the database?   That involves
 24  at least semantically what could be called access
 25  before you get to copy it.  And it's sort of, I
 26  guess, along the lines of the problem that we've had






                                                   PAGE 104
  1  to sort out with computer software and making a
  2  transient copy to be able to read it, whether it's
  3  off the Internet or somewhere else on the network,
  4  whether that qualifies as an actual copy or not.
  5  Even though that may not be completely an access
  6  issue, there's a semantic issue in there that had to
  7  be cleared up.
  8              MS. VOGELSONG:  Just to elaborate on a
  9  different example, I was concerned this morning to
 10  hear the gentleman from the recording industry talk
 11  about a Phase 2 technology which would require
 12  different equipment to operate.  Well, if you are an
 13  educational media center and you invest in Phase 1
 14  technology and the accompanying software, what do
 15  you do when Phase 2 comes in the door and you're
 16  expected to deliver it to a class and you have a
 17  lawfully acquired copy of that content?
 18              MS. DOUGLASS:  So you consider access or
 19  do you consider access to be more than initial
 20  access, maybe access --
 21              MS. VOGELSONG:  Subsequent access, as
 22  well.
 23              MS. DOUGLASS:  -- re-access.
 24              MR. PETERSON:  And one of the topics
 25  that's come up a lot here that troubles me, and I'm
 26  trying to think it through, is this notion that,






                                                   PAGE 105
  1  again, it's hard to separate when it's an access
  2  control issue versus a licensing issue.  But in the
  3  absence of a contract term dealing with this, what
  4  happens when you don't renew a subscription and what
  5  about the access to past issues?
  6              I mean I can think of many examples.  In
  7  fact, when I came to the University of Maryland in
  8  1992, we were going through severe state budget
  9  crises and so our library discontinued subscriptions
 10  to certain journals and one that some of us might
 11  have interest in is the Journal of College and
 12  University Law.  I guess I was probably one of six
 13  people on the campus that looked at it, and they
 14  said let's stop the subscription.  Well, that 1992
 15  and in my research over the past 10 years, I've many
 16  times had to go back to that area of the stacks and
 17  access those old editions of the Journal of College
 18  and University Law because they're there and I can
 19  do that.
 20              What concerns me is that if those were
 21  licensed or available only online and in 1992 we
 22  couldn't afford to pay the subscription, the adverse
 23  impact is I don't have access to those prior issues.
 24              MS. PETERS:  Isn't that an issue for
 25  every library, I mean, in the world?
 26              MS. SOULES:  Probably.






                                                   PAGE 106
  1              MS. PETERS:  And the question s, how do
  2  you make sure that at least someone preserves it or
  3  someone is going to be able to provide access, and
  4  that would be true whether or not there ever was a
  5  1201 or an issue with regard to access.
  6              MR. PETERSON:  Well, the other
  7  observation I have, and this is probably where I'm
  8  an outsider as a non-librarian, but this whole
  9  preservation access issue, which I know there was a
 10  lot of discussion about yesterday and may not be
 11  directly  relevant to the rulemaking, is a
 12  fundamental issue.  And I think it goes to my
 13  concern about what I called the commercialization of
 14  information or maybe even the privatization.  The
 15  one thing I do value about the libraries is that
 16  preservation and access role, that I know I can go
 17  to our library on campus and find that prior
 18  edition.
 19              But when that process is taken over and
 20  controlled through technological means by some third
 21  party who may or may not be around or may or may not
 22  have the incentive to preserve every single edition,
 23  only the ones that have some economic value, that
 24  concerns me a lot.
 25              MR. KASUNIC:  I have a couple of
 26  questions, and I guess mostly just in general to






                                                   PAGE 107
  1  anybody or everybody.  But we have some fairly
  2  specific requirements in terms of what evidence that
  3  we have to find here and there are some specific
  4  statements in the legislative history that evidence
  5  that is speculation or conjecture is just not
  6  sufficient for findings in this area.  I noticed as
  7  I was going through some of the examples that were
  8  cited in the statements as we went along and the
  9  words being used in many instances are "could" and
 10  "may" and I'm just trying to find out: are there
 11  some specific instances of some of these different
 12  areas -- I guess there's a couple -- where there are
 13  specific classes.  I know there's some carryover and
 14  it's sometimes difficult to, that this could affect
 15  and may affect a lot of different works -- but are
 16  there specific classes of works? And, if you'd help
 17  define what that term is, that would be helpful as
 18  well. One thing that was mentioned was where access
 19  measures blend and bind inseparably access and use
 20  controls.  Let's, I guess, start with that.  Are
 21  there any specific works or specific classes of
 22  works where these access and use controls are being
 23  bound inseparably where it's having an adverse
 24  effect?
 25              MR. CLARK:  I don't know, apart from
 26  getting to at least the substantially arguable case






                                                   PAGE 108
  1  of the DVDs again.  I haven't got wide enough
  2  experience to know if there are.  I think part of
  3  our concern though is that because if these things
  4  develop in the intervening period between reviews,
  5  that sort of puts educators at a disadvantage until
  6  they're next brought up because the market is
  7  changing, the technology is changing so rapidly that
  8  these things can come up.
  9              MS. VOGELSONG:  When we first started
 10  using digital image databases like Corbis we had
 11  very restrictive access to them and then it changed.
 12  We started out talking about AMICO and we were going
 13  to use a particular example from that database and
 14  we realized that they had readjusted their format
 15  since we had started writing this testimony, and so
 16  it's just a constantly changing picture for
 17  educators, and I think that's some of our concern.
 18  To name a class of works when the structure, the
 19  composition, the range of these databases and
 20  conglomerate formats is changing month to month.
 21  And so it's hard to pin something on a particular
 22  class, and I think that is part of our concern here.
 23  Given what we've seen in recent history, we have
 24  great concern that the access can change
 25  substantially over a short period of time.
 26              MS. SOULES:  It can also change -- it






                                                   PAGE 109
  1  was interesting listening to the gentleman this
  2  morning talking about CDs, and I realize he was
  3  talking about music, but I have banks of CDs in my
  4  library.  He said, well, they were a few years old.
  5  But the reality is I had some CDs that were close to
  6  25 years old and he was quite right in saying that
  7  they weren't all that reliable.  The truth is, you
  8  want to talk about technological measures, they're
  9  totally unreadable today.  There isn't a piece of
 10  equipment that will allow them to be read.  You just
 11  take them out to the trash dump.  That's it.
 12              And I think that's one of the issues
 13  that takes us back to archiving.  You're talking
 14  about classes of works, and I realize I'm talking
 15  about formats, so I know that.  But the reality is a
 16  technological measure is actually a format in
 17  itself.  If you issue it in a book, a printed book,
 18  that is a form of technology and I'm sure in days of
 19  -- scrolls they looked at books and thought, oh,
 20  what is this new thing?  A CD is a technological
 21  measure.  A 16 BPI tape is a technological measure
 22  in itself, and maybe we not only have a linking of
 23  access and use and content, we also have embedded in
 24  there format in itself because they turn over so
 25  rapidly.
 26              I certainly agreed with the gentleman






                                                   PAGE 110
  1  this morning when he said CDs would be around in
  2  three years.  I don't know how readable they'll be,
  3  but they'll be around in three years.  But also
  4  there will be new formats and we'll need to be able
  5  to read them.  And I think that's why we haven't
  6  really relied on CDs and various other types of
  7  electronic formats at this point as an archiving
  8  medium.  We still use the microform and so on and so
  9  forth because we know it's going to last.  So in a
 10  sense, I look at format as a form of technological
 11  measure in itself.
 12              So when you're talking about classes of
 13  works, you asked about how to define it, but that
 14  adds a new spin to me.  I realize that isn't the
 15  traditional sense of a class of work, nonfiction or
 16  fiction or whatever it is, but I think unfortunately
 17  we've also got this blending of format that's rather
 18  determining a class of work.  So I'm sitting around
 19  saying, well, are CD-Roms a form of class of work
 20  and how am I going to have access to the information
 21  on it having, of course, already had to throw out
 22  some because they're unreadable.  I don't know if
 23  that helps any or makes it just worse.
 24              MR. KASUNIC:  I do understand the
 25  argument, although the specific example is of a past
 26  specific case and where, at the time, there wasn't






                                                   PAGE 111
  1  any access control measure. And that work could have
  2  been archived because he did have access to that
  3  work. He could have made at tape at that time.  So
  4  we're concerned with right now -- and we certainly
  5  understand the concerns of not knowing what's going
  6  to come up, but Congress did anticipate that and
  7  that's why we'll be back in three years.
  8              MS. SOULES:  I can't wait to see you
  9  again.
 10              MR. KASUNIC:  But different things can
 11  occur in that the market will change.  But aside
 12  from this inseparable binding, what specific works
 13  have been adversely affected? There was also some
 14  mention that there were specific works that were
 15  sole sources and only available in electronic format
 16  and with these access control measures.  So if you
 17  could cite some specific examples of these sole
 18  source works in which there's no other source and,
 19  again, inconvenience is not --
 20              MS. SOULES:  Understood.
 21              MR. KASUNIC:  -- an issue, but whether
 22  it's just available in some other source.
 23              MS. SOULES:  Well, the kind of
 24  electronic information I buy for a business library
 25  comes, as I tried to say in my testimony, vendors do
 26  different things.  Some are aggregators.  They put






                                                   PAGE 112
  1  information together and I have, for example,
  2  financial databases where they get raw data from
  3  various places all over the world and it comes in
  4  and it's fed in and they're the only ones who get
  5  that.
  6              I have a database, for example, that
  7  presents information country-to-country-to-country,
  8  and they have people out there and they're not just
  9  an aggregator.  They are a creator of information.
 10  They have people in those countries gathering data
 11  and they have people in those countries actually
 12  translating some of it into the English language so
 13  that when you get the database, on that database you
 14  have aggregated information, original research
 15  information, you have translated information.  I'm
 16  not going to be able to get that information for my
 17  customer from anyone other than that particular
 18  source.
 19              I have databases where, as we've talked
 20  earlier, they're essentially a compilation of
 21  journals that are in electronic format, some only,
 22  some also in print.  So again, I'm not sure if I'm
 23  helping here or making things worse, but I have a
 24  lot of sole source vendors and they can dictate
 25  whatever terms they like.  So from that point of
 26  view, I do get concerned about balance.  What you've






                                                   PAGE 113
  1  come back and told me earlier is that you don't see
  2  contractual issues as inextricably linked with these
  3  anti-circumvention regulations as I do is
  4  essentially where we're at, I think.
  5              But from my day to day experience, I can
  6  only tell you that I find myself functioning in a
  7  world where I have fewer and fewer controls, fewer
  8  and fewer abilities for fair use rights and things
  9  of that sort.  But if that is not your purview, then
 10  that is not your purview but in terms of classes of
 11  works, I mean databases are not all the same.  And
 12  I'm guilty of this, too.  I come and I talk to you.
 13  I say database this and database that and database,
 14  database.  But they're not all the same and, in
 15  terms of a class of work, there's original work,
 16  there's aggregated work, there's translation work,
 17  and it's all muddled together which is, of course,
 18  the heart of our problem, I think, generally.
 19              Is this helpful or problematic?
 20              MR. KASUNIC:  Yes.  And the access
 21  controls there are limiting your ability to make the
 22  non-infringing use? Because you mentioned that
 23  licenses are dictating the terms.  Is it the
 24  technology that's dictating the terms or the
 25  licensing agreement?
 26              MS. SOULES:  Well, you see, I don't see






                                                   PAGE 114
  1  them as separate.  That's the difference between us,
  2  because in my day to day world, if my customers can
  3  not get the information and I am no longer able to
  4  provide it in such a way that they can have fair use
  5  rights, as far as I'm concerned, some right has been
  6  abrogated somewhere.
  7              MR. KASUNIC:  Maybe if I put it this
  8  way.  If you were to breach the licensing agreement,
  9  is there then some measure that, technologically, is
 10  stopping you from accessing the work?  I'm just
 11  trying to understand --
 12              MS. SOULES:  If you're talking
 13  technologically today, probably not.  I don't expect
 14  that to be true for much longer, as I said earlier.
 15  Then I went and deferred to Rodney, like the coward
 16  I am.
 17              MR. PETERSON:  The only thing to add,
 18  and I understand this problem of dealing with a
 19  specific notice of rulemaking issue versus the
 20  broader issues, but I see it, I think, similarly.
 21  It's part of an arsenal, and I hate to put it in war
 22  type terms, but access control measures, just like
 23  self-help provisions and negotiated agreements,
 24  limiting fair use, all of those things build up in
 25  ways that can limit access and really make it
 26  difficult in the process of negotiations.  So this






                                                   PAGE 115
  1  is just one more means.
  2              MR. KASUNIC:  Are there any other
  3  instances?
  4              MR. CARSON:  I think just about everyone
  5  who's testifying right now, either in your prepared
  6  statements or your responses to questions, has
  7  expressed some frustration with and perhaps even
  8  objections to the requirement that we restrict
  9  exemptions only to certain classes of works.  Let me
 10  suggest that at least the frustration is shared by
 11  some people on this side of the table.
 12              Nevertheless, I guess my view is that is
 13  what the statute says and, starting from that point,
 14  is there anyone here who is asking us to ignore that
 15  pre-requirement and, if you're not asking us to
 16  ignore it, elaborate on how you expect us to deal
 17  with it.
 18              MS. SOULES:  Is it possible for you to
 19  suggest an exemption to all classes of works?
 20              MR. CARSON:  I wouldn't be the first to
 21  suggest it, but I would suggest --
 22              MS. SOULES:  Well, there are political
 23  realities that we all face, I guess, but from my
 24  point of view, perhaps the question is being -- I
 25  understand the question, unfortunately, but I think
 26  that's where I am, that it really needs to be all






                                                   PAGE 116
  1  classes of works.
  2              I understand that testimony was given
  3  earlier by Peter Jaszi and that testimony will be
  4  given tomorrow by Arnie Lutzker, and I think they're
  5  the people who may well be able to address this
  6  question more effectively for you than those of us
  7  sitting here because they're the ones who framed
  8  some of this in the first place, as I understand it.
  9  So I'm suggesting you go to the sole source.
 10              MR. CARSON:  If I can translate, perhaps
 11  what I'm hearing is you're the folks who are telling
 12  me what the problem is and the solutions you'd like
 13  to see and perhaps people like Peter and Arnie are
 14  the people who can try to give me the legal
 15  framework to do what you're asking.
 16              MS. SOULES:  I'm certainly hoping so
 17  because -- well, he's a lawyer, but I'm not a
 18  lawyer.
 19              MR. PETERSON:  Two arguments I would
 20  make.  One is echoing what was said yesterday, is
 21  that the extent to which the focus can be upon the
 22  use of the work is certainly my preference and my
 23  comments today tried to emphasize those two
 24  questions because those are what are important to us
 25  in terms of who we are and how we use them.
 26              The second issue, however, though that






                                                   PAGE 117
  1  goes more to this class of works issue.  One of the
  2  reasons it frustrates me, too, to have that in the
  3  legislation is it's the kind of complexity that's
  4  been brought to some of the distance education
  5  issues where they've tried to slice up what kinds or
  6  classifications of work you can and can not use, and
  7  it creates mass confusion, quite frankly.  And so
  8  the extent to which we could focus less on classes
  9  of use and make all of them game and focus on how
 10  they're used, that is the framework within which I
 11  think it's easier for me to educate my faculty and
 12  my students and for me to understand what the rules
 13  are.
 14              MS. PETERS:  Distance education was much
 15  easier because they use the statutory
 16  classification, and then the question is why?  Why
 17  are some in and why are some out?  This is a much
 18  more difficult exercise.
 19              MS. SOULES:  You know as well as I do,
 20  you go back through the law and what happened was
 21  you started with something very simple and, as new
 22  formats of work were created, they kept being added
 23  to the copyright law, and I suppose I'm having
 24  difficulty understanding why we now want to separate
 25  them all out again.
 26              MS. PETERS:  Because it's an exemption.






                                                   PAGE 118
  1  Because you craft an exemption as narrowly as is
  2  needed.  What you're all saying is where we sit,
  3  it's all classes of works and you should be focusing
  4  on the use.  Unfortunately, that's not the way the
  5  task was crafted.  But I guess we hear where you
  6  are.
  7              MS. VOGELSONG:  We liked Peter Jaszi's
  8  definition, incidentally.  I think ``lawfully
  9  acquired'' elements are certainly reasonable. It
 10  seems to me, if that can be considered part of a
 11  class component, it is a reasonable thing.
 12              MS. PETERS:  Are you saying that his
 13  definition works for you?
 14              MS. VOGELSONG:  Yes.
 15              MR. PETERSON:  Well, but one of the
 16  concerns I had in reading that -- it's back to this
 17  ownership versus licensing issue, and I think his
 18  language that was used was something about lawfully
 19  acquired.
 20              MS. PETERS:  His is lawfully acquired.
 21              MR. PETERSON:  Lawfully acquired copies,
 22  I think is the language he uses.  And I'm very
 23  concerned, having been through the UCITA experience,
 24  that that may be meaningless in a world where you
 25  don't own a copy.  You license the use.
 26              MS. VOGELSONG:  I guess I was assuming






                                                   PAGE 119
  1  that if you were licensing, it was lawfully
  2  acquired.
  3              MS. SOULES:  I don't feel I'm acquiring
  4  very much these days.  I think I'm just in my
  5  apartment now instead of in my house.
  6              MR. PETERSON:  Sounds like Peter's
  7  answer raises as many questions as it answers.
  8              MS. PETERS:  May be.  Almost everybody -
  9  - and some of us have jumped in.  On the CCUMC side,
 10  you expressed concern about paper use and that that
 11  would become a model, and I guess my question is do
 12  you perceive that as inherently unfair and, if so,
 13  why?
 14              MR. CLARK:  Well, inherently unfair
 15  because if the entire copyright law still applies,
 16  there are uses which are fair for which you don't
 17  have to ask permission and payment is a form of
 18  permission in the process.  I think there are some -
 19  - you know, I can only speak for myself and probably
 20  some of my colleagues and there are probably some
 21  larger issues, too, that I've been thinking about
 22  recently.  But it relates to restrictions that can
 23  be put within that framework of how things can be
 24  used once they're at
 25  -- that affect how, for example, these things which
 26  we refer to as cultural expressions that might be






                                                   PAGE 120
  1  used in teaching can be used in context and whether
  2  they can be put in contexts that are analytically
  3  unfavorable to them or whether they're going to be
  4  restricted in certain ways if there isn't this
  5  latitude for fair uses for teaching, research, and
  6  so on that are outside of the control of any
  7  individual vendor who holds copyright.  And we think
  8  that's important, too, at least I do and I know a
  9  lot of my colleagues do.
 10              And I think the other concern is not
 11  directly related \226 the one where we've been thinking
 12  about access and use and where the two may be
 13  confused and where licensing issues may be involved.
 14  To sort of reiterate, if I feel confident in the
 15  interpretation of this section that access, what
 16  access meant and that it didn't mean the things we
 17  could do with fair use that involve forms of
 18  playback or copying \226 that it  did not involve
 19  access in it at all -- I don't think we'd have a
 20  beef at all.  But there is a concern that it will be
 21  defined that way legally, by legal action, and also
 22  in terms of the way the software is constructed, as
 23  a basis for a legal argument.
 24              We might even go over -- I was following
 25  for a while, I think it was in the early stages, the
 26  Microsoft case.  One of the arguments talked about,






                                                   PAGE 121
  1  you can look at this philosophically, Internet
  2  Explorer, is it or is it not a part of the operating
  3  system?  The way it's been constructed recently,
  4  yes, it is.  It's inextricably bound and it's part
  5  of it and you separate the two and there may be
  6  functional problems.  Of course, on the other side
  7  of the brain, another part of you says that, yes,
  8  but there are two different functions there.  I get
  9  the operating system and get the one I choose so
 10  that I can exchange as many applications with
 11  colleagues as possible and get as many as I want,
 12  but the application is what I really want.  And I
 13  recognize there's an application bound in that base
 14  which is technically part of it and you can look at
 15  one way philosophically, but I know also that they
 16  don't have to be part of each other.  They're two
 17  different things.  And there's some fear that this
 18  same thing will occur with the interpretation of
 19  access versus use.
 20              MS. PETERS:  One last question.  I'm
 21  going to follow up on something that Rachel asked to
 22  make sure I've got it right.  Today the prohibition
 23  on breaking access controls by individuals is not in
 24  effect, yet there are access controls on many
 25  different products.  What I think I heard you say is
 26  you're not aware of anyone breaking access controls






                                                   PAGE 122
  1  at this point.  Is that right?
  2              MR. CLARK:  Except for DVD, because
  3  there wouldn't be a case in court if it weren't
  4  considered that, or they wouldn't have a good case
  5  if it weren't considered that.  And I guess this has
  6  to do with the DVD being encrypted and designed to
  7  be played on certain players.  Playing it on Linux
  8  meant that wasn't authorized.  That's an access
  9  issue.
 10              MR. PETERSON:  So if there were an
 11  exemption, it would basically allow you to do what
 12  you are authorized to do today.  I mean it's the
 13  same kind of thing.  So what you're saying is things
 14  like the DVD would be the things that you would be
 15  interested in.  Is that right?  Or there's new
 16  things coming on the market that are going to cause
 17  you to have similar types of problems?  Anyone?  I
 18  see shaking heads.
 19              MS. VOGELSONG:  I think generally what
 20  we found is in the case of image databases that they
 21  were causing problems.  We've been able to negotiate
 22  or the market has sort of driven some of the
 23  producers to alter their formats or people just
 24  aren't attempting
 25  to do it.  They're just not making those uses of
 26  those materials.






                                                   PAGE 123
  1              MS. PETERS:  Anyone else?  If not, thank
  2  you very much.  And for those who are in the
  3  audience, we'll be back tomorrow at 10:00.
  4              (Whereupon, the afore-mentioned
  5  proceedings were concluded at 3:40 p.m.)
  6  
  7  
  8  
  9  
 10  
 11  
 12  
 13  
 14