【附件】美国数字千年版权法(DMCA)第512、1201以及1202条(原文)
2022-04-12 10:59:41
  • 0
  • 0
  • 21

H.R.2281

Digital Millennium Copyright Act (Enrolled as Agreed to or Passed by Both House and Senate)

--H.R.2281--

H.R.2281

One Hundred Fifth Congress of the United States of America

AT THE SECOND SESSION

Begun and held at the City of Washington on Tuesday,

the twenty-seventh day of January, one thousand nine hundred and ninety-eight

An Act

To amend title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the `Digital Millennium Copyright Act'.

SEC. 2. TABLE OF CONTENTS.

Sec. 1. Short title.

Sec. 2. Table of contents.

TITLE I--WIPO TREATIES IMPLEMENTATION

Sec. 101. Short title.

Sec. 102. Technical amendments.

Sec. 103. Copyright protection systems and copyright management information.

Sec. 104. Evaluation of impact of copyright law and amendments on electronic commerce and technological development.

Sec. 105. Effective date.

TITLE II--ONLINE COPYRIGHT INFRINGEMENT LIABILITY LIMITATION

Sec. 201. Short title.

Sec. 202. Limitations on liability for copyright infringement.

Sec. 203. Effective date.

TITLE III--COMPUTER MAINTENANCE OR REPAIR COPYRIGHT EXEMPTION

Sec. 301. Short title.

Sec. 302. Limitations on exclusive rights; computer programs.

TITLE IV--MISCELLANEOUS PROVISIONS

Sec. 401. Provisions Relating to the Commissioner of Patents and Trademarks and the Register of Copyrights.

Sec. 402. Ephemeral recordings.

Sec. 403. Limitations on exclusive rights; distance education.

Sec. 404. Exemption for libraries and archives.

Sec. 405. Scope of exclusive rights in sound recordings; ephemeral recordings.

Sec. 406. Assumption of contractual obligations related to transfers of rights in motion pictures.

Sec. 407. Effective date.

TITLE V--PROTECTION OF CERTAIN ORIGINAL DESIGNS

Sec. 501. Short title.

Sec. 502. Protection of certain original designs.

Sec. 503. Conforming amendments.

Sec. 504. Joint study of the effect of this title.

Sec. 505. Effective date.

`CHAPTER 12--COPYRIGHT PROTECTION AND MANAGEMENT SYSTEMS

`Sec.

`1201. Circumvention of copyright protection systems.

`1202. Integrity of copyright management information.

`……

Sec. 512. Limitations on liability relating to material online

(a) TRANSITORY DIGITAL NETWORK COMMUNICATIONS- A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if--

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

`(5) the material is transmitted through the system or network without modification of its content.

(b) SYSTEM CACHING-

(1) LIMITATION ON LIABILITY- A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider in a case in which--

(A) the material is made available online by a person other than the service provider;

(B) the material is transmitted from the person described in subparagraph (A) through the system or network to a person other than the person described in subparagraph (A) at the direction of that other person; and

(C) the storage is carried out through an automatic technical process for the purpose of making the material available to users of the system or network who, after the material is transmitted as described in subparagraph (B), request access to the material from the person described in subparagraph (A),if the conditions set forth in paragraph (2) are met.

(2) CONDITIONS- The conditions referred to in paragraph (1) are that--

(A) the material described in paragraph (1) is transmitted to the subsequent users described in paragraph (1)(C) without modification to its content from the manner in which the material was transmitted from the person described in paragraph (1)(A);

(B) the service provider described in paragraph (1) complies with rules concerning the refreshing, reloading, or other updating of the material when specified by the person making the material available online in accordance with a generally accepted industry standard data communications protocol for the system or network through which that person makes the material available, except that this subparagraph applies only if those rules are not used by the person described in paragraph (1)(A) to prevent or unreasonably impair the intermediate storage to which this subsection applies;

(C) the service provider does not interfere with the ability of technology associated with the material to return to the person described in paragraph (1)(A) the information that would have been available to that person if the material had been obtained by the subsequent users described in paragraph (1)(C) directly from that person, except that this subparagraph applies only if that technology--

(i) does not significantly interfere with the performance of the provider's system or network or with the intermediate storage of the material;

(ii) is consistent with generally accepted industry standard communications protocols; and

(iii) does not extract information from the provider's system or network other than the information that would have been available to the person described in paragraph (1)(A) if the subsequent users had gained access to the material directly from that person;

(D) if the person described in paragraph (1)(A) has in effect a condition that a person must meet prior to having access to the material, such as a condition based on payment of a fee or provision of a password or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have met those conditions and only in accordance with those conditions; and

(E) if the person described in paragraph (1)(A) makes that material available online without the authorization of the copyright owner of the material, the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringement as described in subsection (c)(3), except that this subparagraph applies only if--

(i) the material has previously been removed from the originating site or access to it has been disabled, or a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled; and

(ii) the party giving the notification includes in the notification a statement confirming that the material has been removed from the originating site or access to it has been disabled or that a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled.

(c) INFORMATION RESIDING ON SYSTEMS OR NETWORKS AT DIRECTION OF USERS-

(1) IN GENERAL- A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider--

(A)

(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;

(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.

(2) DESIGNATED AGENT- The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:

(A) the name, address, phone number, and electronic mail address of the agent.

(B) other contact information which the Register of Copyrights may deem appropriate.

The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, in both electronic and hard copy formats, and may require payment of a fee by service providers to cover the costs of maintaining the directory.

(3) ELEMENTS OF NOTIFICATION-

(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:

(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.

(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.

(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.

(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(B)

(i) Subject to clause (ii), a notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions of subparagraph (A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.

(ii) In a case in which the notification that is provided to the service provider's designated agent fails to comply substantially with all the provisions of subparagraph (A) but substantially complies with clauses (ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies only if the service provider promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions of subparagraph (A).

(d) INFORMATION LOCATION TOOLS- A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider--

(1)

(A) does not have actual knowledge that the material or activity is infringing;

(B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.

(e) LIMITATION ON LIABILITY OF NONPROFIT EDUCATIONAL INSTITUTIONS-

(1) When a public or other nonprofit institution of higher education is a service provider, and when a faculty member or graduate student who is an employee of such institution is performing a teaching or research function, for the purposes of subsections (a) and (b) such faculty member or graduate student shall be considered to be a person other than the institution, and for the purposes of subsections (c) and (d) such faculty member's or graduate student's knowledge or awareness of his or her infringing activities shall not be attributed to the institution, if--

(A) such faculty member's or graduate student's infringing activities do not involve the provision of online access to instructional materials that are or were required or recommended, within the preceding 3-year period, for a course taught at the institution by such faculty member or graduate student;

(B) the institution has not, within the preceding 3-year period, received more than two notifications described in subsection (c)(3) of claimed infringement by such faculty member or graduate student, and such notifications of claimed infringement were not actionable under subsection (f); and

(C) the institution provides to all users of its system or network informational materials that accurately describe, and promote compliance with, the laws of the United States relating to copyright.

(2) INJUNCTIONS- For the purposes of this subsection, the limitations on injunctive relief contained in subsections (j)(2) and (j)(3), but not those in (j)(1), shall apply.

(f) MISREPRESENTATIONS- Any person who knowingly materially misrepresents under this section--

(1) that material or activity is infringing, or

(2) that material or activity was removed or disabled by mistake or misidentification, shall be liable for any damages, including costs and attorneys' fees, incurred by the alleged infringer, by any copyright owner or copyright owner's authorized licensee, or by a service provider, who is injured by such misrepresentation, as the result of the service provider relying upon such misrepresentation in removing or disabling access to the material or activity claimed to be infringing, or in replacing the removed material or ceasing to disable access to it.

(g) REPLACEMENT OF REMOVED OR DISABLED MATERIAL AND LIMITATION ON OTHER LIABILITY-

(1) NO LIABILITY FOR TAKING DOWN GENERALLY- Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider's good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.

(2) EXCEPTION- Paragraph (1) shall not apply with respect to material residing at the direction of a subscriber of the service provider on a system or network controlled or operated by or for the service provider that is removed, or to which access is disabled by the service provider, pursuant to a notice provided under subsection (c)(1)(C), unless the service provider--

(A) takes reasonable steps promptly to notify the subscriber that it has removed or disabled access to the material;

(B) upon receipt of a counter notification described in paragraph (3), promptly provides the person who provided the notification under subsection (c)(1)(C) with a copy of the counter notification, and informs that person that it will replace the removed material or cease disabling access to it in 10 business days; and

(C) replaces the removed material and ceases disabling access to it not less than 10, nor more than 14, business days following receipt of the counter notice, unless its designated agent first receives notice from the person who submitted the notification under subsection (c)(1)(C) that such person has filed an action seeking a court order to restrain the subscriber from engaging in infringing activity relating to the material on the service provider's system or network.

(3) CONTENTS OF COUNTER NOTIFICATION- To be effective under this subsection, a counter notification must be a written communication provided to the service provider's designated agent that includes substantially the following:

(A) A physical or electronic signature of the subscriber.

(B) Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled.

(C) A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled.

(D) The subscriber's name, address, and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if the subscriber's address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification under subsection (c)(1)(C) or an agent of such person.

(4) LIMITATION ON OTHER LIABILITY- A service provider's compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material identified in the notice provided under subsection (c)(1)(C).

(h) SUBPOENA TO IDENTIFY INFRINGER-

(1) REQUEST- A copyright owner or a person authorized to act on the owner's behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection.

(2) CONTENTS OF REQUEST- The request may be made by filing with the clerk--

Sec. 1201. Circumvention of copyright protection systems

(a) VIOLATIONS REGARDING CIRCUMVENTION OF TECHNOLOGICAL MEASURES-

(1)

(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. The prohibition contained in the preceding sentence shall take effect at the end of the 2-year period beginning on the date of the enactment of this chapter.

(B) The prohibition contained in subparagraph (A) shall not apply to persons who are users of a copyrighted work which is in a particular class of works, if such persons are, or are likely to be in the succeeding 3-year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works under this title, as determined under subparagraph (C).

(C) During the 2-year period described in subparagraph (A), and during each succeeding 3-year period, the Librarian of Congress, upon the recommendation of the Register of Copyrights, who shall consult with the Assistant Secretary for Communications and Information of the Department of Commerce and report and comment on his or her views in making such recommendation, shall make the determination in a rulemaking proceeding on the record for purposes of subparagraph (B) of whether persons who are users of a copyrighted work are, or are likely to be in the succeeding 3-year period, adversely affected by the prohibition under subparagraph (A) in their ability to make noninfringing uses under this title of a particular class of copyrighted works. In conducting such rulemaking, the Librarian shall examine--

(i) the availability for use of copyrighted works;

(ii) the availability for use of works for nonprofit archival, preservation, and educational purposes;

(iii) the impact that the prohibition on the circumvention of technological measures applied to copyrighted works has on criticism, comment, news reporting, teaching, scholarship, or research;

(iv) the effect of circumvention of technological measures on the market for or value of copyrighted works; and

(v) such other factors as the Librarian considers appropriate.

(D) The Librarian shall publish any class of copyrighted works for which the Librarian has determined, pursuant to the rulemaking conducted under subparagraph (C), that noninfringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected, and the prohibition contained in subparagraph (A) shall not apply to such users with respect to such class of works for the ensuing 3-year period.

(E) Neither the exception under subparagraph (B) from the applicability of the prohibition contained in subparagraph (A), nor any determination made in a rulemaking conducted under subparagraph (C), may be used as a defense in any action to enforce any provision of this title other than this paragraph.

(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that--

(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;

(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.

(3) As used in this subsection--

(A) to `circumvent a technological measure' means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and

(B) a technological measure `effectively controls access to a work' if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.

(b) ADDITIONAL VIOLATIONS-

(1) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that--

(A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof;

(B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof.

(2) As used in this subsection--

(A) to circumvent protection afforded by a technological measure' means avoiding, bypassing, removing, deactivating, or otherwise impairing a technological measure; and

(B) a technological measure `effectively protects a right of a copyright owner under this title' if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.

(c) OTHER RIGHTS, ETC., NOT AFFECTED-

(1) Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.

(2) Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof.

(3) Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as such part or component, or the product in which such part or component is integrated, does not otherwise fall within the prohibitions of subsection (a)(2) or (b)(1).

(4) Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products.

(d) EXEMPTION FOR NONPROFIT LIBRARIES, ARCHIVES, AND EDUCATIONAL INSTITUTIONS-

(1) A nonprofit library, archives, or educational institution which gains access to a commercially exploited copyrighted work solely in order to make a good faith determination of whether to acquire a copy of that work for the sole purpose of engaging in conduct permitted under this title shall not be in violation of subsection (a)(1)(A). A copy of a work to which access has been gained under this paragraph--

(A) may not be retained longer than necessary to make such good faith determination; and

(B) may not be used for any other purpose.

(2) The exemption made available under paragraph (1) shall only apply with respect to a work when an identical copy of that work is not reasonably available in another form.

(3) A nonprofit library, archives, or educational institution that willfully for the purpose of commercial advantage or financial gain violates paragraph (1)--

Sec. 1202. Integrity of copyright management information

(a) FALSE COPYRIGHT MANAGEMENT INFORMATION- No person shall knowingly and with the intent to induce, enable, facilitate, or conceal infringement--

(1) provide copyright management information that is false, or

(2) distribute or import for distribution copyright management information that is false.

(b) REMOVAL OR ALTERATION OF COPYRIGHT MANAGEMENT INFORMATION- No person shall, without the authority of the copyright owner or the law--

(1) intentionally remove or alter any copyright management information,

(2) distribute or import for distribution copyright management information knowing that the copyright management information has been removed or altered without authority of the copyright owner or the law, or

(3) distribute, import for distribution, or publicly perform works, copies of works, or phonorecords, knowing that copyright management information has been removed or altered without authority of the copyright owner or the law, knowing, or, with respect to civil remedies under section 1203, having reasonable grounds to know, that it will induce, enable, facilitate, or conceal an infringement of any right under this title.

(c) DEFINITION- As used in this section, the term copyright management information means any of the following information conveyed in connection with copies or phonorecords of a work or performances or displays of a work, including in digital form, except that such term does not include any personally identifying information about a user of a work or of a copy, phonorecord, performance, or display of a work:

(1) The title and other information identifying the work, including the information set forth on a notice of copyright.

(2) The name of, and other identifying information about, the author of a work.

(3) The name of, and other identifying information about, the copyright owner of the work, including the information set forth in a notice of copyright.

(4) With the exception of public performances of works by radio and television broadcast stations, the name of, and other identifying information about, a performer whose performance is fixed in a work other than an audiovisual work.

(5) With the exception of public performances of works by radio and television broadcast stations, in the case of an audiovisual work, the name of, and other identifying information about, a writer, performer, or director who is credited in the audiovisual work.

(6) Terms and conditions for use of the work.

(7) Identifying numbers or symbols referring to such information or links to such information.

(8) Such other information as the Register of Copyrights may prescribe by regulation, except that the Register of Copyrights may not require the provision of any information concerning the user of a copyrighted work.

(d) LAW ENFORCEMENT, INTELLIGENCE, AND OTHER GOVERNMENT ACTIVITIES- This section does not prohibit any lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee of the United States, a State, or a political subdivision of a State, or a person acting pursuant to a contract with the United States, a State, or a political subdivision of a State. For purposes of this subsection, the term information security means activities carried out in order to identify and address the vulnerabilities of a government computer, computer system, or computer network.

(e) LIMITATIONS ON LIABILITY-

(1) ANALOG TRANSMISSIONS- In the case of an analog transmission, a person who is making transmissions in its capacity as a broadcast station, or as a cable system, or someone who provides programming to such station or system, shall not be liable for a violation of subsection (b) if--

(A) avoiding the activity that constitutes such violation is not technically feasible or would create an undue financial hardship on such person; and

(B) such person did not intend, by engaging in such activity, to induce, enable, facilitate, or conceal infringement of a right under this title.

(2) DIGITAL TRANSMISSIONS-

(A) If a digital transmission standard for the placement of copyright management information for a category of works is set in a voluntary, consensus standard-setting process involving a representative cross-section of broadcast stations or cable systems and copyright owners of a category of works that are intended for public performance by such stations or systems, a person identified in paragraph (1) shall not be liable for a violation of subsection (b) with respect to the particular copyright management information addressed by such standard if--

(i) the placement of such information by someone other than such person is not in accordance with such standard; and

(ii) the activity that constitutes such violation is not intended to induce, enable, facilitate, or conceal infringement of a right under this title.

(B) Until a digital transmission standard has been set pursuant to subparagraph (A) with respect to the placement of copyright management information for a category or works, a person identified in paragraph (1) shall not be liable for a violation of subsection (b) with respect to such copyright management information, if the activity that constitutes such violation is not intended to induce, enable, facilitate, or conceal infringement of a right under this title, and if--

(i) the transmission of such information by such person would result in a perceptible visual or aural degradation of the digital signal; or

(ii) the transmission of such information by such person would conflict with--

(I) an applicable government regulation relating to transmission of information in a digital signal;

(II) an applicable industry-wide standard relating to the transmission of information in a digital signal that was adopted by a voluntary consensus standards body prior to the effective date of this chapter; or

(III) an applicable industry-wide standard relating to the transmission of information in a digital signal that was adopted in a voluntary, consensus standards-setting process open to participation by a representative cross-section of broadcast stations or cable systems and copyright owners of a category of works that are intended for public performance by such stations or systems.

(3) DEFINITIONS- As used in this subsection--

(A) the term `broadcast station has the meaning given that term in section 3 of the Communications Act of 1934 (47 U.S.C. 153); and

(B) the term ‘cable system’ has the meaning given that term in section 602 of the Communications Act of 1934 (47 U.S.C. 522).

……

美国1998数字千年版权法

(美国版权局提供概要)

(源自百度文库,仅供学习使用)

  引 言

   数字千年版权法(DMCA)由总统克林顿于1998年10月29日签署成为法律。该立法是为实施1996年世界知识产权组织(WIPO)的两个条约:《世界知识产权组织版权条约》和《世界知识产权组织表演和录音制品条约》。

  DMCA共分为5章:

  ·第一章,“1998世界知识产权组织版权与表演、录音制品条约实施法”,是为实施世界知识产权组织条约。

  ·第二章,“网上版权侵权责任限制法”,规定了网络在线服务商在从事某些类型的行为时,对其版权侵权责任的限制。

  ·第三章,“计算机维护竞争保障法”,规定了为维护或维修之目的,因启动计算机而复制一份计算机程序的例外。

  ·第四章包括6个其他条款。涉及版权局的职能、远程教育、版权法中关于图书馆和临时录制的例外、录音制品在因特网上的“网络广播”和电影版权转让时对集体交易协议义务的应用。

  ·第五章,“船壳设计保护法”,规定了对船壳设计保护的新的规则。

  本文对DMCA的各章做简要介绍,它仅提供对该法的一个概览。为简短和易读而省略了一些重要细节。全面了解DMCA的任何一条规定,需要直接研读法律文本。

第一章 世界知识产权组织条约的实施

  第一章是对世界知识产权组织条约的实施。首先,该章对美国法律进行了某些技术性修订,以提供适当的出处与条约相关联。其次,它在美国法典的第17章中增设了两项新的禁止条款:一个是禁止规避版权所有人为保护其作品所采取的技术措施。另一个是禁止破坏版权管理信息。该章还增加了对违反此禁止性规定的民事救济和刑事惩罚。另外,第一章要求美国版权局与商务部的国家电信和信息管理局(NTIA)联合进行两项研究工作。

  技术性修订

  国民资格要求

  《世界知识产权组织版权条约》(WCT)和《世界知识产权组织表演和录音制品条约》(WPPT)均要求成员国对来自其他成员国或由其他成员国的国民创作的某些作品提供保护,这些保护不得低于对国内作品的保护水平。

  版权法第104条规定了其他国家作品获得美国法律保护的条件。DMCA第2条(b)对版权法第104条做了增补,在版权法第101条中增加了新的定义,以将美国法的保护延伸到WCT和WPPT所要求保护的作品。

  版权保护的追溯

  两个条约要求参加保护其他成员国的在其起源国尚未超过保护期而进入公有领域的已有作品,伯尔尼公约和TRIPS协议也有类似的规定。1995年,该义务在乌拉圭回合协议法中得以实施,在版权法中增加了第104条A,对伯尔尼公约和WTO成员国在其起源国内仍受到保护的作品给予保护,即使这些作品以前因未履行当时美国法定的手续而在美国已进入共有领域,或因没有条约关系而得不到保护。DMCA的第102条(c)对104条a做了修订,以在同样条件下对WCT和WPPT的作品给予追溯保护。

  其他的技术修订是关于两个条约禁止以履行手续作为享有行使权利的条件,版权法第411条(a)要求版权所有者在提起法律诉讼之前向在版权机关提出登记要求,但对许多国外作品予以免除,以符合伯尔尼公约已规定的义务。DMCA第102条(d)对411条(a)做了修订,将此免除扩大到对所有外国作品。

  技术保护和版权管理系统

  世界知识产权组织条约均以同样明确的语言规定了成员国防止规避用于为保护受版权保护作品的技术措施,和防止破坏版权管理信息完整性的义务。该义务是对版权法所赋予的专有权技术性附带规定。国际版权界认为该规定提供的法律保护对在数字网络中安全和有效利用作品至关重要。

  防止破坏技术保护措施

  一般规定。WCT第11条规定:“缔约各方应规定适当的法律保护和有效的法律补救办法,制止规避由作者为行使本条约所规定的权利而行使的、对就其作品进行未经该有关作者许可或未由法律准许的行为加以约束的有效技术措施”。

  WPPT第18条包含了几乎相同的语句。

  DMCA第103条在《美国法典》第17篇中加入新的12章。新的1201条规定了充分和有效的保护规避版权所有者为保护其作品所采取的技术措施。

  第1201条将技术措施分为两类:一类是防止未经授版权保护作品的措施,一类是防止未经授权复制受版权保护作品的措施。在某些情况下(见下述),禁止捏造和销售规避任何一类技术措施的设备或服务设施。至于规避行为本身,该条规定禁止规避前一种技术措施,但并未禁止后者。

  进行这种区分是保证公众继续拥有对作品进行合理使用的能力。由于在某些适当的情况下复制作品可能属于合理使用,第1201条没有禁止规避防止复制的技术措施。相反,由于合理使用理论不能作为未经授权访问作品的抗辩理由,因此规避访问作品技术措施的行为是被禁止的。

  第1201条规定的所谓设备或服务设施属于以下任何一类:

  ·原本就是为进行规避而设计或生产。

  ·除进行规避外,仅有有限的、重要商业意义的目的。

  ·为用于规避使用而进行销售。

  非强制性

  第1201条明确规定。对规避装置的禁止并不要求消费电子产品、电信或计算机设备的制造商严格根据任何特定的技术措施对其产品进行设计(1201条(c)(3)。尽管有此“非强制性”的一般规则,1201条(k)对一类特定技术作出了明确的强制性规定:在该法颁布后18个月内,所有模拟信号的录像机必须在设计上与某些规定的其他模拟信号进行未经授权的复制。该条规定禁止权利人将这些特定技术用于可自由接收节目的电视机和有线电视。

  免责条款

  1201条规定了两条一般性免则条款。首先,1201条(c)(1)规定1201条对权利内容补救措施、权利限制和侵权抗辩(包括合理使用)没有任何影响。1201(c)(2)规定1201条对共同和间接侵权没有扩大或减小。

  例外:

  最后,1201条规定的禁止性内容还有一些例外,一个例外是针对整节规定的适用。它不适用法律实施活动或其他政府活动(1201条(e)。其他例外是关于1201条(a)的针对控制访问作品的技术措施的种类的规定。

  最宽泛的例外规定,1201条(a)(1)(B)-(E),确立了一种常设的行政规则制定程序,用来评估禁止规避控制访问技术措施所带来的影响。对此行为的禁止规定要到两年后才生效,即应对某种特殊类型作品的使用者适用一项例外,条件是如果这种连非侵权性使用也禁止的规定对这些使用造成或可能造成不良影响。该例外规定的适用要由版权局局长和负责通讯和信息的商务部长助理商议后提议,由国会图书馆通过一定的规则决定。

  六个附加的例外规定是:

  1.非营利性图书馆、档案馆和教育机构例外(1201条(d))。对禁止规避访问作品控制措施适用一例外规定,即允许非营利性图书馆、档案馆和教育机构仅为善意决定是否有必要取得访问作品的许可而规避技术措施。

  2.反向工程(1201)条(f)。该例外允许规避技术措施和对此规避技术手段的开发。条件是此人合法地取得了使用该计算机程序的权利,并单纯识别或分析程序的组成以便达到与其他程序相兼容的目的。该行为还要以版权法所允许的程度为限。

  3.加密研究(1201)条(f)。加密研究例外允许规避访问控制措施和为此对技术手段进行的开发,以识别加密技术的缺陷和弱点。

  4.未成年人保护(1201条(h))。该例外允许法院在将该禁止适用于访问控制技术的某组成要件或部分时,考虑其是否必要包括在防止未成年人访问因特网材料的技术中。

  5.个人隐私(第1201条(i))。该例外允许对技术措施进行规避,如果该技术措施保护的作品能够搜集或散播有关某个自然人的网上活动的个人身份信息。

  6.安全测试(1201条)。该例外允许规避访问控制措施和对此规避的技术手段进行开发,目的是为在得到所有者或操作者许可的情况下,测试计算机、计算机系统或计算机网络的安全性。

  上述每一种例外均有其各自的适用条件,不在本概要所述范围。

  版权管理的完整性

  WCT第12条在相关部分中规定:“缔约各方应规定适当和有效的法律补救办法、制止任何明知、或就民事补救而言有合理根据知道的行为会诱使、促成、便利包庇对本条约或《伯尔尼公约》所涵盖的任何权利的侵犯而服役从事以下行为:(i)未经许可去除或改变任何权利管理的电子信息。(ii)未经许可发行、为发行目的进口、广播、或向公众传播明知已被未经许可除去或改变权利管理信息的作品或作品的复制品”。

  WPPT的第19条包含了相同的语句。

  新的1202条规定是为实施保护版权管理信息(CMI)的义务。保护的范围分为两段。一段是关于错误的CMI。另一段是关于去除或改变CMI。(a)款禁止在明知的情况下通过因特网提供或散播错误的CMI,以诱使、促成、便利或包庇侵权,(b)款禁止未经许可对 CMI故意去除或改变,以及明知该CMI已被未经许可地去除或改变而对CMI或作品复制件进行散播。(b)款规定的义务要求该行为是在明知情况下所为,或就民事补救而言,有合理根据知道其行为会诱使、促成、便利或包庇侵权。

  (C)款将CMI定义为关于作品、作者、版权所有者,以及在某些情况下,表演者、作品的编剧或导演的身份信息,以及使用作品的期限和条件,还有其他诸如版权局在其规定中可能描述的信息。关于作品使用者的信息被明确地排除在外。

  1201条适用一项对法律实施、教育和其他政府活动的一般例外(1201条(d))。该条还规定了对广播电台和有线电视系统的责任的限制。即在某些没有故意诱使、促成、便利或包庇侵权的情况下可以免除责任(1201条(e))。

  补救措施

  任何人由于违反1201条或1202条的规定而受到损害,均可向联邦法院提起民事诉讼,1203条赋予法院有判定一系列类似版权法中的规定的公平的和合理的经济补偿、包括法定赔偿的权力。法院有权对善意侵权减少或免除赔偿,如果侵权者能够证实其不知或没有理由确定其行为构成侵权(1203条(c)(5)(A))。非营利性的图书馆、档案馆、教育机构被给予特殊的保护。在某些情况下,这些部门被完全免除赔偿责任(1203条(C)(5)(B))。

  另外,为获取商业利益或个人财富之目的而故意违反1201条或1202条规定的行为构成刑事犯罪。根据1204条的规定,对初犯者,惩罚为高达500,000美元的罚款和5年的监禁。对再犯者,罚款1,000,000美元和10年监禁。非营利性的图书馆、档案馆和教育机构则完全被免除刑事责任(1204(b))。

  版权局和NTIA有关技术发展的研究

  DMCA的第一章要求版权局与NTIA进行两项研究。一项是关于加密问题。另一项是关于技术发展对目前版权法规定的两项例外的影响。《美国法典》第17篇新1201条(g)(5)要求版权局局长和负责通讯和信息商务部长助理自法律颁布生效后一年内,向国会提交报告,报告加密研究免责规定新1201条(g)对加密研究、加密技术的发展,用来保护受版权保护作品的技术措施的充分性和有效性,以及保护版权所有者防止未经许可对其加密作品进行访问所造成的影响。

  DMCA第104条要求版权局局长和负责通讯和信息的商务部长助理联合进行评估(a)DMCA第一条和电子商务及相关技术对第109条(首次销售理论)、第117条(允许计算机程序复制件所有者为在计算机上使用而复制和修改该程序)的适用的影响,(b)当前技术和未来技术,以及这几条规定的执行之间的关系。此研究报告要求在DMCA颁布之日后24个月内提交。

第二章 对网上版权侵权责任的限制

  DMCA第二章对在版权法中增加了512条,规定了四种对网络服务商网上版权侵权责任的限制,这些限制是基于网络服务商的下列4种行为:

  1.暂时传播。

  2.系统缓存。

  3.根据用户指示在系统或网络中存储信息。

  4.信息搜索工具。

  新512条还包括关于这些限制适用到非营利性教育机构的特别规定。

  每一种限制均包括对经济赔偿的完全免除和在诸多方面对临时禁令的限制(512条(j))。每一种限制都涉及一个独立和不同的功能,一个网络服务商是否符合某一种限制并不取决于它是否符合其他三种限制(512条(n))。

  服务商不符合512条的任何一种限制规定并不当然地就构成版权侵权,版权所有人仍必须证实服务商侵权,服务商也可以采取诸如合理使用等任何版权侵权被告所可能采取的抗辩。

  除对服务商的责任进行限制外,第二章还确立了一套程序,通过这种程序,版权所有人可以从联邦法院取得传票,要求服务商提供某个涉嫌从事侵权行为的用户的身份(512条(h))。

  512条还有规定保证服务商不被陷于必须在适用责任限制和保护用户隐私之间作出选择的境地。(m)款明确规定,512条绝不要求服务商为了符合任何一种责任限制的条件,在违反法律(如电子通讯隐私法)的情况下监控其服务或获取材料。

  责任限制的一般条件

  寻求受益于第二章规定的责任限制者必须是“服务商”。对第一种关于暂时传播的限制,“服务商”由512条(k)(l)(A)定义为“在用户指定的点之间,为用户选择材料提供数字网上传播的传输、引导,或链接服务,而且对发出或接收的材料内容不做任何改变的单位”。对其他三种责任限制,“服务商”由512条(K)(1)(B)更广义地定义为“网上服务或网络访问的提供者,或用于此目的的设施的操作者。另外,为符合任何一种责任限制的条件,服务商必须满足两个总体要求:(a)它必须制定和合理地实施一项政策,即在适当的情况下中止用户的户头,如果该用户多次侵权的话。(b)服务商必须接纳“标准技术措施”(512条(0)),且不予其相抵触。“标准技术措施”被定义为版权所有者用来表明或保护其版权作品的措施,这种措施是按照版权所有者和服务商的广泛共识,在公开、公平和自愿的多工业过程中发展起来的,在合理的无歧视条件下对任何人都适合,且不给服务商施加实质性的费用和负担。

  对暂时传播的限制

  总的来讲,512条(a)将服务商的责任仅限于这种情况,即服务商的作用仅仅是作为在他人的要求下,从网络上的一个点到另一个点传输数字信息的管道。这一限定包括传输、引导或提供信息链接的行为,以及在网络运行过程中自动产生的,中间和暂时性的复制。

  为能适用这一限制,服务商必须符合以下条件:

  ·传输行为必须是由他人,而不是服务商自己发动的。

  ·传输、引导、提供链接或复制行为必须是由一个自动的技术过程进行,且材料没有经过服务商的选取。

  ·服务商不能决定材料的接收人。

  ·任何中间形成的复制件除能被预期的接收人得到外,通常不能被其他任何人获得,而且这些复制件保存的时间不能超过合理需要的期限。

  ·材料在传输过程中不能有任何内容上的改变。

  对系统缓存的限制

  512条(b)对网络服务商在有限期内保存材料复制件的行为所应承担的责任规定了限制。这些材料是由他人而不是服务商提供到网上,并在其指示下传输给用户。服务商保存这些材料,以便通过传输保存的复制件来满足后续的对相同材料的需求,而不需再从网上资料中重新取得。

  这样规定的好处在于降低了对服务商的带宽要求,减少了对相同信息要求的等待时间。但另一方面,它会导致将过时的信息传送给用户,使网上操作者不能计算“点击”信息指有关在网上对特定材料的要求数量的信息,通过这种信息,可以经常性地计算广告收入。因此,将材料上网的提供者可以制定更新材料的规则,并利用技术手段跟踪“点击”的数量。

  这一限制适用于中间的和暂时的存储行为,条件是这种储存是通过自动的技术过程进行,目的是为将该材料提供给后续要求的用户:

  ·不得改变所保存的材料的内容。

  ·如果被业界普遍接受的标准数据通信文件有特别规定,服务商必须遵从关于“刷新”材料的规则,即将保存的复制件用来源地材料替换。

  ·服务商不得干预将“点击”信息反馈给材料提供者的技术手段,如果该技术手段符合一定要求的话。

  ·服务商必须根据材料提供者附加的访问条件(即密码保护)限制用户对材料的访问。

  ·一旦服务商被告知任何未经版权所有人许可而上网的材料已在原地址被除去、阻挡,或被勒令除去或阻挡,这些材料必须立即除去或阻挡。

  对根据用户指示在系统或网络中存储信息的限制

  512条(c)对服务商对其系统上的网址(或其他信息储存库)载有侵权材料的责任规定了限制。该限制适用于在用户指示下的存储。为能适用此限制,必须符合下列条件:

  ·服务商不具备以下描述的对侵权行为所需要的认知水平。

  ·如果服务商有权利和能力对侵权行为进行控制,它必须没有直接从侵权行为中获得经济利益。

  ·在收到声称侵权的适当告知后,服务商必须迅速撤下或阻挡材料的访问入口。

  ·另外,服务商将接收声称侵权告知书的指定代理人到版权局备案。版权局提供指定代理人的建议表格(http://www. loc. gov/copy- right/llinesp/I linesp/),并在版权局的网址上提供代理人清单(http://www. loc. gov/copyright/onlinesp/list/)。

  根据认知水平,服务商只有在这种情况下才能适用对其责任的限制规定,即它实际上不知道侵权,没有意识到侵权行为发生的事实或情况,或在得知或意识到的情况下,就立即撤下或阻挡了侵权材料的访问入口。

  该规定还确立了适当告知的程序和其有效性的规则(512条(c)(3))。根据通知和撤下程序,版权所有人向服务商的指定代理人发出包括一系列特定问题的告知书,但如果做伪证将受到惩罚。未实质性符合法定要求,意味着告知书将不能被用来衡量服务商所必需的认知水平。如果服务商在收到适当的告知书后,立即除去或阻挡告知书所指明的材料的访问人口,服务商就可以免除经济赔偿责任。另外,服务商对任何人对已经撤下的材料的投诉不负任何责任(512条(g)⑴)。

  为防止发出错误或欺诈性的告知书,512条制定了一些保证条款。(g)款(1)为用户提供了通过发出相反告知书对告知和撤下作出反应的机会。为符合免除因撤下材料而承担责任的条件,服务商必须立即通知用户材料已被撤下或已不可能被访问。如果用户发出符合法律规定的、包括保证不做伪证声明的相反的告知书,指出这些材料是出于错误或由于误认而被除去或使访问被阻挡,那么,除非版权所有人提起诉讼,请求法院对该用户发出命令,服务商必须在收到相反告知书后10至15个工作日内将材料重新放到网上。

  无论是发出告知或相反告知书,如果是在明知的情况下对材料进行错误描述都会受到惩罚。任何人在明知的情况下误示材料是侵权或材料是被错误地除去或阻挡,都要承担由此给被诉称的侵权者、版权所有者或其许可人,或服务商造成的损失(包括诉讼费用和律师费)(512条(f))。

  对信息捜索工具的限制

  512条(d)是关于超级链接、网上索引、搜索引擎及类似问题的规定。它对通过信息搜索工具,将用户引向或链接到载有侵权材料网址的行为所应承担的责任作了限制,前提是要符合以下条件:

  ·服务商必须不具备能够认识到材料是侵权所必需的知识水平。该认知标准与对在系统或网络中保存信息的限制所适用的标准相同。

  ·如果服务商有权或有能力控制侵权行为,该服务商必须没有直接从侵权行为中得到经济利益。

  ·在接到侵权声明告知书后,服务商必须迅速撤下或阻挡材料的访问入口。

  这些适用条件基本上与前几类的限制相同,仅在对告知书的要求上略有不同。该条也规定以上已讨论过的防止发出错误或欺骗性告知书的保证条款,以及保护服务商对根据限制规定已撤下的材料的投诉不负责任的条款(512条⑴-(g))。

  关于非营利性教育机构责任的特殊规定

  512条(e)规定了在任何种情况下,从事教育或研究的职员或研究生雇员的行为或知识可能影响非营利性教育机构能够适用上述责任限制的条件,对暂时传播系统缓存的限制,职员或研究生被当作是“个人而不是服务商”,以避免其所在机构不符合可适用限制的条件。对其他限制,职员或研究生的知识或意识将不会对其所在机构造成影响,但必须符合下列条件:

  ·职员或研究生的侵权行为不涉及在网上提供近三年需要或建议的教学材料的访问入口。

  ·该机构在近三年中未收到两份以上的告知书,称其职员或研究生侵权。

  ·该机构对其所有使用者提供阐述和促进遵守版权法的信息材料。

第三章 计算机维护和维修

  第三章扩大了版权法第117条已经规定的关于计算机程序的责任免除,该免除允许计算机程序复制件的拥有者在必要时对该程序进行复制或修改以与计算机相结合。此次修订允许计算机的拥有者或承租者在维护或维修计算机的过程中,复制或许可复制一份计算机程序,该例外仅允许在启动计算机时自动复制一件,并且该计算机中已合法装有取得许可的该程序的复制件。新的复制件不得以任何其他方式使用,且必须在维护或维修完成后立即销毁。

第四章 其他规定

  明确版权局的权力

  401条(b)在版权法701条中增加了规定,确认版权局继续拥有在现有的一般权力下已经进行了几十年的政策与国际职能的权力。

  广播者的临时复制

  版权法112条规定了对制作“临时录制”的免责。这种录制是为便于进行传输。例如,根据此免责规定,广播电台可以将一组歌曲进行录制后广播新的录制品,而不是广播原版CD(在广播过程中原版 CD必须“在飞行中”被改变)。

  由于这种规定在DMCA颁布前就已确定,因此112条允许传输组织制作并最长保留6个月(即所谓“临时”)一份作品复制件,如果该组织有权传输该作品的公开表演或展示,无论是根据许可,或根据录音制品没有一般意义上的公开表演权的事实(这是与音乐作品不同之处)。

  1995年的录音制品数字表演权法(DPRA)在美国版权法中首次确立了录音制品中有限的公开表演权,该权利仅包括通过数字手段传输的公开表演,且对数字广播(即由FCC(联邦通信委员会)许可的地面广播电台的传输)适用免责。对预定的、非按要求点播的传输(即不是根据接收者特定要求的传输)适用法定许可。

  DMCA的402条将112条的免责做了扩大,包括了为便于录音制品的数字传输而进行的录制,条件是这种传输符合DPRA关于数字广播或法定许可的免责规定。112条的修订也允许广播组织在某些情况下为进行临时复制而规避控制访问的技术措施。

  远程教育研究

  在DMCA立法考虑的过程中,立法者对修订版权法,可能通过扩大现有的对110条(2)规定的教育广播的例外,以促进远程教育表现出了兴趣。DMCA403条要求版权局与相关各方进行磋商,就如何通过数字技术促进远程教育问题向国会提出建议,版权局必须在立法后6个月内提交此报告。

  版权局被要求考虑以下问题:

  ·规定新的免责的必要性。

  ·免责中应包括的作品种类。

  ·根据免责规定所可能使用的、作品内容的适当比例限制。

  ·什么人应当适用此免责规定。

  ·什么人应当根据免责规定得到远程教育材料。

  ·在何种程度上技术保护措施的使用应当作为适用免责规定的强制条件。

  ·在何种程度上取得许可的可能性应当作为衡量适用免责规定的条件。

  ·其他需要考虑的问题。

  非营利性图书馆和档案馆的免责

  DMCA404条对版权法108条关于非营利性图书馆和档案馆的免责规定做了修订,以符合数字技术和不断发展的保存工作要求。在DMCA立法之前,108条允许这些图书馆和档案馆为内部存档目的制作一份仿真复制件(非数字化的)。根据修订,108条允许多至3份的、可以是数字化的复制件,条件是这些数字复制件不得向图书馆建筑以外的公众传播。另外,修订还允许这些图书馆或档案馆将作品用新的格式复制,如果原格式已被淘汰的话。一也就是说,用来使作品被感受到的机器或装置不再生产或在商业市场上已不能被合理地得到。

  对录音制品数字表演权的网络传播的修订

  正如以上所论,国会于1995年颁布了 DPRA,规定了仅限于数字传输情况下的录音制品的表演权。在此立法下,涉及三种数字传输:(a)广播传输,免除被表演权的控制。(b)预定广播,一般适用法定许可。(c)按需点播传输,受完全的专有权控制。DPRA下的广播传输是指通过FCC许可的地面广播电台的传输。

  在过去的几年中,一些单位已开始使用流动录音技术在因特网上进行数字传输。这种行为不属于DMCA涉及的三种传输类型。 DMCA405条对DPRA进行了修订,将对预定广播的法定许可扩大到网络广播,将其作为新的一类“可适用此规定的非预定传输”。

  除扩大了法定许可的范围外,DMCA还修订了任何单位为符合适用该许可所必须达到的标准(而不是适用将现有标准保持原样不动的“祖父条款”的那些单位)。它还修订了确定版税率所应考虑的因素(同样适用“祖父条款”),为依法建立的仲裁组织根据合理的市场价值确定版税率提供指导。

  DMCA还规定了新的临时录制的法定许可。如上所述,DM- CA402条对版权法112条做了修订,允许临时录制一件以便于在 DPRA关于广播免责或法定许可规定下,对录音制品进行数字传输。希望根据112条的完全免则规定临时复制一份以上录音制品的传输组织,现在已符合制作额外临时录制品法定许可的条件。另外,新的法定许可适用传输组织进行临时录制,而不适用不受数字表演权控制的广播者。DMCA402条对免责规定的扩大不包括广播者。

  电影权利转让者的合同义务推定

  416条涉及作者、导演和演员在制片人无法再向其支付报酬的情况下,获得电影重映报酬的能力问题。现行的行业集体交易协议要求制片人在某些情况下从发行商那里取得推定协议,通过这种协议,发行商推定制片人有义务支付重映报酬。有些制片公司显然不总是这样守规矩,没有给行业协会能够向发行商追索的合同优先权。

  DMCA在《美国法典》第28篇中增加了新的第28章。该章规定被转让者应承担义务支付重映报酬。根据有关集体交易协议,制片商被要求推定被转让者有此义务。该义务仅仅是指发行商知道或有理由知道影片是在集体交易协议约束下制作的情况,或法院根据集体交易协议确认仲裁判定,而制片人未在90天内履行的情况。有两类转让不在此规定之列。第一种是仅为公开表演权的转让。第二种是担保权的转让,以及担保权人的后续转让。

  该规定还指派总审计长会同版权局局长一起进行一项研究,弄清导致制定该规定的电影业界的状况,以及该规定对电影业造成的影响。该研究要在此法颁布两年后完成。

第五章 对某些原创设计的保护

  DMCA第五章题为船体设计保护法(VHDPA),在《美国法典》第17篇中增加了新的第13章。该章确定了新的体系以保护对可使某些实用品在外形上有吸引力或与众不同的原创设计。为适用 VHDPA,“实用艺术品”仅限于不长于200英尺的船的外壳(包括甲板)。

  包含这种设计的实用艺术品一经公开或该设计的登记一经被公布,该设计即可根据VHDPA受到保护。如果设计在公开后两个月内不申请登记,则将不被保护。而且如果设计在申请登记之日前已公开一年以上,则不予登记。一旦登记,保护将从保护开始之日起持续10年。

  VHDPA可算是一个落日立法:该法将于颁布两年后失效(到2000年10月28日)。版权局被指派与专利局和商标局联合进行两项研究(第一个截止日期为1999年10月28日。第二个为2000年10月28日),来评估VHDPA所造成的影响。

  生效日期

  DMCA的大部分规定将于发布之日起生效。但有几个例外。第一章技术方面的修订是关于根据新的WIPO条约获得美国版权法保护的作品的条件。该部分要到条约生效后才能生效。同样,对这些作品的追溯保护也是要到条约生效后才能生效。对禁止规避访问人口控制措施的规定要在该法颁布2年后生效(2000年10月28日)。

  

注释

  1. Pcb.L.No.105-304.112 Stat.2860(1998年10月28日)。

  2.本文所述的“复制”一词是版权法第106节规定的作者专有行使的概括用法。因而,防止未经授权发行或公开表演作品的技术措施属于第二类权利范围。

  3.音乐许可公平法,在版权法中增加了新的第512节,该节数码的副本在技术性修订案中需要改正。

 
最新文章
相关阅读