Fair Circumvention (2008)
by Timothy K. Armstrong
474836Fair Circumvention2008Timothy K. Armstrong


Fair Circumvention


Timothy K. Armstrong[†]

I. Introduction edit

When copyrighted works are published in digital form,publishers may seek to prevent copyright infringements by embeddingtechnological protections into the published content. Publishers have astatutory incentive to deploy such technological protection measures(commonly referred to as “digital rights management” or “DRM”systems), for if they do, they may avail themselves of the protections ofthe Digital Millennium Copyright Act of 1998 (“DMCA”).[1] The DMCAforbids circumventing, or trafficking in devices that circumvent,technological measures that protect copyrighted works.[2] This statutoryprohibition on circumventing technological protection measures supplies

rights holders with an additional cause of action that they may elect topursue instead of, or in addition to, the ordinary remedies for copyrightinfringement.[3]

In a number of recent cases, however, courts have permitteddefendants to circumvent DRM measures or to traffic in circumventiondevices, finding no violation of the DMCA.[4] The courts in these casesoffered a number of reasons for rejecting the plaintiffs’ claims, including(1) that the technological subject matter of the parties’ dispute was notwithin the scope of the DMCA; (2) that plaintiffs were attempting toapply the DMCA in circumstances not contemplated by Congress at thetime it passed the statute; (3) that the plaintiffs were abusing the DMCAas a means of gaining improper advantage over a competitor in themarketplace; and (4) that the plaintiffs should be required to demonstratean underlying act of copyright infringement by the defendant as anecessary element of any DMCA claim. The first two of these argumentsrest on inferences and suppositions about legislative intent in the face ofminimally illuminating statutory text. The latter two are essentiallypolicy arguments that, whatever their persuasive appeal, are even lessreadily grounded in the language of the DMCA as passed.

These recent decisions gain persuasive force, however, ifcontextualized within the long history of judge-made exceptions to thegeneral provisions of federal copyright law. The common-law doctrine offair use, for example, began—and, even after receiving express statutoryrecognition in the Copyright Act of 1976,[5] continues to evolve—as ajudge-made exception to the statutory exclusive rights of copyrightholders.[6] So viewed, recent decisions may be creating what amounts to ajudge-made exception to the liability rules of the DMCA—what is in substance, even if it has not been so labeled by the courts, an emergingdoctrine of “fair circumvention.”

My aims herein are both descriptive and normative. As to theformer, I believe that the reference to an emerging judge-made commonlaw of fair circumvention more accurately describes what the courts are doing in fact when confronted with cases that test the limits of thestatutory ban on circumventing or trafficking in circumvention devices.To decide DMCA disputes, the courts are borrowing—sometimesexpressly, sometimes not—from copyright law principles, including fairuse. As to the latter, I conclude that further development of legal doctrinein this area ought to rest on the forthright acknowledgment and evolutionof an express judge-made “fair circumvention” exception to the DMCAthrough the ordinary means of case-by-case adjudication. As I willdiscuss below, acknowledging the link between the existing fair usedoctrine and the emerging “fair circumvention” doctrine would offer afar more robust analytical toolset than exists under the courts’ currentapproach, which involves divining (or, more accurately, imputing)legislative intent in the face of statutory silence. Indeed, several of thefactors the courts have seized upon as most salient, such as the nature ofthe underlying expressive work and the threat of economic harm to theplaintiff, are as clearly encompassed within the historical contours ofcopyright’s fair use doctrine as they are detached from the actualstatutory text of the DMCA.

An analytical caveat is in order, however: it is not my contentionthat the courts have imported copyright’s fair use exception wholesaleinto the DMCA. Although the statute states Congress’s intention topreserve fair use,[7] the anti-circumvention provisions of the DMCA makeno express exceptions for fair uses,[8] and some courts have rejected thenotion that a party accused of a DMCA violation may interpose a fair usedefense.[9] Although some language in more recent court decisions is morehospitable to the possibility that a fair use defense may exist in theDMCA context,[10] no court has yet gone so far as to hold thatcircumventing a technological protection measure is permissible underthe DMCA in order to make a fair use of the underlying copyrightedwork.[11] My contention, rather, is that courts are borrowing (and should borrow) factors and criteria that have developed under fair use en routeto creating what I have labeled a separate doctrine of “faircircumvention” under the DMCA. Continued borrowing of the same sortmay, in time, blur or even eliminate the distinction that presently existsbetween the scope of copyright’s fair use exception and the narrower, butgrowing, DMCA exception for fair circumvention. The fact that theborrowing is as yet incomplete, however, should not obscure thesubstantial amount that has already occurred or preclude furtherexpansions of the fair circumvention doctrine in the future as an ordinaryadjunct of the courts’ common-law powers to interpret and apply federalcopyright law.

Part II of this Article briefly surveys the enactment and text ofthe DMCA before turning to a detailed consideration of several casesthat have given the statute either a conspicuously broad, or aconspicuously narrow, reading. My review suggests that courts on bothsides of the divide over the proper reading of the DMCA are issuingopinions that are difficult to square with the statutory text they purport toconstrue. Because the text alone appears inadequate to explain the actualresults in DMCA cases, the inquiry expands in Part III of this Article toconsider whether other principles can be invoked to support the courts’decisionmaking. My principal conclusions here are that (1) courts may,and properly should, draw upon the broader corpus of federal copyrightlaw to illuminate the meaning of the DMCA; (2) partly for historicalreasons and partly because of the particular terms of the copyrightstatutes, federal copyright law leaves a comparatively broad domainavailable for judicial policymaking; and (3) the development ofcopyright’s fair use doctrine provides a useful model for the courts tofollow in crafting exceptions to liability under the DMCA. This analysisalso suggests that one of the criticisms leveled against some of the courtsin DMCA cases—to wit, that the courts are substituting their own policypreferences for Congress’s—is ill-founded in view of the courts’prominent historical role in the development of copyright law. Part IVseeks to guide further judicial development of the emerging faircircumvention doctrine by analogizing, first, to principles of fair use, andsecond, to policy distinctions that have been made in the DMCA cases todate. The goal here is to suggest that the courts should make explicit adebate that is currently occurring sotto voce under the surface of theirDMCA opinions. To foster development of a coherent body of doctrine under the DMCA, the courts should engage in a forthright balancing ofthe interests at stake in DMCA cases. The courts should not discountcopyright holders’ interests in protecting their works, nor knowledgeableconsumers’ interests in making ordinary uses of lawfully acquiredelectronics products, but should simply make explicit the factors theyemploy in declaring one or the other set of interests to predominate in agiven case.

II. Judicial Constructions of the DMCA edit

Because the courts in DMCA cases have declared repeatedly thattheir decisions rest solely on a consideration of the statute’s literal text, itis pertinent to begin by reviewing the circumstances that led Congress toenact the statute and the language it selected to effectuate its intent. Thesections that follow will summarize the background and text of thestatute’s anti-circumvention provisions before turning to a critical reviewof some of the key cases that have arisen under the DMCA to date.

A. Statutory Background edit

In 1996, at the urging of the Clinton Administration,[12] the World Intellectual Property Organization (“WIPO”) promulgated two newtreaties dealing, among other issues, with what was perceived as agrowing threat of copyright infringement in the digital arena. The treatiesproposed to authorize content owners to deploy technological measuresthat could effectively prevent such infringements from occurring bylimiting users’ practical ability to access or copy the protected works,except upon terms specified by the content owners. It was broadlyunderstood, however, that such access and copying controls could neverbe designed to be perfectly effective in all circumstances—sufficientlysophisticated users could circumvent the protections and access or copythe work.[13] To forestall this outcome, the 1996 WIPO treaties required signatory nations to adopt new legislation punishing circumvention ofaccess and copy control technologies.

First, Article 11 of the WIPO Copyright Treaty required asfollows:

Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.[14]

The contemporaneous WIPO Performances and Phonograms Treatyimposed a similar obligation, directing in Article 18 as follows:

Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by performers or producers of phonograms in connection with the exercise of their rights under this Treaty and that restrict acts, in respect of their performances or phonograms, which are not authorized by the performers or the producers of phonograms concerned or permitted by law.[15]

Title I of the DMCA, captioned the “WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998,” was enacted toimplement both of these treaty requirements.[16]

The relevant provisions of the DMCA define three distinctoffenses, one of which forbids circumvention of a technological measurewhile the other two forbid trafficking in circumvention devices. Thestatute’s anti-circumvention provision provides that: “No person shallcircumvent a technological measure that effectively controls access to awork protected under this title.”[17] The statute’s two anti-traffickingprovisions are each directed against different types of prohibited devices.The DMCA first forbids the making of or trafficking in devices thatcircumvent the same sort of access controls that are the subject of theanti-circumvention clause:

No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that—

(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;

(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.[18]

The other provision forbids making or trafficking in devices thatcircumvent copy control technologies:

No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that—

(A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof;
(B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; or
(C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof.[19]

As drafted, there is a certain lack of parallelism in the statute: theprovision forbidding trafficking in copy control circumvention devices isnot matched, as the access control trafficking provision is, by a separateclause outlawing the use of such a device, although this is perhapsexplainable by the fact that circumventing a copy control measure maybe separately punishable as copyright infringement.[20]

The DMCA provided definitions of two of the key phrasesemployed in the statute’s liability provisions. First, Congress definedwhat it meant by “circumvention”:

[T]o “circumvent a technological measure” means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner . . . .[21]

Congress next provided an explanation of the requirement that an accesscontrol measure “effectively control access” to a copyrighted work:

[A] technological measure “effectively controls access to a work” if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.[22]

As will be seen below, these definitional provisions have caused theirown share of difficulty for courts called upon to construe the DMCA.[23]

Congress contemplated three broad types of exemptions from theDMCA’s liability provisions. First, the statute includes a number ofprovisions excusing certain types of users from the statute’s liabilityprovisions, including nonprofit libraries, archives, and educationalinstitutions;[24] law enforcement and intelligence agents;[25] competingdevelopers of interoperable computer software;[26] and encryption andsecurity researchers.[27] Second, Congress provided a mechanism by whichcertain types of works would be exempted from the DMCA’s liabilityprovisions by means of a triennial administrative rulemaking conductedby the Library of Congress upon the recommendation of the Register ofCopyrights.[28] Finally, Congress sought to guide judicial constructions of the statute’s liability provisions by listing a number of countervailing policies and rights with which it disclaimed any intention to interfere, including fair use[29] and freedom of expression.[30] Congress similarly stated that it did not intend the DMCA to alter the traditional judge-made contours of secondary liability[31] or to force technology manufacturers to include any particular form of technological protection measure in their products.[32]

B. The DMCA in the Courts edit

The cases that have delineated the boundaries of the anticircumventioncause of action may be divided, without undueoversimplification, into two categories. On one side fall the cases thathave construed the DMCA broadly, enlarging its remedial reach byconstruing uncertainties in the statutory text against accused violators.On the other side are the cases that have given the statute a narrowreading, enunciating principles that support limits on the scope ofDMCA liability. Both sets of cases, however, give the statute a readingthat is at once rigidly formalistic and highly selective—that is, the courtssimultaneously insist that their interpretations are commanded by thestatutory text while disregarding or construing away other provisions thatactually appear in the DMCA.

1. The DeCSS Case edit

One of the earliest judicial applications of the DMCA, and stillthe high-water mark of the expansive view of the statute, was the socalled“DeCSS” litigation.[33] DeCSS was a computer program written toenable users to decode the audiovisual content of DVD-Video discs (more colloquially, “DVDs”) which had been scrambled using a rudimentary form of digital encryption known as the “Content Scramble System,” or “CSS.”[34] DeCSS made it possible for users to decrypt (and thereafter to view or copy in unencrypted form) the content of a CSS-encrypted DVD even if the user had not paid a licensing fee to the DVD Copy Control Association (“DVDCCA”), an industry group, for an authorized decryption key.[35]

Set-top DVD players produced by consumer electronicsmanufacturers included lawful, DVDCCA-licensed decryption keys.[36]Jon Johansen, a Norwegian teenager, acting in concert with unidentifiedothers, obtained such a licensed DVD player[37] and “reverse engineered”it to discover the algorithm employed by the CSS encryption system.[38]The practical necessity of designing DVD players to be able to play backencrypted DVD discs effectively ensured that such reverse engineeringwould be successful—that is, that it would be possible from studying theinput (an encrypted DVD) and the output (the decrypted video content)to draw correct inferences about the decryption algorithm that was beingemployed.[39] The result of Johansen’s work was the DeCSS program, which was posted on Johansen’s web site and quickly spread to hundreds of other sites worldwide.[40]

Journalist Eric Corley copied the DeCSS program to his webserver and made it available for readers to download.[41] This prompted aDMCA lawsuit against Corley and his publishing company. Corleyremoved DeCSS from his web site following the district court’s grant ofa preliminary injunction to the movie studio plaintiffs,[42] but maintainedhyperlinks from his site to other sites that “purport[ed] to offer [thesoftware] for download.”[43] The district court found that both Corley’soriginal posting of the DeCSS program and his posting of hyperlinks toother web sites where the program had been made available violatedSection 1201(a)(2)’s prohibition on trafficking in access controlcircumvention technologies.[44]

The court reasoned that CSS was a “technological measure thateffectively controls access to” a copyrighted work—to wit, the moviecontained on a DVD disc. It rejected the defendants’ arguments that CSScould not be said to “effectively control access to” the copyrightedcontent of a DVD because it was a minimal form of encryption.[45] Thecourt reasoned that because CSS, “‘in the ordinary course of itsoperation, requires the application of information or a process or atreatment, with the authority of the copyright owner, to gain access to awork,’”[46] it satisfied the statutory definition of “effectively controlaccess.” The protections of the DMCA, in other words, did not turn uponwhether the measure was actually “effective”—that is, whether itfunctioned in such a way as to frustrate unauthorized attempts to accessthe work.[47] Rather, the court reasoned, the dispositive question waswhether the copyright owners had granted express permission for the creation of the circumvention tool at issue: DeCSS circumvented what was “effectively” an access control mechanism because the copyright holder had provided an avenue for authorized decryption of the protected content (to wit, purchase of a license from the DVDCCA) with which the designers of DeCSS had failed to comply.[48] Because there was no “authority of the copyright owner” for the creation of such a tool, the court reasoned, the dissemination of DeCSS by the defendants necessarily violated the DMCA.[49]

The court rejected the defendants’ argument that circumventionof a technological measure for the purpose of making a fair use of theunderlying copyrighted work would be permissible under the DMCA.[50]The court’s reasoning began with the truism that copyright infringementand violations of the anti-circumvention provisions of the DMCA aredistinct offenses.[51] A defense to the former, accordingly, was notautomatically a defense to the latter. The statutory text, however, wassilent on the question whether fair use could be raised as a defense to aclaim under the DMCA. The court construed this silence as an implicitlegislative rejection of the fair use defense, reasoning that “[i]f Congresshad meant the fair use defense to apply to such [DMCA] actions, itwould have said so.”[52] Rather than “saying so,” however, Congress gaveindications that the court found adequate to conclude that fair use of theunderlying copyrighted work could not immunize a party from liabilityfor circumventing an access control mechanism. The court pointed, first,to the fact that authorization by the copyright holder was a completedefense to a DMCA violation; second, to the fact that Congress delayedthe statute’s effective date; and third, to the enumeration of someexceptions to liability in the DMCA itself.[53] The court found the DMCA“crystal clear” in providing no fair use defense to a trafficking claim[54]and refused any suggestion that it should construe the statute in favor ofsuch an exception. “In such circumstances,” the court concluded, “courts may not undo what Congress so plainly has done by construing the words of the statute to accomplish a result that Congress rejected.”[55]

The persuasive force of Reimerdes is occasionally impaired by the heated—at times, borderline intemperate—rhetoric of the court’sopinion. For example, the court seemed to insinuate that the DeCSS technology was guilty by association with various sordid topics also covered in the defendants’ magazine.[56] The court apparently found it damning that the defendants had previously published “a guide to the federal criminal justice system for readers charged with computer hacking.”[57] Elsewhere, the court likened the defendants to political assassins and the DeCSS code to a virus.[58] It painted the authors of DeCSS, who plausibly claimed to be motivated by the desire to play their lawfully purchased DVD discs on computers running the Linux operating system,[59] essentially as anarchists, describing them as “adherents of a movement that believes that information should beavailable without charge to anyone clever enough to break into the computer systems or data storage media in which it is located.”[60] The effect is to make it difficult to tell whether, and to what extent, thecourt’s sweeping reading of the DMCA’s liability provisions, and its denial that copyright’s fair use doctrine was relevant to the reach of the DMCA, truly rest upon a careful construction of the statute rather than on the judge’s manifest visceral dislike of the defendants.[61]

That the court’s hostile rhetoric provides the key tounderstanding its analysis is further evidenced by the fact that,considered on its own terms, Reimerdes articulates a facially dubiousconstruction of the statutory text. Section 1201(c)(1) of the DMCA, forexample, states Congress’s intention not to constrict the scope of the fairuse doctrine.[62] According to the Reimerdes court, this provision signifiedonly that fair use remained a defense to a claim for copyrightinfringement but did not provide a defense to a claim arising under theDMCA.[63] As so construed, however, Section 1201(c)(1) is meresurplusage, adding nothing to the statutory fair use defense to copyrightinfringement already provided in Section 107 of the Copyright Act.[64]Settled principles of interpretation counsel against a construction thatrenders statutory language superfluous.[65]

Still more troubling is the tension between the court’sinterpretation of the text of the DMCA and the provisions of thecopyright treaties that the DMCA was enacted to implement. As theReimerdes court noted,[66] Congress passed the DMCA to implement theUnited States’ obligations under the WIPO Copyright Treaty.[67] Article 11of that Treaty requires signatory nations to prohibit circumvention oftechnological measures “that restrict acts . . . which are not authorized bythe authors concerned or permitted by law.”[68] Fair use of copyrighted works, however, is expressly “permitted by law” in the United States.[69] To the extent that the DMCA is interpreted to implement the treaty obligations that prompted its enactment,[70] accordingly, the statute cannot plausibly be read to forbid circumvention for fair use.[71] Although the Reimerdes court recognized that its interpretation of the DMCA “le[ft] technologically unsophisticated persons who wish to make fair use of encrypted copyrighted works without the technical means of doing so,” it declared that this problem was “a matter for Congress.”[72] A court less animated by hostility to the defendants in the case at bar might more readily have perceived such an absurd consequence as evidence of error in its interpretation of the statute.[73]

2. The Durable Goods Cases edit

In a trio of more recent cases—Chamberlain Group, Inc. v. Skylink Technologies, Inc.,[74] Lexmark International, Inc. v. Static Control Components, Inc.,[75] and Storage Technology Corporation v. Custom Hardware Engineering & Consulting, Inc.[76]—two federal courts ofappeals refused to apply the DMCA to prevent circumvention of accesscontrol mechanisms embedded in durable goods.

=====a. Chamberlain v. Skylink=====

In Chamberlain v. Skylink, the plaintiff, Chamberlain,manufactured garage door openers that incorporated what the courtpresumed to be copyrighted computer software code.[77] Chamberlain’ssoftware was designed to recognize a certain set of transmitted numericalcodes as valid commands to open the owner’s garage door.[78]Chamberlain included in its software a separate routine that would“reset” the listing of accepted codes, enabling a user to open their garagedoor even if the first transmitted code was not recognized as valid.[79]Skylink, a competitor, produced and sold a “universal transmitter” thatwas capable of operating with garage door openers sold by many othercompanies, including Chamberlain’s. Skylink’s transmitter was designedto transmit a burst of three code sequences in rapid succession that wouldeither be recognized as a correct code, or else trigger the “reset” routinein Chamberlain’s software—resulting, in either case, in the opening ofthe owner’s garage door.[80]

Chamberlain sued, alleging that the code sequences weretechnological measures that protected access to the copyrighted softwareembedded in its garage door openers. The district court granted summaryjudgment to Skylink on Chamberlain’s DMCA claim, and the court ofappeals affirmed.[81]

The court in Chamberlain, like the court in Reimerdes,characterized the dispositive issue as whether the defendant hadauthority to access plaintiff’s copyrighted work in the manner in which itdid.[82] The two courts’ conceptions of what “authorization” entailed,however, could scarcely be more dissimilar. Whereas Reimerdes hadlooked only at whether the copyright owner had granted expresspermission for the defendant’s access,[83] the Chamberlain court viewedthe lack of Chamberlain’s permission as essentially irrelevant to the question before it, because the copyright statute itself supplied the necessary “authorization” for Skylink’s access.[84] So long as Skylink’s product was designed to enable uses that the copyright statute permitted, in other words, trafficking in such a device did not constitute a DMCA violation notwithstanding Chamberlain’s denial of permission.[85] The court rejected Chamberlain’s argument (which the Reimerdes court surely would have accepted) that “all such uses of products containing copyrighted software to which a technological measure controlled access are now per se illegal under the DMCA unless the manufacturer provided consumers with explicit authorization.”[86]

Although the court declared that its “inquiry ends with [the] clearlanguage” of the DMCA,[87] it went on to consider the issue in light of thestatute’s background, structure, and purpose. It found that the “[s]tatutorystructure and legislative history both make it clear that § 1201 appliesonly to circumventions reasonably related to protected rights.”[88] Quotingfrom the legislative history, the court emphasized Congress’s intention“‘to specify, with as much clarity as possible, how the right against anticircumventionwould be qualified to maintain balance between theinterests of content creators and information users.’”[89] That balancewould be upset, the court reasoned, if the statute were read asChamberlain wished. The crux of the matter, in the court’s view, wasChamberlain’s insistence “that no necessary connection exists betweenaccess and copyrights[90]—that is, that anti-circumvention liability underthe DMCA was unrelated to the question whether the defendant hadinfringed, or contributed to the infringement, of plaintiff’s copyrights.Noting that the DMCA was enacted in part to deter copyrightinfringement, the court reasoned that it would be illogical to construe thestatute so as to make irrelevant the question whether the plaintiff actuallyfaced potential infringement. The court concluded that “Congress couldnot have intended such a broad reading of the DMCA.”[91]

As a policy matter, this interpretation of the DMCA may havemuch to commend it. It harmonizes the DMCA with the remainder of theCopyright Act in a fashion that self-consciously seeks to preserve the Copyright Act’s balancing of the interests of content creators on the one hand and consumers and users of copyrighted works on the other.[92] Furthermore, it neatly sidesteps the often-debated question whether the DMCA is inherently inimical to fair use.[93]

The court’s interpretation, however, makes a sufficiently poor fitwith the text of the DMCA as enacted to raise challenging questionsconcerning the decision’s persuasive force in future cases. Nothing in thetext of Section 1201, for example, expressly conditions a defendant’santi-circumvention or trafficking liability upon a prior showing ofcopyright infringement.[94] Articulating the contrary view, the CopyrightOffice has suggested that, while circumvention of a copy controlmechanism for a noninfringing purpose would survive scrutiny under theDMCA, circumvention of an access control mechanism for the samepurpose would be illegal.[95] The Chamberlain court’s apparentassumption that the defendant must have either infringed, or at leasthelped contribute to the infringement of, plaintiff’s copyrights alsocoexists uneasily alongside Congress’s express disavowal in the DMCAof any intention to alter the existing contours of secondary liability forcopyright infringement.[96] In short, by purporting to rest its decision upon the “clear language” of the DMCA,[97] the Chamberlain court may have limited the persuasive reach of its own decision, for the actual language of the DMCA may as readily support a conclusion opposite the one the Chamberlain court reached.[98]

This is particularly true with respect to the court’s treatment of the pivotal issue of authorization. The DMCA, as the court correctly observed, “defines circumvention as an activity undertaken ‘without theauthority of the copyright owner.’”[99] The court concluded, however, that the copyright owner’s denial of authorization was not dispositive, basedon the court’s conclusion that other provisions of the Copyright Act provide an alternative source of “authority.”[100] This latter interpretation,to be sure, finds support in sources outside the statutory text.[101] A courtmore inclined to focus on the text of the statute itself, however,[102] mightas readily conclude that the phrase “authority of the copyright owner[103]necessarily implies that such authority is for the “copyright owner” togrant or withhold at its election.[104]

b. Lexmark International v. Static Control Components edit

The court in Lexmark International, Inc. v. Static Control Components, Inc.[105] avoided the Chamberlain court’s entanglement in the thicket of “authorization,” relying instead on the dubious notion that the purchase of a product containing unencrypted software code necessarily conferred on consumers the right to extract and copy that code.[106]

Lexmark involved a DMCA claim brought by a manufacturer ofcomputer printers against a supplier of aftermarket refilled tonercartridge components.[107] Lexmark, the printer manufacturer, sought toavail itself of the protections of the DMCA by embedding a piece ofcopyrighted software, the “Printer Engine Program,” in its printers, andanother software program, the “Toner Loading Program,” in its tonercartridges.[108] One purpose of these programs was to limit consumers’ freedom to install non-Lexmark toner cartridges by disabling their printers if they did so. Upon powering up, each Lexmark printer performed a two-step authentication sequence.[109] It first queried a separate microchip inside the inserted toner cartridge, which contained an eight-byte key combination. Applying a publicly available encryption algorithm known as “Secure Hash Algorithm-1” or “SHA-1,”[110] the printer calculated an authentication code based on the toner cartridge’s eight-byte key. Authentication succeeded if the result the printer calculated matched a parallel calculation undertaken by the chip on the toner cartridge itself. During the second stage of the authentication sequence, the Printer Engine Program downloaded a copy of another very short program (the Toner Loading Program) from a chip on the toner cartridge and computed a checksum of the downloaded bytes.[111] This stage of the authentication procedure succeeded if the checksum the Printer Engine Program calculated matched a value encoded elsewhere on the toner cartridge chip. The printer shut itself down unless both steps of the authentication procedure succeeded. The authentication procedure sought to ensure that consumers used only toner cartridges (whether new or refilled) supplied by Lexmark.[112]

Although defendant Static Control Components (“SCC”) did notcompete directly with Lexmark, it sold chips to Lexmark’s competitorsin the market for remanufactured toner cartridges.[113] SCC’s chips enabledLexmark’s competitors to produce toner cartridges that mimicked thetwo-stage authentication sequence when used in a Lexmark printer. SCCadvertised that its chips successfully bypassed the first step of Lexmark’sauthentication sequence.[114] For the second step of the sequence, SCC’schips contained a byte-for-byte copy of Lexmark’s Toner LoadingProgram, which enabled the chip to pass Lexmark’s “checksum”calculation.[115]

Lexmark charged that SCC’s chips infringed Lexmark’scopyrights in the Printer Engine Program and Toner Loading Program.Lexmark also alleged that SCC’s chips circumvented, in violation of theDMCA, a technological measure (specifically, the first step of the two-stepauthentication sequence) that “effectively controlled access” to itscopyrighted programs.[116] A federal district court agreed and preliminarily enjoined SCC’s distribution of its chips.[117] On SCC’s appeal, a fractured panel of the Sixth Circuit reversed.[118] The three panel judges wrote three separate opinions, although they agreed unanimously that Lexmark could not show a likelihood of success on its DMCA claim.[119]

The panel first expressed doubt that Lexmark’s Toner LoadingProgram (“TLP”), which was largely dictated by functional concerns andoccupied only 37 to 55 bytes of memory, was eligible for copyrightprotection at all—a necessary prerequisite to any claim under theDMCA.[120]

Lexmark’s longer and more complex Printer Engine Program(“PEP”), SCC conceded, was protected by copyright.[121] The panel,however, reasoned that the printer’s authentication sequence failed to“effectively control access” to that program. The PEP, the panelobserved, was built into every Lexmark printer and existed, unencrypted,in printer memory, where a sufficiently technologically knowledgeableuser could access it at any time without needing to employ Lexmark’sauthentication sequence. For that reason, the court wrote:

It is not Lexmark’s authentication sequence that “controls access” to the Printer Engine Program. It is the purchase of a Lexmark printer that allows “access” to the program. Anyone who buys a Lexmark printer may read the literal code of the Printer Engine Program directly from the printer memory, with or without the benefit of the authentication sequence, and the data from the program may be translated into readable source code after which copies may be freely distributed. No security device, in other words, protects access to the Printer Engine Program and no security device accordingly must be circumvented to obtain access to that program code.[122]

Because any user could copy the PEP without using the authenticationsequence, the court continued, that sequence could not be said to “control access” to the program, and certainly could not be said to do so “effectively”:

Because the statute refers to “control[ling] access to a work protected under this title,” it does not naturally apply when the “work protected under this title” is otherwise accessible. Just as one would not say that a lock on the back door of a house “controls access” to a house whose front door does not contain a lock and just as one would not say that a lock on any door of a house “controls access” to the house after its purchaser receives the key to the lock, it does not make sense to say that this provision of the DMCA applies to otherwise-readily-accessible copyrighted works. Add to this the fact that the DMCA not only requires the technological measure to “control[ ] access” but also requires the measure to control that access “effectively,” and it seems clear that this provision does not naturally extend to a technological measure that restricts one form of access but leaves another route wide open.[123]

The panel denied that its interpretation of “effectively controlsaccess” precluded application of the DMCA unless the plaintiff hadcreated “an impervious shield to the copyrighted work.”[124] The panelinsisted that the DMCA’s protection did not turn upon “the degree towhich a measure controls access to a work.”[125] But for the DMCA toapply, the court maintained that “the challenged circumvention devicemust indeed circumvent something. . . .”[126] Because any user could readthe Printer Engine Program directly from the printer, there was nothingto circumvent.

The two concurring opinions offered other avenues to the samedestination. One judge concurred separately on the grounds that everypurchaser of a Lexmark printer “acquire[d] an implied license to use thePrinter Engine Program for the life of that printer,”[127] and accordingly,the DMCA could not be found to protect any “right of the copyrightowner to prevent the consumer from using” that program.[128] Anotherjudge would have gone even farther, concluding that extending theprotections of the DMCA to Lexmark would be incompatible with legislative intent because of its anticompetitive effects in the market. Congress, the concurring opinion emphasized, never “intend[ed] to allow the DMCA to be used offensively in this manner,” which in the concurring judge’s view allowed a manufacturer to “create monopolies for replacement parts. . . .”[129] A device that circumvented such a monopoly-creating mechanism, this opinion reasoned, could not be said to be “primarily designed or produced for the purpose of” accessing copyrighted works.[130] The concurrence expressed the fear that, in the wake of the panel’s decision, companies would still try to “use the DMCA in conjunction with copyright law to create monopolies of manufactured goods for themselves just by tweaking the facts of this case[,]” and believed a broader opinion was required to forestall such a result.[131]

Lexmark, like Chamberlain, differs markedly from Reimerdes inits reading of the DMCA. The most striking contrast between Lexmarkand its predecessors, however, lies less in the court’s analytical approachand more in the attitudes and sympathies revealed in the judges’opinions. The court in Reimerdes was openly hostile towardstechnologically sophisticated parties who wished to use their ownconsumer electronic products in a manner inconsistent with the desires ofthose products’ suppliers.[132] Lexmark is as bountifully indulgent towardssuch technology-savvy users as Reimerdes was unsparingly averse. It isscarcely possible to imagine the court in Reimerdes penning a sentencelike this one from Lexmark:

Anyone who buys a Lexmark printer may read the literal code of the Printer Engine Program directly from the printer memory, with or without the benefit of the authentication sequence, and the data from the program may be translated into readable source code after which copies may be freely distributed.[133]

One cannot, of course, take this sentence literally; it is likely thatonly a minuscule number of printer owners in fact possess thetechnological acumen to “read the literal code of the Printer EngineProgram directly from the printer memory” as the panel somewhatbreezily suggests.[134] Lexmark, however, remains significant insofar as itevaluates the plaintiff’s technological protection scheme from theperspective of a knowledgeable, sophisticated end-user, rather than insisting, as Reimerdes does, that users must remain ignorant of the capabilities of the electronic products they have purchased.[135]

Nevertheless, despite its normative appeal, Lexmark ultimatelyarticulates an interpretation of the DMCA that is not readily squared withthe statutory text. The court’s stated assumption that any purchaser of aproduct containing unencrypted software code is necessarily allowed toextract that code from the product and make copies[136] surely has thegeneral rule backwards. Although the court’s analysis would be correctas to uncopyrighted code (or, what is the same thing, the uncopyrightablefunctional characteristics of code that is nominally subject tocopyright[137]), purchasers enjoy no general right to copy and distributeunencrypted copyrighted works.[138] Audio compact discs (“CDs”), forexample, ordinarily omit any form of encryption to protect the musicalworks recorded thereon,[139] but no one (and certainly not the Lexmarkcourt) believes that purchasers are generally immune from liability ifthey copy and distribute the unencrypted content of a music CD.[140]Although it is true (indeed, it is tautological) that a plaintiff cannotprevail under the DMCA where there is no technological measureprotecting the work in question (and therefore nothing to “circumvent”), Lexmark’s broader suggestion of a general right to copy unencrypted digital works surely goes too far.

Lexmark also made no serious effort to parse and apply thestatutory definition of the pivotal DMCA clause—“effectively controlsaccess.” Although the court included a citation to the district court’sdiscussion of the statutory definition,[141] absent from the court of appeals’opinion is any analysis of whether Lexmark’s authentication sequence“in the ordinary course of its operation, require[d] the application ofinformation, or a process or a treatment, with the authority of thecopyright owner, to gain access to the work.”[142] Instead, Lexmark—whiledenying that it was doing so[143]—applied an understanding of “effectivelycontrols access” that expressly made the extent of statutory protectiondependent upon the relative strength of the plaintiff’s technologicalprotection measure.[144] Is the Lexmark court’s effective revision of theDMCA preferable as a matter of policy? Perhaps. But it remainsexceedingly difficult to shoehorn the court’s interpretation into theexisting statutory language.[145] The tension between the court’s reasoningand the binding text of the DMCA can only limit the decision’sprecedential value—to the detriment of technology users who wouldbenefit from a more robustly articulated set of limitations on the scope ofthe statute’s circumvention and trafficking prohibitions.

c. Storage Technology Corporation v. Custom Hardware Engineering edit

In Storage Technology Corporation v. Custom Hardware Engineering & Consulting, Inc.,[146] the same court that decidedChamberlain sought again to borrow from ordinary copyright principlesto limit the reach of the DMCA. Plaintiff Storage Technology Corp.(“StorageTek”) manufactured data tape storage libraries that includedcopyrighted maintenance software code that loaded automatically at startup.[147] In the event of a maintenance problem, the software was designed to transmit coded error messages describing the symptoms of the problem only if supplied with a valid password.[148] Custom Hardware Engineering (“CHE”) was a competitor of StorageTek’s in the aftermarket for technical service and maintenance of StorageTek’s products. To access the maintenance error codes on tape libraries manufactured by StorageTek, CHE designed two devices to circumvent StorageTek’s password protection system.[149] Doing so enabled CHE to diagnose and repair problems with tape libraries manufactured by StorageTek.[150] StorageTek sued, alleging both copyright infringement and violation of the DMCA. It alleged that, by causing StorageTek’s customers’ tape libraries to transmit coded error messages, CHE had circumvented its password authentication mechanism and thereby gained access to (and created an unauthorized copy of) StorageTek’s copyrighted maintenance software.[151]

The court rejected StorageTek’s copyright claims, finding CHE’s activities protected by a statutory safe harbor for copies necessarily made in the course of maintenance or repair of a computer.[152] The failure of StorageTek’s claims for copyright infringement, the court then continued, was all but dispositive of its claims under the DMCA. The court reasoned, citing Chamberlain, that:

To the extent that CHE’s activities do not constitute copyright infringement or facilitate copyright infringement, StorageTek is foreclosed from maintaining an action under the DMCA. That result follows because the DMCA must be read in the context of the Copyright Act, which balances the rights of the copyright owner against the public’s interest in having appropriate access to the work. Therefore, courts generally have found a violation of the DMCA only when the alleged access was intertwined with a right protected by the Copyright Act. To the extent that StorageTek’s rights under copyright law are not at risk, the DMCA does not create a new source of liability.[153]

This interpretation of the DMCA rests upon the foundation of thecourt’s earlier decision in Chamberlain and, like that decision, is subjectto the objection that the DMCA itself does not require a plaintiff todemonstrate an antecedent act of copyright infringement as aprecondition to liability under either the anti-circumvention or traffickingprovisions.[154] Again, although the result in StorageTek might bedefensible (and even superior) as a matter of wise policy, it is remarkablehow far the court was obliged to bend the statutory text to reach itsresult.

III. How Should the Courts Interpret the DMCA? edit

If there is a common thread to be found uniting the judicialdecisions that construe the DMCA broadly with those that construe thestatute narrowly, it is their shared disregard of inconvenient provisionsthat actually appear in the statutory text and point to a conclusioncontrary to the one the court reached. Reimerdes effectively struck outthe DMCA’s express guarantee of continued fair use;[155] Chamberlain, thestatute’s reference to “the authority of the copyright owner;”[156] andLexmark, its definition of “effectively controls access.”[157] Efforts todevelop a coherent jurisprudence under the DMCA are only hampered,however, by judicial insistence on disregarding the text of the statutewhile simultaneously declaring that the text alone justifies the decision inthe case at bar. However desirable either set of decisions might appear asa normative matter, their precedential force will be diminished if futurecourts find it difficult to harmonize DMCA precedents with the languageof the DMCA itself. Judged against the standard of fidelity to thestatutory text—the standard that the courts themselves, by their repeatedreferences to what they portray as unambiguous statutory commands,seem to invite—the principal DMCA cases on both sides come up short.

If the courts are not simply enforcing the DMCA according to itsliteral terms, they must necessarily be exercising a measure ofinterpretive discretion—creating meaning from, rather than merelyfinding it in, the statutory language. Forthright judicial acknowledgmentof this reality, rather than the making of unsustainable pronouncementsas to what the statutory text alone is perceived to command, holds greater promise in developing a rational and consistent body of DMCA case law. Rather than ignoring provisions of the DMCA that suggest decisions contrary to the ones they wish to reach, we should prefer instead that the courts acknowledge the necessity of venturing beyond the four corners of the enacted text. Although such an acknowledgement is potentially controversial largely for political reasons,[158] the foreseeable benefits to both the courts and public from considering additional indicia of meaning beyond the bare text of the DMCA suffice to outweigh the risks. The benefits to be gained include rationality and predictability, and ultimately a DMCA regime that more closely resembles the world Congress believed it was creating in 1998.

The discussion that follows will begin by situating the DMCAwithin the broader corpus of federal copyright law. Although the DMCAcreated new obligations beyond those that already existed under thecopyright statute, it nevertheless drew heavily upon copyright concepts,language, and policies in delimiting those obligations. Because of themultiple interconnections between the DMCA and the remainder offederal copyright law, the analysis then turns to the question how thoseconnections can and should illuminate judicial decisions. Finding theDMCA to be unclear or internally inconsistent at a number of keyjunctures, I conclude that the courts should play the same policy-makingrole that they have historically performed in guiding the evolution ofcopyright. Finally, by way of illustrating some consequences that mightfollow if the courts were to proceed along the lines identified herein, Iconsider whether existing copyright principles of fair use may serve toguide future decisions in DMCA cases.

A. Reading the DMCA as a Copyright Statute edit

One identifiable source of the courts’ varying readings of theDMCA lies in their disagreements about the relevance, or lack thereof, ofthe remaining provisions of the Copyright Act. As some courts (andsome litigants) have portrayed it, the DMCA stands entirely apart frompreexisting copyright law.[159] Congress, on this reading, created a sui generisregulatory regime for technological protection systems, just as ithad previously done for semiconductor chips,[160] digital audio recordingdevices,[161] bootleg recordings,[162] and boat hulls.[163] The courts, on this view, should not look outside the DMCA’s anti-circumvention and trafficking provisions to inquire, when adjudicating a DMCA claim, whether a plaintiff’s copyright interests are at stake.[164]

Taken as a whole, however, the statutory text does notcomfortably accommodate the attempts of decisions such as Reimerdesto draw a sharp dividing line between the offense of copyrightinfringement on the one hand and violations of the DMCA on theother.[165] The two are clearly more closely related, their boundaries morepermeable, than these opinions suggest.

First, the DMCA contains multiple provisions that referexplicitly to copyright language and concepts. Reference to the broadercorpus of federal copyright law is essential to give these provisions of theDMCA any meaning at all. Liability for both circumvention andtrafficking, for instance, exists only where technological measuresprotect a presently copyrighted work; that is, the existence of a validcopyright is an express statutory precondition both to a claim forcopyright infringement and a claim arising under the DMCA.[166] One ofthe DMCA’s two bans on trafficking in circumvention devices imposesliability only where “a right of a copyright owner” is at stake.[167] TheDMCA does not tell us what the “rights of a copyright owner” are; onlythe Copyright Act can do that.[168] To take another example: although theDMCA refers repeatedly, at critical junctures, to the concept of theauthority of the copyright owner,[169] nothing in the DMCA identifies thecopyright owner whose “authority” is needed; only the Copyright Actdoes that.[170] Furthermore, nothing in the DMCA tells us how todetermine the scope of the “rights, remedies, limitations, or defenses tocopyright infringement, including fair use,”[171] or the scope of “vicariousor contributory liability for copyright infringement,”[172] with whichCongress disclaimed any intent to interfere.

The interconnections between copyright and the DMCA are evenmore substantial and pervasive, however, than the foregoing paragraphmight suggest. For example, the remedies Congress provided under the DMCA closely track the remedies available for copyright infringement.[173] The DMCA’s anti-circumvention provisions were enacted alongside provisions creating new defenses to claims for copyright infringement.[174] Both Congress and the President justified the enactment of the DMCA as a necessary measure to deter copyright infringement.[175] The statute gives authority to craft exceptions from its liability provisions in part to the Register of Copyrights.[176] Even the placement of the statute within the United States Code carries colorable significance: although an early version of the legislation that became the DMCA proposed to “move[] the anti-circumvention provisions out of Title 17” on the grounds that “these regulatory provisions have little, if anything, to do with copyright law,”[177] the eventual inclusion of the anti-circumvention provisions alongside the rest of the federal copyright law in Title 17 would appear to indicate that Congress recognized their connection with copyright.

More persuasive, therefore, are those courts that have attemptedto harmonize the DMCA with other provisions of copyright law,applying the settled principle that statutes in pari materia should beconstrued together.[178] Construing the DMCA alongside the rest ofcopyright law makes available powerful analytical tools of provenusefulness. Consider, for example, the functionality principle, whichrests upon the dichotomy long recognized in copyright law between ideaand expression. The familiar general rule is that, even where copyrightprotects a work, copyright protection does not extend to aspects of thework that are predominantly functional rather than expressive.[179] Courtsapplying this principle have declined to extend copyright protection toportions of computer software[180] or other articles[181] that reflectpredominantly functional, rather than expressive or creative, concerns.[182]The functionality doctrine serves a valuable purpose in ensuring thatcopyright protection does not restrict that which should remain “openand free to the use of the public.”[183]

Interpreting the DMCA as a copyright statute brings copyright’sfunctionality doctrine into play. The functionality principle, in turn, doesmuch to justify decisions like Lexmark and Chamberlain. Because theworks the plaintiffs in both those cases sought to protect were closely bound up with utilitarian considerations,[184] the functionality principle would suggest that those works were entitled to comparatively limited copyright protection. Interpreting the DMCA to extend comparably limited protections in the same circumstances might explain the courts’ decisions for the defendants in each of those cases. Conversely, interpreting the DMCA to provide a sui generis form of protection unconnected with traditional intellectual property principles makes such decisions correspondingly difficult to understand in view of their apparent departures from the text of the DMCA as written.

The functionality principle is only one of many useful analyticaltools that the courts have developed during the more than two centuriessince the enactment of the first federal copyright law.[185] Many of thoseconcepts carry as much potential explanatory power in today’s digitalworld as they did before the enactment of the DMCA. DMCAjurisprudence would be needlessly impoverished if the courts werewalled off from considering the broader history of federal efforts toprotect expressive works. Borrowing from long-established copyrightprinciples carries no perceptible risks of flouting legislative intent, andthe courts should, therefore, assume that general copyright principlesremain applicable in cases under the DMCA.

B. Copyright, Statutory Interpretation, and the DMCA edit

If, as I have argued, it is correct to interpret the DMCA as acopyright statute, rather than as a sui generis regulatory regimeunmoored from the broader corpus of intellectual property law, onepractical implication is a relatively greater policymaking role for thecourts. Although the development of federal copyright law has restedpartly upon a series of statutory enactments,[186] the copyright statutes havealways left the courts with substantial policymaking responsibilities.Indeed, some of the most important (and now unquestioned) doctrines inall of copyright, such as fair use, evolved from courts seizingpolicymaking functions even in the absence of an express legislativedelegation.[187] Congress, for its part, has generally not sought to craftexhaustive, comprehensive statutory text that leaves no discretion to the courts; to the contrary, it has repeatedly blessed judicial exercises of independent policymaking in matters of copyright.[188] Copyright treatises, too, recognize the historical and ongoing policymaking responsibilities of the courts.[189]

This history puts one obvious objection to the creation of ajudge-made fair circumvention doctrine in a rather different light. Insubstance, the objection would be that to recognize a new judge-madedoctrine of fair circumvention would be an affront to Congress’slawmaking role.[190] Congress having spoken, the argument would run, thecourts’ obligation as “faithful agents” of the legislature[191] is to apply theenacted text as written, and to leave to Congress the task of craftingexceptions from whatever liability rules it chose to adopt.[192] The fact thatCongress expressly established certain limitations upon the liability rulesadopted in the DMCA, this line of reasoning would continue, onlystrengthens the presumption against the recognition of additionalunstated exceptions by judicial fiat.[193]

To be sure, the courts can and do rely on the enacted statutorytext as the primary and best indication of legislative intent,[194] althoughthe command to apply the enacted text as written is not inexorable.[195]Nevertheless, whatever the overall merits of the interpretive theory thatcourts must act only as “faithful agents,” applying the statutory textprecisely as written by Congress without interjecting their own preferences or policy judgments,[196] it seems quite clear that the role of the courts in the copyright arena is not, and properly should not be, so limited. To the contrary, the text and history of federal copyright legislation in the United States have made the courts more coequal partners than mere servants of the legislature.

The courts would face a nearly insurmountable task in striving toapply the Copyright Act strictly as written, for the statute includesprovisions that simply cannot be enforced according to their literalterms.[197] The statute’s simultaneous grants of overlapping rights tomultiple parties without expressly ranking their relative priority haveraised challenging questions of policy for the courts.[198] Elsewhere, thestatute leaves pivotal terms entirely undefined.[199] The nature of the text to be construed, at the outset, thus poses a substantial challenge to the notion that the courts in copyright cases may simply begin and end their inquiry by parsing the statute.[200]

Indeed, the legislative record reveals a number of instances inwhich Congress in the 1976 Act intended to defer to prior judicialpractice, rather than providing new rules that would override what thecourts had previously done. The areas in which Congress deferred toprior judicial practice include the core statutory requirement oforiginality[201] and the reach of protection for depictions of usefularticles.[202] Similarly, although the Copyright Act (unlike, say, the PatentAct[203]) omits any express provisions making persons other than directinfringers liable for copyright infringement,[204] the courts haveconsistently applied common-law principles of secondary liability in thecopyright context.[205] This judicial development of secondary liability for copyright received Congress’s blessing in the committee reports accompanying the Copyright Act of 1976.[206]

Even in the absence of express legislative ratification, the courtsoccasionally exercise their interpretive authority under the Copyright Actto protect countervailing policies. Thus, for example, although the literaltext of the Copyright Act appears to assign the copyright in scholarlyworks to the institutions that employ the scholar,[207] the courts haverefused to so construe the act on public policy grounds, instead invokinga judge-made “teacher’s exception” to vest in scholars themselves thecopyright interests in their own work.[208] Indeed, the Supreme Court hasrepeatedly exercised its interpretive authority to “import” new theories ofliability, and new defenses, from the Patent Act into the Copyright Act—citing, in each case, what the Court portrayed as strong policy reasons forreading the Copyright Act as if it included language actually found inanother statute altogether.[209]

Thus, although nominally a creature of statute, federal copyrightlaw has actually grown and evolved as a hybrid of statutory andcommon-law principles. Partly for historical reasons, and partly becauseof the vagueness of many of the governing provisions of the CopyrightAct, the courts in copyright cases have long exercised substantialpolicymaking duties. Theories of statutory interpretation that demote thecourts to a more passive role, commanding them merely to readCongress’s words and apply them exactly as written, make an especiallypoor fit for copyright law. The applicable statutory provisions, with fewexceptions, simply are not written in such a way as to make such judicialpassivity feasible, and two centuries of copyright history haveaccustomed the courts to a more coequal role in the development ofcopyright doctrine—a role Congress has repeatedly recognized andtowards which it has repeatedly expressed approval.

The DMCA is of a piece with the rest of federal copyright law inthat the text as enacted fairly cries out for a careful, nuanced parsingrather than wooden literalism. The DMCA, like the rest of the copyrightstatute, includes multiple provisions that seem to pull in conflicting directions.[210] What is worse, the statute’s definitional provisions are a muddle, creating uncertainty at the very point where the statute most needs (and promises) clarity. Consider first the legislative definition of “circumvention,” the key analytical concept around which both the anti-circumvention and anti-trafficking liability provisions ultimately revolve:

[T]o “circumvent a technological measure” means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner. . . .[211]

At the most literal level, every work published in digital form is“scrambled” or “encrypted” solely by reason of being digital. Any workpublished in digital format consists of a series of ones and zeroes thatmust be deciphered to reveal the work’s original content[212]—whether thatcontent represents the language of a poem, the color of an artist’s palette,the sound of a French horn, or the images of a motion picture. Playing anaudio CD on one’s computer is an exercise in converting those ones andzeroes back into sound waves[213]—a process that, under any ordinaryunderstanding of those words, might be thought to involve“descrambling” or “decryption” of the content. It appears to have beenquite far from Congress’s intention to forbid ordinary uses of digitalworks not also protected by a separate DRM mechanism,[214] but the textas enacted leaves ample room for a textual formalist argument that theDMCA’s reach is much more expansive in actuality.[215] Something morethan mere literalism, in other words, is necessary to prevent thisdefinitional provision from vastly expanding the scope of the DMCAbeyond the limits of Congress’s apparent intent.[216]

The other pertinent statutory definition—that of “effectivelycontrols access”—is still worse, although the reasons why this is sobecome clear only after first attempting to construe the statute withoutreference to the definition. The DMCA forbids circumvention, or thetrafficking in tools that enable circumvention, of technological measuresthat “effectively control access” to a copyrighted work.[217] Ordinary readers or courts might attempt to parse this language literally, only to find themselves stymied by ambiguity. Reasoning from the text alone, one might get as far as the notion that “effectively controls access” must mean something different from merely “controls access,”[218] otherwise the word “effectively” becomes superfluous.[219] But what, then, can “effectively” mean?[220] Perhaps Congress meant to require a certain minimum strength of access control—that is, perhaps Congress meant to say to the courts: a technological protection measure must not only protect access to a work, but must meet some minimal standard of efficacy in doing so; a trivial cipher will not suffice.[221] But the text might equally well support another reading, one that would preclude inquiry into the strength of an access control measure. Congress might have feared, for instance, that courts would interpret the word “control” as requiring absolute control, and added the word “effectively” as a way to signal that something less was required. That is, Congress might have meant the word “effectively” to mean something like “approximately” or “in general.”[222] Having identified this potential ambiguity in the statutory text, the reader might consult the definition to see what Congress actually intended.

The definition, however, turns out in reality to be an anti-definition. It obfuscates, rather than clarifies, the meaning of the term itpurports to define:

[A] technological measure “effectively controls access to a work” if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.[223]

Absolutely nothing in this text speaks to the question whether the word“effectively” is meant to connote strength or its absence. Moreover, thedefinitional provision compounds the ambiguity of the rest of the text byintroducing new concepts—such as “the application of information” and“the authority of the copyright owner”—that are difficult to anchor inany ordinary understanding of the terms they purport to define. Is thecopyright owner’s authority relevant to an understanding of whether aDRM mechanism has “effectively” restricted access to a work? Or to whether the mechanism “controls” access to the work? Or to whether what is controlled amounts to “access” rather than something else? It is no easy task to shoehorn this definition into the statutory phrase meant to embody it. Small wonder that the courts find the statute confusing.[224]

There is, in short, no reason to think that the DMCA is lessamenable to the methods of judicial policymaking that have guided thedevelopment of the rest of copyright law. To the contrary, the DMCAsuffers from some of the same sorts of infirmities that have confirmedthe need for an independent judicial role.

C. Fair Use and Interbranch Partnership edit

There is precedent for the courts exercising their substantialpolicymaking powers in the domain of copyright to craft judge-madeexceptions to liability based on public policy considerations even wherethe literal text of the statute seems to require a finding of infringement.Two features of copyright law in particular support an ongoing judicialrole in recognizing exceptions to liability. First, copyright infringementis a strict liability offense; there is no requirement in the statute that theinfringer have acted willfully or knowingly,[225] or even consciously.[226]Even so-called “innocent infringers” fall within the statute’s liabilityprovisions, although they may be liable for reduced statutory damages.[227]Second, the statute provides severe penalties for copyright infringement.A copyright plaintiff who cannot prove a penny of actual injury maynevertheless receive statutory damage awards that loom extraordinarilylarge in many cases: $750 to $30,000 per work infringed, increased to upto $150,000 per work if the infringement was willful.[228] Many courts have applied these provisions strictly even where the resulting award of damages seems far disproportionate to any plausible claim of actual harm by the plaintiff.[229] The conjunction of strict liability and heavy penalties makes it all too easy to imagine cases where literal application of the statute would yield an unjust result, requiring an award of damages far disproportionate to the defendant’s actual culpability.

The courts, however, have played an important role here—aiming, with at least some success, to sand the rough edges off ofcopyright’s strict-liability, sanctions-heavy regime. They have done soby what might at first glance seem to be sheer defiance of Congress,refusing to find liability even in circumstances where the statute appearsto require it. Nowhere has this been more clear than in the developmentof copyright’s doctrine of fair use.

The Supreme Court has characterized fair use as a limitation oncopyright holders’ exclusive rights when “rigid application of thecopyright statute . . . would stifle the very creativity which that law isdesigned to foster.”[230] Although the fair use doctrine is now recognizedby statute,[231] fair use received legislative recognition only after more thana century of growth as a judge-made copyright exception. The modernfair use doctrine is commonly traced to Justice Story’s 1841 opinion inFolsom v. Marsh.[232] The case was brought by the holder of the copyrightin a twelve-volume biography of President Washington that consistedpredominantly of edited reproductions of Washington’s own presidentialpapers.[233] The defendant copied more than three hundred pages ofWashington’s records from the plaintiff’s books in order to produce his own two-volume biography of Washington.[234] Justice Story found that both Washington’s private[235] and public correspondence[236] were covered by copyright. Justice Story, although “not without some regret,”[237] came to the conclusion that the defendant had simply taken too much of the plaintiff’s work, and issued a permanent injunction against thepublication or sale of the defendant’s two-volume Washington biography.[238] He based this decision on the likelihood that the defendant’s work would dampen market demand for the plaintiff’s work by supplying an effective substitute:

If so much is taken, that the value of the original is sensibly diminished, or the labors of the original author are substantially to an injurious extent appropriated by another, that is sufficient, in point of law, to constitute a piracy pro tanto. . . . In short, we must often, in deciding questions of this sort, look to the nature and objects of the selections made, the quantity and value of the materials used, and the degree in which the use may prejudice the sale, or diminish the profits, or supersede the objects, of the original work.[239]

Enacted more than sixty years after Justice Story’s decision inFolsom v. Marsh, the landmark Copyright Act of 1909 made no mentionof fair use.[240] Nevertheless, courts applying the Copyright Act of 1909continued to recognize circumstances in which a defendant whoseactivities amounted to infringement under the literal text of the statutewould nevertheless be excused from liability.[241] By no later than the1940s, the courts were beginning to echo Justice Story’s language fromFolsom in determining whether particular acts of copying could beexcused under the fair use doctrine:

Whether a particular use of a copyrighted article, without permission of the owner, is a fair use, depends upon the circumstances of the particular case, and the court must look to the nature and objects of the selections made, the quantity and value of material used, and the degree in which the use may prejudice the sale, diminish the profits, or supersede the objects of the original work.[242]

Fair use was recognized as expressing a judge-made policy againstimposing liability,[243] notwithstanding the literal terms of the copyrightstatute, where it was believed that imposing liability would disservepublic purposes.[244]

Fair use is a sufficiently settled principle today that it is perhapseasy to forget the doctrine’s origins as a judge-made shield against whatthe courts, based on considerations of sound policy, perceived to be theover-deterrent effects of the copyright statutes as written. The parallelsbetween the DMCA and the rest of federal copyright law, accordingly,leave ample room for similar doctrinal developments under the DMCA.It would be consistent with the substantial policymaking responsibilitiesthe courts have long exercised under copyright for the courts to identifycountervailing policy considerations militating against DMCA liability inproper cases. As the example of the fair use doctrine shows, where suchcountervailing policy considerations exist, the courts stand on relativelyfirm historical ground in declining to impose liability even where thedefendant’s conduct appears to fall within the literal prohibitions of thestatute. It would, accordingly, be broadly consistent with the historicaldevelopment of federal copyright law and with the courts’responsibilities as coequal partners in copyright policymaking to developa set of rules defining circumstances in which the literal terms of theDMCA’s circumvention and trafficking prohibitions will not be giveneffect—to craft, as I have labeled it herein, a doctrine of faircircumvention.[245]

IV. Towards Fair Circumvention edit

If the courts are, as the foregoing analysis suggests, free todevelop their own exceptions to the DMCA’s liability provisions, howshould they do so? The courts’ present approach—announcingessentially ad hoc exceptions based upon dubious assertions about whatthe statutory text expressly requires—yields perhaps the worst of allpossible worlds. By purporting to rest their decisions upon the statutorytext alone, the courts seem to eschew broader policy considerationsbased upon sources that are surely pertinent to a complete understandingof the DMCA (such as the requirements of the relevant 1996 WIPOTreaties or the Clinton Administration’s 1995 White Paper[246]) but whichlie outside the statute itself. And by making overbroad or unjustifiedstatements about what the statutory text alone is perceived to require, thecourts undermine the authority of their own positions—future courts maysimply examine the statute for themselves and discover that it does notreally read as advertised.

The answer is not, it seems to me, for the courts to come to anagreement on what the literal text of the DMCA really requires. Suchstrict formalism is a recipe for circularity, given that the DMCA (no lessthan the rest of the copyright statute) includes provisions pointing inmultiple directions. The statute speaks with many voices at once: punishcircumvention, but protect libraries and schools;[247] punish trafficking, butallow computer security and encryption researchers to share theirdiscoveries;[248] “protect[ ] . . . [the] right[s] of a copyright owner,” butwithout “affect[ing] . . . fair use.”[249] At the end of the day, the statute maynot have a single clear meaning to discover.[250]

That is not to say, however, that the courts are left withoutguidance. To the contrary, just as other copyright doctrines offerexplanatory tools the courts may employ in DMCA cases,[251] the fair usedoctrine itself gives the courts many analogous concepts upon which a“fair circumvention” doctrine might rest. The discussion that follows willbegin by assessing what copyright doctrine, including principles of fairuse, might teach future litigants and courts about the proper constructionof the DMCA, then conclude by evaluating possible arguments againstthis approach.

A. From Fair Use to Fair Circumvention edit

The fair use provision of the copyright statute gives the courts anonexclusive list of factors to consider in determining whether anychallenged use is fair: “(1) the purpose and character of the use,including whether such use is of a commercial nature or is for nonprofiteducational purposes; (2) the nature of the copyrighted work; (3) theamount and substantiality of the portion used in relation to thecopyrighted work as a whole; and (4) the effect of the use upon thepotential market for or value of the copyrighted work.”[252]

It is not difficult to imagine ways in which these same factorsmight be profitably analogized to explain limits on the reach of DMCAliability under the rubric of “fair circumvention.” The second fair usefactor, for example—“the nature of the copyrighted work”—recognizesthat copyright law does not extend exactly the same level of protection toall works. Rather, as the Supreme Court has explained, “some works arecloser to the core of intended copyright protection than others, with theconsequence that fair use is more difficult to establish when the former works are copied.”[253] Copyright protects works lying along a broad continuum between “creative or instructive”[254] works at one end and works of comparatively little originality (such as factual compilations) at the other.[255] The closer a work falls to the creative/expressive end of the continuum, the stronger the author’s claim of entitlement to restrict subsequent uses of the work, and the less room is available for colorable claims of fair use.[256] So, too, in the DMCA context, the courts might usefully differentiate between circumvention aimed at allowing the circumventer to access and copy a creative, expressive work (such as the movies at issue in Reimerdes) and circumvention that merely enables access to less expressive, more utilitarian works (as in Chamberlain and Lexmark).[257] Just as the fair use doctrine would do relatively little to defeat a claim of copyright infringement where works closer to the “core” of copyright protection are copied,[258] a doctrine of fair circumvention would impose comparatively weak limits on the reach of DMCA liability in similar circumstances.

Risks to intellectual property markets, to take another example,are readily encompassed within both the first and, especially, the fourthfair use factors. Here, too, it is analytically useful to distinguish betweencases in which circumvention of a DRM mechanism threatens to providea complete substitute for authorized purchases of an expressive work (thesituation in Reimerdes),[259] and cases in which circumvention merely exposes a maker of consumer products to additional marketplace competition (as in Chamberlain and Lexmark). Copyright protects holders from certain types of economic injury—principally, those stemming from substitution of the defendant’s copy for the plaintiff’s[260]—but not all economic injuries from copying are redressable as copyright infringement.[261] Settled principles of fair use, again, may provide a useful guide to courts in developing a doctrine of fair circumvention under the DMCA.[262]

Finally, consider the problem of circumvention undertaken fornoninfringing purposes. Suppose I try to spark a discussion among myCopyright students about the fair use claim at issue in Hustler Magazine, Inc. v. Moral Majority, Inc.,[263] the infamous Jerry Falwell Campari adparody case.[264] To place the dispute in its historical context as part of thelong-running feud between the late Reverend Falwell and the publisherof Hustler magazine, I wish to show my students a one-minute clip fromdirector Miloš Forman’s acclaimed motion picture, The People vs. Larry Flynt,[265] which includes a subplot revolving around Flynt’s copyrightinfringement lawsuit.[266] To avoid losing the DVD in my office or leavingit in the classroom, I wish to extract a one-minute excerpt from the DVDonto my laptop, which I can then hook up to the classroom projector.[267]Copyright law would surely permit this; mine is a paradigmatic fairuse—a minuscule excerpt (third factor) used for nonprofit educationalreasons (first factor) with no likelihood of impairing, and indeed someprospect of benefiting, the market for sales or exhibitions of authorizedcopies of The People vs. Larry Flynt (fourth factor).[268]

But to copy the excerpt from the DVD, I must bypass CSS—andthat, the Reimerdes opinion warns me sternly, I may not do.[269] When thefilmmakers sue me and my employer for violating the DMCA, what canwe do? The Library of Congress recently provided a DMCA exemptionpermitting the extraction of clips from CSS-encrypted DVDs, but it doesnot apply to law professors.[270] If my employer and I must rely (as thecourts have said we must) solely upon the statutory text of the DMCA,then our defense is colorable, but hardly bulletproof—according to caseslike Reimerdes, the text of the statute forbids circumvention even for fairuses, notwithstanding Congress’s stated intention to the contrary. TheWhite Paper and the WIPO Treaties, however, both seem to approve ofcircumvention undertaken for such noninfringing purposes.[271] “Faircircumvention” would permit the courts in DMCA cases to consult theseoutside sources for guidance, ultimately yielding greater doctrinalconsistency between the defenses available to claims for copyrightinfringement and for violations of the DMCA.

By citing these examples, I do not mean to suggest thatcopyright’s fair use doctrine should operate as an outer boundary on thescope of a permissible fair circumvention defense under the DMCA. Mypoint is less ambitious—even if the courts do not transplant copyright’sfair use doctrine, root and branch, into the somewhat different soil of theDMCA,[272] it is nevertheless true that existing principles of fair useprovide at least some analytical guidance upon which the courtsprofitably may rely as they begin to develop a separate body of “faircircumvention” jurisprudence.[273] What future directions that body of law may take are for the courts to say. It is better that they begin to do so rather than continuing to invoke the fiction that the text of the statute alone commands their contradictory decisions.

B. Possible Criticisms edit

The mode of analysis sketched out in the preceding section,which generally contemplates construing the DMCA in the light of thebroader corpus of copyright law and with particular attention to the fairuse doctrine, might plausibly be attacked as either unduly lax or undulyconfining. Neither objection, it seems to me, ought to obscure itspotential advantages in achieving rationality and coherence of judicialdoctrine under the DMCA.

First, construing the DMCA in light of the broader purposes ofcopyright poses no real risk that unchecked judicial activism will thwartlegislative intent. My recommendation is not that the courts make up forthemselves a set of policies and purposes for the DMCA, but rather thatthey seek guidance from a comparatively well-developed body ofanalytically related copyright jurisprudence. Construing related statutorytexts harmoniously is a familiar exercise well within the courts’institutional competence.[274] And many interpretive theories recognize thepropriety of consulting broader statutory purposes as aids to determinethe meaning of an enacted text.[275] Congress spoke in copyrightlanguage[276] and was thinking copyright thoughts[277] in the DMCA, and it would hardly represent judicial usurpation of lawmaking authority for the courts to construe the statute consistently with its background.

The objection from the opposite direction would be thatconstruing the DMCA as a part of the broader corpus of copyright lawthreatens, rather than protects, the public’s interest in access toexpressive works, in view of the generally pro-plaintiff orientation of thecourts in copyright cases.[278] I readily concede that the conception ofcopyright as predominantly a vehicle for advancing public ends, althoughfirmly grounded in the text of the Constitution,[279] has met with a chillierreception from the courts in recent decades.[280] But it has hardlydisappeared from the landscape. Courts and commentators alike continueto speak of copyright’s value in promoting broader public ends involvingthe availability of expressive works, not merely as a mechanism fortransferring wealth from the public to copyright holders.[281] And the scopeof protections available under copyright law for the public interest, evenunder a restrictive view, surely compare favorably with the mostrestrictive current interpretations of the DMCA. Analogizing from thelatter to the former, accordingly, ought to pose no serious risk ofcontracting, and some possibility of enlarging, the sphere of viable publicuses of digital copyrighted works.

V. Conclusion edit

The institutional response of the courts to the enactment of theDMCA has been puzzling. Federal copyright law has long developed asan exercise in interbranch partnership, with Congress and the courtsgenerally acting as coequal partners in the development of doctrine. Thecourts have played particularly important roles in limiting the potentiallyundesirable reach of copyright’s liability and penalty provisions, whichmight readily threaten other expressive values if applied strictly aswritten. Under the DMCA, in contrast, the courts seem to have ceded a good deal of their historical policymaking role in copyright matters back to Congress. Both the cases construing the DMCA broadly and the cases construing it narrowly have attempted to portray their results as resting not upon policy considerations, but instead as commanded solely, or primarily, by the literal text of the statute. In doing so, the courts have at once demoted themselves from the coequal policymaking role they have traditionally occupied in copyright and imposed on the text of the DMCA a far greater burden than it can colorably bear, for like other copyright statutes, the DMCA includes a multiplicity of provisions pointing in different directions.

The effect has been a devaluing of copyright doctrine in cases under the DMCA to no identifiable benefit. The development of a cohesive body of DMCA case law is hampered by the courts’ insistence on disregarding provisions that actually appear in the statute. Doing so both diminishes the persuasive force of their decisions (for later courts may decide instead to emphasize the provisions of the DMCA that the earlier courts discounted) and inhibits consideration of plainly relevant source materials outside the enacted text. Copyright law, for its own valid purposes, long ago outgrew such strict formalism. It would be far preferable for the courts in DMCA cases to do likewise.

Perhaps they have. After all, cases like Chamberlain and Lexmark do seem to draw upon matters of legislative policy and intent to give the DMCA quite a different reading than did cases like Reimerdes. Perhaps the courts are silently thinking “fair circumvention” thoughts, while outwardly preserving a façade of formalist orthodoxy to forestall intervention by a more narrowly textualist Supreme Court. If that is their game, however, it seems hardly to be worth the candle. A court’s insistence in case #1 that the literal text of the DMCA says something it clearly does not leaves all the parties in case #2 worse off, for they must either frame their own arguments around the supposed literal text of the statute (a recipe for continued confusion) or invoke policy considerations outside the statutory text that precedent has declared to be irrelevant.

Development of a rational, cohesive body of doctrine under the DMCA would be served far more readily by a forthright judicial declaration that, although particular conduct might be encompassed within the four corners of the statute’s liability provisions, it nevertheless will not be punishable for good and adequate reasons of policy. Debate thereafter could revolve around ascertaining the reasonable limits of those policies and any countervailing principles (prominently including, to be sure, fidelity to the intent of Congress and the enacted text where it supplies an ascertainable rule of decision). This is the route the courts took when developing copyright’s fair use doctrine, and it remains a sensible alternative for developing a “fair circumvention” doctrine under the DMCA.



 Assistant Professor of Law, University of Cincinnati College of Law. B.A. 1989,M.P.Aff. 1993, J.D. 1993, The University of Texas at Austin; LL.M. 2005, Harvard Law School. Ipresented earlier versions of this paper at the 2008 Intellectual Property Scholars Roundtable atDrake University Law School and in a faculty colloquium at the Chicago-Kent School of Law. Forhelping me improve my thinking about the subjects considered herein, I am indebted to DerekBambauer, William McGeveran, and Wendy Seltzer, none of whom bears responsibility for anyerrors in my analysis. Research support from the Harold C. Schott Foundation is gratefullyacknowledged, as is the research assistance of Jeffrey Nye and Christopher St. Pierre.

Copyright © 2008, Timothy K. Armstrong. This work is licensed under the CreativeCommons Attribution-Share Alike 3.0 United States license. To view a copy of this license, visithttp://creativecommons.org/licenses/by-sa/3.0/us/, or send a letter to Creative Commons, 171 2ndStreet, Suite 300, San Francisco, California, 94105, USA. For purposes of Paragraph 4(c) of saidlicense, proper attribution must include the name of the original author and the name of the Brooklyn Law Review as publisher, the title of the Article, the Uniform Resource Identifier, as described in thelicense, and, if applicable, credit indicating that the Article has been used in a derivative work.

  1. Pub. L. No. 105-304, 112 Stat. 2360 (1998) (codified as amended in scattered sectionsof 17 U.S.C.).
  2. 17 U.S.C. § 1201(a)(1)(A), (a)(2), (b)(1) (2006). See infra notes 17-32 andaccompanying text. Such legal protections against circumvention are conventionally believed to benecessary because of the impossibility of engineering technological protection measures that arestrong enough to withstand attack by sophisticated users in all cases. See, e.g., Competition, Innovation, and Public Policy in the Digital Age: Hearing Before the S. Comm. on the Judiciary,107th Cong. 2 (statement of Edward W. Felten, Associate Professor of Computer Science, PrincetonUniversity), available at http://felten.com/felten_testimony.pdf (declaring “unbreakable”technological protections to be “as implausible to many experts as a perpetual motion machine”);Pamela Samuelson, DRM {and, or, vs.} the Law, Comm. of the ACM, Apr. 2003, at 41, 42-43.
  3. The causes of action are not, however, coextensive. To be sure, the DMCA’s anticircumventionrule applies only to copyrighted works. See 17 U.S.C. § 1201(a)(1)(A) (prohibitingcircumvention of “a technological measure that effectively controls access to a work protected under this title,” that is, a copyrighted work); Id. § 1201(a)(2)(A), (B), (C) (employing similar language interms prohibiting trafficking in circumvention devices); Id. § 1201(b)(1)(A), (B), (C) (employingsimilar language in terms prohibiting trafficking in devices that circumvent copyright protections).Thus, neither a copyright infringement claim nor a claim alleging violation of the DMCA may bepremised upon a user’s accessing a work in the public domain. Cf. Assessment Techs. of WI, LLC v. WIREdata, Inc., 350 F.3d 640 (7th Cir. 2003) (embedding public domain data in copyrightedsoftware program gave rise to no claim for copyright infringement against party who sought only tocopy the raw data itself). Nevertheless, even actions that do not constitute copyright infringementmay run afoul of the DMCA’s anti-circumvention and anti-trafficking provisions. To take only oneobvious example, merely distributing a circumvention tool suffices on its face to violate § 1201(a)(2)irrespective of whether that tool is ever actually employed in a manner that results in copyrightinfringement.
  4. See, e.g., Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc., 431 F.3d 1374 (Fed. Cir. 2005) (permission to copy plaintiff’s software was implicit in the licensingagreement); Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178 (Fed. Cir. 2004)(finding no proof of connection between the circumvention device and the protections afforded bycopyright law); Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522 (6th Cir. 2004)(Copyright Act provided implied authorization for users to copy unencrypted program code). See infra Part II.B.2.
  5. See 17 U.S.C. § 107 (2006).
  6. See infra notes 230-244 and accompanying text.
  7. See 17 U.S.C. § 1201(c)(1), discussed infra notes 29, 62-65 and accompanying text.
  8. See, e.g., David Nimmer, A Riff on Fair Use in the Digital Millennium Copyright Act,148 U. Pa. L. Rev. 673, 727-39 (2000) (demonstrating that DMCA’s purported safeguards for usersfail to accommodate existing fair use doctrine); id. at 739 (“The result of these juxtapositions seemsto be a conscious contraction of user rights.”).
  9. See, e.g., Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 321-24(S.D.N.Y. 2000) (analyzing the doctrine of fair use), aff’d sub nom. Universal City Studios, Inc. v.Corley, 273 F.3d 429 (2d Cir. 2001). See infra Part II.B.1.
  10. See, e.g., infra note 153 and accompanying text.
  11. I have previously suggested that such a decision would represent only a modestextension of currently existing doctrine and would be potentially desirable insofar as it wouldeliminate the discrepancy that presently exists between the extent of lawful fair uses of works that are protected by DRM mechanisms and those that are not. See Timothy K. Armstrong, Digital Rights Management and the Process of Fair Use, 20 Harv. J.L. & Tech. 49, 114-16 (2006). As suggestedin the remainder of this paragraph, however, my goal in this Article is somewhat broader and is notlimited to ensuring adequate protection for fair use of copyrighted works that exist in digital form.Cf., e.g., Robert D. Denicola, Access Controls, Rights Protection, and Circumvention: Interpreting the Digital Millennium Copyright Act to Preserve Noninfringing Use, 31 Colum. J.L. & Arts 209,220-32 (2008) (arguing that courts should interpret the DMCA with specific focus on preserving fairuses); YiJun Tian, Problems of Anti-Circumvention Rules in the DMCA & More Heterogenous Solutions, 15 Fordham Intell. Prop. Media & Ent. L.J. 749, 779-81 (2005) (same).
  12. A three-year study by a White House working group culminated in the 1995publication of Intellectual Property and the National Information Infrastructure, known as the“White Paper.” Bruce A. Lehman, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights(1995) [hereinafter “White Paper”], available at http://www.uspto.gov/go/com/doc/ipnii/ipnii.pdf.The White Paper recommended that Congress adopt new legislation

    to prohibit the importation, manufacture or distribution of any device . . . the primary

    purpose or effect of which is to avoid, bypass, remove, deactivate, or otherwisecircumvent, without authority of the copyright owner or the law, any process, treatment,mechanism or system which prevents or inhibits the violation of any of the exclusive

    rights under Section 106 [of the Copyright Act].

    Id. at 230. When initial efforts to adopt legislation enacting the White Paper’s recommendations encountered resistance in Congress, however, the Administration turned to the WIPO process instead. See Jessica Litman, Digital Copyright 122-30 (2001).

  13. See supra note 2.
  14. WIPO Copyright Treaty, art. 11, Dec. 20, 1996, S. Treaty Doc. No. 105-17, 2186 U.N.T.S. 121.
  15. WIPO Performances & Phonograms Treaty, art. 18, Dec. 20, 1996, S. Treaty Doc. No. 105-17, 2186 U.N.T.S. 203.
  16. Digital Millennium Copyright Act, Pub. L. No. 105-304, tit. I, § 101, 112 Stat. 2860, 2861 (1998).
  17. 17 U.S.C. § 1201(a)(1)(A) (2006).
  18. Id. § 1201(a)(2) (emphasis added).
  19. Id. § 1201(b)(1) (emphasis added).
  20. See Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178, 1195 (Fed. Cir.2004) (quoting S. Rep. No. 105-90, at 12 (1998)). This is not, of course, to say that copyrightliability necessarily follows any time a copy control mechanism is circumvented; the courts wouldbe left in each such case to determine whether the circumvention was excused under other provisionsof copyright law, such as fair use. See, e.g., Michael Landau, Has the Digital Millennium Copyright Act Really Created a New Exclusive Right of Access?: Attempting to Reach a Balance Between Users’ and Content Providers’ Rights, 49 J. Copyright Soc’y U.S.A. 277, 288 & nn.52-53 (2001).
  21. 17 U.S.C. § 1201(a)(3)(A) (2006).
  22. Id. § 1201(a)(3)(B).
  23. See, e.g., infra notes 141-145 and accompanying text. On the textual infirmity of the DMCA’s definitional provisions, see generally infra notes 211-224 and accompanying text.
  24. See 17 U.S.C. § 1201(d) (2006). These users are exempt only from the statute’s anticircumvention provision, not its ban on trafficking in access or copy control devices. See id. § 1201(d)(4). They may circumvent the access controls “solely in order to make a good faith determination of whether to acquire a copy of that work” for noninfringing purposes. Id. § 1201(d)(1). Other limitations in the DMCA’s exception for nonprofit libraries, archives, and educational institutions generally parallel the language used elsewhere in the Copyright Act excusing libraries and archives from liability for copyright infringement under similar circumstances. Compare id. § 1201(d)(5) with id. § 108(a)(2) (2006).
  25. See id. § 1201(e).
  26. See id. § 1201(f).
  27. See id. § 1201(g), (j).
  28. See id. § 1201(a)(1)(B)-(D). The results of the Librarian’s most recent triennial rulemaking are are available in the Federal Register. Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 71 Fed. Reg. 68,472, 68,479-80 (Nov. 27, 2006) [hereafter “2006 Final Rule”]. I have previously suggested that the Librarian of Congress’s triennial rulemaking proceedings have been comparatively narrow and technical in scope and that the rulemaking proceedings are unlikely to supply broad, robust immunity from DMCA liability for acts of circumvention undertaken for lawful purposes. See Armstrong, supra note 11, at 117 n.274; cf. also infra note 270 and accompanying text (offering an illustrative example of circumvention undertaken for noninfringing purposes that nevertheless falls outside the exemption of the 2006 Final Rule). Although the 2006 Final Rule does excuse certain classes of uses from DMCA liability, the Librarian has consistently rebuffed requests to promulgate broader rules exempting most or all circumventions undertaken for noninfringing purposes. See, e.g., 71 Fed. Reg. at 68,479 (proposed exemption #8); Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 Fed. Reg. 62,011, 62,014-15 (Oct. 31, 2003) (especially proposed exemptions #1, #2, and #4); Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 65 Fed. Reg. 64,556, 64,571-72 (Oct. 27, 2000) (rejecting proposed exemption for “‘fair use’ works”). In view of this history, some commentators have concluded that “the rulemaking process faces limitations that render it incapable of fully resolving the DMCA’s adverse effect on noninfringing uses.” Aaron K. Perzanowski, Evolving Standards and the Future of the DMCA Anticircumvention Rulemaking, 10 J. Internet L. 1, 1 (2007).
  29. 17 U.S.C. § 1201(c)(1) (“Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.”).
  30. Id. § 1201(c)(4) (“Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products.”).
  31. Id. § 1201(c)(2) (“Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof.”).
  32. Id. § 1201(c)(3) (“Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as such part or component, or the product in which such part or component is integrated, does not otherwise fall within the prohibitions of subsection (a)(2) or (b)(1).”).
  33. Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001).
  34. See Reimerdes, 111 F. Supp. 2d at 308 (describing CSS). The weak form of encryptionemployed by CSS led some cryptographic experts to express skepticism as to “[w]hether CSS is aserious cryptographic cipher. . . .” Frank A. Stevenson, Cryptanalysis of Contents Scrambling System (Nov. 8, 1999), http://www.cs.cmu.edu/~dst/DeCSS/FrankStevenson/analysis.html.
  35. See Reimerdes, 111 F. Supp. 2d at 310-11 & n.60; see also DVD Copy Control Ass’n Inc. v. Bunner, 10 Cal. Rptr. 3d 185, 188 (Cal. Ct. App. 2004) (explaining content industry’s reliance on exclusive licensing scheme to limit dissemination of decryption keys).
  36. See Reimerdes, 111 F. Supp. 2d at 310.
  37. Id. at 311. The court’s reference to “a licensed DVD player,” id., presumably signifies either a hardware or software DVD player that Johansen and his collaborators had purchased. Although the district court remarked that “[n]either Mr. Johansen nor his collaborators obtained a license from the DVD CCA[,]” id., the significance of this finding is unclear; having lawfully purchased a licensed DVD player, the parties surely had no reason to think themselves obliged to purchase a second license to make use of their purchased player. Cf. infra notes 132-135 and accompanying text.
  38. Reimerdes, 111 F. Supp. 2d at 311. “Reverse engineering”—ascertaining the likely content of a computer program based on inferences from studying its inputs and outputs—has been commonly recognized not to present a copyright problem, even where some intermediate copying of copyrighted works occurs, particularly where the effect of the “reverse engineering” is to aid in the development of new platforms for the use of copyrighted content and thereby to foster competition. See, e.g., Sony Computer Entm’t, Inc. v. Connectix Corp., 203 F.3d 596, 602-08 (9th Cir. 2000) (finding reverse engineering of plaintiff’s copyrighted software code lawful under fair use doctrine notwithstanding possible losses to plaintiff due to competition with defendant’s unlicensed platform for its software); Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510, 1523-24 (9th Cir. 1992) (rejecting plaintiff’s claim that defendant’s reverse engineering infringed its copyright, and observing that “an attempt to monopolize the market by making it impossible for others to compete runs counter to the statutory purpose of promoting creative expression and cannot constitute a strong equitable basis for resisting the invocation of the fair use doctrine”); cf. Vault Corp. v. Quaid Software, Ltd., 847 F.2d 255, 270 (5th Cir. 1988) (finding state statute authorizing contractual prohibitions on reverse engineering preempted as incompatible with purposes of the Copyright Act). But cf. Atari Games Corp. v. Nintendo of Am. Inc., 975 F.2d 832, 844 (Fed. Cir. 1992) (noting limits on lawful reverse engineering); see also infra notes 129-131 (noting courts’ concern with interpreting the DMCA to avoid harm to competition).
  39. See, e.g., Cory Doctorow, Microsoft Research DRM Talk, June 17, 2004,http://craphound.com/msftdrm.txt (“At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with ciphertext, the cipher and the key. At this point, the secret isn’t a secret anymore.”). Princeton University computer scientist Edward Felten made the same point during the Bunner litigation over the trade secret status of CSS:

    Because so many people have the skills and tools to reverse-engineer programs, [DVDCCA’s] decision to authorize the release of CSS in software form made it virtually inevitable that somebody, somewhere, would reverse engineer it. . . . Once CSS became public knowledge, its keys inevitably also would have become public knowledge. . . . It is common knowledge that use of a forty-bit key allows an easy brute-force search to determine the key, given a sample of encrypted material (e.g., a DVD movie disk).

    Decl. of Prof. Edward W. Felten in Supp. of Def.’s Mot. for Summ. J., part V ¶¶ 5-6 (Nov. 28, 2001), available at http://w2.eff.org/IP/Video/DVDCCA_case/20011128_felten_decl.html.
  40. Reimerdes, 111 F. Supp. 2d at 311.
  41. Id. at 312.
  42. See Universal City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211 (S.D.N.Y. 2000) (granting preliminary injunction).
  43. Reimerdes, 111 F. Supp. 2d at 311, 312-13 & n.98.
  44. Id. at 316-24 (finding violation of Section 1201(a)(2) based on Corley’s posting of DeCSS program), 324-25 (finding violation based on posting of hyperlinks to other web sites where DeCSS was available for download); see also supra note 18 and accompanying text.
  45. See Reimerdes, 111 F. Supp. 2d at 317 (internal quotation marks omitted).
  46. Id. (quoting 17 U.S.C. § 1201(a)(3)(B) (2006)).
  47. See id. at 318 (“CSS ‘effectively controls access’ to copyright DVD movies. It does so, within the meaning of the statute, whether or not it is a strong means of protection.”).
  48. See id. at 317-18.
  49. See Reimerdes, 111 F. Supp. 2d at 317 (quoting 17 U.S.C. § 1201(a)(3)(B)) (“[A] technological measure ‘effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires . . . the authority of the copyright owner, to gain access to [the] work.”).
  50. Id. at 321-24. The defendants raised this argument in an ultimately unsuccessful effort to bring DeCSS within the “safe harbor” announced in Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 442 (1984), for technologies “capable of substantial noninfringing uses.” See Reimerdes, 111 F. Supp. 2d at 323-24. In general, the courts have resisted importing the Sony analysis, which arose originally in the context of a claim for contributory copyright infringement, as a defense to claims under the DMCA. See, e.g., RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *8 (W.D. Wash. Jan. 18, 2000).
  51. Reimerdes, 111 F. Supp. 2d at 322. But see infra Part III.A.
  52. Reimerdes, 111 F. Supp. 2d at 322.
  53. Id. at 323.
  54. Id. at 324.
  55. Id. (quotation marks omitted); see also RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *8 (W.D. Wash. Jan. 18, 2000) (reasoning that accused producer of circumvention tool may not defend against DMCA claim based on its customers’ fair uses of the tool).
  56. Reimerdes, 111 F. Supp. 2d at 308-09 (“Not surprisingly, 2600: The Hacker Quarterly has included articles on such topics as how to steal an Internet domain name, access other people’s e-mail, intercept cellular phone calls, and break into the computer systems at Costco stores and Federal Express.”) (footnotes omitted); see also id. at 343 (“Defendants are in the business of disseminating information to assist hackers in ‘cracking’ various types of technological security systems.”). The court’s repeated use of the words “hacker” and “hacking” as pejorative epithets—a usage at odds with the generally accepted meaning of those terms among technologically sophisticated computer users, for whom the word “hacker” connotes skill and competence rather than malicious intent—also suggests a certain visceral dislike of the defendants. Cf., e.g., Lawrence Lessig, Code: Version 2.0 8 (2006) (“Our government has already criminalized the core ethic of this movement, transforming the meaning of hacker into something quite alien to its original sense.”); Eric S. Raymond, The Cathedral and the Bazaar 231-32 (1999) (explaining terminological distinctions between skillful “hackers” and malicious “crackers”). See generally Sam Williams, Free as in Freedom: Richard Stallman’s Crusade for Free Software app. B (2002).
  57. Reimerdes, 111 F. Supp. 2d at 309. Creating such a guide, one might presume, could as readily be portrayed as a form of public service. Cf., e.g., United States Dep’t of Justice, National Criminal Justice Reference Service, http://www.ncjrs.gov/.
  58. Reimerdes, 111 F. Supp. 2d at 304.
  59. See id. at 311.
  60. Id. at 346. The court’s comparison of the free and open-source software movement to destructive anarchism, already a strained analogy at the time of its decision, became wholly insupportable in the years following Reimerdes. See, e.g., Don Tapscott & Anthony D. Williams, Wikinomics: How Mass Collaboration Changes Everything 92 (2006) (“No longer just an ad-hoc collection of individual volunteers, most of the participants in the Linux ecosystem are paid employees of Fortune 100 tech firms.”).
  61. See also Mark Deffner, Note, Unlawful Linking: First Amendment Doctrinal Difficulties in Cyberspace, 3 Minn. Intell. Prop. Rev. 111, 133-34 (2002) (noting that “[e]lements of the Reimerdes court’s opinion would seem to point towards picking a conclusion first and then finding reasons to support it” and identifying other “aspects of the court[’]s decision” that “also suggest a predisposition against the defendant”).
  62. 17 U.S.C. § 1201(c)(1) (2006) (“Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.”).
  63. See supra notes 51-55 and accompanying text. The court of appeals also read § 1201(c)(1) in a similar fashion. See Universal City Studios, Inc. v. Corley, 273 F.3d 429, 443 (2d Cir. 2001).
  64. See 17 U.S.C. § 107 (2006); see also Landau, supra note 20, at 299-300 (“If fair use only applied to acts of copying once access was authorized, the language under section 107 would cover the defendant’s activities. Adding a fair use provision in section 1201 shows that fair use was meant to be considered in situations involving circumvention technologies.”).
  65. See, e.g., Dole Food Co. v. Patrickson, 538 U.S. 468, 476-77 (2003) (“Absent a statutory text or structure that requires us to depart from normal rules of construction, we should not construe the statute in a manner that is strained and, at the same time, would render a statutory term superfluous.”); Duncan v. Walker, 533 U.S. 167, 174 (2001) (“We are thus ‘reluctan[t] to treat statutory terms as surplusage’ in any setting. . . . We are especially unwilling to do so when the term occupies so pivotal a place in the statutory scheme as does the word ‘State’ in the federal habeas statute.”) (citations omitted); Bailey v. United States, 516 U.S. 137, 145 (1995) (relying on “the assumption that Congress intended each of its terms to have meaning”).
  66. See Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 316 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001).
  67. See supra note 16 and accompanying text.
  68. WIPO Copyright Treaty, supra note 14, art. 11 (emphasis added). The obligation created under Article 18 of the WIPO Performances and Phonograms Treaty is phrased similarly. See supra note 15 and accompanying text.
  69. 17 U.S.C. § 107.
  70. On the general principles applicable to the interpretation of statutes and treaties, see 1A Norman J. Singer, Sutherland Statutes & Statutory Construction § 32:6 (6th ed. 2008).
  71. The Clinton Administration’s 1995 White Paper, which also prompted the enactment of the DMCA, suggested this very solution to the possible conflict between copyright’s fair use doctrine and its proposed anti-circumvention law. The White Paper recommended the enactment of legislation prohibiting circumvention of copy controls “without authority of the copyright owner or the law[.]” White Paper, supra note 12, at 230 (emphasis added). It then reasoned that “if [a] circumvention device is primarily intended and used for legal purposes, such as fair use, the device would not violate the provision, because a device with such purposes and effects would fall under the ‘authorized by law’ exemption.” Id. at 231.
  72. Reimerdes, 111 F. Supp. 2d at 324.
  73. The Second Circuit affirmed the trial court’s decision on appeal. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). The appellate court’s decision adds little to our understanding of the DMCA, however, because the appellants elected to rely primarily onconstitutional, rather than statutory, arguments. See id. at 444-45, 458-59. The appellants first argued that limitations on fair use offended First Amendment principles. U.S. Const. amend. I. The Court of Appeals reasoned that the functional characteristics of the DeCSS code disentitled it to the full extent of First Amendment protection that attaches to ordinary speech, and that the DMCA was a content-neutral regulation that served a substantial governmental interest unrelated to the suppression of free expression and was not unduly burdensome. See id. at 452-54. I have previously expressed doubt as to the ongoing viability of this portion of the court’s analysis. See Armstrong,supra note 11, at 68 n.87. If we conceptualize fair use as protecting First Amendment values, as the Supreme Court did in Eldred v. Ashcroft, 537 U.S. 186, 219-20 (2003), then constructions of the DMCA that work to restrict fair use in practice may become constitutionally suspect. More recent cases may suggest greater judicial willingness to subject copyright legislation to First Amendment scrutiny. See, e.g., Golan v. Gonzales, 501 F.3d 1179, 1187-96 (10th Cir. 2007). The Court of Appeals further rejected any argument grounded on the Progress Clause, U.S. Const. art. I, § 8, cl. 8, rather than the First Amendment. See Corley, 273 F.3d at 458-59.
  74. 381 F.3d 1178 (Fed. Cir. 2004). See infra notes 77-104 and accompanying text.
  75. 387 F.3d 522 (6th Cir. 2004). See infra notes 105-145 and accompanying text.
  76. 421 F.3d 1307 (Fed. Cir. 2005). See infra notes 146-154 and accompanying text.
  77. The court believed itself required to assume that Chamberlain’s program was covered by copyright because of the procedural posture in which the appeal arose—to wit, the grant of summary judgment in favor of Skylink. See Chamberlain, 381 F.3d at 1185 n.4. Accordingly, the court refrained from discussing in detail whether the existence of a valid copyright—the sine qua non of protection under the DMCA, see infra note 166—had been satisfactorily demonstrated by the plaintiff. From what little the court’s opinion reveals, however, there would appear to be at least some grounds to question whether Chamberlain’s software, which was designed predominantly to fulfill the functional purpose of opening and closing owners’ garage doors, qualified for DMCA protection at all. See infra note 137; cf. infra note 120.
  78. For a fuller description of the operation of Chamberlain’s product, see Chamberlain, 381 F.3d at 1183-84.
  79. See id. at 1184-85.
  80. See id.
  81. Chamberlain Group, Inc. v. Skylink Techs., Inc., 292 F. Supp. 2d 1040, 1046 (N.D. Ill. 2003), aff’d, 381 F.3d 1178 (Fed. Cir. 2004); Chamberlain, 381 F.3d at 1204.
  82. See generally 17 U.S.C. § 1201(a)(3)(A)-(B) (2006) (defining both “circumvent a technological measure” and “effectively controls access to a work” in terms that require consideration of “the authority of the copyright owner”).
  83. See supra notes 48-49 and accompanying text.
  84. See Chamberlain, 381 F.3d at 1193 (“[T]he copyright laws authorize consumers to use the copy of Chamberlain’s software embedded in the GDOs that they purchased. . . . [C]opyright laws authorize members of the public to access a work.”); id. at 1182 (“Skylink’s accused devices enables only uses that copyright law expressly authorizes, and is therefore presumptively legal.”).
  85. Cf. supra note 71.
  86. Chamberlain, 381 F.3d at 1193.
  87. Id. at 1194.
  88. Id. at 1195 (emphasis added). This is, to be sure, not a holding that actual infringement must be proven before DMCA liability can attach. Short of that showing, however, it is not clear what the court means by the requirement of a “reasonable relation” between infringement of the plaintiff’s copyright and the viability of its claim under the DMCA.
  89. Id. at 1196 (quoting H.R. Rep. No. 105-551, at 26 (1998)).
  90. Id. at 1197.
  91. Id.; see also infra note 175.
  92. The notion of a proper balancing of interests as between creators and consumers of content has been recognized as essential to serving the broader public interest in the creation and dissemination of new works, a process that could readily be stifled if creators’ rights grew too powerful. See, e.g., Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156 (1975) (copyright law “reflects a balance of competing claims upon the public interest: Creative work is to be encouraged and rewarded, but private motivation must ultimately serve the cause of promoting broad public availability of literature, music, and the other arts.”); White v. Samsung Electronics America, Inc., 989 F.2d 1512, 1513 (9th Cir. 1993) (Kozinski, J., dissenting from denial of rehearing en banc) (“Overprotecting intellectual property is as harmful as underprotecting it. . . . Culture, like science and technology, grows by accretion, each new creator building on the works of those who came before. Overprotection stifles the very creative forces it’s supposed to nurture.”); Yochai Benkler, The Wealth of Networks 38 (2006) (“If we pass a law that regulates information production too strictly, allowing its beneficiaries to impose prices that are too high on today’s innovators, then we will have not only too little consumption of information today, but also too little production of new information for tomorrow.”).
  93. See, e.g., Nimmer, supra note 8; Armstrong, supra note 11, at 51 n.5. The court in Chamberlain was careful to reserve judgment on this question. See Chamberlain, 381 F.3d at 1199 n.14.
  94. Indeed, legislative proposals to amend the DMCA to expressly permit circumvention for noninfringing purposes tend to negate any suggestion that the existing statutory text already embraces such a rule. See H.R. 1201, 109th Cong. (1st Sess. 2005), § 5(b)(1) (proposing to amend 17 U.S.C. § 1201(c)(1) by adding the following text: “and it is not a violation of this section to circumvent a technological measure in order to obtain access to the work for purposes of making noninfringing use of the work”).
  95. U.S. Copyright Office, The Digital Millennium Copyright Act of 1998: U.S.Copyright Office Summary 4 (1998), available at http://www.copyright.gov/legislation/dmca.pdf (“[S]ince the fair use doctrine is not a defense to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited.”). As noted above, nothing in the DMCA forbids circumvention of copy controls, although such circumvention may be punishable under ordinary copyright law where it results in copyright infringement. See supra note 20 and accompanying text.
  96. See 17 U.S.C. § 1201(c)(2) (2006); see also Zohar Efroni, Towards a Doctrine of “Fair Access” in Copyright: The Federal Circuit’s Accord, 46 IDEA 99, 107 (2005) (“[T]he text of neither the anti-circumvention nor the anti-trafficking provisions conditions liability with showing a link to activity that interferes with traditional copyrights.”).
  97. See supra note 87 and accompanying text.
  98. See Efroni, supra note 96, at 106 (suggesting that “Chamberlain performed a considerable deviation from the textual and contextual framework of the law in order to promote a certain policy”).
  99. Chamberlain, 381 F.3d at 1193 (quoting 17 U.S.C. § 1201(a)(3)(A)) (emphasis added).
  100. See id.
  101. See supra notes 68-71 and accompanying text.
  102. See, e.g., infra note 194.
  103. 17 U.S.C. § 1201(a)(3)(B) (2006) (emphasis added).
  104. See supra notes 48-49 and accompanying text.
  105. 387 F.3d 522 (6th Cir. 2004).
  106. Id. at 546-47.
  107. See id. at 529.
  108. See id. at 529-30.
  109. See id. at 530.
  110. Id.
  111. Id. at 531.
  112. See id. at 530-31.
  113. Id. at 530.
  114. Id.; see also id. at 537 (observing that SCC did not duplicate the algorithm Lexmark used in the first step of its authentication procedure, but instead “replaced Lexmark’s SHA-1 function with a different publicly available encryption program”).
  115. Id. at 530-31.
  116. Id. at 531.
  117. See Lexmark Int’l, Inc. v. Static Control Components, Inc., 253 F. Supp. 2d 943 (E.D. Ky. 2003).
  118. Lexmark, 387 F.3d at 551.
  119. See id. at 545-51; id. at 551-53 (Merritt, J., concurring); id. at 562-65 (Feikens, J., concurring in relevant part).
  120. Lexmark, 387 F.3d at 529, 537-44. The familiar general rule is that copyright protection does not extend to words and short phrases, on the grounds that some minimum threshold amount of expressive content must be present. See, e.g., 37 C.F.R. § 202.1(a) (2007) (listing examples of uncopyrightable subject matter including “[w]ords and short phrases such as names, titles, and slogans”). The functional characteristics of computer programs also impose limits on the scope of copyright protection that they receive. See, e.g., infra note 129. On remand from the Court of Appeals for the Sixth Circuit, the district court held Lexmark’s Toner Loading Program uncopyrightable. Static Control Components, Inc. v. Lexmark Int’l, Inc., 2007 WL 1485770, at *6(E.D. Ky. Apr. 18, 2007).

    In the court of appeals, one of the panel members (a district judge sitting by designation) dissented from this portion of the panel majority’s opinion. See Lexmark, 387 F.3d at 553-61 (Feikens, J., dissenting in part). Judge Feikens nevertheless agreed with the majority’s rejection of Lexmark’s DMCA claim based on the Toner Loading Program, however, on the grounds that Lexmark could not show that SCC’s “chip was primarily designed or produced for the purpose of accessing the TLP.” Id. at 562.

  121. Id. at 546.
  122. Id. at 546-47 (citations omitted).
  123. Id. at 547 (citation omitted). But see Pearl Investments, LLC v. Standard I/O, Inc., 257 F. Supp. 2d 326, 350 (D. Me. 2003) (“The question of whether a technological measure ‘effectively controls access’ is analyzed solely with reference to how that measure works ‘in the ordinary course of its operation.’ The fact that [defendant] had alternative means of access to the works is irrelevant. . . .”) (citation omitted).
  124. Lexmark, 387 F.3d at 549.
  125. Id.
  126. Id. (emphasis omitted). Cases testing the boundaries of the DMCA’s definition of “circumvention” may represent the next frontier in DMCA litigation. See, e.g., Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey, 497 F. Supp. 2d 627, 644-45 (E.D. Pa. 2007) (malfunction of online archive’s system to limit archival storage of web pages did not constitute “circumvention” of the system); I.M.S. Inquiry Mgmt. Sys., Ltd. v. Berkshire Info. Sys., Inc., 307 F. Supp. 2d 521, 532-33 (S.D.N.Y. 2004) (defendant’s unauthorized use of another party’s valid password did not constitute “circumvention” of plaintiff’s password-protection mechanism). The DMCA’s definition of “circumvention” may do more to complicate the courts’ task in these cases than to simplify it. See generally infra notes 211-215 and accompanying text.
  127. Lexmark, 387 F.3d at 564 (Feikens, J., concurring in part).
  128. Id. at 563.
  129. Id. at 552 (Merritt, J., concurring).
  130. Id. (quoting 17 U.S.C. § 1201(a)(2)(A) (2006)).
  131. Id. at 551.
  132. See supra notes 56-61 and accompanying text.
  133. Lexmark, 387 F.3d at 546.
  134. Id. Ascertaining precisely how this might be accomplished with one’s own printer isleft as an exercise for the reader.
  135. Although Lexmark took pains to distinguish Reimerdes as not involving “a situationwhere the access-control measure left the literal code or text of the computer program or data freelyreadable,” id. at 547, Lexmark’s own analytical framework seems to be far enough removed fromanything the Reimerdes court said to raise the question whether the decisions are ultimatelyirreconcilable. The point is thrown into sharp relief by redrafting the “access control” discussion inLexmark to describe instead the technological measure that was at issue in Reimerdes:

    It is not [CSS] that “controls access” to the [DVD video stream]. It is the purchase of a

    [DVD player] that allows “access” to the [video stream]. Anyone who buys a [DVDplayer] may read the literal code of the [player key] directly from the [player], with orwithout the benefit of [CSS], and the data from the program may be translated intoreadable source code after which copies may be freely distributed. No security device, inother words, protects access to the [video stream] and no security device accordingly

    must be circumvented to obtain access to that program code.

    Cf. id. at 546-47.

  136. See supra note 122 and accompanying text.
  137. As the Court of Appeals for the Second Circuit has suggested, computer programs commonly contain elements that derive from sources other than the original creative expression of the programmer. These elements are ipso facto outside the scope of any copyright subsisting in the program as a whole, and must be “filtered out” of any infringement analysis. See Computer Assocs. Int’l, Inc. v. Altai, Inc., 982 F.2d 693, 705 (2d Cir. 1992) (copyright protection does not extend to “those elements of a computer program that are necessarily incidental to its function”); id. at 707-10 (in considering scope of copyright protection for software, courts must “filter out” any components thereof that were “dictated by efficiency,” “dictated by external factors,” or “taken from the public domain”).
  138. See 17 U.S.C. § 106(1), (3) (2006).
  139. The official specifications governing the format of digital audio information on music CDs do not include any provision for the use of access or copy controls, and efforts to add such systems to audio CDs have to date been mostly unsuccessful—even occasionally resulting in damage to customers’ electronic equipment. See Deirdre K. Mulligan & Aaron K. Perzanowski, The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident, 22 Berkeley Tech. L.J. 1157 (2007). See generally Armstrong, supra note 11, at 61-62.
  140. See, e.g., Zomba Enters., Inc. v. Panorama Records, Inc., 491 F.3d 574, 577-78, 584-85 (6th Cir. 2007).
  141. See Lexmark International, Inc. v. Static Control Components, Inc., 387 F.3d 522, 546 (6th Cir. 2004).
  142. 17 U.S.C. § 1201(a)(3)(B) (2006).
  143. See supra notes 124-125 and accompanying text.
  144. See Lexmark, 387 F.3d at 547 (noting that “the DMCA not only requires the technological measure to ‘control[ ] access’ but also requires the measure to control that access ‘effectively’” (quoting § 1201(a)(3)(B))); cf. supra note 43 and accompanying text.
  145. To be sure, the panel opinion in Lexmark did not, as the Chamberlain panel had, contend that its interpretation was commanded by the DMCA’s literal text, relying instead on a mix of arguments grounded in the legislative history and purpose of the statute. Compare Lexmark, 387 F.3d at 546-51, with supra note 87 and accompanying text. But cf. Lexmark, 387 F.3d at 552 (Merritt, J., concurring) (complaining that Lexmark’s “reading would ignore the precise language . . . as well as the main point of the DMCA”); id. at 564 (Feikens, J., concurring in part) (“[U]nder the plain meaning of the law, circumventing a technological measure . . . is only a violation of § 1201(a) if the device allows consumers access to a work that they are not otherwise permitted to have.”).
  146. 421 F.3d 1307 (Fed. Cir. 2005), reh’g denied, 431 F.3d 1374 (Fed. Cir. 2005).
  147. See id. at 1309-10. Strangely, StorageTek did not license the code to its own customers, necessarily (if paradoxically) implying that every customer infringed StorageTek’s copyright in the code each time they turned their purchased hardware on. See id. at 1310 (noting that,although “StorageTek provides the entire [software] code to the customer,” the accompanying “license covers only . . . portions of the software, and it specifically excludes the maintenance code”). Most likely, StorageTek was attempting to avoid—unsuccessfully, as it turned out, see id. at1311-15—the application of 17 U.S.C. § 117(c), which allows copying of “an authorized copy of [a] computer program . . . for purposes . . . of maintenance or repair . . . .” 17 U.S.C. § 117(c) (2006) (emphasis added). The copies of the maintenance software StorageTek had installed on its own customers’ machines were, by the terms of its own license, unauthorized copies. StorageTek’s apparent adversarial attitude towards its own customers surely heightened the court’s skepticism towards StorageTek’s interpretation of the DMCA.
  148. See Storage Tech., 421 F.3d at 1310. Presumably, StorageTek’s intention in adopting this password authentication mechanism was effectively to prevent its customers or competitors from performing their own maintenance on StorageTek’s tape libraries.
  149. See id. As the court described it, CHE’s two devices worked somewhat differently—one by computing a valid password for StorageTek’s system, the other apparently by preventing the system from requesting a password at all—but the differences are immaterial for present purposes.
  150. Id.
  151. See id.
  152. Id. at 1311-15; see also Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc., 431 F.3d 1374, 1375-76 (Fed. Cir. 2005) (opinion on denial of rehearing) (reiterating court’s conclusion that safe harbor of 17 U.S.C. § 117(c) covered CHE’s activities). The copyright safe harbor provision on which the court relied was itself enacted in 1998 as part of the DMCA. See infra note 174.
  153. Storage Tech., 421 F.3d at 1318 (citations omitted).
  154. See supra notes 94-96 and accompanying text.
  155. See supra notes 62-65 and accompanying text.
  156. See supra notes 99-104 and accompanying text.
  157. See supra notes 141-145 and accompanying text.
  158. Although not, as I will suggest below, overly so. Cf. infra Part IV and notes 274-277and accompanying text.
  159. See supra notes 51-55, 90 and accompanying text.
  160. See Semiconductor Chip Protection Act of 1984, Pub. L. No. 98-620, 98 Stat. 3335 (codified as amended at 17 U.S.C. §§ 901-914 (2006)).
  161. See Audio Home Recording Act of 1992, Pub. L. No. 102-563, 106 Stat. 4237 (codified as amended at 17 U.S.C. §§ 1001-1010 (2006)).
  162. See Uruguay Round Agreements Act, Pub. L. No. 103-465, § 512(a), 108 Stat. 4809,4974 (1994) (codified at 17 U.S.C. § 1101 (2006)).
  163. See Vessel Hull Design Protection Act, Pub. L. No. 105-304, §§ 501-505, 112 Stat. 2860, 2905-18 (1998) (codified at 17 U.S.C. § 1301 (2006)).
  164. Cf., e.g., R. Polk Wagner, Reconsidering the DMCA, 42 Hous. L. Rev. 1107, 1125 (2005) (noting that “the DMCA is not really a law about copyright. It is instead a law abouttechnology”).
  165. See supra notes 51-55 and accompanying text.
  166. 17 U.S.C. § 1201(a)(1)(A) and (a)(2) repeatedly refer to “a work protected under this title”—that is, protected by copyright—as the subject matter to which either anti-circumvention or trafficking liability can attach. 17 U.S.C. § 1201(a)(1)(A)-(a)(2) (2006) (emphasis added).
  167. Id. § 1201(b)(1).
  168. See id. § 106 (2006) (defining rights of a copyright owner).
  169. The copyright owner’s authority forms a part of the definitions of both “circumvent” and “effectively controls access.” Id. § 1201(a)(3)(A)-(B) (internal quotation marks omitted).
  170. See id. §§ 201-205 (2006).
  171. Id. § 1201(c)(1).
  172. Id. § 1201(c)(2).
  173. Compare id. § 1203(b)(1) (2006) (authorizing a court to grant temporary and permanent injunctions to prevent or restrain a DMCA violation), with id. § 502(a) (2006) (authorizing courts to award injunctive relief to prevent or restrain infringements of copyright); id. § 1203(b)(2) (authorizing a court to impound any device or product it finds was involved in a DMCA violation) with id. § 503(a) (authorizing courts to seize and impound property believed to have been used in infringements of copyright); id. § 1203(c)(2) (authorizing a court to award actual damages for violations of the DMCA) with id. § 504(b) (2006) (authorizing award of actual damages to copyright holders injured through infringements of copyright); id. § 1203(c)(3) (authorizing a complaining party to elect to recover statutory damages any time before final judgment on a DMCA violation) with id. § 504(c)(1) (authorizing award of statutory damages to a copyright owner for copyright infringement violations); id. § 1203(c)(5)(B) (authorizing a court to reduce or remit an award of damages when it finds a library, archives, education institutions or public broadcasting entity innocently violated the DMCA) with id. § 504(c)(2)(i)-(ii) (authorizing reduction in statutory damages awards against innocent infringers, and the remitting of all statutory damages where the copyright infringement was committed by a nonprofit archive, library, educational institution, or public broadcaster, or the employees of such institutions).
  174. The anti-circumvention provisions of the DMCA were added in Title I of the legislation. See Digital Millennium Copyright Act of 1998, Pub. L. No. 105-304, § 103, 112 Stat. 2860, 2861-77. Title II enacted what is now 17 U.S.C. § 512, creating a new statutory immunity from liability for copyright infringement for internet service providers in certain circumstances. See id. § 202, 112 Stat. at 2877-84. Title III of the statute amended 17 U.S.C. § 117 to provide a new defense to claims for copyright infringement arising from computer maintenance or repair, superseding court decisions such as MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9th Cir. 1993). See Digital Millennium Copyright Act of 1998, Pub. L. No. 105-304, § 302, 112 Stat. 2860, 2886-87. Title IV of the statute made various other modifications to the Copyright Act. See id. §§ 401-407, 112 Stat. at 2887-2905. The only portion of the DMCA as enacted that is arguably unconnected with copyright is Title V, in which Congress created a form of sui generis intellectual property protection for the design of boat hulls, superseding the Supreme Court’sdecision in Bonito Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141, 143 (1989). See supra note 163.
  175. See Statement on Signing the Digital Millennium Copyright Act, 2 Pub. Papers 1902, 1903 (Oct. 28, 1998) (“Through enactment of the Digital Millennium Copyright Act, we have done our best to protect from digital piracy the copyright industries that comprise the leading export of the United States.”); S. Rep. No. 105-190, at 2 (1998) (“[T]he law must adapt in order to make digital networks safe places to disseminate and exploit copyrighted materials.”); id. at 8 (“Due to the ease with which digital works can be copied and distributed worldwide virtually instantaneously, copyright owners will hesitate to make their works readily available on the Internet without reasonable assurance that they will be protected against massive piracy.”); H.R. Rep. No. 105-551, pt. 2, at 25 (1998) (“[T]he digital environment poses a unique threat to the rights of copyright owners, and as such, necessitates protection against devices that undermine copyright interests.”).
  176. 17 U.S.C. § 1201(a)(1)(C); see also supra note 28.
  177. H.R. Rep. No. 105-551, at 23-24.
  178. See, e.g., Erlenbaugh v. United States, 409 U.S. 239, 243-44 (1972); Postmaster Gen. v. Early, 25 U.S. (12 Wheat.) 136, 152 (1827).
  179. This rule is often traced to Baker v. Selden, 101 U.S. 99 (1879). There, the Court reasoned that the copyright in the plaintiff’s book on accounting did not prevent the defendant from copying the accounting system the plaintiff had developed and described in the book. See id. at 107. Although the literal text of the book itself was under copyright and protected against wholesale taking, the same was not true of the functional accounting methodology that the book endeavored toexplain. See id. at 104 (“[W]hilst no one has a right to print or publish his book, . . . any person may practise and use the art itself which he has described and illustrated therein. . . . The copyright of a book on book-keeping cannot secure the exclusive right to make, sell, and use account-books prepared upon the plan set forth in such book.”); see also Mazer v. Stein, 347 U.S. 201, 217 (1954) (“Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection is given only to the expression of the idea—not the idea itself.”). On the functionality doctrine in general, see 1 Paul Goldstein, Goldstein on Copyright § 2.15 (3d ed. Supp. 2008).
  180. See supra note 137; see also H.R. Rep. No. 94-1476, at 56-57 (1976), reprinted in1976 U.S.C.C.A.N. 5659, 5670 (explaining that 17 U.S.C. § 102(b) “is intended, among other things, to make clear that the expression adopted by the programmer is the copyrightable element in a computer program, and that the actual processes or methods embodied in the program are not within the scope of the copyright law”).
  181. See, e.g., Brandir Int’l, Inc. v. Cascade Pac. Lumber Co., 834 F.2d 1142, 1148 (2d Cir. 1987) (rejecting copyrightability of plaintiff’s bicycle rack design on grounds that the design was dictated by functional considerations involved in storing bicycles); Carol Barnhart, Inc. v. Econ. Cover Corp., 773 F.2d 411, 419 (2d Cir. 1985) (finding plaintiff’s molded styrene human torso designs ineligible for copyright on grounds that designs were dictated by functional considerations involved in display of clothing).
  182. Many other examples are collected in Dennis S. Karjala, Distinguishing Patent and Copyright Subject Matter, 35 Conn. L. Rev. 439, 444 n.22 (2003).
  183. Baker, 101 U.S. at 104.
  184. The software at issue in Chamberlain, which the court presumed to be copyrighted, was designed to serve the functional purpose of enabling purchasers to open and close their garage doors via remote control, rather than for a creative or expressive purpose. See supra notes 78-80 and accompanying text. The copyrighted works at issue in Lexmark were a pair of computer programs that had been written to assist with the operation of Lexmark printers, including the functionality of testing to see whether the customer had inserted a third-party refilled toner cartridge. See supra notes 107-112 and accompanying text; see also supra note 120 and accompanying text (noting court’s doubts that Lexmark’s TLP qualified for copyright protection due to its functional characteristics).
  185. See Act of May 31, 1790, ch. 15, 1 Stat. 124; see also 1 William F. Patry, Copyright Law and Practice 25-36 (1994) (recounting history of Copyright Act of 1790).
  186. See generally 1 William F. Patry, Patry on Copyright §§ 1:19-:98 (2007) (recounting history of federal copyright legislation since 1790).
  187. See infra notes 231-244 and accompanying text.
  188. See, e.g., infra notes 201-202; cf. infra note 200.
  189. See 1 Howard B. Abrams, The Law of Copyright § 1:1, at 1-6 (2007) (“While some lines are drawn in the Copyright Act, they are often drawn in terms that rely on the history of copyright, and, indeed, of the history of judicial and jurisprudential thinking about copyright.”);Patry, supra note 186, § 2:1 (“[C]ritical components of copyright law are judge-made. . . . [T]he Act is a mixture of statutory and common-law features.”).
  190. See Efroni, supra note 96, at 100 (arguing that judicial decisions in the durable goods cases reflect a judicial “understanding of the appropriate balance between the interests of copyright owners and information users” that “is quite different from Congress’s policy reflected in the DMCA”).
  191. See John F. Manning, Textualism and the Equity of the Statute, 101 Colum. L. Rev. 1, 5 (2001).
  192. See, e.g., Antonin Scalia, Common-Law Courts in a Civil-Law System: The Role of United States Federal Courts in Interpreting the Constitution and Laws, in A Matter of Interpretation: Federal Courts and the Law 3, 20 (Amy Gutmann ed., 1997) (“Congress can enact foolish statutes as well as wise ones, and it is not for the courts to decide which is which andrewrite the former.”).
  193. See supra notes 53-55 and accompanying text.
  194. See, e.g., Estate of Cowart v. Nicklos Drilling Co., 505 U.S. 469, 476 (1992) (referring to “the basic and unexceptional rule that courts must give effect to the clear meaning of statutes as written”); Caminetti v. United States, 242 U.S. 470, 485 (1917).
  195. See, e.g., United States v. Ron Pair Enters., Inc., 489 U.S. 235, 242 (1989) (where “‘the literal application of a statute will produce a result demonstrably at odds with the intentions of its drafters[,]’ . . . . the intention of the drafters, rather than the strict language, controls”) (quoting Griffin v. Oceanic Contractors, Inc., 458 U.S. 564, 571 (1982)); United States v. Turkette, 452 U.S. 576, 580 (1981) (“absurd results are to be avoided and internal inconsistencies in the statute must be dealt with”); Haggar Co. v. Helvering, 308 U.S. 389, 394 (1940).
  196. For a book-length critique of the “faithful agent” theory, see William N. Eskridge,Jr., Dynamic Statutory Interpretation (1994).
  197. For example, the literal text of the copyright statute appears to excuse all unauthorized copying from liability for copyright infringement—precisely the opposite of the legislative purpose. First, the statute confers on copyright holders the “exclusive right[] . . . to reproduce the copyrighted work in copies.” 17 U.S.C. § 106(1) (2006) (emphasis added). “Copies,” the statute tells us, “are material objects . . . in which a work is fixed by any method . . . .” Id. § 101 (emphasis added). And a work becomes “fixed,” we learn, “when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration.” Id. (emphasis added). A woodenly literal reading of this text might suggest that copyright infringement is definitionally impossible, because any copy made without “the authority of the author” is not “fixed” within the meaning of the statutory definition, and hence not a “copy” that the copyright holder alone has the right to make. The courts, of course, have correctly refused to read the statute in such a way as to subvert the very possibility of liability for infringement in this fashion. See, e.g., Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 964 F.2d 965, 968 (9th Cir. 1992) (“A derivative work must be fixed to be protected under the [Copyright] Act, . . . but not to infringe.”) (emphases omitted).
  198. See, e.g., N.Y. Times Co. v. Tasini, 533 U.S. 483, 493 (2001) (reasoning that individual authors’ reproduction and distribution rights override compiler’s rights in collective work in which authors’ contributions were included); Pickett v. Prince, 207 F.3d 402, 405-06 (7th Cir. 2000) (reasoning that copyright holder’s right to prepare derivative works takes precedence over separate provision granting creators of derivative works independent rights in their own creations).
  199. See, e.g., Lindsay v. R.M.S. Titanic, 52 U.S.P.Q.2d 1609, 1612 (S.D.N.Y. 1999) (construing the undefined statutory term “author”). Congress’s choice not to supply a definition ofthis key term in 17 U.S.C. § 101 appears to have been deliberate, in light of the litigated controversies over the meaning of “authorship” that predated the Copyright Act of 1976. See, e.g., Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, 57-58 (1884).

    The Copyright Act grants copyright holders the exclusive right “to distribute copies or phonorecords of the copyrighted work to the public.” 17 U.S.C. § 106(3) (2006). The statute is silent, however, on the meaning of the term “distribute,” which has, predictably, resulted in conflicting interpretations by the courts. Compare A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9th Cir. 2001) (reasoning that users of file-sharing software violated distribution right by “upload[ing] file names to the search index for others to copy”), and Hotaling v. Church of Jesus Christ of Latter-Day Saints, 118 F.3d 199, 203 (4th Cir. 1997) (reasoning that a public library violated distribution right by “add[ing] a [copyrighted] work to its collection, list[ing] the work in its index or catalog system, and mak[ing] the work available to the borrowing or browsing public”), andMarobie-FL, Inc. v. Nat’l Ass’n of Fire Equip. Distribs., 983 F. Supp. 1167, 1173 (N.D. Ill. 1997) (placing copyrighted files on a web server from which they may be downloaded by others constitutes “distribution”), with Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1162 (9th Cir. 2007) (agreeing with district court that “distribution requires an actual dissemination of a copy”) (quotation marks omitted), and Atlantic Recording Corp. v. Howell, 554 F. Supp. 2d 976, 983 (D. Ariz. 2008) (“Merely making an unauthorized copy of a copyrighted work available to the public does notviolate a copyright holder’s exclusive right of distribution.”), and Elektra Entm’t Group, Inc. v. Barker, 551 F. Supp. 2d 234, 244-45 (S.D.N.Y. 2008) (holding complaint’s allegation that defendant “made . . . [c]opyrighted [r]ecordings available for distribution to others” insufficient to allege violation of the distribution right) (internal quotation marks, citation, and alteration omitted). For a critique of the courts’ expansion of the distribution right to include transmissions of copyrighted works over the Internet, see R. Anthony Reese, The Public Display Right: The Copyright Act’s Neglected Solution to the Controversy Over RAM “Copies”, 2001 U. Ill. L. Rev. 83, 125-38.

    In 17 U.S.C. § 102(a), Congress listed eight nonexclusive categories of copyrightable subject matter. Although five of the categories carry accompanying definitions in § 101, “musical works,” “dramatic works,” and “pantomimes and choreographic works” do not. 17 U.S.C. § 102(a)(2)-(4) (2006). Congress explained the omission by remarking that these terms “have fairly settled meanings.” H.R. Rep. No. 94-1476, at 53 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5666-67.

  200. To be sure, the Copyright Act includes a number of very detailed provisions that Congress clearly intended to cover the waterfront within their respective spheres. See Patry, supra note 186, § 2:8 (citing 17 U.S.C. §§ 111, 112, 114, 115, 119, 122, and 512 as examples of statutory provisions that aim to “micromanage” the courts). Most of the statute, however, is not so specific.
  201. 17 U.S.C. § 102(a) extends copyright protection to “original works of authorship.” 17 U.S.C. § 102(a) (2006). The legislative history declared that Congress “purposely left [this phrase] undefined, . . . intend[ing] to incorporate without change the standard of originality established by the courts under” the prior statute. H.R. Rep. No. 94-1476, at 51 (1976), reprinted in 1976U.S.C.C.A.N. 5659, 5664.
  202. 17 U.S.C. § 113(a) recognizes that a copyright holder’s exclusive reproduction right over a pictorial, graphic, or sculptural work “includes the right to reproduce the work in or on anykind of article . . . .” 17 U.S.C. § 113(a) (2006). Subsection 113(b), however, offers the caveat that, where depictions of useful articles are concerned, the statute “does not afford . . . any greater or lesser rights . . . than those afforded to such works under the law . . . in effect” before the effective date of the Copyright Act of 1976. Id. § 113(b).
  203. See, e.g., 35 U.S.C. § 271(b)-(c) (2006) (establishing liability for inducing infringement of patent or for contributory patent infringement).
  204. See 17 U.S.C. § 501(a) (2006) (providing that “[a]nyone who violates any of the exclusive rights of the copyright owner” shall be directly liable for copyright infringement); Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 434-35 (1984) (observing that, unlike the Patent Act, “[t]he Copyright Act does not expressly render anyone liable for infringement committed by another”).
  205. See, e.g., Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 261 (9th Cir. 1996) (“Although the Copyright Act does not expressly impose liability on anyone other than direct infringers, courts have long recognized that in certain circumstances, vicarious or contributory liability will be imposed.”); id. at 261-64 (explaining theories and elements of vicarious and contributory infringement of copyright).
  206. See H.R. Rep. No. 94-1476, at 61 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5674 (explaining that Congress’s use of the words “to authorize” in 17 U.S.C. § 106 was “intended to avoid any questions as to the liability of contributory infringers”).
  207. See 17 U.S.C. § 101 (2006) (defining “work made for hire” to include any “work prepared by an employee within the scope of his or her employment”); id. § 201(b) (assigning copyright in such works made for hire to the employer).
  208. See, e.g., Hays v. Sony Corp. of Am., 847 F.2d 412, 416-17 (7th Cir. 1988).
  209. See Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 125 S. Ct. 2764, 2778-80 (2005) (creating new cause of action for inducing copyright infringement based upon Patent Act’sprovision at 35 U.S.C. § 271(b) for inducing patent infringement); Sony Corp. of America, 464 U.S. at 439 (arguing that “the historic kinship between patent law and copyright law” makes it appropriate to draw common-law copyright principles from patent law); id. at 440-42 (recognizing new defense to secondary liability in copyright cases based upon Patent Act’s provision, 35 U.S.C. § 271(c), immunizing seller of “a staple article or commodity of commerce suitable for substantial noninfringing use”).
  210. See infra notes 247-249 and accompanying text.
  211. 17 U.S.C. § 1201(a)(3)(A) (2006).
  212. See, e.g., Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1159 (9th Cir. 2007).
  213. See, e.g., Optical Disc Corp. v. Del Mar Avionics, 45 Fed. Appx. 887, 888-90 (Fed. Cir. 2002) (explaining CD authoring and playback); SightSound.Com Inc. v. N2K, Inc., 185 F. Supp. 2d 445, 458 (W.D. Pa. 2002) (same).
  214. See H.R. Rep. No. 105-551, pt. 1, at 39 (1998) (suggesting that Congress meant the statute to extend to technological protection measures “which require[ ] the use of a ‘key’ providedby a copyright owner to gain access to a work”).
  215. See Landau, supra note 20, at 300-01 (suggesting that traditional entertainment products such as “[m]usic, film, [and] books” may be analytically indistinguishable from “computer software” when published in digital form).
  216. See, e.g., United States v. Kirby, 74 U.S. (7 Wall.) 482, 486 (1869) (noting that statutes should be interpreted to avoid absurd results).
  217. 17 U.S.C. § 1201(a)(1)(A), (a)(2).
  218. See Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 547 (6th Cir. 2004); supra note 144.
  219. See supra note 65 and authorities cited (discussing principle of statutory construction that Congress is presumed to avoid surplusage).
  220. Our hypothetical reader may be inclined to look to the WIPO treaties for guidance, but would surely be stymied by the absence of support there and by the differing approaches taken by the various nations that have sought to implement the treaties’ anti-circumvention mandates. See Urs Gasser, Legal Frameworks and Technological Protection of Digital Content: Moving Forward Towards a Best Practice Model, 17 Fordham Intell. Prop. Media & Ent. L.J. 39, 69-71 (2006).
  221. Cf. supra note 144 and accompanying text.
  222. Cf. supra note 47 and accompanying text.
  223. 17 U.S.C. § 1201(a)(3)(B).
  224. See supra notes 141-145 and accompanying text.
  225. See, e.g., Fitzgerald Pub. Co., Inc. v. Baylor Pub. Co., Inc., 807 F.2d 1110, 1113 (2d Cir. 1986) (“intent or knowledge is not an element of infringement”); Pye v. Mitchell, 574 F.2d 476, 481 (9th Cir. 1978) (“[E]ven where the defendant believes in good faith that he is not infringing a copyright, he may be found liable.”); Educ. Testing Serv. v. Simon, 95 F. Supp. 2d 1081, 1087 (C.D. Cal. 1999) (“copyright infringement . . . is a strict liability tort”). This general rule predates the Copyright Act of 1976. See Buck v. Jewell-La Salle Realty Co., 283 U.S. 191, 198 (1931) (“Intention to infringe is not essential under the [1909] act.”).

    There is a separate exception to copyright infringement liability in the statute for parties who rely in good faith on inaccurate notices of copyright included on the plaintiff’s works. See 17 U.S.C. § 406(a) (2006). This provision does not, however, create a general knowledge prerequisite to an action for copyright infringement.

  226. See, e.g., Repp v. Webber, 132 F.3d 882, 889 (2d Cir. 1997) (“The fact that infringement is subconscious or innocent does not affect liability.”) (quotation marks omitted); Herbert Rosenthal Jewelry Corp. v. Kalpakian, 446 F.2d 738, 741 (9th Cir. 1971) (“[C]opying need not be conscious, but may be the result of subconscious memory derived from hearing, seeing or reading the copyrighted work at some time in the past.”) (quotation marks and citations omitted); Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F. Supp. 177, 181 (S.D.N.Y. 1976) (“[I]nfringement of copyright . . . is no less so even though subconsciously accomplished.”).
  227. See 17 U.S.C. § 504(c)(2) (2006) (permitting reduction in statutory damage award “where the infringer sustains the burden of proving, and the court finds, that such infringer was not aware and had no reason to believe that his or her acts constituted an infringement of copyright”).
  228. See 17 U.S.C. § 504(c)(1)-(2).
  229. See, e.g., BMG Music v. Gonzalez, 430 F.3d 888, 889-90 (7th Cir. 2005) (upholding award of $22,500 based on defendant’s download of 30 copyrighted songs from unauthorized file-sharing service); Judgment in a Civil Case, Virgin Records America, Inc. v. Thomas, No. 06-1497 MJD/RLE (D. Minn. Oct. 5, 2007) (entering judgment for $222,000 based on defendant’s making 24 copyrighted songs available on unauthorized file-sharing service). But see Capitol Records, Inc. v. Thomas, 2008 WL 4405282 at *16-17 (D. Minn. Sept. 24, 2008) (vacating file-sharing judgment and ordering new trial on grounds that jury instructions failed to require proof of actual distribution).
  230. Stewart v. Abend, 495 U.S. 207, 236 (1990). By forbidding copyright holders to restrict certain forms of speech that build upon their own prior works, the fair use doctrine also promotes First Amendment values. See Eldred v. Ashcroft, 537 U.S. 186, 219-20 (2003).
  231. 17 U.S.C. § 107 (2006) (“[T]he fair use of a copyrighted work . . . is not an infringement of copyright.”).
  232. 9 F. Cas. 342 (C.C.D. Mass. 1841) (No. 4,901); see, e.g., Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 576 (1994) (citing Folsom v. Marsh); Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 550 (1985) (same); Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 475 n.27 (1984) (Blackmun, J., dissenting) (same). For an entertaining review of the Folsom v. Marsh litigation and the decision’s place in the history of copyright, see R. Anthony Reese, The Story of Folsom v. Marsh: Distinguishing Between Infringing and Legitimate Uses, in Intellectual Property Stories 259 (Jane C. Ginsburg & Rochelle Cooper Dreyfuss eds., 2006).A more skeptical view is available in L. Ray Patterson, Folsom v. Marsh and Its Legacy, 5 J. Intell. Prop. L. 431, 431 (1998) (finding Folsom v. Marsh to be “so poorly reasoned that it may be entitled to first place in the category of bad copyright decisions”).
  233. See Folsom, 9 F. Cas. at 345 (“The other eleven volumes consist of the letters of Washington, private and official, and his messages and other public acts, with explanatory notes and occasional illustrations by the editor.”).
  234. Id.; see also id. at 348 (“[I]t cannot be doubted, that these letters are the most instructive, useful and interesting to be found in [plaintiff’s] large collection.”).
  235. See id. at 345-47. Although recognizing uncertainty in the law regarding the copyright status of private correspondence, id. at 346, Justice Story found persuasive a line of English authorities recognizing the author’s copyright, subject to a limited publication right held by the addressee. See id. at 346-47. The question of copyrightability vel non would not, of course, arise under the present state of copyright law. See 17 U.S.C. § 102(a) (2006) (“Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression . . . .”); see also Salinger v. Random House, Inc., 811 F.2d 90, 94-95 (2d Cir. 1987) (recognizing author’s copyright in private correspondence).
  236. See Folsom, 9 F. Cas. at 347. Justice Story’s discussion of the copyright status of Washington’s public correspondence was comparatively cursory in view of his finding that “of the letters and documents published by the defendants, not more than one fifth part are of an official character.” Id. He reasoned, in essence, that the copyright status of private correspondence extended by analogy to public correspondence as well, subject to a colorable publication right in favor of the government. See id. The uncertainty surrounding the copyright status of Presidential documents has only partly abated since Story’s time. Compare 17 U.S.C. § 105 (2006) (denying copyright protection to “any work of the United States Government”) with 44 U.S.C. § 2202 (2001) (granting to the Government “complete ownership, possession, and control of Presidential records”) and Exec. Order No. 13,233, § 3(d)(1), (2), 66 Fed. Reg. 56,025, 56,026-27 (Nov. 1, 2001) (forbidding public disclosure of records of past Presidential administration except upon the joint consent of both the former and incumbent Presidents). An informative assessment of the proprietary status of Presidential papers is available in Jonathan Turley, Presidential Papers and Popular Government: The Convergence of Constitutional and Property Theory in Claims of Ownership and Control of Presidential Records, 88 Cornell L. Rev. 651 (2003).
  237. Folsom, 9 F. Cas. at 349.
  238. See id.
  239. Id. at 348. Elsewhere in his opinion, Justice Story offered an illustrative example of the sorts of uses that might pose such a substitution risk:

    [N]o one can doubt that a reviewer may fairly cite largely from the original work, if his

    design be really and truly to use the passages for the purposes of fair and reasonablecriticism. On the other hand, it is as clear, that if he thus cites the most important parts ofthe work, with a view, not to criticise, but to supersede the use of the original work, and

    substitute the review for it, such a use will be deemed in law a piracy.

    Id. at 344-45.

  240. Copyright Act of 1909, ch. 320, 35 Stat. 1075. An interim general revision of the federal copyright statute in 1870 similarly took no account of the emerging judicial doctrine of fair use. See Act of July 8, 1870, ch. 230, §§ 85-111, 16 Stat. 198, 212-16. See generally Patry, supra note 186, § 1:33 (discussing 1870 statute).
  241. It took the courts some years to apply the “fair use” label consistently to actions that would amount to copyright infringement but for the judge-made exception to liability. See Meredith Corp. v. Harper & Row Publishers, Inc., 378 F. Supp. 686, 689 (S.D.N.Y. 1974) (“Originally fair use was based on the assumption that the user might copy an insignificant portion of protected material while freely using unprotected material.”) (emphasis and quotation marks omitted). Judge Learned Hand, in some of the earliest cases, seemed to apply the label “fair use” to any use that was excused from liability. See Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 54 (2d Cir. 1936) (equating fair use with taking only “the theme, or ideas, or the like, of a work, though not its expression”) (quotation marks omitted); Nichols v. Universal Pictures Corp., 45 F.2d 119, 121 (2d Cir. 1930) (equating fair use with de minimis taking and explaining that “the question is whether the part so taken is substantial, and therefore not a fair use of the copyrighted work”) (quotation marks omitted). Judge Hand’s terminology is no longer apt; instead, the idea-expression dichotomy and the de minimis doctrine provide what we would now recognize as additional, independent defenses to a claim of infringement that render resort to the doctrine of fair use unnecessary. See, e.g., 17 U.S.C. § 102(b) (2006) (“In no case does copyright protection . . . extend to any idea . . . .”); Sandoval v. New Line Cinema Corp., 147 F.3d 215, 217 (2d Cir. 1998) (“[W]here the unauthorized use of a copyrighted work is de minimis, no cause of action will lie for copyright infringement, and determination of a fair use claim is unnecessary.”). But see Bridgeport Music, Inc. v. Dimension Films, 410 F.3d 792, 798 (6th Cir. 2005) (eliminating de minimis doctrine for digital sampling of copyrighted sound recordings).
  242. Matthews Conveyer Co. v. Palmer-Bee Co., 135 F.2d 73, 85 (6th Cir. 1943); cf. supra note 239 and accompanying text.
  243. See, e.g., Tenn. Fabricating Co. v. Moultrie Mfg. Co., 421 F.2d 279, 283 (5th Cir. 1970) (labeling fair use “a judicial rule of public policy” and “a balance wheel and safety valve for the copyright system”) (quotation marks omitted) (quoting John Schulman, Fair Use and the Revision of the Copyright Act, 53 Iowa L. Rev. 832, 832 (1968)).
  244. See Berlin v. E.C. Publications Inc., 329 F.2d 541, 544 (2d Cir. 1964) (“[C]ourts in passing upon particular claims of infringement must occasionally subordinate the copyright holder’s interest in a maximum financial return to the greater public interest in the development of art, science and industry.”); Meredith Corp., 378 F. Supp. at 689 (“The [fair use] doctrine then developed to permit more than insignificant copying of protected material where such copying was clearly in the public interest and served the underlying purpose of the Copyright Act . . . .”) (emphasis omitted).
  245. To reiterate a point stated in the text, I do not mean to imply from my choice of the label “fair circumvention” that the courts must limit their exercise of policymaking responsibilities to cases involving the DMCA’s circumvention, rather than trafficking, offenses. To the contrary, copyright principles might as readily be invoked in proper cases to shield a defendant accused of producing or distributing tools that can be put to circumventing uses.
  246. See supra notes 12, 14-15 and accompanying text.
  247. See 17 U.S.C. § 1201(a)(1)(A), (d) (2006).
  248. See id. § 1201(a)(2), (g), (j).
  249. See id. § 1201(b), (c)(1).
  250. As suggested above, the DMCA’s definitional provisions seem to pose particular challenges to textual formalism. See supra notes 211-224, 141-145 and accompanying text.
  251. See supra notes 178-184 and accompanying text.
  252. 17 U.S.C. § 107 (2006).
  253. Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 586 (1994).
  254. Pierre N. Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1117 (1990).
  255. See Feist Publ’ns, Inc. v. Rural Tele. Serv. Co., Inc., 499 U.S. 340, 345-51 (1991) (explaining minimum level of originality required for copyright protection).
  256. See Campbell, 510 U.S. at 586.
  257. See, e.g., supra notes 179-184 and accompanying text (explaining how copyright’s functionality doctrine may provide a more robust explanation for the courts’ results in Chamberlain and Lexmark than the courts’ stated justifications due to the predominantly utilitarian character of the works sought to be protected in those cases).
  258. But see Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 449-50 (1984) (suggesting that fair use doctrine protects even copying of core creative, expressive works insome circumstances).
  259. The weak encryption provided by the CSS system for DVD discs, the subject of the Reimerdes decision, was readily broken by a teenage computer user. See supra notes 37-40 and accompanying text. In consequence, unencrypted copies of formerly CSS-protected video content leaked onto the internet, where they continue to circulate today. See, e.g., Peter Biddle et al., The Darknet and the Future of Content Protection, in Digital Rights Management: Technological, Economic, Legal and Political Aspects 344, 359 (Eberhard Becker et al. eds., 2003). The DMCA does nothing to prevent such no-longer-encrypted content from circulating online, although the general remedies for infringement of copyright remain available. See Posting of Edward Felten to Freedom to Tinker, http://freedom-to-tinker.com/blog/felten/dmca-and-disrupting-darknet (Aug. 17, 2005 01:36 EST) (“Files arrive on the darknet having already been stripped of any technological protection measures . . . . And you can’t circumvent a TPM that isn’t there.”).
  260. See Leval, supra note 254, at 1125; see also supra note 239 and accompanying text.
  261. See, e.g., Campbell, 510 U.S. at 591-92 (“[W]hen a lethal parody, like a scathing theater review, kills demand for the original, it does not produce a harm cognizable under the Copyright Act.”); see also supra note 38 (noting cases declaring reverse engineering of computer software not to be infringing even where the resulting increase in market competition harms the copyright holder).
  262. Cf. 17 U.S.C. § 1201(f) (2006) (establishing DMCA safe harbor for the development of interoperable products in certain circumstances).
  263. 796 F.2d 1148 (9th Cir. 1986).
  264. For a summary of the parties’ dispute, see id. at 1149-50. Additional background information, including the parody advertisement at issue in the case, is available at http://en.wikipedia.org/wiki/Hustler_Magazine_v._Falwell.
  265. The People vs. Larry Flynt (Columbia Pictures Corporation 1996).
  266. In the film, as in real life, Falwell reacts to Flynt’s tasteless parody of a well-known advertising campaign for Campari by mass-mailing unauthorized copies of Flynt’s advertisement in a fundraising letter to members of Falwell’s own Moral Majority. Id. Sadly, if understandably, the film soon leaves the copyright issue by the wayside, focusing instead on the First Amendment issues in the case that ultimately went to the Supreme Court as Hustler Magazine, Inc. v. Falwell, 485 U.S. 46 (1988). In the real world, the Ninth Circuit, by a 2-1 vote, accepted Falwell’s fair use defense to Flynt’s claim for copyright infringement, even though the purpose of Falwell’s copying was clearly (indeed, solely) commercial. Hustler Magazine, 796 F.2d at 1152, 1156. The majority gave substantial weight to the political and social purpose of Falwell’s copying, which was aimed, it said, at “generat[ing] moral outrage.” Id. at 1156.
  267. For discussions of similar scenarios, highlighting the potential effects of the DMCA in chilling educational fair uses, see Landau, supra note 20, at 297-98; William W. Fisher & William McGeveran, The Digital Learning Challenge: Obstacles to Educational Uses of Copyrighted Material in the Digital Age 23-30 (Berkman Ctr. for Internet & Soc’y Harv. L. Sch., Research Publication No. 2006-09, 2006), available at http://cyber.law.harvard.edu/media/files/copyrightandeducation.html; Denicola, supra note 11, at 209-10.
  268. I am sensitive to the risk that even to articulate a detailed fair use justification for such a clearly lawful use may be taken as a concession that such a justification is necessary, thereby ceding “too much legitimacy to what sensible people should recognize as extreme copyright claims.” Rebecca Tushnet, Sight, Sound, and Meaning: Teaching Intellectual Property with Audiovisual Materials, 52 St. Louis U. L.J. 891, 903 (2008). I offer the example here only to highlight the (analytically absurd, in my view) disconnect between conduct that is clearly lawful under copyright, yet just as clearly punishable under the DMCA as it has hitherto been construed.
  269. See supra Part II.B.1.
  270. See 2006 Final Rule, supra note 28. The new exemption allows circumvention of DRM mechanisms protecting “[a]udiovisual works included in the educational library of a college or university’s film or media studies department, when circumvention is accomplished for the purpose of making compilations of portions of those works for educational use in the classroom by media studies or film professors.” 37 C.F.R. § 201.40(b)(1) (2007). By its terms, this exemption is too narrow to allow a law professor to copy an excerpt from his or her personal copy of a copyrighted motion picture.
  271. See supra notes 68-71 and accompanying text.
  272. See Denicola, supra note 11, at 220-32; Tian, supra note 11, at 779-81.
  273. Uncertainty and unpredictability are frequently cited as undesirable characteristics of contemporary fair use law that preclude the doctrine from being reduced to a set of clearly established systematic rules and may inhibit users from engaging in uses that, even if they would ultimately be found lawful, rest upon debatable claims of entitlement to fair use protection. See Armstrong, supra note 11, at 52, 70-74; see also James Gibson, Risk Aversion and Rights Accretion in Intellectual Property Law, 116 Yale L.J. 882, 890 (2007) (labeling fair use “famously ambiguous”). This uncertainty stems in part from the case-specific balancing inquiry mandated by the statute—which, the Supreme Court has warned, “is not to be simplified with bright-line rules.” Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 577 (1994). By inviting the courts to draw upon fair use principles, at least initially, in formulating fair circumvention doctrine, the risk of multiplying the undesirable traits of unpredictability and uncertainty may seem apparent. Two related observations, however, may point the way towards mitigating the risk of such doctrinalindeterminacy. First, to say that fair use doctrine as a whole suffers from an unpredictability problem, see David Nimmer, “Fairest of Them All” and Other Fairy Tales of Fair Use, 66 Law & Contemp. Probs. 263 (2003), is not to say that the outcome of any individual fair use dispute is necessarily unknowable in advance: some uses are clearly fair. See, e.g., Lenz v. Universal MusicCorp., No. C 07-3783 JF, 2008 WL 3884333, at *4 (N.D. Cal. Aug. 20, 2008) (dismissing copyright holder’s concerns about unpredictability of fair use); id. (“Undoubtedly, some evaluations of fair use will be more complicated than others.”). Second, as Michael Madison has demonstrated, some of the putative confusion surrounding the fair use doctrine vanishes upon careful identification of certain factual commonalities in the courts’ decisions. These commonalities may be ascertained in advance and employed to aid in planning for both litigants and courts, potentially making subsequent case outcomes more predictable. See Michael J. Madison, A Pattern-Oriented Approach to Fair Use, 45 Wm. & Mary L. Rev. 1525, 1645-65 (2004).
  274. See, e.g., supra note 178 and accompanying text.
  275. See, e.g., Henry M. Hart, Jr. & Albert M. Sacks, The Legal Process: Basic Problems in the Making and Application of Law 147 (1994) (Judges should resolve uncertainties in the meaning of statutory text “in the way which best serves the principles and policies it expresses. If the policy of the specific arrangement is open to doubt, the official should interpret it in the way which best harmonizes with more basic principles and policies of law.”); Eskridge, supra note 196, at 234-38 (defending, against contemporary formalist critiques, reliance on legislative history and other extrinsic aids to identify meaning). Other interpretive theories, of course, would go even further than I am presently suggesting. See, e.g., Guido Calabresi, A Common Law for the Age of Statutes 98 (1982) (“Scholarly criticisms . . . , jury actions that nullify or mitigate past rules, even administrative determinations, all can be appropriate reports of change in the landscape” that courts should be permitted at least to consider.).
  276. See supra notes 166-172 and accompanying text.
  277. See supra note 175 and accompanying text.
  278. See, e.g., Benkler, supra note 92, at 441 (lamenting chilling effects created by restrictive judicial interpretations of fair use).
  279. See U.S. Const. art. I, § 8, cl. 8 (“The Congress shall have Power . . . [t]o promote the Progress of Science . . . by securing for limited Times to Authors . . . the exclusive Right to their . . . Writings . . . .”) (emphasis added). Recent historical scholarship identifies the “promotion of progress” as a substantive objective that the Framers intended as a constraint upon legislative authority. See Dotan Oliar, Making Sense of the Intellectual Property Clause: Promotion of Progress as a Limitation on Congress’s Intellectual Property Power, 94 Geo. L.J. 1771 (2006).
  280. Compare Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156 (1975) (“[P]rivate motivation must ultimately serve the cause of promoting broad public availability of literature, music, and the other arts.”), with Eldred v. Ashcroft, 537 U.S. 186, 212 n.18 (2003) (“[C]opyright law serves public ends by providing individuals with an incentive to pursue private ones.”).
  281. See, e.g., Eldred, 537 U.S. at 219-20 (observing that copyright law, including the exceptions to copyright holders’ exclusive rights, is intended to promote dissemination of expressive works); Lloyd L. Weinreb, Fair’s Fair: A Comment on the Fair Use Doctrine, 103 Harv. L. Rev. 1137, 1150 (1990) (“Fair use does not exclude consideration of factors not related to the utilitarian justification for copyright—other social values or, more simply, fairness.”).


This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 United States License. In short: you are free to share and make derivative works of the work under the conditions that you appropriately attribute it, and that you distribute it only under a license compatible with this one.

This page must provide all available authorship information.

Public domainPublic domainfalsefalse