Canada's version of the US Digital Millennium Copyright Act has been introduced, and while it offers a host of promises about consumer rights (such as the right to record a TV show with a PVR or rip a CD and put the music on your computer), it also allows rightsholders to confiscate those rights merely by adding a "digital lock" (also known as DRM) to the work. Breaking these locks is illegal in itself, so you don't get any rights if a rightsholder chooses to use one.
Michael Geist sez, "The digital lock provisions have quickly emerged as the most contentious part of Bill C-32, the new Canadian DMCA. This comes as little surprise, given the decision to bring back the digital lock approach from C-61 virtually unchanged. The mounting public concern with the digital lock provisions (many supporters of the bill have expressed serious misgivings about the digital lock component) has led to many questions as well as attempts to characterize public concerns as myths. In effort to set the record straight, I have compiled 32 questions and answers about the digital lock provisions found in C-32. The result is quite lengthy, so I will divide the issues into five separate posts over the next five days: (1) general questions about the C-32 approach; (2) the exceptions in C-32; (3) the missing exceptions; (4) the consumer provisions; and (5) the business provisions. For those that want it all in a single package, I've posted the full series as a PDF download."
Setting the Record Straight: 32 Questions and Answers on C-32's Digital Lock Provisions, Part One
Philips has acquired Luciom, a French startup that makes Li-Fi products, which allow for very fast network connections over short distances by flickering an LED at speeds that are too fast to register on the human eye, and which can ever work in the dark by operating at low dimness settings the human eye perceives […]
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]