The Electronic Frontier Foundation's Julie Samuels posts analysis of yesterday's verdict in Capitol Records vs. MP3tunes, in which the big record labels were suing MP3tunes. The labels argued that MP3tunes wasn't eligible for the DMCA's "safe harbor" protection, and should have a duty to check all the files that users added to their lockers to make sure they didn't infringe copyright. The court disagreed.
But it appears that all of this worry and extra work may have been in vain. Just yesterday, a court found that an early music locker service, MP3tunes, which uses a de-duplicating process, “is precisely the type of system routinely protected by the DMCA safe harbor(s).” This outcome represents an understanding of copyright law more in line with how technology actually works, and avoids an absurd result where a music locker needs to waste server space by storing thousands of copies of identical files. This means more efficient music locker services, which is good news for music fans and for companies coming up with new and better ways to give those fans access to music they already own.
The opinion in the Capitol Records vs. MP3tunes case contained other good news (EFF filed an amicus brief in this case earlier this year). For example, the court made clear that the music locker service—whether it de-dupes or not—is like any online service provider (OSP) and, therefore, is entitled to the DMCA safe harbor protections as long as it complies with other DMCA requirements.
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]