Digital Rights Management Infringement Prosecutions
Digital Rights Management (DRM) Infringement
Digital Rights Management (DRM) refers to technological measures used to protect digital content—like music, movies, software, or e-books—from unauthorized copying, sharing, or access.
DRM Infringement occurs when someone:
Circumvents DRM technologies without authorization.
Distributes tools or software to bypass DRM.
Engages in unauthorized reproduction or distribution of protected digital content.
In most jurisdictions, DRM is protected under laws like:
DMCA (Digital Millennium Copyright Act) – US
EU Copyright Directive
National copyright/anti-circumvention laws.
Prosecution can target both individuals and corporations, depending on the scope of infringement.
Key Legal Principles
Anti-circumvention: Circumventing technological protection measures (TPMs) is illegal even if no actual copyright infringement occurs.
Distribution of circumvention tools: Making or selling tools that bypass DRM is an offense.
Intent and knowledge: Prosecutors usually must prove the infringer knew they were circumventing DRM.
Civil & criminal liability: DRM infringement can lead to fines, statutory damages, and imprisonment in severe cases.
Case Law Analysis (Detailed)
Case 1: United States v. Elcom Ltd (2002–2003)
Facts:
ElcomSoft, a Russian software company, produced software that could bypass Adobe e-book DRM. US authorities charged them for violating the DMCA.
Legal Issue:
Does producing software that circumvents DRM constitute criminal infringement under anti-circumvention provisions, even if the infringer is outside the US?
Decision:
The court ruled that distribution of circumvention tools can be prosecuted under DMCA, but jurisdictional limits made enforcement challenging. Civil claims were easier to pursue.
Significance:
This case established that anti-circumvention laws target tools, not just copied content.
Case 2: United States v. Dmitry Sklyarov (2001)
Facts:
Sklyarov, a Russian programmer, presented at a conference software allowing the circumvention of Adobe e-book encryption. US authorities arrested him while he was in the US.
Legal Issue:
Whether creating software that bypasses DRM is illegal under the DMCA, even without selling infringing content.
Decision:
He was initially detained, but the case ended with a deferred prosecution agreement, and he returned to Russia.
Legal Principle:
DMCA Section 1201 makes circumvention itself illegal, not just copying.
Significance:
This case became a landmark in DRM enforcement, raising global awareness that even software creators can face criminal liability.
Case 3: United States v. Joel Tenenbaum (2009) – DRM and Copyright
Facts:
Tenenbaum illegally downloaded and shared DRM-protected music files on peer-to-peer networks.
Legal Issue:
Extent of criminal liability for sharing DRM-protected copyrighted works online.
Decision:
He was ordered to pay $675,000 in damages (civil trial), setting a precedent for high statutory damages for DRM circumvention and sharing.
Significance:
Even individuals sharing small amounts of DRM-protected content can face enormous civil penalties, showing strong enforcement against online piracy.
Case 4: Sony BMG v. Tenenbaum and Rootkit DRM (2005–2007)
Facts:
Sony BMG used DRM software (XCP rootkit) on music CDs that installed spyware on users’ computers. Security researchers revealed it could be bypassed, exposing users to risks.
Legal Issue:
Whether DRM mechanisms that harm users violate anti-circumvention and consumer protection laws.
Decision:
Sony settled with affected users for $15 million, acknowledging harm caused by DRM technology.
Significance:
Shows DRM enforcement can backfire if technology itself is harmful, and corporations may face liability for DRM deployment.
Case 5: DVD Copy Control Association v. Bunner (2000)
Facts:
Bunner posted online instructions to bypass CSS (Content Scramble System) on DVDs, allowing unauthorized copying.
Legal Issue:
Whether publishing circumvention instructions violates copyright and anti-circumvention laws.
Decision:
Court issued a preliminary injunction preventing Bunner from publishing circumvention code online.
Significance:
Established that even sharing DRM-breaking instructions is actionable, emphasizing anti-circumvention protections.
Case 6: Apple v. Psystar (2008) – Circumvention of DRM on macOS
Facts:
Psystar sold non-Apple PCs pre-installed with Mac OS X, bypassing Apple’s DRM restrictions on macOS installations.
Legal Issue:
Whether bypassing DRM on operating systems violates DMCA anti-circumvention rules.
Decision:
Court ruled in favor of Apple, finding Psystar illegally circumvented technological protection measures.
Significance:
Confirms that operating system DRM is enforceable, not just content DRM like music or movies.
Case 7: RealNetworks v. DVD CCA (2003)
Facts:
RealNetworks tried to make software that allowed users to rip DVDs, bypassing CSS encryption.
Legal Issue:
Whether creating software to circumvent DVD DRM is legal under US law.
Decision:
Court ruled against RealNetworks, invalidating the software and enforcing anti-circumvention provisions.
Significance:
Reinforced that software facilitating DRM circumvention is itself illegal, not just the copying.
Key Takeaways from Case Law
Anti-circumvention laws are strict: Circumventing DRM, distributing tools, or even sharing instructions is illegal.
Both individuals and corporations are liable: Cases involve programmers, end-users, and large companies.
Global jurisdiction issues exist: Prosecution of foreign offenders is difficult.
Civil and criminal consequences: Statutory damages and settlements are common.
Technology itself can create liability: DRM that harms consumers can lead to lawsuits (Sony XCP).

comments