Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

DRM, Copyright Protection and the DMCA

in Blog, Document Security, DRM, Ebook DRM, PDF Security

DRM & the Protection of digital information.

Who says lightning never strikes twice in the same place?  They are wrong.  On the same day it is reported that HP have included new Digital Rights Management (DRM) in their printers to make them refuse to work with ‘foreign’ cartridges, and Claims are made that DRM restrictions lead customers to illegal activity.

Lest we forget, HP have had chips on their cartridges for some time now that decide when the cartridge is empty and if the new cartridge is ‘genuine’ but I’m not convinced by the argument that DRM is being used is correct.

It is reasonable to observe that a bi-product of DRM technology is to give some veracity to the idea that the thing being protected by the DRM is genuine and that it comes from the source that is claimed because DRM acts to prevent fraudulent modification to the thing it is protecting.  But it would be wrong to say that verification of origin is a DRM function.  It is found in the Public Key Initiative (PKI – remember that?) technology called authentication of origin and uses a thing known as a digital signature and monitoring databases to verify where the signature came from.  But not DRM.

DRM is used to protect the copyright of a digital work – and that likely means preventing copying, and enforcing licensing conditions.

DMCA protection of copyright works

Back in 2003 it seems Lexmark tried to claim they used DRM in their printers and any attempt to subvert it was contrary to Section 1201 of the DMCA (amongst other things, such as patents over microchips).  The Sixth Circuit DC Circuit Court of Appeals decided against them, finding that there was no Copyright work being protected.  They concluded that companies cannot use DCMA in conjunction with copyright law to create monopolies of manufactured goods for themselves just by tweaking the facts of the case.  That was not the end of the matter and it rumbles on to 2012 with the dismissal of design patents against Lexmark.  Interestingly (if you don’t get out much) the arguments were much more about patents and the rights of patent holders and exhaustion of rights than about copyright matters.

In my ignorance I might have thought these printer arguments were all going back to the England and Wales ruling by their Lordships on the Leyland vs Armstrong exhaust case (copyright control of spare parts for automobiles), which created and developed the principle of the alternative parts market.  To my uncomplicated way of thinking designing things to be interoperable for the purpose of operation was fair game.  The UK ruling, it could be argued, said that it was lawful to make something that would deliver the desired result provided you only copied those aspects that were essential for mechanical interoperation (that would include, arguably, what happens at the electronic interface between a printer and a print cartridge?).   But we are where we are.

One thing is for sure from decisions in the US courts is that DMCA was invented to prohibit the pirating of copyright works such as movies, music and computer programs [and literary works], and it will be applied firmly when cases within its ambit are presented.

The evils of DRM for the protection of digital information

The Record (SUNY Buffalo State’s student-run newspaper) on 20 September 2016 ran an opinion piece on the evils of DRM because it prevented you from ‘consuming’ a digital work in any form/format that you chose.  It compared consuming a pizza with using a digital book and concluded that if you can eat a pizza anyhow you want then you should be able to do anything you want with a digital book.  It objected to having to buy a Kindle in order to read Amazon documents.

There are some weaknesses in the argument, however.

When you have ‘consumed’ a pizza it is gone.  Trust me.  It may come back, but not in a form you would want to talk about?  You can change the pre-configuration of a pizza but it’s kind of academic and temporary.

As far as I am aware, nobody has attempted to copyright the pizza.  I have not seen a great clamour from Italy to gain control of the name as a trade description (such as DOC for wines, or gorgonzola for a cheese).  Maybe they are missing a trick.

Now we all know that the physical world and the digital world are not (quite) identical, and that much of our tested law has come down to us (common law and precedents) from history, and although some aver it is mainly bunk, the law cannot be ignored.  And it cannot be casually re-written.

If you buy a printed newspaper you can’t read it in any other format, and please try to avoid ‘consuming’ in the rain since that is a very bad idea.  There is no backup, and no replacement policy.  You can get documents scanned, but it costs time and money, and strangely enough people can’t be bothered.  If you want to have different formats you need to buy different versions (including talking books).

Behind the noise of battle, the theme is that the consumer has the right to say how a digital work is to be delivered to them.  There is nothing in contract law to say you can’t ask for a particular format, just as you can with real books.  But there is nothing to say that a publisher cannot say the environments it is for or the formats it is published in, and tell you what use limitations there are.  There is nothing in consumer law granting implied rights just because delivery is in digital rather than physical form, and consumer law would not apply to BtoB transactions anyway.

A PowerPoint or a spreadsheet may not look too good transferred directly into HTML, for instance so the publisher might well want to enforce the form and format of the digital representation to prevent the possibility of looking bad from either a content or a branding point of view.

There is some grudging acceptance that the authors of copyright works should get paid for their work.  And that authors have the right not to be misrepresented by someone altering their work (content, form and format).  But it is rather grudging. But who is going to publish unless they get paid?  When the UK copyright laws were first introduced (for print publishing- remember) there was concern that if the only publishing was where the publisher had to pay to be printed there was a real danger that all thought would be directed by the rich to their own benefit.  (If you wish to complain about what the press publish take it up with them and not me.)

DRM licensing and exhaustion of rights

Finally there is the argument that you should be able to do just what you like with goods you buy.

This is an interesting argument that is advanced as if once you purchase something physical you can always do whatsoever you like with it and you have the legally granted right to do so.  Well actually you can’t.  Take the automobile.  Driving it is licensed.  And there are plenty of laws and rules about what you can and cannot do with one.  Last time I looked you were not allowed to transform a car into a bus or a tank without getting a lot of permissions?  And the convention of driving on one or the other side of the road is pretty firmly enforced.

Some countries legislate about the clothes that you can or cannot wear.  Others have rules about making noise.  It’s a bit of a bagatelle really.  For the technically inclined this is a discussion about exhaustion of rights over copyright and patent works.  Some legislatures claim that controlling rights are exhausted when an item is sold unless the rights are reserved by contract and then the owner can do just what they like with them.  Others say that rights are not exhausted if sold domestically, or if sold in export markets.

Although it sounds very abstract, it matters a lot in DRM.  If the dictum of automatic exhaustion of rights is correct, then the original purchaser has the right to sell on the purchased item (that is why you can buy and sell second hand books – but maybe no right to copy them and sell the copies, or even give them away).

So people using DRM controls should check that they make it clear that the protected items (documents, computer applications and so on) are not sold, but licensed for personal use and that all rights are reserved to the publisher.  They should also remember that if they are relying on the use of the DMCA to be able to prosecute people who try to circumvent protection measures, that the DRM is being applied to something that would be considered capable of copyright (a literary work gains copyright automatically on creation), and that it is not possible to merely sidestep the DRM controls because they are used to protect access control mechanisms rather than protecting the work.

Tags: document drm, document security, drm, pdf drm, pdf security
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Offline Use of Documents with Locklizard PDF DRM Link to: Offline Use of Documents with Locklizard PDF DRM Offline Use of Documents with Locklizard PDF DRMLink to: Document Security Solutions – Encryption, DLP, ERM, IRM, DRM Link to: Document Security Solutions – Encryption, DLP, ERM, IRM, DRM Document Security Solutions – Encryption, DLP, ERM, IRM, DRM
Scroll to top Scroll to top Scroll to top