Digital Rights Management

Digital Rights Management (generally abbreviated to DRM) is an umbrella term that refers to any of several technologies used by publishers or copyright owners to control access to and usage of digital data or hardware, and to restrictions associated with a specific instance of a digital work or device. The term is often confused with copy protection and technical protection measures. These two terms refer to technologies that control or restrict the use and access of digital content on electronic devices with such technologies installed, acting as components of a DRM design.

Digital Rights Management is a controversial topic. Advocates argue DRM is necessary for copyright holders to prevent unauthorized duplication of their work to ensure continued revenue streams.[1] Some critics of the technology, including the Free Software Foundation, suggest that the use of the word “Rights” is misleading, should be avoided, and replaced by the (in their opinion) more accurate term Digital Restrictions Management.[2] They claim that copyright holders, and industry organizations, are using DRM to curtail existing user rights regarding copyrighted material (via statue or common law) and claiming control not granted by law. Others, such as the Electronic Frontier Foundation consider several DRM schemes to be anti-competitive, and violations of anti-trust laws in one or more jurisdictions, citing the iTunes Store as an example.[3]

Enterprise Digital Rights Management (E-DRM or ERM) refers to the use of DRM technology to control access to corporate documents (Microsoft Word, PDF, TIFF, AutoCAD files, etc), rather than consumer playable media. The technology usually requires a Policy Server to authenticate users’ rights to access certain files. EDRM vendors include Microsoft, Adobe Systems, Liquid Machines, EMC Corporation/Authentica and several smaller companies. There are open source implementations as well. EDRM is generally intended to apply to trade secrets, which are much different from copyrighted material (though there is sometimes an overlap as some material is both copyrighted and a trade secret — eg, the source code for some proprietary software), and for whom the primary issue is industrial or corporate espionage or inadvertent release. In most jurisdictions, there is no notion of fair use for trade secrets as there is for copyrighted material. Trade secrecy confidentiality measures are less controversial than DRM applied to copyrighted works sold to the public in many copies (eg, audio or video recordings, texts, …).

http://www.newedgecabaret.com/

Contents [hide]

1 Introduction

1.1 Content Scrambling System

2 Legal enforcement of DRM

2.1 Digital Millennium Copyright Act

3 Other copyright implications

4 DRM advocates

5 DRM opponents

6 DRM and Internet music

7 DRM and Libraries

8 Controversies, consequences, and examples

9 Copyright law vs. particular techniques

10 European dialogues on DRM concerns

11 Inclusion within GNU General Public License version 3

12 See also

12.1 Related concepts

12.2 Devices that use DRM

12.3 Lobbying organizations

13 References

14 Further reading

15 External links

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: