|
WIPO/INT/SIN/98/8
ORIGINAL: English
DATE: April 1998 |
|
|
THE REPUBLIC OF SINGAPORE |
WORLD INTELLECTUAL
PROPERTY ORGANIZATION |
WIPO SEMINAR FOR ASIA AND THE PACIFIC
REGION ON THE INTERNET AND THE PROTECTION OF INTELLECTUAL PROPERTY RIGHTS
organized by
the World Intellectual Property Organization (WIPO)
in cooperation with
the Ministry of Law,
the Attorney-Generals Chambers,
the National Science and Technology Board,
the Singapore Productivity and Standards Board
and
the Singapore Trade Development Board
of the Government of the Republic of Singapore
Singapore, April 28 to 30, 1998
IV. EXERCISE AND MANAGEMENT OF INTELLECTUAL
PROPERTY RIGHTS ON THE INTERNET
Document prepared by Mr. Michael S.
Keplinger, Senior Couselor,
United States Department of Commerce, Patent and Trademark Office,
United States of America
I. INTRODUCTION
A recent study by the International Telecommunications
Union (ITU) reports that by the year 2001, 112 million host computers will be connected to
the global information system, up from 16.1 million in 1996. That same ITU study predicts
that on-line sales will grow to from $314 billion to $357 by 2001. The bulk of these
connections are in the developed world, but rapidly growing economies in Latin America,
Asia and parts of Africa are also experiencing high rates of expansion. There is also a
recent Vanderbilt University survey that finds that there are more than 200,000 commercial
websites in operation and finds further that this number is increasing at the rate of 10%
per month. Thus, it is clear that electronic commerce is growing rapidly and we need to
address important legal issues to guarantee that the potential growth predicted by the ITU
study will take place.
As electronic commerce grows, the ease of infringement and
the difficulty of detection and enforcement will lead copyright owners increasingly to
look to technology, as well as the law, for protection of their works. However, while it
is clear that technology can provide significant levels of protection, it is equally clear
that technology also can be used to defeat any protection that technology may provide.
Legal protection alone will not be adequate to provide incentive to authors to create and
to disseminate works to the public. Similarly, technological protection likely will not be
effective unless the law also provides some protection for the technological processes and
systems used to prevent unauthorized access and to restrict unauthorized uses of
copyrighted works.
The most significant development in ensuring adequate and
effective protection and enforcement of intellectual property rights in cyberspace are the
two new WIPO Internet Treatiesthe WIPO Copyright Treaty and the WIPO
Performances and Phonograms Treaty. Both of these new Treaties include norms for
substantive standards of protection, provisions on technological protection measures and
enforcement requirements that will assure appropriate norms for the protection of
intellectual property in the digital future.
II. SUBSTANTIVE
STANDARDS
(a) WIPO Copyright Treaty
Article 1 specifies that the WIPO Copyright Treaty: (1) is
a special agreement within the meaning of Article 20 of the Berne Convention; (2) shall
not prejudice any rights and obligations under any other treaties; and (3) shall not
derogate from existing obligations that Contracting Parties have to each other under the
Berne Convention. It also requires Contracting Parties to comply with Articles 1 to 21 and
the Appendix of the Berne Convention.
Article 2 specifies that copyright protection extends to
expressions and not to ideas, procedures, methods of operation or mathematical concepts as
such.
Article 3 requires Contracting Parties to apply the
provisions of Articles 2 to 6 of the Berne Convention to the protections afforded by this
Treaty. Article 2 of the Berne Convention defines literary and artistic works
and specifies the scope of protection afforded to official texts, collections, works of
applied art, speeches and news of the day. Paragraph (1) of Article 3 of the Berne
Convention includes provisions on the main points of attachment: the nationality of the
author and the place of publication of the work. Paragraph 3(2) assimilates habitual
residence of an author to nationality. Paragraph 3(3) defines the expression
published works. Paragraph 3(4) defines simultaneous publication. Article 4 of
the Berne Convention extends the protection of the Convention to authors of
cinematographic works, works of architecture and certain other artistic works, even where
the conditions of Article 3 are not met. Article 5 of the Berne Convention confirms in its
paragraph (1) the principle of national treatment and the obligation to grant the rights
specially granted in the Convention and in paragraph 5(2) the principles of formality-free
or automatic protection and independence of protection. Paragraph 5(3) specifies that
national law governs protection in the country of origin. Paragraph (4) lays down the
rules that determine the country of origin of a work. In addition, a reference to Article
6 of the Berne Convention is made to provide for the possibility of restricting in certain
cases the protection given to works of non-nationals of other Contracting Parties.
Article 4 requires computer programs to be protected as
literary works within the meaning of Article 2 of the Berne Convention.
Article 5 requires compilations of data or other material,
which by reason of the selection or arrangement of their contents constitute intellectual
creations, to be protected as such. This protection does not extend to the data or the
material itself and is without prejudice to any copyright subsisting in the data or
material contained in the compilation.
Paragraph (1) of Article 6 requires Contracting Parties to
grant authors the exclusive right of authorizing the making available to the public of the
original and copies of their works through sale or other transfer of ownership. Paragraph
(2) of this Article specifies that Contracting Parties are free to determine the
conditions, if any, under which the exhaustion of the distribution right occurs after the
first sale or other transfer of ownership of the original or a copy of the work.
Article 7 requires Contracting Parties to provide
exclusive rental rights with respect to computer programs, cinematographic works, and
works embodied in phonograms, (as determined in the national law of Contracting Parties).
Contracting Parties need not provide rental rights in the case of computer programs, where
the program itself is not the essential object of the rental; and in the case of
cinematographic works, unless rental has led to widespread copying materially impairing
the authors right of reproduction.
Article 8 requires Contracting Parties to grant authors
the exclusive right of authorizing any communication to the public of their works, by wire
or wireless means. This right must include the making available to the public of their
works in such a way that members of the public may access these works from a place and at
a time individually chosen by them.
Article 9 requires Contracting Parties to grant a term of
protection for photographic works that is the same as the term of protection for other
artistic works.
Article 10 permits Contracting Parties to provide for
limitations of or exceptions to the rights granted to this Treaty and the Berne Convention
in certain special cases that do not conflict with a normal exploitation of the work and
do not unreasonably prejudice the legitimate interests of the author.
Article 11 requires Contracting Parties to provide
adequate legal protection and effective legal remedies against the circumvention of
effective technological measures that are used by authors in connection with the exercise
of their rights under this Treaty or the Berne Convention and that restrict acts, in
respect of their works, which are not authorized by the authors concerned or permitted by
law.
Article 13 requires Contracting Parties to apply
retroactive protection in accordance with Article 18 of the Berne Convention to all
protection provided for in this Treaty.
Article 14 requires that Contracting Parties (1) adopt
measures necessary to ensure application of this Treaty and (2) ensure that enforcement
procedures are available in a manner that permits effective action against any act of
infringement of rights covered by this Treaty, including expeditious remedies to prevent
infringements and remedies which constitute a deterrent to further infringements.
(b) WIPO Performances and
Phonograms Treaty
Article 1 paragraph 1, specifies that this Treaty does not
derogate from existing obligations that Contracting Parties have to each other under the
Rome Convention. Paragraph 2 specifies that the protection granted under this Treaty in no
way affects the protection of copyright in literary and artistic works, and that no
provision of this Treaty may be interpreted as prejudicing such protection. Paragraph 3
specifies that this Treaty has no connection with, and does not prejudice any rights and
obligations under, any other treaties.
Article 2 establishes definitions for the purposes of this
Treaty: Paragraph (a) defines performers as actors, singers, musicians,
dancers, and other persons who act, sing, deliver, declaim, play in, interpret, or
otherwise perform literary or artistic works or expressions of folklore. Paragraph
(b) defines a phonogram as the fixation of the sounds of a performance
or of other sounds, or of a representation of sounds, other than in the form of a fixation
incorporated in a cinematographic or other audiovisual work. Paragraph (c) defines
fixation as the embodiment of sounds, or of the representations thereof,
from which they can be perceived, reproduced or communicated through a device.
Paragraph (d) defines producer of a phonogram as the person, or the
legal entity, who or which takes the initiative and has the responsibility for the first
fixation of the sounds of a performance or other sounds, or the representations of
sounds. Paragraph (e) defines publication of a fixed performance or a
phonogram as the offering of copies of the fixed performance or the phonogram
to the public, with the consent of the rightholder, and provided that copies are offered
to the public in reasonable quantity. Paragraph (f) defines broadcasting
as the transmission by wireless means for public reception of sounds or of images
and sounds or of the representations thereof. It also includes transmission by
satellite and the transmission of encrypted signals as
broadcasting where the broadcaster provides the public with the means for
decrypting the transmission. Paragraph (g) defines communication to the public of a
performance or a phonogram as the transmission to the public by any medium,
otherwise than by broadcasting, of sounds of a performance or the sounds or the
representations of sounds fixed in a phonogram.
Article 3 establishes the points of attachment for
protection under the Treaty. They include the criterion of nationality of the performers
and producers of phonograms under paragraph 1, and in paragraph 2, those nationals of
another Contracting Party who would meet the criteria for eligibility for protection
provided under the Rome Convention. Paragraph 3 requires a Contracting Party that takes
the reservation provided for in Article 5(3) or Article 17 of the Rome Convention to
notify the Director General of the World Intellectual Property Organization (WIPO).
Article 4 requires Contracting Parties to grant to
nationals of other Contracting Parties, the treatment it accords to its own nationals with
regard to the exclusive rights specifically granted in this Treaty, and to the right to
equitable remuneration provided for in Article 15. Paragraph 2 provides that the national
treatment obligation does not apply to the extent that another Contracting Party makes a
reservation to the right of remuneration permitted by Article 15(3) of this Treaty.
Article 5 obligates Parties to provide protection for the
moral rights of performers in respect of their performances fixed in phonograms. The scope
of these rights is modeled on but is lesser in scope than the protection for the moral
rights of authors as defined in Article 6bis of the Berne Convention. Paragraph 1
provides for the right of paternity and paragraph 2 for a more limited right of integrity.
Paragraph 3 provides that the means for protecting these rights is left to the country
implementing this protection.
Article 6 grants performers the exclusive right to
authorize (i) the broadcasting and communication to the public of their unfixed
performances except where the performance is already a broadcast performance; and (ii) the
fixation of their unfixed performances.
Article 7 grants performers the exclusive right of
authorizing the direct or indirect reproduction of their performances fixed in phonograms,
in any manner or form.
Article 8 grants performers the exclusive right of the
public distribution of the original and copies of their performances fixed in phonograms.
Paragraph 2 provides that this Treaty does not address the issue of exhaustion of this
right.
Article 9 grants performers the exclusive right of
authorizing the post first sale commercial rental of the original and copies of their
performances fixed in phonograms. Paragraph 2 provides that a Contracting Party that, on
April 15, 1994, had and continues to have in force a system of equitable remuneration of
performers for the rental of copies of their performances fixed in phonograms, may
maintain that system provided that the commercial rental of phonograms is not giving rise
to the material impairment of the exclusive right of reproduction of performers.
Article 10 provides that performers have the exclusive
right of authorizing the making available to the public of their performances fixed in
phonograms, by wire or wireless means, in such a way that members of the public may access
them from a place and at a time individually chosen by them.
Article 11 provides that producers of phonograms have the
exclusive right to authorize the direct or indirect reproduction of their phonograms, in
any manner or form.
Article 12 provides that producers of phonograms have the
exclusive right to authorize the public distribution of the original and copies of their
phonograms. Paragraph 2 provides that this Treaty does not address the issue of exhaustion
of these rights.
This Article grants producers of phonograms the exclusive
right to authorize the post first sale commercial rental of the original and copies of
their phonograms. Paragraph 2 provides that a Contracting Party that, on April 15, 1994,
had and continues to have in force a system of equitable remuneration of producers for the
rental of copies of their phonograms, may maintain that system provided that the
commercial rental of phonograms is not giving rise to the material impairment of the
exclusive right of reproduction of producers.
Article 14 provides that producers of phonograms have the
exclusive right to authorize the public distribution of their phonograms, by wire or
wireless means, in such a way that members of the public may access them from a place and
at a time individually chosen by them.
Article 15(1) requires that performers and producers of
phonograms have the right to be compensated by a single equitable remuneration for the
broadcasting of their phonograms. Paragraph 2 provides that national legislation may
provide that the single equitable remuneration may be claimed by the performer or by the
producer of a phonogram or by both. In the absence of an agreement between the performer
and the producer of a phonogram, national legislation may set the terms by which
performers and producers share the single equitable remuneration.
Under paragraph 3, a Contracting Party takes a reservation
that it limit the application of paragraph (1) to only certain uses, or that it will not
apply these provisions at all. Paragraph 4 provides that for the purposes of this Article,
phonograms that have been distributed to the public by means of transmission shall be
considered as published.
Article 16(1) allows Contracting Parties to provide for
the same kinds of limitations or exceptions to the rights of performers and producers of
phonograms that they provide in their national legislation in connection with the
protection of copyright in literary and artistic works. Paragraph 2 obligates Contracting
Parties to apply a fair use test to limitations and exceptions to the rights under this
Treaty.
Article 17 establishes a minimum 50 year term of
protection for phonograms.
Article 20 prohibits conditioning the enjoyment and
exercise of the rights in this Treaty on compliance with any formality such as copyright
registration or notice.
Article 21 only allows the reservation in respect of the
broadcasting of sound recordings provided for in article 15, other reservations to the
Treaty are not permitted.
Article 22 makes the provisions concerning the protection
of existing works in Article 18 of the Berne Convention applicable to the rights under
this Treaty.
Article 23 requires Contracting Parties to provide
effective means of enforcement of the rights under this Treaty.
III.
ANTICIRCUMVENTION AND RIGHTS MANAGEMENT
Both of the new WIPO Treaties include technological
protection measures in their respective Articles 11 and 18 (commonly referred to as the
black box or anti-circumvention provisions). These provisions
require adequate legal protection and effective legal remedies against the
circumvention of effective technological measures that are used by authors in connection
with the exercise of their rights under this Treaty or the Berne Convention and that
restrict acts, in respect of their works, which are not authorized by the authors
concerned or permitted by law.
The system mandated by the anti-circumvention provisions
is intended to assist copyright owners in the protection of their works. Copyright owners
may wish to use such systems to prevent the unauthorized access to or reproduction of
their works. They may also wish to allow some users to deactivate the systems.
Furthermore, certain uses of copyrighted works may not be unlawful under the Treaties or
domestic legislation. Therefore, the anti-circumvention provisions of the Treaties
prohibit only those circumventions that are not authorized by the authors or permitted by
law. That authority may be granted by the copyright owner or by limitations on the
copyright owner's rights under law.
Neither do the Treaties require copyright or neighboring
right owners to use technological protection, or, if they do, to employ any particular
type. Copyright owners should be free to determine what level or type of technological
protection (if any) is appropriate for their works, taking into consideration cost and
security needs, and different consumer and market preferences. Moreover, there is no
evidence that one technological protection system couldor shouldtake care of
all types of works.
Both of the new WIPO Treaties also include provisions on
copyright management information. These provisions require the protection of copyright
management information, defined under the Treaties as information which identifies
the work, the author of the work, the owner of any right in the work, or information about
the terms and conditions of use of the work, and any numbers or codes that represent such
information, when any of these items of information is attached to a copy of a work or
appears in connection with the communication of a work to the public.
In the future, the copyright management information
associated with a work, such as the name of the right owner and the terms and conditions
for uses of the work, may be critical to the efficient operation and success of electronic
commerce. Rights management information will serve as a kind of license plate for a work
on the information superhighway, from which a user may obtain important information about
the work. The accuracy of such information will be crucial to the ability of consumers to
find and make authorized uses of protected works. Reliable information will also
facilitate efficient licensing and reduce transaction costs for licensable uses, both
fee-based and royalty-free, of copyrighted works and phonograms. The public also should be
protected from false information about who created a protected work or phonogram, who owns
rights in it, and what uses may be authorized by the right owner.
While the Treaties do not require copyright owners to
provide copyright management information, they do require that when such information is
included, it be accurate. Such provisions will encourage right owners to include the
information needed to enable consumers to more easily find and make authorized uses of
copyrighted works and phonograms. The provisions prohibit the falsification, alteration or
removal of any copyright management informationnot just that which is included in or
linked to the copyrighted work or phonogram. Many users may obtain such information from
public registers, where the integrity of such information will be no less important.
(a) Anti-circumvention
Provisions
The effective implementation of the anti-circumvention
provisions of the Treaties requires careful implementation in domestic law. We believe
that a two level approach to its implementation is essential for the protection to be
effective as required by the treaties. First, there should be a provision that applies
when a person has not obtained lawful access to a work for which the copyright owner has
put in place a technological measure that effectively controls access to copies of that
work. It must establish a general prohibition against circumventing a technological
protection measure that effectively controls access to a copyrighted work. The act of
circumventing a technological protection measure put in place by a copyright owner to
control access to a copyrighted work is the electronic equivalent of stealing a copy of a
book from an author who has secured that copy. Circumventing such a technological
protection measure includes descrambling a scrambled work, decrypting an encrypted work,
or otherwise avoiding, bypassing, removing, deactivating or impairing a technological
protection measure. In order to prevent the provision from being too extensive in its
operation, there could be several requirements to be met to be in violation of this
prohibition: (1) the technological protection measure must be one that, in the ordinary
course of its operation, requires the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain access to the work; (2) the
work to which access is controlled by the technological protection measure must be a work
protected by copyright or neighboring rights (i.e., not a work that is in the public
domain); and (3) the act of circumvention must have been done without the copyright
owners authority.
To effectively protect and enforce the copyright
owners right to determine who may have access to the copyrighted work, such a
provision would also prohibit manufacturing, importing, offering to the public, providing
or otherwise trafficking in any technology, product, service, device, component or part
thereof that can be used to circumvent a technological protection measure that effectively
controls access to a copyrighted work. Again, to preclude an overly broad implementation,
violation of such a prohibition could require that certain conditions are met. The
technology, product, service, device, component or part thereof could be limited to: (1)
be primarily designed or produced for the purpose of circumventing a technological
protection measure that effectively controls access to a copyrighted work; or (2) have
only limited commercially significant purpose or use other than to circumvent a
technological protection measure that effectively controls access to a copyrighted work;
or (3) be marketed by the manufacturer, importer, person who offers it to the public,
provides it, or otherwise traffics in it, or by another person acting in concert with him
or her, for use in circumventing a technological protection measure that effectively
controls access to a protected work.
When a person has obtained lawful access to a copy of a
copyrighted work or phonogram, but the copyright owner has put in place technological
measures that effectively protect his or her right to control or limit further use of the
copyrighted work or phonogram, manufacturing, importing, offering to the public, providing
or otherwise trafficking in any technology, product, service, device, component or part
thereof that can be used to circumvent such protection of a right under the Treaties or
the Berne Convention afforded by a technological protection measure should be prohibited.
Circumventing in this sense includes avoiding, bypassing, removing, disabling or otherwise
impairing a technological protection measure. Under this approach, the technological
protection measure must be one that, in the ordinary course of its operation, prevents,
restricts, or otherwise limits the exercise of a copyright or neighboring right
owners right. A violation would occur only when one of three conditions are met: the
technology, product, service, device, component, or part thereof must: (1) be primarily
designed or produced for the purpose of circumventing technological protection measure
that effectively protects a right; (2) have only limited commercially significant purpose
or use other than to circumvent protection afforded by such a technological protection
measure; or (3) be marketed by the person who manufactures it, imports it, offers it to
the public, provides it, or otherwise traffics in it, or by another person acting in
concert with that person, for use in circumventing protection afforded by such a
technological protection measure.
As well, the importation, sale for importation or sale
after importation by the owner, importer or consignee of any such technology, product,
service, device, component or part thereof should be prohibited. Such provisions should
also make it clear that such provisions shall not have any effect on the rights, remedies,
limitations or defenses to copyright infringement including uses which could be permitted
under the Treaties or the Berne Convention.
(b) Integrity of Copyright
Management Information
An effective regime for protection of rights management
information should generally prohibit knowingly providing false rights management
information (RMI) or distributing or importing for distribution false RMI with the intent
to induce, enable, facilitate or conceal a copyright infringement.
It should also include a general prohibition against
removing or altering RMI and against distributing or importing for distribution altered
RMI or works in which RMI has been removed. The Treaties prohibit three specific acts if
they are committed without the authority of the copyright owner or the law, and if they
are done knowing, or with respect to civil remedies, having reasonable grounds to know,
that they will induce, enable, facilitate or conceal a copyright infringement: (1)
intentionally removing or altering RMI; (2) distributing or importing for
distribution RMI knowing that it has been altered without the authority of the copyright
owner or the law; or (3) distributing, importing for distribution, or publicly performing
works, copies of works, or phonograms knowing that RMI has been removed or altered without
the authority of the right owner or the law.
RMI includes (1) the title of a work or other information
that identifies the work; (2) the authors name or other information that identifies
the author; (3) the copyright owners name or other information that identifies the
copyright owner; and (4) terms and conditions for use of a work. Numbers and symbols which
refer to or represent the above information and links, such as embedded pointers and
hyperlinks, to the above information are also included within the definition of RMI. As
noted above, both Treaties require that numbers and symbols be included within the
definition of RMI because removing or altering a link to the information will have the
same adverse effect as removing or altering the information itself. To protect the privacy
of users of copyrighted works, RMI should not include information concerning individual
uses of copyrighted works.
Implementation of RMI Protection must not mandate the use
of CMI. Such provisions must protect the integrity of RMI if a party chooses to use it in
connection with a protected work or phonogram. It also should be noted that rights
management information should not encompass tracking or usage information relating to the
identity of users of the works or the uses made of such works. RMI encompasses only that
information associated with a work, such as the authors, performers or
producers name, the right owners name, and title of the work.
(c) U.S. Activities
In my own country, we are moving to promptly adhere to
both new Treaties. As you may know, President Clinton submitted these Treaties to the
United States Senate on July 28, 1997, for its advice and consent. Furthermore, the
necessary implementing legislation, H.R. 2281 and S.1121, has been introduced in both
Houses of Congress, and has moved through the legislative process with hearings.
As for the issue of OSP/ISP liability, the Congress has
been working to forge a solution that could be embraced by all of the partiesboth
content and service providers. Both in the Senate and the House, particularly Senator
Hatch and Congressman Goodlatte have been holding continuing negotiating sessions to reach
agreement on this issue.
The House Judiciary Subcommittee on Courts and
Intellectual Property approved and reported to the full committee an amended version of
H.R. 2281 on February 26, 1998. The bill was approved by the full Judiciary Committee on
April 1, 1998, after an amendment to add the revised provisions of H.R. 3209 regarding
on-line service provider liability as Chapter II. It is our understanding that these
provisions reflect a partial agreement on liability issues reached on March 31, 1998,
between copyright owners and service providers. The full agreement is expected to be
reflected in a managers amendment to be offered during House floor consideration of
H.R. 2281 soon after the spring recess.
On April 2, 1998, Chairman Hatch of the Senate Judiciary
Committee revealed a draft bill captioned the Digital Millennium Copyright Act of
1998. The bill is intended to reflect the full agreement between copyright owners
and service providers on liability issues and serve as the Senate counterpart to H.R.
2281. Judiciary Committee markup of the bill is likely soon after the Senate returns from
its spring recess (April 4 to 19).
To develop the U.S. proposal for Treaty implementation
legislation, the USPTO and the General Counsel of the Department of Commerce consulted
widely with representatives of the various groups interested in the implementation of the
Treaties. These groups included copyright owners and authors, computer and consumer
equipment manufacturers, service providers and representative users of copyrighted works
such as educators and librarians. All of these groups contributed suggestions, orally and
in writing, particularly in regard to the provisions for the implementation of the
anticircumvention provisions of the Treaties. The provision on anticircumvention which was
finally adopted as the Administrations proposal and which was ultimately
incorporated into H.R. 2281 is intended to protect the rights of copyright owners while
encouraging the continued advancement of technology in a balanced manner that takes into
account the needs and concerns of all interested parties and the importance of promoting
the continuing growth of electronic commerce with its benefits for all members of society.
In particular, in order to provide meaningful protection
against unauthorized circumvention of technological protection measures, H.R. 2281
includes restrictions on the manufacture and distribution of devices and other
technological means of circumventing such protection measures. These provisions have been
drafted narrowly and carefully, however, to enable the continued development and use of
technology for legitimate purposes. This is not the first time that legislators have been
called on to strike a difficult but important balance between prohibiting the manufacture
and distribution of devices and technologies that facilitate prohibited acts and ensuring
that development and use of technologies and devices for legitimate purposes is not
hindered. Such carefully drawn restrictions can be found in U.S. law in the prohibitions
on circumvention of the Serial Copy Management System in 17 U.S.C. § 1002, including
a prohibition on devices that enable circumvention, and in the prohibition in 47 U.S.C. §
605 on the manufacture, assembly, importation, sale or distribution of devices primarily
of use in the unauthorized decryption of satellite programming.
Additionally, legislation has been introduced to deal with
the complex issue of the extent of liability of Internet service providers and on-line
service providers for copyright infringement in cyberspace. While the Administration
believes that treaty ratification and liability are separate issues, and that nothing in
the two new Treaties requires Congress to specifically address the issue of liability, we
are pleased to see our Congress address these two issues simultaneously so long as the
consideration of the liability issue does not impair prompt consideration and passage of
the implementing legislation. While we are hoping for prompt enactment of legislation to
implement these Treaties, it unlikely that implementing legislation will be enacted before
Congress adjourns its First Session this Fall.
While we are seeking enactment in the United States during
the Second Session of the 105th Congress, we encourage speedy adherence and implementation
by other countries. I note that one country in AsiaIndonesiahas become the
first to ratify the WIPO Copyright Treaty while Moldova has become the second country to
ratify the Copyright Treaty and the first to ratify the Performances and Phonograms
Treaty. Others have taken steps to bring their laws into line with the Treaty obligations.
I am sure that most of you remember that adherence by thirty countries is necessary for
the Treaties to enter into force. The sooner the Treaties enter into force the better for
all of us.
|