Language Selection

English French German Italian Portuguese Spanish

A deal made in Washington?

Filed under
Sci/Tech
Legal

On May 26, my friend and former colleague, Dan Glickman, of the Motion Picture Association of America, made the case for Congress enacting legislation to ratify the Federal Communication Commission's broadcast flag rule, which the Court of Appeals for the D.C. Circuit struck down in early May.

Mr. Glickman asked the rhetorical question: "So why should I care about a so-called broadcast flag regulation? The answer is simple. I want to make certain that the American people will continue to have the opportunity to see our movies and television shows on free television in the digital age."

For me, the answer to his rhetorical question is simple as well: If the MPAA expects Congress to ratify a rule that would limit the ability of ordinary consumers to share lawfully acquired digital broadcast television programs with one another, then it shouldn't be surprised if Congress insists that the MPAA accept in return a restoration of the fair use rights taken from consumers through the enactment of the Digital Millennium Copyright Act (DMCA).

As crafted, the FCC's broadcast flag rule recognized the right of consumers to share lawfully acquired digital broadcast content within their homes. But it also would have made it illegal for my staff to send a digital broadcast news clip from my district office to my Washington, D.C., office via the Internet. It would have precluded a library from sharing with a patron via the Internet excerpts from a digitally broadcast public affairs program. And it would have limited the ability of teachers to use material from digitally broadcast programs when engaged in distance education with students in rural areas--the very kind of activity Congress authorized in the TEACH Act.

Given these restrictions on traditional fair use activities, I expect that my colleagues will think twice before simply ratifying the FCC's rule. Moreover, given that the rule raises the question of consumer use of lawfully acquired content, I am confident that the House Energy and Commerce Committee will consider the appropriateness of amending any broadcast flag legislation with H.R. 1201, a bill that I introduced along with the Chairman of the Committee and Representative John Doolittle, to restore the fair use rights that ordinary consumers lost when Congress enacted the DMCA.

Both fair use proponents and content owners frequently say we need balance in our copyright laws. I agree. Adding H.R. 1201 to appropriately crafted broadcast flag legislation would achieve a long needed balance--bringing us back to the equilibrium that existed before the DMCA disrupted it to the detriment of consumers, librarians, teachers and the public at large.

Congressman Rick Boucher
Virginia's Ninth Congressional District
Source.

More in Tux Machines

Security: Updates, GrayKey, Google and Cilium

  • Security updates for Wednesday
  • Hackers Leaked The Code Of iPhone Cracking Device “GrayKey”, Attempted Extortion
    The mysterious piece of hardware GrayKey might give a sense of happiness to cops because they can get inside most of the iPhone models currently active, including the iPhone X. The $30,000 device is known to crack a 4-digit iPhone passcode in a matter of a few hours, and a six-digit passcode in 3 days, or possibly 11 hours in ideal scenarios. That’s why security experts suggest that iOS users should keep an alphanumeric passcode instead of an all-number passcode.
  • Someone Is Trying to Extort iPhone Crackers GrayShift With Leaked Code
    Law enforcement agencies across the country are buying or have expressed interest in buying GrayKey, a device that can unlock up-to-date iPhones. But Grayshift, the company that makes the device, has attracted some other attention as well. Last week, an unknown party quietly leaked portions of GrayKey code onto the internet, and demanded over $15,000 from Grayshift—ironically, the price of an entry-level GrayKey—in order to stop publishing the material. The code itself does not appear to be particularly sensitive, but Grayshift confirmed to Motherboard the brief data leak that led to the extortion attempt.
  • It's not you, it's Big G: Sneaky spammers slip strangers spoofed spam, swamp Gmail sent files
    Google has confirmed spammers can not only send out spoofed emails that appear to have been sent by Gmail users, but said messages also appear in those users' sent mail folders. The Chocolate Factory on Monday told The Register that someone has indeed created and sent spam with forged email headers. These not only override the send address, so that it appears a legit Gmail user sent the message, but it also mysteriously shows up in that person's sent box as if they had typed it and emitted themselves. In turn, the messages would also appear in their inboxes as sent mail.
  • Cilium 1.0 Advances Container Networking With Improved Security
    For last two decades, the IPtables technology has been the cornerstone of Linux networking implementations, including new container models. On April 24, the open-source Cilium 1.0 release was launched, providing a new alternative to IPtables by using BPF (Berkeley Packet Filter), which improves both networking and security. The Cilium project's GitHub code repository defines the effort as Linux Native, HTTP Aware Network Security for Containers. Cilium development has been driven to date by stealth startup Covalent, which is led by CEO Dan Wendlandt, who well-known in the networking community for his work at VMware on software-defined networking, and CTO Thomas Graf, who is a core Linux kernel networking developer.

Applications: KStars, Kurly, Pamac, QEMU

  • KStars 2.9.5 is out!
    Autofocus module users would be happy to learn that the HFR value is now responsive to changing seeing conditions. Previously, the first successful autofocus operation would set the HFR Threshold value of which subsequent measurements are compared against during the in-sequence-focusing step.
  • Kurly – An Alternative to Most Widely Used Curl Program
    Kurly is a free open source, simple but effective, cross-platform alternative to the popular curl command-line tool. It is written in Go programming language and works in the same way as curl but only aims to offer common usage options and procedures, with emphasis on the HTTP(S) operations. In this tutorial we will learn how to install and use kurly program – an alternative to most widely used curl command in Linux.
  • Pamac – Easily Install and Manage Software on Arch Linux
    Arch Linux is one of the most popular Linux distribution available despite its apparent technicality. Its default package manager pacman is powerful but as time always tells, it is a lot easier to get certain things done using a mouse because GUI apps barely require any typing nor do they require you to remember any commands; and this is where Pamac comes in. Pamac is a Gtk3 frontend for libalpm and it is the GUI tool that Arch Linux users turn to the most when they aren’t in the mood to manage their software packages via the terminal; and who can blame them? It was specifically created to be used with Pacman.
  • QEMU 2.12 Released With RISC-V, Spectre/Meltdown & Intel vGPU Action
    QEMU 2.12 is now officially available as the latest stable feature update to this important component to the open-source Linux virtualization stack.

Ubuntu Leftovers

today's howtos