WIRELESS WARS: Jailbreaking, Unlocking and the DMCA

Simpson, Luke
April 2009
Wireless Week;4/1/2009 Supplement, p22
Trade Publication
The article presents an insight concerning the Digital Millennium Copyright Act (DMCA), which is designed to discourage the use of technology to avoid copyright-protected works in the U.S. It states that the bill allows exemptions where access control technology limits people from doing non-infringing use of the copyright works. The author implies that the exemption, where there are two contrasting trains of thought, could create a fierce debate within the wireless industry.


Related Articles

  • Canada Needs a New Copyright Act. Charbonneau, Olivier // LawNow;May/Jun2009, Vol. 33 Issue 5, p16 

    The article offers significant information on the Copyright Act in Canada. It enables developers to transfer their properties like rights over original works, including literary, dramatic, artistic and certain other intellectual creations. The act was designed as an industrial application in...

  • Expect a rocky road for mobile data security, experts say. Reed, Brad // NetworkWorld Asia;Dec2007, Vol. 3 Issue 11, p10 

    The article reports on the move of various manufacturers to implement security measures in their mobile broadband devices. According to the article, the panelist from the Mobile Internet World conference in the U.S. suggested several steps on how manufacturers could limit the risks of data loss...

  • Related Work in Access-Control Policies.  // IEEE Internet Computing;Mar/Apr2008, Vol. 12 Issue 2, p40 

    The article discusses the suitability of Role-Based Access Control (RBAC) standard to act as the baseline for location-based access control in mobile computing applications. RBAC is considered suitable for access control in computing applications because it meets the requirement of allowing...

  • Industry vets create digital rights start-up. Shaw, Russell // Electronic Media;03/06/2000, Vol. 19 Issue 10, p47 

    Reports the offer of InterTrust Digital Rights Management Technology for digital copyright holders by Massive Media in Santa Monica, California. Partnership with InterTrust Technologies Corp. for development of the technology; Distribution avenue for the technology; Events that copyright...

  • Cyber copyrights: Access providers beware. Glynn, Patrick // Business Press;05/24/96, Vol. 9 Issue 4, p21 

    Opinion. Explores the possibility that Internet access providers can be held responsible for copyright infringements. Function of copyright; Ease with which copyright-protected works may be duplicated; Issue of electronic copyright infringement in the case Playboy Enterprises Inc. v. Frena;...

  • When should computer owners be liable for copyright infringement by users? Kirkwood, R. Carter // University of Chicago Law Review;Spring97, Vol. 64 Issue 2, p709 

    Analyzes the liability of computer owners for copyright infringement by users in the United States. Copyright infringement on computer networks and copyright laws in the United States; Process of computer network communication; Types of copyright infringement; Computer copyright cases;...

  • Workers on Wheels.  // Career World;Jan2002, Vol. 30 Issue 4, p2 

    Reports the use of cars with built-in computers as a workplace. Convenience for travelling business people; Installation of computer parts within the car.

  • Mobile data solutions yield strong returns.  // Frontline Solutions;Feb2003, Vol. 4 Issue 2, p31 

    Reports on the emergence of mobile data solutions that cut costs and optimize existing resources. Benefits of mobile data solutions; Recommendation made by the Aberdeen report that mobile and wireless solution providers can build industry credibility by not over-hyping their products and by...

  • Self Umpiring System for Security in Wireless Mobile Ad Hoc Network. Kathirvel, Ayyaswamy; Srinivasan, Rengaramanujam // Wireless Sensor Network;Mar2010, Vol. 2 Issue 3, p264 

    A wireless mobile ad hoc network (MANET) is a self-created self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or centralized administrator. In this paper we propose a solution of self-umpiring system that provides security...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics