Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Viruses and malware already exist for jailbroken iphones; that's nothing new. But the rest of your post was oh so clever.


Where did you learn of this "being forced to honor the warranty" clause-- or anything remotely close to it? I'm interested to read more.

here we go again. people who have no idea what they are talking about spewing out mis information about jailbreaking.

JAILBREAKING is NOT piracy -

Jailbreaking does NOT have malware or viruses ( please give me some i know you cant)

Jailbreaking does NOT brick your iphone

yes your warrenty will be voided IF and only IF you bring your jailbroken iphone to apple.. if u just restore before going to apple they will never know and you still have your warrenty..
 
Not much of a change.

While the US government may make it legal to jailbreak a phone. It doesn't mean that Apple (or Google, or Plam, or Microsoft) have to support the jailbroken device.

Android, which is an open system needs to be jailbroken in order to add tethering (not everyone has 2.2 Froyo).

The analogy would be to a car. You have the right to make any modifications to it, but the manufacturer doesn't have to cover you for the changes you made (they don't have to repair the engine if you changed it). It is presumed that if you have the technical skills to make a modification, that you can service it yourself.

The main thing is that there will be a cottage industry of geeks selling their ability to jailbreak your phone so you can add pirated apps. That will be the main thing that will happen from this. It may affect the App store, but mainly it will affect software developers, because they will have to deal with pirated software being more widespread.

Supposedly this new ruling also affects unlocking, which is now mandatory. If this is the case, this is better news to consumers as you can now use your iphone with other carriers and they have to provide you with the keys to do so.
 
I've read some of the responses but it's all about jailbreaking, I would think the big new would be...

"Allow owners of used cell phones to break access controls on their phones in order to switch wireless carriers."


Carrier exclusivity is effectively over now. You should be able use your iPhone on any carrier as long as it's compatible with the carrier.

In the US (and that include PA ;)), there is only one carrier supporting the 3G frequencies used by the iPhone and that's the AT&T.

What good is being able to switch if you can't take advantage of it.
If you are going to live on 2G with t-mob's then I suggest that you seriously consider having a high caliber smart phone a waste of money.
How much vid streaming will you be doing? None on 2G, that's 4 sur.
 
To everyone saying this "isn't the government's role".

No. I'll tell you what ISN'T the government's role: prosecuting people that jailbreak their iPhones.

This is simply the government stating that they will play no part in making criminals out of people that use their hardware the way they want.

This is government DE-regulation. All you libertarians and conservatives should be happy about this instead of being "scared" that the government is meddling in corporate affairs. This is an anti-corporatism stance on the government's part, which is very rare.

Limited government ≠ corporatism. Anyone that thinks so has been brainwashed by the last decade of crappy Republican leadership.
 
Good news. I would like to see the government make it an explicit requirement that any phone device, locked to a carrier, be made unlocked after the subsidized contract expires (or unlockable immediately if no subsidized pricing is involved).

This would actually make the iPhone hands down the best cellphone out there. Apple should have definitely seen this coming and wonder what their response will be. I really hope they don't see this as a negative thing because it's not.
There is one aspect of Apple's aversion to jailbreaking with which I am sympathetic, and that is the piracy. Jailbreaking makes it easy to pirate most any half-popular app on the app store, and I can't see how anyone could make an honest case for that being supportable.
 
JAILBREAKING is NOT piracy -

Jailbreaking does NOT have malware or viruses ( please give me some i know you cant)

Jailbreaking does NOT brick your iphone

Are you willing to guarantee this statement? If my phone breaks because of this will you replace it? This is the position Apple is in so I can understand why they want to keep people from jailbreaking as much as possible.
 
In your opinion. How about try it before you knock it so harshly. Wow, negative much?

Today, because of this article, yes. Highly negative. It's my opinion, yes, and I'm entitled to it, same for free speech - thank you Gov. I feel that highly about my opinion and I'm sticking to it. You like it? That's fine. You have opinions and free speech to. I'm not knocking you in any way, be assured. I just feel that strongly, and I won't tone down my feelings to make comfort.

+1

anybody who's saying that this whole thing is good, they really dont like apple's way of marketing to begin with

My thoughts exactly. If people:
A) Don't want to be under the iUmbrella,
B) Are against being locked into a user environment where only what Apple says goes,
C) Feel the needs to circumvent A and B,

- then they don't really want what they think they want. There are other devices that accomplish these things with different software and hardware. If you want the software and hardware Apple puts out, pay the price, and abide by their rules.

So what if I'm a sheep, bleating proudly? I've had 0 major issues with anything Apple I've ever bought, and the escalated issues, like the Wifi chip dying in my first phone, I've lived with. It all goes back to my impatience rant. People don't know how to deal anymore.

INSTANT GRATIFICATION! GIMME!


To everyone saying this "isn't the government's role".

No. I'll tell you what ISN'T the government's role: prosecuting people that jailbreak their iPhones.

This is simply the government stating that they will play no part in making criminals out of people that use their hardware the way they want.

This is government DE-regulation. All you libertarians and conservatives should be happy about this instead of being "scared" that the government is meddling in corporate affairs. This is an anti-corporatism stance on the government's part, which is very rare.

Limited government ≠ corporatism. Anyone that thinks so has been brainwashed by the last decade of crappy Republican leadership.

Coming from "PlayRadioPlay", I would think you'd be more liberal than you come off as. That said, I disagree. For many reasons I've posted over the last 8 thread pages.
 
It's a pretty narrow regulatory decision as far as I can tell. It removes doubt that this is illegal--but I don't think Apple has ever tried to contend that.

It may mean that denying warranty service because of jailbreaking goes away. That's really the biggest potential impact I can see.
 
Wow... I'm not quite sure what to make of this.

While I'm all for people being able to use devices they've purchased in whatever way they choose, Apple has some good reasons for their so called "walled garden".

Will this government sanctioning of jailbreaking make it more mainstream? And make piracy more mainstream? And make those devices more of a target for viruses/malware? :confused::eek:

You're really worried about mobile viruses? What a joke.
 
DMCA is a new body of law, different than copyright. traditional copyright applies to software as well. Under traditional copyright you cannot copy or make derivative works (or perform works, etc.) DMCA has to do with breaking digital safeguards (as well as a safe-harbor for internet providers, etc.)



The copy of the OS was changed, so it is a derivative work. The copy of the oS may have been illegally copied. And if it was copied in violation of the licensing agreement (by being put on the hard drive) it may be an illegal copy.



Nope. Completely different. The gov't has only said that you can break the technological safeguards without violating the DMCA. THat's like saying you can break the lock on a door. Once you get in the house, you aren't free to do whatever you like, however. There are still rules. It just means you won't be charged with breaking and entering. If it's not your house, it's still trespassing. If you murder someone in the house it's still murder.

Wait... you're aware you can install OSX now on a hackintosh off of retail discs right? You don't need to get a "hacked" version.
 
Why allow jailbreaking, but not allow mod chips for video game consoles?

Both are really just forms of computers, on both the manufacturers allow only certain programs (games) on them, and disallow others.

I don't understand why they would allow one, but not allow the other.....

I don't plan to jailbreak, or try to mod a console, but it has me scratching my head.
 
Can't believe all these posts about "freedom of choice". You already have that. If you don't like Apple's products or policies -- Don't buy their products! You're just imposing your wants on desires on Apple and restricting their freedom. If Apple wants to require you to say "I love Apple" into the phone before every phone call it should be their right to do so. There is no one forcing you to buy their phone.
 
Wait... you're aware you can install OSX now on a hackintosh off of retail discs right? You don't need to get a "hacked" version.

You saw where i said "may," right? And in the psystar case, the image was hacked (albeit on the hard drive). And it's still a violation of the licensing agreement.

Not sure what your point is .
 
No it isn't piracy

here we go again. people who have no idea what they are talking about spewing out mis information about jailbreaking.

JAILBREAKING is NOT piracy -

Jailbreaking does NOT have malware or viruses ( please give me some i know you cant)

Jailbreaking does NOT brick your iphone

yes your warrenty will be voided IF and only IF you bring your jailbroken iphone to apple.. if u just restore before going to apple they will never know and you still have your warrenty..

Jailbreaking is not piracy, but it does help it. Once you jailbreak your phone, you can add apps without having to validate them through teh App Store. most publishers use this in order to ensure that you have a bought copy. Jailbreaking will help yo circumvent that.

Most people will not jailbreak as it still is fairly technical for most. Ive' jailbroken my iphone and ipod tocuh. but restored it after a while when the device started behaving oddly. Haven't had the need to do it again as most apps I need i have.
 
Actually, this is the government un-meddling. The government is providing an exception to a law that otherwise restricts your rights to do things. In other words, you have more rights and freedoms than you did yesterday. This is the opposite of government meddling, unless your belief is that only corporations should have freedom.



No. This has nothing to do with warranty or contracts.

i would agree that this does allow for more consumer freedom (great!), but err, doesn't this new law make it illegal for apple to deny service (aka warranty) to jailbroken phones (re-read the article)? in that case, the government IS meddling with private business and its ability to market and sell a product under its own policies.

one of apples prime selling points is that the product is built from the ground up, software to hardware, and is therefore less likely than a competitors product to be susceptible to third party corruptions (viruses etc.). if apple is required to continue its warranty/service policies under this new law, then this law completely undermines that selling point.
 
The most important sentence.

"The decision to allow the practice commonly known as "jailbreaking" is one of a handful of new exemptions from a federal law that prohibits the circumvention of technical measures that control access to copyrighted works."

The practice is exempt from federal law. Finding holes to insert code is akin to breaking DRM, it's circumventing protection methods. Now they don't view it as a infringement of copyright to jailbreak. Nothing more.
 
You understand incorrectly. Jailbreaking still voids the warranty. Apple is not forced to service the phone (other than as various other consumer protection laws apply, as has always been the case).

All this law means is that you can't go to jail or be fined under the DMCA for jailbreaking. It doesn't mean your license agreement with apple is void or that copyright law that prevents copying or derivative works suddenly doesn't apply.

So you're saying this law makes jalbreaking legal, yet Apple can still claim it voids the warranty? That doesn't make any sense. It should not void any warranty other than servicing the software side of the phone. It should not prevent customers from getting service for physical defects/issues if they jailbreak the phone.
 
so im a little slow what does this exactly get us the users, they cant put us in jail im pretty sure that never happens any way plus the only thing they would put us in jail for would be piracy and thats already illegal. so what does this new vote get us
 
Please read the entire law...

B.Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
The Electronic Frontier Foundation (EFF) proposed a class that would allow circumvention of the technological measures contained on certain wireless phone handsets (known as smartphones) that prevent thirdparty software applications from being installed and run on such phones. This circumvention activity is colloquially referred to as jailbreaking a phone.

The factual record with respect to this proposed class focused primarily on Apple’s iPhone, although there are allegations in the record involving other mobile phone manufacturers as well. EFF asserted, and Apple’s testimony confirmed, that any software or application to be used on the iPhone must be validated with the firmware that controls the iPhone’s operation. This validation process is intended to make it impossible for an owner of an iPhone to install and use thirdparty applications on the iPhone that have not been approved for distribution through Apple’s iTunes App Store.
EFF argued that jailbreaking is a noninfringing activity for three reasons. First, it alleged that at least in some cases, jailbreaking can be done within the scope of what is authorized under the license Apple grants to every iPhone user. It stated that [t]o the extent a jailbreaking technique does not modify any of the individual software programs that comprise the iPhone firmware collection, but instead simply adds additional software components to the collection, the practice may not exceed the scope of the license to `use the iPhone software’ or constitute a `modification’ of any Apple
software components, any more than the addition of a new printer driver to a computer constitutes a `modification’ of the operating system already installed on the computer.
Second, EFF asserted that to the extent a jailbreak technique requires the reproduction or adaptation of existing firmware beyond the scope of any license or other authorization by the copyright owner, it would fall within the ambit of 17 U.S.C. 1l7(a). EFF contended that the iPhone owner is also the owner of the copy of the firmware on the iPhone and that jailbreaking falls within the owner’s privilege to adapt those copies to add new capabilities, so long as the changes do not harm the interests of the copyright proprietor.
Finally, EFF contended that in any event, jailbreaking constitutes fair use of the firmware because jailbreaking is a purely noncommercial, private use of computer software, a largely functional work that operates the phone, and that the phone owner must reuse the vast majority of the original firmware in order for the phone to operate. Because the phone owner is simply modifying the firmware for her own use on the phone, there is no harm to the market for the firmware.
Apple responded that jailbreaking by purchasers of the iPhone is a violation of the prohibition against circumvention of access controls. It stated that its validation system is necessary to protect consumers and Apple from harm. Apple further contended that modifying Apple’s operating system constituted the creation of an infringing derivative work. Specifically, Apple argued that because purchasers of an iPhone are licensees, not owners, of the computer programs contained on the iPhone, Section 117 of the Copyright Act is inapplicable as an exemption to the adaptation right. Apple further argued that the fair use defense codified in 107 would not apply to jailbreaking activity under the statutory factors.
Based on the record, the Register has determined that the encryption and authentication processes on the iPhone’s computer programs are technological measures that control access to the copyrighted work (the firmware) for purposes of 1201(a)(1). Moreover, the Register finds that the evidence supports the contention that a technological protection measure is adversely affecting adding applications to the iPhone. The critical question is whether jailbreaking an iPhone in order to add applications to the phone constitutes a noninfringing use.
The Register does not find that the contract between Apple and purchasers of the iPhone authorize modification of the iPhone. Moreover, the Register cannot clearly determine whether the various versions of the iPhone contracts with consumers constituted a sale or license of a copy of the computer programs contained on the iPhone. The contractual language is unclear with respect to particular copies of the computer programs. Although Apple retains ownership of the computer programs, the contracts also expressly grant users ownership of the device. Since the copy of the computer program is fixed in hardware of the device, it is unclear what ownership status is to be given to the particular copy of the computer program contained in the device. Apple unquestionably has retained ownership of the intangible works, but the ownership of the particular copies of those works is unclear.
Moreover, the state of the law with respect to the determination of ownership is in a state of flux in the courts. Both proponents and opponents cited case law in support of their respective positions, but the Register finds it impossible to determine how a court would resolve the issue of ownership on the facts
presented here. While both parties agreed that the Second Circuit’s decision in Krause v. Titleserv, 402 F.3d 119 (2d Cir. 2005) is good law, that case dealt with a situation that is distinguishable in many respects from the present situation. The Register finds that the Krause case does not provide clear guidance as to how resolve the current issue.
However, the Register does find that the proponent’s fair use argument is compelling and consistent with the congressional interest in interoperability. The four fair use factors tend to weigh in favor of a finding of fair use.
Under the first factor in Section 107, it appears fair to say that the purpose and character of the modification of the operating system is to engage in a private, noncommercial use intended to add functionality to a device owned by the person making the modification, albeit beyond what Apple has determined to be acceptable. The user is not engaging in any commercial exploitation of the firmware, at least not when the jailbreaking is done for the user’s own private use of the device.
The fact that the person engaging in jailbreaking is doing so in order to use Apple’s firmware on the device that it was designed to operate, which the jailbreaking user owns, and to use it for precisely the purpose for which it was designed (but for the fact that it has been modified to run applications not approved by Apple) favors a finding that the purpose and character of the use is innocuous at worst and beneficial at best. Apple’s objections to the installation and use of unapproved applications appears to have nothing to do with its interests as the owner of copyrights in the computer programs embodied in the iPhone, and running the unapproved applications has no adverse effect on those interests. Rather, Apple’s objections relate to its interests as a manufacturer and distributor of a device, the iPhone.
Moreover, Congress has determined that reverse engineering for the purpose of making computer programs interoperable is desirable when certain conditions are met, and has crafted a specific exemption from Section 1201(a)’s prohibition on circumvention in such cases. While an iPhone owner who jailbreaks does not fall within the four corners of the statutory exemption in Section 1201(f), the fact that he or she is engaging in jailbreaking in order to make the iPhone’s firmware interoperable with an application specially created for the iPhone suggests that the purpose and character of the use are favored.
Turning to the second fair use factor, it is customary for operating systems functional works to enable third party programs to interoperate with them. It does not and should not infringe any of the exclusive rights of the copyright owner to run an application program on a computer over the objections of the owner of the copyright in the computer’s operating system. Thus, if Apple sought to restrict the computer programs that could be run on its computers, there would be no basis for copyright law to assist Apple in protecting its restrictive business model. The second factor decisively favors a finding of fair use.
Turning to the third factor, the amount and substantiality of the portion used in relation to the copyrighted work as a whole, EFF admitted that because the Apple firmware is necessary in order to operate the iPhone, it is necessary for individuals who jailbreak their phones to reuse the vast majority of the original firmware. However, the amount of the copyrighted work modified in a typical jailbreaking scenario is fewer than 50 bytes of code out of more than 8 million bytes, or approximately 1/160,000 of the copyrighted work as a whole. Where the alleged infringement consists of the making of an unauthorized
derivative work, and the only modifications are so de minimis, the fact that iPhone users are using almost the entire iPhone firmware for the purpose for which it was provided to them by Apple undermines the significance of this factor. While the third factor arguably disfavors a fair use finding, the weight to be given to it under the circumstances is slight.
Addressing the fourth factor, the effect of the use upon the potential market for or value of the copyrighted work, EFF asserted that the firmware has no independent economic value, pointing out that the iPhone firmware is not sold separately, but is simply included when one purchases an iPhone. EFF also argued that the ability to lawfully jailbreak a phone will increase, not decrease, overall sales of the phones because users will know that by jailbreaking, they can take advantage of a wider array of third party applications.
Apple responded that unauthorized uses diminish the value of the copyrighted works to Apple. However, Apple is not concerned that the practice of jailbreaking will displace sales of its firmware or of iPhones; indeed, since one cannot engage in that practice unless one has acquired an iPhone, it would be difficult to make that argument. Rather, the harm that Apple fears is harm to its reputation. Apple is concerned that jailbreaking will breach the integrity of the iPhone’s ecosystem. The Register concludes that such alleged adverse effects are not in the nature of the harm that the fourth fair use factor is intended to address.
NTIA does not support designating the proposed class. While acknowledging that permitting iPhone jailbreaking could facilitate innovation, better serve customers, and encourage the market to utilize open platforms, NTIA believes it might just as likely deter innovation by not allowing the developer to recoup its development costs and to be rewarded for its innovation. NTIA also believes that the proponents’ public policy arguments should properly be considered by expert regulatory agencies, the Department of Justice, and the Congress. It concludes that the Register ought only to consider recommending the proposed class if she concludes that the access control measure would be a bar to actions that the above bodies might take in response to policy judgments made at those agencies.
The Register appreciates that many regulatory and policy issues pertaining to jailbreaking and smartphones fall within the competence of other agencies, and the Register has no desire to interfere with those agencies’ jurisdiction. However, the only question before the Register and the Librarian is whether Section 1201(a)(1)’s prohibition on circumvention is adversely affecting the ability of users of smartphones from engaging in noninfringing uses of the firmware on their devices. No other agency has the power to limit the application of the prohibition on circumvention in this (or any other) context. Any future action by a federal agency to permit jailbreaking will be futile without an exemption from liability under Section 1201(a)(1), but if a class is not designated in this rulemaking, all that it will mean is that Section 1201 cannot be used to prevent jailbreaking, without prejudice to any other legal or regulatory authority that might limit or prohibit jailbreaking.
On balance, the Register concludes that when one jailbreaks a smartphone in order to make the operating system on that phone interoperable with an independently created application that has not been approved by the maker of the smartphone or the maker of its operating system, the modifications that are made purely for the purpose of such interoperability are fair uses. Case law and Congressional enactments reflect a judgment that interoperability is favored. The Register also finds that designating a class of works that would permit
jailbreaking for purposes of interoperability will not adversely affect the market for or value of the copyrighted works to the copyright owner.
Accordingly, the Register recommends that the Librarian designate the following class of works:
<Q P="04"/> <EXTRACT><FP2-2>Computer programs that enable wireless communication handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.</FP2-2> </EXTRACT> C.Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
In 2006, the Librarian designated a class of Computer programs in the form of firmware that enable wireless telephone handsets to connect to a wireless telephone communication network, when circumvention is accomplished for the sole purpose of lawfully connecting to a wireless telephone communication network, in order to permit the circumvention of access controls that prevent the owner of a cellphone from switching service on that cellphone to another wireless communication network. The access controls in question are embedded in
mobile phone’s firmware or software and prevent the mobile phone from gaining access to the settings that connect the mobile phone to a (e.g., Verizon’s) other than the original network (e.g., AT&T’s). Beneficiaries of that designation have now requested that the Librarian again designate a similar class of works. Representatives of wireless communication networks have opposed the request.
As she did three years ago, the Register recognizes that the requests fall within the zone of interest subject to this rulemaking. That is, circumventing a mobile phone lock, without the authority of the copyright owner, to gain access to the protected work (i.e., the firmware) is likely actionable under Section 1201(a)(1) of the Act. Further, a wireless carrier who is harmed by the circumvention of the software lock may bring an action for violation of Section 1201(a)(1) against anyone who circumvents such a technological protection measure.
The proponents of this class have presented a prima facie case that the prohibition on circumvention has had an adverse effect on noninfringing uses of firmware on wireless telephone handsets. Proponents have shown that mobile phone locks prevent consumers from legally accessing alternative wireless networks with the phone of their choice. This is the same type of activity that was at issue when the existing class of works was being considered in 2006.
The wireless networks asserted that by using a cellphone on another network, an act that is not authorized under their contracts, the customers infringe the exclusive right to reproduce copies of the computer software, because use of the mobile phones necessarily involves the making of copies in the random access memory of the mobile phone. Moreover, they asserted that the alteration of the computer programs in order enable the mobile phones to connect to another network constituted the unlawful making of derivative works, in violation of the copyright owner’s exclusive right to prepare derivative works.
the owner network
Proponents of the class asserted that the owners of mobile phones are also the owners of the copies of the computer programs on those phones and that as owners they are entitled to exercise their privileges under Section 117 of the Copyright Act, which gives the owner of a copy of a computer program the privilege to make or authorize the making of another copy or adaptation of that computer program under certain circumstances. The wireless networks responded that their contracts with their customers restrict the uses of the customers’ mobile phones and retain ownership of the copies of the computer programs that are loaded onto the mobile phones and enable the phones to operate. They also asserted those contractual restrictions make the networks and not the customers the owners of the copies of the computer programs, and therefore the privilege under Section 117 to make copies and adaptations of computer programs does not apply because that privilege is enjoyed only by the owner of the copy of the computer program. They also argued that the privilege does not extend to the customers’ conduct because the making of a new copy or adaptation in order to use the mobile phone on a network other than the original network is not, as the statute requires, an essential step in the utilization of the computer program in conjunction with a machine.
The Register has reviewed the appropriate case law with respect to who is the owner of a copy of a computer program for purposes of Section 117 when a license or agreement imposes restrictions on the use of the computer program and has concluded that the state of the law is unclear. The Register cannot determine whether most mobile phone owners are also the owners of the copies of the computer programs on their mobile phones. However, based on the record in this proceeding, the Register finds that the proponents of the class have made a prima facie case that mobile phone owners are the owners of those copies. While the wireless networks have made a case that many mobile phone owners may not own the computer program copies because the wireless network’s contract with the consumer retains ownership of the copies, they have not presented evidence that this is always the case even if their interpretation of the law governing ownership is correct. The record therefore leads to the conclusion that a substantial portion of mobile phone owners also own the copies of the software on their phones.
 
IF TRUE this is more noteworthy than allowing jailbreaking.

This would only be relevant if it means apple can't lock it anymore with a software update. Does anyone know for sure if apple will still be able to lock it?
 
The Register also concludes that when the owner of a mobile makes RAM copies of the software in order to operate the phone even if she is operating it on another network she is making a noninfringing use of the software under Section 117 because the making of that copy is an essential step in the utilization of that software in conjunction with a machine.
Similarly, the making of modifications in the computer program in order to enable the mobile phone to operate on another network would be a noninfringing act under Section 117. As a general rule, anyone who wishes to switch her mobile phone from one network to another must alter some information embedded in the device. However, in a substantial number of cases those alterations do not appear to implicate Section 117 because the elimination and insertion of codes or digits, or completely reflashing a phone, cannot be considered an infringement of the computer program controlling the device. When specific codes or digits are altered to identify the new network to which the phone will connect, those minor alterations of data also do not implicate any of the exclusive rights of copyright owners. And complete reflashing does not even constitute circumvention of an access control because it actually deletes the copy of the entire work that had been protected by the access control, thereby permanently denying access to that work.
In those cases where more substantial changes must be made to the computer program in order to enable use of the mobile phone on another network, those changes might implicate the exclusive right to prepare derivative works. However, those changes would be privileged under Section 117, which permits the making of a new copy or adaptation that is created as an essential step in the utilization of the computer program in conjunction with a machine.

Section 1201(a)(1)(C) factors. As was the case in 2006, the Register finds that the four factors enumerated in Section 1201(a)(1)(C)(i)(iv) do not weigh either in favor of or against designation of the proposed class of works. Moreover, because it appears that the opposition to designating the proposed class is based primarily on the desires of wireless carriers to preserve an existing business model that has little if anything to do with protecting works of authorship, it is appropriate to address the additional factor (such other factors as the Librarian considers appropriate) set forth in Section 1201(a)(1)(C)(v). It seems clear that the primary purpose of the locks is to keep consumers bound to their existing networks, rather than to protect the rights of copyright owners in their capacity as copyright owners. This observation is not a criticism of the mobile phone industry’s business plans and practices, which may well be justified for reasons having nothing to do with copyright law and policy, but simply a recognition of existing circumstances. Because there appear to be no copyrightbased reasons why circumvention under these circumstances should not be permitted, the Register recommends that the Librarian designate a class of works similar to the class designated in 2006.
The Register notes that the 2006 class, and the new one designated herein, are both narrow, apply only to claims under Section 1201(a)(1), and do not establish a general federal policy of ensuring that customers have the freedom to switch wireless communications service providers. The designated classes, both new and old, simply reflect a conclusion that unlocking a mobile phone to be used on another wireless network does not ordinarily constitute copyright infringement and that Section 1201(a)(1), a statute intended to protect copyright interests, should not be used to prevent mobile phone owners from engaging in such noninfringing activity.
NTIA supported designation of a class similar to the class designated in 2006, but proposed that while nonprofit entities should be permitted to take advantage of the exemption, commercial users should not. The Register’s recommendation, in contrast, would permit some commercial activity, so long as it (1) involves only used handsets, (2) is done by the owner of the copy of the computer program, and (3) is done solely in order to access such a wireless telecommunications network and access to the network is authorized by the operator of the network. The Register believes that these limitations ensure that the designation of this class will not benefit those who engage in the type of commercial activity that is at the heart of the objections of opponents of the proposed class: the bulk resellers who purchase new mobile phone handsets at subsidized prices and, without actually using them on the networks of the carriers who market those handsets, resell them for profit. The type of commercial activity that would be permitted would be the resale of used handsets after the owners of the handsets have used them and then given or sold them to somebody else, who then resells them just as a used bookstore sells used books. The Register acknowledges that NTIA’s general view that the class should not extend to any commercial activity is inconsistent with aspects of the Register’s recommendation, but believes that to the extent her recommendation goes beyond what NTIA was willing to endorse, it does so in a way that, in NTIA’s words, prevents unlawful use by those that would misuse the exemption for commercial purposes.
However, the applicability of the proposed class to commercial recyclers, such
as the ones who had proposed the original class of works, is limited. commercial recycler has made a derivative work that is within Section 117’s privilege for making adaptations, the recycler is subject significant limitation contained within Section 117: such adaptations transferred only with the authorization of the copyright owner. Thus, who prepares such an adaptation may not transfer ownership of the copy of the adapted computer program to anybody else without the authorization of the copyright owner. On the other hand, a recycler who has not prepared an adaptation is free to resell the mobile phone along with the copy of the computer program contained within it.
When the
The new class is also cabined by existing law in two important respects. First, as with any regulation under Section 1201(a)(1)(C) and (D), the designation of this class offers no safe harbor from liability under Section 1201(a)(2) which strictly prohibits an entity from offering a circumvention service. Second, a wireless carrier’s Terms of Purchase and Terms of Service, which are binding contracts, still impose use restrictions on consumers notwithstanding the designation of this class. However, the wireless carrier must seek a remedy by asserting a claim of breach of contract, and not a claim under Section 1201(a)(1).
D.Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
&sbull;The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
&sbull;The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.
Professor J. Alex Halderman proposed two classes of works relating to investigating and correcting security flaws or vulnerabilities created or exploited by technological measures protecting certain kinds of works. The Register concludes that Halderman has made the case for a class pertaining to video games, but has not made the case for a broader class pertaining to literary works, sound recordings and audiovisual works.
In each case, Halderman qualified the scope of the proposed class by restricting it to (1) lawfully obtained works protected by access control measures that create or exploit security flaws or vulnerabilities that compromise the security of personal computers, and (2) cases where circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities.
In the current proceeding, Halderman did not present any evidence that the prohibition on circumvention is adversely affecting or is likely, in the next three years, to adversely affect the ability to engage in noninfringing uses of sound recordings or audiovisual works, or of literary works except to the extent that video games may be considered, in part, to constitute audiovisual works associated with such sound recordings. There is no information in the record that would justify again exempting the class designated three years ago.
to a may be a recycler
However, Halderman did present evidence and legal analysis in support of a class of works limited to video games. Under Section 102(a) of the Copyright Act, video games are hybrid in that they fall within two statutory classes of works. Video games typically are, in part, computer programs, which are a subset of the statutory category of literary works. The evidence related to two types of access controls applied to video games: Macrovision’s SafeDisc software and Sony’s SecuRom software. Halderman asserted that the measures constitute access controls because, in both cases, the measures authenticate discs and enforce access policies.
The alleged underlying noninfringing use involved is twofold. First, purchasers of video games (including researchers) are engaged in noninfringing use when they install, access, and play authorized copies of such video games while further seeking to protect the security of their computers. Second, researchers in lawful possession of copies of games are engaged in noninfringing uses when they seek solely to research and investigate whether a video game, or the technological measure protecting it, creates security vulnerabilities or flaws. Professor Halderman asserted that such good faith research that does not cause or promote infringement generally constitutes fair use.
Halderman alleged that SecuROM may create security flaws or vulnerabilities. He referred to a number of articles and class action lawsuits suggesting that SecuROM may contain flaws or cause vulnerabilities. He further stated that a single definitive scientific study might quell the panic, protests, and litigation to what may turn out to be nonexistent or easily reparable faults.
Halderman also alleged that harm is caused by Macrovision’s SafeDisc. He alleged that SafeDisc was preinstalled on nearly every copy of the Microsoft Windows XP and Windows 2003 operating systems, [and that] the vulnerability affected nearly one billion PCs, two thousand times more than the [Sony] rootkit, the security vulnerability that serviced as the factual basis for designating a class in the last rulemaking. He claimed that the security flaw created by SafeDisc was much more dangerous than the Sony rootkit flaw involved in the previous rulemaking that concluded in 2006, because this flaw allowed attackers to execute unrestricted `kernellevel’ code and read or write to any area of the hard disk or memory of the PC, thus facilitating the complete compromise of the security of the PC.
Opponents raised three principal arguments against Halderman’s proposal. First, they argued that he provided little concrete or documented evidence that any security flaws or vulnerabilities associated with access control mechanisms used in connection with video games exist. Second, they argued that there is no evidence that research has been chilled, pointing to what they called a robust ecosystem within which security experts routinely identify such flaws, collaborate on remedies, and disseminate information to alert computer users of the problems and them to solutions. Third, they argued that Professor Halderman failed to establish that the conduct at issue is prohibited by Section 1201(a)(1), since a statutory exemption (in particular, 17 U.S.C. 1201(j) might apply to the security research.
NTIA has advised the Register that he believes the record supports designating the requested class relating to video games and other works accessible on personal computers. NTIA believed that the proponents have persuasively argued that without a research exemption, research into all current and future vulnerabilities will be and is chilled now, and concurred with the Librarian’s conclusion in 2006 that the research may not be covered
completely by the existing statutory exemptions. NTIA further believes that although the Sony Rootkit vulnerability no longer exists, it seems to be a certainty that new vulnerabilities will emerge in the next three years.
Overall, the Register has concluded that the factors set forth in 17 U.S.C. 107 tend to strongly support a finding that such good faith research constitutes fair use. The socially productive purpose of investigating computer security and informing the public do not involve use of the creative aspects of the work and are unlikely to have an adverse effect on the market for or value of the copyrighted work itself. The proponents established an underlying noninfringing use.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.