研究生: |
洪吉亮 Ji-Liang Hong |
---|---|
論文名稱: |
著作權法上科技保護措施之研究 A Study on the Technological Protection Measures of Copyright Law |
指導教授: |
陳曉慧
Hsiao-Huo Chen |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
科技管理學院 - 科技法律研究所 Institute of Law for Science and Technology |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 中文 |
論文頁數: | 146 |
中文關鍵詞: | 科技保護措施 、防盜拷措施 、電腦程式 |
外文關鍵詞: | technological protection measure, copyguard measure, computer program |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
「世界智慧財產權組織(WORLD INTELLECTUAL PROPERTY ORGANIZATION)」於1996年通過「世界智慧財產權組織著作權條約(WIPO COPYRIGHT TREATY)」,其中第11條即要求各締約國訂適當的法律保護和有效的法律救濟方式,對抗對於科技保護措施之規避行為。為履行WIPO之著作權條約之義務,各國陸續於其國內法新增有關於科技保護措施之規定,台灣亦於2004年通過新修正之著作權法,並稱之為「防盜拷措施」。我國仿效美國之立法模式包含該措施之定義、反規避條款與反流通條款,但如此的規定卻衝擊到原有為符合公共利益、維護教育學術文化發展、保障知覺障礙者、保存檔案……等理由所劃出的著作權限制。尤其對於電腦程式,更是衝擊到原本維持軟體相容性,及保障使用者正常操作電腦的利益等重大公共政策。本文經由分析科技保護措施之技術、立法史、定義、法律保護與例外,和電腦程式著作原有之保護與限制,探討若以電腦程式著作作為科技保護措施,於新法下將產生的規範落差,該落差將對公共利益產生何種影響,並提出建議改進的方向,希望此能化解權利人與使用人間的對立,促進公共利益。
"WIPO"(World Intellectual Property Organization) in 1996 approved the "WCT"(WIPO Copyright Treaty. Article 11 of the WCT requires that contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures. To fulfill the WIPO Copyright Treaty's obligations, States continue its domestic law on the new technological protection measures. Taiwan is also adoption of the new amended Copyright Law in the 2004, and denominates "Copy-Guard Measures". Taiwan follows the United States legislation model including definitions of the measures, the anti-circumvention provisions and the anti-trafficking provisions. Nevertheless, such provisions had impacted the original copyright restrictions which enacted for consistent with the public interest, maintaining education, academic and cultural development, protection of visual or hearing Impairments, archivists and etc. Especially for the computer program, the provisions had a major impact on original public policies that maintain the interoperability between computer software and protect computer users performing the regular operation. Through analysis of technologies, international legislative history, definitions, legal protection and exceptions of technological protection measures, and analysis of protections and exceptions of computer program works, this thesis will explore the normative gap under the new law if we take a computer program works as a technology protection measures. This thesis will also explain the gap has what effect on the public interest with lawmaking suggestion. To resolve the conflicts between rightholders and users and to improve public interest is ultimate goal of this study.
中文文獻
書籍
羅明通,「著作權法論Ⅰ、Ⅱ」,三民書局,2005年6版。
陳家駿,「著作權科技保護措施之研究-研究報告」,經濟部智慧財產局委託研究專案, 2004年。
蕭雄淋,「著作權法論」,五南,2005年3版。
期刊論文
劉孔中,著作權法有關技術保護措施規定之研究,月旦法學雜誌第119期,2005年。
章忠信,著作權法「防盜拷措施」條款例外規定要點之檢討,交大科技法學評論,第三卷第二期,2006年。
蕭宏宜,防盜考措施與刑法保護,月旦法學雜誌第133期,2006年。
陳淑美,新修正著作權法簡介兼論暫時性重製及科技保護措施,科技法律透析第16卷第8期,2004年。
馮震宇,數位內容之保護與科技保護措施,月旦法學雜誌第105期,2004年。
學位論文
吳俊幟,論科技保護措施與反規避條款-以美國DMCA為核心,國立清華大學科技法律研究所碩士論文,2003年。
新聞報導
Lisa M. Bowman,美大學將公布防盜錄技術破解法 娛樂界大為緊張,CNET NEWS,2001年4月24日,http://taiwan.cnet.com/news/software/0,2000064574,20003843,00.htm
Ina Fried,陳智文譯,駭客破解蘋果、微軟音樂保護碼,CNET NEWS,2006年9月4日, http://taiwan.cnet.com/news/software/0,2000064574,20109286,00.htm
網路資源
Taiwan CNET.com,字彙寶典,http://www.taiwan.cnet.com/enterprise/glossary/
Microsoft 產品啟用說明,http://support.microsoft.com/kb/302806/zh-tw
艾迴音樂官方網站聲明,http://www.avex.com.tw/3rd/cccd/
外文文獻
期刊論文
A.H. Rajani, Davidson & Associates v. Jung: (Re)interpreting Access Controls, 21 Berktlj 365 (2006).
David Brett Kinitsky, Software Copyright Law and The Digital Millennium Copyright Act under The Microscope: Blizzard v. BnetD as The Lens, 24 Cdzaelj 367 (2006).
Dean L. Franklin & Timothy D. Krieger, Liability of Computer Maintenance Providers under Copyright Law: Storage Tech. Corp. v. Custom Hardware Eng'g & Consulting, Inc., 22 Scchitlj 819 (2006).
John. R. Perkins, Curbing copyright infringement in cyberspace: Using MediaKey to stop the bleeding., 21 Jmarjcil 325 (2003).
Pamela Samuelson, Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to be Revised, 14 Berktlj 519 (1999).
Richard Li-Dar Wang, DMCA Anti-Circumvention Provisions In A Different Light: Perspectives From Transnational Observation Of Five Jurisdictions, 34 Aiplaqj 217 (2006).
判決
Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772 (5th Cir. 1999).
Atari Games Corp. v. Nintendo of America Inc.,975 F.2d 832 (Fed.Cir.1992).
Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 (Fed. Cir. 2004).
Davidson & Associates v. Jung, 422 F.3d 630 (8th Cir. 2005).
Lasercomb America, Inc. v. Reynolds, 911 F.2d 970 (4th Cir. 1990).
Lewis Gallob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965 (9th Cir. 1992).
Lexmark v. Static Control, 253 F.Supp.2d 943 (E.D. Ky. 2003).
Pearl v. Standard I/O, 257 F.Supp.2d 326 (D. Me. 2003).
Practice Mgmt. Info. Corp. v. Am. Med. Ass'n, 121 F.3d 516 (9th Cir. 1997).
Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th Cir.1992).
Sony Computer Entertainment, Inc. v. Connectix Corporation, 203 F.3d 596 (9th Cir. 2000).
Storage Tech. Corp. v. Custom Hardware Eng'g & Consulting, Inc., 421 F.3d 1307 (Fed. Cir. 2005).
Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 308 (S.D.N.Y. 2000).
United States v. Elcom Ltd., 203 F. Supp. 2d 1111 (N.D. Cal. 2002).
Vault Corp. v. Quaid Software, Ltd., 847 F.2d 255 (5th Cir. 1988).
新聞報導
Andrew Kantor, Sony: The rootkit of all evil?, USA Today, Nov. 17, 2005, http://www.usatoday.com/tech/columnist/andrewkantor/2005-11-17-sony-rootkit_x.htm(last visited July 4, 2007).
Declan McCullagh, Security Warning Draws DMCA Threat, CNET News, July 30, 2002, http://news.com.com/2100-1023-947325.html(last visited July 4, 2007).
Greg Sandoval, Sony BMG settles rootkit case with 39 states, CNET News, December 21, 2006, http://news.com.com/2100-1027_3-6145714.html(last visited July 4, 2007).
John Borland, Court Blocks Security Conference Talk, CNET News, April 14, 2003, http://news.com.com/2100-1028-996836.html(last visited July 4, 2007).
Rick Merritt, Cellphone could crack RFID tags, says cryptographer, EE Times, February 14 2006, http://www.eetimes.com/news/semi/showArticle.jhtml?articleID=180201688 (last visited July 4, 2007).
Tim O'Reilly, What Is Web 2.0 -- Design Patterns and Business Models for the Next Generation of Software, O'Reilly Net News, September 30 2005, http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
Tom Krazit et al., Finally, Apple answers call for iPhone, Cnet News, January 9, 2007, http://news.com.com/Finally%2C%20Apple%20answers%20call%20for%20iPhone/2100-1041_3-6148392.html(last visited July 4, 2007).
立法資料
Information Infrastructure Task Force, Intellectual Property And The National Information Infrastructure: The Report Of The Working Group On Intellectual Property Rights (15 November 1995).
Digital Millennium Copyright Act, Pub.L. No, 105-304, Title I, §103(a), 112 Stat. 2863 (1998).
Proposal for a European Parliament and Council Directive on the harmonization of certain aspects of copyright and related rights in the Information Society, OJ C 108, 7.4.1998, p.180.
Proposal for a European Parliament and Council Directive on the harmonisation of certain aspects of copyright and related rights in the Information Society, OJ C 15, 28.5.1999, p.181.
'with a view to adopting Directive 2000/.../EC of the European Parliament and of the Council of ...on the harmonisation of certain aspects of copyright and related rights in the information society', OJ C 344, 1.12.2000, p.19.
World Intellectual Property Organization(WIPO), Diplomatic Conference On Certain Copyright And Neighboring Rights Questions(CRNR/DC), Geneva, December 2 to 20, 1996.
日本著作□審議□сюХфЫュヤ小委員□③みワ⑦ヲ□ヲюみк(技術的保護□管理□係)中間ネシバ(平成10年2月20日)。
日本著作□審議□сюХфЫュヤ小委員□③みワ⑦ヲ□ヲюみк(技術的保護□管理□係)報告書(平成10年12月10日)。
日本□議院、第145回□□、文教委員□第12□□議□(平成11年6月10日)。
日本□議院、第145回□□、文教委員□第13□□議□(平成11年6月10日)。
日本□議院、第145回□□、本□議第38□□議□(平成11年6月15日)。
網路資源
Electronic Frontier Foundation (EFF), Sony BMG Litigation Info, http://www.eff.org/IP/DRM/Sony-BMG/
Electronic Frontier Foundation (EFF) , Unintended Consequences: Seven Years under the DMCA, version 4, 1, April, 2006, http://www.eff.org/IP/DMCA/unintended_consequences.php
FOLDOC, http://foldoc.doc.ic.ac.uk/foldoc/
Lawrence Lessig, Adobe in Wonderland, (Mar 19 200), http://www.lessig.org/content/standard/0,1902,22914,00.htm
Microsoft, PlayForSure FAQ, http://www.playsforsure.com/FAQs.aspx
SONY & BMG CDTech Settlement, http://www.sonybmgcdtechsettlement.com/
Wikimedia Foundation Inc., Wikipedia, http://en.wikipedia.org/