In addition to the safe harbors and exemptions the statute explicitly provides, 17 U.S.C. 1201(a)(1) requires that the
Librarian of Congress issue exemptions from the prohibition against circumvention of access-control technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-infringing uses of copyrighted works. The exemption rules are revised every three years. Exemption proposals are submitted by the public to the Register of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Register and issued by the Librarian. Exemptions expire after three years and must be resubmitted for the next rulemaking cycle.
Previous exemptions The Copyright Office approved two exemptions in 2000 and approved the following numbers of exemptions and renewals of previous exemptions for the rest of the years: four in 2003, six in 2006, five in 2010, five in 2012, ten in 2015, eighteen in 2018, twenty-six in 2021, and twenty in 2024.
2000 rulemaking In 2000, the first rulemaking, the Office exempted: • "Compilations consisting of lists of websites blocked by filtering software applications" (renewed in 2003 but not renewed in 2006); and • "Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness." (revised and limited in 2003 and again in 2006).
2003 rulemaking In 2003, the Office made the following rules: • The 2000 filtering exemption was revised and renewed. • The 2000 "literary works including computer programs" exemption was limited to "Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete" and this exemption was renewed in both 2006 and 2010. • A new exemption was implemented for
electronic books for which technological protection measures prevented the use of read-aloud software or screen readers. This exemption was renewed in 2006, 2010, 2012, and 2015. • A new exemption was made for "Computer programs and video games distributed in formats that have become obsolete and which require the original media or hardware as a condition of access." This exemption was renewed in 2006 but not in 2010.
2006 rulemaking In 2006, the Office made the following rules: • The 2003 exemption on obsolete computer programs and video games was renewed. • The 2003 exemption on computer programs protected by dongles was renewed. • The 2003 exemption on electronic books was renewed. • A new exemption was made for sound recordings allowed after security flaws were found in
a copy protection system on some
Sony CDs; this was not renewed in 2010. • A new exemption was implemented covering the audiovisual works included in the educational library of a college or university's film or media studies department; this was not renewed in 2010. • A new exemption was implemented allowing circumvention to allow wireless telephone handsets to connect to wireless networks. This exemption was revised in 2010 to specify used handsets and require authorization from the wireless network operator. Another exemption for wireless handsets was introduced in 2010 specific to interoperability software on the phone itself.
2010 rulemaking Rulemaking was scheduled to occur in 2009, but the final rule was not issued until the following year. The 2010 exemptions, issued in July 2010, are: • Motion pictures on
DVDs that are lawfully made and acquired and that are protected by the
Content Scramble System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: • Educational uses by college and university professors and by college and university film and media studies students; • Documentary filmmaking; • Obsolete software and video game formats. • Noncommercial videos. (A new exemption in 2010, similar to a previous educational exemption.) • Computer programs that enable
wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (A new exemption in 2010.) • Computer programs, in the form of
firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (Revised from a similar exemption approved in 2006.) • Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: • The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and • The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. (A new exemption in 2010.) • Computer programs protected by
dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. (A renewed exemption from 2006, based on a similar exemption approved in 2003.)
2012 rulemaking The 2012 exemptions, issued in November 2012, are for: • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies • Computer programs that enable smartphones and portable all-purpose mobile computing devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device • Computer programs that enable certain types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances • Motion pictures and other audiovisual works on DVDs that are protected by the Content Scrambling System, or that are distributed by an online service and protected by technological measures that control access to such works, where circumvention is related to developing captioning and descriptive audio technologies
2015 rulemaking The 2015 exemptions, issued in October 2015, are for: • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances; • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies; • Computer programs that enable certain types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network; • Computer programs that enable smartphones and portable all-purpose mobile computing devices to execute lawfully obtained software applications when circumvention is accomplished only in order to enable the interoperability of such applications with computer programs on the smartphone or device, or to permit removal of software from the smartphone or device; • Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television; • Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function; • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law; • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay; • Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files or proprietary data; and • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, where such circumvention is undertaken by a patient for the sole purpose of lawfully accessing the data generated by his or her own device or monitoring system.
2018 rulemaking The 2018 exemptions, issued in October 2018, are for: • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, or to accommodate for
accessibility for disabled students in educational institutions; • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies; • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device; • Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network; • Computer programs that enable smartphones, tablets and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device; • Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television; • Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device; • Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function; • Computer programs that are contained in and control the functioning of a lawfully acquired smartphone or home appliance or home system when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system; • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law, • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay; • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, that do not require access to an external computer server for gameplay, and that are no longer reasonably available in the commercial marketplace, solely for the purpose of preservation of the game in a playable form by an eligible library, archives, or museum; • Computer programs used to operate video game consoles solely to the extent necessary for an eligible library, archives, or museum to engage in the preservation activities for the video game exceptions above; • Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum; and • Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files, or proprietary data.
2021 rulemaking The 2021 exemptions, issued in October 2021, are for: • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, to accommodate for
accessibility for disabled students in educational institutions, for preservation of the motion picture by a library, archive, or museum, or for research purposes at educational institutions; • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies, or for research purposes at educational institutions; • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device; • Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network; • Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device; • Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television; • Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device; • Computer programs that enable routers and dedicated network devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the router or dedicated network device, and is not accomplished for the purpose of gaining unauthorized access to other copyrighted works; • Computer programs that are contained in and control the functioning of a lawfully acquired motorized land vehicle or marine vessel such as a personal automobile or boat, commercial vehicle or vessel, or mechanized agricultural vehicle or vessel, except for programs accessed through a separate subscription service, when circumvention is a necessary step to allow the diagnosis, repair, or lawful modification of a vehicle or vessel function, where such circumvention is not accomplished for the purpose of gaining unauthorized access to other copyrighted works; • Computer programs that are contained in and control the functioning of a lawfully acquired device that is primarily designed for use by consumers, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device, and is not accomplished for the purpose of gaining access to other copyrighted works; • Computer programs that are contained in and control the functioning of a lawfully acquired medical device or system, and related data files, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system. • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates, or is undertaken on a computer, computer system, or computer network on which the computer program operates with the authorization of the owner or operator of such computer, computer system, or computer network, solely for the purpose of good-faith security research. • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay; • Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum, where such activities are carried out without any purpose of direct or indirect commercial advantage. • Computer programs that operate 3D printers that employ technological measures to limit the use of material, when circumvention is accomplished solely for the purpose of using alternative material and not for the purpose of accessing design software, design files, or proprietary data; • Computer programs, solely for the purpose of investigating a potential infringement of
free and open source computer programs; • Video games in the form of computer programs, embodied in lawfully acquired physical or downloaded formats, and operated on a general-purpose computer, where circumvention is undertaken solely for the purpose of allowing an individual with a physical disability to use software or hardware input methods other than a standard keyboard or mouse.
2024 rulemaking The 2024 exemptions, issued in October 2024, consist of seventeen renewals of previous exemptions and three new or expanded designations of classes. The renewals of previous exemptions are for: • Educational and derivative uses of audiovisual works; • Enhancing accessibility of audiovisual works for disabled users; • Preservation or replacement of audiovisual works by libraries, archives, and museums; • Text and data mining of audiovisual works for scholarly research and teaching; • Text and data mining of literary works for scholarly research and teaching; • Text and data mining of literary works for compatibility with assistive technologies; • Accessing medical device data; • Unlocking computer programs that operate wireless devices; • Jailbreaking computer programs; • Circumvention of computer programs for the purpose of repairing motorized land vehicles, marine vessels, or mechanized agricultural vehicles or vessels; • Circumvention of computer programs for the purpose of repairing devices designed primarily for use by consumers; • Circumvention of computer programs for the purpose of repairing medical devices and systems; • Good-faith security research; • Preservation of abandoned video games; • Preservation of computer programs; • Allowing the use of alternative material in 3D printers; • Investigating potential copyright infringement of free and open-source computer programs. The new or expanded designations of classes are for: • Permitting researchers affiliated with nonprofit institutions of higher learning to access lawfully acquired copies of copyrighted audiovisual and literary works for the purposes of text and data mining research or teaching (this is in addition to the purposes of collaboration or replication of the research that were already permitted under previous exemptions); • Circumvention of computer programs for the diagnosis, maintenance, and repair of retail-level commercial food preparation equipment; • Circumvention of computer programs for the purposes of accessing, storing, and sharing operational and telematics data generated by motorized land vehicles and marine vessels.
2015 study After much criticism (see
below), on December 29, 2015, the Copyright Office initiated a study to assess the operation of section 1201 and the triennial rulemaking process. This is different from usual public comments on exemption proposals. It includes the role of the anti-trafficking provisions and permanent exemptions, and the requirements of the rulemaking itself. The Office has issued a Notice of Inquiry requesting public comment. Several comments were posted by individuals and organizations. An individual recalls that the
Copyright Clause has limitations.
Association of American Publishers et al. hold there is no need to amend the statute or to significantly alter the rulemaking. They are happy with the protection they are being granted, including anti-trafficking provisions, and talk of placing the cart before the horse, when they argue about requiring a proof of the mindset that consumers would have when utilizing circumvention tools before actual acts of circumvention occur. In their opinion, the meaning of Section 1201 is to
extend, not merely duplicate, copyright holder's rights.
Society of American Archivists say they are not aware that the anti-trafficking provisions of section 1201(a)(2) and 1201(b) have had any impact in deterring copyright infringement. They do know, however, that the provisions have created an absurd, Catch-22 situation for any archives that sought to adhere to the letter of the law.
iFixit also talks of Catch-22 on stressing that since it is up to proponents to show that an exemption is relevant, they need to show that there's overwhelming market demand
if only it were legal.
Rapid7 notice that DMCA adversely affects good faith security research by forbidding researchers from circumventing technological protection measures (TPMs) to analyze software for vulnerabilities. Cyberlaw Clinic at
Harvard Law School points out that the rulemaking is a complicated,
ad hoc, and unduly burdensome process. Professors
Andrea M. Matwyshyn,
Steven M. Bellovin,
Matt Blaze,
J. Alex Halderman, and
Nadia Heninger, jointly advocated making the security research exemption granted in the 2015 Triennial Section 1201 Rulemaking permanent. The
Learning Disabilities Association of America (LDA) commented that circumventing DRM restrictions to meet accessibility needs deserves a permanent exception.
Entertainment Software Association gives a vivid and detailed description of a flourishing market which is only possible because of DMCA. They are deeply concerned about people with disabilities, but that concern is already being taken care of by the copyright holders, so that no permanent exception is needed. Comments have also been submitted by, among others,
R Street Institute American Association of Law Libraries,
Business Software Alliance,
Alliance of Automobile Manufacturers,
Association of American Universities et al.,
Copyright Alliance,
Association for Computing Machinery U.S. Public Policy Council, the
Software and Information Industry Association, DVD Copy Control Association ("DVD CCA")
et al.,
Microsoft Corporation, Association for Competitive Technology,
Public Knowledge,
American Automobile Association. In June 2017, the Copyright Office published a report where it "shares the concern" that Section 1201 can affect activities unrelated to copyright infringement, but also expressed concerns over weakening "the right of copyright owners to exercise meaningful control over the terms of access to their works online", which they believe is "essential to the development of the digital marketplace for creative content". However, with respect to the question of whether the security research exemption granted in the 2015 Triennial cycle should be made permanent in some form, the Office recommended "that Congress consider expanding the reach of this exemption, easing the strict authorization requirement for researchers and restrictions on the use of information generated from the research, and abandoning or clarifying the multifactor test," stating that "it continues to believe that the exemption adopted in 2015 can be a useful starting point, and notes that most of the security researchers who petitioned for that exemption ... agree." ==Case law==