The U.S. Copyright Act confers certain exclusive rights onto creators of original works. But the advent of digital technologies, particularly the Internet, has made infringement of those rights easier than ever. Books can be scanned, music files can be reproduced, and photographs can be edited and posted online within minutes. Copyright holders who produce all of that content have never been more exposed to infringement. Fortunately for them, however, technologies have been developed to assist in preventing rampant online infringement. Digital Rights Management (DRM) is a term that encompasses various processes or methods of restricting the use of, or access to, copyrighted works.
DRM is essentially an organized, systematic effort to combat digital copyright infringement. For example, consider what happens when you buy most types of commercial software. The software will typically be "locked" until you type in a unique access code that grants a license for use based upon a specific number of users.
Similarly, consider the process of downloading music. In many cases, music files, such as MP3s, are "locked" for distribution and can play only on the devices onto which they were downloaded. (Apple's iTunes Music Store is a notable exception, offering many songs as "DRM Free," meaning without any DRM restrictions.)
The goal of DRM is, broadly speaking, to prevent any unauthorized copyright infringement efforts of protected works. DRM is ordinarily accomplished through embedded code or other technological gate-keeping to impede infringement.
Initially, DRM technologies were created solely to prevent copying of software, but since the late 1990s they have been used in regard to other creative works, such as music, books, databases, and movies. DRMs are implemented at the discretion of the copyright owner.
Circumventing DRM is not excused just because DRM-cracking tools may be widely available. In a 2010 case, Apple Inc. v. Psystar Corp., Apple sued a company that had circumvented its DRM system. The defendant company argued that tools for cracking the DRM were widely available and that therefore, the DRM itself was so ineffective as to be meaningless. The court disagreed. saying that if the DRM could not be circumvented without outside information or tools, it would be considered as effective DRM.
While prohibitions on DRM meddling are strict, Congress understood that they are sometimes case-specific and excusable depending on the type of technology involved. Rather than amend the Copyright Act with each new technological development, Congress authorized the Library of Congress (which oversees the U.S. Copyright Office) to conduct regular rulemaking and study of the DRM enforcement.
Specifically, 17 U.S.C.A. § 1201 provides that "The Librarian shall publish any class of copyrighted works for which the Librarian has determined, pursuant to the rulemaking conducted under [this Section] that noninfringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected..."
For example, the Library of Congress issued rules in 2010 stating that wireless phone owners could break access controls on their phones in order to switch wireless carriers. Other rules issued more recently provide that computer users could bypass security dongles if the dongle no longer works and can’t be replaced, that users of eBook readers could break digital locks to use read-aloud software, and that educators and filmmakers could circumvent DVD protection for noncommercial purposes.