DMCA

Short for the Digital Millennium Copyright Act, an act of Congress that was signed into law on October 28th, 1998, by President Clinton. DMCA’s purpose is to update U.S. copyright laws for the digital age.

Briefly, the DMCA stipulates the following conditions:

  • It is a crime to circumvent anti-piracy measures that are built into commercial software.
  • It is a crime to manufacture, sell or distribute code-cracking devices that illegally copy software. However, it is not a crime to crack copyright protection devices in order to conduct encryptionresearch, assess product interoperability or test the security of computer systems.
  • Under certain circumstances, nonprofit libraries, archives and education institutions are exempt from the anti-circumvention provisions.
  • The copyright infringement liability of ISPsthat simply transmit information over the Internet is limited. However, ISPs must remove material from users’ Web sites that appears to constitute copyright infringement.
  • The liability for copyright infringement by faculty members and graduate students of nonprofit institutions of higher education is limited when the institutions serve as ISPs and under certain circumstances.
  • Webcastersmust pay licensing fees to record companies.
  • The Register of Copyrights must submit to Congress recommendations regarding how to promote distance education through digital technologies while “maintaining an appropriate balance between the rights of copyright owners and the needs of users.”

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...