Deeplinks Blog posts about Terms Of (Ab)Use
One of the most crucial issues in the fight for digital freedom is the question of who will control the hardware that you have in your home, in your pocket, or in your own body.
Update (mere hours later): Apple filed a reply to this brief that matches our position that the government has overreached. Here's the relevant part:
Senators Grassley and Leahy, the Chairman and Ranking Member of the Committee on the Judiciary, have published a letter to the Copyright Office asking it to analyze the impact of copyright law on “software-enabled devices” (such as cars, phones, drones, appliances, and many more products with embedded computer systems). This issue is crucial because technology and the law have evolved in a way that no one could have intended when Congress wrote the present copyright laws, and that evolution has restricted customers’ freedoms to repair, understand, and improve on the devices they buy.
How many times have you logged into a computer or website with someone else’s name and password—maybe to retrieve information for a spouse or a friend—completely with their permission? Can you imagine spending a year in prison for that? It sounds ridiculous. That’s why EFF filed a “friend of the court” brief in United States v. Nosal this week urging the Ninth Circuit to overturn a troubling conviction under the Computer Fraud and Abuse Act (CFAA).
We’ve written before about how copyright is chipping away at your right to own devices you’ve bought and paid for—from e-books to toasters and even your car. Time and again, people who want to modify their own property or sell it to others are told that they can’t, because their property comes saddled with copyrighted code they’re not allowed to modify or give away when they are done with the device.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized