Will mod-chips be legal in Australia?

games, anti-circumvention In 2005, the Australian High Court ruled that the combination of the boot ROM and region coding in Sony PlayStations and PlayStation games was not a Technological Protection Measure (TPM). Under the old law, a device had to “prevent or inhibit” the infringement of copyright. Because Sony's technology didn't prevent a copy being[…]

against an access right

copyright Some people have argued that any unauthorised use of copyright material is likely to prejudice the legitimate interests of the copyright owner, and that market-based solutions, or statutory licences, are the most effective way of ensuring a balance between the copyright owner's rights and the ability of others to use copyright material. Fortunately, this[…]

The death of consumer liberty

anti-circumvention Imagine that the makers of a board game only allowed you to play it on wet Saturday afternoons. Now imagine that the Australian Government made it illegal to play that game on any other day. If the board game is released on a DVD or another electronic format, the new proposed amendments to Australia's[…]

20 minute audio summary – governance in virtual environments

games Below you can find a thrilling multimedia experience – a text and image based slide set, with audio accompaniment. This is a summary of the starting position for my PhD research, presented at the QUT lunchtime research seminar series. There's not much that's not in the proposal, but I've been told that that podcasts[…]

Yueyue Wang – In order to save fair use, we must kill it

(my title, not hers) At the VI Computer Law World Conference, Yueyue Wang presented a paper titled “Will Fair Use Survive? – Regulating File-Sharing in Research and Education.” Yueyue's central argument rests upon the proposition that fair use is losing out, particularly in peer-to-peer networks. Hence the choice is between not having fair use at[…]

Nic Garnett on premature regulation

Nic Garnett is the principal consultant for Interight.com (DRM consultants), and was talking at the VI Computer Law World Conference about his report produced for WIPO – Automated Rights Management Systems and Copyright Limitations and Exceptions. Garnett has been representing copyright industries and TPM developers for over a decade, and was heavily involved in the[…]

Lilian Edwards on Killing Zombies – consumer network security

At the VI Computer Law World Conference, Lilian Edwards presented a good overview of the growing problem of insecurity of consumer computers, in the context of zombie networks. Having understood the problem, what are the possible solutions? Criminal sanctions for exploiters: unfortunately, you only catch either the infected victims or script-kiddies – operators are very[…]

Andres Guadamuz on the distribution of networks (or, evil plans to alter the collective conscious)

At the VI Computer Law World Conference, Andres gave an interesting presentation about the distribution of nodes in networks (definitely not random), and the impact of this particularly on regulation. This reminds me of a presentation at the recent iCi Research Symposium by Sandy Pentland, where he explained the research being undertaken at MIT on[…]

Stranger than Fiction: The place of fiction in legal discourse

As part of the GikII workshop, there was a really interesting discussion centering around the representation of surveillance, privacy and fears for technology in fiction. Presentations by: Judith Rauhofer, “Defence against the Dark Arts: How the British Response to the Terrorist Threat Is Parodied in J K Rowling's Harry Potter and the Half Blood Prince”[…]