Skip to content Commonwealth of Australia Coat of Arms Parliament of Australia - House of RepresentativesPhoto of the House of Representatives Chamber
HomeSenateHouse of RepresentativesLive BroadcastingThis Week in Parliament FindFrequently asked questionsContact


House Standing Committee on Legal and Constitutional Affairs
Committee activities (inquiries and reports)

Review of technological protection measures exceptions

Print Appendix D (PDF 97KB) < - Report Home < - Appendix C :

Appendix D – Appendix D: Article 17.4.7 of the Australia-United States Free Trade
Agreement

 
 

7. (a) In order to provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that authors, performers, and producers of phonograms use in connection with the exercise of their rights and that restrict unauthorised acts in respect of their works, performances, and phonograms, each Party shall provide that any person who:

(i) knowingly, or having reasonable grounds to know, circumvents without authority any effective technological measure that controls access to a protected work, performance, or phonogram, or other subject matter; or

(ii) manufactures, imports, distributes, offers to the public, provides, or otherwise traffics in devices, products, or components, or offers to the public, or provides services that:

(A) are promoted, advertised, or marketed for the purpose of circumvention of any effective technological measure;

(B) have only a limited commercially significant purpose or use other than to circumvent any effective technological measure; or

(C) are primarily designed, produced, or performed for the purpose of enabling or facilitating the circumvention of any effective technological measure,

shall be liable and subject to the remedies specified in Article 17.11.13. Each Party shall provide for criminal procedures and penalties to be applied where any person is found to have engaged wilfully and for the purposes of commercial advantage or financial gain in any of the above activities. Each Party may provide that such criminal procedures and penalties do not apply to a non-profit library, archive, educational institution, or public non-commercial broadcasting entity.

(b) Effective technological measure means any technology, device, or component that, in the normal course of its operation, controls access to a protected work, performance, phonogram, or other protected subject matter, or protects any copyright.

(c) In implementing sub-paragraph (a), neither Party shall be obligated to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as the product does not otherwise violate any measures implementing sub-paragraph (a).

(d) Each Party shall provide that a violation of a measure implementing this paragraph is a separate civil or criminal offence and independent of any infringement that might occur under the Party’s copyright law.

(e) Each Party shall confine exceptions to any measures implementing sub-paragraph (a) to the following activities, which shall be applied to relevant measures in accordance with sub-paragraph (f):

(i) non-infringing reverse engineering activities with regard to a lawfully obtained copy of a computer program, carried out in good faith with respect to particular elements of that computer program that have not been readily available to the person engaged in those activities, for the sole purpose of achieving interoperability of an independently created computer program with other programs;

(ii) non-infringing good faith activities, carried out by an appropriately qualified researcher who has lawfully obtained a copy, unfixed performance, or display of a work, performance, or phonogram and who has made a good faith effort to obtain authorisation for such activities, to the extent necessary for the sole purpose of identifying and analysing flaws and vulnerabilities of technologies for scrambling and descrambling of information;

(iii) the inclusion of a component or part for the sole purpose of preventing the access of minors to inappropriate online content in a technology, product, service, or device that itself is not prohibited under the measures implementing sub-paragraph (a)(ii);

(iv) non-infringing good faith activities that are authorised by the owner of a computer, computer system, or computer network for the sole purpose of test ing, investigating, or correcting the security of that computer, computer system, or computer network;

(v) non-infringing activities for the sole purpose of identifying and disabling a capability to carry out undisclosed collection or dissemination of personally identifying information reflecting the online activities of a natural person in a way that has no other effect on the ability of any person to gain access to any work;

(vi) lawfully authorised activities carried out by government employees, agents, or contractors for law enforcement, intelligence, essential security, or similar governmental purposes;

(vii) access by a non-profit library, archive, or educational institution to a work, performance, or phonogram not otherwise available to it, for the sole purpose of making acquisition decisions; and

(viii) non-infringing uses of a work, performance, or phonogram in a particular class of works, performances, or phonograms, when an actual or likely adverse impact on those non-infringing uses is credibly demonstrated in a legislative or administrative review or proceeding; provided that any such review or proceeding is conducted at least once every four years from the date of conclusion of such review or proceeding.

(f) The exceptions to any measures implementing sub-paragraph (a) for the activities set forth in sub-paragraph (e) may only be applied as follows, and only to the extent that they do not impair the adequacy of legal protection or the effectiveness of legal remedies against the circumvention of effective technological measures:

(i) any measures implementing sub-paragraph (a)(i) may be subject to exceptions with respect to each activity set forth in sub-paragraph (e);

(ii) any measures implementing sub-paragraph (a)(ii), as they apply to effective technological measures that control access to a work, performance, or phonogram, may be subject to exceptions with respect to activities set forth in sub-paragraph (e)(i), (ii), (iii), (iv), and (vi); and (iii) any measures implementing sub-paragraph (a)(ii), as they apply to effective technological measures that protect any copyright, may be subject to exceptions with respect to the activities set forth in subparagraph (e)(i) and (vi).

 


Print Appendix D (PDF 97KB) < - Report Home < - Appendix C :

top