WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

La gestion des DRM en perspective


par Herwann Perrin
Université René Descartes Paris V - DESS de Droit et Pratique du Commerce électronique 2004
  

Available in multipage mode

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy
Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

University Rene Descartes- Paris V

THE MANAGEMENT OF THE DRM IN OUTLINE

Memory of of Right and Practical of the Electronic Trade

www.droit-activites-numeriques.com

Herwann PERRIN

2004

perrinherwann@yahoo.fr

«... the only source of inexhaustible and permanent improvement of progress is freedom, since thanks to it, there can be as many hearths of progress individuals».

John Stuart Millet, of freedom, 1859

«All the primary education social goods must be also distributed, unless an unequal distribution of one of these goods is not with the advantage of the least favoured».

John Rawls, theory of justice, 1971.

Synopsis

SYNOPSIS 1

GLOSSARY 2

ABBREVIATIONS 3

INTRODUCTION 4

PRELIMINARY CHAPTER : TECHNOLOGY WITH THE HELP OF THE RIGHT 6

SECTION 1- TECHNICAL PRECONDITIONS 6

SECTION 2- INDUSTRIAL PRECONDITIONS 12

CHAPTER 1- LEGAL STAKES RELATED TO THE DRM 18

SECTION 1- BETWEEN ROYALTY AND PERSONAL DATA PROTECTION 19

SECTION 2- BETWEEN US RIGHTS AND EXPORT 36

CHAPTER 2- DRM IN PRACTICE 42

SECTION 1- APPROACHES TECHNICAL AND FUNCTIONAL 42

SECTION 2- APPROACHES CONTRACTUAL AND FINANCIAL 53

CONCLUSION 66

APPENDICES 68

FIGURES 71

BIBLIOGRAPHY 72

TABLES OF CONTENT 82

Glossary

Key: A key is a secrecy necessary to identify a mark. In the principal models of watermarking, it as well makes it possible to register the mark as lira or to remove it. This is why it must remain secret. The protocols setting up this type of marking at symmetrical key utilize the use of third of confidence, guards of the key.

Cryptology : to transform data, which it acts of information or signals, using secret conventions or to carry out the opposite operation of this transformation with or without secret convention

Fingerprinting: The fingerprinting is an application of the watermarking in which the mark (the print then is said) varies from one person to another. In the case of a diffusion of illegal copies, one can thus find the people whose specimen of the medium is at the origin of the fraud.

Rights Went back Dictionary - Dictionary to rights : aim at defining an organized list of terms corresponding to granted rights, while envisaging the possibility of managing different significances according to the legislation.

Rights Expression Language-- Language expressing the rights : aim at defining the granted rights, the recipient, the resource concerned and the conditions for application.

Steganography: The steganography is the science which consists in hiding information in any medium so that only a user provided with the adequate secrecy can find this information.

Tattooing: A process of marking utilizes two concepts: tattooing and the extraction. Tattooing is the stage where the mark is encrusted on the medium.

Traceability: This Anglicism indicates the possibility «of tracing» a culprit : when a reasonable coalition of size people agree to break a safety (cryptographic or of marking), one wants to identify at least one of the members of this coalition.

Watermarking : Process which consists in hiding in a file a code of property quantified to guarantee the royalties in particular and/or to limit his use. It supplements or replaces the encoding of the type DRM.

Abbreviations

AAC:

Audio Advanced Coding

CSPLA :

The Higher Council of the Author's copyright and Artistic

CGV :

General conditions of Sale

CJCE :

Run of Justice of the European Communities

 :

Encryption Standard dated

DMCA :

DIGITAL Millennium Act Copyright

DRM :

DIGITAL Right Management, Management of the numerical rights

FAI :

Suppliers of access to Internet

GDN :

Management of the numerical rights, DIGITAL Right Management

HTML :

Hypertext Markup Language

LEN

Law on the Numerical Economy

MP3 :

Motion Picture Group Experts, Audio To bush-hammer 3

MPEG :

Moving Picture Expert Group

ODRL :

Open DIGITAL Rights Language

RDD :

Rights Went back Dictionary - Dictionary to rights

REL :

Rights Expression Language-- Language expressing the rights

WMA :

Windows Audio Media

XML :

extensible Media Trades Language

XrML :

extensible rights Markup Language

Introduction

The remote loading of the files commonly is accepted and used among the Net surfers today. However, these numerical media, if they are legally available to the sale ex depot, are not it, in particular and with proof of the opposite, on the networks of P2P. Indeed, the royalty must apply and it is well accordingly that the artists, the editors and producers are worried by the protection of their works.

Also, gradually, of the provisions were created in order to protect the unit from these contents as well from a technical point of view as of the management of the rights. The DRM include/understand a whole of technologies making it possible to protect the royalties by quantifying the contents and by authorizing only one access limited and controlled according to the rights associated with those.

Traditionally, protection systems of the royalties who prevailed, rested on a fragile balance between the protection given to the author of work and thus a recognition of these exclusive rights on this one counterbalanced by a series of exceptions for specific uses.

This balance was broken because of evolution of numerical technologies. Indeed, if front, the reproduction with identical was not possible that in a degraded way, the numerical one makes it possible from now on to make copies perfectly in conformity with the original, without loss of quality and in a time and for a price records.

This was also reinforced by the provision for the users of computers increasingly more powerful, having an exceptional storage capacity. Moreover, correlatively the development of the Internet, the migration to the top flow makes it possible to exchange, download and diffuse in record time any type of contents in particular through the diffusion of software P2P.

Thus, counters the threat of a perversion of the system and for the respect of the royalty, the DRM were thought like one of the possible alternatives to the respect of the rights of each one.

However, as recalled by Daniel Semaya1(*), it is necessary to pay attention to the manner of setting up the DRM. Indeed, « The introduction off technologies that frustrate the to consume and limit to fair uses off will hurt the successes DRM yew consumers will not stand for it ».

It is important to understand well today, that we are still during a time of choice. I.e., that at present, that it is a question of industry musical or cinematographic, the choice of measurements which will be snuffs and misent in place was not stopped yet.

The various recent initiatives2(*) in these sectors are rather a period of natural test size from which strategic decisions will be made either in favor of a protection by measurements technical adequate and effective being based at the same time on technological but also juridically framed choices what will then make it possible to develop new economic models or worms of the mixed models combining a protection certainly effective but limited in term of management of rights for example.

One of the keys to success of the initiatives which will be proposed to the users resident in the adequacy, in particular in France, of the technical measures taken in comparison with the concept of private copy. Indeed, it is important to understand that technical measurements, and it is one of the major difficulties, must take into account the whole of the perimeter corresponding to this concept and the uses of these media.3(*)

Preliminary chapter : Technology with the help of the right

The need inherent in the installation of a management of the numerical rights comes owing to the fact that, at least on Internet, there is an increasing number of processes making it possible to circumvent the technical measurements installation on the various types of supports. In this respect, one will refer in a very didactic article of Shantanu Rastogi4(*) in which the author delivers the various means quite simply to us, to have access to any type of files and to exchange them. without too many efforts

The principal list including/understanding the following techniques : the networks Peer to Peer (P2P), the newsgroup, the cat (via the Internet Relay Chat), the sites of auction sales, the protocol File Transfer Protocol (ftp), the shops «will warez», the aces, the patches, the generators of job numbers, the distribution of the images discs (Iso).

Section 1- technical preconditions

Before immersing themselves in the management itself of the DRM, wondering about operation inherent in this management of the rights is a paramount stage. It makes it possible to apprehend in all its width the implications as well technological as legal which are in plays.

Thus, one will study successively technologies of applicable cryptography as much for the protection of physical supports that for the access control and the use of the digital components and technologies of watermarking, usable for the recognition of the rights, but also the traceability, the analysis of audience or the fight against the counterfeit, etc

§1- Cryptology

Cryptology is heard here like E so many the concept of coding the data at ends of nondisclosure and nonreproduction.

Also, one will endeavor to consider the major concepts of cryptology for then harnessing itself to practically identify what that implies on the level of the protection of the contents.

With- major Concepts

Before returning more in detail in the problems of cryptology, a short recall of the concepts of cryptology will make it possible to dissociate cryptography with secret key (or symmetrical key) of cryptography with private/public key (or asymmetrical key). Indeed, cryptography with secret key is used mainly for the protected transfer of the messages and the documents. Cryptography with key private/public, more personal and more expensive in data-processing computing time, is used to quantify the most significant parts of the messages: it is at the base of the concepts of fingerprint, signature, seal, electronic envelope.

1- cryptology with secret key

In a system of use of cryptography with secret key the various speakers divide the same key which will be used with the transmitter with crypter the message and the receiver to decipher it.

The algorithm with secret key most known is5(*) and insofar as it can be « broken », it is preferable, at ends of safety, to frequently change the key : what brings us to a system known as of hierarchical keys.6(*)

Figure 1: Diagram of a transmission made safe by secret key.

2- cryptology with asymmetrical key

The principle of cryptography by private/public key lies in the existence of a couple of keys for each interlocutor. These two keys, one private and the other public one, are generated at the same time and are closely dependant. The private key is personal and does not have to be revealed with which that is. Conversely, the public key can be accessible to no matter whom, for example directly on the network. The principle of use is as follows : an encrypted message with a public key is décryptable only by the corresponding private key. Conversely, an encrypted message with a private key can be deciphered only by its public key.7(*)

This system is often used in relation to mechanisms of authentification and electronic signature. It is besides this one which was « adoptee » by the 13 the Mars law 2000 which transposed the directive on the electronic signature from December 13, 1999.8(*) Nevertheless, this type of coding is generally rather slow. Also, « one frequently uses the system of «the numerical envelope»: the message is transmitted quantified with a random symmetrical key «M», and the key «M» is transmitted quantified with the public key of the recipient ». 9(*)

B- Protection of the contents

The interest of the installation of a system of DRM is related to the fact that it is about a technology which makes it possible to the owners of contents to protect their products. Indeed, protection is ensured by the encoding of the multi-media contents and authorizes the access only to the people in possession of the license to read this one.10(*)

The protection of the contents is closely related to the selected type of protection. One will remember, for example, protection associated with the DVD, the algorithm CS (Content Scrambling System) which was, inter alia, broken by Jon Lech Johansen.11(*) As example, it is right now recommended to use lengths of keys of 80 bits for symmetrical algorithm TDES and of 1024 bits for asymmetrical algorithm RSA. 12(*)

§2- Tattooing

The techniques of tattooings, mainly the watermarking, or the fingerprinting, have as an aim of « to add, on a medium (which can be an image, a song, a video film), a mark which must be sufficiently unperceivable not to deteriorate the medium and sufficiently robust to be able to be detected even after treatment of the medium that it is a usual treatment or that resulting from an attack of the system of marking ».13(*)

It will be specified that this « mark » can:

- to contain information on the permissions attached to the document,

- to indicate which is owner of the document,

- to mark having it right of the document.

Figure 2 : example of Mark on an image

(cf : http://www-rocq.inria.fr/codes/Watermarking/)

The interest of the watermarking and the fingerprinting, one will have included/understood it, lies in the fact that it inserts in an unperceivable but so specific way a mark inside contents ; what allows then « to follow ». However, it will be necessary, like technologies of cryptology to key, to choose the best manner of crypter this mark. According to Sirs Brunet and Raynal, if it « asymmetrical marking represents the panacea. More need for third of confidence, the mark is a property of the medium that everyone can read. And yet, nobody can remove it. However, one did not find an algorithm valid of marking asymmetrical ».14(*) Also, it seems that that is it « marking plugs that it is advisable to use in the measurement of course where the algorithm of marking is solid cryptologiquement ». 15(*)

Thus, like points out it Philippe Chantepie, the use complementary to these two techniques is necessary within the framework of a system of GDN.

Indeed, the fingerprinting allows the traceability of work, control by identification of the diffusion of works and the watermarking the administration of the evidence as for the integrity, the origin, even the titularity, if it relates to the mode of the rights of works, the control of the reproduction, the checking of the modifications of information or deteriorations of works. 16(*)

Despite everything, it is by no means a question of setting up inviolable systems because that would require too heavy investments and would probably not facilitate the use of the consuming users/. The phenomenon of the counterfeit and the hacking always exists and will exist, no technology not being completely reliable.17(*) The goal being more in correlation with the principle of precaution and proportionality to knowing, to establish a subtle and adequate balance between the whole of the chain, the artist to the producer, the diffuser and finally to the consumer. 18(*)

§3- the Language

If the techniques of cryptology are necessary to the numerical management of the contents, that cannot be done without a suitable language. That implies in this field a convergence of the whole of the actors towards a common language.

At present, there are no yet standards ; on the other hand, one can indicate right now that the standards have a common base, metalanguage XML already used and adopted in industry.

For the moment, the two principal languages are the ODRL19(*) and XrML. 20(*)

If, for the moment, no decision were still taken, it would seem nevertheless that XrML was adopted for standard MPEG-21.21(*) This question is determining insofar as, the description of the rights « as well determine nature originating in the rights of author's copyright and artistic that the place and the function of the respective actors, and the whole of the modes of uses of works, in other words the marketing strategies present and future ». 22(*)

The stake is all the more important as it is about a language owner thus being the subject of rights, which is not the case with the ODRL. 23(*)

Major interest of the language, beyond the purely technical aspect being which it is about a language known as of description of the rights consequently making it possible to set up documents by contract having vocation to define precisely « legal conditions of operating and use of certain works by certain people under certain conditions (...) : A numerical system of management of the rights thus associates a language of description of information on the rights with technical protection measures aiming at controlling the respect of the contract ». 24(*)

Thus, it will be allowed to exert the rights of access to the contents by completely dissociating the supply of the support of the rights associated with this one.25(*)

Section 2- industrial preconditions

In order to better determine the implications related to the DRM, it is necessary to include/understand which are the various actors who can be concerned with these problems for then considering the bringings together of those at ends of interworking.

§1- actors

The stakes here, is to be interested in part of the active actors in the field of the GDN and having a need growing for development of these measurements in order to take into account economic realities increasingly more complex.

They are mainly four types of actors26(*) who will have, so that the whole of the systems functions in a satisfactory and transparent way for the consuming users/, to cooperate and develop technologies which will have in fine being interopérables.

These categories interdependent and are primarily gathered on a side in the electronics industry general public27(*) where the stake is in particular centered around the systems of reading and recording of optical supports (Audio CD, DVD) and in the data-processing industry28(*) which is in the middle of what one can call computer equipement and includes in particular different components multimedia for the PC as well as the software systems of reading, compression/decompression, and transmission by Internet of works. And, other of the software publishers DRM29(*) and specialists in technical protection.30(*)

For each one of these actors, the stake is serious. Indeed, if one takes again one of the markets which interests these industries, Forrester Research envisages, for the music on line « an exponential growth of the sale of music in numerical form. The estimates of the market for 2004 vary between €900millions and €1 500 million to reach €12 000 million within 10 years is 19% of the total market ».31(*)

Figure 3: Forecast of the sales of music on line32(*)

In this respect, one will follow with interest the development of alliances in this sector with, for example, a recent bringing together between Contentguard (in which Microsoft reinforced its participation) and Time Warner to develop and « to ensure the promotion and the development of the solutions of distribution and management of the numerical rights ». 33(*)

In the same way, Microsoft, which had been in lawsuit for three years with InterTrust34(*) which showed it to have illegally borrowed some of these technologies to develop its solution DRM, decided to pour to him 440 million dollars in exchange of the access to its technologies of protection of contents. Thus, the prospect for an opening towards other markets encourages with a bringing together between the actors. 35(*)

§2- interworking

Major stake of the DRM, interworking is the fact of working out a whole of standards « standards » between the various actors of one or more sectors. That so that, even if these standards are not any obligatory, insofar as the majority of the actors use them make consequently them almost obligatory. Indeed a product which would not be compatible with them would have enormous difficulties of developing on a given market.

Indeed, the whole of the produced and distributed contents must be readable by the users, i.e. those must be stored, distributed or diffused in a format which can be recognized by the whole of the readers sold in the trade independently of their source.36(*) This asking, consequently, an effort of co-operation between the various actors of the sector so that a standardization can succeed most quickly. 37(*)

With- the consortia and alliances

One will endeavor here to evoke some of the most influential groups and most advanced in the related fields with the management of the DRM. 38(*)

In the field of the GDN, a crucial importance must be related as well to the standards of data compression as on the language of expression of these data even, more and more, on the languages of meta-data.

Historically, group WG11 is that which defined « standards of compression MPEG-2, used for numerical television then MPEG-4 used for the diffusion of video on Internet. The audio part of the specifications became famous «the MP3» (MPEG To bush-hammer 3). Standard MPEG-4 integrates a part IPMP (Intellectual Property Management and Protection) to allow an identification of work, a management of the rights of copy and elements of coding of the contents and to constitute a complete standard of video diffusion. MPEG envisages new formats, in particular integral MPEG-7 of meta-data XML (given complementary attached to the video which can identify work, describe the rights, describe the scenes, etc) and MPEG-21, which aims at defining a total architecture multi-media, integrating various objects and contents. MPEG 21 will include/understand in particular a module IPMP, as RDD (Rights Data Dictionary-- Dictionary from rights) and REL (Rights Expression Language-- Langage expressing the rights) ». 39(*)

More precisely, Leonardo Chiariglione indicates: « That is why we cuts has «Rights Expression Language» (REL) so that rights butt has item digital edge Be expressed in A way that edge Be interpreted by has computer. With right exists to perform actions one something. Today we uses such verbs have: «display», «print», «Copy» gold «blind» and we humans (hopefully) know what we mean. Drank computers must to Be taught the meaning. This is why we need has «Rights Data Dictionary» (RDD) that gives the specifies off semantics Al the verbs that are used in the REL ». 40(*)

The simplified diagram, below, indicates the basic functions of a REL with a whole of associated rights that the author calls « permissions use » (in yellow) ; localization or unit, time constraints, (pink) as well as obligations of payments, traceability, etc (in blue).

Figure 4 : DRM Information Structures - Rights Expression Model41(*)

It will be noted that, at the time of a workshop at the European Commission, it was specified that interworking was very important and that it was necessary in this direction to try to privilege : «Much emphasis was placed one the need for open standards that guarantee interoperability, and nap called for «common platforms». Indeed, there was has majority in favor off open and interoperable standard. Summon stated that proprietary standard could risk creating bottlenecks for users' accesses to content, giving small channel to content «gatekeepers», who could not only monopolize accesses to content and distort competition, goal might also misuses to their position by restricting the availability off content, which could cuts wider farming implications for society. With failure to achieve interoperability would significantly increase costs and would Be major disincentive for users has ». 42(*)

B- The group of Article 29

The group of data protection resulting from article 29 of Directive 95/46 adopted last January43(*) a working paper on the data-processing platforms of confidence, and, in particular, on the work carried out by Trusted Computing Group (Group TCG).44(*) This one includes/understands a very significant number actors45(*) of the data-processing sector and telecommunications of which the goal is, inter alia, of « to write draft specifications for a new generation of chips of safety hardware called Trusted Platform Modules (TPM) ».

One will note in this respect that « Chip TPM comprises the following functionalities:

- public key: generation of the pairs of keys, signature by public key, checking, encoding and decoding ;

- starting in confidence: the registers of configuration of platform (PCR) record sections of information of the configuration during all the sequence of starting. Once the computer moving, of the data (such as symmetrical keys for encrypted file) can «be sealed» under a PCR;

- initialization and management: these functions make it possible to the owner to use or not the chip, to give it to zero and to take possession of it. The new version of the specifications makes it possible to the owner to delegate a certain number of functions to the user ». 46(*)

Nevertheless, work of this consortium is interesting to follow insofar as, on the one hand it includes/understands the whole of the major actors of the data-processing sector and télécoms and on the other hand it was committed respecting and to take into account the whole of the Community legislation relating to the data protection47(*) such as that is specified and discussed in the document quoted above. The evolutions of the specifications of version 1.1 with version 1.2 propose in particular various solutions in agreement with waitings specified by the Group of Article 29.

One will mention here, and as example, the problems relating to the data protection via an external certification. Within this framework, the TCG envisaged two possibilities, that is to say :

- the intervention of a third of confidence which would certify the identity of the users to their correspondent, without revealing it ;

- to use the characteristic «Direct Anonymous Attestation (DAA)» which makes it possible the user to create a key of certificate of identity (Certificate Identity Key, AIK) without presenting the key of endorsing (Endorsement Key, EK), which constitutes a single identifier. 48(*)

If no decision were still taken, one sees despite everything the efforts and the implications which can have a bringing together between various at the same time private but so institutional actors.49(*)

Chapter 1- legal stakes related to the DRM

The acceptance of a system of GDN for the consuming users/must have as counterparts to reassure them on the whole of measurements which could installation to protect their private life. And, that they thus know the perimeter of the personal data likely to be the subject of a data-processing treatment, i.e. more precisely of the consolidations of information necessary to the execution of the contractual conditions of use of works than they will be able to buy, download, distribute.

Indeed, the essential stake which exists between DRM and PRM lies in the fact that it is at the same time necessary to be able to distribute digital components to individuals by authenticating them as such without for that making readable personal information of each system. It is in this balance that resides the right adequacy between respect of the private life and management of the numerical rights as we will see it below.

In this respect, it is interesting to read what Alan Greenspan said to the United States in 2003:

« Does yew our objectify is to maximize economic growth, are we striking the right balances off in our protection intellectual property rights? Are the protections sufficiently broad to innovation drank not so broad have to shut down follow one encourages innovation? Vague are such protections so that they produce uncertainties that raise risk premiums and the cost off capital? Do How appropriate is our current system--developed for has world in which physical have predominated--for year economy in which been worth increasingly is embodied in ideas rather than tangible capital? ». 50(*)

and Jörg Reinbothe for the European Commission in 2002 :

« We must could rights and technology into perspective with one another. What are the desired results?

1. Content Firstly, to stimulate the creation off, and investment in, quality. This boat Be achieved by DRMs gold new business models alone (have alternate to copyright protection), goal through has balanced protection off intellectual property in combination with technological measures.

2. Secondly, we must enable legitimate accesses. This cal for prudence concerning the scope off exclusive rights and off technological measures ». 51(*)

The protection of the private life is and remains a fundamental data in our companies and more particularly in the world electronic commercial. A study of PriceWaterhouseCoopers, in 2000, showed that two thirds of the questioned consumers: « would shop more online yew they knew retail sites would not C anything with to their personal information ». In the same way a Harris study, in date of 2002, indicates that major concerns of the Net surfers when with the risks of safety are related to: « companies trading personal dated without permission, the consequences off insecure transactions, and theft off personal dated ». 52(*)

Ultimately, it is largely understood that the problems of the DRM are closely related to an adequate, balanced and proportioned management personal data of the various users on line.

Section 1- Between royalty and personal data protection

Since the adoption of expect Treaty ADPIC that each State must establish a protective legal status of the exclusive rights of the royalties and rights close, and especially since the adoption of Treaties OMPI of 1996, the legal protection of technical measurements became the international intellectual gun of the protection of these rights in the numerical environment. 53(*)

Treaties OMPI of December 1996 traced, for the whole of the States, a legal model of protection of technical measurements of protection of the digital components, in particular with regard to the phase of distribution of this saving and the sphere in uses of the consumers. 54(*)

Vis-a-vis these measurements, the principle of the respect of the private life55(*) and data protection in personal matter remains him also a European requirement of first order like that was pointed out, in particular, with article 8 of the Charter of the basic rights like by the repeated assertions of the French national jurisdictions and in various situations. 56(*)

§1- royalties in prospect

The European legislation enacted a whole of rules through directives in order to modernize the royalty, in particular by the Treaty of OMPI of 1996. However, those were not transposed yet what raises some difficulties in term of legislative balance. All the more, that the Commission has just proposed a new directive in this field which is the subject already of intense actions of lobbying.

With- the directive on the royalty and the French bill

The French bill prepared by the Ministry for the Culture should make it possible, if it is adopted relatively quickly, to harmonize in this field the royalties the European legislation.

1- the directive on the royalty

The transposition of directive 2001/29 EC relating to the harmonization of certain aspects of the royalty and the rights close in the company to information has as a function to ensure the integration of this international standard in the national laws of the Member States. The object of the directive precisely consists in defining a legal protection of the preparatory acts or neutralization of effective technical measurements, which they are inspecting devices of access or technical measurements control copy.

The measurements installation by the directive57(*) are, for the case which concerns us, the exception of optional private copy, the installation of an equitable compensation and the protection of the skirting of technical measurements.

Indeed, article 5 §2 b)58(*) lays down «faculty» for the Member States to exempt reproduction right the copies on any support by an individual for a private use and at purposes not directly or indirectly commercial, provided that the holders of rights receive an equitable compensation. 59(*)

Concerning, the protection of the skirting of technical measurements, article 660(*) imposes on the Member States a new infringement : the act of skirting of «effective technical measurements». Not only the act even of skirting is aimed, but also the fact of manufacturing, of importing, of distributing, of selling, of renting, of having at commercial purposes or of making the promotion of tools having for principal object the skirting of these technical measurements.61(*)

Thus, freedom is left to the holders of rights to set up technical measurements protecting their works. European Commission, in February 2002, having specified that an effective management of the rights within the framework of the DRM and in direct relationship to Directive 2001/29/EC was to be based on the fact that  : « Legal The framework supports uses off DRMs by protecting technical measures, and by requiring Member States to take into account the application gold non-application off technological measures when providing for to fair compensation in the context off the private uses exception for which to fair compensation is required, (Recital 35 and Article 5.2 (b))., edge facilitate the effective management off rights and exceptions. Effective Where technological measures are operational and, right holders should Be whitebait to ensure appropriate exploitation and enforcement off to their rights have well adequate returned by using DRMs. Legal The framework provides for the possibility to avoid double compensation where copyright levies and DRMs would Be used in parallel ». 62(*)

2- the bill on the royalties63(*)

The explanatory memorandum of the bill of transposition in French right of directive 2001/29 EC indicates that it asks a priori only « very limited modifications of the code of the intellectual property. It acts primarily, on the one hand, of the introduction of sanctions in the event of skirting of technical measurements of protection and identification of works and, on the other hand, the institution of an exception to the royalty in favor of certain types of technical copies carried out during the transmissions of contents on the numerical networks ». 64(*)

The bill seems to have remained rather near to the European text65(*), and it is the goal of a directive of harmonization of the legislations. However, one will note some changes having milked mainly with : on the one hand, recognition of new exceptions to the royalties and, on the other hand, to the coexistence of the private copy and technical measurements.66(*)

Article 7 of the bill indicates : « effective technical measures intended to prevent or limit the uses not - authorized by the holder of a royalty or a right close to the royalty, of a work, an interpretation, a sound record, an ideogram or a program, are protected under the conditions envisaged with the present title. These provisions are not applicable to the software;

«One understands by technical measurement, within the meaning of the preceding subparagraph, any technology, device, component, which, within the normal framework of its operation, achieves the function envisaged with the preceding subparagraph. These technical measurements are considered effective when an aimed use to the preceding subparagraph is controlled thanks to the application of an access code, a process of protection, such as encoding, the jamming or any other transformation of the object of protection, or of a mechanism of control of the copy which achieves this goal of protection.

«The licenses of development of technical measurements of protection are granted to the technical manufacturers of systems or to the owners of services which want to implement interworking, under conditions equitable and nondiscriminatory, when these manufacturers or owners commit themselves respecting, in their sphere of activity, the conditions guaranteeing the operational safety of technical measurements of protection that they use ». 67(*)

Be added to these provisions that the skirting of these devices anti-counterfeit set up in particular on CD or DVD will be compared to counterfeit (article 11 to 15) and will be sanctioned penally. It will be noted that, the law Perben II extended the sorrow for counterfeit from two to three years of prison and 150.000 to 300.000 euros of fine, and to five years and 500.000 euros when the offense is made in organized band. 68(*)

Moreover, the directive obliges (article 6.4) the Member States to envisage: «an adapted legal protection against manufacture, the importation, the distribution, the sale, the hiring, the publicity for the sale or of the hiring, or the possession at commercial ends of devices, products or components or the provision of services which: has) are the subject of a promotion, of a publicity or of a marketing, with an aim of circumventing protection, or b) have only one limited commercial goal or a limited use other to circumvent protection, or c) are mainly designed, produced, adapted or realized with an aim of allowing or of facilitating the skirting of the protection of any effective technical measurement. ». This measurement was transposed in the Bill to article 13. 69(*)

Also, one will look with interest a decision of the federal court of San Francisco on February 19 200470(*) which forbade the Company 321 Studios to continue in the United States the production and the marketing of any software allowing the duplication of video DVD.71(*) Indeed, this decision was made because this type of software allows the skirting of the protection measures and violate thus the DMCA of 1998. This first judgment was given and the Court of New York72(*) confirmed this approach on March 3, 2004 in another business against 321 studios. It specifies that the software published by the company 321 Studios, enfreignait the royalty. It considered that « However, prohibition off manufacture gold trafficking off any technology primarily designed to circumvent has technological measure that either controls accesses to gold protects has right off has copyright owner to gold in A work protected under DMCA, obviously is not evaded by the alternative existence gold arguably limited use «. 73(*)

This faculty will have, it also, being given up in France at the end of the transposition of article 6.4 of the directive of May 22, 2001 on the royalty !!

On the other hand, one finds in article 8 Al 374(*) of the Bill a provision which differs from the directive insofar as faculty is offered to the holders of rights to limit the number of private copies, which can very clearly be made by the installation of DRM. This measurement is D `largely used right now elsewhere by the various actors of the sector of the distribution in line of contents.

One will then follow with interest the Bill when it indicates that, if technical measurements are legitimate, they should not limit the exercise of private copy.75(*) However all the difficulty is well there : how to reconcile the logic of the fight against the counterfeit and the hacking of works with that of the exception of copy deprived at private ends or the family circle...

Indeed, technical measurements which make it possible to control the use, the destination, the distribution of works have as a finality to prevent any illicit copy of those like any violation of the other exclusive rights of the holder. The skirting of those being illegal as from the moment when, like specifies it Caprioli, that was with full knowledge of the facts accomplished.76(*)

Thus, it would seem that in the future the user cannot exert his right of private copy quite simply any more. And, it is well the tendency to which one forwards oneself, the content providers on line initially set up of such measurements via the systems of DRM77(*) on line for then gradually applying them and according to the evolution and of the renewal of the equipment of the consuming users/with the purchases in the trade (off line). Certain CD being already famous like noncopiables, which was the occasion for the judges besides to decide in certain businesses.78(*) In those, most important in our opinion, and one will follow in that Eric Barbry79(*), not being that the companies were condemned for vice hidden and fraud but that the judge imposes « to make appear in the back packing CD the following formula in character 2,5mmm « Attention, it cannot be read on any reader or car radio »80(*) ; « the consumer by reading the mention « this CD contains a technical device which limits the possibilities of copy » cannot know that this system anti-copy is likely to restrict the listening of its disc on a car radio or a reader ».81(*) In that, it recognizes de facto the existence of a right of technical measurements and stresses only the fact that the consumer was not clearly informed of the restrictions likely to be able to intervene during the use of the bought support.

One will also follow with much interest the continuations of the decision returned by the TGI of Paris of last 30 April.82(*) French Union of Consumer (UFC) That To choose was déboutée by this one of its request towards Universal, the Films Alain Sarde and Studio Channel. Indeed, a private individual having bought the DVD of film of David Lynch Mulholland Drive could not make a private copy of this one because of the protection measures of the DVD. The judge indicated that the law was obsolete since, because of its seniority, « it did not take into account the recent reduction of the supports on which a work can be reproduced ». And to add that « the copy of a work published on a numerical support could only attack the normal exploitation of work ». 83(*)

It is in the name of the fight against the hacking that these same companies of perceptions are today pointed finger by the European Commission and more particularly by its Direction in load of the respect of the right of the competition. Sixteen companies of authors, whose SACEM, which collects the musical rights, are concerned. To make short, the Commission wishes to introduce competition between the companies of authors who in particular release the rights of diffusion of the music. The agreements of Santiago and Barcelona, in 2001, stipulated that each diffuser was to negotiate, country by country, the licenses of diffusion of the music to be bought on line. This territoriality and this exclusiveness are now disputed by the European Commission which wishes to open the system and to put the companies in competition. A way like another of encouraging the paying sites in their facilitating the life. On their side, the companies of authors fear that competition of the companies entitled to grant user licenses results in cause a drop in singularly the amount of the rights in the name of the commercial attractivity

B- Directive IP Enforcement84(*)

Recently, the European Parliament adopted by 330 votes for and 151 votes against the directive on the application of the rights of ownership intellectual and industrial suggested on January 30, 2003 by the Commission the purpose of which is in particular to reinforce the fight against piracy and the counterfeit. 85(*)

This one, then, was adopted by the Council of Ministers on April 26, 2004, for an effective application in 2006. 86(*)

It will be noted that the Parliament in particular wanted to endeavor to sanction only the infringements carried out at commercial purposes when the directive indicates to considering 13 (a) : « the measurements envisaged in article 7, paragraph 2, with article 9, paragraph 1, and with article 10, paragraph 1 (a), of this directive should apply only to acts made on a commercial scale, without damage of the possibility that have the Member States to also apply these measurements to other acts.87(*) The acts made on a commercial scale are those which are perpetrated in order to obtain an advantage economic or commercial direct or indirect, which excludes in theory the acts which are the in good faith acting fact of ultimate consumers ".

But the fact will be also mentioned that the Commission asks so that there be able to be one « (...) right of information, which makes it possible to obtain precise information on the origin of the goods or the litigious services, the distribution systems and the identity of the thirds implied in the attack ».88(*)

In the same way, article 9 precise : « The Member States take care that, within the framework of an action relating to an attack with a right of ownership intellectual and in response to a justified and proportioned request of the applicant, the competent courts can order that information on the origin and the distribution networks of the goods or the services which carry reached to a right of ownership intellectual is provided by the contravener and/or any other person (...) » and to continue while indicating to subparagraph 2 to what this information will relate : « names and addresses of the producers, manufacturers, distributers, suppliers and other former holders of the goods or the services, as well as wholesalers recipients and retailers ». 89(*)

It seems that this article 9 is inspired directly by the US legislation, also discussed (DMCA), which is used to obtain information in personal matter of the users of networks of file sharing to the contempt of the rules of respect of the private life. Moreover, Peter Schaar, Directeur of the equivalent of the CNIL in Germany (BnD) do not say anything others when it indicates that : «According to our interpretation, the suppliers of access and the shelterers belong to those which will have to yield with this rule, [the police chief declares,] what could involve a serious attack with the secrecy of the correspondences».90(*)

Thus, the debate on the obligations of the FAI would be started again, they should in particular have a duty « to communicate the identity of the users (...) some are the laws of protection of the life deprived into force ».91(*) But, it is true also that the Parliament specified by an amendment that « this does not constitute however a general obligation of monitoring of the thirds ».

Peter Schaar, stresses that « exact contours of this provision are still vague, so that it could as well target the pirates engaged in an industrial process of illegal copy, than of the private individuals who exchange private copies of work. In his opinion, this text is completely disproportionate ". 92(*)

On the other hand, it would seem that the French government is not of the same opinion when he states in particular that this directive, once transposed « will support in particular the conditions of meeting and establishment of the evidence of the counterfeit, including through better information of the public authorities, the variety and the effectiveness of the provisional measures decided by the judge, as well as the civil and pecuniary sanctions in order to better compensate the damages. Supported actively by the French authorities, this directive will have to be supplemented by a national penal shutter, which is being prepared by the Member States, and will be the subject of a transposition as fast as possible ». 93(*)

§2 - personal data protection in prospect

The French legislation rests on the base of the law Informatique and Freedoms of January 6, 1978. However, this one must be put in agreement with the various provisions of the Directive of October 24 199594(*) which should already have been transposed, within the time limit, in French right insofar as, unlike the directly applicable payments, the directive binds the Member States as for the result to reach while leaving with national authorities competence as for the form and with the means.95(*) In the same way, the directive on the electronic trade of June 8, 2000 and one of the directives Paquet Telecom (2002/58) must be the subject of a transposition to be in conformity with the requirements European.

With- the right to the personal data protection

In February 2003, the EUCD.INFO underlined in front of the CSPLA that « the electronic systems of management of the rights («DRM») could not cause for object or to make it possible at private organizations to operate automated processings of personal data for the identification of possible infringements to the royalty and the close rights. In accordance with the provisions of law and order of the law known as «data-processing and freedoms», people not invested morals of private law of a mission of public utility could not in no case to replace for the police force or justice by assuming capacities of investigation which come under the exclusive responsibility of the State ».96(*)

In that, it was based on article 30 of the law Informatique and Freedoms of January 6 1978 which indicates that « except contrary legislative provisions, the jurisdictions and public authorities acting within the framework of their legal attributions like, on assent of the national commission, the people morals managing a public utility can only carry out the automated treatment of personal information relating to the infringements, judgments or measurements of safety (...) ».97(*) One of the other difficulties inherent in the installation of a system of GDN being adequacy and balance to be found for the respect of the private life and the personal data protection.

One will note what Pamela Samuelson understands by DRM : « Year alternative phrases digital for DRM is «restrictions management,» given its uses by copyright industries to restrict to use rights »98(*) what will give us to reflect on the implications in terms of management and protection of the person. Alliances between industrialists, necessary to make emerge standards and interworking in particular, must be looked at with caution.99(*) Because behind those, and the DRM, is profiled technologies « that will Al more perfect control over accesses to and uses digital files off. The same capabilities that enable more perfect control also implicate the privacy interests off users off information goods (...). They also create the potential for vastly increased collection off information butt individuals' intellectual clothes and preferences. Thesis technologies therefore space affect both and informational dimensions off the privacy that individuals customarily cuts enjoyed in their intellectual activity ». 100(*)

What is obstructing so much a legal and ethical point of view is the fact that technologies of GDN, can create data records which even if they are generally made automatically via « robots » without any human intervention are likely to threaten the respect of the private life of the users. In particular if these data collected are accessible to others and that they can be used with fine marketing and/or that these data, like specifies it Julie Cohen, can be « gathered through monitoring [and] later Be used to generate detailed profile users' revealed intellectual preferences off. The information provider edge uses the resulting profile to market additional information goods to users, but edge salt it to third left who may uses it for has wide variety off other purposes ». 101(*)

Moreover, the European Commission recalls its attachment to these values by explaining that if the goal first technical protection measures is to preserve the rights of ownership intellectual and the economic rights associated, it does not remain about it less than : « However, in so far have DRMs may involve the collection and further processing off personal off dated in order to curry out the essential function protecting the works, but in so far have they may content also Al owners to closely monitor and track the uses off digital content, to consume organizations, privacy advocates, national supervisory authorities and the Commission are also concerned butt DRMs affecting the fundamental rights to privacy and personal dated ace guaranteed by the HAVE Charter one fundamental rights102(*) and the HAVE dated protection directives ». 103(*)

It is certain that the use of the DRM must be completely compatible and in direct bond with the principles resulting from Directive 95/46.104(*)

The CSPLA returned a report/ratio in June 2003 in which it points the risks related to the management of the DRM. It will be retained in particular that they : « could allow «to know in a very precise way of the whole sides of the private life105(*) of the individuals»106(*), «to collect data going beyond what is simply necessary to the exercise of the rights of the author's copyright and artistic», «to be coupled with [information] gathered on other sites thanks to single systems of identifiers, such as that of system .NET Passport developed by Microsoft», and problems in the event of repurchase of companies would pose, making it possible these last to constitute «files relating to a great number of characteristic ». 107(*)

« Technology is neutral but the use that one does it is not and must thus be guided by ethics and not only by economic interests. Massive deployment of technical measurements of protection « new generation », communicating with central waiters or being pressed on intelligent labels (RFID), presents consequent risks of attack at the personal freedoms (like the CNIL A raised besides) ». 108(*)

Contrary and one will not be astonished any, having them rights and their partners estimate that the DRM do not pose problems in term of attack to the private life and one can be astonished that the CSPLA gives him reason when it indicates in his opinion of June 26 2003 that « these systems lie within the general scope of the electronic trade and the rules, including penal, applicable as regards personal data protection ».109(*)

More still, in an opinion of March 2, 2004, the CSPLA110(*) if it is conscious of the potential risks related to « collect and the consolidation of precise data on cultural consumption of interested and their possible use in not desired ends » indicates that on the matter the these risk assessment is difficult... and inherent in emergent technologies... are common in the cybermonde !

This opinion is interesting insofar as it systematically will ask for and/or reinforce the means of fights against the hacking and the illicit exchanges of works between users by indicating that :

- the rules of administration of the proof in the penal lawsuit do not make obstacle with the launching of requests on the Internet by the authorities or having them right (in particular by the means of the sworn in agents of the article L. 331-2 of the code of the intellectual property) for purposes to note the offers of files carried out in violation of the rights of author's copyright and artistic.

- [if] character only indirectly personal of IP addresses111(*), (...) gives access the real identity interested parties only after bringing together with the data of connection held by the technical operators, within the framework of a legal procedure, [It] insists on the need for having the right, have regard to the massive character of the counterfeit on line, to be able to resort to such treatments, with an aim as well preventive as repressive. [the CSPLA] wishes that the Parliament find (...) a solution allowing to the holders rights and the organizations acting for their account to proceed to the constitution of such files, with an only aim of ensuring the protection of these rights [and] to adopt a formulation which makes it possible without ambiguity to look it like including, on the one hand, among the finalities of the collection, prevention and the repression of the violations of the rights of author's copyright and artistic, on the other hand, with the number of the people concerned, professional organizations and companies of collection and distribution of the duties, when they act on behalf of having the right.

The bill reforming the Data-processing Law and freedoms112(*) adopted by the deputies on last 29 April seems to go in this direction when it indicates : « «Art 9. - The processings of data in personal matter relating to the infringements, judgments and measures of safety can be taken only by:

(...) «3° (new) the people morals victims of infringements, for the strict needs for the fight against the fraud and under the conditions envisaged by the law ».113(*) Thus, the solution required by the CPSLA should allow for example compared to the illegal remote loading music on Internet to authorize the people morals, therefore the companies of royalty « victims of the counterfeit, to constitute their own files of infringements in order to collect personal data, as IP addresses ».114(*) One will await the confirmation of this measurement during the examination of the text by the senators in 2nd reading.

- Being finally the identification of the counterfeiters, the higher Council underlines the need for implementation an effective of the obligation of conservation, by the operators of telecommunications and the service providers on line, for the needs for research, the observation and the continuation of the penal infringements, of the data allowing such an identification (...) Being more particularly the data of connection, the higher Council estimates than, have regard in particular to the guarantees of which their conservation is surrounded, the time of this one would not have, in the current state of the legislation, being lower than one year, (...). A lengthening, for certain categories of data ;

- under certain conditions, the engagement of the responsibility for the intermediate people receiving benefits of services on line when they abstain from taking measurements making it possible to put an end to the illicit activities of which they are informed, envisage the possibility, for the administrative or legal authorities proper, to require these same people receiving benefits that they put a term at such activities, in particular by withdrawing the litigious contents or while making them inaccessible, and invite the Member States to set up of the recourse jurisdictional effective, including in summary procedure. 115(*)

With the reading of this opinion one will be able to wonder about the degree of freedom left to the users of the networks and the real legitimacy of this arsenal of repressive measurements and attentatoire with the freedom and the respect of the private life. The framework favourable with a blooming serene and balanced electronic trade is not yet clearly fixed !! Overall, one will wonder about the stakes existing between right and technique bus in the long term, like specifies it daN L Burke, « content owners may Be relatively unconcerned butt obtaining gold enforcing intellectual property rights have such rights cuts previously existed. Where accesses and uses off edge Be controlled by built-in technological restrictions, regulation the content via legal sanctions becomes far less gravitational. Indeed, content owners may prefer, rather than relying one copyright law to prohibit some statutorily determined use off the work, to rely one anti-circumvention laws to prohibit tampering with the technological controls, leaving the technology to prohibit whichever use the content owner unilaterally chooses. Such anti-circumvention laws, acting have year adjunct to technological controls, confer upon content owners A dismantles control never attainable under off has mode off traditional copyright ». 116(*)

Following the interrogation which one posed within the framework of address IP117(*), one will be interested particularly in the actions pursuant taken within the framework of the fight against the hacking to the amendment n°8118(*) which would seem to allow « people morals mentioned with the articles L. 321-1 and L. 331-1 of the code of the intellectual property, acting under the rights of which they ensure management " [] to carry out the personal data acquisition ». Thus, if this amendment were retained, it is the opened possibility, for the trust companies of the royalties to be used for itself of IP addresses (indirectly personal) to obtain information on the people operating on the networks and particularly within the problematic framework of the P2P.119(*)

B- Directive 2002/58/EC and the LEN

Directive 2002/58 be to replace directive 97/66120(*) and to specify and reinforce, in particular, in the sector of the electronic communications right to the life deprived in the data processing in personal matter. It should be the subject of a transposition in the national law through the law on the numerical economy.

1 - Directive 2002/58/EC

One will study some provisions of this one for then seeing how and when they can be applied in France.

This directive has as an aim principal to protect the personal data121(*) in the electronic communications when it states that it: «applies to processing the data in personal matter within the framework of the supply of services of electronic communications accessible to the public on the public networks from communications in the Community ». 122(*)

However, if one considers the definition of « communication », it is about « any information exchanged or conveyed between a finished number of parts by means of a service of electronic communications accessible to the public. That does not include/understand information which are conveyed within the framework of a service of broadcasting to the public via an electronic communication network, except insofar as a bond can be established between information and the subscriber or identifiable user which receives it ».123(*) And in the case which concerns us of installation of systems of DRM, cannot one see in this definition the protection of a service of music in line in remote loading ? Indeed, one can consider that there is a substantial bond between the information transmitted by the user and the reception or remote loading of the musical file ? Same manner it seems to us that that can be the case within the framework of a service of purchase/film hiring on Internet for example. Thus, general protection resulting from directive 95/46 would be to some extent reinforced sectoriellement.

The bringings together and reinforcements in terms of data protection with directive 95/46 are numerous. For example, as regards data, article 6 (E) of directive 95/46 specifies « The Member States provide that the data in personal matter must be preserved in a form allowing the identification of the people concerned for one length of time not exceeding that necessary to the finality for which they are collected or for which they are treated later on » whereas article 6 of directive 2002/58 EC indicates as regards traffic « The data relating to the traffic concerning the subscribers and the users treated and stored by the supplier of a public network of communications or a service of electronic communications accessible to the public must unobtrusive or be made anonymous when they are not necessary any more to the transmission of a communication ». The similarities are large ; directive 95/46 covering in fact the whole of the obligations imposed on Directive 2002/58.

These provisions also present and are reinforced within the framework of the confidentiality of the communications when article 5 states that « Member States (...) prohibit with any other person that users to listen to, intercept, store the communications and the data relating to the traffic y related, or to subject them to any other means of interception or monitoring, without the assent of the users concerned except when this person is legally authorized there (...) ».124(*)

Moreover, it is interesting to raise that the CJCE is, recently, pronounced on a purely prejudicial basis on the direct effect of certain provisions of directive 95/46/EC, which fixes the applicable general framework as regards protection of the private life. However, it admitted that certain provisions were stated in a sufficiently unconditional way and specifies to be able to be called upon by a private individual and to be applied by the national jurisdictions. Also, with Caroline Carpentier, one can wonder about the possibility of applying the same reasoning, by analogy, with the provisions of directive 2002/58/EC, which could be also seen recognizing a direct effect in so far as they answer the conditions fixed by jurisprudence.125(*)

2 - The LEN

The LEN126(*) has for main goal the transposition of European Directive 2000/31/EC of June 8, 2000 on the electronic trade. This law also aims at partly transposing European Directive 2002/58/EC from July 12, 2002 on the personal data protection in the electronic communications.

May 13, 2004, the senators adopted, following the equal Joint Committee and after the examination in public by the French National Assembly on 6 last May, the bill for confidence in the numerical economy127(*) which specifies, in particular, the obligations of the people receiving benefits.

Indeed, if at the beginning weighed on those on a general obligation of monitoring, the senators reconsidered this provision and the people receiving benefits are henceforth subjected to no general obligation to supervise information which they transmit or store. Nevertheless, the judge will preserve the possibility of imposing such a measurement of monitoring, targeted and temporary. 128(*)

The notification with the FAI or the shelterer becomes obligatory becoming of this fact an obligatory stage before a possible action at law.129(*) It obliges to notify before seizing the judge. The deputy minister considers that is to the person receiving benefits to decide if it takes action pursuant or not at the request of withdrawal of the denounced contents, and to find itself then if necessary in front of the judge if it does not take action pursuant.

In the same way, the initial provisions concerning filtering of the contents they were also modified. The text provides that « the legal authority can prescribe in summary procedure or on request (...), all measurements suitable to prevent a damage or to put an end to a damage caused by the contents of a service of communication to the public on line ».130(*) The most convincing example of application of this measurement being the fight against the illegal exchange of musical files on the Web sites or the networks of P2P.

However, already, of interpretations different from these measurements divide the industry of the disc and the Association of the Suppliers of Access and Services Internet (AFA). Herve Rony « fear that the FAI are useful of this modification131(*) for saying only, if the legislator removed this provision, it is that it had itself of the hesitations on the fact that measurements of filtering could have a direction. They will use that to justify their alleged impotence to set up the measurements requested by a judge ».132(*) Whereas the AFA interprets the text like the suppression of «the possibility for the judge of ordering with a supplier of access to block the access to contents on line by its subscribers (...), the Senate «having made the choice rely on the capacities that the legal judge draws from the common right». 133(*)

It will be also noted that the concept of public communication of the article 1st was modified compared to the text forwarded to the senate and that it is refers to « the exercise of this freedom can be limited only in required measurement, on the one hand, by the respect of, freedom and property of others, the pluralist character human dignity of the expression of the currents of thought and opinion and, on the other hand, by the safeguard of the law and order, the needs for national defense, the requirements of public utility, the technical constraints inherent in the means of communication, like by the need, for the audio-visual services, to develop the audio-visual production » and to continue by specifying that « the audio-visual services include/understand the services of audio-visual communication as defined in article 2 of this law as well as the whole of the services placing at the disposal of the public or a category of public of audio-visual, cinematographic or sound works, whatever the technical methods of this provision ». 134(*)

The reference to the protection of the royalties being seems T it limpid insofar as it is well specified that it is a question of protecting from audio-visual works, cinematographic. It is well here the starter of a parallel with the concept of protection of works through technical measurements such as they will be enacted through the bill on the royalties.

Section 2- Between US Rights and Export

It seems to us interesting to consider the American approach, on the one hand because the United States was equipped, very early, of a legislation in this field and that its approach in term of royalties is different from the vision European and more particularly French.135(*) Moreover, the American example seems to us to be most suitable insofar as most of the actors of the management of the contents on line proposing solutions already or having developed techniques of DRM are benches there what will enable us for this reason to consider the transfers of data flow towards this country and the implications that that can have in term of attack to the respect of the private life.

§1- the United States and the DMCA

One will approach here the US attitude with respect to these difficulties related to the control of New Technologies. The United States enormously implied itself in these problems of the royalties. Indeed, already in 1995, a White Paper136(*) recommended that the Act Copyright is amended and that one inserts there provisions prohibiting skirting of average the techniques being used to protect works.137(*) Thus, following Treaty OMPI of 1996, American will obtain a tool for protection by adopting the DMCA in 1998.

In this respect, one will lean obviously on the protections offered by article 1201 of the DMCA which aims technical measurements more particularly.138(*) More precisely, the DMCA sanctions the act of skirting as well as the preparatory activities. Three infringements hitherto unknown as regards copyright are created by the American text:

- the skirting of technical measurements which control the access to the works protected by the law ;

- manufacture, distribution and diffusion of devices or the provision of services aiming at circumventing the systems of access control ; 139(*)

- manufacture, distribution and diffusion of devices or the provision of services allowing the skirting of technical measurements of protection of the rights of the authors. 140(*)

Thus, it seems that the problems which interest us in Europe are similar in the United States. Indeed, this legislation which extends the protection of the copyright beyond work involves de facto a reduction of the use potential which each user can make what would seem to be against the doctrines of fair uses such as it was desired at the beginning.141(*)

The equitable use of a work not becoming of this fact almost more possible while at the same time like daN L. Burke says it « the uses off intellectual property law is always has balancing act between Al the greatest number off people to enjoy works At low cost, without lowering the cost so much that the works will never Be created in the first authority. Indeed, this balances is constitutionally mandated in the United States, where the constitution provides Congress with the power to enact copyright laws only yew such laws «promote the progress off science and the useful arts» ». 142(*)

If it is true that the author must obviously preserve rights on his works, that should not inevitably be done with the exclusive detriment of the user by breaking this fragile balance. It is besides well what D.L. Burk says when it affirms that : « [T] He employment off the anti-circumvention statute to date should as have something off surprised. The record suggests that the anticircumvention right was intended by Congress have has shield rather than has sword, intended have has means to prevent wholesale misappropriation off copyrighted content, rather than have has means to extend content owners' exclusivity to cover adjacent, uncopyrighted technologies. Yet the boxes brought by rights holders thus far, cuts been characterized by has decided lack off anything resembling «piracy» gold unauthorized copying ».143(*)

Similar to Directive IP Enforcement, at least in the spirit, the United States is also studying a bill144(*) which would facilitate the penal continuations against the hacking. The senator Leahy entitled « Protecting Intellectual Rights Against Theft and Expropriation Act off 2004 »145(*), and permetrait « [to] let the Justice Department spins civil lawsuits against file swappers ».146(*) it would envisage in particular a lightening of the burden of proof when it indicates « IN GENERAL The Attorney General may has civil action in the appropriate United States short district against any person who starts engage in conduct constituting year offends under section 506. Upon proof off such conduct by has preponderance off the obviousness, such person shall Be subject to has civil penalty «. 147(*)

§2- contracts of transborder flows

These problems, in particular, were evoked in a working paper of the Group of Article 29148(*) in June 2003. Indeed, the provisions of articles 25149(*) and 26150(*) of Directive 95/46 on the personal data protection impose, in particular, these measures to the framework of transfers of these data in countries non-member of the European Union.

Moreover, following the first report/ratio at the Commission on the application of Directive 95/46 in May 2003151(*), the Director of the Domestic market DG questioned himself and indicates in a note that « certain indicators obviously give to think that many transfers not - authorized and possibly illegal take place towards destinations or recipients not guaranteeing an adequate protection. One of these indicators [being] the very limited number of received notifications of the Member States pursuant to article 26, paragraph 3 of the directive: «although there are other possible means of legal transfers that article 26, paragraph 2, the number of received notifications is ridiculous compared to what one could reasonably expect ».152(*)

Also, of measurements likely to facilitate the diffusion of information will be taken : for example, if « directive 95/46/EC does not make obligation at the Commission to inform the Member States of the notifications received under the terms of article 26, paragraph 3. The Member States are urged to inform the European Commission and the other Member States of any granted authorization. Nevertheless, the Commission departments will alert the Member States and the authorities in charge of the data protection of these notifications so that the interested parties can contact the authority of qualified notification and obtain all information necessary directly of this one ».153(*)

The recourse to the contractual clauses is also a possibility. For the United States, these contractual clauses are not, generally, necessary in the case of a transfer of data to American companies adhering to the principles of the «sphere of safety» (safe harbor) published by the ministry for the trade of the United States.

However, have regard with the importance and the sensitivity of information, this principle is checked by the national authorities such as the CNIL and the Group of article 29 also emits within the framework of the mission which to him was entrusted opinions. In this respect, one will follow with interest the evolution of the discussions which take place on the problems of the personal data contained in the files of passengers (PNR). Indeed, since March 5, 2003, the European airline companies transmit these data to the American authorities. However to follow the successive opinions of the group of article 29154(*) these transfers are not satisfactory ; the position of the CNIL being it similar insofar as it considers that « the transmission of the data contained in the PNR with the American authorities constitutes a diversion of finality of the data-processing treatment insofar as they were collected at commercial purposes and not for reasons of safety ».155(*) It also specifies the fact that « certain information appearing in the file of reservation of a passenger is likely to reveal with a third of the data likely to attack the private life of the people concerned. The route of displacements of a person, the name of her travelling companions, his telephone number can concern its private life. It is even more the case of the data which can reveal the racial origins or the political opinions, philosophical, religious or manners ».156(*) It finishes by referring to article 26 of directive 95/46 and by indicating that the United States does not offer an adequate protection of this information. 157(*)

Also, in the light of these difficulties of processing personal data in an identified context, one can wonder what it will be on the level of the management of the DRM. Indeed, the services suggested to the users will have to be in conformity with the whole of the legislations in place and in particular the European legislation and to give a report on contract of transborder flows of data respecting these intentions imperatively so that the sedentary and commercial mistakes allowing the crossing of the files, the resale of those can be authorized only within the limits of legality.

Companies will have, in any event, if an adequate protection is not established to draw up contractual clauses which can, through the application of an exception of article 26, to substitute and offer sufficient guarantees to carry out the known as transfers to third countries. The Commission thus proposed certain models of contractual clauses158(*) being obligatory allowing the companies on the matter to respect their obligations. 159(*)

Chapter 2- DRM in practice

The installation of a system of DRM is based at the same time on the control of the architecture of the system but also on a contractual development necessary to the appropriation and the diffusion of the system near the various speakers and users.

Section 1- Approaches Technical and functional

The development of a project allowing the distribution of digital components on line necessarily rests on a consequent technical infrastructure in which all the aspects related on the confidentiality, the transactions, the rights of the users,... are found. This one is related to partnerships established and developed with various partners (IE : house of disc) then allowing him to present and distribute the whole of the various contents to the users.

§1- technical Architecture

The major difficulty of installation of a functional architecture of a system of DRM lies in the fact that it must be : « divided in three areas: content creation, content management and content use. Content creation includes the creation off the media and defining the rights. Content management is content butt distribution and trading off the rights. Finally, content use is used to enforce that rights are adhered to and to track content use ». 160(*)

Also, it is a question of controlling at the same time the whole of the chain but also the whole of the speakers so that the system is most transparent for the users because it is one of the keys to success. 161(*)

One will be satisfied here to evoke some possible architectures suitable for the installation of a system of DRM.

With- Architecture DRM using PKI and Watermarking

The experiment undertaken by the researchers of Université of Finland east to our direction a rather complete response to the deployment of a system of DRM. Indeed, on the basis of the report first that any inviolable system does not exist, they succeeded in establishing a balance which seems to us interesting to study.

Figure 5 : Example of architecture DRM162(*)

Their step rests on a model of distribution of contents. In this one, and such as that is represented on the diagram above, the process can break up into several stages :

- the licenses are related on the user and not to the terminal, in fact the hardware, the computer.163(*) The direct benefit being that the user can have access to the contents indifferently support considered. It suffices for this one to establish a connection network and to obtain the license164(*) since a waiter165(*) ;

- « player » identifies the protected contents and acquires a license to be able there has to have access. Architecture used is provided by a Public-Key Infrastructure (PKI).166(*) The only services used of the PKI are the creation and the revocation of the certificates. In this direction, they use the X.509 certificate167(*) at the same time to buy and sign the license168(*) ;

- The contents are protected using two methods : asymmetrical cryptography169(*) and a process of watermarking.

Thus, before letting the user have access to the contents, it « player »170(*) checks if the license is valid and if the user has well the private key corresponding to the certificate contained in the license.

If this method is not completely inviolable171(*), it does not remain about it less than the efforts of the user are negligible and than the transparency for him is rather large what remains like underlined it many authors one of the keys of the success of deployment of the DRM.

B- An integrated system : Windows Media DRM

The system conveyed by Microsoft, Windows Media Rights Manager (WMRM) is appreciably similar to the preceding example.

Figure 6: Windows Media DRM Structures172(*)

The operation of the WMRM has as a principle of being able to read a file protected only after the user acquired a license containing a key allowing him « déprotéger » contents of the file so if it is a question of a song for example of being able to listen to it.

This key is stored in a encryptée license which will be distributed separately. Other information is added to the file as the URL where it is possible to acquire the license for the contents. The user connects himself then to the waiter of license to acquire the license necessary and to allow his authentification.

One includes/understands the stakes related to the supply, out of standard, of a system including/understanding one « player » such as Windows Media Player what is the case for Windows XP. European Commission A included/understood well besides, it which has just condemned Microsoft to carry out some changes : « With regard to the bound sales, Microsoft will have, within 90 day, to propose to the equipment suppliers a version of his operating system Windows for PC customers not including/understanding reader WMP. This corrective measurement, which puts a term at the bound sales, does not mean that the consumers will obtain PC and operating systems without multi-media reader. The consumers buy, for the majority, a PC with an equipment supplier who already grouped, for their account, an operating system and a multi-media reader. The effect of the corrective measurement ordered by the Commission will be that these grouped sales will be configured according to the wishes of the consumers, and not of choices imposed by Microsoft. Microsoft preserves the right to offer a version of its operating system Windows for PC equipped with reader WMP. It will have however to abstain from resorting to any commercial, technical or contractual means resulting in making less interesting or less powerful the nondependant version. In particular, it will not have to subordinate the reductions which it jointly grants to the equipment suppliers with their purchase of Windows with reader WMP ». 173(*)

An innovation of the system of DRM from Microsoft recently was born : baptized « Janus », this system complementary to DRM integrated to WMP, allows inter alia, and in particular for the accessible digital components on line, to mark/tattoo the numerical files while applying to him « an indelible scratch date, even in the case of a transfer to a reader mp3, a secondary computer, etc Once this exceeded date, the file will become inoperative where that it is ».174(*)

§2- Functional architecture

One will endeavor here to try to account for the experiments in progress, in particular within the framework of the provision of the users of services of remote loadings of music on line.

Within this framework, interest not being to make a review of the whole of the actors but rather to try to apprehend various experiments through various forms and economic models.

Thus, one will be delayed on the services provided by iTunes175(*) of APPLE, as a manufacturer and a distributer of computers but also of cultural services in lines then an alliance of circumstance between two houses of disc, in fact EMI and BMG176(*) and a platform of P2P Wippit177(*) for finally being delayed on a distributer of contents which feed several services with the request, OD2. 178(*)

With - APPLE- iTunes

In April 2003, APPLE announced the provision of its shop in line iTunes which makes it possible to download a song for 99 hundreds.179(*) Files downloaded under standard AAC in MPEG-4 to which APPLE has associate certain DRM who did not exist at the beginning under this format. APPLE refers to this technology under the term of FairPlay framework180(*) and explains why for this reason « The iTunes Music Store use FairPlay, Apple' S new digital rights management system that' S designed to Be to fair to the artist, to the record companies and to you. In A nutshell, your FairPlay agreement entitles you to play your music one up to three computers (and enjoy unlimited synching with iPods), Al unlimited burning for individual songs and lets you burn unchanged playlists up to 10 times each «. 181(*)

One will also find on the site of APPLE various other information concerning the possibility offered to use the files downloaded on several computers (Macintosh). Indeed, it is enough quite simply with the user as that is clarified to authorize the computer to play the song with this intention while entering a name of user and a password. This identification is made by Internet and if one does not know any more about the process used it could act, as suggests it Daniel Semaya : « Possible It is that it use single hardware information drank even APPLE admits in their to develop documentation that there is No universal to identify for Al Macs ». 182(*)

Once again, the goal seems T it, at least initially is not to set up techniques extremely sophisticated of GDN but rather of miser on a certain philosophy what Steve Jobs indicates clearly when it indicates in Time that « Piracy is has behavorial resulting, not has technological one ».183(*) However, one will note that John Johanssen has, in November 2003, seems T it « developed a new software tool allowing to download free mp3 since APPLE Music Blind, (...) «QTFairUse» thus avoids with the Net surfer having to discharge 99 the hundred lawful ones per downloaded piece ». 184(*)

B - BMG and Wippit185(*)

The nature of the offer suggested by BMG is D `as much more interesting than it makes it possible to foresee the impact of often décriés networks P2P.

Offer, for the moment exclusively reserved to the British users, of part of its catalog186(*) in access by paying remote loading, which is carried out by the means of an access to the Wippit platform where are lodged the musical files, on an annual basis thus allowing a right remuneration of having the rights.

Then, the division is carried out via the P2P when the whole of the Net surfers stored the pieces bought on their PC. On the other hand, it is impossible to exchange, via Wippit, of the pieces downloaded on the platforms such as Kazaa, eDonkey, etc

The catalog of BMG is subjected to the usual economic model of Wippit. Maybe, for 30 books per annum, of the unlimited remote loadings of files to formats MP3, wma, midday, wav, the possibility of transferring them from the computer (Mac and Linux are excluded) towards a walkman. A restriction however : the user will be able to engrave the pieces only three times on CD. It is also the case for the pieces of EMI. Moreover, EMI, also negotiated purchasing possibilities to the unit of the titles of its catalog, to 50 pence the piece, apart from the monthly or annual subscription.187(*) The equivalent of the 99 hundreds per title on iTunes.

The system functions according to the following model : « Wippit use has whitelist system where only approved material may Be swapped. Content Al is recognized by has off combination ID3 tags and checking using Cantametrix MusicDNA technology. Every song edge Be analyzed and identified even yew the name have with it is incorrect ».

Figure 7: Wippit DRM188(*)

This system uses one « waveform analysis and psychoacoustic modeling technical to identify songs [And] MusicDNA maintains has database off fingerprints off tracks that are approved for sharing one the network; only those tracks edge Be shared among Wippit subscribers ». 189(*)

Wippit also allows, as Figure 8 shows it to define certain rights associated with the media to be downloaded.

Figure 8 Wippit DRM restrictions190(*)

One will read with interest the white paper of Bill Rosenblatt191(*) in whom one will find the whole of the stakes concerning the DRM and the P2P. Opposé at the beginning, for much, they can become a tool with the services of the market if they profit from a sufficient interworking as of other measurements of balance of which we posed the stakes before.

In the example below, it « peer content P1 makes item C available have share off has repository though has paid-subscription service. When to use P2 obtains the object, it should cuts coil-contained functionality to retrieve P2' S identity, send it to has service for checking that P2 is has subscriber to P1' S service, and then receive A license L from that subscription service that enumerates the rights to which P2 is entitled ». 192(*)

Figure 9: Two peers in A peer-to-peer architecture with content DRM-packaged. Content The C has functionality for accessing Web services. The Authentication Service authenticates P2' S identity, and the License Service exits has License L for P1' S content C. 193(*)

It is an illustration of the possibilities and difficulties related to the installation of the DRM and standard languages associated such as ODRL or XrML with in particular the crucial importance of RELs associated : « RELs important are especially in Superdistribution networks. If P1 master keys summons content to P2, then P2' S rights to that content need to Be has off subset P1' S rights, and yew content P2 master keys the same to P3, then P3' S rights need to Be has subset P2' S off -- however, yew P2 gold P3 want additional rights, they need to Be whitebait to define them with precision and acquire them from the original IP owners. With properly designed REL enables this ». 194(*)

However, and in spite of the whole of the developments and agreements which were set up, one can legitimately put the question to know which is the legality of a platform of the type BMG/EMI/Wippit taking into consideration royalty. Indeed, if one refers to the concept of private copy suitable for the French right, one knows pertinently that the copy should not be intended for a collective use. It is thus necessary to deduce from it a private use, i.e. reserved for the private use. Moreover, the number of copies carried out will be considered by the courts an index of the nonprivate character of the copy. However, in the species a user can, as from the moment when it paid one « royalty » to reach the files to put them in division for users having subscribed themselves to a subscription. One will wonder about the fact of knowing, and a fortiori it is not the case, if it is about a private use !

The logic which would prevail thus would be that of a new model where the rights of each user would be related to a deprived community inside which having the rights would authorize, because of a lump sum payment, with a division of the files.

As, one will follow with attention the developments of a decision of the Canadian federal court of last 31 March, namely as the remote loading of MP3 was covered by the exception of the copy deprived in royalty Canadian. Article 80 indicating : « (1) Subject to the paragraph (2), does not constitute a violation of the royalty protecting as well the sound recording as the musical work or the service from a musical work which constitute it, the fact of reproducing for private use the integrality or very great part of this sound recording, this work or this service on an audio support ». Moreover, it would seem for the judge that the fact of placing at the disposal in a file files for submission to third, third which would come without the knowledge of the owner of the files would make it possible to deduce an absence from intention of distribution of these files, no positive act not having been achieved by the owner of the aforesaid file.195(*)

In the same way, a decision of the court of Haarlem in the Netherlands on May 12, 2004 débouté the local equivalent of the RIAA of its request to prohibit the search engine of files MP3 Zoekmp3.nl. Indeed, the precise judge in this decision, that the remote loading is not illegal, when it indicates : « the legislator stipulates, in comparison with the current law on the royalties and the law on the additional rights, as well as the directive [European] and its project of transposition, that the copy for private use (in this case by the means of remote loading) of a contravening/illegal file MP3 does not constitute a violation of the aforesaid the law... it can be question of fraudulent act only if the user of the downloaded file multiplies it or makes it available ». In other words, only the upload would be illegal for the Dutch judge. It will be necessary to await the decision in call to have more precision on the effects of this decision. 196(*)

C - OD2

OD2 is a European company whose principal interest is to incorporate contents of artists and labels different and to make them distribute on Internet.

According to CEN/ISSS, it offers approximately « 100,000 tracks from major labels EMI, BMG, Warner Music and has number off independent labels ". 197(*)

In term of safety, OD2 offers a service of Management of the numerical rights (DRM) based on the version7 of the software of management of the Rights of Microsoft198(*) ; allowing by there the choice of a range of option in term of distribution and listening and ensuring an internal and external protection files of contents thanks to the last techniques of security and encryption.

In this respect, it will be noted that the various labels can according to their policy interns to choose among a panel (Figure 10) the rights associated with the various users of the contents.

Figure 10: Rights Users OD2199(*)

It will be specified that moreover, it also offers to its partners ancillary services and in particular an information system making it possible the labels to follow the sales uninterrupted and proposing the information detailed on the transactions. 200(*)

Figure 11: Structure OD2201(*)

The list of the unit their customers in Europe shows that their step were already accepted per a many actors and not of least.202(*)

One will await launching from here July of two offers, one coming from Sony with Sony Connect203(*) and that of Fnac with Fnacmusique.com204(*) which will be ensured of the services of MPO OnLine whose principal objective is to directly compete with the services of Virgin Megastore205(*) ( Virginmega.fr) and Universal Music ( E-Compil.fr). 206(*)

Thus, one can say, that the installation generalized of system of management of the numerical rights will be done in two times : the first time being that of discovered and the tests of various solutions through medium Internet, with models diversified such as those developed by APPLE, OD2, BMG, etc207(*)

In parallel, the initiatives coordinated and complementary to industries and distributers in the sector of the traditional sale will allow short/medium term to make evolve/move the whole of the equipment so that they are in conformity and adequacy with the pilot experiments of management of the DRM on Internet.

When these stages are committed, the management of the numerical rights will spread and allow thus the new models economic of sale of the cultural goods to develop. 208(*)

Section 2- Approaches contractual and financial

One will endeavor to plan different the existing formulas today on the market in order to appreciate the stakes and waitings of the customers in term of management and diffusion of contents for then evoking the new possibilities of remuneration of the authors through a system of DRM.

§1- CGV in force

Practically, to be interested at present has some of the various offers available on the market can enable us to have a more precise idea in the way in which the DRM can interact with the consumers and what they bring as well in terms of right of access as of restrictions.

One will with this intention try to study the most largely possible accessible CGV on the sites and to withdraw from them the lesson which is essential in particular taking into consideration de the rights on the files and the costs associated with those.

With- the associated rights

More generally, the question raised by the sale in line of digital components and in particular of works raises the question of the rights of the user.209(*) It becomes necessary and desirable to specify the contents of the legitimate use of a work by the owner of « support » except considering that one directs oneself towards a right of access requiring a more specific mode.

1- Right of reading

The whole of the studied gates functions with a reader Windows Media Player210(*) and only in one environment PC except obviously iTunes which if it functioned only under APPLE/macintosh until recently is now, also, available under PC.

It will be noted that Digifnac211(*) also offers it, exclusively, of the remote loading under format WMA of share his partnership with OD2 while at the same time since years the whole of the titles in access on its site in www.fnac.com line for thirty seconds listening is accessible only with the reader RealPlayer de RealNetworks...

Nevertheless one will read in the section « Others » of the Wanadoo offer212(*) that « When we suggest you «using the reader Media Microsoft version X», etc - we do nothing but recommend the tools best adapted to the reading of the titles. We do not make any promise or guarantee as for the performance of these tools. Any complaint on these tools must be made with their editor ».

In the same way, associated to reader WMA, the service remains inoperative under navigators such as Netscape, Opera, Firefox what obviously seems to restrict as much possibilities offered to the consumers who will have to be « compatible » and « counsel » Microsoft to have access to the whole of these services. 213(*)

One will not study here Rhapsody214(*) DIGITAL Music Service, subsidiary of Realnetworks which proposes a whole of services and a player different from that of Microsoft. However, it will be noted that according to Grandlnk215(*), RealNetworks saw the use of its service of music in Rhapsody line growing of 14% in February 2004, with more than 48 million titles diffused with the request, that is to say an average of 1,6 million titles per day.

Rhapsody proposes a catalog of more than 600.000 titles to the diffusion, of which 500000 can be downloaded with the unit with the tariff of 76 hundreds. At December 31, 2003, RadioPass and Rhapsody counted 350.000 subscribers, against 250.000 to September 30, 2003 and 75.000 to December 31, 2002.

2- Right of engraving and transfer

The CGV of e-compil216(*), service of Universal Music One Line indicate that the offers of remote loading in line of music are the subject of a license which allows to carry out an engraving on a support of the type CD-R and 3 transfers on portable peripherals. 217(*)

The policy of OD2/MSN218(*), gate emblematic of Microsoft, indicates well that the titles are supplied with a protected license which enables them to function only on the computer on which they were downloaded. But the number of possible engraving nor of transfer does not specify precisely : « You however can, for the majority of them, to engrave them on CD or to transfer them on a numerical walkman ». 219(*)

The services offered by OD2/Wanadoo/MTV220(*) and offer OD2/Wanadoo221(*) indicate, clearly, that it is not possible of : «to make copies of the titles listened in « streaming » neither by safeguarding them on your hard disk, neither by engraving them on ROMANIAN CD, nor by transferring them on a numerical walkman, etc... On the other hand, the engraving and of numerical transfer on walkmans of the titles in remote loading are authorized a certain number of times. In order to know this number, follow the bond «Rights» associated with each title. You cannot either copy the titles to offer them, sell them, rent them, diffuse them, send them or give them to friends, with your family..., nor with very an other person ».

Fnac digital222(*) indicates that the license allows a transfer « on your assistant or numerical walkman, but not on another computer. This license must systematically accompany file WMA so that the corresponding song can be played by Windows Player media ». 223(*)

At Numéricable224(*), the conditions are also rather vague insofar as they specify that if « All our music is supplied with a protected license which enables him to function only on the computer on which it was downloaded. In certain cases, you can engrave it on a CD-R or to transmit it to a numerical walkman but you will not be able to copy it from another computer ».

The offer suggested by Wallmart indicates that if one wants to listen to the titles downloaded on Wallmart after having bought a new computer, it is necessary beforehand to have made a copy of the titles and licenses corresponding and to transfer them on your computer. This option of « back up » of the licenses being done through Windows Media Player 9. This possibility of back up is possible on two computers in addition to that used.225(*) Moreover, it makes it possible To engrave up to 10 times the downloaded titles.226(*) The transfer to walkmans compatible with WMP is unlimited. 227(*)

iTunes proposes when with him a possibility of engraving the titles on CD and in the case of of listening to them on iPods (wandering APPLE) in way unlimited a personal use and allows a transfer of those on three computers PC or Macintosh. 228(*)

Like iTunes, Wippit makes it possible to the users to engrave the various titles downloaded on from CDs and to transfer them on walkmans. Moreover, Wippit allows the setting in division of the whole of the files downloaded within Wippit.

As we have just seen it, the offers are varied and are right also associated. One will however note a flexibility in the offers coming from US which are more flexible in their policy. Moreover, the provision of a customer service, accessible via mall and telephone number will allow, at least in posting, to have better a priori user point of view of.

3- geographical Restriction

At Numéricable229(*), « certain titles can be compelled with geographical restrictions, which, unfortunately, will prevent certain people from buying them. That arrives when we were not authorized to sell certain songs in certain areas. We check that you can buy the music which you want before you add it to your basket. You will not be output for a title which you cannot download ».

DigiFnac associated with OD2 explains it also this geographical constraint exists and that it is : « directly related to the respect of the royalties and the producers of music. Indeed, certain songs suggested in the store of music in remote loading of Fnac.com can be distributed in all legality only near Net surfers located in certain very precise territories, other than very other. Such a territorial restriction is comparable with the zoning of the DVD which frames the conditions of distribution of films on this support ».

In the same way, for the moment, the offer of Wallmart is available only for the people lying in one of the 50 states of the United States. 230(*)

The restrictions are for the majority of the services offered reserved to the country of issue of the offer insofar as partnerships were negotiated in this direction.

4- Right on the licenses
4.1- Expiry of the licenses

At Numéricable231(*), it is astonishing of being able to read that : « The license remains valid as long as you are subscribed with a valid service. However, if you stop subscribing yourselves, the license will expire after a certain number of days and you will not be able to listen to your remote loadings any more ».

A recent development of Windows Media Player should make it possible the editor to integrate a new DRM. This one should normally give : « the possibility of integrating into an audio file a kind of internal clock which will be fixed over the duration of the subscription of the users to service MSN Music. As soon as the subscription of the user expires files WMA are more readable, neither on its PC, nor on its audio walkman. To reactivate the reading of the downloaded files it will then be necessary to continue or start again its subscription and to carry out a synchronization between the walkman and its PC ».232(*)

At Wallmart one will note that after the purchase, the license of activation is valid during 120 days but as soon as the title was heard once, there is no limitation in time.233(*)

A great difference between France and the United States is the absence with US of adequacy between the subscription and the right on the bought files. Besides one will wonder in it measure it is not a clause « abusive » in the direction where that does not allow a use adequate and proportioned files which finally remain some share « intrinsic property » of the suppliers and their labels.

4.2- Loss of license

At Numéricable234(*), the possibility (after formatting of a hard disk for example) of recovering the licenses is possible since you : « you identifies [Z] as a holder of the license (what will be done while answering the questions of the phase of inscription). It to you will then be given a duplicate of your license. There is a limit with the number of specimens of a license of which you will lay out (this limit is in general 3, but it is fixed by the houses of discs and can vary from one title to another) ».

The policy of Fnac on the matter through OD2 is that you235(*) will be needed : « to authenticate as a holder of the license validates on this song. Once duly authenticated through some questions concerning the jukebox which you created, a new license will be automatically downloaded to you on your computer. Caution: according to the agreements with the labels, you are authorized to download this license in general only one second time, with the title of the backup copy ! ».

At Wallmart, chain of supermarkets in the United States, it is specified that if `lon loses a song for example, one can Re-download it to the maximum three times. On the other hand, if this number is reached, « you will need to contact one off our Customer Service ace by sending year email to musicdownloads@walmart.com, but by calling 1-800-222-8132, available 24 hours has day, 7 days has week, who will determined possible yew it is to restore the song file ».236(*) This last solution is also proposed at the time of a reinstalment of the system of your computer insofar as if the files could be restored it still misses the licenses.

As a whole, one can say that there are overall similarities in the manner of managing the licenses and their possible losses. The policy being at least of two with an established maximum with three times.

5- Right of Listening

At Numéricable237(*), in certain cases, it is possible that with « certain remote loadings S [oient] assigned restrictions by the holders of rights (houses of discs). That relates to the free remote loadings in general. The screen of the details titles will then indicate the number of readings to you to which you have right ».

In the same way, certain remote loadings comprise a restriction of the number of days during which you will be able to listen to the title; this is indicated on the screens of details of the titles. After this period, you will not be able to play the title any more. There is also the case where the title cannot be played any more after a cut off date .

This policy will be also pursued by Fnac for : « certain songs in free remote loading (...) proposed on a purely promotional basis with the direction where you can listen to them only during one number of days limited, or for a number of listenings limited or until a deadline ».

The restriction of the rights to listening seems in the studied offers to be reserved in France for free titles. One can wonder whether this model is relevant. Would not be worth it to better give a right of listening in « streaming » free him without possibility of copy without giving an access in remote loading which could be capable to frustrate the user at the time of later listenings. Indeed, it would be tiresome for the consumer to have, with each piece among the unit it « playlist » that it was constituted, to check the rights associated with the file.

Recently, as we already specified, Microsoft announced that it planned to set up a system DRM in its MSN Service Music. This one, entitled «Janus enables songs distributed under has subscription model to portable Be transferred to devices, with has built in «time bomb» that enables songs to expires in the vent that has customer' S subscription lapses ».238(*) Thus, the model which could prevail and begin this autumn, will be that of the subscription with the chart via various people receiving benefits. Moreover, the use by Microsoft, like APPLE of a format owner will reinforce the seizure of industries on the future standards.

B- Associated DRM and costs

The costs associated with the distribution with the contents on line are, in the examples which we had the occasion to treat distributed in two principal forms : the subscription where the purchase with the unit.

1- A the Unit

For APPLE and iTunes, the price is 0,99$ per downloaded title and the price of the albums varies according to the groups. For Wallmart, it is the same principle but the price of the title is to 0,88$. 239(*)

One will note that if the purchase with the title remains, in spite of his price of low calls to US, rather expensive. But there still, the modes of consumption changed and it is according to the choices of each one. If the ones prefer to discover the whole of the album and not to restrict itself in the choice of a single title they can always do it and the reverse is true. Thus, a flexibility in function use of the needs for each one allows this adaptation. More generally, it would seem nevertheless that one directs oneself towards a model « with the access » of consumption of cultural goods.

2- Subscription

The concept of subscription seems to be in the middle of the European offers ; it privilege the monthly subscription which seems according to the offers to offer a good quality ratio/price if the Net surfer takes time to compare in fine the whole of the offers which are proposed to him.

One will note the important found variation, between the purchase of two CDs via a site of remote loading and a site of E-Trade.

2.1- Monthly subscription

The FNAC proposes two different formulas :

With these offers one can add those done to the members who can profit from a surplus of appropriations according to the selected subscription. The system functions as follows :

- Free : to listen to a 30 seconds extract is free,

- 1 credit : to listen to the title in entirety costs 1 credit,

- 10 appropriations : to download the title for l'écouter as long as you remain subscribed

- From 59 appropriations: download the title, you definitively can l'écouter, to engrave it and transfer it towards a compatible numerical reader.

Numéricable offers when to him another formula of subscription which is formulated kind.

However, if one looks at the average price on the site of a title, the system functions in the following way :

- 1 credit : to listen to the title

- 1249 appropriations : remote loading of an album of 15 titles = 83,2 appropriations per Title (ex : album « Who Of Us Two per M ")

- 1249 appropriations : remote loading of an album of 13 titles = 96,07 appropriations per Title (ex : album « South In North by Cheb Mami »)

- 199 appropriations : remote loading of a title

And, if calculation is made, by album, in the two above mentioned cases one arrives at a price by album and according to the formula are equivalent to :

What remains much less expensive than a purchase in traditional line in a shop E-Trade like Fnac.com or Amazon.fr for example.

2.2- Annual subscription

The offer suggested by BMG via Wippit is a subscription of 30£ (53,8$) per annum240(*) for a number of unlimited remote loading. EMI nevertheless negotiated an offer by title with 50pences (0,99$) not requiring the annual subscription.

2.3- With the chart

Within the framework of the formula known as « with the chart », if one re-examines the prices associated with the various above mentioned albums according to this offer, one obtains the following results :

Also, if it is more interesting at Numéricable to take the formula « subscription » it does not remain about it less than the formula « with the chart » allows a good quality ratio/price when the cost associated with the purchase with one with these albums.

At E-compil, the price with the title is rather expensive but simple in measurement or it acts of a microphone-payment of the audiotel type (1,35€+0,34€). 241(*)

It is seen, the whole of the offers which are proposed propose models having a common base but which is different, are characterized by subtleties as well in terms of costs as of associated rights. Also, it would seem that it is a question, at present, to test various models of incomes and distribution through the various channels which exist in order to better determine waitings and the needs for the consumers/users242(*) in order to propose to them from here some time one or more offers in adequacy with their waitings.

§2- DRM and Rémunération

So that a work of the spirit is protected by the royalty, one needs that it is original, i.e. it is the reflection of the personality of the author, of a clean creative activity. Thus, the author of a work, in French right, has at the same time moral and patrimonial rights243(*) on this one. However, the article L. 122-5 of CPI also fixes and in a restrictive way of the exceptions not requiring the authorization of the author for the user of work.244(*) It will have been included/understood, it acts of « private and free representations carried out exclusively in a family circle » and of « copies or reproductions strictly reserved for the private use of the copyist and not intended for a collective use ». 245(*)

However in compensation of the damage undergone by the have-rights the legislator instituted a remuneration for private copy taken on any support of recording virgin and distributed between having the right of works and services fixed on the sound records or the videograms.246(*) This remuneration being distributed between the manufacturers, the importers and the people realizing of intracommunity acquisitions on the sound and audio-visual virgin supports of recording.247(*) It is about a contractual remuneration function of the type of support whose collection and distribution are made by civil companies of collective management.248(*)

Remuneration for private copy249(*) of sound records being realized by the SORECOP with a mode of distribution of the perceived sums of 50% for the authors 25% for the producers of sound records and 25% for the producers of videograms. COPIEFRANCE deals with perceiving the sums due to the title of the audio-visual private copy. Operation is slightly different in measurement or the scale is 33,33%. The first third going to the companies of authors, the second at the companies of artist-interpreters, the last at the companies of audio-visual producers.

SORECOP transfers:

50% with the college of authors (SACEM-SDRM, SACD, SCAM)

25% with the college of artist-interpreters (ADAMI, SPEDIDAM)

25% with the college of producers (SCP, SPPF, SCPA).

Copie France transfers:

1/3 with the college of authors (SACEM-SDRM, SACD, SCAM)

1/3 with the college of artist-interpreters (ADAMI, SPEDIDAM)

1/3 with the college of producers (PROCIREP/SCPA). 250(*)

As example, the SACEM charges the rights of the authors of music each time there are representation or reproduction of works which it manages. It in particular authorizes, in the form of contracts, the public diffusion of protected works. It is also charged to charge the royalties near the users. The amount of these rights being given according to the service rendered by the music. It is generally about a percentage on the trading incomes when the music is the essential object and of a fixed price when the music has only one role additional.251(*)

With the title of the year 2002, the amount of the boxed rights was 672,4 million euros, in increase of 5,4% compared to 2001.252(*)

Figure 12: SACEM Distribution with having the rights253(*)

The principal mission of the SACEM being to distribute with the authors, adapters, type-setters, arrangers, author-realizers and with their editors the rights which return to them.254(*) The royalties income is thus distributed in the following way: 1/3 is versed with the author, 1/3 with the type-setter and 1/3 with the editor. When this same work is reproduced on CD, an audio or video cassette, a multi-media support, the «keys» of distribution are this time based on an agreement defined as a preliminary between all having them right of work.255(*) It distributed thus, after deduction of the overheads and the funds devoted to the social action and cultural 530,8 million euros.

The installation of a system of management of the DRM, potentially attentatoire with the free right of private copy and thus with the right of the user on the other hand will reinforce the control of the author on the exploitation of his work to the title of remuneration for private copy. Indeed, at present and as indicates it the article L. 311-5 of CPI,256(*) one is in a contractual system of management. However, a system of GDN allows because it is its vocation first to control the use which can be made numerical works and by allowing there the installation of a system of management of remunerations proportional to the number of copies carried out.

Like points out it professor Ginsburg, the right of access would allow a greater currently possible control than that: « The reproduction right, and its corollary, the distribution right, gave the copyright owner control over the making and dissemination off copies, goal ounce has particular Copy was sold, the copyright law did not constrain the purchaser' S further provision off that Copy ». 257(*)

More generally, it is the problems of a change of paradigm with the numerical one which is posed. European Commission A included/understood well besides when it suggests a European legislation on the governorship of the collective trust companies.258(*)

Indeed, it notes that « the domestic market became in a big part the framework for the management and the use of the royalty and the close rights (...) Under these conditions, an effective management of the rights is necessary to ensure the correct operation of the domestic market in this field. Moreover, it should be made sure that the management of the rights adapts to the new situations, as the request increasing for Community license for the use of certain rights and ensures a balance between on the one hand, the necessary protection and remuneration of the authors and the artists and on the other hand, the requests of the commercial users ».259(*)

This request being relayed more and more by significant actors such as Yahoo, OD2, AOL, Cisco which « asked the European ministries for the communication joined together in Ireland on last 22 April, to work with the standardization of their legislations in terms of remuneration of the artists »260(*) so, for example, to allow them in the long term, to launch services of music to Europe.

Conclusion

If the DRM seem to have to impose itself quickly in the management of the contents on line it is necessary nevertheless to have for the spirit of the articles such as « The Darknet and the Future off Content Distribution »261(*) in which it is clearly explained : « There seem to Be No technical impediments to darknet-based peer-to-peer file sharing technologies growing in convenience, aggregate bandwidth and efficiency »262(*) what would start again thus the debate on another model of control defended for example by Encircled263(*) with Olivier Bomsel and Gilles Blanc. The latter, in a rather detailed note, and following Lionel Sobel264(*) assert a different economic model based not on the DRM but rather on asymmetrical tariffing, i.e., a tariffing of the upload by the FAI making it possible to manage thus the whole of problems P2P.265(*)

This assumption, it, having also been raised besides by the CSPLA when it indicates daN its opinion of March 2, 2004, « that certain reflections, which the representatives of the producers and the artist-interpreters are not associated, are currently carried out on the possibility of creating a general system of data-processing print making it possible to check if the exchanges of files on the network are authorized and, failing this, to block, out of any legal procedure, files exchanged unlawfully at the time of their passage by a waiter or a router. (...) it could not however be implemented that after making of a precise legal framework guaranteeing that the attacks likely to be carried to the freedom of communication and the secrecy of the choice of the programs necessary and are proportioned to the objectives ». 266(*)

The debate could thus again enter within the framework of a responsibility for the FAI...267(*)

In the same way, another initiative launched by the ADAMI intends to propose, the development of the legal license. Given that like the right to diffuse, after payment of an equitable royalty, the pieces of its choice among a given unit. This royalty having to be taken on the sales turnover of the FAI. However, of many difficulties remain outstanding and we think that this system related to the urgency would pose more problems and would dilute to some extent the royalty without answering in an adequate way waitings of the unit of the actors. 268(*)

Thus, it is seen, the changes induced by technology work more and more the right and more particularly the rights of the users. And, us arrived here, indeed, in what predicted already a few years ago Jeremy Rifkin, at the age of the access.269(*) Indeed, more and more, one will have access to a whole of specific services at limited lifespan. We are leaving behind us a world where the property prevailed for a world where the services and the rights of user become the angular stone. For some, « cultural industries are adapting to the not-competition and to change model of businesses; by doing this, they will discover new sources of value which will compensate and beyond, the profits which they drew from the physical distribution and the protection of works ». 270(*)

Thus, one includes/understands better this logic of DRM which makes it possible to limit in time and in space according to the various formulas suggested the rights of the become users or in becoming to be consumers of cultural goods lifespan limited.

Appendices

Appendix 1: How C you like music ?

Figure 13 : Music Preferences271(*)

Appendix 2 : Examples of rights associated with Titles of musics on Fnac Digital

Figure 14: Example 1

Figure 15: Example 2

Figure 16: Example 3

Appendix 3 : Examples of rights associated with Titles of musics on the Kiosk with Numéricable

Figure 17: Example 1

Figure 18: Example 2

Appendix 4 : Origin of the rights

Figure 19: Origin of the rights272(*)

Figures

FIGURE 1: DIAGRAM OF A TRANSMISSION MADE SAFE BY SECRET KEY. 7

FIGURE 2 : EXAMPLE OF MARK ON AN IMAGE 9

FIGURE 3: FORECAST OF THE SALES OF MUSIC ON LINE 13

FIGURE 4 : DRM INFORMATION STRUCTURES - RIGHTS EXPRESSION MODEL 15

FIGURE 5 : EXAMPLE OF ARCHITECTURE DRM 43

FIGURE 6: WINDOWS MEDIA DRM STRUCTURES 44

FIGURE 7: WIPPIT DRM 48

FIGURE 8 WIPPIT DRM RESTRICTIONS 48

FIGURE 9: TWO PEERS IN A PEER-TO-PEER ARCHITECTURE WITH CONTENT DRM-PACKAGED. CONTENT THE C HAS FUNCTIONALITY FOR ACCESSING WEB SERVICES. THE AUTHENTICATION SERVICE AUTHENTICATES P2' S IDENTITY, AND THE LICENSE SERVICE EXITS HAS LICENSE L FOR P1' S CONTENT C. 49

FIGURE 10: RIGHTS USERS OD2 51

FIGURE 11: STRUCTURE OD2 51

FIGURE 12: SACEM DISTRIBUTION WITH HAVING THE RIGHTS 64

FIGURE 13 : MUSIC PREFERENCES 68

FIGURE 14: EXAMPLE 1 68

FIGURE 15: EXAMPLE 2 69

FIGURE 16: EXAMPLE 3 69

FIGURE 17: EXAMPLE 1 70

FIGURE 18: EXAMPLE 2 70

FIGURE 19: ORIGIN OF THE RIGHTS 70

Bibliography

DRM


· Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, 148p.


· Daniel Semaya, The Future off DIGITAL Rights Content Management for Distribution, May 30, 2003, 10p.

http://www.cs.princeton.edu/ugprojects/listing.php?user=dsemaya&type=senior


· Austin Russ, DIGITAL Rights Overview Management, July, 2000,

http://www.sans.org/rr/papers/48/434.pdf


· Pamela Samuelson, DRM {AND, GOLD, VS.} THE LAW, Communications off the ACM, April 2003/vol. 46, No 4 p.41-46.

http://www.sims.berkeley.edu/~pam/papers/acm_v46_p41.pdf


· CEN/ISSS, DIGITAL Rights Management, Final Carryforward, September 30, 2003, 253p.

http://www.cenorm.be/cenorm/businessdomains/businessdomains/informationsocietystandardizationsystem/public+interest/digital+rights+management+focus+group/drm+focus+group.asp


· Karen Coyle, The Technology off Rights: DIGITAL Rights Management, Based one has talk originally given At the Library off Congress, November 19, 2003, 20p.

http://www.kcoyle.net/drm_basics1.html


· European Commission, DIGITAL RIGHTS Background, Systems, Have, 14.02.2002, 43p.

http://europa.eu.int/information_society/newsroom/documents/drm_workingdoc.pdf


·Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic, MediaTeam Oulu, Information Processing Laboratory, Experimental DRM Structure Using Watermarking and PKI, University off Oulu, Finland, 6p.

http://www.mediateam.oulu.fi/publications/pdf/444.pdf


·Grouping of the Editors of Services On Line, the management of the numerical rights, DRM - DIGITAL Right Management, the cards sets of themes, May 2003, 3p. http://www.geste.fr/fiches/fiches/fiche3_drm1.pdf


· Windows Media Player DRM

http://www.microsoft.com/windows/windowsmedia/wm7/drm/architecture.aspx


· Paul Horn, Elliot Maxwell, Susan Crawford, Promoting Innovation And Economic Growth: Special The Problem Off DIGITAL Intellectual Property, A Carryforward by the DIGITAL Council Connections off the Committee for Economic Development, 101p, 2004, http://www.ced.org/docs/report/report_dcc.pdf


· Jeremy Rifkin in the Age of the access : the revolution of the new economy. The Discovery, 2000, 395p.


· Jörg Reinbothe, European Commission, DIGITAL Rights Management Workshop, Legal The Framework for DIGITAL Rights Management, Brussels, 4p. 28 February 2002

Intellectual property and protection of the private life


· Royalty and the Internet, Report/ratio of Broglie, July 2000, 102p.

http://www.culture.gouv.fr/culture/cspla/rapportbroglie.pdf


· Larry Korba & Steve Kenny, Towards Meeting the Privacy Challenge: Adapting DRM, 2002 ACM Workshop one DIGITAL Rights Management, Held in Conjunction with the Ninth ACM Conference one Computer and Security Communications, Washington, District of Columbia, the United States. From the 18 to November 22, 2002.

http://iit-iti.nrc-cnrc.gc.ca/publications/nrc-44956_f.html


· Julie E. Cohen, DRM and Privacy, 2003, The Berkeley Technology Law Newspaper, 43p.

https://www.law.berkeley.edu/institutes/bclt/drm/papers/cohen-drmandprivacy-btlj2003.pdf


· BILL relating to the royalty and the rights close in the company to information, November 12, 2003, p. 1.

http://www.culture.gouv.fr/culture/actualites/communiq/aillagon/droitdauteur1103.pdf


· The Charter of the basic rights. 18/12/2000,

http://www.info-europe.fr/doc02/223/g000d992.pdf


· CSPLA, OPINION N° 2004-1 relating to the author's copyright and the personal freedoms, March 2, 2004, http://www.culture.gouv.fr/culture/cspla/avis04-1.htm


· CSPLA, Commission Report on the author's copyright and artistic and personal freedoms, June 26, 2003, 17p.

http://www.culture.gouv.fr/culture/cspla/raplibertesindiv.pdf


·Sophie Lalande, address IP of your computer, a personal data concerned with the mode of protection of the community system of protection ?, 17p. www.droit-tic.com


·HALPERN and HARMON, E-mergers trigger privacy worries by Deborah KONG,

http://www.datenschutz-berlin.de/doc/eu/gruppe29/wp37_en/wp37en04.htm#fn28


· CSPLA, Opinion of June 26, 2003,

http://www.culture.gouv.fr/culture/cspla/avislibertes.htm


· Nathalie MALLET-POUJOL, Protection of the private life and the personal data, 52p. February 2004,

http://www.educnet.education.fr/chrgt/guideViePrivee.pdf


· Alessandro Acquisti, Privacy in Electronic Trades and the Economics off Immediate Gratification 9p. 2003

http://www.heinz.cmu.edu/~acquisti/papers/privacy-gratification.pdf


· Estelle Dumout, intellectual Property: Cnil German denounces a European draft Directive, Monday February 2, 2004,

http://www.zdnet.fr/actualites/internet/0,39020774,39140024,00.htm


·Peter Biddle, Paul England, Marcus Peinado, and Bryan Willmann. The darknet and the future off content distribution. November 18, 2002.

http://msl1.mit.edu/ESD10/docs/darknet5.pdf


· Antoine Gitton, Analyzes French bill on «the royalty and the rights close in the company to information», November 19, 2003, 18 p. http://www.droit-technologie.org/2_1.asp?dossier_id=113


·The Carryforward off the Working Group one Intellectual Property Rights, 15 November 1995, 238p. http://www.uspto.gov/web/offices/com/doc/ipnii/


· The DIGITAL Millennium Act Copyright, 17 U.S.C.S. 1201, 1202, December 1998, 18p. http://www.copyright.gov/legislation/dmca.pdf


· Rémy KHOUZAM, How the fear of under-protection will generate the catastrophe of over-protection: constitutional examination of the DIGITAL Millenium Copyright Act (DMCA), 2004,

http://www.lex-electronica.org/articles/v9-1/khouzam.htm


·Fair Uses Overview -

http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-b.html


· DaN L. Burk «Anti-Circumvention Misuse», 2002, 44p.

http://intel.si.umich.edu/tprc/papers/2002/29/misuse.pdf


· Article 29 Groups data protection, Avis 2/2004 on the adequate level of protection of the data in personal matter contained in the files of the air passengers (PNR) transferred to the Office from the customs and protection from the borders from the United States (US CBP), Adopté on January 29, 2004, 14p. http://europa.eu.int/comm/internal_market/privacy/docs/wpdocs/2004/wp87_fr.pdf


· Guillaume Desgens-Pasanau, transborder Data flows: legal and average risks of protection, April 16, 2002,

http://www.journaldunet.com/juridique/juridique020416.shtml


·Julien LACKER, works in line in compared right: rights American and French, May 2003, 79p. www.juriscom.net


·Anne Lepage, general Sight on the exceptions and limitations with the royalty in the numerical environment, Bulletin of the royalty, March 2003, 18p.


· Thomas Ramsauer, Germany' S Law Copyright one the Edge off the Information Age, e.Copyright Bulletin, December 2003, 9p.


· Marlene Trezeguet, technical measurements of protection of a work confronted with the rights of the user, October 14, 2003,

www.cejem.com/article.php3?id_article=135


· CSPLA, Author's copyright and artistic and right of competition, February 2004, 33p. www.culture.gouv.fr/culture/cspla/rapportconcurrence.pdf


· Sandrine Rouja, the American model of fight against the hacking of music exports herself: review, April 1, 2004, www.juriscom.net


·Bill relating to the protection of the physical people with regard to the processings of data in personal matter and amending the law n° 78-17 of January 6, 1978 relating to data processing, the files and freedoms.

http://www.assemblee-nationale.fr/12/projets/pl0762.asp


·Philippe Crouzillacq, representatives of the artists authorized to drive the pirates, 3/05/2004, www.01net.com

Cryptology & Watermarking


· Bernard DELFORGE, electronic Proof and safety of the exchanges in the information processing systems, 10 Mars 2003, 9p.


· http://www.rsasecurity.com/


· Authentification by certificates X.509, Patrick Chambet, April 1999, 11p.

http://www.chambet.com/publications/Certifs-X509.pdf


· Problems of Watermarking, Brownish Matthieu and Frederic Raynal, May 31, 2000 : http://www-rocq.inria.fr/codes/Watermarking/


·Shantanu Rastogi, DIGITAL Piracy : Techniques, 2003, 14p.

http://www.techlex.org/library.htm


· Lionel S. Sobel †, DRM have year enabler business models off: ISPs have digital retailers, Berkeley Technology Law Journal, 2003, 29p.


· Isabelle Valiant, the skirting of technical measurements of Protection, counterfeit or Data-processing criminality, June 2003, 23p.

http://eucd.info/documents/documents.fr.php


· Intel® Wireless Trusted Platform: Security for Mobile Devices «White paper

ftp://download.intel.com/design/pca/applicationsprocessors/whitepapers/30086801.pdf

Interworking and DRM


· Rob H. Koenen, Lacy Jack, Michael MacKay and Steve Mitchell, The Long March to Interoperable DIGITAL Rights Management, January 2004, 17p.

http://www.intertrust.com/main/research/papers.html


· William B. Bradley, David P. Maher, The NEMO P2P Service Framework Orchestration, January 2004, 10p.

http://www.intertrust.com/main/research/papers.html


· Christophe Espern, Interworking: Arlésienne of the DRM, January 2004, http://eucd.info/ddm.fr.php


·Leonardo Chiariglione, Role off standardization in the DRM field, 25 Mars 2003,

http://www.chiariglione.org/leonardo/publications/brussels_drm/index.htm


· Brian A. LaMacchia, Key Challenges in DRM: Year Industry Prospect, 2002

http://www.farcaster.com/papers/drm2002/drm2002.pdf


· Renato Ianella, DIGITAL Rights Management (DRM) Architectures, D-Lib Magazine, v. 7, N. 6, June, 2001

http://www.dlib.org/dlib/june01/iannella/06iannella.html


· Bill Rosenblatt, 2003 in Review: Standard DRM, January 5, 2004, http://www.drmwatch.com/standards/article.php/3295291


· Bill Rosenblatt, Integrating DRM with P2P Networks: Future Enabling the off Content Online Business Models, November 18, 2003

http://www.drmwatch.com/resources/whitepapers/article.php/3112631

Aspects Community


· Denys Simon, the Community legal system, 2001, PUF, 775p.


· Payment (This) No 45/2001 Of the European Parliament And the Council of 18 December 2000 relating to the protection of the physical people with regard to the processing the data in personal matter by the institutions and Community bodies and to freedom of movement of these data, 2000, 22p. http://europa.eu.int/comm/internal_market/privacy/index_fr.htm


·Article 29 Groups data protection, Working paper on the data-processing platforms of confidence, and, in particular, on the work carried out by Trusted Computing Group (Group TCG), January 23, 2004, 9p. www.europa.eu.int/comm/privacy


· Article 29 Groups data protection, Working paper on the Transfers of personal data towards third countries: Application of article 26 (2) of the directive of the EU relating to the data protection to the constraining rules the company applicable to the international transfers of data, June 3, 2003, 22p. www.europa.eu.int/comm/privacy


· First Commission Report on the implementation of the Directive on the data protection, « Analysis and impact study one the implementation off Directive EC. 95/46 in Member States », May 16, 2003, 68p.

http://europa.eu.int/comm/internal_market/privacy/lawreport/data-directive_fr.htm


·European Commission, Interior DG Marche, Services, Intellectual and Industrial Propriété, Medias and Protection of Give, the Director - National Notifications under the terms of article 26, paragraph 3 of the directive and exchange of better practices, August 21, 2003, 4p.


· The European Parliament, legislative Resolution of the European Parliament on the proposal for a Directive of the European Parliament and the Council relating to measurements and procedures aiming at ensuring the respect of the rights of ownership intellectual (COM (2003) 46 - C5-0055/2003 - 2003/0024 (COD)), 9 Mars 2004.

http://www3.europarl.eu.int


· The Council of the Union European, Proposal for a Directive of the European Parliament and the Council relating to measurements and procedures aiming at ensuring the respect of the rights of ownership intellectual - Text approved by the Permanent Representatives Committee, February 16, 2004, 27p.


· European Commission, Proposal for a Directive of the European Parliament and the Council relating to measurements and procedures aiming at ensuring the respect of the rights of ownership intellectual, January 30, 2003, 58p.


· European Commission, Commission Staff Working paper, DIGITAL Rights Management, February 14, 2002, 43p.


· Directive 2002/58/EC of the European Parliament and the Council, July 12, 2002, concerning the processing the data in personal matter and protection of the life deprived in the sector of the electronic communications

http://europa.eu.int/eur-lex/pri/fr/oj/dat/2002/l_201/l_20120020731fr00370047.pdf


·Directive 2000/31/EC of June 8, 2000 relating to certain legal aspects of the services of the company of information, and in particular of the electronic trade, in the Domestic market (directive on the electronic trade), Official Journal of the European Communities, July 17, 2000, L 178/1 to 178/16.


· Directive 1999/93/EC on a Community framework for the electronic signatures, Official Journal of the European Communities, January 19, 2000, L 13/12 to 13/20.


· Directive 95/46/EC of the European Parliament and the Council of October 24, 1995, Directive relating to the protection of the physical people with regard to the processing the data in personal matter and to freedom of movement of these data, Texte published in the Official Journal of the European Communities n° L 281 of the 23/11/1995 p. 0031- 0050.


· European Commission, DIGITAL Rights Management (DRM) WORKSHOP, April 16, 2002, 7p.

http://europa.eu.int/information_society/topics/multi/digital_rights/events/text_en.htm#workshop1


· Directive 2001/29/EC

http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexplus!prod!CELEXnumdoc&lg=fr&numdoc=32001L0029


· Blandine POIDEVIN, Comments on the European directive relating to the royalties, 17/07/2001

http://www.jurisexpert.net/site/fiche.cfm?id_fiche=1356


·Yannick-Eléonore Scaramozzino, IP Enforcement Directive, Mars 2004

http://www.scaraye.com/article.php?rub=6&sr=14&a=83


·Royalties: the Commission suggests a European legislation on the governorship of the collective trust companies, DNN: IP/04/492, 19/04/2004,

http://europa.eu.int/rapid/start/cgi/guestfr.ksh?p_action.gettxt=gt&doc=IP/04/492|0|RAPID&lg=FR&display=


· European Commission, Directive of the EP aiming at ensuring the respect of the rights of ownership intellectual, 30.1.2003, 58 p., http://europa.eu.int/eur-lex/fr/com/pdf/2003/com2003_0046fr01.pdf


·Communication of the European Commission, the management of the royalty and the close rights within the domestic market, April 16, 2004, 21p.

http://europa.eu.int/comm/internal_market/copyright/docs/management/com-2004-261_fr.pdf

Laws and court orders


· Law n° 2004-204 of bearing 9 March 2004 adaptation of justice to the evolutions of criminality, OJ n°59, 10 Mars 2004.

http://www.legifrance.gouv.fr/WAspad/Visu?cid=689004&indice=1&table=JORF&ligneDeb=1


· TGI Nanterre, June 24, 2003, Association CLCV C/SA EMI Music France, Juriscom.net, 24/06/2003, http://www.juriscom.net/jpt/visu.php?ID=267


· TGI Nanterre, September 2, 2003, Mrs F.M. and UFC That To choose C/SA EMI Music France and co. Auchan France, Juriscom.net, 02/09/2003,

http://www.juriscom.net/jpt/visu.php?ID=348


·Deprez, Dian Guignot, legal topicality; Communication, Media and Publicity, Monthly letter November 2003, p.5-6.


· Yannick-Eléonore Scaramozzino, Protection Of the Intellectual Property: Data protection in personal matter and Internet, 2003,

http://www.scaraye.com/article.php?rub=6&sr=14&a=60


· United States District Short For the Northren District off California, box No C 02-1955 IF, 321 Studios v. Subway Golwyn Mayer Studios

http://www.321studios.com/PRESS/SJ%20Order.pdf


· U.S. District Judge Richard Owen, 1:03 box - cv-08970-RO, Paramount Pictures and Twentieth Century Fox Film v. 321 Studios


· The LEN: bill transmitted by the Senate in second reading, April 8, 2004,

http://ameli.senat.fr/publication_pl/2003-2004/144.html


· Senate: Examination and adoption of the bill for confidence in the numerical economy Thursday May 13, 2004. final text n° 75 (2003-2004)

http://www.assemblee-nat.fr/12/dossiers/economie_numerique.asp

Articles Internet


· Short International of December 23, 2003

http://www.journaldunet.com/0312/031223brefinter.shtml


· BMG sells its music in peer-to-peer legal, 17/03/2004, 01net.


·Fancmusic.com, 18/03/2004, 01net.


·iTunes: 50 million songs, and the promotion of the iPod in no-claims bonus, 17 Mars 2004, http://www.atelier.fr/article.php?artid=27119&catid=30


·The Parliament adopts the directive IP, Tuesday March 09, 2004, www.ratiatum.com


· The European Parliament adopts without blow to férir the directive on the intellectual property, March 10, 2004.

http://www.zdnet.fr/actualites/internet/0,39020774,39144788,00.htm


·John Lettice, ms DRM OS, retagged «secure OS» to ship with Longhorn? June 24, 2002, http://www.theregister.co.uk/content/4/25852.html


·Etienne Wery, Microsoft is condemned by the European Commission for abuse dominant position, 24 Mars 2004,

http://www.droit-technologie.org/1_2.asp?actu_id=911


· Christophe Espern, Interworking: Arlésienne of the DRM,

http://eucd.info/ddm.fr.php


· Philippe Ricar, Brussels wants to put a term at the hegemony of Microsoft, March 24, 2004, p. 19.


· Cyril Fiévet, Micropaiement, megatendance? , 16/03/2004,

http://www.fing.org/index.php?num=4723,2


· Bill Rosenblatt, Two Major Labels Wippit, March 18, 2004,

http://www.drmwatch.com/ocr/article.php/3327821


· Jerome Bouteiller, RealNetworks wants to work with APPLE and his iPod, 24/03/2004, www.neteconomie.com


· Marie-Amélie Gervais, Judgment by twice, of the editor of software «DVD X Copy» allowing the hacking of DVD, 23/03/2004,

http://www.njuris.com/ShowBreve.aspx?IDBreve=642


·Europe' S Legitimate Music Download Sites Rush To Beat iTunes, 05/02/2004, www.pressreleasenetwork.com/


· Estelle Dumout, Fnac prepares her site of musical distribution, March 15, 2004, http://www.zdnet.fr/actualites/internet/0,39020774,39145408,00.htm


· Microsoft works on its next DRM, 30/03/2004,

http://www.clubic.com/n/n12144.html


·Eric Barbry, anti-copy measurements: It is necessary to inform the consumer, Article published in the daily newspaper the Echoes of September 18, 2003,

http://www.cyberlex.org/barbry/proce_anti_copies.htm


·David Worthington, BetaNews, Microsoft Remakes DRM for MSN Music Service, March 29th, 2004. www.betanews.com/article.php3?sid=1080606040


·Christophe Lagane, the data-processing law and freedoms in the course of recasting, April 14, 2004, http://www.vnunet.fr


· Yves Grandmontagne, Microsoft and Time Warner Co invest in the numerical rights, April 6, 2004, www.silicon.fr


·Nicolas Vermeys, Citizens Canadian, download in peace!, 5/04/2004, www.juriscom.net/actu/visu.php?ID=486


·Guillaume Champeau, the SOCAN supports the call of SHOUTED, April 16, 2004, www.ratatium.com


·ARIANE Beky, Royalty: Brussels militates for a European legislation, 19/04/2004, www.neteconomie.com


·Michel Ktitareff, Microsoft pays $ 440 million his litigation with Intertrust: zoom on the strategy of the editor, April 13, 2004, www.atelier.fr


·Known Jean-baptiste, InterTrust Lawsuit: Microsoft plays its numerical rights, 13/04/2004, www.01net.com


·The world sales of discs move back, but the paying remote loading is not profitable, 8/04/2004, www.atelier.fr


·Philippe Astor, APPLE is based on the sales records of the iPod for snober RealNetworks, April 19, 2004, www.zdnet.fr


·Stephan Length, «We will be able to go in justice to ask a FAI to act against piracy», 09/04/2004, www.01net.com


·Guillaume Deleurence, the LEN more reconciling with regard to the FAI, 09/04/2004, www.01net.com


·Arnaud Devillard, Christophe Pallez (Cnil): «We will have the possibility of giving fines» 19/04/2004, www.01net.com


·Christophe Guillemin, INTEL installs DRM in his chips for mobile apparatuses, April 20, 2004, www.zdnet.fr


·Music on line: Yahoo vis-a-vis the complexity of the licenses in Europe, 27/04/2004, www.atelier.fr


· Reuters, Wippit Triggers Price War with 29p Song Downloads, Fri Apr 2, 2004,

www.reuters.com/newsArticle.jhtml?type=internetNews&storyID=4738740


·David McGuire, Pirate' Bill Aims Law At Song Swappers,

www.washingtonpost.com/wp-dyn/articles/A27801-2004Mar26.html


· Microsoft reveals its technology anti-hacking, Atelier groups BNP Paribas - 03/05/2004 www.atelier.fr/


· Microsoft introduces time into the security of the audio-visual files, 05/05/2004, www.neteconomie.com


·Sony launches Connect, its service of remote loading of music on line, 4/05/2004, www.atelier.fr


·Wouter Van Lancker, the MP3 with complete freedom in the Netherlands, May 13, 2004, http://www.ratiatum.com/


·The TGI of Paris considers legal the protection of the DVD against the private copy, May 3, 2004, http://actu.voila.fr/Depeche/depeche_juniors_040503114237.z9h0mp78.html


·Paule Gonzalès, Royalty: towards the end of the private copy, May 05, 2004, www.lefigaro.fr


· Domenica Piotet, For the honor of the pirate: would musical industry become luddist?, www.atelier.fr


· Estelle Dumout, Next stage for the LCEN: the constitutional Council, May 13, 2004, www.zdnet.fr


· Arnaud Devillard, Virgin and Fnac renovate their supermarkets of the remote loading, 14/05/2004, www.01net.com/article/242425.html


·Sabrina Brandner, MP3: to download is not to pirate, according to the court of Haarlem, 20/05/2004, www.Juriscom.net


· Philippe Crouzillacq, Medialive places films and musics under high protection, 24/05/2004, www.01net.com/article/242984.html

Useful bonds


·Direction of the Development of the Mediae :

http://www.ddm.gouv.fr/dossiers_thematiques/documents/drm_liens.html


·The Economics off privacy:

http://www.heinz.cmu.edu/~acquisti/economics-privacy.htm


· PLATFORM '' intellectual Propriété and Peer-to-Peer '', 25/02/2004,

www.foruminternet.org/documents/general/lire.phtml?id=699

Against DRM?


· Peter Biddle, Paul England, Marcus Peinado, and Bryan Willmann, The Darknet and the Future off Content Distribution, 2002, 16p.

http://crypto.stanford.edu/DRM2002/darknet5.doc


· Did Stuart Haber, Bill Horne, Joe Pato, Divide into volumes Sander, Robert Endre Tarjan, Trusted Systems Laboratory, If Piracy is the Problem, Is DRM the Answer? May 27th, 2003, 12p. http://www.hpl.hp.com/techreports/2003/HPL-2003-110.pdf


· The Forum of the rights on the Internet, Synthesis of the forum of discussion peer-to-peer: which use for which uses, June 20, 2003, 21p. www.foruminternet.org


· Valerie Sédallian, To legislate on the computer security: the quadrature of the circle? 22p., www.juriscom.net/documents/secu20031208.pdf


· Jean-baptiste Soufron, the peer to peer vis-a-vis the logic of the royalty towards the necessary recognition of the right of the public, 01/07/03, 30p. http://soufron.free.fr


· Caroline Carpentier, private Life and electronic communications: A made union of compromise? , 13p.

http://www.droit-technologie.org/redirect.asp?type=dossier&dossier_id=120&url=dossiers/V.P._Com. électr.pdf


· Guillaume Gomis, the Communities Peer-to-Peer and having right: peace by the legal license?, April 2, 2004, 5p. www.juriscom.net

Economic analysis


· Olivier Bomsel and Gilles the White, Encircled, Distribution of contents on Internet - Analysis economic of the remedies for the skirting of the rights of ownership intellectual, 14p. Working note Contango, 8 Mars 2004, www.cerna.ensmp.fr


·Olivier Bomsel with the collaboration of Jérémie Charbonnel, Gilles the White, Abakar Zakaria, economic Stakes of the distribution of the contents, Encircled, 52p., January 2004, www.cerna.ensmp.fr


· Distribution of contents on Internet - Comments on the project of tax on the upload, Michel Gensollen, Laurent Gille, Marc Torturer, Nicolas Curien, April 2004, 48p. www.enst.fr/egsh/p2p/documents/Fing_DistributionContenus1.pdf


·John Barrett, DIGITAL Music: Market, Services and Consumers, Parks Ace, 4Q 2003


· Douglas Lichtman and William Moors, indirect liability for copyright infringement: year economic perspective, Harvard Newspaper off Law & Technology, Volume 16, Number 2 Spring 2003, 16p.


· Annual report 2002, SACEM, 2002, 28p. www.sacem.fr


· Felix Oberholzer, Koleman Strumpf, The Effect off Dirty Sharing Files one Record: Year Empirical Analysis, March 2004, 52p.

http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf

Tables of content

SYNOPSIS 1

GLOSSARY 2

ABBREVIATIONS 3

INTRODUCTION 4

PRELIMINARY CHAPTER : TECHNOLOGY WITH THE HELP OF THE RIGHT 6

SECTION 1- TECHNICAL PRECONDITIONS 6

§1- Cryptology 6

With- major Concepts 7

1- cryptology with secret key 7

2- cryptology with asymmetrical key 8

B- Protection of the contents 8

§2- Tattooing 9

§3- the Language 10

SECTION 2- INDUSTRIAL PRECONDITIONS 12

§1- actors 12

§2- interworking 13

With- the consortia and alliances 14

B- The group of Article 29 16

CHAPTER 1- LEGAL STAKES RELATED TO THE DRM 18

SECTION 1- BETWEEN ROYALTY AND PERSONAL DATA PROTECTION 19

§1- royalties in prospect 19

With- the directive on the royalty and the French bill 20

1- the directive on the royalty 20

2- the bill on the royalties 21

B- Directive IP Enforcement 25

§2 - personal data protection in prospect 27

With- the right to the personal data protection 27

B- Directive 2002/58/EC and the LEN 32

1 - Directive 2002/58/EC 33

2 - The LEN 34

SECTION 2- BETWEEN US RIGHTS AND EXPORT 36

§1- the United States and the DMCA 36

§2- contracts of transborder flows 38

CHAPTER 2- DRM IN PRACTICE 42

SECTION 1- APPROACHES TECHNICAL AND FUNCTIONAL 42

§1- technical Architecture 42

With- Architecture DRM using PKI and Watermarking 42

B- An integrated system : Windows Media DRM 44

§2- Functional architecture 45

With - APPLE- iTunes 46

B - BMG and Wippit 47

C - OD2 50

SECTION 2- APPROACHES CONTRACTUAL AND FINANCIAL 53

§1- CGV in force 53

With- the associated rights 53

1- Right of reading 53

2- Right of engraving and transfer 54

3- geographical Restriction 56

4- Right on the licenses 57

4.1 -Expiry of the licenses 57

4.2 -Loss of license 57

5- Right of Listening 58

B- Associated DRM and costs 59

1- A the Unit 59

2- Subscription 59

2.1 -Monthly subscription 60

2.2 -Annual subscription 61

2.3 -With the chart 61

§2- DRM and Rémunération 62

CONCLUSION 66

APPENDICES 68

Appendix 1: How C you like music ? 68

Appendix 2 : Examples of rights associated with Titles of musics on Fnac Digital 68

Appendix 3 : Examples of rights associated with Titles of musics on the Kiosk with Numéricable 70

Appendix 4 : Origin of the rights 70

FIGURES 71

BIBLIOGRAPHY 72

DRM 72

Intellectual property and protection of the private life 73

Cryptology & Watermarking 75

Interworking and DRM 75

Aspects Community 76

Laws and court orders 77

Articles Internet 78

Useful bonds 80

Against DRM? 80

Economic analysis 81

TABLES OF CONTENT 82

* 1 Daniel Semaya, The Future off DIGITAL Rights Content Management for Distribution, May 30, 2003, 10p. http://www.cs.princeton.edu/ugprojects/listing.php?user=dsemaya&type=senior

* 2 One will note the initiatives of BMG in March 2004 (BMG sells his music in peer-to-peer legal, 17/03/2004, 01net. The catalog of the house of discs will be sold (...) on the English platform of exchange of Wippit files), Sony and Fnac next June (Fnacmusic.com, 18/03/2004, 01net.) and D `other older actors such as APPLE with itunes which sold more than 50 million songs since its opening in April 2003 (iTunes: 50 million songs, and the promotion of the iPod in http://www.atelier.fr/article.php?artid=27119&catid=30) no-claims bonus primarily in the United States and ecompil, Pressplay, MusicNet for example.

* 3 One will privilege the flexibility in use left to the consumer who will allow to make in kind discourage them «  pirates  » and to encourage the honest users.

* 4 Shantanu Rastogi, DIGITAL Piracy  : Techniques, 2003, 14p. http://www.techlex.org/library.htm

* 5 The increase in the computing power of the computers makes it possible from now on «to break», by testing all the 256 possible keys. «Competitions» were organized to this end: a system made up of the supercomputer OF Cracker of the EFF (Electronic Frontier Foundation) and of 100.000 PC working in network with Distributed.net thus could «break» one OF the of 22 hours at the beginning of 1999  ». Henceforth, the NSA prohibited the use of for the American administration and recommends from now on the TDES (triple OF, three OF successive with two or three different keys) and can be soon the AES (Advanced Encryption Standard) resulting from the Belgian algorithm Rijndael. City in Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 46.

* 6 Ibid, p. 18.

* 7 The asymmetrical algorithm most known is the RSA.

* 8 In this respect, article 1316 of the Civil code gives a definition of the writing  : «  The literal proof, or written proof, results from a continuation from letters, natures, figures or of all other signs or symbols equipped with an understandable significance, whatever their support and their methods of transmission  ». Article 1316-4 continues, in particular, on the electronic signature  : «  the signature necessary to the perfection of a legal document identifies that which affixes it. It expresses the assent of the parts to the obligations which rise from this act. When it is affixed by a public officer, it confers the authenticity on the act. When it is electronic, it consists of the use of a reliable process of identification guaranteeing its bond with the act to which it sticks. The reliability of this process is supposed, until contrary proof, when the electronic signature are created, the assured identity of the signatory and the guaranteed integrity of the act, under conditions fixed by decree as a Council of State  ».

* 9 Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 51.

* 10 The license is a certificate specifying for a customer given the conditions and the rights of use of given contents. It contains information on the consumer, the product, the owner of the product, the key with which the contents were packaged, authorized rights and other information.

* 11 Jon Lech Johansen, young person Norwegian 22 years called «DVD Jon» and become famous for his high facts in term of piracy on Internet, was recognized innocent by the Court of Appeal of Oslo of the charges carried by the studios of cinema of Hollywood which affirmed that it had enfreint the law by diffusing on Internet a program making it possible to unbolt DeCSS, a code preventing the film DVD copy. Jon Lech Johansen had already been discharged last January, and the Court of Appeal confirmed the first judgment which insisted on the fact that the young man could do what he wanted with his DVD, bought legally. http://www.journaldunet.com/0312/031223brefinter.shtml

* 12 http://www.rsasecurity.com/

* 13 Problems of Watermarking, Brownish Matthieu and Frederic Raynal, May 31, 2000  : www-rocq.inria.fr/codes/Watermarking/

* 14 Problems of Watermarking, Brownish Matthieu and Frederic Raynal, May 31, 2000  : http://www-rocq.inria.fr/codes/Watermarking/

* 15 Ibid

* 16 Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p 64.

* 17 Daniel Sebaya notes: «  Content The term darknet refers to the collection off networks used to share digital illegally. Thesis networks include peer-to-peer file sharing networks, have well have sharing off keys, passwords gold even music and movies in person. The furnace researchers At Microsoft believe that the darknet will never fully Be stopped  ». Daniel Semaya, The Future off DIGITAL Rights Content Management for Distribution, May 30, 2003, p. 4. http://www.cs.princeton.edu/ugprojects/listing.php?user=dsemaya&type=senior One will read with all the more interest the document on Darknet of Peter Biddle, Paul England, Marcus Peinado, and Bryan Willmann. The darknet and the future off content distribution. November 18, 2002. http://msl1.mit.edu/ESD10/docs/darknet5.pdf

* 18 One will also observe the promising beginnings of a young Medialive company which has, in particular, developed a technology of progressive jamming of the contents not resting on watermarking. The guiding principles of Medialiving® process are: «  Avoid content exposing Al online by extracting has off small part the digital stream and substitute has lure for it, sending has Lured_Mediafile®, with exactly the same length and same file format. The extracted share, generally butt 1% gold original less off the dated, is locked in A Control_File® server; Digital Distribute freely the lured stream; Distribute the extracted shares in real-time upon payment gold any other vent that would trigger year accesses authorization to the entertainment part. The Live_Composer® is reconstructing the original digital stream in No time  ». Philippe Crouzillacq, Medialive places films and musics under high protection, 24/05/2004, www.01net.com/article/242984.html

* 19 It was born from fusion between language XMCL (extensible Media Trades Language) of Real Networks and from language MRV developed by Nokia. Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 83. Bill Rosenblatt, 2003 in Review: Standard DRM, January 5, 2004, http://www.drmwatch.com/standards/article.php/3295291

* 20 http://www.xrml.org/ It is the new name of language DPRL (DIGITAL Property Rights Language) resulting from work of Xerox Palo Alto Research Center (Xerox-PARK) and whose patents are held from now on by Contentguard whose Microsoft is shareholder. Ibid, p. 84.

* 21 Cf Hereafter and in particular on the level of the working group WG11.

* 22 Ibid, p. 84.

* 23 «  The Open DIGITAL Rights Language (ODRL) is has off proposed language for the DIGITAL Rights Management (DRM) community for the standardization expressing rights information over content. Flexible The ODRL is intended to provide and interoperable mechanisms to transparent support and innovative off uses digital resources in publishing, distributing and consuming off electronic publications, digital images, audio and movies, learning objects, computer software and other creations in digital form. The ODRL has No license requirements and is available in the spirit off «open source» software  ».

http://www.w3.org/TR/2002/NOTE-odrl-20020919/

* 24 Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 88.

* 25 Within this framework, one will note that the support provides can be it in several forms  : completely not exploitable without the associated rights where partially exploitable, one thinks of commercial forms of diffusion, but requiring supplementary laws to reach the entirety of work.

* 26 One will take again the typology drawn up by Philippe Chantepie in his report/ratio  : Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p 12-15.

* 27 Sony, Matsushita, Philips, Thomson, Hitachi

* 28 IBM, INTEL, Toshiba

* 29 Microsoft, Real Networks

* 30 Macrovision, Digimarc, Sunncomm Technologies, Nextamp

* 31 http://www.ondemanddistribution.com/fre/services/themarket.asp

* 32 http://www.ondemanddistribution.com/fre/services/themarket.asp

* 33 Yves Grandmontagne, Microsoft and Time Warner Co invest in the numerical rights, April 6, 2004, www.silicon.fr

* 34 This company, repurchased by Sony and Philips, is owner many technologies of multi-media encoding of contents.

* 35 Michel Ktitareff, Microsoft pays $ 440 million his litigation with Intertrust: zoom on the strategy of the editor, April 13, 2004, www.atelier.fr, Jean-baptiste Known, InterTrust Lawsuit: Microsoft plays its numerical rights, 13/04/2004, www.01net.com

* 36 From a legal point of view, one will specify for example that in a business TGI Nanterre, June 24, 2003, Association CLCV C/SA EMI Music France, the TGI states in particular that  : «  (...) the fact that the consumer cannot listen to CD on a car radio or a reader characterizes the inaptitude with the use of the product, when well even only certain CD are reached by this vice and some users concerned. The consumer by reading the mention «this CD contains a technical device limiting the possibilities of copy» cannot know that this system anti-copy is likely to restrict the listening of its disc on a car radio or a reader (...)  ». www.juriscom.net/jpt/visu.php?ID=267. In the same direction, TGI Nanterre, September 2, 2003, Mrs F.M. and UFC That To choose C/SA EMI Music France and co. Auchan France, Juriscom.net, 02/09/2003, www.juriscom.net/jpt/visu.php?ID=348, Deprez, Dian Guignot, legal topicality; Communication, Media and Publicity, Monthly letter November 2003, p.5-6.

* 37 In this respect, Directive IP Enforcement, was in the middle of the problems and it would seem that «  the Parliament partly heard these remarks, ranges in particular of sharp voice by Eurolinux alliance, since the European deputies specified that the protection systems could be diverted if interworking required it for the free competition  ». In the same way, the Bill of transposition of the Directive May 22, 2001 on the royalties indicates in the talk of its reasons  : «  Moreover, as for the systems of conditional accesses governed by article 95 of the law n° 86-1067 of September 30, 1986 relating to the freedom of communication, it is necessary to allow to the manufacturers technical systems or to the owners of service who wish interworking to be able to negotiate the provision, in nondiscriminatory conditions, licenses of development of technical measurements. This provision, whose application must be carried out in measurement strictly necessary to the needs for interworking with other technical measurements of protection, does not derogate however from article 6 of directive 91/250/EC of May 14, 1991 and from the article L. 122-6-1 of the code of the intellectual property which determine the conditions of access to information necessary to the interworking of a software  ». Bill relating to the royalty and the rights close in the company to information, November 12, 2003, p. 1.

www.culture.gouv.fr/culture/actualites/communiq/aillagon/droitdauteur1103.pdf

* 38 For a more deepened study, Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, 148p.

* 39 Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 19.

* 40 Leonardo Chiariglione, Role off standardization in the DRM field, 25 Mars 2003,

www.chiariglione.org/leonardo/publications/brussels_drm/index.htm.

For a deepening of these concepts, one will be able to read Brian A. LaMacchia, Key Challenges in DRM: Year Industry Prospect, 2002 www.farcaster.com/papers/drm2002/drm2002.pdf

* 41 Renato Ianella, DIGITAL Rights Management (DRM) Architectures, D-Lib Magazine, v. 7, N. 6, June, 2001, www.dlib.org/dlib/june01/iannella/06iannella.html

* 42 European Commission, DIGITAL Rights Management (DRM) WORKSHOP, April 16, 2002, p. 3.

http://europa.eu.int/information_society/topics/multi/digital_rights/events/text_en.htm#workshop1 This was reaffirmed besides on April 19, 2004 in an official statement by the Police chief charged with the domestic market Frits Bolkestein. Royalties: the Commission suggests a European legislation on the governorship of the collective trust companies, DNN: IP/04/492, 19/04/2004,

http://europa.eu.int/rapid/start/cgi/guestfr.ksh?p_action.gettxt=gt&doc=IP/04/492|0|RAPID&lg=FR&display=

* 43 Article 29 Groups data protection, Working paper on the data-processing platforms of confidence, and, in particular, on the work carried out by Trusted Computing Group (Group TCG), January 23, 2004, 9p. www.europa.eu.int/comm/privacy

* 44 The TCG is a non-profit institution which belongs to an international organization having adopted the specifications of the TCPA (Alliance for a data processing of confidence). Ibid, p.3. https://www.trustedcomputinggroup.org/home

* 45 https://www.trustedcomputinggroup.org/about/members/

* 46 Ibid, p. 4-5. It will be noted has that INTEL has just marketed new a range of processor intended to equip the personal assistants and mobile telephones multimedia which integrates its platform of safety «INTEL Wireless Trusted Platform». It has a system of integrated DRM which could prohibit the access to files not having the rights of access necessary (Christophe Guillemin, INTEL installs DRM in its chips for mobile apparatuses, April 20, 2004, www.zdnet.fr). One will be able to also read the document of INTEL entitled «  Intel® Wireless Trusted Platform: Security for Mobile Devices  »

ftp://download.intel.com/design/pca/applicationsprocessors/whitepapers/30086801.pdf

* 47 Directives 95/46/EC and 2002/58/EC on the level of the data protection in general and data protection in the electronic communications. But also the provisions of the directives «trades electronic», Directive 2000/31/EC of June 8, 2000 and «signatures electronic», Directive 1999/93/EC.

* 48 Ibid p.7.

* 49 It does not remain about it less than certain questions remain open and in particular the fact in the future of knowing where will be the Thirds of confidence (PCA) bus considering the importance of the data which they have in their possession, of the protection measures more than adequate will have installation so that those are not stored at the same time in only one place but also in only one State.

* 50 Paul Horn, Elliot Maxwell, Susan Crawford, Promoting Innovation And Economic Growth: Special The Problem Off DIGITAL Intellectual Property, A Carryforward by the DIGITAL Council Connections off the Committee for Economic Development, p.16, 2004, www.ced.org/docs/report/report_dcc.pdf

* 51 Jörg Reinbothe, European Commission, DIGITAL Rights Management Workshop, Legal The Framework for DIGITAL Rights Management, Brussels, p. 4. 28 February 2002

* 52 Alessandro Acquisti, Privacy in Electronic Trades and the Economics off Immediate Gratification

9p. 2003 www.heinz.cmu.edu/~acquisti/papers/privacy-gratification.pdf

* 53 Philippe Chantepie, Technical Measurements of Protection of works & DRMS, 1ère Left: an Inventory of fixtures, January 8, 2003, p. 8.

* 54 Ibid, p. 11.

* 55 Article 9 Civil code  : «  Each one is entitled to the respect of its private life  »  ; article 8 of the European Convention of the Humans right  : «1. Any person is entitled to the respect of her private and family life, her residence and her correspondence. 2. There can be interference of a public authority in the exercise of this right only in so far as this interference is provided by the law and that she constitutes a measure which, in a democratic company, is necessary to national safety, public safety, the economic welfare of the country, the defense of the order and the prevention of the penal infringements, with protection of health or morals, or with the protection of the rights and freedoms of others  ». One will be able to read with attention an overall study of the concept  realized by Nathalie Mallet-Poujol, Protection of the private life and the personal data, 52p. February 2004, www.educnet.education.fr/chrgt/guideViePrivee.pdf

* 56 Royalty and the Internet, Report/ratio of Broglie, July 2000, p. 25-26.

http://www.culture.gouv.fr/culture/cspla/rapportbroglie.pdf

* 57 Blandine POIDEVIN, Comments on the European directive relating to the royalties, 17/07/2001

www.jurisexpert.net/site/fiche.cfm?id_fiche=1356

* 58 Article 5 §2 b) «  2. The Member States have faculty to envisage exceptions or limitations with the reproduction right envisaged to article 2 in the following cases: (...) b) when they are reproductions carried out on any support by an individual for a private use and at purposes not directly or indirectly commercial, provided that the holders of rights receive an equitable compensation which takes into account the application or nonthe application of the technical measurements aimed to article 6 to works or objects concerned (...)  » Directive 2001/29/EC

http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexplus!prod!CELEXnumdoc&lg=fr&numdoc=32001L0029

* 59 It will be noted that these optional measurements are increasingly numerous in the directives in a political concern but they are in our opinion of strict interpretation i.e. without possibility of expansion or reduction, which is not always the opinion of certain States.

* 60 http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexplus!prod!CELEXnumdoc&lg=fr&numdoc=32001L0029

* 61 Article 6  : «  (...) Technical measurements are considered effective when the use of a protected work, or that of another protected object, is controlled by the holders of the right thanks to the application of an access code or a process of protection, such as encoding, the jamming or any other transformation of work or the object protected or a mechanism from control of copy which achieves this goal of protection (...)  ». Ibid This article was quite simply transposed to article 7 of the current French bill on the royalty.

* 62 European Commission, DIGITAL RIGHTS Background, Systems, Have, 14.02.2002, p. 8

http://europa.eu.int/information_society/newsroom/documents/drm_workingdoc.pdf

* 63 It should be examined by the Parliament as of the first six-month period 2004.

* 64 Bill relating to the royalty and the rights close in the company to information, November 12, 2003, p. 1.

http://www.culture.gouv.fr/culture/actualites/communiq/aillagon/droitdauteur1103.pdf

* 65 Antoine Gitton, Analyzes French bill on «the royalty and the rights close in the company to information», November 19, 2003, 18 p. www.droit-technologie.org/2_1.asp?dossier_id=113

* 66 One will limit here to the study strictly speaking measurements having an impact on the DRM.

* 67 Ibid, p. 9.

* 68 Law n° 2004-204 of bearing 9 March 2004 adaptation of justice to the evolutions of criminality, article 34  : «  II. The article L. 335-4 is thus modified: 1° In the first subparagraph, the words: «two years of imprisonment and 150.000 EURO of fine» are replaced by the words: «three years of imprisonment and 300.000 EURO of fine»; 2° It is supplemented by a subparagraph thus written: When the offenses envisaged with the present article were made in organized band, the sorrows are carried at five years of imprisonment and 500.000 EURO of fine «.

www.legifrance.gouv.fr/WAspad/Visu?cid=689004&indice=1&table=JORF&ligneDeb=1

* 69 Article 13  : «  Is compared to an offense of counterfeit: «1° the fact for a person of carrying reached, with full knowledge of the facts, with a technical measurement mentioned with the article L. 331-5 in order to deteriorate protection, assured by this measurement, bearing on a work; «2° the fact, with full knowledge of the facts, of manufacturing or of importing a technological application, a device or a component or of providing a service, intended to facilitate or allow the realization, in all or partly, fact mentioned with the 1° above; «3° the fact, with full knowledge of the facts, of holding for the sale, of the loan or the hiring, of offering to the sale, the loan or the hiring, of placing at the disposal in some form that it is a technological application, a device or a component or of providing a service intended to facilitate or allow the realization, in all or partly, fact mentioned with the 1° above  ; (...)  ». Bill relating to the royalty and the rights close in the company to information, November 12, 2003, p. 12.

* 70 www.321studios.com/PRESS/SJ%20Order.pdf

* 71 Marie-Amélie Gervais, Judgment by twice, of the editor of software «DVD X Copy» allowing the hacking of DVD, 23/03/2004, www.njuris.com/ShowBreve.aspx?IDBreve=642

* 72 U.S. District Judge Richard Owen, 1:03 box - cv-08970-RO, Paramount Pictures and Twentieth Century Fox Film v. 321 Studios, http://news.findlaw.com/hdocs/docs/cyberlaw/pp32130304opn.pdf

* 73 Ibid, p. 3.

* 74 Article 8 Al the 3 «holders of rights have faculty to take measures allowing to limit the number of copies  ». Ibid, p. 8

* 75 To allow the exercise of the exceptions, the Bill returns to the contractual agreements with the users....

* 76 Eric A. Caprioli, Devices technical and royalty in the company of information, September 2001, www.caprioli-avocats.com/cabinet_caprioli/fr/publs/edocs/Articles/dispoTech_droitAut.htm

* 77 The whole of the rights of the user at the time of the remote loading of music on line is detailed in Chapter 2 of this study by a brief comparison of the offers of various people receiving benefits of contents on line in the sector.

* 78 Above mentioned businesses, note n°36, p. 13-14.

* 79 Eric Barbry, anti-copy measurements: It is necessary to inform the consumer, Article published in the daily newspaper the Echoes of September 18, 2003, www.cyberlex.org/barbry/proce_anti_copies.htm

* 80 TGI Nanterre, June 24, 2003, Association CLCV C/SA EMI Music France

* 81 TGI Nanterre, September 2, 2003, Mrs F.M. and UFC That To choose C/SA EMI Music France and co. Auchan

* 82 TGI under the reference  : n° of general role 03/08/500, 3rd room 2nd section, April 30, 2004. www.legalis.net/jurisprudence-decision.php3?id_article=722

* 83 The judge justifies as follows: (...) Waited indeed that the commercial exploitation of a film in the form of a DVD constitutes a mode of exploitation of many audio-visual works so that it is not contestable only this mode belongs to a normal exploitation such works; Waited until the copy of a filmographic work published on numerical support cannot like attacking the normal exploitation of work; Waited until this attack will be necessarily serious - within the meaning of the criteria retained by the convention of Bern - because it will affect a mode of essential exploitation of the aforesaid work, essential to the damping of its production costs; Waited until the safety device with which the DVD acquired by Stephan P. is equipped does not appear consequently to carry out a violation of the articles L 122-5 and L 211-3 of the code of the intellectual property; Waited finally, that it is indifferent until the virgin support acquired by Stephan P. could give place to the collection of a remuneration for private copy because the plate of this remuneration does not determine the range of the exception of private copy (...) Waited until if information specifies of the consumer on impossibility of realizing a private copy of the litigious DVD could have been reproduced on the jacket of this one, it remains that an essential characteristic of such a product the possibility does not constitute of reproducing it especially then that it cannot profit from the exception of private copy «. www.legalis.net/jurisprudence-decision.php3?id_article=722. The TGI of Paris judges legal the protection of the DVD against the private copy, May 3, 2004,

http://actu.voila.fr/Depeche/depeche_juniors_040503114237.z9h0mp78.html and Paule Gonzalès, Royalty: towards the end of the private copy, May 05, 2004, www.lefigaro.fr

* 84 European Commission, Directive of the EP aiming at ensuring the respect of the rights of ownership intellectual, 30.1.2003, 58 p., http://europa.eu.int/eur-lex/fr/com/pdf/2003/com2003_0046fr01.pdf

* 85 The Parliament adopts the directive IP, Tuesday March 09, 2004, www.ratiatum.com; Yannick-Eléonore Scaramozzino, IP Enforcement Directive, 2004 http://www.scaraye.com/article.php?rub=6&sr=14&a=83 counters this Directive, Philippe Aigrain, http://www.sopinspace.com/~aigrain/fr/index.html#execution

* 86 http://europa.eu.int/comm/internal_market/fr/intprop/news/

* 87 A possibility remains nevertheless open, provision «  optional  » which leaves perplexed when with the final nature of these directives of harmonization of the national legislations within the European Union.

* 88 Considering the 21, Council of the Union European, Proposal for a Directive of the European Parliament and the Council relating to measurements and procedures aiming at ensuring the respect of the rights of ownership intellectual - Text approved by the Permanent Representatives Committee, February 16, 2004, p. 7. Considering 22bis indicating as for him  : «  Without damage of any other measurement or measures corrective existing, the holders of the rights should have the possibility of asking an injunction against an intermediary whose services are used by a third to attack the patent right of the holder  ».

* 89 Ibid, p. 17.

* 90 Estelle Dumout, intellectual Property: Cnil German denounces a European draft Directive, Monday February 2, 2004, www.zdnet.fr/actualites/internet/0,39020774,39140024,00.htm

* 91 The Parliament adopts the directive IP, Tuesday March 09, 2004, www.ratiatum.com

* 92 Estelle Dumout, intellectual Property: Cnil German denounces a European draft Directive, Monday February 2, 2004, www.zdnet.fr/actualites/internet/0,39020774,39140024,00.htm

* 93 Directive on the respect of the rights of ownership intellectual: the French government greets this Community projection in the fight against the counterfeit, Paris, April 30, 2004,

http://www.industrie.gouv.fr/infopres/pdf/dircontrefa300404.pdf

* 94 One will be able to read, on the transposition by Germany  : Thomas Ramsauer, Germany' S Law Copyright one the Edge off the Information Age, e.Copyright Bulletin, December 2003, 9p.

* 95 Denys Simon, the Community legal system, 2001, PUF, p. 325.

* 96 EUCD.INFO, electronic Systems of management of the rights («DRM») and personal data protection, February 7, 2003, http://eucd.info/

* 97 CNIL, Data-processing Law and Freedoms, Article 30, www.cnil.fr/index.php?id=301#Article30

* 98 Pamela Samuelson, DRM {AND, GOLD, VS.} THE LAW, Communications off the ACM, April 2003/vol. 46, No 4 p.42. www.sims.berkeley.edu/~pam/papers/acm_v46_p41.pdf

* 99 In particular the initiative of Microsoft and its new system renamed Longhorn, Next Generation Secure Computing Bases www.theregister.co.uk/content/4/25852.html and Trusted Computing Platform Alliance (TCPA) the purpose of which is to even set up systems of DRM at the level of the infrastructure.

* 100 Julie E. Cohen, DRM and Privacy, 2003, The Berkeley Technology Law Newspaper, p. 1.

https://www.law.berkeley.edu/institutes/bclt/drm/papers/cohen-drmandprivacy-btlj2003.pdf

* 101 Ibid, p. 11. In the same direction: «  Too many businesses, including many off the leading-edge entrepreneurial companies emerging one the Internet, cuts off not focused enough one the been worth customer profile. The winners and losers off this new will era will Be determined by who has rights to on-line customer profile " and «There will eventually Be acquisitions that are based one to consume dated, where the primary ace that' S being bought is the to consume dated. (...) Consumer dated right now is the currency off E-trade in A batch off ways. Those are valuable customers because they' ve shown that they' Re buyers, and they' ve bought from has competing blind. (...) Names in A database save has company from spending marketing dollars to acquire has customer - usually butt $100 per customer  ». HALPERN and HARMON,

www.datenschutz-berlin.de/doc/eu/gruppe29/wp37_en/wp37en04.htm

* 102 Article 8 of the Charter of the basic rights recalls the principle of the data protection in personal matter. 18/12/2000, www.info-europe.fr/doc02/223/g000d992.pdf

* 103 European Commission, DIGITAL RIGHTS Background, Systems, Have, 14.02.2002, p. 14.

http://europa.eu.int/information_society/newsroom/documents/drm_workingdoc.pdf

* 104 In this respect it will be noted that considering it 57 of Directive 2001/29/EC indicates  : «  The systems relating to information on the mode of the above-mentioned rights also can, according to their design, to treat data in personal matter relating to the spending patterns of the private individuals as regards the protected objects and to allow the observation of the behaviors on line. These average techniques must, in their technical functions, to incorporate the principles of protection of the private life, in accordance with directive 95/46/EC of the European Parliament and the Council of October 24, 1995 relating to the protection of the physical people with regard to the processing the data in personal matter and to freedom of movement of these data  ».

http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexplus!prod!CELEXnumdoc&lg=fr&numdoc=32001L0029

* 105 One also conscious of the problems binding will be given personal and addresses IP since it is advisable to agree on the fact that «  address IP of the Net surfer can be described as indirectly personal data  ». Quoted in Sophie Lalande, address IP of your computer, a personal data concerned with the mode of protection of the community system of protection  ?, p. 10. www.droit-tic.com. The CNIL considering for this reason that «  only the public people or the private people in charge of a public utility can, under the terms of article 30 of the law of January 6, 1978, to constitute files while containing  ». But, the CSPLA wishes that the Parliament find, within the framework of the reform of the law of January 6, 1978, and in the respect of the directive of October 24, 1995, a solution allowing the trust companies and having the right to proceed to the constitution of such files with an only aim of ensuring the protection of these rights.

www.culture.gouv.fr/culture/cspla/avislibertes.htm

* 106 Even «  to know with precision the contents themselves, including, being in particular written works, concerning the aspects sensitive of the private life enumerated to article 31 of the law of January 6, 1978: political or philosophical opinions, religion, trade-union membership, manners of the people  ». CSPLA, Commission Report on the author's copyright and artistic and personal freedoms, June 26, 2003, p. 6. www.culture.gouv.fr/culture/cspla/raplibertesindiv.pdf

* 107 Ibid, p.6.

* 108 Christophe Espern, Interworking: Arlésienne of the DRM, http://eucd.info/ddm.fr.php. One will study these aspects, as a partulier within the framework of Directive IP Enforcement.

* 109 CSPLA, Opinion of June 26, 2003, www.culture.gouv.fr/culture/cspla/avislibertes.htm

* 110 CSPLA, OPINION N° 2004-1 relating to the author's copyright and the personal freedoms, March 2, 2004, www.culture.gouv.fr/culture/cspla/avis04-1.htm

* 111 In this respect, the CNIL indicates that in accordance with article 30 of the Data-processing Law Freedoms of January 6, 1978, only the public people or the private people in charge of a public utility can carry out such treatments the ends of prevention and repression of the infringements

* 112 Bill relating to the protection of the physical people with regard to the processings of data in personal matter and amending the law n° 78-17 of January 6, 1978 relating to data processing, the files and freedoms. http://www.assemblee-nationale.fr/12/projets/pl0762.asp

* 113 Ibid

* 114 Philippe Crouzillacq, representatives of the artists authorized to drive the pirates, 3/05/2004, www.01net.com

* 115 CSPLA, OPINION N° 2004-1 relating to the author's copyright and the personal freedoms, March 2, 2004, www.culture.gouv.fr/culture/cspla/avis04-1.htm

* 116 DaN L. Burk Anti-Circumvention Misuse, 2002, p. 10

http://intel.si.umich.edu/tprc/papers/2002/29/misuse.pdf

* 117 Note 105, p. 29.

* 118 http://www.assemblee-nat.fr/12/rapports/r1537-01.asp

* 119 Arnaud Devillard, Christophe Pallez (Cnil): «We will have the possibility of giving fines» 19/04/2004, www.01net.com and Christophe Lagane, the data-processing law and freedoms in the course of recasting, April 14, 2004, http://www.vnunet.fr

* 120 Considering n° 4 of the directive of July 31, 2002  : «  (...) Directive 97/66/EC must be adapted to and the technology market trends of the electronic services of communications in order to guarantee a level equal of data protection in personal matter and life deprived to the users of services of electronic communications accessible to the public, independently of technologies used (...)«.

* 121 Article 1st subparagraph 2 of directive 2002/58 of July 31, 2002  : «  The provisions of this directive specify and supplement directive 95/46/EC  ».

* 122 Article 3, directive 2002/58 of July 31, 2002.

* 123 Article 2 (D), directive 2002/58 of July 31, 2002.

* 124 Article 5, directive 2002/58 of July 31, 2002.

* 125 CJCE, November 6, 2003, C-10101 business, Bodil Lindqvist  ; Yannick-Eléonore Scaramozzino, Protection Of the Intellectual Property: Data protection in personal matter and Internet, 2003, www.scaraye.com/article.php?rub=6&sr=14&a=60

* 126 The Law on the Numerical Economy (LEN) http://ameli.senat.fr/publication_pl/2003-2004/144.html and www.senat.fr/leg/pjl03-144.html This Bill which should be definitively adopted at the end of April 2004 had a at the very least chaotic course: the text of the preliminary draft of law on the numerical economy goes back to mid-November 2002, the adoption in the Council of Ministers of January 15, 2003; the text adopted in first reading by the French National Assembly of February 26, 2003. Then, the text adopted by the Senate in first reading comes on June 25, 2003. Then, the text adopted by the French National Assembly in second reading on January 8, 2004 (Articles 1 to 14 - Articles 15 at end). Lastly, the text of the bill was forwarded to the Senate on January 9, 2004.

Complete file  : www.assemblee-nationale.fr/12/dossiers/economie_numerique.asp. The Law on the Numerical Economy finally was on adopted May 13, 2004 (Senate: Examination and adoption of the bill for confidence in the numerical economy Thursday May 13, 2004. final text n° 75 (2003-2004)

http://www.assemblee-nat.fr/12/dossiers/economie_numerique.asp)

* 127 Ultimate episode, the parliamentary groups PS and PC announced that they will seize together the constitutional Council on certain provisions of the LEN, Estelle Dumout, Prochaine stage for the LCEN: the constitutional Council, May 13, 2004, www.zdnet.fr

* 128 In the bill such as adoptee on May 13, 2004, that becomes article 6, Bill for confidence in the numerical economy www.senat.fr/pl/75-0304.pdf. Article (à) of the bill transmitted by the Senate in second reading, April 8, 2004, http://ameli.senat.fr/publication_pl/2003-2004/144.html.

* 129 Ibid, article 6-5.

* 130 Ibid, article 6-8.

* 131 Modification of the article 2bis8: «  The legal authority can prescribe in summary procedure or on request, with any person mentioned to the 1 and 2, all measurements suitable to put an end to a damage caused by the contents of a service of public communication on line, such as those aiming ceasing storing these contents or, failing this, at ceasing giving access of them  ». Text n° 144 (2003-2004) transmitted to the Senate on January 9, 2004, http://www.senat.fr/leg/pjl03-144.html the text adopted by the senate on April 8, 2004 indicates  : «  The legal authority can prescribe in summary procedure or on request, with any person mentioned to the 2 or, failing this, with any person mentioned to the 1, all measurements suitable to prevent a damage or to put an end to a damage caused by the contents of a service of communication to the public on line  » http://ameli.senat.fr/publication_pl/2003-2004/144.html. It is this text which was adopted on May 13, 2004, article 6-8, Bill for confidence in the numerical economy www.senat.fr/pl/75-0304.pdf.

* 132 Stephan Length, «We will be able to go in justice to ask a FAI to act against piracy», 09/04/2004, www.01net.com

* 133 Guillaume Deleurence, the LEN more reconciling with regard to the FAI, 09/04/2004, www.01net.com

* 134 Article 1st of the Bill for confidence in the adopted numerical economy on May 13, 2004, www.senat.fr/pl/75-0304.pdf.

* 135 To look further into this subject, one will read: Julien Lacker, works in line in compared right: rights American and French, May 2003, 79p. www.juriscom.net

* 136 Intellectual Property and the National Information Infrastructure, The Carryforward off the Working Group one Intellectual Property Rights, 15 November 1995, www.uspto.gov/web/offices/com/doc/ipnii/

* 137 The ease off infringement and the difficulty off detection and enforcement will causes copyright owners to look to technology, have well have the law, for protection off to their works. However, it is clear that technology edge Be used to defeat any protection that technology may provide. The Working Group finds that legal incentive protection alone will not Be adequate to provide to authors to create and to disseminate works to the public. Similarly, technological effective protection likely will not Be unless the law also provides sum protection for the technological processes and systems used to prevent gold restrict unauthorized use copyrighted works off. (...) Therefore, the Working Group recommends that the Copyright Act Be amended to include has new Chapter 12, which would include has provision to prohibit the importation, manufacture gold distribution off any device, product gold component incorporated into has device gold product, but the provision off any service, the primary purpose gold effect off which is to avoid, bypass, remove, deactivate, but otherwise circumvent, without authority off the copyright owner gold the law, any process, treatment, mechanism gold system which prevents gold inhibits the exclusive violation off any off the rights under Section 106. The provision will not eliminate the risk that protection systems will Be defeated, goal it will reduce it. Intellectual Property and the National Information Infrastructure, The Carryforward off the Working Group one Intellectual Property Rights, 15 November 1995, p. 230. www.uspto.gov/web/offices/com/doc/ipnii/

* 138 It is an in particular question owing to the fact that the «Section 1201 divides technological measures into two categories: measures that prevent unauthorized accesses to has copyrighted work and measures that prevent unauthorized copying off has copyrighted work  ». The DIGITAL Millennium Act Copyright, 17 U.S.C.S. 1201, 1202, December 1998, p. 4. www.copyright.gov/legislation/dmca.pdf

* 139 Cf recent above mentioned businesses  : Federal court of San Francisco on February 19, 2004, www.321studios.com/PRESS/SJ%20Order.pdf & Court of New York U.S. District Judge Richard Owen, 1:03 box - cv-08970-RO, Paramount Pictures and Twentieth Century Fox Film v. 321 Studios, http://news.findlaw.com/hdocs/docs/cyberlaw/pp32130304opn.pdf

* 140 Rémy KHOUZAM, How the fear of under-protection will generate the catastrophe of over-protection: constitutional examination of the DIGITAL Millenium Copyright Act (DMCA), 2004

www.lex-electronica.org/articles/v9-1/khouzam.htm; Douglas Lichtman and William Moors, indirect liability for copyright infringement: year economic perspective, Harvard Newspaper off Law & Technology, Volume 16, Number 2 Spring 2003, 16p.

* 141Copyright & Fair Use Overview  :http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/index.html

* 142 DaN L. Burk «Anti-Circumvention Misuse», 2002, p. 4.

http://intel.si.umich.edu/tprc/papers/2002/29/misuse.pdf

* 143 DaN L. Burk «Anti-Circumvention Misuse», 2002,

http://intel.si.umich.edu/tprc/papers/2002/29/misuse.pdf

* 144 Sandrine Rouja, the American model of fight against the hacking of music exports herself: review, April 1, 2004, www.juriscom.net

* 145 http://www.theorator.com/bills108/s2237.html

* 146 David McGuire, Pirate' Bill Aims Law At Song Swappers, http://www.washingtonpost.com/wp-dyn/articles/A27801-2004Mar26.html

* 147 http://www.theorator.com/bills108/s2237.html

* 148 Article 29 Groups data protection, Working paper on the Transfers of personal data towards third countries: Application of article 26 (2) of the directive of the EU relating to the data protection to the constraining rules the company applicable to the international transfers of data, June 3, 2003, 22p. www.europa.eu.int/comm/privacy

* 149Article 25- Principles 1. «  The Member States provide that the transfer to a third country of data in personal matter being the object a treatment, or intended to be the subject of a treatment after their transfer, can take place only if, subject to the respect of the national provisions taken pursuant to the other provisions of this directive, third country in question ensures an adequate level of protection  ». Directive 95/46/EC of the European Parliament and the Council of October 24, 1995, directive on the protection of the physical people with regard to the processing the data in personal matter and to freedom of movement of these data, Texte published in the Official Journal of the European Communities n° L 281 of the 23/11/1995 p. 0031- 0050.

* 150 In particular the following provisions interest us  : Article 26- Exemptions 1. «  Notwithstanding article 25 and subject to contrary provisions of their national law governing of the particular cases, the Member States provide that a transfer of data in personal matter towards a third country not ensuring an adequate level of protection within the meaning of article 25 paragraph 2 can be carried out, provided that: ) the person concerned has undoubtedly gave her assent to the transfer considered or

b) the transfer is necessary to the fulfilment of a contract between the person concerned and the person in charge for the treatment or for the execution of précontractuelles measurements taken at the request of the person concerned or

c) the transfer is necessary to the concluding or the fulfilment of a concluded contract or to conclude, in the interest of the person concerned, between the person in charge for the treatment and a third or

d) the transfer necessary or is made juridically obligatory for the safeguard of an important public interest, or for the observation, the exercise or the defense of a right in justice or

e) the transfer is necessary to the safeguard of the vital interest of the person concerned or

f) the transfer intervenes at the beginning of a public register which, under the terms of legislative or lawful provisions, is intended for the information of the public and is opened with the consultation of the public or any person justifying of a legitimate interest, insofar as the legal conditions for the consultation are met in the particular case  . 2. Without damage of paragraph 1, a Member State can authorize a transfer, or a whole of transfers, data in personal matter towards a third country not ensuring an adequate level of protection within the meaning of article 25 paragraph 2, when the person in charge for the treatment offers sufficient guarantees in comparison with the protection of the private life and freedoms and basic rights of the people, like with regard to the exercise of the corresponding rights; these guarantees can in particular result from suitable contractual clauses  ». Directive 95/46/EC of the European Parliament and the Council of October 24, 1995, directive on the protection of the physical people with regard to the processing the data in personal matter and to freedom of movement of these data, Texte published in the Official Journal of the European Communities n° L 281 of the 23/11/1995 p. 0031- 0050.

* 151 First Commission Report on the implementation of the Directive on the data protection, «  Analysis and impact study one the implementation off Directive EC. 95/46 in Member States  », May 16, 2003, 68p.

http://europa.eu.int/comm/internal_market/privacy/lawreport/data-directive_fr.htm

* 152 European Commission, Interior DG Marche, Services, Intellectual and Industrial Propriété, Medias and Protection of Give, the Director  - National Notifications under the terms of article 26, paragraph 3 of the directive and exchange of better practices, August 21, 2003, p. 1.

http://europa.eu.int/comm/internal_market/privacy/docs/lawreport/notification-art-26_fr.pdf

* 153 Ibid, p. 4.

* 154 In particular the opinion of January 29, 2004, Article 29 Groups data protection, opinion 2/2004 on the adequate level of protection of the data in personal matter contained in the files of the air passengers (PNR) transferred to the Office from the customs and protection from the borders from the United States (US CBP), Adopté on January 29, 2004, 14p.

http://europa.eu.int/comm/internal_market/privacy/docs/wpdocs/2004/wp87_fr.pdf

* 155 www.cnil.fr/index.php?id=1017 at February 24, 2004.

* 156 Ibid

* 157 «  (...) In parallel, the Council examined a project of negociating brief between the European Union and the United States intended to create the obligation for the airline companies to transfer the data passengers to the American authorities and to authorize these last to be reached directly the systems of reservation. It is in this context that the European Parliament, seized of this draft agreement, decided on April 21 2004 to seize the Court of Justice so that it comes to a conclusion about its compatibility with the European legislation  ». PNR: last evolutions, 3/05/2004, www.cnli.fr

* 158 Decision of the Commission relating to the standard contractual clauses for the transfer of data in personal matter towards third countries, June 15, 2001, 14p.

http://europa.eu.int/comm/internal_market/privacy/modelcontracts_fr.htm

* 159 Guillaume Desgens-Pasanau, transborder Data flows: legal and average risks of protection, April 16, 2002, www.journaldunet.com/juridique/juridique020416.shtml

* 160 Renato Ianella, DIGITAL Rights Management (DRM) Architectures, D-Lib Magazine, v. 7, N. 6, June, 2001

www.dlib.org/dlib/june01/iannella/06iannella.html

* 161 Grouping of the Editors of Services On Line, the management of the numerical rights, DRM - DIGITAL Right Management, the cards sets of themes, May 2003, p. 1. www.geste.fr/fiches/fiches/fiche3_drm1.pdf

* 162 Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic, MediaTeam Oulu, Information Processing Laboratory, Experimental DRM Structure Using Watermarking and PKI, University off Oulu, Finland, p. 2.

www.mediateam.oulu.fi/publications/pdf/444.pdf

* 163 In this respect, it will be noted that this system is not closely related to alliances of manufacturers such as the TCG like with the initiatives of Microsoft with Longhorn and TCPA.

* 164 The license is a file XML (containing at the same time the certificate of the user, the key of decoding of the contents encryptée with the public key of the user and information suitable for the use of the license). The key of coding is encryptée according to a coding XML and the license is signed with a signature XML.

* 165 At present, this system uses as language of the XML what makes it possible for the moment only to define simple rights of users as a long time as the license is valid. It is obvious that then the system will use a language of the type ODRL or XrML.

* 166 In this respect, it will be noted that this PKI must be existing.

* 167 For recall, a certificate is a document which makes it possible to attest that a public key belongs to you. For that, it contains several information (public key, name, company, email, validity date of the certificate,....). This information is certified to be right by an authority of certification (CA, ex  : Verisign) which is supposed to have checked this information before to have validated your certificate. CA chops and signs the certificate using its own private key. It is thus enough to know its public key to check the validity of a certificate generated by it. Authentification by certificates X.509, Patrick Chambet, April 1999, p. 3.

www.chambet.com/publications/Certifs-X509.pdf

* 168 The certification authority (CA) is share off PKI. Its task is to link the identities off users and to their encryption key even together using certificates. The architecture use X.509 certificates, which are used to verify the authenticity off licenses and authorize the buying off them.

* 169 One is reminded that the system functions only insofar as the users do not divide their private key...

* 170 «  Currently the protection mechanism is implemented directly in the player, goal in the future we to plan uses downloadable tools in the player to extract the watermark and decrypt the content. The watermark is used to content identify Copy protected and to curry information needed to acquire has license  ». Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic, MediaTeam Oulu, Information Processing Laboratory, Experimental DRM Structure Using Watermarking and PKI, University off Oulu, Finland, p. 5.

www.mediateam.oulu.fi/publications/pdf/444.pdf

* 171 One will refer to the document to have more precise details on the methods tested of attacks on this system. Ibid, p. 6.

* 172 www.microsoft.com/windows/windowsmedia/wm7/drm/architecture.aspx

* 173 Etienne Wery, Microsoft is condemned by the European Commission for abuse dominant position, 24 Mars 2004, www.droit-technologie.org/1_2.asp?actu_id=911

* 174 Microsoft reveals its technology anti-hacking, Atelier groups BNP Paribas - 03/05/2004 www.atelier.fr/  ; Microsoft introduces time into the security of the audio-visual files, 05/05/2004,

www.neteconomie.com

* 175 iTunes, www.apple.com/itunes/

* 176 BMG, www.bmg.com/

* 177 Wippit, http://wippit.com/

* 178 OD2, www.ondemanddistribution.com/fre/home/home.asp

* 179 One year after, APPLE sold approximately 50 million titles, iTunes: 50 million songs, and the promotion of the iPod in no-claims bonus, March 17, 2004,

www.atelier.fr/article.php?artid=27119&catid=30

* 180 Daniel Semaya, The Future off DIGITAL Rights Content Management for Distribution, May 30, 2003, p.7. www.cs.princeton.edu/ugprojects/listing.php?user=dsemaya&type=senior

* 181 www.apple.com/support/itunes/authorization.html

* 182 Ibid, p. 8.

* 183 Steve Jobs, 20 May 2002, www.time.com/time/globalbusiness/printout/0,8816,237026,00.html

* 184 November 26, 2003, www.transfert.net/a9627, November 22, 2003,

www.theregister.co.uk/content/4/34141.html

* 185 Arnaud Devillard, BMG sells his music in peer-to-peer legal

01net, 17/03/2004, www.01net.com/article/236232.html

* 186 In the long term, it is a question from approximately 200  000 titles.

* 187 The tariff offers proposed by Wippit recently fell what seems to be the beginning of a price war in Europe, war of conquest of a market: «Wippit will salt summons downloads, including Outkast' S hit individual «Hey Ya!,» for 29 pence; others will Be priced At 49 pence, 79 pence and 99 pence  ». Reuters, Wippit Triggers Price War with 29p Song Downloads, Fri Apr 2, 2004

www.reuters.com/newsArticle.jhtml?type=internetNews&storyID=4738740

* 188 http://wippit.com/about/

* 189 Bill Rosenblatt, Two Major Labels Wippit, March 18, 2004,

www.drmwatch.com/ocr/article.php/3327821

* 190 http://wippit.com/about/

* 191 Bill Rosenblatt, Integrating DRM with P2P Networks: Future Enabling the off Content Online Business Models, November 18, 2003 www.drmwatch.com/resources/whitepapers/article.php/3112631

* 192 Ibid, www.drmwatch.com/resources/whitepapers/article.php/11655_3112631_3

* 193 Ibid

* 194 Ibid

* 195 (Nicolas Vermeys, Citizens Canadian, download in peace! 5/04/2004,

www.juriscom.net/actu/visu.php?ID=486 and www.fct-cf.gc.ca/bulletins/whatsnew/T-292-04.pdf). The Canadian Association of the Industry of the Disc (SHOUTED) interjeté call of this decision of judge Konrad Von Finckenstein (Guillaume Champeau, the SOCAN supports the call of SHOUTED, April 16, 2004, www.ratatium.com) and more recently, Sabrina Brandner, MP3: to download is not to pirate, according to the court of Haarlem, 20/05/2004, www.Juriscom.net

* 196 Wouter Van Lancker, the MP3 with complete freedom in the Netherlands, May 13, 2004, http://www.ratiatum.com/

* 197 CEN/ISSS, DIGITAL Rights Management, Final Carryforward, September 30, 2003, p. 82-83. www.cenorm.be

* 198 www.microsoft.com/windows/windowsmedia/drm.aspx and

http://download.microsoft.com/download/a/1/a/a1a66a2c-f5f1-450a-979b-ddf790756f1d/WMRMsap_bro.pdf

* 199 These documents come from OD2, Stanislas Hintzy. March 24, 2004.

* 200 www.ondemanddistribution.com/fre/services/cmanagement.asp

* 201 www.ondemanddistribution.com/fre/aboutus/infra.asp

* 202 France (Alapage.com, Fnac.com, MSN France, MTV France, NC Numericable, Tiscali, Wanadoo); The United Kingdom (mycokemusic.com, MSN Music Club, Freeserve Music Club, HMV DIGITAL Downloads, Tiscali Music Club, Ministry Off Sound, Virgin Downloads); Germany (Tiscali OF, Karstadt, www.kontor.cc, MTV OF, www.wom-download.de, Markt Media)  ; Austria (musicdownload.aon.at, Chello Musiczone), Switzerland ( www.directmedia.ch), Italy (Tiscali IT, MTV IT)  ; Spain (Tiscali ES, Prisacom, MTV ES)  ; Belgium (Skynet Belgacom)  ; Holland (Tiscali NL, MTV NL)

* 203 www.connect.com/index.asp Sony Connect will propose a catalog of 500.000 titles in remote loading with the chart, in a format owner compatible with the only numerical walkmans of Sony, http://news.grandlink.org/2004-03-08/03-12-334-vendredi.html. This service is on line since May 4, 2004 (Sony launches Connect, its service of remote loading of music on line, 4/05/2004, www.atelier.fr). On the other hand, the format Sony owner indeed was that selected  : the downloaded titles could be read only by apparatuses of Sony mark.

* 204 According to the information given on Grandlink Music, Fnacmusic.com will choose a model on subscription coupling streaming and remote loading, http://news.grandlink.org/2004-03-08/03-12-334-vendredi.html

* 205 Launched on last 18 May, the new version of the site proposes tariffs which are becoming the standard of the market: «  between 0,99 euro and 1,19 euro the title and of 9,99 euros to 11,99 euros the album, according to their innovation  ». Arnaud Devillard, Virgin and Fnac renovate their supermarkets of the remote loading, 14/05/2004, www.01net.com/article/242425.html

* 206 Estelle Dumout, Fnac prepares her site of musical distribution, March 15, 2004,

www.zdnet.fr/actualites/internet/0,39020774,39145408,00.htm

* 207 Europe' S Legitimate Music Download Sites Rush To Beat iTunes, 05/02/2004,

www.pressreleasenetwork.com/

* 208 One will remember the remarks made by Jeremy Rifkin in the Age of the access  : the revolution of the new economy. The Discovery, 2000, 395p.

* 209 Marlene Trezeguet, technical measurements of protection of a work confronted with the rights of the user, October 14, 2003, www.cejem.com/article.php3?id_article=135

* 210 It will be noted that in measurement or OD2 is a distributer having signed an agreement with Microsoft, it diffuses his offer under his format owner, the WMA.

* 211 http://sib1.od2.com/common/frameset/frames.asp

* 212 www.wanadoo.fr/bin/frame2.cgi?u=http%3A//sib1.od2.com/common/config.asp%3Fshop%3D6%26associd%3D7%26clear%3Dtrue%26initialised%3D1

* 213 One will easily include/understand the satisfaction of RealNetworks at the time of the sanction of Microsoft by the European Commission on March 24, 2004. Indeed, judge this decision «  basically important because the Commission formally affirmed that the strategy of Microsoft to integrate Media Player is illegal  ». Philippe Ricard, Brussels wants to put a term at the hegemony of Microsoft, the World, March 24, 2004, p. 19. With the call formulated by Rob Glazer, president and founder of RealNetworks for «  that they open the walkman iPod with technologies external like the RealAudio codes and the solutions of DRM Helix  » (Jerome Bouteiller, RealNetworks wants to work with APPLE and its iPod, 24/03/2004, www.neteconomie.com) Steve Jobs A seems T it answered by the negative one  when it indicates in an interview granted to Wall Street Journal  : «The iPod walk already with the service of music in line n°1 in the world (iTunes Music Blind, note), and iTunes Music Store goes with the world number one of the numerical walkmans. The numbers two are very far behind. Why you would like that we work with numbers 2» (Philippe Astor, APPLE supports on the sales records of the iPod for snober RealNetworks, April 19, 2004, www.zdnet.fr)

* 214 www.listen.com/

* 215 http://news.grandlink.org/2004-03-08/03-12-334-vendredi.html

* 216 www.e-compil.fr/help/cgv.jsp

* 217 Ibid, article 5.5

* 218 http://sib1.od2.com/common/frameset/frames.asp

* 219 It states nevertheless that: «  All the songs inevitably do not have the rights of engraving. They are the houses of discs (Labels) which decide these rights for each song. The Reader Media checks the licenses of each song to check that such or such title has the rights enabling him to be engraved. (...) The permanent remote loadings can be copied by the reader Windows Media from walkmans  ».

* 220 www.mtv.fr/mtv.fr/jhtml/shp/MaHttpMusicDownload.jhtml?u=http://sib1.od2.com/common/config.asp%3Fshop%3D34%26associd%3D2

* 221 www.wanadoo.fr/bin/frame2.cgi?u=http%3A//sib1.od2.com/common/config.asp%3Fshop%3D6%26associd%3D7%26clear%3Dtrue%26initialised%3D1

* 222 http://sib1.od2.com/common/frameset/frames.asp

* 223 On the other hand, on line is indicated for each title of the album the characteristics and rights associated with this one (cf Appendix 2)

* 224 http://sib1.od2.com/common/frameset/frames.asp

* 225 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=2

* 226 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=5

* 227 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=6

* 228 www.apple.com/itunes/store/

* 229 http://sib1.od2.com/common/frameset/frames.asp

* 230 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=0

* 231 http://sib1.od2.com/common/frameset/frames.asp

* 232 Microsoft works on its next DRM, 30/03/2004, www.clubic.com/n/n12144.html

* 233 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=4

* 234 http://sib1.od2.com/common/frameset/frames.asp

* 235 If you lost a license or a song and/or all the songs and/or all files WMA corresponding.

* 236 http://musicdownloads.walmart.com/catalog/servlet/HelpTopicServlet?topicIndex=2

* 237 http://sib1.od2.com/common/frameset/frames.asp

* 238 David Worthington, BetaNews, Microsoft Remakes DRM for MSN Music Service, March 29th, 2004. www.betanews.com/article.php3?sid=1080606040

* 239 One will note with interest that for APPLE (but that seems to be valid for the other distributers) the remote loading on line is not especially profitable. Indeed, on the 99 hundreds of a song the diffusion manufacturer/perceives only 10 hundreds... Remain however the enormous impact, for APPLE, of Ipod which allows, only, to listen to the downloaded songs. Indeed, the sales of the walkman generated a sales turnover of 264 million dollars, i.e. 13,8% of the incomes of the manufacturer (the world sales of discs move back, but the paying remote loading is not profitable, 8/04/2004, www.atelier.fr).

* 240 www.forbes.com/home_europe/newswire/2004/03/14/rtr1297846.html

* 241 One will read with attention the article published on the site of the FING, Cyril Fiévet, Micropaiement, mégatendance? 16/03/2004, www.fing.org/index.php?num=4723,2

* 242 Cf Appendix 1.

* 243 Article L. 121-1 with L. 122-12 of CPI. www.celog.fr/cpi/lv1_tt2.htm

* 244 Royalty and the Internet, Report/ratio of Broglie, July 2000, p. 33.

www.culture.gouv.fr/culture/cspla/rapportbroglie.pdf

* 245 Article L. 122-5 of CPI. www.celog.fr/cpi/lv1_tt2.htm

* 246 Article L. 311-1 with L. 311-8 of CPI. www.celog.fr/cpi/lv3_tt1et2.htm#c1

* 247 Article L. 311-4 of CPI. www.celog.fr/cpi/lv3_tt1et2.htm#c1

* 248 On the question of the relationships to the right of the competition  : CSPLA, Author's copyright and artistic and right of competition, February 2004, p. 21-28.

www.culture.gouv.fr/culture/cspla/rapportconcurrence.pdf

* 249 Remuneration for private copy was founded by the Law Lang of July 3, 1985 in order to compensate for the losses which generates the copy by the private individuals of sound records and the services recorded and diffused by the radios and televisions. http://saceml.deepsound.net/index.html

* 250 http://saceml.deepsound.net/a_qui_va_la_taxe.html

* 251 www.sacem.fr

* 252 The rights coming from the producers of sound records, of the editors of videograms, multi-media Internet, the supports as well as private copy, are in rise of 20,5%. They account for 24% of the rights of the SACEM, against 21% in 2001. Rights relating to the sales of discs: in progression of 10,2%, particularly favorable result in a very disturbed international market and in fall of- 9%. Rights of the sector of the video: record a strong progression (+35,7%), because of the sales turnover generated by the DVD. Rights coming from the exploitation of musical works starting from Internet: in evolution very favorable, especially in the field of telephony with the remote loading of ringings for the portable telephones (1,3 million euros). On the other hand the rights coming from the supports multi-media are falling. The private Copy: the total progression is +68,5%. The sound private copy represents the ¾ boxed rights. www.sacem.fr

* 253 Annual report 2002, SACEM, 2002, p. 25. www.sacem.fr

* 254 L.122-1 article in L.122-4 of CPI

* 255 Annual report 2002, SACEM, 2002, p. 10. www.sacem.fr

* 256 www.celog.fr/cpi/lv3_tt1et2.htm#titre1

* 257 Julien Lacker, works in line in compared right: rights American and French, May 2003, p. 28. www.juriscom.net

* 258 ARIANE Beky, Royalty: Brussels militates for a European legislation, 19/04/2004, http://www.neteconomie.com/perl/navig.pl/neteconomie/infos/article/20040419182655

* 259 Royalties: the Commission suggests a European legislation on the governorship of the collective trust companies, DNN: IP/04/492, 19/04/2004,

http://europa.eu.int/rapid/start/cgi/guestfr.ksh?p_action.gettxt=gt&doc=IP/04/492|0|RAPID&lg=FR&display= and Communication of the European Commission, the management of the royalty and the close rights within the domestic market, April 16, 2004, 21p,

http://europa.eu.int/comm/internal_market/copyright/docs/management/com-2004-261_fr.pdf

* 260 Music on line: Yahoo vis-a-vis the complexity of the licenses in Europe, 27/04/2004, www.atelier.fr

* 261 Peter Biddle, Paul England, Marcus Peinado, and Bryan Willmann, The Darknet and the Future off Content Distribution, 2002, 16p. http://crypto.stanford.edu/DRM2002/darknet5.doc

* 262 Ibid, p. 14

* 263 Olivier Bomsel and Gilles the White, Encircled, Distribution of contents on Internet - economic Analysis of the remedies for the skirting of the rights of ownership intellectual, 14p. Working note Contango, 8 Mars 2004, www.cerna.ensmp.fr and Olivier Bomsel with the collaboration of Jérémie Charbonnel, Gilles the White, Abakar Zakaria, economic Enjeux of the distribution of the contents, Cerna, 52p., January 2004, www.cerna.ensmp.fr

* 264 Lionel S. Sobel †, DRM have year enabler business models off: ISPs have digital retailers, Berkeley Technology Law Journal, 2003, p. 14-15.

* 265 A contrario, a study published by Felix Oberholzer-Gee, of Harvard, and Koleman Strumpf, of the university of North Carolina-Chapel Hill indicates that the P2P has only one weak impact on the CD sales. According to them, «the Net surfers who download music on line are individuals who would not have bought the album, even if the systems of exchange did not exist. The exchange of files would not threaten musical industry  », Workshop BNP Parisbas, March 31, 2004 and Felix Oberholzer, Koleman Strumpf, The Effect off Dirty Sharing File one Record  : Year Empirical Analysis, March 2004, 52p.

http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf and Domenica Piotet, For the honor of the pirate: would musical industry become luddist?, www.atelier.fr

* 266 CSPLA, OPINION N° 2004-1 relating to the author's copyright and the personal freedoms, March 2, 2004, www.culture.gouv.fr/culture/cspla/avis04-1.htm

* 267 But already of the voices protests against these proposals  : «  In conclusion, it seems to us that the proposal of a tariff-floor for the upload is a dangerous lawful innovation for the future of cultural industries. This proposal explicitly aims restoring the competition of the cultural bonds and at transforming Internet into media of mass, which goes exactly against what it is necessary to make  ». One will read with interest the report/ratio of the FING  : Distribution of contents on Internet - Comments on the project of tax on the upload of Michel Gensollen, Laurent Gille, Marc Torturer, Nicolas Curien, April 2004, p. 38.

www.enst.fr/egsh/p2p/documents/Fing_DistributionContenus1.pdf

* 268 Guillaume Gomis, the Communities Peer-to-Peer and having right: peace by the legal license?, April 2, 2004, 5p. www.juriscom.net

* 269 Jeremy Rifkin in the Age of the access  : the revolution of the new economy., the Discovery, 2000, 395p.

* 270 Distribution of contents on Internet - Comments on the project of tax on the upload  of Michel Gensollen, Laurent Gille, Marc Torturer, Nicolas Curien, April 2004, p. 34 and following for the development of the sales leaflet and where the possible advanced ones.

www.enst.fr/egsh/p2p/documents/Fing_DistributionContenus1.pdf

* 271 John Barrett, DIGITAL Music: Market, Services and Consumers, Parks Ace, 4Q 2003

* 272 www.sppf.com/legislation/index.html






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Entre deux mots il faut choisir le moindre"   Paul Valery