Updates, as of September 12, 2014:

(The Second Edition is now available from Bloomberg BNA.)

Chapter 1 --

         

Chapter 2 --

Chapter 3 --

In July 2010, the fourth cycle completed with the following exemptions:

(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
(i)  Educational uses by college and university professors and by college and university film and media studies students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos.

(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.

(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.

(4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
(i)  The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
(ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.

(5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete.  A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and

(6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.

It must be remembered that the exemptions are only for the circumvention of an access control mechanism covered by section 1201(a)(1). It does not provide an exemption for the provision of a tool used for such circumvention, which could be a violation of section 1201(a)(2), nor for circumvention that results in infringement, which would be a violation of section 1201(b).

For more information about these exemptions, and the proceedings leading up to them, see:

http://www.copyright.gov/1201/

The online version contains this change.

(1) Request. — A copyright owner or a person authorized to act on the owner's behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection.
(2) Contents of request — The request may be made by filing with the clerk—
    (A) a copy of a notification described in subsection (c)(3)(A);
    (B) a proposed subpoena; and
    (C) a sworn declaration to the effect that the purpose for which the subpoena is sought is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of protecting rights under this title.

Congress included this provision so that it would not be necessary for a copyright owner to file a "John Doe" lawsuit to obtain the name of a user, which might then have to be dismissed and refiled in the proper venue after the location of the user was determined, thereby lowering litigation costs that might eventually have to be paid by the user. Critics have said that it would allow stalkers to pretend to be a copyright owner in order to get the name and address of a user, because there is no effective review of the subpoena request by the court clerk.

On December 19, 2003, the Court of Appeals for the DC Circuit, in RIAA v. Verizon, held that the subpoena provisions were not applicable to service providers acting as "mere conduits," since the notice provision makes no sense in that context. It is likely that the RIAA will seek remedial legislation by Congress, which will be discussed here when it is introduced.

Chapter 4 --

            The patent statute was changed in 1999 to permit the reexamination requestor to participate in the reexamination by providing written commentary on the actions of the examiner and the responses of the patent owner. Further changes were made in 2002 to give the requestor the same appeals rights as the patent owner. Previously, while either party could appeal the examiner’s decision to the Board of Patent Appeals and Interferences, only patent owner could further appeal the decision of the Board to the Court of Appeals for the Federal Circuit.

            Another change in 2002 allowed the reexamination to be based on prior art already considered by the examiner, as long as a “substantial new question of patentability” is shown. But Congress made it clear that this is not a way to second-guess the examiner.

    However, this bill is not a license to abuse patentees and waste the life of a patent. The point must be stressed that the past requirement of ‘a substantial new question of patentability’ has not been diminished. The issue raised must be more that just questioning the judgment of the examiner. There should be substantial evidence that the examiner did not properly understand the reference, or did not consider a portion of the reference in making his decision. That substantial new question must be put forward clearly in the request for reexamination. The bill preserves the necessary safeguard in the Patent Act against harassment of patentees with the safety-valve of a ‘substantial new question of patentability’ standard, not merely ‘any sort of question.’ The agency has discretion in this determination to permit reexamination, but it is not absolute. While the bill clarifies the basis for a reexamination determination and removes the overly-strict bar established by the court, which renders the available process useless in many obvious instances such as with previously considered prior art, the courts should judiciously interpret the ‘substantial new question’ standard to prevent cases of abusive tactics and harassment of patentees through reexamination.

            The reexamination provision prevents you from using anything that you could have brought up at the time of the reexamination in later litigation. Because of uncertainty about the scope of this bar, reexamination may be undesirable unless you have prior art that you are sure will invalidate the patent, or at least cause new claims that will not concern you.

            Though each revision to reexamination makes an important improvement, there are still problems that keep people from taking advantage of reexamination as an alternative to litigation. Perhaps Congress will see this as reason to institute a simplified early reexamination, such as an opposition period for a short time after the issuance of a patent to weed out patents where the best prior art was unavailable to the examiner.

The online version contains this change.

Chapter 5 --