Connect with us

Mobile

New Government Rules Make Jailbreaking Legal

Published

on

Screeeeech! That’s the sound of the wheels on Apple’s App Store and policy bus grinding to a sudden stop to check to see if they heard this right. According to the AP, new rules announced today by the US Government will allow the practice of Jailbreaking your iPhone so that unapproved apps can be installed. The rules also allow users to unlock their phones to switch carriers. Every three years the Library of Congress authorizes exemptions such as this to laws to ensure that the laws don’t inhibit non-infringing use of copyright. This is just breaking and I’m sure there will be much more on it all over the Internet very, very soon.

You can read the full press release below:

Librarian of Congress Announces DMCA Section 1201 Rules for
Exemptions Regarding Circumvention of Access-Control Technologies
Librarian of Congress James H. Billington today released the following statement:
Section 1201(a)(1) of the copyright law requires that every three years I am to determine whether there are any classes of works that will be subject to exemptions from the statute’s prohibition against circumvention of technology that effectively controls access to a copyrighted work. I make that determination at the conclusion of a rulemaking proceeding conducted by the Register of Copyrights, who makes a recommendation to me. Based on that proceeding and the Register’s recommendation, I am to determine whether the prohibition on circumvention of technological measures that control access to copyrighted works is causing or is likely to cause adverse effects on the ability of users of any particular classes of copyrighted works to make noninfringing uses of those works. The classes of works that I designated in the previous proceeding expire at the end of the current proceeding unless proponents of a class prove their case once again.
This is the fourth time that I have made such a determination. Today I have designated six classes of works. Persons who circumvent access controls in order to engage in noninfringing uses of works in these six classes will not be subject to the statutory prohibition against circumvention.
As I have noted at the conclusion of past proceedings, it is important to understand the purposes of this rulemaking, as stated in the law, and the role I have in it. This is not a broad evaluation of the successes or failures of the DMCA. The purpose of the proceeding is to determine whether current technologies that control access to copyrighted works are diminishing the ability of individuals to use works in lawful, noninfringing ways. The DMCA does not forbid the act of circumventing copy controls, and therefore this rulemaking proceeding is not about technologies that control copying. Nor is this rulemaking about the ability to make or distribute products or services used for purposes of circumventing access controls, which are governed by a different part of section 1201.
In this rulemaking, the Register of Copyrights received 19 initial submissions proposing 25 classes of works, many of them duplicative in subject matter, which the Register organized into 11 groups and published in a notice of proposed rulemaking seeking comments on the proposed classes. Fifty-six comments were submitted. Thirty-seven witnesses appeared during the four days of public hearings in Washington and in Palo Alto, California. Transcripts of the hearings, copies of all of the comments, and copies of other information received by the Register have been posted on the Copyright Office’s website.
The six classes of works are:
(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
(i) Educational uses by college and university professors and by college and university film and media studies students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos
(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
(4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
(i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
(ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.
(5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and
(6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.
All of these classes of works find their origins in classes that I designated at the conclusion of the previous rulemaking proceeding, but some of the classes have changed due to differences in the facts and arguments presented in the current proceeding. For example, in the previous proceeding I designated a class that enable film and media studies professors to engage in the noninfringing activity of making compilations of film clips for classroom instruction. In the current proceeding, the record supported an expansion of that class to enable the incorporation of short portions of motion pictures into documentary films and noncommercial videos for the purpose of criticism or comment, when the person engaging in circumvention reasonably believes that it is necessary to fulfill that purpose. I agree with the Register that the record demonstrates that it is sometimes necessary to circumvent access controls on DVDs in order to make these kinds of fair uses of short portions of motion pictures.

9 Comments

9 Comments

  1. HG

    07/26/2010 at 9:25 am

    I’m sure Apple, won’t be to happy about this. But the end users sure will like this. Now more apps could be used that Apple doesn’t approve of. I wonder if the iPad would be consider in this as well? Maybe not since it’s not a phone.

  2. GTaylor

    07/26/2010 at 10:48 am

    I’ve been yanked into court often enough to be very careful of the fine print, especially those pesky connecting words and phrases.

    “(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
    (i) Educational uses by college and university professors and by college and university film and media studies students;
    (ii) Documentary filmmaking;
    (iii) Noncommercial videos

    So one point leads to another without negating what was said previously or subsequently. My paraphrase is “It is ruled that circumvention is permissible for short portions, for the purpose of criticism or comment if it is believed to be necessary for education, documentary films, or non-commercial videos.” Short segments for the purposes stated.
    Regulations are open to litigation but I don’t see any change in the status quo here.

    • GTaylor

      07/26/2010 at 10:54 am

      Sorry about the big duplication of the (copyrighted?) material in the middle. I had tried to underline the pertinent phrases but the website wouldn’t include the lines.
      My response was just trying to use a small portion of the LoC’s statement for non commercial purposes.

  3. Sumocat

    07/26/2010 at 11:24 am

    This is great news for the hackers who no longer need to fear prosecution for their jailbreaking solutions. However, Apple had not been pursuing prosecution anyway, and no other changes to the jailbreaking or unlocking processes have been mandated, so the situation is mostly unchanged. The upside is hackers won’t have to do this in secret, so it may entice more white hats to join in.

  4. JOE H

    07/26/2010 at 12:56 pm

    It seems to me that the real big deal here is that documentary film makers don’t need to license media in the background for their film. This is a great thing for that profession.

  5. Roberto

    07/26/2010 at 1:15 pm

    Can’t Apple still cripple jailbroken phones with software updates? It would still void the warranty on any vendors phone wouldn’t it?

    • tatej

      07/26/2010 at 6:52 pm

      Apple crippling jailbroken iPhones is a distinct possibility.

      I think an iPhone owner has the right to hack their iPhone to their heart’s content. But I don’t think Apple or ATT has to support it. If a hack is not compatible with an Apple or ATT update, the iPhone owner is out of luck.

      With that said, if Apple or ATT release an update that purposefully bricks an iPhone that has been hacked, that would be tacky, rule and really bad customer relations.

      I look forward to an iPhone 4.5 after my current contract is up (And the antenna problem is fixed) and then jailbreaking my iPhone 3g.

  6. Deni

    07/27/2010 at 4:56 am

    Great news now I can jailbreak my iPhone without the fear of FBI busting my butt.

  7. Sonny

    07/27/2010 at 5:01 am

    Hackers do not have to hide now and I also do not have to be afraid jailbreaking my iPhone although that will void my warranty.

Leave a Reply

Your email address will not be published.

As an Amazon Associate I earn from qualifying purchases.