From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: ea5255f0b826f9964c3ca8e647e01b294b3528ed7632b126ceadc6225a3534f7
Message ID: <199603311312.IAA25762@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-03-31 16:31:00 UTC
Raw Date: Mon, 1 Apr 1996 00:31:00 +0800
From: John Young <jya@pipeline.com>
Date: Mon, 1 Apr 1996 00:31:00 +0800
To: cypherpunks@toad.com
Subject: PIR_ate
Message-ID: <199603311312.IAA25762@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
3-31-96. NYT:
"Sold Out." By James Boyle, American University law
professor
We are in the middle of an information land grab and no
one seems to have noticed. Congress is now considering
the Administration's proposal for intellectual property
on the Internet, aimed at "saving" this thriving medium.
Using a far-fetched theory of what constitutes
"copying," the proposal would turn browsing an Internet
document into a copyright violation. It would
effectively privatize much of the public domain by
transforming the current law of fair use. It would make
on-line service providers strictly liable for their
customers' copyright violations, thus giving providers
an incentive to monitor what you do in cyberspace.
"Poetry can only be made out of other poems, novels out
of other novels," as the critic Northrop Frye famously
put it. The same goes for computer programs, which build
on the contributions of earlier hackers. Every
intellectual property claim is a chunk taken out of the
public domain. If we give someone a software patent over
basic functions, at some point the public domain will be
so diminished that future creators will be prevented
from creating because they won't be able to afford the
raw materials they need. An intellectual property system
has to insure that the fertile public domain is not
converted into a fallow landscape of walled private
plots.
PIR_ate
Return to March 1996
Return to “John Young <jya@pipeline.com>”
1996-03-31 (Mon, 1 Apr 1996 00:31:00 +0800) - PIR_ate - John Young <jya@pipeline.com>