[linux-elitists] Legitimate crypto circumvention examples
Karsten M. Self
Fri Aug 3 12:49:34 PDT 2001
on Fri, Aug 03, 2001 at 03:42:02PM -0400, Jay Sulzberger (firstname.lastname@example.org) wrote:
> On Fri, 3 Aug 2001, Karsten M. Self wrote:
> > on Fri, Aug 03, 2001 at 02:58:40PM -0400, Brooklyn Linux Solutions
> > (email@example.com) wrote:
> > >
> > >
> > > <<I'm counting fair use. There are 17 (I'd miscounted) enumerated
> > > exceptions in law.>>
> > >
> > > What I'm try to say, is that your only covering statutory law.
> > vs.?
> > Nonstatutory law? Fair use is a statutory exemption. It's a big one.
> > It's still a statutory exemption.
> > BTW, I thought I was mistaken, but I'm not. It's 16 exemptions ;-)
> Fair use is case law, too. And old good case law in both England and
One of my backburner projects is to compile a list of Fair Use case
cites with summaries.
Karsten M. Self <firstname.lastname@example.org> http://kmself.home.netcom.com/
What part of "Gestalt" don't you understand? There is no K5 cabal
Free Dmitry!! Boycott Adobe!! Repeal the DMCA!! http://www.freesklyarov.org
Geek for Hire http://kmself.home.netcom.com/resume.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 232 bytes
Desc: not available
Url : http://allium.zgp.org/pipermail/linux-elitists/attachments/20010803/58b1fa28/attachment.pgp
More information about the linux-elitists