1. Copyright in the Digital Age
The digital revolution has fundamentally transformed how creative works are created, distributed, and consumed. Digital technologies enable perfect copies at zero marginal cost, global instant distribution, and remix culture that challenges traditional copyright concepts. The Copyright (Amendment) Act, 2012 introduced provisions to address these challenges.
The digital environment presents unique challenges: (1) Perfect copying - digital copies are identical to originals; (2) Global distribution - internet knows no borders; (3) Anonymous infringement - difficult to identify infringers; (4) Scale of infringement - millions of copies can be made instantly; (5) User-generated content - blurs line between creators and consumers.
2. Technology Protection Measures (Section 65A)
The 2012 Amendment introduced Section 65A to protect technological measures used by copyright owners to prevent unauthorized access and copying of their works. This aligns Indian law with the WIPO Copyright Treaty (WCT) and WIPO Performances and Phonograms Treaty (WPPT).
Any person who circumvents an effective technological measure applied for the purpose of protecting any of the rights conferred by this Act, with the intention of infringing such rights, shall be punishable with imprisonment which may extend to two years and shall also be liable to fine.
2.1 What are Technology Protection Measures?
TPMs include various technologies that restrict unauthorized use of digital works:
- Access Controls: Encryption, passwords, authentication systems
- Copy Controls: Technologies preventing unauthorized copying
- Digital Watermarking: Invisible marks identifying the work
- Rights Expression Languages: Machine-readable terms of use
- Trusted Systems: Hardware/software controlling content access
2.2 "Effective" Technological Measure
Section 65A protects only "effective" measures. A measure is effective if it achieves its protective purpose in the normal course of operation. A measure that is easily bypassed may not qualify for protection.
2.3 Intent Requirement
Unlike US DMCA provisions, Section 65A requires "intention of infringing" the protected rights. Circumvention without intent to infringe may not be punishable. This is a significant limitation compared to blanket anti-circumvention laws.
3. Anti-Circumvention Provisions
Section 65A creates both civil and criminal liability for circumvention of technological measures.
3.1 Acts Prohibited
- Circumventing effective TPMs with intent to infringe
- Manufacturing circumvention devices (by implication)
- Distributing circumvention tools (by implication)
- Providing circumvention services (by implication)
3.2 Exceptions to Anti-Circumvention
The proviso to Section 65A provides important exceptions:
Nothing in sub-section (1) shall prevent any person from:
- (a) doing anything referred to therein for a purpose not expressly prohibited by this Act;
- (b) doing anything necessary to conduct encryption research using a lawfully obtained encrypted copy;
- (c) conducting any lawful investigation;
- (d) doing anything necessary for the purpose of testing the security of a computer system or a computer network with the authorisation of its owner or operator;
- (e) doing anything necessary to circumvent technological measures intended for identification or surveillance of a user; or
- (f) taking measures necessary in the interest of national security.
The exceptions for encryption research and security testing are crucial for cybersecurity professionals and researchers. However, they require careful interpretation - the research must be lawful and, for security testing, authorized by the system owner.
4. Protection of Rights Management Information (Section 65B)
Section 65B protects electronic rights management information (RMI) embedded in or associated with works.
Any person, who knowingly:
- (i) removes or alters any rights management information without authority, or
- (ii) distributes, imports for distribution, broadcasts or communicates to the public, without authority, copies of any work, or performance knowing that electronic rights management information has been removed or altered without authority,
shall be punishable with imprisonment which may extend to two years and shall also be liable to fine.
4.1 What is Rights Management Information?
RMI includes information that identifies:
- The work and its author
- The owner of any right in the work
- Terms and conditions for use of the work
- Numbers or codes representing such information
4.2 Significance of RMI Protection
RMI protection serves multiple purposes:
- Enables tracking of works in digital environment
- Facilitates licensing and royalty collection
- Helps identify authors and copyright owners
- Supports enforcement against infringement
5. Digital First Sale Doctrine Issues
The first sale doctrine (exhaustion) permits resale of lawfully acquired copies. However, digital distribution challenges this doctrine significantly.
5.1 Traditional First Sale
Under Section 14, the copyright owner's distribution right is exhausted after the first authorized sale of a physical copy. The buyer can resell, gift, or dispose of that copy without permission.
5.2 Digital Challenges
- No Physical Copy: Digital distribution typically involves licenses, not sales
- Reproduction Required: Digital transfer requires making a new copy
- License Restrictions: Terms of service often prohibit resale
- Technical Measures: DRM prevents transfer to new owners
Most digital content transactions are structured as licenses rather than sales. When you "buy" an e-book or digital music, you typically receive a license to access the content, not ownership of a copy. This distinction has significant implications for transferability, inheritance, and consumer rights.
5.3 Indian Position
India has not explicitly addressed digital first sale. The combination of Section 14 rights and Section 52 exceptions may provide some framework, but clear guidance is lacking. The issue remains important for digital libraries, used digital goods markets, and estate planning for digital assets.
6. Streaming and OTT Platforms
Over-The-Top (OTT) streaming platforms have revolutionized content distribution, raising new copyright issues.
6.1 Legal Framework for Streaming
- Communication to Public: Streaming constitutes communication to public under Section 2(ff)
- Making Available: On-demand streaming is "making available" the work
- License Required: Platforms need licenses from all relevant right holders
- Multiple Rights: Film streaming involves film rights, music rights, and underlying works
6.2 OTT Licensing Structure
OTT platforms typically acquire:
- Content Licenses: Rights to stream specific films, shows, music
- Territory Licenses: Rights for specific geographic regions
- Exclusive vs. Non-Exclusive: Exclusive deals command premium prices
- Window Rights: Different release windows (theatrical, OTT, TV)
6.3 Regulatory Framework
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 regulate OTT platforms, including content classification, grievance redressal, and compliance requirements.
The court considered copyright issues in music streaming. Tips, a music label, sued Wynk for unlicensed streaming of its songs. The case highlighted the tension between statutory licensing provisions and negotiated licenses in the digital streaming context.
7. User-Generated Content
User-generated content (UGC) platforms like YouTube, Instagram, and TikTok host massive amounts of content created by users, often incorporating copyrighted material.
7.1 Copyright Issues in UGC
- Direct Infringement: Users uploading copyrighted content
- Secondary Liability: Platform liability for user uploads
- Safe Harbor: Intermediary protection under IT Act Section 79
- Fair Dealing: Some UGC may qualify as transformative use
7.2 Content ID and Automated Systems
Major platforms use automated content recognition systems:
- Content ID (YouTube): Identifies copyrighted content and allows owners to monetize, track, or block
- Audio Recognition: Identifies music in videos
- Fingerprinting: Creates unique digital signatures for content matching
7.3 Creator-Copyright Owner Balance
Platforms must balance:
- Copyright owner's right to control use of their works
- User's right to create transformative content
- Platform's interest in hosting diverse content
- Fair dealing and free expression considerations
Copyright owners argue there is a "value gap" - platforms profit from user uploads of copyrighted content while paying relatively little to creators. Platforms argue they already pay significant licensing fees and that strict liability would stifle innovation and free expression. This debate continues globally.
8. Emerging Digital Copyright Issues
8.1 NFTs and Copyright
Non-Fungible Tokens create unique challenges:
- Purchasing an NFT typically does not transfer copyright
- NFT creators may infringe by minting works they don't own
- Smart contracts can automate royalty payments
- Unclear legal framework in India
8.2 AI-Generated Content
Artificial intelligence raises novel copyright questions:
- Is AI-generated content copyrightable?
- Who is the author of AI-created works?
- Do AI training data sets infringe copyright?
- Section 2(d)(vi) refers to computer-generated works
8.3 Metaverse and Virtual Worlds
Virtual worlds create new copyright contexts:
- Virtual goods and digital fashion
- User-created content in virtual spaces
- Live performances in virtual venues
- Cross-platform content portability