Citations to This Work

  • Marc J. Randazza, Lenz v. Universal: A Call To Reform Section 512(F) Of The DMCA And To Strengthen Fair Use, 18 Vand. J. Ent. & Tech. L. 743 (2016)


Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to protect the integrity of the voting process even in the face of an electronic breach. To solve the problem of providing adequately secure electronic voting systems, just as in the case of music piracy, we will need both technological fixes (including better record-keeping to reduce the equivalent of an electronic hanging chad) and better legal protection for those fixes. Unfortunately, the legal regime established in the 1990’s to “solve” the problem of digital piracy – the Digital Millennium Copyright Act (“DMCA”)– which was originally crafted as a compromise between copyright owners and internet service providers to assure both continuing protection of copyright owners' property rights, and continuing growth of the internet,has been even less successful in protecting the integrity of the voting process confirming the perception that whenever law is combined with technology, the result is bound to be a legislative solution that has unforeseen loopholes in protection and unanticipated barriers to use. After the 2000 Presidential election, Congress rushed to enact the Help America Vote Act ("HAVA") intending to modernize the election process, moving the voting public into the purportedly precise and accurate world of computerized voting. But when in March 2003, a hacker broke into a Diebold computer and leaked about 15,000 internal company memoranda regarding Diebold’s e-software, including memoranda containing discussions of bugs in Diebold’s software and warnings that its computer networks were poorly protected against hackers, the shortcoming and the potential for abuse of the DMCA became apparent. The use by Diebold of procedures designed to protect music from digital pirates to prohibit the dissemination of information regarding e-voting security underscores the problems that current DMCA procedures pose to the free circulation of speech and information. The DMCA was never created to stifle either speech or public debate. Yet the use by Diebold of notice and take down procedures as currently crafted achieved such a result. Use of the DMCA notices to seek removal of this material was clearly outside the scope of DMCA procedures and if a few public-minded students had not reacted to such misuse, Diebold’s abuse of the DMCA might have gone unchallenged. Reform of the DMCA is long past due. The Act must be strengthened to continue to allow copyright owners to bring legitimate claims to stop the rampant digital piracy that threatens the economic bargain contained in the Constitution and mirrored in the DMCA. At the same time, reforms must be made to remedy the potential for abuse. Only when such reforms are achieved can the Copyright Act re-take its position as a supporter of First Amendment values.