Page:พรบ ลิขสิทธิ์ (ฉ ๒) พศ ๒๕๕๘.pdf/4

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.

Volume 132, Issue 6A
Page 10
Royal Gazette

5 February 2558

(1)the removal or alteration of [any] rights management information by a legally empowered public officer for the execution of a law, for the necessity of national defence, for the maintenance of national security, or for other similar objectives;
(2)the removal or alteration of [any] rights management information by an educational institution, hall of archives, library, or public broadcasting entity without a view to seeking profit;
(3)the communication to the public of a copyrighted work or its copy which has undergone the removal or alteration of [any] rights management information, by an educational institution, hall of archives, library, or public broadcasting entity without a view to seeking profit.
The forms of the rights management information according to (2) and the copyrighted work or its copy which has undergone the removal or alteration of rights management information according to (3) shall be as prescribed in ministerial regulations.
Section53/4.The circumvention of a technological protection measure, or the provision of a service for [the purpose of] originating the circumvention of a technological protection measure, with the knowledge that such an act would encourage or originate an infringement of a copyright or performer's right, shall be deemed to be an infringement of the technological protection measure.
Section53/5.The conduct of the act under section 53/4 in [any of] the following cases shall not be deemed to be the circumvention of the technological protection measure:
(1)the act is necessary for the conduct of [any] act upon a copyrighted work, which enjoys an exception to infringement of copyright;
(2)for analysis of a necessary element of a computer program in its use with another computer program;
(3)for the purpose of research on, analysis of, or detection of an error of a cryptographic technology; provided that the person conducting it has lawfully acquired the copyrighted work or a copy of such work and has already made an effort in good faith to seek permission from the copyright owner;
(4)for a specific purpose of testing, inspecting, or correcting a security system of a computer, of a computer system, or of a computer network; provided that permission has been obtained from the owner of the computer, computer system, or computer network, as the case may be;
(5)for termination of the operation of a technological protection measure with respect to the collection or distribution of personally identifiable information which reflects an activity on the internet of a person accessing a copyrighted work; provided that the act must not affect access to the copyrighted work by another person;
(6)the conduct of the act by a legally empowered public officer for the execution of a law, for the necessity of national defence, for the maintenance of national security, or for other similar objectives;
(7)the conduct of the act by an educational institution, hall of archives, library, or public broadcasting entity without a view to seeking profit, in order to access a copyrighted work which cannot be accessed otherwise."