Copyright Act Article 80-1May 1, 2019

Electronic rights management information made by a copyright owner shall not be removed or altered; provided, this shall not apply in any of the following circumstances: "1.Where removal or alteration of electronic rights management information of the work is unavoidable in the lawful exploitation of the work given technological limitations at the time of the act. "2.Where the removal or alteration is technically necessary to conversion of a recording or transmission system. "Whoever knows that electronic rights management information of a work has been unlawfully removed or altered shall not distribute or, with intent to distribute, import or possess the original or any copy of such work. He/She also shall not publicly broadcast, publicly perform, nor publicly transmit [the same].

Same Article Laws


Copyright Act Article 80May 1, 2019

The provisions of Article 42 and Article 43 concerning the extinguishment of economic rights, and the provisions of Articles 44 through 48, Article 49, Article 51, Article 52, Article 54, Article 64, and Article 65 concerning limitations on economic rights, shall apply mutatis mutandis to plate rights.

Details >

Copyright Act Article 80-2May 1, 2019

Technological protection measures employed by copyright owners to prohibit or restrict others from accessing works shall not, without legal authorization, be disarmed, destroyed, or by any other means circumvented.

Any equipment, device, component, technology or information for disarming, destroying, or circumventing technological protection measures shall not, without legal authorization, be manufactured, imported, offered to the public for use, or offered in services to the public.

The provisions of the preceding two paragraphs shall not apply in the following circumstances:

1.Where to preserve national security.
2.Where done by central or local government agencies.
3.Where done by file archive institutions, educational institutions, or public libraries to assess whether to obtain the information.
4.Where to protect minors.
5.Where to protect personal data.
6.Where to perform security testing of computers or networks.
7.Where to conduct encryption research.
8.Where to conduct reverse engineering.
9.Where to exploit works of others in accordance with the provisions of Articles 44 through 63 and Article 65.
10.Under other circumstances specified by the competent authority.

The content in the subparagraphs of the preceding paragraph shall be prescribed and periodically reviewed by the competent authority.

Details >

Other Related Laws