More to explore:


Visit site
  • Dhruv Kapoor

    In the US, movies could become free to purchase only 28 years after release in the 1920's. Today, because of copyright extensions in 1978 and 1998, everything released after 1923 only becomes free in 2018.

  • pamela

    Copyright Term Extension Act - Wikipedia, the free encyclopedia

  • J. C. Conway

    Copyright law of the United States - Wikipedia, the free encyclopedia

  • Phil Howard

    The ever extending life of copyright coverage

Also on these boards

Related Pins

Bureau of Economic Analysis shows why copyright terms should be greatly diminished

"Can I Use That Picture? Terms, Laws and Ethics for Using Copyrighted Images"

More copyright myths - 5 Ways Your Website is Breaching Internet Copyright Laws

Monkeys, elephants, the Holy Spirit & God herself cannot be copyright owners, so sayeth the U.S. Copyright Office (@306). My Indonesian trip to promote monkey intellectual property rights is hereby postponed.

The copyright and patent clause of the U. S. Constitution - Article 1, Section 8, Clause 8.

Wikimedia Won't Take Down This Photo Because a Monkey Took It. Animal Selfies, the next frontier!

U.S. Copyright Act 1976 - 17 USC, Section 107: Fair Use factors. This is the best part of the Copyright Act - the part of the law that tells you how to break the law-the insertion of common sense into copyright law. We are free to use copyrighted works w/out the permission of the copyright owner/publisher provided that our use is "fair." Everyone has benefitted from fair use, and everyone has invoked fair use, consciously or unconsciously. What's missing is the word, "transformative." tbc

Copyright Litigation Blog: Federal Circuit Courts of Appeal and Copyright Law

How the NSA is infiltrating private networks By Barton Gellman, Todd Lindeman and Ashkan Soltani, Published: Oct. 30, 2013

What are you willing to give up instead of the internet. The new politics of the internet: Everything is connected | The Economist

Realtime Denial of Service Attack visualisation. This displays DOS attacks on a geographic basis, with visual encodings for types of attacks, sources, destinations, intensity., In addition it gives a time series representation of attacks going back ~ 2 months