Annotated Republic of China Laws/Copyright Act/Article 80-2

Newly adopted and promulgated on 2004-09-01

 * Article 80-2


 * Technological protection measures employed by copyright owners to prohibit or restrict others from accessing works shall not, without legal authorization, be disarmed, destroyed, or by any other means circumvented.


 * Any equipment, device, component, technology or information for disarming, destroying, or circumventing technological protection measures shall not, without legal authorization, be manufactured, imported, offered to the public for use, or offered in services to the public.


 * The provisions of the preceding two paragraphs shall not apply in the following circumstances:
 * 1. Where to preserve national security.
 * 2. Where done by central or local government agencies.
 * 3. Where done by file archive institutions, educational institutions, or public libraries to assess whether to obtain the information.
 * 4. Where to protect minors.
 * 5. Where to protect personal data.
 * 6. Where to perform security testing of computers or networks.
 * 7. Where to conduct encryption research.
 * 8. Where to conduct reverse engineering.
 * 9. Under other circumstances specified by the competent authority.


 * The content in the subparagraphs of the preceding paragraph shall be prescribed and periodically reviewed by the competent authority.

Newly adopted and promulgated on 2014-01-22

 * Article 80-2
 * Technological protection measures employed by copyright owners to prohibit or restrict others from accessing works shall not, without legal authorization, be disarmed, destroyed, or by any other means circumvented.
 * Any equipment, device, component, technology or information for disarming, destroying, or circumventing technological protection measures shall not, without legal authorization, be manufactured, imported, offered to the public for use, or offered in services to the public.
 * The provisions of the preceding two paragraphs shall not apply in the following circumstances:
 * 1.Where to preserve national security.
 * 2.Where done by central or local government agencies.
 * 3.Where done by file archive institutions, educational institutions, or public libraries to assess whether to obtain the information.
 * 4.Where to protect minors.
 * 5.Where to protect personal data.
 * 6.Where to perform security testing of computers or networks.
 * 7.Where to conduct encryption research.
 * 8.Where to conduct reverse engineering.
 * 9.Where to exploit works of others in accordance with the provisions of Articles 44 through 63 and Article 65.
 * 10.Under other circumstances specified by the competent authority.
 * The content in the subparagraphs of the preceding paragraph shall be prescribed and periodically reviewed by the competent authority.

Wikibooks annotation
New subparagraph was inserted after subparagraph 8 in 2014.