Copyright Act (R.S.C., 1985, c. C-42)

Act current to 2015-05-11 and last amended on 2015-01-02. Previous Versions

Marginal note:Law enforcement and national security
  •  (1) Paragraph 41.1(1)(a) does not apply if a technological protection measure is circumvented for the purposes of an investigation related to the enforcement of any Act of Parliament or any Act of the legislature of a province, or for the purposes of activities related to the protection of national security.

  • Marginal note:Services

    (2) Paragraph 41.1(1)(b) does not apply if the services are provided by or for the persons responsible for carrying out such an investigation or such activities.

  • Marginal note:Technology, device or component

    (3) Paragraph 41.1(1)(c) does not apply if the technology, device or component is manufactured, imported or provided by the persons responsible for carrying out such an investigation or such activities, or is manufactured, imported, provided or offered for sale or rental as a service provided to those persons.

  • 2012, c. 20, s. 47.
Marginal note:Interoperability of computer programs
  •  (1) Paragraph 41.1(1)(a) does not apply to a person who owns a computer program or a copy of one, or has a licence to use the program or copy, and who circumvents a technological protection measure that protects that program or copy for the sole purpose of obtaining information that would allow the person to make the program and any other computer program interoperable.

  • Marginal note:Services

    (2) Paragraph 41.1(1)(b) does not apply to a person who offers services to the public or provides services for the purposes of circumventing a technological protection measure if the person does so for the purpose of making the computer program and any other computer program interoperable.

  • Marginal note:Technology, device or component

    (3) Paragraph 41.1(1)(c) does not apply to a person who manufactures, imports or provides a technology, device or component for the purposes of circumventing a technological protection measure if the person does so for the purpose of making the computer program and any other computer program interoperable and

    • (a) uses that technology, device or component only for that purpose; or

    • (b) provides that technology, device or component to another person only for that purpose.

  • Marginal note:Sharing of information

    (4) A person referred to in subsection (1) may communicate the information obtained under that subsection to another person for the purposes of allowing that person to make the computer program and any other computer program interoperable.

  • Marginal note:Limitation

    (5) A person to whom the technology, device or component referred to in subsection (3) is provided or to whom the information referred to in subsection (4) is communicated may use it only for the purpose of making the computer program and any other computer program interoperable.

  • Marginal note:Non-application

    (6) However, a person is not entitled to benefit from the exceptions under subsections (1) to (3) or (5) if, for the purposes of making the computer program and any other computer program interoperable, the person does an act that constitutes an infringement of copyright.

  • Marginal note:Non-application

    (7) Furthermore, a person is not entitled to benefit from the exception under subsection (4) if, for the purposes of making the computer program and any other computer program interoperable, the person does an act that constitutes an infringement of copyright or an act that contravenes any Act of Parliament or any Act of the legislature of a province.

  • 2012, c. 20, s. 47.