This page has been proofread, but needs to be validated.
COPYRIGHT
283


(4) In this section, “encryption technology” means any technology for scrambling and descrambling information using mathematical formulae or algorithms.

Exception—preventing minor access to online material

432.—(1) A person may circumvent an access control measure by doing an act if—

(a) the act consists of including a component or part in any technology, product or device for the sole purpose of preventing access by minors to any online material; and
(b) the technology, product or device—
(i) is not promoted, advertised or marketed for the purpose of circumventing a technological measure;
(ii) is not one that has only a limited commercially significant purpose or use other than to circumvent a technological measure; and
(iii) is not designed or made primarily for the purpose of circumventing a technological measure.

(2) A person may deal in a circumventing device if the device is meant to be included in any technology, product or device in circumstances to which subsection (1) applies.

Exception—testing of security flaws, etc., of computer

433.—(1) A person may circumvent an access control measure by doing an act in relation to a protected copy if—

(a) the act is done for the sole purpose of testing, investigating or correcting a security flaw or vulnerability of a computer;
(b) the act is done in good faith;
(c) the act is done by or with the authority of the owner of the computer;
(d) the act is not a rights infringement in relation to the protected copy; and
(e) the act does not violate any written law other than this Act.