Browse Definitions :
Definition

broadcast flag

The broadcast flag is the Advanced Television Systems Committee's proposed copy protection encoding for broadcast digital television  (DTV) signals. The flag, developed to prevent unauthorized redistribution of digital programming, would restrict the ways that people could copy broadcast content. The Federal Communications Commission (FCC) mandated that all digital recording devices produced after July 1, 2005 must have the capacity to recognize and comply with broadcast flags. However, on May 6, 2005 the U.S. Court of Appeals for the District of Columbia ruled against the FCC, maintaining that, in trying to extend its control beyond the transmission of content, the organization had "plainly exceeded the scope of its general jurisdictional grant."

According to some reports, the broadcast flag would have allowed only poor quality recording of flagged content, to tape or special low-resolution DVDs. Although you would still be able to record protected programming on a compliant device, you wouldn't be able to watch it on a non-compliant device. Another concern is that the broadcast flag technology could be used to restrict viewing in other ways. Simson Garfinkel, writing in MIT's Technology Review, claimed that similar encoding could be used to prevent people from time-shifting programs or skipping commercials. A media release from the Electronic Frontier Foundation (EFF) called the broadcast flag "an ineffective solution to a non-existent problem" that would "raise the cost of DTV devices while reducing the value that they represent to consumers."

This was last updated in July 2008

Continue Reading About broadcast flag

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

  • attack vector

    An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close