Households and individuals
- You may legally bypass a TPM on software you lawfully obtained to make it work with other software, devices, or parts, including when the software is inside a device you own (Bill s. 41.12(1)).
- You can receive interoperability information from someone else, and use it only to make your program or device interoperate with other programs, devices, or components (Bill s. 41.12(4), (6)).
- You do not have legal cover if your actions also infringe copyright or break another law (Bill s. 41.12(7), (9)).
Repair technicians and small shops
- You can develop and use methods, tools, or information to enable interoperability, but only for that purpose (Bill s. 41.12(3)–(6); purpose limits in (5)–(6)).
- Clients may give or receive interoperability information, and you may use it to help them, but only within the interoperability purpose and without infringing copyright or other laws (Bill s. 41.12(4), (6)–(9)).
Software and device makers
- Customers and third parties gain clearer legal rights to bypass TPMs for interoperability of programs and devices, including embedded software (Bill s. 41.12(1)).
- You retain copyright enforcement; the exception does not apply where interoperability steps also infringe copyright (Bill s. 41.12(7)–(8)).
- Tools and information shared for interoperability must be used only for that purpose; broader use remains restricted (Bill s. 41.12(5)–(6)).
Farmers, equipment owners, and other users of embedded software
- If you lawfully obtained the software in your device, you may bypass TPMs to make that device or its software interoperate with other programs, devices, or parts, within the law’s limits (Bill s. 41.12(1), (7)–(9)).
Public entities and institutions
- Staff and vendors may rely on the interoperability exception to integrate systems, so long as they stay within the purpose limits and do not infringe copyright or other statutes (Bill s. 41.12(1), (5)–(9)).