{"id":525,"date":"2012-06-16T17:14:45","date_gmt":"2012-06-16T17:14:45","guid":{"rendered":"http:\/\/ncjolt.org\/\/?p=525"},"modified":"2020-06-04T20:54:27","modified_gmt":"2020-06-04T20:54:27","slug":"the-apple-cat-and-the-fanboy-mouse-unlocking-the-apple-iphone","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/the-apple-cat-and-the-fanboy-mouse-unlocking-the-apple-iphone\/","title":{"rendered":"The Apple Cat and the Fanboy Mouse: Unlocking the Apple iPhone"},"content":{"rendered":"<p>Currently, Apple forces owners of the iPhone to use AT&amp;T\u2019s wireless network through software contained in the phone\u2019s operating system. The practice of \u201cunlocking\u201d the Apple iPhone for use over any compatible wireless network raises an interesting legal question. Specifically, this Comment considers this question through analysis of the Digital Millennium Copyright Act (\u201cDMCA\u201d), the Carterfone doctrine, and case law interpreting the DMCA within the context of existing copyright law. This analysis supports the conclusion that any unlocking of the iPhone that preserves the existing contractual relationship between Apple and AT&amp;T does not violate Apple\u2019s copyright interest in the iPhone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Currently, Apple forces owners of the iPhone to use AT&amp;T\u2019s wireless network through software contained in the phone\u2019s operating system. The practice of \u201cunlocking\u201d the Apple iPhone for use over any compatible wireless network raises an interesting legal question. Specifically, this Comment considers this question through analysis of the Digital Millennium Copyright Act (\u201cDMCA\u201d), the <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/the-apple-cat-and-the-fanboy-mouse-unlocking-the-apple-iphone\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,25,27],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/525"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=525"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/525\/revisions"}],"predecessor-version":[{"id":7825,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/525\/revisions\/7825"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}