• Fair use - permit others to perform, show, quote, copy, and otherwise distribute
portions of the work for certain purposes, including review, comment, and
discussion of copyrighted works
• Reverse engineering - if the purpose of the reverse engineering is not to
duplicate the functionality of the program but rather to achieve interoperability
• Encryption research - allows decryption attempts to advance the development
of encryption technology
• Security testing - the access of a computer or network for the good faith
testing, investigating, or correcting a security flaw or vulnerability, with the
authorization of the owner or operator
• Personal privacy - is generally permitted to bypass technological measures if
that is the only reasonable way to prevent the access to result in the revealing
or recording of personally identifying information