Prohibits: (1) circumvention of technological measures that control access to protected works; or (2) manufacturing or trafficking in technology designed to circumvent measures that control access to, or protect rights of copyright owners in, such works. Makes the prohibition effective at the end of the two-year period beginning on the enactment of this Act. Exempts persons who are users of a copyrighted work which is in a particular class if such persons are, or are likely to be in the succeeding three-year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works. Requires, during the two-year period and during each succeeding three-year period, the Librarian of Congress, upon the recommendation of the Register of Copyrights, to make the determination in a rulemaking proceeding on the record of whether the individuals who are users of copyrighted work are adversely affected in their ability to make noninfringing uses of a particular class of copyrighted works. Requires the Librarian to publish any class of copyrighted works for which the Librarian determines, pursuant to the rulemaking procedure, that noninfringing uses by persons who are users of copyrighted work are, or are likely to be, adversely affected and that the prohibition is inapplicable to such users with respect to such class of works for the ensuring three-year period. Prohibits an exception from the applicability of the prohibition or any determination made in such rule making from being used as a defense in any action to enforce any provision of this title. Specifies that nothing in this Act shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products. Provides exemptions to such prohibition for: (1) nonprofit libraries, archives, or educational institutions which gain access to a commercially exploited copyrighted work solely to make a good faith determination of whether to acquire such work, subject to certain conditions; (2) lawfully authorized investigative, protective, information security, or intelligence activities of the United States, a State, or political subdivision of a State; and (3) purposes of achieving interoperability of computer programs. Defines "information security" as activities carried out in order to identify and address the vulnerabilities of a government computer, computer system, or computer network. Specifies: (1) conditions under which a person is allowed to circumvent technological measures as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research and the use of technological means for such encryption research activities; and (2) factors to be considered in determining whether the person qualifies for such exemption. Defines "encryption research" as activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products. Requires the Register of Copyrights and the Assistant Secretary for Communications and Information of the Department of Commerce to jointly report to the Congress, along with legislative recommendations, if any, on the effect this Act has had on: (1) encryption research and the development of encryption technology; (2) the adequacy and effectiveness of technological measures designed to protect copyrighted works; and (3) protection of copyright owners against the unauthorized access to their encrypted copyrighted works. Permits the court, in applying this Act to a component or part, to consider the necessity for its intended and actual incorporation in a technology, product, service, or device which: (1) does not itself violate the provisions of this title; and (2) has the sole purpose to prevent the access of minors to material on the Internet. Sets forth provisions regarding: (1) protection of personally identifying information; (2) inapplicability to certain technological measures; (3) permissible acts of security testing and factors in determining an exemption for such testing; and (4) use of technological means for security testing. Prohibits the manufacturing or trafficking of certain analog video cassette recorder devices and copy control technological measures unless they: (1) effective 18 months after enactment of this Act, conform to the automatic gain control copy control technology or the automatic gain control technology under certain conditions; or (2) effective on the enactment of this Act, have been modified after such date so if they previously conformed to the automatic gain control copy control technology they no longer conform or if they previously conformed to the four-line colorstripe copy control technology they no longer. Requires manufacturers that have not previously manufactured or sold a VHS format analog video cassette recorder or an 8mm format analog cassette recorder to conform to the four-line colorstripe copy control technology in the initial model of any such recorder manufactured after the enactment of this Act and thereafter to continue to do so. Prohibits allowing a person to apply the automatic gain control copy control technology or colorstripe copy control technology to prevent or limit consumer copying, subject to exceptions. Provides that this Act shall not: (1) require any analog video cassette camcorder to conform to the automatic gain control copy control technology with respect to any video signal received through a camera lens; (2) apply to the manufacturing or trafficking in any professional analog video cassette recorder; or (3) apply to the offer for sale or provision of, or other trafficking in, any previously owned analog video cassette recorder, if such recorder was legally manufactured and sold when new and not subsequently modified in violation of this Act. Bars the provision or distribution of false copyright management information with the intent to induce or conceal infringement. Defines "copyright management information" as certain information, including title, name of author and copyright owner, and terms for use of the work, conveyed in connection with copies or phonorecords of a work or performances or displays, including in digital form, except that such term does not include any personally identifying information about a user of a work or of a copy, phonorecord, performance, or display of a work. Provides exemptions to such prohibition for: (1) lawfully authorized investigative, protective, information security (as previously defined), or intelligence activities of the United States, a State, or political subdivision of a State; and (2) certain analog and digital transmissions by broadcast stations or cable systems. Establishes civil remedies for violations regarding the circumvention of technological protection measures and the falsification of copyright management information. Prescribes criminal penalties for willful violations committed for commercial advantage or private financial gain. Makes criminal penalties inapplicable to nonprofit libraries, archives, and educational institutions. Imposes a statute of limitations on criminal proceedings.