It has been widely recognized that it is difficult to prevent, or even deter people from making unauthorized copies, distributions or other uses of electronic works within current general-purpose computing and communications systems, such as personal computers, workstations, and other devices connected over communications networks, such as local area networks (LANs), intranets, and the Internet.