Z:gnu-www-ja-words-to-avoid--245c60-The term =26ldquo;protection=26rdq/en

The term &ldquo;protection&rdquo; is also used to describe malicious features. For instance, &ldquo;copy protection&rdquo; is a feature that interferes with copying. From the user's point of view, this is obstruction. So we could call that malicious feature &ldquo;copy obstruction.&rdquo; More often it is called Digital Restrictions Management (DRM)&mdash;see the  Defective by Design campaign.