51. See David G. Post, White Paper Blues: Copyright and the National Information Infrastructure, LEGAL TIMES (Apr . 8, 1996) at [ ] ("For example, browsing' on the World Wide Web necessarily involves the creation of numerous copies' of information; first, a message is transmitted from Computer A to (remote) Computer B, requesting that Computer B send a copy of a particular file (e.g., the "home page" stored on Computer B) back to Computer A. When the request is received by Computer B, a copy of the requested file is made and transmitted back to Computer A (where it is copied again -- loaded' into memory -- and displayed). And the manner in which messages travel across the Internet to reach their intended recipient(s) -- via intermediary computers known as "routers," at each of which the message is read' by means of 'copying' the message into the computer's memory -- [involve] . . . innumerable separate acts of . . . reproduction'. File copying is not merely inexpensive in cyberspace, it is ubiquitous; and it is not merely ubiquitous, it is indispensable . . . Were you to equip your computer with a copy lock' -- an imaginary device that will prevent the reproduction of any and all information now stored in the computer in any form -- it will, essentially, stop functioning.")