Restricted use is sometimes enforced through a technical measure, such as product activation, a product key or serial number, a hardware key, or copy protection.
Though the act makes it illegal to distribute technology to circumvent either type of copy protection, only the action of circumventing access-control measures is illegal.