1° Holding for personal use or using a technological application, device or component designed or specially adapted to undermine an effective technical measure mentioned in article L. 331-5 of this Code which protects a work, a performance, a phonogram, a videogram, a programme or a database;
2° To use a service designed or specially adapted to cause the infringement referred to in the previous paragraph.
These provisions do not apply to acts which do not prejudice right holders and which are carried out for the purposes of computer security or scientific research into cryptography.