Free Essay

Copyright Protection for Computer Software

In:

Submitted By yashabobby
Words 4305
Pages 18
Under traditional principles of intellectual property protection, copyright law has served as the principal source of legal protection for literary and artistic work, while the patent system and trade secret law have been the primary means for protecting utilitarian works. Computer software as a relatively new recipient of copyright protection, however, defies easy categorisation within the traditional framework of the intellectual property system. 1
With respect to computer software, courts have had to grapple with the vexatious issue of drawing a precise line between copyrightable expression of computer software and the uncopyrightable processes that they implement. The present paper seeks to study some of these themes and the principles enunciated in judicial decisions in clarifying the issue.
Computer software as literary work
It is a well-established proposition that computer programs2 are copyrightable subject-matter, just like any other literary work.3 Loading a program into computer memory, saving the program or running it without authority may infringe copyright. Making an arrangement or altered version of the program or converting it into or out of one computer language or code into a different computer language or code is also an infringement.
It is a well-established proposition that computer programs are copyrightable subject-matter, just like any other literary work. Loading a program into computer memory, saving the program or running it without authority may infringe copyright. Making an arrangement or altered version of the program or converting it into or out of one computer language or code into a different computer language or code is also an infringement.
Article 10 of the Trade Related Intellectual Property Rights Agreement (TRIPs) expressly provides that computer programs, whether in source code or object code shall be protected as literary works under the Berne Convention, 1971. The relevant provisions of the Copyright Act, 1957 which are pertinent in this context are set out hereunder:
"2. (ffb) 'computer' includes any electronic or similar device having information processing capabilities;
(ffc) 'computer programme' means a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result;
* * *
(o) 'literary work' includes computer programmes, tables and compilations including computer databases; "
Section 14 explains the meaning of copyright in the following terms:
"14. Meaning of copyright.-For the purposes of this Act, 'copyright' means the exclusive right subject to the provisions of this Act, to do or authorise the doing of any of the following acts in respect of a work or any substantial part thereof, namely-
(a) in the case of a literary, dramatic or musical work, not being a computer programme,-
(i) to reproduce the work in any material form including the storing of it in any medium by electronic means;
(ii) to issue copies of the work to the public not being copies already in circulation;
(iii) to perform the work in public, or communicate it to the public;
(iv) to make any cinematograph film or sound recording in respect of the work;
(v) to make any translation of the work;
(vi) to make any adaptation of the work;
(vii) to do, in relation to a translation or an adaptation of the work, any of the acts specified in relation to the work in sub-clauses (i) to (vi);
(b) in the case of a computer programme,-
(i) to do any of the acts specified in clause (a);
(ii) to sell or give on hire, or offer for sale or hire, any copy of the computer programme, regardless of whether such copy has been sold or given on hire on earlier occasions;"
Thus, under Indian copyright law, computer programs are considered to be literary works and accordingly entitled to copyright protection. However, few Indian courts have considered the scope and extent of copyright protection in relation to computer software and for this purpose, it is necessary to consider the jurisprudence evolved by comparable jurisdictions which have fleshed out principles to enlighten the bare text of statutory laws in this regard.
Distinction between form and idea
Under both the Indian and American systems of law, the protection available to a copyright-protected work is protection in respect of the form and substance of the work and not the ideabehind the work. Therefore, applying this principle in the context of computer software, the owner of the copyright over an item of software has the right to prevent any other person from physically copying the code, as it is written, but does not have the right to prevent the utilisation of the idea behind the code, provided the person utilising this idea does so in a manner that is different from his arrangement of the code. Thus, it is necessary to note that unlike the case of a patent over a mechanical product, the copyright over an item of software code does not entitle the author to prevent another software developer from producing the same type of software in a different form and structure.
Under both the Indian and American systems of law, the protection available to a copyright-protected work is protection in respect of the of the work and not the behind the work. Therefore, applying this principle in the context of computer software, the owner of the copyright over an item of software has the right to prevent any other person from physically copying the code, as it is written, but does not have the right to prevent the utilisation of the idea behind the code, provided the person utilising this idea does so in a manner that is different from his arrangement of the code. Thus, it is necessary to note that unlike the case of a patent over a mechanical product, the copyright over an item of software code does not entitle the author to prevent another software developer from producing the same type of software in a different form and structure.
However, at the same time, it needs to be stated that the point where the idea translates itself into the expression of an idea is an issue that has been the subject of judicial scrutiny by courts in USA. The following principle was laid down in Apple Computer Inc. v. Franklin Computer Corpn.4:
"Just as a patent affords protection only to the means of reducing an inventive idea into practice, so the copyright law protects the means of expressing an idea; and it is as near the whole truth as generalisation can usually reach that, if the same idea can be expressed in a plurality of totally different manners, a plurality of copyrights may result, and no infringement will exist."
Interpreting this principle, it has been concluded that the basis for the determination of the copyrightability of a software program was affirmed as being the intellectual property right, inherent in the form and substance of the instructions to the computer and not to the idea behind their arrangement. This would imply that creative copying of the instructions so as to result in the same program being developed through the use of different lines of code would be deemed to be not a violation of the copyright in the program, as the copyright vests in the instructions themselves and not the end product.5
Non-literal copying
The next issue that needs to be considered in this context is as to exactly what type of software reproduction is hit by the offence of infringement of copyright, particularly in cases where the alleged infringer had not copied the code line by line, but had taken something less specific. In this regard, various tests have been developed by courts in USA, in order to arrive at a conclusion as to the type of software and the extent to which it could receive protection. One such test has been to discern whether the look and feel of the two programs was the same. If the answer to that question was in the affirmative and if it could be shown that the defendant had access to the plaintiff's program, copyright infringement was likely to have occurred.
The next issue that needs to be considered in this context is as to exactly what type of software reproduction is hit by the offence of infringement of copyright, particularly in cases where the alleged infringer had not copied the code line by line, but had taken something less specific. In this regard, various tests have been developed by courts in USA, in order to arrive at a conclusion as to the type of software and the extent to which it could receive protection. One such test has been to discern whether the of the two programs was the same. If the answer to that question was in the affirmative and if it could be shown that the defendant had access to the plaintiff's program, copyright infringement was likely to have occurred. The Whelan test
The question whether there could be copyright infringement in copying the "overall structure" of a program, even if neither the object code nor the source code of the program had been copied came to be examined by the US Court of Appeal, for the Third Circuit in Whelan Associates Inc. v. Jaslow Dental Laboratory, Inc.6 In this case, the alleged infringer rewrote a program that was originally coded in a particular computer language in a different programming language. While evolving the look and feel test the court concluded (on the basis of prior decisions that had held that there could be infringement of copyright in a play or book by copying the plot or plot devices of the play or book when the total "concept and feel" of the alleged infringing work was substantially similar to that of the copyrighted work) that the said test should apply to infringement of copyright in computer programs.
The question whether there could be copyright infringement in copying the "overall structure" of a program, even if neither the object code nor the source code of the program had been copied came to be examined by the US Court of Appeal, for the Third Circuit in v. . In this case, the alleged infringer rewrote a program that was originally coded in a particular computer language in a different programming language. While evolving the the court concluded (on the basis of prior decisions that had held that there could be infringement of copyright in a play or book by copying the plot or plot devices of the play or book when the total "concept and feel" of the alleged infringing work was substantially similar to that of the copyrighted work) that the said test should apply to infringement of copyright in computer programs.
The court also concluded that the detailed structure of a program was part of the expression of an idea than the idea itself, and therefore, the copying of the expression of the idea in the program would amount to an infringement of copyright. The principles laid down by the court inWhelan case6 can be summarised as hereunder:
> Copyright programs are classified as literary works for the purposes of copyright.
> The copyrights of other literary works can be infringed even when there is no substantial similarity between the work's literal elements. One can violate the copyright of a play or a book by copying its plot or plot devices. Copyright "cannot be limited literally to the text, else a plagiarist would escape by making immaterial variations".
> Among the more significant costs in computer programming are those attributable to developing the structure and logic of the program.
> Allowing copyright protection beyond the literal computer code would provide the proper incentive for programmers by protecting their most valuable efforts, while not giving them a stranglehold over the development of new computer devices that accomplish the same end.
> It is not true that "approximation" of a program short of perfect reproduction is valueless. On the contrary, one can approximate a program and thereby gain a significant advantage over competitors even though additional work is needed to complete the program.
> The issue in a copyrighted case is simply whether the copyright-holder's expression has been copied, not how difficult it was to do the copying. Whether an alleged infringer spent significant time and effort to copy an original work is therefore irrelevant for decision as to whether he has pirated the expression of an original work.
> The conclusion is inescapable that the detailed structure of a program is part of the expression, not the idea of that program. Copyright protection of computer programs may extend beyond the program's literal code to their structure, sequence and organisation.
The test laid down in Whelan case6 came to be known as the "structure, sequence and organisation" test, since the court held that copyright protection of computer programs may extend beyond the programs' literal code to their structure, sequence and organisation.
The Altai test for infringement
However, this test was not adopted by the Second Circuit Court of Appeals which propounded a new test in Computer Associates v. Altai1. In this case, OSCAR 3.5 was the product of Altai's carefully orchestrated rewrite of OSCAR 3.4. None of the ADAPTER source code remained in the 3.5 version; thus ALTAI made sure that the literal elements of its revamped OSCAR program were no longer substantially similar to the literal elements of Computer Associate's ADAPTER source code. While examining the question as to whether ALTAI'S OSCAR 3.5 was substantially similar to Computer Associate's ADAPTER program, the following points were established by the court in Altai case2:
However, this test was not adopted by the Second Circuit Court of Appeals which propounded a new test in v. 1. In this case, OSCAR 3.5 was the product of Altai's carefully orchestrated rewrite of OSCAR 3.4. None of the ADAPTER source code remained in the 3.5 version; thus ALTAI made sure that the literal elements of its revamped OSCAR program were no longer substantially similar to the literal elements of Computer Associate's ADAPTER source code. While examining the question as to whether ALTAI'S OSCAR 3.5 was substantially similar to Computer Associate's ADAPTER program, the following points were established by the court in 2:
> It is essential for protection of literary property that copyright cannot be limited literally to the text, else, a plagiarist would escape by making immaterial variations. Thus, where "the fundamental essence or structure of one work is duplicated in another", courts have found copyright infringement.
> Those aspects of a work which "must necessarily be used as incident to" the idea, system or process that the work describes, are also not copyrightable. Therefore, those elements of a computer program that are necessarily incidental to its function are similarly unprotectable.
> The principle laid down in Whelan6 that the non-literal elements of computer programs was entitled to copyright protection as literary works, is acceptable.
> The Whelan6 rule had received a mixed reception in American courts. While some decisions adopted its reasoning7, others had rejected it.8
> A computer program's ultimate function or purpose is the composite result of interacting subroutines. Since each subroutine is itself a program, and thus, may be said to have its own "idea", Whelan's general formulation that a program's overall purpose equates with the program's idea is descriptively inadequate.
> The rationale of Whelan case6 was suspect with the passage of time since its opinion was based on a somewhat outdated appreciation of computer science.
A three-stage test was therefore formulated in order to determine whether the non-literal elements of two or more computer programs are substantially similar:
(i) The abstraction test
In ascertaining substantial similarity under this approach, a court would first break down the allegedly infringed program into its constituent structural parts.
The abstraction test "implicitly recognises that any given work may consist of a mixture of numerous ideas and expressions". As applied to computer programs, the abstraction test will comprise the first step in the examination for substantial similarity. Initially, in a manner that resembles reverse engineering on a theoretical plane, a court should dissect the allegedly copied program's structure and isolate each level of abstraction contained within it. This process begins with the code and ends with an articulation of the program's ultimate function. Along the way, it is necessary to retrace and map each of the designer's steps in the opposite order in which they were taken during the program's creation.9
(ii) The process of filtration
Then, by examining each of these parts for such things as incorporated ideas, expression that is necessarily incidental to those ideas and elements that are taken from the public domain, a court would then be able to sift out all non-protectable material. Strictly speaking, such filtration serves "the purpose of defining the scope of the plaintiff's copyright". * Under the doctrine of incorporation/merger, "where there is essentially only one way to express an idea, the idea and its expression are inseparable and copyright is no bar to copying that expression"10 Under these circumstances, the expression is said to have "merged" with the idea itself. In order not to confer a monopoly of the idea upon the copyright owner, such expression should not be protected.

The American Congress established the National Commission on New Technological Uses of Copyrighted Works (CONTU) to study the implications of the new technologies and recommended revision to federal intellectual property law. CONTU recognised the applicability of the merger doctrine to computer programs in its report to Congress thus:

"Copyrighted language may be copied without infringing when there is but a limited number of ways to express a given idea.... In the copyright context, this means that when specific instructions, even though previously copyrighted, are the only and essential means of accomplishing a given task, their later use by another will not amount to infringement." * The court has also held that where it is virtually impossible to write about a particular historical era of fictional theme without employing certain "stock" or standard literary devices such expression is not copyrightable. In many instances it is virtually impossible to write a program to perform particular functions in a specific computing environment without employing standard techniques. It follows that such standard techniques are not copyrightable and will have to be filtered out. * The court will also have to filter out elements dictated by concerns of efficiency. In the context of computer program design, the concept of efficiency is akin to deriving the most concise logical proof or formulating the most succinct mathematical computation. Thus, the more efficient a set of modules are, the more closely they approximate the idea or process embodied in that particular aspect of the program's structure. While hypothetically there might be a myriad number of ways in which a programmer may effectuate certain functions within a program, efficiency concerns may so narrow the practical range of choice as to make only one or two forms of expression workable options. If there are only a limited number of efficient implementations for any program task, it is quite possible that multiple programmers, working independently, will design the identical method employed in the allegedly infringed work.
Copyrightability of material in the public domain
The court in Altai1 has specifically dealt with copyrightability of computer software based on material found in the public domain. Such material is free for the taking and cannot be appropriated by a single author even though it is included in a copyrighted work. Quoting this general rule of copyright, the court stated that it found no reason to make an exception to this rule for elements of a computer program that have entered the public domain. Thus, a court must also filter out material available in the public domain before it makes the final inquiry in its substantial similarity analysis.11
The court in 1 has specifically dealt with copyrightability of computer software based on material found in the public domain. Such material is free for the taking and cannot be appropriated by a single author even though it is included in a copyrighted work. Quoting this general rule of copyright, the court stated that it found no reason to make an exception to this rule for elements of a computer program that have entered the public domain. Thus, a court must also filter out material available in the public domain before it makes the final inquiry in its substantial similarity analysis. (iii) Comparison
Left with a kernel, or possibly kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. Once a court has sifted out all elements of the allegedly infringed program which are "ideas" or are dictated by efficiency or external facts, or taken from the public domain, there may remain a core of protectable expression. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement.
Left with a kernel, or possibly kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. Once a court has sifted out all elements of the allegedly infringed program which are "ideas" or are dictated by efficiency or external facts, or taken from the public domain, there may remain a core of protectable expression. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement. Policy considerations
Demarcating the precise line between idea and expression ultimately impacts on the scope of copyright protection afforded to a particular type of work, and therefore, any such line must necessarily strike a judicious balance between "protection" and "competition". If programmers are not guaranteed broad copyright protection for their work, they will not invest the extensive time, energy and funds required to design and improve program structures. At the same time, it needs to be understood that the interest of copyright law is not in simply conferring a monopoly on industrious persons, but in advancing the public welfare through rewarding artistic creativity, in a manner that permits the free use and development of non-protectable ideas and processes.12
Demarcating the precise line between idea and expression ultimately impacts on the scope of copyright protection afforded to a particular type of work, and therefore, any such line must necessarily strike a judicious balance between "protection" and "competition". If programmers are not guaranteed broad copyright protection for their work, they will not invest the extensive time, energy and funds required to design and improve program structures. At the same time, it needs to be understood that the interest of copyright law is not in simply conferring a monopoly on industrious persons, but in advancing the public welfare through rewarding artistic creativity, in a manner that permits the free use and development of non-protectable ideas and processes.
The Altai1 court also seemed to opine that patent registration, with its exacting upfront novelty and non-obviousness requirements, might be the more appropriate rubric of protection for intellectual property of this kind. With this rationale, the court concluded that the test formulated by it which would have the effect of narrowing the scope of copyright protection was in accordance with legislative intent and fundamental principles of copyright law.
English courts have also adopted a similar approach to the protection of computer software.13
Conclusion
It is submitted that the narrow protection afforded to computer software under the law of copyright as in Altai1 reflects the correct balance between the need to encourage creative work and also to ensure that an undue monopoly which restricts free use and development of ideas is not created. This is especially important given the fact that the term of copyrighted works in India is the lifetime of the author of such works plus a period of 60 years. Such an extensive period of copyright protection may be excessive and ill-suited to a computer program where the normal period of obsolescence may be just a few years.
It is submitted that the narrow protection afforded to computer software under the law of copyright as in 1 reflects the correct balance between the need to encourage creative work and also to ensure that an undue monopoly which restricts free use and development of ideas is not created. This is especially important given the fact that the term of copyrighted works in India is the lifetime of the author of such works plus a period of 60 years. Such an extensive period of copyright protection may be excessive and ill-suited to a computer program where the normal period of obsolescence may be just a few years.
The three-staged approach suggested by Altai case1 has been subsequently cited in a host of decisions. In addition, courts in Canada, the United Kingdom and France have endorsed the Altaianalysis.14 While it may not be possible to definitely conclude that the same tests would necessarily be applicable in case of copyright infringement in the Indian context, the principles set out therein would be extremely persuasive. This is especially so given the fact that with the conclusion of TRIPs which has incorporated by reference the principles enshrined in the Berne Convention, copyright law has now become increasingly harmonised across all jurisdictions. Thus, principles enunciated by the courts of a foreign jurisdiction can inform the operation of copyright law in India as well, and it would not be inappropriate to refer to the Altai principles to understand the scope of copyright protection in computer software in India.

Similar Documents

Premium Essay

Copyright Law in India

...I. Introduction During the early days of computer industry, the software came integrated with hardware. The issue of intellectual property remained confined to hardware only. All this changed during the sixties when software was unbundled from hardware. This gave rise to independent software vendors (ISVs) and the production of standard and custom operating systems, as well as independent applications software’s. Rapid diffusion of low-cost desktop or personnel computer (PC) in late seventies and eighties opened up huge opportunities for ISVs. The software industry gradually increased in terms of overall trade, production and consumption. In 1990s, the widespread diffusion of the Internet created new channels for low-cost distribution and marketing of packaged software, reducing the barriers to entry into the packaged software industry. It also expanded the possibilities for rapid penetration of markets by packaged software products. This rapid increase in consumption of software and easy penetration of market through Internet resulted in increased software piracy, creating a big market in pirated software. According to estimates the global rate of piracy was 59.9% in the year 2010 that means out of the total software sold worldwide 59.9% was fake. Piracy causes huge losses of revenues to software companies every year. This has made the issue of intellectual property protection for software all the more important. The software is a complex product, which has given rise to a...

Words: 7384 - Pages: 30

Premium Essay

Week 5

...Technology sector According to Webster and Dictionary.com Tangible is having actual physical existence, as real estate or chattels, and therefore capable of being assigned a value in monetary terms, capable of being touched, real or actual, rather than imaginary or visionary. According to LAW-531, rEsource Ch 16, Tangible property is the type of property we can see and touch. Delivery trucks, desks, computers, inventory, and the Building and land in which a business is located are all forms of tangible property. Information technology computer hardware includes computers components input keyboards, output screens or monitors, and peripherals including cables, scanners, surge protectors, optical drives, digital imaging equipment, printers, data processing equipment, Fax machines. The IT sector has much to offer in this category that includes Palm Pilots, Cell Phones with Internet Capabilities, Magellan Navigational devices, I-Pods and more. Tangible IT Properties is anything that assists in the possessing and exchanging or computing information on a computer system. Tangible Property in the IT sector can be very significant in a business and in a court of law when trying to establish, prove, or...

Words: 1720 - Pages: 7

Premium Essay

Software Copyright Piracy & Laws

...Software Copyright Piracy & Laws | Business Law | | This paper contains both recent and past accounts of software piracy cases. Also within the contents are definitions of what software piracy is and what has and can be done to help stop copyright infringement. | | Brandon Sampsell | 4/19/2012 | | Software Copyright Piracy & Laws The definition of software piracy is the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved, worldwide problem, costing millions of dollars in lost revenue. In a more recent case, the case of Universal Music Australia Pty Ltd v Sharman License Holdings Ltd (2005) 220 ALR 1 was high-profile Australian litigation involving music labels suing the developers and distributors (collectively referred to as "the Sharman parties") of software that enabled access to the Kazaa a p2p network. The software, which was made available for free, enabled users to upload and download digital files like music files or data files. However, unlike earlier p2p networks the Kazaa network did not require operation through centralized servers, nor physical involvement in the transmission of the files. The essence of the litigation concerned the responsibility...

Words: 2318 - Pages: 10

Premium Essay

No Electronic Theft Act

...property is growing. Pirating works online is the same as shoplifting a video tape, book, or computer program from a department store. Through a loophole in the law, however, copyright infringers who intentionally pirate works, as long as they do not do so for profit, are outside the reach of our nation's law enforcement officials. In 1997 President Bill Clinton introduced the No Electronic Theft Act (NET), which allows criminal enforcement against people who have no profit motive in the infringement. HR 2265 was viewed as a closing a loophole in the criminal law. Under the old statutory scheme, people who intentionally distributed copied software over the Internet did not face criminal penalties as long as they did not profit from their actions. The act was strongly backed by the software and entertainment industries but opposed by library and academic groups. The No Electronic Theft Act, as its name suggests, was enacted to criminalize the violation of copyrights through the posting of copyrighted materials on the Internet. The posting of a work on the Internet makes it extremely easy to access, read and copy that work. Because of the popularity of the Internet, moreover, any single copy of a work that is posted on the Internet could be read and copied many times over each month. Copyright law establishes rights for both copyright holders and for purchasers of copyrighted works. A copyright holder has five exclusive rights. The rights to copy, duplicate, transcribe or imitate the...

Words: 3388 - Pages: 14

Premium Essay

Software Piracy Under Ipr Regime

...An Overview on SOFTWARE PIRACY under Intellectual Property Right Regime e1834 Abinash Chandra Nayak (SOFTWARE PIRACY IS "UNAUTHORIZED COPYING OR DISTRIBUTION OF COPYRIGHTED SOFTWARE .") SOFTWARE PIRACY IS A VIOLATION OF COPYRIGHT LAW AND A FORM OF THEFT . What Is Software Piracy? The definition of software piracy is the "unauthorized copying or distribution of copyrighted software." While this definition may sound simple, its impact and affect are anything but. In 2008, worldwide software piracy rates rose to 41 percent, with losses estimated at $50.2 billion, according to a study by the Business Software Alliance. Identification Whether you purchase software from a retail store or download installation files from an Internet site, a user license, not the CD or possession of installation files, is what gives you the right to install and use the software. The license you purchase defines specific terms and conditions regarding legal use of the software, such as how many computers you may install the software on, or whether you can transfer the software to another computer. Any actions you take outside the limits of the license constitute software piracy. 1 Methods Software piracy can take many forms, but one of the most common includes counterfeiting, or a licensed user making duplicate copies of the software to sell or give away, with or without providing codes to unlicensed users as a work-around to anti-piracy features. Other piracy methods include ...

Words: 2493 - Pages: 10

Premium Essay

Writeup on Copyright Law

...INDIAN COPYRIGHT ACT, 1957 CONTENTS Introduction 3 Need for Copyright Protection 3 Scope of Copyright 4 Indian Copyright Act, 1957 5 Remedies 10 Cases 12 Conclusion 14 Bibliography 14 INTRODUCTION The world has entered an era of instant communication. A person sitting in the remotest corner of India can enjoy a live performance taking place anywhere in the world thanks to electronic (parallel) media. Telephone and fax have made it possible to communicate oral or written messages across the globe within seconds. Computer-aided communication technologies such as E-Mail and Internet have added an altogether new dimension to today's communication process by making it more speedy, informative and economical. The mode of communication of different types of information has also undergone a sea change. While all these have made communication among people more effective and efficient both in terms of time and cost, they pose a threat in terms of copyright infringement. Modern communication channels, being intensively relying on a variety of copyrighted products, are liable to be pirated on a large scale if adequate precautions are not exercised. Need for Copyright Protection Copyright is the right given by law to the creators of literary, dramatic, musical and a variety of other works. It ordinarily means the creator alone has the right to make copies of his or her works or alternatively, prevent others from making copies of the same. The basic idea...

Words: 4759 - Pages: 20

Premium Essay

Ip Law Case

...The First-to-Market Computer Software Company owns the copyright to highly successful spreadsheet program – Blossom 3-2-1 – which has dominated the worldwide market for several years. Recently, Clone Software Co. devised a look-alike program that does everything that the Blossom 3-2-1 program does, except that the Clone sells for only one-tenth the price of the original. First-to-Market has sued Clone for copyright infringement. Clone defends itself by saying that the coding of the its program is entirely different from that of Blossom 3-2-1, and that the only similarity between the programs is that the images that appear on the computer screen and the key sequences used to operate the program are identical. Has Clone infringed First-to-Market’s copyright? Explain! Answer: Accorting to the Article 10.1 of the TRIPS Agreement “Computer programs, whether in source or object code, shall be protected as literary works under the Berne Convention’’ Such protection applies to computer programs, whatever may be the mode or form of their expression. The minimum standards of protection relate to the works and rights to be protected, and to the duration of protection: (a) As to works, protection must include "every production in the literary, scientific and artistic domain, whatever the mode or form of its expression" (Article 2(1) of the Berne Convention). (b) Subject to certain allowed reservations, limitations or exceptions, the following are among the rights that must be recognized...

Words: 322 - Pages: 2

Premium Essay

Copyright Cases in Us

...Case name | Reporter | Court/Year | Findings | Wheaton v. Peters | 33 U.S. (8 Pet.) 591 | 1834 | There is no such thing as common law copyright and one must observe the formalities to secure a copyright. | Baker v. Selden | 101 U.S. 99 | 1879 | Idea-expression divide. | Burrow-Giles Lithographic Co. v. Sarony | 111 U.S. 53 | 1884 | Extended copyright protection to photography. | White-Smith Music Publishing Company v. Apollo Company | 209 U.S. 1 | 1908 | Reproduction of the sounds of musical instruments playing music for which copyright granted not a violation of the copyright. | Bobbs-Merrill Co v. Straus | 210 U.S. 339 | 1908 | No license to use copyrighted material. License cannot extend holder's rights beyond statute defined by Congress. | Bauer & Cie. v. O'Donnell | 229 U.S. 1 | 1913 | Differences between patent and copyright defined also prohibits a license from extending holder's rights beyond statute. | Macmillan Co. v. King | 223 F. 862 | D.Mass. 1914 | Limits of fair use with respect to an educational context and to summaries. | Nichols v. Universal Pictures Co. | 45 F.2d 119 | 2d Cir. 1930 | No copyright for "stock characters". | Shostakovich v. Twentieth Century-Fox Film Corp. | 196 Misc. 67, 80 N.Y.S.2d 575 (N.Y. Sup. Ct. 1948), aff'd 275 A.D. 692, 87 N.Y.S.2d 430 (1949) | 1948–9 | No moral rights in public domain works. | Alfred Bell & Co. v. Catalda Fine Arts, Inc. | 191 F.2d 99 | 2d. Cir. 1951 | Variations of works in the public domain...

Words: 1946 - Pages: 8

Premium Essay

Data Protection

...DATA PROTECTION- what is this act? What it is for? Controls how your personal information is used by organisations, businesses or the government. It also imposes restriction on the transfer of data, also like placing the materials on the web. Everyone responsible for using data has to follow strict rules called data protection principles, they must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: * ethnic background * political opinions * religious beliefs * health * sexual health * criminal records State the principles- 1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless – (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant...

Words: 1441 - Pages: 6

Premium Essay

Music Copyrights

...Music Copyright & File- Sharing Technology A copyright is a form Intellectual property that grants an author or originator of any tangible literary or artistic work exclusive rights. It is granted by federal statute and includes any literary, musical, dramatic, choreographic, pictorial, graphic, sculptural and architectural works. Also, any motion pictures, sound recording and other audiovisual work. The first U.S. copyright law was the Copyright Act of 1790. It was then modified in 1909 and again 1976. Copyrights still being administrated by the Copyright Act of 1976, which states that the term of protection starts from that date created to the life of the author plus fifty years. The terms automatically got extended for any work created after January 1, 1978, giving statutory copyright protection for the life of the author plus seventy years. In the case of more than one author, it is seventy years after the death of the last living author. A copyright is automatic once the work is made, however it can also be registered with the U.S. Copyright Office in Washington, D.C. A copyright infringement is when the expression of the idea or the work form has been copied without the copyright owner’s approval. It is not limited to the entirety of the work, but if a considerable amount of the original is copied, it is copyright infringement. Only the copyright owner has the right to reproduce, distribute copies, display, or perform the work. Individuals, who commit a copyright infringement...

Words: 1475 - Pages: 6

Premium Essay

P1 Explain the Personal Attributes Valued by Employers

...P1 EXPLAIN THE PERSONAL ATTRIBUTES VALUED BY EMPLOYERS In this report I will be explaining personal attributes that are valued by employers. An example of personal attributes is, self-motivation. I will also discuss three acts; Data Protection Act, Computer Misuse Act and Copyright Act. Self-motivation is ability to do what needs to be done, without influence from other people or situations. People with self-motivation can find a reason and strength to complete a task, even when challenging, without giving up or needing another to encourage them. Self-motivation is really valued by employers because so you do your work and not hand in work in late. Leadership is the individuals who are the leaders in an organization. Employers value this because they want you to be creative and be in charge of the task whilst guiding the other people. Leadership involves establishing a clear vision, sharing that vision with others so that they will follow clearly, providing the information, knowledge and methods to realize that vision. Communication skills is the ability to send information to another effectively and efficiently. Business managers with good verbal, non-verbal and written communication skills help facilitate the sharing of information between people within a company for its commercial benefit. Organisational skills is the ability to use your time, energy, resources, etc. in an effective way so that you achieve the things you want to achieve. Organisational skills is valued...

Words: 1293 - Pages: 6

Premium Essay

Argument Against Copyrigh Copyright

...First of all … What is copyright? Copyright is the right that all creators possess in order to prevent others from copying their mental property and creative works without the creators’ permission. Copyright protects the works of various creators, these consist of artists, musicians, filmmakers and even people who create and produce code. So long as these creative works have been recorded, filmed, written down they are protected by copyright as soon as they have been created. The copyright notice/symbol © is recommended when creative works are created and or become available to the public or other industries however this isn’t necessary, but it does create another small barrier for people who may steal or copy the works, along with the symbol the copyright owner’s name will be included for informational insurance....

Words: 745 - Pages: 3

Premium Essay

Physical and Technological Resources

...Technological Resources: this includes; intellectual property (e.g. designs, drawings, text, music, video), experience and skills, software licenses, and protection via patents and copyrights. Launched in 2002, ASOS is the UK’s number one online fashion store for women and men, it targets both genders aged 16-34 but has an older audience, too. There are over 9,000 products available, with 450 new fashion items added every week, including; women’s fashion, men’s wear, accessories, jewellery and beauty products. Every month, ASOS attracts around 3.3 million unique shoppers every month and has 1.8 million users with ASOS accounts. Physical Resources required: ASOS being an online-based fashion store would require a place where they can access their website to update or refurbish it. This is why they have a HQ located in the Greater London House. As well as stocking other brands such as ‘Chloe’ and ‘River Island’, they also stock their own brand, this means they need a warehouse, which they have. In 2008, their warehouse was only 550 square metres, but due to growing demand it is now 32,500 square metres which is equivalent in area to almost 5 football pitches. To create their own products, they have a factory where ‘everything happens’. Within the factory they would need access to sewing equipment, such as; sewing machines and printing machines/computers with advanced printing programmes which means they...

Words: 845 - Pages: 4

Premium Essay

Copyright and Patents

...Business Law The Copyright Act As a part of Intellectual Property Rights (With Relevant Provisions to WTO) INDEX Introduction............................................................................................................................04 Introduction to Intellectual property Rights...........................…............................04 Industrial Property.........................................................................................04 Artistic and Literary Property.....................................................................05 Nature of Intellectual Property Rights........................................................05 Introduction to TRIPS………………………...........................................................06 Berne Convention...........................................................................................08 Introduction to WIPO………………………………………………………..……..09 Introduction to The Copy Right Act………………………………………………10 Meaning of Copyright……………………………………………........................................11 Terminologies of Copyright…………………………….......................................................12 Registration of Copyright………..........................................................................................13 Correction of entries in the Register of Copyrights………………………...…….14 Rectification of Register by Copyright Board……………….................................15 Duration of Copyright………………………......................

Words: 16139 - Pages: 65

Premium Essay

Communication

...information. Legal Issue | Impact on the business | Data Protection Act (1988)The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone who is responsible for using data has to follow strict rules called “data protection principles “ There is stronger legal protection for more sensitive information, such as:Ethnic backgroundPolitical opinionsReligious beliefsHealth records | Businesses must make sure the information is:Obtained and used fairly and lawfullyUsed only for the purposes stated when it was collectedKept for no longer than is absolutely necessaryKept safe and secureNot transferred outside the UK without adequate protection such as passwordsIt is also illegal for businesses to send out information not requested so businesses will often ask customers if they want to receive future additional information.This applies to businesses such as Tesco and Amazon both regardless of whether the information is written or electronic.Any organisation that needs to store personal information must apply to register with the Information Commissioner and must declare what information will be stored and how it will be used in advance. | Computer Misuse Act (1990)The Computer Misuse Act (1990)There were no laws to deal with computer misuse before 1990 The Act is often labelled as the Anti-hacking legislationIt was created to respond to the threat of hacking into computer systems and dataAn act of Parliament that created new...

Words: 1958 - Pages: 8