Solvay Business School IT Law and IT Forensics
Download
Report
Transcript Solvay Business School IT Law and IT Forensics
Solvay Business School
IT Law and IT Forensics
Intellectual Property
th
26
May 2005
Paul Van den Bulck
Attorney at the Bar of Brussels
Partner of ULYS, Law Firm
Lecturer at the Robert Schuman University (Strasbourg)
www.ulys.net
Scope of the Presentation
What is Intellectual Property?
A name commonly given to a group of separate
property rights, including:
Trademark;
Copyright;
Patent;
Database;
Design;
Layout design of integrated circuits;
Plant variety.
Scope of the Presentation
The presentation concentrates on two
important IP issues under European Law:
I.
II.
Software Protection
Database Protection
I. Software Protection
Three Parts:
A. Software Copyright
B. Software Patent
C. Know-How
A. Software Copyright
1. Legislation
European Law
Directive 91/250/EEC of 14 May 1991 on the
legal protection of computer programs
Belgian Law
Law of 30 June 1994 on copyright (“droits
d’auteur”) and related rights
Law of 30 June 1994 on the legal protection of
computer programs
A. Software Copyright
2. Software Definition
No definition under the Directive
A set of instructions in a language that computers
understand
Examples:
Operating systems (Mac OSX, Linux, Windows,…);
Web browsers, word processors, design software,…
Object code & source code both receive protection
under copyright
A. Software Copyright
3. Object of protection
Protected as literary works within the meaning of the
Berne Convention
Ideas and principles which underlie any element of a
computer program, including those which underlie its
interfaces, are not protected by copyright
Originality requirement: the computer program must
be the author’s own intellectual creation
A. Software Copyright
4. Who owns the rights?
The person who has created the program is
generally the right holder
Possible co-ownership
When created in the course of employment, the
employer owns the economic rights, unless
otherwise agreed between the employer & the
programmer
A. Software Copyright
5. Exclusive rights
Permanent or temporary reproduction of a
computer program by any means and in any
form
Translation, adaptation, arrangement and any
other alteration
Any form of distribution to the public,
including the rental, of the original computer
program or of copies thereof
A. Software Copyright
6. Scope of the protection
Ideas?
Efficiency considerations?
Extrinsic considerations?
Interfaces?
A. Software Copyright
Ideas?
Copyright only protects the expression of a
computer program not ideas & principles:
« Whereas, for the avoicance of doubt, it has to be made
clear that only the expression of a computer program is
protected and that ideas and principles which underlie
any element of a program, including those which
underlie its interfaces, are not protected by copyright
under this Directive »
Algorithm:
Mathematics formula
Interpretation of Directive Recital 14
Word/Sentence
A. Software Copyright
Efficiency considerations?
Merger doctrine between idea & expression
Only one way to express one idea
Extrinsic considerations?
« Scènes à faire » doctrine
Mechanical specifications of the computer on which a
particular program is intended to run
Compatibility requirements of other programs with which a
program is designated to operate in conjunction
Computer manufacturer’s design standards
Demands of the industry being serviced
Widely accepted programming practices wihin the computer
industry
A. Software Copyright
Interfaces?
Parts of the program intended to allow it to
communicate and work together with other
components of a computer system and with users
Protected only if original expression
A. Software Copyright
7. Exceptions to software copyright
A lawful holder is entitled:
To use the computer program for its intended
purpose
To correct errors in the program
To make a back-up
To observe, study or test the functioning of the
program in order to discover how it works
A. Software Copyright
To use it for its intended purpose
« In the absence of specific contractual provisions,
the acts above referred shall not require
authorization by the right holder where they are
necessary for the use of the computer program by
the lawful acquirer in accordance with its intended
purpose, including for error correction »
Allowing decompilation for error correction: quid
in practical terms?
A. Software Copyright
To make a back-up
« The making of a back-up copy by a person
having the right to use the computer program may
not be prevented by contract insofar as it is
necessary for that use »
No contractual exception!
A. Software Copyright
Exception for study purposes
« The person having the right to use a copy of a
computer program shall be entitled, without the
authorization of the rightholder, to observe, study
or test the functioning of the program in order to
determine the ideas and principles which underlie
any element which underlie any element of the
program if he does so while performing any of the
acts of loading, displaying, running, transmitting
or storing the program which he is entitled to do »
It is allowed to look at what is allowed to be seen!
A. Software Copyright
8. Decompilation
What does « decompile » mean?
Converting the object code of a program into
source code
Conflict of interests?
Making one’s software interoperable with other
software in the public interest
Keeping the source code of a program secret for
business purposes
A. Software Copyright
Directive provision
The authorization of the right holder is not required:
when reproduction of the code and translation of its form are
indispensable to obtain the information necessary to achieve
the interoperability of an independtly created computer
program with other programs
these acts are performed by a person having a right to use a
copy of a program
the information necessary to achieve interoperability has not
previously been readily available to this person
these acts are confined to the parts of the original program
which are necessary to achieve interoperability
A. Software Copyright
Restriction to decompilation
The information obtained cannot be used for goals other than
to achieve the interoperability of the independently created
computer program
The information obtained cannot be given to others, except
when necessary for interoperability
The information obtained cannot be used for the
development, production or marketing of a computer
program substantially similar in its expression, or for any other
act which infringes copyright
Decompilation cannot be used in a manner which
unreasonably prejudices the right holder’s legitimate
interests or conflicts with a normal exploitation of the
computer program
A. Software Copyright
A. Software Copyright
Interoperability case: Microsoft v. EU Commission
In March 2004, the European Commission imposed a record
fine of €497 million and a series of 'remedies' upon Microsoft
for abuse of dominant position on the software market with its
Windows operating system
According to the EU Commission, Microsoft abused its market
power by deliberately restricting interoperability between
Windows PCs and non-Microsoft work group servers, and
by tying its Windows Media Player (WMP), a product where it
faced competition, with its ubiquitous Windows operating
system
Appeal launched before the EU Court of Justice
A. Software Copyright
9. Term of protection
Author’s life + 50 years after his death or
after the death of the last surviving author
70 years in Belgium!
A. Software Copyright
10. Digital Rigths Management (DRM)
What does it mean?
All technical measures used by right holders to
protect software copyright
Example: an activation code required to the
licensee by the software manufacturer in
order to use the software
Purpose: preventing copyright infringement
A. Software Copyright
Directive provision
Requires Member States to take measures
Against any act of putting into circulation, or the possession
for commercial purposes of,
Any means only intended to break DRM
Belgian law
Fine from 2,5 EUR to 2.500 EUR
Against anyone who puts into circulation, or possesses for
commercial purposes, any means the sole intended purpose
of which is to facilitate the unauthorized removal or
circumvention of any technical device which may have been
applied to protect a computer program
A. Software Copyright
A. Software Copyright
DRM case in France: Virgin v. Apple
VirginMega (Virgin Group’s French online music joint venture
with media company Lagardère Group) launched a claim
against Apple before French Competition Council
VirginMega claims that Apple had anti-competitive behaviour
by refusing to licence the iTunes Music Store’s Fair Play DRM
technology
VirginMega uses Windows’audio and DRM technology which
is not supported by the Ipod
French Competition Council dismissed the claim in November
2004
A. Software Copyright
11.Licensing
What is a software copyright licence?
Copyright holder’s permission to do some of the
things restricted by copyright, among others:
running, modifying and distributing the program
Examples
Allowing the licensee to install and run the
program on only one or on several computers
A. Software Copyright
Semi-free licence : free only for non-commercial
users
Shareware licence : allows unlimited redistribution
but only limited trial use of the software (e.g. 30
days)
Crippleware system: software distributed under
shareware licence but in an incomplete or
« crippled » form. The user must pay a fee to get an
« uncrippled » version of the software
A. Software Copyright
Copyleft?
A.Software Copyright
Copyleft?
Inventor
Richard Stallman invented “copyleft” in disagreement
with the concept of software copyright
He believed that anyone ought to use and modify software
without asking anyone’s permission
Principles
Software is copyrighted but made available under a special
license
Copyleft licence allows any user to freely run, copy,
modify and distribute the copyleft software
A.Software Copyright
Modifying the software for one’s own personal use is
permitted
Two requirements in case of distribution of the modified
version:
• Source code and object code of the modified version must
both be distributed
• The modified version must itself be under copyleft licence
Examples of Copyleft licence
GNU General Public Licence (GPL)
One of the most commonly used copyleft licence
Created in 1991
Linux
A.Software Copyright
A.Software Copyright
Example of No Copyleft licence
BSD licence
Allows anyone to freely run, copy and distribute the software
Allows to modify it and to distribute the modified version under
restriction and without copyleft
Pros and cons
Source code is public
Program is adaptable and constantly improved by other
programmers
Reliability and durability?
Dependency on the service supplier?
Fragmentation risk?
Intern skills?
A.Software Copyright
Conclusion
Open Source >< Not Open Source
Copyleft >< No Copyleft
Free of charge>< Not Free of charge
B. Software Patent
1. Legal Background
Munich Convention
Belgian Law
USA, JAPAN
WIPO, TRIPS
B. Software Patent
2. WIPO
Copyright
“Computer programs are protected as literary
works within the meaning of Article 2 of the Berne
Convention. Such protection applies to computer
programs, whatever may be the mode or form of
their expression.”
Patent
Nothing about computer program in the Paris
Convention
B. Software Patent
3. TRIPS
Copyright
“Computer programs, whether in source or object code,
shall be protected as literary works under the Berne
Convention (1971).”
Patent
“ (…)patents shall be available for any inventions, whether
products or processes, in all fields of technology, provided
that they are new, involve an inventive step and are capable
of industrial application.”
B. Software Patent
4. European Patent Convention (1973)
Article 52(1)
Computer programs as such are not patentable
“(1) European patents shall be granted for any inventions which
are susceptible of industrial application, which are new and
which involve an inventive step.
(2) The following in particular shall not be regarded as inventions
within the meaning of paragraph 1:
(a) discoveries, scientific theories and mathematical methods;
(b) aesthetic creations;
(c) schemes, rules and methods for performing mental acts, playing
games or doing business, and programs for computers;
(d) presentations of information.”
B. Software Patent
5. EU Proposal Directive on the patentability
of computer-implemented inventions
Proposal first launched in February 2002
Demand from the EU Parliament for a
renewed referral last February
Adoption in Council last March
Still in discussion
B. Software Patent
EU Council Position
Definition of a « computer-implemented invention »
« Any invention the performance of which involves the use of a
computer, computer network or other programmable apparatus,
the invention having one or more features which are realised
wholly or partly means of a computer program »
In order for a software related invention to be patentable, a
technical contribution remains necessary
A technical contribution means a contribution to the state of
the art in a field of technology, which is new and not obvious
to a person skilled in the art
B. Software Patent
Pros and Cons of Software Patent
Protection of algorithm
Protection against independent creation
Easy to licence
Do not rely on secrecy
Cost
Procedure too long & protection term inadequate
for the short lifetime of software inventions
Uncertainty about the patent subject-matter
Inventivity & Novelty requirements
C. Know-How
1. Definition
“know-how” v. “trade secrets”
Often used as synonym but are by no means identical
Know-how may constitute a trade secret
Not every trade secret falls within the definition of know-how
Financial information, employment planning
2. Protection : source code
Licence and know-how agreements
Exclusivity/non exclusivity
Confidentiality
II. Database Protection
1. Legal Background
Copyright protection
Intellectual creation: Berne Convention, TRIPS,
directive copyright
Sui generis protection
Directive 96 EC on the legal protection of databases
II. Database Protection
2. Directive 96 EC
Scope
Collection of independent works, data or other
materials
Arranged in a systematic or methodical way
Individually accessible by electronic or other means
Exclusion
Computer programs
Database contents
II. Database Protection
Protection of the presentation of the database
Copyright in favor of the author if: by reason of the selection
or arrangement of its contents, constitutes the author’s own
intellectual creation
Protection of the database itself
« Sui generis » right in favor of the « maker »:
Right of the maker of a database to prevent extraction and or reutilization of the whole or of a substantial part of the contents of the
database
Condition of this right: the maker must show that there has
been a substantial investment in either the obtaining,
verification or presentation of the contents
Protection of one/several data by copyright: data=work of author
II. Database Protection
Object of protection
Extraction of the whole or of a substantial part,
evaluated qualitatively and/or quantitatively, of the
database contents
Re-utilization of the whole or of a substantial part,
evaluated qualitatively and/or quantitatively, of the
database contents
II.Database Protection
Object of protection
Extraction: permanent or temporary transfer of all or a
substantial part of the contents to another medium
Re-utilization: any form of making available to the
public all or a substantial part of the contents by the
distribution of copies, by renting, by on-line or other
forms of transmission
Repeated & systematic extraction and/or re-utilization
of insubstantial parts which conflict with normal
exploitation or which unreasonably prejudice legitime
interests of its maker
II. Database Protection
Lawful users of a database made available to the
public
extracting & re-utilizing insubstantial parts of the
contents, evaluated qualitatively and/or quantitatively, for
any purposes (included commercial ones, see ECJ)
NOT perform acts which conflict with normal
exploitation of the database or unreasonably prejudice the
legitimate interests of its maker
II. Database Protection
3. Recent Case Law of the European Court
of Justice (November 2004)
British Horseracing & Fixtures Marketing Cases
Background
The four cases (British Horseracing Board Ltd. v. William Hill;
Fixtures Marketing Ltd. v. Oy Veikkaus Ab.; Fixtures Marketing
Ltd. v. Svenska Spel Ab.; Fixtures Marketing Ltd. v. Oganismos
Prognostikon Agonon Podosfairou Ae) came before the Court
as a result of referrals from UK, Finnish, Swedish and Greek
courts
II. Database Protection
British Horseracing Board (BHB) case arose over the use
by William Hill, for the purpose of organising betting on
horse racing, of information from the BHB database
In Fixtures Marketing cases, Finnish, Swedish and Greek
betting firms used information taken from the fixture lists
for the English and Scottish football leagues
Investment in the obtaining of the contents
Resources used to seek out existing independent materials
and collect them in the database
Not resources used for the creation as such of
independend materiels
II. Database Protection
Investment in the verification of the contents
Resources used with a view to ensuring the reliability of the
information contained in that database, to monitor the accuracy
of the materials collected when the database was created and
during its operation
Not resources used for verification during the stage of creation
of materials which are subsequently collected in the database
II. Database Protection
Extraction and/or re-utilization
Any unauthorised act of appropriation and distribution to the
public of the whole or a part of the contents. It does not imply
direct access to the original database
Substantial part, evaluated quantitatively
Volume of data extracted from the database and/or re-utilised
must be assessed in relation to the volume of the contents
Substantial part, evaluated qualitatively
Scale of the investment in the obtaining, verification or
representation of the contents subject to extraction and/or reutilization
II. Database Protection
First answers of the European Court of Justice:
Investment independent of that required for the creation
of the data
Exclusion from data created at the same time as its
processing
Is the derivation of data from naturally occurring
phenomena an act of creation or obtaining?
Recording of meteorological data?
Genetic sequences of living organisms?
« get around » strategies?
Substantially invest in the presentation or subsequent
verification of the information
Deny access to the public to the untreated source data
II. Database Protection
4. Deeplinking
Definition of deep link
A link from one website to another that:
Bypasses the second website’s home page and
Takes the user directly to an internal page on the site
Important national case law
No uniform answer
II. Database Protection
II. Database Protection
II. Database Protection
Dutch case: PCM v. Kranten.com (2000)
News website not protectable as database
Court held the newspaper had put insufficient effort
into composing the collection of headlines
Danish case: Danish Newspaper v.Newsbooster
(2002)
News website protectable as database
Deep linking infringes database right
Repeated & systematic reproduction and publication
of claimant’s headlines and articles
II. Database Protection
Cadremploi v. Keljob (2001)
Job advertisements website protectable as database
Extraction of subtantial parts, evaluated
qualitatively
Essential parts of a job offer include:
Post title
Sector of industry
Geographic zone
Publication date on Cadremploi site
URL address
Infringes database right
II. Database Protection
5. Conclusion
Processed information
Eligible to copyright protection
Eligible to database protection
Utility to mention the protection:
©
“the database… is protected by database regulations. It is
strictly forbidden, without the consent of the maker, to extract
and/or re-utilize the whole or a substantial part of the content of
this database”
Utility to use specific tools: PDF, technological measures
(Directive on information society: access control/protection
process: encryption, scrambling, copy control mechanism,…
Thank You!
Q
&A
uestions
nswers
[email protected]
WWW.ULYS.NET