-
1
-
-
0001405850
-
The Long Boom
-
July
-
Peter Schwartz & Peter Leyden, The Long Boom, Wired, July 1997, at 115, 121 (noting the transition from an industrial to an information society).
-
(1997)
Wired
, pp. 115
-
-
Schwartz, P.1
Leyden, P.2
-
2
-
-
0347743104
-
Software to Go
-
June 20
-
See Harold Seneker & Jayne A. Pearl, Software to Go, Forbes, June 20, 1983, at 93, 93.
-
(1983)
Forbes
, pp. 93
-
-
Seneker, H.1
Pearl, J.A.2
-
3
-
-
0021492315
-
CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form
-
See Pamela Samuelson, CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form, 1984 Duke L.J. 663, 680-81 (noting that computers are "chameleon-like" machines, and that the program determines what type of machine the computer will be).
-
(1984)
Duke L.J.
, pp. 663
-
-
Samuelson, P.1
-
4
-
-
0347840389
-
Code Warriors
-
Jan. 18, hereinafter Levy, Code Warriors
-
See Steven Levy, Code Warriors, Newsweek, Jan. 18, 1999, at 60, 60 [hereinafter Levy, Code Warriors].
-
(1999)
Newsweek
, pp. 60
-
-
Levy, S.1
-
5
-
-
0347112630
-
-
See infra note 53 and accompanying text
-
See infra note 53 and accompanying text.
-
-
-
-
10
-
-
0347112893
-
-
supra note 4
-
See Paul Freiberger & Michael Swaine, Fire in the Valley: The Making of the Personal Computer 153-54 (1984); Levy, Code Warriors, supra note 4, at 60. Program code became a corporation's crown jewel, the gem to be locked away, safeguarded from prying eyes and hands. See id.
-
Code Warriors
, pp. 60
-
-
Levy1
-
11
-
-
0347112893
-
-
See Paul Freiberger & Michael Swaine, Fire in the Valley: The Making of the Personal Computer 153-54 (1984); Levy, Code Warriors, supra note 4, at 60. Program code became a corporation's crown jewel, the gem to be locked away, safeguarded from prying eyes and hands. See id.
-
Code Warriors
, pp. 60
-
-
Levy1
-
12
-
-
0347743105
-
-
See United States v. Microsoft Corp., 980 F. Supp. 537 (D.D.C. 1997); United States v. Microsoft Corp., 159 F.R.D. 318 (D.D.C.), rev'd, 56 F.3d 1448 (D.C. Cir. 1995)
-
See United States v. Microsoft Corp., 980 F. Supp. 537 (D.D.C. 1997); United States v. Microsoft Corp., 159 F.R.D. 318 (D.D.C.), rev'd, 56 F.3d 1448 (D.C. Cir. 1995).
-
-
-
-
13
-
-
0345867272
-
An Antitrust Remedy or Monopoly Leveraging by Electronic Networks
-
See Thomas A. Piraino, Jr., An Antitrust Remedy or Monopoly Leveraging by Electronic Networks, 93 Nw. U. L. Rev. 1, 3-5 (1998).
-
(1998)
Nw. U. L. Rev.
, vol.93
, pp. 1
-
-
Piraino T.A., Jr.1
-
15
-
-
0346482480
-
Could Java Change Everything?: The Competitive Propriety of a Proprietary Standard
-
PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 520, hereinafter Lemley & McGowan, Competitive Propriety
-
See Mark A. Lemley & David McGowan, Could Java Change Everything?: The Competitive Propriety of a Proprietary Standard, in Second Annual Internet Law Institute 453, 456 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 520, 1998) [hereinafter Lemley & McGowan, Competitive Propriety].
-
(1998)
Second Annual Internet Law Institute
, pp. 453
-
-
Lemley, M.A.1
McGowan, D.2
-
16
-
-
0346482479
-
-
See infra Part I
-
See infra Part I.
-
-
-
-
17
-
-
0043001573
-
Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts
-
See, e.g., Anthony L. Clapes, Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts, 19 U. Dayton L. Rev. 903, 906 (1994) (objecting to a reduced level of intellectual property protection for computer software); Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 Harv. L. Rev. 977, 988 (1993) (concluding that there is no reason to believe that courts are overprotecting software proprietors).
-
(1994)
U. Dayton L. Rev.
, vol.19
, pp. 903
-
-
Clapes, A.L.1
-
18
-
-
0043001572
-
Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New since CONTU?
-
See, e.g., Anthony L. Clapes, Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts, 19 U. Dayton L. Rev. 903, 906 (1994) (objecting to a reduced level of intellectual property protection for computer software); Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 Harv. L. Rev. 977, 988 (1993) (concluding that there is no reason to believe that courts are overprotecting so6tware proprietors).
-
(1993)
Harv. L. Rev.
, vol.106
, pp. 977
-
-
Miller, A.R.1
-
19
-
-
77952976495
-
Legal-Ware: Contract and Copyright in the Digital Age
-
See, e.g., Michael J. Madison, Legal-Ware: Contract and Copyright in the Digital Age, 67 Fordham L. Rev. 1025, 1029 n.14, 1031 (1998) (arguing that the public domain cannot consist only of materials that information providers unilaterally choose to provide); Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 Colum. L. Rev. 2308, 2365-71 (1994) (advocating a market-based approach to computer software protection).
-
(1998)
Fordham L. Rev.
, vol.67
, Issue.14
, pp. 1025
-
-
Madison, M.J.1
-
20
-
-
84881941394
-
A Manifesto Concerning the Legal Protection of Computer Programs
-
See, e.g., Michael J. Madison, Legal-Ware: Contract and Copyright in the Digital Age, 67 Fordham L. Rev. 1025, 1029 n.14, 1031 (1998) (arguing that the public domain cannot consist only of materials that information providers unilaterally choose to provide); Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 Colum. L. Rev. 2308, 2365-71 (1994) (advocating a market-based approach to computer software protection).
-
(1994)
Colum. L. Rev.
, vol.94
, pp. 2308
-
-
Samuelson, P.1
-
21
-
-
0347112880
-
-
note
-
The underpinnings of the federal copyright and patent statutes are rooted in Article I of the United States Constitution, which provides that "Congress shall have Power . . . [t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." U.S. Const, art. I, § 8, cl. 8. The Supreme Court has observed that the objective of the federal intellectual property statutes is to strike a balance between private and public rights of access to information, and "to motivate the creative activity of authors . . . and to allow the public access to the products of their genius after the limited period of exclusive control has expired." Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 429 (1984); see also Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480 (1974) (proclaiming that the limited monopoly fostered by the federal intellectual property laws "will have a positive effect on society through the introduction of new products and processes of manufacture into the economy, and the emanations by way of increased employment and better lives for our citizens").
-
-
-
-
22
-
-
0346482482
-
-
See infra Part I.C-D
-
See infra Part I.C-D.
-
-
-
-
23
-
-
0347743106
-
-
See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991)
-
See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991).
-
-
-
-
24
-
-
0346482483
-
-
See 17 U.S.C.A. § 302(a) (West Supp. 1999)
-
See 17 U.S.C.A. § 302(a) (West Supp. 1999).
-
-
-
-
25
-
-
0345851533
-
-
See 17 U.S.C. § 106 (1994)
-
See 17 U.S.C. § 106 (1994).
-
-
-
-
26
-
-
0346482484
-
-
See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 n.2 (2d Cir. 1977)
-
See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 n.2 (2d Cir. 1977).
-
-
-
-
27
-
-
0345851534
-
-
See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480-81 (1974)
-
See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480-81 (1974).
-
-
-
-
28
-
-
0347112632
-
-
See 35 U.S.C. § 112 (1994)
-
See 35 U.S.C. § 112 (1994).
-
-
-
-
29
-
-
0346482485
-
-
See 17 U.S.C. § 301
-
See 17 U.S.C. § 301.
-
-
-
-
30
-
-
0347743108
-
-
See Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 556 (1985)
-
See Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 556 (1985).
-
-
-
-
31
-
-
0345851536
-
-
See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 350 (1991)
-
See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 350 (1991).
-
-
-
-
32
-
-
0347743110
-
-
See id.
-
See id.
-
-
-
-
33
-
-
0347743109
-
-
101 U.S. 99 (1879)
-
101 U.S. 99 (1879).
-
-
-
-
34
-
-
0347743344
-
-
See id. at 99-100
-
See id. at 99-100.
-
-
-
-
35
-
-
0347112634
-
-
See id.
-
See id.
-
-
-
-
36
-
-
0346482496
-
-
See id. at 103
-
See id. at 103.
-
-
-
-
37
-
-
0347743117
-
-
See id.
-
See id.
-
-
-
-
38
-
-
0346482487
-
-
See id. at 107
-
See id. at 107.
-
-
-
-
39
-
-
0345851535
-
-
See id. at 105. "Letters-patent" is a reference to the patent law
-
See id. at 105. "Letters-patent" is a reference to the patent law. See Edward C. Walterscheid, Patents and Manufacturing in the Early Republic, 80 J. Pat. & Trademark Off. Soc'y 855, 857 (1998).
-
-
-
-
40
-
-
0346482486
-
Patents and Manufacturing in the Early Republic
-
See id. at 105. "Letters-patent" is a reference to the patent law. See Edward C. Walterscheid, Patents and Manufacturing in the Early Republic, 80 J. Pat. & Trademark Off. Soc'y 855, 857 (1998).
-
(1998)
J. Pat. & Trademark Off. Soc'y
, vol.80
, pp. 855
-
-
Walterscheid, E.C.1
-
41
-
-
0345851547
-
-
See 17 U.S.C. § 102(b) (1994)
-
See 17 U.S.C. § 102(b) (1994).
-
-
-
-
42
-
-
0345851554
-
-
Id.
-
Id.
-
-
-
-
43
-
-
0345851773
-
-
See H.R. Rep. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5670
-
See H.R. Rep. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5670.
-
-
-
-
44
-
-
0346482501
-
-
See id., reprinted in 1976 U.S.C.C.A.N. 5659, 5670
-
See id., reprinted in 1976 U.S.C.C.A.N. 5659, 5670.
-
-
-
-
45
-
-
0347743107
-
-
Conversely, the original expression of an idea, even if not readily perceptible by the human eye, is protected. See id. at 52, reprinted in 1976 U.S.C.C.A.N. 5659, 5665. Similarly, even though a program may be in such a form that it may only be "perceived" by a machine, the program nonetheless may be entitled to copyright protection. See, e.g., Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1248-51 (3d Cir. 1983) (rejecting contention that copyright is limited to works designed to be read by a human reader); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir. 1982) (determining that object code represented on a Read Only Memory chip may be copyrighted)
-
Conversely, the original expression of an idea, even if not readily perceptible by the human eye, is protected. See id. at 52, reprinted in 1976 U.S.C.C.A.N. 5659, 5665. Similarly, even though a program may be in such a form that it may only be "perceived" by a machine, the program nonetheless may be entitled to copyright protection. See, e.g., Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1248-51 (3d Cir. 1983) (rejecting contention that copyright is limited to works designed to be read by a human reader); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir. 1982) (determining that object code represented on a Read Only Memory chip may be copyrighted).
-
-
-
-
46
-
-
0345851531
-
-
See Kregos v. Associated Press, 937 F.2d 700, 705 (2d Cir. 1991)
-
See Kregos v. Associated Press, 937 F.2d 700, 705 (2d Cir. 1991).
-
-
-
-
47
-
-
0346482706
-
-
See Bellsouth Adver. & Publ'g Corp. v. Donnelley Info. Publ'g, Inc., 999 F.2d 1436, 1442 (11th Cir. 1993)
-
See Bellsouth Adver. & Publ'g Corp. v. Donnelley Info. Publ'g, Inc., 999 F.2d 1436, 1442 (11th Cir. 1993).
-
-
-
-
48
-
-
0346482481
-
-
See 5 Copyright, Congress & Technology: The Public Record 40 (Nicholas Henry ed., Oryx Press 1980) [hereinafter CONTU Final Report]; see also Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 66 (D. Mass. 1990) (noting that the merger doctrine will deny copyright protection to certain aspects of computer programs). Regarding the application of merger to computer programs, one commentator noted that the "line [for determining when merger occurs] is a pragmatic one, drawn not on the basis of some metaphysical property of 'ideas,' but by balancing the need to protect the labors of authors with the desire to assure free access to ideas." 4 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[F][1], at 13-125 (1998)
-
See 5 Copyright, Congress & Technology: The Public Record 40 (Nicholas Henry ed., Oryx Press 1980) [hereinafter CONTU Final Report]; see also Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 66 (D. Mass. 1990) (noting that the merger doctrine will deny copyright protection to certain aspects of computer programs). Regarding the application of merger to computer programs, one commentator noted that the "line [for determining when merger occurs] is a pragmatic one, drawn not on the basis of some metaphysical property of 'ideas,' but by balancing the need to protect the labors of authors with the desire to assure free access to ideas." 4 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[F][1], at 13-125 (1998).
-
-
-
-
49
-
-
0347112631
-
-
See Atari, Inc. v. North Am. Philips Consumer Elecs. Corp., 672 F.2d 607, 616 (7th Cir. 1982)
-
See Atari, Inc. v. North Am. Philips Consumer Elecs. Corp., 672 F.2d 607, 616 (7th Cir. 1982).
-
-
-
-
50
-
-
0347743121
-
-
See Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 963 (2d Cir. 1997)
-
See Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 963 (2d Cir. 1997).
-
-
-
-
51
-
-
0345851548
-
The Relative Roles of Patent and Copyright in the Protection of Computer Programs
-
hereinafter Karjala, Relative Roles
-
Computer programs are purely functional in that they cause a computer to perform a particular task or set of tasks. See Dennis S. Karjala, The Relative Roles of Patent and Copyright in the Protection of Computer Programs, 17 J. Marshall J. Computer & Info. L. 41, 42 (1998) [hereinafter Karjala, Relative Roles]. Because separating the functional aspects from the nonfunctional aspects of program code would leave little to protect, however, the protection of computer programs under copyright is an exception to the useful article doctrine. See Dennis S. Karjala, Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller, 19 U. Dayton L. Rev. 975, 986 (1994) [hereinafter Karjala, Copyright Protection].
-
(1998)
J. Marshall J. Computer & Info. L.
, vol.17
, pp. 41
-
-
Karjala, D.S.1
-
52
-
-
0041999944
-
Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller
-
hereinafter Karjala, Copyright Protection
-
Computer programs are purely functional in that they cause a computer to perform a particular task or set of tasks. See Dennis S. Karjala, The Relative Roles of Patent and Copyright in the Protection of Computer Programs, 17 J. Marshall J. Computer & Info. L. 41, 42 (1998) [hereinafter Karjala, Relative Roles]. Because separating the functional aspects from the nonfunctional aspects of program code would leave little to protect, however, the protection of computer programs under copyright is an exception to the useful article doctrine. See Dennis S. Karjala, Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller, 19 U. Dayton L. Rev. 975, 986 (1994) [hereinafter Karjala, Copyright Protection].
-
(1994)
U. Dayton L. Rev. 975
, vol.19
, pp. 986
-
-
Karjala, D.S.1
-
53
-
-
0346482505
-
-
See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1247-48 (3d Cir. 1983)
-
See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1247-48 (3d Cir. 1983).
-
-
-
-
54
-
-
0345851555
-
-
17 U.S.C. § 102(b) (1994);
-
17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
-
-
-
-
55
-
-
0347112886
-
Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex
-
17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
-
(1993)
Ariz. St. L.J. 801
, vol.25
, pp. 831-832
-
-
Brown, J.E.1
-
56
-
-
0347743340
-
-
Samuelson et al., supra note 16, at 2351
-
17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
-
-
-
-
57
-
-
0347743341
-
-
See CONTU Final Report, supra note 43, at 21-27.
-
See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
-
-
-
-
58
-
-
0347743126
-
-
Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974)
-
See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
-
-
-
-
59
-
-
0010879911
-
Computer Software: Intellectual Property Protection in the United States and Japan
-
See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
-
(1995)
J. Marshall J. Computer & Info. L. 245
, vol.13
, pp. 254
-
-
Haynes, J.M.1
-
60
-
-
0346482500
-
-
note
-
See Computer Software Copyright Act of 1980, Pub. L. No. 96-517, 94 Stat. 3015, 3028 (codified at 17 U.S.C. §§ 101, 117 (1994)). Computer programs are defined as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result." 17 U.S.C. § 101. "Statements or instructions" refers to program source code and object code. See infra note 53 and accompanying text. The Act was further amended to exempt from liability owners of computer programs who make or authorize the making of copies of, or adaptations to, computer programs when necessary to operate the program. See 94 Stat. at 3028.
-
-
-
-
61
-
-
0347743120
-
-
17 U.S.C. § 101
-
17 U.S.C. § 101.
-
-
-
-
62
-
-
0346482700
-
-
See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992)
-
See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
-
-
-
-
63
-
-
0345851549
-
Convergence in the Law of Software Copyright?
-
See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
-
(1995)
High Tech. L.J. 1
, vol.10
, pp. 14-15
-
-
Lemley, M.A.1
-
64
-
-
0346482506
-
-
Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996)
-
See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
-
-
-
-
65
-
-
0346482509
-
-
Altai, 982 F.2d at 698
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
-
-
-
66
-
-
0346482510
-
-
See id.
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
-
-
-
67
-
-
0346482692
-
Copyright Protection for Software Architecture: Just Say No!
-
Note
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
(1988)
Colum. Bus. L. Rev. 823
, pp. 826
-
-
Kretschmer, M.T.1
-
68
-
-
0043001483
-
Software Reverse Engineering in the Real World
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
(1994)
U. Dayton L. Rev. 843
, vol.19
, Issue.17
, pp. 851
-
-
Johnson-Laird, A.1
-
69
-
-
0347743131
-
-
See Altai, 982 F.2d at 698.
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
-
-
-
70
-
-
0345851566
-
-
See id.
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
-
-
-
71
-
-
0347112661
-
-
See infra Part I.C
-
This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
-
-
-
-
72
-
-
0347743136
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
73
-
-
0043001396
-
Public Goods, Private Contract and Public Policy: Federal Preemption of Software License Prohibitions Against Reverse Engineering
-
See David A. Rice, Public Goods, Private Contract and Public Policy: Federal Preemption of Software License Prohibitions Against Reverse Engineering, 53 U. Pitt. L. Rev. 543, 567-68 (1992).
-
(1992)
U. Pitt. L. Rev. 543
, vol.53
, pp. 567-568
-
-
Rice, D.A.1
-
74
-
-
0347112660
-
An Uneasier Case for Copyright than for Patent Protection of Computer Programs
-
See A. Samuel Oddi, An Uneasier Case for Copyright than for Patent Protection of Computer Programs, 72 Neb. L. Rev. 351, 384 (1993).
-
(1993)
Neb. L. Rev. 351
, vol.72
, pp. 384
-
-
Samuel Oddi, A.1
-
75
-
-
0346482511
-
-
35 U.S.C. § 101 (1994)
-
35 U.S.C. § 101 (1994).
-
-
-
-
76
-
-
0347112658
-
-
See id. §§ 102, 103
-
See id. §§ 102, 103.
-
-
-
-
77
-
-
0040510916
-
Patentability of Computer Software Instruction as an "Article of Manufacture:" Software as Such as the Right Stuff
-
See Vincent Chiappetta, Patentability of Computer Software Instruction as an "Article of Manufacture:" Software as Such as the Right Stuff, 17 J. Marshall J. Computer & Info. L. 89, 100 (1998).
-
(1998)
J. Marshall J. Computer & Info. L. 89
, vol.17
, pp. 100
-
-
Chiappetta, V.1
-
78
-
-
0345851764
-
-
See In re Alappat, 33 F.3d 1526, 1542 (Fed. Cir. 1994)
-
See In re Alappat, 33 F.3d 1526, 1542 (Fed. Cir. 1994).
-
-
-
-
79
-
-
0347743192
-
-
See supra Part I.A
-
See supra Part I.A.
-
-
-
-
80
-
-
0347112663
-
Patenting Computer Science: Are Computer Instruction Writings Patentable?
-
See Allen B. Wagner, Patenting Computer Science: Are Computer Instruction Writings Patentable?, 17 J. Marshall J. Computer & Info. L. 5, 33 (1998).
-
(1998)
J. Marshall J. Computer & Info. L. 5
, vol.17
, pp. 33
-
-
Wagner, A.B.1
-
81
-
-
0345851571
-
-
See Karjala, Relative Roles, supra note 46, at 41-42
-
See Karjala, Relative Roles, supra note 46, at 41-42.
-
-
-
-
82
-
-
0345851565
-
-
One who, without authority, "makes, uses or sells any patented invention" infringes a patent. 35 U.S.C. § 271(a) (1994)
-
One who, without authority, "makes, uses or sells any patented invention" infringes a patent. 35 U.S.C. § 271(a) (1994).
-
-
-
-
83
-
-
84868001819
-
Patents for Software-Related Inventions
-
See David Bender & Anthony R. Barkume, Patents for Software-Related Inventions, 5 Software L.J. 279, 287 (1992).
-
(1992)
Software L.J. 279
, vol.5
, pp. 287
-
-
Bender, D.1
Barkume, A.R.2
-
84
-
-
0347743137
-
-
See 17 U.S.C.A. § 302(a) (West Supp. 1999)
-
See 17 U.S.C.A. § 302(a) (West Supp. 1999).
-
-
-
-
85
-
-
0347743328
-
-
See 35 U.S.C. § 154(a)(2)
-
See 35 U.S.C. § 154(a)(2).
-
-
-
-
86
-
-
0347743130
-
Possible Defenses to Complaints for Copyright Infringement and Reverse Engineering of Computer Software: Implications for Antitrust and I.P. Law
-
See John G. Mills, Possible Defenses to Complaints for Copyright Infringement and Reverse Engineering of Computer Software: Implications for Antitrust and I.P. Law, 80 J. Pat. & Trademark Off. Soc'y 101, 130 (1998).
-
(1998)
J. Pat. & Trademark Off. Soc'y 101
, vol.80
, pp. 130
-
-
Mills, J.G.1
-
88
-
-
0347743335
-
-
See 37 C.F.R. § 202.3 (1998)
-
See 37 C.F.R. § 202.3 (1998).
-
-
-
-
90
-
-
0347743334
-
-
See Karjala, Relative Roles, supra note 46, at 41-42
-
See Karjala, Relative Roles, supra note 46, at 41-42.
-
-
-
-
91
-
-
0345851760
-
-
note
-
See supra note 46; see also Chiappetta, supra note 59, at 156 n.285 (noting the distinction between patent and copyright protection of computer software).
-
-
-
-
92
-
-
0347112664
-
-
note
-
See Wagner, supra note 62, at 6. The Patent and Trademark Office ("PTO") historically had viewed software components as unpatentable mathematical formulations existing independently of functional structures or processes. See Lemley & O'Brien, supra note 71, at 280-81. Thus, patent claims routinely were rejected by the courts and the PTO unless the claim included an accompanying physical structure or embodiment. See, e.g., In re Pardo, 684 F.2d 912, 915 (C.C.P.A. 1982) (describing the two-part test for patentability as involving a determination first whether a mathematical algorithm is recited, and secondly, whether the algorithm is applied to physical elements).
-
-
-
-
93
-
-
0347743127
-
-
note
-
See In re Beauregard, 53 F.3d 1583, 1584 (Fed. Cir. 1995) (noting that the Commissioner of Patents and Trademarks had conceded that computer software on computer-readable media is patentable subject matter); In re Lowry, 32 F.3d 1579, 1583 (Fed. Cir. 1994) (holding that the application of the printed matter doctrine was inappropriate where the information in question was to be processed by a machine rather than by the human mind).
-
-
-
-
94
-
-
0346482502
-
A New Frontier in Patents: Patent Claims to Propagated Signals
-
See Jeffrey R. Kuester et al., A New Frontier in Patents: Patent Claims to Propagated Signals, 17 J. Marshall J. Computer & Info. L. 75, 77 (1998).
-
(1998)
J. Marshall J. Computer & Info. L. 75
, vol.17
, pp. 77
-
-
Kuester, J.R.1
-
95
-
-
0347743138
-
-
note
-
See also State St. Bank & Trust Co. v. Signature Fin. Group, Inc., 149 F.3d 1368, 1373-74 (Fed. Cir. 1998) (refusing to apply the mathematical algorithm exception to computer software where it produces "a useful, concrete and tangible result"), cert. denied, 119 S. Ct. 851 (1999).
-
-
-
-
96
-
-
0347112657
-
Examination Guidelines for Computer-Related Inventions
-
hereinafter Examination Guidelines
-
See Examination Guidelines for Computer-Related Inventions, 61 Fed. Reg. 7478, 7482, 7487 n.1 (1996) [hereinafter Examination Guidelines]; see also Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares, 50 Pat. Trademark & Copyright J. (BNA) 3, 3 (1995) (observing that the PTO "declared that computer programs embodied in a tangible medium, such as a floppy diskette, are patentable subject matter").
-
(1996)
Fed. Reg. 7478
, vol.61
, Issue.1
, pp. 7482
-
-
-
97
-
-
0345851567
-
Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares
-
See Examination Guidelines for Computer-Related Inventions, 61 Fed. Reg. 7478, 7482, 7487 n.1 (1996) [hereinafter Examination Guidelines]; see also Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares, 50 Pat. Trademark & Copyright J. (BNA) 3, 3 (1995) (observing that the PTO "declared that computer programs embodied in a tangible medium, such as a floppy diskette, are patentable subject matter").
-
(1995)
Pat. Trademark & Copyright J. (BNA) 3
, vol.50
, pp. 3
-
-
-
98
-
-
0347743084
-
-
Examination Guidelines, supra note 78, at 7482
-
Examination Guidelines, supra note 78, at 7482.
-
-
-
-
99
-
-
0347112887
-
-
See id. at 7481
-
See id. at 7481.
-
-
-
-
100
-
-
0347112888
-
-
See id.
-
See id.
-
-
-
-
101
-
-
21844482758
-
Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implication of "Lock-Out" Programs
-
hereinafter Cohen, Electronic Vigilantism
-
See Julie E. Cohen, Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implication of "Lock-Out" Programs, 68 S. Cal. L. Rev. 1091, 1112 (1995) [hereinafter Cohen, Electronic Vigilantism].
-
(1995)
S. Cal. L. Rev. 1091
, vol.68
, pp. 1112
-
-
Cohen, J.E.1
-
102
-
-
0346482693
-
-
See Examination Guidelines, supra note 78, at 7481
-
See Examination Guidelines, supra note 78, at 7481.
-
-
-
-
103
-
-
0347743140
-
-
note
-
The Examination Guidelines state that "[w]hen functional descriptive material [such as computer code] is recorded on some computer-readable medium it becomes structurally and functionally interrelated to the medium and will be statutory in most cases." Id.
-
-
-
-
104
-
-
0347112821
-
-
note
-
See Mills, supra note 68, at 129. A discussion of whether the recent decisions and PTO Guidelines impermissibly intrude into the sphere of copyright is beyond the scope of this Note. Compare Mazer v. Stein, 347 U.S. 201, 217 (1954) ("Neither the Copyright Statute nor any other says that because a thing is patentable it may not be copyrighted."), with Wagner, supra note 62, at 36 (arguing that patent protection for computer programs is inconsistent with copyright fundamentals).
-
-
-
-
105
-
-
0347112865
-
Ephemeral Infringement by Customizable Software: Liability Structures to Promote New Technology and Protect the Old
-
See Robert C. Haldiman, Ephemeral Infringement by Customizable Software: Liability Structures to Promote New Technology and Protect the Old, 80 J. Pat. & Trademark Off. Soc'y 651, 674 n.13 (1998).
-
(1998)
J. Pat. & Trademark Off. Soc'y 651
, vol.80
, Issue.13
, pp. 674
-
-
Haldiman, R.C.1
-
106
-
-
0345851560
-
-
note
-
See, e.g., Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 968 (2d Cir. 1997) (finding that the lower court's conclusion that the individual software elements of plaintiff's computer program were not protectable did not address plaintiff's claim that the combination of the elements was a trade secret); Rivendell Forest Prod., Ltd. v. Georgia-Pacific Corp., 28 F.3d 1042, 1045 (10th Cir. 1994) (recognizing that a "trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which, in unique combination, affords a competitive advantage and is a protectable secret" (quoting Imperial Chem. Indus., Ltd. v. Nat'l Distillers & Chem. Corp., 342 F.2d 737, 742 (2d Cir. 1965)); Harbor Software, Inc. v. Applied Sys., Inc., 887 F. Supp. 86, 90 (S.D.N.Y. 1995) (noting that "the overall design of a software program may be protectable as a trade secret, even if the individual components of that program are common knowledge in the programming industry" (emphasis in original)). Although state trade secret law does not create true intellectual property rights, as do the copyright and patent laws, it does establish standards of conduct that protect against unethical or unfair methods of gaining access to industrial technology and knowledge. See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 475-76 (1974).
-
-
-
-
107
-
-
0347112879
-
-
Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990)
-
Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990). Over forty states have adopted some version of the Act. See Arthur J. Schwab & David J. Porter, Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996, J. Proprietary Rights, Apr. 1998, at 2, 2.
-
-
-
-
108
-
-
0347112666
-
Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996
-
Apr.
-
Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990). Over forty states have adopted some version of the Act. See Arthur J. Schwab & David J. Porter, Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996, J. Proprietary Rights, Apr. 1998, at 2, 2.
-
(1998)
J. Proprietary Rights
, pp. 2
-
-
Schwab, A.J.1
Porter, D.J.2
-
109
-
-
0347112679
-
-
note
-
Unif. Trade Secrets Act § 1, 14 U.L.A. at 438. States that have not adopted the Uniform Trade Secrets Act, including New York, generally look to the first Restatement of Torts when defining a trade secret. See Softel, 118 F.3d at 968. The Restatement defines a trade secret as "any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it." Restatement of Torts § 757 cmt. b. (1939)
-
-
-
-
110
-
-
0347112681
-
-
note
-
See Rockwell Graphic Sys., Inc. v. DEV Indus., Inc., 925 F.2d 174, 177 (7th Cir. 1991); Anacomp, Inc. v. Shell Knob Servs., Inc., No. 93 Civ. 4003, 1994 U.S. Dist. LEXIS 223, at *27 (S.D.N.Y. Jan. 7, 1994), aff'd, 29 F.3d 621 (2d Cir. 1994).
-
-
-
-
111
-
-
0345851575
-
-
note
-
See Restatement of Torts § 757 cmt. b. Trade secrets may theoretically be protected in perpetuity.
-
-
-
-
112
-
-
0347112678
-
-
See Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 848 (10th Cir. 1993)
-
See Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 848 (10th Cir. 1993).
-
-
-
-
113
-
-
0347743142
-
-
See Coca-Cola Bottling Co. v. Coca-Cola Co., 107 F.R.D. 288, 289 (D. Del. 1985)
-
For example, the recipe for Coca-Cola is one of the best-kept trade secrets in the world. See Coca-Cola Bottling Co. v. Coca-Cola Co., 107 F.R.D. 288, 289 (D. Del. 1985).
-
-
-
-
114
-
-
0347112680
-
-
Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993)
-
See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
-
-
-
-
115
-
-
0345851744
-
-
Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994)
-
See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
-
-
-
-
116
-
-
0347743329
-
-
Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993)
-
See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
-
-
-
-
117
-
-
0347112672
-
Foreign Sale of MS-DOS Is Contributory Infringement
-
See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
-
(1994)
Pat. Trademark & Copyright J. (BNA) 165
, vol.48
, pp. 166
-
-
-
118
-
-
0347743150
-
-
note
-
See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 716 (2d Cir. 1992). Section 301 provides, in pertinent part, that "[n]othing in this title annuls or limits any rights or remedies under the common law or statutes of any State with respect to . . . activities violating legal or equitable rights that are not equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106." 17 U.S.C. § 301(b) (1994). The patent laws do not contain an express preemption section and state trade secret laws may coexist with the federal patent laws. See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 478-79 (1974).
-
-
-
-
119
-
-
0345851578
-
-
See Altai, 982 F.2d at 716-17
-
See Altai, 982 F.2d at 716-17.
-
-
-
-
120
-
-
0347112684
-
-
See Trandes, 996 F.2d at 659
-
See Trandes, 996 F.2d at 659.
-
-
-
-
121
-
-
0345851576
-
-
See Altai, 982 F.2d at 716
-
See Altai, 982 F.2d at 716.
-
-
-
-
122
-
-
0347743141
-
-
See id. at 717
-
See id. at 717.
-
-
-
-
123
-
-
0345851581
-
-
note
-
A trade secret is appropriated improperly by "theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means." Unif. Trade Secrets Act § 1 (amended 1985), 14 U.L.A. 433, 437 (1990). The Restatement's definition is virtually identical. See Restatement (Third) of Unfair Competition § 43 (1995) ("'Improper' means of acquiring another's trade secret . . . include theft, fraud, unauthorized interception of communications, inducement of or knowing participation in a breach of confidence, and other means either wrongful in themselves or wrongful under the circumstances of the case.").
-
-
-
-
124
-
-
0346497998
-
-
See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses
-
See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
-
-
-
-
125
-
-
0346497998
-
The Privatization (or "Shrink-Wrapping") of American Copyright Law
-
hereinafter McManis, Privatization
-
See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
-
(1999)
Cal. L. Rev. 173
, vol.87
, pp. 173
-
-
McManis, C.R.1
-
126
-
-
0346497998
-
-
See Madison, supra note 16, at 1058
-
See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
-
-
-
-
127
-
-
21844492135
-
Intellectual Property and Shrinkwrap Licenses
-
hereinafter Lemley, Intellectual Property
-
See Mark Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1246 (1995) [hereinafter Lemley, Intellectual Property]. For an example of a typical shrinkwrap license, see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988).
-
(1995)
S. Cal. L. Rev. 1239
, vol.68
, pp. 1246
-
-
Lemley, M.1
-
128
-
-
0347112685
-
-
see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988)
-
See Mark Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1246 (1995) [hereinafter Lemley, Intellectual Property]. For an example of a typical shrinkwrap license, see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988).
-
-
-
-
129
-
-
0345851582
-
-
note
-
See Madison, supra note 16, at 1029 n.11. Both patent and copyright laws protect only those ideas that are either functionally or expressively embodied in a work. See supra Part I.A-B.
-
-
-
-
130
-
-
21344433422
-
Drawing the Boundary between Copyright and Contract: Copyright Preemption of Software License Terms
-
hereinafter O'Rourke, Drawing the Boundary
-
The contractual breach of promise may also be referred to as a breach of trust or confidential relationship. See Maureen A. O'Rourke, Drawing the Boundary Between Copyright and Contract: Copyright Preemption of Software License Terms, 45 Duke L.J. 479, 523 (1995) [hereinafter O'Rourke, Drawing the Boundary].
-
(1995)
Duke L.J. 479
, vol.45
, pp. 523
-
-
O'Rourke, M.A.1
-
131
-
-
0347112689
-
-
See Frontline Test Equip., Inc. v. Greenleaf Software, Inc., 10 F. Supp. 2d 583, 592 (W.D. Va. 1998)
-
See Frontline Test Equip., Inc. v. Greenleaf Software, Inc., 10 F. Supp. 2d 583, 592 (W.D. Va. 1998).
-
-
-
-
132
-
-
0347112688
-
-
See supra notes 90-91 and accompanying text
-
See supra notes 90-91 and accompanying text.
-
-
-
-
133
-
-
0347112687
-
-
See 1 Nimmer & Nimmer, supra note 43, § 1.01[B][1], at 1-10 to -17
-
See 1 Nimmer & Nimmer, supra note 43, § 1.01[B][1], at 1-10 to -17.
-
-
-
-
134
-
-
0347112653
-
Canada-United States Trade Issues: Back from Purgatory? Why Computer Software "Shrink-Wrap" Licenses Should Be Laid to Rest
-
See Stephen Fraser, Canada-United States Trade Issues: Back from Purgatory? Why Computer Software "Shrink-Wrap" Licenses Should Be Laid to Rest, 6 Tul. J. Int'l & Comp. L. 183, 189 (1998).
-
(1998)
Tul. J. Int'l & Comp. L. 183
, vol.6
, pp. 189
-
-
Fraser, S.1
-
135
-
-
0347743143
-
-
See supra note 50 and accompanying text
-
See supra note 50 and accompanying text.
-
-
-
-
136
-
-
0346482465
-
-
See In re Alappat, 33 F.3d 1526, 1542-45 (Fed. Cir. 1994) (holding that patentability is not precluded even though computer program contains mathematical subject matter)
-
See In re Alappat, 33 F.3d 1526, 1542-45 (Fed. Cir. 1994) (holding that patentability is not precluded even though computer program contains mathematical subject matter).
-
-
-
-
137
-
-
0347743154
-
Restraints on Alienation, Equitable Servitudes, and the Feudal Nature of Computer Software Licensing
-
See Thomas M.S. Hemnes, Restraints on Alienation, Equitable Servitudes, and the Feudal Nature of Computer Software Licensing, 71 Denv. U. L. Rev. 577, 578-80 (1994).
-
(1994)
Denv. U. L. Rev. 577
, vol.71
, pp. 578-580
-
-
Hemnes, T.M.S.1
-
138
-
-
0345851584
-
-
note
-
See, e.g., Step-Saver Data Sys., Inc. v. Wyse Tech., 939 F.2d 91, 105-06 (3d Cir. 1991) (rejecting the defendant's argument that, under the U.C.C., shrinkwrap licenses were binding modifications); Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 269-70 (5th Cir. 1988) (affirming lower court's holding that shrinkwrap license at issue was an unenforceable contract of adhesion); Lemley, Intellectual Property, supra note 102, at 1248-53 (observing that before ProCD, shrinkwrap licenses were not enforced).
-
-
-
-
139
-
-
0345851583
-
-
86 F.3d 1447 (7th Cir. 1996)
-
86 F.3d 1447 (7th Cir. 1996).
-
-
-
-
140
-
-
0346482522
-
-
note
-
See ProCD, Inc. v. Zeidenberg, 908 F. Supp. 640, 644-45 (W.D. Wis.), rev'd, 86 F.3d 1447 (7th Cir. 1996).
-
-
-
-
141
-
-
0347112691
-
-
Id. at 645
-
Id. at 645.
-
-
-
-
142
-
-
0347112693
-
-
See id.
-
See id.
-
-
-
-
143
-
-
0347112695
-
-
See id. at 644
-
See id. at 644.
-
-
-
-
144
-
-
0346482524
-
-
note
-
See id. at 649-50. Section 117 provides, in pertinent part: [I]t is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided: (1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner . . . . 17 U.S.C. § 117 (1994).
-
-
-
-
145
-
-
0347112694
-
-
note
-
See ProCD, 908 F. Supp. at 656-57. The Supreme Court, in Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340 (1991), reiterated that copyright will only be afforded those works that satisfy the constitutionally mandated standard of originality. See id. at 347-48. The Court further stated that it is a well-established proposition that facts, such as the phone and address listings in ProCD, and ideas are not copyrightable. See id. at 344.
-
-
-
-
146
-
-
0347112690
-
-
See ProCD, 908 F. Supp. at 644
-
See ProCD, 908 F. Supp. at 644.
-
-
-
-
147
-
-
0345851755
-
-
Id.
-
Id.
-
-
-
-
148
-
-
0347743156
-
-
See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1449 (7th Cir. 1996)
-
See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1449 (7th Cir. 1996).
-
-
-
-
149
-
-
0347743157
-
-
See id. at 1452-53
-
See id. at 1452-53.
-
-
-
-
150
-
-
0347112692
-
-
See id. at 1454-55
-
See id. at 1454-55.
-
-
-
-
151
-
-
0345851585
-
-
See id.
-
See id.
-
-
-
-
152
-
-
0347112696
-
-
See id. at 1454
-
The Seventh Circuit stated that a "copyright is a right against the world. Contracts, by contrast, generally affect only their parties; strangers may do as they please, so contracts do not create 'exclusive rights.'" See id. at 1454.
-
-
-
-
153
-
-
0347743155
-
-
See id. at 1455
-
See id. at 1455.
-
-
-
-
154
-
-
0345851756
-
-
note
-
See, e.g., Expediters Int'l of Wash., Inc. v. Direct Line Cargo Management Servs., Inc., 995 F. Supp. 468, 483 (D.N.J. 1998) (noting that a contract claim is not equivalent to rights under copyright law because a promise is required); Lattie v. Murdach, 42 U.S.P.Q.2d (BNA) 1240, 1244 (N.D. Cal. 1997) (concluding that a contract claim is not equivalent to exclusive copyright rights); Architectronics, Inc. v. Control Sys., Inc., 935 F. Supp. 425, 438-41 (S.D.N.Y. 1996) (recognizing that the consensus among courts and commentators is that breach of contract claims are not preempted by the Copyright Act); Madison, supra note 16, at 1053 & n.104 (citing commentators).
-
-
-
-
155
-
-
0346482523
-
-
("Mass-Market Licenses") (visited Apr. 11, 1999) Aug. 1, draft [hereinafter Uniform Computer Act]
-
See National Conference of Comm'rs on Unif. State Laws, Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208 ("Mass-Market Licenses") (visited Apr. 11, 1999) 〈http://www.law.uh.edu/ucc2b/ 080198/080198.html〉 (Aug. 1, 1998 draft) [hereinafter Uniform Computer Act]. The former Article 2B for Licenses, when finalized, will no longer supplement the UCC with provision for electronic contracts and software licensing agreements, but instead will be promulgated as the Uniform Computer Information Transactions Act. See National Conference of Comm'rs on Unif. State Laws & Am. Law Inst., NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not Be Part of UCC (visited Apr. 16, 1999) 〈http://www.ali.org/ali/pr040799.htm〉.
-
(1998)
Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208
-
-
-
156
-
-
0346482525
-
-
visited Apr. 16
-
See National Conference of Comm'rs on Unif. State Laws, Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208 ("Mass-Market Licenses") (visited Apr. 11, 1999) 〈http://www.law.uh.edu/ucc2b/ 080198/080198.html〉 (Aug. 1, 1998 draft) [hereinafter Uniform Computer Act]. The former Article 2B for Licenses, when finalized, will no longer supplement the UCC with provision for electronic contracts and software licensing agreements, but instead will be promulgated as the Uniform Computer Information Transactions Act. See National Conference of Comm'rs on Unif. State Laws & Am. Law Inst., NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not Be Part of UCC (visited Apr. 16, 1999) 〈http://www.ali.org/ali/pr040799.htm〉.
-
(1999)
NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not be Part of UCC
-
-
-
157
-
-
0345851594
-
-
See Uniform Computer Act, supra note 129, § 2B-208
-
See Uniform Computer Act, supra note 129, § 2B-208.
-
-
-
-
158
-
-
0346482681
-
-
See Madison, supra note 16, at 1029-31; McManis, Privatization, supra note 101, at 173
-
See Madison, supra note 16, at 1029-31; McManis, Privatization, supra note 101, at 173.
-
-
-
-
159
-
-
0345851595
-
-
See Tom W. Bell, Fair Use v. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine, 76 N.C. L. Rev. 557, 616-17 (1998) (arguing that a system of private contract and "fared use" may offer greater access to proprietary works)
-
See Tom W. Bell, Fair Use v. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine, 76 N.C. L. Rev. 557, 616-17 (1998) (arguing that a system of private contract and "fared use" may offer greater access to proprietary works).
-
-
-
-
160
-
-
0347112706
-
-
See Madison, supra note 16, at 1031-32
-
See Madison, supra note 16, at 1031-32.
-
-
-
-
161
-
-
0346727439
-
Beyond Preemption: The Law and Policy of Intellectual Property Licensing
-
hereinafter Lemley, Beyond Preemption
-
See Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property Licensing, 87 Cal. L. Rev. 111, 148 (1999) [hereinafter Lemley, Beyond Preemption].
-
(1999)
Cal. L. Rev. 111
, vol.87
, pp. 148
-
-
Lemley, M.A.1
-
162
-
-
0346482536
-
-
See supra notes 97-107 and accompanying text
-
See supra notes 97-107 and accompanying text.
-
-
-
-
163
-
-
0347743171
-
-
See Lemley & O'Brien, supra note 71, at 276
-
See Lemley & O'Brien, supra note 71, at 276.
-
-
-
-
164
-
-
20944437114
-
Legal Hybrids between the Patent and Copyright Paradigms
-
See J.H. Reichman, Legal Hybrids Between the Patent and Copyright Paradigms, 94 Colum. L. Rev. 2432, 2436-42 (1994).
-
(1994)
Colum. L. Rev. 2432
, vol.94
, pp. 2436-2442
-
-
Reichman, J.H.1
-
165
-
-
0345851596
-
-
Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974)
-
Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974).
-
-
-
-
166
-
-
0347743172
-
-
See Johnson-Laird, supra note 53, at 843
-
See Johnson-Laird, supra note 53, at 843.
-
-
-
-
167
-
-
0346482521
-
-
For a detailed technical discussion regarding the complexities of reverse engineering, see id.
-
For a detailed technical discussion regarding the complexities of reverse engineering, see id.
-
-
-
-
168
-
-
0043001502
-
Intellectual Property Protection and Reverse Engineering of Computer Programs in the United States and the European Community
-
hereinafter McManis, Intellectual Property
-
Reverse engineering is necessary for users and developers who desire to examine the structure and technical parameters of a computer program because object code is not intelligible to humans. See Charles R. McManis, Intellectual Property Protection and Reverse Engineering of Computer Programs in the United States and the European Community, 8 High Tech. L.J. 25, 29 (1993) [hereinafter McManis, Intellectual Property].
-
(1993)
High Tech. L.J. 25
, vol.8
, pp. 29
-
-
McManis, C.R.1
-
169
-
-
0347112686
-
Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation
-
PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370
-
See G. Gervaise Davis III, Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation, in 15th Annual Computer Law Institute 115, 142-45 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370, 1993). Reverse engineering for educational purposes likely is a "fair use" under 17 U.S.C. § 107. See id. at 142-43. Indeed, program source code is a valuable tool used to teach computer programming. See Clayton Walnum, Windows 98 Programming Secrets (1998) (enclosing on compact disk the source code for all programs in tutorial book).
-
(1993)
15th Annual Computer Law Institute 115
, pp. 142-145
-
-
Davis G.G. III1
-
170
-
-
0345851608
-
-
id. at 142-43
-
See G. Gervaise Davis III, Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation, in 15th Annual Computer Law Institute 115, 142-45 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370, 1993). Reverse engineering for educational purposes likely is a "fair use" under 17 U.S.C. § 107. See id. at 142-43. Indeed, program source code is a valuable tool used to teach computer programming. See Clayton Walnum, Windows 98 Programming Secrets (1998) (enclosing on compact disk the source code for all programs in tutorial book).
-
-
-
-
171
-
-
0347112710
-
-
See McManis, Intellectual Property, supra note 141, at 29-30
-
See McManis, Intellectual Property, supra note 141, at 29-30.
-
-
-
-
172
-
-
0347112705
-
-
See id. at 30-31
-
See id. at 30-31.
-
-
-
-
173
-
-
0347743151
-
-
See id. at 31
-
See id. at 31.
-
-
-
-
174
-
-
0347112667
-
Copyright Protection of Computer Program Structure
-
hereinafter Karjala, Program Structure
-
Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
-
(1998)
Brook. L. Rev. 519
, vol.64
, pp. 532-533
-
-
Karjala, D.S.1
-
175
-
-
0003732343
-
-
Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
-
(1988)
Law and Economics
, pp. 108-112
-
-
Cooter, R.1
Ulen, T.2
-
176
-
-
0345851620
-
-
See id.
-
Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
-
-
-
-
177
-
-
0345851613
-
-
see also Samuelson et al., supra note 16, at 2337-41
-
Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
-
-
-
-
178
-
-
0345851607
-
-
See Madison, supra note 16, at 1097 (questioning how to conceive of the public domain in a fashion that allows private restrictions on access to a socially acceptable degree)
-
See Madison, supra note 16, at 1097 (questioning how to conceive of the public domain in a fashion that allows private restrictions on access to a socially acceptable degree).
-
-
-
-
179
-
-
0345851619
-
-
See infra Part II.B.1-2
-
See infra Part II.B.1-2.
-
-
-
-
180
-
-
0347112720
-
-
See infra Part II.B.3
-
See infra Part II.B.3.
-
-
-
-
181
-
-
0346482682
-
-
See infra Part II.B.4
-
See infra Part II.B.4.
-
-
-
-
182
-
-
0347112719
-
Digital Information as Property & Product: U.C.C. Article 2B
-
See David A. Rice, Digital Information as Property & Product: U.C.C. Article 2B, 22 U. Dayton L. Rev. 621, 636-38 (1997) (arguing that object code must be reverse engineered in order to free up the unprotected ideas embedded therein).
-
(1997)
U. Dayton L. Rev. 621
, vol.22
, pp. 636-638
-
-
Rice, D.A.1
-
183
-
-
0345851616
-
-
note
-
For the statutory foundation of the fair use doctrine, see 17 U.S.C. § 107 (1994). The statute requires a consideration of four factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. Id.
-
-
-
-
184
-
-
0347358097
-
Legal Implications of Network Economic Effects
-
hereinafter Lemley & McGowan, Legal Implications
-
See Mark A. Lemley & David McGowan, Legal Implications of Network Economic Effects, 86 Calif. L. Rev. 479, 524-25 (1998) [hereinafter Lemley & McGowan, Legal Implications].
-
(1998)
Calif. L. Rev. 479
, vol.86
, pp. 524-525
-
-
Lemley, M.A.1
McGowan, D.2
-
185
-
-
0345851615
-
-
note
-
See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1253 (3d Cir. 1983); Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp. 449, 460 (N.D. Ga. 1987).
-
-
-
-
186
-
-
0346482553
-
-
note
-
See Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1539 n.18 (11th Cir. 1996) (holding that reverse engineering a computer program to reveal the unprotectable ideas embedded in the object code is a fair use); Atari Games Corp. v. Nintendo of Am. Inc., 975 F.2d 832, 843 (Fed. Cir. 1992) (same); DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 364 (E.D. Va. 1997) (same).
-
-
-
-
187
-
-
0346482554
-
-
977 F.2d 1510 (9th Cir. 1992)
-
977 F.2d 1510 (9th Cir. 1992).
-
-
-
-
188
-
-
0345851623
-
-
See id. at 1514-15
-
See id. at 1514-15.
-
-
-
-
189
-
-
0345851622
-
-
See id. at 1514-16
-
See id. at 1514-16.
-
-
-
-
190
-
-
0345851625
-
-
See id. at 1516
-
See id. at 1516.
-
-
-
-
191
-
-
0345851752
-
-
See Sega Enters. Ltd. v. Accolade, Inc., 785 F. Supp. 1392, 1396-99 (N.D. Cal.), aff'd in part, rev'd in part, 977 F.2d 1510 (9th Cir. 1992)
-
See Sega Enters. Ltd. v. Accolade, Inc., 785 F. Supp. 1392, 1396-99 (N.D. Cal.), aff'd in part, rev'd in part, 977 F.2d 1510 (9th Cir. 1992).
-
-
-
-
192
-
-
0347743191
-
-
See Sega, 977 F.2d at 1527
-
See Sega, 977 F.2d at 1527.
-
-
-
-
193
-
-
0345851614
-
-
See id. at 1522-23
-
See id. at 1522-23.
-
-
-
-
194
-
-
0347112726
-
-
See supra note 155 and accompanying text
-
See supra note 155 and accompanying text.
-
-
-
-
195
-
-
0345851612
-
-
See Lemley & McGowan, Legal Implications, supra note 153, at 525
-
See Lemley & McGowan, Legal Implications, supra note 153, at 525.
-
-
-
-
196
-
-
0346482560
-
-
See id. at 524
-
See id. at 524.
-
-
-
-
197
-
-
0345851621
-
-
See 35 U.S.C. § 271(a) (1994)
-
See 35 U.S.C. § 271(a) (1994).
-
-
-
-
198
-
-
0345851626
-
-
See id. § 112
-
See id. § 112.
-
-
-
-
199
-
-
0347112723
-
-
See id.
-
See id.
-
-
-
-
200
-
-
0347112610
-
-
See Slimfold Mfg. Co. v. Kinkead Indus., Inc., 932 F.2d 1453, 1457 (Fed. Cir. 1991)
-
See Slimfold Mfg. Co. v. Kinkead Indus., Inc., 932 F.2d 1453, 1457 (Fed. Cir. 1991).
-
-
-
-
201
-
-
0347112727
-
-
See Lemley & O'Brien, supra note 71, at 295 n.259
-
See Lemley & O'Brien, supra note 71, at 295 n.259.
-
-
-
-
202
-
-
0346482562
-
-
See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997)
-
See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997); Lawrence D. Graham & Richard O. Zerbe, Jr., Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure, 22 Rutgers Computer & Tech. L.J. 61, 96-97 (1996).
-
-
-
-
203
-
-
0347743185
-
Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure
-
See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997); Lawrence D. Graham & Richard O. Zerbe, Jr., Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure, 22 Rutgers Computer & Tech. L.J. 61, 96-97 (1996).
-
(1996)
Rutgers Computer & Tech. L.J. 61
, vol.22
, pp. 96-97
-
-
Graham, L.D.1
Zerbe R.O., Jr.2
-
204
-
-
0347112732
-
-
See Lemley & McGowan, Legal Implications, supra note 153, at 524 n.195
-
See Lemley & McGowan, Legal Implications, supra note 153, at 524 n.195.
-
-
-
-
205
-
-
0347743183
-
-
See Graham & Zerbe, supra note 171, at 99
-
See Graham & Zerbe, supra note 171, at 99.
-
-
-
-
206
-
-
0347112671
-
-
See 35 U.S.C. § 271(a) (1994)
-
See 35 U.S.C. § 271(a) (1994).
-
-
-
-
207
-
-
0346482566
-
-
note
-
See, e.g., Cataphote Corp. v. Hudson, 422 F.2d 1290, 1293 (5th Cir. 1970) (holding that it is not a misappropriation to discover a trade secret by reverse engineering); Restatement (Third) of Unfair Competition § 43 (1995) ("Independent discovery and analysis of publicly available products or information are not improper means of acquisition.").
-
-
-
-
208
-
-
0347652677
-
Fencing Cyberspace: Drawing Borders in a Virtual World
-
hereinafter O'Rourke, Fencing Cyberspace
-
See Maureen A. O'Rourke, Fencing Cyberspace: Drawing Borders in a Virtual World, 82 Minn. L. Rev. 609, 612-13 (1998) [hereinafter O'Rourke, Fencing Cyberspace].
-
(1998)
Minn. L. Rev. 609
, vol.82
, pp. 612-613
-
-
O'Rourke, M.A.1
-
209
-
-
0346482563
-
-
note
-
See Madison, supra note 16, at 1130. If reverse engineering is forbidden by contract, software developers may be granted de facto monopolies over ideas, processes, and systems that have not met the standards for copyright or patent protection. See DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 364 (E.D. Va. 1997); Samuelson et al., supra note 16, at 2390 n.329.
-
-
-
-
210
-
-
0347112734
-
-
See supra Part II.B.1
-
See supra Part II.B.1.
-
-
-
-
211
-
-
0346482575
-
-
See supra Part II.B.1-3
-
See supra Part II.B.1-3.
-
-
-
-
212
-
-
0346482574
-
-
See McManis, Privatization, supra note 101, at 176
-
See McManis, Privatization, supra note 101, at 176.
-
-
-
-
213
-
-
0346482572
-
-
See Madison, supra note 16, at 1137-38
-
See Madison, supra note 16, at 1137-38.
-
-
-
-
214
-
-
0005452186
-
Copyright and the Jurisprudence of Self-Help
-
hereinafter Cohen, Self-Help
-
See Julie E. Cohen, Copyright and the Jurisprudence of Self-Help, 13 Berkeley Tech. L.J. 1089, 1130-31 (1998) [hereinafter Cohen, Self-Help].
-
(1998)
Berkeley Tech. L.J. 1089
, vol.13
, pp. 1130-1131
-
-
Cohen, J.E.1
-
215
-
-
0039645921
-
Copyright Preemption after the ProCD Case: A Market-Based Approach
-
hereinafter O'Rourke, Copyright Preemption.
-
See Maureen A. O'Rourke, Copyright Preemption After the ProCD Case: A Market-Based Approach, 12 Berkeley Tech. L.J. 53, 80 (1997) [hereinafter O'Rourke, Copyright Preemption].
-
(1997)
Berkeley Tech. L.J. 53
, vol.12
, pp. 80
-
-
O'Rourke, M.A.1
-
216
-
-
0347112733
-
-
See supra notes 128-30 and accompanying text
-
See supra notes 128-30 and accompanying text.
-
-
-
-
217
-
-
0346482571
-
-
No. C-97-20367-JF, 1998 WL 740798 (N.D. Cal. June 9, 1998)
-
No. C-97-20367-JF, 1998 WL 740798 (N.D. Cal. June 9, 1998).
-
-
-
-
218
-
-
0347112736
-
-
See id. at *4-*5
-
See id. at *4-*5.
-
-
-
-
219
-
-
0345851751
-
-
note
-
The Supremacy Clause provides, in pertinent part, that the "Constitution, and the Laws of the United States which shall be made in Pursuance thereof . . . shall be the supreme Law of the Land." U.S. Const, art. VI, § 2.
-
-
-
-
220
-
-
0347112866
-
-
See H.R. Rep. No. 94-1476, at 131 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5747
-
See H.R. Rep. No. 94-1476, at 131 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5747.
-
-
-
-
221
-
-
0347112738
-
-
See Cohen, Self-Help, supra note 182, at 1130
-
Indeed, Congress, when enacting § 301, did not consider the possibility of intervening state contractual rights that would permit the displacement of copyright. See Cohen, Self-Help, supra note 182, at 1130. Additionally, the ProCD court may have failed to consider preemption under the Supremacy Clause. See D.C. Toedt III, COUNTERPOINT: Shrinkwrap License Enforceability Issues, Computer Law., Sept. 1996, at 7, 8-9.
-
-
-
-
222
-
-
0345851633
-
COUNTERPOINT: Shrinkwrap License Enforceability Issues
-
Sept.
-
Indeed, Congress, when enacting § 301, did not consider the possibility of intervening state contractual rights that would permit the displacement of copyright. See Cohen, Self-Help, supra note 182, at 1130. Additionally, the ProCD court may have failed to consider preemption under the Supremacy Clause. See D.C. Toedt III, COUNTERPOINT: Shrinkwrap License Enforceability Issues, Computer Law., Sept. 1996, at 7, 8-9.
-
(1996)
Computer Law
, pp. 7
-
-
Toedt D.C. III1
-
223
-
-
0347112737
-
-
See California Fed. Sav. & Loan Ass'n v. Guerra, 479 U.S. 272, 280-81 (1987)
-
See California Fed. Sav. & Loan Ass'n v. Guerra, 479 U.S. 272, 280-81 (1987).
-
-
-
-
224
-
-
0347112739
-
-
See id.
-
See id.
-
-
-
-
225
-
-
0347112740
-
-
See id. at 281
-
See id. at 281.
-
-
-
-
226
-
-
0346482576
-
-
See Cohen, Self-Help, supra note 182, at 1130-31
-
See Cohen, Self-Help, supra note 182, at 1130-31.
-
-
-
-
227
-
-
0347112742
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
228
-
-
0346482577
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
229
-
-
0347112875
-
-
note
-
ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1455 (7th Cir. 1996) (citation omitted). But see McManis, Privatization, supra note 101, at 182-84 (contending that such provisions should be preempted). The court presumably would analogize prohibitions against reverse engineering to encryption devices, which similarly hinder comprehension of a program's source code.
-
-
-
-
230
-
-
0345851627
-
-
See Lemley, Beyond Preemption, supra note 134, at 144-51
-
See Lemley, Beyond Preemption, supra note 134, at 144-51.
-
-
-
-
231
-
-
0346482578
-
-
See id. at 145
-
See id. at 145.
-
-
-
-
232
-
-
0347108276
-
-
Id.
-
Id.; see also Apik Minassian, Comment, The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements, 45 UCLA L. Rev. 569, 601-07 (1997) (urging a more nuanced approach to preemption under § 301).
-
-
-
-
233
-
-
0347108276
-
The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements
-
Comment, (urging a more nuanced approach to preemption under § 301)
-
Id.; see also Apik Minassian, Comment, The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements, 45 UCLA L. Rev. 569, 601-07 (1997) (urging a more nuanced approach to preemption under § 301).
-
(1997)
UCLA L. Rev. 569
, vol.45
, pp. 601-607
-
-
Minassian, A.1
-
234
-
-
0347112741
-
-
See Lemley, Beyond Preemption, supra note 134, at 146
-
See Lemley, Beyond Preemption, supra note 134, at 146.
-
-
-
-
235
-
-
0347743234
-
-
See id.
-
See id.
-
-
-
-
236
-
-
0347112786
-
-
25 F. Supp. 2d 1218 (D. Utah 1997)
-
25 F. Supp. 2d 1218 (D. Utah 1997).
-
-
-
-
237
-
-
0346482569
-
-
See id. at 1222
-
See id. at 1222.
-
-
-
-
238
-
-
0345851666
-
-
See id.
-
See id.
-
-
-
-
239
-
-
0346482618
-
-
See id.
-
See id.
-
-
-
-
240
-
-
0345851749
-
-
See id. at 1229
-
See id. at 1229.
-
-
-
-
241
-
-
0347743240
-
-
note
-
See id. The "first sale" doctrine provides that "the owner of a particular copy . . . lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy . . . ." 17 U.S.C. § 109(a) (1994).
-
-
-
-
242
-
-
0345851635
-
-
See Novell, 25 F. Supp. 2d at 1230
-
See Novell, 25 F. Supp. 2d at 1230.
-
-
-
-
243
-
-
0346482617
-
-
See id.
-
See id.
-
-
-
-
244
-
-
0346482573
-
-
See supra notes 128-29 and accompanying text
-
See supra notes 128-29 and accompanying text.
-
-
-
-
245
-
-
0038894321
-
Breaking Barriers: The Relation between Contract and Intellectual Property Law
-
hereinafter Nimmer, Breaking Barriers
-
See Raymond T. Nimmer, Breaking Barriers: The Relation Between Contract and Intellectual Property Law, 13 Berkeley Tech. L.J. 827, 883 (1998) [hereinafter Nimmer, Breaking Barriers].
-
(1998)
Berkeley Tech. L.J. 827
, vol.13
, pp. 883
-
-
Nimmer, R.T.1
-
246
-
-
0346482613
-
-
See id. at 831 The claim that first sale rights control is . . . a matter of turning the relationship between contract and copyright on its head
-
See id. at 831 ("The claim that first sale rights control is . . . a matter of turning the relationship between contract and copyright on its head.").
-
-
-
-
247
-
-
0346482611
-
-
See id. at 870-71
-
The misuse doctrine gives courts a means by which to prevent over-reaching to achieve anti-competitive ends. See id. at 870-71.
-
-
-
-
248
-
-
0347743239
-
-
See Lasercomb Am., Inc. v. Reynolds, 911 F.2d 970, 977 (4th Cir. 1990)
-
See Lasercomb Am., Inc. v. Reynolds, 911 F.2d 970, 977 (4th Cir. 1990).
-
-
-
-
249
-
-
0346482612
-
-
See Morton Salt Co. v. G.S. Suppiger Co., 314 U.S. 488, 491-92 (1942)
-
See Morton Salt Co. v. G.S. Suppiger Co., 314 U.S. 488, 491-92 (1942).
-
-
-
-
250
-
-
0347112787
-
-
911 F.2d 970 (4th Cir. 1990)
-
911 F.2d 970 (4th Cir. 1990).
-
-
-
-
251
-
-
0347112797
-
-
See id. at 971
-
See id. at 971.
-
-
-
-
252
-
-
0345851677
-
-
See id.
-
See id.
-
-
-
-
253
-
-
0345851672
-
-
See id. at 972
-
See id. at 972.
-
-
-
-
254
-
-
0347743235
-
-
See Lasercomb Am., Inc. v. Holiday Steel Rule Die Corp., 656 F. Supp. 612, 616 (M.D.N.C. 1987) rev'd, 911 F.2d 970 (1990)
-
See Lasercomb Am., Inc. v. Holiday Steel Rule Die Corp., 656 F. Supp. 612, 616 (M.D.N.C. 1987) rev'd, 911 F.2d 970 (1990).
-
-
-
-
255
-
-
0345851679
-
-
See Lasercomb, 911 F.2d at 978
-
See Lasercomb, 911 F.2d at 978.
-
-
-
-
256
-
-
0347743244
-
-
Id. (footnote omitted)
-
Id. (footnote omitted).
-
-
-
-
257
-
-
0346482619
-
-
See id. at 977
-
See id. at 977.
-
-
-
-
258
-
-
0347743241
-
-
See id. at 978
-
See id. at 978.
-
-
-
-
259
-
-
0347743245
-
-
note
-
See P.C. Films Corp. v. MGM/UA Home Video, Inc., 138 F.3d 453, 457-58 (2d Cir.) (holding that a "perpetual" license is enforceable, at least for the term of the copyright), cert. denied, 119 S. Ct. 542 (1998). Moreover, section 2B-308 ("Duration of Contract") provides a default rule of a perpetual license in certain instances. See Uniform Computer Act, supra note 129, § 2B-308(2)(b).
-
-
-
-
260
-
-
0345851678
-
-
See Cohen, Electronic Vigilantism, supra note 82, at 1194-98
-
See Cohen, Electronic Vigilantism, supra note 82, at 1194-98.
-
-
-
-
261
-
-
0002705641
-
Overstepping the Bounds: Copyright Misuse
-
Nov.
-
See William E. Thomson, Jr. & Margaret Y. Chu, Overstepping the Bounds: Copyright Misuse, Computer Law., Nov. 1998, at 1, 5.
-
(1998)
Computer Law
, pp. 1
-
-
Thomson W.E., Jr.1
Chu, M.Y.2
-
262
-
-
0347743253
-
-
See id.
-
See id.
-
-
-
-
263
-
-
0345851703
-
-
See id.
-
See id.
-
-
-
-
264
-
-
0345851702
-
-
See Madison, supra note 16, at 1116 n.382
-
See Madison, supra note 16, at 1116 n.382.
-
-
-
-
265
-
-
0345851705
-
-
note
-
Cf. id. at 1139 (advocating an express delegation of authority from Congress to federal courts in order to preserve the public domain). Allowing a court to strike contractual provisions based on its view of what proper policy should be, however, arguably undermines societal benefits produced by the commercialization of information. See Nimmer, Breaking Barriers, supra note 211, at 872.
-
-
-
-
266
-
-
0347112813
-
-
See supra note 49 and accompanying text
-
See supra note 49 and accompanying text.
-
-
-
-
267
-
-
0345851745
-
-
See Haynes, supra note 49, at 254
-
See Haynes, supra note 49, at 254.
-
-
-
-
268
-
-
0347743323
-
-
note
-
Most courts refuse to recognize an independent good faith cause of action under Article 2 of the UCC. See Steven H. Hilfinger, Note, K.M.C. Co. v. Irving Trust Co.: Discretionary Financing and the Implied Duty of Good Faith, 81 Nw. U. L. Rev. 539, 550 (1987).
-
-
-
-
269
-
-
0346762517
-
A New Look at Trade Secret Law: Doctrine in Search of Justification
-
See Robert G. Bone, A New Look at Trade Secret Law: Doctrine in Search of Justification, 86 Cal. L. Rev. 241, 296 (1998).
-
(1998)
Cal. L. Rev. 241
, vol.86
, pp. 296
-
-
Bone, R.G.1
-
270
-
-
0347112816
-
-
note
-
The common theme that joins the approaches previously discussed is that prohibitions against reverse engineering represent an improper extension of intellectual property rights. See Nimmer, Breaking Barriers, supra note 211, at 867. Whether prohibitions against reverse engineering improperly extend, or merely buttress, preexisting intellectual property rights hinges upon diametrically opposed constructions of the intellectual property laws. See infra notes 237-41 and accompanying text.
-
-
-
-
271
-
-
0347112788
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
272
-
-
0347112818
-
-
See supra note 146
-
See supra note 146.
-
-
-
-
273
-
-
0345851706
-
-
See Madison, supra note 16, at 1124
-
See Madison, supra note 16, at 1124.
-
-
-
-
274
-
-
0347743275
-
-
See O'Rourke, Copyright Preemption, supra note 183, at 78
-
See O'Rourke, Copyright Preemption, supra note 183, at 78.
-
-
-
-
275
-
-
0345851710
-
-
See id.
-
See id.
-
-
-
-
276
-
-
0347743277
-
-
See id.
-
See id.
-
-
-
-
277
-
-
0346482641
-
-
See Madison, supra note 16, at 1124; O'Rourke, Copyright Preemption, supra note 183, at 81
-
See Madison, supra note 16, at 1124; O'Rourke, Copyright Preemption, supra note 183, at 81.
-
-
-
-
278
-
-
0346482640
-
-
See supra note 146
-
See supra note 146.
-
-
-
-
279
-
-
0346482635
-
-
See Clapes, supra note 15, at 961
-
See Clapes, supra note 15, at 961.
-
-
-
-
280
-
-
0347743321
-
-
See Kathryn D. Piele, Three Years After Campbell v. Acuff-Rose Music, Inc.: What Is Fair Game for Parodists?, 18 Loy. L.A. Ent. L.J. 75, 99 (1997)
-
See Kathryn D. Piele, Three Years After Campbell v. Acuff-Rose Music, Inc.: What Is Fair Game for Parodists?, 18 Loy. L.A. Ent. L.J. 75, 99 (1997).
-
-
-
-
281
-
-
0347743276
-
-
See Clapes, supra note 15, at 947-48
-
See Clapes, supra note 15, at 947-48.
-
-
-
-
282
-
-
0345851742
-
-
See id. at 947
-
See id. at 947.
-
-
-
-
283
-
-
0347743270
-
-
See id. at 962
-
See id. at 962.
-
-
-
-
284
-
-
0347112814
-
-
See id. at 963; Miller, supra note 15, at 1026-27
-
See id. at 963; Miller, supra note 15, at 1026-27.
-
-
-
-
285
-
-
0346482610
-
-
See Miller, supra note 15, at 1031
-
See Miller, supra note 15, at 1031.
-
-
-
-
286
-
-
0346482639
-
Open-Source Software Takes Surprise Leap in Popularity
-
Feb. 9
-
See, e.g., Amy Harmon, Open-Source Software Takes Surprise Leap in Popularity, San Diego Union-Trib., Feb. 9, 1999, at 3 (stating that open source software was one of the year's most striking developments); Mark Leibovich, The Spreading Grass- Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software, Wash. Post, Dec. 3, 1998, at A1 (noting that open source software has recently "forged dramatic mainstream inroads").
-
(1999)
San Diego Union-Trib.
, pp. 3
-
-
Harmon, A.1
-
287
-
-
24244463737
-
The Spreading Grass-Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software
-
Dec. 3
-
See, e.g., Amy Harmon, Open-Source Software Takes Surprise Leap in Popularity, San Diego Union-Trib., Feb. 9, 1999, at 3 (stating that open source software was one of the year's most striking developments); Mark Leibovich, The Spreading Grass-Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software, Wash. Post, Dec. 3, 1998, at A1 (noting that open source software has recently "forged dramatic mainstream inroads").
-
(1998)
Wash. Post
-
-
Leibovich, M.1
-
288
-
-
0345851709
-
If You Love Your Online Business Set Your Code Free
-
Jan.
-
See Harvey Blume, If You Love Your Online Business Set Your Code Free, New Media, Jan. 1999, at 26, 26.
-
(1999)
New Media
, pp. 26
-
-
Blume, H.1
-
289
-
-
0347743316
-
A Reality Check on "Open Source"
-
Feb. 8
-
See Kevin Tolly, A Reality Check on "Open Source", Network World, Feb. 8, 1999, at 22, 22.
-
(1999)
Network World
, pp. 22
-
-
Tolly, K.1
-
290
-
-
0346482642
-
-
Mar. 15
-
See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
-
(1999)
Apple's Open-Source Movement
-
-
Kahney, L.1
Sprenger, P.2
-
291
-
-
0345851746
-
-
Jan. 28
-
See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
-
(1999)
Jini: Start of "Semi-Open" Source Movement
-
-
Maclachlan, M.1
-
292
-
-
84924008465
-
Robust Open-Source Software
-
Feb.
-
See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
-
(1998)
Comm. of the ACM
, pp. 128
-
-
Neumann, P.G.1
-
293
-
-
0346482512
-
-
Feb. 12
-
See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
-
(1999)
Should Java Go Open Source?
-
-
Gage, D.1
-
294
-
-
0345851743
-
-
See Blume, supra note 253, at 29
-
See Blume, supra note 253, at 29.
-
-
-
-
295
-
-
0343984463
-
Programs to the People
-
Jan.-Feb.
-
See Charles C. Mann, Programs to the People, Tech. Rev., Jan.-Feb. 1999, at 36, 41.
-
(1999)
Tech. Rev.
, pp. 36
-
-
Mann, C.C.1
-
297
-
-
0346482673
-
-
See Blume, supra note 253, at 29
-
See Blume, supra note 253, at 29.
-
-
-
-
298
-
-
0347743278
-
-
note
-
See Haldiman, supra note 86, at 654. Object-orientated programming will make portions of computer code easily reusable. See id. at 653. Additionally, automated rights management technologies will provide manufacturers with the ability to police the use of their code, and allow users to make provision with the proprietary right holder for the use of that code so that they are not considered infringers. See Bell, supra note 132, at 564-67.
-
-
-
-
299
-
-
0040900932
-
For the Love of Hacking
-
Aug. 10
-
See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
-
(1998)
Forbes
, pp. 94
-
-
McHugh, J.1
-
300
-
-
0347112862
-
-
Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software)
-
See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
-
-
-
-
301
-
-
0346482674
-
-
Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry)
-
See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
-
-
-
-
302
-
-
24244472119
-
Apple Adopts "Open Source" Code Strategy
-
Mar. 17
-
See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
-
(1999)
N.Y. Times
-
-
Markoff, J.1
-
304
-
-
0347112812
-
-
See McHugh, supra note 261, at 100
-
See McHugh, supra note 261, at 100.
-
-
-
-
305
-
-
0347112817
-
-
See supra note 256 and accompanying text
-
See supra note 256 and accompanying text.
-
-
-
-
306
-
-
0347743273
-
-
See Lemley & McGowan, Legal Implications, supra note 153, at 523-30
-
See Lemley & McGowan, Legal Implications, supra note 153, at 523-30.
-
-
-
-
307
-
-
84864965037
-
Copyright Misuse and Tying: Will Courts Stop Misusing Misuse?
-
See Troy Paredes, Copyright Misuse and Tying: Will Courts Stop Misusing Misuse?, 9 High Tech. L.J. 271, 309-15 (1994).
-
(1994)
High Tech. L.J. 271
, vol.9
, pp. 309-315
-
-
Paredes, T.1
-
308
-
-
0346482622
-
-
See Karjala, Program Structure, supra note 146, at 535
-
See Karjala, Program Structure, supra note 146, at 535.
-
-
-
-
309
-
-
0346482637
-
-
See id.
-
See id.
-
-
-
-
310
-
-
0346482632
-
-
July 2
-
See Craig Menefee, PC Briefs (July 2, 1998) 〈http://www.newsbytes.com/news/ 98/114070.html〉 Godfrey Nolan, Java: Easy Target for Illegal Re-Engineers (Mar. 3, 1997) 〈http://www.computerwire.com/cbr/1997/2206_29a.htm〉.
-
(1998)
PC Briefs
-
-
Menefee, C.1
-
311
-
-
0347743243
-
-
Mar. 3
-
See Craig Menefee, PC Briefs (July 2, 1998) 〈http://www.newsbytes.com/news/ 98/114070.html〉 Godfrey Nolan, Java: Easy Target for Illegal Re-Engineers (Mar. 3, 1997) 〈http://www.computerwire.com/cbr/1997/2206_29a.htm〉.
-
(1997)
Java: Easy Target for Illegal Re-Engineers
-
-
Nolan, G.1
-
312
-
-
0347743252
-
-
See Lemley & McGowan, Competitive Proprietary, supra note 13, at 485
-
See Lemley & McGowan, Competitive Proprietary, supra note 13, at 485.
-
-
-
-
313
-
-
0345851634
-
-
See Nolan, supra note 269
-
See Nolan, supra note 269.
-
-
-
-
314
-
-
0347112796
-
-
note
-
Moreover, U.S. policy regarding the legality of reverse engineering computer programs is ambiguous. When Japan considered expressly incorporating a reverse engineering exception into its copyright laws, the United States vigorously opposed the proposal, fearing that the exception would allow American software to be unduly appropriated by Japanese firms. See Graham & Zerbe, supra note 171, at 69. Further, while certain federal intellectual property statutes expressly recognize a right to reverse engineer, the copyright and patent statutes contain no similar exception. In the Semiconductor Chip Protection Act of 1984, see Pub. L. No. 98-620, tit. III, 98 Stat. 3347 (codified at 17 U.S.C. §§ 901-914 (1994)), Congress expressly recognized the right to reverse engineer. See 17 U.S.C. § 906(a); see also Brooktree Corp. v. Advanced Micro Devices, Inc., 977 F.2d 1555, 1565-67 (Fed. Cir. 1992) (discussing the Act). Thus, the negative implication arising from the absence of specific allowance for reverse engineering under the copyright and patent statutes is that such a right was never intended by Congress, but was read into the law by courts addressing particularized market conditions. Evidence that supports this argument is that recently proposed legislation, if enacted, may have the impact of making reverse engineering a federal felony. See Mills, supra note 68, at 127-28. Additionally, the recently enacted Digital Millennium Copyright Act prohibits circumvention of "technological measures" that control access to copyrighted works. See Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998). Query whether compiling source code into object code is a technological measure that controls access to a copyrighted program. If it is, one may argue that reverse engineering circumvents this process, and is, therefore, prohibited by the Act.
-
-
-
-
315
-
-
0345851670
-
-
See supra notes 177-80 and accompanying text
-
See supra notes 177-80 and accompanying text.
-
-
-
-
316
-
-
0347112791
-
-
See Cohen, Self-Help, supra note 182, at 1090
-
See Cohen, Self-Help, supra note 182, at 1090.
-
-
-
-
317
-
-
0345851671
-
-
See supra note 255 and accompanying text
-
See supra note 255 and accompanying text.
-
-
-
-
318
-
-
0347112799
-
-
See supra notes 97-107 and accompanying text
-
See supra notes 97-107 and accompanying text.
-
-
-
-
319
-
-
0347112802
-
-
See supra Part I.A-B
-
See supra Part I.A-B.
-
-
-
-
320
-
-
0346482623
-
-
See supra Part I.C-D
-
See supra Part I.C-D.
-
-
-
-
321
-
-
0347112801
-
-
See supra note 225. As a practical matter, however, the software is likely to be obsolete long before the expiration of the license
-
See supra note 225. As a practical matter, however, the software is likely to be obsolete long before the expiration of the license.
-
-
-
-
322
-
-
0346482636
-
-
See supra notes 131-33 and accompanying text
-
See supra notes 131-33 and accompanying text.
-
-
-
-
323
-
-
0347112815
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
325
-
-
0347743258
-
-
note
-
See Lemley, Beyond Preemption, supra note 134, at 125; see also Lemley & McGowan, Legal Implications, supra note 153, at 526 ("[I]t does not make economic sense to give complete control over information to owners of intellectual property.").
-
-
-
-
326
-
-
0347112803
-
-
See Lemley, Beyond Preemption, supra note 134, at 124
-
See Lemley, Beyond Preemption, supra note 134, at 124.
-
-
-
-
327
-
-
0346482625
-
-
Id. at 125
-
Id. at 125.
-
-
-
-
328
-
-
0347743260
-
-
See supra notes 142-44 and accompanying text
-
See supra notes 142-44 and accompanying text.
-
-
-
-
329
-
-
0347112807
-
-
See supra notes 145-46 and accompanying text
-
See supra notes 145-46 and accompanying text.
-
-
-
-
330
-
-
0345851689
-
-
See supra notes 145-46 and accompanying text
-
See supra notes 145-46 and accompanying text.
-
-
-
-
331
-
-
84935444559
-
Tailoring Legal Protection for Computer Software
-
Samuelson et al., supra note 16, at 2414-15
-
See Peter S. Menell, Tailoring Legal Protection for Computer Software, 39 Stan. L. Rev. 1329, 1371 (1987); Samuelson et al., supra note 16, at 2414-15.
-
(1987)
Stan. L. Rev. 1329
, vol.39
, pp. 1371
-
-
Menell, P.S.1
-
332
-
-
0347743259
-
-
See Samuelson et al., supra note 16, at 2414
-
See Samuelson et al., supra note 16, at 2414.
-
-
-
-
333
-
-
0347743261
-
-
See id. at 2392-93 ("[A] complete ban [on reverse engineering] is contrary to basic norms of competition law.")
-
See id. at 2392-93 ("[A] complete ban [on reverse engineering] is contrary to basic norms of competition law.").
-
-
-
-
334
-
-
0347743266
-
-
See Madison, supra note 16, at 1135
-
See Madison, supra note 16, at 1135.
-
-
-
-
335
-
-
0345851687
-
-
See supra note 17
-
See supra note 17.
-
-
-
-
336
-
-
0347743271
-
-
note
-
If a program can be reverse engineered by competitors, the rights holder necessarily does not have exclusive control over his work. Further, as the intellectual property laws do not create monopolies, see Clapes, supra note 15, at 948-49, contracts necessary to help establish a period of true exclusive control.
-
-
-
-
337
-
-
0347743272
-
-
note
-
Giving producers the ability to protect their software under copyright, patent, trade secret, and contract laws will provide them with the ability to preserve their natural lead-time in the market, which lead-time is necessary to prevent market failure. See Samuelson et al., supra note 16, at 2413.
-
-
-
-
338
-
-
0347743265
-
-
note
-
Indeed, there is considerable value in familiarizing consumers with particular software. See id. at 2375. Second-comers will find it difficult to lure consumers away from software with which they are familiar and have spent time to learn. See id.
-
-
-
-
339
-
-
0345851688
-
-
note
-
If producers are permitted to prevent the reverse engineering of their software, this will lessen the need for the producer to monitor the market for reverse engineering technologies, and expend resources on thwarting attempts at reverse engineering and on monitoring legislative efforts to address reverse engineering. See O'Rourke, Drawing the Boundary, supra note 104, at 499.
-
-
-
-
340
-
-
21944435194
-
Coercion, Deception, and Other Demand-Increasing Practices in Antitrust Law
-
Microsoft's dominance undeniably has produced numerous societal benefits, such as standardization. Professor Mark Patterson notes that, even if competition is eliminated, a standard-enhancing move may increase efficiency overall because consumers will benefit from the increased adoption of the standard. See Mark R. Patterson, Coercion, Deception, and Other Demand-Increasing Practices in Antitrust Law, 66 Antitrust L.J. 1, 74 n.323 (1997).
-
(1997)
Antitrust L.J. 1
, vol.66
, Issue.323
, pp. 74
-
-
Patterson, M.R.1
-
341
-
-
0347743264
-
-
note
-
After the expiration of the standard-setting time period, the government, by requiring disclosure, would open the standard in order to encourage competition. See Lemley & McGowan, Competitive Propriety, supra note 13, at 506 (arguing that the law should encourage open standards); supra note 1 and accompanying text (contending that "openness" is good). The time at which disclosure must occur may be based on the date of the first commercial distribution of the software, see 17 U.S.C. §§ 904(a), 908(a) (1994), and should vary depending on the nature of the software program. For example, Congress could require that the source code to operating systems be disclosed after a shorter time period than application programs. For a discussion of the differences between operating systems and application programs, see Samuelson, supra note 3, at 676-82.
-
-
-
-
342
-
-
0347743263
-
-
note
-
Nevertheless, this approach would be less intrusive upon the rights of software producers than a "public distribution equals publication" rule, which would deny trade secret protection to a program's source code even if the program was publicly distributed in object code format. Cohen, Electronic Vigilantism, supra note 82, at 1113-14.
-
-
-
-
343
-
-
0347112810
-
-
Trade secrets are only protectible as long as no one discovers them. See supra note 91 and accompanying text
-
Trade secrets are only protectible as long as no one discovers them. See supra note 91 and accompanying text.
-
-
-
-
344
-
-
21944434884
-
Copyright, Common Law, and Sui Generis Protection of Databases in the United States and Abroad
-
See Bell, supra note 132, at 615-16; see also Lemley, Beyond Preemption, supra note 134, at 150 (agreeing that an opt out scheme may be quite attractive to intellectual property owners)
-
In fact, state law protection may provide more effective protection than federal intellectual property statutes in certain circumstances. See Jane C. Ginsburg, Copyright, Common Law, and Sui Generis Protection of Databases in the United States and Abroad, 66 U. Cin. L. Rev. 151, 151 (1997). At least one commentator has advocated an opt out approach to federal intellectual property. See Bell, supra note 132, at 615-16; see also Lemley, Beyond Preemption, supra note 134, at 150 (agreeing that an opt out scheme may be quite attractive to intellectual property owners).
-
(1997)
U. Cin. L. Rev. 151
, vol.66
, pp. 151
-
-
Ginsburg, J.C.1
-
345
-
-
0345851695
-
-
note
-
The Copyright Office registration requirements mandate only that very small portions of a copyrighted program's source code be placed on file. See 37 C.F.R. § 202.20(c)(2)(vii) (1998). The Patent Office does not require that a program's source code be disclosed. See supra note 171 and accompanying text.
-
-
-
-
346
-
-
0345851694
-
-
note
-
A plaintiff alleging copyright infringement must prove two elements: (1) ownership of a valid copyright and (2) copying of original elements of the work. See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991). Copying may be established through indirect evidence, including evidence that the alleged infringer had access to the copyrighted work. See Castle Rock Entertainment, Inc. v. Carol Publ'g Group, Inc., 150 F.3d 132, 137 (2d Cir. 1998).
-
-
-
-
347
-
-
0347112805
-
-
note
-
This Note does not go so far as to propose a system of compulsory licensing, for the success of the product in the marketplace in the phase in which both federal and state law rights are available may vary, and to cut off all control over the use of one's code after disclosure may not allow producers to recoup their investments in their software. Moreover, a recent study of the economics of information concluded that, provided competitors write their own source code, imitative competition in the software industry should be encouraged. See Karjala, Program Structure, supra note 146, at 536-38.
-
-
-
-
348
-
-
0346482634
-
-
note
-
Right owners will object that their program code can be appropriated easily by second-comers who make minor changes and claim the disguised code as their own. See Miller, supra note 15, at 1026. The response is that simply changing another's code to hide all traces of illicit copying is not an easy task. See Cohen, Electronic Vigilantism, supra note 82, at 1123. In any case, this author is confident that courts are capable of determining whether one program so closely resembles another that it is infringing.
-
-
-
|