메뉴 건너뛰기




Volumn 67, Issue 6, 1999, Pages 3297-3334

Intellectual property, contracts, and reverse engineering after PROCD: A proposed compromise for computer software

(1)  Mahajan, Anthony J a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0033457445     PISSN: 0015704X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (348)
  • 1
    • 0001405850 scopus 로고    scopus 로고
    • The Long Boom
    • July
    • Peter Schwartz & Peter Leyden, The Long Boom, Wired, July 1997, at 115, 121 (noting the transition from an industrial to an information society).
    • (1997) Wired , pp. 115
    • Schwartz, P.1    Leyden, P.2
  • 2
    • 0347743104 scopus 로고
    • Software to Go
    • June 20
    • See Harold Seneker & Jayne A. Pearl, Software to Go, Forbes, June 20, 1983, at 93, 93.
    • (1983) Forbes , pp. 93
    • Seneker, H.1    Pearl, J.A.2
  • 3
    • 0021492315 scopus 로고
    • CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form
    • See Pamela Samuelson, CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form, 1984 Duke L.J. 663, 680-81 (noting that computers are "chameleon-like" machines, and that the program determines what type of machine the computer will be).
    • (1984) Duke L.J. , pp. 663
    • Samuelson, P.1
  • 4
    • 0347840389 scopus 로고    scopus 로고
    • Code Warriors
    • Jan. 18, hereinafter Levy, Code Warriors
    • See Steven Levy, Code Warriors, Newsweek, Jan. 18, 1999, at 60, 60 [hereinafter Levy, Code Warriors].
    • (1999) Newsweek , pp. 60
    • Levy, S.1
  • 5
    • 0347112630 scopus 로고    scopus 로고
    • See infra note 53 and accompanying text
    • See infra note 53 and accompanying text.
  • 10
    • 0347112893 scopus 로고    scopus 로고
    • supra note 4
    • See Paul Freiberger & Michael Swaine, Fire in the Valley: The Making of the Personal Computer 153-54 (1984); Levy, Code Warriors, supra note 4, at 60. Program code became a corporation's crown jewel, the gem to be locked away, safeguarded from prying eyes and hands. See id.
    • Code Warriors , pp. 60
    • Levy1
  • 11
    • 0347112893 scopus 로고    scopus 로고
    • See Paul Freiberger & Michael Swaine, Fire in the Valley: The Making of the Personal Computer 153-54 (1984); Levy, Code Warriors, supra note 4, at 60. Program code became a corporation's crown jewel, the gem to be locked away, safeguarded from prying eyes and hands. See id.
    • Code Warriors , pp. 60
    • Levy1
  • 12
    • 0347743105 scopus 로고    scopus 로고
    • See United States v. Microsoft Corp., 980 F. Supp. 537 (D.D.C. 1997); United States v. Microsoft Corp., 159 F.R.D. 318 (D.D.C.), rev'd, 56 F.3d 1448 (D.C. Cir. 1995)
    • See United States v. Microsoft Corp., 980 F. Supp. 537 (D.D.C. 1997); United States v. Microsoft Corp., 159 F.R.D. 318 (D.D.C.), rev'd, 56 F.3d 1448 (D.C. Cir. 1995).
  • 13
    • 0345867272 scopus 로고    scopus 로고
    • An Antitrust Remedy or Monopoly Leveraging by Electronic Networks
    • See Thomas A. Piraino, Jr., An Antitrust Remedy or Monopoly Leveraging by Electronic Networks, 93 Nw. U. L. Rev. 1, 3-5 (1998).
    • (1998) Nw. U. L. Rev. , vol.93 , pp. 1
    • Piraino T.A., Jr.1
  • 15
    • 0346482480 scopus 로고    scopus 로고
    • Could Java Change Everything?: The Competitive Propriety of a Proprietary Standard
    • PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 520, hereinafter Lemley & McGowan, Competitive Propriety
    • See Mark A. Lemley & David McGowan, Could Java Change Everything?: The Competitive Propriety of a Proprietary Standard, in Second Annual Internet Law Institute 453, 456 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 520, 1998) [hereinafter Lemley & McGowan, Competitive Propriety].
    • (1998) Second Annual Internet Law Institute , pp. 453
    • Lemley, M.A.1    McGowan, D.2
  • 16
    • 0346482479 scopus 로고    scopus 로고
    • See infra Part I
    • See infra Part I.
  • 17
    • 0043001573 scopus 로고
    • Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts
    • See, e.g., Anthony L. Clapes, Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts, 19 U. Dayton L. Rev. 903, 906 (1994) (objecting to a reduced level of intellectual property protection for computer software); Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 Harv. L. Rev. 977, 988 (1993) (concluding that there is no reason to believe that courts are overprotecting software proprietors).
    • (1994) U. Dayton L. Rev. , vol.19 , pp. 903
    • Clapes, A.L.1
  • 18
    • 0043001572 scopus 로고
    • Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New since CONTU?
    • See, e.g., Anthony L. Clapes, Confessions of an Amicus Curiae: Technophobia, Law, and Creativity in the Digital Arts, 19 U. Dayton L. Rev. 903, 906 (1994) (objecting to a reduced level of intellectual property protection for computer software); Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 Harv. L. Rev. 977, 988 (1993) (concluding that there is no reason to believe that courts are overprotecting so6tware proprietors).
    • (1993) Harv. L. Rev. , vol.106 , pp. 977
    • Miller, A.R.1
  • 19
    • 77952976495 scopus 로고    scopus 로고
    • Legal-Ware: Contract and Copyright in the Digital Age
    • See, e.g., Michael J. Madison, Legal-Ware: Contract and Copyright in the Digital Age, 67 Fordham L. Rev. 1025, 1029 n.14, 1031 (1998) (arguing that the public domain cannot consist only of materials that information providers unilaterally choose to provide); Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 Colum. L. Rev. 2308, 2365-71 (1994) (advocating a market-based approach to computer software protection).
    • (1998) Fordham L. Rev. , vol.67 , Issue.14 , pp. 1025
    • Madison, M.J.1
  • 20
    • 84881941394 scopus 로고
    • A Manifesto Concerning the Legal Protection of Computer Programs
    • See, e.g., Michael J. Madison, Legal-Ware: Contract and Copyright in the Digital Age, 67 Fordham L. Rev. 1025, 1029 n.14, 1031 (1998) (arguing that the public domain cannot consist only of materials that information providers unilaterally choose to provide); Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 Colum. L. Rev. 2308, 2365-71 (1994) (advocating a market-based approach to computer software protection).
    • (1994) Colum. L. Rev. , vol.94 , pp. 2308
    • Samuelson, P.1
  • 21
    • 0347112880 scopus 로고    scopus 로고
    • note
    • The underpinnings of the federal copyright and patent statutes are rooted in Article I of the United States Constitution, which provides that "Congress shall have Power . . . [t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." U.S. Const, art. I, § 8, cl. 8. The Supreme Court has observed that the objective of the federal intellectual property statutes is to strike a balance between private and public rights of access to information, and "to motivate the creative activity of authors . . . and to allow the public access to the products of their genius after the limited period of exclusive control has expired." Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 429 (1984); see also Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480 (1974) (proclaiming that the limited monopoly fostered by the federal intellectual property laws "will have a positive effect on society through the introduction of new products and processes of manufacture into the economy, and the emanations by way of increased employment and better lives for our citizens").
  • 22
    • 0346482482 scopus 로고    scopus 로고
    • See infra Part I.C-D
    • See infra Part I.C-D.
  • 23
    • 0347743106 scopus 로고    scopus 로고
    • See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991)
    • See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991).
  • 24
    • 0346482483 scopus 로고    scopus 로고
    • See 17 U.S.C.A. § 302(a) (West Supp. 1999)
    • See 17 U.S.C.A. § 302(a) (West Supp. 1999).
  • 25
    • 0345851533 scopus 로고    scopus 로고
    • See 17 U.S.C. § 106 (1994)
    • See 17 U.S.C. § 106 (1994).
  • 26
    • 0346482484 scopus 로고    scopus 로고
    • See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 n.2 (2d Cir. 1977)
    • See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 n.2 (2d Cir. 1977).
  • 27
    • 0345851534 scopus 로고    scopus 로고
    • See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480-81 (1974)
    • See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 480-81 (1974).
  • 28
    • 0347112632 scopus 로고    scopus 로고
    • See 35 U.S.C. § 112 (1994)
    • See 35 U.S.C. § 112 (1994).
  • 29
    • 0346482485 scopus 로고    scopus 로고
    • See 17 U.S.C. § 301
    • See 17 U.S.C. § 301.
  • 30
    • 0347743108 scopus 로고    scopus 로고
    • See Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 556 (1985)
    • See Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 556 (1985).
  • 31
    • 0345851536 scopus 로고    scopus 로고
    • See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 350 (1991)
    • See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 350 (1991).
  • 32
    • 0347743110 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 33
    • 0347743109 scopus 로고    scopus 로고
    • 101 U.S. 99 (1879)
    • 101 U.S. 99 (1879).
  • 34
    • 0347743344 scopus 로고    scopus 로고
    • See id. at 99-100
    • See id. at 99-100.
  • 35
    • 0347112634 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 36
    • 0346482496 scopus 로고    scopus 로고
    • See id. at 103
    • See id. at 103.
  • 37
    • 0347743117 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 38
    • 0346482487 scopus 로고    scopus 로고
    • See id. at 107
    • See id. at 107.
  • 39
    • 0345851535 scopus 로고    scopus 로고
    • See id. at 105. "Letters-patent" is a reference to the patent law
    • See id. at 105. "Letters-patent" is a reference to the patent law. See Edward C. Walterscheid, Patents and Manufacturing in the Early Republic, 80 J. Pat. & Trademark Off. Soc'y 855, 857 (1998).
  • 40
    • 0346482486 scopus 로고    scopus 로고
    • Patents and Manufacturing in the Early Republic
    • See id. at 105. "Letters-patent" is a reference to the patent law. See Edward C. Walterscheid, Patents and Manufacturing in the Early Republic, 80 J. Pat. & Trademark Off. Soc'y 855, 857 (1998).
    • (1998) J. Pat. & Trademark Off. Soc'y , vol.80 , pp. 855
    • Walterscheid, E.C.1
  • 41
    • 0345851547 scopus 로고    scopus 로고
    • See 17 U.S.C. § 102(b) (1994)
    • See 17 U.S.C. § 102(b) (1994).
  • 42
    • 0345851554 scopus 로고    scopus 로고
    • Id.
    • Id.
  • 43
    • 0345851773 scopus 로고    scopus 로고
    • See H.R. Rep. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5670
    • See H.R. Rep. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5670.
  • 44
    • 0346482501 scopus 로고    scopus 로고
    • See id., reprinted in 1976 U.S.C.C.A.N. 5659, 5670
    • See id., reprinted in 1976 U.S.C.C.A.N. 5659, 5670.
  • 45
    • 0347743107 scopus 로고    scopus 로고
    • Conversely, the original expression of an idea, even if not readily perceptible by the human eye, is protected. See id. at 52, reprinted in 1976 U.S.C.C.A.N. 5659, 5665. Similarly, even though a program may be in such a form that it may only be "perceived" by a machine, the program nonetheless may be entitled to copyright protection. See, e.g., Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1248-51 (3d Cir. 1983) (rejecting contention that copyright is limited to works designed to be read by a human reader); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir. 1982) (determining that object code represented on a Read Only Memory chip may be copyrighted)
    • Conversely, the original expression of an idea, even if not readily perceptible by the human eye, is protected. See id. at 52, reprinted in 1976 U.S.C.C.A.N. 5659, 5665. Similarly, even though a program may be in such a form that it may only be "perceived" by a machine, the program nonetheless may be entitled to copyright protection. See, e.g., Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1248-51 (3d Cir. 1983) (rejecting contention that copyright is limited to works designed to be read by a human reader); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir. 1982) (determining that object code represented on a Read Only Memory chip may be copyrighted).
  • 46
    • 0345851531 scopus 로고    scopus 로고
    • See Kregos v. Associated Press, 937 F.2d 700, 705 (2d Cir. 1991)
    • See Kregos v. Associated Press, 937 F.2d 700, 705 (2d Cir. 1991).
  • 47
    • 0346482706 scopus 로고    scopus 로고
    • See Bellsouth Adver. & Publ'g Corp. v. Donnelley Info. Publ'g, Inc., 999 F.2d 1436, 1442 (11th Cir. 1993)
    • See Bellsouth Adver. & Publ'g Corp. v. Donnelley Info. Publ'g, Inc., 999 F.2d 1436, 1442 (11th Cir. 1993).
  • 48
    • 0346482481 scopus 로고    scopus 로고
    • See 5 Copyright, Congress & Technology: The Public Record 40 (Nicholas Henry ed., Oryx Press 1980) [hereinafter CONTU Final Report]; see also Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 66 (D. Mass. 1990) (noting that the merger doctrine will deny copyright protection to certain aspects of computer programs). Regarding the application of merger to computer programs, one commentator noted that the "line [for determining when merger occurs] is a pragmatic one, drawn not on the basis of some metaphysical property of 'ideas,' but by balancing the need to protect the labors of authors with the desire to assure free access to ideas." 4 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[F][1], at 13-125 (1998)
    • See 5 Copyright, Congress & Technology: The Public Record 40 (Nicholas Henry ed., Oryx Press 1980) [hereinafter CONTU Final Report]; see also Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 66 (D. Mass. 1990) (noting that the merger doctrine will deny copyright protection to certain aspects of computer programs). Regarding the application of merger to computer programs, one commentator noted that the "line [for determining when merger occurs] is a pragmatic one, drawn not on the basis of some metaphysical property of 'ideas,' but by balancing the need to protect the labors of authors with the desire to assure free access to ideas." 4 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[F][1], at 13-125 (1998).
  • 49
    • 0347112631 scopus 로고    scopus 로고
    • See Atari, Inc. v. North Am. Philips Consumer Elecs. Corp., 672 F.2d 607, 616 (7th Cir. 1982)
    • See Atari, Inc. v. North Am. Philips Consumer Elecs. Corp., 672 F.2d 607, 616 (7th Cir. 1982).
  • 50
    • 0347743121 scopus 로고    scopus 로고
    • See Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 963 (2d Cir. 1997)
    • See Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 963 (2d Cir. 1997).
  • 51
    • 0345851548 scopus 로고    scopus 로고
    • The Relative Roles of Patent and Copyright in the Protection of Computer Programs
    • hereinafter Karjala, Relative Roles
    • Computer programs are purely functional in that they cause a computer to perform a particular task or set of tasks. See Dennis S. Karjala, The Relative Roles of Patent and Copyright in the Protection of Computer Programs, 17 J. Marshall J. Computer & Info. L. 41, 42 (1998) [hereinafter Karjala, Relative Roles]. Because separating the functional aspects from the nonfunctional aspects of program code would leave little to protect, however, the protection of computer programs under copyright is an exception to the useful article doctrine. See Dennis S. Karjala, Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller, 19 U. Dayton L. Rev. 975, 986 (1994) [hereinafter Karjala, Copyright Protection].
    • (1998) J. Marshall J. Computer & Info. L. , vol.17 , pp. 41
    • Karjala, D.S.1
  • 52
    • 0041999944 scopus 로고
    • Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller
    • hereinafter Karjala, Copyright Protection
    • Computer programs are purely functional in that they cause a computer to perform a particular task or set of tasks. See Dennis S. Karjala, The Relative Roles of Patent and Copyright in the Protection of Computer Programs, 17 J. Marshall J. Computer & Info. L. 41, 42 (1998) [hereinafter Karjala, Relative Roles]. Because separating the functional aspects from the nonfunctional aspects of program code would leave little to protect, however, the protection of computer programs under copyright is an exception to the useful article doctrine. See Dennis S. Karjala, Copyright Protection of Computer Documents, Reverse Engineering, and Professor Miller, 19 U. Dayton L. Rev. 975, 986 (1994) [hereinafter Karjala, Copyright Protection].
    • (1994) U. Dayton L. Rev. 975 , vol.19 , pp. 986
    • Karjala, D.S.1
  • 53
    • 0346482505 scopus 로고    scopus 로고
    • See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1247-48 (3d Cir. 1983)
    • See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1247-48 (3d Cir. 1983).
  • 54
    • 0345851555 scopus 로고    scopus 로고
    • 17 U.S.C. § 102(b) (1994);
    • 17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
  • 55
    • 0347112886 scopus 로고
    • Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex
    • 17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
    • (1993) Ariz. St. L.J. 801 , vol.25 , pp. 831-832
    • Brown, J.E.1
  • 56
    • 0347743340 scopus 로고    scopus 로고
    • Samuelson et al., supra note 16, at 2351
    • 17 U.S.C. § 102(b) (1994); Jack E. Brown, "Analytical Dissection" of Copyrighted Computer Software-Complicating the Simple and Confounding the Complex, 25 Ariz. St. L.J. 801, 831-32 (1993). If conceptualized in this fashion, computer programs would be denied protection under copyright law by the express terms of § 102(b). See Samuelson et al., supra note 16, at 2351.
  • 57
    • 0347743341 scopus 로고    scopus 로고
    • See CONTU Final Report, supra note 43, at 21-27.
    • See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
  • 58
    • 0347743126 scopus 로고    scopus 로고
    • Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974)
    • See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
  • 59
    • 0010879911 scopus 로고
    • Computer Software: Intellectual Property Protection in the United States and Japan
    • See CONTU Final Report, supra note 43, at 21-27. CONTU was charged by the 93rd Congress with determining the extent of copyright protection for computer programs. See Pub. L. No. 93-573, tit. II, 88 Stat. 1873, 1873-74 (1974). CONTU, rejecting trade secret and patent protection as viable alternatives, found that copyright was the intellectual property protection best suited for computer programs. See Jack M. Haynes, Computer Software: Intellectual Property Protection in the United States and Japan, 13 J. Marshall J. Computer & Info. L. 245, 254 (1995).
    • (1995) J. Marshall J. Computer & Info. L. 245 , vol.13 , pp. 254
    • Haynes, J.M.1
  • 60
    • 0346482500 scopus 로고    scopus 로고
    • note
    • See Computer Software Copyright Act of 1980, Pub. L. No. 96-517, 94 Stat. 3015, 3028 (codified at 17 U.S.C. §§ 101, 117 (1994)). Computer programs are defined as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result." 17 U.S.C. § 101. "Statements or instructions" refers to program source code and object code. See infra note 53 and accompanying text. The Act was further amended to exempt from liability owners of computer programs who make or authorize the making of copies of, or adaptations to, computer programs when necessary to operate the program. See 94 Stat. at 3028.
  • 61
    • 0347743120 scopus 로고    scopus 로고
    • 17 U.S.C. § 101
    • 17 U.S.C. § 101.
  • 62
    • 0346482700 scopus 로고    scopus 로고
    • See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992)
    • See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
  • 63
    • 0345851549 scopus 로고
    • Convergence in the Law of Software Copyright?
    • See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
    • (1995) High Tech. L.J. 1 , vol.10 , pp. 14-15
    • Lemley, M.A.1
  • 64
    • 0346482506 scopus 로고    scopus 로고
    • Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996)
    • See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 706-12 (2d Cir. 1992). Virtually all courts addressing software copyright cases after 1992 have followed Altai. See Mark A. Lemley, Convergence in the Law of Software Copyright?, 10 High Tech. L.J. 1, 14-15 (1995). But see Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 814-15 (1st Cir. 1995) (refusing to adopt the abstraction-nitration-comparison test set forth in Altai), aff'd per curiam, 516 U.S. 233 (1996).
  • 65
    • 0346482509 scopus 로고    scopus 로고
    • Altai, 982 F.2d at 698
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
  • 66
    • 0346482510 scopus 로고    scopus 로고
    • See id.
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
  • 67
    • 0346482692 scopus 로고
    • Copyright Protection for Software Architecture: Just Say No!
    • Note
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
    • (1988) Colum. Bus. L. Rev. 823 , pp. 826
    • Kretschmer, M.T.1
  • 68
    • 0043001483 scopus 로고
    • Software Reverse Engineering in the Real World
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
    • (1994) U. Dayton L. Rev. 843 , vol.19 , Issue.17 , pp. 851
    • Johnson-Laird, A.1
  • 69
    • 0347743131 scopus 로고    scopus 로고
    • See Altai, 982 F.2d at 698.
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
  • 70
    • 0345851566 scopus 로고    scopus 로고
    • See id.
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
  • 71
    • 0347112661 scopus 로고    scopus 로고
    • See infra Part I.C
    • This Note undertakes to address only a program's literal aspects, its source and object code, even though there are additional nonliteral elements of a computer program that may be afforded protection, such as the program's graphical display. After a program's basic structure and design has been determined, it must be reflected in language the computer can comprehend. See Altai, 982 F.2d at 698. First, the programmer must write source code that reflects the program's structure in a programming language such as COBOL or FORTRAN. See id. For the programmer, this drafting process is comparable to a "novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Id. (quoting Mark T. Kretschmer, Note, Copyright Protection for Software Architecture: Just Say No!, 1988 Colum. Bus. L. Rev. 823, 826). Source code is the textual form of a computer program and is comprised of two elements: the quasi-mathematical form of instructions that will instruct the computer, and instructive comments inserted by the computer programmer to help other readers understand the source code. See Andrew Johnson-Laird, Software Reverse Engineering in the Real World, 19 U. Dayton L. Rev. 843, 851 n.17 (1994). Because the source code cannot be executed by a computer, the second step is to translate or "compile" the source code into machine-readable object code. See Altai, 982 F.2d at 698. Object code cannot be understood by humans; it is a binary language consisting of ones and zeros which instructs the computer. See id. Typically, only the program in object code form is distributed to the public in an effort to preserve trade secret protection because humans cannot understand object code, therefore, the trade secrets embodied therein cannot be discovered. See infra Part I.C.
  • 72
    • 0347743136 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 73
    • 0043001396 scopus 로고
    • Public Goods, Private Contract and Public Policy: Federal Preemption of Software License Prohibitions Against Reverse Engineering
    • See David A. Rice, Public Goods, Private Contract and Public Policy: Federal Preemption of Software License Prohibitions Against Reverse Engineering, 53 U. Pitt. L. Rev. 543, 567-68 (1992).
    • (1992) U. Pitt. L. Rev. 543 , vol.53 , pp. 567-568
    • Rice, D.A.1
  • 74
    • 0347112660 scopus 로고
    • An Uneasier Case for Copyright than for Patent Protection of Computer Programs
    • See A. Samuel Oddi, An Uneasier Case for Copyright than for Patent Protection of Computer Programs, 72 Neb. L. Rev. 351, 384 (1993).
    • (1993) Neb. L. Rev. 351 , vol.72 , pp. 384
    • Samuel Oddi, A.1
  • 75
    • 0346482511 scopus 로고    scopus 로고
    • 35 U.S.C. § 101 (1994)
    • 35 U.S.C. § 101 (1994).
  • 76
    • 0347112658 scopus 로고    scopus 로고
    • See id. §§ 102, 103
    • See id. §§ 102, 103.
  • 77
    • 0040510916 scopus 로고    scopus 로고
    • Patentability of Computer Software Instruction as an "Article of Manufacture:" Software as Such as the Right Stuff
    • See Vincent Chiappetta, Patentability of Computer Software Instruction as an "Article of Manufacture:" Software as Such as the Right Stuff, 17 J. Marshall J. Computer & Info. L. 89, 100 (1998).
    • (1998) J. Marshall J. Computer & Info. L. 89 , vol.17 , pp. 100
    • Chiappetta, V.1
  • 78
    • 0345851764 scopus 로고    scopus 로고
    • See In re Alappat, 33 F.3d 1526, 1542 (Fed. Cir. 1994)
    • See In re Alappat, 33 F.3d 1526, 1542 (Fed. Cir. 1994).
  • 79
    • 0347743192 scopus 로고    scopus 로고
    • See supra Part I.A
    • See supra Part I.A.
  • 80
    • 0347112663 scopus 로고    scopus 로고
    • Patenting Computer Science: Are Computer Instruction Writings Patentable?
    • See Allen B. Wagner, Patenting Computer Science: Are Computer Instruction Writings Patentable?, 17 J. Marshall J. Computer & Info. L. 5, 33 (1998).
    • (1998) J. Marshall J. Computer & Info. L. 5 , vol.17 , pp. 33
    • Wagner, A.B.1
  • 81
    • 0345851571 scopus 로고    scopus 로고
    • See Karjala, Relative Roles, supra note 46, at 41-42
    • See Karjala, Relative Roles, supra note 46, at 41-42.
  • 82
    • 0345851565 scopus 로고    scopus 로고
    • One who, without authority, "makes, uses or sells any patented invention" infringes a patent. 35 U.S.C. § 271(a) (1994)
    • One who, without authority, "makes, uses or sells any patented invention" infringes a patent. 35 U.S.C. § 271(a) (1994).
  • 83
    • 84868001819 scopus 로고
    • Patents for Software-Related Inventions
    • See David Bender & Anthony R. Barkume, Patents for Software-Related Inventions, 5 Software L.J. 279, 287 (1992).
    • (1992) Software L.J. 279 , vol.5 , pp. 287
    • Bender, D.1    Barkume, A.R.2
  • 84
    • 0347743137 scopus 로고    scopus 로고
    • See 17 U.S.C.A. § 302(a) (West Supp. 1999)
    • See 17 U.S.C.A. § 302(a) (West Supp. 1999).
  • 85
    • 0347743328 scopus 로고    scopus 로고
    • See 35 U.S.C. § 154(a)(2)
    • See 35 U.S.C. § 154(a)(2).
  • 86
    • 0347743130 scopus 로고    scopus 로고
    • Possible Defenses to Complaints for Copyright Infringement and Reverse Engineering of Computer Software: Implications for Antitrust and I.P. Law
    • See John G. Mills, Possible Defenses to Complaints for Copyright Infringement and Reverse Engineering of Computer Software: Implications for Antitrust and I.P. Law, 80 J. Pat. & Trademark Off. Soc'y 101, 130 (1998).
    • (1998) J. Pat. & Trademark Off. Soc'y 101 , vol.80 , pp. 130
    • Mills, J.G.1
  • 88
    • 0347743335 scopus 로고    scopus 로고
    • See 37 C.F.R. § 202.3 (1998)
    • See 37 C.F.R. § 202.3 (1998).
  • 90
    • 0347743334 scopus 로고    scopus 로고
    • See Karjala, Relative Roles, supra note 46, at 41-42
    • See Karjala, Relative Roles, supra note 46, at 41-42.
  • 91
    • 0345851760 scopus 로고    scopus 로고
    • note
    • See supra note 46; see also Chiappetta, supra note 59, at 156 n.285 (noting the distinction between patent and copyright protection of computer software).
  • 92
    • 0347112664 scopus 로고    scopus 로고
    • note
    • See Wagner, supra note 62, at 6. The Patent and Trademark Office ("PTO") historically had viewed software components as unpatentable mathematical formulations existing independently of functional structures or processes. See Lemley & O'Brien, supra note 71, at 280-81. Thus, patent claims routinely were rejected by the courts and the PTO unless the claim included an accompanying physical structure or embodiment. See, e.g., In re Pardo, 684 F.2d 912, 915 (C.C.P.A. 1982) (describing the two-part test for patentability as involving a determination first whether a mathematical algorithm is recited, and secondly, whether the algorithm is applied to physical elements).
  • 93
    • 0347743127 scopus 로고    scopus 로고
    • note
    • See In re Beauregard, 53 F.3d 1583, 1584 (Fed. Cir. 1995) (noting that the Commissioner of Patents and Trademarks had conceded that computer software on computer-readable media is patentable subject matter); In re Lowry, 32 F.3d 1579, 1583 (Fed. Cir. 1994) (holding that the application of the printed matter doctrine was inappropriate where the information in question was to be processed by a machine rather than by the human mind).
  • 94
    • 0346482502 scopus 로고    scopus 로고
    • A New Frontier in Patents: Patent Claims to Propagated Signals
    • See Jeffrey R. Kuester et al., A New Frontier in Patents: Patent Claims to Propagated Signals, 17 J. Marshall J. Computer & Info. L. 75, 77 (1998).
    • (1998) J. Marshall J. Computer & Info. L. 75 , vol.17 , pp. 77
    • Kuester, J.R.1
  • 95
    • 0347743138 scopus 로고    scopus 로고
    • note
    • See also State St. Bank & Trust Co. v. Signature Fin. Group, Inc., 149 F.3d 1368, 1373-74 (Fed. Cir. 1998) (refusing to apply the mathematical algorithm exception to computer software where it produces "a useful, concrete and tangible result"), cert. denied, 119 S. Ct. 851 (1999).
  • 96
    • 0347112657 scopus 로고    scopus 로고
    • Examination Guidelines for Computer-Related Inventions
    • hereinafter Examination Guidelines
    • See Examination Guidelines for Computer-Related Inventions, 61 Fed. Reg. 7478, 7482, 7487 n.1 (1996) [hereinafter Examination Guidelines]; see also Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares, 50 Pat. Trademark & Copyright J. (BNA) 3, 3 (1995) (observing that the PTO "declared that computer programs embodied in a tangible medium, such as a floppy diskette, are patentable subject matter").
    • (1996) Fed. Reg. 7478 , vol.61 , Issue.1 , pp. 7482
  • 97
    • 0345851567 scopus 로고
    • Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares
    • See Examination Guidelines for Computer-Related Inventions, 61 Fed. Reg. 7478, 7482, 7487 n.1 (1996) [hereinafter Examination Guidelines]; see also Patent and Trademark Office: Software Embodied on Diskette Is Patentable Subject Matter, PTO Declares, 50 Pat. Trademark & Copyright J. (BNA) 3, 3 (1995) (observing that the PTO "declared that computer programs embodied in a tangible medium, such as a floppy diskette, are patentable subject matter").
    • (1995) Pat. Trademark & Copyright J. (BNA) 3 , vol.50 , pp. 3
  • 98
    • 0347743084 scopus 로고    scopus 로고
    • Examination Guidelines, supra note 78, at 7482
    • Examination Guidelines, supra note 78, at 7482.
  • 99
    • 0347112887 scopus 로고    scopus 로고
    • See id. at 7481
    • See id. at 7481.
  • 100
    • 0347112888 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 101
    • 21844482758 scopus 로고
    • Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implication of "Lock-Out" Programs
    • hereinafter Cohen, Electronic Vigilantism
    • See Julie E. Cohen, Reverse Engineering and the Rise of Electronic Vigilantism: Intellectual Property Implication of "Lock-Out" Programs, 68 S. Cal. L. Rev. 1091, 1112 (1995) [hereinafter Cohen, Electronic Vigilantism].
    • (1995) S. Cal. L. Rev. 1091 , vol.68 , pp. 1112
    • Cohen, J.E.1
  • 102
    • 0346482693 scopus 로고    scopus 로고
    • See Examination Guidelines, supra note 78, at 7481
    • See Examination Guidelines, supra note 78, at 7481.
  • 103
    • 0347743140 scopus 로고    scopus 로고
    • note
    • The Examination Guidelines state that "[w]hen functional descriptive material [such as computer code] is recorded on some computer-readable medium it becomes structurally and functionally interrelated to the medium and will be statutory in most cases." Id.
  • 104
    • 0347112821 scopus 로고    scopus 로고
    • note
    • See Mills, supra note 68, at 129. A discussion of whether the recent decisions and PTO Guidelines impermissibly intrude into the sphere of copyright is beyond the scope of this Note. Compare Mazer v. Stein, 347 U.S. 201, 217 (1954) ("Neither the Copyright Statute nor any other says that because a thing is patentable it may not be copyrighted."), with Wagner, supra note 62, at 36 (arguing that patent protection for computer programs is inconsistent with copyright fundamentals).
  • 105
    • 0347112865 scopus 로고    scopus 로고
    • Ephemeral Infringement by Customizable Software: Liability Structures to Promote New Technology and Protect the Old
    • See Robert C. Haldiman, Ephemeral Infringement by Customizable Software: Liability Structures to Promote New Technology and Protect the Old, 80 J. Pat. & Trademark Off. Soc'y 651, 674 n.13 (1998).
    • (1998) J. Pat. & Trademark Off. Soc'y 651 , vol.80 , Issue.13 , pp. 674
    • Haldiman, R.C.1
  • 106
    • 0345851560 scopus 로고    scopus 로고
    • note
    • See, e.g., Softel, Inc. v. Dragon Med. & Scientific Communications, Inc., 118 F.3d 955, 968 (2d Cir. 1997) (finding that the lower court's conclusion that the individual software elements of plaintiff's computer program were not protectable did not address plaintiff's claim that the combination of the elements was a trade secret); Rivendell Forest Prod., Ltd. v. Georgia-Pacific Corp., 28 F.3d 1042, 1045 (10th Cir. 1994) (recognizing that a "trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which, in unique combination, affords a competitive advantage and is a protectable secret" (quoting Imperial Chem. Indus., Ltd. v. Nat'l Distillers & Chem. Corp., 342 F.2d 737, 742 (2d Cir. 1965)); Harbor Software, Inc. v. Applied Sys., Inc., 887 F. Supp. 86, 90 (S.D.N.Y. 1995) (noting that "the overall design of a software program may be protectable as a trade secret, even if the individual components of that program are common knowledge in the programming industry" (emphasis in original)). Although state trade secret law does not create true intellectual property rights, as do the copyright and patent laws, it does establish standards of conduct that protect against unethical or unfair methods of gaining access to industrial technology and knowledge. See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 475-76 (1974).
  • 107
    • 0347112879 scopus 로고    scopus 로고
    • Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990)
    • Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990). Over forty states have adopted some version of the Act. See Arthur J. Schwab & David J. Porter, Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996, J. Proprietary Rights, Apr. 1998, at 2, 2.
  • 108
    • 0347112666 scopus 로고    scopus 로고
    • Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996
    • Apr.
    • Unif. Trade Secrets Act (amended 1985), 14 U.L.A. 433 (1990). Over forty states have adopted some version of the Act. See Arthur J. Schwab & David J. Porter, Federal Protection of Trade Secrets: Understanding the Economic Espionage Act of 1996, J. Proprietary Rights, Apr. 1998, at 2, 2.
    • (1998) J. Proprietary Rights , pp. 2
    • Schwab, A.J.1    Porter, D.J.2
  • 109
    • 0347112679 scopus 로고    scopus 로고
    • note
    • Unif. Trade Secrets Act § 1, 14 U.L.A. at 438. States that have not adopted the Uniform Trade Secrets Act, including New York, generally look to the first Restatement of Torts when defining a trade secret. See Softel, 118 F.3d at 968. The Restatement defines a trade secret as "any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it." Restatement of Torts § 757 cmt. b. (1939)
  • 110
    • 0347112681 scopus 로고    scopus 로고
    • note
    • See Rockwell Graphic Sys., Inc. v. DEV Indus., Inc., 925 F.2d 174, 177 (7th Cir. 1991); Anacomp, Inc. v. Shell Knob Servs., Inc., No. 93 Civ. 4003, 1994 U.S. Dist. LEXIS 223, at *27 (S.D.N.Y. Jan. 7, 1994), aff'd, 29 F.3d 621 (2d Cir. 1994).
  • 111
    • 0345851575 scopus 로고    scopus 로고
    • note
    • See Restatement of Torts § 757 cmt. b. Trade secrets may theoretically be protected in perpetuity.
  • 112
    • 0347112678 scopus 로고    scopus 로고
    • See Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 848 (10th Cir. 1993)
    • See Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 848 (10th Cir. 1993).
  • 113
    • 0347743142 scopus 로고    scopus 로고
    • See Coca-Cola Bottling Co. v. Coca-Cola Co., 107 F.R.D. 288, 289 (D. Del. 1985)
    • For example, the recipe for Coca-Cola is one of the best-kept trade secrets in the world. See Coca-Cola Bottling Co. v. Coca-Cola Co., 107 F.R.D. 288, 289 (D. Del. 1985).
  • 114
    • 0347112680 scopus 로고    scopus 로고
    • Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993)
    • See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
  • 115
    • 0345851744 scopus 로고    scopus 로고
    • Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994)
    • See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
  • 116
    • 0347743329 scopus 로고    scopus 로고
    • Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993)
    • See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
  • 117
    • 0347112672 scopus 로고
    • Foreign Sale of MS-DOS Is Contributory Infringement
    • See, e.g., Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663-64 (4th Cir. 1993) (concluding that distribution of disks containing object code did not destroy the secrecy of the source code); Data Gen. Corp. v. Grumman Sys. Support Corp., 825 F. Supp. 340, 359 (D. Mass. 1993) (holding that the contents of a computer program distributed only in object code format were protectable trade secrets), aff'd, 36 F.3d 1147 (1st Cir. 1994); Barr-Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (finding that source code was not "readily ascertainable" from object code, and therefore could be considered a trade secret); cf. Foreign Sale of MS-DOS Is Contributory Infringement, 48 Pat. Trademark & Copyright J. (BNA) 165, 166 (1994) (reporting that the court in Stac Elecs. v. Microsoft Corp., CV-93-413-ER (C.D. Cal. 5/13/94 and 6/8/94), held that trade secret protection had been lost by distribution of copies of software to customers who could have reverse engineered it and discovered the trade secrets).
    • (1994) Pat. Trademark & Copyright J. (BNA) 165 , vol.48 , pp. 166
  • 118
    • 0347743150 scopus 로고    scopus 로고
    • note
    • See Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 716 (2d Cir. 1992). Section 301 provides, in pertinent part, that "[n]othing in this title annuls or limits any rights or remedies under the common law or statutes of any State with respect to . . . activities violating legal or equitable rights that are not equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106." 17 U.S.C. § 301(b) (1994). The patent laws do not contain an express preemption section and state trade secret laws may coexist with the federal patent laws. See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 478-79 (1974).
  • 119
    • 0345851578 scopus 로고    scopus 로고
    • See Altai, 982 F.2d at 716-17
    • See Altai, 982 F.2d at 716-17.
  • 120
    • 0347112684 scopus 로고    scopus 로고
    • See Trandes, 996 F.2d at 659
    • See Trandes, 996 F.2d at 659.
  • 121
    • 0345851576 scopus 로고    scopus 로고
    • See Altai, 982 F.2d at 716
    • See Altai, 982 F.2d at 716.
  • 122
    • 0347743141 scopus 로고    scopus 로고
    • See id. at 717
    • See id. at 717.
  • 123
    • 0345851581 scopus 로고    scopus 로고
    • note
    • A trade secret is appropriated improperly by "theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means." Unif. Trade Secrets Act § 1 (amended 1985), 14 U.L.A. 433, 437 (1990). The Restatement's definition is virtually identical. See Restatement (Third) of Unfair Competition § 43 (1995) ("'Improper' means of acquiring another's trade secret . . . include theft, fraud, unauthorized interception of communications, inducement of or knowing participation in a breach of confidence, and other means either wrongful in themselves or wrongful under the circumstances of the case.").
  • 124
    • 0346497998 scopus 로고    scopus 로고
    • See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses
    • See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
  • 125
    • 0346497998 scopus 로고    scopus 로고
    • The Privatization (or "Shrink-Wrapping") of American Copyright Law
    • hereinafter McManis, Privatization
    • See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
    • (1999) Cal. L. Rev. 173 , vol.87 , pp. 173
    • McManis, C.R.1
  • 126
    • 0346497998 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1058
    • See 5 Nimmer & Nimmer, supra note 43, § 27.02[B], at 27-14. "Click here" licenses, also referred to as "clickwrap" licenses, are the electronic equivalent of shrinkwrap licenses. See Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 Cal. L. Rev. 173, 173 (1999) [hereinafter McManis, Privatization]. This type of license appears on a user's computer screen when the user first loads a computer program, and requires the user to "click" his acceptance of the terms of the license before he uses the software. See Madison, supra note 16, at 1058. Both types of licenses will be referred to herein as shrinkwrap licenses.
  • 127
    • 21844492135 scopus 로고
    • Intellectual Property and Shrinkwrap Licenses
    • hereinafter Lemley, Intellectual Property
    • See Mark Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1246 (1995) [hereinafter Lemley, Intellectual Property]. For an example of a typical shrinkwrap license, see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988).
    • (1995) S. Cal. L. Rev. 1239 , vol.68 , pp. 1246
    • Lemley, M.1
  • 128
    • 0347112685 scopus 로고    scopus 로고
    • see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988)
    • See Mark Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1246 (1995) [hereinafter Lemley, Intellectual Property]. For an example of a typical shrinkwrap license, see Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 257 n.2 (5th Cir. 1988).
  • 129
    • 0345851582 scopus 로고    scopus 로고
    • note
    • See Madison, supra note 16, at 1029 n.11. Both patent and copyright laws protect only those ideas that are either functionally or expressively embodied in a work. See supra Part I.A-B.
  • 130
    • 21344433422 scopus 로고
    • Drawing the Boundary between Copyright and Contract: Copyright Preemption of Software License Terms
    • hereinafter O'Rourke, Drawing the Boundary
    • The contractual breach of promise may also be referred to as a breach of trust or confidential relationship. See Maureen A. O'Rourke, Drawing the Boundary Between Copyright and Contract: Copyright Preemption of Software License Terms, 45 Duke L.J. 479, 523 (1995) [hereinafter O'Rourke, Drawing the Boundary].
    • (1995) Duke L.J. 479 , vol.45 , pp. 523
    • O'Rourke, M.A.1
  • 131
    • 0347112689 scopus 로고    scopus 로고
    • See Frontline Test Equip., Inc. v. Greenleaf Software, Inc., 10 F. Supp. 2d 583, 592 (W.D. Va. 1998)
    • See Frontline Test Equip., Inc. v. Greenleaf Software, Inc., 10 F. Supp. 2d 583, 592 (W.D. Va. 1998).
  • 132
    • 0347112688 scopus 로고    scopus 로고
    • See supra notes 90-91 and accompanying text
    • See supra notes 90-91 and accompanying text.
  • 133
    • 0347112687 scopus 로고    scopus 로고
    • See 1 Nimmer & Nimmer, supra note 43, § 1.01[B][1], at 1-10 to -17
    • See 1 Nimmer & Nimmer, supra note 43, § 1.01[B][1], at 1-10 to -17.
  • 134
    • 0347112653 scopus 로고    scopus 로고
    • Canada-United States Trade Issues: Back from Purgatory? Why Computer Software "Shrink-Wrap" Licenses Should Be Laid to Rest
    • See Stephen Fraser, Canada-United States Trade Issues: Back from Purgatory? Why Computer Software "Shrink-Wrap" Licenses Should Be Laid to Rest, 6 Tul. J. Int'l & Comp. L. 183, 189 (1998).
    • (1998) Tul. J. Int'l & Comp. L. 183 , vol.6 , pp. 189
    • Fraser, S.1
  • 135
    • 0347743143 scopus 로고    scopus 로고
    • See supra note 50 and accompanying text
    • See supra note 50 and accompanying text.
  • 136
    • 0346482465 scopus 로고    scopus 로고
    • See In re Alappat, 33 F.3d 1526, 1542-45 (Fed. Cir. 1994) (holding that patentability is not precluded even though computer program contains mathematical subject matter)
    • See In re Alappat, 33 F.3d 1526, 1542-45 (Fed. Cir. 1994) (holding that patentability is not precluded even though computer program contains mathematical subject matter).
  • 137
    • 0347743154 scopus 로고
    • Restraints on Alienation, Equitable Servitudes, and the Feudal Nature of Computer Software Licensing
    • See Thomas M.S. Hemnes, Restraints on Alienation, Equitable Servitudes, and the Feudal Nature of Computer Software Licensing, 71 Denv. U. L. Rev. 577, 578-80 (1994).
    • (1994) Denv. U. L. Rev. 577 , vol.71 , pp. 578-580
    • Hemnes, T.M.S.1
  • 138
    • 0345851584 scopus 로고    scopus 로고
    • note
    • See, e.g., Step-Saver Data Sys., Inc. v. Wyse Tech., 939 F.2d 91, 105-06 (3d Cir. 1991) (rejecting the defendant's argument that, under the U.C.C., shrinkwrap licenses were binding modifications); Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 269-70 (5th Cir. 1988) (affirming lower court's holding that shrinkwrap license at issue was an unenforceable contract of adhesion); Lemley, Intellectual Property, supra note 102, at 1248-53 (observing that before ProCD, shrinkwrap licenses were not enforced).
  • 139
    • 0345851583 scopus 로고    scopus 로고
    • 86 F.3d 1447 (7th Cir. 1996)
    • 86 F.3d 1447 (7th Cir. 1996).
  • 140
    • 0346482522 scopus 로고    scopus 로고
    • note
    • See ProCD, Inc. v. Zeidenberg, 908 F. Supp. 640, 644-45 (W.D. Wis.), rev'd, 86 F.3d 1447 (7th Cir. 1996).
  • 141
    • 0347112691 scopus 로고    scopus 로고
    • Id. at 645
    • Id. at 645.
  • 142
    • 0347112693 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 143
    • 0347112695 scopus 로고    scopus 로고
    • See id. at 644
    • See id. at 644.
  • 144
    • 0346482524 scopus 로고    scopus 로고
    • note
    • See id. at 649-50. Section 117 provides, in pertinent part: [I]t is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided: (1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner . . . . 17 U.S.C. § 117 (1994).
  • 145
    • 0347112694 scopus 로고    scopus 로고
    • note
    • See ProCD, 908 F. Supp. at 656-57. The Supreme Court, in Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340 (1991), reiterated that copyright will only be afforded those works that satisfy the constitutionally mandated standard of originality. See id. at 347-48. The Court further stated that it is a well-established proposition that facts, such as the phone and address listings in ProCD, and ideas are not copyrightable. See id. at 344.
  • 146
    • 0347112690 scopus 로고    scopus 로고
    • See ProCD, 908 F. Supp. at 644
    • See ProCD, 908 F. Supp. at 644.
  • 147
    • 0345851755 scopus 로고    scopus 로고
    • Id.
    • Id.
  • 148
    • 0347743156 scopus 로고    scopus 로고
    • See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1449 (7th Cir. 1996)
    • See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1449 (7th Cir. 1996).
  • 149
    • 0347743157 scopus 로고    scopus 로고
    • See id. at 1452-53
    • See id. at 1452-53.
  • 150
    • 0347112692 scopus 로고    scopus 로고
    • See id. at 1454-55
    • See id. at 1454-55.
  • 151
    • 0345851585 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 152
    • 0347112696 scopus 로고    scopus 로고
    • See id. at 1454
    • The Seventh Circuit stated that a "copyright is a right against the world. Contracts, by contrast, generally affect only their parties; strangers may do as they please, so contracts do not create 'exclusive rights.'" See id. at 1454.
  • 153
    • 0347743155 scopus 로고    scopus 로고
    • See id. at 1455
    • See id. at 1455.
  • 154
    • 0345851756 scopus 로고    scopus 로고
    • note
    • See, e.g., Expediters Int'l of Wash., Inc. v. Direct Line Cargo Management Servs., Inc., 995 F. Supp. 468, 483 (D.N.J. 1998) (noting that a contract claim is not equivalent to rights under copyright law because a promise is required); Lattie v. Murdach, 42 U.S.P.Q.2d (BNA) 1240, 1244 (N.D. Cal. 1997) (concluding that a contract claim is not equivalent to exclusive copyright rights); Architectronics, Inc. v. Control Sys., Inc., 935 F. Supp. 425, 438-41 (S.D.N.Y. 1996) (recognizing that the consensus among courts and commentators is that breach of contract claims are not preempted by the Copyright Act); Madison, supra note 16, at 1053 & n.104 (citing commentators).
  • 155
    • 0346482523 scopus 로고    scopus 로고
    • ("Mass-Market Licenses") (visited Apr. 11, 1999) Aug. 1, draft [hereinafter Uniform Computer Act]
    • See National Conference of Comm'rs on Unif. State Laws, Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208 ("Mass-Market Licenses") (visited Apr. 11, 1999) 〈http://www.law.uh.edu/ucc2b/ 080198/080198.html〉 (Aug. 1, 1998 draft) [hereinafter Uniform Computer Act]. The former Article 2B for Licenses, when finalized, will no longer supplement the UCC with provision for electronic contracts and software licensing agreements, but instead will be promulgated as the Uniform Computer Information Transactions Act. See National Conference of Comm'rs on Unif. State Laws & Am. Law Inst., NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not Be Part of UCC (visited Apr. 16, 1999) 〈http://www.ali.org/ali/pr040799.htm〉.
    • (1998) Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208
  • 156
    • 0346482525 scopus 로고    scopus 로고
    • visited Apr. 16
    • See National Conference of Comm'rs on Unif. State Laws, Uniform Commercial Code Article 2B: Software Contracts and Licenses of Information § 2B-208 ("Mass-Market Licenses") (visited Apr. 11, 1999) 〈http://www.law.uh.edu/ucc2b/ 080198/080198.html〉 (Aug. 1, 1998 draft) [hereinafter Uniform Computer Act]. The former Article 2B for Licenses, when finalized, will no longer supplement the UCC with provision for electronic contracts and software licensing agreements, but instead will be promulgated as the Uniform Computer Information Transactions Act. See National Conference of Comm'rs on Unif. State Laws & Am. Law Inst., NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not Be Part of UCC (visited Apr. 16, 1999) 〈http://www.ali.org/ali/pr040799.htm〉.
    • (1999) NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce That Legal Rules for Computer Information Will Not be Part of UCC
  • 157
    • 0345851594 scopus 로고    scopus 로고
    • See Uniform Computer Act, supra note 129, § 2B-208
    • See Uniform Computer Act, supra note 129, § 2B-208.
  • 158
    • 0346482681 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1029-31; McManis, Privatization, supra note 101, at 173
    • See Madison, supra note 16, at 1029-31; McManis, Privatization, supra note 101, at 173.
  • 159
    • 0345851595 scopus 로고    scopus 로고
    • See Tom W. Bell, Fair Use v. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine, 76 N.C. L. Rev. 557, 616-17 (1998) (arguing that a system of private contract and "fared use" may offer greater access to proprietary works)
    • See Tom W. Bell, Fair Use v. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine, 76 N.C. L. Rev. 557, 616-17 (1998) (arguing that a system of private contract and "fared use" may offer greater access to proprietary works).
  • 160
    • 0347112706 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1031-32
    • See Madison, supra note 16, at 1031-32.
  • 161
    • 0346727439 scopus 로고    scopus 로고
    • Beyond Preemption: The Law and Policy of Intellectual Property Licensing
    • hereinafter Lemley, Beyond Preemption
    • See Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property Licensing, 87 Cal. L. Rev. 111, 148 (1999) [hereinafter Lemley, Beyond Preemption].
    • (1999) Cal. L. Rev. 111 , vol.87 , pp. 148
    • Lemley, M.A.1
  • 162
    • 0346482536 scopus 로고    scopus 로고
    • See supra notes 97-107 and accompanying text
    • See supra notes 97-107 and accompanying text.
  • 163
    • 0347743171 scopus 로고    scopus 로고
    • See Lemley & O'Brien, supra note 71, at 276
    • See Lemley & O'Brien, supra note 71, at 276.
  • 164
    • 20944437114 scopus 로고
    • Legal Hybrids between the Patent and Copyright Paradigms
    • See J.H. Reichman, Legal Hybrids Between the Patent and Copyright Paradigms, 94 Colum. L. Rev. 2432, 2436-42 (1994).
    • (1994) Colum. L. Rev. 2432 , vol.94 , pp. 2436-2442
    • Reichman, J.H.1
  • 165
    • 0345851596 scopus 로고    scopus 로고
    • Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974)
    • Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974).
  • 166
    • 0347743172 scopus 로고    scopus 로고
    • See Johnson-Laird, supra note 53, at 843
    • See Johnson-Laird, supra note 53, at 843.
  • 167
    • 0346482521 scopus 로고    scopus 로고
    • For a detailed technical discussion regarding the complexities of reverse engineering, see id.
    • For a detailed technical discussion regarding the complexities of reverse engineering, see id.
  • 168
    • 0043001502 scopus 로고
    • Intellectual Property Protection and Reverse Engineering of Computer Programs in the United States and the European Community
    • hereinafter McManis, Intellectual Property
    • Reverse engineering is necessary for users and developers who desire to examine the structure and technical parameters of a computer program because object code is not intelligible to humans. See Charles R. McManis, Intellectual Property Protection and Reverse Engineering of Computer Programs in the United States and the European Community, 8 High Tech. L.J. 25, 29 (1993) [hereinafter McManis, Intellectual Property].
    • (1993) High Tech. L.J. 25 , vol.8 , pp. 29
    • McManis, C.R.1
  • 169
    • 0347112686 scopus 로고
    • Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation
    • PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370
    • See G. Gervaise Davis III, Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation, in 15th Annual Computer Law Institute 115, 142-45 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370, 1993). Reverse engineering for educational purposes likely is a "fair use" under 17 U.S.C. § 107. See id. at 142-43. Indeed, program source code is a valuable tool used to teach computer programming. See Clayton Walnum, Windows 98 Programming Secrets (1998) (enclosing on compact disk the source code for all programs in tutorial book).
    • (1993) 15th Annual Computer Law Institute 115 , pp. 142-145
    • Davis G.G. III1
  • 170
    • 0345851608 scopus 로고    scopus 로고
    • id. at 142-43
    • See G. Gervaise Davis III, Scope of Protection of Computer-Based Works: Reverse Engineering, Clean Rooms and Decompilation, in 15th Annual Computer Law Institute 115, 142-45 (PLI Pats., Copyrights, Trademarks, & Literary Prop. Course Handbook Series No. 370, 1993). Reverse engineering for educational purposes likely is a "fair use" under 17 U.S.C. § 107. See id. at 142-43. Indeed, program source code is a valuable tool used to teach computer programming. See Clayton Walnum, Windows 98 Programming Secrets (1998) (enclosing on compact disk the source code for all programs in tutorial book).
  • 171
    • 0347112710 scopus 로고    scopus 로고
    • See McManis, Intellectual Property, supra note 141, at 29-30
    • See McManis, Intellectual Property, supra note 141, at 29-30.
  • 172
    • 0347112705 scopus 로고    scopus 로고
    • See id. at 30-31
    • See id. at 30-31.
  • 173
    • 0347743151 scopus 로고    scopus 로고
    • See id. at 31
    • See id. at 31.
  • 174
    • 0347112667 scopus 로고    scopus 로고
    • Copyright Protection of Computer Program Structure
    • hereinafter Karjala, Program Structure
    • Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
    • (1998) Brook. L. Rev. 519 , vol.64 , pp. 532-533
    • Karjala, D.S.1
  • 175
    • 0003732343 scopus 로고
    • Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
    • (1988) Law and Economics , pp. 108-112
    • Cooter, R.1    Ulen, T.2
  • 176
    • 0345851620 scopus 로고    scopus 로고
    • See id.
    • Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
  • 177
    • 0345851613 scopus 로고    scopus 로고
    • see also Samuelson et al., supra note 16, at 2337-41
    • Computer program code is especially vulnerable to fast, precise, and inexpensive copying. See Dennis S. Karjala, Copyright Protection of Computer Program Structure, 64 Brook. L. Rev. 519, 532-33 (1998) [hereinafter Karjala, Program Structure]. Therefore, allowing unauthorized users to appropriate the benefits of a producer's investment implicates the classic "public goods" problem. See Robert Cooter & Thomas Ulen, Law and Economics 108-12 (1988). This occurs when producers, worried that they will not be able to recoup their investment in a good before its value is appropriated by free riders, undersupply the market for the good. See id.; see also Samuelson et al., supra note 16, at 2337-41 (discussing the public goods problem and market failure associated with computer software).
  • 178
    • 0345851607 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1097 (questioning how to conceive of the public domain in a fashion that allows private restrictions on access to a socially acceptable degree)
    • See Madison, supra note 16, at 1097 (questioning how to conceive of the public domain in a fashion that allows private restrictions on access to a socially acceptable degree).
  • 179
    • 0345851619 scopus 로고    scopus 로고
    • See infra Part II.B.1-2
    • See infra Part II.B.1-2.
  • 180
    • 0347112720 scopus 로고    scopus 로고
    • See infra Part II.B.3
    • See infra Part II.B.3.
  • 181
    • 0346482682 scopus 로고    scopus 로고
    • See infra Part II.B.4
    • See infra Part II.B.4.
  • 182
    • 0347112719 scopus 로고    scopus 로고
    • Digital Information as Property & Product: U.C.C. Article 2B
    • See David A. Rice, Digital Information as Property & Product: U.C.C. Article 2B, 22 U. Dayton L. Rev. 621, 636-38 (1997) (arguing that object code must be reverse engineered in order to free up the unprotected ideas embedded therein).
    • (1997) U. Dayton L. Rev. 621 , vol.22 , pp. 636-638
    • Rice, D.A.1
  • 183
    • 0345851616 scopus 로고    scopus 로고
    • note
    • For the statutory foundation of the fair use doctrine, see 17 U.S.C. § 107 (1994). The statute requires a consideration of four factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. Id.
  • 184
    • 0347358097 scopus 로고    scopus 로고
    • Legal Implications of Network Economic Effects
    • hereinafter Lemley & McGowan, Legal Implications
    • See Mark A. Lemley & David McGowan, Legal Implications of Network Economic Effects, 86 Calif. L. Rev. 479, 524-25 (1998) [hereinafter Lemley & McGowan, Legal Implications].
    • (1998) Calif. L. Rev. 479 , vol.86 , pp. 524-525
    • Lemley, M.A.1    McGowan, D.2
  • 185
    • 0345851615 scopus 로고    scopus 로고
    • note
    • See Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1253 (3d Cir. 1983); Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp. 449, 460 (N.D. Ga. 1987).
  • 186
    • 0346482553 scopus 로고    scopus 로고
    • note
    • See Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1539 n.18 (11th Cir. 1996) (holding that reverse engineering a computer program to reveal the unprotectable ideas embedded in the object code is a fair use); Atari Games Corp. v. Nintendo of Am. Inc., 975 F.2d 832, 843 (Fed. Cir. 1992) (same); DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 364 (E.D. Va. 1997) (same).
  • 187
    • 0346482554 scopus 로고    scopus 로고
    • 977 F.2d 1510 (9th Cir. 1992)
    • 977 F.2d 1510 (9th Cir. 1992).
  • 188
    • 0345851623 scopus 로고    scopus 로고
    • See id. at 1514-15
    • See id. at 1514-15.
  • 189
    • 0345851622 scopus 로고    scopus 로고
    • See id. at 1514-16
    • See id. at 1514-16.
  • 190
    • 0345851625 scopus 로고    scopus 로고
    • See id. at 1516
    • See id. at 1516.
  • 191
    • 0345851752 scopus 로고    scopus 로고
    • See Sega Enters. Ltd. v. Accolade, Inc., 785 F. Supp. 1392, 1396-99 (N.D. Cal.), aff'd in part, rev'd in part, 977 F.2d 1510 (9th Cir. 1992)
    • See Sega Enters. Ltd. v. Accolade, Inc., 785 F. Supp. 1392, 1396-99 (N.D. Cal.), aff'd in part, rev'd in part, 977 F.2d 1510 (9th Cir. 1992).
  • 192
    • 0347743191 scopus 로고    scopus 로고
    • See Sega, 977 F.2d at 1527
    • See Sega, 977 F.2d at 1527.
  • 193
    • 0345851614 scopus 로고    scopus 로고
    • See id. at 1522-23
    • See id. at 1522-23.
  • 194
    • 0347112726 scopus 로고    scopus 로고
    • See supra note 155 and accompanying text
    • See supra note 155 and accompanying text.
  • 195
    • 0345851612 scopus 로고    scopus 로고
    • See Lemley & McGowan, Legal Implications, supra note 153, at 525
    • See Lemley & McGowan, Legal Implications, supra note 153, at 525.
  • 196
    • 0346482560 scopus 로고    scopus 로고
    • See id. at 524
    • See id. at 524.
  • 197
    • 0345851621 scopus 로고    scopus 로고
    • See 35 U.S.C. § 271(a) (1994)
    • See 35 U.S.C. § 271(a) (1994).
  • 198
    • 0345851626 scopus 로고    scopus 로고
    • See id. § 112
    • See id. § 112.
  • 199
    • 0347112723 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 200
    • 0347112610 scopus 로고    scopus 로고
    • See Slimfold Mfg. Co. v. Kinkead Indus., Inc., 932 F.2d 1453, 1457 (Fed. Cir. 1991)
    • See Slimfold Mfg. Co. v. Kinkead Indus., Inc., 932 F.2d 1453, 1457 (Fed. Cir. 1991).
  • 201
    • 0347112727 scopus 로고    scopus 로고
    • See Lemley & O'Brien, supra note 71, at 295 n.259
    • See Lemley & O'Brien, supra note 71, at 295 n.259.
  • 202
    • 0346482562 scopus 로고    scopus 로고
    • See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997)
    • See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997); Lawrence D. Graham & Richard O. Zerbe, Jr., Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure, 22 Rutgers Computer & Tech. L.J. 61, 96-97 (1996).
  • 203
    • 0347743185 scopus 로고    scopus 로고
    • Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure
    • See Robotic Vision Sys., Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997); Lawrence D. Graham & Richard O. Zerbe, Jr., Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and Disclosure, 22 Rutgers Computer & Tech. L.J. 61, 96-97 (1996).
    • (1996) Rutgers Computer & Tech. L.J. 61 , vol.22 , pp. 96-97
    • Graham, L.D.1    Zerbe R.O., Jr.2
  • 204
    • 0347112732 scopus 로고    scopus 로고
    • See Lemley & McGowan, Legal Implications, supra note 153, at 524 n.195
    • See Lemley & McGowan, Legal Implications, supra note 153, at 524 n.195.
  • 205
    • 0347743183 scopus 로고    scopus 로고
    • See Graham & Zerbe, supra note 171, at 99
    • See Graham & Zerbe, supra note 171, at 99.
  • 206
    • 0347112671 scopus 로고    scopus 로고
    • See 35 U.S.C. § 271(a) (1994)
    • See 35 U.S.C. § 271(a) (1994).
  • 207
    • 0346482566 scopus 로고    scopus 로고
    • note
    • See, e.g., Cataphote Corp. v. Hudson, 422 F.2d 1290, 1293 (5th Cir. 1970) (holding that it is not a misappropriation to discover a trade secret by reverse engineering); Restatement (Third) of Unfair Competition § 43 (1995) ("Independent discovery and analysis of publicly available products or information are not improper means of acquisition.").
  • 208
    • 0347652677 scopus 로고    scopus 로고
    • Fencing Cyberspace: Drawing Borders in a Virtual World
    • hereinafter O'Rourke, Fencing Cyberspace
    • See Maureen A. O'Rourke, Fencing Cyberspace: Drawing Borders in a Virtual World, 82 Minn. L. Rev. 609, 612-13 (1998) [hereinafter O'Rourke, Fencing Cyberspace].
    • (1998) Minn. L. Rev. 609 , vol.82 , pp. 612-613
    • O'Rourke, M.A.1
  • 209
    • 0346482563 scopus 로고    scopus 로고
    • note
    • See Madison, supra note 16, at 1130. If reverse engineering is forbidden by contract, software developers may be granted de facto monopolies over ideas, processes, and systems that have not met the standards for copyright or patent protection. See DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 364 (E.D. Va. 1997); Samuelson et al., supra note 16, at 2390 n.329.
  • 210
    • 0347112734 scopus 로고    scopus 로고
    • See supra Part II.B.1
    • See supra Part II.B.1.
  • 211
    • 0346482575 scopus 로고    scopus 로고
    • See supra Part II.B.1-3
    • See supra Part II.B.1-3.
  • 212
    • 0346482574 scopus 로고    scopus 로고
    • See McManis, Privatization, supra note 101, at 176
    • See McManis, Privatization, supra note 101, at 176.
  • 213
    • 0346482572 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1137-38
    • See Madison, supra note 16, at 1137-38.
  • 214
    • 0005452186 scopus 로고    scopus 로고
    • Copyright and the Jurisprudence of Self-Help
    • hereinafter Cohen, Self-Help
    • See Julie E. Cohen, Copyright and the Jurisprudence of Self-Help, 13 Berkeley Tech. L.J. 1089, 1130-31 (1998) [hereinafter Cohen, Self-Help].
    • (1998) Berkeley Tech. L.J. 1089 , vol.13 , pp. 1130-1131
    • Cohen, J.E.1
  • 215
    • 0039645921 scopus 로고    scopus 로고
    • Copyright Preemption after the ProCD Case: A Market-Based Approach
    • hereinafter O'Rourke, Copyright Preemption.
    • See Maureen A. O'Rourke, Copyright Preemption After the ProCD Case: A Market-Based Approach, 12 Berkeley Tech. L.J. 53, 80 (1997) [hereinafter O'Rourke, Copyright Preemption].
    • (1997) Berkeley Tech. L.J. 53 , vol.12 , pp. 80
    • O'Rourke, M.A.1
  • 216
    • 0347112733 scopus 로고    scopus 로고
    • See supra notes 128-30 and accompanying text
    • See supra notes 128-30 and accompanying text.
  • 217
    • 0346482571 scopus 로고    scopus 로고
    • No. C-97-20367-JF, 1998 WL 740798 (N.D. Cal. June 9, 1998)
    • No. C-97-20367-JF, 1998 WL 740798 (N.D. Cal. June 9, 1998).
  • 218
    • 0347112736 scopus 로고    scopus 로고
    • See id. at *4-*5
    • See id. at *4-*5.
  • 219
    • 0345851751 scopus 로고    scopus 로고
    • note
    • The Supremacy Clause provides, in pertinent part, that the "Constitution, and the Laws of the United States which shall be made in Pursuance thereof . . . shall be the supreme Law of the Land." U.S. Const, art. VI, § 2.
  • 220
    • 0347112866 scopus 로고    scopus 로고
    • See H.R. Rep. No. 94-1476, at 131 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5747
    • See H.R. Rep. No. 94-1476, at 131 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5747.
  • 221
    • 0347112738 scopus 로고    scopus 로고
    • See Cohen, Self-Help, supra note 182, at 1130
    • Indeed, Congress, when enacting § 301, did not consider the possibility of intervening state contractual rights that would permit the displacement of copyright. See Cohen, Self-Help, supra note 182, at 1130. Additionally, the ProCD court may have failed to consider preemption under the Supremacy Clause. See D.C. Toedt III, COUNTERPOINT: Shrinkwrap License Enforceability Issues, Computer Law., Sept. 1996, at 7, 8-9.
  • 222
    • 0345851633 scopus 로고    scopus 로고
    • COUNTERPOINT: Shrinkwrap License Enforceability Issues
    • Sept.
    • Indeed, Congress, when enacting § 301, did not consider the possibility of intervening state contractual rights that would permit the displacement of copyright. See Cohen, Self-Help, supra note 182, at 1130. Additionally, the ProCD court may have failed to consider preemption under the Supremacy Clause. See D.C. Toedt III, COUNTERPOINT: Shrinkwrap License Enforceability Issues, Computer Law., Sept. 1996, at 7, 8-9.
    • (1996) Computer Law , pp. 7
    • Toedt D.C. III1
  • 223
    • 0347112737 scopus 로고    scopus 로고
    • See California Fed. Sav. & Loan Ass'n v. Guerra, 479 U.S. 272, 280-81 (1987)
    • See California Fed. Sav. & Loan Ass'n v. Guerra, 479 U.S. 272, 280-81 (1987).
  • 224
    • 0347112739 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 225
    • 0347112740 scopus 로고    scopus 로고
    • See id. at 281
    • See id. at 281.
  • 226
    • 0346482576 scopus 로고    scopus 로고
    • See Cohen, Self-Help, supra note 182, at 1130-31
    • See Cohen, Self-Help, supra note 182, at 1130-31.
  • 227
    • 0347112742 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 228
    • 0346482577 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 229
    • 0347112875 scopus 로고    scopus 로고
    • note
    • ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1455 (7th Cir. 1996) (citation omitted). But see McManis, Privatization, supra note 101, at 182-84 (contending that such provisions should be preempted). The court presumably would analogize prohibitions against reverse engineering to encryption devices, which similarly hinder comprehension of a program's source code.
  • 230
    • 0345851627 scopus 로고    scopus 로고
    • See Lemley, Beyond Preemption, supra note 134, at 144-51
    • See Lemley, Beyond Preemption, supra note 134, at 144-51.
  • 231
    • 0346482578 scopus 로고    scopus 로고
    • See id. at 145
    • See id. at 145.
  • 232
    • 0347108276 scopus 로고    scopus 로고
    • Id.
    • Id.; see also Apik Minassian, Comment, The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements, 45 UCLA L. Rev. 569, 601-07 (1997) (urging a more nuanced approach to preemption under § 301).
  • 233
    • 0347108276 scopus 로고    scopus 로고
    • The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements
    • Comment, (urging a more nuanced approach to preemption under § 301)
    • Id.; see also Apik Minassian, Comment, The Death of Copyright: Enforceability of Shrinkwrap Licensing Agreements, 45 UCLA L. Rev. 569, 601-07 (1997) (urging a more nuanced approach to preemption under § 301).
    • (1997) UCLA L. Rev. 569 , vol.45 , pp. 601-607
    • Minassian, A.1
  • 234
    • 0347112741 scopus 로고    scopus 로고
    • See Lemley, Beyond Preemption, supra note 134, at 146
    • See Lemley, Beyond Preemption, supra note 134, at 146.
  • 235
    • 0347743234 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 236
    • 0347112786 scopus 로고    scopus 로고
    • 25 F. Supp. 2d 1218 (D. Utah 1997)
    • 25 F. Supp. 2d 1218 (D. Utah 1997).
  • 237
    • 0346482569 scopus 로고    scopus 로고
    • See id. at 1222
    • See id. at 1222.
  • 238
    • 0345851666 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 239
    • 0346482618 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 240
    • 0345851749 scopus 로고    scopus 로고
    • See id. at 1229
    • See id. at 1229.
  • 241
    • 0347743240 scopus 로고    scopus 로고
    • note
    • See id. The "first sale" doctrine provides that "the owner of a particular copy . . . lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy . . . ." 17 U.S.C. § 109(a) (1994).
  • 242
    • 0345851635 scopus 로고    scopus 로고
    • See Novell, 25 F. Supp. 2d at 1230
    • See Novell, 25 F. Supp. 2d at 1230.
  • 243
    • 0346482617 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 244
    • 0346482573 scopus 로고    scopus 로고
    • See supra notes 128-29 and accompanying text
    • See supra notes 128-29 and accompanying text.
  • 245
    • 0038894321 scopus 로고    scopus 로고
    • Breaking Barriers: The Relation between Contract and Intellectual Property Law
    • hereinafter Nimmer, Breaking Barriers
    • See Raymond T. Nimmer, Breaking Barriers: The Relation Between Contract and Intellectual Property Law, 13 Berkeley Tech. L.J. 827, 883 (1998) [hereinafter Nimmer, Breaking Barriers].
    • (1998) Berkeley Tech. L.J. 827 , vol.13 , pp. 883
    • Nimmer, R.T.1
  • 246
    • 0346482613 scopus 로고    scopus 로고
    • See id. at 831 The claim that first sale rights control is . . . a matter of turning the relationship between contract and copyright on its head
    • See id. at 831 ("The claim that first sale rights control is . . . a matter of turning the relationship between contract and copyright on its head.").
  • 247
    • 0346482611 scopus 로고    scopus 로고
    • See id. at 870-71
    • The misuse doctrine gives courts a means by which to prevent over-reaching to achieve anti-competitive ends. See id. at 870-71.
  • 248
    • 0347743239 scopus 로고    scopus 로고
    • See Lasercomb Am., Inc. v. Reynolds, 911 F.2d 970, 977 (4th Cir. 1990)
    • See Lasercomb Am., Inc. v. Reynolds, 911 F.2d 970, 977 (4th Cir. 1990).
  • 249
    • 0346482612 scopus 로고    scopus 로고
    • See Morton Salt Co. v. G.S. Suppiger Co., 314 U.S. 488, 491-92 (1942)
    • See Morton Salt Co. v. G.S. Suppiger Co., 314 U.S. 488, 491-92 (1942).
  • 250
    • 0347112787 scopus 로고    scopus 로고
    • 911 F.2d 970 (4th Cir. 1990)
    • 911 F.2d 970 (4th Cir. 1990).
  • 251
    • 0347112797 scopus 로고    scopus 로고
    • See id. at 971
    • See id. at 971.
  • 252
    • 0345851677 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 253
    • 0345851672 scopus 로고    scopus 로고
    • See id. at 972
    • See id. at 972.
  • 254
    • 0347743235 scopus 로고    scopus 로고
    • See Lasercomb Am., Inc. v. Holiday Steel Rule Die Corp., 656 F. Supp. 612, 616 (M.D.N.C. 1987) rev'd, 911 F.2d 970 (1990)
    • See Lasercomb Am., Inc. v. Holiday Steel Rule Die Corp., 656 F. Supp. 612, 616 (M.D.N.C. 1987) rev'd, 911 F.2d 970 (1990).
  • 255
    • 0345851679 scopus 로고    scopus 로고
    • See Lasercomb, 911 F.2d at 978
    • See Lasercomb, 911 F.2d at 978.
  • 256
    • 0347743244 scopus 로고    scopus 로고
    • Id. (footnote omitted)
    • Id. (footnote omitted).
  • 257
    • 0346482619 scopus 로고    scopus 로고
    • See id. at 977
    • See id. at 977.
  • 258
    • 0347743241 scopus 로고    scopus 로고
    • See id. at 978
    • See id. at 978.
  • 259
    • 0347743245 scopus 로고    scopus 로고
    • note
    • See P.C. Films Corp. v. MGM/UA Home Video, Inc., 138 F.3d 453, 457-58 (2d Cir.) (holding that a "perpetual" license is enforceable, at least for the term of the copyright), cert. denied, 119 S. Ct. 542 (1998). Moreover, section 2B-308 ("Duration of Contract") provides a default rule of a perpetual license in certain instances. See Uniform Computer Act, supra note 129, § 2B-308(2)(b).
  • 260
    • 0345851678 scopus 로고    scopus 로고
    • See Cohen, Electronic Vigilantism, supra note 82, at 1194-98
    • See Cohen, Electronic Vigilantism, supra note 82, at 1194-98.
  • 261
    • 0002705641 scopus 로고    scopus 로고
    • Overstepping the Bounds: Copyright Misuse
    • Nov.
    • See William E. Thomson, Jr. & Margaret Y. Chu, Overstepping the Bounds: Copyright Misuse, Computer Law., Nov. 1998, at 1, 5.
    • (1998) Computer Law , pp. 1
    • Thomson W.E., Jr.1    Chu, M.Y.2
  • 262
    • 0347743253 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 263
    • 0345851703 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 264
    • 0345851702 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1116 n.382
    • See Madison, supra note 16, at 1116 n.382.
  • 265
    • 0345851705 scopus 로고    scopus 로고
    • note
    • Cf. id. at 1139 (advocating an express delegation of authority from Congress to federal courts in order to preserve the public domain). Allowing a court to strike contractual provisions based on its view of what proper policy should be, however, arguably undermines societal benefits produced by the commercialization of information. See Nimmer, Breaking Barriers, supra note 211, at 872.
  • 266
    • 0347112813 scopus 로고    scopus 로고
    • See supra note 49 and accompanying text
    • See supra note 49 and accompanying text.
  • 267
    • 0345851745 scopus 로고    scopus 로고
    • See Haynes, supra note 49, at 254
    • See Haynes, supra note 49, at 254.
  • 268
    • 0347743323 scopus 로고    scopus 로고
    • note
    • Most courts refuse to recognize an independent good faith cause of action under Article 2 of the UCC. See Steven H. Hilfinger, Note, K.M.C. Co. v. Irving Trust Co.: Discretionary Financing and the Implied Duty of Good Faith, 81 Nw. U. L. Rev. 539, 550 (1987).
  • 269
    • 0346762517 scopus 로고    scopus 로고
    • A New Look at Trade Secret Law: Doctrine in Search of Justification
    • See Robert G. Bone, A New Look at Trade Secret Law: Doctrine in Search of Justification, 86 Cal. L. Rev. 241, 296 (1998).
    • (1998) Cal. L. Rev. 241 , vol.86 , pp. 296
    • Bone, R.G.1
  • 270
    • 0347112816 scopus 로고    scopus 로고
    • note
    • The common theme that joins the approaches previously discussed is that prohibitions against reverse engineering represent an improper extension of intellectual property rights. See Nimmer, Breaking Barriers, supra note 211, at 867. Whether prohibitions against reverse engineering improperly extend, or merely buttress, preexisting intellectual property rights hinges upon diametrically opposed constructions of the intellectual property laws. See infra notes 237-41 and accompanying text.
  • 271
    • 0347112788 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 272
    • 0347112818 scopus 로고    scopus 로고
    • See supra note 146
    • See supra note 146.
  • 273
    • 0345851706 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1124
    • See Madison, supra note 16, at 1124.
  • 274
    • 0347743275 scopus 로고    scopus 로고
    • See O'Rourke, Copyright Preemption, supra note 183, at 78
    • See O'Rourke, Copyright Preemption, supra note 183, at 78.
  • 275
    • 0345851710 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 276
    • 0347743277 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 277
    • 0346482641 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1124; O'Rourke, Copyright Preemption, supra note 183, at 81
    • See Madison, supra note 16, at 1124; O'Rourke, Copyright Preemption, supra note 183, at 81.
  • 278
    • 0346482640 scopus 로고    scopus 로고
    • See supra note 146
    • See supra note 146.
  • 279
    • 0346482635 scopus 로고    scopus 로고
    • See Clapes, supra note 15, at 961
    • See Clapes, supra note 15, at 961.
  • 280
    • 0347743321 scopus 로고    scopus 로고
    • See Kathryn D. Piele, Three Years After Campbell v. Acuff-Rose Music, Inc.: What Is Fair Game for Parodists?, 18 Loy. L.A. Ent. L.J. 75, 99 (1997)
    • See Kathryn D. Piele, Three Years After Campbell v. Acuff-Rose Music, Inc.: What Is Fair Game for Parodists?, 18 Loy. L.A. Ent. L.J. 75, 99 (1997).
  • 281
    • 0347743276 scopus 로고    scopus 로고
    • See Clapes, supra note 15, at 947-48
    • See Clapes, supra note 15, at 947-48.
  • 282
    • 0345851742 scopus 로고    scopus 로고
    • See id. at 947
    • See id. at 947.
  • 283
    • 0347743270 scopus 로고    scopus 로고
    • See id. at 962
    • See id. at 962.
  • 284
    • 0347112814 scopus 로고    scopus 로고
    • See id. at 963; Miller, supra note 15, at 1026-27
    • See id. at 963; Miller, supra note 15, at 1026-27.
  • 285
    • 0346482610 scopus 로고    scopus 로고
    • See Miller, supra note 15, at 1031
    • See Miller, supra note 15, at 1031.
  • 286
    • 0346482639 scopus 로고    scopus 로고
    • Open-Source Software Takes Surprise Leap in Popularity
    • Feb. 9
    • See, e.g., Amy Harmon, Open-Source Software Takes Surprise Leap in Popularity, San Diego Union-Trib., Feb. 9, 1999, at 3 (stating that open source software was one of the year's most striking developments); Mark Leibovich, The Spreading Grass- Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software, Wash. Post, Dec. 3, 1998, at A1 (noting that open source software has recently "forged dramatic mainstream inroads").
    • (1999) San Diego Union-Trib. , pp. 3
    • Harmon, A.1
  • 287
    • 24244463737 scopus 로고    scopus 로고
    • The Spreading Grass-Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software
    • Dec. 3
    • See, e.g., Amy Harmon, Open-Source Software Takes Surprise Leap in Popularity, San Diego Union-Trib., Feb. 9, 1999, at 3 (stating that open source software was one of the year's most striking developments); Mark Leibovich, The Spreading Grass-Roots Threat to Microsoft: Eric Raymond Crusades for "Open-Source" Software, Wash. Post, Dec. 3, 1998, at A1 (noting that open source software has recently "forged dramatic mainstream inroads").
    • (1998) Wash. Post
    • Leibovich, M.1
  • 288
    • 0345851709 scopus 로고    scopus 로고
    • If You Love Your Online Business Set Your Code Free
    • Jan.
    • See Harvey Blume, If You Love Your Online Business Set Your Code Free, New Media, Jan. 1999, at 26, 26.
    • (1999) New Media , pp. 26
    • Blume, H.1
  • 289
    • 0347743316 scopus 로고    scopus 로고
    • A Reality Check on "Open Source"
    • Feb. 8
    • See Kevin Tolly, A Reality Check on "Open Source", Network World, Feb. 8, 1999, at 22, 22.
    • (1999) Network World , pp. 22
    • Tolly, K.1
  • 290
    • 0346482642 scopus 로고    scopus 로고
    • Mar. 15
    • See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
    • (1999) Apple's Open-Source Movement
    • Kahney, L.1    Sprenger, P.2
  • 291
    • 0345851746 scopus 로고    scopus 로고
    • Jan. 28
    • See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
    • (1999) Jini: Start of "Semi-Open" Source Movement
    • Maclachlan, M.1
  • 292
    • 84924008465 scopus 로고    scopus 로고
    • Robust Open-Source Software
    • Feb.
    • See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
    • (1998) Comm. of the ACM , pp. 128
    • Neumann, P.G.1
  • 293
    • 0346482512 scopus 로고    scopus 로고
    • Feb. 12
    • See, e.g., Leander Kahney & Polly Sprenger, Apple's Open-Source Movement, (Mar. 15, 1999) 〈http://www.wired.com/news/technology/story/18488.html?wnpgl〉 (discussing the difference between free software and open source software); Malcolm Maclachlan, Jini: Start of "Semi-Open" Source Movement, (Jan. 28, 1999) 〈http:// www.techweb.com/printableArticle?doc_idB19990128S0001〉 (noting that the Sun Community Source License is a combination of open source and proprietary models); Peter G. Neumann, Robust Open-Source Software, Comm. of the ACM, Feb. 1998, at 128, 128 (providing examples of open, but proprietary, software). The licenses typically allow users to alter the original source code, but all modifications must be sent back to the right holder. See Deborah Gage, Should Java Go Open Source? (Feb. 12, 1999) 〈http://www.zdnet.com/zdnn/stories/news/0,4586,2208772,00.html〉.
    • (1999) Should Java Go Open Source?
    • Gage, D.1
  • 294
    • 0345851743 scopus 로고    scopus 로고
    • See Blume, supra note 253, at 29
    • See Blume, supra note 253, at 29.
  • 295
    • 0343984463 scopus 로고    scopus 로고
    • Programs to the People
    • Jan.-Feb.
    • See Charles C. Mann, Programs to the People, Tech. Rev., Jan.-Feb. 1999, at 36, 41.
    • (1999) Tech. Rev. , pp. 36
    • Mann, C.C.1
  • 297
    • 0346482673 scopus 로고    scopus 로고
    • See Blume, supra note 253, at 29
    • See Blume, supra note 253, at 29.
  • 298
    • 0347743278 scopus 로고    scopus 로고
    • note
    • See Haldiman, supra note 86, at 654. Object-orientated programming will make portions of computer code easily reusable. See id. at 653. Additionally, automated rights management technologies will provide manufacturers with the ability to police the use of their code, and allow users to make provision with the proprietary right holder for the use of that code so that they are not considered infringers. See Bell, supra note 132, at 564-67.
  • 299
    • 0040900932 scopus 로고    scopus 로고
    • For the Love of Hacking
    • Aug. 10
    • See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
    • (1998) Forbes , pp. 94
    • McHugh, J.1
  • 300
    • 0347112862 scopus 로고    scopus 로고
    • Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software)
    • See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
  • 301
    • 0346482674 scopus 로고    scopus 로고
    • Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry)
    • See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
  • 302
    • 24244472119 scopus 로고    scopus 로고
    • Apple Adopts "Open Source" Code Strategy
    • Mar. 17
    • See, e.g., Josh McHugh, For the Love of Hacking, Forbes, Aug. 10, 1998, at 94, 100 (noting that open source software is an alternative to closed commercial software and arguing that perhaps Microsoft does not truly have a monopoly in the software industry); Levy, Code Warriors, supra note 4, at 60 (documenting shift towards open source software); Leibovich, supra note 252 (stating that open source software poses a significant threat to Microsoft's continued domination of the software industry); John Markoff, Apple Adopts "Open Source" Code Strategy, N.Y. Times, Mar. 17, 1999, at C1 (noting that Apple has embraced open source software).
    • (1999) N.Y. Times
    • Markoff, J.1
  • 304
    • 0347112812 scopus 로고    scopus 로고
    • See McHugh, supra note 261, at 100
    • See McHugh, supra note 261, at 100.
  • 305
    • 0347112817 scopus 로고    scopus 로고
    • See supra note 256 and accompanying text
    • See supra note 256 and accompanying text.
  • 306
    • 0347743273 scopus 로고    scopus 로고
    • See Lemley & McGowan, Legal Implications, supra note 153, at 523-30
    • See Lemley & McGowan, Legal Implications, supra note 153, at 523-30.
  • 307
    • 84864965037 scopus 로고
    • Copyright Misuse and Tying: Will Courts Stop Misusing Misuse?
    • See Troy Paredes, Copyright Misuse and Tying: Will Courts Stop Misusing Misuse?, 9 High Tech. L.J. 271, 309-15 (1994).
    • (1994) High Tech. L.J. 271 , vol.9 , pp. 309-315
    • Paredes, T.1
  • 308
    • 0346482622 scopus 로고    scopus 로고
    • See Karjala, Program Structure, supra note 146, at 535
    • See Karjala, Program Structure, supra note 146, at 535.
  • 309
    • 0346482637 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 310
    • 0346482632 scopus 로고    scopus 로고
    • July 2
    • See Craig Menefee, PC Briefs (July 2, 1998) 〈http://www.newsbytes.com/news/ 98/114070.html〉 Godfrey Nolan, Java: Easy Target for Illegal Re-Engineers (Mar. 3, 1997) 〈http://www.computerwire.com/cbr/1997/2206_29a.htm〉.
    • (1998) PC Briefs
    • Menefee, C.1
  • 311
    • 0347743243 scopus 로고    scopus 로고
    • Mar. 3
    • See Craig Menefee, PC Briefs (July 2, 1998) 〈http://www.newsbytes.com/news/ 98/114070.html〉 Godfrey Nolan, Java: Easy Target for Illegal Re-Engineers (Mar. 3, 1997) 〈http://www.computerwire.com/cbr/1997/2206_29a.htm〉.
    • (1997) Java: Easy Target for Illegal Re-Engineers
    • Nolan, G.1
  • 312
    • 0347743252 scopus 로고    scopus 로고
    • See Lemley & McGowan, Competitive Proprietary, supra note 13, at 485
    • See Lemley & McGowan, Competitive Proprietary, supra note 13, at 485.
  • 313
    • 0345851634 scopus 로고    scopus 로고
    • See Nolan, supra note 269
    • See Nolan, supra note 269.
  • 314
    • 0347112796 scopus 로고    scopus 로고
    • note
    • Moreover, U.S. policy regarding the legality of reverse engineering computer programs is ambiguous. When Japan considered expressly incorporating a reverse engineering exception into its copyright laws, the United States vigorously opposed the proposal, fearing that the exception would allow American software to be unduly appropriated by Japanese firms. See Graham & Zerbe, supra note 171, at 69. Further, while certain federal intellectual property statutes expressly recognize a right to reverse engineer, the copyright and patent statutes contain no similar exception. In the Semiconductor Chip Protection Act of 1984, see Pub. L. No. 98-620, tit. III, 98 Stat. 3347 (codified at 17 U.S.C. §§ 901-914 (1994)), Congress expressly recognized the right to reverse engineer. See 17 U.S.C. § 906(a); see also Brooktree Corp. v. Advanced Micro Devices, Inc., 977 F.2d 1555, 1565-67 (Fed. Cir. 1992) (discussing the Act). Thus, the negative implication arising from the absence of specific allowance for reverse engineering under the copyright and patent statutes is that such a right was never intended by Congress, but was read into the law by courts addressing particularized market conditions. Evidence that supports this argument is that recently proposed legislation, if enacted, may have the impact of making reverse engineering a federal felony. See Mills, supra note 68, at 127-28. Additionally, the recently enacted Digital Millennium Copyright Act prohibits circumvention of "technological measures" that control access to copyrighted works. See Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998). Query whether compiling source code into object code is a technological measure that controls access to a copyrighted program. If it is, one may argue that reverse engineering circumvents this process, and is, therefore, prohibited by the Act.
  • 315
    • 0345851670 scopus 로고    scopus 로고
    • See supra notes 177-80 and accompanying text
    • See supra notes 177-80 and accompanying text.
  • 316
    • 0347112791 scopus 로고    scopus 로고
    • See Cohen, Self-Help, supra note 182, at 1090
    • See Cohen, Self-Help, supra note 182, at 1090.
  • 317
    • 0345851671 scopus 로고    scopus 로고
    • See supra note 255 and accompanying text
    • See supra note 255 and accompanying text.
  • 318
    • 0347112799 scopus 로고    scopus 로고
    • See supra notes 97-107 and accompanying text
    • See supra notes 97-107 and accompanying text.
  • 319
    • 0347112802 scopus 로고    scopus 로고
    • See supra Part I.A-B
    • See supra Part I.A-B.
  • 320
    • 0346482623 scopus 로고    scopus 로고
    • See supra Part I.C-D
    • See supra Part I.C-D.
  • 321
    • 0347112801 scopus 로고    scopus 로고
    • See supra note 225. As a practical matter, however, the software is likely to be obsolete long before the expiration of the license
    • See supra note 225. As a practical matter, however, the software is likely to be obsolete long before the expiration of the license.
  • 322
    • 0346482636 scopus 로고    scopus 로고
    • See supra notes 131-33 and accompanying text
    • See supra notes 131-33 and accompanying text.
  • 323
    • 0347112815 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 325
    • 0347743258 scopus 로고    scopus 로고
    • note
    • See Lemley, Beyond Preemption, supra note 134, at 125; see also Lemley & McGowan, Legal Implications, supra note 153, at 526 ("[I]t does not make economic sense to give complete control over information to owners of intellectual property.").
  • 326
    • 0347112803 scopus 로고    scopus 로고
    • See Lemley, Beyond Preemption, supra note 134, at 124
    • See Lemley, Beyond Preemption, supra note 134, at 124.
  • 327
    • 0346482625 scopus 로고    scopus 로고
    • Id. at 125
    • Id. at 125.
  • 328
    • 0347743260 scopus 로고    scopus 로고
    • See supra notes 142-44 and accompanying text
    • See supra notes 142-44 and accompanying text.
  • 329
    • 0347112807 scopus 로고    scopus 로고
    • See supra notes 145-46 and accompanying text
    • See supra notes 145-46 and accompanying text.
  • 330
    • 0345851689 scopus 로고    scopus 로고
    • See supra notes 145-46 and accompanying text
    • See supra notes 145-46 and accompanying text.
  • 331
    • 84935444559 scopus 로고
    • Tailoring Legal Protection for Computer Software
    • Samuelson et al., supra note 16, at 2414-15
    • See Peter S. Menell, Tailoring Legal Protection for Computer Software, 39 Stan. L. Rev. 1329, 1371 (1987); Samuelson et al., supra note 16, at 2414-15.
    • (1987) Stan. L. Rev. 1329 , vol.39 , pp. 1371
    • Menell, P.S.1
  • 332
    • 0347743259 scopus 로고    scopus 로고
    • See Samuelson et al., supra note 16, at 2414
    • See Samuelson et al., supra note 16, at 2414.
  • 333
    • 0347743261 scopus 로고    scopus 로고
    • See id. at 2392-93 ("[A] complete ban [on reverse engineering] is contrary to basic norms of competition law.")
    • See id. at 2392-93 ("[A] complete ban [on reverse engineering] is contrary to basic norms of competition law.").
  • 334
    • 0347743266 scopus 로고    scopus 로고
    • See Madison, supra note 16, at 1135
    • See Madison, supra note 16, at 1135.
  • 335
    • 0345851687 scopus 로고    scopus 로고
    • See supra note 17
    • See supra note 17.
  • 336
    • 0347743271 scopus 로고    scopus 로고
    • note
    • If a program can be reverse engineered by competitors, the rights holder necessarily does not have exclusive control over his work. Further, as the intellectual property laws do not create monopolies, see Clapes, supra note 15, at 948-49, contracts necessary to help establish a period of true exclusive control.
  • 337
    • 0347743272 scopus 로고    scopus 로고
    • note
    • Giving producers the ability to protect their software under copyright, patent, trade secret, and contract laws will provide them with the ability to preserve their natural lead-time in the market, which lead-time is necessary to prevent market failure. See Samuelson et al., supra note 16, at 2413.
  • 338
    • 0347743265 scopus 로고    scopus 로고
    • note
    • Indeed, there is considerable value in familiarizing consumers with particular software. See id. at 2375. Second-comers will find it difficult to lure consumers away from software with which they are familiar and have spent time to learn. See id.
  • 339
    • 0345851688 scopus 로고    scopus 로고
    • note
    • If producers are permitted to prevent the reverse engineering of their software, this will lessen the need for the producer to monitor the market for reverse engineering technologies, and expend resources on thwarting attempts at reverse engineering and on monitoring legislative efforts to address reverse engineering. See O'Rourke, Drawing the Boundary, supra note 104, at 499.
  • 340
    • 21944435194 scopus 로고    scopus 로고
    • Coercion, Deception, and Other Demand-Increasing Practices in Antitrust Law
    • Microsoft's dominance undeniably has produced numerous societal benefits, such as standardization. Professor Mark Patterson notes that, even if competition is eliminated, a standard-enhancing move may increase efficiency overall because consumers will benefit from the increased adoption of the standard. See Mark R. Patterson, Coercion, Deception, and Other Demand-Increasing Practices in Antitrust Law, 66 Antitrust L.J. 1, 74 n.323 (1997).
    • (1997) Antitrust L.J. 1 , vol.66 , Issue.323 , pp. 74
    • Patterson, M.R.1
  • 341
    • 0347743264 scopus 로고    scopus 로고
    • note
    • After the expiration of the standard-setting time period, the government, by requiring disclosure, would open the standard in order to encourage competition. See Lemley & McGowan, Competitive Propriety, supra note 13, at 506 (arguing that the law should encourage open standards); supra note 1 and accompanying text (contending that "openness" is good). The time at which disclosure must occur may be based on the date of the first commercial distribution of the software, see 17 U.S.C. §§ 904(a), 908(a) (1994), and should vary depending on the nature of the software program. For example, Congress could require that the source code to operating systems be disclosed after a shorter time period than application programs. For a discussion of the differences between operating systems and application programs, see Samuelson, supra note 3, at 676-82.
  • 342
    • 0347743263 scopus 로고    scopus 로고
    • note
    • Nevertheless, this approach would be less intrusive upon the rights of software producers than a "public distribution equals publication" rule, which would deny trade secret protection to a program's source code even if the program was publicly distributed in object code format. Cohen, Electronic Vigilantism, supra note 82, at 1113-14.
  • 343
    • 0347112810 scopus 로고    scopus 로고
    • Trade secrets are only protectible as long as no one discovers them. See supra note 91 and accompanying text
    • Trade secrets are only protectible as long as no one discovers them. See supra note 91 and accompanying text.
  • 344
    • 21944434884 scopus 로고    scopus 로고
    • Copyright, Common Law, and Sui Generis Protection of Databases in the United States and Abroad
    • See Bell, supra note 132, at 615-16; see also Lemley, Beyond Preemption, supra note 134, at 150 (agreeing that an opt out scheme may be quite attractive to intellectual property owners)
    • In fact, state law protection may provide more effective protection than federal intellectual property statutes in certain circumstances. See Jane C. Ginsburg, Copyright, Common Law, and Sui Generis Protection of Databases in the United States and Abroad, 66 U. Cin. L. Rev. 151, 151 (1997). At least one commentator has advocated an opt out approach to federal intellectual property. See Bell, supra note 132, at 615-16; see also Lemley, Beyond Preemption, supra note 134, at 150 (agreeing that an opt out scheme may be quite attractive to intellectual property owners).
    • (1997) U. Cin. L. Rev. 151 , vol.66 , pp. 151
    • Ginsburg, J.C.1
  • 345
    • 0345851695 scopus 로고    scopus 로고
    • note
    • The Copyright Office registration requirements mandate only that very small portions of a copyrighted program's source code be placed on file. See 37 C.F.R. § 202.20(c)(2)(vii) (1998). The Patent Office does not require that a program's source code be disclosed. See supra note 171 and accompanying text.
  • 346
    • 0345851694 scopus 로고    scopus 로고
    • note
    • A plaintiff alleging copyright infringement must prove two elements: (1) ownership of a valid copyright and (2) copying of original elements of the work. See Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991). Copying may be established through indirect evidence, including evidence that the alleged infringer had access to the copyrighted work. See Castle Rock Entertainment, Inc. v. Carol Publ'g Group, Inc., 150 F.3d 132, 137 (2d Cir. 1998).
  • 347
    • 0347112805 scopus 로고    scopus 로고
    • note
    • This Note does not go so far as to propose a system of compulsory licensing, for the success of the product in the marketplace in the phase in which both federal and state law rights are available may vary, and to cut off all control over the use of one's code after disclosure may not allow producers to recoup their investments in their software. Moreover, a recent study of the economics of information concluded that, provided competitors write their own source code, imitative competition in the software industry should be encouraged. See Karjala, Program Structure, supra note 146, at 536-38.
  • 348
    • 0346482634 scopus 로고    scopus 로고
    • note
    • Right owners will object that their program code can be appropriated easily by second-comers who make minor changes and claim the disguised code as their own. See Miller, supra note 15, at 1026. The response is that simply changing another's code to hide all traces of illicit copying is not an easy task. See Cohen, Electronic Vigilantism, supra note 82, at 1123. In any case, this author is confident that courts are capable of determining whether one program so closely resembles another that it is infringing.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.