Upload
praneet-batwar
View
214
Download
0
Embed Size (px)
Citation preview
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
1/8
CIS 485 ASSIGNMENT 2
Guide to Software Copyrighting and
PatentingUniversity of the Fraser Valley
Duncan Jeffries
Praneet Batwar
6/24/2012
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
2/8
Introduction
In todays world robbery is not just limited to money or jewelry. Ideas or concepts too
are being stolen. We just dont call it robbery or theft; its called Intellectual Property Theft.
Ideas and Concepts can be worth millions if not billions of dollars. If not copy righted the idea orconcept which could have been worth a lot of money could be used by anybody. Copyright is a
legal tender offered by almost all the government bodies around the world. It gives us the
exclusive rights to our intellectual property. Copyrighting can apply to a wide range of creative,
intellectual or artistic forms or works. We over here will focus mainly on the copyrighting of
software. Software copyright is used by the proprietary software companies to prevent the
unauthorized copying of the software they create.
In recent events the news is filled with large multinational firms battling against the
rights to use a piece of technology. In some cases it maybe as trivial as the mechanism to
unlock the smart phone (The infamous Google vs. Apple). I plan on discussing this topic further
as it supports the cause of having a management plan which includes a Copyrighting/Patenting
action plan. I chose this topic because of the over increasing patent wars that have been
happening. Copyrighting is also another major way to fight against software piracy. As the
number of internet users have increased over the years rogues sites and services have come up
which offer a pirated version of the software for free. This is in general hurts the I.T industry.
History
Today the number of software that is created enjoy protection by the copyright laws wehave now. In the early days of computer programming, the laws werent so clear. It is over the
time and through various experiences that todays laws have come to being. In the 1960s there
were few computers and fewer computer programs. Before software is widely marketed it was
easy to protect the software. The Copyright Act of 1976, which became effective on January 1st
,
1978 made it clear that the government intended software to be copyrightable. The definition
of the kind of works that could be copyrightable were works, other than audiovisual works,
expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the
nature of the material objects, such as books, periodicals, manuscripts, phonorecords, film,
tapes, disks, or cards, in which they are embodied.. What wasnt very clear was how muchprotection the government intended to give the computer programs, and whether there should
be special exceptions to the exclusive rights of the copyright owners.
In 1990 the Computer Software Rental Amendments was passed which made sure that
unless authorized by the owners, even if you purchase the software you cannot replicate it and
sell it or rent or lease it.
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
3/8
The McAfee vs Symantec (1997) : Case Study
In 1997, McAfee filed a $1 Billion law suit against rival Symantec Corp. This was because
Symantec claimed that McAfee, had stolen software from Symantec. The whole issue revolvedaround a virus scan software which was fairly new then. The initial clash started in April of that
year when Symantec sued McAfee for copyright infringement. The lawsuit was filed because
McAfee made software similar to Nortons CrashGuard; software used to prevent the crashing
of computers due to some applications. Symantec claimed that PC Medic used a similar code
that was stolen from crash guard. Because Symantecs code was copy written McAfee was
ordered to turn over the source code for much of its software. McAfee later on dropped the
case.
This was a 15 year old case. Right now in 2012, software based lawsuits are quite rare
because they are well protected. Also, as the I.T industry is grown, each company develops its
own code. This is where we focus on our main issue, to develop code or programs and making
sure
The Need for Software Patents
Software inventions and hardware inventions are the same. If a new piece of hardware
technology is invented and is patented or copyrighted. Then new software should also becopyrighted. Taking a historic approach to this, the founders of the US, wrote it into the
constitution initially when it was drafted that all intellectual property be protected (Article I,
Section 8, Clause 8). It is known as the Copyright clause. Without any protection to the
inventors and the thinkers, then there would be no motive for innovation.
As I.T industry is increasing more and more companies are having custom programs
being made to automate the companys unique business processes. When employing outside
members as opposed to its own employees, immense care should be taken. There have been
many instances where companies have been taken a shock when they learn that the program
which they had spent a lot of money developing is being sold to others by the outside
developer because there was no copyright assigned. Therefore custom legal contracts which
are related to the computer program should be created in order to protect the companys
investment.
Copyright laws were initially designed to protect the authors creativeworks and guard
them from being stolen or misused. An authors copyright cannot be transferred to another.
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
4/8
Oral agreements are completely unreliable. Outside programmers are getting smarter and
intend to keep all the work they have done which they have been paid for. Thus those who
employ outside programmers should equally be careful to protect their rights. One right way to
facilitate protection is to design a custom legal agreement between the programmer and the
company. This agreement should be written in order to transfer all the rights of the program tothe company.
A computer program generally has two parts, literal and non-literal. The literal part of
the software is generally the source code. This is easily copyrightable. The non-literal part of the
source code is the design, the structure of the program, the sequence in which the program
engages the user. The literal parts can be copyrightable, but the non-literal parts can be
reduced to a tangible expression so that it can be copy righted. Usually it is better for the
company to give in the non-literal inputs.
Another plus side to patenting or copyrighting your software is protection againstpiracy. In the year 2004, $80 Billion worth of commercial packaged software was installed
worldwide, but only $51 billion was paid for. This led the software companies to suffer a 36%
loss globally. Currently several principal international treaties provide copyright protection
under an umbrella system in which a copyrighted work released in any member country has
copy right protection in all member countries. The Digital Millennium Copyright Act (DMCA) of
1998 not only criticized the copyright infringement, but also penalizes production and
distribution of technology that has been copyrighted.
In the year 2008, software companies saw a loss of 41%, in 2009 they saw a loss of 43%
and in 2010 a loss of $ 50 Billion was reported.
Risks and Loopholes in Patenting
Although there are standard laws that protect the programs and the software from
piracy and intellectual property thefts, there arent any solid rules that protect the non-literal
on intangible aspects of a program. These can include interfaces, program structures, sequence,
GUIs. And methods, systems, processes and functionalities cannot be copy righted. Therefore
there easily can be a loophole used to copy software.
A major example that can explain this is the Google vs Oracle case. Oracle sued Google
over copyright infringement. Oracle has managed to prove that Google has copied nine lines of
code in their Android operating system. On May 31 2012, Judge Alsup ruled that the specific
code that is used to carry out a function can be copyrighted but the methods, fucntions,
declarations or method headers or classes cannot be copyrighted. To accept Oracles claim
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
5/8
would be to bar anyone from righting code to perform a particular function. The case was
controlled by the following principles
Under the merger doctrine, when there is only one (or only a few) ways toexpress something, then no one can claim ownership of such expression by
copyright.
Under the names doctrine, names and short phrases are not copyrightable. Under Section 102(b), copyright protection never extends to any idea,
procedure, process, system, method of operation or concept regardless of its
form. Functional elements essential for interoperability are not copyrightable.
Under Feist, we should not yield to the temptation to find copyrightabilitymerely to reward an investment made in a body of intellectual property.
Patent Trolls
Patent trolls are large companies that buy a lot of patents and then extort fees from smaller
companies that are unaware of violating them. These surprise lawsuits can have a devastating
effect on smaller companies who cannot afford to hire a corporate lawyer to fight the case for
themselves. Even if you are in the right it can be very expensive to defend yourself. Therefore
smaller companies just give up and pay the license fee. This is definitely a misuse of the patent
system.
Patent Warfare
Large tech companies are using patent lawsuits to slowdown each other. Understanding thatthe cost of engaging a lawsuit is a lot less than the profit made by slowing the competitor, the
large tech companies are engaging in a non-stop war. These companies use everything they
have to slow down the opposite company. It can be hardware patents, software patents even
design ideas. This trend is majorly seen in mobile phone companies such as Apple, Samsung and
Motorola.
Apple vs Samsung (Case Study)
Apple initially started the attack stating that Samsung copied the design of iPad, iPod and
iPhone and implemented it in its Galaxy Tab. Apple said that instead of pursuing independent
product development, Samsung has chosen to copy Apple's innovative technology, distinctive
user interfaces, and elegant and distinctive product and packaging design, in violation of
Apple's valuable intellectual property rights.
Two weeks later Samsung replied with another lawsuit on Apple stating that Apple infringed on
patents concerning reducing data transmission errors in WCDMA (Wideband CDMA) mobile
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
6/8
networks, tethering mobile phones to PCs so the PC can use the phone's wireless data
connection, and reducing power consumption when transmitting data over HSPA (High Speed
Packet Access) networks
This is a clear case study showing Apples and Samsungs aggressive strategy in slowing down
each others business.
Recommendation
As an IT consultant I suggest it is necessary to make sure to employ these ideas in the business
model of this company.
1. Make sure that each piece of new software code that is developed is copyrighted or at leastpatented for a long period of time.
2. If it is a literal or tangible part of the software such as the code, then it can be easilycopyrighted. If it is a non-literal part of the software then an agreement must be developed
so that the design and the idea of the software should be protected.
3. While employing an outside programmer to make software for the company, it is necessaryto make sure that agreement is met where the author of the code doesnt sell the code
later on to the outside market.
4. It is also important to make sure that before employing a new piece of software or beforedeveloping a new code or software, it should be checked if it has already been patented or
not. This is very important as Patent trolls could sue to company.
8/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
7/8
References
1. Symantec (1997). Symantec Launches Lawsuit Against McAfee for CopyrightInfringement. Retrieved on June 24 2012 from
http://www.symantec.com/about/news/release/article.jsp?prid=19970423_01
Symantec launches a lawsuit against McAfee for copyright infringement. The subject
matter was a code for a anti-crash software. Used for historical purposes.
2. Symantec (1997). McAfee Drops Suit against Symantec In Japan. Retrieved on June 242012 from
http://www.symantec.com/about/news/release/article.jsp?prid=19970828_01
McAfee drops a lawsuit on Symantec. The lawsuit revolved around a code for a virus
scanning software. Used for historical purposes.
3. Shaw, Steven (2012 June, 12). Why we need software patents. Retrieved on June 242012 from
http://www.zdnet.com/blog/law/why-we-need-software-patents-part-3-of-3/129
Steven Shaw an active blogger and e-reporter enumerates and explains why software
patents are needed. He argues that Software inventions are the same as hardwareinventions and they too need equal patenting rights.
4. The IP Law Blog (2007 May, 06). Is That Expensive Custom Computer Program ReallyYours?Retrieved on June 24 2012 from
http://www.theiplawblog.com/archives/-copyright-law-is-that-expensive-custom-
computer-program-really-yours.html
The admin of the site in detail explains how an outsourced programmer can easily claim
ownership of the code created by the contracting firm even after taking the fullpayment for the work. The admin also further explains how a company should make
sure that its software is protected.
http://www.symantec.com/about/news/release/article.jsp?prid=19970423_01http://www.symantec.com/about/news/release/article.jsp?prid=19970423_01http://www.zdnet.com/blog/law/why-we-need-software-patents-part-3-of-3/129http://www.zdnet.com/blog/law/why-we-need-software-patents-part-3-of-3/129http://www.zdnet.com/blog/law/why-we-need-software-patents-part-3-of-3/129http://www.symantec.com/about/news/release/article.jsp?prid=19970423_018/13/2019 CIS 485 - Assignment 2 - Guide to Software Copyrighting and Patenting
8/8
5. Sookman, Barry (2012 June, 03). So you want to protect computer programs bycopyright, the Oracle v Google and SAS v WPL cases.Retrieved on June 24 2012 from
http://www.barrysookman.com/2012/06/03/so-you-want-to-protect-computer-
programs-by-copyright-oracle-v-google-and-the-sas-v-wpl-cases/
Sookman explained how copyrighting codes are easy. But it is not easy to copy right
APIs, program structures, sequencing and organizations. The case of Google vs Oracle is
also given, where the final verdict of the case is given and the principles on which the
case was decided are also given.
6. Chiviz, Huang and Fernandez (2003)A New Weapon Against Piracy:Patent Protection asan Alternative Strategy for Enforcement of Digital Rights Retrieved on June 24 2012
from http://law.bepress.com/cgi/viewcontent.cgi?article=4193&context=expresso
This is a white paper by Chiviz, Huand and Fernandez, where they explain the effect
software piracy is having on the software global industry. They also go ahead and
explain, how patenting is a good way to protect your software in global markets.
7. Mace, Michael (n.d.). The case of software Patents.Retrieved on June 24 2012 fromhttp://mobileopportunity.blogspot.ca/2011/08/case-for-software-patents.html
Michael mace explains how patenting is being misused and companies are using patents
to extort money from smaller firms who use the patented software unknowingly. He
also tells us how large companies are engaging in Patent Warfare, where they file
lawsuits against each other to slow down their business.
8. McDonald, Stephanie (2012, June 25).Apple vs Samsung timeline: Clash of the Titans.Retrieved on June 24 2012 from
http://www.techworld.com.au/article/428531/apple_vs_samsung_timeline_clash_titan
s/?pp=2
Case study where large technology firms such as apple and Samsung are engaging in
constant patent warfare to slow down each others business.
http://mobileopportunity.blogspot.ca/2011/08/case-for-software-patents.htmlhttp://mobileopportunity.blogspot.ca/2011/08/case-for-software-patents.htmlhttp://mobileopportunity.blogspot.ca/2011/08/case-for-software-patents.html