Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II...
-
Upload
ernest-mills -
Category
Documents
-
view
216 -
download
0
Transcript of Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II...
Software and Law – Jed ScullyPresented by: Diala T. Gammoheel6883 – Software Engineering IIDr.Dalma Turgut
2
Agenda
Introduction to Software and Law The Ownership of Intellectual
Expression Software Copyright “Business Methods” Patents for
Software Additional Statutory Remedies for
Software Protection
3
The law of Contracts, Protocols and Private Agreements
Future Developments for Software and the Law, 2005 – 2010
Summary and Conclusion
Agenda
4
Introduction to Software and Law
A Definition of Software: A software is a packaged set of electronic
instructions for performing certain tasks on a computer hardware platform.
Culture and Legal Assumptions: The idea of ownership is a cornerstone not
only for the American Society but all modern, democratic nations and culture.
5
Introduction to Software and Law
The Concept of Intellectual Property
The ability to separate
physical containers from valuable intellectual content is at the root of the legal rules that describeand protect intellectualproperty.
6
Introduction to Software and Law
The Concept of Intellectual Property
7
The Role and Rule of Law “rules under law” are enforced by the state
or the nation and any violations of these rules might result in a serious penalties.
Jurisdiction and the Law Controlling cyberspace transactions is very
problematic. Jurisdiction might control the hardware that generate and receive electronic data but digital transmission can easily bypass these controls.
Introduction to Software and Law
8
Introduction to Software and Law
Cyberspace, the internet and Intellectual Properties Before Cyberspace:
John Perry Barlow-a lyricist for Grateful Dead and one of founders of the Electronic Frontier Foundation- refers to copyright as the protection of the bottles, or containers of fine wine rather than the protection of the wine itself.
9
After cyberspace:
Any person can and does distribute content,regardless any ownership claims, throughout the “click and send” effort and without necessity of permissions or agreements.
Introduction to Software and Law
10
The ownership of Intellectual Expression:
Copy Right: is the legal protection of expressive communication.
Patent Right: is the invention whichtransforms “discovery”to new and useful use.
The ownership of Intellectual Expression
11
Software Copyright
The components of copyright: - Human communicative content - Technology of transmitting an
authorial product to others - Legally recognized economic and moral
rights of authors - Methods for enforcing these rights The term “software” suggests intellectual
expression rather than the particular format in which that expression is embodied
12
Software Copyright
Traditionally, copyright defines legal rules, expectations and remedies for software.
These classifications have lost much of their definitional relevance with the emergence of software systems as a means of manipulating and transmitting data through the internet.
Video Conference: Restoring the balance to copyright Laws taken from www.youtube.com
http://www.youtube.com/watch?v=8BsfgTd2hYk
13
“Business Methods” Patents and Software A Brief History of Patent and Business
Methods Patents Several points about patent should be
noted: - A patent will not be issued for something
that is not new, novel or useful. - A patent must be an improvement on the
technology or processes or on the natural world and natural order of things that already exists.
- It is “invention” not “discovery” .
14
“Business Methods” Patents and Software Scope of Protection for Software Patents: A main issue faced by software developers
and programmers is to what extent may one reference the ideas, abstractions and concepts of a patent-protected software system without infringement or violation.
Patent protection does not allow anyone to use any part of protected invention without permission or license.
15
“Business Methods” Patents and Software Scope of Protection for Software Patents: It might be that copyright provides greater
levels of protection for “expression” even though users may take advantage of the “fair use” of aspects of a copyrighted without permission
16
“Business Methods” Patents and Software Reverse Engineering and Encryption They found that some of the patents and
copyrights need to be used by others for analyzing and discussions such as Reverse Engineering.
Courts have determined that the lawful use of computers doesn’t constitute unlawful decryption of protected software.
17
“Business Methods” Patents and Software Reverse Engineering and Encryption However, there is continued legal
uncertainty as to the extent to which new users can disassemble and reengineer protected software.
Many observers feel that these restrictions slow down innovation and the development of new technological uses for encrypted digital content.
18
Additional Statutory Remedies for Software Protection Trade Secrets: It is any formulation, system, device, pattern
or compilation of information used in business that gives the holder of the trade secret a potential competitive advantage in business.
Unauthorized disclosure might destroy the
trade secret’s value, but the person responsible for the disclosure could be held legally responsible.
19
Additional Statutory Remedies for Software Protection Trade Mark: Is a means of identifying
and marking the origin of goods, including application programs.
It is covered by both federal and statelaw.
A registration system for trademarks establishes the rights and priorities of holders of a mark.
20
Additional Statutory Remedies for Software Protection Unfair Competition: Trademark infringement is a form of unfair
competition, which also includes passing off your goods or services as originating with another producer.
Moral Rights Protections We usually refers to morality to standards
that are held by individuals, beliefs held by religion or by particular culture or community but which is not enforced by laws.
21
Additional Statutory Remedies for Software Protection
Tort Protection: As a legal term refers to the violation of a
personal right for which a wrongdoer, might be held responsible in a civil court for money damages.
Moral Rights Protections: These moral rights cannot
be sold or traded away because they are inherent in the act of authorship.
22
The Law of Contracts, Protocols, and Private Agreements Legal Contract is a promise or set of
promises that the law will enforce, usually by imposing money damages for failure to perform according to one’s promises.
Contracts can be between persons who have no particular relationship with one another.
23
The Law of Contracts, Protocols, and Private Agreements In addition to contracts, there are protocols
and methods of doing business that may not be enforceable by of law and legal system but regulate the conduct of persons engaged in the same activity.
Handshake and verbal agreements are used sometimes.
24
The Modern “Law Merchant” Law Merchant as a system of rules and
regulations recognized by traders as the law for the regulation of their commercial standards.
It has received renewed emphasis with the borderless character of digital transactions and the transfers of information and commercially valuable software.
The Law of Contracts, Protocols, and Private Agreements
25
The Modern “Law Merchant” International commerce players also
established governmental courts and tribunals that interpret and enforce these agreements including the International Chamber of Commerce in Paris, the London Court of International Arbitration, and the American Arbitration Association.
The Law of Contracts, Protocols, and Private Agreements
26
The Modern “Law Merchant” The Example of Microsoft Monopoly of the
Browser.
Microsoft was trying to reach to a certain business model that navigates among the requirements of several national bodies like the United States Department of Justice’s Antitrust Division and the European Union.
The Law of Contracts, Protocols, and Private Agreements
27
The Modern “Law Merchant” It was only 15 years ago that the United
States agreed to join the Berne Convention which provides the mechanism for enforcing international copyright.
Through GATT, NAFTA and the World Trade Organization, the United States has now taken a leading role in developing international enforcement mechanisms for intellectual property.
The Law of Contracts, Protocols, and Private Agreements
28
ADR, ODR and Statutory Enforcement of Private Agreements:
Nation states and the international law community established international agencies such as the World Intellectual Property Organization (WIPO), charged with the enforcement of various international treaties such as:
- ADR (Appropriate Dispute Resolution) - ODR (Online Dispute Resolution)
The Law of Contracts, Protocols, and Private Agreements
29
ADR, ODR and Statutory Enforcement of Private Agreements:
ADR and ODR provides a broad set of remedies for the resolution of software ownership, use, dissemination issues.
“Appropriate” refers to the fact that the parties to an agreements should have latitude to decide on the mechanisms for resolving issues that arise regarding the enforcement of their agreements.
The Law of Contracts, Protocols, and Private Agreements
30
ADR, ODR and Statutory Enforcement of Private Agreements:
ODR simply refers to the fact that all or portions of these mechanisms can take place over the internet by synchronous or asynchronous video conference.
The use of ADR and ODR as a substitute for formal court trials is rising rapidly in popularity in the United States.
The Law of Contracts, Protocols, and Private Agreements
31
Domain Names and Cyber squatting: There is a significant confusion over the
relationship between a URL domain name on the Internet and a trademark for a good or service.
ICANN is a private nonprofit agency received the right to serve as the registrar for domain names.
The Law of Contracts, Protocols, and Private Agreements
32
Domain Names and Cyber squatting: Difficulties arose because many entities that
had a reputational interest in a desired trademark wished to carry that trade in terms of a domain in the URL identifier on the internet.
US law has moved to protect the invested reputations of those who had valuable trademarks because similarities are likely to cause consumer or competitor confusion.
The Law of Contracts, Protocols, and Private Agreements
33
Domain Names and Cyber squatting: Congress also enacted an Anti cyber
squatting (registering an internet name for the purpose of resetting it for a profit) Consumer Protection Act .
The Law of Contracts, Protocols, and Private Agreements
34
Globalization and Jurisdiction: - It is hard to make predictions for more
than 3-5 years into the future.
- Globalization will expand and national jurisdictions will lessen in centrality and importance as the traffic in digital distribution of software increases.
Future Developments for Software and the Law 2005-2010
35
Globalization and Jurisdiction: - Treaties are of limited utility in controlling
electronic data flow.
- Global protocols and market-based competitive solutions seem to offer better options for realizing the full potential of authorial software contents.
Future Developments for Software and the Law 2005-2010
36
Continued Growth in Global Market-based Solutions:
We expect greater growth and vitality in private, market-driven, global protocols, agreements and dispute resolution mechanisms as global market software players recreate a 21st century equivalent of the “law merchant”.
Future Developments for Software and the Law 2005-2010
37
The Power of Contract: Contract does not depend only on the state
power but on the autonomy of private individuals and groups who are committed to the values inherent in honoring private agreement.
Future Developments for Software and the Law 2005-2010
38
Protecting and Innovation – Competing or Complementary Concepts?
The best we can say is that innovation may
be temporary retarded by intellectual property protections but significant technological advance will be driven by competitive global markets, not by restrictions in nationally based intellectual property statutes.
Future Developments for Software and the Law 2005-2010
39
Protecting and Innovation – Competing or Complementary Concepts?
An example is provided by the strength in the development of open-source software for computer operating systems, like Linux.
Global market players realize that computer operating systems like alphabet and the internet itself belong to the public domain, free for anyone to use.
Future Developments for Software and the Law 2005-2010
40
People interested in software, whether as developers, designers or programmers should have in mind a drop-down menu for legal protections systems that should include the following elements:
1- Copyright 2- Patent 3- Trademark 4- Contract 5- Jurisdiction
Summary and Conclusions
41
Summary and Conclusions
6- International law and compacts7- Globalization8- Other potential remedies, including moral
rights protections.
42
My Thoughts about the paper
It was a long paper . It mentioned lots of concepts related
to the software and law. I think it will be better if the mentioned
more examples about stealing software and how the law will prove it.
43
References
http://www.cartoonsscott.com http://www.youtube.com
44
THANK YOU