Skip to main content

Software Protection Under Copyright Law

  • Chapter
  • First Online:
Copyright Law in the Digital World
  • 1713 Accesses

Abstract

Although copyright policy has been governed by the need to protect the interests of authors, it also attempts to protect the society’s interests. Building upon the foundation provided by the international copyright treaties, which specify minimum standards of legal protection, the copyright system has evolved from being a rather vague area of the law into a system of central importance. Technological advances do have a huge impact upon the operation and effectiveness of copyright law. These advances spawn new industries and new methods for reproduction and dissemination of works of authorship, which will give new opportunities for authors. In the past seven decades, we have witnessed rapid developments in the field of communications and information technology which have exponentially expanded and extended the ability of human beings to communicate. The digital computer will stand out as one of the most important contributions to the great communication and information revolution which happened during the period. Undoubtedly, the scope of copyright protection for computer software is a major source of worry for both proprietary and open source software developers. This is because the scope of the program will ultimately determine what aspects of a program are forming part of the protectable core as copyrightable expression, and what features will be available for a future developer to copy. The analysis of the scope of copyright protection should be determined by delicately balancing the author’s creative rights with the public interest in access. This chapter deals with the legal issues involved in protection of software by providing a comprehensive coverage of the important international developments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Litman 1990.

  2. 2.

    In many cases the US Supreme Court has relied upon incentive justification for copyright. See, e.g., Sony Corp. v. Universal City Studios, 464 U.S. 417, p. 429 (1984), this essentially meant that copyright was intended to motivate the creative activity of authors and inventors by the provision of a special reward.

  3. 3.

    This argument can be reflected in Mazer v. Stein, 347 U.S. 201, p. 219 (1954), sacrificial days devoted to such creative activities deserve rewards commensurate with the services rendered.

  4. 4.

    Sterk 1996.

  5. 5.

    Ibid.

  6. 6.

    Folsom v. Marsh, 9 F. Cas. 342, 344 (1841).

  7. 7.

    Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Right (USPTO, 1995) 13.

  8. 8.

    See generally Curran and Curnow 1984.

  9. 9.

    See Report titled National Commission on New Technology Uses of Copyrighted Works (hereinafter CONTU Report) 22.

  10. 10.

    Cook 1984.

  11. 11.

    Toong and Gupta 1982.

  12. 12.

    Xuan-Thao N. Nguyen et al. 2006.

  13. 13.

    Strasser 2001.

  14. 14.

    In other words the programmers and computers never speak the same language.

  15. 15.

    Nguyen supra note 12 at 504.

  16. 16.

    Azzi 2010.

  17. 17.

    McJohn 2000.

  18. 18.

    Lerner and Tirole 2002.

  19. 19.

    Ibid.

  20. 20.

    Ibid. at 201.

  21. 21.

    CONTU Report supra note 9.

  22. 22.

    Copyright Act of 1976, 17 U.S.C. § 102(b) (1982).

  23. 23.

    CONTU Report supra note 9 at 22–23.

  24. 24.

    Arrow 1962.

  25. 25.

    Samuelson 1954.

  26. 26.

    CONTU Report supra note 9 at 9–12.

  27. 27.

    Ibid. at 19–23.

  28. 28.

    Section 102(b) of Copyright Act.

  29. 29.

    The misappropriation doctrine in US is a branch of unfair competition law which can be used to protect some aspects of intellectual work embodied in program code. In the famous case of International News Service v. Associated Press, 248 U.S. 215 (1918) the Supreme Court held that the gatherer of valuable information has a limited right to prevent competitors from copying such information.

  30. 30.

    Davidson 1983.

  31. 31.

    Q-Co Indus. v. Hoffman, 625 F. Supp. 608, 617 (S.D.N.Y. 1985).

  32. 32.

    Gilburne and Johnston 1982;

  33. 33.

    Goldstein 1986, ALSO, Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1251 (3d Cir. 1983), cert. dismissed, 464 U.S. 1033 (1984).

  34. 34.

    714 F.2d 1240 (3d Cir. 1983).

  35. 35.

    Ibid. at 1253.

  36. 36.

    101 U.S. 99 (1880).

  37. 37.

    The book’s title was Selden’s Condensed Ledger or Book-keeping Simplified.

  38. 38.

    Supra note 36 at 101.

  39. 39.

    Ibid.

  40. 40.

    Ibid.

  41. 41.

    The court gave an example that the copyright of a work on mathematical science cannot give to the author an exclusive right to the methods of operation which he propounds, or to the diagrams which he employs to explain them, so as to prevent an engineer from using them whenever occasion requires.

  42. 42.

    Supra note 36 at 107.

  43. 43.

    45 F.2d 119 (1930).

  44. 44.

    Ibid.

  45. 45.

    Ibid.

  46. 46.

    Whelan Assocs. v. Jaslow Dental Lab., Inc., 797 F.2d 1222 (1986).

  47. 47.

    Ibid. p. 1225.

  48. 48.

    Ibid.

  49. 49.

    Ibid. at 1225–1226.

  50. 50.

    Ibid. at 1226.

  51. 51.

    Ibid. at 1227.

  52. 52.

    Whelan Associates v. Jaslow Dental Laboratory, 609 F. Supp. 1307, 1321 (1985).

  53. 53.

    Ibid. at 1322.

  54. 54.

    Whelan supra note 46 at 1230, Program’s efficiency mostly depended upon the arrangements of its modules and subroutines; although two programs could produce the same result, one might be more efficient because of different internal arrangements of modules and subroutines.

  55. 55.

    Ibid.

  56. 56.

    Ibid.

  57. 57.

    Ibid. at 1234.

  58. 58.

    Ibid. at 1236.

  59. 59.

    982 F.2d 693 (1992).

  60. 60.

    Ibid. at 698–699.

  61. 61.

    The defendant’s program was named as Oscar.

  62. 62.

    Appellant program was names as Adapter.

  63. 63.

    Whelan supra note 46.

  64. 64.

    Computer Associates supra note 59.

  65. 65.

    Ibid. at 721.

  66. 66.

    Ibid. at 706, finally the Court held that there was no infringement.

  67. 67.

    Computer Associates supra note 59.

  68. 68.

    Stern Elecs Inc v Kaufman 669 F. 2d 852, 855 (2d Cir.1982).

  69. 69.

    See Shneiderman 1987.

  70. 70.

    Menell 1989.

  71. 71.

    Ibid. at 1055.

  72. 72.

    648 F. Supp. 1127 (N.D. Cal. 1986).

  73. 73.

    Ibid. at 1133.

  74. 74.

    706 F. Supp. 984, 992 (D. Conn. 1989).

  75. 75.

    Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435 (9th Cir. 1994).

  76. 76.

    Ibid. at 1441–1442.

  77. 77.

    Apple Computer, Inc. v. Microsoft Corp., 717 F. Supp. 1428, 1433–1435 (N.D. Cal. 1991).

  78. 78.

    Apple supra note 75 at 1442.

  79. 79.

    Ibid. 1433–1435.

  80. 80.

    Ibid. 1443.

  81. 81.

    Stigler 2014.

  82. 82.

    49 F.3d 807 (1996).

  83. 83.

    Ibid, at 809.

  84. 84.

    Ibid.

  85. 85.

    Rather than typing the whole series each time, the user only needs to type the single pre-programmed macro keystroke, causing the program to recall and perform the designated series of commands automatically.

  86. 86.

    Supra note 82 at 809–810.

  87. 87.

    Ibid. at 810.

  88. 88.

    Ibid.

  89. 89.

    Ibid. at 815, by relying upon 17 USC Section 102 (b) which states that “in no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work”.

  90. 90.

    Ibid. at 813. Borland admitted that it had copied the Lotus menu command hierarchy.

  91. 91.

    It did not consider whether it could also be a system, process, or procedure.

  92. 92.

    It can be a car, television or a computer.

  93. 93.

    Supra note 82 at 815.

  94. 94.

    Ibid.

  95. 95.

    Ibid.

  96. 96.

    Ibid.

  97. 97.

    Ibid.

  98. 98.

    Ibid.

  99. 99.

    Ibid. at 817.

  100. 100.

    Hilty and Geiger 2005.

  101. 101.

    Guarda 2013.

  102. 102.

    Ibid. at 446.

  103. 103.

    TRIPs Agreement Article 10(1) deals with copyright protection of computer programs.

  104. 104.

    Indian Copyright Act 1957, S. 2 (ffc). “computer programme” means a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result;

  105. 105.

    Indian Copyright Act, S. 14.

  106. 106.

    Ibid., S. 52 deals with fair use provisions.

  107. 107.

    Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1526 (1993), Decompilation, is the reversal of the process of compilation; that is, turning object code back into source code. Almost all jurisdictions, including India, have this exemption.

References

  • Arrow KJ (1962) Economic welfare and the allocation of resources for invention. In The rate and direction of inventive activity: economic and social factors, p 609

    Google Scholar 

  • Azzi RM (2010) CPR: How Jacobsen V. Katzer resuscitated the open source movement. Univ Ill Law Rev, pp 1271, 1275

    Google Scholar 

  • Cook R (1984) Operating systems, Popular computing, p 111

    Google Scholar 

  • Curran S, Curnow R (1984) Overcoming computer illiteracy: a friendly introduction to computers

    Google Scholar 

  • Davidson DM (1983) Protecting computer software: a comprehensive analysis. Jurimetrics J, 23: 339, 357

    Google Scholar 

  • Gilburne MR, Johnston RL, (1982) Trade secret protection for software generally and in the mass market. Computer/LJ, 3: 211, 255–263

    Google Scholar 

  • Goldstein P (1986) Infringement of copyright in computer programs U Pitt L Rev, 47: 1119, 1126–1127

    Google Scholar 

  • Guarda P (2013) Looking for a feasible form of software protection: copyright or patent, is that the question? Euro Intellect Property Rev, 35(8):445, 446

    Google Scholar 

  • Hilty RM, Geiger C (2005) Patenting software? A judicial and socio-economic analysis. Int India Centre 36: 615, 619–622

    Google Scholar 

  • Lerner J, Tirole J (2002) Some simple economics of open source, 50. J Indus Econ 197:200

    Google Scholar 

  • Litman J (1990) The public domain. Emory LJ, 39: 965

    Google Scholar 

  • McJohn SM (2000) The Paradoxes of free software. Geo Mason L Rev 9: 25, 26

    Google Scholar 

  • Menell PS (1989) An analysis of the scope of copyright protection for application programs, Stan L Rev, 41: 1045, 1054–1055

    Google Scholar 

  • Nguyen XTN et al. (2006) Intellectual property, software, and information licensing: law and practice, p 504

    Google Scholar 

  • Samuelson PA (1954) The pure theory of public expenditure. Rev Econ & Statistics, 36: 387

    Google Scholar 

  • Shneiderman B (1987) Designing the user interface: strategies for effective computer interaction pp 15–18

    Google Scholar 

  • Stewart, SE (1996) Rhetoric and reality in Copyright Law. Mich Law Rev, 94: 1197

    Google Scholar 

  • Stigler R (2014) Ooey GUI: The messy protection of graphical user interfaces, 12 Nw J Tech & Intell Prop, pp 215 37

    Google Scholar 

  • Strasser M (2001) A new paradigm in intellectual property law? The case against open sources. Stan Tech Law Rev, p 4

    Google Scholar 

  • Toong HD, Gupta A (1982), Personal computers, SCI pp 87, 88

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. K. Unni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Unni, V.K. (2017). Software Protection Under Copyright Law. In: Sinha, M., Mahalwar, V. (eds) Copyright Law in the Digital World. Springer, Singapore. https://doi.org/10.1007/978-981-10-3984-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3984-3_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3983-6

  • Online ISBN: 978-981-10-3984-3

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics