Presentation is loading. Please wait.

Presentation is loading. Please wait.

Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS,

Similar presentations


Presentation on theme: "Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS,"— Presentation transcript:

1 Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS, Law Firm Lecturer at the Robert Schuman University (Strasbourg) www.ulys.net

2 Scope of the Presentation  What is Intellectual Property?  A name commonly given to a group of separate property rights, including:  Trademark;  Copyright;  Patent;  Database;  Design;  Layout design of integrated circuits;  Plant variety.

3 Scope of the Presentation  The presentation concentrates on two important IP issues under European Law: I.Software Protection II.Database Protection

4 I. Software Protection  Three Parts: A.Software Copyright B.Software Patent C.Know-How

5 A. Software Copyright 1.Legislation  European Law  Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs  Belgian Law  Law of 30 June 1994 on copyright (“droits d’auteur”) and related rights  Law of 30 June 1994 on the legal protection of computer programs

6 A. Software Copyright 2.Software Definition  No definition under the Directive  A set of instructions in a language that computers understand  Examples:  Operating systems (Mac OSX, Linux, Windows,…);  Web browsers, word processors, design software,…  Object code & source code both receive protection under copyright

7 A. Software Copyright 3.Object of protection  Protected as literary works within the meaning of the Berne Convention  Ideas and principles which underlie any element of a computer program, including those which underlie its interfaces, are not protected by copyright  Originality requirement: the computer program must be the author’s own intellectual creation

8 A. Software Copyright 4.Who owns the rights?  The person who has created the program is generally the right holder  Possible co-ownership  When created in the course of employment, the employer owns the economic rights, unless otherwise agreed between the employer & the programmer

9 A. Software Copyright 5.Exclusive rights  Permanent or temporary reproduction of a computer program by any means and in any form  Translation, adaptation, arrangement and any other alteration  Any form of distribution to the public, including the rental, of the original computer program or of copies thereof

10 A. Software Copyright 6.Scope of the protection  Ideas?  Efficiency considerations?  Extrinsic considerations?  Interfaces?

11 A. Software Copyright  Ideas?  Copyright only protects the expression of a computer program not ideas & principles:  « Whereas, for the avoicance of doubt, it has to be made clear that only the expression of a computer program is protected and that ideas and principles which underlie any element of a program, including those which underlie its interfaces, are not protected by copyright under this Directive »  Algorithm:  Mathematics formula  Interpretation of Directive Recital 14  Word/Sentence

12 A. Software Copyright  Efficiency considerations?  Merger doctrine between idea & expression  Only one way to express one idea  Extrinsic considerations?  « Scènes à faire » doctrine  Mechanical specifications of the computer on which a particular program is intended to run  Compatibility requirements of other programs with which a program is designated to operate in conjunction  Computer manufacturer’s design standards  Demands of the industry being serviced  Widely accepted programming practices wihin the computer industry

13 A. Software Copyright  Interfaces?  Parts of the program intended to allow it to communicate and work together with other components of a computer system and with users  Protected only if original expression

14 A. Software Copyright 7.Exceptions to software copyright  A lawful holder is entitled:  To use the computer program for its intended purpose  To correct errors in the program  To make a back-up  To observe, study or test the functioning of the program in order to discover how it works

15 A. Software Copyright  To use it for its intended purpose  « In the absence of specific contractual provisions, the acts above referred shall not require authorization by the right holder where they are necessary for the use of the computer program by the lawful acquirer in accordance with its intended purpose, including for error correction »  Allowing decompilation for error correction: quid in practical terms?

16 A. Software Copyright  To make a back-up  « The making of a back-up copy by a person having the right to use the computer program may not be prevented by contract insofar as it is necessary for that use »  No contractual exception!

17 A. Software Copyright  Exception for study purposes  « The person having the right to use a copy of a computer program shall be entitled, without the authorization of the rightholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do »  It is allowed to look at what is allowed to be seen!

18 A. Software Copyright 8.Decompilation  What does « decompile » mean?  Converting the object code of a program into source code  Conflict of interests?  Making one’s software interoperable with other software in the public interest  Keeping the source code of a program secret for business purposes

19 A. Software Copyright  Directive provision  The authorization of the right holder is not required:  when reproduction of the code and translation of its form are indispensable to obtain the information necessary to achieve the interoperability of an independtly created computer program with other programs  these acts are performed by a person having a right to use a copy of a program  the information necessary to achieve interoperability has not previously been readily available to this person  these acts are confined to the parts of the original program which are necessary to achieve interoperability

20 A. Software Copyright  Restriction to decompilation  The information obtained cannot be used for goals other than to achieve the interoperability of the independently created computer program  The information obtained cannot be given to others, except when necessary for interoperability  The information obtained cannot be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright  Decompilation cannot be used in a manner which unreasonably prejudices the right holder’s legitimate interests or conflicts with a normal exploitation of the computer program

21 A. Software Copyright

22  Interoperability case: Microsoft v. EU Commission  In March 2004, the European Commission imposed a record fine of €497 million and a series of 'remedies' upon Microsoft for abuse of dominant position on the software market with its Windows operating system  According to the EU Commission, Microsoft abused its market power by deliberately restricting interoperability between Windows PCs and non-Microsoft work group servers, and by tying its Windows Media Player (WMP), a product where it faced competition, with its ubiquitous Windows operating system  Appeal launched before the EU Court of Justice

23 A. Software Copyright 9.Term of protection  Author’s life + 50 years after his death or after the death of the last surviving author  70 years in Belgium!

24 A. Software Copyright 10.Digital Rigths Management (DRM)  What does it mean?  All technical measures used by right holders to protect software copyright  Example: an activation code required to the licensee by the software manufacturer in order to use the software  Purpose: preventing copyright infringement

25 A. Software Copyright  Directive provision  Requires Member States to take measures  Against any act of putting into circulation, or the possession for commercial purposes of,  Any means only intended to break DRM  Belgian law  Fine from 2,5 EUR to 2.500 EUR  Against anyone who puts into circulation, or possesses for commercial purposes, any means the sole intended purpose of which is to facilitate the unauthorized removal or circumvention of any technical device which may have been applied to protect a computer program

26 A. Software Copyright

27  DRM case in France: Virgin v. Apple  VirginMega (Virgin Group’s French online music joint venture with media company Lagardère Group) launched a claim against Apple before French Competition Council  VirginMega claims that Apple had anti-competitive behaviour by refusing to licence the iTunes Music Store’s Fair Play DRM technology  VirginMega uses Windows’audio and DRM technology which is not supported by the Ipod  French Competition Council dismissed the claim in November 2004

28 A. Software Copyright 11.Licensing  What is a software copyright licence?  Copyright holder’s permission to do some of the things restricted by copyright, among others: running, modifying and distributing the program  Examples  Allowing the licensee to install and run the program on only one or on several computers

29 A. Software Copyright  Semi-free licence : free only for non-commercial users  Shareware licence : allows unlimited redistribution but only limited trial use of the software (e.g. 30 days)  Crippleware system: software distributed under shareware licence but in an incomplete or « crippled » form. The user must pay a fee to get an « uncrippled » version of the software

30 A. Software Copyright  Copyleft?

31 A.Software Copyright  Copyleft?  Inventor  Richard Stallman invented “copyleft” in disagreement with the concept of software copyright  He believed that anyone ought to use and modify software without asking anyone’s permission  Principles  Software is copyrighted but made available under a special license  Copyleft licence allows any user to freely run, copy, modify and distribute the copyleft software

32 A.Software Copyright  Modifying the software for one’s own personal use is permitted  Two requirements in case of distribution of the modified version: Source code and object code of the modified version must both be distributed The modified version must itself be under copyleft licence  Examples of Copyleft licence  GNU General Public Licence (GPL) One of the most commonly used copyleft licence Created in 1991  Linux

33 A.Software Copyright

34  Example of No Copyleft licence  BSD licence  Allows anyone to freely run, copy and distribute the software  Allows to modify it and to distribute the modified version under restriction and without copyleft  Pros and cons  Source code is public  Program is adaptable and constantly improved by other programmers  Reliability and durability?  Dependency on the service supplier?  Fragmentation risk?  Intern skills?

35 A.Software Copyright  Conclusion  Open Source >< Not Open Source  Copyleft >< No Copyleft  Free of charge>< Not Free of charge

36 B. Software Patent 1.Legal Background  Munich Convention  Belgian Law  USA, JAPAN  WIPO, TRIPS

37 B. Software Patent 2.WIPO  Copyright  “Computer programs are protected as literary works within the meaning of Article 2 of the Berne Convention. Such protection applies to computer programs, whatever may be the mode or form of their expression.”Article 2 of the Berne Convention  Patent  Nothing about computer program in the Paris Convention

38 B. Software Patent 3.TRIPS  Copyright  “Computer programs, whether in source or object code, shall be protected as literary works under the Berne Convention (1971).”  Patent  “ (…)patents shall be available for any inventions, whether products or processes, in all fields of technology, provided that they are new, involve an inventive step and are capable of industrial application.”

39 B. Software Patent 4.European Patent Convention (1973)  Article 52(1)  Computer programs as such are not patentable “(1) European patents shall be granted for any inventions which are susceptible of industrial application, which are new and which involve an inventive step. (2) The following in particular shall not be regarded as inventions within the meaning of paragraph 1:paragraph 1 (a) discoveries, scientific theories and mathematical methods; (b) aesthetic creations; (c) schemes, rules and methods for performing mental acts, playing games or doing business, and programs for computers; (d) presentations of information.”

40 B. Software Patent 5.EU Proposal Directive on the patentability of computer-implemented inventions  Proposal first launched in February 2002  Demand from the EU Parliament for a renewed referral last February  Adoption in Council last March  Still in discussion

41 B. Software Patent  EU Council Position  Definition of a « computer-implemented invention »  « Any invention the performance of which involves the use of a computer, computer network or other programmable apparatus, the invention having one or more features which are realised wholly or partly means of a computer program »  In order for a software related invention to be patentable, a technical contribution remains necessary  A technical contribution means a contribution to the state of the art in a field of technology, which is new and not obvious to a person skilled in the art

42 B. Software Patent  Pros and Cons of Software Patent  Protection of algorithm  Protection against independent creation  Easy to licence  Do not rely on secrecy  Cost  Procedure too long & protection term inadequate for the short lifetime of software inventions  Uncertainty about the patent subject-matter  Inventivity & Novelty requirements

43 C. Know-How 1.Definition  “know-how” v. “trade secrets”  Often used as synonym but are by no means identical  Know-how may constitute a trade secret  Not every trade secret falls within the definition of know-how  Financial information, employment planning 2.Protection : source code  Licence and know-how agreements  Exclusivity/non exclusivity  Confidentiality

44 II. Database Protection 1.Legal Background  Copyright protection  Intellectual creation: Berne Convention, TRIPS, directive copyright  Sui generis protection  Directive 96 EC on the legal protection of databases

45 II. Database Protection 2.Directive 96 EC  Scope  Collection of independent works, data or other materials  Arranged in a systematic or methodical way  Individually accessible by electronic or other means  Exclusion  Computer programs  Database contents

46 II. Database Protection  Protection of the presentation of the database  Copyright in favor of the author if: by reason of the selection or arrangement of its contents, constitutes the author’s own intellectual creation  Protection of the database itself  « Sui generis » right in favor of the « maker »:  Right of the maker of a database to prevent extraction and or re- utilization of the whole or of a substantial part of the contents of the database  Condition of this right: the maker must show that there has been a substantial investment in either the obtaining, verification or presentation of the contents  Protection of one/several data by copyright: data=work of author

47 II. Database Protection  Object of protection  Extraction of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the database contents  Re-utilization of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the database contents

48 II.Database Protection  Object of protection  Extraction: permanent or temporary transfer of all or a substantial part of the contents to another medium  Re-utilization: any form of making available to the public all or a substantial part of the contents by the distribution of copies, by renting, by on-line or other forms of transmission  Repeated & systematic extraction and/or re-utilization of insubstantial parts which conflict with normal exploitation or which unreasonably prejudice legitime interests of its maker

49 II. Database Protection  Lawful users of a database made available to the public  extracting & re-utilizing insubstantial parts of the contents, evaluated qualitatively and/or quantitatively, for any purposes (included commercial ones, see ECJ)  NOT perform acts which conflict with normal exploitation of the database or unreasonably prejudice the legitimate interests of its maker

50 II. Database Protection 3.Recent Case Law of the European Court of Justice (November 2004)  British Horseracing & Fixtures Marketing Cases  Background  The four cases (British Horseracing Board Ltd. v. William Hill; Fixtures Marketing Ltd. v. Oy Veikkaus Ab.; Fixtures Marketing Ltd. v. Svenska Spel Ab.; Fixtures Marketing Ltd. v. Oganismos Prognostikon Agonon Podosfairou Ae) came before the Court as a result of referrals from UK, Finnish, Swedish and Greek courts

51 II. Database Protection  British Horseracing Board (BHB) case arose over the use by William Hill, for the purpose of organising betting on horse racing, of information from the BHB database  In Fixtures Marketing cases, Finnish, Swedish and Greek betting firms used information taken from the fixture lists for the English and Scottish football leagues  Investment in the obtaining of the contents  Resources used to seek out existing independent materials and collect them in the database  Not resources used for the creation as such of independend materiels

52 II. Database Protection  Investment in the verification of the contents  Resources used with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation  Not resources used for verification during the stage of creation of materials which are subsequently collected in the database

53 II. Database Protection  Extraction and/or re-utilization  Any unauthorised act of appropriation and distribution to the public of the whole or a part of the contents. It does not imply direct access to the original database  Substantial part, evaluated quantitatively  Volume of data extracted from the database and/or re-utilised must be assessed in relation to the volume of the contents  Substantial part, evaluated qualitatively  Scale of the investment in the obtaining, verification or representation of the contents subject to extraction and/or re- utilization

54 II. Database Protection  First answers of the European Court of Justice:  Investment independent of that required for the creation of the data  Exclusion from data created at the same time as its processing  Is the derivation of data from naturally occurring phenomena an act of creation or obtaining?  Recording of meteorological data?  Genetic sequences of living organisms?  « get around » strategies?  Substantially invest in the presentation or subsequent verification of the information  Deny access to the public to the untreated source data

55 II. Database Protection 4.Deeplinking  Definition of deep link  A link from one website to another that:  Bypasses the second website’s home page and  Takes the user directly to an internal page on the site  Important national case law  No uniform answer

56 II. Database Protection

57

58  Dutch case: PCM v. Kranten.com (2000)  News website not protectable as database  Court held the newspaper had put insufficient effort into composing the collection of headlines  Danish case: Danish Newspaper v.Newsbooster (2002)  News website protectable as database  Deep linking infringes database right  Repeated & systematic reproduction and publication of claimant’s headlines and articles

59 II. Database Protection  Cadremploi v. Keljob (2001)  Job advertisements website protectable as database  Extraction of subtantial parts, evaluated qualitatively  Essential parts of a job offer include:  Post title  Sector of industry  Geographic zone  Publication date on Cadremploi site  URL address  Infringes database right

60 II. Database Protection 5.Conclusion  Processed information  Eligible to copyright protection  Eligible to database protection  Utility to mention the protection:  ©  “the database… is protected by database regulations. It is strictly forbidden, without the consent of the maker, to extract and/or re-utilize the whole or a substantial part of the content of this database”  Utility to use specific tools: PDF, technological measures (Directive on information society: access control/protection process: encryption, scrambling, copy control mechanism,…

61 paul.vandenbulck@ulys.net WWW.ULYS.NET & Q uestions A nswers Thank You!


Download ppt "Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS,"

Similar presentations


Ads by Google