Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS,

Slides:



Advertisements
Similar presentations
ULYS Avocat – Advocaten – Law firm ON LINE CONTRACTS Introduction to the European regulatory framework by THIBAULT VERBIEST
Advertisements

IP rights and competition law: Friends or foes? Etienne Wéry Attorney at the bars of Paris and Brussels Lecturer at Robert Schuman University (Strasbourg)
Legal issues linked to online recruitment Thibault Verbiest Attorney-at-law at the Brussels Bar and at the Paris Bar
“Infopaq and the common standard of originality in Europe” Professor Lionel Bently, University of Cambridge Dr Justine Pila, University of Oxford Dr Nick.
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
San Cannon Federal Reserve Board IASSIST 2010
The patentability of biotechnological inventions: The European Commission’s second 16c report Paul Van den Bulck Partner at Ulys Law Firm (Brussels) Lecturer.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Patentability of Software by Paul Van den Bulck Partner ULYS Law Firm
Intellectual Property Ronan Fitzpatrick School of Computing, Dublin Institute of Technology. September 2008.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
IPR-INSIGHTS CONSULTING AND RESEARCH 1116 BUDAPEST, KONDORFA U. 10. TEL.: (+36-1) FAX: (+36-1)
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Legality of Online Recruitment Online Recruitment Conference 20 th June 2006, Westminster London Paul Van den Bulck Lecturer, University Paris XII Lecturer,
The patentability of human pluripotent embryonic stem cells and stem cell lines Paul Van den Bulck Partner at Ulys Law Firm (Brussels) Lecturer at the.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
© Olav Torvund - INSTITUTT FOR RETTSINFORMAIKK UNIVERSITETET I OSLO Contract law and IPR.
B. Warusfel, nd EPIP Conference - Maastricht1 Legal protection of databases in Europe and public scientific research Pr. Bertrand WARUSFEL, University.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Chapter 25 Intellectual Property Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
A centre of expertise in data curation and preservation Digital Curation Centre/ Edinburgh eScience Collaborative Workshop – 12th June 2008 Funded by:
Copyright / Legal liability Paul Van den Bulck Brussels 28 November 2002 Law of : New Technologies Intellectual.
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
Ioannis Iglezakis Intellectual Property Part II. Open source software Open-source software is computer software whose source code is available under a.
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Legal Protection of Software and Databases Jennifer Pierce.
LEGAL ASPECTS OF CONTENT MINING copyright publisher licences country-specific legislation.
Copyright dilemma: Access right over databases of raw information? Gemma Minero, Lecturer in Law, Universidad Autónoma de Madrid.
Decompilation 1 Software Copyright Oren Bracha, Summer 2015.
Page 1 IOP Genomics Workshop Patents and Patenting Biotech Inventions Annemieke Breukink, Ph.D. September 8th, 2009.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
Copyright / Legal liability Paul Van den Bulck Brussels 6 th of february 2004 Law of : New Technologies Intellectual.
Knowledge Transfer | Accelerating Innovation KT Training – 9 September 2014 Introduction to Intellectual Property Rights D. Mazur – 9 September 2014.
© Olav Torvund - NORWEGIAN RESEARCH CENTER FOR COMPUTERS AND LAW UNIVERSITY OF OSLO European Instruments on Intellectual Property Olav Torvund.
The Development of Copyright within the European Union By Harald von Hielmcrone Head of Research, State and University Library of Aarhus. Danish representative.
Copyright / Legal liability Paul Van den Bulck Brussels 6 th of june 2003 Law of : New Technologies Intellectual.
Your use of Ordnance Survey mapping – is it legal? Richard Mortara Local Government & Emergency Services Contracts Manager 8 November 2006.
Licensing and Digital Exhaustion 1 Software Copyright Oren Bracha, Summer 2015.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
© A. Kur IP in Transition – Proposals for Amendment of TRIPS Annette Kur, MPI Munich.
A: Copy –Rights – Artistic, Literary work, Computer software Etc. B: Related Rights – Performers, Phonogram Producers, Broadcasters etc. C: Industrial.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Robert J. Hart CPA, EPA, FBCS Proposal for a Directive on the patentability of computer- implemented inventions  Commission proposal - 20 February 2002.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Protection of Databases Richard Warner. In the United States  Merely factual compilations of data in databases receive no copyright protection. Feist.
PATENTS, INTEGRATED CIRCUITS, AND INDUSTRIAL DESIGNS Presented By: Navdeep World Trade Organization.
Slide Set Eleven: Intellectual Property Patents, Trademarks and Copyrights 1.
Softwares and Databases: Copyright and Sui Generis Protection for functional creations LL.M in Intellectual Property October, 30th 2006 Cristiana Sappa.
Intellectual property (IP) - What is it?. Intellectual property (IP) Refers to creations of the mind, such as inventions; literary and artistic works;
Intellectual Property and Public Policy: Application of Flexibilities in the International IP and Trade system --Limitation and Exceptions for Education.
International Intellectual Property Prof. Manheim Spring, 2007 Exclusive Rights & Exceptions Copyright © 2007.
Patent Review Overview Summary of different types of Intellectual Property What is a patent? Why would you want one? What are the requirements for patentability?
ERASMUS PROGRAMME- INTELLECTUAL PROEPRTY LAW COPYRIGHT LAW – NEIGHBOURING RIGHTS, OTHER RELATED RIGHTS AND COLLECTIVE MANAGEMENT JUDr. Pavel Tůma, LL.M.
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Overview of presentation
Connectivity to bank and sample account structure
Interactive Gaming Council Board Meeting I-Gaming Legal status
Legal aspects of copying audiovisual work onto portable media devices
IPR AND CONCENTRATIONS
Computer Law th class: Open Source.
EU Database Protection
Christoph Spennemann, Legal Expert
ACCESS TO PROTECTED WORKS: LIMITS OF PERMITTED USE
Chapter I. Freedom and Open Source
Dr. Achim Seiler, EU-Project” Support of Yemen’s Accession to the WTO”
Presentation transcript:

Solvay Business School IT Law and IT Forensics Intellectual Property 26 th May 2005 Paul Van den Bulck Attorney at the Bar of Brussels Partner of ULYS, Law Firm Lecturer at the Robert Schuman University (Strasbourg)

Scope of the Presentation  What is Intellectual Property?  A name commonly given to a group of separate property rights, including:  Trademark;  Copyright;  Patent;  Database;  Design;  Layout design of integrated circuits;  Plant variety.

Scope of the Presentation  The presentation concentrates on two important IP issues under European Law: I.Software Protection II.Database Protection

I. Software Protection  Three Parts: A.Software Copyright B.Software Patent C.Know-How

A. Software Copyright 1.Legislation  European Law  Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs  Belgian Law  Law of 30 June 1994 on copyright (“droits d’auteur”) and related rights  Law of 30 June 1994 on the legal protection of computer programs

A. Software Copyright 2.Software Definition  No definition under the Directive  A set of instructions in a language that computers understand  Examples:  Operating systems (Mac OSX, Linux, Windows,…);  Web browsers, word processors, design software,…  Object code & source code both receive protection under copyright

A. Software Copyright 3.Object of protection  Protected as literary works within the meaning of the Berne Convention  Ideas and principles which underlie any element of a computer program, including those which underlie its interfaces, are not protected by copyright  Originality requirement: the computer program must be the author’s own intellectual creation

A. Software Copyright 4.Who owns the rights?  The person who has created the program is generally the right holder  Possible co-ownership  When created in the course of employment, the employer owns the economic rights, unless otherwise agreed between the employer & the programmer

A. Software Copyright 5.Exclusive rights  Permanent or temporary reproduction of a computer program by any means and in any form  Translation, adaptation, arrangement and any other alteration  Any form of distribution to the public, including the rental, of the original computer program or of copies thereof

A. Software Copyright 6.Scope of the protection  Ideas?  Efficiency considerations?  Extrinsic considerations?  Interfaces?

A. Software Copyright  Ideas?  Copyright only protects the expression of a computer program not ideas & principles:  « Whereas, for the avoicance of doubt, it has to be made clear that only the expression of a computer program is protected and that ideas and principles which underlie any element of a program, including those which underlie its interfaces, are not protected by copyright under this Directive »  Algorithm:  Mathematics formula  Interpretation of Directive Recital 14  Word/Sentence

A. Software Copyright  Efficiency considerations?  Merger doctrine between idea & expression  Only one way to express one idea  Extrinsic considerations?  « Scènes à faire » doctrine  Mechanical specifications of the computer on which a particular program is intended to run  Compatibility requirements of other programs with which a program is designated to operate in conjunction  Computer manufacturer’s design standards  Demands of the industry being serviced  Widely accepted programming practices wihin the computer industry

A. Software Copyright  Interfaces?  Parts of the program intended to allow it to communicate and work together with other components of a computer system and with users  Protected only if original expression

A. Software Copyright 7.Exceptions to software copyright  A lawful holder is entitled:  To use the computer program for its intended purpose  To correct errors in the program  To make a back-up  To observe, study or test the functioning of the program in order to discover how it works

A. Software Copyright  To use it for its intended purpose  « In the absence of specific contractual provisions, the acts above referred shall not require authorization by the right holder where they are necessary for the use of the computer program by the lawful acquirer in accordance with its intended purpose, including for error correction »  Allowing decompilation for error correction: quid in practical terms?

A. Software Copyright  To make a back-up  « The making of a back-up copy by a person having the right to use the computer program may not be prevented by contract insofar as it is necessary for that use »  No contractual exception!

A. Software Copyright  Exception for study purposes  « The person having the right to use a copy of a computer program shall be entitled, without the authorization of the rightholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do »  It is allowed to look at what is allowed to be seen!

A. Software Copyright 8.Decompilation  What does « decompile » mean?  Converting the object code of a program into source code  Conflict of interests?  Making one’s software interoperable with other software in the public interest  Keeping the source code of a program secret for business purposes

A. Software Copyright  Directive provision  The authorization of the right holder is not required:  when reproduction of the code and translation of its form are indispensable to obtain the information necessary to achieve the interoperability of an independtly created computer program with other programs  these acts are performed by a person having a right to use a copy of a program  the information necessary to achieve interoperability has not previously been readily available to this person  these acts are confined to the parts of the original program which are necessary to achieve interoperability

A. Software Copyright  Restriction to decompilation  The information obtained cannot be used for goals other than to achieve the interoperability of the independently created computer program  The information obtained cannot be given to others, except when necessary for interoperability  The information obtained cannot be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright  Decompilation cannot be used in a manner which unreasonably prejudices the right holder’s legitimate interests or conflicts with a normal exploitation of the computer program

A. Software Copyright

 Interoperability case: Microsoft v. EU Commission  In March 2004, the European Commission imposed a record fine of €497 million and a series of 'remedies' upon Microsoft for abuse of dominant position on the software market with its Windows operating system  According to the EU Commission, Microsoft abused its market power by deliberately restricting interoperability between Windows PCs and non-Microsoft work group servers, and by tying its Windows Media Player (WMP), a product where it faced competition, with its ubiquitous Windows operating system  Appeal launched before the EU Court of Justice

A. Software Copyright 9.Term of protection  Author’s life + 50 years after his death or after the death of the last surviving author  70 years in Belgium!

A. Software Copyright 10.Digital Rigths Management (DRM)  What does it mean?  All technical measures used by right holders to protect software copyright  Example: an activation code required to the licensee by the software manufacturer in order to use the software  Purpose: preventing copyright infringement

A. Software Copyright  Directive provision  Requires Member States to take measures  Against any act of putting into circulation, or the possession for commercial purposes of,  Any means only intended to break DRM  Belgian law  Fine from 2,5 EUR to EUR  Against anyone who puts into circulation, or possesses for commercial purposes, any means the sole intended purpose of which is to facilitate the unauthorized removal or circumvention of any technical device which may have been applied to protect a computer program

A. Software Copyright

 DRM case in France: Virgin v. Apple  VirginMega (Virgin Group’s French online music joint venture with media company Lagardère Group) launched a claim against Apple before French Competition Council  VirginMega claims that Apple had anti-competitive behaviour by refusing to licence the iTunes Music Store’s Fair Play DRM technology  VirginMega uses Windows’audio and DRM technology which is not supported by the Ipod  French Competition Council dismissed the claim in November 2004

A. Software Copyright 11.Licensing  What is a software copyright licence?  Copyright holder’s permission to do some of the things restricted by copyright, among others: running, modifying and distributing the program  Examples  Allowing the licensee to install and run the program on only one or on several computers

A. Software Copyright  Semi-free licence : free only for non-commercial users  Shareware licence : allows unlimited redistribution but only limited trial use of the software (e.g. 30 days)  Crippleware system: software distributed under shareware licence but in an incomplete or « crippled » form. The user must pay a fee to get an « uncrippled » version of the software

A. Software Copyright  Copyleft?

A.Software Copyright  Copyleft?  Inventor  Richard Stallman invented “copyleft” in disagreement with the concept of software copyright  He believed that anyone ought to use and modify software without asking anyone’s permission  Principles  Software is copyrighted but made available under a special license  Copyleft licence allows any user to freely run, copy, modify and distribute the copyleft software

A.Software Copyright  Modifying the software for one’s own personal use is permitted  Two requirements in case of distribution of the modified version: Source code and object code of the modified version must both be distributed The modified version must itself be under copyleft licence  Examples of Copyleft licence  GNU General Public Licence (GPL) One of the most commonly used copyleft licence Created in 1991  Linux

A.Software Copyright

 Example of No Copyleft licence  BSD licence  Allows anyone to freely run, copy and distribute the software  Allows to modify it and to distribute the modified version under restriction and without copyleft  Pros and cons  Source code is public  Program is adaptable and constantly improved by other programmers  Reliability and durability?  Dependency on the service supplier?  Fragmentation risk?  Intern skills?

A.Software Copyright  Conclusion  Open Source >< Not Open Source  Copyleft >< No Copyleft  Free of charge>< Not Free of charge

B. Software Patent 1.Legal Background  Munich Convention  Belgian Law  USA, JAPAN  WIPO, TRIPS

B. Software Patent 2.WIPO  Copyright  “Computer programs are protected as literary works within the meaning of Article 2 of the Berne Convention. Such protection applies to computer programs, whatever may be the mode or form of their expression.”Article 2 of the Berne Convention  Patent  Nothing about computer program in the Paris Convention

B. Software Patent 3.TRIPS  Copyright  “Computer programs, whether in source or object code, shall be protected as literary works under the Berne Convention (1971).”  Patent  “ (…)patents shall be available for any inventions, whether products or processes, in all fields of technology, provided that they are new, involve an inventive step and are capable of industrial application.”

B. Software Patent 4.European Patent Convention (1973)  Article 52(1)  Computer programs as such are not patentable “(1) European patents shall be granted for any inventions which are susceptible of industrial application, which are new and which involve an inventive step. (2) The following in particular shall not be regarded as inventions within the meaning of paragraph 1:paragraph 1 (a) discoveries, scientific theories and mathematical methods; (b) aesthetic creations; (c) schemes, rules and methods for performing mental acts, playing games or doing business, and programs for computers; (d) presentations of information.”

B. Software Patent 5.EU Proposal Directive on the patentability of computer-implemented inventions  Proposal first launched in February 2002  Demand from the EU Parliament for a renewed referral last February  Adoption in Council last March  Still in discussion

B. Software Patent  EU Council Position  Definition of a « computer-implemented invention »  « Any invention the performance of which involves the use of a computer, computer network or other programmable apparatus, the invention having one or more features which are realised wholly or partly means of a computer program »  In order for a software related invention to be patentable, a technical contribution remains necessary  A technical contribution means a contribution to the state of the art in a field of technology, which is new and not obvious to a person skilled in the art

B. Software Patent  Pros and Cons of Software Patent  Protection of algorithm  Protection against independent creation  Easy to licence  Do not rely on secrecy  Cost  Procedure too long & protection term inadequate for the short lifetime of software inventions  Uncertainty about the patent subject-matter  Inventivity & Novelty requirements

C. Know-How 1.Definition  “know-how” v. “trade secrets”  Often used as synonym but are by no means identical  Know-how may constitute a trade secret  Not every trade secret falls within the definition of know-how  Financial information, employment planning 2.Protection : source code  Licence and know-how agreements  Exclusivity/non exclusivity  Confidentiality

II. Database Protection 1.Legal Background  Copyright protection  Intellectual creation: Berne Convention, TRIPS, directive copyright  Sui generis protection  Directive 96 EC on the legal protection of databases

II. Database Protection 2.Directive 96 EC  Scope  Collection of independent works, data or other materials  Arranged in a systematic or methodical way  Individually accessible by electronic or other means  Exclusion  Computer programs  Database contents

II. Database Protection  Protection of the presentation of the database  Copyright in favor of the author if: by reason of the selection or arrangement of its contents, constitutes the author’s own intellectual creation  Protection of the database itself  « Sui generis » right in favor of the « maker »:  Right of the maker of a database to prevent extraction and or re- utilization of the whole or of a substantial part of the contents of the database  Condition of this right: the maker must show that there has been a substantial investment in either the obtaining, verification or presentation of the contents  Protection of one/several data by copyright: data=work of author

II. Database Protection  Object of protection  Extraction of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the database contents  Re-utilization of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the database contents

II.Database Protection  Object of protection  Extraction: permanent or temporary transfer of all or a substantial part of the contents to another medium  Re-utilization: any form of making available to the public all or a substantial part of the contents by the distribution of copies, by renting, by on-line or other forms of transmission  Repeated & systematic extraction and/or re-utilization of insubstantial parts which conflict with normal exploitation or which unreasonably prejudice legitime interests of its maker

II. Database Protection  Lawful users of a database made available to the public  extracting & re-utilizing insubstantial parts of the contents, evaluated qualitatively and/or quantitatively, for any purposes (included commercial ones, see ECJ)  NOT perform acts which conflict with normal exploitation of the database or unreasonably prejudice the legitimate interests of its maker

II. Database Protection 3.Recent Case Law of the European Court of Justice (November 2004)  British Horseracing & Fixtures Marketing Cases  Background  The four cases (British Horseracing Board Ltd. v. William Hill; Fixtures Marketing Ltd. v. Oy Veikkaus Ab.; Fixtures Marketing Ltd. v. Svenska Spel Ab.; Fixtures Marketing Ltd. v. Oganismos Prognostikon Agonon Podosfairou Ae) came before the Court as a result of referrals from UK, Finnish, Swedish and Greek courts

II. Database Protection  British Horseracing Board (BHB) case arose over the use by William Hill, for the purpose of organising betting on horse racing, of information from the BHB database  In Fixtures Marketing cases, Finnish, Swedish and Greek betting firms used information taken from the fixture lists for the English and Scottish football leagues  Investment in the obtaining of the contents  Resources used to seek out existing independent materials and collect them in the database  Not resources used for the creation as such of independend materiels

II. Database Protection  Investment in the verification of the contents  Resources used with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation  Not resources used for verification during the stage of creation of materials which are subsequently collected in the database

II. Database Protection  Extraction and/or re-utilization  Any unauthorised act of appropriation and distribution to the public of the whole or a part of the contents. It does not imply direct access to the original database  Substantial part, evaluated quantitatively  Volume of data extracted from the database and/or re-utilised must be assessed in relation to the volume of the contents  Substantial part, evaluated qualitatively  Scale of the investment in the obtaining, verification or representation of the contents subject to extraction and/or re- utilization

II. Database Protection  First answers of the European Court of Justice:  Investment independent of that required for the creation of the data  Exclusion from data created at the same time as its processing  Is the derivation of data from naturally occurring phenomena an act of creation or obtaining?  Recording of meteorological data?  Genetic sequences of living organisms?  « get around » strategies?  Substantially invest in the presentation or subsequent verification of the information  Deny access to the public to the untreated source data

II. Database Protection 4.Deeplinking  Definition of deep link  A link from one website to another that:  Bypasses the second website’s home page and  Takes the user directly to an internal page on the site  Important national case law  No uniform answer

II. Database Protection

 Dutch case: PCM v. Kranten.com (2000)  News website not protectable as database  Court held the newspaper had put insufficient effort into composing the collection of headlines  Danish case: Danish Newspaper v.Newsbooster (2002)  News website protectable as database  Deep linking infringes database right  Repeated & systematic reproduction and publication of claimant’s headlines and articles

II. Database Protection  Cadremploi v. Keljob (2001)  Job advertisements website protectable as database  Extraction of subtantial parts, evaluated qualitatively  Essential parts of a job offer include:  Post title  Sector of industry  Geographic zone  Publication date on Cadremploi site  URL address  Infringes database right

II. Database Protection 5.Conclusion  Processed information  Eligible to copyright protection  Eligible to database protection  Utility to mention the protection:  ©  “the database… is protected by database regulations. It is strictly forbidden, without the consent of the maker, to extract and/or re-utilize the whole or a substantial part of the content of this database”  Utility to use specific tools: PDF, technological measures (Directive on information society: access control/protection process: encryption, scrambling, copy control mechanism,…

& Q uestions A nswers Thank You!