COPYRIGHT What is copyright? Copyright law is concerned in essence with the negative right of preventing the copying of physical material. It is not concerned with the reproduction of ideas, but with the reproduction of the form in which ideas are expressed. Today, not only is protection given to literary, dramatic, musical and artistic works, but also to sound recordings1, films, broadcasts, cable programs, computer programs and the typographical arrangement of published editions. The difference between a copyright and a patent is while a copyright on the one hand is a limited monopoly having its origin in protection closely analogous to patent rights, protecting the fruits of author's exertions in literary, dramatic, artistic or musical compositions, the protection afforded by the patents law is broader than in the case of copyright. By grant of a patent, the patentee acquires an exclusive right to make, use and vend the thing patented by copyright, while the owner of the copyright acquires the exclusive right of multiplying copies and doing other things analogous to this. The patent law protects the production and use of the creative conception reduced to practical shape in various forms; the copyright law protects publication of the copies in the form of the creative conception in which it has been expressed by the author. The right secured by the copyright is the right to that arrangement of words which the author has selected to express his/her ideas. The fundamental purpose of copyright protection, therefore is to promote societal development and thus the 1 A sound recording may be of a literary work spoken or recited, the spoken dialogue of a dramatic work or of a song. There may be copyright subsisting in the subject matter recorded. Since making of a sound recording of a literary, dramatic or musical work constitutes infringement of that work a sound recording made without the license of the owner of the copyright in that work will constitute infringement of that work. A sound recording may be of a literary work spoken or recited, the spoken dialogue of a dramatic work or of a song. There may be copyright subsisting in the subject matter recorded. Since making of a sound recording of a literary, dramatic or musical work constitutes infringement of that work a sound 1 improvement of all persons- by encouraging the production and dissemination of creative works. Copyright are exclusive rights subject to the provisions of the Act, to do or authorize the doing of any of the acts laid down in the Act. These rights include: 1. the right to reproduce the work, 2. to issue copies of the work to public, 3. to perform the work in public, 4. to communicate the work to public, 5. to make a cinematograph film or sound recording, 6. to make any translation or adaptation of the work, 7. to sell or give on hire any copy of the computer program or sound recording2., and so on. There is no copyright in ideas, subject-matter, themes, plots or historical or legendary facts, however original or brilliant and is confined to the form, manner and arrangement and expressions of the idea by the author of the copyright work. What copyright protects is not the raw materials from which the work is created but the skill and labor employed by the author in the creation of the work. Any other person can produce substantially the same work using the same raw materials or even ideas without infringement if he/she does it originally without copying from the other work. Suppose, I hold a copyright for the expression " Jack and Jill went up the hill", a copyright violation will not be recording made without the license of the owner of the copyright in that work will constitute infringement of that work. 2 Dealers in musical records may have a record lending library, the subscribers to the scheme paying a subscription and a borrowing fee. The subscribers may use the hired records for home taping. It has been held that such activities of a dealer did not amount to authorizing infringement of copyright. The defendant's had at the request of the plaintiff's displayed warning notices and attached stickers to the records regarding the copyright position; See A. & M. Records v. Audio Magnetics [1979] F.S.R. 1; CBS v. Ames [1981] R.P.C. 407.; CBS U.K. v. Amstrad [1988] R.P.C. 567; Cited from Cornish, W.R., Intellectual Property: Patents, Copyrights, Trademarks and Allied Rights, 3 rd edn, Sweet and Maxwell, London, 1996, at 369. 2 committed if the expression "Jack went up the hill along with Jill” is used 3. In determining whether there is an infringement, where the subject matter of the work is not original, the question is how far an unfair or undue use has been made of the work. If a person instead of obtaining the subject matter from common sources avails himself/herself of the labor of his/her predecessor, adopts his/her arrangements and quotations, or adopts them with a colorable variation it is an illegitimate use. Another related concept is that of passing-off. Apart from statute, an action will lie for the passing-off of a work as the work of the plaintiff, if its title or appearance is such as to lead the public to believe that they are purchasing, or using, a work of the plaintiff and injury is likely to accrue to the plaintiff; it is not necessary to show an intention to deceive. The thing said to be passed off must however, resemble the thing for which it is passed off. Such an action may be brought by publishers who have acquired the copyright in a work from the author, to restrain a publication of a similar work using the author’s name so as to induce the public to believe it was the same as the original work.4 Infringements of copyright may be divided into primary or direct infringement, which consist of the unauthorized exercise by persons (not being the copyright owners) of rights restricted by the Copyright Acts, and secondary, or indirect infringement, which consist mainly of unauthorized dealings with articles which were made in infringement of copyright, together with various other acts. A basic distinction between the two is that secondary infringement requires the defendant to have some degree of knowledge that what is being done is an infringement, whereas in the case of primary infringement any such knowledge is not an ingredient of the cause of action. 3 Muralidharan, R., Legal Protection of Computer Software, at 3. 3 These are some of the basic preliminaries which need to be covered before an intense discussion on the topic at hand can be commenced. 4 Lord Hailsham of St. Marylebone (ed.), Halsbury's Laws of England, Vol. 9, Butterworths, London, 1974, at 513. 4 EVIDENTIARY ASPECTS In a copyright infringement case, pre-trial pending work requires a lot of evidential analysis on which to structure the suit. Some of the important steps to be initiated and clarified are as follows: Issues In a suit for infringement of copyright the following issues arise: 1. Is the plaintiff entitled to file the suit? In other words is he/she the owner of a copyright as defined in Section 54 of the Act? 2. Does copyright subsists in the work alleged to have been infringed? 3. Does what the defendant done, or proposes to do constitute infringement of the copyright in the work? 4. Does the defendant's act come within the scope of any of the exceptions to the infringement listed in Section 52? 5. What remedies the plaintiff is entitled to? Evidence to be adduced The plaintiff will be the one to adduce evidence to establish the following: 1. The copyright work is original or otherwise qualifies for subsistence of copyright under the Act. 2. The date of coming into existence of the work. 3. The term of copyright has not expired on the date of filing the suit or on the date of committing the alleged infringement. 4. Particulars of the act done by the defendant, alleged to constitute infringement, or the acts proposed to be done likely to constitute infringement when completed. 5. The acts done or likely to be done by the defendant would constitute infringement of the copyright work. 5 The defendant's evidence will depend upon how far the plaintiff establishes a case of infringement. He/she may adduce evidence to prove that the alleged copyright work is not original or that it is not entitled to copyright, the term of the copyright has expires, the alleged acts done by him/her were not done by him/her or if done by him/her, they do not constitute infringement of copyright or that it comes within the scope of one or other of the statutory exceptions and that the plaintiff has not suffered or is likely to suffer any damages from the activities of the defendant. Direct Evidence In most cases there will be no direct evidence of copying. Copying can only be deduced by inference from all the surrounding circumstances. In the case of infringement of literary works, the defendant's work containing the same errors as in the plaintiff's work, similarity in language and idiosyncrasies in style, may constitute some evidence of copying. When materials in which copyright is claimed are not produced at the hearing then their nature must be proved by other evidence. As Lord Esher M.R., said in Lucas v. Williams5: …to produce the original picture and the alleged copy, so that the jury may compare the two, may be the most satisfactory evidence of imitation, but it does not follow that it is the only evidence of it which can be given, nor does it follow that the evidence which was given in his/her case is only secondary evidence. Primary evidence is evidence which the law requires to be give first: and Secondary evidence is evidence which may be given in the absence of the better evidence which the law requires to be given first, when a proper explanation is given of the absence of that better evidence. 6 In other words, what difference is there in principle between a man's handwriting and a picture, which he/she paints? The witness says, Looking at the picture which the defendant sold, I say it is exactly like XXX's picture. When he/she is asked, How do you know that?, he/she answers, Because I have seen XXX's picture. This is not secondary evidence, but original evidence. Different kinds of evidence may be used to prove the same fact, and this is another way of proving the fact that, the picture which the defendant's sold is a copy of the original picture in respect of which there is a copyright. Burden of Proof [The burden of proving infringement is on the plaintiff. In establishing the defenses pleaded the burden is on the defendant. Where there is substantial similarity between the plaintiff's copyright work and the defendant's alleged infringing copy, that would be sufficient to raise a prima facie case of actual copying and if the defendant did not call evidence to rebut the prima facie case, then copying is proved. The defendant may refute by evidence that notwithstanding the similarity there was no copying but independent creation. Evidence of access to the plaintiff's product and evidence of striking general similarities between the products gives rise to a prima facie case of infringement. But the defendant could give alternative explanation of the similarities in a convincing manner.] Expert Evidence Expert evidence may be called to point out similarities, coincidences and the like, in order to support a contention of copying, or the converse, but the expert must stop short of giving his/her opinion that the work under criticism is in fact a copy. That is a question for the judge. 5 (1892) 2 QB 113 at 116. 7 Infringement of a musical work is not to be determined by a note for note comparison, but should be determined by the ear as well as by the eye. The question whether the defendant has copied the plaintiff's work depends to a large extent on the judge's own impression and on expert evidence. In cases of technical and scientific works, to decide the question of infringement of copyright, expert evidence may be necessary. Where the case involves minute scrutiny of alleged similarities and dissimilarities and extensive and lengthy comparison, it is not only proper but essential, that the case should be tried with the aid of experts who might be appointed commissioners to investigate and report similarities. But the commissioner's evidence is no evidence. A distinction between direct and indirect infringers has been already drawn at the outset6, though it is an analysis disputed by the majority. It differentiates between one who copies an original and one 'who copies a copy, supposing it to be an original'. An indirect (or, secondary) infringer should only be liable to an injunction and compelled to return profits made on the infringement. The plaintiff must prove that, directly or indirectly, the defendant's alleged infringement is taken from the work or subject-matter in which he/she claims copyright. Thus the two elements necessary to the plaintiff's case in an infringement action are: a. ownership of the copyright by the plaintiff, and b. copying by the defendant. OWNERSHIP: 6 In the Introduction, at 5. 8 Subject to certain exceptions7 the author of a literary, dramatic, musical or artistic work is entitled to the copyright in the work. The author is the person who actually writes, compiles, composes or draws the work in question, although the idea of the work may have been suggested by another, or the work may have been subsequently altered in accordance with the advice of another.8 Where, however, the compiler of a directory or work of reference collects written material from a large number of individuals and arranges and publishes the result, the compiler and not the individuals supplying the information, is the author of the work. A mere copyist or a person to whom words are dictated for the purposes of being written down is not an author; but a translator from one language into another or a reporter of legal decisions or of a speech is an author. The author of a photograph is the person who, at the time when the photograph is taken, is the owner of the material on which it is taken. The author of the design of a building in which copyright subsists is the architect who makes the plans and supervises the work and not the builder Joint Authors Joint authors are in the position of tenants in common and not of joint tenants. One joint author cannot lawfully reproduce the work himself/herself or grant licenses to others to reproduce it without the consent of the other joint author(s), but he/she may by himself/herself take proceedings for infringement. Where copyright would not have subsisted in a work if one of the joint authors had been the sole author (or if more than one of the joint authors had been the sole joint authors), the copyright is owned by the other joint author(s). 7 As to works by an author under a contract of service or apprenticeship, commissioned artistic works, works of joint authorship, etc. 8 Lord Hailsham of St. Marylebone (ed.), Halsbury's Laws of England, Vol. 9, Butterworths, London, 1974, at 548. 9 Ownership by the plaintiff (the copyright owner usually) breaks down into the following constituent parts:9 1. Originality in the author. 2. Copyrightability of the subject matter. 3. Citizenship status of the author such as to permit a claim of copyright. 4. Compliance with applicable statutory formalities. 5. (If the plaintiff is not the author), a transfer of rights or other relationship between the author and the plaintiff so as to constitute the plaintiff the valid copyright claimant. With respect to most of the above elements of ownership, the copyright registration certificate constitutes prima facie evidence, in favor of the plaintiff. This is clearly true on the issue of originality, as well as in establishing the copyrightability of the subject matter and the citizenship status of the author. Satisfaction of the statutory formalities is likewise presumed by reason of the registration certificate, as is the plaintiff's chain of title from the author, where the plaintiff obtained an assignment of rights prior to registration. By reason of the benefit of such presumption, the only evidence required of the plaintiff to establish prima facie ownership in addition to the registration certificate is evidence of plaintiff's chain of title from the original registrant. Once the plaintiff has established prima facie his/her ownership, the burden of proof then shifts to the defendant to counter this evidence. COPYING It has been accepted that copying could occur subconsciously where a person reads, sees or hears a work, forget about it but then reproduces it, genuinely believing it to be his/her own. In such cases, proof of copying depends on…a number of composite elements; the degree of familiarity with the plaintiff's work, 9 Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-4. 10 the objective similarity of the defendant's work, the inherent probability of coincidence…10 Also, a work may be copied by imitating a copy of it. If the plaintiff owns a copyright drawing and then turns it into a three dimensional article and this is copied in three dimensional by the defendant, the causal connection for indirect copying of the drawing will be established. Likewise, if a novel is turned into a play, which is in turn converted into a ballet- but the causal chain must run in the right direction.11 Where the defendant has reworked the plaintiff's material, there comes a point beyond which the plaintiff has no claim. Whatever may have been the position in the past, the fact that the defendant has himself/herself added enough by way of skill, labor and judgement to secure copyright for his/her effort does not, under the present law, settle the question whether he/she has infringed; rather the issue is whether a substantial part of the plaintiff's work survives in the defendant's so as to appear to be a copy of it.12 Thus, would book reviews constitute a copyright infringement if we extended this logic?13 Where the plaintiff's work records information, the use that a defendant may make of it for his/her own purposes may not be a substitute for exercising his/her own labor, skill and judgement, but is to be taken as a starting point for his/her own 10 Per Wilberforce J., Francis Day v. Bron [1963] Ch. 587, at 614; cited from Cornish, W.R., Intellectual Property: Patents, Copyrights, Trademarks and Allied Rights, 3 rd edn, Sweet and Maxwell, London, 1996, at 361. 11 Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-4. 12 In Joy Music v. Sunday Pictorial [1960] 2 Q.B. 60, a song lyric had been parodied in pursuit of Prince Philip; but only one repeated phrase was taken, and that with pointed variation. There was held to be no infringement as a way of emphasizing that nothing substantial must remain from the plaintiff's work: Cited from Cornish, W.R., Intellectual Property: Patents, Copyrights, Trademarks and Allied Rights, 3 rd edn, Sweet and Maxwell, London, 1996, at 364. 13 In Warwick Film v. Eisinger [1969] 1 Ch. 508 where an author published an edited version of Oscar Wilde's trials an earlier version previously having appeared, he acquired copyright in the whole by virtue of his work in selecting and providing linking passages. But a defendant who took from large passages from the transcript, but very little of his own work was held to infringe, thereby neatly adjusting the scope of protection to the author's literary effort. 11 collation of information or as a means of checking his/her own independent research. It is generally not possible to establish copying by direct evidence, since it is rare that the plaintiff has available a witness to the act of copying. Apart from the unavailability of witnesses, copying may occur without any objective physical manifestation since copying from memory is no less actionable than is copying from direct view. Therefore copying is established indirectly by the plaintiff's proof of access and substantial similarity- although proof of access and substantial similarity are sine qua non to a finding of copying, such evidence does not require the trier of fact to find copying.14 But, despite proof of access and substantial similarity, the trier of fact may uphold a finding of no copying if such trier believed the defendant's evidence of independent creation, except where the similarity between the two works is such that no explanation other than copying is reasonably possible. If the defendant in fact copied from a work other than that of the plaintiff's (and such work was not itself copied from the plaintiff's) it is irrelevant in plaintiff's infringement claim that the defendant may have infringed the copyright in such other work. Since a plaintiff ordinarily can do no more than offer evidence of access and substantial similarity in proving the act of copying, the Courts have sought to give some measure of protection to the plaintiff's against a trier's uncritical acceptance of the defendant's answering claim of independent creation. This has been achieved through the imposition on the defendant of a high standard of proof of independent creation where the plaintiff has clearly established access and substantial similarity. 12 Where, however apart from the similarities appearing in the two works there are also material and broad dissimilarities which negative the intention to copy the original and the coincidences appearing in the two works are clearly incidental, no infringement of the copyright comes into existence. Infringement of copyright being a tort, in the ordinary course, an employer will be vicariously liable for any infringement committed by an employee in the course of his/her employment and for the acts of independent contractors which he/she specifically requested. In this The Copyright, Designs and Patents Act, 1988 has introduced three forms of infringement: i. Authorizing infringement by others [section (16)(2)] ii. Permitting a place of public entertainment to be used for performance of a work [section 25] iii. Providing apparatus for performing, playing or showing a work, etc.[section 26] Authorize has been read as bearing its dictionary meaning of sanction, countenance or approve. In line with theses broad synonyms, it has been said that indifference, exhibited by commission or omission, may reach a degree from which authorization or permission may be inferred. Permitting performance is expressly stated to be subject to the defense of reasonable belief that there would be no infringement, authorizing is not the subject of specific exceptions, but the meaning given to the word excludes liability when the defendant could not reasonably expect that another would infringe. It is also necessary to show an act of infringement which has occurred as a result of the authorization. 14 .Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-6. 13 Look and Feel Test One of the surest and safest test to determine whether or not there has been a violation of copyright, is to see whether a reasonable man, who is a spectator/viewer after having seen or read both the works is clearly of the opinion and gets an unmistakable impression that the subsequent work appears to be a copy of the original. In Lotus Development Corp. v. Paperback Software International15 the Court laid down the look and feel test as: 1. The decision maker must focus upon alternatives that counsel may suggest, or the Court may conceive, along the scale from the most generalized conception to the most particularized, and choose some formulations- some conceptions or definitions of the idea- for the purpose of distinguishing between the idea and its expression. 2. The decision maker must focus upon whether an alleged expression of the idea is limited, to elements essential to the expression of that idea (or in one of only a few ways of expressing the idea) or instead, includes identifiable elements of expression not essential to very expression of that idea. 3. Having identified elements of expression not essential to every expression of the idea, the decision maker must focus on whether those elements are a substantial part of the allegedly copyrightable work. But the Courts in the subsequent cases of Lotus Development Corp. v. Borland International Inc16., and Apple Computer Inc. v. Microsoft Corp.17 refused to rely on this test, but preferred the abstraction-filtration test. 15 740. F.Supp. 37 (D.Mass. 1990); wher it was held that Lotus' copyright in its popular 1-2-3 spread sheet program protected the user interface and that Paperback in its spread sheet program had infringed Lotus' copyright by copying a number of aspects; Cited from Gopalakrishnan, N.S., Intellectual Property and Criminal Law, National Law School Of India University, Bangalore, 1994, at 165. 16 788 F.Supp. 78 (D.Mass. 1992); Cited from Gopalakrishnan, N.S., Intellectual Property and Criminal Law, National Law School Of India University, Bangalore, 1994, at 167. 14 Abstraction-Filtration Test In 1992, there was another test called the abstraction-filtration test, which was an improvement18 over the previous look and feel test developed in the case of Computer Associates International v. Altai.19 1. Breaking down the allegedly infringed program into its constituent structural parts. 2. Examining each of the parts for such things as incorporated ideas, expression that is necessarily incident to those ideas, and elements that are taken from the public domain in order to sift out all non-protectable material 3. Comparing whether 'creative expression' remains after following this process of elimination, with the structure of the allegedly infringing program. The result of this comparison- will determine whether the protectable element of the programs at issue are substantially similar, so as to warrant a finding of infringement. But this test has been criticized on the ground that it is difficult to apply in practice and it seems artificial to break up a program into such constituent parts. ACCESS Some Courts have defined access as the actual viewing and knowledge of plaintiff's work by the person who composed defendant's work. This definition is submitted to be erroneous. Just as it is virtually impossible to offer direct proof of copying, so it is often impossible for a plaintiff to offer direct evidence that defendant (or the person who composed defendant's work) actually viewed or had knowledge of plaintiff's work. Such viewing will normally have occurred, if 17 24 UPSQ 2d 1081 (N.D.Cal. 1992); Ibid. Tripathy, B.P. and P.K.Prabhat, A Case for Effective Legal Protection of Computer Programs in India- A Panacea for the Paradox, 1 Crit Law (1998), 11, at 15. 18 15 at all, in a private office or home outside of the presence of any witnesses available to the plaintiff. For this reason it is clear that even if evidence is unavailable to prove the fact of actual viewing, if it can be shown that the defendant had the opportunity to view, this (when combined with substantial similarity) is sufficient to permit the trier to conclude that copying has occurred. But this result is often reached through the Courts reasoning that the opportunity to view creates an inference of access, which in turn creates an inference of 'copying'. Such an approach tacitly if not expressly adopts the actual viewing definition of access; seeming more just in terms of plaintiff's burden of proof20 to regard a reasonable opportunity to view as access in itself and not merely as creating an inference of access. This approach is consistent with what is perhaps the more prevailing definition of access, that is, the opportunity to copy. The trier of fact may conclude that the person who created defendant's work had, but did not avail himself/herself of the opportunity to view, but this conclusion is with regards the ultimate issue of copying. Reasonable opportunity as here used, does not cover any bare possibility in the sense that anything is possible. Access may not be inferred through mere speculation or conjecture. There must be a reasonable possibility of viewing plaintiff's work- not a bare possibility. Thus, the mere fact that plaintiff's 19 23 USPQ 2d 1241 (2d. Cir. 1992); Cited from Gopalakrishnan, N.S., Intellectual Property and Criminal Law, National Law School Of India University, Bangalore, 1994, at 166. 20 Even if the plaintiff is unable to prove actual viewing by the defendant, but is able to establish the reasonable opportunity to view, this should be regarded as a showing of access for the purposes of shifting the burden to the defendant to establish independent creation. If the burden shifts to defendant where physical possession of the manuscript is shown notwithstanding a claim by defendant that he/she had forgotten its contents, or did not read it, the burden should likewise shift where the defendant denies that he/she ever obtained physical possession although he/she had a reasonable opportunity to obtain such possession. In each case the burden should shift because the plaintiff often can no more prove actual physical possession than he/she can, assuming such possession, prove the act of reading and the memory of such reading.; Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-10. 16 manuscript is physically in the same city as that in which the defendant resides does not give the defendant an opportunity to view the manuscript notwithstanding the bare possibility of such an access. On the contrary, the mere lapse of a considerable period of time between the moment of access and the creation of defendant's work does not preclude a finding of copying.21 When plaintiff must prove access: The owner must show that a causal connection is the explanation of the similarity between the work and the infringement- the other possibilities being that he/she copied from the defendant, that they both copied from a common source, or that they arrived at their results independently. On the other hand, he/she does not have to show that the defendant knew that his/her copying constituted an infringement. As with other rights of property recognized at common law, the primary exclusive rights may be asserted against even the defendant who honestly believes that he/she purchased the right to reproduce the work. Where there has been copying and all or virtually all of a work is taken without emendation, the proof of infringement is straightforward; difficulties arise to the extent that this is not the case. The Copyright, Designs and Patents Act, 1988, Section 16(3)(a) requires that a substantial part must be copied giving expression to a sense of fair play. Thus this depends on the quantity rather than the quality of what the defendant has taken. It has also been insisted that the copying must be of the expression of ideas, rather than just of the ideas; but this an ill-defined distinction. But Courts are inevitably pressed with cases where the plaintiff's grievance is that he/she thought of the very first instance of a whole type of work (a detective story, a restaurant guide, et al) and wants rights over all subsequent variants. In relation to infringement, the idea/expression dichotomy 21 Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-12. 17 directs a necessary enquiry to restrict copyright to a taking from the protected work, and there seems no better indicator of the judgement called for. But in the judges view if what is worth copying is prima facie worth protecting, it may considerably stretch the notion of expression. Once convinced that the defendant unfairly cut a competitive corner by setting out to revamp the plaintiff's completed work, they will not be easily dissuaded that the alterations have been sufficient. In this approach, the taking of ideas alone, is confined to cases where the defendant does not start from the completed work at all, save in the sense that he/she goes through a similar process of creation (for example where he/she draws his/her own cartoon for the same basic joke)22 Ordinarily in order to prove copying by the defendant, the plaintiff must prove access as well as substantial similarity. If, however, the similarity between plaintiff's and defendant's work is sufficiently striking and substantial, the trier of fact may be permitted to infer copying notwithstanding the plaintiff's failure to prove access. Minus access, the similarities must be so striking as to preclude the possibility that the defendant independently arrived at the same result. A defendant who is shown to have adopted the plaintiff's imaginative embellishments or plain errors will be in particular jeopardy. It has been said that although expert testimony is not required to establish substantial similarity, it is required to establish striking similarity such as to dispense with the need for proof of access. But the judges have hesitated to fetter the assessment of each case on its facts by the introduction of rules formally shifting the burden of proof from plaintiff to defendant at any stage of the trial. 22 Cited from Cornish, W.R., Intellectual Property: Patents, Copyrights, Trademarks and Allied Rights, 3rd edn, Sweet and Maxwell, London, 1996, at 363. 18 Even if there is a very striking similarity between the two works, copying may not be inferred without proof of access in the following circumstances:23 i. If both plaintiff's and defendant's works are trite or commonplace. ii. If plaintiff fails to establish prior creation. iii. If the identity between the two works may arise from identical functional considerations rather than from copying. iv. Where the defendant offers direct and highly persuasive evidence that access could not have occurred. Where the works in question are non-dramatic, probably more by way of detailed incident and language must be taken before there is substantial copying. Where the works are artistic, and the Court is testing sufficient similarity by appeal to the eye, stress is sometimes laid upon the feeling and artistic character of the plaintiff's work, an idea that can be extended to the screen displays of a computer. Suppose an author creates a work, and subsequently, at a time when he/she does not own the copyright, he/she reproduces it in a second work. Some concession in his/her favor seems called for, in order to allow him/her to continue doing the kind of work at which he/she is proficient. The relation between the two end-products would be considered rather than the relation between the first work and what has been copied from it. The fact that the author made his/her reproduction unconsciously (if he/she can be believed) would probably enhance any claim not to have infringed. What constitutes proof of access Evidence which directly tends to prove either that the defendant viewed the plaintiff's work or had a reasonable opportunity for such a view is admissible to 23 Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-15. 19 prove access. Thus, from proof that a plaintiff mailed the allegedly infringed material to the defendant's principal office, it may be inferred that the material was in fact received , and the trier of fact may infer therefrom (unless contradictory evidence is to believed) that the persons responsible for defendant's work had prior knowledge of plaintiff's work.24 Sometimes access may be proved by mere circumstantial evidence. Therefore, unusual speed in the creation of the defendant's work may constitute some evidence that the defendant had access to and used the plaintiff's work, rather than resorting to independent creation. Similarity between the plaintiff's work and other materials created by the defendant which are not the subject of litigation may likewise constitute circumstantial evidence that the defendant had access with respect to his/her creation of the work in issue KNOWLEDGE The Court is not concerned with the knowledge of a reasonable man but is concerned with reasonable inferences to be drawn from a concrete situation as disclosed in the evidence as it affects the particular person whose knowledge is in issue. One must consider the concrete situation disclosed by the evidence and then decide what knowledge is to be attributed to the defendant, either in the way of express knowledge or knowledge that these particular defendants must have inferred. The knowledge which has to be proved is actual not constructive. Once a plaintiff fixes a defendant with notice of the facts relied on as constituting an infringement, the defendant cannot contend that he/she is without knowledge because he/she has in good faith a belief that in law no infringement is being committed. 24 Nimmer, Melville B., Nimmer on Copyright, Vol. 3, Mathew Bender, New York, 1985, at 13-17. 20 ACQUIESCENCE/CONSENT Beyond the limitation periods for particular wrongs lies a further question: if a defendant has been left to pursue a course of infringement for a substantial period of time, can the right-owner be taken to have consented to its continuance? If so, no part of his/her activity, even the most recent is actionable. This consent may be expressly given or it may be implied from the circumstances; it may occur before, at the time of, or after the infringing act. Conduct alone can create an implied license in some circumstances where the plaintiff represents, expressly or impliedly, that the defendant's conduct is not an infringement, he/she will thereafter be estopped from asserting his/her right. Where he/she both know, of his/her right against the defendant and that the defendant mistakenly believes that he/she is entitled to do what he/she is doing, yet he/she stands by without asserting his/her right, he/she will be taken to have acquiesced in the wrong. If all this can be proved, there is no need to show any element of delay. In Willmott v. Barber25 Justice Fry has set out five requisites to establish acquiescence. They are as follows: 1. The plaintiff must have made a mistake as to his/her legal rights. 2. He/she must have expended some money or must have done some act on the faith of his/her mistaken belief. 3. The defendant, the possessor of the legal right, must know of the existence of his/her own right which is inconsistent with the right claimed by the plaintiff, for the doctrine of acquiescence is founded upon conduct with a knowledge of the legal rights. 4. The defendant, the possessor of the legal right must know of the plaintiff's mistaken belief of his/her rights. 25 (1880) 15 Ch D 96 at p. 105; Cited from Narayanan, P., Law of Copyright and Industrial Designs, Eastern Law House, Calcutta, 1995, at 237. 21 5. The defendant, the possessor of the legal right, must have encouraged the plaintiff in the expenditure of money or in other acts which he/she has done either directly or by abstaining from asserting his/her legal right. But Buckley LJ, in Shaw v. Applegate26 commented: "I do not think it is clear that it is essential to find all the five tests set out by Fry J literally applicable and satisfied in any particular case. The real test, I think must be whether upon the facts of the particular case, the situation has become such that it would be dishonest or unconscionable, for the person having the right sought to be enforced, to continue to seek to enforce it". FAIR DEALING The requirement of substantial taking prevents the owner from objecting to minor borrowings from his/her copyright work. The three most important exceptions turn upon a qualitative assessment. They exempt copying for certain purposes if it amounts to no more than fair dealing. In these cases the Courts are left to judge fairness in the light of all the circumstances. If there is substantial copying, it is a moot point whether the use could nevertheless be justified for a reason beyond the confines of the statutory exceptions. 1. Research or Private Study- This applies to the copyright in literary, dramatic, musical and artistic works and published editions. The role of these defenses is particularly important in the field of Education. It is plain from the parliamentary evolution of this defense that it may in principle cover research in commerce, industry and government. What is fair will presumably vary to fit each case. 26 (1978) 1 All ER 1223 at 131. 22 2. Reporting Current Events- This permits all works, other than photographs, to be used for reporting current events. Photographs have been treated differently in order to preserve the full value of holding a unique visual record of some person or event. To come within the exception, the event itself must be current and not the pretext for reviving historical information. A spate of photographs of Princess Diana and the men in her life being published prior to her untimely death (at the hands of the paparazzi?) was not justified by the British tabloids with a copyright license, demanding professional courtesy in the least. The exception must be read in conjunction with a number of cognate provisions.27 3. Criticism or Review- This is the most general exception, allowing works to be used for purposes of criticism or review (of themselves or another work), one precondition of fairness being that the source should be sufficiently acknowledged (as is the case with footnotes/endnotes). It may concern the ideas expressed as well as the mode of expression (particularly relevant in cases of book reviews, as earlier mentioned) and the Courts will not permit wholesale borrowing to be dressed up as critical quotation. PUBLIC POLICY The judges have kept the power to refuse protection to a copyright owner on public policy grounds. 1. Policy Against Legal Protection- It justifies the refusal of relief on a variety of grounds which express disapproval of the content of the work; because it is obscene, sexually immoral, defamatory, blasphemous, irreligious, heresy, or seriously deceptive of the public. A work which satisfies the general criterion of originality does not lose its copyright, or cease to be enforceable, because it 27 The Copyright, Designs and Patents Act, 1988, Sections 31 (incidental inclusion), 58 (record of spoken words), 62 (artistic works on public display). 23 embodies another copyright work to an extent which requires a license and that authority has not been obtained. 2. Policy Favoring Dissemination- The ability to protect confidential information particularly in avoidance of breach of confidence cases is of utmost importance here. PRESUMPTIONS IN COPYRIGHT INFRINGEMENT ACTIONS There are some statutory presumptions which throw the legal (persuasive) burden of proof upon the defendant to infringement proceedings. Where literary, dramatic, musical or artistic copyright is concerned they are: i. That a person named as author is the author of a work; and that he/she did not produce it in circumstances (such as in the course of employment) which would deprive him/her of the copyright initially. If this does not apply, then ii. That if first publication of a work qualifies it for copyright, copyright subsists and was owned at first publication by the person named as publisher. iii. That, where the author is dead or unidentifiable when the action is brought, the work was original and was first published where and when the plaintiff alleges. As regards copyright in sound recordings, films and computer programs, there are presumptions that statements naming the copyright owner, or giving the date or place of first publication, are true. 24 REMEDIES There are many instances where justice can only be done if the Court acts to prevent further damage to the plaintiff pending trial, or to prevent the defendant from doing something that would injure the plaintiff’s chance of getting the relief he/she is entitled to at trial. Ex Parte Injunction An injunction will only be granted ex parte in cases where the plaintiff has shown clearly that there is a real urgency, making it impossible to give the normal notice and that he/she has not delayed in applying for the injunction. They are normally granted for a short period, usually to the first day on which there can be a hearing of the matter, immediate notice to be given to the defendant. Interlocutory Injunctions It is often of importance for a plaintiff to obtain immediate protection from a threatened infringement of his/her copyright. In such a case, he/she should apply for an interlocutory injunction for the purpose of preserving his/her rights from further interference pending the trial of the action and if the granting of such an injunction will not seriously interfere with the defendant, it may be granted although the plaintiff does not fully prove his/her title to the right alleged to be infringement, or has only an equitable title, or although the quantity of the defendant’s work which constitutes the infringement has not been ascertained. An interlocutory injunction will not, however be granted, where the defendant might suffer irreparable injury from an injunction restraining him/her from publishing, pending the trial and the plaintiff can be properly protected, by the 25 defendant being ordered to keep an account, nor will it normally be granted where a bona fide defense of fair dealing has been pleaded, or if the plaintiff has been guilty of undue delay in coming to the Court or his/her conduct has amounted to acquiescence in the infringement, or if there is any substantial doubt as to the plaintiff’s right to succeed.28 The application for the interlocutory injunction is made to the court by notice of motion, which is served on the defendant. This must be accompanied by written evidence supporting the plaintiff’s case and must be sufficient to establish a prima facie case on each of the requirements for the grant of such an injunction. The defendant has the opportunity to submit written evidence in reply, if he/she wishes to contest the motion, else he/she will normally resolve the matter by giving the plaintiff an undertaking not to do the acts specified in the notice of motion. Anton Piller Orders29 The usual basis for claiming substantial damages for infringement relates to the commercial value of the work; as with patents, the claim is either for compensation for lost profits- because the defendant's infringements have lost the plaintiff his/her own opportunities for sale. How far this will be assumed from the very fact of the defendant's piratical sales depends on the particular circumstances. Alternatively, the claim is for the misappropriation- because the plaintiff has lost the chance of licensing or selling his/her copyright to the defendant. As part of such a claim, the plaintiff is entitled to show that the cheap or vulgar form of the defendant's piracy, injured reputation and so lost him/her sales. 28 Lord Hailsham of St. Marylebone (ed.), Halsbury's Laws of England, Vol. 9, Butterworths, London, 1974, at 610. 29 Based on the case decision in Anton Piller K.G. v. Manufacturing Process Ltd. (1976) RPC 719; see also E.M.I. Ltd. and others v. K.N.Pandit.[1975] 1 All ER Ch D 418. 26 Purpose and Need [The purpose of an Anton Piller order is that, in extreme cases where there is very clear and strong prima facie evidence of an infringement of copyright, trade mark or other rights, it enables the plaintiff to enter the premises, first, to seize the infringing material and secondly, to obtain information as to persons from whom the defendant obtained the supplies of the infringing material and the persons to whom the defendant in turn has supplied the infringing material.] But an Anton Piller order will not be passed where the defendant are reputable public companies and there is no reason for thinking that they would not punctiliously comply with any order of the Court. Anton Piller Orders have been a response to growing concern over the current volume of sound recording, video and other copyright piracy and the imitation of popular trade marks, but they are equally available, for instance, in breach of confidence cases. They are invaluable in cases where there is a real possibility that the defendants may destroy such material before any application inter partes can be made. In Anton Piller's case, the Court of Appeal approved a procedure that is of major practical importance to some owners of intellectual property rights. The plaintiff applies to the High Court in camera without any notice to the defendant, for an order that the defendant permit him/her (with his/her solicitor) to inspect the defendant's premises and to seize, copy or photograph material relevant to the alleged infringement. The defendant may be required to deliver up infringing goods, keep infringing stock or infringing papers, and even to give information, for instance, about his/her sources of supply, or the destination of stock passing through his/her hands. An injunction against infringement may be part of the order. 27 Technicalities The form of the order makes it plain that the Court is not ordering or granting anything equivalent to a search warrant. The Order is an order on the defendant in personam to permit inspection. It is, therefore open to him/her to refuse to comply with such an order, but at his/her peril either of further proceedings for contempt of Court- in which case, of course, the Court will have the widest discretion as to how to deal with it and if it turns out that the order was made improperly in the first place, the contempt will be dealt with accordingly- but more important, of course, the refusal to comply may be the most damning evidence against the defendant at the subsequent trial.30 The order will be made if the plaintiff i. Provides an extremely strong prima facie case of infringement, ii. Shows that the damage, actual or potential to him/her is very serious, and iii. Provides clear evidence that the defendant has in his/her possession incriminating documents or things and that there is a real possibility that this material will be destroyed before any application inter partes can be made. There are certain safeguards which are said to distinguish this sort of order from a search warrant which are: 1. The plaintiff's solicitor, who is an officer of the Court, must attend. 2. The defendant must be given time to think and must be informed of his/her right to consult his/her own solicitor and to apply to discharge the order. 3. The plaintiff must also give a cross-undertaking in damages. If consequent upon the grant of an Anton Piller order the evidence shows that the order was in fact justified then the fact that the evidence before the learned 30 Cornish, W.R., Intellectual Property: Patents, Copyrights, Trademarks and Allied Rights, 3 rd edn, Sweet and Maxwell, London, 1996, at 48. 28 judge was not as strong as it ultimately became, does not provide a ground for challenging the order itself. However, it will not affect the situation if the order was obtained mala fide or by some material non-disclosure. Where the Anton Piller order has been obtained on the basis of non-disclosure of material facts, the judge has a discretion to exclude evidence obtained as a result of the order. Even if the non-disclosure was innocent, the Court will not lightly allow a party to keep the benefit of it. Where the disclosure is serious and substantial it should only allow use of the yield for good and compelling reasons. The proceedings turn upon the plaintiff's evidence alone and they occur in camera. If a single judge is satisfied prima facie that there is infringement and the likelihood of serious injury, the defendant will know nothing until the inspection is demanded. It takes considerable temerity then to challenge the findings on which the order was made. The process has been labeled draconian and essentially unfair in that it condemns a defendant without having been heard. The Courts strive to be watchful for plaintiff's who go to excess, seeking for instance, a means of shutting out the defendant from all business, legitimate as well as illegitimate. The ground on which defendants have challenged orders with some regularity is the plaintiff's failure to fully disclose all material circumstances. This it has been said, should err on the side of excess; for it is for the Court, not the plaintiff's advisers, to decide whether the order is justified. It is no answer to a charge of inadequate disclosure that enough was shown to justify the making of the order. Search and Seizure Prior to the Copyright Amendment Act, 1984, seizure of infringing copies by police was possible only after a magistrate had taken cognizance of an offence 29 relating to infringement under Section 63 [The (Indian) Copyright Act, 1957]. Moreover such seizure could only be of infringing copies and did not extend to plates used for making infringing copies. After the Act, the powers of the police have been widened. Now Section 64 provides that where any police officer not below the rank of sub-inspector of police is satisfied, that an infringement or an abetment of infringement of copyright in any work has been, or is likely to be committed, he/she may seize without any warrant all copies of the work and all plates used for the purpose of making infringing copies of the work, wherever found and the copies so seized must be produced before a magistrate as soon as practicable. Moreover, if business records have been seized, they should be retained until trial, but should be returned after necessary information has been extracted from them; and where infringing material has been seized it should be handed over to the defendant's solicitor, once he/she is on the record, upon his/her undertaking to keep it in safe custody and produce it, if required, at the trial. No Court inferior to that of a Presidency Magistrate or a Magistrate of the First Class, can try an offence under the Act. Any person can make a criminal complaint and a magistrate will be competent to take cognizance of any offence upon receiving a complaint of facts which constitutes such offence irrespective of the qualifications or eligibility of the complainant to file a complaint. Ordinarily however, it is the owner of the copyright or any person who has an interest in the copyright, for example the licensee who files a complaint. A joint author can also file a complaint. The conduct of the criminal proceedings is governed by the Criminal Procedure Code. The defendant is protected only by the discretion on costs and the plaintiff's cross-undertaking in damages. If the order was not justified- whether or not it is 30 subsequently discharged- the defendant will be entitled to compensatory damages for the contumely or affront in the way the proceedings were used against him/her, and even to exemplary damages. Right against self-incrimination The acute difficulties of balancing efficacy against fairness have surfaced equally over the element of instant discovery in any Anton Piller Order, which requires answers on sources of supply or customers. Since these answers would in many cases furnish evidence of criminal conduct, defendants at first sought to plead in response a privilege against self-incrimination. The House of Lords uphold this plea in any case where there is more than a remote or fanciful chance that a serious charge, attracting heavy penalties might result. This meant that the privilege was available to those who ran substantial piracy operations and so were likely to be charged with conspiracy as to defraud, as distinct from (say) a summary offence under the copyright or trade descriptions legislation, which might be appropriate against a street trader. Because the upshot was to offer a haven to those apparently most culpable, Parliament proved willing to intervene. By the Supreme Court Act 1981, Section 72, in proceedings for infringement of intellectual property rights31 or passing off, a defendant may after all be compelled to answer a question or comply with an order which would tend to expose him/her to proceedings for a related offence or recovery of a related penalty. It is however, not possible to use any statement or admission so procured in any equivalent criminal proceedings. Discovery of names Sometimes the only lead that a right-owner can pick up about infringing goods is that they are passing through the hands of some person in the course of transit. 31 This, is the first statutory use of the term, encompassing 'patents, trademark, copyright, registered design, technical or commercial information or other intellectual property ': Section 73(5). 31 That person may however not be infringing or be likely to do so. The Court may order such a person to disclose the names of the consignors or consignees responsible, if this is the only way for the plaintiff to discover whom he/she should act against and of the person against whom the order is made, is shown (however unwittingly) to be facilitating the wrongful acts. Discovery will not be ordered against anyone who can give information as to the identity of the wrongdoer. But discovery to find the identity of a wrongdoer is available against anyone whom, the plaintiff has a cause of action in relation to the same wrong. It is not available against a person who has no other connection with the wrong, than that he/she was a spectator or has some document relating to it in his/her possession. Interlocutory orders to furnish the names and addresses of persons responsible for supplying infringing copies to the defendant can be obtained in suitable cases. The principle applied in such cases has been stated as "where a person, albeit innocently and without incurring any personal liability became involved in the tortious acts of others, he/she came under a duty to assist one injured by those acts, by giving him/her full information by way of discovery and disclosing the identity of the wrongdoers, and for that purpose, it mattered not that such involvement was the result of voluntary action or the consequences of the performance of a duty statutory or otherwise. There is no rule of evidence that evidence disclosed under compulsion cannot subsequently be used against the person disclosing it either in another civil action or in a criminal prosecution. 32 Mareva Injunction [More in general evolution in interlocutory procedure: the Mareva Injunction is directed, not to the uncovering of assets belonging to the defendant which may be needed to satisfy judgement in the action, particularly if they may otherwise be removed from the jurisdiction. Orders are frequently made which contain both Anton Piller and Mareva terms. These may relate to bank accounts and other financial assets. Equally, there have been orders directed to the seizure of specified valuables, in which according to the evidence, the proceeds of infringement have been invested. Just as a defendant is permitted an allowance for living expenses out of financial assets that are subject to a Mareva order, so also, where the order relates to other assets, he/she will not be deprived of things needed for living and conducting legitimate trade.] Discoveries, Interrogatories, Inspection English Courts have generally been careful to protect defendant against speculative suits that are no more than fishing expeditions- proceedings begun to find out what, if anything might really be claimed. Accordingly, infringement actions cannot be launched effectively unless the plaintiff can specify, in his/her statement of claims, particulars of at least one act of infringement. If he/she does not give them and does not comply with any order for further and better particulars he/she will be unable to defend himself/herself on a motion to strike out pleadings or actions. Provided that he/she can show enough to repel attacks on his/her pleadings, the plaintiff will carry his/her case forward to the stage of pre-trial preparations. As in other types of civil litigation, discovery of documents and the administration of interrogatories are steps, which on occasion may provide important evidence or admissions. In the United States such steps have been inflated into a form of discovery that allows wide-ranging preliminary cross-examination of party by 33 party. If the documents discovered contain confidential information the other party may be restrained from using the information for other purposes such as revelations in the press or further litigation. Beyond this there are special procedures for cases involving industrial techniques. The plaintiff may need to discover what the defendant is doing; but the defendant may fear that the inspection by him/her will reveal the defendant's own secrets- a fear that, in the race to get ahead, is sometimes acute. The Court has power to order inspection even against this sort of objection. But while it will not require first to be satisfied prima facie that the defendant is infringing, it may need to be shown that there are formidable grounds rather than a mere suspicion. It may try to alleviate the defendant's anxieties by requiring an independent expert to make the inspection, then it may have to be done by the plaintiff and his/her advisers; but possibly on condition that nothing is copied or taken away and that, all involved, are placed under obligations to respect confidence. In the main it is not isolated acts of infringement but runs of production that provoke the owner of intellectual property rights into taking action. Accordingly, a defendant's stake is likely to be high; and it may well become higher if proceedings against him/her are delayed until he/she has established commercial production and tied himself/herself to distribution arrangements. The question here is: within what period after a particular infringement has been perpetrated must a writ be issued? The various infringement actions in our field, being tortious in character, must normally be begun within six years, of the wrongful act. The same applies to actions based upon breach of contract. Only the actions for breach of confidence may differ (when not founded in contract) 34 because of its equitable origin: probably the only principle is that a period of too great delay (laches) must not be allowed to lapse. An action, which is commenced within the limitation period, but then allowed to stagnate, may be struck out for want of prosecution. But under current practice, this will only be done if there is a real prejudice to the defendant, as well as inordinate delay. Such prejudice might arise if witnesses in a patent action would have to testify to the state of an art which has receded a considerable distance in time. Software Piracy: the norm or the exception. Infringement of copyright in software occupies the pride of place among all cases of copyright infringement. This problem is especially rampant in all developing countries, with poor enforcement mechanisms contributing in no small measure to it. More importantly, it has to do with a situation wherein people are unable to afford them, yet they are indispensable tools for their day to day operations in a fast growing technological world. Such clandestine or covert dealings, which are more the norm than the exception in countries like India and China, costs the industry a good billion dollars every year. In fact, if the author were to make a confession, the author is presently writing this research paper on a pirated copy of Microsoft Word! The process by which the piracy is effected is very simple and that explains the all-pervasive nature of the same32. More importantly, the lack of specially trained judicial machinery and a capable force to deal with such complex and varied infringements, has not helped in any manner33. In this context, it is necessary to understand as to what constitutes software, as to understand what is being protected. Dhar, P.M., “Intellectual Property in Computer Programs: Weaknesses of the Indian Copyright Act, 1957”, JILI, Vol.28, No.4, 1982, p.487. 32 35 Computer Software: The Essential IngredientsComputer Software is explained to constitute the following three elements34: ‘Computer Program’- which is a set of instructions capable, when put in a computer, of causing a machine having information processing capabilities to indicate, perform or achieve a particular function, task or result; ‘Program Description’-which is a comprehensive procedural presentation, in verbal, schematic or other form, in sufficient detail to determine a set of instructions constituting a corresponding computer program; ‘Supporting Material’-which is any material other than a computer program or a program description, created for aiding the understanding or application of a computer program, i.e. a problem description and user instructions. Computer Programs: The Indian Copyright Act defines a computer program as “a set of instructions expressed in words, codes, schemes or in any other form including the machine readable medium capable of causing computer to perform a particular task or achieve a particular result.” Computer programs are written in two ways: Object code, and Source code. Statements written in machine language is written in object code and language that is understandable only by the programmer is called source code. A program 33 Ibid. World Intellectual Property Organisation (hereinafter referred to as WIPO), Model Provisions on Protection of Computer Software, (1978). See also, Puri, Kanwal, Copyright in Software, National Law School Journal,Vol.1, 1989,p.32. 34 36 called the Compiler translates the source code into object code.35 Since programs in source code are not comprehensible to the computer they are translated into object code by another program.36 It is well settled that computer programs are subject to copyright37. Source code satisfies the various tests and is thus subject to copyright38. However, that is not of great relevance as the software is distributed only in the object form. The underlying source code is generally not available to the public. The ‘pirate’ would require a compiler to convert the programme from source code to object code, which is not that easy. The only question is whether the object code is subject to copyright39. Proving Piracy: 35 Ibid.. Supra, n.15, p.160. 37 See the decision of the Canadian High Court in Apple Computers v.Macintosh Computers. See also, WIPO documents in this regard, the proposed protocol to the Berne Convention regarding copyright protection for computer programs. The TRIPS agreement in the GATT final agreement also talks of the same. c.f.Supra n.15. 38 Supra n. 34. However, there have been umpteen objections to making source code subject to copyright on the grounds that There is a lack of accessibility. The tradition has been to protect works produced in a written text .The main objection has been the absence of readability or appearance to the eye or visibility. The question is whether the absence of these would present a difficulty in proving whether there was an infringement. 39 The problem that is put forth which also seems to be a problem in proving piracy of works in the object code seems to be that the object code is in the form of sequences of electrical impulses and that this is not a material form. Since comparison is what is necessary it must be asserted that comparison is definitely possible because programmes can be read out of ROM and therefore compared. The other problem is with regard to the perceptibility –visibility question and he contention that an object programme cannot be perceived by the senses and therefore must not be subject to copyright. This is warped logic because the very reasons enumerated just now put forth the case that piracy of object code can be done by a person who has no knowledge at all in the area and detection of such piracy is all the more difficult owing to these reasons. This means a better way of policing such violations must be evolved. The ROM contains electrical impulses that embody instructions that emanate from a written description. The computer can reproduce an object code from a magnetic tape, floppy disk or ROM in a printed form. Object code is only a mechanical translation of the source programme into another language. Besides if there is no protection to the object code there is no point in protecting the source code. See, Supra n.34. Also, as per the Indian Copyright Act, all programmes expressed in codes is entitled to protection if it can perform a particular task or achieve a particular result, thus object code is covered. Besides India has signed the Berne Convention and the GATT Final Act and the definition has to therefore be interpreted to include source code and object code. Also see Apple Computer v. Franklin Computer Corp, 714 F.2d. 1240. 36 37 Just as in the case of written works, there must be a manual comparison of the two works in the case of software such a comparison is possible. As per Section 45 of the Indian Evidence Act, an expert may be employed to prove a point involving any “foreign law or science” and since such a comparison involves an expert’s evidence an expert may be employed. Piracy in software can occur at two levels: At the object code level40, and At the source code level41. In order to find out whether there has been a violation of the source code, a process of "reverse engineering” is necessary. The decompilation or disassembly of the object form is necessary. It is in such situations that expert intervention is actually necessary. Where object code has been blindly copied, all that is necessary is a verification of the bar code with every copy of the original program, and a violation can be detected. Non-Literal Elements of Computer Software: The non-literal elements of computer software are elements of the software other than the source code and object code such as the overall layouts, menus, structure and look and feel. At one point there appeared to be a significant amount of protection for the non-literal elements of computer software. The courts even went so far as to apply the notion that taking the "total concept and 40 41 This is for those who require merely the executable program. This is for competitors who seek to understand the structure and logic of the program. 38 feel" of a computer program (which had been found to be illegal with respect to television characters)42 constitutes a copyright infringement43. In the 1990's the courts began restricting protection of non-literal elements in computer programs under copyright law. The two leading cases in this regard are Computer Associates, Inc. v. Altai, Inc44. and Lotus Dev. Corp. v. Borland Int'l, Inc45. In the Altai case, Computer Associates had developed a scheduling program and, separately, an "ADAPTER" to allow the scheduling program to be operated on a number of different operating systems. Altai, a competitor of Computer Associates, desired to develop an "adapter type" program to allow its scheduling program to be used on an additional operating system. Altai hired an employee of Computer Associates who, without Altai's knowledge, brought over code from the ADAPTER program. After Computer Associates filed suit, Altai realized what had happened, admitted liability for the direct copying and reconstructed the program without any literal copying. The court had to determine whether the non-literal copying constituted an infringement. The Court of Appeals approved the statements of the district court below that had said "references to structure, sequence, and organization" are no longer necessarily relevant to how computer programming is done. With object oriented programming, and especially with Windows based object oriented programming, such as Visual Basic, it is difficult to point to any particular sequence of a computer program. The court went on to describe its three step test for determining what, if any, of the non-literal elements of a computer program are protectable under copyright law. 42 See, Sid and Marty Krofft Television Productions v. McDonald's Corp., 562 F.2d 1152 (9th Cir. 1977). See generally, Scott On Computer Law, Second Edition, Section 3.47(C)(1). 44 982F.2d 693 (2d Cir. 1992). 43 39 The first step is "abstraction" where the court goes through a sort of "reverse engineering." The court determines what are the various levels of abstraction of the program. At the lowest level are the actual instructions organized into a hierarchy of modules. At a higher level are the functions of each module. (Note that a selection and organization of modules could involve creativity that is protectable if at that level the program survives Step 2 "filtration" (discussed below), as compilations may be protectable under the Copyright Act.) The second step is filtration of each level of abstraction. Here the court filters out the following at each level: (a) Elements that constitute ideas or are dictated by efficiency; (b) Elements dictated by external factors such as standard techniques rather than creative originality on the part of the programmer; and (c) Elements taken from the public domain. The third step is the comparison test. From the filtration step, the court has determined what of the plaintiff's program is protectable expression and then the court determines whether or not the "defendant copied any aspect of this protected expression, as well as an assessment of the copied portion's relative importance with respect to the plaintiff's program." The Court of Appeals also held that the district court's appointment of its own expert witness was appropriate. Following these tests, the court held that there was no infringement. 45 489 F.3rd 807 (1st Cir. 1995). See also, Softel, Inc. v. Dragon Medical & Scientific Communications, Inc., 118 F.3rd 955 (2nd Cir. 1997). 40 The court did hold that there was a possibility of misappropriation of trade secrets. The court said that state trade secret law is not pre-empted under Section 301 of the US Copyright Act. In Lotus v. Borland, Borland had developed a competitive spreadsheet program that included an option which provided "a virtually identical copy of the 1-2-3 menu tree" contained in the Lotus spreadsheet program. There was no contention that the underlying code or protected elements of computer screen displays had been copied. Lotus' only contention was that Borland had unlawfully copied its menu command hierarchy. The trial court concluded that Lotus' menu hierarchy was protectable expression because, for example, many different words could be used for the same commands. The Court of Appeals reversed. Referring to 17 U.S.C. §102(b), the Court of Appeals said: We hold that the Lotus menu hierarchy is an uncopyrightable method of operation. We do not consider whether it could also be a system, process, or procedure. The Supreme Court granted certiorari to Lotus on an appeal from the First Circuit Court of Appeals decision, but the Supreme Court affirmed by default when it turned out that the Justices were equally divided on the issue.46 As courts became reluctant to protect non-literal elements of computer programs under copyright law, courts, at the same time, became more comfortable with granting patent protection to computer programs. Shifting much of the protection for non-literal elements of computer programs from copyright to patent law has created a situation that makes it much more 41 difficult for start up companies to protect their software because of the much higher expense of filing for patent protection. In the author's view it also allowed for monopoly protection of some matters that would not have ever been protected by copyright law that are too easy to create in the software context to fairly be the subject of patent protection. There is so much programming code created every day that much of the software for which patent protection is granted is already being used by others in the industry who just have not gone to the trouble of applying for a patent. The author submits that a modified hybrid of trade secret, patent and copyright law should be developed for the protection of computer software. 46 116 S.Ct. 804 (1996). 42 INTERNATIONAL CONVENTIONS The TRIP's agreement of Final Act embodying the results of the Uruguay Round of Multilateral Trade negotiations to which India is a signatory, has tried to adopt the regime of copyright protection provided for in the Berne Convention. Article 9.1 of the TRIP’s agreement obliges members to comply with Articles 1 to 21 of the Berne Convention and the Appendix thereto. In other words it purports to amend the Berne Convention. The latter provides its own amendment procedures, requiring revision conferences in one of the countries of the Berne Union with voting proceeding on the basis of unanimity. As this procedure has not been followed, Article 9 is either ultra vires or should be read with the prefatory words- for the purposes of this Agreement...47 Under Article 7(1) of the Berne Convention, the general term of protection is for the life of the author and 50 years. Article 12 of the TRIP’s Agreement provides that whenever the term of protection of a work, other than a photographic work or a work of applied art, is calculated on a basis other than the life of a natural person, “such term shall be no more than 50 years from the end of the calendar year of authorize publication”, or where authorized publication does not occur, 50 years from the end of the calendar year of the making of the work. TRIP’s provides under Article 61 for criminal remedies against the infringement of intellectual property rights. In addition, Members shall be free to provide for criminal procedures and penalties to be applied, Consequently upon India signing the GATT and entering the global market economy, a number of changes have been made in The (Indian) Copyright Act, 47 Blakeney, Michael, Trade Related Aspects of Intellectual Property Rights: A Concise Guide to the TRIPS Agreement, Sweet and Maxwell, London, 1996, at 45. 43 1957 by the Amending Act of 1994, to give effect to the obligations arising from the signing of the GATT. Finally, mention must be made here of the Model Law of Copyright blessed by both UNESCO and WIPO for developing countries, was finalized at Tunis. 48 To cater for the specific needs of developing countries and to facilitate the access of these countries to foreign works protected by copyright, while ensuring appropriate international protection for their own works, the two convention, that is - the Berne Convention for the protection of literary and artistic works and the Universal Copyright Convention were revised in Paris. 48 Jhala, H.M., Intellectual Property and Competition Law in India with Special Reference to Patents, Trademarks, Copyrights, and Know-How Contracts, N.M. Tripathi Private Limited, Bombay, 1985, at 146. 44