Legal Protection for Software

advertisement
Intellectual Property Protection for
Software
William Fisher
June 23, 2004
Activities that Software
Developers Might Control
• Consumer reproduction of object code
• Commercial reproduction of object code
• Incorporation of parts of source code in new
programs
• Preparation and distribution of improved
versions/derivative works
Forms of IP for Software
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Patent
Flook
Benson
Alappat
Diehr
State Street
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Trade Secrecy
1950
1960
1970
1980
1990
2000
Subject Matter
• Restatement Definition: a process or device
for continuous use in the operation of a
business. Includes:
– information pertaining to contents of or
manufacture of a product
– process of treating or preserving materials
– information relating to business operations
– computer programs; customer lists
• UTSA expands protected matter to include:
– single or ephemeral events
– negative information
Subject Matter
• Restatement Definition: a process or device
for continuous use in the operation of a
business. Includes:
– information pertaining to contents of or
manufacture of a product
– process of treating or preserving materials
– information relating to business operations
– computer programs; customer lists
• UTSA expands protected matter to include:
– single or ephemeral events
– negative information
Requirements for Protection
(1) Information must have been “secret”
initially
some courts add explicit novelty requirement
Requirements for Protection
(1) Information must have been “secret”
initially
some courts add explicit novelty requirement
(2) Plaintiff must have made reasonable
efforts to keep it secret
Requirements for Protection
(1) Information must have been “secret”
initially
some courts add explicit novelty requirement
(2) Plaintiff must have made reasonable
efforts to keep it secret
(3) The information must be commercially
valuable
Requirements for Liability
• Breach of Confidence
– confidential relationship
– reliance on commercial custom and tacit
understandings
• or: Secret was discovered through
“improper means”
– e.g., overflights; fraudulent misrepresentations;
phone taps
– Not reverse engineering
Requirements for Liability
• Breach of Confidence
– confidential relationship
– reliance on commercial custom and tacit
understandings
• or: Secret was discovered through
“improper means”
– e.g., overflights; fraudulent misrepresentations;
phone taps
– Not reverse engineering
Remedies
• Injunctions
– debate over length and breadth
– not available after plaintiff obtains a patent
• Damages
– actual damages
• plaintiff’s lost profits, or
• defendant’s gains
– consequential damages
– punitive damages
– attorneys’ fees
Trade Secret Protection for Software
• Companies sell copies of object code, keep
source code secret
• Courts rule that public distribution of object
code does not forfeit TS protection, so long as
source code is hard to reverse engineer
– Data General v. DCI (Del. 1971)
– Telex v. IBM (CA10 1975)
– Q-Co Industries (SDNY 1985)
Trade Secret Protection for Software
• Appropriate to an era in which software is
custom-made by vertically integrated hardware
suppliers for large commercial customers
• Weaknesses
– Gradual improvement of decompilers
– No protection against “piracy” of object code
– Limited protection against “downstream”
consumers
– Consumers’ demand for access to source code
Forms of IP for Software
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Typical Shrinkwrap Licenses
• Restraints on resale or rental;
• Limits on the manufacturer’s warranties;
• Prohibitions on modifying or tampering with the
product (including disassembling or reverse
engineering);
• Prohibitions on uses of the product that would
have been permitted by the fair-use doctrine;
• Requirements that the consumer not contest the
validity of the producer’s copyright or patent;
Contractual Protection
• Pro-CD v. Zeidenberg (CA7 1996):
– copyright law does not preempt state contract law,
used to enforce shrinkwrap license restriction on
commercial uses
• Bowers v. Baystate Technologies (CAFC 2003):
– Copyright law does not preempt state contract law
used to enforce shrinkwrap license restriction on
reverse engineering
• UCITA
Forms of IP for Software
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Copyright Protection
• 1964: Register of Copyrights announces
willingness to register published software
programs – upon proof of sufficient “original
authorship”
– But object-code versions might not constitute
“copies”
• 1964-1977: 1,205 programs registered
– 80% by IBM and Burroughs
• 1978: CONTU recommends full copyright
protection for software
• 1980: Congress adopts recommendation
Copyright Protection
• 1991: EC Directive 91/250: All member
states must modify domestic copyright law to
recognize copyrights in software
• 1994: TRIPS Art. 10(1):
– “Computer programs, whether in source or object
code, shall be protected as literary works under
the Berne Convention”
Basic Copyright Protection
Entitlements -- §106
(1) Reproduction
(2) Derivative Works
(3) First Distribution
(4) Public Performance
(5) Public Display
Exceptions:
Fair Use -- §107
Merger
“essential” or “archival” copying -- §117
Apple v. Franklin (CA3 1983)
Apple v. Franklin (CA3 1983)
Apple
Apple v. Franklin (CA3 1983)
Apple O.S.
Apple
Apple v. Franklin (CA3 1983)
Borland
Free access
Apple
Apple O.S.
Apple
Apple v. Franklin (CA3 1983)
Borland
Free access
Apple
Apple O.S.
Apple
Franklin
Apple v. Franklin (CA3 1983)
Borland
Free access
Apple
Apple O.S.
Apple
Franklin
Apple v. Franklin (CA3 1983)
Borland
Free access
Apple
Apple O.S.
Copy of Apple O.S.
Verbatim
copying
Apple
Franklin
Apple v. Franklin (CA3 1983)
Borland
Free access
Apple
Apple O.S.
Copy of Apple O.S.
Verbatim
copying
Apple
Franklin
Forms of IP for Software
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Copying Nonliteral Features of
Programs
•
•
•
•
Whelan (CA3 1986)
Plains Cotton (CA5 1987)
*Altai (CA2 1992)
Kepner-Tregoe (CA5 1994)
Altai Test
(1) Abstraction
(2) Filtration
Unprotected Material includes:
(a) Elements dictated by efficiency
(b) Elements dictated by external factors
(i) mechanical specifications of the computer
(ii) compatibility requirements of other programs
(iii) computer manufacturers' design standards
(iv) demands of the industry being served
(v) widely accepted programming practices
(c) Elements taken from public domain
(3) Comparison
Nichols “Pattern” Test
Expression
Nichols “Pattern” Test
Expression
Nichols “Pattern” Test
Elements dictated by efficiency
Expression
Nichols “Pattern” Test
Elements dictated by efficiency
Expression
Nichols “Pattern” Test
Elements dictated by external factors
Expression
Nichols “Pattern” Test
Elements dictated by external factors
Expression
Nichols “Pattern” Test
Elements taken from public domain
Expression
Nichols “Pattern” Test
Elements taken from public domain
Comparison
Protected Parts of Plaintiff’s program
Comparison
Elements of defendant’s program
Protected Parts of Plaintiff’s program
Comparison
Elements of defendant’s program
Protected Parts of Plaintiff’s program
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Organization of Computer Programs
Organization of Computer Programs
Hardware
Organization of Computer Programs
Operating System
Hardware
Organization of Computer Programs
Application
Program
Application
Program
Operating System
Hardware
Interoperability
Application
Program
Application
Program
Operating System
Hardware
Interoperability
Application
Program
Application
Program
Operating System
Hardware
Interoperability Strategy #1
(e.g., Microsoft, Apple)
Borland
Free access
Microsoft
Microsoft
Dell
Interoperability Strategy #2
(e.g., Sega, Nintendo)
Licensee
License fees
Nintendo
Nintendo
Nintendo
Interoperability Strategy #3
(e.g., MAI Systems Corp.)
MAI
MAI
No licenses
MAI
MAI
Sega (CA9 1992)
Licensed
Games
License fees
Sega Games
TMSS
Sega Genesis III
Sega (CA9 1992)
Licensed
Games
License fees
Sega Games
Accolade
Games
TMSS
Lock-out
Sega Genesis III
Sega (CA9 1992)
Microcode (copied
by Accolade)
Licensed
Games
License fees
Sega Games
Accolade
Games
TMSS
Lock-out
Sega Genesis III
Sega (CA9 1992)
Licensed
Games
License fees
Sega Games
Accolade
Games
TMSS
Lock-out
Sega Genesis III
TMSS
initialization
code
Sega (CA9 1992)
Licensed
Games
License fees
Sega Games
TMSS
Sega Genesis III
Accolade
Games
Fair Use Doctrine
• Purpose and Character of the Use
–
–
–
–
commercial use
transformative uses
parody
propriety of defendant’s conduct
• Nature of the Copyrighted Work
– fictional works/factual works
– unpublished/published
• Amount of the portion used
• Impact on Potential Market
– rival definitions of “market”
– only substitution effects are cognizable
Fair Use Doctrine -- as applied in Sega
• Purpose and Character of the Use
–
–
–
–
commercial use: purpose of A’s copying was “study” (noncom)
transformative uses: concede no transformative use
parody: n.a.
propriety of defendant’s conduct: stress decency of A’s behavior
• Nature of the Copyrighted Work
– fictional works/factual works: computer programs deserve less
protection that fictional works
– unpublished/published: sale of program = publication
• Amount of the portion used: concede A copied entire program
• Impact on Potential Market
– rival definitions of “market”: implicit adoption of narrow version
– only substitution effects are cognizable
Reverse Engineering for
Interoperability
• Courts finding this to be fair use:
–
–
–
–
CAFC (Atari 1992; Bowers 2003 [dictum])
CA5 (DSC Communications 1996)
CA 9 (Sega 1992; Sony 2000)
CA11 (Bateman 1996)
• EC Directive 91/250, Art. 6, takes same
position
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Menu Hierarchies: Litigation
History
• Lotus v. Paperback (DMass 1990)
• Lotus (CA1 1995)
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Dimensions of Diminishing
Copyright Protection
• Copying Nonliteral Features of Programs
• Reverse Engineering for the Purpose of
Interoperability
• Menu Hierarchies
• Ineffective Enforcement
Source: Business Software Alliance
Possible Explanations
•
•
•
•
Local Self-Interest
Ideology
Pressure
Improved Marketing
Possible Explanations
• Local Self-Interest
– United States in 19th century
– Developing countries today
• Ideology
• Pressure
• Improved Marketing
Possible Explanations
•
•
•
•
Local Self-Interest
Ideology
Pressure
Improved Marketing
Possible Explanations
• Local Self-Interest
• Ideology
– Global:
• From “monopoly” to “Intellectual Property”
• From nationalism to comity
• Habit yields sense of entitlement (VCRs, MP3)
• Pressure
• Improved Marketing
Possible Explanations
• Local Self-Interest
• Ideology
– Local:
•
•
•
•
Labor theory
Romantic conception of authorship/personality theory
Communal conceptions of creativity
Socialism; anti-individualism
• Pressure
• Improved Marketing
Possible Explanations
•
•
•
•
Local Self-Interest
Ideology
Pressure
Improved Marketing
Possible Explanations
• Local Self-Interest
• Ideology
• Pressure
– TRIPS
– Bilateral Agreements
– Trade sanctions
• Improved Marketing
Possible Explanations
•
•
•
•
Local Self-Interest
Ideology
Pressure
Improved Marketing
Possible Explanations
•
•
•
•
Local Self-Interest
Ideology
Pressure
Improved Marketing
Piracy Rates
Within the United States
Source: Business Software Alliance
Source: Business Software Alliance
WA
MT
ME
ND
VT
MN
OR
NH
ID
WI
SD
NY
WY
RI
CT
MI
PA
IA
NE
NV
OH
IL
UT
MD
WV
KS
MO
VA
KY
NC
TN
AZ
OK
NM
AR
SC
MS
AL
GA
TX
LA
FL
AK
HI
Blue = Gore
Red = Bush
NJ
DE
IN
CO
CA
MA
WA
MT
ME
ND
VT
MN
OR
NH
ID
WI
SD
NY
WY
RI
CT
MI
PA
IA
NE
NV
OH
IL
UT
MD
WV
KS
MO
VA
KY
NC
TN
AZ
OK
NM
AR
SC
MS
AL
GA
TX
LA
FL
AK
HI
Blue = below average piracy rate
Red = above average piracy rate
NJ
DE
IN
CO
CA
MA
35 states fit the pattern; 15 do not
WA
MT
ME
ND
VT
MN
OR
NH
ID
WI
SD
NY
WY
RI
CT
MI
PA
IA
NE
NV
OH
IL
UT
MD
WV
KS
MO
VA
KY
NC
TN
AZ
OK
NM
AR
SC
MS
AL
GA
TX
LA
FL
AK
HI
Blue = below average piracy rate
Red = above average piracy rate
NJ
DE
IN
CO
CA
MA
Forms of IP for Software
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Forms of IP for Software
Patent
Flook
Benson
Alappat
Diehr
State Street
Copyright
CONTU
Apple
TRIPS 10(1)
EC Directive
91/250
Contracts
Pro-CD
Bowers
Trade Secrecy
1950
1960
1970
1980
1990
2000
Processes
Products
Processes
Processes
Processes
Machines
Processes
Machines
Processes
Machines
Processes
Machines
PbP
Product-by-process
Processes
Machines
Laws of Nature
Processes
Machines
Laws of Nature
Algorithms
Processes
Machines
Laws of Nature
Algorithms
Processes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Surgical
Procedures
Algorithms
Processes
Genes
Machines
Naturally
Occurring
Substances
Laws of Nature
Surgical
Procedures
Algorithms
Processes
Genes
Software
Machines
Naturally
Occurring
Substances
Laws of Nature
Surgical
Procedures
Business
Algorithms Methods
Processes
Genes
Software
Machines
Naturally
Occurring
Substances
Patent Protection
•
•
•
•
Gottschalk v. Benson (US 1972)
Parker v. Flook (US 1978)
Diamond v. Diehr (US 1981)
Federal Circuit Relaxation of the Test, 1982present
Federal Circuit Relaxation of the Test
• Freeman-Walter-Abele test (1977-1982)
– Is the algorithm applied as part of an otherwise
statutory process or apparatus claim?
• gradual weakening, 1982-1994
– Iwahashi (1989)
– Arrhythmia (1992)
• In re Alappat (CAFC 1994)
– an algorithm embedded in a general purpose
computer becomes a patentable machine
• PTO Guidelines (1996): will accept applications
for software on disks
• State Street Bank (CAFC 1998)
• AT&T (CAFC 1999)
State Street Bank
Mutual Fund 4
Investment
Portfolio
State Street Bank
Individual
Investor
Mutual Fund 4
Investment
Portfolio
State Street Bank
Individual
Investor
Mutual Fund 4
Investment
Portfolio
State Street Bank
Individual
Investor
11%
30%
25%
14%
Data Processing System
Mutual Fund 4
Investment
Portfolio
20%
State Street Holdings
• Transformation of data by a machine into a
final share price constitutes a practical
application of an algorithm and is therefore
patentable subject matter
• Repudiate the “business-methods”
exception to patentability
Software Patent Grants
14000
12000
10000
8000
6000
4000
2000
0
1995
1996
1997
1998
1999
2000
2001
Software Patent Grants
• Over 100,000 software patents issued to
date in U.S.
Patent Doctrines by Technology Sector
Patent Doctrines by Technology Sector
= average
Patent Doctrines by Technology Sector
= average
Utility
Patent Doctrines by Technology Sector
= average
Utility
Novelty
Patent Doctrines by Technology Sector
= average
Utility
Novelty
Obviousness
Patent Doctrines by Technology Sector
= average
Utility
Novelty
Obviousness
Disclosure
Patent Doctrines by Technology Sector
= average
= software
Utility
Novelty
Obviousness
Disclosure
Patent Doctrines by Technology Sector
= average
= software
= biotechnology
Utility
Novelty
Obviousness
Disclosure
Patent Doctrines by Technology Sector
= average
= software
= biotechnology
Utility
Novelty
Sophisticated PHOSITA;
Mature technology
Obviousness
Disclosure
Patent Doctrines by Technology Sector
= average
= software
= biotechnology
Utility
Novelty
Sophisticated PHOSITA;
Mature technology
Unsophisticated PHOSITA;
Unpredictable technology
Obviousness
Disclosure
What sorts of IP Protection (if any?)
are appropriate for softeware?
Patent Rights Most Likely to
Foster Innovation in field where:
1) High R&D Costs
2) High degree of uncertainty concerning success
of particular lines of research
3) Content of technological advances can be
ascertained easily by competitors through
“reverse engineering”
4) Technological advances can be mimicked by
competitors rapidly and inexpensively
5) Innovators highly responsive to monetary
incentives
6) Innovation not cumulative
Download