Clean room procedure in software development
Upcoming SlideShare
Loading in...5

Clean room procedure in software development






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • Facts do not contain authorship. Even if you had spent n. number of years to find out something for eg. Clinton’s phone number, georgebushsadress. Facts even not to anyone cannot be copyrighted.Ideas, Concepts, PrinciplesIn no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.Public domain:Eg. Bible created even before the CR Laws and PAtents

Clean room procedure in software development Clean room procedure in software development Presentation Transcript

  • Computer Software is protected under 3 different IP heads:
  • Indian Copyright Act, 1957
    • Sec 2 (o)- “LITERARY WORK”
    Literary works includes “computer programmes, tables and compilations including computer literary data bases”.
    • Sec 2(ffc)-“COMPUTER PROGRAM”
    Computer program is a “set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular results”.
  • Copyrightable Subject matters
    Original works of Authorship
    Fixation in a Tangible Form
    Works not protected under copyright:
    Work created by Government .
    Works not fixed in a tangible form
    Ideas, concepts or principles
    Works in the public domain
  • What are the rights granted to the owner of computer software?
    Issue copies
    Give on commercial rental
    Copyright infringement exists if you exercise one or more of the above said exclusive rights held by a copyright owner without the lawful owners permission.
  • What amounts to infringement of Computer Software?
    • Unauthorized copying of computer software.Like., Softlifting, Counterfeiting of software, Internet piracy etc.
    • Any person not being a licensed user, does any act related to the exclusive rights of the owner of the copyright without his permission.
    • It is not necessary that the entireoriginal work be copied for an infringement of the reproduction right to occur. All that is necessary is that the copying be "substantial and material."
    • Permitted copying of Computer Software: If you are the owner, or a licensed user of a piece of software, you may make a copy of it for the purposes mentioned below: 1. Normal use or study 2. Security testing 3. Error correction 4. Interoperability 5. Normal backup copying 6. To use a copy and store the original
  • What is clean room?
    It is a type of software development approach where most of the software developers follow this approach to develop software with certifiable reliability. This clean room is to deny the entry of defects during the development of software. The approach aims at high probability of zero defects.
    A new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that copyright infringement is avoided.
    It avoids copyright infringement litigation.
    • In ABKCO Music v. Harrisongs Music, {FN105: 722 F.2d 988, 221 USPQ 490 (2d Cir. 1983)} George Harrison was found to have infringed the copyright of “He’s So Fine,’” a song that he had heard years before, when he wrote “My Sweet Lord.”
    • Defeats the “proof of access” element.
    • Clean room procedure is a way to avoid infringement when writing a program similar to another program.
    The Plaintiff,
    • Need not prove the actual copying.
    • It is enough to prove that the accused party had access to the code.
    • The accused party’s code is substantially similar to the claimant code
  • Basic requirements:
    1. No contact between “Clean room designers” and “Dirty room Designers”.
    2. Location of clean room shall be at distance from possible social contacts.3. A credible person shall act as a monitor for all information’s passed into the clean room to assure that public information is alone introduced. An Independent person shall be appointed for this purpose.4. Any information of the original software such as module designations, names of variables, file layouts etc., shall not be allowed into the room as it would influence the structure of new software.
    5. Keep records of information's that goes in and out of the clean room.
    6. All communication between clean room occupants and anybody else shall pass through the monitor, as there is always the suspicion that other information's may be passed.
    7. Complete records of day-day activity shall be dated and attributed.
    8. The program shall not be evaluated before the activity ends.
    Nordstrom Consulting, Inc. v. M&S Technologies, Inc. (N.D. Ill. 2008).