SlideShare a Scribd company logo
Copyright Issues Related to
  Software and Websites
      Practice Group Meeting

             1-17-2013
Copyright: Protecting Expression
• “Works of authorship fixed in a tangible medium of
  expression”
• Software
   – What is protectable? Just the code?
   – How is it protected? Do I have to deposit my secret
     code?
   – Is an algorithm “expressive” in some way? Or is it just a
     method for doing something?
   – What about my APIs? Can I protect those?
• Internet/Websites:
   – What is protectable?
   – How is a page changing every day protected under rules
     written for books that never change?
   – Digital explosion = lots of copying! What protection can I
     get?
   – What about social media?
Software Copyright: Source Code
• Can register as literary work
  – Update registration with new versions
  – However: Copyright is an automatic right
     Acquired upon fixation
     Do not need to register to hold a copyright
     However: MUST register to sue for infringement
Software Copyright: Source Code
• What if code contains trade secrets?
• Options:
  – Deposit only object code: Registration issues
    under “rule of doubt” = benefit of doubt being
    unable to verify copyrightable authorship
  – Deposit sections of the source code blocked out
Software Copyright: Hiding Code
• First 25 and last 25 pages of source code with
  portions containing trade secrets blocked out, or
• First 10 and last 10 pages of source code alone, with
  no blocked out portions, or
• First 25 and last 25 pages of object code plus any 10
  or more consecutive pages of source code, with no
  blocked out portions, or
• For programs 50 pages or less in length, entire
  source code with trade secret portions blocked out
• However:
   – Blocked out portions must be proportionately less than
     the material remaining; and
   – Visible portion must represent an appreciable amount of
     original computer code.
Software Copyright: Substantial Similarity
• Deposit used in “substantial similarity”
  analysis
• Choose carefully: Deposit enough to prove
  infringement later without giving up the secret
• Example from trade secret world:
  – Obfuscate the images
  – Show enough to show substantial similarity
  – Hide enough to preserve the secret
• Must indicate by cover letter (software) or
  petition (trade secret)
Trade Secret Deposit Example: As Authored




                                  Note: This is Fig. 14 from issued
                                  U.S. Patent 8,000,000
Trade Secret Deposit Example: As Filed




                                   Note: This is Fig. 14 from issued
                                   U.S. Patent 8,000,000
Software Copyright: More than Source Code
• Cannot copyright functional aspects
• Possibly patentable as e.g. a process, system
  and method for performing a process, etc.
• Protection may be available for “structure,
  sequence and organization”
  – Protection even if infringer wrote in another
    language/platform
  – Things not necessary to the utilitarian function
    might be considered protectable expression
  – E.g. file structures, screen outputs, data input
    formats, flow/sequencing of screens.
  – Especially if there is more than one way to
    achieve the same result.
Application Programming Interfaces?
• Oracle v. Google NDCA case says no
  copyright
• Google copied structure and names of 37
  packages from Oracle’s Java API into the
  Android platform
• Key issue: Whether the API specification is
  protected, not the implementation
Example Java API and Method
• API defines a library of method (function) calls:
 public boolean java.lang.String.startsWith(String prefix, int 
     offset)

• Source code for a particular implementation of
  the method (function) determines how the
  computer behaves when the method is called:
 public boolean startsWith(String prefix, int toffset) {
     char ta[] = value;
     int to = offset + toffset;
     char pa[] = prefix.value;
              . . . .
             return false;
         }
     }
     return true;
 }
Software API’s: Judge’s Ruling
• Judge relied on these points of law:
  – If there is only one way to express it, then no
    one can claim ownership by copyright (merger
    doctrine)
  – Names and short phrases not copyrightable
  – No protection for ideas, procedures, systems,
    methods of operation or concepts
  – Don’t get protection just because you worked
    hard to produce it
Software APIs: Judge’s Ruling
• Not Protected: Method specification defined in
  the API = idea
• Protected: Actual code in methods as
  implemented by Oracle, Google, or anyone
  else = expression
• To be interoperable across platforms, the API
  must match exactly
• Only one way to express the idea of having a
  Java API
• Therefore API is not protected: Anyone can
  write their own implementation
• Appeals in progress. . .
Software Copyright: User Interfaces
• Copyright Office: Single registration can
  protect programs and related screen displays
  – Don’t need a separate registration for screen
    displays
  – Don’t need a specific reference to them in the
    application
  – Includes video games!
• NOT true for websites! More later. . .
• Courts: Set of UI operations alone not
  copyrightable
  – Must indicate specific infringing elements
Software Copyright Ownership
• First sale doctrine: Owners of copies have the
  right to resell their copy . . .
• Software copies are rarely “sold”
• Software copies are “licensed” for use
• Additional copies may be made
  – For archival purposes “as an essential step in
    the utilization of the computer program”
  – For maintenance purposes
• Fair use: Some copying/distribution of
  protected elements may be allowed – but fact
  sensitive!
Open Source and “Copyleft”
• Copyright law not just a constraint on copying
• Protects right to maintain free distribution
• Sometimes referred to as “Copyleft” licensing
• Best example: GNU General Public License
• Common in Open Source Software Projects
• Various Permutations: You can copy and
  distribute as long as you allow others to.
Websites: Special Kind of Software+
• Similar protectable elements: text, images,
  audio files, movies (including any sounds).
• Unique problems:
  – Digital = Easy to copy/distribute
  – Web = Must copy to distribute and very fast!
  – Users/Consumers = Billions in blink of an eye
  – Providers = Who has rights?
  – Registering = Web sites change . . .
Website Protection
• Registration:
  – As with any other copyright, registration is not
    required to retain rights.
  – Is required to sue for infringement
  – Website source code like other software
    protected as a literary work and can be
    registered
• Marking:
  – Websites commonly marked with a copyright
    notice
  – Mark source as well
Website Registration
• Can register the HTML, CSS, Javascript, and other
  source code like any other literary work.
• Appearance: Registering only the code is not
  enough! (Not like other software)
  – Registering code (like HTML) that formats text and
    graphics on the screen when a website is viewed does
    not cover the appearance of the generated page.
  – Registration must include any website content generated
    by the program source
  – Not included in the submitted material received or not
    referred to in the application = not registered!
  – Must reregister page renditions if they change.(!)
From Books to Bytes: Not just Software
• Digital content + WWW = Easy distribution
• LOTS of copying, some necessary: Routers,
  firewalls, ISPs, search engines, etc.
• DMCA limits liability of online service
  providers relating to:
  – Transitory digital network communications
  – System caching
  – Information residing on systems or networks at
    user direction
  – Search engines
What Providers Must Do
• Adopt policies for terminating accounts of
  repeat infringers
• Agree to remove or block access to content
  upon receiving notice of alleged infringement
  from the copyright owner
• Make these policies publicly available
• Provide contact information on the website
  and to the copyright office for a designated
  agent to handle these matters
What Copyright Holders Must Do
• Monitor websites for infringing content and
  report it to the designated agent for takedown
• This presents a few challenges:
  – 48 hours of video are uploaded to YouTube
    every minute. . .
  – About 185,000,000 active websites in the world
    today . . .
  – About 630,000,000 hostnames . . .
  – No international copyright law: Removing
    infringing material from a foreign server can be
    hard
Social Media (Lite)
• Terms and Conditions:
  – You get to post content
  – Host often takes a nonexclusive license in
    anything posted: Best not to create poetry on
    your friend’s blog. . .
  – Has right to filter/block access/take down
    infringing material
• Tests the limits of fair use:
  – E.g. Playing music in the background of an
    online home movie not fair use
  – Like to share: Not just sharing with friends! It’s a
    a very big world!

More Related Content

What's hot

International Copyright
International CopyrightInternational Copyright
International Copyright
Gihan Lahoud
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 

What's hot (20)

International Copyright Protection Primer
International Copyright Protection PrimerInternational Copyright Protection Primer
International Copyright Protection Primer
 
Copyright Infringment
Copyright InfringmentCopyright Infringment
Copyright Infringment
 
Copyright
CopyrightCopyright
Copyright
 
International Copyright
International CopyrightInternational Copyright
International Copyright
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Copyright: Bangladesh Perspective.pptx
Copyright: Bangladesh Perspective.pptxCopyright: Bangladesh Perspective.pptx
Copyright: Bangladesh Perspective.pptx
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethics
 
Copyright & Fair Use
Copyright & Fair UseCopyright & Fair Use
Copyright & Fair Use
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
rights related to copyrights
rights related to copyrightsrights related to copyrights
rights related to copyrights
 
Copyright, fair use & public domain
Copyright, fair use & public domainCopyright, fair use & public domain
Copyright, fair use & public domain
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Fair use of copyright
Fair use of copyrightFair use of copyright
Fair use of copyright
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 

Viewers also liked

Copyright law
Copyright law Copyright law
Copyright law
djesameatqc
 

Viewers also liked (7)

January 2013 Trademark Prosecution Group Luncheon
January 2013 Trademark Prosecution Group LuncheonJanuary 2013 Trademark Prosecution Group Luncheon
January 2013 Trademark Prosecution Group Luncheon
 
January 2013 Patent Prosecution Group Luncheon
January 2013 Patent  Prosecution Group LuncheonJanuary 2013 Patent  Prosecution Group Luncheon
January 2013 Patent Prosecution Group Luncheon
 
Violation of-copyright-law
Violation of-copyright-law Violation of-copyright-law
Violation of-copyright-law
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
 
copyright law
copyright lawcopyright law
copyright law
 
Copyright law
Copyright law Copyright law
Copyright law
 

Similar to Copyright Issues Related to Software and Websites

Software licenses: short unofficial overview
Software licenses: short unofficial overviewSoftware licenses: short unofficial overview
Software licenses: short unofficial overview
Visma Lietuva
 
Open Source and Patent Rights: Collaboration with Consequences
Open Source and Patent Rights: Collaboration with ConsequencesOpen Source and Patent Rights: Collaboration with Consequences
Open Source and Patent Rights: Collaboration with Consequences
Aurora Consulting
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source code
Robert Viseur
 

Similar to Copyright Issues Related to Software and Websites (20)

Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
Software licenses: short unofficial overview
Software licenses: short unofficial overviewSoftware licenses: short unofficial overview
Software licenses: short unofficial overview
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceOSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
 
Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11
 
Open Source Software Licence Compliance: Art or science?
Open Source Software Licence Compliance: Art or science? Open Source Software Licence Compliance: Art or science?
Open Source Software Licence Compliance: Art or science?
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
Managing Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software ComplianceManaging Software Inventories & Automating Open Source Software Compliance
Managing Software Inventories & Automating Open Source Software Compliance
 
Open Source and Patent Rights: Collaboration with Consequences
Open Source and Patent Rights: Collaboration with ConsequencesOpen Source and Patent Rights: Collaboration with Consequences
Open Source and Patent Rights: Collaboration with Consequences
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source code
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
Martin von Willebrand - Collaborative Open Source Compliance - Mindtrek 2016
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Taking your code to production
Taking your code to productionTaking your code to production
Taking your code to production
 
Internet and Open Source Concepts in brief pdf
Internet and Open Source Concepts in brief pdfInternet and Open Source Concepts in brief pdf
Internet and Open Source Concepts in brief pdf
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Software Licensing Simplified
Software Licensing SimplifiedSoftware Licensing Simplified
Software Licensing Simplified
 
OpenChain Webinar #11 - Open Source Issues Remediation - Jari Koivisto - 2020...
OpenChain Webinar #11 - Open Source Issues Remediation - Jari Koivisto - 2020...OpenChain Webinar #11 - Open Source Issues Remediation - Jari Koivisto - 2020...
OpenChain Webinar #11 - Open Source Issues Remediation - Jari Koivisto - 2020...
 

More from Woodard, Emhardt, Henry, Reeves & Wagner, LLP

More from Woodard, Emhardt, Henry, Reeves & Wagner, LLP (20)

2017 08-patent prosecution lunch
2017 08-patent prosecution lunch2017 08-patent prosecution lunch
2017 08-patent prosecution lunch
 
Recent Developments in US Trademark Law
Recent Developments in US Trademark LawRecent Developments in US Trademark Law
Recent Developments in US Trademark Law
 
2017 March Patent Prosecution Lunch
2017 March Patent Prosecution Lunch2017 March Patent Prosecution Lunch
2017 March Patent Prosecution Lunch
 
February 2017 Patent Prosecution Lunch
February 2017 Patent Prosecution LunchFebruary 2017 Patent Prosecution Lunch
February 2017 Patent Prosecution Lunch
 
Alice Corp Update 2016 Cases
Alice Corp Update 2016 CasesAlice Corp Update 2016 Cases
Alice Corp Update 2016 Cases
 
2017 January Patent Prosecution Lunch
2017 January Patent Prosecution Lunch2017 January Patent Prosecution Lunch
2017 January Patent Prosecution Lunch
 
2016 September Patent Prosecution Lunch
2016 September Patent Prosecution Lunch2016 September Patent Prosecution Lunch
2016 September Patent Prosecution Lunch
 
2016 August Patent Prosecution Lunch
2016 August Patent Prosecution Lunch2016 August Patent Prosecution Lunch
2016 August Patent Prosecution Lunch
 
Review of Recent IP Supreme Court Cases
Review of Recent IP Supreme Court CasesReview of Recent IP Supreme Court Cases
Review of Recent IP Supreme Court Cases
 
Defend Trade Secrets Act of 2016
Defend Trade Secrets Act of 2016Defend Trade Secrets Act of 2016
Defend Trade Secrets Act of 2016
 
July 2016 Trademark Prosecution Lunch Update
July 2016 Trademark Prosecution Lunch UpdateJuly 2016 Trademark Prosecution Lunch Update
July 2016 Trademark Prosecution Lunch Update
 
2016 07-Patent Prosecution Lunch
2016 07-Patent Prosecution Lunch2016 07-Patent Prosecution Lunch
2016 07-Patent Prosecution Lunch
 
Federal Rules Update
Federal Rules UpdateFederal Rules Update
Federal Rules Update
 
January 2016 Trademark Prosecution Lunch
January 2016  Trademark Prosecution LunchJanuary 2016  Trademark Prosecution Lunch
January 2016 Trademark Prosecution Lunch
 
In re tam presentation
In re tam presentationIn re tam presentation
In re tam presentation
 
January 2016 Patent Prosecution Lunch
January 2016 Patent Prosecution LunchJanuary 2016 Patent Prosecution Lunch
January 2016 Patent Prosecution Lunch
 
2015 October Patent Prosecution Lunch
2015 October Patent Prosecution Lunch 2015 October Patent Prosecution Lunch
2015 October Patent Prosecution Lunch
 
CLE - Introduction to IP Law
CLE - Introduction to IP LawCLE - Introduction to IP Law
CLE - Introduction to IP Law
 
August 2015 Patent Prosecution Lunch
August 2015 Patent Prosecution LunchAugust 2015 Patent Prosecution Lunch
August 2015 Patent Prosecution Lunch
 
August 2015 Litigation Luncheon
August 2015 Litigation LuncheonAugust 2015 Litigation Luncheon
August 2015 Litigation Luncheon
 

Recently uploaded

Recently uploaded (20)

VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law student
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 

Copyright Issues Related to Software and Websites

  • 1. Copyright Issues Related to Software and Websites Practice Group Meeting 1-17-2013
  • 2. Copyright: Protecting Expression • “Works of authorship fixed in a tangible medium of expression” • Software – What is protectable? Just the code? – How is it protected? Do I have to deposit my secret code? – Is an algorithm “expressive” in some way? Or is it just a method for doing something? – What about my APIs? Can I protect those? • Internet/Websites: – What is protectable? – How is a page changing every day protected under rules written for books that never change? – Digital explosion = lots of copying! What protection can I get? – What about social media?
  • 3. Software Copyright: Source Code • Can register as literary work – Update registration with new versions – However: Copyright is an automatic right  Acquired upon fixation  Do not need to register to hold a copyright  However: MUST register to sue for infringement
  • 4. Software Copyright: Source Code • What if code contains trade secrets? • Options: – Deposit only object code: Registration issues under “rule of doubt” = benefit of doubt being unable to verify copyrightable authorship – Deposit sections of the source code blocked out
  • 5. Software Copyright: Hiding Code • First 25 and last 25 pages of source code with portions containing trade secrets blocked out, or • First 10 and last 10 pages of source code alone, with no blocked out portions, or • First 25 and last 25 pages of object code plus any 10 or more consecutive pages of source code, with no blocked out portions, or • For programs 50 pages or less in length, entire source code with trade secret portions blocked out • However: – Blocked out portions must be proportionately less than the material remaining; and – Visible portion must represent an appreciable amount of original computer code.
  • 6. Software Copyright: Substantial Similarity • Deposit used in “substantial similarity” analysis • Choose carefully: Deposit enough to prove infringement later without giving up the secret • Example from trade secret world: – Obfuscate the images – Show enough to show substantial similarity – Hide enough to preserve the secret • Must indicate by cover letter (software) or petition (trade secret)
  • 7. Trade Secret Deposit Example: As Authored Note: This is Fig. 14 from issued U.S. Patent 8,000,000
  • 8. Trade Secret Deposit Example: As Filed Note: This is Fig. 14 from issued U.S. Patent 8,000,000
  • 9. Software Copyright: More than Source Code • Cannot copyright functional aspects • Possibly patentable as e.g. a process, system and method for performing a process, etc. • Protection may be available for “structure, sequence and organization” – Protection even if infringer wrote in another language/platform – Things not necessary to the utilitarian function might be considered protectable expression – E.g. file structures, screen outputs, data input formats, flow/sequencing of screens. – Especially if there is more than one way to achieve the same result.
  • 10. Application Programming Interfaces? • Oracle v. Google NDCA case says no copyright • Google copied structure and names of 37 packages from Oracle’s Java API into the Android platform • Key issue: Whether the API specification is protected, not the implementation
  • 11. Example Java API and Method • API defines a library of method (function) calls: public boolean java.lang.String.startsWith(String prefix, int  offset) • Source code for a particular implementation of the method (function) determines how the computer behaves when the method is called: public boolean startsWith(String prefix, int toffset) { char ta[] = value; int to = offset + toffset; char pa[] = prefix.value;  . . . . return false;     } } return true; }
  • 12. Software API’s: Judge’s Ruling • Judge relied on these points of law: – If there is only one way to express it, then no one can claim ownership by copyright (merger doctrine) – Names and short phrases not copyrightable – No protection for ideas, procedures, systems, methods of operation or concepts – Don’t get protection just because you worked hard to produce it
  • 13. Software APIs: Judge’s Ruling • Not Protected: Method specification defined in the API = idea • Protected: Actual code in methods as implemented by Oracle, Google, or anyone else = expression • To be interoperable across platforms, the API must match exactly • Only one way to express the idea of having a Java API • Therefore API is not protected: Anyone can write their own implementation • Appeals in progress. . .
  • 14. Software Copyright: User Interfaces • Copyright Office: Single registration can protect programs and related screen displays – Don’t need a separate registration for screen displays – Don’t need a specific reference to them in the application – Includes video games! • NOT true for websites! More later. . . • Courts: Set of UI operations alone not copyrightable – Must indicate specific infringing elements
  • 15. Software Copyright Ownership • First sale doctrine: Owners of copies have the right to resell their copy . . . • Software copies are rarely “sold” • Software copies are “licensed” for use • Additional copies may be made – For archival purposes “as an essential step in the utilization of the computer program” – For maintenance purposes • Fair use: Some copying/distribution of protected elements may be allowed – but fact sensitive!
  • 16. Open Source and “Copyleft” • Copyright law not just a constraint on copying • Protects right to maintain free distribution • Sometimes referred to as “Copyleft” licensing • Best example: GNU General Public License • Common in Open Source Software Projects • Various Permutations: You can copy and distribute as long as you allow others to.
  • 17. Websites: Special Kind of Software+ • Similar protectable elements: text, images, audio files, movies (including any sounds). • Unique problems: – Digital = Easy to copy/distribute – Web = Must copy to distribute and very fast! – Users/Consumers = Billions in blink of an eye – Providers = Who has rights? – Registering = Web sites change . . .
  • 18. Website Protection • Registration: – As with any other copyright, registration is not required to retain rights. – Is required to sue for infringement – Website source code like other software protected as a literary work and can be registered • Marking: – Websites commonly marked with a copyright notice – Mark source as well
  • 19. Website Registration • Can register the HTML, CSS, Javascript, and other source code like any other literary work. • Appearance: Registering only the code is not enough! (Not like other software) – Registering code (like HTML) that formats text and graphics on the screen when a website is viewed does not cover the appearance of the generated page. – Registration must include any website content generated by the program source – Not included in the submitted material received or not referred to in the application = not registered! – Must reregister page renditions if they change.(!)
  • 20. From Books to Bytes: Not just Software • Digital content + WWW = Easy distribution • LOTS of copying, some necessary: Routers, firewalls, ISPs, search engines, etc. • DMCA limits liability of online service providers relating to: – Transitory digital network communications – System caching – Information residing on systems or networks at user direction – Search engines
  • 21. What Providers Must Do • Adopt policies for terminating accounts of repeat infringers • Agree to remove or block access to content upon receiving notice of alleged infringement from the copyright owner • Make these policies publicly available • Provide contact information on the website and to the copyright office for a designated agent to handle these matters
  • 22. What Copyright Holders Must Do • Monitor websites for infringing content and report it to the designated agent for takedown • This presents a few challenges: – 48 hours of video are uploaded to YouTube every minute. . . – About 185,000,000 active websites in the world today . . . – About 630,000,000 hostnames . . . – No international copyright law: Removing infringing material from a foreign server can be hard
  • 23. Social Media (Lite) • Terms and Conditions: – You get to post content – Host often takes a nonexclusive license in anything posted: Best not to create poetry on your friend’s blog. . . – Has right to filter/block access/take down infringing material • Tests the limits of fair use: – E.g. Playing music in the background of an online home movie not fair use – Like to share: Not just sharing with friends! It’s a a very big world!