SlideShare a Scribd company logo
TRUST.
Partner,  M.Jur (ECL)  JAN  LINDBERG
ITechLaw 6  November  2015
IP  Workshop
TRUST.
Copyright  Protection  of  a  Software  as  a  
Work  with  Functional  Elements
TRUST.
JAN  LINDBERG
LLM  2001  (University  of  Helsinki)
MJur 2003  (University  of  Oxford)
Mergers  and  Acquisition,  Outsourcing
Private  Equity  and  Venture  Capital
IP  and  Technology,  IT  Disputes
Jan.lindberg@thetrust.fi
+358  (0)40 823  6031
www.thetrust.fi
TRUST.
Who  Are  We?
Attorneys-­at-­Law TRUST. is a Finnish transaction boutique focusing on the most
demanding M&A, outsourcing, private equity and venture capital, complex
technology and IP assignment. We ranked in all legal surveys among the oldest
and largest firms in Finland. We operate in the energy sector, telecom, information
technology, biotech, fintech, financial regulation and banking assignments.
E-­mails: firstname.lastname@thetrust.fi
Mannerheimintie 20 B, 6th floor, Helsinki, Finland
TRUST.
What  is  the  Agenda  and  Scope  of  this  
Workshop?
• In  this  workshop  we  are  focusing  on  the  element  of  functionality  and  its  effects    
on  availability  of  copyright  protection
• How  far  can  copyright  protect  functional  elements?
• Is  copyright  protection  available  in  case  of  trial  and  simple  computer  
programs(i.e.,  in  embedded  systems)?
• Open  discussion
TRUST.
Copyright
• “A person who has created a literary or artistic work…”
• Originality, teoskynnys (Finnish), or similar “the product of
independent and original creative work” by the author.
• “…within the limitations imposed hereinafter, copyright shall
provide the exclusive right to control a work by reproducing it
and by making it available to the public, in the original form or
in an altered form, in translation or in adaptation, in another literary or
artistic form, or by any other technique.”
TRUST.
SAS  Institute  Inc.  v  World  Programming  Ltd  
(UK)
• Lengthy  proceeding,  with  cases  in  the  USA  and  the  UK  (with  referral  to  the  ECJ)  
• SAS  was  the  owner  of  the  SAS  System that  enabled  its  users  to  perform  data  
processing  and  analysis  tasks  
• WPL  had  licensed  the  Learning  Edition  of  the  SAS  System,  enabling  it  to  study  
and  use  the  SAS  System  
• On  the  basis  of  its  tests  and  study,  WPL  had  developed  a  competing  system  that  
was  interoperable  with  the  SAS  system  
• Replication  of  the  functionality  of  certain  parts  of  the  SAS  System  
• No  access  to  the  source  code  and  written  in  a  different  programming  
language
• Enabled  SAS  users  to  change  systems,  which  was  previously  practically  
impossible
TRUST.
SAS  Institute  Inc.  v  World  Programming  Ltd  
(UK)
• SAS  accused  WPL  of:
• copyright  infringement  (software  program  and  manual)  
• breach  of  its  license  agreement  (non-­permitted  use)
• The  case  was  ruled  largely  in  the  favor  of  WPL  
TRUST.
Oracle  Am.,  Inc.  v  Google  Inc.  (US)
• In  November  2007  Google  released  the  beta  version  of  its  Android  mobile  
platform
• In  August  2010,  Oracle  first  sued  Google  for  copyright  and  patent  infringement  
• In  May  2012  and  District  Court  decided  on  copyright  protection  of  APIs
• In  May  9  2014  judgment  form  the  Federal  Appeals  Court
• In  June  29  2015  Supreme  Court  declines  to  hear  Oracle  v.  Google  case  over  
software  copyright
• Issue  of  “fair  use”  still  open
TRUST.
Oracle  Am.,  Inc.  v  Google  Inc.  (US)
• At  [22]  “…Because  we  conclude  that  the  declaring  code  and  the  structure,  
sequence,  and  organization  of  the  API  packages are  entitled  to  copyright  
protection,  we  reverse  the  district  court’s  copyrightability determination  with  
instructions  to  reinstate  the  jury’s  infringement  finding  as  to  the  37  Java  
packages.”
• At  [52]  “…We  are  mindful  that  the  application  of  copyright  law  in  the  computer  
context  is  often  a  difficult  task.  [...]  On  this  record,  however,  we  find  that  the  
district  court  failed  to  distinguish  between  the  threshold  question  of  what  
is  copyrightable-­-­which  presents  a  low  bar-­-­and  the  scope  of  conduct  that  
constitutes  infringing  activity.  The  court  also  erred  by  importing  fair  use  
principles,  including  interoperability  concerns,  into  its  copyrightability analysis.”
TRUST.
Case  “Karelian  Pie”  (FI)
When  is  a  computer  program  of  an  embedded  system  protected  by  
copyright?
• Requirement:  “the  product  of  independent  and  original  creative  work”  by  the  
author
• According  to  an  opinion  of  the  Finnish  Copyright  Committee  (1987:8):  “a  trivial  
program  consisting  mainly  of  functions  obvious  to  a  professional  user  does  not  
meet  the  threshold  of  originality  and  is  thus  not  protected  by  copyright.”
TRUST.
Case  “Karelian  Pie”  (FI)
Case  “Karelian  Pie”  – a  simple  machine  used  to  make  Karelian  pies
District  Court:  
“The only evidence of that the program meets the threshold of originality is the
opinion of the Copyright Council. Given that the opinion is…defective (based on
incorrect facts), and all other clarification, especially the statements by experts G
and J, seem to lead to the conclusion that the program is too trivial to meet the
threshold of originality, and thus the district court concludes that the program being
protected by copyright remains unsubstantiated.”
TRUST.
Case  “Karelian  Pie”  (FI)
Court  of  Appeal:
“According to Article 1 of Directive 91/250/EEC on the legal protection of computer
programs, a computer program shall be protected if it is original in the sense that it
is the author's own intellectual creation. Other criteria shall not be applied when
assessing, whether the program is protected.”
“In the light of the directive, it seems obvious that computer programs quite easily
meet the threshold of originality”
“Taking into consideration the principles outlined in the directive, the Court of
Appeal concludes -­-­ that the computer program subject to the claim shall be
deemed a literary work referred to in Section 1 of the Copyright Act.”
TRUST.
Open  discussion
TRUST.
“Copyright  protection  of  computer  
programs  is  narrower  in  the  EU  as  in  the  
US”
TRUST.
“Software  industry  should  not  be  treated  
differently  if  compared  to  other  industries  
and  therefore  contractual  restrictions  to  
studying,  observation  and  testing  of  any  
licensed  technology  should  be  valid”
TRUST.
“Interfaces  should  not  be  subject  to  
copyright  protection”
TRUST.
“Programming  languages  should  have  
copyright  protection”
TRUST.
“There  is  no  computer  program  simple  
enough  to  be  denied  copyright  protection”
TRUST.
“Copyright  is  not  the  correct  form  of  
protection  for  computer  programs  and  
functional  elements”
TRUST.
THANK YOU !

More Related Content

What's hot

DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
dixieyeager
 
Conclusion
ConclusionConclusion
Conclusion
HitmanD
 
Overview
OverviewOverview
Overview
HitmanD
 
Copyright Basics for Educators
Copyright Basics for EducatorsCopyright Basics for Educators
Copyright Basics for Educators
sergiop763
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Dara Cepeda, M. Ed.
 
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and IndiaCopyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
Devanshi Goyal
 

What's hot (20)

Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Ipr And JISC Projects
Ipr And JISC ProjectsIpr And JISC Projects
Ipr And JISC Projects
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Conclusion
ConclusionConclusion
Conclusion
 
Overview
OverviewOverview
Overview
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The Internet
 
Copyright Infringement In Cyberspace Amu Conference
Copyright Infringement In Cyberspace Amu ConferenceCopyright Infringement In Cyberspace Amu Conference
Copyright Infringement In Cyberspace Amu Conference
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Copyright Basics for Educators
Copyright Basics for EducatorsCopyright Basics for Educators
Copyright Basics for Educators
 
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
Edtc 6340.66 dara_cepeda_copyrightcc_powerpoint-4
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and IndiaCopyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
 
Copyright presentation jp casanova
Copyright presentation jp casanovaCopyright presentation jp casanova
Copyright presentation jp casanova
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Legal issues
Legal issuesLegal issues
Legal issues
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 

Similar to Copyright Protection of a Software as a Work with Functional Elements

LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptxLEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
Tanvi Mhashakhetri
 
Ip provider life cycle bangalore
Ip provider life cycle  bangaloreIp provider life cycle  bangalore
Ip provider life cycle bangalore
Design And Reuse
 

Similar to Copyright Protection of a Software as a Work with Functional Elements (20)

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Legal Protection of APIs – Oracle vs. Google
Legal Protection of APIs – Oracle vs.  GoogleLegal Protection of APIs – Oracle vs.  Google
Legal Protection of APIs – Oracle vs. Google
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
Lesi 2017 annual conference apr 2017.part 1 (david perkins)
Lesi 2017 annual conference  apr 2017.part 1 (david perkins)Lesi 2017 annual conference  apr 2017.part 1 (david perkins)
Lesi 2017 annual conference apr 2017.part 1 (david perkins)
 
Meisya - Thursday Talk Revised
Meisya - Thursday Talk RevisedMeisya - Thursday Talk Revised
Meisya - Thursday Talk Revised
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software Patenting
 
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...
 
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptxLEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
 
Comparative & International Software Patent Issues
Comparative & International Software Patent IssuesComparative & International Software Patent Issues
Comparative & International Software Patent Issues
 
CommTech Talks: Patents in ICT
CommTech Talks: Patents in ICTCommTech Talks: Patents in ICT
CommTech Talks: Patents in ICT
 
Ip provider life cycle bangalore
Ip provider life cycle  bangaloreIp provider life cycle  bangalore
Ip provider life cycle bangalore
 
Intellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer SoftwareIntellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer Software
 
Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11
 
Paper review internet innovation and intellectual property
Paper review internet innovation and intellectual propertyPaper review internet innovation and intellectual property
Paper review internet innovation and intellectual property
 
Copyright, Open Science, and Challenges for Research Libraries
Copyright, Open Science, and Challenges for Research LibrariesCopyright, Open Science, and Challenges for Research Libraries
Copyright, Open Science, and Challenges for Research Libraries
 
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdfIPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
 
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
 
Planned obsolescence and_drm
Planned obsolescence and_drmPlanned obsolescence and_drm
Planned obsolescence and_drm
 

More from Jan Lindberg

More from Jan Lindberg (7)

Digitalisaation vaikutukset markkinointijuridiikkaan ja tietosuojakysymysten ...
Digitalisaation vaikutukset markkinointijuridiikkaan ja tietosuojakysymysten ...Digitalisaation vaikutukset markkinointijuridiikkaan ja tietosuojakysymysten ...
Digitalisaation vaikutukset markkinointijuridiikkaan ja tietosuojakysymysten ...
 
IT Outsourcing and Tendering Process (in Finnish)
IT Outsourcing and Tendering Process (in Finnish)IT Outsourcing and Tendering Process (in Finnish)
IT Outsourcing and Tendering Process (in Finnish)
 
Update on Privacy, Cyber Risks and Director's Liability
Update on Privacy, Cyber Risks and Director's LiabilityUpdate on Privacy, Cyber Risks and Director's Liability
Update on Privacy, Cyber Risks and Director's Liability
 
SOME 2013: Legal Issues in Social Media and Data Protection
SOME 2013: Legal Issues in Social Media and Data ProtectionSOME 2013: Legal Issues in Social Media and Data Protection
SOME 2013: Legal Issues in Social Media and Data Protection
 
Attorneys at Law TRUST. Jan Lindberg IT-Riidat 20131120
Attorneys at Law TRUST. Jan Lindberg IT-Riidat 20131120Attorneys at Law TRUST. Jan Lindberg IT-Riidat 20131120
Attorneys at Law TRUST. Jan Lindberg IT-Riidat 20131120
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
 
Cleantech - Solving Legal Challenges of Finnish Cleantech-sector Companies Gr...
Cleantech - Solving Legal Challenges of Finnish Cleantech-sector Companies Gr...Cleantech - Solving Legal Challenges of Finnish Cleantech-sector Companies Gr...
Cleantech - Solving Legal Challenges of Finnish Cleantech-sector Companies Gr...
 

Recently uploaded

Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 

Recently uploaded (18)

Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
Book review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of JusticeBook review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of Justice
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of laws
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law student
 
Justice Advocates Legal Defence Firm
Justice Advocates Legal Defence FirmJustice Advocates Legal Defence Firm
Justice Advocates Legal Defence Firm
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South Africa
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
 
7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf
 
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&AChambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898
 

Copyright Protection of a Software as a Work with Functional Elements

  • 1. TRUST. Partner,  M.Jur (ECL)  JAN  LINDBERG ITechLaw 6  November  2015 IP  Workshop
  • 2. TRUST. Copyright  Protection  of  a  Software  as  a   Work  with  Functional  Elements
  • 3. TRUST. JAN  LINDBERG LLM  2001  (University  of  Helsinki) MJur 2003  (University  of  Oxford) Mergers  and  Acquisition,  Outsourcing Private  Equity  and  Venture  Capital IP  and  Technology,  IT  Disputes Jan.lindberg@thetrust.fi +358  (0)40 823  6031 www.thetrust.fi
  • 4. TRUST. Who  Are  We? Attorneys-­at-­Law TRUST. is a Finnish transaction boutique focusing on the most demanding M&A, outsourcing, private equity and venture capital, complex technology and IP assignment. We ranked in all legal surveys among the oldest and largest firms in Finland. We operate in the energy sector, telecom, information technology, biotech, fintech, financial regulation and banking assignments. E-­mails: firstname.lastname@thetrust.fi Mannerheimintie 20 B, 6th floor, Helsinki, Finland
  • 5. TRUST. What  is  the  Agenda  and  Scope  of  this   Workshop? • In  this  workshop  we  are  focusing  on  the  element  of  functionality  and  its  effects     on  availability  of  copyright  protection • How  far  can  copyright  protect  functional  elements? • Is  copyright  protection  available  in  case  of  trial  and  simple  computer   programs(i.e.,  in  embedded  systems)? • Open  discussion
  • 6. TRUST. Copyright • “A person who has created a literary or artistic work…” • Originality, teoskynnys (Finnish), or similar “the product of independent and original creative work” by the author. • “…within the limitations imposed hereinafter, copyright shall provide the exclusive right to control a work by reproducing it and by making it available to the public, in the original form or in an altered form, in translation or in adaptation, in another literary or artistic form, or by any other technique.”
  • 7. TRUST. SAS  Institute  Inc.  v  World  Programming  Ltd   (UK) • Lengthy  proceeding,  with  cases  in  the  USA  and  the  UK  (with  referral  to  the  ECJ)   • SAS  was  the  owner  of  the  SAS  System that  enabled  its  users  to  perform  data   processing  and  analysis  tasks   • WPL  had  licensed  the  Learning  Edition  of  the  SAS  System,  enabling  it  to  study   and  use  the  SAS  System   • On  the  basis  of  its  tests  and  study,  WPL  had  developed  a  competing  system  that   was  interoperable  with  the  SAS  system   • Replication  of  the  functionality  of  certain  parts  of  the  SAS  System   • No  access  to  the  source  code  and  written  in  a  different  programming   language • Enabled  SAS  users  to  change  systems,  which  was  previously  practically   impossible
  • 8. TRUST. SAS  Institute  Inc.  v  World  Programming  Ltd   (UK) • SAS  accused  WPL  of: • copyright  infringement  (software  program  and  manual)   • breach  of  its  license  agreement  (non-­permitted  use) • The  case  was  ruled  largely  in  the  favor  of  WPL  
  • 9. TRUST. Oracle  Am.,  Inc.  v  Google  Inc.  (US) • In  November  2007  Google  released  the  beta  version  of  its  Android  mobile   platform • In  August  2010,  Oracle  first  sued  Google  for  copyright  and  patent  infringement   • In  May  2012  and  District  Court  decided  on  copyright  protection  of  APIs • In  May  9  2014  judgment  form  the  Federal  Appeals  Court • In  June  29  2015  Supreme  Court  declines  to  hear  Oracle  v.  Google  case  over   software  copyright • Issue  of  “fair  use”  still  open
  • 10. TRUST. Oracle  Am.,  Inc.  v  Google  Inc.  (US) • At  [22]  “…Because  we  conclude  that  the  declaring  code  and  the  structure,   sequence,  and  organization  of  the  API  packages are  entitled  to  copyright   protection,  we  reverse  the  district  court’s  copyrightability determination  with   instructions  to  reinstate  the  jury’s  infringement  finding  as  to  the  37  Java   packages.” • At  [52]  “…We  are  mindful  that  the  application  of  copyright  law  in  the  computer   context  is  often  a  difficult  task.  [...]  On  this  record,  however,  we  find  that  the   district  court  failed  to  distinguish  between  the  threshold  question  of  what   is  copyrightable-­-­which  presents  a  low  bar-­-­and  the  scope  of  conduct  that   constitutes  infringing  activity.  The  court  also  erred  by  importing  fair  use   principles,  including  interoperability  concerns,  into  its  copyrightability analysis.”
  • 11. TRUST. Case  “Karelian  Pie”  (FI) When  is  a  computer  program  of  an  embedded  system  protected  by   copyright? • Requirement:  “the  product  of  independent  and  original  creative  work”  by  the   author • According  to  an  opinion  of  the  Finnish  Copyright  Committee  (1987:8):  “a  trivial   program  consisting  mainly  of  functions  obvious  to  a  professional  user  does  not   meet  the  threshold  of  originality  and  is  thus  not  protected  by  copyright.”
  • 12. TRUST. Case  “Karelian  Pie”  (FI) Case  “Karelian  Pie”  – a  simple  machine  used  to  make  Karelian  pies District  Court:   “The only evidence of that the program meets the threshold of originality is the opinion of the Copyright Council. Given that the opinion is…defective (based on incorrect facts), and all other clarification, especially the statements by experts G and J, seem to lead to the conclusion that the program is too trivial to meet the threshold of originality, and thus the district court concludes that the program being protected by copyright remains unsubstantiated.”
  • 13. TRUST. Case  “Karelian  Pie”  (FI) Court  of  Appeal: “According to Article 1 of Directive 91/250/EEC on the legal protection of computer programs, a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation. Other criteria shall not be applied when assessing, whether the program is protected.” “In the light of the directive, it seems obvious that computer programs quite easily meet the threshold of originality” “Taking into consideration the principles outlined in the directive, the Court of Appeal concludes -­-­ that the computer program subject to the claim shall be deemed a literary work referred to in Section 1 of the Copyright Act.”
  • 15. TRUST. “Copyright  protection  of  computer   programs  is  narrower  in  the  EU  as  in  the   US”
  • 16. TRUST. “Software  industry  should  not  be  treated   differently  if  compared  to  other  industries   and  therefore  contractual  restrictions  to   studying,  observation  and  testing  of  any   licensed  technology  should  be  valid”
  • 17. TRUST. “Interfaces  should  not  be  subject  to   copyright  protection”
  • 18. TRUST. “Programming  languages  should  have   copyright  protection”
  • 19. TRUST. “There  is  no  computer  program  simple   enough  to  be  denied  copyright  protection”
  • 20. TRUST. “Copyright  is  not  the  correct  form  of   protection  for  computer  programs  and   functional  elements”