software and law – jed scully presented by: diala t. gammoh eel6883 – software engineering ii...

44
Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

Upload: ernest-mills

Post on 26-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

Software and Law – Jed ScullyPresented by: Diala T. Gammoheel6883 – Software Engineering IIDr.Dalma Turgut

Page 2: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

2

Agenda

Introduction to Software and Law The Ownership of Intellectual

Expression Software Copyright “Business Methods” Patents for

Software Additional Statutory Remedies for

Software Protection

Page 3: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

3

The law of Contracts, Protocols and Private Agreements

Future Developments for Software and the Law, 2005 – 2010

Summary and Conclusion

Agenda

Page 4: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

4

Introduction to Software and Law

A Definition of Software: A software is a packaged set of electronic

instructions for performing certain tasks on a computer hardware platform.

Culture and Legal Assumptions: The idea of ownership is a cornerstone not

only for the American Society but all modern, democratic nations and culture.

Page 5: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

5

Introduction to Software and Law

The Concept of Intellectual Property

The ability to separate

physical containers from valuable intellectual content is at the root of the legal rules that describeand protect intellectualproperty.

Page 6: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

6

Introduction to Software and Law

The Concept of Intellectual Property

Page 7: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

7

The Role and Rule of Law “rules under law” are enforced by the state

or the nation and any violations of these rules might result in a serious penalties.

Jurisdiction and the Law Controlling cyberspace transactions is very

problematic. Jurisdiction might control the hardware that generate and receive electronic data but digital transmission can easily bypass these controls.

Introduction to Software and Law

Page 8: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

8

Introduction to Software and Law

Cyberspace, the internet and Intellectual Properties Before Cyberspace:

John Perry Barlow-a lyricist for Grateful Dead and one of founders of the Electronic Frontier Foundation- refers to copyright as the protection of the bottles, or containers of fine wine rather than the protection of the wine itself.

Page 9: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

9

After cyberspace:

Any person can and does distribute content,regardless any ownership claims, throughout the “click and send” effort and without necessity of permissions or agreements.

Introduction to Software and Law

Page 10: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

10

The ownership of Intellectual Expression:

Copy Right: is the legal protection of expressive communication.

Patent Right: is the invention whichtransforms “discovery”to new and useful use.

The ownership of Intellectual Expression

Page 11: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

11

Software Copyright

The components of copyright: - Human communicative content - Technology of transmitting an

authorial product to others - Legally recognized economic and moral

rights of authors - Methods for enforcing these rights The term “software” suggests intellectual

expression rather than the particular format in which that expression is embodied

Page 12: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

12

Software Copyright

Traditionally, copyright defines legal rules, expectations and remedies for software.

These classifications have lost much of their definitional relevance with the emergence of software systems as a means of manipulating and transmitting data through the internet.

Video Conference: Restoring the balance to copyright Laws taken from www.youtube.com

http://www.youtube.com/watch?v=8BsfgTd2hYk

Page 13: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

13

“Business Methods” Patents and Software A Brief History of Patent and Business

Methods Patents Several points about patent should be

noted: - A patent will not be issued for something

that is not new, novel or useful. - A patent must be an improvement on the

technology or processes or on the natural world and natural order of things that already exists.

- It is “invention” not “discovery” .

Page 14: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

14

“Business Methods” Patents and Software Scope of Protection for Software Patents: A main issue faced by software developers

and programmers is to what extent may one reference the ideas, abstractions and concepts of a patent-protected software system without infringement or violation.

Patent protection does not allow anyone to use any part of protected invention without permission or license.

Page 15: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

15

“Business Methods” Patents and Software Scope of Protection for Software Patents: It might be that copyright provides greater

levels of protection for “expression” even though users may take advantage of the “fair use” of aspects of a copyrighted without permission

Page 16: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

16

“Business Methods” Patents and Software Reverse Engineering and Encryption They found that some of the patents and

copyrights need to be used by others for analyzing and discussions such as Reverse Engineering.

Courts have determined that the lawful use of computers doesn’t constitute unlawful decryption of protected software.

Page 17: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

17

“Business Methods” Patents and Software Reverse Engineering and Encryption However, there is continued legal

uncertainty as to the extent to which new users can disassemble and reengineer protected software.

Many observers feel that these restrictions slow down innovation and the development of new technological uses for encrypted digital content.

Page 18: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

18

Additional Statutory Remedies for Software Protection Trade Secrets: It is any formulation, system, device, pattern

or compilation of information used in business that gives the holder of the trade secret a potential competitive advantage in business.

Unauthorized disclosure might destroy the

trade secret’s value, but the person responsible for the disclosure could be held legally responsible.

Page 19: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

19

Additional Statutory Remedies for Software Protection Trade Mark: Is a means of identifying

and marking the origin of goods, including application programs.

It is covered by both federal and statelaw.

A registration system for trademarks establishes the rights and priorities of holders of a mark.

Page 20: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

20

Additional Statutory Remedies for Software Protection Unfair Competition: Trademark infringement is a form of unfair

competition, which also includes passing off your goods or services as originating with another producer.

Moral Rights Protections We usually refers to morality to standards

that are held by individuals, beliefs held by religion or by particular culture or community but which is not enforced by laws.

Page 21: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

21

Additional Statutory Remedies for Software Protection

Tort Protection: As a legal term refers to the violation of a

personal right for which a wrongdoer, might be held responsible in a civil court for money damages.

Moral Rights Protections: These moral rights cannot

be sold or traded away because they are inherent in the act of authorship.

Page 22: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

22

The Law of Contracts, Protocols, and Private Agreements Legal Contract is a promise or set of

promises that the law will enforce, usually by imposing money damages for failure to perform according to one’s promises.

Contracts can be between persons who have no particular relationship with one another.

Page 23: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

23

The Law of Contracts, Protocols, and Private Agreements In addition to contracts, there are protocols

and methods of doing business that may not be enforceable by of law and legal system but regulate the conduct of persons engaged in the same activity.

Handshake and verbal agreements are used sometimes.

Page 24: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

24

The Modern “Law Merchant” Law Merchant as a system of rules and

regulations recognized by traders as the law for the regulation of their commercial standards.

It has received renewed emphasis with the borderless character of digital transactions and the transfers of information and commercially valuable software.

The Law of Contracts, Protocols, and Private Agreements

Page 25: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

25

The Modern “Law Merchant” International commerce players also

established governmental courts and tribunals that interpret and enforce these agreements including the International Chamber of Commerce in Paris, the London Court of International Arbitration, and the American Arbitration Association.

The Law of Contracts, Protocols, and Private Agreements

Page 26: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

26

The Modern “Law Merchant” The Example of Microsoft Monopoly of the

Browser.

Microsoft was trying to reach to a certain business model that navigates among the requirements of several national bodies like the United States Department of Justice’s Antitrust Division and the European Union.

The Law of Contracts, Protocols, and Private Agreements

Page 27: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

27

The Modern “Law Merchant” It was only 15 years ago that the United

States agreed to join the Berne Convention which provides the mechanism for enforcing international copyright.

Through GATT, NAFTA and the World Trade Organization, the United States has now taken a leading role in developing international enforcement mechanisms for intellectual property.

The Law of Contracts, Protocols, and Private Agreements

Page 28: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

28

ADR, ODR and Statutory Enforcement of Private Agreements:

Nation states and the international law community established international agencies such as the World Intellectual Property Organization (WIPO), charged with the enforcement of various international treaties such as:

- ADR (Appropriate Dispute Resolution) - ODR (Online Dispute Resolution)

The Law of Contracts, Protocols, and Private Agreements

Page 29: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

29

ADR, ODR and Statutory Enforcement of Private Agreements:

ADR and ODR provides a broad set of remedies for the resolution of software ownership, use, dissemination issues.

“Appropriate” refers to the fact that the parties to an agreements should have latitude to decide on the mechanisms for resolving issues that arise regarding the enforcement of their agreements.

The Law of Contracts, Protocols, and Private Agreements

Page 30: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

30

ADR, ODR and Statutory Enforcement of Private Agreements:

ODR simply refers to the fact that all or portions of these mechanisms can take place over the internet by synchronous or asynchronous video conference.

The use of ADR and ODR as a substitute for formal court trials is rising rapidly in popularity in the United States.

The Law of Contracts, Protocols, and Private Agreements

Page 31: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

31

Domain Names and Cyber squatting: There is a significant confusion over the

relationship between a URL domain name on the Internet and a trademark for a good or service.

ICANN is a private nonprofit agency received the right to serve as the registrar for domain names.

The Law of Contracts, Protocols, and Private Agreements

Page 32: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

32

Domain Names and Cyber squatting: Difficulties arose because many entities that

had a reputational interest in a desired trademark wished to carry that trade in terms of a domain in the URL identifier on the internet.

US law has moved to protect the invested reputations of those who had valuable trademarks because similarities are likely to cause consumer or competitor confusion.

The Law of Contracts, Protocols, and Private Agreements

Page 33: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

33

Domain Names and Cyber squatting: Congress also enacted an Anti cyber

squatting (registering an internet name for the purpose of resetting it for a profit) Consumer Protection Act .

The Law of Contracts, Protocols, and Private Agreements

Page 34: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

34

Globalization and Jurisdiction: - It is hard to make predictions for more

than 3-5 years into the future.

- Globalization will expand and national jurisdictions will lessen in centrality and importance as the traffic in digital distribution of software increases.

Future Developments for Software and the Law 2005-2010

Page 35: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

35

Globalization and Jurisdiction: - Treaties are of limited utility in controlling

electronic data flow.

- Global protocols and market-based competitive solutions seem to offer better options for realizing the full potential of authorial software contents.

Future Developments for Software and the Law 2005-2010

Page 36: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

36

Continued Growth in Global Market-based Solutions:

We expect greater growth and vitality in private, market-driven, global protocols, agreements and dispute resolution mechanisms as global market software players recreate a 21st century equivalent of the “law merchant”.

Future Developments for Software and the Law 2005-2010

Page 37: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

37

The Power of Contract: Contract does not depend only on the state

power but on the autonomy of private individuals and groups who are committed to the values inherent in honoring private agreement.

Future Developments for Software and the Law 2005-2010

Page 38: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

38

Protecting and Innovation – Competing or Complementary Concepts?

The best we can say is that innovation may

be temporary retarded by intellectual property protections but significant technological advance will be driven by competitive global markets, not by restrictions in nationally based intellectual property statutes.

Future Developments for Software and the Law 2005-2010

Page 39: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

39

Protecting and Innovation – Competing or Complementary Concepts?

An example is provided by the strength in the development of open-source software for computer operating systems, like Linux.

Global market players realize that computer operating systems like alphabet and the internet itself belong to the public domain, free for anyone to use.

Future Developments for Software and the Law 2005-2010

Page 40: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

40

People interested in software, whether as developers, designers or programmers should have in mind a drop-down menu for legal protections systems that should include the following elements:

1- Copyright 2- Patent 3- Trademark 4- Contract 5- Jurisdiction

Summary and Conclusions

Page 41: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

41

Summary and Conclusions

6- International law and compacts7- Globalization8- Other potential remedies, including moral

rights protections.

Page 42: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

42

My Thoughts about the paper

It was a long paper . It mentioned lots of concepts related

to the software and law. I think it will be better if the mentioned

more examples about stealing software and how the law will prove it.

Page 43: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

43

References

http://www.cartoonsscott.com http://www.youtube.com

Page 44: Software and Law – Jed Scully Presented by: Diala T. Gammoh eel6883 – Software Engineering II Dr.Dalma Turgut

44

THANK YOU