Atjaunināt sīkdatņu piekrišanu

E-grāmata: Copyright Protection of Computer Software in the United Kingdom

  • Formāts: 320 pages
  • Izdošanas datums: 01-Feb-2000
  • Izdevniecība: Hart Publishing
  • ISBN-13: 9781847311740
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 157,79 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
    • Hart e-books
  • Formāts: 320 pages
  • Izdošanas datums: 01-Feb-2000
  • Izdevniecība: Hart Publishing
  • ISBN-13: 9781847311740
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Analyzes the scope of copyright protection for computer software in the UK and examines challenges for the future. Intellectual property lawyer Lai presents the case for the adoption of infringement methodology emanating from the courts in the United States, resulting in a narrower scope than is currently argued for by many in the United Kingdom. Studying such issues as reverse engineering, copyright defenses, permitted acts, database protection, digital dissemination, and the impact of recent treaty and legislative initiatives, he advocates for the utility of limiting doctrines to assist in the determination of substantial similarity of particular non-literal software elements, user interfaces, and screen display protection. Distributed by ISBS. Annotation c. Book News, Inc., Portland, OR (booknews.com)

This work analyses the scope of copyright protection for computer software in the United Kingdom, and examines challenges for the future. The work presents the case for the adoption and application of infringement methodology emanating from the courts in the United States, resulting in a narrower scope of protection than is presently argued for by many UK academics, practitioners and judges alike. The work makes a careful evaluation of the efficacy of the various prevailing tests for infringement of copyright in software and their progenies, suggesting an improved formula and advocating the utility of limiting doctrines to assist in the determination of substantial similarity of particular non-literal software elements, user interfaces and screen display protection. The monograph also contains a detailed study of reverse engineering, copyright defences, permitted acts, database protection and the copyright-contract interface in the context of computer software, including crucial discussions of the internet, digital dissemination and the impact of recent treaty and legislative initiatives on British copyright law. As such it will be an important resource for practitioners, lecturers and students alike.

Recenzijas

This is a well-written and highly useful book. Jeremy Phillips, Slaughter and May, London European Intellectual Property Review July 2001 ...one of the most attractive features of this book is the lengthy (34-page) Appendix offering a simplified account of the technological detail. Dr Lai's book presents a well written, comprehensive and detailed exposition. There is no question that Dr Lai's book amounts to a definitive resource for intellectual property lawyers, academics and researchers both in the UK and elsewhere. Its usefulness is strengthened by the extensive footnoting which supplements the body text Anne Fitzgerald CTLR June 2002

Acknowledgements xi
Table of Cases
xiii
Table of Legislation
xxiii
Table of EU Directives
xxix
Table of International Instruments
xxxi
Introduction
1(12)
Aims and Objectives
1(1)
Issues for Investigation
1(4)
Approach
5(1)
Proposed Infringement Methodology
6(1)
Justification
7(1)
The Relevance of Competition Law
8(1)
Method and Plan
9(4)
PART 1: SUBSISTENCE OF COPYRIGHT AND INFRINGEMENT METHODOLOGY
Subsistence of Copyright and Infringement Analysis under US and UK Laws
13(28)
Introduction
13(1)
Subsistence of Copyright
13(8)
Computer Programs as Protectable Works
13(2)
Originality
15(4)
Other Prohibited Acts under Section 16 CDPA
19(1)
Secondary Infringement of Copyright
19(1)
Moral Rights
20(1)
The Idea/Expression Dichotomy
21(3)
The Realm of Ideas
21(1)
Dichotomy under Threat
22(1)
Basis for Applying the Dichotomy in the United Kingdom
22(2)
Infringement Methodology: a Prescriptive Analysis of Substantial Similarity
24(10)
Copyright Infringement of Computer Software: Literal Copying
24(2)
Copyright Infringement of Computer Software: Non-Literal Copying
26(8)
Summary of Trends in US Infringement Methodology
34(6)
Adoption of the Altai Test by Other Courts
34(3)
Other Tests of Substantial Similarity
37(1)
Proper Definition of Abstraction Levels
38(1)
Observations
39(1)
Conclusion
40(1)
Limiting Doctrines of Merger and Scenes a Faire
41(24)
Introduction
41(1)
Merger Doctrine
41(5)
US Origins
41(2)
Difficulties in Application
43(1)
Traces of Merger in the United Kingdom
44(2)
Merger and Software Copyright Protection
46(6)
The Operation of the Doctrine in the USA
46(2)
Possibility of Applying Merger in the United Kingdom
48(1)
Case Against the Application of the Doctrine of Merger
49(2)
Case for the Application of the Doctrine of Merger
51(1)
The Scenes a Faire Doctrine
52(2)
The Origin and Development of Scenes a Faire
52(1)
The Idea/Expression Dichotomy
53(1)
The Position of Scenes a Faire in English Law
54(3)
Historical Accounts and Incidents
55(1)
Plots, Themes, Characters and Dramatic Ideas
55(1)
Case for the Direct Application of the Scenes a Faire Doctrine
56(1)
Software Copyright: the Relevance of Scenes a Faire
57(3)
Material for Exclusion
57(2)
De Facto Standardisation
59(1)
Video Games
60(1)
Conclusion
60(5)
PART 2: THE SCOPE OF COPYRIGHT PROTECTION OF USER INTERFACES
The Copyright Protection of User Interfaces
65(22)
Introduction
65(2)
Report of the Australian Copyright Law Review Committee
65(1)
Definitions
66(1)
Copyright Protection of User Interfaces in the USA: a Survey of Recent Cases and Determination of Protectable Elements
67(10)
The Early Cases
68(1)
The High-Water Mark for User Interface Protection: Lotus v Paperback
68(2)
Contributions of the Ninth Circuit to User Interface Protection
70(2)
A New Dawn
72(3)
Other Courts: Clash of Circuits
75(2)
General Conclusions on User Interface Protection in the USA and its Impact on UK Software Copyright Law
77(3)
Ramifications for UK Software Copyright Law: Infringement Analysis
77(1)
John Richardson v Flanders: a User Interface Case
78(2)
Two Avenues of Protection
80(1)
Protection of Screen Displays under UK Copyright Law
80(3)
The Protection of Static Displays
80(2)
A Running Sequence of Displays: Protection as Films or Computer-Generated Works under the CDPA
82(1)
Policy/Economic Justifications
83(3)
Menell's Economic Analysis
84(1)
Policy and Economic Considerations in Lotus v Borland
84(2)
Conclusion
86(1)
Copyright Protection of Video Games
87(8)
Introduction
87(1)
Protection of Video Games in the USA
87(2)
Protection of Video Games in the United Kingdom
89(2)
Play Mode/Attract Mode: Film Protection of Screen Images
89(1)
Other Products of Execution
90(1)
Conclusion
91(4)
PART 3: REVERSE ENGINEERING AND DEFENCES
Reverse Engineering
95(32)
Introduction
95(2)
Structure
95(1)
Reverse Engineering Defined
95(1)
Implications of the Adaptation Right: Section 21 CDPA
96(1)
The Software Directive and Reverse Engineering
97(6)
Origins of the Software Directive
97(1)
Protection of Interfaces
97(1)
Reverse Engineering Techniques other than Decompilation
98(1)
Decompilation
99(4)
Implementation of the Software Directive in the CDPA
103(3)
Decompilation under the CDPA
104(2)
Reverse Engineering Techniques other than Decompilation under the CDPA
106(1)
Reverse Engineering in the USA
106(9)
Attitude of the US Supreme Court Towards Reverse Engineering Generally
106(1)
Permissibility of Reverse Engineering under Section 117 USCA
107(2)
Reverse Engineering and Fair Use: Section 107 USCA
109(6)
Reverse Engineering under US and UK Copyright Laws: Points of Contrast
115(4)
Differences Between the Two Regimes
115(3)
Similarities Between the Two Regimes
118(1)
Future Compatibility
119(1)
Commonwealth Developments
119(5)
Australia
119(4)
Singapore
123(1)
Conclusion
124(3)
Defences and Other Permitted Acts
127(22)
Introduction
127(1)
Section 29 CDPA: Fair Dealing for Research and Private Study and its Continued Relevance for UK Software Copyright Law
127(9)
Section 29(4) CDPA
127(1)
Continued Relevance of the Fair Dealing Defence
128(1)
Meaning of ``Research and Private Study''
129(3)
Whether the Dealing is ``Fair'' in a Reverse Engineering Situation to which Section 29(1) CDPA Applies
132(4)
Back-up Copies
136(1)
Error Correction and Maintenance
137(2)
``Error Correction'' Defined
137(1)
Extent of ``Lawful Use''
138(1)
Decompilation for the Purposes of Error Correction
139(1)
Miscellaneous Exceptions: Other Permitted Acts
139(5)
Section 56 CDPA: Transfers of Licensed Software
139(1)
Common Law Defence of Non-Derogation of Grant: the Retreat of British Leyland
140(4)
Conclusion
144(5)
PART 4: CHALLENGES FOR THE FUTURE
Software Copyright Protection in Relation to Internet Technology
149(12)
Introduction
149(1)
Copyright Issues and the WWW: Applicable Provisions of the CDPA
149(5)
Websites as ``Computer Programs''
149(1)
Websites as Compilation/Database or Computer-Generated Works
150(1)
Is a Website a Cable Programme Service?
150(2)
Websites as ``Broadcasts''?
152(1)
The Scourge of WWW Links
153(1)
Other Observations
153(1)
The Digital Agenda
154(5)
Temporary Reproduction: Articles 2 and 5 Proposed Directive
155(1)
Technical Protection Systems and Anti-Circumvention Legislation
156(3)
Conclusion
159(2)
Database Protection in the United Kingdom: the New Deal and its Effects on Software Protection
161(8)
Introduction
161(1)
Definitional Significance
161(1)
Copyright Protection of Databases
162(1)
The Future of Computer-Generated Works
163(1)
The New Database Right
164(1)
Impact of Database Copyright Provisions on Software Copyright Protection
165(3)
Originality and Substantial Similarity
165(1)
Computer Programs Contained within Databases
166(1)
``Databases'' Contained within Computer Programs
166(1)
Computer Programs as Compilations of Sub-Programs
167(1)
Conclusion
168(1)
The Copyright-Contract Interface and Software Protection
169(28)
Introduction
169(1)
Shrink-Wrap Licensing
169(15)
Users' Rights Implied by Law
170(4)
Description of ``Shrink-Wrapping''
174(1)
Shrink-Wraps under English Law
175(4)
Buyer's Remedies against the Software Supplier
179(1)
Shrink-Wrap Licences in the USA: Possible Application?
180(4)
Implied Licences and Users' Rights in Software Transactions
184(10)
Implied Licences: General Principles
184(1)
Implied Licences and Patent Law: Betts v Willmott
185(2)
Implied Licences and Copyright Law
187(3)
Further Extensions of the Betts v Willmott Principle
190(4)
Shareware and Implied Licences
194(1)
Conclusion
194(3)
General Conclusion
197(42)
Application of UK Copyright to the WWW
198(1)
The Digital Agenda
198(1)
UK Database Legislation
199(1)
The Interface between Contract and Copyright
199(4)
APPENDIX: TECHNICAL BACKGROUND
Appendix. Technical Background: Software Design, Functionality, Reverse Engineering and Internet Issues
203(36)
I. The Software Designing Process: an Overview
203(2)
II. How a Computer Functions
205(13)
III. Reverse Engineering Processes: a Technical Background
218(13)
IV. The ``Clean Room'' Procedure
231(1)
V. Technical Issues and the WWW
232(7)
Index 239


Stanley Lai is a lawyer with the firm Lee & Lee in Singapore.