Legal protection of software – This is what you need to know
The trend of consistent significant growth of software in modern society is followed by the trend of extended attention directed to software legal protection. The adequate regulation of issues such as software ownership, copying, decompilation, potential protection of software by patenting, the penalizing of illegal use of software etc., represents the necessity of every society nourishing the development of (IT) industry.
Whereas the copyright legal protection has been admitted in Serbia, as well as in the rest of the world, the doubt whether the software can be patented opens numerous discussions of all kinds all over the world. This issue is of great practical significance given that the copyright and patent are two separate intellectual property rights, which provide different authorizations, and are obtained in different ways, and therefore, may have different commercial effects on the business, etc.
However, the specific nature of software is reflected in the fact that it can (and should) be additionally protected by other intellectual property rights and legal institutes, which provide the protection indirectly. That is the main reason to, when speaking of the legal protection of software, consider the following rights:
- Copyright
- Patent
- Trade secret
- Trademark
COPYRIGHT PROTECTION OF COMPUTER SOFTWARE
According to the law, to obtain legal protection, the work of authorship has to be the original creation of an author expressed in a certain form. Only such concrete form which expresses the originality is protected by copyright. That is the reason why it is often said that it protects the form, not the essence.
If we take a novel as an example, this will mean that the copyright protects the sentences contained in a novel from unauthorized copying, but not the ideas behind the novel itself. The novel is a great example in this case, given that the software is protected as a literary (written) work, in accordance with the Law and relevant international legal sources. Source code can be described as the written text. However, not only source code but object code as well represents the form of expressing, which makes them suitable for copyright protection, as such form is the object of the protection.
We can illustrate that in a popular case law example. Globally famous crime novel by Dan Brown, “The Da Vinci Code”, has been an object of the innumerable accusation of being plagiarism. Namely, the authors of “The Holy Blood and the Holy Grail” have accused Dan Brown of copying their work of authorship, more precisely that he “replicated their method of connecting the facts and bringing the conclusion of the Jesus Christ’s bloodline existence”. However, the largest obstacle for these authors in the court procedure was the fact that Dan Brown did not copy the text itself from the “The Holy Blood and the Holy Grail”. Having that in mind, the authors claimed that there was “non-literal copying of an essential part of their book”. The court did not accept these arguments; instead, it has taken the stand that there was no replicating of a text from the book of these authors, “but deriving of some ideas (for example, the idea that the Holy Grail is not a cup, but a metaphor for Jesus’s bloodline), which are not protected by copyright. The lawsuit is declined.” Therefore, this case law confirms that the essential purpose of copyright is – the expression of the author’s thoughts and ideas, but not an idea itself, i.e. the content of an idea.
The case of “The Da Vinci Code” can be reflected in the matter of software. For example, if someone creates software for the sales of the sports equipment which has identical functionalities as an already existing software in the market, unless the form is copied, but just the idea – the copyright infringement does not exist. This is where the issue of patenting the software comes to spotlight because the only way of protecting the idea is – by patent.
SOFTWARE PATENT PROTECTION?
A question of whether the software can be protected by the patent is far more complex. First of all, what needs to be said is that a software ‘as such’ cannot be protected by patent in the EU and the majority of other countries (with the USA as an exception). The Law on patents even contains an explicit provision highlighting that fact (that computer programs, in accordance with the law, are not considered as inventions). Why is that? Every computer program is a mathematical algorithm. The Law on patents prescribes that mathematical methods are not inventions, and accordingly, cannot be protected as a patent. On the contrary, no one else could use such mathematical formulas within the period of patent duration (20 years from the date of submitting the patent application).
However, the software may produce some kind of technical effect which is industrially applicable. When protected by the patent, it is not the software itself being protected, but in most cases the device controlled by the software. Therefore, the software is a part of a system, controls that system and enables the device to be functional in a new, different, innovative way. It is not enough to establish a simple relation between the software and hardware – there has to be a specific technical effect as a result of a software presence.
Related to the above-mentioned, it is not enough for the software to solely automatize the existing solutions. What is necessary is the existence of a new effect, not a simple automatization. Essentially, the patent protects the software indirectly, through the system which has that software as its integral part.
Those are the so-called software-implemented inventions, which:
- Are patentable if they belong to the technical science area,
- Contain 3 criteria of patentability: novelty, inventive step, and industrial application.
- Such inventions are treated as all the other inventions, but with a strong focus on the ability to be integrated into the technical science area and have a technical essence.
Due to this complexity, protection of the software as a patent is commonly considered as impossible, so the exclusive copyright protection is being excluded as ‘crystal clear’. When added the fact that the registration of a patent includes a complex procedure of composing the patent application and paying the fees, it is understandable why the software authors mostly settle for copyright protection. Especially, when speaking about the patent application for software, advanced writing skill is needed given that the patent application must not show the intention of protecting the software ‘as is’. These applications can be extremely complicated, especially when they include defining the several requests (for the system, the method, the software, the signal, etc.).
A few examples from the practice:
- Travel and ID documents reader,
- Procedure for the certification of electronic mail including the reliable digital signature being performed by the telecommunication operator,
- Procedure and method of coding application on small data carriers,
- Systems and procedures for securing the multi-factor authentication based on the transaction chain,
- System and procedure for the use of security programs for digital marketing.
The exception to the listed rules exists in a few legal systems in the world, out of which is the most important patent law system – the USA legal system, because of its commercial significance. However, given that this topic calls for the entire separate text, we will in this blog post just generally state that the USA legal system had different periods in its evolution which were more or less open to the patenting of a software ‘as is’ so that today it is possible to de facto patent the software ‘as is’ in the USA, with, of course, multiple other preconditions which previously need to be fulfilled.
Therefore, whereas the copyright protection of software exists from the moment of creating software in a certain form (source, object code, etc.) which represents the work of authorship, software ‘as is’ is not patentable in Serbia. However, those are not the only differences between patent and copyright protection. The differences in obtaining the right, duration, territorial scope, etc. have reflected the struggle for the dual-protection treatment of software, which does not abate, but becomes a more intense and interesting issue with the development of the industry.
HOW AND WHEN DO THE COPYRIGHT AND PATENT ARISE?
COPYRIGHT | PATENT | |
WHEN DOES THE RIGHT ARISE? | from the moment of the creation of work of authorship (software) – no additional actions, for example, the registration before the competent authority, is needed; | by publishing the notice on the granted right in the official gazette issued by the Intellectual Property Office (hereinafter: Office), and it arises from the date of the application submission – which means that it is previously necessary to carry out the procedure before the competent authority (Office), given that the right does not arise automatically as the copyright, but by the decision by the authority after the completed procedure on the patent application; |
DOES IT NEED TO BE REGISTERED? | No. The described mechanism of the automatic copyright acquisition indicates that the registration is not possible, given that such a procedure does not exist. However, what usually confuses the clients is the procedure of depositing the copyright before the Office. The author can (but is not obliged to) deposit its work of copyright before the Office. The confirmation on the deposit is not absolute evidence of a person depositing the work of authorship is the author, or that the work of authorship is original. Such fact is not even being determined in the procedure of depositing. The confirmation on the deposit may, however, appear to be especially useful in the proceedings before the court/other authorities, because it confirms that the certain person, in a certain moment, had deposited the certain work of copyright. Securing the evidence is the most common reason for depositing the work of authorship, but certain tax and other reliefs may be a legitimate reason for depositing the work of authorship.Yes. The patent in Serbia arises by the decision of the Office, and it cannot exist without previously conducted proceedings before the Office. The Law on patents prescribes the conditions required for the invention to fulfill to be patentable (novelty, inventive, industrially applicable); furthermore, the invention must be described completely and clearly in accordance with the law, the patent application and a drawing have to be drafted accordingly to the legal provisions, etc.). To sum up, the procedure of protecting the patent takes far more complexity, time, and expenses than the copyright protection procedure. | Yes. The patent in Serbia arises by the decision of the Office, and it cannot exist without previously conducted proceedings before the Office. The Law on patents prescribes the conditions required for the invention to fulfill to be patentable (novelty, inventive, industrially applicable); furthermore, the invention must be described completely and clearly in accordance with the law, the patent application and a drawing have to be drafted accordingly to the legal provisions, etc.). To sum up, the procedure of protecting the patent takes far more complexity, time, and expenses than the copyright protection procedure. |
DOES THE NON-DISCLOSURE AGREEMENT (NDA) PROTECT SOFTWARE?
Every creator of software should have in mind that the software can be protected in multiple ways and that the combination of those mechanisms would provide them with the highest level of security. If you are a company developing software, the largest risk of suffering the breach will origin from the persons you engaged to develop the software inside the company (for example your employees). In that case, you should consider protecting your software in a so-called indirect way, by concluding the Non-Disclosure Agreement (NDA). For instance, your NDA should cover the issue of the source code, data, and data structures regarding the design and the structure of the software product, etc.
Additionally, what needs to be determined are all the methods of transferring the trade secret – the best option is to define that it can be transferred in writing, orally, in electronic form, as well as the information contained in physical parts, software, and materials, depending on the object of a trade secret.
For example, at one-point Microsoft has protected noninteroperable platforms and data on interfaces by trade secret. Subsequently, Microsoft developed the application program and integrated it into the system software. That way, they accomplished to almost exclude the competition completely on the SMB in the field of the independent software. This example makes a great illustration of how efficient the protection of the trade secret can be in practice.
We have analyzed the Non-Disclosure Agreement (NDA) in detail in our text Non-Disclosure Agreements In the It Sector.
CAN YOUR SOFTWARE BE PROTECTED BY A TRADEMARK?
Even though the trademark cannot protect a software directly, the trademark registration may essentially save your business from the unfair competition. Companies often develop the application which they advertise online, by using the recognizable logo that is usually created for that application. If you miss registering the trademark, what can the practical consequences be?
Your competitor can completely copy your brand, by using your sign (a logo, a word, etc.) on the market for marking its application, which may be less or more like yours, with similar functionalities, etc. This way, your competitor can benefit from your market reputation and use it to attract clients for their application.
Hence, although the trademark is the least mentioned mechanism of software protection, given that it is not a “traditional” method, it is proven in practice that even the omission of the trademark registration can cause numerous problems for the software.
In our text 6 Reasons Why Trademark Registration Is Crucial For Your Business?, we have presented other benefits of the trademark registration, whereas the registration matter is explained in our text Trade Registration – Everything You wanted To Know, But Couldn’t Ask.
Given that copyright protection arises by the creation of the software in a certain form (source code, object code, etc.) which represents a work of authorship, in the following section we will revise the copyright protection of the software in Serbia more detail.
COPYRIGHT PROTECTION OF A SOFTWARE IN SERBIA
The starting point for all the issues is the Law on Copyright and Related Rights (hereinafter: Law). We wrote about the most important changes of the Law for the authors of software in the text Changes To the Law On Copyright and Related Rights. This text is focused on the protection of commercial software, while we analyzed the protection of open source code in our text Plan To Use Open Source Code Safely? Don’t Skip This Checklist!.
WHO IS THE OWNER OF A SOFTWARE?
SOFTWARE CREATED IN AN EMPLOYMENT RELATIONSHIP | The permanent holder of all the exclusive pecuniary rights on a software (work of authorship) created in an employment relationship is the employer unless otherwise provided by the contract. The programmer will have the right to special remuneration for the created work of authorship only in the case that it is contracted, which should be considered when concluding the employment agreement. Although there are mostly no doubts about who “owns” the software in cases when an employee in an IT company creates the software during the working hours and by using the employer’s means, in practice, there is a great possibility of a dispute when the programmer develops, for example, an application outside of working hours or from home, by their own means. This is an additional reason to precisely regulate these issues in an employment contract and other employer’s acts (for example, in a Rulebook on employment). We have written more about this topic in our text “Copyright On Work Made For Hire Under Employment”. |
SOFTWARE CREATED ON THE BASIS OF A CONTRACT OF COMMISSIONING A WORK OF AUTHORSHIP | If the software is created on a contract of commissioning a work of authorship basis, the commissioning party acquires all the rights to the exploitation of software, unless otherwise provided by the contract. The Law does not authorize the commissioning party to license the software to third parties without the consent of the software author. Therefore, this is another situation when one should be careful when regulating the ownership rights by a contract. |
LIMITATIONS OF THE SOFTWARE AUTHOR’S RIGHT FAVORING THE LEGAL HOLDER OF THE SOFTWARE
A person who acquired the copy of the work of authorship legally (by obtaining the license, for example), has a legal authorization to permanently or temporarily copy the software of some of its parts by any means and in any form, without the authors’ permission and without the obligation to pay the copyright remuneration, if that is necessary for the use of the software in accordance with its purpose.
The legal provision shows the exception of the exclusive right of the author to copy the software. If it were different, in practice the author could disable the legal holder of the software to use it in a usual manner. In other words, in order to use the software, it is, in most cases, necessary to copy it, because the launching of the program usually includes the copying of software.
Therefore, if you acquired the software lawfully, you have a right to copy it when it is necessary in order to use the software regularly, in accordance with its purpose.
WHAT ELSE CAN THE SUBJECT WHO LEGALLY ACQUIRES A SOFTWARE DO?
The legal holder of software has legal authorization to (without the author’s permission and without paying the copyright remuneration):
- eliminate the errors in software, if that is necessary for the use of software;
- load, show, launch, transfer or accommodate the software in computer memory if that is necessary for making the copy of the software;
- translate, adapt, arrange, and make other alterations of the software and the copied results of such actions.
Additionally, it is not possible to forbid making the backup copy of the software on a lasting tangible carrier, if that is necessary for the use of software; such copying is granted to the legal holder of a software copy.
HOW TO PROTECT YOURSELF FROM UNLAWFUL USE OF SOFTWARE?
There are three key mechanisms of protection:
- civil procedure,
- criminal procedure,
- inspectional measures.
In case you decide to initiate the civil procedure by filing a lawsuit, some of the requests you can submit are the determination of the right infringement, prohibition of any further infringements, damage compensation, etc. Besides, it should not be neglected that the unauthorized use of the software is a criminal act. If you are a victim of the unlawful use of software, you can seek protection in a criminal procedure, by filing the criminal complaint. Finally, it is not rare for the right holders to first turn to the inspection before any other proceeding initiated. Law on special authorizations related to the efficient protection of intellectual property rights prescribes that Ministry is competent to, while performing its regular activities, determine whether there is an infringement of intellectual property rights, especially rights on software and database. Although the competent authorities act in an official capacity, the software owner can submit the complaint to the police at any time. The possible consequences which may arise are the confiscation of the object which infringes the copyright and destruction of such an object, as well as initiating the misdemeanor and other proceedings against the responsible persons and companies.
This text has been originally published at the ZunicLaw website.
Leave a Reply