Intellectual Property Lecture Notes The controversy over intellectual property rights in cyberspace can be viewed as a battle between two groups whose interests are diametrically opposed: One camp advocates greater control of proprietary information. The other advocates unrestricted access to electronic information that is now available globally because of cybertechnology. How do these two camps relate to the opposing camps in the privacy policy debates? Entrepreneurs and business interests argue for strong legal measures that will enable them to control proprietary information in cyberspace, while ordinary users argue for greater access to that information. Our main focus will be on software as intellectual property. The disputes in the intellectual property realm for software include the question of whether software programs should be copyrightable or patentable or both and whether the “look and feel” of a user interface deserves the protection of intellectual property laws. A major intellectual property issue in recent years has related to the downloading of MP3 files that include proprietary information. The RIAA has aggressively pursued enforcement of intellectual property laws. What is Intellectual Property? Why Should it be Protected? Legal scholars and philosophers point out that property laws and norms play a fundamental role in shaping a society and in preserving its legal order. Originally, “property” referred to land. It now includes tangible objects that an individual can own, such as an automobile, articles of clothing, etc. Ownership claims involving “intellectual property” are similar in certain respects, but less straightforward in others. Intellectual property consists of objects that are often not as overtly tangible as physical objects. These intellectual property objects represent creative works and inventions which are manifestations or expressions of the intellect. A physical object can only be possessed by one person at a time. Intellectual property can be held by many people simultaneously. Legal protection is only given to a tangible expression of an idea that is creative or original. For a literary or artistic idea to be protected it must be expressed (or “fixed”) in some tangible medium such as a physical book or a sheet of paper containing a musical score. If the idea is functional in nature, such as an invention, it must be expressed as a machine or a process. Whereas authors are granted copyright protections for expressions of their literary ideas, inventors are given an incentive, in the form of a patent protection, for their functional ideas. Why Protect Intellectual Objects? The philosophical justification for granting property rights is grounded in two different theories about property. One theory is based on the rationale that a property right is a type of “natural right” that should be granted to individuals for the products that result from the labor expended in producing an artistic work or a practical invention. The other theory is that property rights are social contracts designed to encourage creators and inventors to better serve society by bringing forth their artistic works and practical inventions into the marketplace. Philosophers and legal theorists point out that the introduction of computer software has created questions regarding intellectual property laws for which there are no easy answers. Software as Intellectual Property In the US software is eligible for copyright, patent, and trade secret protection. Both copyright and patent law derive from Article 1, Section 8 of the US Constitution, which (in turn) was based on earlier concepts from British law: “The Congress shall have the power … to promote the Progress of Science and the useful Arts, by securing for limited Times to authors and inventors the exclusive Rights to their respective Writings and Discoveries.” The first copyright law in the United States was enacted in 1790 and applied primarily to books, maps, and charts. The copyright law was extended to cover new media as they emerged; media such as photographs, movies, and audio recordings. In 1909 the copyright law was amended so that it would not protect the roll for a player piano, since it was something that could not be read by humans. It became legal to copy a song onto a player piano roll. It was not a copyright violation. More details on the relevant Supreme Court rulings follow. The question is: Why is digital music different from a player piano roll? Beginning in the 1960s arguments were made that computer programs should be eligible for copyright protection. With computer programs, the source code is readable by humans, but the executable is more like a roll for a player piano. The Copyright Act of 1976 did not protect software, but it was amended in 1980 to extend copyright protection to programs, computers, and databases that “exhibit authorship”. The Copyright Act of 1976 has been amended several times. Copyright protection still applies to software. Another issue is whether the look and feel of the user interface of a program could be copyrighted. In 1987 Lotus Development Corporation filed a lawsuit against Paperback Software International, LTD, whose user interface included menus and buttons that resembled the Lotus 1-2-3 product. In 1990, a federal court judge in Boston decided in favor of Lotus. However, the “look and feel” protection issue has evolved in the other direction. Lotus initially won a copyright infringement suit against Borland International, Inc., in a look and feel case, but that decision was overturned in 1995. Apple lost its suits against MicroSoft and Hewlett-Packard. Apple had claimed that MS and HP had stolen the look and feel of the Macintosh user interface (which Apple basically stole from Xerox PARC). In the rulings against Apple and Lotus the courts determined that icons and menus in a computer interface were analogous to buttons on a VCR or to controls in a car. What do you think of this reasoning? What would have happened if these rulings had gone in the other direction? In 1998 Congress passed the Sonny Bono Copyright Term Extension Act (SBCTEA). The SBCTEA extended the length of copyright protection from the life of the author plus fifty years to the life of the author plus seventy years. Protection for “works of hire” produced before 1978 were extended from 75 to 97 years. If an author receives payment from a corporation or organization to write something, it is a work of hire and the copyright belongs to the corporation or organization. Critics of the SBCTEA point out that the law was passed just in time to keep Mickey Mouse from entering the public domain and they also point out that Disney Corporation lobbied very hard for the passage of this act. I practically wrote that law!!! What an irony! Walt Disney’s Mickey Mouse character was a rip-off from one of Buster Keaton’s movies!!! Congress also passed the Digital Millennium Copyright Act (DMCA) in 1998. The DMCA has been criticized by many legal and technology experts for going too far in protecting intellectual property. For example, computer security experts think it is a disaster because it prohibits sharing information obtained through the reverse engineering of closed source software with other security professionals. The DMCA contains a highly controversial anti-circumvention clause, which forbids the development of any software or hardware technology that circumvents protections for copyrighted digital media. News bulletin: The Supreme Court rules against the file-sharing service Grokster in a closely watched piracy case. What Does Copyright Law Protect? A copyright is given to a person, called the author. The author can be an individual, an organization, or a corporation. Copyright protection is given for an expression of an idea such as a book, poem, musical composition, photograph, dance movement, motion picture, audiovisual work, or computer software. For a work to be protected under copyright law, it must be: Original Nonfunctional Fixed in a tangible medium. Functions and processes, including inventions, are protected by patents and typically are not eligible for copyright protection. Ideas, concepts, facts, processes, and methods are not protected by copyright law. Copyright holders have the exclusive right to: Make copies of the work, Produce derivative works (e.g., translations into other languages, movies based on the book, etc.) Distribute copies, Perform works in public (e.g., musicals, plays, etc.), and Display works in public (e.g., art works). Specific exceptions have been made to these exclusive rights in certain circumstances. For example, the purchaser of software is permitted to make one archival copy of the program. Fair Use and First Sale Fair use means that every author or publisher may make limited use of another person’s copyrighted work for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. College professors have special rights to share information with students and colleagues under the fair use doctrine. The first sale doctrine states that once you buy a copyrighted work, the original owner of the copyright loses certain rights. For example, once you purchase a copy of a book, audiotape, painting, etc., you are free to give it away, resell it, or even destroy your copy. Whether this applies to software is not clear. Let’s go over the Eric Eldred Web site case illustration from Herman Tavani’s book. News bulletin: Authors Guild sues Google. Software Piracy Software manufacturers claim to have lost millions of dollars of potential revenue because of software piracy. Critics have argued that claims made by the software manufacturers about their loss of revenue due to pirated software in developing countries are either greatly exaggerated or altogether bogus. They point out that many people and organizations in those countries cannot afford to pay the prices set by American software companies for their products. This is the main theme of an article about getting blood from a turnip. Helen Nissenbaum says that there are certain cases in which making a copy of a neighbor’s software program can be morally justified. Nissenbaum gives an example of a graduate student who cannot finish her dissertation unless she has the appropriate word processing software. Nissenbaum suggests that more harm results when the student, who cannot afford the word-processing program, is denied the use of that program. Do you buy this argument? What are the implications of Open Source for this situation? Others defend software piracy on the grounds that you are not hurting Micro$oft since Micro$oft has billions upon billions of big bucks. However, if one accepts this argument, it can easily lead to a slippery slope kind of situation in terms of ethical reasoning. Many argue that the unauthorized copying of software is never morally permissible. They argue that making an unauthorized copy of a program is a form of theft. Since theft always results in harm to someone, software piracy can never be morally justified according to this argument. Let’s go over the Robert LaMacchia case illustration from the handout. In response to the LaMacchia case, the No Electronic Theft (NET) Act was passed in 1997. This law criminalizes the dissemination of copyrighted information by electronic means. The NET Act has made it criminal to reproduce or distribute, including by electronic means, one or more copies of vinyl disks or one or more copyrighted works, which have a total retail value of more than $1,000. Like LaMacchia’s Web site, Napster provided a distribution center for proprietary electronic information, although Napster was not distributing software. The piracy laws apply to illegal copying and distribution over a computer network of any kind of proprietary information in digital form. Let’s go over the Napster case illustration in our handout. “Thus far, the courts have ruled against Napster, but many believe that the Napster controversy is just the beginning of an ongoing battle with the recording industry over the use of the latest available technologies to exchange proprietary music on-line.” The RIAA has sued almost 8,500 people (many of them students) for illegal copying and distribution of music. The DeCSS Case In the summer of 2000, Paramount Pictures, Universal Studios, and MGM Studios brought a lawsuit against the owners and operators of three commercial Web sites, each of which included software that users could download for free and that would enable them to view DVDs on machines that were not authorized to use that technology. Jan Johansen and two of his teenage friends in Norway developed the controversial program, called DeCSS in 1999. DeCSS enables users to decrypt the CSS (Content Scrambling System) code that lies at the base of DVD technology. Let’s go over the Decrypting Code for DVD Technology case illustration in the handout. Should it be illegal to include DeCSS software on a Web site merely because that software could be used in activities that would violate the law? Many critics of the DMCA point out that many items currently available for purchase on the Internet should also be banned for sale if we employ the rationale that such an item could be used illegally (e.g., scissors, knives, and razors). A similar issue was involved in the case of Sony Corp of America vs. Universal City Studios, Inc. (1984). The Supreme Court ruled in favor of Sony. The Court ruled that just because VCR technology could be used to do something illegal, that was not sufficient grounds for banning the technology. Universal Studies had argued that the new Sony VHS technology could allow for the making of illegal copies of movies. Patents Patent protection is implicit in Article 1, Section 8 of the US Constitution. Patent protection applies to inventions and processes. The Patent Act requires that an invention or process satisfy three conditions: Usefulness Novelty Non-obviousness The owner of a patent has a complete monopoly over the use of his or her invention or process for twenty years. Although computer hardware inventions clearly satisfied the requirements of patent law, this was not initially the case with computer software. Legal decisions (such as Gotshalk v. Benson, 1972) established a strong precedent for not awarding patents for software. Benson applied for a patent for an algorithm that translated the representation of numbers from decimal to binary. If granted a patent for his algorithm, Benson would have controlled almost every computer in use for a number of years. He was denied a patent on the basis of a policy that bars the granting of patents for mere mathematical formulas or abstract processes that can be performed as a series of “mental steps” with the aid of pencil and paper. Then came the pivotal Diamond v. Deihr case discussed in the handout. In the Diamond v. Deihr case the Supreme Court ruled that computer algorithms were not patentable. They pointed out that the patent awarded to Deihr was not for the computer program, but for the rubber tire transformation process as a whole. Since the Deihr case, patents have been granted to computer programs and software applications. Some fear that patent protection has gone too far. The US Patent and Trademark Office (PTO) currently issues about 20,000 new software patents every year. This raises a lot of issues about what exactly can be patented in software applications and, especially, user applications in e-commerce. This brings us to one of my favorite topics: ACACIA’s patent for video and audio streaming. Another important issue that has been in the news in recent months is the SCO case. Some supporters of Open Source since this as the biggest threat to the Open Source movement. Let’s go over the Amazon.com v. BarnesandNoble.com case in the handout. What do you think about this patent business? Perhaps you’ll find the following comments that Bill Gates has made over the years regarding patents especially interesting: “If people had understood how patents would be granted when most of today’s ideas were invented and had taken out patents, the industry would be at a complete stand-still today.” “The solution … is patenting as much as we can … . A future start-up with no patents of its own will be forced to pay whatever price the giants choose to impose. That price might be high. Established companies have an interest in excluding future competitors.” Okay, so I’ve had a change of mind! Trade Secrets A trade secret consists of information used in the operation of a business or other enterprise that is sufficiently valuable and secret to afford an actual or potential economic advantage over competitors. Trade secrets can be used to protect: Formulas (e.g., Coca-Cola) Blueprints for future projects Chemical compounds Processes of manufacturing Trade secrets are generally recognized as “secrets” on which a company has expended money and energy and that are shown only to a select few within an organization. One problem with protecting trade secrets is that trade secret law is difficult to enforce at the international level. There is growing evidence that suggests that international industrial espionage has become a growing industry. Philosophical Foundations Let’s briefly characterize three theories that have traditionally been used to justify property rights (before the cyberspace era): The Labor Theory of Property The Utilitarian Theory of Property The Personality Theory of Property The Labor Theory of Property. The basic idea behind this approach is that a person has the right to the fruit of his or her labor. This approach traces its origins to 17th century philosopher John Locke. Let’s consider the relevance of Locke’s theory to the ABC Corp v. XYZ Inc scenario in the handout. The Utilitarian Theory of Property. According to this theory, granting property rights will maximize the good for the greatest number of people in a given society. Utilitarian theory underpinned the rationale used by the framers of the US Constitution for granting intellectual property rights. The Founders reasoned that if incentives were given for individuals to bring out their creative products, American society in general would benefit. Let’s go over the Sam’s Multiple CD Loader / Reader scenario in the handout. The question raised by this scenario is what motivates creativity in computer technology. Linus Torvalds addressed this issue in our earlier news bulletin. Was a utilitarian incentive (i.e., financial benefits) necessary to get Sam to follow through on his invention? Would he have brought his invention into the marketplace if there were not a financial enticement? How can we assure continued innovation and creativity – two prerequisites for American prosperity? The Personality Theory of Property. According to the personality theory of property, the intellectual object is an extension of the creator’s or author’s personality. For this reason, advocates of the personality theory believe that artistic works deserve legal protection. Let’s go over the case illustration and scenario at the end of our handout (Nile’s television commercial and Angela’s B++ tool.) INFORMATION WANTS TO BE FREE Richard Stallman is opposed to intellectual property rights for software. He did copyright his emacs editor, but he claims he did this to prevent others from copyrighting and then making a profit from his software. Stallman has been a staunch advocate of the view that INFORMATION WANTS TO BE FREE. Stallman believes that programmers would continue to write software programs even if they received no financial rewards in the form of copyright protections. Stallman makes the point that information is something that human beings desire to share with one another. Stallman believes that software development is like science. Science progresses most rapidly when knowledge is shared openly. According to Stallman, in order for information to be shared, it must be communicated, so elaborate intellectual property structures and mechanisms that prohibit, or even discourage, the communication of information would seem to undermine its very purpose – as something to be shared. Your reaction? INFORMATION WANTS TO BE SHARED Herman Tavani argues that INFORMATION WANTS TO BE SHARED has a chance to be taken far more seriously than INFORMATION WANTS TO BE FREE. The WWW came into being because SIR Tim Berners-Lee, who invented HTTP, shared it freely with the world. The idea behind HTTP was to allow for the sharing of information. Doug Englebart never received a patent for his invention, the mouse. He shared it freely with everybody. The sharing of this kind of information has benefited many of those entrepreneurs who now seek to control the flow of information in cyberspace. MS Windows ultimately derived from ideas that came from Apple and Steve Jobs (at Apple) got most of those important ideas from Xerox PARC. It is reasonably accurate to say that current user interfaces have benefited from the sharing of information along the way. The Open Source movement is certainly consistent with this idea that INFORMATION WANTS TO BE SHARED. Eric Raymond was greatly influenced by Richard Stallman. PRESERVING THE INTELLECTUAL COMMONS This section of Tavani’s book was especially inspiring. They are similar to ideas expressed by the Stanford University law professor, Lawrence Lessig. Lessig is a strong supporter of the Open Source Movement. The key question relates to the future of the intellectual commons. What if all the information that we have traditionally shared freely were to disappear from the public domain and enter the world of copyright protection? In the short term, the result might be that corporations and some individuals will profit handsomely from this privatization of information policy. In the long term, however, our society may be worse off intellectually, spiritually, and even economically, if the short-term goals or privatization are not balanced against the interests of the greater public. If these topics interest you, you might want to look at some of Lessig’s books.
© Copyright 2026 Paperzz