Professional Documents
Culture Documents
By Sylvia Erubasa
‘The maxim “copyright does not protect ideas, only the expression of ideas” has
proved remarkably ill-adapted to resolving issues of ‘non-literal infringement’ of
copyright in computer programs in both the US and UK courts. It is high time to
abandon the attempt to force software into the copyright mould and to create a new
right for programs which rewards and protects internal and external functional
aspects of programming.’
Discuss.
1. INTRODUCTION
The question I have been asked to address in this essay essentially deals with
whether or not copyright protection is adequate for the “internal and external
functional aspects of programming” and if not, whether a new right should be
created specifically for it. Software copyright law has created considerable
controversy since its beginnings. The Courts have stretched the copyright law thin
with their interpretations in an attempt to create a viable balance between the
need to provide protection for the originator of something “new” and the need to
permit others to build on the past.
As a result of this, there are strong voices to be heard and indeed there have
been many debates as to whether or not copyright alone is adequate protection for
computer programs and whether or not a new right should not be created exclusively
for computer programs which would ensure adequate protection for the internal and
external functional aspects of programming i.e. the graphical user interface (GUI)
and other non literal aspects of a program.
In this essay, copyright will be briefly discussed in line with the “idea v
expression” dichotomy, and then a brief discourse into the nature of computer
program will follow. The US and UK governing court decisions would be examined in
an effort to determine the stand of these two in the face of protection for non-
literal infringement of computer programs and the scope of the protection thus
offered in order to assess whether or not it fits into the copyright mould or it
should be given new and different rights. Recommendations will be made based on
this and then conclusion will be drawn.
2. COPYRIGHT
“The law of copyright rests on a very clear principle: that anyone who by his
skill and labour creates an original work of whatever character shall, for a
limited period, enjoy an exclusive right to copy that work. No one may for a
season reap what the copyright owner has sown.”
What copyright protects is the act of authorship; the workings of the creative
mind whether expressed as a literary work (This includes a table or a compilation
expressed in words , figures or symbols, as well as computer programs or
compilation of computer programs); artistic work, dramatic work, musical work,
cinematographic films, sound recordings and broadcast signals.
The principle which was first enunciated in the US by the court in Baker v Selden
creates a dichotomy between “unprotectable” ideas and their “protectable
expression.” In practice, this dichotomy is sometimes difficult to apply.
Courts consider this “idea v expression” dichotomy to help focus on whether the
idea is capable of various modes of expression, or whether protection of the
expression would ipso facto protect the idea (“merger doctrine”). An example of
application of the “ideas v expression” point can be seen in the American case of
Sheldon v MGM Corporation where it was held that though substantial parts of the
play were lifted for the screenplay of the film, there was no infringement. The
test is always a matter of degree or extent of the copying. In Telstra
Corporation Ltd v Royal & Sun Alliance Insurance Ltd it was held that the
similarity in the events was confined to “ideas and concept… rather than to their
expression.”
Flowing from the “idea v expression” divide, it therefore follows that for
copyright to subsist in a work it must exist in a material form and for there to
be infringement of the copyright, the copying must have been extensive. For
example, “Mickey mouse”, “Donald duck” and “superman” have all been held to be
copyrightable subject matter. However, while there might be protection for the
cartoon “Tom & Jerry”, it would not “preclude others from portraying struggles
between hapless cats and cheeky mice.”
Computer programs consist of text (i.e. source code and object code) and behaviour
which are inseparable for the purpose of protection. Although copyright is mostly
used as the “protection of choice” for computer programs, some aspects might pose
difficulties for traditional copyright law in relation to computer programs. Such
problems include the mode of operation of computers and the ease of copying
because “computer programs were made to be copied.” According to Karjala ,
“Programmers learn by studying existing programs… and they adapt what they have
learned to the new tasks that are placed before them.” Computer programmers are
thus more susceptible than other copyright owners to having their work copied
because there needs to be free sharing of programs and program parts among
programmers in order to “eliminate the need to reinvent the wheel with each new
program…”
It therefore follows that many aspects of a computer program may be copied; either
literal (bit for bit) or non-literal copying. It is generally easier to prove
liability where literal copying is alleged as it involves a straight line by line
copying of both the object and the source code. Non-literal copying is more
difficult to determine and the courts have developed different tests in this
regard. As Lord Pearce in Ladbroke (football) Ltd v William Hill (football) Ltd
said the question of whether the Defendant has taken a substantial part of the
Plaintiff’s work depends more on the quality than the quantity of what has been
taken.
The issue of non-literal infringement are two-fold. The first is “whether non-
literal elements such as interfaces are copyrightable.” The other issue of non-
literal infringement is a situation where although the allegedly infringing work
is not an exact replica of the original, it contains the essence or the
“lifeblood” of the original a.k.a. the “look and feel.” This is a more complex
situation arising from reverse engineering whereby the second party produces a
program having the same functions thus competing (or to enable compatibility) with
the first. Protection is thus desirable for the non-literal elements of a program
because these are the factors that most likely give a program a competitive edge
over its rivals, hence the extensive debates both in the US and UK courts to
determine the extent of copyright protection in this regard.
The case of Whelan Associates Inc. v Jaslow Dental Lab Inc was the high point in
copyright protection for non-literal aspects of a computer program. In this case
Jaslow alleged that Whelan’s “Dentcom” program infringed Jaslow’s copyright on its
“Dentalab” program despite the fact that they were written in different languages
and there was no issue of any literal code being copied. The Plaintiff’s argument
was that by analogy to other literary works , copyright of computer program can be
infringed even in the absence of copying of the literal elements. In trying to
separate the idea from its expression in the program, the court devised the
“utilitarian” rule. The Court held that copyright protection may extend beyond the
programs’ literal code to their “structure, sequence, and organisation (SSO)”.
The utilitarian test was however criticised in the case of Computer Associates
International Inc. v Altai as “showing a flawed understanding of a computer
program’s method of operation.”
In the Altai case, the Plaintiff alleged that the Defendant’s replication of the
functionality and interface of its job scheduling program amounted to non-literal
infringement. Concurring with Whelan that copyright can still be infringed even
where no literal code is copied; the Court of appeal however laid down its three-
prong test of “Abstraction-filtration-comparison” test to determine the similarity
of two programs. The purport of this test is to first break down the infringing
program into its basic structural parts, then “sort out the elements that are not
subject to copyright” so as to limit the comparison to the core of protectable
expression which remains after the process of elimination, and then compare the
results. Applying this test to the case at hand, the Court of Appeal upheld the
district court’s ruling that Altai’s program did not infringe that of Computer
Associates. The Altai three-prong test was the basis of the decision in MiTek
Holdings Inc. v Arce Engineering Company Inc and a host of other cases.
The first Circuit court of appeals also rejected a copyright claim on the feel of
a user interface in the case of Lotus v Borland. Lotus claimed that Borland had
infringed the copyright to its lotus 1-2-3 spreadsheet by copying most of the
structure of its menu. Overturning the earlier district court’s decision, the
court of appeal held that there was no infringement because there was no copyright
in the command menu hierarchy. This decision was affirmed by the Supreme Court by
default after a 4-4 deadlock with the Supreme Court neither unequivocally
confirming nor rejecting this fundamental issue on copyright. One can trace an
actual decline in the protection afforded by copyright to computer programs from
these cases. There are thus notably few decisions after this case as more people
turned to patent for protection of these non-literal elements.
Thus, the position of the US courts is that only original practical expression is
under copyright and non-literal elements, ideas and program functionality fall
outside copyright protection.
The law which governs copyright in the UK is the Copyright Designs and Patents Act
(CDPA) 1988. The UK position seems to suggest that tolerance would be extended to
parties who make a serious effort to avoid literal copying of an original work and
to this end; the courts formulated the substantial similarity and the skill,
labour and judgement tests.
The case of John Richardson Computers v Flanders and Chemtec Ltd was the first
complete decision in relation to copyright infringement of computer software in a
UK court where the Court per Ferris J “purportedly” applied the three prong test
as laid down in the Altai case. The Plaintiff alleged that the Defendants had
copied the “look and feel” of their program which was designed to help pharmacists
to label prescription drugs and track inventory. The court making, it clear that
non-literal copying would amount to infringement of copyright, held that though
some parts of Richardson’s program was infringed, what was copied was not a
“substantial” part of it so what Flanders had done was merely to create a program
to carry out the same function and thus compete on the same market.
The Court in Ibcos Computers Ltd v Barclays Merchantile Highland Finance Ltd per
Jacob J criticised the use of the Altai test in the Flanders case as setting a
dangerous precedent which might lead to over citation of US authorities in UK
courts especially taking into account that US legislation and jurisprudence is
inconsistent with UK copyright law. The court proposed a “home grown” approach to
the effect that where the defendant’s copying is not a literal one, a good guide
would be to gauge the extent of over-borrowing of the copyright owner’s “skill,
labour and judgement.” To this end, he set the test thus; what are the work(s) in
which the Plaintiff claims copyright? Is each such work “original”? Was there
copying from that work? If there was copying, has a substantial part of the work
been reproduced? Thus, copyright may be had for a compilation of programs where
considerable skill and labour went into its compilation. Applying this test, it
was held that there was infringement as there was substantial “similarity” in both
literal copying of certain routines and “substantial copying of structural
elements.”
The “substantial similarity” and the “skill, judgement and labour” tests were
adopted in Cantor Fitzgerald v Tradition (UK) Ltd where Pumfrey J held that the
“architecture” of a computer program is capable of protection if considerable
skill, labour and judgement were expended in its production.
Further consideration for non-literal copying was had in the case of Navitaire
Inc v EasyJet Airline Company and Bulletproof Technologies Inc. Here, although
there was no dispute that the underlying software was different; Navitaire likened
the non-textual copying to copying the plot of a book or the “business logic” of
the program. Pumfrey J threw out the analogy of the book plot as being inapt and
using instead the “chef and the pudding” example, held that “business logic” was
within the scope of unprotectable ideas; thus extending protection to a vague
concept like “business logic” would be an unjustifiable extension of copyright
protection. Although this decision was thought to signal the death knell for any
argument that copyright should subsist in ideas underlying computer programs or in
the overall “look and feel” of it, the final nail in the coffin of this argument
was hammered in by the case of Nova Productions Ltd v Mazooma Games Ltd & Ors.
In the Nova case, the Claimant had developed “Pocket Money” a computer game based
on pool. The defendants had each developed other pool based games which the
claimant alleged infringed the copyright in its computer game. The court of appeal
per Jacob LJ confirmed that ideas behind computer games are not protected by
copyright and can be copied because if protection is extended to such general
ideas copyright would become a tool of oppression not the incentive for creation
it was meant to be. The second ground for dismissing the appeal was given in an
affirmation of the Navitaire decision to the extent that Pumfrey J was right to
say that “merely making a program which will emulate another but which in no way
involves copying of the program code or any of the program’s graphics is
legitimate.”
In the wake of the Navitaire and Nova cases the extent of protection for computer
programs i.e. the protected expression v unprotected idea boundary; has been more
clearly defined. The current position in the UK is very much like that of the US -
that copyright cannot be extended to protect a general idea and there can be no
infringement in the absence of copying of the program code or making a substantial
reproduction of the original work. What kind of protection can then be had for
these “ideas” if any?
5. COPYRIGHT ALTERNATIVES
There are different and conflicting views in this respect. Many people feel that
copyright law is not enough protection for UIs in respect of computer programs and
suggest several alternative protections to copyright such as patent, trade secret,
or even a type of new sui generis protection. Others deny that there is a problem
with the protection of UIs because it is copyrightable as audio visual works. Yet
others suggest a combination approach as, according to Delberta Storz; “No one
method will provide total protection for software products, but by effectively
combining several safeguards, software developers can be assured that their
products are protected to the fullest extent of the law.” There are yet others
who believe that copyright is adaptable and still offers the best protection.
This section will attempt an analysis of these views.
In the US however, software is not treated differently from any other medium for
the purpose of grant of a patent. The court of appeal in Re Alappat decided that
computer programs were patentable. Patent was further expanded to include business
methods in State Street Bank v Signature Financial Group.
I no doubt agree with the advocates of software patent that it can be a very
powerful economic tool and can protect elements of a program that copyright or
trade secret law cannot protect (ideas, system, methods, algorithms, and functions
embodied in a software product). As desirable as software patents may be however,
in my opinion the shortcomings far outweigh the benefits;
• Copyright exist automatically upon creation of the work, patent exists upon
grant of the patent application which takes a long time (2-3 years) by which time,
technology might have moved on.
• Patent application requires rigorous conditions to be met which mostly cause
problems for software especially the requirement that the invention be new and
non-obvious.
• Patent could stifle industrial growth and result in a monopoly.
• Patenting software as far as I’m concerned would be patenting a language
because to write software, one must use existing programming environment.
While the disadvantages are numerous, I have not however completely ruled out the
use of patent. It just seems that what patent can protect is very limited in
respect of software especially in the light of the inventiveness and non
obviousness tests.
Different kinds of sui generis protections have been proposed. Stern warned that
attempts to apply ordinary principles of copyright to software would end in
unsatisfactory results and likened it to forcing the proverbial square peg into a
round hole. In recognition of its nature as an industrial property, he proposed
instead a “petty patent” type of law for computer software which “…borrows
appropriately from copyright law, patent law, and utility model law… and combines
selected features of each…”
The problem with Stern’s model is that its components are too vague and its
application whimsical. Also, he does not say how such a model should be drafted
rather he just noted that the task of creating such a system is not easy.
In contrast however, Miller warns against the “false icon of sui generis
protection.” For him, the idea of replacing copyright protection with what he
termed as a “yet undefined” sui generis protection is “unnecessary and potentially
mischievous” especially in the light of the dynamism of software as “today’s
attempt to draw a bright defensive perimeter may produce tomorrow’s Maginot line.”
Warning that it is a mistake to abandon the growing experience under the present
copyright law as many of the now resolved certainties with respect to copyright
and patent protection for software would need to be readdressed by the courts,
Miller suggests that the precise scope of copyright in the computer context is
best left to the courts to apply existing copyright principles to individual
situations. Thus he concludes that as court decisions in this regard are
crystallising into an understandable and sensible doctrinal matrix, it obviates
any need for a sui generis protection. With respect to these proposed sui generis
protections, I am inclined to agree with Miller that they are too uncertain,
merely idealistic and largely unspecific.
The decision to protect computer programs as literary works under copyright was no
doubt focused on one characteristic of programs i.e. their text and copyright has
proved to be an effective and uncontroversial means for protecting program code
from exact duplication. The issue for consideration is that valuable internal
design elements such as algorithms and information necessary to permit programs to
interoperate are vulnerable to swift copying through reverse
engineering/decompilation that copyright (and even patent) cannot efficiently
remedy or prevent so long as the imitator develops a program with a different
text.
Having examined the divergent views on this matter, whilst I maintain that a new
sui generis model is not needed, it is apparent that current application of
copyright laws need a little more push for it to offer completely adequate
protection. One such push can be achieved by eradicating the umbrella of “program
copyright” and instead after eliminating the functional elements protect the
remaining ones with traditional copyright for pictorial or graphic works and the
like. Thinking along this line, Karjala suggests that UIs should be protected as
pictorial or graphic (i.e. screen displays), audiovisual, musical or similar
traditional copyrighted works for their appearance and I for one am in complete
agreement.
7. BIBLIOGRAPHY
A.R. Miller; Copyright Protection for computer programs, data bases and computer-
generated works: Is anything new since CONTU? (1993) 106 Harvard Law Review 977
David Syrowik, Software Patents -- Just Make a Good Thing Better, 2 Michigan
Telecommunication and Technology Law Review 113 (1996)
(http://www.mttlr.org/voltwo/syrowik_art.html)
Dennis S. Karjala: The Relative roles of patent and copyright in the protection of
computer programs; (1998) 17 J. Marshall Journal of Computer & information Law 41
@ 44-48
Diane Rowland & Elizabeth Macdonald: Information Technology Law (3rd edition);
(Cavendish Publishing) pg 10.
Fitzgerald; Square pegs and round holes; (1993) 4 Law & Information science 142 @
147
M.A. Hamilton and T. Sabety; “Computer Science Concepts in Copyright Cases: The
Path to Coherent Law” (1997) 10 Harvard Journal of Law & Technology 230
MacQueen, Waelde & Laurie; Contemporary Intellectual Property: Law and Policy;
(Oxford University Press) pg 133
Mikko Valimaki: The Rise of Open source Licensing- A Challenge to the Use of
Intellectual Property in the software industry; (2005).
(http://www.scribd.com/doc/260560/openbook-valimaki)
P. Samuelson, R. Davis, M.D. Kapor and J.H. Reichman; A manifesto concerning the
legal protection of computer programs; 94 Columbia Law Review 2308 (1994)
(http://cseserv.engr.scu.edu/NQuinn/COEN288/Manifesto.pdf)
Randell M. Whitmeyer; Comment, a Plea for Due Processes: Defining the Proper Scope
of Patent Protection for Computer Software, 85 North-western University Law Review
1103, 1123-25 (1991)
Stanley Lai; The copyright protection of computer software in the U.K; (Hart
Publishing 2000) pg 30
Statutes
US copyright Act
Copyright Designs and Patents Act (CDPA) 1988 chapter 48
(http://www.opsi.gov.uk/acts/acts1988/UKpga_19880048_en_1.htm)
Case law
Aerotel Ltd v Telco Holding Ltd & ors; and Neal William Macrossan’s Application
(2006) EWCA Civ. 1371 (http://www.bailii.org/ew/cases/EWCA/Civ/2006/1371.html)
Apple Computer Inc. v Microsoft Corporation 35 F.3d 1435 (9th Cir. 1994)
(http://en.wikipedia.org/wiki/Apple_v._Microsoft)
Atari Games Corporation v Nintendo of America Inc. 975 F.2d 832 (Fed. Cir. 1992)
Baigent & Leigh v Random House Group Ltd (2006) EWHC 719 Ch.
Broderbund Software Inc. v. Unison World, Inc., 648 F. Supp. 1127 (N.D. Cal. 1986)
Brown Bag Software v Symantec Corp 960 F.2d 1465 @ 1475 (9th Cir. 1992)
Carey v. Kearsley 4 Esp. 168, 170, 170 Eng. Rep. 679, 681 (K.B. 1803)
Computer Associates International Inc. v Altai 982 F.2d 693 (2nd Cir. 1992)
Detective Comics v Bruns Publications, 111 F.2d 432 (2nd Cir. 1940)
Engineering Dynamics Inc. v Structural Software Inc. 26 F.3d 1335 (5th Cir. 1994)
Emerson v Davies et al 8 F Cas. 615 @ 619 (No 4,436) (CCD Mass. 1845)
Exxon Corporation v Exxon Insurance Consultants International Ltd (1982) Ch. 119
Gates Rubber Company v Bando Chemical Industries Ltd 9 F.3d 823 (10th Cir. 1993)
Ibcos Computers Ltd v Barclays Merchantile Highland Finance Ltd (1994) FSR 275
John Richardson Computers v Flanders and Chemtec Ltd (1993) FSR 497
MiTek Holdings Inc. v Arce Engineering Company Inc 89 F.3d 1548 (11th Cir. 1996)
Navitaire Inc v EasyJet Airline Company and Bulletproof Technologies Inc (2006)
RPC 3
Nichols v Universal Pictures Corporation 45 F.2d 119 @ 121 (2nd Cir. 1930)
Nova Productions Ltd v Mazooma Games Ltd & Ors (2007) EWCA Civ. 219
(http://www.bailii.org/ew/cases/EWCA/Civ/2007/219.html)
State Street Bank v Signature Financial Group (1998) 149 F.3d 1368
Telstra Corporation Ltd v Royal & Sun Alliance Insurance Ltd (2003)57 IPR 453
Twentieth Century Fox Film Corp v MCA Inc, 715 F.2d 1327 (9th Cir. 1983)
University of London Press Ltd v University Tutorial Press Ltd (1916) 2 Ch. 601 @
608
Walt Disney Productions v Air Pirates, 581 F.2d 751 (9th Cir. 1978)
Whelan Associates Inc. v Jaslow Dental Lab Inc 797 F.2d 1222 (3rd Cir. 1986)
(http://digital-law-online.info/papers/lah/mp-comparison.pdf )
Weblinks
http://research.louisiana.edu/ip/eisenberg/types-of-intellectual-property.shtml
http://www.publications.parliament.uk/pa/ld199900/ldjudgmt/jd001123/design-2.htm
http://web.princeton.edu/sites/ogc/TheLaw.htm
http://www.panix.com/~jesse/amicus/lotus_amicus_text.html
http://www.bitlaw.com/source/cases/copyright/altai.html
http://works.bepress.com/cgi/viewcontent.cgi?article=1005&context=estelle_derclaye
http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1996_3/redding/#a5
http://www.ncmahq.org/files/Articles/07724_07_02_p44.pdf
http://alumnus.caltech.edu/~croft/archives/academic/software.html