You are on page 1of 24

Intellectual Property Law: Case I :

By:

Ceyhun Gurkan (NYU Law School – INT Law 09)


Andrew Mason (NYU Law School – TORT 09)
Julia Tomars (Harvard Law School – Criminal Law 08)
Stephanie Dawson (Yale Law School – Jurisdiction 08)
Kaze Dillon (Columbia Law School – Contract Law 07)

Submitted to the Department of TORT for the


degree of Law at the New York University Law
School.

October 27, 2009.

The authors hereby grants to MIT permission to


reproduce and to distribute publicly paper and
electronic copies of this thesis document in whole or
in part in any medium now known or hereafter
created.
Introduction:

The struggle to adapt existing intellectual property law to


contemporary computer technology presents one of the greatest
legal challenges created by the ongoing technological revolution.
Many have questioned whether the current foundation of
intellectual property law can be adapted to control the excesses of
this technological revolution while many others argue that the
existing legal framework can successfully accommodate the
changes. Due to this new technology, legislation has been
introduced to amend several sections of United States Code Title
17. [FN1] This new legislation seeks to amend the existing law to
provide additional protection for the producers of intellectual
property to encourage them to contribute more of their protected
works and ideas into the National Information Infrastructure (NII).
This paper will attempt to determine whether these proposed
changes could have a significant and detrimental effect upon the
rights of the consumers of intellectual property.

The number of personal computers currently in use in


America has grown exponentially over the last several years and
the trend is predicted to continue unabated. [FN2] Additionally,
current estimates of Internet usage vary between 16.4 to 22 million
adult American users. [FN3] The sheer number of computer users,
combined with the exponential rate of growth of persons with
access to computer technology has many persons concerned about
the impact of this technology on their current and future rights
under existing intellectual property law. Accordingly, in February
of 1993, President Clinton created the Information Infrastructure
Task Force (IITF) to assist in the formation and execution of the
Clinton Administration's "vision for the National Information
Infrastructure." [FN4] Recently, legislation has been introduced in
both the Senate and House of Representatives [FN5] to codify the
changes to copyright law suggested by the IIFT in their White
Paper. [FN6] The purpose of amending any law is to change the
rights and duties of the parties involved, and it should not be
performed without hesitation. Furthermore, the resulting judicial
implementation of the law does not always directly coincide with
the voiced opinions of the drafters and supporters of the
legislation. Therefore, the actual text of the legislation should be
scrutinized as well the arguments of the supporters and opponents.

Current State of the Law:


It would be worthless to attempt to predict changes in the law
without first discussing the current state of the law. Unfortunately,
the entire field of intellectual property law can oftentimes seem
confusing and intimidating to even the most seasoned thinkers.
Unlike many areas of law, the field of intellectual property law is
often so technical that many of the common sense, knee-jerk
reactions that guide our thinking process are noticeably absent.
Therefore, not many lawyers seek to venture into the highly
specialized realm of intellectual property law. With this in mind,
this essay is written for those whose legal education may not have
included a significant amount of intellectual property law.

The Written Law:


For the uninitiated, the fundamental purpose of intellectual
property law is to provide a reasonably limited time and scope for
a person to have a monopoly for exploiting her original ideas or
works. At first glance, the Federal government providing a person
with a limited monopoly over their ideas and works seems contrary
to the principles of a free market economy. However, the U.S.
Constitution specifically enables Congress "[t]o promote the
Progress of Science and useful Arts, by securing for limited Times
to Authors and Inventors the exclusive Right to their respective
Writings and Discoveries." [FN7] This ability to control the
exploitation of one's own ideas and works is meant to provide the
impetus for the creation of new intellectual property. Following the
written intent of the framers, the United States Supreme Court has
held that "[c]reative work is to be encouraged and rewarded, but
private motivation must ultimately serve the cause of promoting
broad public availability of literature, music, and the other arts,"
[FN8] and also that "copyright law ultimately serves the purpose of
enriching the general public through access to creative works."
[FN9]

On a basic level, any computer program is simply a set of


instructions commanding a computer to accomplish specified
tasks. [FN10] Before the computer revolution, technological
innovations were usually protected through the use of patent law.
[FN11] While both patent and copyright law exist to protect
intellectual property, patents protect creative, functional invention,
and in contrast, copyrights protect creative authorship. [FN12] For
an article to be categorized as functional under the Act, it must
have an "intrinsic utilitarian function that is not merely to portray
the appearance of the article or to convey information." [FN13]
Basically, functionality requires that the invention achieve the
desired result without human facilitation. [FN14] Due to this,
combined with computer software's inherent susceptibility to
copying, copyright has become the protection of choice for
software developers. [FN15] Unfortunately, the decision to employ
copyright as the primary source of protection for computer
software raises issues not present with other forms of artistic work.
United States intellectual property policy has traditionally
been fairly liberal in the determination of what items are worthy of
copyright protection. The Copyright Act of 1976, for example,
protects "original works of authorship fixed in any tangible
medium of expression." [FN16] Accordingly, it would appear that
the Act requires a work to possess several elements to qualify for
copyright protection. From the text of § 102(a), it is apparent that a
work must first be "fixed in any tangible medium of expression"
before it can qualify for copyright protection. This language of the
Act is extremely broad, defining a tangible medium as any medium
"now known or later developed, from which they can be perceived,
reproduced, or otherwise communicated, either directly or with the
aid of a machine or device." [FN17] Note that the Act defines a
medium as tangible even where mechanical aides are required for
humans to perceive the work. This language is so liberal that it is
hard to imagine any available storage medium (except the brain)
that does not qualify as "tangible." Therefore, even though the text
of the Copyright Act was written prior to the discovery of most of
the storage technologies in use today, those technologies are
clearly within the scope of the Act.

The next requirement for copyright protection under the Copyright


Act is that the work must be deemed an "original work of
authorship." Fortunately, the Act also includes a non-exhaustive
list of things that qualify as "works of authorship." The first item
on the list is a category for literary works. [FN18] The drafters of
the Copyright Act clearly intended for computer programs to be
afforded protection as literary works under the Act, as the House
Report for the 1976 Act states that "the term 'literary works' does
not connote any criterion of literary merit or qualitative value: it
includes ... computer data bases, and computer programs to the
extent that they incorporate authorship in the programmer's
expression of original ideas, as distinguished from the ideas
themselves." [FN19]

The Copyright Act also provides that copyright protection


does not "extend to any idea, procedure, process, system, method
of operation, concept, principle, or discovery, regardless of the
form in which it is described, explained, illustrated, or embodied in
such work." [FN20] Therefore, the expression of the idea is
protected while the idea (or process, system, etc.) itself is outside
the purview of the copyright statute. Accordingly, this
idea/expression dichotomy greatly limits the scope of what parts of
the work are subject to copyright protection.

However, obtaining a copyright does not give the author an


infinite amount of control over her work. Rather than granting the
author ownership in the entire work, the copyright grants the
owner rights in relation to the work. The 11th Circuit has recently
held that "[i]t is the rights, not the work, that the copyright holder
owns." [FN21] Rather than giving the author dominion over the
work, Section 106 of the Copyright Act gives the owner a "bundle
of rights" including the exclusive rights of reproduction,
adaptation, publication, performance, and display of the work.
[FN22] Further, Section 501 of the Act even provides that
"[a]nyone who violates any of the exclusive rights of the copyright
owner… is an infringer of the copyright or right of the author."
[FN23]

The Copyright Act provides that certain categories of users,


due to their status, may use copyrighted materials in ways that may
violate the owner's rights without violating the copyright. Section
107 contains a nonexclusive list of purposes that qualify as fair
use, including: criticism, news reporting, teaching, scholarship, and
research. [FN24] The statute provides that four factors should be
considered by a court when determining if an act that would
otherwise be a violation qualifies as a fair use. First, a court should
determine the "purpose and character of the use," taking into
account whether the use is commercial or noncommercial. [FN25]
While educational and other noncommercial uses are looked upon
favorably by courts, the fact that a use is commercial should not
preclude it from being a fair use. Next, the court should examine
the "nature of the work" as well as "amount and substantiality of
the portion used." [FN26] This is to take into account the quantity
and significance of the work that was used in relation to the entire
protected work. Finally, the court should determine the effect of
the violation on the value and market for the original work. In the
interest of equity, the weight of each particular element should be
balanced against.

In fact, the text of the original Copyright Act of 1909 [FN27]


did not contain a fair use provision. Fortunately, the statute was
subsequently interpreted to include a provision that operates in a
substantially similar way to the current fair use provision. [FN28]
Therefore, Congress must have intended to secure the right of fair
use when it was included in of the current legislation. Hence,
Congress must have intended to ensure that, under certain
circumstances, fair users may infringe an owners exclusive right
without generating liability due to the resulting benefit to the
public.

Current Judicial Interpretation:


Predictably, conflict arises between the producers and
consumers of intellectual property concerning the scope of
protection as well as what constitutes a fair use. Not surprisingly,
the producers of intellectual property tend to interpret the laws in
ways that afford them the maximum protection and control over
their work. On the other hand, the consumers of intellectual
property strive for access to the greatest amount of available
material as well as the maximum amount of rights under any fair
use. These interests often seem to collide in defining the scope of
fair use and originality.

The originality requirement can present a major impediment


in copyrighting any work. "The sine qua non of copyright is
originality," according to a recent United States Supreme Court
decision. [FN29] That decision was handed down in a civil action
concerning the copyrightability of a compilation of phone
numbers. Feist Publications had copied phone numbers from a
white pages publication of a competitor, Rural Telephone Service.
[FN30] Rural refused to license the data to Fiest, so Feist copied
and processed almost five thousand entries from Rural's
publication. [FN31] Feist's resulting publication contained just
over one thousand three hundred entries that were identical to
those in the Rural directory, including several bogus entries
planted by Rural to assist them in detecting copies. [FN32] The
Feist Court held that a work must be both an "independent creation
of the author" as well as possess a "minimal degree of creativity"
to qualify for copyright protection, and that a mere compilation of
telephone listings did not qualify. [FN33]

Whelan, one of the first cases to deal with the scope of


protection afforded to computer software, greatly expanded the
scope of protection available to computer programs. [FN34] Prior
to Whelan, courts were just beginning to define the parameters of
copyright protection for computer software. Nevertheless, even by
1986 it was clear that both source code and object code could be
protected by copyright. [FN35] Thereafter, the Whelan court
paralleled the protection for non-literal aspects of other literary
works and stated that "the copyrights of computer programs can be
infringed even absent copying of the literal elements of the
program," and also that the idea and function of a compuer
program was the entire program and "everything that is not
necessary to that purpose or function [is] part of the expression of
that idea." [FN36] While several recent cases expressed doubt
concerning its holding, Whelan stands as a testament to the
difficulty of determining the scope of copyright protection for
emerging technology. [FN37]

Both source code and object code are involved in the production of
computer software. Source code is usually written in a symbolic
programming language which can be readily recognized and
understood by others familiar with the specific programming
language. During the production process, source code is compiled
into object code. Object code is a series of ones and zeroes
designed for a computer to understand. [FN38] Further, while
experienced programmers may be able to comprehend small pieces
of object code, it is unreadable to almost all persons. Accordingly,
most software purchased commercially contains only the object
code. Therefore, decompilation is the process of returning the
unreadable object code back to the readable source code. [FN39]

During the recent adaptation of current intellectual property law to


the area of emerging technology, the manufacturers of intellectual
property have suffered several recent defeats in their attempt to
expand control over their product and the impact of emerging
technologies. The first setback occurred in 1984 when the United
States Supreme Court decided the Sony case and held that the
recording of a copyrighted television program for the purposes of
"time shifting" was a fair use. [FN40] The Court stated in Sony that
any "challenge to a noncommercial use of a copyrighted work
requires proof either that the particular use is harmful, or that if it
should become widespread, it would adversely affect the potential
market for the copyrighted work." [FN41] Therefore the copyright
owner has the burden of proving the damage or potential damage
of noncommercial fair use infringers.
Subsequent courts have further expanded the scope of the fair
use doctrine by ruling that decompilation of computer programs
can be a fair use under certain circumstances. The landmark Sega
case in 1992 held that "[w]here there is good reason for studying or
examining the unprotected aspects of a copyrighted computer
program, disassembly for purposes of such study or examination
constitutes a fair use." [FN42] The Sega case involved the attempt
of a rival computer game manufacturer, Accolade, to reverse
engineer a code necessary for software to operate on the Sega
console. The court performed the four part test required by §107
and determined that even though the admitted purpose was
commercial, the public benefit derived from decompilation
outweighed any possible detriment to Sega, the specific codes
required for interoperability had questionable originality, and
therefore the object code required for software interoperability
with the Sega system was not protected by copyright. [FN43]

The Atari case, decided about the same time as Sega, also
appeared to recognize a right to decompile. [FN44] The Atari court
cites Feist for the proposition that an author may legitimately copy
unoriginal, constituent elements from a prior author's work.
[FN45] Following that logic, the Atari court states that reverse
engineering the object code to get at unprotectable ideas contained
within the code constitutes a fair use. [FN46] Unfortunately for
Atari, they had previously lied to the Copyright Office in order to
obtain the program that they subsequently decompiled. Due to the
fact that Atari had not obtained the object through legal means, the
court found itself unable to fashion any sort of equitable relief, and
further held that Atari's "unclean hands" prevents them from
presenting a defense of copyright misuse. [FN47]

In March of 1996, the Eleventh Circuit of the U. S. Court of


Appeals decided Bateman v. Mnemonics, and explicitly endorsed
the Sega court's view on reverse engineering as fair use. [FN48]
The Bateman case involved one company's reverse engineering of
a competitor's design for a computer operating system used in
automated parking systems, and using the resulting knowledge in
the design of a competing system. [FN49] Using an analysis based
on the Feist and CAI opinions, the court found that the lower court
had committed reversible error based upon the omission of
instructions on the ramifications of copying "dictated by
compatibility requirements" as well as for instructing the jury to
filter out only nonliteral similarities in the "substantial similarity
test." [FN50]

Under the current judicial interpretation of the applicable


statutes, unless access is otherwise available, the decompilation of
copyright protected computer software and hardware for the
purpose of revealing and understanding unprotected elements in
the source code is established as a matter of law. [FN51]
Therefore, it is imperative to determine what portions of the work
is unprotected by copyright. Whelan was the first major attempt to
expand the copyright protection available to computer programs
beyond the literal object and source code. Contemporary courts
continue to agree with Whelan that protection extends beyond the
literal code, but the scope of protection afforded by Whelan has
been widely criticized. [FN52] The recent Bateman decision does
not even mention Whelan.

Recent courts have completely replaced the expansive


Whelan test for copying nonliteral program elements with the
"abstraction-filtration-comparison" test used in CAI. [FN53] Under
the CAI test, a program's nonliteral structure is first broken down
into its constituent parts, then the unprotectable elements are
filtered out, leaving only the protected elements for comparison
with the allegedly infringing program. [FN54] The CAI decision
defines three categories of program elements that are unprotected.
First, the CAI court invokes merger doctrine to eliminate "elements
dictated by efficiency." Merger doctrine states that "[w]hen there is
essentially only one way to express an idea, the idea and its
expression are inseparable and copyright is no bar to copying that
expression." [FN55] The CAI court also cites the National
Commission on New Technological Uses of Copyrighted Works
Report for the proposition "that when specific instructions, even
though previously copyrighted, are the only and essential means of
accomplishing a given task, their later use by another will not
amount to infringement." [FN56] Second, the CAI court filters out
"elements dictated by external factors", which is meant to include
elements necessary only for compatibility with specific machines
or programs, design standards or widely accepted programming
practices. [FN57] Finally, any elements that are in the public
domain are filtered out from comparison to deny protection to for
elements that are "if not standard, then commonplace in the
computer software industry." [FN58] Not surprisingly, the CAI test
filters out considerably more nonliteral elements than the previous
Whelan test.

In the area of copyright, the current legal trend has been to


expand the scope of public access to protected and nonprotected
materials. The recent Bateman decision should have quieted any
nagging doubts concerning the decompilation of software. Also,
the swing away from the Whalen test for copying nonliteral
elements has permitted fledgling authors to provide much greater
interoperability with existing software. Further, anyone who claims
that current intellectual property law is inhibiting expression
should examine the cornucopia of available software and online
material.

Hoaxification:
From the perspective of the purveyors of intellectual
property, there is nothing worthy or honorable about
decompilation. Persons selling any intellectual property have
already invested their time and money in the development of their
software. The authors of the program receive no direct benefit
from another person subsequently disassembling the existing work
for their own purposes. Unless the producer eventually hires the
decompiler, any knowledge gained by the disassembly of the
program will not be used for the benefit of the producer. Therefore,
the producers of copyrighted intellectual property have a vested
interest in maintaining the maximum amount of control over their
works. Unfortunately, intellectual property is protected for the
purpose of making more material accessible to the public, not for
the benefit of its producers.

Clearly, the producers of computer software have been


alarmed by the recent slant of courts towards recognizing
decompilation as fair use. Correspondingly, Clinton's creation of
the IIFT provided them with an opportunity to modify the existing
law to meet their new concerns. As a result, both bills now being
debated in Congress contain provisions that have the potential to
outlaw the decompilation of software as well as other fair uses.
Both the Senate and House bills propose adding a Chapter to the
Copyright Act entitled "Copyright Protection and Management
Systems" that will enable software manufacturers to control the
decompilation of their products. [FN59]

Section 1201 of the proposed legislation provides that:


No person shall import, manufacture or distribute any device, product, or
component incorporated into a device or product, or offer or perform any service,
the primary purpose or effect of which is to avoid, bypass, remove, deactivate, or
otherwise circumvent, without the authority of the copyright owner or the law, any
process, treatment, mechanism or system which prevents or inhibits the violation
of any of the exclusive rights of the copyright owner under section 106. [FN60]
First, the statute is designed to proscribe devices whose "primary
purpose or effect" is to thwart copy protection schemes.
Unfortunately, there is currently no universally accepted method
for the copy protection of software. Under the Act, any number of
copy protection schemes could be implemented using an almost
infinite number of different methods. As increasing numbers of
different copy protection schemes are utilized, it becomes harder to
identify which products could be interpreted as having a "primary
purpose or effect" of circumventing any copy protection scheme.
[FN61] Rather, the appropriate test for copyright infringement
should be the standard established in Sony, requiring that the
legitimate uses for a device must also be examined. [FN62]

Further, the statute enables producers to implement any copy


protection scheme designed to protect any of the owner's exclusive
rights. Under this construction, a copy protection scheme may be
used to shield not just the protected speech but also the unprotected
elements also contained within the program. There is absolutely no
language anywhere in the legislation that requires that copy
protection schemes be designed in such a way as to afford access
to the unprotected elements. Instead, it would be far more
advantageous to simply copy protect the entire work and thereby
shield the otherwise uncopyrightable elements. [FN63] It may even
be possible control entirely non-copyrightable materials by the use
of copy protection.

The legislation further eliminates any need to conduct §107's


four part test because fair use is simply not an available defense
under the statute. Therefore, recent decisions enhancing individual
rights under the fair use doctrine, like Sega and Bateman, will no
longer be applicable. Even at first glance, it is clear that the statute
makes no mention of fair use, or any reference to §107. According
to the text of the bill, there is absolutely no difference between the
circumvention of a protection scheme for an entirely legitimate use
and circumvention for the purpose of unlawfully violating the
copyright. Thus, it wrongfully assumes a sinister motive for
anyone who would venture to bypass a copy protection scheme.

While §1201 provides for copy protection schemes, the


following section provides for additional protection in the form of
copyright management systems. According to section (c),
copyright management systems contain information on the identity
of the author, copyright holder, conditions of use, as well as other
information. Additionally, this section is plagued by many of the
same shortcomings found in the previous section. As before, the
potential for a myriad of management systems presents the
possibility for uncertainty as to exactly what constitutes a
violation. Section 1202 also contains no language that would
prohibit the placement of copyright management data on works or
elements of works that are non-copyrightable. Further, no specific
accommodation is made for those who would be forced to remove
or alter the management data during the course of fair use. It is also
important to note that, unlike the previous section, violation §1202
may subject a person to criminal as well as civil liability.

The legislation proposed by the supporters of the IITF White


Paper is clearly an attempt by the manufacturers of intellectual
property to circumvent existing case law in their attempt to assert
unwarranted control over their works. The proponents of the
legislation claim that their modifications are simply "a clarification
to ensure that copyright owners are provided with incentives to
create works for the NII." [FN64] Rather than a clarification, what
the White Paper proposes is the wholesale elimination of the CAI
"abstraction-filtration-comparison" test. Courts will no longer have
to decide what elements of the specific computer software are
protectable, whether the use qualifies as fair use, or whether a
copyright violation has even taken place at all. Instead, civil and
criminal remedies will be available to the copyright owner for any
tampering with a copyright protection or management system.
Further, copyright owners will be free to utilize any copy
protection scheme regardless of the effect on the accessibility of
unprotected elements within the work.

Not surprisingly, the Software Publishers Associationhas


heralded the White Paper as a "milestone" shortly after its
publication. [FN65] The S.P.A. would like nothing more than swift
ratification and implementation of the changes to copyright law.
Tragically, the supporters of the legislation fail to recognize that
"[t]he primary objective of copyright is not to reward the labor of
authors, but '[t]o promote the Progress of Science and useful Arts.'"
[FN66] The proponents of the White Paper fail to even address the
issue correctly when they claim that "for centuries… Congress and
the courts protected authors and artists from those who would
otherwise hijack their works," then subsequently fail to assert any
reasons why current copyright law is suddenly unable to cope with
new technology. [FN67]

Conclusion:
Adapting intellectual property law to meet the demands of
today's computer technology presents many challenges to
traditional copyright law. Over time, copyright has become the
protection of choice for the manufacturers of computer software.
Computer programs present several issues not present with
other copyrightable materials. Fortunately, courts have been able to
conform existing intellectual property law to the needs of today's
technology. In response to recent decisions expanding the scope of
fair use concerning computer code, purveyors of intellectual
property are attempting to modify the existing statutory law to
eliminate many of their concerns. However, this recent legislation
is seriously flawed in several major ways. First, manufacturers are
allowed unlimited discretion in deciding the scope of what is to be
protected by their copyright protection and management systems.
Second, once computer code is protected by either system, no
inquiry is necessary as to the copyrightability of the work. Third,
the proposed copyright protection and management provisions
make no accommodation for fair use, and can theoretically be used
to entirely eliminate fair use. Therefore, any Congressperson
interested with the preservation of individual rights should vote
against the pending legislation in the House and Senate.
Footnotes

[FN1] S. 1284, H.R. Res. 2441, 104th Cong., 1st Sess. (1995).

[FN2] see Carlton, Jim. U.S. PC Shipments Grew 14% to 15% in


Quarter, Despite a Projected Slump, Wall Street Journal, April 29,
1996, at A3; also M. Mitchell Waldrop, Culture Shock on the
Networks, 265 SCIENCE 879, 880 (1994).

[FN3] Lewis, Peter H. New Estimates in Old Debate on Internet


Use, New York Times, April 17, 1996, at C1.

[FN4] Information Infrastructure Task Force, Working Group on


Intellectual Property Rights Intellectual Property and the National
Information Infrastructure (1995). Available online via
http://www.uspto.gov/web/ipnii/ as either an ASCII text file, or a
MS Word file, or a PDF file, or a zipped postscript file (hereinafter
"White Paper").

[FN5] S. 1284, H.R. Res. 2441, 104th Cong., 1st Sess. (1995).

[FN6] Senator Orrin G. Hatch (sponsor of S.1284), Copyright and


The Digital, Global Marketplace, Roll Call , March 11, 1996.
available online at http://www.cic.org/clip4.html.

[FN7] U.S. Const. Art. I, § 8, cl. 8, available online at


http://www.law.cornell.edu/constitution/constitution.articlei.html.

[FN8] Twentieth Century Music Corp. v. Aiken, 422 U.S. 151 at


156 (1975).

[FN9] Fogerty v. Fantasy, Inc., 114 S. Ct. 1023 at 1030 (1994).


[FN10] 17 USCA § 101 (1995). "A 'computer program' is a set of
statements or instructions to be used directly or indirectly in a
computer in order to bring about a certain result." Available online
at http://www.law.cornell.edu/usc/17/101.html.

[FN11] Karjala, Dennis S., Copyright Protection of Computer


Documents, Reverse Engineering, and Professor Miller, 19 U.
Dayton L. Rev. 975 (1994) (hereinafter "Karjala").

[FN12] Id.

[FN13]17 U.S.C. § 101 (1995).

[FN14] Karjala at 4 n. 8, n.10.

[FN15] for a more detailed discussion of the patent/copyright


issue, see Miller, Arthur R. Copyright Protection For Computer
Programs, Databases, and Computer-Generated Works: Is
Anything New Since CONTU? 106 Harv. L. Rev. 977 (March
1993), also Karjala.

[FN16] 17 U.S.C. § 102(a) (1995) available online at


http://www.law.cornell.edu/usc/17/102.html.

[FN17] Id.

[FN18] 17 U.S.C. § 102(a)(1) (1995).

[FN19] H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54 (1976).

[FN20] 17 U.S.C.A. § 102(b) (1995).

[FN21] Bateman v. Mnemonics, Inc. 1996 WL 128141 n.23 (11th


Cir.(Fla.)) (hereinafter "Bateman") available online at
http://www.law.emory.edu/11circuit/dec95/93-3234.man.html.
[FN22] 17 U.S.C.A. § 106 (1995) available online at
http://www.law.cornell.edu/usc/17/106.html.

[FN23] 17 U.S.C.A. § 501(a) (1995) available online at


http://www.law.cornell.edu/usc/17/501.html.

[FN24] 17 U.S.C.A. §107 (1995) available online at


http://www.law.cornell.edu/usc/17/107.html.

[FN25] 17 U.S.C.A. §107(1) (1995).

[FN26] 17 U.S.C.A. §107(2-3) (1995).

[FN27] 35 Stat. 1075 (1909).

[FN28] When overhauling the Copyright in 1976, the authors


"intended to restate the present judicial doctrine of fair use, not to
change, narrow, or enlarge it in any way." H.R. Rep. No. 94-1476,
94th Cong., 2d Sess., p. 66 (1976).

[FN29] Feist Publications, Inc. v. Rural Telephone Service Co.,


Inc., 499 U.S. 340 at 345-46, 111 S.Ct. 1282 at 1287-88, (Mar 27,
1991) (hereinafter "Feist") available online at
http://www.law.cornell.edu/supct/classics/499_340o.htm.

[FN30] Id. 499 U.S. at 343, 111 S.Ct. at 1286.

[FN31] Id.

[FN32] Id. 499 U.S. at 344, 111 S.Ct. at 1287.

[FN33] Id. 499 U.S. at 345, 111 S.Ct. at 1287.

[FN34] Whelan Associates, Inc. v. Jaslow Dental Laboratory, Inc.,


797 F.2d 1222 (3rd Cir.(Pa.), Aug 04, 1986) available online at
http://www.columbia.edu/~law9023/whelan_v_jaslow.

[FN35] see Stern Electronics, Inc. v. Kaufman, 669 F.2d 852, 855
n. 3 (2d Cir.1982) (source code); Apple Computer, Inc. v. Franklin
Computer Corp., 714 F.2d 1240, 1246-47 (3d Cir.1983) (source
and object code), cert. dismissed, 464 U.S. 1033, 104 S.Ct. 690
(1984); Williams Electronics, Inc. v. Artic International, Inc., 685
F.2d 870 (3d Cir.1982) (object code).

[FN36] Whelan at 1234-6.

[FN37] see CMAX/Cleveland, Inc. v. UCR, Inc., 804 F.Supp. 337


(M.D.Ga., Sep 25, 1992) (rejected Whelan); Computer Associates
Intern., Inc. v. Altai, Inc., 775 F.Supp. 544, (E.D.N.Y., Aug 09,
1991) (disagreed with Whelan) (hereinafter "CAI") available
online at
http://www.lpf.org/Links/prep.ai.mit.edu/altai.appeal.decision;
Plains Cotton Co-op. Ass'n of Lubbock, Texas v. Goodpasture
Computer Service, Inc., 807 F.2d 1256 (5th Cir.(Tex.), Jan 21,
1987) (declined to follow); Apple Computer, Inc. v. Microsoft
Corp., 799 F.Supp. 1006, (N.D.Cal., Aug 07, 1992) (called into
doubt).

[FN38] For a better definition of source code and object code, see
E.F. Johnson Co. v. Uniden Corp. of America, 623 F.Supp. 1485 at
1488 (D.Minn.1985).

[FN39] Robert A. Kreiss, Accessibility and Commercialization in


Copyright Theory, 43 UCLA L.Rev. 1, 32 n. 110 (1995)
(hereinafter "Kreiss").

[FN40] Sony Corp. of America v. Universal City Studios, Inc., 464


U.S. 417, 104 S.Ct. 774 (U.S.Cal., Jan 17, 1984) (hereinafter
"Sony") available online at
http://www.law.cornell.edu/supct/cases/464us417.htm.

[FN41] Id. 464 U.S. at 451, 104 S.Ct at 793.

[FN42] Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th
Cir.(Cal.), Oct 20, 1992) (hereinafter "Sega") available online at
http://www.law.syr.edu/Course.Materials/Chon/cases/sega.wp1.txt.

[FN43]Sega at 1522.

[FN44] Atari Games Corp. v. Nintendo of America Inc., 975 F.2d


832 (Fed.Cir.(Cal.), Sep 10, 1992) (hereinafter "Atari") available
online at http://www.columbia.edu/~law9023/nintendo.

[FN45] Feist at 499 U.S. at 350, 111 S.Ct. at 1290.

[FN46] Atari at 843.

[FN47] Id. at 846-847.

[FN48] Bateman at 3, n.18.

[FN49] Id. at 1-3.

[FN50] Id. at 12.

[FN51] Sega at 1514.

[FN52] see CAI at 705.

[FN53] Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823
(10th Cir.1993); also Bateman at 7.

[FN54] CAI at 702-711.

[FN55] Concrete Machinery Co. v. Classic Lawn Ornaments, Inc.,


843 F.2d 600, 606 (1st Cir.1988).

[FN56] National Commission on New Technological Uses of


Copyrighted Works, Final Report 1, at 20 (1979) (hereinafter
"CONTU") available online at
http://www.cni.org/docs/infopols/www/CONTU.html.

[FN57] CAI at 709-710.

[FN58] CAI at 710.

[FN59] S. 1284, H.R. Res. 2441, 104th Cong., 1st Sess. (1995).

[FN60] Id.

[FN61] Home Recording Rights Coalition, The "Primary Purpose


or Effect" Standard, Without Legal or Technical Guidelines, Is
Unfair and Unworkable (1996) available online at
http://www.access.digix.net/~hrrc/primpur.html.

[FN62] Sony at 464 U.S. at 442, 104 S.Ct at 788-9.

[FN63] Home Recording Rights Coalition, Inadvertantly


Circumventing Technological Protection Systems (1996) available
online at http://www.access.digix.net/~hrrc/circum.html.

[FN64] Eight Myths About the NII Copyright Protection Act


available online at http://www.cic.org/myths.html.

[FN65] Software Publishers Association, SPA Greets White House


Report as "Milestone on the Digital Highway" There Are No
Border Guards in Cyberspace (Sept. 5, 1995) available online at
http://www.spa.org/gvmnt/whitep.htm.

[FN66] Feist 499 U.S. 340 at 349, 111 S.Ct. at 1290. (1991).
[FN67] Newcomb, Jon. Letter to the Editor of Wired, (1996)
available online at http://www.cic.org/wiredlet.html.

You might also like