SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
IPRs and Software:
History, Challenges and Prospects

            VIII Congreso Mundial
            de Derecho Informatico
            Cali, 28 de octubre, 2008




                Richard Owens, Director
       Copyright and ew Technologies Division
    World Intellectual Property Organization (WIPO)
Overview
    Copyright and software
*


    Patents and software
*


    Open Source Software (OSS), including main IPR
*
    issues

    Coexistence of OSS and commercial/‘proprietary’
*
    software (mixed platforms)

    A word on software piracy
*
Copyright protection of software
    Initial work in 1970s-80s to develop sui generis system of
*
    software protection.
    WIPO Model Provisions on the Protection of Computer
*
    Programs (1978, but not followed by governments).
    Consensus emerged (1985-90): software is an author’s
*
    creation, but with a technical character.
    1991 EU Directive on the Legal Protection of Computer
*
    Programs
    1994 TRIPS Agreement
*
    1996 WIPO Copyright Treaty (WCT)
*
Copyright protection of software
    Rights protected:
*
    – Reproduction
    – Adaptation
    – Distribution
    Exceptions to rights:
*
    – make backup copy
    – decompilation/reverse engineering
            converting source code into object code, to understand how a
        •
            program works
            but decompilation is limited to obtaining information necessary for
        •
            interoperability
            Decompiled code cannot be shared! (cf Free and Open-Source
                                                             Open-
        •
            software)
Patent protection of software
    Software-related inventions now patentable in many
*
    jurisdictions.
    Applies to computer programs per se (a few countries)
*
    or software as a part of a ‘computer-implemented
    invention’ (more countries)
    Basis for patent protection – copyright protects ‘literal
*
    expressions’ of computer programs, but patents
    protect underlying functionality of program, what the
    code does, not just how it is written.
    Software patents are controversial at global level (eg,
*
    rejection of proposed EU Directive on computer-
    implemented inventions in 2005).
Arguments in favor of
        patent protection for software
    Patents protect the concepts underlying
*
    computer programs, promote development of
    software and computer-related industries.
    Patents recognize that both software and
*
    hardware exhibit technical behavior (software
    provides a set of instructions to hardware).
    TRIPS A. 27: patents for all inventions that are
*
    “new, involve inventive step, capable of
    industrial application” – technological
    neutrality
Arguments against
        patent protection for software
    Double protection of software (copyright + patent) is
*
    excessive.
    Software patents are expensive, small inventors and
*
    companies are disadvantaged.
    Software patents inhibit competition, restrict
*
    cumulative innovation, and limit development of open
    standards for interoperable products and services.
    Software patents may conflict with Free Software and
*
    Open-Source licenses.
Patent protection of business methods
    Some countries, led by US beginning with 1998 State
*
    Street Bank and Trust decision, protect business
    methods.
    In re Bilski case, US Court of Appeals for the Federal
*
    Circuit, could limit patent protection for business
    methods:
    (1) what standard should apply in determining
*
    whether a process is patentable subject matter;
    (2) extent to which a method of process must be tied
*
    to physical embodiment or machine, in order to be
    patentable.
Open-
        Open-Source Software (OSS)

    OSS is software for which the underlying
*
    source code is available to users so that
    they may read it, make changes to it, and
    build and distribute new versions
    incorporating their changes.
Free and Open-Source Software
                 Open-
                   (FOSS)
    OSS is “free” in sense of freedoms granted to user, not
*
    gratis as in cost-free.
    Grew out of Free Software Foundation founded by
*
    Richard Stallman in 1985.

    But FS and OSS are not the same:
*


    – Free software: non-free software is a social
                     non-
      problem (Richard Stallman)
    – OSS: non-free software is sub-optimal (Linus
            non-                sub-
      Torvalds)
Open-
         Open-Source Software (OSS)

    General characteristics of OSS licenses:
*
    – free redistribution of source code;
    – availability of source code;
    – users are allowed to create ‘derived works’
      (adaptations, derivative works) by modifying source
      code;
    – users may distribute the modified code;
    – the licenses must be technologically-neutral.
                            technologically-neutral.
Open-
          Open-Source Software (OSS)

    More than 70 different OSS licenses, GNU
*
    GPL most popular, followed by BSD.

    Governments are turning to OSS:
*
    –   Brazil, Cuba, Ecuador, Venezuela
    –   China
    –   The Netherlands, France, Croatia
    –   U.S. Navy
OSS and Copyright

    FS and OSS licenses are based on copyright,
*
    usually the copyright owner’s right of
    distribution.
    Contrary to popular belief, OSS licenses do not
*
    involve abandonment of copyright in code (in
    legal terms, both FS and OSS are ‘proprietary’).
    Recent US case, Jacobsen v. Katzer, affirms that
*
    OSS licenses are copyright licenses, not merely
    contracts.
IPR issues concerning OSS

    The “viral effect” of the GPL - what is the definition
*
    of a ‘derivative work” under copyright?

    What is the extent of patent rights in any source code
*
    licensed under OSS? How does the ‘viral effect’ of
    GPL interact with patent rights?

    Effect of GPL V3, A. 11 – programmers must confer
*
    patent licenses to cover all redistribution of code
    under GPLv3; initiation of patent lawsuit will
    terminate the programmer’s rights under GPL.
Coexistence of
          OSS & commercial software
    Many business models involve OSS in combination
*
    with commercial software. A growing number of
    these are revenue-generating.

    Use of OSS in mixed platforms can offer benefits,
*
    such as reduced costs and faster development cycles.

    But technical and licensing implications merit careful
*
    attention, particularly where software patents may be
    involved.
Software piracy
    Software piracy is a global problem that saps
*
    resources that could go into product development.
    Creators and investors of commercial, OSS and free
*
    software are all damaged by piracy
    Piracy becoming easier due to migration from
*
    physical media such as CDs to the Internet, and
    particularly to file-sharing services.
    BSA Global Software Piracy Study for 2008 estimates
*
    that 38% of software installed on PCs worldwide was
    obtained illegally.
Relevant WIPO activities
    Regional awareness-raising program series “IPR and
*
    Software in the XXI Century: Perspectives,
    Challenges and Opportunities”
    – Sri Lanka (May 2007), Malaysia (February 2008)
    – San Jose de Costa Rica (August 2008)


    WIPO Development Agenda (2007, ongoing): studies
*
    and conferences on:
    –   Free and Open-Source software
                 Open-
    –   open systems
    –   open standards
    –   public domain
    –
Conclusion
    Software is a powerful tool for economic
*
    development, and IPRs plays a major role in
    promoting R&D and rewarding software innovators,
    whether based on OSS or proprietary models.
    OSS is well-established in business and e-Government
*
    user communities.
    Businesses and government procurement authorities
*
    have options to select suitable software from multiple
    sources.
    The choice between OSS and commercial software, or
*
    mixed platforms, is best based on business needs,
    including costs and maintenance.
Thank you
     www.wipo.int
richard.owens@wipo.int

Mais conteúdo relacionado

Destaque (7)

Improving studentsucccess
Improving studentsucccessImproving studentsucccess
Improving studentsucccess
 
2016 First Half Results - Infographics
2016 First Half Results - Infographics2016 First Half Results - Infographics
2016 First Half Results - Infographics
 
Is acca19(security and legal compliance)
Is acca19(security and legal compliance)Is acca19(security and legal compliance)
Is acca19(security and legal compliance)
 
Generali Group 2010 Results
Generali Group 2010 ResultsGenerali Group 2010 Results
Generali Group 2010 Results
 
Lecture7 (cs212)(research methods)
Lecture7 (cs212)(research methods)Lecture7 (cs212)(research methods)
Lecture7 (cs212)(research methods)
 
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI WestinClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
 
Trabajo De RubéN
Trabajo De RubéNTrabajo De RubéN
Trabajo De RubéN
 

Semelhante a 01 Richard Owens W I P O

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)guest757c2c1
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary softwareLavan1997
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source softwareRob Jewitt
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future AheadSanjanaa Chindalia
 
open source technology
open source technologyopen source technology
open source technologyLila Ram Yadav
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)dmgerman
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open SourceReb Thomas
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Introosswatch
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source codeRobert Viseur
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentIAEME Publication
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentiaemedu
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital productsMIPLM
 

Semelhante a 01 Richard Owens W I P O (20)

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary software
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
 
open source technology
open source technologyopen source technology
open source technology
 
My Seminar
My SeminarMy Seminar
My Seminar
 
Open Source & Open Development
Open Source & Open Development Open Source & Open Development
Open Source & Open Development
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source
 
Oss healthcare
Oss healthcareOss healthcare
Oss healthcare
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Intro
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source code
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital products
 

Mais de Heidy Balanta

Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosPd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosHeidy Balanta
 
Decreto 0884 de 2012
Decreto 0884 de 2012Decreto 0884 de 2012
Decreto 0884 de 2012Heidy Balanta
 
Teletrabajo en Colombia
Teletrabajo en ColombiaTeletrabajo en Colombia
Teletrabajo en ColombiaHeidy Balanta
 
Entes reguladores de internet y las tic en
Entes reguladores de internet y las tic enEntes reguladores de internet y las tic en
Entes reguladores de internet y las tic enHeidy Balanta
 
Herramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHerramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHeidy Balanta
 
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...Heidy Balanta
 
Aspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoAspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoHeidy Balanta
 
Aspectos legales de las redes sociales
Aspectos legales de las redes socialesAspectos legales de las redes sociales
Aspectos legales de las redes socialesHeidy Balanta
 
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataExtracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataHeidy Balanta
 
Proyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoProyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoHeidy Balanta
 
Teletrabajo Sector Público
Teletrabajo Sector PúblicoTeletrabajo Sector Público
Teletrabajo Sector PúblicoHeidy Balanta
 
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Heidy Balanta
 
Comercio Electrónico en Colombia
Comercio Electrónico en ColombiaComercio Electrónico en Colombia
Comercio Electrónico en ColombiaHeidy Balanta
 
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Heidy Balanta
 
Ciudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoCiudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoHeidy Balanta
 
La constitución del ciberespacio
La constitución del ciberespacioLa constitución del ciberespacio
La constitución del ciberespacioHeidy Balanta
 
Tendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaTendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaHeidy Balanta
 

Mais de Heidy Balanta (20)

Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosPd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
 
C 337-11
C 337-11 C 337-11
C 337-11
 
Ley 1221-de-2008
Ley 1221-de-2008Ley 1221-de-2008
Ley 1221-de-2008
 
Decreto 0884 de 2012
Decreto 0884 de 2012Decreto 0884 de 2012
Decreto 0884 de 2012
 
Teletrabajo en Colombia
Teletrabajo en ColombiaTeletrabajo en Colombia
Teletrabajo en Colombia
 
Entes reguladores de internet y las tic en
Entes reguladores de internet y las tic enEntes reguladores de internet y las tic en
Entes reguladores de internet y las tic en
 
Herramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHerramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitos
 
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
 
Aspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoAspectos legales del comercio electrónico
Aspectos legales del comercio electrónico
 
Aspectos legales de las redes sociales
Aspectos legales de las redes socialesAspectos legales de las redes sociales
Aspectos legales de las redes sociales
 
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataExtracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
 
Ley 1480 de 2011
Ley 1480 de 2011Ley 1480 de 2011
Ley 1480 de 2011
 
Proyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoProyecto de decreto de Teletrabajo
Proyecto de decreto de Teletrabajo
 
Teletrabajo Sector Público
Teletrabajo Sector PúblicoTeletrabajo Sector Público
Teletrabajo Sector Público
 
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
 
Comercio Electrónico en Colombia
Comercio Electrónico en ColombiaComercio Electrónico en Colombia
Comercio Electrónico en Colombia
 
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
 
Ciudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoCiudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajo
 
La constitución del ciberespacio
La constitución del ciberespacioLa constitución del ciberespacio
La constitución del ciberespacio
 
Tendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaTendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latina
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

01 Richard Owens W I P O

  • 1. IPRs and Software: History, Challenges and Prospects VIII Congreso Mundial de Derecho Informatico Cali, 28 de octubre, 2008 Richard Owens, Director Copyright and ew Technologies Division World Intellectual Property Organization (WIPO)
  • 2. Overview Copyright and software * Patents and software * Open Source Software (OSS), including main IPR * issues Coexistence of OSS and commercial/‘proprietary’ * software (mixed platforms) A word on software piracy *
  • 3. Copyright protection of software Initial work in 1970s-80s to develop sui generis system of * software protection. WIPO Model Provisions on the Protection of Computer * Programs (1978, but not followed by governments). Consensus emerged (1985-90): software is an author’s * creation, but with a technical character. 1991 EU Directive on the Legal Protection of Computer * Programs 1994 TRIPS Agreement * 1996 WIPO Copyright Treaty (WCT) *
  • 4. Copyright protection of software Rights protected: * – Reproduction – Adaptation – Distribution Exceptions to rights: * – make backup copy – decompilation/reverse engineering converting source code into object code, to understand how a • program works but decompilation is limited to obtaining information necessary for • interoperability Decompiled code cannot be shared! (cf Free and Open-Source Open- • software)
  • 5. Patent protection of software Software-related inventions now patentable in many * jurisdictions. Applies to computer programs per se (a few countries) * or software as a part of a ‘computer-implemented invention’ (more countries) Basis for patent protection – copyright protects ‘literal * expressions’ of computer programs, but patents protect underlying functionality of program, what the code does, not just how it is written. Software patents are controversial at global level (eg, * rejection of proposed EU Directive on computer- implemented inventions in 2005).
  • 6. Arguments in favor of patent protection for software Patents protect the concepts underlying * computer programs, promote development of software and computer-related industries. Patents recognize that both software and * hardware exhibit technical behavior (software provides a set of instructions to hardware). TRIPS A. 27: patents for all inventions that are * “new, involve inventive step, capable of industrial application” – technological neutrality
  • 7. Arguments against patent protection for software Double protection of software (copyright + patent) is * excessive. Software patents are expensive, small inventors and * companies are disadvantaged. Software patents inhibit competition, restrict * cumulative innovation, and limit development of open standards for interoperable products and services. Software patents may conflict with Free Software and * Open-Source licenses.
  • 8. Patent protection of business methods Some countries, led by US beginning with 1998 State * Street Bank and Trust decision, protect business methods. In re Bilski case, US Court of Appeals for the Federal * Circuit, could limit patent protection for business methods: (1) what standard should apply in determining * whether a process is patentable subject matter; (2) extent to which a method of process must be tied * to physical embodiment or machine, in order to be patentable.
  • 9. Open- Open-Source Software (OSS) OSS is software for which the underlying * source code is available to users so that they may read it, make changes to it, and build and distribute new versions incorporating their changes.
  • 10. Free and Open-Source Software Open- (FOSS) OSS is “free” in sense of freedoms granted to user, not * gratis as in cost-free. Grew out of Free Software Foundation founded by * Richard Stallman in 1985. But FS and OSS are not the same: * – Free software: non-free software is a social non- problem (Richard Stallman) – OSS: non-free software is sub-optimal (Linus non- sub- Torvalds)
  • 11. Open- Open-Source Software (OSS) General characteristics of OSS licenses: * – free redistribution of source code; – availability of source code; – users are allowed to create ‘derived works’ (adaptations, derivative works) by modifying source code; – users may distribute the modified code; – the licenses must be technologically-neutral. technologically-neutral.
  • 12. Open- Open-Source Software (OSS) More than 70 different OSS licenses, GNU * GPL most popular, followed by BSD. Governments are turning to OSS: * – Brazil, Cuba, Ecuador, Venezuela – China – The Netherlands, France, Croatia – U.S. Navy
  • 13. OSS and Copyright FS and OSS licenses are based on copyright, * usually the copyright owner’s right of distribution. Contrary to popular belief, OSS licenses do not * involve abandonment of copyright in code (in legal terms, both FS and OSS are ‘proprietary’). Recent US case, Jacobsen v. Katzer, affirms that * OSS licenses are copyright licenses, not merely contracts.
  • 14. IPR issues concerning OSS The “viral effect” of the GPL - what is the definition * of a ‘derivative work” under copyright? What is the extent of patent rights in any source code * licensed under OSS? How does the ‘viral effect’ of GPL interact with patent rights? Effect of GPL V3, A. 11 – programmers must confer * patent licenses to cover all redistribution of code under GPLv3; initiation of patent lawsuit will terminate the programmer’s rights under GPL.
  • 15. Coexistence of OSS & commercial software Many business models involve OSS in combination * with commercial software. A growing number of these are revenue-generating. Use of OSS in mixed platforms can offer benefits, * such as reduced costs and faster development cycles. But technical and licensing implications merit careful * attention, particularly where software patents may be involved.
  • 16. Software piracy Software piracy is a global problem that saps * resources that could go into product development. Creators and investors of commercial, OSS and free * software are all damaged by piracy Piracy becoming easier due to migration from * physical media such as CDs to the Internet, and particularly to file-sharing services. BSA Global Software Piracy Study for 2008 estimates * that 38% of software installed on PCs worldwide was obtained illegally.
  • 17. Relevant WIPO activities Regional awareness-raising program series “IPR and * Software in the XXI Century: Perspectives, Challenges and Opportunities” – Sri Lanka (May 2007), Malaysia (February 2008) – San Jose de Costa Rica (August 2008) WIPO Development Agenda (2007, ongoing): studies * and conferences on: – Free and Open-Source software Open- – open systems – open standards – public domain –
  • 18. Conclusion Software is a powerful tool for economic * development, and IPRs plays a major role in promoting R&D and rewarding software innovators, whether based on OSS or proprietary models. OSS is well-established in business and e-Government * user communities. Businesses and government procurement authorities * have options to select suitable software from multiple sources. The choice between OSS and commercial software, or * mixed platforms, is best based on business needs, including costs and maintenance.
  • 19. Thank you www.wipo.int richard.owens@wipo.int