SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
IPRs and Software:
History, Challenges and Prospects

            VIII Congreso Mundial
            de Derecho Informatico
            Cali, 28 de octubre, 2008




                Richard Owens, Director
       Copyright and ew Technologies Division
    World Intellectual Property Organization (WIPO)
Overview
    Copyright and software
*


    Patents and software
*


    Open Source Software (OSS), including main IPR
*
    issues

    Coexistence of OSS and commercial/‘proprietary’
*
    software (mixed platforms)

    A word on software piracy
*
Copyright protection of software
    Initial work in 1970s-80s to develop sui generis system of
*
    software protection.
    WIPO Model Provisions on the Protection of Computer
*
    Programs (1978, but not followed by governments).
    Consensus emerged (1985-90): software is an author’s
*
    creation, but with a technical character.
    1991 EU Directive on the Legal Protection of Computer
*
    Programs
    1994 TRIPS Agreement
*
    1996 WIPO Copyright Treaty (WCT)
*
Copyright protection of software
    Rights protected:
*
    – Reproduction
    – Adaptation
    – Distribution
    Exceptions to rights:
*
    – make backup copy
    – decompilation/reverse engineering
            converting source code into object code, to understand how a
        •
            program works
            but decompilation is limited to obtaining information necessary for
        •
            interoperability
            Decompiled code cannot be shared! (cf Free and Open-Source
                                                             Open-
        •
            software)
Patent protection of software
    Software-related inventions now patentable in many
*
    jurisdictions.
    Applies to computer programs per se (a few countries)
*
    or software as a part of a ‘computer-implemented
    invention’ (more countries)
    Basis for patent protection – copyright protects ‘literal
*
    expressions’ of computer programs, but patents
    protect underlying functionality of program, what the
    code does, not just how it is written.
    Software patents are controversial at global level (eg,
*
    rejection of proposed EU Directive on computer-
    implemented inventions in 2005).
Arguments in favor of
        patent protection for software
    Patents protect the concepts underlying
*
    computer programs, promote development of
    software and computer-related industries.
    Patents recognize that both software and
*
    hardware exhibit technical behavior (software
    provides a set of instructions to hardware).
    TRIPS A. 27: patents for all inventions that are
*
    “new, involve inventive step, capable of
    industrial application” – technological
    neutrality
Arguments against
        patent protection for software
    Double protection of software (copyright + patent) is
*
    excessive.
    Software patents are expensive, small inventors and
*
    companies are disadvantaged.
    Software patents inhibit competition, restrict
*
    cumulative innovation, and limit development of open
    standards for interoperable products and services.
    Software patents may conflict with Free Software and
*
    Open-Source licenses.
Patent protection of business methods
    Some countries, led by US beginning with 1998 State
*
    Street Bank and Trust decision, protect business
    methods.
    In re Bilski case, US Court of Appeals for the Federal
*
    Circuit, could limit patent protection for business
    methods:
    (1) what standard should apply in determining
*
    whether a process is patentable subject matter;
    (2) extent to which a method of process must be tied
*
    to physical embodiment or machine, in order to be
    patentable.
Open-
        Open-Source Software (OSS)

    OSS is software for which the underlying
*
    source code is available to users so that
    they may read it, make changes to it, and
    build and distribute new versions
    incorporating their changes.
Free and Open-Source Software
                 Open-
                   (FOSS)
    OSS is “free” in sense of freedoms granted to user, not
*
    gratis as in cost-free.
    Grew out of Free Software Foundation founded by
*
    Richard Stallman in 1985.

    But FS and OSS are not the same:
*


    – Free software: non-free software is a social
                     non-
      problem (Richard Stallman)
    – OSS: non-free software is sub-optimal (Linus
            non-                sub-
      Torvalds)
Open-
         Open-Source Software (OSS)

    General characteristics of OSS licenses:
*
    – free redistribution of source code;
    – availability of source code;
    – users are allowed to create ‘derived works’
      (adaptations, derivative works) by modifying source
      code;
    – users may distribute the modified code;
    – the licenses must be technologically-neutral.
                            technologically-neutral.
Open-
          Open-Source Software (OSS)

    More than 70 different OSS licenses, GNU
*
    GPL most popular, followed by BSD.

    Governments are turning to OSS:
*
    –   Brazil, Cuba, Ecuador, Venezuela
    –   China
    –   The Netherlands, France, Croatia
    –   U.S. Navy
OSS and Copyright

    FS and OSS licenses are based on copyright,
*
    usually the copyright owner’s right of
    distribution.
    Contrary to popular belief, OSS licenses do not
*
    involve abandonment of copyright in code (in
    legal terms, both FS and OSS are ‘proprietary’).
    Recent US case, Jacobsen v. Katzer, affirms that
*
    OSS licenses are copyright licenses, not merely
    contracts.
IPR issues concerning OSS

    The “viral effect” of the GPL - what is the definition
*
    of a ‘derivative work” under copyright?

    What is the extent of patent rights in any source code
*
    licensed under OSS? How does the ‘viral effect’ of
    GPL interact with patent rights?

    Effect of GPL V3, A. 11 – programmers must confer
*
    patent licenses to cover all redistribution of code
    under GPLv3; initiation of patent lawsuit will
    terminate the programmer’s rights under GPL.
Coexistence of
          OSS & commercial software
    Many business models involve OSS in combination
*
    with commercial software. A growing number of
    these are revenue-generating.

    Use of OSS in mixed platforms can offer benefits,
*
    such as reduced costs and faster development cycles.

    But technical and licensing implications merit careful
*
    attention, particularly where software patents may be
    involved.
Software piracy
    Software piracy is a global problem that saps
*
    resources that could go into product development.
    Creators and investors of commercial, OSS and free
*
    software are all damaged by piracy
    Piracy becoming easier due to migration from
*
    physical media such as CDs to the Internet, and
    particularly to file-sharing services.
    BSA Global Software Piracy Study for 2008 estimates
*
    that 38% of software installed on PCs worldwide was
    obtained illegally.
Relevant WIPO activities
    Regional awareness-raising program series “IPR and
*
    Software in the XXI Century: Perspectives,
    Challenges and Opportunities”
    – Sri Lanka (May 2007), Malaysia (February 2008)
    – San Jose de Costa Rica (August 2008)


    WIPO Development Agenda (2007, ongoing): studies
*
    and conferences on:
    –   Free and Open-Source software
                 Open-
    –   open systems
    –   open standards
    –   public domain
    –
Conclusion
    Software is a powerful tool for economic
*
    development, and IPRs plays a major role in
    promoting R&D and rewarding software innovators,
    whether based on OSS or proprietary models.
    OSS is well-established in business and e-Government
*
    user communities.
    Businesses and government procurement authorities
*
    have options to select suitable software from multiple
    sources.
    The choice between OSS and commercial software, or
*
    mixed platforms, is best based on business needs,
    including costs and maintenance.
Thank you
     www.wipo.int
richard.owens@wipo.int

Mais conteúdo relacionado

Destaque (7)

Improving studentsucccess
Improving studentsucccessImproving studentsucccess
Improving studentsucccess
 
2016 First Half Results - Infographics
2016 First Half Results - Infographics2016 First Half Results - Infographics
2016 First Half Results - Infographics
 
Is acca19(security and legal compliance)
Is acca19(security and legal compliance)Is acca19(security and legal compliance)
Is acca19(security and legal compliance)
 
Generali Group 2010 Results
Generali Group 2010 ResultsGenerali Group 2010 Results
Generali Group 2010 Results
 
Lecture7 (cs212)(research methods)
Lecture7 (cs212)(research methods)Lecture7 (cs212)(research methods)
Lecture7 (cs212)(research methods)
 
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI WestinClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
ClearedJobs.Net Cleared Job Fair Job Seeker's Handbook May 13th BWI Westin
 
Trabajo De RubéN
Trabajo De RubéNTrabajo De RubéN
Trabajo De RubéN
 

Semelhante a 01 Richard Owens W I P O

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)guest757c2c1
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary softwareLavan1997
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source softwareRob Jewitt
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future AheadSanjanaa Chindalia
 
open source technology
open source technologyopen source technology
open source technologyLila Ram Yadav
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)dmgerman
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open SourceReb Thomas
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Introosswatch
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source codeRobert Viseur
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentIAEME Publication
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentiaemedu
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital productsMIPLM
 

Semelhante a 01 Richard Owens W I P O (20)

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary software
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
 
open source technology
open source technologyopen source technology
open source technology
 
My Seminar
My SeminarMy Seminar
My Seminar
 
Open Source & Open Development
Open Source & Open Development Open Source & Open Development
Open Source & Open Development
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source
 
Oss healthcare
Oss healthcareOss healthcare
Oss healthcare
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Intro
 
Legal analysis of source code
Legal analysis of source codeLegal analysis of source code
Legal analysis of source code
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital products
 

Mais de Heidy Balanta

Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosPd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosHeidy Balanta
 
Decreto 0884 de 2012
Decreto 0884 de 2012Decreto 0884 de 2012
Decreto 0884 de 2012Heidy Balanta
 
Teletrabajo en Colombia
Teletrabajo en ColombiaTeletrabajo en Colombia
Teletrabajo en ColombiaHeidy Balanta
 
Entes reguladores de internet y las tic en
Entes reguladores de internet y las tic enEntes reguladores de internet y las tic en
Entes reguladores de internet y las tic enHeidy Balanta
 
Herramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHerramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHeidy Balanta
 
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...Heidy Balanta
 
Aspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoAspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoHeidy Balanta
 
Aspectos legales de las redes sociales
Aspectos legales de las redes socialesAspectos legales de las redes sociales
Aspectos legales de las redes socialesHeidy Balanta
 
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataExtracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataHeidy Balanta
 
Proyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoProyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoHeidy Balanta
 
Teletrabajo Sector Público
Teletrabajo Sector PúblicoTeletrabajo Sector Público
Teletrabajo Sector PúblicoHeidy Balanta
 
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Heidy Balanta
 
Comercio Electrónico en Colombia
Comercio Electrónico en ColombiaComercio Electrónico en Colombia
Comercio Electrónico en ColombiaHeidy Balanta
 
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Heidy Balanta
 
Ciudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoCiudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoHeidy Balanta
 
La constitución del ciberespacio
La constitución del ciberespacioLa constitución del ciberespacio
La constitución del ciberespacioHeidy Balanta
 
Tendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaTendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaHeidy Balanta
 

Mais de Heidy Balanta (20)

Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datosPd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
Pd modificación art._2.2.2.26.3.1_registro_nacional_bases_de_datos
 
C 337-11
C 337-11 C 337-11
C 337-11
 
Ley 1221-de-2008
Ley 1221-de-2008Ley 1221-de-2008
Ley 1221-de-2008
 
Decreto 0884 de 2012
Decreto 0884 de 2012Decreto 0884 de 2012
Decreto 0884 de 2012
 
Teletrabajo en Colombia
Teletrabajo en ColombiaTeletrabajo en Colombia
Teletrabajo en Colombia
 
Entes reguladores de internet y las tic en
Entes reguladores de internet y las tic enEntes reguladores de internet y las tic en
Entes reguladores de internet y las tic en
 
Herramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitosHerramientas legales para la prevención de los delitos
Herramientas legales para la prevención de los delitos
 
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
34849363 aproximacion-legal-al-tratamiento-de-los-delitos-informaticos-en-col...
 
Aspectos legales del comercio electrónico
Aspectos legales del comercio electrónicoAspectos legales del comercio electrónico
Aspectos legales del comercio electrónico
 
Aspectos legales de las redes sociales
Aspectos legales de las redes socialesAspectos legales de las redes sociales
Aspectos legales de las redes sociales
 
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas DataExtracto Sentencia C-748/11 Texto conciliado Habeas Data
Extracto Sentencia C-748/11 Texto conciliado Habeas Data
 
Ley 1480 de 2011
Ley 1480 de 2011Ley 1480 de 2011
Ley 1480 de 2011
 
Proyecto de decreto de Teletrabajo
Proyecto de decreto de TeletrabajoProyecto de decreto de Teletrabajo
Proyecto de decreto de Teletrabajo
 
Teletrabajo Sector Público
Teletrabajo Sector PúblicoTeletrabajo Sector Público
Teletrabajo Sector Público
 
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
Políticas de seguridad y uso de herramientas tecnológicas en el ámbito empres...
 
Comercio Electrónico en Colombia
Comercio Electrónico en ColombiaComercio Electrónico en Colombia
Comercio Electrónico en Colombia
 
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
Concepto de la Procuraduría sobre el proyecto de ley de proteccion de datos e...
 
Ciudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajoCiudad digital, una excusa para hablar de teletrabajo
Ciudad digital, una excusa para hablar de teletrabajo
 
La constitución del ciberespacio
La constitución del ciberespacioLa constitución del ciberespacio
La constitución del ciberespacio
 
Tendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latinaTendencias legislativas del teletrabajo en America latina
Tendencias legislativas del teletrabajo en America latina
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

01 Richard Owens W I P O

  • 1. IPRs and Software: History, Challenges and Prospects VIII Congreso Mundial de Derecho Informatico Cali, 28 de octubre, 2008 Richard Owens, Director Copyright and ew Technologies Division World Intellectual Property Organization (WIPO)
  • 2. Overview Copyright and software * Patents and software * Open Source Software (OSS), including main IPR * issues Coexistence of OSS and commercial/‘proprietary’ * software (mixed platforms) A word on software piracy *
  • 3. Copyright protection of software Initial work in 1970s-80s to develop sui generis system of * software protection. WIPO Model Provisions on the Protection of Computer * Programs (1978, but not followed by governments). Consensus emerged (1985-90): software is an author’s * creation, but with a technical character. 1991 EU Directive on the Legal Protection of Computer * Programs 1994 TRIPS Agreement * 1996 WIPO Copyright Treaty (WCT) *
  • 4. Copyright protection of software Rights protected: * – Reproduction – Adaptation – Distribution Exceptions to rights: * – make backup copy – decompilation/reverse engineering converting source code into object code, to understand how a • program works but decompilation is limited to obtaining information necessary for • interoperability Decompiled code cannot be shared! (cf Free and Open-Source Open- • software)
  • 5. Patent protection of software Software-related inventions now patentable in many * jurisdictions. Applies to computer programs per se (a few countries) * or software as a part of a ‘computer-implemented invention’ (more countries) Basis for patent protection – copyright protects ‘literal * expressions’ of computer programs, but patents protect underlying functionality of program, what the code does, not just how it is written. Software patents are controversial at global level (eg, * rejection of proposed EU Directive on computer- implemented inventions in 2005).
  • 6. Arguments in favor of patent protection for software Patents protect the concepts underlying * computer programs, promote development of software and computer-related industries. Patents recognize that both software and * hardware exhibit technical behavior (software provides a set of instructions to hardware). TRIPS A. 27: patents for all inventions that are * “new, involve inventive step, capable of industrial application” – technological neutrality
  • 7. Arguments against patent protection for software Double protection of software (copyright + patent) is * excessive. Software patents are expensive, small inventors and * companies are disadvantaged. Software patents inhibit competition, restrict * cumulative innovation, and limit development of open standards for interoperable products and services. Software patents may conflict with Free Software and * Open-Source licenses.
  • 8. Patent protection of business methods Some countries, led by US beginning with 1998 State * Street Bank and Trust decision, protect business methods. In re Bilski case, US Court of Appeals for the Federal * Circuit, could limit patent protection for business methods: (1) what standard should apply in determining * whether a process is patentable subject matter; (2) extent to which a method of process must be tied * to physical embodiment or machine, in order to be patentable.
  • 9. Open- Open-Source Software (OSS) OSS is software for which the underlying * source code is available to users so that they may read it, make changes to it, and build and distribute new versions incorporating their changes.
  • 10. Free and Open-Source Software Open- (FOSS) OSS is “free” in sense of freedoms granted to user, not * gratis as in cost-free. Grew out of Free Software Foundation founded by * Richard Stallman in 1985. But FS and OSS are not the same: * – Free software: non-free software is a social non- problem (Richard Stallman) – OSS: non-free software is sub-optimal (Linus non- sub- Torvalds)
  • 11. Open- Open-Source Software (OSS) General characteristics of OSS licenses: * – free redistribution of source code; – availability of source code; – users are allowed to create ‘derived works’ (adaptations, derivative works) by modifying source code; – users may distribute the modified code; – the licenses must be technologically-neutral. technologically-neutral.
  • 12. Open- Open-Source Software (OSS) More than 70 different OSS licenses, GNU * GPL most popular, followed by BSD. Governments are turning to OSS: * – Brazil, Cuba, Ecuador, Venezuela – China – The Netherlands, France, Croatia – U.S. Navy
  • 13. OSS and Copyright FS and OSS licenses are based on copyright, * usually the copyright owner’s right of distribution. Contrary to popular belief, OSS licenses do not * involve abandonment of copyright in code (in legal terms, both FS and OSS are ‘proprietary’). Recent US case, Jacobsen v. Katzer, affirms that * OSS licenses are copyright licenses, not merely contracts.
  • 14. IPR issues concerning OSS The “viral effect” of the GPL - what is the definition * of a ‘derivative work” under copyright? What is the extent of patent rights in any source code * licensed under OSS? How does the ‘viral effect’ of GPL interact with patent rights? Effect of GPL V3, A. 11 – programmers must confer * patent licenses to cover all redistribution of code under GPLv3; initiation of patent lawsuit will terminate the programmer’s rights under GPL.
  • 15. Coexistence of OSS & commercial software Many business models involve OSS in combination * with commercial software. A growing number of these are revenue-generating. Use of OSS in mixed platforms can offer benefits, * such as reduced costs and faster development cycles. But technical and licensing implications merit careful * attention, particularly where software patents may be involved.
  • 16. Software piracy Software piracy is a global problem that saps * resources that could go into product development. Creators and investors of commercial, OSS and free * software are all damaged by piracy Piracy becoming easier due to migration from * physical media such as CDs to the Internet, and particularly to file-sharing services. BSA Global Software Piracy Study for 2008 estimates * that 38% of software installed on PCs worldwide was obtained illegally.
  • 17. Relevant WIPO activities Regional awareness-raising program series “IPR and * Software in the XXI Century: Perspectives, Challenges and Opportunities” – Sri Lanka (May 2007), Malaysia (February 2008) – San Jose de Costa Rica (August 2008) WIPO Development Agenda (2007, ongoing): studies * and conferences on: – Free and Open-Source software Open- – open systems – open standards – public domain –
  • 18. Conclusion Software is a powerful tool for economic * development, and IPRs plays a major role in promoting R&D and rewarding software innovators, whether based on OSS or proprietary models. OSS is well-established in business and e-Government * user communities. Businesses and government procurement authorities * have options to select suitable software from multiple sources. The choice between OSS and commercial software, or * mixed platforms, is best based on business needs, including costs and maintenance.
  • 19. Thank you www.wipo.int richard.owens@wipo.int