Comments on Yogesh A. Pai’s paper on Fair Dealing of Computer Programs in India By Nikhil Narendran Associate, Trilegal

Slides:



Advertisements
Similar presentations
Intellectual Property and the Ownership of Research 6 June 2007 Professor Fiona Macmillan.
Advertisements

COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Data Analytics – A Policy Perspective Benjamin White, Head of Intellectual Property British Library.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
ACCESS TO PROTECTED WORKS: LIMITS OF PARALLEL IMPORTS By Nisha C. Vishnu Sankar P.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Product Liability When goods cause injury, there is a question of product liability. There are three main issues related to product liability cases: –
Riverside Community School District
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
IPR-INSIGHTS CONSULTING AND RESEARCH 1116 BUDAPEST, KONDORFA U. 10. TEL.: (+36-1) FAX: (+36-1)
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Legal Framework Can you work out which slide each bullet point should go on?!
Standards and Guidelines for Web Page Publishing December 9, 2009.
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
Ioannis Iglezakis Intellectual Property Part II. Open source software Open-source software is computer software whose source code is available under a.
Legal Protection of Software and Databases Jennifer Pierce.
Decompilation 1 Software Copyright Oren Bracha, Summer 2015.
General Purpose Packages
CA NITIN GUPTA Download Source-
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Intellectual Property Department, Hong Kong SAR Government1 Public Discussion Forum on Review of Certain Provisions of the Copyright Ordinance Session.
Contract Law and Copyright Exceptions: What’s at stake? Benjamin White Head of Intellectual Property British Library.
COPYRIGHT LAW 2004 Columbus School of Law The Catholic University of America Prof. Fischer March 29, 2004.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Page 1. Panel Discussion – Tax issues arising from transfer of shares, business restructuring (including issues related to indirect transfer) and applicability.
Ejournals & ILL/DD Help or Hinderence? Rachel L. Frick University of Richmond.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Copyright law and its Nexus with Education: A Critique Manasa Reddy Gummi.
Safety of Policy Holder’s Money in ULIP plans. 2 ????
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
The law on Intermediary Liability in India
The Legalities of Technicalities By Kellie Birdwell.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
THE RIGHT TO INFORMATION ACT, SECTION 3 Subject to the provisions of this Act, all citizens shall have the right to information.
The Basics of Intellectual Property Law Understanding IP by A. David Spevack, Office of Naval Research.
National Conference on Copyright Limitations and Exceptions 14 th -15 th May, 2009 Fair Dealing of Computer Programs in India: Working through the Interoperability.
Copyrights. Copyright Definition 17 U.S.C. 102 C’ (a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed.
License, Contract, Memoranda, Oh My! Kevin L. Smith Duke University Libraries Office for Copyright and Scholarly Communications.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
Mobile County Public School System Copyright Policy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Intellectual Property Basics: What Rules Apply to Faculty, Staff, and Student Work Product? Dave Broome Vice Chancellor and General Counsel October 15,
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
E-book Licensing and Interlibrary Loan Janice T. Pilch Copyright and Licensing Librarian, Rutgers University Libraries VALE/NJ ACRL/NJLA CUS Thirteenth.
Number of pharmaceutical patent applications and granted patents for 5 major patent issuing authorities JUNE 2008 SOURCE: DERWENT WORLD PATENTS.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
PATENTS, INTEGRATED CIRCUITS, AND INDUSTRIAL DESIGNS Presented By: Navdeep World Trade Organization.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Haley Gayden. Copyright is a law of protection given to the authors or creators of “original works of authorship,” only allowing people with permission.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
6/18/2016 COPYRIGHT AND Fair Use Guidelines “Respect Copyright, Celebrate Creativity”
Intellectual Property And Data Rights Issues Domestic & Global Perspectives Bayh-Dole act -- rights in data Henry N. Wixon Chief Counsel National Institute.
Copyright material does not permit reproducing the material, publicly displaying or performing it, or engaging in any of the acts reserved for the copyright.
Intro to Intellectual Property 3.0
Lecture 28 Intellectual Property(Cont’d)
English Arbitration Act 1996
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
2006 Revenue continued to depend on a relatively small number of products APRIL 2007 SOURCE: CMR INTERNATIONAL PERFORMANCE METRICS PROGRAM © THOMSON REUTERS.
ACCESS TO PROTECTED WORKS: LIMITS OF PERMITTED USE
Emotional Intelligence: The Core of Family Offices
Presentation transcript:

Comments on Yogesh A. Pai’s paper on Fair Dealing of Computer Programs in India By Nikhil Narendran Associate, Trilegal

Section 52 (aa) making of copies or adaptation of a computer program by the lawful possessor of a copy of such computer program, from such copy- (i) in order to utilise the computer program for the purposes for which it was supplied; or (ii) to make back-up copies purely as a temporary protection against loss, destruction or damage inorder only to utilise the computer programm for the purpose for which it was supplied Making Copies/Adaptation (section 52(aa))

The purposes for which the program was supplied License terms Whether its public policy or a private right “Every one has a right to waive and to agree to waive the advantage of a law or rule made solely for the benefit and protection of the individual in his private capacity which may be dispensed with without infringing any public right or pubic policy. Where there is no express prohibition against contracting out of it, it is necessary to consider whether the Act is one which is intended to deal with private rights only or whether it is an Act which is intended as a matter of public policy” Making Copies/Adaptation (section 52(aa))

General uses of software rather than specific restriction Examples: Home use Industry specific Making Copies/Adaptation (section 52(aa))

Reverse Engineering (section 52(ab)) The doing of any act necessary to obtain information essential for operating inter-operability of an independently created computer program with other program by a lawful possessor of a computer programme provided that such information is not otherwise readily available; Permits certain acts to obtain information Information not otherwise available Will manuals and FAQS be construed as information?

Reverse Engineering (section 52(ab)) Purpose of this clause is not to allow the copyright holder to collect royalties for providing information Not available if a developer gives the information about a program for free Independently created computer program? MS Office – OpenOffice MS Office- MS Project

Reverse Engineering (section 52(ab)) Error fixing – to be permitted if the developer refuses Doing of any act necessary to obtain information Does not contemplate replacement of a software Lawful possessor Impractical to require programmers to keep paper files of the history of decompilation

Limited Research exception (52(ac)) Observing, studying and testing of functioning For the purposes for which the program was supplied

Contractual restrictions on reverse engineering For the purpose for which the program was supplied Section 28 of the Indian Contract Act Section 23 of the Indian Contract Act Contract barring reverse engineering

Fair Use and IT Act Section 43 of IT Act Proviso to section 81 of IT Act: The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force. Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970.

Fair Use and IT Act Section 43 of IT Act Any person without permission: accessing or securing access to a computer, computer system or computer network or computer resource; or destroying, deleting or altering any information residing in a computer resource computer resource" is defined under section 2(k) of the IT Act to mean a computer, communication device computer system, computer network, data, computer data base or software.

Fair Use and IT Act Exceeding fair use Section 66 IT Act Risk of Prosecution under IT Act

Thank You