Is reverse engineering a lawful way to acquire trade secrets ? Legally Speaking
نویسنده
چکیده
R everse engineering has always been a lawful way to acquire trade secrets embodied in mass-marketed products. This longstanding principle—on which software engineers as well as engineers in other fields so frequently rely— could be significantly undermined depending on the outcome of a case now pending before the California Supreme Court. The precedent set in this case could, in turn, influence courts in other jurisdictions. A key issue in the case—one that legal scholars and intellectual property lawyers have debated for many years—is whether an anti-reverse-engineering clause in a mass-market license should be enforceable. The California case, DVD CCA v. Bunner, presents this issue squarely, although the litigants have thus far primarily focused on whether Bunner had a free speech right (or not) to post a computer program on the Internet developed, in part, with aid of information derived from reverse engineering allegedly in violation of such a mass-market license. This column will explain why the California court should reaffirm the longstanding rule that reverse engineering is a lawful way to acquire trade secrets and should reject the premise that breach of a mass-market license forbidding reverse engineering is an improper means to obtain a trade secret. The litigants’ emphasis on free
منابع مشابه
مسؤولیت مدنی ناشی از افشای اسرار پزشکی در حقوق ایران و کامنلا
Revealing medical secrets is one of the most important topics in medical law, and has an ancient root in medical history and morality. Keeping patients' secrets is one of the certain laws in internal and international laws and regulations of the most countries that have been recognized in patients' bill of rights. Keeping patients' secrets causes patients to confide in physicians and refer to t...
متن کاملLegally Speaking: Ibm' S Pragmatic Embrace of Open Source
Twenty years ago, IBM Corp. was the most vigorous advocate of (very) “strong” intellectual property (IP) rights for computer programs. Without strong copyright protection for programs, IBM contended, there would be insufficient incentives for firms to invest in software development. IBM’s executives and lawyers asserted that (1) copyright law protected program code from copying and redistributi...
متن کاملEnriching Speaking Fluency through Conversational Gambits and Routines among Iranian Intermediate EFL Learners
The activity of speaking is conducted spontaneously and there is not much time devoted to preplanning and arranging the utterances the speaker intends to deliver. Briefly defined, gambits and routines refer to the words and phrases that facilitate the flow of conversations. As such, one way to help learners acquire oral proficiency is to teach gambits that support the social skills emphasized. ...
متن کاملCryptography April 3 , 2007 Lecture 18 : Program
The goal of program obfuscation is to provably complicate the task of reverse engineering. Owners of source code wish to make it as hard as possible for others to extract information from their binaries information which may reveal trade secrets, allow undesirable modifications, or enable software piracy. Obfuscation is typically seen as a problem relating to programming languages or compilers....
متن کاملSecrets from the Monster: Extracting Mozilla’s Software Architecture
As large systems evolve, their architectural integrity tends to decay. Reverse engineering tools, such as PBS [7, 19], Rigi [15], and Acacia [5], can be used to acquire an understanding of a system’s “as-built” architecture and in so doing regain control over the system. A problem that has impeded the widespread adoption of reverse engineering tools is the tight coupling of their subtools, incl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002