ABSTRACT
Accompanying the rapid proliferation of personal computing has been an ambivalent attitude towards the illegal copying of commercially available software. The effects of this software “piracy” are enormous and insidious, and academia ranks as one of the worst abusers. To understand the legitimate as well as illegitimate usage of software, one must have a clear understanding of the letter and intent of the copyright law. If academia is to purge itself of software abuses, educators and administrators must set clear and visible software policies based upon the copyright law.
- Antonoff, Michael (1987), SCan We End Software Piracy," Personal Computing, May, pp. 143-153.Google Scholar
- Antonoff, Michael (1987), "The Decllne of Copy Protection, " Persanal Comvutln~, May, pp. 155-157.Google Scholar
- Bullock, Laura Chase (1986), "Shoplifting? No, Softlifting ! , " Eric No. ED 278 376. "Combating software Piracy: A Statutory Proposal to Strengthen Software Copyrlght," (1985), The DeDaul Law Revle~, Summer, Vol. 34, No. 4, pp.993-1031.Google Scholar
- The Constitution of the United States of America, Article I, Section 8 "Copying the Look and Feel of Computer software : Fair Competition or Copyright Violatlon?" (1988), Computer Law & Intelleetual Property (CLIPHOTES) , April, Col. 2, No. 2, pp. i , 4-8, publlshed by the law firm of Gardner, Carton & Douglas, Quaker Tower, Suite 3400, 321 North Clark Street, Chicago, IL 60610.Google Scholar
- The Copyright Act 1976, Amended 1980- Title XVII, U.S.C., Sections 101, 107 and 117Google Scholar
- Ellls, David R (1986), "Computer Law-A Primer on the Law of Software Protection," The Florida Bar journal, April, pp.81-84.Google Scholar
- Helm, Virginia ( 1986 ) , "What Educators Should Know About Copyright," Phi Delta KaoDa Education Foundation, Bloomlngton, IndianaGoogle Scholar
- The Patent Act of 1952 "Protection of Mass-Marketed Software in the Waning Days of Shrink-Wrap Licenses, " (1988), Comouter Law & Intellectual Prooerty (CLIPNOTES), January, Vol. II, No. I, pp.1, 5-8, published by the law firm of Gardner, Carton & Douglas, Quaker Tower, Suite 3400, 321 North Clark Street, Chlcago, IL 60610.Google Scholar
- Sterne, Robert O. and Saidman, Perry (1985) , "Copying Mass-Marketed So ftware , ~ ~_y_~_fl, February, pp.387-390 . "Thou Shalt Not Dupe ," (1984) , Association of Data Processln~ Service O.r~an_Iza_t.~ona. ~AD_P.SO), Suite 300, 1300 N. 17th Street, Arlington, VA 22209.Google Scholar
- The Uniform Trade Secrets Act (1980) Vault Corp. v. Quaid Software Ltd., 655 F. Supp. 750 (E.D. La. 1987) Vault argued in this case that Quald, the makers of a software copying program, had violated their copyrights by using "reverse engineering" techniques to enable the copying of their copyprotected program. Vault also claimed that the sole purpose of Quaid's product was to copy software which had been protected, and thus in direct violatlon of Loulsiana's Software Enforcement Act . The court disagreed concludlng that I) Louislana's Software Enforcement Act was preempted by federal statute, the Copyright Act, thus making making its validation of "shrink wrapw licenses which prohibit any copying of' software unenforceable, 2) the act of decompillng, disassembly and reverse engineering was an appropriate means of discovering trade secrets in a commercially available product, and 3) the copy program itself had legitimate nonin~rlnging uses as prescribed by the copyright Act.Google Scholar
Index Terms
- Defining educational policy on software usage in the light of copyright law
Recommendations
Defining educational policy on software usage in the light of copyright law
Accompanying the rapid proliferation of personal computing has been an ambivalent attitude towards the illegal copying of commercially available software. The effects of this software “piracy” are enormous and insidious, and academia ranks as one of the ...
Comments