skip to main content
10.1145/65293.71192acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article
Free Access

Defining educational policy on software usage in the light of copyright law

Authors Info & Claims
Published:01 February 1989Publication History

ABSTRACT

Accompanying the rapid proliferation of personal computing has been an ambivalent attitude towards the illegal copying of commercially available software. The effects of this software “piracy” are enormous and insidious, and academia ranks as one of the worst abusers. To understand the legitimate as well as illegitimate usage of software, one must have a clear understanding of the letter and intent of the copyright law. If academia is to purge itself of software abuses, educators and administrators must set clear and visible software policies based upon the copyright law.

References

  1. Antonoff, Michael (1987), SCan We End Software Piracy," Personal Computing, May, pp. 143-153.Google ScholarGoogle Scholar
  2. Antonoff, Michael (1987), "The Decllne of Copy Protection, " Persanal Comvutln~, May, pp. 155-157.Google ScholarGoogle Scholar
  3. Bullock, Laura Chase (1986), "Shoplifting? No, Softlifting ! , " Eric No. ED 278 376. "Combating software Piracy: A Statutory Proposal to Strengthen Software Copyrlght," (1985), The DeDaul Law Revle~, Summer, Vol. 34, No. 4, pp.993-1031.Google ScholarGoogle Scholar
  4. The Constitution of the United States of America, Article I, Section 8 "Copying the Look and Feel of Computer software : Fair Competition or Copyright Violatlon?" (1988), Computer Law & Intelleetual Property (CLIPHOTES) , April, Col. 2, No. 2, pp. i , 4-8, publlshed by the law firm of Gardner, Carton & Douglas, Quaker Tower, Suite 3400, 321 North Clark Street, Chicago, IL 60610.Google ScholarGoogle Scholar
  5. The Copyright Act 1976, Amended 1980- Title XVII, U.S.C., Sections 101, 107 and 117Google ScholarGoogle Scholar
  6. Ellls, David R (1986), "Computer Law-A Primer on the Law of Software Protection," The Florida Bar journal, April, pp.81-84.Google ScholarGoogle Scholar
  7. Helm, Virginia ( 1986 ) , "What Educators Should Know About Copyright," Phi Delta KaoDa Education Foundation, Bloomlngton, IndianaGoogle ScholarGoogle Scholar
  8. The Patent Act of 1952 "Protection of Mass-Marketed Software in the Waning Days of Shrink-Wrap Licenses, " (1988), Comouter Law & Intellectual Prooerty (CLIPNOTES), January, Vol. II, No. I, pp.1, 5-8, published by the law firm of Gardner, Carton & Douglas, Quaker Tower, Suite 3400, 321 North Clark Street, Chlcago, IL 60610.Google ScholarGoogle Scholar
  9. Sterne, Robert O. and Saidman, Perry (1985) , "Copying Mass-Marketed So ftware , ~ ~_y_~_fl, February, pp.387-390 . "Thou Shalt Not Dupe ," (1984) , Association of Data Processln~ Service O.r~an_Iza_t.~ona. ~AD_P.SO), Suite 300, 1300 N. 17th Street, Arlington, VA 22209.Google ScholarGoogle Scholar
  10. The Uniform Trade Secrets Act (1980) Vault Corp. v. Quaid Software Ltd., 655 F. Supp. 750 (E.D. La. 1987) Vault argued in this case that Quald, the makers of a software copying program, had violated their copyrights by using "reverse engineering" techniques to enable the copying of their copyprotected program. Vault also claimed that the sole purpose of Quaid's product was to copy software which had been protected, and thus in direct violatlon of Loulsiana's Software Enforcement Act . The court disagreed concludlng that I) Louislana's Software Enforcement Act was preempted by federal statute, the Copyright Act, thus making making its validation of "shrink wrapw licenses which prohibit any copying of' software unenforceable, 2) the act of decompillng, disassembly and reverse engineering was an appropriate means of discovering trade secrets in a commercially available product, and 3) the copy program itself had legitimate nonin~rlnging uses as prescribed by the copyright Act.Google ScholarGoogle Scholar

Index Terms

  1. Defining educational policy on software usage in the light of copyright law

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SIGCSE '89: Proceedings of the twentieth SIGCSE technical symposium on Computer science education
            February 1989
            309 pages
            ISBN:0897912985
            DOI:10.1145/65293

            Copyright © 1989 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 February 1989

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,595of4,542submissions,35%

            Upcoming Conference

            SIGCSE Virtual 2024
            SIGCSE Virtual 2024: ACM Virtual Global Computing Education Conference
            November 30 - December 1, 2024
            Virtual Event , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader