SupremeCourt

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, January 26, 2013

Part I: Is decompilation of software legal under the Indian Copyright Act

Posted on 12:23 AM by Unknown
In discussions with a few of my colleagues in software development related to mobile applications for Android, Windows, and iOS platforms, a question arose whether studying an existing application (already developed and available for a device) and using the existing application as a study tool is legal under the Indian Copyright Act?  At first glance the relevant provision (Section 52) under the Indian Copyright Act prescribes that studying software is legal.    

However, there are many practical issues that come up while analyzing the statute: As developers know, one cannot study software without first decompiling it.  Decompilation, ‘inter-operability’, are words that are not defined in the Act.  Decompilation may be equated to reverse engineering of a product – whether software or hardware.

This post analyzes Section 52 of the statute and in particular sub-sections 52(ab) and (ac), and find whether reverse engineering / decompilation of software applications is legal.  The answer to the question is not exactly clear – For Indian, maybe it is  - given  the way in which other jurisdictions have applied the similar statutes.  This post is divided into two parts.  Part I deals with the background information as relates to the development of decompilation / reverse engineering laws in US and Europe. Part II deals with the application of these laws to the Indian context.  Long post follows.

Because European law on copyright protection of computer programs is based on the counterpart American experience, American jurisprudence is discussed first.

REVERSE ENGINEERING IN US:

Under American law, until recently, there were no explicit provisions about decompilation or reverse engineering. The basic copyright law, that has been amended from time-to-time just provides fair use exceptions and courts are left free to interpret fair use.

In 2010, the Library of Congress with the US Register of Copyrights, provided six additional classes, that would not be considered infringement. See link.  Relevant to the issue of reverse engineering are the classes:
“..(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
...Emphasis added.

Case law sets out guidelines about reverse engineering.  And it was under the provisions of section 107 (fair use) that reverse engineering was addressed. 

The first case to be taken up by US Courts on the issue of reverse engineering was: Sega Enterprises Ltd. v. Accolade, Inc.: In Sega, Sega manufactured a video game console under a brand name Genesis.  The console contained a lock-out device (microchip) which looked for a particular code sequence in a game cartridge. This code sequence was provided only on Sega manufactured cartridges and no other.  Cartridges manufactured by other manufacturer did not have this code sequence, and could not function with the Sega console. 
Accolado, a game maker, also provided games on cartridges.  To be able to use a game cartridge from Accolado with the Genesis console, Accolade disassembled the Genesis console and found the chip containing the code reader, and found out the specific code sequence which Sega put in their cartridges.  This made it possible for Accolade to manufacture cartridges compatible with the Genesis console.  During the process of reverse engineering Accolado made several copies of Sega’s micro code and thereby infringing Sega’s copyright.

Sega suited for this infringement of their copyright to the specific microcode system and Accolado claimed fair use.  The District court in the Northern District of California found for Sega, that an infringement had taken place and it “could not be seen as a fair use because of the commercial nature of the reverse engineering.”  The Court of Appeal found otherwise and reversed the district court.  Decompilation was an infringement of Sega’s copyright but was found to be fair use. The court stated that if "disassembly provides the only means of access to those elements of the code not protected by copyright and the copier has a legitimate reason for seeking such access" is a fair use of the copyrighted work.
The court stated that reverse engineering is a fair use if the purpose is to achieve compatibilitybetween an original (i.e. not copied from another) computer program, and a device for using this program.

The second case taken up by US Courts about reverse engineering also involved video game consoles, and was Atari Games corp. v. Nintendo of America, Inc.  In Atari, the consoles were manufactured by Nintendo.  However, Nintendo also had a patent on the security lock-out device. 
Atari had tried to reverse engineer the microchip but failed.  However, Atari obtained the information related to the microchip from the US Copyright Office (Library of Congress), claiming they needed this information in a litigation with Nintendo.
Atari thereafter created a program that emulated the Nintendo lock-out microchip, and this made it possible for Atari’s game cartridges to be used on Nintendo consoles.  The district court specifically ruled that Atari had, when creating the compatible program used more than necessary to get compatibility.
Nintendo filed for copyright and patent infringement and was successful at the district court − Atari’s claim for fair use was not accepted.  The Court of Appeal for the Federal Circuit (CAFC) came to the same conclusion and ruled, “reverse engineering was fair use only when the original product had been purchased legally.”  Getting the information from the US Copyright Office on false grounds destroyed any possibility for Atari to successfully claim fair use.  However, before these questions were tested the case was settled.
This case showed that copying a program to understand and copy unprotected underlying ideas would have been probably been alright if Atari had achieved information legally. 

In a third case, in Vault Corp. v. Quaid Software Ltd., the court decided that a Louisiana Software License Enforcement Act clause permitting a copyright holder to prohibit software decompilation or disassembly was preempted by the Copyright Act, and was therefore unenforceable.

REVERSE ENGINEERING IN Europe:

In EU copyright protection of computer programs is an outcome of computer program Directive.  See link.
The concept of reverse engineering was not unique to EU law. Before it, Art. 15 of the EC semiconductor chip protection Directive permitted reverse engineering of the layout of a semiconductor microchip.  This semiconductor related directive was similar to that of the US Semiconductor Chip Act of 1980 where provisions relating to decompilation were explicitly provided.

The computer programs Directive (hereafter Directive) contains two different provisions relating access to interface information. Article 5(3) deals with reverse analysis techniques other than decompilation, (also known as black box method).  Article 6 deals with decompilation methods themselves.  

Black Box Method (or passive monitoring method):
An engineer starting to develop a product with a particular standard may start work from published documentation about the interface information with that standard.  Usually because source code is not published, and available documentation is often incomplete or out dated, it is necessary to conduct reverse analysis to ascertain the interface information required to provide an interoperable product.

Generally, this information may be learned from "black box" reverse engineering  techniques. These techniques merely involve monitoring the activity of an existing product and are passive in nature – i.e. there is no active monitoring of do not involve translation of the analyzed program’s object code into the original source code.  Examples of information that may be obtained through black box techniques are test runs, line traces, storage data dumps and screen rendering.

Article 5(3) of the Directive provides
3. The person having a right to use a copy of a computer program shall be entitled, without the authorisation of the right­holder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do.  Emphasis added.

There are multiple aspects to this article in the Directive: First the person invoking the Article must have a right to use a copy of a computer program.  Hence this is the first hurdle that is passed by legitimate software licensees or owners (no pirates please).

Most developers who intend to develop interoperable products would be licensed users of the original product for which the new product is being developed.  As an example, consider various tools created by different third party developers for Adobe™ Photoshop™ software.   All such developers are usually licensed users for the Photoshop™ software.  Hence it is permissible for them to analyze a copy legitimately.

Second, Article 5(3) permits a developer to observe study or test the functioning of the program.  This is what a developer does when conducting black box analysis.
Third and most importantly, Article 5(3) permits the developer to determine the "ideas and principles" underlying any element of the computer program. This includes determining interface specifications which being the rules and methods by which a program interacts with other products, constitutes "ideas and principles".

Fourth, Article 5(3) permits the developer to observe, study and test the functioning of the program while "loading, displaying, running, transmitting or storing" the program.

Finally, Article 5(3) provides that for the analysis to be allowed, one must be "entitled to do" the underlying operation involved.  Accordingly, this is tied to the first part in the article, and is a second tier protection against use of this article illegitimately to expand permitted use of a program.

Decompilation:

In some cases techniques permitted by Article 5(3) do not yield enough interface information required. It then becomes necessary to decompile a program –i.e. active monitoring is required.  Article 6 of computer program Directive provides the required freedom for decompilation.

Article 6 of the Directive:
Decompilation
1. The authorisation of the rightholder shall not be required where reproduction of the code and translation of its form within the meaning of points (a) and (b) of Article 4(1) are indispensable to obtain the information necessary to achieve the interoperability of an independently created computer program with other programs, provided that the following conditions are met:
(a) those acts are performed by the licensee or by another person having a right to use a copy of a program, or on their behalf by a person authorised to do so;
(b) the information necessary to achieve interoperability has not previously been readily available to the persons referred to in point (a); and
(c) those acts are confined to the parts of the original program which are necessary in order to achieve interoperability.
2. The provisions of paragraph 1 shall not permit the information obtained through its application:
(a) to be used for goals other than to achieve the interoper­ability of the independently created computer program;
(b) to be given to others, except when necessary for the inter­operability of the independently created computer program; or
(c) to be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright.

From Article 6, it seems that decompilation of a program may not be done solely to research its underlying ideas unrelated to interoperability and then implement those ideas in a program that competes with the decompiled program.

The word indispensable has been used in Article 6.  This word suggests that it is not a mere wish but rather is required (grammatical construct: Air is required for breathing). 

In practice, because decompilation requires great sophistication, time and expense and will not be conducted lightly: accordingly if a developer decompiles software then the reasons for decompilation would play a great role, most probably in the developer’s favor.  This then becomes an economic standard for indispensability.  * Hence the usage of reports, and the initial pilot study to confirm data theft – are economically justified and decompilation is indispensable.

Under Article 6(a), the act of decompilation is done by a legitimate user.  Compare this provision to the Ataricase discussed above – where Atari lost on both grounds and fair use exception under US law was not available to it.

Under Article 6(b), necessary interface information must not have been previously been readily available to the developer.  This provision should be interpreted according to the the economic hardship theory – i.e. economically justified and indispensable.

Under Article 6(c), decompilation must be confined to the parts of a program that are necessary to ensure interoperability.   This seems to be a grey area: it is not entirely clear how only a specific part of a program can be decompiled, leaving the rest untouched.  In software, either a program is decompiled or not – there are no mid-level choices available. In addition, software code is not written as a text book that has a page number to start and end with.  Software is written in parts – where one part may invoke another and vice-versa. 

Article 6, paragraph 2 limits the scope of Article 6 – and accordingly limits what may be done with the decompilation.  The limitation is with regard to interoperability : information gained through decompilation may be used only to achieve the interoperability of the independently created program.

Article 5(3) therefore, is very different from Article 6, and has no such restriction.
Article 6, paragraph (2)(c) provides that information obtained through decompilation may not be used for the development production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright. * Here it may be argued that an employee is restricted from decompiling a program created for his employer’s purpose, AND cannot use a decompiled program to create a competing program as that of his employer.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Copyright, decompilation, Fair Use, india, Rajiv, reverse engineering, Software | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • IPAB on Payyannur Ring
    [*S lightly long post] Background: The Intellectual Property Appellate Board (“ IPAB ”), in its recent order in SubhashJewellery v. Payyan...
  • Satyajit Ray's sketches and copyright controversies
    A copyright row appears to have started between the Satyajit Ray Society and the Delhi Art Gallery, that is organising a countrywide exhibit...
  • Ghost Post: Samsung v. Apple Presidential Enforcement Veto
    SpicyIP subscribers recently received a short blurb from Shamnad on this FT article regarding the hypocrisy of stamping 'national inter...
  • Dorling Kindersley v. Sanguine Technical Publishers
    A recent Delhi High Court order passed on 21 January, 2013  with respect to copyright licensing has come to our notice. An analysis of the j...
  • SpicyIP Tidbit: ALCS August Distribution
    In the UK, the Authors' Licensing and Collecting Society is an organization run and owned by writers that collects money due to its mem...
  • Delhi HC rejects the "Hot News" Doctrine: A Summary
    The applicability of the Hot News doctrine was rejected recently in a landmark ruling delivered by Justice Bhat of the Delhi HC. This post i...
  • IP Research Assistant position at IIT, Madras
    Feroz Ali Khader, MHRD IP Chair at the Indian Institute of Technology (IIT) Madras, is looking for research assistants to work on various is...
  • Thalappakatti biryani trademark row
    The southern district of Dindigal in Tamil Nadu occupies a special place in the hearts of biryani lovers. In the late 1950s, one Nagasamy N...
  • SpicyIP Tidbit: GI for Pedana Kalamkari Art Form
    Image from here Recently, as The Hindu reports , Pedana Kalamkari art form received GI protection. Members of Vegetable Dye Hand Block Kalam...
  • Loss of an IP Leader: RIP Prof Daruwalla
    Most in the Indian IP firmament may have heard of the doleful demise of one of our IP leaders, Mr. Tehemtan Nasserwanji Daruwalla. He was an...

Categories

  • 126 (1)
  • 3(d) (4)
  • 3(f) (1)
  • 3(i) (1)
  • 3(k) (2)
  • Academic Writing (1)
  • access (10)
  • access to food (1)
  • access to health (3)
  • AIA (1)
  • AIDS/HIV (3)
  • Antitrust (2)
  • Bajaj v LML (1)
  • Basmati Row (2)
  • Biological Diversity (5)
  • Biologics (2)
  • biopiracy (4)
  • biotech (7)
  • Bollywood (25)
  • Broadcasters Rights (5)
  • Budget (1)
  • business method patent (2)
  • Call for papers (2)
  • Cipla (2)
  • Comparative Advertising (4)
  • Competition law (8)
  • Compulsory Licensing (27)
  • condonation of delay (1)
  • Conference (4)
  • Constitution (12)
  • Contracts (1)
  • Controller's decisions (8)
  • Copyright (112)
  • Copyright Amendment Bill 2010 (23)
  • copyright board (4)
  • Copyright Exceptions (6)
  • copyright office (1)
  • Copyright Rules (2013) (5)
  • Copyright Societies (9)
  • Counterfeiting (1)
  • creativity (1)
  • Cross Retaliation (1)
  • csir (4)
  • d (1)
  • D.U. Photocopy Case (16)
  • Darjeeling Tea (3)
  • Data Exclusivity (2)
  • Database (1)
  • DCGI (2)
  • decompilation (2)
  • defamation (9)
  • Designs (3)
  • Designs Act (3)
  • Differential Pricing (2)
  • Dilution (1)
  • Disabilities (3)
  • Disability (2)
  • DMCA (2)
  • Doha Declaration (1)
  • Domain Names (2)
  • Draft Policy of the Indian Government (2)
  • DRM (1)
  • Drug Regulation (7)
  • education (12)
  • Enercon (1)
  • Enforcement (1)
  • EU (2)
  • ex parte (2)
  • exhaustion (3)
  • Exhaustion of Rights (2)
  • Fair Dealing (8)
  • Fair Use (11)
  • Federal Circuit (1)
  • Fees (3)
  • FICCI (7)
  • FRAND (2)
  • free trade agreement (3)
  • FTA (3)
  • G.I. Registry (4)
  • gene sequences (3)
  • Generic medicine (4)
  • Geographical Indication (14)
  • Gilead (1)
  • Glenmark (5)
  • Gopika (34)
  • Guest post (11)
  • guidelines (1)
  • GWU-CII (1)
  • Herceptin (1)
  • hot news (3)
  • ICANN (1)
  • incremental innovation (1)
  • independence (1)
  • india (5)
  • Indian Government (1)
  • Indian patent litigation (27)
  • Indian Pharma (35)
  • Injunction (10)
  • Innovation (7)
  • INTA (1)
  • Intermediaries (10)
  • internet (11)
  • Internet Access Providers (IAPs) (5)
  • Internet Censorship (7)
  • IP scholarship (3)
  • IP aware (4)
  • IP Course (3)
  • IP Education (1)
  • IP Policy (11)
  • IP update (4)
  • ip writing competition (1)
  • IPAB (34)
  • ipchair (1)
  • IPO (1)
  • IPRS (5)
  • IT Act (1)
  • Journal (2)
  • judicial independence (3)
  • Jurisdiction (1)
  • Kruttika (4)
  • Legal Education (3)
  • Legal Research Tools (1)
  • Legal Scholarship (2)
  • library (2)
  • Licensing (7)
  • Madhulika (20)
  • mathematical methods (1)
  • Media law (3)
  • medical method (1)
  • Merck (4)
  • mhrd ip chair (1)
  • Microsoft (3)
  • Middle Path (1)
  • Moral Rights (2)
  • Movies (18)
  • musical work (2)
  • nanotechnology (1)
  • Natco (3)
  • natco defamation suit (5)
  • natco vs bayer (4)
  • need for transparency (1)
  • Novartis (8)
  • Novartis patent case in India (11)
  • NPEs (2)
  • nujs (1)
  • NUJS Conference (2)
  • Obituary (1)
  • obviousness (7)
  • Off-Topic (2)
  • online course (4)
  • Open Access (6)
  • Open Source (2)
  • Opposition (3)
  • Parallel Imports (4)
  • Parliament (1)
  • passing off (5)
  • Patent (52)
  • Patent act (10)
  • patent agent (5)
  • patent agent exam (9)
  • patent agent exam qualifications (3)
  • patent infringement (5)
  • Patent Licensing (2)
  • Patent litigation (2)
  • Patent Office (19)
  • patent pool (3)
  • Patent Prosecution (7)
  • Patent rules (2)
  • Patent Strategies (8)
  • Patents (9)
  • pegasus (1)
  • Personality Rights (1)
  • Pfizer (1)
  • Pharma (18)
  • Piracy (5)
  • plagiarism (3)
  • Plant Variety Protection (2)
  • post grant (1)
  • Prashant (2)
  • Preventive Detention (1)
  • Price Control (6)
  • prior publication (1)
  • Privacy (3)
  • Prizes (1)
  • public health (3)
  • Public Interest (4)
  • Publicity Rights (4)
  • Publishing (3)
  • radio (2)
  • Rajiv (18)
  • Rectification Petition (2)
  • Rejection (1)
  • research (3)
  • reverse engineering (2)
  • revocation (4)
  • rip (1)
  • Roche (2)
  • Roche vs Cipla (1)
  • Royalty (2)
  • RTI (2)
  • Scholarship (4)
  • section 16 (1)
  • Section 3(d) (7)
  • section 8 (6)
  • shamnad (11)
  • Shan Kohli (4)
  • Shouvik Kumar Guha (30)
  • Smartphones/Tablets (2)
  • Social Innovation (1)
  • Software (10)
  • software enforcement (3)
  • software patent (3)
  • Special 301 Report (1)
  • Spicy Tidbits (6)
  • spicyip (1)
  • SpicyIP Accolades (1)
  • SpicyIP Announcements (9)
  • SpicyIP Case (1)
  • SpicyIP Cases (3)
  • spicyip commiseration (1)
  • SpicyIP Events (11)
  • SpicyIP Fellowship (5)
  • SpicyIP Guest Series (22)
  • SpicyIP Interview (2)
  • SpicyIP Jobs (4)
  • SpicyIP Jobs/General (2)
  • SpicyIP Review (1)
  • SpicyIP Tidbits (11)
  • SpicyIP Weekly Review (27)
  • Statutory Licensing (1)
  • STI Policy 2013 (4)
  • Sugen (3)
  • Supreme Court of India (5)
  • Swaraj (19)
  • Tarnishment (1)
  • Technology (6)
  • Technology Transfer (5)
  • TKDL (5)
  • TPP (1)
  • trade (4)
  • Trade Secret Protection (1)
  • Trademark (59)
  • Trademark dilution (1)
  • Trademark Registry (9)
  • Traditional Knowledge (7)
  • Transparency (5)
  • treaty (1)
  • trial (1)
  • tribunals (2)
  • TRIPS (11)
  • UK (3)
  • unfair competition (5)
  • UNFCCC (1)
  • Universities Research and Innovation Bill (2)
  • US (1)
  • US Patent Reform (1)
  • US Supreme Court (3)
  • viva (3)
  • WIPO (5)
  • Working a Patent (2)
  • Workshop (4)
  • writ (1)
  • WTO (1)

Blog Archive

  • ▼  2013 (364)
    • ►  September (13)
    • ►  August (41)
    • ►  July (36)
    • ►  June (36)
    • ►  May (32)
    • ►  April (51)
    • ►  March (66)
    • ►  February (40)
    • ▼  January (49)
      • The ‘Emcure model’ of Foreign Investment and Joint...
      • Patent Office makes public the feedback to the Dra...
      • SpicyIP Announcement: Brainstorming Session on Tra...
      • Locus standi and public interest under the GI Act ...
      • Spicy IP Weekly Review: January Weeks 2-3
      • Pirates of the Carribean: Retaliating Against IP
      • Delhi High Court clarifies the notification re pat...
      • Two years of continuing disappointment with the Ma...
      • Announcing the SpicyIP Fellows for 2013 - 2014!
      • Guest Post: Looking at IPR Policy in Climate chang...
      • Part I: Is decompilation of software legal under t...
      • Part II: Is decompilation of software legal under ...
      • Correction: Meerut scissors GI still in applicatio...
      • Guest Post: Graphene - Indian Patent filings disma...
      • Patent Ambush: Big Pharma vs Generics
      • Guest Post: For whom is the Indian IPR Regime?
      • Guest Post: More GI news as Meerut Scissors grante...
      • Guest Post: Taking a look at Online Piracy in India
      • Guest Post: Madurai Malli is granted GI status
      • SpicyIP Events: Workshop on Tools for Researching ...
      • INTA announces Annual Calendar of Events - 2013
      • Guest Post: Why are Business Method Patents being ...
      • Guest Post: Bare Licensing in India
      • Guest post: LAVA aims for 100 Mobile App Patents
      • SpicyIP Events: Patracode announces Workshop on To...
      • Samsung at the Supreme Court: Nationalising Exhaus...
      • Analysing Science, Technology and Innovation Polic...
      • Guest Post: Copyright in Social media - AFP v. Dan...
      • Open Access: What is it about?
      • The political economy of the current round of comp...
      • Guest Post: Examining the recently announced Compu...
      • The S(war)tz Legacy and "Open" Lessons for India
      • SpicyIP Events: Patracode announces Workshop on To...
      • Mark Lynas, former anti-GM food activist embraces ...
      • Rebutting ad hominem Twitter attacks
      • IP ideologies and the Swartz suicide
      • Aaron Swartz, RIP
      • Evading the mandatory royalty sharing provisions o...
      • DIPP to issue CLs for Herceptin, Dastinib & Ixabep...
      • SpicyIP Fellowship reminder
      • Introducing Science, Technology and Innovation Pol...
      • The Royalty Payment Siphon by MNCs - Independent D...
      • Introducing Science, Technology and Innovation pol...
      • SpicyIP Weekly Review: January (2013) Week 1
      • Incentives through Recognition? Nobel Assembly sue...
      • Guest Post: Plain Packaging Laws for Tobacco Products
      • Guest Post: Colours as Non-conventional Trademarks
      • FICCI announces online certificate course on Compe...
      • Guest Post: The Unfair Competition Act, 2011 and i...
  • ►  2012 (131)
    • ►  December (29)
    • ►  November (42)
    • ►  October (50)
    • ►  September (10)
Powered by Blogger.