Munich Intellectual Property Law Center (MIPLC) Master Thesis (2011/12)
Munich Intellectual Property Law Center (MIPLC) Master Thesis (2011/12)
Munich Intellectual Property Law Center (MIPLC) Master Thesis (2011/12)
Yuko, Matsuya
MIPLC Class of 2012
Suggested Citation:
Matsuya, Yuko;
Legal Protection of Software
- Copyright, Patent and Open Source -
Challenges for Business in a Mixed Environment
MIPLC Master Thesis (2011/12)
http://www.miplc.de/research/
Available at SSRN: http://ssrn.com/abstract=2244216
Electronic
Electroniccopy
copyavailable
availableat:
at:https://ssrn.com/abstract=2244216
http://ssrn.com/abstract=2244216
II
Table of Contents
Electronic
Electroniccopy
copyavailable
availableat:
at:https://ssrn.com/abstract=2244216
http://ssrn.com/abstract=2244216
III
Abstract
This thesis aims to provide clues on how software developers could use and
distribute proprietary software and open source software to run their
business smoothly.
In this thesis, first, legal basis for software protection available in the
European Union (EU), the United States (US) and Japan will be described.
Next, the history and characteristics as well as legal issues of open source
licenses will be discussed. Further considerations will cover possible legal
problems arise around proprietary software and OSS business models.
Based on these discussions, possible best practices will be suggested for
software developers to protect their software.
I. Introduction
Copyright and patent provide legal protection for software. Rightholders for
proprietary software protected by copyright and/or patent enjoy exclusive
rights for the use of their software thereby securing profits in their
businesses. On the other hand, open source licenses offer another
mechanism for software use and development. Open source licenses use the
copyright to ensure the freedom of the use, modification and redistribution
of software for the recipients of the software.1 Software licensed under an
open source license is called open source software (OSS). Some in the open
source community are against the idea of proprietary software, especially
software patents.2 For proprietary software developers, handling of OSS can
seem troublesome and some proprietary developers in the past even adopted
"'Just Say No' policies" against OSS.3 Nevertheless, the speed of technology
advancement in the software industries and the growing popularity of OSS
make it unrealistic for proprietary developers to simply bypass the open
source community.4
What would be the legal issues in software business when OSS and
proprietary software coexist? How could OSS developers make profit when
they give the users freedom to use and redistribute their software? How
could software developers use OSS without undermining the value of their
proprietary software? This thesis aims to provide clues on how software
developers could use and distribute proprietary software and OSS to run
their business smoothly.
In this thesis, legal basis for software protection available in the European
Union (EU), the United States (US) and Japan will be described first in
Chapter II. In Chapter III, the history and characteristics as well as legal
1
See infra Parts III.A-B.
2
See, e.g., infra Parts III.A, III.C.1.
3
Karen Faulds Copenhaver, Managing Compliance with Open Source Software Licenses
Compliance programs for open source software aren't about fear--they're about building a
better business, 54 No. 3 PRAC. LAW. 21, 22 (2008).
4
See, e.g., Id. at 21-22.
The EU, the US and Japan all provide possibility to protect software under
copyright law and, to some extent, under patent law.
A. Copyright
Being members of the World Trade Organization, the EU, the US and Japan
protect computer programs as literary works under the Berne Convention5
according to Article 10(1) of TRIPS.6 WIPO Copyright Treaty (WCT)7 also
sets forth that computer programs are protected as literary works within the
meaning of the Berne Convention.8 As stipulated in Article 5(2) of the Berne
Convention, a computer program may enjoy copyright protection without
any formality in any of the three jurisdictions discussed here.
1. EU
5
Berne Convention for the Protection of Literary and Artistic Works, Paris Act on July 24,
1971, as amended on September 28, 1979 (Berne Convention).
6
Article 10(1) of the Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS) ("Computer programs, whether in source or object code, shall be protected as
literary works under the Berne Convention (1971).").
7
WIPO Copyright Treaty adopted in Geneva on December 20, 1996 (WCT). The EU, the US
and Japan are contracting parties of the WCT.
8
Article 4 of WCT.
9
The substantive parts of recitals and articles of the Directive 2009/24/EC are kept intact
from those of the Council Directive 91/250/EEC except for minor changes in numberings
of paragraphs in Articles 2 and 4. As such, discussions of cases in the time of the Council
Directive 91/250/EEC also apply to the current Directive 2009/24/EC.
a) Scope of protection
10
See Recital 7 of the Directive; CONCISE EUROPEAN COPYRIGHT LAW 216 (Thomas Dreier
& P. Bernt Hugenholtz eds., 2006).
11
A form of computer programs written in a human readable programming language such
as JAVA, C or C++.
12
Another form of computer programs written in a machine readable code: a sequence of
"0" and "1". A source code has to be translated (compiled) into an object code in order for
a computer to execute the program.
13
CONCISE EUROPEAN COPYRIGHT LAW, supra note 10, at 216.
14
Article 1(3) of the Directive.
15
CONCISE EUROPEAN COPYRIGHT LAW, supra note 10, at 217.
16
Article 1(2) of the Directive.
17
CJEU, Case C-393/09, Bezpečnostní softwarová asociace – Svaz softwarové ochrany v.
Ministerstvo kultury (2010).
program.18 Another decision by the CJEU for Case C-406/1019 found that
the functionality of computer programs may not be considered as the
expressions of a computer program, thus is outside the scope of copyright
protection under the Directive.20
b) Exclusive rights
The reproduction right set forth in Article 4(1)(a) of the Directive can cover
any copying that may occur during the processing of a computer program on
a computer.22 For example, when running a computer program, the program
must be copied from an external storage device (e.g. hard disk) to a
temporary memory (e.g. RAM (random access memory)) of the computer.
Further, communication of a computer program through a network (e.g. the
Internet) is also impossible without copying the program.
18
Case C-393/09 para. 59 (note, however, that the CJEU left a room for copyright
protection for a graphic user interface in case the graphic user interface is "its author's own
intellectual creation.")
19
CJEU, Case C-406/10, SAS Institute Inc. v. World Programming Ltd (2012).
20
Case C-406/10 para. 35-39.
21
Article 4(1) of the Directive
22
Article 4(1)(a) of the Directive. For more detailed explanation, see CONCISE EUROPEAN
COPYRIGHT LAW, supra note 10, at 220-222.
23
CONCISE EUROPEAN COPYRIGHT LAW, supra note 10, at 222.
d) Exhaustion
24
CONCISE EUROPEAN COPYRIGHT LAW, supra note 10, at 223.
25
Infra Part II.A.1.(d). But see Id (states an interpretation that electronic distribution
would not be covered by the distribution right).
26
Article 5(1) of the Directive.
27
Article 5(2) of the Directive.
28
Article 5(3) of the Directive.
29
Article 6 of the Directive.
with his consent."30 The exhaustion occurs only when a computer program
is "sold" but does not occur when a computer program is merely
"licensed." 31 In case of a sale of a tangible medium storing a computer
program, it is clear that the computer program is "sold" and the distribution
right exhausts. 32 Nowadays, however, provision of computer programs is
often made electronically through the Internet. A user can, in return for a
payment, download a computer program on his/her computer from a website
of the developer and, by agreeing to the license terms, can start using the
program.33 This type of provision of a computer program may be considered
as a "license" rather than a "sale" but the distinction is not always clear.
30
Article 4(2) of the Directive. See also CONCISE EUROPEAN COPYRIGHT LAW, supra note
10, at 224-25.
31
Thomas Dreier, The Council Directive of 14 May 1991 on the Legal Protection of
Computer Programs, 13(9) E.I.P.R. 319, 321-22 (1990)
32
Id. at 322.
33
See infra Part IV.A.
34
C-128/11, UsedSoft GmbH v. Oracle International Corp. (2012).
35
Id. at para. 49.
36
Id.
37
Id. at para. 61.
question."38
2. US
a) Scope of protection
38
Id. at para. 55.
39
Copyright Act of 1976, 17 U.S.C. §§ 101-1332 (2011).
40
PL 96–517, DECEMBER 12, 1980, 94 Stat 3015 Sec. 10.
41
17 U.S.C §102 (a)
42
MARSHALL A. LEAFFER, UNDERSTANDING COPYRIGHT LAW 56, 57 (5th ed. 2010).
43
17 U.S.C. §102 (b) (prohibits copyright protection to extend to "any idea, procedure,
process, system, method of operation, concept, principle, or discovery").
44
Apple Computer, Inc. v. Franklin Computer Corp. 714 F.2d 1240, 1246-1249 (3d Cir.
1983); See also Deborah F. Buckman, Copyright Protection of Computer Programs, 180
A.L.R. FED. 1 §5[a], 5[b] (2002).
45
Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992)
three steps as its name suggests: abstraction, filtration and comparison. The
abstraction step involves dissecting the structure of the computer program at
issue and isolating each level of abstraction. 46 In the filtration step, the
structural components at each level of abstraction are examined and the
elements (a) dictated by efficiency, (b) dictated by external factors and (c)
taken from the public domain are filtered out. 47 What is left after the
filtration step would be a protectable expression.48 The comparison step is
made in order to determine infringement. The results of the filtration step
for programs of the rightholder and of the alleged infringer are compared to
determine the similarities of those programs.49
b) Exclusive rights
46
Id. at 707.
47
Id. at 707-10.
48
Id. at 710.
49
Id. at 710-11.
50
17 U.S.C. §106(1).
51
17 U.S.C. §101 (defines the term "copies" as "material objects . . . in which a work is
fixed . . .").
52
MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9th Cir. 1993).
53
17 U.S.C. §106(2).
The right of distribution enables the copyright owner to exclude others from
distributing "copies . . . of the copyrighted work to the public by sale or
other transfer of ownership, or by rental, lease, or lending." 54 The
distribution right may cover both electronic and non-electronic distribution
of computer programs.55
The fair use doctrine56 provides general limitations of exclusive rights under
the US Copyright Act. 17 U.S.C. §107 prescribes the factors to consider
when determining whether an act qualifies as a fair use.
54
17 U.S.C. §106(3).
55
LEAFFER, supra note 42, at 326-27.
56
17 U.S.C. §107.
57
17 U.S.C. §117(a)(1).
58
17 U.S.C. §117(a)(2) (The owner of the copy of the program must, however, destroy the
all archival copies in case he/she ceases to be the owner of the copy of the program).
59
17 U.S.C. §117(c). This limitation was introduced in 1998 in response to the decision of
MAI, 991 F.2d where a maintenance service company was held liable for copyright
infringement by copying a copyrighted program onto a RAM of a computer during the
maintenance operation. See LEAFFER, supra note 42, at 322-24.
The first sale doctrine set forth in 17 U.S.C. §109 serves as a limitation of
the distribution right. The owner of a particular, lawfully made copy of a
computer program, or any person authorised by such owner is allowed to
sell or otherwise dispose of the possession of that copy without the authority
of the copyright owner. 60 The first sale doctrine corresponds to the
exhaustion in the EU.
The first sale doctrine only applies to a sale and not to a lease of a
copyrighted work. 61 In order to avoid the first sale doctrine, software
developers often choose to "license" rather than to "sell" their programs.62
Since the first sale doctrine enables redistribution only by the "owner" of a
copy of a copyrighted work,63 the key issue for the application of the first
sale doctrine is the ownership of a copy of a computer program. While a
"sale" of a computer program transfers the ownership of a copy of the
program to the recipient of the copy, a "license" keeps such ownership to the
distributor.
60
17 U.S.C. §109(a).
61
17 U.S.C. §109(d).
62
Christian H. Nadan, Software Licensing in the 21st Century: Are Software "Licenses"
Really Sales, and How Will the Software Industry Respond?, 32 AIPLA Q. J. 555, 559-60,
567 (2004)
63
17 U.S.C. §109(a).
64
See, e.g., MAI, 991 F.2d, at 518 n.5; Nadan, supra note 62, at 590-91; Brian W. Carver,
Why License Agreements Do Not Control Copy Ownership: First Sales and Essential
Copies, 25 BERKELEY TECH. L.J. 1887, 1899-1904 (2010).
65
Adobe Systems Inc. v. One Stop Micro, Inc., 84 F.Supp.2d 1086 (N.D.Cal. 2000) and
Adobe Systems Inc. v. Stargate Software Inc., 216 F.Supp.2d 1051 (N.D.Cal. 2002)
considered the distribution of the software by Adobe as a license by identifying languages
in the distribution agreement that indicated Adobe's intention to "license" the software and
to restrict redistribution. In contrast, SoftMan Products Company, LLC, v. Adobe Systems
Inc., 171 F.Supp.2d 1075 (C.D.Cal. 2001) focused more on "the economic realities of the
3. Japan
exchange" than the languages of the distribution agreement and concluded that a
transaction is a sale if the transaction "involves a single payment giving the buyer an
unlimited period in which it has a right to possession."
66
Vernor v. Autodesk, Inc., 621 F.3d 1102 (9th Cir. 2010).
67
Id. at 1111.
68
See MDY Industries, LLC v. Blizzard Entertainment, Inc., 629 F.3d 928 (9th Cir. 2010);
UMG Recordings, Inc. v. Augusto, 628 F.3d 1175 (9th Cir. 2011).
69
See generally Aaron Perzanowski & Jason Schultz, Digital Exhaustion, 58 UCLA L. REV. 889
(2011).
70
THE UNITED STATES COPYRIGHT OFFICE, EXECUTIVE SUMMARY DIGITAL MILLENNIUM COPYRIGHT ACT
§104 STUDY, III B.1. A. (August 2001), available at
http://www.copyright.gov/reports/studies/dmca/dmca_executive.html (accessed 4
August 2012) ("The tangible nature of a copy is a defining element of the first sale doctrine
and critical to its rationale").
71
CHOSAKUKENHŌ [Copyright Act (of Japan)], Act No. 48 of 6 May 1970, English
translation is available at http://www.japaneselawtranslation.go.jp/?re=02 (accessed 2
August 2012).
72
NOBUHIRO NAKAYAMA, CHOSAKUKENHŌ [Copyright Law] 96 (2007) [中山信弘, 著作権法
(2007)].
a) Scope of protection
b) Exclusive rights
Article 17(1) JCA confers moral rights and copyrights to an author. The
moral rights include the right to make the work public, 76 the right to
determine the indication of the author's name 77 and the right to maintain
73
Article 2(1)(i) JCA.
74
KATO MORIYUKI, CHOSAKUKENHŌ CHIKUJŌ KŌGI [COPYRIGHT LAW CLAUSE-BY-
CLAUSE LECTURE] 120 (new 3rd ed. 2000) [加戸守行, 著作権法逐条講義, (三訂新版
2000)].
75
Articles 2(1)(i) and (x)-2 JCA.
76
Article 18(1) JCA.
77
Article 19(1) JCA.
integrity.78 The moral rights are regarded as the author's personal rights and
as exclusive to the author thus cannot be transferred.79 Among these moral
rights, the integrity right may be of the most relevance for a computer
program work because computer programs are subject to changes for
debugging and upgrades. As discussed later, the JCA provides exception for
integrity rights in certain cases of alterations of computer programs.
The copyrights are the economic aspect of the rights of the author. A
copyright is transferable in whole or in part.80 The JCA lists different types
of copyrights from Article 21 to 28. Among these, the most relevant for
computer programs are the right of reproduction, 81 the right of public
transmission, 82 the right of ownership transfer, 83 the right of translation,
adaptation, etc.84 and the right of the original author in the exploitation of a
derivative work.85
78
Article 20(1) JCA.
79
Article 59 JCA.
80
Article 61(1) JCA.
81
Article 21 JCA.
82
Article 23 JCA.
83
This right may be considered as a form of a "distribution right" in the EU and the US. The
JCA distinguishes the "distribution right" for cinematographic work (which basically does
not exhaust by first sale) and that for other works (which can exhaust). The term
"distribution right" in the JCA is used only for cinematographic works and for other works
the term "the right of ownership transfer" is used. See Articles 26 and 26-2 JCA.
84
Article 27 JCA.
85
Article 28 JCA.
86
Article 2(1)(xv) JCA provides the definition of the term "reproduction."
87
NAKAYAMA, supra note 72, at 211.
88
Id.
89
FUMIO SAKKA, SHŌKAI CHOSAKUKENHŌ [DISCUSSION COPYRIGHT LAW] 270 (4th ed.
2010) [作花文雄, 詳解 著作権法, (第4版 2010)].
90
Id. at 279.
91
Article 26-2(1) JCA.
92
SAKKA, supra note 89, at 279.
93
Article 27 JCA.
94
SAKKA, supra note 89, at 286.
95
Article 28 JCA. See also SAKKA, supra note 89, at 288-89.
96
SAKKA, supra note 89, at 244-45.
Articles 47-3, 47-4 and 47-8 JCA. Article 47-3(1) allows reproductions or
alterations by a lawful owner of a copy of a computer program work "if and
to the extent deemed necessary for" the owner's own use of the work. This
exception enables the owner of the copy to make back-up copies of the
program and alter the program for achieving compatibility with certain
hardware. 97 Such reproductions should not be preserved, however, if the
owner ceases to be the lawful owner of the copy.98
d) Exhaustion
97
Id. at 390.
98
Article 47-3(2) JCA.
99
SAKKA, supra note 89, at 391-92.
100
Article 26-2(2) JCA.
B. Patent
Unlike copyright law, there is no international legal basis shared across the
globe regarding patent protection for software. Big discussions have been
101
KATO, supra note 74 at 192.
102
See, e.g., Daniel J.M. Attridge, Challenging claims! Patenting computer programs in
Europe and the USA, 2001(1) I.P.Q. 22, 25 (2001).
103
Id.
made in the EU, the US and Japan whether or not to allow software patents
and to what extent if allowed.104 Although it is possible at the moment to
obtain patent protection for software in the three jurisdictions focused here,
the scope of allowability and protection varies by jurisdiction.
Patent laws in the EU, the US and Japan all require, for an invention to be
patented, that the invention is patent eligible subject matter, industrially
applicable, novel and involves inventive step (or non-obviousness in the US
term). The variety in the attitude toward software patents in different
jurisdictions can be seen most in the evaluation of the patent requirements.
Thus in this section, issues of patent requirements for software related
inventions in the three jurisdictions will be described.
104
For discussions in the US and the EU, see, e.g., MIKKO VÄLIMÄKI, THE RISE OF OPEN
SOURCE LICENSING 82-86, 94-101 (2005). For discussions in Japan, see, e.g., SAKKA, supra
note 89, at 726-29.
105
The general procedure is as follows: filing of a patent application including patent
claims and specification, examination by the Patent Office, rejection or grant of patent for
the application. See, e.g., European Patent Office (EPO), How to apply for a European
patent, at http://www.epo.org/applying/basics.html?hp=stagea (accessed 1 August 2012);
United States Patent and Trademark Office (USPTO), Process for Obtaining a Utility Patent,
at http://www.uspto.gov/patents/process/index.jsp (accessed 1 August 2012); Japan
Patent Office (JPO), Procedures for Obtaining a Patent Right, at
http://www.jpo.go.jp/cgi/linke.cgi?url=/tetuzuki_e/t_gaiyo_e/pa_right.htm (accessed 1
August 2012).
106
See Article 28 of TRIPS (at least the acts listed in this Article constitute patent
infringement in the EU, the US and Japan).
1. EU
a) Statutory basis
Article 52(1) EPC states that "European patents shall be granted for any
inventions, in all fields of technology, provided that they are new, involve an
inventive step and are susceptible of industrial application."
The EPC does not define the term "invention" but stipulates what is
excluded from the patentable "invention" in Articles 52(2) and 52(3) EPC.
Articles 52(2)(c) and 52(3) EPC exclude programs for computers "as such"
from patentable subject matter.
b) Technicality issue
107
Convention on the Grant of European Patents (EPC) of 5 October 1973 as revised by the
Act revising Article 63 EPC of 17 December 1991 and the Act revising the EPC of 29
November 2000.
108
Consists of 38 Member States that are contracting states of the EPC. See EPO, Member
states of the European Patent Organisation, at http://www.epo.org/about-
us/organisation/member-states.html (accessed 1 August 2012).
109
Guidelines for Examination in the European Patent Office G-II 3.6 (status: 20 June 2012)
[hereinafter "EPO Guidelines"] available at http://www.epo.org/law-practice/legal-
texts/html/guidelines/e/g_ii_3_6.htm (accessed 2 August 2012).
110
Id. at G-II 1 (states that "an 'invention' within the meaning of Art. 52(1) must be of both
a concrete and a technical character."). See also T 1173/97, Computer program
product/IBM, 1999 OJ EPO 609, point 5.1 (1998); G 03/08, Programs for computers
(2010).
111
EPO Guidelines, supra note 109, at G-II 3.6. See also T 1173/97 at point 5.3.
112
T 1173/97 at point 6, 9.
113
Id. at point 6.2, 6.3.
114
Id. at point 8.
115
T 258/03, Auction method/HITACHI, 2004 OJ EPO 575 (2004) (ruled that "a method
involving technical means" has a technical character).
116
T 424/03, Clipboard formats I/MICROSOFT (2006) (found that "a method
implemented in a computer system" and "a computer-readable medium" to have a
technical character).
117
G 03/08, Programs for computers (2010).
under Articles 52(2)(c) and 52(3) EPC and thus makes the claim patent
eligible within the meaning of Article 52(1) EPC.118 The claim category and
prior arts are not considered in assessing the technical character. 119 A
claimed invention with a mixture of technical and non-technical features
may still be considered as patentable subject matter if the invention has a
technical character. 120
118
EPO Guidelines, supra note 109, at G-II 3.6 ("the mere inclusion of a computer, a
computer network, a readable medium carrying a program, etc. in a claim lends technical
character to the claimed subject-matter.").
119
Id. ("The examiner should disregard the claim category and concentrate on its content
in order to determine whether the claimed subject-matter, considered as a whole, has a
technical character." "Technical character should be assessed without regard to the prior
art (see T 1173/97, confirmed by G 3/08).")
120
T 641/00, Two identities/COMVIK, 2003 OJ EPO 352 (2002).
121
EPO Guidelines, supra note 109, at G-VII 5-4.
122
T 258/03, at point 5.7.
123
T 641/00, at point 4.
124
Id. at point 6.
125
Article 54 EPC.
2. US
The US has been the most generous jurisdiction for software patents among
the EU, the US and Japan. Patent law of the US has its root in the
Constitution of the US,127 which indicates that the US as a nation places
high value on inventive activities.
a) Statutory basis
Statutory invention under the US Patent Act 128 should be "any new and
useful process, machine, manufacture, or composition of matter, or any new
and useful improvement thereof."129 As this language of the statute does not
tell much about patentability of software-related inventions, substantial
evaluations have been made by the courts.
126
Article 57 EPC.
127
U.S. CONST. art. I, § 8, cl. 8.
128
The United States Patent Act, 35 U.S.C. §§ 1-318 (2007).
129
35 U.S.C. §101.
130
Gottschalk v. Benson, 409 U.S. 63 (1972).
131
Parker v. Flook, 437 U.S. 584 (1978).
132
Benson, 409 U.S., at 71-72; Flook, 437 U.S., at 590.
After Diehr, the US courts moved toward looser requirements for software
patents139 and in 1998, the Federal Circuit decided on State Street Bank &
Trust Co. v. Signature Financial Group, Inc140 in which the Federal Circuit
ruled that an invention is patent eligible if the invention produces "a useful,
concrete and tangible result." 141 This standard does not even require a
recitation to a machine in the claim for the claimed invention to be patent
eligible. The State Street Bank decision opened the way to generous granting
of software-related patents by the USPTO. 142 Until the Federal Circuit
decided on In re Bilski143 in 2008, almost no limits were posed on software
133
Benson, 409 U.S., at 71.
134
Diamond v. Diehr, 450 U.S. 175 (1981).
135
Id. at 185.
136
Id. at 184. See also supra note 133 and accompanying text.
137
Diehr, 450 U.S., at 187.
138
Id. at 185.
139
For discussions on the case law development after Diehr until 1998, see Julie E. Cohen
& Mark A. Lemley, Patent Scope and Innovation in the Software Industry, 89 CAL. L. REV. 1,
9-11 (2001).
140
State Street Bank & Trust Co. v. Signature Financial Group, Inc, 149 F.3d 1368 (Fed. Cir.
1998).
141
Id. at 1373.
142
Cohen & Lemley, supra note 139, at 11-13.
143
In re Bilski, 545 F.3d 943 (Fed. Cir. 2008)
The Supreme Court decision of Bilski gives little guidance for the practical
question on what should be deemed a patent eligible invention. After all, "no
one understands what makes an idea 'abstract,' and hence ineligible for
patent protection."150 Relying on the comment by the Supreme Court that
the machine-or-transformation test being "a useful and important clue" for
the determination of patent eligibility, the US practitioners including
USPTO Examiners continue to use the machine-or-transformation test.151
144
Mark A. Lemley, Michael Risch, Ted Sichelman & R. Polk Wagner, Life After Bilski, 63
STAN. L. REV. 1315, 1318 (2011) ("For a decade after 1998, patentable subject matter was
effectively a dead letter.").
145
In re Bilski, 545 F.3d, at 959-60.
146
In re Bilski, 545 F.3d, at 959-61.
147
In re Bilski, 545 F.3d, at 954.
148
Bilski v. Kappos, 130 S.Ct. 3218, 3229-30 (2010).
149
Id. at 3227.
150
Lemley, Risch, Sichelman & Wagner, supra note 144, at 1316.
151
Id. See also USPTO, Interim Guidance for Determining Subject Matter Eligibility for
Process Claims in View of Bilski v. Kappos, 75 Fed. Reg. 43922, 43925 (July 27, 2010)
(The guidance for the USPTO Examiners clearly relies on the machine-or-transformation
test).
3. Japan
While the EU and the US take very different approaches for the patentability
of software-related inventions, Japan takes yet another approach which will
be described in this section.
a) Statutory basis
under Article 2(1) JPA as well as meet the requirements set forth in Article
29 JPA.
b) Statutory "invention"
elements such as CPU and memory in a claim is not enough for the claimed
invention to be deemed statutory. 166 The claim should recite "how" the
hardware elements are used in the processing instructed by the software. In
practice, the claim language should clearly specify (i) which hardware
element performs what processing, (ii) what are the input and output of each
processing and (iii) the content of each processing.
Recent cases decided by the Intellectual Property High Court show that an
invention involving a non-patentable element such as human mental
activities may be deemed statutory if the invention "as a whole" provides a
technical means by utilising the laws of nature.167
The assessment of novelty 168 and inventive step 169 for software related
invention in Japan is not different from that for other types of invention. No
distinction is made between technical and non-technical features in a
claimed invention when assessing inventive step as it is in the practice at the
EPO.
166
E.g., Chitekizaisan Kōtō Saibansho [IP High Ct.] 29 February 2008, Hei 19 (ke) No.
10239 (denied patent eligibility on a method for generating shortened representation of a
bit string even though the claim recited arithmetic device, finding that the method is just a
mathematical algorithm which does not utilise the laws of nature).
167
Chitekizaisan Kōtō Saibansho [IP High Ct.] 24 June 2007, Hei 19 (ke) No. 10369 (ruled
that, even when an invention includes human mental activities, if the essence of the
invention as a whole provides a technical means to assist or substitute the mental activities,
the invention should not be excluded from statutory inventions); Chitekizaisan Kōtō
Saibansho [IP High Ct.] 31 October 2007, Hei 19 (ke) No. 10056 (found a method for using
a medical bag with a cutting line to be a statutory invention); Chitekizaisan Kōtō Saibansho
[IP High Ct.] 26 August 2008, Hei 20 (ke) No. 10001 (stated that if, when considering the
contents of a claimed invention as a whole, an invention involves a creation of a technical
idea utilising the laws of nature as its main technical means to solve a certain problem, then
the invention should be deemed statutory); See also NAKAYAMA, supra note 161, at 100-01.
168
Article 29(1)(i)-(iii) JPA.
169
Article 29(2) JPA.
The idea of open source originates from the free software movement started
by Richard Stallman in 1983 as the start of the GNU Project. 170 When
Stallman worked at the Artificial Intelligence Laboratory of the
Massachusetts Institute of Technology in 1970s, it was common practice for
computer programmers to share source codes and develop software in a
171
collaborative manner. By the 1980s, however, most software was
172
copyrighted, which motivated Stallman to start the free software
movement in order to secure the free, cooperative style of software
development. Stallman left the MIT in 1984 and started working on the
GNU Project, a development project of UNIX compatible, free operating
system which he named "GNU."173 The term GNU is a "recursive acronym"
for "GNU's Not Unix."174 The Free Software Foundation (FSF) was founded
in 1985 to support the development of the GNU Project.175
Free software means that "the users have the freedom to run, copy, distribute,
study, change and improve the software" according to the definition by the
FSF.176 The FSF considers a computer program to be "free software" if the
users of the program have the freedom to: (i) run the program, for any
purpose (freedom 0), (ii) study how the program works, and change it so it
does what the user wishes (freedom 1), (iii) redistribute copies (freedom 2)
and (iv) distribute copies of the users' modified versions to others (freedom
170
Richard Stallman, The GNU Project, at http://www.gnu.org/gnu/thegnuproject.html
(accessed 4 August 2012); FSF, Overview of the GNU System, at
http://www.gnu.org/gnu/gnu-history.html (accessed 4 August 2012).
171
Id.
172
Note that the US Copyright Act reform to include protection of computer programs was
in 1980. See supra note 40 and accompanying text.
173
FSF, supra, note 170. See also, Linux.org, What is Linux, at
http://www.linux.org/article/view/what-is-linux (accessed 10 August 2012).
174
FSF, supra, note 170.
175
Id.
176
FSF, The Free Software Definition, at http://www.gnu.org/philosophy/free-sw.html
(accessed 4 August 2012).
3).177 The term "free" refers to the "freedom" instead of "free of charge."178
For implementing the philosophy of the free software, the FSF has created
the GNU General Public License (GPL) which secures the above four
freedoms for the users of the programs and modifications thereof.179
Although the FSF has repeatedly emphasised that the term "free" of the
"free software" refers to "freedom" and not to price,184 it is difficult, if not
impossible, to completely avoid misunderstanding the term. Moreover, the
strong philosophy of the FSF that all source codes should be "free" can
make businesses involving proprietary software to stay away from the free
software. Eric Raymond, one of the founders of the Open Source Initiative
(OSI), and his collaborators aimed to "dump the moralizing and
confrontational attitude that had been associated with 'free software' in the
past and sell the idea strictly on the same pragmatic, business-case grounds"
177
Id.
178
Id. (stating that free software is a "matter of liberty, not price.").
179
See, infra Chapter III.C.1.
180
Linux.org, supra note 173. See also, Eric Raymond, The Cathedral and the Bazaar (1997),
at http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/index.html
(accessed 10 August 2012).
181
Kernel is a basic component of an operating system that manages interactions between
hardware (such as CPU and memory) and software. See also Linux.org, supra note 173.
182
Id. See also, FSF, supra, note 170.
183
Id.
184
FSF, supra note 176.
and invented a new term "open source" in 1997.185 The OSI was founded in
1998 to promote the new "open source" activities.186
The substantial idea of "free" promoted by the FSF and that of "open
source" promoted by the OSI are almost the same. 187 The OSI, however,
takes more a generous stance to the needs of proprietary software
developers.
In this thesis, the term "open source" refers to both "free" defined by the
FSF and "open source" defined by the OSI, unless otherwise specified.
1. Free Redistribution
The license shall not restrict any party from selling or giving away
the software as a component of an aggregate software distribution
185
Open Source Initiative, History of OSI, at http://opensource.org/history/ (accessed 4
August 2012).
186
Id.
187
FSF, Categories of free and non-free software, at
http://www.gnu.org/philosophy/categories.en.html (Acessed 4 August 2012). ("[N]early
all free software is open source, and nearly all open source software is free.")
188
See, e.g., Alan Stern & A. Clifford Allen, Open Source Licensing, 985 PLI/PAT 321, 334
(2009).
189
Id.
190
OSI, The Open Source Definition, at http://www.opensource.org/docs/osd (accessed 4
August 2012).
The rights attached to the program must apply to all to whom the
program is redistributed without the need for execution of an
additional license by those parties.
8. License Must Not Be Specific to a Product
The rights attached to the program must not depend on the program's
being part of a particular software distribution. If the program is
extracted from that distribution and used or distributed within the
terms of the program's license, all parties to whom the program is
redistributed should have the same rights as those that are granted in
conjunction with the original software distribution.
9. License Must Not Restrict Other Software
The license must not place restrictions on other software that is
distributed along with the licensed software. For example, the
license must not insist that all other programs distributed on the
same medium must be open-source software.
10. License Must Be Technology-Neutral
No provision of the license may be predicated on any individual
technology or style of interface. 191
As can be seen from the above Open Source Definition, the core feature of
open source licenses is that they must allow access to the source code of the
licensed program. Further, open source licenses must allow redistribution of
the licensed program, modifications to the licensed program and distribution
of the modifications without any royalty fees. Nevertheless, under an open
source license, it is possible to charge a fee in return to distribution of OSS.
What is prohibited for a licensor of OSS is to demand royalty payment to a
licensee, a recipient of the OSS, when the licensee chooses to redistribute
(either with or without charging a fee) the OSS or its modifications.
2. Copyleft
191
Id.
its modifications under the same license terms as the licensed software.192
This feature of open source licenses is called "copyleft."193 The concept of
"copyleft" was created by Richard Stallman and the FSF explains this
concept as "a general method for making a program (or other work) free,
and requiring all modified and extended versions of the program to be free
as well."194
192
The most famous open source license of this type is the GPL.
193
FSF, What is Copyleft, at http://www.gnu.org/copyleft/copyleft.en.html (accessed 4
August 2012).
194
Id.
195
See supra note 191 and accompanying text.
196
See infra Part IV.C.3.
This section will provide an overview of major open source licenses. Open
source licenses may be classified based on how strong their copyleft effects
are.
The GPL is one of the most famous open source licenses. Because the GPL
was created by the FSF in order to implement the "copyleft" concept,198 the
GPL is famous for its strong copyleft effect. Currently, the latest version of
the GPL is version 3 (GPLv3) published on 29 June 2007.199
The preamble of the GPLv3 clearly states that its license terms are built
upon existing copyright system: the developers "(1) assert copyright on the
software, and (2) offer you this License giving you legal permission to copy,
distribute and/or modify it."200 When the licensee violates the terms of the
GPL, the rights granted by the GPL will be automatically terminated, which
may make the licensee to be an infringer of the copyright on the software.201
197
Stern & Allen, supra note 188, at 343.
198
FSF, supra note 193. ("Copyleft is a general concept, and you can't use a general
concept directly; you can only use a specific implementation of the concept.")
199
GNU GENERAL PUBLIC LICENSE VERSION 3 (GPLv3), at http://www.gnu.org/licenses/gpl-
3.0.txt (accessed 4 August 2012). For discussions on differences between GPLv3 and the
previous version GPLv2, see Stern & Allen, supra note 188, at 350-52, 354-56.
200
GPLv3, preamble.
201
Id. at section 8.
202
Id. at section 4.
203
Id. at section 5.
GPLed program must accompany the source code or at least an access to the
source code and must be licensed under the GPL.204 A program is based on
the GPLed program, if the program is copied from GPLed program (but not
an exact copy) or if the program is adapted all or part of GPLed program in
a fashion requiring copyright permission. 205 However, the output from
running a GPLed program will not be covered by the GPL if the output does
not contain GPLed program nor programs based on GPLed program. 206
Programs simply stored in a same storage medium together with GPLed
programs which, however, are not combined with GPLed programs are also
out of scope of the copyleft effect.207
To protect the developers and the authors of the GPLed programs, GPL
clearly states that there is no warranty for the software.208 The GPL does
allow, however, the licensor to provide warranty protection for a fee.209
Section 11 of the GPLv3 serves to achieve the above goal specified in the
preamble. The patent terms set forth in Section 11 were added to the GPL
when the GPLv3 was drafted. Under Section 11 of the GPLv3, the licensor
("contributor") grants the licensee "a non-exclusive, worldwide, royalty-free
204
Id. at sections 4-6.
205
Id. at section 0.
206
Id. at section 2, the third sentence of the first paragraph.
207
Id. at section 5, second paragraph.
208
Id. at preamble, sections 15-17.
209
Id. at section 4.
210
Id. at preamble.
patent license under the contributor's essential patent claims, to make, use,
sell, offer for sale, import and otherwise run, modify and propagate the
contents of its contributor version." The contributor's "essential patent
claims" include all patent claims "owned or controlled by the
contributor."211 The term "control" is defined to include the right to grant
patent sublicenses in a manner consistent with the requirements of
GPLv3. 212 The essential patent claims encompass claims both already
acquired at the time of licensing and acquired afterward. 213 It should be
noted that the essential patent claims do not include claims "that would be
infringed only as a consequence of further modification of the contributor
version."214
In case the contributor distributes a program under the GPLv3, knowing that
the program includes a patent protected program, the contributor must take
an action to enable the downstream recipients to have the right to access and
use the source code under the terms of the GPLv3 without being accused of
patent infringement.215
211
Id. at section 11, second paragraph.
212
Id.
213
Id.
214
Id.
215
Id. at section 11, fifth paragraph.
216
Rowan Wilson, GPL v3 - What's New?, OSS Watch (2007), at http://www.oss-
watch.ac.uk/resources/gpl3final.xml#body.1_div.6 (accessed 4 August 2012); Brett Smith,
A Quick Guide to GPLv3, at http://www.gnu.org/licenses/quick-guide-gplv3.html (accessed
4 August 2012).
licenses would extend to all Linux users under the sixth paragraph of
Section 11 of the GPLv3. The seventh paragraph of Section 11 of the
GPLv3 attempts to discourage distributors of GPLed programs to enter into
an agreement such as the one made between Microsoft and Novell.217 Under
the seventh paragraph of Section 11 of the GPLv3, a party to such an
agreement may not distribute GPLed programs.218
The GNU Lesser General Public License (LGPL)220 is also published by the
FSF. The LGPL is a license used for library programs that are linked to
other programs. Currently, the latest version of the LGPL, LGPLv3,221 was
published on 29 June 2007, the same day as the publication of the GPLv3.222
217
HEATHER J. MEEKER, THE OPEN SOURCE ALTERNATIVE: UNDERSTANDING RISKS AND
LEVERAGING OPPORTUNITIES 255 (2008).
218
GPLv3, section 11, seventh paragraph.
219
GPLv3, section 10, 3rd paragraph.
220
FSF, GNU Lesser General Public License, at http://www.gnu.org/copyleft/lesser.html
(accessed 4 August 2012).
221
GNU LESSER GENERAL PUBLIC LICENSE VERSION 3 (LGPLv3), at
http://www.gnu.org/licenses/lgpl-3.0.txt (accessed 4 August 2012).
222
Id.
223
Id. at preamble.
The Mozilla Public License (MPL) 225 is created and managed by the
Mozilla Foundation. The MPL is used as a license for the Firefox web
browser and the Thunderbird email application.
The MPL has a "file-level" copyleft effect. 226 When distributing a work
created by combining a non-MPL program file and an MPLed program file,
only the source code of the MPLed program file must be disclosed. 227
Source codes of the non-MPL program files can be kept undisclosed.
4. Apache License
224
See LGPLv3, section 4 (The distributor must provide source code corresponding to the
LGPLed library but does not have to provide source code corresponding to other programs
linked to the LGPLed library).
225
MOZILLA PUBLIC LICENSE VERSION 2.0 (MPL 2.0), at http://www.mozilla.org/MPL/2.0/
(accessed 4 August 2012).
226
MPL 2.0 FAQ, Q1, Q11, at http://www.mozilla.org/MPL/2.0/FAQ.html (accessed 4
August 2012).
227
MPL 2.0, section 3.3.
228
Id. at section 2.1.b.
229
Id. at section 1.11.
230
APACHE LICENSE, VERSION 2.0 (Apache License 2.0), at http://www.apache.org/licenses/
(accessed 4 August 2012).
231
LG München I [District Court of Munich I] 19 May 2004, Case No. 21 O 6123/04,
GRUR-RR 2004, 350 [English translation: IIC 2005, 36(6), 733]; See also the website of
gpl-violations.org, at http://gpl-violations.org/ (accessed 10 August 2012) (for summaries
of court decisions concerning the enforcement of the GPL in Germany).
232
Jacobsen v. Katzer, 535 F.3d 1373 (Fed. Cir. 2008)
233
See Brian W. Carver, Share and Share Alike: Understanding and Enforcing Open Source
and Free Software Licenses, 20 BERKELEY TECH. L.J. 443, 464 (2005); Robert W. Gomulkiewicz,
Enforcement of Open Source Software Licenses: The MDY Trio's Inconvenient
Complications, 14 YALE J. L. & TECH. 106, 115 (2011).
234
Jonathan Moskin, Howard Wettan & Adam Turkel, The Little License That Could:
Dangers of Using Open-Source Code After Jacobsen v. Katzer, 15(7) INTELLECTUAL
PROPERTY STRATEGIST 1, 3-4 (2009). See also Gomulkiewicz, supra note 233, at 124-37.
open source licenses are enforceable and a breach of open source license
may amount to copyright infringement.
The first court decision in the world on the enforceability of the GPL came
out from the District Court of Munich in Germany.235 The case was brought
up by a German software developer, Harald Welte, who wrote the software
at issue licensed under the GPL. 236 Harald Welte is the founder of gpl-
violations.org, an organisation advocating compliance with the GPL.237 The
defendant of the case distributed the software at issue in the form of object
code, without providing access to the source code and without an indication
that the software at issue was provided under the GPL, which clearly
violated the GPL terms.238 The Munich District Court ruled that the GPL
"can by no means be regarded as a waiver of copyright and copyright
claims" 239 and granted preliminary injunction against the defendant. 240
Following this case, gpl-violations.org has successfully enforced the GPL in
Germany.241 The German courts appear to have an established view that the
GPL is enforceable.
235
LG München I, IIC 2005, 36(6), 733; See also Thomas Hoeren, The first-ever ruling on
the legal validity of the GPL - A Critique of the case, at
http://www.oii.ox.ac.uk/resources/feedback/OIIFB_GPL3_20040903.pdf (accessed 3
August 2012).
236
See gpl-violations.org website, supra note 231.
237
Id.
238
LG München I, IIC 2005, 36(6), 733, at 734.
239
Id. at 735.
240
Id.
241
See gpl-violations.org website, supra note 231; See also Jennifer Buchanan O'Neill &
Christopher J. Gaspar, What Can Decisions by European Courts Teach Us about the Future
of Open-Source Litigation in the United States, 38 AIPLA Q.J. 437, 444-50 (2010).
242
Jacobsen, 535 F.3d, at 1375-76.
243
ARTISTIC LICENSE, at http://opensource.org/licenses/artistic-license.php (accessed 20
August 2012).
The easy flow of information in the digital age implies a high likeliness of
international disputes to arise. Software distribution can easily cross
national borders with the use of the Internet. Further, the development of
OSS can be made in a collaboration of programmers located in different
countries by communicating through the Internet. As such, international
disputes on OSS may involve rightholders in different countries against a
user of the OSS in yet another country. Jurisdiction and applicable law in
case of international disputes on OSS may be a tricky question. When the
open source license at issue is silent on the choice of jurisdiction and
applicable law, whether a court accepts jurisdiction for the suit would
depend on the judgement of the court. The applicable law would be
determined according to the conflict of law rules in the jurisdiction of the
court.247 Among the major open source licenses described in Part III.C, the
244
Id.
245
Jacobsen, 535 F.3d, at 1379.
246
Id. at 1381-83.
247
Anna Haapanen, GPL embedded in devices - 10 most important questions for device
manufacturers' consideration, 33(4) E.I.P.R. 245, 250-51 (2011) (discusses the applicable
law and jurisdiction in connection with international disputes concerning GPLed software).
For general discussions on jurisdiction and conflict of law issues on intellectual property
litigations, see, e.g., Graeme B. Dinwoodie, International Intellectual Property Litigation:
a Vehicle for Resurgent Comparativist Thought?, 49 AM. J. COMP. L. 429 (2001); Benedetta
Most of the major open source licenses are drafted in consideration of the
US law. Hence, when an open source license is dealt with under a national
law of a country other than the US, some considerations on potential
differences between that national law and the US law may be required.
253
See supra note 55 and accompanying text.
254
See supra note 25 and accompanying text.
255
See supra note 83 and accompanying text.
256
Article 20 JCA. See also, supra Part II.A.3.(b).
257
See supra Part II.A.3.(c); note 96 and accompanying text.
258
See SOFTWARE INFORMATION CENTER, ŌPUN SOFUTOUEA NO HŌTEKISHOMONDAI NI KANSURU
CHOSA CHOSA H ŌKOKUSHO [SURVEY REPORT OF A SURVEY CONCERNING LEGAL ISSUES OF OPEN
SOFTWARE], 59, 62, 87-88 (revised ed. 2005) [(財)ソフトウェア情報センター, オープン
ソフトウェアの法的諸問題に関する調査 調査報告書, (平成 17 年 2 月改訂)]
(suggests a model license agreement for OSS developed in Japan which includes a clause
stating non-enforcement of the integrity right).
259
See, e.g., Stern & Allen, supra, note 188, at 354-55.
260
See supra Part II.A.1.(d).
Turning to the US, it is argued that the "sale or license" distinction ruled in
the recent US case of Vernor may be incompatible with the open source
licensing mechanism.261 In order for a transaction of software provision to
be deemed a license and thus avoid the first sale doctrine, the Vernor criteria
require the licensor to significantly restrict the user's ability to transfer the
software and to impose notable use restrictions.262 Restricting redistribution
and the use of the software is, however, against the philosophy of the open
source licenses.263 According to the Vernor criteria, provision of OSS can be
deemed a "sale" that invokes the first sale doctrine.
261
See generally Gomulkiewicz, supra note 233. See also supra Part II.A.2(d).
262
See supra note 67 and accompanying text.
263
See supra note 190 and accompanying text.
264
See supra note 62 and accompanying text.
265
E.g., MELVIN F. JAGER, LICENSING LAW HANDBOOK, §9:1 (2011-2012 ed.).
266
Id.
267
Id.
268
Id. See also, Nadan, supra note 62, at 639-43.
Providing a platform for a service related to OSS and then charging for the
use of the platform is another model to obtain revenue from OSS related
services. Google implements this model in "Google Play," a service
269
See Robert W. Gomulkiewicz, Entrepreneurial Open Source Software Hackers: MySQL
and Its Dual Licensing, 9 COMPUTER L. REV. & TECH. J. 203, 205-07 (2004); Matthew
Langham, The business of open source, OSS Watch (2012), at http://www.oss-
watch.ac.uk/resources/businessofopensource.xml (accessed 4 August 2012).
270
Gomulkiewicz, supra note 269, at 205; Langham, supra note 269, at point 2.3.
Some companies sell hardware accompanying OSS without charging for the
software.274 IBM is an examplary company adopting this business model as
they sell servers pre-loaded with Linux operating system. 275 A further
example would be the sale of various devices with embedded system using
OSS.276
271
See Google Play website, at https://play.google.com/store (accessed 4 August 2012).
272
See Google Play for Developers: Developer Registrations, at
http://support.google.com/googleplay/android-
developer/bin/answer.py?hl=en&answer=113468 (accessed 4 August 2012).
273
See Google Play for Developers: Transaction Fees, at
http://support.google.com/googleplay/android-
developer/bin/answer.py?hl=en&answer=112622&topic=15867&ctx=topic (accessed 4
August 2012).
274
Gomulkiewicz, supra note 269, at 205.
275
Id.
276
For instance, mobile phones, network tablets, routers and electronic home appliances
etc. For examples of devices with embedded Linux, see elinux.org, Products, at
http://elinux.org/Products (accessed 10 August 2012).
277
Gomulkiewicz, supra note 269, at 206; Langham, supra note 269, at point 2.1.
278
Gomulkiewicz, supra note 269, at 206-07.
versions with more functions for a payment. 279 Yet another example is to
distribute OSS operating system for free of charge and charge for the
application software which runs on the operating system.280
2. Dual-licensing
279
Id.
280
Id. at 206.
281
Id. at 208-10; Elena Blanco, Dual-licensing as a business model, OSS Watch (2006) at
http://www.oss-watch.ac.uk/resources/duallicence2.xml (accessed 4 August 2012).
282
See generally, Nicholas Taylor, Open Source Dual Licensing as a Business Model: How a
Flexible IP Strategy Helped Create the World's Most Popular Open Source Database
Company, 37 AIPLA Q.J. 321 (2009).
283
Id.
284
See, e.g., supra Parts II.A.1.(b), II.A.2.(b), II.A.3.(b).
285
Kat McCabe, Working with Open Source: Software Compliance Management, in
ADVANCED LICENSING A GREEMENTS 2008, 6 (Joseph Yang & Ira J. Levy 2008).
Making, using, offering for sale, or selling products which falls within the
scope of a patented invention constitute patent infringement. 289 A possible
plaintiff of patent infringement against OSS vendors would be a patent
holder outside the distribution chain of the OSS since patent clauses in open
286
Groklaw, SCO Litigation - From Soup to Nuts, at
http://www.groklaw.net/staticpages/index.php?page=20080803065719599 (accessed 29
August 2012).
287
Id. See also, Groklaw, SCO v. IBM Timeline, at
http://www.groklaw.net/staticpages/index.php?page=20031016162215566 (accessed 29
August 2012).
288
The SCO Group, Inc. v. Novell, Inc., 721 F.Supp.2d 1050, 1072 (D. Utah, Central Division,
2010).
289
See supra note 106 and accompanying text.
source licenses 290 would prevent distributors of OSS to sue the OSS
recipients for patent infringement.
Most of the open source licenses include clauses for disclaimer of warranty
and limitation of liabilities, 293 which may protect the OSS distributors from
damage claims by the downstream OSS users sued in a patent infringement
case. Yet a patent infringement claim against an OSS vendor can have a
huge negative impact on its business. 294 For example, if the patent
infringement claim against the OSS vendor is known to the public, the
vendor might lose their customers and/or investors that wish to avoid
problems.295
290
See, e.g., GPLv3, section 11; MPL 2.0, section 2.1.b; Apache License 2.0, section 3.
291
See, e.g., MEEKER, supra note 217, at 96-98 (explaining arguments for the proposition
that the OSS is particularly vulnerable to patent infringement).
292
See, e.g., supra note 210 and accompanying text; Red Hat Inc., Statement of Position and Our Promise on
Software Patents
, at http://www.redhat.com/legal/patent_policy.html (accessed 1 August 2012)
("Red Hat has consistently taken the position that software patents generally impede
innovation in software development and that software patents are inconsistent with open
source/free software.").
293
See, e.g., GPLv3, sections 15, 16; MPL 2.0, sections 6, 7; Apache License 2.0, sections 7,
8.
294
Paul H. Arne, Patent Risks in Open Source Licensing, in Joseph Yang and Ira J. Levy,
Advanced Licensing Agreements 2008, 9, 10 (Practising Law Institute 2008).
295
Id.
296
See, e.g., Heather J. Meeker, Open Source and the Age of Enforcement, 4 HASTINGS
SCI. & TECH. L.J. 267, 280-81 (2012).
297
Complaint, Microsoft Corp. v. TomTom, N.V., No. 09-cv-00247 (W.D. Wash. Feb. 25,
2009), available at http://www.groklaw.net/pdf/tomtomComplaint.pdf (accessed 6
September 2012).
298
Microsoft Corporation, Microsoft and TomTom Settle Patent Infringement Cases (30
March 2009) at http://www.microsoft.com/en-us/news/press/2009/mar09/03-
30MSTomTomPR.aspx
299
Id.
300
Id.
301
These companies include: I-O Data, Amazon, Novell, Brother International Corp, Fuji
Xerox Co. Ltd, Kyocera Mita Corp., LG Electronics and Samsung Electronics Co. See, e.g.,
Sean Kerner, Microsoft's Linux Patent Scare Trumps SCO, InternetNews.com (4 March
2010), at http://www.internetnews.com/skerner/2010/03/microsofts-linux-patent-
scare.html
302
See supra Part III.C.1. See also Meeker, supra note 296, at 280-81.
303
See, e.g., MEEKER, supra note 217, at 93. Besides, the IP claim of the SCO v. IBM case
in the US was a copyright infringement rather than a patent infringement.
304
MEEKER, supra note 217, at 93, 94 (referring that SCO "gained great notoriety for
making perceived threats against open source" by initiating the series of litigations against
Linux operating system vendors).
305
Arne, supra, note 294 at 3, 4. This does not apply to Microsoft in their patent
enforcement against the Linux because Microsoft does not distribute the Linux.
306
Id. at 4.
307
Id.
308
VÄLIMÄKI, supra note 104, at 172.
309
See generally, Mark A. Lemley, Ignoring Patents, 2008 MICH. ST. L. REV. 19 (2008).
310
See supra note 197 and accompanying text.
It should be noted that the problem of "contamination" arises only when the
new software is distributed to third parties. 311 Thus, as long as the new
software created by combing proprietary software with OSS is used
internally, i.e., within one organisation, the source code of the new software
can be kept undisclosed without violating the open source license terms.312
Suppose some components of OSS and proprietary source codes are mixed
to create a source code of new software. Such new software would be a
derivative work or an alteration of the original OSS and proprietary software
313
under a copyright law. This form of combination would likely
"contaminate" the proprietary software in most copyleft licenses.
The "file-level" copyleft effect of the MPL 316 applies only to the source
code file(s) of the new software containing a part of the original MPLed
code or its modifications. Thus, if the OSS and proprietary source codes are
mixed into one file to create the new software, the new software is
"contaminated." By contrast, in case the source codes of the OSS and
311
Copyleft provisions of open source licenses apply when covered programs or their
modifications are distributed. See, e.g., GPLv3, sections 4, 5; MPL 2.0, section 3.1.
312
See, e.g., FSF, Frequently Asked Questions about the GNU Licenses, at
http://www.gnu.org/licenses/gpl-faq.en.html#InternalDistribution (accessed 30 August
2012) (stating that "making and using multiple copies within one organization or
company" is not a "distribution").
313
See supra Parts II.A.1.(b), II.A.2.(b), II.A.3.(b). See also, supra notes 251, 252 and
accompanying text.
314
GPLv3, section 5.
315
Id. at section 0.
316
See supra notes 226, 227 and accompanying text.
proprietary software are separated in different files and the new software is
created by linking those files, the source code files of the proprietary
software can be kept undisclosed when distributing the new software.317 The
details of linking will be discussed in the next part.
317
MPL 2.0, section 3.3. See also supra note 226 and accompanying text.
318
See, e.g., Stern & Allen, supra note 188, at 344.
319
Id. at 344-45 (considering dynamic linking less likely to be "contaminating" than static
linking under the GPLv2). But see Linus Torvalds, GPL only modules, linux-kernel mailing
list (2006) at https://lkml.org/lkml/2006/12/17/79 (accessed 3 September 2012)
(explaining that "'static' vs 'dynamic'" does not matter but whether the linked programs
are "independent" of each other does matter when determining if linking of programs
cause a derived work).
320
See supra note 315 and accompanying text.
321
See, e.g., FSF, supra note 312 (does not distinguish static and dynamic
linking for explaining the case of linking proprietary program with GPLed
program. Further, the following statements are found: "If the program
dynamically links plug-ins, and they make function calls to each other and share data
structures, we believe they form a single program, which must be treated as an
extension of both the main program and the plug-ins. This means that combination of
the GPL-covered plug-in with the non-free main program would violate the GPL.").
322
GPLv3, section 1. See also FSF, supra note 312 ("What legal issues come
up if I use GPL-incompatible libraries with GPL software?").
323
Id.
324
See supra Part III.C.2.
325
See generally LGPLv3.
326
See supra note 317 and accompanying text.
Some OSS may function as a development tool for creating other software.
Does the copyleft effect of the open source license cover software created
using the OSS? This question was one of the issues in the US case,
Computer Associates International v. Quest Software, Inc. 328 The plaintiff
claimed copyright for their software created by using modified GPLed
program. 329 The court found that the "output" of the modified GPLed
program, i.e., source code created by using the modified GPLed program,
was not subject to the restrictions of the GPL and thus copyright claim for
such source code was valid.330
The GPLv3 which was published after the Quest Software decision includes
an exception of the coplyleft effect for the "output from running a covered
work."331 If software created by running GPLed software does not contain
GPLed software and its modification, the resulting software is out of the
copyleft scope.332
Under the MPL, source codes created using MPLed software need not be
disclosed under the MPL as long as the resulting source code file does not
327
See Linus Torvalds, linux/kernel/COPYING, The Linux Kernel Archives, at
http://www.kernel.org/pub/linux/kernel/COPYING (accessed 23 August 2012) (stating
that GPLv2 does not cover "user programs that use kernel services by normal system
calls"). See also Stern & Allen, supra note 188, at 344-45, 351.
328
Computer Associates International v. Quest Software, Inc., 333 F.Supp.2d 688 (N.D. Ill.
2004).
329
Id. at 697-98.
330
Id. at 698.
331
GPLv3, section 2.
332
Id.
333
MPL 2.0, section 1.10.
334
Item 9 of the Open Source Definition prohibits an open source license to restrict other
software distributed with OSS. See supra Part III.B.1.
335
GPLv3, section 5, second paragraph.
336
MPL 2.0, section 3.3.
337
See supra Part III.D.1.
338
See, e.g., gpl-violations.org, Court rejects AVM's claims opposing third party
modifications of GPL software, at http://gpl-violations.org/news/20111110-avm-
cybits.html (accessed 4 September 2012).
339
See supra Part.III.D.1.
340
Moskin, Wettan & Turkel, supra note 234, at 3.
341
The SFLC is an organisation that provides legal services for open source licensing and
enforcement. See SFLC website, http://www.softwarefreedom.org/ (accessed 6
September 2012).
342
SFLC, News: SFLC Files Lawsuit against Cisco on Behalf of the FSF (11 December 2008),
at http://www.softwarefreedom.org/news/2008/dec/11/cisco-lawsuit/
343
Brett Smith, FSF Settles Suit Against Cisco (20 May 2009), at
http://www.fsf.org/news/2009-05-cisco-settlement.html
Antennas, LLC. and Verizon Communications, Inc.344 These four cases were
settled quickly with each defendant agreeing to publish the source code for
the BusyBox software and to pay an undisclosed amount to the plaintiff.345
The lawsuits filed in 2008 also settled in a similar manner. 346 In 2009, the
SFLC filed yet another suit regarding BusyBox against fourteen defendants
including Best Buy and Samsung.347
The "advocates" of open source licenses such as the FSF, the SFLC and the
gpl-violations.org are interested primarily in compliance rather than
injunction.348 Thus, claims from the "advocates" are relatively easy to deal
with. 349 In fact, most of the SFLC cases introduced above were settled
quickly outside the court. Another kind of claimants, however, the
"strategists," are also said to be interested in open source license
enforcement.350 The "strategists" may use open source claims as a tool to
weaken their competitors.351 Hence the "strategists" are more interested in
injunction and damages than compliance, which makes their claims more
complicated to handle than those of the "advocates."352
344
SFLC, SFLC News: 2007, at http://www.softwarefreedom.org/news/2007/ (accessed 6
September 2012).
345
Eric Boehm, Open source licensing suits settle in short order, The Lawyers Weekly (30
May 2008), at http://www.lawyersweekly.ca/index.php?section=article&articleid=691
346
SFLC, SFLC News: 2008, at http://www.softwarefreedom.org/news/2008/ (accessed 6
September 2012).
347
SFLC, Best Buy, Samsung, Westinghouse, And Eleven Other Brands Named In SFLC
Lawsuit (14 December 2009), at
http://www.softwarefreedom.org/news/2009/dec/14/busybox-gpl-lawsuit/
348
Meeker, supra note 296 at 290.
349
Id. at 290.
350
Id. at 286-90.
351
Id. at 287-88.
352
Id. at 287-90.
The choice between proprietary software and OSS for distribution depends
on the specific business model adopted by the developer. If the core
business value of the developer is on the software itself, the software should
be kept proprietary. In contrast, if the business strength of the developer lies
in the secondary market, distributing their software as OSS would be an
option. Distributed OSS can be improved by any recipient of the OSS and
licensed back to the user community including the distributor. 353 This
collaborative nature of OSS development would save the time and cost for
the developers to improve the released OSS.354
353
Especially if the OSS is distributed under a copyleft license, the improved software will
also be distributed as OSS.
354
See, e.g., Stern & Allen, supra note 188, at 335.
355
See supra Part IV.C.3; infra Part V.D.1.
OSS distributors need to choose open source license(s) for both inbound and
outbound software. The choice for the outbound software would depend on
how the developer wishes the software to be used by the recipients. If the
developer is sympathetic to the "free software" philosophy of the FSF, the
GPL would be an option. If the developer wishes to gain popularity for
his/her software among proprietary software developers, a weak copyleft or
a non-copyleft license is preferable. Choosing the same license as the
outbound software for the inbound software would be ideal in order to avoid
violations of the license terms on redistribution. In reality, however, the
developer possibly has various inbound OSS licensed under different
licenses and may distribute outbound OSS under two or more licenses. In
such a situation, compatibility between open source licenses should be taken
into account.
Developers using OSS should comply with the terms of the relevant open
source license. Non-compliance may cause disputes with the licensor of the
inbound OSS.361 The disputes would likely result in a settlement including
assurance of the compliance and a damage payment by the licensee or a
court decision against the licensee. 362 As such, it can be too expensive to be
ignorant of consequences of non-compliance with open source license
terms.363
361
See supra Parts III.D.1, IV.C.4.
362
Id.
363
Meeker, supra note 296, at 289-90. See also Ibrahim Haddad, Free and Open Source
Software Compliance: The Basics You Must Know, 1036 PLI/PAT 17, 29-30 (2011).
copyleft effect, required notices (e.g. attribution, license and copyright) and
the form of provision of corresponding source code when distributing the
object code. The developer should keep track on which inbound OSS
components subject to which license are specifically incorporated into
which outbound software.
The conditions for distribution of the outbound software depend on the open
source license terms for the OSS components incorporated into the
outbound software. If the outbound software is proprietary, the developer
should make sure that the outbound software is not "contaminated" in light
of the relevant open source license terms.364 In case the outbound software
is OSS, the open source license terms for the outbound software should be
compatible with the terms for the inbound OSS incorporated into the
outbound software.365 That is, the license terms for the outbound software
should not include any restrictions or conditions that are not allowed to be
included under the license terms applicable to the inbound OSS.
364
See supra Part IV.C.3.
365
See, e.g., Smith, supra note 216 (explaining compatibility issues on the GPL).
366
See supra Part IV.C.3.
367
See supra Part IV.C.3.(a).
368
See supra Part IV.C.3.(b).
VI. Conclusion
369
See supra Parts III.D, IV.C.
370
See supra Parts III.D.1, IV.C.4.
371
See supra Part IV.C.
372
Note for example the philosophy of the FSF that all software should be "free."
Cases
[US]
Adobe Systems Inc. v. One Stop Micro, Inc., 84 F.Supp.2d 1086 (N.D.Cal. 2000)
Adobe Systems Inc. v. Stargate Software Inc., 216 F.Supp.2d 1051 (N.D.Cal. 2002)
Apple Computer, Inc. v. Franklin Computer Corp. 714 F.2d 1240 (3d Cir. 1983)
Computer Associates International, Inc. v. Altai, Inc. 982 F.2d 693 (2d Cir. 1992)
Computer Associates International v. Quest Software, Inc., 333 F.Supp.2d 688 (N.D. Ill.
2004)
MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1993)
MDY Industries, LLC v. Blizzard Entertainment, Inc., 629 F.3d 928 (9th Cir. 2010)
Microsoft Corp. v. TomTom, N.V., Complaints, No. 09-cv-00247 (W.D. Wash. Feb. 25,
2009), available at http://www.groklaw.net/pdf/tomtomComplaint.pdf (accessed 6
September 2012)
The SCO Group, Inc. v. Novell, Inc., 721 F.Supp.2d 1050 (D. Utah 2010)
SoftMan Products Company, LLC, v. Adobe Systems Inc., 171 F.Supp.2d 1075
(C.D.Cal. 2001)
State Street Bank & Trust Co. v. Signature Financial Group, Inc, 149 F.3d 1368 (Fed.
Cir. 1998)
UMG Recordings, Inc. v. Augusto, 628 F.3d 1175 (9th Cir. 2011)
[CJEU]
[EPO]
[Germany]
[Japan]
Tōkyō Kōtō Saibansho [Tokyo High Ct.] 28 February 1950, Sho 23 (na) No. 5
Tōkyō Kōtō Saibansho [Tokyo High Ct.] 14 November 1953, Sho 26 (na) No. 12
Tōkyō Kōtō Saibansho [Tokyo High Ct.] 25 December 1956, Sho 31(na) No. 12
Chitekizaisan Kōtō Saibansho [IP High Ct.] 24 June 2007, Hei 19 (ke) No. 10369
Chitekizaisan Kōtō Saibansho [IP High Ct.] 31 October 2007, Hei 19 (ke) No. 10056
Chitekizaisan Kōtō Saibansho [IP High Ct.] 29 February 2008, Hei 19 (ke) No. 10239
Chitekizaisan Kōtō Saibansho [IP High Ct.] 26 August 2008, Hei 20 (ke) No. 10001
Books
FUMIO SAKKA, SHŌKAI CHOSAKUKENHŌ [DISCUSSION COPYRIGHT LAW] (4th ed. 2010)
[作花文雄, 詳解 著作権法, (第4版 2010)]
権法 (2007)]
CONCISE EUROPEAN COPYRIGHT LAW (Thomas Dreier & P. Bernt Hugenholtz eds.,
2006)
Journal articles
Aaron Perzanowski & Jason Schultz, Digital Exhaustion, 58 UCLA L. REV. 889 (2011)
Alan Stern & A. Clifford Allen, Open Source Licensing, 985 PLI/PAT 321 (2009)
Anna Haapanen, GPL embedded in devices - 10 most important questions for device
manufacturers' consideration, 33(4) E.I.P.R. 245 (2011)
Brian W. Carver, Why License Agreements Do Not Control Copy Ownership: First Sales
and Essential Copies, 25 BERKELEY TECH. L.J. 1887 (2010)
Brian W. Carver, Share and Share Alike: Understanding and Enforcing Open Source
and Free Software Licenses, 20 BERKELEY TECH. L.J. 443 (2005)
Christian H. Nadan, Software Licensing in the 21st Century: Are software "Licenses"
Really Sales, and How Will the Software Industry Respond?, 32 AIPLA Q. J.
555 (2004)
Daniel J.M. Attridge, Challenging claims! Patenting computer programs in Europe and
the USA, 2001(1) I.P.Q. 22 (2001).
Geoffrey P. Vickers & Kelly L. Frey, Sr., When Android Calls -- Open Source Frontiers
in Smartphones, 7 No. 2 ABA SCITECH LAW. 20 (2010)
Heather J. Meeker, Open Source and the Age of Enforcement, 4 HASTINGS SCI. & TECH.
L.J. 267 (2012)
Ibrahim Haddad, Free and Open Source Software Compliance: The Basics You Must
Know, 1036 PLI/PAT 17 (2011)
Jennifer Buchanan O'Neill & Christopher J. Gaspar, What Can Decisions by European
Courts Teach Us about the Future of Open-Source Litigation in the United
States, 38 AIPLA Q.J. 437 (2010)
Jonathan Moskin, Howard Wettan & Adam Turkel, The Little License That Could:
Dangers of Using Open-Source Code After Jacobsen v. Katzer, 15(7)
INTELLECTUAL PROPERTY STRATEGIST 1 (2009)
Julie E. Cohen & Mark A. Lemley, Patent Scope and Innovation in the Software
Industry, 89 CAL. L. REV. 1 (2001)
Karen Faulds Copenhaver, Managing Compliance with Open Source Software Licenses
Compliance programs for open source software aren't about fear--they're about
building a better business, 54 No. 3 PRAC. LAW. 21 (2008)
Mark A. Lemley, Michael Risch, Ted Sichelman & R. Polk Wagner, Life After Bilski, 63
STAN. L. REV. 1315 (2011)
Nicholas Taylor, Open Source Dual Licensing as a Business Model: How a Flexible IP
Strategy Helped Create the World's Most Popular Open Source Database
Company, 37 AIPLA Q.J. 321 (2009)
Thomas Dreier, The Council Directive of 14 May 1991 on the Legal Protection of
Computer Programs, 13(9) E.I.P.R. 319 (1990)
Brett Smith, FSF Settles Suit Against Cisco (20 May 2009), at
http://www.fsf.org/news/2009-05-cisco-settlement.html
Eric Boehm, Open source licensing suits settle in short order, The Lawyers Weekly (30
May 2008), at
http://www.lawyersweekly.ca/index.php?section=article&articleid=691
Sean Kerner, Microsoft's Linux Patent Scare Trumps SCO, InternetNews.com (4 March
2010), at
http://www.internetnews.com/skerner/2010/03/microsofts-linux-patent-scare.ht ml
Thomas Hoeren, The first-ever ruling on the legal validity of the GPL - A Critique of the
case, at
http://www.oii.ox.ac.uk/resources/feedback/OIIFB_GPL3_20040903.pdf
Microsoft Corporation, Microsoft and TomTom Settle Patent Infringement Cases (30
March 2009) at
http://www.microsoft.com/en-us/news/press/2009/mar09/03-30MSTomTomPR. aspx
Software Freedom Law Center (SFLC), Best Buy, Samsung, Westinghouse, And Eleven
Other Brands Named In SFLC Lawsuit (14 December 2009), at
http://www.softwarefreedom.org/news/2009/dec/14/busybox-gpl-lawsuit/
SFLC, News: SFLC Files Lawsuit against Cisco on Behalf of the FSF (11 December
2008), at http://www.softwarefreedom.org/news/2008/dec/11/cisco-lawsuit/
フトウェア情報センター, オープンソフトウェアの法的諸問題に関する
United States Patent and Trademark Office (USPTO), Process for Obtaining a Utility
Patent, at http://www.uspto.gov/patents/process/index.jsp (accessed 1 August 2012)
Berne Convention for the Protection of Literary and Artistic Works, Paris Act on July 24,
1971, as amended on September 28, 1979 (Berne Convention)
CHOSAKUKENHŌ [Copyright Act (of Japan)], Act No. 48 of 6 May 1970, English
translation is available at http://www.japaneselawtranslation.go.jp/?re=02
(accessed 2 August 2012)
Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009
on the legal protection of computer programs
Examination Guideline for Patent and Utility Model in Japan, Part VII Examination
Guidelines for Inventions in Specific Fields, Chapter 1 Computer Software-Related
Inventions (October 2011)
Guidelines for Examination in the European Patent Office (status 20 June 2012)
Interim Guidance for Determining Subject Matter Eligibility for Process Claims in View
of Bilski v. Kappos, 75 Fed. Reg. 43922 (July 27, 2010)
TOKKYOHŌ [Patent Act (of Japan)], Act No. 121 of 13 April 1959, English translation is
available at http://www.japaneselawtranslation.go.jp/?re=02 (accessed 2 August
2012)