Fostering the Business of Innovation: the Untold Story of Bowers v. Baystate Technologies
Citation | Vol. 7 No. 4 |
Publication year | 2012 |
Abstract
Table of Contents
Introduction .............................................................................. 446
I. Historical Backdrop: End User Licenses and Reverse Engineering ........................................................................ 448
A. End Users Licenses ....................................................... 448
B. Reverse Engineering ...................................................... 449
II. Facts and Rulings of
A. Facts .............................................................................. 452
B. Rulings .......................................................................... 453
1. Trial Court Rulings .............................................. 453
2. Initial Federal Circuit Ruling and Response to It .. 454
3. Federal Circuit Ruling After Rehearing-A Revised Opinion and Judge Dyk's Dissent ........... 455
4. Judge Rader's Majority Opinion ........................... 455
III.
A.Intellectual Property Law Balance ................................. 457
B.A Remedies Approach Creates the Best Balance ............ 460
1. Better Climate for Business Model Innovation ..... 460
2. Courts Decide Cases, Legislatures Make Laws ..... 464
IV. Final Reflection .................................................................. 465
Conclusion ................................................................................ 466
Introduction
Perhaps the law review literature does not need another article on the Federal Circuit's
Following this Introduction, the Article sets out the historical backdrop of the
I. Historical Backdrop: End User Licenses and Reverse Engineering
Today, nearly every software user knows that software comes with a license (often called an "End User License Agreement" or "EULA" for short). Software developers began using EULAs in the 1980s during the personal computer revolution when software became a mass-market product. For many years, the enforceability of EULAs seemed in doubt. Scholars argued against their enforceability on a variety of grounds.(fn5)
Beginning with the
Reverse engineering means "to study or analyze (a device, as a microchip for computers) in order to learn details of design, construction, and operation, perhaps to produce a copy or an improved version."(fn11) In the software context, reverse engineering includes de-compilation or disassembly of machine-readable object code to discover human-readable source code. A competitor can use information gleaned from reverse engineering to create either a competitive product or a compatible product. Many people have highlighted the virtues of reverse engineering.(fn12) The Supreme Court has characterized reverse engineering as an "essential part of innovation."(fn13)
Some intellectual property law doctrines support reverse engineering. Trade secret law considers reverse engineering a proper means of discovering information.(fn14) The Copyright Act often does not stand in the way of reverse engineering to discover ideas even when copying is involved. Several courts, including the Federal Circuit, have ruled that making intermediate copies of software to uncover unprotectable ideas may amount to a defensible "fair use" under the Copyright Act.(fn15) In addition, the Digital Millennium Copyright Act permits the circumvention of technological measures in some circumstances for the purpose of engaging in reverse engineering.(fn16)
Despite all the positive aspects of reverse engineering, it is important not to overstate its significance. In the software industry, reverse engineering object code to discover source code can be very time consuming and may not yield much useful information.(fn17) In addition, a significant amount of technical information about software, including its source code, is available by license, including under various open source software licenses, through standards organizations, and in software development kits and developer tools products.
It is also important to place the discovery of information via reverse engineering in the broader context of trade secret law and practice. Contracts are a normal and necessary measure used to protect the secrecy of trade secret information.(fn18) Moreover, enforceable contracts foster the sharing of information by allowing trade secret holders to share confidential information with third parties in a way that retains the information's secrecy.(fn19) Trade secret law does not treat the acquisition of information by breach of contract as proper. To the contrary, acquiring information through breach of contract constitutes an illegal misappropriation of trade secrets.
Software developers often view their source code as a valuable trade secret and thus use contracts to bolster the secrecy that is inherent in distributing only the machine-readable object code. In other words, when software developers distribute software in object code form, they often do so because this form does not reveal secrets contained in the source code.(fn20) Knowing that the software user could potentially discover the secrets by decompiling the object code, software developers get users to agree contractually that they will not reverse engineer the object code.
Sometimes these trade secret-related contracts are called nondisclosure agreements (NDAs). Now that software has become a mass-market item, EULAs also have become an important legal tool to protect the secrecy of source code. EULAs, like NDAs, protect the secrecy of software by contract.
Against this backdrop, the Federal Circuit decided the
To continue reading
Request your trial