software development disputes

Has my software been copied? – legal test explained

HomePrivate: BlogIP litigation and disputesCopyright infringementHas my software been copied? – legal test explained

by

reviewed by

Malcolm Burrows

There is an urban myth that something can be copied and changed by 20% or so and then there is no copyright infringement.  Rightly or wrongly this is simply untrue.  In the case of IPC Global Pty Ltd v Pavetest Pty Ltd (No 3) [2017] FCA 82 (IPC Global), a former employee of the applicant copied source code and passed it to a developer.  It was subsequently alleged that in doing so, the respondent had breached a contractual obligation of confidence and had also breached the applicant’s copyright.

Background to the dispute about copyright in the source code

In IPC Global, source code from a dynamic-link library (DLL) and a number of test modules, which were used in its version of the software, were copied by Pavetest.  Expert evidence adduced by IPC showed that around 800 lines of code in Pavetest’s software was “identical or similar[1] from 250,000 lines of code in IPC’s original application.  However the argument was made by the applicant that between 10,000 and 20,000 lines were physically copied.  Much of this code represented a duplication of the same code across seven (7) test modules of IPC.  Pavetest, through the acts of its employee in copying the DLL and test modules, had infringed IPC’s copyright by copying a substantial part of their software.  So what’s a substantial part?

 

Why does copyright subsist in computer code?

Copyright law protects the original expression of ideas.  In Australia section 10(1) of the Copyright Act 1968 (Cth) (Act) provides that a “literary work” includes a computer program or compilation of computer programs. The expression “computer program” is defined in the same section as meaning “a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result”.

A breach of copyright, with respect to literary work including computer code, occurs pursuant to section 36 of the Act when the work is reproduced in a ‘material form’.  It is unnecessary that the work is reproduced in full because ‘material form’ is defined to include a substantial part of the work – section 10 of the Act.

What is the legal test for a “substantial reproduction”?

The test for substantial reproduction has been widely discussed in case law.  In the context of copyright infringement, the test focuses on the expression of the part of the work reproduced.[2]  The case law does show that special difficulty has been encountered in considering the relationship between the phrase “a substantial part” in section 14(1) of the Act and the definition of “literary work” set out in section 10(1) of the Act.

The test to establish whether there was a “substantial reproduction” of computer code was considered by the High Court in Data Access v Powerflex [1999] HCA 49 (Data Access).  Gleeson CJ, McHugh, Gummow and Hayne JJ observed that:

in determining whether something is a reproduction of a substantial part of a computer program, the ‘essential or material features’ should be ascertained by considering the originality of the part allegedly taken’, quoting Mason CJ in Autodesk Inc v Dyason (No 2) [1993] HCA 6.”

Since the statutory definition of a computer program is a “set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result”, it follows that in determining whether there has been substantial reproduction, it is necessary to examine:

  • what was allegedly taken;
  • the set of statements or instructions comprehended by what was taken; and
  • compare it with the original;

as part of the enquiry of originality for the purposes of infringement.

In IceTV Pty Ltd v Nine Network Australia Pty Ltd [2009] HCA 14, French CJ, Crennan and Kiefel JJ noted:

the need for some process of qualitative abstraction of the material features of the computer program in question in order to determine any issue of substantiality under section 14(1) of the Act”.

This test was reaffirmed by Bennett J in CA Inc v ISI Pty Ltd [2012] FCA 35.

The test was also considered in JR Consulting & Drafting Pty Ltd v Cummings [2016] FCAFC 20.  In that case, Bennett, Greenwood and Besanko JJ said in relation to copyright infringement that any analysis as to substantial reproduction “engages a consideration of the quality of the part of the work alleged to have been reproduced. 

 The Court held that in this context, the question surrounds the degree of originality in the expression of the work reproduced.

The fact that a part reproduced originates from the author of that part does not, of itself, mean that it is a substantial part of the whole work because, when giving attention to the quality of the part taken, it may be there has been reproduction of something that is largely unoriginal”.

In IPC Global, Moshinsky J said that although the quantum of code reproduced was small relative to the total size of the UTS software, “the cases make clear that the emphasis is on a qualitative rather than quantitative assessment of substantiality”.[3]  His Honour therefore held that the quantity of copied source code was sufficient to constitute substantial reproduction.

The need for a qualitative assessment

In IceTV Pty Ltd v Nine Network Australia Pty Ltd [2009] HCA 14 (Ice TV) we have seen that is was said by Gummow, Hayne and Heydon JJ [159] that there is ‘the need for some process of qualitative abstraction of the material features of the computer program in question’.

This need for a qualitative assessment was further elaborated by Bennett J in CA, Inc. at [181] as:

A qualitative assessment involves consideration of functionality, while a quantitative assessment involves consideration of textual similarity”.

Bennett J added at [184]:

to engage in a qualitative assessment involving functionality, it is necessary for there to be evidence of all that Datacom does in order to understand the significance, in context, of what the CA URT Macros do.  This evidence has not been adduced.  Accordingly, I am unable to perform a qualitative assessment of substantial part.  CA has not discharged its onus of proof in this respect.

(bold is our emphasis).

It was put another way at [196] as:

The assessment of whether the ISI Replacement Macros reproduce a substantial part of the CA URT Macros involves a consideration of both qualitative and quantitative elements.  As stated earlier, a qualitative assessment involves consideration of functionality, while a quantitative assessment involves consideration of textual similarity.

Takeaways

There are a number of things that a Court will take into account when determining what constitutes ‘substantial reproduction’.  In the case of computer code a purely textural (side by side) comparison is unlikely to be sufficient.  Ultimately, the Court will consider the ‘essential or material’ features of the work being reproduced with a view to a qualitative test of substantiality. The use of even a single code library can be enough to constitute a substantial part of a computer program and be sufficient to constitute copyright infringement.

Links and further references

Cases on copyright infringement in computer code

Autodesk Inc v Dyason (No 2) [1993] HCA 6
CA Inc v ISI Pty Ltd [2012] FCA 35
Data Access v Powerflex [1999] HCA 49
IceTV Pty Ltd v Nine Network Australia Pty Ltd [2009] HCA 14
Intelmail Explorenet Pty Ltd v Vardanian (No 2) [2009] FCA 1018
IPC Global Pty Ltd v Pavetest Pty Ltd (No 3) [2017] FCA 82
JR Consulting & Drafting Pty Ltd v Cummings [2016] FCAFC 20
TICA Default Tenancy Control Pty Ltd v Datakatch Pty Ltd [2016] FCA 815

Legislation

Copyright Act 1968 (Cth)

Further information about software and copyright infringement

If you need assistance to with any litigious matter involving software and copyright infringement, contact us for a confidential and obligation-free discussion:

[1] IPC Global Pty Ltd v Pavetest Pty Ltd (No 3) [2017] FCA 82, [162].

[2] IceTV Pty Ltd v Nine Network Australia Pty Ltd [2009] HCA 14, [40].

[3] IPC Global Pty Ltd v Pavetest Pty Ltd (No 3) [2017] FCA 82 [13].

[4] CA Inc v ISI Pty Ltd [2012] FCA 35 at 30 this may have to be in a separate affidavit to the experts.

[5] CA Inc v ISI Pty Ltd [2012] FCA 35 from 186 – “CA contends that Mr Melito’s approach to the comparison of the CA URT Macros and the ISI Replacement Macros is ‘fundamentally flawed’ because Mr Melito evaluates the form, function and differences between the two sets of macros, when instead he should have been focusing on the similarity between them”.

[6] CA Inc v ISI Pty Ltd [2012] FCA 35 at 30 this may have to be in a separate affidavit to the experts.

[7] CA Inc v ISI Pty Ltd [2012] FCA 35 from 186 – “CA contends that Mr Melito’s approach to the comparison of the CA URT Macros and the ISI Replacement Macros is ‘fundamentally flawed’ because Mr Melito evaluates the form, function and differences between the two sets of macros, when instead he should have been focusing on the similarity between them”.


Related insights about software and copyright infringement

  • Canva – who owns the artwork created by users?

    Canva – who owns the artwork created by users?

    The general rule about ownership of copyright in a literary or artistic work is that copyright vests in the ‘original author’, as per section 35(2) of the Copyright Act 1968 (Cth) (Copyright Act).  From there, ownership depends on whether or not the original author is doing the work within the scope of their employment, in…

    Read more …

  • QITC IT contracts framework an introduction

    QITC IT contracts framework an introduction

    In August 2017, the Queensland Government introduced the Queensland Information Technology Contracting (QITC).  The QITC framework replaces the Government Information Technology Contracting (GITC) framework.  It was designed for the purpose of guiding all Queensland Government Information and Communications Technology (ICT) contracts.

    Read more …

  • Understanding contributory liability in patent infringement

    Understanding contributory liability in patent infringement

    In Australia, the Patent Act 1990 (Cth) provides protection for inventors by preventing others from using, making, or selling patented inventions without permission.  The Act also extends liability to parties that are not directly infringing patents but may contribute to or enable patent infringement by supplying a product.

    Read more …

  • Federal parliament enacts cyber security legislation

    Federal parliament enacts cyber security legislation

    On 25 November 2024, the Australian Parliament passed a suite of legislation, collectively referred to by the Australian Government as the Cyber Security Legislative Package 2024.  The purported impetus for this legislation was a series of high-profile data breaches in 2022 and 2023.

    Read more …

  • Cross-border licensing – Maxim Media Inc. v Nuclear Enterprises

    Cross-border licensing – Maxim Media Inc. v Nuclear Enterprises

    The Federal Court decision in Maxim Media Inc. v Nuclear Enterprises Pty Ltd [2024] FCA 1443 involved an interlocutory application seeking injunctive relief by Maxim Media Inc. and Maxim Inc. (together, Maxim) (Applicants) for alleged breaches of sections 18 and 29 of the Competition and Consumer Act 2010 (Cth), passing off and infringement of a…

    Read more …

  • Domain name disputes – a summary of the process

    Domain name disputes – a summary of the process

    A domain name is a string of text that maps to an alphanumeric IP address, enabling users to access websites through client-side software.[1]  Domains can be valuable business assets, and they frequently become the subject of disputes regarding the legitimacy of their registration among organisations with competing rights.

    Read more …

  • New OAIC guidance on Artificial Intelligence

    New OAIC guidance on Artificial Intelligence

    On 21 October 2024, the Office of the Australian Information Commissioner (OAIC) published two (2) new guides on artificial intelligence (AI), purportedly in effort to make privacy compliance easier for business.

    Read more …

  • Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence (AI) is commonly thought of as the capacity of computer systems to execute tasks that usually need human intelligence, such as learning, reasoning, and making decisions.[1]  It covers a range of specialised fields, each focusing on different functions.  For example, machine learning allows computers to learn from data, computer vision enables them to…

    Read more …

  • Misuse of confidential information within source code

    Misuse of confidential information within source code

    In Australia, computer code can amount to confidential information as well as being subject to copyright protection.  In some cases the two things overlap as was the case in decision of the Court in Optus Networks Pty Ltd v Telstra Corporation Ltd (2010) 265 ALR 281; [2010] FCAFC 21.

    Read more …

Send this to a friend