Legal protection of databases

Data is the new currency in our contemporary digital era and as such it plays a vital role for the success of every business enterprise. Accordingly, databases are a key infrastructure component of the fast-growing digital economy. They are an important tool that could allow a business to harness and utilize the power of data…Continue reading

Patent protection of computer programs (part 2)

The core purpose of granting patent rights is not only to reward the inventor but above all to create strong incentives for innovation across all sectors of the economy. It is because of such incentives that we are seeing increased investments in new technology and more pronounced trends of commercialization of groundbreaking products and processes.…Continue reading

Patent protection of computer programs (part 1)

Back in the 1960s computer programs did not have the status of standalone products. They were written specifically for a given mainframe computer and were bundled together with the hardware as an offering to the end customers. Accordingly, computer programs had a secondary role as mere accessories to hardware. This started to change at the…Continue reading

Forms of expression of a computer program protected under copyright

Nowadays, the copyright system is the dominant legal framework for protection of computer programs. However, this was not always the case. Back in the 1970s, there was strong competition between the patent and copyright systems for taking the throne in governing IP protection of software. Copyright was deemed a good fit as computer programs in…Continue reading

Software Licensing: the proprietary model and the open source model

A software license resembles a rental agreement. The vendor retains ownership of the intellectual property rights in the software but grants a third party with a limited right to use it for a certain period of time. However, not all licensing models are created equal. Significant differences exist between the traditional licensing model of proprietary…Continue reading