A Guided Tour of the Legal Implications of Software Cloning

Software Cloning is the typical example where an interdisciplinary approach may bring additional elements into the community's discussion. In fact, little research has been done in its analysis from an Intellectual Propriety Rights (IPRs) perspective, even if it is a widely studied aspect of software engineering. An interdisciplinary approach is crucial to better understand the legal implications of software in the IPR context. Interestingly, the academic community of software and systems deals much more with such IPR issues than courts themselves. In this paper, we analyze some recent legal decisions in using software clones from a software engineering perspective. In particular, we survey the behavior of some major courts about cloning issues. As a major outcome of our research, it seems that legal fora do not have major concerns regarding copyright infringements in software cloning. The major contribution of this work is a case by case analysis of more than one hundred judgments by the US courts and the European Court of Justice. We compare the US and European courts case laws and discuss the impact of a recent European ruling. The US and EU contexts are quite different, since in the US software is patentable while in the EU it is not. Hence, European courts look more permissive regarding cloning, since “principles,” or “ideas,” are not copyrightable by themselves.

[1]  Daniel M. Germán,et al.  License integration patterns: Addressing license mismatches in component-based development , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[2]  Akito Monden,et al.  Software quality analysis by code clones in industrial legacy software , 2002, Proceedings Eighth IEEE Symposium on Software Metrics.

[3]  Chanchal K. Roy,et al.  A Survey on Software Clone Detection Research , 2007 .

[4]  Keith N. Hylton Antitrust Law and Economics , 2010 .

[5]  Hans-Gerhard Groß,et al.  Self-certification and trust in component procurement , 2005, Sci. Comput. Program..

[6]  Søren Riis What makes a chess program original? Revisiting the Rybka case , 2014, Entertain. Comput..

[7]  Giancarlo Succi,et al.  Legal Issues Regarding Software Use and Reuse within the European Union Legislation , 2015, CIT 2015.

[8]  Alberto Sillitti,et al.  Assessment of software developed by a third-party: A case study and comparison , 2016, Inf. Sci..

[9]  J. Howard Johnson,et al.  Substring matching for clone detection and change tracking , 1994, Proceedings 1994 International Conference on Software Maintenance.

[10]  Jan A. Bergstra,et al.  About "trivial" software patents: The IsNot case , 2007, Sci. Comput. Program..

[11]  Michael W. Godfrey,et al.  Supporting the analysis of clones in software systems , 2006, J. Softw. Maintenance Res. Pract..

[12]  Michael W. Godfrey,et al.  “Cloning considered harmful” considered harmful: patterns of cloning in software , 2008, Empirical Software Engineering.

[13]  Miryung Kim,et al.  An ethnographic study of copy and paste programming practices in OOPL , 2004, Proceedings. 2004 International Symposium on Empirical Software Engineering, 2004. ISESE '04..

[14]  Alberto Sillitti,et al.  Comparing OpenBRR, QSOS, and OMM Assessment Models , 2010, OSS.

[15]  石井 六哉,et al.  The 27th Annual Conference of the IEEE Industrial Electronics Society (IECON'01)の報告 , 2002 .

[16]  Tullio Vernazza,et al.  Components and data-flow applied to the integration of Web services , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).

[17]  R. Koschke,et al.  Frontiers of software clone management , 2008, 2008 Frontiers of Software Maintenance.

[18]  Paolo Ciancarini,et al.  Detecting clones in game-playing software , 2009, Entertain. Comput..

[19]  Daniel M. Germán,et al.  An exploratory study of the evolution of software licensing , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.

[20]  Alberto Sillitti,et al.  Reverse engineering: a European IPR perspective , 2016, SAC.

[21]  Per Runeson,et al.  Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.

[22]  Kai‐Uwe Kühn Law, Economics and Antitrust: Towards a New Perspective , 2006 .

[23]  Thierry Lavoie,et al.  Challenging cloning related problems with GPU-based algorithms , 2010, IWSC '10.

[24]  Stéphane Ducasse,et al.  Insights into system-wide code duplication , 2004, 11th Working Conference on Reverse Engineering.

[25]  Michael W. Godfrey,et al.  Supporting the analysis of clones in software systems: Research Articles , 2006 .

[26]  H. Jaap van den Herik,et al.  Plagiarism in game programming competitions , 2014, Entertain. Comput..

[27]  Maninder Singh,et al.  Software clone detection: A systematic review , 2013, Inf. Softw. Technol..

[28]  References , 1971 .

[29]  Brenda S. Baker,et al.  On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.