header-logo header-logo

28 February 2014 / Tony Sykes
Issue: 7596 / Categories: Features , Profession
printer mail-detail

Uncovering the tracks

web_sykes

Tony Sykes discusses strategies for identifying intellectual property theft

Over the last three years IT Group has seen a significant increase in the number of instructions relating to software theft. Increasingly, we are deploying techniques over and above the basic test of whether or not in our opinion two pieces of code are substantially the same, whether one derived from the other or whether they contain shareware available in the public domain. Those techniques include the analysis of “white space”, the investigation of the potential theft process (e-mail, FTP, USB etc.), the analysis of circumvention techniques and forensic dating—which came first? This short article discusses these techniques and how they apply to the available legislation—the Copyright, Designs and Patents Act 1988 (CDPA 1988) and the amendments arising from the EU Copyright Directive.

 

While the ultimate test is the application of one or more measures offered by CDPA 1988, the uncovering of the tracks to show that the original work was stolen, removed, or copied often provides very persuasive supporting evidence.

“White space” analysis

White space is the term used to describe the regions

If you are not a subscriber, subscribe now to read this content
If you are already a subscriber sign in
...or Register for two weeks' free access to subscriber content

MOVERS & SHAKERS

Hogan Lovells—Lisa Quelch

Hogan Lovells—Lisa Quelch

Partner hire strengthens global infrastructure and energy financing practice

Sherrards—Jan Kunstyr

Sherrards—Jan Kunstyr

Legal director bolsters international expertise in dispute resolution team

Muckle LLP—Stacey Brown

Muckle LLP—Stacey Brown

Corporate governance and company law specialist joins the team

NEWS

NOTICE UNDER THE TRUSTEE ACT 1925

HERBERT SMITH STAFF PENSION SCHEME (THE “SCHEME”)

NOTICE TO CREDITORS AND BENEFICIARIES UNDER SECTION 27 OF THE TRUSTEE ACT 1925
Law firm HFW is offering clients lawyers on call for dawn raids, sanctions issues and other regulatory emergencies
From gender-critical speech to notice periods and incapability dismissals, employment law continues to turn on fine distinctions. In his latest employment law brief for NLJ, Ian Smith of Norwich Law School reviews a cluster of recent decisions, led by Bailey v Stonewall, where the Court of Appeal clarified the limits of third-party liability under the Equality Act
Non-molestation orders are meant to be the frontline defence against domestic abuse, yet their enforcement often falls short. Writing in NLJ this week, Jeni Kavanagh, Jessica Mortimer and Oliver Kavanagh analyse why the criminalisation of breach has failed to deliver consistent protection
Assisted dying remains one of the most fraught fault lines in English law, where compassion and criminal liability sit uncomfortably close. Writing in NLJ this week, Julie Gowland and Barny Croft of Birketts examine how acts motivated by care—booking travel, completing paperwork, or offering emotional support—can still fall within the wide reach of the Suicide Act 1961
back-to-top-scroll