A Brief Overview of Computer Software Protection in China
#China
The 21st century is truly the era of the IT industry, with now software incapsulating the world in all aspects of our lives.
When companies treat software as intellectual property, they are exercising their rights over the control of the usage of such software and how it may become public. Otherwise, there may be occurrences of usage without permission, losing the right to be paid for the use of the software and in extreme cases, the risk of losing the right to use the software which you created altogether.
This article glances over the vast array of content of intellectual property protection involved in computer software and lists the feasible paths of intellectual property protection.
Generally speaking, a variety of intellectual property rights may exist within one piece of software, therefore there’s an obligation on companies to implement a system of comprehensive protection.
Software Copyright Registration:
Registering your copyright with the Copyright Office, even though software copyright is protected automatically on the completion of the creation and its registration is not mandatory, is an important step to undertake for legal purposes. It would be highly recommended to register in order to (i) obtain a valid and enforceable title in China to prove the ownership of the work (software) and the priority of its creation and thus (ii) easing the burden of proving the aforesaid aspects in cases of dispute/infringement.
The object of copyright registration for software shall be the programming code and its related description documents, excluding the processing flow, algorithm, operation mode, etc. in the process of software operation, but generally excluding the graphical user interface (this belongs to general copyright or patent protection) generated by the computer code during operation.
For software copyright registration, as long as the form of the material submitted is in line with the requirements and does not violate the provisions of the Copyright Law, registration will be granted without going through a substantive review. Software copyrights can be protected without being publicized and can be granted within a short timeframe, normally within 1-1.5 month.
Copyright law only protects the expression of the work, not the idea of the work, if the same technical solution is implemented by software, as long as the expression is different, there may be no infringement. However, the most valuable part of the software is the algorithm model, organization structure, processing flow and therefore, there are obvious defects in using copyright law to protect computer software.
Trade Secret Protection:
In view of the deficiency of copyright registration in protecting computer software, trade secret protection can make up for this shortfall, as the object of trade secret protection is the information itself. Whether it is a material carrier with external forms or technical code, it can be protected through trade secrets. Therefore, the “ideas, processes, operation methods or mathematical concepts” of the development software embodied in programs and documents may be protected by trade secrets.
Software Patent Protection:
According to the Chinese patent examination guidelines, computer software itself is not the object of a patent, but inventions containing computer programs may apply for patent protection. Only if the computer software is related to a certain technical field, involves at least one technical problem and can also produce a certain technical effect, can the technology containing the computer program obtain patent protection. In practice, this is quite rare and would require a dedicated assessment of the software.
The protected object of a trade secret and an invention patent may overlap and as an invention patent is protected by initially divulging sensitive information to the public in exchange for protection, an applicant needs to distinguish which information in its software programs and documents needs to be protected by trade secrets and which needs to be protected by applying for invention patents.
Trademark Protection:
Software is also a commodity and can also be protected through trademarks. For example, software operation manuals, publicity materials and sales web pages can all be adorned with the company’s trademark. In addition, the computer software trademark can also be embedded into the software program interface, so that when a computer runs the software program, the user can see the trademark displayed in the graphical user interface.
Conclusion:
In addition to the protection of the software through the means outlined above, the stipulation of the intellectual property rights ownership in the contract with the software developers is necessary to avoid further disputes in terms of ownership and related rights and/ or benefit.
We at D’Andrea & Partners Legal Counsel constantly monitor the latest developments in the China IP market. Please feel free to contact us at info@dandreapartners.com for more information.
Preface As the leader of China’s economic development and the forefront of reform and opening up, Shanghai has always attached great importance to attracting foreign investment. Recently, the Shanghai Government deliberated and adopted a series of policy measures to promote the sustained economic recovery, and at the same time actively responded to the Action Plan
In recent years, the winter sports industry has seen unprecedented global growth, particularly with the successful hosting of the Beijing 2022 Winter Olympics and the upcoming Milan-Cortina 2026 Winter Olympics. These events have not only brought significant attention to winter sports but have also spurred a surge in international investment and collaboration. Legal sectors such
Introduction With the continuous improvement of labor laws and regulations, open-ended labor contracts, as a form of contract that provides stronger protection for the rights and interests of employees, have attracted increasing attention. In particular, whether employees have the right to demand the signing of open-ended labor contracts after two consecutive fixed-term labor contracts has
#China
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.