Document Type : Research/Original/Regular Article

Author

Abstract

The term “reverse engineering” refers to the process of discovering a device, object, or system through analysis of its structure, function, and operation. Reverse engineering has its origins in the analysis of hardware for military equipments. Since this science may be used for re-production of a device or system, many legal issues come up from the view of intellectual property, economic and competition law which should be considered. This paper is discussing the concept, advantages, disadvantages and other aspects of reverse engineering from a comparative legal perspective. In Iran there are different statutes about the protection of software, copyright and industrial properties usable for finding legal rule of responsibility for reverse engineering and its exceptions. In this paper I have considered these subjects with a comparative survey on the law and case law of US and UK.  

Keywords

-     امامی، نورالدین، حق مخترع (مطالعه تطبیقی، فصلی از مالکیت فکری)، چاپ یکم، انتشارت دانشگاه تهران، 1350.
-   انصاری، باقر، «شرایط اثر قابل حمایت در نظام مالکیت ادبی و هنری (کپی‌رایت)»، مجله تحقیقات حقوقی دانشکده حقوق دانشگاه شهید بهشتی، شماره 45، بهار و تابستان، 1386.
-   باقری، محمود؛ و مریم گودرزی، «مقایسه نظام حمایتی اسرار تجاری و نظام حق اختراع»، فصلنامه حقوق دانشکده حقوق و علوم سیاسی دانشگاه تهران، سال سی و نهم، شماره 1 (پیاپی 9)، بهار 1388.
-   جعفرزاده، میرقاسم؛ و اصغر محمودی، «شرایط ماهوی حمایت از اختراع در نگاه رویه قضایی و اداره ثبت اختراعات»، مجله تحقیقات حقوقی دانشکده حقوق دانشگاه شهید بهشتی، شماره 42، پاییز و زمستان 1384.
-     زرکلام، ستار، حقوق مالکیت ادبی و هنری، چاپ نخست، انتشارات سمت، تهران، 1387.
-      Behrens, Brian C. & Reuven Levary, , “Legal Aspects  ـ Software Reverse Engineering and Copyright: Past, Present and Future”, John Marshall Law Review, Vol. 31 (1), 1997-98.
-      Byrne, Edward. J, “A Conceptual Foundation for Software Re-Engineering”, ICSM Conference, November 1992.
-      Finkel, Evan, “Copyright Protection for Computer Software in the Nineties”, Santa Clara Computer & High Technology Law Journal, Vol. 7, 1991.
-      Ignatin, Gary R, “Let the hackers hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility”, University of Pennsylvania Law Review, Vol. 140, 1999. 
-      Lande, Robert H. & Sturgis Sobin, , “Reverse Engineering of Computer Software and U.S. Antitrust Law”, Harvard Journal of Law & Technology, Vol. 9, 1996.
-      Lederman, Eli, “Criminal Liability for Breach of Commercial Confidential Information  ـ Scope and Trend”, Emory Law Journal, Vol. 38, 1989.
-      Mahajan, Anthony J, “Intellectual Property, Contracts, and Reverse Engineering After ProCD: A Proposed Compromise for Computer Software”, Fordham Law Review, Vol. 67, 1999.
-      McGowan, David, Free Contracting, Fair Competition, and Article 2B: Some Reflections on Federal Competition Policy, Information Transactions, and “Aggressive Neutrality,” Berkeley Technology Law Journal, Vol. 13, 1998.
-      Moohr, Geraldine, “Federal Criminal Fraud and the Development of Intangible Property Rights in Information”, University of Illinois Law Review, 2000.
-      Ruhl, Christopher A., “Corporate and Economic Espionage: A Model Penal Approach For Legal Deterrence to Theft of Corporate Trade Secrets and Proprietary Business Information”, Valparaiso University Law Review, Vol. 33, 1999.
-      Simon, David R & Frank Hagan, White-Collar Deviance, Allyn & Bacon, Boston 1999.
Uhrich, Craig L., “The Economic Espionage Act--Reverse Engineering and the Intellectual Property Public Policy”, Michigan Telecommunications & Technology Law Review, Vol. 7, 2001