{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:04:18Z","timestamp":1743221058440,"version":"3.40.3"},"reference-count":26,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1994,3,1]],"date-time":"1994-03-01T00:00:00Z","timestamp":762480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1994,3,1]],"date-time":"1994-03-01T00:00:00Z","timestamp":762480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Report"],"published-print":{"date-parts":[[1994,3]]},"DOI":"10.1016\/0267-3649(94)90102-3","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T12:31:12Z","timestamp":1042115472000},"page":"82-83","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Passing off and the protection of program look &amp; feel"],"prefix":"10.1016","volume":"10","author":[{"given":"Gary","family":"Lea","sequence":"first","affiliation":[]}],"member":"78","reference":[{"unstructured":"unreported, Ch.D., 19\/02\/93","key":"10.1016\/0267-3649(94)90102-3_BIB1_1"},{"key":"10.1016\/0267-3649(94)90102-3_BIB1_2","article-title":"Casenote: John Richardson Computers Ltd v Flanders & Chemtech Ltd","volume":"105","author":"Bull","year":"1993"},{"unstructured":"797 F.2d 1222 (1986)","key":"10.1016\/0267-3649(94)90102-3_BIB2"},{"unstructured":"trial transcript at p31","key":"10.1016\/0267-3649(94)90102-3_BIB3"},{"unstructured":"trial transcript at p88","key":"10.1016\/0267-3649(94)90102-3_BIB4"},{"unstructured":"trial transcript at p83","key":"10.1016\/0267-3649(94)90102-3_BIB5"},{"unstructured":"trial transcript at p96","key":"10.1016\/0267-3649(94)90102-3_BIB6"},{"unstructured":"799 F.Supp. 1006","key":"10.1016\/0267-3649(94)90102-3_BIB7"},{"unstructured":"960 F.2d 1465 (1992)","key":"10.1016\/0267-3649(94)90102-3_BIB8"},{"unstructured":"trial transcript at p43","key":"10.1016\/0267-3649(94)90102-3_BIB13"},{"unstructured":"see, for example, the COBOL data division and program specification case of TIPS v Daman [1991] FSR 171","key":"10.1016\/0267-3649(94)90102-3_BIB14"},{"unstructured":"s3(1) CDP 1988","key":"10.1016\/0267-3649(94)90102-3_BIB15"},{"unstructured":"s4(1) CDP 1988","key":"10.1016\/0267-3649(94)90102-3_BIB18"},{"unstructured":"s4(2) CDP 1988","key":"10.1016\/0267-3649(94)90102-3_BIB19"},{"unstructured":"s5(1) CDP 1988","key":"10.1016\/0267-3649(94)90102-3_BIB21"},{"unstructured":"[1896] AC 199","key":"10.1016\/0267-3649(94)90102-3_BIB23"},{"unstructured":"[1901] AC 217","key":"10.1016\/0267-3649(94)90102-3_BIB24"},{"unstructured":"[1979] AC 731","key":"10.1016\/0267-3649(94)90102-3_BIB25"},{"year":"1979","author":"Lahore","series-title":"Product simulation and the get up of goods","key":"10.1016\/0267-3649(94)90102-3_BIB26"},{"unstructured":"[1964] FSR 218","key":"10.1016\/0267-3649(94)90102-3_BIB27"},{"unstructured":"Edge v Nicholls [1911] AC 693","key":"10.1016\/0267-3649(94)90102-3_BIB29"},{"unstructured":"e.g. nightclub services; Ad-Lib Club v Granville [1972] RPC 673","key":"10.1016\/0267-3649(94)90102-3_BIB30"},{"unstructured":"Samuelson v Producers Distributing [1936] 1 Ch. 201","key":"10.1016\/0267-3649(94)90102-3_BIB31"},{"year":"1989","author":"Beutel","series-title":"Trade dress protection for the \u2018look and feel\u2019 of software","key":"10.1016\/0267-3649(94)90102-3_BIB33"},{"unstructured":"Hartford House v Hallmark Cards 6 USPQ 2d 2039 (1988)","key":"10.1016\/0267-3649(94)90102-3_BIB34"},{"unstructured":"Prudhomme v Procter & Gamble Co 24 USPQ 2d 1627 (1992)","key":"10.1016\/0267-3649(94)90102-3_BIB35"}],"container-title":["Computer Law &amp; Security Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0267364994901023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0267364994901023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:05:50Z","timestamp":1743134750000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0267364994901023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,3]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1994,3]]}},"alternative-id":["0267364994901023"],"URL":"https:\/\/doi.org\/10.1016\/0267-3649(94)90102-3","relation":{},"ISSN":["0267-3649"],"issn-type":[{"type":"print","value":"0267-3649"}],"subject":[],"published":{"date-parts":[[1994,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Passing off and the protection of program look & feel","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Report","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/0267-3649(94)90102-3","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1994 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}