{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:10:01Z","timestamp":1743264601507,"version":"3.40.3"},"reference-count":44,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1994,11,1]],"date-time":"1994-11-01T00:00:00Z","timestamp":783648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1994,11,1]],"date-time":"1994-11-01T00:00:00Z","timestamp":783648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law &amp; Security Report"],"published-print":{"date-parts":[[1994,11]]},"DOI":"10.1016\/0267-3649(94)90121-x","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T12:31:12Z","timestamp":1042115472000},"page":"304-306","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intellectual property"],"prefix":"10.1016","volume":"10","author":[{"given":"Gary","family":"Lea","sequence":"first","affiliation":[]}],"member":"78","reference":[{"year":"1791","key":"10.1016\/0267-3649(94)90121-X_BIB1"},{"journal-title":"Author's Rights Law","year":"1957","key":"10.1016\/0267-3649(94)90121-X_BIB2"},{"journal-title":"Author's Rights Law","year":"1957","key":"10.1016\/0267-3649(94)90121-X_BIB3"},{"journal-title":"Paris Rev.","year":"1971","key":"10.1016\/0267-3649(94)90121-X_BIB4"},{"journal-title":"Paris Rev.","year":"1971","key":"10.1016\/0267-3649(94)90121-X_BIB5"},{"key":"10.1016\/0267-3649(94)90121-X_BIB6","unstructured":"Art. 1, sec. 8."},{"year":"1967","series-title":"Frisby v BBC","key":"10.1016\/0267-3649(94)90121-X_BIB8"},{"year":"1905","series-title":"Humphreys v Thompson","key":"10.1016\/0267-3649(94)90121-X_BIB9"},{"key":"10.1016\/0267-3649(94)90121-X_BIB10","first-page":"75","article-title":"Intellectual Property","author":"Bainbridge","year":"1992"},{"journal-title":"Gregory Committee Report","year":"1952","key":"10.1016\/0267-3649(94)90121-X_BIB11"},{"key":"10.1016\/0267-3649(94)90121-X_BIB12","unstructured":"Albeit effectively deployed in Moore v News of the World Ltd [1972] 1 QB 441."},{"key":"10.1016\/0267-3649(94)90121-X_BIB13","first-page":"310","article-title":"Intellectual Property","author":"Cornish","year":"1989"},{"key":"10.1016\/0267-3649(94)90121-X_BIB14","unstructured":"s77 & s80 respectively \u2014 the right against false attrbution was also preserved (s84)"},{"key":"10.1016\/0267-3649(94)90121-X_BIB15","unstructured":"Now codified at s1303 of the Copyright Act 1976."},{"key":"10.1016\/0267-3649(94)90121-X_BIB16_1","article-title":"US participation in the Berne Convention and high technology","volume":"107","author":"Motyka","year":"1989"},{"key":"10.1016\/0267-3649(94)90121-X_BIB16_2","volume":"202","author":"Pearson","year":"1989","journal-title":"\u201cCopyright and the Berne Convention\u201d 5 CL&P"},{"key":"10.1016\/0267-3649(94)90121-X_BIB17","unstructured":"E.g. the Visual Artists' Rights Act 1990."},{"first-page":"126","year":"1993","series-title":"Computer Law","key":"10.1016\/0267-3649(94)90121-X_BIB18"},{"key":"10.1016\/0267-3649(94)90121-X_BIB20","article-title":"Copyright and software protection as viewed from the \u2018traditional\u2019 sid e of copyright","volume":"3","author":"Blomqvist","year":"1992","journal-title":"151 RIDA"},{"key":"10.1016\/0267-3649(94)90121-X_BIB21","unstructured":"E.g. Australia, Canada."},{"key":"10.1016\/0267-3649(94)90121-X_BIB23","unstructured":"91\/250\/EEC (OJ L122\/42 (1992))."},{"year":"1988","series-title":"The legal protection of computer programs in Germany","author":"Lehmann","key":"10.1016\/0267-3649(94)90121-X_BIB24"},{"key":"10.1016\/0267-3649(94)90121-X_BIB26_1","article-title":"Computer software and the relevance of copyright","volume":"354","author":"Melville","year":"1980","journal-title":"EIPR"},{"key":"10.1016\/0267-3649(94)90121-X_BIB26_2","first-page":"205","article-title":"Legal protection of computer programs","volume":"204","author":"McFarlane","year":"1970","journal-title":"J Bus L"},{"year":"1964","series-title":"\u201cCopyright protection for computer programs\u201d 64 Colum L R 1274","author":"Banzhaf","key":"10.1016\/0267-3649(94)90121-X_BIB27"},{"key":"10.1016\/0267-3649(94)90121-X_BIB28","first-page":"222","article-title":"\u201cComputer programs - does the law provide an adequate protective mechanism?\u201d 56 AUJ 219","author":"Cohen","year":"1982"},{"key":"10.1016\/0267-3649(94)90121-X_BIB29","unstructured":"See, for example, Baker v Selden 101 US 99 (1879) (US) and Demory v Auviste-Guitard [1973] Ann Prop Ind 30 (France) (accounting systems unprotected by copyright and author's rights respectively)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB30","unstructured":"See 11 Bull Cop Soc 361 (1964)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB32","unstructured":"Starting with the District Court of the Northern District of California in GCA Corp v Chance & os 217 USPQ 718 (1982)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB33","unstructured":"See s1(1)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB34","unstructured":"s3(1)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB35","unstructured":"See the exclusions at s79(2)(a) and s81(2) respectively."},{"key":"10.1016\/0267-3649(94)90121-X_BIB36","first-page":"3","article-title":"Council Directive of 14 May 1991 on the Legal Protection of Computer Programs (91\/250\/EEC)","author":"Powell","year":"1994","journal-title":"10 CLSR"},{"key":"10.1016\/0267-3649(94)90121-X_BIB37","first-page":"129","article-title":"Computer program copyright and the Berne Convention","author":"Cornish","year":"1990","journal-title":"EIPR"},{"journal-title":"EIPR","first-page":"6","year":"1981","key":"10.1016\/0267-3649(94)90121-X_BIB38"},{"key":"10.1016\/0267-3649(94)90121-X_BIB39","unstructured":"Art. 2(1)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB40","article-title":"The protection of programs as literary and artistic property","volume":"181","author":"Gaudrat","year":"1986","journal-title":"128 RIDA"},{"volume":"28","journal-title":"Berne Convention and WIPO Committee Report","year":"1992","key":"10.1016\/0267-3649(94)90121-X_BIB41"},{"key":"10.1016\/0267-3649(94)90121-X_BIB42","first-page":"33","volume":"28","year":"1992","journal-title":"WIPO Committee Report"},{"key":"10.1016\/0267-3649(94)90121-X_BIB46","unstructured":"Art. 6bis(1)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB47","unstructured":"Art. 6bis(2)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB48","unstructured":"ibid."},{"key":"10.1016\/0267-3649(94)90121-X_BIB49","unstructured":"cf. Art. 15(2), Author's Rights Law (Japan)."},{"key":"10.1016\/0267-3649(94)90121-X_BIB50","unstructured":"cf. Art. 20(3), ibid."}],"container-title":["Computer Law &amp; Security Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:026736499490121X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:026736499490121X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T15:52:12Z","timestamp":1743263532000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/026736499490121X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,11]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1994,11]]}},"alternative-id":["026736499490121X"],"URL":"https:\/\/doi.org\/10.1016\/0267-3649(94)90121-x","relation":{},"ISSN":["0267-3649"],"issn-type":[{"type":"print","value":"0267-3649"}],"subject":[],"published":{"date-parts":[[1994,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intellectual property","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Report","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/0267-3649(94)90121-X","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1994 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}