6)what type of legal protection could be obtained for a novel software algorithm?

Algorithm developers, programmers, and other software creators often ask themselves these questions: can software be protected? Should I worry about protecting it? What is that for?

Without a doubt, we should protect these creations in order to exploit them in the market without worrying that third parties may exploit them and even claim their ownership. Protection through the different ways Intellectual Property offers also helps us make profitable these creations, for example, by granting licenses of use to third parties.

But the big and first question is: can software or an algorithm be protected? The answer is yes, and to do so, we should analyze the different types of protection into which software or an algorithm might fit.

Software Patent

There is a tendency to assert that software is not patentable; however, our smartphones have thousands of patents inside them. The Spanish Patent Law, in Article 4, considers that computer programs are not patentable. Nevertheless, if we refer to computer-implemented inventions and the rest of the patentability requirements are fulfilled, we could obtain patent protection.

The difficulty lies in fulfilling the remaining requirements a patent should have, like novelty, inventive step, and industrial applicability, which adds the technical character for countries belonging to the European Patent Convention, i.e., that the invention solves a technical problem. In these requirements, we find the majority of obstacles to applying for a patent.

In addition, each Intellectual Property Office has its practice in this regard. There is a false belief that the US Patent Office is more permissive when admitting software patents. In fact, since 2014 and after the “Alice Corp. v. CLS Bank” judgment, the requirements of US patent examiners have been tightened.

In any case, the advantages of protecting software by patent are clear. This figure grants the right to exclusive exploitation of the invention to its holder for 20 years. This time is more than sufficient to exploit technologies that are constantly advancing.

On the contrary, another series of factors may lead us to choose alternatives to the patent to protect software. For example, we should consider that all patent applications are made public 18 months after their filing, with the consequent disclosure of certain strategic aspects of the application. In addition, the geographical nature of patents means that rights are obtained only in the countries where they are granted, which implies high costs if we need broad geographical protection.

Copyright or Intellectual Property Rights to protect software

Intellectual property rights grant the holder the right to reproduce, distribute and transform the work in question.

Spanish Intellectual Property Law defines computer programs as “any sequence of instructions or indications intended to be used, directly or indirectly, in a computer system to perform a function or task or to obtain a specific result, whatever its form of expression and fixation.” Therefore, it can be concluded that this Law protects the source code by considering it a work.

In addition, the creator of the program is considered its author and holder of intellectual property rights. Therefore, when a company hires a software developer for creating a program, it should contractually state the assignment of the exploitation rights in favor of the company.

We should bear in mind that the only that protects Intellectual Property in these cases is the code. Therefore, if a third party creates a software with similar functionalities to another one, it does not necessarily have to be considered that these rights are infringed.

Nevertheless, this formula has significant advantages, such as international protection of the code, without the need to apply for the rights before any patent and trademark office; it would be enough with the accreditation of its authorship. In this sense, technologies, like Blockchain, help us accredit the authorship of a work duly if necessary.

This authorship can also be declared through the Intellectual Property Registry. But this is a merely declarative registry, and it demands numerous requirements, which usually pose barriers for rights holders. For example, one of them is the assignment, before a notary public, of the intellectual property rights of the software creators -who are typically several and not always with a direct employment relationship with the company. These requirements hinder the expedite of the process, which is essential when talking about software and technologies that evolve as fast as software and algorithms.

As an alternative to these traditional evidence means, there are others, such as certification of evidence from digital files through Blockchain. In ClarkeModet, we have a proprietary solution to certify any intangible asset, such as software or an algorithm. Our platform enables us to certify the authorship and, therefore, the ownership of the rights. It is an expedited and secure system that helps us certify authorship in less than a minute without requiring the file to exit our organization.

This evidentiary means applied to this type of asset is the most recommended due to its expedience, versatility, and security.

Software or algorithm as a Business Secret

Since 2019, in Spain, there has been a Business Secret Law that guarantees the protection through this legal figure of any information or knowledge that meets the requirements to be considered as such.

To consider an algorithm or software as a trade secret, we should first consider the confidentiality or secrecy of the software or algorithm itself. That implies that if the software’s source code is published, it can never be considered a business secret since it has already been disclosed. Therefore, our software must be encrypted so that it cannot be reproduced by reverse engineering when it is on the market.

This secrecy does not prevent the source code or the software itself from being communicated to third parties, but it should be considered that third parties should sign non-disclosure agreements (NDAs).

Furthermore, other legal and technical measures should be adopted for the software or algorithm to be considered secret. For example, the clauses that should be signed by employees who have access to it and internal training and policies in this regard, all of which are particularly relevant -mainly once employees finish their employment relationship with the company. Measures should also be implemented to prevent access to the secret in some instances, or to limit it, secure storage, etc.

Finally, to argue the existence of a business secret, it should be formally identified as such. Usually, companies turn to the notary to make the notarial filing of business secrets, with the disadvantages mentioned above related to the lack of immediacy of the process and high costs associated with this method.

In this sense, although these traditional means are perfectly valid, we can find other more expedited and secure alternatives. Here, Blockchain appears again. It is a technology, as mentioned above, that will allow us to certify the files of business secrets without those exiting the secret’ owner company and with the expediency already mentioned.

In any case, the main advantage of protecting software through business secrets is that it will allow us to take actions, such as cessation, prohibition to manufacture or trade, etc., against third parties infringing Trade Secret Law.

We should consider that a business secret will be incompatible with a software patent from the time the patent was published, as long as the source code was developed in the patent specification. However, it will be compatible during the whole patent application process. Both can coexist for greater and interesting protection.

Conclusion: Which is the best way to protect software and algorithms?

After analyzing the different forms of protection, the most important recommendation is to have an expert helping us to analyze which option or combination of options is the most suitable for protecting software in each case.

In any case, and as we have seen, we can always count on intellectual property rights, which are not incompatible with other rights, so it is important that the first measure to adopt is to have evidence of the authorship of the software or algorithm.

It is also essential to pay special attention to contractual relationships with third parties, whether with the software developers or with potential licensees of the software.

Finally, we should take advantage of all the benefits that today’s technology offers us to deal with the process for software protection. As we have seen, Blockchain is an optimal tool for generating evidence in the simplest, expedite, and secure way and with all the guarantees.

Contact us if you would like to know all the advantages of Blockchain to protect your software or algorithms or explore other protection formulas.

¿Te ha parecido interesante? ¡Compártelo!

There are essentially four types of intellectual property rights relevant to software: patents, copyrights, trade secrets and trademarks. Each affords a different type of legal protection. Patents, copyrights and trade secrets can be used to protect the technology itself.

What data protection technology could you implement in order to restrict the type of activity that users could employ in digital products that they have purchased or rented?

What data protection technology could you implement in order to restrict the type of activity that a user could employ on digital products that they have purchased or rented? Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

What data type provides for whole numbers only?

The INTEGER data type stores whole numbers that range from -2,147,483,647 to 2,147,483,647 for 9 or 10 digits of precision.

When should you use hexadecimal notation?

Hexadecimal is a numbering system with base 16. It can be used to represent large numbers with fewer digits. In this system there are 16 symbols or possible digit values from 0 to 9, followed by six alphabetic characters -- A, B, C, D, E and F.

What is the most common character set used for coding to represent text in computers?

ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet. In standard ASCII-encoded data, there are unique values for 128 alphabetic, numeric or special additional characters and control codes.