Beruflich Dokumente
Kultur Dokumente
29-12-2016 (Page 1 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
owner who independently innovated the same product, (iv) may be disclosed for
Governmental purposes by employees.
Trade secret is protected under the Intellectual Property Law indirectly in India. In contemporary
communication convergence scenario, business world has changed and has become technology
oriented. Every one wishes to win the competition in the business world by whatever means
even applying the concept of trade secret, confidential information. For example, recipe or
formula for the product of Coca-Cola, blend of Barista coffee, formula of Nokia cell phone
software, formula of certain computer software are kept secret because their success in business
depends upon that particular and unique formula. These formulas, methods or processes remain
only with the proprietors or their employees who are trustworthy. The code name of Coca-Cola
formula i.e. "Merchandise7x" is known to some persons who signed the agreement for nondisclosure and it was kept at Vault Bank in Atlanta, Georgia. In the year 2006, three accused,
Edmund Duhaney of Decatur (GA.), Ibrahim Dimson of New York and Joya Williams were
arrested with the help of Federal Bureau of Investigation (FBI), USA. Joya William was a former
Secretary in Coca-Cola. In 2007, a Federal Court Jury in Atlanta found her guilty for conspiring
to sell trade secrets (sensitive marketing materials and test product sample) to an undercover
FBI agent for $ 1.5 million from Atlanta, the company's headquarter, and she was sentenced
upto 10 years in federal prison.1
Here a question may also arise about breach of trust and confidence. In the U.S.A., the Trade
Secret Law (1985) protects against theft, bribery or hiring of employees with the internet, fraud
and misappropriation or improper action. Sections 3 and 4 of the Uniform Trade Secret Act,
1979, provides that "When one company acquires another company's trade secret, the affected
company may seek injunctive relief, damages, punitive awards, costs and attorney fees". The
Act defines 'trade secret' as information including formula, pattern, compilation, programme,
data, device, method, technique or process that has independent economic value available from
only one source; and is the subject of reasonable efforts to maintain its secrecy. In Kewanee Oil
Co. v. Biran Corp2 the Supreme Court of USA explained that trade secret may consist of several
devices, method, compilation of information used in business to give opportunity to obtain
advantage in a competitive business oriented scenario over those who do not use it or who do
not even know it. The owner may disclose the confidential information to persons for the
purpose of business confidentiality i.e., to employees so that he will use it for expected purpose
or as licensee.3
The European Community
The European Patent Convention, referred "trade secret" as know-how, which means a body of
technical information which is secret, identified, substantial in any appropriate form and not
generally known or easily accessible. According to the Agreement on Trade-Related Aspects of
Intellectual Property Rights (TRIPS), trade secrets must not be readily accessible or generally
known to people who are related to it, it must have commercial value as a secret and proprietor
must take reasonable steps to maintain secrecy.
III. Trade Secret of Computer Software
Trade secret is Intellectual property but not similar to copyright, patent, design and trademark.
Generally, for protection of intellectual creation, it is required to be published or expressed to
public, but this is not so in the case of trade secret. In trade secret a proprietor keeps secrecy
for economic gains. However, the proprietor can disclose the same to a few individuals with a
condition not to disclose the same to others.
Other intellectual properties are protected during prescribed periods e.g., copyright for life of the
author plus sixty years, patent for twenty years, but trade secret is protected till its discloser to
public. Trade secret is applicable to any secret formula, process, method, technique, computer
device or computer programme. Computer software or programme consisting of source code and
object code which are in totality called as binary code. It is the process of arrangement of 0s and
29-12-2016 (Page 2 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
1s. This arrangement or programme is protected as "literary work" in India under Section 2 of
the Copyright Act, 1957 as amended in the year 1999.
Application of trade secret and patentability of computer software has raised complex problem
worldwide. Some say that the trade secret or confidential information and patentability of
invention both are relevant and applicable in case of computer software. Computer includes all
information processing devices under Section 2 of the Copyright Act, 1957. Therefore, trade
secret is applicable in case of mobile phone software, wireless software, laptop software and
related devices.
According to Steven Frank, "trade secrecy might well be the best method of protection for many
artificial intelligence programmes because these are generally produced for a single user or a
small group of users, which would make it practical to issue licenses and identify any violators."4
Stacey L. Edger says that trade secret laws vary from state to state and country to country, but
generally they enforce strict penalties for violation of trade secrecy agreements. The problem to
protect software is that the product (programme) is the idea itself. The purchaser of software
package purchases only a working copy of programme on a disk along with some instructions
about how to use it. The programme may be in binary code or machine code,5 but the idea of
operation is revealed in the programme operation and documentation. Computer programme
compact disks or floppy disks are usually sold with terms and conditions of license printed on the
sealed box that breaking of seal means acceptance of those terms and conditions. This process
of license is usually used in mobile phones boxes for packaging software products e.g., Nokia
very often uses this process while selling mobile phones showing to purchasers that this is to
maintain security and confidentiality of the product itself. This is a process of trade secret which
is also applicable for computer software or any information processing device. Not only that,
sometimes software are available and accessible to download from World Wide Web or internet
with terms, conditions and licensing process protecting trade secret through agreement and
logon password system.
IV. Trade Secret and Reverse Engineering of Computer Software
Trade secret and reverse engineering are problematic issues in digital era. Reverse engineering
may be called the process or method to access a device or a computer6 software programme
and analyse it to create a new device or computer software programme or to develop it for
research purpose without actually copying from original invention. This process of reverse
engineering will come under the garb of fair and honest use allowed by law.
There are several objectives of reverse engineering such as (a) in case source code is lost, this
process can be used to remine the code; (b) to know and study how certain programmes
perform or operate certain device; (c) to improve or develop the performance of computer
programme and interoperability of computer software; (d) to correct error in the computer
programme, if any, when source code is not available; (e) to identify computer virus, worms,
Trojan horse; (f) to achieve interoperability of computer programme, are good grounds to allow
reverse engineering.7
Reverse engineering is the method of recompilation or dissimilation of source code and object
code which is called binary code of computer programme or software. Binary code is useful to
operate other computer programmes as well as for interoperability of other computers or
computer programmes. In case of Patent, this operability or software to perform operation may
be disclosed or kept as confidential and undisclosed method or process as a trade secret.
Sometimes in the patent application, specification list or list of information about work and utility
of devices also may be mentioned. It may even be mentioned on the package box of the product
without disclosing source code because source code is that part of software which has
information about method / process to operate certain programme or certain device. Without
this information there may be a possibility of non-performance of certain programme or device
e.g. there is a software Compact Disk (CD) to run a particular printer and it is not available on
the internet to download or even the patent application with specification does not disclose
29-12-2016 (Page 3 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
process or method of its operation i.e., source code to perform printer, in this case that
particular printer will remain inoperative as such. However, it may be given within the sealed
product box to keep trade secret and breaking the seal will be treated as consent to buy that
particular product with those terms and conditions as written on the product or package box.
Reverse Engineering is a best way to disclose and discover the method, process or technique of
popular product. Therefore, Reverse Engineering is a strong defence which may be taken by a
Defendant. But a prosecutor on behalf of the proprietor, to win the case, has to find out whether
access to trade secret and object of reverse engineering was illegal or unlawful.
V. Patentability of Computer Software
A. Legislative approach in India: The term "Patent" has been defined in Section 2(m) of the
Patent Act, 1970 as "Patent means a patent for any invention granted under this Act." Under
Section 2(j) of the said Act "invention" is a new product or process involving an inventive step
and capable of industrial application. The word "inventive step" means a feature that makes the
invention not obvious to a person skilled in the art. Therefore, when a computer programme
fulfills all the above requirements, it may be treated as patentable invention.
Before 2005 amendment,8 computer programme was not recognised as patentable invention.
However, by the amendment in the year 2004,9 Section 2 clause (k) now provides that "a
computer programme per se other than its technical application to industry or a combination
with hardware is not patentable invention for the Patent Act, 1970 in India" i.e., only software or
computer programme is not patentable invention. But "literary work" includes computer
programme and is protected under Section 52(a) to (d) of the Copyright Act, 1957 in India as
amended in the years 1994 and 1999. However, when computer programme is combined with
hardware or when it will have technical industrial application then it will be treated as patentable
invention under the Patent Act.10 Section 11A, Sub-section (1) provides that "save as otherwise
provided, no application for patent shall ordinarily be open to the public for such period as may
be prescribed." This means that generally patent applications of invention including computer
software will be disclosed or open to public but there is also scope of protecting it under trade
secret. That inventor or applicant who desires not to disclose the specific and competitive
information of invention may apply to the controller for not disclosing it if (a) it falls under
Section 35, where secrecy direction is imposed for defense related subject matters, or (b) the
application has been abandoned under sub-section (1) of Section 9 or (c) the application has
been withdrawn three months prior to the period specified under sub-section (1).11
For defence purpose, under Section 35, all Orders of the controller giving directions as to secrecy
as well as all Orders of the Central Government under Chapter VII of the Patent Act, 1970 shall
be final and shall not be called in question in any court on any ground whatsoever as provided
under Section 41 of the said Act. Under Section 42 of the Act, the controller has the ultimate
authority even to disclose information concerning an application for patent or a specification filed
in pursuance thereof to the Central Government. As Section 42 provides "nothing in this Act
shall be held to prevent the disclosure by the controller of information."
However, Section 118 of chapter XX of the said Act imposes penalties for contravention of
secrecy provision relating to certain inventions. This section runs thus: "if any person fails to
comply with any direction given under Section 35 or makes or causes to be made an application
for the grant of a patent in contravention of Section 39, he shall be punished with imprisonment
for a term which may extend to two years or with fine or with both".
We can say that there is no clear provision of trade secret in the Indian patent law or any other
relevant law, though the Information Technology Act, 2000 under Section 65 prohibits tampering
with computer source documents knowingly and intentionally. When source code is used for a
computer, computer programme, computer system or computer network which is necessary to
be kept or maintained according to law, if any one conceals, destroys or alters it or causes
another to do the same, it will be treated as tampering source documents. The tampering
includes concealment or destruction or alteration of any computer source code or causing
29-12-2016 (Page 4 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
another to do these. Therefore, even abettors are to be punished for this offence. This section
prescribes punishment with imprisonment up to three years, or with fine which may extend up to
rupees two lakh or with both.
Section 65 runs thus: Tampering with computer source documents: Whoever knowingly or
intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal,
destroy, alter any computer source code used for a computer, computer programme, computer
system or computer network, when the computer source code is required to be kept or
maintained by law for the time being in force, shall be punishable with imprisonment up to three
years, or with fine which may extend up to two Lakh rupees, or with both.
Explanation: For the purposes of this section, 'computer source code' means the listing of
programmes, computer commands, design and layout and programme analysis of computer
resource in any form.
Section 43(b) of the Information Technology Act, 2000 provides that when any person without
authorisation from the owner or any competent person (who can give permission); access,
downloads, copies, extracts any data, data base or information from any computer, computer
network, computer system, computer data or data base or data stored in removable medium
(CD, Floppy, DVD P etc.); or causes similar damage then he shall be liable to pay damages not
exceeding one crore rupees by way of compensation. Therefore, these two sections may be
applicable for the protection of computer software and trade secret of patentable software in
cyberspace.
Cases: In February, 2007 in Mumbai, an employee of Tata Group leaked and passed on some
sensitive information to an employee of Reliance Communications for Rs. 40,000 in cash. Tata
and Reliance were trying for acquisition of Srilanka's fifth GSM-based mobile operation service
where VSNL has been in operation since 2003. The stolen data were of new business model and
decisions of VSNL for Srilanka. The alleged accused was a former employee of VSNL and
presently associated with Tatas.12
These are examples of cyber fraud and infringement of the right to confidential information. In
Chennai cyber fraud case,13 the accused downloaded confidential information from internet to
commit ATM robbery and was arrested by Chennai police though he was released thereafter.
After Karan Bahrees case of cyber fraud in June-July 2005, Dr. Manmoham Singh, Indian Prime
Minister, directed NASSCOM to amend and adopt more effective data protection laws, security
measures and to increase penalties for cyber crime in tune with the UK, the USA and the rest of
the World. In Pune Cyber fraud,14 about 16 accused were arrested under Section 65 of the
Information Technology Act, 2000. The accused were authorised to access the confidential
information of Citibank account holders as the bank was e-banking service provider. The accused
accessed password/Pin information of about 5 account holders. The accused were arrested while
they were about to check the fund transfer in a Co-operative Bank in Pune.15 These instances
show that India needs clear trade secret laws especially while it is related to patentability of
computer software and reverse engineering.
B. Scenario in the USA: The US Patent Code (35 U.S.C.) provides that " whoever invents or
discovers any new and useful process, machine, manufacture or composition of matter, or any
new and useful improvement thereof, may obtain a patent thereof, subject to the conditions and
requirements of this title". In Gottschalk v. Benson16 the US Supreme Court discussed the issue
of computer programe and patent law. The purpose of computer programme was to solve
problem which was very much mathematical i.e., to convert binary coded decimal numbers into
binary. The Supreme Court denied granting patent to Benson's computer programme showing
reasons that to grant patent means to grant monopoly on a general mathematical technique and
its application, which are also basic tools for scientific research. However, in Diamond
Commissioner of patents and Trade marks v. Diehr,17 where Diehr had requested a patent on a
computer programme and Court decided 5:4 in favour of Diehr. Judgment was delivered by
Judge Rehnquist as such "... a subject matter otherwise statutory does not become non-
29-12-2016 (Page 5 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
29-12-2016 (Page 6 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
4. There is need of proper control over employees and others who have access to computer,
computer system and network of company and related information.
5. Precaution to be taken while dealing with other companies through multimedia technology in
the era of communication convergence.
6. For trade secret the proprietor has to alert that information must not be known to outsiders in
any way. It must only be disclosed to trustworthy employees with undertaking that they shall
not disclose it to outsiders.
7. The proprietor has to impose restrictions on the access to secret information by standard
security measures and by limiting individuals who may know it under a written agreement.
8. Standard of protection has to improve giving heavy efforts e.g., (a) stamp over information
such as "confidential", (b) maintaining-login system with secure passwords, (c) destroying or
erasing information after reading, (d) encrypt documents before sending, (e) restriction for
downloading or printing, (f) using non-discloser agreements with receivers of information.
9. The Economic Espionage Act 1996 in the U.S.A provides that misappropriation of trade
secrets is a federal criminal offence subject to forfeiture of property, fines and imprisonment.
India too must recognise it as crime by precise legal provisions.
_______________
1. Secretary guilty in Coke trade secret case, Atlanta, Feb. 2 (UPI), Copyright 2007 by
United Press International, the Atlanta Journal Constitution reporter cited in
http://www.DailyIndia.com, 2nd Feb. 2007.
2. 416 U.S. 470 SC.
3. For details see Lewis C. Lee. J, Scolt Davidson, Managing Intellectual Property Rights,
(Wiley Law Pub,) NY 1993 pp.123 - 125.
4. Frank, 1998, p.73 cited in Stacey l. Edger, Morality and Machines perspectives on
computer ethics, (J&B pub.)1997, p. 113.
5. Ibid.
6. The term 'Computer' is defined in section 2 of the Copyright Act, 1957 as all
information processing devices.
7. Justice Yatindra Singh, Cyber Laws, 2nd ed. (ULP),2005, p.54.
8. The Patent (Amendment) Ordinance, 2004; (w.e.f. 1-1-2005), sec.3 (b).
9. Came into force on 1st January, 2005, .
10. The Patent Act,1970; Chapter IV deals
application in which the word "publication" was
and by the same amendment section 11A was
applications by the controller. This section
(Amendment) Ordinance 2004.
11. For details see Section 11A of the Patent Act, 1970.
12. For detail see http://www.naavi.org;
http://www.telegraph.in on 9th Feb, 2007.
wwww.ciol.com
etc.
1993.
See
also
13. For details see http://www.ciol.com, news, Thursday, May 8, 2003, Advertis
14. For details see http://www.naavi.org; wwww.ciol.com etc. See also the times of
India, Kolkata, on June 30, 2005.
29-12-2016 (Page 7 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University
29-12-2016 (Page 8 of 8 )
www.manupatra.com
Damodaram Sanjivayya National Law University