Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility

Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:University of Pennsylvania law review 1992-05, Vol.140 (5), p.1999-2050
1. Verfasser: Ignatin, Gary R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2050
container_issue 5
container_start_page 1999
container_title University of Pennsylvania law review
container_volume 140
creator Ignatin, Gary R.
description Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.
doi_str_mv 10.2307/3312440
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_60937701</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A12477328</galeid><jstor_id>3312440</jstor_id><sourcerecordid>A12477328</sourcerecordid><originalsourceid>FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</originalsourceid><addsrcrecordid>eNp10Vtr2zAUAGAxVljWjv0FU8b6Uq-6uJa1NxPSphDYKHkXinLkKLUtV1Ja8u-rXKCjZOjhiHM-Hd0Q-k7wL8owv2GM0KLAn9CIiILm1S3jn9EI44LkQmD-BX0NYY0xLm-JGKFhBjGLK8imSj-BD_v4O6vb1r3avtmXHuElVSCb9I3tAfwu70w2dsPW22YVYZnm3bCJ4LO_3jVedSGLLqv1yqal-6KKdmFbG7cX6MyoNsC3YzxH87vJfDzNZ3_uH8b1LNeM85iXwDnGTAjglBrDhaALvlwYbuiSc1JVuhKLdCfNlYICaKXLshJpxkRJCLBz9PPQdvDueQMhys4GDW2renCbIEss0j6YJHj5Aa7dxvfpaJKIcocq_I4a1YK0vXHRK73rKOv02pwzWiV0fQI10INXrevB2JT-l-cneBpL6Kw-5a8OXnsXggcjB2875beSYLn7eXn8-SR_HOQ6ROf_y94A7JGo9Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>196937780</pqid></control><display><type>article</type><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><source>Jstor Complete Legacy</source><source>Worldwide Political Science Abstracts</source><source>HeinOnline Law Journal Library</source><creator>Ignatin, Gary R.</creator><creatorcontrib>Ignatin, Gary R.</creatorcontrib><description>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</description><identifier>ISSN: 0041-9907</identifier><identifier>EISSN: 1942-8537</identifier><identifier>DOI: 10.2307/3312440</identifier><language>eng</language><publisher>Philadelphia: University of Pennsylvania Law School</publisher><subject>Comments ; Compatible hardware ; Compatible software ; Computer hacking ; Computer programming ; Computer software ; Computer technology ; Computers ; Copy prevention techniques ; Copyright ; Copyright laws ; Copyrights ; Engineering ; Forward compatibility ; Law ; Laws, regulations and rules ; Piracy ; Reverse engineering ; Software ; Software industry ; Software protection ; Technological innovation ; Upward/downward compatibility</subject><ispartof>University of Pennsylvania law review, 1992-05, Vol.140 (5), p.1999-2050</ispartof><rights>Copyright 1992 The University of Pennsylvania</rights><rights>COPYRIGHT 1992 University of Pennsylvania, Law School</rights><rights>Copyright University of Pennsylvania Law School May 1992</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/3312440$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/3312440$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,776,780,799,27901,27902,57992,58225</link.rule.ids></links><search><creatorcontrib>Ignatin, Gary R.</creatorcontrib><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><title>University of Pennsylvania law review</title><description>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</description><subject>Comments</subject><subject>Compatible hardware</subject><subject>Compatible software</subject><subject>Computer hacking</subject><subject>Computer programming</subject><subject>Computer software</subject><subject>Computer technology</subject><subject>Computers</subject><subject>Copy prevention techniques</subject><subject>Copyright</subject><subject>Copyright laws</subject><subject>Copyrights</subject><subject>Engineering</subject><subject>Forward compatibility</subject><subject>Law</subject><subject>Laws, regulations and rules</subject><subject>Piracy</subject><subject>Reverse engineering</subject><subject>Software</subject><subject>Software industry</subject><subject>Software protection</subject><subject>Technological innovation</subject><subject>Upward/downward compatibility</subject><issn>0041-9907</issn><issn>1942-8537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1992</creationdate><recordtype>article</recordtype><sourceid>7UB</sourceid><recordid>eNp10Vtr2zAUAGAxVljWjv0FU8b6Uq-6uJa1NxPSphDYKHkXinLkKLUtV1Ja8u-rXKCjZOjhiHM-Hd0Q-k7wL8owv2GM0KLAn9CIiILm1S3jn9EI44LkQmD-BX0NYY0xLm-JGKFhBjGLK8imSj-BD_v4O6vb1r3avtmXHuElVSCb9I3tAfwu70w2dsPW22YVYZnm3bCJ4LO_3jVedSGLLqv1yqal-6KKdmFbG7cX6MyoNsC3YzxH87vJfDzNZ3_uH8b1LNeM85iXwDnGTAjglBrDhaALvlwYbuiSc1JVuhKLdCfNlYICaKXLshJpxkRJCLBz9PPQdvDueQMhys4GDW2renCbIEss0j6YJHj5Aa7dxvfpaJKIcocq_I4a1YK0vXHRK73rKOv02pwzWiV0fQI10INXrevB2JT-l-cneBpL6Kw-5a8OXnsXggcjB2875beSYLn7eXn8-SR_HOQ6ROf_y94A7JGo9Q</recordid><startdate>19920501</startdate><enddate>19920501</enddate><creator>Ignatin, Gary R.</creator><general>University of Pennsylvania Law School</general><general>University of Pennsylvania, Law School</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ILT</scope><scope>7UB</scope></search><sort><creationdate>19920501</creationdate><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><author>Ignatin, Gary R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1992</creationdate><topic>Comments</topic><topic>Compatible hardware</topic><topic>Compatible software</topic><topic>Computer hacking</topic><topic>Computer programming</topic><topic>Computer software</topic><topic>Computer technology</topic><topic>Computers</topic><topic>Copy prevention techniques</topic><topic>Copyright</topic><topic>Copyright laws</topic><topic>Copyrights</topic><topic>Engineering</topic><topic>Forward compatibility</topic><topic>Law</topic><topic>Laws, regulations and rules</topic><topic>Piracy</topic><topic>Reverse engineering</topic><topic>Software</topic><topic>Software industry</topic><topic>Software protection</topic><topic>Technological innovation</topic><topic>Upward/downward compatibility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ignatin, Gary R.</creatorcontrib><collection>CrossRef</collection><collection>Gale OneFile: LegalTrac</collection><collection>Worldwide Political Science Abstracts</collection><jtitle>University of Pennsylvania law review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ignatin, Gary R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</atitle><jtitle>University of Pennsylvania law review</jtitle><date>1992-05-01</date><risdate>1992</risdate><volume>140</volume><issue>5</issue><spage>1999</spage><epage>2050</epage><pages>1999-2050</pages><issn>0041-9907</issn><eissn>1942-8537</eissn><abstract>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</abstract><cop>Philadelphia</cop><pub>University of Pennsylvania Law School</pub><doi>10.2307/3312440</doi><tpages>52</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0041-9907
ispartof University of Pennsylvania law review, 1992-05, Vol.140 (5), p.1999-2050
issn 0041-9907
1942-8537
language eng
recordid cdi_proquest_miscellaneous_60937701
source Jstor Complete Legacy; Worldwide Political Science Abstracts; HeinOnline Law Journal Library
subjects Comments
Compatible hardware
Compatible software
Computer hacking
Computer programming
Computer software
Computer technology
Computers
Copy prevention techniques
Copyright
Copyright laws
Copyrights
Engineering
Forward compatibility
Law
Laws, regulations and rules
Piracy
Reverse engineering
Software
Software industry
Software protection
Technological innovation
Upward/downward compatibility
title Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T04%3A11%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Let%20the%20Hackers%20Hack:%20Allowing%20the%20Reverse%20Engineering%20of%20Copyrighted%20Computer%20Programs%20to%20Achieve%20Compatibility&rft.jtitle=University%20of%20Pennsylvania%20law%20review&rft.au=Ignatin,%20Gary%20R.&rft.date=1992-05-01&rft.volume=140&rft.issue=5&rft.spage=1999&rft.epage=2050&rft.pages=1999-2050&rft.issn=0041-9907&rft.eissn=1942-8537&rft_id=info:doi/10.2307/3312440&rft_dat=%3Cgale_proqu%3EA12477328%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=196937780&rft_id=info:pmid/&rft_galeid=A12477328&rft_jstor_id=3312440&rfr_iscdi=true