135
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Unauthorised adaptation of computer programmes - is criminalisation a solution? Haupt t/a Softcopy v Brewers Marketing Intelligence (Pty) Ltd 2006 4 SA 458 (SCA)

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In Haupt t/a Softcopy v Brewers Marketing Intelligence (Pty) Ltd 2006 4 SA 458 (SCA) Haupt sought to enforce a copyright claim in the Data Explorer computer programme against Brewers Marketing Intelligence (Pty) Ltd. His claim was dismissed in the High Court and he appealed to the Supreme Court of Appeal. The Court held that copyright in the Data Explorer programme vested in Haupt. Haupt acquired copyright in the Data Explorer programme regardless of the fact that the programme was as a result of an unauthorised adaptation of the Project AMPS programme which belonged to Brewers Marketing Intelligence (Pty) Ltd. This case note inter alia analyses the possibility of an author being sued for infringement even though he has acquired copyright in a work that he created by making unauthorised adaptations to another's copyright material. Furthermore, it examines whether or not the law adequately protects copyright owners in situations where infringement takes the form of unauthorised adaptations of computer programmes. It is argued that the protection afforded by the Copyright Act 98 of 1978 (Copyright Act) in terms of section 27(1) to copyright owners of computer programmes is narrowly defined. It excludes from its ambit of criminal liability the act of making unauthorised adaptation of computer programmes. The issue that is considered is therefore whether or not the unauthorised adaptation of computer programmes should attract a criminal sanction. In addressing this issue and with the aim of making recommendations, the legal position in the United Kingdom (UK) is analysed. From the analysis it is recommended that the Copyright Act be amended by the insertion of a new section, section 27(1)(A), which will make the act of making an unauthorised adaptation of a computer programme an offence. This recommended section will close the gap that currently exists in our law with regard to unauthorised adaptations of computer programmes.

          Related collections

          Most cited references2

          • Record: found
          • Abstract: not found
          • Article: not found

          The Copyright Amendment Act 125 of 1992 and Computer Programs: A Preliminary Overview

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Authorship of Computer Programs under South African Copyright Law: Haupt t/a Softcopy v Brewers Marketing Intelligence (Pty) Ltd

            L Tong (2005)
              Bookmark

              Author and article information

              Contributors
              Role: ND
              Journal
              pelj
              PER: Potchefstroomse Elektroniese Regsblad
              PER
              Publication of North-West University (Potchefstroom Campus) (Potchefstroom )
              1727-3781
              2011
              : 14
              : 7
              : 211-232
              Affiliations
              [1 ] Universidade de Santo Amaro Brazil
              Article
              S1727-37812011000700009
              9b88b6f8-790d-4ff0-877e-101862e0a5f6

              http://creativecommons.org/licenses/by/4.0/

              History
              Product

              SciELO South Africa

              Self URI (journal page): http://www.scielo.org.za/scielo.php?script=sci_serial&pid=1727-3781&lng=en
              Categories
              Law

              General law
              Copyright,Copyright Act,copyright infringement,computer programmes,unauthorised adaptation

              Comments

              Comment on this article