<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
             
           
          Risk prevention relating to OEM and on-demand software
          (Cheng Zhen, Lenovo China)
          Updated: 2013-11-13

          Software pre-installation (i.e. OEM software) has been a relatively mature business model in the industry. But with the development of network technology and diversification of services, software pre-installation, when inadvertently executed, might cause big trouble.

          I. Pre-installation, on-demand installation and software piracy

          OEM, as defined on Microsoft Website, “refers to software that comes installed when a customer purchases a new computer or a hard drive, etc., and the price thereof has been covered in the cost of the hardware. As the hardware vendors purchase directly from software vendors, OEM software can only be used along with the hardware and cannot be split for resale, or reinstalled on other hardware.” In other words, OEM is the licensed presale software installed or provided by manufacturers for end users (including individuals and commercial users).

          In practice, however, software may also be pre-installed on demand of and tailored at the request of the users who supply the software. The business model is essentially an installation service rendered by hardware manufacturers at the request of users, and the author deems it is more appropriate to term it as “on-demand software.” The business model is rather complex, involving, in practice, vendors and service providers, and it is more likely to cause infringement disputes arising from infringement in the business model.

          According to statistics from 2012 Report on China’s Software Piracy Rate, the piracy rate totaled 36% in terms of paid software, including 36% of information security software, 53% of office software, and 23% of operating systems software.

          According to a survey conducted by Ipsos Public Affairs in January and February 2012 covering approximately 15,000 computer users in 33 countries, the average piracy rate hit 33% in the European areas with relatively benign IP protection environment, 60% in Asia Pacific, 62% in Central and Eastern Europe, and 61% in Latin America. It can be seen that it is indeed difficult for software right owners to achieve 100% licensed software usage. However, the widespread piracy has also left much room for rights owners to fight for their rights and interests.

          Then, how should providers of OEM or on-demand software prevent risks of infringement and ensure business security? The author intends to briefly explore the following.

          II. Risk prevention relating to OEM and on-demand software

          1. OEM and on-demand software by hardware manufacturers

          1) OEM Software by Hardware Manufacturers

          According to Article 53 of the Copyright Law, a publisher or producer of a reproduction shall bear legal liability if the publisher or producer fails to prove that the publication or production thereof has been lawfully authorized. Article 28 of the Regulations of Computer Software Protection provides that a distributor of a reproduction, or a lessor of a reproduction of a cinematographic work, a work created by means similar to cinematography, computer software, a sound recording or visual recording shall bear legal liability if the distributor or lessor fails to prove that the reproduction distributed or leased thereby is lawfully sourced.

          The key to OEM software, whether for individuals or commercial customers, is that a license should be obtained between the hardware manufacturer and the software owner for lawful authorization of the reproduction of the software; then a hardware or a medium with the software as a bundle is sold to the end user. In this business mode, the hardware manufacturer serves as a producer and sub-licensor of the software reproduction. In practice, the software owners generally will sign a software licensing agreement with the hardware manufactures to specify their respective rights and obligations. If the hardware manufacturer neglects to obtain authorization or fails to take full consideration at the time of signing the agreement, it will probably face infringement claims or administrative penalties from regulatory authorities. Therefore, the hardware manufacturer should consider acquiring at least the following rights before installing the software: (1) the right to pre-install software on its hardware products (with a specified list) or bundle copies of pre-installed software with its hardware products and resell them to end users; (2) necessary proprietary and servi c e warranties from software owners; and (3) adequate indemnification to cover liabilities and damages in case of software infringement.

          2) On-demand installation of software by hardware producers

          In direct sales, a hardware manufacturer frequently encounters demands from commercial users to install software for them, namely, the software provided by commercial u s e r s t o b e installed onto the hardware before sales. A question ensues, because the replication is carried out by the hardware manufacturer, does it mean that the hardware manufacturer has to obtain license from software owners?

          The Copyright Law is silent in this regard, but Article 16 of Regulations of Computer Software Protection (the Regulations) provides that “lawful owners of software reproductions are entitled to the following rights to install the software onto a computer or devices with information processing capabilities according to needs of use; Article 30 of the Regulations provides that “No damages shall be available if holders of software reproductions do not know or do not have reason to know that the software is an infringing copy; however, injunctive relief may be available for enjoinment or destruction of the infringing copies etc.”

          In the aforesaid Regulations, there are two concepts, namely, lawful owners of software reproductions and holders of software reproductions. Some scholars view the former as to mean entities, including individuals or legal persons, that purchase genuine copies from rights owners or their licensed distributors, accept donated copies or obtain license to use genuine copies. Obviously, commercial users act in the capacity. It is a legal right for commercial users to install the licensed software onto computers, as long as it is not prohibited or restricted by law and does n o t affect rights of others, and they will also have the right to entrust others.

          Risk prevention relating to OEM and on-demand software

          In this case, hardware manufacturers, on demand of end users, complete copying of the software, only temporarily controlling and holding software products in the capacity of holders of software copies.

          Therefore, it is unnecessary (in most circumstances also impossible) for them to obtain authorization from software copyright owners. In line with the principle set forth by Article 30 of the Regulations, the criteria to determine infringement of holders of software copies lie in whether they subjectively know or should know the software they hold is an infringing product. Therefore, only if hardware manufacturers prove that they do not know and there are no reasonable grounds for them to know the software infringement, can they be exonerated from liabilities.

          The author suggests that in practice a hardware manufacturer should: (a) exercise reasonable and prudent duty of care. For example, it may ask its staff, in negotiations, to demand rights certification (software copyright registration certificates or license documentation) from commercial users as a bargaining point; if commercial users can not provide foregoing proof, the hardware manufacturer should act with care and refuse to install; (b)while keeping rights certification recorded, the h a r d w a r e ma n u f a c t u r e should also require commercial users to produce necessary d o c u m e n t s o f rights guarantees or undertake in the sales contract that they guarantee the legitimate source of software products, seek solutions and bear liabilities in the event of infringement.


          Previous Page 1 2 Next Page


          The J-Innovation

          Steve Jobs died the month that the latest Nobel Prize winners were announced. The coincidence lends itself to speculation about inevitability.

          Recommendation of Global IP Service Agencies with Chinese Business

          Washable keyboard

          The future of China & WTO

          JETRO: A decade of development in China

          主站蜘蛛池模板: 国产理论片在线观看| 国外av片免费看一区二区三区| 熟妇人妻中文a∨无码| 亚洲成av人片在www鸭子| 免费观看一级欧美大| 成人欧美日韩一区二区三区| 午夜国产精品视频免费看电影| 男女激情一区二区三区| 亚洲真人无码永久在线| 国产精品香蕉在线观看不卡| 久久久噜噜噜久久中文福利| 久久精品人人做人人爽97| 成人区人妻精品一区二蜜臀| 日本一区二区在线高清观看| 中国产无码一区二区三区| 青青青视频免费一区二区| 国产午夜91福利一区二区| 精品夜夜澡人妻无码av| 亚洲男人第一无码av网| 大香伊蕉在人线国产最新2005| 国产真实乱对白精彩久久老熟妇女| 少妇顶级牲交免费在线| 欧美牲交a欧美牲交aⅴ免费真| 日本一区二区三区在线看| 亚洲大成色www永久网站动图| 亚洲av伦理一区二区| 亚洲人妻一区二区精品| 色爱综合另类图片av| 少妇私密会所按摩到高潮呻吟| 久久久久久久久久国产精品| 激情伊人五月天久久综合| 永久黄网站色视频免费直播| 国产精品久久久久孕妇| 国产精品一区二区小视频| 少妇激情a∨一区二区三区| 大地资源免费视频观看| 一出一进一爽一粗一大视频| 国产在热线精品视频| 国产无遮挡又黄又爽不要vip软件| 亚洲精品一区二区三区在| 精品国产亚洲第一区二区三区|