Hacking the Xbox
Hacking the Xbox
Hacking the Xbox
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
188<br />
<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />
(a) disassemble, decompile or o<strong>the</strong>rwise derive source code from <strong>the</strong><br />
Software, (b) reverse engineer <strong>the</strong> Software, (c) modify or prepare<br />
derivative works of <strong>the</strong> Software, (d) copy <strong>the</strong> Software, except as<br />
expressly permitted in this Agreement, (e) rent or lease <strong>the</strong> Software, or<br />
(f) use <strong>the</strong> Software in any manner that infringes <strong>the</strong> intellectual property<br />
or o<strong>the</strong>r rights of Licensor or ano<strong>the</strong>r party.”<br />
Companies argue that such provisions legally bind purchasers not to reverse<br />
engineer <strong>the</strong>ir software. If <strong>the</strong>y do so anyway, <strong>the</strong>y have breached a contract<br />
and can be sued for damages. The problem, of course, is that <strong>the</strong> antireverse-engineering<br />
provision gives <strong>the</strong> copyright owner rights beyond those<br />
it would have under, say, <strong>the</strong> Sega decision.<br />
Whe<strong>the</strong>r this kind of contractual prohibition is enforceable is a hotly<br />
disputed issue. Courts have sometimes rejected reverse engineering<br />
defenses in trade secrecy cases because this activity exceeded <strong>the</strong> scope of<br />
licensed uses of <strong>the</strong> software. 38 Courts have sometimes refused to enforce<br />
software shrinkwrap license restrictions against reverse engineering because<br />
of a conflict between <strong>the</strong> clause and federal intellectual property policy. In<br />
Vault Corp. v. Quaid Software Ltd., 39 <strong>the</strong> maker of copy-protection software<br />
tried to enforce an anti-reverse-engineering clause under Louisiana law<br />
against a firm that had reverse-engineered its copy-protection scheme. The<br />
court held that federal law preempted <strong>the</strong> contractual clause as a matter<br />
of federal policy, <strong>the</strong> same argument used in Bonito Boats to override <strong>the</strong><br />
Florida boat hull law.<br />
In addition, Section 301 of <strong>the</strong> Copyright Act preempts state-created or<br />
state-enforced rights “that are equivalent to any of <strong>the</strong> exclusive rights<br />
within <strong>the</strong> general scope of copyright . . . .” As might be expected,<br />
<strong>the</strong>re’s a debate about what “equivalent” means. Courts have said that<br />
contract provisions enforceable under state law are “equivalent” to<br />
federal copyright when <strong>the</strong> conditions for infringement are <strong>the</strong> same. But<br />
if infringement of <strong>the</strong> state-created right requires an “extra element,” it is<br />
not “equivalent.”<br />
38 E.g., Technicon Data Sys. Corp. v. Curtis 1000, Inc., 224<br />
U.S.P.Q. (BNA) 286 (Del. Ch. 1984) (holding that a consultant to a<br />
hospital used improper means to obtain trade secret interface<br />
information by wiretapping <strong>the</strong> hospital’s licensed software<br />
system to study <strong>the</strong> manner in which <strong>the</strong> server software<br />
exchanged data with <strong>the</strong> client software because this use had<br />
not been authorized by <strong>the</strong> hospital; stating fur<strong>the</strong>r that even if<br />
<strong>the</strong> use had been authorized, <strong>the</strong> action would have<br />
breached restrictive terms in <strong>the</strong> license); see also DSC<br />
Communications Corp. v. Pulse Communications, Inc., 170 F.3d<br />
1354 (Fed. Cir. 1999) (holding that <strong>the</strong>re was a triable issue of fact<br />
as to whe<strong>the</strong>r Pulsecom’s use of a “snooper board” at a<br />
telephone company to get access to interface information<br />
about DSC’s software resulted in a misappropriation of a trade<br />
secret in view of restrictions in <strong>the</strong> telephone company’s license<br />
to use DSC’s software).<br />
39 847 F.2d 255 (5th Cir. 1988).