13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

188<br />

<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />

(a) disassemble, decompile or o<strong>the</strong>rwise derive source code from <strong>the</strong><br />

Software, (b) reverse engineer <strong>the</strong> Software, (c) modify or prepare<br />

derivative works of <strong>the</strong> Software, (d) copy <strong>the</strong> Software, except as<br />

expressly permitted in this Agreement, (e) rent or lease <strong>the</strong> Software, or<br />

(f) use <strong>the</strong> Software in any manner that infringes <strong>the</strong> intellectual property<br />

or o<strong>the</strong>r rights of Licensor or ano<strong>the</strong>r party.”<br />

Companies argue that such provisions legally bind purchasers not to reverse<br />

engineer <strong>the</strong>ir software. If <strong>the</strong>y do so anyway, <strong>the</strong>y have breached a contract<br />

and can be sued for damages. The problem, of course, is that <strong>the</strong> antireverse-engineering<br />

provision gives <strong>the</strong> copyright owner rights beyond those<br />

it would have under, say, <strong>the</strong> Sega decision.<br />

Whe<strong>the</strong>r this kind of contractual prohibition is enforceable is a hotly<br />

disputed issue. Courts have sometimes rejected reverse engineering<br />

defenses in trade secrecy cases because this activity exceeded <strong>the</strong> scope of<br />

licensed uses of <strong>the</strong> software. 38 Courts have sometimes refused to enforce<br />

software shrinkwrap license restrictions against reverse engineering because<br />

of a conflict between <strong>the</strong> clause and federal intellectual property policy. In<br />

Vault Corp. v. Quaid Software Ltd., 39 <strong>the</strong> maker of copy-protection software<br />

tried to enforce an anti-reverse-engineering clause under Louisiana law<br />

against a firm that had reverse-engineered its copy-protection scheme. The<br />

court held that federal law preempted <strong>the</strong> contractual clause as a matter<br />

of federal policy, <strong>the</strong> same argument used in Bonito Boats to override <strong>the</strong><br />

Florida boat hull law.<br />

In addition, Section 301 of <strong>the</strong> Copyright Act preempts state-created or<br />

state-enforced rights “that are equivalent to any of <strong>the</strong> exclusive rights<br />

within <strong>the</strong> general scope of copyright . . . .” As might be expected,<br />

<strong>the</strong>re’s a debate about what “equivalent” means. Courts have said that<br />

contract provisions enforceable under state law are “equivalent” to<br />

federal copyright when <strong>the</strong> conditions for infringement are <strong>the</strong> same. But<br />

if infringement of <strong>the</strong> state-created right requires an “extra element,” it is<br />

not “equivalent.”<br />

38 E.g., Technicon Data Sys. Corp. v. Curtis 1000, Inc., 224<br />

U.S.P.Q. (BNA) 286 (Del. Ch. 1984) (holding that a consultant to a<br />

hospital used improper means to obtain trade secret interface<br />

information by wiretapping <strong>the</strong> hospital’s licensed software<br />

system to study <strong>the</strong> manner in which <strong>the</strong> server software<br />

exchanged data with <strong>the</strong> client software because this use had<br />

not been authorized by <strong>the</strong> hospital; stating fur<strong>the</strong>r that even if<br />

<strong>the</strong> use had been authorized, <strong>the</strong> action would have<br />

breached restrictive terms in <strong>the</strong> license); see also DSC<br />

Communications Corp. v. Pulse Communications, Inc., 170 F.3d<br />

1354 (Fed. Cir. 1999) (holding that <strong>the</strong>re was a triable issue of fact<br />

as to whe<strong>the</strong>r Pulsecom’s use of a “snooper board” at a<br />

telephone company to get access to interface information<br />

about DSC’s software resulted in a misappropriation of a trade<br />

secret in view of restrictions in <strong>the</strong> telephone company’s license<br />

to use DSC’s software).<br />

39 847 F.2d 255 (5th Cir. 1988).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!