Intellectual Property Law in China and Pakistan: A Comparative Analysis of Computer Software Protection
Downloads
Computer software protection presents complex and interrelated challenges, particularly in copyright and patent law. Developing countries in the Asia-Pacific region, including Pakistan, struggle with inadequate legal frameworks to safeguard both national and international software, exacerbated by the rapid evolution of software-related products and services. In contrast, China has made substantial progress in strengthening software protection through comprehensive copyright laws, regulatory measures, and inter-ministerial coordination frameworks that promote the use of legitimate software. These initiatives have significantly improved China's software copyright protection system, fostering the growth of its software industry. Furthermore, China's Patent Examination Guidelines provide a structured approach to software patentability, distinguishing between conventional software, which lacks patent protection, and innovative software, which qualifies for such protection. Given these advancements, Pakistan can benefit from implementing well-defined legal and administrative measures to enhance software protection. This study examines China’s current software protection policies, legislative and administrative frameworks, and their applicability to Pakistan, offering insights into potential legal reforms to strengthen software protection in the country.
Downloads
1. Ahmad, and Saghir. 2008. “Legal Protection for Computer Programmes in EU, US and Pakistan & Software Piracy as a Challenge in Pakistan.” UNIVERSITY OF OSLO. https://www.duo.uio.no/handle/10852/21985.
2. Alex, Bassett, Beek Christiaan, Minihane Niamh, Peterson Eric, Samani Raj, Schmugar Craig, Sims ReseAnne, Sommer Dan, and Sun Bing. 2018. “McAfee Labs Threats Report.”
3. Armstrong, Timothy K. 2006. “Digital Rights Management and the Process of Fair Use.” Computer Fraud & Security 10 (7): 3–20. https://doi.org/10.1016/S1361-3723(10)70078-6.
4. Badlani, Gautam. 2024. “Berne Convention in IPR .” Rachit Garg, February 6, 2024. https://blog.ipleaders.in/international-conventions-which-shaped-intellectual-property-rights/.
5. Bashir, Sobia, and Ghalib Khan. 2015. “CAUSES OF BOOK PIRACY IN PAKISTAN: A STUDY OF KHYBER PAKHTUNKHWA.” Journal of Law and Society Law College XLVI (67).
6. BSA. 2018. “Software Management: Security Imperative, Business Opportunity.”
7. Ciancarini, Paolo, Daniel Russo, Alberto Sillitti, and Giancarlo Succi. 2016. “Reverse Engineering: A European IPR Perspective.” Proceedings of the ACM Symposium on Applied Computing, April, 1498–1503. https://doi.org/10.1145/2851613.2851790.
8. Dinwoodie, Graeme. 2010. “THE WIPO COPYRIGHT TREATY: A TO THE FUTURE OF INTERNATIONAL COPYRIGHT?” TRADE AND DEVELOPMENT 10 (January):61. http://ssrn.com/abstract=1601235Electroniccopyavailableat:https://ssrn.com/abstract=1601235Electroniccopyavailableat:https://ssrn.com/abstract=1601235.
9. Gachago, Roger. 2011. “The Effect of Technology on Copyright.” https://doi.org/10.13140/RG.2.2.24252.28803.
10. Hardy, I. 2002. “Criminal Copyright Infringement.” William & Mary Bill of Rights Journal 11 (1). https://scholarship.law.wm.edu/wmborj/vol11/iss1/10.
11. He, Jiong. 2016. “Admissibility of E-Evidence Generated by Telnet Technology in Software Copyright Litigation in China.” School of Advanced Study 13 (November). https://doi.org/https://doi.org/10.14296/deeslr.v13i0.2295.
12. Hoekstra, Matthew, Reshma Lal, Pradeep Pappachan, Vinay Phegade, and Juan Del Cuvillo. 2013. “Using Innovative Instructions to Create Trustworthy Software Solutions,” June, 1–1. https://doi.org/10.1145/2487726.2488370.
13. Hong, Jie, Jakob Edler, and Silvia Massini. 2022. “Evolution of the Chinese Intellectual Property Rights System: IPR Law Revisions and Enforcement.” Management and Organization Review 18 (4): 755–87. https://doi.org/10.1017/mor.2021.72.
14. Hua, Jerry Jie. 2014. Toward a More Balanced Approach: Rethinking and Readjusting Copyright Systems in the Digital Network Era. Toward a More Balanced Approach: Rethinking and Readjusting Copyright Systems in the Digital Network Era. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-43517-5/COVER.
15. Hugh, Stephens. 2020. “Why Is Piracy so Common in China? Confucian Cultural Traditions or Just Plain Commercial Advantage? (A Historical Perspective) – Hugh Stephens Blog,” June 15, 2020. https://hughstephensblog.net/2020/06/15/why-is-piracy-so-common-in-china-confucian-cultural-traditions-or-just-plain-commercial-advantage-a-historical-perspective/.
16. Huijia, Xie. 2018. “Empirical Research on Criminal Copyright Infringement in China.” Queen Mary Journal of Intellectual Property 8 (1): 36–49. https://doi.org/10.4337/QMJIP.2018.08.04.
17. Kammerstetter, Markus, Christian Platzer, and Gilbert Wondracek. 2012. “Vanity, Cracks and Malware: Insights into the Anti-Copy Protection Ecosystem.” In Proceedings of The 19th ACM Conference on Computer and Communications Security, CCS 2012, 12. https://repositum.tuwien.at/handle/20.500.12708/54456.
18. Kim, Chanwoo, Mao Xuewen, Hyosung Park, and Kwangho Jung. 2017. “What Motivates Software Piracy in China: Q-Methodology Perspective.” Korean Journal of Policy Studies 32 (2): 135–66. https://doi.org/10.52372/KJPS32205.
19. Leaffer, Marshall A.. 2014. Understanding Copyright Law. LexisNexis.
20. Liakopoulos, D. 2018. “PROTECTION OF COMPETITION THROUGH THE PRINCIPLE OF LEGAL CERTAINTY - THE ROLE OF THE COURT OF JUSTICE OF THE EUROPEAN UNION.” Meritum- Belo Horizonte 13:286–334.
21. Liangyu. 2018. “China to Strengthen IPR Protection: Xi.” Xinhua, 2018. http://www.xinhuanet.com/english/2018-04/10/c_137099843.htm.
22. Manta, Irina D. 2011. “The Puzzle of Criminal Sanctions for Intellectual Property Infringemen.” Harvard Journal of Law & Technology 24 (2).
23. Ma, Zhong-Fa, and Wei-Na Gao. 2012. “Impact of the ‘Tomato Garden’ Software Internet Piracy Case on Combating Copyright Infringement in China.” Journal of Intellectual Property Rights 17 (January):27–36.
24. Merete, Ask, Bondarenko Petro, Erik Rekdal John, Nordbø André, Ruthven Pieter Bloemerus, and Piatkivskyi Dmytro. 2013. “Advanced Persistent Threat (APT) Beyond the Hype- Project Report in IMT4582 Network Security at Gjøvik University College.”
25. Mozur, Paul. 2017. “China, Addicted to Bootleg Software, Reels From Ransomware Attack.” The New York Times, 2017. https://www.nytimes.com/2017/05/15/business/china-ransomware-wannacry-hacking.html.
26. Okediji, Ruth. 2009. “The Regulation of Creativity under the WIPO Internet Treaties.” Fordham L. Rev., January. https://scholarship.law.umn.edu/faculty_articles/901.
27. Perthuis, Aubin de, and Paul Van den Bulck. 2005. “Software Protection in China: Towards Better Days?” The Journal of World Intellectual Property 8 (4): 405–44. https://doi.org/10.1111/J.1747-1796.2005.TB00261.X.
28. Ralph D. Clifford. 1996. “Intellectual Property in the Era of the Creative Computer Program: Will the True Creator Please Stand Up.” HeinOnline. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/tulr71§ion=46.
29. Raustiala, Kal. 2019. “INTELLECTUAL PROPERTY IN THE INFORMATION AGE: AMERICAN & CHINESE PERSPECTIVES.” Public Law & Legal Theory Research Paper, August. https://ssrn.com/abstract=3451389.
30. Ren, Xiang. 2016. “Judicial Cases in China in 2015.” The Chinese Journal of Comparative Law 4 (2): 371–86. https://doi.org/10.1093/CJCL/CXW012.
31. Samuelson, Pamela. 2017. “Functionality and Expression in Computer Programs: Refining the Tests for Software Copyright Infringement.” https://papers.ssrn.com/abstract=2909152.
32. Samuelson, Pamela, and Tara Wheatland. 2009. “Statutory Damages in Copyright Law: A Remedy in Need of Reform.” William & Mary Law Review 51 (2). https://scholarship.law.wm.edu/wmlr/vol51/iss2/5.
33. Shi, Guifeng, Wei Wang, and Lingnan Ouyang. 2004. “Policies of Software Protection: The Practice in China.” AMCIS 2004 Proceedings 88. http://aisel.aisnet.org/amcis2004http://aisel.aisnet.org/amcis2004/88.
34. Simpson, Amy. 1995. “Copyright Law and Software Regulations in the People’s Republic of China: Have the Chinese Pirates Affected World Trade.” North Carolina Journal of International Law 20 (3). https://scholarship.law.unc.edu/ncilj/vol20/iss3/4.
35. Singh, Saurabh, Pradip Kumar Sharma, Seo Yeon Moon, Daesung Moon, and Jong Hyuk Park. 2019. “A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions.” Journal of Supercomputing 75 (8): 4543–74. https://doi.org/10.1007/S11227-016-1850-4.
36. Wu, Di, and Teresa Huang. 2023. “Series of Articles on Copyright Protection (1) ─ Works Within the Meaning of the Copyright Law (Mainland China).” September 2023. https://www.leetsai.com/ltp-special-column/series-of-articles-on-copyright-protection-i-works-within-the-meaning-of-the-copyright-law-september-25-2023.
37. Xu, Cong. 2020. Regulatory Model for Digital Rights Management : Analysis of U.S., Europe and China. Springer.
38. Yang, Deli. 2003. “The Development of Intellectual Property in China.” World Patent Information 25 (2): 131–42. https://doi.org/10.1016/S0172-2190(03)00026-7.
39. Zhang, Gupeng, and Jianghua Zhou. 2016. “The Effects of Forward and Reverse Engineering on Firm Innovation Performance in the Stages of Technology Catch-up: An Empirical Study of China.” Technological Forecasting and Social Change 104 (March):212–22. https://doi.org/10.1016/J.TECHFORE.2016.01.010.
Copyright (c) 2025 Muhammad Zeeshan Ajmal, Mohamed Salah Adawi Ahmed, Basel Khaled Alsaeed, Nasir Habib

This work is licensed under a Creative Commons Attribution 4.0 International License.