ISSN (Online): 2321-3418
server-injected
Law and Legislative Affairs
Open Access

Intellectual Property Law in China and Pakistan: A Comparative Analysis of Computer Software Protection

, , ,
DOI: 10.18535/ijsrm/v13i02.lla01· Pages: 611-627· Vol. 13, No. 02, (2025)· Published: February 12, 2025
PDF
Views: 611 PDF downloads: 1,617

Abstract

Computer software protection presents complex and interrelated challenges, particularly in copyright and patent law. Developing countries in the Asia-Pacific region, including Pakistan, struggle with inadequate legal frameworks to safeguard both national and international software, exacerbated by the rapid evolution of software-related products and services. In contrast, China has made substantial progress in strengthening software protection through comprehensive copyright laws, regulatory measures, and inter-ministerial coordination frameworks that promote the use of legitimate software. These initiatives have significantly improved China's software copyright protection system, fostering the growth of its software industry. Furthermore, China's Patent Examination Guidelines provide a structured approach to software patentability, distinguishing between conventional software, which lacks patent protection, and innovative software, which qualifies for such protection. Given these advancements, Pakistan can benefit from implementing well-defined legal and administrative measures to enhance software protection. This study examines China’s current software protection policies, legislative and administrative frameworks, and their applicability to Pakistan, offering insights into potential legal reforms to strengthen software protection in the country.

 

Keywords

CopyrightPatentComputer Softwaresoftware PiracyReverse EngineeringSui Generis

References

  1. Ahmad, and Saghir. 2008. “Legal Protection for Computer Programmes in EU, US and Pakistan & Software Piracy as a Challenge in Pakistan.” UNIVERSITY OF OSLO. https://www.duo.uio.no/handle/10852/21985.Google Scholar ↗
  2. Alex, Bassett, Beek Christiaan, Minihane Niamh, Peterson Eric, Samani Raj, Schmugar Craig, Sims ReseAnne, Sommer Dan, and Sun Bing. 2018. “McAfee Labs Threats Report.”Google Scholar ↗
  3. Armstrong, Timothy K. 2006. “Digital Rights Management and the Process of Fair Use.” Computer Fraud & Security 10 (7): 3–20. https://doi.org/10.1016/S1361-3723(10)70078-6.DOI ↗Google Scholar ↗
  4. Badlani, Gautam. 2024. “Berne Convention in IPR .” Rachit Garg, February 6, 2024. https://blog.ipleaders.in/international-conventions-which-shaped-intellectual-property-rights/.Google Scholar ↗
  5. Bashir, Sobia, and Ghalib Khan. 2015. “CAUSES OF BOOK PIRACY IN PAKISTAN: A STUDY OF KHYBER PAKHTUNKHWA.” Journal of Law and Society Law College XLVI (67).Google Scholar ↗
  6. BSA. 2018. “Software Management: Security Imperative, Business Opportunity.”Google Scholar ↗
  7. Ciancarini, Paolo, Daniel Russo, Alberto Sillitti, and Giancarlo Succi. 2016. “Reverse Engineering: A European IPR Perspective.” Proceedings of the ACM Symposium on Applied Computing, April, 1498–1503. https://doi.org/10.1145/2851613.2851790.DOI ↗Google Scholar ↗
  8. Dinwoodie, Graeme. 2010. “THE WIPO COPYRIGHT TREATY: A TO THE FUTURE OF INTERNATIONAL COPYRIGHT?” TRADE AND DEVELOPMENT 10 (January):61. http://ssrn.com/abstract=1601235Electroniccopyavailableat:https://ssrn.com/abstract=1601235Electroniccopyavailableat:https://ssrn.com/abstract=1601235.Google Scholar ↗
  9. Gachago, Roger. 2011. “The Effect of Technology on Copyright.” https://doi.org/10.13140/RG.2.2.24252.28803.DOI ↗Google Scholar ↗
  10. Hardy, I. 2002. “Criminal Copyright Infringement.” William & Mary Bill of Rights Journal 11 (1). https://scholarship.law.wm.edu/wmborj/vol11/iss1/10.Google Scholar ↗
  11. He, Jiong. 2016. “Admissibility of E-Evidence Generated by Telnet Technology in Software Copyright Litigation in China.” School of Advanced Study 13 (November). https://doi.org/https://doi.org/10.14296/deeslr.v13i0.2295.DOI ↗Google Scholar ↗
  12. Hoekstra, Matthew, Reshma Lal, Pradeep Pappachan, Vinay Phegade, and Juan Del Cuvillo. 2013. “Using Innovative Instructions to Create Trustworthy Software Solutions,” June, 1–1. https://doi.org/10.1145/2487726.2488370.DOI ↗Google Scholar ↗
  13. Hong, Jie, Jakob Edler, and Silvia Massini. 2022. “Evolution of the Chinese Intellectual Property Rights System: IPR Law Revisions and Enforcement.” Management and Organization Review 18 (4): 755–87. https://doi.org/10.1017/mor.2021.72.DOI ↗Google Scholar ↗
  14. Hua, Jerry Jie. 2014. Toward a More Balanced Approach: Rethinking and Readjusting Copyright Systems in the Digital Network Era. Toward a More Balanced Approach: Rethinking and Readjusting Copyright Systems in the Digital Network Era. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-43517-5/COVER.DOI ↗Google Scholar ↗
  15. Hugh, Stephens. 2020. “Why Is Piracy so Common in China? Confucian Cultural Traditions or Just Plain Commercial Advantage? (A Historical Perspective) – Hugh Stephens Blog,” June 15, 2020. https://hughstephensblog.net/2020/06/15/why-is-piracy-so-common-in-china-confucian-cultural-traditions-or-just-plain-commercial-advantage-a-historical-perspective/.Google Scholar ↗
  16. Huijia, Xie. 2018. “Empirical Research on Criminal Copyright Infringement in China.” Queen Mary Journal of Intellectual Property 8 (1): 36–49. https://doi.org/10.4337/QMJIP.2018.08.04.DOI ↗Google Scholar ↗
  17. Kammerstetter, Markus, Christian Platzer, and Gilbert Wondracek. 2012. “Vanity, Cracks and Malware: Insights into the Anti-Copy Protection Ecosystem.” In Proceedings of The 19th ACM Conference on Computer and Communications Security, CCS 2012, 12. https://repositum.tuwien.at/handle/20.500.12708/54456.Google Scholar ↗
  18. Kim, Chanwoo, Mao Xuewen, Hyosung Park, and Kwangho Jung. 2017. “What Motivates Software Piracy in China: Q-Methodology Perspective.” Korean Journal of Policy Studies 32 (2): 135–66. https://doi.org/10.52372/KJPS32205.DOI ↗Google Scholar ↗
  19. Leaffer, Marshall A.. 2014. Understanding Copyright Law. LexisNexis.Google Scholar ↗
  20. Liakopoulos, D. 2018. “PROTECTION OF COMPETITION THROUGH THE PRINCIPLE OF LEGAL CERTAINTY - THE ROLE OF THE COURT OF JUSTICE OF THE EUROPEAN UNION.” Meritum- Belo Horizonte 13:286–334.Google Scholar ↗
  21. Liangyu. 2018. “China to Strengthen IPR Protection: Xi.” Xinhua, 2018. http://www.xinhuanet.com/english/2018-04/10/c_137099843.htm.Google Scholar ↗
  22. Manta, Irina D. 2011. “The Puzzle of Criminal Sanctions for Intellectual Property Infringemen.” Harvard Journal of Law & Technology 24 (2).Google Scholar ↗
  23. Ma, Zhong-Fa, and Wei-Na Gao. 2012. “Impact of the ‘Tomato Garden’ Software Internet Piracy Case on Combating Copyright Infringement in China.” Journal of Intellectual Property Rights 17 (January):27–36.Google Scholar ↗
  24. Merete, Ask, Bondarenko Petro, Erik Rekdal John, Nordbø André, Ruthven Pieter Bloemerus, and Piatkivskyi Dmytro. 2013. “Advanced Persistent Threat (APT) Beyond the Hype- Project Report in IMT4582 Network Security at Gjøvik University College.”Google Scholar ↗
  25. Mozur, Paul. 2017. “China, Addicted to Bootleg Software, Reels From Ransomware Attack.” The New York Times, 2017. https://www.nytimes.com/2017/05/15/business/china-ransomware-wannacry-hacking.html.Google Scholar ↗
  26. Okediji, Ruth. 2009. “The Regulation of Creativity under the WIPO Internet Treaties.” Fordham L. Rev., January. https://scholarship.law.umn.edu/faculty_articles/901.Google Scholar ↗
  27. Perthuis, Aubin de, and Paul Van den Bulck. 2005. “Software Protection in China: Towards Better Days?” The Journal of World Intellectual Property 8 (4): 405–44. https://doi.org/10.1111/J.1747-1796.2005.TB00261.X.DOI ↗Google Scholar ↗
  28. Ralph D. Clifford. 1996. “Intellectual Property in the Era of the Creative Computer Program: Will the True Creator Please Stand Up.” HeinOnline. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/tulr71&section=46.Google Scholar ↗
  29. Raustiala, Kal. 2019. “INTELLECTUAL PROPERTY IN THE INFORMATION AGE: AMERICAN & CHINESE PERSPECTIVES.” Public Law & Legal Theory Research Paper, August. https://ssrn.com/abstract=3451389.Google Scholar ↗
  30. Ren, Xiang. 2016. “Judicial Cases in China in 2015.” The Chinese Journal of Comparative Law 4 (2): 371–86. https://doi.org/10.1093/CJCL/CXW012.DOI ↗Google Scholar ↗
  31. Samuelson, Pamela. 2017. “Functionality and Expression in Computer Programs: Refining the Tests for Software Copyright Infringement.” https://papers.ssrn.com/abstract=2909152.Google Scholar ↗
  32. Samuelson, Pamela, and Tara Wheatland. 2009. “Statutory Damages in Copyright Law: A Remedy in Need of Reform.” William & Mary Law Review 51 (2). https://scholarship.law.wm.edu/wmlr/vol51/iss2/5.Google Scholar ↗
  33. Shi, Guifeng, Wei Wang, and Lingnan Ouyang. 2004. “Policies of Software Protection: The Practice in China.” AMCIS 2004 Proceedings 88. http://aisel.aisnet.org/amcis2004http://aisel.aisnet.org/amcis2004/88.Google Scholar ↗
  34. Simpson, Amy. 1995. “Copyright Law and Software Regulations in the People’s Republic of China: Have the Chinese Pirates Affected World Trade.” North Carolina Journal of International Law 20 (3). https://scholarship.law.unc.edu/ncilj/vol20/iss3/4.Google Scholar ↗
  35. Singh, Saurabh, Pradip Kumar Sharma, Seo Yeon Moon, Daesung Moon, and Jong Hyuk Park. 2019. “A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions.” Journal of Supercomputing 75 (8): 4543–74. https://doi.org/10.1007/S11227-016-1850-4.DOI ↗Google Scholar ↗
  36. Wu, Di, and Teresa Huang. 2023. “Series of Articles on Copyright Protection (1) ─ Works Within the Meaning of the Copyright Law (Mainland China).” September 2023. https://www.leetsai.com/ltp-special-column/series-of-articles-on-copyright-protection-i-works-within-the-meaning-of-the-copyright-law-september-25-2023.Google Scholar ↗
  37. Xu, Cong. 2020. Regulatory Model for Digital Rights Management : Analysis of U.S., Europe and China. Springer.Google Scholar ↗
  38. Yang, Deli. 2003. “The Development of Intellectual Property in China.” World Patent Information 25 (2): 131–42. https://doi.org/10.1016/S0172-2190(03)00026-7.DOI ↗Google Scholar ↗
  39. Zhang, Gupeng, and Jianghua Zhou. 2016. “The Effects of Forward and Reverse Engineering on Firm Innovation Performance in the Stages of Technology Catch-up: An Empirical Study of China.” Technological Forecasting and Social Change 104 (March):212–22. https://doi.org/10.1016/J.TECHFORE.2016.01.010.DOI ↗Google Scholar ↗
Author details
Muhammad Zeeshan Ajmal
PhD Candidate, International Law, Zhongnan University of Economics and Law
✉ Corresponding Author
👤 View Profile →
Mohamed Salah Adawi Ahmed
Doctorate in International Law Zhongnan University of Economics and Law
👤 View Profile →
Basel Khaled Alsaeed
PhD Candidate, International Law, Zhongnan University of Economics and Law
👤 View Profile →
Nasir Habib
PhD Candidate, Law and Governance, Xi’an Jiaotong University
👤 View Profile →