Preface |
|
ix | |
List of abbreviations |
|
xi | |
Table of cases |
|
xiv | |
Table of legislation |
|
xxiii | |
Introduction and methodology |
|
1 | |
|
Definition of the Problem |
|
|
1 | |
|
|
4 | |
|
|
7 | |
1 Identification of the criterion determining adequate database protection |
|
9 | |
|
|
9 | |
|
1. Copyright as the Reference Point |
|
|
11 | |
|
1.1 Justifications for copyright protection |
|
|
11 | |
|
1.2 The interests protected by copyright law |
|
|
31 | |
|
|
32 | |
|
2. Criterion Determining Adequate Database Protection |
|
|
34 | |
|
|
40 | |
PART I THE PROTECTION OF DATABASES IN THE EUROPEAN UNION |
|
|
2 The protection of databases by the sui generis right |
|
|
43 | |
|
|
43 | |
|
1. Reasons for Introducing the Sui Generis Right |
|
|
44 | |
|
2. Overview of the Protection of Databases by the Sul Generis Right |
|
|
47 | |
|
3. Analysis of the Scope of the Sui Generis Right |
|
|
50 | |
|
|
51 | |
|
3.2 The definition of a database |
|
|
54 | |
|
3.3 Protection requirement: substantial investment |
|
|
72 | |
|
3.4 Rights and infringement |
|
|
100 | |
|
|
119 | |
|
|
137 | |
|
|
144 | |
|
3 The protection of databases by unfair competition in Europe |
|
|
150 | |
|
|
150 | |
|
1. Unfair Competition in Europe |
|
|
151 | |
|
2. The Theory of Parasitism |
|
|
152 | |
|
|
152 | |
|
|
153 | |
|
3. Simultaneous Protection |
|
|
159 | |
|
3.1 Is simultaneous protection possible? |
|
|
159 | |
|
3.2 Does the sui generis right holder have a choice between the infringement and unfair competition actions? |
|
|
164 | |
|
4. A Posteriori and Negative Protection |
|
|
167 | |
|
4.1 French case law and literature |
|
|
167 | |
|
4.2 Desirability of protecting unprotectable databases against parasitism |
|
|
168 | |
|
|
172 | |
|
4 The protection of databases by contract in Europe |
|
|
174 | |
|
|
174 | |
|
1. Fully Negotiated and Adhesion Contracts |
|
|
174 | |
|
2. Simultaneous Protection |
|
|
175 | |
|
2.1 Multiple source databases |
|
|
178 | |
|
2.2 Sole source databases |
|
|
179 | |
|
3. A Posteriori and Negative Protection |
|
|
187 | |
|
3.1 Multiple source databases |
|
|
188 | |
|
3.2 Sole source databases |
|
|
188 | |
|
|
190 | |
|
5 The protection of databases by technological measures and anti-circumvention provisions in Europe |
|
|
191 | |
|
|
191 | |
|
1. Nature of TPMs and Anti-circumvention Provisions |
|
|
194 | |
|
2. Overview of the Protection in Europe |
|
|
197 | |
|
3. Simultaneous Protection |
|
|
199 | |
|
3.1 The protection of databases by TPMs |
|
|
199 | |
|
3.2 The protection of databases by anti-circumvention provisions |
|
|
209 | |
|
4. A Posteriori and Negative Protection |
|
|
218 | |
|
4.1 The protection of databases by TPMs |
|
|
218 | |
|
4.2 The protection of databases by anti-circumvention provisions |
|
|
219 | |
|
|
220 | |
PART II THE UNITED STATES |
|
|
6 The protection of databases by unfair competition in the United States |
|
|
225 | |
|
|
225 | |
|
1. Origins and Current Status of the Tort of Misappropriation |
|
|
225 | |
|
2. Does Misappropriation Adequately Protect Databases? |
|
|
231 | |
|
|
232 | |
|
7 The protection of databases by contract in the United States |
|
|
234 | |
|
|
234 | |
|
1. Do Fully Negotiated Contracts Adequately Protect Databases? |
|
|
234 | |
|
2. Do Adhesion Contracts Adequately Protect Databases'? |
|
|
235 | |
|
|
237 | |
|
8 The protection of databases by technological measures and anti-circumvention provisions in the United States |
|
|
238 | |
|
|
238 | |
|
1. Overview of the Protection in the United States |
|
|
239 | |
|
2. Do TPMs Adequately Protect Databases? |
|
|
243 | |
|
3. Do Anti-circumvention Provisions Adequately Protect Databases? |
|
|
243 | |
|
|
244 | |
PART III PROPOSAL FOR AN ADEQUATE DATABASE PROTECTION |
|
|
9 Intellectual property, unfair competition or restitution? |
|
|
249 | |
|
|
249 | |
|
1. Differences between Unfair Competition and Intellectual Property Rights |
|
|
250 | |
|
2. General Considerations on the Appropriateness of a Liability Rule or Property Rule-based System for Intangibles |
|
|
253 | |
|
3. An Unfair Competition-based Database Protection |
|
|
255 | |
|
4. An Intellectual Property-based Database Protection |
|
|
259 | |
|
5. Restitution as an Alternative? |
|
|
265 | |
|
6. Advantages and Disadvantages of Each Protection |
|
|
267 | |
|
|
269 | |
|
10 Remedies for over- and under-protection and proposed database protection model |
|
|
271 | |
|
|
271 | |
|
1. Characteristics of the Right |
|
|
273 | |
|
2. Definition of the Subject-Matter |
|
|
273 | |
|
3. Substantial Investment |
|
|
275 | |
|
|
276 | |
|
|
278 | |
|
|
284 | |
|
7. Relationship with Other Laws |
|
|
289 | |
|
|
289 | |
|
|
290 | |
|
7.3 TPMs and anti-circumvention provisions |
|
|
291 | |
|
|
296 | |
|
|
298 | |
Conclusion and outlook |
|
300 | |
Bibliography |
|
303 | |
|
|
303 | |
|
|
306 | |
|
Studies, Reports and Theses |
|
|
328 | |
|
|
329 | |
Annex |
|
330 | |
Index |
|
349 | |