{"id":9732,"date":"2026-02-01T19:23:48","date_gmt":"2026-02-01T17:23:48","guid":{"rendered":"https:\/\/inprojournal.org\/?page_id=9732"},"modified":"2026-02-03T21:26:02","modified_gmt":"2026-02-03T19:26:02","slug":"2020-6-1","status":"publish","type":"page","link":"https:\/\/inprojournal.org\/en\/2020-6-1\/","title":{"rendered":"2020-6-1"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"1024\" src=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-734x1024.jpg\" alt=\"\" class=\"wp-image-3609\" style=\"width:217px;height:302px\" srcset=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-734x1024.jpg 734w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-215x300.jpg 215w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-768x1071.jpg 768w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-1101x1536.jpg 1101w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-1468x2048.jpg 1468w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/03\/018-cover-scaled.jpg 1835w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-small-font-size\">Theory and practice of intellectual property<br>\u2116 6 \/ 2020<\/p>\n\n\n\n<p class=\"has-small-font-size\">ISSN (Print) 2308-0361<br>ISSN (Online) 2519-2744<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\" style=\"font-size:10px\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-black-color has-text-color has-custom-font-size wp-element-button\" href=\"https:\/\/drive.google.com\/file\/d\/1iAc9cmoTRETO9z3hq14syOsXjofDDrEl\/view\" style=\"border-radius:10px;font-size:10px\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"14\" height=\"14\" class=\"wp-image-362\" style=\"width: 14px;\" src=\"https:\/\/test.inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153.png\" alt=\"\" srcset=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153.png 512w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-300x300.png 300w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-150x150.png 150w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-450x450.png 450w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-106x106.png 106w, https:\/\/inprojournal.org\/wp-content\/uploads\/2023\/01\/free-icon-pdf-201153-80x80.png 80w\" sizes=\"auto, (max-width: 14px) 100vw, 14px\" \/> PDF (Ukrainian)<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-small-font-size\">DOI: <a href=\"https:\/\/doi.org\/10.33731\/62020.233854\">https:\/\/doi.org\/10.33731\/62020.233854<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Published \u00a0\u00a0\u00a0\u00a0\u00a02020-12-01<\/p>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/inprojournal.org\/wp-content\/uploads\/2025\/11\/CC-2.png\" alt=\"\" class=\"wp-image-6960\" style=\"width:131px;height:auto\"\/><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-medium-font-size\"><strong>Copyright protection for computer programs<\/strong><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Kostiantyn Zerov<\/strong><br>Ukraine<br><a href=\"https:\/\/orcid.org\/0000-0003-2916-7528\">https:\/\/orcid.org\/0000-0003-2916-7528<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Abstract<br><\/strong>The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author&#8217;s own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has \u00ablegally indifferent\u00bb and \u00ablegally significant\u00bb elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: \u00abliteral copying\u00bb and \u00abnon-literal copying.\u00bb It is concluded that \u00abnon-literal copying\u00bb of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer program gives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder&#8217;s property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, the use of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.<\/p>\n\n\n\n<p><strong>Keywords: <\/strong>computer program, copyright, literal copying, non-literal copying<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>\u0410\u043d\u0434\u0440\u043e\u0449\u0443\u043a \u0413. \u041e., \u041f\u0435\u0442\u0440\u0435\u043d\u043a\u043e \u0421. \u0410. \u041f\u0440\u0430\u0432\u043e\u0432\u0430 \u043e\u0445\u043e\u0440\u043e\u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f (\u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c \u0456 \u0431\u0430\u0437 \u0434\u0430\u043d\u0438\u0445). \u041a\u0438\u0457\u0432 : \u041d\u0414\u0406 \u0406\u0412 \u041d\u0410\u041f\u0440\u041d\u0423, 2013. 300 \u0441.<\/p>\n\n\n\n<p>\u041f\u0440\u043e \u0430\u0432\u0442\u043e\u0440\u0441\u044c\u043a\u0435 \u043f\u0440\u0430\u0432\u043e \u0456 \u0441\u0443\u043c\u0456\u0436\u043d\u0456 \u043f\u0440\u0430\u0432\u0430 : \u0417\u0430\u043a\u043e\u043d \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u2116 3792-XII \u0432\u0456\u0434 23.12.1993 \u0440. \u0412\u0456\u0434\u043e\u043c\u043e\u0441\u0442\u0456 \u0412\u0435\u0440\u0445\u043e\u0432\u043d\u043e\u0457 \u0420\u0430\u0434\u0438 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. 1994. \u2116 13. \u0421\u0442. 64.<\/p>\n\n\n\n<p>\u041a\u0430\u0448\u0430\u043d\u0438\u043d \u0410. \u0412. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u0438\u0439 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440 \u043a\u0430\u043a \u0443\u0441\u043b\u043e\u0432\u0438\u0435 \u043e\u0445\u0440\u0430\u043d\u043e\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0432 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u043c \u0438 \u0438\u043d\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u043e\u043c \u0430\u0432\u0442\u043e\u0440\u0441\u043a\u043e\u043c \u043f\u0440\u0430\u0432\u0435.<br><a href=\"https:\/\/publications.hse.ru\/articles\/72339313\">https:\/\/publications.hse.ru\/articles\/72339313<\/a><\/p>\n\n\n\n<p>Directive 2009\/24\/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version).<br><a href=\"http:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/\">http:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/<\/a><\/p>\n\n\n\n<p>Association Agreement between the European Union and its Member States, of the one part, and Ukraine, of the other part.<br><a href=\"http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:L:2014:161:FULL&#038;from=EN\">http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:L:2014:161:FULL&#038;from=EN<\/a><\/p>\n\n\n\n<p>\u041f\u0440\u043e \u0434\u0435\u044f\u043a\u0456 \u043f\u0438\u0442\u0430\u043d\u043d\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0438 \u0432\u0438\u0440\u0456\u0448\u0435\u043d\u043d\u044f \u0441\u043f\u043e\u0440\u0456\u0432, \u043f\u043e\u0432\u2019\u044f\u0437\u0430\u043d\u0438\u0445 \u0456\u0437 \u0437\u0430\u0445\u0438\u0441\u0442\u043e\u043c \u043f\u0440\u0430\u0432 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0457 \u0432\u043b\u0430\u0441\u043d\u043e\u0441\u0442\u0456 : \u043f\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0430 \u041f\u043b\u0435\u043d\u0443\u043c\u0443 \u0412\u0438\u0449\u043e\u0433\u043e \u0433\u043e\u0441\u043f\u043e\u0434\u0430\u0440\u0441\u044c\u043a\u043e\u0433\u043e \u0441\u0443\u0434\u0443 \u0423\u043a\u0440\u0430\u0457\u043d\u0438 \u2116 12 \u0432\u0456\u0434 17.10.2012.<br><a href=\"http:\/\/zakon5.rada.gov.ua\/laws\/show\/v0012600-12\/print1446498314299733\">http:\/\/zakon5.rada.gov.ua\/laws\/show\/v0012600-12\/print1446498314299733<\/a><\/p>\n\n\n\n<p>\u0423\u0433\u043e\u0434\u0430 \u043f\u0440\u043e \u0442\u043e\u0440\u0433\u043e\u0432\u0435\u043b\u044c\u043d\u0456 \u0430\u0441\u043f\u0435\u043a\u0442\u0438 \u043f\u0440\u0430\u0432 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0457 \u0432\u043b\u0430\u0441\u043d\u043e\u0441\u0442\u0456.<br><a href=\"http:\/\/zakon2.rada.gov.ua\/laws\/show\/981\">http:\/\/zakon2.rada.gov.ua\/laws\/show\/981<\/a><\/p>\n\n\n\n<p>\u041f\u043e\u0447\u0430\u0442\u043a\u043e\u0432\u0438\u0439 \u043a\u043e\u0434. \u041c\u0430\u0442\u0435\u0440\u0456\u0430\u043b \u0437 \u0412\u0456\u043a\u0456\u043f\u0435\u0434\u0456\u0457 \u2014 \u0432\u0456\u043b\u044c\u043d\u043e\u0457 \u0435\u043d\u0446\u0438\u043a\u043b\u043e\u043f\u0435\u0434\u0456\u0457.<br><a href=\"https:\/\/uk.wikipedia.org\/w\/index.php?title=\u041f\u043e\u0447\u0430\u0442\u043a\u043e\u0432\u0438\u0439_\u043a\u043e\u0434&#038;oldid=29322372\">https:\/\/uk.wikipedia.org\/w\/index.php?title=\u041f\u043e\u0447\u0430\u0442\u043a\u043e\u0432\u0438\u0439_\u043a\u043e\u0434&#038;oldid=29322372<\/a><\/p>\n\n\n\n<p>Object code. From Wikipedia, the free encyclopedia.<br><a href=\"https:\/\/en.wikipedia.org\/wiki\/Object_code\">https:\/\/en.wikipedia.org\/wiki\/Object_code<\/a><\/p>\n\n\n\n<p>IT-\u043f\u0430\u0442\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u0441\u043e\u0444\u0442\u0430: \u043f\u043e\u043b\u044c\u0437\u0430, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u043f\u043e\u0434\u0432\u043e\u0434\u043d\u044b\u0435 \u043a\u0430\u043c\u043d\u0438.<br><a href=\"https:\/\/habr.com\/ru\/post\/527484\">https:\/\/habr.com\/ru\/post\/527484<\/a><\/p>\n\n\n\n<p>\u0418\u043e\u043d\u0430\u0441 \u0412. \u042f. \u041f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0432 \u0433\u0440\u0430\u0436\u0434\u0430\u043d\u0441\u043a\u043e\u043c \u043f\u0440\u0430\u0432\u0435. \u041c\u043e\u0441\u043a\u0432\u0430 : \u042e\u0440\u0438\u0434\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043b\u0438\u0442\u0435\u0440\u0430\u0442\u0443\u0440\u0430. 1972. 168 \u0441.<\/p>\n\n\n\n<p>Computer Associates v. Altai (BitLaw). 982 F.2d 693.<br><a href=\"https:\/\/www.bitlaw.com\/source\/cases\/copyright\/altai.html\">https:\/\/www.bitlaw.com\/source\/cases\/copyright\/altai.html<\/a><\/p>\n\n\n\n<p>Raysman R. Copyright Infringement of Computer Software and the &#8216;Altai\u2019 Test \/ R. Raysman, P. Brown.<br><a href=\"http:\/\/euro.ecom.cmu.edu\/program\/law\/08-732\/Copyright\/CopyrightInfringementOfSoftware.pdf\">http:\/\/euro.ecom.cmu.edu\/program\/law\/08-732\/Copyright\/CopyrightInfringementOfSoftware.pdf<\/a><\/p>\n\n\n\n<p>Nova Productions Ltd v Mazooma Games Ltd &#038; Ors [2007] EWCA Civ 219 (14 March\u20082007).<br><a href=\"http:\/\/www.bailii.org\/ew\/cases\/EWCA\/Civ\/2007\/219.html\">http:\/\/www.bailii.org\/ew\/cases\/EWCA\/Civ\/2007\/219.html<\/a><\/p>\n\n\n\n<p>Navitaire Inc v Easyjet Airline Co. &#038; Anor [2004] EWHC 1725 (Ch) (30 July 2004).<br><a href=\"http:\/\/www.bailii.org\/ew\/cases\/EWHC\/Ch\/2004\/1725.html\">http:\/\/www.bailii.org\/ew\/cases\/EWHC\/Ch\/2004\/1725.html<\/a><\/p>\n\n\n\n<p>Judgment of the Court (Grand Chamber), 2 May 2012 SAS Institute Inc. v World Programming Ltd. Case C\u2011406\/10. ECLI:EU:C:2012:259.<\/p>\n\n\n\n<p>U.S. Code. Title 17. Chapter 12. \u00a7 1201- Circumvention of copyright protection systems.<br><a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/17\/1201\">https:\/\/www.law.cornell.edu\/uscode\/text\/17\/1201<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Theory and practice of intellectual property\u2116 6 \/ 2020 ISSN (Print) 2308-0361ISSN (Online) 2519-2744 DOI: https:\/\/doi.org\/10.33731\/62020.233854 Published \u00a0\u00a0\u00a0\u00a0\u00a02020-12-01 Copyright protection for computer programs Kostiantyn ZerovUkrainehttps:\/\/orcid.org\/0000-0003-2916-7528 AbstractThe article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9732","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/9732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/comments?post=9732"}],"version-history":[{"count":5,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/9732\/revisions"}],"predecessor-version":[{"id":9798,"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/pages\/9732\/revisions\/9798"}],"wp:attachment":[{"href":"https:\/\/inprojournal.org\/en\/wp-json\/wp\/v2\/media?parent=9732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}