Content deleted Content added
→Later decisions: copyedit |
|||
Line 80:
The trend has been for courts to say that even if there are non-literal SSO similarities, there must be proof of copying.
Competitors may create programs that provide essentially the same functionality as a protected program as long as they do not copy the code.
Some relevant court decisions allow for reverse-engineering to discover ideas
With a [[clean room design]] approach one team of engineers derives a functional specification from the original code,
and then a second team uses that specification to design and built the new code.
|