Professional Documents
Culture Documents
Software Protection Chapter 1
Software Protection Chapter 1
INTRODUCTION
Chapter – I
INTRODUCTION
Computer programs are one of the youngest and, at the same time, the most
complex and specific objects of intellectual property law. The reference point in the
development of computer technology is considered to be 1946 when a patent was
issued to the creators of the Electronic Numerical Integrator and Computer
(ENIAC).1 The work of this integrator was to execute a certain sequence of
commands. The commands were recorded in the form of a chain of zeros and ones,
then entered into the machine as numbers in binary, octal, or hexadecimal.2
Commands created in this way were called machine code and were not
accessible to human perception. Programmers who did not participate in the
development of a software program, as a rule, could not understand all the principles
of its use, therefore such phenomena as plagiarism and borrowing of other people's
ideas were practically absent among programmers. The next step was the creation of
high-level programming languages, intending to speed up and simplify the process of
developing computer programs. Such languages provided the ability to enter
commands into the electronic computer using operators. At the same time, the
commands used were more accessible to human perception, as a result of which
copying other people's programs became much easier. 3 Further, the development of
programming went along the path of increasingly simplifying the process of creating
computer programs, as a result of which programming to a certain extent became
available even to ordinary users. The literature suggests that modern programming
1 The British patent on the ENIAC was granted on 26 May 1954, nearly a decade before the
American patent, issued on 4 February 1964 with patent no US3120606A. On 19 October 1973, after
a six-year legal battle, Judge Earl R. Lawson invalidated the ENIAC patent on the grounds that Eckert
and Mauchly had derived their ideas from an earlier computer pioneer, John Atanasoff, who invented
a specialpurpose electronic computer in the 1930s. This landmark decision placed the concept of the
electronic stored-program computer into the public domain, with enormous positive consequences for
the computer industry.
2 B.C. Smith, The Owl and the Electric Encyclopaedia, 47 Artificial Intelligence, 251-288
(1991). 3 Nilles, Copyright Protection for Programs Stored in Computer Chips: Competing with IBM
and Apple, 7 Hamline Law Review, 122 (1984).
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
has become more like compiling a program from modules created by other modules
and sections of program code.3
The internet is a strong and impressive instrument that has ushered in a new
era of learning. However, the internet can be horrific, and even devastating, if
intentionally misused. The internet is a global means of communication that is
unique. Online communications, nevertheless, can be detrimental, leading to
emotional discomfort. There is a provision in the existing legal framework to protect
the innocent of online harm. The law still has a long way to go, however in a
borderless online environment, legal solutions will still face limitations related to
time, expense, and jurisdictional challenges. Anyone can edit any article and new
3 Julian Jang Jaccard & Surya Nepal, A survey of emerging threats in cybersecurity, 80(5) Journal of
Computer and System Sciences, 973-993 (2014).
4 Alan Story, Intellectual Property and Computer Software – A Battle of Competing Use and
Access Visions for Countries of the South, UNCTAD-ICTSD Project on IPRs and Sustainable
Development, 10 – 12 (2004).
5 Peter S. Menell, Tailoring Legal Protection for Computer Software, 39 Stanford Law Review,
13391330 (1987).
Page 1 of 337
articles can be created by anyone. Sometimes correlated with a victim making a
lawsuit, shame and humiliation can chill many legal actions. The internet may have
brought changes in the world, but the internet is changing the entire world now. New
communications technologies have been pushing globalization for 30 years, the
overriding refrain of the times.
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
Much like the end of the Cold War did not mark the permanent cessation of
hostilities, the need for deterrence was still not finished. Nations are exposed to
attacks in new and creative ways in the current cyber era, representing major national
security threats. While cyber technologies offer imaginative and exciting tools for
achieving global objectives, they also enable distinctive deterrence methods, both
similar to conventional methodologies of deterrence, such as retaliation, and modern
and innovative methodologies, such as invulnerability, invisibility, durability, and
interdependence. As countries work to improve these cyber deterrence strategies,
they will need to be mindful of the corresponding legal problems that will inevitably
arise. Aspects of international law and domestic law cover these legal concerns.
Nations can extend the position of cyber deterrence and work to achieve national
goals by understanding the theories of deterrence and their related legal problems.
Page 3 of 337
Introduction
intellectual property rights and the culture, history, and legal practices of the creation
of intellectual property rights.
The computer program plays a major role in our society with regard to
technological development. The need for the adequate legal protection of software is
increasing due to the changing nature of the world-wide computer industry. There is
some ambiguity as to the legal nature of the placement of references to copyrighted
works in the Internet environment. This study tried to evaluate the real state of
software piracy, outline the history and presence of software piracy. The phenomenon
of software piracy is an undesirable and dangerous phenomenon in modern society.
This danger is exacerbated by the fact that the wrongdoer does not generally perceive
software piracy as wrong. For this reason, discussions about that and the legal regime
capable of protecting it effectively and conveniently have been recurrent. Such
discussions focused on defining the nature of the computer program and, in this way,
giving it adequate protection. The information society environment allows
unauthorized users of works who are larger experts to make them more difficult to
trace and to make them more responsible. A question then there is what the
effectiveness of regulation will actually be. However, it is, therefore, necessary to
look for suitable ways of regulation.
Over the decades, since its appearance, the regimes mentioned have been from
competition law rules, to contract law, commercial secrecy, copyright, and patent law,
among others. The policy quickly concentrated on two regimes: copyright and patent
law that translated the two ways in which computer programs were considered,
where those who considered them literary works and, therefore, liable to be protected
by copyright. But there were also those who considered them to be true inventions
Page 4 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
and, therefore, the patent law regime would apply. India legislation demonstrates this
indecision between copyright and patent law, and the legislative path in this area is
marked more controversy in the patent.
Page 5 of 337
Introduction
Initially, in 1886, the Berne Convention, the first and main agreement on
Copyright at the international level, making no reference to computer programs came
to consider that the terms "literary and artistic works" would cover all productions in
the literary domain, scientific and artistic, whatever the form of expression. In this
way, most of the authors considered computer programs subsumable in the category
of literary works. In order to harmonize the International regulations, the Indian law
modified existing copyright law to grant protection to computer programs by
copyright. The protection regime for the computer program in India is conferred on
literary works by the copyright and related legislation in force in the country by the
Copyright Amendment Act, 1994. Despite being protected by sui generis legislation,
it follows the trend of most countries in the world that understood that the computer
program should be the one conferred on literary works by copyright law. In
connection with the still high share of so-called software piracy in the global
distribution of this intellectual property, it is a need to strengthening copyright
Page 6 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
sanctions. The fact that the sellers and users almost do not consider piracy to be
immoral, illegal and even they do not know about their nature of offence and what
sanction behind them. Therefore, the solution to the future is to establish a stronger
Digital Regulation Mechanism operating on a hardware basis in conjunction with
control, restriction, or diversification of services provided by the information society
with Net Neutrality.
Section 14(b)(ii) of the Copyright Act guarantees the right of the lawful owner
to rent copies of the software, and any royalty system levied by the courts will breach
the statute. Instead, the courts should enforce the contributory violation doctrine and
expand it to cover such cases where, while the individual infringer is excused, the
contribution to the violation is unjust. The fair use doctrine can only authorize the
rental of software if the advantage of the non-infringing uses to which the lessor's
efforts, relate outweighs the damage caused by such infringing lessees. The purpose
of the law on copyright is to encourage research and useful arts. Therefore, in the
case of computer programs owners have the right to sell or give on commercial rent
and therefore it constitutes an exception to the doctrine of the first sale.
The internet is not going to vanish, but the prediction that a single internet
could satisfy both the West and the emerging demands of authoritarian states was
Page 7 of 337
Introduction
never plausible. Users will have access to the same internet in the United States and
Europe as before, although the Chinese government has already made clear its
intention to claim its own sovereignty over the internet. There is every reason for
other authoritarian states to follow his example. There are far too many variables at
work to confidently predict the full, long-term effect of modern communication
technologies on authoritarian states' political progress. But it seems fair to say that
their impacts would differ as greatly as the people's motivations and the states that
use them.
In addition, only the first part of the solution to the problem is to create a novel
and contemporary rule. The second part is successful copyright compliance, which is
similarly multifaceted. The absence of physical support opens up uncountable
possibilities within a few seconds to download and copy safe works and change
them. Internet piracy is therefore more damaging than ever for copyright owners. It is
not an easy job to strike a perfect balance between the needs of customers and
copyright owners.
new ideas, increasing the company's valuation in investment, financing, merger and
acquisition transactions and it uniquely protects the investment in research and
development, but as a disadvantage, we point out that the procedure for obtaining a
patent is long and expensive, often requires the intervention of an expert, and that this
does not correspond to the speed of development of the software market. 7 The
fundamental obstacle that stands against the protection of software as a patentable
invention lies in the fact that a program is a set of instructions that, by not involving
material manipulation, determines that it cannot be included within the
technicalindustrial advances that are the object protection centre of the Patent
Regime. As in between the duration in obtaining a patent for a software, a number of
updated versions could be invented which makes the software outdated waiting to get
patented.
Like many other countries in the world, copyright law also covers the software
program as intellectual work in India, and to that extent, the government made all
possible arrangements in copyright law by adopting international regulations. Still,
the rate of unlicensed PC software installations is 56% in India, and it's commercial
value $2,474 according to the 2017 BSA report. 8 Now the changes which were made
in copyright law for the protection of software, how far sufficient, and how much
adequate still need to examine. To bring to the notice of the legislators that it is high
time for incorporating a direct and specific statutory provision relating to stringent
and effective legislations which exclusively meant for software protection in India is
very significant.
The present study may be useful in making certain changes in the software
protection strategy like separate statutory regulations and setting up separate courts.
After completing the present study, the research may be able to throw more light on
the legal protection and judicial trends towards copyright protection of computer
programs. It is found that the legislative and judiciary in its proactive attitude has
already started in that matter by adopting international regulations.
7 Peter S. Menell & Suzanne Scotchmer, Intellectual Property Law, Handbook of Law and
Economics, 1475 – 1478 (A.M. Polinsky & S. Shavell, Vol. 2, 2007).
8 Software Management: Security Imperative, Business Opportunity, BSA Global Software Survey
(June 2018); Available at : https://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf
Page 9 of 337
Introduction
The purpose of this study is to analyse the different possibilities that the Indian
legal system offers to protect software under copyright law and other stipulations
available under different laws. To obtain a complete understanding of this matter, this
Page 10 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
study will also analyse the legal norms and jurisprudential cases of different
countries, which are pioneering countries in the regulation of this subject.
• Invention patents,
• Copyrights, and
• A proprietary or 'sui generis'9 system.
None of these three systems has been ruled out today, with the triple alternative
remaining. However, it should be clarified that most of the doctrine leaned towards
the
protection of the intellectual rights of software creators under the legal regime of
copyright and this preference has been reflected in most of the laws in force in those
countries. In recent years, voices have been raised, from the software industry about
the insufficiency of the copyright system as a mechanism to protect software. They
argue that a sui generis system should be dictated since the computer program cannot
be assimilated to a literary and artistic work, not fully migrate to the patent system,
but rather develop a mixed system based on copyright but considering exceptions in
which it would be legally feasible to patent it.10
However, the copyright regime especially takes into account the situation of the
natural person who writes the code in question and grants them rights that are born
with the writing itself, that is, with the creation of the work itself. Although there are
effective systems and legal assumptions for the transfer of copyrights from the
developer to the company that hires it, as is the case in our legislation, it is not lost on
the fact that the law makes legal fictions that omit the consideration of inalienability
of moral rights. Moreover, the aesthetics or beauty of the work is not an element of
copyright, since it is the principle of copyright that protects the work itself without
entering into the consideration of its aesthetic value or purpose.
Here in this juncture this study is very required in nature to investigate the
copyright protection of the software program in India and to examine how better it is
to fight against piracy equating with other countries, hence this research.
Keep in view of the above research objectives an actual research study was
initiated with the survey of the literature. Since the whole study is doctrinal with
comparative analysis, an in-depth endeavour is required for each part of the study.
Hence, the literature is explored mainly with two keywords, i.e. Software piracy and
Copyright protection of software programs. However, during the survey, some more
ancillary topics came across the study and their relevance was also studied and
included with the main topic of the research. To have knowledge on the problem
thoroughly the researcher referred and reviewed available literature in connection
10 John C. Phillips, Sui Generis Intellectual Property Protection for Computer Software, George
Washington Law Review, 4 (1992).
Page 12 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
with these two words is reviewed from various sources. The following books and
research
articles are referred for the most extensive source material as the present research
work.
Asheeta Regidi, Software Protection Licensing, and IPR Laws, Oak Bridge
Publishing, 2018 – This is a conceptual description of the copyright of the software,
software patent, and license rules for software. Bestows to the numerous regulatory
and statutory security structures operating against violation of software rights.
Analysis of the effect on the ripening jurisprudence of international law in India.
Relevant Indian and International Case Law studies. Discusses free and open license
principles, copyleft. E-contract enforceability, comprising shrink-wrap and
browsewrap deals, as well as the relevant provisions of the Information Technology
Act, 2000; the Indian Copyright Act, 1957; the Patents Act, 1970; and the India
Contract Act, 1872.
Page 13 of 337
Introduction
Manoj Kumar Sinha, Vandana Mahalwar, Copyright Law in the Digital World –
Challenges and Opportunities, Springer Publications, 1 st edition 2017 – The key
problems, challenges, and recommendations arising from developments in copyright
law and subsequent judicial responses are discussed in this study. It brings leading
intellectual property scholars together to discuss the critical role of copyright law in
the new world's formative needs. It offers an understanding of two related fields:
copyright and digital media. The exponential growth in the potential to replicate and
share material through digital means has eclipsed numerous copyright-related
controversies, leading policymakers to increase the reach of copyright protection in
the digital age. Taking into account the new questions on the position and function of
copyright posed by the initiation of the digital era, this research gains a series of
papers mainly covering new frontiers and shifting horizons, especially in this field.
The contributions deal intensively with core concerns such as the concept of fatigue,
copyright and digital technology, the duty of hosting service providers, the obligation
of originality, exposure to published works for the visually impaired, criminalization
of copyright piracy, and copyright law enforcement of apps, among others.
Page 14 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
Page 15 of 337
Introduction
Paul Craig, Ron Honick and Mark Burnett, Software piracy exposed, Syngress
Publishers, 1st edition, 2005 – This work is about the piracy of apps, what it is and
how it is done. It is not to be excused for copying software, and piracy of intellectual
property and violation of copyright are serious matters, but claiming that it doesn't
happen is entirely impractical. Piracy in apps has expanded the disease spectrum.
Many computer users realize this, tech firms know this, this report is very useful to
see how common theft of software is, to learn how it is done, and specifically how
amazingly simple it is to do. This study has come to explain how the theft of software
is currently being carried out.
Page 16 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
Clifford M.Koen Jr, Jin H.Im, Software piracy and its legal implications,
Information & Management, Volume 31, Issue 5, January 1997, Pages 265-272 –
In the wake of the explosion of microcomputers in the end-user computing
environment, this paper deals with software piracy as a widespread problem. With
good regulatory approval from the US, software providers and the software vendors
trade group, the Software Publishers Association (SPA), have been very aggressive in
the US in prosecuting patent infringements. A company could, inadvertently, be
subjected to the possibility of being kept accountable by its workers for copyright
infringement. This paper addresses (1) modes of software theft, (2) coordinated
antipiracy efforts, (3) aspects of software intellectual property protection, such as
corporate secrets, trademarks, licensing, copyrights, civil liability, and criminal
liability, and (4) numerous litigation and settlement cases.
Page 17 of 337
Introduction
Peter S. Menell, Tailoring Legal Protection for Computer Software, Stanford Law
Review, Vol.39:1329, July 1987, 1329-1371 – While this essay addressing the
evolution of computer program security in the USA shows how the intellectual
activity represented in emerging technology, in particular, computer software, which
was earlier, did not fall neatly into conventional modes of intellectual property legal
protection. The author firmly argues that the societal importance of the legal security
of intellectual property is essentially measured by the degree and degree to which it
encourages the availability of new, updated, and less costly goods. This essay
discusses these flaws in the CONTU guidelines by providing an economic study of
computer device legal security and by recommending the path that should be taken. It
is also helpful to recognize that basic technology requires computers to assess the
legal security of computer software and to investigate the core features of computer
technology. In this article, the author noted that computer software developers could
pursue legal protection under three conventional types of intellectual property legal
protection: copyright, patent law, and trade secret law. Of all types of legal defence,
copyright typically provides computer software with the most straightforward and
readily attainable protection. Two serious shortcomings in the study have been
illustrated, leading to the acceptance of copyright as the main way of protecting
intellectual work contained in computer software and cautiously assessing the need
for further legal protection.
David Bender, Software Protection: the 1985 Perspective, Western New England
Law Review, Volume 7, Issue 3, 1985, 405-458 – This paper addressed the different
processes and strategies available to protect software, the fundamental essence of
software and its production, its common origins, and the legal and extra-legal
approaches available to protect it. It is based on the software, while databases would
be added to sections. The author argued that software is arguably protectable under
patent law, copyright law, and/or trade secret law as a type of intellectual property. As
far as patents are concerned, there is confusion regarding the applicability of most
systems, although it is now clear that certain programmable processes and
programmable devices are eligible for patent protection. As for copyrights, extensive
applicability tends to exist, but there is confusion as to the extent of protection. And
while classical trade secret law obviously extends to programs, there is a question as
to whether there is indeed a conventional version of the venerable corpus of law. In
Page 18 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
Frans L Leeuw and Bastiaan Leeuw, Cyber society and digital policies: Challenges
to evaluation? University of Ulster Library, Sage Publications, Volume 18, Issue 1,
page(s): 111-127, 2012 – The authors discussed the relationship between (impact)
assessments and cyber society, especially digital policy, in this article. There tends to
be a discrepancy in the rate at which internet and digital policies enter society and at
the same time pay heed to these policies to skilled evaluators. It is feasible to grasp
Page 19 of 337
Introduction
the theoretical structure of policies through this article. Finally, this paper discusses a
particular area of action: internet piracy.
The topic chosen was very vast with wide scope and more technical, the
researcher limited this study as in this following means.
Since this study is legal in character, the issue of software piracy and relevant
concepts are mostly explained in general and legal understanding rather than the
technical. This study is limited to the copyright protection of the computer program
and patentability of the software is not the subject matter for this research. However,
the protection available under patent law and other statutes also explained wherever
they require to find out the effective protection. For the comparative analysis of the
computer program protection, limited to study the state practice of the USA,
European Union, Russian Federation, China, Japan, Australia, Brazil. Further, this
study is also limited to take into consideration of cases that came before the apex
courts.
In order to fructify the above purposes of the study and attainment of the
aforesaid research aims, the following objectives are identified to realize the same.
The main purpose of this research is to add new insight to the existing knowledge
with the help of various resources and answer the research questions developed on
basis of the hypothesis. Here, the present research work has been carried out with the
following objectives:
• To explore software piracy with relevant concepts and trace the growth and
development of software piracy in India.
• To highlight the global scenario of software piracy in the software industry
and analyse the causes and effects of software piracy.
• To appraise various arguments and court verdicts to establish that software
program as a literary work to get protection under copyright law.
• To review the International regulations relating to the Protection of a
computer program from the menace of piracy.
Page 20 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
Basing upon the above research questions the hypotheses was formulated for
the present study as follows
Page 21 of 337
Introduction
In this study, the researcher is trying to analyse critically the Indian regulations
and role of the Indian judiciary in the protection of computer programs in India and
there is also a conceptual analysis in this research. It requires an in-depth study of
provisions relating to a computer program and other laws in India, directly or
indirectly dealing with software protection and various judicial pronouncements on
this subject. For the purpose of this study, original texts, documents, legislation, and
judgments were collected and studied in detail. An attempt has been made to analyse
these documents with special emphasis on the judgments pronounced by the higher
judiciary in software piracy related cases. After due analysis with reference to the
objectives of the study, theoretical generalizations, legal rationality, and value
judgments have been made with due reasoning. Cases have been chosen so as to
represent judicial observation in favour of and even against the known interpretation.
Inferences have been drawn from arguments as well as counter-arguments and
presented with the researcher's comments wherever possible.
The secondary sources of data are statutes of the Indian Government, statutes
from other countries which are relating to computer program protection, books on the
Page 22 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
subject, articles from various national and international law journals, Supreme Court
and High Court case reports, reports of committees, and other reports, etc. The data
collected from these sources have helped in testing the hypothesis, further, the
international Conventions, legal orders, declarations, and commentaries on software
protection moments and the contribution of Judiciary to the development of law have
been revised. This research also relied upon the further possible and meaningful
source consisting the efficacy of the laws and implementation of international
directives on the issue like book reviews, digests, magazines, newspapers, and
periodicals, etc. with reference to the research have been collected, studied, and
utilized for the purpose of research work. In addition, this research also examined
authoritative articles and has been extensively consulted for the relevant information
available in online resources at official websites of India, foreign countries,
international organizations, and other legal online databases which were very much
resourceful for producing this work.
Therefore, online resources, official document systems, and print resources are
used as the basic research tools for this study. Since the research questions are based
on the doctrinal preposition and more often doctrinal comparative methods of
research were adopted for this research. Precisely, this is doctrinal research and the
nature of the study is exploratory.
For thematic development the present study divided into following seven
chapters.
Chapter – I : Introduction
Page 23 of 337
Introduction
The Second Chapter i.e. Software Piracy – Its Notion and Nature comprises
definitions of basic terms largely of a non-legal nature and this part includes a
general and organized definition of the software related terms. The interpretation of
the terms which is important to appreciate the thesis contents are also included. This
chapter also has a discussion on the growth of software piracy and its present global
trends, while dealing with, there is an observation of trends in regional level software
piracy and discussed various organizations that are combating software piracy. Apart
from these aspects this chapter also focussed on the Indian scenario on software
piracy, while dealing with it, this chapter examines the evolution of technology and
software industries in India, trends in software piracy, reasons which are contributing
software piracy, and various types of software piracy which occur in India.
Page 24 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
program are discussed. In this situation, this chapter examined the judicial approach
in various cases in finding the protectable idea under copyright and also a literal and
non-literal element of the computer program.
The Fifth Chapter i.e. Analysis of World Practice of Software Protection from
Piracy enumerates sources that regulate the protection of computer programs in
different setups in the world. The focal discussions in this chapter are the law
enforcement and the practice of copyright protection of computer programs in
foreign countries with regard to the practice of protecting computer programs with
copyright standards. Another noteworthy point in this chapter is, that there is an
examination of the difference in the legal protection of computer programs in
Page 25 of 337
Introduction
different states in relating to the ownership of the respective rights. This chapter in
the thesis is a crucial and analytical one which uses for comparative analysis of the
existing legal provisions among India and other countries. For such purpose, this
chapter has taken into consideration some of the countries namely the USA,
European Union, Russian Federation, Brazil, China, Japan, and Australia which are
prominent with a way forwarded in the protection computer program. While
discussing the protective measures it is mostly focused on the copyright protection of
the computer program.
Even though this chapter identified the main competitor of copyright protection of
computer programs as patent law, there are few discussions about the advantages and
disadvantages of patent form as protection have been going on for decades. In
addition to these, the special regulations particularly meant for software protection in
some countries are also discussed. Also, in this chapter, there is a discussion on the
distinction which is made by different countries on whether the program is an
intellectual-logical indication or a technical solution.
The Last chapter (Seventh) i.e. Conclusion And Suggestions deals with
summary of the research study, major research finding and suggestions for effective
control of piracy. This chapter enlists the research findings of the study. It delivers a
clear idea about the result of the study with respect to predefined objectives.
Suggestions appropriate to the research are provided followed by the conclusion. The
conclusion contemplates a potential legal regulation of responsibilities for breach of
Page 26 of 337
Software Protection from Piracy under Indian Copyright Law – A Critical Legal Study
copyright and outlines risks ensuing, the restriction of rights of internet users in case
such regulation is adopted.
****
Page 27 of 337