Professional Documents
Culture Documents
Áîômë@ Îè Áîômë@ Îè Áîômë@ Îè Áîômë@ Îè at @ at @ at @ at @
Áîômë@ Îè Áîômë@ Îè Áîômë@ Îè Áîômë@ Îè at @ at @ at @ at @
D - + & !3 <2 B &#" A$/ 5
9
=
$
# &< =
$
E 2 &$
42
" 9 &
C
@ #
')! 0 # & /
"
. 4
D 2 "( &F .
;3
& 7
.$ "+
"
< =
( ) + > #
&! 0
$
:$
"+ + :! 2
>
2"
.6
? ; "@ A$/ $
+
$
/
?B43 "
$/ 0 1 A $
"
! .
&
C
@ # = &
"
')! 2 " #
. "
$4 B"
.
$
@ + A$/
" +.
D - + & !3 <2 B &#" A$/ 5
9
=
$
# &< =
$
E 2 &$
42
" 9 &
C
@ #
')! 0 # & /
"
. 4
D 2 "( &F .
:
;
A
8 H"
.
)! # &<$/
.< =
:
.=
:
.2
C
@ #
0 :
."
.
I4
J-
:
ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ
.$4
7 <+ – 6 – =
!2
.<$2 "/2 H)
E7
@
LL LL
LL LL <LL L =LL L
LL L
LL L 2 =LL L
LL LL <LL L M &<LL L $/
."
')! D -
!
@/2 # "/ 2 A/ &
ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ
ﺗﻌﺮﻳﻒ ﺍﳊﺎﺳﺐ
.>01
# 91 2 H 7$
""
)!
@ @ZðìÌÜÛa@ÑíŠÈnÛa@Züëc
!
7$
A
8 6$N 7$
Computer $ >41
 )! H)
6
A$/ $02
.$4
=
9
')! #"4 5.
E - "+ &" " !
7$
%
E "
N
" S$0
"
:$ "4 .(Q)/
– 3 =
– $
#
+ / &
!
()
5.
E "+ &(T)"
N =
" S$0 E
#"4 .(Q)X
.(Y)
')! #"4
"
Z #
" S$0 #"4 - 5.
E 2 " &B42
.([)« Ordinateur » .
#>
+"
'/
0 &
– &>$
#$
" &//H6$ X + ^3 "
&#$
% ()
" &'
,- '
.' ? W[I &QWab &Q0 &"
^
" &
/0$
/
.\ I &." &
!
&
.
" &(Q)=
# $/ $$ ^
/0$
" &
N =
c
&,
'
0!
'
.' (/)
"
."/ .- 12 = &automated
+ "
Z =
" S$0 #"4 H
D
2 )
"
f :
) &TUUT
aT #+
"
.
$
@
E
; &(Q[U)
"
C
@
.$
$3 E
'""
(Q)
S$0 #"4 2 < 9 "+ "
8 (!
" < & .......... » :)
.(T)«
7$
J +2 $ "=
"
@ @Zïyýİ•üa@ÑíŠÈnÛa@ZbĆîãbq
< 9.$
"" $
90
8 6" <( E
</
(Y)
& "L $0
c%
d4 # N 4" "
#
64
.([)«+ $
+
] c
» <( E
< L/
4" "
]
=
#+ .
)! @.
#"4 &=
X$ A$/ E
D &(Q[U)
"$
$3 I
#
()
.$0
" B :!
&=
X$
.
"1 " [\ & Ya $
0- :
.=
A$/ &!" T` . &Q\ . &TUUT #/
& " ^=
I4 + # & = ' 2!
'
.' (&)
?c
=
6
6M <! S-
)!
=
< # "=
$ #" A $ # 9 ;
?/ 64
&c
<
!""
$
&=$
c
!2 -2
9 &c$
=
!2 S- #
.4Z / !"3 A* 1 >
(1)
Ibid.
&Analog & Digital + A
8 #
;
&'
()
' *+ & #"4 D 3 ')! D
&Sequential & Hybrid
#"4 ; &+
! /
9 !2 D 3 :$ 2
&W[I &@ J
% #+(
6
#+3 A$/ $/
# &$
i
.QTWI &@
J
: .
"6
.(" & .)
.`` I &@ J &
# (&)
&
ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ
ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﺐ
=$
"
! :
) "
M =
/ ;"
"/
: &
7$
')! A$/ @$0
"/ :! .Hardware
-. &(Q)"
2 &
63 2 &=
2 &H"
2 &"
6$
. 4 <3 ""
" S$0 #"4
&6
)! "
J0
! ("
) =$
"
')! 6 ) &(T) $
@%+ 2 > 2 6 2 " 5
D &Software
!
/
$ #» L (
"
) =
"
.(Y)9.$ - 2 A$/ «=
5 # =
("
) =
"/ 2
$ (/)
>4 :
) &
5
A$/
0 0
&/ 3 D41
=
B A$/ D4
5 A$/ $
" B" "
)
:A
)! .
Vincent Chiappetta, Patentability of Computer Software Instruction as an
"Article of Manufacture": Software as such as The Right Stuff, Journal of
Computer & Information Law, Vol. XVII, 1998, p. 139.
/
@ @ZHòíŒ×Š½a@ò¦bȽa@ñ†yëI@ÕîÓ†Ûa@&bȽa@Züëc
6
"
4
#1 ! Microprocessor @+"
c
=$+ ! )8 ?=
#!2 "2 ! Central Processing Unit (CPU)
.
"/ " ! "
+ <. =
'/ -. :! &=
5"2 #
# &0 B42 $/ .$4
$
5"( #
.(Q)B43 "
" &@0
=
" ) :! &562 > @+"
c
.(
)
" &#
1
% / A
8 # ! :(Main memory) 5%!%B
?#C
(D)
:/
)! $ .(RAM , ROM)
)
) # &Random Access Memory 6$N A
$/
&
5+
)
! &
)
2
d &c
$4" J-
#"4 &$/ )
2
c
#
)
A
8
')! 19 2 64
" 2 A
8 c
=$0 )8 B42
64
" A
8 !" #
')! A$/
$
5M
" c
0 2 ! RAM
)$
%
.
&3
.(Q)64
9 8
)
:$
-2
9 &0
5
) H2 &Read Only Memory 6L$N A
&) 2 $" F * $ 2 c A$/ &
)
#
A$/
"
5+ .([)0
5
) A :
)
&0 5+
4
D0
A $/ 64
$
. ; ?
2
)
')!
. 1
RAM %
) X
A$/ &6
/
.(Q))
D0
$
(
) %"
c
ROM 0
5
) A$/ J-
c
A
<- H)
BIOS c Firmware c $2 &Firmware
7
6 07- "/ =
D>+M 5"$
ROM
) A$/ $
(T)
@+"
"
# -2
9 c
)! A$/ @$0 . =
7 #
#6>
-
.Microprocessor @+"
c
A$/ <2 / A$/ Microcode
:(/)Þb/…⁄a@pa†yë@Z@bĆîãbq
(.
&I+3 7 " &S.
:
4"N " $2
&
A$/
62 &X$
&% -
#$
&=
3 / &
N
.% -
"/3 l+ &
S
:(1)xaŠ/⁄a@pa†yë@ZbĆrÛbq
$
0 4 ٕ c%
M "
')! #
./
&#
1] &0
&
:$2 &=
(2)
See: <ar.wikipedia.org/wiki/>بيوس, (Last visited 25/3/2015).
. Yb ^ Y` I 91 #%"
c
"
.Yb^Y` I &@ J &23A '%$!
'
+ .0.' (/)
.!" `\ I &@
J
(1)
G
:()òîu‰b¨a@ëc@òíìãbrÛa@å팂nÛa@pa†yë@ZbĆÈia‰
$ 0 .
(m
8 ... c% &c &) $
64 "
')! #
&07
03 :"
:$ $2 &1 + 2 "4
"/8 "
-
)
&(CD-ROM) "
I+3 &$
I+3 &
I+3
.Flash memory
ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻧﻲ
ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ
ﺍﳌﻘﺼﻮﺩ ﺑﱪﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ Software
=$
".
6$
" S$0 Software
A$/ E
@$0
.(Q)Hardware "
<%62 2 =
"/ /
6
9
.(T)#
$
c
“Software” "" $
% J &5N
c
" (
A
8 E
2
.YWY I &@
J )&(
J 2 @
)! &(Q)"=
# A$/ 2
& 0
J A$/
1"$
#"4 S$0" <( "
" S$0 A
8
7$
7
6>
c
! &#
c :
) &=
#
"
*
.(T)"=
#"4 4
c
! &0
c &=
"4
c
J
7$
J ') 2 >
*
!/ c
:$ 4
@%
J
8 9- &=
.=
#
"
(1)
Arnold Burdett and others, op. cit., p. 168.
Procedure 5N 2 &c
562 "2 ! Routine
2 )
"
=
$0
X
&2%!
'%! .0 : &$
$
c
.[Q I &TUU` &T0 &
!
&J6
$
>! &//H6$8 ^
N – N ^
Z
.T`` I &@ J &
# (&)
"
J0
B"8
2 &=
#
"
*
!
( "
6 2 J-
"
: > 2 " J0+ X
c
&<) =
"/
0 ) &H" H3 c
" 1 ') .Hardware =
"/
<$7 "/ c
&H" :
) #* <
&N X 0 :" 1 I4 D
&"
<64 "/ &
<
N ))
/ /
/ =
"/
:$ 69 7
07
/ /
/ =
)
"
# c
J- / ;"
"/ .
%6
')! .
)
.Y #+ \` I 1
9 ." * " A
8 5j
!). = $0
$
<
=
A
8 4" &) %+
" } | 3
.(Q)" E* @
(2)
Microsoft Computer Dictionary, Microsoft Press, Fifth Edition, 2002, p. 489.
.\T – \Q I 91 (/)
&"
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ
$4"
"4
% J # " H)
c
! 7
#
"/ " c H2 7 2 &=
4" $/ 2 58 ; &=$
A
8 #"+3
7
# . $ 2
( E7 =
:(Q)
A$/ ;"3
:Machine Language 5 8 56
& 3
7
2 Low Level Language E.4
B
7
A
@$0
! 7$
:$ .=
J =04 2 N D0
7$
A
2
% #
2 :
) A &Binary Code %
"
$/
; &=
4" %
! &(" &.)
A$/ 3 7
"+ .@$* 7 H2 (on , off)
B"8
@
9
9 ; &(" & .) +
~ %!
! " 5043
9 &3 = " 9
=
L7$
')! 2 18 & B
A$/2 B42 7
A
8 (
#"41
.(T)!
Z #. 1
7$
')! A
8
3 2 " 1
! #. 1
7$
Z 04 % 3 =
5$/ :"2 "
*
"Z .3
$$ I4
A$/ ; ?(" & .)
7
A
8 (
)
?< (04
D +
:
) : 1 . "
9 3 "2
"
&(Y)# 1"
9
Z 7$ 3 * # (c)
4
&2
! ?' .' 9+
%K! .' ? a\ I &@ J &23A '%$!
'
+ .0.' (&)
&&
; ?
Z 7
9 2 ! &
7
&J
7
J
. 3 4 &#+3 6$N
"4
J 7
d '6 0 </ = = .
Z 7
%
#
-2
Z 7
A
8 J
7
# 2 = .
63 . >41
9 < 4
@0 / :
) # &2 A$/ &! =
#. 1
(" & .)
.(Q)Assembler J
A I4 #
7$
$/ @$02 :
)
?
N 7$
=+2 A!
Z) B
-.4 7$
>
A$/ =$7$
7 ; ?B
Fortran 7
9> &$4 #"4
7$
""
" .(J
7
&
E*3 #"4 Cobol 7
&$
0
#"4
.(T)m
8 ...
"" E*2 #"4 %"$
7
! &Basic
# ?
>
"" D ! 7$
:$ D "" =
.(Y)
" 7
7$
" =
<M
A
8 7
-2
9 $4 Compiler
c M B
/ 7$
>4
&/
.(Q)B42
(T)
:Application Software òîÔîjİnÛa@pbî©@Ûa@ZbĆîãbq
D 2 $ &"4 1 ! 1 0
8
.%0 A
8
/
')! # .
A
""/ "4
:2
#
! &
6!
c
#6 $/ @$0 2 :5%,
:%+
. $
% / $
$
!""/M
"
c &MS Word c I
c :c
')! $2
c &
E*3 c &#
c &Excel cL
.@
9.$ " c
')! .m
8 ... =
3
<
LL L L ALL LL$/ cLL LL
JLL L L L L L
@LL LL. LL L L2
9 &<LL L L =LL LL LL L L ".LL LL
&2
! ?' .' 9+
%K! .' ? WY I &@ J &23A '%$!
'
+ .0.' ()
&1
LL L L
0LL L L3 ) LL L L
ALL L L$/ <LL L L6 LL L L
9 cLL L L
>7LL L L @LL L L ALL L L$/
.<0
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ
:
A$/ ! &c
""/8 "/ / =
"/ :!
@ @ZòÜØ’½a@†í†¤@Zµëþa@òÜyŠ½a
:
) ?c$
%
.
2 $
"" c
# $
')!
$
#
A .(Q) = $$
-/ 0 04 2 "!2
7 2 &
>4"
# $
.
"8 A
.(T)c%
4
<
8
Z(Y)pbîß‹‰aì¨a@…a†Çg@ZòîãbrÛa@òÜyŠ½a
c
# c
. 2 $
A$/ c
2 "
/ # 2 > A
8 c$
%
.
. # ; ?I4
A
8 #
Module " (/ c) Subroutine = :A &02 2
=
M c
#
"
9 &([)(0
" )
(1)
Robert Plotkin, From Idea to Action: Toward a Unified Theory of Software
and The Law, International Review of Law Computers & Technology, Vol.17,
Issue 3, November 2003, p. 339.
.YU` I &@ J &2
! ?' .' 9+
%K! .' (&)
.`ba^`bb I &"$
@$ @
6 4
d) (/)
"
91" c
0 H2 <
8
"/ =
A/" ; ?
(=) "
2 &[UT – [UQ I &@ J &'
()
' *+ .' : &
<.
&4
$
A
8
.7( 72 #+2 A
8 # 2 (/.
c
)
/.
c
= c
#
c$
%
. $
@
#
>/.
"" &Modules 0
"
Subroutines
.(Q)#6 4
#
9 J &c
"!
&c
$
0
<$/ @$0 &#* $
2 &Algorithm "#6 4
"
5%M% > 5%E, 5#
+> 2 :,3
2 ''
!! " <( #6 4
5%
:,3
2 5+" <( &(T)"5K F'> >
."5%K 5,E 5%' 5,E N
2# 7K!! :,3
C% 0 % %
7(,
"@"
04" # #"4 ! (#6 4
) 0
0 -2
54
A$/ 1 "4 2 @"
0%4 #"4 $-2 .Flowchart
.(Y)A 2 1 "4
6
2 &#!"
:([)=
D 2 > #6 4
#"4
"
&
c
- "
9
"" # H"C $ / (0
"
) (=)
c
""
#"4 2 H)
& =
>4 " c
#"4
"/
: ..$4
James V. Vergari and Virginia V. Shue, op. cit, p.554.
(1)
Computer Associates Intern., Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992),
at 697.
(2)
Microsoft Computer Dictionary, Microsoft Press, Fifth Edition, 2002, p.23.
.!" aW I &@ J &'
,- '
.' (/)
(4)
See: <https://ar.wikipedia.org/wiki/6 4>, (last visited 15/1/2015).
&G
)M &
0
E 4 A
8 >
:$ d " &$$
4] J %04 ) ٕ &$$ $ H D #
.41 2
)4 0
')! A &$
$4
04
! &Coding Phase "c
" " # -2 9
.(T) 7$ $ A
8 @"
04 -/ #
2 c
< &N =
5$
+ c" <( "
"
@0 /
5$
+ * &J 7$ 2 B
/ 7$ 0
.(Y)"=
'). 2 + "
" A
8 # 2 A
8 d &=
<M @"
0%4 # c
2 " <2 @
S-
004
0%4
')! = # ?=
A
8
4"8 A
8 d
:7
&. 2 N J0
7
B"M =
A
8
""/8 $ A$/ @$0 .([)9.$ - 2 A$/ &
&:
& .
Writing a computer "=
c " S$0 "
" @"
0%4
.YUW I &@
J
(&)
(3)
Microsoft Computer Dictionary, op. cit., p. 491.
.YUW I &@ J &2
! ?' .' 9+
%K! .' (1)
&
.(Q)program
3 $
"" #% + /
/ Source Code "
"
1 N .
7
B"M *
&!). =
A$/ =
Z 7
A
8 3 $
:$ = =
. A &=
.
.(T)N . 1 =
.
(" & .)
2 Compiler #
@0 / '"
# H)
"
" <( "
"
#. .(\)"c
I4
"
" < # H)
&Assembler J
A – $ 2 <- – c
I4
"
" 2
)!
(
Z 7
) =
.
7$
A
8 < = =
@0 / ').
(1)
James V. Vergari and Virginia V. Shue, op. cit, p.p. 554-555.
(2)
Dennis S. Karjala, Copyright Protection of Computer Program Structure,
Brooklyn Law Review, Vol. 64, July 1998, footnote 1, p. 520.
(3)
Christina M. Reger, Let's Swap Copyright for Code: The Computer Software
Disclosure Dichotomy, Loyola of Los Angeles Entertainment Law Review, Vol.
24, Issue 2, 2004, p.p. 219-220.
(4)
Ibid., p. 220.
(5)
Microsoft Computer Dictionary, op. cit., p. 372.
&
#
A c @0 /
$/ # .(" & .)
3 &
7
D = Assembler J
A 4] c 2 &Compiler
#"4
&B
/ 7$ =
"
"
#"4
.(Q)E.4
B
) J
7$ =
"
"
&
c . 7
5042 A$/ c
H 2 0
7$
504j
c
S " . c
# &5043 :$ 2 A
8
&< 4
c%
"($
=
A$/ <$7 c
#
* c% A$/
A
8 H"C 0 5042 " ! :
) =
2 = 2 E .
2 "F0" 2 c
= 2 &
.(T)"J"
Object "
"
c
c
5042 J S "
) A$/ "
" 64 "
%$
=
# ; ? "+ Code
J. " ))
5$
$+ * &(Y)% 8
=
.([)("." E.4 " ) &"" "
$
6 # / . c
2 )
"
#"4>
9 >
9 c
S
! &""
" "
.(\))
.
=j
"L
" / FN # 1 &$2 "/2
E*3
.@
J
(&)
(3)
Robert Plotkin, op. cit., p. 340.
(4)
Dennis S. Karjala, Copyright Protection of Computer Program Structure, op.
cit., footnote 1, p. 520.
(5)
Christina M. Reger, op. cit., p. 220.
&
@ @Zwßbã@Ûa@Õîqìm@Zòßb¨a@òÜyŠ½a
F c
# &c
6
04 4] ?
04
')!
')! .c
7 0
F # &<
4] c
ﺍﻟﻔﺮﻉ ﺍﻟﺮﺍﺑﻊ
""
4 !2
&
#!. E F-8 $
.91 B A$/
$
/6
interconnection
0
interaction /.
c
"4
J &"
!* J =
"/
(2)
Microsoft Corporation v. Commission of The European Communities,
Commission Decision of 24.03.2004, Case COMP/C-3/37.792 Microsoft, at 32.
(3)
Dannis S. Karjala, Copyright Protection of Computer Documents, Reverse
Engineering, and Professor Miller, University of Dayton Law Review, Vol. 19,
1994, p. 990.
/"
:A
8 c
#
#"4
<$ 2 7 /
9
] ( 4
#"4
"
&!62 004 !
#"4
2 " >
9 ?
Z :$ 7
"
.$4
!1 >
#"4
"
$/ !
$
...
(.
S.
=$
&/
E.4 2
"6
&#% + c
A$/ # .
)! 4" 1 9 ٕ
" +
# c
# .6
2 & 2 & &
3 ?"
)! +
"
2 1
&"
(1)
John C. Phillips, Sui Generis Intellectual Property Protection for Computer
Software, The George Washington Law Review, Vol.60, Issue 4, April 1992,
footnote 43, p. 1007.
(2)
Microsoft Computer Dictionary, op. cit., p.544.
(3)
Marci A. Hamilton and Ted Sabety, Computer Science Concepts in Copyright
Cases: The Path to A Coherent Law, Harvard Journal of Law & Technology,
Vol.10, No.2, Winter 1997, footnote 36, p. 247; John C. Phillips, op. cit.,
footnote 43, p. 1007.
/
=
!). "
" $ 2 / 18 !
H2 X" 2
) c
J0 &(Q) "4
"4
A$/
1 &(T)c
)!
0 c
<$7 52 c
."
2 0
.external interface 4
# -2
9 #"4
.
$
2 $4"
#
/ # c$
$4"
/ J- c
# .c
* 56
!
/.
@ A c$
$4"
$
< 52 0 $
A$/ / -
B43 c
c
:
) & =
"/ c
H2 # / A* 1 $4"
M
.B42 =
&<-* @ A =
J /. 2 <
" 1 c
3 ?c
/ :
) .<-* @
=
A$/ B43 c
J /. 2 <
" | 1 -2
9
7
c E. ; ?=
A$/ 7
c J <$/. 0
c
$4"
# "/ / # 2 =
.
$
/
(
.(Y)@ < 2 43 )
A 0
c$
(1)
Dennis S. Karjala, A Coherent Theory for The Copyright Protection of
Computer Software and Recent Judicial Interpretations, University of Cincinnati
Law Review, Vol. 66, October 1997, p. 96.
(2)
Pamela Samuelson and others, A Manifesto Concerning The Legal
Protection of Computer Programs, Columbia Law Review, Vol. 94, Issue 8,
December 1994, p. 2430.
(3)
See: Microsoft Corporation v. Commission of The European Communities,
Commission Decision of 24.03.2004, Case COMP/C-3/37.792 Microsoft.
Pamela Samuelson, Benson Revisited: The Case Against Patent Protection for
Algorithms and Other Computer Program-Related Inventions, Emory Law (=)
/&
# J- 2 H -
& .+3 < / - 7
#
9 > 2 A .+3 :$ S. < / c$
$4"
.@ #
@ @ZáîÄänÛaë@ÉibnnÛaë@òîäjÛa@ZbĆîãbq
Structure, Sequence and Organization:
c
2 Data structure
! 52
"/ $/ @$0
.4
9
2 Program structure
&=
A$/
# 64
0 ! =
# $/
#
"N $ #
@0 / .
5. "4 ;
)
A
ٕ
D 64 ; &#"41
.
.(Q)=$
%
=) /.
c
(Modules "
) 0
"
% 8
J $/. +>/ (6 4
) @"
0%4
(Subroutines
.Structure of the program c
<$/ @$0 E
-
=
1 "
= A$/
" " c H2
5.
.(T)
"
9 3 6 4
2 0 $
"9 3 #
#6 4
&# ."
" # <
8 #
)! &D2 (
# 2 2 =
) -
# 3
A$/ "
.(T)#6 4
@0 /
:Sequence ((
5N A
8 H"C event ;" 2 action 58 :! 2 J
""/ H2 - 2 J
.9 "" =
9 3 <
c
.J
58 04 1
=
!).
5N
58 04 8 #"/ J c
$ " 58 ).
.(Y)4] 58 A
8 1 #
'). +
:Organization 0%I (D
$
$
2 &Data organization
# -2
9 A
4
/ #
0 /
/ #
&Data hierarchy
(1)
Ibid.
(2)
Marci A. Hamilton and Ted Sabety, op. cit., p. 254, p. 259.
(3)
See: <http://www.webopedia.com/TERM/S/sequence.html>, (Last visited
22/6/2014)
/1
- &
$
#
)4
*
9 .
"% 2 $
c
.Files .$ &Records > &Data field
2 >
9 "> m ". 2
" A$/ H
< / < - 0 /
> / $
2 . . J- &'"> m
#
& QUU ""/ - % "" I4
$
0
:
) # &$
"/+ A
8 .$
c" :
) " &< I4
@ @.(Q)
"/+
"8 # #"4
:Macro ëŠ×b½a@ZbĆrÛbq
A
8 S$0
)! &$
/
". $
"/ $
')! #"4 .
2 $
""/ 2 $
.(T)$
9 "
+
/ @. 2
9 &91 <"4
<.
c
#
#"41 9 -
" / A$/
(Y)
8 &MS-Word I
c &c
E S 2
9 . :
>
9 .c
)! A$/ +. + 2 <"4
< I4 #"4
#+
"/ I :! & I c
)! #"4 I4 )8
#
c
<
S
')! . & "
9 <
(1)
See:<http://en.wikipedia.org/wiki/Data_hierarchy>, (Last visited 22/3/2015);
<http://www.techopedia.com/definition/30624/dataorganization>, (Last visited
22/3/2015).
.T`Q I &@ J &'
()
' *+ (&)
.Qaa I &@ J &
+ .> ' (/)
/4
6 A$/ 07-
<+ ! &
". $ !4 # ; &.
:$
.
:$ d"8 =* <2 c
#. &<. '4 S.
"/8 A
8
"
" " I
)! d"M c
# &'"" H)
J-
.
<
:Documentations wßbã@Ûbi@ò•b¨a@pa†än½aë@ÕöbqìÛa@ZbĆÈia‰
:c
4
"
@%
/ :!
"/ c
J @
&c
$
"
@%
:
T
.0 -( c
#"4 . / '4 ; ?#"4
4 ! &<
J =
A$/ % 2 @
A$/ / 0 8 : B"8 (
.User Manual (T)" 1 =" # 2
9 $/ @$0 &c
:Firmware HoibrÛaI@áöa†Ûa@wßbã@Ûa@ZbĆßb/
&Hardware "
62 - " Software c H2 ! #%"
c
<$2 #!2 &(Y)
63 ')! ROM 0
5
) A$/ =
7
J-
(1)
Arnold Burdett and others, op. cit., p.p. 226-227.
(2)
Ibid., p. 86.
(3)
See: <ar.wikipedia.org/wiki/c_>, (Last visited 1/4/2015).
/G
"/ ) A$/ &=
c
ROM
) A$/ J- H)
c
.=
/ ;"
&!" =
62 ". 1 ROM 0
5
) #"4
#%"
c
A
8 d
&
N
63 ""
"( -2
9 #"4
".
=
2
62 &+
&
: $7
Firmware
c
63 ')! . A :
) &
63 !* &
E &
6
#
) .6
@>*8 " A 1 ; &$7 4
$/ / -
%"
.(Q)
63 :$ Hardware "/ " c
:$
(1)
See:<en.wikipedia.org/wiki/Firmware>, (Last visited 25/3/2015); Pamela
Samuelson, The Uneasy Case for Software Copyrights Revisited, The George
Washington Law Review, Vol. 79 No. 6, September 2011, p. 1776.
/
ﺍﻟﻔﺮﻉ ﺍﳋﺎﻣﺲ
(1)
James V. Vergari and Virginia V. Shue, op. cit., p. 604.
(2)
Robert Plotkin, op. cit., p. 338.
(3)
Ibid.
.`I &@ J &
N =
c
&,
'
0!
'
.'@ @ (1)
" &
Z =
c
%
& '
'
: .
"6
(4)
0 &,%6
> ,- ? !" \\I &TUUQ &"N &$
""
.` ^ \ I &TUU` &"N &
.
" &0
$
/
c : &"
9
c
%
2 E*3 / 2
=
3 &
" &"
&
c &I
.m
8 ... N 11 c &
N
ﺍﻟﻔﺮﻉ ﺍﻟﺴﺎﺩﺱ
LL L L.
LL L L$
@ LL L L LL L L
LL L L
$LL L L
=LL L L
LL L L+. LL L L$/ LL L L
LL L
LL L
JLL L " :
LL L
LL L
ALL L $/ (T/QU)
"LL L
LL L (TRIPS XL L L)
)8 &LL L4] LL L H2 2 LL L
]
9 5 LL L LL L LL L LL L 5 L LL &BLL L43 " L L L
2 LL L
. = 2 5 9 9$4
/
&LL L L L L$0
>LL L L L L & "L 9 L L L L L 6LL L L L L4
:LL L L L L
"LL L L L L/ + LL L L L L LL L L L L/ "LL L L L L
LL L L L
D LL L L L
.(Q)=LL L L L
0LL L L L LL L L LL
]
9 6LL L L L 4
&LL L L L
L L L L L
" &. LL L L L
.""
)! H)
!
LL L L L L L
N LL L L L L L
"LL L L L L L/ + 5LL L L L L LN LL L L L L L4 =LL L L L L L cL L L L L L "LL L L L L L
LL L L L 8 LL L L L
"LL L L L /
cL L L L L
')LL L L L ! LL L L L &=LL L L L
L L L L L) ALL L L L $/ LL L L L 64
;"LL L L L L L L L
)LL L L L L L L L
LL L L L L L L L-k
LL L L L L L L L$+ LL L L L L L L L ;LL L L L L L L L ?LL L L L L L L L LL L L L L L L L-/
LL L L L L
"LL L L L L/+ c
LL L L L L H)LL L L L L
LL L L L L! cLL L L L L
2 "LL L L L L LL L L L L! LL L L L L .DLL L L L L1
LL L L L L L L L >LL L L L LL L L L :LL L L L 1 &L L L L $/.
LL L L L LL L L L LL L L L!
=LL L L L
ALL L L L$/
.(T)4Z 0 / <0 6 &4Z /
$
% " &c
+ $
Z =
c
&5*! '
' ()
1"
.(Q)%8 =
#"4
ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ
D)
+ =$0
)!
.(;
D) L
L (L 2 # &( DL ) L
L .
L
&( 2
ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ
(T)
ﻣﻮﻗﻒ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﻣﻦ ﺗﻌﺮﻳﻒ ﺍﻟﱪﳎﻴﺎﺕ
:! A
8
(
@ @Zpbî©@Ûa@ÒŠÈm@V@SÛa@òã‰bÔ½a@pbÈ튒nÛa@ZÞëþa@êb£üa
A
8
"" . c$
"" 3
E $4
.c
4
-
#
"
.
.
$
+ L112-2
"
QY #+
.
"
.
&4 . &$ » 2 A$/ QWWT #/
Q "
.Tb^T` I
LL L
"LL L /+ >LL L 4 LL L DLL L .
)LL L ! LL L
)LL L
LL L
L L L
I LL L ALL L
8 D LL L
#LL L (&)
LL L L.
LL L L$$
LL L L
LL L L
JLL L L+ @LL L L0 LL L L/ LL L L
#
LL L L
"LL L L
LL L L.
LL L L$
L L L +
:
0
A$/ &WIPO
http://www.wipo.int/wipolex/en/
1
:
)! @0 !)
.(Q)«-
#
" :
) :c
^QY
3
@
C
@ + (2)`W
"
" c
X. A$/
:A$/ I QW`\ #/ W "
!* #%
@"
0%4
c$
-
#
" "
&+
:
) A & #
53 :$ &c$
<
52 c
<-
&c
5N X2 0 ! ٕ &
"" ). =
$
A
8
@ @ ٕ A c
596 !/ S
*
(1)
Article L112-2
"The following, in particular, shall be considered works of the mind within the
meaning of this Code:
……………
13°. software, including the preparatory design material;"
(2)
Article 69(a) Object of Protection
"(1) For the purposes of this Law, computer programs shall mean programs in any
form, including their design material."
(3)
Article 1 Object of protection
"1. …………….
For the purposes of this Directive, the term ‘computer programs’ shall include
their preparatory design material. "
1&
! -
#
" .(Q)"3 .
.$
#j
9
C
.
4
#!.
E )
.
.
"
)
(1)
International IP Protection of Software – WIPO, p.p. 3 – 4. available at:
<www.wipo.int/edocs/mdocs/copyright/en/wipo
_ip_cm_07/wipo_ip_cm_07_www_82573.doc>, (Last visited 31/3/2015).
(2)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs: Are They More
Different Than They Seem?, University of Pittsburgh The Journal of Law and
Commerce, Vol,13, Issue 2, January 1994, p. 282.
&
-
" &( ")
Z =
c " / &$%+ ,!
' 2!
.' (/)
.W I &QWWa &
!
(4)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations:
Comparing U.S. and EC Copyright Protection for Computer Programs, Op. Cit.,
p. 282.
1/
@ @Zpbî©@Ûa@ÒŠÈm@SÛa@òã‰bÔ½a@pbÈ튒nÛa@ZïãbrÛa@êb£üa
(Q)
c A$/ < (QUQ) #
3
C
@ + I
* 2
#"4
3 2 $
/ » <( =
.« @
=
"A ‘computer program’ is a set of statements or instructions to be used
directly or indirectly in a computer in order to bring about a certain
result."
'/
)
"
# "+
0 c
; ?<- +
"%
<
8 $ H)
A$/
" #
&+
)!
3 2 #*
A$/ 3 $
6 <3
)! " .(T)1
1 ; @-
<2 X2 A$/
" .(Y)$
D 2 B"8 !
.([)(< $
&c
) "
@%
وتم تعديلـه بالقانون رقم،١٩٧٦ أكتوبر عام١٩ والصادر في١٧ )( قانون حق المؤلف األمريكي رقم
١٠١ والذي بموجبه تم وضع تعريف للبرنامج في القسم١٩٨٠ ديسمبر عام١٢ والصادر في٩٦-٥١٧
.على النحو الموضح في المتن
U.S. Copyright Law, 17. U.S.C. §§ 101 et seq.
منشور في قاعدة بيانات قوانين الملكية الفكرية لدول العالم على موقع المنظمة العالمية للملكية الفكرية
.٢٠١٤/٧/١١ : آخر زيارة،< http://www.wipo.int/wipolex/en/> : على العنوان التالي،WIPO
: &D -
)! .
"6
(&)
Michael A. Dryja, Looking to The Changing Nature of Software for Clues to Its
Protection, University of Baltimore Intellectual Property Law Journal, Spring,
1995, p.p. 111 et seqq.
$ –
$ &
Z =
c
3
#
&'$! '
'$! .' (/)
.Q\ I &TUUT 2
""
."/ @
$ !" +
(4)
William F. Patry, Copyright and Computer Programs: It's All in The
Definition, Cardozo Arts & Entertainment law journal, Vol.14, Jan. 1, 1996, p.32.
11
&c
596 1 / <% c
" 2 B ٕ
.
2
E :
) F-M #
(Q)
$ / » :<( c
D
/ " B42
.« A$/
# & $
=$
A0
"program means an expression of combined instructions given to a
computer so as to make it function and obtain a certain result."
c
J- ) #
; ?A
6 7$
.
!
.(T)c
$/
H2 "" #
&H" 0 A$/
(Y)
=
c» :<( c
/
B42
] 2 =
&$
J
/ -
52 8 #
-
"
:
) & c
.«<) c
@0 /
"
E
&c
0
"Computer program - means the representation in an objective form of
the whole body of data and instructions designed to make a computer
or other data processing machine operate to produce a specific result,
including the preparatory literature produced while the computer
program is being developed and the audiovisual displays generated by
the program itself."
(Q)
` "
C
@ + .
4
(T)
"
)! "
.)
J+ A$/
&TUQU/QT/Y " 4Z 90 QWbU #/
.aYI &@ J & = ' 2!
'
.' (&)
=
c
(
"1 + (Q)
"
)! " (/)
J+
&QWWT #/ TY "
Y\TY^Q #+
"/ +
.)
14
ٕ '" =
6 A$/
9 c
#
<2
)
=
0
')
" &
B42
] 2 A$/ J- 2
!""/8 #
&-
"
<2 <$/ )4C B42 .2
E
3 <
5 $ c
596 c
0
52
.9.$ - 2 A$/
3 .
c%
"(
E
A$/ <
)! A$/ )4C
A$/ 1
1 c
c 2 "1 < &c
/
"
c c
2
') . # &
E
.=
(Q)
/ / ! c
» <( c
/ " $6
/ 2
&D H2 " /" A$/ / -
. 2 0 7$ $
2 & "2 2 &
62 2 &
2 1]
-
.«
""
E*3 0
& 2 + A
8 "
9 &0 "
"Software program is the expression of an organized set of
instructions in natural or code language, contained in a physical
support of any kind, necessarily employed in automatic machines for
the manipulation of data, devices, tools, or peripheral equipment,
based on digital or analog technique, so they will operate in the way
and with the purposes determined."
ٕ 0 =
62 A$/ c
#"4 #
<(
)! 6
.B42
] 2 6 H2 A$/ /
"
$6
$
.
$
+ (Q)
"
I
)! 5 ()
.)
J+
&QWWa #/ QW W`UW #+
1G
I "
"
H" A$/
~2 <2
)
=
.(Q)
. 2 0 7$ 2 H $
2 A$/
+
A$/
"4
+ <2 <$/ )4C
.
"" " &0
.$
!-/
.
-2 !
)! 2 B
"
.
$
@ + - #$ H
$
2
c
"
&=
c
H2 TUUT
aT #+
"
C
@ 4
;
=$
).
%>
F/Q
"
/ :
Z =
c» : 5 )8 ?TUU\
[Wb #+ 56
X%
H2 )4
&
8 2 6 2 7
( /
$
3
2 . 5"3
] = * 2 @0 "4 & 3
4] H2 2 $3 $ $
3 ')! 5 & @
.«
Z =
>4 <
& 3 $
– 3 D
– 6 '"
)! (
.$
D 2 D ! 3 2 #*
A$/
" 2 "
" "
" c
<2 $
=
&"4] H2 2 $3 $ $
3 ')! 5 "
/
.>
9 "+ c
3
! < 6
A$/ =
A$/ c
#"4 + <2
)! A$/ )4C
.2 <
E
1
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ
ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻔﻘﻬﻲ ﻟﻠﱪﳎﻴﺎﺕ
Zpbî©@ÜÛ@ÕîšÛa@ÑíŠÈnÛa@Z@üëc
N
$
/ » ( =
c 5.
E /
.(Q)« ).
S
Z A
8
ٕ '" =
A$/ $
c
< #
<2
)
=
#!( =
) .*2 :
) #* <
& $
] 2 A$/ *
#/
(Q)
: #
8 &
) " )
.
5.
.Q`I &@ J &
N =
c
&,
'
0!
'
.'
(T)
&
" &< %
C
@
d)
–
C
@ &2$# U .'
.T[U I &TUUU &Y0 &"3 ^/
1
. $
6
@ @@@@@@@@@@@@@@@@@@@Zpbî©@ÜÛ@ÉXaìÛa@ÑíŠÈnÛa@ZbĆîãbq
(T) (Q)
#- ?$
J A
8 <.
= =!)
A
8 & H2
04
/ » :<( c
. H( =
#+
$$
$ 5 &
Z =
6
A
8 2 &$
')! A
8
9 2 #2 & c% @ 7 <.%
.«<"/ 7 #"4
$
/ » :<( c
(Y)4Z E
/
@%
&c$
$.
A$/ & 7
( &6
A
8 #"4
4" ٕ &H" 0 A$/ - " S ; ?<"4 < A$/ "/
.« "
"
@ 2 & A$/
=
6 A
8
.=$
$
/ ! &@-
' c
^Q
1
.c
" ^T
.(Q)c
$
"
^Y
#
4"8 ! (J
) H
2 )! 2 J < $4 #!2 2 J+
-/ "/ <- ! &c
- / c
4
"
.
D - 2
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ
:$ >
$
! c
! 2 A$/ @. 9.$
)
.
J 2 ^Q
. A$/
E7 =$
$
<
8 < H)
6
2 A$/ / . @. .
2 ^T
.Computer =
6 ! c
4
:>
')! A$/ @$
# $
4"
Computer program , Software $0 2 ) 2 @L ^Q
&
"
"4 A$/
d" (=
c &
)
2 #/2 Software S$0 M
N
63 <2 9.$ - 2
S$0 #"4 A$/ B "+
2 &(Q)Computer program S$0
Hardware "/ A
8
5 c
D 2 D H2 A$/
1"$
Software
Firmware %"
c
&4]
8 6 H2 "/ A
8
2 =
A$/ =
*
N
63 ""
4
ROM
) A$/ J-
.(T)#%"
c
"/ 9.$ - 2
H)LL L L
@+"LL L L
"
LL L L LL L L$
LL L L -
LL L L LL L L ALL L L $/ LL L L $
LL L L $3 LL L L
ILL L L L L4
cLL L L L L
:
)LL L L L L &Microprocessor @+"LL L L L L
c
LL L L L L
ALL L L L L$/ JLL L L L L-
4
LL L L L 0
cL L L L L
&(LL L L L HLL L L L 2) LL L L L
6 #LL L L L "LL L L L =LL L L L
2 6LL L L L 7LL L L L
3 LL L
LL L LL L 91 BLL L LL L LL L ALL L $/ BLL L 42 LL L 1] LL L LL L / 4
."
')!
$/ >
9 $
( 2 -3 <2 B :5-*3
Computer =
c ! / 2 B"8 A$/ 0 12 / 2
.Programs
! "
/ "" $ "=
" $
- = / 2
$
+ 9 "Computer Programs =
c" D
!
4
"
"/ &#
.
.) A$/ $6
$
. "/ Software
"
) / c
4
@%
"
d"8 I 4 2 ^T
5.
J $4 M &
- (c
$
"
&.
:
=j
:
) " )
4&
4
# ".
=
2 c & 4
"
5+ "
9 I43
" . @ "
9 c
:$ # ./ (
.03
.
@0 d4 2 = # . 4 " 2 "2 2 2
>
0$
9
D
B" 12 -. ٕ
..
"
@0
(
')! 2 &
)!
A$/ 2 H2 1 !2 2 <
X
>4
D 2 A
8 '
&(T)
')! 0
0
@
&
" &"
" ) $ 9 2 &(
8 &6 &7
) /
$ 29
#"4
Z 2 6
29 &(>
9 4] H2 2 &"
.(</ 29 4]
8 6 &
] &=) c
^ c
–
Z =
) $
"
0
&2 '%!
'
'%!
.' (&)
'
(%Y N
.' &!" `[ I &QWWT &"N &
C &("4
aT #+ ""
.
$
+ ")
Z =
c
C
"3 @
&E
.QT I &TUU[ &
!
&
-
" &(TUUT
4/
ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ
19 2 -
( 2 D -
2 5
0
"" 8
! !)
/ ;
# :
) " # &<
6
<%4 D -
2 5
)! "/ + @0 &D -
2 5
)! I%4 !
#%>
#
! 3 :
"2 :! <%4 5
! A$/
" .<$/ #
> $ " > &D -
2 5
)
"$
L
3 "L 2 "L / + 5
)
A
8 d # ?<
"$
3 H2 5> #"/ !
&:
"; 0" <
5
)! 8 :
')! &<%>
"" + #
-2
9 d
6 <0 2 H2 &Sui generis "4 0 " 2 "4 +
.
6 2 4 + "/ + A
8
41
$+ B" "
53
/ B" 19 2 ; 2 B :
)
4
.
A
8 %
0 "" / 2 &%4 @ :>>
5 &
C
@ : "/ + 5> B" :
) L+ E ; &L"
')!
.
A$/ @0>
/ S.
* $
&D41
ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ
(Q)
ﻣﻮﺿﻊ ﺍﻟﱪﻧﺎﻣﺞ ﻣﻦ ﺗﻘﺴﻴﻢ ﺍﻷﺷﻴﺎء ﺇﱃ ﻣﺎﺩﻳﺔ ﻭﻏﲑ ﻣﺎﺩﻳﺔ
2 H2 &" 2 3 &" * " A
8 53 #
#"
;" A "
53 B
#
.X H" 6
53 E + @ . "+ &
+ ) " * 52 N .
.(T)"
2 ) &=
#
"
*
! c
2 )
.
2 2 @ ()
"
J0
B"8 X
c
2 < " .
:$ "
"
#"/
#2 H" 5 ! ! &<) c$
Z '"" 2 .=
Hardware "/
.QY I &.$9 ') .H" *
J $
@ –
56
– "
F A 0
&K!
'
> 9
'.' (&)
.Q[I &QWWQ &T0 &
!
&
-
" & 3 5j
. F
44
.(Q)"
* 2
0 &/4
Z A$/ <$7 <- " " H2 2
"% 2 <
c
2 ^T
<
X
c
" M
. A$/
# &(=
)
>4 )! .(
Z A$/ c
7)
04
') #
" +
.m
8 ... % #$ $ A 2 $
>
2
5
@0 /
".1
=
)
Z "
$ /
/ %
<$ c
2 ^Y
2 &(T)H" 5 ! &5
<
8 )) :
) ?<$7 "/ (9>
"
9 69 7 ; ?=
) A$/ <64 "/ 07 8
.(Y)Bits
X
)
:$
0
))
N ))
M =
A$/ c
7 52 <2 J+
0
" Hardware =$
"
@$0 (
0 ))
')! M =
5.0 ٕ c
7 8 "/
&<$7
c$
# &</0 %
&Volatile 6
.
')! I4 H" "
&>N
"
" ^
Z =
X "
%
.Y\`^Y\Q I &QWW[ &
!
@ &' "
4G
.(Q)
" 2 #* $/ $
))
N :" 1 %1
0
c
0$4 <3 ?H2
)! " 3 '1 2
.(\)<$/ H)
6
c
0$4 &<$/ J- H)
H"
.&\I &@ J &,%6
> ,- [ a[I &@ J &2
' '
'
3 .' ()
.&1
"
@
$ &
=
c
% & %9
'
> > .' (1)
'
.' :B"
<
8 &Qbb^QYQ I &QWW\ X &
$
X$ /
.!" QU\I &@ J & = ' 2!
4
= / 0
E* "+ )
.
!1 ' 2 2 B
H"
"
A
8 .$ #
= !)
9 >/
9 c
B &c
=
X
c
2 #*
A$/ &07
8 )) &< I4
.
) (=
)
Z A$/ ' 18 + 1 " <
#
c$
H"
"
" )
'1 2 M B42
"
)! 1
4-
9 "
9 c
< ) !) c
A
8 .$
.c
)!
&E
+ &(Hybrid !) "6 .
c
M J+
2 H2 &(Q)c%
/ A$/ $
! # (" ) .
' <$7 " c% / A$/
2 ' # !) c
.(T) (=
)
Z "/ A$/
H"
@
?H
H"
J "6 c
0 2 :
) B"C
@
2 &=
Hardware "/ c
4
!
c
" ""/8 c
<
) H)
!)
"
H
.I
(1)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. 2320.
.QUaI &@ J & = ' 2!
'
.' (&)
4
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ
ﻣﺪﻯ ﻗﺎﺑﻠﻴﺔ ﺍﻟﱪﻧﺎﻣﺞ ﻟﻼﺳﺘﻬﻼﻙ ﻣﻦ ﻋﺪﻣﻪ
! :>>
$
53» :2 A$/ "
(a[)
"
I
:>>
>+
= 9 &+.8 2 > <
"/2
.«J$
"/2
0$ B 4 1 @
/ :! 2 +.
')! !2
18 !" 1 &(
N) 1 @ D.1 @ ?5
> :>>
$+ 52 :! )M .:>1 1
53 A$/
D.1 5 " !" " >%
" !)'
@ 9 > 3 ?$/
).(T
$
* 53 2 " c
A$/ @
#
@0
>>A
8 "+
""/
1 X
A$/ &
2 :
c
" "+ <2 :
! * .
1
"/
;"3 #"4 3
>1 X
& !* " # "4
;"2
.
"% 2
.@
J )&(
4
ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ
.
.
#!1 :
) A$/ = "+ &03 $4
:$ !2
')! A
8 /"
""
:!
@ @ZŠ•bȽa@VbÈÛa@¿@pbî©@Ûa@òîàçc@Züëc
$
03 $*
= 8
N
@0 .
6
%4
".
A
8 J k
/ =
) A$/
$
# ( .1
&
"+ +( &! +" &
A
"N $$ .
.2 H2 #" / "
"
+
A
8 :
) H"C
A "4 2
J
N A$/ = "+
11 :/
I4
D0
&"3 &"
&
1
@ A$/ 3 2 <
&(Q)m
8 ... J
N
&<.
$ &' 0 dN .
."+1
#/"
" A
8 -N .(T)$
#"
E
&:
>
/ " >
9 ?) "+ +
M &<- "+1
2 .#/ 1 " $ \U
4"
A$/ 3
"
1
(1)
John C. Phillips, op. cit., p.p. 1000-1001.
& '
'
:J &"+1
@
" .
"6
(&)
G"
"41
"" 2 = &"6
"+>
!2
.(Q)( 2
0 "6 &versatile
@ @Zpbî©@Ûa@xbnã⁄@òÄçbjÛa@ÑîÛbØnÛa@ZbĆîãbq
.
""/2 A
8 % ٕ !""/N d
8
&
"/ 2
9 2
"/ 8 @7 &
4
4
9 " 2 "
&$%0 2 X C
$
.(T)"
c # # "
9
'""/8 : Pac-Man A
0
=
3 c "2 2 " >
9
)! &2 1 " $ Y,T
–
– $ I4 aUU
~
"
9 3 c
$ ; ?
d8 "
9 >%
9 - 7$
9
(Y)
. $%0
@ @Zpbî©@Ûa@óÜÇ@õa†nÇüa@òÛìèX@ZbĆrÛbq
$ 0
!""/8
!"
!
#*
&@%+" - B @7 1 c
4 / 2 18 @
0 <6$ ; &) %
9
:
) $ 1 & 0 m 2 $/
G
8 ^ Pirate $
&(Q):
) #$
CD-ROM * 02 5
< #+ H)
5"/1 5.4N / 2 #2
"/ c
# 2 –
9
(T)
. )
2 "
F2 A$/
/
9 Piracy
! =2
J "
$4 <
$ 8 .
" " H2 >
4
.(Y)
/
(1)
David Einhorn, The Enforceability of "Tear Me-Open" Software License
Agreements, Journal of the Patent and Trademark Office Society, Vol. 67, No. 10,
October 1985, p. 510.
.Y\I &@ J &2
' '
'
3 .'
#%
A
8
k
"5-V 2-V" S$0 #"4
A$/ 5"/1 @0 d"
+ c
A$/ >"
E 4" &9 #2 "/
9 "4
9 5 &5"/1 $/ A$/
."5-E
" c
A$/ 5"/1 $/ A$/ @$0 &<4
"4
< # ; ?/ 9 3 ! : 3 D
:c
+ / :!
#+
"
+3 A$/ 2 + 3 + #"4 H2 8 )8 &$
$
"
8 ; ?
#! ""/ 9 +3 #! :
D
&/ *
c
"2 m
4 "
5.4 ٕ c
A$/
#! " &
51C!
0 7
ٕ &7 " ! c
! &#!2 1 A
.4
.TQ I &@ J &
+ .> ' (&)
G&
=
2 @0 /
!
"+
:
) &E* H3 m
"- .
?$
D
* m
J
ROM 0
5
) ++ A$/ J- H)
Cipher Key
.
F.
"Software
X A / c J- 2 &=
%"
$
')! #*
.4
"/ 03 S ; ?"Virus
c #"4 2
08 2 <2 18 – !* –
J A$/ "+ #"/ %
')! ( &c
4
9
"
.(Q)$
.$
9 @
A$/ " ]
c
+ 8
" c
A$/ . ! &c
d8
m
.(T)1 " $ QU
9
%4 " .c
d8
1 L
< I4
* mL
( L L$
%L L04
L L :L L! "L L+
# 1 + 2 &Non-tangible $
* 0
9 $/ 5"/
9
&"4 #
"
53 + >4 &"4
.(Y):
) #"/
(=) Aaron D. Charfoos, Comment: How Far Have We Come, And Where
Do We Go From Here: The Status of Global Computer Software Protection Under
The TRIPS Agreement, Northwestern Journal of International Law & Business,
Winter, 2002, p.p. 261-262.
(1)
James V. Vergari and Virginia V. Shue, op. cit., p. 569, p. 571.
(2)
Pamela Samuelson and others, A Manifesto Concerning The Legal
Protection of Computer Programs, op. cit., p.2339; Mikko Siponen, A
Justification for Software Rights, SIGCAS Computers and Society, Vol. 36, No.
3, September 2006, p. 11.
(3)
Mikko Siponen, op. cit., p.p. 12-13.
G/
@ @Zpbî©@Ûa@xbnãg@óÜÇ@Éîv’nÛa@ZbĆÈia‰
&
9 S2 (c$
D
* m
) c
+ 2 )8
2 #$/ #* "6
d8 A$/
B"
6 H2 :!
d8 &"1" ! N J0
&$
9 j S
V! @
d8 A$/ .2
0
;
" X3
!2 6 ! ?(Q)
)! 1
S
" .(T)
)! #"
68 # &dN A$/
6.
$
&
1 &
1 J ! .
$
@ #
Z
D"
" 18 "
)! @ 1 &(Y)
.#
S
@ D"N )! </"8
-2
9 ٕ &"
A$/ $
1
"6
A$/ #!6.
+
9 9 /"
&%
.
(1)
Pamela Samuelson, Why Do Software Startups Patent (or Not)?,
Communications of The ACM, Vol. 53, No. 11, November 2010. p. 31; John
Cady, Copyrighting Computer Programs: Distinguishing Expression From Ideas,
Temple Environmental Law & Technology Journal, Vol. 22, 2003, footnote 199 ,
p. 43
& Y[I &@ J &
N =
c
&,
'
0!
'
.' (&)
.Ta^TbI &@ J &3
'
$+ 9
(3)
Daehwan Koo, Alternative Proposals and Effective Protection of Computer
Programs, Buffalo Intellectual Property Law Journal, Vol. 2, Fall 2003, p. 52.
G1
ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ
@ @ZáîÔmë@†îè·
+ =
&
"
1
$4 "
""
"+
#
/ 2 " &:
) " ""
)!
"
+.1 # &
C
@
.
"+1 +
!2
; &
C
@ #
0 ;
)!
0 # &( 2 =$0) 3 #
4
0
0 # &( =$0)
"
.(J =$0)
C
@ #
=2 # &(;
=$0) H
.
E*j
= 2 ! &$
+
8 + = 2 ! &ENIAC =
:
<ar.wikipedia.org/wiki/= >, (Last visited 7/4/2015).
G4
ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ
$ :=$0
)! $ .
:$
"
" ٕ
3
C
@ = " # &( 2 D)
+
.(;
D)
C
@
# &( D)
ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ
""
. 2 c
0
7 A
8 B"2
=
= +>/ # " 2 & A$/ #$
51C
" "
4 :! #
&
"
/
')L
0 2 ""L H2 / ;L
07 "% / A$/ $
H 0 2 &(Q)c
A$/ 5"/ D +
A$/ $
c
"$ m J #
"$
J #
&dN
62 J D Operating Systems 7
2 c
>
9 .F2
S$ #
c
')! 2 &c
')! #
63 ')! # &=
.(T)0 c
4
63 "/ A$/ 18 $
$. #
7
9 Application Programs 0
c
2
"+ .+
:
) $
$
:! #$ <$/ 5
.(T)
+ " #"/
/ !"6
#$/
?
"6 . ) <(
1 6
$ 0 &B42 c
"
#
/
"/ X+ # (
9 &< #$ 2
X+1 .>
9
@
% #
*
9
&!
" $ c
"2
" /
1 $/ #$
M # .
"" #
2 ""
#2 " $
+ " #"/
.(Y)-2
9 ".
.#+2 /
X+1
!!"6 "
(1)
Ibid., p.p. 1751-1752.
(2)
Ibid., p.p. 1750-1752.
(3)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p.p. 2330-2331.
G
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ
@ = @0 /
:$ 5 ٕ &%"
9 "
! &c$
:$
#/ =
@ ; ?American Copyright Office 3
C
John F. Banzhaf A/" @
$0 "2 < = c A$/ QW`[
!
""
X(
! <"! &(Q):
) " $
)9 2 S2 H)
III
:
) S- 2 &Copyright "
C
@" @0 / =
c 8
.(T)<
9 H)
^ QWUW #/ "
3
C
@ + #
% 2 J # c
')! #
&=
c 4
9
9 - – +
)!
J !/
C
@ = . :
)
?
:
) $/ I
%.
.(Y) "Writings" $
9 .
9 A0/2 ; ?Books "=
" % -
d @
$ $
)9 2
9 John F. Banzhaf III
()
&
C
@
90 =
c 8 9 " QW`[ #/ . 0
""/M #+ ;
:
) @ .c
/ D4
5 S D41 5 = E " 4
)! 6 1 .=
0
)! # <$ ' " #+ H)
C
@ = A
8 <"+ =$
c
./
9 b\
~$
"+ A$/ I4
See: <en.wikipedia.org/wiki/John_F._Banzhaf_III>, (Last visited 3/2/2015).
(2)
John Banzhaf, III, Computers and the Copyright Law: A Commentary,
Communications of the ACM Vol.10, No.1, January 1967, p.61.
&QWb` #/ "
C
@ + " Book =
% D
A> "+ (/)
>
A> A &literary works ""3 .
" % 91" J- ;
(=) : ."=
" %
G
3 <" ! c
"=
" %.
C
@ = 4
A$/ c
H 2 :! =
J #5>
0
E c
0
9
5$
$
#" 2 &
2 & $2
(
.(Q)("
" )
@ = B"
c 2 A$/ / " &QW`` #/
- =
&=
B"
9 \T B # #
3
C
c
#" #%>
"
!
A$/ +N
# #
+
9 # A$/ # I4
C
@ &:
)
"/ 18
.(T)c
$0 2
:$ 5"8 A
8
J" H)
=
)! &(9
5$
$
$
) c
I4
"
" D"8 ^ ) ^
' 2 D" <+ c
! 3 ?
04 <. D"N
(=) James V. Vergari and Virginia V. Shue, op. cit., p.550; Brian C. Behrens
and Reuven R. Levary, Legal Aspects - Software Reverse Engineering and
Copyright: Past, Present and Future, The John Marshall Law Review, Vol.31,
Issue 1, 1997, p.p.2-3.
1 5 H2 / $
@0
! c
( 3
C
@ = < #+
.""
9
%.
B42 % J #
William F. Patry, op. cit., p.p. 24-25.
(1)
Edward Samuels, The Idea-Expression Dichotomy in Copyright Law,
Tennessee Law Review, Vol. 56, January 1989, footnote 156, p.p. 356-357.
/ <2 8" <( =
c QW`[ #/
C
@ = #+ "+
=
@0 / >4
$$
J <2 2 &=
7 $
.>
William F. Patry, op. cit., p. 26.
(2)
John Banzhaf, III, op. cit., p. 61.
G
< .1
-. H)
&< I4
Source Code "
"
0 1
+
"
$4
C
@ = 8 .#"
H
)
=$
>
9 X
"
" 0 56 D"8 18 "
c
D"8
.(Q)'>/2
C
@ + " + &QWb` A QW`[
.
@ c
2 :
) =
&0 c TUUU 18 # #
&
.(T)+
:
) "%
9 #
#4-
&
9 (
9
/ 2 ;" J "/ A$/ #
; ?< H)
Hardware =
"/ /
. IBM + !
"2 A &63 #% "/ %>
9
')!
1 0$ 07- QWbU #/ )
! +
0 @ %! A
8
)! B"2 "+ .Antitrust Authorities
1
d8 ""/ QWbU #/ . .$
> A
8 /- # &QWb\ #/ ""
)! /- Q[UU
"
.(Y)QWaU #/ <
2
(1)
Christina M. Reger, op. cit., p. 216.
(2)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
(3)
Pamela Samuelson, The Uneasy Case for Software Copyrights Revisited, op.
cit., p.p. 1756-1757.
"
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ
@ @ZQYWV@âbÈÛ@ÑÛû½a@Õy@æìãbÔi@wßa@Ûa@òíb»
#( &(Q)QWb` #/ 2 QW "
3
C
@ + 5 "
C
@ + / 6/ $
@0
!62
< 2 c
""
S$0 #"4
)!
%
.QWUW #/ "
8 ; ?Books "=
" S$0 1"
9 Literary works ""3 .
"
E7
>
9 &X
1 = : S$0 43 S$0
64 2 #$ A$/ 2 $ 2 = %! A$/ / 0 )8 /
.$
(QWb`) ""
5 X
1 )! E.
.(T)=
)
–
.
>4 – .
» ( QUQ #
"3
E7 &B42 %1" 2 + 2 .
6 2 &#+3 2 &$
/
03 2 &0 04
2 & "
2 &=
&"
53 0 /
.« "
+0
2 &I+3 2 &0%
2 &#>3 2 &
«"Literary works" are works, other than audiovisual works, expressed
in words, numbers, or other verbal or numerical symbols or indicia,
regardless of the nature of the material objects, such as books,
periodicals, manuscripts, phonorecords, film, tapes, disks, or cards, in
which they are embodied.»
%.
"8 #"/ #* &=
c A$/ @0 @
2 : 1
$ 29 .
A$/ B /
9 9. 5
)! 3 ?
(2)
William F. Patry, op. cit., p.p. 26-27.
I+3 ) $ H)
0
29 &( %1" &6 &#+2 &$) /
.(Q)(Cards +0
&Disks
C
@ + - "=
c" A$/ I
#"/ =
4"
"C
"
1
%-
#3 - " QWb` #/ "
.(T)
4"
E "3 .
- c
4" #* &
C
@ + =
c A$/ S
I
#"/ 56 ٕ
: 56 ٕ &'>/2
A$/ Literary Works "3 .
-
#/
C
@ + " 5 " ? )
- c
4" E
" A$/ 5 "
)! 5 "+ .=
c A$/
9
9 -
QWaU
c 3 E / "
X
$
$
B"8 "/2
.Z <
! &=
5%
:-
?'%'+
5%+
#
:'3 !*
5%E
5+
'
:(CONTU) U
]
"4>
$
» +
9 QWb[/QT/YQ m X
"2
The National Commission on
C
@
.$
""
"! &New Technological Uses of Copyrighted Works (CONTU)
" 3
"
1
C
@
$ / %8
% -
$
"
#"4
>
c &
C
@
.
#"4 J6
(
(1)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
&
!
@ &' "
&
.
.
C @ &'-
' ! '
.' (&)
.[T\ I &TUUU
&
.(Q)=
@ + " +
9 3 X
"2 QWaU #/ " QT
&CONTU
)! c" ; ?(Y)QWb` #/ "
C
: H2 A$/ 5-$
:
) ?"3 .
- S =
c /
%+ - c
-8 # #
<2 3
.""
)! X
2
J-
&
(2)QUT #
"
&
C
@
/ -
=
.([)) A$/ $/
C
@
"
A
8 -N
Literary ""3 .
" - J 2 !
)
%
c
J- #"/
(1)
Final Report of The National Commission on New Technological Uses of
Copyrighted Works, p. 1.
Available at:
<http://people.ischool.berkeley.edu/~bcarver/mediawiki/images/8/89/CONTU.pdf>,
(Last visited 31/5/ 2013).
(2)
Ibid., p. 12.
(3)
Public Law 96-517—Dec. 12, 1980.
(4)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
: ! =
c
$
< H)
"A computer program is a set of statements or instructions to be used directly
or indirectly in a computer in order to bring about a certain result."
* 2
#"4
3 2 $
/ =
c" '
f H)
) ! &". @
=
.QWaU #/
9 J- |
/
#
C
@
3 ( $/ I
Works
.(Q)Q/2 QUT
: 4
0
$ # #
CONTU
M
5
B /"
-
-
J- &c
I4
C
@
:$ c
A$/
C
@ + @0 568 = J- c
A$/ 5"/1
B A$/ ) c
0 J
')! =
.B /"
.(T) 3 =
ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ
+
/ -
% I4
(2)QUT #
0 :! 2 E
) ; ()
c
" + 2 &c
-2 ; &.
I4
QUQ #
C
@
I4 (QWaU) " + QUQ #
J " 2 9 * X
QQb #
$/ I
A
8 H"C :
) M (2)QUT QUQ
/.
<M # ?
c
-M
."3 .
- c
/ D
*
William F. Patry, op. cit., p.p.20-21.
(2)
Brian C. Behrens and Reuven R. Levary, op. cit., p. 3.
1
ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ
4
)
I
/
QWba #/
Model Provisions of the Protection of Computer
*
54
/ !""/M #+ &Software
#%>
" ""/N
"
#3 $ A$/ 5
9 .
$
Model )
I
')! E7
.=
c
$
#
.
A$/ 0
+ #8 "
"/ ! Provisions
&
$ + I
')
"
!
-
"
+
A$/ %9 6 c" &%
- "
:$
.(T)/
*
2 &
3 2 &
C
@
(1)
"Our mission is to lead the development of a balanced and effective
international intellectual property (IP) system that enables innovation and
creativity for the benefit of all." Available at:
<http://www.wipo.int/about-wipo/en/>, (last visited 9/4/2015).
(2)
Measures to Enhance International Cooperation in The Field of Legal
Protection of Computer Software, World Intellectual Property Organization,
Expert Group on The Legal Protection of Computer Software, Geneva, November
27 to 30,1979 , p. 1.
Available at: (=)
4
c A$/ B .
"3 .
+. 2 54
1 "+
')! I
&"3 .
- J – c
H2 – !/ =
#"4 "-
>
9 .$
c
07 1 +.1
A 2 .
"/
C
@ 07 1 =
$/ #
4
""
"! 2 %
"!
8 = <2 A
8 54
.(Q)'>/2 S-
A$/ )
I $
#- A
8 -N &
&""
9 "
9 $
4
H" H)
'1 ,
'
0!
'
.' " "+
–
C
@ 1 – %
3 6/
18 <
8 5 $
#"/
- A$/ "2
(=) .
)
I
+ " .$
%>
/
G
"/
4
= $2
#3 A$/ $3 #!2
" "" 4
! &(b)
"
<$/ $
)
I
TU A"3 "
( .
"
A"2 A+2 " - ; ?c
I4
2 &N 2 & 3 J
: H2 A$/ 2 &c$
3 #"41 A$/
.(Q)1 +
T\ A+3 "
2 &
" 2
I
2 18 &""
)!
)
"
#*
4
" +. D
""/8 + <2 &
" 2 #
)
(T)
0 7-
C
@ A$/ H2
.J
=$0
B A$/ 3
"
1
A
8 &
" * 2 "
.
) ( 3 <
.#
" A$/
C
@ # 5> A$/ "2 &)
(=)
.TUU – QWW I &@
J
:
(1)
Measures to Enhance International Cooperation in The Field of Legal
Protection of Computer Software, World Intellectual Property Organization, op.
cit., p. 7.
(2)
James V. Vergari and Virginia V. Shue, op. cit, p.593.
.QWUI &@ J &2
' '
'
3 .'
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ
Q[ =
c
( T\U/WQ #+ 3 <
"
TY "
TUUW/T[ #+ 3 <
<$" # &QWWQ
- 3 "1 5-/3 "
<
)! =
0 .(Q)TUUW 2
"2 . !/ <
" J @ =
c
+
<$/ I
! " " &
C
@
90 Literary Works
"=
c" S$0 2 A$/ &.
"3 .
"!
.(T)-
A$/
J @
@ A
8 3 "1 ! 3 <
"
1
Case Law %-
@
0 4] &3
C
@ +
3
<
< 2 ""
" A
8 B"2 &3
"
+ A !> 2 " .=
c @$ 3 <
c
J &"2 . !/ !> &c
C
@
(1)
Directive 2009/24/EC of the European Parliament and of the Council of 23
April 2009 on the legal protection of computer programs.
Available at:<http://www.wipo.int/wipolex/ar/text.jsp?file_id=208107>,
(Last visited 10/4/2015).
(2)
Ibid.
(3)
Ibid.
-2
9 .X $ 0 A$/ c$
3
) $
< 2 2 : 1 .c
$/ #
l"
2 3 "
"1
0 -N 1
)
<
.(Q)3
"
1
3
<.
9 2 18 3
3 <
<
< 2 #*
" A
8 3 <
2 >
9 & >41 E " 1 3
:
) < ٕ 0 – X
A$/ – 3
* A$/ 0 "+ 3 %-
@
2 A
8 -N .
C
@ @0 @$ 4 3 <
" " J+
# "
>4 A
8 >41 = <.
)! J2 .c$
$4"
#
=
7
'1 &Common Law #
# Civil Law I4
+" "/ + " ; ?I4
# J 3 "1 5-/3 "
– #
# ; – 3
&
)
#
.(T)
" A$/
" X2 A$/ 0 '"
(1)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs, op. cit., p.p. 281, 298-
299.
%LL -
@ L
LL3 LL
LL L LL LL 3 <LL
!LL LL
l"LL
#LL!2 LL
&cL
:L. L
L"
&@
')! A$/ "
c
@
&3
: & .
"6
." B A$/
Céline M. Guillou, The Reverse Engineering of Computer Software in Europe
and the United States: A Comparative Approach, Columbia-VLA Journal of Law
& The Arts, Vol. 22, Winter 1998, p.p. 540-542.
(2) Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs, op. cit., p.p. 280, 299-
300.
"" @.42 <2 :!2 3 < $
"1 ""
"+
3 0
! Originality
3 0 3 $0
3 "1 5-/3 "
&3
C
@
. A
8 B"2 &.$4 @0 <. '. # " . "
?c$
C
@ < " H)
@0
<
S- #
:
) . "
:$
0
#
&c
.
"
A$/ I
A. ;
#*
@ ! 3 <
E7
ٕ . 6$
#
H"
"1 " 4" =-
A
8 H"C "+ "1 :$ 2 18 &5-/3 "
+
.(Q) 3
ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ
.
$
@
$
=
+. A$/ J+
# "
&
Z 7$ 2 "
7$ 2 5 &
Z =
c J ^Q»
.«(QWbQ)
"! = "2 1/2
9 !/
"
#
A$/ ! 0 "2 "+ X
+. 2 E
1 "+
>
9 2 : &Z 0
!2 &
@$ $/ @
d"8 :
&
C
@ #
90 c
"
"
H"
58 2 " ./6
""
5N -
@ I &(.
4
D + "
) 43
04 /6
.(Q)(.
4
')
D" ) 3 N
04
""
C
5-/3 "
#6
:'- 9 X
+. (QQ)
"
-
. $
9 (
9 !( 2
68 @ c
(=2) .
C S +.1
4
.
c
2
/ ! #
)! d"8 =
@0 /
–
" ( M # .
2 " "
9 J
$ -N # &/ *
4 A$/ "/ 2 – !(
"
"
B"
H + ' " )
."
4 #4 $/ @
=2
.(T)!( + c
=2 S A$/
-
"
"
- .
>4 c
" ( >4 "+
TU A
8
" F
" ( .$4 + :! &"
C
@ .
"3 .
" )
$7
&
.(Y)< " \U
8 9 -
C
" !
(1)
Aaron D. Charfoos, op. cit., p. 263.
.TTQ I &@ J &5*! '
' (&)
.TTT I &@
J
(/)
-
+.1 A$/ &
A
8 - "+
.(Q)QWW\
bT #+ H
= &X
+. &H 2
& $
+.1
+. A$/ "
J+ <2 )
"
2 &
-/ A
8 #- &X
+. 4
~$ )8 .
/ 7 ) &"2 . !/ &
C
@ "/ + =
:! S2 " # ?(T)Z A -/
9 Q`T
5-/2 ""/
.
C
@
A$/
/ D8 <
ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ
Zpbî©@Ûa@óÜÇ@ÑÛû½a@Õy@æìãbÓ@òíb»@ÎbjXg@Zµëþa@òÜyŠ½a
C
@ + #2 E " QWWT
Ya #+
"
3 =
c ; ?QW\[
Y\[ #+
"
(7$
)
@
%.
A
8
"" %
)! -2 "+ .H
A$/
)
&(7$
)
C
@ + (T)
"
!"" B
C
"/ + c
Z =
.» :
.-( &
:
<https://www.wto.org/english/thewto_e/whatis_e/tif_e/org6_e.htm>, (Last
visited 1/4/2016).
&
c "
.«
6 "" . $
.(Q)c
A$/ 8
"
<$/ B
! =
" 4
(TU)
"
A
3
.$
" A$/ )
.
" » :
.-2 ; ?
C
@ .
.«
)! #3 9 </"8 m 2" &/
9 /
Z =
@ @Zòîi…þa@pbÐä–½a@åß@wßa@Ûa@‰bjnÇa@ZòîãbrÛa@òÜyŠ½a
(7$
)
C
@ + #2 E " QWW[
TW #+
"
A$/
)
"
>"
"+ &QW\[
Y\[ #+
"
c ( – )
– QWWT
Ya #+
"
>"
:
/ " &«"3 .
.
')! » :
/ .-2 ; ?=
"" . $ "/ + c
Z =
.»
.
" » :
/ ) .
(T)
"
«
6
&«
)! #3 9 &</"8 m 2" &/
9 /
Z =
.
(TU)
"
A
3
.
A
8 -
"
&"3 .
- =
c 4"8 :
&=
X$
X"
.
H"
"1 "
$
.QWWT/`/T
"
& $
-N
)
=
X$
#>/N
: (&)
"
X"
.
J
H"
"1 "
4
"
$
0-
.!" T\ I &QWW[/Y/\
/
"
1"
9 &(< " \U
C
0) .
:$
"$
.( TU) QWWT #/ " $/ I
4 :
) 3 ?c
– $ 5M – D"N 0 #"/ :
.
.
+.
4 <2 &
C
@ + ([a)
"
."3
ZRPPR@òäÛ@XR@áÓ‰@æìãbÔÛa@‰ë†•@ZòrÛbrÛa@òÜyŠ½a
(Q)
TUUT
aT #+
"
.
$
@ + "
$
» " + /
$
.
"3 $
J
+.>
#-1 #6$
"
6
>
&«.
$
=
+. !4]
&.
$
@ 0
"
.(T)(X) .
$
@
=
c / A$/ I
-2 9
)! - "+
TW #+
<- ! &(Q[U #)
C
@
"3 .
c 4 #2
"/ ;" .
$
+
.)
QWW[
&(Q[b #) c
( H%1 @
:#3 ')! &0 #5> =
<
A$/ &m
8 ... (QbQ #) c
0 4 / @
."
')! 3 =
3 H"
"1 "
$
0-
@$ & $
-N
)
: (&)
1
ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ
@ @ZÑÛû½a@Õ¡@pbî©@Ûa@òíbà§@ïi‰ëþa@…b¤üa@áÇ…ë@ñ†zn½a@pbíüìÛa@Ý/†m@Züëc
&$
Sui generis 4
.
WIPO .
$$
:
.
:$
/"
"2 "+ &(Q)
0 J = 4 J- " F+1 )!
.(T)4
')
X
3 X
" 5
0
+8 CONTU
A H)
&QWaU #/
C
@
(1)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. footnote 146 at p. 2348.
(2)
Aaron D. Charfoos, op. cit., p. 266.
(3)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. footnote 146 at p. 2348.
4
%
"4 &
" A$/
" J %
E .
= $2
"
1
&X
+. I4
@$
A$/ $
"
A$/ 07-$
""
A$/
" D8 :! "2
&=$
J+
J
.(Q)2 A$/
C
@
B"
C
@
D
"
1
~
#!1
) 4 3
2 *
! 'C "
$4
@ =
"
1
A ; ?$4" $/
.(T)
@ @ZÑÛû½a@Õ¡@òíbà§a@òÇŠXë@—/‰ë@òÛìèX@ZbĆîãbq
S
&%$
!
C
@ #
6 #!2 8
* 58 D"k
2 . 5N " c
"
C
@ # M # ?c
@$ D6 D + "/ N ". $
#
.$
-2
9 #%> &$
7
/
#%>
c
8 :E
+ <$ )
.(Y)
@ #4- @ 6
-
" & $
c "
!1 &2%!
)I
' '
.' ()
ZbĆî½bÇ@ÑÛû½a@Õy@âbÄã@òîÛbÈÏ@ZbĆrÛbq
< # <2
C
@ #
=2
Qaa` +.) #
"
*
8 -
"
+.1 >4
/
9
X
+. &QWW`
C
@ (
"!
&>"
"!
"
#- A$/ = "+ .(QW`Q
@ $
+. &QWW[
@ + ""
@1
:! S2 2
C
@
/ %$
C
@ 8 : + )
&.$4
"
$
C
9 <M # .(T)Automatic transnational protection " "$
7$
?-2
9
7
9
4 "
C
@ #
(1)
M. Joseph Hinshaw, The Role of Standardization and Interoperability in
Copyright Protection of Computer Software, Communication Law and Policy,
Vol.4, Issue 3, 1999, p.304;
Dennis S. Karjala, A Coherent Theory for The Copyright Protection of
Computer Software, op. cit., p.53.
&"3 .$
J
d" =
c
<2 5.
E ) "+
.c
0
S
! S2
C
@ + M
See, Dennis S. Karjala, Copyright Protection of Computer Documents, op. cit.,
p. 984.
"
=3 / ;
= <8 )8 ?= $0
A$/
" " :
) M
A
'4 H)
J
2 > &
C
@
+N D
.- c
4" A
8 B"C "3 .$
D
(2)
David Bender, op. cit., p. 917; Dennis S. Karjala, Copyright Protection of
Computer Documents, Reverse Engineering, and Professor Miller, University of
Dayton Law Review, Vol. 19, 1994, p. 975.
@ @ZôŠ/þa@òàÄãþa@åß@òîÜàÇ@Šr×c@ÑÛû½a@Õ¡@òíbà§a@‰bjnÇa@ZbĆÈia‰
<2 &I.
=$0
#" 50
# 58 - D41 5 #
/
#%> 1 <M
?
5
A$/
# D.1 $
# $
2 .
"/ @7 "+
5
"8 2 A
8 -N .
7
J6
)
#%> 1 $ A
8 d <M Trade Secret H
.(Q)
#4-
@ @Zpbî©@ÜÛ@òí…b–nÓüa@òîàçþa@ZbĆßb/
4-
.$$
9 &
"+1 $
"+1 !j
9
J # / ;
- A
8 :
) B"2 " &
')! dN
."!3 :$ @
C
@ # 4
?5"/1
A$/
D J- "
&
C
@ #
0 2 2 "
I4
"
" 8 @0 / !2 #"M 2 +
."
.
! &
(1)
Harvard Law Review, Notes, op. cit., p. 1743; James V. Vergari and Virginia
V. Shue, op. cit., p. 523.
ﺍﳌﺒﺤﺚ ﺍﻟﺮﺍﺑﻊ
ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ
" ! ""
.
" <$/ @$0
$.
XC
Free Software "
C"
% 2 X2 H)
7 #
! &GNU D C
')! A/ ،Foundation
A =
7
c D0 .
&
<4 #
.(Q)GNU/LINUX
$/
c
I4
"
" 8 "
. c
"
.(T)4Z A$/ </6 <
" <4 <$ 2 (c 2 #"4) I4 H2
& J2 8 ! "
.
"
3
.
:(Y)!
.E* H3 c
7 ^Q
.#"4
= <% c
/ . " ^T
."
)! @
@ 0 ! "
"
.J
#"4
A$/
@>0 ٕ &c
^[
@ @Z‰†–½a@sìnÐß@wßbã@Ûa@Éí‹ìmë@Ýí†Èmë@ƒã@¿@Õ§a@Z@üëc
– )
.
– "
.
3
".
&"
" 4 &c
m # 2 <
@
')! #"4 2
J6 / - S 2
9 &</
.
&<6 &<$"
"
H) c
= -
I4
0 # :
) .c
d
"$
c
/ F .
"
d) 6 I%4
:$ .F .
.(Q)c
J6 "
m$
C
)%1 "
9
:$ ( 04 "/ D A
8 "2 #"4
"
)
" 8
!
6$N Free $ 2 :
) =
. 2 c
A
8 B"2 &(T)
&Free Software S$0 &
:$ ""
: &04 "/ )! &d)
) 4
c
"/1
()
.١٤٢ ص، مرجع سابق، محمد حسن عبد ﷲ على.د
2 &"
.
d)
< d) A$/
1"$
S$0
)! #"4 (&)
6$
.@ .
E ٕ !!
"
9 "
$0
> #"4
.!" QYa I &@
J
:/
>
J" )! .(Q)GNU-Linux 7
# 2 A$/ ( D6
$ "
S- 2 A
8 &"
.
XC &
"
J 2 E :! X$ &“Free as in Freedom” : + ; “Free”
.(T)
$ +
X.
@ @ZsìnÐÛa@‰†–½a@pbî©Ši@òÈîju@òî•ì–/@ZbĆîãbq
.0 ""
>
E "
.
(Y)
A
3
@$02 c
) " H)
I4
2 " Linux c
A 1 ""/ #+ " .
.' 0 A
8 #
/"
9 N A$/ <
"
2 " #
52 $4 c
)! 0
D 0
:
) M # .>/
9 :
) )8 ? 0
51C
< 2 8 H2 D
)
. ( "
. c
E A
8 <.
E J" H)
!
.([)/
&
""
:! 2 > @
$
<M B42
#
:! 2 &F .
"
H) c
!
"
c / J 1 E
2 " )
&c
68 ! 3 )!
#-
#"/ )! 1 <2 A$/ "C . c F .
#
# &c
I4 #! 2 " #!" #"/ 1 &E
.(Q)c
A$/
C
@
9
. c
d) $/ #
.$.
<M
" c
" & 0 A
8 c
/ ! "
c
M
?<$/ >" 4"8 A
8 #
52
/" ! :
) M .%"
0 %"
* " "
F .
H)
"
)M .c
0 A$/ %
< # ($
E
? 3 = = 2 @ "" 2 9 c
A$/ 4"2
"2 ) ٕ .4] c <" "+ 2 &c$
% "
- "
)8 2 &: c "" (
c$
$3 4
A$/ >"
.9 9. <M $3 c
/ $
>"
"
H) c
0 #!
C
@
3 .
.(T)F .
&< =
<
>4 - H"
.
2 "
I4
J-
42 9 &
C
@ # 0 &
"/
A$/
" D8 :! 2 . ."
.
.ba^bb I &@
J
()
.!" aY I &@
J
(&)
/
.
"3 .
0 J
0 # &
C
@
0 J # X
A$/ 2 #2
) @ #
C
@ #
J # 2 #2 @ # D41 5 #
/41
) @ / S.
* $
#
$
0
$
@ 2 / 6
9 +
9 -
9 $
2 #2 ! "
)
.
')
5> B" " >4 $%3 :$ / N
:
A$/ $ :
) ?
)
3
.
C
@ #
5> B" : (
1