{"id":3950,"date":"2016-02-24T12:51:49","date_gmt":"2016-02-24T16:51:49","guid":{"rendered":"http:\/\/ncjolt.org\/?p=3950"},"modified":"2020-06-04T20:53:03","modified_gmt":"2020-06-04T20:53:03","slug":"could-apples-saving-grace-be-found-in-intellectual-property-law","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/could-apples-saving-grace-be-found-in-intellectual-property-law\/","title":{"rendered":"Could Apple&#039;s Saving Grace Be Found In Intellectual Property Law?"},"content":{"rendered":"<p>If the court order compelling Apple to assist with overriding iPhone security measures should be appealed, or if effort by Apple should fail for whatever reason, could Apple protect their software rights from infringement by the government through intellectual property law?\u00a0 On the 16th of February 2016 Federal Magistrate Judge Sheri Pym presiding over United States District Court for the Central District of California <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/regmedia.co.uk\/2016\/02\/17\/apple_order.pdf\">issued an order<\/a><\/span> compelling Apple to reasonably assist the United States Federal Bureau of Investigation (FBI) with unlocking an iPhone recovered during a lawful search related to the San Bernadino, California terrorist attack in December of 2015.<br \/>\nThe order was given pursuant to the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/28\/1651\">All Writs Act of 1789<\/a><\/span> which states &#8220;(a) The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.\u00a0 (b) An alternative writ or rule nisi may be issued by a justice or judge of a court which has jurisdiction.&#8221;<br \/>\nThe <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.documentcloud.org\/documents\/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html\">District Court&#8217;s order<\/a> <\/span>compels Apple to provide reasonable technical assistance by (1)\u00a0 implementing a bypass or disabling the auto-erase function on the device, (2) \u00a0enabling the FBI to submit passcodes to the device for testing electronically through the physical device&#8217;s port, Bluetooth, Wi-Fi, or other protocol available, and (3) \u00a0ensuring that when the FBI submits passcodes to the device, the software running on the device will not purposefully introduce additional delays.\u00a0 Essentially, the court is ordering Apple to help circumvent the iPhone&#8217;s security measures through rewriting their software.<br \/>\nThe <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.documentcloud.org\/documents\/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html\">court proposes<\/a><\/span> that Apple&#8217;s compliance &#8220;may include, but is not limited to: providing the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (&#8220;SIF&#8221;) that can be loaded onto the device. \u00a0The SIF will load and run from Random Access Memory and will not modify the iOS on the actual phone, the user data partition or system partition on the device&#8217;s flash memory. \u00a0The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the device. \u00a0The SIF will be loaded via Device Firmware Upgrade (&#8220;DFU&#8221;) mode, recovery mode, or other applicable mode available to the FBI. \u00a0Once active on the device, the SIF will accomplish the three functions specified in paragraph 2. \u00a0The SIF will be loaded on the device at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the device through a computer allowing the government to conduct passcode recovery analysis.&#8221;<br \/>\nIt should be noted, however, that this order is entirely hypothetical, meaning that the software code and methodology ordered by the court have not been created.\u00a0 The District Court is not certain that its order is a viable option (giving Apple an out if it not possible), and Apple is vehemently opposed to the order as a whole.\u00a0 In a letter to its customers <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.apple.com\/customer-letter\/answers\/\">Apple stated<\/a><\/span>, &#8220;It would be wrong to intentionally weaken our products with a government-ordered backdoor.\u00a0 If we lose control of our data, we put both our privacy and our safety at risk.&#8221;<br \/>\nHowever, this order raises the question of why the government chooses not to produce its own backdoor through the creation and implementation of their own hypothetical software.<\/p>\n<blockquote><p>Assuming that the government could create such software, could they legally circumvent Apple&#8217;s software or would it be barred under a different United States law, perhaps intellectual property law?<br \/>\n&nbsp;<\/p><\/blockquote>\n<p>Looking at copyright law for example, it appears that the United States Government could create software without fear of an injunction, however, the copying would still be considered an infringement.\u00a0 According to <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/28\/1498\">28 U.S.C. 1498 (b)<\/a> <\/span>the remedies for an entity who has had their copyright infringed upon by the United States government are limited.\u00a0 &#8220;Whenever the copyright in any work protected under the copyright laws of the United States shall be infringed by the United States, by a corporation owned or controlled by the United States, or by a contractor, subcontractor, or any person, firm, or corporation acting for the Government and with the authorization or consent of the Government, the exclusive action which may be brought for such infringement shall be an action by the copyright owner against the United States in the Court of Federal Claims[not a district court] for the recovery of his reasonable and entire compensation as damages for such infringement, including the minimum statutory damages as set forth in section 504(c) of title 17, United States Code.&#8221; The exclusive action allowed under this statute would allow Apple to bring suit, but ultimately would not stop the government from use of the copyrighted code.\u00a0 Thus, the ends they are trying to reach would not be covered under this provision.\u00a0 If the District Court&#8217;s order stands, the technology community might look to what <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nyulawreview.org\/sites\/default\/files\/pdf\/NYULawReview-83-1-Portnoi.pdf\">remedies can be found<\/a><\/span> throughout the law, thinking outside the box in the most creative of ways, as the United States Department of Justice has done in using the All Writs Act.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the court order compelling Apple to assist with overriding iPhone security measures should be appealed, or if effort by Apple should fail for whatever reason, could Apple protect their software rights from infringement by the government through intellectual property law?\u00a0 On the 16th of February 2016 Federal Magistrate Judge Sheri Pym presiding over United <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/could-apples-saving-grace-be-found-in-intellectual-property-law\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3951,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3950"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=3950"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3950\/revisions"}],"predecessor-version":[{"id":7234,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3950\/revisions\/7234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/3951"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=3950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=3950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=3950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}