Reverse engineering vs illegal hacking: Difference between revisions
Small introduction addition for EU law and guidelines. |
Written introduction for EU Reverse Engineering |
||
| Line 89: | Line 89: | ||
These exemptions require that circumvention be a ''"necessary step"'' for the permitted purpose and cannot facilitate access to other copyrighted works. | These exemptions require that circumvention be a ''"necessary step"'' for the permitted purpose and cannot facilitate access to other copyrighted works. | ||
== Reverse Engineering in the European Union == | |||
=== Introduction and Overview === | |||
European law tends to subjectively favor the ''Reverse Engineer'' (RE), including in situations such as "'''observe, study or test the functioning of the program''', provided that those acts '''do not infringe the copyright in the program'''"<ref name=":0">{{Cite web |date=23 April 2009 |title=Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version) (Text with EEA relevance) |url=https://eur-lex.europa.eu/eli/dir/2009/24/oj/eng |url-status=live |archive-url=https://web.archive.org/web/20250000000000*/https://eur-lex.europa.eu/eli/dir/2009/24/oj/eng}}</ref>, while going as far as "'''Decompilation for Interoperability'''"<ref name=":0" /> and "'''Decompilation for Error Correction and Repair'''"<ref name=":0" />. Strong emphasis is put on the intention and the desired outcome of the reverse engineering process. | |||
While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. | |||
=== What is considered safe === | |||
==Narrowing computer hacking laws== | ==Narrowing computer hacking laws== | ||