NFT Art: The lawyer specializing in digital and intellectual property in Paris supports you in your project

   NFTs: serious or not serious? The NFT specialist lawyer answers you and accompanies you in your NFT projects.

The NFT is neutral in itself, and effective if surrounded by the appropriate IT and legal environment.

This is what the Roquefeuil firm offers you for your NFT questions or your Web 3.0 project

A lawyer specializing in intellectual property and digital law assists you with your NFT, cryptos, blockchains issues

It is indeed on the basis of copyright and crypto legislation that your project can take shape.

For an introduction to NFTs, Web 3.0, cryptos:

web 3.0 and the metaverse 

NFT and copyright

If the contract associated with the NFT and carried by the platform is sufficient, the digital quality there, the robust authenticity verification, there is no reason why your NFT art should not be credible.

In the bill under discussion (Bill to promote digital art and protect new forms of artistic creation), the MP recalls this evidence: "As early as the 1930s, Walter Benjamin grasped the upheaval to which artistic creation copes with the rise of photography and cinema: the possibility of reproducing the same work ad infinitum, far from distorting the creation, modifies the relationship of the artist to the support of his work. »

“..now that each individual has personalized access to the internet, has social networks to share their interests and explores the world through a digital device, access to art is experiencing a new wave of democratization. »

“Digital art is not, however, limited to screens. On the contrary, many creations reminded us that art can re-enchant public space, by increasing buildings or endowing common places with new experiences. The Atelier des Lumières in Paris, the Carrière des Baux de Provence, the Bassin des Lumières in Bordeaux or even the Fête des Lumières in Lyon show an overview of the rich and diverse horizons that digital art reveals to us. »

“Digital art thus makes it possible to democratize access to culture for a new audience. »

 » Many innovative companies have been created in France which promote new generations of artists. »

Nevertheless, digital art seems insufficiently addressed by tax law and forms of public aid for artistic creation.

Article 150 VH bis of the General Tax Code only provides:

“I. – Subject to the provisions specific to professional profits, capital gains realized by natural persons domiciled for tax purposes in France within the meaning of Article 4 B, directly or through an intermediary, during a transfer for consideration of The digital assets mentioned in Article L. 54-10-1 of the Monetary and Financial Code or rights relating thereto are liable to income tax under the conditions provided for in this article. »

It is therefore planned that the NFTs be attached to the favorable patronage regime and to the tax deductions benefiting the acquisition and rental of works.

The proposal evokes an interesting definition of NFT Art, with reference to cryptocurrencies:

“ “II. – A non-fungible token is considered, under this article and to the exclusion of tokens considered as digital assets within the meaning of Article L. 54-10-1 of the Monetary and Financial Code, as any intangible property and not fungible representing, in digital form, one or more rights that can be issued, registered, stored or transferred by means of a shared electronic recording device making it possible to identify, directly or indirectly, the owner of the said property. » »

 

 

 

 

NFT project: anticipate risks and legal issues!

For now, the legal framework for these digital tokens is still unclear. However, we
We have examined the questions that the NFT project leader must address:

– NFT tax regime

As we have seen, the taxation of NFTs is still uncertain and its taxation varies according to its
qualification: digital or intangible asset. The legislator has taken up the subject. The NFT lawyer
accompanies you to anticipate changes in tax law.

– NFT and copyright, the lawyer specializing in intellectual property law accompanies you:

The author of the original work remains the owner of the copyright. So, to exploit
commercially the latter, verifications and contracts are to be expected.

On copyright contracts: 

https://roquefeuil.avocat.fr/cession-des-droits-dauteur-avocat-propriete-intellectuelle-paris/

Your NFT lawyer carries out a prior art search, makes an inventory of rights, drafts an assignment contract in order to avoid infringement disputes.

– Consumer protection regulations:

NFT issuers must respect the rules of consumer protection, the right of withdrawal, and consumer information.

– Money laundering 

As crypto-assets, NFTs can be used as a tool for money laundering and financing illegal activities. Hence the importance of finding out about the origin of the NFT, the reliability of its issuer or platform, etc. Compliance work is required before any transaction.

– NFT and metaverse

Brands are investing in the metaverse. Who has the right to do what in this universe? The nft lawyer secures your contract.

What is the service of the NFT lawyer?

The NFT lawyer is above all an intellectual property lawyer.

Classically, you can expect him to preserve and secure your financial, commercial and patrimonial interests in terms of intellectual property law.
He reviews or drafts your contracts, and assists you in your negotiations with artists, NFT creators, service providers, investors, traders, gallery owners and art dealers, video game studios, platform
NFT, individual buyers of NFT…

The firm Pierre de Roquefeuil, in Paris, specialized in intellectual property and digital law, therefore assists you on questions of project feasibility, drafting contracts (transfer, production), CGV, CGU, sponsorship, blockchain deposits, litigation fraud, competition, counterfeiting…

The web 3.0 dream

We knew Web 1.0 then Web 2.0, it is now the turn of Web 3.0 to make its appearance. It designates a decentralized version of the internet that is about blockchain and decentralization. While Web 2.0 has won us over with its dazzling progress, notably with the appearance of social networks and dynamic websites, Web 3.0 is also experiencing an unprecedented technological transition. Indeed, it will allow each Internet user to be able to manage and control their digital identities and personal data on their own, without centralization in data centers.

Freedom, transparency, security and verifiability are the key words of Web 3.0. However, how will this new technology be organized in practice? The development of Web 3.0 is still in the research and work phase. However, in 2022, we are already using features that will serve as the basis for this new technological era. This development will not be without risks, so some safeguards will have to be put in place so as not to cross the legal barrier.

The evolution of the web: from Web 1.0 to Web 3.0

For several decades, the Internet has been revolutionized. We went through different phases of progression. These developments have introduced us to new technologies such as cryptocurrency and blockchain. The Internet is an essential element in our society today. We have experienced Web 1.0 and Web 2.0, what should we expect from Web 3.0?

If Web 1.0 offered a static experience to users that did not allow them to create content-rich websites, Web 2.0 made it possible to achieve a certain level of quality on the web, at the cost, however, of centralization in data centers, often belonging to multinationals.

When we look at the history of the internet, the technological evolution towards a Semantic Web (or 3.0) makes sense. At first, the data was presented statically to users. Subsequently, users were able to dynamically interact with their data. Thanks to Web 3.0, they will see their user experience enriched thanks to algorithms that will provide them with more personalized Internet browsing. Internet users will benefit from more individual Internet access that will take into account their profile, their habits and their browsing, in the same way as streaming sites (Netflix, Prime Video, Youtube) which already rely on algorithms to enrich the user experience.

What is Web 3.0?

A new generation of the Internet, Web 3.0 is based primarily on artificial intelligence and blockchain technology by allowing users better control of their online data.

Web 3.0 will gradually allow us to control our information online. This new version of the Internet will make it possible to easily process user-generated content and offer more immersive modes of interaction. Thanks to Web 3.0, we will obtain personalized information more easily due to the use of artificial intelligence and all the advanced techniques.

By definition, the many functionalities of Web 3.0 will allow access to a certain level of technology. Internet users will not have any central point of control, they will obtain more precise data thanks to the analyzes of the algorithms and will therefore see their web browsing more efficient. Web 3.0 will be inspired by the user experience to improve the advertisements offered to Internet users. The chatbots present today on many commercial sites will be improved to offer a clearly superior experience to users.

Although Web 3.0 is still under development, it should be remembered that today we are already using the tools that will make up this semantic Web. Indeed, the virtual assistants Siri or even Alexa are assistants who already tick the boxes of Web 3.0 improvements. Indeed, their use depends on artificial intelligence through our habits and the profile that we define with these tools. The centralization of our connected objects is also one of the main features of Web 3.0. Already today, we can connect our heating or air conditioning system, our television, our multimedia devices or our electric shutters on the same device in order to control them intelligently and connected remotely.

Web 3.0: what about data protection?

A central subject at the heart of this technological evolution, data protection makes it possible to better envisage the future of the web. One of the main objectives of Web 3.0 is to allow users to regain control of their personal data by leveraging decentralized digital identity.

Web 3.0 is subject to a strict regulatory framework with the GDPR regulation (General Data Protection Regulation). Thanks to SSI (Self Sovereign Identity) technology, Internet users can control their digital identity without requiring the intervention of a third party.

The advantages of Web 3.0

The Semantic Web, or Web 3.0, offers a more intuitive use of the Internet. The wealth of content on the web will be reinforced and more instinctive. Thanks to artificial intelligence, the web will better understand our queries, our habits and our profile. Thus, it will offer us searches associated with our personality. Voice search will be improved to offer more precise and appropriate answers to our needs.

Another advantage, and not the least of Web 3.0, is the fact of having a single profile which will replace the multiplicity of accounts. More specifically, the user will be able to use his unique profile to access all of the platforms while remaining the owner of the information provided. Thus, Internet users will no longer need to create a profile for each platform to which they wish to connect, but will be able to use their unique profile.

These many advantages offered by Web 3.0 will be the result of major technological advances that will make our web browsing more enjoyable.

Decentralization

If the technological advances of Web 2.0 have been appreciated by Internet users, they have been implemented at the cost of centralization. Web 3.0 provides in its many developments a decentralization highly appreciated by its users. This evolution of the Internet makes it possible to host personal data with Internet users themselves. This is a real step forward since in the previous digital era, data was hosted in data centers learning from large multinationals.

Augmented identity (decentralized digital identity) allows users to have full control of their personal data and guarantee their security. Web 3.0 will make it possible to develop strong solutions for verifying customer identity, securing personal data and simplifying access to the various services.

Blockchain

Blockchain is one of the main innovations of Web 3.0. Blockchain refers to a set of various decentralized applications and data storage. Indeed, one of its strengths is to store and transmit information from a database shared at the same time with all users.

3D visualization

In terms of digital appearance, Web 3.0 promises real appreciable advances for Internet users. Reinforcing the appearance of the Internet will lead to 3D environments, virtual reality tools and better intuitive navigation. Concretely, meetings via video games will evolve towards 3D, the metaverse will be one of the essentials in this technological era.

What is the link between cryptocurrency and Web 3.0?

Built from the Blockchain, Web 3.0 is used to control the operation of applications but also for cryptocurrency. In the role of decentralization enabled by Web 3.0, digital assets will have an important role to play.

Indeed, cryptocurrencies could help forge a new Web 3.0 ecosystem. Thus, they would make it possible to obtain three important qualities of Web 3.0: decentralization, the absence of permits and the absence of trust. Cryptocurrency has a crucial role in the era of Web 3.0. It would indeed be likely to be intended for public services but also for open source.

Web 3.0 will allow significant improvements in the management of cryptocurrencies. Indeed, each user will be able to create a wallet over which he will obtain full control to carry out his transactions and act as a digital identity (this is already the case today, even if it remains quite hermetic for ordinary mortals). Owning data on a blockchain and performing decentralized transactions will provide new digital economies. Users will see an improvement in their access to financial services and will be able to exchange goods, services and content more simply.

Web 3.0: what could be the risks?

While Web 3.0 has many advantages in terms of technological advancement, it can nevertheless present risks. As previously announced, one of the pioneers of Web 3.0 is decentralization. This decentralization has flaws that could be hijacked by ill-intentioned individuals.

Without safeguards, Web 3.0 risks allowing the use of cryptocurrencies and the use of NFTs to be misused, which could lead to money laundering. Also, some data storage could escape the institutions and the application of the legislation: copyright, illegal content, counterfeiting, etc.

 

Be accompanied by a lawyer specializing in intellectual property and IT, NFT and crypto in Paris, for your Web 3.0 projects or disputes

NFT and copyright: precautions to take

Is the software licensee an infringer or simply a faulty co-contractor?

Oct 18, 2018 –

 

Can the licensee be qualified as an infringer? Evolution of the debate.

Failure by a software licensee to comply with the terms of a software license agreement (by expiration of a trial period, exceeding the number of authorized users or other unit of measure, such as processors that can be used to execute the instructions of the software, or by modifying the source code of the software when the license reserves this right to the initial holder) does it constitute:

– an infringement (within the meaning of directive 2004/48 of April 29, 2004) suffered by the copyright holder of the software reserved by article 4 of directive 2009/24/EC of April 23, 2009 concerning legal protection computer programs
– or can it obey a separate legal regime, such as the common law contractual liability regime?

If it is a counterfeit, the counterfeiter can be prosecuted according to the specific regime for counterfeiting, with in particular the possibility of criminal prosecution, seizure-counterfeiting;

If it is a simple breach of contract, the licensee is liable under the general regime of contractual civil fault.

The difference is considerable on the legal level, particularly with regard to the administration of evidence and the type of compensation that can be obtained in reparation.

 

Paris Court of Appeal, pole 5 – ch. 1, judgment of October 16, 2018

1 By a contract of August 25, 2010, modified by an amendment of April 1, 2012, the company IT Development granted the company Free Mobile, a telephone operator offering mobile plans on the French market, a license and a maintenance contract on a software package called ClickOnSite, centralized project management software intended to allow it to organize and monitor in real time the evolution of the deployment of all of its radiotelephony antennas by its teams and by its external technical service providers.

Arguing that modifications were made to the software in violation of the license agreement, and after having had an infringement seizure carried out on May 22, 2015 at the premises of the company Coraso, a subcontractor of the company Free Mobile, the company IT Development, by deed of June 18, 2015, summons the company Free Mobile for infringement of the ClickOnSite software and compensation for its damage.

In addition to the inadmissibility and ill-foundedness of these requests, the company Free Mobile brought a counterclaim in abusive proceedings.

2 IT Development appealed on February 3, 2017 against the contradictory judgment delivered on January 6, 2017 by the Paris tribunal de grande instance which:

  • Declared the company IT Development inadmissible in its claims based on tort liability,
  • Dismissed the company's claim for damages for abuse of process
    Free mobile,
  • Order IT Development to pay the costs and to pay Free Mobile the
    sum of 8000 euros on the basis of the provisions of article 700 of the code of
    Civil Procedure.

3 In its final conclusions of May 3, 2018, the company IT Development asks the court to:

  • On a preliminary basis, submit to the Court of Justice of the European Union (CJEU) a preliminary question in the following form:
    "The failure of a software licensee to comply with the terms of a software license agreement (by expiration of a trial period, exceeding the number of authorized users or other unit of measure, such as the processors that can be used to execute the instructions of the software, or by modifying the source code of the software when the license reserves this right to the initial holder) does it constitute:
    – an infringement (within the meaning of directive 2004/48 of April 29, 2004) suffered by the copyright holder of the software reserved by article 4 of directive 2009/24/EC of April 23, 2009 concerning legal protection computer programs
    – or can it obey a separate legal regime, such as the common law contractual liability regime? ".
  • Set aside the judgment under appeal, and:
    » Declare admissible the action for infringement brought by the company IT Development;
    » State that the allegedly infringing ClickOnSite software is identified and original;
    » Declare and judge that the modifications of the software by the company Free Mobile constitute acts of counterfeiting;
    Mainly, in respect of the infringement, order the company Free Mobile to pay the company IT Development the sum of €1,440,000 for compensation for the damage suffered by the company IT Development;
    In the alternative, on a contractual basis, order the company Free Mobile to pay the company IT Development the sum of €840,000 for compensation for the damage suffered by the company IT Development;
  • In all cases: Prohibit the Free Mobile and Coraso companies from using the ClickOnSite software and from extracting and reusing the data from the ClickOnSite software under a penalty of €500 per day of delay from the day after the fifteenth day of notification the decision to be made, it being up to Free Mobile to justify the cessation of use of the software by any means at its convenience (uninstallation or other);
    » Reserving competence for the liquidation of penalty payments;
    » Order Free Mobile to pay all the costs, including the costs of reports and the costs of seizure-infringement;
    » Order Free Mobile to pay IT Development the sum of €40,000 under Article 700 of the Code of Civil Procedure.

4 In its final conclusions of May 11, 2018, the company Free Mobile asks the court to:

  • Confirm in all its provisions the judgment entered into, except insofar as it dismissed the company Free Mobile's claim for damages for abuse of process, and except on the quantum of the sentence pronounced against the company IT Development on the basis of the provisions of article 700 of the code of civil procedure;
  • Reversing the judgment of these counts, and ruling again:
    » order IT Development to pay Free Mobile the sum of €50,000 (fifty thousand euros) in damages for abusive proceedings;
    » order the company IT Development to pay the company Free Mobile the sum of €50,000 (fifty thousand Euros) on the basis of Article 700 of the Code of Civil Procedure, for costs not included in the costs of the first instance;
  • Adding to the judgment:
    » Pronounce the nullity of the report of seizure-infringement drawn up on May 22, 2015
    by Maître Yves MAS, bailiff, at the registered office of CORASO;
    » Declare the nullity of the “Expert report” of May 30, 2015 and the “Freely established technical note” submitted to the proceedings by the company IT Development as exhibits n°12 and n°43, or at the very least declare them inadmissible as evidence and exclude them from the proceedings;
    » Declare the company IT Development inadmissible, and in any case ill-founded, in all of its claims against the company Free Mobile; dismiss it;
    » Order IT Development to pay Free Mobile the sum of €50,000 (fifty thousand Euros) on the basis of Article 700 of the Code of Civil Procedure, for costs not included in the costs of the proceedings call;
    » Order IT Development to pay all the costs, which may be recovered directly by SELAS Bardehle Pagenberg, Lawyers, in accordance with the provisions of Article 699 of the Code of Civil Procedure.

5 The closing order is dated May 15, 2018.

DISCUSSION

Pursuant to the provisions of Article 455 of the Code of Civil Procedure, reference is expressly made, for an exhaustive statement of the claims and means of the parties, to the written submissions that they submitted, as referred to above.

Admissibility and the question referred

6 In its summons and conclusions at first instance, the company IT Development maintained that the company Free Mobile had committed acts of infringement by modifying the ClickOnSite software, in particular by creating new forms. According to it, the defendant was not admissible to invoke the provisions of article L.122-6-1 of the intellectual property code authorizing it to modify the software for use in accordance with its intended purpose, therefore, d on the one hand, that these modifications would have been substantial, on the other hand, that the possibility of proceeding with them would have been excluded by the contract;

7 In order to declare it inadmissible in respect of these claims based on infringement, the court considered that the combination of articles 122-6 and 122-6-1 of the intellectual property code led to the recognition of two distinct liability regimes in the matter, the tort in the event of infringement of the rights of exploitation of the author of the software, as designated by law, the other contractual, in the event of infringement of a copyright reserved by contract; that in the present case, the company Free Mobile was clearly accused of breaches of its contractual obligations, relating to an action for contractual liability and not tortious acts of software infringement;

8 In case of appeal, the company IT Development requests on a preliminary basis the submission of a preliminary question to the Court of Justice of the European Union, then the reversal of the judgment, asking to declare admissible the action for infringement. For these purposes, it maintains, firstly, that the recognized right of the author of software to authorize or prohibit the modification of the source code of the software is a right of legal origin, and that the violation of this right by the licensee is not a simple breach of contract but a violation of the author's legal right, thus constituting an infringement; secondly, that if for all other intellectual property rights the action for infringement is expressly opened in the event of violation of a license contract, article L 335-3 paragraph 2 of the CPI which provides that is also an offense of counterfeiting the violation of one of the rights of the author of software defined in article L.122-6, is intended to apply both to cases of use without right (the "piracy ” in the strict sense), only to those of a use exceeding the license; thirdly, that the action for infringement is not an action of an exclusively tortious nature; that the distinction between contractual and tort liability is contrary to the objective of the European legislator to establish a single procedure following Directive 2004/48; that in reality, counterfeiting has a dual nature: criminal and contractual action, and it is blind, since the law of 2007, to the distinction between contractual and tortious; that fourthly, the directive on the fight against counterfeiting wanted to give counterfeiting the widest possible definition extending to any infringement of intellectual property rights.

9 Free Mobile, which considers that there is no need to ask any question for a preliminary ruling, requests confirmation of the judgment. It argues that the legal provisions establish two different liability regimes for two different categories of acts, on the one hand, acts infringing a right reserved by law, giving rise to a liability action for the benefit of the author of the software tort, the action for infringement, on the other hand, acts infringing a right reserved by contract, opening for the benefit of the author of the software an action in contractual liability against his co-contracting party; that in the present case, the incriminated acts, namely a violation of the contractual obligations of the licensee, do not open to the company Free Mobile an action for infringement; that the non-cumulation of contractual and tort liability is a cardinal principle of civil liability in French law and that it is in fact established that the creditor of a contractual obligation cannot prevail against the debtor of this obligation, even if - even there would be interest, rules of tort liability; that in reality, when the legislator intends to derogate from common law by allowing the injured party to take action in tort against a licensee who infringes one of the limits of his license when he could only do so in principle on the basis of contractual liability, it then expressly and very precisely provides for this derogation, thus in matters of patent licensing or in matters of trademark licensing; whereas, on the other hand, with regard to software licenses, the legislator has not provided for any derogation from the principle of common law according to which, in the presence of a license contract binding the parties, the regime of contractual liability prevails over that of tort liability; that no provision of Directive 2009/24/EC of April 23, 2009 on the legal protection of computer programs, nor any provision of Directive 2004/48/EC of April 29, 2004 on the enforcement of intellectual property rights, does not require Member States to make tortious liability prevail over contractual liability in the event that the legitimate user of software infringes the limits of the license from which he benefits; that the Court of Justice of the European Union has already itself established, in a judgment of April 18, 2013 (C-103/11, European Commission v. Systran) rendered in matters of software licensing, the principle of common law according to which contractual liability prevails over tort liability.

This being stated, the court

10               1 – The factual context

The court recalls that by a contract of August 25, 2010, modified by an amendment of April 1
2012, the company IT Development granted the company Free Mobile, operator of
telephony offering mobile plans on the French market. license and contract
maintenance on a software package called ClickOnSite, project management software
centralized system intended to enable it to organize and monitor in real time the evolution of the
deployment of all of its radiotelephony antennas by its teams and by its
external technical service providers.

The IT Development company accuses the Free Mobile company of having modified the ClickOnSite software, in particular by creating new forms.

In addition to the substantial nature of these modifications, it relies in particular on the stipulations of article 6 “scope of the license” to maintain that the company Free Mobile did not have the right to make such modifications:

In any event, the Customer expressly refrains (…) from:
– reproduce, directly or indirectly, the Software (…) with the exception of backup copies;
– decompile and/or carry out reverse engineering operations on the Software, except for legal exceptions;
– modify, correct, adapt, create secondary works and additions, directly or indirectly, in relation to the Software Package, it being understood that the Client will nevertheless have free read access to the database.
– (…)

If necessary, the Customer reserves the right to ask the Supplier, by simple mail, fax or email, for information necessary for the interoperability or compatibility of the Software Package with other software used by the Customer. In the absence of a satisfactory response as to the completeness and relevance of this information from the Supplier within a period of one month after receipt of the said request, the Customer will proceed on its own, in accordance with the provisions of article L 122 -6-1 of the Intellectual Property Code, to the operations of decompiling the source code of the Software Package for the sole purpose of ensuring the interoperability or compatibility of the Software Package with another software used by the Customer (…).

At first instance, the plaintiff based its claims exclusively on infringement. On appeal, it also bases them, in the alternative, on contractual liability.

In addition to the inadmissibility of the claims on the basis of counterfeiting, the company Free Mobile essentially argues, firstly, that the proof of the originality of the software is not reported, secondly, that the seizure operations- counterfeiting are void, as well as the report drawn up by an expert, thirdly, that the proof of an unauthorized modification of the software is not reported, lastly, that the modifications carried out concern only the database specific to the licensed operator and that the clause prohibiting modification of the software package, contrary to the public order provisions of article L.122-6-1 of the intellectual property code, must be deemed unwritten.

11               2 – Relevant texts

a – Community directives

Article 2 of Directive 48/2004/EC of April 29, 2004

1 – Without prejudice to the means provided for or which may be provided for in Community or national legislation, insofar as these means are more favorable to the holders of rights, the measures, procedures and remedies apply, in accordance with Article 3, to any infringement of intellectual property rights provided for by Community law and/or the national law of the Member State concerned.

Directive 2009/24/EC of April 23, 2009

Article 4 – Acts subject to restrictions

1. Subject to Articles 5 and 6, the Holder's exclusive rights within the meaning of Article 2 include the right to make or authorize:
(a) the permanent or temporary reproduction of a computer program, in whole or in part, by any means and in any form whatsoever (…)
b) the translation, adaptation, arrangement and any other transformation of a program
computer and the reproduction of the resulting program, without prejudice to the rights of the
person who transforms the computer program;
c) any form of distribution, including rental, to the public of the original or copies
of a computer program.

Article 5 – Exceptions to acts subject to restrictions

1. Except for specific contractual provisions, the acts referred to in Article 4(1)(a) and (b) are not subject to the holder's authorization when these acts are necessary to enable the lawful purchaser to use the computer program in a manner consistent with its intended purpose, including to correct errors.

b – Articles of the intellectual property code

Article L112-2

Are considered in particular as works of the mind within the meaning of this code: (…)
13° Software, including preparatory design material.

Article L122-6

Subject to the provisions of article L. 122-6-1, the right of exploitation belonging to the author of software includes the right to perform and authorize:

1° The permanent or temporary reproduction of software (…)
2° The translation, adaptation, arrangement or any other software modification and
the reproduction of the resulting software (…)
3° The placing on the market for consideration or free of charge, including rental, of the copy or copies of software by any process (…)

Article L122-6-1

I. The acts provided for in 1° and 2° of Article L. 122-6 are not subject to the authorization of the author when they are necessary to allow the use of the software, in accordance with its intended purpose, by the person having the right to use it, including to correct errors.

However, the author is entitled to reserve by contract the right to correct errors and to determine the specific terms and conditions to which the acts provided for in 1° and 2° of Article L. 122-6 will be subject, necessary to allow the use of the software, in accordance with its intended purpose, by the person having the right to use it.

Article L335-3

Violation of one of the copyrights of software defined in article L. 122-6 is also an offense of counterfeiting.

3 – Patterns

12 Since the 19th century, French civil liability law has been based on the cardinal principle of non-cumulation of tort and contractual liability, which implies:

– that a person cannot see his contractual liability and his tort liability engaged by another person for the same facts,
– that tort liability is excluded in favor of contractual liability when, on the one hand, the parties are bound by a valid contract and that, on the other hand, the damage suffered by one of the parties results from the non-performance or poor performance of one of the obligations of the contract.

Moreover, French law traditionally considers that counterfeiting, which is originally a criminal offence, arises from tort liability and not from non-performance of a contract.

13 The court deduced from this in this case, when the parties are bound by the contract of August 25, 2010 and it is alleged that the damage results from the non-performance of the clauses of this contract and particularly of its article 6, that tort liability must be set aside in favor of contractual liability, and consequently that the action for infringement, assimilated to the tort action, must be declared inadmissible.

The respondent company, which supports this analysis, rightly cites decisions of French courts going in this direction, including a judgment of this chamber of May 10, 2016.

14 However, it is not irrelevant that the appellant company maintains that infringement is not in essence a delictual action but could also result from the non-performance of a contract.

It is indeed true that counterfeiting is defined in its broadest sense as an infringement of an intellectual property right and, in the particular case of article L.335-3, as the violation of one of the rights the author of software [defined in article L.122-6].

Neither of these texts nor any other French text relating to counterfeiting expressly provides that the latter only applies when the parties are not bound by a contract.

Even if they can be presented as so many exceptions to the principle of non-cumulation, the texts below are also examples of what action for infringement can be brought in patent and trademark matters against the licensee who violates the limits of his contract:

Article L.613-8, paragraph 3 of the Intellectual Property Code

The rights conferred by the patent application or by the patent may be invoked against a licensee who infringes one of the limits of his licence.

Article L.714-1 of the Intellectual Property Code

The rights conferred by the application for registration of a mark or by the mark may be invoked against a licensee who infringes one of the limits of his license with regard to its duration, the form covered by the registration under which the mark may be used, the nature of the goods or services for which the license is granted, the territory in which the mark may be affixed or the quality of the goods manufactured or the services provided by the licensee.

In the case in point, Articles L 122-6 and L 122-6-1 of the Intellectual Property Code, if they provide in particular that the specific terms of a software modification can be determined by contract, do not do not provide that in these cases an action for infringement would be excluded. The same applies to Articles 4 and 5 of Directive 2009/24/EC of which they are the transposition.

Finally, it is true that Article 2 “scope” of Directive 48/2004/EC of April 29, 2004 on the enforcement of intellectual property rights generally provides that the measures, procedures and remedies are apply (…) to any infringement of intellectual property rights, without distinguishing between whether or not this infringement results from the non-performance of a contract.

The court considers under these conditions that a preliminary question must be submitted in the terms proposed to the Court of Justice of the European Union.

That there will be a stay of proceedings until the court of justice has answered it;


DECISION

15 The court, by contradictory judgment before saying right,

Refers to the Court of Justice of the European Communities for the purpose of answering the following preliminary question:

Failure by a software licensee to comply with the terms of a software license agreement (by expiration of a trial period, exceeding the number of authorized users or other unit of measure, such as processors that can be used to execute the instructions of the software, or by modifying the source code of the software when the license reserves this right to the initial holder) does it constitute:
– an infringement (within the meaning of directive 2004/48 of April 29, 2004) suffered by the copyright holder of the software reserved by article 4 of the directive 2009/24/EC of April 23, 2009 on the legal protection of computer programs
– or can it obey a separate legal regime, such as the common law contractual liability regime?

Stay to rule on the appeal of the company IT Development until the decision of the Court of Justice,

Holds that a copy of the judgment and a copy of the case file will be sent to the Court of Justice of the European Communities by registered post.

The originality of the software before the pretrial judge

Get support for your IT contracts

 

 

Paris Court of Appeal, Chamber 5, Pole 2, March 19, 2021, RG n°19/17493 confirming TGI Paris June 21, 2019 n°11/07081.

In this judgment, it is the contractual breach which is retained following a non-respect of the terms of the intellectual property license agreement (software license agreement).

This solution is nevertheless called into question by the Court of Cassation, which admits the action for infringement.

Court of Cassation, 1st ch. civil, judgment of October 5, 2022

Preliminary question: is the licensee of software an infringer or simply a faulty co-contractor?

Assignment of copyright

Reminder of the principle

The rules of intellectual property sanction criminally and civilly infringements of copyright, trademark or patent, copyright attached to software, that is to say the offense of counterfeiting.

 

Playdoyer for an exception

However, when a contract is at stake, involving a discussion and a partnership between two co-contractors, a form of confidentiality, it is surprising to invoke the wrath attached to the repression of the offense (criminal and civil) of counterfeiting to sanction the unscrupulous contractor.

The very notion of contract seems antithetical to the notion of offence, which presupposes an attack on public confidence, a public scandal. One is tempted to say here that the stop comes down to fundamentals.

However, it does not expand on the reasons for choosing the contractual liability regime, simply stating that:

 "when the event giving rise to an infringement of an intellectual property right results from a contractual breach, the right holder having consented by contract to its use subject to certain reservations, then only an action for contractual liability is admissible by application of the principle non-accumulation of responsibilities. »

The debate before the Court of Justice of the European Union

 The judgment reports above all and also the debate that there was before the Court of Justice of the European Union on the subject (judgment of the Court of Justice of the European Union (CJEU) delivered on December 18, 2019, case C-666-18)(judgment of December 18, 2019, IT Development v. Free mobile), on the basis of directives 2004/48 relating to the respect of intellectual property rights and 2009/24 on the legal protection of computer programs.

According to the CJEU:

[…] if Directive 2004/48 aims to establish the measures, procedures and remedies vis-à-vis the holders of intellectual property rights, which includes the copyright of computer programs provided for by Directive 2009/24 , this first directive does not lay down the exact terms and conditions for the application of these guarantees and does not prescribe the application of a particular liability regime in the event of infringement of these rights.

44 – It follows that the national legislature remains free to set the concrete methods of protection of the said rights and to define, in particular, the nature, contractual or tortious, of the action available to the holder of these rights, in the event of violation of its intellectual property rights, against a computer program licensee.

 

However, the doctrine remains divided on the subject, as well as recent case law (TJ Paris July 6, 2021, No. 18/01602), but tends to admit the action for infringement (see the aforementioned judgment at the beginning of article Court of Cassation, (1st ch. civ), October 5, 2022, Sté Entr'ouvert and Sté Orange)

NFTs and copyright

The originality of the software before the pretrial judge

 
 

 

Updated Nov 12, 2022

The Court of Cassation admits the action for infringement in the event of non-compliance with the license agreement.

In the Court of Cassation judgment, (1st ch. civ), October 5, 2022, Sté Entr'ouvert and Sté Orange, the Court of Cassation recognizes that the infringement of intellectual property rights can be sanctioned by counterfeiting regardless of the regime national responsibility, contractual or not.

Texts quoted:

Article L. 335-3, paragraph 2, of the Intellectual Property Code,

Articles 7 and 13 of Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the enforcement of intellectual property rights

Article 1 of Directive 2009/24/EC of the European Parliament and of the Council of April 23, 2009 on the legal protection of computer programs.

 

Cybersecurity, a major concern

Cybersecurity

For several years, cyberattacks have been on the rise in France. We estimate an increase of +400 % in cyber threats since 2020. This is also a risk that had already been mentioned by the ANSI (National Agency for the Security of Information Systems) a few years ago. , which predicted an increase in the threat over the next few years.

Although cyberattacks initially targeted companies, they increasingly concern medical establishments and local authorities. How can this explosion of cyberattacks be explained? What is cybersecurity and what is its role?

What is cybersecurity?

The main objective of cybersecurity is to protect computer systems, networks and programs against digital attacks. Very often, these cyberattacks aim to try to access sensitive information in order to modify or destroy it or to use it in order to profit from it, most of the time financially.

Cybersecurity, also called computer security or information systems security, is divided into several categories:
network security,
application security,
information security,
operational security.

The most widespread cyberattacks aim to collect information in order to reuse it in different ways. There are different types of cyber threats such as: virus, Trojan horse, Spyware, Ransomware, Adware or Botnet. However, in recent years, we have discovered 3 new cyber threats that are increasingly used:
Dridex Malware. It is a Banking Trojan that infects systems by sending phishing emails. By recovering connection data, bank details or personal data, cybercriminals can thus carry out dishonest transactions.
Romance scams. These scams aim to set up scams on chat rooms, apps or dating sites. By taking advantage of the vulnerability of the victims, the hackers recover personal data which they will then use for criminal purposes.
Emotet Malware. This Trojan allows data to be stolen by taking advantage of an insecure password.

Law and cybersecurity, consult a lawyer specializing in computer law in Paris

Cybersecurity law concerns all the risks and all voluntary threats that are of human origin and that can harm the assets of the company. Faced with a phenomenon on an increasingly large scale, a company may regularly have to call on a lawyer to protect itself from cyberattacks and to defend its interests in a case in which it could have been a victim or implicated.

French and European law establishes a clear and precise legal framework which requires the implementation of strict security measures. Any company is required to meet its obligations at the risk of exposing itself to heavy penalties. Indeed, in the event that a cyberattack would have been made possible by the fact that the company did not respect its obligations in terms of security and confidentiality, the company would then expose itself to heavy financial penalties that could be imposed by the CNIL (National Commission for Computing and Liberties).

In order to comply with these personal data protection regulations, companies can be accompanied by a cybersecurity lawyer. The specialized lawyer can thus accompany his client in the drafting of a contractual document and in the formalities essential to compliance with legal obligations. The lawyer specializing in cybersecurity provides advice on the protection and security solutions to be put in place. He can ensure the defense of the rights of his client in the event of a dispute.

Cybersecurity: why is it essential?

Putting in place measures that effectively combat the cyber threat is increasingly complicated today. Indeed, digital evolution is constant and hackers are well informed of these transformations and know how to be always more innovative.

Businesses need to be able to be aware of cybersecurity risk. By providing specific monitoring to identify the cyber threats they may face, managers can thus anticipate and react in the best possible way to cyber threats.

For a business, being the victim of a cyberattack can lead to loss of sensitive data, significant financial loss due to theft and to recover stolen data, damage to reputation and in some cases can even lead to the closure of a business. .

A company must therefore ensure that it guarantees the security of online purchases in order to comply with the legislation and in order to build trust with its customers.

What are the fundamentals of cybersecurity?

Cybersecurity has five main objectives: integrity, availability, confidentiality, non-repudiation and authentication. No computer system is infallible despite the implementation of various preventive measures. Thus, to detect a cyber threat, it is necessary to ensure careful monitoring of its own computer protection. In order to prevent IT risk, it is necessary to ensure that:
Properly analyze the risks,
Define a security policy,
Implement a prevention solution,
Frequently evaluate protection solutions,
Constantly update the protection system according to the evolution of
risks.

Cybersecurity regulations: what rules for companies?

Companies are required to comply with a few computer protection and security rules set by French law. Otherwise, their liability may be incurred and the company may be exposed to significant penalties.

Every company is required to protect its data as much as possible. It has the right to be able to use all the solutions useful for its protection against cyberattacks. As an employer, it is also about being able to protect employees with regard to their personal information. A company may need to internalize cybersecurity skills by creating an Information Systems Department (DSI). By entrusting audits to an outside expert, the company can also ensure control and analysis of the processes put in place to obtain optimal and effective cybersecurity.

Data protection is one of the main objectives in implementing solutions to protect against cyberattacks. Thus, each company must make sure to put in place protective measures that guarantee the confidentiality and integrity of data. To guarantee effective protection, a company must therefore ensure that it applies:
Data and connection encryption methods,
Strong authentication measures to detect potential robots,
Data access measures in all circumstances, through secure backups,
With the protection assessment procedures in place, the company must be able to improve its protection at any time in order to comply with flaws and digital developments.

Every company must be able to comply with the rules concerning the GDPR (General Data Protection Regulation). The GDPR defines a personal data breach as "a security breach resulting in the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of personal data transmitted, stored or otherwise processed otherwise, or unauthorized access to such data. Therefore, a company must protect the data it has in its system. By increasing its level of security in order to comply with the various requirements of the GDPR, the company avoids any incident that could harm its values and cause it to lose the trust of its customers.

An increase of +400 % in cyberattacks over 2 years: how to explain it?

Since 2020, there has been an explosion of cyberattacks in France. Nearly half of French companies recognize a significant increase in attacks over the past two years. Indeed, in its last activity report, the GIP ACYMA (Groupement d'Intérêt
Public Action against Cybermalveillance), reveals a significant increase in requests for online assistance.

ANSSI (National Agency for the Security of Information Systems) recorded an increase of +37 % in intrusions on computer systems, i.e. just over 1,000 intrusions during the year 2021. 69% of cyberattacks concerned companies, 11% hospitals and 20 % local authorities.

If more than one in two companies were victims of cybercrime during the year 2021, we also note that less than one in two companies invests a financial part of their budget in their cybersecurity. Indeed, few companies reserve part of their budget for the acquisition of network security tools and solutions. Employees are not always sufficiently well aware of the computer danger and potential cyberattacks. It is estimated that approximately 85% of private data breaches are caused by human error which primarily involves opening a fraudulent email.

Following the health crisis of the Covid-19 pandemic, many companies are making a link between the increase in cyberattacks they are facing and the increase in telework by their employees. While in the workplace, certain security solutions put in place by the company made it possible to limit the risk of cyberthreats, in the context of teleworking, companies could not always ensure the security of their data.

Lawyer specializing in IT law

What is NIS Directive 2?

It is a directive which aims to strengthen and standardize the European anti-cyber attack system, and which is intended to replace the NIS 2016 / 1148 directive – State of the adoption procedure here

NFT art, qualification test and copyright protection

   Difficulties with NFTs, NFT acquisition, NFT sale, NFT creation:

Be accompanied by your NFT Art lawyer! 

The web 3.0 dream

 


Metavers, crypto-currency, non-fungible tokens (NFT) or even Altcoin, blockchain, these are new words that have become very popular for several months, associated by the media with pharaonic transactions and prodigious virtues. 

The firm assists you with your NFT, cryptos, blockchains issues 

Museums celebrate the NFT. The metaverse is unleashed. The literature on the subject is abundant.

While the NFT representing the first SMS in history in 1992 was sold for 107,000 euros, and the first tweet by Jack Dorsey, co-founder of Twitter, was sold for 2.9 million dollars in NFT, this new windfall shows that the phenomenon is not anecdotal and is ahead of all its competitors.

Counterpoint: the entrepreneur Sina Estavi: Surfing on the wave of NFTs, he bought the first tweet in history posted by Jack Dorsey in 2006 last March, for the sum of 2.9 million dollars. Half April, he tried to resell it, except that almost no one wants it: the latter only collected about twenty offers, the highest being 3.3 ethers, or about 10,073 dollars.

Sales of NFT have been exploding for a few years, many platforms are dedicated to it. In 2021, the NFT market has also jumped and reached a transaction amount of 2.5 billion dollars. 

What is NFT really? How does French law apply to NFTs? What is the relationship between NFTs and copyright? How is the purchase, creation and exchange of NFTs carried out?

To understand what an NFT-art is and why its end is near, it is necessary to define the context in which it takes place: the register, the encoding, the blockchain, the work of art and the right to author.

 

 

What is a ledger, what is blockchain?

 

A register, in the legal world, is a ledger (or file) that identifies and lists people, property, rights, and events, as well as the operations relating thereto: transfers, rentals, licenses, shares , union etc.

The register can be consulted and verified by all or by some, and each register has its operating methods. It is debited in “files”, like any file or database for data processing.

The objective of a public register is to make it possible to record rights or situations, this can be, for example, civil status, the cadastre, the trademark register, the criminal record, and more generally any database or file which may contain data relating to a person or property, to transactions.

For example, a trademark right is the subject of a deposit with the trademark register, a file corresponds to it, and the contracts which concern the mark must in principle be recorded in the register, on the file which concerns the mark. Thus the register keeps track of successive holders.

The "certificates" or "titles" or "extracts" are documents which certify the content of the register file on such date: thus extracts from the civil status, the kBis, the trademark registration certificate, which can give rise to the establishment of more sophisticated documents, for example an identity card, a passport.

These documents basically remain extracts from the register, and certified by the authority that maintains the register. This authority guarantees the reliability and security of the register, its integrity, and certifies the rights of such and such a person as recorded in the register.

The register therefore allows a data subject to certify their rights, identity, etc.

In the same way, the "blockchain" is a public computer register that records goods and the operations that concern them (sale, rental, etc.).

 

In the blockchain, the security of the ledger is ensured by a chaining mechanism

In the Blockchain, the certifying authority disappears and is replaced by a chaining mechanism, much like a mechanism for securing the pages of a book or notebook to ensure their inviolability: one cannot change a link in the chain without breaking the chain, or a page in the book without tearing the book.

If the chain is broken, the whole register is to be put in the trash, but as long as this is not the case, each link in the chain remains authenticated by the whole chain.

In the blockchain, each link is a “block” hence the expression “chain of blocks” or “blockchain”.

 

 

What is a token?

 

A digital identifier is recorded in a block of the blockchain, it consists of a unique encoded number (a “hash”) which is incremented (“minting”, “tokenization”) in the chain. It is called “jeton” or “token” in English.

This identifier can be compared to the number of a file which would be inserted in a large paper file (the register containing all the files). It is the form that allows the production of an “excerpt from the register” mentioned above.

Except that here the form is a “file” in the computing sense of the term, that is to say a unit containing data and executable by the same application.

The token encrypts the file and its url address.

The file describes a right or right to something and the conditions under which this right can be manipulated (sale, rental, partial transfer…).

The “right” means an option, a value, a right to something (ownership, rental, usufruct, etc.), a claim, a debt, etc.

The token identifies the file and therefore represents a right.

According to article L551-2 of the monetary and financial code,

“For the purposes of this chapter, a token constitutes any intangible asset representing, in digital form, one or more rights that can be issued, registered, stored or transferred by means of a shared electronic recording device making it possible to identify, directly or indirectly, the owner of said property.”

The token has value only as long as it represents rights registered in the file.  

There is a debate: does holding the token confer rights? 

Sometimes yes and sometimes no, depending on the legal conditions which are recorded in the file and which describe the right, the holders of the right, the operations carried out on the right, the changes of holder, the operations that can be carried out on the right and the legal conditions in which these operations can be performed. 

These legal conditions may be included in a “smart contract”. This smart contract will include an execution program allowing the computerized, online execution of the operation envisaged, a sale for example.

To assign a token to his digital work, the artist must open an account on a dedicated platform with a public key (username) and a private key (password), and deposit his file there.

The platform saves the file on a unique url address, like any “drive”, and it is this address and this file which will be encrypted under a unique identifier deposited in the blockchain. The token is this unique identifier or “hash”.

The file cannot be modified but additional information and additions may be associated with it.

The successive operations that may occur on this “address+file” set will be identified by the platform as additions, each addition being the subject of its own hash.

The token is not strictly speaking transferred. The token is a hash.

It is the right of access to the file and the related additions, therefore to a set of hashes (or tokens), which is assigned. 

Each change of holder of the right of access is recorded in an addition. This change is assimilated, by abuse of language, to a token transfer, whereas it is only a transfer of access to a set formed by a file and its additions.

This change of holder will be equivalent to a transfer of the token and its underlying assets under the terms of the legal conditions described in the file and its additions.

If, again, the legal conditions attached to the file provide that the transfer of access to the file according to such or such modality entails the transfer of the right described in the file, then there will be transfer of this right.

This right may relate to a digital asset, such as the aforementioned file, itself containing a digital pictorial work of art, much like a master painting supports the pictorial work. 

The digital work of art can thus be transferred with the token. 

But it is only ever a copy of the work, the original or a legal or illegal copy. 

Indeed, this copy may be illegal, that is to say, it may have been made without the right to do so.

 

 

 

What rights does an author enjoy over the work of art he creates? 

The author of the work of art holds copyright on the work which allows him to prohibit its exploitation without his authorization. 

The purpose of these copyrights is to allow the author to derive income from his work: anyone who finds the work interesting, in particular an entrepreneur (producer, house, publisher, museum, etc.), and wants to take the risk of exploiting it, will be able to assert it, produce it, reproduce it, adapt it, represent it, mount it, etc., depending on the type of work of art in question, and derive income from it, in particular by paying back to the author an income in principle proportional to his own income.

In a way, copyright remunerates the success generated by the originality and appeal of the work. It should be distinguished from any remuneration paid for the work provided by the author and the other actors in the artistic chain to update the work, within the framework of an order or an employment contract.

 

 The example of Mona Lisa

The Louvre Museum probably holds the original Mona Lisa painting by Leonardo da Vinci. 

This painting, as a physical support, authenticates and incorporates the work, but is not the pictorial work itself, which can be reproduced ad infinitum, it is only its support.

Its possession allows the Louvre Museum to demonstrate, if anyone doubts it, that it is the sole holder of the original of the work, and that any copy that appears on the market would necessarily be a fake. 

If the Louvre Museum holds the right to exhibit the Mona Lisa, it is because it holds certain exploitation rights transferred – by contract, as induced by the transfer of the support – by the legitimate holder of the copyright, originally the author himself Leonardo da Vinci.

It is this contract that allows the Louvre Museum to exhibit the work and derive income from it, and not just the physical possession of the canvas that incorporates the pictorial work. 

This detention allows the work to be physically exhibited, but does not confer any copyright in itself. 

This explains why the thief who holds the painting has the physical possibility of doing anything with it, including selling it on a parallel market, but does not however enjoy the legitimate rights of the author, among which the right of exposure, which allow the author to legally reserve the income induced by the success of the work.

In this sense, Article L. 111-3 of the Intellectual Property Code and case law specify that “the incorporeal property of the work is independent of the property of the material medium. »

Consequently, the purchaser becomes the owner of the material support of a work and can benefit from it within the framework of a private use, but does not enjoy, except explicit contract, the rights of exploitation on the work, which make it possible to reproduce the work and exhibit it to earn income from its success.

Copying a digital artwork to a computer file, such as the Mona Lisa photograph, is easy, and may reproduce the original perfectly, and may circulate and sell as well as the original.

As could be a physical copy of the canvas representing the Mona Lisa, except that a perfect copy of the Mona Lisa canvas would be more difficult to manufacture and would be denounced as fake.

The legitimate owner of the original may be offended by this but may find it very difficult to assert exclusivity, that is to say to assert his right of exploitation relating to his status as the original author of the work (or its status as the legitimate owner of the copyright).

 

 The right to graphic and plastic works

For graphic and plastic works (sculptures), which are intimately linked to their support, it is difficult for the author to assert his rights. 

Successive sales of the same medium are legal. They do not make it possible to exploit the work but to enjoy it for private use in the sense that only resale allows a price to be drawn from it.

The artist often derives his income from the first sale of one or a few copies of his work. 

However, this first sale does not reveal much of the work's future success. Hence the institution of the resale right which allows the author to receive a percentage each time the medium is resold.

 

 

 

 

 

 

 

 

 

 

The NFT, “Non Fungible Token”, in the art world, is a token that designates a digital creation incorporating a work of art

 

The NFT (in English “non-fungible token”) is a so-called “non-fungible” token, that is to say unique and specific to any file.

Its transfer can translate, as we have seen above, according to the legal conditions attached to it, the transfer of a work.

For example, a digital creation, such as a word file containing text, will be deposited on a platform and encrypted with its unique url address under a unique identifier realizing an anchor in the blockchain. 

The identifier will make it possible to date the digital creation, and to identify the depositor.

 

The transfer of the NFT may involve an illicit resale of the work 

The NFT is a good, a "non-fungible" token, i.e. it is unique and cannot be exchanged for another non-fungible good, unlike a unit of currency which is exchanged for a unit of currency of the same value, 1 euro is exchanged for 1 euro.

It is exchanged for Ethers (Ethereum cryptocurrency similar to bitcoin or XRP), according to the price attributed to it by the market.

Transactions on these non-fungible tokens are done through a “wallet” type browser extension, for example Metamask. 

Metamask is a digital wallet. It allows you to buy NFTs with Ether (Ethereum), for example on the SuperRare platform.

NFT art is a real opportunity for artists. This is a new source of income for some artists.

Indeed, the exhibition of digital works of art seems much more accessible than the exhibition of a physical work in an art gallery, since the exhibition on a simple website is a priori much easier.

Except…some web platforms will inspire more trust than others.

A website, like a renowned gallery, will inspire confidence when it is able to present a process of selection and verification of the authenticity and ownership of works.

However, the value of NFT art depends on the prices of crypto-currencies and more particularly Ethereum. If the value of the cryptocurrency decreases, the price of the NFT also decreases on its side.

Unique tokens are increasingly used in the sale of works of art, video games, but also as compensation for certain professional players.

 

The NFT identifies a digital creation which itself can reproduce all kinds of objects that can be put on a medium or a computer file, for example: 

  • pictorial works
  • gifs
  • tweets

 

The misunderstanding is that anyone can, without right, make a copy of the artwork in a computer file, assign it an NFT of their own, and then sell the NFT presenting it as the lawful sale of a work of art.

 

In December 2021, legal action was taken by luxury group Hermès against Mason Rothschild for creating NFTs depicting fur bags inspired by the brand.

Mason Rotschild indeed created an NFT attached to the work “Baby Birkin” which he sold for several thousand euros. 

Even though the purchase of an NFT may allow the purchaser to claim ownership of a digital file incorporating a digital work of art, this does not in itself imply that such purchaser has the right to derive income from it. this work.  

Thus, when I photograph the Mona Lisa painting, I am the owner of the photographic shot that I took and no one has the right to copy this shot, especially if it gives, for example, a new dimension to the Mona Lisa , brings something original in the perception that one can have of the Mona Lisa work.

But I do not have, however, in principle, the right to exhibit or use a faithful reproduction of Mona Lisa without restriction, as the Louvre does, without special authorization. Copying of the medium incorporating the work is prohibited.

The notoriety of the Louvre protects the rights of the Louvre on the Mona Lisa, and it is hard to imagine someone charging a visit to contemplate a perfect reproduction of the work of Leonardo da Vinci.

But not all works have the reputation of the Mona Lisa, nor do they benefit from the reputation of the Louvre…

 

 

The rights of the author on the digital work are to be distinguished from the rights on the NFT

 

Article L. 122-4 of the Intellectual Property Code specifies that 

 

“Any representation or reproduction in whole or in part made without the consent of the author or his successors in title or assigns is unlawful. The same applies to translation, adaptation or transformation, arrangement or reproduction by any art or process whatsoever”. 

 

The NFT is associated with a work, but it is not in itself the work, it identifies an example, or a copy. 

 

When it is assigned, it is usually associated with an assignment contract, which allows the sale of the copy that it identifies.

 

The creation of an NFT can therefore sometimes give rise to counterfeiting and copyright infringement.

 

We must take the example of the Mona Lisa: Do I have the right to make a copy of the Mona Lisa and sell it? No, if I do not have the agreement of the author or the legitimate holder of the rights. 

 

Nor do I have the right to claim to be the author of it. I do not have the right, and if I do so I incur the legal action of the author or the holder of the rights.

 

The acquisition of an NFT allows the acquisition of the underlying file, which may relate to a simple prohibited copy of the work.

 

Therefore, the purchaser of the NFT does not acquire exploitation rights of the original work but only a file that can incorporate a simple prohibited copy.

 

Like the purchaser of a snapshot of the Mona Lisa, who would exhibit without restriction the work reproduced by his snapshot.

 

Moreover, a creator who has not taken care to deposit his work or to create an NFT of it, to take a date, may have difficulty in demonstrating that he is the original author.

 

The NFT is still comparable to a domain name: I am the only one to own a public website with such a domain name but anyone else can reserve another domain name pointing to a website copying mine.

 

The creation of an NFT results in the uploading of a file to a platform and the dissemination of the NFT with the aim of selling it. 

 

If the NFT itself does not constitute a work, the file attached to the NFT may carry a work protected by copyright.

 

Therefore the creator of an NFT must ensure when downloading the file that it does not require the author's agreement. 

 

Failure to do so could result in the creator of the NFT being sued for copyright infringement and infringement.

 

 

On copyright contracts: 

https://roquefeuil.avocat.fr/cession-des-droits-dauteur-avocat-propriete-intellectuelle-paris/

 

Buyer's rights 

 

The buyer of an NFT in principle acquires the underlying asset, but which may be a prohibited copy of the original work. 

 

In this sense, he does not acquire the intellectual property rights on the work, but on a copy of a work of which he has no guarantee that it is an original and lawful copy.

 

He therefore incurs the prosecution of the legitimate holder of the rights to the work.

 

 

NFTs and copyright 

 

Legally, the NFT is a non-fungible token that represents a digital asset and is unique to that asset. Another cannot create an identical NFT. 

 

In this sense, the NFT makes it possible to certify the authenticity of an asset, but which may itself be an illicit copy of a work of art.

 

Thus, the equating of an NFT with a work of art is inaccurate. 

 

Indeed, article L. 112-2 of the Intellectual Property Code lists the various intellectual works of which the NFT is not a part. 

 

Also, the NFT cannot be assimilated to a work of the mind since its creation comes from a mathematical calculation, a tokenization process that does not require any originality.

 

The development of NFTs and Metavers raises many questions about their counterfeit nature. 

 

In the absence of protection, trademark holders protect themselves by filing 3D models and logos that can feature their products as trademarks.

 

Even if they fail to secure their trademark rights for virtual goods and services, they have already taken other steps. 

 

Indeed, recently, the Converse brand has filed numerous applications to obtain protection for its trademark. She indeed wishes to be protected from her original drawings representing her different models. 

 

For its part, the Nike brand has also filed requests to protect its emblematic NIKE models, JUST DO IT and the AIR JORDAN logo.

NFT: creation, purchase and exchanges. How's it going ? 

 

First of all, buying or trading NFTs cannot be done until the Metamask browser extension has been installed. 

 

Once the extension is installed, there are different platforms where you can get unique tokens. Payment can be made either by credit card or by ApplePay or any other means of payment.

 

Many platforms allow the purchase of NFT: eToro, OpenSea, Crypto.com, Foundation, AtomicMarket, Enjin Marketplace, Rarible, SuperRare, BakerySwap, Myth Market, Known Origin or even Coinbase.

 

The NFT can be created by anyone, as long as they have the necessary tools. It is indeed necessary to know perfectly the workings of Blockchain technology and to know how to choose the right platform.

 

Creating an NFT only takes a few minutes and requires first creating its non-fungible token.

 

In the event of copyright infringement and counterfeiting, numerous legal remedies exist, civil, criminal and administrative, against intermediaries or counterfeiters, and it is advisable to turn to a lawyer specialized in digital and intellectual property.

 

Thus, for example, Article L336-2 of the Intellectual Property Code provides: 

 

“Article L336-2

Version in force since January 01, 2020

Amended by Ordinance No. 2019-738 of July 17, 2019 – art. 10

 

“In the presence of an infringement of copyright or a related right caused by the content of an online public communication service, the president of the court ruling according to the expedited procedure on the merits may order, at the request holders of rights to works and protected objects, their beneficiaries, collective management organizations governed by Title II of Book III or professional defense organizations referred to in Article L. 331-1, all measures specific to prevent or put an end to such an infringement of a copyright or a related right, against any person likely to contribute to remedying it. The request can also be made by the National Center for Cinema and the Moving Image.

 

Online platforms and operators, search engines, may be reluctant to remove or maintain an infringing work on their services without adequate argument and evidence.

NFT and the resale right 

 

It is interesting to note that the author of a work enjoys a resale right on successive resales of his work, provided for by article L122-8 of the intellectual property code:

 

Article L122-8 – Version in force since December 24, 2016

Amended by Ordinance No. 2016-1823 of December 22, 2016 – art. 2

 

“Authors of original graphic and plastic works who are nationals of a Member State of the European Community or of a State party to the Agreement on the European Economic Area benefit from a resale right, which is an inalienable right of participation in the proceeds of any sale of a work after the first transfer made by the author or his successors in title, when a professional in the art market intervenes as seller, buyer or intermediary. By way of derogation, this right does not apply when the seller has acquired the work directly from the author less than three years before this sale and the sale price does not exceed 10,000 euros.

By original works, within the meaning of this article, we mean works created by the artist himself and copies executed in limited quantities by the artist himself or under his responsibility.

The resale right is the responsibility of the seller. Responsibility for its payment rests with the professional involved in the sale and, if the sale takes place between two professionals, with the seller.

The art market professionals referred to in the first paragraph must provide the author or a resale right collective management organization with all the information necessary for the settlement of the sums due under the resale right for a period of three years. from the sale.

Authors who are not nationals of a Member State of the European Community or of a State party to the Agreement on the European Economic Area and their successors in title are entitled to the benefit of the protection provided for in this article if the legislation of the State of which they are nationals admits the protection of resale rights for authors of Member States and their successors in title.

A Conseil d'Etat decree specifies the conditions of application of this article and in particular the amount and the methods of calculation of the duty to be collected, as well as the sale price above which sales are subject to this duty. It also specifies the conditions under which authors who are not nationals of a Member State of the European Community or of a State party to the agreement on the European Economic Area who have their habitual residence in France and have participated in the life of art in France for at least five years may request to benefit from the protection provided for in this article.

 

Under what conditions can a platform be qualified as an “art professional” and more generally allow its users to benefit from the resale right? The answer is not fixed.

 

The smart contract will be able to organize the resale right and collect it.

 

NFT platforms dedicated to art

Crypto trading or auction platforms invest in NFT exchange functionalities (eBay > KnownOrigin)(Binance) but some platforms are dedicated exclusively to NFTs:

Superrare (graphic works)

Ledger market (graphic works)

Opensea (graphic works, music, trading cards, metaverses, domain names)

Magic Eden (digital gadgets)

Lawyer specializing in IT law in Paris: get support for your IT contracts

  

Update February 8, 2023: OVH cloud condemned at first instance by the Commercial Court of Lille judgment of January 26, 2023

– Contractual liability, Unwritten clause, Force majeure, Gross negligence, Obligation of means, Significant imbalance, Membership contract, articles 1170 and 1171, 1147 of the civil code, “the backup data had also been destroyed and lost at cause of the fire because the latter were stored at the same place as the main server" – In this case, the court dismisses the exemption and limitation of liability of the cloud service provider, holding that otherwise it would create a significant imbalance and would negate the provider's essential obligation:

"In this case, making backup copies and keep them safe, in particular in case of sinister Or of fire, is an essential obligation from CONTRACT. Clause 7.7 of the OVH contract therefore deprives of its substance the essential obligation of SAS OVH and must therefore be deemed not written. »

[…]

" In this case, the limitation of liability clause established by SAS OVH grants an unjustified advantage to the latter in the absence of consideration for the customer. This clause creates a real asymmetry between them obligations of each Parties. Ultimately, this clause transfers the risk to the other party in an unjustified way and without consideration for this last. »

Be accompanied by a lawyer specializing in computer law as part of your IT contracts. Disputes relating to computer law can be numerous. These may include counterfeit hardware issues, data loss issues, contract termination, etc. A lawyer specializing in computer law can help you.

Computing continues to grow in our society over the years. At the heart of the digital transformation, it is appropriate for professionals, and in particular for companies, to ensure their protection to prevent possible IT disputes.

In order to protect itself, a company can set up IT contracts as part of the management of its IT equipment. Several types of services can be defined in an IT contract. This can be installation, development, maintenance or support services on a computer system.

Are you faced with a dispute over computer law? Would you like to find out about the IT contracts that you can put in place to protect yourself? Stone of Roquefeuil, lawyer specializing in computer law at Paris accompanies you to advise you and defend your interests.

 

IT contract and the lawyer specializing in computer law, in Paris

 

A computer contract can be established in the context of a sale, rental or provision of services, concerning a computer system or an integrated element. It can be hardware (computers, IT equipment, peripherals, etc.) or software (software developed by a service provider or standard software).

 

IT contracts must be drawn up with care to prevent any technical changes or changes in use. The development of IT contracts is therefore technical and complex, the contract must be drafted with vigilance.

 

The IT contract must mention several essential information in particular in connection with the problems of intellectual property or even protection of personal data. In addition, several characteristics must be defined in the contract. Indeed, must appear: the implementation schedule or the scope concerned by the contract.

 

A lawyer specializing in computer law can help you draft your contract in due form.

 

 

What are the different IT contracts? A lawyer specializing in computer law answers you:

 

          The maintenance contract and the IT lawyer

 

Otherwise called SLA (Service Level Agreement), the maintenance contract allows the customer to determine his expectations relating to the maintenance of his computer equipment that the computer service provider must have towards him.

 

Thus, the maintenance contract has the effect of defining the rights and duties of both parties: the customer and the service provider. This must mention the scope of the equipment, the services covered by the contract, the duration of the contract, the quality of the service provided, etc.

 

When drawing up the contract, a distinction should nevertheless be made between corrective maintenance and preventive maintenance:

  • Corrective maintenance aims to repair operating errors,
  • Preventive maintenance concerns the periodic checks that must be carried out to detect any malfunctions, damage or obsolescence of the equipment.

 

 

 

                The system integration contract

 

System integration is defined by the assembly of the various IT components of a company, whether they are hardware: computer, server, network equipment, telephones, etc. ; or intangible: software, applications, etc.

 

The system integration contract must cover different aspects:

  • Material aspects: supply and installation
  • Software aspects: as well as their interfacing
  • The wiring
  • Training
  • Start-up assistance
  • Maintenance
  • The deployment

 

A service provider has an obligation to advise and warn its client under a systems integration contract.

 

 

                   The Software License Agreement and computer law attorney

 

A license agreement relates only to the software. This may be a sales or rental license agreement. This precisely defines the rights given by the author of the software to the other party. It details the rights of use, the rights of reproduction, the rights of modification or the rights of adaptation of the software in question.

 

Just like the aforementioned contracts, the software license contract must mention the identification of the two parties, its object, the date of entry into force and the date of end, the general and specific provisions.

 

                 IT hosting contract

 

The computer hosting contract is one of the most widespread. This consists of delimiting an IT service that allows the hosting of numerous resources on a server. Also, it mentions the conditions of management or evolution of the client over time.

 

To this end, the IT hosting contract is therefore a commitment to storage capacity and a guarantee of data availability. The contract must contain a reversibility clause allowing customers to recover all of their data.

 

Finally, the host must in this contract, commit to the confidentiality of the information that will be hosted. It must also specify the procedures applied in the context of resource security. This applies in particular to hacking or any malicious act of computer threat.

 

 

           The contract for the sale or rental of computer equipment

 

The contract for the sale or rental of computer equipment allows a company to rent computer equipment. It can be made for computers or computer systems. It can also be the rental of software or software packages.

 

The contract for the sale or rental of computer equipment may be of short duration. For example, for the replacement of a device that has just broken down. It can be entered into to meet an urgent or even unforeseen need such as an increase in activity.

 

The IT equipment rental contract is generally concluded for a period of 3 years. It must include an upgrade clause that allows the customer to renew the hardware after 15 to 30 months. This in order to benefit from new features without a price increase.

 

The service provider must for its part carry out the repairs and maintenance of the equipment it rents. Also, it has a warranty obligation. As a result, it guarantees the proper functioning of the equipment. He must therefore intervene in the event of malfunction of the rented device following a hidden defect or a breakdown.

 

Finally, for his part, the customer undertakes to use the property in a reasonable manner and to return it to the service provider at the end of the rental contract.

 

       The outsourcing contract or outsourcing contract and the IT law lawyer in Paris

 

It aims to entrust a function or service to a specialized external service provider. The service provider must therefore ensure that the service is provided in accordance with the service levels. The performance and responsibilities specified in the specifications must be respected.

 

Using an external service provider allows the requesting company to focus on its main mission.

 

 

Obligations of the parties in an IT contract. Hire a lawyer in Paris specializing in computer law

 

As in any contract, the parties agree to each other to respect certain obligations. What are they ?

 

                  The service provider's obligations

 

The service provider must respect a certain number of obligations in return for his remuneration:

  • He undertakes to provide all the information on the various issues of the contract to the client,
  • He must advise his client on the choices he will have to make within the framework of the project. The service provider's expertise will allow the customer to benefit from all the useful information. This will then allow him to choose the best solutions for his project,
  • The service provider is required to keep his client informed if a danger or risk occurs during the service.

 

                 Customer's obligations

 

Then, the customer, for his part, is also required to respect certain obligations within the framework of an IT contract:

  • The customer agrees to pay the service provider the price agreed upon prior to the contract,
  • It must be able to enable the service provider to perform its service properly,

 

 

  Duration of the IT contract: is it possible to terminate it before its term? How to handle breach of contract?

 

In the event that the contract determines a duration, the contract then ends once the service has been completed. Nevertheless, it remains possible to interrupt the contract before the end date, provided that both parties agree. The decision to end it must be recorded in writing. In addition, the contract can also be renewed if both the service provider and the customer agree.

 

If the contract does not provide for an end date, it is possible for the service provider and for the customer to terminate it at any time. The decision must be made in writing. It will however be necessary to respect a notice defined by the users or by certain professional agreements. Both parties, one like the other, may demand compensation for damages suffered in the event of a sudden, violent or unpredictable breach of a computer contract.

 

Specifications, obligation to advise, agile method, acceptance report, evolutionary and corrective maintenance, sequestration of the source code, IT expertise, termination for exclusive wrongs, so many concepts to master to consider the implementation of a new software, a new ERP, a new system, or consider a breach of contract.

 

You wish to be accompanied by a lawyer specializing in computer law in order to obtain advice on drawing up an IT contract? Do you encounter disputes related to computer law?

Stone of Roquefeuil, lawyer specializing in computer law at Paris, accompanies you to advise you and to ensure that your interests are respected.

See as well :

The agile method: https://roquefeuil.avocat.fr/contrat-informatique-et-methode-agile/

Ord. no. 2021-1658, 15 Dec. 2021, relating to the devolution of intellectual property rights on assets obtained by authors of software or non-salaried inventors or public officials hosted by a legal person carrying out research: JO 16 dec. 2021

 

The problem of access to source code

The company may have difficulties with the publisher of its software, which asks exorbitant sums to carry out the maintenance, and may want to keep the software by having it maintained by a third-party service provider.

To be able to modify the software, to maintain it, it is necessary to be able to modify the source code therefore to have this code, that is to say the version written in a programming language, understandable by man, unlike the object code binary, executable and understandable only by the machine.

However, the publisher of software generally delivers only the executable version, the one that is understandable by the computer. Publishers are often very reluctant to hand over this source code because they fear that their know-how and their investment will be stolen.

It will be a question of setting up an escrow contract to find a balance between the rights of the user and those of the software publisher. But such a contract does not always exist. And existing contracts can be laconic or unsatisfactory when it comes to the “maintenance” component.

The reference articles are the articles L. 122-6 and L. 122-6-1 of the Intellectual Property Code.

Article L122-6

Version in force since May 11, 1994, Amended by Law No. 94-361 of May 10, 1994 – art. 4 () JORF May 11, 1994

Subject to the provisions of Article L. 122-6-1, the right of exploitation belonging to the author of software includes the right to perform and authorize:

1° The permanent or temporary reproduction of software in whole or in part by any means and in any form. To the extent that the loading, display, execution, transmission or storage of this software requires reproduction, such acts are possible only with the permission of the author;

2° The translation, adaptation, arrangement or any other modification of software and the reproduction of the resulting software;

3° The placing on the market for consideration or free of charge, including rental, of the copy or copies of software by any process. However, the first sale of a copy of software in the territory of a Member State of the European Community or of a State party to the Agreement on the European Economic Area by the author or with his consent exhausts the right to put this copy on the market in all Member States, with the exception of the right to authorize the subsequent rental of a copy.

Article L122-6-1

Version in force since November 26, 2021, Amended by Ordinance No. 2021-1518 of November 24, 2021 – art. 2

I. The acts provided for in 1° and 2° of Article L. 122-6 are not subject to the authorization of the author when they are necessary to allow the use of the software, in accordance with its intended purpose, by the person having the right to use it, including to correct errors.

However, the author is entitled to reserve by contract the right to correct errors and to determine the specific terms and conditions to which the acts provided for in 1° and 2° of Article L. 122-6 will be subject, necessary to allow the use of the software, in accordance with its intended purpose, by the person having the right to use it.

II. The person having the right to use the software can make a backup copy when this is necessary to preserve the use of the software.

III. The person having the right to use the software can without the authorization of the author observe, study or test the operation or the safety of this software in order to determine the ideas and principles which are at the base of any element of the software when it performs any operation of loading, displaying, executing, transmitting or storing the software that it is entitled to perform.

IV. The reproduction of the software code or the translation of the form of this code is not subject to the authorization of the author when the reproduction or the translation within the meaning of 1° or 2° of article L. 122 -6 is essential to obtain the information necessary for the interoperability of software created independently with other software, provided that the following conditions are met:

1° These acts are carried out by the person having the right to use a copy of the software or on his behalf by a person authorized for this purpose;

2° The information necessary for interoperability has not already been made easily and quickly accessible to the persons mentioned in 1° above;

3° And these acts are limited to the parts of the original software necessary for this interoperability.

The information thus obtained cannot be:

1° Nor used for purposes other than achieving the interoperability of independently created software;

2° Neither communicated to third parties unless this is necessary for the interoperability of software created independently;

3° Nor used for the development, production or marketing of software whose expression is substantially similar or for any other act infringing copyright.

V.-The acts mentioned in 1° of Article L. 122-6 are not subject to the authorization of the author when they are carried out for the purposes and under the conditions mentioned in 8° of Article L. 122-5.

VI.-The acts mentioned in 1° and 2° of Article L. 122-6 are not subject to the authorization of the author when they are carried out for the purposes and under the conditions mentioned in III of the article L.122-5-3.

VII.-The acts mentioned in article L. 122-6 are not subject to the authorization of the author when they are carried out for the purposes and under the conditions mentioned in 12° and 13° of article L 122-5.

VIII. This article shall not be construed as permitting to interfere with the normal operation of the software or to cause unreasonable prejudice to the legitimate interests of the author.

Any stipulation contrary to the provisions set out in II, III and IV of this article is null and void.

The service provider may therefore be forced to hand over the source code, under penalty, by the judge, who will check whether or not the maintenance should be carried out by the publisher, according to the terms of the contract, and whether the handing over of the source code and its technical documentation is essential for carrying out maintenance.

The new order for payment procedure – the opinion of the commercial lawyer

IT contracts special page

Get cybersecurity support

en_GBEnglish