Anti-software-patent petition makes White House's top 10
White House opens door to online petitions
Computerworld - WASHINGTON -- The White House this month began allowing people to create petitions on its website, and an early favorite asks the president to "direct the patent office to cease issuing software patents."
The petition has more than 12,000 signatures, which puts it among the top 10 petitions on the White House website.
The leading petition, at the moment, concerns legalizing marijuana, with more than 41,000 signatures.
The White House has set up a relatively simple process for people to create or sign a petition. It asks for a name and email address, and then verifies the email.
The White House is promising a response for any petition that meets a 5,000-signature threshold within 30 days. It has not yet responded to any petition.
The software patent petition argues that patents have become a way "to stifle innovation and prevent competition rather than to support innovation and competitive markets. They've become an antitrust tool employed by large companies against small ones."
The petition's author is not disclosed, but the argument that the petition raises is longstanding.
In 2009, for instance, Red Hat filed a brief in a case that looked at the software patent issue and argued that software patents "form a minefield that slows and discourages software innovation."
Red Hat went on to explain that "because software products may involve thousands of patentable components, developers face the risk of having to defend weak but costly patent infringement lawsuits. A new class of business enterprise -- patent trolls -- has developed to file lawsuits to exploit this system."
Software developers can copyright their software, preventing people from making copies of their work without authorization. A patent gives the holder the right to stop someone from making, using or selling whatever has been proclaimed in the patent, said Leigh Martinson, a patent attorney at McDermott Will & Emery in Boston.
While a copyright prevents someone from making a copy of something, it doesn't stop someone from applying a method that is a feature of a software system. The patents are applied to these methods. Patents provide companies with "a competitive advantage, and it keeps people employed," said Martinson. What's hard for the developer working out of his garage is knowing whether what they are working on has a patent, he said.
A new provision in a patent law, recently approved by Congress, gives a "micro entity" as much as a 75% discount on a patent application.
Whether the White House petition site has any influence on patents or on any other issue is questionable.
Anthony Figliola, vice president of Empire Government Strategies, a New York-based grassroots lobbying and government relations firm, said the White House's petition site could be corrupted if professional advocacy groups "just bombard" the site with petitions and signatures.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
Read more about Legal in Computerworld's Legal Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts