Protection of Computer Programs in Industrial Revolution 4.0 Era: From Indonesian Legislation Perspective

Satya Arinanto, I. Farida

Research output: Contribution to journalArticle

Abstract

The Industrial Revolution Era 4.0 encouraged the development of innovative computing systems that bring forth to innovations in information technology that were diverse and beneficial to the wider community. Computer programs developed as part of the software which one of the factors that influence the diversity of information technology. Today, computer programs have been recognized as valuable assets for companies and individuals who created or discovered them. Legal protection for inventions in all fields of technology including computer programs in several countries is carried out through patent registration as regulated in Article 27(1) of the Trade-Related Aspects of Intellectual Property Rights (TRIPs). Protection of inventions in the field of information technology by the Patent Law in Indonesia is currently limited only in the scope of hardware, while the protection of computer programs is regulated by Law No. 28 of 2014 concerning copyright. The regulation through copyright law is considered insufficient to protect inventions in the field of information technology. Some developed countries in the world, such as Japan and the United States regulate the protection of computer programs through patents. This research will use the normative juridical method using secondary data. Furthermore, this research will examine the protection of computer programs based on the laws in force in Indonesia. The results of the study are expected to be able to provide input and thought contributions in order to build a computer system protection system in Indonesia. 
Original languageEnglish
Pages (from-to)92-102
JournalUS-China Law Review
Publication statusPublished - 2020

Fingerprint

Dive into the research topics of 'Protection of Computer Programs in Industrial Revolution 4.0 Era: From Indonesian Legislation Perspective'. Together they form a unique fingerprint.

Cite this