The Competitiveness of Nations in a Global Knowledge-Based Economy
An Introduction to the Law and Economics of Intellectual 
Property
Journal of Economic 
Perspectives, 5 (1
Winter, 1991, 
3-27.
Article 1, Section 8, of the U.S. Constitution grants to 
the Congress the power: “To promote the progress of science and useful arts, by 
securng for limited times to authors and inventors the exclusive right to their 
respective writing and discoveries.”  Under this general grant, the Congress 
has enacted a number of statutes, including the Copyright Act [17 U.S.C.A. Sec. 
101-810], the Patent Act [35 U.S.C.A. Sec. 1-376], and the Semiconductor Chip 
Protection Act of 1984 [17 U.S.C.A. Sec. 901-914].  In addition, the federal government has 
enacted the Trademark Act of 1946 (“Lanham Act”) as amended [15 U.S.C.A. Sec. 
1051-1127] and there is state law regulation of trade secrets and of 
misappropriation of other information.  These six legal regimes constitute 
For as long as laws have aimed at protecting 
intellectual property, disputes have raged over which works to protect, for how 
long, and to what extent.  The 
mainstream of the economics profession has generally argued that 
economic
* Stanley M. Besen is Senior Economist, The RAND 
Corporation, 
3
efficiency requires government support for innovative 
and creative activity (Arrow, 1962), but a dissenting tradition has argued that 
government action of any kind, including the awarding of copyrights and patents, 
is unnecessary to stimulate such activity (Plant, 1934a, 1934b; Breyer, 1970; 
Frase, 1966; Hughes, 1988).
Although economists have written on topics of 
intellectual property for a long time, the impact of economics on public policy 
in this area has been slight, especially as compared to the influence of 
professional writings in areas such as antitrust and taxation.  We believe that too few of the 
profession’s resources have been devoted to these issues and that, of those 
resources that have been employed, too few have been devoted to empirical 
analyses.  We hope that this 
introductory essay and the three papers that follow will stimulate interest in 
this subject.  This introductory 
essay first describes some of the basic economic tradeoffs involved in 
intellectual property law, and then describes the frame-work of the law in the 
six areas described above: patent, copyright, semiconductor protection, 
trademark, trade secret, and misappropriation.  It is intended both to provide thumbnail 
descriptions of the various intellectual property regimes to economists working 
in this area and to indicate where additional economic research might be 
useful.
The other papers in this symposium provide important 
examples of ongoing research on the economics of intellectual property.  Suzanne Scotchmer analyzes the complex 
effects of patent protection when innovation is cumulative.  Rather than analyzing situations in which 
several firms vie to develop the same innovation - the approach of the “patent 
race” literature - her analysis examines circumstances in which only one firm 
can develop an initial innovation but others can also build upon it.  She focuses on how the incentive to 
develop both the initial and subsequent inventions may be affected by the scope 
of patent protection.
Janusz Ordover considers ways of adjusting the patent 
system that may help to both provide returns to the inventor, and encourage the 
diffusion of the innovation in the economy.  His paper is part of a line of work that 
explores the place of the intellectual property system among the large number of 
institutions that affect the amount and nature of research and development that 
takes place.
In the final paper, David Friedman, William Landes, and 
Richard Posner examine the law of trade secrets using what might be called the 
“Chicago school’’ approach to intellectual property protection.  Taking the approach of previous work by 
Landes and Posner (1987, 1989) on trademark and copyright law, they argue that 
the availability of trade secret protection may efficiently fill some of the 
interstices left by the patent law and that the fact that trade secrets are 
protected against some types of discovery but not others may also be efficient [1].
1. We should note here that, while we find many insights 
of the Friedman-Landes-Posner extremely useful, we are less sanguine than they 
about the efficiency properties of intellectual property law.  Additional empirical analysis is needed 
to establish the validity of either view.
4
The Basic Economics of 
Intellectual Property
The objective of intellectual property protection is to 
create incentives that maximize the difference between the value of the 
intellectual property that is created and used and the social cost of its 
creation, including the cost of administering the system.  Several specific issues are subsumed 
under this general formulation.
First, private producers have an incentive to invest in 
innovation only if they receive an appropriate return.  Whether producers will have the correct 
incentives depends on their ability to appropriate at least some of the value 
that users place on those works.  If 
potential innovators are limited in their ability to capture this value, they 
may not have enough incentive to invest a socially optimal amount in innovative 
activity.
For example, producers may be unable to capture a 
sufficient portion of the value of their innovations if other producers can 
easily emulate or “clone” a new product (Arrow, 1962).  Similarly, if private copying by 
individual users is widespread, the revenues of creators of journals, computer 
software, and audio and videocassettes may be inadequate to support a socially 
optimal amount of creative activity (Besen and Kirby, 1989a).  The legal treatment of related 
innovations will also influence the ability of producers to capture sufficient 
revenues to justify undertaking research and development.  If the law permits others easily to 
“innovate around” an innovation, or to produce complements to it, the incentives 
to create the innovation may be reduced significantly. [2]
Price discrimination allows producers to appropriate a 
larger share of the social benefits of their innovations and, thus, may permit 
some innovations that would otherwise not occur.  Examples of discriminatory pricing 
include: charging different individual and library subscription rates for 
professional journals; establishing license fees for computer software that vary 
with the number of users; and setting prices for hardback and paperback versions 
of a book that do not reflect differences in their cost of production.  It should be noted, however, that the 
“first sale” and ‘‘exhaustion” doctrines prevent copyright and patent owners 
front imposing resale conditions and thereby limit their ability to practice 
price discrimination.
Second, there is the question of whether innovative 
activity takes place at minimum cost.  The cost of creating new ideas will often 
depend on the extent to which innovators may borrow from, or build upon, earlier 
works.  Copyright law, for example, 
limits borrowing by giving a creator the right not only to his or her own 
creation but also to ‘‘derivative works,” so that the costs to subsequent 
innovators may be increased.  In a 
winner-take-all system like that
2. Spence (1976) and Dixit and Stiglitz (1977) pointed 
out the possibility that an innovation that is only slightly more attractive to 
users may “cannibalize” the market for an earlier product.  In such cases, it can be profitable for 
a firm to incur the costs of developing the new product and bringing it to 
market, although total industry profits decline by more than consumer welfare is 
increased.  As a result, total 
welfare, but not the welfare of consumers, would be increased by making it more 
difficult to produce close substitutes for existing 
products.
5
governing patents, competition to get the patent (and 
thus control over future innovations based on that patent) may result in an 
excessive amount of resources being devoted to obtaining the prize.  In fact, the combined expenditures of 
two firms seeking the same patentable invention in a patent race may not only be 
larger than that of a single firm, but their combined expenditures may be 
greater than is socially optimal (Loury, 1979; Dasgupta and Stiglitz, 
1980).
Other provisions of intellectual property law can lower 
the costs of subsequent innovations.  Copyright registration and patent 
issuance require authors and innovators to disclose the details of their 
innovations, which provides information that may help later authors and 
innovators to reduce their own costs.  In addition, the copyright law denies 
protection to “any idea, procedure, process, system, method of operation, 
concept, principle, or discovery” and patent protection cannot be obtained for 
“laws of nature, natural phenomena, and abstract ideas,” no matter how great the 
expense necessary to bring firth these creations.  If the market for licensing innovations 
were frictionless, there would be no need to impose these restrictions since 
later innovators could efficiently obtain licenses to use the works of early 
ones.  However, the lack of complete 
information on which to base these transactions and the market power that might 
accrue to early inventors may explain the restrictions that have been imposed on 
protectible subject matter.  These 
types of imperfections are addressed by Scotchmer in this 
symposium.
A third issue, somewhat related to the second, is 
whether the intellectual property system strikes an appropriate balance between 
creating and disseminating intellectual property.  Providing incentives for the creation of 
many new works may encourage resources to be devoted to innovative activity. 
 However, if the new innovations are 
not widely used, the system may be less beneficial than one with less 
creativity, but where the materials created are more broadly disseminated.  This issue focuses on the appropriate 
scope of protection.  It arises, for 
example, in determining the optimal duration of patents (Nordhaus, 1969) and the 
optimal tradeoff between duration and breadth (Gilbert and Shapiro, 1990; 
Klemperer, 1990).  Another critical 
element in deciding how to strike the balance between encouraging creativity and 
dissemination is the extent to which creative activity responds to economic 
rewards.  The less that innovation 
depends on the resources invested and the potential economic rewards, the more 
limited is the case for granting substantial rights to 
creators.
A patent may be granted on any new and useful process, 
machine, manufacture, composition of matter, improvement and plant as well as to 
new, original and ornamental design for an article of manufacture (Chisum, 
1989).  The patent right is the most 
powerful in the intellectual property system,
6
enabling the patent holder (patentee) to exclude all 
others from making, selling, or using the subject matter of a valid patent for a 
term of 17 years (in the case of a design patent, 14 years).  The 17-year term of pharmaceutical and 
medical device patents may be extended for as long as five additional years. 
 During the term of the patent, any 
use of the patented subject matter requires permission of the patentee, 
customarily in return for the payment of a royalty.  The patentee can even prevent an 
independent subsequent discoverer of the same subject matter from making, using 
or selling it.  At the end of the 
term of protection, the subject matter enters the public 
domain.
The scope of protection offered by a patent is 
determined by its claims, which are technical descriptions of the process, 
machine, method, or matter contained in the original patent application.   
The patent statute requires that the claimed invention 
must be new, useful, and nonobvious to a person of ordinary skill in the art to 
which the invention pertains.  The 
practical effects of the novelty and nonobviousness requirements are that the 
inventor must convince the examiners in the Patent and Trademark Office that the 
claims in the application make a new contribution to knowledge and are more than 
a mere variation of something already known or foreseeable as an extension of 
existing knowledge.  Examiners have 
the power to determine that a claim is too broad, and to grant a patent only on 
a narrower claim, or to reject a claim entirely.
When Patents Are Disputed in 
Court
A patent holder who believes that a patent has been 
infringed may bring suit against those who make, use, or sell the offending 
product.  Courts may either choose 
to interpret the claims of the patent literally, or the “doctrine of 
equivalents” may be invoked and infringement will be found if there is a 
substantial, functional identity between the patent claims and the contested 
item.  In fact, there has been a 
debate as to whether a patent effectively covers more than the literal subject 
matter of the claim by including the prospective technology inherent in the 
earlier patent.  Kitch (1977) argues 
that the “prospect” theory of patent interpretation is predominant; Beck (1 983) 
contends that the evidence does not support that 
conclusion.
The supposed patent infringer may defend against the 
charge in four principal ways.  First, the validity of the patent may be 
challenged as having been improvidently issued; that is, lacking the requisite 
requirements of novelty and nonobviousness.  Second, a patent may be invalidated for 
fraudulent conduct; for example, by misrepresenting the prior art in the patent 
application.  Third, the patent is 
invalid if the invention was patented or described in a printed publication here 
or abroad, or was in public use or on sale in the 
7
patent beyond its statutory scope (Kaplow, 1984).  An allegation of infringement may be 
defeated under this doctrine if the license to use contains a condition that the 
licensee must purchase another product from the patent holder, that is, if a 
tying arrangement is created.  However, the doctrine cannot be invoked 
unless the patent holder has market power. [3]
There are three basic remedies available to a patentee 
in an infringement suit.  First, the 
court may issue an injunction barring further use of the infringing device, 
composition, method, process, or improvement.  Second, the court may award damages equal 
to a reasonable royalty or lost profits.  If the court deems a reasonably royalty 
inadequate in a particular case, it may treble the proven damages.  Third, the court may award costs and 
attorney’s fees.
Patent litigation is distinctive in the federal court 
system in that all patent appeals from U.S. District Courts and from the Patent 
and Trademark Office are heard only in the Court of Appeals for the Federal 
Circuit.  The Federal Circuit was 
organized in 1982 to provide greater expertise and uniformity in the 
interpretation of patent law and to achieve greater efficiency in case 
management.  An interim review of 
the performance of this specialized court notes that the interpretation of 
patent law is becoming more precise and coherent, patentees are successful more 
frequently against challenges of validity, and the expansion of injunctive 
relief and modified methods of damage computation have made infringement more 
costly (Dreyfuss, 1989).
Research and Policy Issues About 
Patents
The patent system was perceived by the framers of the 
Constitution as a system of incentives and rewards.  The patent offers the incentive of the 
statutory right to exclude as a means of inducing creative activity.  The right, in turn, permits the holder to 
obtain the reward by having the legal power either to sell the right for the 
payment of a royalty or to retain the exclusive exploitation rights (Katz and 
Shapiro, 1985b).  The right of the 
patent owner is conditioned on the disclosure of the subject matter to the 
public when the patent is issued.
Although economic literature about the patent system is 
substantial, many questions are still heavily disputed.  For example, there is no consensus as to 
the impact of patent protection on the growth of technology (Kitch, 1986); or on 
the optimal duration of the patent right (McFetridge and Rafiquzzaman, 
1986);
3. Patent and Trademark Authorization Act, 
approved 
8
and the data on whether patents have been used to 
facilitate cartel behavior is inconclusive (Hall, 1986).
The current controversy over of the role of patent 
protection in the computer software industry suggests the practical importance 
of patent protection on a developing industry.  Most of the early computer programs were 
marketed without patent protection.  When Visicalc was developed in 1979, the 
Patent Office, relying upon Supreme Court case law, took the position that the 
mathematical algorithms in computer programs were not protectible subject 
matter.  Subsequently, the Supreme 
Court in the Diehr case did find patentable subject matter in a process 
utilizing a computer algorithm. [4]   Since that case, the Patent Office has begun to grant 
patents on computer programs.
The uncertainty as to the scope of patent protection of 
computer software may limit the attraction of the patent regime for it.  Recently, Refac Technology, a firm 
producing no software, acquired a 5 percent ownership interest in many software 
patents relating to spreadsheet programs in exchange for its promise to bring 
infringement actions.  Refac was to 
receive a portion of all resulting royalties.  It then filed some 2000 patent 
infringements suits against large and small software companies for current and 
retroactive royalties.  Recently, in 
the first of these suits, Refac was dismissed on the legal technicality that 
Refac’s slight ownership interest in the patent was void for having been 
acquired solely for the purpose of bringing abusive litigation.  The court noted, however, that the actual 
patent owner could bring the suit (131 Federal Rules Decisions 56, 
Since computer programs are functional statements 
constructed to solve problems, they pose the issue of whether algorithms are 
patentable.  Reports in 1988 and 
1989 that the Patent and Trademark Office had adopted a more liberal approach to 
software patent applications, which might result in granting patent protection 
to fundamental building blocks of research, led the Office to publish a 
statement of guidelines to clarify its position (Official Gazette, September 5, 
1989). The statement concluded that mathematical 
algorithms
4. The original line of Supreme Court precedents included 
Gottschalk v. Benson, 409 U.S. 63 (1972); Parker v. Flock, 437 U.S. 584 
(1978).  The revised decision was 
Diamond v. Diehr, 450 
9
are, as such, unpatentable, but that applications of 
such algorithms may be protectible as new processes.
Two recent decisions by the Court of Appeals, Federal 
Circuit, have further unsettled this issue.  The court recently affirmed a Patent and 
Trademark Office rejection of a patent application for a computer program that 
diagnosed the condition of a patient by aggregating a plurality of clinical 
laboratory tests (In re Grams, 12 USPQ 2d 1824 [1989]).  However, even as the court held that the 
claim was no more than the application of a mathematical algorithm to data, it 
also noted that the presence of a mathematical formula as a step in a process 
involving mathematical steps could permit patent protection.  In a later decision, In re Iwahashi 
(12 USPQ 2d 1908 [1989]), the court reversed the Patent and Trademark Office 
for refusing to allow a patent on a program used to calculate the correlation of 
signals for recognition of voice patterns.  Where the Office had considered the 
program no more than a more efficient means of calculation of correlations and, 
thus, unpatentable as an algorithm, the court interpreted the claim to involve 
the description of an apparatus in the form of a series of interrelated means. 
 It held that such an apparatus may 
qualify for patent protection.
These apparently contradictory decisions create 
considerable uncertainty and have raised fears among industry participants that 
overprotection of algorithms may stifle innovation by raising the costs of 
subsequent innovation, an example of the issue analyzed by Scotchmer in this 
symposium.  (See 39 Pat. Trademk. 
& Copyr. J. 369 [1990].)  To the 
extent that patent protection is utilized, perhaps increased federal 
expenditures are needed to improve the classification system and accelerate the 
examination process.  Another 
alternative is to permit a patent application to be made public after, say, one 
year, even if the patent examination process is not completed, as is done in 
Another public policy issue that invites economic 
analysis is the recent extension of the term of patent protection for 
pharmaceuticals.  The brand-name 
producers sought the extension because the delay in marketing patented products 
caused by the required review and approval of the Food and Drug Administration 
(FDA) encroached on the effective term of patent protection, making it more 
difficult to recoup their R & D investment.  The makers of generic drugs, on the other 
hand, objected to the long FDA review and approval period required for 
modifications of compounds already approved under brand names, arguing that this 
duplicative review process inhibited their ability to compete with brand-name 
drugs.  Economic analysis of this 
industry would illuminate the welfare effects of the resulting legislative 
compromise, which extended the duration of the patent monopoly while 
facilitating the subsequent entry of generic drugs 
(
10
Patent protection is also a current policy concern as an 
aspect of international trade (Mossinghoft, 1984).  The current GATT negotiating round is 
seeking agreement on patent norms and standards 
(
Although works can be registered and deposited at the 
Copyright Office, the rights under the copyright statute exist independently of 
any such registration, prior examination, or other formalities (Nimmer and 
Nimmer, 1989; Goldstein, 1989).  Instead, copyright protection attaches to 
the stated subject matter when an “original work of authorship” is “fixed in any 
tangible medium of expression.”  For 
example, protection attaches to the pages of a novel when the word processor 
causes the word order to be printed on paper, meeting the “fixation” 
requirement.  The words on the 
cathode ray tube are considered an unprotectible evanescent 
image.
Copyright law gives protection in most circumstances for 
the life of the creator plus 50 years.  One exception is that a work prepared and 
published by the 
Because copyright law has no parallel to the patent 
system’s process of application and definition of claims, the scope of copyright 
protection is ultimately defined by litigation.  Litigation involving the validity of a 
patent involves a review of the file of prior art and competing claims prepared 
by the Patent and Trademark Office.  By contrast, the Copyright Office makes 
no independent review of the article or the circumstances of its creation, there 
is no official file, and the copyright owner must produce the evidence to 
support the validity of the copyright.
For copyright, it is only necessary that the work 
originated with the claiming author; therefore, unlike patents, more than one 
valid copyright can be held in identical works.  The traditional hypothetical example is 
that there could be multiple valid copyrights to identical versions of Keats’s 
“Ode on a Grecian Urn,” as long as the each author produced the word order of 
each poem independently.
Technically, a work is eligible for copyright protection 
if it is within one of five statutory categories, is original in the sense that 
it was neither already in
11
the public domain nor copied from another, and 
represents a modicum of intellectual activity.  As already described, patents attach to 
the application of an idea in the form of a machine, method, or matter.  In contrast, copyright is said to attach 
only to the expression, as distinguished from the idea.
The statute also requires “authorship.”  Thus, if a chimpanzee were to manipulate 
the keyboard of a personal computer with a graphics program and produce an 
attractive design, protection would not exist because the modicum of 
intellectual activity to support copyright is deemed lacking.  As Congress has extended the subject 
matter of copyright from books and maps to photographs, sound recordings, motion 
pictures, computer programs, and so on, courts have had to determine the 
relevant “authorship” for each new subject (Raskind, 
1990).
Copyright law defines its subject matter more 
specifically than does the patent statute.  Copyright protection is extended to 
literary works, musical works (including accompanying words), dramatic works 
(including accompanying music), pantomimes and choreographic works, pictorial, 
graphic and sculptural works, motion pictures and other audiovisual works, and 
sound recordings.  The rights 
accorded to a copyright owner are also tightly defined.  Copyright protection grants five basic 
rights: 1) the right to reproduce the protected work; 2) the right to prepare 
derivative works from the protected work; 3) the right to distribute copies; 4) 
the right to perform literary, musical, dramatic, choreographic works publicly, 
as well as pantomimes, motion pictures, and other audiovisual works; and 5) the 
right publicly to display literary, musical, dramatic, choreographic, 
pantomimes, and pictorial, graphic, and sculptural works, including the 
individual frame of a motion picture and other audiovisual works.  Notice that sound recordings are omitted 
from the listed properties having the performance right, although the composer 
and publisher of the recorded work do have the right.
In 1980, Congress expressly extended copyright 
protection to computer programs as literary works, defining a program as “a set 
of statements or instructions used directly or indirectly in a computer in order 
to bring about a certain result.”  At the same time it provided that the 
owner of a copy of a copyrighted computer program could lawfully make or 
authorize the making of another copy or adaptation of that program, provided 
that either: 1) the new copy is created only as an essential step in utilization 
of that program; or 2) the new copy is for archival purposes only.  The maker of the archival copy is 
required to destroy it if the maker’s legal right to possession of the program 
ends.  On any transfer or exchange 
of the underlying copyright program, the archival copy may be transferred only 
with the permission of the copyright owner of the underlying 
program.
Extending protection to computer programs requires 
modifying the interpretation of the basic copyright requirement of fixation. 
 Accordingly, cases hold that 
although the image generated by the program on the cathode ray screen is 
evanescent, the fixation requirement for a computer program is met when 
the
12
source code is written on paper or when the object code 
or microcode is fixed in a computer chip.
Remedies granted the copyright owner are more powerful 
than those provided under any other regime of intellectual property 
protection.  Injunctions are 
liberally granted in copyright cases.  Monetary damages measured by lost profits 
or the profits of the infringer may be awarded.  If willful infringement is shown, the 
court may award statutory damages up to $50,000.  In addition, infringing material along 
with the equipment used to produce the infringing copies may be impounded.  As part of final judgment, a court may 
order sale or other disposition of impounded material or may order its 
destruction.  Copyright infringement 
also is a misdemeanor under the federal criminal statute which carries a 
sanction of a line of up to $10,000 or imprisonment for up to one 
year.
Because copyright has its origins in the protection of 
books and other printed expression, it is sometimes mistakenly assumed that 
patent protection exclusively covers industrial products, while copyright is 
limited to products with a high content of creativity that address the intellect 
and the aesthetic sense.  However, 
case law has extended copyright protection to a large group of commonplace 
functional articles, from lamp bases to ash trays and can openers, items that 
have nothing in common with the fine arts.
For some products there is a choice between patent and 
copyright protection.  A computer 
program producer may seek either copyright or patent protection at the outset. 
 Exercising one alternative may 
restrict the other.  If copyright is 
selected first and the program is registered and sold in the 
The Limits of Copyright 
Protection
Copyright also expressly qualifies and limits the 
granted rights in three general ways.  First, the more modest copyright 
threshold of originality” means only that the work has not been copied.  Thus, independent creation of an 
identical work is a defense against a claim of copyright 
infringement.
Second, the scope of protection varies with the creative 
content of the material.  For 
example, copyright in a fact work (like a news story or a database) does not 
extend to the names, places, and events, but only to the expression in the 
writer’s interpretation.  However, 
all of the expression in a poem or a novel is protected by 
copyright.
Third, reproduction of a copyrighted work is not 
infringing if the copying can be shown to be for a “fair use,” such as literary 
criticism, making a parody,
13
or classroom teaching.  Moreover, the reproduction must not 
adversely affect the present or potential economic interest of the owner of the 
protected work.  An example of a 
situation in which there is no adverse effect would be the reprinting an 
out-of-print work (Gordon, 1982; Raskind, 1984).
In the recent revision of the Copyright Act, an impasse 
developed between the higher education establishment and representatives of the 
publishers over a statutory provision permitting photocopying by classroom 
teachers.  The matter was resolved 
by providing guidelines that undertake to define the circumstances where 
multiple copying by classroom teachers does not constitute infringement.  The Guidelines were intended to describe 
a clearly permissible “safe harbor” amount of multiple copying for classroom use 
for which permission is not required.  They were not intended to state a 
maximum.  For copying beyond the 
Guidelines, courts are to decide fair use in the classroom setting on a case by 
case basis.  There is pending 
litigation involving a group of major publishers and a prominent commercial 
copying firm which may provide the first interpretation of the scope of the 
Guidelines.
It is generally agreed that a scholar may make one copy 
of protected material for study.  
Under a separate statutory provision, a library may make that single copy 
on behalf of a patron as well as for preservation, archival, or interlibrary 
loan purposes.  This provision 
restricts the library to “isolated” and “unrelated” reproduction of the single 
copy.  If the library persons become 
“aware or have substantial reason to believe” that they are participating in 
“concerted reproduction or distribution” of multiple copies, they become liable 
for infringement, unless the fair use provision applies.  A library is furthier restricted from 
making a copy (except for archival or preservation purposes) of a musical work, 
a pictorial, graphic, or sculptural work, a motion picture or other audiovisual 
work.  However, a library may make a 
copy of an audiovisual work dealing with news.
Copyright provides a legal framework governing market 
relations.  An owner of a copyright 
is empowered to grant a license to reproduce, distribute, perform, or display 
the copyrighted work and to obtain a royalty for granting the right.  In most circumstances, the outcomes are 
uncomplicated.  A textbook author 
obtains the copyright in the manuscript by completing it, and the author can 
then transfer the copyright to the publisher in exchange for royalties.  In this way, the copyright statute 
provides the framework for private contractual bargaining and transfer of 
economic interests.
Although the copyright law is generally silent as to the 
terms on which private parties may strike bargains, there are some exceptions. 
 For example, the Copyright Act 
provides for compulsory licenses with statutorily determined license fees for 
some uses, like the retransmission of broadcast signals by cable television 
systems (Besen, Manning, and Mitchell, 1978).  Moreover, a number of European countries 
have enacted compulsory licenses for off-air taping,
14
other forms of home recording, and photocopying, where 
the license fees are collected through levies on blank recording machinery or 
media. [5]   Copyright owners have unsuccessfully attempted to have 
similar levies imposed in the 
In cases where the value of a given piece of copyrighted 
material is small relative to the transaction costs of licensing, copyright 
owners may employ collective administration of the licensing process (Besen and 
Kirby, 1989b).  For example, the 
American Society of Composers, Authors and Publishers (ASCAP) and Broadcast 
Music Incorporated (BMI) issue blanket licenses to radio stations to play 
recorded music and to live entertainers to perform individual songs in public, 
with the proceeds of the license fees distributed among their members.  Since collective administration creates 
the potential for anticompetitive behavior, ASCAP and BMI have both been the 
subjects of government and private antitrust suits.  Both now operate under court-administered 
consent decrees in which the government suits were settled in return for changes 
in licensing procedures.
Similarly, the 
A work made “for hire” is another important instance in 
which the transfer of copyright is governed by different rules.  If a work is determined to be one made 
“for hire,” the employer takes the copyright in the material prepared by the 
employee.  Then the duration of 
protection of a work becomes the lesser of 75 years after publication or 100 
years from the date of creation (Hardy, 1988). [6]  Industry practices vary with regard to 
the uses of the “work for hire” provisions, yet there have been no economic 
studies of these practices.  
However, it appears that in cases when a commissioned work is to be 
treated as a work for hire, courts sometimes make assumptions about relative 
bargaining power and prevailing rates and fees that are unsupported by any 
evidence or analysis.
5. Besen and Kirby (1989a), Johnson (1985), Liebowitz 
(1985), and Novos and Waldman (1984) all contain analyses of the effects of 
private copying.  For a model of 
library borrowing that deals with many of the same issues, see Ordover and 
Willig (1978).
6. A recent Supreme Court opinion held that in the case 
of a commissioned work, the author presumptively is entitled to the right, 
absent an express written designation of the commissioning person as the owner 
of the copyright.  Community for 
Creative Non-Violence v. Reid, 109 
15
Copyright and Incentives for 
Innovation
By expanding and restricting the protection given to 
copyright, courts alter the incentives accorded to a potential innovator.  The development of new products may be 
impeded by a legal rule that overprotects existing works.
Among the basic rights granted the copyright owner is 
the right to prepare a derivative work, defined as a work based on one or more 
preexisting works.  Others must 
obtain permission from the owner to prepare a derivative work from copyrighted 
material.  The statute gives as 
examples of derivative works a translation, musical arrangement, and motion 
picture version.  There may be more 
than one tier of derivative works as, for example, when a three-dimensional toy 
or a T-shirt picture is made of a character in a motion picture version of a 
novel.  The independent preparer of 
a derivative work obtains no rights in the preexisting 
material.
A substantial legal literature has probed where the line 
of protection should be drawn for derivative works.  One view is that creators of initial or 
underlying works should have broad protection to have the maximum incentive to 
produce.  On this view, infringement 
occurs if there is substantial similarity between the underlying work and a 
recast, transformed version.  In 
addition, Landes and Posner (1989) have argued that granting control over 
derivative works to creators encourages early release of the underlying work 
since otherwise creators might delay release while they prepare derivatives to 
gain a marketing advantage over other producers.  The other view would give narrower 
protection to the original work and accord the producer of the derivative work a 
zone of freedom from infringement as an incentive to produce new variations. 
 Here, the theory is that the 
societal interest is better served by providing the incentive for others to 
create derivative works.
Economic analysis would illuminate the social choices. 
 In one recent case, a manufacturer 
of framed pictures purchased copyrighted volumes of an art history book, clipped 
the photographed illustrations, and mounted them for sale as framed pictures. 
 In Mirage Editions, Inc., v. 
Albuquerque A.R.T. Co., (856 F.2d 1341 [9th Cir. 1988]), the court protected the 
copyright owner of the book, by holding that the framed pictures infringed the 
copyright.  The owner of the book 
apparently never saw the market opportunity for framed pictures during the half 
dozen years the book was being sold.  The person who saw that opportunity and 
who paid the asking price for the protected book was effectively denied any 
economic reward for entrepreneurship.
A similar example with more serious technological 
implications involves the copyright provision (Sec. 117) that restricts the 
copying of computer software to archival uses. [7]   Restricting duplication solely to archival uses makes it 
an act of copyright infringement for a programmer, whether 
independent
7. In the case of Vault Corp. v. Quaid 
Software, Ltd., 847 F.2d 255 (5th Cir., 1988), the court gave a broader 
interpretation, permitting destruction of the manufacturer’s anticopying code to 
make a copy for archival purposes.
16
contractor or employee, to copy a protected program for 
the purpose of modifying it to the particular needs of a user.  Some consider this an undue restriction 
on the role of programmers as well as users (Stern, 1985).  Making it illegal to copy for innovative 
uses, such as analysis and study for the purpose of improving routines and 
enhancing functions, serves to inhibit and restrict an important activity 
associated with the advance of this new technology (Braunstein, Fischer, 
Ordover, and Baumol, 1977), and thus raises the cost of subsequent 
innovation.
The legal literature has tended to focus on restricting 
the protection of the underlying work.  Economic analysis could contribute here 
by analyzing the impact of changing the relative costs and returns of initial 
creators arid subsequent derivative work producers.
An Illustration: Computer Operating Systems and 
Interface Standards
The issue of how to protect computer operating systems 
and screen displays provides an example of extending traditional copyright 
principles to new technology.  These 
computer interfaces are of increasing importance to the industry, because of 
their potential for standardizing menu displays, keystroke usage, and operating 
systems.  The Copyright Office has 
announced as its position that all the copyrightable expression embodied in a 
computer program, including screen displays, is to be considered as a single 
work (53 Federal Register, 21817-20, June 10, 1988).  By reversing its earlier position of 
accepting screen displays for separate registration arid deposit, the Office has 
placed itself at odds with the courts [8] and with some commentators 
(Menell, 1989).
Computer users may benefit from the existence of 
standardized interfaces in a number of ways (Farrell and Saloner, 1985; Katz and 
Shapiro, 1985a).  The greater the 
degree of standardization, the larger is the array of complementary inputs 
(software, repair services, arid the like) available to users, and the easier it 
is to switch from one system to another.  These forces also create a tendency for 
only a small number of standardized features of interfaces to exist at any one 
time, and make the introduction of new interfaces more costly and difficult 
(Farrell, 1989).
Much litigation has occurred and is pending over the 
copyright protection of both computer operating systems and computer screen 
displays.  However, this litigation 
does not seem likely to refine the analysis of visual displays.  In Apple’s suits against Microsoft and 
Hewlett-Packard, for example, the court found that the alleged infringing use of 
Apple’s visual displays was covered by Apple’s software license to the defendant 
(Apple Computer, Inc. v. Microsoft Corp., 717 F. Supp. 1428 [N.D. Cal. 1989]). 
 Xerox’s suit against Apple 
is
8. For example, see Manufacturers Technologies, Inc. 
v. Cams, Inc., 704 F.  Supp. 
984 (D. 
17
pending a further hearing, but it is unlikely to require 
analysis of the scope of protection since Xerox does not allege infringement, 
but rather seeks to have Apple’s copyright declared invalid, a novel copyright 
remedy (Xerox Corp. v. Apple Computer, Inc., D.C. N.Cal. CCH Copy. Rep. Par. 26, 
556).  A recent decision extending 
copyright protection to the menu command structure of a popular spreadsheet 
program has rekindled the controversy over the protection of screen displays 
(Lotus Development Corp. v. Paperback Software Intn’l., 740 F. Supp. 37 [D. 
Mass. 1990]).  Most troublesome is 
the protection of the input command words (such as Move, Copy, Print) and the 
court’s rejection of the defendant’s argument that these familiar components of 
a screen display should be considered an unprotectible, de facto industry 
standard.
Proponents of independent protection of screen displays 
have argued that substantial expenses are involved in developing interfaces arid 
that without legal protection, too few resources will be devoted to this 
activity (Clapes, Lynch, and Steinberg, 1987).  In response, it has been argued that many 
standardized interfaces result from arbitrary choices among a number of equally 
good and widely-known alternatives, or conversely, that there may be only a 
single way to accomplish a given objective.  In either case, providing intellectual 
property protection would grant considerable market power to the owner of the 
right to control the standardized interface.  For this reason, Menell (1989) has argued 
that courts should give only “thin” copyright protection to screen displays by 
finding infringement only on a showing of actual copying.
An alternative approach is to require the developer of 
the interface to seek protection under the patent system.  Since copyright protection does not 
require novelty or non-obviousness, using copyright to protect computer 
interfaces might cause insignificant advances to receive a high degree of 
protection, with risks that widespread use of innovations in this industry will 
be delayed.
Strong intellectual property protection might also create the possibility for patent or copyright races, as discussed earlier. Because of the potentially large returns to winning in the race to develop a broadly used interface standard, an excessive amount of resources may be devoted to this activity. [9] If protection were more limited, this effect would be attenuated. Alternatively, the degree of protection could be limited by requiring that compulsory licenses be made available on reasonable terms. Indeed, some standards organizations have been able to impose such licensing requirements as a condition for selecting a particular technology as a standard, and user groups have succeeded in lowering royalty fees by threatening not to support a standard. IBM and Unisys were recently forced to reduce their proposed fees for licensing patents needed for the manufacture of modems that conformed to a new standard (Lefton, 1990).
9.  There is 
probably less need to be concerned about resources spent in efforts to develop 
trivial variations on an existing standard.  Even if those variations were to receive 
protection under the copyright law, trivial changes would be less likely to 
dominate the marketplace.
18
The semiconductor chip has become the principal building 
block of contemporary electronics technology.  By the mid-1970s, 
The resulting Semiconductor Chip Act of 1984 is the 
newest addition to the intellectual property system.  The Chip Act is sometimes erroneously 
described as a piece of special or sui generis legislation, implying that the 
special nature of the technology made it ineligible for copyright protection. 
 It is more accurately characterized 
as legislation within the copyright regime, a copyright-like statute that is 
fine-tuned to reflect the particular needs of this industry. [10]  Thus it provides a 10-year term, shorter 
than either patent or copyright, codifies the industry practice of reverse 
engineering, and provides for more limited remedies.
The two subjects eligible for protection under the Chip 
Act are the semiconductor chip products and the mask work.  The first are integrated circuits 
containing transistors, resistors, capacitors and their interconnections, 
fabricated into a tiny, single piece of semiconductor material.  A mask work is defined as a set of 
images, however fixed or encoded at a later stage of manufacturing, that 
produces the circuitry of the final chip product; essentially, these are the 
blueprints of the chip.  For 
domestic producers, protection attaches on fixation and commercial exploitation. 
 Protection for foreign products can 
be granted by the president upon a finding that a foreign nation extends to 
As in traditional copyright, the Chip Act imposes a 
condition of “originality” for protection to attach, but the Chip Act standard 
is expressly set somewhat higher.  The Chip Act states that a mask work 
design is not original if it is staple, commonplace, or familiar in the 
semiconductor industry.  Although a 
mask work is eligible for protection upon fixation, the right may be forfeited 
by failure to register within two years after the first commercial exploitation. 
 Clearly, this is unlike traditional 
copyright law.
Two basic rights are given the owner of a protected mask 
work: the right to bar reproduction of the mask work by optical, electronic, or 
any other means; and the right to import or distribute a semiconductor chip 
product in which the mask work is embodied.  Accordingly, importing a pirated chip is 
an infringement of the owner’s importation right.
10. Statement, Leo J. Raskind, testimony before the House 
Subcommittee on Courts, Intellectual Property, and the Administration of 
Justice, Oversight Hearings on Computers and Intellectual Property, p. 3, 
November 8, 1989.
19
Reverse engineering, like fair use in copyright law, is 
a defense to a claim of infringement.  Reverse engineering differs from the fair 
use defense in two material respects.  First, the reverse engineering provision 
was expressly drafted to provide exemption from infringement liability despite 
proof of unauthorized copying and striking similarity, so long as the resulting 
chip product was the result of study and analysis and contained technological 
improvement, like decreased chip size, lower thermal output, or enhanced 
speed.
The second difference is one of scope.  Under fair use, the extent of economic 
injury is the primary concern.  But 
injury is irrelevant under reverse engineering; what matters is that more than a 
trivial improvement was made.  In 
the course of these hearings, legislators pressed various witnesses for guidance 
in distinguishing piracy from reverse engineering.  The uniform industry response was that in 
a case of piracy, the copier would not be able to show a “paper trail” of 
initial flow charts, time sheets, computer simulations, or an improved chip 
(Sen. Rept. No. 425).  By 
comparison, a firm that had done reverse engineering would have copious records 
of analysis amid experimentation as well as a new chip with improved performance 
capabilities.  As courts grapple 
with determining the scope of protection in computer programs and screen 
displays, the approach of the Chip Act may serve as a model for courts to find 
infringement only in cases of piracy (Raskind, 1985).
Once infringement is established, the mask work owner 
has the traditional battery of remedies associated with copyright protection, 
with two exceptions.  First, 
criminal penalties are not available.  Second, the amount of permissible 
statutory damages for mask work infringement is five times greater ($250,000) 
than the maximum amount ($50,000) of statutory damages for copyright 
infringement.
As the newest addition to the intellectual property 
regime, the Chip Act is a good candidate fur further study by economists.  To date, only one case has been decided 
under this statute.  And in the case 
of Brooktree Corp. v. Advanced Micro Devices, Inc. (705 F. Supp. 491 [S.D. Cal. 
1988]), the plaintiff was denied a preliminary injunction.  A study of research and development in 
this industry would contribute to resolving the present debate over whether the 
Chip Act was a necessary or worthy form of intellectual property protection 
(Risberg, 1990).
Trademark protection differs from the other regimes of 
intellectual property both in its legal basis and its economic function.  Unlike patents and copyrights, there is 
no constitutional foundation for trademark protection.  In fact, there are no federally created 
rights in trademarks at all; the federal framework provides a system of 
registration and of enforcement of marks whose genesis is in state law 
(McCarthy, 1984; Landes and Posner, 1987).
20
Although trademark protection did not originate as an 
incentive for innovation or creativity, it now provides an economic incentive. 
 The primary function of trademarks 
is to provide rules of orderly marketing by identifying products and their 
sources.
State law attaches protection to trademarks (and other 
devices to identify producers) when they are adopted and used.  Protection is given by the branch of tort 
law governing unfair competition.  By registering a trademark with the 
Patent and Trademark Office, the registrant gains access to the federal courts 
and can stake out a national claim to the registered mark, a result that cannot 
he achieved by state law.  Beginning 
in 1989, a trademark owner who has not yet used a mark in commerce may apply for 
registration of intended use and support that claim by actually using the mark 
within six months and filing a statement at that time.
The origin of trademark protection is usually associated 
with the medieval guild practice of affixing an identifying mark to a goblet or 
like product.  Accordingly, the 
initial purpose of trademark protection was to make it illegal to pass off the 
goods of another artisan as those of a guild member.  As modern manufacturing and marketing 
practices made the consumer remote from the source of the product, however, 
trademarks took on the function of product identification and differentiation, 
as well as source identification.  Protection was extended from the 
trademark, an arbitrary and distinctive designation, to include a tradename, a 
surname or descriptive word, a service mark, a collective mark (like “union 
made”), as well as packaging and product features.  Over time, the legal theory of protection 
was adapted to prevent a second entrant from unfairly appropriating the value of 
a successful trademark, service mark, or trade dress.  Thus, the protection of trademarks has 
evolved as a form of indirect protection of the consumer by insuring that 
purchasing decisions are based on marks that properly identify the product and 
its source.
The value of the trademark is enhanced both by the 
quality of the product and the public familiarity with it.  A trademark may impose costs of 
advertising and establishing a reputation upon a prospective entrant to a 
market.  Moreover, trademark 
protection may dampen competition by limiting the ability of competitors to copy 
a successful mark or packaging design, even though these features are not 
protected by copyright or patent.
Patents require novelty; copyright requires originality; 
the counterpart of these terms for trademark is distinctiveness.  The Lanham Act provides that no mark by 
which the goods of the applicant “may be distinguished from the goods of others” 
shall be refused registration.  In 
this context, “distinctiveness” means that the claimed work must not be a 
generic description.  Thus, “orange” 
is not eligible for protection as applied to citrus fruit or its extract.  Also ineligible are geographic names to 
designate location, or even an actual surname if the attachment to a product 
would be likely to confuse or deceive consumers.  Similarly, merely descriptive terms are 
also ineligible, like “pasteurized” as applied to milk.
21
A further condition for the registration of trademarks 
is that the proffered trademark use terms that are either arbitrary or fanciful 
as applied to a good or service.  “Kodak,” as applied to photographic film, 
is the classic example of an arbitrary term being associated with a product. 
 A term or phrase that is not 
distinctive or otherwise eligible for registration - like “Big Red” as applied 
to apples - may qualify for registration as applied to a hand tool, if it is 
found to have acquired “secondary meaning.”  Secondary meaning is a doctrine that 
allows protection to attach to a word or phrase that is geographically or 
otherwise descriptive, requiring the claimant to prove that those words identify 
that product to consumers.  Secondary meaning may be proven by survey 
evidence, for example by showing that some statistically significant segment of 
the consumers in a given geographic market will state that the phrase –“Big Red” 
- means to them a screwdriver manufactured in New Haven, Connecticut (Stern and 
Hoffman, 1962).
Trademark law recognizes that a term that is not 
distinctive at the outset may become so through usage.  If an arbitrary mark becomes successful 
enough to become part of the language, that mark may lose its protection because 
generic terms are not protectible.  “Aspirin” and “Thermos” are examples of 
trademarks that have lost protection by becoming generic (Folsom and 1’eply, 
1980).  The board game “Monopoly” 
also lost protection for a time, based on survey evidence that 65 percent of 
respondents wanted the game without reference to who made it.  Congress reversed this decision in 1984 
by modifying the grounds for cancellation of a generic mark to require that the 
test be, in the words of 15 U.S.C. § 1064(3) [1984], “the primary significance 
of the registered mark to the relevant public rather than purchaser motivation.” 
 The new statute effectively 
withdraws the significance of secondary meaning as a test of becoming generic. 
 The concept will remain only as a 
basis of granting protection.  But 
how the courts will determine “primary significance” and secondary meaning 
remains to be seen.  They seem to be 
groping for some analytical statement in terms of the function of these 
protected symbols in the competitive process (Stern and Hoffman, 1962; Dreyfuss, 
1990).  Law in this unsettled state 
invites economic analysis of how trademarks affect product differentiation and 
consumer protection.
To prove trademark infringement, it is not necessary to 
prove actual confusion of specific customers.  Proof of the likelihood of confusion in 
the market circumstances satisfies the requirement, so that similarity between 
two marks in physical design, in sound or in commercial connotation can make the 
case for infringement.  Strictly 
speaking, the Lanham Act does not grant legal rights in trademarks beyond 
registration.  However, Section 43 
provides a federal law regulating unfair trade practices involving trademarks 
and product designation.  Section 43 
broadens the tort rule against “passing off,” by making actionable any false 
statement of fact or any statement likely to deceive, when made in a competitive 
context.
22
Like the other branches of intellectual property law, 
the traditional remedies of injunction, damages, and fees and costs are 
available to the successful litigant.  A successful plaintiff in a trademark 
infringement action is entitled to injunctive relief, to recover the defendant’s 
profits and to receive damages for lost sales.  These penalties can be further increased 
if there is a deliberate use of a counterfeit mark.
Trade secret law covers specific business information 
transmitted by persons, firms, and markets (Grossman and Stiglitz, 1976; 
Kitch, 1980).  A trade secret has 
alternatively been described (Milgrim, 1989) as “any formula, pattern, device or 
compilation of information which is used in one’s business, and which gives him 
an opportunity to obtain an advantage over competitors who do not know or use 
it.”  Or in the words of the Uniform 
Trade Secrets Act, §1(4) (1979), as “information including a formula, pattern, 
compilation, program, device, method technique, or process, that: (i) derives 
independent economic value, actual or potential, from not being generally known 
to, and not being readily ascertainable by proper means by, other persons who 
can obtain value from its disclosure or use, and (ii) is the subject of efforts 
that are reasonable under the circumstances to maintain its 
secrecy.”
Trade secret law differs from patent law in three 
respects.  First, it is grounded in 
state law, so that aside from the uniformity prevailing in the 16 states that 
have enacted the Uniform Trade Secrets Act, the scope of protection varies among 
the states.  A few states rest trade 
secret protection on a property theory, while the majority of states invoke 
doctrines of tort, contract, constructive trust, or unjust enrichment as a basis 
of trade secret protection.  In 
addition, 25 states have made it a crime to steal a trade secret (Kitch, 
1980).
Second, trade secret law is also outside the 
inducement/disclosure framework of patent and copyright law.  Protection is granted to a patent and 
copyright owner in return for the disclosure of the subject matter to the 
public.  Trade secrets are, by 
definition, not disclosed.  They are 
protected against discovery by “improper means,” but not against discovery of 
the trade secret by independent means or by reverse engineering.  The incentive to “create” trade secrets, 
such as customer lists or chemical formulae, and to incur costs of protecting 
them, is derived from their value.  Of course, trade secret protection may 
serve as an ancillary incentive for the firm to perfect a process that might be 
eligible for patent protection.  But 
given the more limited prospects for protection of trade secrets, the patent 
affords a far more powerful incentive.
A third difference between trade secret law and patent 
law is the subject matter and duration of protection.  While protection is granted only for 
subject matter that represents some creative efforts under the copyright and 
patent
23
regimes, trade secret protection rests solely on the 
commercial value of the matter to the claimant (Kitch, 1980).  Thus, trade secret law includes a wider 
subject mater.  The duration of 
trade secret protection is limited only by the happenstance of independent 
discovery or by improper disclosure.  This potential for perpetual protection 
serves as an incentive to avoid the disclosure requirements of the patent 
regime.  There is also an abusive 
potential in trade secret protection if the subject matter of a valuable but 
little-known expired patent were to be given further protection as a trade 
secret.
When a competitor has used “improper means” of 
discovery, or an employee has breached the confidential condition under which a 
trade secret was disclosed, the available remedies are injunctive relief and 
damages.  The Uniform Trade Secrets 
Act makes illegal both the use of “improper means” to discover the trade secret 
and the “misappropriation” of improperly discovered material.  Under the UTSA Sec. 1(1-2) (1979), 
improper means include “theft, bribery, misrepresentation, breach or inducement 
of a breach of duty to maintain secrecy, or espionage through electronic or 
other means” while misappropriation is defined in part as “acquisition of a 
trade secret of another by a person who knows or has reason to know that the 
trade secret was acquired by improper means.”  Thus, the focus of trade secret law is 
“fair dealing” between competitors and between employer and employee with regard 
to the uses of specific business information.
Since trade secret law is enmeshed both with the 
competitive process and the internal decisions of the firm, economic analysis of 
the properties and consequences of trade secret protection would illuminate 
important public policy interests.  One possibility might be to examine the 
workings of the commercial espionage industry.  A systematic investigation of the 
litigated trade secret cases would provide useful data (Miller, 1989).  In this issue, Friedman, Landes, and 
Posner provide a starting point by arguing that existing trade secret law 
appears to be consistent with considerations of economic 
efficiency.
Economic analysis might also illuminate the judicial 
task of applying trade secret protection.  In our view, judges are presently too 
concerned with the “dirty trick” aspects of competition.  We believe that optimal administration of 
the trade secret laws requires more emphasis on the private and social costs and 
benefits of trade secret protection, and on economic efficiency, and 
correspondingly less concern with norms of fair commercial 
conduct.
Misappropriation is a legal doctrine that functions 
outside of trade secret law as a general common law property right against some 
takings of information of commercial value.  The doctrine is derived from a Supreme 
Court
24
opinion, International News Service v. Associated 
Press (248 U.S. 215 [1918]), barring the use of uncopyrighted news reports. 
 During World War I, the Hearst news 
gathering agency copied Associated Press dispatches on the Eastern seaboard and 
transmitted them by wire to their midwest and west coast papers ahead of their 
receipt by Associated Press subscribers there.  Although the relief granted by the court 
was limited to protection during the period of initial dissemination, the 
reasoning of the opinion launched a broad principle of unfair competition law by 
stating (at p. 240), “...defendant... admits that it is taking material that has 
been acquired by complainant as the result of organization and the expenditure 
of labor, skill, and money,... and that... in appropriating it and selling it as 
its own is endeavoring to reap where it has not sown.”  This doctrine has been adopted by state 
and federal courts as a general rule of unfair competition, sometimes granting 
protection to material otherwise appropriately outside the reach of intellectual 
property laws (Baird, 1983).  However, this doctrine has been 
repeatedly criticized for its lack of analytical content (Raskind, 
1991).
Increased interest in the economics of intellectual 
property is timely.  The pace of 
technological change during the last few decades has forced intellectual 
property law into unknown areas and hard cases, straining the capabilities of 
courts and legislatures.  How should 
innovations related to semiconductor chip or computer software be protected? 
 Should genetically engineered life 
forms be patented?  Under what 
conditions should videotaping a television show for home use infringe the rights 
of program producers?
These and other issues have forced a searching 
re-examination of many of the premises of the intellectual property system 
during the last decade.  Some 
authors have called into question some of the basic underpinnings of the law in 
this area, while others have concluded that the system is fundamentally sound. 
 The papers in this symposium 
provide examples of both of these views.
Research along these lines could play a key role in 
affecting 
This paper was prepared for Symposium on Intellectual 
Property Law, funded by the RAND Corporation and The John P. Olin Foundation. 
The Symposium took place 
Arrow, K. J., “Economic Welfare and the Allocation of 
Resources for Invention.”  National 
Bureau of Economic Research, The Rate and Direction of Inventive Activity: 
Economic and Social Factors.   
Baird, D. G., “Common Law Intellectual Property and the 
Legacy of International News Service v. Associated Press,” 
Beck, R. L., “The Prospect Theory of the Patent System 
and Unproductive Competition,” Research in Law & Economics, 1983, 5, 
193-201.
Besen, S. M., and S. N. Kirby, “Private Copying, 
Appropriabilitv, and Optimal Copying Royalties,” Journal of Law & 
Economics, 1989a, 32, 255-280.
Besen, S. M., and S. N. Kirby, “Compensating Creators of 
Intellectual Property: Collectives That Collect,’’ RAND Corporation, R-3751-MF, 
November 1989b.
Besen, S. M., W. G. Manning, and B. M. Mitchell, 
‘‘Copyright Liability for Cable Television: Compulsory Licensing and the Coase 
Theorem,’’ Journal of Law and Economics, 1978, 21, 
67-95.
Braunstein, Y. M., D. M. Fischer, J. A. Ordover, and W. 
J. Baumol, “Economics of Property Rights as Applied to Computer Software and 
Data Bases,’’ United States Department of Commerce: PB-268 787, 
1977.
Breyer, S., “The Uneasy Case for Copyright: A Study of 
Copyright in Books, Photocopies, and Computer Programs,” Harvard Law 
Review, 1970, 84, 281-351.
Chisum, D., Patents.   
Clapes, A. L., P. Lynch, and M. R. Steinberg, ‘‘Silicon 
Epics and Binary Bards: Determining the Proper Scope of Copyright Protection for 
Computer Programs,” UCLA Law Review, 1987, 34, 
1493-1594.
Dasgupta, P., and J. E. Stiglitz, “Industrial Structure 
and the Nature of Innovative Activities,” Economic Journal, 1980, 90, 
266- 293.
Dixit, A. K. and J. E. Stiglitz, “Monopolistic 
Competition and Optimum Product Diversity,” American Economic Review, 
1977, 67, 297-308.
Dreyfuss, R., “The  
Federal Circuit: A Case Study in Specialized Courts,” N.Y.U. Law 
Review, 1989, 64, 1-77.
Dreyfuss, R., “Expressive Genericity: Trademarks as 
Language in the Pepsi Generation, Notre Dame Law Review, 1990, 65, 
397-424.
Farrell, J., and G. Saloner, “Standardization, 
Compatibility, and Innovation,” RAND Journal of Economics, 1985, 16, 70-83.
 
Farrell, J., “Standardization and Intellectual 
Property,’’ Jurimetrics, 1989, 30, 35-50.
Folsom, R. H. and R. H. Teply, ‘‘Trademarked Generic 
Words,’ Yale Law Journal, 1980, 89, 1323-1359.
Frase, R., ‘‘Comments on Hurt and Schuchman, The 
Economic Rationale of Copyright.’’ American Economic Review, Papers and 
Proceedings, 1966, 56, 435-439.
Gilbert, R., and C. Shapiro, “Optimal Patent Length and 
Breadth,” RAND Journal of Economics, 1990, 21, 
106-112.
Goldstein, P., Copyright. 
Gordon, W.J., “Fair Use As Market Failure:A Structural 
and Economic Analysis of the Betamax Case and Its Predecessors,’’
Grossman, S. J., and J. E. Stiglitz, “Information and 
Competitive Price Systems,” American Economic Review, Papers & 
Proceedings, May 1976, 66, 246-253.
Hall, C. D., ‘‘Patents, Licensing, and Antitrust,’’ 
Research in Law and Economics, 1986, 8, 59-86.
Hardy, I. T., “An Economic Understanding of Copyright 
Law’s Work-Made-For-Hire Doctrine,” Columbia-VLA Journal of Law and the 
Arts, 1988, 12, 181-227.
Hughes, J., “The Philosophy of Intellectual Property,’’ 
Johnson, W. R., “The Economics of Copying,” Journal 
of Political Economy, 1985, 93, 158-174.
Kaplow, L., “The Patent-Antitrust Intersection: A 
Reappraisal,” Harvard Law Review, 1984, 97, 
1813-1892.
Katz, M. L., and C. Shapiro, “Network Externalities. 
Competition, and Compatibility,” American Economic Review, 1985a, 75, 
424-440.
Katz, M. L., and C. Shapiro, “On the Licensing of 
Innovations,’’ Rand Journal of Economics, 1985b, 16, 
504-520.
Kitch, E. W., “The Nature And Function of the Patent 
System,” Journal of Law & Economics, 1977, 20, 
265-290.
26
Kitch, E. W., “The Law and Economics of Rights in 
Valuable Information,” Journal of Legal Studies, 1980, 9, 
683-724
Kitch, E. W., ‘‘Patents: Monopolies  Or Property Rights?” Research in Law 
& Economics, 1986, 8, 31-49.
Klemperer, P., “How Broad Should the Scope of Patent 
Protection Be?” Rand Journal of Economics,  1990, 21, 113-130.
Landes, W. M., and R. A. Posner, “Trademark Law: An 
Economic Perspective,” Journal of Law & Economics 1987, 30, 
265-309.
Landes, W. M., and R. A. Posner, “An Economic Analysis 
of Copyright Law,” Journal of Law & Economics , 1989, 18, 
325-366.
Lefton, T., “IBM, Unisys Reduce Fees for Modem 
Compression,” Electronic News, January 1990, p. 1.
Liebowitz, S. J., “Copying and Indirect Appropriability: 
Photocopying of Journals,” Journal of Political Economy, 1985, 93, 
945-957.
Loury, G. C., “Market Structure and Innovation”, 
Quarterly Journal of Economics, 1979, 93. 395-410.
McCarthy, J. T., Trademarks and Unfair 
Competition, second edition, 
McFetridge, D. G., and M. Rafiquzzaman, “The Scope and 
Duration OF The Patent Right and The Nature Of Research Rivalry”, Research In 
Law & Economics, 1986, 8, 9 1-120.
Menell, P., “An Analysis Of The Scope Of Copyright 
Protection For Application Programs,” Stanford Law Review, 1989, 41, 
1045-1104,
Milgrim, R. M., On Trade Secrets, 
Miller, E., “Antitrust Restrictions On Trade Secret 
Licensing. A Legal Review and Economic Analysis, Law & Contemporary Problems, 1989, 
52, 183-209.
Mossinghoff, G. J., “The Importance of Intellectual 
Property Protection in International Trade,” 
Nimmer, M., and D. Nimmer, On Copyright, 
Nordhaus, W. D., Invention, Growth, and Welfare: A 
Theoretical Treatment of Technological Change, 
Novos, 
Ordover, J. A., and R. D. Willig, “On the Optimal 
Provisions of Journals qua Sometimes Shared Goods,” American Economic Review, 1978, 68, 
324-339.
Plant, A., “The Economic Aspects of Copyright In 
Books,’’ Economica, May 1934a, 1, 
167-195.
Plant, A., “The Economic Theory Concerning Patents for 
Inventions,’’ Economica, February 
1934b. 1, 67-95.
Raskind, L.J., “A Functional Interpretation Of Fair 
Use,” Journal of the Copyright 
Society, 1984, 31, 601-639.
Raskind, L. J., “Reverse Engineering, Unfair 
Competition, and Fair Use,’’  
University 
of  
Raskind, L. J., “The Continuing Process of Refining and 
Adapting Copyright Principles,’’ Columbia-VTA Journal of Law and the 
Arts, 1990,
Raskind, L. J., “The Misappropriation Doctrine As A 
Competitive Norm of’ Intellectual Property Law,’’  University of 
 
Risberg, R., “Five Years Without Infringement Litigation 
Under the Semiconductor Chip Act: Unmasking The Spectre of Chip Piracy In An Era 
of Diverse and Incompatible Process Technologies”, Wisconsin Law 
Review,
1990, 241-277.
Senate Report No. 425, 98th Cong., 2d Sess., 1984, p. 
21.
Spence, M., “Product Selection, Fixed Costs, and 
Monopolistic Competition ,” Review of 
Economic Studies, 1976, 43, 217-235.
Stern, R. H., and J. Hoffman, “Public Injury and the 
Public Interest : Secondary Meaning in the Law of Unfair Competition,” 
Stern, R. H., “Section 117 of the Copyright Act: Charter 
of Software User’s Rights or an Illusory Promise?”, Western New England Law Review, 1985, 7, 
459-185.
Stern, R. H., Semiconductor Chip Protection, 
Sumner, J. P., and S. W. Lundberg, “Patentable Computer 
Program Features As Uncopyrightable Subject Matter,” American Intellectual Property Law 
Association Law Quarterly, 1989. 17, 238-255.
27