On Wed, Jul 28, 2010 at 23:48:57 -0400,
  Paul Allen Newell <pnew...@cs.cmu.edu> wrote:
> 
> If doing a "black-box" only job of "reverse engineering" requires one to 
> load memory with a trademark, how does this fall into the realm of 
> acceptable?

There was a court case where a company was using a copyrighted phrase
for access control. A competitor won when they also used the same phrase
for access control purposes.

That was a long time ago and people seemed to feel that when a customer
bought something, they owned it. In today's environment that case might
have gone differently.
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

Reply via email to