TABLE OF CONTENTS
DECLARATION .......................................................................................... .i
APPROVAL. .............................................................................................. .ii
DEDICATION ............................................................................................ .iii
ACKNOWLEGDEMENT ............................................................................... .iv
TABLE OF CONTENTS ................................................................................. v
LIST OF ACRONYMS ................................................................................. ,ix
ABSTRACT .......................................................................................... , ...... x
LIST OF LEGISLATIONS .............................................................................. xi
LIST OF CASES .......................................................................................... xii
CHAPTER ONE. ........................................................................................ . I
1.0 INTRODUCTION AND BACKGROUND OF STUDY .................................. !
' 1.1 Statement of problem .............................................................................. !
1.2 Objective of Study ................................................................................. 2
1.2.1 General Objective of the Study .................................................................. 3
1.2.2 Specific Objectives of the Study ................................................................ .3
1.3 Research Questions ................................................................................ .4
1.4 Significance of the Study ........................................................................ .4
1.5 Scope of the Study ............................................................................... .5
1.5.1 Geographical Scope ................................................................................. 5
1.5.2 Content Scope ...................................................................................... .5
v
1.5.3 Periodic Scope ..................................................................................... 6
1.6 Literature Review ................................................................................. 6
1.7 Research Methodology .......................................................................... 12
1.7.1 Research Design ................................................................................. 12
1.7.2 Research Tools .................................................................................... 13
1.8 Anticipated Limitations .......................................................................... 13
1.9 Synopsis of the Study ............................................................................ 14
CHAPTER TWO ......... ............................................................................... 15
THE COPYRIGHT REGIME AND THE CYBER REVOLUTION IN UGANDA .......... 15
2.0 The era of copyright law in Uganda ............................................................ 15
2.1 \Vhat amounts to a copyrightable work? ...................................................... 18
2.2 The development of copy1ight law in the intemet revolution ............................... .20
2.3 What is the cyber revolution? ................................................................... 22
2.4 The challenge of copyright protection in the cyberspace .................................... 23
CHAPTER THREE ......... ....................................................................................................... 26
THE ESCALATION OF COPYRIGHT INFRINGEMENT; AN ATTRIBUTE TO THE CYBER
REVOLUTION IN UGANDA .......................................................................... 26
3.0 What amounts to copyright infi·ingement? ..................................................... 26
3.1 Types of copyright infringement. ................................................................ 28
VI
3 .1.1 Direct or primary infringement ................................................................. 28
3.1.2 Indirect or secondary infringement.. ........................................................... 32
3.1.2.1. ContJibutory infringement. ..................................................................... 33
3.1.2.2. Vicarious copyright infringement. ............................................................ .35
3.2 The legality of the cyber revoluti Al in increasing copyright infringement ............... 38
3.3 Loopholes in the Ugandan Copyright law as regards internet related infringements ... 39
3.4 Comparative analysis of copyright law and the cyber revolution between Uganda and
other jurisdictions ................................................................................ .42
3.4.1 Copyright law in the U.S System ............................................................... .43
3.4.2 Copyright law in the Philippines Jurispmdence .............................................. .45
3 .4.3 Copyright law in the Australian Jurispmdence .............................................. ..46
CHAPTER FOUR. ..................................................................................... . .48
FINDS, RECOMMENDATIONS AND CONCLUSIONS ........................................ ,.48
4.0 Findings ............................................................................................ .49
4.1 Recommendations ................................................................................. 50
4.1.1 Enactment of a law to regulate circulation of CD's and CD burning software in
Uganda .............................................................................................. 50
4.1.2 Use of Authentication Generative codes or keys .............................................. 52
4.1.3 Trial versions ........................................................................................ 53
4.1.4 Technical Measures ................................................................................ 54
4.1.5 Encryption ........................................................................................... 58
t.2 Conclusion ............................................................................................... 59
vii
REFERENCES ............................................................................................ 61
Textbooks ................................................................................................... 61
Jouma1s and Repmis ....................................................................................... 61
Websites ..................................................................................................... 61
ABSTRACT
This study is an exploratory design carried out in Uganda which sought to; analyze effectiveness of the law governing copyright in protecting authors of a particular work; looking at the effect of the cyber revolution in leading to the abuse of this establishing the circumstances that lead to the abuse of copyrights; to examine the legal challenges experienced in addressing copyright infringement; to suggest ways to counter the weaknesses a11d excesses in addressing copyright infringement. The study relied in qualitative methods of data collection and analysis to generate data. The findings reflect that much as the Copyright and Neighing Rights Act, Act No. 19, 2006, TRIPS, WJPO have been instrumental in covering the rights of authors at all levels, they still leave a lot to be desired, with intemet users exploiting the gap of availability of a wide cyber space to violate and infringe upon the rights of authors, moreover with a failure to compensate them. The intention of which Copyright and Neighboring Rights Act, Act No. 19,2006, TRIPS, WIPO were formed was to address a11d outline obligations of both authors a11d end users of an authors product. The law has minimized copylight infringement but is still with gaps which can be addressed to extend to cyber space and save authors from infringement of their copyright. The study recommended that; enactment of a law to regulate circulation of CDs and CD burning software, use of authentication generative codes or keys, trial versions, technical measures, and ~encryption in Uganda.
EKEMU, J (2022). A Legal Analysis of the Cyber Revolution and Copyright Infringement in Uganda.. Afribary. Retrieved from https://afribary.com/works/a-legal-analysis-of-the-cyber-revolution-and-copyright-infringement-in-uganda
EKEMU, JOSEPH "A Legal Analysis of the Cyber Revolution and Copyright Infringement in Uganda." Afribary. Afribary, 16 Jul. 2022, https://afribary.com/works/a-legal-analysis-of-the-cyber-revolution-and-copyright-infringement-in-uganda. Accessed 23 Nov. 2024.
EKEMU, JOSEPH . "A Legal Analysis of the Cyber Revolution and Copyright Infringement in Uganda.". Afribary, Afribary, 16 Jul. 2022. Web. 23 Nov. 2024. < https://afribary.com/works/a-legal-analysis-of-the-cyber-revolution-and-copyright-infringement-in-uganda >.
EKEMU, JOSEPH . "A Legal Analysis of the Cyber Revolution and Copyright Infringement in Uganda." Afribary (2022). Accessed November 23, 2024. https://afribary.com/works/a-legal-analysis-of-the-cyber-revolution-and-copyright-infringement-in-uganda