Installation of a software without a valid license is a copyright infringement. In Malaysia, section 13 of the Copyright Act 1987 makes this clear by conferring exclusive rights to software developers and owners to reproduce, communicate and distribute copies of the software to the public. No other person may exercise those exclusive rights unless with the owner’s consent.[1]
The position is less certain in cases where an employee, without the employer’s knowledge, uses a software without a valid license or engages in some other form of unauthorized use or distribution.
In this regard, to what extent are employers liable for the actions of their employees, more so in the context of copyright infringement?
Malaysia recognises the principle of vicarious liability whereby an employer may be held liable for the actions of their employees. To establish vicarious liability, it must be shown that the employee was acting in the course of their employment, and that there was a sufficient connection between the employees’ actions and their duties and responsibilities.[2] However, the extent to which this principle applies to copyright infringement is, as noted above, less than certain.
The recent Singapore High Court case of Inzign Pte Ltd [2023] SGHC 50 would shed some light. Here, the employer was held vicariously liable for its employee’s infringing act of installing an unlicensed software program. As a result, the employer was ordered to pay damages. The key takeaways from this case are –
The case serves as an important reminder for employers to take proactive steps to monitor and prevent possible copyright infringement by their employees, which include –
Implementing a strong IT governance framework: A strong IT governance framework can help to ensure that software usage is in compliance with licensing agreements and legal requirements. [9]In conclusion, employers when faced with a similar predicament may find it difficult to escape liability merely by arguing lack of knowledge. Hence, prevention is better than cure.
If you have any queries please contact the author, Teo Kah Min (tkm@lh-ag.com), or her team partner, Chng Keng Lung (ckl@lh-ag.com).
REFERENCES:
1 Copyright Act 1987, s 36(2)
2 GMP Kaisar Security (M) Sdn Bhd v Mohamad Amirul Amin bin Mohamed Amir [2022] 6 MLJ 369
3 Inzign Pte Ltd [2023] SGHC 50 at para 35
4 Ibid at para 23
5 Ibid at para 53
6 RightsDirect, “Copyright Compliance in the Digital Workplace” (RightsDirect, January 2023) <https://www.rightsdirect.com/wp-content/uploads/sites/6/2023/01/Compliance-in-the-Digital-Workplace.pdf > accessed 2 April 2023
7 Emiliano Pardo Saguier, “How to Monitor the Use of Pirated Software Inside the Organization” (InvGate, 2 September 2022)
<https://blog.invgate.com/monitor-pirated-software> accessed 30 March 2023
8 Supra n 6
9 Peter Wheatcroft, “The IT Assets Conundrum” (The Chartered Institute for IT, 1 November 2006)<https://www.bcs.org/articles-opinion-and-research/the-it-assets-conundrum> accessed 28 March 2023