Can a controlled attack on a computer system to identify its security weaknesses violate copyright or trade secrets?
In computer games and apps, the use of images of nature, like mountain streams, does not raise doubts in terms of copyright. But the use of architectural structures, such as bridges, monuments or buildings, can be problematic, because they are generally regarded as “works” for copyright purposes.
Software licensing agreements often provide that the licence is granted for an unlimited time. But what does this mean in practice and what legal consequences does it exert?