Tuesday, 18 July 2023

Picking a manager for your music business



 What you need to know about the music business pt 3: Picking a manager for your music business


THE PERSONAL MANAGER


Your personal manager is the most important person in your working life. A good personal manager can help you improve your career, whilst a bad one can send you into oblivion. When the work is done well, a personal manager serves as your company's general manager and chief operating officer  (of course, there are some artists who do not have managers, but they are a very small minority, and they usually have one or more other team members serving this job) Paul Rosenberg, for example, is Eminem's manager).


The most important aspects of the personal manager’s job are:


  1. Assisting you with critical business decisions such as deciding which record label to sign with if you decide to do a record contract, whether to do a publishing agreement, how much to demand, and so on.


  1. Helping you with the creative process, such as selecting which songs to record, selecting a producer, recruiting band members, selecting photographers, and so on.


  1. Monitoring your social media, organising your marketing and advertising, and promoting your career to everyone the personal manager comes into contact with.


  1. Assembling your professional team by connecting you to business managers, lawyers, and agents and overseeing their work.


  1. Putting together your road crew, negotiating the best deals with promoters with the aid of your agency, arranging the itinerary of the tour, developing a budget with the aid of your business manager, overseeing the tour personnel to make sure everything runs well, etc.


  1. Screaming at your record business when they make a mistake, congratulating them when they perform well, etc., as well as pushing your record label to maximise the advertising and marketing campaigns for your records.


  1. Generally acting as a bridge between you and the outside world, taking the fall for difficult decisions you make but don't want anybody to think you made, receiving demands for personal appearances, charitable requests (both for money and for your pleasant face), etc..


Let us  first take a look at the structure of your deal with the personal manager, and then we’ll talk about picking the right one.


Here is how you can negotiate your manager’s deal:


Negotiating the personal manager’s deal

Despite the powerful personality of many managers (carefully designed to keep you in your place), it is possible to negotiate with your manager. However, just like any other negotiation, the result depends on bargaining power. If you’re a major artist, bringing in 30 million plus per year, the personal managers will follow you like floppy-eared puppies, delighted to take whatever treats you care to drop in front of them. On the other hand, if you’re a brand-new band negotiating with a powerful manager, you’re the doggy.

Here are the options to discuss:

Compensation: The proportion paid to the personal manager is the first and most obvious problem. Even though some managers claim that a new band's risk is worth 20%, you should endeavour to keep the number to 15%. They claim it will be years, if ever, before they are rewarded for their considerable effort (which is true). A compromise might be to set the personal manager's share at 15% initially, rising to 20% if you reach a certain income level (for example, 15% of the first $50 million earned, with 20% of the remainder going to the personal manager). The contrary has also happened in my experience; the personal manager receives 20% up to a certain level and then 15% after that. According to the hypothesis, the personal manager receives a larger cut when you're young and the personal manager can't earn as much, but when you're successful, the personal manager's cut lowers to the 15% average. At first, this seems a little strange because it appears that the personal manager has no motivation to help you succeed because the more successful you are, the smaller the personal manager's pay is. That isn't exactly the case, though, as all managers would prefer 15% of a large number over 20% of a small one. Even while it would obviously be worse if you came out, this kind of bargain is far better for you if you succeed.

Sometimes, rather than splitting the artist's gross revenue, management will split the artist's net revenue. This is far better for the artist because, unlike in gross deals, the personal manager won't be compensated if the artist loses money. In one arrangement that I am aware of, the personal manager received 20% of the band's net earnings. Another agreement compensated the personal manager on the net for touring but on the gross for albums and publishing.

Additionally, you could try to lower the manager's commission on revenues from endorsements (paying you to promote a product) and appearances in movies and on television. The claim is that hiring an agent to introduce you to these prospects costs money. More on this will be covered in later articles. If the manager won't lower their commission, you may be able to convince them to agree to only charge you for such deals after paying your agent's commission.

Exclusions: It is occasionally feasible to lower (or even remove) particular sources of income. As an illustration, if you're a well-known songwriter seeking management to help you launch your career as a recording artist, the manager may receive 15% of your artist profits but just 10% (or even 7.5%, 5%, or 0%) of your songwriting earnings. Alternatively, it's possible that the manager receives 15% of the royalties from songs on which you perform as an artist and a lesser (or no) percentage from other songwriting income. An accomplished actor in a movie who hires a manager to help with their music career is another illustration. In these circumstances, the region where you're already established is typically excluded (or the percentage for it is decreased).

If you exclude any of your earnings from commission, the manager won’t be obligated to do any work in the excluded area (though they often do as a practical matter).

Money-Losing tours: Sometimes you can get management to agree that they won't receive a commission if a tour is a financial failure. The idea that your manager's commissions should not exceed 50% of your touring earnings was covered in the discussion above. If you are unable to reduce your manager's fee on losing tours to zero, then try to negotiate a reduced commission (for example, instead of 15%, they would only get 7.5% on a losing tour), or at the very least, convince them to postpone payment of their commission until you are more successful (i.e., you agree they are entitled to a commission, but they must wait and be paid later, when you are bringing in money). Another variation is that the manager doesn’t get paid for dates where you make a small amount, such as 50,000 per night (or a similar negotiated  figure).

Repayable Monies: You may have to return money you received as part of a contract. Ask the manager to return their commission on any money you have to pay in this situation. Even though a manager is paid on a gross basis, a certain amount of money is typically subtracted before calculating the management's percentage. Even though their contracts permit it, most managers don't receive commissions on these, but some do. Therefore, it's usually a good idea to be clear and prevent any misconceptions..


Term of the management

A management agreement often has a duration of three to five years, which refers to how long the manager will work for you. If you're a management, you want it to be as long as you can; if you're an artist, you want it to be as brief as you can.

When discussing the duration of a management arrangement, exercise extreme caution. Many performers have come to regret entering into lengthy agreements with bad management. However, there must be a delicate balance that benefits all parties. You don't want to be married to a fool who is holding you back, and managers don't want to work hard to start your career only to watch you leave at the first indication of success. The most typical solution is to specify that the artist may end the contract early if they don't make a certain minimum income.

The manager, if he or she has any sophistication, will also say that the “earnings” have to include offersyou turn down. The theory is that you can’t refuse to work and then get out of the deal because you didn’t earn enough. I usually agree to this, but require that the offers must be similar to those you have previously accepted. 

Another approach is to say you must have a record deal (or a publishing deal if you’re a songwriter) within a year or eighteen months after the start of the term, and if not, you can terminate the deal. If you get this kind of provision, you should also provide that, if the record or publishing deal ends, the manager has to get another one within that same time period (twelve to eighteen months).

PICKING THE RIGHT MANAGER

So how do you pick a manager? Let's begin with the very best. Use the following metric to gauge your candidates: The greatest manager for your career is a strong, well-connected individual who has at least one significant customer and is genuinely excited about you. You can simply and someone like that if you're a superstar. If you're not, it doesn't happen very often. The reason for this is that a powerful and successful manager is typically only interested in a huge money-making customer. The logic is straightforward: servicing an established artist requires just as much work as establishing a new artist, and guess which one pays better (and faster)? (Yes,every once in a while, a powerful manager gets genuinely revved up over a new artist. But this is rare, and you have to be extraordinarily lucky even to get such a person’s attention.)

So let’s look at more down-to-earth alternatives, not in any particular order:

  1. A senior manager who is genuinely excited about you and has a junior assistant.

  2. A midsize manager who is wildly enthusiastic about you.

  3. a significant, strong manager who is hiring you as a favour (personal or professional) for someone who is very important to him or her.

  4. A young, inexperienced manager who is willing to kill for you.

There are of course endless combinations of the above, but those are the major categories. 

If you can't obtain the ideal scenario outlined above, you'll need to make a compromise of some sort. The trade-off is between time and attention on the one hand, and power and influence on the other. A manager has at least one significant client who consumes the majority of the manager's time, which gives the manager influence. This implies that you'll receive less of it and hence less individual attention (although these people can often do more in a five-minute call than a newcomer can do in a week). The other extreme is a youthful, intelligent manager who has no other customers and who spends all of his or her waking hours pushing your career despite lacking influence and expertise.

Of course, a few managers have been able to pull off large, successful management companies, but they are the exception. Also, most of these big companies are really just a collection of managers who essentially share expenses and some central services (such as marketing, digital, etc.), meaning the managers are operating on their own for the most part.

Anyhow, every important manager has previously been an unknown. I wouldn't encourage a celebrity to seek a management that lacks expertise, but I do believe that many emerging musicians would be wise to do so. It goes without saying that you shouldn't do this if you have the chance to work with an experienced boss who is truly enthusiastic about you (or who has someone in their organisation who is). The appropriate youthful manager, though, can be a genuine benefit if this is not a possibility.







Monday, 17 July 2023

Can my software source code be infringed upon? How can I identify source code theft? A good take on Twitter vs Threads infringement claims

 


Software Plagiarism Detection

In my seven years as a legal practitioner, I have had encounters with ‘techpreneurs’ and programmers concerning infringement of software, employees and ex-employees utilizing trade secrets for their own benefits despite having written agreements and executing the contract to develop a software which is not ‘open source’.

An increasing and evolving concern in the technology industry is illegal copying of software. In this article I addressed the area of research in technology law which has traditionally been called the identification of software plagiarism.

Simply ask any programmer who has spent countless hours racking his brain attempting to execute a complicated function or debug a piece of computer code that simply would not run. The human-readable source code of software contains intellectual property. The machine-executable binary code produced from the source code often contains intellectual property.

Intellectual property is intangible, but it is precious nevertheless. IP, like physical property, may be owned, exchanged, or merely held. It is also possible for it to be hacked. Much like you wouldn't want anyone to take the fruits of your physical labour, such as the car you constructed or the blueprints for the water-powered generator engine, you wouldn't want anyone to take the fruits of your mental work. This is a kind of fraud. Similarly, once you pay for a tv, it is yours, and stealing it is fraud, such like taking software source code, object code, or software patents that you bought is theft, but not intellectual property theft.

The aim of this article was to describe how software intellectual property can be measured and analysed so as to give value to intellectual rights or to decide whether software intellectual property was misappropriated or infringed in a manner as accurate and impartial as possible.

I will begin by discussing the numerous "tech plagiarism identification" methods and algorithms that have been created in recent years.

A program source code characterization is realistic for correlation determination, and essentially for deciding when copying has taken place. While the idea and concepts are widely sufficient to be applicable in different fields of computer science, in litigation they are of special importance.[1]

This article is aimed at computer scientists, computer engineers, company administrators and software developers, judges, lawyers, expert witnesses, and professional analysts or forensic experts.

Lawyers can learn how Intellectual Property infringement is detected, how Intellectual Property modifications are measured in applications and how their positive or unfavourable results will be better presented in the courts. This article cannot convey in-depth legal expertise because there are no known case laws concerning Software Infringement with the Nigerian legal system in mind. But the concept of the foundations and precedents, mostly from foreign jurisdictions like the United Kingdom and the USA, will give a bit of persuasive guidance on what Nigerian Courts should do. In order to help select experts and expert witnesses, considering the scope for effectiveness in both litigation and interrogation and cross-examination of expert witnesses for the opposing parties, this article provides lawyers the opportunity to grasp the principles involved in evaluating software INTELLECTUAL PROPERTY.

Given that a programme may be expressed in written form and that copyright protects the form or expression of an idea rather than the idea itself, copyright looks to be an appropriate means of protection in principle. This has the advantage of preserving the program's structure rather than the concepts that underpin it, allowing another programmer to build an independent programme that performs the same purpose without infringing on the first program's copyright. Furthermore, copyright protection occurs naturally at the creation of the work and normally does not necessitate any essential creativity or originality as long as it is the author's distinct individual craftsmanship - although the requirement for some minimal creativity/originality can cause difficulties in the case of some utilitarian or functional works. When a work is protected by copyright, the law grants the owner of the copyright various rights to govern the circulation and use of the protected material, including, of course, the ability to allow or prohibit duplication. This is meant to be counterbalanced by user rights that allow a certain amount of copying for specific reasons and under specific conditions, referred to as "fair dealing" in Nigerian and UK laws and "fair use" in the US.

 There will be copyright infringement if the code's owner prohibits such copying. Source code theft is also a concern in companies, owing to employee versatility and the ease with which code can be downloaded onto a nearly undetectable flash drive or transmitted by encrypted messaging over the Internet. Patent, trade secrets and trademark violations are major issues.

Copyright has a lengthy lifespan. The Berne Convention's Article 7 provides for copyright protection for the author's lifetime plus 50 years, which has been applied in many nations.

Because computer programmes can become obsolete in a short period of time, a shorter term could be just as effective as a longer one, but neither is the longer term provided under existing copyright law particularly harmful. Overall, copyright may be an effective measure of protection as long as any difficulties stemming from the practical or utilitarian nature of computer programmes are addressed.

There are basic methods of comparing and measuring software theft. There is software source code differentiation, which is a mathematical method for comparing software source code to find basic similarities and differences.[2] The technique of differentiation is particularly useful for finding code that has been directly copied from one program to another. Source code differentiation is better at determining not only what has been copied but also the percentage of copying that has taken place.

The comparison and measurement methods of software theft are basic. I shall clearly define source code differentiation, a form of statistical comparison of software source code to identify the fundamental differences and similarities. The distinction technique is especially helpful in the search for code copied directly from one computer to another. Although there are other techniques for copying, as later discussed in this article, the separation of the source code would be easier to determine just what is copied and how much is copied.

There are several different methods to measure the quality of software, but differentiation of source code has some special capacity to measure production effort and improvements in software and intellectual property.

The differentiation of source code means the measurement of the similarities of the two sets of source code depending on the number of code lines fully matching the overall number of code lines.

Source code distinction is of specific use for the search and measurement, without alteration, of the sum of code copied directly from one application to another and/or from one version to another.

It should be noted that the Computer language is not just vast, but enormous as they evolve with the latest technology trends. Even giving just a mere holistic view on each program will require a textbook on its own. Computer scientists and programmers can attest to this. But for the sake of emphasis, I will briefly mention few computer languages and their evolved counterparts.

These languages, in order of popularity are:

·       Python

·       PHP

·       Java cousin to Kotlin

·       Swift

·       C++

·       C# (C Sharp)

 

We should take into account that the source code consists of three basic types of elements for the precise purpose of locating copied code. These elements cannot be categorised in the manner in which code elements are classified. For us, the code consists of statements from which a control system may be derived; observations that help to record the code; and strings that are messages to the users.

·       Comments: a remark embedded in source codes in such a way that will be ignored by the compiler or interpreter, typically to help people to understand the code.

·       Strings: an ordered sequence of text characters stored consecutively in memory and capable of being processed as a single entity.

·       Identifier names: a formal name used in source code to refer to a variable, function, procedure, package, etc. or in an operating system to refer to a process, user, group, etc.

It would more usefully be possible to identify correlations between the components most likely to be peculiar to individual programmers in determining the authorship of one programme or an algorithm of one programme in order to identify the source code similarity. These are the comments, strings and identifier names. The most unique way to identify authorship of a code is with the comment/string correlation and name identifier correlation.[3] This method of identifying the author of a software is known as source code correlation. Now source code differentiation is slightly different from source code correlation in the sense that Correlation is structured to generate high scores even though it is associated only with a small part of the code, or only with certain elements of the code, like identifiers or comments. It's done deliberately because it's like the instrument of an investigator. It is built to lead the consumer to dubious parts of the code irrespective of their small nature of those sections. The c ode may have been copied from one programme into another. Many of the code may also have been altered as it is checked as part of the usual developing procedure, or to hide the obvious mischief of the code been copied. An example here is that identifier names could have been renamed, code rearranged, identical instructions substituted and so on. But then maybe one comment stays the same and it's an odd one. Or a short instruction sequence is the same. Correlation is constructed with a relative meaning to guide the investigator to this similarity, based upon the comment or that sequence.

In certain cases, like legal disputes for instance, the author of the source code is relevant. In this take, we are using Twitter vs Meta's subsidiary company, Threads. Twitter must prove its an ex-employees had access to it's source codes and breached the non-compete clause. This can happen when two parties have jointly developed code for a program and, because of a contractual dispute or a royalty determination, must figure out which code was written by which party. This will occur where a code for a programme was jointly created by two parties and the code written by the party cannot be identified due to a contractual disagreement or a royalty agreement.

Source code correlation can be used to detect trade secret theft of a source code. If literal items from the source code of a computer are copied, this is not only a violation of copyright, but quite sometimes is a case of trade secret theft.

Source codes are not always publicly available except it is an open source code. Programmers may be able to execute such functions using source code, but each programme has a number of special functions that are applied in an unknown manner, so they are unique to each programme.

OPEN SOURCE SOFTWARE

Most software is hard to write, requiring years of training and experience to do correctly. Most of the code benefits its owner economically because of the expertise and effort involved in its production. Furthermore, studying source code helps a rival to discover the shortcomings of a programme and can be used for reducing the usefulness and value of the programme.

Open Source Code is a software source code that programmers around the world have developed and can be accessed without charge by any user or organisation, provided the licencing terms are met. The licencing conditions usually specify that the code contain an author's name warning. Licenses also impose other code limitations that differ according to the specific cense the initial programmer wanted, but no fees are usually necessary.

Source code libraries can also be bought by software providers from third parties. A programmer usually pays a one-time fees or a royalty for use, although any user who makes the necessary payments can use the code under any licence restriction. The programmes would have correlations if two separate programmes use this code from a third-party library.

The owner of the source code, who may be an employer or a freelance/independent developer, typically makes fair attempts to keep the source software confidential. Source code software has been kept confidential for all. The only exception to this is where the Source code is expressly deemed as ‘Open Source’ which means it is available to the public to modify and use. Whether the open source code can be used commercially by other third party users is subject to the source owner’s discretion. Source code link does not determine the rationale of the interaction, like any investigator’s equipment. It decides no fault or culpability. This decision is up to the analyst and ultimately the courts to deal with an invasion or invasion of licenced innovation.

THE WAY FORWARD

On the other hand, people may suggest protecting intellectual property of a software by patent. But that is not as straightforward as it looks. It is true that Patent protection is typically considered the appropriate way for securing intellectual property in functional, innovative products, whereas copyright is the main means of protection of creative works. Patents protect the underlying concepts as well as the form and expression, whereas copyright merely protects the form and expression. Unlike copyright, patents must be applied for and reviewed for compliance with the patent's fundamental characteristics, which include uniqueness, ingenuity, and industrial application.

An initial study showed that computer programs as literary works ought to absorb the protection of intellectual property rights and adopt copyright principles.[4]

The challenges with copyright protection for such utilitarian work in certain jurisdictions were acknowledged, but copyright was generally seen to have more advantages than disadvantages. This original research was extremely influential and the strategy followed in each jurisdiction as well as by worldwide agreement was to protect the computer programs' as literary works and, in general, to incorporate intellectual property rights into the existing copyright rules into computer programs. This study was also highly important.[5]

This seemed a sensitive and reasonable approach in many ways. The copyright system is well established and globally recognized; copyright is automatically derived from the production of a work and offers obvious protection against obvious copying and pirating of any work line by line. But the choice of copyright might at times appear to pose as many issues as it solves, both philosophical and pragmatic aims. What about computer programs and computer technologies that might generate traditional copyright law problems? Simply said, two large sectors need to be taken into account.

Although even this amount of duplication might constitute a technicality in copyright violation unless clear provision is made, the economic exploitation of that programme, in its whole, is not threatened by that copying. However, it is precisely the fact, which makes it a straightforward issue to produce a number of illegal copying, whether for private use, use within a trade organization and on the open market, that the success of computer technology relies greatly on the easiness with which programs may be copied.

It is good computing practise to make a backup copy of each computer programme and keep it safe. While even this amount of copying may constitute a technical violation of copyright unless specific permission is granted, such copying does not, in general, pose a threat to the program's economic exploitation. However, because the success of computer technology is primarily reliant on the simplicity with which programmes may be duplicated, it is straightforward to generate many unlawful copies, whether for personal use, internal usage inside a business organisation, or for open market sale.[6] This is not a problem in terms of the actual application of copyright law, but it does pose substantial difficulties in terms of enforcing it in cases of straight disk-to-disk copying and computer software piracy. Making copies does not require any special equipment, and several copies may be done rapidly and at a low cost. These can then be sold for a fraction of the price of the original. Even extensive software copying within an organisation can have a significant negative impact on the copyright owner's rights from faraway locations.

 In conclusion, to protect themselves from software plagiarism, it is highly recommended to file a copy of the work being protected with the Trademark Copyright Office in the Nigerian Copyright Commission as proof. In foreign countries like the USA for example, software trademark is treated differently from other works. Ensure that the software contains trade secrets to give it patentable flavour where applicable.



[1] The Software IP Detective’s Handbook, Robert Zeidman,

[2] Ibid

[3] Ibid.

[4] Information Technology Law: 5th Edtion, Diane Rowland et al, 2017

[5] Ibid

[6] Ibid.

Artificial Intelligence and Intellectual Property

  Artificial Intelligence and Intellectual Property: A Comprehensive Guide for Lawyers and Non-Lawyers Introduction In recent years, compute...