Introductory Text
Article 1.Object of protection
Article 2.Authorship of computer programs
Article 3.Beneficiaries of protection
Article 4.Restricted acts
Article 5.Exceptions to the restricted acts
Article 6.Decompilation
Article 7.Special measures of protection
Article 8.Continued application of other legal provisions
Article 9.Communication
Article 10.Repeal
Article 11.Entry into force
Article 12.Addressees
Signature
ANNEX I
PART A
PART B
ANNEX II