IP Strategies for Entrepreneurs
By D. C. Toedt III, email: dc@toedt.com
Attorney & arbitrator — tech contracts & IP
1 Class plans
Contents:
- 1.1. First day: Tues. Mar. 16
- 1.2. Trade secrets: Day 2, Thur. Mar. 18
- 1.3. Patents (1): Day 3: Tues. Mar. 23
- 1.4. Trademarks: Day X: Thur. Mar. 25
- 1.5. Litigation: Day 5: Tues. Mar. 30
- 1.6. Copyrights (1): Day 6, Thur. Apr. 01
- 1.7. Contract basics: Day 7, Tues. Apr. 06
- 1.8. License agreements: Day 8, Thur. Apr. 08
- 1.9. Valuation: Day 9: Tues. Apr. 13
- 1.10. Day 10: Thur. Apr. 15
- 1.11. Day 11: Tues. Apr. 20
- 1.12. Day 12: Thur. Apr. 22
- 1.13. Course description
- 1.14. Book
- 1.15. Patent questions
- 1.16. Topics
- 1.17. Resources
- 1.18. Clients - review for transactions
- 1.19. Life cycle
- 1.20. DONE Rice course: Description »
- 1.21. Opinions of counsel
- 1.22. TODO Price points for SaaS - credit card limits etc. - add to Startup Law »
1.1 First day: Tues. Mar. 16
1.1.1 Experiment: Amazon-style meeting approach
Amazon famously runs meetings in a different way imposed by Jeff Bezos; for at least a couple of classes, we're going try a modified version modeled on a variation practiced by Twitter- and Square CEO Jack Dorsey:
To replace the PowerPoint presentations, Bezos created a new way to hold meetings: Meetings start with each attendee sitting and silently reading a “six-page, narratively-structured memo” for about the first 30 minutes of the meeting. [DCT comment: We will typically do just five minutes per class meeting.]
″[The memo is] supposed to create the context for what will then be a good discussion,” Bezos said. [DCT comment: Our discussions will be of specific questions, very often directed to hypothetical situations.]
Those participating are encouraged to take notes [about the document as they read it], and after the reading period is over, they discuss the memo.
Bezos says the reason for the group reading is that “executives will bluff their way through the meeting as if they’ve read the memo because we’re busy and so you’ve got to actually carve out the time for the memo to get read.”
Bezos is not the only CEO to believe in “silent meetings”: Twitter and Square CEO Jack Dorsey uses a similar method, which includes holding meetings that start with 10 minutes of silent reading from a Google Doc.
“Most of my meetings are now Google doc-based, starting with 10 minutes of reading and commenting directly in the doc,” Dorsey tweeted in 2018. “This practice makes time for everyone to get on same page, allows us to work from many locations, and gets to truth/critical thinking faster.”
As for Amazon, before the memo-based meetings were instituted, “we were doing the more traditional thing,” Bezos said. “A junior executive comes in, they put a huge amount of effort into developing a PowerPoint presentation, they put the third slide up, and the most senior executive in the room has already interrupted them, thrown them off their game, asking questions about what is going to be presented in slide six, if they would just stay quiet for a moment…”
He explained that PowerPoint slides often have “obscure information.” Bezos prefers memos, he says, because each have “verbs and sentences and topic sentences and complete paragraphs.” …
Taylor Locke, Jeff Bezos: This is the ‘smartest thing we ever did’ at Amazon (cnbc.com 2019, archived at https://perma.cc/4Z3Z-HGZV).
Quizzes
Final exam
1.1.2 Chat survey: What do you think of as "intellectual property"?
In the Zoom chat, give some examples of what you think
Baseline assumption in U.S.: Information is free for all to copy.
What IS "intellectual property"? Broadly, it's when a non-government party can haul you before a tribunal for doing one or more of the following without permission:
- confidential information:
- "misappropriating" it (Defend Trade Secrets Act),
- violating contractual restrictions
- patented inventions: making, using, selling, offering for sale, importing, rebuilding of claimed subject matter
- original works of authorship:
- trademarks, service marks: using confusingly-similar marks; "dilution"
- "private" information: personal data; biometrics; health; financial
Who could haul you into court and seek damages?
- Private parties
- In the U.S.: federal government agencies, state goverment agencies
- EU, UK, elsewhere
- Internet stuff - Web restrictions, Consumer Review something Act
Reps and warranties in a financing — with the schedules
Right of publicity
False advertising
Constitutional underpinnings
1.1.3 IP law is about litigation
Sandy Sanford about corporate law
1.1.4 IP rights are the exception, not the rule
(This discussion applies to the United States; other countries might be different.)
• Good ideas are presumptively free for all to use.
• "Intellectual property" is largely a social construct, with the courts having rejected a "natural rights" theory of ownership.
In a landmark 1966 opinion, the Supreme Court quoted Thomas Jefferson (who as Secretary of State was in effect the first administrator of the U.S. patent system) as having laid the foundation for American jurisprudence in this area:
He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me.
That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density in any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation.
Inventions then cannot, in nature, be a subject of property. Society may give an exclusive right to the profits arising from them, as an encouragement to men to pursue ideas which may produce utility, but this may or may not be done, according to the will and convenience of the society, without claim or complaint from any body.
VI Writings of Thomas Jefferson, at 180-181 (Washington ed.), quoted in Graham v. John Deere Co. of Kansas City, 383 U.S. 1, 9 n.2 (1966) (emphasis and extra paragraphing added).
BUT there's a big free-rider problem:
- Alice invests big bucks in R&D to develop an innovation
- Alice puts the innovation on the market
- Assume: Bob, Carol, Dave, etc., can cheaply copy (and/or reverse-engineer) Allice's innovation
- The market price quickly goes down to marginal cost of production & distribution
- Alice can't recoup her investment
- Upshot: Investors aren't likely to invest in innovation.
So: Patents and copyrights in the U.S. are limited exceptions to this presumption of free imitation, explicitly written into the Constitution — not as a guarantee to individuals, but as enumerated powers of Congress:
… the federal patent power stems from a specific constitutional provision which authorizes the Congress "To promote the Progress of . . . useful Arts, by securing for limited Times to . . . Inventors the exclusive Right to their . . . Discoveries." Art. I, § 8, cl. 8. The clause is both a grant of power and a limitation.
This qualified authority, unlike the power often exercised in the sixteenth and seventeenth centuries by the English Crown, is limited to the promotion of advances in the "useful arts." It was written against the backdrop of the practices—eventually curtailed by the Statute of Monopolies—of the Crown in granting monopolies to court favorites in goods or businesses which had long before been enjoyed by the public.
The Congress in the exercise of the patent power may not overreach the restraints imposed by the stated constitutional purpose.
Nor may it [Congress] enlarge the patent monopoly without regard to the innovation, advancement or social benefit gained thereby.
Moreover, Congress may not authorize the issuance of patents whose effects are[:]
- to remove existent knowledge from the public domain, or
- to restrict free access to materials already available.
Innovation, advancement, and things which add to the sum of useful knowledge are inherent requisites in a patent system which by constitutional command must "promote the Progress of . . . useful Arts." This is the standard expressed in the Constitution and it may not be ignored. And it is in this light that patent validity requires reference to a standard written into the Constitution.
1.2 Trade secrets: Day 2, Thur. Mar. 18
1.2.1 Additional reading
1.2.2 In-class reading
(This gouge covers U.S. law; other countries are likely to have similar rules.)
Sources of law
1. The Defend Trade Secrets Act is a federal statute.
2. The Uniform Trade Secrets Act has been enacted (sometimes with minor variations) in 48 states, D.C., Puerto Rico, and U.S. Virgin Islands.
Basic definition of "trade secret"
A party claiming that particular informatin is a trade secret must introduce legally-sufficient evidence — and persuade the judge or jury by a preponderance of the evidence — of the following:
- Reasonable efforts were made to maintain confidentiality.
- The information in question "derives independent economic value, actual or potential, from [i] not being generally known to, and [ii] not being readily ascertainable through proper means by, another person [iii] who can obtain economic value from the disclosure or use of the information" — from the Defend Trade Secrets Act definition, 18 U.S.C. § 1839(3).
Some information is disqualified from trade-secret status
Published information can't be a trade secret.
Patented information is (by definition) published.
Three Rules for protecting confidential information
Rule 1: Lock It Up — within reason.
Rule 2. Label It — ditto: Marking of confidential information is important: Courts help those who help themselves, when it comes to protecting confidential information.
Rule 3. "Safe Sex":
- Be choosy about the "partners" to whom you disclose — or from whom you receive — confidential information;
- Use "protection," in the form of a confidentiality agreement ("NDA") OR a no-confidentiality agreement.
Employees and their employers' trade secrets
Employees generally don't need to sign NDAs to be legally obligated to protect their employers' confidential information — the law automatically imposes such an obligation (referred to as an "implied-in-fact" obligation).
But it's a good idea for companies to have their employees sign at least a bare-bones confidentiality agreement (for use as a sound bite).
NDA gouge
1. Two-way NDAs, protecting each party's (eligible) information, are usually better than one-way NDAs that protect only one party's information.
2. Marking: Requiring marking of confidential information (e.g., in an NDA) can be problematic, because compliance isn't always 100%.
Remedies for trader-secret misappropriation
Upon proof of misappropriation, a court might:
- award compensatory damages such as:
- the trade secret owner's lost profits;
- possibly the misappropriator's profits from the infringement ("disgorgement");
- possibly a reasonable royalty;
- award punitive damages;
- injunctive relief, e.g., ordering the misappropriator to stop selling / using the misappropriated information.
(Optional further reading: Marylee Robinson and Neil Eisgruber, Trade Secret Damages: A Look at Available Remedies (2016).
1.2.3 Discussion questions
Baade Company BBQ
FACTS: Alice, an experienced BBQ cook, goes to work for the Baade Company BBQ restaurant and is taught how to make that restaurant's sauces and meat rubs. After working for Baade Company for three months, Alice leaves to take a better-paying job at Crusty Meats, another BBQ restaurant,
Optional reading (totally unrelated): Obituary of Hans Baade (pronounced "BAA-daa"), one of my favorite professors at UT Law.
- QUESTION: Could Baade Company sue Alice for misappropriation of trade secrets? Why or why not?
- QUESTION: Could Baade company sue Crusty Meats for misappropriation? Why or why not?
- QUESTION: What sorts of facts might Baade Company's trial counsel want to put in front of the jury as indirect evidence of misappropriation?
- QUESTION: At trial — with 20-20 hindsight — what sorts of actions might Baade Company wish it had taken earlier to provide more evidence for its trade-secret case?
- QUESTION: If Baade Company were to successfully sue Alice and/or Crusty Meats for misappropriation of trade secrets, what might the court order as "remedies" for the misappropriation?
DIFFERENT FACTS: The experienced BBQ cook leaves Baade Company and opens her own BBQ restaurant. She uses her own, different recipes but closely copies the architecture and kitchen-equipment layout of the Baade Company restaurant.
- QUESTION: Could Baade Company successfully sue for misappropriation of trade secrets?
- Optional reading: Taco Cabana Int'l, Inc. v. Two Pesos, Inc., 932 F.2d 1113, 1123 (5th Cir. 1991), aff'd as to trade-dress issue, 505 U.S. 763 (1992). See especially the Fifth Circuit's discussion of the standard of review, i.e., how little latitude an appellate court has in reviewing a jury verdict.
Sports plays as trade secrets
Consider sports plays:
- QUESTION: In basketball, would a pick-and-roll play be considered a trade secret? Why or why not?
- Would the Houston Rockets' playbook be considered a trade secret? How about the Los Angeles Dodgers' pitcher-catcher hand "signs"? (Too soon?)
Optional reading: Rice Ferrelle, Combating the Lure of Impropriety in Professional Sports Industries: The Desirability of Treating a Playbook as a Legally Enforceable Trade Secret, 11. J. Intell. Prop. L. 149, parts III, IV (2003).
A locksmith case
FACTS:
- For a popular line of keyed locks, duplicate keys can be made by "reverse engineering" the tumbler combinations (something locksmiths can do).
- A locksmith reverse-engineers the tumbler combinations for that line of keyed locks and publishes a book of the combinations, allowing locksmiths to make duplicate keys for the locks.
- The manufacturer of the line of locks sues for misappropriation of trade secrets.
- QUESTION: What result?
- Optional reading: Chicago Lock Co. v. Ely, 676 F.2d 400, 403-04 (9th Cir. 1982).
1.3 Patents (1): Day 3: Tues. Mar. 23
Hat tip: A number of the references below are from the syllabus for an undated course taught by Bryce Pilz, then a clinical assistant professor at Michigan Law and now director of licensing for the University of Michigan tech-transfer operation.
Overview of a patent (six-minute video)
How to read a patent in 60 seconds for a quick check whether you, or someone else, is infringing it.
USPTO flowchart: Obtaining a (utility) patent
Product testing as a possibly infringing use
Do a patent search
Claim-drafting exercise
Patents
U.S. Patent No. 8,281,245, “System and method of preparing presentations,” issued October 2, 2012, and assigned to Google, Inc.
How long did it take for this patent to be issued?
How many "independent" (standalone) claims does this patent have?
Is this patent still in force?
What is an obvious difference between claim 1 and claim 13?
Which would be easier for Google's lawyers to prove was infringed by an accused infringer: Claim 1, or claim 2?
Why do you think Google's lawyers included claim 24?
Jan & Dean want to hold back "secret sauce" from their patent application — can they?
If they do, but managed to get a patent, could their concealment result in their patent being invalidated?
Inequitable conduct.
- PATENT LAW
- Patent Protection for Inventions
- Introduction—28 U.S.C. §§ 1295 & 1338
- Patentable Subject Matter—35 U.S.C. §§ 100, 101, 161 & 171
- Utility Patents
- Products pp. 395 – 412 (inc. n.1)
ii. Processes pp. 436-41 (inc. n.3) iii. Utility Requirement pp. 444-50 (7)
- Design Patents pp. 453–62
(Week 7)
- Novelty Requirement—§ 102 (both pre- and post-AIA)
- Overview and Basic Structure pp. 465-472
- Section 102 Public Prior Art pp. 472–82
- “Known or Used” or in “Public Use”
ii. “Described in a Printed Publication” pp. 482–501 iii. “On Sale” iv. Patented
- First to File—post-AIA § 102 pp. 501–03
- Other Obstacles and Issues in § 102—pre-AIA § 102(e)-(f)
(Week 8)
- Novelty of Design Patents brief class disc’n
- Nonobviousness Requirement—§ 103 pp. 520-46
- The Written Specification § 112 pp. 548-54
- Inventorship, Ownership and Prosecution
- Inventorship and Ownership pp. 555-700
- Nature of Inventorship - § 116
- Rights of Joint Owners - §§ 261-62
- Invention by Employees
- Processes for Obtaining a Patent pp. 577-88
- Patent Term - § 154(a)
(Week 9)
- Patent Infringement
- Literal Infringement § 27(a) – (c) pp. 589-609
- Infringement by Equivalents
5
- Infringing Activities pp.621-35
- Direct Infringement
- Contributing or Inducing Infringement § 271(b)-(c)
- Cross-Border Infringement § 271(f)-(g) pp. 637, 645-48
- Infringement of Design Patents brief class discussion
(Week 10)
- Defenses & Remedies
- Defenses
- Invalidity § 282(a)-(b) pp. 658-60
- Exhaustion pp. 660-69
- Good Faith Prior Use § 273 pp. 679-82
- Estoppel and Laches
- Infringement Adjudication 28 U.S.C. § 1400(b) pp. 684-87
- Remedies
- Injunctions - § 283 pp. 692-97
- Monetary Relief - §§ 284-86 & 287(a) pp. 705-09
Who is the inventor? What, in your own words, does this invention do? How long did it take the Patent Office to issue this patent after it was filed? For whom does M. Jordan work and what role did he or she play with regard to this patent? For whom does Frank J. Dykas work, and what role did he play with regard to this patent? Is this patent still in effect? Which parts of this patent document are the specification? Which part are the claims? How many claims does this patent have? What is the difference between claims 1 and 2 on the one hand and claim 3 on the other? Don’t they end up describing the same thing? (Hint: no.) If Maine’s game laws prohibit the use of live earthworms as bait, what effect does this patent have on fishing in Maine? Which of the following items would infringe this patent, if manufactured and sold by the defendant during the patent’s term? Aluminum boxes that contain sharp-grained sand with a grain size of 1/25 of an inch? Aluminum boxes that contain sharp-grained sand with a grain size of 1/10 of an inch? Aluminum boxes that contain mud? Empty open-topped rectangular aluminum boxes, with a length slightly less than the width of a bait box, lips at ech end that are the right shape to attach to the top edges of a bait box, and a detatchable plastic cover? If Doug Defendant is fishing on a beach whose sand is sharp-grained with a grain size of less than 1/20 of an inch, and Doug rolls earthworms in the sand on the beach, would Doug infringe this patent?
1.4 Trademarks: Day X: Thur. Mar. 25
Registrations - use-based, ITU
Anti-dilution
Internet domain names
Not going generic: The Atlantic article (h/t: Prof. Eric Goldman).
- The Nature & Function of Trademarks
- Introduction pp. 35–41
- Validity of Marks–Spectrum of Distinctiveness pp. 41–54
- Descriptive Marks & Secondary Meaning pp. 55–61
15 U.S.C. § 1052
- Surnames pp. 61–66
- Trade Dress
- In general pp. 67–70
(Week 2)
- Some specific types of trade dress pp. 71–82
- Functionality pp. 82–98
- Establishing Trademark Rights
- Common Law Trademark Use pp. 99–117
2.Federal Trademark Registration §§ 1051(a)-(b), 1052(d), 1057(c), 1062(a)–(b), 1063, 1065, 1115(b) 3.Federal Registrations, cont’d pp. 149–54 §§ 1051(d), 1052, 1053, 1054, 1057(a)–(b), 1072 (Week 3)
- Causes of Action
- Infringement via Likelihood of Confusion pp. 155–82
§§ 1114(1), 1121(a), 1125(a)
- Dilution § 1125(c) pp. 215–23
- Cybersquatting § 1125(d) pp. 223–28
3 (Week 4)
- Defenses and Limitations—§ 1115
- Descriptive Fair Use—§ 1115(b)(4) pp. 229–38
- Nominative Fair Use
- Abandonment—§ 1115(b)(2); definition in § 1127 pp. 238 - 48
- Comparative Advertising pp. 248–62
- Used or Reconditioned Goods/First Sale
- First Amendment / Freedom of Speech
- Functionality—§ 1115(b)(8) [see II.A.5.c. above]
- Secondary Liability & Remedies
- Secondary Liability pp. 263–80
- Remedies—§§ 1116(a) & 1117 pp. 281–84
RIGHT OF PUBLICITY AND FALSE ENDORSEMENT
- Nature and Scope— Rest. (3d) of Unfair Comp. §§ 46–49 pp. 287–303
- Limitations pp. 303–17
1.5 Litigation: Day 5: Tues. Mar. 30
1.6 Copyrights (1): Day 6, Thur. Apr. 01
1.6.1 Gouge
What does copyright allow you to sue — or be sued — for doing?
Under copyright law, making copies; distributing copies; creating "derivative" works; public display or -performance
1.6.2 Reading
Fair use
Fair use: Eric Goldman cheat sheet. Two Live Crew
Originality
Fixation requirement
1.6.3 Discussion questions
Fixation requirement: Grimmelmann course notes - search for "Fixation questions"
Duration of copyright:
Wikipedia, Copyright Term Extension Act
Josh H. Escovedo, Disney’s Influence on United States Copyright Law
Stephen Fishman, When Do You Need a Copyright Notice on Software (Nolo.com)
VI. COPYRIGHT LAW
- Subject Matter of Copyright - 17 U.S.C. §§ 102-103 pp. 729-35
- Fixation Requirement pp. 751-52
- Original Works of Authorship pp. 736-50
- Originality pp. 762-75; 785-86
- Distinguishing Expression from Ideas & Facts pp. 801-08;
811-17
- Useful Articles pp. 848-61
- Subject Matter Excluded Due to Origin pp. 867-68
- Establishing Rights
- Ownership § 201, 202, 204 pp. 871 – 90
- Joint Works
- Works made for hire
- Formalities & Publication – § 401, 408(a), 411(a) read stats, class
discussion
- Copyright Term – § 302-305 (skim)
(Week 12)
- Exclusive Rights and Limitations
- Section 106
- Reproduction § 106(1) pp. 965-81
- Preparation of Derivative Works § 106(2) p. 981; 988-
93 6
- Public Distribution
- Scope of the Right § 106(3) pp. 993-99
ii. First Sale Limitation § 109(a)-(b)(1) pp. 1037-46 (Week 13)
- Public Performance pp. 999-1000
- Scope of the Right § 106(4) pp. 1004-05;
1009-23 ii. Limitations § 110 (skim); § 114(a)-(c) pp. 1064-65
- Public Display
- Scope of the Right § 106(5)
ii. Limitations §§ 109(c); 110
- Limited Rights for Sound Recordings - § 106(6)pp. 1028-30
- Section 106A Moral Rights [TBD if time permits] - § 106A [for expand
fair use time]
- Fair Use – § 107 pp.1095-
1128 [Helpful for practice analysis: pp. 1129-31, nn.8-12] (Week 14)
- Infringement
- Concept of Infringement §§ 501, 506(a), 602-603 pp. 1143-49
pp. 1158-50 (last paragraph) pp. 1159-93
- Prima Facie Case
Do you need a copyright notice?
When does it make sense to register your copyright?
How long does copyright protection last?
What kinds of things can be subject to copyright protection?
What does a proper copyright notice look like?
What date do you use for updated versions of software?
Can graphics be copyrighted?
Can slogans be copyrighted? (Trademark instead.)
What does it mean to "copyright" something? (Careful: Trick question.)
Employees
1.7 Contract basics: Day 7, Tues. Apr. 06
Contract basics
1.8 License agreements: Day 8, Thur. Apr. 08
License agreements
1.9 Valuation: Day 9: Tues. Apr. 13
Valuation
1.10 Day 10: Thur. Apr. 15
1.11 Day 11: Tues. Apr. 20
1.12 Day 12: Thur. Apr. 22
1.13 Course description
This course provides a practical, business-oriented overview of three important strategic considerations for a new enterprise: (1) identifying and monetizing the business's potential intellectual property ("IP"); (2) identifying and addressing with other people's IP-ownership claims, including data-privacy considerations; and (3) long-term planning for a liquidity event.
1.14 Book
1.15 Patent questions
- QUESTION: In U.S. law, what types of event will start the one-year clock running on the right to apply for a patent?
- FACTS: Dick and Jane, both Rice entrepreneurship students, have an idea for an inexpensive way to convert a breathalyzer so that it will detect, not alcohol, but SARS-CoV-2 (the virus that causes COVID-19). They consult a patent attorney about applying for a patent.
- TRUE OR FALSE: Dick and Jane would need to obtain a patent before putting their new "Viralyzer™" on the market in the United States. Explain.
- TRUE OR FALSE: Dick and Jane could set up an operation in Sugar Land to buy existing breathalyzers and the needed other materials; convert the breathalyzers to SARS-CoV-2 detectors; and sell them under the "Viralyzer" brand name; government approval won't be needed because the Viralyzer is simply a variation on existing breathalyzers. (Hint: See here; scroll down to "Step 1.")
- DIFFERENT FACTS: Suppose that Dick and Jane's Viralyzer was a software app, running on a smartphone, that took a picture of the user's eyes and used artificial intelligence ("AI") to make an educated guess whether the user had SARS-CoV-2.
- TRUE OR FALSE: Because the Viralyzer is software and not hardware, it's not subject to FDA regulation as a medical device. (Hint: See here.)
- MORE FACTS:
- Dick and Jane finish a working, proof-of-concept viralyzer and begin fundraising to finance clinical trials, manufacturing, and the legal work needed for patent protection.
- At their first investor roadshow on March 31, 2021, Dick and Jane intend to demonstrate how their viralizer works (using simulated viruses) and explain the device's workings to the attenders. This will be their first disclosure of the viralyer to anyone.
- QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any U.S. patent rights they might have? (Hint: See 35 U.S.C. § 102(a)(1) and (b)(1).)
- MORE FACTS: Dick and Jane do their first roadshow presentation. At the request of one of the prospective investors, on April 1, Dick and Jane post their slide deck as an attachment to a blog posting about the viralyzer; the slide deck contains detailed information about how to make and use the viralyzer.
- QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any U.S. patent rights they might have?
- QUESTION: To be on the safe side, by what date should Dick and Jane file a U.S. patent application in order to preserve any non-U.S. patent rights they might have?
- DIFFERENT FACTS: No investor roadshow, but to get FDA approval, Dick and Jane must run large-scale clinical trials — and they're unlikely to get all the participants to sign confidentiality agreements.
- QUESTION: What could Dick and Jane do to reduce the chances that their clinical trials would be found to be a "public use" that started the one-year clock running on their U.S. patent-filing to preserve U.S. rights? (Hint: See this article.)
1.15.1 Exactly What Is a Patent?
A patent is a Government document that announces:
- that the inventor has submitted a patent application, containing a written disclosure of what the inventor believes to be a new invention,
- that a patent examiner has reviewed the patent application and made a determination that the application and the invention appear to meet certain legal criteria, and
- in exchange for submitting the invention for publication in a patent, the Government has granted the inventor certain rights, for a limited period of time, in the invention as claimed.
What is a Patent?
- Limited grant of right to exclude others
- Bargain between inventor and government
- Not a “permit” to use the invention
- Rights defined by claims
- Competitors have rights, too
A patent gives the owner the right to exclude others from making, using, offering for sale, and selling the invention described and claimed in the patent. The statute provides that:
Every patent shall contain . . . a grant to the patentee, his heirs or assigns, of the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States, and if the invention is a process, of the right to exclude others from using, offering for sale or selling throughout the United States, or importing into the United States, products made by that process . . . .
Some noteworthy points about patents:
(i) A patent gives the inventor the right to exclude, not the right to practice the invention. A patent is not like a fishing license or a building permit: an inventor does not need a patent to be able to practice his or her invention — although other authorizations might be required, and in fact the inventor might violate the law by practicing the invention.
Every patent contains a grant to the owner of the right, for a limited period of time, not to practice the invention him- or herself, but instead to exclude others from making, using, selling, offering to sell, or importing the specific sub-ject matter described by the claims of the patent in the United States.
(ii) An inventor’s competitors can freely copy and use an un-patented invention. If a new product has been made public (for ex-ample, by putting it on sale or by publishing information about it), then others have the right to freely copy and use the product (but not necessarily to copy any subject matter that is protected by other patents or by copyright), without any obligation to its inventor, unless and until a patent is issued that covers the product.
Why Competitors Have the Right to Copy Unpatented Inventions
- Free competition is the rule in the U.S.
- Competitors’ copying of unpatented, publicly-available technology benefits the public
- Gives inventors an incentive to develop patentable inventions
There are several reasons for this rule. For example, free competition in the marketplace is the rule in the United States, and competitors are encouraged to copy unpatented, publicly available technology, because that benefits the public by disseminating new ideas.
See, e.g., Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 151, 164-65, 160, 109 S. Ct. 971, 977-78, 984-85 (1989) (holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law; “[t]he novelty and nonobviousness requirements of patentability embody a congressional understanding, implicit in the Patent Clause itself, that free exploitation of ideas will be the rule, to which the protection of a federal patent is the exception. Moreover, the ultimate goal of the patent system is to bring new designs and technologies into the public domain through disclosure.”).
In addition, this rule gives inventors an incentive to develop inventions that meet the rigid criteria for patentability – if an inventor develops an invention that falls short of those criteria, or if he does do not go through the procedures for obtaining a patent, then he will not be able to stop competitors from copying the invention.
See id., 489 U.S. at 160, 109 S. Ct. at 982 (“the competitive reality of reverse engineering may act as a spur to the inventor, creating an incentive to develop inventions that meet the rigorous requirements of patentability”).
§ 3.3 Legal Basis for Software- and Internet Related Patents [a] The Patent Statute Allows Useful “Processes” to be Patented The Patent Act of 1952 provides that: Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement there-of, may obtain a patent therefor, subject to the conditions and requirements of this title. 35 U.S.C. § 101 (emphasis added).
The term “process” means process, art or method, and includes a new use of a known process, machine, manufacture, composition of matter, or material. 35 U.S.C. § 100(b) (emphasis added). The Supreme Court has held that, with certain exceptions, the statutory language was in-tended to “include anything under the sun that is made by man.” Diamond v. Chakrabarty, 447 U.S. 303, 309 (1980) (affirming CCPA reversal of Patent and Trademark Office (PTO) refusal to grant patent for new genetically-engineered organism; citation to legislative history omitted).
§ 3.4 Substantive Requirements of Patentability While software- and e-commerce inventions can be patented more readily than before (at least in the United States), not all such inventions meet the substantive requirements for patentabil-ity. It is probably safe to say that the majority of patent applica-tions filed are rejected for failure to meet the patentability re-quirements set out in U.S. law. [a] The Enabling-Disclosure Requirement By statute, a patent application must include an “enabling” disclosure of how to make and use the invention, as well as a dis-closure of the “best mode” known to the inventor of practicing the invention. See 35 U.S.C. § 112, first paragraph.
An “enabling” disclosure in a patent application is one that will allow persons skilled in the art to make and use the invention without undue experimentation. See 35 U.S.C. § 112 (requiring enabling, best-mode disclosure of how to make and use invention); see generally, e.g., In re Hayes Microcomputer Products, Inc., Patent Litigation, 982 F.2d 1527 (Fed. Cir. 1992) (affirming jury verdict of infringement of patent relating to modem guardtime escape sequence and rejecting enablement- and best-mode challenge; “an inventor is not required to describe every de-tail of his invention”); Northern Telecom, Inc., v. Datapoint Corp., 908 F.2d 931, 940-43 (Fed. Cir. 1990) (reversing trial court finding of lack of enablement for failure to disclose source code of computer program, but affirming finding of failure to disclose best mode of magnetic tape cassette used for program and data storage).
[b] The Best-Mode Disclosure Requirement
A “best mode” disclosure in a patent application relates to the best way known to the inventor of practicing the claimed subject matter at the time of filing the patent application. For example, if one of the claims in the application is directed to implementing a new software technique on a specific platform, then a disclosure of all points of “cleverness” relating to that specific implementation may be required. See the enablement cases cited supra; cf. Consol-idated Aluminum Corp. v. Foseco Int’l, Ltd., 910 F.2d 804 (Fed. Cir. 1990) (affirming holding of inequitable conduct and resulting unenforceability of patent where patentee found to have concealed best mode intentionally).
On the other hand, if the claims are general in nature and applicable across a wide range of hardware — i.e., if they are not specific to any particular machine, operating system, etc. — then disclosure of specific implementation techniques may not be re-quired. In particular, there is no rule that the details of a specific commercial implementation be disclosed; “[t]he focus of a sec-tion 112 inquiry is not what a particular user decides to make and sell or even in what field the invention is most likely to find suc-cess. Rather, in keeping with the statutory mandate, our prece-dent is clear that the parameters of a section 112 inquiry are set by the CLAIMS.” Zygo Corp. v. Wyko Corp., 79 F.3d 1563, 1567 (Fed. Cir. 1996) (affirming judgment that patent was not invalid for failure to disclose best mode) (emphasis in original).
[c] No Requirement to Disclose Source Code Patent application drafters and their clients frequently must confront the question whether to include in an application the source code of a computer program used in the invention. While the case law was unclear at first, technically the answer now ap-pears to be “no”; the Federal Circuit has held several times that there is no hard and fast requirement for a source-code disclosure. “[W]hen disclosure of software is required, it is generally sufficient if the functions of the software are disclosed, it usually being the case that creation of the specific source code is within the skill of the art.” Robotic Vision Systems, Inc. v. View Eng’g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997) (reversing summary judgment of inva-lidity; holding that patent’s disclosure of functions was adequate and that disclosure of source code was not necessary for compliance with best mode requirement), citing Fonar Corp. v. General Electric Co., 107 F.3d 1543 (Fed. Cir. 1997) (same). Disclosure of source code can still be a good idea, however, as discussed in § 3.5[d][2]. [d] The Claims Define the Protectable Invention The last section of a patent contains the claims, which define the patented invention in words. There is no infringement of a patent unless the accused product (or process) is “covered” by at least one claim of the patent. Any similarities or dissimilarities between the description in the patent and the accused product are irrelevant, because “[t]he written description part of the specifica-tion itself does not delimit the right to exclude. That is the func-tion and purpose of claims.” Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995) (in banc), aff’d, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Sev-enth Amendment does not require jury trial of disputes over proper interpretation of patent claim). Each claim sets forth a number of checklist-like elements. To prove infringement, a patent owner must show that every element of at least one claim is present in the accused product or process. (In a patent claim, less is more: A claim that has very few elements will be satisfied – i.e., infringed – by more things than will a claim that has more elements.) Three hypothetical examples of patent claims are set out in the inset below.
- [Independent claim] A chair compris-ing:
(a) a seat; and (b) at least three legs extending downward from the seat.
- [Dependent claim] The chair of claim 1, further comprising a fourth leg extending downwardly from the seat.
- [Dependent claim] The chair of claim 2, further comprising a back.
Hypothetical Examples of Patent Claims [e] The Novelty Requirement One of the most important checks and balances in the patent system is that a patent cannot be granted on an invention that had already been invented. Even an independent reinvention of something that was already known is unpatentable by law. See 35 U.S.C. § 102 (categories of “prior art” that can preclude patent-ability of an invention). The underlying policy is that technology that is already available to the public should not be taken away from it by the granting of exclusionary rights. See, e.g., Graham v. John Deere & Co., 383 U.S. 1, 6 (1966). If a patent claim — which was described above as a list of el-ements or method steps that serves to define the claimed invention in question — is satisfied or “met” by technology that was already known in the art, then the claim is unpatentable. In the parlance of the patent bar, the claimed subject matter is “anticipated.” • For example, if someone else invented the subject matter first, and did not abandon, suppress, or conceal it, then the second inventor is not entitled to a patent (whether or not the first inven-tor is or might have been so entitled). See 35 U.S.C. § 102(g). • If the claimed subject matter was patented or described in a printed publication anywhere in the world, or known or used by others in this country, before the inventor invented it, then it is unpatentable to that inventor. See 35 U.S.C. § 102(a). [f] “Obvious” Subject Matter is Unpatentable Even if a single prior-art reference does not completely satisfy a patent claim’s list of elements, the claim may still be unpatent-able. The patent statute provides that if the claimed subject mat-ter would have been “obvious” in view of what was already known, the claim is unpatentable. See 35 U.S.C. § 103 (statutory re-quirement of nonobviousness). A useful discussion of a variety of obviousness-related issues can be found in WMS Gaming, Inc. v. Int’l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that pa-tent on slot machine using computer-simulated spinning reels was not invalid for obviousness). [1] Measuring the Claimed Subject Matter Against the “Prior Art” In evaluating the nonobviousness of a claimed invention, the ultimate question is whether the prior activities and publications of others would have made the claimed invention obvious to a hy-pothetical person of ordinary skill at the time it was invented. The phrase “hypothetical person of ordinary skill” is an important one. What counts is not what would have been obvious to the inventor (who may be of far greater – or lesser – skill than those of ordinary skill), but instead what would have been obvious to those who were practicing the art or arts in question. See generally, e.g., Cus-tom Accessories, Inc., v. Jeffrey-Allan Industries, Inc., 807 F.2d 955, 962 63 (Fed. Cir. 1986) (factors involved in determining level of or-dinary skill); Bausch & Lomb, Inc., v. Barnes-Hind/Hydrocurve, Inc., 796 F.2d 443, 447 (Fed. Cir. 1986) (inventor’s subjective be-lief of obviousness not dispositive of the issue). A shorthand metaphor sometimes used by the courts is: Con-sider a worker of “ordinary” skill in his workshop. Hanging on the workshop walls are all the prior patents, publications, known de-vices, etc., that such a worker might consult and study if he were diligently researching a problem and how to solve it. Assume that this worker is familiar with all of these materials. The worker is assumed to be an ordinary worker and not someone who seeks to innovate. See Standard Oil Co. v. American Cynamid Co., 774 F.2d 448, 454 & n.3 (Fed. Cir. 1985), citing In re Winslow, 365 F.2d 1017 (CCPA 1966), and In re Antle, 444 F.2d 1168 (CCPA 1971). Generally speaking, the question is: would these materials have suggested or taught, to such a worker, the subject matter that is being claimed by the patent owner, as set forth in the claim’s checklist of elements? If so, the claimed subject matter would have been obvious and is unpatentable to the claimant; otherwise not. E.g., ACS Hospital Systems, Inc., v. Montefiore Hos-pital, 732 F.2d 1572, 1577 (Fed. Cir. 1984). The Supreme Court laid down the basic analytical require-ments for determining nonobviousness in Graham v. John Deere & Co., 383 U.S. 1 (1966). A decisionmaker inquiring into the nonob-viousness question must ascertain (1) the scope and content of the prior art; (2) the level of ordinary skill in the art; and (3) the differ-ences between the prior art and the claimed subject matter as a whole. Giving due weight to any circumstantial evidence, the deci-sionmaker must rule whether the claimed subject matter would have been obvious. See id. at 17 18; Panduit Corp. v. Dennison Mfg. Co., 810 F.2d 1561, 1567 (Fed. Cir. 1987). The ultimate question of obviousness is one of law. Panduit, 810 F.2d at 1566 67. [2] The Difficulty of Combining Multiple Prior Art References Allegations of obviousness are frequently based on combina-tions of prior-art references. The argument usually goes something like this: “Reference A says this, and Reference B says that. If we combine these two references, between them they disclose the complete patented invention, so the patent is invalid.” Legally that can be a tough argument to sell, because it relies on a hindsight reconstruction of the claimed invention. As the Federal Circuit summed up in WMS Gaming: When an obviousness determination relies on the combination of two or more references, there must be some suggestion or motivation to combine the references. The suggestion to combine may be found in explicit or implicit teachings within the references themselves, from the ordinary knowledge of those skilled in the art, or from the nature of the problem to be solved. “When determining the pa-tentability of a claimed invention which combines two known elements, ‘the question is whether there is something in the prior art as a whole to suggest the desirability, and thus the obviousness, of mak-ing the combination.’” WMS Gaming, 184 F.3d at 1355 (citations omitted). [3] The Importance of Circumstantial Evidence of Nonobviousness Evaluating the obviousness of an invention in retrospect can be difficult. As noted above, the courts have held that hindsight is not the proper perspective — hindsight reconstruction of the claimed invention, “using `the patent in suit as a guide through the maze of prior art references, combining the right references in the right way so as to achieve the results of the claims in suit,’“ is im-permissible. Grain Processing Corp. v. American Maize-Products Corp., 840 F.2d 902, 907 08 (Fed. Cir. 1988) (citation omitted). Once the invention is known, however, by definition a certain am-ount of hindsight is involved. Add to this difficulty the fact that judges and juries are frequently untrained in technological mat-ters. Consequently, the courts attempt to look at “objective” evi-dence, which can aid in deciding the obviousness question by view-ing it through the eyes of others. Nonobviousness can be (but is not necessarily) objectively indicated in a number of ways: • Commercial success that is linked with the specific sub-ject matter being claimed by the inventor; • accolades from others in the field; • initial skepticism on the part of those skilled in the art; • satisfying a long-felt need; • solving a problem that had stumped others; • licenses showing industry respect. See, e.g., WMS Gaming, 184 F.3d at 1359-60 (citing cases). Such evidence can rebut a prima facie showing that the prior art would have rendered the claimed invention obvious. See id.. Such evidence often can be the most probative evidence of the nonobvious-ness of the claimed subject matter. See Ashland Oil, Inc., v. Delta Resins & Refractories, Inc., 776 F.2d 281, 306 (Fed. Cir. 1985); Stratoflex, Inc., v. Aeroquip Corp., 713 F.2d 1530, 1538 39 (Fed. Cir. 1983). Commercial success can have particularly strong probative value as evidence of nonobviousness. See, e.g., Simmons Fastner, 739 F.2d at 1576. Commercial success implies that there was money to be made with the invention. If the invention in fact was obvious, the chances are that someone would have done it before. Since by hypothesis the invention is novel (otherwise for that rea-son alone it would be unpatentable), commercial success therefore indicates that the invention also was nonobvious. Objective evidence has no probative value, however, unless the patent owner shows a nexus between the secondary considera-tions offered and the merits of the claimed invention. See, e.g., WMS Gaming, 184 F.3d at 1359 (citing cases); Simmons Fastner, 739 F.2d at 1575. For example, commercial success is not shown merely by gross sales figures without proof of market share; fur-thermore, the commercial success must be shown “to have in some way been due to the nature of the claimed invention, as opposed to other economic and commercial factors unrelated to the technical quality of the patented subject matter.” Cable Electric Products v. Genmark, Inc., 770 F.2d 1015, 1026 27 (Fed. Cir. 1985). Com-mercial success may be due to other factors such as extensive ad-vertising or the patent owner’s preexisting leadership in the mar-ketplace. See Pentec, Inc. v. Graphic Controls Corp., 776 F.2d 309, 316 (Fed. Cir. 1985). As the Federal Circuit said in reversing a ju-ry verdict of nonobviousness:
Commercial success is relevant only if it flows from the merits of the claimed invention. . . . [A]ll the ev-idence was to the effect that its commercial popu-larity was due to . . . a feature not claimed. Thus, the jury was not entitled to draw the inference that the success of [the device] was due to the merits of the claimed invention. Sjolund v. Musland, 847 F.2d 1573, 1582 (Fed. Cir. 1988) (em-phasis in original).
Similarly, the fact that others have taken licenses under the patent will not be probative when there is no evidence relating that fact to “the inclusion of the claimed features” of the patented invention. Medtronic, Inc., v. Intermedics, Inc., 799 F.2d 734, 740 (Fed. Cir. 1986). Nonobviousness is not shown when licensees take licenses out of a desire to avoid the costs of litigation instead of in acknowledgement of the validity of the patent claims. Pentec, 776 F.2d at 316.
Objective evidence of nonobviousness will not always serve to save a patent from invalidation. See, e.g., FMC Corp. v. Hennessy Industries, Inc., 836 F.2d 521, 527 (Fed. Cir. 1987); EWP Corp. v. Reliance Universal, Inc., 755 F.2d 898, 907 08 (Fed. Cir. 1985). The absence of such evidence, however, does not establish the obviousness of the invention and is only a “neutral” factor. E.g., Custom Accessories, 807 F.2d at 960; Medtronic, 799 F.2d at 739 n.13.
§ 3.5 Building a Company’s Software- or Internet Patent Portfolio [a] Why Build a Portfolio One school of thought that says that when it comes to patents in a portfolio, more is better. Jay Walker, of Priceline.com fame, apparently belongs to that school; his company, Walker Asset Management Limited Partnership, is listed as the assignee of doz-ens of issued patents purportedly covering various aspects of e-commerce. Priceline.com itself said in a January 2000 press re-lease (available on its Web site) that it had been notified of the al-lowance of its seventh patent and that it had filed some 25 patent applications dating back to 1996. Some of the potential benefits of a patent portfolio include: • A portfolio gives its owner something to bargain with if a competitor (or other company) comes knocking at the door, asserting its own patents. • An issued patent constitutes prior art as against any subsequent patent applicants, thus serving as a de-fensive publication for the issued patent’s owner. • A patent on a company’s key technology may help at-tract attention in the marketplace. [b] Consider Filing Lots of “Provisional” Patent Applications Software and e-commerce companies interested in building a patent portfolio should consider adopting a Darwinian approach to building a patent portfolio: File cheap and informal provisional patent applications for as many inventions as practicable. The comp
1.16 Topics
1.16.1 Defending against a patent-infringement suit
Find prior art
Show noninfringement
Attack on § 101 grounds - use Google patent as an example
1.16.2 Patent misuse
Reading: Princo Corp. v. Int'l Trade Com'n, part II-A, 616 F.3d 1318, beginning at 1326 (Fed. Cir. 2010) (en banc).
1.16.3 Antitrust
Intellectual property rights do not confer a privilege to violate the antitrust laws. However, antitrust laws also do not negate the patentee's right to exclude others from infringing its patent. A party is ordinarily excempt from antitrust liability for bringing a lawsuit against a competitor. That principle is known as Noerr-Pennington immunity.
For an antitrust claim to stand,
- there must be a patent right that is coupled with violations of 15 U.S.C. § 2 [Sherman Act section 2, prohibiting monopolization], and
- the elements of violation of § 2 must be met.
Indeed, a patent owner who brings suit to enforce the statutory right to exclude others from making, suing, or selling the claimed invention is exempt from the antitrust laws, even though such a suit may have an anticompetitive effect, unless the infringement defendant proves one of two conditions.
First, he may prove that the asserted patent was obtained through knowing and willful fraud within the meaning of Walker Process Equipment, Inc. v. Food Machinery & Chemical Corp., 382 U.S. 172, 177 (1965).
Or he may demonstrate that the infringement suit was a mere sham to cover what is actually no more than an attempt to interfere directly with the business relationships of a competitor
Esco Corp. v. Cashman Equipment Co., No. 2:12-cv-01545, part II.A.3 (D. Nev. Jan. 26, 2016).
From Fed. Cir.:
A party is ordinarily exempt from antitrust liability for bringing a lawsuit against a competitor. That principle is known as "Noerr-Pennington immunity" ….
There is a recognized exception to Noerr-Pennington immunity for "sham litigation," which the Supreme Court has defined as litigation that (1) is "objectively baseless in the sense that no reasonable litigant could realistically expect success on the merits" (the objective element), and (2) is motivated by a desire "to interfere directly with the business relationships of a competitor" (the subjective element).
Tyco Healthcare Group LP v. Mutual Pharma. Co., 762 F. 3d 1338, 1343 (Fed. Cir. 2014) (not verbatim).
1.16.4 Inequitable conduct
Inequitable conduct arises when a patent applicant, or its representative, engages the PTO with a lack of candor, good faith, or honesty. Molins PLC v. Textron, Inc., 48 F.3d 1172, 1178 (Fed. Cir. 1995); see also 37 C.F.R. § 1.56. It is considered the "atomic bomb" of patent law because "inequitable conduct regarding any single claim renders the entire patent unenforceable." Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d 1276, 1288 (Fed. Cir. 2011). Inequitable conduct cannot be cured by reissue or reexamination, and "the taint of a finding of inequitable conduct can spread from a single patent to render unenforceable other related patents and applications in the same technology family."[2] Id.
To successfully plead inequitable conduct, the accused infringer must allege facts showing the plausibility of "but-for materiality" and "specific intent to deceive the PTO." Id. at 1290; Exergen, 575 F.3d at 1327 n.3. As stated, the pleader must identify "the specific who, what, when, where, and how of the material misrepresentation or omission committed before the PTO." Exergen, 575 F.3d at 1327. "The relevant `conditions of mind' for inequitable conduct include: (1) knowledge of the withheld material information or of the falsity of the material misrepresentation, and (2) specific intent to deceive the PTO." Id. And while pleading on "information and belief" is permitted under Rule 9(b), the pleading must set forth "the specific facts upon which the belief is reasonably based." Id. at 1330. There must be some factual assertion that the individual decided to "deliberately withhold [a material reference] from the relevant examiner." Id. at 1331. Gross negligence will not suffice. Therasense, 649 F.3d at 1290.
ESCO CORPORATION v. CASHMAN EQUIPMENT COMPANY, Dist. Court, D. Nevada 2016
1.16.5 Notes from Evernote musing 3/6/21 late evening, w/ additions
- Bankruptcy - licensor or licensee
Financing
- Security interest in IP?
Copyright
What can be "copyrighted"
How long does copyright last
Who is the "author"
- Recapture rights for copyright
Royalties
- Royalty stream - record keeping, audit rights
Assignability
Hiring new talent
- Export restrictions
- Former employers
- Invention assignment agreement
- Joint development agreement
- License - out, in
- FOCUS ON RESOURCES?
- Talent
- Secrets
- Authorship
- Inventions
- Data
- Non-rivalrous
- How to stop others from using yours
- Deadlines - patent, copyright
- Monitoring
- How to use others’ resources
- Reverse-engineering
- Invalidate their legal rights
- Buy access - what price?
- DIAGRAMS?
1.16.6 More notes
Liability for publishing information?
Infringement insurance
1.16.7 Phases
Startup
- Check out everyone's previous contracts
- NDAs
- Noncompetes
- IP assignment agreements
- Set to experimenting?
- Corporate officer?
- Look for trade secrets
- Three Rules
- NDAs
- Look for copyrightable material
- [LIST]
- Patentable inventions
- Deadlines for filing
- Under the hood?
- Look at things from the former employer's perspective
1.16.8 Origin of rights
Constitution
Jefferson - candle
1.16.9 Trademarks / trade dress
Victoria's Little Secret
U.S. vs. foreign
1.16.10 Noncompetes
California
Louisiana - choice of law, choice of forum in employment agreements (Delaware case)
1.16.11 Trade secrets
- The only true self-help system: Keep it secret
- Coca-Cola formula
- KFC recipe
- Reverse engineering
1.16.12 Scratch pad
Importing
Have everything made overseas
Stockpile components but never assemble
Inducement of infringement: Jones Day article § 271(b)
Manufacture here, ship overseas - contributory infringement: § 271(f)
Product-by-process: § 271(g)
Antitrust: § 271(d)(5)
Recombinant DNA, etc.: § 271(e)
New drug application - infringement: § 271(e)(2)
Workalike - duplicate API responses (Oracle v. Google)
Security interests
Assignments (Oracle v. Google)
Fair use (Oracle v. Google)
- Grant applications
- Nanoinnovations - Bayh-Dole Act
- Export controls
- Services: TIPS
- Ownership
- Copyright
- Web page
- Code
- Documentation
- APIs?
Best efforts
Exclusivity
Beach Boys sell their catalog - MJ, other examples
Motorola patent portfolio
FOSS
Stanford v. Roche
Ownership
IP ownership agreements
- Getting a C&D letter
- Save correspondence
- Save ALL correspondence
- Notetaking habits
- Collaborators
- Get it in writing - IP ownership
- Kozynski comment: "one line"
- Raising money
- Reps and warranties
- Employment agreements, etc.
1.16.13 Begin with the end in sight
What might you want to / have to do.
Reps and warranties
What would an acquirer want? An investment bank?
- IP is protected.
- IP is owned.
- No third-party IP threats.
What does "protected" mean?
- Can go to court / arbitration to sue someone doing things.
1.16.14 The problem: Competitors copy things
Amazon copies products (WSJ)
Free-rider problem - no one will invest in innovation if copiers will run the price down to marginal cost and prevent the innovators from recouping their investments.
Investors might look under the hood, pass on the opportunity, and maybe later tell other prospects / portfolio companies
Lewandowski -
1.16.15 Problem: What contracts might you be bound by?
- Prior employment agreement
- TOS / EULA - signing up under a false name
- NDA - Stanford v. Roche
1.16.16 Export controls
1.17 Resources
1.18 Clients - review for transactions
Attend Behavior Inc. Jeff Margolis
Baker Communications, Inc. Joe DiDonato
Cloud Chomp, Inc. David Pulaski
CoronaNews.FYI Brittany Scarff
Educator.FYI Brittany Scarff
General Electric
GetBusy USA Corporation (SmartVault) Kay Ryan
Greymatter Alliance Inc. John Hubbs
NanoInnovations LLC Huma Jafry
National Oilwell Varco
Rheidiant LLC Murat Ocalan
SeatsX LLC Erik Simpson
Set Solutions John Marler
This is Petroleum Systems LLC Andy Pepper
Trinity Cody Nicholson
1.19 Life cycle
- Idea
- Still employed? No-moonlighting clause?
- Research - signing into a competitor's Web site? Acquiring product to study (shingle shrinkwrap)
- FOSS?
- Patent coverage by others?
- Expired?
- Patent / copyright insurance?
- Implementation of a standard? (FRAND)
- License from someone else
- Ownership?
- Other coverage
1.19.1 Types of transaction
- Software license
- AWS - SaaS
- Employment agreement
- M&A - acquirer, or target
- Cease & desist letter
- Learn about a patent
- Hiring away an employee
- New employee offers secrets (Uber / Waymo - Lewandowski)
- Modify existing contract - unilateral?
- Fire an employee
- Government grant
- Use "public domain" materials
- Collaborate with another company
- For-hire services
- "Borrowing" language from another Web site
- Signing into a competitor's service under a personal account
- Hiring a software developer that doesn't deliver the code - California case: Integrated Dynamic Solutions, Inc. v. VitaVet Labs, Inc., 6 Cal. App. 5th 1178 - Cal: Court of Appeal, 2nd Appellate Dist., 2nd Div. 2016
1.19.2 Litigation overview
How it works
Roles; standards of review
Preliminary injunction: Jump through hoops: California software-development case: Integrated Dynamic Solutions, Inc. v. VitaVet Labs, Inc., 6 Cal. App. 5th 1178 - Cal: Court of Appeal, 2nd Appellate Dist., 2nd Div. 2016
How much second-guessing? Election results
Jury verdict
Bench trial
De novo
Discretion / arbitrary and capricious - see https://scholar.google.com/scholar_case?case=2399151225087672871&hl=en&as_sdt=6,44&as_vis=1 (Fed. Cir. discussion of Zurko, arb. & capr. vs. subst. evid.)
Administrative determination
1.19.3 Trademarks
Picking a trademark
Genericness - Booking.com SCOTUS case - genericness - from ABA IPL summary: The Court held that a “generic.com” term is only generic for a class of goods or services if consumers perceive the term as the name of the class of goods or services. The Court rejected the USPTO’s argument that, like “Generic Company,” every “generic.com” term is generic, regardless of consumer perception. Instead, the Court held that because “Booking.com” is not a generic name to consumers, it is not generic and therefore qualifies for trademark protection. The Court also rejected the USPTO’s argument that trademark protection for “generic.com” marks would hinder competitors, noting that the registration of “Booking.com” would not give Booking.com a monopoly on the term “booking,” preventing competitors from using the word “booking” to describe their own services.
Licensing - quality control
From ABA IPL summary: Sock It To Me, Inc. v. Aiping Fan, Opposition No. 91230554, 2020 U.S.P.Q.2d 10611 (T.T.A.B. June 3, 2020). Applicant Aiping Fan filed a trademark application for registration of SOCK IT UP in connection with socks in class 25. Opposer Sock It To Me opposed Aiping Fan’s application, alleging that SOCK IT UP was likely to cause confusion under section 2(d) with its registered mark SOCK IT TO ME for socks and stockings. The opposer also claimed that the applicant, an individual residing in China, did not own the mark when the application was filed, and therefore the application was void ab initio. The opposer alleged that a different entity (JY Instyle) used the mark in the U.S. and was the true owner of the mark. The applicant indicated that it had selected the mark for use in the U.S. and had granted JY Instyle an oral license to use the mark on socks. Thus, according to the applicant, use of the mark by JY Instyle was attributable to the applicant, as JY Instyle was a related company and such use inured to the benefit of the applicant. The Trademark Trial and Appeal Board (TTAB) considered whether the applicant (as licensor) exercised sufficient control over the quality of the goods produced under the SOCK IT UP mark by its licensee (JY Instyle). Based on the evidence, the TTAB found that the applicant had established quality control over the source of manufacturing and type of fabrics used to make the socks, and that JY Instyle had inspected the goods to ensure that they complied with the applicant’s standards. Thus, the TTAB concluded that the applicant owned the SOCK IT UP trademark when it was filed.
1.19.4 Patents
Patents of others
Patent filing deadlines
Inventorship
From ABA IPL update: Dana-Farber Cancer Institute, Inc. v. Ono Pharmaceutical Co., 964 F.3d 1365 (Fed. Cir. 2020). The Federal Circuit affirmed the district court’s inventorship conclusion, finding that the alleged joint inventors made numerous significant contributions to the claimed subject matter. The Federal Circuit noted that conception is the touchstone of the joint inventorship inquiry. The Federal Circuit also explained that reduction to practice does not need to occur at the moment of conception for purposes of identifying correct inventors and that joint inventorship does not depend on whether a claimed invention is novel or nonobvious over a particular researcher’s contribution.
Remedies
ITC exclusion order
Royalties
Lost profits
Injunction
Obviousness
IPRs
Marking requirement
From ABA IPL summary: Packet Intelligence LLC v. NetScout Systems Inc., 965 F.3d 1299, 2020 U.S.P.Q.2d 10776 (Fed. Cir. 2020). The Federal Circuit reversed and vacated the district court’s presuit damages award and enhancement thereof, finding that the district court’s jury instruction on the marking requirement conflicted with an intervening Federal Circuit case, Arctic Cat Inc. v. Bombardier Recreational Products Inc., 876 F.3d 1350, 1368 (Fed. Cir. 2017). Specifically, Arctic Cat held that the patentee must prove that the products practiced the patent; however, the jury instruction placed the burden on NetScout to show that certain products did not practice the asserted patent. After properly placing the burden on the patentee, the Federal Circuit found that Packet Intelligence failed to present substantial evidence to the jury that the unmarked MeterFlow product practiced any asserted patent claim. The Federal Circuit also rejected Packet Intelligence’s attempt to preserve the damages award through the direct infringement of the related, and also asserted, method patent. The Federal Circuit held that (1) there was no evidence supporting damages from NetScout’s presuit internal use and testing of the patented method; and (2) Packet Intelligence could not circumvent § 287 by arguing that NetScout’s infringement of the related method claims drove accused product sales. The Federal Circuit affirmed the district court’s judgment in all other respects.
1.19.5 Trade secrets
Examples
Slim Jims KFC Coke
If you patent a trade secret formula, will it still be entitled to protection as a trade secret?
Defend Trade Secrets Act
Three Rules
- Confidentiality
From ABA IPL update: Konica Minolta Business Solutions U.S.A., Inc. v. Lowery Corp., No. 15-11254, 2020 WL 3791601, 2020 U.S. Dist. LEXIS 120082 (E.D. Mich. July 7, 2020). Konica Minolta Business Solutions (KMBS) identified hundreds of specific documents and files that it claimed the defendants misappropriated. The defendants contended that KMBS failed to identify the specific alleged trade secrets with sufficient detail and therefore the defendants were entitled to summary judgment. The district court granted partial summary judgment. The district court found that KMBS’s pricing information was publicly available and not a secret. However, the district court found that the plaintiff’s internal price books contained information it did not disclose to customers and were not public. The price books contained multitiered pricing options for KMBS’s equipment and services that depended on several factors, including internal discounted prices that could be offered to customers based on particular circumstances. There were genuine issues of fact on whether the price books were protectable trade secrets.
From ABA IPL update: Danaher Corp. v. Gardner Denver, Inc., No. 19-CV-1794-JPS, 2020 U.S. Dist. LEXIS 89674, 2020 U.S.P.Q.2d 10565 (E.D. Wis. May 20, 2020). Michael Weatherred worked at Danaher for 16 years and served as the vice president. Weatherred then joined Gardner Denver, and Danaher sued Gardener Denver and Weatherred, alleging trade secret misappropriation. Danaher moved for a preliminary injunction. Gardner Denver and Danaher are not commercial competitors. The alleged trade secret involved a slide and video presentation posted online for over nine months before the motion for a preliminary injunction was filed. The district court found that Danaher had not plausibly alleged any actual or imminent harm and thus denied the preliminary injunction.
Common violations
- Emailing things to yourself
From ABA IPL update: ExamWorks v. Baldini, No. 2:20-CV-00920, 2020 U.S. Dist. LEXIS 103366 (E.D. Cal. June 11, 2020). ExamWorks manages medical examinations, peer reviews, bill reviews, and Medicare compliance. Four former employees were sued collectively for misappropriating trade secrets. The results of a forensic investigation revealed that about a month before Baldini was terminated by ExamWorks, Baldini sent a computer file to his personal email containing information on over 53,000 cases over the past year and half with detailed contact information for both doctors and customers. Based on this evidence, the district court found that the compiled information identifying customers with particular needs and characteristics contained more than the mere identities and addresses easily identified through publicly available sources. This information would give a competitor a substantial business advantage in seeking to offer services to compete with ExamWorks. Therefore, the motion for the preliminary injunction was granted.
1.19.6 Confidentiality agreements — NDAs, employment agreements, consulting agreements
1.19.7 Employment agreements
1.19.8 Dispute management
1.19.9 Audits of royalty reports
Disney stiffing the Star Wars novelist - WSJ 2020-12-19
1.19.10 Incentives
1.19.11 M&A: Due diligence
1.19.12 Copyrights
Fair use
9th Cir. - Dr. Seuss v. Star Trek guys re "O the places you'll boldly go"
Implied license / de minimis use
ABA IPL article: In Solid Oak Sketches, LLC v. 2K Games, Inc., a Manhattan federal judge dismissed a tattoo licensing company’s copyright infringement claim against two video game companies that developed and published basketball simulation games depicting realistic renderings of NBA players and their tattoos.1 Across the bridge in Brooklyn, another federal judge, in LMNOPI v. XYZ Films, LLC, dismissed a copyright action against a film production company that had depicted a mural in the opening scene of a film without the artists’ permission.2 There are many more decisions of this ilk that tend to float under the radar but warrant a brighter spotlight, some of which are discussed below. * * * On the defendants’ summary judgment motion, the court held that Solid Oak’s copyright infringement claim must fail for a number of reasons, including because the defendants established that the tattoo artists had previously granted the players nonexclusive licenses to use the tattoos as part of their likenesses. The court concluded that the facts before it, based on the declarations of two of the tattoo artists and one of the game developers, strictly satisfied the three-factor test: (1) the players each requested the tattoos, (2) the tattoo artists created the tattoos and inked them on the players’ bodies, and (3) the tattoo artists intended that the players would copy and distribute the tattoos as elements of their likenesses. In discussing the intent element, the court found that each tattoo artist knew that the players were likely to appear “in public, on television, in commercials, or in other forms of media.”21 Because no limitations on the display or depiction of the tattoos were discussed, the players therefore had implied licenses to use the tattoos as elements of their likenesses, and the artists even admitted as much in their sworn statements. And by the players giving the NBA the right to license their likeness to third parties, including for use in the video games, the license extended to the defendants.
Substantial similarity / summary judgment
From ABA IPL summary: Zindel v. Fox Searchlight Pictures, Inc., No. 18-56087, 2020 WL 3412252, 2020 U.S.P.Q.2d 10688 (9th Cir. June 22, 2020). Zindel sued for copyright infringement of his father’s play, Let Me Hear You Whisper, against the defendants for the film and book, The Shape of Water. The district court dismissed the complaint on the ground that the film and book were not substantially similar to the play as a matter of law. The Ninth Circuit found that the district court erred and reversed, concluding that reasonable minds could differ as to whether there could be substantial similarity between the works. The Ninth Circuit determined that while the works were properly presented to the district court, additional evidence, such as expert testimony, would aid in deciding whether there are similarities in the protectable elements of the works.
1.20 DONE Rice course: Description »
MGMT 725 Intellectual Property Strategy for Entrepreneurs: Legal and Strategic Aspects
Intellectual property, or "IP," is about four things: (i) Building and maintaining legal fences around your company's business; (ii) spotting fences put up by other companies — which are sometimes hard to see; (iii) making deals for access to fenced-in yards; and (iv) preparing for battle in court about claims of trespass.
1.21 Opinions of counsel
1.22 TODO Price points for SaaS - credit card limits etc. - add to Startup Law »
2 Class plans
A gouge book
By D. C. Toedt III
Attorney at law; member of the Texas and California bars. (About)
I'm a lawyer but this doesn't make me your lawyer.
Copyright © D. C. Toedt III.
Version 2021-B; rev. Feb. 24, 2021
NOT A SUBSTITUTE for legal advice – offered AS IS, WITH ALL FAULTS. A work in progress (very much so).
3 Preface
This is what's known in the Navy as a gouge book: What you need to know, without a lot of extra verbiage.
3.1 IP rights in covid-19 vaccines
Miriam Berger WHO head pushes for waiver of some intellectual property rights for coronavirus vaccines, in bid to broaden access (WashingtonPost.com March 5, 2021).
What are those rights?
3.1.1 Patents
From 35 U.S.C. § 101:
Whoever invents or discovers any new and useful —
- process,
- machine,
- manufacture,
or composition of matter,
or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.
(Not verbatim.)
3.1.2 Trademarks
Pharmaceutical companies go to a lot of trouble and expense to brand their products (often with distinctly unmemorable names).
4 Royalty payments
4.1 Recordkeeping
4.2 Audit rights
5 The judicial process
How appeals courts review decisions below: 11th Cir. blog-copyright case
ALWAYS expect a counterclaim and affirmative defenses - e.g., 11th Circuit blog copyright case
- Discovery is a PITA.
- Motions in limine
11th Cir. blog-copyright case - good use of "a reasonable jury could conclude …."
To determine whether a particular use is fair, a factfinder considers four nonexclusive factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
17 U.S.C. § 107. The inquiry is a “flexible” one that requires weighing the four factors in the light of the facts of the case. Cambridge Univ. Press v. Patton, 769 F.3d 1232, 1259 (11th Cir. 2014). We consider each factor in turn.
Campbell v. AcuffRose Music, Inc., 510 U.S. 569, 575 (1994) ("Oh Pretty Woman")
"Intellectual property" is mostly about court proceedings — if you can't keep it a secret, you'll have to go to court to stop someone else from using your ideas.
How lawsuits start
- A judge in an American court will never initiate a lawsuit against a "defendant"; the judge will take action against the defendant only in the context of a lawsuit brought by a "plaintiff."
- (A plaintiff could be a private party — an individual or a company, for example — or it could be a government entity. The same is true for defendants.)
- In nearly every American lawsuit, a corporation or other organization must be represented by one or more attorneys who are admitted to practice before the court in question. (Exception: In small-claims court, parties can generally proceed without lawyers.)
- Special case: Lawyers from "foreign" jurisdictions can ask a local court for permission to represent a particular client in that court for a particular lawsuit; this is referred to as being admitted pro hac vice in that court.
Individuals may represent themselves in court (this is known as acting pro se) but generally retain legal counsel.
Courts operate almost-entirely reactively, not proactively
- In the U.S. system, judges never (yes, that's a strong word) proactively take action about a controversy without someone having first filed a lawsuit or comparable proceeding.
- In any lawsuit, pretty much the only thing the judge will do is issue various kinds of orders in response to specific requests by the parties' lawyers.
- Apart from scheduling and admin, only rarely will a judge issue orders on her own initiative or otherwise be proactive in a case. (Such court-initiated orders generally involve obviously-bogus requests and/or obvious attorney misconduct — and usually, a judge will wait for a party to ask the court to take action even in those circumstances.)
Apart from scheduling and admin: If a judge does want to issue an order about a case on her own initiative, the Constitution's due process provisions require the judge to give the parties notice and an opportunity to respond.
"Facts" are sometimes found by juries, sometimes by judges
- A judge will not overturn a jury's verdict unless the losing party can persuade the judge of one or two things:
- no reasonable jury could have reached that verdict on the evidence presented; in such a situation, the judge enters what's known as "judgment as a matter of law" — but if a reasonable jury could have reached the verdict on the evidence presented, then the judge must let the verdict stand; or
- the trial was fundamentally unfair in some way, in which case the judge orders a new trial.
When an appeals court reviews a trial-court judgment that's based on a jury's verdict, the appeals court reviews the facts in the light most favorable to the verdict.
Court orders, Type 1: "Defendant, pay the plaintiff" (monetary award)
- After a full presentation of evidence — if the plaintiff persuades the fact-finder that it was harmed by the defendant's "actionable" conduct — then the court will order the defendant to pay the plaintiff for the "damages," i.e., the financial loss that the plaintiff "proves" by a preponderance of the evidence that the plaintiff suffered.
Damages verdicts can be big: A federal jury in Waco recently reached a verdict that Intel Corporation must pay VLSI — a "non-practicing entity" — $2.18 billion for (allegedly) infringing two VLSI's patents.
Court orders, Type 2: "Defendant, don't do X" (injunction)
- (If the law allows:) After a full presentation of evidence, a judge could permanently "enjoin," that is, order, a defendant to stop doing something (or, less-commonly, order the defendant to take affirmative action). Such orders are known as "injunctions."
- A party that violates an injunction can be held in contempt of court — this could result in monetary fines and even in spending time in jail.
- But judges institutionally prefer to simply order the defendant to pay money to the plaintiff (assuming that the plaintiff has made the required evidentiary showings).
- Judges prefer not to This is because courts don't want to have to get involved after the case is over that's something that can happen without the court having to get involved (much) after the fact. Such orders are generically referred to as "damages awards."
- (if defendant doesn't pay a judgment:) a "writ of execution" directing the sheriff to seize and sell the defendant's (non-exempt) assets and use the proceeds to pay the plaintiff what the defendant owes, and turn any remaining balance over to the defendant;
- (rarely:) an injunction prohibiting the defendant from doing specified things or (even more rarely:) directing the defendant to do specified things — this requires the court to weigh four factors, including the balance of equities and the public interest;
- an injunction directing the defendant to do something — that's an .
Courts don't do any of the above on their own initiative.
Judges don't know what you know, so — if you have the burden of proof — you have to demonstrate facts to them with admissible evidence.
"Hearsay" doesn't count because it's regarded as too-unreliable. (Think of the "telephone game.")
If either side timely demands a jury trial, then a jury will hear the case — and under the Seventh Amendment to the Constitution, whatever facts the jury finds will be essentially unchallengeable if a "reasonable" jury could have reached the same conclusion.
A grant of JMOL is appropriate "where a party has been fully heard on an issue during a jury trial and the court finds that a reasonable 1154*1154 jury would not have had a legally sufficient evidentiary basis to find for the party on that issue." Id. at 1342; see Fed. R. Civ. P. 50(a).
Lucent Technologies, Inc. v. Gateway, Inc., 543 F.3d 710 (Fed. Cir. 2008): affirmed overturning a $1.5 billion jury verdict because Lucent couldn't bring suit on its own — Fraunhoffer, a German company, was a co-owner of the patent.
… A grant of JMOL is appropriate when "the evidence, construed in the light most favorable to the non-moving party, permits only one reasonable conclusion, and that conclusion is contrary to the jury's."
… With respect to the '457 patent, the court held that the jury lacked substantial evidence and acted against the clear weight of the evidence in finding infringement of method claims 1 and 5 by Microsoft's Windows Media Player given that Lucent provided insufficient evidence to establish that the High Quality encoder actually ever ran and performed the claimed method. Id. at 925-27. For the same reasons, the court held that there was insufficient evidence of infringement of claim 10, which, although directed to a storage medium, used the phrase "manufactured in accordance with a process comprising," thus requiring evidence of practice of the claimed process. Id. at 927-28. Therefore, the court granted Lucent's motion for JMOL, or alternatively for a new trial, on infringement of the '457 patent.
6 Licensing
Territory
Payments
- Up-front
- Paid-up
- Running royalty
- Reports
- Audit rights
6.1 Implied licenses
11th Cir. blog-copyright case - slip op. at 11-12
6.2 Good faith and fair dealing
SCODE in GSK v. DRIT:
… Under Delaware law, sophisticated parties are bound by the terms of their agreement. Even if the bargain they strike ends up a bad deal for one or both parties, the court’s role is to enforce the agreement as written. As we have explained, “[p]arties have a right to enter into good and bad contracts, the law enforces both.” Holding sophisticated contracting parties to their agreement promotes certainty and predictability in commercial transactions.
There are, however, instances when parties fail to foresee events not covered by their agreement or defer decisions to later. “No contract, regardless of how tightly or precisely drafted it may be, can wholly account for every possible contingency.” Subject to the express terms of the agreement, when gaps in an agreement lead to controversy, the court has in its toolbox the implied covenant of good faith and fair dealing to fill in the spaces between the written words. The implied covenant, inherent in all agreements, ensures that the parties deal honestly and fairly with each other when addressing gaps in their agreement. The court’s goal is to preserve the economic expectations of the parties.
The implied covenant, however, is a “cautious enterprise.” As we have reinforced on many occasions, it is “a limited and extraordinary legal remedy” and “not an equitable remedy for rebalancing economic interests that could have been anticipated.” It cannot be invoked “when the contract addresses the conduct at issue.”
The implied covenant should not have been deployed in this case. There was no gap to fill in the Agreement. …
Glaxo Group Ltd. v. DRIT LP, No. 25, 2020, slip op at 14-15 (Del. Mar. 3, 2021) (reversing, in part, trial-court judgment) (footnotes omitted).
6.3 Choice of law
7 Overview
7.1 Introduction
This paper summarizes some common issues that can arise in transactions involving a software company ("Company"), such as:
- licensing of Company's software or other technology;
- an outright sale of Company's rights in software or other technology, or of Company itself;
- a loan, an equity investment, or similar transactions, where software or other technology is involved.
7.2 Outsiders Might Try to Claim Ownership Rights
Company will naturally want to ensure that it owns its software or other technology to the greatest extent possible. Challenges to Company's ownership can come from several directions.
7.2.1 Former Employers Might Try to Assert Rights
Former employers might try to assert outright ownership of Company's proprietary technology, either in its present form or in an earlier version. (See also the discussion of ownership below.) They might assert patent rights, copyrights, or trade secret rights. Some circumstances to watch out for:
- An inventor came up with an idea for a product or service while working for a former employer.
- An employee took documents or other materials from a former job.
- Company will compete with a former employer of one or more of its employees.
- Two or more employees worked for the same former employer — that might get the former employer upset and looking for a reason to sue.
- An employee has an invention-assignment agreement with a former employer.
In any of the above cases, Company could be hit with a patent, copyright or trade-secret lawsuit by the former employer.
Example: In the Computer Associates case, Altai, Inc. hired a programmer to help work on a new software product. Unbeknownst to Altai, the programmer allegedly brought with him some source code from his days at Computer Associates. He supposedly incorporated that code into the new Altai software. CA sued for copyright infringement and misappropriation of trade secrets. Altai was forced (1) to rewrite that portion of its code, (2) to pay a substantial damage award, and (2) to spend years in litigation. See Computer Associates. Int'l, Inc., v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992) (affirming holding of noninfringement of rewritten software) (discussed in Chapter 2).
Even if the former employer does not have ownership rights, it may still have provided funding or work time for development of the technology in question. If so, it may have shop rights, i.e., a nonexclusive, royalty-free right to use the technology, and might be able to compete with Company without restriction.
When hiring a contractor or employee, Company can ask the new hire about prior work experience. It might also be possible to ask the new hire to sign a written representation that s/he will not be bringing any work product from previous employment except as expressly approved in advance, preferably in writing, by Company.
7.2.2 Employees and Contractors Might Personally Own Their Patent Rights
In the patent arena, a nonemployee who does not have a written invention-assignment agreement — or an employee who does not have such an agreement and was not “hired to invent” or “set to experimenting” — might be the owner, or an independent joint owner, of part of Company's software or other technology. See Chapter 3.
If Company collaborated with another company in developing a patented invention, the other company could have the right to use or license the technology without Company's consent, and without accounting to Company. See Chapter 3.
7.2.3 Free-Lancers Might Personally Own Their Copyrights
In the copyright arena, an outside contractor who writes computer software without a work-for-hire or assignment agreement may own the copyright in the software. Such a contractor could have the right to limit Company's use of the software that Company paid to have developed. See Chapter 2.
Even an outside contractor is not the sole owner of a copyright, it could still be a “joint author” and thus a coowner of the copyright. Such a joint author/co-owner might be free to go into competition with Company. Joint authors of a copyrighted work must account to one another for their respective uses of the copyrighted work, i.e., share the proceeds of their uses. See Chapter 2.
Documentation for Company-developed computer software can be subject to the same copyright ownership issues as the software itself.
7.2.4 The Golden Rule: Funding Sources May Try to Claim Rights
Research and development joint venture agreements, or development contracts with other companies, can affect ownership of Company's software or other proprietary technology (either in its present form or in an earlier version).
R & D funding by state or federal agencies (e.g., universities, DOD, DOE) can have ownership strings attached. For example, the federal Bayh-Dole Act sets forth specific requirements that must be met by certain federally funded entities to be able to retain title to technology they develop with that funding. See 35 U.S.C. §§ 200-212; Rights to inventions made by nonprofit organizations and small business firms under government grants, contracts, and co-operative agreements, 37 C.F.R. Part 401.
7.2.5 Nailing down ownership rights in writing
When using outsiders for technology development, an important rule of thumb is to try to nail down ownership and/or licensing rights in writing with an assignment clause in a contract. Such a clause can be useful in an employment agreement with employees, too — keeping in mind that state law may regulate the extent to which an employer can require employees to assign their rights in inventions and the like. See Chapters 2, 3.
7.3 Patent Issues
Software patents are a fact of life, and are becoming more important than they were in years past. See Chapter 3. Software companies are paying increasing attention to obtaining their own patents and, of necessity, to defending against third-party patents.
7.3.1 The Clock May Be Ticking on the Right to Apply for a Patent
In the U.S., the nonextendable deadline for filing a patent application is one year after the first barring event, e.g., the first offer for sale, public use (including commercial use even if in secret) or publication of the invention.
No such “grace period” exists in most other industrialized countries, which have “absolute novelty” deadlines for filing patent applications. Most countries, however — not all — as members of the Paris Convention, will give credit for a U.S. filing date for up to one year after that date (i.e., foreign counterpart applications can be filed for up to one year after the U.S. filing date).
7.3.2 Ways of Checking for Infringement of Third‑Party Patents
Company may be using, or about to use, a product, method, or process that is covered by a patent belonging to a competitor or other third party. Likewise, a competitor of a customer or supplier may have patent coverage that could affect Company's business. If so, Company may be vulnerable to a patent-infringement lawsuit.
Infringement searches are one way Company can look for potential third-party patent problems, but searches are not foolproof. Other indications of potential problems:
- Company's competitors' products may have patent-number markings, which can give some idea whether a problem might exist.
- Another indication is if others in the industry are being sued (or threatened with suit) for patent infringement.
- If Company receives an “invitation” to take a license under a patent, or just a plain “notification” of the existence of a patent, that could be a prelude to a charge of infringement — or perhaps to a lawsuit.
7.3.3 Possible Damages – Including Treble Damages – for Patent Infringement
If found to be an infringer, Company could be forced to pay patent infringement damages – potentially the patent owner's lost profits, and in any event not less than a reasonable royalty.
Idenix Pharma. LLC v. Gilead Sciences Inc.: 941 F.3d 1149 (Fed. Cir. 2019) $2.5 billion (but patent invalidated for enablement).
Example: In the famous Polaroid Corp. v. Eastman Kodak Co., case, the total damage award against Kodak was in excess of $900 million. See Polaroid Corp. v. Eastman Kodak Co., 16 USPQ (BNA) 1481 (D. Mass 1990).
The courts have held that if a company is aware of another's patent rights, it has a duty to use due care to ensure that it is not infringing. If infringement is proved, then proof of the company's failure to use due care can lead to a finding of willful infringement, which in turn can lead to an increase in the damage award — up to treble damages in the discretion of the trial judge — and possibly an award of attorneys' fees.
If Company relies in good faith on what it reasonably believe to be a competent opinion of counsel that Company are not infringing any valid claim of a patent, that can help Company avoid being held a willful infringer. Even if Company loses on the infringement issue, its reasonable reliance on the opinion can still negate willfulness.
7.3.4 Injunctions Against Patent Infringement
If Company is held liable for patent infringement, it could be subjected to an injunction against further infringement. “It is the general rule that an injunction will issue when infringement has been adjudged, absent a sound reason for denying it.” Richardson v. Suzuki Motor Co., Ltd., 868 F.2d 1226 (Fed. Cir. 1989).
A preliminary injunction may be entered if the patent owner proves, among other things, that it is likely to succeed on the merits of an infringement lawsuit.
7.3.5 Personal Liability for Patent Infringement
Individuals who direct or actively take part in patent-infringing activities by a corporation could be personally liable for the infringement.
7.4 Someone Else's Copyrights in Softwareor Data Compilations Might Be Infringed
If Company will be distributing software intended to be a work-alike competitor to another product, a copyright lawsuit alleging infringement of the “look and feel” or the “structure, sequence, and organization” of the target software may be a possibility. See Chapter 2.
If Company's product/service involves the use of a proprietary data base of facts (e.g., names, addresses, catalog part numbers, and so forth), the source of the facts should be investigated. Facts per se are not copyrightable. However, copying of others' data bases (e.g., yellow-page telephone books, maps) can lead to liability for copyright infringement if the selection or arrangement of the data is sufficiently “original,” i.e., if it is the result of at least minimal creative effort.
7.5 Trademark Issues Might Exist
Trademark rights in the U.S. are based on use of the mark (although a federal registration application can be filed on the basis of bona fide intent to use the mark). See Chapter 4; 15 U.S.C. § 1051. Consider checking whether Company has filed any registration applications.
Infringement of another's trademark rights, through the use of a “confusingly similar” mark, can lead to a preliminary injunction, a permanent injunction, destruction of infringing articles, and up to treble damages in some circumstances. See 15 USC 1114.
A trademark search for similar marks (registered and unregistered) is usually advisable if a significant investment will be made in promoting a new mark. It is not enough to check corporate-name records, state trademark records, or county DBA filings. Consider looking into whether Company has had a search done.
If Company has chosen a highly “descriptive” trademark, the mark may be difficult or impossible to protect legally. See 15 USC 1052.
Assignments or other transfers of a mark cannot be accomplished independently of the goodwill symbolized by the mark. Any such transfer without goodwill could be deemed an “assignment in gross” that destroys the trademark rights. See, e.g., Berni v. Int'l Gourmet Restaurants of America, Inc., 838 F.2d 642 (2d Cir. 1988).
7.6 The Export-Control Laws Could Pose Problems
A U.S. export license is necessary for all exports of commodities and “technical data” (including software) unless a License Exception applies. See Chapter 11. Restriction of exports of encryption software is a particular bone of contention in the software industry. Failure to comply with export licensing requirements can result in criminal penalties.
7.7 Defamation and On-Line Providers
A not-untypical problem is that of the Internet user who posts defamatory material in an email, newsgroup message, or chat room message. One court held that the on-line service provider that made Internet access available to the defamatory poster could be liable for the defamation. See Stratton-Oakmont, Inc. v. Prodigy Services Co., 1995 WL 323710 (N.Y. Sup. 1995) (granting partial summary judgment for defamation plaintiff).
In response, Congress expressly overruled Stratton-Oakmont as part of the Communications Decency Act (CDA). That statute states that “[n]o provider or user of an interactive computer service [defined as including ISPs as well as internal corporate systems] shall be treated as the publisher or speaker of any information provided by another information content provider [defined as creators or developers or information provided through the Internet or other interactive computer system].” 47 U.S.C. § 230(c).
That portion of the CDA preempts contrary state law. Id. § 230(d)(2); see Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998) (dismissing America OnLine as defendant in defamation action relating to on-line commentator Matt Drudge's reporting of rumor that White House aide Sidney Blumenthal had a history of spousal abuse); Zeran v. America OnLine, Inc., 958 F. Supp. 1124, 1129-37 (E.D. Va.) (dismissing action against AOL by victim of hoax perpetrated via AOL), aff'd, 129 F.3d 327 (4th Cir. 1997)/./
8 Patents
Patent claims can be disclaimed, and Glaxo killed its own patent to get out of paying royalties to DRIT: Glaxo Group Ltd. v. DRIT LP, No. 25, 2020 (Del. Mar. 3, 2021) (reversing, in part, trial-court judgment).
8.1 Introduction: Software- and Internet Patents are “For Real”
Many patents for software- and Internet-related technology are issuing each week, to the point where the Patent and Trademark Office (“PTO”) recently initiated a program to improve the quality of its searching and examination of business method patents. See U.S. Patent & Trademark Office, Business Methods Patent Initiative: An Action Plan, March 29, 2000, posted at http://www.uspto.gov/web/offices/com/sol/actionplan.html.) The official abstracts of some patents recently in the news are set forth below:
*Amazon.com: USP 5,960,411, “Method and system for placing a purchase order via a communications network.” A method and system for placing an order to purchase an item via the Internet. [1] The order is placed by a purchaser at a client system and received by a server system. [2] The server system receives purchaser information including identification of the purchaser, payment information, and shipment information from the client system. [3] The server system then assigns a client identifier to the client system and associates the assigned client identifier with the received purchaser information. [4] The server system sends to the client system the assigned client identifier and an HTML document identifying the item and including an order button. [5] The client system receives and stores the assigned client identifier and receives and displays the HTML document. [6] In response to the selection of the order button, the client system sends to the server system a request to purchase the identified item. /[7] /The server system receives the request and combines the purchaser information associated with the client identifier of the client system to generate an order to purchase the item in accordance with the billing and shipment information whereby the purchaser effects the ordering of the product by selection of the order button. (Bracketed numbering added.)
*Double Click, Inc.: USP 5,948,061, “Method of delivery, targeting, and measuring advertising over networks.” Methods and apparatuses for targeting the delivery of advertisements over a network such as the Internet are disclosed. Statistics are compiled on individual users and networks and the use of the advertisements is tracked to permit targeting of the advertisements of individual users. In response to requests from affiliated sites, an advertising server transmits to people accessing the page of a site an appropriate one of the advertisement based upon profiling of users and networks.
*Priceline.com: USP 5,897,620, “Method and apparatus for the sale of airline-specified flight tickets.” An unspecified-time airline ticket representing a purchased seat on a flight to be selected later, by the airlines, for a traveler-specified itinerary (e.g., NY to LA on March 3rd) is disclosed. Various methods and systems for matching an unspecified-time ticket with a flight are also disclosed. An exemplary method includes: (1) making available an unspecified-time ticket; (2) examining a plurality of flights which would fulfill the terms of the unspecified-time ticket to determine which flight to select; and (3) providing notification of the selected flight prior to departure. The disclosed embodiments provide travelers with reduced airfare in return for flight-time flexibility and, in turn, permits airlines to fill seats that would have otherwise gone unbooked. Because of the flexibilities required of the unspecified-time traveler, unspecified-time tickets are likely to attract leisure travelers unwilling to purchase tickets at the available published fares and, at the same time, are likely to "fence out" business travelers unwilling to risk losing a full day at either end of their trip. Moreover, the flexibilities required of the unspecified-time traveler need not be limited to a departure time; the flexibilities may also include the airline, the departing airport, the destination airport, or any other restriction that increases the flexibility afforded the airline in placing the traveler aboard a flight. The disclosed embodiments thus permit airlines to fill otherwise empty seats in a manner that stimulates latent and unfulfilled leisure travel demand while leaving their underlying fare structures intact.
In recent months such patents have gotten a great deal of ink; not just journalistic ink but increasingly, judicial ink. For example:
Xerox Corp. v. 3Com Corp., 2001 WL 1757247 (W.D.N.Y. Dec. 20, 2001), on remand from 267 F.3d 1361 (Fed. Cir. 2001): Technology: Palm Pilot “Graffiti” software. Xerox sued manufacturers of Palm Pilot personal digital assistants (PDAs), claming that Palm's “Graffiti” handwriting-recognition software infringed a Xerox patent. The district court initially granted summary judgment of noninfringement, but after being reversed on that point by the Federal Circuit, the court granted summary judgment that the patent was valid, infringed, and enforceable.
Amazon.com, Inc. v. Barnesandnoble.com, Inc., 73 F.Supp.2d 1228 (W.D. Wash. 1999) (granting preliminary injunction). Technology: “One-click” ordering system for e-commerce Web sites. Comment: This opinion is worthy of careful reading for insights into how evidence is marshaled by counsel – and assessed by the trier of fact – in a patent infringement case.
Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1384 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe)/. Technology:/ Videotex frame processing system.
WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that patent was not invalid and was infringed under doctrine of equivalents)/. Technology:/ Microprocessor-based slot machine in which the spinning reels were electronically controlled to vary the odds of winning. Comment: This opinion provides an excellent summary of a variety of different patent-law doctrines.
Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement). Technology: Garage door opener remote-control systems. Comment: The court held that a fact question existed as to whether a software-based system for selecting transmitter codes was “equivalent” (see § 3.7[e]) to the patented mechanically-based system.
Oacis Health Care Systems, Inc. v. Allcare Health Management Systems, Inc., 2000 WL 550040 (N.D. Cal. 2000) (granting patent owner-defendant's motion to dismiss declaratory-judgment action for lack of personal jurisdiction). Technology: Integrated health-care information management system.
Dymo Costar Corporation v. Seiko Instruments USA, Inc., 2000 WL 502616 (D. Conn., Mar 20, 2000) (granting preliminary injunction against accused infringer). Technology: Postage label that could be produced with an inexpensive thermal printer, which was described as useful in “Internet postage,” i.e., downloading postage credits to a personal computer over the internet:
Novadigm, Inc. v. Marimba, Inc., 2000 WL 228356 (N.D. Cal. Feb 15,
- (granting patent owner's motion to dismiss inequitable-conduct
defense). Technology: “Push”-type system for proactively delivering content over the Internet.
CIVIX-DDI, LLC v. Microsoft Corp., 84 F.Supp.2d 1132 (D. Colo. 2000) (granting defendants' motion for summary judgment of noninfringement). Technoloyg: Street-mapping software used on Web sites and Internet kiosks.
AT&T Corp. v. Excel Communications, Inc., 172 F.3d 1352, 1358-60 (Fed. Cir. 1999) (reversing and remanding summary judgment of invalidity of patent on statutory-subject-matter grounds); on remand, 1999 WL 1050064, 52 U.S.P.Q.2d 1865 (D. Del. 1999) (NO. (granting defendant's motion for summary judgment of invalidity on prior-art grounds). Technology: Method of recording primary interexchange carrier (PIC) of recipient of telephone call as data field in message record. Comment: The claims of this patent were found to be anticipated by MCI's Friends and Family program.
Charles E. Hill & Associates, Inc. v. CompuServe, Inc., 65 F.Supp.2d 924, 931 (S.D. Ind. 1999) (construing claim language). Technology: “Distributed” catalog system in which up-to-date information related to a selected product is transmitted from a main computer to a remote computer.
(Continued on next page)
8.2 Exactly What is a Patent?
A patent is a Government document that announces:
- that the inventor has submitted a patent application, containing a written disclosure of what the inventor believes to be a new invention,
- that a patent examiner has reviewed the patent application and made a determination that the application and the invention appear to meet certain legal criteria, and
- in exchange for submitting the invention for publication in a patent, the Government has granted the inventor certain rights, for a limited period of time, in the invention as claimed.
| What is a Patent? |
| - Limited grant of right to exclude others |
| - Bargain between inventor and government |
| - Not a “permit” to use the invention |
| - Rights defined by claims |
| - Competitors have rights, too |
A patent gives the owner the right to exclude others from making, using, offering for sale, and selling the invention described and claimed in the patent. The statute provides that:
Every patent shall contain . . . a grant to the patentee, his heirs or assigns, of the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States, and if the invention is a process, of the right to exclude others from using, offering for sale or selling throughout the United States, or importing into the United States, products made by that process . . . .
35 U.S.C. § 154(a)(1).
Some noteworthy points about patents:
(i) A patent gives the inventor the right to exclude, not the right to practice the invention. A patent is not like a fishing license or a building permit; an inventor does not need a patent to be able to practice his or her invention. Every patent contains a grant to the owner of the right, for a limited period of time, not to practice the invention him- or herself, but instead to exclude others from making, using, selling, offering to sell, or importing the specific subject matter described by the claims of the patent in the United States.
(ii)* */An inventor's competitors can freely copy and use an unpatented invention./ If a new product has been made public (for example, by putting it on sale or by publishing information about it), then others have the right to freely copy and use the product (but not necessarily to copy any subject matter that is protected by other patents or by copyright), without any obligation to its inventor, unless and until a patent is issued that covers the product.
| *Why Competitors Have the Right\\ |
| to Copy Unpatented Inventions* |
| - Free competition is the rule in the U.S. |
| - Competitors' copying of unpatented, publicly-available technology benefits the public |
| - Gives inventors an incentive\\ |
| to develop patentable inventions |
There are several reasons for this rule. For example, free competition in the marketplace is the rule in the United States, and competitors are encouraged to copy unpatented, publicly available technology, because that benefits the public by disseminating new ideas. See, e.g., Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 151, 164-65, 160, 109 S. Ct. 971, 977-78, 984-85, (1989) (holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law; “[t]he novelty and nonobviousness requirements of patentability embody a congressional understanding, implicit in the Patent Clause itself, that free exploitation of ideas will be the rule, to which the protection of a federal patent is the exception. Moreover, the ultimate goal of the patent system is to bring new designs and technologies into the public domain through disclosure.”).
In addition, this rule gives inventors an incentive to develop inventions that meet the rigid criteria for patentability – if an inventor develops an invention that falls short of those criteria, or if he does do not go through the procedures for obtaining a patent, then he will not be able to stop competitors from copying the invention. See id., 489 U.S. at 160, 109 S. Ct. at 982 (“the competitive reality of reverse engineering may act as a spur to the inventor, creating an incentive to develop inventions that meet the rigorous requirements of patentability”).
8.4 Substantive Requirements of Patentability
While software- and e-commerce inventions can be patented more readily than before (at least in the United States), not all such inventions meet the substantive requirements for patentability. It is probably safe to say that the majority of patent applications filed are rejected for failure to meet the patentability requirements set out in U.S. law.
8.4.1 The Enabling-Disclosure Requirement
By statute, a patent application must include an “enabling” disclosure of how to make and use the invention, as well as a disclosure of the “best mode” known to the inventor of practicing the invention. See 35 U.S.C. § 112, first paragraph.
An “enabling” disclosure in a patent application is one that will allow persons skilled in the art to make and use the invention without undue experimentation. See 35 U.S.C. § 112 (requiring enabling, best-mode disclosure of how to make and use invention); see generally, e.g., In re Hayes Microcomputer Products, Inc., Patent Litigation, 982 F.2d 1527 (Fed. Cir. 1992) (affirming jury verdict of infringement of patent relating to modem guardtime escape sequence and rejecting enablement- and best-mode challenge; “an inventor is not required to describe every detail of his invention”); /Northern Telecom, Inc.,
- Datapoint Corp./, 908 F.2d 931, 940-43 (Fed. Cir. 1990) (reversing
trial court finding of lack of enablement for failure to disclose source code of computer program, but affirming finding of failure to disclose best mode of magnetic tape cassette used for program and data storage).
Idenix Pharma. LLC v. Gilead Sciences Inc.: 941 F.3d 1149 (Fed. Cir. 2019), cert. denied, No. 20-380 (U.S. Jan. 19, 2021) $2.5 billion - patent for hepatitis-C treatment (but patent invalidated for enablement and lack of written description). Newman dissented; Lemley criticized the decision in an amicus brief.
From Idenix:
Enablement requires that "the specification teach those in the art to make and use the invention without undue experimentation." In re Wands, 858 F.2d 731, 737 (Fed. Cir. 1988). A claim is not enabled when, "at the effective filing date of the patent, one of ordinary skill in the art could not practice their full scope without undue experimentation." Wyeth & Cordis Corp. v. Abbott Labs., 720 F.3d 1380, 1384 (Fed. Cir. 2013). Whether a claim satisfies the enablement requirement is a question of law that we review de novo. Tr. of Boston Univ., 896 F.3d at 1361. However, "in the context of a jury trial, we review the factual underpinnings of enablement for substantial evidence." Id.
* * * The uncontested jury instructions in this case formulate the Wands factors as follows:
(1) the quantity of experimentation necessary; (2) how routine any necessary experimentation is in the relevant field; (3) whether the patent discloses specific working examples of the claimed invention; (4) the amount of guidance presented in the patent; (5) the nature and predictability of the field; (6) the level of ordinary skill; and (7) the scope of the claimed invention.
8.4.2 The Best-Mode Disclosure Requirement
A “best mode” disclosure in a patent application relates to the best way known to the inventor of practicing the claimed subject matter at the time of filing the patent application. For example, if one of the claims in the application is directed to implementing a new software technique on a specific platform, then a disclosure of all points of “cleverness” relating to that specific implementation may be required. See the enablement cases cited supra; cf. Consolidated Aluminum Corp. v. Foseco Int'l, Ltd., 910 F.2d 804 (Fed. Cir. 1990) (affirming holding of inequitable conduct and resulting unenforceability of patent where patentee found to have concealed best mode intentionally).
On the other hand, if the claims are general in nature and applicable across a wide range of hardware — i.e., if they are not specific to any particular machine, operating system, etc. — then disclosure of specific implementation techniques may not be required. In particular, there is no rule that the details of a specific commercial implementation be disclosed; “[t]he focus of a section 112 inquiry is not what a particular user decides to make and sell or even in what field the invention is most likely to find success. Rather, in keeping with the statutory mandate, our precedent is clear that the parameters of a section 112 inquiry are set by the CLAIMS.” Zygo Corp. v. Wyko Corp., 79 F.3d 1563, 1567 (Fed. Cir. 1996) (affirming judgment that patent was not invalid for failure to disclose best mode) (emphasis in original).
8.4.3 No Requirement to Disclose Source Code
Patent application drafters and their clients frequently must confront the question whether to include in an application the source code of a computer program used in the invention. While the case law was unclear at first, technically the answer now appears to be “no”; the Federal Circuit has held several times that there is no hard and fast requirement for a source-code disclosure. “[W]hen disclosure of software is required, it is generally sufficient if the functions of the software are disclosed, it usually being the case that creation of the specific source code is within the skill of the art.” Robotic Vision Systems, Inc. v. View Eng'g, Inc., 112 F.3d 1163, 1166 (Fed. Cir. 1997) (reversing summary judgment of invalidity; holding that patent's disclosure of functions was adequate and that disclosure of source code was not necessary for compliance with best mode requirement), citing Fonar Corp. v. General Electric Co., 107 F.3d 1543 (Fed. Cir. 1997) (same).
Disclosure of source code can still be a good idea, however, as discussed in § 3.5[d][2].
8.4.4 The Claims Define the Protectable Invention
The last section of a patent contains the claims, which define the patented invention in words. There is no infringement of a patent unless the accused product (or process) is “covered” by at least one claim of the patent. Any similarities or dissimilarities between the description in the patent and the accused product are irrelevant, because “[t]he written description part of the specification itself does not delimit the right to exclude. That is the function and purpose of claims.” Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995) (in banc), aff'd, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Seventh Amendment does not require jury trial of disputes over proper interpretation of patent claim).
Each claim sets forth a number of checklist-like elements. To prove infringement, a patent owner must show that every element of at least one claim is present in the accused product or process. (In a patent claim, less is more: A claim that has very few elements will be satisfied – i.e., infringed – by more things than will a claim that has more elements.)
Three hypothetical examples of patent claims are set out in the inset below.
| 1. [Independent claim] A chair comprising: |
| (a) a seat; and |
| #+beginquote |
| (b) at least three legs extending downward from the seat. |
| #+endquote |
| 2. [Dependent claim] The chair of claim 1, further comprising a fourth leg extending downwardly from the seat. |
| 3. [Dependent claim] The chair of claim 2, further comprising a back. |
Hypothetical Examples of Patent Claims
8.4.5 The Novelty Requirement
One of the most important checks and balances in the patent system is that a patent cannot be granted on an invention that had already been invented. Even an independent reinvention of something that was already known is unpatentable by law. See 35 U.S.C. § 102 (categories of “prior art” that can preclude patentability of an invention). The underlying policy is that technology that is already available to the public should not be taken away from it by the granting of exclusionary rights. See, e.g., Graham v. John Deere & Co., 383 U.S. 1, 6 (1966).
If a patent claim — which was described above as a list of elements or method steps that serves to define the claimed invention in question — is satisfied or “met” by technology that was already known in the art, then the claim is unpatentable. In the parlance of the patent bar, the claimed subject matter is “anticipated.”
• For example, if someone else invented the subject matter first, and did not abandon, suppress, or conceal it, then the second inventor is not entitled to a patent (whether or not the first inventor is or might have been so entitled). See 35 U.S.C. § 102(g).
• If the claimed subject matter was patented or described in a printed publication anywhere in the world, or known or used by others in this country, before the inventor invented it, then it is unpatentable to that inventor. See 35 U.S.C. § 102(a).
8.4.6 “Obvious” Subject Matter is Unpatentable
Even if a single prior-art reference does not completely satisfy a patent claim's list of elements, the claim may still be unpatentable. The patent statute provides that if the claimed subject matter would have been “obvious” in view of what was already known, the claim is unpatentable. See 35 U.S.C. § 103 (statutory requirement of nonobviousness).
A useful discussion of a variety of obviousness-related issues can be found in WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1355-60 (Fed. Cir. 1999) (affirming judgment that patent on slot machine using computer-simulated spinning reels was not invalid for obviousness).
Measuring the Claimed Subject Matter Against the “Prior Art”
In evaluating the nonobviousness of a claimed invention, the ultimate question is whether the prior activities and publications of others would have made the claimed invention obvious to a hypothetical person of ordinary skill at the time it was invented. The phrase “hypothetical person of ordinary skill” is an important one. What counts is not what would have been obvious to the inventor (who may be of far greater – or lesser – skill than those of ordinary skill), but instead what would have been obvious to those who were practicing the art or arts in question. See generally, e.g., Custom Accessories, Inc., v. Jeffrey-Allan Industries, Inc., 807 F.2d 955, 962‑63 (Fed. Cir. 1986) (factors involved in determining level of ordinary skill); Bausch & Lomb, Inc., v. Barnes-Hind/Hydrocurve, Inc., 796 F.2d 443, 447 (Fed. Cir. 1986) (inventor's subjective belief of obviousness not dispositive of the issue).
A shorthand metaphor sometimes used by the courts is: Consider a worker of “ordinary” skill in his workshop. Hanging on the workshop walls are all the prior patents, publications, known devices, etc., that such a worker might consult and study if he were diligently researching a problem and how to solve it. Assume that this worker is familiar with all of these materials. The worker is assumed to be an ordinary worker and not someone who seeks to innovate. See Standard Oil Co. v. American Cynamid Co., 774 F.2d 448, 454 & n.3 (Fed. Cir. 1985), citing In re Winslow, 365 F.2d 1017 (CCPA 1966), and In re Antle, 444 F.2d 1168 (CCPA 1971).
Generally speaking, the question is: would these materials have suggested or taught, to such a worker, the subject matter that is being claimed by the patent owner, as set forth in the claim's checklist of elements? If so, the claimed subject matter would have been obvious and is unpatentable to the claimant; otherwise not. E.g., ACS Hospital Systems, Inc., v. Montefiore Hospital, 732 F.2d 1572, 1577 (Fed. Cir. 1984).
The Supreme Court laid down the basic analytical requirements for determining nonobviousness in Graham v. John Deere & Co., 383 U.S. 1 (1966). A decisionmaker inquiring into the nonobviousness question must ascertain (1) the scope and content of the prior art; (2) the level of ordinary skill in the art; and (3) the differences between the prior art and the claimed subject matter as a whole. Giving due weight to any circumstantial evidence, the decisionmaker must rule whether the claimed subject matter would have been obvious. See id. at 17‑18; Panduit Corp. v. Dennison Mfg. Co., 810 F.2d 1561, 1567 (Fed. Cir. 1987). The ultimate question of obviousness is one of law. Panduit, 810 F.2d at 1566‑67.
The Importance of Circumstantial Evidence of Nonobviousness
Evaluating the obviousness of an invention in retrospect can be difficult. As noted above, the courts have held that hindsight is not the proper perspective — hindsight reconstruction of the claimed invention, “using `the patent in suit as a guide through the maze of prior art references, combining the right references in the right way so as to achieve the results of the claims in suit,'“ is impermissible. Grain Processing Corp. v. American Maize-Products Corp., 840 F.2d 902, 907‑08 (Fed. Cir. 1988) (citation omitted). Once the invention is known, however, by definition a certain amount of hindsight is involved. Add to this difficulty the fact that judges and juries are frequently untrained in technological matters.
Consequently, the courts attempt to look at “objective” evidence, which can aid in deciding the obviousness question by viewing it through the eyes of others. Nonobviousness can be (but is not necessarily) objectively indicated in a number of ways:
- commercial success that is linked with the specific subject matter being claimed by the inventor;
- unexpected results or -properties;
- copying by others;
- accolades from others in the field;
- initial skepticism on the part of those skilled in the art;
- satisfying a long-felt need;
- solving a problem that had stumped others;
- licenses showing industry respect.
"These objective considerations can protect against the prejudice of hindsight bias, which often overlooks that the genius of invention is often a combination of known elements which in hindsight seems preordained."
Objective evidence of this kind often can be the most probative evidence of the nonobviousness of the claimed subject matter. Commercial success in particular can provide strong evidence of nonobviousness, because:
- Commercial success implies that there was money to be made with the invention;
- If the invention had in fact been obvious, the chances are that someone would have done it before;
- By hypothesis, the invention is novel (otherwise for that reason alone it would be unpatentable);
- Therefore, the commercial success indicates that the invention also was nonobvious.
BUT: Courts won't give any weight to objective evidence of nonobiousness unless the patent owner shows a nexus (a connection) between, e.g., the commercial success and the merits of the claimed invention. For example, evidence of gross sales alone won't establish commercial success — market share is what counts. And in any case, the patent owner must show that the commercial success was due to the technical quality of the patented subject matter and not to other factors such as extensive advertising or the patent owner's preexisting leadership in the market.
Note that the absence of objective evidence of nonobviousness does not establish the obviousness of the invention and is only a “neutral” factor.
8.5 Building a Company's Software- or Internet Patent Portfolio
8.5.1 Why Build a Portfolio
One school of thought that says that when it comes to patents in a portfolio, more is better. Jay Walker, of Priceline.com fame, apparently belongs to that school; his company, Walker Asset Management Limited Partnership, is listed as the assignee of dozens of issued patents purportedly covering various aspects of e-commerce. Priceline.com itself said in a January 2000 press release (available on its Web site) that it had been notified of the allowance of its seventh patent and that it had filed some 25 patent applications dating back to 1996.
Some of the potential benefits of a patent portfolio include:
- A portfolio gives its owner something to bargain with if a competitor (or other company) comes knocking at the door, asserting its own patents.
- An issued patent constitutes prior art as against any subsequent patent applicants, thus serving as a defensive publication for the issued patent's owner.
- A patent on a company's key technology may help attract attention in the marketplace.
8.5.2 Consider Filing Lots of “Provisional” Patent Applications
Software and e-commerce companies interested in building a patent portfolio should consider adopting a Darwinian approach to building a patent portfolio: File cheap and informal provisional patent applications for as many inventions as practicable. The company can then use the phrase “patent pending” for its products or services covered by the provisional applications; it can decide later on whether to incur the expense of a regular patent application for some or all of the provisional applications. Three aspects of provisional applications make this a potentially workable strategy:
(i) The hard-dollar cost of a provisional application can be minimal. The official filing fee is only $75 for “small entities” (companies that have fewer than 500 employees including all affiliates), individual inventors, and educational and nonprofit institutions, and $150 for other companies, less than 25% of the fee for a regular application. See National application filing fees, 37 C.F.R. § 1.16(b). The filing fee is low for provisional applications because such applications are not given an examination by the PTO; they merely serve as “placeholders” for one year from their filing dates. See 35 U.S.C. § 111(b).
(ii) The content of a provisional application can be just about anything that meets the enablement- and best-mode disclosure requirements, discussed below. In particular, an inventor's informal but substantive write-up of the invention, plus a cover page with identifying information, can be filed as a provisional patent application. See Application number, filing date, and completion of application, 37 C.F.R. § 1.53(b)(2).
(iii) A nonprovisional patent application can later be filed during that one-year period, claiming priority as of the filing date of the provisional application for everything that was disclosed in the provisional application. See id. § 119(e).
So, if a company believes that it has an even arguably patentable invention, a useful approach can be to collect whatever documentation is available about the invention, put a cover sheet on it, and file it as a provisional patent application with a $75 or $150 fee as applicable. The documentation filed might take the form of a corporate invention disclosure form, an academic manuscript, a detailed lab notebook entry, source code for a computer program, etc.
There are risks, of course. A too-hasty provisional application might not meet the enablement- or best-mode requirements, discussed in § 3.4[a] and in § 3.4[b]. The inventor would then be forced to rely on a later filing date – which could be too late if the later filing date were after an applicable filing deadline (discussed below).
8.5.3 Pay Attention to Filing Deadlines for Patent Applications
Every country imposes filing deadlines for patent applications. Most if not all of these deadlines are tied to (a) disclosure, or (b) commercial activity, involving the claimed subject matter.
The U.S.'s One-Year Grace Period
In the United States (but not in most other countries), inventors have one year – no extensions can be obtained – in which to get a patent application on file after any of a number of events occur. See 35 U.S.C. § 102(b) (list of events that start the one-year clock running). The rationale for the grace period arises from a balance of two competing factors. The law regards it as undesirable policy to allow an inventor to take a long time to build up the market for his or her invention, and to wait until then to apply for years of patent protection. On the other hand, not every invention will be commercially significant enough to justify the cost of immediately preparing a patent application. Accordingly, U.S. law makes a compromise: it allows inventors a limited, one-year grace period in which to file a patent application.
Offers for Sale Start the Clock Running
A single offer for sale (or license) of the claimed subject matter in the U.S. can start the clock running. The offer, however, must be “objectively manifested” and “definite.” E.g., Envirotech Corp. v. Westech Eng'g Inc., 904 F.2d 1571, 1574, 1575 (Fed. Cir. 1990) (party asserting the bar “must prove by clear and convincing evidence … that there was a definite sale or offer to sell more than one year before the application for the subject patent”).
In some circumstances, simply exploring the market might not be enough to start the one-year clock running. E.g., Seal‑Flex, Inc. v. Athletic Track & Court Constr., 98 F.3d 1318, 1321 (Fed. Cir. 1996) (noting that “summary disposition is negated” when there is a genuine question “whether the inventor was merely exploring the market or had made an unconditional offer to sell ….”). /See also Articulate Systems, Inc.
- Apple Computer, Inc./, No. 96-10345-RGS, 1999 WL 307928 (D. Mass. May
11, 1999) (denying summary judgment; fact issue existed as to whether voice-recognition software developer's meetings with prospective purchasers involved sufficiently definite offers to constitute “offers for sale”).
An invention can be the subject of an offer for sale, even though it has not actually been built yet. Pfaff v. Wells Electronics, Inc., 525 U.S. 55, 119 S. Ct. 304 (1998) (affirming Federal Circuit reversal of district court's holding that invention was invalid because it was on sale more than one year before the critical date, but rejecting Federal Circuit's test for determining whether an invention was on sale).
In Pfaff, the Supreme Court adopted a two-part test for determining whether an invention had been offered for sale:
First, the invention must be the subject of a “commercial offer for sale,” and second, the invention must be “ready for patenting.”
- The second element, readiness for patenting, can be proved by proof of “reduction to practice before the critical date.” Id., 119 S. Ct. at 307 n.2 (citation omitted). Alternatively, readiness for patenting can be proved by showing that prior to the critical date, the inventor had prepared drawings or other descriptions of the invention that were sufficiently specific to enable a person skilled in the art to practice the invention. Id., 525 U.S. at __ & n.14, 119 S. Ct. at 312 & n.14.
Granting a license to a third party to commercialize an invention, without more, does not trigger the on-sale bar. In re Kollar, 286 F.3d 1326 (Fed. Cir. 2002) (reversing PTO rejection of patent application).
Sales or licenses to beta testers may come within an “experimental use” exception, but also might not qualify for such an exception. See § 3.5[c][5].
“Public” Use Can Bar a Patent
Any “public” use of the claimed subject matter in the U.S. can bar a patent if more than a year goes by. Use of invention is “public” if it is for gain, even if secret. Kinzenbaw v. Deere & Co., 741 F.2d 383 (Fed. Cir. 1984), citing Metallizing Engineering Co. v. Kenyon Bearing & Auto Parts Co., 153 F.2d 516 (2d Cir.) (L. Hand, J.).
Thus, an e-commerce company's internal use of a new computer program to control its own Web site is probably public use.
“Experimental” use devoted to proving the concept might not be public use, but use that is primarily commercial and only incidentally experimental may well be public use, as discussed above.
Other Barring Events
Any description of the claimed subject matter in a “printed publication” anywhere in the world, and in some circumstances a description in an issued patent anywhere in the world, will usually start the one-year clock running. See 35 U.S.C. § 102(b). The key to whether a given paper, master's thesis, on-line database item, etc., qualifies as a printed publication is usually whether the document is indexed so as to be locatable by a diligent researcher in the field of art in question.
And of course, if any of these events took place before the inventor's invention of his invention (that sounds awkward, but is basically how it is set forth in the patent statute), then the invention may be unpatentable anyway because the inventor was not the first. See 35 U.S.C. § 102(a).
In any given case, the date on which the clock starts running is often extremely fact-intensive (and hard-fought in litigation). In particular, the term “experimental,” as applied to public use or commercial use, is one that depends heavily on the facts of the case.
Beta Testing and the One-Year Deadline
Beta testing of software may or may not start the one-year clock running, depending on what the specific beta-testing arrangements are. In some circumstances, beta testing may be “experimental” use that does not begin the one-year grace period. In proving the experimental nature of the use, it helps if the beta testers are subject to a written obligation of confidence (but confidentiality alone will not necessarily establish experimental use). In other situations, use of software by beta testers might, or might not, be “public” or “commercial” use that starts the one-year clock running. The deadline for filing a patent application might be a year after the first such use, even though the general release of the software might have been months thereafter. The safest bet is ordinarily to assume the worst, and to file a patent application less than one year after the first beta shipment or beta use of any kind.
Selected cases:
City of Elizabeth v. American Nicholson Pavement Co., 97 U.S. 126 (1878): In this “granddaddy” of experimental-use cases, the Supreme Court held that a patent owner's use of a patented road paving material on privately owned toll road, for six years prior to filing of application for patent, was “experimental” and did not bar the patent.
Paragon Podiatry Laboratory, Inc. v. KLM Laboratories, Inc., 984 F.2d 1182, 1185-87, 1190-93 (Fed. Cir. 1993): The Federal Circuit affirmed a summary judgment that patent was invalid. The patented orthotic device had been sold prior to one year before the application filing date. The court held that such sales were not “experimental,” despite inventor's affidavit to that effect. The patent owner had published price lists and sales letters that did not mention testing but did refer to “exhaustive clinical testing” and “lifetime guarantee.” In addition, the patent owner had not retained control of the orthotic devices, nor restricted their use. In addition, the court affirmed a summary judgment of inequitable conduct (see § 3.5[g][2]) for knowing failure to disclose the barring sales to patent examiner.
Manville Sales Corp. v. Paramount Systems, Inc., 917 F.2d 544, 551 (Fed. Cir. 1990): The Federal Circuit described the distinctions between barring “public” use vs. nonbarring “experimental” use.
Kinzenbaw v. Deere & Co., 741 F.2d 383 (Fed. Cir. 1984): The Federal Circuit held that secret use of a patented process for gain prior to the critical date was a barring “public” use.
TP Laboratories, Inc., v. Professional Positioners, Inc., 724 F.2d 965 (Fed. Cir. 1984): The court held that pre-critical-date use of a patented dental appliance on orthodontal patients had been experimental use.
No Grace Period in Most Other Countries
Most foreign countries do not allow the one year grace period that is provided by the United States. Consequently, if protection is desired in other countries, publication and commercialization efforts, and even beta testing, usually should be held up until after the U.S. application is filed. And for some countries (notably Taiwan), such efforts should be delayed until the application is filed in that country.
However, most countries will recognize each others' patent application filing dates for up to one year. For example, filing a patent application in the U.S. gets the inventor a priority date for France, as long as a French application is filed within one year after the U.S. filing date.
Two additional points should be noted about applying for patent protection in other countries:
(i) A foreign-filing license from the U.S. Patent and Trademark Office, similar to an export license, is required before filing in foreign countries. See 35 U.S.C. §§ 184‑185 (foreign-filing licensing requirement).
(ii) Many foreign countries do not allow patent protection for software to begin with.
8.5.4 Create a Judge- and Jury-Friendly Patent Application
Too often, patent applications are written for scientists and engineers, when the ultimate real-world audience consists of judges and jurors. In an infringement lawsuit, the patent in suit will always be admissible in evidence (and thus, unlike most demonstrative exhibits, it will always go back into the jury room during the jurors' deliberations).
So, in drafting the patent application, there is no reason not to think ahead to the trial and to include jury-friendly technical explanations, drawings, and the like. In particular, including source code in the patent application could pay big benefits in fending off a challenge to the sufficiency of the patent's disclosure.
Flow Charts and Pseudocode for Possible Use as Trial Exhibits
A company filing a patent application can take advantage of at least two opportunities for creating useful trial exhibits in the body of the patent itself:
(i) Flow charts, included as part of the drawings of the patent application, can be used by a technical expert witness at trial in talking the jury through how the invention actually works. Because the patent itself will go back into the jury room during the jury's deliberations, the drawings can be a helpful aid to the jury.
(ii) Pseudocode, i.e., a quasi-English description of the functions performed by the software, can also be used as a teaching tool by an expert witness who talks through the pseudocode for the jury.
Benefits of Disclosing Source Code in a Patent Application
Because disclosure of source code in a patent application is not required, see § 3.4[c], many applicants elect not to disclose source code because of a real or imagined concern that competitors would learn more from the source code than is required to be disclosed by statute. But inclusion of source code in a patent application can have some distinct advantages.
(i) A patent application with source code is probably cheaper and quicker to write than the same application without source code. When source code is disclosed, the drafter of the patent application can focus on explaining the significance of the program steps and need not spend time elaborating on details already disclosed in the code.
(ii) If the prior art turns out to be closer than previously thought, inclusion of source code can permit the patent attorney to draft new claims directed to specific implementation details that are disclosed in the source code but not in the actual patent-application text.
(iii) Source code can be an insurance policy against substantive errors in explaining the invention in the patent application. The statute provides that “new matter” cannot be added to a patent application after it is filed. See 35 U.S.C. § 132(a). If the patent attorney who drafts the patent application makes a mistake in describing some aspect of the invention, and if the inventor does not catch the mistake until after the application is filed, a source-code appendix can be used to support a later post-filing amendment to correct the mistake despite the new-matter prohibition.
(iv) Disclosure of source code can help shield a patent application and any subsequent patent against challenges on best-mode or enablement grounds (see § 3.4[a] and § 3.4[b]). A jury is less likely to be convinced that the patent contains an insufficient disclosure if the source code is included.
Actual code (source or executable) can be disclosed in several different ways. An appendix can be submitted either in microfiche (if more than 10 printout pages) in accordance with specified standards, see Submission of computer program listings, 37 C.F.R. § 1.96(b), or in hard copy. Id. at § 1.96(a)(2). If hard copy is submitted, it should either come after the specification and before the claims and be numbered accordingly, see id. (some examiners take literally the requirement of 35 U.S.C. § 112 that the specification “conclude” with one or more claims), or it can be submitted as drawings if ten pages or less. See id.
The competitive dangers of including source code in a patent application will vary with the circumstances. Patent applications normally are kept secret by the Patent and Trademark Office (PTO) unless and until a patent issues (or unless a foreign counterpart patent application is filed, in which case the U.S. application will be published approximately 18 months after its filing date under recent amendments to 35 U.S.C. § 122(b)). See Patent applications preserved in secrecy, 37 C.F.R. § 1.14. Public disclosure of the source code therefore is probably some time off. Unless the source code's owner does nothing to improve the code during the intervening period, a competitor studying the code may well be studying old technology — and probably will have committed to its own design by that time anyway. (The potential influence on competitors of the not-invented-here syndrome also should not be underestimated.) Because disclosure of source code is not required, it can be considered on a case by case basis. Business risks are involved either way; the proprietor of the software can determine which risk it prefers to take.
8.5.5 Claim Things That Are Provable
A company that drafts claims to an e-commerce invention should give some thought to how infringement will be proved, either at trial or in a summary judgment motion. One straightforward approach is to claim the invention as a method performed by (preferably) a single processor or (if necessary) multiple processors. For example, consider the following claim from an Amazon.com patent (with bracketed paragraph numbering added); demonstrating infringement of such a claim likely would be straightforward:
| 1. A method of placing an order for an item comprising: |
| [a] under control of a client system, |
| #+beginquote |
| [1] displaying information identifying the item; and |
| [2] in response to only a single action being performed, sending a request to order the item along with an identifier of a purchaser of the item to a server system; |
| [b] under control of a single-action ordering component of the server system, |
| [1] receiving the request; |
| [2] retrieving additional information previously stored for the purchaser identified by the identifier in the received request; and |
| [3] generating an order to purchase the requested item for the purchaser identified by the identifier in the received request using the retrieved additional information; and |
| [c] fulfilling the generated order to complete purchase of the item. |
| #+endquote |
8.5.6 Draft Claims With Future Provisional Royalty Rights in Mind
The Internet world moves at lightning speed, but the PTO does not always do likewise. Even in the best of all possible worlds, a U.S. patent will not issue until about a year after its filing date (and that assumes that the applicant successfully requests accelerated examination of the application). The normal time to issuance can be anywhere from two to four years.
Until recently, this meant that an infringer suffered no legal penalty for its pre-issuance activities. That will change on November 29, 2000. That is the effective date of a new provision of the Patent Act, to be codified as 35 U.S.C. § 154(d), contained in section 4505 of the Intellectual Property and Communications Omnibus Reform Act of 1999, S. 1948 (enacted as part of Public Law 106-113) (the “1999 Act”).
New section 154(d) provides for “provisional rights.” Under certain circumstances, the owner of a patent whose application was filed on or after that effective date will be able to recover damages for infringement that occurred even before the patent was issued. The new provisional rights will work basically like this:
(i) The patent application is filed on or after November 29, 2000.
(ii) The patent application is published promptly after the expiration of 18 months after its filing date – or, notably, on an earlier date if so requested by the applicant. See 1999 Act § 4502, to be codified as 35 U.S.C. § 122(b)(1)(A).
(iii) After the patent issues, the accused infringer is proved 1) to have had actual notice of the published patent application, and 2) to have infringed, after the publication date, at least one claim that is “substantially identical” to a claim in the published application.
(iv) The patent owner is then entitled, not only to proved damages for post-issuance infringement, but also to a reasonable royalty for the infringement occurring between the publication date of the patent application and the issue date of the patent itself.
So, a company that files a patent application on or after November 29, 2000, should consider doing the following:
Craft several claims that are as narrow as possible in scope while still covering what an infringer is likely to do;
- Request early publication of the patent application;
- Upon publication, give actual notice of the published application to competitors and other likely infringers.
8.5.7 Take Advantage of the Statutory Presumption of Validity
by Aggressively Disclosing “Prior Art” to the Patent Examiner
:CUSTOMID: take-advantage-of-the-statutory-presumption-of-validity-by-aggressively-disclosing-prior-art-to-the-patent-examiner
Strengthening a Patent Through Disclosure
A company that files a patent application can “strengthen” any resulting patent by aggressively disclosing prior art to the PTO. By statute, a patent is presumed to be valid, and each claim is presumed valid independently of the validity of any other claims. See 35 U.S.C. 283; see also § 3.8[d] . In addition, patent owners usually benefit from a real-world psychological bias, on the part of judges and especially jurors, in favor of believing that the PTO did a good job.
But the PTO's search library is far from perfect; the patent examiner might well have been unaware of important prior art. This is especially true in the software field, where much prior art is not documented in patents or printed publications.
With that in mind, now suppose that an accused infringer claims that a patent is invalid because of prior art. The court, and especially the jury, will naturally take into account whether or not the PTO considered the prior art in question during the patent-examination proceedings:
(i) If the accused infringer can point only to prior art that was already considered by the patent examiner, it will have a very tough time convincing the jury that the patent is invalid.
(ii) On the other hand, if an accused infringer is able to come up with significant prior art that was not considered by the patent examiner, then the accused infringer's trial counsel will surely beat the drum about the fact that the PTO did not know about it.
A company filing a patent application can therefore consider doing a prior-art search of its own, with an eye toward stealing a defendant's thunder at trial. Some possible places to search include:
- Software Patent Institute database: http://www.spi.org/
- PTO database: See http://www.uspto.gov/patft/index.html
- EPO worldwide database - See http://ep.espacenet.com/
- Gregory Aharonian: http://www.patent-software.com/STO.htm
Avoiding Trouble Through Disclosure of “Material Information”
Disclosing known material prior art and other known material information to the PTO is more than just a good idea; it's the law. A patent applicant (as well as certain others associated with the prosecution of the patent application) has an affirmative legal duty to disclose to the PTO all known “material” information. Failure to comply with that duty can render the patent unenforceable for “inequitable conduct” in the PTO. See 37 C.F.R. § 1.56; see generally, e.g., Paragon Podiatry Laboratory, Inc. v. KLM Laboratories, Inc., 984 F.2d 1182, 1190-93 (Fed. Cir. 1993) (affirming summary judgment of inequitable conduct and patent unenforceability for knowing failure to disclose barring sales to patent examiner).
Even if litigation never occurs, a company that obtains a questionable patent may find itself attracting undesired publicity. Consider the famous Compton's multimedia-encyclopedia patent, “Multimedia search system using a plurality of entry path means which indicate interrelatedness of information,” U.S. Patent No. 5,241,671. At Fall Comdex 1993, Compton's announced a licensing program in which it sought royalties from publishers of CD-ROM encyclopedias and similar products. The announcement touched off a firestorm in the computer industry. See, e.g., John Eckhouse, Key Patent To Shake Multimedia Industry, San Francisco Chronicle, Nov. 15, 1993, posted at http://www.base.com/software-patents/articles/compton.html. The patent was soon recalled for reexamination by the PTO; eventually it was invalidated in view of numerous prior-art references that had never been considered by the patent examiner.
More recently, the PTO recalled a much-noted patent on the so-called windowing approach to dealing with the Y2K problem of two-digit year dates. See U.S. Patent & Trademark Office, “Patent and Trademark Office Orders Reexamination of Y2K Fix Patent,” Dec. 21, 1999, at http://www.uspto.gov/web/offices/com/speeches/99-51.htm.
8.5.8 Start Collecting “Objective Evidence of Non‑Obviousness”
As discussed in § 3.4[f][3], evaluating the obviousness of an invention in retrospect can be difficult, and thus the courts use “objective evidence” of nonobviousness. Companies attempting to build a portfolio should be on the lookout for objective evidence of this kind.
8.6 Ownership of Inventions and Patent Rights
8.6.1 Ownership of Employee Inventions
U.S. patent rights belong initially to inventors. The patent statute's basic granting provision states that inventors may obtain patents on new, useful, and unobvious inventions. See 35 U.S.C. § 101. The statute further states that applications for patent may be filed only by inventors or persons authorized by them. Id. § 111. A third party may file an application on behalf and as agent of an inventor who has assigned the invention to the third party (or agreed in writing to assign it), but unlike in many other countries, where an employer or other assignee can file a patent application in its own name—even then the patent is issued to the inventor, not to the third party. Id. § 118. If a patent is granted to a person who was not the true inventor (e.g., to someone who filed a patent application on another's invention), then the true inventor can compel assignment of the patent to him. E.g., Richardson v. Suzuki Motor Co., 868 F.2d 1226, 1249‑50 (Fed. Cir. 1989).
No General Duty to Assign Invention Rights to the Employer
Patents and invention rights can be assigned by employees to their employers, see 35 U.S.C. § 262, and likewise can be the subject of contractual duties to assign.
Ordinarily, no duty to assign attaches to inventions made by non-fiduciary employees, absent a written assignment agreement or hired-to-invent status. This is in contrast to the rule about copyrights belonging to employers when the work is created within the scope of employment – even inventions made in fields relating to the employment are usually exempt from assignment to the employer:
[I]f the employment be general, albeit it covers a field of labor and effort in the performance of which the employee conceived the invention for which he obtained a patent, the contract is not so broadly construed as to require an assignment of the patent.
United States v. Dubilier Condenser Corp., 289 U.S. 178, 187 (1933).
(Most of the leading cases dealing with ownership of employee inventions are pre-Erie R.R. v. Tomkins, 304 U.S. 64 (1938), and thus are technically of doubtful authority as to state law; they nevertheless continue to be cited and followed by both federal and state courts.)
Exception: Employees Who Were “Hired to Invent” Usually Must Assign
Employees who are “hired to invent” normally will be required to assign their inventions and patent rights. E.g., /Standard Parts Co.
- Peck/, 264 U.S. 52 (1924); Solomon v. United States, 137 U.S. 342,
346 (1890). As the Supreme Court said in Solomon:
An employe[e], performing all the duties assigned to him in his department of service, may exercise his inventive faculties in any direction he chooses, with the assurance that whatever invention he may thus conceive and perfect is his individual property. . . .
But this general rule is subject to these limitations: If one is employed to devise or perfect an instrument, or a means for accomplishing a prescribed result, he cannot, after successfully accomplishing the work for which he was employed, plead title thereto as against his employer.
That which he has been employed and paid to accomplish becomes, when accomplished, the property of his employer. Whatever rights as an invididual he may have had in and to his inventive powers, and that which they are able to accomplish, he has sold in advance to his employer.
Solomon, 137 U.S. at 346 (paragraphing supplied).
Exception: Employees Who Were “Set to Experimenting” Probably Must
Assign
:CUSTOMID: exception-employees-who-were-set-to-experimenting-probably-must-assign
Likewise, employees who are “set to experimenting” to solve a specific problem will be required to assign their invention rights, even though they might not have been originally hired to invent. Teets v. Chromalloy Gas Turbine Corp., 83 F.3d 403 (Fed. Cir. 1996) (reversing declaratory judgment that employee owned invention; parties had implied-in-fact assignment agreement); Houghton v. United States, 23 F.2d 386 (4th Cir. 1928); Forberg v. Servel, Inc., 88 F. Supp. 503 (S.D.N.Y. 1949); cf. Moore v. American Barmag Corp., 693 F. Supp. 399, 401‑03 (W.D.N.C. 1988) (reviewing case law; material fact issue existed whether employee had been directed to work on solving problem), subsequent proceeding, 710 F. Supp. 1050 (W.D.N.C. 1989) (fact issue existed as to whether employer entitled to shop right). It may not be necessary for an employer to make a formal directive that an employee commence experimenting; an informal request may suffice. See Miller v. GTE Corp., 1989 WL 258184 (S.D. Tex. 1989) (granting defendants' motion for summary judgment dismissing former employee's claim for misappropriation of invention; former employee had a duty to assign invention rights to employer).
Exception: Officer / Director Fiduciary Obligation to Assign
(iv) In some circumstances, an inventor associated with a company as an officer (or director) may have an equitable duty to assign his or her patent rights to the company. Corporate officers and directors may have a fiduciary obligation to assign inventions to their corporation when the inventions relate to the business or occupation of the corporation. Kennedy v. Wright, 676 F. Supp. 888, 893 (C.D. Ill. 1988) (collecting cases; patent infringement suit by former president of corporation against successor to corporation dismissed; successor owned equitable title to patents because of plaintiff's fiduciary duty to assign to corporation); Great Lakes Press Corporation v. Froom, 695 F. Supp. 1440 (W.D.N.Y. 1987) (granting partial summary judgment requiring former president of company to assign two patents to company); Davis v. Alwac International, Inc., 369 S.W.2d 797, 802 (Tex. Civ. App.—Beaumont 1963, writ ref'd n.r.e.); /North Branch Products, Inc.
- Fisher/, 131 U.S.P.Q. (BNA) 135 (D.D.C. 1961) (corporation owned
equitable title to inventions made by inventor who was shareholder, officer, director, and general manager of corporation), aff'd, 312 F.2d 880 (D.C. Cir. 1962), cert. denied, 373 U.S. 913 (1963); compare with National Waste Co. v. Spring Packing Co., 200 F.2d 14, 15, 16 (7th Cir. 1952) (mechanic did not have confidential relationship to corporation and thus no legal duty existed), cert. denied, 395 U.S. 905 (1953).
One early Texas case seemingly indicates that no such fiduciary duty exists. See North v. Atlas Brick Co., 2 S.W.2d 980, 984 (Tex. Civ. App.—El Paso 1928), reversed on different grounds, 13 S.W.2d 59 (Tex. Comm'n App. 1929, opinion adopted); prior proceedings, 281 S.W.2d 608 (Tex. Civ. App.—El Paso), modified, 288 S.W.2d 146 (Tex. Comm'n App. 1926, opinion adopted). The holding in that case may be fact-dependent (the departed officer apparently was a troubleshooter who took over in conjunction with a planned acquisition of the company). Compare id., 281 S.W. at 609 (first court of appeals opinion) (company alleged it hired former president because it had needed new brickmaking methods to survive increasing competition); with id. at 610‑11 (former president alleged that he assumed that office only in conjunction with agreement to buy all stock in company). The case has never been expressly overruled, but has not noticeably been followed on that particular point. See Davis, 369 S.W.2d at 802 (citing but apparently ignoring rationale of Atlas Brick).
State Statutory Regulation of
Employees' Duty to Assign Invention Rights
:CUSTOMID: state-statutory-regulation-of-employees-duty-to-assign-invention-rights
Most companies that develop technology require all employees to execute written employment contracts that call for assignment of all inventions related to the company's business. Some forms of contract require assignment of even broader categories of invention.
A number of states, however, limit by statute the types of inventions which an employer can require an employee to assign. California's employee invention-ownership statute includes perhaps the most detailed provisions in some respects. Cal. Lab. Code §§ 2870‑2871. That statute provides that:
(a) Any provision in an employment agreement which provides that an employee shall assign, or offer to assign, any of his or her rights in an invention to his or her employer shall not apply to an invention that the employee developed entirely on his or her own time without using the employer's equipment, supplies, facilities, or trade secret information except for those inventions that either:
(1) Relate at the time of conception or reduction to practice of the invention to the employer's business, or actual or demonstrably anticipated research or development of the employer.
(2) Result from any work performed by the employee for the employer.
(b) To the extent a provision in an employment agreement purports to require an employee to assign an invention otherwise excluded from being required to be assigned under subdivision (a), the provision is against the public policy of this state and is unenforceable.
Id. § 2870.
No employer shall require a provision made void and unenforceable by Section 2870 as a condition of employment or continued employment.
Nothing in this article shall be construed to forbid or restrict the right of an employer to provide in contracts of employment for disclosure, provided that any such disclosures be received in confidence, of all of the employee's inventions made solely or jointly with others during the term of his or her employment, a review process by the employer to determine such issues as may arise, and for full title to certain patents and inventions to be in the United States, as required by contracts between the employer and the United States or any of its agencies.
Id. § 2871 (paragraphing supplied).
Some other states have statutes that are similar in their line-drawing between permissible and impermissible assignment provisions, and in their prohibition against the imposition of such provisions by employers:
Delaware's law does not include California's safe-harbor provisions for employers, in the last quoted paragraph above. See Del. Code Ann. § 805.
· Illinois, Minnesota, and Washington go further in their restrictions: they impose an affirmative duty on employers who require invention-assignment covenants to notify their affected employees of the statutory limitations on those covenants. See Ill. Ann. Stat., ch. 140, para. 302; Minn. Stat. § 181.78; Wash. Rev. Code § 49.44.140.
· North Carolina's statute expressly places the burden of proof on employees who assert their individual ownership of their work-related inventions. See N.C. Gen. Stat. § 66‑57.1.
8.6.2 Shop Rights in Employees' Off‑Duty Inventions
Even if an employee is not obligated to assign an invention outright to his or her employer, he or she may still be deemed to have granted the employer the right to use the invention for the employer's own purposes (but not necessarily to authorize others to use it). If the inventor implicitly consented to the employer's use, the employee may be deemed to have granted an implied license; or, if the development of the invention was done on company time or using company resources, the employer may be equitably entitled to a “shop right” to use the invention. See, e.g., United States v. Dubilier Condenser Corp., 289 U.S. 178 (1933) (employees owned invention but government-employer had shop right); McElmurry v. Arkansas Power & Light Co., 995 F.2d 1576, 1580-82, (Fed. Cir. 1993) (courts should review “totality of the circumstances” to determine whether fairness dictates that employer get a shop right); California Eastern Laboratories, Inc. v. Gould, 896 F.2d 400 (9th Cir. 1990) (when employer sold all of its assets to a purchaser which subsequently distributed the assets to its subsidiaries, the employer's shop right was transferred along with the assets); Wommack v. Durham Pecan Co., 715 F.2d 962 (5th Cir. 1983); Francklyn v. Guilford Packing Co., 695 F.2d 1158 (9th Cir. 1983). Cf. Mechmetals Corp. v. Telex Computer Prods., Inc., 709 F.2d 1287 (9th Cir. 1982) (no shop right).
8.6.3 Be Careful About “Joint Ownership” of Inventions Co‑Developed
with Other Companies
:CUSTOMID: be-careful-about-joint-ownership-of-inventions-codeveloped-with-other-companies
Lucent Technologies, Inc. v. Gateway, Inc., 543 F.3d 710 (Fed. Cir. 2008): affirmed overturning a $1.5 billion jury verdict because Lucent couldn't bring suit on its own — Fraunhoffer, a German company, was a co-owner of the patent.
If employees from two or more companies collaborate in developing an invention, to the point where they are “joint inventors,” then each of their respective companies may have a claim, through the respective employees, to a joint ownership interest in any resulting patent, together with the right to practice and/or license the invention without accounting to any other joint owner. See 35 U.S.C. § 262 (joint inventors are joint owners of patent).
Not every invention developed in cooperation with another company will be a joint invention. “[A]t least some quantum of collaboration or connection” is needed for two individuals to be joint inventors. See Kimberly‑Clark Corp. v. Procter & Gamble Distributing Co., 973 F.2d 911, 915-17 (Fed. Cir. 1992) (affirming judgment that patent owner was not entitled to priority based on joint invention and patent was thus invalid).
A worker who simply follows instructions given by a person who conceives an invention does not thereby become a joint inventor. See Sewall v. Walters, 21 F.3d 411 (Fed. Cir. 1994) (affirming decision of Board of Patent Appeals and Interferences that sole inventor was entitled to a patent).
(If all inventors are not properly named in a patent application, an omitted inventor can file suit to add his or her name and thus become a joint owner. See 35 U.S.C. § 256 (correction of inventorship); cf., e.g., MCV, Inc., v. King-Seeley Thermos Co., 870 F.2d 1568 (Fed. Cir. 1989) (purported co-inventor equitably estopped by four-year delay in asserting claim of inventorship).)
Notably, the patent statute expressly provides that each joint owner is entitled to make, use, and sell the patented invention without the consent of and without accounting to the other owner(s). 35 U.S.C. § 262. In addition, a judicially developed patent-law doctrine holds that joint owners (e.g., joint inventors or joint assignees) can each license the patented invention independently of each other. Willingham v. Star Cutter Co., 555 F.2d 1340, 1344 (6th Cir. 1977); Talbot v. Quaker State Oil Refining Co., 104 F.2d 967, 967‑68 (3d Cir. 1939); Miller v. GTE Corp., 1991 WL 218509 (S.D. Tex. June 20, 1991); Bendix Aviation Corp. v. Kury, 88 F. Supp. 243 (E.D.N.Y. 1950) (citing cases).
(This is in contrast to joint authors of a copyrighted work, who must account to one another for their respective uses of the work. See, e.g., Oddo v. Ries, 743 F.2d 630, 632‑33 (9th Cir. 1984) (under California law, partners were co-owners of partnership copyright assets; copyright law thus required partners to account to each other for their uses of those assets).)
Claims of joint ownership of patent rights can have enormous economic significance. The Burroughs Wellcome case, for example, involved a dispute over ownership of major biotech patent rights. The Federal Circuit summarized the requirements that must be met by a would-be joint inventor seeking to establish an ownership interest:
Conception is the touchstone of inventorship, the completion of the mental part of invention. It is “the formation in the mind of the inventor, of a definite and permanent idea of the complete and operative invention, as it is hereafter to be applied in practice.” Conception is complete only when the idea is so clearly defined in the inventor's mind that only ordinary skill would be necessary to reduce the invention to practice, without extensive research or experimentation.
Burroughs Wellcome Co. v Barr Laboratories, Inc., 40 F.3d 1223, 1227-28 (citations omitted, emphasis and paragraphing edited). The court held that the claimant did not contribute to the conception of the claimed subject matter and thus was not a joint inventor. Id.
8.6.4 Common-Law Scrutiny of Invention Assignment Agreements
Invention assignment agreements can additionally be subject to common-law scrutiny for reasonableness, especially when they require employees to assign inventions after the termination of employment.
For example, in the 1988 case of Ingersoll-Rand Co. v. Ciavatta, the New Jersey Supreme Court held that, on the facts of the case, a company could not require its former employee to assign an invention conceived after he was terminated, notwithstanding that the invention related directly to the company's business and that the employment contract required such an assignment. The court set out an extensive scholarly discussion of the public policy factors affecting its decision, id. at 886‑92. and concluded that it would apply a reasonableness test similar to that used to analyze post-termination noncompetition clauses. Id. at 891‑92; see generally D. Aspelund & C. Eriksen, Employee Noncompetition Law.
On the other hand, in MAI Basic Four, Inc., v. Basis, Inc., 880 F.2d 286, 287‑88 (10th Cir. 1989), the court held that an employment contract provision, which required the employee to assign inventions made during employment or within 90 days thereafter, was not a restrictive covenant akin to a covenant not to compete.
8.6.5 Assignment Instruments
A written instrument is required to assign a patent right. See 35 U.S.C. § 261, second paragraph. If a written patent conveyance instrument is properly acknowledged, it serves as prima facie evidence of the transfer. See 35 U.S.C. § 261, third paragraph. If an assignment is to include the right to sue for past infringement, that fact should be expressly recited in the instrument. In addition, the instrument could set forth covenants concerning the assignor's duty to cooperate in protecting and perfecting the assigned rights. A sample form of assignment is included as an appendix at the end of this paper.
8.6.6 Recordation of Patent Assignments
As with most forms of property, assignments of patent rights must be recorded in order to be valid against subsequent good faith purchasers or mortgagees for value. An assignment of patent rights is void against a subsequent purchaser or mortgagee for valuable consideration, without notice, unless it is recorded in the PTO either (a) within three months after its date, or (b) prior to the date of the subsequent purchase or mortgage. See 35 U.S.C. § 261, fourth paragraph. The PTO regulations, see 37 C.F.R. Part 3, set forth a number of miscellaneous details about recordation:
• Any assignment to be recorded must identify the patent or patent application by serial number.
• All patent assignments to be recorded must be in English. If a U.S. patent is assigned in a non-English language document (or in a long English-language document such as a contract, for that matter), an English-language memorandum of assignment should be prepared, executed, acknowledged, and filed.
• No instrument will be recorded that does not amount to “an assignment, grant, mortgage, lien, encumbrance, or license, or that does not affect title of the patent to which it relates.” A memorandum of an assignment that is more fully documented in another paper can thus be filed as an instrument affecting title. Similarly, a memorandum of a security agreement or a UCC‑1 financing statement apparently can be recorded as a mortgage, lien, or encumbrance; such recordation alone, however, probably would not suffice to perfect a security interest. (See discussion below concerning recordation of security interests.)
• A specific cover sheet and a filing fee of $40.00 per instrument must be submitted along with any instrument being recorded; multiple counterparts (and/or assignments of multiple patents) are treated as separate instruments.
Documents submitted for recordation in the PTO assignment records are returned to the submitter with a computer printout showing the recordation information.
8.6.7 Perfection of Security Interests in Patents
Some patent assignments will involve the taking of security interests in the patent rights, e.g., to secure payment of earn-outs or royalties. Two cases are known to have addressed the question whether security interests in patents must be perfected by a filing in the PTO. Both have said no: such security interests are perfected in accordance with standard UCC filing procedures, and filing in the PTO is not required. City Bank and Trust Co. v. Otto Fabric, Inc., 83 B.R. 780, 7 U.S.P.Q. (BNA) 1719, 5 U.C.C. Rep. Serv. 2d 1459 (D. Kan.
- (federal filing not required to perfect security interest in
patents), reversing 55 B.R. 654 (Bankr. D. Kan. 1985); In re Transportation and Design Technology, Inc., 48 B.R. 635 (Bankr. S.D. Cal. 1985) (additionally noting in dicta that perfection of a security interest might still be superseded by a bona fide purchaser for value of the ownership interest if the security interest were unrecorded in the PTO).[1]
8.7 Patent Infringement Analysis
A patent is not self-enforcing; no “technology police” patrol the industrial countryside to monitor compliance with issued patents. The patent is no more than the owner's ticket to the courthouse, an opportunity to present a case to a federal judge. The case often turns on the details of the infringement analysis.
| Infringement Analysis |
| - |
| #+beginquote |
| Only one claim need be infringed |
| #+endquote |
| - |
| #+beginquote |
| Two-step analysis: |
| #+endquote |
| 1. Interpretation of the claim language |
| 1. Application to the accused product / process |
| - The All-Elements Rule |
| - No independent claim infringed →\\ |
| no infringement at all |
8.7.1 Only One Claim Need Be Infringed
One claim in a patent can be infringed even if other claims in the same patent are not infringed. Liability comes with infringement of even one claim, as long as the infringed claim or claims are not proved to be invalid (see § 3.8[d]).
8.7.2 The Two-Step Analytical Approach and the All‑Elements Rule
In determining whether a patent claim is infringed, courts follow an approach prescribed by the U.S. Court of Appeals for the Federal Circuit:
An infringement analysis entails two steps. The first step is determining the meaning and scope of the patent claims asserted to be infringed. The second step is comparing the properly construed claims to the device accused of infringing.
Markman v. Westview Instruments, Inc., 52 F.3d 967, 976 (Fed. Cir.) (in banc; holding that construction of a patent claim is a matter of law for the judge, not the jury; citations omitted), aff'd, 517 U.S. 370, 116 S. Ct. 1384, 134 L.Ed.2d 577 (1996) (holding that Seventh Amendment does not require jury trial of disputes over proper interpretation of patent claim).
In the first step of the analysis, “the words of the claims are construed independent of the accused product, in light of the specification, the prosecution history, and the prior art.” Scripps Clinic & Research Foundation v. Genentech, Inc., 927 F.2d 1565, 1580 (Fed. Cir. 1991). The court noted, however, that “[o]f course the particular accused product (or process) is kept in mind, for it is efficient to focus on the construction of only the disputed elements or limitations of the claims.” Id. Claim construction is discussed in more detail in § 3.7[c].
The second step is referred to as the All Elements Rule: “If an express claim limitation is absent from the accused product, there can be no literal infringement as a matter of law,” Wolverine World Wide, Inc. v. Nike, Inc., 38 F.3d 1192, 1199 (Fed. Cir. 1994), because “[t]o establish infringement, every limitation set forth in a patent claim must be found in an accused product or process exactly or by a substantial equivalent … [and] the failure to meet a single limitation is sufficient to negate infringement of the claim…”. Laitram Corp. v. Rexnord, Inc., 939 F.2d 1533, 1535 (Fed. Cir. 1991) (reversing judgment of infringement); see, e.g., Sun Studs, Inc., v. ATA Equipment Leasing, Inc., 872 F.2d 978, 984‑86 (Fed. Cir. 1989) (computer-controlled method of processing log in sawmill, including computation step relating to log's profile, found to be infringed by method including “equivalent” computation step); see also, e.g., Pennwalt Corp. v. Durand-Wayland, Inc., 833 F.2d 931, 933‑39 (Fed. Cir. 1987) (patented apple sorting apparatus relying on “hardwired” logic circuitry not infringed by microprocessor-controlled sorter that performed different functions).
Thus, each claim in a patent is functionally like a checklist of elements. The literal-infringement prong of this analysis is illustrated in the following chart:
| HYPOTHETICAL CLAIM | ACCUSED CHAIR | LITERAL\\ |
| INFRINGEMENT ? | ||
| #+beginquote | #+beginquote | #+beginquote |
| “4. A chair comprising | Seat, four legs, back | Yes |
| #+endquote | #+endquote | #+endquote |
| #+beginquote | #+beginquote | #+beginquote |
| “(a) a seat, | Seat, three legs, back | No |
| #+endquote | #+endquote | |
| “(b) four legs, | ||
| “and | ||
| #+endquote | ||
| #+beginquote | #+beginquote | #+beginquote |
| “(c) a back” | Seat, four legs, no back | No |
| #+endquote | #+endquote | #+endquote |
Hypothetical Examples of Literal-Infringement Analysis
The absence of literal infringement does not necessarily end the inquiry. A claim that is not literally infringed may still be infringed under the doctrine of equivalents if every missing element of the claim has a “substantial equivalent” in the accused product or process. See Warner-Jenkinson Co. v. Hilton Davis Chemical Co., 520 U.S. 17, 117 S. Ct. 1040 (1997) (holding that equivalence must exist for each claim element and not for the invention as a whole).
Under what at least appears to be the current state of Federal Circuit law, with proper proof an accused method might be found to infringe if it combines two or more method steps into a single “equivalent” step. Sun Studs, 872 F.2d at 987‑90 (exact one to one correspondence between claim elements and accused device not necessary). If any of the steps in the claim is not satisfactorily demonstrated to be present in the accused method, however, the patent owner loses, at least as far as that claim is concerned.
(The U.S. Court of Appeals for the Federal Circuit hears all appeals from district courts in cases “arising under” the patent laws. See 28 U.S.C. § 1295(a)(1); Christianson v. Colt Industries, Inc., 486 U.S. 800, 108 S. Ct. 2166 (1988) (explaining meaning of “arising under the patent laws”).)
Note that the burden of proof of infringement is always on the patent owner. See, e.g., Under Sea Industries, Inc. v. Dacor Corp., 833 F.2d 1551, 1555 (Fed. Cir. 1987); Envirotech Corp. v. Al George, Inc., 730 F.2d 753, 758 (Fed. Cir. 1984). This is in contrast to the burden of proving invalidity, which is always on a challenger to validity. See § 3.8[d].
8.7.3 The Importance of Claim Construction
In many if not most patent infringement lawsuits, the most important single phase of the case is the determination of the exact legal meaning of the claim or claims being asserted by the patent owner. Often there is little or no dispute about what the accused product is or about what the accused method does. That means that “claim construction,” i.e., interpretation of the claim language, may essentially decide the lawsuit one way or another —the question of infringement is ordinarily a factual one for the jury, but if the relevant material facts are not genuinely in dispute, the question of literal infringement “collapses to one of claim construction and is thus amenable to summary judgment.” Athletic Alternatives, Inc. v. Prince Mfg., 73 F.3d 1573, 1578 (Fed. Cir. 1996) (affirming summary judgment of noninfringement).
The Ordinary Meaning of the Claim Language Normally Controls
The starting point of any patent claim construction is the ordinary meaning of the claim language itself, to those in the field of the invention. “The appropriate starting point … is always with the language of the asserted claim itself.” Phonometrics, Inc. v. Northern Telecom Inc., 133 F.3d 1459, 1464, 45 USPQ2d 1421 (Fed. Cir. 1998) (affirming summary judgment of noninfringement of patent for “[a]n electronic solid state long-distance telephone call cost computer apparatus for computing and recording the cost of each long-distance telephone call initiated from a given calling telephone”) (citations omitted). “It is the person of ordinary skill in the field of the invention through whose eyes the claims are construed. Such a person is deemed to read the words used in the patent documents with an understsanding of their meaning in the field, and to have knowledge of any special meaning and usage in the field.” /Multiform Desiccants, Inc.
- Medzam, Ltd./, 133 F.3d 1473, 1477, 45 USPQ2d 1429 (Fed. Cir. 1998)
(affirming judgment of noninfringement). “[T]he words of a claim ‘will be given their ordinary meaning, unless it appears that the inventor used them differently.'”
Departures from the Ordinary Meaning\\
Must Be Clearly Stated in the Patent.
:CUSTOMID: departures-from-the-ordinary-meaning-must-be-clearly-stated-in-the-patent.
An inventor is permitted to define his (or her) own meanings for words, as long as he does so clearly. As the courts sometimes put it, a patent applicant is free to be his or her own lexicographer, but “any special definition given to a word must be clearly defined in the specification.” Markman, 52 F.3d at 980 (citations omitted). Any such re-definition of a word or phrase “must be sufficiently clear in the specification that any departure from common usage would be so understood by a person of experience in the field of the invention.” Multiform Dessicants, Inc., 133 F.3d at 1476. “Without an express intent to impart a novel meaning to claim terms, an inventor's claim terms take on their ordinary meaning.” Sage Products, Inc. v. Devon Industries, Inc., 126 F.3d 1420, 1423, 44 USPQ2d 1103 (Fed. Cir. 1997) (affirming summary judgment of noninfringement) (citation and internal quotation marks omitted).
“Intrinsic” Evidence Takes Priority Over “Extrinsic” Evidence
In interpreting a patent claim, the first evidence to be considered is the “intrinsic” evidence, namely the words of the patent itself and its prosecution history (i.e., the written record of the examination proceedings in the Patent and Trademark Office). If a patent specification does not explain the meaning of a claim element, then dictionaries, technical treatises, competent expert testimony from those skilled in the art, and similar evidence can be used to clarify the meaning. Such “extrinsic” evidence, however – not even the testimony of experts in the field – cannot be used to contradict a meaning that is clearly revealed by the intrinsic evidence. Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1584 n.6, 39 USPQ2d 1573 (Fed. Cir.
- (reversing and remanding judgment of noninfringement).
Claims Are Not Necessarily Limited to the Disclosed Embodiments
The scope of an inventor's patent rights is not necessarily limited to the embodiments of the invention disclosed in the written-description portion of the patent. But those embodiments can be used in determining the inventor's intended meaning of the claim language. “Although claims are not necessarily restricted in scope to what is shown in a preferred embodiment, neither are the specifics of the preferred embodiment irrelevant to the correct meaning of claim limitations.” Phonometrics, Inc., 133 F.3d at 1466.
Patent Owners Draft the Claim Language — And So Must Live With It
Patent owners are free to use claim language of their choosing, but they must live with the language that they do choose. “If [the patent owner], who was responsible for drafting and prosecuting the patent, intended something different, it could have prevented this result through clearer drafting. . . . It would not be appropriate for us now to interpret the claim differently just to cure a drafting error made by [the patent owner]. That would unduly interfere with the function of claims in putting competitors on notice of the scope of the claimed invention.” Hoganas AB, 9 F.3d at 951.
Patent Owners Also Must Live With the Arguments and Amendments
They Make During Prosecution
:CUSTOMID: patent-owners-also-must-live-with-the-arguments-and-amendments-they-make-during-prosecution
A patent owner cannot have its cake and eat it too; if it argues to the patent examiner that the claims should be interpreted in a particular way so that they will not be invalidated by a prior-art reference, then it (the patent owner) is stuck with that particular interpretation later on and cannot change the interpretation just because it wants to. Warner-Jenkinson Co., 117 S. Ct. at 1049. As the Supreme Court said more than a century ago in a famous turn of phrase, a patent claim is not a “nose of wax, which may be turned and twisted in any direction.” White v. Dunbar, 119 U.S. 47 (1886).
“Arguments and amendments made during the prosecution of a patent application and other aspects of the prosecution history, as well as the specification and other claims, must be examined to determine the meaning of terms in the claims. The prosecution history limits the interpretation of claim terms so as to exclude any interpretation that was disclaimed during prosecution. Claims may not be construed one way in order to obtain their allowance and in a different way against accused infringers.” Southwall Technologies, Inc. v. Cardinal IG Co., 54 F.3d 1570, 1576 (Fed. Cir. 1995) (citations omitted)
The patent attorney's comparison of a prior-art reference to the claimed invention can result in a limiting interpretation of the claim language. For example, in the Wang v. AOL case, “[i]n an Information Disclosure Statement filed by Wang during the prosecution of the parent application, Wang distinguished a reference (Fleming) describing the NAPLPS system by stating that the reference ‘encodes pictorial information … on the pel [picture element] level, rather than on the character level.'” The Federal Circuit held that this language reinforced an interpretation of the Wang claims as being limited to character-based systems. Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1383-84 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe).
Any amendment could result in narrowing the claims, but that will not necessarily be the result. In Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., _ U.S. _, 122 S.Ct. 1831 (2002), the Supreme Court unanimously held that:
the patentee should bear the burden of showing that the amendment does not surrender the particular equivalent in question…. The patentee, as the author of the claim language, may be expected to draft claims encompassing readily known equivalents.
A patentee's decision to narrow his claims through amendment may be presumed to be a general disclaimer of the territory between the original claim and the amended claim…. There are some cases, however, where the amendment cannot reasonably be viewed as surrendering a particular equivalent. The equivalent may have been unforeseeable at the time of the application; the rationale underlying the amendment may bear no more than a tangential relation to the equivalent in question; or there may be some other reason suggesting that the patentee could not reasonably be expected to have described the insubstantial substitute in question. In those cases the patentee can overcome the presumption that prosecution history estoppel bars a finding of equivalence.
This presumption is not, then, just the complete bar by another name. Rather, it reflects the fact that the interpretation of the patent must begin with its literal claims, and the prosecution history is relevant to construing those claims.
When the patentee has chosen to narrow a claim, courts may presume the amended text was composed with awareness of this rule and that the territory surrendered is not an equivalent of the territory claimed. In those instances, however, the patentee still might rebut the presumption that estoppel bars a claim of equivalence. /The patentee must show that at the time of the amendment one skilled in the art could not reasonably be expected to have drafted a claim that would have literally encompassed the alleged equivalent./
Festo, 122 S.Ct. at 1842 (paragraphing and emphasis added).
If Two Meanings of the Words in a Claim are Equally Reasonable,
the Narrower Meaning Might Have to Be Used
:CUSTOMID: if-two-meanings-of-the-words-in-a-claim-are-equally-reasonable-the-narrower-meaning-might-have-to-be-used
Sometimes a claim element could have two possible meanings, but the specification is not clear which meaning is the right one. When a word in a claim can equally well be given either of two meanings, the court might be required to use the narrower meaning, because that serves the purpose of requiring a claim to give fair notice to competitors. “Where there is an equal choice between a broader and a narrower meaning of a claim, … we consider the notice function of the claim to be best served by adopting the narrower meaning.” Athletic Alternatives, Inc., 73 F.3d at 1581.
Claims Are Construed to Sustain Their Validity ‑‑ If Possible
Where possible, courts try to construe claims so that it will not be necessary to hold them invalid. But a court cannot redraft a claim; the claim must stand or fall as written. “Although we construe claims, if possible, so as to sustain their validity, it is well settled that no matter how great the temptations of fairness or policy making, courts do not redraft claims.” Quantum Corp. v. Rodime, PLC, 65 F.3d 1577, 1584 (Fed. Cir. 1995) (affirming judgment of invalidity of patent claims that had been improperly broadened in reexamination).
Claim Differentiation: Differences in
Language are Presumed to be Significant
:CUSTOMID: claim-differentiation-differences-in-language-are-presumed-to-be-significant
“There is presumed to be a difference in meaning and scope when different words or phrases are used in separate claims. To the extent that the absence of such difference in meaning and scope would make a claim superfluous, the doctrine of claim differentiation states the presumption that the difference between claims is significant. Where some claims are broad and others narrow, the narrow claim limitations cannot be read into the broad whether to avoid invalidity or to escape infringement.” United States v. Telectronics, Inc., 857 F.2d 778, 783-84 (Fed. Cir. 1988); see also Wang Laboratories, Inc., v. America Online, Inc., 197 F.3d 1377, 1384 (Fed. Cir. 1999) (affirming summary judgment that AOL and Netscape Web browsers did not infringe Wang-owned patent for videotex frame processing system; claim differentiation did not support Wang's desired interpretation of claim language).
8.7.4 Special Topic: Means-Plus-Function Language in Claims
The patent statute permits an element in a claim to be drafted as “a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof.” 35 U.S.C. § 112, paragraph 6.
| *Construction of “Means Plus\\ |
| Function” Claim Language* |
| - |
| #+beginquote |
| Not always labeled with the word “means” |
| #+endquote |
| - |
| #+beginquote |
| Covers only identical function |
| #+endquote |
| - |
| #+beginquote |
| Covers only (i) corresponding structure clearly identified in patent specification and (ii) “equivalents” to that structure |
| #+endquote |
Examples of means-plus-function claim elements are found in claim 1 of the patent involved in the State Street Bank case, reproduced below. The patent in question is Boes, U.S. Patent No. 5,193,056, issued March 9, 1993. In the claim language, italicized bracketed material was added by the Federal Circuit to indicate what structure was identified in the patent specification as performing the stated function:
- A data processing system for managing a financial services
configuration of a portfolio established as a partnership, each partner being one of a plurality of funds, comprising:
(a) computer processor means [a personal computer including a CPU] for processing data;
(b) storage means [a data disk] for storing data on a storage medium;
(c) first means [an arithmetic logic circuit configured to prepare the data disk to magnetically store selected data] for initializing the storage medium;
(d) second means /[an arithmetic logic circuit configured to retrieve information from a specific file, calculate incremental increases or decreases based on specific input, allocate the results on a percentage basis, and store the output in a separate file]/ for processing data regarding assets in the portfolio and each of the funds from a previous day and data regarding increases or decreases in each of the funds, [sic, funds'] assets and for allocating the percentage share that each fund holds in the portfolio . . . .
**• */A means-plus-function claim element is not always signaled by the word “means.”/ A claim element that recites a function might — or might not — be treated as a means-plus-function element, and thus restricted in scope under section 112 of the patent statute, regardless whether it uses the actual word “means.” The courts decide this question on a case-by-case basis after looking at the patent and its prosecution history. See Cole v. Kimberly-Clark Corp., 102 F.3d 524, 531 (Fed. Cir. 1996) (citing cases).
**• */Means-plus-function language requires identical function./ If a patent owner wishes to prove infringement of a claim containing means plus function elements, then for each such element, the patent owner must show that the accused data processing system performs the identical function recited in the claim limitation language (e.g., “processing data” from subparagraph (a) in the example above). If the accused apparatus does not perform that function, then “[a]s a matter of law, under the proper claim interpretation, there is no literal infringement.” Intellicall, Inc. v. Phonometrics, Inc., 952 F.2d 1384, 1389 (Fed. Cir. 1992) (affirming summary judgment of noninfringement); see also WMS Gaming, Inc. v. Int‘l Game Technology, 184 F.3d 1339, 1352-53 (Fed. Cir. 1999) (reversing trial court's holding of literal infringement because microprocessor in accused device did not perform identical function to that claimed in patent, but affirming holding of infringement under the doctrine of equivalents).
**• */Means-plus-function claim language also requires identical or equivalent structure./ A means-plus-function element does not cover every possible means for carrying out the function in question. The Court of Appeals for the Federal Circuit has described section 112, paragraph 6 of the statute as having a “string attached.” The string is that the statute restricts the coverage of the means-plus-function claim language to a) the structure, material, or acts described in the specification and b) equivalents of that structure, material, or acts. See, e.g., Valmont Industries, Inc. v. Reinke Mfg. Co., Inc., 983 F.2d 1039, (Fed. Cir. 1993) (reversing judgment of infringement). Equivalence under section 112 paragraph 6 is similar to, but not identical to, equivalence under the doctrine of equivalents, discussed immediately below.
**• */The/ court/, not the jury, examines the claimed function and the corresponding structure./ In its WMS Gaming opinion, the Federal Circuit held that “[d]etermining the claimed function and the corresponding structure for a claim limitation written in means-plus-function format are both matters of claim construction. They therefore present issues of law that we review de novo.” WMS Gaming, 184 F.3d at 1347 (reversing trial court's holding of literal infringement, but affirming holding of infringement under the doctrine of equivalents).
**• */A programmed computer can constitute the “means” for performing a claimed function./ The WMS Gaming court also held that “[i]n a means-plus-function claim in which the disclosed structure is a computer, or microprocessor, programmed to carry out an algorithm, the disclosed structure is not the general purpose computer, but rather the special purpose computer programmed to perform the disclosed algorithm.” WMS Gaming, 184 F.3d at 1349 (emphasis added, citation omitted). Consequently, a computer programmed to perform an algorithm (the “accused algorithm”) that is different from the corresponding algorithm disclosed in the patent (the “patent's algorithm”) does not constitute identical structure to the structure disclosed in the patent. See id. at 1350; see also Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1273 (Fed. Cir. 1999) (holding that patent owner was not entitled to summary judgment of literal infringement, but vacating and remanding summary judgment of noninfringement on other grounds; accused software-based device “constitutes a different ‘structure' than the software disclosed in the '364 patent because it uses a different algorithm to perform the recited function”).
If, however, the differences between the accused algorithm and the patent's algorithm are insubstantial, the accused structure may still literally infringe the patent claim in question, at least if it performs the identical function recited in the means-plus-function claim element. See WMS Gaming, 184 F.3d at 1350-52.
**• */An “after-arising” structure might not be capable of being an “equivalent,” at least not in means-plus-function analysis./ The Federal Circuit has twice suggested, apparently in dicta, that a structural equivalent of a means-plus-function claim element must have been available at the time of the issuance of the patent containing the claim. In other words, a structure that did not exist at the time of issuance of the patent might not be able to be a section-112 equivalent, because public policy requires that the meaning of the means-plus-function claim language must be fixed as of the time that the patent was issued. Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc., 145 F.3d 1303, 1309-11 (Fed. Cir. 1998) (reversing summary judgment of infringement and remanding with instructions to grant summary judgment of noninfringement); see also Al-Site Corp. v. VSI Int'l, Inc., 174 F.3d 1308, 1320-21 & n.2 (Fed. Cir. 1999).
(On the other hand, an after-arising structure can still be an equivalent under the doctrine of equivalents. See § 3.7[e].)
8.7.5 Infringement Under the Doctrine of Equivalents
Even if a patent claim is not literally infringed — because one or more claim elements is missing from the accused product or process — it may still be infringed if an “equivalent” of each missing claim element can be found in the accused product or process. Warner-Jenkinson Co. v. Hilton Davis Chemical Co., 520 U.S. 17, 117 S. Ct. 1040, 1049.
| The Doctrine of Equivalents |
| - |
| #+beginquote |
| Each missing claim element requires an equivalent |
| #+endquote |
| - |
| #+beginquote |
| Interchangeability can indicate equivalence |
| #+endquote |
| - |
| #+beginquote |
| Substantial identity in function, way, and result can indicate equivalence |
| #+endquote |
| - |
| #+beginquote |
| A patented accused product might not be an equivalent |
| #+endquote |
General Principles
The doctrine of equivalents was created by the courts, not by Congress, to prevent an infringer from escaping liability because of insubstantial differences with the literal claimed subject matter. The doctrine serves “to balance the purpose of fairness to inventors lest the patent be unjustly circumvented, against the purpose of patent claims to state clear boundaries of the patent grant, in fair notice of its scope.” Multiform Dessicants, Inc., 133 F.3d at 1480 (citation omitted).
*• An equivalent must be proved for each missing element in a claim. The Supreme Court has held that “the doctrine of equivalents, when applied broadly, conflicts with the definitional and public‑notice functions of the statutory claiming requirement.” The Court ruled that to resolve that conflict, “the doctrine of equivalents must be applied to individual elements of the claim, not to the invention as a whole.” Warner-Jenkinson, 117 S. Ct. at 1049.
*• Known interchangeability may be important in determining equivalence. “An important factor [in determining whether there is an equivalent to a claim element] is whether persons reasonably skilled in the art would have known of the interchangeability of an ingredient not contained in the patent with one that was.” Warner-Jenkinson, 117 S. Ct. at 1047 (citation omitted). The Court emphasized that, in applying this test, “a skilled practitioner's knowledge of the interchangeability between claimed and accused elements is not relevant for its own sake, but rather for what it tells the fact-finder about the similarities or differences between those elements.” Id. at
In the software area, the Federal Circuit has held on at least two occasions that hardware and software can be, but need not be, interchangeable. Compare Pennwalt Corp. v. Durand-Wayland, Inc., 833 F.2d 931, 933‑39 (Fed. Cir. 1987) (patented apple sorting apparatus relying on “hardwired” logic circuitry not infringed by microprocessor-controlled sorter that performed different functions) with Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1270 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement; fact question existed as to whether software-based system component for selecting garage-door transmitter codes was equivalent to patented mechanically-based component).
According to the Supreme Court, the proper time for evaluating equivalency – and thus the proper time for assessing knowledge of interchangeability between elements – is at the time of infringement, not at the time the patent was issued; the substitution of a later-developed element does not insulate the accused product or process from a finding of equivalence. See Warner-Jenkinson, 117 S.Ct. at 1052-53.
*• Identity of function, way, and result can indicate equivalence. “[T]he substantial equivalent of a thing, in the sense of the patent law, is the same as the thing itself; so that if two devices do the same work in substantially the same way, and accomplish substantially the same result, they are the same, even though they differ in name, form, or shape.” Warner-Jenkinson, 117 S. Ct. at 1052 (citation omitted). According to one Federal Circuit panel, courts must take care not to merge “function” and “way.” Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1271 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement). One judge's “way,” however, might be another judge's “function.”
*• “Pioneering” inventions and the doctrine of equivalents. Patent claims for “pioneering” subject matter may be entitled to a broad range of equivalents. At the other end of the spectrum, however, claims representing only narrow improvements in an already crowded art will be entitled to a correspondingly narrow range of equivalents. See generally, e.g., Perkin-Elmer Corp. v. Westinghouse Electric Corp., 822 F.2d 1528, 1532 (Fed. Cir. 1987) (affirming judgment of noninfringement), and cases cited therein.
| “Pioneering” Inventions |
| - |
| #+beginquote |
| “a distinct step in the progress of the art, distinguished from a mere improvement or perfection of what had gone before” |
| #+endquote |
| - |
| #+beginquote |
| great interest among others in the field |
| #+endquote |
| - |
| #+beginquote |
| accolades, awards, honors |
| #+endquote |
| - |
| #+beginquote |
| commercial success |
| #+endquote |
| - |
| #+beginquote |
| entitled to broad scope of equivalents |
| #+endquote |
The pioneering status of an invention was not mentioned as a relevant factor in the Warner-Jenkinson majority opinion by the Federal Circuit. Judge Lourie's dissenting opinion, however, pointed out that pioneering status “was mentioned by the [Supreme] Court in Graver [Tank] and must be considered when relevant.” Warner-Jenkinson, 62 F.3d at 1549 (Lourie, J., dissenting). The subsequent Supreme Court opinion in Warner-Jenkinson indicated that the Court's 1950 Graver Tank opinion is still good law. See Warner-Jenkinson, 117 S. Ct. at 1052 (citing Graver Tank). So it is distinctly possible that a court would look at whether an invention was “pioneering” in determining infringement under the doctrine of equivalents.
Just what is a pioneering invention? A century ago the Supreme Court characterized a pioneering invention as one that represented “a distinct step in the progress of the art, distinguished from a mere improvement or perfection of what had gone before.” Texas Instruments, Inc. v. Unitd States Int'l Trade Com'n, 846 F.2d 1369, 1370 (Fed. Cir. 1988), quoting Westinghouse v. Boyden Power Brake Co., 170 U.S. 537, 562, 18 S. Ct. 707, 718, 42 L. Ed. 1136 (1898). The Court of Appeals for the Federal Circuit gave an example of what makes a “pioneering” invention in a case involving fiber optic technology and a patent owned by Corning Glass Works:
Dr. Maurer first publicly reported the achievement of a 20 db/km optical waveguide fiber at the Conference on Trunk Telecommunications by Guided Waves held in London, England. That announcement created enormous interest and was the subject of many articles in both technical and general publications. The inventors' advancement in technology won them accolades from various societies and institutes, for which they were presented with many prestigious awards and honors. In addition, the invention of the '915 patent has achieved impressive commercial success on a worldwide basis. The district court determined that “[t]he 915 patent clearly covers a basic, pioneering invention.”
Corning Glass Works v. Sumitomo Elec. U.S.A., Inc., 868 F.2d 1251, 1255 (Fed. Cir. 1989).
*• If the accused device is itself patented, that can (but need not) indicate non-equivalence. The fact that a device accused of infringing a patent is itself patented might – but does not necessarily – mean that the device does not infringe the first patent. If the patent examiner determined that the accused device was patentable after reviewing the first patent, that can indicate that the accused device is substantially different from the claimed subject matter of the first patent. Zygo Corp. 79 F.3d at 1570 (reversing finding of infringement under the doctrine of equivalents).
Limitations on the Doctrine of Equivalents
The law imposes certain restrictions on a patent owner's ability to assert infringement under the doctrine of equivalents. Some of the principal limitations are discussed in this section.
| Limitations on the Doctrine of Equivalents |
| - |
| #+beginquote |
| Patent owner cannot have it both ways |
| #+endquote |
| - |
| #+beginquote |
| The doctrine of equivalents cannot entirely eliminate a claim element |
| #+endquote |
| - |
| #+beginquote |
| Foreseeable variations of the claimed subject matter are not “equivalent” |
| #+endquote |
| - |
| #+beginquote |
| Embodiments disclosed but not claimed are dedicated to the public and cannot be “equivalents” |
| #+endquote |
| - |
| #+beginquote |
| The prior art limits the permissible scope of equivalents |
| #+endquote |
• The doctrine of equivalents cannot undo a claim amendment. Because of the public-notice function of patent claims, if a patent applicant amended a claim during the examination of the patent application, the law “place[s] the burden on the patent‑holder to establish the reason for an amendment required during patent prosecution. … Where no explanation is established, however, …. prosecution history estoppel would bar the application of the doctrine equivalents as to that element.” Warner-Jenkinson, 117 S. Ct. at 1051.
*• The doctrine of equivalents cannot undo an argument the inventor made to the patent examiner. A patent owner cannot assert that something is equivalent to a claim element if the inventor previously argued otherwise to the patent examiner. See, e.g., Southwall Technologies, Inc., 54 F.3d at 1583-84.
*• The doctrine of equivalents cannot be used to eliminate a claim element. “It is important to ensure that the application of the doctrine [of equivalents], even as to an individual element, is not allowed such broad play as to effectively eliminate that element in its entirety.” Warner-Jenkinson, 117 S. Ct at 1049. “[T]he doctrine of equivalents is not a license to ignore or erase … structural and functional limitations of the claim limitations on which the public is entitled to rely in avoiding infringement.” Athletic Alternatives, 73 F.3d at 1582 (internal quotation marks and citation omitted).
*• Foreseeable but unclaimed variations might be ineligible to be considered “equivalents” of the claimed subject matter. If variations on a claim element are foreseeable, a patent owner and its patent attorney are responsible for drafting the claim language to encompass those variations. “[A]s between the patentee who had a clear opportunity to negotiate [with the patent examiner to obtain] broader claims but did not do so, and the public at large, it is the patentee who must bear the cost of its failure to seek protection for this foreseeable alternative of its claimed structure.” Sage Products, Inc., 126 F.3d at 1425.
(Other Federal Circuit panels have distinguished Sage Products on this point, however, so the efficacy of this doctrine may be questionable. For example, one panel held that “the proposed application of the doctrine in Sage Products would have utterly written out of the claim not one, but at least two (maybe more) express limitations of the claim.” Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261, 1271 (Fed. Cir. 1999) (vacating and remanding summary judgment of noninfringement).)
*• Embodiments disclosed but not claimed are dedicated to the public and cannot be “equivalents.” In 2002, the en banc Federal Circuit resolved a seeming split between two prior panel decisions. In essence, the court held that, if a patent application discloses variations A, B, and C of an invention, but only claims variations A and B, then variation C is dedicated to the public and cannot be covered by the doctrine of equivalents. “[W]hen a patent drafter discloses but declines to claim subject matter, as in this case, this action dedicates that unclaimed subject matter to the public. Application of the doctrine of equivalents to recapture subject matter deliberately left unclaimed would conflict with the primacy of the claims in defining the scope of the patentee's exclusive right.” Johnson & Johnston Associates Inc. v. R.E. Service Co., Inc., 285 F.3d 1046, 1054 (Fed. Cir. 2002) (en banc) (citations and internal quotation marks omitted).
*• The prior art limits the permissible scope of equivalents. The prior art restricts the scope of equivalency that a patent owner can assert in alleging infringement under the doctrine of equivalents. One way of determining the extent of such restriction is to draft a hypothetical patent claim, sufficient in scope to literally cover the accused product. Such a hypothetical claim is sometimes referred to as a “/Wilson Sporting Goods/ claim,” after the name of the case in which the Court of Appeals for the Federal Circuit first used that term. “The pertinent question then becomes whether that hypothetical claim could have been allowed by the PTO over the prior art. If not, then it would be improper to permit the patentee to obtain that coverage in an infringement suit under the doctrine of equivalents.” Conroy v. Reebok Int'l Ltd., 14 F.3d 1570, 1576 (Fed. Cir. 1994).
The Doctrine of Equivalents and Means‑Plus‑Function Claims
In some circumstances, but not in others, a means-plus-function claim that is not literally infringed can still be infringed under the doctrine of equivalents:
The patent owner is likely to be precluded from asserting infringement under the doctrine of equivalents if the lack of literal infringement is due to the accused device's use of a structure that is more than insubstantially different from the structure described in the patent; Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc., 145 F.3d 1303, 1309-11 (Fed. Cir.
- (reversing summary judgment of infringement and remanding with
instructions to grant summary judgment of noninfringement).
- On the other hand, if the lack of literal infringement is due to the accused device using identical or equivalent structure to perform a different function than is recited in the means-plus-function claim, then infringement can still exist under the doctrine of equivalents if the different function is nevertheless an equivalent of the function recited in the claim. WMS Gaming, Inc. v. Int‘l Game Technology, 184 F.3d 1339, 1352-54 (Fed. Cir. 1999) (reversing trial court's holding of literal infringement, but affirming holding of infringement under the doctrine of equivalents).
8.8 Dealing With Potential Infringement Issues
8.8.1 Your Company's Patented Invention
May Still Infringe Another Company's Patent
:CUSTOMID: your-companys-patented-invention-may-still-infringe-another-companys-patent
An invention can be patentable in itself, yet still infringe on someone else's patent. This could result in a marketplace stalemate; frequently, patent owners in this situation will grant each other some kind of cross-license.
8.8.2 Avoid “Willful” Infringement – Check Out Potential Problem Patents
A company that learns that it might be affected by a third-party patent should promptly investigate the situation, very possibly using outside patent counsel to maintain the attorney-client privilege as much as possible. Studied ignorance is generally not a good idea, because a company can be a “willful” infringer without even knowing it: The Federal Circuit has held repeatedly that one who becomes aware of a patent has an affirmative duty to use due care to avoid infringing a valid claim (e.g., by obtaining a competent opinion of counsel); failure to comply with that duty can constitute “willful” infringement, leading to an award of as much as treble damages. See 35 U.S.C. § 284 (court may increase damages up to three times amount found or assessed); cf. Modine Mfg. Co. v. Allen Group, Inc., 917 F.2d 538, 543 (Fed. Cir.
- (affirming denial of enhanced damages notwithstanding jury
finding of willful infringement, and holding that statute authorizes but does not mandate increased damages).
Suppose that a company makes a good-faith attempt to “design around” a third-party patent. Later, the company wins on the issue of literal infringement, i.e., its accused product or service is held not to literally infringe the patent (see § 3.7[b]). The accused product or service, however, also is held to infringe under the doctrine of equivalents (see § 3.7[e]).
Is this company a willful infringer because it intentionally designed around the third-party patent? Perhaps not. In WMS Gaming, the Federal Circuit reversed a finding of literal infringement and affirmed a finding of infringement under the doctrine of equivalents. The appellate court, vacating and remanding a holding of willful infringement, reminding the district court that “[w]hile ‘it is not a rule of law that infringement that is not literal can never be sufficiently culpable to warrant enhanced damages[,]… avoidance of literal infringement is a fact to be considered' in determining whether there has been willful infringement.” WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339, 1354-55 (Fed. Cir. 1999) (citation omitted). The Federal Circuit also noted pointedly that “[w]hen the district court reconsiders its finding of willful infringement, it should bear in mind that the patent law encourages competitors to design or invent around existing patents.” Id. at 1355 (citations omitted).
8.8.3 Watch Out for Internal Emails About Third‑Party Patents
Too often, a company's senior management first learns about a third party's patent from an engineer, software developer, or other “techie” who read about it in a newsfeed, saw it on a Web site, etc. Thinking that s/he is being helpful, the techie sends an email to his manager describing the third-party patent and stating firmly that “we clearly infringe this patent.” Four points will be of keen interest to the company's counsel:
(i) In sending the email, the techie probably did not read the claims of the patent, and therefore is not really in a position to know whether the company is infringing the patent.
(ii) Nevertheless, the email very well might not be subject to the attorney-client privilege. Depending on whether it was sent as part of a request for legal advice, it might be discoverable in litigation.
(iii) The email also could well be admissible against the company as a party admission against interest. If so, it probably would be Exhibit B for the third-party patent owner (Exhibit A, of course, being the patent itself).
(iv) The patent owner's trial counsel would almost certainly “billboard” the email to the jury at every conceivable opportunity.
8.8.4 The Difficulty of Challenging the
Validity of a Claim in an Issued Patent
:CUSTOMID: the-difficulty-of-challenging-the-validity-of-a-claim-in-an-issued-patent
A company concerned about another party's patent will usually want to challenge the validity of the patent. This section outlines some of the main legal principles governing such challenges.
A Patent is Presumed Valid (Because It Was Issued by the Government)
In infringement litigation, a patent owner need not prove that the patent is valid, because by statute it is presumed to be valid, and each claim is presumed valid independently of the validity of any other claims. See 35 U.S.C. 283, first paragraph. Moreover, the burden of establishing the invalidity of a patent claim is expressly placed, not on the patent owner as plaintiff, but on the party asserting such invalidity. See id.
The Court of Appeals for the Federal Circuit has held that a party seeking to establish that a claim is invalid must prove facts by clear and convincing evidence – not merely by a preponderance of the evidence – to support a conclusion that the claim is invalid. See, e.g., American Hoist & Derrick Co. v. Sowa & Sons, Inc., 725 F.2d 1350, 1359-60 (Fed. Cir. 1984) .
The same court has noted that, where the PTO has considered a piece of prior art, and has issued a patent notwithstanding that prior art, the courts owe some deference to the PTO's decision. See Minnesota Mining & Mfg. Co. v. Johnson & Johnson Orthopaedics, Inc., 976 F.2d 1559, 1572 (Fed. Cir. 1992).
But, the Courts Have the Final Say About Patentability
It is the courts, however, that are the final arbiters of patent validity. Although courts may take note of, and benefit from, the examination proceedings before the patent examiner, the question of patentability is ultimately for the courts to decide, without deference to the rulings of the patent examiner. See Quad Environmental Technologies Corp. v. Union Sanitary District, 946 F.2d 870, 876 (Fed. Cir. 1991).
The PTO's search library is far from perfect; the patent examiner might well have been unaware of important prior art. This is especially true in the software field, where much prior art is not documented in patents or printed publications. Consequently, infringement defendants will usually spend a great deal of time and money to scour every available source of prior art.
If a challenger to the validity of a patent produces prior art or other evidence not considered in the PTO, there is no reason to defer to the PTO so far as that prior art or other evidence is concerned. In fact, new prior art not considered by the patent examiner may so clearly invalidate a patent that the challenger's burden is fully sustained merely by proving the existence of the prior art. See American Hoist & Derrick Co., 725 F.2d at 1359-60 (Fed. Cir. 1984); see also WMS Gaming, Inc. v. Int'l Game Technology, 184 F.3d 1339 (Fed. Cir. 1999) (affirming judgment that patent was not invalid; two of three prior-art references cited at trial had not been considered by the patent examiner)..
A patent claim can be found to be invalid even if the prior art produced by the challenger is not more significant than the prior art considered by the PTO, see Surface Technology, Inc. v. U.S. Int'l Trade Comm'n, 801 F.2d 1336, 1339-40 (Fed. Cir. 1986), or for that matter even if the exact prior art in question was actually considered by the patent examiner. See, e.g., Celeritas Technologies, Inc. v. Rockwell Int'l Corporation, 150 F.3d 1354, 1360-61 (Fed. Cir. 1998) (reversing in pertinent part denial of JMOL; holding that no reasonable jury could have found that patent claims were not anticipated by prior-art reference, even though reference had been considered by patent examiner). In part, this is because it is not the examiner's technical expertise (which may or may not be considerable) that gives his (or her) decisions a presumption of correctness; it is the authority duly vested in him by his appointment as a patent examiner. See Western Electric Co. v. Piezo Technology, Inc., 860 F.2d 428, 433 (Fed. Cir. 1988).
Invalidation of a patent is a one-way trap door: once a patent claim is held invalid in a final judgment, the patent owner is estopped from ever denying its invalidity against anyone else (unless he shows that he did not have a full and fair opportunity to litigate). See Blonder-Tongue Laboratories, Inc., v. University of Illinois Foundation, 402 U.S. 318, 333‑34 (1971). As noted above, different claims in the same patent live or die independently, however, so the loss of one claim in a patent would not necessarily be fatal to all claims. See 35 U.S.C. § 282.
Infringers are under no such handicap. True, if one infringer fails to prove invalidity, he may be estopped from rearguing the matter unless new evidence is produced, under conventional principles of res judicata. Other infringers are not estopped, however, and can raise the same or new challenges to the patent. (As a practical matter, however, a patent claim that has survived litigation against an adequately-defended opponent is likely to be treated with more respect by courts than an untested claim.)
8.8.5 Be Aware of the Strong Remedies for Patent Infringement
The end results of a successful patent lawsuit can be gratifying to the patent owner and disastrous for the defendant. If held liable for patent infringement, the defendant can be subjected to some or all of the following remedies:
Injunction Against Further Infringement
An infringer may be subject to an injunction against further infringement – possibly putting the infringer out of business. See 35 U.S.C. § 283. As Barnes & Noble found out the hard way, courts can grant preliminary injunctive relief in patent cases. /See Amazon.com, Inc.
- Barnesandnoble.com, Inc./, 73 F.Supp.2d 1228 (W.D. Wash. 1999)
(granting preliminary injunction); cf. Chrysler Motors Corp. v. Auto Body Panels of Ohio, Inc., 908 F.2d 951, 953-54 (Fed. Cir. 1990) (affirming denial of preliminary injunction where trial court found patented invention obvious); Illinois Tool Works, Inc., v. Grip-Pak, Inc., 906 F.2d 679, 682 (Fed. Cir. 1990) (affirming denial of preliminary injunction; stressing that irreparable harm is presumed, but only rebuttably).
Damages – Possibly Including Treble Damages
The infringer may be ordered to pay damages. The damages are potentially equal to the patent owner's lost profits (if proved). See generally Rite-Hite Corp. v. Kelley Co., 56 F.3d 1538 (Fed. Cir. 1995) (in banc); see also, e.g., Kalman v. Berlyn Corp., 914 F.2d 1473, 1484 (Fed. Cir. 1990) (enumerating factors to be proved by patentee to be entitled to lost profits).
By statute, damages are not less than a reasonable royalty. See 35 U.S.C. § 284; see generally, e.g., Trell v. Marlee Electronics Corp., 912 F.2d 1443, 1445 (Fed. Cir. 1990); Polaroid Corp. v. Eastman Kodak Co., 16 USPQ (BNA) 1481 (D. Mass 1990) (total award, based on lost profits and reasonable royalty plus prejudgment interest, in excess of $900 million).
As noted in § 3.8[b], the damage award may be increased up to treble damages in the case of “willful” infringement or in other exceptional circumstances. Individuals involved in the infringement can be subject to personal liability in some circumstances, as discussed in § 3.8[f].
8.8.6 Consider the Potential for Personal Liability
Individuals who direct or actively take part in the infringing activities could be jointly and severally liable for the infringement. At this writing the law is not entirely settled on this point. The Federal Circuit has considered various theories of personal liability, including piercing the corporate veil, inducement of infringement under 35 U.S.C. § 271(b), and the doctrine that joint tortfeasors are jointly and severally liable.
Selected cases:
Al-Site Corp. v. VSI Intern., Inc., 174 F.3d 1308, 1331-32 (Fed. Cir. 1999): The Federal Circuit reversed a judgment holding a corporate officer personally liable for patent-infringement damage award. The court stated that for personal liability to attach, there must be evidence to justify piercing the corporate veil.
Sensonics, Inc. v. Aerosonic Corp., 81 F.3d 1566, 1575-75 (Fed. Cir. 1996): The court affirmed a judgment holding the founder / CEO / chief engineering officer of an infringing corporation personally liable for inducing corporation's infringement.
Manville Sales Corp. v. Paramount Systems, Inc., 917 F.2d 544, 552 (Fed. Cir. 1990): The court reversed a judgment holding a corporate officer personally liable for patent-infringement damage, on grounds that there was insufficient evidence to justify piercing the corporate veil.
Fromson v. Citiplate, Inc., 886 F.2d 1300, 1304: The court affirmed allowing amendment of pleadings to add individuals as defendants on an inducement-of-infringement theory.
9 Copyright
9.1 Fair use
11th Cir. blog-copyright case - slip op. at 25 et seq.:
To determine whether a particular use is fair, a factfinder considers four nonexclusive factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
17 U.S.C. § 107. The inquiry is a “flexible” one that requires weighing the four factors in the light of the facts of the case. Cambridge Univ. Press v. Patton, 769 F.3d 1232, 1259 (11th Cir. 2014). We consider each factor in turn.
Campbell v. AcuffRose Music, Inc., 510 U.S. 569, 575 (1994) ("Oh Pretty Woman")
9.2 Basic Copyright Doctrines
The legislative history of and subsequent amendments to the Copyright Act of 1976, including specific computer program-related provisions, make it clear that Congress intended software and data collections to be eligible for at least some protection under copyright. Moreover, the courts have uniformly held that software and data collections are protectable by copyright at least to some extent.
9.4 Based on the evidence in this case, the jury could have reasonably
concluded that the copyright registrations were invalid because Modlin was not an author ….
MedForms, Inc. v. Healthcare Management Solutions, Inc., F.3d , 2002 WL 966251 (2d Cir. May 7, 2002) (affirming denial of motion for new trial). See also § 2.1[b] (how much incremental creativity is required for protection for new versions); § 2.6[h][2] (requirements for joint authorship).
Copyright Formalities
No particular formalities are required to obtain copyright protection. Complying with certain formalities can still give rise to litigation advantages, however:
• A copyright notice is desirable — because it can cut off certain innocent-infringer defenses — but it is not a prerequisite to protection. See § 2.3.
• Registration of a copyright is a jurisdictional prerequisite to a suit for infringement. See infra § 2.4/; see generally/ 17 U.S.C. § 411. The statute makes an exception for works whose country of origin is a Berne Convention country other than the United States. See id.
Registration is not a prerequisite to protection, however. See 17 U.S.C. § 408(a). A copyright owner can thus wait to obtain a registration until it desires to file suit against an infringer of the copyright.
But he who waits to obtain a registration might forfeit two statutory benefits, namely “statutory damages” and attorneys' fees. See 17 U.S.C. §§ 504 (statutory damages), 505 (attorney's fees); see also § 2.10. Moreover, a copyright owner who fails to register a work either prior to the commencement of an infringement, or within three months after first publication in the case of published works, is precluded seeking either statutory damages or attorneys' fees. See 17 U.S.C. §
9.4.1 Copyright Protection for New Versions: How Much /Incremental/
Creativity is Required?
:CUSTOMID: copyright-protection-for-new-versions-how-much-incremental-creativity-is-required
Especially in the software industry, copyrightable works often take the form of incremental creative advances built on a pre-existing foundation. For example, a new release of a computer program will often be an improved version of an old program. As another example, this and other chapters of this book have been repeated revised over the years.
If a new work reflects sufficient new creative effort to rise to the level of a “derivative work,” then by statute the new work is protectable, whether or not the preexisting material is protectable. The statute provides that
(a) The subject matter of copyright as specified by section 102 [17 U.S.C. § 102] includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.
(b) The copyright in a compilation or derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material. The copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material.
17 U.S.C. § 103.
A derivative work is defined in the statute as
a work based upon one or more preexisting works, such as a translation, … abridgement, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship ….
17 U.S.C. § 101.
The question then becomes, When is the amount of incremental creativity sufficient for copyright protection of such works? In its Feist decision discussed in § 2.2[b], the Supreme Court held that a copyrightable work (in that case a compilation) need only possess “some minimal degree of creativity.” Feist Publications, Inc., v. Rural Telephone Service Co., 499 U.S. 340, 345, 111 S. Ct. 1282, 1287 (1991) (citation omitted). The Court described that minimal degree as “some creative spark, ‘no matter how crude, humble or obvious' it might be.” Id. (citation omitted).
So, how much creativity will suffice to meet the Feist test? One benchmark is provided in Montgomery v. Noga, 168 F.3d 1282 (11th Cir.
- (affirming judgment of infringement). The plaintiff, Montgomery,
was the author of a “shareware” graphics-viewer program that enabled users to view pictures on a computer screen. The defendants were the producers of CD-ROMs that, according to the court, were “largely pornographic in nature,” id. at 1287; they reproduced Montgomery's graphics-viewer software on their CD-ROMs without permission.
The Montgomery defendants argued that version 2.9a of the software — the only registered version at the time the lawsuit was brought — was not protectable by copyright. They pointed out that before March 1, 1989, Montgomery had distributed version 1.3 without a copyright notice, thus forfeiting his copyright and putting the software into the public domain. They argued that versions 1.4 through 2.9a were not sufficiently different enough from version 1.3 to be independently protectable.
The Eleventh Circuit disagreed. The court assumed for the sake of argument that Montgomery had forfeited his copyright in version 1.3 of his software because of his distribution of copies without a copyright notice. Id. at 1289-90 & n.11. But, the court held, registered version 2.9a was indeed different enough from the now-public-domain version 1.3 to be entitled to protection of its own. The court noted that Montgomery had modified his software to correct problems, add functionality, and improve the performance of the software. See id. at 1290 (describing modifications). The court concluded that the modifications were sufficiently original to support a valid copyright in version 2.9a as a derivative work, and affirmed judgment including $80,000 in damages and over $142,000 in attorneys' fees. See id. (citation omitted).
See also the discussion of the MedForms case in § 2.1[a][1], concerning how much creative contribution is required to make a programmer an “author” of a computer program.
9.4.2 Exclusive Rights of the Copyright Owner
Section 106 of the Copyright Act provides in part that the owner of a copyright has the exclusive right, among other things:
- to reproduce the copyrighted work in copies or, in the case of sound recordings, phonorecords;
- to prepare derivative works based on the copyrighted work; and
- to distribute copies to the public by sale or other transfer of ownership or by rental, lease, or lending. The distribution right is separate from the right to make copies (or phonorecords). A person who has a license to make copies of a copyrighted work is not necessarily authorized to distribute those copies.
17 U.S.C. § 106.
9.4.3 The “First Sale” Doctrine; Software Rentals and Redistribution
The copyright owner's right of exclusive distribution of copies (or phonorecords) is limited by the “first sale” doctrine. That doctrine provides that the owner of a particular copy or phonorecord lawfully made is entitled, without permission of the copyright owner, to sell or otherwise dispose of possession of that copy or phonorecord. See 17 U.S.C. § 109(a).
Many and perhaps the majority of software transactions, however, are licenses, not sales, and so the first-sale doctrine may not apply. And even if the first-sale doctrine applies, it is limited by statute where software is concerned: the anti-rental provisions of the statute give the owner of the copyright in a computer program the exclusive right (subject to certain exceptions) to dispose of, or authorize the disposal of, possession of any copy by rental, lease, or lending. See 17 U.S.C. § 109(b).
Selected cases:
Adobe Systems Inc. v. One Stop Micro, Inc., 84 F. Supp.2d 1086 (N.D. Cal. 2000): The court granted partial summary judgment in favor of copyright owner Adobe. The court held that Adobe's software distribution agreement with an educational distributor was a licensing agreement, not a sales agreement, despite usage of sales terminology such as “purchase” and “own.” Consequently, the first sale doctrine did not apply, and the defendant did not have the right to redistribute copies of the software. The court held that One Stop Micro had thus infringed Adobe's copyright by purchasing Adobe software packages from the educational distributor, peeling off “academic use only” stickers, re-shrink-wrapping the packages, and distributing the adulterated packages in violation of distribution agreement).
Softman Products Co., LLC v. Adobe Systems Inc., 171 F. Supp. 2d 1075 (C.D. Cal. 2001) (vacating preliminary injunction): The U.S. district court for the Central District of California refused to adopt the Northern District's One Stop Micro analysis. The Softman court found that “the circumstances surrounding the transaction strongly suggests that the [shrinkwrap or click-wrap license] transaction is in fact a sale rather than a license. For example, the purchaser commonly obtains a single copy of the software, with documentation, for a single price, which the purchaser pays at the time of the transaction, and which constitutes the entire payment for the ‘license.' The license runs for an indefinite term without provisions for renewal. In light of these indicia, many courts and commentators conclude that a ‘shrinkwrap license' transaction is a sale of goods rather than a license.” Id. at
- And because the distributor-plaintiff did not agree to the terms
of the click-wrap or shrinkwrap end-user license agreement (EULA), the court held that the distributor was entitled under the first-sale doctrine to
Microsoft Corp. v. Harmony Computers & Electronics, Inc., 846 F. Supp. 208 (E.D.N.Y. 1994): The court granted a preliminary injunction after an ex parte seizure of software. It held that Microsoft's distribution of its software under license was not a “first sale,” and so the defendant infringed Microsoft's copyright by its unauthorized distribution of copies..
Central Point Software Inc. v. Global Software & Accessories, Inc., 880 F. Supp. 957 (E.D.N.Y. 1995): The court held that the defendant's “deferred billing plan,” which permitted the defendant's customers to return software for up to five days subject to a “restocking fee,” was a prohibited software rental arrangement.
Adobe Systems, Inc. v. Brenengen, 928 F. Supp. 616 (E.D.N.C. 1996): The court granted a preliminary injunction against the defendant's software-rental business.
9.4.4 Copyrights Last a Long Time
Ordinarily, the term of a copyright is the life of the author of the work plus 70 years (or, in the case of joint authors, the life of the last-surviving author plus 70 years). See 17 U.S.C. § 302(a), (b). Different rules apply to works that were created prior to January 1,
- See id. §§ 303, 304. Unless the Copyright Office's records
indicate otherwise, an author is presumed to be dead 95 years after the year of the first publication of a work or 120 years after the year of creation of the work. Id. § 302(e).
If, however, the work is (i) an anonymous work that remains anonymous in the Copyright Office's records, (ii)/ a pseudonymous work that remains pseudonymous in the Copyright Office's records, or /(iii) a work made for hire, then the copyright term is 95 years from the date of first publication or 120 years from the date of creation, whichever expires first. Id. § 302(c).
9.5 Copyright in Data Collections
A compilation of preexisting materials, or of data – such as an off- or on-line database, or perhaps a Web “link farm” (see § 2.8[g]) – can be protected by copyright in some circumstances. The availability of such protection depends on the creativity used in selecting or arranging the preexisting materials or data.
9.5.1 Statutory Provisions
The Copyright Act of 1976 makes explicit provision for copyright protection for compilations:
§ 103 Subject matter of copyright: Compilations and derivative works
(a) The subject matter of copyright as specified by section 102 includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.
(b) The copyright in a compilation or derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material. The copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the original material.
17 U.S.C. § 103. The term “compilation” is defined in the statute:
A “compilation” is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. The term “compilation” includes collective works.
Id. § 101. The term “collective work” is likewise defined in the statute:
A “collective work” is a work, such as a periodical issue, anthology, or encyclopedia, in which a number of contributions, constituting separate and independent works in themselves, are assembled into a collective whole.
Id.
9.5.2 The Feist Decision Imposes a Creativity Requirement
In its 1991 Feist decision, the Supreme Court held that to be protectable by copyright, databases and other compilations must exhibit at least some minimal degree of creativity in the selection and/or arrangement of the data or preexisting materials contained therein. Feist Publications, Inc., v. Rural Telephone Service Co., 499 U.S. 340, 111 S. Ct. 1282 (1991).
For a time, the circuits had been split on this point, with the “sweat of the brow” line of cases indicating that the compiler's effort alone was sufficient to give rise to protection. In an opinion by Justice O'Connor joined by seven other justices (Justice Blackmun concurred in the judgment without joining in the opinion), the Court reversed a Tenth Circuit decision along those lines, holding that the white pages of the telephone directory in suit were insufficiently original and therefore were uncopyrightable.
The Feist Court used an originality test to resolve the tension between the /un/copyrightability of facts and the copyrightability of compilations. “Original, as the term is used in copyright, means only that the work was independently created by the author (as opposed to copied from other works), and that it possesses at least some minimal degree of creativity.” Feist, 499 U.S. at 345, 111 S. Ct. at 1287 (citation omitted).
The Court limited copyright protection in fact‑intensive works to those aspects that possess “some creative spark, ‘no matter how crude, humble or obvious' it might be.” Id. (citation omitted). The Court expressly rejected the “sweat of the brow” theory of copyright as being unreconcilable with the constitutional limitations and statutory framework of copyright protection. It accused the lower courts that developed the theory of having “handed out proprietary interests in facts and declared that authors are absolutely precluded from saving time and effort by relying upon the facts contained in prior works.” Id., 499 U.S. at 354, 111 S. Ct. at 1292.
As to white‑pages telephone directories, the Court said that an alphabetical arrangement of names, addresses, and phone numbers “is not only unoriginal, it is practically inevitable. This time-honored tradition does not possess the minimal creative spark required by the Copyright Act and the Constitution.” Id., 499 U.S. at 363, 111 S. Ct. at 1296-97.
9.5.3 Some Illustrative Post-Feist Decisions
In the years since the Feist decision, several opinions by federal appeals courts and district courts have attempted to apply that case's principles in deciding whether specific compilations of data were protectable by copyright. The decisions tend to be quite fact-dependent; moreover, even if a court holds that a particular compilation is copyrightable, the court might also hold that there is no substantial similarity in the defendant's work and thus no infringement. A few illustrative cases are described below.
West Publishing Fights to Protect Its Star Pagination
Matthew Bender & Co., Inc. v. West Publishing Co., 158 F.3d 674, 682‑83 (2d Cir. 1998) (affirming summary judgment in favor of Matthew Bender): The Second Circuit rejected West's attempt to protect the pagination of the published judicial opinions in its case reports. (West Publishing is a part of West Group, the publisher of this treatise.) The court set out a fact-dependent test for creativity in selection and arrangement of preexisting materials: “[C]reativity in selection and arrangement therefore is a function of (i) the total number of options available, (ii) external factors that limit the viability of certain options and render others non‑creative, and (iii) prior uses that render certain selections ‘garden variety.'”
The court held that “when it comes to the selection or arrangement of information, creativity inheres in making non‑obvious choices from among more than a few options.” Id., 158 F.3d at 622. However, “selection from two or three options, or of options that have been selected countless times before and have become typical, is insufficient.” Id. According to the court, this is because “[p]rotection of such choices would enable a copyright holder to monopolize widely‑used expression and upset the balance of copyright law.” Id. The court suggested that in cases where originality had been found in selection, the facts showed that “the compiler selected from among numerous choices, exercising subjective judgments relating to taste and value that were not obvious and were not dictated by industry convention.” Id. at 689.
Previously, West had enjoyed better luck on its home turf of Minnesota and the Eighth Circuit:
West Publishing Co. v. Mead Data Central, Inc., 799 F.2d 1219 (8th Cir.1986): The Eighth Circuit affirmed a preliminary injunction prohibiting Mead from using West's internal “pinpoint cites” or “star pagination” citations in Mead's proposed LEXIS star pagination computer research product.
Oasis Publishing Co. v. West Publishing Co., 924 F. Supp. 918, 920-21, 925 (D. Minn. 1996): Oasis sued for a declaratory judgment that West's compilation copyright did not extent to the “star pagination” of West's published opinions, but only to the physical compilation itself. The court granted West's motion for summary judgment.
Copyright Protection of Compilations of
Codes, etc., in Computer‑Based Systems
:CUSTOMID: copyright-protection-of-compilations-of-codes-etc.-in-computerbased-systems
Other courts have had to address claims of copyright protection in data stored on, or used in, computer-based systems. For example:
Mitel, Inc. v. Iqtel, Inc., 124 F.3d 1366, 1373-74 (10th Cir. 1997): The Tenth Circuit affirmed a denial of a preliminary injunction against the defendant's use of the plaintiff's telephone call controller commands in competing telephone equipment. The court held that the plaintiff had used such minimal effort and judgment in selecting its command codes that the codes were unoriginal and thus unprotectable.
Compaq Computer Corp. v. Procom Technology, Inc., 908 F. Supp. 1409, 1415-16, 1418 (S.D. Tex. 1995): The district court held that Compaq's selection of a specific set of hard-disk operational parameter values, used to trigger display of on-screen message suggesting replacement of the disk, was sufficiently original to be protectable. The court also held, however, that the order in which the values were stored on the disk was necessary to the proper functioning of the display program and therefore was not protectable.
Atari Games Corp. v. Nintendo of America Inc., 30 USPQ2d 1401, 1404-05 (N.D. Cal. 1993), prior proceedings, 18 USPQ2d (BNA) 1935 (N.D. Cal.
- (granting preliminary injunction; see § 2.7[e]), affirmed,
975 F.2d 832 (Fed. Cir. 1992): The court held that a signal stream transmitted between a game cartridge and a game machine was not the result of specific “choices as to selection and arrangement” of data and therefore did not meet Feist's originality requirement for protection.
Selected Other Data-Compilation Cases
County of Suffolk, New York v. First American Real Estate Solutions, 261 F.3d 179 (2nd Cir. 2001): The Second Circuit held that a series of original “tax maps” created by Suffolk County, New York was copyrightable, and therefore reversed dismissal of a copyright-infringement complaint. (Note the difference with the statutory provision that works created by the U.S. Government are not copyrightable, as discussed in § 2.3[c].)
Veeck v. Southern Building Code Congress Int'l, Inc., 241 F.3d 398 (5th Cir. 2001), overruled, _ F.3d _, 2002 WL 1270117 (5th Cir. June 7, 2002) (en banc): A non-profit organization developed a series of model building codes, some of which were enacted into law by municipalities. A Web site operator purchased a disk copy of the model building codes from the non-profit organization. The license agreement accompanying the disk copy stated that the codes could not be copied and distributed. The Web site operator, however, copied and pasted the text of the building codes into his Web site, and accurately identified them as the building codes of two small towns in Texas.
The Web site operator sought a declaratory judgment that he had not infringed the copyright in the building codes. The non-profit organization counterclaimed for copyright and breach of contract. The district court granted summary judgment for the organization, including a permanent injunction and an award of damages against the Web site operator.
In Veeck, the judgment against the Web site operator was affirmed by the Fifth Circuit panel, but the en banc court reversed. The en banc court held that, when the building codes were enacted into law, the law passed into the public domain, but that as model codes, the organization's works retained their protected status. The court distinguished the situation in which the law referred to, but did not incorporate, external standards such as the American Medical Association's CPT coding system (citing among other cases the Ninth Circuit's Practice Management opinion and the Second Circuit's CCC Information Services holding, both discussed below).
(The non-profit organization's claim against the Web site operator for breach of the license agreement was not before the Veeck court. Under the Seventh Circuit's ProCD holding, discussed in detail in Chapter 13, the contract claim would seem to remain viable even for uncopyrighted material. See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 39 USPQ2d (BNA) 1161 (7th Cir. 1996) (reversing summary judgment in favor of copyright infringement defendants; shrinkwrap license agreement was effective to preclude copying of collection of telephone listings).
Practice Mgt. Info. Corp. v. American Med. Ass'n ("Practice Management "), 121 F.3d 516 (9th Cir.), cert. denied, 522 U.S. 933 (1997), opinion amended by 133 F.3d 1140 (9th Cir.1998): The Ninth Circuit held that the American Medical Association did not lose the right to enforce its copyright when the use of its promulgated CPT coding system was required by government regulations.
CCC Information Services, Inc. v. MacLean Hunter Market Reports, Inc., 44 F.3d 61 (2d Cir. 1994): The Second Circuit reversed a summary judgment that a computerized database of used-car values was uncopyrightable. The court also held that the database did not lose its copyright protection by virtue of the fact that various states had mandated its use by insurance companies.
Bellsouth Advertising & Publishing Corp. v. Donnelley Info. Publishing, Inc., 999 F.2d 1436, 1442-46 (11th Cir. 1993): The en-banc Eleventh Circuit held that the classification categories of a business yellow-pages telephone directory were one of limited number of ways of classifying businesses and thus were insufficiently original to warrant protection.
Victor Lalli Enterprises, Inc., v. Big Red Apple, Inc., 936 F.2d 671 (2d Cir. 1991): The Second Circuit held that a compilation of information gleaned from horse racing statistics was not entitled to copyright protection. According to the court, the copyright claimant had arranged factual data in conventional format according to “purely functional grids that offer no opportunity for variation,” exercising neither selectivity in what was reported nor creativity in how it was reported.
Kregos v. Associated Press, 937 F.2d 700 (2d Cir. 1991), after remand, 3 F.3d 656, 663-64 (2d Cir. 1993): The Second Circuit vacated a summary judgment that a baseball pitching form was uncopyrightable. After remand, the court affirmed the lower-court judgment that the defendant's pitching form was not substantially similar to the plaintiff's form, especially in view of the limited number of ways of expressing the idea.
9.6 Copyright Notices: Not Strictly Required, But Still a Very Good Idea
Contrary to a widely held misconception, a copyright notice is not required to establish the copyright in a computer program. By law, the copyright subsists from the time the program is fixed in a tangible medium of expression. See 17 U.S.C. § 102(a).
For “pre-Berne” works, however, display of a copyright notice can be vital insurance against inadvertent forfeiture of a copyright. The term “pre-Berne” work is used here to refer to published works, copies of which were distributed to the public before March 1, 1989. That date marked the U.S.'s formal implementation of the Berne Convention. See Berne Convention Implementation Act of 1988, Pub. L. No. 100‑568 (1988). If a pre-Berne work becomes “published,” for example, a copyright notice must be displayed on all “publicly distributed” copies to prevent the copyright from being invalidated. See 17 U.S.C. §§ 401, 405.
Even for post-Berne works, display of a notice gives the copyright owner some procedural and psychological advantages in litigation, namely that an infringer who had access to a copy bearing the notice cannot claim innocence as a defense. See 17 U.S.C. § 401(d).
Display of a copyright notice, in and of itself, should not preclude assertion of other proprietary rights such as trade secret rights. This is of course true under the 1976 Copyright Act, which granted federal copyright protection to unpublished works. See § 2.1[a]. In addition, under the old 1909 Act, one case expressly so held. Technicon Medical Information Systems Corp. v. Green Bay Packaging Inc., 687 F.2d 1032, 1035, 1037 (7th Cir. 1982) (ruling that plaintiff was not estopped from denying that a general publication had taken place, which at that time, under section 10 of the 1909 Act, was a prerequisite to copyright protection).
9.6.1 When is a Copyright Notice Required?
No Notice Required on Post-Berne Works
Under U.S. copyright law, a copyright notice is no longer required on copies distributed to the public after March 1, 1989. See 17 U.S.C. § 401(a). Certain exceptions exist, however, relating to cure of previous no-notice distributions, as discussed in § 2.3[f]. In addition, a notice may be required to preserve copyright in some non-U.S. countries.
To preserve a claim to copyright in a “published” pre-Berne program or other copyrightable work, the Copyright Act requires that a legend giving reasonable notice of the claim be placed on all copies of the program that were publicly distributed before March 1, 1989. See 17 U.S.C. § 401(a); see also § 2.3[f] (rescuing a copyright after no-legend publication). “Publication” is defined in the Act as “the distribution of copies . . . of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending.” 17 U.S.C. § 101. The Act also provides that “[t]he offering to distribute copies . . . to a group of persons for purposes of further distribution . . . constitutes publication.” Id.
The term “copies” includes floppy disks, hard-copy printouts, and other “tangible medi[a] of expression from which the work can be perceived, either directly or with the aid of a machine or device.” Id. (definition of “copies”).
The term “copies,” for purposes of the copyright-notice requirements, arguably may also include copies in RAM, at least under the rationale of the cases discussed in § 2.7[c], holding that making copies of a computer program in RAM (e.g., for purposes of running the program) constitutes infringement.
What Constitutes “Publication,” Triggering the Copyright Notice
Requirements for Pre‑Berne Works?
:CUSTOMID: what-constitutes-publication-triggering-the-copyright-notice-requirements-for-preberne-works
The legislative history of the Copyright Act seemingly indicates that “publication” – which triggered the copyright-notice requirements for pre-Berne works – does not include distribution of copies under an obligation of confidence. See H.R. Rep. No. 94‑1476, 94th Cong., 2d Sess. 138 (1976), reprinted in 4 Nimmer on Copyrights App. 4‑108 (1989). That arguably implies that such copies need not bear a copyright notice.
The cases are mixed on that point, however. Some federal district courts have ruled that software whose pre-Berne distribution was restricted in this manner was not subject to the copyright notice requirement. In each case, however, the courts emphasized the limited nature of the no-notice distribution that had occurred. For example:
Gates Rubber Co. v. Bando American, Inc., 798 F. Supp. 1499 (D. Colo. 1992), reversed on other grounds, 9 F.3d 823 (10th Cir. 1993): The court held that the copyright in the plaintiff's computer program had not been forfeited through no-notice use of the program by the owner's sales force to help customers determine which specific products to order. The court said that “if any publication occurred, it was a limited publication, which communicated the content of the program to a definitely selected group for a limited purpose, without the right of diffusion, reproduction, distribution, or sale.” Id. at
Williams v. Arndt, 626 F. Supp. 571 (D. Mass 1985): The court held that the copyright in a manual was not forfeited by no-notice distribution of eleven copies, where the distribution had been “limited to a definite, very selective group for a limited purpose on the condition that the contents not be disclosed or further disseminated ….” Id. at 578.
In other cases, courts held that the no-notice distributions in question were not “limited,” and that failure to utilize the Copyright Act's cure provisions resulted in forfeiture of the copyrights:
D.C.I. Computer Systems, Inc. v. Pardini, 978 F.2d 1265 (table; unpublished), 1992 Copr. L. Dec. ¶ 27,005 (9th Cir. 1992): The Ninth Circuit affirmed a trial-court holding of copyright forfeiture. It held that widespread, pre-Berne, no-notice distribution of copies of a computer program under a trade-secret licensing program, for pecuniary gain, to any automobile or recreational vehicle dealership in the country that would agree to enter into the license agreement, constituted “general publication,” triggering the notice requirements.
Unix System Laboratories, Inc., v. Berkeley Software Design, Inc., slip op. at 32-34, Civ. No. 92-1667 (D.N.J. March 3, 1993), reprinted in Comp. Industry Lit. Rptr. (Andrews) 16704 (Apr. 15, 1993) (designated “not for publication”): The court denied a motion for preliminary injunction, holding that the plaintiff was unlikely to succeed on the merits of its copyright-infringement claim. The court held that AT&T's no-notice distribution of the source code of UNIX, under license, to virtually any qualified licensee, was not made a “limited publication” by AT&T's screening of potential licensees; such screening was merely to confirm that licensees would pay the required license fees and protect AT&T's intellectual property.
9.6.2 Elements of a Proper Copyright Notice for ”Published” Programs
Sections 401 and 403 of the U.S. copyright statute state that, if a copyright notice is required for a “published” pre-Berne computer program, the following elements must be included in the copyright notice:
The word “Copyright,” the abbreviation “Copr.,” or the c-in-a-circle symbol ©. The c-and-parentheses symbol can be used in addition to either of the first two, but to be safe, only the c-in-a-circle © should be used in place of them. See § 2.3[b][1] immediately below;
The year the work was first “published”;
The name of the owner or owners of the copyrightthis will be affected by whether the software was a “work made for hire” and whether it was a joint work. See § 2.6 et seq.;
If the work consists preponderantly of one or more “works of the U.S. Government” – which are uncopyrightable under 17 U.S.C. § 105—a statement identifying, either affirmatively or negatively, those portions embodying any work or works that are protected by copyright. (See also the discussions in § 2.2[c][3] concerning copyright in privately-developed materials incorporated into statutes and regulations, and in § 2.3[g] concerning additional legends to be used in distributing software to the U.S. Government, and in.)
EXAMPLE: “Copyright © 1595 William Shakespeare.”
EXAMPLE: A privately-edited collection of government reports might be eligible for copyright protection as a compilation. An appropriate notice might read “Copyright © 20XX John Doe; no copyright claimed in works of the U.S. Government.”
Failure to include any of these elements, or including the wrong information as to date and ownership, can be the same as omitting the notice entirely. For pre-Berne works, this can invalidate the copyright or at least make it difficult to take any kind of effective legal action against unauthorized copiers. See 17 U.S.C. § 405.
The phrase “All Rights Reserved” should also appear to maximize protection in certain South American countries that are members of the Buenos Aires Convention, but not of the Universal Copyright Convention or the Berne Convention.
To help preserve trade secret rights, a slightly different notice, discussed below, can be used for an “unpublished” program, e.g., secret source code.
Use of the © Symbol
For on-screen displays, the c-and-parentheses or “(c)” symbol should be used in addition to, and not in place of, the word “Copyright.” By statute, the c-in-a-circle symbol may be used in place of the word “Copyright.”
Because there is no ASCII symbol for the c-in-a-circle symbol ©, the character sequence “(c)” is often used on terminal-screen displays. The U.S. Copyright Office will accept registration applications in which the accompanying deposit contains the c-in-parentheses notice. U.S. Copyright Office, Compendium of Copyright Office Practices [“Compendium II”] § 1005.01(c) (1984). There is a possibility, however, that in U.S. infringement litigation a court might rule that “(c),” by itself, is not a proper substitute for the word “Copyright.”
Selected cases:
Videotronics, Inc., v. Bend Electronics [Corp.], 586 F. Supp. 478, 481 (D. Nev. 1984): /T/he Nevada district court ruled that the on-screen letter “c” within a hexagonal figure was an acceptable substitute for © because letter “c” was completely surrounded by a hexagon.
Forry, Inc., v. Neundorfer, Inc., 837 F.2d 259 (6th Cir. 1988): The Sixth Circuit acknowledged, but did not finally answer, the question whether a (C) notice is a proper substitute for the c-in-a-circle symbol ©. The case was an appeal from the grant of a preliminary injunction, in which the trial court had ruled that a “(C)” notice on a microprocessor chip “substantially complied with the statute and … was adequate to give notice that the Plaintiff owned a copyright on the program in the chip.” Id. at 266. The Forry court noted the similar result in Videotronics; it observed that “[t]he trial of this action may provide a better record” on which to finally decide whether a “(C)” would suffice. 837 F.2d at 266.
It thus is unclear whether anything less than substantial compliance with the c-in-a-circle requirement will preserve the U.S. copyright, if a notice is needed at all. To be safe, therefore, the word “Copyright” or “Copr.” should appear on all on-screen copyright notices.
Furthermore, the Universal Copyright Convention might not give a safe harbor in its member states to anything other than a c-in-a-circle symbol ©. Part of that convention is directed to member states that require copyright notices. The convention requires such states to give full faith and credit, so to speak, to notices on works published by nationals of other countries if those notices include the c-in-a-circle symbol © (plus the year of first publication and the name of the copyright owner). It is not clear whether anything less will suffice in countries that are not members of the Berne Convention but are members of the UCC (as was the U.S. until March, 1989).
On printed matter, the c-in-a-circle symbol ©, as opposed to “(c)”, should definitely appear in addition to the word “Copyright” on matter, e.g., program listings, diskette labels, and documentation.
Citing the Proper Owner in the Copyright Notice
The copyright notice should bear the name of the owner of the copyright, see § 2.6, although an error in the name does not affect the validity or enforceability of the copyright. See 17 U.S.C. § 406(a). If the name is erroneous, an infringement defendant who proves good-faith reliance on the erroneous name (e.g., by taking a license from the named owner) has a complete defense to the infringement action unless the name of the true owner is of record in the Copyright Office. See id.
The copyright in any original work can be assigned by a written instrument. See generally 17 U.S.C. §§ 204‑205; see also 0 (sample copyright-assignment form). The copyright notice for a software package written by an outside contractor but assigned over to the hiring party will thus normally bear the hiring party's name as owner.
Proper Use of Copyright-Notice Dates
The “year of first publication” is the year the work was first “published” and not the year it was created or completed. If an updated version of a software package is published, it is desirable to include the year of first publication for the original as well as the updated version. This may not be essential, because by statute “in the case of compilations or derivative works incorporating previously published material, the year date of first publication of the compilation is sufficient.” 17 U.S.C. § 401(b)(2). On the other hand, an updated version might not contain enough change to qualify it as a distinct work of authorship and thus as a derivative work. See § 2.1[b]. If this were found to be the case, including only the update year might be insufficient.
A prudent compromise might be to include all years of first publication. An example of a legend for updated works might be: “Copyright © 1982, 1983 XYZ, Inc.” If the package has been updated many times, an alternative might be: “Copyrights © 1980‑1986 ABC, Inc.” (note the plural).
Use of the correct publication year is important. The Copyright Act provides that the lifetime of the copyright in “works for hire,” among others, runs from the year of first publication; the work passes into the public domain after the end of the copyright term. See 17 U.S.C. § 302.
Use of a year more than one year after the actual first publication year is the same as omitting the year entirely. This in turn is the same as omitting the notice itself, see 17 U.S.C. § 406, which has the consequences discussed above.
9.6.3 Disclaiming Copyright in Government Works
Some copyrighted works consist in large part of one or more works of the U.S. Government, for which copyright is not available by statute. See 17 U.S.C. § 105. Copyright notices for works that consist “predominantly” of U.S. Government works must identify, either affirmatively or negatively, the copyrightable portions. See id. § 403.
EXAMPLE: Copyright 20xx XYZ Inc. No copyright claimed in works of the U.S. Government.
9.6.4 Copyright Notices for Unpublished Trade‑Secret Programs
As discussed above in § 2.3[a], strictly speaking a copyright notice may not be needed to preserve the copyright in licensed, trade-secret software (under circumstances amounting to “limited” publication), even if the software is a pre-Berne work. However, as the cases discussed above make clear, a licensor that distributed such software without a copyright notice may well have put its copyright at risk. A software proprietor mindful of that risk might hedge its bets by displaying a modified notice reading something like the following:
Copyright © XYZ, Inc., as an unpublished work first licensed in 1986. This program is a confidential, unpublished work of authorship created in 1985. It is a trade secret which is the property of XYZ, Inc. All use, disclosure, and/or reproduction not specifically authorized by XYZ, Inc., is prohibited. This program may also be protected under the copyright and/or trade secret laws of non-U.S. countries. All rights reserved.
9.6.5 Placement of the Copyright Notice
The Copyright Act requires that the copyright notice, if required, be placed where it will give reasonable notice that the program is copyrighted. See 17 U.S.C. § 401(c); Methods of Affixation and Positions of Copyright Notice on Various Types of Works, 37 C.F.R. § 201.20.
It never hurts to put the notice in several locations, as long as they all contain the same, correct information. Common locations include:
on the floppy-disk label, if the program is mass-marketed;
on the user's terminal screen upon start-up of the program;
if practical, continuously on the screen (e.g., in a status line);
if source code is publicly distributed, in comment fields at the beginning of each separate copyrighted module;
at the beginning of any publicly distributed hard-copy listings.
9.6.6 Rescuing the Copyright After No‑Notice Publication
In some circumstances the Copyright Act permits a copyright to be “rescued” even if the required copyright notice is totally absent from publicly distributed copies. Perhaps the safest way to preserve the copyright is the following two-step procedure:
- register the work no later than five years after the no-notice
publication, and
- make “a reasonable effort” to add the notice “to all copies . . .
that are distributed to the public in the United States after the omission has been discovered.” 17 U.S.C. § 405(a)(2). This has been held to require a notice even on copies distributed after March 1, 1989 if a pre-Berne omission occurs, even if the omission is discovered after that date. See Charles Garnier, Paris v. Andin Int'l, Inc., 844 F. Supp. 89, 94 (D.R.I. 1994) (denying motion for preliminary injunction on grounds that plaintiff had forfeited copyright), citing Encore Shoe Corp. v. Bennett Indus., Inc., 18 USPQ2d (BNA) 1874 (D. Mass. 1991) .
What Constitutes a “Reasonable” Curative Effort
Under section 405(a)(2) of the Copyright Act, an effort to cure an omission of the copyright notice from pre-Berne copies need not be exhaustive, only “reasonable.” See /Shapiro & Son Bedspread Corp.
- Royal Mills Associates/, 764 F.2d 69, 73‑74 (2d Cir. 1985). However,
a certain display of contrition and penance may be required to make an effort appear reasonable in the eyes of a court. In Videotronics, supra, the court ruled that “[i]mplicit in the concept of a `reasonable effort' under § 405(a) is the expectation that an expenditure of time and money over and above that required in the normal course of business.” 586 F. Supp. at 483 (D. Nev. 1984).
Courts may look for prompt action by a copyright proprietor to cure an omission of a notice from pre-Berne copies. In NEC Corp. v. Intel Corp., the court enumerated four factors to be examined in determining the reasonableness of a curative effort:
- When discovery of the failure to add the notice occurred;
- The time that elapsed between such discovery and the commencement
of corrective action;
- The reasonable sufficiency of the corrective action;
- The extent of any follow-up to determine implementation by
licensees; and
- The quantity of copies distributed to the public between discovery
and corrective action.
NEC Corp. v. Intel Corp., 10 USPQ2d (BNA) 1177, 1180 (N.D. Cal. 1989).
The NEC court held, in effect, that Intel's efforts were too little too late. For example, Intel was found to have allowed a licensee to ship some 240,000 no-notice copies in the seven months between the date on which Intel claimed to have discovered the omission (and the court gave Intel the benefit of the doubt in this regard) and the date on which the first copies with a notice were shipped by the licensee. Intel also failed to offer to defray the cost of adding the notice. The court summarized Intel's efforts as to that licensee:
Intel's efforts with respect to Fujitsu were substantially less than reasonably could have been expected. . . . This situation required of Intel a frank acknowledgement to Fujitsu as to the nature of the problem, a request for full assistance in causing the copyright notice to be affixed on all products before final sale to the consumer, and an offer to help defray the cost of marking.
Instead, Intel did substantially nothing for two months and then waited an additional three months for an equivocal reply from Fujitsu. Its only other action was to send stickers without a reasonable expectation that they would be affixed, and it never did make inquiry to ascertain whether or not the stickers had been used. In the meantime, several hundred thousand unmarked copies of Intel's microcode had been scattered among the public.
Id. at 1182 (paragraphing supplied). On the basis of this and similar circumstances, the court ruled that Intel had forfeited its copyrights in the microcode. Id. at 1182‑83; see also Valve & Primer Corp. v. Val-Matic Valve & Mfg. Corp., 730 F. Supp. 141, 143‑44 (N.D. Ill. 1990) (copyrights in customer bulletins forfeited where omission of legend not cured until reprinting of bulletins, months after omission discovered).
The reasonableness of a curative effort may be judged in light of the equities perceived by a court in an infringement lawsuit. In Manufacturers Technology, Inc., v. CAMS, Inc., the copyright plaintiff had left off the notice from a brochure containing reproductions of program screen displays. The defendant asserted that the copyright in those screen displays had been forfeited. The court, reviewing the limited evidence concerning the plaintiff's curative efforts, noted that the defendants “were on notice of plaintiff's proprietary interest in its programs . . . .” Based in part on defendants' actual knowledge of the copyright claim, the court found that the plaintiff's curative efforts had been reasonable. Manufacturers Technology, Inc., v. CAMS, Inc., 706 F. Supp. 984, 999-1000 (D. Conn. 1989),
Add the Copyright Notice to Which Copies?
A question may exist whether the copyright notice must be applied to no-notice copies already in the hands of the public. The courts seem to be split on this question. See M. Kramer Mfg. Co. v. Andrews, 783 F.2d 421, 444‑45 (4th Cir. 1986); Donald Frederick Evans & Associates, Inc. v. Continental Homes, Inc., 785 F.2d 897, 910-12, 911 & n.22 (11th Cir. 1986).
As the Eleventh Circuit noted, “[t]he statutory language is ambiguous and could support either interpretation,” but “[t]he legislative history lends support to the latter [no such requirement] interpretation.” Id. On the other hand, the Second Circuit has ruled that no-notice copies in the hands of distributors have not yet been “distributed to the public,” and so the “reasonable effort” must encompass those copies. Shapiro, 764 F.2d at 74; see also NEC, 10 USPQ2d at 1180‑83.
It may be prudent not to take a chance: many companies go ahead and mail copyright stickers to dealers and end-users, together with letters asking that the stickers be affixed to the no-notice copies. See, e.g., Williams v. Arndt, 626 F. Supp. at 576 (D. Mass. 1985). The letters often include a premium offer or something else that can be introduced as indirect evidence of the likelihood that the stickers were in fact affixed. The NEC case, of course, indicates that even more aggressive measures may be required to ensure that the stickers are applied to copies that remain in the hands of dealers. See NEC, 10 USPQ2d at 1180‑82.
Can Intentional Omissions Be Cured?
It is not completely clear whether intentional omissions of copyright notices can be cured in the same manner as unintentional omissions.
Selected cases:
Hasbro Bradley, Inc., v. Sparkle Toys, Inc., 780 F.2d 189, (2d Cir. 1985): The Second Circuit held that both intentional and unintentional omissions could be cured. Id. at 195‑96; see also Flag Fables, Inc., v. Jean Ann's Country Flags and Crafts, Inc., 730 F. Supp. 1165, 1183 (D. Mass. 1989) (citing Hasbro Bradley and denying defendant's motion for summary judgment that plaintiff had forfeited copyrights by intentional omission).
Innovative Concepts in Entertainment, Inc., v. Entertainment Enterprises Ltd., 576 F. Supp. 457, 461‑62 (E.D.N.Y. 1983): The district court held that a manufacturer/distributor of coin-operated miniature hockey games was not barred from curing an omission because he did not know that copyright protection was available..
Beacon Looms, Inc. v. Lichtenberg & Co., 552 F. Supp. 1305, 1310‑11 (S.D.N.Y. 1982): The district court ruled that an intentional omission could not be cured, given that the copyright owner in question “copyrighted” some of his designs but not others, thus presumably knowing about the availability of copyright protection.
Data Cash Systems, Inc., v. JS&A Group, Inc., 628 F.2d 1038, 1043‑44 (7th Cir. 1980): In a ROM-chip case arising under the 1909 Copyright Act, the Seventh Circuit ruled against a copyright owner who omitted a notice in the mistaken belief that the ROM chips physically could not be copied.
The potential penalty for wrong guessing is severe forfeiture of the copyright. The prudent rule would thus seem to be: when in doubt about pre-Berne copies, assume that a copyright notice was required.
Even if an Earlier Version's Copyright is Forfeited,
Later Versions Can Still Be Protectable
:CUSTOMID: even-if-an-earlier-versions-copyright-is-forfeited-later-versions-can-still-be-protectable
Forfeiture of the copyright in an earlier version of a computer program does not mean that later versions will be unprotected. So said the Eleventh Circuit in its 1999 Montgomery opinion, discussed in § 2.1[b].
9.6.7 Special Notices Appropriate for Licensing
of “Noncommercial” Software to the U.S. Government
:CUSTOMID: special-notices-appropriate-for-licensing-of-noncommercial-software-to-the-u.s.-government
Vendors of “noncommercial” computer software should be aware of special notice requirements when dealing with the U.S. Government. The applicable regulations are the Federal Acquisition Regulations (FARs), 48 C.F.R. §§ 27.401 et seq., which include detailed provisions specific to the Department of Defense, commonly referred to as the DFARs. See 48 C.F.R. §§ 227.401 et seq.
(The FARs and DFARs are available on the World Wide Web at http://www.access.gpo.gov/nara/cfr/cfr-table-search.html. At this writing, some sections of the latest version of the CFR do not seem to be available at this site, e.g., 48 C.F.R. §§ 27.401; if that happens, try searching the previous year's CFR.)
Companies that provide “commercial computer software” and “commercial computer software documentation” to the Government are deemed to grant the Government “only those rights specified in the license contained in any addendum to the contract.” Computer software, 48 C.F.R. § 12.212. But vendors of “noncommercial computer software” whose software might be purchased or licensed by Government agencies may inadvertently jeopardize their proprietary rights (at least vis à vis the Government) if they do not comply with the legend requirements of the FARs. (Extracts from the FARs and DFARs are included in Appendix F.)
The term “commercial computer software” is defined relatively liberally in the FARs as “(a)…(1)…software developed or regularly used for nongovernmental purposes which‑‑ (i) [h]as been sold, leased, or licensed to the public; (ii) [h]as been offered for sale, lease, or license to the public; (iii) [h]as not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this contract; or (iv) [s]atisfies a criterion expressed in paragraph (a)(1) (i), (ii), or (iii) of this clause and would require only minor modification to meet the requirements of this contract.” Rights in noncommercial computer software and noncommercial computer software documentation, 48 C.F.R. § 252.227‑7014.
A detailed discussion of how to license software to the Government is beyond the scope of this paper. As a general proposition, however, any vendor of “noncommercial computer software” that is developed “at private expense” and that is not in the public domain should probably mark its software and documentation with a legend meeting the standards prescribed by the FARs and/or the DFARs, as applicable.
9.7 Copyright Registration
The other formality associated with copyrights in the United States is registration in the U.S. Copyright Office, which serves as constructive notice of the owner's copyright claim. See 17 U.S.C. § 205(c).
Registration of a claim to copyright in a program is cheap and easy. One caveat: a would-be registrant should take care about exposing trade secrets embodied in the software, e.g., by complying with the Copyright Office's deposit regulations (see § 2.4[b]). Otherwise, however, registration entails filling out a form and paying a modest filing fee. Some details are discussed below; see also the Copyright Office's Circular 61, available on-line at the Copyright Office Web site at http://www.loc.gov/copyright/circs/circ61.pdf.
9.7.1 Why Register Copyrights Early?
Statutory Prerequisite to Suit
Early registration of a software copyright is ordinarily desirable and carries distinct benefits. As the most obvious example, at this writing registration is a prerequisite to the filing of a copyright infringement suit by U.S. residents and by nationals of non-Berne Convention states. See 17 U.S.C. § 411. When clients discover that infringement is taking place, they usually want a lawsuit filed yesterday and will not be pleased at having to take the time to generate “identifying portions” of the software, see § 2.4[b][3], and then to wait for a belated registration application to be processed by the Copyright Office.
Preserving Rights to Statutory Damages and Attorneys' Fees
A copyright owner who fails timely to register its copyright may forfeit two important rights, namely statutory damages and prevailing-party attorneys' fees in the discretion of the court. Under the Copyright Act, a copyright owner may elect, at any time before final judgment, to receive an award of statutory damages in lieu of having to “prove up” its actual damages or the infringer's profits arising from the infringement. Statutory damages is a monetary award made by the court; the award can be in an amount up to $100,000 in cases where the infringement is found to be willful. See 17 U.S.C. § 504(c).
To be eligible for either of these remedies, the copyright owner must timely register the copyright in the work. Timely registration means either (i) /before a particular infringer begins his illegal activities or /(ii) for published works only, within three months of publication of the work. See 17 U.S.C. § 412. A copyright owner's failure to register timely carries a two-pronged disadvantage: it is ineligible for a fee award even if it is the prevailing party, see id., but the accused infringer could recover fees if it is the prevailing party.
Selected cases:
Aerospace Services Int'l v. LPA Group Inc., 57 F.3d 1002 (11th Cir. 1995): The court affirmed a denial of statutory damages and attorneys' fees. The court held that a limited distribution of airport security system performance specification was not “publication” under § 412; thus, the copyright owner did not qualify for the statutory three-month grace period in which to register copyright. Since the registration had not been obtained before the infringement began, the copyright owner therefore was not eligible for an award of attorneys' fees.
Getaped.com, Inc. v. Cangemi, 188 F. Supp. 2d 398 (S.D.N.Y. 2002 (awarding statutory damages and attorneys' fees to copyright owner): The court held that a copyright owner's posting of a Web page to its Web site constituted “publication” of the page and therefore made the copyright owner eligible for the three-month, post-publication grace period in which to register the copyright. The plaintiff had created a Web site to sell Go-Ped ® brand motorized scooters. The defendants copied the Web site source code for their own site – after the plaintiff registered its copyright, but before three months after the plaintiff's Web site first went “live.” The magistrate judge held that the Web site had been displayed, not published, and therefore was not eligible for the three-month grace period. The district judge overruled the magistrate judge on this point, noting that the source code of the Web site could be readily viewed and saved to a permanent file by Web surfers.
[Compare Getaped with Kelly v. Arriba Soft Corp., 280 F.3d 934 (9th Cir. 2002) (reversing, in pertinent part, summary judgment of fair use). In Kelly, the defendant's search engine linked and “framed” the plaintiff's copyrighted photographs, that is, the search engine caused the photographs to be imported directly to the end-user's browser from the plaintiff's Web site. The Ninth Circuit held that this did not constitute copyright infringement based on the reproduction of copyrighted works, but that it did infringe the plaintiff's exclusive right of public display of the works.]
Data General Corp. v. Grumman Systems Support Corp., 795 F. Supp. 501 (D. Mass. 1992), subsequent proceeding, 825 F. Supp. 340 (D. Mass.
- (upholding jury verdict of $27.4 million), /affirmed in pertinent
part, remanded on other grounds,/ 36 F.3d 1147 (1st Cir. 1994): Data General had obtained registrations for later versions of its software before the infringement of the later versions began. It had failed, however, to register earlier versions before infringement of those versions began. The court granted partial summary judgment that Data General would not be entitled to statutory damages in respect of infringement of later versions of software. See 795 F. Supp. at 503-04. The court held that Data General would be entitled to attorneys' fees in respect of infringement of the later versions of software.
Registration as Part of Rescuing a No‑Notice Copyright
Registration is all but required if a program or other work of authorship was published without a proper copyright notice before the U.S. implementation of Berne: one of the best methods of “rescuing” the copyright in such a work entails obtaining a registration no later than five years after the no-notice publication (in addition to making a reasonable effort to add the notice to all copies that are distributed to the public in the United States after the omission has been discovered). See § 2.3[f].
9.7.2 Trade Secrets and Registration Deposits
Registering a software copyright means making at least a partial copy of the software, in source-or object code, available for public inspection. The registrant therefore should take precautions to avoid disclosing any trade secrets that may embodied in the software.
Only Limited Public Access to Registration Deposits
Disclosure of trade secrets can happen because when any copyright is registered, copies of the “original work of authorship” in question (i.e., the program), or copies of “identifying portions” of the work in some circumstances, must be deposited with the Copyright Office when the registration application is filed. That allows Copyright Office personnel to verify that the material appears to be a work of authorship and is entitled to registration. See generally U.S. Copyright Office, Compendium of Copyright Office Practices [“Compendium II”], §§ 108.01, 324.04 (1984).
The public has access to deposited materials, thus creating the danger to trade-secret information. See Information Given by the Copyright Office, 37 C.F.R. § 201.2. If source code is deposited, anyone who can understand the language in which the software is written could theoretically analyze the program's structure and logic while studying the code in the Copyright Office. (“Object code,” i.e., machine-readable executable code, presumably would be more difficult to analyze in this way; see § 2.7[e] concerning reverse engineering.)
Copyright Office regulations, however, prohibit deposited materials from being copied except with the permission of the copyright owner, unless the copy is made for use in litigation or pursuant to a court order. See Information Given by the Copyright Office, 37 C.F.R. § 201.2(d)(4).
Falsely representing to the Copyright Office that litigation is pending, in order to obtain a copy of a registration deposit, can lead to trouble. In Atari Games Corp. v. Nintendo of America Inc., 18 USPQ2d (BNA) 1935 (N.D. Cal. 1991), affirmed, 975 F.2d 832 (Fed. Cir. 1992), Atari, as part of its reverse-engineering of the software embedded in Nintendo's Game Boy system, obtained a copy of Nintendo's object-code deposit from the Copyright Office. The court found that Atari had lied to the Copyright Office in stating that it needed to obtain the copy for use in defending against a pending infringement suit, when in fact no such suit had been brought at that point. The court granted a preliminary injunction against Atari.
Does Registration Automatically Destroy Trade Secrecy?
It is unclear whether registration of a copyright automatically destroys secrecy in the registered work, and with it any possibility of asserting trade-secret rights.
Selected cases:
Compuware Corp. v. Serena Software Int'l, Inc., 77 F. Supp.2d 816 (E.D. Mich. 1999): The district court denied a motion for summary judgment that the plaintiff's software had lost its trade-secret status. In registering the copyrights for its software, the plaintiff apparently filed the entire source code, largely unredacted, with the Copyright Office (the court's opinion is not entirely clear as to exactly what was filed). The defendant contended that this action had destroyed the secrecy of the software. The court rejected that argument, on grounds that “there is no evidence that the products or their contents were known to persons inside or outside of the industry or among the general public during any of the times at issue. There is no evidence that anyone outside of the Compuware corporate structure, its customers, or the Copyright Office viewed the material prior to the commencement of this litigation.” Id. at 818.
Tedder Boat Ramp Systems, Inc. v. Hillsborough County, 54 F. Supp.2d 1300 (M.D. Fla. 1999): The plaintiff was in the business of designing boat ramps. It registered a copyright in one such design; it also submitted the design to a county agency for consideration for possible use in two public-park boat ramps. The court granted judgment on the pleadings that by registering the copyright (and by submitting the plan to the county agency), the plaintiff had negated secrecy: “It is difficult to reconcile the conflict between the Copyright Office making the copyrighted material available to the public, versus the holder's right to keep his works secret. … [S]ince it is always possible, even if not certain, that copyrighted materials are available to the public, the element of secrecy is not established.” Id. at 1303.
Warrington Associates, Inc., v. Real-Time Engineering Systems, Inc., 522 F. Supp. 367 (N.D. Ill. 1981): The district court denied the accused infringer's motion for summary judgment that the copyright owner had forfeited its trade-secret rights through registration. The court observed that “the fact that [the copyright owner] registered its User's Manual for a copyright [sic] might well affect the continued secrecy of the ideas in that manual for which Warrington seeks trade secret protection. However, on the basis of the record before the court, no final determination on this issue can be made at this time.” Id. at
Optional Selective-Deposit Procedures for Secret Source Code
If source code is being deposited, it may be possible to obtain a registration without depositing the entire source code. The Copyright Office has promulgated special procedures for depositing computer software to allow software developers to avoid revealing their trade secrets.
If a software package is distributed only in machine-readable form (e.g., on a floppy disk), the Copyright Office will permit a single hard copy, e.g., a printed listing, of “identifying portions” of the software to be deposited instead of the entire package. See Deposit of Copies and Phonorecords for Copyright Registration, 37 C.F.R. § 202.20(c)(2)(vii), reproduced in Appendix A. If a program is very short, however, it may not be possible under these special provisions to deposit anything less than a complete source-code listing.
In the 1997 Fonar case, the practice of filing only identifying portions of source code was implicitly approved by the Second Circuit. Fonar Corp. v. Magnetic Resonance Plus Inc., 105 F.3d 99 (2d Cir. 1997), reversing and remanding 920 F. Supp. 508 (S.D.N.Y. 1996). The copyright owner had filed only the first 29 pages and the last 34 pages of the 2,000-page source code of its program, which comprised a large number of code modules. The district court granted summary judgment for the defendants, holding that
plaintiff's mass filing of the source code as a single collection without sufficient identifying materials failed to identify the works that are the subject of the copyright. Because plaintiff's copyright registration fails to identify the material covered by the copyright, sufficient doubt has been cast on the validity of the copyright registration, and thus “validity will not be assumed.”
920 F. Supp. at 516 (citation omitted). The Second Circuit reversed and remanded for trial, holding that:
Whether Fonar had to submit source code for each of the many subprograms (and possibly sub‑subprograms) is a question we are content to leave to the judgment, expertise, and practices of the Copyright Office. … The alternative—requiring Fonar to submit 50 pages of code (and an additional filing fee) for each of the programs that compose the maintenance software—would impose burdens on Fonar and on the resources of the Copyright Office that the Copyright Office may deem unnecessary or excessive.
Id., 105 F.3d at 105.
A work of authorship must be distributed in machine-readable format only to qualify for such a partial deposit. A printed manual or a program published in a magazine does not qualify; two copies of the entire work must be deposited if the work is to be registered. See 37 C.F.R. § 202.20(c)(2)(vii); Compendium II at § 324 (“NOTE”).
The Doubtful Wisdom of Depositing Object Code Only
If a software package is distributed only in object-code form, it may be desirable — but it may also affect subsequent infringement litigation — to deposit “identifying portions” of the object code instead of source code. The basic advantage of an object-code deposit is the reduced risk of disclosing trade secrets, as discussed in § 2.4[b][1]. The Copyright Office, however, encourages deposits of source code. Compendium II, supra note at § 324.03. If object code is deposited, the Copyright Office will usually require that the registration application include a separate letter stating that the program is an original work of authorship. Id. at § 324.04. The Office has taken the position that its personnel will not attempt to determine whether object code, which is normally unreadable for all practical purposes, is a protectable work. See id. The Office therefore accepts object code deposits only under the rule of doubt. See 37 C.F.R. § 202.20(c)(2)(vii)(B).
Selected cases:
Apple Computer, Inc., v. Franklin Computer Corp., 714 F.2d 1240, 1255 & n.9 (3rd Cir. 1983): The Third Circuit refused to decide whether registration under the rule of doubt affects the validity of a copyright.
Compaq Computer Corp. v. Procom Technology, Inc., 908 F.Supp. 1409, 1417-18 (S.D. Tex. 1995): The court held that Compaq's rule-of-doubt registration, of its copyright in a compilation of a specific set of hard-disk operational parameter values, placed the burden of proof of validity on Compaq.
9.7.3 Registering Claims to Software Screen Displays
Claims to copyright in computer screen displays may be a significant competitive tool against look-and-feel “cloners.” As a preliminary matter, it should be noted that not all screen displays will be copyrightable or (even if copyrightable) registerable. The Copyright Office has taken the position that “in general, menu screens and similar functional interfaces consisting of words or brief phrases in a particular format are not registerable.” Letter from Phill
- Gill, head of Literary Section II, Examining Division, Copyright
Office, to Allen H. Harrison, Jr. (Aug. 25, 1989), quoted in 38 Pat. Trademark & Copr. J. (BNA) 501‑02 (Sept. 14, 1989).
In Atari Games Corp. v. Oman, 979 F.2d 242 (1992), however, the D.C. Circuit reversed a summary judgment approving the Copyright Office's refusal to register the well-known video game breakout and remanded it with instructions to remand to the Register of Copyrights for further proceedings. The appellate court noted that even assuming that the game's basic visual elements of a brick wall and a square ball were uncopyrightable—a matter on which the court displayed some skepticism—the imaginative arrangement of those elements, especially in a sequence of audiovisual images, could easily rise above the low threshhold level of creativity required for copyright protection. Id., 979 F.2d at 243, 245-47, citing Feist Publications, Inc., v. Rural Tel. Serv. Co., 499 U.S. 340, 345, 111 S.Ct. 1282, 1287 (1991).
No Separate Screen-Display Registration
Software screen displays ordinarily will not be registered apart from the computer program that generates them. In June, 1988, the Copyright Office published a policy decision to that effect. See Notice of Registration Decision, 53 Fed. Reg. 12817 (Jun. 10, 1988), reprinted in 36 Pat, Trademark, & Copr. J. (BNA) 152 (Jun. 9, 1988). “The Office determined that all copyrightable expression owned by the same claimant and embodied in a computer program, or first published as a unit with a computer program, including computer screen displays, is considered a single work and should be registered on a single application form.” See 54 Fed. Reg. 13173, 13175 (Mar. 22, 1989), reprinted in 37 Pat, Trademark, & Copr. J. (BNA) 609, 611 (Apr. 6,
- (emphasis supplied).
Interestingly, a district court had previously ruled in the Softklone case that a separate registration was necessary to claim the copyright in screen displays, because the same screen display can be created by a variety of different computer programs. Digital Communications Assoc., Inc., v. Softklone Distributing Corp., 659 F. Supp. 449, 455‑58 (N.D. Ga. 1987).
In response to the Copyright Office's decision to issue only one registration notwithstanding Softklone, another court chose to treat such a single registration as performing the function of two registrations, one for the computer program, one for the screen displays. Manufacturers Technology, Inc., v. CAMS, Inc., 706 F. Supp. 984, 993 (D. Conn. 1989). The latter court stated that “[t]his approach creates the legal fiction of two separate registrations. It recognizes that a computer program and its screen displays are, for copyright purposes, fundamentally different.” Id.
Subsequently, in Lotus v. Borland, the district court rejected the defendants' assertion that the plaintiff's copyright registration for its 1‑2‑3 program covered only the literal program code and not the screen displays. See Lotus Development Corp. v. Borland Int'l, Inc., 740 F. Supp. at 79‑82, rev'd on other grounds, 49 F.3d 807, 34 USPQ2d 1014 (1st Cir. 1995), aff'd without opinion by an equally divided Court, 516 U.S. 233, 116 S. Ct. 804, 133 L.Ed.2d 610 (1996).
In the Harbor Software case, the court held that a copyright registration of the code extends to the screen displays, and that the screen displays in question were sufficiently original to be protectable. See Harbor Software, Inc. v. Applied Systems, Inc., 925
- Supp. 1042, 1046, subsequent proceeding, 936 F. Supp. 167 (S.D.N.Y.
- (granting in part and denying in part defendant's motion for
summary judgment).
If the copyright in a screen display is owned separately from that in a computer program which can generate the display (e.g., if the display was created first by one author and the program was written later by another as a means of implementing the display), then a separate registration should be available. This situation could arise where a sophisticated end-user creates a dummy prototype of a desired program, then hires an outsider to actually write the program.
Why Register Screen Displays?
Registration of copyright claims in screen displays can be useful. In Digital Communications Associates, 659 F. Supp. 449 (N.D. Ga. 1987), a federal district court in Atlanta enjoined the sale of a communications program which used similar menu screens and command structure of Crosstalk, a popular communications package. The court ruled that the selection and arrangement of command terms and status information on a computer screen was a protectable compilation. Id. at 457‑62.
The Whelan court held that similarity in screen displays can constitute evidence supporting a finding of “substantial similarity” between the underlying programs, although the defendant is free to show that the similarity is not probative for some reason). See Whelan Associates, Inc., v. Jaslow Dental Laboratories, 797 F.2d 1222, 1243‑44 (3d Cir. 1986).
In an interesting screen-display ruling, the Fourth Circuit held that an audiovisual work generated by a computer program can be said to be “fixed” in the program code itself. M. Kramer Mfg. Co. v. Andrews, 783 F.2d 421, 441 (4th Cir. 1986). A registered copyright in the audiovisual display might thus “protect the computer program which implements the audiovisuals” because the program is a “copy” of the audiovisual displays. Id.
In a later case, another court ruled that the converse is not true. The Digital Communications Associates court noted that a given screen display could be generated by a wide variety of computer programs; it held that, consequently, a screen cannot be a “copy” of many different programs, and a computer program's copyright protection thus does not extend to the program's screen displays. Digital Communications Associates, 659 F. Supp. at 455‑56. This holding should be compared, however, with more recent cases (e.g., Manufacturers Technology and Lotus, discussed above) in which similarity of screen displays helped copyright plaintiffs prevail.
Deposit Materials for Registration of Screen Displays
If the screen displays of a computer program are being claimed in a copyright registration application for the program, the application form must include a statement to that effect. This statement is usually written in Block 2 of the application form, where the description of the nature of authorship can be along the lines of “Computer program statements and associated screen displays.”
In such a case, the deposit materials must include (in addition to the identifying portions required for the hard-copy visual reproductions of the copyrightable expression in the screen displays, in the form of “printouts, photographs, or drawings no smaller than 3x3 inches and no larger than 9x12 inches.” See Deposit of Copies and Phonorecords for Copyright Registration, 37 C.F.R. § 202.20(c)(2)(vii)(C)(1).
If the authorship in the screen displays is predominantly audiovisual (e.g., a computer game), the deposit material should be “a one-half inch VHS format videotape reproducing the copyrightable expression.” However, if the computer screen material “simply consists of a demonstration of the functioning of the computer program,” then hard-copy visual reproductions, as discussed above, must be submitted instead. Id. § 202.20(c)(2)(vii)(C)(2).
9.7.4 Advantages of Registering Documentation
Software licensors often register the copyright in the software's documentation as well as the copyright in the software itself. A claim of infringement concerning documentation can be of significant value in litigation against copiers if other aspects of the software turn out to be unprotectable. See, e.g., Engineering Dynamics, Inc., v. Structural Software, Inc., 785 F. Supp. 576, 582 (E.D. La. 1991), vacated and remanded on other grounds, 26 F.3d 1335 (5th Cir. 1994); Synercom Technology, Inc., v. University Computing Co., 462 F. Supp. 1003, 1014 (N.D. Tex. 1978).
If the documentation to be registered is distributed in hard-copy form, either one or two complete copies of the “best edition” must be deposited with the registration application. See Deposit of Copies and Phonorecords for Copyright Registration, 37 C.F.R. § 202.20(c).
If the documentation itself includes trade-secret information, however, it may be possible, by filing a petition for special relief, to deposit less than a complete copy. See generally id. § 202.20(d). This may help preserve the confidentiality of the trade-secret portions of the documentation.
9.7.5 Some Noteworthy Registration Details
The Copyright Office's Compendium II gives additional pointers on the mechanics of registering a software copyright:
· “When identifying material is deposited, it should bear a title clearly identifying the work for which registration is sought.” Compendium II at § 324.01.
· “The identifying material should include the page or equivalent unit containing the copyright notice if copies of the computer program were published with the notice.” Id.
· “If the copyright notice is encoded within the object code so that its presence and content are not readily discernible, the notice should be underlined or highlighted and its contents decoded.” Id.
9.7.6 Challenges to the Validity of a Copyright Registration
In several reported cases, an infringement defendant has alleged that the plaintiff's failure to advise the Copyright Office about supposedly material facts should make the copyright unenforceable. Most courts, but not all, have given such assertions short shrift, focusing chiefly on the defendant's failure to prove 1) intentional deception on the part of the plaintiff, 2) that the Copyright Office would have rejected the registration application as invalid but for the omission, and/or 3) that the defendant suffered any injury as a result of the alleged misconduct. As one court summarized the law:
While the original registration incorrectly labeled the 1998 Image as a “work made for hire,” such misstatements generally will not affect the validity of a copyright or bar an action for its infringement. Inaccuracies in a certificate are of significance only in situations involving allegations of an intent to defraud or prejudice, which is not the case here. Otherwise, a certificate of registration will raise the presumption of valid copyright ownership.
Tiffany Design, Inc. v. Reno‑Tahoe Specialty, Inc., 55 F. Supp.2d 1113, 1117-18 (D. Nev. 1999) (granting in part copyright owner's motion for partial summary judgment).
Selected cases:
Ashton-Tate Corp. v. Fox Software, Inc., 760 F. Supp. 831 (C.D. Cal. 1990), rescinded, 1991 U.S. Dist. LEXIS 6577 (C.D. Cal. 1991): The district court issued a two-page summary judgment order declaring Ashton-Tate's copyrights in its well-known dBase II and III software to be unenforceable for inequitable conduct. The court stated that Ashton-Tate failed to disclose in its copyright registration applications, with intent to deceive, that dBase III was based on dBase II, which in turn was based on jpldis, a public domain computer program developed by the Jet Propulsion Laboratory. The Fox decision caused great surprise in the industry and among practitioners because of its unusual and unexplained borrowing of inequitable-conduct concepts from patent law. The case settled in conjunction with the acquisition of Ashton-Tate by Borland International, and so no appellate review of the decision ever occurred.
qad Inc. v. ALN Associates, Inc., 770 F. Supp. 1261 (N.D. Ill. 1991), affirmed, 974 F.2d 834 (7th Cir. 1992): The court dissolved a preliminary injunction because the copyright plaintiff had represented to the court that the copyrighted software was wholly original. It had failed, however, to advise the court of the derivative nature of the software, and the similarities between the copyrighted software and the defendant's software could be attributable to common ancestry and not to infringement. The court expressly declined to address whether fraud in the Copyright Office had occurred.
Apple Computer, Inc., v. Microsoft Corp., 759 F. Supp. 1444, 1454-55 (N.D. Cal. 1991) (rejecting allegation of fraud on Copyright Office), subsequent proceedings, e.g., 799 F. Supp. 1006 (N.D. Cal. 1992) (granting in part, denying in part motion for summary judgment of noninfringement), final judgment aff'd, 35 F.3d 1435 (9th Cir. 1994) (affirming summary judgment of noninfringement): The district court rejected Microsoft's defense that Apple's copyright in its Macintosh operating system software was unenforceable for fraud on the Copyright Office. The court characterized the design influence of prior Xerox software on the Macintosh software as having been a “borrowing of ideas,” and described the Ashton-Tate v. Fox decision as “unhelpful.”
S.O.S., Inc., v. Payday, Inc., 886 F.2d 1081 (9th Cir. 1989) (affirming summary judgment against accused infringer): The Ninth Circuit rejected as unsupported an accused infringer's contention that the copyright plaintiff had intentionally omitted its program's derivative-work nature from its copyright registration application; the court noted as well that the infringer had not claimed any injury resulting from the omission. See id. at 1086 & n.5; see also, e.g., Datastorm Technologies, Inc. v. Excalibur Communications, Inc., 888 F. Supp. 112 (N.D. Cal. 1995) (denying accused infringer's motion to dismiss for fraud on the Copyright Office).
Service & Training, Inc., v. Data General Corp., 963 F.2d 680, 688-89 (4th Cir. 1992), affirming 737 F. Supp. 334 (D. Md. 1990): The Fourth Circuit rejected still another copyright invalidity challenge of this kind. According to the appellate court, even if the software had been derivative, the defendant did not show that the plaintiff's failure to advise the Copyright Office of that fact was intentional.
Gates Rubber Co. v. Bando American, Inc., 798 F. Supp. 1499, 1507 (D. Colo. 1992), reversed on other grounds and remanded, 9 F.3d 823 (10th Cir. 1993): The district court rejected a fraud on the Copyright Office defense on grounds that any “duty of candor” to the Copyright Office “is far too undeveloped and speculative and would likely not be appropriate in light of the facts of this case.”
Autoskill, Inc., v. National Educational Support Systems, Inc., 793 F. Supp. 1557, 1562-63 (D.N.M. 1992), aff'd, 994 F.2d 1476 (10th Cir. 1993): The copyright owner stated in its copyright-registration application that its software was a work made for hire. Under the Supreme Court's subsequent CCNV v. Reid decision, however (see § 2.6[b][1]), the software was not a work made for hire. The district court held that the work-for-hire statement in the registration application would not be used to invalidate the plaintiff's copyright retroactively in the absence of a showing that the copyright owner had knowingly misled the Copyright Office.
Engineering Dynamics, Inc., v. Structural Software, Inc., 785 F. Supp. 576, 582 (E.D. La. 1991), vacated and remanded on other grounds, 26 F.3d 1335 (5th Cir. 1994): The copyright owner had previously been the defendant in the factually very similar Synercom litigation. See Synercom Technology, Inc. v. University Computing Co., 462 F. Supp. 1003 (N.D. Tex. 1978). In that earlier litigation, the Engineering Dynamics copyright owner had argued that data-input formats were uncopyrightable, and had won the case on that ground. But then when it registered its own copyright claims, it failed to disclose its prior position, and the result of the prior litigation, to the Copyright Office. The Engineering Dynamics court held that this omission did not amount to deliberate misrepresentations, but instead were innocent misstatements. See 785 F. Supp. at 582.
9.7.7 One Registration or Several?
A single registration for an entire large software system may be advantageous. One registration gives the owner the right to sue for infringement of any part of the system.
For example, in the famous Computer Associates v. Altai case, the district court held that the copyright registration, for the plaintiff's CA-SCHEDULER systems program, covered the copyright in the ADAPTOR program as component part of CA-SCHEDULER. See Computer Associates International, Inc. v. Altai, Inc., No. CV-89-0811, slip op., reprinted in Comp. Industry Lit. Rptr. 10360 (E.D.N.Y. 1989) (denying defendant's motion to dismiss); subsequent proceedings, 775
- Supp. 544 (E.D.N.Y. 1991) (holding that protectable elements of
plaintiff's program were not copied in rewritten version of defendant's software), affirmed, 982 F.2d 693 (2d Cir. 1992).
A single registration may be /dis/advantageous if the system was created as a group of identifiable subsystems (which is very often the case). Cf. Registration of copyright, 37 C.F.R. § 202.3 (defining eligibility for registration as a “single work” with a single application and payment of a single fee).
On the other hand, multiple registrations can make it easier to protect independently-valuable portions of a complex software package. The copyright owner might market various subsystems or modules independently as well as the entire system as a whole — or the subsystems or modules might be independently worth “stealing.” A single registration would require the copyright owner to drag the entire software system into an infringement suit, when the infringement might be only of a particular subsystem or module.
Multiple registrations may also increase a plaintiff's chances of recovering at least some money, in attorneys' fees if not in statutory damages. If the statutory conditions are met, a successful plaintiff can be awarded statutory damages (see § 2.10[b]) for “all infringements involved in the action, with respect to any one work . . . .” 17 U.S.C. § 504(c) (emphasis supplied). In determining whether a single registration covers one work or several works for purposes of computing statutory damages, the courts may look at whether the putatively-separate works would have independent economic value, but they might also consider whether the copyright owner registered the works as independent works or as a single compilation. See generally CoStar Group Inc. v. LoopNet, Inc., 164 F. Supp. 2d 688 (D. Md. 2001) (reviewing cases; granting defendant's motion for partial summary judgment that, if successful in proving liability, plaintiff would be entitled to statutory damages for a maximum of 13 compilations of real-estate photographs and not for the 348 individual photographs comprising the compilations).
Section 504© includes a qualifier: “For purposes of this subsection, all the parts of a compilation or derivative work constitute one work.” 17 U.S.C. § 504(c)(1) (emphasis supplied). In Data General v. Grumman Systems Support, the court held that because of that qualifier, the plaintiff could not recover statutory damages in respect of infringement of a later version of the software in question, even though the plaintiff registered the later version prior to commencement of that infringement, where the plaintiff had not registered the original version prior to commencement of infringement of that version. On the other hand, the court held that because no such qualifier was contained in the Copyright Act's attorneys-fees provision, the plaintiff would indeed entitled to recover attorneys' fees if it proved that the defendant infringed the copyright in the later version of the software. Data General Corp. v. Grumman Systems Support Corp., 795 F. Supp. 501, 503-05 (D. Mass. 1992); subsequent proceeding, 825 F. Supp. 340 (D. Mass. 1993) (upholding jury verdict of $27.4 million), affirmed in pertinent part, remanded on other grounds, 36 F.3d 1147 (1st Cir. 1994).
9.7.8 Which Version to Register After the Infringement Starts?
Frequently, copyright registrations are not sought until an infringement is detected; the version registered, however, may be a later version than the version allegedly infringed. On the other hand, it may be the later version that is alleged to have been infringed, but only the earlier version is registered.
Early Version Infringed, Later Version Registered
The Streetwise Maps case is an illustration of the first situation. The Second Circuit held that a copyright registration for a later-version street map, which was a derivative work of an earlier version, would support a claim for infringement of the earlier version. Streetwise Maps Inc. v. Van Dam, Inc., 159 F.3d 739 (2d Cir. 1998).
The district court had dismissed the copyright infringement suit because the allegedly infringed earlier version had not been registered. Id. at 746. The appellate court reversed, saying that “because Streetwise is the owner of the copyright of both the derivative and pre-existing work, the registration certificate relating to the derivative work in this circumstance will suffice to permit it to maintain an action for infringement based on defendants' infringement of the pre-existing work.” Id. at 747 (citations omitted).
(Unfortunately for the Streetwise Maps plaintiff, the Second Circuit compared the plaintiff's map with the defendant's map and concluded that “because the total concept and overall feel created by the two works may not be said to be substantially similar, the district court's dismissal of Streetwise's copyright infringement claim must be affirmed.” Id. at 747-48.)
Similarly, in Bishop v. Wick, the district court rejected the defendant's contention that the plaintiff's copyright registration was supposedly invalid for that reason:
The Program registered with the Copyright Office was substantially identical to the Program taken from the plaintiffs in 1987, in terms of function, operation, and purpose. Further, the relatively minor modifications and corrections incorporated in plaintiffs' registered Program “could not have affected the action of the Copyright Office [and] will not invalidate the copyright nor deprive the registrant of the right to bring an infringement action.” Finally, defendants have, in essence, admitted copyright infringement and thus come before the Court with unclean hands; they therefore may not contest the effectiveness of plaintiffs' copyright registration procedures.
Bishop v. Wick, 11 USPQ2d (BNA) 1360, 1362 (N.D. Ill. 1988) (citations omitted).
Later Version Infringed, Early Version Registered
The second situation, in which the version infringed is later than the version registered, is the subject of a seeming split among the circuits.
In the 1999 Montgomery case, discussed in § 2.1[b], the plaintiff filed suit based on a registered early version, but it was a later version that was allegedly infringed. Montgomery v. Noga, 168 F.3d 1282, 1292 (11th Cir. 1999) (affirming denial of JMOL and judgment of infringement). The Eleventh Circuit noted that the evidence at trial showed that the later version incorporated over seventy percent of the original source code from the registered earlier version. After reviewing statutory provisions and legislative history, the court concluded that, by making unauthorized copies of the later version, the defendants infringed the copyright in the earlier version, which had indeed been registered prior to the commencement of the lawsuit. Id., at 1292-93 & n.17, citing inter alia Central Point Software, Inc. v. Nugent, 903 F. Supp. 1057, 1060 & n.5 (E.D. Tex. 1995) (granting summary judgment on plaintiffs' copyright infringement claim).
In another, non-software case with colorful facts, the Sixth Circuit took the opposite view. In Murray Hill Productions, Inc. v. ABC Communications, Inc., 264 F.3d 622 (6th Cir. 2001), the copyrighted work in question was a brief jingle composed by a friend of a radio morning-show host and used by the host for over five years, with the composer's permission, as his theme song. After the host's sudden death, his radio station compiled and marketed a “best of” CD that included the jingle, with the proceeds going to charity. The composer's company sued the radio station's parent company for infringement, among other claims. The district court granted summary judgment in favor of the defendant and awarded attorneys' fees. The Sixth Circuit, while reversing the fee award, affirmed the dismissal; it held that “before an infringement suit can be sustained based on the derivative work, that derivative work must be registered. . . . Because a derivative work is cumulative of the earlier work, it is logical that the registration of the derivative work would relate back to include the original work, while registration of the original material would not carry forward to new, derivative material.” Id. at 630-31.
9.7.9 Special Considerations for Database Registrations
The Copyright Office has promulgated special deposit regulations for electronic databases (reproduced in Appendix A) which provide for the deposit of “identifying portions” in lieu of the entire database. Deposit of copies and phonorecords for copyright registration, 37 C.F.R. § 202.20(c)(2)(vii)(B) When a revised version is registered, the deposited portions must contain representative data records that have been added or modified, which must be marked to show the new material added on one representative date. The Copyright Office will permit quarterly “group” registrations of database updates if, among other things, the copyrights in the updates or revisions are commonly owned and any required copyright legends in the updates or revisions as a whole show the same person or entity as the owner. Registration of copyright, 37 C.F.R. § 202.3(b)(4).
9.8 Mandatory Deposit of Copies for the Library of Congress Collection
The copyright statute apparently requires software publishers to deposit copies of at least their published documentation, and in some cases copies of their software itself, with the Library of Congress for the purpose of building the Library's collection. Section 407 of the statute requires that “the owner of copyright or of the exclusive right of publication in a work published in the United States shall deposit, within three months after the date of such publication, — (1) two complete copies of the best edition . . . .” 17 U.S.C. § 407(a) (emphasis supplied); see also Appendix B to [37 C.F.R.] Part 202—”Best Edition” of Published Copyrighted Works for the Collection of the Library of Congress, part VIII (defining “best edition” for machine-readable copies). While compliance is not a condition of copyright protection, 17 U.S.C. § 407(a). anyone not complying with a written demand by the Register of Copyrights for such a deposit is subject to fines. 17 U.S.C. § 407(d).
The statute gives the Register authority to exempt categories of material from the mandatory deposit requirement. See 17 U.S.C. § 407(c). Pursuant to that section, the Register has exempted “computer programs and automated data bases published in the United States only in the form of machine-readable copies (such as magnetic tape or disk, punched cards, or the like) from which the work cannot ordinarily be visually perceived except with the aid of a machine or device.” See Deposit of Published Copies or Phonorecords for the Library of Congress, 37 C.F.R. § 202.19(c)(5). (Note that program documentation is not exempt even from the existing mandatory deposit requirement.) The exemption regulations also state that the Register may grant “special relief” and exempt published works not otherwise exempt. See 37 C.F.R. § 202.19(e).
9.9 Ownership of Copyrights
9.9.1 The Basic Rules
Ownership of copyright is governed by federal law, with a dollop of
the general common law of agency sometimes mixed in as discussed
below. Some of the principal features of that law can be summarized as
follows:@BEGIN
Under the 1976 Copyright Act, copyright in any original work of authorship initially vests in the “author” or authors of the work. See 17 U.S.C. § 201(a).
The bundle of rights comprising a copyright are severable in that (i) an undivided interest in the copyright may be assigned; furthermore, (ii) any of the exclusive rights themselves (or an undivided interest in any of them) can be assigned and owned separately from the other rights. See 17 U.S.C. § 201(d); see also the sample copyright assignment form at the end of this chapter.
The “author” of some works, and thus the initial owner, may be the employer or hiring party of the actual human creator(s). See infra § 2.6[b] (ownership of works created within the scope of employment), § 2.6[e] (ownership of specially commissioned works).
A joint work is co-owned by its authors; each joint author or other co-owner has the right to do as he wishes with the work, subject to a duty to account to other co-owners. Id. § 201(a); see also infra § 2.6[h].
(This paper assumes that all works were created on or after January 1, 1978, at which time the 1976 Copyright Act took effect. The Copyright Act does not expressly state in so many words that computer programs are considered to be works of authorship, nor that they are subject to copyright protection. The legislative history of and subsequent amendments to the Act, however, including specific computer program-related provisions, indicate clearly that Congress believed that software should be eligible for at least some protection under copyright; moreover, the courts have uniformly held that software is protectable by copyright at least to some extent.)
9.9.2 Copyright Ownership Claims by Employers
The Copyright Act provides that when an original work of authorship is “/[1]/ prepared by an employee [2] within the scope of his or her employment,” the employer is deemed to be the author, and thus is the initial owner of the copyright unless the parties have agreed otherwise in writing. See 17 U.S.C. § 101 (definition of “work made for hire”) (bracketed numbering supplied), § 201(b) (employer is considered author of works created within the scope of employment and owns all rights comprised in the copyright unless the parties have expressly agreed otherwise in written instrument signed by them).
Scope of employment questions can sometimes arise in connection with the title to software. Sometimes the issue is whether software written by a /non/employee was nevertheless created “within the scope of employment” for copyright purposes, thus making the hiring party the initial owner of the copyright. A software author, nominally an independent contractor, may appear very much like an employee, or vice versa.
On the other side of the coin, software is frequently written by moonlighters or by individuals who are nominally employees but whose ties to their employers are special in some way (e.g., university faculty). Sometimes the software will relate in some manner to the employer's business.
In these situations, will the individual programmer be regarded as an employee acting within the scope of his employment, in which case the employer owns the copyright? Or will the individual be deemed a nonemployee, an independent contractor, in which case he owns the copyright (unless the “specially commissioned work” statutory requirements are satisfied)?
The Supreme Court's Reid Decision:
Focusing on the Right to Control the Means and Manner of the Work
:CUSTOMID: the-supreme-courts-reid-decision-focusing-on-the-right-to-control-the-means-and-manner-of-the-work
In its unanimous 1989 Reid decision, the Supreme Court announced a relatively strict but possibly unpredictable test of ownership when copyrightable works are created by putative “employees.” Community for Creative Non-Violence v. Reid, 490 U.S. 730, 109 S. Ct. 2166 (1989), affirming 846 F.2d 1485 (D.C. Cir. 1988).
Reid involved a sculpture created by an independent-contractor sculptor; a dispute arose between the sculptor and the hiring party about ownership of the copyright, with the hiring party claiming that it was entitled to an employer's title. The Court ruled that the copyright belonged to the sculptor and not the hiring party. After reviewing the legislative history, Justice Marshall concluded that the 1976 Copyright Act's provisions governing works made for hire were the result of “an historic compromise” among competing economic interests, id., 490 U.S. at 745, 109 S. Ct. at 2175, and that “[s]trict adherence to the language and structure of the Act is particularly appropriate where, as here, a statute is a result of a series of carefully crafted compromises.” Id., 490 U.S. at 748 n.14, 109 S. Ct. at 2177 n.14.
The Court held that, if the statutory requirements for a specially commissioned work by an outside author are not met (as they had not been met in Reid), then the initial ownership of a copyright is determined solely by whether the individual author was an employee acting within the scope of his employment. Id., 490 U.S. at 742, 109 S. Ct. at 2174. In turn, the Court said, the outcome of the scope-of-employment question was intended by Congress to depend on the hiring party's right to control the manner and means by which the work is created, which the Court declared to be a matter governed by the general common law of agency (as opposed to the agency law of any particular state). Id., 490 U.S. at 740, 109 S. Ct. at 2173.
Justice Marshall's Reid opinion laid down a number of traditional factors to be considered in determining an “employer's” right to means-and-manner control:
In determining whether a hired party is an employee under the general common law of agency, we consider the hiring party's right to control the manner and means by which the product is accomplished. Among the other factors relevant to this inquiry are
the skill required;
the source of the instrumentalities and tools;
the location of the work;
the duration of the relationship between the parties;
whether the hiring party has the right to assign additional projects to the hired party;
the extent of the hired party's discretion over when and how long to work;
the method of payment;
the hired party's role in hiring and paying assistants;
whether the work is part of the regular business of the hiring party;
whether the hiring party is in business;
the provision of employee benefits; and
the tax treatment of the hired party.
See Restatement [of Agency] § 220(2) (setting forth a nonexhaustive list of factors relevant to determining whether a hired party is an employee). No one of these factors is determinative.
Id., 490 U.S. at 751-52, 109 S. Ct. at 2178‑29 (extensive footnotes omitted; numbering and paragraphing added).
The Second Circuit's Aymes v. Bonelli: The Crucial Role
of Benefits and Tax Payments in Determining “Employee” Status
:CUSTOMID: the-second-circuits-aymes-v.-bonelli-the-crucial-role-of-benefits-and-tax-payments-in-determining-employee-status
To some observers, Reid seemed to dash any hope that bright-line predictability might help define when an employer would own the copyright in employee-created works. In what seems likely to become a seminal case providing at least some of the bright lines Reid did not, the Second Circuit in Aymes v. Bonelli considered whether a computer program created for a company by an putative independent-contractor programmer was a work made for hire, and thus whether the company could be sued for infringement by the programmer for having expanded its use of the program. Aymes v. Bonelli, 980 F.2d 857 (2d Cir. 1992). Some of the most significant holdings in the opinion were:
- that the Reid factors should be weighed according to their relative importance, not simply tallied;
- the right to control the manner in which the work is conducted is not necessarily dispositive,
- computer programming of the kind engaged in by the contractor is a highly skilled craft, and
- perhaps most importantly, the company's failure to provide benefits to and and pay Social Security taxes for the contractor was all but fatal to its work-for-hire infringement defense.
As a preliminary matter, the Second Circuit criticized the trial court for giving equal weight to the twelve factors of the Reid test; the appellate court held that those factors “should not merely be tallied but should be weighed according to their significance in the case.” Aymes, 980 F.2d at 861 (extensive citations omitted). The court also remarked that it seemed clear from the record that the company had the right to control the manner in which the program in question was created, and that this factor “weighs heavily in favor of finding that Aymes was an employee.”
The court disagreed with the district court about the significance of the computer programmer's comparative youth and inexperience. The district court had held that this factor weighed in favor of an employment relationship. In contrast, the Second Circuit concluded that “Aymes's work required far more than merely transcribing Bonelli's instructions. . . . In this case, Aymes was clearly a skilled craftsman. Consequently, this factor weighs heavily in his favor.” Aymes, 908 F.2d at 861-62 (citations omitted).
It appears that in the Second Circuit's view, perhaps the most important factor weighing against the company's work-for-hire defense was that the company never paid payroll and Social Security taxes. The court asserted that the company “should not in [the tax] context be able to claim that [the programmer] was an independent contractor and ten years later deny him that status to avoid a copyright infringement suit.” Id. at 862. Indeed, the court pointed out, “every case since Reid that has applied the test has found the hired party to be an independent contractor where the hiring party failed to extend benefits or pay social security taxes.” Id. at 863 (extensive citations omitted).
The Second Circuit concluded that “on balance, application of the Reid test requires that we find Aymes to be an independent contractor when he was creating CSALIB for Island. Consequently, we hold that CSALIB is not a work for hire. Aymes therefore owns the copyright as author of the program.” Aymes, 980 F.2d at 864.
Some Other Software Work‑for‑Hire Decisions
Kirk v. Harter, 188 F.3d 1005, 1008 (8th Cir. 1999): The court reversed a judgment on jury verdict, holding that a copyright-infringement defendant who had developed a computer program for the plaintiff was in fact the owner of copyrighted program because he was an independent contractor. The plaintiff had paid the defendant as an outside contractor and had not withheld taxes or provided benefits for defendant.
Sasnett v. Convergent Media Systems, Inc., No. C.A. 95-12262-NG, 1997 WL 33142149 (D. Mass. Aug. 29, 1997): The court, while noting that the hiring party had not withhold taxes or pay benefits to the contract programmer, nevertheless concluded that the hiring party was likely to succeed in proving that the software in question had been developed as a work made for hire; the court granted a preliminary injunction in favor of the hiring party against the programmer's subsequent assignee.
Innovative Networks, Inc. v. Satellite Airlines Ticketing Centers, Inc., 871 F. Supp. 709 (S.D.N.Y. 1995): The court granted partial summary judgment that a copyrighted floor plan was a work made for hire owned by the plaintiff, notwithstanding nonpayment of withholding taxes and benefits.
MacLean Assocs., Inc. v. Wm. M. Mercer-Meidinger-Hansen, Inc., 952 F.2d 769 (3d Cir. 1991): In this pre-Aymes case, the court reversed a directed verdict that a company that had hired a programmer was the owner of the resulting software. It held that a computer programmer could be found to be an independent contractor without taking into account all of the Reid factors.
9.9.3 Scope of Employment: The Problem of Copyright Ownership
in Works Created “Off Duty”
:CUSTOMID: scope-of-employment-the-problem-of-copyright-ownership-in-works-created-off-duty
@BEGIN
A key question is therefore: When is a work created “within the scope of [an employee's] employment”? The cases offer little bright-line guidance. If an employee used his or her own time and his own computer for at least part of the work, he or she may be the owner. The courts seem to focus as much on perceived equities as on anything else.
Selected cases:
Cole v. Control Data Corp., 947 F.2d 313 (8th Cir. 1991): The court affirmed judgment on a jury verdict awarding a former employee $2,215,000 in actual damages for a company's breach of contract to market software. The software had been developed by the employee on his own time with his own computer. The company had ordered the employee to destroy the only remaining copies of the program, located on company's premises. (The court vacated and remanded a punitive-damages award.)
Miller v. CP Chemicals, Inc. Miller v. CP Chemicals, Inc., 808 F. Supp. 1238, (D.S.C. 1992): The court granted an infringement defendant's motion for summary judgment of noninfringement and for a declaration that it owned the copyright in question as a work for hire. The plaintiff, a former employee of the defendant who was paid by the hour, was the supervisor responsible for the operation of the defendant company's quality control laboratory. The plaintiff had written one computer program for making mathematical computations needed for in‑process adjustments to one of company's commercial products, then wrote additional similar programs at behest of his supervisors, on his own time and without overtime pay. The court held that “development of the computer programs was at least incidental to his job responsibilities because it was ‘within the ultimate objective of the principal and an act which it is not unlikely that such a servant might do'” and that “the ultimate purpose of the development of the computer programs was to benefit CP by maximizing the efficiency of the operation of the quality control lab.” Id. at 1239-43.
Avtec Systems, Inc. v. Peiffer, 805 F. Supp. 1312 (E.D. Va. 1992), vacated and remanded, 21 F.3d 568 (4th Cir.), on remand 1994 U.S. Dist. LEXIS 16946 (E.D. Va. Sept. 12, 1994): The district court held that a computer program, created off-duty by the defendant former employee, had not been created within the scope of employment, was not a work made for hire, and thus was not owned by the plaintiff company. The computer program in question managed and presented satellite data. The former employee's job description “included ‘implement[ing] computer simulation' and specifically, simulating ‘satellite orbits.'” 21 F.3d at
- The Avtec court looked to the three-factor test of the
Restatement (Second) of Agency, which states that a servant's conduct is within the scope of employment:
only if (a) it is of the kind he is employed to perform; (b) it occurs substantially within the authorized time and space limits; [and] (c) it is actuated, at least in part, by a purpose to serve the master.
See Restatement of Agency (Second) § 228 (1985), quoted in Avtec, 21 F.3d at 571, and cited in CCNV. v. Reid, 490 U.S. at 739-40, 109 S. Ct. at 2172-73.
Marshall v. Miles Laboratories, Inc., Marshall v. Miles Laboratories, Inc., 647 F. Supp. 1326 (N.D. Ind. 1986): In this pre-Reid case, the court held that a journal article co-authored in his spare time by the plaintiff, a scientist employed by the defendant company, describing research conducted by the company, was a work made for hire owned by company. The court noted that the plaintiff's job responsibilities had included developing, summarizing, and reporting of technological information in the field in question; moreover, the plaintiff admitted having complied with the company's policy requiring prepublication clearance of all outside writing by employees, meaning that the defendant “had and did exercise the right to control and supervise the preparation” of the work.
9.9.4 The Uncertain Work-for-Hire Status of Works Created by University
Scholars
:CUSTOMID: the-uncertain-work-for-hire-status-of-works-created-by-university-scholars
@BEGIN
Faculty members apparently own the copyrights in their academic writings, even though they usually are required as part of their employment duties to “publish or perish.” According to the Seventh Circuit's Weinstein case, this was a well-established custom, a recognized exception to the work made for hire rule, which the 1976 Copyright Act did not repeal or alter. See Weinstein v. University of Illinois, 811 F.2d 1091, 1094 (7th Cir. 1987) (Easterbrook, J., affirming dismissal on other grounds); cf. Hays v. Sony Corp. of America, 847 F.2d 412, 416 (7th Cir. 1988) (Posner, J.; word processing manual written by teachers for use in school was not work made for hire); but see University of Colorado Foundation Inc. v. American Cyanamid, 880 F. Supp. 1387 (D. Colo. 1995) (granting summary judgment of copyright infringement; scholarly article by university faculty, copied into company's patent application, was work made for hire owned by university).
Works created in the course of carrying out assigned university duties, such as serving on a university administrative committee, might belong to the university, however. See Weinstein, 811 F.2d at 1094 (dictum). In Weinstein, Judge Easterbrook speculated that if a university “form[ed] a committee to study the appropriate use of small computers and conscripts professors as members,” and if “[t]he committee [publishes] a report,” then the university might claim a copyright in the report. Id.
The status of proprietary rights in software developed in the course of research by university professors is unclear. Several different scenarios can be imagined in which both copyrights and patent rights could be the subject of controversy. The situation would be made more confusing by ambiguities in the written intellectual property policies that have been adopted by many universities. Many such policies state that the universities own any patent rights that may arise from inventions by faculty members and graduate students. Typically, however, many of those policies also specify that individual faculty members will own copyrights in their works where such works do not arise from assigned university duties. See, e.g., Weinstein, 811 F.2d at 1094 (quoting portions of University of Illinois policy); but cf. Applied Innovations, Inc., v. Regents of the University of Minnesota, 876 F.2d 626, 630‑31 (8th Cir. 1989), affirming 685 F. Supp. 698, 703 (D. Minn. 1987) (university owned copyrights in various versions of Minnesota Multiphasic Personality Inventory, apparently by assignment from faculty-member authors).
9.9.5 Establishing Work-for-Hire Status in Specially Commissioned Works
Created by Outsiders
:CUSTOMID: establishing-work-for-hire-status-in-specially-commissioned-works-created-by-outsiders
@BEGIN
The Statutory Compromise for Outside ”Works for Hire”
Section 101 of the Copyright Act provides that the definition of “work made for hire” includes a work specially ordered or commissioned for use as any of the following, if the parties expressly agree in a written instrument signed by them that the work shall be considered a work made for hire:
a contribution to a collective work,
a part of a motion picture or other audiovisual work,
a translation,
a supplementary work,
a compilation,
an instructional text,
a test,
answer material for a test, or
an atlas.
These statutory categories represent a conscious compromise by Congress as to when the rights of non-employee authors can be permanently appropriated in advance by hiring parties. See Community for Creative Non-Violence v. Reid, 490 U.S. 730, 745-46, 109 S. Ct. 2166, 2175 (1989); see also infra § 2.6[g] (rights assigned to a hiring party, as opposed to rights owned ab initio by virtue of hiring party's “authorship,” can be reclaimed by author or heirs 35 years after assignment).
Section 101 of the statute further provides that a “supplementary work,” as used in the above laundry list, is a work prepared for publication as a secondary adjunct to a work by another author for the purpose of introducing, concluding, illustrating, explaining, revising, commenting upon, or assisting in the use of the other work, such as forewords, afterwords, pictorial illustrations, maps, charts, tables, editorial notes, musical arrangements, answer material for tests, bibliographies, appendixes, and indexes, and an “instructional text” is a literary, pictorial, or graphic work prepared for publication and with the purpose of use in systematic instructional activities. See 17 U.S.C. § 101 (definition of “work made for hire”).
The statute does not say when the written instrument must be executed. The Seventh Circuit expressly held that execution must take place in advance, but the Second Circuit held that execution could occur after the work is created if the parties intended a work-for-hire relationship before the work was created. Compare Schiller & Schmidt, Inc., v. Nordisco Corp., 969 F.2d 410, 412-13, 23 USPQ2d (BNA) 1762 (1992) (holding that a signed statement that hiring party owned copyrights in previously taken photographs was ineffective to confer work-made-for-hire status on photographs) with Playboy Enterprises, Inc. v. Dumas, 53 F.3d 549 (2d. Cir. 1995) (holding that author's endorsement of a series of checks, each having a legend stating that payment was for a work made for hire, could be sufficient to establish intent), vacating and remanding 831 F. Supp. 295 (S.D.N.Y. 1993), on remand, 960 F. Supp. 710 (S.D.N.Y. 1997) (holding that illustrations paid for by checks containing work-for-hire language were works made for hire if checks were endorsed by illustrator, but not if checks were endorsed by painter's agent).
Computer Software as Specially Ordered or Commissioned Works
Most computer programs normally do not fit within any of the nine statutory work-made-for-hire categories. Thus, they cannot qualify as works made for hire even if they're specially ordered or commissioned from an outside software developer. (Many software development contracts and similar documents inappropriately state that the software in question, being developed by an independent programmer or firm, is to be deemed a work made for hire. Except in the circumstances set out in the statute, however, merely saying so will not make it so, no matter what the parties recite in their agreement.) Some exceptions may exist, however:
- A section of computer code, commissioned to form part of a larger program might qualify as a contribution to a collective work. But see § 2.6[h], concerning whether such a larger program might be a joint work jointly owned by the authors.
- A routine commissioned for a computer program that involves pictorial images might constitute a part of an audiovisual work.
- Software documentation written by outside technical writers (e.g., on-line help screens or printed user manuals) may qualify as a supplementary work or instructional text.
- A “porting” of an existing program (roughly, a translation), to another language or for use on a different computer, might arguably qualify as a specially commissioned translation.
- Contributions to a data compilation, e.g., one used by a computer program, could qualify for copyright protection as a compilation under the statute. See 17 U.S.C. § 101 (definition of “compilation”), § 102 (extent of copyright in compilations). See also § 2.2 for a discussion of the scope of copyright protection in data bases; cf. Digital Communications Assocs., Inc., v. Softklone Distr. Corp., 659 F. Supp. 449, 457‑62 (N.D. Ga. 1987) (concluding that status screen of plaintiff's Crosstalk program was a protectable compilation of commands and status information).
9.9.6 Establishing Ownership by Assignment
An assignment is another way for a hiring party to acquire title; software development agreements often require the (outside-contractor) developer to assign all right, title, and interest in the software copyright to the hiring party.
Conveyancing Basics
A written instrument is required to assign a copyright. 17 U.S.C. § 204(a). If the instrument is properly acknowledged, it serves as prima facie evidence of the transfer. 17 U.S.C. § 204(b). If an assignment is to include the right to sue for past infringement, that fact should be expressly recited in the instrument. A sample copyright assignment is set out below in 0.
Selected cases:
Tiffany Design, Inc. v. Reno‑Tahoe Specialty, Inc., 55 F. Supp.2d 1113, 1117-18 (D. Nev. 1999): The court held that a signed letter which stated that a photographer “release[d] all copyrights attached to the Las Vegas poster to Grant Gresser of Tiffany Design” was sufficient to convey the copyright.
Effects Assocs., Inc. v. Cohen, 908 F.2d 555, 557 (9th Cir.1990), discussed in § 2.6[j]: Judge Kozinski's opinion noted in passing that “[i]f the copyright holder agrees to transfer ownership to another party, that party must get the copyright holder to sign a piece of paper saying so. It doesn't have to be the Magna Charta; a one‑line pro forma statement will do.”
Konigsberg Int'l, Inc. v. Rice, 16 F.3d 355, 356-57 (9th Cir. 1994): The court affirmed a judgment that a letter by the defendant licensor, confirming the existence of a two-year oral exclusive license agreement, written after the two-year term, was ineffective as transfer of rights to the plaintiff licensee.
Eden Toys, Inc. v. Florelee Undergarment Co., 697 F.2d 27, 36 (2d Cir.1982): The court held that a memorandum of transfer made within a year of an oral agreement and during the term of an exclusive license validated the agreement ab initio.
Arthur Rutenberg Homes Inc. v. Drew Homes Inc., 29 F.3d 1521, 1533 (11th Cir. 1994): The court reversed a holding that the plaintiff did not own valid copyright at time of alleged infringement and that the registration was invalid because it incorrectly recited that registered work was a work made for hire. A third-party author's oral agreement that the plaintiff would own title to the work, subsequently followed up by written assignments, gave the plaintiff sufficient ownership interest to obtain a registration and to sue the defendant for infringement.
Friedman v. Stacey Data Processing Services, Inc., 17 USPQ2d (BNA) 1858 (N.D. Ill. 1990): The court held that extrinsic evidence may be considered in determining whether ambiguous particular language in software development agreement constituted assignment of copyright.
In an interesting but seemingly isolated ruling, a Louisiana federal court held that transfers of copyrights must comply with the formalities requirements of state contract law, possibly including the Louisiana law governing “donations of incorporeal movables.” According to the court, “[t]he material question is whether the transfer [of the copyrights] was a donation or a transfer for consideration”; in the former case, notarization and witnessing would be required. In response to the defendants' motion for summary judgment, the court held that a genuine issue of material fact existed whether the plaintiff had a valid chain of title to the copyrighted posters in question. N & D E Co. Inc. v. Gustings, 23 USPQ2d (BNA) 1049, 1051-52 (E.D. La. 1992) (denying, in pertinent part, defendant's motion for summary judgment).
Copyright-Assignment Recordation Formalities
As with most forms of property, assignments of copyrights must be recorded in order to be valid against subsequent good faith purchasers or mortgagees for value (BFPs). Recordation of a copyright transfer serves as constructive notice against subsequent BFPs if :
- the transfer is recorded within one month of its execution in the U.S., or within two months of its execution outside the U.S., or before recordation of the subsequent transfer; and
- if the recorded instrument specifically identifies the work to which it pertains so that, after it is indexed by the Copyright Office, it would be revealed by a reasonable search under the title or registration number of the work; and
- a copyright registration has been obtained for the work itself.
17 U.S.C. § 205.
Any document relating to copyright will be recorded by the Copyright Office, as permitted by section 205 of the copyright statute. See Recordation of transfers and certain other documents, 37 C.F.R. § 201.4(a)(2). A note or memorandum of a transfer may be recorded as well as the instrument of conveyance itself. Id. § 201.4(c). The term “relating to a copyright” is broadly construed. See id. (providing in part that “[a]ny transfer of copyright ownership . . . or any other document pertaining to a copyright, may be recorded in the Copyright Office” if it is accompanied by the required fee).
To be recordable, a document must either (i) bear the actual signature of the person or persons who executed it, or (ii) be a legible photocopy or other legible facsimile reproduction, accompanied by a sworn certification signed by at least one of the parties to the signed document or by an authorized representative of that person. Id. § 201.4(c)(1).
Documents to be recorded can identify other documents or incorporate them by reference, but they cannot refer to exhibits, appendixes, or attachments that are not included for recordation. Id. § 201.4(c)(2).
9.9.8 Ownership of Copyright in Jointly Developed Software
@BEGIN
In most such “partnerships,” the question of copyright ownership of any resulting software is usually (and preferably) expressly addressed in a written agreement, along with other matters such as use rights, royalty obligations, and the like. Absent an agreement, however as is frequently the case when small companies are involved the copyright statute's joint-work rules could govern by default.
Co-Authors Who Intend a “Unitary Whole” Work are Deemed Co‑Owners
of a Joint Work
:CUSTOMID: co-authors-who-intend-a-unitary-whole-work-are-deemed-coowners-of-a-joint-work
The copyright statute provides that “[t]he authors of a joint work are coowners of copyright in the work.” 17 U.S.C. § 201(a). The statute defines a joint work as “a work prepared by two or more authors with the intention that their contributions be merged into inseparable or interdependent parts of a unitary whole.” Id. § 101.
The authors' intention to create a joint work apparently must exist at the time that they do their respective work. Moreover, the authors' intentions apparently must be judged by whether they intend to collaborate to produce one work. If the intent of either putative joint author is to produce his or her own separate work, independently of the other author, then the end product probably will not be a joint work.
Selected cases:
Weissmann v. Freeman, 868 F.2d 1313 (2d Cir. 1989): The Second Circuit approved of its 1944 holding to that effect, which in the court's view was still consistent with the language and legislative history of the 1976 Copyright Act. “[A]s Judge Hand stated it, ‘when both [authors] plan an undivided whole . . ., their separate interests will be as inextricably involved, as are the threads out of which they have woven the seamless fabric of the work.'” Id. at 1318‑19, citing /Edward
- Marks Music Corp. v. Jerry Vogel Music Co./, 140 F.2d 266 (2d Cir.
- (L. Hand, J.) and H.R. Rep. No. 1476, 94th Cong., 2d Sess. 1, 120,
reprinted in 1976 U.S. Code Cong. & Admin. News 5659, 5736.
The Weissman court viewed the critical fact governing the authors' intentions as having been that “both [authors] were equally aware that their individual authorship efforts would have to be combined in order to create the final integrated producta commercially viable song.” Id.
Childress v. Taylor, 945 F.2d 500, 507 (2d Cir. 1991): In an infringement case brought by the author of a play about the life of “Moms” Mabley, the defendant, an actress accused of infringing the copyright in the play, claimed that she was as joint author of the play. She apparently had suggested that the play be written, contributed facts and ideas, and played the title role in the initial production. Affirming a summary judgment of infringement, the Second Circuit held that there was no evidence from which a trier of fact could infer that the playwright had the requisite state of mind that is required for joint authorship.
Avtec Systems, Inc. v. Peiffer, 805 F. Supp. 1312 (E.D. Va. 1992), vacated and remanded, 21 F.3d 568 (4th Cir.), on remand 1994 U.S. Dist. LEXIS 16946 (E.D. Va. Sept. 12, 1994): The district court held that a company was not a joint author of a computer program that had been developed by a former employee largely on his own time with his own computer. “There is slight evidence of collaboration and less evidence of intent to merge separate efforts into a unitary whole.” 805
- Supp. at 1319.
Whelan Associates, Inc., v. Jaslow Dental Laboratory, Inc., 609 F. Supp. 1307, 1319 (E.D. Pa. 1985), aff'd, 797 F.2d 1222 (3d Cir. 1986): The court held that “[t]here is not a scintilla of evidence that the parties ever intended that Rand Jaslow's contributions, whatever they may have been, should merge into the final computer system and design.”
A Would-Be Joint Author's Contribution
Must Itself be Copyrightability
:CUSTOMID: a-would-be-joint-authors-contribution-must-itself-be-copyrightability
Not just any contribution to the development of a copyrightable work will give rise to a co-ownership interest. The courts have held that such a contribution must itself rise to the level of copyrightability. See also § 2.1[a][1] (authorship requirements).
Selected cases:
Childress v. Taylor, 945 F.2d 500, 507 (2d Cir. 1991), summarized on page 2: The Second Circuit adopted what it characterized as the prevailing view, endorsed by Copyright Office, which requires contributions by putative joint authors to rise to the level of copyrightability. The court observed that insistence on copyrightable contributions by putative joint authors might serve to prevent some spurious claims by those who might otherwise try to share the fruits of the efforts of a sole author of a copyrightable work. It pointed out that a person with noncopyrightable material who proposes to join forces with a skilled writer to produce a copyrightable work is free to make a contract to disclose his or her material in return for an assignment of part ownership of the resulting copyright. See id. at 507; see also Erickson v. Trinity Theatre, Inc., 13 F.3d 1061, 1070-71 (7th Cir. 1994) (same).
Whelan Associates, Inc., v. Jaslow Dental Laboratories, 609 F. Supp. 1307 (E.D. Pa. 1985), aff'd, 797 F.2d 1222 (3d Cir. 1986): The copyright infringement defendants claimed at trial that defendant Rand Jaslow was a joint author and co-owner of the plaintiff's dental laboratory management software. They alleged that Jaslow “originated the concept” of developing the software, that he “disclosed to Elaine Whelan in detail the operation and method of Jaslow Laboratory in conducting its business, [and] that he explained to Elaine Whelan the functions to be performed by the computer and helped design the language and format of some of the screens that would appear on the computer's visual displays.” Id. at 1318. The Whelan court rejected the defendants' contentions, finding that “Rand Jaslow did little more than explain the operations of the dental laboratory business and define the information he wanted to be able to obtain from the computer. . . . Such general assistance and contributions to the fund of knowledge of the author did not make Rand Jaslow a creator of any original work, nor even the co-author.” Id. The court's perception of the nature of Rand Jaslow's work was the final blow to the defendants' joint-authorship contention: “The only suggested merger into the whole might be the wording and the abbreviations contained on some of the visual screens. His contributions were not of sufficient significance to constitute him a co-author of the system.” Id.
S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081 (9th Cir. 1989): The software in question had been custom-developed, apparently as part of a hardware-software procurement contract. The developer had licensed only the executable version (not the source code) to the customer, and for use only on hardware provided by the developer. Id. at 1082‑83. Two of the developer's employees – who had been the principal authors of the software in question – left to set up their own competing company, offering to write an improved version of the software for use on the customer's own hardware. The customer agreed; the ex-employees then obtained unauthorized “back door” access to their former employer's computer (by circumventing the password system) and took a copy of the source code of the software. The next week, the former employees installed the purloined software on the customer's newly purchased in-house hardware. Id. at 1084. In the Ninth Circuit, a joint-authorship claim was rejected as an alternative ground for affirming a summary judgment in favor of the customer. The trial court had granted summary judgment in favor of the customer on the developer's copyright-infringement claims; on appeal, the customer made a joint-authorship argument as an alternative ground for affirming summary judgment. See id. at 1084, 1086. The customer argued that its own employee had been a joint author and thus that it was a co-owner. Id. at 1086. The Ninth Circuit disagreed; citing Whelan, it said that the customer's employee “did nothing more than describe the sort of programs Payday wanted S.O.S. to write. A person who merely decribes to an author what the commissioned work should do or look like is not an author for purposes of the Copyright Act.” Id. at 1087, citing Whelan, 609 F. Supp. at 1318‑19.
Ashton-Tate Corp. v. Ross, 728 F. Supp. 597 (C.D. Cal. 1989), affirmed, 916 F.2d 516 (9th Cir. 1990): The court gave short shrift to allegations of joint authorship and co-ownership. The alleged joint author had worked on a spreadsheet program with a third party; he developed a list of user commands that he felt a spreadsheet program should implement. The third party disclosed parts of the spreadsheet program to the alleged infringer (and declaratory-judgment plaintiff), which went on to built a working spreadsheet program in collaboration with the third party. The Ross court treated the alleged joint author's contribution to the spreadsheet program as an unprotectable idea, not as a part of the protectable expression in the program. The court said that a contribution of only “ideas” to the development of a work, without reducing those ideas to an expression is insufficient to acquire an interest in the work. Id., 916 F.2d at 521‑22. After acknowledging the difficulty of drawing lines between ideas and expressions, the court held that “Ross merely told Wigginton what tasks he believed the [spreadsheet] interface should allow the user to perform. This list of commands is only an idea that is not protected under federal law.” Id., 728 F. Supp. at 599.
Holtzbrinck Publishing Holdings, L.P. v. Vyne Communications, Inc., No. 97 CIV. 1082 (KTD), 2000 WL 502860 at *26-27 (S.D.N.Y., Apr 26, 2000): The parent company of Scientific American magazine hired a consultant to develop a Web site. The court held, in denying a motion for partial summary judgment, that the company likely was a joint author and thus co-owner of the Web site, but fact issues remained as to whether the company's contributions were copyrightable.
Query: Are judicial notions of equity offsetting the result that might otherwise obtain under copyright law? The courts seem to be dismissing the quality of the work contributed by the asserted joint-author. Under the copyright statute, however, a joint author's contribution need rise only to the level of “authorship,” See 17 U.S.C. § 101 (defining joint work as work prepared by two or more “authors”). and that level is quite low in copyright law. See, e.g., NEC Corp. v. Intel Corp., 10 USPQ (BNA) 1177, 1178‑79 (C.D. Cal. 1982); see also § 2.1[b].
The Ashton-Tate v. Ross decision in particular is puzzling in view of the copyright protection given to compilations of commands in Digital Communications Associates, Inc., v. Softklone Distr. Corp. 659 F. Supp. 449 (N.D. Ga. 1987). Ross's list of commands resembles, at least superficially, DCA's compilation of commands and status information that was held to be copyrightable in Softklone. If it was infringement for Softklone to copy DCA's compilation, it seems as though it might well have been infringement for Ashton-Tate to build a spreadsheet program on Ross's compilation. This of course assumes, however, that Ross's compilation had the requisite originality; the Ross court may have regarded that compilation as having come from the “prior art” and therefore not copyrightable to Ross. Cf. Computer Associates International, Inc., v. Altai, Inc., 982 F.2d 693, 706 (2d Cir. 1992) (affirming holding of noninfringement, setting out “successive filtration” test to separate unprotectable elements from protectable ones; see also § 2.7[g]).
The Whelan and Ross decisions may indeed be explainable in equitable terms. It seems that when one party does the lion's share of what is perceived as the “real work” in developing a finished software product, courts are prone to find that a purported joint author's contribution fails to rise to the requisite level of originality.
Selected other cases:
Forward v. Thorogood, 985 F.2d 604, 607 (1st Cir. 1993): A band recorded some tapes in a studio. It sued the owner of the physical tapes for copyright infringement; the tape owner claimed that he had the right to make commercial use of the tapes on grounds that he had been a “joint author.” The First Circuit affirmed an injunction against such use, holding that the tape owner had made no musical or artistic contribution to the recording and thus was not a joint author.
M.G.B. Homes, Inc., v. Ameron Homes, Inc., 903 F.2d 1486, 1492‑93 (11th Cir. 1990): An architect's client made a thumbnail sketch of a desired floor plan, and subsequently had approval authority over the architect's final plan. The court held that this did not make the client a joint author.
Rubloff Inc. v. Donahue, 31 USPQ2d (BNA) 1046 (N.D. Ill. 1994): A company hired a contractor to write a real-estate training manual, then later sued the contractor, claiming in part that the company had been a joint author with the contractor. The court granted summary judgment against the company, holding that the company's editorial corrections, suggestions for changes, formatting, and contribution of a foreword did not make the company a joint author.
Aitken, Hazen, Hoffman, Miller, P.C., v. Empire Construction Co., 542 F. Supp. 252, 259 (D. Neb. 1982): The court held that contribution of design ideas and directions to an architectural firm did not give rise to joint authorship in the resulting architectural plans.
Copyright Co-Owners Must Account to One Another for any Uses of the
Work
:CUSTOMID: copyright-co-owners-must-account-to-one-another-for-any-uses-of-the-work
@BEGIN
How will proceeds be divided among co-owners absent an agreement on the issue? One court held that, absent evidence of a contrary intent, the ownership interest, and thus the right to share in proceeds, will be presumed to be divided equally among the co-owners. /Sweet Music, Inc.,
- Melrose Music Corp./, 189 F. Supp. 655, 659 (S.D. Cal. 1960). The
Sweet case apparently has been cited only once, and then not on the point noted above. In Korman v. Iglesias, 736 F. Supp. 261 (S.D. Fla. 1990), the court noted that if parties were joint authors of a song, they would stand in a relationship akin to tenants in common. Absent an agreement specifying otherwise, any profits earned would be divided equally, “even where it is clear that [the] respective contributions to the joint work are not equal,” quoting Community for Creative Non-Violence v. Reid, 846 F.2d 1485, 1498 (D.C. Cir. 1988) (dictum), aff'd, 490 U.S. 730, 109 S. Ct. 2166 (1989) (see § 2.6[b][1]).
Another court, however, ruled that a plaintiff-joint author must establish what a proper pro rata share of profits would be; the court expressed considerable skepticism whether the plaintiff, who had taken one photograph which constituted “only one element” of a promotional insert used by the defendant (and the insert in turn constituted “probably only a small portion” of the defendant's total advertising), would be able to prove more than nominal damages of $1.00. Strauss v. Hearst Corp., 8 USPQ2d (BNA) 1832, 1838, (S.D.N.Y. 1988).
9.9.10 Implied License Notwithstanding Lack of Ownership
A hiring party may not be in a hopeless position simply because its software is not a work made for hire or a joint work and it cannot obtain an assignment. The hiring party can probably assert at least a use right in the software, and possibly even more than that.
Selected cases:
Graham v. James, 144 F.3d 229, 235, 238 (2d Cir.1998): The appellate court vacated and remanded a copyright infringement award, on grounds that the infringement defendant was an implied licensee.
Effects Associates, Inc., v. Cohen, 908 F.2d 555, 558‑59 (9th Cir. 1990): A movie producer commissioned special-effects footage for a horror movie but did not pay for it. In an opinion by Judge Kozinski, the court rejected a claim that the producer was a copyright infringer, holding that the movie producer had orally been granted an implied non-exclusive license (and thus the copyright owner's action would have to be in contract, not copyright). The court noted pointedly that the dispute over copyright would not have arisen had the parties reduced their agreement even to a one-line writing.
Oddo v. Ries, 743 F.2d 630, 634 (9th Cir. 1984): An author prepared a manuscript as part of his partnership duties. The court held that the author had implicitly given the partnership a license to use the articles, “for without a license, [the author's] contribution to the partnership venture would have been of minimal value.”
Holtzbrinck Publishing Holdings, L.P. v. Vyne Communications, Inc., No. 97 CIV. 1082 (KTD), 2000 WL 502860 at *10 (S.D.N.Y., Apr 26, 2000): The parent company of Scientific American magazine commissioned a consultant to develop programming for the magazine's Web site. The court granted partial summary judgment that the company had an irrevocable non-exclusive license to the programming.
Yojna, Inc., v. American Medical Data Systems, Inc., 667 F. Supp. 446 (E.D. Mich. 1987): An outside software contractor, at the request of a hospital corporation and its subsidiary, developed a computer program for hospital information management. The court held that the outside contractor was the owner of the software, but the subsidiary had a perpetual, royalty-free license to use and sublicense the program, including the right to unrestricted access to source code for purposes of developing new versions and enhancements. The court also held that the license was an exclusive license within the health-care industry. See id. at 446.
Some courts, however, have declined to hold that employers have such rights in works created by their employees. Selected cases:
Avtec Systems, Inc. v. Peiffer, 21 F.3d 568 (4th Cir. 1994), vacating and remanding 805 F. Supp. 1312 (E.D. Va. 1992), on remand 1994 U.S. Dist. LEXIS 16946 (E.D. Va. Sept. 12, 1994): Peiffer, a former employee of Avtec, had written a computer program in part on company time and in part on his own time. The Fourth Circuit held that if Peiffer was the owner of the copyright in the computer program, then Avtec would have had only a nonexclusive license to use the program, which would be revocable absent consideration. The court disapproved a holding below that Avtec had a “shop right” in the software; it noted that Congress had expressly declined to import the shop right doctrine from patent law into copyright law. See id. at 575 n.16 (citation omitted).
Kovar v. Southeastern Michigan Transportation Authority, slip op., No. 101761 (Mich. App. Oct. 4, 1989), reprinted in Comp. Industry Lit. Rptr. 10,317 (Oct. 23, 1989): A former employee of the transit authority, who worked as a schedule writer, had developed scheduling software “in his spare time on the job and at home” [emphasis supplied] but had kept the source code and passwords as secrets from his employer. The employee resigned to take another job and offered the transit authority a use license for an annual fee; his supervisor “fired” him, unsuccessfully demanded that he turn over his source code and passwords, called in the district attorney to have him arrested for “extortion” and “destruction of computer programs,” and advised his new employer that the former employee was under investigation for extortion. Id., slip op. at 2. The court implicitly held that the transit authority did not have a license to use the scheduling software.
9.9.11 Perfecting a Security Interest in a Copyright
A “security interest” in a copyright is something in the nature of a contingent ownership interest, granted to a secured party by the copyright owner under Article 9 of the Uniform Commercial Code, to secure a debt or other obligation. A security interest in a copyright, as with most general intangibles, can be acquired via a written instrument executed by the copyright owner. To be valid against (and constitute notice to) a subsequent creditor or purchaser, however – and more importantly, to preserve the secured party's interest if the copyright owner files a petition in bankruptcy – the security interest must be “perfected” by filing identifying information about it, often in the form of the well-known UCC‑1 financing statement, in an appropriate recordation system – which for most general intangibles is a state agency, e.g., the Secretary of State's office in Texas.
Article 9 states that a financing statement filing is “not necessary or effective to perfect a security interest in property subject to (a) a statute . . . of the United States which provides for a national registration . . . or which specifies a place of filing different from that specified in this Article.” U.C.C. § 9-302(3)(a) (emphasis supplied). Moreover, Article 9 does not even apply to security interests to the extent that the rights of the parties respecting such property are governed by federal statutes. U.C.C. § 9-106.
That raises the question: where must the filing be made to perfect a security interest in a copyright? Two federal bankruptcy court decisions have held that the filing must be in the Copyright Office under that agency's recordation procedures, and that a U.C.C.-type filing will not perfect the security interest. See Official Unsecured Creditors' Committee v. Zenith Productions Ltd. (In re AEC Acquisition Corp.), 127 B.R. 34 (Bankr. C.D. Cal. 1991); National Peregrine Inc. v. Capitol Fed. S&L, 116 B.R. 194 (Bankr. C.D. Cal. 1990). Cf. In re C TEX Software, Inc., 127 B.R. 501 (Bankr. D.N.H. 1991) (holding that security interest in copyright in software did not encompass subsequently created and independently copyrightable updates to software and thus did not take priority over exclusive license to distribute the updates).
9.10 Infringement of Software Copyrights
Theoretically, analysis of software copyright-infringement claims is straightforward. In the abstract, claims of computer program copyright infringement are judged by the same principles as are applied to other copyrighted works: any “‘“copying” of protectable expression' beyond the scope of a license” constitutes copyright infringement. E.g., MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 26 USPQ2d (BNA) 1458 (9th Cir. 1993) (affirming summary judgment and injunction against third party maintenance provider's unauthorized use of plaintiff's software on customer's computer system for maintenance and diagnostic purposes), quoting S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085 (9th Cir. 1989) (reversing summary judgment granted in favor of customer/copyright infringement defendant).
9.10.1 Basic Infringement Analysis
As explained in the famous Computer Associates v. Altai case, Computer Assocs. Int'l, Inc., v. Altai, Inc., 982 F.2d 693 (2d Cir.
- (affirming holding of noninfringement). the basic analytical
approach is well-established and entails proof of “substantial similarity” between the copyrighted work and the accused work:
[The copyright] plaintiff must establish its ownership of a valid copyright, and that the defendant copied the copyrighted work. The plaintiff may prove defendant's copying either
- by direct evidence or,
- as is most often the case, by showing that
- the defendant had access to the plaintiff's copyrighted work and
- that defendant's work is substantially similar to the plaintiff's copyrightable material.”
Altai, 982 F.2d at 701 (emphasis and bulleted paragraphing added, citations omitted). The Altai court noted that “‘[s]ubstantial similarity,' in the copyright context, refers to appropriation by the putative infringer of the ‘fundamental essence or structure' of a protected work.” Id. (citation omitted).
Proof of substantial similarity to protectable aspects of a work is required because copying alone, in and of itself, does not necessarily lead to liability. “Not all copying, however is copyright infringement …. copying as a factual matter is insufficient, if improper appropriation is lacking.” Melville Nimmer & David Nimmer, 4 Nimmer on Copyright, § 13.01[B] at 13‑9, 13‑10, quoted in Berkla v. Corel Corp., 66 F.Supp.2d 1129 (E.D. Cal. 1999) (granting in part and denying in part Corel's motion for summary judgment of noninfringement) (internal quotation marks omitted).
Substantial similarity can be proved by showing similarity in a variety of factors. For example, in one case, the copyright owner convinced the court to grant a preliminary injunction on the basis of
“several sections of the programs where code similarities are uncanny, including the color code map for plaintiff's screens, which is identical in both programs;
- “identical coding of the so‑called “intensity” function, which governs intensity of colors and is used to make objects on the screen distinguishable from one another;
- “the appearance of empty source code modules or files in exactly the same location in both programs;
- “the same or similar bug fixes in both programs. * * *
- “remarkable instances of similarities to plaintiff's software in the programmer's comments, which are non‑executable appendages to lines of executable code. …
- “comments identical to the point of repeated spelling errors. In one notable instance, the line “Dont do anyting” appears as a programmer's comment in both Tradescape and Bulldog, with identical misspellings in both.”
Tradescape.com v. Shivaram, 77 F. Supp.2d 408, 417, 418 (S.D.N.Y.
- (granting preliminary injunction) (bulleted paragraphing added,
footnotes omitted).
Several different “flavors” of copyright infringement in the context of computer software are discussed below.
9.10.3 Use by an “Unauthorized” Person (e.g., a Third-Party Maintenance
Provider) as “Infringement”
:CUSTOMID: use-by-an-unauthorized-person-e.g.-a-third-party-maintenance-provider-as-infringement
Use of software by an unauthorized person can constitute infringement. This is shown by a number of now-outdated cases involving third-party maintenance providers (commonly referred to as independent service organizations or ISOs) who use their customers' licensed copies of software, e.g., for running diagnostic tests on a customer's computer. Prior to a 1998 statutory change, such unauthorized use typically became an issue where the ISO competes with the computer manufacturer in post-sale servicing of the computer. At least some of the cases seemed to turn on the precise language used in the customer's license agreement.
Pre-Amendment Cases
Data General Corp. v. Grumman Systems Support Corp., 825 F. Supp. 340 (D. Mass. 1993), affirmed in pertinent part but remanded for redetermination of possibly-duplicative damage award, 36 F.3d 1147 (1st Cir. 1994): The First Circuit affirmed a holding that an ISO's use of Data General's diagnostic software constituted copyright infringement. It upheld judgment on a verdict for $27.4 for copyright infringement and an equal amount for trade-secret misappropriation, which the trial judge increased by $9 million because of willful misappropriation.
Service & Training Inc. v. Data General Corp., 963 F.2d 680, 688-89 (4th Cir. 1992) (affirming holding of copyright infringement), affirming 737 F. Supp. 334 (D. Md. 1990): Data General was likewise successful in obtaining a nearly $64 million judgment against an ISO that apparently was using over 200 unlicensed copies of Data General's software.
MAI Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir. 1993): The Ninth Circuit similarly held that use by a nonlicensee ISO of a copy of diagnostic computer software, licensed to a customer on terms excluding third-party use, on the customer's computer in the course of maintaining the computer for the customer, constituted copyright infringement. The court affirmed summary judgment and an injunction against the third-party maintenance provider's unauthorized use of the software. The court's holding included the point that the ISO's copying of the program into the computer's working memory (RAM) to run the program created an embodiment that could be “perceived, reproduced, or otherwise communicated” under section 101 of the Copyright Act, 17 U.S.C. § 101, and consequently was sufficiently “fixed” to qualify as a “copy,” giving rise to infringement liability. 991 F.2d at 518-19; see also Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir. 1988) (“the act of loading a program from a medium of storage into a computer's memory creates a copy of the program”), cited in MAI Systems Corp.
Advanced Computer Systems v. MAI Systems Corp., 845 F. Supp. 356 (E.D. Va. 1994) (granting MAI's motion for summary judgment of copyright infringement; rejecting fair use defense): MAI was likewise successful in a Virginia district court against another ISO. That court also rejected the ISO's argument that its use of MAI's software constituted fair use. See
Triad Systems Corp. v. Southeastern Express Co., 64 F.3d 1330 (9th Cir. 1995): The Ninth Circuit rejected a contention that similar use of a customer's software by an ISO constituted fair use..
NLFC Inc. v. Devcom Mid-America Inc., 45 F.3d 231 (7th Cir. 1995): In this somewhat peculiar case, the Seventh Circuit affirmed summary judgment of noninfringement in favor of a defendant third-party maintenance provider. The court based its decision on the ground that there was no evidence the defendant had done more than operate licensed copies of the software in question on the licensees' computers. The NLFC plaintiff's copyrighted software had “contained many bugs (among other assorted problems).” Id., 45 F.3d at 233. The defendant had originally been hired by one licensee, with the plaintiff's agreement, to fix the problems, which it did. Another licensee subsequently hired the defendant to do the same. Apparently recognizing a market opportunity, the defendant sent out solicitation letters to other licensees. The plaintiff sued for copyright infringement. It evidently based its case on the defendant's alleged copying of the software to the defendant's own computers. The Seventh Circuit agreed with the district court that the plaintiff had failed to put forth evidence of such copying (and observed in a footnote that even if such copying had occurred it might have been authorized by the plaintiff's license agreements with its licensees). Id., 45 F.3d at 235 & n.5. The NLFC court cursorily cited MAI Systems for the proposition that loading software into memory to execute it constitutes “copying.” 45 F.3d at 235. Strangely, the Seventh Circuit apparently did not consider that under MAI Systems, a nonlicensee is liable for infringement if it runs licensed software on a licensee's computer, even though the defendant had apparently admitted doing just that. Id., 45 F.3d at 233. Nor did the appellate court seem to regard as significant the fact that the defendant conceded printing out a copy of the source code of the software for reference purposes. Id.
Hogan Systems, Inc. v. Cybresource Int'l, Inc., 158 F.3d 319 (5th Cir. 1998), affirming 1997 WL 311526 at *3 (N.D. Tex. June 2, 1997): The language of the license agreement made all the difference in the Fifth Circuit's Hogan Systems case. The language in question prohibited the licensee from making the licensed software available to anyone “except to [Norwest's] employees or [the licensor's] employees or to other persons during the period such other persons are on [Norwest's] premises for purposes specifically relating to [Norwest's] authorized use of the licensed program.” (granting defendant's motion for summary judgment). The district court concluded that the license agreement “authorizes third‑party contractors to provide consulting services to Norwest on Hogan‑produced software, including use, copying, and modification. What Norwest could itself do under the License, Norwest may use a contractor to do. In other words, while they are engaged in consulting services on behalf of Norwest, Defendants' activities are ‘sheltered under' Norwest's license rights.” 1997 WL 311526 at *4. The Fifth Circuit agreed; the court even endorsed the proposition that the third-party contractor's remote access to the software by remote-control software had not been shown to constitute infringement. See 158 F.3d at 322-24.
The 1998 Amendment to Section 117
In 1998, Congress effectively overruled the MAI Systems line of cases by adding a new paragraph (c) to section 117 of the Copyright Act. The new paragraph provides as follows:
(c) Machine maintenance or repair.–Notwithstanding the provisions of section 106, it is not an infringement for the owner or lessee of a machine to make or authorize the making of a copy of a computer program if such copy is made solely by virtue of the activation of a machine that lawfully contains an authorized copy of the computer program, for purposes only of maintenance or repair of that machine, if–
(1) such new copy is used in no other manner and is destroyed immediately after the maintenance or repair is completed; and
(2) with respect to any computer program or part thereof that is not necessary for that machine to be activated, such program or part thereof is not accessed or used other than to make such new copy by virtue of the activation of the machine.
(d) Definitions.–For purposes of this section—
(1) the “maintenance” of a machine is the servicing of the machine in order to make it work in accordance with its original specifications and any changes to those specifications authorized for that machine; and
(2) the “repair” of a machine is the restoring of the machine to the state of working in accordance with its original specifications and any changes to those specifications authorized for that machine.
9.10.5 Disassembly and Reverse Engineering
Disassembly of a copy of machine-readable “object” code, unreadable by humans in itself, as an intermediate-copying step in reverse engineering for creation of another work, can constitute “fair use” if the copy is legitimately in the possession of the reverse engineer.
Selected Cases Involving Reverse Engineering
Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th Cir. 1992): Disassembly was held by the Ninth Circuit technically to constitute infringement, but to be fair use when “disassembly is the only way to gain access to the ideas and functional elements embodied in a computer program and where there is a legitimate reason for seeking such access,” e.g., to facilitate entry into the marketplace by a competitor creating similar but noninfringing programs. Id. at 1527.
Atari Games Corp. v. Nintendo of America Inc., 975 F.2d 832 (Fed. Cir. 1992), affirming 8 USPQ2d (BNA) 1935 (N.D. Cal. 1991): Atari, the declaratory plaintiff, evidently went too far for the court's comfort in disassembling a copyrighted Nintendo program embedded in a computer chip. When Atari was only partially successful in physically peeling away the layers of its rival Nintendo's computer chip to study the embedded programming, Atari obtained a copy of the program from the Copyright Office, stating that it needed the copy for use in defending against a pending infringement suit (see discussion of requirements for obtaining access to copyright registration deposits in § 2.4[b][1]). In fact, no such suit had then been brought. Id., 975 F.2d at 836. The Federal Circuit noted that scope of nonliteral copyright protection for software was limited. Id. at 838-40 (citing Treatise). It held that it would have been fair use for Atari to disassemble an object-code copy of the Nintendo program “to understand [that] program and to distinguish the protected from the unprotected elements of [the] program,” if the copy had been lawfully acquired. The court held that under the circumstances, Atari's unclean hands precluded it from asserting a fair-use defense. Id. at 843-44 (affirming preliminary injunction).
Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000), reversing 48 F.Supp.2d 1212, 1214 (N.D. Cal. 1999) (granting preliminary injunction): This was a case similar in some respects to Sega v. Accolade, discussed supra on page 2, and ultimately with a similar outcome. Plaintiff Sony was the manufacturer of the Sony PlayStation and PlayStation games. Defendant Connectix developed an “emulator,” a software program which could be installed on a computer and used to run PlayStation games. Id., 48 F. Supp. at
In developing its emulator, Connectix bought a PlayStation, broke it apart, and copied its BIOS (the basic input-output software) from an internal ROM chip to a disk. Connectix's engineers then used this disk to continue their development of the Connectix emulator. It was undisputed that an early version of the emulator contained the complete, unchanged Sony BIOS. Eventually, Connectix replaced the Sony BIOS code with its own BIOS code. 48 F. Supp. at 1216. Connectix engineers admitted in deposition that they used copies of the Sony BIOS code to gradually convert Sony's code to their own code. 48 F. Supp. at 1218.
Sony conceded that the finished emulator did not contain any part of Sony's code. 48 F. Supp. at 1214. Its copyright infringement claim was based on a theory of intermediate infringement — it asserted that Connectix “repeatedly duplicated Sony's BIOS code in its entirety and used those copies while it developed a computer program that emulates the hardware components of the PlayStation console,” and that it “disassembled Sony's BIOS in order to develop its own VGS BIOS by gradually replacing elements of Sony's code with its own.” Id. at
- The district court granted a preliminary injunction against
Connectix's distribution of the emulator, even though there was no infringing code left in it, on the theory that “the only effective remedy for such intermediate infringement is to enjoin the end product. If not, an intermediate infringer could always avoid the consequences of illegal copying and use by editing the protected code out of its final product.” 48 F. Supp. at 1224 (paragraphing edited).
The Ninth Circuit reversed the preliminary injunction. It held that “[t]he intermediate copies made and used by Connectix during the course of its reverse engineering of the Sony BIOS were protected fair use, necessary to permit Connectix to make its non‑infringing Virtual Game Station function with PlayStation games. Any other intermediate copies made by Connectix do not support injunctive relief, even if those copies were infringing.” 203 F.3d at 599. The appellate court focused on the evidence showing that the making of intermediate copies was in fact necessary under the specific circumstances; it rejected Sony's argument that the reverse engineering could have been accomplished with less intermediate copying, because such a rule “would require that a software engineer, faced with two engineering solutions that each require intermediate copying of protected and unprotected material, often follow the least efficient solution.” Id. at 605.
DSC Communications Corp. v. DGI Technologies, Inc., 898 F. Supp. 1183, 1189-92 (N.D. Tex. 1995) (partially vacating ex parte seizure order), aff'd on other grounds, 81 F.3d 597 (5th Cir. 1996): In this case, disassembly and reverse-engineering of software was not, in and of itself, the cause of the defendant's difficulty — apparently it was the defendant's surreptitious copying of other software owned by the plaintiff that got the defendant into trouble. The defendant did not use a “clean room” approach; that is, the individuals who disassembled the plaintiff's firmware were not walled off from the individuals who developed the defendant's firmware. In an early proceeding partially vacating its own ex parte seizure order, the district court noted that while failure to use a clean room meant that the defendant could not negate access, that failure did not rule out a fair-use defense. Id. at 1189 n.3.
What sank the DGI defendant's fair-use defense was its surreptitious copying of other software. Plaintiff DSC had developed operating-system software that it provided to its customers under a license agreement that prohibiting giving access to the software to third parties. The software was not otherwise available for purchase or licensing. DSC v. DGI, 898 F. Supp. at 1192. An agent of the defendant visited a customer that owned circuit boards of both the plaintiff and the defendant, and which possessed a licensed copy of the plaintiff's operating-system software. Without asking permission, the defendant's agent surreptitiously made a copy of the plaintiff's operating-system software and brought it back to the defendant, allegedly for study and reverse-engineering. Id. The DSC trial court came down hard on the defendant. It refused to believe the defendant's testimony that it was unaware of the licensing agreement for the plaintiff's operating system software. Id. at 1194. Analogizing to Atari, the court held that it was not fair use for the defendant to disassemble and reverse-engineer a copy of the operating-system software because it was not authorized to possess the copy. Id.
(The subsequent trial and appeal apparently focused on the defendant's liability for contributor infringement, for inducing customers to infringe plaintiff DSC's copyright by using DSC's software with defendant DGI's circuit boards, and not on the reverse-engineering fair-use defense. The later proceedings, after DSC's acquisition by the French telecommunications company Alcatel, are reported in Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772 (5th Cir. 1999).)
DSC Communications Corp. v. Pulse Communications Inc., 976 F. Supp. 359, 363-64, 43 USPQ2d 1589 (E.D. Va. 1997) (granting judgment as a matter of law), aff'd in part, rev'd in part, vacated in part, and remanded, 170 F.3d 1354 (Fed. Cir. 1999): DSC's competitor Pulse Communications (“Pulsecom”) had reverse engineered certain digital switching software in a DSC “Litespan” switching product to develop a competing product. The district court cited Sega and Atari in granting judgment as a matter of law (JMOL), at the close of plaintiff DSC's case, that “[s]uch copying for reverse engineering of a lawfully acquired system is permissible fair use.” But the Federal Circuit vacated that part of the judgment on grounds that, at least as shown by plaintiff DSC's evidence, defendant Pulsecom's activity in question did not constitute fair use, and as a result the grant of a judgment as a matter of law was impermissible:
On the basis of DSC's evidence at trial, Pulsecom's activities in creating copies of the POTS‑DI software on its POTS cards by using the RBOCs' Litespan systems does not qualify as “fair use” under the Sega analysis. DSC's evidence showed that Pulsecom representatives made copies of the POTS‑DI software on Pulsecom POTS cards as part of the ordinary operation of those cards, not as part of an effort to determine how the Litespan system worked. Rather than being part of an attempt at reverse engineering, the copying appears to have been done after Pulsecom had determined how the system functioned and merely to demonstrate the interchangeability of the Pulsecom POTS cards with those made and sold by DSC. 170 F.3d at 1363.
The Federal Circuit noted, however, that defendant Pulsecom had not put on its own evidence (because the trial court granted judgment as a matter of law at the close of DSC's case). The appeals court remanded the case for a new trial. Id.
NEC Corp. v. Intel Corp., 10 USPQ2d (BNA) 1177, 1186 (N.D. Cal. 1989): The court found that NEC's engineer did not infringe the copyright in Intel's microcode by disassembling the microcode for study, when the ultimate NEC end product was not infringing.
Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1548 (11th Cir. 1996): The defendant had been found liable for copyright infringement and misappropriation of trade secrets in reverse engineering a circuit board, including disassembling its associated software. The district court had instructed the jury that only nonliteral copying could be the subject of an Altai filtration defense (see § 2.7[g]). The appeals court reversed, holding that that even literal copying might be permissible under Altai; the court also hinted strongly that the defendant's disassembly had been a fair use. Id., 79 F.3d at 1539 nn. 17-18.
Cadence Design Systems, Inc. v. Avant! Corp., 125 F.3d 824, 830-31 (9th Cir. 1997): The appeals court reversed and remanded the lower court's refusal to enjoin the defendant's distribution of its software. It held that the district court was required to determine whether the software produced by the defendant's clean-room process infringed the copyright in the plaintiff's software.
E. F. Johnson Co. v. Uniden Corp., 623 F. Supp. 1485 (D. Minn. 1985): The court found that the defendant had infringed the copyright in the plaintiff's computer software. It noted that “[the] fact that defendant's engineers dumped, flow charted, and analyzed plaintiff's codes does not of itself establish pirating”; it observed that if the defendant had “contented itself with surveying the general outline of the program, thereafter converting the scheme into detailed code through its own imagination, creativity and independent thought, a claim of infringement would not have arisen.” Id. at 1501‑02 n.17.
The Reverse-Engineering Exception in the
Digital Millennium Copyright Act
:CUSTOMID: the-reverse-engineering-exception-in-the-digital-millennium-copyright-act
As discussed in § 2.7[h], the Digital Millennium Copyright Act (DMCA) added new section 1201 to Title 17, prohibiting circumvention of technological measures that control access to copyrighted works. Section 1201(f) contains a specific exception to liability for some, but not all, reverse engineering activities:
a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program /for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs/ … to the extent that any such acts of identification and analysis do not constitute infringement under this title.
17 U.S.C. § 1201(f)(1) (emphasis added).
9.10.6 Marketing of Aftermarket or Add-On Software
to Create Similar Audio‑Visual Effects
:CUSTOMID: marketing-of-aftermarket-or-add-on-software-to-create-similar-audiovisual-effects
Lewis Galoob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965, (9th Cir. 1992) (affirming judgment of noninfringement): The Ninth Circuit held that the sale or use by Galoob of “aftermarket” software (or programmed hardware), designed to enhance the use of Nintendo's copyrighted software and not to replace it, was did not infringe Nintendo's copyrights. Galoob's “Game Genie” was designed so that it could be plugged into a Nintendo Game Boy video console instead of a game cartridge; then the game cartridge would be plugged into the Game Genie. The programming of the Game Genie permitted the user to alter several of the parameters of the game program by overwriting a particular data byte in the signals exchanged between the game cartridge and the Game Boy (the programming of the game cartridge was not altered). Id., 964 F.2d at 967. The Ninth Circuit noted in dicta that spell-checkers designed to work with word processing programs “could not be produced and marketed if courts were to conclude that the audiovisual display of a word processor and spell-checker combination is a derivative work based on the display of the word processor alone.” Galoob, 964 F.2d at 969. Subsequently, Galoob was awarded the entire amount of Nintendo's $15 million bond as damages for wrongful injunction. See 16 F.3d 1032, 29 USPQ2d 1857 (9th Cir. 1994) (affirming damage award).
Microstar v. Formgen: In the Microstar case, a district court confronting a similar situation denied copyright protection to add-on data sequences that could be used in the Duke Nukem 3D computer game, but the Ninth Circuit later reversed that denial. Microstar v. Formgen, Inc., 942 F. Supp. 1312 (S.D. Cal. 1996) (denying preliminary injunction against distribution of CD-ROM containing data sequences, but granting preliminary injunction against use of packaging and screen-saver containing copies of copyrighted images from game), rev'd in part, aff'd in part, 154 F.3d 1107 (9th Cir. 1998). The Duke Nukem game had “29 levels through which players advance, killing monsters and other evil creatures.” Id., 942 F. Supp. at 1314. To keep players interested, the copyright owner included a utility program for developing new levels by creating .MAP data files; users were encouraged to pass these files on to other players, e.g., over the Internet. Id.
The accused infringer in Microstar commercially distributed a CD-ROM (compact disk read-only memory) that included 300 of these new user-created levels in the form of its own .MAP files. The copyright owner alleged that this commercial distribution constituted infringement of the game copyright. Citing Galoob in passing, the district court denied the copyright owner's motion for preliminary injunction, holding that:
[T]he court is not convinced that the movants have shown that the data sequence in the [accused infringer's CD-ROM] files is subject to copyright protection.
Furthermore, the court finds that [accused infringer and declaratory plaintiff] Microstar has shown that the audiovisual elements which appear on the screen [when playing the additional levels] originate from [the copyright owner's] Duke 3D, and not from [the accused infringer's] Nuke It. Id. at 1316 (paragraphing supplied).
The Ninth Circuit reversed the denial of a preliminary injunction. In an opinion by the always-interesting Judge Kozinski, the court first explained its understanding of the technology at issue:
In order to understand FormGen's claims, one must first understand the way D/N‑3D [Duke Nukem 3D] works. The game consists of three separate components: the game engine, the source art library and the MAP files.
The game engine is the heart of the computer program; in some sense, it is the program. It tells the computer when to read data, save and load games, play sounds and project images onto the screen.
In order to create the audiovisual display for a particular level, the game engine invokes the MAP file that corresponds to that level. Each MAP file contains a series of instructions that tell the game engine (and, through it, the computer) what to put where. For instance, the MAP file might say scuba gear goes at the bottom of the screen. The game engine then goes to the source art library, finds the image of the scuba gear, and puts it in just the right place on the screen.
The MAP file describes the level in painstaking detail, but it does not actually contain any of the copyrighted art itself; everything that appears on the screen actually comes from the art library.
Think of the game's audiovisual display as a paint‑by‑numbers kit. The MAP file might tell you to put blue paint in section number 565, but it doesn't contain any blue paint itself; the blue paint comes from your palette, which is the low‑tech analog of the art library, while you play the role of the game engine.
When the player selects one of the N/I levels, the game engine references the N/I MAP files, but still uses the D/N‑3D art library to generate the images that make up that level. Id., 154 F.3d at 1110 (footnotes omitted, paragraphing added).
Judge Kozinski's opinion then analogized the MAP files of the Duke Nukem game to more-familiar art forms:
In the present case the audiovisual display that appears on the computer monitor when a N/I level is played is described—in exact detail—by a N/I MAP file.
This raises the interesting question whether an exact, down to the last detail, description of an audiovisual display (and–by definition–we know that MAP files do describe audiovisual displays down to the last detail) counts as a permanent or concrete form for purposes of Galoob.
We see no reason it shouldn't. What, after all, does sheet music do but describe in precise detail the way a copyrighted melody sounds? To be copyrighted, pantomimes and dances may be “described in sufficient detail to enable the work to be performed from that description.”
Similarly, the N/I MAP files describe the audiovisual display that is to be generated when the player chooses to play D/N‑3D using the N/I levels. Because the audiovisual displays assume a concrete or permanent form in the MAP files, Galoob stands as no bar to finding that they are derivative works.
Id. at 1111-12 (citations omitted, paragraphing edited). The Ninth Circuit court concluded that, as to the question of substantial similarity of ideas and expression, “FormGen will doubtless succeed in making these showings since the audiovisual displays generated when the player chooses the N/I levels come entirely out of D/N‑3D's source art library.” Id. at 1112. It explained that:
The work that Micro Star infringes is the D/N‑3D story itself–a beefy commando type named Duke who wanders around post‑Apocalypse Los Angeles, shooting Pig Cops with a gun, lobbing hand grenades, searching for medkits and steroids, using a jetpack to leap over obstacles, blowing up gas tanks, avoiding radioactive slime.
A copyright owner holds the right to create sequels, and the stories told in the N/I MAP files are surely sequels, telling new (though somewhat repetitive) tales of Duke's fabulous adventures.
A book about Duke Nukem would infringe for the same reason, even if it contained no pictures.
Id. (footnote and citations omitted).
9.10.7 Copying the “Structure, Sequence, and Organization” of Software: The
Successive-Filtration Test
:CUSTOMID: copying-the-structure-sequence-and-organization-of-software-the-successive-filtration-test
As the Second Circuit noted in its famous Altai decision, under classical copyright principles it is well-settled that “[a]s a general matter, and to varying degrees, copyright protection extends beyond a literary work's strictly textual form to its non‑literal components.” The court pointed out that
As we have said, “[i]t is of course essential to any protection of literary property [sic] … that the right cannot be limited literally to the text, else a plagiarist would escape by immaterial variations.”
Thus, where “/the fundamental essence or structure/ of one work is duplicated” … courts have found copyright infringement.
Computer Associates International, Inc., v. Altai, Inc., 982 F.2d 693, 701 (2d Cir. 1992) (emphasis and paragraphing added, extensive citations omitted).
Where software is concerned, deciding actual cases on that basis has often proved to be difficult because of a countervailing policy: “It is a fundamental principle of copyright law that a copyright does not protect an idea, but only the expression of the idea. This axiom of common law has been incorporated into the governing statute,” which provides that “[i]n no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.” Altai, 982 F.2d at 703, citing Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879) (holding that plaintiff who developed accounting system and published a book explaining it could not prevent others from using system); 17 U.S.C. § 102(b).
The struggle to define a workable analysis of software copyright claims is fueled by two competing policy currents underlying American intellectual property law generally and copyright law. The law restricts copying of innovations in certain circumstances, to provide innovators with incentives to come forward with their work. On the other hand, the law also limits the protection afforded to innovation because it favors vigorous competition in the marketplace—including copying of unprotected innovation so that the benefits thereof will quickly be disseminated to the public. See, e.g., 35 U.S.C. §§ 102, 103 (prohibiting patent protection for inventions that are not new or that would have been obvious to a person of ordinary skill); 17 U.S.C. § 102(b) (prohibiting copyright protection for “any idea, procedure, process, system, method of operation, concept, principle or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work”). See also, e.g., Feist Publications, Inc., v. Rural Telephone Service Co., 499 U.S. 340, 111 S. Ct. 1282, 1286 (1991) (O'Connor, J.; holding that white pages of telephone directory are not copyrightable as a compilation of facts and that factual information therein can be freely copied; competitors may not be forced to incur costs that would result from being forced to generate a new compilation from scratch), discussed supra § 2.1[b]; Bonito Boats, Inc., v. Thunder Craft Boats, Inc., 489 U.S. 141, 109 S. Ct. 971, 981, 984-85 (1989) (O'Connor, J.; holding that state law prohibiting plug-molding methods of copying boat hulls was preempted by federal patent law, which implicitly establishes a federal right to copy unpatented articles; state law may not interfere with public's right to economic benefits of most efficient method of manufacturing unpatented articles).
As the Supreme Court has noted on a number of occasions, “[t]he primary objective of copyright is not to reward the labor of authors, but ‘[t]o promote the Progress of Science and useful Arts.'” Feist, 499 U.S. at 349, 111 S. Ct. at 1290, quoting U.S. Const. art. I, § 8, cl. 8.
As a result, to establish a claim of copyright infringement, a plaintiff must show both (a) ownership of a valid copyright and (b) that the defendant copied protectable elements of the copyrighted work. See Feist, 499 U.S. at 361, 111 S. Ct. at 1295-96; Altai, 982 F.2d at
For a while, the courts definitely seemed to favor copyright owners, who frequently were able to obtain expansive protection of “nonliteral” elements of their software. In recent years, however, the courts appear to have been markedly more conservative in the scope of protection afforded to such nonliteral elements.
At least for the moment, the most popular non-literal copyright infringement analysis for computer software seems to be the three-pronged “successive filtration” test articulated in Altai, with variations by other courts, notably Gates Rubber.
(That test may also be appropriate in cases where literal copying is alleged as well. Bateman, 79 F.3d at 1543-46 (reversing judgment on jury verdict of copyright infringement and remanding for new trial; holding that district court erred in instructing jury that Altai analysis was applicable only to nonliteral copying).)
In Altai, the Second Circuit gently rejected the Third Circuit's much-criticized “structure, sequence, and organization” approach in Whelan v. Jaslow. Whelan Assocs., Inc. v. Jaslow Dental Laboratories, 797 F.2d 1222, 1236-43 (3d Cir. 1986) (affirming judgment of infringement on basis of similarity in “structure, sequence, and organization”).
Instead, the Altai court adapted Learned Hand's “levels of abstraction” analysis from Nichols v. Universal Pictures Co. Nichols v. Universal Picture Co., 45 F.2d 119, 121 (2d Cir. 1930). It suggested that a three-part approach should be used to test whether an accused computer program is “substantially similar” to, and thus might infringe the exclusive rights in, a copyrighted program:
In ascertaining substantial similarity under this approach, a court would/[:]/
[1] [F]irst break down the allegedly infringed program into its constituent structural parts.
[2] Then, by examining each of these parts for such things as [a] incorporated ideas, [b] expression that is necessarily incidental to those ideas, and [c] elements that are taken from the public domain, a court would then be able to sift out all non-protectable material.
[3] Left with a kernel, or possible kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement.
Altai, 982 F.2d at 706 (paragraphing and bracketed numbering supplied). The Second Circuit affirmed as not clearly erroneous the judgment below that, on the evidence presented, the accused software was not substantially similar to the copyrighted software in any protectable respect. Id. at 715.
The Tenth Circuit's Gates Rubber opinion approved the use of a variation of the Altai analysis: Abstraction is still to be performed first, but filtration could come after comparison because that sequence of analysis is likely to present a clearer picture whether impermissible copying has occurred. Gates Rubber Co., 9 F.3d at 833 n.7; see also Mitel, 124 F.3d at 1372 (“the appropriate test to be applied and the order in which its various components are to be applied … may vary depending upon the claims involved, the procedural posture of the suit, and the nature of the [works] at issue”), quoting Gates Rubber Co., 9 F.3d at 834 n. 12.
The Fifth Circuit followed the Gates Rubber order of analysis in Engineering Dynamics, 26 F.3d at 1342-43, and in CMAC Computer Management Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d 396 (5th Cir. 2000) (affirming bench-trial judgment of no infringement; features of software for picture-framing industry for which copyright protection was claimed were dictated by standard industry practices and by specific needs of business).
Six Levels of Declining Abstraction
In any given case, the abstraction step is likely to be heavily dependent on the imaginativeness of the plaintiff's trial counsel and expert witness in discerning “creative” elements of the computer program. The Gates Rubber court set out a series of factors that could be regarded as creative elements, which it referred to as “at least six levels of generally declining abstraction: (i) the main purpose, (ii) the program structure, (iii) modules, (iv) algorithms and data structures, (v) source code, and (vi) object code.” Gates Rubber Co., 9 F.3d at 835, quoted in Baystate Technologies, 946 F. Supp. at 1089. Other courts appear to be using these six levels at least as a starting point. See, e.g., Baystate Technologies, 946 F. Supp. at 1089; Harbor Software, Inc. v. Applied Systems, Inc., 925 F. Supp. 1042, 1046-47, subsequent proceeding, 936 F. Supp. 167 (S.D.N.Y. 1996) (granting in part and denying in part defendant's motion for summary judgment).
The abstraction step is likely to be unnecessary if the copyright owner specifically identifies the non-literal program elements that allegedly are infringe (perhaps in response to contention interrogatories propounded by the defendant). The MiTek court noted that “the district court took at face value MiTek's representations as to what elements of the ACES program MiTek considered to be protectable expression. In accepting MiTek's representations, the district court committed no error.” MiTek, 89 F.3d at 1555; see also Mitel, 124 F.3d at 1372 (“[n]ot every case requires an extensive abstraction‑filtration-comparison analysis”).
Filtration of Unprotectable Subject Matter
The filtration step in the Altai analysis is perhaps the most critical one, and arguably the most problematic. Perhaps for that reason, in the 1996 Harbor Software opinion, a district court ruled that the filtration process is a matter for the court, not for the jury, reasoning by analogy to the Supreme Court's Markman decision in the patent arena. See Harbor Software, 925 F. Supp. at 1046-47.
Filtration of externally-dictated factors: The Altai court noted that aspects of a program might be unprotectable if they are constrained by efficiency considerations, by factors external to the program itself (e.g., features required by specifications of the computer and supporting software, or by industry standards and customary programming practices), or by the existence of a limited number of ways to design the program in relevant respect. See Altai, 982 F.2d at 707-10. Other courts have followed Altai's lead on that point. See, e.g., MiTek, 89 F.3d at 1557 n.20 (alternative holding; even if ACES program's menu structure were not unprotectable as a method of operation, it was unprotectable because it tracked the way in which human workers did job in question); Engineering Dynamics, 46 F.3d at 410 (directing district court to determine on remand whether data formats were so influenced by industry practice as to be unprotectable); Baystate Technologies, 946 F. Supp. at 1088-89 (holding that selection of data-structure names was driven by industry-standard practice and by efficiency considerations and therefore was unprotectable); Harbor Software, 925 F. Supp. at 1049-52 (some aspects of program were protectable, others not because dictated by externalities). But see Control Data Systems, Inc. v. Infoware, Inc., 903 F. Supp. at 1323 (rejecting defendant's contention that externalities limited the range of choices available to programmers).
Filtration of mathematical constants: The Gates Rubber court likewise ruled that a number of the factors considered by the trial court in that case were not permissible evidence of substantial similarity, at least not without further analysis and explanation. “Mathematical constants” in particular were disapproved by the appellate court as an impermissible factor bearing on substantial similarity. The court held outright that the mathematical constants in question were unprotectable facts and the district court therefore should not have treated similarity in constants as evidence of infringement. Gates Rubber Co., 9 F.3d at 844; see also § 2.2 (cases discussing copyrightability of data).
Filtration applied to functional characteristics: The Gates Rubber appellate court also called for further explanation, “in light of the process-expression dichotomy, merger and scenes à faire doctrines,” of other similarity factors that the lower court had used, e.g.:
• menus and sorting criteria,
• control and data flow,
• engineering calculation and design modules,
• common errors,
• fundamental tasks, and
• install[ation] files.
Gates Rubber Co., 9 F.3d at 844-47/; see also/ e.g., Ashton-Tate Corp. v. Ross, 916 F.2d 516, 521-22 (9th Cir. 1990) (affirming holding that list of typical spreadsheet commands to be implemented in spreadsheet program did not rise to the level of copyrightable subject matter; plaintiff therefore was not a joint author); Healthcare Affiliated Services, Inc. v. Lippany, 701 F. Supp. 1142, 1151-52 (W.D. Pa. 1988) (refusing to enter preliminary injunction; evidence of similarities in gross-level methodology choices was insufficient to warrant finding of substantial similarity of protectable elements); NEC Corp. v. Intel Corp., 10 USPQ2d (BNA) 1177, 1183 (N.D. Cal. 1989) (crediting testimony of expert witness that many similarities were functional in nature and in some instances inevitable; finding that similarities between accused microcode and defendant's copyrighted microcode were not a result of copying of protectable elements); Q-Co Industries, Inc. v. Hoffman, 625 F. Supp. 608, 615 (S.D.N.Y. 1985) (refusing to enter preliminary injunction on copyright infringement claim on grounds that similarities between teleprompter programs were limited to elements that would have been part of any program of that kind).
Filtration as applied to screen displays: Whether screen-display similarity should be filtered out is an often-disputed point. This was one of the principal issues in Apple v. Microsoft as well as in /Lotus
- Borland/, and has arisen in other cases as well. See, e.g., MiTek,
89 F.3d at 1557-58 (program menus merely followed the same general steps that would be taken by a draftsman designing a roof truss by hand and were therefore unprotectable); Harbor Software, 925 F. Supp. at 1052 (holding that “sufficient expressive choices were made in the selection and arrangement of [screen-display elements] to satisfy the minimal requirement of originality and warrant protection”); Productivity Software Int'l Inc. v. Healthcare Technologies, Inc., 1995 WL 437526, 37 USPQ2d 1036 (S.D.N.Y. 1995) (granting summary judgment of noninfringement; “[a]ny similarity between the two menu bars is due only to the fact that industry standards dictate the limited number of command labels available”); Manufacturers Technologies, Inc. v. CAMS, Inc., 706 F. Supp. 984 (D. Conn. 1989) (holding that some screen displays and sequences of displays were protectable but others were dictated by external or functional concerns and were not protectable; Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp. 449, 455‑56 (N.D. Ga. 1987) (holding that defendant's arrangement of command prompts and status displays on computer screen infringed copyright in plaintiff's program).
Protectability of combinations of otherwise-unprotectable elements: A copyright defendant will not necessarily win just because individual “elements” of a copyrighted program are unprotectable. The court is still required to determine “whether the manner in which [the copyright owner] combined the various design elements in its software was protectible expression, and, if it was, whether [the defendant] infringed that expression.” Softel, Inc. v. Dragon Medical and Scientific Communications, Inc., 118 F.3d 955, 966-67, 43 USPQ2d 1385 (2d Cir. 1997) (vacating and remanding judgment of noninfringement).
Comparison: Close Similarity May Be Required
Conventional copyright analysis requires a showing a substantial similarity between a copyrighted work and an accused infringing work. As a practical matter, a software copyright owner asserting nonliteral infringement may be required to demonstrate that the similarities are significant in the context of the content, purpose, use, or operation of the copyrighted program and accused program as a whole. Baystate, 946 F. Supp. at 1090.
An even more stringent standard may be imposed if a Feist copyright is claimed in an original selection or arrangement of otherwise-unprotectable elements. In that case, the copyright owner is likely to be required to demonstrate that in that respect the accused software is “virtually identical” to the copyrighted software. MiTek, 89 F.3d at 1558-59 (holding that where copyright is claimed in a compilation of otherwise-unprotectable elements, accused program must meet “virtual identicality” standard), citing with approval Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1446 (9th Cir.1994) (noting that, in the case of alleged infringement of a work as a whole (i.e., a compilation), “there can be no infringement unless the works are virtually identical”). MiTek, 89 F.3d at 1558-59 (holding that where copyright is claimed in a compilation of otherwise-unprotectable elements, accused program must meet “virtual identicality” standard).
9.10.8 “Cracking” of Copyright Protection as Violation of Digital Millennium
Copyright Act
:CUSTOMID: cracking-of-copyright-protection-as-violation-of-digital-millennium-copyright-act
[Portions of this section are adapted from Universal City Studios, Inc. v. Reimerdes, /82 F.Supp.2d 211 (S.D.N.Y. 2000) (granting preliminary injunction against distribution of “DeCSS” software, used for cracking code protecting movies recorded on digital versatile disks or “DVDs”),/ subsequent proceeding, 111 F. Supp. 294 (S.D.N.Y. 2000) (granting permanent injunction), affirmed sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001); /and from a U.S. Copyright Office summary of the DMCA available on the World Wide Web at www.loc.gov; no copyright claimed in works of the U.S. Government.]/
The Prohibition Against Circumvention of
Access‑Control or Copy‑Protection Measures
:CUSTOMID: the-prohibition-against-circumvention-of-accesscontrol-or-copyprotection-measures
The Digital Millennium Copyright Act (DMCA) added a new chapter 12 to Title 17 of the U.S. Code, in which the Copyright Act is codified. In the new chapter, section 1201 implements an obligation to provide adequate and effective protection against circumvention of technological measures used by copyright owners to protect their works.
Section 1201 divides technological measures into two categories: (i) /measures that prevent unauthorized /access to a copyrighted work, and (ii) /measures that prevent unauthorized /copying of a copyrighted work. Making or selling devices or services that are used to circumvent either category of technological measure is prohibited in certain circumstances, described below. As to the act of circumvention in itself, the provision prohibits circumventing the first category of technological measures, but not the second. This distinction was employed to assure that the public will have the continued ability to make fair use of copyrighted works.
Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited.
In particular, section 1201(a)(2) provides that:
No person shall … offer to the public, provide or otherwise traffic in any technology … that–
(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act];
(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under [the Copyright Act]; or
(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act].
17 U.S.C. § 1201(a)(2).
The statute defines “circumvent a technological measure” to mean descrambling a scrambled work, decrypting an encrypted work, or “otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A).
The statute explains further that “a technological measure ‘effectively controls access to a work' if the measure, in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to a work.” Id. § 1201(a)(3)(B).
Selected cases:
RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311 (W.D. Wash. Jan. 18, 2000) (granting order for preliminary injunction) [summary adapted from opinion]: RealNetworks offered “RealPlayer” software that enable consumers to access audio and video content, in “RealMedia” format, over the Internet through a process known as “streaming.” When an audio or video clip is “streamed” to a consumer, no trace of the clip is left on the consumer's computer, unless the content owner has permitted the consumer to download the file. Streaming is contrasted with “downloading,” a process by which a complete copy of an audio or video clip is delivered to and stored on a consumer's computer. Once a consumer has downloaded a file, he or she can access the file at will, and can generally redistribute copies of that file to others. The court noted that to guard against the unauthorized copying and redistribution of their content, many copyright owners do not make their content available for downloading, and instead distribute the content using streaming technology in a manner that does not permit downloading.
The Streambox VCR software enabled end‑users to access and download copies of RealMedia files that are streamed over the Internet. In order to gain access to RealMedia content located on a server running RealNetworks' server software (“RealServer”), the VCR software mimicked RealPlayer software and circumvented the authentication procedure, or Secret Handshake, that a RealServer required before it would stream content. In other words, the Streambox VCR was able to convince the RealServer into thinking that the VCR was, in fact, a RealPlayer. Having convinced a RealServer to begin streaming content, the Streambox VCR, like the RealPlayer, acted as a receiver. However, unlike the RealPlayer, the VCR ignored the Copy Switch instruction that told a RealPlayer whether an end‑user was allowed to make a copy of (i.e., download) the RealMedia file as it is being streamed. The VCR thus allowed the end‑user to download RealMedia files even if the content owner had used the Copy Switch instruction to prohibit end‑users from downloading the files. The Streambox VCR thus circumvented both the access control and copy protection measures.
The court held that the Streambox VCR software met two of the three alternative tests for liability under the DMCA, because (i) at least a part of the Streambox VCR software was primarily, if not exclusively, designed to circumvent the access control and copy protection measures that RealNetworks afforded to copyright owners, and (ii) the portion of the VCR software that circumvented the Secret Handshake so as to avoid the Copy Switch instruction had no significant commercial purpose other than to enable users to access and record protected content and did not appear to have any other commercial value. Id., 2000 WL 127311 at *7.
Exceptions to the Anti-Circumvention Prohibition
The anti-circumvention prohibitions contained in section 1201 are subject to a number of exceptions. One is an exception to the operation of the entire section, for law enforcement, intelligence and other governmental activities. (Section 1201(e)). The others relate to section 1201(a), the provision dealing with the category of technological measures that control access to works.
The broadest of these exceptions, section 1201(a)(1)(B)-(E), establishes an ongoing administrative rule-making proceeding to evaluate the impact of the prohibition against the act of circumventing such access-control measures This conduct prohibition does not take effect for two years. Once it does, it is subject to an exception for users of a work which is in a particular class of works if they are or are likely to be adversely affected by virtue of the prohibition in making noninfringing uses.
The applicability of the exemption is determined through a periodic rulemaking by the Librarian of Congress, on the recommendation of the Register of Copyrights, who is to consult with the Assistant Secretary of Commerce for Communications and Information.
The six additional exceptions are as follows:
1. Nonprofit library, archive and educational institution exception (section 1201(d)). The prohibition on the act of circumvention of access control measures is subject to an exception that permits nonprofit libraries, archives and educational institutions to circumvent solely for the purpose of making a good faith determination as to whether they wish to obtain authorized access to the work.
2. Reverse engineering (section 1201(f)). This exception permits circumvention, and the development of technological means for such circumvention, by a person who has lawfully obtained a right to use a copy of a computer program for the sole purpose of identifying and analyzing elements of the program necessary to achieve interoperability with other programs, to the extent that such acts are permitted under copyright law.
3. Encryption research (section 1201(g)). An exception for encryption research permits circumvention of access control measures, and the development of the technological means to do so, in order to identify flaws and vulnerabilities of encryption technologies.
4. Protection of minors (section 1201(h)). This exception allows a court applying the prohibition to a component or part to consider the necessity for its incorporation in technology that prevents access of minors to material on the Internet.
5. Personal privacy (section 1201(i)). This exception permits circumvention when the technological measure, or the work it protects, is capable of collecting or disseminating personally identifying information about the online activities of a natural person.
6. Security testing (section 1201(j)). This exception permits circumvention of access control measures, and the development of technological means for such circumvention, for the purpose of testing the security of a computer, computer system or computer network, with the authorization of its owner or operator.
Selected cases:
Universal City Studios, Inc. v. Reimerdes, 82 F. Supp.2d 211 (S.D.N.Y.
- (granting preliminary injunction), subsequent proceeding,
111 F. Supp. 294 (S.D.N.Y. 2000) (granting permanent injunction), affirmed sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001): In this early case brought under the DMCA, several of the foregoing exceptions to liability were held not to shield “content crackers” from liability. The Reimerdes case was another episode in the continuing battle of the movie industry against unauthorized copies; cf. Sony Corp. of America v. Universal City Studios, 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (holding that home use of video cassette recorders (VCRs) for “time-shifting” recording of movies and other programming broadcast on television did not infringe copyrights in the programming).
The Reimerdes defendants had posted, on the Web, software known as DeCSS. That software could crack the Content Scramble System (“CSS_”) encryption that provides anti-copying protection for movies distributed on DVD (digital versatile discs). Several movie studios filed suit against them. The defendants claimed that they were entitled to the benefit of the reverse-engineering, encryption-research, and security-testing exceptions to liability. The court had no trouble rejecting the defendants' claims, see 82 F. Supp.2d at 217-20; it granted a preliminary injunction and later a permanent injunction. The permanent injunction prohibited even linking to other Web sites containing the DeCSS code; the Second Circuit had no trouble affirming that prohibition against a free-speech challenge. See 273. F3d art 455-58.
DVD Copy Control Ass'n v. Bunner, 2001 WL 1340619 (Cal. App. 6 Dist. Nov. 1, 2001): In a trade-secret case under state law, a California appellate court looked to the First Amendment in reversing a preliminary injunction that had prohibited the defendant from posting DeCSS source code on his Web site. The appellate court held that “DeCSS is a written expression of the author's ideas and information about decryption of DVDs without CSS.” Id. at __. The court then held that “the trial court's preliminary injunction barring Bunner from disclosing DeCSS can fairly be characterized as a prohibition of ‘pure' speech.” Id. at __.
Without deciding whether the defendant had engaged in misappropriation of trade secrets, the Bunner court held that the plaintiffs' trade-secret interests were trumped by the defendant's First Amendment free-speech rights. Whereas the DMCA's copyright-based prohibitions were constitutionally grounded in the Copyright Clause, trade-secret law “lacks any constitutional foundation. Consequently, a clash between the trade secrets law and the First Amendment does not involve a balancing between two constitutional interests.” Id. at __. Moreover, “injunctions in copyright infringement cases have been upheld on the ground that First Amendment concerns are protected by and coextensive with the [Copyright Act's] fair use doctrine.” Id. at __ (citation and internal quotation marks omitted). Finally, “the statutory prohibition on disclosures of trade secrets is of infinite duration rather than ‘for limited Times.' While the limited period of copyright protection authorized by the United States Constitution ensures that copyrighted material will eventually pass into the public domain, thereby serving the public interest by increasing its availability to the general public, the [Uniform Trade Secrets Act] bars disclosure of a trade secret for a potentially infinite period of time, thereby ensuring that the trade secret will never be disclosed to the general public.” Id. at __.
The Bunner court distinguished cases where injunctions were granted to enforce nondisclosure agreements: “The enforcement of a contractual nondisclosure obligation does not offend the First Amendment. A voluntary agreement not to disclose a trade secret ordinarily waives any First Amendment protection for an ensuing disclosure.” Id. at __.
No “Betamax” Fair-Use Defense Under the DMCA
As discussed in the RealNetworks opinion summarized in § 2.7[h][1], the DMCA does not provide a “time-shifting” fair-use defense under the Sony “Betamax” doctrine in traditional copyright law (see § 2.9[a]). See RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311 at *7-9 (W.D. Wash. Jan. 18, 2000) (granting order for preliminary injunction) (reviewing statutory language).
9.10.9 Removal of “Copyright Management Information”
/[This subsection is adapted, largely verbatim, from a U.S. Copyright Office summary, available on the World Wide Web at www.loc.gov; no copyright claimed in works of the U.S. Government.]/
As part of the Digital Millennium Copyright Act (DMCA), Congress enacted new section 1202 in Title 17 to protect the integrity of copyright management information (CMI). CMI is defined as identifying information about a copyrighted work, the author, the copyright owner, and in certain cases, the performer, writer or director of the work, as well as the terms and conditions for use of the work, and such other information as the Register of Copyrights may prescribe by regulation. (Information concerning users of works is explicitly excluded.) See 17 U.S.C. § 1202(c).
The scope of the protection is set out in two separate paragraphs, the first dealing with false CMI and the second with removal or alteration of CMI:
- Subsection (a) prohibits the knowing provision or distribution of false CMI, if done with the intent to induce, enable, facilitate or conceal infringement.
- Subsection (b) bars the intentional removal or alteration of CMI without authority, as well as the dissemination of CMI or copies of works, knowing that the CMI has been removed or altered without authority. Liability under subsection (b) requires that the act be done with knowledge or, with respect to civil remedies, with reasonable grounds to know that it will induce, enable, facilitate or conceal an infringement.
See 17 U.S.C. § 1202(a), (b).
Section 1202 is subject to a general exemption for law enforcement, intelligence and other governmental activities. See 17 U.S.C. § 1202(d). It also contains limitations on the liability of broadcast stations and cable systems for removal or alteration of CMI in certain circumstances where there is no intent to induce, enable, facilitate or conceal an infringement. See 17 U.S.C. § 1202(e).
9.11 Copyright Infringement and the Internet
A variety of Internet activities may violate the exclusive rights of one or more copyright owners if done without authorization.
9.11.1 Posting to Web Sites, Etc.
Posting a work to an Internet-accessible server – e.g., posting the work on a Web site from which it can be downloaded by others – can infringe one or more copyrights. Examples include:
- posting someone else's copyrighted music, text, graphic, computer program, etc. to a Web site or a Usenet newsgroup.
- transmitting the text of someone else's book, article, etc., via an email message or via one of the file-sharing software systems such as Napster.
Selected cases:
UMG Recordings, Inc. v. MP3.com, Inc., 92 F. Supp.2d 349 (S.D.N.Y.
- (granting motion for partial summary judgment of copyright
infringement) [the summary below is adapted from the opinion at 350]: The technology known as “MP3” permits rapid and efficient conversion of compact disc recordings (“CDs”) to computer files easily accessed over the Internet. See generally Recording Industry Ass'n of America v. Diamond Multimedia Systems Inc., 180 F.3d 1072, 1073‑74 (9th Cir.1999). Utilizing this technology, defendant MP3.com launched its “My.MP3.com” service, which was advertised as permitting subscribers to store, customize and listen to the recordings contained on their CDs from any place where they have an Internet connection. To make good on that offer, MP3.com purchased tens of thousands of popular CDs in which plaintiffs held the copyrights, and, without authorization, copied their recordings onto its computer servers so as to be able to replay the recordings for its subscribers. To access such a recording, a subscriber to MP3.com was required either to “prove” that he already owns the CD version of the recording by inserting his copy of the commercial CD into his computer CD‑Rom drive for a few seconds (the “Beam‑it Service”) or to purchase the CD from one of MP3.com's cooperating online retailers (the “instant Listening Service”). Thereafter, however, the subscriber was able to access via the Internet from a computer anywhere in the world the copy of plaintiffs' recording made by defendant. MP3.com sought to portray its service as the “functional equivalent” of storing its subscribers' CDs, but in actuality, the court found, it was re‑playing for the subscribers converted versions of the recordings it copied, without authorization, from plaintiffs' copyrighted CDs. The court held that “[o]n its face, this makes out a presumptive case of infringement under the Copyright Act of 1976 …” 92 F. Supp.2d at 350 (citations and footnote omitted). The court also rejected MP3.com's “fair use” defense as discussed infra at § 2.9[a][2].
Religious Technology Center v. Lerma, 1996 WL 633131, 40 USPQ2d 1569 (E.D. Va. 1996): The defendant had downloaded or scanned copyrighted materials owned by the Church of Scientology. The court granted summary judgment of copyright infringement.
Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995): The Church of Scientology sued Internet service provider Netcom for infringement because of postings made via Netcom. The court granted Netcom's motion for summary judgment that Netcom was not a direct infringer of Scientology copyrights in materials posted to Usenet, but denied the motion as to contributory infringement claim, because a fact issue existed about Netcom's knowledge of the infringing activities.
Michaels v. Internet Entertainment Group, Inc., 5 F. Supp. 2d 823 (C.D. Cal. 1998): The court granted a preliminary injunction against posting, on the Web, digitized videos of rock star Brent Michaels and actor Pamela Anderson Lee having sexual intercourse; such distribution would conflict with Lee's and Michaels's exclusive rights to distribute copies of the videotape to the public and to publicly display the videotape.
Marobie-FL, Inc. v. Nat'l Ass'n of Fire Equipment Distributors, 983 F. Supp. 1167 (N.D. Ill. 1997): The court granted partial summary judgment that the defendant was liable for posting a copyrighted collection of clip art on its Web site. Id. at 1173.
9.11.2 “Sharing” of Copyrighted Files Over the Internet
Universal City Studios, Inc. v. Reimerdes, 82 F.Supp.2d 211, subsequent proceeding, 111 F.Supp.2d 294 (S.D.N.Y. 2000): The court enjoined the defendants from posting DeCSS software on their Web sites as summarized in § 2.7[h][1]); see also § 2.8[g] (court enjoins Reimerdes defendants from linking to other sites hosting the DeCSS software).
A & M Records, Inc. v. Napster, Inc., 114 F.Supp.2d 896 (N.D. Cal. 2000), aff'd in pertinent part, rev'd in part and remanded, 239 F.3d 1004 (9th Cir. 2001), after remand, 284 F.3d 1091 (9th Cir. 2002) (affirming modified shut-down injunction): [this summary adapted from district court opinion]: A & M Records and seventeen other record companies (“record company plaintiffs”) filed a complaint for contributory and vicarious copyright infringement, among other claims, against Napster, Inc., an Internet start‑up that enables users to download MP3 music files without payment. The plaintiffs successfully moved for a preliminary injunction prohibiting Napster from engaging in or assisting others in copying, downloading, uploading, transmitting, or distributing copyrighted music without the express permission of the rights owner. The Ninth Circuit noted that “[t]he mere existence of the Napster system, absent actual notice and Napster's demonstrated failure to remove the offending material, is insufficient to impose contributory liability,” but it also noted that because Napster had a financial interest in the infringement, “Napster may be vicariously liable when it fails to affirmatively use its ability to patrol its system and preclude access to potentially infringing files listed in its search index.” 239 F.3d at 1027 (emphasis added).
9.11.3 Infringement Liability for Web Surfing Per Se?
Unauthorized posting of a copyrighted work on the World Wide Web obviously can constitute copyright infringement. Such a transmission results in the creation of a copy on one or more computers. If done without authorization, creation of such a copy violates the copyright owner's exclusive right to make copies of the work.
What about the person who uses a Web browser to retrieve information from a Web site (a “Web surfer”)? Suppose that Jane Doe uses her Web browser to view a copyrighted work on a Web site. In doing so, she is causing a copy of the work to be created in the working memory, i.e., RAM, of her computer, and probably also more permanently “in cache” on her hard disk drive. Cf. MAI Systems Corp. v. Peak Computer Inc., 991 F.2d 511, 518-19 (9th Cir. 1993) (affirming summary judgment of infringement; copying of a computer program into a computer's working memory (RAM) to run the program created an embodiment that could be “perceived, reproduced, or otherwise communicated” under section 101 of the Copyright Act, 17 U.S.C. § 101, and consequently was sufficiently “fixed” to qualify as a “copy,” giving rise to infringement liability). The question then arises: Were those copies authorized?
If the copyrighted work was posted on the Web site by the copyright owner itself (or with the owner's permission), then the surfing / copying likely would be deemed to have been implicitly and perhaps even explicitly authorized by the owner. After all, the whole point of posting a document on the Web is to permit convenient viewing — i.e., making of at least a temporary copy — of a document by others.
On the other hand, if the copyrighted work was posted on the Web site without the copyright owner's permission, then theoretically the surfer might be liable for making an unauthorized copy, whether or not s/he knew that the material had not been authorized for posting. The surfer is in fact causing a copy to be made from the Web site. While innocence does provide a limited shield against a statutory damages award, it is not a defense to liability; “[a]s a matter of law, ‘innocent infringement,' or copying from a third source wrongfully copied from the plaintiff, without knowledge that the third source was infringing, does not absolve a defendant of liability for copyright infringement.” Lipton v. The Nature Co., 71 F.3d 464, 471 (2d Cir.
- (affirming summary judgment of infringement; even giving credit to
evidence of innocence, defendant was not entitled to assert innocent-infringer defense).
(The Copyright Act provides for a reduced award of statutory damages (as opposed to profits and proven actual damages), in the discretion of the court, if the defendant proves that it did not know and had no reason to believe it was infringing. See 17 U.S.C. § 504(c)(2).)
In such a situation Jane Doe, the accused Web surfer, might be able to assert absent some sort of fair-use defense. See 17 U.S.C. § 107 (fair-use defense).
9.11.4 Trespass Liability for Web Surfing Per Se?
Now consider the situation in which a Web site contains a link to a page of information, but the link text says, in effect, “If you are a lawyer, you are not allowed to access this information.” According to the court in eBay, Inc. v. Bidder's Edge, Inc., 100 F. Supp. 1058 (N.D. Cal.
- (granting preliminary injunction), the Web site owner can use a
trespass-to-chattels theory to block access to lawyers, or to other unauthorized human- or electronic-robot searchers. See id. at 1069-70 The court held:
[I]t is undisputed that eBay's server and its capacity are personal property, and that BE's searches use a portion of this property. Even if, as BE argues, its searches use only a small amount of eBay's computer system capacity, BE has nonetheless deprived eBay of the ability to use that portion of its personal property for its own purposes. The law recognizes no such right to use another's personal property. Accordingly, BE's actions appear to have caused injury to eBay and appear likely to continue to cause injury to eBay. If the court were to hold otherwise, it would likely encourage other auction aggregators to crawl the eBay site, potentially to the point of denying effective access to eBay's customers. If preliminary injunctive relief were denied, and other aggregators began to crawl the eBay site, there appears to be little doubt that the load on eBay's computer system would qualify as a substantial impairment of condition or value. California law does not require eBay to wait for such a disaster before applying to this court for relief.
Id. at 1071-72.
9.11.5 Web Site Mirroring
Mirroring is a practice in which the operator of an Internet-connected computer duplicates another person's Web site so that the computer's users will have access to the site's contents without having to request it from the site itself. While this can result in the users in question having faster access (because the need to go out on the ‘Net to obtain the contents is eliminated), it also raises issues of copyright infringement. While it seems clear that individual browsing is probably authorized, at least by the site, it also seems clear that mirroring may not be within the scope of that authorization — and if not, may constitute copyright infringement.
9.11.6 Framing of, Others' Web Sites
Some Web sites engage in “framing,” which typically involves setting up a multiple-frame page with a “contents” frame including a collection of Web links and a “viewer” frame on the other:
| Contents Frame | Viewer Frame |
| A table-of-contents frame includes a collection of links to other sites. | The content of framed sites is displayed in this viewer frame. The Web surfer can display content from different framed sites by clicking on a link in the contents frame (to the immediate left)/./ |
| Advertising Frame | |
| Ad content is displayed to the Web surfer – the content created by the proprietors of the framed sites is used to generate ad revenue for the framing site. |
Hypothetical example of “framing” others' Web sites
Framing has led to at least one lawsuit: In early 1997 the operators of the TotalNews site, www.totalnews.com, which frames a variety of news organizations' Web sites, was sued for copyright infringement (and trademark infringement) by a number of those organizations. An Arizona Business Gazette report of the filing of the suit, apparently taken largely from the TotalNews press release, is posted at http://www.azcentral.com/depts/work/news/abg/0227tot.shtml.
The only court known to have addressed the issue, however, apparently did not regard framing as particularly heinous and declined to issue a preliminary injunction, a decision which was affirmed by the Ninth Circuit. In that case, the frame site was by a company called Futuredontics; the framing site was by Applied Anagramics, Inc. (AAI). As the Ninth Circuit reported in an unpublished opinion, “Futuredontics' claim, that the AAI framed link ‘falsely implies that AAI–not Futuredontics–is responsible for the success of Futuredontics's dental referral service,' even if true, is not tied to any tangible loss of business or customer goodwill. We do not find that the district court abused its discretion in denying a preliminary injunction.” Futuredontics, Inc. v. Applied Anagramics, Inc., 1998 WL 417413 (9th Cir. 1998) (unpublished) (affirming denial of preliminary injunction).
One issue may be whether the displays created by framing the sites of CNN, etc., are unauthorized “derivative works” based on the underlying works. The owners of the copyrights in the underlying works might make such an argument by analogy to cases holding that purchasing copies of copyrighted art and mounting them in decorative frames for resale constitutes infringement because it “recast[s]” and “transform[s]” the copyrighted works. See Mirage Editions, Inc. v. Albuquerque A.R.T. Co., 856 F.2d 1341 (9th Cir. 1988) (holding that removal of copyrighted art images from commemorative art book and affixing them to individual tiles constituted infringement as a matter of law); Greenwich Workshop, Inc. v. Timber Creations, Inc., 932 F. Supp. 1210 (C.D. Cal. 1996) (same; granting motion for partial summary judgment of infringement).
9.11.7 Linking to Others' Web Sites
A ubiquitous feature of the Web is the “link farm,” i.e., collections of links to other Web sites. Linking has generated controversy, although apparently on trademark grounds: Ticketmaster Group Inc. filed suit against Microsoft, whose “Seattle Sidewalk” Web site contained links directly to specific pages on Ticketmaster's own site, permitting Web surfers to bypass the Ticketmaster home page and the advertising on the Ticketmaster site. Bruce Orwall, Ticketmaster Sues Microsoft Corp. over Internet Link, Wall St. J., Apr. 29, 1997, at B8, col. 6.
It seems likely that one of the principal issues in such disputes will be the extent to which a Web site operator implicitly consents to having other sites assist Internet users by making links available in this way.
In Reimerdes, a court enjoined defendants from linking to Web sites containing “DeCSS” software for circumventing access-control mechanisms for DVD movies in violation of the Digital Millennium Copyright Act. Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000) (Kaplan, J.) [summary below adapted from opinion], affirmed sub nom. Universal City Studios, Inc. v. Corley, 273 F3d 429 (2d. Cir. 2001). In granting the anti-linking injunction, Judge Kaplan considered whether such an injunction would infringe the defendants' free speech rights under the First Amendment. It reasoned that
Just as the potential chilling effect of defamation suits has not utterly immunized the press from all actions for defamation, however, the potential chilling effect of DMCA liability cannot utterly immunize web site operators from all actions for disseminating circumvention technology. And the solution to the problem is the same: the adoption of a standard of culpability sufficiently high to immunize the activity, whether it is publishing a newspaper or linking, except in cases in which the conduct in question has little or no redeeming constitutional value.
Id., 111 F. Supp. 2d at 340. Judge Kaplan then articulated a test for granting anti-linking injunctive relief:
Accordingly, there may be no injunction against, nor liability for, linking to a site containing circumvention technology, the offering of which is unlawful under the DMCA, absent clear and convincing evidence that those responsible for the link[:]
- know at the relevant time that the offending material is on the linked-to site,
- know that it is circumvention technology that may not lawfully be offered, and
- create or maintain the link for the purpose of disseminating that technology.
Such a standard will limit the fear of liability on the part of web site operators just as the New York Times standard gives the press great comfort in publishing all sorts of material that would have been actionable at common law, even in the face of flat denials by the subjects of their stories. And it will not subject web site operators to liability for linking to a site containing proscribed technology where the link exists for purposes other than dissemination of that technology.
Id. at 341 (paragraphing added). Judge Kaplan found that the plaintiffs had proved their entitlement to an injunction under the above test by the required clear and convincing evidence. Id.
9.11.8 ISP Copyright Liability for Users' Infringement
If an Internet user transmits a copy of a work (e.g., a game or a message) without authorization, what copyright infringement liability will accrue to the Internet service provider (ISP) who provided Internet access to the user?
ISP Liability for Direct Copyright Infringement
In Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995), the court indicated that if the ISP did no more than provide facilities that happened to be used for infringing purposes, it probably would not be liable for direct copyright infringement:
[T]he mere fact that Netcom's system incidentally makes temporary copies of plaintiffs' works does not mean Netcom has caused the copying. The court believes that Netcom's act of designing or implementing a system that automatically and uniformly creates temporary copies of all data sent through it is not unlike that of the owner of a copying machine who lets the public make copies with it. Although some of the people using the machine may directly infringe copyrights, courts analyze the machine owner's liability under the rubric of contributory infringement, not direct infringement.
Plaintiffs' theory would create many separate acts of infringement and, carried to its natural extreme, would lead to unreasonable liability. . . . [P]laintiffs' theory further implicates a Usenet server that carries [the infringing user's] message to other servers regardless of whether that server acts without any human intervention beyond the initial setting up of the system. It would also result in liability for every single Usenet server in the worldwide link of computers transmitting Erlich's message to every other computer.
These parties, who are liable under plaintiffs' theory, do no more than operate or implement a system that is essential if Usenet messages are to be widely distributed. There is no need to construe the Act to make all of these parties infringers. Although copyright is a strict liability statute, there should still be some element of volition or causation which is lacking where a defendant's system is merely used to create a copy by a third party.
Id. at 1369-70 (footnotes and citations omitted, paragraphing supplied).
The Netcom court went to great lengths to distinguish Playboy Enterprises, Inc. v. Frena , 839 F. Supp. 1552, 1554 (M.D.Fla.1993). In that case, the defendant operated a small computer bulletin board system (BBS) whose system contained files of erotic pictures, uploaded by users of the BBS. He was held liable for copyright infringement, the Netcom court said, not because he had any involvement in making the copies, but because he had distributed copies in violation of a separate statutorily-enumerated right of the copyright owner. See Netcom, 907 F. Supp. at 1370; cf. Playboy Enterprises, Inc. v. Webbworld, Inc., 968 F. Supp. 1171, 1175 (N.D. Tex. 1997) (granting summary judgment of copyright infringement against Web site operator that provided fee-based access to collection of copied photographic images, despite operator's claim that it had no control over which images were posted by its user).
In contrast, Netcom was accused of reproducing the copyrighted work, not of distributing it. The court apparently focused on that fact, and on the fact that when Netcom's computers retransmitted copies of infringing works, they did so in response to commands from persons other than Netcom: “[T]he storage on a defendant's system of infringing copies and retransmission to other servers is not a direct infringement by [Netcom] of the exclusive right to reproduce the work where such copies are uploaded by an infringing user. Playboy does not hold otherwise.” Id. at 1371.
In any event, the holding in Playboy v. Frena, distinguished in Netcom, was later overruled by Congress, and that of Netcom was essentially codified, in the safe-harbor provisions of the Digital Millennium Copyright Act, discussed in Section § 2.8[i]. See generally ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 621-22 (4th Cir.2001) (following Netcom and noting safe-harbor provisions of DMCA; affirming dismissal of claim of direct infringement); CoStar Group Inc. v. LoopNet, Inc., 164 F. Supp. 2d 688 (D. Md. 2001) (granting partial summary judgment of no direct infringement).
ISP Liability for Contributory Infringement
A separate question in Netcom, however, was whether the defendant ISP could be liable for contributory infringement, as distinct from direct infringement, by virtue of its having provided the facilities for the infringement to occur. The cases seem to be going in the direction of requiring “substantial participation” in the infringing activity — but for an ISP, that can take the form of failing to block transmission of infringing materials after learning about the infringement. As stated in Netcom:
If plaintiffs can prove the knowledge element, Netcom will be liable for contributory infringement since its failure to simply cancel [the infringing user's] infringing message and thereby stop an infringing copy from being distributed worldwide constitutes substantial participation in [his] public distribution of the message.
Id. at 1374 (emphasis supplied).
The court thus indicated that to avoid liability, an ISP must take steps to block reproduction and distribution of a copyrighted work as soon as it “knows” of the infringement. It rejected Netcom's argument that it did not have unequivocal knowledge of the infringement (but it did suggest that an ISP might not have to take immediate action to cut off an allegedly infringing use if the use might qualify as a “fair use”):
Netcom argues that its knowledge after receiving notice of Erlich's alleged infringing activities was too equivocal given the difficulty in assessing whether registrations are valid and whether use is fair. Although a mere unsupported allegation of infringement by a copyright owner may not automatically put a defendant on notice of infringing activity, Netcom's position that liability must be unequivocal is unsupportable. While perhaps the typical infringing activities of BBSs will involve copying software, where BBS operators are better equipped to judge infringement, the fact that this involves written works should not distinguish it.
Where works contain copyright notices within them, as here, it is difficult to argue that a defendant did not know that the works were copyrighted. To require proof of valid registrations would be impractical and would perhaps take too long to verify, making it impossible for a copyright holder to protect his or her works in some cases, as works are automatically deleted less than two weeks after they are posted.
The court is more persuaded by the argument that it is beyond the ability of a BBS operator to quickly and fairly determine when a use is not infringement where there is at least a colorable claim of fair use. Where a BBS operator cannot reasonably verify a claim of infringement, either because of a possible fair use defense, the lack of copyright notices on the copies, or the copyright holder's failure to provide the necessary documentation to show that there is a likely infringement, the operator's lack of knowledge will be found reasonable and there will be no liability for contributory infringement for allowing the continued distribution of the works on its system.
Netcom, 907 F. Supp. at 1374 (paragraphing supplied).
In the subsequent Sega Enterprises, Ltd. v. Maphia, 948 F. Supp. 923 (N.D. Cal. 1996), the defendant was the system operator for MAPHIA, an electronic bulletin board (BBS). Sega allegedly received an anonymous tip that the MAPHIA BBS contained and distributed pirated and unauthorized versions of the plaintiff's video game software. At the time it was seized, the MAPHIA BBS contained unauthorized copies of 12 Sega games developed by Sega, ten Sega‑licensed games, and six Sega pre‑release or “beta” version games, developed in‑house by Sega.
The Sega court was persuaded by Netcom, and held that the defendant was not liable for direct infringement even though he knew that infringing activity was occurring. See id. at 932.
The court went on to hold, however, that Sega could prevail on a contributory-infringement theory if it established that “the users of Sherman's MAPHIA BBS directly infringed Sega's copyright [and] that (i) with knowledge of the users' infringing activity, (ii) Sherman induced, caused, or materially contributed to their infringing activity.” Id. The court spent little time on the first issue, namely the defendant's knowledge that his customers were in fact infringing.
The Sega court then proceeded to the second issue, namely the defendant's active participation in the alleged infringement. The court pointed out that the defendant “actively solicited users to upload unauthorized games, and provided a road map on his BBS for easy identification of Sega games available for downloading. Additionally, through the same MAPHIA BBS medium, he offered copiers for sale to facilitate playing the downloaded games.” This, the court said, established a prima facie case of contributory infringement of copyright. Id.; accord, Sega Enterprises Ltd. v. Sabella, 1996 WL 780560 (N.D. Cal. 1996) (granting plaintiff's motion for summary judgment that defendant BBS operator was liable for contributory copyright infringement, but holding that she was not a “direct” infringer notwithstanding her providing of facilities to BBS users who engaged in direct infringement).
9.11.9 Limitations on ISP Liability in the Digital Millennium Copyright Act
/[This subsection is adapted, largely verbatim, from a U.S. Copyright Office summary, available on the World Wide Web at www.loc.gov; no copyright claimed in works of the U.S. Government.]/
Title II of the Digital Millennium Copyright Act added a new section 512 to the Copyright Act to create four new limitations on liability for copyright infringement by online service providers. The limitations are based on the following four categories of conduct by a service provider:
Transitory communications;
System caching;
Storage of information on systems or networks “at direction” of users – in CoStar Group Inc. v. LoopNet, Inc., 164 F. Supp. 2d 688 (D. Md. 2001) (granting partial summary judgment), the plaintiff district court rejected the copyright owner's contention that the service provider's screening of uploaded photographs for obvious copyright infringement negated this element and disqualified the service provider from the benefits of the safe harbor; and
Information location tools.
New section 512 also includes special rules concerning the application of these limitations to nonprofit educational institutions.
Each limitation entails a complete bar on monetary damages, and restricts the availability of injunctive relief in various respects. (Section 512(j)). Each limitation relates to a separate and distinct function, and a determination of whether a service provider qualifies for one of the limitations does not bear upon a determination of whether the provider qualifies for any of the other three. (Section 512(n)).
The failure of a service provider to qualify for any of the limitations in section 512 does not necessarily make it liable for copyright infringement. The copyright owner must still demonstrate that the provider has infringed, and the provider may still avail itself of any of the defenses, such as fair use, that are available to copyright defendants generally. (Section 512(l)). In addition to limiting the liability of service providers, Title II establishes a procedure by which a copyright owner can obtain a subpoena from a federal court ordering a service provider to disclose the identity of a subscriber who is allegedly engaging in infringing activities. (Section 512(h)).
Section 512 also contains a provision to ensure that service providers are not placed in the position of choosing between limitations on liability on the one hand and preserving the privacy of their subscribers, on the other. Subsection (m) explicitly states that nothing in section 512 requires a service provider to monitor its service or access material in violation of law (such as the Electronic Communications Privacy Act) in order to be eligible for any of the liability limitations.
Eligibility for Limitations Generally
A party seeking the benefit of the limitations on liability in Title II must qualify as a “service provider.” For purposes of the first limitation, relating to transitory communications, “service provider” is defined in section 512(k)(1)(A) as “an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received.” For purposes of the other three limitations, “service provider” is more broadly defined in section 512(k)(l)(B) as “a provider of online services or network access, or the operator of facilities therefor.” [/See A&M Records, Inc. v. Napster, Inc/., No. C 99-05183 MHP, 2000 WL 573136, 54 USPQ2d 1746 (C.D. Cal. May 12, 2000) (refusing to grant summary adjudication that Napster was entitled to assert section-512 defense because it had not established that it was a service provider and it had not established its compliance with the policies described in the text), subsequent proceedings, 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff'd in pertinent part, rev'd in part and remanded, 239 F.3d 1004 (9th Cir. 2001).]
In addition, to be eligible for any of the limitations, a service provider must meet two overall conditions: (1) it must adopt and reasonably implement a policy of terminating in appropriate circumstances the accounts of subscribers who are repeat infringers; and (2) it must accommodate and not interfere with “standard technical measures.” (Section 512(i)). “Standard technical measures” are defined as measures that copyright owners use to identify or protect copyrighted works, that have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair and voluntary multi-industry process, are available to anyone on reasonable nondiscriminatory terms, and do not impose substantial costs or burdens on service providers.
Limitation for Transitory Communications
In general terms, section 512(a) limits the liability of service providers in circumstances where the provider merely acts as a data conduit, transmitting digital information from one point on a network to another at someone else's request. This limitation covers acts of transmission, routing, or providing connections for the information, as well as the intermediate and transient copies that are made automatically in the operation of a network.
In order to qualify for this limitation, the service provider's activities must meet the following conditions:
- The transmission must be initiated by a person other than the provider.
- The transmission, routing, provision of connections, or copying must be carried out by an automatic technical process without selection of material by the service provider.
- The service provider must not determine the recipients of the material.
- Any intermediate copies must not ordinarily be accessible to anyone other than anticipated recipients, and must not be retained for longer than reasonably necessary.
- The material must be transmitted with no modification to its content.
Limitation for System Caching
Section 512(b) limits the liability of service providers for the practice of retaining copies, for a limited time, of material that has been made available online by a person other than the provider, and then transmitted to a subscriber at his or her direction. The service provider retains the material so that subsequent requests for the same material can be fulfilled by transmitting the retained copy, rather than retrieving the material from the original source on the network.
The benefit of this practice is that it reduces the service provider's bandwidth requirements and reduces the waiting time on subsequent requests for the same information. On the other hand, it can result in the delivery of outdated information to subscribers and can deprive website operators of accurate “hit” information — information about the number of requests for particular material on a website — from which advertising revenue is frequently calculated. For this reason, the person making the material available online may establish rules about updating it, and may utilize technological means to track the number of “hits.”
The limitation applies to acts of intermediate and temporary storage, when carried out through an automatic technical process for the purpose of making the material available to subscribers who subsequently request it. It is subject to the following conditions:
- The content of the retained material must not be modified.
- The provider must comply with rules about “refreshing” material—replacing retained copies of material with material from the original location— when specified in accordance with a generally accepted industry standard data communication protocol.
- The provider must not interfere with technology that returns “hit” information to the person who posted the material, where such technology meets certain requirements.
- The provider must limit users' access to the material in accordance with conditions on access (e.g., password protection) imposed by the person who posted the material.
- Any material that was posted without the copyright owner's authorization must be removed or blocked promptly once the service provider has been notified that it has been removed, blocked, or ordered to be removed or blocked, at the originating site.
Limitation for Information Residing on Systems
or Networks at the Direction of Users
:CUSTOMID: limitation-for-information-residing-on-systems-or-networks-at-the-direction-of-users
Section 512(c) limits the liability of service providers for infringing material on websites (or other information repositories) hosted on their systems. It applies to storage at the direction of a user. In order to be eligible for the limitation, the following conditions must be met:
- The provider must not have the requisite level of knowledge of the infringing activity, as described below.
- If the provider has the right and ability to control the infringing activity, it must not receive a financial benefit directly attributable to the infringing activity.
- Upon receiving proper notification of claimed infringement, the provider must expeditiously take down or block access to the material.
In addition, a service provider must have filed with the Copyright Office a designation of an agent to receive notifications of claimed infringement. The Office provides a suggested form for the purpose of designating an agent (http://www.loc.gov/copyright/onlinesp/) and maintains a list of agents on the Copyright Office website (http://www.loc.gov/copyright/onlinesp/list/).
Under the knowledge standard, a service provider is eligible for the limitation on liability only if it does not have actual knowledge of the infringement, is not aware of facts or circumstances from which infringing activity is apparent, or upon gaining such knowledge or awareness, responds expeditiously to take the material down or block access to it.
The statute also establishes procedures for proper notification, and rules as to its effect. (Section 512(c)(3)). Under the notice and takedown procedure, a copyright owner submits a notification under penalty of perjury, including a list of specified elements, to the service provider's designated agent.*[*[1]*]* Failure to comply substantially with the statutory requirements means that the notification will not be considered in determining the requisite level of knowledge by the service provider. If, upon receiving a proper notification, the service provider promptly removes or blocks access to the material identified in the notification, the provider is exempt from monetary liability. In addition, the provider is protected from any liability to any person for claims based on its having taken down the material. (Section 512(g)(1)).
In order to protect against the possibility of erroneous or fraudulent notifications, certain safeguards are built into section 512. Subsection (g)(1) gives the subscriber the opportunity to respond to the notice and takedown by filing a counter notification. In order to qualify for the protection against liability for taking down material, the service provider must promptly notify the subscriber that it has removed or disabled access to the material. If the subscriber serves a counter notification complying with statutory requirements, including a statement under penalty of perjury that the material was removed or disabled through mistake or misidentification, then unless the copyright owner files an action seeking a court order against the subscriber, the service provider must put the material back up within 10-14 business days after receiving the counter notification.
Penalties are provided for knowing material misrepresentations in either a notice or a counter notice. Any person who knowingly materially misrepresents that material is infringing, or that it was removed or blocked through mistake or misidentification, is liable for any resulting damages (including costs and attorneys' fees) incurred by the alleged infringer, the copyright owner or its licensee, or the service provider. (Section 512(f)).
Limitation for Information Location Tools
Section 512(d) relates to hyperlinks, online directories, search engines and the like. It limits liability for the acts of referring or linking users to a site that contains infringing material by using such information location tools, if the following conditions are met:
- The provider must not have the requisite level of knowledge that the material is infringing. The knowledge standard is the same as under the limitation for information residing on systems or networks.
- If the provider has the right and ability to control the infringing activity, the provider must not receive a financial benefit directly attributable to the activity.
- Upon receiving a notification of claimed infringement, the provider must expeditiously take down or block access to the material.
These are essentially the same conditions that apply under the previous limitation, with some differences in the notification requirements. The provisions establishing safeguards against the possibility of erroneous or fraudulent notifications, as discussed above, as well as those protecting the provider against claims based on having taken down the material apply to this limitation. (Sections 512(f)-(g)).
Special Rules Regarding Liability of
Nonprofit Educational Institutions
:CUSTOMID: special-rules-regarding-liability-of-nonprofit-educational-institutions
Section 512(e) determines when the actions or knowledge of a faculty member or graduate student employee who is performing a teaching or research function may affect the eligibility of a nonprofit educational institution for one of the four limitations on liability. As to the limitations for transitory communications or system caching, the faculty member or student shall be considered a “person other than the provider,” so as to avoid disqualifying the institution from eligibility. As to the other limitations, the knowledge or awareness of the faculty member or student will not be attributed to the institution. The following conditions must be met:
- the faculty member or graduate student's infringing activities do not involve providing online access to course materials that were required or recommended during the past three years;
- the institution has not received more than two notifications over the past three years that the faculty member or graduate student was infringing; and
- the institution provides all of its users with informational materials describing and promoting compliance with copyright law.
9.12 Defenses to Copyright-Infringement Charges
9.12.1 The Fair-Use Doctrine Does Not Provide Much Comfort for Software
Copyright Infringers
:CUSTOMID: the-fair-use-doctrine-does-not-provide-much-comfort-for-software-copyright-infringers
Accused software-copyright infringers have had little success in asserting fair-use defenses.
Statutory Basis
Section 107 of the Copyright Act provides the underpinning for the assertion of fair-use defenses by accused infringers. It states that:
[F]air use of a copyrighted work, including such use by reproduction in copies or phonorecords … for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include:
(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
(2) the nature of the copyrighted work;
(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
(4) the effect of the use upon the potential market for or value of the copyrighted work.
17 U.S.C. § 107.
Selected Cases
Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 114 S. Ct. 1164 (1994) (Souter, J.): In Campbell, the Supreme Court explained some of the jurisprudence underlying the fair-use doctrine. In that case, the song “Pretty Woman,” by the rap group 2 Live Crew, was accused of infringement of the copyright in the Roy Orbison hit “Oh Pretty Woman.” The district court granted summary judgment of noninfringement on grounds of fair use, but the Sixth Circuit reversed. See 972 F.2d 1429 (6th Cir. 1992), reversing 754 F. Supp. 1150 (M.D. Tenn. 1991).
Examining the four factors prescribed in the Copyright Act for evaluating putative fair uses, the Campbell Court characterized the “central purpose” of the investigation into first factor—the purpose of the use—as:
to see, in Justice Story's words, whether the new work merely “supersede[s] the objects of the original creation, or instead adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message; it asks, in other words, whether and to what extent the new work is “/transformative/.”
Although such transformative use is not absolutely necessary for a finding of fair use, the goal of copyright, to promote science and the arts, is generally furthered by the creation of transformative works. Such works thus lie at the heart of the fair use doctrine's breathing space within the confines of copyright, and the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use.
Campbell, 510 U.S. at 579 (emphasis and paragraphing added, citations and footnote omitted). The Court rejected the Sixth Circuit's reading of the Court's own Betamax decision, Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 451 (1984), that commercial purpose in a copyright infringement almost automatically establishes a presumption of unfair use. Apparently seeking to dispel a perceived anti-commercial bias in the courts, the Court quoted Samuel Johnson's pronouncement that “‘[n]o man but a blockhead ever wrote, except for money.'” Campbell, 510 U.S. at 584 (citation omitted). The Court announced held that “[n]o ‘presumption' or inference of market harm … is applicable to a case involving something beyond mere duplication for commercial purposes.” Id., 510 U.S. at 591 (citation omitted).
The Court suggested in dictum that injunctive relief might not be available against copyright infringers who engage in “transformative” uses of copyrighted works:
Because the fair use enquiry often requires close questions of judgment as to the extent of permissible borrowing in cases involving parodies (or other critical works), courts may also wish to bear in mind that the goals of the copyright law, “to stimulate the creation and publication of edifying matter,” are not always served by automatically granting injunctive relief when parodists are found to have gone beyond the bounds of fair use. …
[There may be cases] “raising reasonable contentions of fair use” where “there may be a strong public interest in the publication of the secondary work [and] the copyright owner's interest may be adequately protected by an award of damages for whatever infringement is found” ….
Id., 510 U.S. at 578 n.10 (paragraphing supplied, citations omitted).
Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000), reversing 48 F.Supp.2d 1212 (N.D. Cal. 1999): The defendant succeeded in its transformative fair-use defense, but only on appeal to the Ninth Circuit. Connectix was a vendor of emulation software for the Sony Playstation, which was held to infringe Sony's copyrights. It argued that its emulation was transformative because it operated on a different platform, i.e., a computer instead of a television. The district court rejected that argument because “[Connectix's] VGS supplants Sony's prior invention. … The VGS does not do anything new, anything different, or anything unique from the PlayStation.” 48 F.Supp.2d at 1219. The Ninth Circuit disagreed, holding that
Connectix's Virtual Game Station is modestly transformative. The product creates a new platform, the personal computer, on which consumers can play games designed for the Sony PlayStation. This innovation affords opportunities for game play in new environments, specifically anywhere a Sony PlayStation console and television are not available, but a computer with a CD‑ROM drive is. More important, the Virtual Game Station itself is a wholly new product, notwithstanding the similarity of uses and functions between the Sony PlayStation and the Virtual Game Station. The expressive element of software lies as much in the organization and structure of the object code that runs the computer as it does in the visual expression of that code that appears on a computer screen.
Id. 203 F.3d at 606; see also supra § 2.7[e] (discussion of reverse-engineering aspects of the case).
Sony Computer Entertainment America, Inc. v. Bleem, LLC, 214 F.3d 1022 (9th Cir. 2000) (vacating preliminary injunction): This Sony case also led to a successful fair-use use defense, although on different factual grounds. The defendant marketed a software emulator for playing PlayStation games on a regular computer. The defendant used screen-shot images to show how a game would actually look if played on a PlayStation console versus how it would actually look if played using the defendant's software emulator. The Ninth Circuit characterized such use as competitive advertising and held that it was fair use.
Kelly v. Arriba Soft Corp., 280 F.3d 934 (9th Cir. 2002) (affirming, in pertinent part, summary judgment of fair use): The plaintiff posted graphic images of photographs on his Web site. The defendant's search-engine database created and stored “thumbnail” images of the photographs and, when the photographs matched an end-user's search query, would cause the thumbnails to be displayed on the end-user's browser. The Ninth Circuit analyzed the four factors of fair use and concluded the creation and display of thumbnails qualified as transformative use. The court observed that:
the thumbnails were much smaller, lower-resolution images that served an entirely different function than Kelly's original images. Kelly's images are artistic works used for illustrative purposes. His images are used to portray scenes from the American West in an esthetic manner. Arriba's use of Kelly's images in the thumbnails is unrelated to any esthetic purpose. Arriba's search engine functions as a tool to help index and improve access to images on the internet and their related web sites. In fact, users are unlikely to enlarge the thumbnails and use them for artistic purposes because the thumbnails are of much lower resolution than the originals; any enlargement results in a significant loss of clarity of the image, making them inappropriate as display material.
9.13 * *
This case involves more than merely a retransmission of Kelly's images in a different medium. Arriba's use of the images serves a different function than Kelly's use-improving access to information on the internet versus artistic expression. Furthermore, it would be unlikely that anyone would use Arriba's thumbnails for illustrative or esthetic purposes because enlarging them sacrifices their clarity. Because Arriba's use is not superseding Kelly's use but, rather, has created a different purpose for the images, Arriba's use is transformative.
Id. at 941-42.
UMG Recordings, Inc. v. MP3.com, Inc., 92 F. Supp.2d 349 (S.D.N.Y.
- (granting motion for partial summary judgment of copyright
infringement) [portions of this summary are adapted from 92 F. Supp.2d at 351]: MP3.com made the contents of selected music CDs available to its Web-site customers who could demonstrate that they owned a copy of the selected CDs (see § 2.8[a]). It did not succeed in establishing a fair-use defense to the plaintiffs' copyright-infringement claims. MP3.com did not dispute that the purpose of its use of the copyrighted works was commercial, for while subscribers to My.MP3.com were not charged a fee, MP3.com sought to attract a sufficiently large subscription base to draw advertising and otherwise make a profit. The court rejected MP3.com's argument that its use provided “a transformative ‘space shift' by which subscribers can enjoy the sound recordings contained on their CDs without lugging around the physical discs themselves”; the court held that “this is simply another way of saying that the unauthorized copies are being retransmitted in another medium – an insufficient basis for any legitimate claim of transformation.” 92 F. Supp.2d at 351 (extensive citations omitted).
A & M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal.
- (granting preliminary injunction against Napster), /aff'd in
pertinent part, rev'd in part and remanded/, 239 F.3d 1004 (9th Cir.
- [this summary adapted from district-court opinion]: In
opposition to the plaintiffs' motion for preliminary injunction, Napster sought unsuccessfully to expand the “fair use” doctrine articulated in Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984), to encompass the massive downloading of MP3 files by Napster users. The court rejected the fair-use defense because “any potential non‑infringing use of the Napster service is minimal or connected to the infringing activity, or both. The substantial or commercially significant use of the service was, and continues to be, the unauthorized downloading and uploading of popular music, most of which is copyrighted.” The court observed that “[a]lthough downloading and uploading MP3 music files is not paradigmatic commercial activity, it is also not personal use in the traditional sense. … At the very least, a host user sending a file cannot be said to engage in a personal use when distributing that file to an anonymous requester. Moreover, the fact that Napster users get for free something they would ordinarily have to buy suggests that they reap economic advantages from Napster use.”
Compaq Computer Corp. v. Procom Technology, Inc., 908 F. Supp. 1409 (S.D. Tex. 1995): The court held that the defendant's copying of the plaintiff's selection of a specific set of hard-disk operational parameter values, used to trigger display of on-screen message suggesting replacement of the disk, was not fair use. See id. at 1419-21.
9.13.1 Section 117 Immunizes Certain Actions by
“Owners” of Copies of Computer Programs
:CUSTOMID: section-117-immunizes-certain-actions-by-owners-of-copies-of-computer-programs
Section 117 of the Copyright Act expressly authorizes the “owner” of a copy of a computer program to create another copy (or adaptation) of the computer program — provided that the copy or adaptation is created (a) “as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner,” or for archival or back-up purposes, and (b) so long as copies or adaptations so made are not transferred except in accordance with conditions set out in the statute. See 17 U.S.C. § 117.
In the early years of software-copyright litigation, a number of accused infringers attempted to use section 117 as a shield against liability. By and large, the courts were not especially sympathetic, and the accused infringers were not notably successful. See Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, 1520 & n.6 (9th Cir. 1992) (holding that disassembly of plaintiff's executable program code to study its underlying concepts and methods, as intermediate step in creating program that was compatible with plaintiff's video-game computer system, was not permitted under section 117 [but reversing preliminary injunction on fair-use grounds as discussed in § 2.7[e]]); citing but not addressing Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260-61 (5th Cir. 1988) (affirming dismissal of copyright infringement claim by proprietor of copy-protected software against vendor of software to defeat copy-protection schemes; holding that authorization of section 117(1) not limited to use of program intended by copyright owner);/CMAX/Cleveland, Inc., v. UCR, Inc./, 804 F. Supp. 337, 356 (M.D. Ga. 1992) (holding that defendants' use of copies of computer program beyond the scope of § 117 and failure to comply with destruction requirements of that section precluded resort to that section as defense to infringement claim; granting judgment for plaintiff); Micro-Sparc, Inc. v. Amtype Corp., 592 F. Supp. 33, 34-35, 223 USPQ (BNA) 1210 (D. Mass. 1984) (holding that “keyboarding service” which input programs, published in source-code form in hobbyist magazine, onto disk and sold disks to purchasers of magazine, infringed copyright in programs; rejecting section‑117 defense); Apple Computer, Inc. v. Formula Int'l, Inc., 594 F. Supp. 617, 621 (C.D. Cal. 1984) (holding that copying of copyrighted software onto silicon chips is not an “essential step” in the utilization of the software, because the software could be used through RAM, therefore copying and subsequent sale of chips not protected by section 117).
More recently, one of the main issues relating to section 117 has been whether a licensee of software can be deemed an “owner” of a copy of the software. The Copyright Act does not define the term “owner.” Nor is the legislative history particularly enlightening. Section 117 was originally proposed by the National Commission on New Technological Uses of Copyrighted Works (“CONTU”). CONTU's original proposal for section 117 provided that “it is not an infringement for the rightful possessor of a copy of a computer program to make or authorize the making of another copy or adaptation of that program….” National Commission on New Technological Uses of Copyrighted Works, Final Report at 30 (1978) (emphasis added). National Commission on New Technological Uses of Copyrighted Works, Final Report at 30 (1978) (emphasis added). The statute as enacted, however, contains the words “owner of a copy” in place of the words “rightful possessor of a copy.” See Pub. L. No. 96‑517, 96th Cong., 2d Sess. (1980). See Pub. L. No. 96‑517, 96th Cong., 2d Sess. (1980). The legislative history does not explain the reason for the change. See Cf. H.R. Rep. No. 1307, 96th Cong. 2d Sess. 23, reprinted in 1980 U.S.C.C.A.N. 6460, 6492 (indicating that 1980 amendments were intended to embody CONTU recommendations). See Cf. H.R. Rep. No. 1307, 96th Cong. 2d Sess. 23, reprinted in 1980 U.S.C.C.A.N. 6460, 6492 (indicating that 1980 amendments were intended to embody CONTU recommendations).
As discussed below, the courts have been generally unwilling to find that a licensee of software was an “owner” under section 117 when the issue was whether the licensee had the right to use the software in a way that both violated the license agreement and injured the copyright owner's business. On the other hand, the courts have been more inclined to allow a licensee to make use of section 117 if the licensee is simply modifying the software, e.g., to get the software to work correctly.
Can a Software Licensee Claim to Be an “Owner” When Dealing With
the Licensor's Competitor?
:CUSTOMID: can-a-software-licensee-claim-to-be-an-owner-when-dealing-with-the-licensors-competitor
When the issue is one of duplication of a plaintiff's software by a licensee, e.g., for use with hardware not provided by the plaintiff, the courts have generally declined to find that the licensee was an “owner” of a copy of the software.
Selected cases:
MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1995)./:/ The plaintiff was a computer manufacturer and also provided after-the-sale service for its computers. It owned a copyright in software that performed diagnostic functions for the computers. A non-licensee service provider, which competed with the plaintiff for after-the-sale service business, used a customer's licensed copy of the diagnostic software when doing maintenance on a customer's computer. The customer's license agreement for the software prohibited the customer from permitting third parties to use of the software. The Ninth Circuit held that the non-licensee service provider's use of the software constituted copyright infringement (see § 2.7[c][2] re legislation overturning this specific holding). The court held that the customer was not an “owner” of the copies of the software for purposes of section 117 and thus did not enjoy the right to copy conferred on owners by the statute. See id. at 518 n.5 (9th Cir. 1995). The court stated that it reached the conclusion that the customer was not an owner because the customer had licensed the software from MAI. See id.; see also Advanced Computer Services of Michigan v. MAI Systems Corp., 845
- Supp. 356, 367 (E.D. Va. 1994) (“MAI customers are not ‘owners' of
the copyrighted software; they possess only the limited rights set forth in their licensing agreements”). That rationale, however, was later rejected as too broad in DSC v. Pulsecom, discussed below.
DSC Communications Corp. v. Pulse Communications, Inc., 170 F.3d 1354 (Fed. Cir. 1999): DSC was a manufacturer of digital loop carrier equipment for telephone systems, including interface cards that were plugged into the equipment. It sold its equipment to the regional Bell operating companies or “RBOCs.” DSC provided software for controlling the interface cards; the software was “downloaded,” i.e., copied, from the equipment to the interface cards each time the equipment was powered up. The defendant, Pulse Communications (Pulsecom), also sold interface cards, which were designed to be compatible with DSC's equipment and to be controlled by DSC's software. See 170 F.3d at 1357-58. (The reverse-engineering aspects of the Pulsecom case are discussed in § 2.7[e].)
Each time a Pulsecom customer powered up its DSC equipment with a Pulsecom interface card installed in it, the DSC equipment automatically downloaded a copy of DSC's controller software to the Pulsecom interface card, in violation of the license agreement. See 170 F.3d at 1359. This was a violation of DSC's license agreement, which prohibited the customers from using the controller software except with DSC-provided hardware. See 170 F.3d at 1361. According to DSC, Pulsecom's customers were thereby infringing DSC's copyright in its controller software, and Pulsecom was thus a contributory infringer.
Initially, Pulsecom prevailed at trial on a section-117 theory. The district court noted that DSC's customers obtained a right to possession of DSC's controller software for an unlimited period by making a single payment. According to the district court, this made the transaction a “sale” and made DSC's customers the owners of copies of the software; that in turn gave the customers the right to make copies of the software in connection with using Pulsecom's competing interface cards. See 170 F.3d at 1360-61.
The Federal Circuit, however, rejected the district court's ownership analysis. Looking to the legislative history, the appellate court held that “it is clear from the fact of the substitution of the term ‘owner' for ‘rightful possessor' that Congress must have meant to require more than ‘rightful possession' to trigger the section 117 defense.” Although the Federal Circuit disagreed with MAI Systems's view that the mere existence of a license agreement implied a lack of ownership, see 170 F.3d at 1360, the court did hold that the specific license agreements in question “characterize the [customers] as non‑owners of copies of the software, [and] the restrictions imposed on the RBOCs' rights with respect to the software are consistent with that characterization,” and that the license agreements “severely limit the rights of the [customers] with respect to the [software] in ways that are inconsistent with the rights normally enjoyed by owners of copies of software.” Pulsecom, 170 F.3d at 1361. Pulsecom was thus unsuccessful in attempting to assert its section-117 defense.
Adaptation: Modification of Owned Copies of Software
Some opinions have addressed the extent to which customers have the right to modify their copies of software. At least some courts have been inclined to be sympathetic to customers who modified software that they had paid for.
Aymes v. Bonelli, 47 F.3d 23 (2d. Cir. 1995): According to the Second Circuit, the owner of a copy of a computer program can modify the program for its own use, even though the modification amounts to creation of a derivative work. In Aymes, an independent-contractor programmer sued his former customer for copyright infringement after the customer modified the software. The Second Circuit had no trouble agreeing with the district court that the programmer, who had been paid $70,000 to design a computer program specifically for the customer, had sold the customer a copy of the program. The court then relied on 17 U.S.C. § 117 to hold that the customer, as rightful owner of a copy of the program, “did not infringe upon Aymes's copyright, because the changes made to [the program] were necessary measures in their continuing use of the software in operating their business.” Id., 47 F.3d at 26. Id., 47 F.3d at 26. The court said that an owner's right of adaptation “includes ‘the right to add features to the program that were not present at the time of rightful acquisition,' and was intended to apply to modifications for internal use, as long as the adapted program is not distributed in an unauthorized manner.” Id. (citations omitted). (The Aymes case's holding concerning ownership and the work-made-for-hire doctrine is discussed supra at § 2.6[b][2].)
Synergistic Technologies, Inc. v. IDB Mobile Communications, Inc., 871 F. Supp. 24 (D.D.C. 1994) (granting defendant's motion for summary judgment of no copyright infringement): In this case a similar result to that in Aymes was reached, although on different grounds. The plaintiff had sold the defendant computer hardware, with software installed, for use in a satellite communications earth station. The system malfunctioned; the defendant discovered that the source code had been deleted and hired a third party to fix the software problems. The plaintiff thereupon sued for copyright infringement. The court first held that under section 2-401 of the Uniform Commercial Code, “[t]he parties not having explicitly agreed otherwise, title to the hardware and to a copy of the software passed to IDB at the time of delivery of the goods. Accordingly, IDB is the owner of a copy of the computer program and is entitled to copy and adapt the program in the limited manner described in § 117.” Id. at 29 (emphasis supplied). (The court granted summary judgment for the defendants on other grounds, namely that the plaintiff had failed, in response to the defendants' summary judgment motion, to establish a prima facie case that any potentially impermissible copying had occurred. Id. at 29-30.)
9.14 Remedies for Copyright Infringement
Infringement of a copyright can lead to an injunction and an award of the copyright owner's damages, plus the infringer's profits arising from infringement to the extent not taken into account in computing damages. See 17 U.S.C. §§ 502-505 (remedies for copyright infringement).
9.14.1 Direct and Indirect Profits
The computation of the infringer's profits can take into account the infringer's business revenues earned using the copyrighted software (as opposed to selling copies of the software). An example is found in an antitrust suit brought against Xerox by independent service organizations (ISOs), in which Xerox counterclaimed for infringement of copyrights in Xerox's software. The district court awarded Xerox damages including the infringer's profits, measured as its business revenues minus its proved costs. See In re Indep. Services Organizations Antitrust Litigation, 23 F. Supp.2d 1242, 1250-53 (D. Kan. 1998), aff'd, 203 F.3d 1322 (Fed. Cir. 2000).
An award of an infringer's profits can also include indirect profits. An example not in the software field is the Frank Music Corp. v. MGM case, in which MGM was hit with an award for “a piece of the action” at its casino because its floor show infringed a copyright in a musical production. As described by the Ninth Circuit:
Plaintiffs are the copyright owners and authors of Kismet, a dramatico-musical work. MGM, Inc. under license produced a musical motion picture version of Kismet. Beginning April 26, 1974, MGM Grand presented a musical revue entitled Hallelujah Hollywood in the hotel's Ziegfeld Theatre. … The show comprised ten acts, four billed as “tributes” to MGM motion pictures. Act IV was entitled “Kismet”, and was a tribute to the MGM movie of that name. It was based almost entirely on music from Kismet, and used characters and settings from that musical.
9.15 * *
In Frank Music I, we held that the plaintiffs were entitled to recover, in addition to direct profits, a proportion of ascertainable indirect profits from defendants' hotel and gaming operations attributable to the promotional value of Hallelujah Hollywood. The district court considered the relative contributions of Hallelujah Hollywood and other factors contributing to the hotel's profits …. The district court concluded that two percent of MGM Grand's indirect profit was attributable to Hallelujah Hollywood. … [T]his conclusion is not clearly erroneous.
Frank Music Corp. v. Metro-Goldwyn-Mayer, Inc., 886 F.2d 1545, 1547-48, 1550 (9th Cir. 1989) (footnotes omitted, emphasis added).
9.15.1 Statutory Damages
If the copyright owner so chooses, and provided that it timely registered its copyright(s) (see § 2.4[a]), it can elect, instead of recovering actual damages and profits, to receive an award of “statutory damages,” essentially a civil fine paid to the copyright owner. The amount of statutory damages is set by the judge; it can range from not less than $750 to not more than $30,000 for all infringements involved in the lawsuit in respect of any one copyrighted “work.” The court can increase the statutory damages to $150,000 if the copyright owner proves, and the court finds, that the infringement was willful. See 17 U.S.C. § 504(c).
Selected cases:
UMG Recordings, Inc. v. MP3.com, Inc., NO. 00 CIV. 472 (JSR), _ F. Supp.2d _ (S.D.N.Y. Sept. 6, 2000): The court had previously granted summary judgment that MP3.com had infringed the copyright in thousands of music CDs (see § 2.8[a]). The court awarded statutory damages of $25,000 per CD, with MP3.com claiming that 4,700 CDs were copied but UMG claiming the correct number was in the neighborhood of 10,000. The resulting damage award would thus be between $118 million and $250 million. The court reserved for a separate phase of the trial the issue of the specific number of CDs copied.
9.15.2 Personal Liability for Controlling Persons
Infringement can also lead to vicarious liability for “controlling persons” (possibly including personal liability for corporate officers who have the authority and ability to control the infringing acts. The reported cases tend to be fairly fact-intensive; it appears that notions of equity may inform the courts' decisions in particular cases.
Selected cases:
Softel, Inc. v. Dragon Medical and Scientific Communications, Inc., 118 F.3d 955 (2d Cir. 1997): The Second Circuit affirmed dismissal of copyright-infringement and trade-secret claims against the president of company with five employees. The president was not shown to have “a right and ability to supervise [that] coalesce[d] with an obvious and direct financial interest in the exploitation of copyrighted materials ….” 118 F.3d at 966-67 (internal quotation marks and citation omitted; brackets by the court).
Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335 (5th Cir.1994): The plaintiff, a software manufacturer, filed an infringement suit against both a corporate defendant and the defendant's principal officer. The district court dismissed the suit as against the officer, who according to the court had personally engaged in infringing acts. The Fifth Circuit reversed, holding that the officer was individually liable in his personal capacity. See 26 F.3d at 1349-50.
Ez- Tixz, Inc. v. Hit-Tix, Inc., 919 F. Supp. 728 (S.D.N.Y.1996): The court denied a defense motion for summary judgment. It held that individual defendants could be vicariously liable for infringement, because they had at least some control over primary corporate defendant as well as a financial interest in the alleged acts of infringement. See 919 F. Supp. at 732-35.
Data General Corp. v. Grumman Data Sys. Corp., 886 F. Supp. 927 (D. Mass. 1994): The court granted partial summary judgment against a company of which a corporate infringement defendant was a wholly-owned subsidiary. The court held that the parent company was vicariously liable for judgment of $52 million in respect of the subsidiary's copyright infringement infringement. See 886 F. Supp. at 931-32 (citing cases).
9.15.3 Injunctions; Seizures
The copyright owner's remedies may also include an injunction against further infringement, see 17 U.S.C. § 502, as well as ex parte seizure and/or post-judgment confiscation of the defendant's computer equipment used to make unauthorized copies. See 17 U.S.C. § 503.
Selected cases:
Central Point Software Inc. v. Nugent, 903 F. Supp. 1057 (E.D. Tex. 1995): The court granted the copyright owner's motion for summary judgment. It ruled that requiring defendant to deliver to plaintiff the computer equipment used to make infringing copies was a “reasonable disposition” under 17 U.S.C. § 503(b).
DSC Communications Corp. v. DGI Technologies, Inc., 898 F. Supp. 1183 (N.D. Tex. 1995), aff'd, 81 F.3d 597 (5th Cir. 1996): The district court upheld its own ex parte seizure order in pertinent part and granted a preliminary injunction against infringement.
9.15.4 Product Recalls
An injunction can include an order to recall all copies of the infringing product. Selected cases:
In the Montgomery case discussed in § 2.2, the court issued a preliminary injunction that, among other things, required the defendants to recall and surrender to the plaintiff all infringing products in their possession, and to advertise via bulletin board that the infringing products were produced without a license and thus were subject to payment of a licensing fee to the plaintiff. See Montgomery, 168 F.3d at 1287 n.5.
CyberMedia, Inc. v. Symantec Corp., 19 F.Supp.2d 1070 (N.D. Cal. 1998) (granting preliminary injunction): The plaintiff was the manufacturer of a computer cleanup program called UnInstaller, which allowed users to remove unwanted applications and files from their computers. The court was persuaded, by expert testimony showing “line after line” of identical or nearly-identical code, that the defendant had simply lifted blocks of source code from the plaintiff's software. See id. at 1077. The court entered a preliminary injunction requiring the defendants to issue a notice of recall to all of its distributors, with the notice to state that distribution of any infringing version of the software “may expose the distributor to liability as a contributory infringer.” Id. at 1081-82.
9.15.5 Remedies Under the Digital Millennium Copyright Act
/[Adapted from a U.S. Copyright Office summary, available on the World Wide Web at www.loc.gov; no copyright claimed in works of the U.S. Government.]/
Under the Digital Millennium Copyright Act (DMCA), any person injured by a violation of the anti-circumvention provisions of 17 U.S.C. § 1201 (see supra § 2.7[h]) or the copyright-management-information provisions of 17 U.S.C. § 1202 (see supra § 2.7[h][3]) may bring a civil action in Federal court. Section 1203 gives courts the power to grant a range of equitable and monetary remedies similar to those available under the Copyright Act, including statutory damages.
The court has discretion to reduce or remit damages in cases of innocent violations, where the violator proves that it was not aware and had no reason to believe its acts constituted a violation. See 17 U.S.C. § 1203(c)(5)(A).
Special protection is given to nonprofit libraries, archives and educational institutions, which are entitled to a complete remission of damages in these circumstances. See 17 U.S.C. § 1203(c)(5)(B).
Internet service providers (ISPs) are also given special protection from liability for copyright infringement, provided that they comply with certain procedural requirements in their operations (see
9.16 Criminal Liability for Copyright Infringement
Section 506 of the Copyright Act criminalizes copyright infringement (i) /for commercial purposes, /(ii) for bartering purposes, or (iii) if the retail value of the illegal copies would exceed $1,000. Specifically, infringement is subject to criminal penalties if it is done:
- “willfully and for purposes of commercial advantage or private financial gain,” 17 U.S.C. § 506(a)(1):
- “willful” infringement must consist of evidence of more than the mere intentional reproduction or distribution of copyrighted works. 17 U.S.C. § 506(a)(2);
- “financial gain” is defined as including “receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works,” to ensure that persons who illegally traffic in copyrighted works by using barter rather than cash are covered by the statute. 17 U.S.C. § 101; or,
- “by the reproduction or distribution, including by electronic means, during any 180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of more than $1,000[.]” 17 U.S.C. § 506(a)(2).
Conviction can result in imprisonment for up to one year (plus a fine) for minor offenses. 18 U.S.C. § 2319(b). Conviction of “the reproduction or distribution, during any 180-day period, of at least 10 copies . . . of 1 or more copyrighted works, with a retail value of more than $2,500” can result in a 5-year prison term, or a 10-year term in the case of a repeat offense. Id.
Computer equipment used in copyright infringement can be seized in a criminal action: Section 506 of the Copyright Act requires forfeiture, upon conviction, of “all infringing copies . . . and all implements, devices, or equipment used in the manufacture of such infringing copies . . . .” 17 U.S.C. § 506(b).
Violators of the anti-circumvention and copyright-management-information provisions of the Digital Millennium Copyright Act (see § 2.7[h] and § 2.7[h][3]) can also be fined and/or imprisoned. If a violation is willful and for purposes of commercial advantage or private financial gain, the violator can be fined and/or imprisoned – up to $500,000 and 5 years for a first offense, or up to $1,000,000 and 10 years for subsequent offenses. (Nonprofit libraries, archives and educational institutions are entirely exempted from criminal liability.) See 17 U.S.C. § 1204(b).
Selected cases:
United States v. Rothberg, 2002 WL 171963 (N.D. Ill. Feb. 4, 2002): Members of a computer software piracy group called “Pirates with Attitudes (PWA)” pleaded guilty to conspiracy to commit copyright infringement by distributing pirated computer software over the Internet; another member was found guilty after a jury trial. The computer equipment used to store the pirated software on an Internet site was seized; for purposes of the Sentencing Guidelines, the court assessed the value of the pirated software as being the retail value, which added up to more than $1.4 million.
9.17 Appendix: Sample Copyright Assignment Instrument
State of Whatever
County of Whereever
Know all men by these presents:
Ownership, copyright assignment form (sample)@END
Sells, assigns, and transfers to XYZ, INC., a Delaware corporation having a mailing address at [insert address] and a principal place of business at [insert address] (the Assignee), the entire right, title, and interest, including without limitation the right to sue and recover damages for past infringements of copyrights and the like, for the United States and all foreign countries, in and to that certain computer software package entitled [insert title, e.g., from copyright registration, if any] and whose U.S. copyright is registered with the Register of Copyrights under registration number TX-/[insert registration number, if any, or refer to registration application to be filed contemporaneously if applicable]/, all as more fully described below:
[Include adequate but nonconfidential description]
The assignment herein is subject only to the following Permitted Exceptions:
/[Insert list of Permitted Exceptions, e.g., licenses, security interests, etc., or make reference to separate list that will not be recorded]/
Assignor warrants and covenants that no assignment, grant, mortgage, license, or other agreement affecting the rights and property herein conveyed, other than the above-recited Permitted Exceptions, has been or will be made to others by the Assignor or any predecessor in title thereto, and that the full right to convey the same as herein expressed is possessed thereby;
To be binding on the successors and assigns of the Assignor and to extend to the successors, assigns, and nominees of the Assignee.
[Signature and notary acknowledgement]
[This page intentionally blank]
10 Export controls
https://www.bis.doc.gov/index.php/documents/regulations-docs/142-eccn-pdf/file
Software for automated analysis of geospatial imagery: https://www.govinfo.gov/content/pkg/FR-2020-01-06/pdf/2019-27649.pdf
11 Trademarks
11.1 Trademark Basics
At the moment, trademark law is the one intellectual property law issue that may be most likely to ensnare companies seeking to establish an Internet presence. Problems can arise, and a company can find itself embroiled in a controversy, even without the company's knowledge that it is doing anything that might be controversial.
For example, in July 1998, Microsoft reportedly paid $5 million to settle a case involving its right to use the trademark “Internet Explorer.” According to news accounts, a software developer sued Microsoft for trademark infringement, claiming prior use of the mark for another Internet browser. Microsoft attempted to defend on grounds that the mark was generic, but the court rejected the defense. Microsoft ended the case by purchasing the pending application to register the mark. See http://www.news.com/News/Item/0,4,23797,00.html.
11.1.1 What is a Trademark? A Service Mark?
Generally speaking, a trademark can be any word, phrase, slogan, graphic image (two- or three-dimensional), musical phrase (e.g., a tune), or other symbol used in the offer and sale of goods.
Examples of trademarks:
the words "Coca-Cola" and "Coke"
- the script version of the words "Coca-Cola"
- the red-ball Coke graphic
- the wasp-waist Coca-Cola bottle
- various slogans such as "Things Go Better with Coke," "It's the Real Thing," and "Just for the Taste of It"
- the various tunes played in Coke commercials
A service mark is a symbol that is used in offering or selling services; the applicable law is essentially the same as for trademarks. (For convenience, the term "trademark" is used in this document to refer to both trademark and service marks.)
11.1.2 What Kind of Marks are Protectable?
Not just any symbol can be protected as a trademark. A trademark must be capable of symbolizing, in the minds of the public, the goods or services that are offered, sponsored, or endorsed by the trademark owner, as distinct from the goods or services offered by others.
Categories of protectable marks include:
- coined or fanciful marks that have no other meaning (in any language). Some well-known examples are Xerox, Kodak, and Exxon;
- arbitrary marks that have a prior meaning but no association with the goods or services – e.g., Amazon for on-line retail services;
- suggestive marks that hint at some characteristic of the goods or services – e.g., Sprint for telecommunications services;
- descriptive marks that have acquired a “secondary meaning” (and thus are not “merely descriptive”) – e.g., Intensive Care Lotion
A “generic” term cannot function as a trademark, because by definition it is the common descriptive name of the goods or services in question, and therefore it cannot symbolize the goods or services offered, sponsored, or endorsed by any particular vendor.
Example: In the United States, "aspirin" was formerly a trademark of the Bayer company, but decades ago a U.S. court held that it had become a generic term (a long story involving World War I) and therefore was no longer protectable as a trademark. "Aspirin" still has trademark status in much of the rest of the world.
11.1.3 Who Has Priority of Rights in Trademarks?
Priority of trademark rights in the U.S. is based on use of the mark (although a federal registration application can be filed to establish a constructive priority on the basis of bona fide intent to use the mark). See 15 U.S.C. § 1051.
Under federal law, a trademark infringement suit requires the plaintiff to prove that it has priority and that the defendant's offering or sale of goods or services, using the offending domain name, is likely to cause confusion as to the origin, sponsorship, or endorsement of the goods or services. See 15 U.S.C. § 1114.
11.1.4 Infringement of Others' Trademark Rights
Under U.S. law, infringement of trademark rights consists of using the mark where a likelihood of confusion exists with a mark used by someone having priority. In most U.S. jurisdictions, the factors relevant to a determination of whether there is a likelihood of confusion are generally as follows:
- the strength or distinctiveness of the plaintiff's mark;
- the similarity of the two marks;
- the similarity of the goods or services identified by the marks in question;
- the similarity of the facilities the two parties use in their businesses;
- the similarity of the advertising used by the two parties;
- if the goods or services of the two parties are sold in different markets, the likelihood that the plaintiff will bridge the gap between those markets (sometimes referred to as the plaintiff's “natural zone of expansion”);
- the quality of the defendant's product;
- the sophistication of the purchasers and the amount of resources used in making a purchase decision — a $50,000 computer system will be purchased with more attention, by purchasers with greater training, than a $5 knick-knack;
- whether the defendant acted in good faith — because intent to copy another's trademark is often taken as circumstantial evidence that confusion is likely;
- any instances of actual confusion — because actual confusion, while possibly arising from non-trademark factors, can be compelling evidence that confusion is indeed likely.
See, e.g., Cardservice Intl'l, Inc. v. McGee, 950 F. Supp. 737, 740 (E.D. Va. 1997) (granting permanent injunction against pro se defendant's use of cardservice.com as domain name for company providing credit and debit card processing services in competition with established company of that name, and ordering defendant to pay $59,691.25 in attorneys' fees and expenses for bad-faith litigation)/; see also Polaroid Corp. v. Polarad Elecs. Corp./, 287 F.2d 492, 495 (2d Cir. 1961) (oft-cited list of factors bearing on likelihood of confusion). Not all of these factors are relevant to any given set of facts, nor must all factors be in the registrant's favor for a finding of confusion. Cardservice, 950 F. Supp. at 740/./
Upon proof of infringement of a federally-registered trademark, the registrant is entitled to recover the defendant's profits arising from infringement (and, as in copyright law, need prove only the defendant's gross revenues), plus any damages sustained by the registrant. 15 U.S.C. § 1117(a). The court has the discretion to award up to treble the actual damages; if the court determines that an award based on profits alone is either inadequate or excessive, “the court may in its discretion enter judgment for such sum as the court shall find to be just . . . .” Id.
11.2 Domain-Name Registration
11.2.1 Registration Mechanics
Registering a domain name is one of the first steps a business usually takes to establish an Internet presence. Domain names are registered through a process that is overseen by the Internet Corporation for Assigned Names and Numbers (“ICANN”), but with registrations actually processed by one of a variety of registrars (see http://www.icann.org/registrars/accredited-list.html for a list). One of the largest registrars for the United States is Network Solutions, Inc. (NSI).
11.2.2 Trademark Searches in Selecting a Domain Name
A trademark search by a professional search firm, possibly coupled with an opinion from trademark counsel about the availability of a proposed domain name, is often advisable before beginning widespread use of the name. One of the best-known search firms is Thomson & Thomson (http://www.thomson-thomson.com).
A favorable opinion of counsel can provide at least some comfort that a company's proposed investment in a domain name would not be wasted. In and of itself, however, an opinion will not shield the company from liability if it turns out that someone else's trademark rights are infringed or diluted by the domain name. (On the other hand, a competent favorable opinion can demonstrate the company's good faith in adopting the domain name and thus reduce the chance that infringement would be found to be willful, thereby reducing the risk of an award of enhanced damages and/or attorney's fees.)
11.3 The Problem of “Cybersquatting”
11.3.1 Some Examples
Domain names were formerly registered on a first-come first-served basis. That led to problems when owners of brand names in the real world (sometimes referred to as “meatspace”) discovered that others had registered domain names identical to their trademarks. For example:
- A so-called “cyber-squatter” registered approximately 240 domain names and then offered to sell the domain names to companies that he thought might be interested. The marks in question included, e.g., britishairways.com, deltaairlines.com, eddiebauer.com, crateandbarrel.com, neiman‑marcus.com, northwestairlines.com, ramadainn.com, unionpacific.com, and ussteel.com. See Intermatic Inc. v. Toeppen, 947 F. Supp. 1227, 1230, 1233 (N.D. Ill. 1996) (adopting magistrate judge's recommendation of summary judgment and permanent injunction in favor of plaintiff; holding that “cyber-squatter” defendant's registration of federally-registered trademark as domain name violated federal and state anti-dilution statutes); see also Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316, 1324-26 (9th Cir. 1997) (affirming summary judgment that defendant's registration of plaintiff's trademark as Internet domain name violated federal and state anti-dilution statutes).
- Injunctions were obtained in the cases of adultsrus.com and candyland.com for sexually-explicit Web sites. See Toys “R” Us, Inc. v. Akkaoui, 1996 WL 772709, 40 USPQ2d 1836 (N.D. Cal. 1996) (granting preliminary injunction, on anti-dilution grounds); Hasbro, Inc. v. Internet Entertainment Group, Ltd., 1996 WL 84853, 40 USPQ2d (BNA) 1479 (W.D. Wash. 1996) (granting preliminary injunction requiring defendant to remove all content from sexually explicit Internet site candyland.com).
An injunction was also obtained in the case of plannedparenthood.com for a Catholic-oriented site featuring pro-life messages, /see Planned Parenthood Federation of America, Inc.
- Bucci/, No. 97 Civ. 0629 (KMW) (S.D.N.Y. Mar. 19, 1997) (granting
preliminary injunction, on both trademark-infringement and anti-dilution grounds).
- In the early days of the Web, McDonald's restaurants were informed by a writer for Wired magazine that, to prove it could be done, he had registered “mcdonalds.com” as a domain name, and established an email address “ronald@mcdonalds.com.” See Joshua Quittner, /Billions Registered: Right Now, There are No Rules to Keep You From owning a Bitchin' Corporate Name As Your own Internet Address,/ Wired, Oct. 1994 at 54.
11.3.2 Action Under the Anticybersquatting Law
A trademark owner that finds itself beset by a cybersquatter can now sue the cybersquatter under the "Anticybersquatting Consumer Protection Act," enacted by Congress in 1999 to add a new subsection (d) to 15 USC 1125:
(d)(1)(A) A person shall be liable in a civil action by the owner of a mark, including a personal name which is protected as a mark under this section, if, without regard to the goods or services of the parties, that person–
(i) has a bad faith intent to profit from that mark, including a personal name which is protected as a mark under this section; and
(ii) registers, traffics in, or uses a domain name that–
(I) in the case of a mark that is distinctive at the time of registration of the domain name, is identical or confusingly similar to that mark; * * *
15 U.S.C. § 1125(d). The new legislation also provides for an award against cybersquatters of up to $100,000 in statutory damages as well as attorneys' fees.
If the trademark owner cannot find, or obtain personal jurisdiction over, the cybersquatter, then the owner can bring an “in rem” action against the registrar of the offending domain name to cancel the domain registration. See 15 U.S.C. § 1125(d)(2).
11.3.3 Action Under ICANN's Dispute-Resolution Policy
ICANN promulgated a dispute-resolution policy under which most types of trademark-based domain-name disputes must be resolved by agreement, court action, or arbitration before a registrar will cancel, suspend, or transfer a domain name. However, a trademark owner who wishes to take action against a cybersquatter can initiate expedited administrative proceedings by filing a complaint with an approved dispute-resolution service provider. See ICANN, Uniform Domain-Name Dispute-Resolution Policy, at www.icann.org/udrp/udrp.htm.
11.3.4 Action Under the Federal Anti‑Dilution Statute
Under a 1996 amendment to the federal trademark statute, the owner of a mark can also sue to enjoin use of a domain name that “dilutes” the distinctive quality of the trademark. See Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316, 1324-26 (9th Cir. 1997) (affirming summary judgment that defendant's registration of plaintiff's trademark as Internet domain name violated federal and state anti-dilution statutes); Jews For Jesus v. Brodsky, 993 F. Supp. 282, 46 USPQ2d 1652 (D.N.J.
- (granting motion for preliminary injunction); Intermatic, 947 F.
Supp. at 1235-36 (denying plaintiff's motion for summary judgment that “cyber-squatter” had engaged in trademark infringement (although granting motion as to violation of anti-dilution statute); fact issues about likelihood of confusion precluded summary judgment). Cf. Sega Enterprises Ltd. v. Sabella, 1996 WL 780560 (N.D. Cal. 1996) (denying plaintiff's motion for summary judgment of trademark infringement because of fact issues as to whether plaintiff had adopted the mark, but granting summary judgment of violation of plaintiff's state-law trade name rights).
The 1996 amendment provides that, subject to the principles of equity, the owner of a famous mark is entitled to an injunction “against another person's commercial use in commerce of a mark or trade name, if [1] such use begins after the mark has become famous and [2] causes dilution of the distinctive quality of the mark.” 15 U.S.C. § 1125(c)(1). [The text of this section is adapted from the opinion of the court in Akkaoui/.]/
The first question is whether a mark is famous and distinctive. Under the statute, a court making this determination may consider factors such as, but not limited to:
(A) the degree of inherent or acquired distinctiveness of the mark;
(B) the duration and extent of use of the mark in connection with the goods or services with which the mark is used;
(C) the duration and extent of advertising and publicity of the mark;
(D) the geographical extent of the trading area in which the mark is used;
(E) the channels of trade for the goods or services with which the mark is used;
(F) the degree of recognition of the mark in the trading areas and channels of trade use by the marks' owner and the person against whom the injunction is sought;
(G) the nature and extent of use of the same or similar marks by third parties; and
(H) whether the mark was registered . . . .
Id.
The second question is whether the defendant's use of the mark results in “dilution.” That is defined in the statute as “lessening of the capacity of a famous mark to identify and distinguish goods or services, regardless of the presence or absence of‑‑(1) competition between the owner of the famous mark and other parties, or (2) likelihood of confusion, mistake, or deception.” 15 U.S.C. § 1127. “In authorizing courts to enjoin dilution, Congress intended ‘to protect famous marks from subsequent uses that blur the distinctiveness of the mark or tarnish or disparage it.'” H.R. Rep. No. 374, 104th Cong., 1st Sess. 3 (1995).
12 Rice course
USE AN AMAZON-MEETING APPROACH? Houston Chronicle - Sarah Green Carmichael
13 Basic information
13.1 Course materials
Course materials: Notes on Contract Drafting (a work-in-progress of mine). (PDF) Update 2021-01-22: I've uploaded the first part only (due to size limitations) to Amazon for print-on-demand; I'll keep you posted.
For supplementary reading, some students like Professor Tina Stark's highly-regarded book, Drafting Contracts: Why Lawyers Do What They Do (2d ed. 2013), but whether to buy or rent it is entirely up to you; the online course materials contain everything on which you'll be tested. (The recently-published Kindle version is much less expensive than the trade paperback.) Disclosure: Tina is a longtime professional friend and mentor.
13.2 Zoom ground rules
This semester (spring 2021), the course will be done entirely by Zoom (and other online services) because of the global COVID-19 pandemic. Here are some ground rules you will be expected to follow.
- Be somewhere that your colleagues (and you) won't be overly distracted by noise and/or guest appearances by dogs, children, etc. (I'm pretty easygoing about these things, but be considerate of your classmates.)
- Your computer must have a working video camera and quality audio capability. (You might need an external microphone and/or a headset for decent audio quality.)
- You must join by video, not just by an audio-only phone connection.
- Leave your camera on, but it's fine if you need to step out for a minute, just as if we were meeting in person at the Law Center.
- Please be sure to speak up so that others can hear you. (Also, watch your mute button.)
- Be sure your name is shown in your Zoom profile, so that I'll know who's speaking.
13.3 Course objective: Exposure to the tools of the trade
Our primary course objectives and learning outcomes are to give each student an initial, survey-type exposure to the following tools of the contract drafter's and reviewer's trade:
- Techniques for drafting simple, understandable sentences and paragraphs to cover complex topics;
- Important legal doctrines, e.g., laws governing interest charges, indemnities, implied warranties, etc.;
- Crucial business issues that are commonly addressed in contracts;
- Practicing spotting and fixing language ambiguities that could cause problems down the road;
- The psychology of likely future readers such as business people, judges, and jurors;
- Finding and harvesting useful "precedents" (past contracts);
- Recognizing when to ask the partner or the client — and getting in the habit of documenting that you did so.
13.4 What this course won't do
First: Do NOT assume that we will "cover the material" in class.
We have a total of some 35 hours together in class. That's not nearly enough time to do justice to all the material you'll need to be aware of in order to be a competent contract drafter or reviewer. Possibly more than in your other courses, you'll need to be sure to do the reading if you want to get maximum benefit from the course.
As discussed below, the sage-on-a-stage lecture approach has been shown to be significantly less effective when it comes to comprehension and retention. For that reason, we will focus much of our class time on trying to make sure you understand and retain as many crucial points as possible.
Second: This course isn't like a driver's ed class, where completing the course will make you at least minimally competent to "go out on the road" by yourself. Becoming a competent contract drafter will take more time and practice than can be provided in a single three-semester-hour course.
Even after you finish this course, you likely will — and should — worry that you don't know what you don't know.
You could think of this course as being akin to a surgical-tools class in which medical students learn the basics of using scalpels, clamps, suture needles, and other surgical tools, and practice using those tools by doing a few simple procedures on an anatomical mannequin. Completing such a class, without more, should not make a student feel "comfortable" doing any kind of surgery on a live person. That's why newly-graduated doctors must still spend years in residencies to learn their trade. Much the same would be true if you were to try drafting a contract for a real client with no other training than this course.
13.5 Contract revising as well as drafting
In this course, we will practice good drafting skills — in part — by revising the work of others. This reflects what you're almost certain to see in practice: Contract drafters spend far less time drafting contracts than they do in reviewing and revising others' drafts, whether a given existing draft was prepared by "the other side" or was used in a previous deal.
Even when you're the one who must prepare the first draft, your supervising attorney will almost always tell you to find a previous form of agreement and modify it (and perhaps will suggest one), instead of starting from scratch with a blank screen.
13.6 Spaced repetition, with (some) jumping around
Some of the short exercises and quizzes that we do will seem repetitive; they also will seem to jump around from topic to topic. This is a feature, not a bug, because:
- It mirrors what you'll almost certainly see in practice.
- Pedagogically, spaced repetation been shown to be more effective at promoting long-term memory than lecture and repetitive reading; see generally the Wikipedia article at https://goo.gl/4PRZTy.
This approach will strike some students as disorganized. Over the years, though, most students seem to have come to appreciate the value of the approach, as mentioned in some of the student comments below.
13.7 Social proof: Past student comments (good and bad)
Following the sales-and-marketing principles of (i) using social proof, and (ii) "setting the hook," here are some student comments from UH Law Center course evaluations; from virtual-whiteboard feedback at the end of various past semesters; and from the occasional email from former students:
• "I saw what I learned in class be used at my job, so that was great to be able to use what I learned already as a student practicing."
• “I had the opportunity to redline a software agreement for the company I intern with and the Contracts Lawyer told me I did a very fine job. … The lawyer asked me how I was so well attuned to the various ways in which the software providers tried to undermine our company’s bargaining power. … I was amazed at how easily I could identify problematic language. …”
• "His course is different from the norm and his methods are refreshing. … Professor Toedt's approach allows students to figure out the issue on their own but provides students with the tools necessary to reach an answer (which he then explains/corrects)."
• "I like the in class exercises. Very helpful to lock in the concepts. I would recommend more of these types of exercises throughout the class. Amount of reading was reasonable."
• "One of the best classes of my time in law school. Great progressive approach to teaching. I can only hope that UH will adopt Toedt's methodology for other classes."
• "I liked the practical approach of the course – very effective teaching technique by using repetition and in class exercises."
• "You learn piece by piece the process throughout the semester to be able to effectively draft/redline contracts."
• "I really enjoyed your class. At every class, I felt like I were a summer associate studying under a law partner and the partner (you) would take us to nice, low-key lunches and shared with us a bunch of practice tips through the Tango Terms. I really appreciated all the guidance. I like the formal drafting assignment (employment letter) a lot."
• "The [Zoom] breakout rooms work very well."
• "The course was a good survey of practical issues, both business and legal, that arise during contract drafting and negotiations. The textbook was easily accessible online, with class time focused on discussing the reading. The discussion-based class format combined with spaced repitition and the homework quizzes helped make the material more concrete. I thought the short-answer questions were a good addition to the quizzes, but I think more practice drafting exercises such as the offer letter would be more effective in providing hands-on learning. Compared to other courses, the reading and homework were relatively light, so Prof. Toedt could cover more material if he wanted to without overloading students."
• "I love the breakout rooms, the Google white board, and Canvas for quizzes." (Capitalization corrected.)
• "The course translated well to a virtual format, with breakout rooms substituting for in-class group activities. Using Canvas for online homework/quizzes also worked well."
• "I love this course. I learned a lot of real-life contract drafting experiences."
• “Professor Toedt's class was fantastic. I thoroughly enjoyed the content/delivery, and I learned more real world applicable information in this class than I have in most others. Having this class over Zoom was not ideal, but he made the most of it and kept the collaborative elements of the course intact. He clearly has a wealth of knowledge and experience.”
• “The course is very practical and a good refresher for drafting rules and key negotiations tactics, applicable in any area of practice of law. Prof. Toedt’s approach in utilizing his own written terms form (Tango Terms) makes the learning easier as we learn practically ‘from the horse’s mouth.’ I enjoyed his repetition style that allowed internalizing concepts, and the periodic quizzes that helped foster needed reviews and flashback to further the learning process. Great class, remarkable style, and awesome instructor!”
• “I've taken many courses at UH Law School, and I must say that this course was taught in the most ‘real-world application’ style in comparison to my previous courses. My experience with courses in the past was shaded by the bombardment of textbook pages and black and white material. What this class did phenomenally was apply the concepts of contract drafting in such a way that if I was to go into practice tomorrow, the tools that I have acquired in this class have made me more than adequately prepared. In light of these comments, I stress that Professor Toedt's emphasis on group collaboration and constant engagement in ensuring that students were learning through mediums of real-world practically made this class an absolute pleasure. He had set up the class in such a way where students were learning through their engagement with each other and with the help of brainstorming and the professors guided assistance learning these concepts didn't simply become ‘study and dump’ but meaningful and engaging learning. So again, I must say thank you. Thank you for not only taking time to develop the extensive course material but to also genuinely care in the process of teaching and learning that each of the students go through. This has been truly an unforgettable learning experience.”
• "Great job! Loved the quizzes. Very helpful class."
• "… really enjoyed the approach to class and quizzes."
• "Love the quizzes! They are really helpful to learn things, and the spaced repetition was excellent. Also they were a good way to test what we knew and where we were in class so we had an idea of how things were going."
• "I liked both the class and instructor and would recommend this course."
• “This was a great class, Professor Toedt's approach to teaching is clear and concise.”
• “Professor Toedt is the ‘original gangster’ (hereafter ‘OG’) of contract drafting. I'm fortunate to have taken his class. He is incredible. Thanks for your public service.”
• “Professor Toedt is remarkable at contract drafting. It is a privilege to take this class with him. He does his job exceptionally well. Very respectful man.”
• “Professor Toedt is great at what he does! He really knows his stuff and makes sure you know it too. I really like the approach of having different sections of a contract due as homework every week. This helped me really learn about the different sections and helped me stay on track to writing an entire contract by the end of the semester. All in all, wonderful professor!”
• “Very insightful and practical class. The professor is very effective in conveying the information in a rememberable and engaging fashion. I truly enjoyed this course and will be using what I learned in practice next year. Thank you, Professor Toedt!”
* * *
Not everyone was so enthused; here are some less-positive comments, along with my responses.
• "The classes felt a little haphazard on a weekly basis." (From a different student's review:) "[T]he course is extremely unorganized …." DCT RESPONSE: The topics covered in the course are arranged in very rough order of importance (in my experience). And, as noted above, spaced repetition can indeed feel like jumping around, but it's key to the approach of this course.
• "I thought some of the reading assignments were a little long. It just looks daunting and I am not motivated when one section has 20-50 subsections." DCT RESPONSE: Noted — I've redone the reading assignments to indicate more what must be read closely, versus what can be merely looked over or skimmed (so that you'll likely remember that it's there and can look it up if you ever need it in the future).
• "I felt like we spent a ton of time revising contracts and simplifying them, but I'm still not sure that I have a great grasp of all the sections of a contract." (From a different student's review:) "I liked that the class stressed practical knowledge and what to look out for when reviewing contracts but I do not feel like that this has translated into me feeling confident (or even semiconfident) writing or reviewing a contract in real life." DCT RESPONSE: It's normal not to feel confident until you've had a fair amount of real-world experience that didn't blow up on you. Think back to when you first drove a car by yourself: You probably were just a bit nervous, which was entirely appropriate.
• "To me, I think the stress of a contract for a law student is the idea of, if you're assigned to write up a contract from scratch, your thought is, where do I even begin?" DCT RESPONSE: Noted; I'm thinking about how to remedy this with some kind of step-by-step procedure — although as pointed out above, contract drafters almost never start with a clean sheet of paper or a blank computer screen.
• "I would appreciate a little bit more traditional lecturing as opposed to asking us to discuss what we thought was helpful or surprising about the reading. I always left class unsure of whether I learned material properly. I enjoyed the break out rooms and working with the other students in the class the most." DCT RESPONSE: Noted, but the desire for traditional lecturing seems to be a minority view — and pedagogical research has shown that lecturing is one of the least-effective ways of information transfer.
14 Administrative details
14.1 Email addresses
On the first day of class I will be asking for your email addresses so that I can include it in a class Google Group. Please provide an email address that you check regularly.
14.2 Computer use
Computer use in class is not just encouraged but required; you will need in-class Web access for many of the in-class exercises. If this will be a problem, be sure to contact me well in advance.
(You might, however, want to rethink the extent to which you use laptops in your other classes; see, e.g., this article by a professor at the University of Michigan about how classroom laptop users not only do worse than those who take notes by hand, they also interfere with the learning of non-laptop users around them.)
14.3 Extra class time each day (to avoid a Friday-night makeup class)
I'm a practicing attorney and arbitrator; I normally don't have to miss class, but it has been known to happen, e.g., when I've had out-of-town commitments. There have also been times when we’ve had to cancel class due to weather. (And on the evenings of Game 7 of the 2017 and 2019 World Series, we canceled the evening class.) [DCT NOTE for spring 2021: Given that just about everything is being done by Zoom nowadays, it seems unlikely that we'll have to cancel class either for weather or for my travel.]
The ABA requires 700 minutes of instruction for each credit hour; that means we need 2,100 minutes of instruction for our three-hour course. We will achieve the needed minutes of instruction by:
- meeting for 80 minutes per class for 26 class meetings, vice the normal 27 scheduled class meetings, to get 2,060 instruction minutes;
- making up the remaining 40 instruction minutes via “online” instruction in the form of emails and other discussions, as permitted by ABA rules;
- using the resulting “spare” class #27 as a makeup day if necessary, otherwise ending the course at #26;
- as a last resort, meeting on one of our scheduled Friday-evening makeup days (not the situation of choice).
14.4 Recording my lectures: Go ahead if you want
I don't make audio recordings of my in-class lectures, but I have no objection to students doing so and sharing the recordings with other UHLC students. [NEW for spring 2021: I'm exploring possibilities for prerecording audiobook-style narration of the readings, so that people can listen to them; I'll announce it if that happens.]
The following is a UH-required element for the syllabus as provided by the Associate Dean's office:
Students may not record all or part of class, livestream all or part of class, or make/distribute screen captures, without advanced written consent of the instructor. [DCT note: See above for my consent.]
If you have or think you may have a disability such that you need to record class-related activities, please contact the Center for Students with DisABILITIES.
If you have an accommodation to record class-related activities, those recordings may not be shared with any other student, whether in this course or not, or with any other person or on any other platform.
Classes may be recorded by the instructor.
- Students may use instructor’s recordings for their own studying and notetaking.
- Instructor’s recordings are not authorized to be shared with anyone without the prior written approval of the instructor.
Failure to comply with requirements regarding recordings will result in a disciplinary referral to the Dean of Students Office and may result in disciplinary action.
(Extra paragraphing and bullets added.)
And a strongly-recommended syllabus element from the Associate Dean's office:
Any recordings created will be deleted and destroyed shortly after the final exam for the class. [DCT revision: I will usually delete recordings around one week after the class — I use my own Zoom account, which has limited cloud recording space.]
There is a chance that your contributions to class discussion, whether voluntary or while on call, may be included in the recording. Your continued registration in this class indicates your acquiescence to any such incidental recording for the purposes described above.
14.5 Synchronous online course
The following paragraph is recommended by the Associate Dean's office:
This course is being offered in the Synchronous Online format. Synchronous online class meetings will take place according to the class schedule. There is no face‐to‐face component to this course.
In between synchronous class meetings, there may also be asynchronous activities to complete (e.g., discussion forums and assignments).
This course may have a final exam per the University schedule. [DCT COMMENT: Make that "WILL have a final exam."] The exam will be delivered in the synchronous online format, and the specified date and time will be announced during the course. /[DCT COMMENT: See
Prior to the exam, descriptive information, such as the number and types of exam questions, resources and collaborations that are allowed and disallowed in the process of completing the exam, and procedures to follow if connectivity or other resource obstacles are encountered during the exam period, may be provided.
14.6 Syllabus changes?
The following is a UH-required element for the syllabus as provided by the Associate Dean's office:
Due to the changing nature of the COVID-19 pandemic, please note that the instructor may need to make modifications to the course syllabus and may do so at any time. Such modifications
maycould include changes to the mode(s) of assessment for the course. Notice of such changes will be announced as quickly as possible through email.
14.7 Last-day agenda: Reviews, Jeopardy, pizza?
In the Tango Terms manual, see the model syllabus for the last class day.
15 General information
My contact information: I can be reached at email dc@toedt.com or (713) 364-6545 (which also forwards to my cell); see also my About page. I respond pretty quickly to email questions. If I think that a question might be of interest to other students, I’m likely to copy and paste it (possibly edited, and with identifying information redacted) into an email to one or both sections.
My office hours: As an adjunct professor, I generally don’t physically come to the school except to teach class (and not at all during the pandemic). I’m happy to meet with students (on Zoom) by appointment as follows:
| HOW | WHEN | APPT. NEEDED? |
| In person (when class meets in person) | M or W 5:30 p.m. | Yes |
| In person (when class meets in person) | M or W 7:20 p.m. (ten minutes) | No |
| Skype or Zoom video; phone | M-F 3:00 p.m. | Yes |
I strongly encourage each student to make at least one appointment during the semester to discuss any questions that they or I might have.
16 Counseling available
Counseling and Psychological Services (CAPS) can help students who are having difficulties managing stress, adjusting to the demands of a professional program, or feeling sad and hopeless. You can reach CAPS (http://www.uh.edu/caps) by calling 713-743-5454 during and after business hours for routine appointments or if you or someone you know is in crisis. No appointment is necessary for the “Let’s Talk” program, a drop-in consultation service at convenient locations and hours around campus. See http://www.uh.edu/caps/outreach/lets_talk.html for more information.
17 Sexual harassment policy
The University is committed to maintaining and strengthening an educational, working and living environment where students, faculty, staff, and visitors are free from discrimination and sexual misconduct. If you have experienced an incident of discrimination or sexual misconduct, there is a confidential reporting process available to you. For more information, please refer to the University system’s Anti-Discrimination Policy SAM 01.D.07 and Sexual Misconduct Policy SAM 01.D.08, available here:
- http://www.uhsystem.edu/compliance-ethics/uhs-policies/sams/01-general-information/index.php
- http://www.uhsystem.edu/compliance-ethics/_docs/sam/01/1d7.pdf (antidiscrimination)
- http://www.uhsystem.edu/compliance-ethics/_docs/sam/01/1d8.pdf (sexual misconduct)
Please be aware that under the sexual misconduct policy, SAM 01.D.08, faculty are required to report to the University any information received regarding sexual misconduct as defined in the policy.
Please note that the reporting obligations under the sexual misconduct policy reach to employees and students.
Also, as a required reporting party, Law Center employees and faculty members are not a confidential resource.
18 Grading: 750 points
The school’s required average: 3.20 to 3.40: As required by law school policy, raw grades will be adjusted proportionally to the extent necessary to make the average of the final class grades fall within that range.
(My usual practice — but not a guaranteed one — is to “move the curve” up or down as necessary so that the average is at or near the high end of the required range.)
Your final grade is based on the total possible points stated above: Your course grade will be based on how many of these points you earn AND ALSO how well others in your section do, as explained below. (Note how the total points is /not repeated here, to be sure they stay consistent.)/
Important note: You might get very-high raw scores on the homework assignments and final exam, but keep in mind that the average for each section MUST be no higher than a B-plus. This means that the Canvas system might show you as having an "A" grade based on your raw scores, but what matters is how you do relative to the other students in your section.
(Each section is curved separately.)
18.1 Attendance “signing bonus”: 100 points — with a claw-back
Every student starts out with the above “freebie” points for class attendance, but can lose points for missing class, as follows:
| TOTAL CLASSES MISSED | TOTAL POINTS LOST |
| 1 | 0 |
| 2 | 10 |
| 3 | 30 |
| 4 | 60 |
| 5 or more | all 100 |
This means, of course, that students who miss more than one class will have to do that much better on the final, the quizzes, and homework in order to keep up with their classmates on the school-required average.
Some absences won’t lose points, however:
• I don't count absences during the first week for newcomer students who join the class during adds and drops.
• I don’t count absences for “official” law school travel, e.g., for moot-court competitions, etc., as long as I’m informed in advance. (This seems of marginal relevance during the pandemic.)
• I also don’t count up to two absences for illness (yours or someone for whom you need to care, e.g., a child). If you’re ill and we’re meeting in person, please don’t come to class and infect the rest of us. Please email me if you’ll be absent for illness; I’ll take your word for it without a doctor’s note.
• Other absences, e.g., for job interviews, office visits, work trips, etc., will be counted as missed classes and will lose points as set forth above; please schedule accordingly.
• During times that we meet online via Zoom, I will track absences using the Zoom participant list or using other online tools.
Why attendance is especially important: The class attendance policy arises from the fact that we will be doing:
- a significant amount of in-class discussion; and
- a significant number of in-class exercises in small groups.
Consequently, it’s important for all students to attend each class, not just for their own benefit, but so that their teams won’t be shorthanded.
School policy requires attendance at 80% of the class meetings for each course. We will meet a total of 26 times; rounding to the nearest whole number of classes, a student therefore must attend at least 21 class periods to comply with the 80% rule.
18.2 Mid-term take-home quizzes: 350 pts
Take each quiz below — on Canvas — at any time starting at 9:00 p.m. on the Wednesday immediately preceding the due date.
Each quiz is open-everything (book, Internet, other reference materials). BUT: No collaboration with anyone else; there might be an Honor Code compliance question.
Each quiz will be timed; the duration is TBA but probably quite long The quizzes will be untimed. One of the principal purposes of each quiz is to provide students with an "opportunity" to review and work with the material.
The later quizzes will include material covered in previous quizzes (there's that spaced-repetition concept again).
Each quiz is due at 12:00 noon Houston time on the specified date. Late submissions will be docked points; the exact number of points is TBA.
- Quiz #1: Due Mon. Feb. 08 — 20 pts
- Quiz #2: Due Mon. Mar.
0108 — 50 pts - Quiz #3: Due Mon. Mar.
2229 — 60 pts - Quiz #4: Due Mon. Apr.
1219 — 120 pts - Quiz #5: Due Mon. Apr. 26 — 100 pts (this is a more-or-less comprehensive review quiz).
These quizzes will include progressively-more review material.
Each quiz will include a mix of true-false, multiple-choice, fill-in-the-blank, and/or “micro-essay” (short answer) questions.
Each quiz will cover only the following:
- the readings assigned up through and including the homework due date, whether or not we discuss any particular topic in class;
- any review questions relating to the reading;
- anything in the in-class and homework exercises that we have done to date — that way, the homeworks themselves will thus serve as a "spaced repetition" reinforcing review that takes advantage of the testing effect;
Each quiz will be graded partly anonymously — the Canvas software shows me students’ names; I can’t do anything about that, but:
- Canvas automatically grades the true-false, multiple-choice, and fill-in-the-blank (“FITB”) questions.
- I review any “incorrect” fill-in-the-blank answers so that I can give credit for simple misspellings, which Canvas can’t always pick up. (I program the quizzes on Canvas to accept as many misspellings as I can think of, but you’d be surprised how "creative" students can be in their spelling ….).
- If a quiz includes any micro-essay questions, your answers to those questions will not be anonymous at all.
In past semesters, a few students have gotten the right answer to every question on a quiz; in response, one student suggested that I should “[d]esign quizzes to have a wider score distribution.” I’m less interested in a wide score distribution than in helping all students to understand and retain the material.
WARNING: If you just copy and paste answers from this document or from the model answers from previous quizzes you'll get zero points for that question, because:
- I need to see how you think;
- When you have to rephrase a concept in your own words, it helps you better grasp and retain the concepts.
18.3 Contract-drafting assignments: 100 points total
Students will draft a couple of simple agreements for "MathWhiz," a hypothetical client.
Successive drafts will be due at various dates
Students are free to work collaboratively, but if you partner up with anyone, be sure to note that on your submission.
WARNING: The warning just above about quizzes applies equally to drafting assignments.
18.4 Final exam: 200 points
The final exam:
- will be one hour in length, at the time scheduled for the final exam;
- will consist in large part of what amounts to a quiz on steroids;
- will take place on Canvas (and can be done from anywhere); and
- will be open-book, open-notes, open-browser — but no communication with anyone else, whether by text, email, IM, or anything else.
The Honor Code will apply; there will be a one-point question asking you to certify compliance.
What’s fair game for the final exam? Anything:
- in the assigned reading materials, especially the "Pro tips" and "Cautions";
- in the homework, quizzes, and in-class exercises.
Note: For the micro-essay questions, calling for one- or two-paragraph answers, just copying and pasting from the Tango Terms or other course materials won’t cut it becase I'll be looking for your thinking.
18.5 Class participation bump
As permitted by law-school policy, I reserve the right:
- to award discretionary increases in student grades by one-third of a grade level for excellent class participation, e.g., from a B to a B-plus, assuming that this doesn’t cause the class average to exceed the maximum permitted; and
- to reduce grades for sub-standard class participation. (I’ve almost never done that, except some years ago for a couple of students for whom it was like pulling teeth to get them to participate even minimally.)
19 Setup & macros
Trade secrets: Day 2, Thur. Mar. 18
20 In-class reading
(This gouge covers U.S. law; other countries are likely to have similar rules.)
20.1 Sources of law
1. The Defend Trade Secrets Act is a federal statute.
2. The Uniform Trade Secrets Act has been enacted (sometimes with minor variations) in 48 states, D.C., Puerto Rico, and U.S. Virgin Islands.
20.2 Basic definition of "trade secret"
A party claiming that particular informatin is a trade secret must introduce legally-sufficient evidence — and persuade the judge or jury by a preponderance of the evidence — of the following:
- Reasonable efforts were made to maintain confidentiality.
- The information in question "derives independent economic value, actual or potential, from [i] not being generally known to, and [ii] not being readily ascertainable through proper means by, another person [iii] who can obtain economic value from the disclosure or use of the information" — from the Defend Trade Secrets Act definition, 18 U.S.C. § 1839(3).
20.3 Some information is disqualified from trade-secret status
Published information can't be a trade secret.
Patented information is (by definition) published.
20.4 Three Rules for protecting confidential information
Rule 1: Lock It Up — within reason.
Rule 2. Label It — ditto: Marking of confidential information is important: Courts help those who help themselves, when it comes to protecting confidential information.
Rule 3. "Safe Sex":
- Be choosy about the "partners" to whom you disclose — or from whom you receive — confidential information;
- Use "protection," in the form of a confidentiality agreement ("NDA") OR a no-confidentiality agreement.
20.5 Employees and their employers' trade secrets
Employees generally don't need to sign NDAs to be legally obligated to protect their employers' confidential information — the law automatically imposes such an obligation (referred to as an "implied-in-fact" obligation).
But it's a good idea for companies to have their employees sign at least a bare-bones confidentiality agreement (for use as a sound bite).
20.6 NDA gouge
1. Two-way NDAs, protecting each party's (eligible) information, are usually better than one-way NDAs that protect only one party's information.
2. Marking: Requiring marking of confidential information (e.g., in an NDA) can be problematic, because compliance isn't always 100%.
20.7 Remedies for trader-secret misappropriation
Upon proof of misappropriation, a court might:
- award compensatory damages such as:
- the trade secret owner's lost profits;
- possibly the misappropriator's profits from the infringement ("disgorgement");
- possibly a reasonable royalty;
- award punitive damages;
- injunctive relief, e.g., ordering the misappropriator to stop selling / using the misappropriated information.
(Optional further reading: Marylee Robinson and Neil Eisgruber, Trade Secret Damages: A Look at Available Remedies (2016).
21 Discussion questions
21.1 Baade Company BBQ
FACTS: Alice, an experienced BBQ cook, goes to work for the Baade Company BBQ restaurant and is taught how to make that restaurant's sauces and meat rubs. After working for Baade Company for three months, Alice leaves to take a better-paying job at Crusty Meats, another BBQ restaurant,
Optional reading (totally unrelated): Obituary of Hans Baade (pronounced "BAA-daa"), one of my favorite professors at UT Law.
- QUESTION: Could Baade Company sue Alice for misappropriation of trade secrets? Why or why not?
- QUESTION: Could Baade company sue Crusty Meats for misappropriation? Why or why not?
- QUESTION: What sorts of facts might Baade Company's trial counsel want to put in front of the jury as indirect evidence of misappropriation?
- QUESTION: At trial — with 20-20 hindsight — what sorts of actions might Baade Company wish it had taken earlier to provide more evidence for its trade-secret case?
- QUESTION: If Baade Company were to successfully sue Alice and/or Crusty Meats for misappropriation of trade secrets, what might the court order as "remedies" for the misappropriation?
DIFFERENT FACTS: The experienced BBQ cook leaves Baade Company and opens her own BBQ restaurant. She uses her own, different recipes but closely copies the architecture and kitchen-equipment layout of the Baade Company restaurant.
- QUESTION: Could Baade Company successfully sue for misappropriation of trade secrets?
- Optional reading: Taco Cabana Int'l, Inc. v. Two Pesos, Inc., 932 F.2d 1113, 1123 (5th Cir. 1991), aff'd as to trade-dress issue, 505 U.S. 763 (1992). See especially the Fifth Circuit's discussion of the standard of review, i.e., how little latitude an appellate court has in reviewing a jury verdict.
21.2 Sports plays as trade secrets
Consider sports plays:
- QUESTION: In basketball, would a pick-and-roll play be considered a trade secret? Why or why not?
- Would the Houston Rockets' playbook be considered a trade secret? How about the Los Angeles Dodgers' pitcher-catcher hand "signs"? (Too soon?)
Optional reading: Rice Ferrelle, Combating the Lure of Impropriety in Professional Sports Industries: The Desirability of Treating a Playbook as a Legally Enforceable Trade Secret, 11. J. Intell. Prop. L. 149, parts III, IV (2003).
21.3 A locksmith case
FACTS:
- For a popular line of keyed locks, duplicate keys can be made by "reverse engineering" the tumbler combinations (something locksmiths can do).
- A locksmith reverse-engineers the tumbler combinations for that line of keyed locks and publishes a book of the combinations, allowing locksmiths to make duplicate keys for the locks.
- The manufacturer of the line of locks sues for misappropriation of trade secrets.
- QUESTION: What result?
- Optional reading: Chicago Lock Co. v. Ely, 676 F.2d 400, 403-04 (9th Cir. 1982).
22 Additional reading
Footnotes:
Editor's note: The specificity of the required notice was considered in ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619 (4th Cir. 2001) (reversing and remanding summary judgment in favor of accused ISP). The court held that the notice requirement was substantially met when “ALS Scan provided RemarQ with information that (1) identified two sites created for the sole purpose of publishing ALS Scan's copyrighted works, (2) asserted that virtually all the images at the two sites were its copyrighted material, and (3) referred RemarQ to two web addresses where RemarQ could find pictures of ALS Scan's models and obtain ALS Scan's copyright information. In addition, it noted that material at the site could be identified as ALS Scan's material because the material included ALS Scan's ‘name and/or copyright symbol next to it.'” Id. at 625.