Summary
discussing the distinction between a program's "static structure" and "dynamic structure"
Summary of this case from Computer Associates Intern., Inc. v. AltaiOpinion
No. CV 89-0811.
August 9, 1991.
Weil, Gotshal Manges by Stephen D. Kahn, New York City, for plaintiff.
Anderson Kill Olick Oshinsky by Susan G. Braden, Washington, D.C., Susman Godfrey by Steven D. Susman, Dallas, Tex., for defendant.
TABLE OF CONTENTS
I. INTRODUCTION .......................................... 549 II. FACTS AND BACKGROUND .................................. 549
A. Parties ........................................... 549 B. Computers, Computer Programs, and Operating Systems ................................. 549 C. Operating System Compatability Components (Interfaces) ........................... 551 D. The Computer Programs ............................. 552
1. CA-SCHEDULER .................................. 552 2. ADAPTER ....................................... 552 3. ZEKE .......................................... 552 4. OSCAR ......................................... 552 E. Dramatis Personae ................................. 553 1. James P. Williams ............................. 553 2. Claude F. Arney, III .......................... 553 F. Development of OSCAR 3.4 .......................... 553 G. Rewrite of OSCAR 3.4 into OSCAR 3.5 ............... 554 H. Evaluation of Altai's rewrite of OSCAR ............ 554
III. DISCUSSION .......................................... 555
A. Copyright Infringement ............................ 555 1. Ownership of a Valid Copyright ................ 555 2. Copying of the Copyrighted Work ............... 557 a. Access .................................... 558 b. Substantial Similarity .................... 558 i. Similarities between ADAPTER and OSCAR 3.4 ................. 560 ii. Similarities between ADAPTER and OSCAR 3.5 ................. 561 B. Misappropriation of Trade Secrets ................. 562 1. Preemption .................................... 563 a. Law of the Case? .......................... 563 b. Preemption Analysis As Applied to the Facts .............................. 563 2. Choice of Law ................................. 566 a. Which State's Principles? ................. 566 b. Which State's Substantive Law? ............ 566 c. Is the Texas Statute of Limitations a Bar?. 566 C. Damages ........................................... 567 1. CA's View of Damages .......................... 567 2. Altai's View of Damages ....................... 568 3. Defects in CA's View .......................... 568 a. CA's Actual Damages ....................... 568 b. Altai's Profits from OSCAR 3.4 ............ 570 c. Altai's Enhanced Good Will ................ 570 4. Defects in Altai's View ....................... 570 a. CA's Actual Damages ....................... 570 b. Altai's Profits from OSCAR 3.4 ............ 571 c. Altai's Enhanced Good Will ................ 571 5. Evaluation and Conclusion as to Damages ....... 571 6. Interest ...................................... 572 D. Housekeeping Matters .............................. 572 1. Punitive Damages .............................. 572 2. Attorney's Fees ............................... 572 a. OSCAR 3.4 ................................. 572 b. OSCAR 3.5 ................................. 573 3. Fees of Dr. Davis ............................. 573 4. Costs ......................................... 573 5. The French Motion ............................ 573 6. Exhibits ...................................... 573
IV. CONCLUSION ............................................ 573
MEMORANDUM AND ORDER
I. INTRODUCTION
Plaintiff Computer Associates International, Inc. ("CA") brought this action in August 1988 alleging that defendant Altai, Inc. ("Altai") had copied substantial portions of CA's SCHEDULER program into Altai's own computer software programs known as ZEKE, ZACK, and ZEBB. CA claims that Altai infringed CA's copyright in CA-SCHEDULER; in addition, CA claims that Altai misappropriated CA's trade secrets by incorporating elements of the CA-SCHEDULER program into ZEKE, ZACK, and ZEBB. The focal point of CA's claims of both copyright infringement and trade secret misappropriation is a discrete portion of Altai's programs called OSCAR, which CA contends was copied from a portion of its CA-SCHEDULER program known as ADAPTER.
After most of the pretrial proceedings had been completed, this case was assigned to the undersigned for trial without a jury. Because of the extensive technical evidence and expert testimony anticipated from both sides, the court appointed Dr. Randall Davis of the Massachusetts Institute of Technology as its own expert, pursuant to Fed.R.Evid. 706.
Trial commenced on March 28, 1990, and concluded on April 6, 1990, following which counsel submitted additional memoranda for the court's consideration.
This memorandum and order disposing of this action includes the court's findings of fact and conclusions of law as required by Fed.R.Civ.P. 52(a).
II. FACTS AND BACKGROUND
A. The Parties
Plaintiff CA is incorporated under the laws of the State of Delaware, and has its principal place of business at 711 Stewart Avenue, Garden City, New York 11530. Defendant Altai is incorporated under the laws of the State of Texas and has its principal place of business at 624 Six Flags Drive, Arlington, Texas 76011. Both CA and Altai design, develop, market, and support various computer software programs.
B. Computers, Computer Programs, and Operating Systems
To understand what ADAPTER and OSCAR do, it is necessary to focus upon how computers work and consider some basic computer terminology. Computers are machines which can do certain things based upon instructions. A computer is traditionally viewed as composed of three fundamental components: a CPU (central processing unit), some memory, and some means of getting input and displaying output. The CPU is where all the actual computing is done. Memory is used to hold the program that is being run, as well as to provide a place for the program to store the intermediate results of a calculation.
A computer program, as defined in 17 U.S.C. § 101, "is a set of statements or instructions to be used directly or indirectly in a computer to bring about a certain result." Computer programs can be classified as systems programs and applications programs. Systems programs are concerned with the operation or use of the computer. Applications programs perform a task or set of tasks for the computer user, such as payroll accounting, data base operation, or word processing.
Programs that run on the same computer and operating system can be divided into three types. The first, resident programs, reside in the computer's memory where they run continuously. CA-SCHEDULER and Altai's ZEKE are resident programs. A second type, batch programs, are scheduled, started, and run to completion of a particular job. The third group, server programs, are resident programs used by other programs to perform a service. ADAPTER and OSCAR are both classified as server programs.
One particular type of system software is called operating system software. Operating systems are the programs that manage the resources of the computer and allocate those resources to other programs that need them. For example, operating system software might perform, among others, these functions:
— channeling information entered at a keyboard to the proper application program;
— sending information from an application program to a display screen;
— providing blocks of memory to an application program that requires them; and
— allocating processing time among several application programs running on the computer at the same time.
Operating system software interacts with whatever other programs are being used or "executed" by the computer, providing computer resources such as processors, memory, disk space, printers, tape drives, etc. for the other programs that need them through what are often referred to as "system calls". For this interaction to occur properly, the other programs must be compatible with the operating system software in use on the computer, i.e., they must be able to exchange information precisely and accurately with the operating system to interact with those computer resources.
The computers involved in this case are IBM's System 370 family of computers. These are mainframe computers which come in varying sizes. IBM designed and developed three different operating systems for use with its System 370 computers: DOS/VSE for use with the small-to-medium-size computers; MVS for larger computers; and CMS for interactive computers.
DOS/VSE and MVS are especially popular operating systems with businesses that run mostly batch jobs (which are sequences of application programs requiring no active user input during job execution), although both systems can support interactive applications in which users continuously interact with the computer. Businesses that run interactive applications or do a large amount of application development, which is also highly interactive, often choose the CMS operating system, which is the most efficient system for a highly interactive environment.
Although the mix of batch and interactive jobs is a major influence in a data center's choice of operating system, all data centers run a large number of batch jobs each day. Job scheduling programs are particularly useful in managing the summary of batch jobs.
Because an operating system manages the operation of a computer, a computer program must "fit", or "speak in the same language as", the operating system used by the computer on which the program is run. In general, a program written for one operating system, e.g., DOS/VSE, will not, without modification, run under another operating system such as MVS.
It is commercially desirable for software development companies like CA and Altai to market the same system or application program in versions that can run in connection with different operating systems. That way, users can take advantage of the services which the system or application program provides and the methods for its use, regardless of what operating system they are currently using. Users can switch operating systems (for example, users may switch from VSE to MVS as their computer installations grow), or even use multiple operating systems, yet continue to use a program that appears to them to be functionally identical. Using application or system programs that can function on several different operating systems can save a data center time and money that would otherwise be spent acquiring new programs similar in functionality to the old ones, adapting the system to run them, and training users to operate them.
Various approaches to software development address this operating-system problem. One common technique is to develop different versions of the program that are identical in most respects, but have system calls written to function under the different operating systems. Thus, for example, a software company might develop three versions of an application or system program, one each for DOS/VSE, MVS, and CMS. Each version might also be rewritten somewhat to take advantage of features offered in one operating system but not another.
A deficiency inherent in this approach is that it requires a software company to develop and maintain many different versions of the same program. Changing the program or adding new features requires modifications to all versions. When problems are found and fixed in one version, the other versions must be examined to determine if the same problem must be fixed in each of them as well. Software developers must insure that any changes made to a program are sensitive to the particular operating system under which the program runs.
Marketing multiple versions of each product also increases the work required for development and maintenance. Additional programming resources are needed to develop features and fix problems to all versions in parallel. In addition, the software development staffs must coordinate carefully to make the versions as similar to each other as possible from the users' point of view. This is a cumbersome way to develop and maintain products that run on multiple operating systems.
C. Operating System Compatability Components (Interfaces)
A more efficient approach to the problem of developing an application or system program that will function on different operating systems is to divide the program into two components:
— a first component that contains only the task-specific portions of the program, independent of all operating system issues, and
— a second component that contains all the interconnections between the first component and the operating system.
In a program constructed in this way, whenever the first, task-specific, component needs to ask the operating system for some resource through a "system call", it calls the second component instead of calling the operating system directly.
The second component serves as an "interface" or "compatibility component" between the task-specific portion of the program and the operating system. It receives the request from the first component and translates it into the appropriate system call that will be recognized by whatever operating system is installed on the computer, e.g., DOS/VSE, MVS, or CMS. Since the first, task-specific, component calls the adapter component rather than the operating system, the first component need not be customized to use any specific operating system. The second, interface, component insures that all the system calls are performed properly for the particular operating system in use.
Once a version of the interface component has been created for each operating system using this approach, the task-specific component of each program only has to be written once. This has two desirable effects.
First, to adapt a program to a new version of an existing operating system or an entirely new operating system, the developer need only modify the interface component; no changes need to be made to the task-specific component, which now has no operating-system-specific parts.
Second, revisions to the task-specific component of the program to correct problems or add features will not affect the program's ability to run under all operating systems, as long as the changes that request operating system services use the interface component. This method is an efficient and effective way to develop and maintain an application or system program that runs in many operating systems.
Since the interface component is invisible to the end user, the end user need not even be aware that operating system compatibility is an issue. Therefore, the end user can switch operating systems and still use a given application or system program without apparent differences. It may be necessary to acquire and install a different version of the application program, but once the different version is installed, the end user will not notice the difference.
D. The Computer Programs of This Case
1. CA-SCHEDULER
CA-SCHEDULER is a job scheduling program for IBM mainframe computers. As one of a group of CA's data center automation products, CA-SCHEDULER's functions are to create a schedule that specifies when the computer should run various tasks, and to control the computer as it progresses through that schedule. CA began development of CA-SCHEDULER in mid-1981, and first installed it at a customer location in August 1982. This version of CA-SCHEDULER included ADAPTER, as did all subsequent versions of CA-SCHEDULER.
2. ADAPTER
Part of CA-SCHEDULER is an operating system compatibility component called ADAPTER, which connects CA-SCHEDULER with the three different operating systems used on IBM mainframe computers: DOS/VSE, MVS and VM/CMS. The ADAPTER component enables CA-SCHEDULER to be run on any of the IBM operating systems. Without the specialized technology provided by ADAPTER, CA would have had to develop, support, and market three separate versions of each of its products, such as CA-SCHEDULER, so that the product could be used on a customer's computer regardless of which of the three IBM operating systems it used. ADAPTER is not a separate CA product; it is not marketed as such, and it has no capability of acting as an independent product. Rather, it is a component part of CA-SCHEDULER, as it is of several other CA products.
CA began work on ADAPTER in 1979, and has continued to enhance it even up to the present. When ADAPTER is used as one component of a CA program, the other component, which contains the task-specific code, is designed to mate with ADAPTER rather than directly with the computer's operating system. This approach followed a concept — operating system independence — that had been successfully used for several years prior to the development of ADAPTER.
ADAPTER was designed and written in 1979 for use with a group of CA's programs called the DYNAM line. CA included a separate copyright notice on ADAPTER with 1979 as the date of first publication. Since 1979, there have been several revisions and changes to ADAPTER code. CA never registered ADAPTER in the copyright office as a separate computer program.
3. ZEKE
James P. Williams of Altai began development of ZEKE in July, 1981, and first installed it at a customer location in June 1982. This original version of ZEKE was available for use only on the VSE operating system, and made all its own service calls directly to the operating system. One of its principal competitors was CA-SCHEDULER, but Williams did not know that SCHEDULER included ADAPTER, nor did he know specifically what CA products used ADAPTER.
4. OSCAR
OSCAR is Altai's operating-system compatibility component. It was first developed in 1984 in a VSE version for use with Altai's ZEKE program. The first version, called OSCAR 3.4, was developed by Claude F. Arney III, who copied approximately 30% of OSCAR's source code from the source code of ADAPTER, which he had taken from CA when he left CA to go to work for Altai as a programmer. Like CA's ADAPTER, Altai's OSCAR is not a separate product; it is not marketed as such, and it has no capability of acting as an independent product.
Version 3.4 was first used in the ZEKE program, and later in Altai's ZACK and ZEBB programs. After this action was commenced against Altai, OSCAR was rewritten by different Altai programmers as version 3.5, and was substituted for version 3.4 as a component in the Altai programs. Altai concedes that Arney copied from CA's ADAPTER, but claims that he did it without the knowledge of anyone at Altai. Altai further claims that once it was alerted to and had confirmed the illegal copying, right after this action was begun, it rewrote the OSCAR program to eliminate any of the claimed infringements. Whether Altai was successful in its attempted "cleanup" of OSCAR is one of the principal issues in this lawsuit.
E. Dramatis Personae
1. James P. Williams
In 1977, James P. Williams was employed by CA, where he became a product manager. He left CA in August 1980 when he went to work for Software Design, Inc., a predecessor to Altai. Currently, he is the President of Altai and has held that position since October 31, 1988. While at CA he was not involved with the actual development of CA's products, and Williams had no responsibilities with regard to ADAPTER. Although he was aware of ADAPTER, he never actually saw the ADAPTER code.
In late 1983 Altai determined, based on customer interest, that it should write ZEKE/VSE so that it could be used on the MVS operating system. Williams, who had developed Altai's VSE version of ZEKE, was the sole programmer at Altai and felt that Altai needed an additional programmer to write the MVS version. At the time, Williams knew about CA's SCHEDULER, which had been developed after Williams left CA, but he was not aware that SCHEDULER used ADAPTER.
Williams approached Arney, who had been a long-standing friend and co-worker of Williams even before their days at CA, and invited him to come to work for Altai. Arney was then, and since 1978 had been, an employee of CA, where he had worked with and helped to develop the VSE version of the ADAPTER component.
2. Claude F. Arney, III
Arney had been employed by CA as a programmer for approximately five years before he moved to Altai. During that period, Arney did development work on CA's DYNAM/D, DYNAM/T, DYNAM/F1, and ADAPTER programs. In this role, he rewrote or enhanced many portions of ADAPTER/VSE. Arney had no responsibilities, however, for ADAPTER/MVS. For his work, CA permitted him to take home a paper copy of the source code of ADAPTER and anything else he needed to assist him. He did not recall being denied access to any materials by the company.
Arney was approached by Williams in December 1983 about working for Altai. Williams told him that his first project would be to develop an MVS version of ZEKE. Arney had no direct experience with MVS, but he was an accomplished programmer. When he left CA in January 1984, Arney took with him copies of the source code for both the VSE and MVS versions of ADAPTER, even though he recognized that this was contrary to the agreements he had signed prohibiting employees from retaining such copies.
F. Development of OSCAR 3.4
When he began work at Altai, Arney discussed with Williams different possible approaches for making ZEKE work with the MVS operating system. Williams, who had developed ZEKE for VSE, estimated that to modify it to run with MVS would require changing approximately 30% of its code. The other 70% worked independently of the operating system.
Williams had not considered at that point using a common system interface either for ZEKE or for any other Altai products. Arney argued, however, in favor of the long-term advantages of the common system interface. After discussing the possibilities, they decided to use the method of operating system independence, which would place all the system calls in a single program that they ultimately called OSCAR.
After this decision was made, Arney began to write a VSE version of OSCAR. A VSE version was written first, because this allowed Altai to take advantage of its already-working ZEKE/VSE program. In other words, it could be assumed that any difficulties in running ZEKE with OSCAR on VSE systems could be attributable to problems in OSCAR, not in ZEKE.
No one at Altai, other than Arney, knew that Arney had the ADAPTER code, or that he had referred to it when he was writing OSCAR/VSE, a project that took him three months, or when he was writing OSCAR/MVS, which took him an additional month. Only when this lawsuit was commenced did Altai learn that Arney had copied some 30% of the OSCAR code from CA's ADAPTER.
From 1985 to August 1988, Altai used OSCAR 3.4 in its ZEKE, ZACK, AND ZEBB products, unaware of Arney's copying. In late July 1988 CA learned for the first time that Altai may have copied its ADAPTER program. It investigated to confirm the suspicion and then registered for the first time a copyright on versions 2.1 and 7.0 of its CA-SCHEDULER program. Both 2.1 and 7.0 were registered as "derivative works". Having registered the two versions of CA-SCHEDULER, CA commenced this action. CA alleged that by copying ADAPTER into the ZEKE, ZACK, and ZEBB programs, Altai has both infringed CA's copyright and misappropriated trade secrets.
G. Rewrite of OSCAR 3.4 into OSCAR 3.5
Upon receiving the complaint, Altai learned for the first time of the possible copying of ADAPTER code into OSCAR. Williams met immediately with Arney to investigate CA's allegations. Arney admitted then that he had copied some of the ADAPTER code. Williams set about immediately to determine the extent of the damage, and he reviewed with Arney exactly which portions of OSCAR had been copied. In doing so, Williams did not look at the ADAPTER code, but Arney consulted it in identifying which modules of the code had been copied and which had been separately developed either from ZEKE or independently.
At this point Williams consulted counsel about how to go about rewriting the OSCAR program so as to cure the harm done by Arney's improper copying. The first step was to exclude Arney entirely from the rewriting process. The original ADAPTER code was locked up. Williams then assigned to Altai's eight programmers various segments of the program that had to be rewritten.
Williams wrote the parameter lists and gave them to the programmers. In doing so he worked primarily from ZEKE, not from Arney's version of OSCAR. The programmers were denied access to OSCAR 3.4, and were forbidden to talk with Arney during the rewrite process. Williams' goal in following this procedure was to salvage from OSCAR 3.4 the portions that Altai legitimately could use, and to eliminate from it those portions, ultimately determined to be about 30%, that had been copied by Arney from ADAPTER.
All the programmers employed by Altai (with the exception of Arney) were used in the rewriting process. None of them had been involved in developing or enhancing OSCAR. The process of rewriting involved first determining what operating system services were needed by ZEKE; this list was formulated by reference to the version of ZEKE marketed before OSCAR was developed. Williams provided a brief description of each service to a programmer through the parameter lists, and told the programmer to write the appropriate code for obtaining that service from the operating system. After the new code was written, the revised OSCAR was tested and debugged. The entire process took approximately six work-months of effort, and was completed by mid-November 1988, thus producing OSCAR 3.5.
Beginning in November 1989, OSCAR 3.5 was shipped to all new customers. It was also shipped by Altai, as a "free upgrade", to all customers who had OSCAR 3.4. Delivery of OSCAR 3.5 to all customers, new and existing, was completed by July 31, 1989.
H. Evaluation of Altai's Rewrite of OSCAR
If CA's claim of misappropriation of trade secrets did not fail on preemption grounds, it would be necessary to examine in some detail the conflicting claims and evidence relating to the process by which Altai rewrote OSCAR and ultimately produced version 3.5. Since CA's only viable claim is for copyright infringement (see discussion below about preemption of trade secrets misappropriation claim), our attention must be directed not so much to the rewriting process, itself, but to the result of the rewrite. We must determine, in short, whether Altai's OSCAR 3.5 infringes CA's ADAPTER. We make that determination as part of the discussion that follows. Additional facts are included where pertinent to the discussion.
III. DISCUSSION
CA has presented two causes of action: copyright infringement and misappropriation of trade secrets.
A. Copyright Infringement
There are two elements of a copyright infringement claim: ownership of a valid copyright, and copying of the plaintiff's copyrighted work by the defendant. Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 (2d Cir. 1977); see also Reyher v. Children's Television Workshop, 533 F.2d 87, 90 (2d Cir.), cert. denied, 429 U.S. 980, 97 S.Ct. 492, 50 L.Ed.2d 588 (1976); 3 Nimmer On Copyright § 13.01, at 13-4 (1991). On both elements the plaintiff carries the burden of proof.
1. Ownership of a Valid Copyright
Section 102 of title 17 of the U.S. Code provides in part: "Copyright protection subsists * * * in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device". The owner of a copyright may register it with the copyright office "[a]t any time during the subsistence of copyright in any published or unpublished work". However, "[s]uch registration is not a condition of copyright protection." 17 U.S.C. § 408(a). The act further provides, in § 411(a), that "no action for infringement of the copyright in any work shall be instituted until registration of the copyright claim has been made in accordance with this title."
Registration has effects in addition to permitting an infringement action. One relates to plaintiff's entitlement to attorney's fees under § 412, as will be discussed later in this opinion. Another effect of a certificate registration is that, if timely obtained, it "constitute[s] prima facie evidence of the validity of the copyright and of the facts stated in the certificate." 17 U.S.C. § 410(c). One of those facts is ownership of the copyright. See Durham Industries Inc. v. Tomy Corp., 630 F.2d 905, 908 (2d Cir. 1980); 3 Nimmer On Copyright § 13.01, at 13-5 to 13-7.
In this case there is no dispute that CA owns a valid copyright in the computer program CA-SCHEDULER 2.1, which contains ADAPTER as one of its components. Plaintiff's exhibit 2 is the certificate of copyright registration for CA-SCHEDULER 2.1, having the effective date of August 19, 1988. By statute, that certificate is prima facie evidence of the facts stated therein. It establishes that CA is the author, and Altai does not contest this.
The certificate also states, however, that the nature of the material in which copyright is claimed is "text of computer program". It also states that CA SCHEDULER 2.1 is a "derivative work" whose "preexisting material" was CA-SCHEDULER 1.0. Finally, for our purposes, the certificate states that the material added to CA-SCHEDULER 1.0 "and in which copyright is claimed" is: "Computer program has been re-written with revised code and added new code."
Thus, as asserted in CA's registration, which provides the basis for this lawsuit, the copyright is of a derivative work based upon a prior version of CA-SCHEDULER. The evidence shows that CA-SCHEDULER 1.0 was never registered. Most significantly, the evidence also shows that the ADAPTER component of version 2.1 was incorporated into version 2.1 from the preexisting version 1.0, and indeed was incorporated into CA-SCHEDULER 1.0 from one of CA's DYNAM programs, none of which are shown to have been registered.
Based on these facts, which are undisputed, Altai has argued, with some persuasiveness, that CA may not maintain this suit for copyright infringement of the ADAPTER code. Altai argues essentially that the registration, a precondition to maintenance of this infringement suit, was only of a derivative work and, that according to the statute, "[t]he copyright in a * * * derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material." 17 U.S.C. § 103(b). That subsection goes on, however, and provides that "[t]he copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material."
If there were evidence that the ADAPTER code had been placed in the public domain, or was owned by someone other than CA, Altai's argument that the derivative nature of the registration did not extend to the ADAPTER code would be compelling. However, there is no such evidence. On the contrary, the undisputed evidence establishes that ADAPTER was developed by CA originally for CA's DYNAM programs, even before CA-SCHEDULER was developed, and was then incorporated as a separate component into the SCHEDULER versions. In short, CA is the author of the ADAPTER program and its "copyright protection" subsists without regard to registration. See Rand McNally Co. v. Fleet Management Systems, Inc., 591 F. Supp. 726, 733 n. 6 (N.D.Ill. 1983); Williams Prods., Inc. v. Construction Gaskets, Inc., 206 U.S.P.Q. 622, 624-25 (E.D.Mich. 1977) (1909 act); Rexnord, Inc. v. Modern Handling Systems, Inc., 379 F. Supp. 1190, 1198 (D.Del. 1974) (1909 act). Accord 2 Nimmer on Copyright § 7.16[B][2], at 7-164 to 7-165.
Moreover, the court interprets the restriction on commencement of an infringement action contained in § 411(a) as not being a bar to CA's claim in this case. Dr. Davis's testimony convincingly established that a computer program such as CA-SCHEDULER 2.1, for which registration was obtained, is made up of a series or collection of sub-programs, many of which are made up of sub-sub-programs, and so on, down for several levels. As Dr. Davis pointed out, it would make no sense to permit the copyright of a computer program that is an operable entity, such as CA-SCHEDULER OR ZEKE, without including in the copyright protection all of the sub-programs and sub-sub-programs, etc., which are combined with other instructions in order to make up the copyrighted program.
Of course, § 103(b) limits the extent of a copyright in a derivative work to "the material contributed by the author of such work". Here the author is CA, and among the material contributed by CA to CA-SCHEDULER 2.1 was the ADAPTER code. Section 103(b) does contrast the "material contributed by the author" with "the preexisting material employed in the work", and it provides that the copyright "does not imply any exclusive right in the preexisting material." (emphasis added). It further provides that the copyright in a derivative work neither enlarges nor diminishes the "scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material."
In short, CA had a subsisting copyright in the ADAPTER code even though ADAPTER was not itself separately registered. CA was the uncontested owner of the code. When CA registered its copyright in CA-SCHEDULER 2.1 as a derivative work, it was not required simultaneously to register separately every component part, such as ADAPTER, of that work. Otherwise complete copyright protection for a complicated program developed by the same author over a period of time would require dozens if not hundreds of registrations. Plaintiff's exhibit 2, the certificate of copyright registration for CA-SCHEDULER 2.1, was sufficient compliance with the registration requirement of § 411(a) to permit CA to maintain this action against Altai for infringement of ADAPTER.
Confronted at trial with Altai's argument that CA's registration of CA-SCHEDULER 2.1 had a more limited effect than we have just held, CA took what it described as a "belt and suspenders" approach and obtained from the copyright office supplemental certificates of copyright registration, see plaintiff's exhibit 299, which purported to amend the original certificates to show that both CA-SCHEDULER 2.1 and CA-SCHEDULER 7.0 were original, not derivative works. CA sought the amended registrations while the trial was pending, and did so without informing either Altai or the court.
The amended certificates were presented to the court with a proposed second amended complaint on the last day of the trial. A number of objections were raised both to the amendment of the complaint and to the admission of the amended certificates into evidence. The court reserved decision on those motions. In view of the ruling made with respect to plaintiff's exhibit 2, the original certificate of copyright registration for CA-SCHEDULER 2.1 — that it was sufficient compliance with § 411(a) to permit maintenance of this action — there is little importance left for the amendment of the complaint and the admission into evidence of the supplemental certificate. For the record, however, CA's motion to file a second amended complaint is granted, and the two supplemental certificates of registration, amending plaintiff's exhibits 1 and 2, are admitted in evidence as plaintiff's exhibit 299.
No prejudice is inflicted on Altai by the amendment of the complaint, so leave to amend should be "freely given". Foman v. Davis, 371 U.S. 178, 182, 83 S.Ct. 227, 230, 9 L.Ed.2d 222 (1962). See S.S. Silberblatt, Inc. v. East Harlem Pilot Block, 608 F.2d 28, 42 (2d Cir. 1979); Fed.R.Civ.P. 15(a). This action was prepared and tried on the theory that Altai's OSCAR infringed CA's ADAPTER. CA's "error" was technical in nature; it described version 2.1 as a derivative work. Calling it an original work at the time the original certificate was obtained would not have affected anyone's rights with respect to the work. Correcting the error, even on the last day of the trial, had no direct effect on the evidence or arguments presented during the trial.
Even on a technical level, despite the language of § 411(a) that "no action for infringement * * * shall be instituted" until the copyright claim is registered, an action need not be dismissed simply because the registration occurs after the filing of the complaint. See, e.g., Frankel v. Stein Day, Inc., 470 F. Supp. 209, 212-13 n. 2 (S.D.N.Y. 1979), aff'd, 646 F.2d 560 (2d Cir. 1980); Schuchart Assocs. v. Solo Serve Corp., No. SA-81-CA-5, 1983 WL 1147, at *9 (W.D.Tex. June 28, 1983) (Sessions, J.). A formalistic dismissal, followed by a re-registration and commencement of a new action, is unnecessary and would be wasteful. Where, as here, the three-year statute of limitations running from knowledge of infringement had not expired at the time the motion to amend was made, no substantive rights are affected by treating the supplemental registration as relating back to the date of the original registration.
In sum, with respect to the first element of CA's infringement claim, CA has established a subsisting copyright in ADAPTER which has been registered with the copyright office and, therefore, may maintain this suit for infringement.
2. Copying of the Copyrighted Work
The second element of a claim for copyright infringement is that the plaintiff must prove copying of the copyrighted work by the defendant. In order to prove its work has been copied, generally a plaintiff must — absent the rare instance, such as with OSCAR 3.4, where there is direct evidence of copying — prove "access and substantial similarity between the works, and also show that his expression was 'improperly appropriated,' by proving that the similarities relate to copyrightable material." Walker v. Time Life Films, Inc., 784 F.2d 44, 48 (2d Cir.), cert. denied, 476 U.S. 1159, 106 S.Ct. 2278, 90 L.Ed.2d 721 (1986) (quoting Hoehling v. Universal City Studios, Inc., 618 F.2d 972, 977 (2d Cir.), cert. denied, 449 U.S. 841, 101 S.Ct. 121, 66 L.Ed.2d 49 (1980). Unlike the situation with respect to OSCAR 3.4, on which infringement is conceded, there is no convincing direct evidence here that OSCAR 3.5 was copied from ADAPTER. Therefore, as to 3.5, we must consider both access and substantial similarity — the two factors that would allow the court to infer copying on the part of Altai.
a. Access
Access is not seriously disputed in this case. Under the prevailing definition, access is "the opportunity to view or to copy" the plaintiff's work. Sid Marty Krofft Television Prods., Inc. v. McDonald's Corp., 562 F.2d 1157, 1172 (9th Cir. 1977) (citing Arrow Novelty Co. v. Enco National Corp., 393 F. Supp. 157, 160 (S.D.N.Y.), aff'd, 515 F.2d 504 (2d Cir. 1975)); 3 Nimmer on Copyright § 13.02[A], at 13-10. Here, Arney took from CA a copy of the source code for ADAPTER. Since Arney personally developed OSCAR 3.4 for Altai, and since Arney admits having used substantial portions of the ADAPTER code in the original version of OSCAR, access, at least with respect to version 3.4 of OSCAR, is established.
With respect to version 3.5, the rewritten version of OSCAR, an argument could be made that Altai did not have access because of the precautions attempted by Altai when it undertook to eliminate from OSCAR those portions of the program that had been copied from ADAPTER. There is conflicting evidence as to Williams' access to the ADAPTER code during the rewrite process. CA claims that it was accessible to him at least indirectly through his conversations with Arney, particularly at the time that Williams set up the parameter lists for the new OSCAR.
Rather than decide the difficult factual issue that access presents in connection with OSCAR 3.5, the court instead assumes that Altai did have access, but finds that neither Williams nor any of the other programmers who worked on OSCAR 3.5 took advantage of the ADAPTER code that was available to them, either by direct copying or by indirect copying from OSCAR 3.4. Altai's purpose in undertaking the rewrite of OSCAR was to eliminate from it all of the infringing aspects that had been included in version 3.4. The court finds that the Altai employees undertook that effort in good faith and adopted reasonable means to accomplish it.
The question, then, becomes whether Altai did in fact accomplish their objective of developing a "clean" version of OSCAR, and that brings us to the second aspect of the copying element: substantial similarity.
b. Substantial Similarity
In most cases the "substantial similarity" inquiry presents the heart of a copyright infringement case; it requires the court to "decide whether the similarities shared by the works are something more than mere generalized ideas or themes." Warner Bros. Inc. v. American Broadcasting Companies, 654 F.2d 204, 208 (2d Cir. 1981). This inquiry is fundamental, because the copyright act protects only the expression of ideas, and not the ideas themselves. Baker v. Selden, 101 U.S. (11 Otto) 99, 25 L.Ed. 841 (1879); Lotus Development Corp. v. Paperback Software International, 740 F. Supp. 37, 42 (D.Mass. 1990) (Keeton, J.); 17 U.S.C. § 102(b). "No amount of proof of access will suffice to show copying if there are no similarities." Sid Marty Krofft Television, 562 F.2d at 1172 (citing Arnstein v. Porter, 154 F.2d 464, 468 (2d Cir. 1946)).
In the context of computer programs, many of the familiar tests for similarity prove to be inadequate, for they were developed historically in the context of artistic and literary, rather than utilitarian, works. It may be this inadequacy that led the third circuit, in Whelan Associates v. Jaslow Dental Laboratory, 797 F.2d 1222 (3d Cir. 1986), cert. denied, 479 U.S. 1031, 107 S.Ct. 877, 93 L.Ed.2d 831 (1987), to set forth what now seems to be a simplistic test for similarity between computer programs. In Whelan, the court adopted an extremely broad view of copyrightability for a computer program. The court stated that "the purpose or function of a utilitarian work would be the work's idea, and everything that is not necessary to that purpose or function would be part of the expression of the idea", id. at 1236 (emphasis omitted), and therefore protectable by copyright. The purpose, and therefore the "idea", of the program at issue in Whelan "was to aid in the business operations of a dental laboratory." Id. at 1238. Therefore, "the detailed structure of the Dentalab program is part of the expression, not the idea, of that program". Id. at 1239. Elsewhere in its opinion the Whelan court elaborated that as part of its broadly-defined "expression", the "structure, sequence, and organization" of a computer program, in addition to its source and object codes, were protected by copyright. Id. at 1238-40.
The Whelan test is inadequate and inaccurate. Professor Nimmer has pointed out one of its pitfalls: "The crucial flaw in this reasoning is that it assumes that only one 'idea,' in copyright law terms, underlies any computer program, and that once a separable idea can be identified, everything else must be expression." 3 Nimmer on Copyright § 13.03[F], at 13-62.34.
In the case at bar, Dr. Davis pointed out further technical flaws in the Whelan analysis which render its reasoning inadequate. As he so convincingly demonstrated, a computer program is made up of subprograms and sub-sub-programs, and so on. Each of those programs and sub-programs has at least one idea. Some of them could be separately copyrightable; but many of them are so standard or routine in the computer field as to be almost automatic statements or instructions written into a program.
Dr. Davis further explained that a computer program must be viewed both as text and as behavior. The text perspective focuses upon the object code and the source code. Although not understandable to people untrained in computer programming, both object code and source code can be expressed in written form. Object code appears as a series of zeros and ones, representing the magnetic polarization of the "bits" that are read by the computer. The source code is a combination of words, symbols, and numbers used by programmers to describe, or provide the basis for, the object code of a particular program.
A computer program, however, is more than a collection of zeros and ones. When properly loaded into a computer and provided with appropriate input from, for example, the keyboard, the program behaves. In a word processing program, for example, text can be deleted, blocks of text can be moved, formatting of documents can be changed; all sorts of operations can be instituted, and these can only be described as behavior. Similarly with a spreadsheet program, numbers can be added, subtracted, multiplied or divided; formulae can be developed to process the results of various computations; information can be inserted, deleted, moved, or processed in various ways. In this way, a spreadsheet program also behaves according to the instructions given to it.
Central to Dr. Davis's criticism of the Whelan "structure, sequence, and organization" formulation is the fact that there is no necessary relationship between the sequence of operations in a program, which are part of behavior, and the order or sequence in which those operations are set forth in the text of the program — the source code and object code. As Dr. Davis pointed out, "the order in which sub-routines appear in the program text is utterly irrelevant", and the two views of a computer program, as text and as behavior, are "quite distinct".
Each view — textual and behavioral — has its own structure, sequence, and organization. In the standard jargon of programmers, there is static structure, which refers to the program-as-text view, and dynamic structure, which refers to the program-as-behavior view. The static structure and dynamic structure of a program can be quite different; indeed from dealing with the behavior of a program, i.e., operating it, one can tell virtually nothing about its text. Thus, according to Dr. Davis, "it makes no technical sense to talk simply about the 'structure' of a program, because the term is ambiguous and the distinction [between dynamic structure and static structure] matters."
Whelan, therefore, is fundamentally flawed according to Dr. Davis, by failing to distinguish between the static and dynamic views of a program. When Whelan states in footnote 1 that the terms "structure", "sequence", and "organization", are used interchangeably and are intended to be synonymous, the court's view of computer science is "exactly wrong technically; it is precisely because a program is not only text, but also behaves, that these terms (in all their meanings) are not synonymous. The problem is thus compounded: where [prior to Whelan] the terms were merely ambiguous, they have now been declared equivalent when they are not."
Going beyond Dr. Davis's analysis, the court notes a possible statutory difficulty that arises when we recognize, as we must, that a computer program "behaves". Section 102(a) provides that copyright protection subsists for original works of authorship including those making up computer programs. Subsection (b) provides, however: "In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work." (emphasis added). Since the behavior aspect of a computer program falls within the statutory terms "process", "system", and "method of operation", it may be excluded by statute from copyright protection. Indeed, it has been suggested that computer software is better protected by patent law than by copyright law. Comment, A Plea For Due Processes: Defining the Proper Scope of Patent Protection for Computer Software, 85 Nw.U.L.Rev. 1103, 1123-25 (1991). Fortunately, this court need not wrestle with that possible development in the law of intellectual property, because CA's rights in this case are fully protected by viewing the ADAPTER program as text. In determining the similarities between OSCAR and ADAPTER, therefore, our attention turns away from the programs as behavior and focuses more closely on the programs as text, i.e., the source code and object code.
Professor Nimmer suggests that in lieu of the Whelan test of "structure, sequence, and organization", a better approach to determining similarities in computer programs can be found in the "abstractions test" first enunciated by Learned Hand in Nichols v. Universal Pictures, 45 F.2d 119, 121 (2d Cir. 1930), cert. denied, 282 U.S. 902, 51 S.Ct. 216, 75 L.Ed. 795 (1931). Professor Nimmer's suggestion is helpful. The abstractions test not only has the endorsement of one of the most distinguished judicial writers on copyright law; it is also the law of this circuit.
The "abstractions test" of Nichols reads: Upon any work * * * a great number of patterns of increasing generality will fit equally well, as more and more of the incident is left out. The last may perhaps be no more than the most general statement of what the [work] is about and at times might consist only of its title; but there is a point in this series of abstractions where they are no longer protected, since otherwise the [author] could prevent the use of his "ideas" to which, apart from their expression, his property is never extended.Nichols, 45 F.2d at 121.
As applied to computer software programs, this abstractions test would progress in order of "increasing generality" from object code, to source code, to parameter lists, to services required, to general outline. In discussing the particular similarities, therefore, we shall focus on these levels.
i. Similarities between ADAPTER and OSCAR 3.4
This question need not detain us long, for Altai concedes that a substantial part, approximately 30 percent, of OSCAR 3.4 was copied directly from the source code of ADAPTER that Arney took from CA. Thus, with respect to OSCAR 3.4, Altai admits infringement. In late 1988, as we have seen, OSCAR was rewritten as version 3.5, which completely replaced OSCAR 3.4 with all of Altai's customers by July 1989. Since OSCAR 3.4 has now been completely abandoned, there is no need for injunctive relief. On this aspect of the case, therefore, there remains only the matter of determining what damages should be awarded to CA for Altai's infringement with OSCAR 3.4 during the period in which that program was used. These damages will be discussed later in this opinion.
ii. Similarities between ADAPTER and OSCAR 3.5
After Altai learned, from the complaint in this action and its ensuing investigation, how Arney had copied from ADAPTER in order to develop OSCAR 3.4, it set about to rewrite the OSCAR program by developing OSCAR 3.5 independent of the ADAPTER code. This rewriting process was described earlier in this opinion. Since there is no direct evidence of copying from ADAPTER to OSCAR 3.5, the point of analysis turns to whether, after the rewrite, OSCAR 3.5 is substantially similar to ADAPTER. If so, it infringes CA's copyright, and CA would be entitled to injunctive relief and damages based on OSCAR 3.5. If not, then there was no infringement by OSCAR 3.5 and this part of CA's complaint should be dismissed.
Based upon all the evidence in the case, the evaluations of Dr. Davis, the court's own evaluations of the reports of the experts for CA and Altai, and the impact on these facts and circumstances of the applicable law of copyright as applied to computer programs, discussed above, the court finds and concludes that — even assuming that Altai had access to ADAPTER's source code — after the rewrite, OSCAR 3.5 was not substantially similar to ADAPTER, and therefore did not infringe CA's copyright.
CA's expert, Dr. Popper, devoted most of his direct testimony, as set forth in his report, to establishing the similarities between ADAPTER and OSCAR 3.4, an issue that Altai did not contest. The major points of similarity cited by Dr. Popper were object code, source code, parameter lists, macros, and so-called high-level structure.
Dr. Davis addressed the relative importance of these factors to a computer program. He realized that some other cases had approached the problem of substantial similarity by merely counting lines of code identical in the two programs. But, as Dr. Davis correctly noted, some code is more important than others. Moreover, with respect to OSCAR 3.5, he found no need for any such detailed analysis of lines of code, because in the revision that was carried out by Altai in developing OSCAR 3.5, there remained virtually no lines of code that were identical to ADAPTER.
With respect to the parameter lists and the macros, there was evidence from which one might infer there had been some copying; at the same time, there was evidence that many, if not most, of the parameter lists and macros were dictated by the functionality of the program. The operation that both ADAPTER and OSCAR had to perform was to translate the calls for operating-system services that were required by the applications program into a form that could be read by the particular operating system. In this case, the operating system was established by IBM, and the forms for calls for services from each of the three IBM operating systems lie in the public domain, because they are intended to be known in the industry and to be used by programmers.
On the other side of ADAPTER and OSCAR, the task-specific side, the calls for services from the operating system are made by different applications programs — SCHEDULER for CA, and ZEKE, ZACK, and ZEBB for Altai. There is no claim that Altai's applications programs infringe the task components of CA's application programs. Thus, many of the parameters and macros were dictated by external factors and could not be deemed to be infringing.
Dr. Davis found that on the evidence presented he could not make a determination whether the parameter lists and macros of OSCAR 3.5 had been copied to any significant extent from ADAPTER. Although he invited further evidence from the parties' experts on the point, not enough was forth-coming to warrant any further comment by him. As a result, the court finds that — with respect to the parameter lists and macros of OSCAR 3.5 — CA has failed to meet its burden of proof of copying, because it has failed to prove "substantial similarity" between those of OSCAR 3.5 and those of ADAPTER.
With respect to the list of services required for ADAPTER and OSCAR, there was considerable overlap, but a great deal of that was required by the demands of functionality and was not attributed by Dr. Davis, nor is it by the court, to direct copying. Furthermore, because the list of services is so extensively determined by the demands of the operating system and of the applications program to which it is to be linked through ADAPTER or OSCAR, it has little importance in the overall picture of similarity.
As to the so-called high-level structure, as reflected in the organization chart, the court accepts Dr. Davis's evaluation that it was not important, because it was so simple and obvious to anyone exposed to the operation of the program.
Taking an overall view of "similarity", Dr. Davis attempted to quantify the relative importance of the various factors of similarity on which CA relied. He evaluated them as follows:
Code 1,000 Parameter Lists 100 Macros 100 List of Services 1 Organization Chart Nil
As applied to OSCAR 3.5, the factor which is by far the most important — code, rated at 1,000 — presents no similarity at all, because the code was rewritten.
The parameter lists and macros, combined, amount to 200, but on these factors, CA failed to carry its burden of proving substantial similarity. Even without a burden-of-proof analysis, however, the evidence is conflicting and, viewed most favorably to CA, would show that only a few of the lists and macros were similar to protected elements in ADAPTER; the others were either in the public domain or dictated by the functional demands of the program. The court thus finds and concludes that there was no substantial similarity established in either the parameter lists or the macros.
The list of services, as viewed by Dr. Davis and accepted by the court, is minuscule in importance and, even when linked with the organization chart, does not present sufficient evidence of substantial similarity to warrant a finding of infringement.
In sum on this point, while OSCAR 3.4 included approximately 30 percent of verbatim copying of ADAPTER's code, when Altai rewrote the program into version 3.5, it eliminated the offending sections of copied code. The method it used for the rewriting process was, as Dr. Davis testified, a reasonable method. As Dr. Davis further testified, Altai's cleanup effort "was clearly what I would describe as — I don't want to trip over legal terms, a good faith effort to correct something that was wrong."
The court finds and concludes that OSCAR 3.5 was not substantially similar to CA's ADAPTER program, that it was not copied from ADAPTER, and that it did not infringe CA's copyright on ADAPTER as contained in any of the registrations for CA-SCHEDULER.
B. Misappropriation of Trade Secrets
On the first day of trial, Altai conceded that they would not dispute the merits of CA's misappropriation of trade secrets claim insofar as they were based on Altai's use of the ADAPTER source code taken from CA by Arney. Therefore, in regard to CA's trade secrets claim, the court will address only the following issues: Does the federal copyright law preempt state trade secret law? Which state's choice of law principles apply? Which state's substantive law applies? If Texas law applies, is CA's claim barred by the Texas statute of limitations? These issues are discussed seriatim.
1. Preemption
a. Law of the case?
Altai contends that § 301(a) of the copyright act preempts CA's claim for misappropriation of trade secrets. CA's initial line of response is that Judge Mishler's ruling of October 13, 1989, denying Altai's motion for summary judgment on this ground, is the law of the case. In that memorandum order, Judge Mishler held: "The elements of the tort of appropriation of trade secrets through the breach of contract or confidence by an employee are not the same as the elements of a claim of copyright infringement".
Generally, when a court has ruled on an issue, that decision should be adhered to by that court in subsequent stages of that same case. Arizona v. California, 460 U.S. 605, 618, 103 S.Ct. 1382, 1391, 75 L.Ed.2d 318 (1983). But "[l]aw of the case [only] directs a court's discretion, it does not limit the tribunal's power." Id. That discretion is informed, principally, by the concern that disregard of an earlier ruling not be allowed to prejudice the party seeking to benefit under the doctrine. United States v. Uccio, 940 F.2d 753, 758 (2d Cir. 1991); United States v. Birney, 686 F.2d 102, 107 (2d Cir. 1982). "Prejudice" in this regard does not mean "harm"; "rather, it refers to a lack of sufficiency of notice" or a lack of sufficient "opportunity to prepare armed with the knowledge that [the prior ruling is not deemed controlling]." Birney, 686 F.2d at 107; see Uccio, 940 F.2d at 758. Both parties briefed the preemption issue in pre- and post-trial briefs; both parties treated the issue as one which was "in play". There can not possibly be any prejudice to CA by reconsidering Judge Mishler's preemption ruling.
Additionally, Judge Mishler did not have the benefit of a full development of the facts. His prior ruling was based on a facial analysis of the torts of misappropriation of trade secrets and of copyright infringement; our reconsideration of the issue has the benefit of a full development of the facts of the case as developed at trial. Since we are convinced that an uncorrectable ruling of no facial preemption would be "clearly erroneous", see Arizona v. California, 460 U.S. at 618 n. 8, 103 S.Ct. at 1391 n. 8, we move to a consideration of preemption based on the facts developed at trial.
b. Preemption analysis as applied to the facts
Section 301(a) expressly preempts "all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106" when the work of authorship in which rights are claimed falls "within the subject matter of copyright as specified by sections 102 and 103" of the copyright act. 17 U.S.C. § 301(a).
There is little dispute that ADAPTER falls "within the subject matter of copyright". It is a computer program, and as such is copyright able. See 17 U.S.C. § 101. Thus, the court needs only to determine whether CA's trade secrets claim is "equivalent" to the exclusive rights of copyright as enumerated in § 106 of the copyright act.
Section 106 gives the copyright owner the exclusive right to (1) reproduce the work, (2) prepare derivative works based on the work, (3) distribute copies of the work to the public by sale or other transfer of ownership, and, in the case of certain artistic works, (4) perform the work publicly, and (5) display the work publicly. 17 U.S.C. § 106(1)-(5). It is clear that a right "equivalent to" copyright is one which is infringed by the act of reproduction, performance, distribution, or display. 1 Nimmer on Copyright § 1.01[B][1], at 1-13. See also Harper Row Publishers, Inc. v. Nation Enterprises, 723 F.2d 195, 200 (2d Cir. 1983), rev'd on other grounds, 471 U.S. 539, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985).
CA's second amended complaint contains the following two paragraphs:
57. By reason of the facts stated in paragraph 39 and by copying from CA-SCHEDULER into ZEKE, ZACK and ZEBB the various elements stated in paragraphs 39-51, 54 and 55, defendant Altai has infringed [CA's] copyright in CA-SCHEDULER.
73. Defendant's incorporation into its ZEKE, ZACK and ZEBB programs of the various elements contained in the ADAPTER component of [CA's] CA-SCHEDULER program as set out in paragraphs 39-51, 54 and 55 constitutes the willful misappropriation of the proprietary property and trade secrets of plaintiff [CA].
Thus, CA's complaint states that the very same act — copying the various elements of the ADAPTER component of CA-SCHEDULER into ZEKE, ZACK, and ZEBB — is alleged to be both an infringement of copyright and a misappropriation of trade secrets. At trial, it became apparent that CA's trade secrets claim was based on its evidence that Altai had copied ADAPTER into Altai's OSCAR program.
As the second circuit said in Harper Row, "When a right defined by state law may be abridged by an act which, in and of itself, would infringe one of the exclusive rights [contained in § 106], the state law in question must be deemed preempted." Id., 723 F.2d at 200. CA's trade secrets claim, therefore, based as it is upon Altai's copying of CA's ADAPTER program, must be deemed preempted, and the second count of its complaint must be dismissed.
CA argues, correctly, that both commentary and caselaw support the proposition that "a computer program can be copyrighted and still maintain its trade secret status." CA post-trial brief at 17. CA further argues, however, that since the tort of misappropriation of trade secrets requires proof of elements ( e.g., a confidential relationship) not required to prove a copyright claim, there can be no preemption.
CA's arguments embrace only a facial comparison of the torts of misappropriation and copyright infringement — the same limited analysis available to Judge Mishler when he decided the summary judgment motion. In making such a limited comparison, CA misses the point both of Harper Row and of § 301. Merely lining up the elements of the two claims and identifying a difference will not suffice to avoid preemption. Rather, the two claims must be qualitatively different. The gravamen of CA's trade secrets claim as proved at trial is that Altai, without authorization, copied ADAPTER into its ZEKE, ZACK, and ZEBB programs. CA's position is that the same act which allegedly constituted a misappropriation of trade secrets also infringed their copyright. Preemption is therefore required, because "the right they seek to protect [via the trade secrets claim] is coextensive with an exclusive right already safeguarded by the Act — namely, control over reproduction and derivative use of copyrighted material." Harper Row, 723 F.2d at 201.
There are, undoubtedly, many differences between copyright and trade secret law: "Trade secret law protects content irrespective of form of expression; copyright law protects form of expression but not underlying ideas." 1 R. Milgrim, Milgrim on Trade Secrets § 2.06A[3], at 2-146 (1991). Similarly, trade secret law may be enforced only against defendants having a special relationship to the plaintiff, while copyright law may be enforced against the world. Compare Restatement of Torts § 757 with 17 U.S.C. § 106. Further, misappropriation of trade secrets may take place by acquisition, disclosure or use of the secret; copyright infringement may only take place by certain unauthorized uses of copyrighted works. Compare Rev. Uniform Trade Secrets Act § 1(2) with 17 U.S.C. § 106-118, 501(a).
However, the alleged trade secret — ADAPTER — is the same entity in which CA alleges a copyright. While the generic elements of a trade secret and of a copyrightable work differ, the tort of misappropriation as particularly alleged and proved here and the infringement of CA's copyright boil down to the same thing — a right of action for the unauthorized reproduction of, and preparation of derivative works based on, ADAPTER. Merely because the elements of a "trade secret" and a "copyrightable work" are different does not avoid preemption. Section 301 instructs the court to compare "rights" — and the right to be free from trade secret misappropriation through "use", and the right to exclusive reproduction and distribution of a copyrighted work are not distinguishable. The trade secret rights in this case are "equivalent to" the exclusive rights granted to copyright owners under § 106, and are therefore preempted by federal law. See 1 R. Milgrim, Milgrim on Trade Secrets § 2.06A[4], at 2-150 ("Attention must be paid in each case to determine what plaintiff seeks to protect, the theories in which the matter is thought to be protected and the rights sought to be enforced."); Harvey Cartoons v. Columbia Pictures Industries, Inc., 645 F. Supp. 1564, 1573 (S.D.N.Y. 1986). Cf. Warner Bros., Inc. v. American Broadcasting Cos., 720 F.2d 231, 247 (2d Cir. 1983) ("state law claims that rely on the misappropriation branch of unfair competition are preempted").
Were CA's allegations premised on a theory of illegal acquisition of a trade secret, a charge that might have been alleged against Arney, who is not a defendant in this case, the preemption analysis might be different, for there seems to be no corresponding right guaranteed to copyright owners by § 106 of the copyright act. But this is not such a case. Rather, CA has proceeded solely against Altai, and has done so on a theory that the misappropriation took place by Altai's use of ADAPTER — the same theory as the copyright infringement count. See Copyright Law Revision, H.R. Rep. No. 1476, 94th Cong., 2d Sess. 132, reprinted in 1976 U.S. Code Cong. Admin.News 5659, 5748 ("'Misappropriation' is not necessarily synonymous with copyright infringement, and thus a cause of action labeled as 'misappropriation' is not preempted if it is in fact based neither on a right within the general scope of copyright as specified by section 106 nor on a right equivalent thereto.") (emphasis added).
CA's trade secrets claim against Altai is equivalent, nay identical, to the claim of infringement of the exclusive rights of reproduction and distribution, both of which are "within the general scope of copyright as specified by section 106." Once the work at issue became a copyrightable "work of authorship", all claims concerning copying became governed, exclusively, by federal law. The interpretation of § 301 offered by CA, on the other hand, "would run directly afoul of one of the Act's central purposes, to 'avoid the development of any vague borderline areas between State and Federal protection.'" Harper Row, 723 F.2d at 200 (quoting H.R. Rep. No. 1476, supra, at 130, 1976 U.S. Code Cong. Admin.News at 5746).
Thus CA — which is the master of its own case — has pleaded and proven facts which establish that one act constituted both copyright infringement and misappropriation of trade secrets. The act of misappropriation relied on — copying ADAPTER into OSCAR 3.4 — in and of itself, also infringed CA's copyright. Under Harper Row and § 301 of the copyright act, CA's trade secrets claim is preempted by federal copyright law, and must be dismissed.
It may seem anomalous that, with respect to OSCAR 3.5, the revised, post-suit version of the program, CA has no cause of action for copyright infringement, and fails as well on its trade secrets claim because of federal preemption by the copyright law. If preemption were a doctrine designed only to prevent double recovery, this would be a valid concern. But § 301 of the copyright act represents congress's determination, expressed through the authority of the supremacy clause, that copyright law be subject to uniform national laws.
If there is to be any right of action for CA, congress has said, it has to come under the copyright act, or not at all. "It is clear that failure to meet the required standards for federal [copyright] protection will not negate federal preemption." 1 Nimmer on Copyright § 1.01[B], at 1-22.2. Otherwise, failure to comply with the strictures of the copyright act would expand the scope of state protection, id., see also Mayer v. Josiah Wedgwood Sons, Ltd., 601 F. Supp. 1523, 1532 n. 15 (S.D.N.Y. 1985), and this would be contrary to congress's intent. See H.R. Rep. No. 1476, supra, at 131. CA "cannot achieve by [a trade secrets] claim what it failed to achieve under its copyright claim". Durham Industries, Inc. v. Tomy Corp., 630 F.2d 905, 918 (2d Cir. 1980).
2. Choice of Law
Even though our preemption ruling eliminates the trade secret issues from the case, we think it advisable to consider briefly the choice of law and statute of limitations questions.
a. Which State's Principles?
This action was originally commenced in the district of New Jersey, and transferred to the eastern district of New York pursuant to 28 U.S.C. § 1404(a). In these circumstances, "the transferee court must follow the choice of law rules that prevailed in the transferor court." Ferens v. John Deere Co., 494 U.S. 516, 110 S.Ct. 1274, 1277, 108 L.Ed.2d 443 (1990) (rule applies when plaintiff moves for transfer); compare Van Dusen v. Barrack, 376 U.S. 612, 84 S.Ct. 805, 11 L.Ed.2d 945 (1964) (same rule when defendant initiates transfer). Since a transfer under § 1404(a) is only a change of courthouses, and not a change of law, we are obliged to apply New Jersey's conflict of laws principles. There is no dispute between the parties that New Jersey's choice of law principles apply.
b. Which State's Substantive Law?
Similarly, there is no dispute over what choice of law principles New Jersey courts would apply. New Jersey applies a "governmental interest" approach for deciding choice of law issues. See, e.g., Rose v. Port of New York Authority, 61 N.J. 129, 139-40, 293 A.2d 371, 376 (1972) (abandoning traditional rule of lex loci delictus in favor of the law "having the most significant relationship and closest contacts with the occurence and the parties"). CA maintains that the "governmental interest" test points to the application of New York law; Altai argues that Texas law should control.
This dispute is relevant only because Altai argues that the Texas statute of limitations would bar CA's trade secret claim, since, according to Altai, Texas does not recognize the "discovery rule" in determining when a cause of action for trade secrets would accrue. The court notes that it would in fact apply Texas law, because the most significant relationship and closest contacts with the occurrence and with the parties is with Texas. However, in light of the following discussion of Texas statute of limitations law, the choice of law is irrelevant; for the result would be the same under either New York or Texas law.
c. Is the Texas Statute of Limitations a Bar?
New York's limitations period is three years; under New York law, therefore, the action would be timely, and Altai concedes this. Altai argues that under Texas law, the applicable (two-year) statute of limitations would bar CA's claim. Specifically, Altai argues that Texas does not endorse the "discovery rule", and a Texas court would consider CA's trade secret claims to be time-barred. Were it necessary to reach this issue, the court would reject Altai's argument. Texas courts are moving toward the adoption of the discovery rule in all cases where "it is difficult for the injured party to learn of the negligent act or omission." Willis v. Maverick, 760 S.W.2d 642, 644 (Tex. 1988).
In fact, the Supreme Court of Texas has held that the discovery rule for accrual of a medical malpractice claim is a state constitutional imperative. In Nelson v. Krusen, 678 S.W.2d 918 (Tex. 1984), the Supreme Court of Texas noted that the "open courts" provision of the Texas Constitution means that "the legislature has no power to make a remedy by due course of law contingent on an impossible condition." Id. at 921. The "impossible condition" of Nelson refers to "cutting off a cause of action before the party knows, or reasonably should know, that he is injured." Id. at 922.
Since Altai has stipulated that — prior to August 1988 — CA had not discovered, and could not have discovered in the exercise of reasonable care, that Altai had misappropriated CA's trade secrets, the court, absent preemption, would have to consider what relief to CA was appropriate under the trade secrets law of Texas. In view of the federal preemption of the claim, however, it is not necessary to address the merits of CA's trade secrets claim.
C. Damages
We turn now to a consideration of the damages to be awarded for Altai's conceded infringement of CA's copyright in CA-SCHEDULER 2.1. The only infringement established was that some of the ADAPTER portion of SCHEDULER was copied by Arney and became some of the OSCAR portion of Altai's ZEKE, later to be included in both ZACK and ZEBB.
OSCAR was originally introduced by Altai in the spring of 1984 as part of its ZEKE/VSE program. Next, an MVS version of ZEKE was developed and marketed, also using OSCAR 3.4. Then ZACK and ZEBB incorporated OSCAR and were marketed. After this lawsuit was commenced in August of 1988, Altai set about rewriting OSCAR into a non-infringing version 3.5. By July 1989 Altai had abandoned any use of OSCAR 3.4 and had fully replaced it with version 3.5 by providing all of its customers with the updated version. Our task, therefore, is to determine the damages that are to be awarded to CA as a result of Altai's infringing use of OSCAR 3.4 during the roughly five-year period from Spring 1984 to July 1989.
17 U.S.C. § 504 provides that an infringer of copyright is liable for "the copyright owner's actual damages and any additional profits of the infringer, as provided by subsection (b)". Subsection (b), entitled "Actual Damages and Profits", provides:
The copyright owner is entitled to recover the actual damages suffered by him or her as a result of the infringment, and any profits of the infringer that are attributable to the infringement and are not taken into account in computing the actual damages. In establishing the infringer's profits, the copyright owner is required to present proof only of the infringer's gross revenue, and the infringer is required to prove his or her deductible expenses and the elements of profit attributable to factors other than the copyrighted work.
This section thus authorizes CA to recover for CA's "actual damages" plus Altai's profits. Not surprisingly, the parties do not agree as to how this section of the act should be applied to the circumstances of this case. Most of the damage evidence was presented by expert witnesses on each side.
1. CA's View of Damages
CA's expert, Dr. Robert J. Larner, an economist and vice-president of Charles River Associates, a research and consulting firm headquartered in Boston, Massachusetts, expressed two views of damages, one based on the assumption that the infringement was cured as of July 31, 1991, the other based on the assumption of a cure date of January 31, 1989. For purposes of the present discussion we shall refer only to the calculations relating to January 31, 1989. Dr. Larner calculated CA's damages as follows:
Actual damages (before taxes) $5,433,546 Altai's profits 6,890,689 Altai's enhanced good will 1,583,563
Each of these items requires some explanation. To arrive at CA's actual damages, Larner determined the number of infringing units sold by Altai, then multiplied that quantity by the prices at which CA was selling its competing programs to produce the assumed additional revenue that CA would have received if it had made all of the Altai transactions. From that figure, Larner subtracted estimated incremental costs to CA had it made the additional sales, yielding the incremental profit that CA would have realized if it had made all of the Altai transactions.
Recognizing that CA would not have made all of the Altai transactions, Larner looked to market-share data supplied from an outside source, and then concluded that CA's actual damages represented the incremental revenues multiplied by CA's market share percentage. These calculations for the full period produced the actual damage figure of $5,433,546.
For Altai's profits, the second aspect of damages allowed by the statute, Larner turned to that portion of the market share that CA did not have and calculated Altai's total related revenues for the period. He did this for each year and for each of the Altai products. As permitted by the statute, he did not take into account Altai's expenses that related to those revenues, but instead left that calculation for Altai to prove. Larner's total figure for Altai's "profit" was $6,890,689.
Larner also included a figure for enhanced good will, which, for the relevant period, he calculated to be $1,583,563.
Larner's total damage figure was $13,907,798.
2. Altai's View of Damages
Altai's damage estimates were made by Burton Grad, president of Burton Grad Associates, Inc. of Tarrytown, New York, a firm that serves as consultants to computer software and services companies. Grad calculated his damages based on a slightly different time period than that used by Larner. Grad adopted Altai's fiscal years and calculated damages for those years ending July 31, 1986, 1987, 1988 and 1989. Thus, his figures begin a few months later than Larner's, and they end six months later. Because no precise reliance is placed by the court on either set of figures, this slight discrepancy in time periods is of no significance for our analysis.
As to actual damages claimed by CA, Grad concludes that there are none because, as he states: "There is no evidence that CA lost any sales as a result of Altai's use of OSCAR. Thus, CA should not be awarded any actual damages."
As to Altai's profits from the infringement, Grad sets forth two factors: (1) the money Altai saved in developing OSCAR through the infringement, which for the four year period he calculated to be $38,000, plus (2) extra profits Altai earned by being able to deliver ZEKE/MVS into the market place three months earlier, which in his "case 1" example he calculated as $47,000. This produced a total damage of $85,000, which Grad then converted to a present worth of $115,000. He made a further calculation by deducting taxes, but for ease of comparison, the court will consider only pre-tax, rather than after-tax damages. Grad also made a separate calculation of damages, using somewhat different assumptions; it produced a still lower estimate of damage at $39,000, but there is no need to discuss it here.
As to the lost good will postulated by Larner, Grad took the position that Larner "failed to demonstrate that Altai's good will has been enhanced as a result of Altai's use of OSCAR. Therefore, CA is entitled to no damages for enhanced good will."
Thus, we have two expert witnesses, both ostensibly qualified, and both undoubtedly very well-paid for their opinions. They begin with the same raw data, the sales revenues and expenses for the two companies' competing products plus the market-share information. One expert determines damages to be $13,000,000, while the other finds the damages to be $115,000 (less than 1 percent of the higher amount).
It should not be surprising that the court is not persuaded by either of these "expert" opinions. There are many flaws in both, as pointed out through each opinion's criticism of the other, and through the further expert testimony of Dr. Frederick R. Warren-Boulton, an economist and senior vice-president of ICF Consulting Associates of Washington, DC, called by Altai. Other criticisms of the two damage appraisals are contained in the cross-examination of the expert witnesses as well as in the respective parties' post-trial memoranda. For present purposes it will suffice to indicate simply some of the shortcomings of each opinion.
3. Defects in CA's View
a. CA's Actual Damages
Larner's approach assumes that CA would have sold its percentage market share of Altai's infringing sales. This assumption, however, fails to take into account a critical factor: price. CA sells a much more expensive product than did Altai. Compare Stevens Linen Assocs., Inc. v. Mastercraft Corp., 656 F.2d 11, 14-15 (2d Cir. 1981). Direct price comparisons between Altai and CA are difficult because of the variety of methods of selling and of the variation in the competing products themselves. Compare id. The evidence indicates, however, that CA's prices exceeded Altai's by between 20 and 50 percent. The Grad survey indicates that with many of Altai's customers, price was a substantial factor in determining to buy from Altai as opposed to CA.
CA's share of the market, derived from historic sales, indicates that segment of the market that was willing to pay the higher prices charged by CA. There is nothing, however, to support the assumption that Altai's customers, many of whom prefer a cheaper product, would have gone to CA in anything near the proportion that CA was able to select from the overall market.
CA's expert's opinion compounds the "price" problem when it assumes that all of the Altai sales it would have received would generate revenues, not at Altai's price level, but at CA's price levels. Thus, not only does CA's expert exaggerate the quantity by this assumption, but he inflates the hypothetical sales price as well.
Still another flaw in Larner's opinion is his basic assumption that but-for the infringement, Altai would have marketed no competing product. This flies in the face of the fact that before OSCAR 3.4 was developed, Altai was producing ZEKE/VSE and selling it in competition with CA's SCHEDULER, and that MVS versions of ZEKE, ZACK, and ZEBB could readily have been developed. ZEKE preceded SCHEDULER into the market, and the market-share data show that in 1985 ZEKE/VSE was an established competitor of CA-SCHEDULER/VSE; indeed, as of the end of 1984, ZEKE/VSE had 58 surveyed sites installed as opposed to only 40 for CA-SCHEDULER/VSE.
CA's treatment of its costs is equally unconvincing. It postulates only what it calls "incremental expenses" so that, for example, on a one-year lease of ZEKE/MVS, which brought Altai $7,500 (exhibit B of Larner's opinion, item 312), and for which CA postulates it would have received $15,602 (exhibit C of Larner opinion revised 3/27/90, line 1 for 1986), CA would have incurred costs of only $129.84 (exhibit D of Larner opinion — total for CA SCHEDULER/MVS) plus a sales commission.
Notwithstanding the expert's paid opinion, the real world just doesn't work that way. During pretrial, CA strenuously resisted Altai's attempts to obtain cost data for analysis by Altai. Such basic data was not even provided to Larner, its own expert. Grad testified, credibly, relying only on his general industry background and experience in estimating incremental costs, that it is more consistent with industry norm to assume that variable costs of greater than 50 percent of sales would inevitably be incurred.
Taking another point of view, the court perceives a related defect in Larner's opinion, which seems to ignore the causation requirement in the statute. Actual damages must have been suffered by the copyright owner "as a result of the infringement". Similarly, profits of the infringer, to be recoverable, must be "attributable to the infringement".
The picture is further complicated by the fact that the infringed component, ADAPTER, has relatively little sales appeal for customers. Many customers are totally unaware of its presence. Most customers who are aware of the presence of ADAPTER or OSCAR in their programs regard it simply as a means for making the application program work on their particular computer with their particular operating systems.
For some customers, however, having ADAPTER or OSCAR provides an immediate advantage in being able to use in the same office computers having different operating systems. For a few, the problem of "migration" (upgrading a computer system by acquiring a more sophisticated operating system) makes ADAPTER or OSCAR attractive. Migration was of relatively minor significance, however, because it was established at trial that of the roughly 700 locations at which Altai maintained computer programs over the years, only approximately 25 had "migrated". Thus, although CA attempts to establish that ADAPTER or OSCAR are the very heart of the applications programs in which they are installed, implying that without that link to the operating systems there would be nothing else, the facts show that CA's emphasis on the importance of ADAPTER was greatly exaggerated.
Still another problem with CA's calculation of damages is CA's claim that Altai's use of OSCAR 3.4 in, e.g., ZACK/MVS, somehow caused damage to CA's OPERA/MVS, which did not even use ADAPTER. In a theoretical sense, perhaps, if OSCAR were as indispensable to ZACK, as ADAPTER is claimed to be to CA-SCHEDULER, then without OSCAR, ZACK would not exist. But in a practical sense, CA's competitive product OPERA/MVS does exist without ADAPTER, and there is no reason to believe that ZACK could not do likewise.
On a more general level, CA claims to have been caused actual damages in excess of $5,000,000 during the infringing period, yet during this period its market share in the relevant products increased, its revenues and profits increased dramatically, and there is no evidence that CA lost a single sale to Altai because of the presence of OSCAR 3.4 as a component in the Altai programs. CA did present evidence of three sales lost to Altai, but none of those lost sales could be attributed to the presence of OSCAR. Moreover, as against CA's total revenues for, say, 1987 ($452,000,000), Altai's revenues of $2,600,000 seem almost insignificant.
b. Altai's Profits from OSCAR 3.4
The fundamental defect in CA's estimates of Altai's profits is CA's assumption that Altai's complete revenues on sales of products can be equated with profit attributable to one component of those products. In the background is the same assumption that infected CA's actual damage analysis: that OSCAR was essential to the Altai products and that without it, no sales would have been made. As indicated above, the court rejects that assumption.
A sounder approach would be to allocate a fair proportion of the profit on a particular sale to the presence of the infringing OSCAR 3.4. See Big Seven Music Corp. v. Lennon, 554 F.2d 504, 509 (2d Cir. 1977) ("damages may be recovered only if there is a necessary, immediate and direct causal connection between the wrongdoing and the damages"). This is particularly appropriate in the context of this case because with most customers, the presence of OSCAR was not a factor in their decision to purchase. Cf. Cream Records, Inc. v. Jos. Schlitz Brewing Co., 754 F.2d 826, 828-29 (9th Cir. 1985).
CA's calculation of Altai's revenues include not only the revenues received for each of its products during the four fiscal years, but also estimated future revenues, which are now irrelevant in light of the court's finding that OSCAR 3.5 cured the infringement.
CA made no calculation as to Altai's expenses, and they were not required to do so, because the statute places the burden of establishing expenses on Altai. Those expenses, however, were substantial, and are analyzed in the written testimony of Altai's expert, Grad. They will be discussed in that context.
c. Altai's Enhanced Good Will
The fundamental defect in CA's calculation of Altai's "enhanced" good will is, simply, that CA did not prove the existence of such good will. A proper measure of its value would have been to compare pre-infringement value with post-infringement value and to allow the difference. But CA presented no evidence of the pre-infringement value of Altai's good will. Furthermore, at least part of CA's good will calculation rested upon revenues for a program, Z/CAT2, which did not use OSCAR and which was not connected by the evidence to the OSCAR-using products of Altai or to the customers who use those products. In short, CA's claim, based on a postulated increase in Altai's good will, fails.
4. Defects in Altai's View
a. CA's Actual Damages
Grad would allow CA no actual damages because "there is no evidence that CA lost any sales as a result of Altai's use of OSCAR." The lack of specific evidence is correct, but the fact that some damage occurred must also be recognized. CA, of course, is the giant of the computer software industry. Although minuscule in comparison to CA, Altai was nevertheless a significant competitor with certain of CA's products. When it copied ADAPTER, Altai was able to place in the marketplace a product which it viewed as being more useful than the same product would have been without OSCAR 3.4. Altai's products met with some commercial success, and it defies reason and common sense to assume that its competition using the infringing OSCAR did not cause CA to lose some sales and profits to Altai as a result of the infringement. CA's loss was, of course, not the grossly-exaggerated amount postulated in the Larner opinion, but its damage from this factor cannot be totally disregarded.
b. Altai's Profits from OSCAR 3.4
A basic flaw of the Grad opinion on Altai's profits is that it simply disregards the statute. Grad works from a premise of a hypothetical, infringement-free world and concludes that Altai's profits are represented by the money saved through developing OSCAR by infringement rather than by independent research, plus extra profits earned because Altai could deliver ZEKE/MVS into the marketplace three months earlier. This approach simply ignores the statutory purpose of the profits factor of damages, which is to deprive the infringer of any extra benefits it receives that are attributable to the forbidden conduct.
Altai's own figures indicate a pre-tax profit of $260,000 over the four fiscal years in question. Since most of this is attributable to products having OSCAR 3.4 as a component, some portion of it, at least, must be recognized as being attributable to the infringement.
The statute places the burden on the infringer to show its expenses. Altai has met that burden with a fairly extensive cost analysis for each of the products broken down by various categories, all as set forth in exhibits attached to Grad's testimony. As part of that analysis, Grad concludes that during the four-year period, total revenues from the relevant products equalled $13,311,000, applicable costs equalled $13,051,000, leaving a total profit for the 4 years of $260,000 (exhibit E to Grad testimony).
Grad does not recognize that profit figure, however, as a factor in CA's recovery. Instead, he develops two other theories of "what might have been". In addition to ignoring the statute, this approach is far too speculative to be relied upon.
c. Altai's Enhanced Good Will
As previously indicated, Grad rejects this element of damages for the reason that CA failed to prove either any change in good will that may have occurred during the period, or even the existence of any good will. See 3 Nimmer on Copyright § 14.02[B], at 14-18 to 14-19. The court agrees with that conclusion.
5. Evaluation and Conclusion as to Damages
As indicated earlier, the court did not find either party's damage analysis very helpful. The highlighted items represent only some of the flaws; others are discussed in the briefs and testimony. Despite the skewed analyses on both sides, the court must reach a decision on damages, and to that task we now turn. Although the fact of damage has been established, a precise calculation of CA's actual damages is not possible. The court, therefore, can only make a "just and reasonable inference" as to the amount of damages. Story Parchment Co. v. Paterson Parchment Paper Co., 282 U.S. 555, 563, 51 S.Ct. 248, 250, 75 L.Ed. 544 (1931); see 3 Nimmer on Copyright § 14.02[A], at 14-11 to 14-12 ("courts will make the best possible appraisal of value").
Copying of ADAPTER has been admitted. Approximately 30 percent of the lines of code in OSCAR 3.4 were copied directly from ADAPTER. The significance or the value of the copied material is not necessarily measured by counting lines of code; their qualitative value should also be taken into account. The court finds that one-third of the value of OSCAR 3.4 should be attributed to the infringed portion.
There was a great dispute over the significance or value that OSCAR 3.4, in turn, contributed to the Altai products, ZEKE, ZACK, and ZEBB. Without OSCAR those products could have been, and undoubtedly would have been, produced with direct connections to the relevant operating systems. But the fact remains that they were in fact produced using the infringing OSCAR 3.4. Customers generally were not particularly interested in the advantages that OSCAR provided, but in fact OSCAR did contribute some value in terms of permitting different operating systems to use the program in the same office and in permitting a customer to upgrade to more complicated systems without changing programs. The court finds that a fair evaluation of the significance of OSCAR 3.4 in the Altai products is one-third of the total value. Thus, the infringing portion to be attributed to the end product is one-third times one-third, or one-ninth of the products sold. This fraction may fairly be used to calculate CA's actual damage.
The one-ninth factor cannot, however, fairly be applied to all of the sales, or even to CA's market percentage of those sales, because as we have seen, CA sold at considerably higher prices than did Altai.
CA estimated its actual pre-tax damages at approximately $3,500,000. Three adjustments to that figure are appropriate. First, to allow for the loss in sales that would be caused by CA's higher price levels and Altai's competition with non-infringing products, $500,000 should be deducted.
Second, a more reasonable cost figure should be allowed to reflect the realistic costs, rather than the nominal, variable costs allowed in CA's computation. $500,000 (approximately 17 percent) is a reasonable additional cost allowance, based on the evidence. That would leave a figure of $2,500,000, which represents the net revenues to CA from the sales it would have picked up from Altai.
For the third adjustment, we multiply the net revenues of $2,500,000 by one-ninth, representing the portion of the Altai programs found to be attributable to the infringement, which leaves $277,777 as a just and reasonable inference of CA's actual damages resulting from the infringement.
Turning to the profits gained by Altai from the sales of ZEKE, ZACK, and ZEBB over the four year period, the court accepts the figure of $260,000 indicated by Grad in exhibit E of his opinion at page 5. However, for reasons already indicated, only a portion — the court finds one-third — of those profits "are attributable to the infringement". That one-third amounts to $86,667, representing the profits of Altai that are recoverable by CA. Adding the profits ($86,667) to the actual damages of $277,777, yields total damages resulting from Altai's infringement of CA's ADAPTER program through its use of OSCAR 3.4 of $364,444.
6. Interest
CA should recover pre-judgment interest on the $364,444. For ease of computation the court directs that interest shall be calculated by the clerk at the usual rate from June 1, 1987, approximately the middle date of the infringement period.
D. Housekeeping Matters
In addition to the foregoing discussion, there remain a few additional, "housekeeping", matters to clean up.
1. Punitive Damages
In light of the above discussion and conclusions, the court sees no basis for punitive damages against Altai.
2. Attorney's Fees
a. OSCAR 3.4
Under § 412 of the copyright act, CA may not be awarded statutory damages or attorney's fees as provided in § 505, because the alleged infringement of ADAPTER by OSCAR 3.4 commenced before the effective date of its registration. ADAPTER was registered, as discussed above, as part of CA-SCHEDULER, in August 1988 — well after the infringement by OSCAR 3.4 began. The statute thus bars CA's recovery of attorney's fees for the conceded infringement by OSCAR 3.4.
b. OSCAR 3.5
The court has found that OSCAR 3.5 did not infringe CA's copyright in ADAPTER. Section 505 of the copyright act provides, in part: "[T]he court may * * * award a reasonable attorney's fee to the prevailing party as part of the costs." 17 U.S.C. § 505. Such an award rests largely within the court's discretionary power, see, e.g., Peter Pan Fabrics, Inc. v. Jobela Fabrics, Inc., 329 F.2d 194 (2d Cir. 1964), and since CA did not prevail in regard to infringement by OSCAR 3.5, the court does not award attorney's fees on that part of the claim. As to Altai, the court sees no compelling reason to shift any portion of its attorney's fees to CA. Accordingly, no attorney's fees shall be awarded to either party.
3. Fees of Dr. Davis
When the court, pursuant to Fed.R.Evid. 706, appointed its own expert, with the agreement of counsel for both sides, it provided that each side in the first instance should pay one-half the fee of Dr. Davis, with the final burden of his fee to be fixed as part of the costs upon entry of the judgment. Costs ultimately lie in the discretion of the court.
With respect to Dr. Davis's fee, the need for his testimony was initially caused by Altai and its infringement of the ADAPTER program, because that infringement produced this lawsuit. The principal issue that remained to be tried, however, related to whether or not OSCAR 3.5 infringed, and on that issue Altai has prevailed. Considering all the factors surrounding this litigation and the testimony of Dr. Davis, including the court's need for that testimony and its impact on the case, the court finds that a fair allocation of his fees would be to leave the parties where they now stand, i.e., with each side having paid one-half of his fees and neither side entitled to any further reimbursement from the other.
4. Costs
Pursuant to Fed.R.Civ.P. 54(d) the court directs that no costs shall be awarded to either party.
5. The French Motion
After this case had been submitted for decision, CA renewed a motion made before trial to modify the confidentiality order entered during the discovery process of this action by removing therefrom certain "confidential" materials that CA wished to use in the prosecution of an action against Altai that was pending in France. In connection with that motion the parties submitted to the court a series of papers which ultimately stacked up to a height of approximately five inches.
After due deliberation, the court denies the motion.
6. Exhibits
Counsel may pick up from chambers their own exhibits, as well as those documents submitted and marked as the court's exhibits, except for those court exhibits, obviously not confidential, that the court has docketed in the clerk's office. Counsel will, of course, be responsible for preserving those exhibits for use in the event of an appeal. Any exhibits not picked up by September 16, 1991, will be destroyed.
IV. CONCLUSION
The clerk is directed to enter judgment in favor of plaintiff Computer Associates International, Inc. and against Altai, Inc. in the sum of $364,444, plus interest to be calculated on that sum from June 1, 1987.
SO ORDERED.