4 Subject Matter of Copyright (Week 3) 4 Subject Matter of Copyright (Week 3)

4.1 Fictional Characters 4.1 Fictional Characters

4.1.1 DC Comics v. Towle Court of Appeals 4.1.1 DC Comics v. Towle Court of Appeals

DC COMICS, Plaintiff-Appellee,
v.
MARK TOWLE, an individual, DBA Garage Gotham, Defendant-Appellant.

No. 13-55484.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted February 5, 2015—Pasadena, California.
Filed September 23, 2015.

Larry Zerner (argued), Law Offices of Larry Zerner, Los Angeles, California; Edwin F. McPherson and Tracy B. Rane, McPherson Rane LLP, Los Angeles, California, for Defendant-Appellant.

James D. Weinberger (argued), Roger L. Zissu, and Leo Kittay, Fross Zelnick Lehrman & Zissu, P.C., New York, New York; J. Andrew Coombs, J. Andrew Coombs, A Professional Corporation, Glendale, California, for Plaintiff-Appellee.

Before: Michael J. Melloy,[1] Jay S. Bybee, and Sandra S. Ikuta, Circuit Judges.

Opinion by Judge Ikuta

OPINION

IKUTA, Circuit Judge.

We are asked to decide whether defendant Mark Towle infringed DC Comics' exclusive rights under a copyright when he built and sold replicas of the Batmobile, as it appeared in the 1966 television show Batman and the 1989 film BATMAN. Holy copyright law, Batman!

I

DC Comics (DC) is the publisher and copyright owner of comic books featuring the story of the world-famous character, Batman. Since his first comic book appearance in 1939, the Caped Crusader has protected Gotham City from villains with the help of his sidekick Robin the Boy Wonder, his utility belt, and of course, the Batmobile.

Originally introduced in the Batman comic books in 1941, the Batmobile is a fictional, high-tech automobile that Batman employs as his primary mode of transportation. The Batmobile has varied in appearance over the years, but its name and key characteristics as Batman's personal crimefighting vehicle have remained consistent. Over the past eight decades, the comic books have continually depicted the Batmobile as possessing bat-like external features, ready to leap into action to assist Batman in his fight against Gotham's most dangerous villains, and equipped with futuristic weaponry and technology that is "years ahead of anything else on wheels."

Since its creation in the comic books, the Batmobile has also been depicted in numerous television programs and motion pictures. Two of these depictions are relevant to this case: the 1966 television series Batman, starring Adam West, and the 1989 motion picture BATMAN, starring Michael Keaton.

The 1966 Batman television series was the product of a licensing agreement between DC's predecessor, National Periodical Publications, Inc. (National Periodical) and the American Broadcasting Company (ABC). In 1965, National Periodical entered into a licensing agreement with ABC (the 1965 ABC Agreement) in which it granted ABC "an exclusive license to produce a series of half-hour television programs . . . based upon the literary property consisting of the comic book and comic strip stories entitled `Batman' . . . including the characters therein." This exclusive right included the right to "translate, adapt, [or] arrange" the Batman literary property "to such extent as ABC may desire" in the making of the television programs, and the right to secure copyrights in the television programs produced. The agreement also provided that "[a]ll rights in the property not specifically granted to ABC are hereby reserved to and may be exercised by National at all times during the term of this agreement" except as otherwise expressly stated in the agreement. National Periodical's reserved rights included "[a]ll rights of publication," and the exclusive merchandising rights to all products manufactured or distributed under the name of any character in the Batman comic books.

Under this agreement, ABC (through a series of sublicensing agreements) produced the 1966 television show starring Adam West as Batman. In addition to Batman, Robin, and the use of visual onomatopoeia that flashed on screen during fight scenes—Pow! Boff! Thwack!—the television series featured the Batmobile. The design of the Batmobile did not directly copy any iterations of the Batmobile as it appeared in the comic books. As in the comic books, however, the Batmobile in the 1966 television show maintained a bat-like appearance and was equipped with state-of-the-art weaponry and technology.[2]

In 1979, DC again licensed its rights in the Batman literary property, this time to Batman Productions, Inc. (BPI). In the agreement (the 1979 BPI Agreement), DC granted BPI the exclusive right to create a motion picture based on the "Property," which was defined to include "[t]he names, titles, fictional locations and fictional conveyances . . . as depicted and contained in the comic magazines [published by DC], which are identifiable with or associated with the fictional character known as `Batman,' such as . . . that certain conveyance known as the `Batmobile.'" The 1979 BPI Agreement also granted BPI the right to "adapt, use, . . . modify, [or] alter . . . the Property" for the purpose of producing the motion picture. Like the 1965 ABC Agreement, the 1979 BPI Agreement provided that "[a]ll rights in the Property not specifically granted to" BPI under the agreement "are reserved to DC and may be exercised by DC at all times without any limitation or restriction whatsover except as specifically set forth herein." These reserved rights included "[a]ll rights of publication in and to the Property," as well as "[a]ll `merchandising rights'" in "products manufactured or distributed under the name of or using a representation of `Batman' or any other character or thing included in the Property . . . or under a name which incorporates any phrase, clause or expression used in DC's comic strips or comic magazines. . . ."

BPI subsequently sub-licensed its rights to Warner Bros., Inc., who eventually (through a number of additional sublicensing agreements) produced the 1989 motion picture BATMAN, starring Michael Keaton as Batman. Like the 1966 television series, the 1989 motion picture featured a Batmobile that was physically distinct from the Batmobile portrayed in the comic books and the 1966 television series. Nonetheless, the Batmobile as portrayed in the motion picture retained a bat-like physical appearance and was again equipped with futuristic technology and crime-fighting weaponry.[3]

Defendant Mark Towle produces replicas of the Batmobile as it appeared in both the 1966 television show and 1989 motion picture as part of his business at Gotham Garage, where he manufactures and sells replicas of automobiles featured in motion pictures or television programs. Towle concedes that these replicas copy the designs of the Batmobile as depicted on television and in the motion picture, though they do not copy every feature. Towle then sells these vehicles for approximately $90,000 to "avid car collectors" who "know the entire history of the Batmobile." Towle also sells kits that allow customers to modify their cars to look like the Batmobile, as it appeared in the 1966 television show and the 1989 motion picture.

Before DC brought this lawsuit, Towle advertised each replica as the "Batmobile," and used the domain name batmobilereplicas.com to market his business. He also advertised that the replicas included such features as "custom bat insignias, wheel bats, [and a] bat steering wheel," and would attract attention due to the fame of the Batmobile. By his own admission, Towle is not authorized by DC to manufacture or sell any products bearing DC's copyright or trademark.

In May 2011, DC filed this action against Towle, alleging, among other things, causes of action for copyright infringement, trademark infringement, and unfair competition arising from Towle's manufacture and sale of the Batmobile replicas.[4] Towle denied that he had infringed upon DC's copyright. He claimed that the Batmobile as it appeared in the 1966 television show and 1989 motion picture was not subject to copyright protection. Alternatively, Towle argued that DC did not own the copyright in the Batmobile as it appeared in either production. Towle also asserted the affirmative defense of laches. The parties subsequently filed cross motions for partial summary judgment as to DC's trademark, copyright, and unfair competition claims, and as to Towle's laches defense.

In a published order, the district court granted in part and denied in part DC's motion for summary judgment, and denied Towle's cross motion for summary judgment. DC Comics v. Towle, 989 F. Supp. 2d 948 (C.D. Cal. 2013). First, the district court held that the Batmobile was a character entitled to copyright protection. In reaching this conclusion, the district court made a number of findings. Among other things, it found that the Batmobile "is known by one consistent name that identifies it as Batman's personal vehicle," and, although some of its physical traits have changed over time, several have remained consistent, including its "high-tech gadgets and weaponry," "bat-like motifs," and its jet black color. Additionally, the district court found that the Batmobile is always "depicted as being swift, cunning, strong and elusive," and is even portrayed as a "superhero" and "Batman's sidekick, if not an extension of Batman's own persona."[5]

Second, the district court held that DC maintained a copyright in the Batmobile as it appeared in both the 1966 television show and the 1989 motion picture based on its ownership of the merchandising rights. Alternatively, the district court concluded that DC owns a copyright in the Batmobile as it appeared in each production because the appearance of the Batmobile in each production was derived from the Batmobile depicted in DC's comic books. Finally, the district court concluded that Towle infringed upon DC's copyright because he copied the Batmobile as it appeared in the 1966 and 1989 productions in his replicas. Accordingly, the district court granted summary judgment on the copyright infringement claim to DC.

The district court also granted summary judgment to DC on Towle's affirmative laches defense to the trademark infringement claim. The court found that Towle admitted that he knew of the Batman property and the various bat emblems and symbols, and did not dispute "that he intentionally copied the designs" of the Batmobile as it appeared in the 1966 television show and 1989 motion picture, which included DC's Batman trademarks. He also intentionally referred to his replicas as "Batmobiles." Therefore, the court concluded that Towle acted in bad faith and intentionally copied DC's trademarks "so as to associate his products with the Batman films and television show."

Finally, the court denied DC's summary judgment motion on Towle's laches defense to the copyright infringement claim because it determined that there was a genuine dispute of fact as to whether Towle was aware that copying the Batmobile as it appeared in the 1966 television show and 1989 motion picture constituted copyright infringement.

After the district court issued its decision, the parties entered into a joint stipulation in which they agreed that the district court would enter a judgment against Towle on DC's copyright infringement and other claims. They also agreed that, except as provided in the stipulation, all claims were to be dismissed with prejudice. The district court entered a judgment consistent with this stipulation on February 22, 2013, and Towle timely appealed.

Because the parties entered into a stipulation that finalized the district court order, we have jurisdiction over this appeal under 28 U.S.C. § 1291. See Dannenberg v. Software Toolworks Inc., 16 F.3d 1073, 1074-75 (9th Cir. 1994).

II

In order to prevail on its claim for copyright infringement, DC must prove that it owns a copyright in the Batmobile as it appeared in the 1966 television series and 1989 movie, and that Towle infringed that copyright by creating unauthorized replicas. See Entm't Research Grp., Inc. v. Genesis Creative Grp., Inc., 122 F.3d 1211, 1217 (9th Cir. 1997).

To the Batmobile!

A

We begin with the question whether the Batmobile, as it appears in the comic books, television series, and motion picture, is entitled to copyright protection. See Ets-Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1073 (9th Cir. 2000). In the context of copyright law, where, as here, "the question requires us to consider legal concepts in the mix of fact and law and to exercise judgment about the values that animate legal principles, . . . the question should be classified as one of law and reviewed de novo." Harper House, Inc. v. Thomas Nelson, Inc., 889 F.2d 197, 201 (9th Cir. 1989).

Courts have recognized that copyright protection extends not only to an original work as a whole, but also to "sufficiently distinctive" elements, like comic book characters, contained within the work. Halicki Films, LLC v. Sanderson Sales & Mktg., 547 F.3d 1213, 1224 (9th Cir. 2008). Although comic book characters are not listed in the Copyright Act, we have long held that such characters are afforded copyright protection. See Walt Disney Productions v. Air Pirates, 581 F.2d 751 (9th Cir. 1978). In Air Pirates, for instance, we considered a number of subversive comic books that portrayed well-known Disney characters as being active participants in "a free thinking, promiscuous, drug ingesting counterculture." Id. at 753. In holding that the Disney characters were copyrightable (and that Disney's copyright in those characters had been infringed), we distinguished a prior decision suggesting that literary "characters ordinarily are not copyrightable," id. at 755 (citing Warner Bros. Pictures, Inc. v. Columbia Broad. Sys., Inc., 216 F.2d 945 (9th Cir. 1954)), on the grounds that a comic book character "has physical as well as conceptual qualities" and "is more likely to contain some unique elements of expression" than a purely literary character. Id.[6] (citing Detective Comics, Inc. v. Bruns Publications Inc., 111 F.2d 432 (2d Cir. 1940) (holding that comic book characters are copyrightable); Fleischer Studios v. Freundlich, 73 F.2d 276 (2d Cir. 1934) (same); King Features Syndicate v. Fleischer, 299 F. 533 (2d Cir. 1924) (same)). We subsequently held that characters in a television series or a motion picture may also be entitled to copyright protection. See Olson v. National Broadcasting Co., 855 F.2d 1446 (9th Cir. 1988).

Not every comic book, television, or motion picture character is entitled to copyright protection. We have held that copyright protection is available only "for characters that are especially distinctive." Halicki, 547 F.3d at 1224. To meet this standard, a character must be "sufficiently delineated" and display "consistent, widely identifiable traits." Rice v. Fox Broadcasting Co., 330 F.3d 1170 (9th Cir. 2003) (citing Toho Co., Ltd. v. William Morrow & Co., Inc., 33 F. Supp. 2d 1206, 1215 (C.D. Cal.1998) (Godzilla)). A masked magician "dressed in standard magician garb" whose role "is limited to performing and revealing the magic tricks," for example, is not "an `especially distinct' character differing from an ordinary magician in a manner that warrants copyright protection." Id. Further, characters that have been "lightly sketched" and lack descriptions may not merit copyright protection. Olson, 855 F.2d at 1452-53.

We have previously determined that an automotive character can be copyrightable. See Halicki, 547 F.3d at 1224. In Halicki, we considered whether "Eleanor," a car that appeared in both the original 1971 and 2000 remake motion picture Gone in 60 Seconds, could be entitled to copyright protection as a character. Id. at 1224-25. Considering Eleanor's persistent attributes in both the original and remake of Gone in 60 Seconds, we concluded that Eleanor met some of the key factors necessary to qualify for copyright protection. Id. at 1225. We first noted that Eleanor was more like a comic book character than a literary character given Eleanor's "physical as well as conceptual qualities." Id. We also stated that Eleanor "displays consistent, widely identifiable traits and is especially distinctive." Id. (alteration, citation, and internal quotation marks omitted). We gave several examples of these traits. First, we noted that "[i]n both films, the thefts of the other cars go largely as planned, but whenever the main human character tries to steal Eleanor, circumstances invariably become complicated." Id. Second, we noted that in the original, "the main character says `I'm getting tired of stealing this Eleanor car,'" and in the remake "the main character refers to his history with Eleanor." Id. Despite this evidence of distinctive traits, we were sensitive to the fact that the district court had implied that Eleanor was deserving of copyright protection, but had not directly examined this "fact-intensive issue." Id. Therefore, we remanded the issue to the district court to decide in the first instance. Id.

As indicated in Halicki, a character may be protectable if it has distinctive character traits and attributes, even if the character does not maintain the same physical appearance in every context. As the Eighth Circuit has recognized, "the presence of distinctive qualities apart from visual appearance can diminish or even negate the need for consistent visual appearance." Warner Bros. Entm't, Inc. v. X One X Prods., 644 F.3d 584, 599 n.8 (8th Cir. 2011). For example, in Halicki, Eleanor's ability to consistently disrupt heists by her presence was more pertinent to our analysis of whether the car should qualify as a sufficiently distinctive character than Eleanor's make and model. 547 F.3d at 1225. Indeed, Halicki put no weight on the fact that Eleanor was a customized yellow 1971 Fastback Ford Mustang in one film, and a silver 1967 Shelby GT-500 in another.

Similarly, district courts have determined that James Bond, Batman, and Godzilla are characters protected by copyright, despite their changes in appearance. See Metro-Goldwyn-Mayer, Inc. v. Am. Honda Motor Co., 900 F. Supp. 1287, 1295-96 (C.D. Cal. 1995) (James Bond) (cited with approval in Rice); Toho Co. v. William Morrow & Co., 33 F. Supp. 2d 1206, 1216 (C.D. Cal. 1998) (Godzilla) (cited with approval in Rice); Sapon v. DC Comics, No. 00 CIV. 8992(WHP), 2002 WL 485730, at *3-4 (S.D.N.Y. Mar. 29, 2002) (Batman). In each instance, courts have deemed the persistence of a character's traits and attributes to be key to determining whether the character qualifies for copyright protection. The character "James Bond" qualifies for copyright protection because, no matter what the actor who portrays this character looks like, James Bond always maintains his "cold-bloodedness; his overt sexuality; his love of martinis `shaken, not stirred;' his marksmanship; his `license to kill' and use of guns; his physical strength; [and] his sophistication." Metro-Goldwyn-Mayer, 900 F. Supp. at 1296. Similarly, while the character "Godzilla" may have a different appearance from time to time, it is entitled to copyright protection because it "is always a pre-historic, firebreathing, gigantic dinosaur alive and well in the modern world." Toho Co., 33 F. Supp. 2d at 1216. In short, although James Bond's, Godzilla's, and Batman's "costume and character have evolved over the years, [they have] retained unique, protectable characteristics" and are therefore entitled to copyright protection as characters. Sapon, 2002 WL 485730, at *3-4.

We read these precedents as establishing a three-part test for determining whether a character in a comic book, television program, or motion picture is entitled to copyright protection. First, the character must generally have "physical as well as conceptual qualities." Air Pirates, 581 F.2d at 755. Second, the character must be "sufficiently delineated" to be recognizable as the same character whenever it appears. See Rice, 330 F.3d at 1175. Considering the character as it has appeared in different productions, it must display consistent, identifiable character traits and attributes, although the character need not have a consistent appearance. See Halicki, 547 F.3d at 1224. Third, the character must be "especially distinctive" and "contain some unique elements of expression." Halicki, 547 F.3d at 1224. It cannot be a stock character such as a magician in standard magician garb. Rice, 330 F.3d at 1175. Even when a character lacks sentient attributes and does not speak (like a car), it can be a protectable character if it meets this standard. Halicki, 547 F.3d at 1224.

We now apply this framework to this case. Because (unlike in Halicki) the district court here addressed this question in detail, we consider its factual findings in analyzing this issue. Cf. Halicki, 547 F.3d at 1225. First, because the Batmobile has appeared graphically in comic books, and as a three-dimensional car in television series and motion pictures, it has "physical as well as conceptual qualities," and is thus not a mere literary character. Air Pirates, 581 F.2d at 755.

Second, the Batmobile is "sufficiently delineated" to be recognizable as the same character whenever it appears. See Rice, 330 F.3d at 1175. As the district court determined, the Batmobile has maintained distinct physical and conceptual qualities since its first appearance in the comic books in 1941. In addition to its status as "a highly-interactive vehicle, equipped with high-tech gadgets and weaponry used to aid Batman in fighting crime," the Batmobile is almost always bat-like in appearance, with a bat-themed front end, bat wings extending from the top or back of the car, exaggerated fenders, a curved windshield, and bat emblems on the vehicle. This bat-like appearance has been a consistent theme throughout the comic books, television series, and motion picture, even though the precise nature of the bat-like characteristics have changed from time to time.

The Batmobile also has consistent character traits and attributes. No matter its specific physical appearance, the Batmobile is a "crime-fighting" car with sleek and powerful characteristics that allow Batman to maneuver quickly while he fights villains. In the comic books, the Batmobile is described as waiting "[l]ike an impatient steed straining at the reins . . . shiver[ing] as its super-charged motor throbs with energy" before it "tears after the fleeing hoodlums" an instant later. Elsewhere, the Batmobile "leaps away and tears up the street like a cyclone," and at one point "twin jets of flame flash out with thunderclap force, and the miracle car of the dynamic duo literally flies through the air!"[7] Like its comic book counterpart, the Batmobile depicted in both the 1966 television series and the 1989 motion picture possesses "jet engine[s]" and flame-shooting tubes that undoubtedly give the Batmobile far more power than an ordinary car. Furthermore, the Batmobile has an ability to maneuver that far exceeds that of an ordinary car. In the 1966 television series, the Batmobile can perform an "emergency bat turn" via reverse thrust rockets. Likewise, in the 1989 motion picture, the Batmobile can enter "Batmissile" mode, in which the Batmobile sheds "all material outside [the] central fuselage" and reconfigures its "wheels and axles to fit through narrow openings."[8]

Equally important, the Batmobile always contains the most up-to-date weaponry and technology. At various points in the comic book, the Batmobile contains a "hot-line phone . . . directly to Commissioner Gordon's office" maintained within the dashboard compartment, a "special alarm" that foils the Joker's attempt to steal the Batmobile, and even a complete "mobile crime lab" within the vehicle. Likewise, the Batmobile in the 1966 television series possesses a "Bing-Bong warning bell," a mobile Bat-phone, a "Batscope, complete with [a] TV-like viewing screen on the dash," and a "Bat-ray." Similarly, the Batmobile in the 1989 motion picture is equipped with a "pair of forward-facing Browning machine guns," "spherical bombs," "chassismounted shinbreakers," and "side-mounted disc launchers."

Because the Batmobile, as it appears in the comic books as well as in the 1966 television show and 1989 motion picture, displays "consistent, identifiable character traits and attributes," the second prong of the character analysis is met here.

Third, the Batmobile is "especially distinctive" and contains unique elements of expression. In addition to its status as Batman's loyal bat-themed sidekick complete with the character traits and physical characteristics described above, the Batmobile also has its unique and highly recognizable name. It is not merely a stock character.

Accordingly, applying our three-part test, we conclude that the Batmobile is a character that qualifies for copyright protection.

Towle raises two arguments against this conclusion. First, he points out that the Batmobile has at times appeared without its signature sleek "bat-like" features. He notes that in a 1988 comic book rendition, the Batmobile appears as a heavily armored tank with large tires and a rocket launcher. The Batmobile portrayed in the 1989 motion picture could also transform into a Batmissile. As we have noted, however, a consistent appearance is not as significant in our analysis as consistent character traits and attributes. The changes in appearance cited by Towle resemble costume changes that do not alter the Batmobile's innate characteristics, any more than James Bond's change from blue swimming trunks (in Casino Royale) to his classic tuxedo affects his iconic character. In context, the depictions of the Batmobile as a tank or missile promote its character as Batman's crime-fighting super car that can adapt to new situations as may be necessary to help Batman vanquish Gotham City's most notorious evildoers. See Halicki, 547 F.3d at 1224-25.

Second, Towle argues that a jury should decide the question whether the Batmobile displayed unique elements of expression and consistent, widely identifiable traits. We disagree. We have previously recognized that "[w]hether a particular work is subject to copyright protection is a mixed question of fact and law subject to de novo review." Societe Civile Succession Guino v. Renoir, 549 F.3d 1182, 1185 (9th Cir. 2008). Neither party disputes the relevant facts regarding the Batmobile here. Accordingly, we are well-equipped to determine whether, as a matter of law, these undisputed facts establish that the Batmobile is an "especially distinctive" character entitled to copyright protection.

B

Having concluded that the Batmobile is a copyrightable character, we next consider whether Towle's copies of the Batmobile as it appeared in the 1966 and 1989 productions infringed on DC's copyright. Here, Towle does not contest that his replicas copy the Batmobile as it appeared in the 1966 and 1989 productions, even if they do not copy every feature. Rather, Towle's main argument is that DC does not own any copyright interest in the 1966 and 1989 productions and therefore lacks standing to pursue its copyright infringement claim against Towle.

To analyze Towle's argument, we begin with the applicable legal framework. Under the Copyright Act, "copyright ownership `vests initially in the author or authors of the work,' which is generally the creator of the copyrighted work." U.S. Auto Parts Network, Inc. v. Parts Geek, LLC, 692 F.3d 1009, 1015 (9th Cir. 2012) (quoting 17 U.S.C. § 201(a)). The owner of a copyright has a number of exclusive rights, including the right "to prepare derivative works" based on its original work of authorship, 17 U.S.C. § 106. A derivative work is a "work based upon one or more preexisting works that recasts, transforms, or adapts the preexisting work," Parts Geek, 692 F.3d at 1015-16 (alterations omitted) (quoting 17 U.S.C. § 101), such as a motion picture that is based on a literary work, see, e.g., Stewart v. Abend, 495 U.S. 207, 212-14 (1990), a threedimensional costume based upon two-dimensional cartoon characters, see Entm't Research Grp., 122 F.3d at 1218, or three-dimensional figurines based on cartoon characters, Durham Indus., Inc. v. Tomy Corp., 630 F.2d 905, 909 (9th Cir. 1980). If an unauthorized third party prepares a derivative work, the copyright owner of the underlying work can sue for infringement. See Silvers v. Sony Pictures Entm't, Inc., 402 F.3d 881, 885 (9th Cir. 2005) (en banc) (citing 17 U.S.C. § 501(b)); see also, e.g., Air Pirates, 581 F.2d at 754-55; Durham Indus., 630 F.2d at 909.

A copyright owner also has the exclusive right to "authorize others to prepare derivative works based on their copyrighted works." Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 964 F.2d 965, 967 (9th Cir. 1992). When a copyright owner authorizes a third party to prepare a derivative work, the owner of the underlying work retains a copyright in that derivative work with respect to all of the elements that the derivative creator drew from the underlying work and employed in the derivative work. See Stewart, 495 U.S. at 223. By contrast, the creator of the derivative work has a copyright only as to those original aspects of the work that the derivative creator contributed, and only to the extent the derivative creator's contributions are "more than trivial." Parts Geek, 692 F.3d at 1016; see also Stewart, 495 U.S. at 223. Moreover, a copyright in a derivative work "must not in any way affect the scope of any copyright protection in that preexisting material." Id.; see 17 U.S.C. § 103(a) ("The copyright in a . . . derivative work . . . is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material."). Logically, therefore, if a third party copies a derivative work without authorization, it infringes the original copyright owner's copyright in the underlying work to the extent the unauthorized copy of the derivative work also copies the underlying work.

We reached a similar conclusion in Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1447-48 (9th Cir. 1994). There, Apple alleged that Microsoft infringed its copyright in the graphical user interface called the Lisa Desktop, as well as its copyright in a graphical user interface called the Macintosh Finder Desktop, which was a derivative work based on the Lisa Desktop. Id. at 1438 & n.1. Because the Finder Desktop did not contain any separately copyrightable original elements, the district court concluded that Apple could not bring a copyright infringement claim for Microsoft's alleged infringement of that work. Id. at 1447. We reversed, holding that Apple could bring a copyright infringement suit for the alleged copying of both the Lisa Desktop and the derivative Finder Desktop, because of Apple's copyright in the underlying work. Id. at 1447-48. In reaching this conclusion, we cited with approval the First Circuit's conclusion in Gamma Audio & Video that the owner of an exclusive right in an underlying work could "base [an] infringement suit on derivative works." Id. (citing Gamma Audio & Video, Inc. v. Ean-Chea, 11 F.3d 1106, 1111-12 (1st Cir. 1993)).

Our sister circuits also agree with this conclusion. See, e.g., Montgomery v. Noga, 168 F.3d 1282, 1293 (11th Cir. 1999); Gamma Audio & Video, Inc., 11 F.3d 1106. In Gamma Audio & Video, the owner of a copyright in a Chinese language television program had authorized a party to produce a derivative work, a Cambodian language version of the program. 11 F.3d at 1110. When an unauthorized third party copied this Cambodian language version (the derivative work), the First Circuit concluded that the owner of the copyright in the Chinese language version (the underlying work) could sue the third party for copyright infringement because "[a]ny elements that the author of the derivative work borrowed from the underlying work, such as the video images in the Chinese language episodes . . . remain protected by the copyrights in the underlying work." Id. at 1112. Accordingly, it was "irrelevant that what was actually distributed by [the unauthorized third party] was the derivative and not the underlying work." Id.

In sum, as a leading copyright commentator explained, "if the material copied was derived from a copyrighted underlying work, this will constitute an infringement of such work regardless of whether the defendant copied directly from the underlying work, or indirectly via the derivative work." 1 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 3.05, at 3-34.31 (Matthew Bender, Rev. Ed.) (hereafter Nimmer on Copyright). This conclusion is consistent with our determination that a copyright in an authorized derivative work "must not in any way affect the scope of any copyright protection in" the underlying work. Parts Geek, 692 F.3d at 1016 (quoting Entm't Research Grp., 122 F.3d at 1220 (quoting Durham Indus., 630 F.2d at 909)). Accordingly, the author of an underlying work is entitled to sue a third party who makes an unauthorized copy of an authorized derivative work to the extent that the material copied derived from the underlying work.

Applying these principles, we conclude that DC owns a copyright interest in the Batmobile character, as it is depicted in the 1966 and 1989 productions. There is no dispute that DC is the original creator of the Batmobile character. While DC licensed rights to produce derivative works of this character in the 1965 ABC Agreement and the 1979 BPI Agreement, DC did not transfer its underlying rights to the Batmobile character.[9] DC therefore owns the copyright in the Batmobile character, as expressed in the 1966 and 1989 productions, at least to the extent these productions drew on DC's underlying work. Stewart, 495 U.S. at 223. Accordingly, it is irrelevant that Towle's replica Batmobiles were an indirect copy of the Batmobile character, because DC is entitled to sue for infringement of its underlying work.[10]See Apple Computer, 35 F.3d 1447-48; Gamma Audio & Video, 11 F.3d at 1111-12.

Towle argues that his replicas of the Batmobile as it appeared in the 1966 and 1989 productions do not infringe on DC's underlying work because those versions of the Batmobile look substantially different from any particular depiction of the Batmobile in the comic books. We reject this argument. As a copyrightable character, the Batmobile need not have a consistent appearance in every context, so long as the character has distinctive character traits and attributes. See, e.g., Warner Bros. Entm't, Inc., 644 F.3d at 599 n.8. For instance, as we explained above, an automotive character may be copyrightable even if it appears as a yellow Fastback Ford Mustang in one film, and a silver 1967 Shelby GT-500 in another. Halicki, 547 F.3d at 1218, 1224. Here, DC retained its copyright in the Batmobile character even though its appearance in the 1966 and 1989 productions did not directly copy any comic book depiction. Because Towle produced a three-dimensional expression of the entire Batmobile character as it appeared in the 1966 and 1989 productions, and the Batmobile character in each of those productions was derived from DC's underlying work, we conclude that Towle's replicas necessarily copied some aspects of DC's underlying works. See e.g., Durham Indus., 630 F.2d at 909 (noting that three-dimensional "small, plastic, wind-up toys" of Disney characters Mickey, Donald, and Pluto were derivative works of these characters). Therefore, while we question whether a derivative work based on a character could ever have any independently copyrightable elements that would not "affect the scope of any copyright protection in that preexisting material," Parts Geek, 692 F.3d at 1016, we need not address that issue here.

For the same reason, we reject Towle's argument that his replicas of the Batmobile as it appeared in the 1966 television series and 1989 movie did not infringe DC's underlying work because the series and movies were produced by third parties, pursuant to sub-licensing agreements with ABC and BPI. Towle argues that while DC had an agreement with ABC and BPI to retain certain rights, DC failed to show that the agreements between ABC and BPI and the sublicensees also protected DC's interests. This argument fails because DC retained its rights to the underlying Batmobile character, and the creation of derivative works by sublicensees cannot deprive DC of such rights. DC may sue any third party who infringes on that work, even if the third party copies "indirectly via the derivative work." Nimmer on Copyright § 3.05.

C

Having established that the Batmobile character is entitled to copyright protection, and that DC owns a copyright to this character as it appears in the 1966 television series and 1989 motion picture, we conclude that Towle infringed upon these copyrights when he produced replicas of the Batmobile. While we ordinarily apply a two-part "substantial similarity" test to determine whether a plaintiff has established "copying of constituent elements of the work that are original," Funky Films, Inc. v. Time Warner Entm't Co., L.P., 462 F.3d 1072, 1076-77 (9th Cir. 2006) (internal quotation marks omitted), we need not do so where, as here, "the copying of the substance of the entire work" is admitted, Narell v. Freeman, 872 F.2d 907, 910 (9th Cir. 1989). Based on the undisputed facts, Towle's production and sale of replicas of the Batmobile, as it appeared in the 1966 and 1989 productions, infringed DC's exclusive right to produce derivative works of this character. Therefore, there is no genuine issue of material fact as to whether he infringed DC's copyrighted material. DC is entitled to judgment, and we affirm.

III

Finally, we must consider Towle's argument that the district court erred when it ruled as a matter of law that he could not assert a laches defense to DC's trademark infringement claim because he willfully infringed DC's trademarks. We have recognized an intracircuit split on whether the proper standard of review of a district court's laches determination is de novo or for an abuse of discretion. See Jarrow Formulas, Inc. v. Nutrition Now, Inc., 304 F.3d 829, 834 (9th Cir. 2002). We need not address this issue in this case, however, because under either standard of review, the district court did not err here. See id.

"Laches is an equitable time limitation on a party's right to bring suit," and is a valid defense to trademark infringement claims. Jarrow, 304 F.3d at 835 (internal quotation marks omitted). This doctrine does not apply, however, "in cases of willful infringement." Evergreen Safety Council v. RSA Network, Inc., 697 F.3d 1221, 1228 (9th Cir. 2012). Willful trademark infringement occurs when the defendant's actions are "willfully calculated to exploit the advantage of an established mark." Lindy Pen Co., Inc. v. Bic Pen Corp., 982 F.2d 1400, 1406 (9th Cir. 1993) (internal quotation marks omitted), superseded by statute on other grounds, Trademark Amendments Act of 1999, Pub. L. No. 106-43, 113 Stat. 218; see also Conan Props., Inc. v. Conans Pizza, Inc., 752 F.2d 145, 151 n.2 (5th Cir. 1985) (explaining that the issue with respect to the availability of a laches defense in a trademark infringement case is whether the defendant "intended to derive benefit from and capitalize on [the plaintiff's] goodwill" by using the mark).

Here, the undisputed facts establish that Towle used DC's Batman trademarks in order to exploit the advantage of those marks. Towle's advertisements recognize that the Batmobile is a famous vehicle, and boast that crowds will form around his replicas as a result of the Batmobile's fame. Additionally, Towle used DC's trademarks on his website to promote his business. He also intentionally referred to his replicas as "Batmobiles" to attract the attention of the Batman fans who constitute his customer base. Indeed, by Towle's own admission, most of his customers were fans who "usually know the entire history of the Batmobile." In light of this evidence, no reasonable juror could conclude that Towle used DC's trademarks for any reason other than to exploit the advantage of those marks.

Indeed, Towle does not argue otherwise, instead arguing that he did not knowingly and subjectively intend to confuse his buyers. Although evidence of intent to confuse buyers may be relevant to establishing that the defendant's actions were willfully calculated to exploit the advantage of an established mark, Towle points to no authority holding that such evidence is necessary, nor is the court aware of any such authority. Accordingly, the district court did not err when it concluded that Towle was barred from asserting a laches defense to DC's trademark infringement claim because he willfully infringed DC's trademarks.

IV

As Batman so sagely told Robin, "In our well-ordered society, protection of private property is essential." Batman: The Penguin Goes Straight, (Greenway Productions television broadcast March 23, 1966). Here, we conclude that the Batmobile character is the property of DC, and Towle infringed upon DC's property rights when he produced unauthorized derivative works of the Batmobile as it appeared in the 1966 television show and the 1989 motion picture. Accordingly, we affirm the district court.

AFFIRMED.

APPENDIX A

 

APPENDIX B

 

[1] The Honorable Michael J. Melloy, Senior Circuit Judge for the U.S. Court of Appeals for the Eighth Circuit, sitting by designation.

[2] A photo of the Batmobile depicted in the 1966 television series, as well as a photo of Towle's replica of this Batmobile, can be found in Appendix A.

[3] A photo of the Batmobile depicted in the 1989 motion picture, as well as a photo of Towle's replica of this Batmobile, can be found in Appendix B.

[4] DC clearly asserted in both its original and amended complaint that the Batmobile in all of its forms, including the 1966 television program and 1989 motion picture, is copyrightable subject matter owned by DC. We thus reject Towle's argument that DC has failed to identify the copyrights at issue in this case.

[5] The district court also concluded, in the alternative, that the 1966 and 1989 Batmobiles were entitled to copyright protection as a sculptural work under 17 U.S.C. § 102(a)(5). Because we agree that the Batmobile is a character entitled to copyright protection, we need not reach this issue.

[6] We later indicated that the analysis in Warner Bros. Pictures, Inc. v. Columbia Broad Syst., Inc., regarding the noncopyrightability of literary characters was dicta or an alternative holding. See Walt Disney Productions, 581 F.2d at 755 n.10; see also Olson v. National Broadcasting Co., 855 F.2d 1446, 1452 n.6 (9th Cir. 1988) (same).

[7] This episode causes Robin to exclaim "Whee! The Batplane couldn't do better!"

[8] Towle submitted a chart to the district court setting forth these features.

[9] Indeed, DC expressly retained all rights not specifically granted to the licensees, including the merchandising rights to all of if its characters in both the 1965 ABC Agreement and the 1979 BPI Agreement. See supra, at 5, 6. As a result, DC retained the exclusive right to produce threedimensional expressions of the Batmobile character. See Durham Indus., 630 F.2d at 909; see also Halicki, 547 F.3d at 1218, 1223-24 (concluding that because a party retained the exclusive merchandising rights in a derivative work, she could assert a claim for copyright infringement against a party producing "vehicles resembling the 1967 Shelby GT-500 `Eleanor' character that appeared in the Remake" Gone in Sixty Seconds).

[10] Because DC retains its copyright in the underlying Batmobile character, we also reject Towle's argument that the version of the Batmobile that appeared in the 1966 and 1989 productions cannot be copyrighted because the third party producers of these vehicles obtained a design patent on these works. These creators could obtain protection only for the original, independently copyrightable aspects of their work. Parts Geek, 692 F.3d at 1016. In any event, parties may now obtain both a design patent and a copyright in a work. See Registrability of Pictorial, Graphic, or Sculptural Works Where a Design Patent Has Been Issued, 60 Fed. Reg. 15605-01, 15605 (March 24, 1995).

4.1.3 Additional Readings 4.1.3 Additional Readings

4.1.3.1 Anderson v. Stallone 4.1.3.1 Anderson v. Stallone

11 U.S.P.Q.2d 1161 (1989)

Timothy Burton ANDERSON
v.
Sylvester STALLONE, Freddie Fields, Dean Stolber, Frank Yablans, and MGM/UA.
Sylvester STALLONE, counterclaimant,
v.
Timothy Burton ANDERSON, counterdefendant.

No. 87–0592 WDKGX.

United States District Court, C.D. California.

April 25, 1989.

Order Re Defendants' Motion for Summary Judgment

KELLER, District Judge:

This matter came before the Court on the Motion for Summary Judgment of defendants Sylvester Stallone, Freddie Fields, Dean Stolber and MGM/UA Communications Co. Having reviewed the materials submitted and the arguments of counsel, the Court hereby ORDERS the Motion GRANTED IN PART and DENIED IN PART. The plaintiff's First Count, for copyright infringement, is dismissed with prejudice. The plaintiff's Sixth and Tenth Counts for unfair competition and unjust enrichment are also dismissed with prejudice as is the breach of confidence claim in Count Twelve. The Motion is DENIED as to all other counts.

Factual Background

The movies Rocky I, II, and III were extremely successful motion pictures. Sylvester Stallone wrote each script and played the role of Rocky Balboa, the dominant character in each of the movies. In May of 1982, while on a promotional tour for the movie Rocky III, Stallone informed members of the press of his ideas for Rocky IV. Although Stallone's description of his ideas would vary slightly in each of the press conferences, he would generally describe his ideas as follows:

I'd do it [Rocky IV] if Rocky himself could step out a bit. Maybe tackle world problems.... So what would happen, say, if Russia allowed her boxers to enter the professional ranks? Say Rocky is the United States' representative and the White House wants him to fight with the Russians before the Olympics. It's in Russia with everything against him. It's a giant stadium in Moscow and everything is Russian Red. It's a fight of astounding proportions with 50 monitors sent to 50 countries. It's the World Cup—a war between 2 countries.

Waco Tribune Herald, May 28, 1982; Section D, pg. 1 (EX 168). In June of 1982, after viewing the movie Rocky III, Timothy Anderson wrote a thirty-one page treatment entitled "Rocky IV" that he hoped would be used by Stallone and MGM®UA Communications Co. (hereinafter "MGM") as a sequel to Rocky III. The treatment incorporated the characters created by Stallone in his prior movies and cited Stallone as a co-author.

In October of 1982, Mr. Anderson met with Art Linkletter, who was a member of MGM's board of directors. Mr. Linkletter set up a meeting on October 11, 1982, between Mr. Anderson and Mr. Fields, who was president of MGM at the time. Mr. Linkletter was also present at this October 11, 1982 meeting. During the meeting, the parties discussed the possibility that plaintiff's treatment would be used by defendants as the script for Rocky IV. At the suggestion of Mr. Fields, the plaintiff, who is a lawyer and was accompanied by a lawyer at the meeting, signed a release that purported to relieve MGM from liability stemming from use of the treatment. Plaintiff alleges that Mr. Fields told him and his attorney that "if they [MGM & Stallone] use his stuff [Anderson's treatment] it will be big money, big bucks for Tim." Anderson Depo. at 89–90, 106, 108–109.

On April 22, 1984, Anderson's attorney wrote MGM requesting compensation for the alleged use of his treatment in the forthcoming Rocky IV movie. On July 12, 1984, Stallone described his plans for the Rocky IV script on the Today Show before a national television audience. Anderson, in his deposition, states that his parents and friends called him to tell him that Stallone was telling "his story" on television. Anderson Depo. at pgs. 189–190. In a diary entry of July 12, 1984, Anderson noted that Stallone "explained my story" on national television. Deposition of Timothy Anderson, Exhibit 140.

Stallone completed his Rocky IV script in October of 1984. Rocky IV was released in November of 1985. The complaint in this action was filed on January 29, 1987.

Conclusions of Law

I. This Court Cannot Rule As A Matter Of Law That Anderson's Contract Claims Are Barred By The Statute of Limitations.

Anderson's causes of action for breach of oral contract, breach of implied-in-fact contract, and tortious breach of implied covenant of good faith and fair dealing fall under California's two year statute of limitations for oral contracts. Cal.Civ.Proc.Code § 339(1) (West 1988); Thompson v. California Brewing Co., 12 Cal.Rptr. 783 (1961); 3 B. WITKIN, CALIFORNIA PROCEDURE, §§ 369, 438–39, pgs. 397, 468–70 (3rd Ed.1985). For each action, the statute of limitations begins to run on the date that the underlying cause of action accrues. A cause of action accrues when the defendant commits the act—in this case, when he breaches the contract—which gives rise to his obligation or liability. 3 B. WITKIN, CALIFORNIA PROCEDURE, § 351, pg. 389 (3rd Ed.1985).

Defendants assert that as a matter of law, plaintiff's contract claims accrued when Stallone completed the Rocky IV script in October of 1984. If the defendants are correct, the contract claims that were filed in January of 1987 would be time barred under section 339(1). Plaintiff contends that his contract claims did not accrue until the Rocky IV movie was released in November of 1985. Under this version of the facts, the contract actions are not time barred. Both sides erroneously assume that this determination can properly be made at the summary judgment stage.

Professor Nimmer raised and answered the exact question which is before this Court. He wrote in his treatise:

[t]here will be no breach until such time as defendant uses the idea without plaintiff's consent.

The further question arises as to what acts by the defendant constitute a "use" of the plaintiff's idea such as to satisfy the condition precedent to the defendant's obligation to pay.... Does the mere writing of a script which embodies the plaintiff's idea amount to such a "use" or does the production of a motion picture based upon such script amount to such a "use"?.... The question is ultimately one of fact, since it is open to the parties in making a contract to define "use" as they will.

(emphasis added) 3 M. Nimmer, NIMMER ON COPYRIGHT, 16.05[F] at 16:43–16:44 (1988).

Professor Nimmer's analysis is very instructive when, as here, a court is being asked at the summary judgment stage to determine when the statute begins to run.

Defendants rely on Thompson v. California Brewing Co., 12 Cal.Rptr. 783 (1961), for the proposition that public policy dictates that the first use of an idea triggers the statute of limitations. However, the Court in Thompson concluded that the first use by defendants of plaintiff's marketing ideas was a breach of the contract that triggered the statute of limitation only after finding there "was no evidence from which it can be inferred or implied that the claimed free test period was part of the contract". Thompson, 12 Cal.Rptr. 784–85.Thus, the Court in Thompson relied on uncontroverted evidence that the terms of the agreement in question contemplated payment upon the first use of the marketing ideas. In contrast, the terms of the agreement which is the subject of dispute in this action is (are) far from uncontroverted. Mr. Anderson states in a declaration that Mr. Fields told him "that if MGM released a Rocky IV movie incorporating my treatment, I would receive compensation...." Anderson Declaration, pg. 1, ¶ 3. According to Anderson, no payment was due under the contract terms unless the movie Rocky IV was released. On the other hand, defendants' claim that the wording of demand letters sent by the plaintiff before the release of the Rocky IV movie conclusively show that Anderson expected payment regardless of whether Rocky IV was released. Therefore, there is a genuine dispute involving a material fact, namely, the terms of the contract.

Simply put, the date of accrual will be determined by the terms of the contract. If Anderson and Fields agreed that Anderson was to be paid only if Rocky IV was released, then the contract causes of actions would accrue when Rocky IV was released in November of 1985. If Anderson and Fields agreed that Anderson would be compensated for any use of his script, than Anderson's cause of action would accrue when Stallone allegedly incorporated Anderson's treatment into his script in October of 1984. This dispute over the terms of the contract precludes the Court from granting summary judgment on the issue of whether the contract actions are time barred.

II. Anderson's Breach of Confidence Claim Is Barred By The Statute of Limitations

In Count Twelve of his complaint, Anderson claims that the defendants committed a breach of confidence by revealing the contents of his script. In Davies v. Krasna, 121 Cal.Rptr. 705 (1975), the California Supreme Court set forth the requirements for a breach of confidence claim. The Court held that "an action for breach of confidence ... arises whenever an idea, offered and received in confidence is later disclosed without permission." Id. at 710. Davies also held that a breach of confidence claim is governed by the two year statute of limitation period set forth in Cal.Civ.Proc.Code § 339. Id. at 711.

It is uncontroverted that on July 12, 1984, Stallone described ideas for a Rocky IV script on the Today Show before a national television audience. This interview included a description by Stallone of the East/West confrontation theme for Rocky IV. In his deposition, Anderson claims that Stallone was revealing "his story" on national television. Anderson Depo. at pgs. 189–190. On July 12, 1984, Anderson also noted in his diary that Stallone had explained his story. Stallone did not have Anderson's permission to disclose the ideas in Anderson's treatment. If, as Anderson alleges, Stallone did take Anderson's ideas, the breach of confidence occurred on July 12, 1984. This action was filed in January of 1987. The breach of confidence claim was not filed within the two year statute of limitations and is time barred.

Plaintiff argues that the statute should not begin to run until the release of Rocky IV since he suffered no appreciable harm until that time. This argument was considered and rejected in Davies. There, in an analogous fact situation, the court held that a disclosure of ideas would destroy marketability of a story and cause actual damage to an author and would immediately trigger the running of the statute of limitations. Davies, 121 Cal.Rptr. 711–12 The same impact on marketability occurred here. Anderson's ideas for an East/West boxing confrontation were revealed to millions of people on July 12, 1984. His ideas then entered the public domain and could be used and developed by others without payment to him. If his allegations are true, he suffered an injury the moment his ideas were disclosed without permission. See 3 B. WITKIN, CALIFORNIA PROCEDURE, § 358, pg. 386–88 (3rd Ed.1985).

Plaintiff also argues that even if the marketability of his ideas was impacted on July 12, 1984, the amount of damages he suffered was too uncertain to warrant the running of the statute of limitations. The court in Davies explicitly held, contrary to plaintiff's contentions here, "neither uncertainty as to the amount of damages nor difficulty in proving damages tolls the period of limitations." 121 Cal.Rptr. at 713. The holding in Davies also comports with common sense, as adoption of a "certainty" requirement for the running of a statute would create chaos as courts attempted to determine on what date a plaintiff knew or should have known the extent of his damages. Anderson's action accrued at the moment of disclosure on July 12, 1984, and there are no facts before this Court that warrant a tolling of the statute. Thus, Anderson's breach of confidence claim is time barred.

III. Plaintiff's Unjust Enrichment And Unfair Competition Claims Are Preempted By Federal Copyright Law

On July 20, 1987, this Court denied defendants' motion to dismiss plaintiff's unjust enrichment claim, finding that it was not preempted by federal law. However, unbeknownst to the parties and this Court, on June 23, 1987, the Ninth Circuit held that the plaintiff's unjust enrichment claim was subject to preemption. Del Madera Properties v. Rhodes & Gardner, 820 F.2d 973 (9th Cir.1987) (The court held that plaintiff's unjust enrichment claim based on an unauthorized use of a copyrighted master plan map was preempted by federal copyright law.) In the same case, the Ninth Circuit also held that the plaintiff's unfair competition claim was preempted. Del Madera, 820 F.2d at 977.

Surprisingly, Del Madera appears to be a case of first impression in this circuit on the issue of preemption of unjust enrichment and unfair competition claims by federal copyright law. However, as shown below, the opinion comports with the test for determining whether a cause of action is preempted by federal copyright law under 17 U.S.C. § 301(b) (West 1977).

Section 301 of the federal copyright statute sets forth a two-part test for determining whether a claim based on state law is preempted by federal copyright law. First, the work on which the state claim is based must be within the subject matter of copyright. 17 U.S.C. 301(b)(1). Second, the state cause of action must protect rights that are qualitatively equivalent to copyright protection. 17 U.S.C. 301(b)(3). Under the second prong, courts focus on whether the state claim has an "extra element" that differentiates the state action from the rights protected by federal copyright law. See Harper & Row Publishers, Inc. v. Nation Enterprises 723 F.2d 195, 200 (2nd Cir.1983), rev'd on other grounds, 471 U.S. 539 (1985).

Under this test, both Anderson's unjust enrichment and unfair trade practice claims are preempted. Both actions are grounded on the defendants' alleged use of a written script. This clearly satisfies the first prong of the test as Anderson's written work of authorship is within the subject matter of copyright. 17 U.S.C. § 102. Under the second prong, the defendants allegedly copied and incorporated Anderson's work into their own script without permission. The federal copyright laws explicitly protect Anderson's treatment from the copying that forms the basis for these state causes of action. 17 U.S.C. §§ 106(1) & (2). There is no "extra element" such as fraud or palming off to save the unfair competition and unjust enrichment claims from preemption. See Ronald Litoff, Ltd. v. American Express Corp., 621 F.Supp. 981, 984–85 (D.C.N.Y.1985).

Plaintiff's original opposition to the defendant's motion to dismiss the unjust enrichment claims raised two arguments that warrant discussion by the Court. First, plaintiff argued that portions of his script taken unjustly may not raise to the level of an infringement under copyright laws, but would still constitute unjust enrichment. However, under the preemption test set forth in section 301(b)(1), if the subject matter as a whole falls within federal copyright law, then a plaintiff may not avoid preemption by claiming that the copying, while permissible under the federal laws, would violate an equivalent state law.

Plaintiff can only avoid preemption of his state law claims that fall within the subject matter of copyright if these claims involve a "qualitatively" different right, not a "quantitatively" different right. As the Second Circuit opined in Harper & Row in finding that state claims for both conversion and tortious interference with contractual rights were preempted:

The fact that portions of the Ford memoirs may consist of uncopyrightable material ... does not take the work as a whole outside the subject matter protected by the Act. (citations omitted) Were this not so, states would be free to expand the perimeters of copyright protection to their own liking, on the theory that preemption would be no bar to state protection of material not meeting federal statutory standards. That interpretation would run directly afoul of one of the Act's central purposes, to "avoid the development of any vague borderline areas between State and Federal protection." (citations omitted)

Harper & Row, 723 F.2d 195, 200.

Plaintiff's argument is rejected implicitly by the Ninth Circuit in Del Madera; in the language of Section 301(b)(3); and in the thorough reasoning of the Second Circuit in Harper & Row.

Second, plaintiff argues that his unjust enrichment claim should not be preempted because it is equivalent to an action for breach of confidence that is not preempted. However, there is an "extra element" of a confidential relationship in a breach of confidence claim that differentiates it from an unjust enrichment claim and prevents preemption under Section 301(b)(3). As other courts have noted, a breach of confidence claim is "nonequivalent to the rights one can acquire under copyright law; rather it rests on an obligation not to disclose to third parties ideas revealed in confidence...." Smith v. Weinstein, 578 F.Supp. 1297, 1307 (S.D.N.Y.1984). Plaintiff's unjust enrichment and unfair competition claims do not incorporate any such "nonequivalent" right and are preempted by federal copyright law.

IV. Defendants Are Entitled To Summary Judgment On Anderson's Copyright Infringement Claims

This Court finds that the defendants are entitled to summary judgment on plaintiff's copyright infringement claims on two separate grounds. First, Anderson's treatment is an infringing work that is not entitled to copyright protection. Second, Rocky IV is not substantially similar to Anderson's treatment, and no reasonable jury could find that Rocky IV is a picturization of Anderson's script.

A. Defendants Are Entitled To Summary Judgment Because Anderson's Treatment Is An Infringing Work That Is Not Entitled To Copyright Protection

The Court finds that Anderson's treatment is not entitled to copyright protection. This finding is based upon the following determinations that will be delineated further below: (a) the Rocky characters developed in Rocky I, II and III constitute expression protected by copyright independent from the story in which they are contained; (b) Anderson's treatment appropriated these characters and created a derivative work based upon these characters without Stallone's permission in violation of Section 106(2); (c) no part of Anderson's treatment is entitled to copyright protection as his work is pervaded by the characters of the first three Rocky movies that are afforded copyright protection.

1. Visually Depicted Characters Can Be Granted Copyright Protection

The precise legal standard this Court should apply in determining when a character may be afforded copyright protection is fraught with uncertainty. The Second Circuit has followed Judge Learned Hand's opinion in Nichols v. Universal Pictures, 45 F.2d 119 (2d.Cir.1930),cert. denied, 282 U.S. 902 (1931). Judge Hand set forth a test, simple in theory but elusive in application, to determine when a character should be granted copyright protection. Essentially, under this test, copyright protection is granted to a character if it is developed with enough specificity so as to constitute protectable expression. Id. at 121.

This circuit originally created a more rigorous test for granting copyright protection to characters. In Warner Bros. Pictures, Inc. v. Columbia Broadcasting System, Inc., (hereinafter the "Sam Spade" opinion) this circuit held that the literary character Sam Spade was not copyrightable, opining that a character could not be granted copyright protection unless it "constituted the story being told". 216 F.2d 945, 950 (9th Cir.1954). The Sam Spade case has not been explicitly overruled by this circuit and its requirement that a character "constitute the story being told" appears to greatly circumscribe the protection of characters in this circuit.

Subsequent decisions in the Ninth Circuit cast doubt on the reasoning and implicitly limit the holding of the Sam Spade case. In Walt Disney Productions v. Air Pirates, this circuit held that several Disney comic characters were protected by copyright. 581 F.2d 751, 755 (9th Cir.1978). In doing so the Court of Appeals reasoned that because "comic book characters ... are distinguishable from literary characters, the Warner Bros language does not preclude protection of Disney's characters." Id. Air Pirates can be interpreted as either attempting to harmonize granting copyright protection to graphic characters with the "story being told" test enunciated in the Sam Spade case or narrowing the "story being told" test to characters in literary works. If Air Pirates is construed as holding that the graphic characters in question constituted the story being told, it does little to alter the Sam Spade opinion. However, it is equally as plausible to interpret Air Pirates as applying a less stringent test for protectability of graphic characters.

Professor Nimmer has adopted the latter reading as he interprets Air Pirates as limiting the story being told requirement to word portraits. 1 M. Nimmer, THE LAW OF COPYRIGHT, § 2–12, pg. 2–176 (1988). Further, Professor Nimmer finds that the reasoning of the Sam Spade case is undermined by the Air Pirates opinion, even as it relates to word portraits. Id. This is true because the use of a less stringent test for protection of characters in the graphic medium casts doubt on the vitality of the more stringent story being told test for graphic characters. As a practical matter, a graphically depicted character is much more likely than a literary character to be fleshed out in sufficient detail so as to warrant copyright protection. But this fact does not warrant the creation of separate analytical paradigms for protection of characters in the two mediums.

This circuit's most recent decision on the issue of copyrightability of characters, Olson v. National Broadcasting Corporation, 855 F.2d 1446 (9th Cir.1988) does little to clarify the uncertainties in this circuit as to how the Air Pirates decision affects the continued viability of the Sam Spade test. In Olson, the Court of Appeals cited with approval the Sam Spade "story being told test" and declined to characterize this language as dicta. Id. at 1451–52 n. 6. The Court then cited Air Pirates along with Second Circuit precedent and "recognize[d] that cases subsequent to Warner Bros [Sam Spade] have allowed copyright protection for characters who are especially distinctive." Id. at 1452. Olson also stated definitively that "copyright protection may be afforded to characters visually depicted in a television series or in a movie." Id. But later in the opinion, the court in Olson distanced itself from the character delineation test that these cases employed, referring to it as "the more lenient standards adopted elsewhere". Id.

In an implicit acknowledgment of the unsettled state of the law, in considering the characters at issue in Olson, the circuit court evaluates the characters in the suit under both tests. Id. at 1452–53.

2. The Rocky Characters Are Entitled To Copyright Protection As A Matter Of Law

Olson's evaluation of literary characters is clearly distinguishable from the visually depicted characters of the first three Rocky movies for which the defendant seeks protection here. Thus, the more restrictive "story being told test" is inapplicable to the facts of this case.Air Pirates, 581 F.2d at 755, 1 M. Nimmer, § 2–12, pg 2–176. However, out of an abundance of caution this Court will determine the protectability of the Rocky characters under both tests. As shown below, the Rocky characters are protected from bodily appropriation under either standard.

The Rocky characters are one of the most highly delineated group of characters in modern American cinema. The physical and emotional characteristics of Rocky Balboa and the other characters were set forth in tremendous detail in three Rocky movies before Anderson appropriated the characters for his treatment. The interrelationships and development of Rocky, Adrian, Apollo Creed, Clubber Lang, and Paulie are central to all three movies. Rock Balboa is such a highly delineated character that his name is the title of all four of the Rocky movies and his character has become identified with specific character traits ranging from his speaking mannerisms to his physical characteristics. This Court has no difficulty ruling as a matter of law that the Rocky characters are delineated so extensively that they are protected from bodily appropriation when taken as a group and transposed into a sequel by another author. Plaintiff has not and cannot put before this Court any evidence to rebut the defendants' showing that Rocky characters are so highly delineated that they warrant copyright protection.

Plaintiff's unsupported assertions that Rocky is merely a stock character, made in the face of voluminous evidence that the Rocky characters are copyrightable, do not bar this Court from granting summary judgment on this issue. See Anderson v. Liberty Lobby, 477 U.S. 242, 247–48 (1986) ("the mere existence of some alleged factual dispute between the parties will not defeat an otherwise properly supported motion for summary judgment; the requirement is that there be no genuine issue of material fact.") (emphasis in original). If any group of movie characters is protected by copyright, surely the Rocky characters are protected from bodily appropriation into a sequel which merely builds on the relationships and characteristics which these characters developed in the first three Rocky movies. No reasonable jury could find otherwise.

This Court need not and does not reach the issue of whether any single character alone, apart from Rocky, is delineated with enough specificity so as to garner copyright protection. Nor does the Court reach the issue of whether these characters are protected from less than bodily appropriation. See 1 M. Nimmer, § 2.12, pg. 2–171 (copyrightability of characters is "more properly framed as relating to the degree of substantial similarity required to constitute infringement rather than in terms of copyrightability per se").

This Court also finds that the Rocky characters were so highly developed and central to the three movies made before Anderson's treatment that they "constituted the story being told". All three Rocky movies focused on the development and relationships of the various characters. The movies did not revolve around intricate plots or story lines. Instead, the focus of these movies was the development of the Rocky characters. The same evidence which supports the finding of delineation above is so extensive that it also warrants a finding that the Rocky characters—Rocky, Adrian, Apollo Creed, Clubber Lang, and Paulie—"constituted the story being told" in the first three Rocky movies.

3. Anderson's Work is An Unauthorized Derivative Work

Under 17 U.S.C. section 106(2), the holder of a copyright has the exclusive right to prepare derivative works based upon his copyrighted work. In this circuit a work is derivative "only if it would be considered an infringing work if the material which it had derived from a prior work had been taken without the consent of the copyright proprietor of the prior work." Litchfield v. Spielberg, 736 F.2d 1352, 1354 (9th Cir.1984) (emphasis in original), citing United States v. Taxe, 540 F.2d 961, 965 n. 2 (9th Cir.1976). This Court must now examine whether Anderson's treatment is an unauthorized derivative work under this standard.

Usually a court would be required to undertake the extensive comparisons under the Krofft substantial similarity test to determine whether Anderson's work is a derivative work. See 1 M. Nimmer, § 3.01 at 3–3; pgs. 25–28 supra. However, in this case, Anderson has bodily appropriated the Rocky characters in his treatment. This Court need not determine whether the characters in Anderson's treatment are substantially similar to Stallone's characters, as it is uncontroverted that the characters were lifted lock, stock, and barrel from the prior Rocky movies. Anderson retained the names, relationships and built on the experiences of these characters from the three prior Rocky movies. 1 M. Nimmer, § 2.12 at 2–177 (copying names of characters is highly probative evidence of infringement). His characters are not merely substantially similar to Stallone's, they are Stallone's characters. As Professor Nimmer stated, "Where there is literal similarity.... [i]t is not necessary to determine the level of abstraction at which similarity ceases to consist of an 'expression of ideas' since literal similarity by definition is always a similarity as to the expression of ideas." 3 M. Nimmer, § 13.03[3], pg. 13–35. Anderson's bodily appropriation of these characters infringes upon the protected expression in the Rocky characters and renders his work an unauthorized derivative work. 1 Nimmer, § 2.12 at 2–171. By bodily appropriating the significant elements of protected expression in the Rocky characters, Anderson has copied protected expression and his treatment infringes on Stallone's copyrighted work.

4. Since Anderson's Work Is An Unauthorized Derivative Work, No Part Of The Treatment Can Be Granted Copyright Protection

Stallone owns the copyrights for the first three Rocky movies. Under 17 U.S.C. section 106(2), he has the exclusive right to prepare derivative works based on these copyrighted works. This Court has determined that Anderson's treatment is an unauthorized derivative work. Thus, Anderson has infringed upon Stallone's copyright. See 17 U.S.C. section 501(a).

Nevertheless, plaintiff contends that his infringing work is entitled to copyright protection and he can sue Stallone for infringing upon his treatment. Plaintiff relies upon 17 U.S.C. section 103(a) as support for his position that he is entitled to copyright protection for the non-infringing portions of his treatment. 17 U.S.C. section 103(a) reads:

The subject matter of copyright as specified by section 102 includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which the material has been used unlawfully.

Plaintiff has not argued that section 103(a), on its face, requires that an infringer be granted copyright protection for the non-infringing portions of his work. He has not and cannot provide this Court with a single case that has held that an infringer of a copyright is entitled to sue a third party for infringing the original portions of his work. Nor can he provide a single case that stands for the extraordinary proposition he proposes here, namely, allowing a plaintiff to sue the party whose work he has infringed upon for infringement of his infringing derivative work.

Instead, Anderson alleges that the House Report on section 103(a) indicates that Congress intended protection for the non-infringing portions of derivative works such as his treatment. The House Report for section 103(a) first delineates the differences between compilations and derivative works. H.R. No. 1476, 94th Cong., 2d Sess. at 57–58 (1976). The House Report then reads as follows:

The second part of the sentence that makes up section 103(a) [subsec. (a) of this section] deals with the status of a compilation or derivative work unlawfully employing preexisting copyrighted material. In providing that protection does not extend to "any part of the work in which such material has been used unlawfully," the bill prevents an infringer from benefiting, through copyright protection, from committing an unlawful act, but preserves protection for those parts of the work that do not employ the preexisting work. Thus, an unauthorized translation of a novel could not be copyrighted at all, but the owner of copyright in an anthology of poetry could sue someone who infringed the whole anthology, even though the infringer proves that publication of one of the poems was unauthorized.

The Court recognizes that the House Report language is muddled. It makes a general statement that non-infringing portions of a work should be granted protection if these portions do not employ the pre-existing work. The report then provides two examples: one involving a compilation where the non-infringing portion was deemed protected, and another involving a derivative work where no part of the work could be protected. The general statement, when taken in the context of the comparison of compilations and derivative works in the section and the two examples given, is best understood as applying only to compilations. Although it is not crystal clear, it appears that the Committee assumed that in a derivative work the underlying work is "employed" throughout.

Professor Nimmer also interprets the House Report language as generally denying copyright protection to any portion of an unauthorized derivative work. After setting forth some of the language from the House Report regarding section 103(a) he states,

the effect [of section 103(a) ] generally would be to deny copyright to derivative works, in which the pre-existing work tends to pervade the entire derivative work, but not to collective works, where the infringement arises from the copying of the selection and arrangement of a number of pre-existing works, and not per se from the reproduction of any particular prior work.

1 M. Nimmer, § 3.06, pgs. 3–22.3 thru 3–22.4.

Like the House Report, Nimmer also preceded his conclusion that no part of derivative work unlawfully employing preexisting material should be copyrightable with a general statement that "only that portion of a derivative or collective work which employs the pre-existing work would be denied copyright". 1 M. Nimmer, § 3.06, pg. 3–22.3. At first blush, both Nimmer's and the Committee's language are internally inconsistent. Both start with a general proposition that only the portion of a work which unlawfully employs the prior work should be denied copyright protection. Both then appear to conclude that no part of an infringing derivative work should be granted copyright protection. Only if a derivative work is assumed to employ the infringing work throughout do these passages read coherently.

The case law interpreting section 103(a) also supports the conclusion that generally no part of an infringing derivative work should be granted copyright protection. In Eden Toys, Inc. v. Florelee Undergarment Co., the circuit court dealt primarily with the question of whether an authorized derivative work contained sufficient originality to gain copyright protection. 697 F.2d 27, 34–35 (2d.Cir.1982). However, in dicta the court opined on what result would be warranted if the derivative work had been made without the permission of the original author. The Court cited to the aforementioned passages from Professor Nimmer's treatise and the House Report andassumed without discussion that the "derivative copyrights would be invalid, since the preexisting illustration used without permission would tend to pervade the entire work." Id. at 34 n. 6. In Gracen v. Bradford, the Seventh Circuit also dealt primarily with whether plaintiff's derivative work had sufficient originality to comply with requirements of section 103. 798 F.2d 300, 302–303 (7th Cir.1983).Gracen also discussed the issue of the copyrightability of an unauthorized derivative work. The Court stated "if Miss Gracen had no authority to make derivative works from the movie, she could not copyright the painting and drawings, and she infringed MGM's copyright by displaying them publicly." Id. at 303. Once again, the Circuit court assumed that no part of an unlawful derivative work could be copyrighted.

Plaintiff has written a treatment which is an unauthorized derivative work. This treatment infringes upon Stallone's copyrights and his exclusive right to prepare derivative works which are based upon these movies. 17 U.S.C. § 106(2). Section 103(a) was not intended to arm an infringer and limit the applicability of section 106(2) on unified derivative works. As the House Report and Professor Nimmer's treatise explain, 103(a) was not intended to apply to derivative works and most certainly was not an attempt to modify section 106(2). Section 103(a) allows an author whose authorship essentially is the arrangement or ordering of several independent works to keep the copyright for his arrangement even if one of the underlying works he arranged is found to be used unlawfully. The infringing portion would be easily severable and the scope of the compilation author's own work would be easily ascertainable. Even if this Court were to interpret section 103(a) as allowing an author of an infringing derivative work to sue third parties based on the non-infringing portions of his work, section 106(2) most certainly precludes the author of an unauthorized infringing derivative work from suing the author of the work which he has already infringed. Thus, the Court HOLDS that the defendants are entitled to summary judgment on plaintiff's copyright claims as the plaintiff cannot gain copyright protection for any portion of his work under section 103(a). In addition, Anderson is precluded by section 106(2) from bringing an action for copyright infringement against Stallone and the other defendants.

B. Summary Judgment Is Appropriate On The Copyright Claims Because Rocky IV Is Not Substantially Similar To Anderson's Treatment

1. Legal Framework

To prevail on his claim for copyright infringement, Mr. Anderson must prove that he owns a copyright and his work was copied by the defendant. Sid & Marty Krofft Television v. McDonalds Corp., 562 F.2d 1157, 1162 (9th Cir.1977). Because there is rarely direct evidence that an alleged infringer physically copied a work, a plaintiff need only show that the defendant had access to his work and that the defendant's work is substantially similar to the plaintiff's copyrighted work. Sid & Marty Krofft, 562 F.2d at 1162–63. (As an aside, the Court notes that an alleged infringer also rarely has direct irrefutable evidence—such as Stallone's press conferences describing his ideas of an East/West boxing confrontation before receiving Anderson's script—that he had independently developed the idea which he allegedly copied from the defendant.) This Court has already held that Anderson's work is not entitled to copyright protection. See pgs. 12–24 supra. This finding alone necessitates that the defendants be granted summary judgment on the copyright infringement claims. However, even if this Court were to hold that Anderson's work was entitled to copyright protection, defendants are entitled to summary judgment on the grounds that the defendants did not copy Anderson's work.

In this circuit, there is a two part test for determining whether an allegedly infringing work is substantially similar to the copyright holder's work. The first prong is referred to as the extrinsic test. Under the extrinsic test, analytic dissection and expert testimony are employed to determine whether there is substantial similarity of ideas between the two works in question. Olson, 855 F.2d at 1449.Application of the extrinsic test to analyze whether a movie is substantially similar to a script requires a court to compare the plot, theme, dialogue, mood, setting, pace, sequence of events, and characters of the two works. Berkic v. Crichton, 761 F.2d 1289, 1293 (9th Cir.1985),; Litchfield v. Spielberg, 736 F.2d 1352, 1356–57 (9th Cir.1984). Since the extrinsic test relies on objective analytical criteria, "this question may often be decided as a matter of law." Krofft, 562 F.2d at 1164.

The extrinsic prong of the Krofft test has been expanded by this circuit so that the test actually goes beyond a determination of substantial similarity of ideas. It is true that a theme or mood is merely an idea. However, specific plot sequences, highly delineated characters, and dialogue in a work can often constitute protectable expression. Thus, the Krofft test as applied in Berkic and Litchfieldno longer fits neatly into separate analyses of ideas and expression in two works as the Courts analyzed expression under the extrinsic prong of the test. Berkic, 761 F.2d at 1293–94, Litchfield, 736 F.2d at 1357. In any event, it is the test that this Court applies in determining whether Rocky IV is substantially similar to Anderson's treatment.

The second prong of the Krofft test for substantial similarity is referred to as the intrinsic test. Under the intrinsic test, the plaintiff must show that there is substantial similarity of expression between the two works in question. The intrinsic test is subjective and is based on the response of the audience to the look and feel of the two works. In this case, the intrinsic test requires a determination of whether the ordinary reasonable audience could recognize the movie Rocky IV as a dramatization or picturization of Mr. Anderson's work. Berkic,761 F.2d at 1292; Litchfield, 736 F.2d at 1357.

At the summary judgment stage, Anderson must establish that a triable issue of fact remains as to whether there is substantial similarity of both ideas and expression. Berkic, 761 F.2d at 1292. This Court is cognizant that summary judgment is not favored where there are disputable factual issues that are best left to a jury. This problem is greatest when the Court puts itself in the place of the reasonable audience and evaluates the total look and feel of a work under the intrinsic test. However, to grant summary judgment, this Court need only find, after analyzing the two works under the objective factors which comprise the extrinsic test, that there is no substantial similarity under the extrinsic prong of the substantial similarity test of this circuit. Plaintiff can only prevail on his infringement claim if he shows that there is substantial similarity of both ideas and expression. Berkic, 761 F.2d at 1292, Litchfield, 736 F.2d at 1356, Krofft, 562 F.2d at 1164.

This circuit has upheld grants of summary judgment on the issue of substantial similarity when the plaintiff's claims were much stronger than those before this Court. Berkic, 761 F.2d 1289 (Ninth Circuit affirmed grant of summary judgment in favor of defendant on issue of substantial similarity of the movie Coma and plaintiff's treatment although the court recognized that similarities existed between the works); Litchfield, 736 F.2d 1352 (Ninth Circuit affirmed grant of summary judgment in favor of defendant on issue of substantial similarity between the movie E.T. and plaintiff's play in spite of character and plot similarities); See v. Durang, 711 F.2d 141 (9th Cir.1983) (Ninth Circuit affirmed grant of summary judgment for defendant on copyright infringement claim, even thought it did find that the two plays shared common ideas).

This circuit has also eliminated certain portions of works from evaluation under the substantial similarity test. For example, "all situations which flow naturally from a basic plot premise, so called 'scenes a faire,' " are not protected against copying. Berkic, 761 F.2d at 1293.For example, any boxing movie, regardless of the source, will contain fight scenes. It is also natural for any boxing movie, regardless of the source, to depict the fighters training and preparing for fights.

Nor do general plot themes or ideas receive any copyright protection. Id. Nationalistic themes and themes, extolling the virtues of the underdog are not protectable expression. Likewise, a basic idea such as a symbolic struggle between a Russian and an American are not protectable by copyright and are part of the general domain of ideas.

The unusual circumstances of this case also distinguish it from other infringement cases and make a finding of non-infringement appropriate. The first three Rocky movies were made before Anderson wrote his treatment. Plaintiff concedes that he wrote his sequel after viewing the movies. Thus, Anderson is precluded from basing any inference of copying by Stallone in Rocky IV from similarities that flow naturally from the fact that both works are sequels to the first three movies. Second, it is uncontroverted that Stallone had already developed the idea that Rocky IV would center around a symbolic boxing confrontation between the United States and Russia before he knew that plaintiff's treatment existed. Thus, any similarity in the two works based on this symbolic confrontation cannot give rise to an inference that Stallone appropriated this idea from Anderson. Third, it is uncontroverted that it was the defendant, not the plaintiff, who developed the majority of characters in plaintiff's work. These include: Rocky, Adrian (Rocky's wife), Rocky, Jr. (Rocky's son), Paulie (Rocky's brother-in-law), Apollo Creed, Duke (Creed's manager), and Clubber Lang. Even if a court were to find that these characters were not copyrightable, the fact that they originated with the defendant precludes any finding of similarity based on this common element of the two works.

2. Application Of The Krofft Test

A. Extrinsic Test

The extrinsic test requires a comparison of plot, theme, dialogue, mood, setting, pace, sequence, and characters.

i. Plot—Rocky IV

In Rocky IV, Ivan Drago, a Russian fighter, arrives in the United States. Drago and his wife hold a press conference where she announces that Drago wants to fight professionally in the United States and would like to fight Rocky Balboa, the retired world boxing champion. Rocky is a wealthy ex-boxer and he declines to fight the dangerous Drago. However, Rocky's friend, Apollo Creed, wants to come out of retirement to fight Drago. Rocky, fearing for Apollo's health, unsuccessfully tries to talk Apollo out of fighting Drago. Apollo fights Drago in Las Vegas in a circus-like setting. Rocky is in Apollo's corner during the fight. Apollo refuses to stop fighting, even though Drago is injuring him during the early rounds of the fight. Drago strikes Apollo after the bell with a vicious blow and kills him. Rocky gives the eulogy at Apollo's funeral.

A fight between Rocky and Drago is announced. The fight is a non-sanctioned fight and Rocky will be forced to give up his title to fight Drago. Rocky will not take any prize money for the fight. Drago will not fight in the United States as he fears for his safety after killing Apollo. The fight will be held in Russia on Christmas day. Soviet officials describe the fight as a test of the systems of the two countries. Rocky's wife disapproves of the fight and is extremely upset over the news of the fight.

Rocky travels to Siberia to train in isolated surroundings. He is accompanied by Paulie, Duke, and two Soviet observers. Adrian also comes to Siberia where they reconcile their differences. Rocky trains by chopping wood, pulling sleds, running up mountains, shadow boxing, and performing other basic exercises. These scenes are juxtaposed with Drago's training. Drago trains in a technologically advanced environment with specialized machines. He trains surrounded by scientific advisors, and it is suggested that he is taking performance enhancing drugs. Drago looks invincible as he appears much larger and stronger than Rocky.

The fight takes place in Moscow. It is a brutal fifteen round fight. Rocky takes a severe beating but refuses to go down. In the fourteenth and fifteenth rounds, the Soviet crowd begins cheering Rocky's heroism. Rocky wins the fight in the fifteenth round and is hoisted up by the crowd. Rocky then gives an impassioned speech that emphasizes that the United States and the Soviet Union are capable of changing and getting along.

The Court also notes that Rocky IV is replete with scenes in which Rocky has flashbacks to the first three Rocky movies.

ii. Anderson's Treatment

Several scenes at the beginning of the treatment chronicle the development from childhood of an East German boxer Adolph Heinemann. He begins boxing in international competition by the age of sixteen. He goes on to capture the gold medal at the 1984 Olympics. Heinemann then fights the heavyweight champion Clubber Lang, at Madison Square Garden. Heinemann defeats Lang in the first round. Rocky and Apollo Creed watch the fight from ringside. They are partners in the fight promotion business.

Heinemann makes several successful defenses of his title in Eastern Europe cities of Leningrad, Moscow, Leipzig, and East Berline. Due to dominance of professional boxing by eastern block fighters, all major fights take place in eastern block countries. Rocky and Apollo continue their fight promotion business. Rocky and Apollo use their own money to finance three days of boxing at Madison Square Garden. They place their fortunes on the line to buy television coverage. The main event pits Clubber Lang against an Irish fighter. There is little interest in the event. Rocky and Apollo go broke. Rocky sells all of his possessions to pay his creditors.

Rocky returns to the "row house apartment of Rocky I". (This setting is appropriated from Stallone's first movie by Anderson) He goes to work in a meat packing plant in Philadelphia. (This portion of the story also borrows heavily from Rocky I.) A Soviet leader gives a speech to the United Nations in New York. He states that the Communist world is prevailing over the West as exemplified by their boxing champion. He refers to Rocky as an old and weak ex-fighter. Upon hearing the speech, Rocky and Apollo become very distraught.

Both Rocky and Apollo, unbeknownst to the other, regroup and begin training in seclusion. Rocky is in Philadelphia and Apollo is in Los Angeles. Thereafter, Rocky and Apollo simultaneously take planes to visit the other and break the news of their respective comebacks.Coincidentally, both are on planes which are stopping over in Chicago. While in one of the terminals at the airport they bump into each other. They decide to begin training together.

Rocky and Apollo return to the "old gym of original movie" (setting and training scenes based upon Rocky I) and devise a secret strategy for Rocky to beat Heinemann. An East German representative to the United Nations informs Rocky that Heinemann will not fight him because he is too old. Rocky and Apollo then go to New York to East Germany's United Nations ambassador. They barge in the office and intimidate the ambassador into calling Heinemann to ask him to fight Rocky. Rocky insults Heinemann and convinces him to agree to a fight.

To raise money for his training, Rocky fights in exhibitions in Europe and South America. He fights in France, England, and Spain. He also trains in a Parisian bordello and a London nunnery. In London, Rocky is approached by CIA agents and followed by KGB officers. The CIA offers to pay Rocky's training expenses and he refuses. Rocky runs through a number of European capitals and ends up at St. Peters Square in Rome on the day the Pope is to appear.

Rocky fights Heinemann at an outdoor stadium one hundred yards east of the Berlin wall. Heinemann originally dominates the fight. However, Rocky makes a heroic comeback and wins the fight when Heinemann refuses to answer the bell in the sixth round. The East German crowd cheers Rocky's victory.

A comparison of the two plots shows that they are dissimilar apart from the East/West boxing confrontation that Stallone, himself, developed. Plaintiff argues that the list of similarities compiled by his expert Michael Roger precludes this Court from granting summary judgment, no matter how dissimilar the plots appear to this Court. However, this circuit has previously held that such lists of random similarities are inherently subjective and unreliable and do not in and of themselves create a material issue of fact. Litchfield, 736 F.2d at 1357. In his declaration, Mr. Rogers states that the plots are similar because in both works a Communist fighter defeats an American and subsequently Rocky defeats the Communist fighter and wins over a Communist crowd. (Rogers Declaration, ¶ 4) However, Rogers' declaration is deficient. As noted previously, Anderson cannot claim that Stallone copied the idea of an East/West boxing confrontation because there is uncontroverted evidence that Stallone developed the idea independently. In addition, the general similarities cited by Rogers between the plots and the themes of the two movies do not create any material fact issue for this Court, as general themes and basic plots are not protected by copyright. Litchfield, 736 F.2d at 1351.52; Jason v. Fonda, 526 F.Supp 774, 777 (C.D.Cal.1981).

Setting

The settings of the two movies are also quite different. In Anderson's treatment Rocky is a promoter in New York. After losing his savings he returns to where he lived in Philadelphia and Apollo returns to a gym in Los Angeles. (These settings in Philadelphia and Los Angeles are used in the first Rocky movies and are evidence that Anderson is copying Stallone's settings from the earlier Rocky movies, not that Stallone is copying the setting from Anderson's treatment.) In Anderson's treatment, Heinemann grows up in East Germany. Rocky trains in France, England, Spain, Germany, and Denmark. Rocky runs through major cities in each of these countries. The settings for his training include a bordello in Paris, a London nunnery, the Eiffel tower, and St. Peters Square. The final fight between Rocky and Heinemann takes place next to the Berlin wall in East Germany.

In Rocky IV, Apollo fights Drago in Las Vegas. Rocky trains in Siberia. The final fight is set in Moscow.

Dialogue

Anderson's treatment contains very little dialogue as the treatment is a brief thirty-one page storyline. In his papers before this Court, Anderson did not claim that Rocky IV contained any dialogue similar to that in his treatment. However, in a "surreply", submitted without authorization by this Court, plaintiff's expert asserted that both works contained a short propaganda speech by a Soviet official which were very similar. This Court did not find a substantial similarity between these two speeches or any portions of the dialogue of the two works.

Themes

A symbolic struggle between the United States and the eastern block is the overriding theme of both movies. Once again, the Court notes that there is uncontroverted evidence that Stallone developed this theme independently. However, unlike Anderson's treatment, Rocky IV ends with a speech in which he emphasizes the theme that the United States and the Soviet Union should attempt to change their adversarial relationship. No such theme of potential resolution of the East/West conflict appears in Anderson's script.

Rocky IV also contains a number of other underlying themes that are not found in Anderson's treatment. In Rocky IV, Rocky fights Drago to exact revenge for Drago's killing of his friend. Also, Stallone emphasizes that Rocky's old fashioned training can succeed against highly sophisticated Soviet athletic training.

Both movies also share a nationalistic theme. However, this nationalistic theme is also emphasized in Rocky I, II, and III and this would be a necessary component of any sequel to the prior Rocky movies.

Sequence

The only similarity in the sequencing of the two works is that both end with Rocky fighting a communist fighter. However, Stallone had originally emphasized that the climax of his movie would be a fight between Rocky and a Russian fighter.

Tone and Mood

Anderson did not claim that the tone and mood of the two movies were similar until this deficiency was pointed out by the defendants and he filed an unauthorized surreply. This Court finds it difficult to determine the tone and mood of Anderson's work due to its brevity and the lack of dialogue. This Court finds the tone and mood of Rocky IV to be very similar to that of the prior Rocky movies developed by Stallone. All of the Rocky movies are nationalistic, upbeat movies laced with occasional bits of humor, and involving Rocky Balboa in some new challenge. Whether these qualities could be extrapolated from Anderson's treatment is of little consequence, as the sequel Rocky IV shares the same tone and mood as the prior Rocky movies that were created by Stallone.

Characters

Rocky IV features the following characters: Rocky, Adrian (Rocky's wife), Rocky, Jr. (Rocky's son), Paulie (Rocky's brother-in-law), Apollo Creed, Duke (Creed's manager), Clubber Lang, Ivan Drago (Soviet boxer), Ludmilla (Drago's wife/spokeswoman), and Nicolai Koloff (Drago's manager).

Anderson's treatment features the following characters: Rocky, Adrian, Rocky, Jr., Paulie, Apollo Creed, Duke, Clubber Lang, Adolph Heinemann (East German boxer), and an unnamed Soviet propaganda expert.

As can be seen from above, the majority of characters used in Anderson's treatment were created by Stallone. As noted throughout this opinion, these characters cannot be the basis for any finding of substantial similarity between Anderson and Stallone's work for purposes of establishing infringement. However, Anderson created two characters in his treatment that serve the same function as two of the characters from Rocky IV. Anderson's Adolph Heinemann and Stallone's Ivan Drago play similar roles as do Anderson's unnamed Soviet progaganda expert and Nicolai Koloff.

Both Heinemann and Drago are large powerful boxers from the eastern block being used as propaganda tools in the boxing arena. Both are bigger than Rocky and favored to win their fights with him. However, this similarity is not a basis for inferring that Stallone copied Anderson's treatment, because in all of Rocky's previous fights he was the underdog to a physically superior opponent. In addition, Stallone's original plot ideas necessitated that he create a Soviet boxer. Heinemann is not described in great detail in Anderson's script although he is referred to as an "Aryan German". In Rocky IV, Drago is blond and has blue eyes.

Likewise, Anderson's unnamed propaganda official is not well developed. In fact, he appears in only two scenes in the treatment. Apparently, this official is the mastermind of the plan to create a Communist world boxing champion. On the other hand, Stallone's Nicolai Koloff is Drago's manager who appears at all the press conferences and is partially responsible for Drago's training. Koloff plays a different and more prominent role than the unnamed propaganda official. In addition, neither Heinemann nor the propaganda official are delineated with greater specificity in Anderson's treatment.

As delineated above, Anderson cannot base a finding of substantial similarity on the characters and themes that Stallone had developed previously. Nor can a finding of substantial similarity be based on the fact that the two works both culminate in a symbolic boxing confrontation between the United States and the Soviet Union. This symbolic confrontation was developed independently by Stallone. When the two works are compared without considering Stallone's own characters and themes, it is abundantly clear that the plot, setting and sequence of events are very dissimilar. Most of the characters in Anderson's works were appropriated from Stallone. The two characters that Anderson created independently, Heinemann and the Soviet propaganda expert, are not highly delineated. Nor are they substantially similar to Drago or Koloff, the two parallel characters in Stallone's treatment. These character similarities cannot be the basis for a finding of substantial similarity. See Olson, 855 F.2d at 1451–53 (Substantial similarity cannot be based on loose similarity between plaintiff's thinly sketched character and defendant's allegedly infringing characters.) Nor can the common ideas and themes that plaintiff alleges to exist between the two works be a basis for a finding of substantial similarity, as these general themes are not protectable expression. Berkic, 761 F.2d at 1293. Based upon an analysis of the objective criteria above, the Court holds that under the extrinsic test the two works are dissimilar.

This Court need not reach the question of whether there is substantial similarity between the two works under the intrinsic test because it has ruled as a matter of law that the two works are dissimilar under the extrinsic prong of this circuit's test for substantial similarity. Berkic, 761 F.2d at 1292; Litchfield, 736 F.2d at 1356; Krofft, 562 F.2d at 1164. This conclusion follows logically as it would be incongruous for a court to find as a matter of law that the two works are based on dissimilar ideas and then find that a material issue of fact remains as to whether the higher threshold of substantial similarity of expression exists between the two works.

B. Intrinsic Test

In any event, the Court finds that no reasonable audience would recognize the movie Rocky IV as a dramatization or picturization of Anderson's work. Under the intrinsic test as well as under the extrinsic test, a finding of substantial similarity cannot be based on unprotectable scenes-a-faire or characters, themes, and plots which Stallone originally created himself. Aliotti v. R. Dakin & Co., 831 F.2d 898, 901 (9th Cir.1987), Berkic, 761 F.2d at 1293. Taking away these portions of Anderson's work, no reasonable jury could find that Rocky IV is a picturization of Anderson's treatment. This necessitates a holding that the two works are dissimilar as a matter of law under the intrinsic test. Berkic, 761 F.2d at 1292, Litchfield, 736 F.2d at 1357.

The Court finds that Rocky IV is not substantially similar to Anderson's work. Nor is any portion of Anderson's work entitled to copyright protection under 17 U.S.C. sections 103(a) & 106(2). The Court GRANTS defendants summary judgment on Anderson's claim that they infringed Anderson's copyright.

IT IS ORDERED

4.1.3.2 Warner Bros. Pictures Inc. v. Columbia Broadcasting System, 216 F.2d 945 (9th Cir. 1954) 4.1.3.2 Warner Bros. Pictures Inc. v. Columbia Broadcasting System, 216 F.2d 945 (9th Cir. 1954)

216 F.2d 945

WARNER BROS. PICTURES, Inc., a Corporation, and Alfred A. Knopf, Inc., a Corporation, Appellants,

v.

COLUMBIA BROADCASTING SYSTEM, Inc., a Corporation; William Spier; The Wildroot Company, Inc., a Corporation; Regis Radio Corporation, William Robert Tallman, Giles B. Doud, Joe Eisinger, Batten, Barton, Durstine & Osborn, Inc., and Dashiell Hammett, Appellees.

No. 13457.

United States Court of Appeals Ninth Circuit.

November 9, 1954.

 

Freston & Files, Ralph E. Lewis, Gordon L. Files, Los Angeles, Cal., for appellants.

Zissu & Marcus, Leonard Zissu, Abraham Marcus, New York City, Laurence Beilenson, William Berger, Beverly Hills, Cal., for appellee Hammett.

Crider, Runkle & Tilson, Los Angeles, Cal., for appellee Columbia Broadcasting Co.

Before STEPHENS and FEE, Circuit Judges, and CLARK, District Judge.

STEPHENS, Circuit Judge.

1

Dashiell Hammett composed a mystery-detective story entitled "The Maltese Falcon" which was published serially, and each installment was copyrighted by the publisher. Subsequently, Alfred A. Knopf, Inc., entered into a contract with the author to publish the work in book form, Knopf published the book and, in accord with the terms of the contract, copyrighted it.

2

In 1930, after publication in book form and after publication of all installments of the first serial thereof, Knopf and Hammett, designated as "Owners", for a consideration of $8,500.00, granted certain defined rights in and to The Maltese Falcon (called "writings" in the agreement) to Warner Bros., as "Purchaser".1 Coincidentally, Knopf executed an instrument to Warner called "Assignment of Copyright"2 for a nominal consideration. The text of the "assignment" shows on its face that it is not an assignment of the copyright but that it is a grant to Warner of specified rights to the use of the writings in The Maltese Falcon. Both the contract between Hammett-Knopf and Warner, and the "assignment" from Knopf, purport to grant to Warner certain defined and detailed exclusive rights to the use of The Maltese Falcon "writings" in moving pictures, radio, and television.

3

By the common law, the author of a writing possesses the sole and exclusive right to publish it, but upon and after the first publication the writing may be published by anyone including the author, since the writing has gone into the public domain. Bobbs-Merrill Co. v. Straus, 1908, 210 U.S. 339, 28 S.Ct. 722, 52 L.Ed. 1086; Bobbs-Merrill Co. v. Straus, 2 Cir., 1908, 147 F. 15, 15 L.R.A., N.S., 766; Harper & Bros. v. M. A. Donohue & Co., C.C. 1905, 144 F. 491. The copyright statute extends the author's sole and exclusive right in accordance with its terms and provisions. Constitution of the United States, Art. I, § 8, Clause 8; Title 17 U.S.C.A.; Bobbs-Merrill Co. v. Straus, 1908, 210 U.S. 339, 28 S.Ct. 722, 52 L.Ed. 1086; Bobbs-Merrill Co. v. Straus, 2 Cir., 1908, 147 F. 15, 15 L.R.A.,N.S., 766. In other words, it reserves the writing from the public domain for the effective period of the copyright. What we have just said is what is meant by courts when they say: "When the copyright comes in, the common law right goes out."

4

No question as to the legality of the copyright on The Maltese Falcon or to its continuing effectiveness through all times in suit, or to its complete beneficial ownership by Hammett and Knopf together, is in issue. Therefore, at the effective moment of the grants by Hammett and Knopf to Warner, the latter became possessed of the sole and exclusive right to the writing which is within the copyright, less all limiting terms of the grants. The grants are limited to defined uses in motion picture, talking pictures, radio, and television.

5

It is claimed by Warner that it acquired the exclusive right to the use of the writing, The Maltese Falcon, including the individual characters and their names, together with the title, "The Maltese Falcon", in motion pictures, radio, and television. The use of the title is not in issue, since the grant to Warner specifically includes it.

6

It is the position of Hammett and the other defendants, all of whom claim some interest under him, that the rights acquired by Warner are those specifically mentioned in the conveying or granting instruments, and that the exclusive right to the use of the characters and/or their names were not mentioned as being granted; that the instruments, properly construed, do not convey any exclusive right to the use of characters with or without names, hence Hammett could use them in other stories. However, if, by reason of the silence in the instruments as to such claimed rights, the instruments should be held to be ambiguous on this point, the custom and practice demonstrate that such rights are not customarily parted with by authors, but that characters which are depicted in one detective story together with their names are customarily retained and used in the intricacies of subsequent but different tales.

7

Hammett did so use the characters with their names and did contract with others for such use. In 1946 he used The Maltese Falcon characters including Sam Spade, the detective and the leading character in the Falcon, by name, and granted to third parties the sole and exclusive right, except their use in the Falcon, to use that character by name (later orally enlarged to include other characters of the Falcon) in radio, television, and motion pictures. Under such claimed rights, radio broadcasts of "Adventures of Sam Spade", including "The Kandy Tooth" were broadcast in weekly half-hour episodes from 1946 to 1950.

8

Warner claims infringement of copyright and "unfair use and competition" by such re-use and, as well, for infringement of parts of the story and the whole of the writing inclusive of characters and their names. Hammett and the other defendants deny infringement or unfair use and competition on any count, and Hammett requests the court to declare his rights in the premises. Knopf is a nominal party asking and claiming nothing, and is made a plaintiff under the right granted Warner in the Hammett-Knopf-Warner contract.

9

The trial court denied relief to Warner, declared Hammett's rights, and assessed costs against Warner, who appeals.

10

The instruments under which Warner claims were prepared by Warner Bros. Corporation which is a large, experienced moving picture producer. It would seem proper, therefore, to construe the instruments under the assumption that the claimant knew what it wanted and that in defining the items in the instruments which it desired and intended to take, it included all of the items it was contracting to take.3 We are of the opinion that since the use of characters and character names are nowhere specifically mentioned in the agreements, but that other items, including the title, "The Maltese Falcon", and their use are specifically mentioned as being granted, that the character rights with the names cannot be held to be within the grants, and that under the doctrine of ejusdem generis, general language cannot be held to include them.4 As was said in Phillip v. Jerome H. Remick & Co., S.D., N.Y., Op. No. 9,999, 1936, "Such doubt as there is should be resolved in favor of the composer. The clearest language is necessary to divest the author of the fruits of his labor. Such language is lacking here." See, also, Tobani v. Carl Fischer, Inc., 1942, 263 App.Div. 503, 507, 33 N.Y.S.2d 294, 299, affirmed 1942, 289 N.Y. 727, 46 N.E.2d 347.

11

The conclusion that these rights are not within the granting instruments is strongly buttressed by the fact that historically and presently detective fiction writers have and do carry the leading characters with their names and individualisms from one story into succeeding stories. This was the practice of Edgar Allen Poe, Sir Arthur Conan Doyle, and others; and in the last two decades of S. S. Van Dine, Earle Stanley Gardner, and others. The reader's interest thereby snowballs as new "capers" of the familiar characters are related in succeeding tales. If the intention of the contracting parties had been to avoid this practice which was a very valuable one to the author, it is hardly reasonable that it would be left to a general clause following specific grants. Another buttressing fact is that Hammett wrote and caused to be published in 1932, long after the Falcon agreements, three stories in which some of the leading characters of the Falcon were featured, and no objection was voiced by Warner. It is also of some note that the evidence shows that Columbia, long subsequent to the conveying instruments, dickered with Warner for the use of the Falcon on its "Suspense" radio program and, failing in its efforts, substituted "The Kandy Tooth" which uses the Falcon characters under license of Hammett. Warner made no claim against Columbia at or reasonably soon afterward. The conclusion we have come to, as to the intention of the parties, would seem to be in harmony with the fact that the purchase price paid by Warner was $8,500.00, which would seem inadequate compensation for the complete surrender of the characters made famous by the popular reception of the book, The Maltese Falcon; and that the intention of the parties, inclusive of the "Assignment", was not that Hammett should be deprived of using the Falcon characters in subsequently written stories, and that the contract, properly construed, does not deprive Hammett of their use.

12

Up to this point we have discussed the points at issue by construing the contract and by seeking the intention of the parties to it, and we have concluded that the parties never intended by their contract to buy and sell the future use of the personalities in the writing.

13

It will now be profitable to consider whether it was ever intended by the copyright statute that characters with their names should be under its protection.

14

The practice of writers to compose sequels to stories is old, and the copyright statute, though amended several times, has never specifically mentioned the point. It does not appear that it has ever been adjudicated, although it is mentioned in Nichols v. Universal Pictures Corp., 2 Cir., 1930, 45 F.2d 119. If Congress had intended that the sale of the right to publish a coyprighted story would foreclose the author's use of its characters in subsequent works for the life of the copyright, it would seem Congress would have made specific provision therefor. Authors work for the love of their art no more than other professional people work in other lines of work for the love of it. There is the financial motive as well. The characters of an author's imagination and the art of his descriptive talent, like a painter's or like a person with his penmanship, are always limited and always fall into limited patterns.5 The restriction argued for is unreasonable, and would effect the very opposite of the statute's purpose which is to encourage the production of the arts.

15

It is our conception of the area covered by the copyright statute that when a study of the two writings is made and it is plain from the study that one of them is not in fact the creation of the putative author, but instead has been copied in substantial part exactly or in transparent re-phrasing to produce essentially the story of the other writing, it infringes.

16

It is conceivable that the character really constitutes the story being told, but if the character is only the chessman in the game of telling the story he is not within the area of the protection afforded by the copyright. The subject is given consideration in the Nichols case, supra, 45 F.2d at page 121 of the citation. At page 122 of 45 F.2d of the same case the court remarks that the line between infringement and non-infringement is indefinite and may seem arbitrary when drawn; nevertheless it must be drawn. Nichols v. Universal Pictures Corp., 2 Cir., 1930, 45 F.2d 119. See Warner Bros. Pictures v. Majestic Pictures Corp., 2 Cir., 70 F.2d 310, 311.

17

We conclude that even if the Owners assigned their complete rights in the copyright to the Falcon, such assignment did not prevent the author from using the characters used therein, in other stories. The characters were vehicles for the story told, and the vehicles did not go with the sale of the story.

18

We turn to the consideration of general infringement. It is agreed that a story entitled "The Kandy Tooth" is the closest to The Maltese Falcon, and from a practical standpoint if the Tooth does not infringe the Falcon, there has been no infringement.

19

We have set out in notes 7 and 8 at the end of this opinion, short summations of the two works. There is a sameness in the tricks of spinning out the yarn so as to sustain the reader's suspense as to hinted mystery, and there is a similarity in the two stories in that there is a long complicated search for a lost article of fabulous value. The searches are filled with complications, fatalities, and moral delinquencies by characters in name, description, and action of some similarities. The script of the Tooth was not composed by Hammett and, except for a few expressions, is not written in the Hammett literary style.

20

We see no clear error in the trial court's holding that the similarities of the two stories do not go to the degree of constituting practically the same story. There is no textual copying; the mystery of the Tooth and the suspense to the reader would not be dulled through his having read the Falcon. In a phrase, they are different stories though of the same general nature.

21

Unfair Use and Competition

22

Warner claims the radio broadcasts, "The Adventures of Sam Spade" and the "Suspense" broadcast of "The Kandy Tooth", and others, wherein the characters of the Falcon were used by name and their peculiarities, constituted unfair use and competition. The trial court found against such contention and we think the conclusion does not constitute clear error.

23

It is patent that the characters of The Maltese Falcon could not fairly be used in such a manner as to cause the Falcon to be materially lessened in its commercial worth by degrading or cheapening them so that the public would not be interested in their capers.6 They could not be used in such a manner as to deceive the public or to "palm off" to the public the idea that they were really witnessing The Maltese Falcon when they viewed showings of the other stories.7 We think there was no reversible error in the court's conclusions on these points.

24

Although we have thought it necessary to arrive at some conclusions not entirely in accord with those of the district court, or to arrive at like conclusions through somewhat different reasoning, nevertheless we commend a reading of that court's opinion and notation of authorities cited. We are in complete accord with the order of the district court that the plaintiffs-appellants take nothing, and that defendants-appellees recover their costs.

25

The judgment in accordance with this opinion will settle all of the issues of the case, including all of Hammett's interest in the subject matter under Warner's claims. There is no justiciable controversy between Hammett and Knopf, the nominal plaintiff. It follows that no useful purpose could be served by considering Hammett's prayer for a declaration of his rights and his counterclaim for a declaratory judgment is therefore dismissed and the judgment running to him on it is reversed. Otherwise, the judgment is affirmed.8,9

26

Reversed and affirmed in part. PAGE CONTAINED FOOTNOTES

Notes:

1. The Hammett-Knopf-Warner contract, with certain formalities deleted as in the district court's memorandum decision of December 28, 1951, 102 F.Supp. 141, 143, is as follows:

"* * * Warner as `Purchaser' was granted the following rights inter alia `in and to that certain story, hereinafter called "writings," entitled "Maltese Falcon" * * *: 1. (a) the exclusive * * * motion picture rights, including, common law and statutory copyright in the same * * * together with all benefits of the copyrights in such writings, the title and the theme thereof, and of all remedies held thereunder, with respect to such motion picture rights; (b) the exclusive right to make motion picture versions thereof * * * including the exclusive right to show * * * photographs in motion, representing scenes or action taken from or based upon said writings, or any adaptation thereof; (c) the exclusive right to record and reproduce language, speech, songs, music, dancing, choreography and other sounds in connection with * * * the production and exhibition of photoplays based upon such writings * * *; (d) the exclusive right for the purpose of such sound records and photoplays, to adapt, use, dramatize, arrange, change, transpose, make musical versions of, add to, interpolate in and subtract from said writings, the language, title and dialogue thereof * * *; (e) the exclusive right to record such writings, language and dialogue and such adaptations, dramatizations, arrangements, change * * * and interpolations on sound records and to reproduce the same from such sound records in synchronism with and/or separately from such photoplays * * *; (f) the right in the writings for production and use upon the spoken stage * * * is reserved to the Owners, but all other now or hereafter existing dramatic, exhibition or other presentation rights in the writings, and without limiting the generality of the foregoing, including talking motion picture rights * * * as well as the right to transmit and exploit scenes and pictures taken or adapted from or based upon said writings, the language, title and dialogue thereof, by radio, television or otherwise, together with the right to transmit and reproduce by radio, television or otherwise, the writings, the language, title and dialogue thereof and the sound records herein referred to in connection with the broadcasting of said motion picture versions * * * are granted exclusively to the Purchaser * * * [and] 12. The Owners warrant and agree that they will not cause or allow or sanction any publication or dramatization of said writings or any arrangement, or revision or reissue thereof in any form in any parts of the world, without first granting to the Purchaser, without further consideration, the silent and talking motion picture rights and the mechanical and recording and reproducing rights (and all the rights set forth in paragraph (1) hereof) and in and to any such arrangement, revision or reissue above named.'"

2. "Assignment of Copyright. Whereas, Dashiell Hammett is the author of a certain literary composition entitled "Maltese Falcon", five installments of which have been published * * * and have been copyrighted by Pro-Distributors Corporation; and

"Whereas, the Pro-Distributors Corporation has heretofore assigned to the Undersigned, Alfred A. Knopf, Inc., the foregoing copyrights, and

"Whereas, the Undersigned published a novel, "Maltese Falcon" in book form, and registered the novel in United States Copyright Office * * *,

"Now, Therefore, in consideration of the sum of One Dollar in hand paid and for other valuable considerations now received, the Undersigned sells and assigns unto Warner Bros. Pictures, Inc., its successors and assigns forever, the motion picture and talking motion picture rights * * * in and to the said literary composition (hereinafter called `writings') and all motion picture rights in all copyrights thereof, as well as radio broadcasting and television rights, * * * together with the sole and exclusive right to use, interpolate songs, music, sounds, words and dialogue in, translate, adapt and change said writings and the title in the making of or in conjunction with or separately and apart from motion picture photoplays, and to lease, vend and exhibit the same throughout the world, and to copyright the same in its own name or otherwise, including the right to record and reproduce sounds, language, dialogue and speech taken, adapted and translated from the writings, in connection with and/or in synchronism with and/or separately from the production and exhibition of photoplays based upon such writings, whether such records be on the film itself or on separate discs, or any other material or medium, by means of mechanical, electrical, photographic or other devices and improvements thereupon which are now or hereafter may be used in connection with the production and exhibition of motion pictures (hereinafter referred to as `sound records') and to copyright in its own name or otherwise said sound records.

"The Undersigned agrees to obtain or cause to be obtained a renewal of such copyrights according to law in order to secure said rights in Warner Bros. Pictures, Inc., during any and all renewal terms, and the Undersigned hereby appoints Warner Bros. Pictures, Inc., its attorney-in-fact with an irrevocable power to do all acts and things for and in the name of the Undersigned to obtain such renewals.

"Dated: June 23, 1930."

3. Taylor v. United States Casualty Co., 269 N.Y. 360, 199 N.E. 620, 115 A.L.R. 822; Evelyn Building Corp. v. City of New York, 257 N.Y. 501, 178 N.E. 771; Tobani v. Carl Fischer, Inc., 1942, 263 App. Div. 503, 33 N.Y.S.2d 294, 299; Hunt v. United Bank & Trust Co., 1930, 210 Cal. 108, 116, 291 P. 184.

4. Bouvier's Law Dictionary, Baldwins Students Ed., 1934, p. 336; 3 Williston on Contracts, Rev.ed., 1784. See, also, Smith v. McCullough, 1881, 104 U.S. 25, 28, 26 L.Ed. 637; Swift & Co. v. Columbia Ry., Gas & Electric Co., 4 Cir., 1927, 17 F.2d 46, 48, 51 A.L.R. 983; Cleveland Trust Co. v. Consolidated Gas, etc., Co., 4 Cir., 1932, 55 F.2d 211, 215.

5. "He must be a poor creature that does not often repeat himself. Imagine the author of the excellent piece of advice, `Know thyself', never alluding to that sentiment again during the course of a protracted existence! Why, the truths a man carries about with him are his tools; and do you think a carpenter is bound to use the same plane but once to smooth a knotty board with, or to hang up his hammer after it has driven its first nail? I shall never repeat a conversation, but an idea, often. I shall use the same types when I like, but not commonly the same stereotypes. A thought is often original, though you have uttered it a hundred times. It has come to you over a new route, by a new and express train of associations." The Autocrat of the Breakfast Table, by O. W. Holmes, M.D., p. 9, reprint of original edition.

6. Manners v. Morosco, 1919, 252 U.S. 317, 40 S.Ct. 335, 64 L.Ed. 590; Harper Bros. v. Klaw, D.C.1916, 232 F. 609.

7. Stork Restaurant v. Sahati, 9 Cir., 166 F.2d 348; Lone Ranger v. Cox, 4 Cir., 124 F.2d 650.

8. The Maltese Falcon Story. The theme of the story of The Maltese Falcon is a complicated search for a fabulously valuable bird figurine called The Maltese Falcon. The action of the story centers in San Francisco from elsewhere, with the leading actors, or characters gathering there intent upon the objective. An attractive, alluring woman of uncertain age and reputation, by name Brigid O'Shaughnessy, assuming a false name and great distress, in search of help, called upon private detective Sam Spade, a clever, laconic, rangy-looking man whose morals and practices are none too idyllic, and well if not too favorably known to the police. Brigid qualifies within the requisite of the proverbial monumental liar, but, though Spade is not deceived, she manages to withhold the truth from him. A dunderheaded policeman and his partner enter the tangled story. Effie Perine is Spade's secretary, one of those see-all, know-all, self effacing paragons of loyal efficiency. A mystical character of a man who apparently is cooperating with Brigid against three others of their search-party gets shot to death and Spade is under suspicion. The leader of the search-party is a fat man named Gutman, of infinite patience and possessed of untold money. He proposes to pay a large sum to Sam who represents that he can deliver the bird. An effeminate lackey of a man by the name of Cairo does Gutman's bidding. A young, boyish gunman is under Gutman's orders. The story runs on at accelerated tempo in mystery until the captain of a ship, just in from the Orient, appears at Spade's apartment with a package in hand and falls dead from the boy's bullets sent into him just before he entered Spade's place. All gather at Sam's for the delivery of the bird, supposed to be in the package, and for payment of the money. Sam gets the award and Gutman gets the bird, which is a worthless counterfeit of the genuine. Gutman maintains his sang-froid. Brigid and Sam have trespassed the conventions. Yet, as somehow it is revealed the lady herself was the author of the first fatality, she is delivered over by the benevolent Sam and is sent on her way to San Quentin prison. These characters are skillfully depicted in a running, attractive style and distinctly assume individualism as distinguished from mere other persons.

Warner claims ownership of all of this including the characterizations with the characters' names, and the story.

9. The Kandy Tooth Story. The script opens with Sam Spade telephoning from jail to his faithful secretary, Effie Perine, early in the morning. Effie hurries to Sam who dictates his story. Dundy, the police officer, is present. Spade has received a telegram from the fat Caspar Gutman who had been marked "dead" from the end of The Maltese Falcon caper. The telegram is a warning about "an invidious pair of rogues", a dentist, and a charming woman named Hope Laverne, who have something to do with a "hidden tooth". Spade is bailed out by a mystery man who deposits $20,000.00 with the law. Gutman will shortly arrive in San Francisco. The dentist, so Spade dictated, had been ushered into his office by Effie and entreats him to get someone's "bridge". The dentist leaves. Spade contemplates "Hm-m-m * * * Beware the Hidden Tooth". In comes Hope Laverne, a character along the line of Brigid O'Shaughnessy, and she is, or claims to be, a sister of the dentist. Hope explains the brother's obsession about a dental bridge. She wants to find him. Spade goes to a hotel, gets information from a house detective, and finds the brother, badly beaten; the two walk on the street — the dentist collapses. Spade takes him into a newsreel theater. The show excites him — it's about white elephants and particularly Oriental in character. Spade and the dentist go back to Spade's room. There Laverne recites a story of a tooth having been extracted from the jaw of a sacred body long since the occupant of an Oriental tomb. The tooth was taken by international rogues and installed by the dentist in the bridgework of an innocent refugee. The rogues are now attempting to locate the refugee and regain the priceless tooth.

Hope calls Spade on the telephone for help, and he goes, but is attacked by a boy, brother of the gun-boy in The Maltese Falcon. They scuffle and Spade is felled by a gun butt. He comes to in the presence of the imperturbable Gutman and strange happenings ensue. Spade finally gets the tooth in the ashes of the cremated body of the refugee, Herman Julius. $20,000.00 is paid upon delivery of the package containing the ashes. The tooth, by reason of a religious significance, is worth untold wealth to Gutman if he can produce it. A murder is committed; Hope and Sam had been more than friends. A Russian was mixed up in the plot. When Gutman saw that he had been duped through the delivery to him of the cremation residue, he took it as philosophically as when the bird in The Maltese Falcon turned out to be spurious. It develops that $20,000.00 had been put up for Sam's bail, and Sam puts up the same money as bail for Hope who gets into and out of jail. In some not very clear manner it all ends with no money gained by Spade, but Hope telephones her love after leaving jail, and Effie is not sure that the whole affair will net her a new ribbon for her typewriter.

4.2 Software 4.2 Software

4.2.1 Lotus Development Corp. v. Borland International, Inc. 4.2.1 Lotus Development Corp. v. Borland International, Inc.

49 F.3d 807 (1995)

LOTUS DEVELOPMENT CORPORATION, Plaintiff, Appellee,
v.
BORLAND INTERNATIONAL, INC., Defendant, Appellant.

No. 93-2214.

United States Court of Appeals, First Circuit.

Heard October 6, 1994.
Decided March 9, 1995.

 

[808] Gary L. Reback, with whom Peter N. Detkin, Michael Barclay, Isabella E. Fu, Wilson Sonsini Goodrich & Rosati, P.C., Palo Alto, CA, Peter E. Gelhaar, Katherine L. Parks, and Donnelly Conroy & Gelhaar, Boston, MA, were on brief for appellant.

Matthew P. Poppel, Boston, MA, et al., were on brief for Computer Scientists, amicus curiae.

Dennis S. Karjala, Tempe, AZ, and Peter S. Menell, Berkeley, CA, on brief, amici curiae.

Jeffrey C. Cannon and Baker Keaton Seibel & Cannon, Walnut Creek, CA, were on brief for Computer Software Industry Ass'n, amicus curiae.

Laureen E. McGurk, David A. Rabin, Bryan G. Harrison and Morris Manning & Martin, Atlanta, GA, were on brief for Chicago Computer Soc., Diablo Users Group, Danbury Area Computer Soc., IBM AB Users Group, Kentucky-Indiana Personal Computer Users Group, Long Island PC Users Group, Napa Valley PC Users Group, Pacific Northwest PC Users Group, Palmetto Personal Computer Club, Philadelphia Area Computer Soc., Inc., Phoenix IBM PC Users Group, Pinellas IBM PC Users Group, Quad Cities Computer Soc., Quattro Pro Users Group, Sacramento PC Users Group, San Francisco PC Users Group, Santa Barbara PC Users Group, Twin Cities PC Users Group, and Warner Robbins Personal Computer Ass'n, amici curiae.

Diane Marie O'Malley and Hanson Bridgett Marcus Vlahos & Rudy, San Francisco, [809] CA, were on brief for Software Entrepreneurs' Forum, amicus curiae.

Peter M.C. Choy, Mountain View, CA, was on brief for American Committee for Interoperable Systems, amicus curiae.

Howard B. Abrams, Detroit, MI, Howard C. Anawalt, Santa Clara, CA, Stephen R. Barnett, Berkeley, CA, Ralph S. Brown, Stephen L. Carter, New Haven, CT, Amy B. Cohen, Longmeadow, MA, Paul J. Heald, Athens, GA, Peter A. Jaszi, John A. Kidwell, Madison, WI, Edmund W. Kitch, Charlottesville, VA, Roberta R. Kwall, Chicago, IL, David L. Lange, Durham, NC, Marshall Leaffer, Toledo, OH, Jessica D. Litman, Ann Arbor, MI, Charles R. McManis, St. Louis, MO, L. Ray Patterson, Athens, GA, Jerome H. Reichman, David A. Rice, Chestnut Hill, MA, Pamela Samuelson, Pittsburgh, PA, David J. Seipp, Boston, MA, David E. Shipley, Lexington, KY, Lionel S. Sobel, Santa Monica, CA, Alfred C. Yen, Newton, MA, and Diane L. Zimmerman, New York City, were on brief for Copyright Law Professors, amicus curiae.

Henry B. Gutman, Baker & Botts, LLP, with whom Kerry L. Konrad, Joshua H. Epstein, Kimberly A. Caldwell, O'Sullivan Graev & Karabell, New York City, Thomas M. Lemberg, James C. Burling, and Hale and Dorr, Boston, MA, were on brief for appellee.

Morton David Goldberg, June M. Besek, David O. Carson, Jesse M. Feder, Schwab Goldberg Price & Dannay, New York City, and Arthur R. Miller, Cambridge, MA, were on brief for Apple Computer, Inc., Digital Equip. Corp., International Business Machines Corp., and Xerox Corp., amici curiae.

Jon A. Baumgarten, Proskauer Rose Goetz & Mendelsohn, and Robert A. Gorman, New York City, were on brief for Adobe Systems, Inc., Apple Computer, Inc., Computer Associates Intern., Inc., Digital Equip. Corp., and International Business Machines Corp., amici curiae.

Herbert F. Schwartz, Vincent N. Palladino, Susan Progoff, Fish & Neave, New York City, William J. Cheeseman, and Foley Hoag & Eliot, Boston, MA, were on brief for Computer and Business Equip. Mfrs. Ass'n, amicus curiae.

Before TORRUELLA, Chief Judge, BOUDIN and STAHL, Circuit Judges.

STAHL, Circuit Judge.

This appeal requires us to decide whether a computer menu command hierarchy is copyrightable subject matter. In particular, we must decide whether, as the district court held, plaintiff-appellee Lotus Development Corporation's copyright in Lotus 1-2-3, a computer spreadsheet program, was infringed by defendant-appellant Borland International, Inc., when Borland copied the Lotus 1-2-3 menu command hierarchy into its Quattro and Quattro Pro computer spreadsheet programs. See Lotus Dev. Corp. v. Borland Int'l, Inc., 788 F.Supp. 78 (D.Mass. 1992) ("Borland I"); Lotus Dev. Corp. v. Borland Int'l, Inc., 799 F.Supp. 203 (D.Mass. 1992) ("Borland II"); Lotus Dev. Corp. v. Borland Int'l, Inc., 831 F.Supp. 202 (D.Mass. 1993) ("Borland III"); Lotus Dev. Corp. v. Borland Int'l, Inc., 831 F.Supp. 223 (D.Mass. 1993) ("Borland IV").

I.

Background

Lotus 1-2-3 is a spreadsheet program that enables users to perform accounting functions electronically on a computer. Users manipulate and control the program via a series of menu commands, such as "Copy," "Print," and "Quit." Users choose commands either by highlighting them on the screen or by typing their first letter. In all, Lotus 1-2-3 has 469 commands arranged into more than 50 menus and submenus.

Lotus 1-2-3, like many computer programs, allows users to write what are called "macros." By writing a macro, a user can designate a series of command choices with a single macro keystroke. Then, to execute that series of commands in multiple parts of the spreadsheet, rather than typing the whole series each time, the user only needs to type the single pre-programmed macro keystroke, causing the program to recall and perform the designated series of commands automatically. Thus, Lotus 1-2-3 macros [810] shorten the time needed to set up and operate the program.

Borland released its first Quattro program to the public in 1987, after Borland's engineers had labored over its development for nearly three years. Borland's objective was to develop a spreadsheet program far superior to existing programs, including Lotus 1-2-3. In Borland's words, "[f]rom the time of its initial release ... Quattro included enormous innovations over competing spreadsheet products."

The district court found, and Borland does not now contest, that Borland included in its Quattro and Quattro Pro version 1.0 programs "a virtually identical copy of the entire 1-2-3 menu tree." Borland III, 831 F.Supp. at 212 (emphasis in original). In so doing, Borland did not copy any of Lotus's underlying computer code; it copied only the words and structure of Lotus's menu command hierarchy. Borland included the Lotus menu command hierarchy in its programs to make them compatible with Lotus 1-2-3 so that spreadsheet users who were already familiar with Lotus 1-2-3 would be able to switch to the Borland programs without having to learn new commands or rewrite their Lotus macros.

In its Quattro and Quattro Pro version 1.0 programs, Borland achieved compatibility with Lotus 1-2-3 by offering its users an alternate user interface, the "Lotus Emulation Interface." By activating the Emulation Interface, Borland users would see the Lotus menu commands on their screens and could interact with Quattro or Quattro Pro as if using Lotus 1-2-3, albeit with a slightly different looking screen and with many Borland options not available on Lotus 1-2-3. In effect, Borland allowed users to choose how they wanted to communicate with Borland's spreadsheet programs: either by using menu commands designed by Borland, or by using the commands and command structure used in Lotus 1-2-3 augmented by Borland-added commands.

Lotus filed this action against Borland in the District of Massachusetts on July 2, 1990, four days after a district court held that the Lotus 1-2-3 "menu structure, taken as a whole — including the choice of command terms [and] the structure and order of those terms," was protected expression covered by Lotus's copyrights. Lotus Dev. Corp. v. Paperback Software Int'l, 740 F.Supp. 37, 68, 70 (D.Mass.1990) ("Paperback").[1] Three days earlier, on the morning after the Paperback decision, Borland had filed a declaratory judgment action against Lotus in the Northern District of California, seeking a declaration of non-infringement. On September 10, 1990, the district court in California dismissed Borland's declaratory judgment action in favor of this action.

Lotus and Borland filed cross motions for summary judgment; the district court denied both motions on March 20, 1992, concluding that "neither party's motion is supported by the record." Borland I, 788 F.Supp. at 80. The district court invited the parties to file renewed summary judgment motions that would "focus their arguments more precisely" in light of rulings it had made in conjunction with its denial of their summary judgment motions. Id. at 82. Both parties filed renewed motions for summary judgment on April 24, 1992. In its motion, Borland contended that the Lotus 1-2-3 menus were not copyrightable as a matter of law and that no reasonable trier of fact could find that the similarity between its products and Lotus 1-2-3 was sufficient to sustain a determination of infringement. Lotus contended in its motion that Borland had copied Lotus 1-2-3's entire user interface and had thereby infringed Lotus's copyrights.

On July 31, 1992, the district court denied Borland's motion and granted Lotus's motion in part. The district court ruled that the Lotus menu command hierarchy was copyrightable expression because

[a] very satisfactory spreadsheet menu tree can be constructed using different commands and a different command structure from those of Lotus 1-2-3. In fact, Borland has constructed just such an alternate tree for use in Quattro Pro's native mode. Even if one holds the arrangement of menu commands constant, it is possible to generate literally millions of satisfactory [811] menu trees by varying the menu commands employed.

Borland II, 799 F.Supp. at 217. The district court demonstrated this by offering alternate command words for the ten commands that appear in Lotus's main menu. Id. For example, the district court stated that "[t]he `Quit' command could be named `Exit' without any other modifications," and that "[t]he `Copy' command could be called `Clone,' `Ditto,' `Duplicate,' `Imitate,' `Mimic,' `Replicate,' and `Reproduce,' among others." Id. Because so many variations were possible, the district court concluded that the Lotus developers' choice and arrangement of command terms, reflected in the Lotus menu command hierarchy, constituted copyrightable expression.

In granting partial summary judgment to Lotus, the district court held that Borland had infringed Lotus's copyright in Lotus 1-2-3:

[A]s a matter of law, Borland's Quattro products infringe the Lotus 1-2-3 copyright because of (1) the extent of copying of the "menu commands" and "menu structure" that is not genuinely disputed in this case, (2) the extent to which the copied elements of the "menu commands" and "menu structure" contain expressive aspects separable from the functions of the "menu commands" and "menu structure," and (3) the scope of those copied expressive aspects as an integral part of Lotus 1-2-3.

Borland II, 799 F.Supp. at 223 (emphasis in original). The court nevertheless concluded that while the Quattro and Quattro Pro programs infringed Lotus's copyright, Borland had not copied the entire Lotus 1-2-3 user interface, as Lotus had contended. Accordingly, the court concluded that a jury trial was necessary to determine the scope of Borland's infringement, including whether Borland copied the long prompts[2] of Lotus 1-2-3, whether the long prompts contained expressive elements, and to what extent, if any, functional constraints limited the number of possible ways that the Lotus menu command hierarchy could have been arranged at the time of its creation. See Borland III, 831 F.Supp. at 207. Additionally, the district court granted Lotus summary judgment on Borland's affirmative defense of waiver, but not on its affirmative defenses of laches and estoppel. Borland II, 799 F.Supp. at 222-23.

Immediately following the district court's summary judgment decision, Borland removed the Lotus Emulation Interface from its products. Thereafter, Borland's spreadsheet programs no longer displayed the Lotus 1-2-3 menus to Borland users, and as a result Borland users could no longer communicate with Borland's programs as if they were using a more sophisticated version of Lotus 1-2-3. Nonetheless, Borland's programs continued to be partially compatible with Lotus 1-2-3, for Borland retained what it called the "Key Reader" in its Quattro Pro programs. Once turned on, the Key Reader allowed Borland's programs to understand and perform some Lotus 1-2-3 macros.[3] With the Key Reader on, the Borland programs used Quattro Pro menus for display, interaction, and macro execution, except when they encountered a slash ("/") key in a macro (the starting key for any Lotus 1-2-3 [812] macro), in which case they interpreted the macro as having been written for Lotus 1-2-3. Accordingly, people who wrote or purchased macros to shorten the time needed to perform an operation in Lotus 1-2-3 could still use those macros in Borland's programs.[4] The district court permitted Lotus to file a supplemental complaint alleging that the Key Reader infringed its copyright.

The parties agreed to try the remaining liability issues without a jury. The district court held two trials, the Phase I trial covering all remaining issues raised in the original complaint (relating to the Emulation Interface) and the Phase II trial covering all issues raised in the supplemental complaint (relating to the Key Reader). At the Phase I trial, there were no live witnesses, although considerable testimony was presented in the form of affidavits and deposition excerpts. The district court ruled upon evidentiary objections counsel interposed. At the Phase II trial, there were two live witnesses, each of whom demonstrated the programs for the district court.

After the close of the Phase I trial, the district court permitted Borland to amend its answer to include the affirmative defense of "fair use." Because Borland had presented all of the evidence supporting its fair-use defense during the Phase I trial, but Lotus had not presented any evidence on fair use (as the defense had not been raised before the conclusion of the Phase I trial), the district court considered Lotus's motion for judgment on partial findings of fact. See Fed.R.Civ.P. 52(c). The district court held that Borland had failed to show that its use of the Lotus 1-2-3 menu command hierarchy in its Emulation Interface was a fair use. See Borland III, 831 F.Supp. at 208.

In its Phase I-trial decision, the district court found that "each of the Borland emulation interfaces contains a virtually identical copy of the 1-2-3 menu tree and that the 1-2-3 menu tree is capable of a wide variety of expression." Borland III, 831 F.Supp. at 218. The district court also rejected Borland's affirmative defenses of laches and estoppel. Id. at 218-23.

In its Phase II-trial decision, the district court found that Borland's Key Reader file included "a virtually identical copy of the Lotus menu tree structure, but represented in a different form and with first letters of menu command names in place of the full menu command names." Borland IV, 831 F.Supp. at 228. In other words, Borland's programs no longer included the Lotus command terms, but only their first letters. The district court held that "the Lotus menu structure, organization, and first letters of the command names ... constitute part of the protectable expression found in [Lotus 1-2-3]." Id. at 233. Accordingly, the district court held that with its Key Reader, Borland had infringed Lotus's copyright. Id. at 245. The district court also rejected Borland's affirmative defenses of waiver, laches, estoppel, and fair use. Id. at 235-45. The district court then entered a permanent injunction against Borland, id. at 245, from which Borland appeals.

This appeal concerns only Borland's copying of the Lotus menu command hierarchy into its Quattro programs and Borland's affirmative defenses to such copying. Lotus has not cross-appealed; in other words, Lotus does not contend on appeal that the district court erred in finding that Borland had not copied other elements of Lotus 1-2-3, such as its screen displays.

II.

Discussion

On appeal, Borland does not dispute that it factually copied the words and arrangement of the Lotus menu command hierarchy. Rather, Borland argues that it "lawfully copied the unprotectable menus of Lotus 1-2-3." Borland contends that the Lotus menu command hierarchy is not copyrightable because it is a system, method of operation, process, or procedure foreclosed from protection by 17 U.S.C. § 102(b). Borland also raises a number of affirmative defenses. [813]

 

A. Copyright Infringement Generally

To establish copyright infringement, a plaintiff must prove "(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original." Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361, 111 S.Ct. 1282, 1296, 113 L.Ed.2d 358 (1991); see also Data Gen. Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1160 n. 19 (1st Cir.1994); Concrete Mach. Co. v. Classic Lawn Ornaments, Inc., 843 F.2d 600, 605 (1st Cir.1988). To show ownership of a valid copyright and therefore satisfy Feist's first prong, a plaintiff must prove that the work as a whole is original and that the plaintiff complied with applicable statutory formalities. See Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335, 1340 (5th Cir.1994). "In judicial proceedings, a certificate of copyright registration constitutes prima facie evidence of copyrightability and shifts the burden to the defendant to demonstrate why the copyright is not valid." Bibbero Sys., Inc. v. Colwell Sys., Inc., 893 F.2d 1104, 1106 (9th Cir.1990); see also 17 U.S.C. § 410(c); Folio Impressions, Inc. v. Byer California, 937 F.2d 759, 763 (2d Cir.1991) (presumption of validity may be rebutted).

To show actionable copying and therefore satisfy Feist's second prong, a plaintiff must first prove that the alleged infringer copied plaintiff's copyrighted work as a factual matter; to do this, he or she may either present direct evidence of factual copying or, if that is unavailable, evidence that the alleged infringer had access to the copyrighted work and that the offending and copyrighted works are so similar that the court may infer that there was factual copying (i.e., probative similarity). Engineering Dynamics, 26 F.3d at 1340; see also Concrete Mach., 843 F.2d at 606. The plaintiff must then prove that the copying of copyrighted material was so extensive that it rendered the offending and copyrighted works substantially similar. See Engineering Dynamics, 26 F.3d at 1341.

In this appeal, we are faced only with whether the Lotus menu command hierarchy is copyrightable subject matter in the first instance, for Borland concedes that Lotus has a valid copyright in Lotus 1-2-3 as a whole[5] and admits to factually copying the Lotus menu command hierarchy. As a result, this appeal is in a very different posture from most copyright-infringement cases, for copyright infringement generally turns on whether the defendant has copied protected expression as a factual matter. Because of this different posture, most copyright-infringement cases provide only limited help to us in deciding this appeal. This is true even with respect to those copyright-infringement cases that deal with computers and computer software.

B. Matter of First Impression

Whether a computer menu command hierarchy constitutes copyrightable subject matter is a matter of first impression in this court. While some other courts appear to have touched on it briefly in dicta, see, e.g., Autoskill, Inc. v. National Educ. Support Sys., Inc., 994 F.2d 1476, 1495 n. 23 (10th Cir.), cert. denied, ___ U.S. ___, 114 S.Ct. 307, 126 L.Ed.2d 254 (1993), we know of no cases that deal with the copyrightability of a menu command hierarchy standing on its own (i.e., without other elements of the user interface, such as screen displays, in issue). Thus we are navigating in uncharted waters.

Borland vigorously argues, however, that the Supreme Court charted our course more than 100 years ago when it decided Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879). In Baker v. Selden, the Court held that Selden's copyright over the textbook in which he explained [814] his new way to do accounting did not grant him a monopoly on the use of his accounting system.[6] Borland argues:

The facts of Baker v. Selden, and even the arguments advanced by the parties in that case, are identical to those in this case. The only difference is that the "user interface" of Selden's system was implemented by pen and paper rather than by computer.

To demonstrate that Baker v. Selden and this appeal both involve accounting systems, Borland even supplied this court with a video that, with special effects, shows Selden's paper forms "melting" into a computer screen and transforming into Lotus 1-2-3.

We do not think that Baker v. Selden is nearly as analogous to this appeal as Borland claims. Of course, Lotus 1-2-3 is a computer spreadsheet, and as such its grid of horizontal rows and vertical columns certainly resembles an accounting ledger or any other paper spreadsheet. Those grids, however, are not at issue in this appeal for, unlike Selden, Lotus does not claim to have a monopoly over its accounting system. Rather, this appeal involves Lotus's monopoly over the commands it uses to operate the computer. Accordingly, this appeal is not, as Borland contends, "identical" to Baker v. Selden.

C. Altai

Before we analyze whether the Lotus menu command hierarchy is a system, method of operation, process, or procedure, we first consider the applicability of the test the Second Circuit set forth in Computer Assoc. Int'l, Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir.1992).[7] The Second Circuit designed its Altai test to deal with the fact that computer programs, copyrighted as "literary works," can be infringed by what is known as "nonliteral" copying, which is copying that is paraphrased or loosely paraphrased rather than word for word. See id. at 701 (citing nonliteral-copying cases); see also 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[A][1] (1993). When faced with nonliteral-copying cases, courts must determine whether similarities are due merely to the fact that the two works share the same underlying idea or whether they instead indicate that the second author copied the first author's expression. The Second Circuit designed its Altai test to deal with this situation in the computer context, specifically with whether one computer program copied nonliteral expression from another program's code.

The Altai test involves three steps: abstraction, filtration, and comparison. The abstraction step requires courts to "dissect the allegedly copied program's structure and isolate each level of abstraction contained within it." Altai, 982 F.2d at 707. This step enables courts to identify the appropriate framework within which to separate protectable expression from unprotected ideas. Second, courts apply a "filtration" step in which they examine "the structural components at each level of abstraction to determine whether their particular inclusion at that level was `idea' or was dictated by considerations of efficiency, so as to be necessarily incidental to that idea; required by factors external to the program itself; or taken from the public domain." Id. Finally, courts compare the protected elements of the infringed work (i.e., those that survived the filtration screening) to the corresponding elements of the allegedly infringing work to determine whether there was sufficient copying of protected material to constitute infringement. Id. at 710.

In the instant appeal, we are not confronted with alleged nonliteral copying of computer code. Rather, we are faced with Borland's deliberate, literal copying of the Lotus menu command hierarchy. Thus, we must determine not whether nonliteral copying occurred in some amorphous sense, but rather whether the literal copying of the Lotus [815] menu command hierarchy constitutes copyright infringement.

While the Altai test may provide a useful framework for assessing the alleged nonliteral copying of computer code, we find it to be of little help in assessing whether the literal copying of a menu command hierarchy constitutes copyright infringement. In fact, we think that the Altai test in this context may actually be misleading because, in instructing courts to abstract the various levels, it seems to encourage them to find a base level that includes copyrightable subject matter that, if literally copied, would make the copier liable for copyright infringement.[8] While that base (or literal) level would not be at issue in a nonliteral-copying case like Altai, it is precisely what is at issue in this appeal. We think that abstracting menu command hierarchies down to their individual word and menu levels and then filtering idea from expression at that stage, as both the Altai and the district court tests require, obscures the more fundamental question of whether a menu command hierarchy can be copyrighted at all. The initial inquiry should not be whether individual components of a menu command hierarchy are expressive, but rather whether the menu command hierarchy as a whole can be copyrighted. But see Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823 (10th Cir.1993) (endorsing Altai's abstraction-filtration-comparison test as a way of determining whether "menus and sorting criteria" are copyrightable).

D. The Lotus Menu Command Hierarchy: A "Method of Operation"

Borland argues that the Lotus menu command hierarchy is uncopyrightable because it is a system, method of operation, process, or procedure foreclosed from copyright protection by 17 U.S.C. § 102(b). Section 102(b) states: "In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work." Because we conclude that the Lotus menu command hierarchy is a method of operation, we do not consider whether it could also be a system, process, or procedure.

We think that "method of operation," as that term is used in § 102(b), refers to the means by which a person operates something, whether it be a car, a food processor, or a computer. Thus a text describing how to operate something would not extend copyright protection to the method of operation itself; other people would be free to employ that method and to describe it in their own words. Similarly, if a new method of operation is used rather than described, other people would still be free to employ or describe that method.

We hold that the Lotus menu command hierarchy is an uncopyrightable "method of operation." The Lotus menu command hierarchy provides the means by which users control and operate Lotus 1-2-3. If users wish to copy material, for example, they use the "Copy" command. If users wish to print material, they use the "Print" command. Users must use the command terms to tell the computer what to do. Without the menu command hierarchy, users would not be able to access and control, or indeed make use of, Lotus 1-2-3's functional capabilities.

The Lotus menu command hierarchy does not merely explain and present Lotus 1-2-3's functional capabilities to the user; it also serves as the method by which the program is operated and controlled. The Lotus menu command hierarchy is different from the Lotus long prompts, for the long prompts are not necessary to the operation of the program; users could operate Lotus 1-2-3 even if there were no long prompts.[9] The Lotus [816] menu command hierarchy is also different from the Lotus screen displays, for users need not "use" any expressive aspects of the screen displays in order to operate Lotus 1-2-3; because the way the screens look has little bearing on how users control the program, the screen displays are not part of Lotus 1-2-3's "method of operation."[10] The Lotus menu command hierarchy is also different from the underlying computer code, because while code is necessary for the program to work, its precise formulation is not. In other words, to offer the same capabilities as Lotus 1-2-3, Borland did not have to copy Lotus's underlying code (and indeed it did not); to allow users to operate its programs in substantially the same way, however, Borland had to copy the Lotus menu command hierarchy. Thus the Lotus 1-2-3 code is not a uncopyrightable "method of operation."[11]

The district court held that the Lotus menu command hierarchy, with its specific choice and arrangement of command terms, constituted an "expression" of the "idea" of operating a computer program with commands arranged hierarchically into menus and submenus. Borland II, 799 F.Supp. at 216. Under the district court's reasoning, Lotus's decision to employ hierarchically arranged command terms to operate its program could not foreclose its competitors from also employing hierarchically arranged command terms to operate their programs, but it did foreclose them from employing the specific command terms and arrangement that Lotus had used. In effect, the district court limited Lotus 1-2-3's "method of operation" to an abstraction.

Accepting the district court's finding that the Lotus developers made some expressive choices in choosing and arranging the Lotus command terms, we nonetheless hold that that expression is not copyrightable because it is part of Lotus 1-2-3's "method of operation." We do not think that "methods of operation" are limited to abstractions; rather, they are the means by which a user operates something. If specific words are essential to operating something, then they are part of a "method of operation" and, as such, are unprotectable. This is so whether they must be highlighted, typed in, or even spoken, as computer programs no doubt will soon be controlled by spoken words.

The fact that Lotus developers could have designed the Lotus menu command hierarchy differently is immaterial to the question of whether it is a "method of operation." In other words, our initial inquiry is not whether the Lotus menu command hierarchy incorporates any expression.[12] Rather, our initial inquiry is whether the Lotus menu command hierarchy is a "method of operation." Concluding, as we do, that users operate Lotus 1-2-3 by using the Lotus menu command hierarchy, and that the entire Lotus menu command hierarchy is essential to operating Lotus 1-2-3, we do not inquire further whether that method of operation could have been designed differently. The "expressive" choices of what to name the command terms and how to arrange them do not magically change the uncopyrightable menu command hierarchy into copyrightable subject matter.

Our holding that "methods of operation" are not limited to mere abstractions is bolstered by Baker v. Selden. In Baker, the Supreme Court explained that

the teachings of science and the rules and methods of useful art have their final end in application and use; and this application [817] and use are what the public derive from the publication of a book which teaches them.... The description of the art in a book, though entitled to the benefit of copyright, lays no foundation for an exclusive claim to the art itself. The object of the one is explanation; the object of the other is use. The former may be secured by copyright. The latter can only be secured, if it can be secured at all, by letters-patent.

Baker v. Selden, 101 U.S. at 104-05. Lotus wrote its menu command hierarchy so that people could learn it and use it. Accordingly, it falls squarely within the prohibition on copyright protection established in Baker v. Selden and codified by Congress in § 102(b).

In many ways, the Lotus menu command hierarchy is like the buttons used to control, say, a video cassette recorder ("VCR"). A VCR is a machine that enables one to watch and record video tapes. Users operate VCRs by pressing a series of buttons that are typically labelled "Record, Play, Reverse, Fast Forward, Pause, Stop/Eject." That the buttons are arranged and labeled does not make them a "literary work," nor does it make them an "expression" of the abstract "method of operating" a VCR via a set of labeled buttons. Instead, the buttons are themselves the "method of operating" the VCR.

When a Lotus 1-2-3 user chooses a command, either by highlighting it on the screen or by typing its first letter, he or she effectively pushes a button. Highlighting the "Print" command on the screen, or typing the letter "P," is analogous to pressing a VCR button labeled "Play."

Just as one could not operate a buttonless VCR, it would be impossible to operate Lotus 1-2-3 without employing its menu command hierarchy. Thus the Lotus command terms are not equivalent to the labels on the VCR's buttons, but are instead equivalent to the buttons themselves. Unlike the labels on a VCR's buttons, which merely make operating a VCR easier by indicating the buttons' functions, the Lotus menu commands are essential to operating Lotus 1-2-3. Without the menu commands, there would be no way to "push" the Lotus buttons, as one could push unlabeled VCR buttons. While Lotus could probably have designed a user interface for which the command terms were mere labels, it did not do so here. Lotus 1-2-3 depends for its operation on use of the precise command terms that make up the Lotus menu command hierarchy.

One might argue that the buttons for operating a VCR are not analogous to the commands for operating a computer program because VCRs are not copyrightable, whereas computer programs are. VCRs may not be copyrighted because they do not fit within any of the § 102(a) categories of copyrightable works; the closest they come is "sculptural work." Sculptural works, however, are subject to a "useful-article" exception whereby "the design of a useful article ... shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article." 17 U.S.C. § 101. A "useful article" is "an article having an intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information." Id. Whatever expression there may be in the arrangement of the parts of a VCR is not capable of existing separately from the VCR itself, so an ordinary VCR would not be copyrightable.

Computer programs, unlike VCRs, are copyrightable as "literary works." 17 U.S.C. § 102(a). Accordingly, one might argue, the "buttons" used to operate a computer program are not like the buttons used to operate a VCR, for they are not subject to a useful-article exception. The response, of course, is that the arrangement of buttons on a VCR would not be copyrightable even without a useful-article exception, because the buttons are an uncopyrightable "method of operation." Similarly, the "buttons" of a computer program are also an uncopyrightable "method of operation."

That the Lotus menu command hierarchy is a "method of operation" becomes clearer when one considers program compatibility. Under Lotus's theory, if a user uses [818] several different programs, he or she must learn how to perform the same operation in a different way for each program used. For example, if the user wanted the computer to print material, then the user would have to learn not just one method of operating the computer such that it prints, but many different methods. We find this absurd. The fact that there may be many different ways to operate a computer program, or even many different ways to operate a computer program using a set of hierarchically arranged command terms, does not make the actual method of operation chosen copyrightable; it still functions as a method for operating the computer and as such is uncopyrightable.

Consider also that users employ the Lotus menu command hierarchy in writing macros. Under the district court's holding, if the user wrote a macro to shorten the time needed to perform a certain operation in Lotus 1-2-3, the user would be unable to use that macro to shorten the time needed to perform that same operation in another program. Rather, the user would have to rewrite his or her macro using that other program's menu command hierarchy. This is despite the fact that the macro is clearly the user's own work product. We think that forcing the user to cause the computer to perform the same operation in a different way ignores Congress's direction in § 102(b) that "methods of operation" are not copyrightable. That programs can offer users the ability to write macros in many different ways does not change the fact that, once written, the macro allows the user to perform an operation automatically. As the Lotus menu command hierarchy serves as the basis for Lotus 1-2-3 macros, the Lotus menu command hierarchy is a "method of operation."

In holding that expression that is part of a "method of operation" cannot be copyrighted, we do not understand ourselves to go against the Supreme Court's holding in Feist. In Feist, the Court explained:

The primary objective of copyright is not to reward the labor of authors, but to promote the Progress of Science and useful Arts. To this end, copyright assures authors the right to their original expression, but encourages others to build freely upon the ideas and information conveyed by a work.

Feist, 499 U.S. at 349-50, 111 S.Ct. at 1290 (quotations and citations omitted). We do not think that the Court's statement that "copyright assures authors the right to their original expression" indicates that all expression is necessarily copyrightable; while original expression is necessary for copyright protection, we do not think that it is alone sufficient. Courts must still inquire whether original expression falls within one of the categories foreclosed from copyright protection by § 102(b), such as being a "method of operation."

We also note that in most contexts, there is no need to "build" upon other people's expression, for the ideas conveyed by that expression can be conveyed by someone else without copying the first author's expression.[13] In the context of methods of operation, however, "building" requires the use of the precise method of operation already employed; otherwise, "building" would require dismantling, too. Original developers are not the only people entitled to build on the methods of operation they create; anyone can. Thus, Borland may build on the method of operation that Lotus designed and may use the Lotus menu command hierarchy in doing so.

Our holding that methods of operation are not limited to abstractions goes against Autoskill, 994 F.2d at 1495 n. 23, in which the Tenth Circuit rejected the defendant's argument that the keying procedure used in a computer program was an uncopyrightable "procedure" or "method of operation" under § 102(b). The program at issue, which was designed to test and train students with reading deficiencies, id. at 1481, required students to select responses to the program's queries "by pressing the 1, 2, or 3 keys." Id. at 1495 n. 23. The Tenth Circuit held that, "for purposes of the preliminary injunction, ... the record showed that [this] keying procedure reflected at least a minimal degree [819] of creativity," as required by Feist for copyright protection. Id. As an initial matter, we question whether a programmer's decision to have users select a response by pressing the 1, 2, or 3 keys is original. More importantly, however, we fail to see how "a student select[ing] a response by pressing the 1, 2, or 3 keys," id., can be anything but an unprotectable method of operation.[14]

III.

Conclusion

Because we hold that the Lotus menu command hierarchy is uncopyrightable subject matter, we further hold that Borland did not infringe Lotus's copyright by copying it. Accordingly, we need not consider any of Borland's affirmative defenses. The judgment of the district court is

Reversed.

Concurrence follows.

BOUDIN, Circuit Judge, concurring.

The importance of this case, and a slightly different emphasis in my view of the underlying problem, prompt me to add a few words to the majority's tightly focused discussion.

I.

Most of the law of copyright and the "tools" of analysis have developed in the context of literary works such as novels, plays, and films. In this milieu, the principal problem — simply stated, if difficult to resolve — is to stimulate creative expression without unduly limiting access by others to the broader themes and concepts deployed by the author. The middle of the spectrum presents close cases; but a "mistake" in providing too much protection involves a small cost: subsequent authors treating the same themes must take a few more steps away from the original expression.

The problem presented by computer programs is fundamentally different in one respect. The computer program is a means for causing something to happen; it has a mechanical utility, an instrumental role, in accomplishing the world's work. Granting protection, in other words, can have some of the consequences of patent protection in limiting other people's ability to perform a task in the most efficient manner. Utility does not bar copyright (dictionaries may be copyrighted), but it alters the calculus.

Of course, the argument for protection is undiminished, perhaps even enhanced, by utility: if we want more of an intellectual product, a temporary monopoly for the creator provides incentives for others to create other, different items in this class. But the "cost" side of the equation may be different where one places a very high value on public access to a useful innovation that may be the most efficient means of performing a given task. Thus, the argument for extending protection may be the same; but the stakes on the other side are much higher.

It is no accident that patent protection has preconditions that copyright protection does not — notably, the requirements of novelty and non-obviousness — and that patents are granted for a shorter period than copyrights. This problem of utility has sometimes manifested itself in copyright cases, such as Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879), and been dealt with through various formulations that limit copyright or create limited rights to copy. But the case law and doctrine addressed to utility in copyright have been brief detours in the general march of copyright law.

Requests for the protection of computer menus present the concern with fencing off access to the commons in an acute form. A new menu may be a creative work, but over time its importance may come to reside more in the investment that has been made by users in learning the menu and in building their own mini-programs — macros — in reliance upon the menu. Better typewriter keyboard [820] layouts may exist, but the familiar QWERTY keyboard dominates the market because that is what everyone has learned to use. See P. David, CLIO and the Economics of QWERTY, 75 Am.Econ.Rev. 332 (1985). The QWERTY keyboard is nothing other than a menu of letters.

Thus, to assume that computer programs are just one more new means of expression, like a filmed play, may be quite wrong. The "form" — the written source code or the menu structure depicted on the screen — look hauntingly like the familiar stuff of copyright; but the "substance" probably has more to do with problems presented in patent law or, as already noted, in those rare cases where copyright law has confronted industrially useful expressions. Applying copyright law to computer programs is like assembling a jigsaw puzzle whose pieces do not quite fit.

All of this would make no difference if Congress had squarely confronted the issue, and given explicit directions as to what should be done. The Copyright Act of 1976 took a different course. While Congress said that computer programs might be subject to copyright protection, it said this in very general terms; and, especially in § 102(b), Congress adopted a string of exclusions that if taken literally might easily seem to exclude most computer programs from protection. The only detailed prescriptions for computers involve narrow issues (like back-up copies) of no relevance here.

Of course, one could still read the statute as a congressional command that the familiar doctrines of copyright law be taken and applied to computer programs, in cookie cutter fashion, as if the programs were novels or play scripts. Some of the cases involving computer programs embody this approach. It seems to be mistaken on two different grounds: the tradition of copyright law, and the likely intent of Congress.

The broad-brush conception of copyright protection, the time limits, and the formalities have long been prescribed by statute. But the heart of copyright doctrine — what may be protected and with what limitations and exceptions — has been developed by the courts through experience with individual cases. B. Kaplan, An Unhurried View of Copyright 40 (1967). Occasionally Congress addresses a problem in detail. For the most part the interstitial development of copyright through the courts is our tradition.

Nothing in the language or legislative history of the 1976 Act, or at least nothing brought to our attention, suggests that Congress meant the courts to abandon this case-by-case approach. Indeed, by setting up § 102(b) as a counterpoint theme, Congress has arguably recognized the tension and left it for the courts to resolve through the development of case law. And case law development is adaptive: it allows new problems to be solved with help of earlier doctrine, but it does not preclude new doctrines to meet new situations.

II.

In this case, the raw facts are mostly, if not entirely, undisputed. Although the inferences to be drawn may be more debatable, it is very hard to see that Borland has shown any interest in the Lotus menu except as a fall-back option for those users already committed to it by prior experience or in order to run their own macros using 1-2-3 commands. At least for the amateur, accessing the Lotus menu in the Borland Quattro or Quattro Pro program takes some effort.

Put differently, it is unlikely that users who value the Lotus menu for its own sake — independent of any investment they have made themselves in learning Lotus' commands or creating macros dependent upon them — would choose the Borland program in order to secure access to the Lotus menu. Borland's success is due primarily to other features. Its rationale for deploying the Lotus menu bears the ring of truth.

Now, any use of the Lotus menu by Borland is a commercial use and deprives Lotus of a portion of its "reward," in the sense that an infringement claim if allowed would increase Lotus' profits. But this is circular reasoning: broadly speaking, every limitation on copyright or privileged use diminishes the reward of the original creator. Yet not every writing is copyrightable or every use an infringement. The provision of reward is [821] one concern of copyright law, but it is not the only one. If it were, copyrights would be perpetual and there would be no exceptions.

The present case is an unattractive one for copyright protection of the menu. The menu commands (e.g., "print," "quit") are largely for standard procedures that Lotus did not invent and are common words that Lotus cannot monopolize. What is left is the particular combination and sub-grouping of commands in a pattern devised by Lotus. This arrangement may have a more appealing logic and ease of use than some other configurations; but there is a certain arbitrariness to many of the choices.

If Lotus is granted a monopoly on this pattern, users who have learned the command structure of Lotus 1-2-3 or devised their own macros are locked into Lotus, just as a typist who has learned the QWERTY keyboard would be the captive of anyone who had a monopoly on the production of such a keyboard. Apparently, for a period Lotus 1-2-3 has had such sway in the market that it has represented the de facto standard for electronic spreadsheet commands. So long as Lotus is the superior spreadsheet — either in quality or in price — there may be nothing wrong with this advantage.

But if a better spreadsheet comes along, it is hard to see why customers who have learned the Lotus menu and devised macros for it should remain captives of Lotus because of an investment in learning made by the users and not by Lotus. Lotus has already reaped a substantial reward for being first; assuming that the Borland program is now better, good reasons exist for freeing it to attract old Lotus customers: to enable the old customers to take advantage of a new advance, and to reward Borland in turn for making a better product. If Borland has not made a better product, then customers will remain with Lotus anyway.

Thus, for me the question is not whether Borland should prevail but on what basis. Various avenues might be traveled, but the main choices are between holding that the menu is not protectable by copyright and devising a new doctrine that Borland's use is privileged. No solution is perfect and no intermediate appellate court can make the final choice.

To call the menu a "method of operation" is, in the common use of those words, a defensible position. After all, the purpose of the menu is not to be admired as a work of literary or pictorial art. It is to transmit directions from the user to the computer, i.e., to operate the computer. The menu is also a "method" in the dictionary sense because it is a "planned way of doing something," an "order or system," and (aptly here) an "orderly or systematic arrangement, sequence or the like." Random House Webster's College Dictionary 853 (1991).

A different approach would be to say that Borland's use is privileged because, in the context already described, it is not seeking to appropriate the advances made by Lotus' menu; rather, having provided an arguably more attractive menu of its own, Borland is merely trying to give former Lotus users an option to exploit their own prior investment in learning or in macros. The difference is that such a privileged use approach would not automatically protect Borland if it had simply copied the Lotus menu (using different codes), contributed nothing of its own, and resold Lotus under the Borland label.

The closest analogue in conventional copyright is the fair use doctrine. E.g., Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). Although invoked by Borland, it has largely been brushed aside in this case because the Supreme Court has said that it is "presumptively" unavailable where the use is a "commercial" one. See id. at 562, 105 S.Ct. at 2231-32. But see Campbell v. Acuff-Rose Music, Inc., ___ U.S. ___, ___, 114 S.Ct. 1164, 1174, 127 L.Ed.2d 500 (1994). In my view, this is something less than a definitive answer; "presumptively" does not mean "always" and, in any event, the doctrine of fair use was created by the courts and can be adapted to new purposes.

But a privileged use doctrine would certainly involve problems of its own. It might more closely tailor the limits on copyright protection to the reasons for limiting that protection; but it would entail a host of administrative problems that would cause [822] cost and delay, and would also reduce the ability of the industry to predict outcomes. Indeed, to the extent that Lotus' menu is an important standard in the industry, it might be argued that any use ought to be deemed privileged.

In sum, the majority's result persuades me and its formulation is as good, if not better, than any other that occurs to me now as within the reach of courts. Some solutions (e.g., a very short copyright period for menus) are not options at all for courts but might be for Congress. In all events, the choices are important ones of policy, not linguistics, and they should be made with the underlying considerations in view.

[1] Judge Keeton presided over both the Paperback litigation and this case.

[2] Lotus 1-2-3 utilizes a two-line menu; the top line lists the commands from which the user may choose, and the bottom line displays what Lotus calls its "long prompts." The long prompts explain, as a sort of "help text," what the highlighted menu command will do if entered. For example, the long prompt for the "Worksheet" command displays the submenu that the "Worksheet" command calls up; it reads "Global, Insert, Delete, Column, Erase, Titles, Window, Status, Page." The long prompt for the "Copy" command explains what function the "Copy" command will perform: "Copy a cell or range of cells." The long prompt for the "Quit" command reads, "End 1-2-3 session (Have you saved your work?)."

Prior to trial, the parties agreed to exclude the copying of the long prompts from the case; Lotus agreed not to contend that Borland had copied the long prompts, Borland agreed not to argue that it had not copied the long prompts, and both sides agreed not to argue that the issue of whether Borland had copied the long prompts was material to any other issue in the case. See Borland III, 831 F.Supp. at 208.

[3] Because Borland's programs could no longer display the Lotus menu command hierarchy to users, the Key Reader did not allow debugging or modification of macros, nor did it permit the execution of most interactive macros.

[4] See Borland IV, 831 F.Supp. at 226-27, for a more detailed explanation of macros and the Key Reader.

[5] Computer programs receive copyright protection as "literary works." See 17 U.S.C. § 102(a)(1) (granting protection to "literary works") and 17 U.S.C. § 101 (defining "literary works" as "works ... expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, phonorecords, film, tapes, disks, or cards, in which they are embodied" (emphasis added)); see also H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5667 ("The term `literary works' ... includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.").

[6] Selden's system of double-entry bookkeeping is the now almost-universal T-accounts system.

[7] We consider the Altai test because both parties and many of the amici focus on it so heavily. Borland, in particular, is highly critical of the district court for not employing the Altai test. Borland does not, however, indicate how using that test would have been dispositive in Borland's favor. Interestingly, Borland appears to contract its own reasoning at times by criticizing the applicability of the Altai test.

[8] We recognize that Altai never states that every work contains a copyrightable "nugget" of protectable expression. Nonetheless, the implication is that for literal copying, "it is not necessary to determine the level of abstraction at which similarity ceases to consist of an `expression of ideas,' because literal similarity by definition is always a similarity as to the expression of ideas." 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[A](2) (1993).

[9] As the Lotus long prompts are not before us on appeal, we take no position on their copyrightability, although we do note that a strong argument could be made that the brief explanations they provide "merge" with the underlying idea of explaining such functions. See Morrissey v. Procter & Gamble Co., 379 F.2d 675, 678-79 (1st Cir.1967) (when the possible ways to express an idea are limited, the expression "merges" with the idea and is therefore uncopyrightable; when merger occurs, identical copying is permitted).

[10] As they are not before us on appeal, we take no position on whether the Lotus 1-2-3 screen displays constitute original expression capable of being copyrighted.

[11] Because the Lotus 1-2-3 code is not before us on appeal, we take no position on whether it is copyrightable. We note, however, that original computer codes generally are protected by copyright. See, e.g., Altai, 982 F.2d at 702 ("It is now well settled that the literal elements of computer programs, i.e., their source and object codes, are the subject of copyright protection.") (citing cases).

[12] We think that the Altai test would contemplate this being the initial inquiry.

[13] When there are a limited number of ways to express an idea, however, the expression "merges" with the idea and becomes uncopyrightable. Morrissey, 379 F.2d at 678-79.

[14] The Ninth Circuit has also indicated in dicta that "menus, and keystrokes" may be copyrightable. Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1477 (9th Cir.), cert. denied, BB Asset Management, Inc. v. Symantec Corp., ___ U.S. ___, 113 S.Ct. 198, 121 L.Ed.2d 141 (1992). In that case, however, the plaintiff did not show that the defendant had copied the plaintiff's menus or keystrokes, so the court was not directly faced with whether the menus or keystrokes constituted an unprotectable method of operation. Id.

 

4.2.2 Computer Associates International, Inc. v. Altai, Inc., 4.2.2 Computer Associates International, Inc. v. Altai, Inc.,

982 F.2d 693
119 A.L.R.Fed. 741, 61 USLW 2434, 37
Fed. R. Evid. Serv. 348

COMPUTER ASSOCIATES INTERNATIONAL, INC.,
Plaintiff-Appellant-Cross-Appellee,
v.
ALTAI, INC., Defendant-Appellee-Cross-Appellant.

No. 762, Dockets 91-7893, 91-7935.
United States Court of Appeals,
Second Circuit.
Argued Jan. 9, 1992.
Decided June 22, 1992.
Amended Opinion Dec. 17, 1992.

[695] Stephen D. Kahn, New York City (Stuart D. Levi, Beth K. Neelman, Carol A. Motyka, Weil, Gotshal & Manges, Michael A. [696] McElroy, Computer Associates Intern., Inc., of counsel), for plaintiff-appellant, cross-appellee.

Susan G. Braden, Washington, DC (Christ M. Kacoyannakis, Anderson Kill Olick & Oshinshy, Washington, DC, Stephen D. Susman, Susman Godfrey, Houston, TX, of counsel), for defendant-appellee, cross-appellant.

Bruce A. Lehman, Swidler & Berlin, Washington, DC, filed a brief amicus curiae, on behalf of The Software Publishers Ass'n.

Peter M.C. Choy, Mountain View, CA, filed a brief amicus curiae, on behalf of the American Committee for Interoperable Systems.

J. David Cabello, Houston, TX, David R. Bradford, Provo, UT, Robert H. Kohn, Scotts Valley, CA, filed a brief amici curiae, on behalf of Compaq Computer Corp., Novell, Inc., and Borland Intern., Inc.

Before ALTIMARI, MAHONEY and WALKER, Circuit Judges.

WALKER, Circuit Judge:

In recent years, the growth of computer science has spawned a number of challenging legal questions, particularly in the field of copyright law. As scientific knowledge advances, courts endeavor to keep pace, and sometimes--as in the area of computer technology--they are required to venture into less than familiar waters. This is not a new development, though. "From its beginning, the law of copyright has developed in response to significant changes in technology." Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 430, 104 S.Ct. 774, 782, 78 L.Ed.2d 574 (1984).

Article I, section 8 of the Constitution authorizes Congress "[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." The Supreme Court has stated that "[t]he economic philosophy behind the clause ... is the conviction that encouragement of individual effort by personal gain is the best way to advance public welfare...." Mazer v. Stein, 347 U.S. 201, 219, 74 S.Ct. 460, 471, 98 L.Ed. 630 (1954). The author's benefit, however, is clearly a "secondary" consideration. See United States v. Paramount Pictures, Inc., 334 U.S. 131, 158, 68 S.Ct. 915, 929, 92 L.Ed. 1260 (1948). "[T]he ultimate aim is, by this incentive, to stimulate artistic creativity for the general public good." Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156, 95 S.Ct. 2040, 2044, 45 L.Ed.2d 84 (1975).

Thus, the copyright law seeks to establish a delicate equilibrium. On the one hand, it affords protection to authors as an incentive to create, and, on the other, it must appropriately limit the extent of that protection so as to avoid the effects of monopolistic stagnation. In applying the federal act to new types of cases, courts must always keep this symmetry in mind. Id.

Among other things, this case deals with the challenging question of whether and to what extent the "non-literal" aspects of a computer program, that is, those aspects that are not reduced to written code, are protected by copyright. While a few other courts have already grappled with this issue, this case is one of first impression in this circuit. As we shall discuss, we find the results reached by other courts to be less than satisfactory. Drawing upon long-standing doctrines of copyright law, we take an approach that we think better addresses the practical difficulties embedded in these types of cases. In so doing, we have kept in mind the necessary balance between creative incentive and industrial competition.

This appeal comes to us from the United States District Court for the Eastern District of New York, the Honorable George C. Pratt, Circuit Judge, sitting by designation. By Memorandum and Order entered August 12, 1991, Judge Pratt found that defendant Altai, Inc.'s ("Altai"), OSCAR 3.4 computer program had infringed plaintiff Computer Associates' ("CA"), copyrighted computer program entitled CA-SCHEDULER. Accordingly, the district court awarded CA $364,444 in actual damages and apportioned profits. Altai has [697] abandoned its appeal from this award. With respect to CA's second claim for copyright infringement, Judge Pratt found that Altai's OSCAR 3.5 program was not substantially similar to a portion of CA-SCHEDULER called ADAPTER, and thus denied relief. Finally, the district court concluded that CA's state law trade secret misappropriation claim against Altai had been preempted by the federal Copyright Act. CA appealed from these findings.

Because we are in full agreement with Judge Pratt's decision and in substantial agreement with his careful reasoning regarding CA's copyright infringement claim, we affirm the district court's judgment on that issue. However, we vacate the district court's preemption ruling with respect to CA's trade secret claim, and remand the case to the district court for further proceedings.

BACKGROUND

We assume familiarity with the facts set forth in the district court's comprehensive and scholarly opinion. See Computer Assocs. Int'l., Inc. v. Altai, Inc., 775 F.Supp. 544, 549-55 (E.D.N.Y.1991). Thus, we summarize only those facts necessary to resolve this appeal.

I. COMPUTER PROGRAM DESIGN

Certain elementary facts concerning the nature of computer programs are vital to the following discussion. The Copyright Act defines a computer program as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result." 17 U.S.C. § 101. In writing these directions, the programmer works "from the general to the specific." Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1229 (3d Cir.1986), cert. denied, 479 U.S. 1031, 107 S.Ct. 877, 93 L.Ed.2d 831 (1987). See generally Steven R. Englund, Note, Idea, Process, or Protected Expression?: Determining the Scope of Copyright Protection of the Structure of Computer Programs, 88 MICH.L.REV. 866, 867-73 (1990) (hereinafter "Englund"); Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs, 41 STAN.L.REV. 1045, 1051-57 (1989) (hereinafter "Menell"); Mark T. Kretschmer, Note, Copyright Protection For Software Architecture: Just Say No!, 1988 COLUM.BUS.L.REV. 823, 824-27 (1988) (hereinafter "Kretschmer"); Peter G. Spivack, Comment, Does Form Follow Function? The Idea/Expression Dichotomy In Copyright Protection of Computer Software, 35 U.C.L.A.L.REV. 723, 729-31 (1988) (hereinafter "Spivack").

The first step in this procedure is to identify a program's ultimate function or purpose. An example of such an ultimate purpose might be the creation and maintenance of a business ledger. Once this goal has been achieved, a programmer breaks down or "decomposes" the program's ultimate function into "simpler constituent problems or 'subtasks,' " Englund, at 870, which are also known as subroutines or modules. See Spivack, at 729. In the context of a business ledger program, a module or subroutine might be responsible for the task of updating a list of outstanding accounts receivable. Sometimes, depending upon the complexity of its task, a subroutine may be broken down further into sub-subroutines.

Having sufficiently decomposed the program's ultimate function into its component elements, a programmer will then arrange the subroutines or modules into what are known as organizational or flow charts. Flow charts map the interactions between modules that achieve the program's end goal. See Kretschmer, at 826.

In order to accomplish these intra-program interactions, a programmer must carefully design each module's parameter list. A parameter list, according to the expert appointed and fully credited by the district court, Dr. Randall Davis, is "the information sent to and received from a subroutine." See Report of Dr. Randall Davis, at 12. The term "parameter list" refers to the form in which information is passed between modules (e.g. for accounts receivable, the designated time frame and particular customer identifying number) and the information's actual content (e.g. [698] 8/91-7/92; customer No. 3). Id. With respect to form, interacting modules must share similar parameter lists so that they are capable of exchanging information.

"The functions of the modules in a program together with each module's relationships to other modules constitute the 'structure' of the program." Englund, at 871. Additionally, the term structure may include the category of modules referred to as "macros." A macro is a single instruction that initiates a sequence of operations or module interactions within the program. Very often the user will accompany a macro with an instruction from the parameter list to refine the instruction (e.g. current total of accounts receivable (macro), but limited to those for 8/91 to 7/92 from customer No. 3 (parameters)).

In fashioning the structure, a programmer will normally attempt to maximize the program's speed, efficiency, as well as simplicity for user operation, while taking into consideration certain externalities such as the memory constraints of the computer upon which the program will be run. See id.; Kretschmer, at 826; Menell, at 1052. "This stage of program design often requires the most time and investment." Kretschmer, at 826.

Once each necessary module has been identified, designed, and its relationship to the other modules has been laid out conceptually, the resulting program structure must be embodied in a written language that the computer can read. This process is called "coding," and requires two steps. Whelan, 797 F.2d at 1230. First, the programmer must transpose the program's structural blue-print into a source code. This step has been described as "comparable to the novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Kretschmer, at 826. The source code may be written in any one of several computer languages, such as COBAL, FORTRAN, BASIC, EDL, etc., depending upon the type of computer for which the program is intended. Whelan, 797 F.2d at 1230. Once the source code has been completed, the second step is to translate or "compile" it into object code. Object code is the binary language comprised of zeros and ones through which the computer directly receives its instructions. Id. at 1230-31; Englund, at 868 & n. 13.

After the coding is finished, the programmer will run the program on the computer in order to find and correct any logical and syntactical errors. This is known as "debugging" and, once done, the program is complete. See Kretschmer, at 826-27.

II. FACTS

CA is a Delaware corporation, with its principal place of business in Garden City, New York. Altai is a Texas corporation, doing business primarily in Arlington, Texas. Both companies are in the computer software industry--designing, developing and marketing various types of computer programs.

The subject of this litigation originates with one of CA's marketed programs entitled CA-SCHEDULER. CA-SCHEDULER is a job scheduling program designed for IBM mainframe computers. Its primary functions are straightforward: to create a schedule specifying when the computer should run various tasks, and then to control the computer as it executes the schedule. CA-SCHEDULER contains a sub-program entitled ADAPTER, also developed by CA. ADAPTER is not an independently marketed product of CA; it is a wholly integrated component of CA-SCHEDULER and has no capacity for independent use.

Nevertheless, ADAPTER plays an extremely important role. It is an "operating system compatibility component," which means, roughly speaking, it serves as a translator. An "operating system" is itself a program that manages the resources of the computer, allocating those resources to other programs as needed. The IBM System 370 family of computers, for which CA-SCHEDULER was created, is, depending upon the computer's size, designed to contain one of three operating systems: DOS/VSE, MVS, or CMS. As the district court noted, the general rule is that "a [699] program written for one operating system, e.g., DOS/VSE, will not, without modification, run under another operating system such as MVS." Computer Assocs., 775 F.Supp. at 550. ADAPTER's function is to translate the language of a given program into the particular language that the computer's own operating system can understand.

The district court succinctly outlined the manner in which ADAPTER works within the context of the larger program. In order to enable CA-SCHEDULER to function on different operating systems, CA divided the CA-SCHEDULER into two components:

--a first component that contains only the task-specific portions of the program, independent of all operating system issues, and

--a second component that contains all the interconnections between the first component and the operating system.

In a program constructed in this way, whenever the first, task-specific, component needs to ask the operating system for some resource through a "system call", it calls the second component instead of calling the operating system directly.

The second component serves as an "interface" or "compatibility component" between the task-specific portion of the program and the operating system. It receives the request from the first component and translates it into the appropriate system call that will be recognized by whatever operating system is installed on the computer, e.g., DOS/VSE, MVS, or CMS. Since the first, task-specific component calls the adapter component rather than the operating system, the first component need not be customized to use any specific operating system. The second, interface, component insures that all the system calls are performed properly for the particular operating system in use.

Id. at 551.

ADAPTER serves as the second, "common system interface" component referred to above.

A program like ADAPTER, which allows a computer user to change or use multiple operating systems while maintaining the same software, is highly desirable. It saves the user the costs, both in time and money, that otherwise would be expended in purchasing new programs, modifying existing systems to run them, and gaining familiarity with their operation. The benefits run both ways. The increased compatibility afforded by an ADAPTER-like component, and its resulting popularity among consumers, makes whatever software in which it is incorporated significantly more marketable.

Starting in 1982, Altai began marketing its own job scheduling program entitled ZEKE. The original version of ZEKE was designed for use in conjunction with a VSE operating system. By late 1983, in response to customer demand, Altai decided to rewrite ZEKE so that it could be run in conjunction with an MVS operating system.

At that time, James P. Williams ("Williams"), then an employee of Altai and now its President, approached Claude F. Arney, III ("Arney"), a computer programmer who worked for CA. Williams and Arney were longstanding friends, and had in fact been co-workers at CA for some time before Williams left CA to work for Altai's predecessor. Williams wanted to recruit Arney to assist Altai in designing an MVS version of ZEKE.

At the time he first spoke with Arney, Williams was aware of both the CA-SCHEDULER and ADAPTER programs. However, Williams was not involved in their development and had never seen the codes of either program. When he asked Arney to come work for Altai, Williams did not know that ADAPTER was a component of CA-SCHEDULER.

Arney, on the other hand, was intimately familiar with various aspects of ADAPTER. While working for CA, he helped improve the VSE version of ADAPTER, and was permitted to take home a copy of ADAPTER'S source code. This apparently developed into an irresistible habit, for when Arney left CA to work for Altai in January, 1984, he took with him copies of [700] the source code for both the VSE and MVS versions of ADAPTER. He did this in knowing violation of the CA employee agreements that he had signed.

Once at Altai, Arney and Williams discussed design possibilities for adapting ZEKE to run on MVS operating systems. Williams, who had created the VSE version of ZEKE, thought that approximately 30% of his original program would have to be modified in order to accommodate MVS. Arney persuaded Williams that the best way to make the needed modifications was to introduce a "common system interface" component into ZEKE. He did not tell Williams that his idea stemmed from his familiarity with ADAPTER. They decided to name this new component-program OSCAR.

Arney went to work creating OSCAR at Altai's offices using the ADAPTER source code. The district court accepted Williams' testimony that no one at Altai, with the exception of Arney, affirmatively knew that Arney had the ADAPTER code, or that he was using it to create OSCAR/VSE. However, during this time period, Williams' office was adjacent to Arney's. Williams testified that he and Arney "conversed quite frequently" while Arney was "investigating the source code of ZEKE" and that Arney was in his office "a number of times daily, asking questions." In three months, Arney successfully completed the OSCAR/VSE project. In an additional month he developed an OSCAR/MVS version. When the dust finally settled, Arney had copied approximately 30% of OSCAR's code from CA's ADAPTER program.

The first generation of OSCAR programs was known as OSCAR 3.4. From 1985 to August 1988, Altai used OSCAR 3.4 in its ZEKE product, as well as in programs entitled ZACK and ZEBB. In late July 1988, CA first learned that Altai may have appropriated parts of ADAPTER. After confirming its suspicions, CA secured copyrights on its 2.1 and 7.0 versions of CA-SCHEDULER. CA then brought this copyright and trade secret misappropriation action against Altai.

Apparently, it was upon receipt of the summons and complaint that Altai first learned that Arney had copied much of the OSCAR code from ADAPTER. After Arney confirmed to Williams that CA's accusations of copying were true, Williams immediately set out to survey the damage. Without ever looking at the ADAPTER code himself, Williams learned from Arney exactly which sections of code Arney had taken from ADAPTER.

Upon advice of counsel, Williams initiated OSCAR's rewrite. The project's goal was to save as much of OSCAR 3.4 as legitimately could be used, and to excise those portions which had been copied from ADAPTER. Arney was entirely excluded from the process, and his copy of the ADAPTER code was locked away. Williams put eight other programmers on the project, none of whom had been involved in any way in the development of OSCAR 3.4. Williams provided the programmers with a description of the ZEKE operating system services so that they could rewrite the appropriate code. The rewrite project took about six months to complete and was finished in mid-November 1989. The resulting program was entitled OSCAR 3.5.

From that point on, Altai shipped only OSCAR 3.5 to its new customers. Altai also shipped OSCAR 3.5 as a "free upgrade" to all customers that had previously purchased OSCAR 3.4. While Altai and Williams acted responsibly to correct Arney's literal copying of the ADAPTER program, copyright infringement had occurred.

After CA originally instituted this action in the United States District Court for the District of New Jersey, the parties stipulated its transfer in March, 1989, to the Eastern District of New York where it was assigned to Judge Jacob Mishler. On October 26, 1989, Judge Mishler transferred the case to Judge Pratt who was sitting in the district court by designation. Judge Pratt conducted a six day trial from March 28 through April 6, 1990. He entered judgment on August 12, 1991, and this appeal followed.

[701] DISCUSSION

While both parties originally appealed from different aspects of the district court's judgment, Altai has now abandoned its appellate claims. In particular, Altai has conceded liability for the copying of ADAPTER into OSCAR 3.4 and raises no challenge to the award of $364,444 in damages on that score. Thus, we address only CA's appeal from the district court's rulings that: (1) Altai was not liable for copyright infringement in developing OSCAR 3.5; and (2) in developing both OSCAR 3.4 and 3.5, Altai was not liable for misappropriating CA's trade secrets.

CA makes two arguments. First, CA contends that the district court applied an erroneous method for determining whether there exists substantial similarity between computer programs, and thus, erred in determining that OSCAR 3.5 did not infringe the copyrights held on the different versions of its CA-SCHEDULER program. CA asserts that the test applied by the district court failed to account sufficiently for a computer program's non-literal elements. Second, CA maintains that the district court erroneously concluded that its state law trade secret claims had been preempted by the federal Copyright Act. See 17 U.S.C. § 301(a). We shall address each argument in turn.

I. COPYRIGHT INFRINGEMENT

In any suit for copyright infringement, the plaintiff must establish its ownership of a valid copyright, and that the defendant copied the copyrighted work. See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 (2d Cir.1977); see also 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.01, at 13-4 (1991) (hereinafter "Nimmer"). The plaintiff may prove defendant's copying either by direct evidence or, as is most often the case, by showing that (1) the defendant had access to the plaintiff's copyrighted work and (2) that defendant's work is substantially similar to the plaintiff's copyrightable material. See Walker v. Time Life Films, Inc., 784 F.2d 44, 48 (2d Cir.), cert. denied, 476 U.S. 1159, 106 S.Ct. 2278, 90 L.Ed.2d 721 (1986).

For the purpose of analysis, the district court assumed that Altai had access to the ADAPTER code when creating OSCAR 3.5. See Computer Assocs., 775 F.Supp. at 558. Thus, in determining whether Altai had unlawfully copied protected aspects of CA's ADAPTER, the district court narrowed its focus of inquiry to ascertaining whether Altai's OSCAR 3.5 was substantially similar to ADAPTER. Because we approve Judge Pratt's conclusions regarding substantial similarity, our analysis will proceed along the same assumption.

As a general matter, and to varying degrees, copyright protection extends beyond a literary work's strictly textual form to its non-literal components. As we have said, "[i]t is of course essential to any protection of literary property ... that the right cannot be limited literally to the text, else a plagiarist would escape by immaterial variations." Nichols v. Universal Pictures Co., 45 F.2d 119, 121 (2d Cir.1930) (L. Hand, J.), cert. denied, 282 U.S. 902, 51 S.Ct. 216, 75 L.Ed. 795 (1931). Thus, where "the fundamental essence or structure of one work is duplicated in another," 3 Nimmer, § 13.03[A], at 13-24, courts have found copyright infringement. See, e.g., Horgan v. Macmillan, 789 F.2d 157, 162 (2d Cir.1986) (recognizing that a book of photographs might infringe ballet choreography); Twentieth Century-Fox Film Corp. v. MCA, Inc., 715 F.2d 1327, 1329 (9th Cir.1983) (motion picture and television series); Sid & Marty Krofft Television Prods., Inc. v. McDonald's Corp., 562 F.2d 1157, 1167 (9th Cir.1977) (television commercial and television series); Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 55 (2d Cir.), cert. denied, 298 U.S. 669, 56 S.Ct. 835, 80 L.Ed. 1392 (1936) (play and motion picture); accord Stewart v. Abend, 495 U.S. 207, 238, 110 S.Ct. 1750, 1769, 109 L.Ed.2d 184 (1990) (recognizing that motion picture may infringe copyright in book by using its "unique setting, characters, plot, and sequence of events"). This black letter proposition is the springboard for our discussion.

[702] A. Copyright Protection for the Non-literal Elements of Computer Programs

It is now well settled that the literal elements of computer programs, i.e., their source and object codes, are the subject of copyright protection. See Whelan, 797 F.2d at 1233 (source and object code); CMS Software Design Sys., Inc. v. Info Designs, Inc., 785 F.2d 1246, 1247 (5th Cir.1986) (source code); Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1249 (3d Cir.1983), cert. dismissed, 464 U.S. 1033, 104 S.Ct. 690, 79 L.Ed.2d 158 (1984) (source and object code); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir.1982) (object code). Here, as noted earlier, Altai admits having copied approximately 30% of the OSCAR 3.4 program from CA's ADAPTER source code, and does not challenge the district court's related finding of infringement.

In this case, the hotly contested issues surround OSCAR 3.5. As recounted above, OSCAR 3.5 is the product of Altai's carefully orchestrated rewrite of OSCAR 3.4. After the purge, none of the ADAPTER source code remained in the 3.5 version; thus, Altai made sure that the literal elements of its revamped OSCAR program were no longer substantially similar to the literal elements of CA's ADAPTER.

According to CA, the district court erroneously concluded that Altai's OSCAR 3.5 was not substantially similar to its own ADAPTER program. CA argues that this occurred because the district court "committed legal error in analyzing [its] claims of copyright infringement by failing to find that copyright protects expression contained in the non-literal elements of computer software." We disagree.

CA argues that, despite Altai's rewrite of the OSCAR code, the resulting program remained substantially similar to the structure of its ADAPTER program. As discussed above, a program's structure includes its non-literal components such as general flow charts as well as the more specific organization of inter-modular relationships, parameter lists, and macros. In addition to these aspects, CA contends that OSCAR 3.5 is also substantially similar to ADAPTER with respect to the list of services that both ADAPTER and OSCAR obtain from their respective operating systems. We must decide whether and to what extent these elements of computer programs are protected by copyright law.

The statutory terrain in this area has been well explored. See Lotus Dev. Corp. v. Paperback Software Int'l, 740 F.Supp. 37, 47-51 (D.Mass.1990); see also Whelan, 797 F.2d at 1240-42; Englund, at 885-90; Spivack, at 731-37. The Copyright Act affords protection to "original works of authorship fixed in any tangible medium of expression...." 17 U.S.C. § 102(a). This broad category of protected "works" includes "literary works," id. at § 102(a)(1), which are defined by the Act as

works, other than audiovisual works, expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, manuscripts, phonorecords, film tapes, disks, or cards, in which they are embodied.

17 U.S.C. § 101. While computer programs are not specifically listed as part of the above statutory definition, the legislative history leaves no doubt that Congress intended them to be considered literary works. See H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5667 (hereinafter "House Report" ); Whelan, 797 F.2d at 1234; Apple Computer, 714 F.2d at 1247.

The syllogism that follows from the foregoing premises is a powerful one: if the non-literal structures of literary works are protected by copyright; and if computer programs are literary works, as we are told by the legislature; then the non-literal structures of computer programs are protected by copyright. See Whelan, 797 F.2d at 1234 ("By analogy to other literary works, it would thus appear that the copyrights of computer programs can be infringed even absent copying of the literal elements of the program."). We have no reservation in joining the company of those courts that have already ascribed to this logic. See, e.g., Johnson Controls, Inc. v. [703] Phoenix Control Sys., Inc., 886 F.2d 1173, 1175 (9th Cir.1989); Lotus Dev. Corp., 740 F.Supp. at 54; Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F.Supp. 449, 455-56 (N.D.Ga.1987); Q-Co Industries, Inc. v. Hoffman, 625 F.Supp. 608, 615 (S.D.N.Y.1985); SAS Inst., Inc. v. S & H Computer Sys., Inc., 605 F.Supp. 816, 829-30 (M.D.Tenn.1985). However, that conclusion does not end our analysis. We must determine the scope of copyright protection that extends to a computer program's non-literal structure.

As a caveat, we note that our decision here does not control infringement actions regarding categorically distinct works, such as certain types of screen displays. These items represent products of computer programs, rather than the programs themselves, and fall under the copyright rubric of audiovisual works. If a computer audiovisual display is copyrighted separately as an audiovisual work, apart from the literary work that generates it (i.e., the program), the display may be protectable regardless of the underlying program's copyright status. See Stern Elecs., Inc. v. Kaufman, 669 F.2d 852, 855 (2d Cir.1982) (explaining that an audiovisual works copyright, rather than a copyright on the underlying program, extended greater protection to the sights and sounds generated by a computer video game because the same audiovisual display could be generated by different programs). Of course, the copyright protection that these displays enjoy extends only so far as their expression is protectable. See Data East USA, Inc. v. Epyx, Inc., 862 F.2d 204, 209 (9th Cir.1988). In this case, however, we are concerned not with a program's display, but the program itself, and then with only its non-literal components. In considering the copyrightability of these components, we must refer to venerable doctrines of copyright law.

1) Idea vs. Expression Dichotomy

It is a fundamental principle of copyright law that a copyright does not protect an idea, but only the expression of the idea. See Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879); Mazer v. Stein, 347 U.S. 201, 217, 74 S.Ct. 460, 470, 98 L.Ed. 630 (1954). This axiom of common law has been incorporated into the governing statute. Section 102(b) of the Act provides:

In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.

17 U.S.C. § 102(b). See also House Report, at 5670 ("Copyright does not preclude others from using ideas or information revealed by the author's work.").

Congress made no special exception for computer programs. To the contrary, the legislative history explicitly states that copyright protects computer programs only "to the extent that they incorporate authorship in programmer's expression of original ideas, as distinguished from the ideas themselves." Id. at 5667; see also id. at 5670 ("Section 102(b) is intended ... to make clear that the expression adopted by the programmer is the copyrightable element in a computer program, and that the actual processes or methods embodied in the program are not within the scope of copyright law.").

Similarly, the National Commission on New Technological Uses of Copyrighted Works ("CONTU") established by Congress to survey the issues generated by the interrelationship of advancing technology and copyright law, see Pub.L. No. 93-573, § 201, 88 Stat. 1873 (1974), recommended, inter alia, that the 1976 Copyright Act "be amended ... to make it explicit that computer programs, to the extent that they embody the author's original creation, are proper subject matter for copyright." See National Commission on New Technological Uses of Copyrighted Works, Final Report 1 (1979) (hereinafter "CONTU Report" ). To that end, Congress adopted CONTU's suggestions and amended the Copyright Act by adding, among other things, a provision to 17 U.S.C. § 101 which defined the term "computer program." See Pub.L. No. 96-517, § 10(a), 94 Stat. [704] 3028 (1980). CONTU also "concluded that the idea-expression distinction should be used to determine which aspects of computer programs are copyrightable." Lotus Dev. Corp., 740 F.Supp. at 54 (citing CONTU Report, at 44).

Drawing the line between idea and expression is a tricky business. Judge Learned Hand noted that "[n]obody has ever been able to fix that boundary, and nobody ever can." Nichols, 45 F.2d at 121. Thirty years later his convictions remained firm. "Obviously, no principle can be stated as to when an imitator has gone beyond copying the 'idea,' and has borrowed its 'expression,' " Judge Hand concluded. "Decisions must therefore inevitably be ad hoc." Peter Pan Fabrics, Inc. v. Martin Weiner Corp., 274 F.2d 487, 489 (2d Cir.1960).

The essentially utilitarian nature of a computer program further complicates the task of distilling its idea from its expression. See SAS Inst., 605 F.Supp. at 829; cf. Englund, at 893. In order to describe both computational processes and abstract ideas, its content "combines creative and technical expression." See Spivack, at 755. The variations of expression found in purely creative compositions, as opposed to those contained in utilitarian works, are not directed towards practical application. For example, a narration of Humpty Dumpty's demise, which would clearly be a creative composition, does not serve the same ends as, say, a recipe for scrambled eggs--which is a more process oriented text. Thus, compared to aesthetic works, computer programs hover even more closely to the elusive boundary line described in § 102(b).

The doctrinal starting point in analyses of utilitarian works, is the seminal case of Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879). In Baker, the Supreme Court faced the question of "whether the exclusive property in a system of bookkeeping can be claimed, under the law of copyright, by means of a book in which that system is explained?" Id. at 101. Selden had copyrighted a book that expounded a particular method of bookkeeping. The book contained lined pages with headings intended to illustrate the manner in which the system operated. Baker's accounting publication included ledger sheets that employed "substantially the same ruled lines and headings...." Id. Selden's testator sued Baker for copyright infringement on the theory that the ledger sheets were protected by Selden's copyright.

The Supreme Court found nothing copyrightable in Selden's bookkeeping system, and rejected his infringement claim regarding the ledger sheets. The Court held that:

The fact that the art described in the book by illustrations of lines and figures which are reproduced in practice in the application of the art, makes no difference. Those illustrations are the mere language employed by the author to convey his ideas more clearly. Had he used words of description instead of diagrams (which merely stand in the place of words), there could not be the slightest doubt that others, applying the art to practical use, might lawfully draw the lines and diagrams which were in the author's mind, and which he thus described by words in his book.

The copyright of a work on mathematical science cannot give to the author an exclusive right to the methods of operation which he propounds, or to the diagrams which he employs to explain them, so as to prevent an engineer from using them whenever occasion requires.

Id. at 103.

To the extent that an accounting text and a computer program are both "a set of statements or instructions ... to bring about a certain result," 17 U.S.C. § 101, they are roughly analogous. In the former case, the processes are ultimately conducted by human agency; in the latter, by electronic means. In either case, as already stated, the processes themselves are not protectable. But the holding in Baker goes farther. The Court concluded that those aspects of a work, which "must necessarily be used as incident to" the idea, system or process that the work describes, are also not copyrightable. 101 U.S. at 104. Selden's ledger sheets, therefore, enjoyed [705] no copyright protection because they were "necessary incidents to" the system of accounting that he described. Id. at 103. From this reasoning, we conclude that those elements of a computer program that are necessarily incidental to its function are similarly unprotectable.

While Baker v. Selden provides a sound analytical foundation, it offers scant guidance on how to separate idea or process from expression, and moreover, on how to further distinguish protectable expression from that expression which "must necessarily be used as incident to" the work's underlying concept. In the context of computer programs, the Third Circuit's noted decision in Whelan has, thus far, been the most thoughtful attempt to accomplish these ends.

The court in Whelan faced substantially the same problem as is presented by this case. There, the defendant was accused of making off with the non-literal structure of the plaintiff's copyrighted dental lab management program, and employing it to create its own competitive version. In assessing whether there had been an infringement, the court had to determine which aspects of the programs involved were ideas, and which were expression. In separating the two, the court settled upon the following conceptual approach:

[T]he line between idea and expression may be drawn with reference to the end sought to be achieved by the work in question. In other words, the purpose or function of a utilitarian work would be the work's idea, and everything that is not necessary to that purpose or function would be part of the expression of the idea.... Where there are various means of achieving the desired purpose, then the particular means chosen is not necessary to the purpose; hence, there is expression, not idea.

797 F.2d at 1236 (citations omitted). The "idea" of the program at issue in Whelan was identified by the court as simply "the efficient management of a dental laboratory." Id. at n. 28.

So far, in the courts, the Whelan rule has received a mixed reception. While some decisions have adopted its reasoning, see, e.g., Bull HN Info. Sys., Inc. v. American Express Bank, Ltd., 1990 Copyright Law Dec. (CCH) p 26,555 at 23,278, 1990 WL 48098 (S.D.N.Y.1990); Dynamic Solutions, Inc. v. Planning & Control, Inc., 1987 Copyright Law Dec. (CCH) p 26,062 at 20,912, 1987 WL 6419 (S.D.N.Y.1987); Broderbund Software Inc. v. Unison World, Inc., 648 F.Supp. 1127, 1133 (N.D.Cal.1986), others have rejected it, see Plains Cotton Co-op v. Goodpasture Computer Serv., Inc., 807 F.2d 1256, 1262 (5th Cir.), cert. denied, 484 U.S. 821, 108 S.Ct. 80, 98 L.Ed.2d 42 (1987); cf. Synercom Technology, Inc. v. University Computing Co., 462 F.Supp. 1003, 1014 (N.D.Tex.1978) (concluding that order and sequence of data on computer input formats was idea not expression).

Whelan has fared even more poorly in the academic community, where its standard for distinguishing idea from expression has been widely criticized for being conceptually overbroad. See, e.g., Englund, at 881; Menell, at 1074, 1082; Kretschmer, at 837-39; Spivack, at 747-55; Thomas M. Gage, Note, Whelan Associates v. Jaslow Dental Laboratories: Copyright Protection for Computer Software Structure--What's the Purpose?, 1987 WIS.L.REV. 859, 860-61 (1987). The leading commentator in the field has stated that "[t]he crucial flaw in [Whelan 's] reasoning is that it assumes that only one 'idea,' in copyright law terms, underlies any computer program, and that once a separable idea can be identified, everything else must be expression." 3 Nimmer § 13.03(F), at 13-62.34. This criticism focuses not upon the program's ultimate purpose but upon the reality of its structural design. As we have already noted, a computer program's ultimate function or purpose is the composite result of interacting subroutines. Since each subroutine is itself a program, and thus, may be said to have its own "idea," Whelan 's general formulation that a program's overall purpose equates with the program's idea is descriptively inadequate.

Accordingly, we think that Judge Pratt wisely declined to follow Whelan. See [706] Computer Assocs., 775 F.Supp. at 558-60. In addition to noting the weakness in the Whelan definition of "program-idea," mentioned above, Judge Pratt found that Whelan 's synonymous use of the terms "structure, sequence, and organization," see Whelan, 797 F.2d at 1224 n. 1, demonstrated a flawed understanding of a computer program's method of operation. See Computer Assocs., 775 F.Supp. at 559-60 (discussing the distinction between a program's "static structure" and "dynamic structure"). Rightly, the district court found Whelan 's rationale suspect because it is so closely tied to what can now be seen--with the passage of time--as the opinion's somewhat outdated appreciation of computer science.

2) Substantial Similarity Test for Computer Program Structure: Abstraction-Filtration-Comparison

We think that Whelan 's approach to separating idea from expression in computer programs relies too heavily on metaphysical distinctions and does not place enough emphasis on practical considerations. Cf. Apple Computer, 714 F.2d at 1253 (rejecting certain commercial constraints on programming as a helpful means of distinguishing idea from expression because they did "not enter into the somewhat metaphysical issue of whether particular ideas and expressions have merged"). As the cases that we shall discuss demonstrate, a satisfactory answer to this problem cannot be reached by resorting, a priori, to philosophical first principals.

As discussed herein, we think that district courts would be well-advised to undertake a three-step procedure, based on the abstractions test utilized by the district court, in order to determine whether the non-literal elements of two or more computer programs are substantially similar. This approach breaks no new ground; rather, it draws on such familiar copyright doctrines as merger, scenes a faire, and public domain. In taking this approach, however, we are cognizant that computer technology is a dynamic field which can quickly outpace judicial decisionmaking. Thus, in cases where the technology in question does not allow for a literal application of the procedure we outline below, our opinion should not be read to foreclose the district courts of our circuit from utilizing a modified version.

In ascertaining substantial similarity under this approach, a court would first break down the allegedly infringed program into its constituent structural parts. Then, by examining each of these parts for such things as incorporated ideas, expression that is necessarily incidental to those ideas, and elements that are taken from the public domain, a court would then be able to sift out all non-protectable material. Left with a kernel, or possible kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement. It will be helpful to elaborate a bit further.

Step One: Abstraction

As the district court appreciated, see Computer Assocs., 775 F.Supp. at 560, the theoretic framework for analyzing substantial similarity expounded by Learned Hand in the Nichols case is helpful in the present context. In Nichols, we enunciated what has now become known as the "abstractions" test for separating idea from expression:

Upon any work ... a great number of patterns of increasing generality will fit equally well, as more and more of the incident is left out. The last may perhaps be no more than the most general statement of what the [work] is about, and at times might consist only of its title; but there is a point in this series of abstractions where they are no longer protected, since otherwise the [author] could prevent the use of his "ideas," to which, apart from their expression, his property is never extended.

Nichols, 45 F.2d at 121.

While the abstractions test was originally applied in relation to literary works such [707] as novels and plays, it is adaptable to computer programs. In contrast to the Whelan approach, the abstractions test "implicitly recognizes that any given work may consist of a mixture of numerous ideas and expressions." 3 Nimmer § 13.03[F], at 13-62.34-63.

As applied to computer programs, the abstractions test will comprise the first step in the examination for substantial similarity. Initially, in a manner that resembles reverse engineering on a theoretical plane, a court should dissect the allegedly copied program's structure and isolate each level of abstraction contained within it. This process begins with the code and ends with an articulation of the program's ultimate function. Along the way, it is necessary essentially to retrace and map each of the designer's steps--in the opposite order in which they were taken during the program's creation. See Background: Computer Program Design, supra.

As an anatomical guide to this procedure, the following description is helpful:

At the lowest level of abstraction, a computer program may be thought of in its entirety as a set of individual instructions organized into a hierarchy of modules. At a higher level of abstraction, the instructions in the lowest-level modules may be replaced conceptually by the functions of those modules. At progressively higher levels of abstraction, the functions of higher-level modules conceptually replace the implementations of those modules in terms of lower-level modules and instructions, until finally, one is left with nothing but the ultimate function of the program.... A program has structure at every level of abstraction at which it is viewed. At low levels of abstraction, a program's structure may be quite complex; at the highest level it is trivial.

Englund, at 897-98; cf. Spivack, at 774.

Step Two: Filtration

Once the program's abstraction levels have been discovered, the substantial similarity inquiry moves from the conceptual to the concrete. Professor Nimmer suggests, and we endorse, a "successive filtering method" for separating protectable expression from non-protectable material. See generally 3 Nimmer § 13.03[F]. This process entails examining the structural components at each level of abstraction to determine whether their particular inclusion at that level was "idea" or was dictated by considerations of efficiency, so as to be necessarily incidental to that idea; required by factors external to the program itself; or taken from the public domain and hence is nonprotectable expression. See also Kretschmer, at 844-45 (arguing that program features dictated by market externalities or efficiency concerns are unprotectable). The structure of any given program may reflect some, all, or none of these considerations. Each case requires its own fact specific investigation.

Strictly speaking, this filtration serves "the purpose of defining the scope of plaintiff's copyright." Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1475 (9th Cir.) (endorsing "analytic dissection" of computer programs in order to isolate protectable expression), cert. denied, --- U.S. ----, 113 S.Ct. 198, 121 L.Ed.2d 141 (1992). By applying well developed doctrines of copyright law, it may ultimately leave behind a "core of protectable material." 3 Nimmer § 13.03[F], at 13-72. Further explication of this second step may be helpful.

(a) Elements Dictated by Efficiency

The portion of Baker v. Selden, discussed earlier, which denies copyright protection to expression necessarily incidental to the idea being expressed, appears to be the cornerstone for what has developed into the doctrine of merger. See Morrissey v. Proctor & Gamble Co., 379 F.2d 675, 678-79 (1st Cir.1967) (relying on Baker for the proposition that expression embodying the rules of a sweepstakes contest was inseparable from the idea of the contest itself, and therefore were not protectable by copyright); see also Digital Communications, 659 F.Supp. at 457. The doctrine's underlying principle is that "[w]hen there is essentially only one way to express an idea, the idea and its expression are inseparable [708] and copyright is no bar to copying that expression." Concrete Machinery Co. v. Classic Lawn Ornaments, Inc., 843 F.2d 600, 606 (1st Cir.1988). Under these circumstances, the expression is said to have "merged" with the idea itself. In order not to confer a monopoly of the idea upon the copyright owner, such expression should not be protected. See Herbert Rosenthal Jewelry Corp. v. Kalpakian, 446 F.2d 738, 742 (9th Cir.1971).

CONTU recognized the applicability of the merger doctrine to computer programs. In its report to Congress it stated that:

[C]opyrighted language may be copied without infringing when there is but a limited number of ways to express a given idea.... In the computer context, this means that when specific instructions, even though previously copyrighted, are the only and essential means of accomplishing a given task, their later use by another will not amount to infringement.

CONTU Report, at 20. While this statement directly concerns only the application of merger to program code, that is, the textual aspect of the program, it reasonably suggests that the doctrine fits comfortably within the general context of computer programs.

Furthermore, when one considers the fact that programmers generally strive to create programs "that meet the user's needs in the most efficient manner," Menell, at 1052, the applicability of the merger doctrine to computer programs becomes compelling. In the context of computer program design, the concept of efficiency is akin to deriving the most concise logical proof or formulating the most succinct mathematical computation. Thus, the more efficient a set of modules are, the more closely they approximate the idea or process embodied in that particular aspect of the program's structure.

While, hypothetically, there might be a myriad of ways in which a programmer may effectuate certain functions within a program,--i.e., express the idea embodied in a given subroutine--efficiency concerns may so narrow the practical range of choice as to make only one or two forms of expression workable options. See 3 Nimmer § 13.03[F], at 13-63; see also Whelan, 797 F.2d at 1243 n. 43 ("It is true that for certain tasks there are only a very limited number of file structures available, and in such cases the structures might not be copyrightable...."). Of course, not all program structure is informed by efficiency concerns. See Menell, at 1052 (besides efficiency, simplicity related to user accommodation has become a programming priority). It follows that in order to determine whether the merger doctrine precludes copyright protection to an aspect of a program's structure that is so oriented, a court must inquire "whether the use of this particular set of modules is necessary efficiently to implement that part of the program's process" being implemented. Englund, at 902. If the answer is yes, then the expression represented by the programmer's choice of a specific module or group of modules has merged with their underlying idea and is unprotected. Id. at 902-03.

Another justification for linking structural economy with the application of the merger doctrine stems from a program's essentially utilitarian nature and the competitive forces that exist in the software marketplace. See Kretschmer, at 842. Working in tandem, these factors give rise to a problem of proof which merger helps to eliminate.

Efficiency is an industry-wide goal. Since, as we have already noted, there may be only a limited number of efficient implementations for any given program task, it is quite possible that multiple programmers, working independently, will design the identical method employed in the allegedly infringed work. Of course, if this is the case, there is no copyright infringement. See Roth Greeting Cards v. United Card Co., 429 F.2d 1106, 1110 (9th Cir.1970); Sheldon, 81 F.2d at 54.

Under these circumstances, the fact that two programs contain the same efficient structure may as likely lead to an inference of independent creation as it does to one of copying. See 3 Nimmer § 13.03[F], at 13-65; cf. Herbert Rosenthal [709] Jewelry Corp., 446 F.2d at 741 (evidence of independent creation may stem from defendant's standing as a designer of previous similar works). Thus, since evidence of similarly efficient structure is not particularly probative of copying, it should be disregarded in the overall substantial similarity analysis. See 3 Nimmer § 13.03[F], at 13-65.

We find support for applying the merger doctrine in cases that have already addressed the question of substantial similarity in the context of computer program structure. Most recently, in Lotus Dev. Corp., 740 F.Supp. at 66, the district court had before it a claim of copyright infringement relating to the structure of a computer spreadsheet program. The court observed that "the basic spreadsheet screen display that resembles a rotated 'L' ..., if not present in every expression of such a program, is present in most expressions." Id. Similarly, the court found that "an essential detail present in most if not all expressions of an electronic spreadsheet--is the designation of a particular key that, when pressed, will invoke the menu command system." Id. Applying the merger doctrine, the court denied copyright protection to both program elements.

In Manufacturers Technologies, Inc. v. Cams, Inc., 706 F.Supp. 984, 995-99 (D.Conn.1989), the infringement claims stemmed from various alleged program similarities "as indicated in their screen displays." Id. at 990. Stressing efficiency concerns in the context of a merger analysis, the court determined that the program's method of allowing the user to navigate within the screen displays was not protectable because, in part, "the process or manner of navigating internally on any specific screen displays ... is limited in the number of ways it may be simply achieved to facilitate user comfort." Id. at 995.

The court also found that expression contained in various screen displays (in the form of alphabetical and numerical columns) was not the proper subject of copyright protection because it was "necessarily incident to the idea[s]" embodied in the displays. Id. at 996-97. Cf. Digital Communications, 659 F.Supp. at 460 (finding no merger and affording copyright protection to program's status screen display because "modes of expression chosen ... are clearly not necessary to the idea of the status screen").

We agree with the approach taken in these decisions, and conclude that application of the merger doctrine in this setting is an effective way to eliminate non-protectable expression contained in computer programs.

(b) Elements Dictated By External Factors

We have stated that where "it is virtually impossible to write about a particular historical era or fictional theme without employing certain 'stock' or standard literary devices," such expression is not copyrightable. Hoehling v. Universal City Studios, Inc., 618 F.2d 972, 979 (2d Cir.), cert. denied, 449 U.S. 841, 101 S.Ct. 121, 66 L.Ed.2d 49 (1980). For example, the Hoehling case was an infringement suit stemming from several works on the Hindenberg disaster. There we concluded that similarities in representations of German beer halls, scenes depicting German greetings such as "Heil Hitler," or the singing of certain German songs would not lead to a finding of infringement because they were " 'indispensable, or at least standard, in the treatment of' " life in Nazi Germany. Id. (quoting Alexander v. Haley, 460 F.Supp. 40, 45 (S.D.N.Y.1978)). This is known as the scenes a faire doctrine, and like "merger," it has its analogous application to computer programs. Cf. Data East USA, 862 F.2d at 208 (applying scenes a faire to a home computer video game).

Professor Nimmer points out that "in many instances it is virtually impossible to write a program to perform particular functions in a specific computing environment without employing standard techniques." 3 Nimmer § 13.03[F], at 13-65. This is a result of the fact that a programmer's freedom of design choice is often circumscribed by extrinsic considerations such as (1) the mechanical specifications of the computer on which a particular program [710] is intended to run; (2) compatibility requirements of other programs with which a program is designed to operate in conjunction; (3) computer manufacturers' design standards; (4) demands of the industry being serviced; and (5) widely accepted programming practices within the computer industry. Id. at 13-66-71.

Courts have already considered some of these factors in denying copyright protection to various elements of computer programs. In the Plains Cotton case, the Fifth Circuit refused to reverse the district court's denial of a preliminary injunction against an alleged program infringer because, in part, "many of the similarities between the ... programs [were] dictated by the externalities of the cotton market." 807 F.2d at 1262.

In Manufacturers Technologies, the district court noted that the program's method of screen navigation "is influenced by the type of hardware that the software is designed to be used on." 706 F.Supp. at 995. Because, in part, "the functioning of the hardware package impact[ed] and constrain[ed] the type of navigational tools used in plaintiff's screen displays," the court denied copyright protection to that aspect of the program. Id.; cf. Data East USA, 862 F.2d at 209 (reversing a district court's finding of audiovisual work infringement because, inter alia, "the use of the Commodore computer for a karate game intended for home consumption is subject to various constraints inherent in the use of that computer").

Finally, the district court in Q-Co Industries rested its holding on what, perhaps, most closely approximates a traditional scenes a faire rationale. There, the court denied copyright protection to four program modules employed in a teleprompter program. This decision was ultimately based upon the court's finding that "the same modules would be an inherent part of any prompting program." 625 F.Supp. at 616.

Building upon this existing case law, we conclude that a court must also examine the structural content of an allegedly infringed program for elements that might have been dictated by external factors.

(c) Elements taken From the Public Domain

Closely related to the non-protectability of scenes a faire, is material found in the public domain. Such material is free for the taking and cannot be appropriated by a single author even though it is included in a copyrighted work. See E.F. Johnson Co. v. Uniden Corp. of America, 623 F.Supp. 1485, 1499 (D.Minn.1985); see also Sheldon, 81 F.2d at 54. We see no reason to make an exception to this rule for elements of a computer program that have entered the public domain by virtue of freely accessible program exchanges and the like. See 3 Nimmer § 13.03[F]; see also Brown Bag Software, 960 F.2d at 1473 (affirming the district court's finding that " '[p]laintiffs may not claim copyright protection of an ... expression that is, if not standard, then commonplace in the computer software industry.' "). Thus, a court must also filter out this material from the allegedly infringed program before it makes the final inquiry in its substantial similarity analysis.

Step Three: Comparison

The third and final step of the test for substantial similarity that we believe appropriate for non-literal program components entails a comparison. Once a court has sifted out all elements of the allegedly infringed program which are "ideas" or are dictated by efficiency or external factors, or taken from the public domain, there may remain a core of protectable expression. In terms of a work's copyright value, this is the golden nugget. See Brown Bag Software, 960 F.2d at 1475. At this point, the court's substantial similarity inquiry focuses on whether the defendant copied any aspect of this protected expression, as well as an assessment of the copied portion's relative importance with respect to the plaintiff's overall program. See 3 Nimmer § 13.03[F]; Data East USA, 862 F.2d at 208 ("To determine whether similarities result from unprotectable expression, analytic dissection of similarities may be [711] performed. If ... all similarities in expression arise from use of common ideas, then no substantial similarity can be found.").

3) Policy Considerations

We are satisfied that the three step approach we have just outlined not only comports with, but advances the constitutional policies underlying the Copyright Act. Since any method that tries to distinguish idea from expression ultimately impacts on the scope of copyright protection afforded to a particular type of work, "the line [it draws] must be a pragmatic one, which also keeps in consideration 'the preservation of the balance between competition and protection....' " Apple Computer, 714 F.2d at 1253 (citation omitted).

CA and some amici argue against the type of approach that we have set forth on the grounds that it will be a disincentive for future computer program research and development. At bottom, they claim that if programmers are not guaranteed broad copyright protection for their work, they will not invest the extensive time, energy and funds required to design and improve program structures. While they have a point, their argument cannot carry the day. The interest of the copyright law is not in simply conferring a monopoly on industrious persons, but in advancing the public welfare through rewarding artistic creativity, in a manner that permits the free use and development of non-protectable ideas and processes.

In this respect, our conclusion is informed by Justice Stewart's concise discussion of the principles that correctly govern the adaptation of the copyright law to new circumstances. In Twentieth Century Music Corp. v. Aiken, he wrote:

The limited scope of the copyright holder's statutory monopoly, like the limited copyright duration required by the Constitution, reflects a balance of competing claims upon the public interest: Creative work is to be encouraged and rewarded, but private motivation must ultimately serve the cause of promoting broad public availability of literature, music, and the other arts.

The immediate effect of our copyright law is to secure a fair return for an "author's" creative labor. But the ultimate aim is, by this incentive, to stimulate artistic creativity for the general public good.... When technological change has rendered its literal terms ambiguous, the Copyright Act must be construed in light of this basic purpose.

422 U.S. 151, 156, 95 S.Ct. 2040, 2043-44, 45 L.Ed.2d 84 (1975) (citations and footnotes omitted).

Recently, the Supreme Court has emphatically reiterated that "[t]he primary objective of copyright is not to reward the labor of authors...." Feist Publications, Inc. v. Rural Tel. Serv. Co., --- U.S. ----, ----, 111 S.Ct. 1282, 1290, 113 L.Ed.2d 358 (1991) (emphasis added). While the Feist decision deals primarily with the copyrightability of purely factual compilations, its underlying tenets apply to much of the work involved in computer programming. Feist put to rest the "sweat of the brow" doctrine in copyright law. Id. at ----, 111 S.Ct. at 1295. The rationale of that doctrine "was that copyright was a reward for the hard work that went into compiling facts." Id. at ----, 111 S.Ct. at 1291. The Court flatly rejected this justification for extending copyright protection, noting that it "eschewed the most fundamental axiom of copyright law--that no one may copyright facts or ideas." Id.

Feist teaches that substantial effort alone cannot confer copyright status on an otherwise uncopyrightable work. As we have discussed, despite the fact that significant labor and expense often goes into computer program flow-charting and debugging, that process does not always result in inherently protectable expression. Thus, Feist implicitly undercuts the Whelan rationale, "which allow[ed] copyright protection beyond the literal computer code ... [in order to] provide the proper incentive for programmers by protecting their most valuable efforts...." Whelan, 797 F.2d at 1237 (footnote omitted). We note that Whelan was decided prior to Feist when the "sweat of the brow" doctrine still had vitality. In view of the Supreme [712] Court's recent holding, however, we must reject the legal basis of CA's disincentive argument.

Furthermore, we are unpersuaded that the test we approve today will lead to the dire consequences for the computer program industry that plaintiff and some amici predict. To the contrary, serious students of the industry have been highly critical of the sweeping scope of copyright protection engendered by the Whelan rule, in that it "enables first comers to 'lock up' basic programming techniques as implemented in programs to perform particular tasks." Menell, at 1087; see also Spivack, at 765 (Whelan "results in an inhibition of creation by virtue of the copyright owner's quasi-monopoly power").

To be frank, the exact contours of copyright protection for non-literal program structure are not completely clear. We trust that as future cases are decided, those limits will become better defined. Indeed, it may well be that the Copyright Act serves as a relatively weak barrier against public access to the theoretical interstices behind a program's source and object codes. This results from the hybrid nature of a computer program, which, while it is literary expression, is also a highly functional, utilitarian component in the larger process of computing.

Generally, we think that copyright registration--with its indiscriminating availability--is not ideally suited to deal with the highly dynamic technology of computer science. Thus far, many of the decisions in this area reflect the courts' attempt to fit the proverbial square peg in a round hole. The district court, see Computer Assocs., 775 F.Supp. at 560, and at least one commentator have suggested that patent registration, with its exacting up-front novelty and non-obviousness requirements, might be the more appropriate rubric of protection for intellectual property of this kind. See Randell M. Whitmeyer, Comment, A Plea for Due Processes: Defining the Proper Scope of Patent Protection for Computer Software, 85 Nw.U.L.REV. 1103, 1123-25 (1991); see also Lotus Dev. Corp. v. Borland Int'l, Inc., 788 F.Supp. 78, 91 (D.Mass.1992) (discussing the potentially supplemental relationship between patent and copyright protection in the context of computer programs). In any event, now that more than 12 years have passed since CONTU issued its final report, the resolution of this specific issue could benefit from further legislative investigation--perhaps a CONTU II.

In the meantime, Congress has made clear that computer programs are literary works entitled to copyright protection. Of course, we shall abide by these instructions, but in so doing we must not impair the overall integrity of copyright law. While incentive based arguments in favor of broad copyright protection are perhaps attractive from a pure policy perspective, see Lotus Dev. Corp., 740 F.Supp. at 58, ultimately, they have a corrosive effect on certain fundamental tenets of copyright doctrine. If the test we have outlined results in narrowing the scope of protection, as we expect it will, that result flows from applying, in accordance with Congressional intent, long-standing principles of copyright law to computer programs. Of course, our decision is also informed by our concern that these fundamental principles remain undistorted.

B. The District Court Decision

We turn now to our review of the district court's decision in this particular case. At the outset, we must address CA's claim that the district court erred by relying too heavily on the court appointed expert's "personal opinions on the factual and legal issues before the court."

1) Use of Expert Evidence in Determining Substantial Similarity Between Computer Programs

Pursuant to Fed.R.Evid. 706, and with the consent of both Altai and CA, Judge Pratt appointed and relied upon Dr. Randall Davis of the Massachusetts Institute of Technology as the court's own expert witness on the issue of substantial similarity. Dr. Davis submitted a comprehensive written report that analyzed the various aspects of the computer programs [713] at issue and evaluated the parties' expert evidence. At trial, Dr. Davis was extensively cross-examined by both CA and Altai.

The well-established general rule in this circuit has been to limit the use of expert opinion in determining whether works at issue are substantially similar. As a threshold matter, expert testimony may be used to assist the fact finder in ascertaining whether the defendant had copied any part of the plaintiff's work. See Arnstein v. Porter, 154 F.2d 464, 468 (2d Cir.1946). To this end, "the two works are to be compared in their entirety ... [and] in making such comparison resort may properly be made to expert analysis...." 3 Nimmer § 13.03[E], at 13-62.16.

However, once some amount of copying has been established, it remains solely for the trier of fact to determine whether the copying was "illicit," that is to say, whether the "defendant took from plaintiff's works so much of what is pleasing to [lay observers] who comprise the audience for whom such [works are] composed, that defendant wrongfully appropriated something which belongs to the plaintiff." Arnstein, 154 F.2d at 473. Since the test for illicit copying is based upon the response of ordinary lay observers, expert testimony is thus "irrelevant" and not permitted. Id. at 468, 473. We have subsequently described this method of inquiry as "merely an alternative way of formulating the issue of substantial similarity." Ideal Toy Corp. v. Fab-Lu Ltd. (Inc.), 360 F.2d 1021, 1023 n. 2 (2d Cir.1966).

Historically, Arnstein 's ordinary observer standard had its roots in "an attempt to apply the 'reasonable person' doctrine as found in other areas of the law to copyright." 3 Nimmer § 13.03[E], at 13-62.10-11. That approach may well have served its purpose when the material under scrutiny was limited to art forms readily comprehensible and generally familiar to the average lay person. However, in considering the extension of the rule to the present case, we are reminded of Holmes' admonition that, "[t]he life of the law has not been logic: it has been experience." O.W. Holmes, Jr., THE COMMON LAW 1 (1881).

Thus, in deciding the limits to which expert opinion may be employed in ascertaining the substantial similarity of computer programs, we cannot disregard the highly complicated and technical subject matter at the heart of these claims. Rather, we recognize the reality that computer programs are likely to be somewhat impenetrable by lay observers--whether they be judges or juries--and, thus, seem to fall outside the category of works contemplated by those who engineered the Arnstein test. Cf. Dawson v. Hinshaw Music Inc., 905 F.2d 731, 737 (4th Cir.) ("departure from the lay characterization is warranted only where the intended audience possesses 'specialized expertise' "), cert. denied, 498 U.S. 981, 111 S.Ct. 511, 112 L.Ed.2d 523 (1990). As Judge Pratt correctly observed:

In the context of computer programs, many of the familiar tests of similarity prove to be inadequate, for they were developed historically in the context of artistic and literary, rather than utilitarian, works.

Computer Assocs., 775 F.Supp. at 558.

In making its finding on substantial similarity with respect to computer programs, we believe that the trier of fact need not be limited by the strictures of its own lay perspective. See Dawson, 905 F.2d at 735; Whelan, 797 F.2d at 1233; Broderbund, 648 F.Supp. at 1136 (stating in dictum: "an integrated test involving expert testimony and analytic dissection may well be the wave of the future in this area...."); Brown Bag Software, 960 F.2d at 1478-79 (Sneed, J., concurring); see also 3 Nimmer § 13.03[E]; but see Brown Bag Software, 960 F.2d at 1475 (applying the "ordinary reasonable person" standard in substantial similarity test for computer programs). Rather, we leave it to the discretion of the district court to decide to what extent, if any, expert opinion, regarding the highly technical nature of computer programs, is warranted in a given case.

In so holding, we do not intend to disturb the traditional role of lay observers in judging [714] substantial similarity in copyright cases that involve the aesthetic arts, such as music, visual works or literature.

In this case, Dr. Davis' opinion was instrumental in dismantling the intricacies of computer science so that the court could formulate and apply an appropriate rule of law. While Dr. Davis' report and testimony undoubtedly shed valuable light on the subject matter of the litigation, Judge Pratt remained, in the final analysis, the trier of fact. The district court's use of the expert's assistance, in the context of this case, was entirely appropriate.

2) Evidentiary Analysis

The district court had to determine whether Altai's OSCAR 3.5 program was substantially similar to CA's ADAPTER. We note that Judge Pratt's method of analysis effectively served as a road map for our own, with one exception--Judge Pratt filtered out the non-copyrightable aspects of OSCAR 3.5 rather than those found in ADAPTER, the allegedly infringed program. We think that our approach--i.e., filtering out the unprotected aspects of an allegedly infringed program and then comparing the end product to the structure of the suspect program--is preferable, and therefore believe that district courts should proceed in this manner in future cases.

We opt for this strategy because, in some cases, the defendant's program structure might contain protectable expression and/or other elements that are not found in the plaintiff's program. Since it is extraneous to the allegedly copied work, this material would have no bearing on any potential substantial similarity between the two programs. Thus, its filtration would be wasteful and unnecessarily time consuming. Furthermore, by focusing the analysis on the infringing rather than on the infringed material, a court may mistakenly place too little emphasis on a quantitatively small misappropriation which is, in reality, a qualitatively vital aspect of the plaintiff's protectable expression.

The fact that the district court's analysis proceeded in the reverse order, however, had no material impact on the outcome of this case. Since Judge Pratt determined that OSCAR effectively contained no protectable expression whatsoever, the most serious charge that can be levelled against him is that he was overly thorough in his examination.

The district court took the first step in the analysis set forth in this opinion when it separated the program by levels of abstraction. The district court stated:

As applied to computer software programs, this abstractions test would progress in order of "increasing generality" from object code, to source code, to parameter lists, to services required, to general outline. In discussing the particular similarities, therefore, we shall focus on these levels.

Computer Assocs., 775 F.Supp. at 560. While the facts of a different case might require that a district court draw a more particularized blueprint of a program's overall structure, this description is a workable one for the case at hand.

Moving to the district court's evaluation of OSCAR 3.5's structural components, we agree with Judge Pratt's systematic exclusion of non-protectable expression. With respect to code, the district court observed that after the rewrite of OSCAR 3.4 to OSCAR 3.5, "there remained virtually no lines of code that were identical to ADAPTER." Id. at 561. Accordingly, the court found that the code "present[ed] no similarity at all." Id. at 562.

Next, Judge Pratt addressed the issue of similarity between the two programs' parameter lists and macros. He concluded that, viewing the conflicting evidence most favorably to CA, it demonstrated that "only a few of the lists and macros were similar to protected elements in ADAPTER; the others were either in the public domain or dictated by the functional demands of the program." Id. As discussed above, functional elements and elements taken from the public domain do not qualify for copyright protection. With respect to the few remaining parameter lists and macros, the district court could reasonably conclude that they did not warrant a [715] finding of infringement given their relative contribution to the overall program. See Warner Bros., Inc. v. American Broadcasting Cos., Inc., 720 F.2d 231, 242 (2d Cir.1983) (discussing de minimis exception which allows for literal copying of a small and usually insignificant portion of the plaintiff's work); 3 Nimmer § 13.03[F], at 13-74. In any event, the district court reasonably found that, for lack of persuasive evidence, CA failed to meet its burden of proof on whether the macros and parameter lists at issue were substantially similar. See Computer Assocs., 775 F.Supp. at 562.

The district court also found that the overlap exhibited between the list of services required for both ADAPTER and OSCAR 3.5 was "determined by the demands of the operating system and of the applications program to which it [was] to be linked through ADAPTER or OSCAR...." Id. In other words, this aspect of the program's structure was dictated by the nature of other programs with which it was designed to interact and, thus, is not protected by copyright.

Finally, in his infringement analysis, Judge Pratt accorded no weight to the similarities between the two programs' organizational charts, "because [the charts were] so simple and obvious to anyone exposed to the operation of the program[s]." Id. CA argues that the district court's action in this regard "is not consistent with copyright law"--that "obvious" expression is protected, and that the district court erroneously failed to realize this. However, to say that elements of a work are "obvious," in the manner in which the district court used the word, is to say that they "follow naturally from the work's theme rather than from the author's creativity." 3 Nimmer § 13.03[F], at 13-65. This is but one formulation of the scenes a faire doctrine, which we have already endorsed as a means of weeding out unprotectable expression.

CA argues, at some length, that many of the district court's factual conclusions regarding the creative nature of its program's components are simply wrong. Of course, we are limited in our review of factual findings to setting aside only those that we determine are clearly erroneous. See Fed.R.Civ.P. 52. Upon a thorough review of the voluminous record in this case, which is comprised of conflicting testimony and other highly technical evidence, we discern no error on the part of Judge Pratt, let alone clear error.

Since we accept Judge Pratt's factual conclusions and the results of his legal analysis, we affirm his denial of CA's copyright infringement claim based upon OSCAR 3.5. We emphasize that, like all copyright infringement cases, those that involve computer programs are highly fact specific. The amount of protection due structural elements, in any given case, will vary according to the protectable expression found to exist within the program at issue.

II. TRADE SECRET PREEMPTION

In its complaint, CA alleged that Altai misappropriated the trade secrets contained in the ADAPTER program. Prior to trial, while the proceedings were still before Judge Mishler, Altai moved to dismiss and for summary judgment on CA's trade secret misappropriation claim. Altai argued that section 301 of the Copyright Act preempted CA's state law cause of action. Judge Mishler denied Altai's motion, reasoning that " '[t]he elements of the tort of appropriation of trade secrets through the breach of contract or confidence by an employee are not the same as the elements of a claim of copyright infringement.' " Computer Assocs., 775 F.Supp. at 563.

The parties addressed the preemption issue again, both in pre- and post-trial briefs. Judge Pratt then reconsidered and reversed Judge Mishler's earlier ruling. The district court concluded that CA's trade secret claims were preempted because "CA--which is the master of its own case--has pleaded and proven facts which establish that one act constituted both copyright infringement and misappropriation of trade secrets [namely, the] copying [716] of ADAPTER into OSCAR 3.4...." Id. at 565.

In our original opinion, Computer Assocs. Int'l, Inc. v. Altai, Inc., Nos. 91-7893, 91-7935, slip op. 4715, 4762-69, 1992 WL 139364 (2d Cir. June 22, 1992), we affirmed Judge Pratt's decision. CA petitioned for rehearing on this issue. In its petition for rehearing, CA brought to our attention portions of the record below that were not included in the appendix on appeal. CA argued that these documents, along with Judge Mishler's disposition of Altai's motion to dismiss and for summary judgment, established that CA advanced non-preempted trade secret misappropriation claims before both Judge Mishler and Judge Pratt. CA further contended that Judge Pratt failed to consider its theory that Altai was liable for wrongful acquisition of CA's trade secrets through Arney. Upon reconsideration, we have granted the petition for rehearing, withdrawn our initial opinion, and conclude in this amended opinion that the district court's preemption ruling on CA's trade secret claims should be vacated. We accordingly vacate the judgment of the district court on this point and remand CA's trade secret claims for a determination on the merits.

A. General Law of Copyright Preemption Regarding Trade Secrets and Computer Programs

Congress carefully designed the statutory framework of federal copyright preemption. In order to insure that the enforcement of these rights remains solely within the federal domain, section 301(a) of the Copyright Act expressly preempts

all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103....

17 U.S.C. § 301(a). This sweeping displacement of state law is, however, limited by section 301(b), which provides, in relevant part, that

[n]othing in this title annuls or limits any rights or remedies under the common law or statutes of any State with respect to ... activities violating legal or equitable rights that are not equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106....

17 U.S.C. § 301(b)(3). Section 106, in turn, affords a copyright owner the exclusive right to: (1) reproduce the copyrighted work; (2) prepare derivative works; (3) distribute copies of the work by sale or otherwise; and, with respect to certain artistic works, (4) perform the work publicly; and (5) display the work publicly. See 17 U.S.C. § 106(1)-(5).

Section 301 thus preempts only those state law rights that "may be abridged by an act which, in and of itself, would infringe one of the exclusive rights" provided by federal copyright law. See Harper & Row, Publishers, Inc. v. Nation Enters., 723 F.2d 195, 200 (2d Cir.1983), rev'd on other grounds, 471 U.S. 539, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). But if an "extra element" is "required instead of or in addition to the acts of reproduction, performance, distribution or display, in order to constitute a state-created cause of action, then the right does not lie 'within the general scope of copyright,' and there is no preemption." 1 Nimmer § 1.01[B], at 1-14-15; see also Harper & Row, Publishers, Inc., 723 F.2d at 200 (where state law right "is predicated upon an act incorporating elements beyond mere reproduction or the like, the [federal and state] rights are not equivalent" and there is no preemption).

A state law claim is not preempted if the "extra element" changes the "nature of the action so that it is qualitatively different from a copyright infringement claim." Mayer v. Josiah Wedgwood & Sons, Ltd., 601 F.Supp. 1523, 1535 (S.D.N.Y.1985); see Harper & Row, Publishers, Inc., 723 F.2d at 201. To determine whether a claim meets this standard, we must determine "what plaintiff seeks to protect, the theories in which the matter is thought to be protected and the rights sought to be enforced." 1 Roger M. Milgrim, Milgrim on Trade Secrets [717] § 2.06A, at 2-150 (1992) (hereinafter "Milgrim"). An action will not be saved from preemption by elements such as awareness or intent, which alter "the action's scope but not its nature...." Mayer, 601 F.Supp. at 1535.

Following this "extra element" test, we have held that unfair competition and misappropriation claims grounded solely in the copying of a plaintiff's protected expression are preempted by section 301. See, e.g., Walker v. Time Life Films, Inc., 784 F.2d 44, 53 (2d Cir.), cert. denied, 476 U.S. 1159, 106 S.Ct. 2278, 90 L.Ed.2d 721 (1986); Warner Bros., Inc. v. American Broadcasting Cos., 720 F.2d 231, 247 (2d Cir.1983); Durham Indus., Inc. v. Tomy Corp., 630 F.2d 905, 919 & n. 15 (2d Cir.1980). We also have held to be preempted a tortious interference with contract claim grounded in the impairment of a plaintiff's right under the Copyright Act to publish derivative works. See Harper & Row, Publishers, Inc., 723 F.2d at 201.

However, many state law rights that can arise in connection with instances of copyright infringement satisfy the extra element test, and thus are not preempted by section 301. These include unfair competition claims based upon breaches of confidential relationships, breaches of fiduciary duties and trade secrets. Balboa Ins. Co. v. Trans Global Equities, 218 Cal.App.3d 1327, 1339-53, 267 Cal.Rptr. 787, 793-803 (Ct.App. 3rd Dist.), cert. denied, --- U.S. ----, 111 S.Ct. 347, 112 L.Ed.2d 311 (1990).

Trade secret protection, the branch of unfair competition law at issue in this case, remains a "uniquely valuable" weapon in the defensive arsenal of computer programmers. See 1 Milgrim § 2.06A[c], at 2-172.4. Precisely because trade secret doctrine protects the discovery of ideas, processes, and systems which are explicitly precluded from coverage under copyright law, courts and commentators alike consider it a necessary and integral part of the intellectual property protection extended to computer programs. See id.; see also Integrated Cash Management Servs., Inc. v. Digital Transactions, Inc., 920 F.2d 171, 173 (2d Cir.1990) (while plaintiff withdrew copyright infringement claim for misappropriation of computer program, relief for theft of trade secret sustained); Healthcare Affiliated Servs., Inc. v. Lippany, 701 F.Supp. 1142, 1152-55 (W.D.Pa.1988) (finding likelihood of success on trade secret claim, but not copyright claim); Q-Co Indus., Inc., 625 F.Supp. at 616-18 (finding likelihood of success on trade secret claim, but no merit to copyright claim); Kretschmer, at 847-49.

The legislative history of section 301 states that "[t]he evolving common law rights of ... trade secrets ... would remain unaffected as long as the causes of action contain elements, such as ... a breach of trust or confidentiality, that are different in kind from copyright infringement." House Report, at 5748. Congress did not consider the term "misappropriation" to be "necessarily synonymous with copyright infringement," or to serve as the talisman of preemption. Id.

Trade secret claims often are grounded upon a defendant's breach of a duty of trust or confidence to the plaintiff through improper disclosure of confidential material. See, e.g., Mercer v. C.A. Roberts Co., 570 F.2d 1232, 1238 (5th Cir.1978); Brignoli v. Balch Hardy and Scheinman, Inc., 645 F.Supp. 1201, 1205 (S.D.N.Y.1986). The defendant's breach of duty is the gravamen of such trade secret claims, and supplies the "extra element" that qualitatively distinguishes such trade secret causes of action from claims for copyright infringement that are based solely upon copying. See, e.g., Warrington Assoc., Inc. v. Real-Time Eng'g Sys., Inc., 522 F.Supp. 367, 369 (N.D.Ill.1981); Brignoli, 645 F.Supp. at 1205; see also generally Balboa Ins. Co., 218 Cal.App.3d at 1346-50, 267 Cal.Rptr. at 798-802 (reviewing cases).

B. Preemption in this Case

The district court stated that:

Were CA's [trade secret] allegations premised on a theory of illegal acquisition of a trade secret, a charge that might have been alleged against Arney, who is not a defendant in this case, the [718] preemption analysis might be different, for there seems to be no corresponding right guaranteed to copyright owners by § 106 of the copyright act.

Computer Assocs., 775 F.Supp. at 565.

However, the court concluded that CA's trade secret claims were not grounded in a theory that Altai violated a duty of confidentiality to CA. Rather, Judge Pratt stated that CA proceeded against Altai solely "on a theory that the misappropriation took place by Altai's use of ADAPTER--the same theory as the copyright infringement count." Id. The district court reasoned that "the right to be free from trade secret misappropriation through 'use', and the right to exclusive reproduction and distribution of a copyrighted work are not distinguishable." Id. Because he concluded that there was no qualitative difference between the elements of CA's state law trade secret claims and a claim for federal copyright infringement, Judge Pratt ruled that CA's trade secret claims were preempted by section 301.

We agree with CA that the district court failed to address fully the factual and theoretical bases of CA's trade secret claims. The district court relied upon the fact that Arney--not Altai--allegedly breached a duty to CA of confidentiality by stealing secrets from CA and incorporating those secrets into OSCAR 3.4. However, under a wrongful acquisition theory based on Restatement (First) of Torts § 757 (1939), Williams and Altai may be liable for violating CA's right of confidentiality. Section 757 states in relevant part:

One who discloses or uses another's trade secret, without a privilege to do so, is liable to another if.... (c) he learned the secret from a third person with notice of the fact that it was a secret and that the third person discovered it by improper means or that the third person's disclosure of it was otherwise a breach of his duty to the other....

Actual notice is not required for such a third party acquisition claim; constructive notice is sufficient. A defendant is on constructive notice when, "from the information which he has, a reasonable man would infer [a breach of confidence], or if, under the circumstances, a reasonable man would be put on inquiry and an inquiry pursued with reasonable intelligence and diligence would disclose the [breach]." Id., comment 1; Metallurgical Indus., Inc. v. Fourtek, Inc., 790 F.2d 1195, 1204 (5th Cir.1986); Vantage Point, Inc. v. Parker Bros., Inc., 529 F.Supp. 1204, 1210 n. 2 (E.D.N.Y.1981), aff'd, 697 F.2d 301 (2d Cir.1982); see also Rohm and Haas Co. v. Adco Chem. Co., 689 F.2d 424, 431 (3rd Cir.1982) ("Defendants never asked where the 'Harvey process' had come from. Defendants therefore were charged 'with whatever knowledge such inquiry would have led to.' ") (citation omitted); Colgate-Palmolive Co. v. Carter Prods., Inc., 230 F.2d 855, 864 (4th Cir.) (per curiam) (defendant " 'must have known by the exercise of fair business principles' " that its employee's work was covered by an agreement not to disclose) (citation omitted), cert. denied, 352 U.S. 843, 77 S.Ct. 43, 1 L.Ed.2d 59 (1956); 1 Milgrim § 5.04[c].

We agree with the district court that New Jersey's governing governmental interest choice of law analysis directs the application of Texas law to CA's trade secret misappropriation claim. See Computer Assocs., 775 F.Supp. at 566. Texas law recognizes trade secret misappropriation claims grounded in the reasoning of Restatement section 757(c), see, e.g., Fourtek, 790 F.2d at 1204, and the facts alleged by CA may well support such a claim.

It is undisputed that, when Arney stole the ADAPTER code and incorporated it into his design of OSCAR 3.4, he breached his confidentiality agreement with CA. The district court noted that while such action might constitute a valid claim against Arney, CA is the named defendant in this lawsuit. Additionally, the district court found, as a matter of fact, that "[n]o one at Altai, other than Arney, knew that Arney had the ADAPTER code...." Computer Assocs., 775 F.Supp. at 554. However, the district court did not consider fully Altai's potential liability for improper trade secret acquisition. It did not consider the question of Altai's trade secret liability [719] in connection with OSCAR 3.4 under a constructive notice theory, or Altai's potential liability under an actual notice theory in connection with OSCAR 3.5.

The district court found that, prior to CA's bringing suit, Altai was not on actual notice of Arney's theft of trade secrets, and incorporation of those secrets into OSCAR 3.4. However, by virtue of Williams' close relationship with Arney, Williams' general familiarity with CA's programs (having once been employed by CA himself), and the fact that Arney used the ADAPTER program in an office at Altai adjacent to Williams during a period in which he had frequent contact with Williams regarding the OSCAR/VSE project, Williams (and through him Altai) may well have been on constructive notice of Arney's breach of his duty of confidentiality toward CA. The district court did not address whether Altai was on constructive notice, thereby placing it under a duty of inquiry; rather the court's finding that only Arney affirmatively knew of the theft of CA's trade secrets and incorporation of those secrets into OSCAR 3.4 simply disposed of the issue of actual notice in connection with the creation of OSCAR 3.4. CA's claim of liability based on constructive notice, never considered in the district court's opinion, must be determined on remand.

With respect to actual notice, it is undisputed that CA's first complaint, filed in August 1988, informed Altai of Arney's trade secret violations in connection with the creation of OSCAR 3.4. The first complaint alleged that Arney assisted in the development of ADAPTER, thereby obtaining knowledge of CA's related trade secrets. It also alleged that Altai misappropriated CA's trade secrets by incorporating them into ZEKE.

In response to CA's complaint, Altai rewrote OSCAR 3.4, creating OSCAR 3.5. While we agree with the district court that OSCAR 3.5 did not contain any expression protected by copyright, it may nevertheless still have embodied many of CA's trade secrets that Arney brought with him to Altai. Since Altai's rewrite was conducted with full knowledge of Arney's prior misappropriation, in breach of his duty of confidentiality, it follows that OSCAR 3.5 was created with actual knowledge of trade secret violations. Thus, with regard to OSCAR 3.5, CA has a viable trade secret claim against Altai that must be considered by the district court on remand. This claim is grounded in Altai's alleged use of CA's trade secrets in the creation of OSCAR 3.5, while on actual notice of Arney's theft of trade secrets and incorporation of those secrets into OSCAR 3.4. The district court correctly stated that a state law claim based solely upon Altai's "use", by copying, of ADAPTER's non-literal elements could not satisfy the governing "extra element" test, and would be preempted by section 301. However, where the use of copyrighted expression is simultaneously the violation of a duty of confidentiality established by state law, that extra element renders the state right qualitatively distinct from the federal right, thereby foreclosing preemption under section 301.

We are also convinced that CA adequately pled a wrongful acquisition claim before Judge Mishler and Judge Pratt. In ruling that CA failed to properly plead a non-preempted claim, Judge Pratt relied heavily upon two allegations in CA's amended complaint. Id. at 563-64. They read as follows:

p 57. By reason of the facts stated in paragraph 39 and by copying from CA-SCHEDULER into ZEKE, ZACK and ZEBB the various elements stated in paragraphs 39-51, 54 and 55, defendant Altai has infringed [CA's] copyright in CA-SCHEDULER.

* * * * * *

p 73. Defendant's incorporation into its ZEKE, ZACK and ZEBB programs of the various elements contained in the ADAPTER component of [CA's] CA-SCHEDULER program as set out in paragraphs 39-51, 54 and 55 constitutes the willful misappropriation of the proprietary property and trade secrets of plaintiff [CA].

[720] From these pleadings, Judge Pratt concluded that the very same act, i.e., Altai's copying of various elements of CA's program, was the basis for both CA's copyright infringement and trade secret claims. See id. at 564. We agree with Judge Pratt that CA's allegations are somewhat inartfully stated. However, when taken together, the terms "incorporation" and "misappropriation" in paragraph 73 above suggest to us an act of a qualitatively different nature than the infringement pled in paragraph 57. House Report, at 5748 (" '[m]isappropriation' is not necessarily synonymous with copyright infringement").

In support of our reading, we note that paragraphs 65-75 of CA's amended complaint alleged facts that reasonably comprise the elements of a wrongful acquisition of trade secrets claim. CA averred that, while he was employed at CA, Arney learned CA's trade secrets regarding the ADAPTER program. CA further alleged that, after Arney went to work for Altai, Altai misappropriated those trade secrets by incorporating CA's ADAPTER program into its own product. Finally, CA claimed that the trade secret misappropriation was carried out "in a willful, wanton and reckless manner in disregard of [CA's] rights." In other words, Altai could have reasonably inferred from CA's allegations that CA's claim, in part, rested on Williams' "wanton and reckless" behavior in the face of constructive notice.

In addition, while responding to Altai's preemption argument in its motion to dismiss and for summary judgment, CA specifically argued in its brief to Judge Mishler that "it can easily be inferred that Mr. Arney was hired by Altai to misappropriate [CA's] confidential source code for Altai's benefit." At oral argument, CA further contended that:

The circumstances of Mr. Arney's hiring suggested that Mr. Williams wanted more than Mr. Arney's ability and in fact got exactly what he wanted. And that is Computer Associates' confidential Adapter technology.

* * * * * *

[Arney testified that he] surreptitiously took that code home from Computer Associates after giving notice he was going to go to work for Altai, and after being hired by Mr. Williams to come to Altai and reconstruct Zeke, to work on the MVS operating system.

In the aftermath of Judge Mishler's ruling in its favor on Altai's motion to dismiss and for summary judgment, CA reasonably believed that it had sufficiently alleged a non-preempted claim. And, in light of CA's arguments and Judge Mishler's ruling, Altai clearly was on notice that the amended complaint placed non-preempted trade secret claims in play. See 5 Charles A. Wright & Arthur R. Miller, Federal Practice and Procedure § 1215, at 136-38 (2d ed. 1990) (federal pleading standards require plaintiff to provide defendant with fair notice of claim and grounds it rests on).

Accordingly, we vacate the judgment of the district court and remand for reconsideration of those aspects of CA's trade secret claims related to Altai's alleged constructive notice of Arney's theft of CA's trade secrets and incorporation of those secrets into OSCAR 3.4. We note, however, that CA may be unable to recover damages for its trade secrets which are embodied in OSCAR 3.4 since Altai has conceded copyright liability and damages for its incorporation of ADAPTER into OSCAR 3.4. CA may not obtain a double recovery where the damages for copyright infringement and trade secret misappropriation are coextensive.

However, additional trade secret damages may well flow from CA's creation of OSCAR 3.5. Judge Pratt correctly acknowledged that "[i]f CA's claim of misappropriation of trade secrets did not fail on preemption grounds, it would be necessary to examine in some detail the conflicting claims and evidence relating to the process by which Altai rewrote OSCAR and ultimately produced version 3.5." Computer Assocs., 775 F.Supp. at 554-55; see also 1 Milgrim § 5.04[d], at 5-148 ("after notice, the [innocent] second user should cease the use, and if he does not he can be enjoined and held liable for damages arising from such use subsequent to notice"). Since we hold that CA's trade secret claims [721] are not preempted, and that, in writing OSCAR 3.5, Altai had actual notice of Arney's earlier trade secret violations, we vacate and remand for such further inquiry anticipated by the district court. If the district court finds that CA was injured by Altai's unlawful use of CA's trade secrets in creating OSCAR 3.5, CA is entitled to an award of damages for trade secret misappropriation, as well as consideration by the district court of CA's request for injunctive relief on its trade secret claim.

CONCLUSION

In adopting the above three step analysis for substantial similarity between the non-literal elements of computer programs, we seek to insure two things: (1) that programmers may receive appropriate copyright protection for innovative utilitarian works containing expression; and (2) that non-protectable technical expression remains in the public domain for others to use freely as building blocks in their own work. At first blush, it may seem counter-intuitive that someone who has benefitted to some degree from illicitly obtained material can emerge from an infringement suit relatively unscathed. However, so long as the appropriated material consists of non-protectable expression, "[t]his result is neither unfair nor unfortunate. It is the means by which copyright advances the progress of science and art." Feist, --- U.S. at ----, 111 S.Ct. at 1290.

Furthermore, we underscore that so long as trade secret law is employed in a manner that does not encroach upon the exclusive domain of the Copyright Act, it is an appropriate means by which to secure compensation for software espionage.

Accordingly, we affirm the judgment of the district court in part; vacate in part; and remand for further proceedings. The parties shall bear their own costs of appeal, including the petition for rehearing.

ALTIMARI, Circuit Judge, concurring in part and dissenting in part:

Because I believe that our original opinion, see Computer Assoc. Int'l v. Altai, Nos. 91-7893(L), 1992 WL 139364 (2d Cir. June 22, 1992), is a reasoned analysis of the issues presented, I adhere to the original determination and therefore concur in Part 1 and respectfully dissent from Part 2 of the amended opinion.

4.2.3 Oracle America, Inc. v. Google, Inc. 4.2.3 Oracle America, Inc. v. Google, Inc.

ORACLE AMERICA, INC., Plaintiff-Appellant,
v.
GOOGLE INC., Defendant-Cross-Appellant.

Nos. 2013-1021, 2013-1022

United States Court of Appeals, Federal Circuit.

Decided: May 9, 2014.

E. JOSHUA ROSENKRANZ, Orrick, Herrington & Sutcliffe LLP, of New York, New York, argued for plaintiff-appellant. With him on the brief were MARK S. DAVIES, ANDREW D. SILVERMAN, KELLY M. DALEY; and ANNETTE L. HURST, GABRIEL M. RAMSEY, and ELIZABETH C. MCBRIDE, of San Francisco, California. Of counsel on the brief were DORIAN E. DALEY, DEBORAH K. MILLER, MATTHEW SARBORARIA, and ANDREW C. TEMKIN, Oracle America, Inc., of Redwood Shores, California; and DALE M. CENDALI, DIANA M. TORRES, SEAN B. FERNANDES, and JOSHUA L. SIMMONS, Kirkland & Ellis LLP, of New York, New York. Of counsel were SUSAN M. DAVIES, Kirkland & Ellis LLP, of New York, New York; MICHAEL A. JACOBS, Morrison & Foerster LLP, of San Francisco, California; and KENNETH A. KUWAYTI, of Palo Alto, California.

ROBERT A. VAN NEST, Keker & Van Nest LLP, of San Francisco, California, argued for defendant-cross-appellant. With him on the brief were CHRISTA M. ANDERSON, STEVEN A. HIRSCH, MICHAEL S. KWUN, and DANIEL E. JACKSON. Of counsel on the brief were IAN C. BALLON and HEATHER MEEKER, Greenberg Traurig, LLP, of East Palo Alto, California; RENNY HWANG, Google Inc., of Mountain View, California; and DARYL L. JOSEFFER and BRUCE W. BABER, King & Spalding LLP, of Washington, DC.

MARCIA B. PAUL, Davis Wright Tremaine LLP, of New York, New York, for amicus curiae Ralph Oman. With her on the brief were LACY H. KOONCE, III and DEBORAH A. ADLER.

WILLIAM A. RUDY, Lathrop & Gage LLP, of Kansas City, Missouri, for amici curiae Picture Archive Council of America, Inc., et al. With him on the brief were CAROLE E. HANDLER and BRIANNA E. DAHLBERG, of Los Angeles, California.

GREGORY G. GARRE, Latham & Watkins, LLP, of Washington, DC, for amici curiae Microsoft Corporation, et al. With him on the brief was LORI ALVINO MCGILL. Of counsel on the brief were PAUL T. DACIER, KRISHNENDU GUPTA, EMC Corporation, of Hopkinton, Massachusetts; and DOUGLAS LUFTMAN, NETAPP, Inc., of Sunnyvale, California.

JARED BOBROW, Weil, Gotshal & Manges LLP, of Redwood Shores, California, for amici curiae Eugene H. Spafford, Ph.D., et al. With him on the brief was AARON Y. HUANG.

MATTHEW S. HELLMAN, Jenner & Block LLP, of Washington, DC, for amicus curiae BSA/The Software Alliance. With him on the brief was PAUL M. SMITH.

STEVEN T. COTTREAU, Clifford Chance US LLP, of Washington, DC, for amici curiae, Scott McNealy, et al.

MEREDITH JACOB, Program on Information Justice and Intellectual Property, American University, Washington College of Law, of Washington, DC, for amici curiae Intellectual Property Law Professors.

JULIE P. SAMUELS, Electronic Frontier Foundation, of San Francisco, California, for amici curiae Computer Scientists. With her on the brief was MICHAEL BARCLAY. Of counsel on the brief was JASON M. SCHULTZ, NYU Technology Law and Policy Clinic, NYU School of Law, of New York, New York.

JONATHAN BAND, Jonathan Band PLLC, of Washington, DC, filed a brief for amicus curiae Computer & Communications Industry Association. With him on the brief was MATTHEW SCHRUERS, Computer & Communications Industry Association, of Washington, DC.

CHAD RUBACK, The Ruback Law Firm, of Dallas, Texas, filed a brief for amici curiae Rackspace US, Inc., et al.

JENNIFER M. URBAN, Samuelson Law, Technology and Public Policy Clinic, U.C. Berkeley School of Law, of Berkeley, California for amici curiae Software Innovators, et al.

Before O'MALLEY, PLAGER, and TARANTO, Circuit Judges.

O'MALLEY, Circuit Judge.

This copyright dispute involves 37 packages of computer source code. The parties have often referred to these groups of computer programs, individually or collectively, as "application programming interfaces," or API packages, but it is their content, not their name, that matters. The predecessor of Oracle America, Inc. ("Oracle") wrote these and other API packages in the Java programming language, and Oracle licenses them on various terms for others to use. Many software developers use the Java language, as well as Oracle's API packages, to write applications (commonly referred to as "apps") for desktop and laptop computers, tablets, smartphones, and other devices.

Oracle filed suit against Google Inc. ("Google") in the United States District Court for the Northern District of California, alleging that Google's Android mobile operating system infringed Oracle's patents and copyrights. The jury found no patent infringement, and the patent claims are not at issue in this appeal. As to the copyright claims, the parties agreed that the jury would decide infringement, fair use, and whether any copying was de minimis, while the district judge would decide copyrightability and Google's equitable defenses. The jury found that Google infringed Oracle's copyrights in the 37 Java packages and a specific computer routine called "rangeCheck," but returned a noninfringement verdict as to eight decompiled security files. The jury deadlocked on Google's fair use defense.

After the jury verdict, the district court denied Oracle's motion for judgment as a matter of law ("JMOL") regarding fair use as well as Google's motion for JMOL with respect to the rangeCheck files. Order on Motions for Judgment as a Matter of Law, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. May 10, 2012), ECF No. 1119. Oracle also moved for JMOL of infringement with respect to the eight decompiled security files. In granting that motion, the court found that: (1) Google admitted to copying the eight files; and (2) no reasonable jury could find that the copying was de minimis. Oracle Am., Inc. v. Google Inc., No. C 10-3561, 2012 U.S. Dist. LEXIS 66417 (N.D. Cal. May 11, 2012) ("Order Granting JMOL on Decompiled Files").

Shortly thereafter, the district court issued its decision on copyrightability, finding that the replicated elements of the 37 API packages—including the declaring code and the structure, sequence, and organization—were not subject to copyright protection. Oracle Am., Inc. v. Google Inc., 872 F. Supp. 2d 974 (N.D. Cal. 2012) ("Copyrightability Decision"). Accordingly, the district court entered final judgment in favor of Google on Oracle's copyright infringement claims, except with respect to the rangeCheck code and the eight decompiled files. Final Judgment, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. June 20, 2012), ECF No. 1211. Oracle appeals from the portion of the final judgment entered against it, and Google cross-appeals from the portion of that same judgment entered in favor of Oracle as to the rangeCheck code and eight decompiled files.

Because we conclude that the declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection, we reverse the district court's copyrightability determination with instructions to reinstate the jury's infringement finding as to the 37 Java packages. Because the jury deadlocked on fair use, we remand for further consideration of Google's fair use defense in light of this decision. With respect to Google's cross-appeal, we affirm the district court's decisions: (1) granting Oracle's motion for JMOL as to the eight decompiled Java files that Google copied into Android; and (2) denying Google's motion for JMOL with respect to the rangeCheck function. Accordingly, we affirm-in-part, reverse-in-part, and remand for further proceedings.

BACKGROUND

A. The Technology

Sun Microsystems, Inc. ("Sun") developed the Java "platform" for computer programming and released it in 1996.[1] The aim was to relieve programmers from the burden of writing different versions of their computer programs for different operating systems or devices. "The Java platform, through the use of a virtual machine, enable[d] software developers to write programs that [we]re able to run on different types of computer hardware without having to rewrite them for each different type." Copyrightability Decision, 872 F. Supp. 2d at 977. With Java, a software programmer could "write once, run anywhere."

The Java virtual machine ("JVM") plays a central role in the overall Java platform. The Java programming language itself—which includes words, symbols, and other units, together with syntax rules for using them to create instructions—is the language in which a Java programmer writes source code, the version of a program that is "in a human-readable language." Id. For the instructions to be executed, they must be converted (or compiled) into binary machine code (object code) consisting of 0s and 1s understandable by the particular computing device. In the Java system, "source code is first converted into `bytecode,' an intermediate form, before it is then converted into binary machine code by the Java virtual machine" that has been designed for that device. Id. The Java platform includes the "Java development kit (JDK), javac compiler, tools and utilities, runtime programs, class libraries (API packages), and the Java virtual machine." Id. at 977 n.2.

Sun wrote a number of ready-to-use Java programs to perform common computer functions and organized those programs into groups it called "packages." These packages, which are the application programming interfaces at issue in this appeal, allow programmers to use the prewritten code to build certain functions into their own programs, rather than write their own code to perform those functions from scratch. They are shortcuts. Sun called the code for a specific operation (function) a "method." It defined "classes" so that each class consists of specified methods plus variables and other elements on which the methods operate. To organize the classes for users, then, it grouped classes (along with certain related "interfaces") into "packages." See id. at 982 (describing organization: "[e]ach package [i]s broken into classes and those in turn [are] broken into methods"). The parties have not disputed the district court's analogy: Oracle's collection of API packages is like a library, each package is like a bookshelf in the library, each class is like a book on the shelf, and each method is like a how-to chapter in a book. Id. at 977.

The original Java Standard Edition Platform ("Java SE") included "eight packages of pre-written programs." Id. at 982. The district court found, and Oracle concedes to some extent, that three of those packages—java.lang, java.io, and java.util—were "core" packages, meaning that programmers using the Java language had to use them "in order to make any worthwhile use of the language." Id. By 2008, the Java platform had more than 6,000 methods making up more than 600 classes grouped into 166 API packages. There are 37 Java API packages at issue in this appeal, three of which are the core packages identified by the district court.[2] These packages contain thousands of individual elements, including classes, subclasses, methods, and interfaces.

Every package consists of two types of source code— what the parties call (1)declaring code; and (2) implementing code. Declaring code is the expression that identifies the prewritten function and is sometimes referred to as the "declaration" or "header." As the district court explained, the "main point is that this header line of code introduces the method body and specifies very precisely the inputs, name and other functionality." Id. at 979-80. The expressions used by the programmer from the declaring code command the computer to execute the associated implementing code, which gives the computer the step-by-step instructions for carrying out the declared function.

To use the district court's example, one of the Java API packages at issue is "java.lang." Within that package is a class called "math," and within "math" there are several methods, including one that is designed to find the larger of two numbers: "max." The declaration for the "max" method, as defined for integers, is: "public static int max(int x, int y)," where the word "public" means that the method is generally accessible, "static" means that no specific instance of the class is needed to call the method, the first "int" indicates that the method returns an integer, and "int x" and "int y" are the two numbers (inputs) being compared. Copyrightability Decision, 872 F. Supp. 2d at 980-82. A programmer calls the "max" method by typing the name of the method stated in the declaring code and providing unique inputs for the variables "x" and "y." The expressions used command the computer to execute the implementing code that carries out the operation of returning the larger number.

Although Oracle owns the copyright on Java SE and the API packages, it offers three different licenses to those who want to make use of them. The first is the General Public License, which is free of charge and provides that the licensee can use the packages—both the declaring and implementing code—but must "contribute back" its innovations to the public. This arrangement is referred to as an "open source" license. The second option is the Specification License, which provides that the licensee can use the declaring code and organization of Oracle's API packages but must write its own implementing code. The third option is the Commercial License, which is for businesses that "want to use and customize the full Java code in their commercial products and keep their code secret." Appellant Br. 14. Oracle offers the Commercial License in exchange for royalties. To maintain Java's "write once, run anywhere" motto, the Specification and Commercial Licenses require that the licensees' programs pass certain tests to ensure compatibility with the Java platform.

The testimony at trial also revealed that Sun was licensing a derivative version of the Java platform for use on mobile devices: the Java Micro Edition ("Java ME"). Oracle licensed Java ME for use on feature phones and smartphones. Sun/Oracle has never successfully developed its own smartphone platform using Java.

B. Google's Accused Product: Android

The accused product is Android, a software platform that was designed for mobile devices and competes with Java in that market. Google acquired Android, Inc. in 2005 as part of a plan to develop a smartphone platform. Later that same year, Google and Sun began discussing the possibility of Google "taking a license to use and to adapt the entire Java platform for mobile devices." Copyrightability Decision, 872 F. Supp. 2d at 978. They also discussed a "possible co-development partnership deal with Sun under which Java technology would become an open-source part of the Android platform, adapted for mobile devices." Id. The parties negotiated for months but were unable to reach an agreement. The point of contention between the parties was Google's refusal to make the implementation of its programs compatible with the Java virtual machine or interoperable with other Java programs. Because Sun/Oracle found that position to be anathema to the "write once, run anywhere" philosophy, it did not grant Google a license to use the Java API packages.

When the parties' negotiations reached an impasse, Google decided to use the Java programming language to design its own virtual machine—the Dalvik virtual machine ("Dalvik VM")—and "to write its own implementations for the functions in the Java API that were key to mobile devices." Id. Google developed the Android platform, which grew to include 168 API packages—37 of which correspond to the Java API packages at issue in this appeal.

With respect to the 37 packages at issue, "Google believed Java application programmers would want to find the same 37 sets of functionalities in the new Android system callable by the same names as used in Java." Id. To achieve this result, Google copied the declaring source code from the 37 Java API packages verbatim, inserting that code into parts of its Android software. In doing so, Google copied the elaborately organized taxonomy of all the names of methods, classes, interfaces, and packages— the "overall system of organized names—covering 37 packages, with over six hundred classes, with over six thousand methods." Copyrightability Decision, 872 F. Supp. 2d at 999. The parties and district court referred to this taxonomy of expressions as the "structure, sequence, and organization" or "SSO" of the 37 packages. It is undisputed, however, that Google wrote its own implementing code, except with respect to: (1) the rangeCheck function, which consisted of nine lines of code; and (2) eight decompiled security files.

As to rangeCheck, the court found that the Sun engineer who wrote it later worked for Google and contributed two files he created containing the rangeCheck function— "Timsort.java" and "ComparableTimsort"—to the Android platform. In doing so, the nine-line rangeCheck function was copied directly into Android. As to the eight decompiled files, the district court found that they were copied and used as test files but "never found their way into Android or any handset." Id. at 983.

Google released the Android platform in 2007, and the first Android phones went on sale the following year. Although it is undisputed that certain Android software contains copies of the 37 API packages' declaring code at issue, neither the district court nor the parties specify in which programs those copies appear. Oracle indicated at oral argument, however, that all Android phones contain copies of the accused portions of the Android software. Oral Argument at 1:35, available at http://www. cafc.uscourts.gov/oral-argument-recordings/XXXX-XXXX/all. Android smartphones "rapidly grew in popularity and now comprise a large share of the United States market." Copyrightability Decision, 872 F. Supp. 2d at 978. Google provides the Android platform free of charge to smartphone manufacturers and receives revenue when customers use particular functions on the Android phone. Although Android uses the Java programming language, it is undisputed that Android is not generally Java compatible. As Oracle explains, "Google ultimately designed Android to be incompatible with the Java platform, so that apps written for one will not work on the other." Appellant Br. 29.

C. Trial and Post-Trial Rulings

Beginning on April 16, 2012, the district court and the jury—on parallel tracks—viewed documents and heard testimony from twenty-four witnesses on copyrightability, infringement, fair use, and Google's other defenses. Because the parties agreed the district court would decide copyrightability, the court instructed the jury to assume that the structure, sequence, and organization of the 37 API packages was copyrightable. And, the court informed the jury that Google conceded that it copied the declaring code used in the 37 packages verbatim. The court also instructed the jury that Google conceded copying the rangeCheck function and the eight decompiled security files, but that Google maintained that its use of those lines of code was de minimis. See Final Charge to the Jury (Phase One), Oracle Am., Inc. v. Google Inc., 3:10-cv-3561 (N.D. Cal. Apr. 30, 2012), ECF No. 1018 at 14 ("With respect to the infringement issues concerning the rangeCheck and other similar files, Google agrees that the accused lines of code and comments came from the copyrighted material but contends that the amounts involved were so negligible as to be de minimis and thus should be excused.").

On May 7, 2012, the jury returned a verdict finding that Google infringed Oracle's copyright in the 37 Java API packages and in the nine lines of rangeCheck code, but returned a noninfringement verdict as to eight decompiled security files. The jury hung on Google's fair use defense.

The parties filed a number of post-trial motions, most of which were ultimately denied. In relevant part, the district court denied Oracle's motion for JMOL regarding fair use and Google's motion for JMOL as to the rangeCheck files. Order on Motions for Judgment as a Matter of Law, Oracle Am., Inc. v. Google Inc., No. 3:10cv-3561 (N.D. Cal. May 10, 2012), ECF No. 1119. The district court granted Oracle's motion for JMOL of infringement as to the eight decompiled files, however. In its order, the court explained that: (1) Google copied the files in their entirety; (2) the trial testimony revealed that the use of those files was "significant"; and (3) no reasonable jury could find the copying de minimis. Order Granting JMOL on Decompiled Files, 2012 U.S. Dist. LEXIS 66417, at *6.

On May 31, 2012, the district court issued the primary decision at issue in this appeal, finding that the replicated elements of the Java API packages—including the declarations and their structure, sequence, and organization—were not copyrightable. As to the declaring code, the court concluded that "there is only one way to write" it, and thus the "merger doctrine bars anyone from claiming exclusive copyright ownership of that expression." Copyrightability Decision, 872 F. Supp. 2d at 998. The court further found that the declaring code was not protectable because "names and short phrases cannot be copyrighted." Id. As such, the court determined that "there can be no copyright violation in using the identical declarations." Id.

As to the overall structure, sequence, and organization of the Java API packages, the court recognized that "nothing in the rules of the Java language . . . required that Google replicate the same groupings even if Google was free to replicate the same functionality." Id. at 999. Therefore, the court determined that "Oracle's best argument. . . is that while no single name is copyrightable, Java's overall system of organized names—covering 37 packages, with over six hundred classes, with over six thousand methods—is a `taxonomy' and, therefore, copyrightable." Id.

Although it acknowledged that the overall structure of Oracle's API packages is creative, original, and "resembles a taxonomy," the district court found that it "is nevertheless a command structure, a system or method of operation—a long hierarchy of over six thousand commands to carry out pre-assigned functions"—that is not entitled to copyright protection under Section 102(b) of the Copyright Act. Id. at 999-1000. In reaching this conclusion, the court emphasized that, "[o]f the 166 Java packages, 129 were not violated in any way." Id. at 1001. And, of the 37 Java API packages at issue, "97 percent of the Android lines were new from Google and the remaining three percent were freely replicable under the merger and names doctrines." Id. On these grounds, the court dismissed Oracle's copyright claims, concluding that "the particular elements replicated by Google were free for all to use under the Copyright Act." Id.

On June 20, 2012, the district court entered final judgment in favor of Google and against Oracle on its claim for copyright infringement, except with respect to the rangeCheck function and the eight decompiled files. As to rangeCheck and the decompiled files, the court entered judgment for Oracle and against Google in the amount of zero dollars, per the parties' stipulation. Final Judgment, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. June 20, 2012), ECF No. 1211. Oracle timely appealed from the portion of the district court's final judgment entered against it and Google timely crossappealed with respect to rangeCheck and the eight decompiled files. Because this action included patent claims, we have jurisdiction pursuant to 28 U.S.C. § 1295(a)(1).

DISCUSSION

I. ORACLE'S APPEAL

It is undisputed that the Java programming language is open and free for anyone to use. Except to the limited extent noted below regarding three of the API packages, it is also undisputed that Google could have written its own API packages using the Java language. Google chose not to do that. Instead, it is undisputed that Google copied 7,000 lines of declaring code and generally replicated the overall structure, sequence, and organization of Oracle's 37 Java API packages. The central question before us is whether these elements of the Java platform are entitled to copyright protection. The district court concluded that they are not, and Oracle challenges that determination on appeal. Oracle also argues that the district court should have dismissed Google's fair use defense as a matter of law.

According to Google, however, the district court correctly determined that: (1) there was only one way to write the Java method declarations and remain "interoperable" with Java; and (2) the organization and structure of the 37 Java API packages is a "command structure" excluded from copyright protection under Section 102(b). Google also argues that, if we reverse the district court's copyrightability determination, we should direct the district court to retry its fair use defense.

"When the questions on appeal involve law and precedent on subjects not exclusively assigned to the Federal Circuit, the court applies the law which would be applied by the regional circuit." Atari Games Corp. v. Nintendo of Am., Inc., 897 F.2d 1572, 1575 (Fed. Cir. 1990). Copyright issues are not exclusively assigned to the Federal Circuit. See 28 U.S.C. § 1295. The parties agree that Ninth Circuit law applies and that, in the Ninth Circuit, whether particular expression is protected by copyright law is "subject to de novo review." Ets-Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1073 (9th Cir. 2000).[3]

We are mindful that the application of copyright law in the computer context is often a difficult task. See Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 820 (1st Cir. 1995) (Boudin, J., concurring) ("Applying copyright law to computer programs is like assembling a jigsaw puzzle whose pieces do not quite fit."). On this record, however, we find that the district court failed to distinguish between the threshold question of what is copyrightable— which presents a low bar—and the scope of conduct that constitutes infringing activity. The court also erred by importing fair use principles, including interoperability concerns, into its copyrightability analysis.

For the reasons that follow, we conclude that the declaring code and the structure, sequence, and organization of the 37 Java API packages are entitled to copyright protection. Because there is an insufficient record as to the relevant fair use factors, we remand for further proceedings on Google's fair use defense.

A. Copyrightability

The Copyright Act provides protection to "original works of authorship fixed in any tangible medium of expression," including "literary works." 17 U.S.C. § 102(a). It is undisputed that computer programs— defined in the Copyright Act as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result," 17 U.S.C. § 101—can be subject to copyright protection as "literary works." See Atari Games Corp. v. Nintendo of Am., Inc., 975 F.2d 832, 838 (Fed. Cir. 1992) ("As literary works, copyright protection extends to computer programs."). Indeed, the legislative history explains that "literary works" includes "computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves." H.R. Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5667.

By statute, a work must be "original" to qualify for copyright protection. 17 U.S.C. § 102(a). This "originality requirement is not particularly stringent," however. Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 358 (1991). "Original, as the term is used in copyright, means only that the work was independently created by the author (as opposed to copied from other works), and that it possesses at least some minimal degree of creativity." Id. at 345.

Copyright protection extends only to the expression of an idea—not to the underlying idea itself. Mazer v. Stein, 347 U.S. 201, 217 (1954) ("Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection is given only to the expression of the idea—not the idea itself."). This distinction—commonly referred to as the "idea/expression dichotomy"—is codified in Section 102(b) of the Copyright Act, which provides:

In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.

17 U.S.C. § 102(b); see Golan v. Holder, 132 S. Ct. 873, 890 (2012) ("The idea/expression dichotomy is codified at 17 U.S.C. § 102(b).").

The idea/expression dichotomy traces back to the Supreme Court's decision in Baker v. Selden, 101 U.S. 99, 101 (1879). In Baker, the plaintiff Selden wrote and obtained copyrights on a series of books setting out a new system of bookkeeping. Id. at 100. The books included an introductory essay explaining the system and blank forms with ruled lines and headings designed for use with that system. Id. Baker published account books employing a system with similar forms, and Selden filed suit alleging copyright infringement. According to Selden, the "ruled lines and headings, given to illustrate the system, are a part of the book" and "no one can make or use similar ruled lines and headings, or ruled lines and headings made and arranged on substantially the same system, without violating the copyright." Id. at 101.

The Supreme Court framed the issue on appeal in Baker as "whether the exclusive property in a system of book-keeping can be claimed, under the law of copyright, by means of a book in which that system is explained." Id. In reversing the circuit court's decision, the Court concluded that the "copyright of a book on book-keeping cannot secure the exclusive right to make, sell, and use account-books prepared upon the plan set forth in such book." Id. at 104. Likewise, the "copyright of a work on mathematical science cannot give to the author an exclusive right to the methods of operation which he propounds." Id. at 103. The Court found that, although the copyright protects the way Selden "explained and described a peculiar system of book-keeping," it does not prevent others from using the system described therein. Id. at 104. The Court further indicated that, if it is necessary to use the forms Selden included in his books to make use of the accounting system, that use would not amount to copyright infringement. See id. (noting that the public has the right to use the account-books and that, "in using the art, the ruled lines and headings of accounts must necessarily be used as incident to it").

Courts routinely cite Baker as the source of several principles incorporated into Section 102(b) that relate to this appeal, including that: (1) copyright protection extends only to expression, not to ideas, systems, or processes; and (2) "those elements of a computer program that are necessarily incidental to its function are . . . unprotectable." See Computer Assocs. Int'l v. Altai, 982 F.2d 693, 704-05 (2d Cir. 1992) ("Altai") (discussing Baker, 101 U.S. at 103-04).

It is well established that copyright protection can extend to both literal and non-literal elements of a computer program. See Altai, 982 F.2d at 702. The literal elements of a computer program are the source code and object code. See Johnson Controls, Inc. v. Phoenix Control Sys., Inc., 886 F.2d 1173, 1175 (9th Cir. 1989). Courts have defined source code as "the spelled-out program commands that humans can read." Lexmark Int'l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 533 (6th Cir. 2004). Object code refers to "the binary language comprised of zeros and ones through which the computer directly receives its instructions." Altai, 982 F.2d at 698. Both source and object code "are consistently held protected by a copyright on the program." Johnson Controls, 886 F.2d at 1175; see also Altai, 982 F.2d at 702 ("It is now well settled that the literal elements of computer programs, i.e., their source and object codes, are the subject of copyright protection."). Google nowhere disputes that premise. See, e.g., Oral Argument at 57:38.

The non-literal components of a computer program include, among other things, the program's sequence, structure, and organization, as well as the program's user interface. Johnson Controls, 886 F.2d at 1175. As discussed below, whether the non-literal elements of a program "are protected depends on whether, on the particular facts of each case, the component in question qualifies as an expression of an idea, or an idea itself." Id.

In this case, Oracle claims copyright protection with respect to both: (1) literal elements of its API packages— the 7,000 lines of declaring source code; and (2) non-literal elements—the structure, sequence, and organization of each of the 37 Java API packages.

The distinction between literal and non-literal aspects of a computer program is separate from the distinction between literal and non-literal copying. See Altai, 982 F.2d at 701-02. "Literal" copying is verbatim copying of original expression. "Non-literal" copying is "paraphrased or loosely paraphrased rather than word for word." Lotus Dev. Corp. v. Borland Int'l, 49 F.3d 807, 814 (1st Cir. 1995). Here, Google concedes that it copied the declaring code verbatim. Oracle explains that the lines of declaring code "embody the structure of each [API] package, just as the chapter titles and topic sentences represent the structure of a novel." Appellant Br. 45. As Oracle explains, when Google copied the declaring code in these packages "it also copied the `sequence and organization' of the packages (i.e., the three-dimensional structure with all the chutes and ladders)" employed by Sun/Oracle in the packages. Appellant Br. 27. Oracle also argues that the nonliteral elements of the API packages—the structure, sequence, and organization that led naturally to the implementing code Google created—are entitled to protection. Oracle does not assert "literal" copying of the entire SSO, but, rather, that Google literally copied the declaring code and then paraphrased the remainder of the SSO by writing its own implementing code. It therefore asserts non-literal copying with respect to the entirety of the SSO.

At this stage, it is undisputed that the declaring code and the structure and organization of the Java API packages are original. The testimony at trial revealed that designing the Java API packages was a creative process and that the Sun/Oracle developers had a vast range of options for the structure and organization. In its copyrightability decision, the district court specifically found that the API packages are both creative and original, and Google concedes on appeal that the originality requirements are met. See Copyrightability Decision, 872 F. Supp. 2d at 976 ("The overall name tree, of course, has creative elements. . . ."); Id. at 999 ("Yes, it is creative. Yes, it is original."); Appellee Br. 5 ("Google does not dispute" the district court's finding that "the Java API clears the low originality threshold."). The court found, however, that neither the declaring code nor the SSO was entitled to copyright protection under the Copyright Act.

Although the parties agree that Oracle's API packages meet the originality requirement under Section 102(a), they disagree as to the proper interpretation and application of Section 102(b). For its part, Google suggests that there is a two-step copyrightability analysis, wherein Section 102(a) grants copyright protection to original works, while Section 102(b) takes it away if the work has a functional component. To the contrary, however, Congress emphasized that Section 102(b) "in no way enlarges or contracts the scope of copyright protection" and that its "purpose is to restate . . . that the basic dichotomy between expression and idea remains unchanged." Feist, 499 U.S. at 356 (quoting H.R. Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5670). "Section 102(b) does not extinguish the protection accorded a particular expression of an idea merely because that expression is embodied in a method of operation." Mitel, Inc. v. Iqtel, Inc., 124 F.3d 1366, 1372 (10th Cir. 1997). Section 102(a) and 102(b) are to be considered collectively so that certain expressions are subject to greater scrutiny. Id. In assessing copyrightability, the district court is required to ferret out apparent expressive aspects of a work and then separate protectable expression from "unprotectable ideas, facts, processes, and methods of operation." See Atari, 975 F.2d at 839.

Of course, as with many things, in defining this task, the devil is in the details. Circuit courts have struggled with, and disagree over, the tests to be employed when attempting to draw the line between what is protectable expression and what is not. Compare Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1236 (3d Cir. 1986) (everything not necessary to the purpose or function of a work is expression), with Lotus, 49 F.3d at 815 (methods of operation are means by which a user operates something and any words used to effectuate that operation are unprotected expression). When assessing whether the non-literal elements of a computer program constitute protectable expression, the Ninth Circuit has endorsed an "abstraction-filtration-comparison" test formulated by the Second Circuit and expressly adopted by several other circuits. Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510, 1525 (9th Cir. 1992) ("In our view, in light of the essentially utilitarian nature of computer programs, the Second Circuit's approach is an appropriate one."). This test rejects the notion that anything that performs a function is necessarily uncopyrightable. See Mitel, 124 F.3d at 1372 (rejecting the Lotus court's formulation, and concluding that, "although an element of a work may be characterized as a method of operation, that element may nevertheless contain expression that is eligible for copyright protection."). And it also rejects as flawed the Whelan assumption that, once any separable idea can be identified in a computer program everything else must be protectable expression, on grounds that more than one idea may be embodied in any particular program. Altai, 982 F.2d at 705-06.

Thus, this test eschews bright line approaches and requires a more nuanced assessment of the particular program at issue in order to determine what expression is protectable and infringed. As the Second Circuit explains, this test has three steps. In the abstraction step, the court "first break[s] down the allegedly infringed program into its constituent structural parts." Id. at 706. In the filtration step, the court "sift[s] out all non-protectable material," including ideas and "expression that is necessarily incidental to those ideas." Id. In the final step, the court compares the remaining creative expression with the allegedly infringing program.[4]

In the second step, the court is first to assess whether the expression is original to the programmer or author. Atari, 975 F.2d at 839. The court must then determine whether the particular inclusion of any level of abstraction is dictated by considerations of efficiency, required by factors already external to the program itself, or taken from the public domain—all of which would render the expression unprotectable. Id. These conclusions are to be informed by traditional copyright principles of originality, merger, and scenes a faire. See Mitel, 124 F.3d at 1372 ("Although this core of expression is eligible for copyright protection, it is subject to the rigors of filtration analysis which excludes from protection expression that is in the public domain, otherwise unoriginal, or subject to the doctrines of merger and scenes a faire.").

In all circuits, it is clear that the first step is part of the copyrightability analysis and that the third is an infringement question. It is at the second step of this analysis where the circuits are in less accord. Some treat all aspects of this second step as part of the copyrightability analysis, while others divide questions of originality from the other inquiries, treating the former as a question of copyrightability and the latter as part of the infringement inquiry. Compare Lexmark, 387 F.3d at 537-38 (finding that the district court erred in assessing principles of merger and scenes a faire in the infringement analysis, rather than as a component of copyrightability), with Kregos, 937 F.2d at 705 (noting that the Second Circuit has considered the merger doctrine "in determining whether actionable infringement has occurred, rather than whether a copyright is valid"); see also Lexmark, 387 F.3d at 557 (Feikens, J., dissenting-in-part) (noting the circuit split and concluding that, where a court is assessing merger of an expression with a method of operation, "I would find the merger doctrine can operate only as a defense to infringement in that context, and as such has no bearing on the question of copyrightability."). We need not assess the wisdom of these respective views because there is no doubt on which side of this circuit split the Ninth Circuit falls.

In the Ninth Circuit, while questions regarding originality are considered questions of copyrightability, concepts of merger and scenes a faire are affirmative defenses to claims of infringement. Ets-Hokin, 225 F.3d at 1082; Satava v. Lowry, 323 F.3d 805, 810 n.3 (9th Cir. 2003) ("The Ninth Circuit treats scenes a faire as a defense to infringement rather than as a barrier to copyrightability."). The Ninth Circuit has acknowledged that "there is some disagreement among courts as to whether these two doctrines figure into the issue of copyrightability or are more properly defenses to infringement." Ets-Hokin, 225 F.3d at 1082 (citations omitted). It, nonetheless, has made clear that, in that circuit, these concepts are to be treated as defenses to infringement. Id. (citing Kregos, 937 F.2d at 705 (holding that the merger doctrine relates to infringement, not copyrightability); Reed-Union Corp. v. Turtle Wax, Inc., 77 F.3d 909, 914 (7th Cir. 1996) (explaining why the doctrine of scenes a faire is separate from the validity of a copyright)).

With these principles in mind, we turn to the trial court's analysis and judgment and to Oracle's objections thereto. While the trial court mentioned the abstractionfiltration-comparison test when describing the development of relevant law, it did not purport to actually apply that test. Instead, it moved directly to application of familiar principles of copyright law when assessing the copyrightability of the declaring code and interpreted Section 102(b) to preclude copyrightability for any functional element "essential for interoperability" "regardless of its form." Copyrightability Decision, 872 F. Supp. 2d at 997.

Oracle asserts that all of the trial court's conclusions regarding copyrightability are erroneous. Oracle argues that its Java API packages are entitled to protection under the Copyright Act because they are expressive and could have been written and organized in any number of ways to achieve the same functions. Specifically, Oracle argues that the district court erred when it: (1) concluded that each line of declaring code is uncopyrightable because the idea and expression have merged; (2) found the declaring code uncopyrightable because it employs short phrases; (3) found all aspects of the SSO devoid of protection as a "method of operation" under 17 U.S.C. § 102(b); and (4) invoked Google's "interoperability" concerns in the copyrightability analysis. For the reasons explained below, we agree with Oracle on each point.

1. Declaring Source Code

First, Oracle argues that the district court erred in concluding that each line of declaring source code is completely unprotected under the merger and short phrases doctrines. Google responds that Oracle waived its right to assert copyrightability based on the 7,000 lines of declaring code by failing "to object to instructions and a verdict form that effectively eliminated that theory from the case." Appellee Br. 67. Even if not waived, moreover, Google argues that, because there is only one way to write the names and declarations, the merger doctrine bars copyright protection.

We find that Oracle did not waive arguments based on Google's literal copying of the declaring code. Prior to trial, both parties informed the court that Oracle's copyright infringement claims included the declarations of the API elements in the Android class library source code. See Oracle's Statement of Issues Regarding Copyright, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. Apr. 12, 2012), ECF No. 899-1, at 3 (Oracle accuses the "declarations of the API elements in the Android class library source code and object code that implements the 37 API packages" of copyright infringement.); see also Google's Proposed Statement of Issues Regarding Copyright, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. Apr. 12, 2012), ECF No. 901, at 2 (Oracle accuses the "declarations of the API elements in Android class library source code and object code that implements the 37 API packages.").

While Google is correct that the jury instructions and verdict form focused on the structure and organization of the packages, we agree with Oracle that there was no need for the jury to address copying of the declaring code because Google conceded that it copied it verbatim. Indeed, the district court specifically instructed the jury that "Google agrees that it uses the same names and declarations" in Android. Final Charge to the Jury at 10.

That the district court addressed the declaring code in its post-jury verdict copyrightability decision further confirms that the verbatim copying of declaring code remained in the case. The court explained that the "identical lines" that Google copied into Android "are those lines that specify the names, parameters and functionality of the methods and classes, lines called `declarations' or `headers.'" Copyrightability Decision, 872 F. Supp. 2d at 979. The court specifically found that the declaring code was not entitled to copyright protection under the merger and short phrases doctrines. We address each in turn.

a. Merger

The merger doctrine functions as an exception to the idea/expression dichotomy. It provides that, when there are a limited number of ways to express an idea, the idea is said to "merge" with its expression, and the expression becomes unprotected. Altai, 982 F.2d at 707-08. As noted, the Ninth Circuit treats this concept as an affirmative defense to infringement. Ets-Hokin, 225 F.3d at 1082. Accordingly, it appears that the district court's merger analysis is irrelevant to the question of whether Oracle's API packages are copyrightable in the first instance. Regardless of when the analysis occurs, we conclude that merger does not apply on the record before us.

Under the merger doctrine, a court will not protect a copyrighted work from infringement if the idea contained therein can be expressed in only one way. Satava v. Lowry, 323 F.3d 805, 812 n.5 (9th Cir. 2003). For computer programs, "this means that when specific [parts of the code], even though previously copyrighted, are the only and essential means of accomplishing a given task, their later use by another will not amount to infringement." Altai, 982 F.2d at 708 (citation omitted). We have recognized, however, applying Ninth Circuit law, that the "unique arrangement of computer program expression . . . does not merge with the process so long as alternate expressions are available." Atari, 975 F.2d at 840.

In Atari, for example, Nintendo designed a program— the 10NES—to prevent its video game system from accepting unauthorized game cartridges. 975 F.2d at 836. Nintendo "chose arbitrary programming instructions and arranged them in a unique sequence to create a purely arbitrary data stream" which "serves as the key to unlock the NES." Id. at 840. Because Nintendo produced expert testimony "showing a multitude of different ways to generate a data stream which unlocks the NES console," we concluded that Nintendo's specific choice of code did not merge with the process. Id.

Here, the district court found that, "no matter how creative or imaginative a Java method specification may be, the entire world is entitled to use the same method specification (inputs, outputs, parameters) so long as the line-by-line implementations are different." Copyrightability Decision, 872 F. Supp. 2d at 998. In its analysis, the court identified the method declaration as the idea and found that the implementation is the expression. Id. ("The method specification is the idea. The method implementation is the expression. No one may monopolize the idea.") (emphases in original). The court explained that, under the rules of Java, a programmer must use the identical "declaration or method header lines" to "declare a method specifying the same functionality." Id. at 976. Because the district court found that there was only one way to write the declaring code for each of the Java packages, it concluded that "the merger doctrine bars anyone from claiming exclusive copyright ownership" of it. Id. at 998. Accordingly, the court held there could be "no copyright violation in using the identical declarations." Id.

Google agrees with the district court that the implementing code is the expression entitled to protection—not the declaring code. Indeed, at oral argument, counsel for Google explained that, "it is not our position that none of Java is copyrightable. Obviously, Google spent two and a half years . . . to write from scratch all of the implementing code." Oral Argument at 33:16.[5] Because it is undisputed that Google wrote its own implementing code, the copyrightability of the precise language of that code is not at issue on appeal. Instead, our focus is on the declaring code and structure of the API packages.

On appeal, Oracle argues that the district court: (1) misapplied the merger doctrine; and (2) failed to focus its analysis on the options available to the original author. We agree with Oracle on both points. First, we agree that merger cannot bar copyright protection for any lines of declaring source code unless Sun/Oracle had only one way, or a limited number of ways, to write them. See Satava, 323 F.3d at 812 n.5 ("Under the merger doctrine, courts will not protect a copyrighted work from infringement if the idea underlying the copyrighted work can be expressed in only one way, lest there be a monopoly on the underlying idea."). The evidence showed that Oracle had "unlimited options as to the selection and arrangement of the 7000 lines Google copied." Appellant Br. 50. Using the district court's "java.lang.Math.max" example, Oracle explains that the developers could have called it any number of things, including "Math.maximum" or "Arith.larger." This was not a situation where Oracle was selecting among preordained names and phrases to create its packages.[6] As the district court recognized, moreover, "the Android method and class names could have been different from the names of their counterparts in Java and still have worked." Copyrightability Decision, 872 F. Supp. 2d at 976. Because "alternative expressions [we]re available," there is no merger. See Atari, 975 F.2d at 840.

We further find that the district court erred in focusing its merger analysis on the options available to Google at the time of copying. It is well-established that copyrightability and the scope of protectable activity are to be evaluated at the time of creation, not at the time of infringement. See Apple Computer, Inc. v. Formula Int'l, Inc., 725 F.2d 521, 524 (9th Cir. 1984) (quoting National Commission on New Technological Uses of Copyrighted Works, Final Report at 21 (1979) ("CONTU Report") (recognizing that the Copyright Act was designed "to protect all works of authorship from the moment of their fixation in any tangible medium of expression")). The focus is, therefore, on the options that were available to Sun/Oracle at the time it created the API packages. Of course, once Sun/Oracle created "java.lang.Math.max," programmers who want to use that particular package have to call it by that name. But, as the court acknowledged, nothing prevented Google from writing its own declaring code, along with its own implementing code, to achieve the same result. In such circumstances, the chosen expression simply does not merge with the idea being expressed.[7]

It seems possible that the merger doctrine, when properly analyzed, would exclude the three packages identified by the district court as core packages from the scope of actionable infringing conduct. This would be so if the Java authors, at the time these packages were created, had only a limited number of ways to express the methods and classes therein if they wanted to write in the Java language. In that instance, the idea may well be merged with the expression in these three packages.[8] Google did not present its merger argument in this way below and does not do so here, however. Indeed, Google does not try to differentiate among the packages for purposes of its copyrightability analysis and does not appeal the infringement verdict as to the packages. For these reasons, we reject the trial court's merger analysis.

b. Short Phrases

The district court also found that Oracle's declaring code consists of uncopyrightable short phrases. Specifically, the court concluded that, "while the Android method and class names could have been different from the names of their counterparts in Java and still have worked, copyright protection never extends to names or short phrases as a matter of law." Copyrightability Decision, 872 F. Supp. 2d at 976.

The district court is correct that "[w]ords and short phrases such as names, titles, and slogans" are not subject to copyright protection. 37 C.F.R. § 202.1(a). The court failed to recognize, however, that the relevant question for copyrightability purposes is not whether the work at issue contains short phrases—as literary works often do—but, rather, whether those phrases are creative. See Soc'y of Holy Transfiguration Monastery, Inc. v. Gregory, 689 F.3d 29, 52 (1st Cir. 2012) (noting that "not all short phrases will automatically be deemed uncopyrightable"); see also 1 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 2.01[B] (2013) ("[E]ven a short phrase may command copyright protection if it exhibits sufficient creativity."). And, by dissecting the individual lines of declaring code at issue into short phrases, the district court further failed to recognize that an original combination of elements can be copyrightable. See Softel, Inc. v. Dragon Med. & Scientific Commc'ns, 118 F.3d 955, 964 (2d Cir. 1997) (noting that, in Feist, "the Court made quite clear that a compilation of nonprotectible elements can enjoy copyright protection even though its constituent elements do not").

By analogy, the opening of Charles Dickens' A Tale of Two Cities is nothing but a string of short phrases. Yet no one could contend that this portion of Dickens' work is unworthy of copyright protection because it can be broken into those shorter constituent components. The question is not whether a short phrase or series of short phrases can be extracted from the work, but whether the manner in which they are used or strung together exhibits creativity.

Although the district court apparently focused on individual lines of code, Oracle is not seeking copyright protection for a specific short phrase or word. Instead, the portion of declaring code at issue is 7,000 lines, and Google's own "Java guru" conceded that there can be "creativity and artistry even in a single method declaration." Joint Appendix ("J.A.") 20,970. Because Oracle "exercised creativity in the selection and arrangement" of the method declarations when it created the API packages and wrote the relevant declaring code, they contain protectable expression that is entitled to copyright protection. See Atari, 975 F.2d at 840; see also 17 U.S.C. §§ 101, 103 (recognizing copyright protection for "compilations" which are defined as work that is "selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship"). Accordingly, we conclude that the district court erred in applying the short phrases doctrine to find the declaring code not copyrightable.

c. Scenes a Faire

The scenes a faire doctrine, which is related to the merger doctrine, operates to bar certain otherwise creative expression from copyright protection. Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1444 (9th Cir. 1994). It provides that "expressive elements of a work of authorship are not entitled to protection against infringement if they are standard, stock, or common to a topic, or if they necessarily follow from a common theme or setting." Mitel, 124 F.3d at 1374. Under this doctrine, "when certain commonplace expressions are indispensable and naturally associated with the treatment of a given idea, those expressions are treated like ideas and therefore [are] not protected by copyright." Swirsky v. Carey, 376 F.3d 841, 850 (9th Cir. 2004). In the computer context, "the scene a faire doctrine denies protection to program elements that are dictated by external factors such as `the mechanical specifications of the computer on which a particular program is intended to run' or `widely accepted programming practices within the computer industry.'" Softel, 118 F.3d at 963 (citation omitted).

The trial court rejected Google's reliance on the scenes a faire doctrine. It did so in a footnote, finding that Google had failed to present evidence to support the claim that either the grouping of methods within the classes or the code chosen for them "would be so expected and customary as to be permissible under the scenes a faire doctrine." Copyrightability Decision, 872 F. Supp. 2d at 999 n.9. Specifically, the trial court found that "it is impossible to say on this record that all of the classes and their contents are typical of such classes and, on this record, this order rejects Google's global argument based on scenes a faire." Id.

On appeal, Google refers to scenes a faire concepts briefly, as do some amici, apparently contending that, because programmers have become accustomed to and comfortable using the groupings in the Java API packages, those groupings are so commonplace as to be indispensable to the expression of an acceptable programming platform. As such, the argument goes, they are so associated with the "idea" of what the packages are accomplishing that they should be treated as ideas rather than expression. See Br. of Amici Curiae Rackspace US, Inc., et al. at 19-22.

Google cannot rely on the scenes a faire doctrine as an alternative ground upon which we might affirm the copyrightability judgment of the district court. This is so for several reasons. First, as noted, like merger, in the Ninth Circuit, the scenes a faire doctrine is a component of the infringement analysis. "[S]imilarity of expression, whether literal or non-literal, which necessarily results from the fact that the common idea is only capable of expression in more or less stereotyped form, will preclude a finding of actionable similarity." 4 Nimmer on Copyright § 13.03[B][3]. Thus, the expression is not excluded from copyright protection; it is just that certain copying is forgiven as a necessary incident of any expression of the underlying idea. See Satava, 323 F.3d at 810 n.3 ("The Ninth Circuit treats scenes a faire as a defense to infringement rather than as a barrier to copyrightability.").

Second, Google has not objected to the trial court's conclusion that Google failed to make a sufficient factual record to support its contention that the groupings and code chosen for the 37 Java API packages were driven by external factors or premised on features that were either commonplace or essential to the idea being expressed. Google provides no record citations indicating that such a showing was made and does not contend that the trial court erred when it expressly found it was not. Indeed, Google does not even make this argument with respect to the core packages.

Finally, Google's reliance on the doctrine below and the amici reference to it here are premised on a fundamental misunderstanding of the doctrine. Like merger, the focus of the scenes a faire doctrine is on the circumstances presented to the creator, not the copier. See Mitel, 124 F.3d at 1375 (finding error to the extent the trial court discussed "whether external factors such as market forces and efficiency considerations justified Iqtel's copying of the command codes"). The court's analytical focus must be upon the external factors that dictated Sun's selection of classes, methods, and code—not upon what Google encountered at the time it chose to copy those groupings and that code. See id. "[T]he scenes a faire doctrine identifies and excludes from protection against infringement expression whose creation `flowed naturally from considerations external to the author's creativity.'" Id. (quoting Nimmer § 13.03[F][3], at 13-131 (1997)). It is this showing the trial court found Google failed to make, and Google cites to nothing in the record which indicates otherwise.

For these reasons, the trial court was correct to conclude that the scenes a faire doctrine does not affect the copyrightability of either the declaring code in, or the SSO of, the Java API packages at issue.

2. The Structure, Sequence, and Organization of the API Packages

The district court found that the SSO of the Java API packages is creative and original, but nevertheless held that it is a "system or method of operation . . . and, therefore, cannot be copyrighted" under 17 U.S.C. § 102(b). Copyrightability Decision, 872 F. Supp. 2d at 976-77. In reaching this conclusion, the district court seems to have relied upon language contained in a First Circuit decision: Lotus Development Corp. v. Borland International, Inc., 49 F.3d 807 (1st Cir. 1995), aff'd without opinion by equally divided court, 516 U.S. 233 (1996).[9]

In Lotus, it was undisputed that the defendant copied the menu command hierarchy and interface from Lotus 1-2-3, a computer spreadsheet program "that enables users to perform accounting functions electronically on a computer." 49 F.3d at 809. The menu command hierarchy referred to a series of commands—such as "Copy," "Print," and "Quit"—which were arranged into more than 50 menus and submenus. Id. Although the defendant did not copy any Lotus source code, it copied the menu command hierarchy into its rival program. The question before the court was "whether a computer menu command hierarchy is copyrightable subject matter." Id.

Although it accepted the district court's finding that Lotus developers made some expressive choices in selecting and arranging the command terms, the First Circuit found that the command hierarchy was not copyrightable because, among other things, it was a "method of operation" under Section 102(b). In reaching this conclusion, the court defined a "method of operation" as "the means by which a person operates something, whether it be a car, a food processor, or a computer." Id. at 815.[10] Because the Lotus menu command hierarchy provided "the means by which users control and operate Lotus 1-2-3," it was deemed unprotectable. Id. For example, if users wanted to copy material, they would use the "Copy" command and the command terms would tell the computer what to do. According to the Lotus court, the "fact that Lotus developers could have designed the Lotus menu command hierarchy differently is immaterial to the question of whether it is a `method of operation.'" Id. at 816. (noting that "our initial inquiry is not whether the Lotus menu command hierarchy incorporates any expression"). The court further indicated that, "[i]f specific words are essential to operating something, then they are part of a `method of operation' and, as such, are unprotectable." Id.

On appeal, Oracle argues that the district court's reliance on Lotus is misplaced because it is distinguishable on its facts and is inconsistent with Ninth Circuit law. We agree. First, while the defendant in Lotus did not copy any of the underlying code, Google concedes that it copied portions of Oracle's declaring source code verbatim. Second, the Lotus court found that the commands at issue there (copy, print, etc.) were not creative, but it is undisputed here that the declaring code and the structure and organization of the API packages are both creative and original. Finally, while the court in Lotus found the commands at issue were "essential to operating" the system, it is undisputed that—other than perhaps as to the three core packages—Google did not need to copy the structure, sequence, and organization of the Java API packages to write programs in the Java language.

More importantly, however, the Ninth Circuit has not adopted the court's "method of operation" reasoning in Lotus, and we conclude that it is inconsistent with binding precedent.[11] Specifically, we find that Lotus is inconsistent with Ninth Circuit case law recognizing that the structure, sequence, and organization of a computer program is eligible for copyright protection where it qualifies as an expression of an idea, rather than the idea itself. See Johnson Controls, 886 F.2d at 1175-76. And, while the court in Lotus held "that expression that is part of a `method of operation' cannot be copyrighted," 49 F.3d at 818, this court—applying Ninth Circuit law—reached the exact opposite conclusion, finding that copyright protects "the expression of [a] process or method," Atari, 975 F.2d at 839.

We find, moreover, that the hard and fast rule set down in Lotus and employed by the district court here— i.e., that elements which perform a function can never be copyrightable—is at odds with the Ninth Circuit's endorsement of the abstraction-filtration-comparison analysis discussed earlier. As the Tenth Circuit concluded in expressly rejecting the Lotus "method of operation" analysis, in favor of the Second Circuit's abstraction-filtrationcomparison test, "although an element of a work may be characterized as a method of operation, that element may nevertheless contain expression that is eligible for copyright protection." Mitel, 124 F.3d at 1372. Specifically, the court found that Section 102(b) "does not extinguish the protection accorded a particular expression of an idea merely because that expression is embodied in a method of operation at a higher level of abstraction." Id.

Other courts agree that components of a program that can be characterized as a "method of operation" may nevertheless be copyrightable. For example, the Third Circuit rejected a defendant's argument that operating system programs are "per se" uncopyrightable because an operating system is a "method of operation" for a computer. Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1250-52 (3d Cir. 1983). The court distinguished between the "method which instructs the computer to perform its operating functions" and "the instructions themselves," and found that the instructions were copyrightable. Id. at 1250-51. In its analysis, the court noted: "[t]hat the words of a program are used ultimately in the implementation of a process should in no way affect their copyrightability." Id. at 1252 (quoting CONTU Report at 21). The court focused "on whether the idea is capable of various modes of expression" and indicated that, "[i]f other programs can be written or created which perform the same function as [i]n Apple's operating system program, then that program is an expression of the idea and hence copyrightable." Id. at 1253. Notably, no other circuit has adopted the First Circuit's "method of operation" analysis.

Courts have likewise found that classifying a work as a "system" does not preclude copyright for the particular expression of that system. See Toro Co. v. R & R Prods. Co., 787 F.2d 1208, 1212 (8th Cir. 1986) (rejecting the district court's decision that "appellant's parts numbering system is not copyrightable because it is a `system'" and indicating that Section 102(b) does not preclude protection for the "particular expression" of that system); see also Am. Dental Ass'n v. Delta Dental Plans Ass'n, 126 F.3d 977, 980 (7th Cir. 1997) ("A dictionary cannot be called a `system' just because new novels are written using words, all of which appear in the dictionary. Nor is word-processing software a `system' just because it has a command structure for producing paragraphs.").

Here, the district court recognized that the SSO "resembles a taxonomy," but found that "it is nevertheless a command structure, a system or method of operation—a long hierarchy of over six thousand commands to carry out pre-assigned functions." Copyrightability Decision, 872 F. Supp. 2d at 999-1000.[12] In other words, the court concluded that, although the SSO is expressive, it is not copyrightable because it is also functional. The problem with the district court's approach is that computer programs are by definition functional—they are all designed to accomplish some task. Indeed, the statutory definition of "computer program" acknowledges that they function "to bring about a certain result." See 17 U.S.C. § 101 (defining a "computer program" as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result"). If we were to accept the district court's suggestion that a computer program is uncopyrightable simply because it "carr[ies] out pre-assigned functions," no computer program is protectable. That result contradicts Congress's express intent to provide copyright protection to computer programs, as well as binding Ninth Circuit case law finding computer programs copyrightable, despite their utilitarian or functional purpose. Though the trial court did add the caveat that it "does not hold that the structure, sequence and organization of all computer programs may be stolen," Copyrightability Decision, 872 F. Supp. 2d at 1002, it is hard to see how its method of operation analysis could lead to any other conclusion.

While it does not appear that the Ninth Circuit has addressed the precise issue, we conclude that a set of commands to instruct a computer to carry out desired operations may contain expression that is eligible for copyright protection. See Mitel, 124 F.3d at 1372. We agree with Oracle that, under Ninth Circuit law, an original work—even one that serves a function—is entitled to copyright protection as long as the author had multiple ways to express the underlying idea. Section 102(b) does not, as Google seems to suggest, automatically deny copyright protection to elements of a computer program that are functional. Instead, as noted, Section 102(b) codifies the idea/expression dichotomy and the legislative history confirms that, among other things, Section 102(b) was "intended to make clear that the expression adopted by the programmer is the copyrightable element in a computer program." H.R. Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5670. Therefore, even if an element directs a computer to perform operations, the court must nevertheless determine whether it contains any separable expression entitled to protection.

On appeal, Oracle does not—and concedes that it cannot—claim copyright in the idea of organizing functions of a computer program or in the "package-class-method" organizational structure in the abstract. Instead, Oracle claims copyright protection only in its particular way of naming and organizing each of the 37 Java API packages.[13] Oracle recognizes, for example, that it "cannot copyright the idea of programs that open an internet connection," but "it can copyright the precise strings of code used to do so, at least so long as `other language is available' to achieve the same function." Appellant Reply Br. 13-14 (citation omitted). Thus, Oracle concedes that Google and others could employ the Java language—much like anyone could employ the English language to write a paragraph without violating the copyrights of other English language writers. And, that Google may employ the "package-class-method" structure much like authors can employ the same rules of grammar chosen by other authors without fear of infringement. What Oracle contends is that, beyond that point, Google, like any author, is not permitted to employ the precise phrasing or precise structure chosen by Oracle to flesh out the substance of its packages—the details and arrangement of the prose.

As the district court acknowledged, Google could have structured Android differently and could have chosen different ways to express and implement the functionality that it copied.[14] Specifically, the court found that "the very same functionality could have been offered in Android without duplicating the exact command structure used in Java." Copyrightability Decision, 872 F. Supp. 2d at 976. The court further explained that Google could have offered the same functions in Android by "rearranging the various methods under different groupings among the various classes and packages." Id. The evidence showed, moreover, that Google designed many of its own API packages from scratch, and, thus, could have designed its own corresponding 37 API packages if it wanted to do so.

Given the court's findings that the SSO is original and creative, and that the declaring code could have been written and organized in any number of ways and still have achieved the same functions, we conclude that Section 102(b) does not bar the packages from copyright protection just because they also perform functions.

3. Google's Interoperability Arguments are Irrelevant to Copyrightability

Oracle also argues that the district court erred in invoking interoperability in its copyrightability analysis. Specifically, Oracle argues that Google's interoperability arguments are only relevant, if at all, to fair use—not to the question of whether the API packages are copyrightable. We agree.

In characterizing the SSO of the Java API packages as a "method of operation," the district court explained that "[d]uplication of the command structure is necessary for interoperability." Copyrightability Decision, 872 F. Supp. 2d at 977. The court found that, "[i]n order for at least some of [the pre-Android Java] code to run on Android, Google was required to provide the same java.package.Class.method() command system using the same names with the same `taxonomy' and with the same functional specifications." Id. at 1000 (emphasis omitted). And, the court concluded that "Google replicated what was necessary to achieve a degree of interoperability—but no more, taking care, as said before, to provide its own implementations." Id. In reaching this conclusion, the court relied primarily on two Ninth Circuit decisions: Sega Enterprises v. Accolade, Inc., 977 F.2d 1510 (9th Cir. 1992), and Sony Computer Entertainment, Inc. v. Connectix, Corp., 203 F.3d 596 (9th Cir. 2000).

Both Sega and Sony are fair use cases in which copyrightability was addressed only tangentially. In Sega, for example, Sega manufactured a video game console and game cartridges that contained hidden functional program elements necessary to achieve compatibility with the console. Defendant Accolade: (1) reverse-engineered Sega's video game programs to discover the requirements for compatibility; and (2) created its own games for the Sega console. Sega, 977 F.2d at 1514-15. As part of the reverse-engineering process, Accolade made intermediate copies of object code from Sega's console. Id. Although the court recognized that the intermediate copying of computer code may infringe Sega's copyright, it concluded that "disassembly of copyrighted object code is, as a matter of law, a fair use of the copyrighted work if such disassembly provides the only means of access to those elements of the code that are not protected by copyright and the copier has a legitimate reason for seeking such access." Id. at 1518. The court agreed with Accolade that its copying was necessary to examine the unprotected functional aspects of the program. Id. at 1520. And, because Accolade had a legitimate interest in making its cartridges compatible with Sega's console, the court found that Accolade's intermediate copying was fair use.

Likewise, in Sony, the Ninth Circuit found that the defendant's reverse engineering and intermediate copying of Sony's copyrighted software program "was a fair use for the purpose of gaining access to the unprotected elements of Sony's software." Sony, 203 F.3d at 602. The court explained that Sony's software program contained unprotected functional elements and that the defendant could only access those elements through reverse engineering. Id. at 603. The defendant used that information to create a software program that let consumers play games designed for Sony's PlayStation console on their computers. Notably, the defendant's software program did not contain any of Sony's copyrighted material. Id. at 598.

The district court characterized Sony and Sega as "close analogies" to this case. Copyrightability Decision, 872 F. Supp. 2d at 1000. According to the court, both decisions "held that interface procedures that were necessary to duplicate in order to achieve interoperability were functional aspects not copyrightable under Section 102(b)." Id. The district court's reliance on Sega and Sony in the copyrightability context is misplaced, however.

As noted, both cases were focused on fair use, not copyrightability. In Sega, for example, the only question was whether Accolade's intermediate copying was fair use. The court never addressed the question of whether Sega's software code, which had functional elements, also contained separable creative expression entitled to protection. Likewise, although the court in Sony determined that Sony's computer program had functional elements, it never addressed whether it also had expressive elements. Sega and Sony are also factually distinguishable because the defendants in those cases made intermediate copies to understand the functional aspects of the copyrighted works and then created new products. See Sony, 203 F.3d at 606-07; Sega, 977 F.2d at 1522-23. This is not a case where Google reverse-engineered Oracle's Java packages to gain access to unprotected functional elements contained therein. As the former Register of Copyrights of the United States pointed out in his brief amicus curiae, "[h]ad Google reverse engineered the programming packages to figure out the ideas and functionality of the original, and then created its own structure and its own literal code, Oracle would have no remedy under copyright whatsoever." Br. for Amicus Curiae Ralph Oman 29. Instead, Google chose to copy both the declaring code and the overall SSO of the 37 Java API packages at issue.

We disagree with Google's suggestion that Sony and Sega created an "interoperability exception" to copyrightability. See Appellee Br. 39 (citing Sony and Sega for the proposition that "compatibility elements are not copyrightable under section 102(b)" (emphasis omitted)). Although both cases recognized that the software programs at issue there contained unprotected functional elements, a determination that some elements are unprotected is not the same as saying that the entire work loses copyright protection. To accept Google's reading would contradict Ninth Circuit case law recognizing that both the literal and non-literal components of a software program are eligible for copyright protection. See Johnson Controls, 886 F.2d at 1175. And it would ignore the fact that the Ninth Circuit endorsed the abstractionfiltration-comparison inquiry in Sega itself.

As previously discussed, a court must examine the software program to determine whether it contains creative expression that can be separated from the underlying function. See Sega, 977 F.2d at 1524-25. In doing so, the court filters out the elements of the program that are "ideas" as well as elements that are "dictated by considerations of efficiency, so as to be necessarily incidental to that idea; required by factors external to the program itself." Altai, 982 F.2d at 707.

To determine "whether certain aspects of an allegedly infringed software are not protected by copyright law, the focus is on external factors that influenced the choice of the creator of the infringed product." Dun & Bradstreet Software Servs., Inc. v. Grace Consulting, Inc., 307 F.3d 197, 215 (3d Cir. 2002) (citing Altai, 982 F.2d at 714; Mitel, 124 F.3d at 1375). The Second Circuit, for example, has noted that programmers are often constrained in their design choices by "extrinsic considerations" including "the mechanical specifications of the computer on which a particular program is intended to run" and "compatibility requirements of other programs with which a program is designed to operate in conjunction." Altai, 982 F.2d at 709-10 (citing 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.01 at 13-66-71 (1991)). The Ninth Circuit has likewise recognized that: (1) computer programs "contain many logical, structural, and visual display elements that are dictated by . . . external factors such as compatibility requirements and industry demands"; and (2) "[i]n some circumstances, even the exact set of commands used by the programmer is deemed functional rather than creative for purposes of copyright." Sega, 977 F.2d at 1524 (internal citation omitted).

Because copyrightability is focused on the choices available to the plaintiff at the time the computer program was created, the relevant compatibility inquiry asks whether the plaintiff's choices were dictated by a need to ensure that its program worked with existing third-party programs. Dun & Bradstreet, 307 F.3d at 215; see also Atari, 975 F.2d at 840 ("External factors did not dictate the design of the 10NES program."). Whether a defendant later seeks to make its program interoperable with the plaintiff's program has no bearing on whether the software the plaintiff created had any design limitations dictated by external factors. See Dun & Bradstreet, 307 F.3d at 215 (finding an expert's testimony on interoperability "wholly misplaced" because he "looked at externalities from the eyes of the plagiarist, not the eyes of the program's creator"). Stated differently, the focus is on the compatibility needs and programming choices of the party claiming copyright protection—not the choices the defendant made to achieve compatibility with the plaintiff's program. Consistent with this approach, courts have recognized that, once the plaintiff creates a copyrightable work, a defendant's desire "to achieve total compatibility. . . is a commercial and competitive objective which does not enter into the . . . issue of whether particular ideas and expressions have merged." Apple Computer, 714 F.2d at 1253.

Given this precedent, we conclude that the district court erred in focusing its interoperability analysis on Google's desires for its Android software. See Copyrightability Decision, 872 F. Supp. 2d at 1000 ("Google replicated what was necessary to achieve a degree of interoperability" with Java.). Whether Google's software is "interoperable" in some sense with any aspect of the Java platform (although as Google concedes, certainly not with the JVM) has no bearing on the threshold question of whether Oracle's software is copyrightable. It is the interoperability and other needs of Oracle—not those of Google—that apply in the copyrightability context, and there is no evidence that when Oracle created the Java API packages at issue it did so to meet compatibility requirements of other pre-existing programs.

Google maintains on appeal that its use of the "Java class and method names and declarations was `the only and essential means' of achieving a degree of interoperability with existing programs written in the [Java language]." Appellee Br. 49. Indeed, given the record evidence that Google designed Android so that it would not be compatible with the Java platform, or the JVM specifically, we find Google's interoperability argument confusing. While Google repeatedly cites to the district court's finding that Google had to copy the packages so that an app written in Java could run on Android, it cites to no evidence in the record that any such app exists and points to no Java apps that either pre-dated or post-dated Android that could run on the Android platform.[15] The compatibility Google sought to foster was not with Oracle's Java platform or with the JVM central to that platform. Instead, Google wanted to capitalize on the fact that software developers were already trained and experienced in using the Java API packages at issue. The district court agreed, finding that, as to the 37 Java API packages, "Google believed Java application programmers would want to find the same 37 sets of functionalities in the new Android system callable by the same names as used in Java." Copyrightability Decision, 872 F. Supp. 2d at 978. Google's interest was in accelerating its development process by "leverag[ing] Java for its existing base of developers." J.A. 2033, 2092. Although this competitive objective might be relevant to the fair use inquiry, we conclude that it is irrelevant to the copyrightability of Oracle's declaring code and organization of the API packages.

Finally, to the extent Google suggests that it was entitled to copy the Java API packages because they had become the effective industry standard, we are unpersuaded. Google cites no authority for its suggestion that copyrighted works lose protection when they become popular, and we have found none.[16] In fact, the Ninth Circuit has rejected the argument that a work that later becomes the industry standard is uncopyrightable. See Practice Mgmt. Info. Corp. v. Am. Med. Ass'n, 121 F.3d 516, 520 n.8 (9th Cir. 1997) (noting that the district court found plaintiff's medical coding system entitled to copyright protection, and that, although the system had become the industry standard, plaintiff's copyright did not prevent competitors "from developing comparative or better coding systems and lobbying the federal government and private actors to adopt them. It simply prevents wholesale copying of an existing system."). Google was free to develop its own API packages and to "lobby" programmers to adopt them. Instead, it chose to copy Oracle's declaring code and the SSO to capitalize on the preexisting community of programmers who were accustomed to using the Java API packages. That desire has nothing to do with copyrightability. For these reasons, we find that Google's industry standard argument has no bearing on the copyrightability of Oracle's work.

B. Fair Use

As noted, the jury hung on Google's fair use defense, and the district court declined to order a new trial given its conclusion that the code and structure Google copied were not entitled to copyright protection. On appeal, Oracle argues that: (1) a remand to decide fair use "is pointless"; and (2) this court should find, as a matter of law, that "Google's commercial use of Oracle's work in a market where Oracle already competed was not fair use." Appellant Br. 68.

Fair use is an affirmative defense to copyright infringement and is codified in Section 107 of the Copyright Act. Golan, 132 S. Ct. at 890 ("[T]he fair use defense, is codified at 17 U.S.C. § 107."). Section 107 permits use of copyrighted work if it is "for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research." 17 U.S.C. § 107. The fair use doctrine has been referred to as "`the most troublesome in the whole law of copyright.'" Monge v. Maya Magazines, Inc., 688 F.3d 1164, 1170 (9th Cir. 2012) (quoting Dellar v. Samuel Goldwyn, Inc., 104 F.2d 661, 662 (2d Cir. 1939) (per curiam)). It both permits and requires "courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster." Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 577 (1994) (quoting Stewart v. Abend, 495 U.S. 207, 236 (1990)).

"Section 107 requires a case-by-case determination whether a particular use is fair, and the statute notes four nonexclusive factors to be considered." Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 549 (1985). Those factors are: (1) "the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;" (2) "the nature of the copyrighted work;" (3) "the amount and substantiality of the portion used in relation to the copyrighted work as a whole;" and (4) "the effect of the use upon the potential market for or value of the copyrighted work." 17 U.S.C. § 107. The Supreme Court has explained that all of the statutory factors "are to be explored, and the results weighed together, in light of the purpose[] of copyright," which is "[t]o promote the Progress of Science and useful Arts." Campbell, 510 U.S. at 578, 575 (internal citations omitted).

"Fair use is a mixed question of law and fact." Harper & Row, 471 U.S. at 560. Thus, while subsidiary and controverted findings of fact must be reviewed for clear error under Rule 52 of the Federal Rules of Civil Procedure, the Ninth Circuit reviews the ultimate application of those facts de novo. See Seltzer v. Green Day, Inc., 725 F.3d 1170, 1175 (9th Cir. 2013) (citing SOFA Entm't, Inc. v. Dodger Prods., Inc., 709 F.3d 1273, 1277 (9th Cir. 2013)). Where there are no material facts at issue and "the parties dispute only the ultimate conclusions to be drawn from those facts, we may draw those conclusions without usurping the function of the jury." Id. (citing Fisher v. Dees, 794 F.2d 432, 436 (9th Cir. 1986)). Indeed, the Supreme Court has specifically recognized that, "[w]here the district court has found facts sufficient to evaluate each of the statutory factors, an appellate court `need not remand for further factfinding . . . [but] may conclude as a matter of law that [the challenged use] [does] not qualify as a fair use of the copyrighted work.'" Harper & Row, 471 U.S. at 560 (citation omitted).

Of course, the corollary to this point is true as well— where there are material facts in dispute and those facts have not yet been resolved by the trier of fact, appellate courts may not make findings of fact in the first instance. See Shawmut Bank, N.A. v. Kress Assocs., 33 F.3d 1477, 1504 (9th Cir. 1994) ("[W]e must avoid finding facts in the first instance."); see also Golden Bridge Tech., Inc. v. Nokia, Inc., 527 F.3d 1318, 1323 (Fed. Cir. 2008) ("Appellate courts review district court judgments; we do not find facts."). Here, it is undisputed that neither the jury nor the district court made findings of fact to which we can refer in assessing the question of whether Google's use of the API packages at issue was a "fair use" within the meaning of Section 107. Oracle urges resolution of the fair use question by arguing that the trial court should have decided the question as a matter of law based on the undisputed facts developed at trial, and that we can do so as well. Google, on the other hand, argues that many critical facts regarding fair use are in dispute. It asserts that the fact that the jury could not reach a resolution on the fair use defense indicates that at least some presumably reasonable jurors found its use to be fair. And, Google asserts that, even if it is true that the district court erred in discussing concepts of "interoperability" when considering copyrightability, those concepts are still relevant to its fair use defense. We turn first to a more detailed examination of fair use.

The first factor in the fair use inquiry involves "the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes." 17 U.S.C. § 107(1). This factor involves two sub-issues: (1) "whether and to what extent the new work is transformative," Campbell, 510 U.S. at 579 (citation and internal quotation marks omitted); and (2) whether the use serves a commercial purpose.

A use is "transformative" if it "adds something new, with a further purpose or different character, altering the first with new expression, meaning or message." Id. The critical question is "whether the new work merely supersede[s] the objects of the original creation . . . or instead adds something new." Id. (citations and internal quotation marks omitted). This inquiry "may be guided by the examples given in the preamble to § 107, looking to whether the use is for criticism, or comment, or news reporting, and the like." Id. at 578-79. "The Supreme Court has recognized that parodic works, like other works that comment and criticize, are by their nature often sufficiently transformative to fit clearly under the fair use exception." Mattel Inc. v. Walking Mountain Prods., 353 F.3d 792, 800 (9th Cir. 2003) (citing Campbell, 510 U.S. at 579).

Courts have described new works as "transformative" when "the works use copy-righted material for purposes distinct from the purpose of the original material." Elvis Presley Enters., Inc. v. Passport Video, 349 F.3d 622, 629 (9th Cir. 2003) ("Here, Passport's use of many of the television clips is transformative because they are cited as historical reference points in the life of a remarkable entertainer."), overruled on other grounds by Flexible Lifeline Sys., Inc. v. Precision Lift, Inc., 654 F.3d 989, 995 (9th Cir. 2011) (per curiam); see also Bouchat v. Baltimore Ravens Ltd. P'ship, 619 F.3d 301, 309-10 (4th Cir. 2010) (quoting A.V. ex rel. Vanderhyge v. iParadigms, LLC, 562 F.3d 630, 638 (4th Cir. 2009) ("[A] transformative use is one that `employ[s] the quoted matter in a different manner or for a different purpose from the original.'")). "A use is considered transformative only where a defendant changes a plaintiff's copyrighted work or uses the plaintiff's copyrighted work in a different context such that the plaintiff's work is transformed into a new creation." Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1165 (9th Cir. 2007) (quoting Wall Data Inc. v. L.A. County Sheriff's Dep't, 447 F.3d 769, 778 (9th Cir. 2006), and finding that Google's use of thumbnail images in its search engine was "highly transformative").

A work is not transformative where the user "makes no alteration to the expressive content or message of the original work." Seltzer, 725 F.3d at 1177; see also Wall Data, 447 F.3d at 778 ("The Sheriff's Department created exact copies of RUMBA's software. It then put those copies to the identical purpose as the original software. Such a use cannot be considered transformative."); Monge, 688 F.3d at 1176 (finding that a magazine's publication of photographs of a secret celebrity wedding "sprinkled with written commentary" was "at best minimally transformative" where the magazine "did not transform the photos into a new work . . . or incorporate the photos as part of a broader work"); Elvis Presley Enters., 349 F.3d at 629 (finding that use of copyrighted clips of Elvis's television appearances was not transformative where "some of the clips [we]re played without much interruption, if any . . . [and] instead serve[d] the same intrinsic entertainment value that is protected by Plaintiffs' copyrights."). Where the use "is for the same intrinsic purpose as [the copyright holder's] . . . such use seriously weakens a claimed fair use." Worldwide Church of God v. Phila. Church of God, Inc., 227 F.3d 1110, 1117 (9th Cir. 2000) (quoting Weissmann v. Freeman, 868 F.2d 1313, 1324 (2d Cir. 1989)).

Analysis of the first factor also requires inquiry into the commercial nature of the use. Use of the copyrighted work that is commercial "tends to weigh against a finding of fair use." Harper & Row, 471 U.S. at 562 ("The crux of the profit/nonprofit distinction is not whether the sole motive of the use is monetary gain but whether the user stands to profit from exploitation of the copyrighted material without paying the customary price."). "[T]he more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579.

The second factor—the nature of the copyrighted work—"calls for recognition that some works are closer to the core of intended copyright protection than others, with the consequence that fair use is more difficult to establish when the former works are copied." Id. at 586. This factor "turns on whether the work is informational or creative." Worldwide Church of God, 227 F.3d at 1118; see also Harper & Row, 471 U.S. at 563 ("The law generally recognizes a greater need to disseminate factual works than works of fiction or fantasy."). Creative expression "falls within the core of the copyright's protective purposes." Campbell, 510 U.S. at 586. Because computer programs have both functional and expressive components, however, where the functional components are themselves unprotected (because, e.g., they are dictated by considerations of efficiency or other external factors), those elements should be afforded "a lower degree of protection than more traditional literary works." Sega, 977 F.2d at 1526. Thus, where the nature of the work is such that purely functional elements exist in the work and it is necessary to copy the expressive elements in order to perform those functions, consideration of this second factor arguably supports a finding that the use is fair.

The third factor asks the court to examine "the amount and substantiality of the portion used in relation to the copyrighted work as a whole." 17 U.S.C. § 107(3). Analysis of this factor is viewed in the context of the copyrighted work, not the infringing work. Indeed, the statutory language makes clear that "a taking may not be excused merely because it is insubstantial with respect to the infringing work." Harper & Row, 471 U.S. at 565. "As Judge Learned Hand cogently remarked, `no plagiarist can excuse the wrong by showing how much of his work he did not pirate.'" Id. (quoting Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 56 (2d Cir. 1936)). In contrast, "the fact that a substantial portion of the infringing work was copied verbatim is evidence of the qualitative value of the copied material, both to the originator and to the plagiarist who seeks to profit from marketing someone else's copyrighted expression." Id. The Ninth Circuit has recognized that, while "wholesale copying does not preclude fair use per se, copying an entire work militates against a finding of fair use." Worldwide Church of God, 227 F.3d at 1118 (internal citation and quotation omitted). "If the secondary user only copies as much as is necessary for his or her intended use, then this factor will not weigh against him or her." Kelly v. Arriba Soft Corp., 336 F.3d 811, 820-21 (9th Cir. 2003). Under this factor, "attention turns to the persuasiveness of a parodist's justification for the particular copying done, and the enquiry will harken back to the first of the statutory factors . . . [because] the extent of permissible copying varies with the purpose and character of the use." Campbell, 510 U.S. at 586-87.

The fourth and final factor focuses on "the effect of the use upon the potential market for or value of the copyrighted work." Harper & Row, 471 U.S. at 566. This factor reflects the idea that fair use "is limited to copying by others which does not materially impair the marketability of the work which is copied." Id. at 566-67. The Supreme Court has said that this factor is "undoubtedly the single most important element of fair use." Id. at 566. It requires that courts "consider not only the extent of market harm caused by the particular actions of the alleged infringer, but also whether unrestricted and widespread conduct of the sort engaged in by the defendant. . . would result in a substantially adverse impact on the potential market for the original." Campbell, 510 U.S. at 590 (citation and quotation marks omitted). "Market harm is a matter of degree, and the importance of this factor will vary, not only with the amount of harm, but also with the relative strength of the showing on the other factors." Id. at 590 n.21.

Oracle asserts that all of these factors support its position that Google's use was not "fair use"—Google knowingly and illicitly copied a creative work to further its own commercial purposes, did so verbatim, and did so to the detriment of Oracle's market position. These undisputable facts, according to Oracle, should end the fair use inquiry. Oracle's position is not without force. On many of these points, Google does not debate Oracle's characterization of its conduct, nor could it on the record evidence.

Google contends, however, that, although it admittedly copied portions of the API packages and did so for what were purely commercial purposes, a reasonable juror still could find that: (1) Google's use was transformative; (2) the Java API packages are entitled only to weak protection; (3) Google's use was necessary to work within a language that had become an industry standard; and (4) the market impact on Oracle was not substantial.

On balance, we find that due respect for the limit of our appellate function requires that we remand the fair use question for a new trial. First, although it is undisputed that Google's use of the API packages is commercial, the parties disagree on whether its use is "transformative." Google argues that it is, because it wrote its own implementing code, created its own virtual machine, and incorporated the packages into a smartphone platform. For its part, Oracle maintains that Google's use is not transformative because: (1) "[t]he same code in Android . . . enables programmers to invoke the same pre-programmed functions in exactly the same way;" and (2) Google's use of the declaring code and packages does not serve a different function from Java. Appellant Reply Br. 47. While Google overstates what activities can be deemed transformative under a correct application of the law, we cannot say that there are no material facts in dispute on the question of whether Google's use is "transformative," even under a correct reading of the law. As such, we are unable to resolve this issue on appeal.

Next, while we have concluded that it was error for the trial court to focus unduly on the functional aspects of the packages, and on Google's competitive desire to achieve commercial "interoperability" when deciding whether Oracle's API packages are entitled to copyright protection, we expressly noted that these factors may be relevant to a fair use analysis. While the trial court erred in concluding that these factors were sufficient to overcome Oracle's threshold claim of copyrightability, reasonable jurors might find that they are relevant to Google's fair use defense under the second and third factors of the inquiry. See Sega, 977 F.2d at 1524-25 (discussing the Second Circuit's approach to "break[ing] down a computer program into its component subroutines and subsubroutines and then identif[ying] the idea or core functional element of each" in the context of the second fair use factor: the nature of the copyrighted work). We find this particularly true with respect to those core packages which it seems may be necessary for anyone to copy if they are to write programs in the Java language. And, it may be that others of the packages were similarly essential components of any Java language-based program. So far, that type of filtration analysis has not occurred.

Finally, as to market impact, the district court found that "Sun and Oracle never successfully developed its own smartphone platform using Java technology." Copyrightability Decision, 872 F. Supp. 2d at 978. But Oracle argues that, when Google copied the API packages, Oracle was licensing in the mobile and smartphone markets, and that Android's release substantially harmed those commercial opportunities as well as the potential market for a Java smartphone device. Because there are material facts in dispute on this factor as well, remand is necessary.

Ultimately, we conclude that this is not a case in which the record contains sufficient factual findings upon which we could base a de novo assessment of Google's affirmative defense of fair use. Accordingly, we remand this question to the district court for further proceedings. On remand, the district court should revisit and revise its jury instructions on fair use consistent with this opinion so as to provide the jury with a clear and appropriate picture of the fair use defense.[17]

II. GOOGLE'S CROSS-APPEAL

Google cross-appeals from the portion of the district court's final judgment entered in favor of Oracle on its claim for copyright infringement as to the nine lines of rangeCheck code and the eight decompiled files. Final Judgment, Oracle Am., Inc. v. Google Inc., No. 3:10-cv-3561 (N.D. Cal. June 20, 2012), ECF No. 1211. Specifically, Google appeals from the district court's decisions: (1) granting Oracle's motion for JMOL of infringement as to the eight decompiled Java files that Google copied into Android; and (2) denying Google's motion for JMOL with respect to rangeCheck.

When reviewing a district court's grant or denial of a motion for JMOL, we apply the procedural law of the relevant regional circuit, here the Ninth Circuit. Trading Techs. Int'l, Inc. v. eSpeed, Inc., 595 F.3d 1340, 1357 (Fed. Cir. 2010). The Ninth Circuit reviews a district court's JMOL decision de novo, applying the same standard as the district court. Mangum v. Action Collection Serv., Inc., 575 F.3d 935, 938 (9th Cir. 2009). To grant judgment as a matter of law, the court must find that "the evidence presented at trial permits only one reasonable conclusion" and that "no reasonable juror could find in the non-moving party's favor." Id. at 938-39 (citation and internal quotation marks omitted).

Oracle explains that the eight decompiled files at issue "contain security functions governing access to network files" while rangeCheck "facilitates an important sorting function, frequently called upon during the operation of Java and Android." Oracle Response to Cross-Appeal 60-61. At trial, Google conceded that it copied the eight decompiled Java code files and the nine lines of code referred to as rangeCheck into Android. Its only defense was that the copying was de minimis. Accordingly, the district court instructed the jury that, "[w]ith respect to the infringement issues concerning the rangeCheck and other similar files, Google agrees that the accused lines of code and comments came from the copyrighted materials but contends that the amounts involved were so negligible as to be de minimis and thus should be excluded." Final Charge to the Jury (Phase One), Oracle Am., Inc. v. Google, Inc., No. 3:10-cv-3561 (N.D. Cal. Apr. 30, 2012), ECF No. 1018, at 14.

Although the jury found that Google infringed Oracle's copyright in the nine lines of code comprising rangeCheck, it returned a noninfringement verdict as to eight decompiled security files. But because the trial testimony was that Google's use of the decompiled files was significant—and there was no testimony to the contrary—the district court concluded that "[n]o reasonable jury could find that this copying was de minimis." Order Granting JMOL on Decompiled Files, 2012 U.S. Dist. LEXIS 66417, at *6. As such, the court granted Oracle's motion for JMOL of infringement as to the decompiled security files.

On appeal, Google maintains that its copying of rangeCheck and the decompiled security files was de minimis and thus did not infringe any of Oracle's copyrights. According to Google, the district court should have denied Oracle's motion for JMOL "because substantial evidence supported the jury's verdict that Google's use of eight decompiled test files was de minimis." Cross-Appellant Br. 76. Google further argues that the court should have granted its motion for JMOL as to rangeCheck because the "trial evidence revealed that the nine lines of rangeCheck code were both quantitatively and qualitatively insignificant in relation to the [Java] platform." Id. at 78.

In response, Oracle argues that the Ninth Circuit does not recognize a de minimis defense to copyright infringement and that, even if it does, we should affirm the judgments of infringement on grounds that Google's copying was significant. Because we agree with Oracle on its second point, we need not address the first, except to note that there is some conflicting Ninth Circuit precedent on the question of whether there is a free-standing de minimis defense to copyright infringement or whether the substantiality of the alleged copying is best addressed as part of a fair use defense. Compare Norse v. Henry Holt & Co., 991 F.2d 563, 566 (9th Cir. 1993) (indicating that "even a small taking may sometimes be actionable" and the "question of whether a copying is substantial enough to be actionable may be best resolved through the fair use doctrine"), with Newton v. Diamond, 388 F.3d 1189, 1192-93 (9th Cir. 2003) ("For an unauthorized use of a copyrighted work to be actionable, the use must be significant enough to constitute infringement. This means that even where the fact of copying is conceded, no legal consequences will follow from that fact unless the copying is substantial.") (internal citation omitted)).[18]

Even assuming that the Ninth Circuit recognizes a stand-alone de minimis defense to copyright infringement, however, we conclude that: (1) the jury reasonably found that Google's copying of the rangeCheck files was more than de minimis; and (2) the district court correctly concluded that the defense failed as a matter of law with respect to the decompiled security files.

First, the unrebutted testimony at trial revealed that rangeCheck and the decompiled security files were significant to both Oracle and Google. Oracle's expert, Dr. John Mitchell, testified that Android devices call the rangeCheck function 2,600 times just in powering on the device. Although Google argues that the eight decompiled files were insignificant because they were used only to test the Android platform, Dr. Mitchell testified that "using the copied files even as test files would have been significant use" and the district court specifically found that "[t]here was no testimony to the contrary." Order Granting JMOL on Decompiled Files, 2012 U.S. Dist. LEXIS 66417, at *6. Given this testimony, a reasonable jury could not have found Google's copying de minimis.

Google emphasizes that the nine lines of rangeCheck code "represented an infinitesimal percentage of the 2.8 million lines of code in the 166 Java packages—let alone the millions of lines of code in the entire [Java] platform." Google Cross-Appeal Br. 78-79. To the extent Google is arguing that a certain minimum number of lines of code must be copied before a court can find infringement, that argument is without merit. See Baxter v. MCA, Inc., 812 F.2d 421, 425 (9th Cir. 1987) ("[N]o bright line rule exists as to what quantum of similarity is permitted."). And, given the trial testimony that both rangeCheck and the decompiled security files are qualitatively significant and Google copied them in their entirety, Google cannot show that the district court erred in denying its motion for JMOL.

We have considered Google's remaining arguments and find them unpersuasive. Accordingly, we affirm both of the JMOL decisions at issue in Google's cross-appeal.

III. GOOGLE'S POLICY-BASED ARGUMENTS

Many of Google's arguments, and those of some amici, appear premised on the belief that copyright is not the correct legal ground upon which to protect intellectual property rights to software programs; they opine that patent protection for such programs, with its insistence on non-obviousness, and shorter terms of protection, might be more applicable, and sufficient. Indeed, the district court's method of operation analysis seemed to say as much. Copyrightability Decision, 872 F. Supp. 2d at 984 (stating that this case raises the question of "whether the copyright holder is more appropriately asserting an exclusive right to a functional system, process, or method of operation that belongs in the realm of patents, not copyrights"). Google argues that "[a]fter Sega, developers could no longer hope to protect [software] interfaces by copyright . . . Sega signaled that the only reliable means for protecting the functional requirements for achieving interoperability was by patenting them." Appellee Br. 40 (quoting Pamela Samuelson, Are Patents on Interfaces Impeding Interoperability? 93 Minn. L. Rev. 1943, 1959 (2009)). And, Google relies heavily on articles written by Professor Pamela Samuelson, who has argued that "it would be best for a commission of computer program experts to draft a new form of intellectual property law for machine-readable programs." Pamela Samuelson, CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form, 1984 Duke L.J. 663, 764 (1984). Professor Samuelson has more recently argued that "Altai and Sega contributed to the eventual shift away from claims of copyright in program interfaces and toward reliance on patent protection. Patent protection also became more plausible and attractive as the courts became more receptive to software patents." Samuelson, 93 Minn. L. Rev. at 1959.

Although Google, and the authority on which it relies, seem to suggest that software is or should be entitled to protection only under patent law—not copyright law— several commentators have recently argued the exact opposite. See Technology Quarterly,Stalking Trolls, ECONOMIST, Mar. 8, 2014, http://www.economist. com/news/technology-quarterly/21598321-intellectualproperty-after-being-blamed-stymying-innovation-america-vague ("[M]any innovators have argued that the electronics and software industries would flourish if companies trying to bring new technology (software innovations included) to market did not have to worry about being sued for infringing thousands of absurd patents at every turn. A perfectly adequate means of protecting and rewarding software developers for their ingenuity has existed for over 300 years. It is called copyright."); Timothy B. Lee, Will the Supreme Court save us from software patents?, WASH. POST, Feb. 26, 2014, 1:13 PM, http://www.washingtonpost.com/blogs/the-switch/wp/ 2014/02/26/will-the-supreme-court-save-us-from-softwarepatents/ ("If you write a book or a song, you can get copyright protection for it. If you invent a new pill or a better mousetrap, you can get a patent on it. But for the last two decades, software has had the distinction of being potentially eligible for both copyright and patent protection. Critics say that's a mistake. They argue that the complex and expensive patent system is a terrible fit for the fast-moving software industry. And they argue that patent protection is unnecessary because software innovators already have copyright protection available.").

Importantly for our purposes, the Supreme Court has made clear that "[n]either the Copyright Statute nor any other says that because a thing is patentable it may not be copyrighted." Mazer v. Stein, 347 U.S. 201, 217 (1954). Indeed, the thrust of the CONTU Report is that copyright is "the most suitable mode of legal protection for computer software." Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs, 41 Stan. L. Rev. 1045, 1072 (1989); see also CONTU Report at 1 (recommending that copyright law be amended "to make it explicit that computer programs, to the extent that they embody an author's original creation, are proper subject matter of copyright"). Until either the Supreme Court or Congress tells us otherwise, we are bound to respect the Ninth Circuit's decision to afford software programs protection under the copyright laws. We thus decline any invitation to declare that protection of software programs should be the domain of patent law, and only patent law.

CONCLUSION

For the foregoing reasons, we conclude that the declaring code and the structure, sequence, and organization of the 37 Java API packages at issue are entitled to copyright protection. We therefore reverse the district court's copyrightability determination with instructions to reinstate the jury's infringement verdict. Because the jury hung on fair use, we remand Google's fair use defense for further proceedings consistent with this decision.

With respect to Google's cross-appeal, we affirm the district court's decisions: (1) granting Oracle's motion for JMOL as to the eight decompiled Java files that Google copied into Android; and (2) denying Google's motion for JMOL with respect to the rangeCheck function. Accordingly, we affirm-in-part, reverse-in-part, and remand for further proceedings.

AFFIRMED-IN-PART, REVERSED-IN-PART, AND REMANDED

[1] Oracle acquired Sun in 2010.

[2] The 37 API packages involved in this appeal are: java.awt.font, java.beans, java.io, java.lang, java.lang.annotation, java.lang.ref, java.lang.reflect, java.net, java.nio, java.nio.channels, java.nio.channels.spi, java.nio.charset, java.nio.charset.spi, java.security, java.security.acl, java.security.cert, java.security.interfaces, java.security.spec, java.sql, java.text, java.util, java.util.jar, java.util.logging, java.util.prefs, java.util.regex, java.util.zip, javax.crypto, javax.crypto.interfaces, javax.crypto.spec, javax.net, javax.net.ssl, javax.security.auth, javax.security.auth.callback, javax.security.auth.login, javax.security.auth.x500, javax.security.cert, and javax.sql.

[3] The Supreme Court has not addressed whether copyrightability is a pure question of law or a mixed question of law and fact, or whether, if it is a mixed question of law and fact, the factual components of that inquiry are for the court, rather than the jury. Relatedly, it has not decided the standard of review that applies on appeal. Ten years ago, before finding it unnecessary to decide whether copyrightability is a pure question of law or a mixed question of law and fact, the Seventh Circuit noted that it had "found only a handful of appellate cases addressing the issue, and they are split." Gaiman v. McFarlane, 360 F.3d 644, 648 (7th Cir. 2004). And, panels of the Ninth Circuit have defined the respective roles of the jury and the court differently where questions of originality were at issue. Compare North Coast Indus. v. Jason Maxwell, Inc., 972 F.2d 1031, 1035 (9th Cir. 1992), with Ets-Hokin, 225 F.3d at 1073. More recently, several district courts within the Ninth Circuit have treated copyrightability as a question for only the court, regardless of whether it is a pure question of law. See Stern v. Does, No. 09-1986, 2011 U.S. Dist. LEXIS 37735, *7 (C.D. Cal. Feb. 10, 2011); Jonathan Browning, Inc. v. Venetian Casino Resort LLC, No. C 07-3983, 2009 U.S. Dist. LEXIS 57525, at *2 (N.D. Cal. June 19, 2009); see also Pivot Point Int'l, Inc. v. Charlene Prods., Inc., 932 F. Supp. 220, 225 (N.D. Ill. 1996) (Easterbrook, J.) (citing to Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996), and concluding that whether works are copyrightable is a question which the "jury has nothing to do with"). We need not address any of these questions, because the parties here agreed that the district court would decide copyrightability, and both largely agree that we may undertake a review of that determination de novo.

[4] Importantly, this full analysis only applies where a copyright owner alleges infringement of the non-literal aspects of its work. Where "admitted literal copying of a discrete, easily-conceptualized portion of a work" is at issue—as with Oracle's declaring code—a court "need not perform a complete abstraction-filtration-comparison analysis" and may focus the protectability analysis on the filtration stage, with attendant reference to standard copyright principles. Mitel, 124 F.3d at 1372-73.

[5] It is undisputed that Microsoft and Apple developed mobile operating systems from scratch, using their own array of software packages. When asked whether Google could also copy all of Microsoft or Apple's declaring code—codes that obviously differ from those at issue here—counsel for Google responded: "Yes, but only the structure, sequence, and organization. Only the command structure—what you need to access the functions. You'd have to rewrite all the millions of lines of code in Apple or in Microsoft which is what Google did in Android." Oral Argument at 36:00.

[6] In their brief as amici curiae in support of reversal, Scott McNealy and Brian Sutphin—both former executives at Sun who were involved in the development of the Java platform—provide a detailed example of the creative choices involved in designing a Java package. Looking at the "java.text" package, they explain that it "contains 25 classes, 2 interfaces, and hundreds of methods to handle text, dates, numbers, and messages in a manner independent of natural human languages. . . ." Br. of McNealy and Sutphin 14-15. Java's creators had to determine whether to include a java.text package in the first place, how long the package would be, what elements to include, how to organize that package, and how it would relate to other packages. Id. at 16. This description of Sun's creative process is consistent with the evidence presented at trial. See Appellant Br. 12-13 (citing testimony that it took years to write some of the Java packages and that Sun/Oracle developers had to "wrestle with what functions to include in the package, which to put in other packages, and which to omit entirely").

[7] The district court did not find merger with respect to the structure, sequence, and organization of Oracle's Java API packages. Nor could it, given the court's recognition that there were myriad ways in which the API packages could have been organized. Indeed, the court found that the SSO is original and that "nothing in the rules of the Java language . . . required that Google replicate the same groupings." Copyrightability Decision, 872 F. Supp. 2d at 999. As discussed below, however, the court nonetheless found that the SSO is an uncopyrightable "method of operation."

[8] At oral argument, counsel for Oracle was asked whether we should view the three core packages "differently vis-à-vis the concept of a method of operation than the other packages." See Oral Argument at 7:43. He responded: "I think not your Honor. I would view them differently with respect to fair use. . . . It's not that they are more basic. It's that there are just several methods, that is, routines, within just those three packages that are necessary to `speak the Java language.' Nothing in the other thirty-four packages is necessary in order to speak in Java, so to speak." Id. Counsel conceded, however, that this issue "might go to merger. It might go to the question whether someone—since we conceded that it's okay to use the language—if it's alright to use the language that there are certain things that the original developers had to say in order to use that language, arguably, although I still think it's really a fair use analysis." Id.

[9] The Supreme Court granted certiorari in Lotus, but, shortly after oral argument, the Court announced that it was equally divided and that Justice Stevens took no part in the consideration or decision of the case. The Court therefore left the First Circuit's decision undisturbed. See Lotus, 516 U.S. at 233-34.

[10] The Lotus majority cited no authority for this definition of "method of operation."

[11] As Oracle points out, the Ninth Circuit has cited Lotus only one time, on a procedural issue. See Danjaq LLC v. Sony Corp., 263 F.3d 942, 954 (9th Cir. 2001) (citing Lotus for the proposition that delay "has been held permissible, among other reasons, when it is necessitated by the exhaustion of remedies through the administrative process . . . when it is used to evaluate and prepare a complicated claim").

[12] This analogy by the district court is meaningful because taxonomies, in varying forms, have generally been deemed copyrightable. See, e.g., Practice Mgmt. Info. Corp. v. Am. Med. Ass'n, 121 F.3d 516, 517-20 (9th Cir. 1997); Am. Dental, 126 F.3d at 978-81.

[13] At oral argument, counsel for Oracle explained that it "would never claim that anyone who uses a package-class-method manner of classifying violates our copyright. We don't own every conceivable way of organizing, we own only our specific expression—our specific way of naming each of these 362 methods, putting them into 36 classes, and 20 subclasses." Oral Argument at 16:44.

[14] Amici McNealy and Sutphin explain that "a quick examination of other programming environments shows that creators of other development platforms provide the same functions with wholly different creative choices." Br. of McNealy and Sutphin 17. For example, in Java, a developer setting the time zone would call the "setTime-Zone" method within the "DateFormat" class of the java.text package. Id. Apple's iOS platform, on the other hand, "devotes an entire class to set the time zone in an application—the `NSTimeZone' class" which is in the "Foundation framework." Id. at 17-18 (noting that a "framework is Apple's terminology for a structure conceptually similar to Java's `package'"). Microsoft provides similar functionality with "an entirely different structure, naming scheme, and selection." Id. at 18 ("In its Windows Phone development platform, Microsoft stores its time zone programs in the `TimeZoneInfo' class in its `Systems' namespace (Microsoft's version of a `package' or `framework')."). Again, this is consistent with the evidence presented at trial.

[15] During oral argument, Google's counsel stated that "a program written in the Java language can run on Android if it's only using packages within the 37. So if I'm a developer and I have written a program, I've written it in Java, I can stick an Android header on it and it will run in Android because it is using the identical names of the classes, methods, and packages." Oral Argument at 31:31. Counsel did not identify any programs that use only the 37 API packages at issue, however, and did not attest that any such program would be useful. Nor did Google cite to any record evidence to support this claim.

[16] Google argues that, in the same way a formerly distinctive trademark can become generic over time, a program element can lose copyright protection when it becomes an industry standard. But "it is to be expected that phrases and other fragments of expression in a highly successful copyrighted work will become part of the language. That does not mean they lose all protection in the manner of a trade name that has become generic." Warner Bros., Inc. v. Am. Broadcasting Cos., 720 F.2d 231, 242 (2d Cir. 1983) ("No matter how well known a copyrighted phrase becomes, its author is entitled to guard against its appropriation to promote the sale of commercial products."). Notably, even when a patented method or system becomes an acknowledged industry standard with acquiescence of the patent owner, any permissible use generally requires payment of a reasonable royalty, which Google refused to do here. See generally In re Innovatio IP Ventures, LLC, No. 11-C-9308, 2013 U.S. Dist. LEXIS 144061 (N.D. Ill. Sept. 27, 2013).

[17] Google argues that, if we allow it to retry its fair use defense on remand, it is entitled to a retrial on infringement as well. We disagree. The question of whether Google's copying constituted infringement of a copyrighted work is "distinct and separable" from the question of whether Google can establish a fair use defense to its copying. See Gasoline Prods. Co. v. Champlin Refining Co., 283 U.S. 494, 500 (1931) ("Where the practice permits a partial new trial, it may not properly be resorted to unless it clearly appears that the issue to be retried is so distinct and separable from the others that a trial of it alone may be had without injustice."). Indeed, we have emphasized more than once in this opinion the extent to which the questions are separable, and the confusion and error caused when they are blurred. The issues are not "interwoven" and it would not create "confusion and uncertainty" to reinstate the infringement verdict and submit fair use to a different jury. Id. We note, moreover, that, because Google only mentions this point in passing, with no development of an argument in support of it, under our case law, it has not been properly raised. See SmithKline Beecham Corp. v. Apotex Corp., 439 F.3d 1312, 1320 (Fed. Cir. 2006) (when a party provides no developed argument on a point, we treat that argument as waived) (collecting cases).

[18] At least one recent district court decision has recognized uncertainty in Ninth Circuit law on this point. See Brocade Commc'ns Sys. v. A10 Networks, Inc., No. 10cv-3428, 2013 U.S. Dist. LEXIS 8113, at *33 (N.D. Cal. Jan. 10, 2013) ("The Ninth Circuit has been unclear about whether the de minimis use doctrine serves as an affirmative defense under the Copyright Act's fair use exceptions or whether the doctrine merely highlights plaintiffs' obligation to show that `the use must be significant enough to constitute infringement.'") (citing Newton, 388 F.2d at 1193; Norse, 991 F.2d at 566).

4.2.4 SAS Institute Inc. v World Programming Ltd., C-406/10, May 2, 2012 4.2.4 SAS Institute Inc. v World Programming Ltd., C-406/10, May 2, 2012

JUDGMENT OF THE COURT (Grand Chamber)

2 May 2012 (*)

(Intellectual property — Directive 91/250/EEC — Legal protection of computer programs — Articles 1(2) and 5(3) — Scope of protection — Creation directly or via another process — Computer program protected by copyright — Reproduction of the functions by a second program without access to the source code of the first program — Decompilation of the object code of the first computer program — Directive 2001/29/EC — Copyright and related rights in the information society — Article 2(a) — User manual for a computer program — Reproduction in another computer program — Infringement of copyright — Condition — Expression of the intellectual creation of the author of the user manual)

In Case C‑406/10,

REFERENCE for a preliminary ruling under Article 267 TFEU from the High Court of Justice of England and Wales, Chancery Division (United Kingdom), made by decision of 2 August 2010, received at the Court on 11 August 2010, in the proceedings

SAS Institute Inc.

v

World Programming Ltd,

THE COURT (Grand Chamber),

composed of V. Skouris, President, A. Tizzano, J.N. Cunha Rodrigues, K. Lenaerts, J.‑C. Bonichot, A. Prechal, Presidents of Chambers, R. Silva de Lapuerta, K. Schiemann, G. Arestis (Rapporteur), A. Ó Caoimh, L. Bay Larsen, M. Berger and E. Jarašiūnas, Judges,

Advocate General: Y. Bot,

Registrar: L. Hewlett, Principal Administrator,

having regard to the written procedure and further to the hearing on 21 September 2011,

after considering the observations submitted on behalf of:

–        SAS Institute Inc., by H.J. Carr QC, and M. Hicks and J. Irvine, Barristers,

–        World Programming Ltd, by M. Howe QC, R. Onslow and I. Jamal, Barristers, instructed by A. Carter-Silk, Solicitor,

–        the Spanish Government, by N. Díaz Abad, acting as Agent,

–        the Finnish Government, by H. Leppo, acting as Agent,

–        the Government of the United Kingdom, by L. Seeboruth and C. Murrell, acting as Agents, and by S. Malynicz, Barrister,

–        the European Commission, by J. Samnadda, acting as Agent,

after hearing the Opinion of the Advocate General at the sitting on 29 November 2011,

gives the following

Judgment

1        This reference for a preliminary ruling concerns the interpretation of Articles 1(2) and 5(3) of Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs (OJ 1991 L 122, p. 42), and of Article 2(a) of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (OJ 2001 L 167, p. 10).

2        The reference has been made in proceedings between SAS Institute Inc. (‘SAS Institute’) and World Programming Ltd (‘WPL’) concerning an action for infringement brought by SAS Institute for infringement of copyright in computer programs and manuals relating to its computer database system.

 Legal context

 International legislation

3        Article 2(1) of the Convention for the Protection of Literary and Artistic Works, signed at Berne on 9 September 1886 (Paris Act of 24 July 1971), as amended on 28 September 1979 (‘the Berne Convention’) provides:

‘The expression “literary and artistic works” shall include every production in the literary … domain, whatever may be the mode or form of its expression …’

4        Article 9 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (‘the TRIPs Agreement’), as set out in Annex 1C to the Marrakech Agreement establishing the World Trade Organisation, which was approved by Council Decision 94/800/EC of 22 December 1994 concerning the conclusion on behalf of the European Community, as regards matters within its competence, of the agreements reached in the Uruguay Round multilateral negotiations (1986‑1994) (OJ 1994 L 336, p. 1), provides:

‘1.       Members shall comply with Articles 1 through 21 of the [Berne Convention] and the Appendix thereto …

2.       Copyright protection shall extend to expressions and not to ideas, procedures, methods of operation or mathematical concepts as such.’

5        Article 10(1) of the TRIPs Agreement provides:

‘Computer programs, whether in source or object code, shall be protected as literary works under the [Berne Convention].’

6        Article 2 of the World Intellectual Property Organisation (WIPO) Copyright Treaty, adopted in Geneva on 20 December 1996, which entered into force, as regards the European Union, on 14 March 2010 (OJ 2010 L 32, p. 1), is worded as follows:

‘Copyright protection extends to expressions and not to ideas, procedures, methods of operation or mathematical concepts as such.’

7        Article 4 of that treaty provides as follows:

‘Computer programs are protected as literary works within the meaning of Article 2 of the Berne Convention. Such protection applies to computer programs, whatever may be the mode or form of their expression.’

 European Union legislation

 Directive 91/250

8        The 3rd, 7th, 8th, 14th, 15th, 17th, 18th, 21st and 23rd recitals in the preamble to Directive 91/250 provide:

‘(3)  … computer programs are playing an increasingly important role in a broad range of industries and computer program technology can accordingly be considered as being of fundamental importance for the Community’s industrial development;

...

(7)      … for the purpose of this Directive, the term “computer program” shall include programs in any form, including those which are incorporated into hardware; … this term also includes preparatory design work leading to the development of a computer program, provided that the nature of the preparatory work is such that a computer program can result from it at a later stage;

(8)      … in respect of the criteria to be applied in determining whether or not a computer program is an original work, no tests as to the qualitative or aesthetic merits of the program should be applied;

(14) … in accordance with [the principle that only the expression of a computer program is protected by copyright], to the extent that logic, algorithms and programming languages comprise ideas and principles, those ideas and principles are not protected under this Directive;

(15)  … in accordance with the legislation and jurisprudence of the Member States and the international copyright conventions, the expression of those ideas and principles is to be protected by copyright;

(17)      … the exclusive rights of the author to prevent the unauthorised reproduction of his work have to be subject to a limited exception in the case of a computer program to allow the reproduction technically necessary for the use of that program by the lawful acquirer; … this means that the acts of loading and running necessary for the use of a copy of a program which has been lawfully acquired, and the act of correction of its errors, may not be prohibited by contract; … in the absence of specific contractual provisions, including when a copy of the program has been sold, any other act necessary for the use of the copy of a program may be performed in accordance with its intended purpose by a lawful acquirer of that copy;

(18)      … a person having a right to use a computer program should not be prevented from performing acts necessary to observe, study or test the functioning of the program, provided that these acts do not infringe the copyright in the program;

(21)      … it has therefore to be considered that, in these limited circumstances only, performance of the acts of reproduction and translation by or on behalf of a person having a right to use a copy of the program is legitimate and compatible with fair practice and must therefore be deemed not to require the authorisation of the rightholder;

(23)      … such an exception to the author’s exclusive rights may not be used in a way which prejudices the legitimate interests of the rightholder or which conflicts with a normal exploitation of the program’.

9        Under the heading ‘Object of protection’, Article 1 of Directive 91/250 provides:

‘1.       In accordance with the provisions of this Directive, Member States shall protect computer programs, by copyright, as literary works within the meaning of the Berne Convention for the Protection of Literary and Artistic Works. For the purposes of this Directive, the term “computer programs” shall include their preparatory design material.

2.       Protection in accordance with this Directive shall apply to the expression in any form of a computer program. Ideas and principles which underlie any element of a computer program, including those which underlie its interfaces, are not protected by copyright under this Directive.

3.       A computer program shall be protected if it is original in the sense that it is the author’s own intellectual creation. No other criteria shall be applied to determine its eligibility for protection.’

10      Paragraphs (a) and (b) of Article 4 of that directive, headed ‘Restricted Acts’, provide:

‘Subject to the provisions of Articles 5 and 6, the exclusive rights of the rightholder, within the meaning of Article 2, shall include the right to do or to authorise:

(a)       the permanent or temporary reproduction of a computer program by any means and in any form, in part or in whole. In so far as loading, displaying, running, transmission or storage of the computer program necessitate such reproduction, such acts shall be subject to authorisation by the rightholder;

(b)       the translation, adaptation, arrangement and any other alteration of a computer program and the reproduction of the results thereof, without prejudice to the rights of the person who alters the program’.

11      Article 5 of Directive 91/250, which provides for exceptions to the restricted acts, reads as follows:

‘1.       In the absence of specific contractual provisions, the acts referred to in Article 4(a) and (b) shall not require authorisation by the rightholder where they are necessary for the use of the computer program by the lawful acquirer in accordance with its intended purpose, including for error correction.

3.       The person having a right to use a copy of a computer program shall be entitled, without the authorisation of the rightholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do.’

12      Article 6 of that directive, relating to decompilation, states:

‘1.       The authorisation of the rightholder shall not be required where reproduction of the code and translation of its form within the meaning of Article 4(a) and (b) are indispensable to obtain the information necessary to achieve the interoperability of an independently created computer program with other programs, provided that the following conditions are met:

(a)       these acts are performed by the licensee or by another person having a right to use a copy of a program, or on their behalf by a person authorised to do so;

(b)       the information necessary to achieve interoperability has not previously been readily available to the persons referred to in subparagraph (a);

and

(c)       these acts are confined to the parts of the original program which are necessary to achieve interoperability.

2.       The provisions of paragraph 1 shall not permit the information obtained through its application:

(a)       to be used for goals other than to achieve the interoperability of the independently created computer program;

(b)       to be given to others, except when necessary for the interoperability of the independently created computer program; or

(c)       to be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright.

3.       In accordance with the provisions of the Berne Convention for the Protection of Literary and Artistic Works, the provisions of this Article may not be interpreted in such a way as to allow its application to be used in a manner which unreasonably prejudices the rightholder’s legitimate interests or conflicts with a normal exploitation of the computer program.’

13      Pursuant to Article 9 of Directive 91/250, the provisions of that directive are without prejudice to any other legal provisions such as those concerning patent rights, trade marks, unfair competition, trade secrets, protection of semi‑conductor products or the law of contract. Any contractual provisions that are contrary to Article 6 or to the exceptions provided for in Article 5(2) and (3) of Directive 91/250 are null and void.

 Directive 2001/29

14      According to recital 20 in the preamble to Directive 2001/29, that directive is based on principles and rules already laid down in the directives currently in force in this area, inter alia Directive 91/250. Directive 2001/29 develops those principles and rules and places them in the context of the information society.

15      Article 1 of Directive 2001/29 provides:

‘1.      This Directive concerns the legal protection of copyright and related rights in the framework of the internal market, with particular emphasis on the information society.

2.      Except in the cases referred to in Article 11, this Directive shall leave intact and shall in no way affect existing Community provisions relating to:

(a)      the legal protection of computer programs;

      …’

16      Article 2(a) of Directive 2001/29 states:

‘Member States shall provide for the exclusive right to authorise or prohibit direct or indirect, temporary or permanent reproduction by any means and in any form, in whole or in part:

(a)       for authors, of their works …’.

 National legislation

17      Directives 91/250 and 2001/29 were transposed into national law by the Copyright, Designs and Patents Act 1988, as amended by the Copyright (Computer Programs) Regulations 1992 and by the Copyright and Related Rights Regulations 2003 (‘the 1988 Act’).

18      Section 1(1)(a) of the 1988 Act provides that copyright is a property right which subsists in original literary, dramatic, musical or artistic works. According to section 3(1)(a) to (d) of the Act, ‘literary work’ means any work, other than a dramatic or musical work, which is written, spoken or sung, and includes a table or compilation other than a database, a computer program, preparatory design material for a computer program, and a database.

19      Section 16(1)(a) of the 1988 Act provides that the owner of the copyright in a work has the exclusive right to copy the work.

20      According to section 16(3)(a) and (b) of the 1988 Act, restrictions imposed by copyright in respect of acts performed on a work apply in relation to the work as a whole or any substantial part of it, either directly or indirectly.

21      Under section 17(2) of the 1988 Act, copying in relation to a literary, dramatic, musical or artistic work means reproducing the work in any material form. This includes storing the work in any medium by electronic means.

22      Section 50BA(1) of the 1988 Act states that it is not an infringement of copyright for a lawful user of a copy of a computer program to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do. Section 50BA(2) of the Act states that, where an act is permitted under subsection (1), it is irrelevant whether or not there exists any term or condition in an agreement which purports to prohibit or restrict the act in question.

 The dispute in the main proceedings and the questions referred for a preliminary ruling

23      SAS Institute is a developer of analytical software. It has developed an integrated set of computer programs over a period of 35 years which enables users to carry out a wide range of data processing and analysis tasks, in particular, statistical analysis (‘the SAS System’). The core component of the SAS System, called ‘Base SAS’, enables users to write and run their own application programs in order to adapt the SAS System to work with their data (Scripts). Such Scripts are written in a language which is peculiar to the SAS System (‘the SAS Language’).

24      WPL perceived that there was a market demand for alternative software capable of executing application programs written in the SAS Language. WPL therefore produced the ‘World Programming System’, designed to emulate the SAS components as closely as possible in that, with a few minor exceptions, it attempted to ensure that the same inputs would produce the same outputs. This would enable users of the SAS System to run the Scripts which they have developed for use with the SAS System on the ‘World Programming System’.

25      The High Court of Justice of England and Wales, Chancery Division, points out that it is not established that, in order to do so, WPL had access to the source code of the SAS components, copied any of the text of that source code or copied any of the structural design of the source code.

26      The High Court also points out that two previous courts have held, in the context of separate proceedings, that it is not an infringement of the copyright in the source code of a computer program for a competitor of the copyright owner to study how the program functions and then to write its own program to emulate that functionality.

27      SAS Institute, disputing that approach, has brought an action before the referring court. Its principal claims are that WPL:

–        copied the manuals for the SAS System published by SAS Institute when creating the ‘World Programming System’, thereby infringing SAS Institute’s copyright in those manuals;

–        in so doing, indirectly copied the computer programs comprising the SAS components, thereby infringing its copyright in those components;

–        used a version of the SAS system known as the ‘Learning Edition’, in breach of the terms of the licence relating to that version and of the commitments made under that licence, and in breach of SAS Institute’s copyright in that version; and

–        infringed the copyright in the manuals for the SAS System by creating its own manual.

28      In those circumstances, the High Court of Justice of England and Wales, Chancery Division, decided to stay the proceedings and to refer the following questions to the Court of Justice for a preliminary ruling:

‘(1)      Where a computer program (“the First Program”) is protected by copyright as a literary work, is Article 1(2) [of Directive 91/250] to be interpreted as meaning that it is not an infringement of the copyright in the First Program for a competitor of the rightholder without access to the source code of the First Program, either directly or via a process such as decompilation of the object code, to create another program (“the Second Program”) which replicates the functions of the First Program?

(2)      Is the answer to Question 1 affected by any of the following factors:

(a)      the nature and/or extent of the functionality of the First Program;

(b)       the nature and/or extent of the skill, judgment and labour which has been expended by the author of the First Program in devising the functionality of the First Program;

(c)      the level of detail to which the functionality of the First Program has been reproduced in the Second Program;

(d)       if the source code for the Second Program reproduces aspects of the source code of the First Program to an extent which goes beyond that which was strictly necessary in order to produce the same functionality as the First Program?

(3)      Where the First Program interprets and executes application programs written by users of the First Program in a programming language devised by the author of the First Program which comprises keywords devised or selected by the author of the First Program and a syntax devised by the author of the First Program, is Article 1(2) [of Directive 91/250] to be interpreted as meaning that it is not an infringement of the copyright in the First Program for the Second Program to be written so as to interpret and execute such application programs using the same keywords and the same syntax?

(4)      Where the First Program reads from and writes to data files in a particular format devised by the author of the First Program, is Article 1(2) [of Directive 91/250] to be interpreted as meaning that it is not an infringement of the copyright in the First Program for the Second Program to be written so as to read from and write to data files in the same format?

(5)      Does it make any difference to the answer to Questions 1, 3 and 4 if the author of the Second Program created the Second Program by:

(a)      observing, studying and testing the functioning of the First Program; or

(b)      reading a manual created and published by the author of the First Program which describes the functions of the First Program (“the Manual”); or

(c)      both (a) and (b)?

(6)      Where a person has the right to use a copy of the First Program under a licence, is Article 5(3) [of Directive 91/250] to be interpreted as meaning that the licensee is entitled, without the authorisation of the rightholder, to perform acts of loading, running and storing the program in order to observe, test or study the functioning of the First Program so as to determine the ideas and principles which underlie any element of the program, if the licence permits the licensee to perform acts of loading, running and storing the First Program when using it for the particular purpose permitted by the licence, but the acts done in order to observe, study or test the First Program extend outside the scope of the purpose permitted by the licence?

(7)      Is Article 5(3) [of Directive 91/250] to be interpreted as meaning that acts of observing, testing or studying of the functioning of the First Program are to be regarded as being done in order to determine the ideas or principles which underlie any element of the First Program where they are done:

(a)      to ascertain the way in which the First Program functions, in particular details which are not described in the Manual, for the purpose of writing the Second Program in the manner referred to in Question 1 above;

(b)      to ascertain how the First Program interprets and executes statements written in the programming language which it interprets and executes (see Question 3 above);

(c)      to ascertain the formats of data files which are written to or read by the First Program (see Question 4 above);

(d)      to compare the performance of the Second Program with the First Program for the purpose of investigating reasons why their performances differ and to improve the performance of the Second Program;

(e)      to conduct parallel tests of the First Program and the Second Program in order to compare their outputs in the course of developing the Second Program, in particular by running the same test scripts through both the First Program and the Second Program;

(f)      to ascertain the output of the log file generated by the First Program in order to produce a log file which is identical or similar in appearance;

(g)      to cause the First Program to output data (in fact, data correlating zip codes to States of the [United States of America] for the purpose of ascertaining whether or not it corresponds with official databases of such data, and if it does not so correspond, to program the Second Program so that it will respond in the same way as the First Program to the same input data.

(8)      Where the Manual is protected by copyright as a literary work, is Article 2(a) [of Directive 2001/29] to be interpreted as meaning that it is an infringement of the copyright in the Manual for the author of the Second Program to reproduce or substantially reproduce in the Second Program any of the following matters described in the Manual:

(a)      the selection of statistical operations which have been implemented in the First Program;

(b)      the mathematical formulae used in the Manual to describe those operations;

(c)      the particular commands or combinations of commands by which those operations may be invoked;

(d)      the options which the author of the First Program has provided in respect of various commands;

(e)      the keywords and syntax recognised by the First Program;

(f)      the defaults which the author of the First Program has chosen to implement in the event that a particular command or option is not specified by the user;

(g)      the number of iterations which the First Program will perform in certain circumstances?

(9)      Is Article 2(a) [of Directive 2001/29] to be interpreted as meaning that it is an infringement of the copyright in the Manual for the author of the Second Program to reproduce or substantially reproduce in a manual describing the Second Program the keywords and syntax recognised by the First Program?’

 Consideration of the questions referred

 Questions 1 to 5

29      By these questions, the national court asks, in essence, whether Article 1(2) of Directive 91/250 must be interpreted as meaning that the functionality of a computer program and the programming language and the format of data files used in a computer program in order to exploit certain of its functions constitute a form of expression of that program and may, as such, be protected by copyright in computer programs for the purposes of that directive.

30      In accordance with Article 1(1) of Directive 91/250, computer programs are protected by copyright as literary works within the meaning of the Berne Convention.

31      Article 1(2) of Directive 91/250 extends that protection to the expression in any form of a computer program. That provision states, however, that the ideas and principles which underlie any element of a computer program, including those which underlie its interfaces, are not protected by copyright under that directive.

32      The 14th recital in the preamble to Directive 91/250 confirms, in this respect, that, in accordance with the principle that only the expression of a computer program is protected by copyright, to the extent that logic, algorithms and programming languages comprise ideas and principles, those ideas and principles are not protected under that directive. The 15th recital in the preamble to Directive 91/250 states that, in accordance with the legislation and jurisprudence of the Member States and the international copyright conventions, the expression of those ideas and principles is to be protected by copyright.

33      With respect to international law, both Article 2 of the WIPO Copyright Treaty and Article 9(2) of the TRIPs Agreement provide that copyright protection extends to expressions and not to ideas, procedures, methods of operation or mathematical concepts as such.

34      Article 10(1) of the TRIPs Agreement provides that computer programs, whether in source or object code, are to be protected as literary works under the Berne Convention.

35      In a judgment delivered after the reference for a preliminary ruling had been lodged in the present case, the Court interpreted Article 1(2) of Directive 91/250 as meaning that the object of the protection conferred by that directive is the expression in any form of a computer program, such as the source code and the object code, which permits reproduction in different computer languages (judgment of 22 December 2010 in Case C‑393/09 Bezpečnostní softwarová asociace [2010] ECR I‑13971, paragraph 35).

36      In accordance with the second phrase of the seventh recital in the preamble to Directive 91/250, the term ‘computer program’ also includes preparatory design work leading to the development of a computer program, provided that the nature of the preparatory work is such that a computer program can result from it at a later stage.

37      Thus, the object of protection under Directive 91/250 includes the forms of expression of a computer program and the preparatory design work capable of leading, respectively, to the reproduction or the subsequent creation of such a program (Bezpečnostní softwarová asociace, paragraph 37).

38      From this the Court concluded that the source code and the object code of a computer program are forms of expression thereof which, consequently, are entitled to be protected by copyright as computer programs, by virtue of Article 1(2) of Directive 91/250. On the other hand, as regards the graphic user interface, the Court held that such an interface does not enable the reproduction of the computer program, but merely constitutes one element of that program by means of which users make use of the features of that program (Bezpečnostní softwarová asociace, paragraphs 34 and 41).

39      On the basis of those considerations, it must be stated that, with regard to the elements of a computer program which are the subject of Questions 1 to 5, neither the functionality of a computer program nor the programming language and the format of data files used in a computer program in order to exploit certain of its functions constitute a form of expression of that program for the purposes of Article 1(2) of Directive 91/250.

40      As the Advocate General states in point 57 of his Opinion, to accept that the functionality of a computer program can be protected by copyright would amount to making it possible to monopolise ideas, to the detriment of technological progress and industrial development.

41      Moreover, point 3.7 of the explanatory memorandum to the Proposal for Directive 91/250 [COM(88) 816] states that the main advantage of protecting computer programs by copyright is that such protection covers only the individual expression of the work and thus leaves other authors the desired latitude to create similar or even identical programs provided that they refrain from copying.

42      With respect to the programming language and the format of data files used in a computer program to interpret and execute application programs written by users and to read and write data in a specific format of data files, these are elements of that program by means of which users exploit certain functions of that program.

43      In that context, it should be made clear that, if a third party were to procure the part of the source code or the object code relating to the programming language or to the format of data files used in a computer program, and if that party were to create, with the aid of that code, similar elements in its own computer program, that conduct would be liable to constitute partial reproduction within the meaning of Article 4(a) of Directive 91/250.

44      As is, however, apparent from the order for reference, WPL did not have access to the source code of SAS Institute’s program and did not carry out any decompilation of the object code of that program. By means of observing, studying and testing the behaviour of SAS Institute’s program, WPL reproduced the functionality of that program by using the same programming language and the same format of data files.

45      The Court also points out that the finding made in paragraph 39 of the present judgment cannot affect the possibility that the SAS language and the format of SAS Institute’s data files might be protected, as works, by copyright under Directive 2001/29 if they are their author’s own intellectual creation (see Bezpečnostní softwarová asociace, paragraphs 44 to 46).

46      Consequently, the answer to Questions 1 to 5 is that Article 1(2) of Directive 91/250 must be interpreted as meaning that neither the functionality of a computer program nor the programming language and the format of data files used in a computer program in order to exploit certain of its functions constitute a form of expression of that program and, as such, are not protected by copyright in computer programs for the purposes of that directive.

 Questions 6 and 7

47      By these questions, the national court asks, in essence, whether Article 5(3) of Directive 91/250 must be interpreted as meaning that a person who has obtained a copy of a computer program under a licence is entitled, without the authorisation of the owner of the copyright in that program, to observe, study or test the functioning of that program in order to determine the ideas and principles which underlie any element of the program, in the case where that person carries out acts covered by that licence with a purpose that goes beyond the framework established by the licence.

48      In the main proceedings, it is apparent from the order for reference that WPL lawfully purchased copies of the Learning Edition of SAS Institute’s program, which were supplied under a ‘click-through’ licence which required the purchaser to accept the terms of the licence before being permitted to access the software. The terms of that licence restricted the licence to non-production purposes. According to the national court, WPL used the various copies of the Learning Edition of SAS Institute’s program to perform acts which fall outside the scope of the licence in question.

49      Consequently, the national court raises the question as to whether the purpose of the study or observation of the functioning of a computer program has an effect on whether the person who has obtained the licence may invoke the exception set out in Article 5(3) of Directive 91/250.

50      The Court observes that, from the wording of that provision, it is clear, first, that a licensee is entitled to observe, study or test the functioning of a computer program in order to determine the ideas and principles which underlie any element of the program.

51      In this respect, Article 5(3) of Directive 91/250 seeks to ensure that the ideas and principles which underlie any element of a computer program are not protected by the owner of the copyright by means of a licensing agreement.

52      That provision is therefore consistent with the basic principle laid down in Article 1(2) of Directive 91/250, pursuant to which protection in accordance with that directive applies to the expression in any form of a computer program and ideas and principles which underlie any element of a computer program are not protected by copyright under that directive.

53      Article 9(1) of Directive 91/250 adds, moreover, that any contractual provisions contrary to the exceptions provided for in Article 5(2) and (3) of that directive are null and void.

54      Second, under Article 5(3) of Directive 91/250, a licensee is entitled to determine the ideas and principles which underlie any element of the computer program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing that program which he is entitled to do.

55      It follows that the determination of those ideas and principles may be carried out within the framework of the acts permitted by the licence.

56      In addition, the 18th recital in the preamble to Directive 91/250 states that a person having a right to use a computer program should not be prevented from performing acts necessary to observe, study or test the functioning of the program, provided that these acts do not infringe the copyright in that program.

57      As the Advocate General states in point 95 of his Opinion, the acts in question are those referred to in Article 4(a) and (b) of Directive 91/250, which sets out the exclusive rights of the rightholder to do or to authorise, and those referred to in Article 5(1) thereof, relating to the acts necessary for the use of the computer program by the lawful acquirer in accordance with its intended purpose, including for error correction.

58      In that latter regard, the 17th recital in the preamble to Directive 91/250 states that the acts of loading and running necessary for that use may not be prohibited by contract.

59      Consequently, the owner of the copyright in a computer program may not prevent, by relying on the licensing agreement, the person who has obtained that licence from determining the ideas and principles which underlie all the elements of that program in the case where that person carries out acts which that licence permits him to perform and the acts of loading and running necessary for the use of the computer program, and on condition that that person does not infringe the exclusive rights of the owner in that program.

60      As regards that latter condition, Article 6(2)(c) of Directive 91/250 relating to decompilation states that decompilation does not permit the information obtained through its application to be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright.

61      It must therefore be held that the copyright in a computer program cannot be infringed where, as in the present case, the lawful acquirer of the licence did not have access to the source code of the computer program to which that licence relates, but merely studied, observed and tested that program in order to reproduce its functionality in a second program.

62      In those circumstances, the answer to Questions 6 and 7 is that Article 5(3) of Directive 91/250 must be interpreted as meaning that a person who has obtained a copy of a computer program under a licence is entitled, without the authorisation of the owner of the copyright, to observe, study or test the functioning of that program so as to determine the ideas and principles which underlie any element of the program, in the case where that person carries out acts covered by that licence and acts of loading and running necessary for the use of the computer program, and on condition that that person does not infringe the exclusive rights of the owner of the copyright in that program.

 Questions 8 and 9

63      By these questions, the national court asks, in essence, whether Article 2(a) of Directive 2001/29 must be interpreted as meaning that the reproduction, in a computer program or a user manual for that program, of certain elements described in the user manual for another computer program protected by copyright constitutes an infringement of that right in the latter manual.

64      It is apparent from the order for reference that the user manual for SAS Institute’s computer program is a protected literary work for the purposes of Directive 2001/29.

65      The Court has already held that the various parts of a work enjoy protection under Article 2(a) of Directive 2001/29, provided that they contain some of the elements which are the expression of the intellectual creation of the author of the work (Case C‑5/08 Infopaq International [2009] ECR I‑6569, paragraph 39).

66      In the present case, the keywords, syntax, commands and combinations of commands, options, defaults and iterations consist of words, figures or mathematical concepts which, considered in isolation, are not, as such, an intellectual creation of the author of the computer program.

67      It is only through the choice, sequence and combination of those words, figures or mathematical concepts that the author may express his creativity in an original manner and achieve a result, namely the user manual for the computer program, which is an intellectual creation (see, to that effect, Infopaq International, paragraph 45).

68      It is for the national court to ascertain whether the reproduction of those elements constitutes the reproduction of the expression of the intellectual creation of the author of the user manual for the computer program at issue in the main proceedings.

69      In this respect, the examination, in the light of Directive 2001/29, of the reproduction of those elements of the user manual for a computer program must be the same with respect to the creation of the user manual for a second program as it is with respect to the creation of that second program.

70      Consequently, in the light of the foregoing considerations, the answer to Questions 8 and 9 is that Article 2(a) of Directive 2001/29 must be interpreted as meaning that the reproduction, in a computer program or a user manual for that program, of certain elements described in the user manual for another computer program protected by copyright is capable of constituting an infringement of the copyright in the latter manual if — this being a matter for the national court to ascertain — that reproduction constitutes the expression of the intellectual creation of the author of the user manual for the computer program protected by copyright.

 Costs

71      Since these proceedings are, for the parties to the main proceedings, a step in the action pending before the national court, the decision on costs is a matter for that court. Costs incurred in submitting observations to the Court, other than the costs of those parties, are not recoverable.

On those grounds, the Court (Grand Chamber) hereby rules:

1.      Article 1(2) of Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs must be interpreted as meaning that neither the functionality of a computer program nor the programming language and the format of data files used in a computer program in order to exploit certain of its functions constitute a form of expression of that program and, as such, are not protected by copyright in computer programs for the purposes of that directive.

2.      Article 5(3) of Directive 91/250 must be interpreted as meaning that a person who has obtained a copy of a computer program under a licence is entitled, without the authorisation of the owner of the copyright, to observe, study or test the functioning of that program so as to determine the ideas and principles which underlie any element of the program, in the case where that person carries out acts covered by that licence and acts of loading and running necessary for the use of the computer program, and on condition that that person does not infringe the exclusive rights of the owner of the copyright in that program.

3.      Article 2(a) of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society must be interpreted as meaning that the reproduction, in a computer program or a user manual for that program, of certain elements described in the user manual for another computer program protected by copyright is capable of constituting an infringement of the copyright in the latter manual if — this being a matter for the national court to ascertain — that reproduction constitutes the expression of the intellectual creation of the author of the user manual for the computer program protected by copyright.

 

4.2.5 SAS Institute (SUMMARY) 4.2.5 SAS Institute (SUMMARY)

Case C‑406/10

SAS Institute Inc.

v

World Programming Ltd

(Reference for a preliminary ruling from the la High Court of Justice of England and Wales (Chancery Division))

(Intellectual property — Directive 91/250/EEC — Legal protection of computer programs — Articles 1(2) and 5(3) — Scope of protection — Creation directly or via another process — Computer program protected by copyright — Reproduction of the functions by a second program without access to the source code of the first program — Decompilation of the object code of the first computer program — Directive 2001/29/EC — Copyright and related rights in the information society — Article 2(a) — User manual for a computer program — Reproduction in another computer program — Infringement of copyright — Condition — Expression of the intellectual creation of the author of the user manual)

Summary of the Judgment

1.        Approximation of laws — Copyright and related rights — Directive 91/250 — Legal protection of computer programs — Scope — Form of expression of a computer program — Concept

(Council Directive 91/250, Art. 1(2))

2.        Approximation of laws — Copyright and related rights — Directive 91/250 — Legal protection of computer programs — Exceptions to the restricted acts — Person having a right to use a copy of a computer program

(Council Directive 91/250, Art. 5(3))

3.        Approximation of laws — Copyright and related rights — Directive 2001/29 — Harmonisation of certain aspects of copyright and related rights in the information society — Reproduction right — User manual for a computer program

(European Parliament and Council Directive 2001/29, Art. 2(a))

1.        Article 1(2) of Directive 91/250 on the legal protection of computer programs must be interpreted as meaning that neither the functionality of a computer program nor the programming language and the format of data files used in a computer program in order to exploit certain of its functions constitute a form of expression of that program and, as such, are not protected by copyright in computer programs for the purposes of that directive.

To accept that the functionality of a computer program can be protected by copyright would amount to making it possible to monopolise ideas, to the detriment of technological progress and industrial development.

With respect to the programming language and the format of data files used in a computer program to interpret and execute application programs written by users and to read and write data in a specific format of data files, these are elements of that program by means of which users exploit certain functions of that program.

However, if a third party were to procure the part of the source code or the object code relating to the programming language or to the format of data files used in a computer program, and if that party were to create, with the aid of that code, similar elements in its own computer program, that conduct would be liable to constitute partial reproduction within the meaning of Article 4(a) of Directive 91/250.

Lastly, the programming language and the format of data files may be protected, as works, by copyright under Directive 2001/29 on the harmonisation of certain aspects of copyright and related rights in the information society if they are their author’s own intellectual creation.

(see paras 40, 42, 43, 45, 46, operative part 1)

2.        Article 5(3) of Directive 91/250 on the legal protection of computer programs must be interpreted as meaning that a person who has obtained a copy of a computer program under a licence is entitled, without the authorisation of the owner of the copyright, to observe, study or test the functioning of that program so as to determine the ideas and principles which underlie any element of the program, in the case where that person carries out acts covered by that licence and acts of loading and running necessary for the use of the computer program, and on condition that that person does not infringe the exclusive rights of the owner of the copyright in that program.

The copyright in a computer program cannot be infringed where the lawful acquirer of the licence did not have access to the source code of the computer program to which that licence relates, but merely studied, observed and tested that program in order to reproduce its functionality in a second program.

(see paras 61, 62, operative part 2)

3.        Article 2(a) of Directive 2001/29 on the harmonisation of certain aspects of copyright and related rights in the information society must be interpreted as meaning that the reproduction, in a computer program or a user manual for that program, of certain elements described in the user manual for another computer program protected by copyright is capable of constituting an infringement of the copyright in the latter manual if — this being a matter for the national court to ascertain — that reproduction constitutes the expression of the intellectual creation of the author of the user manual for the computer program protected by copyright.

(see para. 70, operative part 3)

4.2.7 Additional Readings 4.2.7 Additional Readings

4.2.7.1 Computer Associates International, Inc. v. Altai, Inc., 4.2.7.1 Computer Associates International, Inc. v. Altai, Inc.,

982 F.2d 693
119 A.L.R.Fed. 741, 61 USLW 2434, 37
Fed. R. Evid. Serv. 348

COMPUTER ASSOCIATES INTERNATIONAL, INC.,
Plaintiff-Appellant-Cross-Appellee,
v.
ALTAI, INC., Defendant-Appellee-Cross-Appellant.

No. 762, Dockets 91-7893, 91-7935.
United States Court of Appeals,
Second Circuit.
Argued Jan. 9, 1992.
Decided June 22, 1992.
Amended Opinion Dec. 17, 1992.

[695] Stephen D. Kahn, New York City (Stuart D. Levi, Beth K. Neelman, Carol A. Motyka, Weil, Gotshal & Manges, Michael A. [696] McElroy, Computer Associates Intern., Inc., of counsel), for plaintiff-appellant, cross-appellee.

Susan G. Braden, Washington, DC (Christ M. Kacoyannakis, Anderson Kill Olick & Oshinshy, Washington, DC, Stephen D. Susman, Susman Godfrey, Houston, TX, of counsel), for defendant-appellee, cross-appellant.

Bruce A. Lehman, Swidler & Berlin, Washington, DC, filed a brief amicus curiae, on behalf of The Software Publishers Ass'n.

Peter M.C. Choy, Mountain View, CA, filed a brief amicus curiae, on behalf of the American Committee for Interoperable Systems.

J. David Cabello, Houston, TX, David R. Bradford, Provo, UT, Robert H. Kohn, Scotts Valley, CA, filed a brief amici curiae, on behalf of Compaq Computer Corp., Novell, Inc., and Borland Intern., Inc.

Before ALTIMARI, MAHONEY and WALKER, Circuit Judges.

WALKER, Circuit Judge:

In recent years, the growth of computer science has spawned a number of challenging legal questions, particularly in the field of copyright law. As scientific knowledge advances, courts endeavor to keep pace, and sometimes--as in the area of computer technology--they are required to venture into less than familiar waters. This is not a new development, though. "From its beginning, the law of copyright has developed in response to significant changes in technology." Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 430, 104 S.Ct. 774, 782, 78 L.Ed.2d 574 (1984).

Article I, section 8 of the Constitution authorizes Congress "[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." The Supreme Court has stated that "[t]he economic philosophy behind the clause ... is the conviction that encouragement of individual effort by personal gain is the best way to advance public welfare...." Mazer v. Stein, 347 U.S. 201, 219, 74 S.Ct. 460, 471, 98 L.Ed. 630 (1954). The author's benefit, however, is clearly a "secondary" consideration. See United States v. Paramount Pictures, Inc., 334 U.S. 131, 158, 68 S.Ct. 915, 929, 92 L.Ed. 1260 (1948). "[T]he ultimate aim is, by this incentive, to stimulate artistic creativity for the general public good." Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156, 95 S.Ct. 2040, 2044, 45 L.Ed.2d 84 (1975).

Thus, the copyright law seeks to establish a delicate equilibrium. On the one hand, it affords protection to authors as an incentive to create, and, on the other, it must appropriately limit the extent of that protection so as to avoid the effects of monopolistic stagnation. In applying the federal act to new types of cases, courts must always keep this symmetry in mind. Id.

Among other things, this case deals with the challenging question of whether and to what extent the "non-literal" aspects of a computer program, that is, those aspects that are not reduced to written code, are protected by copyright. While a few other courts have already grappled with this issue, this case is one of first impression in this circuit. As we shall discuss, we find the results reached by other courts to be less than satisfactory. Drawing upon long-standing doctrines of copyright law, we take an approach that we think better addresses the practical difficulties embedded in these types of cases. In so doing, we have kept in mind the necessary balance between creative incentive and industrial competition.

This appeal comes to us from the United States District Court for the Eastern District of New York, the Honorable George C. Pratt, Circuit Judge, sitting by designation. By Memorandum and Order entered August 12, 1991, Judge Pratt found that defendant Altai, Inc.'s ("Altai"), OSCAR 3.4 computer program had infringed plaintiff Computer Associates' ("CA"), copyrighted computer program entitled CA-SCHEDULER. Accordingly, the district court awarded CA $364,444 in actual damages and apportioned profits. Altai has [697] abandoned its appeal from this award. With respect to CA's second claim for copyright infringement, Judge Pratt found that Altai's OSCAR 3.5 program was not substantially similar to a portion of CA-SCHEDULER called ADAPTER, and thus denied relief. Finally, the district court concluded that CA's state law trade secret misappropriation claim against Altai had been preempted by the federal Copyright Act. CA appealed from these findings.

Because we are in full agreement with Judge Pratt's decision and in substantial agreement with his careful reasoning regarding CA's copyright infringement claim, we affirm the district court's judgment on that issue. However, we vacate the district court's preemption ruling with respect to CA's trade secret claim, and remand the case to the district court for further proceedings.

BACKGROUND

We assume familiarity with the facts set forth in the district court's comprehensive and scholarly opinion. See Computer Assocs. Int'l., Inc. v. Altai, Inc., 775 F.Supp. 544, 549-55 (E.D.N.Y.1991). Thus, we summarize only those facts necessary to resolve this appeal.

I. COMPUTER PROGRAM DESIGN

Certain elementary facts concerning the nature of computer programs are vital to the following discussion. The Copyright Act defines a computer program as "a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result." 17 U.S.C. § 101. In writing these directions, the programmer works "from the general to the specific." Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1229 (3d Cir.1986), cert. denied, 479 U.S. 1031, 107 S.Ct. 877, 93 L.Ed.2d 831 (1987). See generally Steven R. Englund, Note, Idea, Process, or Protected Expression?: Determining the Scope of Copyright Protection of the Structure of Computer Programs, 88 MICH.L.REV. 866, 867-73 (1990) (hereinafter "Englund"); Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs, 41 STAN.L.REV. 1045, 1051-57 (1989) (hereinafter "Menell"); Mark T. Kretschmer, Note, Copyright Protection For Software Architecture: Just Say No!, 1988 COLUM.BUS.L.REV. 823, 824-27 (1988) (hereinafter "Kretschmer"); Peter G. Spivack, Comment, Does Form Follow Function? The Idea/Expression Dichotomy In Copyright Protection of Computer Software, 35 U.C.L.A.L.REV. 723, 729-31 (1988) (hereinafter "Spivack").

The first step in this procedure is to identify a program's ultimate function or purpose. An example of such an ultimate purpose might be the creation and maintenance of a business ledger. Once this goal has been achieved, a programmer breaks down or "decomposes" the program's ultimate function into "simpler constituent problems or 'subtasks,' " Englund, at 870, which are also known as subroutines or modules. See Spivack, at 729. In the context of a business ledger program, a module or subroutine might be responsible for the task of updating a list of outstanding accounts receivable. Sometimes, depending upon the complexity of its task, a subroutine may be broken down further into sub-subroutines.

Having sufficiently decomposed the program's ultimate function into its component elements, a programmer will then arrange the subroutines or modules into what are known as organizational or flow charts. Flow charts map the interactions between modules that achieve the program's end goal. See Kretschmer, at 826.

In order to accomplish these intra-program interactions, a programmer must carefully design each module's parameter list. A parameter list, according to the expert appointed and fully credited by the district court, Dr. Randall Davis, is "the information sent to and received from a subroutine." See Report of Dr. Randall Davis, at 12. The term "parameter list" refers to the form in which information is passed between modules (e.g. for accounts receivable, the designated time frame and particular customer identifying number) and the information's actual content (e.g. [698] 8/91-7/92; customer No. 3). Id. With respect to form, interacting modules must share similar parameter lists so that they are capable of exchanging information.

"The functions of the modules in a program together with each module's relationships to other modules constitute the 'structure' of the program." Englund, at 871. Additionally, the term structure may include the category of modules referred to as "macros." A macro is a single instruction that initiates a sequence of operations or module interactions within the program. Very often the user will accompany a macro with an instruction from the parameter list to refine the instruction (e.g. current total of accounts receivable (macro), but limited to those for 8/91 to 7/92 from customer No. 3 (parameters)).

In fashioning the structure, a programmer will normally attempt to maximize the program's speed, efficiency, as well as simplicity for user operation, while taking into consideration certain externalities such as the memory constraints of the computer upon which the program will be run. See id.; Kretschmer, at 826; Menell, at 1052. "This stage of program design often requires the most time and investment." Kretschmer, at 826.

Once each necessary module has been identified, designed, and its relationship to the other modules has been laid out conceptually, the resulting program structure must be embodied in a written language that the computer can read. This process is called "coding," and requires two steps. Whelan, 797 F.2d at 1230. First, the programmer must transpose the program's structural blue-print into a source code. This step has been described as "comparable to the novelist fleshing out the broad outline of his plot by crafting from words and sentences the paragraphs that convey the ideas." Kretschmer, at 826. The source code may be written in any one of several computer languages, such as COBAL, FORTRAN, BASIC, EDL, etc., depending upon the type of computer for which the program is intended. Whelan, 797 F.2d at 1230. Once the source code has been completed, the second step is to translate or "compile" it into object code. Object code is the binary language comprised of zeros and ones through which the computer directly receives its instructions. Id. at 1230-31; Englund, at 868 & n. 13.

After the coding is finished, the programmer will run the program on the computer in order to find and correct any logical and syntactical errors. This is known as "debugging" and, once done, the program is complete. See Kretschmer, at 826-27.

II. FACTS

CA is a Delaware corporation, with its principal place of business in Garden City, New York. Altai is a Texas corporation, doing business primarily in Arlington, Texas. Both companies are in the computer software industry--designing, developing and marketing various types of computer programs.

The subject of this litigation originates with one of CA's marketed programs entitled CA-SCHEDULER. CA-SCHEDULER is a job scheduling program designed for IBM mainframe computers. Its primary functions are straightforward: to create a schedule specifying when the computer should run various tasks, and then to control the computer as it executes the schedule. CA-SCHEDULER contains a sub-program entitled ADAPTER, also developed by CA. ADAPTER is not an independently marketed product of CA; it is a wholly integrated component of CA-SCHEDULER and has no capacity for independent use.

Nevertheless, ADAPTER plays an extremely important role. It is an "operating system compatibility component," which means, roughly speaking, it serves as a translator. An "operating system" is itself a program that manages the resources of the computer, allocating those resources to other programs as needed. The IBM System 370 family of computers, for which CA-SCHEDULER was created, is, depending upon the computer's size, designed to contain one of three operating systems: DOS/VSE, MVS, or CMS. As the district court noted, the general rule is that "a [699] program written for one operating system, e.g., DOS/VSE, will not, without modification, run under another operating system such as MVS." Computer Assocs., 775 F.Supp. at 550. ADAPTER's function is to translate the language of a given program into the particular language that the computer's own operating system can understand.

The district court succinctly outlined the manner in which ADAPTER works within the context of the larger program. In order to enable CA-SCHEDULER to function on different operating systems, CA divided the CA-SCHEDULER into two components:

--a first component that contains only the task-specific portions of the program, independent of all operating system issues, and

--a second component that contains all the interconnections between the first component and the operating system.

In a program constructed in this way, whenever the first, task-specific, component needs to ask the operating system for some resource through a "system call", it calls the second component instead of calling the operating system directly.

The second component serves as an "interface" or "compatibility component" between the task-specific portion of the program and the operating system. It receives the request from the first component and translates it into the appropriate system call that will be recognized by whatever operating system is installed on the computer, e.g., DOS/VSE, MVS, or CMS. Since the first, task-specific component calls the adapter component rather than the operating system, the first component need not be customized to use any specific operating system. The second, interface, component insures that all the system calls are performed properly for the particular operating system in use.

Id. at 551.

ADAPTER serves as the second, "common system interface" component referred to above.

A program like ADAPTER, which allows a computer user to change or use multiple operating systems while maintaining the same software, is highly desirable. It saves the user the costs, both in time and money, that otherwise would be expended in purchasing new programs, modifying existing systems to run them, and gaining familiarity with their operation. The benefits run both ways. The increased compatibility afforded by an ADAPTER-like component, and its resulting popularity among consumers, makes whatever software in which it is incorporated significantly more marketable.

Starting in 1982, Altai began marketing its own job scheduling program entitled ZEKE. The original version of ZEKE was designed for use in conjunction with a VSE operating system. By late 1983, in response to customer demand, Altai decided to rewrite ZEKE so that it could be run in conjunction with an MVS operating system.

At that time, James P. Williams ("Williams"), then an employee of Altai and now its President, approached Claude F. Arney, III ("Arney"), a computer programmer who worked for CA. Williams and Arney were longstanding friends, and had in fact been co-workers at CA for some time before Williams left CA to work for Altai's predecessor. Williams wanted to recruit Arney to assist Altai in designing an MVS version of ZEKE.

At the time he first spoke with Arney, Williams was aware of both the CA-SCHEDULER and ADAPTER programs. However, Williams was not involved in their development and had never seen the codes of either program. When he asked Arney to come work for Altai, Williams did not know that ADAPTER was a component of CA-SCHEDULER.

Arney, on the other hand, was intimately familiar with various aspects of ADAPTER. While working for CA, he helped improve the VSE version of ADAPTER, and was permitted to take home a copy of ADAPTER'S source code. This apparently developed into an irresistible habit, for when Arney left CA to work for Altai in January, 1984, he took with him copies of [700] the source code for both the VSE and MVS versions of ADAPTER. He did this in knowing violation of the CA employee agreements that he had signed.

Once at Altai, Arney and Williams discussed design possibilities for adapting ZEKE to run on MVS operating systems. Williams, who had created the VSE version of ZEKE, thought that approximately 30% of his original program would have to be modified in order to accommodate MVS. Arney persuaded Williams that the best way to make the needed modifications was to introduce a "common system interface" component into ZEKE. He did not tell Williams that his idea stemmed from his familiarity with ADAPTER. They decided to name this new component-program OSCAR.

Arney went to work creating OSCAR at Altai's offices using the ADAPTER source code. The district court accepted Williams' testimony that no one at Altai, with the exception of Arney, affirmatively knew that Arney had the ADAPTER code, or that he was using it to create OSCAR/VSE. However, during this time period, Williams' office was adjacent to Arney's. Williams testified that he and Arney "conversed quite frequently" while Arney was "investigating the source code of ZEKE" and that Arney was in his office "a number of times daily, asking questions." In three months, Arney successfully completed the OSCAR/VSE project. In an additional month he developed an OSCAR/MVS version. When the dust finally settled, Arney had copied approximately 30% of OSCAR's code from CA's ADAPTER program.

The first generation of OSCAR programs was known as OSCAR 3.4. From 1985 to August 1988, Altai used OSCAR 3.4 in its ZEKE product, as well as in programs entitled ZACK and ZEBB. In late July 1988, CA first learned that Altai may have appropriated parts of ADAPTER. After confirming its suspicions, CA secured copyrights on its 2.1 and 7.0 versions of CA-SCHEDULER. CA then brought this copyright and trade secret misappropriation action against Altai.

Apparently, it was upon receipt of the summons and complaint that Altai first learned that Arney had copied much of the OSCAR code from ADAPTER. After Arney confirmed to Williams that CA's accusations of copying were true, Williams immediately set out to survey the damage. Without ever looking at the ADAPTER code himself, Williams learned from Arney exactly which sections of code Arney had taken from ADAPTER.

Upon advice of counsel, Williams initiated OSCAR's rewrite. The project's goal was to save as much of OSCAR 3.4 as legitimately could be used, and to excise those portions which had been copied from ADAPTER. Arney was entirely excluded from the process, and his copy of the ADAPTER code was locked away. Williams put eight other programmers on the project, none of whom had been involved in any way in the development of OSCAR 3.4. Williams provided the programmers with a description of the ZEKE operating system services so that they could rewrite the appropriate code. The rewrite project took about six months to complete and was finished in mid-November 1989. The resulting program was entitled OSCAR 3.5.

From that point on, Altai shipped only OSCAR 3.5 to its new customers. Altai also shipped OSCAR 3.5 as a "free upgrade" to all customers that had previously purchased OSCAR 3.4. While Altai and Williams acted responsibly to correct Arney's literal copying of the ADAPTER program, copyright infringement had occurred.

After CA originally instituted this action in the United States District Court for the District of New Jersey, the parties stipulated its transfer in March, 1989, to the Eastern District of New York where it was assigned to Judge Jacob Mishler. On October 26, 1989, Judge Mishler transferred the case to Judge Pratt who was sitting in the district court by designation. Judge Pratt conducted a six day trial from March 28 through April 6, 1990. He entered judgment on August 12, 1991, and this appeal followed.

[701] DISCUSSION

While both parties originally appealed from different aspects of the district court's judgment, Altai has now abandoned its appellate claims. In particular, Altai has conceded liability for the copying of ADAPTER into OSCAR 3.4 and raises no challenge to the award of $364,444 in damages on that score. Thus, we address only CA's appeal from the district court's rulings that: (1) Altai was not liable for copyright infringement in developing OSCAR 3.5; and (2) in developing both OSCAR 3.4 and 3.5, Altai was not liable for misappropriating CA's trade secrets.

CA makes two arguments. First, CA contends that the district court applied an erroneous method for determining whether there exists substantial similarity between computer programs, and thus, erred in determining that OSCAR 3.5 did not infringe the copyrights held on the different versions of its CA-SCHEDULER program. CA asserts that the test applied by the district court failed to account sufficiently for a computer program's non-literal elements. Second, CA maintains that the district court erroneously concluded that its state law trade secret claims had been preempted by the federal Copyright Act. See 17 U.S.C. § 301(a). We shall address each argument in turn.

I. COPYRIGHT INFRINGEMENT

In any suit for copyright infringement, the plaintiff must establish its ownership of a valid copyright, and that the defendant copied the copyrighted work. See Novelty Textile Mills, Inc. v. Joan Fabrics Corp., 558 F.2d 1090, 1092 (2d Cir.1977); see also 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.01, at 13-4 (1991) (hereinafter "Nimmer"). The plaintiff may prove defendant's copying either by direct evidence or, as is most often the case, by showing that (1) the defendant had access to the plaintiff's copyrighted work and (2) that defendant's work is substantially similar to the plaintiff's copyrightable material. See Walker v. Time Life Films, Inc., 784 F.2d 44, 48 (2d Cir.), cert. denied, 476 U.S. 1159, 106 S.Ct. 2278, 90 L.Ed.2d 721 (1986).

For the purpose of analysis, the district court assumed that Altai had access to the ADAPTER code when creating OSCAR 3.5. See Computer Assocs., 775 F.Supp. at 558. Thus, in determining whether Altai had unlawfully copied protected aspects of CA's ADAPTER, the district court narrowed its focus of inquiry to ascertaining whether Altai's OSCAR 3.5 was substantially similar to ADAPTER. Because we approve Judge Pratt's conclusions regarding substantial similarity, our analysis will proceed along the same assumption.

As a general matter, and to varying degrees, copyright protection extends beyond a literary work's strictly textual form to its non-literal components. As we have said, "[i]t is of course essential to any protection of literary property ... that the right cannot be limited literally to the text, else a plagiarist would escape by immaterial variations." Nichols v. Universal Pictures Co., 45 F.2d 119, 121 (2d Cir.1930) (L. Hand, J.), cert. denied, 282 U.S. 902, 51 S.Ct. 216, 75 L.Ed. 795 (1931). Thus, where "the fundamental essence or structure of one work is duplicated in another," 3 Nimmer, § 13.03[A], at 13-24, courts have found copyright infringement. See, e.g., Horgan v. Macmillan, 789 F.2d 157, 162 (2d Cir.1986) (recognizing that a book of photographs might infringe ballet choreography); Twentieth Century-Fox Film Corp. v. MCA, Inc., 715 F.2d 1327, 1329 (9th Cir.1983) (motion picture and television series); Sid & Marty Krofft Television Prods., Inc. v. McDonald's Corp., 562 F.2d 1157, 1167 (9th Cir.1977) (television commercial and television series); Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 55 (2d Cir.), cert. denied, 298 U.S. 669, 56 S.Ct. 835, 80 L.Ed. 1392 (1936) (play and motion picture); accord Stewart v. Abend, 495 U.S. 207, 238, 110 S.Ct. 1750, 1769, 109 L.Ed.2d 184 (1990) (recognizing that motion picture may infringe copyright in book by using its "unique setting, characters, plot, and sequence of events"). This black letter proposition is the springboard for our discussion.

[702] A. Copyright Protection for the Non-literal Elements of Computer Programs

It is now well settled that the literal elements of computer programs, i.e., their source and object codes, are the subject of copyright protection. See Whelan, 797 F.2d at 1233 (source and object code); CMS Software Design Sys., Inc. v. Info Designs, Inc., 785 F.2d 1246, 1247 (5th Cir.1986) (source code); Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1249 (3d Cir.1983), cert. dismissed, 464 U.S. 1033, 104 S.Ct. 690, 79 L.Ed.2d 158 (1984) (source and object code); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 876-77 (3d Cir.1982) (object code). Here, as noted earlier, Altai admits having copied approximately 30% of the OSCAR 3.4 program from CA's ADAPTER source code, and does not challenge the district court's related finding of infringement.

In this case, the hotly contested issues surround OSCAR 3.5. As recounted above, OSCAR 3.5 is the product of Altai's carefully orchestrated rewrite of OSCAR 3.4. After the purge, none of the ADAPTER source code remained in the 3.5 version; thus, Altai made sure that the literal elements of its revamped OSCAR program were no longer substantially similar to the literal elements of CA's ADAPTER.

According to CA, the district court erroneously concluded that Altai's OSCAR 3.5 was not substantially similar to its own ADAPTER program. CA argues that this occurred because the district court "committed legal error in analyzing [its] claims of copyright infringement by failing to find that copyright protects expression contained in the non-literal elements of computer software." We disagree.

CA argues that, despite Altai's rewrite of the OSCAR code, the resulting program remained substantially similar to the structure of its ADAPTER program. As discussed above, a program's structure includes its non-literal components such as general flow charts as well as the more specific organization of inter-modular relationships, parameter lists, and macros. In addition to these aspects, CA contends that OSCAR 3.5 is also substantially similar to ADAPTER with respect to the list of services that both ADAPTER and OSCAR obtain from their respective operating systems. We must decide whether and to what extent these elements of computer programs are protected by copyright law.

The statutory terrain in this area has been well explored. See Lotus Dev. Corp. v. Paperback Software Int'l, 740 F.Supp. 37, 47-51 (D.Mass.1990); see also Whelan, 797 F.2d at 1240-42; Englund, at 885-90; Spivack, at 731-37. The Copyright Act affords protection to "original works of authorship fixed in any tangible medium of expression...." 17 U.S.C. § 102(a). This broad category of protected "works" includes "literary works," id. at § 102(a)(1), which are defined by the Act as

works, other than audiovisual works, expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, manuscripts, phonorecords, film tapes, disks, or cards, in which they are embodied.

17 U.S.C. § 101. While computer programs are not specifically listed as part of the above statutory definition, the legislative history leaves no doubt that Congress intended them to be considered literary works. See H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5667 (hereinafter "House Report" ); Whelan, 797 F.2d at 1234; Apple Computer, 714 F.2d at 1247.

The syllogism that follows from the foregoing premises is a powerful one: if the non-literal structures of literary works are protected by copyright; and if computer programs are literary works, as we are told by the legislature; then the non-literal structures of computer programs are protected by copyright. See Whelan, 797 F.2d at 1234 ("By analogy to other literary works, it would thus appear that the copyrights of computer programs can be infringed even absent copying of the literal elements of the program."). We have no reservation in joining the company of those courts that have already ascribed to this logic. See, e.g., Johnson Controls, Inc. v. [703] Phoenix Control Sys., Inc., 886 F.2d 1173, 1175 (9th Cir.1989); Lotus Dev. Corp., 740 F.Supp. at 54; Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F.Supp. 449, 455-56 (N.D.Ga.1987); Q-Co Industries, Inc. v. Hoffman, 625 F.Supp. 608, 615 (S.D.N.Y.1985); SAS Inst., Inc. v. S & H Computer Sys., Inc., 605 F.Supp. 816, 829-30 (M.D.Tenn.1985). However, that conclusion does not end our analysis. We must determine the scope of copyright protection that extends to a computer program's non-literal structure.

As a caveat, we note that our decision here does not control infringement actions regarding categorically distinct works, such as certain types of screen displays. These items represent products of computer programs, rather than the programs themselves, and fall under the copyright rubric of audiovisual works. If a computer audiovisual display is copyrighted separately as an audiovisual work, apart from the literary work that generates it (i.e., the program), the display may be protectable regardless of the underlying program's copyright status. See Stern Elecs., Inc. v. Kaufman, 669 F.2d 852, 855 (2d Cir.1982) (explaining that an audiovisual works copyright, rather than a copyright on the underlying program, extended greater protection to the sights and sounds generated by a computer video game because the same audiovisual display could be generated by different programs). Of course, the copyright protection that these displays enjoy extends only so far as their expression is protectable. See Data East USA, Inc. v. Epyx, Inc., 862 F.2d 204, 209 (9th Cir.1988). In this case, however, we are concerned not with a program's display, but the program itself, and then with only its non-literal components. In considering the copyrightability of these components, we must refer to venerable doctrines of copyright law.

1) Idea vs. Expression Dichotomy

It is a fundamental principle of copyright law that a copyright does not protect an idea, but only the expression of the idea. See Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879); Mazer v. Stein, 347 U.S. 201, 217, 74 S.Ct. 460, 470, 98 L.Ed. 630 (1954). This axiom of common law has been incorporated into the governing statute. Section 102(b) of the Act provides:

In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.

17 U.S.C. § 102(b). See also House Report, at 5670 ("Copyright does not preclude others from using ideas or information revealed by the author's work.").

Congress made no special exception for computer programs. To the contrary, the legislative history explicitly states that copyright protects computer programs only "to the extent that they incorporate authorship in programmer's expression of original ideas, as distinguished from the ideas themselves." Id. at 5667; see also id. at 5670 ("Section 102(b) is intended ... to make clear that the expression adopted by the programmer is the copyrightable element in a computer program, and that the actual processes or methods embodied in the program are not within the scope of copyright law.").

Similarly, the National Commission on New Technological Uses of Copyrighted Works ("CONTU") established by Congress to survey the issues generated by the interrelationship of advancing technology and copyright law, see Pub.L. No. 93-573, § 201, 88 Stat. 1873 (1974), recommended, inter alia, that the 1976 Copyright Act "be amended ... to make it explicit that computer programs, to the extent that they embody the author's original creation, are proper subject matter for copyright." See National Commission on New Technological Uses of Copyrighted Works, Final Report 1 (1979) (hereinafter "CONTU Report" ). To that end, Congress adopted CONTU's suggestions and amended the Copyright Act by adding, among other things, a provision to 17 U.S.C. § 101 which defined the term "computer program." See Pub.L. No. 96-517, § 10(a), 94 Stat. [704] 3028 (1980). CONTU also "concluded that the idea-expression distinction should be used to determine which aspects of computer programs are copyrightable." Lotus Dev. Corp., 740 F.Supp. at 54 (citing CONTU Report, at 44).

Drawing the line between idea and expression is a tricky business. Judge Learned Hand noted that "[n]obody has ever been able to fix that boundary, and nobody ever can." Nichols, 45 F.2d at 121. Thirty years later his convictions remained firm. "Obviously, no principle can be stated as to when an imitator has gone beyond copying the 'idea,' and has borrowed its 'expression,' " Judge Hand concluded. "Decisions must therefore inevitably be ad hoc." Peter Pan Fabrics, Inc. v. Martin Weiner Corp., 274 F.2d 487, 489 (2d Cir.1960).

The essentially utilitarian nature of a computer program further complicates the task of distilling its idea from its expression. See SAS Inst., 605 F.Supp. at 829; cf. Englund, at 893. In order to describe both computational processes and abstract ideas, its content "combines creative and technical expression." See Spivack, at 755. The variations of expression found in purely creative compositions, as opposed to those contained in utilitarian works, are not directed towards practical application. For example, a narration of Humpty Dumpty's demise, which would clearly be a creative composition, does not serve the same ends as, say, a recipe for scrambled eggs--which is a more process oriented text. Thus, compared to aesthetic works, computer programs hover even more closely to the elusive boundary line described in § 102(b).

The doctrinal starting point in analyses of utilitarian works, is the seminal case of Baker v. Selden, 101 U.S. 99, 25 L.Ed. 841 (1879). In Baker, the Supreme Court faced the question of "whether the exclusive property in a system of bookkeeping can be claimed, under the law of copyright, by means of a book in which that system is explained?" Id. at 101. Selden had copyrighted a book that expounded a particular method of bookkeeping. The book contained lined pages with headings intended to illustrate the manner in which the system operated. Baker's accounting publication included ledger sheets that employed "substantially the same ruled lines and headings...." Id. Selden's testator sued Baker for copyright infringement on the theory that the ledger sheets were protected by Selden's copyright.

The Supreme Court found nothing copyrightable in Selden's bookkeeping system, and rejected his infringement claim regarding the ledger sheets. The Court held that:

The fact that the art described in the book by illustrations of lines and figures which are reproduced in practice in the application of the art, makes no difference. Those illustrations are the mere language employed by the author to convey his ideas more clearly. Had he used words of description instead of diagrams (which merely stand in the place of words), there could not be the slightest doubt that others, applying the art to practical use, might lawfully draw the lines and diagrams which were in the author's mind, and which he thus described by words in his book.

The copyright of a work on mathematical science cannot give to the author an exclusive right to the methods of operation which he propounds, or to the diagrams which he employs to explain them, so as to prevent an engineer from using them whenever occasion requires.

Id. at 103.

To the extent that an accounting text and a computer program are both "a set of statements or instructions ... to bring about a certain result," 17 U.S.C. § 101, they are roughly analogous. In the former case, the processes are ultimately conducted by human agency; in the latter, by electronic means. In either case, as already stated, the processes themselves are not protectable. But the holding in Baker goes farther. The Court concluded that those aspects of a work, which "must necessarily be used as incident to" the idea, system or process that the work describes, are also not copyrightable. 101 U.S. at 104. Selden's ledger sheets, therefore, enjoyed [705] no copyright protection because they were "necessary incidents to" the system of accounting that he described. Id. at 103. From this reasoning, we conclude that those elements of a computer program that are necessarily incidental to its function are similarly unprotectable.

While Baker v. Selden provides a sound analytical foundation, it offers scant guidance on how to separate idea or process from expression, and moreover, on how to further distinguish protectable expression from that expression which "must necessarily be used as incident to" the work's underlying concept. In the context of computer programs, the Third Circuit's noted decision in Whelan has, thus far, been the most thoughtful attempt to accomplish these ends.

The court in Whelan faced substantially the same problem as is presented by this case. There, the defendant was accused of making off with the non-literal structure of the plaintiff's copyrighted dental lab management program, and employing it to create its own competitive version. In assessing whether there had been an infringement, the court had to determine which aspects of the programs involved were ideas, and which were expression. In separating the two, the court settled upon the following conceptual approach:

[T]he line between idea and expression may be drawn with reference to the end sought to be achieved by the work in question. In other words, the purpose or function of a utilitarian work would be the work's idea, and everything that is not necessary to that purpose or function would be part of the expression of the idea.... Where there are various means of achieving the desired purpose, then the particular means chosen is not necessary to the purpose; hence, there is expression, not idea.

797 F.2d at 1236 (citations omitted). The "idea" of the program at issue in Whelan was identified by the court as simply "the efficient management of a dental laboratory." Id. at n. 28.

So far, in the courts, the Whelan rule has received a mixed reception. While some decisions have adopted its reasoning, see, e.g., Bull HN Info. Sys., Inc. v. American Express Bank, Ltd., 1990 Copyright Law Dec. (CCH) p 26,555 at 23,278, 1990 WL 48098 (S.D.N.Y.1990); Dynamic Solutions, Inc. v. Planning & Control, Inc., 1987 Copyright Law Dec. (CCH) p 26,062 at 20,912, 1987 WL 6419 (S.D.N.Y.1987); Broderbund Software Inc. v. Unison World, Inc., 648 F.Supp. 1127, 1133 (N.D.Cal.1986), others have rejected it, see Plains Cotton Co-op v. Goodpasture Computer Serv., Inc., 807 F.2d 1256, 1262 (5th Cir.), cert. denied, 484 U.S. 821, 108 S.Ct. 80, 98 L.Ed.2d 42 (1987); cf. Synercom Technology, Inc. v. University Computing Co., 462 F.Supp. 1003, 1014 (N.D.Tex.1978) (concluding that order and sequence of data on computer input formats was idea not expression).

Whelan has fared even more poorly in the academic community, where its standard for distinguishing idea from expression has been widely criticized for being conceptually overbroad. See, e.g., Englund, at 881; Menell, at 1074, 1082; Kretschmer, at 837-39; Spivack, at 747-55; Thomas M. Gage, Note, Whelan Associates v. Jaslow Dental Laboratories: Copyright Protection for Computer Software Structure--What's the Purpose?, 1987 WIS.L.REV. 859, 860-61 (1987). The leading commentator in the field has stated that "[t]he crucial flaw in [Whelan 's] reasoning is that it assumes that only one 'idea,' in copyright law terms, underlies any computer program, and that once a separable idea can be identified, everything else must be expression." 3 Nimmer § 13.03(F), at 13-62.34. This criticism focuses not upon the program's ultimate purpose but upon the reality of its structural design. As we have already noted, a computer program's ultimate function or purpose is the composite result of interacting subroutines. Since each subroutine is itself a program, and thus, may be said to have its own "idea," Whelan 's general formulation that a program's overall purpose equates with the program's idea is descriptively inadequate.

Accordingly, we think that Judge Pratt wisely declined to follow Whelan. See [706] Computer Assocs., 775 F.Supp. at 558-60. In addition to noting the weakness in the Whelan definition of "program-idea," mentioned above, Judge Pratt found that Whelan 's synonymous use of the terms "structure, sequence, and organization," see Whelan, 797 F.2d at 1224 n. 1, demonstrated a flawed understanding of a computer program's method of operation. See Computer Assocs., 775 F.Supp. at 559-60 (discussing the distinction between a program's "static structure" and "dynamic structure"). Rightly, the district court found Whelan 's rationale suspect because it is so closely tied to what can now be seen--with the passage of time--as the opinion's somewhat outdated appreciation of computer science.

2) Substantial Similarity Test for Computer Program Structure: Abstraction-Filtration-Comparison

We think that Whelan 's approach to separating idea from expression in computer programs relies too heavily on metaphysical distinctions and does not place enough emphasis on practical considerations. Cf. Apple Computer, 714 F.2d at 1253 (rejecting certain commercial constraints on programming as a helpful means of distinguishing idea from expression because they did "not enter into the somewhat metaphysical issue of whether particular ideas and expressions have merged"). As the cases that we shall discuss demonstrate, a satisfactory answer to this problem cannot be reached by resorting, a priori, to philosophical first principals.

As discussed herein, we think that district courts would be well-advised to undertake a three-step procedure, based on the abstractions test utilized by the district court, in order to determine whether the non-literal elements of two or more computer programs are substantially similar. This approach breaks no new ground; rather, it draws on such familiar copyright doctrines as merger, scenes a faire, and public domain. In taking this approach, however, we are cognizant that computer technology is a dynamic field which can quickly outpace judicial decisionmaking. Thus, in cases where the technology in question does not allow for a literal application of the procedure we outline below, our opinion should not be read to foreclose the district courts of our circuit from utilizing a modified version.

In ascertaining substantial similarity under this approach, a court would first break down the allegedly infringed program into its constituent structural parts. Then, by examining each of these parts for such things as incorporated ideas, expression that is necessarily incidental to those ideas, and elements that are taken from the public domain, a court would then be able to sift out all non-protectable material. Left with a kernel, or possible kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement. It will be helpful to elaborate a bit further.

Step One: Abstraction

As the district court appreciated, see Computer Assocs., 775 F.Supp. at 560, the theoretic framework for analyzing substantial similarity expounded by Learned Hand in the Nichols case is helpful in the present context. In Nichols, we enunciated what has now become known as the "abstractions" test for separating idea from expression:

Upon any work ... a great number of patterns of increasing generality will fit equally well, as more and more of the incident is left out. The last may perhaps be no more than the most general statement of what the [work] is about, and at times might consist only of its title; but there is a point in this series of abstractions where they are no longer protected, since otherwise the [author] could prevent the use of his "ideas," to which, apart from their expression, his property is never extended.

Nichols, 45 F.2d at 121.

While the abstractions test was originally applied in relation to literary works such [707] as novels and plays, it is adaptable to computer programs. In contrast to the Whelan approach, the abstractions test "implicitly recognizes that any given work may consist of a mixture of numerous ideas and expressions." 3 Nimmer § 13.03[F], at 13-62.34-63.

As applied to computer programs, the abstractions test will comprise the first step in the examination for substantial similarity. Initially, in a manner that resembles reverse engineering on a theoretical plane, a court should dissect the allegedly copied program's structure and isolate each level of abstraction contained within it. This process begins with the code and ends with an articulation of the program's ultimate function. Along the way, it is necessary essentially to retrace and map each of the designer's steps--in the opposite order in which they were taken during the program's creation. See Background: Computer Program Design, supra.

As an anatomical guide to this procedure, the following description is helpful:

At the lowest level of abstraction, a computer program may be thought of in its entirety as a set of individual instructions organized into a hierarchy of modules. At a higher level of abstraction, the instructions in the lowest-level modules may be replaced conceptually by the functions of those modules. At progressively higher levels of abstraction, the functions of higher-level modules conceptually replace the implementations of those modules in terms of lower-level modules and instructions, until finally, one is left with nothing but the ultimate function of the program.... A program has structure at every level of abstraction at which it is viewed. At low levels of abstraction, a program's structure may be quite complex; at the highest level it is trivial.

Englund, at 897-98; cf. Spivack, at 774.

Step Two: Filtration

Once the program's abstraction levels have been discovered, the substantial similarity inquiry moves from the conceptual to the concrete. Professor Nimmer suggests, and we endorse, a "successive filtering method" for separating protectable expression from non-protectable material. See generally 3 Nimmer § 13.03[F]. This process entails examining the structural components at each level of abstraction to determine whether their particular inclusion at that level was "idea" or was dictated by considerations of efficiency, so as to be necessarily incidental to that idea; required by factors external to the program itself; or taken from the public domain and hence is nonprotectable expression. See also Kretschmer, at 844-45 (arguing that program features dictated by market externalities or efficiency concerns are unprotectable). The structure of any given program may reflect some, all, or none of these considerations. Each case requires its own fact specific investigation.

Strictly speaking, this filtration serves "the purpose of defining the scope of plaintiff's copyright." Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1475 (9th Cir.) (endorsing "analytic dissection" of computer programs in order to isolate protectable expression), cert. denied, --- U.S. ----, 113 S.Ct. 198, 121 L.Ed.2d 141 (1992). By applying well developed doctrines of copyright law, it may ultimately leave behind a "core of protectable material." 3 Nimmer § 13.03[F], at 13-72. Further explication of this second step may be helpful.

(a) Elements Dictated by Efficiency

The portion of Baker v. Selden, discussed earlier, which denies copyright protection to expression necessarily incidental to the idea being expressed, appears to be the cornerstone for what has developed into the doctrine of merger. See Morrissey v. Proctor & Gamble Co., 379 F.2d 675, 678-79 (1st Cir.1967) (relying on Baker for the proposition that expression embodying the rules of a sweepstakes contest was inseparable from the idea of the contest itself, and therefore were not protectable by copyright); see also Digital Communications, 659 F.Supp. at 457. The doctrine's underlying principle is that "[w]hen there is essentially only one way to express an idea, the idea and its expression are inseparable [708] and copyright is no bar to copying that expression." Concrete Machinery Co. v. Classic Lawn Ornaments, Inc., 843 F.2d 600, 606 (1st Cir.1988). Under these circumstances, the expression is said to have "merged" with the idea itself. In order not to confer a monopoly of the idea upon the copyright owner, such expression should not be protected. See Herbert Rosenthal Jewelry Corp. v. Kalpakian, 446 F.2d 738, 742 (9th Cir.1971).

CONTU recognized the applicability of the merger doctrine to computer programs. In its report to Congress it stated that:

[C]opyrighted language may be copied without infringing when there is but a limited number of ways to express a given idea.... In the computer context, this means that when specific instructions, even though previously copyrighted, are the only and essential means of accomplishing a given task, their later use by another will not amount to infringement.

CONTU Report, at 20. While this statement directly concerns only the application of merger to program code, that is, the textual aspect of the program, it reasonably suggests that the doctrine fits comfortably within the general context of computer programs.

Furthermore, when one considers the fact that programmers generally strive to create programs "that meet the user's needs in the most efficient manner," Menell, at 1052, the applicability of the merger doctrine to computer programs becomes compelling. In the context of computer program design, the concept of efficiency is akin to deriving the most concise logical proof or formulating the most succinct mathematical computation. Thus, the more efficient a set of modules are, the more closely they approximate the idea or process embodied in that particular aspect of the program's structure.

While, hypothetically, there might be a myriad of ways in which a programmer may effectuate certain functions within a program,--i.e., express the idea embodied in a given subroutine--efficiency concerns may so narrow the practical range of choice as to make only one or two forms of expression workable options. See 3 Nimmer § 13.03[F], at 13-63; see also Whelan, 797 F.2d at 1243 n. 43 ("It is true that for certain tasks there are only a very limited number of file structures available, and in such cases the structures might not be copyrightable...."). Of course, not all program structure is informed by efficiency concerns. See Menell, at 1052 (besides efficiency, simplicity related to user accommodation has become a programming priority). It follows that in order to determine whether the merger doctrine precludes copyright protection to an aspect of a program's structure that is so oriented, a court must inquire "whether the use of this particular set of modules is necessary efficiently to implement that part of the program's process" being implemented. Englund, at 902. If the answer is yes, then the expression represented by the programmer's choice of a specific module or group of modules has merged with their underlying idea and is unprotected. Id. at 902-03.

Another justification for linking structural economy with the application of the merger doctrine stems from a program's essentially utilitarian nature and the competitive forces that exist in the software marketplace. See Kretschmer, at 842. Working in tandem, these factors give rise to a problem of proof which merger helps to eliminate.

Efficiency is an industry-wide goal. Since, as we have already noted, there may be only a limited number of efficient implementations for any given program task, it is quite possible that multiple programmers, working independently, will design the identical method employed in the allegedly infringed work. Of course, if this is the case, there is no copyright infringement. See Roth Greeting Cards v. United Card Co., 429 F.2d 1106, 1110 (9th Cir.1970); Sheldon, 81 F.2d at 54.

Under these circumstances, the fact that two programs contain the same efficient structure may as likely lead to an inference of independent creation as it does to one of copying. See 3 Nimmer § 13.03[F], at 13-65; cf. Herbert Rosenthal [709] Jewelry Corp., 446 F.2d at 741 (evidence of independent creation may stem from defendant's standing as a designer of previous similar works). Thus, since evidence of similarly efficient structure is not particularly probative of copying, it should be disregarded in the overall substantial similarity analysis. See 3 Nimmer § 13.03[F], at 13-65.

We find support for applying the merger doctrine in cases that have already addressed the question of substantial similarity in the context of computer program structure. Most recently, in Lotus Dev. Corp., 740 F.Supp. at 66, the district court had before it a claim of copyright infringement relating to the structure of a computer spreadsheet program. The court observed that "the basic spreadsheet screen display that resembles a rotated 'L' ..., if not present in every expression of such a program, is present in most expressions." Id. Similarly, the court found that "an essential detail present in most if not all expressions of an electronic spreadsheet--is the designation of a particular key that, when pressed, will invoke the menu command system." Id. Applying the merger doctrine, the court denied copyright protection to both program elements.

In Manufacturers Technologies, Inc. v. Cams, Inc., 706 F.Supp. 984, 995-99 (D.Conn.1989), the infringement claims stemmed from various alleged program similarities "as indicated in their screen displays." Id. at 990. Stressing efficiency concerns in the context of a merger analysis, the court determined that the program's method of allowing the user to navigate within the screen displays was not protectable because, in part, "the process or manner of navigating internally on any specific screen displays ... is limited in the number of ways it may be simply achieved to facilitate user comfort." Id. at 995.

The court also found that expression contained in various screen displays (in the form of alphabetical and numerical columns) was not the proper subject of copyright protection because it was "necessarily incident to the idea[s]" embodied in the displays. Id. at 996-97. Cf. Digital Communications, 659 F.Supp. at 460 (finding no merger and affording copyright protection to program's status screen display because "modes of expression chosen ... are clearly not necessary to the idea of the status screen").

We agree with the approach taken in these decisions, and conclude that application of the merger doctrine in this setting is an effective way to eliminate non-protectable expression contained in computer programs.

(b) Elements Dictated By External Factors

We have stated that where "it is virtually impossible to write about a particular historical era or fictional theme without employing certain 'stock' or standard literary devices," such expression is not copyrightable. Hoehling v. Universal City Studios, Inc., 618 F.2d 972, 979 (2d Cir.), cert. denied, 449 U.S. 841, 101 S.Ct. 121, 66 L.Ed.2d 49 (1980). For example, the Hoehling case was an infringement suit stemming from several works on the Hindenberg disaster. There we concluded that similarities in representations of German beer halls, scenes depicting German greetings such as "Heil Hitler," or the singing of certain German songs would not lead to a finding of infringement because they were " 'indispensable, or at least standard, in the treatment of' " life in Nazi Germany. Id. (quoting Alexander v. Haley, 460 F.Supp. 40, 45 (S.D.N.Y.1978)). This is known as the scenes a faire doctrine, and like "merger," it has its analogous application to computer programs. Cf. Data East USA, 862 F.2d at 208 (applying scenes a faire to a home computer video game).

Professor Nimmer points out that "in many instances it is virtually impossible to write a program to perform particular functions in a specific computing environment without employing standard techniques." 3 Nimmer § 13.03[F], at 13-65. This is a result of the fact that a programmer's freedom of design choice is often circumscribed by extrinsic considerations such as (1) the mechanical specifications of the computer on which a particular program [710] is intended to run; (2) compatibility requirements of other programs with which a program is designed to operate in conjunction; (3) computer manufacturers' design standards; (4) demands of the industry being serviced; and (5) widely accepted programming practices within the computer industry. Id. at 13-66-71.

Courts have already considered some of these factors in denying copyright protection to various elements of computer programs. In the Plains Cotton case, the Fifth Circuit refused to reverse the district court's denial of a preliminary injunction against an alleged program infringer because, in part, "many of the similarities between the ... programs [were] dictated by the externalities of the cotton market." 807 F.2d at 1262.

In Manufacturers Technologies, the district court noted that the program's method of screen navigation "is influenced by the type of hardware that the software is designed to be used on." 706 F.Supp. at 995. Because, in part, "the functioning of the hardware package impact[ed] and constrain[ed] the type of navigational tools used in plaintiff's screen displays," the court denied copyright protection to that aspect of the program. Id.; cf. Data East USA, 862 F.2d at 209 (reversing a district court's finding of audiovisual work infringement because, inter alia, "the use of the Commodore computer for a karate game intended for home consumption is subject to various constraints inherent in the use of that computer").

Finally, the district court in Q-Co Industries rested its holding on what, perhaps, most closely approximates a traditional scenes a faire rationale. There, the court denied copyright protection to four program modules employed in a teleprompter program. This decision was ultimately based upon the court's finding that "the same modules would be an inherent part of any prompting program." 625 F.Supp. at 616.

Building upon this existing case law, we conclude that a court must also examine the structural content of an allegedly infringed program for elements that might have been dictated by external factors.

(c) Elements taken From the Public Domain

Closely related to the non-protectability of scenes a faire, is material found in the public domain. Such material is free for the taking and cannot be appropriated by a single author even though it is included in a copyrighted work. See E.F. Johnson Co. v. Uniden Corp. of America, 623 F.Supp. 1485, 1499 (D.Minn.1985); see also Sheldon, 81 F.2d at 54. We see no reason to make an exception to this rule for elements of a computer program that have entered the public domain by virtue of freely accessible program exchanges and the like. See 3 Nimmer § 13.03[F]; see also Brown Bag Software, 960 F.2d at 1473 (affirming the district court's finding that " '[p]laintiffs may not claim copyright protection of an ... expression that is, if not standard, then commonplace in the computer software industry.' "). Thus, a court must also filter out this material from the allegedly infringed program before it makes the final inquiry in its substantial similarity analysis.

Step Three: Comparison

The third and final step of the test for substantial similarity that we believe appropriate for non-literal program components entails a comparison. Once a court has sifted out all elements of the allegedly infringed program which are "ideas" or are dictated by efficiency or external factors, or taken from the public domain, there may remain a core of protectable expression. In terms of a work's copyright value, this is the golden nugget. See Brown Bag Software, 960 F.2d at 1475. At this point, the court's substantial similarity inquiry focuses on whether the defendant copied any aspect of this protected expression, as well as an assessment of the copied portion's relative importance with respect to the plaintiff's overall program. See 3 Nimmer § 13.03[F]; Data East USA, 862 F.2d at 208 ("To determine whether similarities result from unprotectable expression, analytic dissection of similarities may be [711] performed. If ... all similarities in expression arise from use of common ideas, then no substantial similarity can be found.").

3) Policy Considerations

We are satisfied that the three step approach we have just outlined not only comports with, but advances the constitutional policies underlying the Copyright Act. Since any method that tries to distinguish idea from expression ultimately impacts on the scope of copyright protection afforded to a particular type of work, "the line [it draws] must be a pragmatic one, which also keeps in consideration 'the preservation of the balance between competition and protection....' " Apple Computer, 714 F.2d at 1253 (citation omitted).

CA and some amici argue against the type of approach that we have set forth on the grounds that it will be a disincentive for future computer program research and development. At bottom, they claim that if programmers are not guaranteed broad copyright protection for their work, they will not invest the extensive time, energy and funds required to design and improve program structures. While they have a point, their argument cannot carry the day. The interest of the copyright law is not in simply conferring a monopoly on industrious persons, but in advancing the public welfare through rewarding artistic creativity, in a manner that permits the free use and development of non-protectable ideas and processes.

In this respect, our conclusion is informed by Justice Stewart's concise discussion of the principles that correctly govern the adaptation of the copyright law to new circumstances. In Twentieth Century Music Corp. v. Aiken, he wrote:

The limited scope of the copyright holder's statutory monopoly, like the limited copyright duration required by the Constitution, reflects a balance of competing claims upon the public interest: Creative work is to be encouraged and rewarded, but private motivation must ultimately serve the cause of promoting broad public availability of literature, music, and the other arts.

The immediate effect of our copyright law is to secure a fair return for an "author's" creative labor. But the ultimate aim is, by this incentive, to stimulate artistic creativity for the general public good.... When technological change has rendered its literal terms ambiguous, the Copyright Act must be construed in light of this basic purpose.

422 U.S. 151, 156, 95 S.Ct. 2040, 2043-44, 45 L.Ed.2d 84 (1975) (citations and footnotes omitted).

Recently, the Supreme Court has emphatically reiterated that "[t]he primary objective of copyright is not to reward the labor of authors...." Feist Publications, Inc. v. Rural Tel. Serv. Co., --- U.S. ----, ----, 111 S.Ct. 1282, 1290, 113 L.Ed.2d 358 (1991) (emphasis added). While the Feist decision deals primarily with the copyrightability of purely factual compilations, its underlying tenets apply to much of the work involved in computer programming. Feist put to rest the "sweat of the brow" doctrine in copyright law. Id. at ----, 111 S.Ct. at 1295. The rationale of that doctrine "was that copyright was a reward for the hard work that went into compiling facts." Id. at ----, 111 S.Ct. at 1291. The Court flatly rejected this justification for extending copyright protection, noting that it "eschewed the most fundamental axiom of copyright law--that no one may copyright facts or ideas." Id.

Feist teaches that substantial effort alone cannot confer copyright status on an otherwise uncopyrightable work. As we have discussed, despite the fact that significant labor and expense often goes into computer program flow-charting and debugging, that process does not always result in inherently protectable expression. Thus, Feist implicitly undercuts the Whelan rationale, "which allow[ed] copyright protection beyond the literal computer code ... [in order to] provide the proper incentive for programmers by protecting their most valuable efforts...." Whelan, 797 F.2d at 1237 (footnote omitted). We note that Whelan was decided prior to Feist when the "sweat of the brow" doctrine still had vitality. In view of the Supreme [712] Court's recent holding, however, we must reject the legal basis of CA's disincentive argument.

Furthermore, we are unpersuaded that the test we approve today will lead to the dire consequences for the computer program industry that plaintiff and some amici predict. To the contrary, serious students of the industry have been highly critical of the sweeping scope of copyright protection engendered by the Whelan rule, in that it "enables first comers to 'lock up' basic programming techniques as implemented in programs to perform particular tasks." Menell, at 1087; see also Spivack, at 765 (Whelan "results in an inhibition of creation by virtue of the copyright owner's quasi-monopoly power").

To be frank, the exact contours of copyright protection for non-literal program structure are not completely clear. We trust that as future cases are decided, those limits will become better defined. Indeed, it may well be that the Copyright Act serves as a relatively weak barrier against public access to the theoretical interstices behind a program's source and object codes. This results from the hybrid nature of a computer program, which, while it is literary expression, is also a highly functional, utilitarian component in the larger process of computing.

Generally, we think that copyright registration--with its indiscriminating availability--is not ideally suited to deal with the highly dynamic technology of computer science. Thus far, many of the decisions in this area reflect the courts' attempt to fit the proverbial square peg in a round hole. The district court, see Computer Assocs., 775 F.Supp. at 560, and at least one commentator have suggested that patent registration, with its exacting up-front novelty and non-obviousness requirements, might be the more appropriate rubric of protection for intellectual property of this kind. See Randell M. Whitmeyer, Comment, A Plea for Due Processes: Defining the Proper Scope of Patent Protection for Computer Software, 85 Nw.U.L.REV. 1103, 1123-25 (1991); see also Lotus Dev. Corp. v. Borland Int'l, Inc., 788 F.Supp. 78, 91 (D.Mass.1992) (discussing the potentially supplemental relationship between patent and copyright protection in the context of computer programs). In any event, now that more than 12 years have passed since CONTU issued its final report, the resolution of this specific issue could benefit from further legislative investigation--perhaps a CONTU II.

In the meantime, Congress has made clear that computer programs are literary works entitled to copyright protection. Of course, we shall abide by these instructions, but in so doing we must not impair the overall integrity of copyright law. While incentive based arguments in favor of broad copyright protection are perhaps attractive from a pure policy perspective, see Lotus Dev. Corp., 740 F.Supp. at 58, ultimately, they have a corrosive effect on certain fundamental tenets of copyright doctrine. If the test we have outlined results in narrowing the scope of protection, as we expect it will, that result flows from applying, in accordance with Congressional intent, long-standing principles of copyright law to computer programs. Of course, our decision is also informed by our concern that these fundamental principles remain undistorted.

B. The District Court Decision

We turn now to our review of the district court's decision in this particular case. At the outset, we must address CA's claim that the district court erred by relying too heavily on the court appointed expert's "personal opinions on the factual and legal issues before the court."

1) Use of Expert Evidence in Determining Substantial Similarity Between Computer Programs

Pursuant to Fed.R.Evid. 706, and with the consent of both Altai and CA, Judge Pratt appointed and relied upon Dr. Randall Davis of the Massachusetts Institute of Technology as the court's own expert witness on the issue of substantial similarity. Dr. Davis submitted a comprehensive written report that analyzed the various aspects of the computer programs [713] at issue and evaluated the parties' expert evidence. At trial, Dr. Davis was extensively cross-examined by both CA and Altai.

The well-established general rule in this circuit has been to limit the use of expert opinion in determining whether works at issue are substantially similar. As a threshold matter, expert testimony may be used to assist the fact finder in ascertaining whether the defendant had copied any part of the plaintiff's work. See Arnstein v. Porter, 154 F.2d 464, 468 (2d Cir.1946). To this end, "the two works are to be compared in their entirety ... [and] in making such comparison resort may properly be made to expert analysis...." 3 Nimmer § 13.03[E], at 13-62.16.

However, once some amount of copying has been established, it remains solely for the trier of fact to determine whether the copying was "illicit," that is to say, whether the "defendant took from plaintiff's works so much of what is pleasing to [lay observers] who comprise the audience for whom such [works are] composed, that defendant wrongfully appropriated something which belongs to the plaintiff." Arnstein, 154 F.2d at 473. Since the test for illicit copying is based upon the response of ordinary lay observers, expert testimony is thus "irrelevant" and not permitted. Id. at 468, 473. We have subsequently described this method of inquiry as "merely an alternative way of formulating the issue of substantial similarity." Ideal Toy Corp. v. Fab-Lu Ltd. (Inc.), 360 F.2d 1021, 1023 n. 2 (2d Cir.1966).

Historically, Arnstein 's ordinary observer standard had its roots in "an attempt to apply the 'reasonable person' doctrine as found in other areas of the law to copyright." 3 Nimmer § 13.03[E], at 13-62.10-11. That approach may well have served its purpose when the material under scrutiny was limited to art forms readily comprehensible and generally familiar to the average lay person. However, in considering the extension of the rule to the present case, we are reminded of Holmes' admonition that, "[t]he life of the law has not been logic: it has been experience." O.W. Holmes, Jr., THE COMMON LAW 1 (1881).

Thus, in deciding the limits to which expert opinion may be employed in ascertaining the substantial similarity of computer programs, we cannot disregard the highly complicated and technical subject matter at the heart of these claims. Rather, we recognize the reality that computer programs are likely to be somewhat impenetrable by lay observers--whether they be judges or juries--and, thus, seem to fall outside the category of works contemplated by those who engineered the Arnstein test. Cf. Dawson v. Hinshaw Music Inc., 905 F.2d 731, 737 (4th Cir.) ("departure from the lay characterization is warranted only where the intended audience possesses 'specialized expertise' "), cert. denied, 498 U.S. 981, 111 S.Ct. 511, 112 L.Ed.2d 523 (1990). As Judge Pratt correctly observed:

In the context of computer programs, many of the familiar tests of similarity prove to be inadequate, for they were developed historically in the context of artistic and literary, rather than utilitarian, works.

Computer Assocs., 775 F.Supp. at 558.

In making its finding on substantial similarity with respect to computer programs, we believe that the trier of fact need not be limited by the strictures of its own lay perspective. See Dawson, 905 F.2d at 735; Whelan, 797 F.2d at 1233; Broderbund, 648 F.Supp. at 1136 (stating in dictum: "an integrated test involving expert testimony and analytic dissection may well be the wave of the future in this area...."); Brown Bag Software, 960 F.2d at 1478-79 (Sneed, J., concurring); see also 3 Nimmer § 13.03[E]; but see Brown Bag Software, 960 F.2d at 1475 (applying the "ordinary reasonable person" standard in substantial similarity test for computer programs). Rather, we leave it to the discretion of the district court to decide to what extent, if any, expert opinion, regarding the highly technical nature of computer programs, is warranted in a given case.

In so holding, we do not intend to disturb the traditional role of lay observers in judging [714] substantial similarity in copyright cases that involve the aesthetic arts, such as music, visual works or literature.

In this case, Dr. Davis' opinion was instrumental in dismantling the intricacies of computer science so that the court could formulate and apply an appropriate rule of law. While Dr. Davis' report and testimony undoubtedly shed valuable light on the subject matter of the litigation, Judge Pratt remained, in the final analysis, the trier of fact. The district court's use of the expert's assistance, in the context of this case, was entirely appropriate.

2) Evidentiary Analysis

The district court had to determine whether Altai's OSCAR 3.5 program was substantially similar to CA's ADAPTER. We note that Judge Pratt's method of analysis effectively served as a road map for our own, with one exception--Judge Pratt filtered out the non-copyrightable aspects of OSCAR 3.5 rather than those found in ADAPTER, the allegedly infringed program. We think that our approach--i.e., filtering out the unprotected aspects of an allegedly infringed program and then comparing the end product to the structure of the suspect program--is preferable, and therefore believe that district courts should proceed in this manner in future cases.

We opt for this strategy because, in some cases, the defendant's program structure might contain protectable expression and/or other elements that are not found in the plaintiff's program. Since it is extraneous to the allegedly copied work, this material would have no bearing on any potential substantial similarity between the two programs. Thus, its filtration would be wasteful and unnecessarily time consuming. Furthermore, by focusing the analysis on the infringing rather than on the infringed material, a court may mistakenly place too little emphasis on a quantitatively small misappropriation which is, in reality, a qualitatively vital aspect of the plaintiff's protectable expression.

The fact that the district court's analysis proceeded in the reverse order, however, had no material impact on the outcome of this case. Since Judge Pratt determined that OSCAR effectively contained no protectable expression whatsoever, the most serious charge that can be levelled against him is that he was overly thorough in his examination.

The district court took the first step in the analysis set forth in this opinion when it separated the program by levels of abstraction. The district court stated:

As applied to computer software programs, this abstractions test would progress in order of "increasing generality" from object code, to source code, to parameter lists, to services required, to general outline. In discussing the particular similarities, therefore, we shall focus on these levels.

Computer Assocs., 775 F.Supp. at 560. While the facts of a different case might require that a district court draw a more particularized blueprint of a program's overall structure, this description is a workable one for the case at hand.

Moving to the district court's evaluation of OSCAR 3.5's structural components, we agree with Judge Pratt's systematic exclusion of non-protectable expression. With respect to code, the district court observed that after the rewrite of OSCAR 3.4 to OSCAR 3.5, "there remained virtually no lines of code that were identical to ADAPTER." Id. at 561. Accordingly, the court found that the code "present[ed] no similarity at all." Id. at 562.

Next, Judge Pratt addressed the issue of similarity between the two programs' parameter lists and macros. He concluded that, viewing the conflicting evidence most favorably to CA, it demonstrated that "only a few of the lists and macros were similar to protected elements in ADAPTER; the others were either in the public domain or dictated by the functional demands of the program." Id. As discussed above, functional elements and elements taken from the public domain do not qualify for copyright protection. With respect to the few remaining parameter lists and macros, the district court could reasonably conclude that they did not warrant a [715] finding of infringement given their relative contribution to the overall program. See Warner Bros., Inc. v. American Broadcasting Cos., Inc., 720 F.2d 231, 242 (2d Cir.1983) (discussing de minimis exception which allows for literal copying of a small and usually insignificant portion of the plaintiff's work); 3 Nimmer § 13.03[F], at 13-74. In any event, the district court reasonably found that, for lack of persuasive evidence, CA failed to meet its burden of proof on whether the macros and parameter lists at issue were substantially similar. See Computer Assocs., 775 F.Supp. at 562.

The district court also found that the overlap exhibited between the list of services required for both ADAPTER and OSCAR 3.5 was "determined by the demands of the operating system and of the applications program to which it [was] to be linked through ADAPTER or OSCAR...." Id. In other words, this aspect of the program's structure was dictated by the nature of other programs with which it was designed to interact and, thus, is not protected by copyright.

Finally, in his infringement analysis, Judge Pratt accorded no weight to the similarities between the two programs' organizational charts, "because [the charts were] so simple and obvious to anyone exposed to the operation of the program[s]." Id. CA argues that the district court's action in this regard "is not consistent with copyright law"--that "obvious" expression is protected, and that the district court erroneously failed to realize this. However, to say that elements of a work are "obvious," in the manner in which the district court used the word, is to say that they "follow naturally from the work's theme rather than from the author's creativity." 3 Nimmer § 13.03[F], at 13-65. This is but one formulation of the scenes a faire doctrine, which we have already endorsed as a means of weeding out unprotectable expression.

CA argues, at some length, that many of the district court's factual conclusions regarding the creative nature of its program's components are simply wrong. Of course, we are limited in our review of factual findings to setting aside only those that we determine are clearly erroneous. See Fed.R.Civ.P. 52. Upon a thorough review of the voluminous record in this case, which is comprised of conflicting testimony and other highly technical evidence, we discern no error on the part of Judge Pratt, let alone clear error.

Since we accept Judge Pratt's factual conclusions and the results of his legal analysis, we affirm his denial of CA's copyright infringement claim based upon OSCAR 3.5. We emphasize that, like all copyright infringement cases, those that involve computer programs are highly fact specific. The amount of protection due structural elements, in any given case, will vary according to the protectable expression found to exist within the program at issue.

II. TRADE SECRET PREEMPTION

In its complaint, CA alleged that Altai misappropriated the trade secrets contained in the ADAPTER program. Prior to trial, while the proceedings were still before Judge Mishler, Altai moved to dismiss and for summary judgment on CA's trade secret misappropriation claim. Altai argued that section 301 of the Copyright Act preempted CA's state law cause of action. Judge Mishler denied Altai's motion, reasoning that " '[t]he elements of the tort of appropriation of trade secrets through the breach of contract or confidence by an employee are not the same as the elements of a claim of copyright infringement.' " Computer Assocs., 775 F.Supp. at 563.

The parties addressed the preemption issue again, both in pre- and post-trial briefs. Judge Pratt then reconsidered and reversed Judge Mishler's earlier ruling. The district court concluded that CA's trade secret claims were preempted because "CA--which is the master of its own case--has pleaded and proven facts which establish that one act constituted both copyright infringement and misappropriation of trade secrets [namely, the] copying [716] of ADAPTER into OSCAR 3.4...." Id. at 565.

In our original opinion, Computer Assocs. Int'l, Inc. v. Altai, Inc., Nos. 91-7893, 91-7935, slip op. 4715, 4762-69, 1992 WL 139364 (2d Cir. June 22, 1992), we affirmed Judge Pratt's decision. CA petitioned for rehearing on this issue. In its petition for rehearing, CA brought to our attention portions of the record below that were not included in the appendix on appeal. CA argued that these documents, along with Judge Mishler's disposition of Altai's motion to dismiss and for summary judgment, established that CA advanced non-preempted trade secret misappropriation claims before both Judge Mishler and Judge Pratt. CA further contended that Judge Pratt failed to consider its theory that Altai was liable for wrongful acquisition of CA's trade secrets through Arney. Upon reconsideration, we have granted the petition for rehearing, withdrawn our initial opinion, and conclude in this amended opinion that the district court's preemption ruling on CA's trade secret claims should be vacated. We accordingly vacate the judgment of the district court on this point and remand CA's trade secret claims for a determination on the merits.

A. General Law of Copyright Preemption Regarding Trade Secrets and Computer Programs

Congress carefully designed the statutory framework of federal copyright preemption. In order to insure that the enforcement of these rights remains solely within the federal domain, section 301(a) of the Copyright Act expressly preempts

all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103....

17 U.S.C. § 301(a). This sweeping displacement of state law is, however, limited by section 301(b), which provides, in relevant part, that

[n]othing in this title annuls or limits any rights or remedies under the common law or statutes of any State with respect to ... activities violating legal or equitable rights that are not equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106....

17 U.S.C. § 301(b)(3). Section 106, in turn, affords a copyright owner the exclusive right to: (1) reproduce the copyrighted work; (2) prepare derivative works; (3) distribute copies of the work by sale or otherwise; and, with respect to certain artistic works, (4) perform the work publicly; and (5) display the work publicly. See 17 U.S.C. § 106(1)-(5).

Section 301 thus preempts only those state law rights that "may be abridged by an act which, in and of itself, would infringe one of the exclusive rights" provided by federal copyright law. See Harper & Row, Publishers, Inc. v. Nation Enters., 723 F.2d 195, 200 (2d Cir.1983), rev'd on other grounds, 471 U.S. 539, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). But if an "extra element" is "required instead of or in addition to the acts of reproduction, performance, distribution or display, in order to constitute a state-created cause of action, then the right does not lie 'within the general scope of copyright,' and there is no preemption." 1 Nimmer § 1.01[B], at 1-14-15; see also Harper & Row, Publishers, Inc., 723 F.2d at 200 (where state law right "is predicated upon an act incorporating elements beyond mere reproduction or the like, the [federal and state] rights are not equivalent" and there is no preemption).

A state law claim is not preempted if the "extra element" changes the "nature of the action so that it is qualitatively different from a copyright infringement claim." Mayer v. Josiah Wedgwood & Sons, Ltd., 601 F.Supp. 1523, 1535 (S.D.N.Y.1985); see Harper & Row, Publishers, Inc., 723 F.2d at 201. To determine whether a claim meets this standard, we must determine "what plaintiff seeks to protect, the theories in which the matter is thought to be protected and the rights sought to be enforced." 1 Roger M. Milgrim, Milgrim on Trade Secrets [717] § 2.06A, at 2-150 (1992) (hereinafter "Milgrim"). An action will not be saved from preemption by elements such as awareness or intent, which alter "the action's scope but not its nature...." Mayer, 601 F.Supp. at 1535.

Following this "extra element" test, we have held that unfair competition and misappropriation claims grounded solely in the copying of a plaintiff's protected expression are preempted by section 301. See, e.g., Walker v. Time Life Films, Inc., 784 F.2d 44, 53 (2d Cir.), cert. denied, 476 U.S. 1159, 106 S.Ct. 2278, 90 L.Ed.2d 721 (1986); Warner Bros., Inc. v. American Broadcasting Cos., 720 F.2d 231, 247 (2d Cir.1983); Durham Indus., Inc. v. Tomy Corp., 630 F.2d 905, 919 & n. 15 (2d Cir.1980). We also have held to be preempted a tortious interference with contract claim grounded in the impairment of a plaintiff's right under the Copyright Act to publish derivative works. See Harper & Row, Publishers, Inc., 723 F.2d at 201.

However, many state law rights that can arise in connection with instances of copyright infringement satisfy the extra element test, and thus are not preempted by section 301. These include unfair competition claims based upon breaches of confidential relationships, breaches of fiduciary duties and trade secrets. Balboa Ins. Co. v. Trans Global Equities, 218 Cal.App.3d 1327, 1339-53, 267 Cal.Rptr. 787, 793-803 (Ct.App. 3rd Dist.), cert. denied, --- U.S. ----, 111 S.Ct. 347, 112 L.Ed.2d 311 (1990).

Trade secret protection, the branch of unfair competition law at issue in this case, remains a "uniquely valuable" weapon in the defensive arsenal of computer programmers. See 1 Milgrim § 2.06A[c], at 2-172.4. Precisely because trade secret doctrine protects the discovery of ideas, processes, and systems which are explicitly precluded from coverage under copyright law, courts and commentators alike consider it a necessary and integral part of the intellectual property protection extended to computer programs. See id.; see also Integrated Cash Management Servs., Inc. v. Digital Transactions, Inc., 920 F.2d 171, 173 (2d Cir.1990) (while plaintiff withdrew copyright infringement claim for misappropriation of computer program, relief for theft of trade secret sustained); Healthcare Affiliated Servs., Inc. v. Lippany, 701 F.Supp. 1142, 1152-55 (W.D.Pa.1988) (finding likelihood of success on trade secret claim, but not copyright claim); Q-Co Indus., Inc., 625 F.Supp. at 616-18 (finding likelihood of success on trade secret claim, but no merit to copyright claim); Kretschmer, at 847-49.

The legislative history of section 301 states that "[t]he evolving common law rights of ... trade secrets ... would remain unaffected as long as the causes of action contain elements, such as ... a breach of trust or confidentiality, that are different in kind from copyright infringement." House Report, at 5748. Congress did not consider the term "misappropriation" to be "necessarily synonymous with copyright infringement," or to serve as the talisman of preemption. Id.

Trade secret claims often are grounded upon a defendant's breach of a duty of trust or confidence to the plaintiff through improper disclosure of confidential material. See, e.g., Mercer v. C.A. Roberts Co., 570 F.2d 1232, 1238 (5th Cir.1978); Brignoli v. Balch Hardy and Scheinman, Inc., 645 F.Supp. 1201, 1205 (S.D.N.Y.1986). The defendant's breach of duty is the gravamen of such trade secret claims, and supplies the "extra element" that qualitatively distinguishes such trade secret causes of action from claims for copyright infringement that are based solely upon copying. See, e.g., Warrington Assoc., Inc. v. Real-Time Eng'g Sys., Inc., 522 F.Supp. 367, 369 (N.D.Ill.1981); Brignoli, 645 F.Supp. at 1205; see also generally Balboa Ins. Co., 218 Cal.App.3d at 1346-50, 267 Cal.Rptr. at 798-802 (reviewing cases).

B. Preemption in this Case

The district court stated that:

Were CA's [trade secret] allegations premised on a theory of illegal acquisition of a trade secret, a charge that might have been alleged against Arney, who is not a defendant in this case, the [718] preemption analysis might be different, for there seems to be no corresponding right guaranteed to copyright owners by § 106 of the copyright act.

Computer Assocs., 775 F.Supp. at 565.

However, the court concluded that CA's trade secret claims were not grounded in a theory that Altai violated a duty of confidentiality to CA. Rather, Judge Pratt stated that CA proceeded against Altai solely "on a theory that the misappropriation took place by Altai's use of ADAPTER--the same theory as the copyright infringement count." Id. The district court reasoned that "the right to be free from trade secret misappropriation through 'use', and the right to exclusive reproduction and distribution of a copyrighted work are not distinguishable." Id. Because he concluded that there was no qualitative difference between the elements of CA's state law trade secret claims and a claim for federal copyright infringement, Judge Pratt ruled that CA's trade secret claims were preempted by section 301.

We agree with CA that the district court failed to address fully the factual and theoretical bases of CA's trade secret claims. The district court relied upon the fact that Arney--not Altai--allegedly breached a duty to CA of confidentiality by stealing secrets from CA and incorporating those secrets into OSCAR 3.4. However, under a wrongful acquisition theory based on Restatement (First) of Torts § 757 (1939), Williams and Altai may be liable for violating CA's right of confidentiality. Section 757 states in relevant part:

One who discloses or uses another's trade secret, without a privilege to do so, is liable to another if.... (c) he learned the secret from a third person with notice of the fact that it was a secret and that the third person discovered it by improper means or that the third person's disclosure of it was otherwise a breach of his duty to the other....

Actual notice is not required for such a third party acquisition claim; constructive notice is sufficient. A defendant is on constructive notice when, "from the information which he has, a reasonable man would infer [a breach of confidence], or if, under the circumstances, a reasonable man would be put on inquiry and an inquiry pursued with reasonable intelligence and diligence would disclose the [breach]." Id., comment 1; Metallurgical Indus., Inc. v. Fourtek, Inc., 790 F.2d 1195, 1204 (5th Cir.1986); Vantage Point, Inc. v. Parker Bros., Inc., 529 F.Supp. 1204, 1210 n. 2 (E.D.N.Y.1981), aff'd, 697 F.2d 301 (2d Cir.1982); see also Rohm and Haas Co. v. Adco Chem. Co., 689 F.2d 424, 431 (3rd Cir.1982) ("Defendants never asked where the 'Harvey process' had come from. Defendants therefore were charged 'with whatever knowledge such inquiry would have led to.' ") (citation omitted); Colgate-Palmolive Co. v. Carter Prods., Inc., 230 F.2d 855, 864 (4th Cir.) (per curiam) (defendant " 'must have known by the exercise of fair business principles' " that its employee's work was covered by an agreement not to disclose) (citation omitted), cert. denied, 352 U.S. 843, 77 S.Ct. 43, 1 L.Ed.2d 59 (1956); 1 Milgrim § 5.04[c].

We agree with the district court that New Jersey's governing governmental interest choice of law analysis directs the application of Texas law to CA's trade secret misappropriation claim. See Computer Assocs., 775 F.Supp. at 566. Texas law recognizes trade secret misappropriation claims grounded in the reasoning of Restatement section 757(c), see, e.g., Fourtek, 790 F.2d at 1204, and the facts alleged by CA may well support such a claim.

It is undisputed that, when Arney stole the ADAPTER code and incorporated it into his design of OSCAR 3.4, he breached his confidentiality agreement with CA. The district court noted that while such action might constitute a valid claim against Arney, CA is the named defendant in this lawsuit. Additionally, the district court found, as a matter of fact, that "[n]o one at Altai, other than Arney, knew that Arney had the ADAPTER code...." Computer Assocs., 775 F.Supp. at 554. However, the district court did not consider fully Altai's potential liability for improper trade secret acquisition. It did not consider the question of Altai's trade secret liability [719] in connection with OSCAR 3.4 under a constructive notice theory, or Altai's potential liability under an actual notice theory in connection with OSCAR 3.5.

The district court found that, prior to CA's bringing suit, Altai was not on actual notice of Arney's theft of trade secrets, and incorporation of those secrets into OSCAR 3.4. However, by virtue of Williams' close relationship with Arney, Williams' general familiarity with CA's programs (having once been employed by CA himself), and the fact that Arney used the ADAPTER program in an office at Altai adjacent to Williams during a period in which he had frequent contact with Williams regarding the OSCAR/VSE project, Williams (and through him Altai) may well have been on constructive notice of Arney's breach of his duty of confidentiality toward CA. The district court did not address whether Altai was on constructive notice, thereby placing it under a duty of inquiry; rather the court's finding that only Arney affirmatively knew of the theft of CA's trade secrets and incorporation of those secrets into OSCAR 3.4 simply disposed of the issue of actual notice in connection with the creation of OSCAR 3.4. CA's claim of liability based on constructive notice, never considered in the district court's opinion, must be determined on remand.

With respect to actual notice, it is undisputed that CA's first complaint, filed in August 1988, informed Altai of Arney's trade secret violations in connection with the creation of OSCAR 3.4. The first complaint alleged that Arney assisted in the development of ADAPTER, thereby obtaining knowledge of CA's related trade secrets. It also alleged that Altai misappropriated CA's trade secrets by incorporating them into ZEKE.

In response to CA's complaint, Altai rewrote OSCAR 3.4, creating OSCAR 3.5. While we agree with the district court that OSCAR 3.5 did not contain any expression protected by copyright, it may nevertheless still have embodied many of CA's trade secrets that Arney brought with him to Altai. Since Altai's rewrite was conducted with full knowledge of Arney's prior misappropriation, in breach of his duty of confidentiality, it follows that OSCAR 3.5 was created with actual knowledge of trade secret violations. Thus, with regard to OSCAR 3.5, CA has a viable trade secret claim against Altai that must be considered by the district court on remand. This claim is grounded in Altai's alleged use of CA's trade secrets in the creation of OSCAR 3.5, while on actual notice of Arney's theft of trade secrets and incorporation of those secrets into OSCAR 3.4. The district court correctly stated that a state law claim based solely upon Altai's "use", by copying, of ADAPTER's non-literal elements could not satisfy the governing "extra element" test, and would be preempted by section 301. However, where the use of copyrighted expression is simultaneously the violation of a duty of confidentiality established by state law, that extra element renders the state right qualitatively distinct from the federal right, thereby foreclosing preemption under section 301.

We are also convinced that CA adequately pled a wrongful acquisition claim before Judge Mishler and Judge Pratt. In ruling that CA failed to properly plead a non-preempted claim, Judge Pratt relied heavily upon two allegations in CA's amended complaint. Id. at 563-64. They read as follows:

p 57. By reason of the facts stated in paragraph 39 and by copying from CA-SCHEDULER into ZEKE, ZACK and ZEBB the various elements stated in paragraphs 39-51, 54 and 55, defendant Altai has infringed [CA's] copyright in CA-SCHEDULER.

* * * * * *

p 73. Defendant's incorporation into its ZEKE, ZACK and ZEBB programs of the various elements contained in the ADAPTER component of [CA's] CA-SCHEDULER program as set out in paragraphs 39-51, 54 and 55 constitutes the willful misappropriation of the proprietary property and trade secrets of plaintiff [CA].

[720] From these pleadings, Judge Pratt concluded that the very same act, i.e., Altai's copying of various elements of CA's program, was the basis for both CA's copyright infringement and trade secret claims. See id. at 564. We agree with Judge Pratt that CA's allegations are somewhat inartfully stated. However, when taken together, the terms "incorporation" and "misappropriation" in paragraph 73 above suggest to us an act of a qualitatively different nature than the infringement pled in paragraph 57. House Report, at 5748 (" '[m]isappropriation' is not necessarily synonymous with copyright infringement").

In support of our reading, we note that paragraphs 65-75 of CA's amended complaint alleged facts that reasonably comprise the elements of a wrongful acquisition of trade secrets claim. CA averred that, while he was employed at CA, Arney learned CA's trade secrets regarding the ADAPTER program. CA further alleged that, after Arney went to work for Altai, Altai misappropriated those trade secrets by incorporating CA's ADAPTER program into its own product. Finally, CA claimed that the trade secret misappropriation was carried out "in a willful, wanton and reckless manner in disregard of [CA's] rights." In other words, Altai could have reasonably inferred from CA's allegations that CA's claim, in part, rested on Williams' "wanton and reckless" behavior in the face of constructive notice.

In addition, while responding to Altai's preemption argument in its motion to dismiss and for summary judgment, CA specifically argued in its brief to Judge Mishler that "it can easily be inferred that Mr. Arney was hired by Altai to misappropriate [CA's] confidential source code for Altai's benefit." At oral argument, CA further contended that:

The circumstances of Mr. Arney's hiring suggested that Mr. Williams wanted more than Mr. Arney's ability and in fact got exactly what he wanted. And that is Computer Associates' confidential Adapter technology.

* * * * * *

[Arney testified that he] surreptitiously took that code home from Computer Associates after giving notice he was going to go to work for Altai, and after being hired by Mr. Williams to come to Altai and reconstruct Zeke, to work on the MVS operating system.

In the aftermath of Judge Mishler's ruling in its favor on Altai's motion to dismiss and for summary judgment, CA reasonably believed that it had sufficiently alleged a non-preempted claim. And, in light of CA's arguments and Judge Mishler's ruling, Altai clearly was on notice that the amended complaint placed non-preempted trade secret claims in play. See 5 Charles A. Wright & Arthur R. Miller, Federal Practice and Procedure § 1215, at 136-38 (2d ed. 1990) (federal pleading standards require plaintiff to provide defendant with fair notice of claim and grounds it rests on).

Accordingly, we vacate the judgment of the district court and remand for reconsideration of those aspects of CA's trade secret claims related to Altai's alleged constructive notice of Arney's theft of CA's trade secrets and incorporation of those secrets into OSCAR 3.4. We note, however, that CA may be unable to recover damages for its trade secrets which are embodied in OSCAR 3.4 since Altai has conceded copyright liability and damages for its incorporation of ADAPTER into OSCAR 3.4. CA may not obtain a double recovery where the damages for copyright infringement and trade secret misappropriation are coextensive.

However, additional trade secret damages may well flow from CA's creation of OSCAR 3.5. Judge Pratt correctly acknowledged that "[i]f CA's claim of misappropriation of trade secrets did not fail on preemption grounds, it would be necessary to examine in some detail the conflicting claims and evidence relating to the process by which Altai rewrote OSCAR and ultimately produced version 3.5." Computer Assocs., 775 F.Supp. at 554-55; see also 1 Milgrim § 5.04[d], at 5-148 ("after notice, the [innocent] second user should cease the use, and if he does not he can be enjoined and held liable for damages arising from such use subsequent to notice"). Since we hold that CA's trade secret claims [721] are not preempted, and that, in writing OSCAR 3.5, Altai had actual notice of Arney's earlier trade secret violations, we vacate and remand for such further inquiry anticipated by the district court. If the district court finds that CA was injured by Altai's unlawful use of CA's trade secrets in creating OSCAR 3.5, CA is entitled to an award of damages for trade secret misappropriation, as well as consideration by the district court of CA's request for injunctive relief on its trade secret claim.

CONCLUSION

In adopting the above three step analysis for substantial similarity between the non-literal elements of computer programs, we seek to insure two things: (1) that programmers may receive appropriate copyright protection for innovative utilitarian works containing expression; and (2) that non-protectable technical expression remains in the public domain for others to use freely as building blocks in their own work. At first blush, it may seem counter-intuitive that someone who has benefitted to some degree from illicitly obtained material can emerge from an infringement suit relatively unscathed. However, so long as the appropriated material consists of non-protectable expression, "[t]his result is neither unfair nor unfortunate. It is the means by which copyright advances the progress of science and art." Feist, --- U.S. at ----, 111 S.Ct. at 1290.

Furthermore, we underscore that so long as trade secret law is employed in a manner that does not encroach upon the exclusive domain of the Copyright Act, it is an appropriate means by which to secure compensation for software espionage.

Accordingly, we affirm the judgment of the district court in part; vacate in part; and remand for further proceedings. The parties shall bear their own costs of appeal, including the petition for rehearing.

ALTIMARI, Circuit Judge, concurring in part and dissenting in part:

Because I believe that our original opinion, see Computer Assoc. Int'l v. Altai, Nos. 91-7893(L), 1992 WL 139364 (2d Cir. June 22, 1992), is a reasoned analysis of the issues presented, I adhere to the original determination and therefore concur in Part 1 and respectfully dissent from Part 2 of the amended opinion.

4.3 Database 4.3 Database

4.3.2 British Horseracing (SUMMARY) 4.3.2 British Horseracing (SUMMARY)

Case C-203/02

The British Horseracing Board Ltd and Others

v

William Hill Organization Ltd

(Reference for a preliminary ruling from the Court of Appeal (England and Wales) (Civil Division))

(Directive 96/9/EC – Legal protection of databases – Sui generis right – Obtaining, verification or presentation of the contents of a database – (In)substantial part of the contents of a database – Extraction and re-utilisation – Normal exploitation – Unreasonable prejudice to the legitimate interests of the maker – Horseracing database – Lists of races – Betting)

Summary of the Judgment

1.        Approximation of laws – Legal protection of databases – Directive 96/9 – Definition of investment in the obtaining, verification or presentation of the contents of a database – Resources used to draw up and verify lists of horses entered in horse races – Not included

(European Parliament and Council Directive 96/9, Art. 7(1))

2.        Approximation of laws – Legal protection of databases – Directive 96/9 – Definitions of extraction and re-utilisation of the contents of a database – Right of the maker of the database to prohibit such acts – Database made accessible to the public – No effect on that right

(European Parliament and Council Directive 96/9, Art. 7)

3.        Approximation of laws – Legal protection of databases – Directive 96/9 – Definition of substantial part of the contents of a database – Quantitative and qualitative assessment

(European Parliament and Council Directive 96/9, Art. 7)

4.        Approximation of laws – Legal protection of databases – Directive 96/9 – Prohibition on extraction and re-utilisation of insubstantial parts of the contents of a database – Scope

(European Parliament and Council Directive 96/9, Art. 7(5))

1.        The expression ‘investment in … the obtaining … of the contents’ of a database in Article 7(1) of Directive 96/9 on the legal protection of databases must be understood to refer to the resources used to seek out existing independent materials and collect them in the database. It does not cover the resources used for the creation of materials which make up the contents of a database.

The expression ‘investment in … the … verification … of the contents’ of a database in Article 7(1) of Directive 96/9 must be understood to refer to the resources used, with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation. The resources used for verification during the stage of creation of materials which are subsequently collected in a database do not fall within that definition.

In the context of drawing up lists of horse races, the resources used to draw up a list of horses entered in a race constitute investment not in the obtaining of the contents of the database but in the creation of the data making up the lists relating to those races. The resources used for the checks prior to the entering of a horse on a list for a race relate to the stage of creating the data making up that list and thus do not constitute an investment in the verification of the contents of a database.

(see paras 30-31, 34, 38, 40-42, operative part 1)

2.        The terms ‘extraction’ and ‘re-utilisation’ as defined in Article 7 of Directive 96/9 on the legal protection of databases must be interpreted as referring to any unauthorised act of appropriation and distribution to the public of the whole or a part of the contents of a database. Those terms do not imply direct access to the database concerned.

The fact that the contents of a database were made accessible to the public by its maker or with his consent does not affect the right of the maker to prevent acts of extraction and/or re-utilisation of the whole or a substantial part of those contents.

(see para. 67, operative part 2)

 

3.        The expression ‘substantial part, evaluated … quantitatively, of the contents of [a] database’ in Article 7 of Directive 96/9 on the legal protection of databases refers to the volume of data extracted from the database and/or re-utilised and must be assessed in relation to the total volume of the contents of the database. The expression ‘substantial part, evaluated qualitatively … of the contents of [a] database’ refers to the scale of the investment in the obtaining, verification or presentation of the contents of the subject of the act of extraction and/or re-utilisation, regardless of whether that subject represents a quantitatively substantial part of the general contents of the protected database.

Any part which does not fulfil the definition of a substantial part, evaluated both quantitatively and qualitatively, falls within the definition of an insubstantial part of the contents of a database.

(see paras 70-71, 73, operative part 3)

4.        Article 7(5) of Directive 96/9 on the legal protection of databases, which prohibits, in certain cases, the repeated and systematic extraction and/or re-utilisation of insubstantial parts of the contents of the database, refers in particular to unauthorised acts of extraction and/or re-utilisation the cumulative effect of which is to reconstitute and/or make available to the public, without the authorisation of the maker of the database, the whole or a substantial part of the contents of that database and thereby seriously prejudice the investment by the maker.

(see para. 95, operative part 4)

4.3.3 Football Dataco Ltd and others v. Yahoo! UK Ltd and others, Case C-604/10, March 1, 2012 (ECJ) 4.3.3 Football Dataco Ltd and others v. Yahoo! UK Ltd and others, Case C-604/10, March 1, 2012 (ECJ)

Case C-604/10

Football Dataco Ltd and Others

v

Yahoo! UK Ltd and Others

(Reference for a preliminary ruling from the Court of Appeal (England & Wales)(Civil Division))

(Directive 96/9/EC — Legal protection of databases — Copyright — Football league fixture lists)

Summary of the Judgment

1.        Approximation of laws — Legal protection of databases — Directive 96/9 — Copyright and sui generis right

(European Parliament and Council Directive 96/9, Arts 3(1) and 7(1))

2.        Approximation of laws — Legal protection of databases — Directive 96/9 — Protection by copyright — Conditions

(European Parliament and Council Directive 96/9, Art. 3(1))

3.        Approximation of laws — Legal protection of databases — Directive 96/9 — Protection by copyright

(European Parliament and Council Directive 96/9, Art. 3(1) and 14(2))

1.        It is apparent both from a comparison of the terms of Article 3(1) and Article 7(1) of Directive 96/9 on the legal protection of databases, and from other provisions or recitals of Directive 96/9, in particular Article 7(4) and recital 39 to that directive, that the copyright and the ‘sui generis’ right amount to two independent rights whose object and conditions of application are different. Consequently, the fact that a ‘database’ within the meaning of Article 1(2) of Directive 96/9 does not satisfy the conditions of eligibility for protection by the ‘sui generis’ right under Article 7 of Directive 96/9 does not automatically mean that that database is not eligible for copyright protection under Article 3 of that directive either.

(see paras 27, 28)

2.        Article 3(1) of Directive 96/9 must be interpreted as meaning that a ‘database’ within the meaning of Article 1(2) of that directive is protected by the copyright provided for by that directive provided that the selection or arrangement of the data it contains amounts to an original expression of the creative freedom of its author, which is a matter for the national court to determine.

As a consequence:

– the intellectual effort and skill in creating the data are not relevant in order to assess the eligibility of that database for protection by that right;

– it is irrelevant, for that purpose, whether or not the selection or arrangement of the data involves a significant addition to the data, and

– the significant labour and skill required for setting up that database cannot, as such, justify such protection if they do not express any originality in the selection or arrangement of the data contained in that database.

Firstly, it is apparent from reading Article 3(2) in conjunction with recital 15 of Directive 96/9 that the copyright protection provided for by that directive concerns the ‘structure’ of the database, and not its ‘contents’ nor, therefore, the elements constituting its contents. The concepts of ‘selection’ and of ‘arrangement’ within the meaning of Article 3(1) of the directive refer respectively to the selection and the arrangement of data, through which the author of the database gives the database its structure. By contrast, those concepts do not extend to the creation of the data contained in that database.

Secondly, as is apparent from recital 16 of Directive 96/9, the notion of the author’s own intellectual creation refers to the criterion of originality. As regards the setting up of a database, that criterion of originality is satisfied when, through the selection or arrangement of the data which it contains, its author expresses his creative ability in an original manner by making free and creative choices and thus stamps his ‘personal touch’. By contrast, that criterion is not satisfied when the setting up of the database is dictated by technical considerations, rules or constraints leaving no room for creative freedom. Accordingly, no other criteria than that of originality is to be applied to determine the eligibility of a database for the copyright protection provided for by the directive.

(see paras 30, 32, 37-40, 45, 46, operative part 1)

3.        Directive 96/9 on the legal protection of databases must be interpreted as meaning that, subject to the transitional provision contained in Article 14(2) of that directive, it precludes national legislation which grants databases, as defined in Article 1(2) of the directive, copyright protection on conditions different from those set out in Article 3(1) of the directive.

As is apparent from recital 60 of Directive 96/9, Article 3 of that directive carries out a ‘harmonisation of the criteria for determining whether a database is to be protected by copyright’.

(see paras 49, 52, operative part 2)

 

JUDGMENT OF THE COURT (Third Chamber)

1 March 2012 (*)

(Directive 96/9/EC — Legal protection of databases — Copyright — Football league fixture lists)

In Case C‑604/10,

REFERENCE for a preliminary ruling under Article 267 TFEU from the Court of Appeal (England & Wales) (Civil Division) (United Kingdom), made by decision of 10 December 2010, received at the Court on 21 December 2010, in the proceedings

Football Dataco Ltd,

Football Association Premier League Ltd,

Football League Ltd,

Scottish Premier League Ltd,

Scottish Football League,

PA Sport UK Ltd

v

Yahoo! UK Ltd,

Stan James (Abingdon) Ltd,

Stan James plc,

Enetpulse ApS,

THE COURT (Third Chamber),

composed of K. Lenaerts (Rapporteur), President of the Chamber, J. Malenovský, E. Juhász, G. Arestis and D. Šváby, Judges,

Advocate General: P. Mengozzi,

Registrar: L. Hewlett, Principal Administrator,

having regard to the written procedure and further to the hearing on 27 October 2011,

after considering the observations submitted on behalf of:

–        Football Dataco Ltd, Football Association Premier League Ltd, Football League Ltd, Scottish Premier League Ltd, Scottish Football League and PA Sport UK Ltd, by J. Mellor QC, S. Levine and L. Lane and R. Hoy, Barristers,

–        Yahoo! UK Ltd, Stan James (Abingdon) Ltd, Stan James plc and Enetpulse ApS, by D. Alexander and R. Meade QC, P. Roberts and P. Nagpal, Barristers,

–        the United Kingdom Government, by L. Seeboruth, acting as Agent, assisted by S. Malynicz, Barrister,

–        the Italian Government, by G. Palmieri, acting as Agent, assisted by S. Fiorentino, avvocato dello Stato,

–        the Maltese Government, by A. Buhagiar and G. Kimberley, acting as Agents,

–        the Portuguese Government, by A.P. Barros and by L. Inez Fernandes and P. Mateus Calado, acting as Agents,

–        the Finnish Government, by J. Heliskoski, acting as Agent,

–        the European Commission, by J. Samnadda and T. van Rijn, acting as Agents,

after hearing the Opinion of the Advocate General at the sitting on 15 December 2011,

gives the following

Judgment

1        This reference for a preliminary ruling relates to the interpretation of Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases (OJ 1996 L 77, p. 20).

2        The reference has been made in proceedings between Football Dataco Ltd, Football Association Premier League Ltd, Football League Ltd, Scottish Premier League Ltd, Scottish Football League et PA Sport UK Ltd (collectively, ‘Football Dataco and Others’), on the one hand, and Yahoo! UK Ltd, Stan James (Abingdon) Ltd, Stan James plc and Enetpulse ApS (collectively, ‘Yahoo and Others’), on the other, concerning intellectual property rights claimed by Football Dataco and Others over the English and Scottish football league fixture lists.

 Legal context

 International law

3        Under a section on copyright and connected rights, Article 10(2) of the Agreement on Trade-Related Aspects of Intellectual Property Rights, which constitutes Annex 1C to the Agreement establishing the World Trade Organisation, signed in Marrakech on 15 April 1994 and approved by Council Decision 94/800/EC of 22 December 1994 concerning the conclusion on behalf of the European Community, as regards matters within its competence, of the agreements reached in the Uruguay Round multilateral negotiations (1986-1994) (OJ 1994 L 336, p. 1) provides:

‘Compilations of data or other material, whether in machine readable or other form, which by reason of the selection or arrangement of their contents constitute intellectual creations shall be protected as such. Such protection, which shall not extend to the data or material itself, shall be without prejudice to any copyright subsisting in the data or material itself.’

4        Article 5 of the World Intellectual Property Organization (WIPO) Copyright Treaty, adopted in Geneva on 20 December 1996, which relates to ‘Compilations of Data (Databases)’, states:

‘Compilations of data or other material, in any form, which by reason of the selection or arrangement of their contents constitute intellectual creations, are protected as such. This protection does not extend to the data or the material itself and is without prejudice to any copyright subsisting in the data or material contained in the compilation.’

 European Union law

5        Recitals 1 to 4, 9, 10, 12, 15, 16, 18, 26, 27, 39 and 60 to Directive 96/9 state that:

‘(1)      Whereas databases are at present not sufficiently protected in all Member States by existing legislation; whereas such protection, where it exists, has different attributes;

(2)      Whereas such differences in the legal protection of databases offered by the legislation of the Member States have direct negative effects on the functioning of the internal market as regards databases and in particular on the freedom of natural and legal persons to provide on‑line database goods and services on the basis of harmonized legal arrangements throughout the Community; whereas such differences could well become more pronounced as Member States introduce new legislation in this field, which is now taking on an increasingly international dimension;

(3)      Whereas existing differences distorting the functioning of the internal market need to be removed and new ones prevented from arising, while differences not adversely affecting the functioning of the internal market or the development of an information market within the Community need not be removed or prevented from arising;

(4)      Whereas copyright protection for databases exists in varying forms in the Member States according to legislation or case‑law, and whereas, if differences in legislation in the scope and conditions of protection remain between the Member States, such unharmonized intellectual property rights can have the effect of preventing the free movement of goods or services within the Community;

(9)      Whereas databases are a vital tool in the development of an information market within the Community; whereas this tool will also be of use in many other fields;

(10)      Whereas the exponential growth, in the Community and worldwide, in the amount of information generated and processed annually in all sectors of commerce and industry calls for investment in all the Member States in advanced information processing systems;

(12)      Whereas such an investment in modern information storage and processing systems will not take place within the Community unless a stable and uniform legal protection regime is introduced for the protection of the rights of makers of databases;

(15)      Whereas the criteria used to determine whether a database should be protected by copyright should be defined to the fact that the selection or the arrangement of the contents of the database is the author’s own intellectual creation; whereas such protection should cover the structure of the database;

(16)      Whereas no criterion other than originality in the sense of the author’s intellectual creation should be applied to determine the eligibility of the database for copyright protection, and in particular no aesthetic or qualitative criteria should be applied;

(18)      Whereas this Directive is without prejudice to the freedom of authors to decide whether, or in what manner, they will allow their works to be included in a database, in particular whether or not the authorization given is exclusive; …

(26)      Whereas works protected by copyright and subject matter protected by related rights, which are incorporated into a database, remain nevertheless protected by the respective exclusive rights and may not be incorporated into, or extracted from, the database without the permission of the rightholder or his successors in title;

(27)      Whereas copyright in such works and related rights in subject matter thus incorporated into a database are in no way affected by the existence of a separate right in the selection or arrangement of these works and subject matter in a database;

(39)      Whereas, in addition to aiming to protect the copyright in the original selection or arrangement of the contents of a database, this Directive seeks to safeguard the position of makers of databases against misappropriation of the results of the financial and professional investment made in obtaining and [collecting] the contents by protecting the whole or substantial parts of a database against certain acts by a user or competitor;

(60)      Whereas some Member States currently protect under copyright arrangements databases which do not meet the criteria for eligibility for copyright protection laid down in this Directive; whereas, even if the databases concerned are eligible for protection under the right laid down in this Directive to prevent unauthorized extraction and/or re-utilization of their contents, the term of protection under that right is considerably shorter than that which they enjoy under the national arrangements currently in force; whereas harmonization of the criteria for determining whether a database is to be protected by copyright may not have the effect of reducing the term of protection currently enjoyed by the rightholders concerned; whereas a derogation should be laid down to that effect; whereas the effects of such derogation must be confined to the territories of the Member States concerned’.

6        Article 1(2) of Directive 96/9 states that:

‘For the purposes of this Directive, “database” shall mean a collection of independent works, data or other materials arranged in a systematic or methodical way and individually accessible by electronic or other means.’

7        Under chapter II, entitled ‘Copyright’, Article 3 of Directive 96/9, which defines the ‘[o]bject of protection’, states that:

‘1. In accordance with this Directive, databases which, by reason of the selection or arrangement of their contents, constitute the author’s own intellectual creation shall be protected as such by copyright. No other criteria shall be applied to determine their eligibility for that protection.

2. The copyright protection of databases provided for by this Directive shall not extend to their contents and shall be without prejudice to any rights subsisting in those contents themselves.’

8        Under chapter III, entitled ‘Sui generis right’, Article 7 of Directive 96/9, relating to the ‘[o]bject of protection’, states in paragraphs 1 and 4:

‘1. Member States shall provide for a right for the maker of a database which shows that there has been qualitatively and/or quantitatively a substantial investment in either the obtaining, verification or presentation of the contents to prevent extraction and/or re-utilization of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the contents of that database.

4. The right provided for in paragraph 1 shall apply irrespective of the eligibility of that database for protection by copyright or by other rights. …’

9        Under chapter IV, entitled ‘Common provisions’, Article 14 of Directive 96/9 states:

‘1. Protection pursuant to this Directive as regards copyright shall also be available in respect of databases created prior to the date referred to [in] Article 16(1) which on that date fulfil the requirements laid down in this Directive as regards copyright protection of databases.

2. Notwithstanding paragraph 1, where a database protected under copyright arrangements in a Member State on the date of publication of this Directive does not fulfil the eligibility criteria for copyright protection laid down in Article 3(1), this Directive shall not result in any curtailing in that Member State of the remaining term of protection afforded under those arrangements.

…’

10      The date of the publication of Directive 96/9 in the Official Journal of the European Communities is 27 March 1996.

11      That directive was implemented in the United Kingdom by the adoption of the Copyright and Rights in Databases Regulations 1997 (SI 1997, No 3032), which came into force on 1 January 1998. The wording of the provisions of those Regulations which are relevant in the present case is identical to that of the relevant provisions of the directive.

 The facts which gave rise to the dispute in the main proceedings and the questions referred for a preliminary ruling

 

 Creation of the fixture lists of the English and Scottish football leagues

12      According to the order for reference, the creation of the annual fixture lists of the football leagues in England and Scotland follows, on the whole, comparable rules and procedure.

13      It involves having regard to several rules, which are called ‘the golden rules’, the most important of which are:

–        no club shall have three consecutive home or away matches;

–        in any five consecutive matches no club shall have four home matches or four away matches;

–        as far as possible, each club should have played an equal number of home and away matches at all times during the season, and

–        all clubs should have as near as possible an equal number of home and away matches for mid-week matches.

14      The procedure for drawing up a fixture list such as those in question in the main proceedings consists of several stages. The first stage, which begins during the previous season, is the preparation by employees of the leagues concerned of the Premier League fixture schedule and an outline fixture list for other leagues. That stage consists of establishing a list of possible dates for the fixtures on the basis of a series of basic parameters (the dates of the start and the end of the season, the number of fixtures which must be played, the dates reserved to other national, European or international competitions).

15      The second stage is the sending out, to the clubs concerned, of questionnaires prior to the fixing of the schedule and the analysis of the responses to these questionnaires, in particular ‘specific date’ requests (a request by a club to play its fixture against another club at home or away on a particular date), ‘non-specific date’ requests (a request by a club to play a certain match on a certain day of the week at a certain time, for example, Saturday after 1.30 pm), and ‘pairing’ requests (a request that two or more clubs not play at home on the same day). Around 200 requests are made per season.

16      The third stage, which, in the case of the English football leagues, is undertaken by Mr Thompson of Atos Origin IT Services UK Ltd, comprises two tasks, ‘sequencing’ and ‘pairing’.

17      Sequencing aims to achieve the perfect home-away sequence for every club, having regard to the golden rules, a series of organisational constraints and, as far as possible, the requests made by the clubs. Mr Thompson then produces a pairing grid on the basis of the requests made by the teams. He gradually inserts the names of the teams into that grid and attempts to resolve a maximum amount of problem cases until a satisfactory draft fixture list is completed. For that purpose, he uses a computer program, to which he transfers information from the sequencing sheet and the pairing grid to produce a readable version of the fixture list.

18      The final stage involves Mr Thompson working with employees of the professional leagues concerned to review the content of the fixture lists. That review is carried out manually with the assistance of computer software to find solutions to outstanding problems. Two meetings then take place, one with a fixtures working party and the other with police representatives, in order to finalise the fixture list. In the 2008/2009 season, 56 changes were made during that final stage.

19      According to the findings of fact made by the judge at first instance reproduced in the order for reference, the process of preparing the football fixture lists in question in the main proceedings is not purely mechanistic or deterministic; on the contrary, it requires very significant labour and skill in order to satisfy the multitude of competing requirements while respecting the applicable rules as far as possible. The work needed is not mere application of rigid criteria, and is unlike, for instance, the compilation of a telephone directory, in that it requires judgment and skill at each stage, in particular where the computer program finds no solution for a given set of constraints. With regard to the partial computerisation of the process, Mr Thompson states that it does not eliminate the need for judgment and discretion.

 The facts in the main proceedings and the questions referred for a preliminary ruling

20      Football Dataco and Others claim that they own, in respect of the English and Scottish football league fixture lists, a ‘sui generis’ right pursuant to Article 7 of Directive 96/9, a copyright pursuant to Article 3 of that directive, and a copyright under United Kingdom intellectual property legislation.

21      Yahoo and Others do not accept that such rights exist in law, arguing that they are entitled to use the lists in the conduct of their business without having to pay financial compensation.

22      The judge at first instance held that those lists are eligible for protection by copyright under Article 3 of Directive 96/9, on the ground that their preparation requires a substantial quantum of creative work. However, he refused to recognise either of the two other rights claimed.

23      The referring court confirmed the judgment at first instance as regards the ineligibility of the lists in question in the main proceedings for protection by the ‘sui generis’ right under Article 7 of Directive 96/9. By contrast, the referring court raises the question of whether the lists are eligible for protection by copyright under Article 3 of that directive. The referring court also has doubts regarding the possibility of the lists being protected by the copyright pursuant to United Kingdom legislation prior to that directive under conditions which are different to those which are set out in Article 3 of Directive 96/9.

24      In those circumstances, the Court of Appeal (England and Wales) (Civil Division) decided to stay the proceedings and refer the following questions to the Court for a preliminary ruling:

‘1.      In Article 3(1) of Directive 96/9 … what is meant by “databases which, by reason of the selection or arrangement of their contents, constitute the author’s own intellectual creation” and in particular:

(a)      should the intellectual effort and skill of creating data be excluded;

(b)      does “selection or arrangement” include adding important significance to a pre-existing item of data (as in fixing the date of a football match), and

(c)      does “author’s own intellectual creation” require more than significant labour and skill from the author, if so what?

2.      Does the Directive preclude national rights in the nature of copyright in databases other than those provided for by [Directive 96/9]?’

 The first question submitted for a preliminary ruling

25      By its first question, the referring court is essentially seeking an interpretation of Article 3(1) of Directive 96/9. In particular, it is asking:

–        firstly, whether the intellectual effort and skill of creating data should be excluded in connection with the application of that provision;

–        secondly, whether the ‘selection or arrangement’ of the contents, within the meaning of that provision, includes adding important significance to a pre‑existing item of data, and

–        thirdly, whether the notion of ‘author’s own intellectual creation’ within the meaning of that provision requires more than significant labour and skill from the author and, if so, what that additional requirement is.

26      First of all, it is to be noted that, on the one hand, the Court has already held that a football league fixture list constitutes a ‘database’ within the meaning of Article 1(2) of Directive 96/9. The Court essentially held that the combination of the date, the time and the identity of the two teams playing in both home and away matches has autonomous informative value which renders them ‘independent materials’ within the meaning of Article 1(2) of Directive 96/9, and that the arrangement, in the form of a fixture list, of the dates, times and names of teams in the various fixtures of a football league meets the conditions set out in Article 1(2) of Directive 96/9 as to the systematic or methodical arrangement and individual accessibility of the data contained in the database (see Case C‑444/02 Fixtures Marketing [2004] ECR I‑10549, paragraphs 33 to 36).

27      On the other hand, it is apparent from both a comparison of the terms of Article 3(1) and Article 7(1) of Directive 96/9 and from other provisions or recitals of Directive 96/9, in particular Article 7(4) and recital 39 to that directive, that the copyright and the ‘sui generis’ right amount to two independent rights whose object and conditions of application are different.

28      Consequently, the fact that a ‘database’ within the meaning of Article 1(2) of Directive 96/9 does not satisfy the conditions of eligibility for protection by the ‘sui generis’ right under Article 7 of Directive 96/9, as the Court held in relation to football fixture lists (Case C‑46/02 Fixtures Marketing[2004] ECR I‑10365, paragraphs 43 to 47; Case C‑338/02 Fixtures Marketing [2004] ECR I‑10497, paragraphs 32 to 36; and Case C‑444/02 Fixtures Marketing, cited above, paragraphs 48 to 52), does not automatically mean that that same database is also not eligible for copyright protection under Article 3 of that directive.

29      Under Article 3(1) of Directive 96/9, ‘databases’ within the meaning of Article 1(2) of that directive are protected by copyright if, by reason of the selection or arrangement of their contents, they constitute the author’s own intellectual creation.

30      Firstly, it is apparent from reading Article 3(2) in conjunction with recital 15 of Directive 96/9 that the copyright protection provided for by that directive concerns the ‘structure’ of the database, and not its ‘contents’ nor, therefore, the elements constituting its contents.

31      Similarly, as is apparent from Article 10(2) of the Agreement on Trade-Related Aspects of Intellectual Property Rights and from Article 5 of the WIPO Copyright Treaty, compilations of data which by reason of the selection or arrangement of their contents constitute intellectual creations are protected as such by copyright. On the other hand, that protection does not extend to the data itself and is without prejudice to any copyright subsisting for that data.

32      In that context, the concepts of ‘selection’ and of ‘arrangement’ within the meaning of Article 3(1) of Directive 96/9 refer respectively to the selection and the arrangement of data, through which the author of the database gives the database its structure. By contrast, those concepts do not extend to the creation of the data contained in that database.

33      Consequently, as Yahoo and Others, the Italian, Portuguese and Finnish governments as well as the European Commission have argued, the materials mentioned in section (a) of the referring court’s first question that concern the intellectual effort and skill of creating data are not relevant in order to assess the eligibility of the database that contains them for the copyright protection provided for by Directive 96/9.

34      That analysis is confirmed by the purpose of that directive. As is apparent from recitals 9, 10 and 12 of that directive, its purpose is to stimulate the creation of data storage and processing systems in order to contribute to the development of an information market against a background of exponential growth in the amount of information generated and processed annually in all sectors of activity (see Case C‑46/02 Fixtures Marketing, cited above, paragraph 33; Case C‑203/02 The British Horseracing Board and Others [2004] ECR I‑10415, paragraph 30; Case C‑338/02Fixtures Marketing, cited above, paragraph 23; and Case C‑444/02 Fixtures Marketing, cited above, paragraph 39) and not to protect the creation of materials capable of being collected in a database.

35      In the case in the main proceedings, it must be observed that the resources, in particular intellectual resources, described by the referring court and referred to in paragraphs 14 to 18 of this judgment, are deployed for the purpose of determining, in the course of arranging the leagues concerned, the date, the time and the identity of teams corresponding to each fixture of those leagues, in accordance with a set of rules, parameters and organisational constraints as well as the specific requests of the clubs concerned (see Case C‑46/02 Fixtures Marketing, cited above, paragraph 41; Case C‑338/02 Fixtures Marketing, cited above, paragraph 31; and Case C‑444/02 Fixtures Marketing, cited above, paragraph 47).

36      As Yahoo and Others and the Portuguese government have pointed out, those resources relate to the creation of the same data which is contained in the database in question, as already noted in paragraph 26 of the present judgment (see Case C‑46/02 Fixtures Marketing, cited above, paragraph 42; Case C‑338/02 Fixtures Marketing, cited above, paragraph 31; and Case C‑444/02 Fixtures Marketing, cited above, paragraph 47). As a consequence, and having regard to what is stated in paragraph 32 of the present judgment, they are, in any case, of no relevance in order to assess the eligibility of the football fixture lists in question in the main proceedings for the copyright protection provided for by Directive 96/9.

37      Secondly, as is apparent from recital 16 of Directive 96/9, the notion of the author’s own intellectual creation refers to the criterion of originality (see, to that effect, Case C‑5/08 Infopaq International [2009] ECR I‑6569, paragraphs 35, 37 and 38; Case C‑393/09 Bezpečnostní softwarová asociace [2010] ECR I‑13971 paragraph 45; Joined Cases C‑403/08 and C‑429/08 Football Association Premier League and Others [2011] ECR I‑9083, paragraph 97; and Case C‑145/10 Painer [2011] ECR I‑12533, paragraph 87).

38      As regards the setting up of a database, that criterion of originality is satisfied when, through the selection or arrangement of the data which it contains, its author expresses his creative ability in an original manner by making free and creative choices (see, by analogy, Infopaq International, paragraph 45; Bezpečnostní softwarová asociace, paragraph 50; and Painer, paragraph 89) and thus stamps his ‘personal touch’ (Painer, paragraph 92).

39      By contrast, that criterion is not satisfied when the setting up of the database is dictated by technical considerations, rules or constraints which leave no room for creative freedom (see, by analogy, Bezpečnostní softwarová asociace, paragraphs 48 and 49, and Football Association Premier League and Others, paragraph 98).

40      As is apparent from both Article 3(1) and recital 16 of Directive 96/9, no other criteria than that of originality is to be applied to determine the eligibility of a database for the copyright protection provided for by that directive.

41      Therefore, on the one hand, provided that the selection or arrangement of the data — namely, in a case such as the one in the main proceedings, data corresponding to the date, the time and the identity of teams relating to the different fixtures of the league concerned (see paragraph 26 of the present judgment) — is an original expression of the creativity of the author of the database, it is irrelevant for the purpose of assessing the eligibility of the database for the copyright protection provided for by Directive 96/9 whether or not that selection or arrangement includes ‘adding important significance’ to that data, as mentioned in section (b) of the referring court’s first question.

42      On the other hand, the fact that the setting up of the database required, irrespective of the creation of the data which it contains, significant labour and skill of its author, as mentioned in section (c) of that same question, cannot as such justify the protection of it by copyright under Directive 96/9, if that labour and that skill do not express any originality in the selection or arrangement of that data.

43      In the present case, it is for the referring court to assess, in the light of the factors set out above, whether the football fixture lists in question in the main proceedings are databases which satisfy the conditions of eligibility for the copyright protection set out in Article 3(1) of Directive 96/9.

44      In that respect, the procedures for creating those lists, as described by the referring court, if they are not supplemented by elements reflecting originality in the selection or arrangement of the data contained in those lists, do not suffice for the database in question to be protected by the copyright provided for in Article 3(1) of Directive 96/9.

45      In light of the considerations above, the answer to the first question is that Article 3(1) of Directive 96/9 must be interpreted as meaning that a ‘database’ within the meaning of Article 1(2) of that directive is protected by the copyright laid down by that directive provided that the selection or arrangement of the data which it contains amounts to an original expression of the creative freedom of its author, which is a matter for the national court to determine.

46      As a consequence:

–        the intellectual effort and skill of creating that data are not relevant in order to assess the eligibility of that database for protection by that right;

–        it is irrelevant, for that purpose, whether or not the selection or arrangement of that data includes the addition of important significance to that data, and

–        the significant labour and skill required for setting up that database cannot as such justify such a protection if they do not express any originality in the selection or arrangement of the data which that database contains.

 The second question submitted for a preliminary ruling

47      By its second question, the referring court is essentially asking whether Directive 96/9 must be interpreted as precluding national legislation which grants databases, as defined in Article 1(2) of that directive, copyright protection under conditions which are different to those set out in Article 3(1) of the directive.

48      In that respect, it must be pointed out that Directive 96/9 aims, according to recitals 1 to 4 of the directive, to remove the differences which existed between national legislation on the legal protection of databases, particularly as regards the scope and conditions of copyright protection, and which adversely affected the functioning of the internal market, the free movement of goods or services within the European Union and the development of an information market within the European Union.

49      In that context, as is apparent from recital 60 of Directive 96/9, Article 3 of that directive carries out a ‘harmonization of the criteria for determining whether a database is to be protected by copyright’.

50      It is true that, as regards databases which were protected on 27 March 1996 by national copyright arrangements under different eligibility criteria than those set out in Article 3(1) of Directive 96/9, Article 14(2) of the directive preserves the duration of the protection granted by such arrangements in the Member State concerned. However, subject only to that transitional provision, Article 3(1) of the directive precludes national legislation which grants databases as defined in Article 1(2) of that directive copyright protection under conditions which are different to that of originality laid down in Article 3(1) of the directive.

51      As for recitals 18, 26 and 27 of Directive 96/9, highlighted by Football Dataco and Others, those recitals note the freedom which authors of works have to decide whether to include their works in a database and the absence of effect which the incorporation of a protected piece of work in a protected database has on the rights protecting the work thus incorporated. However, they do not support an interpretation contrary to that set out in the previous paragraph of this judgment.

52      In light of the above considerations, the answer to the second question is that Directive 96/9 must be interpreted as meaning that, subject to the transitional provision contained in Article 14(2) of that directive, it precludes national legislation which grants databases, as defined in Article 1(2) of the directive, copyright protection under conditions which are different to those set out in Article 3(1) of the directive.

 Costs

53      Since these proceedings are, for the parties to the main proceedings, a step in the action pending before the national court, the decision on costs is a matter for that court. Costs incurred in submitting observations to the Court, other than the costs of those parties, are not recoverable.

On those grounds, the Court (Third Chamber) hereby rules:

1.      Article 3(1) of Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases must be interpreted as meaning that a ‘database’ within the meaning of Article 1(2) of that directive is protected by the copyright laid down by that directive provided that the selection or arrangement of the data which it contains amounts to an original expression of the creative freedom of its author, which is a matter for the national court to determine.

As a consequence:

–        the intellectual effort and skill of creating that data are not relevant in order to assess the eligibility of that database for protection by that right;

–        it is irrelevant, for that purpose, whether or not the selection or arrangement of that data includes the addition of important significance to that data, and

–        the significant labour and skill required for setting up that database cannot as such justify such a protection if they do not express any originality in the selection or arrangement of the data which that database contains.

2.      Directive 96/9 must be interpreted as meaning that, subject to the transitional provision contained in Article 14(2) of that directive, it precludes national legislation which grants databases, as defined in Article 1(2) of the directive, copyright protection under conditions which are different to those set out in Article 3(1) of the directive.

[Signatures]

 

4.3.4 Football Dataco (SUMMARY) 4.3.4 Football Dataco (SUMMARY)

Case C-604/10

Football Dataco Ltd and Others

v

Yahoo! UK Ltd and Others

 

(Reference for a preliminary ruling from the Court of Appeal (England & Wales)(Civil Division))

(Directive 96/9/EC — Legal protection of databases — Copyright — Football league fixture lists)

Summary of the Judgment

1.        Approximation of laws — Legal protection of databases — Directive 96/9 — Copyright and sui generis right

(European Parliament and Council Directive 96/9, Arts 3(1) and 7(1))

2.        Approximation of laws — Legal protection of databases — Directive 96/9 — Protection by copyright — Conditions

(European Parliament and Council Directive 96/9, Art. 3(1))

3.        Approximation of laws — Legal protection of databases — Directive 96/9 — Protection by copyright

(European Parliament and Council Directive 96/9, Art. 3(1) and 14(2))

1.        It is apparent both from a comparison of the terms of Article 3(1) and Article 7(1) of Directive 96/9 on the legal protection of databases, and from other provisions or recitals of Directive 96/9, in particular Article 7(4) and recital 39 to that directive, that the copyright and the ‘sui generis’ right amount to two independent rights whose object and conditions of application are different. Consequently, the fact that a ‘database’ within the meaning of Article 1(2) of Directive 96/9 does not satisfy the conditions of eligibility for protection by the ‘sui generis’ right under Article 7 of Directive 96/9 does not automatically mean that that database is not eligible for copyright protection under Article 3 of that directive either.

(see paras 27, 28)

2.        Article 3(1) of Directive 96/9 must be interpreted as meaning that a ‘database’ within the meaning of Article 1(2) of that directive is protected by the copyright provided for by that directive provided that the selection or arrangement of the data it contains amounts to an original expression of the creative freedom of its author, which is a matter for the national court to determine.

As a consequence:

– the intellectual effort and skill in creating the data are not relevant in order to assess the eligibility of that database for protection by that right;

– it is irrelevant, for that purpose, whether or not the selection or arrangement of the data involves a significant addition to the data, and

– the significant labour and skill required for setting up that database cannot, as such, justify such protection if they do not express any originality in the selection or arrangement of the data contained in that database.

Firstly, it is apparent from reading Article 3(2) in conjunction with recital 15 of Directive 96/9 that the copyright protection provided for by that directive concerns the ‘structure’ of the database, and not its ‘contents’ nor, therefore, the elements constituting its contents. The concepts of ‘selection’ and of ‘arrangement’ within the meaning of Article 3(1) of the directive refer respectively to the selection and the arrangement of data, through which the author of the database gives the database its structure. By contrast, those concepts do not extend to the creation of the data contained in that database.

Secondly, as is apparent from recital 16 of Directive 96/9, the notion of the author’s own intellectual creation refers to the criterion of originality. As regards the setting up of a database, that criterion of originality is satisfied when, through the selection or arrangement of the data which it contains, its author expresses his creative ability in an original manner by making free and creative choices and thus stamps his ‘personal touch’. By contrast, that criterion is not satisfied when the setting up of the database is dictated by technical considerations, rules or constraints leaving no room for creative freedom. Accordingly, no other criteria than that of originality is to be applied to determine the eligibility of a database for the copyright protection provided for by the directive.

(see paras 30, 32, 37-40, 45, 46, operative part 1)

3.        Directive 96/9 on the legal protection of databases must be interpreted as meaning that, subject to the transitional provision contained in Article 14(2) of that directive, it precludes national legislation which grants databases, as defined in Article 1(2) of the directive, copyright protection on conditions different from those set out in Article 3(1) of the directive.

As is apparent from recital 60 of Directive 96/9, Article 3 of that directive carries out a ‘harmonisation of the criteria for determining whether a database is to be protected by copyright’.

(see paras 49, 52, operative part 2)

4.3.5 Additional Readings 4.3.5 Additional Readings

4.3.5.1 The British Horseracing Board Ltd v William Hill Organisation Ltd, C-203/02, November 9, 2004 4.3.5.1 The British Horseracing Board Ltd v William Hill Organisation Ltd, C-203/02, November 9, 2004

JUDGMENT OF THE COURT (Grand Chamber)
9 November 2004 (1)

(Directive 96/9/EC – Legal protection of databases – Sui generis right – Obtaining, verification or presentation of the contents of a database – (In)substantial part of the contents of a database – Extraction and re-utilisation – Normal exploitation – Unreasonable prejudice to the legitimate interests of the maker – Horseracing database – Lists of races – Betting)

In Case

C-203/02,

REFERENCE for a preliminary ruling under Article 234 EC,
from the Court of Appeal (England and Wales) (Civil Division), made by decision of 24 May 2002, received at the Court on 31 May 2002, in the proceedings

The British Horseracing Board Ltd and Others

v

William Hill Organization Ltd,

THE COURT (Grand Chamber),

composed of: V. Skouris, President, P. Jann, C.W.A. Timmermans, A. Rosas and K. Lenaerts (Rapporteur), (Presidents of Chambers), J.‑P. Puissochet, R. Schintgen, N. Colneric and J.N. Cunha Rodrigues, Judges,
Advocate General: C. Stix-Hackl,
Registrars: M. Múgica Arzamendi and M.-F. Contet, Principal Administrators,
having regard to the written procedure and further to the hearing on 30 March 2004,
after considering the observations submitted on behalf of:
– The British Horseracing Board Ltd and Others, by P. Prescott QC, L. Lane, Barrister, and H. Porter, Solicitor,
- William Hill Organization Ltd, by M. Platts-Mills QC, J. Abrahams, Barrister, S. Kon, T. Usher and S. Turnbull, Solicitors,
– the Belgian Government, by A. Snoecx, acting as Agent, and P. Vlaemminck, advocaat,
– the German Government, by W.-D. Plessing, acting as Agent,
– the Portuguese Government, by L. Fernandes and A.P. Matos Barros, acting as Agents,
– the Commission of the European Communities, by K. Banks, acting as Agent,

after hearing the Opinion of the Advocate General at the sitting on 8 June 2004,

gives the following

Judgment

1

This reference for a preliminary ruling concerns the interpretation of Article 7 and Article 10(3) of Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases (OJ 1996 L 77, p. 20, ‘the directive’).

2

The reference was made in the course of proceedings brought by The British Horseracing Board Ltd, the Jockey Club and Weatherbys Group Ltd (‘the BHB and Others’) against William Hill Organization Ltd (‘William Hill’). The litigation arose over the use by William Hill, for the purpose of organising betting on horse racing, of information taken from the BHB database.

Legal background

3

The directive, according to Article 1(1) thereof, concerns the legal protection of databases in any form. A database is defined, in Article 1(2) of the directive, as ‘a collection of independent works, data or other materials arranged in a systematic or methodical way and individually accessible by electronic or other means’.

4

Article 3 of the directive provides for copyright protection for databases which, ‘by reason of the selection or arrangement of their contents, constitute the author’s own intellectual creation’.

5

Article 7 of the directive provides for a sui generis right in the following terms:

‘Object of protection

1.      Member States shall provide for a right for the maker of a database which shows that there has been qualitatively and/or quantitatively a substantial investment in either the obtaining, verification or presentation of the contents to prevent extraction and/or re-utilisation of the whole or of a substantial part, evaluated qualitatively and/or quantitatively, of the contents of that database.

2.      For the purposes of this Chapter:

(a)
“extraction” shall mean the permanent or temporary transfer of all or a substantial part of the contents of a database to another medium by any means or in any form;
(b)
“re-utilisation” shall mean any form of making available to the public all or a substantial part of the contents of a database by the distribution of copies, by renting, by on-line or other forms of transmission. The first sale of a copy of a database within the Community by the rightholder or with his consent shall exhaust the right to control resale of that copy within the Community;

public lending is not an act of extraction or re-utilisation.

3.      The right referred to in paragraph 1 may be transferred, assigned or granted under contractual licence.

4.      The right provided for in paragraph 1 shall apply irrespective of the eligibility of that database for protection by copyright or by other rights. Moreover, it shall apply irrespective of eligibility of the contents of that database for protection by copyright or by other rights. Protection of databases under the right provided for in paragraph 1 shall be without prejudice to rights existing in respect of their content.

5.      The repeated and systematic extraction and/or re-utilisation of insubstantial parts of the contents of the database implying acts which conflict with a normal exploitation of that database or which unreasonably prejudice the legitimate interests of the maker of the database shall not be permitted.’

6

Article 8(1) of the directive provides:

‘The maker of a database which is made available to the public in whatever manner may not prevent a lawful user of the database from extracting and/or re-utilising insubstantial parts of its contents, evaluated qualitatively and/or quantitatively, for any purposes whatsoever. Where the lawful user is authorised to extract and/or re-utilise only part of the database, this paragraph shall apply only to that part.’

7

Under Article 9 of the directive ‘Member States may stipulate that lawful users of a database which is made available to the public in whatever manner may, without the authorisation of its maker, extract or re-utilise a substantial part of its contents:

(a)
in the case of extraction for private purposes of the contents of a non-electronic database;
(b)
in the case of extraction for the purposes of illustration for teaching or scientific research, as long as the source is indicated and to the extent justified by the non-commercial purpose to be achieved;
(c)
in the case of extraction and/or re-utilisation for the purposes of public security or an administrative or judicial procedure.’

8

Article 10 of the directive provides:

‘1.    The right provided for in Article 7 shall run from the date of completion of the making of the database. It shall expire 15 years from the first of January of the year following the date of completion.

...

3.      Any substantial change, evaluated qualitatively or quantitatively, to the contents of a database, including any substantial change resulting from the accumulation of successive additions, deletions or alterations, which would result in the database being considered to be a substantial new investment, evaluated qualitatively or quantitatively, shall qualify the database resulting from that investment for its own term of protection.’

9

The directive was implemented in United Kingdom law by the Copyright and Rights in Databases Regulations 1997 which entered into force on 1 January 1998. The terms of those regulations are identical to those of the directive.

The main proceedings and the questions referred for a preliminary ruling

10

The BHB and Others manage the horse racing industry in the United Kingdom and in various capacities compile and maintain the BHB database which contains a large amount of information supplied by horse owners, trainers, horse race organisers and others involved in the racing industry. The database contains information on inter alia the pedigrees of some one million horses, and ‘pre‑race information’ on races to be held in the United Kingdom. That information includes the name, place and date of the race concerned, the distance over which the race is to be run, the criteria for eligibility to enter the race, the date by which entries must be received, the entry fee payable and the amount of money the racecourse is to contribute to the prize money for the race.

11

Weatherbys Group Ltd, the company which compiles and maintains the BHB database, performs three principal functions, which lead up to the issue of pre-race information.

12

First, it registers information concerning owners, trainers, jockeys and horses and records the performances of those horses in each race.

13

Second, it decides on weight adding and handicapping for the horses entered for the various races.

14

Third, it compiles the lists of horses running in the races. This activity is carried out by its own call centre, manned by about 30 operators. They record telephone calls entering horses in each race organised. The identity and status of the person entering the horse and whether the characteristics of the horse meet the criteria for entry to the race are then checked. Following those checks the entries are published provisionally. To take part in the race, the trainer must confirm the horse’s participation by telephone by declaring it the day before the race at the latest. The operators must then ascertain whether the horse can be authorised to run the race in the light of the number of declarations already recorded. A central computer then allocates a saddle cloth number to each horse and determines the stall from which it will start. The final list of runners is published the day before the race.

15

The BHB database contains essential information not only for those directly involved in horse racing but also for radio and television broadcasters and for bookmakers and their clients. The cost of running the BHB database is approximately £4 million per annum. The fees charged to third parties for the use of the information in the database cover about a quarter of that amount.

16

The database is accessible on the internet site operated jointly by BHB and Weatherbys Group Ltd. Some of its contents are also published each week in the BHB’s official journal. The contents of the database, or of certain parts of it, are also made available to Racing Pages Ltd, a company jointly controlled by Weatherbys Group Ltd and the Press Association, which then forwards data to its various subscribers, including some bookmakers, in the form of a ‘Declarations Feed’, the day before a race. Satellite Information Services Limited (‘SIS’) is authorised by Racing Pages to transmit data to its own subscribers in the form of a ‘raw data feed’ (‘RDF’). The RDF includes a large amount of information, in particular, the names of the horses running in the races, the names of the jockeys, the saddle cloth numbers and the weight for each horse. Through the newspapers and the Ceefax and Teletext services, the names of the runners in a particular race are made available to the public during the course of the afternoon before the race.

17

William Hill, which is a subscriber to both the Declarations Feed and the RDF, is one of the leading providers of off‑course bookmaking services in the United Kingdom, to both UK and international customers. It launched an on-line betting service on two internet sites. Those interested can use these sites to find out what horses are running in which races at which racecourses and what odds are offered by William Hill.

18

The information displayed on William Hill’s internet sites is obtained, first, from newspapers published the day before the race and, second, from the RDF supplied by SIS on the morning of the race.

19

According to the order for reference, the information displayed on William Hill’s internet sites represents a very small proportion of the total amount of data on the BHB database, given that it concerns only the following matters: the names of all the horses in the race, the date, time and/or name of the race and the name of the racecourse where the race will be held. Also according to the order for reference, the horse races and the lists of runners are not arranged on William Hill’s internet sites in the same way as in the BHB database.

20

In March 2000 the BHB and Others brought proceedings against William Hill in the High Court of Justice of England and Wales, Chancery Division, alleging infringement of their sui generis right. They contend, first, that each day’s use by William Hill of racing data taken from the newspapers or the RDF is an extraction or re-utilisation of a substantial part of the contents of the BHB database, contrary to Article 7(1) of the directive. Secondly, they say that even if the individual extracts made by William Hill are not substantial they should be prohibited under Article 7(5) of the directive.

21

The High Court of Justice ruled in a judgment of 9 February 2001 that the action of BHB and Others was well founded. William Hill appealed to the referring court.

22

In the light of the problems of interpretation of the directive, the Court of Appeal decided to stay proceedings and refer the following questions to the Court of Justice for a preliminary ruling:

‘(1)  May either of the expressions:

           “substantial part of the contents of the database”; or
           “insubstantial parts of the contents of the database”
in Article 7 of the directive include works, data or other materials derived from the database but which do not have the same systematic or methodical arrangement of and individual accessibility as those to be found in the database?

(2)    What is meant by “obtaining” in Article 7(1) of the directive? In particular, are the [facts and matters in paragraph 14] above capable of amounting to such obtaining?

(3)    Is “verification” in Article 7(1) of the directive limited to ensuring from time to time that information contained in a database is or remains correct?

(4)    What is meant in Article 7(1) of the directive, by the expressions:

“a substantial part, evaluated qualitatively ... of the contents of that database”? and
“a substantial part, evaluated quantitatively ... of the contents of that database”?

(5)    What is meant in Article 7(5) of the directive, by the expression “insubstantial parts of the database”?

(6)    In particular, in each case:

does “substantial” mean something more than “insignificant” and, if so, what?
does “insubstantial” part simply mean that it is not “substantial”?

(7)    Is “extraction” in Article 7 of the directive limited to the transfer of the contents of the database directly from the database to another medium, or does it also include the transfer of works, data or other materials, which are derived indirectly from the database, without having direct access to the database? 

(8)    Is “re‑utilisation” in Article 7 of the directive limited to the making available to the public of the contents of the database directly from the database, or does it also include the making available to the public of works, data or other materials which are derived indirectly from the database, without having direct access to the database?

(9)    Is “re‑utilisation” in Article 7 of the directive limited to the first making available to the public of the contents of the database?

(10)  In Article 7(5) of the directive what is meant by “acts which conflict with a normal exploitation of that database or unreasonably prejudice the legitimate interests of the maker of the database”? In particular, are the facts and matters in paragraphs [17 to 19] above in the context of the facts and matters in paragraph [15] above capable of amounting to such acts?

(11)  Does Article 10(3) of the directive mean that, whenever there is a “substantial change” to the contents of a database, qualifying the resulting database for its own term of protection, the resulting database must be considered to be a new, separate database, including for the purposes of Article 7(5)?’

The questions referred

Preliminary observations

23

Article 7(1) of the directive provides for specific protection, called a sui generis right, for the maker of a database within the meaning of Article 1(2) of the directive, provided that it ‘shows that there has been qualitatively and/or quantitatively a substantial investment in either the obtaining, verification or presentation of the contents’.

24

By its second and third questions, which should be considered together, the referring court seeks an interpretation of the concept of investment in the obtaining and verification of the contents of a database within the meaning of Article 7(1) of the directive.

25

Article 7(1) of the directive authorises a maker of a database protected by a sui generis right to prevent extraction and/or re-utilisation of the whole or of a substantial part of its contents. Article 7(5) also prohibits the repeated and systematic extraction and/or re-utilisation of insubstantial parts of the contents of the database implying acts which conflict with a normal exploitation of that database or which unreasonably prejudice the legitimate interests of the maker of the database.

6

The seventh, eighth and ninth questions referred, which should be considered together, concern the concepts of extraction and re-utilisation. The concepts of ‘substantial part’ and ‘insubstantial part’ of the contents of a database are crucial to the first, fourth, fifth and sixth questions, which will also be considered together.

27

The 10th question concerns the scope of the prohibition laid down by Article 7(5) of the directive. The 11th question seeks to ascertain whether a substantial change by the maker of the database to its contents implies the existence of a new database for the purposes of assessing, under Article 7(5) of the directive, whether acts of extraction and/or re-utilisation of insubstantial parts of the contents of the database were repeated and systematic.

The second and third questions, concerning the concept of investment in the obtaining or verification of the contents of a database within the meaning of Article 7(1) of the directive

28

By its second and third questions the referring court seeks clarification of the concept of investment in the obtaining and verification of the contents of a database within the meaning of Article 7(1) of the directive.

29

Article 7(1) of the directive reserves the protection of the sui generis right to databases which meet a specific criterion, namely to those which show that there has been qualitatively and/or quantitatively a substantial investment in the obtaining, verification or presentation of their contents.

30

Under the 9th, 10th and 12th recitals of the preamble to the directive, its purpose, as William Hill points out, is to promote and protect investment in data ‘storage’ and ‘processing’ systems which contribute to the development of an information market against a background of exponential growth in the amount of information generated and processed annually in all sectors of activity. It follows that the expression ‘investment in … the obtaining, verification or presentation of the contents’ of a database must be understood, generally, to refer to investment in the creation of that database as such.

31

Against that background, the expression ‘investment in … the obtaining … of the contents’ of a database must, as William Hill and the Belgian, German and Portuguese Governments point out, be understood to refer to the resources used to seek out existing independent materials and collect them in the database, and not to the resources used for the creation as such of independent materials. The purpose of the protection by the sui generis right provided for by the directive is to promote the establishment of storage and processing systems for existing information and not the creation of materials capable of being collected subsequently in a database.

32

That interpretation is backed up by the 39th recital of the preamble to the directive, according to which the aim of the sui generis right is to safeguard the results of the financial and professional investment made in ‘obtaining and collection of the contents’ of a database. As the Advocate General notes in points 41 to 46 of her Opinion, despite slight variations in wording, all the language versions of the 39th recital support an interpretation which excludes the creation of the materials contained in a database from the definition of obtaining.

33

The 19th recital of the preamble to the directive, according to which the compilation of several recordings of musical performances on a CD does not represent a substantial enough investment to be eligible under the sui generis right, provides an additional argument in support of that interpretation. Indeed, it appears from that recital that the resources used for the creation as such of works or materials included in the database, in this case on a CD, cannot be deemed equivalent to investment in the obtaining of the contents of that database and cannot, therefore, be taken into account in assessing whether the investment in the creation of the database was substantial.

34

The expression ‘investment in … the … verification … of the contents’ of a database must be understood to refer to the resources used, with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation. The resources used for verification during the stage of creation of data or other materials which are subsequently collected in a database, on the other hand, are resources used in creating a database and cannot therefore be taken into account in order to assess whether there was substantial investment in the terms of Article 7(1) of the directive.

35

In that light, the fact that the creation of a database is linked to the exercise of a principal activity in which the person creating the database is also the creator of the materials contained in the database does not, as such, preclude that person from claiming the protection of the sui generis right, provided that he establishes that the obtaining of those materials, their verification or their presentation, in the sense described in paragraphs 31 to 34 of this judgment, required substantial investment in quantitative or qualitative terms, which was independent of the resources used to create those materials

36

Thus, although the search for data and the verification of their accuracy at the time a database is created do not require the maker of that database to use particular resources because the data are those he created and are available to him, the fact remains that the collection of those data, their systematic or methodical arrangement in the database, the organisation of their individual accessibility and the verification of their accuracy throughout the operation of the database may require substantial investment in quantitative and/or qualitative terms within the meaning of Article 7(1) of the directive.

37

In the case in the main proceedings, the referring court seeks to know whether the investments described in paragraph 14 of this judgment can be considered to amount to investment in obtaining the contents of the BHB database. The plaintiffs in the main proceedings stress, in that connection, the substantial nature of the above investment.

38

However, investment in the selection, for the purpose of organising horse racing, of the horses admitted to run in the race concerned relates to the creation of the data which make up the lists for those races which appear in the BHB database. It does not constitute investment in obtaining the contents of the database. It cannot, therefore, be taken into account in assessing whether the investment in the creation of the database was substantial.

39

Admittedly, the process of entering a horse on a list for a race requires a number of prior checks as to the identity of the person making the entry, the characteristics of the horse and the classification of the horse, its owner and the jockey.

40

However, such prior checks are made at the stage of creating the list for the race in question. They thus constitute investment in the creation of data and not in the verification of the contents of the database. 

41

It follows that the resources used to draw up a list of horses in a race and to carry out checks in that connection do not represent investment in the obtaining and verification of the contents of the database in which that list appears.

42

In the light of the foregoing, the second and third questions referred should be answered as follows:

The expression ‘investment in … the obtaining … of the contents’ of a database in Article 7(1) of the directive must be understood to refer to the resources used to seek out existing independent materials and collect them in the database. It does not cover the resources used for the creation of materials which make up the contents of a database.
The expression ‘investment in … the … verification … of the contents’ of a database in Article 7(1) of the directive must be understood to refer to the resources used, with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation. The resources used for verification during the stage of creation of materials which are subsequently collected in a database do not fall within that definition.
The resources used to draw up a list of horses in a race and to carry out checks in that connection do not constitute investment in the obtaining and verification of the contents of the database in which that list appears.

The seventh, eighth and ninth questions, on the terms ‘extraction’ and ‘re-utilisation’ in Article 7 of the directive

43

By its seventh, eighth and ninth questions, the referring court seeks essentially to know whether use such as that made by William Hill of a database constitutes extraction and/or re-utilisation within the meaning of Article 7 of the directive. The referring court asks, inter alia, whether the protection conferred by the sui generis right also covers the use of data which, although derived originally from a protected database, were obtained by the user from sources other than that database.

44

The protection of the sui generis right provided for by Article 7(1) of the directive gives the maker of a database the option of preventing the unauthorised extraction and/or re-utilisation of all or a substantial part of the contents of that database, according to the 41st recital of the preamble to the directive. Furthermore, Article 7(5) of the directive prohibits, under certain conditions, the unauthorised extraction and/or re-utilisation of insubstantial parts of the contents of a database.

45

The terms extraction and re-utilisation must be interpreted in the light of the objective pursued by the sui generis right. It is intended to protect the maker of the database against ‘acts by the user which go beyond [the] legitimate rights and thereby harm the investment’ of the maker, as indicated in the 42nd recital of the preamble to the directive.

46

According to the 48th recital of the preamble to the directive, the sui generis right has an economic justification, which is to afford protection to the maker of the database and guarantee a return on his investment in the creation and maintenance of the database.

47

Accordingly, it is not relevant, in an assessment of the scope of the protection of the sui generis right, that the act of extraction and/or re-utilisation is for the purpose of creating another database, whether in competition with the original database or not, and whether the same or a different size from the original, nor is it relevant that the act is part of an activity other than the creation of a database. The 42nd recital of the preamble to the directive confirms, in that connection, that ‘the right to prohibit extraction and/or re-utilisation of all or a substantial part of the contents relates not only to the manufacture of a parasitical competing product but also to any user who, through his acts, causes significant detriment, evaluated qualitatively or quantitatively, to the investment’.

48

It must also be pointed out that, although the Proposal for a Council Directive on the legal protection of databases (OJ 1992 C 156, p. 4), presented by the Commission on 15 April 1992, restricted the scope of the protection conferred by the sui generis right, under Article 2(5), to unauthorised extraction or re-utilisation ‘for commercial purposes’, the absence of any reference in Article 7 of the directive to such purposes indicates that it is irrelevant, in an assessment of the lawfulness of an act under the directive, whether the act is for a commercial or a non-commercial purpose.

49

In Article 7(2)(a) of the directive, extraction is defined as ‘the permanent or temporary transfer of all or a substantial part of the contents of a database to another medium by any means or in any form’, while in Article 7(2)(b), re-utilisation is defined as ‘any form of making available to the public all or a substantial part of the contents of a database by the distribution of copies, by renting, by on-line or other forms of transmission’.

50

The reference to ‘a substantial part’ in the definition of the concepts of extraction and re-utilisation gives rise to confusion given that, according to Article 7(5) of the directive, extraction or re-utilisation may also concern an insubstantial part of a database. As the Advocate General observes, in point 90 of her Opinion, the reference, in Article 7(2) of the directive, to the substantial nature of the extracted or re-utilised part does not concern the definition of those concepts as such but must be understood to refer to one of the conditions for the application of thesui generis right laid down by Article 7(1) of the directive.

51

The use of expressions such as ‘by any means or in any form’ and ‘any form of making available to the public’ indicates that the Community legislature intended to give the concepts of extraction and re-utilisation a wide definition. In the light of the objective pursued by the directive, those terms must therefore be interpreted as referring to any act of appropriating and making available to the public, without the consent of the maker of the database, the results of his investment, thus depriving him of revenue which should have enabled him to redeem the cost of the investment. 

52

Against that background, and contrary to the argument put forward by William Hill and the Belgian and Portuguese Governments, the concepts of extraction and re-utilisation cannot be exhaustively defined as instances of extraction and re-utilisation directly from the original database at the risk of leaving the maker of the database without protection from unauthorised copying from a copy of the database. That interpretation is confirmed by Article 7(2)(b) of the directive, according to which the first sale of a copy of a database within the Community by the rightholder or with his consent is to exhaust the right to control ‘resale’, but not the right to control extraction and re-utilisation of the contents, of that copy within the Community.

53

Since acts of unauthorised extraction and/or re-utilisation by a third party from a source other than the database concerned are liable, just as much as such acts carried out directly from that database are, to prejudice the investment of the maker of the database, it must be held that the concepts of extraction and re-utilisation do not imply direct access to the database concerned.

54

However, it must be stressed that the protection of the sui generis right concerns only acts of extraction and re-utilisation as defined in Article 7(2) of the directive. That protection does not, on the other hand, cover consultation of a database.

55

Of course, the maker of a database can reserve exclusive access to his database to himself or reserve access to specific people. However, if he himself makes the contents of his database or a part of it accessible to the public, his sui generis right does not allow him to prevent third parties from consulting that base.

56

The same applies where the maker of the database authorises a third party to re-utilise the contents of his database, in other words, to distribute it to the public. According to the definition of re-utilisation in Article 7(2)(b) of the directive, read in conjunction with the 41st recital of the preamble thereto, the authorisation of the maker for the re-utilisation of the database or a substantial part of it implies that he consents to his database or the relevant part of it being made accessible to the public by the third party to whom he gave that authorisation. In authorising re-utilisation, the maker of the database thus creates an alternative means of access to the contents of and of consultation of his database for those interested.

57

The fact that a database can be consulted by third parties through someone who has authorisation for re-utilisation from the maker of the database does not, however, prevent the maker from recovering the costs of his investment. It is legitimate for the maker to charge a fee for the re-utilisation of the whole or a part of his database which reflects, inter alia, the prospect of subsequent consultation and thus guarantees him a sufficient return on his investment.

58

On the other hand, a lawful user of a database, in other words, a user whose access to the contents of a database for the purpose of consultation results from the direct or indirect consent of the maker of the database, may be prevented by the maker, under the sui generis right provided for by Article 7(1) of the directive, from then carrying out acts of extraction and/or re-utilisation of the whole or a substantial part of the database. The consent of the maker of the database to consultation does not entail exhaustion of the sui generis right.

59

That analysis is confirmed, as regards extraction, by the 44th recital of the preamble to the directive, according to which, ‘when on-screen display of the contents of a database necessitates the permanent or temporary transfer of all or a substantial part of such contents to another medium, that act should be subject to authorisation by the rightholder’. Similarly, as regards re-utilisation, the 43rd recital of the preamble to the directive states that ‘in the case of on-line transmission, the right to prohibit re-utilisation is not exhausted either as regards the database or as regards a material copy of the database or of part thereof made by the addressee of the transmission with the consent of the rightholder’.

60

It should, however, be emphasised that the prohibition in Article 7(1) of the directive concerns only extraction and/or re-utilisation of the whole or of a substantial part of a database whose creation required a substantial investment. According to Article 8(1) of the directive, apart from in the cases referred to in Article 7(5) of the directive, the sui generis right does not prevent a lawful user from extracting and re-utilising insubstantial parts of the contents of a database.

61

It follows from the foregoing that acts of extraction, in other words, the transfer of the contents of the database to another medium, and acts of re‑utilisation, in other words, the making available to the public of the contents of a database, which affect the whole or a substantial part of the contents of a database require the authorisation of the maker of the database, even where he has made his database, as a whole or in part, accessible to the public or authorised a specific third party or specific third parties to distribute it to the public.

62

The directive contains an exception to the principle set out in the previous paragraph. Article 9 defines exhaustively three cases in which Member States may stipulate that lawful users of a database which is made available to the public in whatever manner may, without the authorisation of its maker, extract or re-utilise a ‘substantial part’ of the contents of that database. Those cases are: extraction for private purposes of the contents of a non-electronic database, extraction for the purposes of illustration for teaching or scientific research and extraction and/or re-utilisation for the purposes of public security or an administrative or judicial procedure.

63

In the case in the main proceedings, the order for reference states that the data concerning horse races which William Hill displays on its internet site and which originate in the BHB database are obtained, first, from newspapers published the day before the race and, second, from the RDF supplied by SIS.

64

According to the order for reference, the information published in the newspapers is supplied to the press directly by Weatherbys Group Ltd, the company which maintains the BHB database. As regards William Hill’s other source of information, it must be borne in mind that SIS is authorised by Racing Pages Ltd, which is partly controlled by Weatherbys Group Ltd, to supply information concerning horse races in the form of RDF to its own members, which include William Hill. The data in the BHB database concerning horse races have thus been made accessible to the public for the purpose of consultation with the authorisation of BHB.

65

Although William Hill is a lawful user of the database made accessible to the public, at least as regards the part of that database representing information about races, it appears from the order for reference that it carries out acts of extraction and re-utilisation within the meaning of Article 7(2) of the directive. First, it extracts data originating in the BHB database by transferring them from one medium to another. It integrates those data into its own electronic system. Second, it re-utilises those data by then making them available to the public on its internet site in order to allow its clients to bet on horse races.

66

According to the order for reference, that extraction and re-utilisation was carried out without the authorisation of BHB and Others. Since the present case does not fall within any of the cases described in Article 9 of the directive, acts such as those carried out by William Hill could be prevented by BHB and Others under their sui generis right provided that they affect the whole or a substantial part of the contents of the BHB database within the meaning of Article 7(1) of the directive. If such acts affected insubstantial parts of the database they would be prohibited only if the conditions in Article 7(5) of the directive were fulfilled.

67

In the light of the foregoing, the seventh, eighth and ninth questions should be answered as follows:

The terms ‘extraction’ and ‘re-utilisation’ in Article 7 of the directive must be interpreted as referring to any unauthorised act of appropriation and distribution to the public of the whole or a part of the contents of a database. Those terms do not imply direct access to the database concerned.
The fact that the contents of a database were made accessible to the public by its maker or with his consent does not affect the right of the maker to prevent acts of extraction and/or re-utilisation of the whole or a substantial part of the contents of a database.

The first, fourth, fifth and sixth questions, concerning the terms ‘substantial part’ and ‘insubstantial part’ of the contents of a database in Article 7 of the directive

68

By its fourth, fifth and sixth questions, the referring court raises the question of the meaning of the terms ‘substantial part’ and ‘insubstantial part’ of the contents of a database as used in Article 7 of the directive. By its first question it also seeks to know whether materials derived from a database do not constitute a part, substantial or otherwise, of that database, where their systematic or methodical arrangement and the conditions of their individual accessibility have been altered by the person carrying out the extraction and/or re-utilisation.

69

In that connection, it must be borne in mind that protection by the sui generis right covers databases whose creation required a substantial investment. Against that background, Article 7(1) of the directive prohibits extraction and/or re-utilisation not only of the whole of a database protected by the sui generis right but also of a substantial part, evaluated qualitatively or quantitatively, of its contents. According to the 42nd recital of the preamble to the directive, that provision is intended to prevent a situation in which a user ‘through his acts, causes significant detriment, evaluated qualitatively or quantitatively, to the investment’. It appears from that recital that the assessment, in qualitative terms, of whether the part at issue is substantial, must, like the assessment in quantitative terms, refer to the investment in the creation of the database and the prejudice caused to that investment by the act of extracting or re-utilising that part.

70

The expression ‘substantial part, evaluated quantitatively’, of the contents of a database within the meaning of Article 7(1) of the directive refers to the volume of data extracted from the database and/or re-utilised, and must be assessed in relation to the volume of the contents of the whole of that database. If a user extracts and/or re-utilises a quantitatively significant part of the contents of a database whose creation required the deployment of substantial resources, the investment in the extracted or re-utilised part is, proportionately, equally substantial.

71

The expression ‘substantial part, evaluated qualitatively’, of the contents of a database refers to the scale of the investment in the obtaining, verification or presentation of the contents of the subject of the act of extraction and/or re-utilisation, regardless of whether that subject represents a quantitatively substantial part of the general contents of the protected database. A quantitatively negligible part of the contents of a database may in fact represent, in terms of obtaining, verification or presentation, significant human, technical or financial investment.

72

It must be added that, as the existence of the sui generis right does not, according to the 46th recital of the preamble to the directive, give rise to the creation of a new right in the works, data or materials themselves, the intrinsic value of the materials affected by the act of extraction and/or re-utilisation does not constitute a relevant criterion for the assessment of whether the part at issue is substantial.

73

It must be held that any part which does not fulfil the definition of a substantial part, evaluated both quantitatively and qualitatively, falls within the definition of an insubstantial part of the contents of a database.

74

In that regard, it appears from the order for reference that the materials displayed on William Hill’s internet sites, which derive from the BHB database, represent only a very small proportion of the whole of that database, as stated in paragraph 19 of this judgment. It must therefore be held that those materials do not constitute a substantial part, evaluated quantitatively, of the contents of that database.

75

According to the order for reference, the information published by William Hill concerns only the following aspects of the BHB database: the names of all the horses running in the race concerned, the date, the time and/or the name of the race and the name of the racecourse, as also stated in paragraph 19 of this judgment.

76

In order to assess whether those materials represent a substantial part, evaluated qualitatively, of the contents of the BHB database, it must be considered whether the human, technical and financial efforts put in by the maker of the database in obtaining, verifying and presenting those data constitute a substantial investment.

77

BHB and Others submit, in that connection, that the data extracted and re-utilised by William Hill are of crucial importance because, without lists of runners, the horse races could not take place. They add that those data represent a significant investment, as demonstrated by the role played by a call centre employing more than 30 operators.

78

However, it must be observed, first, that the intrinsic value of the data affected by the act of extraction and/or re-utilisation does not constitute a relevant criterion for assessing whether the part in question is substantial, evaluated qualitatively. The fact that the data extracted and re-utilised by William Hill are vital to the organisation of the horse races which BHB and Others are responsible for organising is thus irrelevant to the assessment whether the acts of William Hill concern a substantial part of the contents of the BHB database.

79

Next, it must be observed that the resources used for the creation as such of the materials included in a database cannot be taken into account in assessing whether the investment in the creation of that database was substantial, as stated in paragraphs 31 to 33 of this judgment.

80

The resources deployed by BHB to establish, for the purposes of organising horse races, the date, the time, the place and/or name of the race, and the horses running in it, represent an investment in the creation of materials contained in the BHB database. Consequently, and if, as the order for reference appears to indicate, the materials extracted and re-utilised by William Hill did not require BHB and Others to put in investment independent of the resources required for their creation, it must be held that those materials do not represent a substantial part, in qualitative terms, of the BHB database.

81

That being so, there is thus no need to reply to the first question referred. The change made by the person making the extraction and re-utilisation to the arrangement or the conditions of individual accessibility of the data affected by that act cannot, in any event, have the effect of transforming a part of the contents of the database at issue which is not substantial into a substantial part.

82

In the light of the foregoing, the fourth, fifth and sixth questions referred should be answered as follows:

– The expression ‘substantial part, evaluated … quantitatively, of the contents of [a] database’ in Article 7 of the directive refers to the volume of data extracted from the database and/or re-utilised and must be assessed in relation to the total volume of the contents of the database.
– The expression ‘substantial part, evaluated qualitatively … of the contents of [a] database’ refers to the scale of the investment in the obtaining, verification or presentation of the contents of the subject of the act of extraction and/or re-utilisation, regardless of whether that subject represents a quantitatively substantial part of the general contents of the protected database.
– Any part which does not fulfil the definition of a substantial part, evaluated both quantitatively and qualitatively, falls within the definition of an insubstantial part of the contents of a database.

The 10th question, concerning the scope of the prohibition laid down by Article 7(5) of the directive

83

By its 10th question, the referring court seeks to know what type of act is covered by the prohibition laid down by Article 7(5) of the directive. It also seeks to know whether acts such as those carried out by William Hill are covered by that prohibition.

84

On that point, it appears from Article 8(1) and from the 42nd recital of the preamble to the directive that, as a rule, the maker of a database cannot prevent a lawful user of that database from carrying out acts of extraction and re-utilisation of an insubstantial part of its contents. Article 7(5) of the directive, which authorises the maker of the database to prevent such acts under certain conditions, thus provides for an exception to that general rule.

85

Common Position (EC) No 20/95 adopted by the Council on 10 July 1995 (OJ 1995 C 288, p. 14) states, under point 14 of the Council’s statement of reasons: ‘to ensure that the lack of protection of the insubstantial parts does not lead to their being repeatedly and systematically extracted and/or re-utilised, paragraph 5 of this article in the common position introduces a safeguard clause’. 

86

It follows that the purpose of Article 7(5) of the directive is to prevent circumvention of the prohibition in Article 7(1) of the directive. Its objective is to prevent repeated and systematic extractions and/or re-utilisations of insubstantial parts of the contents of a database, the cumulative effect of which would be to seriously prejudice the investment made by the maker of the database just as the extractions and/or re-utilisations referred to in Article 7(1) of the directive would.

87

The provision therefore prohibits acts of extraction made by users of the database which, because of their repeated and systematic character, would lead to the reconstitution of the database as a whole or, at the very least, of a substantial part of it, without the authorisation of the maker of the database, whether those acts were carried out with a view to the creation of another database or in the exercise of an activity other than the creation of a database.

88

Similarly, Article 7(5) of the directive prohibits third parties from circumventing the prohibition on re-utilisation laid down by Article 7(1) of the directive by making insubstantial parts of the contents of the database available to the public in a systematic and repeated manner.

89

Under those circumstances, ‘acts which conflict with a normal exploitation of [a] database or which unreasonably prejudice the legitimate interests of the maker of the database’ refer to unauthorised actions for the purpose of reconstituting, through the cumulative effect of acts of extraction, the whole or a substantial part of the contents of a database protected by the sui generis right and/or of making available to the public, through the cumulative effect of acts of re-utilisation, the whole or a substantial part of the contents of such a database, which thus seriously prejudice the investment made by the maker of the database.

90

In the case in the main proceedings, it is clear, in the light of the information given in the order for reference, that the acts of extraction and re-utilisation carried out by William Hill concern insubstantial parts of the BHB database, as stated in paragraphs 74 to 80 of this judgment. According to the order for reference, they are carried out on the occasion of each race held. They are thus of a repeated and systematic nature.

91

However, such acts are not intended to circumvent the prohibition laid down in Article 7(1) of the directive. There is no possibility that, through the cumulative effect of its acts, William Hill might reconstitute and make available to the public the whole or a substantial part of the contents of the BHB database and thereby seriously prejudice the investment made by BHB in the creation of that database.

92

It must be pointed out in that connection that, according to the order for reference, the materials derived from the BHB database which are published daily on William Hill’s internet sites concern only the races for that day and are limited to the information mentioned in paragraph 19 of this judgment.

93

As explained in paragraph 80 of this judgment, it appears from the order for reference that the presence, in the database of the claimants, of the materials affected by William Hill’s actions did not require investment by BHB and Others independent of the resources used for their creation.

94

It must therefore be held that the prohibition in Article 7(5) of the directive does not cover acts such as those of William Hill.

95

In the light of the foregoing, the answer to the 10th question must be that the prohibition laid down by Article 7(5) of the directive refers to unauthorised acts of extraction or re-utilisation the cumulative effect of which is to reconstitute and/or make available to the public, without the authorisation of the maker of the database, the whole or a substantial part of the contents of that database and thereby seriously prejudice the investment by the maker.

96

Against that background, it is not necessary to reply to the 11th question referred.

Costs

97

Since these proceedings are, for the parties to the main proceedings, a step in the action pending before the national court, the decision on costs is a matter for that court. Costs incurred in submitting observations to the Court, other than the costs of those parties, are not recoverable.

On those grounds, the Court (Grand Chamber) rules as follows:

1.
The expression ‘investment in … the obtaining … of the contents’ of a database in Article 7(1) of Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases must be understood to refer to the resources used to seek out existing independent materials and collect them in the database. It does not cover the resources used for the creation of materials which make up the contents of a database.
The expression ‘investment in … the … verification … of the contents’ of a database in Article 7(1) of Directive 96/9 must be understood to refer to the resources used, with a view to ensuring the reliability of the information contained in that database, to monitor the accuracy of the materials collected when the database was created and during its operation. The resources used for verification during the stage of creation of materials which are subsequently collected in a database do not fall within that definition. 
The resources used to draw up a list of horses in a race and to carry out checks in that connection do not constitute investment in the obtaining and verification of the contents of the database in which that list appears.
2.
The terms ‘extraction’ and ‘re-utilisation’ as defined in Article 7 of Directive 96/9 must be interpreted as referring to any unauthorised act of appropriation and distribution to the public of the whole or a part of the contents of a database. Those terms do not imply direct access to the database concerned.
The fact that the contents of a database were made accessible to the public by its maker or with his consent does not affect the right of the maker to prevent acts of extraction and/or re-utilisation of the whole or a substantial part of the contents of a database.
3.
The expression ‘substantial part, evaluated … quantitatively, of the contents of [a] database’ in Article 7 of Directive 96/9 refers to the volume of data extracted from the database and/or re-utilised and must be assessed in relation to the total volume of the contents of the database.
The expression ‘substantial part, evaluated qualitatively … of the contents of [a] database’ refers to the scale of the investment in the obtaining, verification or presentation of the contents of the subject of the act of extraction and/or re-utilisation, regardless of whether that subject represents a quantitatively substantial part of the general contents of the protected database.
Any part which does not fulfil the definition of a substantial part, evaluated both quantitatively and qualitatively, falls within the definition of an insubstantial part of the contents of a database.
4.
The prohibition laid down by Article 7(5) of Directive 96/9 refers to unauthorised acts of extraction or re-utilisation the cumulative effect of which is to reconstitute and/or make available to the public, without the authorisation of the maker of the database, the whole or a substantial part of the contents of that database and thereby seriously prejudice the investment by the maker.

4.4 Useful Articles 4.4 Useful Articles

4.4.1 Pivot Point, Int'l v. Charlene Products 4.4.1 Pivot Point, Int'l v. Charlene Products

372 F.3d 913

PIVOT POINT INTERNATIONAL, INCORPORATED, Plaintiff-Appellant, Cross-Appellee,
v.
CHARLENE PRODUCTS, INCORPORATED and Peter Yau, Defendants-Appellees, Cross-Appellants.

No. 01-3888.
No. 02-1152.
United States Court of Appeals, Seventh Circuit.
Argued June 6, 2003.
Decided June 25, 2004.
Rehearing En Banc Denied August 10, 2004.[1]

[915] Robert E. Browne (Argued), Neal, Gerber & Eisenberg, Chicago, IL, for Plaintiff-Appellant, Cross-Appellee.

James B. Meyer (Argued), Meyer & Wyatt, Gary, IN, Martin H. Redish (Argued), Mayer, Brown, Rowe & Maw, Chicago, IL, for Defendants-Appellees, Cross-Appellants.

Before RIPPLE, KANNE and DIANE P. WOOD, Circuit Judges.

RIPPLE, Circuit Judge. Pivot Point International, Inc. ("Pivot Point"), brought this cause of action against Charlene Products, Inc., and its president Peter Yau (collectively "Charlene"), for copyright infringement pursuant to 17 U.S.C. § 501(b). The district court granted summary judgment for the defendants on the ground that the copied subject matter, a mannequin head, was not copyrightable under the Copyright Act of 1976 ("1976 Act"), 17 U.S.C. § 101 et seq. For the reasons set forth in the following opinion, we reverse the judgment of the district court and remand the case for proceedings consistent with this opinion. 

I. BACKGROUND

A. Facts

Pivot Point develops and markets educational techniques and tools for the hair design industry. It was founded in 1965 by Leo Passage, an internationally renowned hair designer. One aspect of Pivot Point's business is the design and development of mannequin heads, "slip-ons" (facial forms that slip over a mannequin head) and component hair pieces.

In the mid-1980s, Passage desired to develop a mannequin that would imitate the "hungry look" of high-fashion, runway models. Passage believed that such a mannequin could be marketed as a premium item to cutting-edge hair-stylists and to stylists involved in hair design competitions. Passage then worked with a German artist named Horst Heerlein to create an original sculpture of a female human head. Although Passage discussed his vision with Heerlein, Passage did not give Heerlein any specific dimensional requirements. From Passage's description, Heerlein created a sculpture in plaster entitled "Mara."

Wax molds of Mara were made and sent to Pivot Point's manufacturer in Hong Kong. The manufacturer created exact reproductions of Mara in polyvinyl chloride ("PVC"). The manufacturer filled the PVC form with a liquid that expands and hardens into foam. The process of creating the Mara sculpture and of developing the mannequin based on the sculpture took approximately eighteen months.

In February of 1988, when Pivot Point first inspected the PVC forms of Mara, it discovered that the mannequin's hairline had been etched too high on the forehead. The manufacturer corrected the mistake by adding a second, lower hairline. Although the first, higher hairline was visible upon inspection, it was covered with implanted hair. The early PVC reproductions of Mara, and Pivot Point's first shipment of the mannequins in May of 1988, possessed the double hairlines.

About the same time that it received its first shipment of mannequins, Pivot Point obtained a copyright registration for the design of Mara, specifically the bareheaded female human head with no makeup or hair. Heerlein assigned all of his rights in the Mara sculpture to Pivot Point. Pivot Point displayed the copyright notice in the name of Pivot Point on each mannequin.

Pivot Point enjoyed great success with its new mannequin. To respond to customer demand, Pivot Point began marketing the Mara mannequin with different types and lengths of hair, different skin [916] tones and variations in makeup; however, no alterations were made to the facial features of the mannequin. For customer ease in identification, Pivot Point changed the name of the mannequin based on its hair and skin color; for instance, a Mara mannequin implanted with yak hair was called "Sonja," and the Mara mannequin implanted with blonde hair was called "Karin."

At a trade show in 1989, Charlene, a wholesaler of beauty products founded by Mr. Yau,[2] displayed its own "Liza" mannequin, which was very close in appearance to Pivot Point's Mara. In addition to the strikingly similar facial features, Liza also exhibited a double hairline that the early Mara mannequins possessed.

On September 24, 1989, Pivot Point noticed Charlene for copyright infringement. When Charlene refused to stop importing and selling the Liza mannequin, Pivot Point filed this action.[3]

B. District Court Proceedings

Pivot Point filed a multi-count complaint in district court against Charlene. It alleged violations of federal copyright law as well as state-law claims; Charlene both answered the complaint and counterclaimed. After extensive discovery, Pivot Point filed a comprehensive motion for summary judgment on its complaint and Charlene's counterclaims. Charlene filed several cross-motions for summary judgment as well. The district court tentatively ruled on these motions in July 2001 and issued a final ruling in October 2001.

1. Merits

In its opinion, the district court stated that "[t]he principal dispute is whether a human mannequin head is copyrightable subject matter. If it is, then there must be a trial on the question whether Liza is a knock off of Mara." R.401 at 1. The district court explained that, although sculptural works are copyrightable under 17 U.S.C. § 102(a)(5), sculptures that may be copyrighted are limited by the language of 17 U.S.C. § 101, which provides in relevant part:

Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.

According to the district court, there was no question that Mara was a sculpture. However, in the district court's view, the sculpture served utilitarian ends. "Students in beauty schools practice styling hair on Mara's head and may practice other skills by applying makeup to Mara's eyes, lips, and cheeks. The parties dispute which functions are primary." R.401 at 2.

The district court then explored whether the artistic and utilitarian aspects of Mara were "separable" for purposes of the piece's copyrightability: "The statutory separability requirement confines copyright protection to those aspects of the design that exist apart from its utilitarian value, and that could be removed without reducing the usefulness of the item." Id. at 3. The district court observed that [917] drawing this line is particularly troublesome.

The statute, continued the district court, is generally recognized to suggest two types of separability: physical separability and conceptual separability. The district court explained that physical separability occurs when the ornamental nature of the object can be physically removed from the object and that

[c]onceptual separability differs from physical separability by asking not whether the features to be copyrighted could be sliced off for separate display, but whether one can conceive of this process. Relying on a comment in the House Report on the 1976 amendments, the second circuit in Kieselstein-Cord [v. Accessories by Pearl, Inc., 632 F.2d 989 (2d Cir.1980),] purported to adopt conceptual separability as the exclusive test (632 F.2d at 992, contrasting that approach with Esquire [v. Ringer, 591 F.2d 796 (D.C.Cir.1978)], which opted for physical separability, 591 F.2d at 803-04). Why a court should repair to the legislative history is unclear; the second circuit did not identify any ambiguity in § 101 that needed to be resolved, and a statement in the House Report that what appears on the face of the statutory text to be two requirements (physical and conceptual separability) should be administered as just one is not a proposition that in today's legal climate can be indulged. The Supreme Court does not permit the use of legislative history to alter, as opposed to elucidate, a statutory text.

Id. at 4.

Despite this lack of statutory moorings, the district court nevertheless reviewed the differing formulations for conceptual separability and determined that the definition proposed by Professor Paul Goldstein was the best one: "a pictorial, graphic or sculptural feature incorporated in the design of a useful article is conceptually separable if it can stand on its own as work of art traditionally conceived, and if the useful article in which it is embodied would be equally useful without it." R.401 at 5 (quoting 1 Paul Goldstein, Copyright: Principles, Law & Practice § 2.5.3, at 109 (1989)). The district court believed that the strength of this definition "comes from the fact that it differs little, if at all, from the test of physical separability embraced by the D.C. Circuit in Esquire and by the majority in Carol Barnhart [Inc., v. Economy Cover Corp., 773 F.2d 411, 418 (2d Cir.1985)]." Id. Applying this test led the district court to conclude that

Mara cannot be copyrighted because, even though one can conceive of Mara as a sculpture displayed as art, it would not be equally useful if the features that Pivot Point want to copyright were removed. So long as a utilitarian function is makeup tutoring and practice and the fact that Pivot Points sells Mara without eye or lip coloring shows that this is a function even if not, in Pivot Point's view, the "primary" one — the utilitarian value would be diminished by removing the aesthetic features that Pivot Point wants to protect by copyright.

Id.

As a final matter, the district court distinguished two cases, Hart v. Dan Chase Taxidermy Supply Co., 86 F.3d 320 (2d Cir.1996), and Superior Form Builders, Inc. v. Dan Chase Taxidermy Supply Co., Inc., 74 F.3d 488 (4th Cir.1996), which upheld the copyrightability of animal and fish mannequins. The district court found the Hart case unpersuasive, but concluded that "one cannot say of Mara what the fourth circuit said of animal mannequins: Mara is valued not for 'its own appearance' but for what it enables students to do and learn. Mara is a 'useful article' as § 101 and Superior Form Builders deploy that term." Id. at 6.

2. Fee Petition

[918] Although fees are available under the 1976 Act, the district court's order made no provision for fees. Charlene, therefore, sought an award of attorneys' fees of approximately $421,915 pursuant to 17 U.S.C. § 505. Charlene submitted its fees to Pivot Point and sought to confer and exchange information as required by Northern District of Illinois Local Rule 54.3(d). Pivot Point would not participate in this exercise on the basis that any fee request would be untimely because Charlene had missed the fourteen-day deadline for filing a fee motion set forth in Federal Rule of Civil Procedure 54(d)(2)(B).

Charlene then moved for an instruction from the district court ordering Pivot Point to participate in the fee request process but the district court refused. It explained that its "opinion and declaratory judgment resolving this case on the merits did not make any provision for attorneys' fees." R.413 at 1. Because the judgment did not contain an order with respect to an attorneys' fee petition, the district court did not believe Local Rule 54.3 was applicable. Instead, the parties were bound by the fourteen-day deadline set forth in Federal Rule 54(d)(2)(B). Furthermore, the district court believed that its reading of Local Rule 54.3 — as not extending the time period allowed in Federal Rule 54 — saved the local rule because otherwise it would be inconsistent with Federal Rule 54 and therefore invalid pursuant to Federal Rule 83.[4]

Finally, the district court acknowledged that it had the discretion to extend the time to file such a motion; however, it stated that it was "not even slightly disposed to grant any [extension], because the parties knew well before October 2 what the judgment was likely to provide." Id. at 1.

Pivot Point now appeals from the district court's summary judgment in favor of Charlene; Charlene appeals from the district court's judgment with respect to its attorneys' fee petition.

II. ANALYSIS

A. Standard of Review

This court reviews de novo a district court's grant of summary judgment. See Silk v. City of Chicago, 194 F.3d 788, 798 (7th Cir.1999). In evaluating the judgment, we "construe all facts in the light most favorable to the non-moving party and draw all reasonable and justifiable inferences in favor of that party." Bellaver v. Quanex Corp., 200 F.3d 485, 491-92 (7th Cir.2000). If the record shows "that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law," summary judgment is appropriate. Fed.R.Civ.P. 56(c); see Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986).

B. Copyrightability

[919] The central issue in this case is whether the Mara mannequin is subject to copyright protection. This issue presents, at bottom, a question of statutory interpretation. We therefore begin our analysis with the language of the statute. Two provisions contained in 17 U.S.C. § 101 are at the center of our inquiry. The first of these is the description of pictorial, graphic and sculptural works:

Pictorial, graphic, and sculptural works" include two-dimensional and three-dimensional works of fine, graphic, and applied art, photographs, prints and art reproductions, maps, globes, charts, diagrams, models, and technical drawings, including architectural plans. Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.

The definition section further provides that "[a] 'useful article' is an article having an intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information. An article that is normally a part of a useful article is considered a 'useful article.'" 17 U.S.C. § 101. As is clear from the definition of pictorial, graphic and sculptural work, only "useful article[s]," as the term is further defined, are subject to the limitation contained in the emphasized language above. If an article is not "useful" as the term is defined in § 101, then it is a pictorial, graphic and sculptural work entitled to copyright protection (assuming the other requirements of the statute are met).

1. Usefulness

Pivot Point submits that the Mara mannequin is not a "useful article" for purposes of § 101 because its "inherent nature is to portray the appearance of runway models. Its value," continues Pivot Point, "resides in how well it portrays the appearance of runway models, just as the value of a bust — depicting Cleopatra, for example, ... — would be in how well it approximates what one imagines the subject looked like." Appellant's Br. at 19. Pivot Point relies upon the decisions of the Fourth Circuit in Superior Form Builders and of the Second Circuit in Hart for the proposition that mannequins, albeit in those cases animal and fish mannequins, are not useful articles. Specifically, the Fourth Circuit explained that

[a] mannequin provides the creative form and expression of the ultimate animal display.... Even though covered with a skin, the mannequin is not invisible but conspicuous in the final display. The angle of the animal's head, the juxtaposition of its body parts, and the shape of the body parts in the final display is little more than the portrayal of the underlying mannequin. Indeed, the mannequin can even portray the intensity of flexed body parts, or it can reveal the grace of relaxed ones. None of these expressive aspects of a mannequin is lost by covering the mannequin with a skin. Thus, any utilitarian aspect of the mannequin exists "merely to portray the appearance" of the animal.

Superior Form Builders, 74 F.3d at 494; see also Hart, 86 F.3d at 323 ("The function of the fish form is to portray its own appearance, and that fact is enough to bring it within the scope of the Copyright Act."). Consequently, in Pivot Point's view, because the Mara mannequin performs functions similar to those of animal [920] and fish mannequins, it is not a useful article and is therefore entitled to full copyright protection.

Charlene presents us with a different view. It suggests that, unlike the animal mannequins at issue in Superior Form Builders and in Hart, the Mara mannequin does have a useful function other than portraying an image of a high-fashion runway model. According to Charlene, Mara also is marketed and used for practicing the art of makeup application. Charlene points to various places in the record that establish that Mara is used for this purpose and is, therefore, a useful article subject to the limiting language of § 101.

Pivot Point strongly disputes that the record establishes such a use and argues that the district court's reliance on Charlene's alleged proof improperly resolves an issue of fact against the non-moving party in contravention of Federal Rule of Civil Procedure 56.[5] Indeed, our own review of the record leads us to believe that many of the documents cited by Charlene are susceptible to more than one interpretation.

Nevertheless, we shall assume that the district court correctly ruled that Mara is a useful article and proceed to examine whether, despite that usefulness, it is amenable to copyright protection.

2. Separability

We return to the statutory language. A useful article falls within the definition of pictorial, graphic or sculptural works "only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article." 17 U.S.C. § 101.[6] It is common [921] ground between the parties and, indeed, among the courts that have examined the issue, that this language, added by the 1976 Act, was intended to distinguish creative works that enjoy protection from elements of industrial design that do not. See H.R.Rep. No. 94-1476, at 55 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5668 (stating that the purpose behind this language was "to draw as clear a line as possible between copyrightable works of applied art and uncopyrighted works of industrial design"). Although the Congressional goal was evident, application of this language has presented the courts with significant difficulty. Indeed, one scholar has noted: "Of the many fine lines that run through the Copyright Act, none is more troublesome than the line between protectible pictorial, graphic and sculptural works and unprotectible utilitarian elements of industrial design." Paul Goldstein, 1 Copyright § 2.5.3, at 2:56 (2d ed.2004).

The difficulty in the application of this language would not have come, in all likelihood, as a surprise to the Congressional drafters. The language employed by Congress is not the language of a bright-line rule of universal application. Indeed, the circuits that have addressed the interpretative problem now before us uniformly have recognized that the wording of the statute does not supply categorical direction, but rather requires the Copyright Office and the courts "to continue their efforts to distinguish applied art and industrial design." Robert C. Denicola, Applied Art & Industrial Design: A Suggested Approach to Copyright in Useful Articles, 67 Minn. L.Rev. 707, 730 (1983). In short, no doubt well-aware of the myriad of factual scenarios to which its policy guidance would have to be applied, Congress wisely chose to provide only general policy guidance to be implemented on a case-by-case basis through the Copyright Office and the courts.

Even though the words of the statute do not yield a definitive answer, we believe that the statutory language nevertheless provides significant guidance in our task. We therefore shall examine in more detail what that language has to tell us, and we return to the necessary starting point of our task, § 101.

The statutory language provides that "the design of a useful article ... shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from and are capable of existing independently of, the utilitarian aspects of the article." Although the italicized clause contains two operative phrases — "can be identified separately from" and "are capable of existing independently of" — we believe, as have the other courts that have grappled with this issue,[7] that Congress, in amending the statute, intended these two phrases to state a single, integrated standard to determine when there is sufficient separateness between the utilitarian and artistic aspects of a work to justify copyright protection.

[922] Certainly, one approach to determine whether material can be "identified separately," and the most obvious, is to rely on the capacity of the artistic material to be severed physically from the industrial design. See Mazer v. Stein, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630 (1954) (holding that a statuette incorporated into the base of a lamp is copyrightable). When a three-dimensional article is the focus of the inquiry, reliance on physical separability can no doubt be a helpful tool in ascertaining whether the artistic material in question can be separated from the industrial design. As Professor Denicola points out, however, such an approach really is not of much use when the item in question is two-dimensional. See Denicola, supra, at 744. Indeed, because this provision, by its very words, was intended to apply to two-dimensional material, it is clear that a physical separability test cannot be the exclusive test for determining copyrightability.

It seems to be common ground between the parties and, indeed, among the courts and commentators, that the protection of the copyright statute also can be secured when a conceptual separability exists between the material sought to be copyrighted and the utilitarian design in which that material is incorporated.[8] The [923] difficulty lies not in the acceptance of that proposition, which the statutory language clearly contemplates, but in its application. As noted by Pivot Point, the following tests have been suggested for determining when the artistic and utilitarian aspects of useful articles are conceptually separable: 1) the artistic features are "primary" and the utilitarian features "subsidiary," Kieselstein-Cord, 632 F.2d at 993; 2) the useful article "would still be marketable to some significant segment of the community simply because of its aesthetic qualities," Melville B. Nimmer & David Nimmer, 1 Nimmer on Copyright § 2.08[B][3], at 2-101 (2004); 3) the article "stimulate[s] in the mind of the beholder a concept that is separate from the concept evoked by its utilitarian function," Carol Barnhart, 773 F.2d at 422 (Newman, J., dissenting); 4) the artistic design was not significantly influenced by functional considerations, see Brandir Int'l, 834 F.2d at 1145 (adopting the test forwarded in Denicola, supra, at 741); 5) the artistic features "can stand alone as a work of art traditionally conceived, and ... the useful article in which it is embodied would be equally useful without it," Goldstein, 1 Copyright § 2.5.3, at 2:67; and 6) the artistic features are not utilitarian, see William F. Patry, 1 Copyright Law & Practice 285 (1994).

Pivot Point submits that "the test for conceptual separability should reflect the focus of copyright law — the artistic, not the marketability, design process, or usefulness." Appellant's Br. at 26. According to Pivot Point, the central inquiry is whether the article is a "'work of art.'" Id. Pivot Point further explains:

Conceptual separability would inhere in a "work of art" integrated into a useful article, or a "work of art" put to unexpected use, since the independent concepts of art and utility coexist. Conceptual separability would not exist in a useful article rendered simply aesthetically pleasing, since the independent concept of art does not exist, only the "artistic" embellishment to its utility, so that such "artistic" features are actually utilitarian. Should the "artistic" embellishment of utility reach the level of a "work of art," however, conceptual separability may exist.

Id. at 26-27. This test, Pivot Point suggests, has the additional benefit of "satisf[ying] most, if not all, of the current definitions of conceptual separability." Id. at 27.

Charlene, by contrast, lauds the district court's adoption of Professor Goldstein's test. "Under Goldstein's test," Charlene [924] asserts, "'a pictorial, graphic or sculptural feature incorporated in the design of a useful article is conceptually separable if it can stand on its own as a work of art traditionally conceived, and if the useful article in which it is embodied would be equally useful without it.'" Appellees' Br. at 26 (quoting R.401 at 5; emphasis added). Charlene contends that this approach mirrors that adopted by the majority in Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411 (2d Cir.1985), "the most closely related precedent to the case at bar." Appellees' Br. at 26.

Although both sides present thoughtful explanations for their proposed tests, we perceive shortcomings in the parties' choices. With respect to Pivot Point's focus on the article as a "work of art," it is certainly correct that Congress, in enacting § 101, attempted to separate the artistic from the utilitarian. However, this approach necessarily involves judges in a qualitative evaluation of artistic endeavors — a function for which judicial office is hardly a qualifier. With respect to the Charlene's approach, we believe that the test, at least when applied alone, is tied too closely to physical separability and, consequently, does not give a sufficiently wide berth to Congress' determination that artistic material conceptually separate from the utilitarian design can satisfy the statutory mandate.

In articulating a meaningful approach to conceptual separability, we note that we are not the first court of appeals to deal with this problem. The work of our colleagues in the other circuits provides significant insights into our understanding of Congressional intent. Indeed, even when those judges have disagreed on the appropriate application of the Congressional mandate to the case before them, their insight yield a bountiful harvest for those of us who now walk the same interpretative path.

Among the circuits, the Court of Appeals for the Second Circuit has had occasion to wrestle most comprehensively with the notion of "conceptual separability." Its case law represents, we believe, an intellectual journey that has explored the key aspects of the problem. We therefore turn to a study of the key stages of doctrinal development in its case law.

a.

The Second Circuit first grappled with the issue of conceptual separability in Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989 (2d Cir.1980). In that case, Kieselstein-Cord, a jewelry designer, had created a line of decorative and jeweled belt buckles inspired by works of art; he obtained copyright registrations for his designs. When the line was successful, Accessories by Pearl, Inc., ("Pearl") copied the designs and marketed its own, less-expensive versions of the belt buckles. Kieselstein-Cord then sued Pearl for copyright infringement; however, Pearl claimed that the belt buckles were not copyrightable because they were "'useful articles' with no 'pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects' of the buckles." Id. at 991-92. The Second Circuit disagreed. Although it did not articulate a specific test for evaluating conceptual separability, it focused on the "primary" and "subsidiary" elements of the article and concluded:

We see in appellant's belt buckles conceptually separable sculptural elements, as apparently have the buckles' wearers who have used them as ornamentation for parts of the body other than the waist. The primary ornamental aspect of the Vaquero and Winchester buckles is conceptually separable from their subsidiary utilitarian function. This conclusion is not at variance with the [925] expressed congressional intent to distinguish copyrightable applied art and uncopyrightable industrial design. Pieces of applied art, these buckles may be considered jewelry, the form of which is subject to copyright protection.

Id. at 993 (internal citations omitted).[9]

b.

The Second Circuit revisited the issue of conceptual separability in Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411 (2d Cir.1985). In that case, Carol Barnhart, a provider of retail display items, developed four mannequins consisting of human torsos for the display of shirts and jackets. It obtained copyright registrations for each of the forms.[10] When a competitor, Economy Cover, copied the designs, Carol Barnhart claimed infringement of that copyright. The Second Circuit held that the designs were not copyrightable. It explained:

[W]hile copyright protection has increasingly been extended to cover articles having a utilitarian dimension, Congress has explicitly refused copyright protection for works of applied art or industrial design which have aesthetic or artistic features that cannot be identified separately from the useful article. Such works are not copyrightable regardless of the fact that they may be "aesthetically satisfying and valuable.

Applying these principles, we are persuaded that since the aesthetic and artistic features of the Barnhart forms are inseparable from the forms' use as utilitarian articles the forms are not copyrightable.... [Barnhart] stresses that the forms have been responded to as sculptural forms, and have been used for purposes other than modeling clothes, e.g., as decorating props and signs without any clothing or accessories. While this may indicate that the forms are "aesthetically satisfying and valuable," it is insufficient to show that the forms possess aesthetic or artistic features that are physically or conceptually separable from the forms' use as utilitarian objects to display clothes. On the contrary, to the extent the forms possess aesthetically pleasing features, even when these features are considered in the aggregate, they cannot be conceptualized as existing independently of their utilitarian function.

Id. at 418 (internal citations omitted). The court also rejected the argument that Kieselstein-Cord was controlling. The majority explained that what distinguished the Kieselstein-Cord buckles from the Barnhart forms was "that the ornamented surfaces of the buckles were not in any respect required by their functions; the artistic and aesthetic features would thus be conceived as having been added to, or superimposed upon, an otherwise utilitarian article." Id. at 419.

Perhaps the most theoretical and comprehensive discussion of "conceptual separability," as opposed to physical separability, can be found in the dissenting opinion of Judge Newman in Carol Barnhart, 773 F.2d at 419. After reviewing the possible ways to determine conceptual separability, Judge Newman set forth his choice and rationale:

How, then, is "conceptual separateness" to be determined? In my view, the answer derives from the word "conceptual." For the design features to be "conceptually separate" from the utilitarian [926] aspects of the useful article that embodies the design, the article must stimulate in the mind of the beholder a concept that is separate from the concept evoked by its utilitarian function. The test turns on what may reasonably be understood to be occurring in the mind of the beholder or, as some might say, in the "mind's eye" of the beholder....

The "separateness" of the utilitarian and non-utilitarian concepts engendered by an article's design is itself a perplexing concept. I think the requisite "separateness" exists whenever the design creates in the mind of the ordinary observer two different concepts that are not inevitably entertained simultaneously. Again, the example of the artistically designed chair displayed in a museum may be helpful. The ordinary observer can be expected to apprehend the design of a chair whenever the object is viewed. He may, in addition, entertain the concept of a work of art, but, if this second concept is engendered in the observer's mind simultaneously with the concept of the article's utilitarian function, the requisite "separateness" does not exist. The test is not whether the observer fails to recognize the object as a chair but only whether the concept of the utilitarian function can be displaced in the mind by some other concept. That does not occur, at least for the ordinary observer, when viewing even the most artistically designed chair. It may occur, however, when viewing some other object if the utilitarian function of the object is not perceived at all; it may also occur, even when the utilitarian function is perceived by observation, perhaps aided by explanation, if the concept of the utilitarian function can be displaced in the observer's mind while he entertains the separate concept of some non-utilitarian function. The separate concept will normally be that of a work of art.

Id. at 422-23.

c.

The Second Circuit soon addressed conceptual separability again in Brandir International, Inc. v. Cascade Pacific Lumber Co., 834 F.2d 1142 (2d Cir.1987). That case involved the work of an artist, David Levine; specifically, Levine had created a sculpture of thick, interwoven wire. A cyclist friend of Levine's realized that the sculpture could, with modification, function as a bicycle rack and thereafter put Levine in touch with Brandir International, Inc. ("Brandir"). The artist and the Brandir engineers then worked to modify the sculpture to produce a workable and marketable bicycle rack. Their work culminated in the "Ribbon Rack," which Brandir began marketing in 1979. Shortly thereafter, Cascade Pacific Lumber Co. ("Cascade") began selling a similar product, and, in response, Brandir applied for copyright protection and began placing copyright notices on its racks. The Copyright Office, however, rejected the registration on the ground that the rack did not contain any element that was "capable of independent existence as a copyrightable pictorial, graphic or sculptural work apart from the shape of the useful article." Id. at 1146.

The court first considered the possible tests for conceptual separability in light of its past decisions and, notably, attempted to reconcile its earlier attempts:

Perhaps the differences between the majority and the dissent in Carol Barnhart might have been resolved had they had before them the Denicola article on Applied Art and Industrial Design: A Suggested Approach to Copyright in Useful Articles, [67 Minn. L.Rev. 707 (1983)].... Denicola argues that "the statutory directive requires a distinction [927] between works of industrial design and works whose origins lie outside the design process, despite the utilitarian environment in which they appear." He views the statutory limitation of copyrightability as "an attempt to identify elements whose form and appearance reflect the unconstrained perspective of the artist," such features not being the product of industrial design. Id. at 742. "Copyrightability, therefore, should turn on the relationship between the proffered work and the process of industrial design." Id. at 741. He suggests that "the dominant characteristic of industrial design is the influence of nonaesthetic, utilitarian concerns" and hence concludes that copyrightability "ultimately should depend on the extent to which the work reflects artistic expression uninhibited by functional considerations." Id. To state the Denicola test in the language of conceptual separability, if design elements reflect a merger of aesthetic and functional considerations, the artistic aspects of a work cannot be said to be conceptually separable from the utilitarian elements. Conversely, where design elements can be identified as reflecting the designer's artistic judgment exercised independently of functional influences, conceptual separability exists.

We believe that Professor Denicola's approach provides the best test for conceptual separability and, accordingly, adopt it here for several reasons. First, the approach is consistent with the holdings of our previous cases. In Kieselstein-Cord, for example, the artistic aspects of the belt buckles reflected purely aesthetic choices, independent of the buckles' function, while in Carol Barnhart the distinctive features of the torsos — the accurate anatomical design and the sculpted shirts and collars — showed clearly the influence of functional concerns.... Second, the test's emphasis on the influence of utilitarian concerns in the design process may help ... "alleviate the de facto discrimination against nonrepresentational art that has regrettably accompanied much of the current analysis." Id. at 745.

Id. at 1145 (footnotes omitted).

Applying Professor Denicola's test to the Ribbon Rack, the court found that the rack was not copyrightable. The court stated that, "[h]ad Brandir merely adopted one of the existing sculptures as a bicycle rack, neither the application to a utilitarian end nor commercialization of that use would have caused the object to forfeit its copyrighted status." Id. at 1147. However, when the Ribbon Rack was compared to earlier sculptures, continued the court, it was "in its final form essentially a product of industrial design." Id.

In creating the RIBBON Rack, the designer ... clearly adapted the original aesthetic elements to accommodate and further a utilitarian purpose. These altered design features of the RIBBON Rack, including the spacesaving, open design achieved by widening the upper loops ..., the straightened vertical elements that allow in- and above-ground installation of the rack, the ability to fit all types of bicycles and mopeds, and the heavy-gauged tubular construction of rustproof galvanized steel, are all features that combine to make for a safe, secure, and maintenance-free system of parking bicycles and mopeds.

. . .

... While the RIBBON Rack may be worthy of admiration for its aesthetic qualities alone, it remains nonetheless the product of industrial design. Form and function are inextricably intertwined in the rack, its ultimate design being as much the result of utilitarian pressures as aesthetic choices.... Thus there remains no artistic element of the RIBBON Rack that can be identified as [928] separate and "capable of existing independently, of, the utilitarian aspects of the article.

Id. at 1146-47.

d.

We believe that the experience of the Second Circuit is also reflected in the more recent encounter of the Fourth Circuit with the same problem. In Superior Form Builders, Inc. v. Dan Chase Taxidermy Supply Co., Inc., 74 F.3d 488 (4th Cir.1996), the court considered whether animal mannequins qualified for copyright protection. The Fourth Circuit first considered whether the mannequins were useful articles as defined by § 101 and concluded that they were not:

A mannequin provides the creative form and expression of the ultimate animal display.... Even though covered with a skin, the mannequin is not invisible but conspicuous in the final display. The angle of the animal's head, the juxtaposition of its body parts, and the shape of the body parts in the final display is little more than the portrayal of the underlying mannequin.... None of these expressive aspects of a mannequin is lost by covering the mannequin with a skin. Thus, any utilitarian aspect of the mannequin exists "merely to portray the appearance" of the animal. See 17 U.S.C. § 101.

... It is the portrayal of the animal's body expression given by the mannequin that is thus protectable under the Copyright Act. We therefore agree with the district court in this case because "the usefulness of the forms is their portrayal of the appearance of animals." The mannequin forms "by definition are not useful articles.

Id. at 494 (quoting Superior Form Builders v. Dan Chase Taxidermy Supply Co., Inc., 851 F.Supp. 222, 223 (E.D.Va.1994)).

The court, however, also considered whether, if useful, the utilitarian and aesthetic aspects of the mannequin were separable:

To the extent that an argument can be made that the mannequins in this case perform a utilitarian function — other than portraying themselves — by supporting the mounted skins, we believe the function to be conceptually separable from the works' sculptural features. See Brandir Int'l, Inc. v. Cascade Pac. Lumber Co., 834 F.2d 1142, 1145 (2d Cir.1987) ("Where design elements can be identified as reflecting the designer's artistic judgment exercised independently of functional influences, conceptual separability exists."); Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989, 993 (2d Cir.1980) (finding sculptural element of belt buckle conceptually separable from utilitarian function).

Id. Thus, without specifically adopting one of the tests of conceptual separability, the Fourth Circuit determined that artistic work put into the design of the animal frame was copyrightable; the fact that a skin was placed on the model and that the model, therefore, was useful in the display of the skin did not negate the artistic elements of the design.[11]

e.

[929] There is one final Second Circuit case that bears comment. In Mattel, Inc. v. Goldberger Doll Manufacturing Co., 365 F.3d 133 (2d Cir.2004), the Second Circuit rejected the idea that a particular expression of features on a doll's face was not subject to copyright protection. The case arose out of the alleged copying of the facial features of Mattel's Barbie dolls by Goldberger Doll Manufacturing when creating its "Rockettes 2000" doll. On Goldberger's motion for summary judgment, the district court held that "copyright protection did not extend to Barbie's eyes, nose, and mouth ...." Id. at 134. The Second Circuit reversed. Although it did not speak specifically in terms of conceptual separability, the court's reasoning is nevertheless instructive; it stated:

The proposition that standard or common features are not protected is inconsistent with copyright law. To merit protection from copying, a work need not be particularly novel or unusual. It need only have been "independently created" by the author and possess "some minimal degree of creativity." Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991).... There are innumerable ways of making upturned noses, bow lips, and widely spaced eyes. Even if the record had shown that many dolls possess upturned noses, bow lips, and wide-spread eyes, it would not follow that each such doll — assuming it was independently created and not copied from others — would not enjoy protection from copying.

Id. at 135 (footnotes and parallel citations omitted). Additionally, the court noted the scope of the copyright protection that the Barbie dolls enjoyed:

The copyright does not protect ideas; it protects only the author's particularized expression of the idea. Thus, Mattel's copyright in a doll visage with an upturned nose, bow lips, and widely spaced eyes will not prevent a competitor from making dolls with upturned noses, bow lips, and widely spaced eyes, even if the competitor has taken the idea from Mattel's example, so long as the competitor [930] has not copied Mattel's particularized expression. An upturned nose, bow lips, and wide eyes are the "idea" of a certain type of doll face. That idea belongs not to Mattel but to the public domain. But Mattel's copyright will protect its own particularized expression of that idea and bar a competitor from copying Mattel's realization of the Barbie features.

Id. at 136 (citations omitted).

C. Application

Each of these cases differs in the object at issue and the method by which the court evaluated whether the object was entitled to copyright protection. Yet, each court attempted to give effect to "the expressed congressional intent to distinguish copyrightable applied art and uncopyrightable industrial design." Kieselstein-Cord, 632 F.2d at 993; see also Carol Barnhart, 773 F.2d at 417-18 (reviewing legislative history in detail and concluding that, although "copyright protection has increasingly been extended to cover articles having a utilitarian dimension," Congress did not intend all useful articles that are "aesthetically satisfying or valuable" to be copyrightable); Brandir Int'l, 834 F.2d at 1145 (adopting Professor Denicola's test that makes copyrightability dependent upon "the extent to which the work reflects artistic expression uninhibited by functional considerations" (internal quotation marks and citations omitted)); Superior Form Builders, 74 F.3d at 494 (distinguishing the animal mannequins at issue from "aesthetically pleasing articles of industrial design").

The Second Circuit cases exhibit a progressive attempt to forge a workable judicial approach capable of giving meaning to the basic Congressional policy decision to distinguish applied art from uncopyrightable industrial art or design. In Kieselstein-Cord, the Second Circuit attempted to distinguish artistic expression from industrial design by focusing on the present use of the item, i.e., the "primary ornamental aspect" versus the "subsidiary utilitarian function" of the object at issue. 632 F.2d at 993. In Carol Barnhart, the Second Circuit moved closer to a process-oriented approach:

What distinguishes those [Kieselstein-Cord] buckles from the Barnhart forms is that the ornamented surfaces of the buckles were not in any respect required by their utilitarian functions; the artistic and aesthetic features could thus be conceived of as having been added to, or superimposed upon, an otherwise utilitarian article. The unique artistic design was wholly unnecessary to performance of the utilitarian function. In the case of the Barnhart forms, on the other hand, the features claimed to be aesthetic or artistic, e.g., the life-size configuration of the breasts and the width of the shoulders, are inextricably intertwined with the utilitarian feature, the display of clothes. Whereas a model of a human torso, in order to serve its utilitarian function, must have some configuration of the chest and some width of shoulders, a belt buckle can serve its function satisfactorily without any ornamentation of the type that renders the Kieselstein-Cord buckles distinctive.

773 F.2d at 419. Thus, it was the fact that the creator of the torsos was driven by utilitarian concerns, such as how display clothes would fit on the end product, that deprived the human torsos of copyright protection.

This process-oriented approach for conceptual separability — focusing on the process of creating the object to determine whether it is entitled to copyright protection — is more fully articulated in Brandir and indeed reconciles the earlier case law pertaining to conceptual separability.

[T]he approach is consistent with the holdings of our previous cases. In Kieselstein-Cord, [931] for example, the artistic aspects of the belt buckles reflected purely aesthetic choices, independent of the buckles' function, while in Carol Barnhart the distinctive features of the torsos — the accurate anatomical design and the sculpted shirts and collars — showed clearly the influence of functional concerns. Though the torsos bore artistic features, it was evident the designer incorporated those features to further the usefulness of the torsos as mannequins.

Brandir, 834 F.2d at 1145.

Furthermore, Brandir is not inconsistent with the more theoretical rendition of Judge Newman in his Carol Barnhart dissent — that "the requisite 'separateness' exists whenever the design creates in the mind of an ordinary observer two different concepts that are not inevitably entertained simultaneously." 773 F.2d at 422. When a product has reached its final form as a result of predominantly functional or utilitarian considerations, it necessarily will be more difficult for the observer to entertain simultaneously two different concepts — the artistic object and the utilitarian object. In such circumstances, Brandir has the added benefit of providing a more workable judicial methodology by articulating the driving principle behind conceptual separability — the influence of industrial design. When the ultimate form of the object in question is "as much the result of utilitarian pressures as aesthetic choices," "[f]orm and function are inextricably intertwined," and the artistic aspects of the object cannot be separated from its utilitarian aspects for purposes of copyright protection. Brandir, 834 F.2d at 1147.

Conceptual separability exists, therefore, when the artistic aspects of an article can be "conceptualized as existing independently of their utilitarian function." Carol Barnhart, 773 F.2d at 418. This independence is necessarily informed by "whether the design elements can be identified as reflecting the designer's artistic judgment exercised independently of functional influences." Brandir, 834 F.2d at 1145. If the elements do reflect the independent, artistic judgment of the designer, conceptual separability exists. Conversely, when the design of a useful article is "as much the result of utilitarian pressures as aesthetic choices," id. at 1147, the useful and aesthetic elements are not conceptually separable.

Applying this test to the Mara mannequin, we must conclude that the Mara face is subject to copyright protection. It certainly is not difficult to conceptualize a human face, independent of all of Mara's specific facial features, i.e., the shape of the eye, the upturned nose, the angular cheek and jaw structure, that would serve the utilitarian functions of a hair stand and, if proven, of a makeup model. Indeed, one is not only able to conceive of a different face than that portrayed on the Mara mannequin, but one easily can conceive of another visage that portrays the "hungry look" on a high-fashion runway model. Just as Mattel is entitled to protection for "its own particularized expression" of an "upturned nose[], bow lips, and widely spaced eyes," Mattel, 365 F.3d at 136, so too is Heerlein (and, therefore, Pivot Point as assignee of the copyright registration) entitled to have his expression of the "hungry look" protected from copying.

Mara can be conceptualized as existing independent from its use in hair display or make-up training because it is the product of Heerlein's artistic judgment. When Passage approached Heerlein about creating the Mara sculpture, Passage did not provide Heerlein with specific dimensions or measurements; indeed, there is no evidence that Heerlein's artistic judgment was constrained by functional considerations. [932] Passage did not require, for instance, that the sculpture's eyes be a certain width to accommodate standard-sized eyelashes, that the brow be arched at a certain angle to facilitate easy make-up application or that the sculpture as a whole not exceed certain dimensional limits so as to fit within Pivot Point's existing packaging system. Such considerations, had they been present, would weigh against a determination that Mara was purely the product of an artistic effort. By contrast, after Passage met with Heerlein to discuss Passage's idea for a "hungry-look" model, Heerlein had carte blanche to implement that vision as he saw fit. Consequently, this is not a situation, such as was presented to the Second Circuit in Carol Barnhart, in which certain features ("accurate anatomical design and the sculpted shirts and collars") were included in the design for purely functional reasons. Brandir, 834 F.2d at 1145. Furthermore, unlike "the headless, armless, backless styrene torsos" which "were little more than glorified coat-racks used to display clothing in stores," Hart, 86 F.3d at 323, the creative aspects of the Mara sculpture were meant to be seen and admired. Thus, because Mara was the product of a creative process unfettered by functional concerns, its sculptural features "can be identified separately from, and are capable of existing independently of," its utilitarian aspects. It therefore meets the requirements for conceptual separability and is subject to copyright protection.

Conclusion

The Mara mannequin is subject to copyright protection. We therefore must reverse the summary judgment in favor of Charlene Products and Mr. Yau; the case is remanded for a trial on Pivot Point's infringement claim. Furthermore, because Charlene Products and Mr. Yau have not prevailed on the merits at this point, the judgment of the district court with respect to attorneys' fees must be vacated. The cross-appeal with respect to attorneys' fees is moot. Pivot Point may recover its costs in this court.

REVERSED AND REMANDED; CROSS-APPEAL DISMISSED

__________

KANNE, Circuit Judge, dissenting.

Writing for the majority, Judge Ripple has applied his usual thorough and scholarly approach to this difficult intellectual property problem; however, I cannot join the majority opinion because I am not persuaded that the "Mara" mannequin is copyrightable. All functional items have aesthetic qualities. If copyright provided protection for functional items simply because of their aesthetic qualities, Congress's policy choice that gives less protection in patent than copyright would be undermined. See American Dental Ass'n v. Delta Dental Plans Ass'n, 126 F.3d 977, 980 (7th Cir.1997).

The majority rightly assumes that Mara is a "useful article" as defined in 17 U.S.C. § 101. Opinion at 920. To receive copyright protection as a "sculptural work," then, Mara must come within the narrow restrictions placed on "useful articles" in the definition of pictorial, graphic, and sculptural works:

[T]he design of a useful article ... shall be considered a... sculptural work only if, and only to the extent that, such design incorporates ... sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.

17 U.S.C. § 101 (emphasis added). As the district court noted, the statute requires, on its face, that sculptural features must be separately identified from the utilitarian aspects of the article ("conceptual separability") and they must exist independently from the utilitarian aspects of the article [933] ("physical separability") in order to receive copyright protection. As to whether both conceptual and physical separability are required for copyrightability, most courts and commentators have concluded that only one or the other test is appropriate. But that issue is not presented here because Mara is not copyrightable regardless of whether both or either is applied.

Taking physical separability first, the district court used examples from case law to illustrate that the sculptural features in many useful items can be physically removed from the object and sold separately without affecting the functionality of the useful article. See, e.g., Mazer v. Stein, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630 (1954) (holding that a sculpture of a dancer carved into the base of a lamp may be copyrighted); Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989 (2d Cir.1980) (holding that decorative belt buckles could be copyrighted as separate objects sold not to hold up one's pants).

Mara, on the other hand, has only functional attributes. Thus, any physical separation of a portion of her would not be independent of her utilitarian aspects. She is sold to beauty schools as a teaching device; students style her hair and apply makeup as realistic training for such pursuits on live subjects. A mannequin head without a neck, or with different eyes and musculature, would not serve the utilitarian purpose of applying makeup or teaching the art of matching hair styles to facial features. As the district court explained: "Beauty students style hair to flatter the face, not to be worn on featureless ovoids. The use of a mannequin head in training students of beauty schools lies in its aesthetic qualities." There is nothing in Mara that we could physically remove that would not be part of Mara's utility as a teaching aid. Like mannequins of human torsos, Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411, 418-19 (2d Cir.1985), mannequins of human faces are not physically separable from their functional purpose and are therefore not copyrightable.

Next, the district court considered various restatements of the meaning of "conceptual separability" (whether features can be identified or conceived of separately from the utilitarian aspects) and applied the most appropriate one to Mara. Professor Goldstein, in his treatise, Copyright: Principles, Law & Practice, presents a reasonable explanation of the statutory text: "a ... sculptural feature incorporated in the design of a useful article is conceptually separable if it can stand on its own as a work of art traditionally conceived, and if the useful article in which it is embodied would be equally useful without it." Mara has no conceptually separable features to which copyright protection could be granted. Her features are incapable of being identified separately from the utilitarian use of those features. Without features, the mannequin's head and neck would be little more than an egg on a stick, useless for its intended purpose. Mara possesses neither physical nor conceptual separability.

The majority, concluding that Congress intended "to state a single, integrated standard," deduced that the standard must be "conceptual separability." This may be correct, as it is very difficult to divine the distinction between physical and conceptual separability if those standards are properly stated. In my view, however, the majority's explanation of conceptual separability lacks a basis in the statute. As the majority sees it, conceptual separability "exists ... when the artistic aspects of an article can be conceptualized as existing independently of their utilitarian function." Opinion at 931. The majority further explains that the way to determine if this is the case is to look to the process of design: if independent "artistic" choices were made in the sculpture's creation, and such [934] choices were not later sullied by the influence of industrial design, then some of the useful article is a conceptually separable sculpture and therefore copyrightable, Opinion at 931-32.

Problematically, the majority's test for conceptual separability seems to bear little resemblance to the statute. The statute asks two questions: Does the useful article incorporate "sculptural features that can be identified separately from the utilitarian aspects" of the article? And are these features "capable of existing independently" from the utilitarian aspects? The copyright statute is concerned with protecting only non-utilitarian features of the useful article. To be copyrightable, the statute requires that the useful article's functionality remain intact once the copyrightable material is separated. In other words, Pivot Point needs to show that Mara's face is not a utilitarian "aspect" of the product "Mara," but rather a separate non-utilitarian "feature." The majority, by looking only to whether the features could also "be conceptualized as existing independently of their utilitarian function" and ignoring the more important question of whether the features themselves are utilitarian aspects of the useful article, mistakenly presupposes that utilitarian aspects of a useful article can be copyrighted. If we took away Mara's facial features, her functionality would be greatly diminished or eliminated, thus proving that her features cannot be copyrighted.

Moreover, the "process-oriented approach," advocated by the majority drifts even further away from the statute. Opinion at 930. The statute looks to the useful article as it exists, not to how it was created. I believe it simply is irrelevant to inquire into the origins of Mara's eyes, cheekbones, and neck. If such features have been fully incorporated as functional aspects of the mannequin, then copyright does not provide protection. Even if we were to look at the "process" that led to the creation of Mara, it is undeniable that, from the beginning, Pivot Point intended Mara to serve a functional purpose and commissioned her creation to fulfill that purpose (not to create a work of art for aesthetic beauty).

The majority, as evidenced by its emphasis on the fact that Charlene Products apparently copied Mara with its doll, "Liza," seems unduly concerned in this context with Charlene's questionable business practices. This is immaterial to the determination of whether the Mara doll is protected by copyright law. Importantly, other possible legal protections for Pivot Point's intellectual property — design patent, trademark, trade dress, and state unfair competition law — are available to address the majority's concerns. Copyright does not protect functional products. Charlene is free, under its own brand name, to copy and sell copies of useful articles that do not have patent protection. See, e.g., TrafFix Devices, Inc. v. Marketing Displays, Inc., 532 U.S. 23, 121 S.Ct. 1255, 149 L.Ed.2d 164 (2001); Bonito Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141, 109 S.Ct. 971, 103 L.Ed.2d 118 (1989); Sears, Roebuck & Co. v. Stiffel Co., 376 U.S. 225, 84 S.Ct. 784, 11 L.Ed.2d 661 (1964). I fear that the majority's opinion grants copyright protection to functional aspects of a useful article. I would, therefore, affirm the district court's grant of summary judgment in favor of Charlene Products and Mr. Yau.

__________

[1] Chief Judge Joel M. Flaum, The Honorable Frank H. Easterbrook and The Honorable Ann Claire Williams did not participate in the consideration of the petition for rehearing en banc.

[2] Mr. Yau was not unfamiliar with Pivot Point. Shortly before founding Charlene Products in 1985, Mr. Yau had worked for Pivot Point.

[3] Charlene eventually obtained a copyright registration for its Liza mannequin.

[4] Federal Rule of Civil Procedure 83 provides:

(1) Each district court, acting by a majority of its district judges, may, after giving appropriate public notice and an opportunity for comment, make and amend rules governing its practice. A local rule shall be consistent with — but not duplicative of — Acts of Congress and rules adopted under 28 U.S.C. §§ 2072 and 2075, and shall conform to any uniform numbering system prescribed by the Judicial Conference of the United States. A local rule takes effect on the date specified by the district court and remains in effect unless amended by the court or abrogated by the judicial council of the circuit. Copies of rules and amendments shall, upon their promulgation, be furnished to the judicial council and the Administrative Office of the United States Courts and be made available to the public.

Fed.R.Civ.P. 83(a)(1) (emphasis added).

[5] The district court relied heavily on this fact in concluding that Mara is a useful object:

Mara is a work of "applied art" and displays "artistic craftsmanship" — Pivot Point commissioned a sculptor to design a mannequin head that emulates features of runway models — but serves utilitarian ends: Students in beauty schools practice styling hair on Mara's head and may practice other skills by applying makeup to Mara's eyes, lips, and cheeks. The parties dispute which functions are primary. Charlene Products says that Mara is used primarily for practicing makeup; Pivot Point insists that its primary use is hair styling. This factual dispute might have legal significance if Pivot Point were contending that Mara's sole use is hair styling; then it is (barely) possible to imagine a suitable mannequin head devoid of human features. (The legal significance of this possibility is explicated below.) But Pivot Point contends only that Mara's "primary" use is hair styling; it does not deny that a use (if only, in its view, a secondary one) is the application of makeup and other beauty-school arts, and the evidence would not permit a reasonable jury to conclude that Mara has no utilitarian value for makeup practice. (Pivot Point says that it "generally" sells Mara with painted-on makeup, which reveals by negative implication that it also sells Mara without eye or cheek coloring, so that beauty-school students can add their own.)

R.401 at 2.

[6] Prior to the addition of this language in the 1976 Act, Congress had not explicitly authorized the Copyright Office to register "useful articles." Indeed, when Congress first extended copyright protection to three-dimensional works of art in 1870, copyright protection was limited to objects of fine art; objects of applied art still were not protected. See Paul Goldstein, 1 Copyright § 2.5.3 at 2:58 (2d ed.2004). This changed with the adoption of the Copyright Act of 1909 ("1909 Act"); Professor Goldstein explains:

The 1909 Act, which continued protection for three-dimensional works of art, dropped the requirement that they constitute fine art and thus opened the door to protection of useful works of art. In 1948, the Copyright Office broadened the scope of protection for three-dimensional works of art to cover "works of artistic craftsmanship insofar as their form but not their utilitarian aspects are concerned." The United States Supreme Court upheld this interpretation in Mazer v. Stein, [347 U.S. 201, 213, 74 S.Ct. 460, 98 L.Ed. 630 (1954),] holding that the fact that statuettes in issue were intended for use in articles of manufacture — electric lamp bases — did not bar them from copyright. Five years later, in 1959, the Copyright Office promulgated a rule that if "the sole intrinsic function of an article is its utility, the fact that the work is unique and attractively shaped will not qualify it as a work of art." The regulation did, however, permit registration of features of a utilitarian article that "can be identified separately and are capable of existing independently as a work of art.

Id. (quoting 37 C.F.R. § 207.8(a) (1949) and 37 C.F.R. § 202.10(c) (1959); footnotes omitted).

[7] See infra note 8.

[8] Although the district court was skeptical that the statutory language encompassed both physical and conceptual separability, circuits have been almost unanimous in interpreting the language of § 101 to include both types of separability. See Superior Form Builders, Inc. v. Dan Chase Taxidermy Supply Co., Inc., 74 F.3d 488, 494 (4th Cir.1996) (asking whether functional aspects of animal mannequins are "conceptually separable from the works' sculptural features"); Brandir Int'l, Inc. v. Cascade Pac. Lumber Co., 834 F.2d 1142, 1144 (2d Cir.1987) (stating that "'[c]onceptual separability' is alive and well"); Carol Barnhart Inc. v. Econ. Cover Corp., 773 F.2d 411, 418 (2d Cir.1985) (judging copyrightability of mannequin torsos based on whether "forms possess aesthetic or artistic features that are physically or conceptually separable from the forms' use as utilitarian objects to display clothes"); Norris Indus., Inc. v. Int'l Tel. & Tel. Corp., 696 F.2d 918, 923 (11th Cir.1983) ("Both case law and legislative history indicate that separability encompasses works of art that are either physically severable from the utilitarian article or conceptually severable."); Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989, 993 (2d Cir.1980) (applying test of conceptual separability).

Only one appellate court has rejected the idea of conceptual separability. See Esquire, Inc. v. Ringer, 591 F.2d 796 (D.C.Cir.1978). In that case, arising under the 1909 Act, the Copyright Office had refused to register a design for outdoor lighting fixtures. The district court, however, believed the fixtures were copyrightable and issued a writ of mandamus that the copyright issue. However, the D.C. Circuit reversed. The precise question before the court was whether the regulation implementing the 1909 Act mandated that the Copyright Office register a copyright for the lighting fixtures. The regulation at issue provided:

(c) If the sole intrinsic function of an article is its utility, the fact that the article is unique and attractively shaped will not qualify it as a work of art. However, if the shape of a utilitarian article incorporates features, such as artistic sculpture, carving, or pictorial representation, which can be identified separately and are capable of existing independently as a work of art, such features will be eligible for registration.

Id. at 800 (quoting 37 C.F.R. § 202.10(b) (1976)). The Copyright Office took the position that the regulation barred "copyright registration for the overall shape or configuration of a utilitarian article, no matter how aesthetically pleasing that shape or configuration may be." Id. In determining whether to accept or reject the proffered interpretation, the court noted that "[c]onsiderable weight is to be given to an agency's interpretation of its regulations," especially when "an administrative interpretation relates to a matter within the field of administrative expertise." Id. at 801. The court concluded that the Copyright Office had adopted a "reasonable and well-supported interpretation of § 202.10(c)." Id. at 800. In the court's view, the interpretation was grounded in "the principle that industrial designs are not eligible for copyright." Id. The court also believed that the interpretation found support in the legislative history of the newly enacted 1976 Act. The court acknowledged, however, that the legislative history was not "free from ambiguity"; it explained:

Esquire could arguably draw some support from the statement that a protectable element of a utilitarian article must be separable "physically or conceptually" from the utilitarian aspects of the design. But any possible ambiguity raised by this isolated reference disappears when the excerpt is considered in its entirety. The underscored passages indicate unequivocally that the overall design or configuration of a utilitarian object, even if it is determined by aesthetic as well as functional considerations, is not eligible for copyright. Thus the legislative history, taken as congressional understanding of existing law, reinforces the Register's position.

Id. at 803-04.

As is evident from the passages set forth above, the issue addressed by the D.C. Circuit in Esquire arose in a much different procedural and legal environment than the issue in the present case. The court's focus in Esquire was a regulation adopted pursuant to the former law and its obligation to defer to the agency's interpretation of the law embodied in that regulation. Furthermore, the court acknowledged that the 1976 Act was "not applicable to the case before" it. Id. at 803. Given these differences, we do not believe that the D.C. Circuit would conclude that its decision in Esquire disposed of the issue of conceptual separability presently before this court.

[9] Judge Weinstein (sitting by designation) dissented. See Kieselstein-Cord, 632 F.2d at 993.

[10] There were a total of four mannequins at issue, two male and two female. Of those four, two of the mannequin forms were unclothed, and two were formed with one layer of clothing and were meant specifically for the display of outerwear.

[11] Notably, in Hart v. Dan Chase Taxidermy Supply Co., 86 F.3d 320 (2d Cir.1996), the Second Circuit shortly thereafter addressed the question whether a fish mannequin was copyrightable. Although the court did not address specifically the issue before us today, its analysis is nevertheless helpful. Referring to its decision in Carol Barnhart, the Second Circuit posed the question rather simplistically: "Is taxidermy different [for purposes of copyright protection]?" Id. at 321. The Second Circuit resolved that it is:

We do not agree that Barnhart mandates a finding that fish mannequins are "useful articles" undeserving of copyright protection.... [W]e do not believe that the Barnhart torsos can be analogized to the fish in this case. In Barnhart, the headless, armless, backless styrene torsos were little more than glorified coat-racks used to display clothing in stores. The torsos were designed to present the clothing, not their own forms. In taxidermy, by contrast, people look for more than a fish skin; they wish to see a complete "fish." The superficial characteristics of the fish, such as its color and texture, are admittedly conveyed by the skin, but the shape, volume, and movement of the animal are depicted by the underlying mannequin. Whether the fish is shown as resting, jumping, wiggling its tail, or preparing to munch on some plankton, is dictated by the mannequin and by its particular form, not by the skin.

In short, the fish mannequin is designed to be looked at. That the fish mannequin is meant to be viewed clothed by a fish skin, rather than naked and on its own, makes no difference. The function of the fish form is to portray its own appearance, and that fact is enough to bring it within the scope of the Copyright Act. 17 U.S.C. § 101; accord Superior Form Builders v. Dan Chase Taxidermy Supply Co., 74 F.3d 488 (4th Cir.1996) (distinguishing Barnhart and holding that mammal taxidermy mannequins are "sculptural works" rather than "useful articles" because their utilitarian aspects serve "merely to portray the appearance" of the animal)....

We conclude that fish mannequins even if considered "useful articles," are useful insofar as they "portray the[ir] appearance." 17 U.S.C. § 101. That makes them copyrightable.

Id. at 323 (internal citation omitted). Thus, the Second Circuit distinguished fish mannequins from human mannequins; however, it did so on the basis that the fish mannequins were not "useful articles" as that term is defined in § 101, not on the basis that, although useful, the artistic aspects were physically or conceptually separable from the useful aspects of the article.

 

4.4.2 Additional Readings 4.4.2 Additional Readings

4.4.2.1 Mazer v. Stein (1957) 4.4.2.1 Mazer v. Stein (1957)

Mazer v. Stein, 347 U.S. 201 (1954)

Warren, Black, Reed, Frankfurter, Douglas, Jackson, Burton, Clark, Minton.

[p*202] MR. JUSTICE REED delivered the opinion of the Court.

[1] This case involves the validity of copyrights obtained by respondents for statuettes of male and female dancing figures made of semivitreous china. The controversy centers around the fact that although copyrighted as "works of art," the statuettes were intended for use and used as bases for table lamps, with electric wiring, sockets and lamp shades attached.

[2] Respondents are partners in the manufacture and sale of electric lamps. One of the respondents created original works of sculpture in the form of human figures by traditional clay-model technique. From this model, a production mold for casting copies was made. The resulting statuettes, without any lamp components added, were submitted by the respondents to the Copyright Office for registration as "works of art" or reproductions thereof under § 5 (g) or § 5 (h) of the copyright law, [n1] and certificates [p*203] of registration issued. Sales (publication in accordance with the statute) as fully equipped lamps preceded the applications for copyright registration of the statuettes. 17 U. S. C. (Supp. V, 1952) §§ 10, 11, 13, 209; Rules and Regulations, 37 CFR, 1949, §§ 202.8 and 202.9. Thereafter, the statuettes were sold in quantity throughout the country both as lamp bases and as statuettes. The sales in lamp form accounted for all but an insignificant portion of respondents' sales.

[3] Petitioners are partners and, like respondents, make and sell lamps. Without authorization, they copied the statuettes, embodied them in lamps and sold them.

[4] The instant case is one in a series of reported suits brought by respondents against various alleged infringers of the copyrights, all presenting the same or a similar question. [n2] Because of conflicting decisions, [n3] we granted certiorari. 346 U.S. 811. In the present case respondents [p*204] sued petitioners for infringement in Maryland. Stein v. Mazer, 111 F.Supp. 359. Following the Expert decision and rejecting the reasoning of the District Court in the Rosenthal opinion, both referred to in the preceding note, the District Court dismissed the complaint. The Court of Appeals reversed and held the copyrights valid. Stein v. Mazer, 204 F.2d 472. [n4] It said: "A subsequent utilization of a work of art in an article of manufacture in no way affects the right of the copyright owner to be protected against infringement of the work of art itself." Id., at 477.

[5] Petitioners, charged by the present complaint with infringement of respondents’ copyrights of reproductions of their works of art, seek here a reversal of the Court of Appeals decree upholding the copyrights. Petitioners in their petition for certiorari present a single question:

"Can statuettes be protected in the United States by copyright when the copyright applicant intended primarily to use the statuettes in the form of lamp [p*205] bases to be made and sold in quantity and carried the intentions into effect?

"Stripped down to its essentials, the question presented is: Can a lamp manufacturer copyright his lamp bases?"

[6] The first paragraph accurately summarizes the issue. The last gives it a quirk that unjustifiably, we think, broadens the controversy. The case requires an answer, not as to a manufacturer‘s right to register a lamp base but as to an artist’s right to copyright a work of art intended to be reproduced for lamp bases. As petitioners say in their brief, their contention "questions the validity of the copyright based upon the actions of the respondents." Petitioners question the validity of a copyright of a work of art for "mass" production. "Reproduction of a work of art" does not mean to them unlimited reproduction. Their position is that a copyright does not cover industrial reproduction of the protected article. Thus their reply brief states:

"When an artist becomes a manufacturer or a designer for a manufacturer he is subject to the limitations of design patents and deserves no more consideration than any other manufacturer or designer."It is not the right to copyright an article that could have utility under §§ 5 (g) and (h), note 1, supra, that petitioners oppose. Their brief accepts the copyright ability of the great carved golden saltcellar of Cellini but adds:

"If, however, Cellini designed and manufactured this item in quantity so that the general public could have salt cellars, then an entirely different conclusion would be reached. In such case, the salt cellar becomes an article of manufacture having utility in addition to its ornamental value and would therefore have to be protected by design patent."[p*206] It is publication as a lamp and registration as a statute to gain a monopoly in manufacture that they assert is such a misuse of copyright as to make the registration invalid.

[7] No unfair competition question is presented. The constitutional power of Congress to confer copyright protection on works of art or their reproductions is not questioned. [n5] 

[8] Petitioners assume, as Congress has in its [p*207] enactments and as do we, that the constitutional clause empowering legislation "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their [p*208] respective Writings and Discoveries," Art. I, § 8, cl. 8, includes within the term "Authors" the creator of a picture or a statute. The Court‘s consideration will be limited to the question presented by the petition for the writ of certiorari. [n6] In recent years the question as to utilitarian use of copyrighted articles has been much discussed. [n7] In answering that issue, a review of the development of copyright coverage will make clear the purpose of the Congress in its copyright legislation. In 1790 the First Congress conferred a copyright on "authors of any map, chart, book or books already printed." [n8] Later, designing, engraving and etching were included; [n9] in 1831 musical [p*209] compositions; [n10] dramatic compositions in 1856; [n11] and photographs and negatives thereof in 1865. [n12] The Act of 1870 defined copyrightable subject matter as:

". . . any book, map, chart, dramatic or musical composition, engraving, cut, print, or photograph or negative thereof, or of a painting, drawing, chromo, statue, statuary, and of models or designs intended to be perfected as works of the fine arts."

(Emphasis supplied.) [n13] The italicized part added three-dimensional work of art to what had been protected previously. [n14] In 1909 Congress [p*210] again enlarged the scope of the copyright statute. [n15] The new Act provided in § 4:

"That the works for which copyright may be secured under this Act shall include all the writings of an author." [n16]

[9] Some writers interpret this section as being coextensive with the constitutional grant, [n17] but the House Report, while inconclusive, indicates that it was "declaratory of existing law" only. [n18] Section 5 relating to classes of writings in 1909 read as shown in the margin with subsequent additions not material to this decision. [n19] [p*211] Significant for our purposes was the deletion of the fine-arts clause of the 1870 Act. [n20] Verbal distinctions between purely aesthetic articles and useful works of art ended insofar as the statutory copyright language is concerned. [n21] The practice of the Copyright Office, under the 1870 and 1874 Acts and before the 1909 Act, was to allow registration "as works of the fine arts" of articles of the same character as those of respondents now under challenge. Seven examples appear in the Government's [p*212] brief amicus curiae. [n22] In 1910, interpreting the 1909 Act, the pertinent Copyright Regulations read as shown in the margin. [n23] Because, as explained by the Government, this regulation "made no reference to articles which might fairly be considered works of art although they might also serve a useful purpose," it was reworded in 1917 as shown below. [n24] The amicus brief gives sixty examples selected at five-year intervals, 1912-1952, said to be typical of registrations of works of art possessing utilitarian aspects. [n25] The current pertinent regulation, published in 37 CFR, 1949, § 202.8, reads thus:

"Works of art (Class G) -- (a) In General. This class includes works of artistic craftsmanship, in so far as their form but not their mechanical or utilitarian aspects are concerned, such as artistic jewelry, [p*213] enamels, glassware, and tapestries, as well as all works belonging to the fine arts, such as paintings, drawings and sculpture. . . ."

[10] So we have a contemporaneous and long-continued construction of the statutes by the agency charged to administer them that would allow the registration of such a statuette as is in question here. [n26] This Court once essayed to fix the limits of the fine arts. [n27] That effort need not be appraised in relation to this copyright issue. It is clear Congress intended the scope of the copyright statute to include more than the traditional fine arts. Herbert Putnam, Esq., then Librarian of Congress and active in the movement to amend the copyright laws, told the joint meeting of the House and Senate Committees:

"The term 'works of art' is deliberately intended as a broader specification than 'works of the fine arts' in the present statute with the idea that there is subject-matter (for instance, of applied design, not yet within the province of design patents), which may properly be entitled to protection under the copyright law." [n28]

[11] The successive acts, the legislative history of the 1909 Act and the practice of the Copyright Office unite to show [p*214] that "works of art" and "reproductions of works of art" are terms that were intended by Congress to include the authority to copyright these statuettes. Individual perception of the beautiful is too varied a power to permit a narrow or rigid concept of art. As a standard we can hardly do better than the words of the present Regulation, § 202.8, supra, naming the things that appertain to the arts. They must be original, that is, the author’s tangible expression of his ideas. Compare Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, 59-60. Such expression, whether meticulously delineating the model or mental image or conveying the meaning by modernistic form or color, is copyrightable. [n29] What cases there are confirm this coverage of the statute. [n30] The conclusion that the statutes here in issue may be copyrighted goes far to solve the question whether their intended reproduction as lamp stands bars or invalidates their registration. This depends solely on statutory interpretation. Congress may after publication protect by copyright any writing of an author. Its statute creates the copyright. [n31] It did not exist at common law even [p*215] though he had a property right in his unpublished work. [n32] But petitioners assert that congressional enactment of the design patent laws should be interpreted as denying protection to artistic articles embodied or reproduced in manufactured articles. [n33] They say:

"Fundamentally and historically, the Copyright Office is the repository of what each claimant considers to be a cultural treasure, whereas the Patent Office is the repository of what each applicant considers to be evidence of the advance in industrial and technological fields."

[12] Their argument is that design patents require the critical examination given patents to protect the public against monopoly. Attention is called to Gorham Co. v. White, 14 Wall. 511, interpreting the design patent law of 1842, 5 Stat. 544, granting a patent to anyone who by "their own industry, genius, efforts, and expense, may have invented or produced any new and original design for a manufacture . . . ." A pattern for flat silver was there upheld. [n34] The intermediate and present law differs [p*216] little. "Whoever invents any new, original and ornamental design for an article of manufacture may obtain a patent therefor, . . ." subject generally to the provisions concerning patents for invention. § 171, 66 Stat. 805. As petitioner sees the effect of the design patent law:

"If an industrial designer can not satisfy the novelty requirements of the design patent laws, then his design as used on articles of manufacture can be copied by anyone."

[13] Petitioner has furnished the Court a booklet of numerous design patents for statuettes, bases for table lamps and similar articles for manufacture, quite indistinguishable in type from the copyrighted statuettes here in issue. [n35] Petitioner urges that overlapping of patent and copyright legislation so as to give an author or inventor a choice between patents and copyrights should not be permitted. We assume petitioner takes the position that protection for a statuette for industrial use can only be obtained by patent, if any protection can be given. [n36] [p*217] As we have held the statuettes here involved copyrightable, we need not decide the question of their patentability. Though other courts have passed upon the issue as to whether allowance by the election of the author or patentee of one bars a grant of the other, we do not. [n37] We do hold that the patentability of the statuettes, fitted as lamps or unfitted, does not bar copyright as works of art. Neither the Copyright Statute nor any other says that because a thing is patentable it may not be copyrighted. We should not so hold. [n38] Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection is given only to the expression of the idea -- not the idea itself. [n39] Thus, in Baker v. Selden, 101 U.S. 99, the Court held that a copyrighted book on a peculiar system of bookkeeping was not infringed by a similar book using a similar plan which achieved similar results where the alleged infringer made a different arrangement of the columns and used different headings. The distinction is illustrated in Fred Fisher, Inc. v. Dillingham, 298 F. 145, 151, when the court speaks of two men, each a perfectionist, independently making [p*218] maps of the same territory. Though the maps are identical, each may obtain the exclusive right to make copies of his own particular map, and yet neither will infringe the other‘s copyright. Likewise a copyrighted directory is not infringed by a similar directory which is the product of independent work. [n40] The copyright protects originality rather than novelty or invention -- conferring only "the sole right of multiplying copies." [n41] Absent copying there can be no infringement of copyright. [n42] Thus, respondents may not exclude others from using statuettes of human figures in table lamps; they may only prevent use of copies of their statuettes as such or as incorporated in some other article. Regulation § 202.8, supra, makes clear that artistic articles are protected in "form but not their mechanical or utilitarian aspects." See Stein v. Rosenthal, 103 F.Supp. 227, 231. The dichotomy of protection for the aesthetic is not beauty and utility but art for the copyright and the invention of original and ornamental design for design patents. We find nothing in the copyright statute to support the argument that the intended use or use in industry of an article eligible for copyright bars or invalidates its registration. We do not read such a limitation into the copyright law.

[14] Nor do we think the subsequent registration of a work of art published as an element in a manufactured article, is a misuse of the copyright. This is not different from [p*219] the registration of a statuette and its later embodiment in an industrial article.

[15] "The copyright law, like the patent statutes, makes reward to the owner a secondary consideration." United States v. Paramount Pictures, 334 U.S. 131, 158. However, it is "intended definitely to grant valuable, enforceable rights to authors, publishers, etc., without burdensome requirements; ‘to afford greater encouragement to the production of literary [or artistic] works of lasting benefit to the world.’" Washingtonian Co. v. Pearson, 306 U.S. 30, 36.

[16] The economic philosophy behind the clause empowering Congress to grant patents and copyrights is the conviction that encouragement of individual effort by personal gain is the best way to advance public welfare through the talents of authors and inventors in "Science and useful Arts." Sacrificial days devoted to such creative activities deserve rewards commensurate with the services rendered.

[17] Affirmed.

1. 17 U. S. C. (Supp. V, 1952) § 4:

"The works for which copyright may be secured under this title shall include all the writings of an author."

Id., § 5: "The application for registration shall specify to which of the following classes the work in which copyright is claimed belongs: . . . .

"(g) Works of art; models or designs for works of art.

"(h) Reproductions of a work of art."

Errors of classification are immaterial. See note 19, infra.

2. An unreported action, Stein v. Zuckerman and DuBeshter, was pending in the Eastern District of New York. Note, 66 Harv. L. Rev. 877, 878, n. 8. We are advised that it was dismissed by consent February 24, 1953.

3. Stein v. Expert Lamp Co., 188 F.2d 611. Stein v. Expert Lamp Co., 96 F.Supp. 97, was the first action brought. Through an accident in presentation, the trial court determined the case as though the copyright was on a statuette with lamp attachments. It held the statuettes not copyrightable because this "was evidence of the practical use" intended. Id., at 98. On petition for reconsideration, it held the presence or absence of the attachments immaterial. Stein v. Mazer, 111 F.Supp. 359, 361; Rosenthal v. Stein, 205 F.2d 633, 634. The Court of Appeals for the Seventh Circuit affirmed on the ground that the Copyright Act "does not refer to articles of manufacture having a utilitarian purpose nor does it provide for a previous examination by a proper tribunal as to the originality of the matter offered for copyright . . . ." Stein v. Expert Lamp Co., 188 F.2d 611, 613.

Stein v. Rosenthal, 103 F.Supp. 227, was a second infringement case. It was there held "Protection is not dissipated by taking an unadulterated object of art as copyrighted and integrating it into commercially valuable merchandise." Id., at 230. On appeal, the Court of Appeals for the Ninth Circuit affirmed, saying "The theory that the use of a copyrighted work of art loses its status as a work of art if and when it is put to a functional use has no basis in the wording of the copyright laws and there is nothing in the design-patent laws which excludes a work of art from the operation of the copyright laws." Rosenthal v. Stein, 205 F.2d 633, 635.

In Stein v. Benaderet, 109 F.Supp. 364, 365, a district court of Michigan held that it is the "intent and purpose" of the designer which determines whether an object is copyrightable as a work of art. The court said plaintiffs should have applied for a design patent and held for defendants. An appeal is pending now in the Court of Appeals for the Sixth Circuit.

The opinions in the above cases and those of the District Court and the Court of Appeals in the present litigation deserve careful reading.

4. In this case the Register of Copyrights participated as amicus curiae and supported respondents. Through the Solicitor General he has also filed a brief in this Court, and participated in the oral argument. 346 U.S. 882.

5. We do not reach for constitutional questions not raised by the parties. Chicago & G. T. R. Co. v. Wellman, 143 U.S. 339, 345; New York ex rel. Rosevale Realty Co. v. Kleinert, 268 U.S. 646, 651; C. I. O. v. McAdory, 325 U.S. 472, 475. The fact that the issue was mentioned in argument does not bring the question properly before us. Herbring v. Lee, 280 U.S. 111, 117.

No question of our jurisdiction emerges. Chicot County Dist. v. Bank, 308 U.S. 371. Compare Kalb v. Feuerstein, 308 U.S. 433, and Continental Illinois Nat. Bank & Trust Co. v. Chicago, R. I. & P. R. Co., 294 U.S. 648, 667.

Compare on the constitutional question the following: Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, upheld the copyright of a photograph unanimously. It was said: "By writings in that clause is meant the literary productions of those authors, and Congress very properly has declared these to include all forms of writing, printing, engraving, etching, &c., by which the ideas in the mind of the author are given visible expression." Id., at 58.

"These findings, we think, show this photograph to be an original work of art, the product of plaintiff's intellectual invention, of which plaintiff is the author, and of a class of inventions for which the Constitution intended that Congress should secure to him the exclusive right to use, publish and sell, as it has done by section 4952 of the Revised Statutes." Id., at 60.

Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 249-250, upheld a copyright on circus posters. The Court said:

"We shall do no more than mention the suggestion that painting and engraving unless for a mechanical end are not among the useful arts, the progress of which Congress is empowered by the Constitution to promote. The Constitution does not limit the useful to that which satisfies immediate bodily needs. . . . Personality always contains something unique. It expresses its singularity even in handwriting, and a very modest grade of art has in it something irreducible, which is one man's alone. That something he may copyright unless there is a restriction in the words of the act."

Kalem Co. v. Harper Bros., 222 U.S. 55, 63, involved pirating by motion pictures of the copyrighted dramatic rights of a book. This Court said:

"It is argued that the law construed as we have construed it goes beyond the power conferred upon Congress by the Constitution, to secure to authors for a limited time the exclusive right to their writings. Art. I, § 8, cl. 8. It is suggested that to extend the copyright to a case like this is to extend it to the ideas as distinguished from the words in which those ideas are clothed. But there is no attempt to make a monopoly of the ideas expressed. The law confines itself to a particular, cognate and well known form of reproduction. If to that extent a grant of monopoly is thought a proper way to secure the right to the writings this court cannot say that Congress was wrong."

See also Schreiber v. Thornton, 17 F. 603, reversed on other grounds, Thornton v. Schreiber, 124 U.S. 612.

See Fenning, The Origin of the Patent and Copyright Clause of the Constitution, 17 Geo. L. J. 109; 2 Story, Constitution (5th ed.), c. XIX.

Trade-Mark Cases, 100 U.S. 82, 94. Congress had passed a trade-mark act under the Patent and Copyright Clause. A unanimous Court held this effort to protect trade-marks was unconstitutional:

"The ordinary trade-mark has no necessary relation to invention or discovery. . . . If we should endeavor to classify it under the head of writings of authors, the objections are equally strong. In this, as in regard to inventions, originality is required. And while the word writings may be liberally construed, as it has been, to include original designs for engravings, prints, &c., it is only such as are original, and are founded in the creative powers of the mind. The writings which are to be protected are the fruits of intellectual labor, embodied in the form of books, prints, engravings, and the like." The trade-mark does not "depend upon novelty, invention, discovery, or any work of the brain. It requires no fancy or imagination, no genius, no laborious thought. It is simply founded on priority of appropriation."

See as to commerce, id., at 95-98; Robert, Commentary on the Lanham Trade-Mark Act, 15 U. S. C. A. (§§ 81-1113, 1948) p. 265.

6. National Licorice Co. v. Labor Board, 309 U.S. 350, 357, n. 2; General Talking Pictures Corp. v. Western Electric Co., 304 U.S. 175; Crown C. & S. Co. v. Ferdinand Gutmann Co., 304 U.S. 159, and cases cited; Gunning v. Cooley, 281 U.S. 90. The policy is incorporated in Rule 38 (2), Revised Rules of the Supreme Court of the United States, and the practice of bringing "additional questions into a case" has been condemned recently in Irvine v. California, 347 U.S. 128, 129.

7. Ball, Law of Copyright and Literary Property (1944), 390; Howell, Copyright Law (1952), 130; 1 Ladas, The International Protection of Literary and Artistic Property (1938), 247; Weil, Copyright Law (1917), 227; Derenberg, Copyright No-Man's Land: Fringe Rights in Literary and Artistic Property, 1953 Copyright Problems Analyzed (CCH), 215; Pogue, Borderland -- Where Copyright and Design Patent Meet, 52 Mich. L. Rev. 33; Notes, 21 Geo. Wash. L. Rev. 353; 66 Harv. L. Rev. 877; 27 Ind. L. J. 130. See Report of the Copyright Committee, Board of Trade (London, October 1952), Artistic Copyright and Industrial Designs, 82 et seq.

8. 1 Stat. 124.

9. 2 Stat. 171.

10. 4 Stat. 436.

11. 11 Stat. 139.

12. 13 Stat. 540. Between 1789 and 1904, there were in all some twenty-five laws dealing with copyrights. Solberg, Copyright in Congress (1905), 89-93.

13. § 86, 16 Stat. 212. This Act also vested control of records relating to copyrights in the Librarian of Congress and provided he should administer the law. Id., § 85.

14. In connection with the phrase in the 1870 Act "intended to be perfected as works of the fine arts," see the 1874 amendatory Act, 18 Stat. 78, and Bleistein v. Donaldson Lithographing Co., 188 U.S. 239. Section 3 contained the following provision: "That in the construction of this act, the words 'Engraving,' 'cut' and 'print' shall be applied only to pictorial illustrations or works connected with the fine arts, and no prints or labels designed to be used for any other articles of manufacture shall be entered under the copyright law, but may be registered in the Patent Office."

This was repealed in 1939 and the following enacted:

"SEC. 2. Section 5 (k) of the Act entitled 'An Act to amend and consolidate the Acts respecting copyright' approved March 4, 1909, is hereby amended to read: '(k) Prints and pictorial illustrations including prints or labels used for articles of merchandise.'"

53 Stat. 1142. This was an amendment to § 5 (k) of the Act of 1909, 35 Stat. 1077. It is to be noted, however, that the 1909 Act did not conform to the 1874 language, but the present Act, 17 U. S. C. (Supp. V, 1952) § 5 (k), does contain the amendatory language of the 1939 Act.

15. S. Rep. No. 6187, 59th Cong., 2d Sess. 4:

"The existing statutes attempt specifications which are unfortunate because necessarily imperfect and requiring frequent additions to cover new forms or new processes. The bill in its general definition substitutes a general term, 'all the works of an author.' The term used in the constitution is 'writings.' But Congress has always construed this term broadly, and in doing so has been uniformly supported by judicial decision. It has, for instance, interpreted it as authorizing subject-matter so remote from its popular significance as photographs, paintings, statuary, and dramas, even if unwritten.

"As thus interpreted, the word 'writings' would to-day in popular parlance be more nearly represented by the word 'works;' and this the bill adopts; referring back, however, to the word 'writings' by way of safe anchorage, but regarding this as including 'all forms of record in which the thought of an author may be recorded and from which it may be read or reproduced.'"

Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53 (1884), has held that photographs were copyrightable in spite of the argument that the Constitution only specified protection for "writings" of an "author." This decision made clear that "writings" was not limited to chirography and typography.

16. 35 Stat. 1076.

17. Weil, Copyright Law (1917), 214; Howell, The Copyright Law (3d ed. 1952), 8.

18. H. R. Rep. No. 2222, 60th Cong., 2d Sess. 10. The report is not very clear on the point, however.

19. "The application for registration shall specify to which of the following classes the work in which copyright is claimed belongs:

"(a) Books including composite and cyclopaedic works, directories, gazetteers, and other compilations;

"(b) Periodicals, including newspapers;

"(c) Lectures, sermons, addresses, prepared for oral delivery;

"(d) Dramatic or dramatico-musical compositions;

"(e) Musical compositions;

"(f) Maps;

"(g) Works of art; models or designs for works of art;

"(h) Reproductions of a work of art;

"(i) Drawings or plastic works of a scientific or technical character;

"(j) Photographs;

"(k) Prints and pictorial illustrations:

"Provided, nevertheless, That the above specifications shall not be held to limit the subject-matter of copyright as defined in section four of this Act, nor shall any error in classification invalidate or impair the copyright protection secured under this Act."

35 Stat. 1076.

Subsection (k) was amended by the addition of the words "including prints or labels used for articles of merchandise" in 1939. 53 Stat. 1142. See note 14, supra. Two more classes "(l) Motion-picture photoplays" and "(m) Motion pictures other than photoplays" were added in 1912. 37 Stat. 488.

20. See note 14, supra, for repeal of clause defining engraving cuts and prints in terms of "fine art."

21. Title 17 of the United States Code entitled "Copyrights" was codified into positive law in 1947 without change in the pertinent provisions. 61 Stat. 652, 17 U. S. C. (Supp. V, 1952) §§ 4, 5.

22. E. g., "A female figure bearing an urn in front partly supported by drapery around the head. The figure nude from the waist up and below this the form concealed by conventionalized skirt draperies which flow down and forward forming a tray at the base. Sides and back of skirt in fluted form. The whole being designed as a candlestick with match tray. The figure standing and bent forward from hips and waist."

23. "Works of art. -- This term includes all works belonging fairly to the so-called fine arts. (Paintings, drawings, and sculpture.)

"Productions of the industrial arts utilitarian in purpose and character are not subject to copyright registration, even if artistically made or ornamented." Rules and Regulations for the Registration of Claims to Copyright, Bulletin No. 15 (1910), 8.

24. "Works of art and models or designs for works of art. This term includes all works belonging fairly to the so-called fine arts. (Paintings, drawings, and sculpture.)

"The protection of productions of the industrial arts utilitarian in purpose and character even if artistically made or ornamented depends upon action under the patent law; but registration in the Copyright Office has been made to protect artistic drawings notwithstanding they may afterwards be utilized for articles of manufacture." 37 CFR, 1939, § 201.4 (7).

25. E. g., "Lighting fixture design. By F. E. Guitini. [Bowlshaped bracket embellished with figure of half-nude woman standing in bunch of flowers.] Copyright December 28, 1912. Registration number G 42645. Copyright claimant: Kathodion Bronze Works, New York."

26. Great Northern R. Co. v. United States, 315 U.S. 262, 275.

27. United States v. Perry, 146 U.S. 71, 74.

28. Arguments before the Committees on Patents of the Senate and House of Representatives, conjointly, on S. 6330 and H. R. 19853, To Amend and Consolidate the Acts Respecting Copyright, 59th Cong., 1st Sess., June 6-9, 1906, p. 11. The statement is applicable to the 1909 Act since §§ 5 (g) and (h) of the 1909 Act are identical with the same sections of S. 6330 and H. R. 19853. Although there were other hearings and reports (see 51 House Committee Hearings before Committee on Patents (1906-1912), on Consolidating and Revising the Copyright Laws; H. R. Rep. No. 2222, 60th Cong., 2d Sess. 3), this statement of Mr. Putnam is the only explanation of the change in statutory language, though S. Rep. No. 6187, 59th Cong., 2d Sess., p. 11, refers to "works of art" as a new designation and mentioned the deletion of "fine" from the category.

29. Cf. H. C. White Co. v. Morton E. Converse & Son Co., 20 F.2d 311.

30. Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, 60; Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 250; Louis De Jonge & Co. v. Breuker & Kessler Co., 182 F. 150, 152; F. W. Woolworth Co. v. Contemporary Arts, 193 F.2d 162, 164; see same case, 344 U.S. 228; Yuengling v. Schile, 12 F. 97, 100; Schumacher v. Schwencke, 25 F. 466; Pellegrini v. Allegrini, 2 F.2d 610.

31. Wheaton and Donaldson v. Peters and Grigg, 8 Pet. 591, 661; Fox Film Corp. v. Doyal, 286 U.S. 123, 127.

32. Lord Brougham and Lord St. Leonards in Jefferys v. Boosey, IV H. L. C. 815, 968, 979, 10 Eng. Rep. 681, 741, 745.

33. Two cases are relied upon to support the position of the petitioners. Taylor Instrument Companies v. Fawley-Brost, 139 F.2d 98, and Brown Instrument Co. v. Warner, 82 U. S. App. D. C. 232, 161 F.2d 910. These cases hold that the Mechanical Patent Law and Copyright Laws are mutually exclusive. As to overlapping of Design Patent and Copyright Laws, however, a different answer has been given by the courts. Louis De Jonge & Co. v. Breuker & Kessler Co., 182 F. 150, affirmed on other grounds in 191 F. 35, and 235 U.S. 33; see also cases cited in note 37, infra.

34. This Court said, p. 525: "It is a new and original design for a manufacture, whether of metal or other material; . . . to be either worked into, or on, any article of manufacture; or a new and original shape or configuration of any article of manufacture -- it is one or all of these that the law has in view. And the thing invented or produced, for which a patent is given, is that which gives a peculiar or distinctive appearance to the manufacture, or article to which it may be applied, or to which it gives form. . . . It therefore proposes to secure for a limited time to the ingenious producer of those appearances the advantages flowing from them. . . . It is the appearance itself, therefore, no matter by what agency caused, that constitutes mainly, if not entirely, the contribution to the public which the law deems worthy of recompense."

35. E. g., Design Patent 170.445 Base for table lamps, a fanciful statuette of a girl standing in front of a high rock in bathing costume.

36. The English Copyright Act, 1911, § 22, 4 Halsbury's Statutes of England (2d ed.), p. 800, does not protect designs registrable under the Patents and Designs Act (now the Registered Designs Act, 1949, 17 Halsbury's Statutes of England (2d ed.)) unless such designs are not used or intended to be used as models or patterns to be multiplied by any industrial process. The Board of Trade has ruled that a design shall be deemed to be used as a model or pattern to be multiplied by industrial process within the meaning of § 22 when the design is reproduced or intended to be reproduced in more than fifty single articles. The Copyright (Industrial Designs) Rules, 1949, No. 2367, 1 Statutory Instruments 1949, p. 1453.

37. See Rosenthal v. Stein, note 3, supra; In re Blood, 57 App. D. C. 351, 23 F.2d 772; Korzybski v. Underwood & Underwood, Inc., 36 F.2d 727; William A. Meier Glass Co. v. Anchor Hocking Glass Corp., 95 F.Supp. 264, 267; Jones Bros. Co. v. Underkoffler, 16 F.Supp. 729; Louis De Jonge & Co. v. Breuker & Kessler Co., 182 F. 150; 66 Harv. L. Rev. 884; 52 Mich. L. Rev. 33; cf. Taylor Instrument Companies v. Fawley-Brost, 139 F.2d 98.

38. See, Pogue, Borderland -- Where Copyright and Design Patent Meet, 52 Mich. L. Rev. 33, 58.

39. F. W. Woolworth Co. v. Contemporary Arts, 193 F.2d 162; Ansehl v. Puritan Pharmaceutical Co., 61 F.2d 131; Fulmer v. United States, 122 Ct. Cl. 195, 103 F.Supp. 1021; Muller v. Triborough Bridge Authority, 43 F.Supp. 298.

40. Sampson & Murdock Co. v. Seaver-Radford Co., 140 F. 539. See, Anno. 26 A. L. R. 585.

41. Jeweler's Circular Pub. Co. v. Keystone Publishing Co., 281 F. 83, 94.

42. White-Smith Music Pub. Co. v. Apollo Co., 209 U.S. 1; Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 249; Arnstein v. Porter, 154 F.2d 464, 468-469; Alfred Bell & Co., Ltd. v. Catalda Fine Arts, Inc., 191 F.2d 99, 103; Ansehl v. Puritan Pharmaceutical Co., supra; Christie v. Cohan, 154 F.2d 827.

Opinion of MR. JUSTICE DOUGLAS, in which MR. JUSTICE BLACK concurs.

[18] An important constitutional question underlies this case -- a question which was stirred on oral argument but not treated in the briefs. It is whether these statuettes of dancing figures may be copyrighted. Congress has provided that "works of art," "models or designs for works of art," and "reproductions of a work of art" may be copyrighted (17 U. S. C. § 5); and the Court holds that these statuettes are included in the words "works of art." But may statuettes be granted the monopoly of the copyright?

[19] Article I, § 8 of the Constitution grants Congress the power "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors . . . the [p*220] exclusive Right to their respective Writings . . . ." The power is thus circumscribed: it allows a monopoly to be granted only to "authors" for their "writings." Is a sculptor an "author" and is his statue a "writing" within the meaning of the Constitution? We have never decided the question.

[20] Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, held that a photograph could be copyrighted.

[21] Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, held that chromolithographs to be used as advertisements for a circus were "pictorial illustrations" within the meaning of the copyright laws. Broad language was used in the latter case, ". . . a very modest grade of art has in it something irreducible, which is one man‘s alone. That something he may copyright unless there is a restriction in the words of the act." 188 U.S., at 250. But the constitutional range of the meaning of "writings" in the field of art was not in issue either in the Bleistein case nor in Woolworth Co. v. Contemporary Arts, 344 U.S. 228, recently here on a writ of certiorari limited to a question of damages.

[22] At times the Court has on its own initiative considered and decided constitutional issues not raised, argued, or briefed by the parties. Such, for example, was the case of Continental Bank v. Rock Island R. Co., 294 U.S. 648, 667, in which the Court decided the constitutionality of § 77 of the Bankruptcy Act though the question was not noticed by any party. We could do the same here and decide the question here and now. This case, however, is not a pressing one, there being no urgency for a decision. Moreover, the constitutional materials are quite meager (see Fenning, The Origin of the Patent and Copyright Clause of the Constitution, 17 Geo. L. J. 109 (1929)); and much research is needed.

[23] The interests involved in the category of "works of art," as used in the copyright law, are considerable. The [p*221] Copyright Office has supplied us with a long list of such articles which have been copyrighted -- statuettes, book ends, clocks, lamps, door knockers, candlesticks, inkstands, chandeliers, piggy banks, sundials, salt and pepper shakers, fish bowls, casseroles, and ash trays. Perhaps these are all "writings" in the constitutional sense. But to me, at least, they are not obviously so. It is time that we came to the problem full face. I would accordingly put the case down for reargument.

4.4.2.2 Brandir Int'l, Inc. v. Cascade Pacific Lumber Co. 4.4.2.2 Brandir Int'l, Inc. v. Cascade Pacific Lumber Co.

834 F.2d 1142 (1987)

BRANDIR INTERNATIONAL, INC., Plaintiff-Appellant,
v.
CASCADE PACIFIC LUMBER CO., d/b/a Columbia Cascade Co., Defendant-Appellee, and
David L. Ladd, Register of Copyrights, United States Copyright Office, Third-Party Defendant.

No. 828, Docket 86-6260.

United States Court of Appeals, Second Circuit.

Argued March 2, 1987.
Decided December 2, 1987.

Blum Kaplan, New York City (Lawrence Rosenthal, Laura E. Goldbard, Anita K. Yeung, New York City, of counsel), for plaintiff-appellant.

Fish & Neave, New York City (Donald E. Degling, Susan Progoff, Eric M. Lee, New York City, of counsel), for defendant-appellee.

Before OAKES and WINTER, Circuit Judges, and ZAMPANO, District Judge.[1]

OAKES, Circuit Judge:

In passing the Copyright Act of 1976 Congress attempted to distinguish between [1143] protectable "works of applied art" and "industrial designs not subject to copyright protection." See H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54, reprinted in 1976 U.S.Code Cong. & Admin.News 5659, 5667 (hereinafter H.R.Rep. No. 1476). The courts, however, have had difficulty framing tests by which the fine line establishing what is and what is not copyrightable can be drawn. Once again we are called upon to draw such a line, this time in a case involving the "RIBBON Rack," a bicycle rack made of bent tubing that is said to have originated from a wire sculpture. (A photograph of the rack is contained in the appendix to this opinion.) We are also called upon to determine whether there is any trademark protection available to the manufacturer of the bicycle rack, appellant Brandir International, Inc. The Register of Copyright, named as a third-party defendant under the statute, 17 U.S.C. § 411, but electing not to appear, denied copyrightability. In the subsequent suit brought in the United States District Court for the Southern District of New York, Charles S. Haight, Jr., Judge, the district court granted summary judgment on both the copyright and trademark claims to defendant Cascade Pacific Lumber Co., d/b/a Columbia Cascade Co., manufacturer of a similar bicycle rack. We affirm as to the copyright claim, but reverse and remand as to the trademark claim.

Against the history of copyright protection well set out in the majority opinion in Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411, 415-18 (2d Cir.1985), and in Denicola, Applied Art and Industrial Design: A Suggested Approach to Copyright in Useful Articles, 67 Minn.L.Rev. 707, 709-17 (1983), Congress adopted the Copyright Act of 1976. The "works of art" classification of the Copyright Act of 1909 was omitted and replaced by reference to "pictorial, graphic, and sculptural works," 17 U.S.C. § 102(a)(5). According to the House Report, the new category was intended to supply "as clear a line as possible between copyrightable works of applied art and uncopyrighted works of industrial design." H.R.Rep. No. 1476, at 55, U.S.Code Cong. & Admin.News 1976, p. 5668. The statutory definition of "pictorial, graphic, and sculptural works" states that "the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article." 17 U.S.C. § 101.[2] The legislative history added gloss on the criteria of separate identity and independent existence in saying:

On the other hand, although the shape of an industrial product may be aesthetically satisfying and valuable, the Committee's intention is not to offer it copyright protection under the bill. Unless the shape of an automobile, airplane, ladies' dress, food processor, television set, or any other industrial product contains some element that, physically or conceptually, can be identified as separable from the utilitarian aspects of that article, the design would not be copyrighted under the bill.

H.R.Rep. No. 1476, at 55, U.S.Code Cong. & Admin.News 1976, p. 5668.

As courts and commentators have come to realize, however, the line Congress attempted to draw between copyrightable art and noncopyrightable design "was neither clear nor new." Denicola, supra, 67 Minn.L.Rev. at 720. One aspect of the distinction that has drawn considerable attention is the reference in the House Report to "physically or conceptually" (emphasis added) separable elements. The District of Columbia Circuit in Esquire, Inc. v. Ringer, 591 F.2d 796, 803-04 (D.C.Cir.1978) (holding outdoor lighting fixtures ineligible for copyright), cert. denied, 440 U.S. 908, 99 S.Ct. 1217, 59 L.Ed.2d 456 (1979), called this an "isolated reference" and gave it no significance. Professor Nimmer, however, [1144] seemed to favor the observations of Judge Harold Leventhal in his concurrence in Esquire, who stated that "the overall legislative policy ... sustains the Copyright Office in its effort to distinguish between the instances where the aesthetic element is conceptually severable and the instances where the aesthetic element is inextricably interwoven with the utilitarian aspect of the article." 591 F.2d at 807; see 1 Nimmer on Copyright § 2.08[B] at 2-93 to 2-96.2 (1986). But see Gerber, Book Review, 26 U.C.L.A.L.Rev. 925, 938-43 (1979) (criticizing Professor Nimmer's view on conceptual separability). Looking to the section 101 definition of works of artistic craftsmanship requiring that artistic features be "capable of existing independently of the utilitarian aspects," Professor Nimmer queries whether that requires physical as distinguished from conceptual separability, but answers his query by saying "[t]here is reason to conclude that it does not." See 1 Nimmer on Copyright § 2.08[B] at 2-96.1. In any event, in Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989, 993 (2d Cir.1980), this court accepted the idea that copyrightability can adhere in the "conceptual" separation of an artistic element. Indeed, the court went on to find such conceptual separation in reference to ornate belt buckles that could be and were worn separately as jewelry. Kieselstein-Cord was followed in Norris Industries, Inc. v. International Telephone & Telegraph Corp., 696 F.2d 918, 923-24 (11th Cir.), cert. denied, 464 U.S. 818, 104 S.Ct. 78, 78 L.Ed.2d 89 (1983), although there the court upheld the Register's refusal to register automobile wire wheel covers, finding no "conceptually separable" work of art. See also Transworld Mfg. Corp. v. Al Nyman & Sons, Inc., 95 F.R.D. 95 (D.Del.1982) (finding conceptual separability sufficient to support copyright in denying summary judgment on copyrightability of eyeglass display cases).

In Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411 (2d Cir.1985), a divided panel of this circuit affirmed a district court grant of summary judgment of noncopyrightability of four life-sized, anatomically correct human torso forms. Carol Barnhart distinguished Kieselstein-Cord, but it surely did not overrule it. The distinction made was that the ornamented surfaces of the Kieselstein-Cord belt buckles "were not in any respect required by their utilitarian functions," but the features claimed to be aesthetic or artistic in the Carol Barnhart forms were "inextricably intertwined with the utilitarian feature, the display of clothes." 773 F.2d at 419. But cf. Animal Fair, Inc. v. Amfesco Indus., Inc., 620 F.Supp. 175, 186-88 (D.Minn.1985) (holding bear-paw design conceptually separable from the utilitarian features of a slipper), aff'd mem., 794 F.2d 678 (8th Cir.1986). As Judge Newman's dissent made clear, the Carol Barnhart majority did not dispute "that `conceptual separability' is distinct from `physical separability' and, when present, entitles the creator of a useful article to a copyright on its design." 773 F.2d at 420.

"Conceptual separability" is thus alive and well, at least in this circuit. The problem, however, is determining exactly what it is and how it is to be applied. Judge Newman's illuminating discussion in dissent in Carol Barnhart, see 773 F.2d at 419-24, proposed a test that aesthetic features are conceptually separable if "the article ... stimulate[s] in the mind of the beholder a concept that is separate from the concept evoked by its utilitarian function." Id. at 422. This approach has received favorable endorsement by at least one commentator, W. Patry, Latman's The Copyright Law 43-45 (6th ed. 1986), who calls Judge Newman's test the "temporal displacement" test. It is to be distinguished from other possible ways in which conceptual separability can be tested, including whether the primary use is as a utilitarian article as opposed to an artistic work, whether the aesthetic aspects of the work can be said to be "primary," and whether the article is marketable as art, none of which is very satisfactory. But Judge Newman's test was rejected outright by the majority as "a standard so ethereal as to amount to a `nontest' that would be extremely difficult, if not impossible, to administer or apply." 773 F.2d at 419 n. 5.

[1145] Perhaps the differences between the majority and the dissent in Carol Barnhart might have been resolved had they had before them the Denicola article on Applied Art and Industrial Design: A Suggested Approach to Copyright in Useful Articles, supra. There, Professor Denicola points out that although the Copyright Act of 1976 was an effort "`to draw as clear a line as possible,'" in truth "there is no line, but merely a spectrum of forms and shapes responsive in varying degrees to utilitarian concerns." 67 Minn.L.Rev. at 741. Denicola argues that "the statutory directive requires a distinction between works of industrial design and works whose origins lie outside the design process, despite the utilitarian environment in which they appear." He views the statutory limitation of copyrightability as "an attempt to identify elements whose form and appearance reflect the unconstrained perspective of the artist," such features not being the product of industrial design. Id. at 742. "Copyrightability, therefore, should turn on the relationship between the proffered work and the process of industrial design." Id. at 741. He suggests that "the dominant characteristic of industrial design is the influence of nonaesthetic, utilitarian concerns" and hence concludes that copyrightability "ultimately should depend on the extent to which the work reflects artistic expression uninhibited by functional considerations."[3] Id. To state the Denicola test in the language of conceptual separability, if design elements reflect a merger of aesthetic and functional considerations, the artistic aspects of a work cannot be said to be conceptually separable from the utilitarian elements. Conversely, where design elements can be identified as reflecting the designer's artistic judgment exercised independently of functional influences, conceptual separability exists.

We believe that Professor Denicola's approach provides the best test for conceptual separability and, accordingly, adopt it here for several reasons. First, the approach is consistent with the holdings of our previous cases. In Kieselstein-Cord, for example, the artistic aspects of the belt buckles reflected purely aesthetic choices, independent of the buckles' function, while in Carol Barnhart the distinctive features of the torsos — the accurate anatomical design and the sculpted shirts and collars — showed clearly the influence of functional concerns. Though the torsos bore artistic features, it was evident that the designer incorporated those features to further the usefulness of the torsos as mannequins. Second, the test's emphasis on the influence of utilitarian concerns in the design process may help, as Denicola notes, to "alleviate the de facto discrimination against nonrepresentational art that has regrettably accompanied much of the current analysis." Id. at 745.[4] Finally, and perhaps most importantly, we think Denicola's test will not be too difficult to administer in practice. The work itself will continue to give "mute testimony" of its origins. In addition, the parties will be required to present evidence relating to the design process and the nature of the work, with the trier of fact making the determination [1146] whether the aesthetic design elements are significantly influenced by functional considerations.

Turning now to the facts of this case, we note first that Brandir contends, and its chief owner David Levine testified, that the original design of the RIBBON Rack stemmed from wire sculptures that Levine had created, each formed from one continuous undulating piece of wire. These sculptures were, he said, created and displayed in his home as a means of personal expression, but apparently were never sold or displayed elsewhere. He also created a wire sculpture in the shape of a bicycle and states that he did not give any thought to the utilitarian application of any of his sculptures until he accidentally juxtaposed the bicycle sculpture with one of the self-standing wire sculptures. It was not until November 1978 that Levine seriously began pursuing the utilitarian application of his sculptures, when a friend, G. Duff Bailey, a bicycle buff and author of numerous articles about urban cycling, was at Levine's home and informed him that the sculptures would make excellent bicycle racks, permitting bicycles to be parked under the overloops as well as on top of the underloops. Following this meeting, Levine met several times with Bailey and others, completing the designs for the RIBBON Rack by the use of a vacuum cleaner hose, and submitting his drawings to a fabricator complete with dimensions. The Brandir RIBBON Rack began being nationally advertised and promoted for sale in September 1979.

In November 1982 Levine discovered that another company, Cascade Pacific Lumber Co., was selling a similar product. Thereafter, beginning in December 1982, a copyright notice was placed on all RIBBON Racks before shipment and on December 10, 1982, five copyright applications for registration were submitted to the Copyright Office. The Copyright Office refused registration by letter, stating that the RIBBON Rack did not contain any element that was "capable of independent existence as a copyrightable pictorial, graphic or sculptural work apart from the shape of the useful article." An appeal to the Copyright Office was denied by letter dated March 23, 1983, refusing registration on the above ground and alternatively on the ground that the design lacked originality, consisting of "nothing more than a familiar public domain symbol." In February 1984, after the denial of the second appeal of the examiner's decision, Brandir sent letters to customers enclosing copyright notices to be placed on racks sold prior to December 1982.

Between September 1979 and August 1982 Brandir spent some $38,500 for advertising and promoting the RIBBON Rack, including some 85,000 pieces of promotional literature to architects and landscape architects. Additionally, since October 1982 Brandir has spent some $66,000, including full-, half-, and quarter-page advertisements in architectural magazines such as Landscape Architecture, Progressive Architecture, and Architectural Record, indeed winning an advertising award from Progressive Architecture in January 1983. The RIBBON Rack has been featured in Popular Science, Art and Architecture, and Design 384 magazines, and it won an Industrial Designers Society of America design award in the spring of 1980. In the spring of 1984 the RIBBON Rack was selected from 200 designs to be included among 77 of the designs exhibited at the Katonah Gallery in an exhibition entitled "The Product of Design: An Exploration of the Industrial Design Process," an exhibition that was written up in the New York Times.

Sales of the RIBBON Rack from September 1979 through January 1985 were in excess of $1,367,000. Prior to the time Cascade Pacific began offering for sale its bicycle rack in August 1982, Brandir's sales were $436,000. The price of the RIBBON Rack ranges from $395 up to $2,025 for a stainless steel model and generally depends on the size of the rack, one of the most popular being the RB-7, selling for $485.

Applying Professor Denicola's test to the RIBBON Rack, we find that the rack is not copyrightable. It seems clear that [1147] the form of the rack is influenced in significant measure by utilitarian concerns and thus any aesthetic elements cannot be said to be conceptually separable from the utilitarian elements. This is true even though the sculptures which inspired the RIBBON Rack may well have been — the issue of originality aside — copyrightable.

Brandir argues correctly that a copyrighted work of art does not lose its protected status merely because it subsequently is put to a functional use. The Supreme Court so held in Mazer v. Stein, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630 (1954), and Congress specifically intended to accept and codify Mazer in section 101 of the Copyright Act of 1976. See H.R.Rep. No. 1476 at 54-55. The district court thus erred in ruling that, whatever the RIBBON Rack's origins, Brandir's commercialization of the rack disposed of the issue of its copyrightability.

Had Brandir merely adopted one of the existing sculptures as a bicycle rack, neither the application to a utilitarian end nor commercialization of that use would have caused the object to forfeit its copyrighted status. Comparison of the RIBBON Rack with the earlier sculptures, however, reveals that while the rack may have been derived in part from one of more "works of art," it is in its final form essentially a product of industrial design. In creating the RIBBON Rack, the designer has clearly adapted the original aesthetic elements to accommodate and further a utilitarian purpose. These altered design features of the RIBBON Rack, including the spacesaving, open design achieved by widening the upper loops to permit parking under as well as over the rack's curves, the straightened vertical elements that allow in- and above-ground installation of the rack, the ability to fit all types of bicycles and mopeds, and the heavy-gauged tubular construction of rustproof galvanized steel, are all features that combine to make for a safe, secure, and maintenance-free system of parking bicycles and mopeds. Its undulating shape is said in Progressive Architecture, January 1982, to permit double the storage of conventional bicycle racks. Moreover, the rack is manufactured from 2 3/8-inch standard steam pipe that is bent into form, the six-inch radius of the bends evidently resulting from bending the pipe according to a standard formula that yields bends having a radius equal to three times the nominal internal diameter of the pipe.

Brandir argues that its RIBBON Rack can and should be characterized as a sculptural work of art within the minimalist art movement. Minimalist sculpture's most outstanding feature is said to be its clarity and simplicity, in that it often takes the form of geometric shapes, lines, and forms that are pure and free of ornamentation and void of association. As Brandir's expert put it, "The meaning is to be found in, within, around and outside the work of art, allowing the artistic sensation to be experienced as well as intellectualized." People who use Foley Square in New York City see in the form of minimalist art the "Tilted Arc," which is on the plaza at 26 Federal Plaza. Numerous museums have had exhibitions of such art, and the school of minimalist art has many admirers.

It is unnecessary to determine whether to the art world the RIBBON Rack properly would be considered an example of minimalist sculpture. The result under the copyright statute is not changed. Using the test we have adopted, it is not enough that, to paraphrase Judge Newman, the rack may stimulate in the mind of the reasonable observer a concept separate from the bicycle rack concept. While the RIBBON Rack may be worthy of admiration for its aesthetic qualities alone, it remains nonetheless the product of industrial design. Form and function are inextricably intertwined in the rack, its ultimate design being as much the result of utilitarian pressures as aesthetic choices. Indeed, the visually pleasing proportions and symmetricality of the rack represent design changes made in response to functional concerns. Judging from the awards the rack has received, it would seem in fact that Brandir has achieved with the RIBBON Rack the highest goal of modern industrial design, that is, the harmonious fusion of function and aesthetics. Thus there remains no artistic element of the RIBBON [1148] Rack that can be identified as separate and "capable of existing independently, of, the utilitarian aspects of the article." Accordingly, we must affirm on the copyright claim.

As to whether the configuration of Brandir's bicycle rack can be protected under either section 43(a) of the Lanham Act, 15 U.S.C. § 1125(a), or New York State unfair competition law, we are reminded that the design of a product itself may function as its packaging or protectable trade dress. See LeSportsac, Inc. v. K mart Corp., 754 F.2d 71, 75 (2d Cir.1985). The district court dismissed Brandir's claims, saying that its analysis of the copyright issue was sufficient to dispose of the Lanham Act and common law claims. The court stated "the design feature of the Ribbon Racks is clearly dictated by the function to be performed, namely, holding up bicycles. If the steam pipes were not bent into the design, but instead remained flat, the bicycles would not stand up, they would fall down." But as Judge Newman noted in his dissent in Carol Barnhart, 773 F.2d at 420 n. 1, the principle of conceptual separability of functional design elements in copyright law is different from the somewhat similar principle of functionality as developed in trademark law. For trademark purposes, he pointed out, a design feature "has been said to be functional if it is `essential to the use or purpose of the article' or `affects the cost or quality of the article.'" Id. (quoting Inwood Laboratories, Inc. v. Ives Laboratories, Inc., 456 U.S. 844, 850 n. 10, 102 S.Ct. 2182, 2187 n. 10, 72 L.Ed.2d 606 (1982)); see LeSportsac, Inc. v. K mart Corp., 754 F.2d at 75-76 (trade dress of a product is eligible for protection if it has acquired a secondary meaning and is nonfunctional).[5]

Here, the district court limited its inquiry to determining whether portions of the RIBBON Rack performed the function of a bicycle rack. But the fact that a design feature performs a function does not make it essential to the performance of that function; it is instead the absence of alternative constructions performing the same function that renders the feature functional. Thus, the true test of functionality is not whether the feature in question performs a function, but whether the feature "is dictated by the functions to be performed," Warner Bros. Inc. v. Gay Toys, Inc., 724 F.2d 327, 331 (2d Cir.1983) (quoted in LeSportsac, Inc. v. K mart Corp., 754 F.2d at 76), as evidenced by available alternative constructions. See Metro Kane Imports, Ltd. v. Rowoco, Inc., 618 F.Supp. 273, 275-76 (S.D.N.Y.1985), aff'd mem., 800 F.2d 1128 (2d Cir.1986) (finding high-tech design of orange juice squeezer not dictated by function to be performed as there was no evidence that design permitted juicer to be manufactured at lower price or with altered performance). There are numerous alternative bicycle rack constructions. The nature, price, and utility of these constructions are material issues of fact not suitable for determination by summary judgment.[6] For example, while it is true that the materials used by Brandir are standard-size pipes, we have no way of knowing whether the particular size and weight of the pipes used is the best, the most economical, or the only available size and weight pipe in the marketplace. We would rather think the opposite might be the case. So, too, with the dimension of the bends being dictated by a standard formula corresponding to the pipe size; it could be that there are many standard radii and that the particular radius of Brandir's RIBBON Rack actually required new tooling. This issue of functionality on remand should be viewed in terms of bicycle racks generally and not one-piece undulating bicycle racks specifically. See id. at 330-32; see also In re DC Comics, Inc., 689 F.2d 1042, 1045 (C.C.P.A.1982) (dolls generally and not Superman dolls are the class by [1149] which functionality is determined). We reverse and remand as to the trademark and unfair competition claims.

Judgment affirmed as to the copyright claim; reversed and remanded as to the trademark and unfair competition claims.

APPENDIX

 

[1150] APPENDIX

 

WINTER, Circuit Judge, concurring in part and dissenting in part:

Although I concur in the reversal of the district court's grant of summary judgment on the trademark and unfair competition claims, I respectfully dissent from the majority's discussion and disposition of the copyright claim.

My colleagues, applying an adaptation of Professor Denicola's test, hold that the aesthetic elements of the design of a useful article are not conceptually separable from [1151] its utilitarian aspects if "[f]orm and function are inextricably intertwined" in the article, and "its ultimate design [is] as much the result of utilitarian pressures as aesthetic choices." Applying that test to the instant matter, they observe that the dispositive fact is that "in creating the Ribbon Rack, [Levine] has clearly adapted the original aesthetic elements to accommodate and further a utilitarian purpose." (emphasis added). The grounds of my disagreement are that: (1) my colleagues' adaptation of Professor Denicola's test diminishes the statutory concept of "conceptual separability" to the vanishing point; and (2) their focus on the process or sequence followed by the particular designer makes copyright protection depend upon largely fortuitous circumstances concerning the creation of the design in issue.

With regard to "conceptual separability," my colleagues deserve considerable credit for their efforts to reconcile Carol Barnhart Inc. v. Economy Cover Corp., 773 F.2d 411 (2d Cir.1985) with Kieselstein-Cord v. Accessories by Pearl, Inc., 632 F.2d 989 (2d Cir.1980). In my view, these cases are not reconcilable. Carol Barnhart paid only lip service to the fact that the "conceptual separability" of an article's aesthetic utilitarian aspects may render the design of a "useful article" a copyrightable "sculptural work." 17 U.S.C. § 101 (1982). Actually, the Carol Barnhart majority applied a test of physical separability. They thus stated:

What distinguishes [the Kieselstein Cord] buckles from the Barnhart forms is that the ornamented surfaces of the buckles were not in any respect required by their utilitarian functions; the artistic and aesthetic features could thus be conceived of as having been added to, or superimposed upon, an otherwise utilitarian article. The unique artistic design was wholly unnecessary to performance of the utilitarian function. In the case of the Barnhart forms, on the other hand, the features claimed to be aesthetic or artistic, e.g., the life-size configuration of the breasts and the width of the shoulders are inextricably intertwined with the utilitarian feature, the display of clothes.

773 F.2d at 419 (emphasis added). In contrast, Kieselstein-Cord focused on the fact that the belt buckles at issue could be perceived as objects other than belt buckles:

We see in appellant's belt buckles conceptually separable sculptural elements, as apparently have the buckles' wearers who have used them as ornamentation for parts of the body other than the waist.

632 F.2d at 993.

My colleagues' adaptation of the Denicola test tracks the Carol Barnhart approach, whereas I would adopt that taken in Kieselstein-Cord, which allows for the copyrightability of the aesthetic elements of useful articles even if those elements simultaneously perform utilitarian functions.[7] The latter approach received its fullest elaboration in Judge Newman's dissent in Carol Barnhart, where he explained that "[f]or the [artistic] design features to be `conceptually separate' from the utilitarian aspects of the useful article that embodies the design, the article must stimulate in the mind of the beholder a concept that is separate from the concept evoked by its utilitarian function." 773 F.2d at 422 (Newman, J., dissenting).

In other words, the relevant question is whether the design of a useful article, however intertwined with the article's utilitarian aspects, causes an ordinary reasonable observer to perceive an aesthetic concept not related to the article's use. The answer to this question is clear in the instant case because any reasonable observer would easily view the Ribbon Rack as an [1152] ornamental sculpture.[8] Indeed, there is evidence of actual confusion over whether it is strictly ornamental in the refusal of a building manager to accept delivery until assured by the buyer that the Ribbon Rack was in fact a bicycle rack. Moreover, Brandir has received a request to use the Ribbon Rack as environmental sculpture, and has offered testimony of art experts who claim that the Ribbon Rack may be valued solely for its artistic features. As one of those experts observed: "If one were to place a Ribbon Rack on an island without access, or in a park and surround the work with a barrier, ... its status as a work of art would be beyond dispute."[9]

My colleagues also allow too much to turn upon the process or sequence of design followed by the designer of the Ribbon Rack. They thus suggest that copyright protection would have been accorded "had Brandir merely adopted ... as a bicycle rack" an enlarged version of one of David Levine's original sculptures rather than one that had wider upper loops and straightened vertical elements. I cannot agree that copyright protection for the Ribbon Rack turns on whether Levine serendipitously chose the final design of the Ribbon Rack during his initial sculptural musings or whether the original design had to be slightly modified to accommodate bicycles. Copyright protection, which is intended to generate incentives for designers by according property rights in their creations, should not turn on purely fortuitous events. For that reason, the Copyright Act expressly states that the legal test is how the final article is perceived, not how it was developed through various stages. It thus states in pertinent part:

the design of a useful article ... shall be considered a ... sculptural work only if, and only to the extent that, such design incorporates ... sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.

17 U.S.C. § 101 (1982) (emphasis added).

I therefore dissent from the decision so far as it relates to copyrightability but concur in its discussion and holding as to the trademark and unfair competition claims.

[1] Of the United States District Court for the District of Connecticut, sitting by designation.

[2] The statute also defines "useful article" as one "having an intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information. An article that is normally a part of a useful article is considered a `useful article.'" 17 U.S.C. § 101.

[3] Professor Denicola rejects the exclusion of all works created with some utilitarian application in view, for that would not only overturn Mazer v. Stein, 347 U.S. 201, 74 S.Ct. 460, 98 L.Ed. 630 (1954), on which much of the legislation is based, but also "a host of other eminently sensible decisions, in favor of an intractable factual inquiry of questionable relevance." 67 Minn.L.Rev. at 741. He adds that "[a]ny such categorical approach would also undermine the legislative determination to preserve an artist's ability to exploit utilitarian markets." Id. (citing 17 U.S.C. § 113(a) (1976)).

[4] We are reminded not only by Judge Gesell in the district court in Esquire, 414 F.Supp. 939, 941 (D.D.C.1976), but by Holmes in Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 251-52, 23 S.Ct. 298, 300-01, 47 L.Ed. 460 (1903), by Mazer v. Stein, 347 U.S. at 214, 74 S.Ct. at 468, and by numerous other opinions, that we judges should not let our own view of styles of art interfere with the decisionmaking process in this area. Denicola suggests that the shape of a Mickey Mouse telephone is copyrightable because its form is independent of function, and "[a] telephone shape owing more to Arp, Brancusi, or Moore than Disney may be equally divorced from utilitarian influence." 67 Minn.L.Rev. at 746. This is true, of course, of the artist Christo's "Running Fence," approved (following Professor Nimmer) as an example of conceptual separability in Keiselstein-Cord, 632 F.2d at 993.

[5] Because the district court viewed the rack as entirely functional, it therefore did not reach the next step of determining whether Brandir's RIBBON Rack had acquired secondary meaning by the time Cascade started to manufacture its bicycle rack.

[6] Indeed, in addition to the numerous bicycle racks on the market, one may observe trees, awning supports, parking meters, signs, fire plugs, and many other objects used as bicycle racks.

[7] Indeed, Kieselstein-Cord approved Professor Nimmer's example of Christo's "Running Fence" as an object whose sculptural features were conceptually, but not physically, separable from its utilitarian aspects. 632 F.2d at 993; see 1 Nimmer on Copyright § 2.08[B] at 2-96.1 & n. 112.2 (1987). The fact that the Running Fence's aesthetic features were "inextricably intertwined" with its functional aspects, however, creates doubt as to whether it is a copyrightable "sculptural work" under Carol Barnhart or the instant decision.

[8] The reasonable observer may be forgiven, however, if he or she does not recognize the Ribbon Rack as an example of minimalist art.

[9] The Copyright Office held that the Ribbon Rack was not copyrightable because it lacked originality. There may be some merit in that view in light of the Ribbon Rack's use of standard radii. This issue, however, was not raised in defendant's motion for summary judgment, was not addressed by the district court, and is not implicated here.

4.5 Architectural Works 4.5 Architectural Works

4.5.1 Shine v. Childs 4.5.1 Shine v. Childs

382 F.Supp.2d 602 (2005)

Thomas SHINE, Plaintiff,
v.
David M. CHILDS and Skidmore Owings & Merrill, LLP, Defendants.

No. 04 Civ. 8828 (MBM).

United States District Court, S.D. New York.

August 10, 2005.

[603] [604] Andrew Baum, Paul Fields, Atul R. Singh, Michael J. Sullivan, Darby & Darby P.C., New York, New York, for Plaintiff.

Richard A. Williamson, Flemming, Zulack & Williamson, LLP, New York, New York, Marcia B. Paul, Davis Wright Tremaine LLP, New York, New York, for Defendants.

OPINION & ORDER

MUKASEY, District Judge.

Plaintiff Thomas Shine sues David M. Childs and Skidmore, Owings & Merrill, LLP (SOM) for copyright infringement under the United States Copyright Act, 17 U.S.C. § 101 — § 1332 (2000). Shine alleges that he created designs for an original skyscraper which Childs saw and later copied in the first design plan for the [605] Freedom Tower at the World Trade Center (WTC) site. Defendants move to dismiss the Complaint, or alternatively for summary judgment. For the reasons explained below, defendants' motion for summary judgment is granted in part and denied in part.

I.

The facts viewed in the light most favorable to the plaintiff, see Higgins v. Metro-North R.R. Co., 318 F.3d 422, 424 (2d Cir.2003), are as follows. In fall 1999, Shine was a student in the Masters of Architecture Program at the Yale School of Architecture. As part of the required curriculum in his program, he took a studio class on skyscrapers taught by renowned architect Cesar Pelli. (Compl.¶ 8) The object of this studio was to create a design proposal for a monumental skyscraper that would be built on West 32nd Street in Manhattan and used by the media during the 2012 Olympic Games; the building was to be adjacent to the proposed West Side stadium. See id.; Shine Decl. ¶ 5.

During the first half of October 1999, Shine developed a preliminary model for his design, which he refers to as "Shine '99" for the purposes of this litigation.[1] Plaintiff describes Shine '99 as a tower that tapers as it rises, with "two straight, parallel, roughly triangular sides, connected by two twisting facades, resulting in a tower whose top [is] in the shape of a parallelogram." (Compl.¶ 9) See id. Ex. A, pp. 1-4 (photographs of Shine '99); see also App. One.

By the end of the fall 1999 semester, Shine had developed a more sophisticated model of his design, entitled "Olympic Tower." Shine describes this structure as "a twisting tower with a symmetrical diagonal column grid, expressed on the exterior of the building, that follows the twisting surface created by the floor plates' geometry." (Id. ¶ 10) According to Shine, the column grid he designed gives rise to "an elongated diamond pattern, supporting a textured curtain wall with diamonds interlocking and protruding to create a crenelated appearance." (Id.) See id. Ex. B, pp. 1-9 (photographs of various models and sketches of Olympic Tower and its design elements); see also App. Two.

On or about December 9, 1999, Shine presented his designs for Olympic Tower to a jury of experts invited by the Yale School of Architecture to evaluate and critique its students' work. During a 30-minute presentation to the panel, Shine explained his tower's structural design, and displayed different structural and design models (including Shine '99), renderings, floor plans, elevations, sections, a site plan, and a photomontage giving a visual impression of the tower's exterior. (Shine Decl. ¶¶ 7-9) Defendant Childs was on the panel, and he praised Olympic Tower during the presentation, as did the other luminaries[2] evaluating Shine's work. When the review was completed, Shine was applauded by the jury and other visitors, which, according to Shine, is "highly unusual" at a student's final review. (Shine Decl. ¶ 10) After the presentation, Childs approached Shine, complimented Shine's color pencil rendering of Olympic Tower, and invited Shine to visit after his graduation. See Compl. ¶ 11; Shine Decl. ¶ 10.

[606] Childs' favorable reaction to Olympic Tower was also documented in Retrospecta, an annual alumni magazine[3] published by the Yale School of Architecture featuring selected works by the school's current students. The 1999-2000 edition of Retrospecta featured a large composite photographic rendering of Olympic Tower set against an imaginary New York sunset, in addition to smaller inset photographs of two of Shine's models of the tower. Favorable comments from the panel members were printed next to the photographic rendering, including the following compliment from Childs: "It is a very beautiful shape. You took the skin and developed it around the form — great!" (Compl.Ex. C) Shine does not allege that he had any contact with Childs after the December 1999 panel evaluation. However, he does claim that Childs' design for the Freedom Tower, unveiled four years later, infringed Shine '99 and Olympic Tower.

Childs did not begin work on the Freedom Tower until summer 2003. In order to choose the best possible design for the rebuilt WTC, the Lower Manhattan Development Corporation and the Port Authority of New York and New Jersey held an architectural competition in 2002 and 2003, in search of a master WTC site plan. In February 2003, Studio Daniel Libeskind's plan entitled "Memory Foundations" was selected as the winning design. See Suzanne Stephens, Imagining Ground Zero: Official and Unofficial Proposals for the World Trade Center Site 11, 28-29 (2004). In summer 2003, WTC developer Larry Silverstein asked Childs, who is a Consulting Design Partner at SOM, to begin working as design architect and project manager for the tallest building at the proposed new WTC site as conceptualized by Libeskind — the building that later would be called the Freedom Tower. Id. at 29. Libeskind was to serve as collaborating architect during the initial concept and schematic design phases. Id. at 32. In spite of what was described as a "difficult marriage" between Childs and Libeskind, see id. at 29, a design for the Freedom Tower was completed within six months, and was presented to the public at a press conference at Federal Hall in lower Manhattan on December 19, 2003. See id. at 32; Compl. ¶ 17; Durschinger Aff. ¶ 34. At this presentation, SOM and Childs displayed six large computer-generated images of the Freedom Tower, see Stephens at 34-35; two scale models of the Tower, see Durschinger Aff. Exs. N, O, and P; and a computer slide show detailing the Tower's design principles, see Durschinger Aff. Ex. Q. They also distributed a press packet containing six images of the proposed Tower, see id. Ex. R; see also App. Three.

As described by Shine, this version of the Freedom Tower "tapers as it rises and has two straight, parallel, roughly triangular facades on opposite sides, with two twisting facades joining them." (Compl.¶ 18) Shine alleges that this design is substantially similar to the form and shape of Shine '99, and that it incorporates a structural grid identical to the grid in Olympic Tower, as well as a facade design that is "strikingly similar" to the one in Olympic Tower. (Id.) Apparently, others at the Yale School of Architecture noticed the similarity between the Freedom Tower and Shine's design: According to plaintiff's expert, Yale Professor James Axley, several days after Childs unveiled the design for the Freedom Tower, one of Shine's original models for Olympic Tower "was retrieved [607] from archival storage and placed on the desk of the Dean of the School of Architecture." (Axley Decl. ¶ 7)

Shine registered Olympic Tower as an architectural work with the U.S. Copyright Office on March 30, 2004 (Compl.Ex. E), and did the same for Shine '99 on June 24, 2004 (id. Ex. D). He filed the Complaint in this action on November 8, 2004, claiming that defendants copied his designs without his permission or authorization, and stating that defendants distributed and claimed credit for his designs "willfully and with conscious disregard" for his rights in his copyrighted works. (Id. ¶ 22)

Shine requests an injunction to prevent further infringement by defendants, as well as actual damages and defendants' profits realized by their infringement. (Id. ¶¶ 27-28) Defendants move to dismiss the Complaint, or alternatively for summary judgment, claiming that Shine's works are not original and not worthy of protection, and further arguing that there is no substantial similarity between either work and the Freedom Tower.

It should be noted that in June 2005, after law enforcement authorities, among others, objected to the Freedom Tower's original design,[4] Childs, SOM, and Libeskind unveiled a substantially redesigned version of the Tower. The alleged infringing design apparently has been scrapped and is unlikely to be constructed. The new version has, at least to this court's untrained eye, little similarity to either of Shine's copyrighted works, and the court assumes that Shine makes no claim that it infringes his works. Because the alleged infringing design may never be constructed, Shine's actual damages in this action may be reduced, and he may be unable to show the need for an injunction. But because defendants' original design for the Freedom Tower remains in the public domain, Shine's infringement claim stands.

Defendants have moved under Fed.R.Civ.P. 12(b)(6) to dismiss the Complaint, or alternatively, for summary judgment under Fed.R.Civ.P. 56. Because plaintiff has treated the motion as one for summary judgment, see Pl. Br. at 11, and because both parties have submitted materials outside the Complaint that the court has found helpful, the court will consider those materials, and apply summary judgment standards. In assessing whether a genuine issue of material fact remains to be tried, the court will view the facts in the light most favorable to the nonmoving party. SCS Communications, Inc. v. Herrick Co., 360 F.3d 329, 338 (2d Cir.2004).

II.

To prevail, plaintiff must prove "`(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.'" Williams, 84 F.3d at 587 (quoting Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991)). To prove copying of original elements of his work, in addition to showing originality, plaintiff must demonstrate both that defendants actually copied his works, and that such copying was illegal because there is substantial similarity between each of his works and the alleged infringing work — the Freedom Tower. Knitwaves, Inc. v. Lollytogs Ltd., 71 F.3d 996, 1002 (2d Cir.1995).

Defendants argue first that neither Shine '99 nor Olympic Tower qualifies as an architectural work under the Copyright Act. They argue also that both designs are unoriginal and functional, and therefore unworthy of whatever copyright protection [608] they currently have. Finally, assuming that plaintiff's copyrights are valid, defendants deny that they copied plaintiff's designs, and assert that there is no substantial similarity between plaintiff's designs and the Freedom Tower. Plaintiff counters that Shine '99 and Olympic Tower are each original, copyrightable designs, that defendants actually copied each work, and that the Freedom Tower is substantially similar to each in different ways.

A. Architectural Works Under the Copyright Act

Prior to 1990, the United States did not allow structures to be copyrighted, except those few that did not serve any utilitarian purpose. See 1 Nimmer on Copyright § 2.20[A]. However, in 1989, the United States became a party to the Berne Convention for the Protection of Literary and Artistic Works, which required protection for "`three dimensional works relative to ... architecture.'" See id. (quoting Berne Convention for the Protection of Literary and Artistic Works, revised at Paris, July 24, 1971, art. 2, 828 U.N.T.S. 221). Membership in the Berne Convention required the United States to protect works of architecture; therefore, in 1990, Congress amended the Copyright Act, adding the Architectural Works Copyright Protection Act (AWCPA), which included architectural works as a new category of copyrightable material.

The AWCPA defines an architectural work as:

the design of a building as embodied in any tangible medium of expression, including a building, architectural plans, or drawings. The work includes the overall form as well as the arrangement and composition of spaces and elements in the design, but does not include individual standard features.

17 U.S.C. § 101. Defendants cite various portions of the legislative history of the AWCPA to argue that Shine's models are not architectural works meriting copyright protection. They claim that Shine's works are preliminary or conceptual, and do not meet the standard of a "design of a building." They argue also that plans for the "design of a building" may be protected only if a building actually could be constructed from the plans.

Defendants cite no cases to support their reading of the AWCPA. The statute nowhere states or implies that only designs capable of construction are worthy of protection. Although our Circuit has not specifically articulated the standard by which an architectural design is to be evaluated under the Copyright Act, when considering pictorial, graphic, and sculptural (PGS) works, also protected by the Act, see 17 U.S.C. § 101, it has twice noted that plans or designs not sufficiently detailed to allow for construction still may be protected. See Attia v. Soc'y of the N.Y. Hosp., 201 F.3d 50, 57 (2d Cir.1999) ("[W]e do not mean to suggest that, in the domain of copyrighted architectural depictions, only final construction drawings can contain protected expression."); Sparaco v. Lawler, Matusky & Skelly Eng'rs LLP, 303 F.3d 460, 469 (2d Cir.2002) ("We do not mean to imply that technical drawings cannot achieve protected status unless they are sufficiently complete and detailed to support actual construction."). This reasoning should apply equally to architectural works, because our Circuit also has held that "`[i]n general, architectural works are subject to the same standards that apply to other copyrightable works.'" Attia, 201 F.3d at 53 n. 3 (quoting 1 Nimmer § 2.20[A]). It is true that "generalized ideas and concepts pertaining to the placement of elements, traffic flow, and engineering strategies," or in other words, "ideas and concepts," are not worthy of protection. Id. at 57. However, once a design includes "specific expression and [609] realization of ... ideas," copying constitutes infringement. Sparaco, 303 F.3d at 469; cf. Peter Pan Fabrics, Inc. v. Martin Weiner Corp., 274 F.2d 487, 489 (2d Cir.1960) ("[N]o principle can be stated as to when an imitator has gone beyond copying the `idea' and has borrowed its `expression.' Decisions must therefore inevitably be ad hoc.") (L.Hand, J.).

Both Shine '99 and Olympic Tower are worthy of protection under the AWCPA. Shine '99 is a scale model of a twisting tower: Two of the tower's sides are smooth and taper straight toward the top creating a roughly triangular shape; the other two sides twist and taper as they rise, and one of those sides features four graded setbacks or levels that narrow as the tower rises. The top of the tower forms a parallelogram. See Compl. Ex. A, pp. 1-4; Shine Decl. ¶ 18. Shine '99, although certainly a rough model, is more than a concept or an idea; it is a distinctive design for a building. As explained above, whether a tower actually could be constructed from this model is irrelevant. Defendants argue that the shape and form of Shine '99 are so rudimentary and standard that protecting it would be akin to protecting a particular geometric shape, such as "an ellipse, a pyramid, or an egg." (Def. Br. at 28) However, the AWCPA protects "the design of a building as embodied in any tangible medium of expression ... [including] the overall form as well as the arrangement and composition of spaces and elements in the design...." 17 U.S.C. § 101. Individual arguably "standard" elements of Shine '99, such as its twist or its setbacks, might not be worthy of protection, but the arrangement and composition of the various elements in the model do at least arguably constitute the "design of a building" under the AWCPA.

The same is true for Olympic Tower, which is a much more intricate and detailed design than Shine '99. The copyrighted Olympic Tower materials include two models of the tower, one of the building's internal supports and one of its external appearance. Both models show that the building twists on all four sides; comparing the models reveals that the internal diamond-shaped grid supporting the tower is reflected and repeated in the external "skin" on its facade — a design that Childs commented on during his evaluation of Shine's work. See Compl. Ex. B, pp. 2-6; Ex. C. Shine also copyrighted elevation sketches of the tower to display the building's core at different levels, see id. Ex. B, pp. 7-8, a photomontage of what the building might look like against the New York sky, see id. Ex. B. p. 1, as well as what appears to be a sketch of the undulating triangular grid design for the exterior, of the building, see id. Ex. B, p. 9. The detailed and specific materials Shine copyrighted for Olympic Tower certainly constitute the "design of a building," and qualify it as an architectural work under the AWCPA.

B. Originality

Defendants next claim that neither Shine '99 nor Olympic Tower is sufficiently original to warrant protection under the AWCPA. Using the House Committee Report on the AWCPA as their guide, defendants argue for a two-step analysis of the originality and functionality of an architectural work: First, the House Report noted, the work in question should be examined for the presence of original design elements. If such elements exist and are not functionally required, the Report concluded, then the work is protectable. (Def. Br. at 31) Following this framework, defendants argue that no single part of Shine's work is original; that any parts that might be original are functionally required to support its design and therefore unprotectable; and that the arrangement [610] of the various design elements featured in Shine's work is a compilation not meriting protection under existing law.

In this analysis, defendants fly high and fast over the large body of Supreme Court and Second Circuit case law on originality and copyright infringement, as well as the text of the AWCPA, which states that "the overall form as well as the arrangement and composition of spaces and elements in the design" of an architectural work may be the subject of a valid copyright. 17 U.S.C. § 101. First, defendants fail to acknowledge that plaintiff's "certificates of [copyright] registration constitute prima facie evidence of the validity not only of their copyrights, but also of the originality of [the] works." Boisson v. Banian, Ltd., 273 F.3d 262, 268 (2d Cir.2001); see also 17 U.S.C. § 410(c) (a copyright registration certificate, when issued within five years of the first publication of the work, is prima facie evidence of ownership of a valid copyright). It is also true, however, that originality is "the sine qua non of copyright," Feist, 499 U.S. at 345, 111 S.Ct. 1282, and if a work is not original, then it is not protectable. If a certain element within a work is not original, that element is not protectable "even if other elements, or the work as a whole, warrant protection." Boisson, 273 F.3d at 268.

Plaintiff need not clear a high bar in order for his architectural works to qualify as original:

In the copyright context, originality means the work was independently created by its author, and not copied from someone else's work. The level of originality and creativity that must be shown is minimal, only an "unmistakable dash of originality need be demonstrated, high standards of uniqueness in creativity are dispensed with."

Folio Impressions, Inc. v. Byer California, 937 F.2d 759, 764-65 (2d Cir.1991) (quoting Weissmann v. Freeman, 868 F.2d 1313, 1321 (2d Cir.1989)); see also Gaste v. Kaiserman, 863 F.2d 1061, 1066 (2d Cir.1988) (describing the requirement of originality as "little more than a prohibition of actual copying") (internal quotation marks omitted). Additionally, our Circuit has held that "a work may be copyrightable even though it is entirely a compilation of unprotectible elements." Knitwaves, 71 F.3d at 1003-04.

If the court followed defendants' suggestion and analyzed the elements of plaintiff's works separately, comparing only those elements that are copyrightable to those present in the designs for the Freedom Tower, as our Circuit noted, "we might have to decide that there can be no originality in a painting because all colors of paint have been used somewhere in the past." Id. at 1003 (internal quotation marks omitted); see also, e.g., Covington Indus., Inc. v. Nichols, No. 02 Civ. 8037, 2004 WL 784825, *3, 2004 U.S. Dist. LEXIS 6210, at *8-*11 (S.D.N.Y. Apr. 12, 2004) (holding that although neither vertical nor horizontal stripes, nor individual colors, nor the practice of basket weaving was original, the total concept of plaintiff's design for a colored, striped basket was original); Sunham Home Fashions, LLC v. Pem-America, Inc., No. 02 Civ. 6284, 2002 WL 31834477, *5, 2002 U.S. Dist. LEXIS 24185, *18-*19 (S.D.N.Y. Dec. 17, 2002) ("Although the idea of a plaid or floral pattern may not of its own be original, the patterns' sizes, shapes, arrangements and colors taken together are original and copyrightable.").

Following this analysis, both Shine '99 and Olympic Tower at least arguably are protectable and original. It is true that, as defendants' expert points out, twisting towers have been built before. Towers with diamond-windowed facades have been built before. Towers with support grids [611] similar to the one in Olympic Tower have been built before. Towers with setbacks have been built before. But defendants do not present any evidence that the particular combinations of design elements in either Shine '99 or Olympic Tower are unoriginal.[5] These works each have at least the mere "dash of originality" required for copyrightability, not to mention that they both have been copyrighted, and therefore are prima facie original.

Defendants argue also that any original aspect of Olympic Tower's facade is functionally required by the support grid utilized by Shine, and therefore unprotectable. See Meier Aff. ¶¶ 19-22, 39-40; Def. Br. at 33. However, Shine's expert disputes this contention. See Axley Decl. ¶ 10. Therefore, even if certain of the original design elements of Olympic Tower are dictated by functionality and therefore not copyrightable — a proposition for which there is no apparent support in the case law or the AWCPA — a material issue of fact on this matter remains for trial.

C. Infringement

To prove infringement,

[a] plaintiff must first show that his or her work was actually copied. Copying may be established either by direct evidence of copying, or by indirect evidence, including access to the copyrighted work, similarities that are probative of copying between the works, and expert testimony. If actual copying is established, a plaintiff must then show that the copying amounts to an improper appropriation by demonstrating that substantial similarity to protected material exists between the two works.

Laureyssens v. Idea Group, Inc., 964 F.2d 131, 140 (2d Cir.1992); see also Tufenkian Import/Export Ventures, Inc. v. Einstein Moomjy, Inc., 338 F.3d 127, 131 (2d Cir.2003).

1. Actual Copying

As explained above, unless the rare situation exists where plaintiff has direct proof that defendants copied his work, plaintiff may prove actual copying by showing that defendants had access to his copyrighted works, and that similarities that suggest copying exist between the protected works and the alleged infringing work. Cf. Castle Rock Entm't v. Carol Publ'g Group, 150 F.3d 132, 137 (2d Cir.1998) ("`[P]robative,' rather than `substantial' similarity is the correct term in referring to the plaintiff's initial burden of proving actual copying by indirect evidence. It is only after actual copying is established that one claiming infringement then proceeds to demonstrate that the copying was improper or unlawful by showing that the second work bears `substantial similarity' to protected expression in the earlier work.") (internal citations omitted); see also 4 Nimmer § 13.03[B].[6]

For the purposes of this motion, defendants concede that Childs had access to both Shine '99 and Olympic Tower when he evaluated them as part of the expert jury at the Yale School of Architecture in December 1999. (Def. Br. at 38) Therefore, [612] all that plaintiff must prove to show actual copying in this action is probative similarity between his works and the Freedom Tower. The court may consider expert testimony when assessing probative similarity, see Laureyssens, 964 F.2d at 140. Given the substantial disagreement between plaintiff's expert Axley and defendants' expert Meier on the alleged similarity between Olympic Tower and the Freedom Tower, compare Axley Decl. ¶¶ 21-24 with Meier Aff. ¶¶ 32-41, and that these experts' views are, at least to the court's untrained eye, plausible, there is at least an issue of material fact remaining for trial as to the probative similarity between those two works.

However, plaintiff's expert Axley does not comment on whether any similarity exists between Shine '99 and the Freedom Tower. According to plaintiff, "the shape of Freedom Tower is remarkably similar to the shape of Shine '99" because both towers have two straight parallel walls and two twisting walls. (Shine Decl. ¶ 18) Shine claims that the four setbacks on one side of Shine '99 were "intended as an alternative approach to the form of the twisting sides." (Id.) Whether they were so intended or not, these setbacks are a distinctive feature of the model which bear no resemblance to any feature of the Freedom Tower. Even imagining Shine '99 with four smooth sides, there are still no similarities between Shine '99 and the Freedom Tower that are probative of actual copying. Both towers twist as they rise, but as defendants' expert points out with ample evidence, see Meier Aff. Exs. D, G, the idea of a twisting tower with a rectangular base and parallel sides is by no means unique. There is no evidence to suggest that Childs would have thought of the idea of a twisting tower only by viewing Shine '99. Plaintiff's own expert could not find similarities between Shine '99 and the Freedom Tower substantial enough to warrant comment. Other than that Childs had access to the design, there is no evidence to suggest that defendants actually copied the form or shape of Shine '99. Therefore, no material issue of fact regarding the probative similarity of Shine '99 and the Freedom Tower remains for trial, and defendant's motion for summary judgment as to Shine '99 is granted.

2. Substantial Similarity

Because there is at least an issue of material fact as to whether defendants actually copied Shine's design for Olympic Tower, the court now must determine whether reasonable jurors could find that substantial similarity exists between Olympic Tower and the Freedom Tower. Our Circuit has not yet had occasion to compare the substantial similarity of a copyrighted architectural work such as Olympic Tower to an alleged infringing work, so it is not entirely clear which standard the court should use for the comparison.[7]

However, "total concept and feel" is the dominant standard used to evaluate substantial similarity between artistic works in our Circuit, and that standard is the most appropriate one in this case. See id. (noting that "[i]n recent years we have found it productive to assess claims of inexact-copy infringement by comparing the contested design's `total concept and overall feel' with that of the allegedly infringed work," and applying this test to compare two carpet designs); Boisson, 273 F.3d at 272 (using the "total concept and feel" test to compare to quilt designs and [613] noting that substantial similarity has "always" been guided by this test); Knitwaves, 71 F.3d at 1003 (applying the "total concept and feel" test to compare two different designs on sweaters); Laureyssens, 964 F.2d at 141 (using overall aesthetic appeal test to compare two foam rubber puzzles); see also Sturdza, 281 F.3d at 1296 (comparing two architectural works and holding that "[t]he substantial similarity determination requires comparison not only of the two works' individual elements in isolation, but also of their `overall look and feel.'" (quoting Boisson, 273 F.3d at 266)).

Defendants argue that court should apply the test set forth in Computer Assocs. Int'l, Inc. v. Altai, 982 F.2d 693 (2d Cir.1992) to compare the two complex architectural works here. In Altai, the court was asked to determine whether one computer program infringed another, and in doing so, it devised a new test for determining substantial similarity in that context. The Court described its test as follows:

In ascertaining substantial similarity under this approach, a court would first break down the allegedly infringed program into its constituent structural parts. Then, by examining each of these parts for such things as incorporated ideas, expression that is necessarily incidental to those ideas, and elements that are taken from the public domain, a court would be able to sift out all non-protectable material. Left with a kernel, or possibly kernels, of creative expression after following this process of elimination, the court's last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement.

Id. at 706. However, as noted above in the discussion of originality, the AWCPA protects the "overall form as well as the arrangement and composition of spaces and elements in the design" of architectural works. 17 U.S.C. § 101. If the court were to follow the Altai analysis and separate out only those "kernels" of expression that would qualify as original, that, as our Circuit has held, "would result in almost nothing being copyrightable because original works broken down into their composite parts would usually be little more than basic unprotectible elements like letters, colors, and symbols." Boisson, 273 F.3d at 272.

Our Circuit noted recently that some commentators have worried that "`the total concept and feel' standard may `invite an abdication of analysis,' because `feel' can seem `a wholly amorphous referent.'" Tufenkian, 338 F.3d at 134 (quoting 4 Nimmer § 13.03[A][1][c]). But the Court added that the total concept and feel test was not "so incautious," because where it has been applied, courts have taken care to identify "precisely the particular aesthetic decisions — original to the plaintiff and copied by the defendant — that might be thought to make the designs similar in the aggregate." Id. The Court explained further that

while the infringement analysis must begin by dissecting the copyrighted work into its component parts in order to clarify precisely what is not original, infringement analysis is not simply a matter of ascertaining similarity between components viewed in isolation. For the defendant may infringe on the plaintiff's work not only through literal copying of a portion of it, but also by parroting properties that are apparent only when numerous aesthetic decisions embodied in the plaintiff's work of art — the excerpting, modifying, and arranging of public domain compositions, if [614] any, together with the development and representation of wholly new motifs and the use of texture and color, etc. — are considered in relation to one another. The court, confronted with an allegedly infringing work, must analyze the two works closely to figure out in what respects, if any, they are similar, and then determine whether these similarities are due to protected aesthetic expressions original to the allegedly infringed work, or whether the similarity is to something in the original that is free for the taking.

Id. at 134-35. Although this analysis was applied to carpet designs, it also is appropriate for architectural works, because the AWCPA protects the "overall form" of architectural designs in addition to their individual copyrightable elements.

The court has already found that, even though several of its component parts may not be original, the composite design of Olympic Tower is at least arguably unique and original. See supra Part III.B. Now the court must determine whether, examining the "total concept and feel" of both works, there is an issue of material fact as to whether the design of the Freedom Tower infringes on any of the original aesthetic expressions of the Olympic Tower.

This task presents the question of the point of view from which the "concept and feel" substantial similarity analysis should be conducted. Defendants argue that the analysis should be conducted with the aid of expert testimony, but they cite no Second Circuit authority for this proposition.[8] It seems odd that defendants would advocate such a test, because there is significant disagreement between the respective parties' two highly qualified experts regarding the substantial similarity of Olympic Tower and the Freedom Tower. According to the experts, many issues of material fact remain in dispute as to total concept and feel. If the court were to adopt defendants' suggestion and consider expert testimony in its analysis of substantial similarity, it would have no choice but to deny summary judgment on the issue.

However, the Second Circuit has long held that substantial similarity should be determined not with the help of or solely by experts in the relevant field, but from the perspective of the ordinary observer:

The plaintiff's legally protected interest is not, as such, his reputation ... but his interest in the potential financial returns from his [work] which derive from the lay public's approbation of his efforts. The question, therefore, is whether defendant took from plaintiff's works so much of what is pleasing to the ... lay [public] ... that defendant wrongfully appropriated something which belongs to the plaintiff.

Arnstein v. Porter, 154 F.2d 464, 473 (2d Cir.1946) (footnotes omitted). Because the lay public's approbation usually is the foundation of returns that derive from a copyrighted work, an allegedly infringing work is considered substantially similar to a copyrighted work if "the ordinary observer, unless he set out to detect the disparities, would be disposed to overlook them, and regard their aesthetic appeal as the same." Folio Impressions, 937 F.2d at 765.

[615] Our Circuit refined the ordinary observer test in cases where certain aspects of the copyrighted work are taken directly from the public domain, and applied a "more discerning" ordinary observer test. "What must be shown is substantial similarity between those elements, and only those elements, that provide copyrightability to the allegedly infringed compilation." Key Publ'ns, Inc. v. Chinatown Today Publ'g Enters., Inc., 945 F.2d 509, 514 (2d Cir.1991). However, this "more discerning" ordinary observer test must be applied in conjunction with the "total concept and feel" test, so as not to deny protection to works that have combined unoriginal elements in a unique and copyrightable fashion, as is at least arguably true here. Boisson, 273 F.3d at 272-73; see also Williams, 84 F.3d at 590 ("[A] scattershot approach cannot support a finding of substantial similarity because it fails to address the underlying issue: whether a lay observer would consider the works as a whole substantially similar to one another."). Noting the difficulty of applying the "more discerning ordinary observer" test to the "total concept and feel" evaluation, the Boisson Court counseled that with all of the above concepts in mind, the court's substantial similarity analysis ultimately should be guided by "common sense." 273 F.3d at 273.

With these principles in mind, the court finds that reasonable ordinary observers could disagree on whether substantial similarity exists between the Freedom Tower and Olympic Tower. Defendants present several photographic comparisons between the two structures in their Reply Memorandum. See Def. Reply Br. at 12, 18, 21, and 24. Although defendants offer these comparisons to point out what they claim are significant differences between the two towers, "[i]t has long been settled that `no plagiarist can excuse the wrong by showing how much of his work he did not pirate.'" Tufenkian, 338 F.3d at 132 (quoting Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 56 (2d Cir.1936) (L.Hand, J.)). Any lay observer examining the two towers side by side would notice that: (1) each tower has a form that tapers and twists as it rises, (2) each tower has an undulating, textured diamond shaped pattern covering its facade, and (3) the facade's diamond pattern continues to and concludes at the foot of each tower, where one or more half diamond shapes open up and allow for entry. These combination of these elements gives the two towers a similar "total concept and feel" that is immediately apparent even to an untrained judicial eye.

It is possible, even likely, that some ordinary observers might not find the two towers to be substantially similar because, as defendants note, there are differences between the Freedom Tower and Olympic Tower, including, inter alia, the number of sides of each tower that twist (the Freedom Tower's two versus Olympic Tower's four); the direction of each tower's twist (the Freedom Tower twists clockwise and Olympic Tower twists counterclockwise); the shape of each tower's ground floor (the Freedom Tower is a parallelogram and Olympic Tower is a square); and the various contrasting details of each tower's entrance and facade. See Def. Reply Br. at 11-24; see also Warner Bros., Inc. v. Am. Broad. Cos., 654 F.2d 204, 211 (2d Cir.1981) ("[W]hile `no plagiarist can excuse the wrong by showing how much of his work he did not pirate,' a defendant may legitimately avoid infringement by intentionally making sufficient changes in a work which would otherwise be regarded as substantially similar to that of the plaintiff's.") (quoting Sheldon, 81 F.2d at 56). However, it also is possible that a lay observer, applying the total concept and feel test, might find that the Freedom Tower's twisting shape and undulating diamond-shaped facade make it substantially similar to Olympic Tower, and therefore [616] an improper appropriation of plaintiff's copyrighted artistic expression.

Because reasonable jurors could disagree as to the substantial similarity between Olympic Tower and the Freedom Tower, defendants' motion for summary judgment as to plaintiff's claims regarding Olympic Tower is denied.

* * * * * *

For the foregoing reasons, defendants' motion for summary judgment regarding plaintiff's claim that the Freedom Tower infringed upon his copyrighted architectural work Shine '99 is granted. Defendants' motion for summary judgment regarding plaintiff's claim that the Freedom Tower infringed upon his copyrighted architectural work Olympic Tower is denied.

SO ORDERED.

[1] The Complaint states that plaintiff began designing Shine '99 on or about "October 1, 1997." However, because the rest of the Complaint refers only to events occurring in 1999, this reference to 1997 appears to be a typographical error.

[2] In addition to Childs and Shine's professor Cesar Pelli, the jury included Yale professor and urban planner Alexander Garvin, architecture writer and critic Paul Goldberger, and Robert A.M. Stern, dean of the Yale School of Architecture. (Shine Decl. ¶ 6)

[3] Because Childs is an alumnus of the Yale School of Architecture, he presumably received a copy of this issue of Retrospecta. However in his Answer, Childs denies that he ever saw a copy of the issue referenced by Shine in the Complaint. (Durschinger Aff. Ex. D, ¶ 12)

[4] See Glenn Collins, A Freedom Tower Restarted From Scratch, The New York Times, July 10, 2005.

[5] None of the designs defendants indicate as evidence of the unoriginality of Shine's works bear any significant resemblance to either Shine '99 or Olympic Tower. See Meier Aff. Exs. E.2, E.5, J, L.

[6] The phrase "probative similarity" is used to distinguish this stage of infringement analysis from "substantial similarity," which is examined only after actual copying is shown. The idea of probative similarity was first suggested in a law review article, and later adopted by our Circuit. See Alan Latman, "Probative Similarity" as Proof of Copying: Toward Dispelling Some Myths in Copyright Infringement, 90 Colum. L.Rev. 1187 (1990); Laureyssens, 964 F.2d at 140.

[7] In two recent cases where it analyzed the resemblance between copyrighted PGS works and structures, the Court generally discussed the similarities between the copyrighted materials and the alleged infringing works, but did not utilize a specific procedure for these comparisons. See Sparaco, 303 F.3d at 467-70; Attia, 201 F.3d at 56-58.

[8] Defendants note that the Altai Court granted discretion to district courts to allow expert testimony in evaluating the substantial similarity of computer programs. However, they cite no case where a court has actually utilized such testimony, either to examine computer programs or any other copyrighted material. See Def. Br. at 44 (citing Altai, 982 F.2d at 713). Indeed, the Altai Court noted that its decision to allow expert testimony on the substantial similarity of computer programs was not intended "to disturb the traditional role of lay observers in judging substantial similarity in copyright cases that involve the aesthetic arts, such as music, visual works or literature." Altai, 982 F.2d at 713-14.

4.5.2 Intervest Construction v. Canterbury Estate Homes 4.5.2 Intervest Construction v. Canterbury Estate Homes

554 F.3d 914

INTERVEST CONSTRUCTION, INC., a Florida corporation, Plaintiff-Appellant,
v.
CANTERBURY ESTATE HOMES, INC., a Florida corporation, Defendant-Appellee.

No. 07-12596.
United States Court of Appeals, Eleventh Circuit.
December 22, 2008.

[916] Kelly J.H. Garcia and Virginia Bullerman Townes, Akerman Senterfitt, Orlando, FL, for Plaintiff-Appellant.

Sidney M. Nowell, Nowell & Associates, P.A., Bunnell, FL, for Defendant-Appellee.

Appeal from the United States District Court for the Middle District of Florida.

Before BIRCH and DUBINA, Circuit Judges, and GOLDBERG,[*] Judge.

BIRCH, Circuit Judge:

In this copyright infringement action the appellant contends that the district court erred when it examined the two floor-plans at issue, and, emphasizing the differences between the two, concluded "that, as a matter of law, no reasonable fact-finder could conclude" that appellant's floor-plan ("The Kensington") was substantially similar to appellee's floor-plan ("The Westminister"). More specifically, appellant ("Intervest") argues that the district court employed a "heightened 'substantial similarly' standard" by itself focusing upon certain dissimilarities between the two floor-plans at issue,[1] based upon a misinterpretation of Howard v. Sterchi, 974 F.2d 1272 (11th Cir.1992). For the reasons that follow we find no error and AFFIRM the judgment of the district court.

I. BACKGROUND

In point of time, the floor plan for The Westminster was created in 1992 as a work-made-for-hire by Intervest Construction, Inc. ("Intervest"). The putatively infringing floor-plan, The Kensington, was created in 2002 by Canterbury Estate Homes, Inc. ("Canterbury"). Each floor-plan depicts a four-bedroom house, with one bedroom being denominated as a "master" bedroom or suite. Each floor plan includes a: two-car garage; living room; dining room; "family" room; foyer; "master" bathroom; kitchen; second bathroom; nook; and porch/patio. Each floorplan also reflects certain "elements" common to most houses: doors; windows; walls; bathroom fixtures (toilet, tub, shower, and sink); kitchen fixtures (sink, counter, refrigerator, stovetop, and pantry/cabinets); utility rooms and fixtures (washer, dryer, and sink); and closets. A cursory examination of the two floor-plans reveals that the square footage of both is approximately the same. Also, as is common to houses, there are placements of entrances, exits, hallways, openings, and utilities (furnace, air conditioner, hot water heater, and telephone hardware).

After identifying all of these unassigned components and elements of the floor-plans, the district court undertook a careful comparative analysis of the selection, coordination, and arrangement of these common components and elements. The district court focused upon the dissimilarities in such coordination and arrangement:

First, Canterbury represents that the square footage of the rooms in the two [917] designs is different, and visual examination of the floor plans appears to confirm that. In any event, Intervest seemingly does not contest the point.

Second, the garage in The Westminster has a front entrance, while The Kensington's has a side entrance. Further, Intervest's design has an attic access from the garage, while Canterbury's version has a "bonus room" above the garage, something The Westminster lacks entirely. Moreover, the inside air conditioning unit and water heater are placed differently in the two floor plans. Additionally, The Kensington has two windows in the garage, while The Westminster has none. In The Westminster, there is a bedroom closet to the left of the utility room, whereas in The Kensington, there is a hallway in that location.

There are three bedrooms on the left side of the two designs, with a master bedroom across the house on the right side. (Confusingly, The Kensington drawing identifies the bedroom closest to the garage and the one farthest from the garage as "Bedroom 3.") There are significant differences between the left-side bedrooms in the two drawings.

The bedroom closest to the garage ("Bedroom 2" in The Westminster and one of two "Bedroom 3"'s in The Kensington) is shaped differently in the two designs. In The Westminster, this room's longest wall abuts the garage, whereas in The Kensington, a shorter wall separates the room from the garage. Additionally, in The Westminster, one would enter this particular room straight through a door at the end of a hallway, whereas in The Kensington, one would have to turn 90 degrees off the hallway to enter the room. Additionally, the entrance doors swing in opposite directions in the two designs. Moreover, the closets in this bedroom are situated on completely different walls in the two drawings.

Regarding the middle bedroom on the left side ("Bedroom 3" in The Westminster and "Bedroom 2" in The Kensington), the entrances and closets are different in the two floor plans. The closet in The Westminster runs nearly the length of one wall, while the closet in The Kensington is deeper, smaller, and occupies only a corner of the bedroom. The room in The Westminster has a 45 degree entrance, beyond which is an angled wall (followed by the aforementioned long closet). The Kensington's counterpart room has a 90 degree entrance which opens flush against a 90 degree wall. Finally, the bedroom in The Westminster appears more rectangular overall than its counterpart in The Kensington.

Moving to the last left-side bedroom ("Bedroom 4" in The Westminster and the other "Bedroom 3" in The Kensington), the same differences identified regarding the preceding bedroom also exist regarding this room, except that the smaller closet in The Kensington is located near the room's entrance, rather than in a corner.

The hallway bathroom situated next to this bedroom is also different in the two designs. The bathroom in The Westminster appears larger. Additionally, the alignment of the right wall vis-a-vis the hallway wall is different in the two plans. Further, "the bathtubs face opposite ways in the two designs," "the bathroom sink counter space in [The Kensington] is much smaller than in [The Westminster]," and "[The Kensington's] sink is oval shaped whereas [The Westminster's] is round." Doc. 50 at 16. Finally, although the bathroom door leading to the exterior of the house swings in the same direction in both [918] plans, Canterbury notes that this is required by the fire code.

Proceeding to the center portion of the homes, the nooks in the two plans are markedly different. In that regard,

[The Westminster's] nook feeds into a ninety degree angle adjacent to the Porch and has windows looking both to the outside and to the Porch. On the other hand, [The Kensington's] design is rounded into the porch and is completely made of glass. There is no window to the outside or into the Covered Patio. Moreover, the entrance from the Nook into the Living Room in [The Westminster's] design has an elongated wall which travels much further into the Living Room than in [The Kensington's] design, and also fails to break inward at a ninety degree angle like in [The Kensington's] design.

Id. at 17. Further, the shapes of the living rooms are different, in part due to the dissimilarities in the layout of the nooks.

The kitchens in the two plans are also substantially different. In that connection,

the wall placement in the southeast corner of the kitchens is significantly different. [The Kensington's] design pushes this wall further into the Living Room and pushes the Kitchen Counter much further north than in [The Westminster's] design. This allows [The Kensington's] design to have a much larger Pantry than [The Westminster's] design.

[Further, The Westminster's] design has a retractable door on its pantry which opens at a ninety degree angle while [The Kensington's] has a solid door which opens at a forty-five degree angle. Additionally, . . . [The Kensington's] kitchen counter is much thinner and longer than [The Westminster's] which places the dishwasher in a different location. Finally, . . . [The Kensington's] Kitchen has an Island as well as an entrance to a hallway running down the left side of the Utility Room while [The Westminster's] design has none of these features.

Id. at 17-18.

Moving to the right side of the house, there are material dissimilarities in the foyer, the master bedroom, and the master bath. The front entrance to The Westminster "has one solid door with windows on either side while [The Kensington's] front entrance has a pair of glass French Doors." Id. at 18. Further, "the Master Bedroom in [The Kensington's] design contains glass French Doors on the far left side of the back wall which opens into a Covered Patio," whereas The Westminster "simply has a sliding glass door in the center of the back wall which opens to an uncovered Porch." Id. Additionally, in The Kensington's master bath, "the doors to the walk-in closets . . . are solid and open in different directions than those [in the Westminster], which uses a retractable door." Id. Finally, the sinks in the master bath are placed differently in the two designs. In The Kensington, the sinks are centered; in The Westminster, they are not. R1-69 at 5-8. (footnotes omitted).

Given the number of dissimilarities in the respective coordination and arrangement of these non-original, commonplace elements and components, the district court ruled that no reasonable observer could conclude that the copyrightable elements of the two floor-plans were substantially similar. [919]

II. DISCUSSION

Since we are dealing with a specific type of copyrightable work, here an architectural work, we begin by examining the statutory definition of an "architectural work," to wit: "the design of a building as embodied in any tangible medium of expression, including a building, architectural plans or drawings. The work includes the overall form as well as the arrangement and composition of spaces and elements in the design, but does not include individual standard features." 17 U.S.C. § 101 (2008). A review of the legislative history discloses that such "individual standard features" include "common windows, doors, and other staple building components." H.R.Rep. No. 101-735 (1990) as reprinted in 1990 U.S.C.C.A.N. 6935, 6949. Including the phrase "the arrangement and composition of spaces and elements in the design" demonstrates Congress' appreciation that "creativity in architecture frequently takes the form of a selection, coordination, or arrangement of unprotectible elements into an original, protectible whole." Id. Accordingly, while individual standard features and architectural elements classifiable as ideas or concepts are not themselves copyrightable, an architect's original combination or arrangement of such elements may be. See Corwin v. Walt Disney Co., 475 F.3d 1239, 1251 (11th Cir.2007). Thus, the definition of an architectural work closely parallels that of a "compilation" under the statute, that is: "[A] work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship." 17 U.S.C. § 101. The Supreme Court in Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991), and our court in BellSouth Adver. & Publ'g Corp. v. Donnelley Info. Publ'g, Inc., 999 F.2d 1436 (11th Cir.1993) (en banc) and Oravec v. Sunny Isles Luxury Ventures, L.C., 527 F.3d 1218 (11th Cir. 2008), indicated that the compiler's choices as to selection coordination, or arrangement are the only portions of a compilation, or here, architectural work, that are even entitled to copyright protection. Accordingly, any similarity comparison of the works at issue here must be accomplished at the level of protected expression[2] — that is, the arrangement and coordination of those common elements ("selected" by the market place, i.e., rooms, windows, doors, and "other staple building components"). In undertaking such a comparison it should be recalled that the copyright protection in a compilation is "thin." Feist, 499 U.S. at 349, 111 S.Ct. at 1289. Moreover, as the Second Circuit has noted, the substantial similarity inquiry is "narrowed" when dealing with a compilation. Key Publications, Inc. v. Chinatown Today Publ'g Enter., Inc., 945 F.2d 509, 514 (2d Cir.1991).

Thus, when viewed through the narrow lens of compilation analysis only the original, and thus protected arrangement and coordination of spaces, elements and other staple building components should be compared.[3] We have recognized [920] that summary judgment may be inappropriate in certain types of copyright infringement cases. However, we have approved the use of summary judgment particularly in cases where: (1) because access has been established, the crucial issue is substantial similarity; (2) there may be substantial similarity with respect to the non-copyrightable elements of the two works compared; and, (3) as to the protectable elements, there is substantial dissimilarity. See Oravec 527 F.3d at 1223; Beal v. Paramount Pictures, Corp. 20 F.3d 454, 459-60 (11th Cir.1994). In fact, when the crucial question in a dispute involving compilations is substantial similarity at the level of protectable expression, it is often more reliably and accurately resolved in a summary judgment proceeding. This is so because a judge is better able to separate original expression from the non-original elements of a work where the copying of the latter is not protectable and the copying of the former is protectable. The judge understands the concept of the idea/expression dichotomy and how it should be applied in the context of the works before him. As we have observed: "This distinction — known as the idea/expression dichotomy — can be difficult to apply, as there is no bright line separating the ideas conveyed by a work from the specific expression of those ideas." Oravec, 527 F.3d at 1224. Moreover, in examining compilations wherein only the arrangement and coordination of elements which by the nature of the work (here architectural floor plans) are sure to be common to each of the works and are not copyrightable themselves (spacial depictions of rooms, doors, windows, walls, etc.), the already difficult tasks may become even more nuanced. Because a judge will more readily understand that all copying is not infringement, particularly in the context of works that are compilations, the "substantial-similarity" test is more often correctly administered by a judge rather than a jury — even one provided proper instruction. The reason for this is plain — the ability to separate protectable expression from non-protectable expression is, in reality, a question of law or, at the very least, a mixed question of law and fact. It is difficult for a juror, even properly instructed, to conclude, after looking at two works, that there is no infringement where, say, 90% of one is a copy of the other, but only 15% of the work is protectable expression that has not been copied. Part of the problem, which we have recognized, is that the term "substantial similarity" has not always been used with precision. Beal, 20 F.3d at 459 n. 4. When courts have dealt with copyright infringement claims involving creative types of works, "substantial similarity" has been defined as existing "where an average lay observer would recognize the alleged copy as having been appropriated from the copyrighted work." Original Appalachian Artworks, Inc. v. Toy Loft, Inc., 684 F.2d 821, 829 (11th Cir.1982) (quotation marks and citation omitted) (the first copyright case decided by the Eleventh Circuit after its split-off [921] from the "old" Fifth Circuit involving a soft sculpture doll, a creative work that was to be later known as a "Cabbage Patch Kid"). However, as noted above, while a creative work is entitled to the most protection, a compilation is entitled to the least, narrowest or "thinnest" protection. See Suntrust Bank v. Houghton Mifflin Co., 268 F.3d 1257, 1271 (11th Cir. 2001); see also Campbell v. Acuff-Rose Music, Inc. 510 U.S. 569, 586, 114 S.Ct. 1164, 1175, 127 L.Ed.2d 500 (1994); Harper & Row Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 563, 105 S.Ct. 2218, 2232, 85 L.Ed.2d 588 (1985). Accordingly, when courts have examined copyright infringement claims involving compilations the definition of "substantial similarity" has been appropriately modified to accentuate the narrower scope of protection available, to wit:

Not all copying constitutes infringement, however, see Feist, 499 U.S. at 361, 111 S.Ct. at 1296, and therefore we have emphasized that the substantial similarity analysis "must focus on similarity of expression, i.e., material susceptible of copyright protection." Beal, 20 F.3d at 459, n. 4; see also Leigh [v. Warner Bros., Inc., 212 F.3d 1210] at 1214 (stating that a copyright plaintiff "must establish specifically that the allegedly infringing work is substantially similar to the plaintiff's work with regard to its protected elements").

Oravec, 527 F.3d at 1224 (emphasis in original) (involving a dispute over architectural plans); see also BellSouth, 999 F.2d 1436 (telephone directories); Warren Publ'g Inc., 115 F.3d 1509 (cable television fact books); Bateman v. Mnemonics, Inc., 79 F.3d 1532 (11th Cir.1996) (computer code); MiTek Holdings, Inc. v. Arce Eng'g, Inc., 89 F.3d 1548 (11th Cir.1996) (computer code); Leigh, 212 F.3d 1210 (photographs).

Here the district court carefully compared the protectable aspects of the two floor-plans at issue, thus focusing only on the narrow arrangement and coordination of otherwise standard architectural features. At the conclusion of its analysis identifying many dissimilarities or differences in the two floor plans, the court made essentially the same ruling that we approved of in Oravec: "At the level of protected expression, the differences between the designs are so significant that no reasonable, properly instructed jury could find the works substantially similar." Oravec, 527 F.3d at 1227.

III. CONCLUSION

Here the appellant, plaintiff below, contends that the district court erred in focusing its comparison of common architectural elements in two designs for a four-bedroom house on the dissimilarities between the two floor plans. Given that the plans at issue were protected by compilation copyrights which were "thin," the district court correctly determined that the differences in the protectable expression were so significant that, as a matter of law, no reasonable properly-instructed jury of lay observers could find the works substantially similar. Accordingly, the district court did not err in granting summary judgment to the appellee, the putative infringer.

AFFIRMED. [922]

APPENDIX

NOTE: OPINION CONTAINING TABLE OR OTHER DATA THAT IS NOT VIEWABLE

[*] Honorable Richard W. Goldberg, United States Court of International Trade Judge, sitting by designation.

[1] The two floor-plans at issue are attached hereto as an appendix.

[2] The Feist Court further explained:

This protection is subject to an important limitation. The mere fact that a work is copyrighted does not mean that every element of the work may be protected. Originality remains the sine qua non of copyright: accordingly, copyright protection may extend only to those components of a work that are original to the author.

Feist at 348, 111. S.Ct. at 1289.

[3] There are three types of work that are entitled to copyright protection—creative, derivative, and compiled. Copyrights in these three distinct works are known as creative, derivative, and compilation copyrights. An example of a creative work is a novel. An example of a derivative work is a screenplay based on a novel; it is called "derivative" because it is based on a preexisting work that has been recast, transformed, or adapted. An example of a compilation is [the floor plans at issue in this case.] The [Copyright] Act has created a hierarchy in terms of the protection afforded to these different types of copyrights. A creative work is entitled to the most protection, followed by a derivative work, and finally by a compilation. This is why the Feist Court emphasized that the copyright protection in a factual compilation is "thin."

Warren Publishing, Inc. v. Microdos Data Corp., 115 F.3d 1509, 1515 n. 16 (11th Cir. 1997) (citation omitted).