💾 Archived View for spam.works › mirrors › textfiles › law › dblaw.txt captured on 2023-06-16 at 18:56:36.
-=-=-=-=-=-=-
LEGAL PROTECTION OF COMPUTER DATABASES ~ 1991 Losey 4919 words 17 pages RALPH C. LOSEY Subin, Shams, Rosenbluth & Moran, P.A. 111 N. Orange Ave., Suite 900 Orlando, Florida 32801 407-841-7470 407-648-4995 (fax) LEGAL PROTECTION OF COMPUTER DATABASES There are three main ways to protect all computer software, including computer databases: copyright, trade secret and contract. Ideally, all three of these legal means can be employed, along with other practical non- legal methods, to provide the maximum protection against the unauthorized copying and use (a/k/a "piracy") of a database. There are, of course, other legal theories that could be argued in a law suit to protect databases, such as unfair competition and conversion, however, these theories may be preempted by copyright law. See: Southern Bell Tel. & Tel. v. Associated Telephone Directory Publishers, 756 F.2d 801, 810 fn. 9 (11th Cir., 1985) (unfair competition); Financial Information, Inc. v. Moody's Investors Service, Inc., 808 F.2d 204 (2nd Cir. 1986) (misappropriation); The Law and Business of Computer Software; Supra, pg. 22-18 (misappropriation theories and preemption). There are also numerous ingenious non-legal or practical means and strategies which can be employed to prevent the unauthorized copying of a computer database. These practical methods include the deliberate placement of false or hidden data or "seeds", to facilitate the detection of copying. Eg.: Rockford Map Pub. v. Dir. Service Co. of Colorado, 768 F.2d 145, 147 (7th Cir., 1985) (Phony middle initials of names on a map spelled out Rockford Map Inc. when read from top of the map to the bottom). WHAT IS A COMPUTER DATABASE? The computer database is a new type of intellectual property of growing importance in today's world. Essentially it is a collection of information stored so that it can be selectively searched and the desired information retrieved using a computer. The Law and Business of Computer Software, Toedt Ed., Ch. 22, Computer Databases, H. Pearson, pg. 22-2, Clark Boardman (1990). As society moves further into the informational age the significance and dollar volume of database products should increase. Since this is a relatively new type of property, American law is having to rapidly evolve and create new standards and legal principles to try and protect against its misuse and theft. Databases have long existed in manual or book form. Contemporary examples of manual databases still abound, such as the phone book and many reference books, including legal reporters. The computer database is essentially an information compendium like a phone book which has been placed in a computer and thereby automated. When information is so computerized, however, there are many more ways for the information to be accessed, manipulated and used; the value of the database to users is thereby greatly enhanced. Some popular examples of computer databases include legal databases such as Westlaw and Lexis, and various business and scientific databases like those found on a computer network such as Dialog. COPYRIGHT LAW In order to have a framework for an analysis of the legal protection of computer databases, and to show the basic problems in trying to legally protect them from computer piracy, a thorough review of Copyright law is first necessary. The United States Copyright Office in its publication Circular 65: Copyright Registration for Automated Databases defines an automated database as a "a body of facts, data, or other information assembled into an organized format suitable for use in a computer and comprising one or more files." The federal Copyright statutes do not yet specifically list automated databases as a copyrightable subject matter. 17 USC 101, 102. Nevertheless, the Copyright Office follows case law and allows a computer database to be copyrighted as a literary work, even though they are not specifically included in the statutes. See Eg.: Lane v. First Nat. Bank of Boston, 687 F.Supp. 11 (D.C. Mass. 1988). The Copyright Office considers a computer database to be copyrightable as a "compilation". The law defines compilation as a work: formed by the collection and assembling of preexisting materials or of data that are selected, coordinated or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. 17 USC 101 Federal copyright law extends copyright protection to compilations as a form of literary work. 17 USC 103. In addition to computer databases, a compilation can be a collective work such as a periodical, anthology and encyclopedia, or a reference work such as a directory, index, map, telephone book, guide book, law reporter, catalog, chart, or racing guide. The "literary work" in a computer database which may be protected is composed of four parts: (1) selection of the contents; (2) the coordination of the contents internal to the program; (3) the arrangement of all of the elements of the database; and, (4) the contents itself. Computer Software, 2.08A(2)(c)(i), L.J. Kutten, Clark Boardman (1990). The copyright of a compilation may extend to one of these parts without including the others. Copyright law originates in Article 1, Section 8 of the Constitution of the United States which says that Congress shall have the power: To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right in their respective Writings and Discoveries. To implement this constitutional right Congress enacted copyright and patent laws. The copyright law was written to protect "original works of authorship". 17 USC 102. Over the centuries Courts have looked to see if a work has "originality" or not to determine if it may receive copyright protection. Kamar Int'l v. Russ Berrie & Co., 657 F.2d 1059, 1061 (9th Cir. 1981) (originality is the sine qua non of copyrightability). Originality requires an author to contribute something more than a "merely trivial" variation which is recognizably "his own". Id. A work must show some "creativity", albeit only a minimal amount, in order to meet the originality test, and it is not subject to copyright if the work merely copies an existing work. See: Copyright Protection For Citations To A Law Reporter, Intellectual Property Law Review, pgs. 444-456, Norris Ed., 1988. This essential element of "creativity" is weak or completely absent in many manual reference works or computer databases. For example, what creativity is there in an alphabetical listing of stocks with prices? Another basic problem in protecting a database is that copyright law does not prohibit the copying of facts, even newly discovered or expensively acquired facts, nor does it prohibit the copying of ideas. Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 556, 105 S.Ct. 2218, 85 L.Ed2d 588 (1985) ("no author may copyright his ideas or the facts he narrates"); Kregos v. Associated Press, 731 F.Supp. 113, 117 (S.D.N.Y. 1990) (protecting facts would unreasonably limit the public's right to use information in the public domain); Mazer v. Stein, 347 U.S. 201 (1954) (distinguishes copyrights from patents and holds that copyright protects particular expressions of ideas, but not the ideas themselves). Copyright law can only provide protection to the arrangement and coordination of facts in a database, and even then there must be some originality to the collection and arrangement for it to be protected. See Eg.: 17 USCA 103 and cases cited therein. Typically the preparation of a database requires a significant expenditure of time, effort and money to cull and select information from many different sources (the "selection" aspect of the "selection, coordination and arrangement"), but little or no original creativity to express the facts, or arrange them. In these circumstances, where the compiler gathers and compiles raw facts, he did not create the facts, he just discovered or uncovered them, sometimes at great expense. So how can you prevent copying of the work? In order to lend copyright protection to merely factual databases, some courts have tried to move away from a strict application of the creativity test, to also employ an "industriousness" or "sweat of the brow" test to determine if the database is an "original" enough work to be afforded copyright protection. Southern Bell Tel. & Tel. v. Associated Telephone Directory Publishers, 756 F.2d 801, 809 (11th Cir. 1985). These Courts, spearheaded by Judge Learned Hand, found "originality" from the "labor and expense" expended to make the compilation, rather than from any real "creativity" of the author. Id.; Jeweler's Circular Publishing Co. v. Keystone Publishing Co., 274 fed. 932 (S.D.N.Y. 1921 (L. HAND, J.), aff'd, 281 F. 83 (2nd Cir. 1922), cert. denied, 259 U.S. 581, 42 S.Ct. 464, 66 L.Ed. 1074 (1922) (the first express "industriousness" standard case); West Publishing Co. v. Mead Data central, Inc., 799 F.2d 1219 (8th Cir. 1986); The Law and Business of Computer Software, Supra pg. 22-8. Under the sweat of the brow doctrine, copyright could prevent the unauthorized copying of facts in a database, if the compiler could show that sufficient effort went into the acquisition and selection of the data to make it original. The protection would lie even if the information compiled was public knowledge or otherwise not protected. Southern Bell Tel. & Tel. v. Associated Telephone Directory Publishers, Supra pg. 810. Other Courts, however, continued to analyze a database dispute by using traditional concepts of creativity, and criticized the "sweat of the brow" standard. Miller v. Universal City Studios, Inc., 650 F.2d 1365, 1369 (5th Cir. 1981); Lane v. First Nat. Bank of Boston, 687 F.Supp. (D.C. Mass. 1988). In the words of the Second Circuit Court of Appeals: To grant copyright protection based merely on the "sweat of the author's brow" would risk putting large areas of factual research material off limits and threaten the public's unrestrained access to information. Financial Information, Inc. v. Moody's Investors Service, Inc., Supra pg. 207. A recent unanimous decision of the United States Supreme Court has followed the Miller line of cases and sounded the death knell to Learned Hand's sweat of the brow doctrine. Feist Publications, Inc. v. Rural Telephone Services Co., Inc., 59 U.S.L.W. 4251 (March 26, 1991). In Feist the compilation was manual, it was the phone book, for which the phone company had made a valid copyright registration. The alleged infringer, Feist Publications, was found to have copied large portions of the white pages from Rural Telephone Services Companies phone book. Feist Publication's repetition of four fictitious listings, or seeds, which Rural Telephone had planted in their white pages helped to prove that. Feist Publications included the names and addresses from Rural Telephone's white pages in its competing phone books. Rural Telephone argued that the white pages listing of names and addresses in its phone book, although admittedly facts, was still entitled to copyright protection. It contended that its efforts to obtain and select these facts should be protected, and that its competitor, Feist Publications, should be required to go to the same effort to obtain the information, and should not be allowed to benefit from its research and just copy the information. Id. at pg. 4252. The trial court agreed and entered a judgment for copyright infringement in favor of Rural Telephone. Rural Telephone Service Co., Inc. v. Feist Publications, Inc., 663 F. Supp. 214, 218 (1987). In an unpublished opinion the Tenth Circuit Court of Appeals affirmed, but the Supreme Court reversed holding: The `sweat of the brow' doctrine had numerous flaws, the most glaring being that it extended copyright protection in a compilation beyond selection and arrangement - the compiler's original contribution - to the facts themselves. ... `Sweat of the brow' courts thereby eschewed the most fundamental axiom of copyright law - that no one may copyright facts or ideas. ... they handed out proprietary interests in facts and declared that authors are absolutely precluded from saving time and effort by relying on facts contained in prior works. Id. at pgs. 4254-4255. The Supreme Court held that the white pages portion of the phone book was not entitled to copyright protection, even though the rest of the book was. Therefore Feist Publications, and anyone else, was free to copy the white pages. As Justice O'Connor concluded in her unanimous opinion: Because Rural's white pages lack the requisite originality, Feist's use of the listings cannot constitute infringement. This decision should not be construed as demeaning Rural's efforts in compiling its directory, but rather as making clear that copyright rewards originality, not effort. Id. at pg. 4257. Now that the sweat of the brow doctrine is dead, it is clear that raw facts in a database may not be protected by copyright, regardless of the time or expenses that went into locating them. Still, in many databases the data itself, or the particular expressions of the facts, may have been created by the author. In such cases the data has originality and can be protected. An example of this which is used by the Copyright Office is a full text bibliographic database. There the author not only selects the particular books to be included in the bibliography, but also the author himself writes his own description as to each of the books. Since the author himself created the entire contents of the database, both the selection and compilation aspect of the database, and the contents of the database, are subject to copyright protection. Even if the contents are raw facts, not new materials created by the author, the compilation aspects of the database (selection, coordination and arrangement) may still receive copyright protection. Copyright law prevents the copying of the coordination and arrangement of the facts, the format of data presentation and manipulation, provided that the format and means are original. This entails a consideration as to whether the coordination and arrangement are novel and unique, or whether the arrangement itself contains information. In a dispute between West Publishing Companies and Mead Data central, Inc., West's arrangement of case law was found to be original and entitled to copyright. West Publishing Co. v. Mead Data central, Inc., Supra at pg. 1226. The computer research service "Lexis", owned by Mead Data, competes with West Publishing's, "Westlaw", to provide computer assisted research services to lawyers. Both services use computers to locate and display case decisions on a computer screen. The first screen display of a case in both Lexis and Westlaw includes an identification of the citation to the case, thereby indicating the page on which the decision begins in the particular West Reporter. The judicial opinions are of course not copyrightable, and West concedes that Lexis and others may use the citation of a case and identify the first page without infringing West's copyright under the "fair use" copyright doctrine. Id. pg 1222; 17 U.S.C. 107. West does, however, claim a copyright to all of its page references, and it limits the fair use exception to the citation. In 1985 Lexis announced its intention to take page identification a step further by offering a service called "star pagination". This feature would insert in the Lexis opinion display the page numbers from West's National Reporter Systems publications. Only in this way could a Lexis user determine what West page number corresponded to the portion of an opinion viewed without having to physically refer to the West publication in which the opinion appears. Id. West sued for an injunction to prevent the introduction of this new pagination feature claiming it would infringe its copyright. Mead Data argued that the arrangement of the cases was not an original creation and thus was not copyrightable. West contended that the order and arrangement of the opinions in its reporters was sufficiently original and creative for a copyright. The trial court and Eighth Circuit Court of Appeals agreed with West and an injunction was entered prohibiting Lexis from introducing this feature. In the words of the Eighth Circuit: We conclude, as did the District Court, that the arrangement West produces through this process is the result of considerable labor, talent and judgment. As discussed above ..., to meet intellectual-creation requirements a work need only be the product of a modicum of intellectual labor; West's case arrangements easily meet this standard. Id. pgs. 1226-1227. Not all compilations, however, will meet even a minimal originality standard. Thus for example, if the selection, coordination and arrangement of data in a database is a mechanical task only, and represents no original authorship or creativity, it is not subject to copyright protection. The example given for this by the Copyright Office is the mere transfer of data from hard copy to computer storage. In other words, if you simply transfer data from one medium to the other, and do nothing creative in deleting portions or adding portions, then there is no original authorship to be protected. The Feist Publications case provides another example. The Supreme Court held that the alphabetical arrangement of names in the white pages was not entitled to copyright because: "there is nothing remotely creative about arranging names alphabetically ... It is not only unoriginal, it is practically inevitable." Feist Publications v. Rural Telephone Services Co., Inc., Supra at pg. 4257. This is similar to another copyright doctrine which is important to computer law: "functionality", whereby an aspect of a computer program will not be protected by copyright if it is merely utilitarian, rather than original. Lotus Development Corporation v. Paperback Software International, 740 F.Supp. 37, 52-58, 68 (D.C. Mass. 1990) (Lotus 123 interface was an original expression entitled to copyright and was not merely a utilitarian function). A recent decision by a federal Judge in New York shows another example where both the information selected, and form of presentation, were found to be unoriginal and thus not entitled to copyright. Kregos v. Associated Press, 731 F.Supp. 113 (S.D.N.Y. 1990). This involved a compilation of statistics on baseball pitchers which was created by George Kregos and published in newspapers nationwide. The statistics were presented in nine columns with one column for wins, losses, earned run average, etc. Associated Press began publishing a rival form in its papers which was virtually identical to Kregos' form. Kregos sued to try and stop the rival database from presenting the statistics in the same format. The Court found that there was no valid copyright of Krego's work because: (1) the data itself (baseball statistics) was in the public domain (facts); (2) the particular statistics selected for inclusion in the form were commonplace and required no creativity; and, (3) the format of display was not novel or unique, it was analogous to a blank form which conveys no information. In the words of the Court: Since an extremely limited number of ways to practically publish a pitching form exist, plaintiff's form does not exhibit the requisite selection or arrangement to receive protection.... (T)he facts ... are distinguishable (from other cases where copyright was upheld) due to the absence of true selection or arrangement by plaintiff in the case at bar... (T)he form is sufficiently analogous (to a blank form) in that it fails to convey information... Therefore, we also find plaintiff's form not copyrightable based on this doctrine. Id. pg. 120. There are a number of other drawbacks and limitations to copyright protection. For instance, if not properly perfected and registered a copyright can be waived and the work may enter the public domain. Also, there are certain exceptions to copyright, such as exceptions based on the mentioned "fair use" rule. Computer Software, 2.07(4)(c) and 2.08A(2)(c)(iii), L.J. Kutten, Clark Boardman (1990); Dow Jones & Co. v. Board of Trade of the City of Chicago, 546 F. Supp. 113 (S.D.N.Y. 1982); Telerate Systems, Inc. v. Caro, 689 F.Supp. 221 (S.D.N.Y. 1988). Another drawback pertains to the deposit requirements of copyright registration. 37 C.F.R. 202.20(C)(2)(vii). Printouts of the program source code and the database must be included with the registration. For long databases the registration requirement can be limited to the first and last twenty-five pages. If the program is IBM-PC or Apple Macintosh compatible, and is recorded on CD-ROM, or diskette, then under the Best Edition Statement supplement to the rules, you must submit both the printout of the code and data and the software itself. A potentially serious problem with the deposit requirement is that the print outs and software may be inspected or viewed by anyone upon request. Therefore if you have any trade secrets or other confidential information contained in the printout of the source code (source code is usually kept very secret) or database, or revealed in the operation of the software itself, your competitor could gain access to them by inspecting or viewing what you have deposited with the Copyright Office. The Copyright Office is sensitive to the danger of having trade secrets revealed in the deposit accompanying copyright registration. For this reason the Copyright Office now allows selected portions of up to 49% of the printout of the computer code to be marked out and hidden so that they cannot be read. There are limitations on this general rule in that the portions deleted cannot be so great as to prevent the Copyright Office from intelligently reviewing the registration. Another practical problem with the deposit requirement is that some databases are continually changing and being updated, and thus the deposits and registrations must continue. Although group registration on a quarterly basis is now permitted by the Copyright Office in certain circumstances to try and obviate this problem, several technical problems with such periodic group registrations remain. Another drawback in relying on copyright protection alone is that your copyrights can be weakened or waived if proper copyright procedures are not followed. Such procedures include the proper fixation and display of copyright notices and the registration of the copyright with the Copyright Office. The procedures and steps involved in registration of a computer database copyright can be complicated and involved, particularly when trade secret information is involved. Computer Software, 2.08A(4),(5),(6),(8), L.J. Kutten, Clark Boardman (1990). For this reason it is suggested that the assistance of competent computer law counsel be retained to assist in this process. With copyright law providing only limited protection to databases, and with all of the other problems inherent in copyright protection of a database, contract and trade secret law become all the more important to try and prevent the unauthorized copying of factual data in a database. TRADE SECRECY PROTECTION Adding trade secrecy protection to a database can provide significantly greater legal rights. Consider for instance the recent case of Florida Power & Light v. Util. Services, 550 So.2d 13 (Fla. 3rd DCA 1989) where the jury found that the defendant FP&L had stolen the plaintiff's trade secrets and awarded damages of $1.6 million. Under civil theft law, Chapter 812 Florida Statutes, this award was then trebled, for a total judgment against FP&L of $4.8 million. Essentially a trade secret is knowledge which a person or company acquires through its own efforts and which has some value to it. Typically, this knowledge is kept secret from competitors because it is felt that this information provides some type of competitive advantage. There is a uniform Trade Secret Act which has been enacted in many of the states of the country, including Florida. Chapter 688, Florida Statutes. Section 688.002, Florida Statutes, defines a trade secret to mean: information, including a formula, pattern, compilation, program, device, method, technique or process that: (a) derives independent economic value, actual or potential, not being generally known to, not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (b) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. The Uniform Trade Secret Act quoted above was adopted by Florida in 1988. Trade secrecy protection has, however, long existed as part of the common law. Restatement of Torts, (1939) (1st Ed.), 757 "Liability For Disclosure or Use of Another's Trade Secret"; Callman Unfair Comp., Trademarks & Monopolies, Ch. 14 (4th Ed.); Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 94 S.Ct. 1879, 40 L.Ed.2d 315 (1974); Cataphote Corp. v. Hudson, 444 F.2d 1313 (5th Cir. 1971). Since a computer database is a compilation which derives economic value, it is a type of intellectual property which has frequently received trade secrecy protection. Whether or not a court will find that a database is legally a trade secret frequently depends upon whether the compiler made reasonable efforts to maintain its secrecy. Telerate Systems, Inc. v. Caro, 689 F.Supp. 221, 232 (S.D. N.Y. 1988) (Describes sufficient efforts taken to protect computer trade secrets). Many of the trade secret cases involve a dispute between an employer and former employee over a common form of data compilation, a customer list. 28 A.L.R.3rd 17 "Customer List As A Trade Secret". Many employers consider their customer list to be their most valuable trade secret, and when an employee leaves and takes the list with him to compete against an employer, a suit frequently follows to have an injunction entered to make the employee return the list and not use those trade secrets. One such recent case is Unistar Corporation v. Child, 415 So.2d 733 (Fla. 3rd DCA 1982). The employer here sold diamonds and gems through "financial planners". Over three years they had screened 12,000 known planners and developed a list of 4,200 who were interested, and 1,850 who had signed on as dealers. Unistar spent over $800,000 to compile this list! Several Unistar employees left together and formed a competing business using the lists which they took with them. Unistar's sales then fell 84%, from $440,000 to $70,000 per month. Unistar sued for an injunction, and the former employees defended by claiming that the financial planners listed are all available to the public and the lists were not trade secrets, and that there was no agreement that the employees would keep the lists secret. The court ruled for the employer, Unistar, and found that the lists were trade secrets because: ... (they are) indeed the distillation of a larger list of financial planners, reflecting considerable effort, knowledge, time, and expense on the part of the plaintiff. The customer lists were periodically updated and when the new list was provided the old list was destroyed. The marketing representatives were instructed to keep the computer lists at their desks and not take them out of the office. Id., pg. 734. The Court also held that even though there was no express contract requiring non-disclosure of the trade secret, such an agreement was not necessary, it would be implied based upon the confidential employer- employee relationship between the parties. Id. pg. 735. Conversely, other cases have held that if parties have a written contract to treat certain information as a trade secret, and not to disclose it, then even if the information does not legally qualify as a trade secret, the parties can still be required to keep it secret. Concept, Inc. v. Thermotemp, Inc., 553 So.2d 1325 (Fla. 2nd DCA 1989). But See: Kansas Gas & Electric v. Eye, 789 P.2d 1161 (Kan. 1990) (even though contracts prohibited the disclosure of confidential information concerning the safety record of a nuclear power plant, public policy favored its free dissemination). Without such an agreement, however, the information in question must legally qualify as a trade secret to be entitled to protection. In one case the court held that a customer list taken by an employee without a written contract was not a trade secret and so refused to grant the employer's request for an injunction. Templeton v. Creative Loafing Tampa, Inc., 552 So.2d 288 (Fla. 2nd DCA 1989). The lists considered in the Creative Loafing case were of potential and actual advertisers for the magazine employer. The trial court found that these lists were trade secrets, but the appellate court reversed holding: In our view, the lists in question do not qualify as trade secrets entitled to injunctive protection. There is no evidence that they are the product of any great expense or effort, that they are distillations of larger lists, or that they include information not available from public sources. Id. pg. 289. The court also pointed out that the employee had testified that he had independently compiled the list himself, and had not copied or taken it from his employer. Id. pg. 290. Outside of the employee/employer relationship, where a database is licensed to others, it may still have and retain a trade secrecy status, if it is sold with the condition that the licensee of the database maintain the secrecy of the information. PROTECTION BY CONTRACT A seller of the database can require that any purchaser enter into a written contract as a condition of purchase of the database. For example, in order to try and circumvent Feist, the publisher of a computerized phone book could refuse to sell or give the database to anyone unless they first entered into a written agreement. That written agreement could expressly provide that the purchaser will not disclose the names and addresses contained in the database to anyone but authorized users, nor make any copies or unauthorized use of the information. Typically this takes the form of a License Agreement between the preparer/licensor of the database and the user/licensee of the database. A License Agreement is unlike a typical purchase and sale agreement in that ownership of the product involved, the computer program, remains in the licensor. The licensee merely purchases the right to use the program. The licensee's right to use the program can be limited in any number of ways. The most important limitations typically are that licensee can only use the program on one or a select number of computers, the licensee may not make any copies of the program, and the licensee has to keep confidential certain information about the program or the database. Many other types of limitations or rights and reservations can be contained within the license agreement between the parties. CONCLUSION In any license of a computer database of significant value copyright protection alone should not be relied upon to prohibit unauthorized copying. As the Feist case makes clear, copyright may not apply to protect the data. Trade secrecy protection and an express written agreement between the vendor and consumer are necessary to try and protect the database. If as expected information continues to grow in value and importance as a commodity in our society, then the proliferation of license and secrecy agreements is likely. THE END.