💾 Archived View for spam.works › mirrors › textfiles › law › dblaw.txt captured on 2023-06-16 at 18:56:36.

View Raw

More Information

-=-=-=-=-=-=-

              LEGAL PROTECTION OF COMPUTER DATABASES

~ 1991 Losey
4919 words
                                17 pages







RALPH C. LOSEY
Subin, Shams, Rosenbluth & Moran, P.A.
111 N. Orange Ave., Suite 900
Orlando, Florida  32801
407-841-7470
                           407-648-4995 (fax)




















                 LEGAL PROTECTION OF COMPUTER DATABASES

     There are three main ways to protect all computer software, including
computer databases:  copyright, trade secret and contract.  Ideally, all
three of these legal means can be employed, along with other practical non-
legal methods, to provide the maximum protection against the unauthorized
copying and use (a/k/a "piracy") of a database.  There are, of course,
other legal theories that could be argued in a law suit to protect
databases, such as unfair competition and conversion, however, these
theories may be preempted by copyright law.  See: Southern Bell Tel. & Tel. 
v. Associated Telephone Directory Publishers, 756 F.2d 801, 810 fn. 9 (11th
Cir., 1985) (unfair competition);  Financial Information, Inc. v. Moody's
Investors Service, Inc., 808 F.2d 204 (2nd Cir. 1986) (misappropriation);
The Law and Business of Computer Software; Supra, pg. 22-18
(misappropriation theories and preemption).  
     There are also numerous ingenious non-legal or practical means and
strategies which can be employed to prevent the unauthorized copying of a
computer database.  These practical methods include the deliberate
placement of false or hidden data or "seeds", to facilitate the detection
of copying.  Eg.:  Rockford Map Pub.  v.  Dir. Service Co. of Colorado, 768
F.2d 145, 147 (7th Cir., 1985) (Phony middle initials of names on a map
spelled out Rockford Map Inc. when read from top of the map to the bottom).
                      WHAT IS A COMPUTER DATABASE?
     The computer database is a new type of intellectual property of
growing importance in today's world.  Essentially it is a collection of
information stored so that it can be selectively searched and the desired
information retrieved using a computer.  The Law and Business of Computer
Software, Toedt Ed., Ch. 22, Computer Databases, H. Pearson, pg. 22-2,
Clark Boardman (1990).  As society moves further into the informational age
the significance and dollar volume of database products should increase. 
Since this is a relatively new type of property, American law is having to
rapidly evolve and create new standards and legal principles to try and
protect against its misuse and theft.  
     Databases have long existed in manual or book form. Contemporary
examples of manual databases still abound, such as the phone book and many
reference books, including legal reporters.  The computer database is
essentially an information compendium like a phone book which has been
placed in a computer and thereby automated.  When information is so
computerized, however, there are many more ways for the information to be
accessed, manipulated  and used; the value of the database to users is
thereby greatly enhanced.  Some popular examples of computer databases
include legal databases such as Westlaw and Lexis, and various business and
scientific databases like those found on a computer network such as Dialog.
                              COPYRIGHT LAW
     In order to have a framework for an analysis of the legal protection
of computer databases, and to show the basic problems in trying to legally
protect them from computer piracy, a thorough review of Copyright law is
first necessary.
     The United States Copyright Office in its publication Circular 65:
Copyright Registration for Automated Databases defines an automated
database as a "a body of facts, data, or other information assembled into
an organized format suitable for use in a computer and comprising one or
more files."  The federal Copyright statutes do not yet specifically list
automated databases as a copyrightable subject matter. 17 USC  101,  102. 
Nevertheless, the Copyright Office follows case law and allows a computer
database to be copyrighted as a literary work, even though they are not
specifically included in the statutes.  See Eg.: Lane  v. First Nat. Bank
of Boston, 687 F.Supp. 11 (D.C. Mass. 1988). 
     The Copyright Office considers a computer database to be copyrightable
as a "compilation".  The law defines compilation as a work: 
     formed by the collection and assembling of preexisting materials
     or of data that are selected, coordinated or arranged in such a
     way that the resulting work as a whole constitutes an original
     work of authorship.
     17 USC  101  
Federal copyright law extends copyright protection to compilations as a
form of literary work.  17 USC  103.  In addition to computer databases,
a compilation can be a collective work such as a periodical, anthology and
encyclopedia, or a reference work such as a directory, index, map,
telephone book, guide book, law reporter, catalog, chart, or racing guide. 
     The "literary work" in a computer database which may be protected is
composed of four parts: (1) selection of the contents; (2) the coordination
of the contents internal to the program; (3) the arrangement of all of the 
elements of the database; and, (4) the contents itself.  Computer Software,
 2.08A(2)(c)(i), L.J. Kutten, Clark Boardman (1990).  The copyright of a
compilation may extend to one of these parts without including the others. 
     Copyright law originates in Article 1, Section 8 of the Constitution
of the United States which says that Congress shall have the power:  
     To promote the Progress of Science and useful Arts, by securing
     for limited Times to Authors and Inventors the exclusive Right
     in their respective Writings and Discoveries.

To implement this constitutional right Congress enacted copyright and
patent laws.  The copyright law was written to protect "original works of
authorship".  17 USC  102.  

     Over the centuries Courts have looked to see if a work has
"originality" or not to determine if it may receive copyright protection. 
Kamar Int'l  v.  Russ Berrie & Co., 657 F.2d 1059, 1061 (9th Cir. 1981)
(originality is the sine qua non of copyrightability).  Originality
requires an author to contribute something more than a "merely trivial"
variation which is recognizably "his own".  Id.   A work must show some
"creativity", albeit only a minimal amount, in order to meet the
originality test, and it is not subject to copyright if the work merely
copies an existing work.  See:  Copyright Protection For Citations To A Law
Reporter, Intellectual Property Law Review, pgs. 444-456, Norris Ed., 1988. 
     This essential element of "creativity" is weak or completely absent
in many manual reference works or computer databases.  For example, what
creativity is there in an alphabetical listing of stocks with prices? 
     Another basic problem in protecting a database is that copyright law
does not prohibit the copying of facts, even newly discovered or
expensively acquired facts, nor does it prohibit the copying of ideas. 
Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 556,
105 S.Ct. 2218, 85 L.Ed2d 588 (1985) ("no author may copyright his ideas
or the facts he narrates"); Kregos v. Associated Press, 731 F.Supp. 113,
117 (S.D.N.Y. 1990) (protecting facts would unreasonably limit the public's
right to use information in the public domain);  Mazer v. Stein, 347 U.S.
201 (1954) (distinguishes copyrights from patents and holds that copyright
protects particular expressions of ideas, but not the ideas themselves). 
     Copyright law can only provide protection to the arrangement and
coordination of facts in a database, and even then there must be some
originality to the collection and arrangement for it to be protected.  See
Eg.: 17 USCA  103 and cases cited therein.
     Typically the preparation of a database requires a significant
expenditure of time, effort and money to cull and select information from
many different sources (the "selection" aspect of the "selection,
coordination and arrangement"), but little or no original creativity to
express the facts, or arrange them.  In these circumstances, where the
compiler gathers and compiles raw facts, he did not create the facts, he
just discovered or uncovered them, sometimes at great expense.  So how can
you prevent copying of the work?
     In order to lend copyright protection to merely factual databases,
some courts have tried to move away from a strict application of the
creativity test, to also employ an "industriousness" or "sweat of the brow"
test to determine if the database is an "original" enough work to be
afforded copyright protection.  Southern Bell Tel. & Tel.  v.  Associated
Telephone Directory Publishers, 756 F.2d 801, 809 (11th Cir. 1985).  These
Courts, spearheaded by Judge Learned Hand, found "originality" from the
"labor and expense" expended to make the compilation, rather than from any 
real "creativity" of the author. Id.;  Jeweler's Circular Publishing Co. 
v.  Keystone Publishing Co., 274 fed. 932 (S.D.N.Y. 1921 (L. HAND, J.),
aff'd, 281 F. 83 (2nd Cir. 1922), cert. denied, 259 U.S. 581, 42 S.Ct. 464,
66 L.Ed. 1074 (1922) (the first express "industriousness" standard case); 
West Publishing Co.  v.  Mead Data central, Inc., 799 F.2d 1219 (8th Cir.
1986);  The Law and Business of Computer Software, Supra pg. 22-8.  
     Under the sweat of the brow doctrine, copyright could prevent the
unauthorized copying of facts in a database, if the compiler could show
that sufficient effort went into the acquisition and selection of the data
to make it original.  The protection would lie even if the information
compiled was public knowledge or otherwise not protected.  Southern Bell
Tel. & Tel.  v.  Associated Telephone Directory Publishers, Supra pg. 810.
     Other Courts, however, continued to analyze a database dispute by
using traditional concepts of creativity, and criticized the "sweat of the
brow" standard.  Miller  v.  Universal City Studios, Inc., 650 F.2d 1365,
1369 (5th Cir. 1981);  Lane  v. First Nat. Bank of Boston, 687 F.Supp.
(D.C. Mass. 1988).  In the words of the Second Circuit Court of Appeals:
          To grant copyright protection based merely on the "sweat of the
          author's brow" would risk putting large areas of factual research
          material off limits and threaten the public's unrestrained access
          to information.
          Financial Information, Inc. v. Moody's Investors Service, Inc.,
          Supra pg. 207.
     A recent unanimous decision of the United States Supreme Court has
followed the Miller line of cases and sounded the death knell to Learned
Hand's sweat of the brow doctrine.  Feist Publications, Inc. v. Rural
Telephone Services Co., Inc., 59 U.S.L.W. 4251 (March 26, 1991).
     In Feist the compilation was manual, it was the phone book, for which
the phone company had made a valid copyright registration.  The alleged
infringer, Feist Publications, was found to have copied large portions of
the white pages from Rural Telephone Services Companies phone book.  Feist
Publication's repetition of four fictitious listings, or seeds, which Rural
Telephone had planted in their white pages helped to prove that.  Feist
Publications included the names and addresses from Rural Telephone's white
pages in its competing phone books.  Rural Telephone argued that the white
pages listing of names and addresses in its phone book, although admittedly
facts, was still entitled to copyright protection.  It contended that its
efforts to obtain and select these facts should be protected, and that its
competitor, Feist Publications, should be required to go to the same effort
to obtain the information, and should not be allowed to benefit from its
research and just copy the information.  Id. at pg. 4252.   
     The trial court agreed and entered a judgment for copyright
infringement in favor of Rural Telephone.  Rural Telephone Service Co.,
Inc. v. Feist Publications, Inc., 663 F. Supp. 214, 218 (1987).  In an
unpublished opinion the Tenth Circuit Court of Appeals affirmed, but the
Supreme Court reversed holding:
          The `sweat of the brow' doctrine had numerous flaws, the most
          glaring being that it extended copyright protection in a
          compilation beyond selection and arrangement - the compiler's
          original contribution - to the facts themselves. ... `Sweat of
          the brow' courts thereby eschewed the most fundamental axiom of
          copyright law - that no one may copyright facts or ideas. ...
          they handed out proprietary interests in facts and declared that
          authors are absolutely precluded from saving time and effort by
          relying on facts contained in prior works.
          Id. at pgs. 4254-4255.
     The Supreme Court held that the white pages portion of the phone book
was not entitled to copyright protection, even though the rest of the book
was.  Therefore Feist Publications, and anyone else, was free to copy the
white pages.  As Justice O'Connor concluded in her unanimous opinion:
          Because Rural's white pages lack the requisite originality,
          Feist's use of the listings cannot constitute infringement.  This
          decision should not be construed as demeaning Rural's efforts in
          compiling its directory, but rather as making clear that
          copyright rewards originality, not effort.
          Id. at pg. 4257.
     Now that the sweat of the brow doctrine is dead, it is clear that raw
facts in a database may not be protected by copyright, regardless of the
time or expenses that went into locating them.  Still, in many databases
the data itself, or the particular expressions of the facts, may have been
created by the author.  In such cases the data has originality and can be
protected.  An example of this which is used by the Copyright Office is a
full text bibliographic database.  There the author not only selects the
particular books to be included in the bibliography, but also the author
himself writes his own description as to each of the books.  Since the
author himself created the entire contents of the database, both the
selection and compilation aspect of the database, and the contents of the
database, are subject to copyright protection.
      Even if the contents are raw facts, not new materials created by the
author, the compilation aspects of the database (selection, coordination
and arrangement) may still receive copyright protection.  Copyright law 
prevents the copying of the coordination and arrangement of the facts, the
format of data presentation and manipulation, provided that the format and
means are original.  This entails a consideration as to whether the
coordination and arrangement are novel and unique, or whether the
arrangement itself contains information.  
     In a dispute between West Publishing Companies and Mead Data central,
Inc., West's arrangement of case law was found to be original and entitled
to copyright.  West Publishing Co.  v.  Mead Data central, Inc., Supra at
pg. 1226.  The computer research service "Lexis", owned by Mead Data,
competes with West Publishing's, "Westlaw", to provide computer assisted
research services to lawyers.  Both services use computers to locate and
display case decisions on a computer screen.  The first screen display of
a case in both Lexis and Westlaw includes an identification of the citation
to the case, thereby indicating the page on which the decision begins in
the particular West Reporter.  The judicial opinions are of course not
copyrightable, and West concedes that Lexis and others may use the citation
of a case and identify the first page without infringing West's copyright
under the "fair use" copyright doctrine.  Id. pg 1222; 17 U.S.C.  107.  
West does, however, claim a copyright to all of its page references, and
it limits the fair use exception to the citation.
     In 1985 Lexis announced its intention to take page identification a
step further by offering a service called "star pagination".  This feature
would insert in the Lexis opinion display the page numbers from West's
National Reporter Systems publications.  Only in this way could a Lexis
user determine what West page number corresponded to the portion of an
opinion viewed without having to physically refer to the West publication
in which the opinion appears.  Id.
     West sued for an injunction to prevent the introduction of this new
pagination feature claiming it would infringe its copyright.  Mead Data
argued that the arrangement of the cases was not an original creation and
thus was not copyrightable.  West contended that the order and arrangement
of the opinions in its reporters was sufficiently original and creative for
a copyright.  The trial court and Eighth Circuit Court of Appeals agreed
with West and an injunction was entered prohibiting Lexis from introducing
this feature.  In the words of the Eighth Circuit:
          We conclude, as did the District Court, that the arrangement West
          produces through this process is the result of considerable
          labor, talent and judgment.  As discussed above ..., to meet
          intellectual-creation requirements a work need only be the
          product of a modicum of intellectual labor; West's case
          arrangements easily meet this standard.
          Id. pgs. 1226-1227.
     Not all compilations, however, will meet even a minimal originality
standard.  Thus for example, if the selection, coordination and arrangement
of data in a database is a mechanical task only, and represents no original
authorship or creativity, it is not subject to copyright protection.  The
example given for this by the Copyright Office is the mere transfer of data
from hard copy to computer storage.  In other words, if you simply transfer
data from one medium to the other, and do nothing creative in deleting
portions or adding portions, then there is no original authorship to be
protected.  
     The Feist Publications case provides another example.  The Supreme
Court held that the alphabetical arrangement of names in the white pages
was not entitled to copyright because:  "there is nothing remotely creative
about arranging names alphabetically ... It is not only unoriginal, it is
practically inevitable."   Feist Publications v. Rural Telephone Services
Co., Inc., Supra at pg. 4257.  This is similar to another copyright
doctrine which is important to computer law: "functionality", whereby an
aspect of a computer program will not be protected by copyright if it is
merely utilitarian, rather than original.  Lotus Development Corporation
v. Paperback Software International, 740 F.Supp. 37, 52-58, 68 (D.C. Mass.
1990) (Lotus 123 interface was an original expression entitled to copyright
and was not merely a utilitarian function).
     A recent decision by a federal Judge in New York shows another example
where both the information selected, and form of presentation, were found
to be unoriginal and thus not entitled to copyright.  Kregos v. Associated
Press, 731 F.Supp. 113 (S.D.N.Y. 1990).  This involved a compilation of
statistics on baseball pitchers which was created by George Kregos and
published in newspapers nationwide.  The statistics were presented in nine
columns with one column for wins, losses, earned run average, etc.  
     Associated Press began publishing a rival form in its papers which was
virtually identical to Kregos' form.  Kregos sued to try and stop the rival
database from presenting the statistics in the same format.  The Court
found that there was no valid copyright of Krego's work because: (1) the
data itself (baseball statistics) was in the public domain (facts);  (2)
the particular statistics selected for inclusion in the form were
commonplace and required no creativity; and, (3) the format of display was
not novel or unique, it was analogous to a blank form which conveys no
information.  In the words of the Court: 
     Since an extremely limited number of ways to practically publish a
     pitching form exist, plaintiff's form does not exhibit the requisite
     selection or arrangement to receive protection....  
     (T)he facts ... are distinguishable (from other cases where
     copyright was upheld) due to the absence of true selection or
     arrangement by plaintiff in the case at bar...
     (T)he form is sufficiently analogous (to a blank form) in that it
     fails to convey information... Therefore, we also find plaintiff's
     form not copyrightable based on this doctrine.
     Id. pg. 120.
     There are a number of other drawbacks and limitations to copyright
protection.  For instance, if not properly perfected and registered a
copyright can be waived and the work may enter the public domain.  Also,
there are certain exceptions to copyright, such as exceptions based on the
mentioned "fair use" rule.  Computer Software,  2.07(4)(c) and
 2.08A(2)(c)(iii), L.J. Kutten, Clark Boardman (1990);  Dow Jones & Co. 
v.  Board of Trade of the City of Chicago, 546 F. Supp. 113 (S.D.N.Y.
1982);  Telerate Systems, Inc. v. Caro, 689 F.Supp. 221 (S.D.N.Y. 1988).
     Another drawback pertains to the deposit requirements of copyright
registration.  37 C.F.R.  202.20(C)(2)(vii).  Printouts of the program
source code and the database must be included with the registration.  For
long databases the registration requirement can be limited to the first and
last twenty-five pages.  If the program is IBM-PC or Apple Macintosh
compatible, and is recorded on CD-ROM, or diskette, then under the Best
Edition Statement supplement to the rules, you must submit both the
printout of the code and data and the software itself.
     A potentially serious problem with the deposit requirement is that the
print outs and software may be inspected or viewed by anyone upon request. 
Therefore if you have any trade secrets or other confidential information
contained in the printout of the source code (source code is usually kept
very secret) or database, or revealed in the operation of the software
itself, your competitor could gain access to them by inspecting or viewing
what you have deposited with the Copyright Office.  The Copyright Office
is sensitive to the danger of having trade secrets revealed in the deposit
accompanying copyright registration.  For this reason the Copyright Office
now allows selected portions of up to 49% of the printout of the computer
code to be marked out and hidden so that they cannot be read.  There are
limitations on this general rule in that the portions deleted cannot be so
great as to prevent the Copyright Office from intelligently reviewing the
registration.  
     Another practical problem with the deposit requirement is that some
databases are continually changing and being updated, and thus the deposits
and registrations must continue.  Although group registration on a
quarterly basis is now permitted by the Copyright Office in certain
circumstances to try and obviate this problem, several technical problems
with such periodic group registrations remain.   
     Another drawback in relying on copyright protection alone is that your
copyrights can be weakened or waived if proper copyright procedures are not
followed.  Such procedures include the proper fixation and display of
copyright notices and the registration of the copyright with the Copyright
Office.  The procedures and steps involved in registration of a computer
database copyright can be complicated and involved, particularly when trade
secret information is involved.  Computer Software,  2.08A(4),(5),(6),(8),
L.J. Kutten, Clark Boardman (1990).  For this reason it is suggested that
the assistance of competent computer law counsel be retained to assist in
this process.
     With copyright law providing only limited protection to databases, and
with all of the other problems inherent in copyright protection of a
database, contract and trade secret law become all the more important to
try and prevent the unauthorized copying of factual data in a database.
                        TRADE SECRECY PROTECTION
     Adding trade secrecy protection to a database can provide
significantly greater legal rights.  Consider for instance the recent case
of  Florida Power & Light  v.  Util. Services, 550 So.2d 13 (Fla. 3rd DCA
1989) where the jury found that the defendant FP&L had stolen the
plaintiff's trade secrets and awarded damages of $1.6 million.  Under civil
theft law, Chapter 812 Florida Statutes, this award was then trebled, for
a total judgment against FP&L of $4.8 million.
     Essentially a trade secret is knowledge which a person or company
acquires through its own efforts and which has some value to it. 
Typically, this knowledge is kept secret from competitors because it is
felt that this information provides some type of competitive advantage.
     There is a uniform Trade Secret Act which has been enacted in many of
the states of the country, including Florida.  Chapter 688, Florida
Statutes.  Section 688.002, Florida Statutes, defines a trade secret to
mean: 
          information, including a formula, pattern, compilation,
          program, device, method, technique or process that:
          (a) derives independent economic value, actual or
          potential, not being generally known to, not being
          readily ascertainable by proper means by, other persons who
          can obtain economic value from its disclosure or use; and 
          (b) is the subject of efforts that are reasonable under the
          circumstances to maintain its secrecy.
     The Uniform Trade Secret Act quoted above was adopted by Florida in
1988.  Trade secrecy protection has, however, long existed as part of the
common law.  Restatement of Torts, (1939) (1st Ed.),  757 "Liability For
Disclosure or Use of Another's Trade Secret";  Callman Unfair Comp.,
Trademarks & Monopolies, Ch. 14 (4th Ed.);  Kewanee Oil Co.  v.  Bicron
Corp., 416 U.S. 470, 94 S.Ct. 1879, 40 L.Ed.2d 315 (1974);  Cataphote Corp. 
v.  Hudson, 444 F.2d 1313 (5th Cir. 1971).  Since a computer database is
a compilation which derives economic value, it is a type of intellectual
property which has frequently received trade secrecy protection.  Whether
or not a court will find that a database is legally a trade secret
frequently depends upon whether the compiler made reasonable efforts to
maintain its secrecy.  Telerate Systems, Inc.  v.  Caro, 689 F.Supp. 221,
232 (S.D. N.Y. 1988) (Describes sufficient efforts taken to protect
computer trade secrets).  
     Many of the trade secret cases involve a dispute between an employer
and former employee over a common form of data compilation, a customer
list.  28 A.L.R.3rd 17 "Customer List As A Trade Secret".  Many employers
consider their customer list to be their most valuable trade secret, and
when an employee leaves and takes the list with him to compete against an
employer, a suit frequently follows to have an injunction entered to make
the employee return the list and not use those trade secrets.
     One such recent case is Unistar Corporation  v.  Child, 415 So.2d 733
(Fla. 3rd DCA 1982).  The employer here sold diamonds and gems through
"financial planners".  Over three years they had screened 12,000 known
planners and developed a list of 4,200 who were interested, and 1,850 who
had signed on as dealers.  Unistar spent over $800,000 to compile this
list!  Several Unistar employees left together and formed a competing
business using the lists which they took with them.  Unistar's sales then
fell 84%, from $440,000 to $70,000 per month.
     Unistar sued for an injunction, and the former employees defended by
claiming that the financial planners listed are all available to the public
and the lists were not trade secrets, and that there was no agreement that
the employees would keep the lists secret.  The court ruled for the
employer, Unistar, and found that the lists were trade secrets because:
     ... (they are) indeed the distillation of a larger list of financial
     planners, reflecting considerable effort, knowledge, time, and expense
     on the part of the plaintiff.  The customer lists were periodically
     updated and when the new list was provided the old list was destroyed. 
     The marketing representatives were instructed to keep the computer
     lists at their desks and not take them out of the office.  
     Id., pg. 734.
     The Court also held that even though there was no express contract
requiring non-disclosure of the trade secret, such an agreement was not
necessary, it would be implied based upon the confidential employer-
employee relationship between the parties.  Id. pg. 735.
     Conversely, other cases have held that if parties have a written
contract to treat certain information as a trade secret, and not to
disclose it, then even if the information does not legally qualify as a
trade secret, the parties can still be required to keep it secret. 
Concept, Inc.  v.  Thermotemp, Inc., 553 So.2d 1325 (Fla. 2nd DCA 1989).
But See: Kansas Gas & Electric v. Eye, 789 P.2d 1161 (Kan. 1990) (even
though contracts prohibited the disclosure of confidential information
concerning the safety record of a nuclear power plant, public policy
favored its free dissemination).
     Without such an agreement, however, the information in question must
legally qualify as a trade secret to be entitled to protection.  In one
case the court held that a customer list taken by an employee without a
written contract was not a trade secret and so refused to grant the
employer's request for an injunction.  Templeton  v.  Creative Loafing
Tampa, Inc., 552 So.2d 288 (Fla. 2nd DCA 1989).  
     The lists considered in the Creative Loafing case were of potential
and actual advertisers for the magazine employer.  The trial court found
that these lists were trade secrets, but the appellate court reversed
holding:
     In our view, the lists in question do not qualify as trade secrets
     entitled to injunctive protection.  There is no evidence that they are
     the product of any great expense or effort, that they are
     distillations of larger lists, or that they include information not
     available from public sources.
     Id. pg. 289.
The court also pointed out that the employee had testified that he had
independently compiled the list himself, and had not copied or taken it
from his employer.  Id. pg. 290.
     Outside of the employee/employer relationship, where a database is
licensed to others, it may still have and retain a trade secrecy status,
if it is sold with the condition that the licensee of the database maintain
the secrecy of the information.
                         PROTECTION BY CONTRACT
     A seller of the database can require that any purchaser enter into a
written contract as a condition of purchase of the database.  For example,
in order to try and circumvent Feist, the publisher of a computerized phone
book could refuse to sell or give the database to anyone unless they first
entered into a written agreement.  That written agreement could expressly
provide that the purchaser will not disclose the names and addresses
contained in the database to anyone but authorized users, nor make any
copies or unauthorized use of the information.  Typically this takes the
form of a License Agreement between the preparer/licensor of the database
and the user/licensee of the database.
     A License Agreement is unlike a typical purchase and sale agreement
in that ownership of the product involved, the computer program, remains
in the licensor.  The licensee merely purchases the right to use the
program.  The licensee's right to use the program can be limited in any
number of ways.  The most important limitations typically are that licensee
can only use the program on one or a select number of computers, the
licensee may not make any copies of the program, and the licensee has to
keep confidential certain information about the program or the database. 
Many other types of limitations or rights and reservations can be contained
within the license agreement between the parties.
                               CONCLUSION
     In any license of a computer database of significant value copyright
protection alone should not be relied upon to prohibit unauthorized
copying.  As the Feist case makes clear, copyright may not apply to protect
the data.  Trade secrecy protection and an express written agreement
between the vendor and consumer are necessary to try and protect the
database.  If as expected information continues to grow in value and
importance as a commodity in our society, then the proliferation of license
and secrecy agreements is likely.
                                THE END.