Silvaco Data Systems v. Intel Corp.

Last updated
Silvaco Data Systems v. Intel Corporation
Supremecourtofcaliforniamaincourthouse.jpg
Court California Courts of Appeal
DecidedApril 29, 2010
Citation(s) 184 Cal. App. 4th 210
Case opinions
Possession of software object code does not constitute misappropriation of trade secrets.
Court membership
Judge(s) sitting Conrad L. Rushing, Eugene M. Premo, Franklin D. Elia
Case opinions
Decision byRushing
Keywords
trade secrets

Silvaco Data Systems v. Intel Corp was a trade secrets case heard before the California Court of Appeal for the Sixth District. Silvaco sued Intel for misappropriation of trade secrets because Intel used software produced by a third-party that had misappropriated Silvaco's trade secrets. The appeals court affirmed the decision of the trial court to grant summary judgment in favor of Intel, finding that merely using infringing software does not constitute a trade secret infringement in itself.

Contents

Background

Silvaco is a California-based company that produces electronic design automation (EDA) software. Silvaco makes several EDA products including SmartSpice, a tool for designing and simulating analog circuits. In December 2000, Silvaco sued Circuit Semantics, Inc. (CSI) for misappropriating Silvaco's trade secrets in the design of DynaSpice, a CSI product that competed with SmartSpice. This case went to trial, [1] where Silvaco eventually prevailed. [2] [3]

Silvaco then sued several customers of CSI that had used DynaSpice, including Intel. Silvaco argued that by using DynaSpice, Intel was guilty of misappropriation of trade secrets under the California Uniform Trade Secrets Act (CUTSA). [4] Intel demurred; that is, they argued that, even if they had used DynaSpice, their use of DynaSpice did not constitute misappropriation of trade secrets. In particular, Intel presented evidence that they only received the object code for DynaSpice, not the source code, and that because object code "does not readily yield its underlying design to human understanding", possession of object code does not imply possession of information that would be protected as a trade secret. [5] The trial court granted summary judgment in favor of Intel, stating that:

By acquiring the CSI software that 'embodies' Silvaco's source code, Intel did not acquire, or gain knowledge of, the information that constitutes Silvaco's alleged trade secret.... It is not the functionality of the CSI software that constitutes Silvaco's alleged trade secret, but Silvaco's means of creating that functionality through the source code.

Silvaco appealed the trial court's decision.

Opinion of the court

The appeals court affirmed the decision of the trial court, granting summary judgment in favor of Intel. [5] Agreeing with the trial court, the appeals court found that Intel never had possession of any trade secrets belonging to Silvaco, which CUTSA defines as one of the criteria for misappropriation of trade secrets. The court distinguished between the "use" of a trade secretwhich would constitute an infringementfrom the "use" of the software via executing its object code. The court reasoned in part by analogy:

One who bakes a pie from a recipe certainly engages in the "use" of the latter; but one who eats the pie does not, by virtue of that act alone, make "use" of the recipe in any ordinary sense, and this is true even if the baker is accused of stealing the recipe from a competitor, and the diner knows of that accusation. Yet this is substantially the same situation as when one runs software that was compiled from allegedly stolen source code. The source code is the recipe from which the pie (executable program) is baked (compiled).

The court also observed that accepting Silvaco's arguments would have dire policy consequences:

To brand Intel‟s conduct as unethical, we would have to conclude that any end user of a software application must desist from its use—whatever the resulting harm to his own business—the moment anyone claims that the application was compiled from stolen source code. This would be a prescription for the stultification of technological development and of other business activities taking place at a considerable remove, causally and ethically, from the claimed wrong. Far from serving the purposes of trade secrets law, such a rule would make it far too easy to suppress competition and technological development by threatening not only would-be competitors, but also their customers, with litigation of virtually unlimited scope.

Impact

Several commentators observed that the court's decision in this case clarified the application of trade secret law to software. [6] [7] [8] In particular, the court's decision supports the idea that although a program's object code is derived from the program's source code, an individual possessing the object code does not possess any knowledge of any trade secrets embodied in the source code.

The appeals court decision also prompted discussion because of a lengthy footnote contained in the opinion that decried the 8,000 pages of records filed with the court for this case, to which fact Justice Rushing commented: "Seldom have so many trees died for so little". [9] [10]

See also

Related Research Articles

Clean-room design is the method of copying a design by reverse engineering and then recreating it without infringing any of the copyrights associated with the original design. Clean-room design is useful as a defense against copyright infringement because it relies on independent creation. However, because independent invention is not a defense against patents, clean-room designs typically cannot be used to circumvent patent restrictions.

<i>MAI Systems Corp. v. Peak Computer, Inc.</i> Ok Google Ok Google

MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, was a case heard by the United States Court of Appeals for the Ninth Circuit which addressed the issue of whether the loading of software programs into random-access memory (RAM) by a computer repair technician during maintenance constituted an unauthorized software copy and therefore a copyright violation. The court held that it did, although the United States Congress subsequently enacted an amendment to 17 U.S.C. § 117 to specifically overrule this holding in the circumstances of computer repair.

In a series of legal disputes between SCO Group and Linux vendors and users SCO alleged that its license agreements with IBM meant that source code IBM wrote and donated to be incorporated into Linux was added in violation of SCO's contractual rights. Members of the Linux community disagreed with SCO's claims; IBM, Novell and Red Hat filed claims against SCO.

Beginning in 2003, The SCO Group was involved in a dispute with various Linux vendors and users. SCO initiated a series of lawsuits, the most known of which were SCO v. IBM and SCO v. Novell, that had implications upon the futures of both Linux and Unix. SCO claimed that Linux violated some of SCO's intellectual properties. Many industry observers were skeptical of SCO's claims, and they were strongly contested by SCO's opponents in the lawsuits, some of which launched counter-claims. By 2011, the lawsuits fully related to Linux had been lost by SCO or rendered moot and SCO had gone into bankruptcy. However the SCO v. IBM suit continued for another decade, as it included contractual disputes related to both companies' involvement in Project Monterey in addition Linux-related claims. Finally in 2021 a settlement was reached in which IBM paid the bankruptcy trustee representing what remained of SCO the sum of $14.25 million.

Silvaco

Silvaco Inc. develops and markets electronic design automation (EDA) and technology CAD (TCAD) software and semiconductor design IP (SIP). The company is headquartered in Santa Clara, California, and has a global presence with offices located in North America, Europe, and throughout Asia. Since its founding in 1984, Silvaco has grown to become a large privately held EDA company. The company has been known by at least two other names: Silvaco International, and Silvaco Data Systems.

<i>Apple v. Does</i> California Courts of Appeal case

Apple v. Does was a high-profile legal proceeding in United States of America notable for bringing into question the breadth of the shield law protecting journalists from being forced to reveal their sources, and whether that law applied to online news journalists writing about corporate trade secrets. The case was also notable for the large collection of amici curiae who joined in the matter.

MGM Studios, Inc. v. Grokster, Ltd., 545 U.S. 913 (2005), is a United States Supreme Court decision in which the Court unanimously held that defendant peer-to-peer file sharing companies Grokster and Streamcast could be sued for inducing copyright infringement for acts taken in the course of marketing file sharing software. The plaintiffs were a consortium of 28 of the largest entertainment companies.

The Uniform Trade Secrets Act (UTSA), published by the Uniform Law Commission (ULC) in 1979 and amended in 1985, is a Uniform Act promulgated for adoption by states in the United States. One goal of the UTSA is to make the state laws governing trade secrets uniform, which is especially important for companies that operate in more than one state. Historically, the law governing misappropriation of trade secrets developed separately in each state.

<i>Computer Associates International, Inc. v. Altai, Inc.</i> American legal case

Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693 is a decision from the United States Court of Appeals for the Second Circuit that addressed to what extent non-literal elements of software are protected by copyright law. The court used and recommended a three-step process called the Abstraction-Filtration-Comparison test. The case was an appeal from the United States District Court for the Eastern District of New York in which the district court found that defendant Altai's OSCAR 3.4 computer program had infringed plaintiff Computer Associates' copyrighted computer program entitled CA-SCHEDULER. The district court also found that Altai's OSCAR 3.5 program was not substantially similar to a portion of CA-SCHEDULER 7.0 called SYSTEM ADAPTER, and thus denied relief as to OSCAR 3.5. Finally, the district court concluded that Computer Associates' state law trade secret misappropriation claim against Altai was preempted by the federal Copyright Act. The appeal was heard by Judges Frank Altimari, John Daniel Mahoney, and John M. Walker, Jr. The majority opinion was written by Judge Walker. Judge Altimari concurred in part and dissented in part. The Second Circuit affirmed the district court's ruling as to copyright infringement, but vacated and remanded its holding on trade secret preemption.

<i>Vault Corp. v. Quaid Software Ltd.</i> U.S. legal case

Vault Corporation v Quaid Software Ltd. 847 F.2d 255 is a case heard by the United States Court of Appeals for the Fifth Circuit that tested the extent of software copyright. The court held that making RAM copies as an essential step in utilizing software was permissible under §117 of the Copyright Act even if they are used for a purpose that the copyright holder did not intend. It also applied the "substantial noninfringing uses" test from Sony Corp. of America v. Universal City Studios, Inc. to hold that Quaid's software, which defeated Vault's copy protection mechanism, did not make Quaid liable for contributory infringement. It held that Quaid's software was not a derivative work of Vault's software, despite having approximately 30 characters of source code in common. Finally, it held that the Louisiana Software License Enforcement Act clause permitting a copyright holder to prohibit software decompilation or disassembly was preempted by the Copyright Act, and was therefore unenforceable.

<i>Jacobsen v. Katzer</i>

Jacobsen v. Katzer was a lawsuit between Robert Jacobsen (plaintiff) and Matthew Katzer (defendant), filed March 13, 2006 in the United States District Court for the Northern District of California. The case addressed claims on copyright, patent invalidity, cybersquatting, and Digital Millennium Copyright Act issues arising from Jacobsen under an open source license developing control software for model trains.

<i>MDY Industries, LLC v. Blizzard Entertainment, Inc.</i>

MDY Industries, LLC v. Blizzard Entertainment, Inc and Vivendi Games, Inc., 629 F.3d 928, is a case decided by the United States Court of Appeals for the Ninth Circuit. At the district court level, MDY had been found liable under theories of copyright and tort law for selling software that contributed to the breach of Blizzard's End User License Agreement (EULA) and Terms of Use (ToU) governing the World of Warcraft video game software.
The court's ruling was appealed to the United States Court of Appeals for the Ninth Circuit, which reversed the district court in part, upheld in part, and remanded for further proceedings. The Court of Appeals ruled that for a software licensee's violation of a contract to constitute copyright infringement, there must be a nexus between the license condition and the licensor’s exclusive rights of copyright. However, the court also ruled, contrary to Chamberlain v. Skylink, that a finding of circumvention under the Digital Millennium Copyright Act does not require a nexus between circumvention and actual copyright infringement.

<i>Comprehensive Technologies International, Inc. v. Software Artisans, Inc.</i>

Comprehensive Technologies International, Inc. v. Software Artisans, Inc., 3 F.3d 730 was a case in which the U.S. Court of Appeals for the Fourth Circuit discussed legal tests for software copyright infringement, and ruled that trade secret misappropriation requires more than circumstantial evidence. The case also ruled on what terms may be reasonable and enforceable in non-compete agreements.

<i>DVD Copy Control Assn, Inc. v. Bunner</i>

DVD Copy Control Association, Inc. v. Bunner was a lawsuit that was filed by the DVD Copy Control Association in California, accusing Andrew Bunner and several others of misappropriation of trade secrets under California's implementation of the Uniform Trade Secrets Act. The case went through several rounds of appeals and was last heard and decided in February 2004 by the California Court of Appeal for the Sixth District.

<i>Asset Marketing Systems, Inc. v. Gagnon</i> US appeals court case

Asset Marketing Systems, Inc. v. Gagnon was a case heard by the United States Court of Appeals for the Ninth Circuit regarding implied licenses to use, modify and retain the source code of computer programs, and the enforceability of non-competition agreements. The court affirmed the ruling from the United States District Court for the Southern District of California that Kevin Gagnon, a software contractor doing business as "Mr. Computer", had implicitly granted Asset Marketing Systems (AMS) an unlimited license to use, modify and retain the source code of the programs that Gagnon created. The case is notable because the Court held that an implied software license is granted when the licensee requests the creation of a work, the licensor creates and delivers the work, and the licensor intends the licensee to copy and distribute the work.

Structure, sequence and organization (SSO) is a term used in the United States to define a basis for comparing one software work to another in order to determine if copying has occurred that infringes on copyright, even when the second work is not a literal copy of the first. The term was introduced in the case of Whelan v. Jaslow in 1986. The method of comparing the SSO of two software products has since evolved in attempts to avoid the extremes of over-protection and under-protection, both of which are considered to discourage innovation. More recently, the concept has been used in Oracle America, Inc. v. Google, Inc.

<i>Brown Bag Software v. Symantec Corp.</i>

Brown Bag Software v. Symantec Corp. is an intellectual property law case in which the United States Court of Appeals for the Ninth Circuit affirmed-in-part and vacated-in-part the previous ruling of the United States District Court for the Northern District of California. Brown Bag Software sued Symantec Corporation and John L. Friend, an individual software developer for Softworks Development, for copyright infringement and several state law claims regarding the similarity of Symantec Corporation's and Brown Bag Software's computer outlining programs.

Ajaxo Inc. v. E*Trade Financial Corp., 187 Cal.App.4th 1295 (2010), is the second appeal on a dispute dated back to 1999. During the original 2000 case, defendant E*Trade, an online financial services company, was found liable for maliciously and willfully misappropriating trade secrets pertaining to wireless stock trading technology acquired from the plaintiff, Ajaxo. Under the Uniform Trade Secrets Act E*Trade was required under a mutually signed Non-disclosure agreement (NDA) to keep Ajaxo's trade secrets confidential. After a jury trial in 2003, E*Trade was fined $1.3 million to be paid to Ajaxo for the misappropriation and breach of NDA. The court denied Ajaxo's request for additional damages. All parties appealed. In 2005 the California courts of appeal affirmed the original ruling but remanded the case back to the trial court to determine additional damages. A jury verdict in 2008 rejected claims raised and demands for royalty damages from Ajaxo. In trade secret cases it is common for a plaintiff to seek royalty damages when they are unable to show an actual loss or that the defendant received some inequitable benefit from the misappropriation. In this case the court refused to allow evidence of royalty damages, claiming there were no net damages. Ajaxo appealed. In 2010 the California courts of appeal once again remanded the case back to the trial court reasoning that in such cases an exact quantitative measure of wrongful enrichment damages incurred by the plaintiff might not be sufficient to reject the claim of reasonable royalties based damages

Cadence Design Systems, Inc. v. Avanti Corp was a major legal battle between two semiconductor companies, Cadence Design Systems and Avanti Corporation, that lasted for more than six years, and was fought over stolen technology.

Open source license litigation involves lawsuits surrounding open-source licensed software. Many of the legal rights of open source software licensors enforceable against users violating licensing agreements are untested by the U.S. legal system. Free and open source software (FOSS) is distributed under a variety of free-software licenses, which are unique among other software licenses. Legal action against open source licenses involves questions about their validity and enforceability.

References

  1. Richard Goering (November 6, 2002). "Silvaco vs. CSI trade secrets case headed to trial". EE Times.
  2. Richard Goering (September 3, 2003). "Silvaco wins judgment against Circuit Semantics". EE Times.
  3. "Silvaco Announces Final Settlement with Circuit Semantics Resolving All Legal Disputes" (Press release). Silvaco. August 5, 2006. Archived from the original on 2012-05-27.
  4. "California Civil Code, sections 34263426.11".
  5. 1 2 Silvaco Data Systems v. Intel Corporation(Cal. App.April 29, 2010).Text
  6. Frances Kelly (June 21, 2010). "California Court of Appeal Clarifies What Constitutes "Use" of a Trade Secret". Intellectual Property Law Blog.
  7. Mike Masnick (May 6, 2010). "Software Buyers Not Liable For Trade Secrets In Compiled Source Code". TechDirt.
  8. Stephen C. Gerrish (May 2, 2010). "Silvaco Data Systems and Misappropriation of Source Code". Thoits Law.
  9. Stephen C. Gerrish (May 2, 2010). "Silvaco Data Systems, Footnote 2, and the Record on Appeal". Thoits Law.
  10. Shaun Martin (April 29, 2010). "Silvaco Data Systems v. Intel (Cal. Ct. App. - April 29, 2010)". California Appellate Report.