Computer Associates International, Inc. v. Altai, Inc.

Last updated
Computer Associates International, Inc. v. Altai, Inc.
United States Court of Appeals For The Second Circuit Seal.svg
Court United States Court of Appeals for the Second Circuit
Full case nameComputer Associates International, Inc. v. Altai, Inc.
ArguedJanuary 9, 1992
DecidedJune 22, 1992
amended: December 17, 1992
Citation(s)982 F.2d 693; 119 A.L.R. Fed. 741; 61 USLW 2434, 37 Fed. R. Evid. Serv. 348
Holding
The court applied the Abstraction-Filtration-Comparison, three-step test to determine whether substantial similarity is met when proving copyright infringement for non-literal elements of software, and it held that Altai's rewritten code did not meet the requirements for copyright infringement, and vacated and remanded the ruling on trade secret misappropriation.
Court membership
Judge(s) sittingFrank Altimari, John Mahoney, and John Walker
Keywords
copyright infringement, non-literal elements, substantial similarity, abstraction-filtration-comparison

Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992) [1] is a decision from the United States Court of Appeals for the Second Circuit that addressed to what extent non-literal elements of software are protected by copyright law. The court used and recommended a three-step process called the Abstraction-Filtration-Comparison test. The case was an appeal from the United States District Court for the Eastern District of New York in which the district court found that defendant Altai's OSCAR 3.4 computer program had infringed plaintiff Computer Associates' copyrighted computer program entitled CA-SCHEDULER. [1] The district court also found that Altai's OSCAR 3.5 program was not substantially similar to a portion of CA-SCHEDULER 7.0 called SYSTEM ADAPTER, and thus denied relief as to OSCAR 3.5. Finally, the district court concluded that Computer Associates' state law trade secret misappropriation claim against Altai was preempted by the federal Copyright Act. [1] The appeal was heard by Judges Frank Altimari, John Daniel Mahoney, and John M. Walker, Jr. The majority opinion was written by Judge Walker. Judge Altimari concurred in part and dissented in part. The Second Circuit affirmed the district court's ruling as to copyright infringement, but vacated and remanded its holding on trade secret preemption. [1]

Contents

Background of the case

Computer Associates (CA) created a job scheduling program called CA-SCHEDULER which sorts, runs, and controls the various tasks (jobs) given to a computer. This scheduler was designed to be compatible with IBM System 370 computers which ran any of three different IBM mainframe operating systems: DOS/VSE, OS/MVS, and VM/CMS. Traditionally, a program must be specifically compiled to run on a designated operating system. In order to allow the same code to run on the different operating systems, the CA-SCHEDULER included a component called ADAPTER that was designed to translate the language of the program into commands understandable to that particular operating system. This way the CA-SCHEDULER could use the same code but run on different operating systems.

In 1982, Altai established their own job scheduler called ZEKE written for the VSE operating system. In efforts to create a version of ZEKE to run on the MVS operating system, Altai employee James Williams recruited his longtime friend Claude Arney, an employee of Computer Associates, to create the MVS version. Williams claims that at the time he did not know about the ADAPTER component or that Arney had familiarity with the CA-SCHEDULER and ADAPTER code. Arney left CA to work on Altai's ZEKE program, taking the VSE and MVS versions of the source code for ADAPTER with him. Using his knowledge of ADAPTER, Arney then convinced Altai to restructure the program to include a program translator to interface with various operating systems. Arney created the translator OSCAR 3.4 for Altai in which about 30% of OSCAR's source code was taken directly from CA's ADAPTER code.

In 1988, CA discovered Altai's use of the CA ADAPTER code and brought an action for copyright infringement and trade secret misappropriation against Altai. In response, Altai ordered a clean room rewrite of the copied portions of the code to be performed by eight programmers who had no knowledge or involvement with the previous OSCAR code. This new program was released as OSCAR 3.5.

In the judgment of the United States District Court for the Eastern District of New York, the Honorable George C. Pratt, United States Circuit Judge found that OSCAR 3.4 was a copyright infringement of CA's CA-SCHEDULER and awarded CA $364,444 in damages and apportioned profits. The district court ruled that OSCAR 3.5 rewrite, on the other hand, did not constitute copyright infringement. It also ruled that the state law trade secret claims were preempted by the federal Copyright Act, and thus Altai was not liable for trade secret misappropriation.

Initially, both parties appealed the judgment. Altai appealed the judgment on OSCAR 3.4, but subsequently dropped the claim. CA appealed the judgment on OSCAR 3.5 and preemption on trade secret misappropriation.

Relevant law

Prior to this case, it had been well established that software can be protected by copyright law. In particular, previous cases have shown that literal elements of program code are protected by copyright (in Apple Computer, Inc. v. Franklin Computer Corp. [2] among others). The issue in this case is whether and to what extent copyright protects non-literal elements of program code, the structure, sequence and organization of the program. Although a few courts had examined this issue, this was the first of its kind in this circuit.

Issues

In the appeal, CA disputed the district court's finding that the OSCAR 3.5 did not have substantial similarity to CA's ADAPTER. They claimed that the district court did not apply a proper test that took into consideration the copying of non-literal elements of computer software. They claimed that despite the clean room rewrite, there was substantial similarity in the structures of ADAPTER including flow charts, inter-modular relationships, parameter lists, macros, and services obtained from the operating system.

To approach this issue, the court fully supported the claim that non-literal elements of software are protected under copyright. Software is considered a literary work for the purposes of copyright law, and non-literal elements of literary works are protected under copyright. As such, non-literal elements of software are also protected.

The question at hand was to what extent are the non-literal elements protected. Copyright protects the expression of an idea but not the idea itself. As such, it is important to determine where to draw the line between expression and idea.

The court agreed with the opinion in Baker v. Selden which stated that things that "must necessarily be used as incident to" the idea are not subject to copyright protection. [3] This opinion, however, gave no advice on how to separate the idea from the expression.

Facing a similar issue, Whelan v. Jaslow attempted to delineate the differences between idea and expression by saying that the function of the work is the idea and everything else not necessary to the function is the expression of the idea. [4] The court agreed with district court's refusal to follow the Whelan logic because the test is "conceptually overbroad." [1] A program can have multiple functions and thus many ideas.

As an alternate metric, the court presented a three-step test to determine substantial similarity, abstraction-filtration-comparison. This process is based on other previously established copyright principles of merger, scenes a faire, and the public domain. [1] In this test, the court must first determine the allegedly infringed program's constituent structural parts. Then, the parts are filtered to extract any non-protected elements. Non-protected elements include: elements made for efficiency (i.e. elements with a limited number of ways it can be expressed and thus incidental to the idea), elements dictated by external factors (i.e. standard techniques), and design elements taken from the public domain. Any of these non-protected elements are thrown out and the remaining elements are compared with the allegedly infringing program's elements to determine substantial similarity. Given the rapidly developing nature of technology, the court recommended a modification of the three-step test where appropriate. They also recommended that the allegedly infringed program be put through the three-step test and then compared to the allegedly infringing program, instead of the reverse as the district court originally chose.

Decision

The court reexamined the district court's process and found no significant fault with it. After taking out all functional elements and elements from the public domain, only a few lists and macros in OSCAR 3.5 were similar to ADAPTER, and their impact on the program was not large enough to declare copyright infringement. The court found that the similarity in services required by the operating system was due to the nature of the operating system, thus it was not protected by copyright. Similarly, the flow charts were found to be an element dictated by external factors flowing from the nature of the work, also unprotectable by copyright law. In light of this analysis, the court upheld the district courts finding that there was no copyright infringement by OSCAR 3.5.

With respect to code, the district court observed that after the rewrite of OSCAR 3.4 to OSCAR 3.5, “there remained virtually no lines of code that were identical to ADAPTER.” Id. at 561. Accordingly, the court found that the code “present[ed] no similarity at all.” Id. at 562. [1]

CA's second argument for the appeal concerned trade secret misappropriation. The district court determined that the allegation of misappropriation was based on Altai's use of the infringing material, therefore the copyright infringement claim preempted the misappropriation claim according to 17 U.S.C. § 301. [5] Upon revisiting the matter of trade secret misappropriation, the court found that with Arney's potential breach of confidentiality and Altai's potential liability for improper trade secret acquisition, these extra elements differentiate the trade secret misappropriation claim from the copyright infringement claim. The court vacated the district court's preemption ruling and remanded the case back to the district court.

Reactions

The abstraction-filtration-comparison test has been quickly adopted by the courts. In fact, every court since 1992[-2006] has chosen to use the 3-step filtration test over the Whelan test. [6]

Some, however, have criticized the approach and claim that it overly narrows the scope of copyright protection. CA and other large computer companies argue that without broader protection, the test will stifle development and disincentivize programmers from actively designing and improving programs. [1]

See also

Related Research Articles

<i>MAI Systems Corp. v. Peak Computer, Inc.</i>

MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, was a case heard by the United States Court of Appeals for the Ninth Circuit which addressed the issue of whether the loading of software programs into random-access memory (RAM) by a computer repair technician during maintenance constituted an unauthorized software copy and therefore a copyright violation. The court held that it did, although the United States Congress subsequently enacted an amendment to 17 U.S.C. § 117 to specifically overrule this holding in the circumstances of computer repair.

Software copyright is the application of copyright law to machine-readable software. While many of the legal principles and policy debates concerning software copyright have close parallels in other domains of copyright law, there are a number of distinctive issues that arise with software. This article primarily focuses on topics particular to software.

The SCO–Linux disputes were a series of legal and public disputes between the software company SCO Group (SCO) and various Linux vendors and users. The SCO Group alleged that its license agreements with IBM meant that source code IBM wrote and donated to be incorporated into Linux was added in violation of SCO's contractual rights. Members of the Linux community disagreed with SCO's claims; IBM, Novell and Red Hat filed claims against SCO.

Scène à faire is a scene in a book or film which is almost obligatory for a book or film in that genre. In the U.S. it also refers to a principle in copyright law in which certain elements of a creative work are held to be not protected when they are mandated by or customary to the genre.

Analytic dissection is a concept in U.S. copyright law analysis of computer software. Analytic dissection is a tool for determining whether a work accused of copyright infringement is substantially similar to a copyright-protected work.

Substantial similarity, in US copyright law, is the standard used to determine whether a defendant has infringed the reproduction right of a copyright. The standard arises out of the recognition that the exclusive right to make copies of a work would be meaningless if copyright infringement were limited to making only exact and complete reproductions of a work. Many courts also use "substantial similarity" in place of "probative" or "striking similarity" to describe the level of similarity necessary to prove that copying has occurred. A number of tests have been devised by courts to determine substantial similarity. They may rely on expert or lay observation or both and may subjectively judge the feel of a work or critically analyze its elements.

<i>Sega v. Accolade</i> 1992 American court case

Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, is a case in which the United States Court of Appeals for the Ninth Circuit applied American intellectual property law to the reverse engineering of computer software. Stemming from the publishing of several Sega Genesis games by video game publisher Accolade, which had disassembled Genesis software in order to publish games without being licensed by Sega, the case involved several overlapping issues, including the scope of copyright, permissible uses for trademarks, and the scope of the fair use doctrine for computer code.

The Abstraction-Filtration-Comparison test (AFC) is a method of identifying substantial similarity for the purposes of applying copyright law. In particular, the AFC test is used to determine whether non-literal elements of a computer program have been copied by comparing the protectable elements of two programs. The AFC test was developed by the United States Court of Appeals for the Second Circuit in 1992 in its opinion for Computer Associates Int. Inc. v. Altai Inc. It has been widely adopted by United States courts and recognized by courts outside the United States as well.

<i>Comprehensive Technologies International, Inc. v. Software Artisans, Inc.</i>

Comprehensive Technologies International, Inc. v. Software Artisans, Inc., 3 F.3d 730 was a case in which the U.S. Court of Appeals for the Fourth Circuit discussed legal tests for software copyright infringement, and ruled that trade secret misappropriation requires more than circumstantial evidence. The case also ruled on what terms may be reasonable and enforceable in non-compete agreements.

<i>Facebook, Inc. v. Power Ventures, Inc.</i> Lawsuit brought by Facebook in the United States District Court for the Northern District of California

Facebook, Inc. v. Power Ventures, Inc. is a lawsuit brought by Facebook in the United States District Court for the Northern District of California alleging that Power Ventures Inc., a third-party platform, collected user information from Facebook and displayed it on their own website. Facebook claimed violations of the CAN-SPAM Act, the Computer Fraud and Abuse Act ("CFAA"), and the California Comprehensive Computer Data Access and Fraud Act. According to Facebook, Power Ventures Inc. made copies of Facebook's website during the process of extracting user information. Facebook argued that this process causes both direct and indirect copyright infringement. In addition, Facebook alleged this process constitutes a violation of the Digital Millennium Copyright Act ("DMCA"). Finally, Facebook also asserted claims of both state and federal trademark infringement, as well as a claim under California's Unfair Competition Law ("UCL").

<i>Asset Marketing Systems, Inc. v. Gagnon</i> US appeals court case

Asset Marketing Systems, Inc. v. Gagnon was a case heard by the United States Court of Appeals for the Ninth Circuit regarding implied licenses to use, modify and retain the source code of computer programs, and the enforceability of non-competition agreements. The court affirmed the ruling from the United States District Court for the Southern District of California that Kevin Gagnon, a software contractor doing business as "Mr. Computer", had implicitly granted Asset Marketing Systems (AMS) an unlimited license to use, modify and retain the source code of the programs that Gagnon created. The case is notable because the Court held that an implied software license is granted when the licensee requests the creation of a work, the licensor creates and delivers the work, and the licensor intends the licensee to copy and distribute the work.

The SAS Institute, creators of the SAS System filed a lawsuit against World Programming Limited, creators of World Programming System (WPS) in November 2009. The dispute was whether World Programming had infringed copyrights on SAS Institute Products, and Manuals and whether World Programming used SAS Learning Edition to reverse engineer SAS system in violation with its term of usage.

Structure, sequence and organization (SSO) is a term used in the United States to define a basis for comparing one software work to another in order to determine if copying has occurred that infringes on copyright, even when the second work is not a literal copy of the first. The term was introduced in the case of Whelan v. Jaslow in 1986. The method of comparing the SSO of two software products has since evolved in attempts to avoid the extremes of over-protection and under-protection, both of which are considered to discourage innovation. More recently, the concept has been used in Oracle America, Inc. v. Google, Inc.

<i>Whelan v. Jaslow</i>

Whelan Assocs., Inc. v. Jaslow Dental Laboratory, Inc. was a landmark case in defining principles that applied to copyright of computer software in the United States, extending beyond literal copying of the text to copying the more abstract structure, sequence and organization. The decision initiated a six-year period of excessive copyright protection, suppressing innovation.

<i>Silvaco Data Systems v. Intel Corp.</i>

Silvaco Data Systems v. Intel Corp was a trade secrets case heard before the California Court of Appeal for the Sixth District. Silvaco sued Intel for misappropriation of trade secrets because Intel used software produced by a third-party that had misappropriated Silvaco's trade secrets. The appeals court affirmed the decision of the trial court to grant summary judgment in favor of Intel, finding that merely using infringing software does not constitute a trade secret infringement in itself.

Atari Games Corp. v. Nintendo of America Inc., 975 F.2d 832, is a United States Court of Appeals for the Federal Circuit case, in which the court held that Atari Games engaged in copyright infringement by copying Nintendo's lock-out system, the 10NES. The 10NES was designed to prevent Nintendo's video game console, the Nintendo Entertainment System (NES), from accepting unauthorized game cartridges. Atari, after unsuccessful attempts to reverse engineer the lock-out system, obtained an unauthorized copy of the source code from the Copyright Office and used it to create its 10NES replica, the Rabbit. The case involved copyright infringement claims by Nintendo and a defense based on fair use and copyright misuse by Atari.

<i>Brown Bag Software v. Symantec Corp.</i>

Brown Bag Software v. Symantec Corp. is an intellectual property law case in which the United States Court of Appeals for the Ninth Circuit affirmed-in-part and vacated-in-part the previous ruling of the United States District Court for the Northern District of California. Brown Bag Software sued Symantec Corporation and John L. Friend, an individual software developer for Softworks Development, for copyright infringement and several state law claims regarding the similarity of Symantec Corporation's and Brown Bag Software's computer outlining programs.

The protection of intellectual property (IP) of video games through copyright, patents, and trademarks, shares similar issues with the copyrightability of software as a relatively new area of IP law. The video game industry itself is built on the nature of reusing game concepts from prior games to create new gameplay styles but bounded by illegally direct cloning of existing games, and has made defining intellectual property protections difficult since it is not a fixed medium.

Richard Stallman founded the GNU Project in 1983 so that people could use computers using only free software, allowing further modification of programs initially written by others. He established a non-profit organization, the Free Software Foundation, in 1985, to more formally organize the project. Stallman also invented copyleft, a legal mechanism to maintain the free status of a work on modified versions and implemented this through the GNU General Public License (GPL). This license has since been revised twice, known as the GPL Version 2 and Version 3. The courts, mainly in the United States, have since grappled with the copyright, contractual and patent issues resulting from questions of legal validity of the GPL and other such off-shooting open source licenses.

<i>Tetris Holding, LLC v. Xio Interactive, Inc.</i> 2012 legal decision

Tetris Holding, LLC v. Xio Interactive, Inc., 863 F.Supp.2d 394, is a 2012 American legal case related to copyright of video games, confirming that a game's look and feel can be protected under copyright law. Tetris Holding is a company that holds the copyright to the original Tetris game from 1984, and licenses those rights to game developers. Xio Interactive is a game developer that released Mino in 2009, a mobile game based on the gameplay of Tetris. Mino was downloaded millions of times, and Tetris Holding filed a DMCA notice and eventually a lawsuit against Xio for copyright infringement.

References

  1. 1 2 3 4 5 6 7 8 Computer Associates International, Inc. v. Altai, Inc. , 982 F.2d 693, (2d Cir. 1992).
  2. Apple Computer, Inc. v. Franklin Computer Corp. Archived 2010-05-15 at the Wayback Machine , 714 F.2d 1240 (3d Cir. 1983).
  3. Baker v. Selden Archived 2009-03-23 at the Wayback Machine , 101 U.S. 99 (1879).
  4. Whelan Associates Inc. v. Jaslow Dental Laboratory, Inc. Archived 2012-05-31 at the Wayback Machine , 797 F.2d 1222 (3d Cir. 1986).
  5. 17 U.S.C.   § 301, Preemption with respect to other laws
  6. Mark A. Lemley, Peter S. Menell, Robert P. Merges, and Pamela Samuelson, Software and Internet Law (3d ed. 2006). ISBN   978-0-7355-5864-9

Further reading