Lotus Development Corporation v. Borland International: The United

advertisement
1349
LOTUS DEVELOPMENT CORPORATION v.
BORLAND INTERNATIONAL:
THE UNITED STATES COURT OF APPEALS FOR
THE FIRST CIRCUIT TAKES A STEP BACKWARD
FOR THE COPYRIGHT PROTECTION OF
COMPUTER PROGRAMS
Since Congress has elected to grant certain exclusive rights to
the owner of a copyright in a protected work, it is virtually
axiomatic that the public interest can only be served by upholding copyright protections and, correspondingly, preventing the misappropriation of the skills, creative energies, and
resources which are invested in the protected work.'
INTRODUCTION
Article I, section 8 of the United States Constitution gives Congress the power to provide copyright protection for the works of inventors and authors. 2 The economic philosophy underlying this provision
is that the public welfare will be promoted best by encouraging individual effort.3 Thus, copyright protection extends to the expression of
an idea and not to the idea itself.4 Copyright law seeks to balance the
advancement of individual incentive through safeguarding one's work
with a limited scope of protection, so that the stagnation of monopolies
may be avoided. 5
Typically, courts faced with a copyright infringement action involving a computer program will initially identify the elements of the
copyrighted work that are the proper subject matter for copyright protection. 6 Next, courts will determine whether these elements are sub1. Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1255 (3d Cir.
1983) (quoting Klitzner Indus., Inc. v. H.K James & Co., 535 F. Supp. 1249, 1259-60
(E.D. Pa. 1982)).
2. U.S. CoNsT. art. I, § 8, cl. 8. This clause grants Congress the power "to promote
the Progress of Science and useful Arts, by securing for limited Times to Authors and
Inventors the exclusive Right to their respective Writings and Discoveries." Id.
3. Computer Assocs. Intl, Inc. v. Altai, Inc., 982 F.2d 693, 696 (2nd Cir. 1992).
4. Ashton-Tate Corp. v. Ross, 728 F. Supp. 597, 601 (N.D. Cal. 1989), affd, 916
F.2d 516 (9th Cir. 1990).
5. Computer Assocs. Int'l, Inc., 982 F.2d at 696.
6. Autoskill, Inc. v. National Educ. Support Sys., Inc., 994 F.2d 1476, 1497 (10th
Cir. 1993); MiTek Holdings, Inc. v. Arce Eng'g Co., Inc., 864 F. Supp. 1568, 1575 (S.D.
Fla. 1994), affd 89 F.3d 1548 (11th Cir. 1996); Digital Communications Assocs., Inc. v.
Softklone Distrib. Corp., 659 F. Supp. 449, 464 (N.D. Ga. 1987).
1350
CREIGHTON LAW REVIEW
[Vol. 30
stantially similar to portions of the allegedly infringing work. 7 When
faced with the protectable elements of two computer programs that
are substantially similar, courts have determined that copyright infringement has occurred.8
In Lotus Development Corporationv. Borland International,Inc. 9
the United States Court of Appeals for the First Circuit held that the
menu command hierarchy of the Lotus 1-2-3 spreadsheet computer
program ("Lotus 1-2-3"), a part of the user interface, could not be protected by copyright. 10 The First Circuit found that the menu command hierarchy was a "method of operation" for which copyright
protection is not available.1 1 As a result, the court ruled that no copyright infringement occurred when Borland International, Inc. placed
"'a virtually identical copy" of the Lotus 1-2-3 menu tree in its Quat12
tro and Quattro Pro spreadsheet programs.
Initially, this Note will address the First Circuit's conclusion that
the Lotus 1-2-3 menu command hierarchy is a "method of operation"
and not entitled to copyright protection. 13 This Note will then briefly
discuss computers, computer programs, and copyright law.' 4 Next,
this Note will review other cases involving the copyright protection
afforded computer programs and discuss the elements of a copyright
infringement claim, noting the tests currently applied by the courts to
7. Autoskill, Inc., 994 F.2d at 1496-98; MiTek Holdings, Inc., 864 F. Supp. at
1579-80; Digital Communications Assocs., Inc., 659 F. Supp. at 464-65.
8. DigitalCommunicationsAssocs., Inc., 659 F. Supp. at 465; Whelan Assocs., Inc.
v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1248 (3d Cir. 1986); E.F. Johnson Co. v.
Uniden Corp. of Am., 623 F. Supp 1485, 1493 (D. Minn. 1985). For a complete discussion of the doctrines that may preclude copyright protection despite a finding of substantial similarity, see infra notes 75-79 and accompanying text.
9. 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision).
10. Lotus Dev. Corp. v. Borland Intl, Inc., 49 F.3d 807, 813, 819 (1st Cir. 1995),
affd mem., 116 S. Ct. 804 (1996) (4-4 decision). A user interface:
involves a system of menus, each menu consisting of less than a dozen commands, arranged hierarchically, forming a tree in which the main menu is the
root/trunk of the tree and submenus branch off from higher menus, each submenu being linked to a higher menu by operation of a command, so that all the
specific spreadsheet operations available in Lotus 1-2-3 are accessible through
the paths of the menu command hierarchy.
Lotus Dev. Corp. v. Borland Intl, Inc., 799 F. Supp. 203, 216 (D. Mass 1992), rev'd, 49
F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note:
hereinafter this case will be referred to as Borland II.
Computer programs are subject to copyright protection as literary works. Lotus Dev.
Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 49 (D. Mass. 1990) (citing 17 U.S.C.
§ 101 (1988)).
11. Lotus Dev. Corp., 49 F.3d at 815. Title 17 of the United States Code section
102(b) prohibits the copyright protection of methods of operation. 17 U.S.C. § 102(b)
(1994). See infra notes 30, 39-43, 94-98 and accompanying text.
12. Lotus Dev. Corp., 49 F.3d at 810, 819.
13. See infra notes 17-43 and accompanying text.
14. See infra notes 44-98 and accompanying text.
1997]
COPYRIGHT PROTECTION
1351
resolve these claims. 15 Finally, this Note will then demonstrate that a
computer program's user interface, which includes16 the menu command hierarchy, is properly protected by copyright.
FACTS AND HOLDING
The idea of an electronic spreadsheet first took form in the late
1970's when Daniel Bricklin, a student at Harvard's Business School,
created VisiCalc, the first commercially available electronic spreadsheet.1 7 Mitchell Kapor and Jonathan Sachs, the original authors of
the Lotus 1-2-3 spreadsheet computer program ("Lotus 1-2-3"), built
upon Bricklin's idea and developed Lotus 1-2-3, which could operate
on IBM personal computers. 18 Developed in the early 1980s, Lotus 12-3 was recognized as a leader in the field of spreadsheet programs,
which allow users to execute accounting functions. 19 Lotus 1-2-3 is
controlled through a variety of menu commands that are selected
on the screen or typing the first
either by highlighting the command
20
letter of the desired command.
In 1987, Borland International ("Borland") released its first Quattro spreadsheet computer program ("Quattro"). 21 Included in the
Quattro and subsequent Quattro Pro version 1.0 programs was "a virtually identical copy of the entire [Lotus] 1-2-3 menu tree," one portion
of the Lotus 1-2-3 program in which Lotus Development Corporation
("Lotus") possessed a valid copyright. 22 While the Borland programs
included their own commands and menu tree, the Lotus 1-2-3 menu
tree was included so that users of that program would not have to
23
learn new commands when switching to Quattro or Quattro Pro.
Thus, by incorporating the Lotus 1-2-3 menu command hierarchy into
the Quattro programs, Borland could offer users of its electronic
spreadsheet programs a choice of communicating with the program
15. See infra notes 107-356 and accompanying text.
16. See infra notes 357-494 and accompanying text.
17. Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 65 (D. Mass.
1990).
18. Paperback Software Int'l, 740 F. Supp. at 66.
19. Lotus Dev. Corp. v. Borland Intl, Inc., 49 F.3d 807, 809 (1st Cir. 1995), affd
mem., 116 S. Ct. 804 (1996) (4-4 decision); Dale M. Cendali and Martin Glenn, In Lotus,
the 1st CircuitDeparted from Precedent,Narrowing Protection for Developed Software
and Giving Crafty Litigators a Blank Disk on Which to Write 17 NAT'L L.J. B7 (May 15,
1995).
20. Lotus Dev. Corp., 49 F.3d at 809.
21. Id. at 810.
22. Id. at 810, 813. Borland modified the Lotus 1-2-3 menu tree by inserting "some
new menu commands." Lotus Dev. Corp. v. Borland Int'l, Inc., 831 F. Supp. 202, 212 (D.
Mass. 1993), rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4
decision). Author's note: hereinafter this case will be referred to as Borland III.
23. Lotus Dev. Corp., 49 F.3d at 810.
1352
CREIGHTON LAW REVIEW
[Vol. 30
through commands designed by Borland or the Lotus 1-2-3 menu
24
tree.
As a result, Lotus fied a copyright infringement action against
Borland in the United States District Court for the District of Massachusetts. 25 Lotus maintained that it possessed a copyright in Lotus 12-3 which was infringed upon by Borland. 26 Borland countered Lotus'
claim, stating that its products are not the same as Lotus 1-2-3, or
alternatively, that the portions of Lotus 1-2-3 at issue were not subject
to copyright protection because they are a "system, process, procedure,
or method" for which 17 U.S.C. § 102(b) ("section 102(b)") prohibits
copyright protection. 2 7 Borland contended that any portion of its
Quattro and Quattro Pro programs which were similar to Lotus 1-2-3
concerned only the way in which the program functioned and did not
constitute copyrightable expression. 28 The court noted that Borland
"appear[ed] to be asserting more - that if some part of a computer program is a 'system, process, procedure, or method,' 17 U.S.C. § 102(b),
no copyright of any aspect of that part of the program is possible." 2 9
Section 102(b) effectively prohibits the copyright of an "idea, procedure, process, system, [or] method of operation .
. .,"
thus Borland
maintained that the Lotus 1-2-3 program was a method of operation
and, pursuant to section 102(b), outside the protection of copyright
law. 30 The district court, however, found that "the Lotus menu struc-
ture, organization, and first letters of the command names [were] not
within the definition of the 'idea,' 'system,' 'process,' 'procedure,' or
24.
25.
Id.
Lotus Dev. Corp. v. Borland Intl, Inc., 788 F. Supp. 78, 80 (D. Mass. 1992),
rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note: hereinafter this case will be referred to as Borland I. Only days before Lotus filed suit, Borland commenced a declaratory judgment action in United States
District Court for the Northern District of California in order to obtain a ruling that
Borland had not infringed upon the Lotus copyright. Lotus Dev. Corp, 49 F.3d at 810.
The suit filed in California was dismissed in favor of the litigation commenced in Massachusetts. Id.
This, however, was not the first occasion in which Lotus had filed a copyright infringement action. See Paperback Software Int'l, 740 F. Supp. at 42; infra notes 201-17
and accompanying text.
26. Borland I, 788 F. Supp. at 80.
27. Id. at 80, 90-91. In 1990, Lotus obtained relief in the United States District
Court for the District of Massachusetts for infringement of the same copyright by Paperback Software International. Id. at 80. Borland also maintained that its products
were not the same as those created by Paperback Software International. Id.
28. Borland 1, 788 F. Supp. at 85-86.
29. Id. at 91.
30. 17 U.S.C. § 102(b) (1994); Borland I, 788 F. Supp. at 90-91. Title 17 of the
United States Code section 102(b) provides in pertinent part that "in no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the
form in which it is described, explained, illustrated, or embodied in such work." 17
U.S.C. § 102(b).
1997]
COPYRIGHT PROTECTION
1353
'method' of the Lotus 1-2-3 program and constitute[d] part of the protectable expression found in the program."3 1 The court stated that
Borland's argument was "fundamentally inconsistent" with the bal32
ance struck in the Copyright Act.
The district court determined that, because there were several
different ways to produce a user interface, the Lotus 1-2-3 user interface was an expression, and thus copyrightable. 33 Specifically, the
court stated that functional aspects of the program, such as a print
command, came within the idea of the program while copyrightability
was dependent upon the author's expression. 34 The court indicated
that Borland failed to demonstrate that the menu tree was a functional aspect of the program. 35 Thus, the district court determined
that Borland's incorporation of the Lotus 1-2-3 menu command hierarchy in its own program constituted infringement. 36 Due to the infringement, the district court issued a permanent injunction
prohibiting Borland from further distribution of the Quattro or Quattro Pro computer programs which contained "a copy of the Lotus 1-2-3
37
menu commands and/or menu structure, in any form."
31. Lotus Dev. Corp. v. Borland Intl, Inc., 831 F. Supp. 223, 233 (D. Mass. 1993),
rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note: hereinafter this case will be referred to as Borland IV.
32. Borland I, 788 F. Supp. at 92. Copyright law seeks to balance the "protection
[afforded] to authors as an incentive to create" with "limit[ing] the extent of that protection so as to avoid the effects of monopolistic stagnation." Computer Assocs. Int'l, Inc. v.
Altai, Inc., 982 F.2d 693, 696 (2nd Cir. 1992).
33. Lotus Dev. Corp. v. Borland Int'l, Inc., 799 F. Supp. 203, 217 (D. Mass. 1992),
rev'd, 49 F.3d 807 (1st Cir. 1995), afld nem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note: hereinafter this case will be referred to as Borland I. See also Lotus Dev.
Corp. v. Borland Intl, Inc., 831 F. Supp. 202, 213 (D. Mass. 1992) (stating that Lotus 12-3 menu tree copyrightable because it is one of a variety of potential expressions),
rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note: hereinafter this case will be referred to as Borland III.
34. Borland 11, 799 F. Supp. at 217.
35. Borland III, 831 F. Supp. at 213.
36. Borland IV, 799 F. Supp. at 221. The trial court also noted that Lotus alleged
copying of the "'menu commands,' 'menu structure,' 'long prompts,' and 'keystroke sequences.'" Borland 11, 799 F. Supp. at 205. The district court defined "menu command"
as being an abbreviated description of a direction within the menu a user may invoke to
cause the program to perform a function; the "menu structure" as relating to the arrangement of menu commands and menus; the "long prompts" as being a displayed "description of a 'highlighted' menu command;" and a "keystroke sequence" as a series of
keystroke entries which can be entered by a user. Id. at 206. Borland admitted to copying all of these items, save for the long prompts. Id. at 209. The court determined that
the issue of whether the long prompts were copied was a jury question. Id. As for the
keystroke sequences, the district court found this to be functional and not subject to
copyright protection. Id. at 207 (citing 17 U.S.C. § 102(b) (1988)). The court addressed
the copying of the menu commands and structure, collectively referring to these items
as the "menu tree." Borland III, 831 F. Supp. at 211-12. The trial court held that the
menu tree was copyrightable because the arrangement of operations within the tree
contained expression. Id. at 211.
37. Borland IV, 831 F. Supp at 245-46.
1354
CREIGHTON LAW REVIEW
[Vol. 30
The only issue on appeal to the United States Court of Appeal for
the First Circuit was whether the menu command hierarchy present
in Lotus 1-2-3 came within the purview of copyright protection. 38 The
First Circuit held that the menu command hierarchy could not be protected by copyright because, the court noted, copyright protection does
not extend to a "method of operation."3 9 The court determined that
"method of operation" refers to "the means by which a person operates
"40 The Lotus 1-2-3 menu command hierarchy, the
something ...
was
merely the manner by which the user tells the comcourt noted,
41
puter what to do. Because the court determined that the Lotus 1-2-3
menu command hierarchy was a method of operation and thus not
copyrightable, the court did not address whether Borland had copied
protectable expression found within the Lotus 1-2-3 spreadsheet program. 42 As the First Circuit stated:
Concluding, as we do, that users operate Lotus 1-2-3 by using
the Lotus menu command hierarchy, and that the entire Lotus menu command hierarchy is essential to operating Lotus
1-2-3, we do not inquire further whether that method of operation could have been designed differently. The "expressive"
choices of what to name the command terms and how to arrange them do not magically change the uncopyrightable
menu command hierarchy into copyrightable subject
43
matter.
BACKGROUND
THE NATURE OF COMPUTERS AND COMPUTER PROGRAMS
Modern computers consist of hardware and software which, when
combined, allow the computer to process data. 44 The hardware consists of a central processing unit, keyboard, memory, disk drives, and
other mechanisms for conveying data to and from the computer's
memory. 45 Computer software, on the other hand, can be divided into
38. Lotus Dev. Corp., 49 F,3d at 812. Borland conceded the validity of Lotus' copyright in Lotus 1-2-3 and to copying the menu command hierarchy. Id. at 813.
39. Lotus Dev. Corp., 49 F.3d at 815. The First Circuit stated "the Lotus menu
command hierarchy is an uncopyrightable 'method of operation'" as that term is used in
17 U.S.C. § 102(b). Id. For the full text of section 102(b), see supra note 30.
40. Lotus Dev. Corp., 49 F.3d at 815.
41. Id. The First Circuit compared the Lotus menu command hierarchy to the buttons of a VCR. Id. at 817.
42. Lotus Dev. Corp., 49 F.3d at 816.
43. Id.
44. Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs,41 STAN. L. REV. 1045, 1050-51 (1989).
45. Menell, 41 STAN. L. REV. at 1051.
1997]
COPYRIGHT PROTECTION
1355
two types: operating systems and application programs. 4 6 Operating
systems "manage the internal functions of the computer or facilitate
the use of application programs."4 7 In contrast, application programs,
such as bookkeeping and financial analysis programs, execute specific
48
data processing assignments for the computer operator.
A computer program is assembled in several steps which create a
group of commands for the computer. 49 First, a programmer will
identify the particular obstacle which the program is to resolve. 50
Next, an outline of the proposed program may be created, often in the
form of a flowchart. 5 1 The flowchart will further break down the proposed program into "'subroutines"' or "'modules'" whose arrangement
determines the program's efficiency. 52 Once a detailed design has
been achieved, the third process, known as coding, begins. 53 In coding, the programmer will draft the program in "source code," which
may be in one of several programming languages. 54 The "source code"
is then transformed into "object code" by a "compiler," a computer program whose specific purpose it is to ensure that this conversion takes
place. 5 5 The "object code" is a binary code consisting of a conglomera56
tion of "O"s and "I"s which the computer uses to perform functions.
Source and object code are known as the "literal elements" of a
computer program, while the program's structure, organization, and
user interface are "nonliteral elements." 57 Courts have held that the
literal elements of a computer program may be copyrighted, as can the
nonliteral elements, but that a copyright in the nonliteral elements
58
may only be obtained if they contain original expression.
46. Apple Computer, Inc. v. Franklin Computer Corp., 714 F. 2d 1240, 1243 (3d
Cir. 1983).
47. Apple Computer, Inc., 714 F.2d at 1243.
48. Id.
49. Whelan Assocs., Inc. v. Jaslow Dental Lab, Inc., 797 F.2d 1222, 1229 (3d Cir.
1986); Steven R. Englund, Note, Idea, Process, or Protected Expression?: Determining
the Scope of Copyright Protection of the Structure of Computer Programs, 88 MIcH. L.
REV. 866, 870-71 (1990) (explaining the steps necessary to create a computer program).
50. Whelan Assocs., Inc., 797 F.2d at 1229.
51. Id. at 1230.
52. Id.
53. Id.
54. Id. Examples of different programming languages are BASIC, EDL, FORTRAN, and COBOL. Id. For those who have been properly trained, a programming
language is easily comprehensible. SAS Inst., Inc. v. S & H Computer Sys., Inc., 605 F.
Supp. 816, 818 (M.D. Tenn. 1985).
55. SAS Inst., Inc., 605 F. Supp. at 818.
56. Whelan Assocs., Inc., 797 F.2d at 1230-31. See also id. at 1231 n.21 (addressing
additional aspects of completing a computer program).
57. MiTek Holdings, Inc. v. Arce Eng'g Co., Inc., 864 F. Supp. 1568, 1576-77 (S.D.
Fla. 1994), aftd, 89 F.3d 1548 (11th Cir. 1996).
58. Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335, 1341
(5th Cir. 1994) (holding that most courts have found that copyright protection extends
1356
CREIGHTON LAW REVIEW
[Vol. 30
COPYRIGHT LAW
Article I, section 8 of the United States Constitution vests Congress with the power to provide copyright protection for the works of
inventors and authors. 5 9 Congress passed the first legislation pursuant to this constitutional grant in 1790.60 Numerous revisions and
amendments followed, and then in 1976, influenced largely by chang61
ing technology, Congress completely revised the law of copyrights.
Four years later, in 1980, Congress amended the Copyright Act of
1976 (the "Copyright Act") to provide the owners of copyrights in computer programs protection akin to that received by the holders of copy62
rights in literary works.
The 1980 amendments came in response to the recommendations
of the National Commission on New Technological Uses of Copyrighted Works ("CONTU"), an organization created in 1974 to formulate policy concerning copyrights and computers. 6 3 CONTU
recommended that the then-existing Copyright Act be amended to: (1)
allow computer programs which reflect original expression to be copyrighted, (2) ensure that copyright law applies to all computer uses,
and (3) allow for the rightful copying of computer programs. 64 Accordingly, federal copyright law now defines a "computer program" as a
"set of statements or instructions to be used directly or indirectly in a
65
computer in order to bring about a certain result."
Copyrights function to protect the expression of ideas, not the
ideas themselves. 66 In order for an item to be protected by copyright
it must be: (1) an original work of authorship that is (2) manifested in
to literal and nonliteral elements), opinion supp. by 46 F.3d 408 (5th Cir. 1995); Johnson
Controls, Inc. v. Phoenix Control Sys., Inc., 886 F.2d 1173, 1175, 1177 (9th Cir. 1989)
(finding the literal components of a computer program are protected by copyright as are
the nonliteral components when they contain expression); Whelan Assocs., Inc., 797
F.2d at 1248 (concluding that copyright protection extends beyond a program's literal
code to its structure, sequence, and organization).
59. U.S. CONST. art. I, § 8, cl. 8.
60. M. Kramer Mfg. Co., Inc. v. Andrews, 783 F.2d 421, 432 (4th Cir. 1986).
61. M. Kramer Mfg. Co., Inc., 783 F.2d at 432.
62. Englund, 88 MICH. L. REV. at 873-74.
63. Id. at 873.
64. M.Kramer Mfg. Co., Inc., 793 F.2d at 432 n.8; Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 HARv. L. REv. 978, 979 (1993).
65.
17 U.S.C. § 101 (1994).
66. Computer Assocs. Intl, Inc. v. Altai, Inc., 982 F.2d 693, 703 (2nd Cir. 1992)
(emphasis added). See also Q-Co Indus., Inc. v. Hoffman, 625 F. Supp. 608, 616
(S.D.N.Y. 1985) (holding that a claim of copyright infringement was not established because only an idea was copied); Apple Computer, Inc. v. Microsoft Corp., 799 F. Supp.
1006, 1026, 1047 (N.D. Cal. 1992) (finding that common aspects between Apple and
Microsoft programs were "ideas," therefore there was no copyright infringement), clarified by 1993 WL 207982 (N.D. Cal. 1992), affd, 35 F.3d 1435 (9th Cir. 1994), cert. denied, 115 S.Ct. 1176 (1995).
1997]
COPYRIGHT PROTECTION
1357
a "tangible medium of expression" and (3) capable of communication
either directly or with the assistance of a machine. 6 7 The "two fundaFor a case maintaining that the level of sophistication found in a computer program
is an indicator of expression which may be protected by copyright, see Johnson Controls,
Inc. v. Phoenix Control Sys., Inc., 886 F.2d 1173, 1176 (9th Cir. 1989). In Johnson Controls, the United States Court of Appeals for the Ninth Circuit held that the nonliteral
portions of a computer program "may be protected by copyright where they constitute
expression, rather than ideas." Johnson Controls, 886 F.2d at 1177. In this case, Johnson Controls, Inc. ("Johnson") alleged that Phoenix Control Systems ("Phoenix") infringed on its copyright in a computer program to control wastewater treatment plants.
Id. at 1174. Johnson filed suit in the United States District Court for the District of
Arizona and obtained a preliminary injunction against Phoenix precluding it from copying, distributing, publishing, or representing to others that it had the ability to use
Johnson's computer program. Id. The district court found the "structure, sequence, and
organization" of Johnson's program was expression entitled to copyright protection. Id.
at 1175. Phoenix appealed the district court's decision to the United States Court of
Appeals for the Ninth Circuit. Id. at 1174.
On appeal, the Ninth Circuit discussed the elements of a copyright infringement
action. Id. at 1175. The court identified these elements as being ownership of a copyright and copying, the latter of which can be satisfied by showing "access to the copyrighted work, and substantial similarity between the copyrighted work and the
infringer's work." Id. at 1175-76 (citations omitted). First, the court noted that Johnson's registration of its copyright was prima facie evidence of originality creating a presumption Phoenix was unable to rebut. Id. at 1175. Next, the court noted that Phoenix
had access to the Johnson program since many of Phoenix's employees had formerly
worked for Johnson and worked on several versions of Johnson's program. Id. at 1176.
Then, the Ninth Circuit discussed the issue of substantial similarity, and deferred to
the district court's determination that, in fact, the two programs appeared to be substantially similar. Id. The court stated that examination of these similarities was such
that a reasonable person would find the infringing program developed by Phoenix contained the "'total concept and feel'" of Johnson's computer program. Id.
Finally, the Ninth Circuit addressed the degree of protection afforded non-literal
elements of a computer program. Id. at 1175. The court indicated that the non-literal
elements of a computer program include its "structure, sequence and organization and
user interface." Id. The protection afforded to such non-literal elements, the court
noted, turns on whether such an element is an expression of an idea, rather than being
an idea itself. Id. The court noted that Johnson's program was extremely sophisticated,
requiring its applications to be individually tailored for each user. Id. at 1175-76. The
court maintained that this sophistication indicated a leeway for expression within the
program in order for it to execute certain functions. Id. at 1176. Thus, the court found
Johnson's computer program to be expression and therefore protectable by copyright.
Id. at 1177.
67. 17 U.S.C. § 102(a) (1994). This statute states in pertinent part:
Copyright protection subsists, in accordance with this title, in original works of
authorship fixed in any tangible medium of expression, now known or later
developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Works of authorship include the following categories:
(1) literary works;
(2) musical works, including any accompanying words;
(3) dramatic works, including any accompanying music;
(4) pantomimes and choreographic works;
(5) pictorial, graphic, and sculptural works;
(6) motion pictures and other audiovisual works;
(7) sound recordings; and
(8) architectural works.
1358
CREIGHTON LAW REVIEW
[Vol. 30
mental criteria of copyright protection" are originality and fixation. 68
Originality, although not defined in the Copyright Act, has been interpreted by the United States Supreme Court as "mean[ing] only that
the work was independently created by the author... and... possesses at least some minimal degree of creativity." 6 9 Because "originality is not a stringent standard," authors must do little more than
create something that may be recognized as their own. 70 Fixation, on
the other hand, is defined in the Copyright Act. 7 1 A work is "fixed" if
it is permanent such that it can be "perceived, reproduced, or other72
wise communicated for a period of more than a transitory duration."
When a work possesses both originality and fixation it may be pro73
tected by copyright.
Fulfilling these criteria, however, does not guarantee that a party
will prevail in a copyright infringement action. 74 For example, even if
a work possesses originality and fixation, the "merger" doctrine will
deny copyright protection when the expression of an idea is indistinguishable, or cannot be separated, from the idea itself.7 5 Similarly,
the "scenes a faire" doctrine precludes copyright protection where material "is 'standard,' 'stock,' or 'common' to a particular topic, or that
'necessarily follows[s] from a common theme or setting."76 "Scenes a
faire" may also nullify copyright protection when elements of a work
68. M. KramerMfg. Co., Inc., 793 F.2d at 433 (quoting H.R. REP. No. 94-1476, at 51
(1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5664).
69. Id. at 433 (stating that the term "originality" is not defined in the Copyright
Act); Feist Publications, Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340, 345 (1991).
70. M. Kramer Mfg. Co., Inc., 783 F.2d at 438; FeistPublications,Inc., 499 U.S. at
362 (stating that "originality is not a stringent standard.").
71. M. Kramer Mfg. Co., Inc., 783 F.2d at 433.
72. 17 U.S.C. § 101 (1994). This statute maintains in pertinent part that:
A work is "fixed" in a tangible medium of expression when its embodiment in a
copy or phonorecord, by or under the authority of the author, is sufficiently
permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of
sounds, images, or both, that are being transmitted, is "fixed" for the purposes
of this title if a fixation of the work is being made simultaneously with its
transmission.
Id.
In M. Kramer Mfg. Co., Inc. the United States Court of Appeals for the Fourth Circuit
employed this statute to define "fixation." M. Kramer Mfg. Co., Inc., 783 F.2d at 433.
73. M. Kramer Mfg. Co., Inc., 783 F.2d at 433.
74. See infra notes 75-79 and accompanying text.
75. Telemarketing Resources v. Symantec Corp., No. C88-20352 RPA, 1989 WL
200350, at *3 (N.D. Cal. 1989), affd in part sub nom. Brown Bag Software v. Symantec
Corp., 960 F.2d 1465 (9th Cir. 1992). See Autoskill, Inc. v. National Educ. Support Sys.,
Inc., 994 F.2d 1476, 1494 (10th Cir. 1993) (holding that the merger doctrine prohibited
the copyright of a program's use of certain categories of vowels and consonants because
they are dictated by the idea of the program, which was to teach reading in English).
76. Autoskill, Inc., 994 F.2d at 1494 (citing 3 MELVILLE B. NneMER & DAVID NimMER, NIM4MER ON COPYRIGHT § 13.03[B][4] (1993)). In Autoskill, the scenes a faire doctrine prevented the "silent sentence" and "silent paragraph" components of a reading
1997]
COPYRIGHT PROTECTION
1359
"have been dictated by external factors," such as software compatibility requirements. 7 7 Furthermore, a copyright cannot be obtained for a
"useful article," defined in the Copyright Act as "an article having an
intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information." 78 Lastly, the fair use
doctrine allows a court to avoid a finding of copyright infringement if a
copyrighted work is being used for "criticism, comment, news reporting, teaching,... scholarship, or research . . .79
If these doctrines do not operate to preclude copyright protection,
then a copyright secures exclusive rights for the owner in his or her
work.8 0 A copyright extends during the author's lifetime, plus fifty
years or seventy-five to one hundred years depending upon whether
the copyrighted work is authored anonymously, through a pseudonym, or was a work for hire. 8 1 During this time, only the owner of the
copyright may reproduce the copyrighted work, distribute copies, dis82
play, or prepare derivative works based on the copyrighted material.
Anyone who violates these exclusive rights will be deemed an "infringer of the copyright," entitling the copyright owner to bring an infringement action seeking injunctive relief, as well as actual or
83
statutory damages.
program from being copyrighted because they were "'so standard to the field that they
cannot be afforded protection."' Id.
77. Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 838 (10th Cir.
1993). The "external factors" applicable to a computer program one seeks to copyright
include "hardware standards and mechanical specifications ... software standards and
compatibility requirements... computer manufacturer design standards, target industry practices and demands... and computer industry programming practices .... " Id.
(citations omitted). Another court has denied copyright protection under the "scenes a
faire" because the alleged infringer was merely attempting to comply with industry
standards. EngineeringDynamics, Inc., 26 F.3d at 1347 n.13.
78. Lotus Dev. Corp. v. Paperback Software Intl, 740 F. Supp. 37, 52 (D. Mass.
1990) (quoting 17 U.S.C. § 101 (1988)).
79. 17 U.S.C. § 107 (1994). When applying the fair use doctrine four criteria must
be considered:
(1) the purpose and character of the use, including whether such use is of a
commercial nature or is for nonprofit educational purposes;
(2) the nature of the copyrighted work;
(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
(4) the effect of the use upon the potential market for or value of the copyrighted work.
Id.
80. 17 U.S.C. § 106 (1994).
81. 17 U.S.C. § 302(c) (1994).
82. 17 U.S.C. § 106.
83. 17 U.S.C. § 501 (1994) (defining infringers of copyright); 17 U.S.C. § 502 (1994)
(providing that injunctive relief is available "to prevent or restrain infringement of a
copyright"); 17 U.S.C. § 504 (1994) (stating that one who infringes another's copyright is
liable for actual damages or statutory damages).
CREIGHTON LAW REVIEW
1360
[Vol. 30
Actual damages available to the copyright owner are computed
based on the actual damage caused by the infringement, plus the profits obtained by the infringer attributable to the violation of the copyright.8 4 Alternatively, an aggrieved party may recover statutory
damages in lieu of actual damages.8 5 Statutory damages range from
$200 to $100,000, depending on whether the infringement was willful.8 6 Further, if a copyright has been willfully infringed "for purposes
of commercial advantage or.private personal gain," criminal sanctions
may be imposed upon the infringing party, consisting of a sentence of
imprisonment not exceeding five years, a fine, or both.8 7 Moreover,
costs and attorney's fees may also be awarded at the court's discretion.8 8 A copyright infringement suit must commence within three
years of the claim's accrual.8 9
TITLE
17,
UNITED STATES CODE, SECTION
102
Title 17 of the United States Code section 102(a) ("section 102(a)")
lists the subject matter which may be protected by copyright. 90 For
example, section 102(a) provides copyright protection for musical and
dramatic works, motion pictures, sound recordings and music, architectural works, literary works, pantomimes, choreography, pictures,
graphics, and sculptures. 9 1 Literary works are defined in section 101
as "works ...expressed in words, numbers, or other verbal or numerical symbols ... "92 The legislative history of the Copyright Act indicates that computer programs are to be considered within the purview
of "literary works" as defined under section 101. 93
Title 17 of the United States Code section 102(b) ("section
102(b)"), however, acts to restrict copyright protection by preventing a
copyright from protecting any "idea, procedure, process, system,
method of operation,concept, principle, or discovery, regardless of the
form in which it is described, explained, illustrated, or embodied in
84. 17 U.S.C. § 504(b) (1994).
85. 17 U.S.C. § 504(a).
86. 17 U.S.C. § 504(c).
87. 17 U.S.C. § 506(a) (1994).
88. 17 U.S.C. § 505 (1994).
89. 17 U.S.C. § 507(a)(b) (1994).
90. 17 U.S.C. § 102(a) (1994).
91. Id.
92. 17 U.S.C. § 101 (1994). This section states in pertinent part that "literary
works' are works, other than audiovisual works, expressed in words, numbers, or other
verbal or numerical symbols or indicia, regardless of the nature of the material objects,
such as books, periodicals, manuscripts, phonorecords, film, tapes, disks, or cards, in
which they are embodied." Id.
93. H.R. REP. No. 94-1476, at 54 (1976), reprinted in 1976 U.S.C.C.A.N. 5659,
5667.
1997]
COPYRIGHT PROTECTION
1361
such work."94 Section 102(b) reflects the dichotomy between idea and
expression. 95 Congress enacted section 102(b) to ensure that the expression chosen by a computer programmer was subject to copyright
protection, but that the processes or methods with which the program
operated were not.9 6 Section 102(b) does not prohibit the copyrightability of computer programs. 9 7 The relevant House report states:
Section 102(b) is intended, among other things, to make clear
that the expression adopted by the programmer is the copyrightable element in a computer program, and that the actual
processes or methods embodied in the program are not within
the scope of the copyright law.
Section 102(b) in no way enlarges or contracts the scope
of copyright protection under the present law. Its purpose is
to restate, in the context of the new single Federal system of
copyright, that the basic 98dichotomy between expression and
idea remains unchanged.
THE UNITED STATES SUPREME COURT'S INTERPRETATION OF THE
DICHOTOMY BETWEEN
IDEA AND EXPRESSION
The United States Supreme Court's decision in Baker v. Selden 99
is the seminal case in the area of the copyright protection afforded
utilitarian works. 10 0 In Baker, the Supreme Court held that the
holder of a copyright for a book which explained a unique method of
bookkeeping was not entitled to copyright protection of the illustrative
forms contained in the book. 1° 1 The holder of the copyright, Charles
Selden, alleged that Baker infringed upon Selden's copyright of the
bookkeeping method when Baker created accounting books developed
from substantially the same system.102 Baker denied that any infringement occurred and argued that Selden's book was not a proper
subject for copyright. 10 3 The Court stated that a description of "the
art," which in this case was bookkeeping, could be copyrighted, but
copyright protection was not available for the bookkeeping procedure
94.
95.
17 U.S.C. § 102(b) (emphasis added).
Englund, 88 MICH. L. REv. at 875.
H.R. REP. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.A.A.N. at 5670
96.
(emphasis added).
97. M. Kramer Mfg. Co., Inc., 783 F.2d at 435.
98. H.R. REP. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.A.A.N. at 5670
(emphasis added).
99. 101 U.S. 99 (1879).
100. Computer Assocs. Int'l, Inc., 982 F.2d at 704.
101. Baker v. Selden, 101 U.S. 99, 104 (1879).
102. Baker, 101 U.S. at 99-100.
103. Id. at 100.
1362
CREIGHTON LAW REVIEW
[Vol. 30
itself.10 4 Therefore, the Court held that Selden's copyright did not
confer upon him the exclusive right to create and make use of accounting books with the forms he designed.' 0 5 Instead, the Court determined that Selden's forms were necessary for practical application of
his method of bookkeeping and should be made available to the
public.106
THE SCOPE OF COPYRIGHT PROTECTION FOR COMPUTER PROGRAMS
Copyrightabilityof the Structure of a Computer Program
The United States Court of Appeals for the Third Circuit's deci07
sion in Whelan Associates, Inc. v. Jaslow Dental Laboratory, Inc. 1
has been identified as the "leading case" defining the extent to which
l0 8
aspects of a computer program are subject to copyright protection.
In Whelan, the Third Circuit held that copyright protection extended
past the literal computer code to the "structure, sequence, and organization" of a computer program.' 0 9
In Whelan, a custom-made computer program was developed by
Elaine Whelan for the Jaslow Dental Laboratory, Inc. (the "Jaslow
Lab"). 1 10 Elaine Whelan's program was written in a language that
allowed it to be operated on IBM Series One machines, but was not
compatible with many of the computers used by smaller dental
firms."' Three years after this program was completed, Rand Jaslow,
an officer and shareholder in the Jaslow Lab, began working on a pro112
gram which would operate on the computers used by smaller firms.
Once completed, Whelan Associates, Inc. ("Whelan") brought suit in
the United States District Court for the Eastern District of Penn3
sylvania alleging copyright infringement."1
104. Id. at 104-05. The term "art" as used by the Supreme Court has been construed
to denote the "idea" of the work. Autoskill, Inc. v. Nat'l Educ. Support Sys. Inc., 793 F.
Supp. 1557, 1564 (D.N.M. 1992) (citing Baker v. Selden, 101 U.S. 99 (1879)), affd, 994
F.2d 1476 (10th Cir. 1993).
105. Baker, 101 U.S. at 107.
106. Id. at 103.
107. 797 F.2d 1222 (3d Cir. 1986).
108. Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp.
449, 455 (N.D. Ga. 1987).
109. Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1248 (3rd Cir.
1986).
110. Whelan Assocs., Inc., 797 F.2d at 1225. At the time Elaine Whelan wrote the
program she was associated with Strohl Systems Group, Inc. ("Stroh"). Id. at 1225-26.
After the program was completed for Jaslow, Elaine Whelan formed her own business,
Whelan Associates, Inc., and acquired Stroh's interest in the program she created for
Jaslow. Id. at 1226.
111. Whelan Assocs., Inc., 797 F.2d at 1226.
112. Id.
113. Id. at 1227.
1997]
COPYRIGHT PROTECTION
1363
The Jaslow Lab argued that Whelan's copyright registration was
defective for two reasons; first, that Rand Jaslow owned the first program, and second, that Rand Jaslow independently developed the second program. 1 4 Guided by expert testimony, the district court
examined the file structures, screen outputs, and five subroutines. 1 15
The district court then held that Rand Jaslow's access to Whelan's
program, combined with the substantial similarity between the two
116
programs, violated Whelan's copyright.
On appeal, the United States Court of Appeals for the Third Circuit focused on whether Rand Jaslow, in developing the second program, copied the first program designed and copyrighted by
Whelan. 117 The court noted that copying may be proven by demonstrating that a defendant had access to the copyrighted work and that
the copyrighted and allegedly infringing work are substantially similar. 118 Because it was undisputed that Rand Jaslow had access to the
copyrighted program, the Third Circuit addressed the issue of the similarity between the two programs and whether the copyright protection afforded a computer program extends beyond the literal computer
code.119
After reviewing the district court's decision, the Third Circuit concluded that a substantial similarity existed between the two programs
and affirmed the district court's judgment. 120 The Third Circuit examined the scope of copyright infringement to determine whether the
Whelan copyright protected more than just the program's literal
source and object codes. 12 1 The court noted that a showing of substantial similarity is not required in order to find infringement of the literal elements of a literary work. 12 2 Likewise, the Third Circuit
114. Id.
115. Id. at 1242-46. A file structure is "a storage place for data." Id. at 1242. A
subroutine represents one portion of the solution for the problem that the program is
designed to solve. Id. at 1230.
116.
Whelan Assocs., Inc., 797 F.2d at 1228-29.
117. Id. at 1231-32. Rand Jaslow did not contest Whelan's copyright ownership
before the Third Circuit. Id. at 1231.
118. Whelan Assocs., Inc., 797 F.2d at 1231-32.
119. Id. at 1232-34. The Jaslow Lab supported their position by arguing that the
National Commission on New Technological Uses of Copyrighted Works ("CONTU") report suggested that the copyright protection afforded to computer programs be limited
to a program's literal elements. Id. at 1241. The Third Circuit, however, pointed out
that CONTU never made such a recommendation. Id. The court indicated that
CONTUs report actually states that copyright protection may extend beyond the source
and object codes to flowcharts. Id. The court stated further that the only statutory
provision relevant was section 102(b). Id. Because the CONTU report did not instigate
any changes in section 102(b), that report cannot be used as legislative history. Id. at
1241-42.
120. Whelan Assocs., Inc., 797 F.2d at 1248.
121. Id. at 1233-42.
122. Id. at 1234.
1364
CREIGHTON LAW REVIEW
[Vol. 30
maintained, a computer program's copyright may be infringed "absent
copying of the literal elements of the program."123
In discussing section 102(b), the Third Circuit stated the "clear"
purpose of section 102(b) was to set forth "the idea-expression dichotomy." 12 4 The court noted that when examining a utilitarian work, the
purpose or function of the work is the idea. 125 Thus, every element
that is not essential for the purpose or function of the program is considered "part of the expression of the idea."1 2 6 In this case, the court
determined that the idea was the "efficient organization of a dental
lab."12 7 Because such organization may be achieved in many different
ways, the court found that the program's structure was not essential
to that idea, and therefore concluded that the program's structure was
expression. 128 Accordingly, the court held that the structure, sequence, and organization of a computer program may be protected by
29
copyright. 1
123. Id.
124. Id. at 1234.
125. Id. at 1236.
126. Id.
127. Id. at 1240.
128. Id. at 1239-40.
129. Id. at 1248. For another case citing the proposition that copyright protection
extends to one among several alternatives available to accomplish a task, see Pearl Sys.,
Inc. v. Competition Elecs., Inc., No. 87-6278-CIV-MARCUS, 1988 WL 146047 (S.D. Fla.
1988). In Pearl Systems the United States District Court for the Southern District of
Florida held that copyright infringement occurred where two program subroutines,
which could have been designed differently, were both activated "by the same sequence
of buttons." PearlSys., Inc., 1988 WL 146047, at *6. The programs at issue were present on microprocessors inside shot timers, a devise used in competitive pistol shooting.
Id. at *1-2. Competition Electronics, Inc. ("Competition") developed its shot timer in
1983 and subsequently registered a copyright for the software associated with this device. Id. at *1-2. The shot timer created by Pearl Systems, Inc. ("Pearl Systems") was
produced after one of the individuals instrumental in its development acquired and operated one of Competition's shot timers. Id. at *2. Pearl Systems then brought a declaratory judgment action seeking a decree that it did not infringe upon the Competition
copyright. Id. at *1.
At issue before the district court was whether Pearl Systems copied an idea or the expression of an idea. Id. at *6. One subroutine in the shot timer allowed a user to set a
"par time," which is a function that measures the number of shots fired in a specific time
period. Id. at *1, 6. The other subroutine allowed a user to review the shots fired and
discover the elapsed time between each shot. Id. at *6. Since the subroutines could
have been designed in any number of ways the court maintained their structure was not
dictated by function. Id. Thus, the court found these subroutines to be the expression of
ideas and, accordingly, found that Pearl Systems infringed on Competition's copyright.
Id. The district court enjoined Pearl Systems from further infringing on the copyright.
Id.
1997]
COPYRIGHT PROTECTION
1365
Copyrightabilityof a Main Menu Screen
In Digital CommunicationsAssociates, Inc. v. Softklone Distributing Corporation,130 the United States District Court for the Northern
District of Georgia specifically addressed whether the main menu
screen of a computer program could be protected by copyright. 13 1 In
Digital, Microstuff, Inc. ("Microstuff") developed and copyrighted a
communications program that allowed information to be conveyed between computers. 132 This program had a unique main menu that contributed to its success. 13 3 ForeTec Development Corporation
("ForeTec"), after being advised by counsel that the main menu of the
Microstuff program could not be protected by copyright, developed a
"clone" of the Microstuff program. 134 After the clone program was created, Microstuff brought suit in the district court, alleging that ForTec
35
violated the Microstuff copyright.1
Distinguishing between idea and expression, the court stated the
"'idea"' involved was the process or manner through which the main
menu operated and the "'expression'" was the way the main menu was
comprehended by the user.13 6 The court noted the grouping of commands on Microstuff's main menu contained "considerable stylistic
37
creativity" which could have been depicted in any number of ways. 1
Moreover, the court stated that the main menu and manner in which
commands were selected had no relationship to the function of the status screen or program.' 38 Because the expression adopted by Microstuff was not dictated by the idea of a main menu, the court concluded
that the main menu both expressed and conveyed information and
could be protected by copyright. 139
130.
659 F. Supp. 449 (N.D. Ga. 1987).
131. Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp.
449, 462 (N.D. Ga. 1987). The trial court identified the "main menu" as a "status
screen." Id. at 452.
132. Digital CommunicationsAssocs., Inc., 659 F. Supp. at 452. Microstuff obtained
a copyright for the main menu of the program in addition to a copyright for the program
as a whole. Id. at 453. Digital Communications Associates, Inc. was substituted as
plaintiff in this action after it purchased Microstuff. Id.
133. Digital CommunicationsAssocs.,.Inc., 659 F. Supp. at 452.
134. Id. at 453. ForeTec obtained a copy of Microstufi's program before creating its
own program. Id. Softklone Distributing Corporation is a wholly owned subsidiary
ForeTec created to market and distribute this "clone" program. Id.
135. Digital CommunicationsAssocs., Inc., 659 F. Supp. at 454.
136. Id. at 459.
137. Id. at 460.
138. Id.
139. Id. at 460, 462.
1366
CREIGHTON LAW REVIEW
[Vol. 30
Copyrightabilityof Input and Output Formats
Input and output formats have also been held to come within the
purview of copyright protection.140 In Engineering Dynamics, Inc. v.
Structural Software, Inc.,141 the United States Court of Appeals for
the Fifth Circuit held that the nonliteral portion of a computer program may be protected by copyright. 142 In this case, Engineering Dynamics, Inc. ("EDI") developed a computer program designed to solve
structural analysis engineering problems. 143 EDI's program was limited to operation on a mainframe computer. 144 Subsequently, when a
competitor known as Structural Software, Inc. ("SSI") developed a
similar program compatible with a personal computer, EDI claimed
that its copyright had been infringed. 14 5 EDI then brought a copyright infringement action in the United States District Court for the
Eastern District of Louisiana, seeking damages and equitable relief.14 6 Specifically, EDI alleged that SSI had infringed on EDI's copyright by copying fifty-six input formats, as well as various output
formats, present in the EDI program. 147 The district court held that
EDI's copyright did not protect the input and output formats because
this aspect of the EDI program only communicated "standardized information to the user" and was therefore outside the scope of copyright
protection.148 EDI appealed the court's decision to the United States
149
Court of Appeals for the Fifth Circuit.
On appeal, the Fifth Circuit addressed three arguments
presented by SSI: (1) user input formats could not be copyrighted, (2)
EDI's input and output formats "represent unoriginal facts and lists of
facts that are not copyrightable," and (3) input and output formats are
"idea[s], process[es], or method[s]" which cannot be copyrighted. 150 In
order to address the arguments presented by SSI, the Fifth Circuit
applied the "abstraction-filtration-comparison" test to determine
140. Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335, 1351
(5th Cir. 1994), opinion supp. by 46 F.3d 408 (5th Cir. 1995).
141. 26 F.3d 1335 (5th Cir. 1994), opinion supp. by 46 F.3d 408 (5th Cir. 1995).
142. EngineeringDynamics, Inc., 26 F.3d at 1342. The literal portion of a computer
program is the source and object code. Id. at 1341.
143. EngineeringDynamics, Inc., 26 F.3d at 1338.
144. Id.
145. Id. at 1339.
146. Id. at 1340.
147. Id. at 1339.
148. Engineering Dynamics, Inc. v. Structural Software, Inc., 785 F. Supp. 576, 582
(E.D. La. 1991), affd & rev'd in part, 26 F.3d 1335 (5th Cir. 1994), opinion supp. by 46
F.3d 408 (5th Cir. 1995).
149. Engineering Dynamics, Inc., 26 F.3d at 1340.
150. Id. at 1341.
COPYRIGHT PROTECTION
1997]
1367
whether the EDI program could be copyrighted. 15 1 The court outlined
the "abstraction-fitration-comparison" test as follows:
First, in order to provide a framework for analysis, . . a court
should dissect the program according to its varying levels of
generality... Second, poised with this framework, the court
should examine each level of abstraction in order to filter out
those elements of the program which are unprotectable. Filtration should eliminate from comparison the unprotectable
elements of ideas, processes, facts, public domain information, merger material, scenes a faire material, and other unprotectable elements suggested by the particular facts of the
program under examination. Third, the court should then
compare the remaining protectable elements with the allegedly infringing program to determine whether the defendants
have misappropriated substantial elements of the plaintiffs
program. 152
In addressing SSI's first argument, the court discussed the abstraction portion of the test, and determined that both the input and
output formats were expressions rather than ideas.1 5 3 Because a variety of ways existed for these formats to be constructed in order to
accomplish the program's purpose, the court found that the formats
constituted expression which could be protected by copyright. 154 The
court then analyzed the filtration portion of the test in order to resolve
SSI's second argument and determine whether the input and output
formats were unprotectable facts or original expression.' 5 5 Because
facts cannot be copyrighted, the court indicated that any input and
output formats which consisted completely of facts could not be protected by the EDI copyright. 156 The court found that facts do not appear on the input and output formats, but that the formats were
1 7
"organized, descriptive tables for [the] entry of data...."5 The court
found that the data chosen by EDI and its placement in the program
was both original and unique. 158 Accordingly, the court determined
that the input and output formats consisted of more than "facts," and
therefore, were copyrightable. 159
In its fitration analysis, the court addressed SSI's third argument, in which it characterized the input data formats as being "a
151. Id. at 1342-1348. For a further discussion of the abstraction-filtration-comparison test, see supra notes 297-303 and accompanying text.
152. EngineeringDynamics, Inc., 26 F.3d at 1342-43.
153. Id. at 1344.
154.
155.
156.
157.
158.
159.
Id.
Id. at 1345.
Id.
Id.
Id. at 1346.
Id. at 1345.
1368
CREIGHTON LAW REVIEW
[Vol. 30
template or tool used by the engineer." 160 The court identified the issue as being whether copyright protection was prohibited because of
the utilitarian nature of the input formats. 16 1 The court determined
that copyright protection was available because the input formats possess "original expressive content in... selection, sequence, and coordination ....
"162 The Fifth Circuit then remanded the case to the
district court to determine if industry standards prohibit copyright
protection and whether or not SSI infringed on EDI's copyright in the
16 3
user interface of its program.
The propriety of applying the "abstraction-ifitration-comparison"
test to a copyright infringement case was also addressed by the United
States Court of Appeals for the Tenth Circuit in Gates Rubber Co. v.
Bando Chemical Industries, Ltd.,164 in which the Tenth Circuit applied the test to determine which elements of a computer program
were protectable by copyright. 16 5 In GatesRubber Co., the Tenth Circuit held that the United States District Court for the District of Colorado failed to properly apply the "abstraction-ifitration-comparison"
test. 16 6 Consequentially, the Tenth Circuit remanded the case to the
district court to determine whether a copyright in the protectable ele16 7
ments of the program at issue had been infringed.
At that time, Gates Rubber Company ("Gates") was a leader in
the sale of industrial machine belts, and had developed the program
for use by its sales personnel. 168 Gates obtained a certificate of copyright registration for its program which was designed to aid in the
determination of the proper size of a rubber belt used on a particular
170
machine. 16 9 Bando American ("Bando") was a competitor of Gates.
A Bando employee, Steven R. Piderit, who previously worked for
Gates, aided Bando in developing a similar program.171 Gates subsequently brought suit for copyright infringement in the United States
District Court for the District of Colorado. 172 The district court found
160.
161.
162.
163.
164.
165.
1993).
166.
167.
168.
169.
Id.
Id. at 1346.
Id.
Id. at 1351.
9 F.3d 823 (10th Cir. 1993).
Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 833-34 (10th Cir.
Gates Rubber Co., 9 F.3d at 848.
Id.
Id. at 830.
Id.
170. Id. Bando American is actually a division of the a Japanese corporation that
was in competition with Gates Rubber Co. Id.
171. Gates Rubber Co., 9 F.3d at 830-31.
172. Id. at 831.
COPYRIGHT PROTECTION
1997]
1369
that Bando infringed on the copyright Gates had in its computer
73
program.'
The district court initially determined that portions of the Gates
program, such as the data and control flow, as well as the mathematical constants used, were all protectable by copyright. 17 4 After analyzing the substantial similarities between the two programs, the court
held that there was "but one outcome: Defendants [Bando] infringed
on Plaintiffs [Gates'] copyright." 175 Bando appealed this ruling to the
United States Court of Appeals for the Tenth Circuit, contending that
the district court erred in affording copyright protection to facts and
176
ideas present within Gates' program.
On appeal, the Tenth Circuit found the former Gates employee
who aided Bando in creating its program had access to the Gates program. 177 The appellate court then attempted to determine whether
178
any "probative similarities" existed between the two programs.
The court indicated that even if copying did occur, infringement may
not result unless protectable elements were copied and those protectable elements compromise a significant portion of the Gates'
program. 179
In addressing whether any "probative similarities" existed between the two programs, the Tenth Circuit applied the "abstractionfiltration-comparison" test.180 Through the abstraction portion of the
test, the court indicated that a computer program can be segregated
into six different levels: "(i) the main purpose, (ii) the program structure or architecture, (iii) modules, (iv) algorithms and data structures,
(v) source code, and (vi) object code."' 1 Once a level of abstraction is
identified, the court stated, the filtration step "filter[s] out" those portions of the computer program which cannot be protected by copyright.' 8 2 The Tenth Circuit pointed out that filtration involves section
102(b), which prohibits the copyright protection of "ideas, concepts,
and principles."' 8 3 The court maintained that the legislative history
of section 102(b) clarified the proposition that a computer programmer's expression is to be protected, but that "actual processes or meth173.
Id.
174. Gates Rubber Co. v. Bando Am., Inc., 798 F. Supp. 1499, 1518-19 (D. Colo.
1992), affd & vacated in part, 9 F.3d 823 (10th Cir. 1993).
175. Gates Rubber Co., 798 F. Supp. at 1519.
176. Gates Rubber Co., 9 F.3d at 831.
177. Id. at 830.
178. Id. at 832.
179. Id. at 833.
180. Id. at 834-46.
181. Id. at 835.
182. Id. at 836.
183. Id. (citing 17 U.S.C. § 102(b)).
1370
CREIGHTON LAW REVIEW
[Vol. 30
ods" are outside the scope of copyright law.184 The court found that
ideas within expression cannot be copyrighted.' 8 5 A program's purpose is an idea and is at one end of the spectrum, the court maintained, while a program's source and object code, which are literal
elements of the program, are at the other end and will usually be considered protected expression.' 8 6 The court explained that generalization about what lies in between is more difficult.' 8 7 The Tenth Circuit
remanded the case to the district court for reapplication of the "abstraction-filtration-comparison" test and a further examination of several aspects of the Gates and Bando programs. 188
ELEMENTS OF A COPYRIGHT INFRINGEMENT CLAIM
In order to prevail on a copyright infringement claim, aggrieved
plaintiffs must prove that: (1) they own a valid copyright, and (2) that
the alleged infringer has copied elements of the copyrighted work
which are original.' 8 9 A valid copyright is established by a certificate
reflecting the registration of a copyright and is considered "prima facie
184. Id. at 836-37 (citing H.R. REP. No. 94-1476, at 57 (1976), reprinted in 1976
U.S.C.A.A.N. 5659, 5670).
185. Id. at 836.
186. Id.
187. Id. One program's structure may be considered an idea, while another's is
found to be protectable expression. Id.
188. Gates Rubber Co., 9 F.3d at 830. On remand, the Tenth Circuit instructed the
trial court to re-examine seven aspects of the Gates and Bando programs: constants,
menus and sorting criteria, control and data flow, engineering calculation and design
modules, common errors, fundamental tasks, and install files. Id. at 842-46. Constants
are a part of the formulas used in the Gates program to perform calculations necessary
to determine the load that a certain belt can bear. Id. at 842-43. The Tenth Circuit
found these constants to be scientific observations of facts and therefore not subject to
copyright protection. Id. Since the record on appeal required clarification of exactly
what the trial court meant by "menu and sorting criteria" and "control and data flow"
the appellate court had to remand the case without resolving whether these elements of
the program could be copyrighted. Id. at 843-44. As for the engineering and design
modules, the Tenth Circuit found that the trial court failed to determine if this could be
an uncopyrightable process. Id. at 845. Further, the Tenth Circuit stated that the trial
court did not consider the doctrines of merger or scenes a faire. Id. Accordingly, the
appellate court was precluded from reviewing the engineering and design modules of
the program. Id. Gates also argued to the Tenth Circuit that common errors could be
protected. Id. Common errors refer to the incident of two programs performing incorrectly. Id. The Tenth Circuit maintained that this could be used as evidence of copying,
but the errors themselves could not be protected. Id. Further, like "menu and sorting
criteria" and "control and data flow," the Tenth Circuit was unsure of what meaning the
district court accorded to "fundamental tasks." Id. at 846. This also required remand.
Id. The last element considered by the Tenth Circuit, install files, was part of the Disk
Operating System and may not have been subject to the Gates copyright. Id. An operating system is an assortment of programs that direct the computer's internal functions
and serve as a bridge between hardware, application programs, and the user. Menell,
41 STAN. L. REV. at 1051. The appellate court remanded the case to determine this
issue as well. Gates Rubber Co., 9 F.3d at 846.
189. Feist Publications,Inc., 499 U.S. at 361.
19971
COPYRIGHT PROTECTION
1371
evidence of the validity of the copyright and of the facts stated in the
certificate." 190 The second element, copying, may be proven by direct
evidence or by demonstrating that an infringer had access to the copyrighted work and that the infringer's work is "substantially similar to
the .
.
. copyrighted material." 19 1 Because no physical proof is typi-
cally available, copying is generally established by proving that an infringer had access to the copyrighted work and that a substantial
similarity exists between the copyrighted work and the infringing
must be "of such importance that the appropriawork. 1 92 The copying
19 3
tion is actionable."
Ownership of a Valid Copyright
If one does not have a valid copyright in a computer program,
then suit may not be brought against an alleged infringer.' 9 4 In Bull
195
HN Information Systems, Inc. v. American Express Bank Limited,
the United States District Court for the Southern District of New York
dismissed a copyright infringement claim because the party bringing
suit, Bull HN Information Systems, Inc. ("Bull EN"), did not have a
copyright registered for the computer programing language at issue.' 9 6 Bull HN had developed a computer program with its own pro197
prietary language and obtained a copyright only in the program.
Bull IN argued that a similar program developed by American Express Bank Limited ("American Express") infringed on Bull HN's
copyright in both the computer programming language and the program created with that language. 198 Bull HN claimed American Express copied the "overall structure, sequence and organization" of the
Bull HN program, as well as the way the program "look[s] and
feel[s]." 19 9 When Bull HN failed to produce evidence of a valid copyright in the proprietary language, the district court dismissed Bull
190. Autoskill, Inc., 994 F.2d at 1487 (citing 17 U.S.C. § 410(c)). This presumption
of validity may be rebutted. Folio Impressions, Inc. v. Byer California, 937 F.2d 759,
763 (2nd Cir. 1991). In effect, the burden is shifted onto the party who wishes to prove
the invalidity of a copyright. Bibbero Sys., Inc. v. Colwell Sys., Inc., 893 F.2d 1104, 1106
(9th Cir. 1990). Any immaterial or inadvertent mistake present in the application for
the copyright will not threaten the validity of the copyright registration. Data Gen.
Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1161 (1st Cir. 1994).
191. Computer Assocs. Int'l, Inc., 982 F.2d at 701.
192. Concrete Mach. Co., Inc. v. Classic Lawn Ornaments, Inc., 843 F.2d 600, 606
(1st Cir. 1988).
193. Gates Rubber Co., 9 F.3d at 832.
194. Bull HN Info. Sys., Inc. v. American Exp. Bank Ltd., No. 88 CIV 2103 (SWK),
1990 WL 48098, *2 (S.D.N.Y. 1990).
195. 1990 WL 48098 (S.D.N.Y. 1990).
196. Bull HN Info. Sys., Inc., 1990 WL 48098, at *2.
197. Id. at *2.
198. Id. at *1-2.
199. Id.
1372
CREIGHTON LAW REVIEW
[Vol. 30
HN's claim of infringement because Bull HN had never obtained a
20 0
copyright in the programming language.
Proofof Copying: Direct Evidence
One method for an owner of a valid copyright to prove copying is
by direct evidence. 20 1 For example, in Lotus Development Corp. v. Paperback Software International,20 2 the United States District Court
for the District of Massachusetts had direct evidence of the copying of
a computer program's user interface and found that such an interface,
which includes the menu command structure, may be protected by
20 3
copyright.
In Paperback, a company known as Paperback Software International ("Paperback") sought to develop a computer spreadsheet program that was compatible with Lotus 1-2-3.204 The result was a
program, called VP-Planner, which contained the same menu command hierarchy as Lotus 1-2-3.205 Paperback admitted that they directly incorporated the Lotus 1-2-3 menu command hierarchy into
their program, thus providing Lotus Development Corp. ("Lotus") with
direct evidence of copying.20 6 Paperback argued before the district
court, however, that the copyright protection afforded a computer program extends only to the literal portions of the program, including the
program's source code and object code, and therefore Lotus' direct evidence was not relevant. 20 7 Lotus countered this claim, stating that
copyright protection encompasses both the literal and nonliteral elements of a computer program that possess original expression, including its menu command hierarchy. 20 8 Whether an original element of
a program was literal or nonliteral, Lotus argued, was irrelevant to a
search for original expression, which could be found in a program's
200. Id. at *2. Bull HN did register a copyright in the program written from the
programming language at issue. Id. at *1-2.
201. See supra note 191 and accompanying text.
202. 740 F. Supp. 37 (D. Mass. 1990).
203. Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 63, 68 (D. Mass.
1990). The district court, in summarizing its holding as to the copyrightability of the
user interface, appears to use the terms "user interface" and "menu command system"
interchangeably. Paperback Software Int'l, 740 F. Supp. at 68.
204. PaperbackSoftware Int'l, 740 F. Supp. at 69. Paperback contended that their
program must be compatible with Lotus 1-2-3 in order for it to become a commercial
success. Id.
205. PaperbackSoftware Int'l, 740 F. Supp. at 70.
206. Id. at 68.
207. Id. at 45-46.
208. Id.
1997]
COPYRIGHT PROTECTION
1373
user interface. 20 9 The district court set forth the legal test for
copyrightability as consisting of three parts:
FIRST, in making the determination of "copyrightability," the
decisionmaker must focus upon alternatives that counsel may
suggest, or the court may conceive, along the scale from the
most generalized conception to the most particularized, and
choose some formulation - some conception or definition of
the "idea" - for the purpose of distinguishing between the
idea and its expression...
SECOND, the decision maker must focus upon whether an
alleged expression of the idea is limited to elements essential
to expression of that idea (or is one of only a few ways of expressing the idea) or instead includes identifiable elements of
expression not essential to every expression of that idea.
THIRD, having identified elements of expression not essential to every expression of the idea, the decisionmaker must
focus on whether those elements2 10are a substantial part of the
allegedly copyrightable "work."
Initially, the court determined that the mere idea of an electronic
spreadsheet was not copyrightable. 2 1 1 However, the court noted that
the general idea of an electronic spreadsheet could manifest itself
through a variety of expressions. 2 12 If those expressions are found not
to be essential to an electronic spreadsheet, the court then concluded,
the expression would be copyrightable. 2 13 The court examined the
menu command system and determined that the particular system
designed by Lotus was not essential to the electronic spreadsheet and
2 14
was thus copyrightable.
209. Id. Paperback also maintained that the user interface of Lotus 1-2-3 was a
"useful article," that is, an article having an "intrinsic utilitarian function." Id. at 54.
The district court found that a "useful article," or rather the utilitarian aspect of a useful article, is not entitled to copyright protection. Id. at 52. This does not have the
effect, the district court noted, of precluding a copyright simply because an intellectual
work is practical and functional. Id. at 58. Expression in a useful article may be copyrighted, the court stated, provided such expression exists independently "of the functional ideas that make the article useful." Id. Indeed, the district court noted that
expression is part of the test of copyrightability. Id. at 59-60. More than expression of
an idea is necessary; in order to be copyrighted the work must express the idea in an
original way. Id.
210. Paperback Software Intl, 740 F. Supp. at 60-61.
211. Id. at 65.
212. Id.
213. Id. at 67-68. The court found that the rotated "L"appearance of the spreadsheet on the screen, the designation of a particular key that will activate the menu
command system, and the use of certain keys as symbols for mathematical functions are
found "in most expressions of ... electronic spreadsheet computer programs," and are
therefore not copyrightable. Id.
214. PaperbackSoftware Int'l, 740 F. Supp. at 67-68.
1374
CREIGHTON LAW REVIEW
[Vol. 30
Having found the menu command system to be a mode of expression, the court then determined the command structure of Lotus 1-2-3
constituted original expression because other electronic spreadsheet
programs incorporate different command structures. 2 1 5 Finally, the
court determined that the Lotus 1-2-3 user interface was a substantial
portion of the program, accounting for the program's overall popularity.2 16 Because Paperback's program copied a substantial portion of
Lotus 1-2-3, the district court concluded that Paperback Software was
2 17
liable to Lotus for copyright infringement.
Proof of Copying:Access and Substantial Similarity
A second way to prove copying is by demonstrating that the infringing party had both access to the copyrighted material and that
the infringing material bears a substantial similarity to the protected
material. 2 18 In E.F. Johnson Co. v. Uniden Corporation of
America, 2 19 the United States District Court for the District of Minnesota issued a preliminary injunction against Uniden Corporation of
America ("Uniden") because E.F. Johnson Co. ("EFJ") demonstrated
that it was likely to succeed on the merits of the copyright infringement action, namely copyright ownership, access, and the substantial
similarity. 2 20 At issue in E.F. Johnson was software used in EFJ's
mobile radios. 2 2 1 After EFJ examined other mobile radios containing
similar software which were marketed by Uniden, EFJ commenced
the instant copyright infringement action seeking to obtain the
2 22
injunction.
The court recognized Uniden's admission that it had obtained and
examined the EFJ programs while developing software for its own radio, proving that it had access to EFJ's programs. 2 23 Next, the court
dealt with the issue of substantial similarity by requiring EFJ to
demonstrate both that Uniden used EFJ's copyrighted work to develop
its own software and, in doing so, precisely duplicated substantial por215.
Id.
216. Id. at 68.
217. Id. at 84.
218. See supra note 191 and accompanying text.
219. 623 F. Supp. 1485 (D. Minn. 1985).
220. E.F. Johnson Co. v. Uniden Corp. of Am., 623 F. Supp. 1485, 1491-93, 1504 (D.
Minn. 1985). In discussing the likelihood of EFJ's success on the merits, the court first
noted that EFJ produced a copyright certificate. E.F. Johnson, 623 F. Supp. at 1492.
The court stated that such a certificate was prima facie evidence of EFJ's ownership of
the copyright and its validity. Id.
221. E.F. Johnson Co., 623 F. Supp. at 1487.
222. Id.
223. Id. at 1490.
1997]
COPYRIGHT PROTECTION
1375
tions of EFJ's programs. 224 The district court satisfied this requirement by showing that the program's Barker Codes and H-Matrices,
which are required in order for the radio to operate, were copied "verbatim" by Uniden. 2 25 Further proof of copying, the court indicated,
could be found in the fact that superfluous instructions and errors
present in the EFJ program were also found in the Uniden program. 22 6 Thus, the district court concluded that EFJ was likely to
copyright infringement claim and granted a preliminary
succeed in its
2 27
injunction.
That same year SAS Institute, Inc. v. S & H Computer Systems,
Inc.228 was decided by the United States District Court for the Middle
District of Tennessee. 2 2 9 This case concerned the copyright infringement of a computer program, designed by SAS Institute, Inc. ("SAS"),
which was designed to execute statistical analysis. 2 30 The district
court held that copyright infringement occurred when the organizational and structural details of the copyrighted work were copied into
another program. 23 1 While the SAS program could be operated only
on IBM-compatible computers, SAS was attempting to adapt the pro-
224. Id. at 1492-93. The district court noted that in the Eighth Circuit, courts are
required to resolve the issue of substantial similarity by determining "'whether the
work is recognizable by an ordinary observer as having been taken from the copyrighted
source'" unless the copyrighted material renders the test difficult to apply. Id. at 149293. In this case the district court noted that the software at issue was on computer
chips fixed within mobile radios, making the software virtually indistinguishable by the
ordinary observer. Id. at 1487, 1493. Thus, the district court followed what is known as
the iterative test, which requires the author to demonstrate (1) that the infringer used
the copyrighted work to prepare the copy and (2) that the infringing copy precisely duplicated substantial portions of the work protected by copyright. Id. at 1493.
225. E.F.Johnson Co., 623 F. Supp. at 1493-95. A Barker Code is a series of zeros
and ones in a prepatterned sequence which must be identified by the radio in order for
communication to occur. Id. at 1494. An H-Matrix is a series of ones and zeroes arranged in a matrix format that is used to detect transmission errors. Id. at 1495.
226. E.F. Johnson Co., 623 F. Supp. at 1495.
227. Id. at 1504. Uniden also proffered a 17 U.S.C. § 102(b) argument, which the
court rejected. Id. at 1501. Uniden maintained that it copied the idea behind the EFJ
radios, and any similarity was necessary in order to achieve compatibility. Id. The
court stated this argument had been addressed before by other circuits, which looked to
see if there were other ways to accomplish the same functions as the copyrighted program. Id. at 1501-02. If the copyrighted program is the only way to achieve the desired
ends, then no infringement occurs. Id. at 1502. The court found that the software could
have been designed several different ways. Id. Thus, the court rejected Uniden's section 102(b) argument. Id. at 1501.
228. 605 F. Supp. 816 (M.D. Tenn. 1985).
229. SAS Inst., Inc. v. S & H Computer Sys., Inc., 605 F. Supp. 816 (M.D. Tenn.
1985).
230. SAS Inst., Inc., 605 F. Supp. at 817.
231. Id. at 830.
1376
CREIGHTON LAW REVIEW
[Vol. 30
gram so that it could be operated on other computers. 2 32 S & H Computer Systems, Inc. ("S & H") had obtained a license from SAS to
operate its program on one IBM computer. 2 33 The court concluded
that S & H then obtained the source code of the SAS program in order
2 34
to modify the SAS program so that it would run on VAX computers.
Further, the court found that S & H used the SAS source code to prepare the S & H program. 23 5 Later, as the district court noted, S & H
2 36
attempted "to mask and disguise evidence of copying."
The district court indicated that similarities existed between the
two programs. 2 37 S & H argued, however, that these similarities were
uncopyrightable ideas and that any copying which may have occurred
8
23
was insignificant when compared to the SAS program as a whole.
S & H also argued that significant portions of its program were origi-
nal. 23 9 The court rejected S & H's initial argument, stating that S &
H copied expression and cited forty-four specific examples of copying
which were deemed by the court to be substantial. 240 Therefore, the
court found the two programs to be substantially similar. 2 41 Further,
the court indicated that S & H's originality argument was irrelevant,
noting that the S & H program was obviously based upon the SAS
work. 2 42 The court therefore concluded that SAS' copyright was in2 43
fringed upon by S & H.
232. Id. at 818. VAX computers are manufactured by the Digital Equipment Corpo-
ration. Id. The IBM-compatible program developed by SAS could not be run on VAX
computers. Id. at 819.
233. SAS Inst., Inc., 605 F. Supp. at 821.
234. Id. at 820.
235. Id. at 822-23. Evidence of copying by S & H included an attempt to change the
caption of the output label, alteration of the term "SAS" in the source code which resulted in incoherent statements, selection of "'driver routine' names" which closely resembled that chosen by SAS, the lack of design documentation for the S & H product,
the presence of non-functional features in the S & H product that can only be discovered
through the SAS source code, and a lack of organizational. patterns utilized by S & H.
Id. at 823-25.
Further, the court indicated that S & H could not overcome the presumption of
validity attached to the SAS copyright registration. Id. at 826-27. Therefore, the court
found the SAS copyright to be "valid and fully enforceable." Id. at 827.
236. SAS Inst., Inc., 605 F. Supp. at 822-23.
237. Id. at 829. Similarities between the two programs were corroborated by S &
H's expert witness. Id.
238. SAS Inst., Inc., 605 F. Supp. at 829.
239. Id. at 830.
240. Id. at 829-30.
241. Id. at 830.
242. Id. S & H also argued that any infringement could be remedied by "simple
excision." Id. at 831. The court likened this to S & H misappropriating every feature of
a building and then "changing the tint of the windows and the color of the siding" in
order to resolve the impropriety if its actions. Id. The court stated that this argument
'must be rejected." Id.
243. SAS Inst., Inc., 605 F. Supp. at 831.
1997]
COPYRIGHT PROTECTION
1377
The overall structure of a computer program may be protected by
copyright when a variety of methods of expression are available to the
author. 2 44 In BroderbundSoftware, Inc. v. Unison World, Inc.,245 the
United States District Court for the Northern District of California
found that two computer programs were substantially similar, and
thus, the creation of the subsequent program infringed upon the copyright of the original work. 2 46 In Broderbund, Pixellite Software ("Pixellite") developed and obtained a copyright for a computer program
entitled "The Print Shop," which with the aid of audiovisual displays
produced customized banners, greeting cards, and posters. 2 47 In
1984, Broderbund Software, Inc ("Broderbund") began distributing
Print Shop. 248 At that time, the program was compatible only with
Apple computers. 24 9 Subsequently, Broderbund and Unison World,
Inc. ("Unison World") began negotiations to alter the program and
make it operable on IBM computers. 250 An agreement, however, was
never reached between the two companies and the negotiations
ended. 25 1 Before the negotiations terminated, however, Unison had
already begun to develop the IBM-compatible software using the Apple software supplied by Broderbund. 252 During the next year Unison
completed work on the allegedly infringing program, entitled
"Printmaster," and began to market it in March 1985.253 Shortly
thereafter, Broderbund and Pixellite then brought a copyright in25 4
fringement against Unison in the district court.
The district court emphasized that a variety of existing methods
of expression were available to a programmer which would achieve the
same function as Print Shop. 2 55 Although the court found adequate
direct evidence that copying had taken place, the court, "in the interest of creating a comprehensive record," addressed the issues of access
and substantial similarity. 2 56 Initially, the court found that Unison
244. See infra notes 255-66 and accompanying text.
245. 648 F. Supp. 1127 (N.D. Cal. 1986).
246. Broderbund Software, Inc. v. Unison World, Inc., 648 F. Supp. 1127, 1129,
(N.D. Cal. 1986). Broderbund Software, Inc. was the exclusive licensee of the copyrighted software. Broderbund Software, Inc., 648 F. Supp. at 1129-30.
247. Broderbund Software, Inc., 648 F. Supp. at 1131.
248. Id. at 1130.
249. Id.
250. Id.
251. Id. at 1131.
252. Id. at 1130-31.
253. Id.
254. Id. at 1131.
255. Id. at 1134.
256. Id. at 1135-36. The court stated that direct evidence of copying consisted in
part of the uncontradicted testimony that Unison World's president, Hong Lu, and products manager, David Lodge, instructed their programmers to copy the Broderbund program. Id. at 1130-31, 1135.
1378
CREIGHTON LAW REVIEW
[Vol. 30
had access to several copies of the copyrighted Pixellite program. 2 57
While Unison did not have access to the source or object code of the
copyrighted work, the court indicated that copying could be accomplished without such access. 25 s In order to determine substantial sim25 9
ilarity, the court applied an "extrinsic" test and an "intrinsic" test.
The court explained that the extrinsic test was used to determine if
any substantial similarities were present in the underlying ideas of
the two works at issue. 260 The intrinsic test, on the other hand, was
used to determine if any substantial similarity existed with regard to
26 1
the underlying idea's expression.
The district court's application of the extrinsic test showed that
the two programs were substantially similar. 2 62 The court found that
the banner, greeting cards, and posters a user could achieve with the
programs, as well as the printers used by each, were identical. 2 6 3 The
court also found substantial similarity when applying the intrinsic
test. 264 The court stated that the screens of the two programs possessed an "eerie resemblance," as well as finding that the screen sequence, layout, choices offered, and mode of feedback were all
substantially similar. 26 5 Accordingly, the court concluded Unison in26 6
fringed on the copyright held by Pixellite.
257. Broderbund Software, Inc., 648 F. Supp. at 1136.
258. Id.
259. Id.
260. Id. The district court stated that expert testimony may be received for the extrinsic test only. Id.
261. Broderbund Software, Inc., 648 F. Supp. at 1136.
262. Id. at 1136-37.
263. Id. at 1136.
264. Id. at 1137.
265. Id. The court stated that "no ordinary observer could reasonably conclude that
the expression of the ideas underlying these two programs were not substantially similar." Id.
266. BroderbundSoftware, Inc., 648 F. Supp. at 1138. For a case declining to find
copyright infringement despite there being substantial similarity between two programs, see Plains Cotton Co-op. Ass'n v. Goodpasture Computer Serv., Inc., 807 F.2d
1256 (5th Cir. 1987). This matter was a copyright infringement case involving computer programs that were designed by the Plains Cotton Cooperative Association
("Plains Cotton") to allow users to obtain information regarding the cotton market.
PlainsCotton Co-op. Ass'n, 807 F.2d at 1258. The individuals instrumental in creating
the Plains Cotton software subsequently went to work for Goodpasture Computer Service ("Goodpasture"). Id. at 1258. One of these former Plains Cotton employees, Richard R. Fisher, brought with him the program designs of the Plains Cotton software
when he went to work for Goodpasture. Id. at 1259. Shortly thereafter, Goodpasture
developed its own program which was similar to the program produced and copyrighted
by Plains Cotton. Id.
Plains Cotton commenced a copyright infringement action in the United States District Court for the Northern District of Texas seeking a preliminary injunction. Id. at
1257. The district court, however, determined the authors of the Goodpasture program
relied on their experience and knowledge of the cotton industry and did not copy the
1997]
COPYRIGHT PROTECTION
1379
While Broderbund addressed the audiovisual displays of a computer program, the United States District Court for the District of
Connecticut concluded that copyright infringement occurred when the
screen displays of two separate programs were found to be substantially similar. 2 67 In ManufacturersTechnologies, Inc. v. Cams, Inc.,268
the district court held that a copyright owned by Manufacturers Technologies, Inc.'s ("MTI") was infringed by Cams, Inc. ("Cams") when
Cams willfully copied the screen displays associated with MTI's copyrighted computer program. 26 9 In 1982, MTI created a program that
allowed a user to predetermine the cost of producing certain manufactured parts. 2 70 With the assistance of two former MTI sales associates and photographs of seven screen displays created by the MTI
271
program, Cams developed a program that achieved the same end.
Soon thereafter, MTI filed suit in district court alleging that Cams infringed upon MTI's copyrights when Cams created its own
program.272
Cams did not contest MTI's ownership of the copyrights in question, but instead argued that functional considerations severely limited the manner in which Cams could express the idea of costestimating.2 73 Therefore, Cams argued, any cost-estimation program
would be similar, perhaps even identical, to the program created by
MTI. 2 74 The district court rejected this argument, stating that the sePlains Cotton work when they created the Goodpasture program. Id. at 1260-61. Thus,
the district court denied the injunction sought by Plains Cotton. Id. at 1259.
On appeal to the United States Court of Appeals for the Fifth Circuit, the court
noted that, but for an abuse of discretion by the district court, the Fifth Circuit was
required to affirm the judgment of the district court. Id. The Fifth Circuit declined to
find that the district court had abused its discretion, noting that the district court was
entitled to rely on the testimony of several witness who collectively maintained the
Goodpasture program was the result of the authors' experience and knowledge of the
cotton industry and was not created by copying the. Plains Cotton program. Id. at 126061. Thus, the Fifth Circuit affirmed the district court's denial of the injunction sought
by Plains Cotton. Id. at 1262.
267. Broderbund Software, Inc., 648 F. Supp. at 1138. See infra notes 277-81 and
accompanying text.
268. 706 F. Supp. 984 (1989).
269. Manufacturers Tech., Inc. v. Cams, Inc., 706 F. Supp. 984, 1002 (D. Conn.
1989). The court found that copyrights which had been registered for the screen displays and the program itself had both been infringed. Id. The United States Copyright
Office decided that copyright registration for a computer program extends to the screen
display and no longer accepts separate registrations. Id. at 990-91. The court in Manufacturers Technologies specifically found that a single copyright registration of a computer program would register the program itself and the screen displays or user
interface of that program. Id. at 993.
270. Manufacturers Tech., Inc., 706 F. Supp. at 988.
271. Id. at 988, 990.
272. Id. at 987, 990.
273. Id. at 993.2
274. Id.
1380
CREIGHTON LAW REVIEW
[Vol. 30
quence and flow of screen displays present in the MTI program were
unique to the user operating the program and not dictated by functional considerations. 2 75 The screen display of the MTI program provided the user with a status report as the program operated, and the
court found the selection of what was reflected in the status report
27 6
was copyrightable expression.
The district court stated that in order to prevail on its claim of
copyright infringement MTI had to prove that its program and the one
produced by Cams were substantially similar. 27 7 In its substantial
similarity analysis, the court applied a two-part test, which first addressed whether the non-protected aspects of the programs were so
analogous that copying was indicated, and secondly, examined the
similarities between any of the protected elements of copyrighted program and the allegedly infringing work to discover if infringement had
occurred. 2 78 In applying the first part of this test, the court noted that
MTI offered testimony from several witnesses which indicated that
the independent development of the screen pages present in these programs was impossible. 2 79 As for the second part, the court found that
the sequencing and flow of the screen displays in both programs paralleled each other. 28 0 Given the similarity present between these two
programs, the court held that Cams' "illicit copying" of the protected
28
screen displays constituted copyright infringement. '
In Telemarketing Resources v. Symantec Corporation,28 2 however,
the United States District Court for the Northern District of California found that portions of two computer outlining programs were sufficiently different to preclude a finding of infringement. 28 3 In
Telemarketing Resources, the programmer, John L. Friend, developed
both programs; the first he sold to Brown Bag Software ("Brown Bag"),
and the second, a later version, he sold to the Symantec Corporation
("Symantec").2 84 Brown Bag maintained that the subsequent pro275. Id. at 994.
276. Id. at 996.
277. Id. at 990. The district court also stated that MTI had to prove that Cams had
access to the MTI screen displays which was clearly established from the facts of the
case. Id. at 1000.
278. ManufacturersTech., Inc., 706 F. Supp. at 1000. The district court stated that
expert testimony may be received in order to make the first determination. Id.
279. Manufacturers Tech., Inc., 706 F. Supp. at 1000.
280. Id. at 1001.
281. Id. at 1001-02.
282. 1989 WL 200350 (N.D. Cal. 1989), affd in partsub nom. Brown Bag Software
v. Symantec Corp., 960 F.2d 1465 (9th Cir. 1992).
283. Telemarketing Resources, v. Symantec Corp., No. C88-20352 RPA, 1989 WL
200350, at *6-7 (N.D. Cal. 1989), affd in part sub noa. Brown Bag Software v. Symantec Corp., 960 F.2d 1465 (9th Cir. 1992).
284. Telemarketing Resources, 1989 WL 200350, at *1.
1997]
COPYRIGHT PROTECTION
1381
gram infringed upon its copyright of the earlier program. 28 5 Symantec responded that the features it28 6purportedly copied were
unprotectable ideas and not expressions.
The district court applied both the "extrinsic" and "intrinsic" analyses to determine whether the two programs were substantially similar. 2 8 7 The court noted that aesthetic differences existed between the
programs, such as the pull down menus and color schemes used in the
screen displays. 288 Additionally, the court determined that different
functions were offered by each program and those functions were not
similarly accessed. 28 9 Thus, the district court concluded that Brown
Bag failed to establish that substantial similarity existed between the
two programs. 290 Accordingly, the district court entered2 9summary
1
judgment for Symantec, from which Brown Bag appealed.
On appeal, the United States Court of Appeals for the Ninth Circuit upheld the district court's grant of summary judgment. 2 92 The
Ninth Circuit addressed Brown Bag's contention that the district
court erred in its substantial similarity analysis. 29 3 Specifically,
Brown Bag argued that the district court erred when it compared
"specific screens, menus, and keystrokes" and did not adequately evaluate the "overall look and feel" of the two programs in its analysis of
substantial similarity. 2 94 The Ninth Circuit disagreed, noting that it
was proper for the district court to compare the expression present
within the two programs, a comparison that was performed at the request of Brown Bag, who had never requested that the district court
285. Id. at *2.
286. Id.
287. Id. at *3.
288. Id. at *6.
289. Id. at *5.
290. Id. at *6-7. Brown Bag maintained that printing, editing, and accessing work
being done with either program showed substantial similarity. Id. at *4-5. The court
rejected this assertion, stating that these concepts are inherent to any computer outlining program. Id. at *4.Brown Bag also pointed out that nine functions offered on both
programs were similar. Id. at *5. The court agreed, but pointed out that these functions were extremely different in their corresponding features. Id. Brown Bag argued
further that similarity was shown by the pull down menus and main editing screens of
the two programs. Id. This argument similarly failed before the district court, since the
pull down menus of the two programs looked different. Id. As for the main editing
screens, the court found that such a devise was essential to the idea of the program. Id.
The court indicated that while some of the colors present in the two screens were similar, the limited number of colors from which to choose prevented copyright protection
for a choice of colors. Id. Lastly, Brown Bag directed the court's attention to the similarities in the opening menus of the two programs. Id. at *6. The court noted that each
program's opening menu offered a different number of options, distinct descriptions of
the functions, and different access to the functions. Id.
291. Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1468 (9th Cir. 1992).
292. Brown Bag Software, 960 F.2d at 1478.
293. Id. at 1473.
294. Id. at 1475.
1382
CREIGHTON LAW REVIEW
[Vol. 30
measure the "overall look and feel" of the programs at issue. 29 5 Accordingly, the Ninth Circuit affirmed the judgment of the district
court.
2 96
Subsequently, in 1992, the United States Court of Appeals for the
Second Circuit fashioned the abstraction-fitration-comparison test, a
three-step analysis to determine whether a computer program's nonliteral elements were substantially similar. 29 7 In the first step of the
analysis, the abstraction phase, a court disassembles the copied program's structure and identifies the elements present within it. 298 The
starting point of the abstraction analysis is an examination of the program's code, and the inquiry ends with an explanation of the program's function. 2 99 The second step, filtration, scrutinizes the
structural components of the program. 300 The purpose of filtration is
to determine whether each component is (1) an "idea," (2) is incidental
to the idea because of concerns for efficiency, (3) is a component required by factors other than the program, or (4) is nonprotectable expression obtained from the public domain. 30 1 The final step in the
analysis is comparison.3 0 2 The comparison phase determines whether
the protected expression has been duplicated; if so, the court must also
evaluate the significance of the copied expression as it relates to the
303
copyrighted program as a whole.
In Computer Associates International, Inc. v. Altai, Inc.,304 the
United States Court of Appeals for the Second Circuit first announced
the abstraction-fitration-comparison test for substantial similarity. 30 5 In Altai, a job scheduling program was created by Computer
Associates International ("CA") which allowed the user to operate
295. Id. at 1476.
296. Id. at 1478.
297. See infra notes 298-303, 318 and accompanying text.
298. Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 707 (2nd Cir. 1992).
The United States Court of Appeals for the Tenth Circuit identified the "elements" to
include the program's main purpose, structure and architecture, modules, algorithms
and data structures, source code, and object code. Gates Rubber Co., 9 F.3d at 835.
299. Computer Assocs. Int'l, Inc., 982 F.2d at 707.
300. Id.
301. Id. For example, an "idea" would be a general statement concerning what the
work is about. Id. at 705. An example of a component essential to the idea because of
concerns for efficiency would be if there was only one or two subroutines possible for a
given program that could achieve a particular option. Id. at 708. Similarly, the
mechanical specifications of a computer is a factor other than the program which could
restrict a programmer's freedom of choice. Id. at 709-10. Further, an example of nonprotectable expression present in the public domain are works created in antiquity.
Concrete Mach. Co., Inc., 843 F.2d at 610.
302. Computer Assocs. Int'l, Inc., 982 F.2d at 710.
303. Id.
304. 982 F.2d 693 (2nd Cir. 1992).
305. MiTek Holdings, Inc. v. Arce Eng'g Co., Inc., 864 F. Supp. 1568, 1577 (S.D. Fla.
1994), aftd, 89 F.3d 1548 (11th Cir. 1996).
COPYRIGHT PROTECTION
1997]
1383
multiple operating systems while maintaining the same software on a
computer.3 0 6 Altai created its own job scheduling program (the "first
Altai program"), with the assistance of a former CA programmer,
Claude F. Arney, III, and a copy of the source code for the CA program. 30 7 Mr. Arney incorporated thirty percent of this source code in
the first Altai Program.3 0S Once Altai discovered what Mr. Arney had
done, its president, James P. Williams, arranged to have the Altai program rewritten so that any portion obtained from the CA program
would not be retained, which resulted in yet another Altai program
(the "second Altai program"). 30 9 After discovering that Altai may
have appropriated a portion of its program, CA obtained a copyright in
its program and filed a copyright infringement action in the United
3 10
States District Court for the District of New Jersey.
The district court held that Altai was liable to CA only for the
copyright infringement that led to the first Altai program. 31 1 The district court did not find that CA's copyright was infringed when the
second Altai program was created because a comparison of the two
programs revealed that copied portions of the CA program either
could not be protected by copyright or that the two programs were not
substantially similar. 312 In concluding that the two programs were
not substantially similar, the district court separated the second Altai
program by levels of abstraction, excluded any expression which was
not protectable by copyright, and then addressed the similarities remaining in elements of the two programs. 3 13 The remaining elements, the court noted, were either not protectable by copyright or not
substantially similar.3 14 Accordingly, the district court denied CA re306.
307.
308.
Computer Assocs. Int'l, 982 F.2d at 699.
Id. at 699-700.
Id. at 700.
309. Id.
310.
Eastern
311.
312.
313.
Id. The case was later transferred to the United States District Court for the
District of New York. Id.
Computer Assocs. Int'l, 982 F.2d at 701.
Id. at 714-15.
Id. at 714.
314. Id. at 714-15. The district court found that the second Altai program contained
"virtually no lines of code" from the CA program. Id. at 714. With regard to the parameter lists and macros of the two programs, the district court found any elements copied
were minimal, taken from the public domain, or imposed by the programs' functional
demands. Id. Further, the district court found the similarities present between the "list
of services" present in the two programs were imposed by the other programs with
which the CA and second Altai programs were designed to interact, and therefore were
not grounds for copyright infringement. Id. Lastly, the district court determined similarities between the program's organizational charts "follow naturally from the work's
theme" rendering them unprotectable due to the scene a faire doctrine. Id. at 715.
1384
CREIGHTON LAW REVIEW
[Vol. 30
to
lief on this portion of its copyright infringement claim; CA appealed
3 15
the United States Court of Appeals for the Second Circuit.
On appeal, CA contended that the district court had erred in its
substantial similarity analysis in not concluding that the second Altai
program infringed on CA's copyright in its program. 3 16 The Second
Circuit pointed out that copyright protection extends to the literal and
nonliteral portions of a computer program. 3 17 In determining the
scope of this protection, the Ninth Circuit stated that district courts
would be "well-advised" to apply the abstraction-fitration-comparison
test "in order to determine whether the nonliteral elements of two or
more computer programs are substantially similar."3 18 Because the
Second Circuit accepted the district court's "overly thorough" substantial similarity analysis, the district court's denial of CA's copyright infringement claim was affirmed. 3 19
The following year the United States Court of Appeals for the
Tenth Circuit applied the abstraction-filtration-comparison test in
Autoskill, Inc. v. NationalEducationalSupport Systems, Inc.,320 in order to determine whether any portion of a copyrighted computer program designed to assist students with their reading skills was
protectable by copyright and, if so, whether these protectable elements
were substantially similar to an allegedly infringing work. 3 2 1 In
Autoskill, a Canadian software development company, Autoskill, Inc.
("Autoskill"), developed and copyrighted an educational computer program and then negotiated with National Educational Support Systems, Inc. ("NESS") to market the program. 3 22 After failing to obtain
the marketing rights to the Autoskill program, NESS enlisted the
3 23
services of a programmer to assist it in developing its own program.
Less than two years after the NESS program was completed, Autoskill
brought a copyright infringement action seeking to enjoin NESS from
manufacturing or distributing any portion of its program containing
32 4
elements of the Autoskill program.
Granting the requested injunction, the United States District
Court for the District of New Mexico found that Autoskill would likely
315. Computer Assocs. Int'l, 982 F.2d at 701, 715.
316. Id. at 701.
317. Id. at 702. This protection is similar to that afforded to literary works. Id. at
701.
318. Computer Assocs. Int'l, 982 F.2d at 706.
319. Id. at 714-15.
320. 994 F.2d 1476 (10th Cir. 1993).
321. Autoskill, Inc. v. National Educ. Support Sys., Inc., 994 F.2d 1476, 1481, 1490
(10th Cir. 1993).
322. Autoskill, Inc., 994 F.2d at 1481.
323. Id. at 1481-82. NESS provided its programmers with an Autoskill sales
brochure in order to assist their development of the new program. Id. at 1482.
324. Autoskill, Inc., 994 F.2d at 1482.
1997]
COPYRIGHT PROTECTION
1385
succeed on the merits of its infringement claim. 3 25 The district court
identified numerous similarities between the NESS program and the
"most important protectable aspects of Autoskill's Program," which included the reading test protocols, word choices, feedback provided to
the user, and the user's progression through the tests. 3 26 NESS appealed the district court's
ruling to the United States Court of Appeals
3 27
for the Tenth Circuit.
The Tenth Circuit initially determined that NESS failed to rebut
the presumption of ownership created by Autoskill's copyright registration certificate, the first element of a copyright infringement
claim. 3 28 The court then addressed the issue of whether NESS had
copied the Autoskill program. 32 9 To circumstantially satisfy this element, the court noted, Autoskill must show that the alleged infringer
had access to the copyrighted work and developed a program substantially similar to its own. 330 The Tenth Circuit found there to be "no
question that NESS had access to the Autoskill Program" and agreed
with the district court that the NESS founders were "'thoroughly familiar with the Autoskill Program.'" 33 1 The court's inquiry then
sought to identify whether the two programs were substantially
332
similar.
The Tenth Circuit noted that the district court used a variation of
the abstraction-fitration-comparison test set forth in the Second Circuit's Altai decision. 33 3 The Tenth Circuit affirmed the district court's
findings regarding the abstraction phase, noting that the concept of
the program-to teach reading skills-could not be copyrighted because it was an idea. 33 4 Moreover, the Tenth Circuit affirmed the dis-
trict court's conclusions that the portion of the Autoskill program
which placed students into special categories according to their respective reading difficulties was public information and could not be
copyrighted. 33 5 Prior to concluding the abstraction portion of its anal325. Autoskill, Inc. v. National Educ. Support Sys., Inc., 793 F. Supp. 1557, 1573
(D.N.M. 1992), afftd, 994 F.2d 1476 (10th Cir. 1993). The district court also found that
Autoskill owned a valid copyright and, with regard to access, "there is no question that
NESS had access to the Autoskill program." Autoskil, Inc., 793 F. Supp. at 1563.
326. Autoskill, Inc., 793 F. Supp. at 1569.
327. AutoskilU, Inc., 994 F.2d at 1481.
328. Id. at 1487-88.
329. Id. at 1489.
330. Id.
331. Id. at 1489-90. One of the NESS founders had sold computers which contained
the Autoskill program. Id. at 1490.
332. Autoskill, Inc., 994 F.2d at 1490-91.
333. Id. at 1490. For a complete discussion of the Computer Assocs. Int'l, Inc. case,
see supra notes 297-319 and accompanying text.
334. Autoskill, Inc., 994 F.2d at 1492-93.
335. Id. at 1492.
1386
CREIGHTON LAW REVIEW
[Vol. 30
ysis, the Tenth Circuit addressed a section 102(b) argument made by
NESS. 33 6 NESS maintained that copyright protection would deny
others the "educational processes, methods and procedures . . ." con-
tained in the Autoskill program. 33 7 The Tenth Circuit disagreed with
NESS' argument and concurred with the trial court's statement that
"more than a literal application of the statute is required."3 38
The Tenth Circuit also affirmed the district court's findings
throughout its filtration analysis. 339 The program's mode of testing
and diagnosis of reading disabilities survived the Tenth Circuit's filtration analysis, despite NESS' argument that the entire Autoskill
program had been obtained from the public domain and could not be
copyrighted.3 40 The Tenth Circuit noted that the elements remaining
after fitration revealed numerous similarities; for example, the tests
given as well as the types of words used by each program were identical. 34 1 Thus, the Tenth Circuit affirmed the district court's findings
34 2
and resolution of Autoskill's copyright infringement claim.
At least one court has applied the abstraction-filtration-comparison test and concluded that a computer program's menu command
structure is not subject to copyright protection. 34 3 In MiTek Holdings,
Inc. v. Arce EngineeringCo., Inc.,344 the United States District Court
for the Southern District of Florida concluded that the menu used by a
program designed to produce architectural blueprints was "a process
that is not entitled to copyright protection."3 45 In MiTek, the copyrighted program was owned by MiTek Holdings, Inc. ("MiTek") and
was written by its then-employee Emilio Sotolongo. 34 6 Sotolongo left
MiTek's employ to work for Arce Engineering Co., Inc. ("Arce"), where
he was instructed to develop a similar program "'from scratch."' 3 4 7
Shortly after completion of the Arce program, MiTek filed a copyright
336. Id. at 1493.
337. Id.
338. Id.
339. Id. at 1496.
340. Id.
341. Id. at 1497. It is doubtful that NESS was aided by its concession that there
were "many similarities" between the two programs and the testimony of a lead NESS
witness that elements of the Autoskill program that were arguably protectable were
present in the NESS program. Id.
342. Autoskill, Inc., 994 F.2d at 1498.
343. MiTek Holdings, Inc. v. Arce Eng'g Co., Inc., 864 F. Supp. 1568, 1580 (S.D. Fla.
1994), affd, 89 F.3d 1548 (11th Cir. 1996).
344. 864 F. Supp. 1568 (S.D. Fla. 1994), aftd, 89 F.3d 1548 (11th Cir. 1996).
345. MiTek Holdings, Inc., 864 F. Supp. at 1580. The program at issue was a "layout program" whose purpose it was to determine the size and location of wood trusses
within a structure. Id. at 1572. Wood trusses are a group of beams that support a roof.
Id.
346. MiTek Holdings, Inc., 864 F. Supp. at 1572-73.
347. Id. at 1574.
1997]
COPYRIGHT PROTECTION
1387
infringement action, alleging that eighteen nonliteral elements of its
program were protected by copyright and infringed upon when Arce
3 48
developed its own program.
The district court analyzed these eighteen nonliteral elements using the widely accepted abstraction-filtration-comparison test.34 9 Because the parties identified the nonliteral elements of the program at
issue, the court's analysis was confined to the filtration and comparison portions of the test. 5 0° During application of the fitration analysis, the district court "'flter[ed] out' the unprotectable elements [of the
program] to obtain a core of protectable expression." 35 1 One of the
elements fitered out by the district court was the MiTek program's
"main menu command system" because the court determined it was
an unprotectable process.3 52 Despite testimony that the menus of the
two programs operated "in an almost identical manner," the district
court denied MiTek protection for its menu because the menu's operation was similar to that of a draftsman attempting to complete the
same task manually. 353 The district court then examined the visual
appearance of each menu and found they were not substantially similar.3 5 4 This filtration analysis did not render unprotectable the entirety of the MiTek program, as the district court found that four out
of five protectable elements of the MiTek program were substantially
similar to portions of the Arce program.3 5 5 The district court determined, however, that the elements which were substantially similar
were "de minimis" and, accordingly, denied MiTek's request for a pre3 56
liminary injunction.
ANALYSIS
In Lotus Development Corp. v. Borland International,Inc. ,357 the
United States Court of Appeals for the First Circuit held that a menu
command hierarchy was a "method of operation" as defined in Title 17
348. Id. at 1574-75.
349. Id. at 1577, 1579-84. The district court found that MiTek held a valid copyright
in its program and that Arces had access to the MiTek program since both were authored by Emilio Sotolongo. Id. at 1579. This left the court's consideration only
whether the MiTek and Arces programs were substantially similar. Id.
350. MiTek Holdings, Inc., 864 F. Supp. at 1579.
351. Id. at 1578.
352. Id. at 1579-80.
353. Id. at 1580.
354. Id.
355. Id. at 1584. These were the "shorthand method of entering distances with the
mouse," the "expression of work planes without reference to real walls," the "use of reference lines," the "entry of walls in free form," and the "expression of three dimensional
views by the entry of two angles." Id. at 1583-84.
356. MiTek Holdings, Inc., 864 F. Supp. at 1584-85.
357. 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision).
1388
CREIGHTON LAW REVIEW
[Vol. 30
of the United States Code section 102(b) ("section 102(b)") and, accordingly, was not subject to copyright protection. 358 Although a computer's menu command hierarchy is arguably subject to copyright
protection given its originality and expression, the First Circuit relied
instead on section 102(b) to deny copyright protection. 3 59 Despite contrary holdings by other federal courts that similar user interfaces may
be protected by copyright, the court in Borland disagreed, stating that
"the initial inquiry should not be whether individual components of a
menu command hierarchy are expressive, but rather whether the
menu command hierarchy as a whole can be copyrighted." 360 The
First Circuit's holding has the potential to severely restrict copyright
protection for user interfaces. 36 1 Indeed, such an overinclusive view
of section 102(b) could have broad reaching consequences, such as precluding copyright protection for many menus and user interfaces. 3 62
In Borland, the United States District Court for the District of
Massachusetts found that the copyright possessed by Lotus Development Co. ("Lotus") in the spreadsheet program Lotus 1-2-3 was infringed by Borland International ("Borland") when Borland
incorporated the Lotus 1-2-3 menu into its Quattro and Quattro Pro
programs. 3 6 3 The district court found the Lotus 1-2-3 menu was an
original work and contained expression, noting that several different
methods were available to Lotus in order to achieve the desired
menu. 3 64 It was the definition, arrangement, and identification of the
commands within the menu, the court found, that allowed the menu to
358. Lotus Dev. Corp. v. Borland Intl, Inc., 49 F.3d 807 (1st Cir. 1995), affd mem.,
116 S. Ct. 804 (1996) (4-4 decision). For the full text of section 102(b), see supranote 30.
359. Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 68 (D. Mass.
1990) (holding that the Lotus 1-2-3 menu command structure is an "original and nonobvious" mode of expression); Lotus Dev. Corp. v. Borland Int'l, Inc., 799 F. Supp. 203, 209
(D. Mass. 1992), rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4
decision) (stating that "a menu command hierarchy is copyrightable subject matter").
Author's note: hereinafter this case will be referred to as Borland II.
360. Lotus Dev. Corp., 49 F.3d at 815; Manufacturers Tech., Inc. v. Cams, Inc., 706
F. Supp. 984, 1002 (D. Conn. 1989) (finding that "screen pages" could be protected by
copyright); Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F.
Supp. 449, 463 (N.D. Ga. 1987) (holding that the "arrangement and design of parameter/command terms" within a "status screen" can be protected by copyright);
Broderbund Software, Inc. v. Unison World, Inc., 648 F. Supp. 1127, 1138 (N.D. Cal.
1986) (concluding that "audiovisual displays" may be protected by copyright).
361. Dale M. Cendali & Martin Glenn, In Lotus, the 1st Circuit Departedfrom Precedent, Narrowing Protection for Developed Software and Giving Crafty Litigators a
Blank Disk on Which to Write, 17 NAT'L L.J. B7 (May 15, 1995).
362. Arthur R. Miller, Copyright Protectionfor Computer Programs,Databases,and
Computer-GeneratedWorks: Is Anything New Since CONTU?, 106 HARv. L. REV.978,
1008 (1993).
363. Borland 11, 799 F. Supp. at 223.
364. Id. at 218.
1997]
COPYRIGHT PROTECTION
1389
be protected by copyright.3 6 5 Accordingly, the district court granted
the permanent injunction requested by Lotus prohibiting Borland
from manufacturing or distributing its Quattro or Quattro Pro computer programs containing any form of the Lotus 1-2-3 menu com3 66
mands or structure.
The United States Court of Appeals for the First Circuit reversed,
holding that section 102(b) precluded copyright protection for the
menu command hierarchy of Lotus 1-2-3.367 Noting that section
102(b) does not allow a method of operation to be copyrighted, and
that a method of operation "refers to the means by which a person
operates something," the First Circuit concluded that the Lotus 1-2-3
menu was an unprotectable method of operation. 3 68 Moreover, the
First Circuit declined to apply the abstraction-fitration-comparison
analysis typically undertaken by courts addressing copyright infringement claims involving computer software. 3 6 9 The First Circuit found
this test "to be of little help in assessing whether the literal copying of
3 70
a menu command hierarchy constitutes copyright infringement."
Thus, the First Circuit relied solely on section 102(b), finding that Borland did not commit copyright infringement when it placed an identi371
cal copy of the Lotus menu in its own computer program.
THE CONGRESSIONAL INTENT BEHIND SECTION 102(B) AND THE
JUDICIAL INTERPRETATIONS THAT FOLLOWED
As part of the Copyright Act of 1976, Congress enacted section
102(b), intending to codify the idea-expression dichotomy.3 7 2 That intent is reflected in the legislative history, specifically in House Report
No. 94-1476 ("House Report"), which states that section 102(b) was
intended "to make clear that the expression adopted by the program365. Lotus Dev. Corp. v. Borland Intl, Inc., 831 F. Supp. 202, 211 (D. Mass. 1992),
reu'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision). Author's note: hereinafter this case will be referred to as Borland III.
366. Lotus Dev. Corp. v. Borland Intl, Inc., 831 F. Supp. 223, 245-46 (D. Mass.
1993), rev'd, 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision).
Author's note:
hereinafter this case will be referred to as Borland IV.
367. Lotus Dev. Corp., 49 F.3d at 815.
368. Id.
369. Id. at 815; MiTek Holdings, Inc. v. Arce Eng'g Co., Inc., 864 F. Supp. 1568, 1577
(S.D. Fla. 1994) (stating that the approach for determining the copyrightability of the
nonliteral elements of a computer program is the widely accepted "abstraction-filtration-comparison"test), affd, 89 F.3d 1548 (11th Cir. 1996).
370. Lotus Dev. Corp., 49 F.3d at 815.
371. Id. at 819.
372. The Copyright Act of 1976, Pub. L. No. 94-553, § 102(b), 90 Stat. 2541, 2545;
Steven R. Englund, Note, Idea, Process, or Protected Expression?: Determining the
Scope of Copyright Protection of the Structure of Computer Programs,88 MICH. L. REV.
866, 875 (1990).
1390
CREIGHTON LAW REVIEW
[Vol. 30
mer is the copyrightable element in a computer program, and that the
actual processes or methods embodied in the program are not within
the scope of the copyright law."3 73 The House Report further main-
tained that section 102(b) "in no way enlarges or contracts the scope of
dichotomy between exprescopyright protection" and that "the3 basic
74
sion and idea remains unchanged."
While the First Circuit maintained that it was "navigating in unchartered waters," other courts have addressed section 102(b) as it applies to the copyright infringement of a computer program. 3 75 In fact,
the Congressional intent behind section 102(b) has been addressed by
several federal courts. 3 76 For example, in Autoskill, Inc. v. National
Educational Support Systems, Inc.,3 77 the United States District
Court for the District of New Mexico noted that Congress had no intention of affecting the scope of copyright protection by enacting section 102(b).3 7 8 Indeed, when applying section 102(b), the district court
stated that "more is required, however, than a literal application of
the language of the statute."3 79 The district court in Autoskill determined that, when applying section 102(b), a comparison of the computer program at issue with relevant case law addressing the
dichotomy between idea and expression was a "must."3
0
Further, in
Gates Rubber Co. v. Bando Chemical Industries, Ltd.,381 the United
States Court of Appeals for the Tenth Circuit determined that section
102(b) codified the "fundamental tenet" of copyright law that original
expression may be protected by copyright, while the same protection is
373. H.R. REP. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659,
5670.
374. Id.
375. Lotus Dev. Corp., 49 F.3d at 813 (stating that "we know of no cases that deal
with the copyrightability of a menu command hierarchy standing on its own (i.e., without other elements of the user interface, such as the screen displays, in issue)."). See
infra notes 377-87 and accompanying text.
376. See infra notes 377-87 and accompanying text.
377. 793 F. Supp. 1557 (D.N.M. 1992), affd, 994 F.2d 1476 (10th Cir. 1993).
378. Autoskill, Inc. v. National Educ. Support Sys., Inc., 793 F. Supp. 1557, 1564
(D.N.M. 1992), affd, 994 F.2d 1476 (10th Cir. 1993). See also Computer Assocs. Intl,
Inc. v. Altai, Inc., 982 F.2d 693, 703 (2d Cir. 1992) (stating that Congress intended the
copyright
in
a computer program to protect the "'programmer's expression of original
ideas, as distinguished from the ideas themselves"'); Whelan Assocs., Inc. v. Jaslow
Dental Lab., Inc., 797 F.2d 1222, 1234 (3d Cir. 1986) (finding that Congress aimed to
codify the idea-expression dichotomy when it adopted § 102(b)); M. Kramer Mfg. Co.,
Inc. v. Andrews, 783 F.2d 421, 434-35 (4th Cir. 1986) (stating the "legislative purpose"
of § 102(b) was to allow the "expression" found within a computer program to be
copyrighted).
379. Autoskill, Inc., 793 F. Supp. at 1564.
380. Id.
381. 9 F.3d 823 (10th Cir. 1993).
COPYRIGHT PROTECTION
1997]
1391
not available to the ideas found within that expression.38 2 The Tenth
Circuit also construed the legislative history behind section 102(b) as
clarifying any ambiguity concerning the state of the copyright of
processes.3 8 3 Although section 102(b) prohibits processes from being
copyrighted, the Tenth Circuit noted that an author's description of a
process can be protected by copyright so long as it contains some originality. 38 4 Similarly, in Lotus Development Corporation v. Paperback
3 8 5 the United States District Court for the
Software International,
District of Massachusetts found that Congress intended to use the
idea-expression dichotomy "as part of the test of copyrightability for
computer programs." 38 6 The district court in Paperback determined
that Congress "extend[ed] copyright protection to original expression
embodied in computer programs .... ." and that such a "conclusion is
consistent with the treatment of other kinds of intellectual works
"387
In Borland, however, the First Circuit chose to define a section
102(b) "method of operation" as "the means by which a person operates something, whether it be a car, a food processor, or a computer."38 8 Citing no precedent to support this definition, or its
conclusion that the "Lotus menu command hierarchy is a method of
operation," the First Circuit held the Lotus menu command hierarchy
was "uncopyrightable." 38 9 Despite Gates Rubber and Paperback,
which collectively stand for the proposition that original expression
present in a computer program may be protected by copyright, and the
admonition of Autoskill that more than a literal application of section
102(b) was required, the First Circuit denied copyright protection to
the Lotus menu command hierarchy. 390 Construing the First Circuit's conclusion as an overinclusive view of section 102(b), copyright
protection would, arguably, no longer be available for a computer pro391
gram's menu and user interface.
382.
Gates Rubber Co. v. Bando Chemical Indus., Ltd., 9 F.3d 823, 836 (10th Cir.
1993).
383. Gates Rubber Co., 9 F.3d at 836.
384. Id. at 837.
385. 740 F. Supp. 37 (D. Mass. 1990).
386. Paperback Software Int, 740 F. Supp. at 54.
387. Id.
388. Lotus Dev. Corp., 49 F.3d at 815.
389. Id.
390. Lotus Dev. Corp., 49 F.3d at 819; Gates Rubber Co., 9 F.3d at 836-37; Autoskill,
793 F. Supp. at 1564; PaperbackSoftware Int'l, 740 F. Supp. at 54.
391. Miller, 106 HARv. L. REv. at 1008.
1392
CREIGHTON LAW REVIEW
[Vol. 30
JUDICIAL OPINIONS ADDRESSING MENUS, SCREEN DISPLAYS, AND
PROGRAM STRUCTURE
In Borland, the First Circuit initially addressed whether the Lotus menu command hierarchy could be copyrighted.3 9 2 The First Circuit resolved this inquiry, determining that the Lotus menu command
393
hierarchy was, pursuant to section 102(b), a method of operation.
Because a method of operation cannot be copyrighted, the First Circuit reasoned, Borland did not infringe on the Lotus copyright when it
and placed it into its Quattro
copied the menu command 3 hierarchy
94
and Quattro Pro programs.
However, the First Circuit in Borland was not the first federal
court to address the copyrightability of a menu present in a computer
program. 39 5 In Digital Communications Associates v. Softklone Distributing Corporation,39 6 the United States District Court for the
Northern District of Georgia found that the arrangement of terms
397
within the main menu of a computer program could be copyrighted.
In Digital Communications, the computer program at issue enabled
computers to "'communicate' with other computers," and did so
through the use of a "main menu," which specifically contributed to
the program's success.3 98 In identifying exactly what portion of the
main menu was "idea" and what portion was "expression," the district
court stated that the "'idea' is the process or manner by which the
status screen [or main menu],.. . operates and the 'expression is the
method by which the idea is communicated to the user." 39 9 Because
the main menu had previously been copyrighted, the district court
concluded that the reproduction of the main menu constituted copy40 0
right infringement.
Likewise, in Manufacturers Technologies, Inc. v. Cams, Inc.,401
the United States District Court for the District of Connecticut determined that the copying of a computer program's screen displays constituted copyright infringement. 40 2 The district court found that
392. Lotus Dev. Corp., 49 F.3d at 815.
393. Id.
394. Id. at 819.
395. See infra notes 396-410 and accompanying text.
396. 659 F. Supp. 449 (N.D. Ga. 1987).
397. Digital Communications Assocs., Inc. v. Softklone Distrib. Corp., 659 F. Supp.
449, 463 (N.D. Ga. 1987).
398. Digital Communications Assoc., Inc., 659 F. Supp. at 452.
399. Id. at 458. The district court in Digital apparently found that § 102(b) was
inapplicable to this case, as the court cited this statute for the proposition that ideas
cannot be copyrighted. Id. at 457 (citing 17 U.S.C. § 102(b) (1982)).
400. Digital Communications Assocs., Inc., 659 F. Supp. at 465.
401. 706 F. Supp. 984 (D. Conn. 1989).
402. Manufacturers Tech., Inc., 706 F. Supp. at 1002.
1997]
COPYRIGHT PROTECTION
1393
copyright protection extended to the arrangement of words in the
screen display and the manner in which the display communicated
information to a user. 40 3 When such copyrighted material was copied,
the court determined that the copyright at issue had been
40 4
infringed.
Moreover, in SAS Institute, Inc. v. S & H Computer Systems,
Inc.,405 and Whelan Associates, Inc. v. Jaslow Dental Laboratory,
Inc.,406 the structure and organization of computer programs were
found to be protected by copyright. 40 7 In SAS Institute, the United
States District Court for the Middle District of Tennessee determined
that the expression of the "functional abilities, ideas, methods, and
40 8
processes" of the program at issue were not restricted in any way.
Instead, the court characterized the duplication of the organizational
structure of the copyrighted work as being "unnecessary" and "intentional" on the part of the infringer. 40 9 The United States Court of Appeals for the Third Circuit took a similar approach in Whelan, finding
that because a "variety of program structures" existed through which
the idea of the program could be expressed, such structure was not a
necessity and could therefore be copyrighted. 4 10 The First Circuit in
Borland reached the opposite conclusion, however, and held that the
menu command hierarchy of Lotus 1-2-3, part of the program's user
interface, was uncopyrightable subject matter. 4 11 Because this aspect
of the Lotus 1-2-3 user interface was not subject to copyright protection, the First Circuit concluded that Borland's copying did not consti4 12
tute copyright infringement.
Other federal courts have found that the alleged similarities between two computer programs do not rise to the level of copyright infringement, yet, these courts maintain that copyright protection is
available for several aspects of a computer program. 4 13 For example,
the United States District Court for the Northern District of California supported this proposition in Telemarketing Resources v. Symantec Corp.,4 14 where it found that the "overall structure and
403.
404.
405.
406.
Id. at 996.
Id. at 1002.
605 F. Supp. 816 (M.D. Tenn. 1985).
797 F.2d 1222 (3d Cir. 1986).
407. SAS Inst., Inc. v. S & H Computer Sys., Inc., 605 F. Supp. 816, 830 (M.D. Tenn.
1985); Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1248 (3d Cir.
1986).
408. SAS Inst., Inc., 605 F. Supp. at 825.
409. Id.
410. Whelan Assocs., Inc., 797 F.2d at 1240, 1248.
411.
412.
413.
414.
Lotus Dev. Corp., 49 F.3d at 819.
Id.
See infra notes 414-19 and accompanying text.
1989 WL 200350 (N.D. Cal. 1989), affd, 960 F.2d 1465 (9th Cir. 1992).
1394
CREIGHTON LAW REVIEW
[Vol. 30
organization of a computer program, including its audiovisual displays, or screen.. ." could be protected by copyright. 4 15 The district
court held, however, that since the two screens at issue were not substantially similar there was no infringement of the copyrighted com4 16
puter screen.
Similarly, in MiTek Holdings, Inc. v. Arce Engineering Co.,
Inc. ,417 the United States District Court for the Southern District of
Florida found that the owner of a copyright in a computer program is
entitled to protection not only for the way in which the program interacts with the user, but also for the commands a programmer selects to
obtain a certain result. 4 18 Without citing section 102(b), however, the
district court determined that copyright protection was not available,
because the way in which the menu at issue operated was a "process"
which mimicked what a human would do if attempting to complete the
same task by hand.4 19 In Borland, however, the First Circuit found
that selecting commands in Lotus 1-2-3 was comparable to using the
function buttons on a VCR. 4 20 Like the menu command hierarchy,
these VCR buttons were, according to the court, a method of operation
42 1
and therefore not subject to copyright protection.
In Telemarketing Resources, the district court concluded that no
copyright infringement occurred because the programs at issue were
not substantially similar.4 22 A similar determination was made by
the district court in MiTek Holdings, despite evidence that the programs at issue operated "in an almost identical manner."4 23 However,
the First Circuit in Borland never addressed substantial similarity
and instead relied on section 102(b) and a VCR analogy to determine
that the Lotus 1-2-3 menu command hierarchy could not be protected
by copyright. 42 4 Unfortunately, in the rapidly expanding world of
technology, perhaps "something more than an analogy to VCR buttons
425
[was] needed to support such an important decision."
415. Telemarketing Resources v. Symantec Corp., No. C88-20352 RPA, 1989 WL
200350, at *2 (N.D. Cal. 1989), affd sub nom. Brown Bag Software v. Symantec Corp.
960 F.2d 1465 (9th Cir. 1992). In Telemarketing Resources, however, the lack of substantial similarity between the programs at issue was the district court's reason for
denying copyright protection, a conclusion that was affirmed by the United States Court
of Appeals for the Ninth Circuit. Telernarketing Resources, 1989 WL 200350, at *7.
416. Telemarketing Resources, 1989 WL 200350, at *7.
417. 864 F. Supp. 1568 (S.D. Fla. 1994).
418. MiTek Holdings, Inc., 864 F. Supp. at 1577.
419. Id. at 1580.
420. Lotus Dev. Corp., 49 F.3d at 817.
421. Id.
422. Telemarketing Resources, 1989 WL 200350, at *6.
423. MiTek Holdings, Inc., 864 F. Supp. at 1580.
424. Lotus Dev. Corp., 49 F.3d at 815, 817.
425. Cendali & Glen, 17 NAT'L L.J. at B7.
COPYRIGHT PROTECTION
1997]
1395
ORIGINALITY AND EXPRESSION
The district court in Borland found that the Lotus 1-2-3 menu
contained expression. 426 Indeed, in Paperback, the Lotus 1-2-3 menu
had been found by the same district court to be an "original and nonobvious" mode of expression.4 27 The district court determined that alternative methods of design were available for the menus present
within the Borland program. 428 Borland itself, as the court noted,
designed an alternate menu tree for use in its program. 4 29 The district court determined that it was possible to produce millions of different menu trees. 4 30 However, the United States Court of Appeals
for the First Circuit held that different design options and expressions
were irrelevant. 43 1 Thus, any inquiry into originality or expression
was precluded because, the First Circuit determined, the menu command hierarchy was an uncopyrightable "method of operation" under
43
section 102(b).
2
The United States Supreme Court has maintained that the "principal focus" of section 102 the Copyright Act of 1976 is to determine
whether the originality requirement has been sufficiently met to merit
copyright protection. 4 33 While originality is a relatively low standard
to meet, it requires that a work possess some creativity and be an independent creation of the author.4 3 4 In Gates Rubber, the United
States Court of Appeals for the Tenth Circuit determined that it is
"one of the fundamental tenets of copyright law that protection extends only to the author's original expression
....,,435
In fact, prior to
the First Circuit's decision in Borland, the United States District
Court for the District of Massachusetts addressed originality, expression, and the Lotus 1-2-3 copyright in Paperback.43 6 To the district
court in Paperback, the existence of numerous methods in which to
express an idea allowed one of those expressions to be protected by
426. Borland III, 831 F. Supp. at 211.
427. PaperbackSoftware Int'l, 740 F. Supp. at 68. The Honorable Robert Keeton of
the United States District Court for the District of Massachusetts was the trial judge in
both Paperback Software Int'l and Borland. Miller, 106 HARv. L. REV.at 998, 1011.
428. Borland 1I, 799 F. Supp. at 217.
429. Id.
430. Id.
431. Lotus Dev. Corp., 49 F.3d at 816.
432. Id. at 815-16.
433. Feist Publications, Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340, 358 (1991).
The Court was discussing the originality requirement as it related to the extent of copyright protection afforded to a telephone book. Id. at 342. The Court referred to originality as the "sine qua non of copyright." Id. at 348. A sine qua non is an indispensable
requisite. BLAcK's LAw DICTIONARY 1385 (6th ed. 1990).
434. See supra notes 69-70 and accompanying text
435. Gates Rubber Co., 9 F.3d at 836.
436. Paperback Software Int'l, 740 F. Supp. at 59-60.
CREIGHTON LAW REVIEW
1396
[Vol. 30
copyright. 43 7 The district court in Paperback determined that the Lotus 1-2-3 menu structure could be expressed in an unlimited number
of ways. 4 3 8 In Digital Communications, the United States District
Court for the Northern District of Georgia found the arrangement and
design of the "parameter/command terms" within a computer program's status screen could be copyrighted. 4 39 The court found that
this aspect of the program could have been expressed in an infinite
number of ways. 4 4 0 Further, in Pearl Systems, Inc. v. Competition
Electronics,Inc. ,441 the United States District Court for the Southern
District of Florida made a similar finding when considering the subroutines of a computer program. 4 42 The existence of several alternatives for the design of the subroutines was determined by the court to
44 3
reveal the existence of many forms of expression.
In addressing a computer program's input formats, the United
States Court of Appeals for the Fifth Circuit found in EngineeringDynamics, Inc. v. StructuralSoftware, Inc. 4 4 4 that the placement of data
within a computer program could be "unique and original." 4 45 The
Fifth Circuit determined that the computer program's creativity was
4 46
reflected by the existence of other programs in the same market.
The existence of alternatives in E.F. Johnson Co. v. Uniden Corporation ofAmerica 4 4 7 led the United States District Court for the District
of Minnesota to find that the expression which existed within a computer program had been copied. 448 The district court maintained that
the program at issue could have been independently created, thereby
avoiding the reproduction of a copyrighted work. 44 9 Similarly, the differences present in two programs' user interfaces in Broderbund
Software Inc. v. Unison World, Inc.45 0 led the United States District
Court for the Northern District of California to reject a contention that
the idea behind the program, and the expression of that idea, were
437.
438.
Id. at 59.
Id. at 68.
439. Digital Communications Assocs., Inc., 659 F. Supp. at 463.
440. Id. at 460.
441. 1988 WL 146047 (S.D. Fla. 1988).
442. PearlSys. Inc. v. Competition Elecs., Inc., No. 87-6278-CIV-MARCUS, 1988 WL
146047, at *6 (S.D. Fla. 1988).
443. Pearl Sys., Inc., 1988 WL 146047, at *6.
444. 26 F.3d 1335 (5th Cir. 1994).
445. Engineering Dynamics, Inc. v. Structural Software, Inc., 26 F.3d 1335, 1346
(5th Cir. 1994), opinion supp. by 46 F.3d 408 (5th Cir. 1988).
446. EngineeringDynamics, Inc., 26 F.3d at 1346.
447. 623 F. Supp. 1485 (D. Minn. 1985).
448. E.F. Johnson Co. v. Uniden Co. of Am., 623 F. Supp. 1485, 1503 (D. Minn.
1985).
449. E.F. Johnson Co., 623 F. Supp. at 1503.
450. 648 F. Supp. 1127 (N.D. Cal. 1986).
1997]
COPYRIGHT PROTECTION
1397
indistinguishable. 4 5 1 Where the menu screens are different, the court
multiple modes of expression available to a
found, there4 5 are
2
programmer.
Of these cases, Paperback, Digital Communications, Pearl Systems, E.F. Johnson, and Broderbund all resulted in decisions of copyright infringement or a finding that there was a substantial likelihood
of success on such a claim. 45 3 While neither court in Gates Rubber or
EngineeringDynamics reached a similar conclusion, in Gates Rubber
the Tenth Circuit remanded the case so that the trial court could determine exactly which elements of the computer program at issue
were protectable by copyright. 4 54 Likewise, in EngineeringDynamics,
the Fifth Circuit remanded the case to the trial court in order to determine if similarities between the programs at issue were imposed by
4 55
the engineering industry.
In Borland, the United States District Court for the District of
Massachusetts addressed originality and expression. 4 56 The court
found that functional considerations do not control the configuration
of the Lotus 1-2-3 menu. 45 7 The existence of different menu trees in
other spreadsheet programs, the court stated, established that the Lotus 1-2-3 menu was but one of many forms of expression that could be
adopted. 458 Indeed, other spreadsheet programs, such as Microsoft
Excel, achieved commercial success without being perfectly compatible with Lotus 1-2-3. 45 9 The district court determined that originality
was present in the Lotus 1-2-3 menu because a "wide variety of expression [was] possible." 46 0 On appeal, the United States Court of Appeals for the First Circuit determined that the existence of alternative
designs was irrelevant. 46 1 According to the First Circuit, "if specific
words are essential to operating something, then they are part of a
'method of operation' and, as such, are unprotectable (by copy451. Broderbund Software, Inc. v. Unison World, Inc., 648 F. Supp. 1127, 1132 (N.D.
Cal. 1986).
452. BroderbundSoftware, Inc., 648 F. Supp. at 1132. See also id. at 1134 (stating
the programmer "had available a wide range of expression.").
453. Digital CommunicationsAssocs., Inc., 659 F. Supp. at 465; PaperbackSoftware
Int'l, 740 F. Supp. at 70, 84; PearlSys., Inc., 1988 WL 146047 at *7; E.F. Johnson Co.,
623 F. Supp. at 1504; BroderbundSoftware, Inc., 648 F. Supp. at 1138.
454. Gates Rubber Co., 9 F.3d at 842; Engineering Dynamics, Inc., 26 F.3d at 1351.
455. EngineeringDynamics, 26 F.3d at 1347.
456. Borland III, 831 F. Supp. at 211, 216.
457. Id. at 213.
458. Id. at 214.
459. Paperback Software Int', 740 F. Supp. at 69.
460. Borland III, 831 F. Supp. at 216-17.
461. Lotus Dev. Corp., 49 F.3d at 816.
CREIGHTON LAW REVIEW
1398
right]." 46 2
[Vol. 30
As correctly noted by the district court, however, specific
4 63
words are not essential in order to operate the Lotus 1-2-3 menu.
THE FIRST CIRCUIT'S DISCUSSION OF THE ALTA/ TEST
In Borland,the First Circuit determined that the Altai test would
"be of little help in assessing whether the literal copying of a menu
command hierarchy constitutes copyright infringement."4 64 The First
Circuit characterized the Altai test as having been developed by the
United States Court of Appeals for the Second Circuit "to deal with
the fact that computer programs, copyrighted as literary works, can be
infringed by what is known as 'nonliteral' copying, which is copying
that is paraphrased or loosely paraphrased rather than word for
word."4 65 The First Circuit continued, stating that:
[W]e are not confronted with alleged nonliteral copying of
computer code. Rather, we are faced with Borland's deliberate, literal copying of the Lotus menu command
hierarchy....
...
[the Altai test] obscures the more fundamental question of
whether a menu command hierarchy can be copyrighted at
all. The initial inquiry should not be whether individual components of a menu command hierarchy are expressive, but
menu command hierarchy as a whole can
rather whether 4the
66
be copyrighted.
Despite the First Circuit's description of the test developed by the
United States Court of Appeals for the Second Circuit in Altai as having been developed to deal with the "'nonliteral' copying" of computer
programs, the test developed by the Second Circuit was not concerned
with "'nonliteral' copying."4 67 The issue before the Second Circuit was
whether "the scope of copyright protection .
.
. extend[ed] to a com-
puter program's non-literal structure."4 68 In order to make this determination, the Second Circuit recommended "a three-step procedure
...in order to determine whether the non-literal elements of two or
more computer programs are substantially similar."4 6 9 This threestep procedure consists of (1) abstraction, where a court identifies the
individual elements of the program, (2) filtration, the determination of
whether or not the identified elements can be protected by copyright,
462. Id.
463. Borland I, 799 F. Supp. at 217.
464. Lotus Dev. Corp., 49 F.3d at 815.
465. Id. at 814 (citing Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693, 701
(2nd Cir. 1992)).
466. Id. at 814-15.
467. Lotus Dev. Corp., 49 F.3d at 814; Computer Assocs. Int'l, Inc., 982 F.2d at 706.
468. Computer Assocs. Int'l, Inc., 982 F.2d at 703.
469. Id. at 706.
1997]
COPYRIGHT PROTECTION
1399
and (3) comparison, which is to determine if the protected work was
copied. 4 70 The Second Circuit provided examples of the non-literal elements of a computer program, indicating that "general flow charts as
well as the more specific organization of inter-modular relationships,
parameter lists, and macros . . ." were all non-literal elements of a
computer program. 47 1 The court noted that Congress intended for
computer programs to be treated as literary works and, generally
speaking, the non-literal elements of literary works could be protected
by copyright. 47 2 However, the Second Circuit also emphasized "that,
like all copyright infringement cases, those that involve computer programs are highly fact specific" and "the amount of protection due...
will vary according to the protectable expression found to exist within
473
the program at issue."
The Altai test for substantial similarity was not needed to determine if the menu command hierarchy in Lotus 1-2-3 was substantially
similar to the Lotus 1-2-3 menu command hierarchy found in Borland's programs because Borland admitted that it placed "'a virtually
identical copy of the entire 1-2-3 menu tree"' in its Quattro and Quattro Pro programs. 4 74 Accordingly, while the First Circuit correctly
chose not to use the Altai test, its reasoning for not making use of this
test was incorrect. 4 75 This test was designed to determine if the nonliteral elements of two computer programs were substantially similar,
and not, as the First Circuit maintained, to determine if a copyright
4 76
has been infringed by "'nonliteral' copying."
INFRINGEMENT OF THE COPYRIGHT OF LOTUS
1-2-3
In Borland, the First Circuit recognized that there are two elements of a copyright infringement claim: (1) that one own a valid copy470. Id. at 706-11. For further discussion of the Altai test, see supra notes 297-303
and accompanying text.
471.
472.
473.
474.
475.
Computer Assoc. Int'l, Inc., 982 F.2d at 702.
Id.
Id. at 715.
Lotus Dev. Corp., 49 F.3d at 810.
See infra note 476 and accompanying text.
476. EngineeringDynamics, Inc., 26 F.3d at 1342 (endorsing the "abstraction-filtration-comparison method of determining copyright protection for computer programs.");
Gates Rubber Co., 9 F.3d at 834 (adopting the "Abstraction-Filtration-Comparison" test
in order to ascertain those portions of a computer program that can be protected); MiTek
Holdings, Inc., 864 F. Supp. at 1577 (stating that the approach for determining the
copyrightability of the nonliteral elements of a computer program is the widely accepted
"abstraction-filtration-comparison"test). Compare Computer Assocs. Int'l, Inc., 982 F.2d
at 706 (stating "that district courts would be well-advised to undertake... [this] test...
in order to determine whether the non-literal elements of two or more computer programs are substantially similar.") with Lotus Dev. Corp., 49 F.3d at 815 (holding that
"the Altai test may provide a useful framework for assessing the alleged nonliteral copying of computer code .... ).
1400
CREIGHTON LAW REVIEW
[Vol. 30
right, and (2) the copying of elements of the copyrighted work which
are original. 4 77 The First Circuit indicated that both of these elements were satisfied, "for Borland concedes that Lotus has a valid
copyright in Lotus 1-2-3 as a whole and admits to factually copying
the Lotus menu command hierarchy." 478 Borland copied the Lotus 12-3 menu command hierarchy so that users accustomed to the Lotus 12-3 program could easily adapt to the Borland program. 47 9 Borland
contended that such copying was lawful because it only "copied the
unprotectable menus of Lotus 1-2-3."480 Therefore, the First Circuit
computer
stated, the issue that needed to be resolved was "whether a 48
1
menu command hierarchy is copyrightable subject matter."
The United States Constitution grants Congress the power to promote science by providing an author or inventor with exclusive rights
to their work for a specific period of time. 48 2 In fact, the economic
philosophy which serves as the foundation of this constitutional provision maintains that the public welfare can best be achieved by promoting individual effort. 488 The policy behind copyright law is to create
48 4
incentives for development by guaranteeing inventors a fair return.
This incentive must be balanced, however,485with dissemination, so that
learning and progress may be promoted.
A large degree of individuality goes into computer programming.48 6 A majority of the work that goes into the creation of a com-
puter program is found in conceptualizing the program and its user
interface.48 7 A computer program's menu is one portion of the user
interface, the creation of which is a difficult intellectual task.48 8 The
creativity and investment necessary in order to design a user interface
477. Lotus
Serv. Co., 499
478. Id. at
479. Id. at
480. Id. at
Dev. Corp., 49 F.3d at 813 (citing Feist Publications, Inc. v. Rural Tel.
U.S. 340, 361 (1991)).
813.
810.
812.
481. Id. at 809.
U.S. CONST. art. I, § 8, cl. 8.
483. Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs, 41 STAN. L. REv. 1045, 1058 (1989).
484. Gates Rubber Co., 9 F.3d at 839.
485. Id.
486. Miller, 106 HARV. L. REv. at 984.
487. Paperback Software Int'l, 740 F. Supp. at 56.
488. Miller, 106 HARv. L. REV. at 984 n. 25 (stating that a "user interface includes
the keyboard, mouse, and screen, as well as the program-specific user interface, such as
menus, commands, prompts, and displays,"); Paperback Software Int'l, 740 F. Supp. at
56 (finding that the development of a computer program's user interface "is a more difficult intellectual task" than the program's encoding).
482.
1997]
COPYRIGHT PROTECTION
1401
are enormous. 48 9 Many times,490it is the user interface which makes a
computer program successful.
In Borland, however, the First Circuit did not protect the Lotus
copyright, instead ruling that the Lotus 1-2-3 menu command hierarchy was uncopyrightable subject matter. 49 1 The First Circuit reached
this conclusion despite the fact that the Lotus 1-2-3 menu was not required in order to operate the Borland programs. 4 92 Borland designed
its own menu commands for Quattro and Quattro Pro, incorporating
the Lotus 1-2-3 menu only to give users a choice of how to operate the
Borland programs. 4 93 Despite the individuality, creativity, and investment present in a computer program's user interface, the court in
Borland denied copyright protection to the menu command hierarchy
4 94
of Lotus 1-2-3.
CONCLUSION
4 95
In Lotus Development Corporation v. Borland International,
the United States Court of Appeals for the First Circuit held that the
Lotus 1-2-3 "menu command hierarchy [was] an uncopyrightable
'method of operation'" as that term is used in Title 17 of the United
States Code section 102(b). 4 9 6 Therefore, the First Circuit reasoned,
Borland International ("Borland") did not infringe on the copyright
that Lotus Development Corp. ("Lotus") had in Lotus 1-2-3 when Borland placed a "'virtually identical copy of the entire 1-2-3 menu tree'"
49 7
in its Quattro and Quattro Pro computer programs.
The Borland decision provides an enormous disincentive for those
who create computer programs, especially the user interfaces associated with many programs. According to Professor Arthur R. Miller, a
computer program's:
[ulser interface design is extremely resource-intensive, and a
well-composed user interface is frequently the precise feature
that renders a computer program successful .... [Piromoting
the unauthorized copying of interfaces penalizes the creative
effort of the original designer, something that runs directly
counter to the core purposes of copyright law because it may
489. Miller, 106 HARv. L. REv. at 984.
490. Id. at 1033-34.
491. Lotus Dev. Corp., 49 F.3d at 819.
492. Id. at 810.
493. Id.
494. See infra notes 496-98 and accompanying text.
495. 49 F.3d 807 (1st Cir. 1995), affd mem., 116 S. Ct. 804 (1996) (4-4 decision).
496. Lotus Dev. Corp. v. Borland Intl, Inc., 49 F.3d 807, 815 (1st Cir. 1995), affd
mem, 116 S. Ct. 804 (1996) (4-4 decision).
497. Lotus Dev. Corp., 49 F.3d at 810, 819.
CREIGHTON LAW REVIEW
1402
[Vol. 30
freeze or substantially
impede human innovation and techno4 98
logical growth.
Although the First Circuit declared the menu of the Lotus 1-2-3
spreadsheet program to be a "method of operation" as that term is
used in section 102(b), the court was unable to cite any precedent
which defined or rendered insight into exactly what Congress meant
by "method of operation."4 99 It is clear that Congress did not intend
for section 102(b) to "enlarge or contract the scope of copyright protection . -so0In fact, Congress specifically provided that criminal penalties were to be imposed against "any person who infringes a
copyright willfully and for the purposes of commercial advantage
"501
Despite the legislative history and abundant case law in various
circuits discussing section 102(b), the First Circuit held that a very
important and creative aspect of the Lotus 1-2-3 spreadsheet-the
50 2
menu command hierarchy-could not be protected by copyright.
This denial of copyright protection for the Lotus 1-2-3 menu, which is
arguably a critical aspect of the program that Lotus expended considerable time, money, and resources to develop, strikes at the very heart
of copyright law-the creation of incentives for development by guar50 3
anteeing inventors a fair return.
The decision by the First Circuit leaves Lotus without any incentive to improve the Lotus 1-2-3 user interface. The Borland decision
sends a clear message to Lotus, and any other computer programmer,
that innovation will be penalized. Should an author expend the time,
effort, and creative energies necessary in order to express their ideas
in a form that can be classified as a "means by which a person operates something," the Borland decision effectively prohibits that individual from securing a copyright.5 0 4 Every element that succumbs to
such a classification can be freely copied, even by competitors such as
Borland, who here blatantly copied a menu from a popular computer
program into their own program simply to "ease" the transition from
the competitor's product to their own. Microsoft Excel achieved com498. Arthur R. Miller, Copyright Protectionfor Computer Programs,Databases,and
Computer-GeneratedWorks: Is Anything New Since CONTU?, 106 HARv. L. REv.977,
1033-34 (1993).
499. Dale M. Cendali & Martin Glenn, In Lotus, the 1st Circuit Departedfrom Precedent, NarrowingProtectionfor Developed Software and Giving Crafty Litigatorsa Blank
Disk on Which to Write, 17 NAT'L L.J. B7 (May 15, 1995).
500. H.R. REP. No. 94-1476, at 57 (1976), reprinted in 1976 U.S.C.C.A.N. 5659,
5670.
501.
17
U.S.C. § 506(a) (1994).
502. See supra notes 94-98, 372-87 and accompanying text.
503. Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 839 (10th Cir.
1993).
504. Lotus Dev. Corp., 49 F.3d at 815.
1997]
COPYRIGHT PROTECTION
1403
mercial success without being perfectly compatible with Lotus 1-2-3,
50 5
and there was nothing preventing Borland from doing the same.
While Borland was free to create a spreadsheet on a computer using
its own software, Borland was not free to do so by pirating the creative
50 6
effort expended by Lotus.
The United States Court of Appeals for the First Circuit recognized that its holding in Borland was in conflict with the decision of
the United States Court of Appeals for the Tenth Circuit in Autoskill,
Inc. v. National Education Support Systems, Inc.50 7 While a memorandum opinion from an equally divided United States Supreme
Court effectively affirmed the First Circuit's decision, computer
software developers, such as Lotus, eagerly await a Congressional response to the First Circuit's misapplication of section 102(b). 508 It is
vital that any such response provide clear, effective copyright protection to what may be the most critical element of a computer program the user interface.
Jeffrey M. Gott-'97
505.
Lotus Dev. Corp. v. Paperback Software Intl, 740 F. Supp. 37, 69 (D. Mass.
1990).
506.
E.F. Johnson Co. v. Uniden Corp. of Am., 623 F. Supp. 1485, 1504 (D. Minn.
1985).
507. Lotus Dev. Corp., 49 F.3d at 818.
508. Lotus Development Corp. v. Borland Intl, Inc., 116 S. Ct. 804 (1996) (mem.);
Miller, 106 HAlv. L. REv. at 1033.
1404
CREIGHTON LAW REVIEW
[Vol. 30
Download