Skip to main content

Full text of "The legal protection of computer software"

See other formats


LIBRARY  OF  THE 

UNIVERSITY  OF  ILLINOIS 

AT  URBANA-ChlAMPAIGN 

5I0.84 
v^o.l\\-l2.0 


S^lGtNLCRVr^^g^^^l 


'I'he   person   char^irlg  this  'material   is   re- 


Dl97fe 


sponsible  for  its  return  to  the  library  from 
which  it  was  withdrawn  on  or  before  the 
Latest  Date  stamped  below. 

Theft,  mutilation,  and  underlining  of  books 
are  reasons  for  disciplinary  action  and  may 
result  in  dismissal  from  tfie  University. 

UNIVERSITY    OF     ILLINOIS     LIBRARY    AT    URBANA-CHAMPAIGN 


Y\-'i  if! 


.    ^ANb 


f£B  2  /  991 

'^  0  5 


i[C1 


L161  — O-1096 


Digitized  by  the  Internet  Archive 

in  2012  with  funding  from 

University  of  Illinois  Urbana-Champaign 


http://archive.org/details/legalprotectiono120sonia 


tf- 


'O 


CONFERE 


ENGINEERING  UBRARY 
UNIVERSITV  OF  ILLINOIS 

URBANAittiJNCMS 


Center  for  Advanced  Computation 


UNIVERSITY  OF  ILLINOIS  AT  URBANA-CHAMPAIGN 

URBANA.  ILLINOIS  61801 


CAC  Dociiment  No.  120 


THE  LEGAL  PROTECTION  OF  COMPUTER  SOFTWARE 


by 


John  T.  Soma-^  and  Richard  Michael  Fischl-^* 


October  197^+ 


Center  for  Advanced  Computation 
University  of  Illinois  at  Urb ana -Champaign 
Urbana,  Illinois  618OI 


Mr.  Soma  received  his  J.D.  from  the  University  of  Illinois,  College 
of  Law  in  1973  and  is  a  member  of  the  Illinois  Bar.   He  received 
his  M.A.  in  Economics  from  the  University  of  Illinois  in  1973^  and 
presently  he  is  a  candidate  for  a  Ph.D.  in  Economics  at  the  Univer- 
sity of  Illinois,  and  a  Research  Assistant  at  the  Center  for 
Advanced  Computation,  Urbana,  Illinois. 

■X-X- 

Mr.Fischl  has  studied  political  science  at  the  University  of  Illinois. 
He  has  been  accepted  by  the  University  of  Illinois,  College  of  Law, 
and  will  be  attending  the  College  of  Law  beginning  in  the  Fall  of  1975' 


ABSTEACT 

Software  technology  has  outgrown  the  legal 
development  of  software  protection.   This  docioment  examines 
the  legal  protection  of  software  through  the  use  of  patent, 
copyright,  and  trade  secret  law.   Each  of  these  methods  offers 
a  viable  alternative,  but  each  suffers  from  major  weaknesses. 
The  unique  legal  problems  encountered  by  a  university  in  soft- 
ware development  are  then  examined,  followed  by  a  discussion 
of  Federal  Government  software  procurement  policies.   Finally, 
the  legal  interaction  between  private  and  university  software 
developers  and  the  Federal  Government  is  briefly  examined. 


Ill 


TABLE  OF  CONTENTS 

Page 

PATENT  PROTECTION 3 

Gottschalk  v.  Benson  k 

COPYRIGHT  PROTECTION   ...  6 

Telex  V.  IBM 7 

TRADE  SECRET  PROTECTION  8 

Federal  Preemption  of  State  Trade  Secret  Law  11 

Software  and  Trade  Secrets  ik 

Scope  of  Protection l6 

Criminal  and  Non-Criminal  Remedies  Under  Trade  Secret  Law.  .  l8 

THE  UNIVERSITY  ENVIRONMENT  AND   PROTECTION  OF  SOFTWARE  20 

Academic  Freedom  23 

GOVERNMENT  PROCUREMENT  OF  SOFTWARE   ■ 2k 

Patents  Rights  and  Rights  in  Data  Clauses   25 

Software  Revision  to  ASPR's.  . 27 

CONCLUSION 28 

NOTES 30 


IV 


THE  LEGAL  PROTECTION  OF  COMPUTER  SOFTWARE^ 


The  computer  software  industry  is  one  of  the  most  dynamic 
growth  industries  in  the  United  States.   In  the  I950's  and  I96O ' s  the 
emphasis  was  on  hardware  development,  but  in  recent  years  the  emphasis 
has  shifted  to  software  development.   -'  As  an  example  of  this  shift, 
after  the  hardware  was  developed  for  the  IBM  36O  series,  it  took  five 
years  to  develop  the  supporting  software.'-  -^   The  industry  is  highly 
innovative  and  has  low  barriers  to  entry. ^-'   The  legal  structure 
surrounding  the  software  industry  has  not,  however,  kept  pace  with 
the  technological  changes  occurring  within  the  industry.   Although 
there  is  voluminous  material  on  the  legal  protection  of  software,  no 
definitive  legal  principles  have  emerged  concerning  the  procedures 
used  to  protect  software.'-  -' 

Rapid  software  development,  however,  is  essential  for  the 
continued  growth  of  the  computer  industry.  Today  software  packages 
are  commonly  sold  for  thousands  of  dollars.  In  addition,  there  are 
now  large  numbers  of  identical  computers  available  upon  which  these 


The  authors  gratefully  acknowledge  the  assistance  and  support  given 
by  Professor  Hugh  Folk,  Director,  Center  for  Advanced  Computation. 
In  addition,  we  wish  to  thank  Professor  Peter  Maggs,  College  of  Law, 
University  of  Illinois,  for  reading  an  earlier  draft  of  this  docu- 
ment. Dr.  Donald  Bitzer,  Director,  Computer-based  Education  Re- 
search Laboratory,  University  of  Illinois,  for  many  helpful  comments 
and  suggestions,  Barry  Sufrin  for  several  ideas  on  the  academic 
freedom  issue,  and  Carol  Boast,  Assistant  Law  Librarian,  and 
Madhavarao  Balachandran,  Assistant  Commerce  Librarian  for  their  tire- 
less support  in  the  research  of  this  document.   We  also  wish  to 
thank  Frieda  Anderson,  Center  for  Advanced  Computation,  for  provid- 
ing the  ever  necessary  administrative  coordination  in  the  prepara- 
tion of  this  document.   Any  errors  remaining,  however,  are  those  of 
the  authors . 


software  packages  can  be  used.   Large  social  gains  exist  if  these 
software  packages  can  be  used  on  all  machines  rather  than  having  a 
similar  software  package  independently  developed  for  each  computer. 
Consequently,  some  type  of  legal  mechanism  is  essential  to  provide 
software  developers  with  a  means  to  protect  their  intellectual  prod- 
ucts.  Once  appropriate  legal  protection  is  provided,  the  developers 
of  software  will  be  willing  to  sell  their  products,  and  thus  wasteful 
duplication  of  effort  can  be  avoided.   By  providing  a  viable  method  to 
protect  software,  public  policy  will  therefore  foster  the  commercial 
development  of  software.   The  social  gains  from  such  protection  are 
greater  today  than  in  the  1950 's  and  1960's  due  to  the  recent  shift 
in  emphasis  from  hardware  to  software  development. 

This  document  has  been  prepared  to  review  the  present  legal 
status  of  software  protection.   Rather  than  investigating  a  few  areas 
in  great  detail,  this  document  will  overview  the  entire  area  of  soft- 
ware protection.   Appropriate  footnotes  will  be  used  to  guide  the 
reader  to  additional  materials  on  each  topic.   A  major  patent  revision 
bill  is  currently  before  Congress,  and  numerous  legal  doctrines  are 
still  in  the  developmental  stage.   Therefore,  the  entire  legal  area 
of  software  protection  can  be  expected  to  remain  in  a  state  of  flux 
for  the  forseeable  future. 

The  remainder  of  this  document  will  first  examine  the  legal 
protection  of  software  through  the  use  of  patent,  copyright,  and  trade 
secret  law.   Each  of  these  methods  offers  a  viable  alternative,  but 
each  suffers  from  major  weaknesses.   The  unique  legal  problems  en- 
countered by  a  university  in  software  development  will  then  be  examined, 
followed  by  a  discussion  of  Federal  Government  software  procurement 
policies.   Finally,  the  legal  interaction  between  private  and  univer- 
sity software  developers  and  the  Federal  Government  will  be  briefly 
examined. 


PATENT  PROTECTION 

Although  hardware  is  clearly  patentable  under  existing 

[51 
patent  statutes/    software  does  not  conveniently  fall  into  any  of 

the  present  statutory  classifications  cf  patentable  material.  As  a 
result  of  this  ambiguity  over  software  patentability,  several  test 
cases  have  attempted  to  define  the  limits  of  software  patentability. 
Patent  protection  is  commonly  accepted  as  the  strongest  form  of  soft- 
ware protection,  and  thus  several  proposals  are  currently  before 
Congress  which  would  allow  patenting  of  software.'-  -' 

The  status  of  the  various  patent  law  revisions  before 
Congress  is  constantly  changing.   Consequently,  this  area  will  not  be 
examined  due  to  the  speculative  nature  of  any  inquiry  at  the  present 
time.   Instead,  the  present  focus  will  be  on  the  current  legal  inter- 
pretation of  this  existing  patent  law  with  regard  to  software  patent- 
ability. 

In  several  early  cases,  the  Supreme  Court  held  that  a  newly 

discovered  scientific  truth  or  mathematical  expression  could  not  be 

patented,  but  that  "a  novel  and  useful  structure  created  with  the  aid 

[■71 
of  knowledge  of  scientific  truth  may  be.'"-  -*   From  this  line  of  cases, 

and  others  related  to  the  field  of  electronlcs,[8l  the  Court  developed 

[91 
the  mental  steps  doctrine.'-  -'   In  brief,  the  mental  steps  doctrine 

means  that  if  an  idea  can  be  totally  carried  out  by  the  human  mind 

without  the  aid  of  a  mechanical  device,  then  the  idea  is  unpatentable. 

Applied  to  computer  programs,  the  result  is  devastating  because  most 

software  can  at  least  theoretically  be  performed  by  the  human  mind. 

The  time  required  for  such  operations,  however,  would  be  measured  in 

years  as  compared  to  seconds  with  the  aid  of  a  computer. 

Through  a  series  of  cases,  the  Court  of  Customs  and  Patent 
Appeals  (hereinafter  CCPA)  attempted  to  distinguish  computer  programs 
which  provided  some  physical  change  on  materials  from  programs  which 
did  not  physically  affect  materials.'-   -'   Based  on  this  distinction. 


the  CCPA  distinguished  computer  programs  performing  some  physical 
act  on  materials  from  the  mental  steps  doctrine  and  upheld  several 
patents  on  computer  programs.  While  the  Patent  Office  and  CCPA  were 
distinguishing  types  of  computer  programs,  the  President's  Commission 
on  the  Patent  System  concluded  that  the  Patent  Office  lacked  adequate 
methods  and  facilities  for  classifying  computer  programs,  and  thus 

recommended  against  a  patent  policy  which  would  allow  the  patentability 

[11] 
of  computer  software.      Due  to  the  diversity  of  opinions  and  the 

resulting  ambiguity  over  software  patentability,  the  legal  status  of 

patenting  software  remained  unclear. 

Gottschalk  v.  Benson 

In  1972,  the  Supreme  Court  attempted  to  clarify  this 

r  121 
confused  situation  by  deciding  Gottschalk  v.  Benson.^   -^   Gary  Benson 

and  Arthur  Talbot  filed  an  application  with  the  Patent  Office  in  I963 

seeking  a  patent  on  a  method  of  converting  binary  coded  decimal  (BCD) 

numerals  into  pure  binary  numerals  through  the  use  of  a  mathematical 

algorithm.   Although  this  process  could  be  performed  mentally  with 

the  aid  of  pen  and  pencil,  the  algorithm  enabled  one  to  program  a 

computer  to  do  the  same  conversion  with  large  savings  in  manpower  and 

tim.e.   The  Patent  Office  refused  to  issue  the  patent  on  the  ground 

that  the  subject  matter  of  the  invention  was  not  within  any  of  the 

statutory  classes  of  patentable  inventions.'-     The  Patent  Office 

reasoned  that  the  application  was  within  the  mental  steps  doctrine 

and  thus  outside  of  the  statutory  class  of  patentable  material.   On 

appeal,  the  CCPA  reversed  the  Patent  Office  decision  and  held  that 

the  patent  application  claims  were  within  the  statutory  classification 

of  patentable  inventions  and  thus  patentable  as  a  process  under  the 

riifl 
existing  patent  statutes.'-   -' 

Writing  for  a  unanimous  court  with  three  justices  abstaining, 
Justice  Douglas  held  that  the  invention  was  not  patentable  under  the 
existing  patent  laws.   Based  on  the  settled  principle  that  ideas  were 


not  patentable,  the  Court  reasoned  that  granting  a  patent  for 
converting  BCD  to  binary  numerals  with  the  aid  of  a  digital  computer 
would  in  effect  be  a  patent  on  the  algorithm  embodied  in  the  computer 
program  since  the  use  of  the  algorithm  on  a  digital  computer  would  be 
the  only  practical  method  of  implementation.   The  opinion  did  not 
mention  the  earlier  cases  developed  by  the  CCPA  which  had  attempted 
to  distinguish  patents  issued  for  computer  programs  from  the  mental 
steps  doctrine.   Consequently,  the  validity  of  this  line  of  cases  is 
questionable.  Justice  Douglas,  however,  stressed  that  the  opinion  was 
limited  only  to  invalidating  the  patenting  of  a  mathematical  algorithm 
and  not  the  invalidation  of  all  computer  programs. 

One  possible  interpretation  of  Gottschalk  is  that 
mathematical  algorithms  are  not  constitutionally  patentable  even  if 

Congress  were  to  amend  the  patent  laws  to  include  them  in  the  statu- 

[151 
tory  classification  of  patentable  material.'-   -'   Then  as  a  corollary, 

programs  which  use  computers  to  solve  mathematical  problems  are  not 

currently  patentable  due  to  the  present  patent  law.   Thus,  impliedly, 

the  existing  laws  could  be  amended  to  include  software  as  a  statutory 

class  of  patentable  material.   The  result  of  Gottschalk,  however,  is 

that  at  present  the  status  of  software  patentability  is  very  ambiguous. 

Another  interpretation  of  Gottschalk  is  to  read  the  opinion  narrowly 

and  conclude  that  only  the  patenting  of  mathematical  algorithms  in 

computer  programs  in  prohibited. 

The  CCPA  is  still  validating  patents  for  computer  programs 
which  adequately  describe  the  program  and  which  do  not  relate  to  a 
purely  mathematical  algorithm.'-   -*   The  legal  support  for  issuance  of 
these  patents,  however,  is  based  on  the  pre -Gottschalk  case  law  dis- 

riTi 

tinguishing  computer  programs  from  the  mental  steps  doctrine. "- 
The  true  test  of  these  cases  will  be  a  patent  infringement  suit.   The 
overall  likelihood  of  a  patent  holder  having  his  patent  validated  in 
a  patent  infringement  suit  is  presently  low. 


On  the  practical  side,  a  strong  deterrent  exists  against 
the  use  of  patents  to  protect  software.   The  minimum  cost  of  obtain- 
ing a  patent  is  approximately  one  thousand  dollars  with  many  patent 
applications  being  considerably  higher.   The  average  cost  for  soft- 
ware patents  may  be  considerably  higher  due  to  their  controversial 
nature.   In  addition,  the  gestation  period  for  a  patent  application 
averages  three  years,  and  thus  if  a  patent  is  finally  disapproved,  the 
developer  of  a  program  will  be  left  in  the  same  position  he  was  before 
beginning  the  patent  application  procedure.   Finally,  as  previously 
stated,  many  patents  are  invalidated  in  infringement  suits.  With  the 
current  high  standards  of  disclosure,  once  a  patent  is  declared  in- 
valid in  an  infringement  suit,  its  contents  are  known,  and  thus  trade 
secret  protection  is  no  longer  available.   The  net  result  of  these 
difficulties  is  that  the  choice  of  patent  protection  for  software 
is  not  particularly  inviting.'-   -' 


COPYRIGHT  PROTECTION 

The  difference  between  patent  and  copyright  protection  is 
that  a  patent  holder  acquires  exclusive  right  to  the  invention  even 
if  another  individual  later,  but  independently,  discovers  the  same 

ri9i 

idea.^     A  copyright,  however,  only  protects  one  from  the  mere  copy- 
ing of  the  idea  or  work.   For  example,  if  a  computer  program  were 
patented,  no  one  could  use  the  same  program  even  if  they  independently 
discovered  the  program.   A  copyright,  on  the  other  hand,  would  only 
prevent  others  from  copying  the  exact  program.   Consequently,  if  an 
individual  could  prove  that  he  independently  developed  the  program, 
then  the  individual  could  freely  use  the  program  which  he  independ- 
ently developed.'-  ^ 

There  are  two  types  of  copyright  protection.   One  based  on 

[211 
common  law  and  the  other  based  on  federal  statutes."-   -"   While  an 

author  is  preparing  his  work  and  up  to  the  time  the  work  is  published, 

the  author  is  protected  under  state  common  law  copyright.   This  means 


that  the  author  is  protected  from  unauthorized  copying,  publishing, 

[221 
vending,  performing,  and  recording  of  his  work.    -"   Under  present 

law,  until  the  author  permits  publication,  this  common  law  protection 

[231 
exists  forever.      Once  the  author  decides  to  publish  the  work,  one 

\  2kl 
of  two  alternatives  will  occur.'-   -"   First,  the  author  can  publish 

the  work  without  any  copyright  notice  on  the  work.   If  this  happens, 

the  work  is  considered  to  have  been  donated  to  the  public.   On  the 

other  hand,  if  all  copies  of  the  work  which  are  authorized  by  the 

author  are  properly  designated  as  copyrighted  material,  then  the 

author  is  protected  under  federal  copyright  statutes.   The  duration 

of  the  federal  copyright  protection  is  56  years  if  the  copyright  is 

r  251 
properly  renewed  after  28  years."-   -'   Under  both  common  law  copyright 

and  statutory  copyrights,  the  author  can  sue  for  damages  for  illegal 

copying  of  his  work.^     Damages  are  based  on  either  actual  damages 

which  he  has  suffered,  or  the  profits  which  the  copier  received  from. 

the  unauthorized  copying. 

In  1965^  the  Copyright  Office  issued  Circular  3ID  which 

outlined  the  three  basic  rules  for  current  registration  of  computer 

[271 
programs.'-   -^   The  first  rule  is  that  the  individual  applying  for 

the  copyright  must  be  the  original  author.   Next,  all  copies  of  the 
program  must  be  published  with  the  normal  copyright  designation. 
Finally,  copies  of  the  program  must  be  deposited  with  the  Copyright 
Office,  and  if  the  program  is  in  machine  language,  copies  of  the  pro- 
gram both  in  machine  language  and  in  a  high  level  language  must  be 
deposited  with  the  Copyright  Office.'-   -' 


Telex  V.  IBM 

On  the  practical  side,  one  method  to  prevent  copyright 

[291 
infringement  is  to  insert  meaningless  statements  into  the  program.^   -' 

If  the  alleged  infringer  literally  copied  the  program,  these  meaning- 
less statements  will  appear,  and  thus  sufficient  evidence  will  be 
available  to  prove  infringement.   If  the  program  is  extremely  long. 


the  proof  of  availability  of  the  program  to  the  defendant  and  complete 
identity  will  also  be  sufficient  evidence  to  prove  copyright  infringe- 

rsoi 

ment.   In  Telex  v.  IBM  '-   -'  one  of  the  counter  claims  by  IBM  against 
Telex  was  for  copyright  infringement  of  IBM's  Fast  Running  Interpreter 
Enabling  Natural  Diagnostics  (FRIEND)  program.   The  Telex  court  accept- 
ed as  sufficient  evidence  that  out  of  the  entire  program  only  a  few 
minor  deviations  existed  between  the  IBM  original  and  Telex's  version. 
In  addition,  IBM  was  able  to  prove  that  Telex  personnel  had  access  to 
the  IBM  program. 

r  "^H 
In  Walt  Disney  v.  Alaska  Television  Co./  ■'    the  court  held 

that  copyright  infringement  had  occurred  when  the  defendant  copied  a 

television  show  and  transported  it  to  Alaska  on  magnetic  tape.   The 

mere  copying  onto  magnetic  tape  was  considered  the  critical  element, 

not  the  rebroadcast  of  the  performance.   By  analogy,  one  can  reason 

that  the  copying  of  a  computer  program  which  is  on  magnetic  tape  is 

also  a  copyright  violation.   Translations  of  copyrighted  material  are 

also  prohibited,  and  thus  the  conversion  of  a  copyright  program  from 

one  language  to  another  through  a  compiler  should  also  constitute 

[321 
copyright  infringement.'-  ■' ■ 

IBM  Corporation  has  favored  copyright  protection,  and  Elmer 
Galbi,  Senior  Patent  Attorney  for  IBM,  has  proposed  a  revision  to  the 
Copyright  Act  which  includes  a  provision  allowing  the  copyrighting  of 
computer  software.  The  future  of  copyright  protection  of  software  is 
still  uncertain."-     If  the  counterclaim  in  Telex  v.  IBM  is  appealed 

by  Telex,  the  Telex  case  will  be  the  first  software  copyright  case 

r  3U] 
decided  by  a  court  of  appeals."-   -" 


TRADE  SECRET  PROTECTION 

A  viable  third  alternative  for  many  firms  is  the  use  of 
trade  secret  law  to  protect  software.   Just  as  common  law  copyright 
law  originates  in  the  common  law  of  each  state,  the  origin  of  trade 
secret  law  can  also  be  found  in  the  common  law  of  each  state.   Although 


the  scope  and  vitality  of  state  trade  secret  law  varies  from  state  to 

r35l 
state,  '-•^^-'  ,the  Restatement  of  Torts  offers  a  useful  definition: 

A  trade  secret  may  consist  of  any  formula,  device,  or 
compilation  of  information  which  is  used  in  one's 
business,  and  which  gives  him  an  opportunity  to  obtain 
an  advantage  over  competitors  who  do  not  know  or  use 
it. [36] 

In  Illinois,  a  trade  secret  is  Judicially  defined  as  "a  secret  plan  or 

process,  tool,  mechanism  or  compound  known  only  to  its  owner  and  those 

r  371 
of  his  employees  to  whom  it  is  necessary  to  confide  it. '"-   -■ 

Judicial  recognition  of  trade  secret  law  has  a  long  history. 
Speaking  for  the  Court  in  Board  of  Trade  of  Chicago  v.  Christie  Grain 
and  Stock  Co. ,  Justice  Holmes  recognized  trade  secret  law  when  he 
stated  that  "the  plaintiff  has  the  right  to  keep  the  work  which  it  has 
done,  or  paid  for  doing,  to  itself.   The  fact  that  others  might  do 
similar  work,  if  they  might,  does  not  authorize  them  to  steal  plain- 
tiff's."'-  -*   In  a  later  case,  however,  Justice  Holmes  pointed  out 
that  it  is  not  the  subject  matter  per  se  which  gains  for  itself  the 
status  of  trade  secret,  but  rather  "the  primary  fact  that  the  law 

makes  some  requirements  of  good  faith  . . .   The  property  may  be  denied, 

r  391 
but  the  confidence  cannot  be.  "'-   -^ 

In  order  to  find  sanctuary  in  the  law  of  trade  secrets, 
state  courts  have  held  that  a  trade  secret  must  meet  four  major  tests: 
1)  appropriateness  of  subject  matter,   2)  secrecy,   3)  novelty,  and 
k)   economic  value."-   -■  Appropriateness  of  subject  matter  has  three 
broad  subcategories  of  protectable  information:   l)  patentable  and 
unpatentable  inventions  along  with  know-how  associated  with  these 
inventions   (e.g.,  secret  processes,  patterns,  compounds),   2)  abstract 
ideas  of  a  commercial  or  industrial  nature  (e.g.,  advertising  plans, 
schemes  for  media  presentation),  and  3)  other  sorts  of  information 

which  are  not  novel,  but  which  are  of  value  to  the  owner  (e.g.,  cus- 

fUll 
tomer  lists,  discount  codes,  supply  sources).'- 


The  second  requirement  of  secrecy  is  rather  vague  and  has  at 
least  two  interpretations:   internal  and  external  secrecy.    ^        The 
distinction  between  internal  and  external  secrecy  is  basically  one 
between  in-house  secrecy  (which  involves  the  steps  taken  by  the  owner 
of  the  secret  to  prevent  its  disclosure  by  those  in  contractual  rela- 
tionships with  him)  and  industry  wide  secrecy  (which  involves  the 
knowledge  of  the  subject  matter  among  those  outside  of  the  owners 
control). •     When  the  secrecy  requirement  is  mentioned  by  courts, 
they  typically  are  referring  to  internal  secrecy. 

The  secrecy  requirement  is  not  absolute.   Some  disclosures 
are  permissible,  but  the  disclosures  are  limited  to  persons  who  enter 
into  confidential  relationships  with  the  owner  of  the  trade  secret.'-   -■ 
As  long  as  all  parties  maintain  the  secrecy,  the  independent  discovery 
of  the  information  by  others  need  not  destroy  its  protectable  status.'-   -' 
If  the  secret  is  revealed  by  dissemination  of  the  product  containing  it, 
the  trade  secret  is  no  longer  protected.*-  ^ 

The  third  requirement  of  novelty  is  not  as  stringent  as  its 

ri+7] 
counterpart  under  the  patent  statutes,"-    but  the  novelty  in  trade 

secret  law  is  more  discriminating  than  the  originality  concept  under 

alsi 


copyright  laws.*-   -^   The  degree  of  novelty  will  also  enter  into  the 


determination  of  damages  awarded  by  the  courts. 

The  fourth  requirement  dealing  with  economic  value  focuses 
on  such  factors  as  the  value  of  the  information,  the  amount  of  effort 
expended  in  obtaining  the  trade  secret,  and  the  difficulty  of  acquir- 
ing or  re-acquiring  the  trade  secret.'-  ^      In  a  few  instances,  heavy 

reliance  on  this  fourth  requirement  has  resulted  in  a  lowering  of  the 

rsii 
requisite  secrecy  and  novelty  standards."- 


10 


I 


Federal  Preemption  of  State  Trade  Secret  Law 

Although  both  the  definitions  and  actual  requirements  of 
trade  secret  vary  between  states,  there  is  a  well  developed  body  of 
trade  secret  law  existing  at  the  state  level.   This  state  trade  secret 
law  existed  for  many  years,  but  was  recently  threatened  by  a  series 
of  Supreme  Court  cases  beginning  in  the  mid-1960's.  A  brief  di- 
gression to  examine  this  line  of  cases  is  appropriate  to  better  appre- 
ciate the  position  which  trade  secret  law  occupies  in  American 

jurisprudence. 

r  521 
Sears  Roebuck  and  Co.  v.  St  iff  el  Co. "-  ^    and  a  companion 

[531 
case"-    were  the  first  Supreme  Court  cases  in  this  series  which 

threatened  the  very  existence  of  state  trade  secret  law.   In  Sears, 
a  pole-lamp  sold  by  Stiffel  Co.,  had  previously  been  held  unpatentable. 
Sears  copied  Stiffels'  design  and  sold  lamps  identical  to  the  Stiffel 
pole-lamp.   Stiffel  then  sued  Sears  under  the  Illinois  unfair  com- 
petition law.   The  Court  stated  that  an  "unpatentable  article,  like 

an  article  upon  which  a  patent  has  expired,  is  in  the  public  domain 

r  5^1 
and  may  be  made  and  sold  by  whoever  chooses  to  do  so.  "^   -*   In  broad 

language  threatening  the  very  existence  of  state  trade  secret  law  due 

to  existing  federal  patent  and  copyright  policy,  the  Court  held  that 

"a  state  may  not,  when  the  article  is  unpatented  and  uncopyrighted, 

prohibit  the  copying  of  the  article  itself  or  award  damages  for  such 

[55] 
copying.'-   -' 

[56] 
Five  years  later  in  Lear,  Inc.  v.  Adkins,     the  Court  held 

that  a  licensee  could  not  be  required  to  pay  royalties  under  a  contract 

which  challeng  ed  the  validity  of  a  patent.   The  Court  reasoned  that 

requiring  such  payments  would  undermine  the  federal  policy  favoring 

[571 
full  and  free  use  of  ideas  in  the  public  domain.'-   -'   In  commenting 

on  the  theoretical  basis  of  a  state  enforcing  patent  licensing  con- 
tracts, the  Court  stated  that  "(a)t  the  core  of  this  ...  is  the  diffi- 
cult question  whether  federal  patent  policy  bars  a  state  from  enforc- 
ing  a  contract  regulating  access  to  an  unpatented  secret  idea.  "^   -^ 


11 


Therefore,  although  Lear  actually  rested  on  a  contractual  issue  of 

licensees  paying  under  a  contract  while  testing  the  validity  of  a 

patent,  the  Court  again  questioned  the  validity  of  state  trade  secret 

la-w  based  on  federal  pre-emption  of  this  law  by  the  federal  patent 

policy. 

r59l 
In  Goldstein  V.  California/  ^-'  the  Court  held  that  the 

federal  consitutional  provision  authorizing  Congress  to  grant  copy- 
rights for  "limited  times"  was  only  a  limit  on  Congress  and  not  on  the 
states.   Thus  a  California  statute  making  it  a  criminal  offense  to 
pirate  recordings  produced  by  others  was  not  void  for  lack  of  a  dur- 
ational limit,  despite  the  federal  durational  limitation  on  the  Con- 
gressional power  to  grant  copyrights.'-   -'   The  key  to  Goldstein  is 
the  Court's  conclusion  that  by  congressional  silence,  Congress  indi- 
cated that  states  could  regulate  copyright  matters  of  a  purely  local 
nature.  Where  the  "need  for  free  and  unrestricted  distribution  of  a 
writing  is  thought  to  be  required  by  the  national  interest,  the  Copy- 
right Clause  . . .  would  allow  Congress  to  eschew  all  protection.  "*-   -' 
If  Congress  were  to  determine  that  a  matter  warranted  national  copy- 
right attention  and  then  preempt  the  field  by  concluding  that  no 
copyright  protection  was  needed,  any  state  action  would  be  ultra  vires 
which  attempted  to  protect  what  Congress  had  intended  to  be  free  from 
restraint. 

As  seen  from  Sears,  Adkins,  and  Goldstein  the  status  of 
state  trade  secret  law  was  very  unclear.   During  this  same  time 
period,  the  Court  decided  Gottschalk  v.  Benson'-  ^   which  has  been 
previously  discussed  in  the  patent  protection  section  of  this  docu- 
ment.  Gottschalk  invalidated  a  patent  for  a  computer  program  con- 
verting binary  coded  decimal  (BCD)  numerals  through  the  use  of  a 
mathematical  algorithm.  Reading  the  opinion  broadly,  one  could  con- 
clude that  all  computer  programs  are  unpatentable.'-   -'   If  this 
extreme  position  were  taken  (and  this  position  may  be  the  final  out- 
come after  several  patent  infringement  suits  reach  the  Supreme  Court) 


12 


the  combination  of  Got ts chalk  with  Sears,  Adkins,  and  Goldstein, 
leads  one  to  conclude  that  because  computer  programs  are  unpatentable, 
they  are  outside  the  area  of  trade  secret  protection,  and  thus  unpro- 
tectable  by  either  federal  or  state  law. 

The  threat  of  federal  preemption  over  state  trade  secret 
law  was  eliminated  in  May  of  197^  by  the  Supreme  Court  in  Kewanee  Oil 
Co.  V.  Bicron  Corp.      Kewanee  developed  a  patentable  process  which 
could  grow  a  seventeen  inch  crystal  of  a  type  useful  in  detection  of 
ionizing  radiation.   Kewanee  decided  to  forgo  patent  protection,  and 
instead  rely  on  trade  secret  law  for  the  protection  of  this  process. 
Several  Kewanee  employees  signed  agreements  not  to  disclose  trade 
secrets  obtained  while  employed  for  Kewanee.   These  employees  left 
Kewanee  and  formed  Bicron  Corp.  which  competed  with  Kewanee  in  pro- 
ducing the  seventeen  inch  crystals.   Based  on  Ohio  trade  secret  law, 
the  district  court  granted  a  permanent  injunction  against  Bicron  from 
producing  the  seventeen  inch  crystals.   The  Court  of  Appeals,  however, 
reversed  on  the  ground  that  Ohio's  trade  secret  law  was  preempted  by 
the  federal  patent  laws. 

The  Supreme  Court  reinstated  the  district  Court's  opinion 
by  holding  that  the  Ohio  trade  secret  law  was  not  preempted  by  the 
federal  patent  laws.   The  Court  distinguished  three  types  of  trade 
secrets:   one  known  only  to  its  owner  not  to  be  patentable,  one  whose 
patentability  is  considered  dubious,  and  one  believed  by  its  owner  to 
be  a  patentable  invention.   In  dealing  with  the  first  category  of  un- 
patentable inventions,  the  Court  reasoned  that  there  was  no  public 
interest  in  flooding  the  overburdened  Patent  Office  with  applications 
which  would  be  disapproved.   In  addition,  no  public  disclosure  would 
occur  because  patent  applications  which  are  denied  are  kept  confiden- 
tial.  Therefore,  as  to  unpatentable  inventions,  no  conflict  existed 
between  federal  disclosure  policy  and  state  protection  of  this  type 
of  trade  secret. 


13 


Concerning  those  trade  secrets  of  dubious  patentability, 
the  Court  invoked  the  Adkins  doctrine  that  invalid  patents  are  a 
serious  threat  "to  the  free  use  of  ideas  already  in  the  public  domain 
...  .  "'-     Reasoning  from  Adkins,  the  Court  concluded  that  since  a 
licensee  of  a  patent  could  challenge  the  validity  of  a  patent,  it  was 
better  that  an  invalid  patent  had  never  been  issued  in  the  first  place. 
The  elimination  of  state  trade  secret  law  would  bring  about  the 
issuance  of  more  invalid  patents  as  in  the  case  of  Lear,  and  thus 
would  have  an  even  greater  "deleterious  effects  on  society  and  patent 
policy  ...  . "^     Consequently,  the  Court  concluded  that  no  spectre 
of  federal  pre-emption  existed  in  this  second  category  of  dubious 
patentable  trade  secrets. 

In  dealing  with  the  third  category  of  clearly  patentable 
trade  secrets,  the  Court  reasoned  that  the  protection  available  to 
the  owner  of  an  invention  through  the  law  of  trade  secrets  is  far 
weaker  than  that  offered  by  a  patent,  and  consequently  the  risk  that 
an  inventor  with  a  clearly  patentable  item  would  opt  for  trade  secret 
protection  and  avoid  disclosure  is  remote  indeed."-   -^ 

Thus  the  Court  validated  all  three  types  of  trade  secrets 

r  ^Pti 
despite  the  federal  policy  of  disclosure."-   -'   Unless  Congress  takes 

affirmative  action,  state  trade  secret  law  is  not  preempted  by 

federal  patent  policy. 

Software  and  Trade  Secrets 

With  the  very  existence  of  state  trade  secret  law  settled 
in  light  of  Kewanee,  it  is  appropriate  to  return  to  the  four  require- 
ments of  trade  secrets  [  l)  appropriateness  of  subject  matter,   2) 
secrecy,   3)  novelty,  and  k)    economic  value],  to  determine  their 
applicability  to  the  special  case  of  software.   Computer  programs 
clearly  fall  within  the  first  requirement  of  appropriateness  of  sub- 
ject matter.  Most  authorities  allow  trade  secret  protection  of  those 
entities  within  the  "processes,"  "mechanism,"  and  "compounds"  class, '- 


Ik 


and  therefore,  any  completed  program  is  protectable.   Those  programs 
which  are  in  the  developmental  stage  are  not  as  safe  as  completed 
programs,  but  "as  the  idea  becomes  more  detailed  and  moves  toward  im- 
plementation, it  is  more  likely  to  be  regarded  as  qualified  for  trade 
secret  protection.  "'-   -■   Mere  documentation  and  data  in  the  form  of 
programs  will  probably  fall  in  the  least  protectable  class  of  "infor- 
mation, involving  no  element  of  novelty  or  discovery,  but  of  value  to 

FTll 
its  owner.  ""-   -• 

In  order  to  insure  fulfillment  of  the  secrecy  requirement, 
special  care  must  be  taken  by  the  owner  both  in  the  case  of  maintaining 
in-house  secrecy  and  in  the  case  of  selective  proliferation  of  the 
program.   Unintentional  duplication  of  programs  is  commonplace,  and 
thus  in  the  case  of  in-house  secrecy,  the  owner  should  ensure  limited 
access  to  the  program.   Relevant  documents  should  be  stamped  as  secret 
or  confidential.   Public  statements  about  developments  should  be  clear- 
ed in  advance  through  a  legal  officer,  and  careful  records  should  be 

[721 
kept  of  all  persons  to  whom  the  information  is  disclosed.^   -'   Secrecy 

is  frequently  the  key  issue  in  trade  secret  litigation,  therefore, 

these  safeguards  must  be  taken  seriously. 

Similarly,  in  the  case  of  a  sale  or  rental  of  a  program 
package,  the  owner  should  contract  with  the  vendee  to  insure  that 
disclosures  are  limited  and  closely  controlled  to  protect  the  trade 
secret  status  of  the  program  package.   Various  methods  are  available 
to  facilitate  maintaining  this  secrecy  including  l)  only  allowing 
the  transfer  of  object  code,   2)  limiting  the  amount  of  documentation 
transferred  with  the  package,   3)  establishing  a  licensing  system  on 
an  individual  installation  basis,  and  h)    contractual  provisions  to 
limit  the  grantee  or  licensee  in  proliferation  of  the  program  from 
the  installation  cite. 

Very  little  has  been  written  on  the  novelty  requirement  of 
computer  programs  for  trade  secret  protection  due  to  the  limited  case 
law  dealing  specifically  with  trade  secret  protection  of  computer 


15 


software.   It  -would  appear,  however,  that  if  a  program  involves  many 
complicated  subroutines,  the  novelty  requirement  would  be  satisfied. 

The  fourth  requirement  of  value  hinges  on  the  value  both  in 
monetary  and  non-monetary  terms  which  the  program  has.   The  greater 

the  value  of  the  program,  the  wider  the  scope  of  protection  afforded  by 

r73l 
the  law  of  trade  secrets.'-   -"    Consequently,  it  behooves  the  owner  to 

establish  a  detailed  log  for  each  use  of  the  program  to  provide  tangi- 
ble evidence  of  its  value.   The  log  will  establish  that  such  efforts 
were  worth  the  time  and  energy  of  the  owner,  and  thus  implicity,  that 
the  program  is  valuable.   Establishing  the  actual  development  costs 
of  the  program  is  also  an  important  element  in  ensuring  common  law 
protection. 

Scope  of  Protection 

The  Restatement  of  Torts  outlines  the  protection  given  by 
trade  secret  law.   Generally  a  person  is  liable  for  the  use  or  dis- 
closure of  another's  trade  secret  when  he  either  discovers  the  secret 
by  improper  means,  or  breaks  a  confidence  which  he  has  with  others. 
Further,  an  individual  is  liable,  if  with  full  knowledge  of  the  facts, 
he  learns  the  secret  from  a  third  party.   Finally,  if  disclosure  is 
accidentally  made  to  an  individual,  and  the  individual  is  informed  of 
the  facts,  the  individual  is  liable  if  he  uses  the  trade  secret.^   -' 
In  the  case  of  innocent  discovery  of  the  secret,  a  person  is  not 
liable  for  his  own  use  of  the  secret  until  he  receives  notice  of  the 
mistaken  disclosure. 

A  common  method  to  protect  computer  software  is  the  use  of 


restrictive  contractual  agreements  between  the  owner  of  the  trade 

r75l 
secret  and  all  others  with  whom  he  deals.'-   -^   The  two  distinct  cat 

gories  of  such  contractual  agreements  are  employee  and  non-employee 

contracts.   Clauses  in  employee  contracts  requiring  non-disclosure 

both  during  employment  and  after  employment  are  commonly  used.'- 


16 


These  clauses  are  hardest  to  enforce  when  trained  employees  with 

[771 
valuable  skills  are  involved.^''-'   Another  common  device  used  in 

employee  contracts  is  the  non-competition  clause.   These  clauses 
simply  limit  an  employee  from  competing  with  the  employer  for  a  de- 
finite time  period  and  within  a  specified  geographic  area  once  the 
employee  terminates  his  relationship  with  the  employer.   Courts  have 
applied  a  rule  of  reason  to  both  time  and  geographic  limitations.   The 
reasonableness  of  the  time  period  in  restrictive  agreements  will  vary 
between  juridictions,  and  may  vary  depending  on  the  type  of  position 
held  by  the  employee.'-   -'   Traditionally,  geographic  limitations  have 
been  viewed  as  the  competitive  region  of  the  employer,  but  the  soft- 
ware industry  is  national  in  scope,  and  thus  national  territorial 

r79l 
limitations  should  be  valid.'-   -" 

Non-employee  contracts  are  more  difficult  to  deal  with.   A 
confidential  relationship  is  less  likely  to  be  implied  with  non-employ- 
ees, and  thus  specific  contractual  provisions  with  leasees  and  vendees 
are  essential  to  ensure  successful  protection.   If  the  owner  chooses 
to  lease  his  program  on  a  non- exclusive  basis,  the  leasee  will  only 
acquire  the  right  to  use  the  program  while  title  remains  in  the  lessor. 
In  the  contract,  the  leasee  should  agree  to  prevent  intentional  and 
unintentional  disclosures  to  third  parties.   The  time  period  of  the 
lease  as  well  as  the  method  of  disposition  of  the  transferred  materials 
at  termination  of  the  lease  should  also  be  specified. 

If  the  developer  chooses  to  sell  the  software,  full  title 
and  exclusive  rights  will  be  transferred  to  the  vendee.   In  this  case 
the  vendor  must  agree  to  forego  use  and  disclosure  of  the  program 
once  the  sale  is  finalized.   Unnecessary  litigation  can  be  avoided  by 
specifying  the  exact  terms  of  the  transaction  in  the  contract. 

A  transaction  similar  to  outright  sale  of  software  is  a 
contract  for  development  of  a  program.   Problems  arise,  however,  from 
the  fact  that  the  subject  matter  of  the  contract  (technically  known 


17 


as  the  res)  does  not  exist  at  the  time  of  execution  of  the  contract. 
In  this  relationship,  title  may  reside  in  either  party  to  the  contract, 
and  therefore,  the  division  of  rights  sho\ald  be  clarified  before  exe- 
cution of  the  contract.  Matters  such  as  the  rights  which  the  developer 
has  in  using  variations  of  the  program  for  other  contracts  should  be 
clarified.*-  ■ 

Although  outside  the  scope  of  this  document,  once  a  contract 
to  license,  sell,  or  develop  is  under  consideration,  there  are  many 
additional  legal  implications.   The  normal  legal  provisions  of  contract 
law  enter  into  each  contract  such  as  warranty  liability  and  penalities 
for  late  completion.   Careful  thought  must  be  given  to  tax  implications 
of  the  contract  as  well  as  other  legal  areas  such  as  antitrust  con- 
siderations. All  of  these  matters  will  not  be  further  developed  at 
this  point  due  to  the  vast  amount  of  literature  in  the  field  and  the 
impossibility  of  considering  all  aspects  for  each  contract. 

Criminal  and  Non-Criminal  Remedies  Under  Trade  Secret  Law 

On  the  civil  side,  the  owner  of  a  trade  secret  may  obtain 

injunctive  relief  to  prevent  an  appropriator  from  either  disclosing 

the  secret  to  a  third  party  or  using  the  secret  himself.'-     If  the 

secret  has  already  been  disclosed  to  a  third  party  or  used  by  the 

appropriator,  the  owner  may  seek  damages  resulting  from  the  disclosure 

or  from  the  profits  accured  by  the  use  of  the  trade  secret.'-   -'   In  a 

recent  case  on  trade  secret  protection  of  computer  equipment  including 

software,  the  court  in  Telex  v.  IBM^    held  that  Telex  had  violated 

the  Oklahoma  trade  secret  law  and  thus  ruled  in  favor  of  IBM's 

[Qk] 
counter  claim  against  Telex. 

A  relatively  new  aspect  of  trade  secret  protection  is  the 
use  of  state  criminal  sanctions.   A  financially  destitute  employee 
with  little  to  lose  economically,  may  consider  appropriating  a  trade 
secret  if  the  risk  is  only  a  civil  injunction  or  a  civil  action  for 


18 


damages.       The  damage  done  to  a  developer  can  be  considerable,  and 
thus  many  states  have  added  criminal  penalties  as  an  additional  de- 
terrent against  trade  secret  theft.   Two  methods  of  providing  such 
sanctions  presently  exist:   criminal  prosection  for  software  theft  if 
the  stolen  information  is  in  such  a  form  as  to  fit  the  relevant  lan- 
guage of  the  existing  statute,  and  specific  criminal  sanctions  for 
misappropriation  of  trade  secrets.'-  ^        The  first  category  of  general 
statutory  sanctions  may  be  further  divided  into  those  jurisdictions 
■which  define  the  subject  matter  of  theft  in  terras  of  property,    -^ 
those  jurisdictions  which  qualify  or  extend  (in  the  form  of  lists)  the 

e  ju: 
[89] 


property  concept  in  the  relevant  statutes,^  ^    and  those  jurisdictions 


which  provide  statutory  protection  for  things  of  value. 

Three  complications  arise  when  these  statutes  are  used  to 
protect  trade  secrets.   First,  many  of  the  statutes  do  not  carry  sig- 
nificant penalties  (if  at  all)  for  theft  involving  an  "intent  to 
return, "  and  thus  the  appropriator  might  easily  take  the  program, 
copy  it,  and  then  return  it.   Thus  the  damage  would  have  been  done, 
but  the  appropriator  would  be  immune  from  criminal  prosecution  under 
the  general  statutes.'-     Second,  if  the  relevant  statutory  wording 
only  includes  the  article  in  which  the  secret  is  embodied  (i.e., 
magnetic  tapes  or  sheets  of  paper),  the  protection  is  worthless. 
Third,  the  trade  secret  must  qualify  for  protection  or  the  statute 
will  be  impotent  against  appropriation  by  memory  rather  than  copying 
of  the  informatioii. 

At  the  federal  level,  no  express  trade  secret  statutes 

exist.   There  are,  however,  statutes  which  prohibit  the  transporta- 

r  911  r  921 

tion*-   -"  and  sale  or  receipt^   -'  or  stolen  goods,  wares,  merchandise, 

securities,  or  money.   The  problems  raised  under  the  discussion  of 

state  larcency  statutes  are  also  pertinent  under  the  federal  statutes. 

It  is  still  not  settled  whether  the  theft  of  computer  programs  falls 

under  the  federal  statutes.'-   -'   Further,  no  protection  exists  under 

these  statutes  against  appropriation  by  memory.  ■- 


19 


Overall,  trade  secret  protection  of  software  is  a  viable 

r951 
alternative  for  private  industry.'-      Although  trade  secret  protec- 
tion has  serious  limitations,  it  currently  appears  to  be  the  best 
alternative  for  private  enterprise . 

THE  IMIVERSITY  ENVIRONMENT  AND   PROTECTION  OF  SOFTWARE 

As  universities  become  more  heavily  involved  in  software 
development,  they  must  determine  if  they  want  to  legally  protect  the 
software  they  develop.   If  the  university  policy  is  to  legally  pro- 
tect the  software  which  has  been  developed  for  commercial  use,  then 
there  are  three  alternatives.   As  previously  discussed,  the  area  of 
patent  protection  is  currently  very  unsettled.   Even  those  patents 
which  are  being  granted  may  later  be  invalidated  in  an  infringement 
suit.   Copyrights  also  present  problems  in  that  the  amount  of  real 
protection  afforded  by  a  copyright  is  still  unknown.   At  first  blush, 
therefore,  trade  secret  law  appears  the  most  viable  method  to  protect 
software  which  a  university  has  developed  and  to  which  the  university 
has  title. 

A  full  discussion  of  all  policy  considerations  of  trade 
secret  protection  of  software  in  a  university  environment  is  beyond 
the  scope  of  this  document,  however,  a  few  of  the  advantages  and 
disadvantages  in  the  use  of  trade  secret  protection  merit  brief  atten- 
tion.  Assuming  the  profits  from  the  project  are  shared  with  the 
university  personnel  who  developed  the  software,  the  remaining  funds 
accrue  to  the  state  university  at  no  expense  to  the  taxpayer.   On  the 
negative  side,  one  can  argue  that  the  goal  of  the  university  should 
not  be  a  business  of  exploiting  business  ventures,  but  rather  should 
be  one  of  education.   Therefore,  the  university  policy  should  be  one 
of  public  dedication  of  all  software  which  is  developed  at  the  uni- 
versity rather  than  trade  secret  protection  of  the  software  and  com- 
mercial sale  of  the  software. 


20 


Assuming  for  the  moment  that  the  university  policy  is  to  use 
trade  secret  laws  to  protect  software  which  is  developed  for  commer- 
cial sale,  this  policy  is  fraught  with  danger.   First,  employment 
agreements  would  have  to  he  established  in  which  faculty  members 
agreed  to  maintain  the  confidentiality  of  any  software  which  they 
developed.   Next,  all  publications  would  have  to  be  censored  which 
dealt  with  the  software  being  protected  by  trade  secret.   Finally, 
all  research  done  on  protected  software  would  have  to  be  done  under 
lock  and  key.   It  should  be  noted,  however,  that  the  censorship  and 
lock  and  key  research  requirements  are  not  new  to  the  university  in 
that  some  government  sponsored  research  and  development  is  done  in  the 
university  environment  which  requires  these  types  of  security  measures. 

The  establishment  of  proper  incentives  for  software  develop- 
ment in  a  university  environment  is  also  a  difficult  problem.   Three 
general  types  of  incentives  exist.   First,  at  the  beginning  stages 
of  an  individual's  career,  acceptance  in  his  field  will  be  sufficient 
incentive.   It  should  be  noted,  however,  that  the  power  of  this  in- 
centive quickly  diminishes  as  the  individual  becomes  accepted  in  his 
field.   Second,  as  an  individual  successfully  develops  software,  he 
can  be  advanced  within  the  organization,  and  thus  the  individual  will 
receive  both  monetary  gains  as  well  as  peer  group  approval  as  incentive 
for  further  software  development.   Again,  however,  the  power  of  this 
second  type  of  incentive  diminishes  as  an  individual  reaches  higher 
levels  of  the  organization.   Finally,  there  can  be  some  type  of  direct 
payment  to  university  personnel  for  the  development  of  software. 

At  present  the  University  of  Illinois  does  not  have  a  formal 
procedure  to  reward  university  personnel  who  successfully  develop 

software.   The  General  Rules  Concerning  University  Organization  and 

r97l 
Procedure,'-   -'  only  provide  a  modest  incentive  for  development  of 

patentable  ideas  and  authorship  of  copyrightable  material.   The  Pro- 
cedure on  Patent  Matters  of  The  General  Rules  is  the  key  provision  in 
payment  to  inventors  and  reads  as  follows: 


21 


The  determination  as  to  what  portion  of  net  income  shall 
be  paid  to  the  inventor  or  discoverer^  after  the  payment 
of  costs  of  securing  a  patent  and  of  development  and  admin- 
istration, from  a  patent  held  by  the  University  or  trans- 
ferred by  it  to  the  University  of  Illinois  Foundation  shall 
be  studied  by  the  University  Patent  Committee,  which  shall 
make  a  recommendation  to  the  President.   In  most  cases,  the 
University  contribution  in  use  of  facilities  and  resources 
will  be  significant  and,  therefore,  the  inventor  will  have 
little  real  claim  to  compensation  over  his  regular  Univer- 
sity salary.   In  some  cases,  the  University  Patent  Committee 
shall  recommend  that  the  proportion  of  net  income  assigned 
to  the  inventor  shall  fall  in  the  range  of  10  to  15  per  cent 
of  net  income.   In  unusual  cases,  in  which  the  University 
contribution  is  obviously  less,  this  percentage  allocation 
to  the  inventor  may  go  to  25  per  cent  and,  in  rare  cases, 
the  rate  may  be  higher.   (emphasis  added)[98l 

The  use  of  net  income  is  critical,  in  that  the  inventor  has 
little  control  over  the  expenses  which  the  University  incurrs  in  the 
adrainistration  and  development  of  his  patent. 

The  Copyright  and  Recordings  section  of  The  General  Rules 
provides  the  framework  for  payment  to  authors  who  copyright  material. 
The  main  section  reads  as  follows: 

A  University  Committee  on  Copyrights  and  Recordings, 
appointed  by  the  President,  will  review  the  circum- 
stances involved  in  each  case  that  might  arise  under 
the  principle  stated  in  (e),  [the  use  or  sale  of  copy- 
righted material  resulting  in  net  income  to  the  Uni- 
versity] and  make  recommendation  concerning  it  to  the 
President  and  Board  of  Trustees.   It  is  expected  that 
the  Committee  will  be  guided  in  its  recommendations  by 
standards  analogous  to  those  stated  in  Section  18(g) 
concerning  patents. [99] 

Therefore,  at  present  the  University  of  Illinois  does  not  have  a 
formal  procedure  to  reward  and  encourage  software  development,  but 
provisions  do  exist  to  encourage,  on  modest  levels,  the  development 
of  patentable  inventions  and  copyrightable  material. 


22 


Academic  Freedom 

The  secrecy  measures  necessary  for  the  trade  secret 
protection  of  software  conflict  with  the  general  principles  of  aca- 
demic freedom,  rights  and  freedoms  of  students,  and  professional  ethics 
of  faculty.   For  example,  the  University  of  Illinois  Statutes  state 
that: 

It  is  the  policy  of  the  University  to  maintain  and 
encourage  full  freedom,  within  the  law,  of  inquiry, 
discourse,  teaching,  research  and  publication  and  to 
protect  any  member  of  the  academic  staff  against  in- 
fluences, from  within  or  without  the  University, 
which  would  restrict  him  in  the  exercise  of  the  free- 
doms in  his  area  of  scholarly  interest.  [100] 

The  I9U0  Statement  of  Principles  on  Academic  Freedom  and  Tenure  of  the 
American  Association  of  University  Professors  and  the  Association  of 
American  Colleges  states: 

Institutions  of  higher  education  are  conducted  for  the 
common  good  and  not  to  further  the  interest  of  either 
the  individual  teacher  or  the  institution  as  a  whole. 
The  common  good  depends  upon,  the  free  search  for  truth 
and  its  free  expression. 

Academic  freedom  is  essential  to  these  purposes  and 
applied  to  both  teaching  and  research  . . .  Academic 
freedom  in  its  teaching  aspect  is  fundamental  for  the 
protection  of  the  rights  of  the  teacher  in  teaching 
and  of  the  student  to  freedom  in  learning. 

(a)   The  teacher  is  entitled  to  full  freedom  in 
research  and  in  the  publication  of  the  results  sub- 
ject to  the  adequate  performance  of  his  other  academic 
duties,  but  research  for  pecuniary  return  should  be 
based  upon  an  understanding  with  the  authorities  of 
the  institution.   (emphasis  added  and  footnotes 
omit ted)  [101] 

The  preamble  of  the  Joint  Statement  on  Rights  and  Freedoms  of  Students 
of  the  American  Association  of  University  Professors,  the  National 
Association  of  Student  Personnel  Administrators,  the  United  States 
National  Student  Association,  the  American  Association  of  Colleges, 


23 


the  Association  of  American  Colleges,  and  the  National  Association 
of  Women  Deans  and  Counselors  states: 

Freedom  to  teach  and  freedom  to  learn  are  inseparable 
facets  of  academic  freedom.   The  freedom  to  learn 
depends  on  appropriate  opportunities  and  conditions 
in  the  classroom^  on  the  campus,  and  in  the  larger 
community.  [  102] 

Finally,  the  Statement  on  Professor  Ethics  of  the  American  Association 
of  University  Professors  emphasizes  the  need  for  complete  academic 
freedom  by  stating: 

As  a  member  of  his  institution,  the  professor  seeks  above 
all  to  be  an  effective  teacher  and  scholar.  Although  he 
observes  the  stated  regulations  of  the  institution,  pro- 
vided they  do  not  contravene  academic  freedom,  he  main- 
tains his  right  to  criticize  and  seek  revision.  [103] 

As  one  can  see,  the  use  of  trade  secret  law  to  protect 
software  in  a  university  environment  has  major  obstacles.   Overall, 
the  only  solution  is  to  examine  each  case  on  an  individual  basis.  A 
balance  must  be  made  between  the  right  of  students  to  learn  in  an 
environment  unburdened  by  security  measures,  the  right  of  faculty  to 
teach  and  do  research,  and  finally  the  right  of  society  to  receive  the 
maximum  return  on  all  resources  spent  on  universities.   The  balance 
is  an  extremely  difficult  one  to  draw,  and  only  time  will  tell  the 
eventual  outcome  of  such  considerations.'-    -' 

GOVERNMENT  PROCUREMENT  OF  SOFTWARE 

An  additional  area  of  concern  is  the  relationship  between 
both  private  and  public  suppliers  of  software  and  the  federal  Govern- 
ment.  One  of  the  main  reasons  the  Federal  Government  must  contract 
for  development  of  software  is  the  high  manpower  costs  of  properly 
trained  computer  personnel.   Salaries  of  twenty  to  twenty-five 
thousand  are  common  for  qualified  personnel,  but  the  present  civil 
service  salary  system  cannot  easily  accommodate  such  high  salaries. L  -^^ 


2k 


Although  direct  sales  of  pre-developed  software  protected 
under  patents  or  copyrights  would  be  the  best  legal  method  to  contract 
with  the  Government  for  software,  such  situations  are  atypical  J  ■'-'^"^ 
The  normal  situation  is  for  the  Government  to  contract,  for  the  devel- 
opment of  software.   There  are  three  main  methods  to  contract  for  soft- 
ware development.^      First,  a  software  firm  may  contract  to  supply 
trained  personnel  on  a  daily  basis  to  develop  software  for  the  Govern- 
ment.  If  this  is  done,  it  is  reasonably  clear  that  the  Government  is 
entitled  to  exclusive  rights  to  all  software  developed  by  the  software 
personnel.   Another  method  is  to  bid  for  a  contract,  but  to  include 
a  cost  plus  clause  in  which  the  Government  agrees  to  absorb  any  addi- 
tional costs  above  a  certain  figure  under  various  conditions  of  cost 
overruns.   Again,  the  Government  pays  for  everything  and  thus  it  is 
reasonably  clear  that  the  Government  would  acquire  exclusive  rights 
to  the  contract. 

The  third  approach  is  to  contract  for  software  development, 
but  the  cost  is  a  fixed  item  in  the  contract.   If  the  Government 
supplied  all  of  the  resources  to  develop  the  software,  then  the  Govern- 
ment should  be  entitled  to  exclusive  rights  in  the  software.   The 
difficulty  arises  when  the  software  developer  supplies  some  of  the 
resources  in  the  software  development. 

Patent  Rights  and  Rights  to  Data  Clauses 

In  most  government  contracts  for  research  and  development 
and  governmental  supply,  two  types  of  provisions  outlining  the  govern- 
ment's rights  to  intellectual  property  are  included.*-    ^      These  two 
provisions  are  the  patent  and  data  clauses.   The  patent  provision, 
usually  entitled  the  Patent  Rights  clause,  requires  that  the  contractor 
supply  the  Government  written  disclosure  of  each  invention  conceived 
of  under  the  contract  or  the  first  reduction  to  actual  practice.   Most 
rights  which  the  Government  has  under  the  patent  clause  are  specifi- 
cally spelled  out,  but  these  specified  rights  do  not  presently  cover 


25 


software.   NASA  had  adopted  a  broader  patent  provision  referred  to  as 

riOQl 
the  New  Technology  clause'-    -'  which  replaces  the  traditional  Patent 

Rights  clause.   The  New  Technology  clause  requires  the  reporting  of 

all  inventions^  and  in  addition,  the  reporting  of  all  innovations. 

The  data  provision,  usually  entitled  the  Rights  in  Data 
clause,  is  used  in  most  Government  contracts  where  the  delivery  of 
data  is  specified.   This  clause  does  not  specifically  call  for  acqui- 
sition of  any  data,  but  rather  defines  the  rights  which  the  govern- 
ment has  in  the  specified  data.   The  rights  which  the  government  has 
under  the  Rights  in  Data  clause  are  either  limited  to  very  specified 
uses,  or  unlimited. '- 

Delivery  of  computer  programs  may  be  specifically  required 
in  the  contract,  or  delivery  provisions  may  be  included  under  the 
general  patent  provision.   Thus  the  rights  which  the  Government  has 
in  any  computer  programs  developed  under  the  contract  depend  on 
whether  the  patent  or  data  provision  of  the  contract  is  used. 

As  can  be  seen  from  this  general  discussion,  no  specific 
contract  provisions  currently  exist  which  explicitly  define  the  rights 
of  each  party  to  a  Government  software  procurement  contract.  An  ex- 
ample of  this  ambiguity  can  be  found  in  McDonnell  Automation  Co.^    ^ 
in  which  the  Air  Force  contracted  for  a  computer  program  to  aid  Air 
Force  attorneys  in  researching  various  federal  statutes.   After  the 
system,  entitled  Legal  Information  Through  Electronics  (LITE),  was 
developed,  the  contractor  protested  when  the  Government  exerted  un- 
limited rights  to  the  program  under  the  Rights  in  Data  clause.   The 
Comptroller  General  held  that  the  Government  was  entitled  to  an  un- 
limited license  to  the  program  under  the  Rights  in  Data  clause.  With 
proper  contract  provisions  dealing  with  computer  programs,  this  case 
and  many  unreported  disputes  could  be  avoided  in  Government  procure- 
ment law. 


26 


Software  Revision  to  ASPR's 

In  response  to  the  need  for  a  specific  contract  provision 
dealing  with  computer  programs  the  Armed  Services  Procurement  Regula- 
tion Committee  issued  a  proposed  change  to  the  Armed  Services  Procure- 
ment Regulation  (ASPR)  in  September  of  1973-^   ^-'   Much  debate  has 
occurred  over  this  proposal,  and  final  issuance  of  a  new  ASPR  on  com- 
puter programs  has  not  occurred. 

Assuming  a  contractor  negotiates  a  limited  Rights  in  Data 
clause  with  the  Government,  the  contractor  must  still  determine  the 
type  of  legal  protection  which  he  will  use  to  protect  his  software. 
Currently,  the  most  viable  method  to  use  in  protection  of  computer 
programs  is  trade  secret  law.   Until  recently,  it  was  an  axiom  of 
Government  contract  law  that  the  exclusive  remedy  for  governmental 
breach  of  a  contract  providing  for  limited  use  of  proprietary  data'-    •* 
was  a  damage  action  in  the  Court  of  Claims  pursuant  to  the  Tucker 
Act.'-    -'   This  belief  was  recently  shattered  in  International  Engin- 
eering Co.  V.  Richardson'-    ^    in  which  plaintiff  sought  to  enjoin  the 
Government's  misuse  of  proprietary  information.   The  district  court 
held  that  it  did  have  jurisdiction  and  did  grant  an  injunction  against 
the  Government's  misuse  of  the  proprietary  information. 

Other  remedies  for  the  Government's  misuse  of  proprietary 
information  include  requests  to  the  General  Accounting  Office  to  have 
the  Comptroller  General  order  cancellation  of  bids  (or  requests  for 
bid  proposals)  if  proprietary  data  is  being  disclosed  by  the  Govern- 
ment.'-   -'   The  Boards  of  Contract  Appeals  is  another  alternative  to 
prevent  the  Government's  misuse  of  proprietary  data."-    -'   The  Boards, 
however,  only  have  jurisdiction  over  current  contracts.   Finally,  a 
suit  for  unauthorized  use  of  proprietary  information  could  be  brought 
in  the  Court  of  Claims.'-    -'   Damages  would  then  have  to  be  assessed, 
based  on  the  damage  sustained  by  the  victim  or  by  the  profits  earned 
by  the  wrongdoer  who  used  the  misappropriated  material.   The  latter 


27 


course  of  action^  however,  is  unappealing  due  to  the  fact  that  the 
secrecy  of  the  computer  program  is  lost,  and  thus  future  use  of  the 
program  under  trade  secret  protection  is  impossible. 

Once  the  ASPR  software  regulation  is  issued,  future  contracts 
with  the  Government  should  become  better  defined.   In  addition,  if  the 
present  case  law  develops  and  allows  injunctive  relief  in  federal 
District  court,  the  protection  of  software  through  trade  secret  law 
will  be  more  viable  due  to  the  immediate  availability  of  judicial 
remedy  through  injunctive  relief. 

CONCLUSION 

Although  many  alternatives  exist  for  the  legal  protection 
of  software,  no  definite  answer  exists  for  the  best  method  to  protect 
software  in  both  the  public  and  private  sectors  of  the  economy.   On 
the  private  side  of  the  economy,  a  developer  of  software  may  be  able 
to  obtain  patent  protection  if  the  computer  program  is  related  to  a 
mechanical  device  and  falls  under  the  line  of  cases  currently  being 
decided  by  the  Court  of  Custom  and  Patent  Appeals.   It  should  be  noted, 
however,  that  the  ti^e  test  of  these  patents  will  be  in  an  infringe- 
ment suit.   Next,  copyright  protection  may  be  an  alternative,  and  as 
seen  in  the  recent  Telex  v.  IBM,  such  protection  has  withstood  the 
first  test  at  the  district  court  level.  At  present,  probably  the 
optimal  technique  to  protect  software  due  to  the  uncertainties  of 
patent  and  copyright  protection  is  through  the  use  of  trade  secret  law. 
The  use  of  trade  secret  law,  however,  is  by  no  means  without  difficulty. 
In  contracts  between  private  developers  and  the  Government,  trade 
secret  protection  is  more  viable  today  due  to  the  recent  case  law 
allowing  injunctive  relief  against  the  Government  for  misuse  of  trade 
secret  data  by  the  government.   The  revision  of  the  ASPR  regulations 
on  computer  programs  will  also  help  clarify  this  situation. 


28 


On  the  public  side  of  a  university  developing  computer 
software  for  commercial  sale,  the  picture  is  even  less  clear.   The 
university  must  face  the  legal  obstacles  of  either  patent,  copyright, 
or  trade  secret  protection  which  the  private  sector  has  to  consider. 
In  addition,  if  the  university  were  to  adopt  trade  secret  protection 
of  software,  the  university  must  resolve  the  conflict  between  trade 
secrets  and  academic  freedom.   Even  if  all  of  these  issues  could  be 
resolved,  there  is  no  definitive  answer  as  to  the  contractual  relation 
between  a  university  and  the  Government  in  contracting  for  software 
in  which  the  university  has  contributed  some  of  its  own  resources  in 
the  development  of  the  software. 

The  computer  industry  is  dynamic,  and  the  most  rapid  growth 
now  occurring  in  the  industry  is  in  software  development.   Software 
technology  has  outgrown  the  legal  development  of  software  protection. 
Thus  in  the  foreseeable  future,  the  legal  protection  and  regulation 
of  software  will  remain  in  a  state  of  flux  until  major  solutions 
evolve  which  permit  an  intelligent  and  rational  method  to  protect 
computer  software. 


29 


NOTES 


[ I]  Bauer,  "Software  Markets  in  the  70's/'  Expanding  Use  of 

Computers  in  the  7Q's:  Markets --Needs- -Technology, 
(ed  by  Grunberger,  197lT 

[2]      Auerbach,  "Technological  Forecast/'  Expanding  Use  of  Computers 
in  the  70's:  Markets--Needs --Technology,  (ed  by 
Grunberger,  1971) • 

[3]      See  generally.  Bower,  "Market  Changes  in  the  Computer  Services 
and  Industry,  k   The  Bell  Journal  of  Economics  and 
Management  Science  ^39'  (1973). 

[k]  See  e.g.   George  Washington  University,  Computers  in  Law 

Institute,  The  Law  of  Software  (1968  and  I969).   For  an 
up  to  date  bibliography  on  software  protection  see 
American  Bar  Association,  Section  of  Patent,  Trademark 
and  Copyright  Law,  197^  Committee  Report  (prepared  for 
the  I97U  ABA  Meetings  August  12-15,  197^)  [hereinafter 
ABA,  1974  Report] . 

[ 5]      Hardware  clearly  falls  under  the  statutory  definition  of  a 
machine  or  manufacture.   35  U.S.C  §  101  (197O). 

[6]      See  e^.   S.  I36O,  93rd  Cong.,  2nd  Sess.   See  also  ABA, 

197^  Report  for  a  discussion  of  various  parts  of  these 
proposals  to  amend  the  existing  patent  laws. 

[7]      Mackay  Co.  v.  Radio  Corp.,  306  U.S.  86,  (1938). 

[8]      See  e^.   Cochrane  v.  Diener,  9^+  U.S.  780  (1876);   O'Reilly 
V.  Morse,  I5  How  (56  U.S.)  62  (l853). 

[9]      Woodcock,  "Mental  Steps  and  Computer  Programs,"  52  J.  Pat. 
Off.  Soc'y.   275  (1970). 

[10]     See  Note,  lU  Boston  Coll.  Ind.  and  Comm.  L.  R.  IO5O  (1973); 
Note,  k   Loyola  Univ.  of  Chicago,  L.  J.  56O  (1973). 

[II]  Commission  on  Patent  System,  The  1966  Report  of  the 

President's  Commission  on  the  Patent  System  (reprinted 
in  S.  Doc.  No.  5,  90th  Cong.,  1st  Sess.  p  21). 

[12]     i+09  U.S.  63  (1972). 


30 


[13]     Congress  defined  the  categories  of  discoverers  and  inventions 
for  which  patents  may  presently  be  granted: 

The  term  "process"  means  process,  art  or  method,  and 
includes  a  new  use  of  a  known  process,  machine,  manu- 
facture, composition  of  matter,  or  material.   3^  U.S.C 
§  100(b). 

In  addition,  35  U.S.C.  §  101  provides: 

Whoever  invents  or  discovers  any  new  and  useful  process, 
machine,  manufacture,  or  composition  of  matter,  or  any 
new  and  useful  improvement  thereof,  may  obtain  a  patent 
therefore,  subject  to  the  conditions  and  requirements 
of  this  title. 

[lU]     Application  of  Benson,  UUl  F.2d  682  (C.C.P.A.  1971). 

[15]     See  Note,  k   Loyola  Univ.  of  Chicago  L.  R.  560,  575  (1973)- 

[16]     See  Application  of  Brandstadter,  kQk   F.2d  1395  (CC.P.A. 
1973);  Application  of  Doyle,  1+82  F.2d  I385  (C.C.P.A. 
1973);  Application  of  Comstock,  U81  F.2d  905  (C.C.P.A. 
1973);  Application  of  Knowlton,  I+8I  F.2d  1357  (C.C.P.A. 
1973). 

[17]     See  Application  of  Musgrave,  1+31  F.2d  882  (C.C.P.A.  1970); 
Application  of  Mahony,  1+21  F.2d  7^+2  (CCP.A.  1970); 
Application  of  Bernhart,  kYJ   F.2d  1395  (C.C.P.A.  I969); 
Application  of  Prater,  415  F.2d  1393  (C.C.P.A.  I969). 

[18]     The  Canadian  Government  recently  issued  a  patent  on  a 

computer  program.   See  Computerworld  p  1  (August  'J , 
197^)'   If  any  foreign  government  upholds  a  patent  on 
a  computer  program,  the  patent  may  be  valid  in  the  U.S. 
under  the  various  patent  treaties.   See  generally  ABA, 
I97I+  Report  287. 

[19]     Galbi,  "Software  and  Patents:  A  Status  Report,"  Computer 
Law  Service  §  k  -  2,    art.  1  (ed  by  Bigelow,  I97 4 ) . 

[20]     For  a  concise  legislative  history  of  copyright  law  see 

footnote  17  in  Goldstein  v.  California,  1+12  U.S.  5I+6, 
562  (1973). 


31 


[21]     See  Generally,  Nimmer,  Nimmer  on  Copyrights  (197^) 

.  [hereinafter  Nimmer],  Nicholson,  A  Manual  of  Copyright 
Practice  for  Writers,  Publishers,  and  Agents  (2nd.  ed .  1970) 

[22]     Nimmer,  §  111. 

[23]     Under  the  recently  passed  Senate  revision  hill  of  the 

copyright  law  (S.  I36I,  93^^^.  Cong.,  2nd  Sess.),  the 
duration  of  copyright  protection  would  be  50  years 
after  the  author's  death  for  both  common  law  and  stat- 
utory copyright  rather  than  the  existing  perpetuity 
period  for  common  law  copyrights  and  56  years  for 
statutory  copyright. 

[2U]     Nimmer,  §  112. 

[25]     Under  the  Senate  revision  bill  (S.  I36I,  93rd.  Cong.,  2nd 

Sess.),  the  statutory  duration  would  be  changed  to  the 
life  of  the  author  plus  50  years. 

[26]     Nimmer,  §§  I50  and  I5I. 

[27]     See  Bigelow,  Computer  Law  Service  (197^)  appendix  ^-3a  for 
a  reprint  of  the  circular. 

L   -■     See  generally.  Note,  "Copyright  Protection  for  Computer 
Programs,"  6k   Colum.  L.  R.  I27U  (I96U).   The  Senate 
recently  passed  a  bill  (S.  I36I,  93]^d.  Cong.,  2nd  Sess.) 
revising  the  existing  copyright  statutes.   Computer  pro- 
grams are  proper  subject  matter  under  the  proposed  bill. 
Section  II7  is  the  key  provision  and  states: 

Notwithstanding  the  provisions  of  sections  IO6 
through  116,  this  title  does  not  afford  the  owner 
of  copyright  in  a  work  any  greater  or  lesser 
rights  with  respect  to  the  use  of  the  work  in 
conjunction  with  automatic  systems  capable  of 
storing^  processing,  retrieving,  or  transferring 
information,  or  in  conjunction  with  any  similar 
device,  machine,  or  process,  than  those  afforded 
to  the  works  under  the  law,  whether  title  I7  or 
the  common  law  or  statutes  of  a  state  in  effect 
on  December  31?  197^>  as  held  applicable  and 
construed  by  a  court  in  an  action  brought  under 
this  title. 


32 


[29]     Galbi^  "Copyright  and  Unfair  Competition  Law  as  Applied 

to  the  Protection  of  Computer  Programming/'  Computer 
Law  Service,  §  1+-3,  art.  1,  p  I7  (ed  by  Bigelow,  197^)- 

[30]     367  F.  Supp.  258  (N.D.  Okl.  1973). 

[31]     310  F.  Supp.  1073  (W.D.  Wash.  I969) 

[32]     See  Galbi,  "Copyright  and  Unfair  Competition  as  Applied  to 
the  Protection  of  Computer  Programming,"  Computer  Law 
.  Service,  §  ^-3^  art  1,  p  18  (ed  by  Bigelow,  197 i|). 

[33]     Galbi,  "Proposal  For  New  Legislation  to  Protect  Computer 
Programming,"  I7  Bull.  Copyright  Soc'y.   280  (197O); 
Morris,  "Protecting  Proprietary  Rights  of  Computer 
Programs:   The  Need  For  New  Legislative  Protection, " 
21  Catholic  Univ.  L.  R.  181  (I97O)  [hereinafter  Morris]. 

[3^]     Williams  8e  Wilkens  v.  U.  S.,  Docket  No.  73,  1279  (^87  F.2d 
13^5)  (U.S.  Ct.  Clms.)  is  presently  before  the  Supreme 
Court.   In  Williams  the  National  Institute  of  Health 
made  over  one  million  single  copies  of  various  obscure 
medical  journal  articles,  some  of  which  Williams  ^e. 
Wilkens  had  copyrighted.  With  a  strong  dissent,  the 
U.S.  Court  of  Claims  held  U-3  that  the  photo  copying  of 
a  copyrighted  article,  one  copy  at  a  time,  was  not  an 
infringement  of  the  copyright.   Therefore,  the  outcome 
of  this  case  will  undoubtedly  affect  the  status  of  soft- 
ware copyright  protection. 

[35]     Bender,  "Trade  Secret  Protection  of  Computer  Software,"  38 
Geo.  Wash.  L.  Rev.  909,  926  (1970)  [hereinafter  Bender]. 

[36]     Restatement  of  Torts,  §  757,  comment  (b),  (1939).   See  also 
Mycalex  Corp.  v.  Pemco  Corp.,  6k   F.  Supp.  i^-20,  423 
(Md.  191+6). 

[37]     Victor  Chemical  Works  v.  Iliff,  299  HI-  532,  5^5  (1921).   The 
identical  quote  was  used  again  in  Schulenburg  v. 
Signatrol,  Inc.,  33  HI.  2d  379,  385  (1965),  cert,  denied. 
383  U.S.  959  (1966). 

[38]     198  U.S.  236,  250  (1905).   See  also  Ellis,  Trade  Secrets 

§  12,  (1953)  [hereinafter  cited  as  Ellis]  which  states: 


33 


The  common  law  gives  a  man  the  right  to  keep 
his  ideas  or  the  results  of  the  work  he  has  done, 
or  paid  for  doing,  to  himself.   The  fact  that 
others  are  at  liberty  to  do  similar  work,  if  they 
wish,  does  not  authorize  them  to  steal  his.   The 
principle  is  fundamental.   The  broad  terms  'ideas' 
and  'work'  are  used  in  stating  it,  instead  of  the 
more  usual  one  'trade  secrets, '  since  the  latter 
is  frequently  interpreted  as  something  akin  to  an 
unpatented  invention. 

[39]     Dupont  Power  Co.  v.  Masland,2Ui+  U.S.  100,  102  (191?). 

[ho]  See  generally,  Wessel,  "Legal  Protection  of  Computer 

Programs,"  ^3  Har.  Bus.  Rev.  97  (March- April,  I965) 
(hereinafter  Wessel) .   Several  of  these  requirements 
are  discussed  in  Kewanee  Oil  Co.  v.  Bicron  Corp. , 

U.S.  ,  9^  s.  ct.  1879  (197)4). 

[Ul]     Turner,  The  Law  of  Trade  Secrets  12  (1962)  [hereinafter 
cited  as  Turner] . 

[k2]  See  B.  F.  Goodrich  Co.  v.  Wohlgemuth,  II7  Ohio  App.  U93  (Ct. 

App.  1963);  Kaumagraph  Co.  V.  Stampagraph  Co.,  235  N.Y. 
1  (1923);   National  Tube  Co.  v.  Eastern  Tube  Co., 3 
Ohio  Ct.  C.  Rep.  N.S.  ^+59  (Cir.  Ct.  I902),  aff'd,  69 
Ohio  St.  560,  70  W.E.  1127  (1903). 

[i+3]     Bender,  928. 

[kk]  Morris,  195.   See  also  DuPont  Powder  Co.  v.  Masland,  2^4 

U.S.  100,  (1917);   General  Aniline  and  Film  Corp.  v. 
Frantz,  50  Misc.  2d  99I+,  27^  N.Y.S.  2d  63h,    151  U.S.P.Q. 
136  (N.Y.  Sup.  Ct.  1966);  Cincinnati  Bell  Foundry  Co. 
V.  Dodds,  10  Ohio  Dec.  Rep.  15^  (Super.  Ct.  I887). 

[U5]     Bender,  928. 

[U6]     See  We s ley- Jess en  Inc.  v.  Reynolds,  F.  Supp.  

(ill.  197^),  182  B.N. A.  Pat.,  Trademark,  and 
Copyright  J. ,  A-2  (June  I3,  197^)  (trade  secret  no 
longer  a  trade  secret  if  embodied  in  a  product  which 
is  then  sold  and  examined  with  reverse  engineering 
techniques).   See  also  Oppenheim,  Cases  on  Unfair  Trade 
Practices  237  T2d  ed.  1965)- 


3i+ 


[UT]     W.  R.  Grace  ^  Co.  v.  Hargadine, 392  F.2d  9  (6th  Cir.  I968) 

(comparison  of  patent  and  trade  secret  novelty  require- 
ment).  Bender,  at  note  101,  gives  an  example  of  the 
nature  of  patent  novelty: 

Consider  an  invention  which  no  one  alive  has 
anticipated;  and  the  patent  for  which  reads 
■no  prior  art.   If,  one  year  after  the  patent 
issues,  an  archeologist  discovers  an  old  Indian 
cave  in  Arizona  with  wall  paintings  disclosing 
that  invention,  the  patent  is  invalid  for  lack 
of  novelty.   Such  is  the  absolute  nature  of 
patent  novelty.   Bender,  929* 

[kQ]  Alfred  Bell  and  Co.  v.  Catalda  Fine  Arts  Inc.,  I9I  F.  2d  99 

(2d  Cir.  1951)  (example  of  copyright  novelty).   Bender 
again  states:   "For  a  copyright  it  will  suffice  that 
the  author  contributed  more  than  a  merely  trivial 
variation,  i.e.,  something  of  'his  own'."  Bender,  note 
100,  at  939. 

[U9]  Bender,  929. 

[50]  See  Wessel,  100. 

[51]  Ellis,  §  lU. 

[52]  376  U.S.  225  (196U). 

[53]  Compco  Corp.  v.  Day-Brite  Lighting,  Inc.,  376  U.S.  23^  (196^) 

[5^+]  376  U.S.  at  231 

[55]  376  U.S.  at  232. 

[56]  395  U.S.  653  (1969). 

[57]     The  Court  noted  the  heavy  economic  burden  involved  in  patent 
•  litigation,  and  therefore,  the  extra  burden  of  the 
royalty  payments  could  deter  most  attempts  to  challenge 
patents.   In  particular,  the  Court  stated: 

The  deterrent  effect  would  be  particularly  severe 
in  the  many  scientific  fields  in  which  invention 
is  proceeding  at  a  rapid  rate.   In  these  areas, 
a  patent  may  well  become  obsolete  long  before  its 
17 -year  term  has  expired.   If  a  licensee 


35 


has  reason  to  believe  that  he  will  replace  a 
patented  idea  with  a  new  one  in  the  near  future, 
he  will  have  little  incentive  to  initiate  lengthy 
court  proceedings,  unless  he  is  freed  from  lia- 
bility at  least  from  the  time  he  refuses  to  pay 
the  contractual  royalties.   395  U.S.  at  6'J3-k. 

[58]     395  U.S.  at  672. 

[59]     ^12  U.S.  5^6  (1973).   Chief  Justice  Burger,  writing  for  the 
majority,  merely  distinguished  Sears  and  Compco  from 
Goldstein.   Dissents  by  Justice  Douglas  and  Justice 
Marshall  (each  concurred  in  by  Justice  Brennan  and 
Justice  Blackmun),  however,  rely  on  Sears  and  Compco. 

[60]     U12  U.S.  at  560-561. 

[61]     U12  U.S.  at  559. 

[62]    4-09  U.S.  63  (1972). 

[63]     Kaul,  "And  Wow  State  Protection  of  Intellectual  Property?" 
60  A. B.A.J.  198,  200  (February  I97U)  stated: 

While  some  observers  have  expressed  the  view  that 
Benson  did  not  completely  bar  protection  of  com- 
puter programs,  it  is  extremely  doubtful  whether 
valid  protection  is  possible  under  the  patent  laws 
as  they  are  now  written. 

[6U]    U.S.  ,  9k   s.ct.  1879  (197^). 

[65]     U.S.  at  ,  91+  s.ct.  at  I889. 

[66]     U.S.  at  ,  9I+  s.ct.  at  I89O. 

[67]     One  should  note,  however,  that  trade  secrets  such  as  the 
Coca  Cola  secret  formula  are  patentable,  but  through 
the  use  of  trade  secret  protection,  these  ideas  can 
be  protected  for  periods  longer  than  the  17-year  patent 
protection  period. 

[68]     For  a  discussion  of  the  future  of  trade  secrets  after  Kewanee 
see  182  B.N. A.  Pat.,  Trademark,  and  Copyright  J. ,  A-9 
Tjune  13,  197^) 


36 


[69]     ^3  C.J.S.,  Injunctions,  §  l48  (19^5). 

[70]     See  Irizarry  y  Puente  v.  Harvard  College,  2^48  F.2d  799,  (1st 
Cir.):.  cert,  denied,  356  U.S.  9^7   (1957):  Hamilton 
National  Bank  v.  Belt,  210  F.2d  706,  (D.C  Cir.  1953). 


[71]  Bender,  927. 

[72]  Wessel,  100. 

[73]  Ellis,  §  Ik. 

[7^1  See  Restatement  of  Torts,  §757  (1939). 

[75]     See  Doerfer,  "The  Limits  on  Trade  Secret  Law  Imposed  by 
Federal  Patent  and  Antitrust  Supremacy, "  80  Harv.  L. 
Rev.  1U32  (1967)  [hereinafter  Doerfer]. 

[76]     Bender,  93^. 

[77]     See  Note,  "Developments  in  the  Law  -  Competitive  Torts,"  77 
Harv.  L.  Rev.  888  (196U).   Doerfer  at  note  I6  states: 

Trade  secret  controversies  growing  out  of 
employment  relationships  present  special 
difficulties.   The  interest  in  allowing  an 
employee  to  move  from  job  to  mob  without 
allowing  his  employers  to  claim  a  proprietary 
interest  in  the  skills  acquired  during  his 
stay  must  be  balanced  against  the  interest 
in  permitting  the  holder  of  a  competitive 
advantage  to  make  a  limited  disclosure  of  his 
secret  in  order  to  exploit  it.   A  former  em- 
ployee may  continue  to  use  general  knowledge, 
but  not  secrets,  acquired  in  Yiis  work;  no  ex- 
plicit agreement  is  necessary  to  enable  a 
former  employer  to  restrain  disclosure. 

[78]     See  Klein,  "The  Technical  Trade  Secret  Quadrangle:   A  Survey," 
55  Nw.U.L.Rev.  ^+37  (i960). 

^'^^  10  Cavitch,  Business  Organizations  §  23^.02  (197^)- 

[80]     Id.,  §  233.02. 


37 


[8l]     See  Kewanee  Oil  Company  v.  Bicron  Corporation,  U.S. 

,  94  S.Ct.  1879  (197^);  Schulenburg  v.  Signatrol, 

Inc.,  33  111.  2d  379  (1965),  cert,  denied  383  U.S. 
959  ( 1966 )( although  an  injunction  is  a  drastic  remedy, 
it  may  be  granted  in  appropriate  instances).   See  also, 
"Software,  Statutes,  and  Stare  Decisis,"  13  How.L.jT 
J+20  (1967). 

[82]  See  Morris  195- 

[83]  367  F.  Supp.  258  (Okla.  D.C.  1973). 

[81+]  Id.,  Conclusion  #  kQ. 

[85]  Bender  states: 

When  the  secret  can  "be  utilized  "by  the  thief  with 
only  a  nominal  investment,  the  possibility  of  civil 
suit  may  prove  to  be  an  empty  threat.   A  software 
house  is  perhaps  the  best  example  of  a  business  re- 
quiring a  low  initial  investment  of  capital.   To 
launch  his  own  software  house,  one  needs  only  a 
programmer,  a  pad,  and  a  pencil.   Thus,  especially 
if  he  happens  to  be  a  programmer,  an  employee  who 
turns  thief  may  have  precious  little  of  an  invest- 
ment to  lose  as  a  result  of  a  lawsuit.   Bender,  9^2. 

[86]     The  Illinois  definition  of  property  also  includes  trade 
secrets,  111.  Rev.  Stat.,  ch.  38,  §  15-1  (197^)- 

[87]     These  include  Oregon,  Utah,  Idaho,  and  Kentucky.   In  addition, 
Bender  states: 

In  any  of  these  four  jurisdictions  only  strict 
attention  to  the  wording  and  comprehension  of 
interpretive  cases  will  indicate  whether  the 
larceny  statute  can  be  used  to  prosecute  theft 
of  a  trade  secret.   Bender,  9^5- 

[88]     These  include  Alabama,  Alaska,  Arizona,  Connecticut,  Delaware, 
Indiana,  Iowa,  Mississippi,  Nevada,  North  Dakota,  Rhode 
Island,  South  Carolina,  South  Dakota,  Texas,  Vermont, 
Washington,  West  Virginia  and  Wyoming.   Bender,  9^5. 


38 


[89]     These  include  District  of  Columbia  ("anything  of  value"), 
Florida  ("article  of  value  of  any  kind"),  Hawaii 
("anything  of  marketable,  saleable,  assignable,  or 
available  value")  Kansas  ("valuable  thing  -whatsoever"), 
Louisiana  ("anything  of  value"),  Maryland  ("thing"), 
Missouri  ("valuable  thing"),  Montana  ("article  of  value 
of  any  kind"),  and  Virginia  ("money  or  other  thing"). 
In  addition,  Bender  states  that: 

Prosecution  will  generally  be  easier  under  these 
statutes  than  under  those  using  the  word  'property, ' 
since  it  should  be  easier  to  show  that  a  trade 
secret  is  a  thing  of  value  than  to  show  it  is 
property.   Bender,  9k6. 

[90]     For  a  recent  case  in  which  the  defendant  was  convicted  under 
a  felony  theft  statute  rather  than  a  specific  trade 
secret  theft  statute,  see  Hancock  v.  Texas,  1+02  S.W.  2d 
906  (Texas  Grim.  App.  19^6),  379  F.2d  552  (5th  Cir.  I96T) 
(defendant's  petition  for  habeas  corpus  denied  at  dis- 
trict court  and  his  appeal  to  the  5th  Cir.  also  denied). 

[91]         18  u.s.c.  §  231^  (1970). 
[92]  id^,   §  2315. 

[93]     In  several  cases  the  courts  have  held  that  the  act  of  trans- 
porting photostatic  copies  of  the  stolen  information 
(not  computer  programs)  violated  the  federal  statutes. 
See  e.g. ,  United  States  v.  Greenwald,  U79  F.2d  320 
(6th  Cir.),  Cert  denied,  i+1^  U.S.  8'?k   (l973)j  United 
States  V.  Bottone,  365  F.2d  389  (2d  Cir.  I966),  cert, 
denied, 385  U.S.  97k   (I966);  United  States  v.  Lester, 
282  F.2d  750  (3rd  Cir.  I96O),  cert,  denied,  36U  U.S. 
937  (1961). 

[9^+]     _See  United  States  v.  Bottone,  365  F.2d  389,  (2d  Cir.  I966) 
(court  commented  that  15  U.  S.C.  231^^-  would  not  apply 
•  to  the  theft  of  trade  secrets  by  memory). 

[95]     It  is  generally  conceded  that  patent  protection  is  better 
than  trade  secret  protection  for  computer  programs. 
See  Sheers  and  Encke,  "Copyrights  of  Patents  for  Com- 
puter Programs?",  k9   J.  Pat.  Off.  Soc'y  323  (1967)- 

[96]     For  more  discussion  of  the  advantages  and  disadvantages  of 
trade  secret  protection  of  computer  programs  see 

Morris  197* 


39 


[97]     The  General  Rules  Concerning  University  Organization  and. 
Procedure  (revised  May,  1972). [hereinafter  The 
General  Rules] . 

[98]  Id.  §  18(c). 

[99]  Id.  §  19(f). 

[ 100]  University  of  Illinois  Statutes,  Art .  X ,  §  2 ( I97 2 ) . 

[101]  56  A.A.U.P.  Bulletin  323, 32^  (Autumn  I97O). 

[102]  5^  A.A.U.P.  Bulletin  258  (Sunmier  I968). 

[103]  55  A.A.U.P.  Bulletin  86  (Spring  I969). 

[  104]    For  an  earlier  treatment  of  difficulties  encountered  by 

universities  in  managing  research  see  Palmer,  University 
Research  Problems  (19^9  and  I962).   The  developers  of 
PLATO  IV  have  proposed  a  compensation  arrangement  for 
developers  of  course  related  software  (courseware)  which 
uses  copyright  protection.   Under  this  proposed  plan, 
the  University  of  Illinois  would  receive  20  percent  of 
gross  revenue  while  the  author  would  receive  the  re- 
maining 75  percent  of  gross  revenue.   The  accent  is  on 
gross  revenue,  in  that  the  author  will  have  more  con- 
trol over  his  courseware  than  under  the  University 
Copyrights  and  Recordings  provision  where  University 
administrative  expenses  would  reduce  the  gross  revenue 
to  zero  net  revenue.   If  the  author  was  commissioned  by 
the  University  to  develop  the  courseware  under  a  re- 
leased time  arrangement,  the  University's  share  would 
be  increased  to  60  percent  of  gross  revenue,  while  the 
author's  share  would  be  reduced  to  kO   percent  of  gross 
revenues.   Finally,  if  some  one  unrelated  to  the  Uni- 
versity developed  courseware,  the  University  would 
receive  80  percent  of  gross  revenue  while  the  author 
would  receive  the  remaining  20  percent.   This  procedure 
avoids  the  trade  secret  problems  previously  discussed 
and  also  provides  reasonable  incentive  for  courseware 
development.   The  problems  encountered  in  the  regulation 
of  courseware,  however,  are  unique  to  PLATO  IV  type 
situations. 


1^0 


[105]    See  Bigelow,  Computer  Law  Service,  Introduction  to  art  3^ 

"~  §3. 

[106]    See  Saragovitz,  "Patents  -  Trade  Secrets  -  Technical  Data  Use 
and  Misuse  by  the  U.S.  Government/'  15  Vill.  L.Rev. 
331  (1970). 

[107]    Wofsey,  "Contracting  For  Software/'  Computer  Law  Service 
art.  2,  §  3-3  (ed  by  Bigelow). 

[108]    See  Levy,  "Computer  Programs  in  Government  Procurement/' 
10  Will,  and  Mary  L.  R.  658  (1969).    See  also  C.CH. 
Gov't.  Contracts  Rep,  p  li|,110;  lU,200;  1^^,205;  14,220. 

[109]    N.A.S.A.  IP  9.101-U. 

[110]    Under  A.S.P.R.  §  9-201,  unlimited  rights  in  data  means  that 
the  Federal  Government  has  the  right  to  use,  duplicate, 
or  disclose  technical  data  in  any  manner  and  for  any 
purpose. 

[Ill]    J+9  Opinions  of  the  Comptroller  General  12^+,  2  Comp .  Law 
Serv.  Rep.  29I  (1969). 

[112]    Proposed  A.S.P.R.  Change  to  Amend  9-202-2(c)  (Case  7O-83) 

discussed  in  I78  B.N. A.  Patent,  Trademark,  and  Copyright 
Rep.  A- 18  (May  I6,  197^)-         ' 

[113]    See  Hinrichs,  "Proprietary  Data  and  Trade  Secrets  Under 
Department  of  Defense  Contracts,"  36  Mil.  L.Rev.  6I 
(1967)  (hereinafter  Hinrichs) . 

[iii+]       28  u.s.c.  §  149U  (1970). 

[115]  F.    Supp.     ,    (Dist.    Ct.    1973)   U90  B.N. A.    Fed  Contract 

Rep.  D-1  "(jW  23,  1973). 


[116]    Hinrichs,  89. 

[117]  See  "Unauthorized  Use  of  Proprietary  Information  by  the 
Government:  A  Mixed  Bag  of  Remedies,"  512  B.N. A. 
Fed.  Contract  Rep.  K-1  (July  1,  197^+). 

[118]    See  Kostos,  "Unauthorized  Use  of  Technical  Data  in  Government 
Contracts:  Remedies  of  the  Data  Owner, "  6  Boston  Coll. 
Ind.  and  Com.  L.R.  753  (1965) 


In 


i 


I