LIBRARY OF THE
UNIVERSITY OF ILLINOIS
AT URBANA-ChlAMPAIGN
5I0.84
v^o.l\\-l2.0
S^lGtNLCRVr^^g^^^l
'I'he person char^irlg this 'material is re-
Dl97fe
sponsible for its return to the library from
which it was withdrawn on or before the
Latest Date stamped below.
Theft, mutilation, and underlining of books
are reasons for disciplinary action and may
result in dismissal from tfie University.
UNIVERSITY OF ILLINOIS LIBRARY AT URBANA-CHAMPAIGN
Y\-'i if!
. ^ANb
f£B 2 / 991
'^ 0 5
i[C1
L161 — O-1096
Digitized by the Internet Archive
in 2012 with funding from
University of Illinois Urbana-Champaign
http://archive.org/details/legalprotectiono120sonia
tf-
'O
CONFERE
ENGINEERING UBRARY
UNIVERSITV OF ILLINOIS
URBANAittiJNCMS
Center for Advanced Computation
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
URBANA. ILLINOIS 61801
CAC Dociiment No. 120
THE LEGAL PROTECTION OF COMPUTER SOFTWARE
by
John T. Soma-^ and Richard Michael Fischl-^*
October 197^+
Center for Advanced Computation
University of Illinois at Urb ana -Champaign
Urbana, Illinois 618OI
Mr. Soma received his J.D. from the University of Illinois, College
of Law in 1973 and is a member of the Illinois Bar. He received
his M.A. in Economics from the University of Illinois in 1973^ and
presently he is a candidate for a Ph.D. in Economics at the Univer-
sity of Illinois, and a Research Assistant at the Center for
Advanced Computation, Urbana, Illinois.
■X-X-
Mr.Fischl has studied political science at the University of Illinois.
He has been accepted by the University of Illinois, College of Law,
and will be attending the College of Law beginning in the Fall of 1975'
ABSTEACT
Software technology has outgrown the legal
development of software protection. This docioment examines
the legal protection of software through the use of patent,
copyright, and trade secret law. Each of these methods offers
a viable alternative, but each suffers from major weaknesses.
The unique legal problems encountered by a university in soft-
ware development are then examined, followed by a discussion
of Federal Government software procurement policies. Finally,
the legal interaction between private and university software
developers and the Federal Government is briefly examined.
Ill
TABLE OF CONTENTS
Page
PATENT PROTECTION 3
Gottschalk v. Benson k
COPYRIGHT PROTECTION ... 6
Telex V. IBM 7
TRADE SECRET PROTECTION 8
Federal Preemption of State Trade Secret Law 11
Software and Trade Secrets ik
Scope of Protection l6
Criminal and Non-Criminal Remedies Under Trade Secret Law. . l8
THE UNIVERSITY ENVIRONMENT AND PROTECTION OF SOFTWARE 20
Academic Freedom 23
GOVERNMENT PROCUREMENT OF SOFTWARE ■ 2k
Patents Rights and Rights in Data Clauses 25
Software Revision to ASPR's. . 27
CONCLUSION 28
NOTES 30
IV
THE LEGAL PROTECTION OF COMPUTER SOFTWARE^
The computer software industry is one of the most dynamic
growth industries in the United States. In the I950's and I96O ' s the
emphasis was on hardware development, but in recent years the emphasis
has shifted to software development. -' As an example of this shift,
after the hardware was developed for the IBM 36O series, it took five
years to develop the supporting software.'- -^ The industry is highly
innovative and has low barriers to entry. ^-' The legal structure
surrounding the software industry has not, however, kept pace with
the technological changes occurring within the industry. Although
there is voluminous material on the legal protection of software, no
definitive legal principles have emerged concerning the procedures
used to protect software.'- -'
Rapid software development, however, is essential for the
continued growth of the computer industry. Today software packages
are commonly sold for thousands of dollars. In addition, there are
now large numbers of identical computers available upon which these
The authors gratefully acknowledge the assistance and support given
by Professor Hugh Folk, Director, Center for Advanced Computation.
In addition, we wish to thank Professor Peter Maggs, College of Law,
University of Illinois, for reading an earlier draft of this docu-
ment. Dr. Donald Bitzer, Director, Computer-based Education Re-
search Laboratory, University of Illinois, for many helpful comments
and suggestions, Barry Sufrin for several ideas on the academic
freedom issue, and Carol Boast, Assistant Law Librarian, and
Madhavarao Balachandran, Assistant Commerce Librarian for their tire-
less support in the research of this document. We also wish to
thank Frieda Anderson, Center for Advanced Computation, for provid-
ing the ever necessary administrative coordination in the prepara-
tion of this document. Any errors remaining, however, are those of
the authors .
software packages can be used. Large social gains exist if these
software packages can be used on all machines rather than having a
similar software package independently developed for each computer.
Consequently, some type of legal mechanism is essential to provide
software developers with a means to protect their intellectual prod-
ucts. Once appropriate legal protection is provided, the developers
of software will be willing to sell their products, and thus wasteful
duplication of effort can be avoided. By providing a viable method to
protect software, public policy will therefore foster the commercial
development of software. The social gains from such protection are
greater today than in the 1950 's and 1960's due to the recent shift
in emphasis from hardware to software development.
This document has been prepared to review the present legal
status of software protection. Rather than investigating a few areas
in great detail, this document will overview the entire area of soft-
ware protection. Appropriate footnotes will be used to guide the
reader to additional materials on each topic. A major patent revision
bill is currently before Congress, and numerous legal doctrines are
still in the developmental stage. Therefore, the entire legal area
of software protection can be expected to remain in a state of flux
for the forseeable future.
The remainder of this document will first examine the legal
protection of software through the use of patent, copyright, and trade
secret law. Each of these methods offers a viable alternative, but
each suffers from major weaknesses. The unique legal problems en-
countered by a university in software development will then be examined,
followed by a discussion of Federal Government software procurement
policies. Finally, the legal interaction between private and univer-
sity software developers and the Federal Government will be briefly
examined.
PATENT PROTECTION
Although hardware is clearly patentable under existing
[51
patent statutes/ software does not conveniently fall into any of
the present statutory classifications cf patentable material. As a
result of this ambiguity over software patentability, several test
cases have attempted to define the limits of software patentability.
Patent protection is commonly accepted as the strongest form of soft-
ware protection, and thus several proposals are currently before
Congress which would allow patenting of software.'- -'
The status of the various patent law revisions before
Congress is constantly changing. Consequently, this area will not be
examined due to the speculative nature of any inquiry at the present
time. Instead, the present focus will be on the current legal inter-
pretation of this existing patent law with regard to software patent-
ability.
In several early cases, the Supreme Court held that a newly
discovered scientific truth or mathematical expression could not be
patented, but that "a novel and useful structure created with the aid
[■71
of knowledge of scientific truth may be.'"- -* From this line of cases,
and others related to the field of electronlcs,[8l the Court developed
[91
the mental steps doctrine.'- -' In brief, the mental steps doctrine
means that if an idea can be totally carried out by the human mind
without the aid of a mechanical device, then the idea is unpatentable.
Applied to computer programs, the result is devastating because most
software can at least theoretically be performed by the human mind.
The time required for such operations, however, would be measured in
years as compared to seconds with the aid of a computer.
Through a series of cases, the Court of Customs and Patent
Appeals (hereinafter CCPA) attempted to distinguish computer programs
which provided some physical change on materials from programs which
did not physically affect materials.'- -' Based on this distinction.
the CCPA distinguished computer programs performing some physical
act on materials from the mental steps doctrine and upheld several
patents on computer programs. While the Patent Office and CCPA were
distinguishing types of computer programs, the President's Commission
on the Patent System concluded that the Patent Office lacked adequate
methods and facilities for classifying computer programs, and thus
recommended against a patent policy which would allow the patentability
[11]
of computer software. Due to the diversity of opinions and the
resulting ambiguity over software patentability, the legal status of
patenting software remained unclear.
Gottschalk v. Benson
In 1972, the Supreme Court attempted to clarify this
r 121
confused situation by deciding Gottschalk v. Benson.^ -^ Gary Benson
and Arthur Talbot filed an application with the Patent Office in I963
seeking a patent on a method of converting binary coded decimal (BCD)
numerals into pure binary numerals through the use of a mathematical
algorithm. Although this process could be performed mentally with
the aid of pen and pencil, the algorithm enabled one to program a
computer to do the same conversion with large savings in manpower and
tim.e. The Patent Office refused to issue the patent on the ground
that the subject matter of the invention was not within any of the
statutory classes of patentable inventions.'- The Patent Office
reasoned that the application was within the mental steps doctrine
and thus outside of the statutory class of patentable material. On
appeal, the CCPA reversed the Patent Office decision and held that
the patent application claims were within the statutory classification
of patentable inventions and thus patentable as a process under the
riifl
existing patent statutes.'- -'
Writing for a unanimous court with three justices abstaining,
Justice Douglas held that the invention was not patentable under the
existing patent laws. Based on the settled principle that ideas were
not patentable, the Court reasoned that granting a patent for
converting BCD to binary numerals with the aid of a digital computer
would in effect be a patent on the algorithm embodied in the computer
program since the use of the algorithm on a digital computer would be
the only practical method of implementation. The opinion did not
mention the earlier cases developed by the CCPA which had attempted
to distinguish patents issued for computer programs from the mental
steps doctrine. Consequently, the validity of this line of cases is
questionable. Justice Douglas, however, stressed that the opinion was
limited only to invalidating the patenting of a mathematical algorithm
and not the invalidation of all computer programs.
One possible interpretation of Gottschalk is that
mathematical algorithms are not constitutionally patentable even if
Congress were to amend the patent laws to include them in the statu-
[151
tory classification of patentable material.'- -' Then as a corollary,
programs which use computers to solve mathematical problems are not
currently patentable due to the present patent law. Thus, impliedly,
the existing laws could be amended to include software as a statutory
class of patentable material. The result of Gottschalk, however, is
that at present the status of software patentability is very ambiguous.
Another interpretation of Gottschalk is to read the opinion narrowly
and conclude that only the patenting of mathematical algorithms in
computer programs in prohibited.
The CCPA is still validating patents for computer programs
which adequately describe the program and which do not relate to a
purely mathematical algorithm.'- -* The legal support for issuance of
these patents, however, is based on the pre -Gottschalk case law dis-
riTi
tinguishing computer programs from the mental steps doctrine. "-
The true test of these cases will be a patent infringement suit. The
overall likelihood of a patent holder having his patent validated in
a patent infringement suit is presently low.
On the practical side, a strong deterrent exists against
the use of patents to protect software. The minimum cost of obtain-
ing a patent is approximately one thousand dollars with many patent
applications being considerably higher. The average cost for soft-
ware patents may be considerably higher due to their controversial
nature. In addition, the gestation period for a patent application
averages three years, and thus if a patent is finally disapproved, the
developer of a program will be left in the same position he was before
beginning the patent application procedure. Finally, as previously
stated, many patents are invalidated in infringement suits. With the
current high standards of disclosure, once a patent is declared in-
valid in an infringement suit, its contents are known, and thus trade
secret protection is no longer available. The net result of these
difficulties is that the choice of patent protection for software
is not particularly inviting.'- -'
COPYRIGHT PROTECTION
The difference between patent and copyright protection is
that a patent holder acquires exclusive right to the invention even
if another individual later, but independently, discovers the same
ri9i
idea.^ A copyright, however, only protects one from the mere copy-
ing of the idea or work. For example, if a computer program were
patented, no one could use the same program even if they independently
discovered the program. A copyright, on the other hand, would only
prevent others from copying the exact program. Consequently, if an
individual could prove that he independently developed the program,
then the individual could freely use the program which he independ-
ently developed.'- ^
There are two types of copyright protection. One based on
[211
common law and the other based on federal statutes."- -" While an
author is preparing his work and up to the time the work is published,
the author is protected under state common law copyright. This means
that the author is protected from unauthorized copying, publishing,
[221
vending, performing, and recording of his work. -" Under present
law, until the author permits publication, this common law protection
[231
exists forever. Once the author decides to publish the work, one
\ 2kl
of two alternatives will occur.'- -" First, the author can publish
the work without any copyright notice on the work. If this happens,
the work is considered to have been donated to the public. On the
other hand, if all copies of the work which are authorized by the
author are properly designated as copyrighted material, then the
author is protected under federal copyright statutes. The duration
of the federal copyright protection is 56 years if the copyright is
r 251
properly renewed after 28 years."- -' Under both common law copyright
and statutory copyrights, the author can sue for damages for illegal
copying of his work.^ Damages are based on either actual damages
which he has suffered, or the profits which the copier received from.
the unauthorized copying.
In 1965^ the Copyright Office issued Circular 3ID which
outlined the three basic rules for current registration of computer
[271
programs.'- -^ The first rule is that the individual applying for
the copyright must be the original author. Next, all copies of the
program must be published with the normal copyright designation.
Finally, copies of the program must be deposited with the Copyright
Office, and if the program is in machine language, copies of the pro-
gram both in machine language and in a high level language must be
deposited with the Copyright Office.'- -'
Telex V. IBM
On the practical side, one method to prevent copyright
[291
infringement is to insert meaningless statements into the program.^ -'
If the alleged infringer literally copied the program, these meaning-
less statements will appear, and thus sufficient evidence will be
available to prove infringement. If the program is extremely long.
the proof of availability of the program to the defendant and complete
identity will also be sufficient evidence to prove copyright infringe-
rsoi
ment. In Telex v. IBM '- -' one of the counter claims by IBM against
Telex was for copyright infringement of IBM's Fast Running Interpreter
Enabling Natural Diagnostics (FRIEND) program. The Telex court accept-
ed as sufficient evidence that out of the entire program only a few
minor deviations existed between the IBM original and Telex's version.
In addition, IBM was able to prove that Telex personnel had access to
the IBM program.
r "^H
In Walt Disney v. Alaska Television Co./ ■' the court held
that copyright infringement had occurred when the defendant copied a
television show and transported it to Alaska on magnetic tape. The
mere copying onto magnetic tape was considered the critical element,
not the rebroadcast of the performance. By analogy, one can reason
that the copying of a computer program which is on magnetic tape is
also a copyright violation. Translations of copyrighted material are
also prohibited, and thus the conversion of a copyright program from
one language to another through a compiler should also constitute
[321
copyright infringement.'- ■' ■
IBM Corporation has favored copyright protection, and Elmer
Galbi, Senior Patent Attorney for IBM, has proposed a revision to the
Copyright Act which includes a provision allowing the copyrighting of
computer software. The future of copyright protection of software is
still uncertain."- If the counterclaim in Telex v. IBM is appealed
by Telex, the Telex case will be the first software copyright case
r 3U]
decided by a court of appeals."- -"
TRADE SECRET PROTECTION
A viable third alternative for many firms is the use of
trade secret law to protect software. Just as common law copyright
law originates in the common law of each state, the origin of trade
secret law can also be found in the common law of each state. Although
the scope and vitality of state trade secret law varies from state to
r35l
state, '-•^^-' ,the Restatement of Torts offers a useful definition:
A trade secret may consist of any formula, device, or
compilation of information which is used in one's
business, and which gives him an opportunity to obtain
an advantage over competitors who do not know or use
it. [36]
In Illinois, a trade secret is Judicially defined as "a secret plan or
process, tool, mechanism or compound known only to its owner and those
r 371
of his employees to whom it is necessary to confide it. '"- -■
Judicial recognition of trade secret law has a long history.
Speaking for the Court in Board of Trade of Chicago v. Christie Grain
and Stock Co. , Justice Holmes recognized trade secret law when he
stated that "the plaintiff has the right to keep the work which it has
done, or paid for doing, to itself. The fact that others might do
similar work, if they might, does not authorize them to steal plain-
tiff's."'- -* In a later case, however, Justice Holmes pointed out
that it is not the subject matter per se which gains for itself the
status of trade secret, but rather "the primary fact that the law
makes some requirements of good faith . . . The property may be denied,
r 391
but the confidence cannot be. "'- -^
In order to find sanctuary in the law of trade secrets,
state courts have held that a trade secret must meet four major tests:
1) appropriateness of subject matter, 2) secrecy, 3) novelty, and
k) economic value."- -■ Appropriateness of subject matter has three
broad subcategories of protectable information: l) patentable and
unpatentable inventions along with know-how associated with these
inventions (e.g., secret processes, patterns, compounds), 2) abstract
ideas of a commercial or industrial nature (e.g., advertising plans,
schemes for media presentation), and 3) other sorts of information
which are not novel, but which are of value to the owner (e.g., cus-
fUll
tomer lists, discount codes, supply sources).'-
The second requirement of secrecy is rather vague and has at
least two interpretations: internal and external secrecy. ^ The
distinction between internal and external secrecy is basically one
between in-house secrecy (which involves the steps taken by the owner
of the secret to prevent its disclosure by those in contractual rela-
tionships with him) and industry wide secrecy (which involves the
knowledge of the subject matter among those outside of the owners
control). • When the secrecy requirement is mentioned by courts,
they typically are referring to internal secrecy.
The secrecy requirement is not absolute. Some disclosures
are permissible, but the disclosures are limited to persons who enter
into confidential relationships with the owner of the trade secret.'- -■
As long as all parties maintain the secrecy, the independent discovery
of the information by others need not destroy its protectable status.'- -'
If the secret is revealed by dissemination of the product containing it,
the trade secret is no longer protected.*- ^
The third requirement of novelty is not as stringent as its
ri+7]
counterpart under the patent statutes,"- but the novelty in trade
secret law is more discriminating than the originality concept under
alsi
copyright laws.*- -^ The degree of novelty will also enter into the
determination of damages awarded by the courts.
The fourth requirement dealing with economic value focuses
on such factors as the value of the information, the amount of effort
expended in obtaining the trade secret, and the difficulty of acquir-
ing or re-acquiring the trade secret.'- ^ In a few instances, heavy
reliance on this fourth requirement has resulted in a lowering of the
rsii
requisite secrecy and novelty standards."-
10
I
Federal Preemption of State Trade Secret Law
Although both the definitions and actual requirements of
trade secret vary between states, there is a well developed body of
trade secret law existing at the state level. This state trade secret
law existed for many years, but was recently threatened by a series
of Supreme Court cases beginning in the mid-1960's. A brief di-
gression to examine this line of cases is appropriate to better appre-
ciate the position which trade secret law occupies in American
jurisprudence.
r 521
Sears Roebuck and Co. v. St iff el Co. "- ^ and a companion
[531
case"- were the first Supreme Court cases in this series which
threatened the very existence of state trade secret law. In Sears,
a pole-lamp sold by Stiffel Co., had previously been held unpatentable.
Sears copied Stiffels' design and sold lamps identical to the Stiffel
pole-lamp. Stiffel then sued Sears under the Illinois unfair com-
petition law. The Court stated that an "unpatentable article, like
an article upon which a patent has expired, is in the public domain
r 5^1
and may be made and sold by whoever chooses to do so. "^ -* In broad
language threatening the very existence of state trade secret law due
to existing federal patent and copyright policy, the Court held that
"a state may not, when the article is unpatented and uncopyrighted,
prohibit the copying of the article itself or award damages for such
[55]
copying.'- -'
[56]
Five years later in Lear, Inc. v. Adkins, the Court held
that a licensee could not be required to pay royalties under a contract
which challeng ed the validity of a patent. The Court reasoned that
requiring such payments would undermine the federal policy favoring
[571
full and free use of ideas in the public domain.'- -' In commenting
on the theoretical basis of a state enforcing patent licensing con-
tracts, the Court stated that "(a)t the core of this ... is the diffi-
cult question whether federal patent policy bars a state from enforc-
ing a contract regulating access to an unpatented secret idea. "^ -^
11
Therefore, although Lear actually rested on a contractual issue of
licensees paying under a contract while testing the validity of a
patent, the Court again questioned the validity of state trade secret
la-w based on federal pre-emption of this law by the federal patent
policy.
r59l
In Goldstein V. California/ ^-' the Court held that the
federal consitutional provision authorizing Congress to grant copy-
rights for "limited times" was only a limit on Congress and not on the
states. Thus a California statute making it a criminal offense to
pirate recordings produced by others was not void for lack of a dur-
ational limit, despite the federal durational limitation on the Con-
gressional power to grant copyrights.'- -' The key to Goldstein is
the Court's conclusion that by congressional silence, Congress indi-
cated that states could regulate copyright matters of a purely local
nature. Where the "need for free and unrestricted distribution of a
writing is thought to be required by the national interest, the Copy-
right Clause . . . would allow Congress to eschew all protection. "*- -'
If Congress were to determine that a matter warranted national copy-
right attention and then preempt the field by concluding that no
copyright protection was needed, any state action would be ultra vires
which attempted to protect what Congress had intended to be free from
restraint.
As seen from Sears, Adkins, and Goldstein the status of
state trade secret law was very unclear. During this same time
period, the Court decided Gottschalk v. Benson'- ^ which has been
previously discussed in the patent protection section of this docu-
ment. Gottschalk invalidated a patent for a computer program con-
verting binary coded decimal (BCD) numerals through the use of a
mathematical algorithm. Reading the opinion broadly, one could con-
clude that all computer programs are unpatentable.'- -' If this
extreme position were taken (and this position may be the final out-
come after several patent infringement suits reach the Supreme Court)
12
the combination of Got ts chalk with Sears, Adkins, and Goldstein,
leads one to conclude that because computer programs are unpatentable,
they are outside the area of trade secret protection, and thus unpro-
tectable by either federal or state law.
The threat of federal preemption over state trade secret
law was eliminated in May of 197^ by the Supreme Court in Kewanee Oil
Co. V. Bicron Corp. Kewanee developed a patentable process which
could grow a seventeen inch crystal of a type useful in detection of
ionizing radiation. Kewanee decided to forgo patent protection, and
instead rely on trade secret law for the protection of this process.
Several Kewanee employees signed agreements not to disclose trade
secrets obtained while employed for Kewanee. These employees left
Kewanee and formed Bicron Corp. which competed with Kewanee in pro-
ducing the seventeen inch crystals. Based on Ohio trade secret law,
the district court granted a permanent injunction against Bicron from
producing the seventeen inch crystals. The Court of Appeals, however,
reversed on the ground that Ohio's trade secret law was preempted by
the federal patent laws.
The Supreme Court reinstated the district Court's opinion
by holding that the Ohio trade secret law was not preempted by the
federal patent laws. The Court distinguished three types of trade
secrets: one known only to its owner not to be patentable, one whose
patentability is considered dubious, and one believed by its owner to
be a patentable invention. In dealing with the first category of un-
patentable inventions, the Court reasoned that there was no public
interest in flooding the overburdened Patent Office with applications
which would be disapproved. In addition, no public disclosure would
occur because patent applications which are denied are kept confiden-
tial. Therefore, as to unpatentable inventions, no conflict existed
between federal disclosure policy and state protection of this type
of trade secret.
13
Concerning those trade secrets of dubious patentability,
the Court invoked the Adkins doctrine that invalid patents are a
serious threat "to the free use of ideas already in the public domain
... . "'- Reasoning from Adkins, the Court concluded that since a
licensee of a patent could challenge the validity of a patent, it was
better that an invalid patent had never been issued in the first place.
The elimination of state trade secret law would bring about the
issuance of more invalid patents as in the case of Lear, and thus
would have an even greater "deleterious effects on society and patent
policy ... . "^ Consequently, the Court concluded that no spectre
of federal pre-emption existed in this second category of dubious
patentable trade secrets.
In dealing with the third category of clearly patentable
trade secrets, the Court reasoned that the protection available to
the owner of an invention through the law of trade secrets is far
weaker than that offered by a patent, and consequently the risk that
an inventor with a clearly patentable item would opt for trade secret
protection and avoid disclosure is remote indeed."- -^
Thus the Court validated all three types of trade secrets
r ^Pti
despite the federal policy of disclosure."- -' Unless Congress takes
affirmative action, state trade secret law is not preempted by
federal patent policy.
Software and Trade Secrets
With the very existence of state trade secret law settled
in light of Kewanee, it is appropriate to return to the four require-
ments of trade secrets [ l) appropriateness of subject matter, 2)
secrecy, 3) novelty, and k) economic value], to determine their
applicability to the special case of software. Computer programs
clearly fall within the first requirement of appropriateness of sub-
ject matter. Most authorities allow trade secret protection of those
entities within the "processes," "mechanism," and "compounds" class, '-
Ik
and therefore, any completed program is protectable. Those programs
which are in the developmental stage are not as safe as completed
programs, but "as the idea becomes more detailed and moves toward im-
plementation, it is more likely to be regarded as qualified for trade
secret protection. "'- -■ Mere documentation and data in the form of
programs will probably fall in the least protectable class of "infor-
mation, involving no element of novelty or discovery, but of value to
FTll
its owner. ""- -•
In order to insure fulfillment of the secrecy requirement,
special care must be taken by the owner both in the case of maintaining
in-house secrecy and in the case of selective proliferation of the
program. Unintentional duplication of programs is commonplace, and
thus in the case of in-house secrecy, the owner should ensure limited
access to the program. Relevant documents should be stamped as secret
or confidential. Public statements about developments should be clear-
ed in advance through a legal officer, and careful records should be
[721
kept of all persons to whom the information is disclosed.^ -' Secrecy
is frequently the key issue in trade secret litigation, therefore,
these safeguards must be taken seriously.
Similarly, in the case of a sale or rental of a program
package, the owner should contract with the vendee to insure that
disclosures are limited and closely controlled to protect the trade
secret status of the program package. Various methods are available
to facilitate maintaining this secrecy including l) only allowing
the transfer of object code, 2) limiting the amount of documentation
transferred with the package, 3) establishing a licensing system on
an individual installation basis, and h) contractual provisions to
limit the grantee or licensee in proliferation of the program from
the installation cite.
Very little has been written on the novelty requirement of
computer programs for trade secret protection due to the limited case
law dealing specifically with trade secret protection of computer
15
software. It -would appear, however, that if a program involves many
complicated subroutines, the novelty requirement would be satisfied.
The fourth requirement of value hinges on the value both in
monetary and non-monetary terms which the program has. The greater
the value of the program, the wider the scope of protection afforded by
r73l
the law of trade secrets.'- -" Consequently, it behooves the owner to
establish a detailed log for each use of the program to provide tangi-
ble evidence of its value. The log will establish that such efforts
were worth the time and energy of the owner, and thus implicity, that
the program is valuable. Establishing the actual development costs
of the program is also an important element in ensuring common law
protection.
Scope of Protection
The Restatement of Torts outlines the protection given by
trade secret law. Generally a person is liable for the use or dis-
closure of another's trade secret when he either discovers the secret
by improper means, or breaks a confidence which he has with others.
Further, an individual is liable, if with full knowledge of the facts,
he learns the secret from a third party. Finally, if disclosure is
accidentally made to an individual, and the individual is informed of
the facts, the individual is liable if he uses the trade secret.^ -'
In the case of innocent discovery of the secret, a person is not
liable for his own use of the secret until he receives notice of the
mistaken disclosure.
A common method to protect computer software is the use of
restrictive contractual agreements between the owner of the trade
r75l
secret and all others with whom he deals.'- -^ The two distinct cat
gories of such contractual agreements are employee and non-employee
contracts. Clauses in employee contracts requiring non-disclosure
both during employment and after employment are commonly used.'-
16
These clauses are hardest to enforce when trained employees with
[771
valuable skills are involved.^''-' Another common device used in
employee contracts is the non-competition clause. These clauses
simply limit an employee from competing with the employer for a de-
finite time period and within a specified geographic area once the
employee terminates his relationship with the employer. Courts have
applied a rule of reason to both time and geographic limitations. The
reasonableness of the time period in restrictive agreements will vary
between juridictions, and may vary depending on the type of position
held by the employee.'- -' Traditionally, geographic limitations have
been viewed as the competitive region of the employer, but the soft-
ware industry is national in scope, and thus national territorial
r79l
limitations should be valid.'- -"
Non-employee contracts are more difficult to deal with. A
confidential relationship is less likely to be implied with non-employ-
ees, and thus specific contractual provisions with leasees and vendees
are essential to ensure successful protection. If the owner chooses
to lease his program on a non- exclusive basis, the leasee will only
acquire the right to use the program while title remains in the lessor.
In the contract, the leasee should agree to prevent intentional and
unintentional disclosures to third parties. The time period of the
lease as well as the method of disposition of the transferred materials
at termination of the lease should also be specified.
If the developer chooses to sell the software, full title
and exclusive rights will be transferred to the vendee. In this case
the vendor must agree to forego use and disclosure of the program
once the sale is finalized. Unnecessary litigation can be avoided by
specifying the exact terms of the transaction in the contract.
A transaction similar to outright sale of software is a
contract for development of a program. Problems arise, however, from
the fact that the subject matter of the contract (technically known
17
as the res) does not exist at the time of execution of the contract.
In this relationship, title may reside in either party to the contract,
and therefore, the division of rights sho\ald be clarified before exe-
cution of the contract. Matters such as the rights which the developer
has in using variations of the program for other contracts should be
clarified.*- ■
Although outside the scope of this document, once a contract
to license, sell, or develop is under consideration, there are many
additional legal implications. The normal legal provisions of contract
law enter into each contract such as warranty liability and penalities
for late completion. Careful thought must be given to tax implications
of the contract as well as other legal areas such as antitrust con-
siderations. All of these matters will not be further developed at
this point due to the vast amount of literature in the field and the
impossibility of considering all aspects for each contract.
Criminal and Non-Criminal Remedies Under Trade Secret Law
On the civil side, the owner of a trade secret may obtain
injunctive relief to prevent an appropriator from either disclosing
the secret to a third party or using the secret himself.'- If the
secret has already been disclosed to a third party or used by the
appropriator, the owner may seek damages resulting from the disclosure
or from the profits accured by the use of the trade secret.'- -' In a
recent case on trade secret protection of computer equipment including
software, the court in Telex v. IBM^ held that Telex had violated
the Oklahoma trade secret law and thus ruled in favor of IBM's
[Qk]
counter claim against Telex.
A relatively new aspect of trade secret protection is the
use of state criminal sanctions. A financially destitute employee
with little to lose economically, may consider appropriating a trade
secret if the risk is only a civil injunction or a civil action for
18
damages. The damage done to a developer can be considerable, and
thus many states have added criminal penalties as an additional de-
terrent against trade secret theft. Two methods of providing such
sanctions presently exist: criminal prosection for software theft if
the stolen information is in such a form as to fit the relevant lan-
guage of the existing statute, and specific criminal sanctions for
misappropriation of trade secrets.'- ^ The first category of general
statutory sanctions may be further divided into those jurisdictions
■which define the subject matter of theft in terras of property, -^
those jurisdictions which qualify or extend (in the form of lists) the
e ju:
[89]
property concept in the relevant statutes,^ ^ and those jurisdictions
which provide statutory protection for things of value.
Three complications arise when these statutes are used to
protect trade secrets. First, many of the statutes do not carry sig-
nificant penalties (if at all) for theft involving an "intent to
return, " and thus the appropriator might easily take the program,
copy it, and then return it. Thus the damage would have been done,
but the appropriator would be immune from criminal prosecution under
the general statutes.'- Second, if the relevant statutory wording
only includes the article in which the secret is embodied (i.e.,
magnetic tapes or sheets of paper), the protection is worthless.
Third, the trade secret must qualify for protection or the statute
will be impotent against appropriation by memory rather than copying
of the informatioii.
At the federal level, no express trade secret statutes
exist. There are, however, statutes which prohibit the transporta-
r 911 r 921
tion*- -" and sale or receipt^ -' or stolen goods, wares, merchandise,
securities, or money. The problems raised under the discussion of
state larcency statutes are also pertinent under the federal statutes.
It is still not settled whether the theft of computer programs falls
under the federal statutes.'- -' Further, no protection exists under
these statutes against appropriation by memory. ■-
19
Overall, trade secret protection of software is a viable
r951
alternative for private industry.'- Although trade secret protec-
tion has serious limitations, it currently appears to be the best
alternative for private enterprise .
THE IMIVERSITY ENVIRONMENT AND PROTECTION OF SOFTWARE
As universities become more heavily involved in software
development, they must determine if they want to legally protect the
software they develop. If the university policy is to legally pro-
tect the software which has been developed for commercial use, then
there are three alternatives. As previously discussed, the area of
patent protection is currently very unsettled. Even those patents
which are being granted may later be invalidated in an infringement
suit. Copyrights also present problems in that the amount of real
protection afforded by a copyright is still unknown. At first blush,
therefore, trade secret law appears the most viable method to protect
software which a university has developed and to which the university
has title.
A full discussion of all policy considerations of trade
secret protection of software in a university environment is beyond
the scope of this document, however, a few of the advantages and
disadvantages in the use of trade secret protection merit brief atten-
tion. Assuming the profits from the project are shared with the
university personnel who developed the software, the remaining funds
accrue to the state university at no expense to the taxpayer. On the
negative side, one can argue that the goal of the university should
not be a business of exploiting business ventures, but rather should
be one of education. Therefore, the university policy should be one
of public dedication of all software which is developed at the uni-
versity rather than trade secret protection of the software and com-
mercial sale of the software.
20
Assuming for the moment that the university policy is to use
trade secret laws to protect software which is developed for commer-
cial sale, this policy is fraught with danger. First, employment
agreements would have to he established in which faculty members
agreed to maintain the confidentiality of any software which they
developed. Next, all publications would have to be censored which
dealt with the software being protected by trade secret. Finally,
all research done on protected software would have to be done under
lock and key. It should be noted, however, that the censorship and
lock and key research requirements are not new to the university in
that some government sponsored research and development is done in the
university environment which requires these types of security measures.
The establishment of proper incentives for software develop-
ment in a university environment is also a difficult problem. Three
general types of incentives exist. First, at the beginning stages
of an individual's career, acceptance in his field will be sufficient
incentive. It should be noted, however, that the power of this in-
centive quickly diminishes as the individual becomes accepted in his
field. Second, as an individual successfully develops software, he
can be advanced within the organization, and thus the individual will
receive both monetary gains as well as peer group approval as incentive
for further software development. Again, however, the power of this
second type of incentive diminishes as an individual reaches higher
levels of the organization. Finally, there can be some type of direct
payment to university personnel for the development of software.
At present the University of Illinois does not have a formal
procedure to reward university personnel who successfully develop
software. The General Rules Concerning University Organization and
r97l
Procedure,'- -' only provide a modest incentive for development of
patentable ideas and authorship of copyrightable material. The Pro-
cedure on Patent Matters of The General Rules is the key provision in
payment to inventors and reads as follows:
21
The determination as to what portion of net income shall
be paid to the inventor or discoverer^ after the payment
of costs of securing a patent and of development and admin-
istration, from a patent held by the University or trans-
ferred by it to the University of Illinois Foundation shall
be studied by the University Patent Committee, which shall
make a recommendation to the President. In most cases, the
University contribution in use of facilities and resources
will be significant and, therefore, the inventor will have
little real claim to compensation over his regular Univer-
sity salary. In some cases, the University Patent Committee
shall recommend that the proportion of net income assigned
to the inventor shall fall in the range of 10 to 15 per cent
of net income. In unusual cases, in which the University
contribution is obviously less, this percentage allocation
to the inventor may go to 25 per cent and, in rare cases,
the rate may be higher. (emphasis added)[98l
The use of net income is critical, in that the inventor has
little control over the expenses which the University incurrs in the
adrainistration and development of his patent.
The Copyright and Recordings section of The General Rules
provides the framework for payment to authors who copyright material.
The main section reads as follows:
A University Committee on Copyrights and Recordings,
appointed by the President, will review the circum-
stances involved in each case that might arise under
the principle stated in (e), [the use or sale of copy-
righted material resulting in net income to the Uni-
versity] and make recommendation concerning it to the
President and Board of Trustees. It is expected that
the Committee will be guided in its recommendations by
standards analogous to those stated in Section 18(g)
concerning patents. [99]
Therefore, at present the University of Illinois does not have a
formal procedure to reward and encourage software development, but
provisions do exist to encourage, on modest levels, the development
of patentable inventions and copyrightable material.
22
Academic Freedom
The secrecy measures necessary for the trade secret
protection of software conflict with the general principles of aca-
demic freedom, rights and freedoms of students, and professional ethics
of faculty. For example, the University of Illinois Statutes state
that:
It is the policy of the University to maintain and
encourage full freedom, within the law, of inquiry,
discourse, teaching, research and publication and to
protect any member of the academic staff against in-
fluences, from within or without the University,
which would restrict him in the exercise of the free-
doms in his area of scholarly interest. [100]
The I9U0 Statement of Principles on Academic Freedom and Tenure of the
American Association of University Professors and the Association of
American Colleges states:
Institutions of higher education are conducted for the
common good and not to further the interest of either
the individual teacher or the institution as a whole.
The common good depends upon, the free search for truth
and its free expression.
Academic freedom is essential to these purposes and
applied to both teaching and research . . . Academic
freedom in its teaching aspect is fundamental for the
protection of the rights of the teacher in teaching
and of the student to freedom in learning.
(a) The teacher is entitled to full freedom in
research and in the publication of the results sub-
ject to the adequate performance of his other academic
duties, but research for pecuniary return should be
based upon an understanding with the authorities of
the institution. (emphasis added and footnotes
omit ted) [101]
The preamble of the Joint Statement on Rights and Freedoms of Students
of the American Association of University Professors, the National
Association of Student Personnel Administrators, the United States
National Student Association, the American Association of Colleges,
23
the Association of American Colleges, and the National Association
of Women Deans and Counselors states:
Freedom to teach and freedom to learn are inseparable
facets of academic freedom. The freedom to learn
depends on appropriate opportunities and conditions
in the classroom^ on the campus, and in the larger
community. [ 102]
Finally, the Statement on Professor Ethics of the American Association
of University Professors emphasizes the need for complete academic
freedom by stating:
As a member of his institution, the professor seeks above
all to be an effective teacher and scholar. Although he
observes the stated regulations of the institution, pro-
vided they do not contravene academic freedom, he main-
tains his right to criticize and seek revision. [103]
As one can see, the use of trade secret law to protect
software in a university environment has major obstacles. Overall,
the only solution is to examine each case on an individual basis. A
balance must be made between the right of students to learn in an
environment unburdened by security measures, the right of faculty to
teach and do research, and finally the right of society to receive the
maximum return on all resources spent on universities. The balance
is an extremely difficult one to draw, and only time will tell the
eventual outcome of such considerations.'- -'
GOVERNMENT PROCUREMENT OF SOFTWARE
An additional area of concern is the relationship between
both private and public suppliers of software and the federal Govern-
ment. One of the main reasons the Federal Government must contract
for development of software is the high manpower costs of properly
trained computer personnel. Salaries of twenty to twenty-five
thousand are common for qualified personnel, but the present civil
service salary system cannot easily accommodate such high salaries. L -^^
2k
Although direct sales of pre-developed software protected
under patents or copyrights would be the best legal method to contract
with the Government for software, such situations are atypical J ■'-'^"^
The normal situation is for the Government to contract, for the devel-
opment of software. There are three main methods to contract for soft-
ware development.^ First, a software firm may contract to supply
trained personnel on a daily basis to develop software for the Govern-
ment. If this is done, it is reasonably clear that the Government is
entitled to exclusive rights to all software developed by the software
personnel. Another method is to bid for a contract, but to include
a cost plus clause in which the Government agrees to absorb any addi-
tional costs above a certain figure under various conditions of cost
overruns. Again, the Government pays for everything and thus it is
reasonably clear that the Government would acquire exclusive rights
to the contract.
The third approach is to contract for software development,
but the cost is a fixed item in the contract. If the Government
supplied all of the resources to develop the software, then the Govern-
ment should be entitled to exclusive rights in the software. The
difficulty arises when the software developer supplies some of the
resources in the software development.
Patent Rights and Rights to Data Clauses
In most government contracts for research and development
and governmental supply, two types of provisions outlining the govern-
ment's rights to intellectual property are included.*- ^ These two
provisions are the patent and data clauses. The patent provision,
usually entitled the Patent Rights clause, requires that the contractor
supply the Government written disclosure of each invention conceived
of under the contract or the first reduction to actual practice. Most
rights which the Government has under the patent clause are specifi-
cally spelled out, but these specified rights do not presently cover
25
software. NASA had adopted a broader patent provision referred to as
riOQl
the New Technology clause'- -' which replaces the traditional Patent
Rights clause. The New Technology clause requires the reporting of
all inventions^ and in addition, the reporting of all innovations.
The data provision, usually entitled the Rights in Data
clause, is used in most Government contracts where the delivery of
data is specified. This clause does not specifically call for acqui-
sition of any data, but rather defines the rights which the govern-
ment has in the specified data. The rights which the government has
under the Rights in Data clause are either limited to very specified
uses, or unlimited. '-
Delivery of computer programs may be specifically required
in the contract, or delivery provisions may be included under the
general patent provision. Thus the rights which the Government has
in any computer programs developed under the contract depend on
whether the patent or data provision of the contract is used.
As can be seen from this general discussion, no specific
contract provisions currently exist which explicitly define the rights
of each party to a Government software procurement contract. An ex-
ample of this ambiguity can be found in McDonnell Automation Co.^ ^
in which the Air Force contracted for a computer program to aid Air
Force attorneys in researching various federal statutes. After the
system, entitled Legal Information Through Electronics (LITE), was
developed, the contractor protested when the Government exerted un-
limited rights to the program under the Rights in Data clause. The
Comptroller General held that the Government was entitled to an un-
limited license to the program under the Rights in Data clause. With
proper contract provisions dealing with computer programs, this case
and many unreported disputes could be avoided in Government procure-
ment law.
26
Software Revision to ASPR's
In response to the need for a specific contract provision
dealing with computer programs the Armed Services Procurement Regula-
tion Committee issued a proposed change to the Armed Services Procure-
ment Regulation (ASPR) in September of 1973-^ ^-' Much debate has
occurred over this proposal, and final issuance of a new ASPR on com-
puter programs has not occurred.
Assuming a contractor negotiates a limited Rights in Data
clause with the Government, the contractor must still determine the
type of legal protection which he will use to protect his software.
Currently, the most viable method to use in protection of computer
programs is trade secret law. Until recently, it was an axiom of
Government contract law that the exclusive remedy for governmental
breach of a contract providing for limited use of proprietary data'- •*
was a damage action in the Court of Claims pursuant to the Tucker
Act.'- -' This belief was recently shattered in International Engin-
eering Co. V. Richardson'- ^ in which plaintiff sought to enjoin the
Government's misuse of proprietary information. The district court
held that it did have jurisdiction and did grant an injunction against
the Government's misuse of the proprietary information.
Other remedies for the Government's misuse of proprietary
information include requests to the General Accounting Office to have
the Comptroller General order cancellation of bids (or requests for
bid proposals) if proprietary data is being disclosed by the Govern-
ment.'- -' The Boards of Contract Appeals is another alternative to
prevent the Government's misuse of proprietary data."- -' The Boards,
however, only have jurisdiction over current contracts. Finally, a
suit for unauthorized use of proprietary information could be brought
in the Court of Claims.'- -' Damages would then have to be assessed,
based on the damage sustained by the victim or by the profits earned
by the wrongdoer who used the misappropriated material. The latter
27
course of action^ however, is unappealing due to the fact that the
secrecy of the computer program is lost, and thus future use of the
program under trade secret protection is impossible.
Once the ASPR software regulation is issued, future contracts
with the Government should become better defined. In addition, if the
present case law develops and allows injunctive relief in federal
District court, the protection of software through trade secret law
will be more viable due to the immediate availability of judicial
remedy through injunctive relief.
CONCLUSION
Although many alternatives exist for the legal protection
of software, no definite answer exists for the best method to protect
software in both the public and private sectors of the economy. On
the private side of the economy, a developer of software may be able
to obtain patent protection if the computer program is related to a
mechanical device and falls under the line of cases currently being
decided by the Court of Custom and Patent Appeals. It should be noted,
however, that the ti^e test of these patents will be in an infringe-
ment suit. Next, copyright protection may be an alternative, and as
seen in the recent Telex v. IBM, such protection has withstood the
first test at the district court level. At present, probably the
optimal technique to protect software due to the uncertainties of
patent and copyright protection is through the use of trade secret law.
The use of trade secret law, however, is by no means without difficulty.
In contracts between private developers and the Government, trade
secret protection is more viable today due to the recent case law
allowing injunctive relief against the Government for misuse of trade
secret data by the government. The revision of the ASPR regulations
on computer programs will also help clarify this situation.
28
On the public side of a university developing computer
software for commercial sale, the picture is even less clear. The
university must face the legal obstacles of either patent, copyright,
or trade secret protection which the private sector has to consider.
In addition, if the university were to adopt trade secret protection
of software, the university must resolve the conflict between trade
secrets and academic freedom. Even if all of these issues could be
resolved, there is no definitive answer as to the contractual relation
between a university and the Government in contracting for software
in which the university has contributed some of its own resources in
the development of the software.
The computer industry is dynamic, and the most rapid growth
now occurring in the industry is in software development. Software
technology has outgrown the legal development of software protection.
Thus in the foreseeable future, the legal protection and regulation
of software will remain in a state of flux until major solutions
evolve which permit an intelligent and rational method to protect
computer software.
29
NOTES
[ I] Bauer, "Software Markets in the 70's/' Expanding Use of
Computers in the 7Q's: Markets --Needs- -Technology,
(ed by Grunberger, 197lT
[2] Auerbach, "Technological Forecast/' Expanding Use of Computers
in the 70's: Markets--Needs --Technology, (ed by
Grunberger, 1971) •
[3] See generally. Bower, "Market Changes in the Computer Services
and Industry, k The Bell Journal of Economics and
Management Science ^39' (1973).
[k] See e.g. George Washington University, Computers in Law
Institute, The Law of Software (1968 and I969). For an
up to date bibliography on software protection see
American Bar Association, Section of Patent, Trademark
and Copyright Law, 197^ Committee Report (prepared for
the I97U ABA Meetings August 12-15, 197^) [hereinafter
ABA, 1974 Report] .
[ 5] Hardware clearly falls under the statutory definition of a
machine or manufacture. 35 U.S.C § 101 (197O).
[6] See e^. S. I36O, 93rd Cong., 2nd Sess. See also ABA,
197^ Report for a discussion of various parts of these
proposals to amend the existing patent laws.
[7] Mackay Co. v. Radio Corp., 306 U.S. 86, (1938).
[8] See e^. Cochrane v. Diener, 9^+ U.S. 780 (1876); O'Reilly
V. Morse, I5 How (56 U.S.) 62 (l853).
[9] Woodcock, "Mental Steps and Computer Programs," 52 J. Pat.
Off. Soc'y. 275 (1970).
[10] See Note, lU Boston Coll. Ind. and Comm. L. R. IO5O (1973);
Note, k Loyola Univ. of Chicago, L. J. 56O (1973).
[II] Commission on Patent System, The 1966 Report of the
President's Commission on the Patent System (reprinted
in S. Doc. No. 5, 90th Cong., 1st Sess. p 21).
[12] i+09 U.S. 63 (1972).
30
[13] Congress defined the categories of discoverers and inventions
for which patents may presently be granted:
The term "process" means process, art or method, and
includes a new use of a known process, machine, manu-
facture, composition of matter, or material. 3^ U.S.C
§ 100(b).
In addition, 35 U.S.C. § 101 provides:
Whoever invents or discovers any new and useful process,
machine, manufacture, or composition of matter, or any
new and useful improvement thereof, may obtain a patent
therefore, subject to the conditions and requirements
of this title.
[lU] Application of Benson, UUl F.2d 682 (C.C.P.A. 1971).
[15] See Note, k Loyola Univ. of Chicago L. R. 560, 575 (1973)-
[16] See Application of Brandstadter, kQk F.2d 1395 (CC.P.A.
1973); Application of Doyle, 1+82 F.2d I385 (C.C.P.A.
1973); Application of Comstock, U81 F.2d 905 (C.C.P.A.
1973); Application of Knowlton, I+8I F.2d 1357 (C.C.P.A.
1973).
[17] See Application of Musgrave, 1+31 F.2d 882 (C.C.P.A. 1970);
Application of Mahony, 1+21 F.2d 7^+2 (CCP.A. 1970);
Application of Bernhart, kYJ F.2d 1395 (C.C.P.A. I969);
Application of Prater, 415 F.2d 1393 (C.C.P.A. I969).
[18] The Canadian Government recently issued a patent on a
computer program. See Computerworld p 1 (August 'J ,
197^)' If any foreign government upholds a patent on
a computer program, the patent may be valid in the U.S.
under the various patent treaties. See generally ABA,
I97I+ Report 287.
[19] Galbi, "Software and Patents: A Status Report," Computer
Law Service § k - 2, art. 1 (ed by Bigelow, I97 4 ) .
[20] For a concise legislative history of copyright law see
footnote 17 in Goldstein v. California, 1+12 U.S. 5I+6,
562 (1973).
31
[21] See Generally, Nimmer, Nimmer on Copyrights (197^)
. [hereinafter Nimmer], Nicholson, A Manual of Copyright
Practice for Writers, Publishers, and Agents (2nd. ed . 1970)
[22] Nimmer, § 111.
[23] Under the recently passed Senate revision hill of the
copyright law (S. I36I, 93^^^. Cong., 2nd Sess.), the
duration of copyright protection would be 50 years
after the author's death for both common law and stat-
utory copyright rather than the existing perpetuity
period for common law copyrights and 56 years for
statutory copyright.
[2U] Nimmer, § 112.
[25] Under the Senate revision bill (S. I36I, 93rd. Cong., 2nd
Sess.), the statutory duration would be changed to the
life of the author plus 50 years.
[26] Nimmer, §§ I50 and I5I.
[27] See Bigelow, Computer Law Service (197^) appendix ^-3a for
a reprint of the circular.
L -■ See generally. Note, "Copyright Protection for Computer
Programs," 6k Colum. L. R. I27U (I96U). The Senate
recently passed a bill (S. I36I, 93]^d. Cong., 2nd Sess.)
revising the existing copyright statutes. Computer pro-
grams are proper subject matter under the proposed bill.
Section II7 is the key provision and states:
Notwithstanding the provisions of sections IO6
through 116, this title does not afford the owner
of copyright in a work any greater or lesser
rights with respect to the use of the work in
conjunction with automatic systems capable of
storing^ processing, retrieving, or transferring
information, or in conjunction with any similar
device, machine, or process, than those afforded
to the works under the law, whether title I7 or
the common law or statutes of a state in effect
on December 31? 197^> as held applicable and
construed by a court in an action brought under
this title.
32
[29] Galbi^ "Copyright and Unfair Competition Law as Applied
to the Protection of Computer Programming/' Computer
Law Service, § 1+-3, art. 1, p I7 (ed by Bigelow, 197^)-
[30] 367 F. Supp. 258 (N.D. Okl. 1973).
[31] 310 F. Supp. 1073 (W.D. Wash. I969)
[32] See Galbi, "Copyright and Unfair Competition as Applied to
the Protection of Computer Programming," Computer Law
. Service, § ^-3^ art 1, p 18 (ed by Bigelow, 197 i|).
[33] Galbi, "Proposal For New Legislation to Protect Computer
Programming," I7 Bull. Copyright Soc'y. 280 (197O);
Morris, "Protecting Proprietary Rights of Computer
Programs: The Need For New Legislative Protection, "
21 Catholic Univ. L. R. 181 (I97O) [hereinafter Morris].
[3^] Williams 8e Wilkens v. U. S., Docket No. 73, 1279 (^87 F.2d
13^5) (U.S. Ct. Clms.) is presently before the Supreme
Court. In Williams the National Institute of Health
made over one million single copies of various obscure
medical journal articles, some of which Williams ^e.
Wilkens had copyrighted. With a strong dissent, the
U.S. Court of Claims held U-3 that the photo copying of
a copyrighted article, one copy at a time, was not an
infringement of the copyright. Therefore, the outcome
of this case will undoubtedly affect the status of soft-
ware copyright protection.
[35] Bender, "Trade Secret Protection of Computer Software," 38
Geo. Wash. L. Rev. 909, 926 (1970) [hereinafter Bender].
[36] Restatement of Torts, § 757, comment (b), (1939). See also
Mycalex Corp. v. Pemco Corp., 6k F. Supp. i^-20, 423
(Md. 191+6).
[37] Victor Chemical Works v. Iliff, 299 HI- 532, 5^5 (1921). The
identical quote was used again in Schulenburg v.
Signatrol, Inc., 33 HI. 2d 379, 385 (1965), cert, denied.
383 U.S. 959 (1966).
[38] 198 U.S. 236, 250 (1905). See also Ellis, Trade Secrets
§ 12, (1953) [hereinafter cited as Ellis] which states:
33
The common law gives a man the right to keep
his ideas or the results of the work he has done,
or paid for doing, to himself. The fact that
others are at liberty to do similar work, if they
wish, does not authorize them to steal his. The
principle is fundamental. The broad terms 'ideas'
and 'work' are used in stating it, instead of the
more usual one 'trade secrets, ' since the latter
is frequently interpreted as something akin to an
unpatented invention.
[39] Dupont Power Co. v. Masland,2Ui+ U.S. 100, 102 (191?).
[ho] See generally, Wessel, "Legal Protection of Computer
Programs," ^3 Har. Bus. Rev. 97 (March- April, I965)
(hereinafter Wessel) . Several of these requirements
are discussed in Kewanee Oil Co. v. Bicron Corp. ,
U.S. , 9^ s. ct. 1879 (197)4).
[Ul] Turner, The Law of Trade Secrets 12 (1962) [hereinafter
cited as Turner] .
[k2] See B. F. Goodrich Co. v. Wohlgemuth, II7 Ohio App. U93 (Ct.
App. 1963); Kaumagraph Co. V. Stampagraph Co., 235 N.Y.
1 (1923); National Tube Co. v. Eastern Tube Co., 3
Ohio Ct. C. Rep. N.S. ^+59 (Cir. Ct. I902), aff'd, 69
Ohio St. 560, 70 W.E. 1127 (1903).
[i+3] Bender, 928.
[kk] Morris, 195. See also DuPont Powder Co. v. Masland, 2^4
U.S. 100, (1917); General Aniline and Film Corp. v.
Frantz, 50 Misc. 2d 99I+, 27^ N.Y.S. 2d 63h, 151 U.S.P.Q.
136 (N.Y. Sup. Ct. 1966); Cincinnati Bell Foundry Co.
V. Dodds, 10 Ohio Dec. Rep. 15^ (Super. Ct. I887).
[U5] Bender, 928.
[U6] See We s ley- Jess en Inc. v. Reynolds, F. Supp.
(ill. 197^), 182 B.N. A. Pat., Trademark, and
Copyright J. , A-2 (June I3, 197^) (trade secret no
longer a trade secret if embodied in a product which
is then sold and examined with reverse engineering
techniques). See also Oppenheim, Cases on Unfair Trade
Practices 237 T2d ed. 1965)-
3i+
[UT] W. R. Grace ^ Co. v. Hargadine, 392 F.2d 9 (6th Cir. I968)
(comparison of patent and trade secret novelty require-
ment). Bender, at note 101, gives an example of the
nature of patent novelty:
Consider an invention which no one alive has
anticipated; and the patent for which reads
■no prior art. If, one year after the patent
issues, an archeologist discovers an old Indian
cave in Arizona with wall paintings disclosing
that invention, the patent is invalid for lack
of novelty. Such is the absolute nature of
patent novelty. Bender, 929*
[kQ] Alfred Bell and Co. v. Catalda Fine Arts Inc., I9I F. 2d 99
(2d Cir. 1951) (example of copyright novelty). Bender
again states: "For a copyright it will suffice that
the author contributed more than a merely trivial
variation, i.e., something of 'his own'." Bender, note
100, at 939.
[U9] Bender, 929.
[50] See Wessel, 100.
[51] Ellis, § lU.
[52] 376 U.S. 225 (196U).
[53] Compco Corp. v. Day-Brite Lighting, Inc., 376 U.S. 23^ (196^)
[5^+] 376 U.S. at 231
[55] 376 U.S. at 232.
[56] 395 U.S. 653 (1969).
[57] The Court noted the heavy economic burden involved in patent
• litigation, and therefore, the extra burden of the
royalty payments could deter most attempts to challenge
patents. In particular, the Court stated:
The deterrent effect would be particularly severe
in the many scientific fields in which invention
is proceeding at a rapid rate. In these areas,
a patent may well become obsolete long before its
17 -year term has expired. If a licensee
35
has reason to believe that he will replace a
patented idea with a new one in the near future,
he will have little incentive to initiate lengthy
court proceedings, unless he is freed from lia-
bility at least from the time he refuses to pay
the contractual royalties. 395 U.S. at 6'J3-k.
[58] 395 U.S. at 672.
[59] ^12 U.S. 5^6 (1973). Chief Justice Burger, writing for the
majority, merely distinguished Sears and Compco from
Goldstein. Dissents by Justice Douglas and Justice
Marshall (each concurred in by Justice Brennan and
Justice Blackmun), however, rely on Sears and Compco.
[60] U12 U.S. at 560-561.
[61] U12 U.S. at 559.
[62] 4-09 U.S. 63 (1972).
[63] Kaul, "And Wow State Protection of Intellectual Property?"
60 A. B.A.J. 198, 200 (February I97U) stated:
While some observers have expressed the view that
Benson did not completely bar protection of com-
puter programs, it is extremely doubtful whether
valid protection is possible under the patent laws
as they are now written.
[6U] U.S. , 9k s.ct. 1879 (197^).
[65] U.S. at , 91+ s.ct. at I889.
[66] U.S. at , 9I+ s.ct. at I89O.
[67] One should note, however, that trade secrets such as the
Coca Cola secret formula are patentable, but through
the use of trade secret protection, these ideas can
be protected for periods longer than the 17-year patent
protection period.
[68] For a discussion of the future of trade secrets after Kewanee
see 182 B.N. A. Pat., Trademark, and Copyright J. , A-9
Tjune 13, 197^)
36
[69] ^3 C.J.S., Injunctions, § l48 (19^5).
[70] See Irizarry y Puente v. Harvard College, 2^48 F.2d 799, (1st
Cir.):. cert, denied, 356 U.S. 9^7 (1957): Hamilton
National Bank v. Belt, 210 F.2d 706, (D.C Cir. 1953).
[71] Bender, 927.
[72] Wessel, 100.
[73] Ellis, § Ik.
[7^1 See Restatement of Torts, §757 (1939).
[75] See Doerfer, "The Limits on Trade Secret Law Imposed by
Federal Patent and Antitrust Supremacy, " 80 Harv. L.
Rev. 1U32 (1967) [hereinafter Doerfer].
[76] Bender, 93^.
[77] See Note, "Developments in the Law - Competitive Torts," 77
Harv. L. Rev. 888 (196U). Doerfer at note I6 states:
Trade secret controversies growing out of
employment relationships present special
difficulties. The interest in allowing an
employee to move from job to mob without
allowing his employers to claim a proprietary
interest in the skills acquired during his
stay must be balanced against the interest
in permitting the holder of a competitive
advantage to make a limited disclosure of his
secret in order to exploit it. A former em-
ployee may continue to use general knowledge,
but not secrets, acquired in Yiis work; no ex-
plicit agreement is necessary to enable a
former employer to restrain disclosure.
[78] See Klein, "The Technical Trade Secret Quadrangle: A Survey,"
55 Nw.U.L.Rev. ^+37 (i960).
^'^^ 10 Cavitch, Business Organizations § 23^.02 (197^)-
[80] Id., § 233.02.
37
[8l] See Kewanee Oil Company v. Bicron Corporation, U.S.
, 94 S.Ct. 1879 (197^); Schulenburg v. Signatrol,
Inc., 33 111. 2d 379 (1965), cert, denied 383 U.S.
959 ( 1966 )( although an injunction is a drastic remedy,
it may be granted in appropriate instances). See also,
"Software, Statutes, and Stare Decisis," 13 How.L.jT
J+20 (1967).
[82] See Morris 195-
[83] 367 F. Supp. 258 (Okla. D.C. 1973).
[81+] Id., Conclusion # kQ.
[85] Bender states:
When the secret can "be utilized "by the thief with
only a nominal investment, the possibility of civil
suit may prove to be an empty threat. A software
house is perhaps the best example of a business re-
quiring a low initial investment of capital. To
launch his own software house, one needs only a
programmer, a pad, and a pencil. Thus, especially
if he happens to be a programmer, an employee who
turns thief may have precious little of an invest-
ment to lose as a result of a lawsuit. Bender, 9^2.
[86] The Illinois definition of property also includes trade
secrets, 111. Rev. Stat., ch. 38, § 15-1 (197^)-
[87] These include Oregon, Utah, Idaho, and Kentucky. In addition,
Bender states:
In any of these four jurisdictions only strict
attention to the wording and comprehension of
interpretive cases will indicate whether the
larceny statute can be used to prosecute theft
of a trade secret. Bender, 9^5-
[88] These include Alabama, Alaska, Arizona, Connecticut, Delaware,
Indiana, Iowa, Mississippi, Nevada, North Dakota, Rhode
Island, South Carolina, South Dakota, Texas, Vermont,
Washington, West Virginia and Wyoming. Bender, 9^5.
38
[89] These include District of Columbia ("anything of value"),
Florida ("article of value of any kind"), Hawaii
("anything of marketable, saleable, assignable, or
available value") Kansas ("valuable thing -whatsoever"),
Louisiana ("anything of value"), Maryland ("thing"),
Missouri ("valuable thing"), Montana ("article of value
of any kind"), and Virginia ("money or other thing").
In addition, Bender states that:
Prosecution will generally be easier under these
statutes than under those using the word 'property, '
since it should be easier to show that a trade
secret is a thing of value than to show it is
property. Bender, 9k6.
[90] For a recent case in which the defendant was convicted under
a felony theft statute rather than a specific trade
secret theft statute, see Hancock v. Texas, 1+02 S.W. 2d
906 (Texas Grim. App. 19^6), 379 F.2d 552 (5th Cir. I96T)
(defendant's petition for habeas corpus denied at dis-
trict court and his appeal to the 5th Cir. also denied).
[91] 18 u.s.c. § 231^ (1970).
[92] id^, § 2315.
[93] In several cases the courts have held that the act of trans-
porting photostatic copies of the stolen information
(not computer programs) violated the federal statutes.
See e.g. , United States v. Greenwald, U79 F.2d 320
(6th Cir.), Cert denied, i+1^ U.S. 8'?k (l973)j United
States V. Bottone, 365 F.2d 389 (2d Cir. I966), cert,
denied, 385 U.S. 97k (I966); United States v. Lester,
282 F.2d 750 (3rd Cir. I96O), cert, denied, 36U U.S.
937 (1961).
[9^+] _See United States v. Bottone, 365 F.2d 389, (2d Cir. I966)
(court commented that 15 U. S.C. 231^^- would not apply
• to the theft of trade secrets by memory).
[95] It is generally conceded that patent protection is better
than trade secret protection for computer programs.
See Sheers and Encke, "Copyrights of Patents for Com-
puter Programs?", k9 J. Pat. Off. Soc'y 323 (1967)-
[96] For more discussion of the advantages and disadvantages of
trade secret protection of computer programs see
Morris 197*
39
[97] The General Rules Concerning University Organization and.
Procedure (revised May, 1972). [hereinafter The
General Rules] .
[98] Id. § 18(c).
[99] Id. § 19(f).
[ 100] University of Illinois Statutes, Art . X , § 2 ( I97 2 ) .
[101] 56 A.A.U.P. Bulletin 323, 32^ (Autumn I97O).
[102] 5^ A.A.U.P. Bulletin 258 (Sunmier I968).
[103] 55 A.A.U.P. Bulletin 86 (Spring I969).
[ 104] For an earlier treatment of difficulties encountered by
universities in managing research see Palmer, University
Research Problems (19^9 and I962). The developers of
PLATO IV have proposed a compensation arrangement for
developers of course related software (courseware) which
uses copyright protection. Under this proposed plan,
the University of Illinois would receive 20 percent of
gross revenue while the author would receive the re-
maining 75 percent of gross revenue. The accent is on
gross revenue, in that the author will have more con-
trol over his courseware than under the University
Copyrights and Recordings provision where University
administrative expenses would reduce the gross revenue
to zero net revenue. If the author was commissioned by
the University to develop the courseware under a re-
leased time arrangement, the University's share would
be increased to 60 percent of gross revenue, while the
author's share would be reduced to kO percent of gross
revenues. Finally, if some one unrelated to the Uni-
versity developed courseware, the University would
receive 80 percent of gross revenue while the author
would receive the remaining 20 percent. This procedure
avoids the trade secret problems previously discussed
and also provides reasonable incentive for courseware
development. The problems encountered in the regulation
of courseware, however, are unique to PLATO IV type
situations.
1^0
[105] See Bigelow, Computer Law Service, Introduction to art 3^
"~ §3.
[106] See Saragovitz, "Patents - Trade Secrets - Technical Data Use
and Misuse by the U.S. Government/' 15 Vill. L.Rev.
331 (1970).
[107] Wofsey, "Contracting For Software/' Computer Law Service
art. 2, § 3-3 (ed by Bigelow).
[108] See Levy, "Computer Programs in Government Procurement/'
10 Will, and Mary L. R. 658 (1969). See also C.CH.
Gov't. Contracts Rep, p li|,110; lU,200; 1^^,205; 14,220.
[109] N.A.S.A. IP 9.101-U.
[110] Under A.S.P.R. § 9-201, unlimited rights in data means that
the Federal Government has the right to use, duplicate,
or disclose technical data in any manner and for any
purpose.
[Ill] J+9 Opinions of the Comptroller General 12^+, 2 Comp . Law
Serv. Rep. 29I (1969).
[112] Proposed A.S.P.R. Change to Amend 9-202-2(c) (Case 7O-83)
discussed in I78 B.N. A. Patent, Trademark, and Copyright
Rep. A- 18 (May I6, 197^)- '
[113] See Hinrichs, "Proprietary Data and Trade Secrets Under
Department of Defense Contracts," 36 Mil. L.Rev. 6I
(1967) (hereinafter Hinrichs) .
[iii+] 28 u.s.c. § 149U (1970).
[115] F. Supp. , (Dist. Ct. 1973) U90 B.N. A. Fed Contract
Rep. D-1 "(jW 23, 1973).
[116] Hinrichs, 89.
[117] See "Unauthorized Use of Proprietary Information by the
Government: A Mixed Bag of Remedies," 512 B.N. A.
Fed. Contract Rep. K-1 (July 1, 197^+).
[118] See Kostos, "Unauthorized Use of Technical Data in Government
Contracts: Remedies of the Data Owner, " 6 Boston Coll.
Ind. and Com. L.R. 753 (1965)
In
i
I