Apple Inc. v. Psystar Corporation

Filing 204

Reply Memorandum re 182 MOTION for Summary Judgment Corrected Version filed byPsystar Corporation. (Attachments: # 1 Signature Page (Declarations/Stipulations) Declaration, # 2 Exhibit A, # 3 Exhibit B, # 4 Exhibit C)(Camara, Kiwi) (Filed on 10/30/2009)

Download PDF
Apple Inc. v. Psystar Corporation Doc. 204 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page1 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 K.A.D. CAMARA (TX Bar No. 24062646/ MA Bar No. 661087 ­ Admitted Pro Hac Vice) camara@camarasibley.com KENT RADFORD (TX Bar No. 24027640 ­ Admitted Pro Hac Vice) radford@camarasibley.com CAMARA & SIBLEY LLP 2339 University Boulevard Houston, Texas 77005 Telephone: (713) 893-7973 Facsimile: (713) 583-1131 EUGENE ACTION (SBN 223023) eugeneaction@hotmail.com 1780 E. Barstow Ave., #5 Fresno, California 93710 Telephone: (559) 283-9772 Facsimile: (559) 642-2843 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION APPLE INC., a California corporation, Plaintiff, v. PSYSTAR CORPORATION, Defendants. AND RELATED COUNTERCLAIMS CASE NO. CV-08-03251-WHA PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) i Dockets.Justia.com Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page2 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 TABLE OF CONTENTS I. PSYSTAR OWNS THE COPIES OF OS X THAT IT BUYS ............................................ 1 II. THE ENTIRELY UNREMARKABLE PRINCIPLE THAT 'USES' THAT VIOLATE A LICENSE AGREEMENT CONSTITUTE COPYRIGHT INFRINGEMENT ONLY WHEN THOSE USES WOULD INFRINGE IN THE ABSENCE OF ANY LICENSE AGREEMENT AT ALL ......................................... 1 III. APPLE DOES NOT HAVE AN ACTIONABLE DMCA CLAIM BECAUSE APPLE CANNOT SHOW THAT CIRCUMVENTION LED TO INFRINGEMENT.......................................................................................................... 2 IV.PSYSTAR DOES NOT CREATE ADAPTATIONS OR DERIVATIVE WORKS................................................................................................................................ 3 V. PSYSTAR INCLUDES AN OS X DVD WITH EVERY COMPUTER IT SELLS .................................................................................................................................. 5 VI.PSYSTAR'S PRODUCTION PROCESS AND HARD DRIVE IMAGING ARE ALSO FAIR USE ........................................................................................................ 6 VII. ................................................................................................................................. 6 VIII. COPYRIGHT MISUSE.................................................................................................. 7 IX.MOOTNESS....................................................................................................................... 13 A. Disgorgement Is Not A Remedy For Breach Of Contract. .......................................... 13 B. Any Injunction Should Be Limited To Leopard........................................................... 14 PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) ii Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page3 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Ex. A Ex. B Ex. C TABLE OF EXHIBITS Deposition of Simon Patience Deposition of Michael Culbert Deposition of Robert Mansfield PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) iii Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page4 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 I. PSYSTAR OWNS THE COPIES OF OS X THAT IT BUYS Apple admits that Psystar owns the copies of OS X that it buys. In discussing the SLA provision that says "[y]ou own the media on which the Apple software is recorded" in its response brief, Apple writes: "The plain meaning of this phrase is that Psystar owns only the disk, not the software written upon it." R. at 8. This is correct. Psystar does not claim to own OS X. Psystar only claims to own a copy of OS X, which the Copyright Act defines as a physical object on which OS X is recorded. When Apple agreed that "Psystar owns . . . the disk," R. at 8, Apple thereby conceded that Psystar is the owner of copies of OS X for purposes of applying §§ 109 and 117. II. THE ENTIRELY UNREMARKABLE PRINCIPLE THAT 'USES' THAT VIOLATE A LICENSE AGREEMENT CONSTITUTE COPYRIGHT INFRINGEMENT ONLY WHEN THOSE USES WOULD INFRINGE IN THE ABSENCE OF ANY LICENSE AGREEMENT AT ALL The Federal Circuit in StorageTek considered whether a breach of a copyright license agreement could give rise to a claim for copyright infringement. That court held that a breach of a license agreement could only give rise to a claim for copyright infringement if the act that was the breach of the agreement was, itself, without regard to the license agreement, an infringement: StorageTek's argument conflates a claim based on copyright infringement and an action based on breach of contract. To succeed in a copyright action, [1] "the copying must be beyond the scope of a license possessed by the defendant," and [2] the source of the copyright owner's complaint must be grounded in a right protected by the Copyright Act, such as unlawful reproduction or distribution. See 17 U.S.C. § 106. In contrast, the rights granted by contract can be much broader. As an example, consider a license in which the copyright owner grants a person the right to make one and only one copy of a book with the caveat that the licensee may not read the last ten pages. Obviously, a licensee who made a hundred copies of the book would be liable for copyright infringement because the copying would violate the Copyright Act's prohibition on reproduction and would exceed the scope of the license. Alternatively, if the licensee made a single copy of the book, but read the last ten pages, the only cause of action would be for breach of contract, because reading a work does not violate any right protected by copyright law. Storage Technology Corp. v. Custom Hardware Engineering & Consulting, Inc. 421 F.3d 1307, 1315­ 16 (Fed. Cir. 2005) (internal citations omitted) (emphasis added). If the act that was the breach would not independently be an infringement, then the breach is a breach of contract and nothing more. This reflects the "entirely unremarkable principle" that "'uses' that violate a license agreement constitute PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 1 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page5 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 copyright infringement only when those uses would infringe in the absence of any license agreement at all." Id. at 1316; see also Sun Microsystems, Inc. v. Microsoft Corp., 188 F.3d 1115, 1121 (9th Cir. 1999). III. APPLE DOES NOT HAVE AN ACTIONABLE DMCA CLAIM BECAUSE APPLE CANNOT SHOW THAT CIRCUMVENTION LED TO INFRINGEMENT Circumvention is only actionable under the DMCA if the circumvention leads to an infringing activity. Circumventing in order to commit copyright infringement violate the DMCA, while circumventing in order to exercise one's rights under the Copyright Act or a copyright license does not violate the DMCA. Apple denies that copyright infringement is an element of a DMCA anti-circumvention claim in its response, R. at 19, but this is simply incorrect. In Facebook, Inc. v. Power Ventures, Inc., this Court clearly held that "infringement because of the circumvention" is an element of a DMCA anti-circumvention claim. No. C-08-5780-JF-RS, 2009 WL 1299698 at *5 (N.D. Cal. 2009). This rule applies even when the circumvention is to exercise a right granted by § 117. In Storage Technology, the Federal Circuit concluded that "CHE's conduct appears to fall within the safe harbor of 17 U.S.C. § 117" and that, therefore, there could be no DMCA anticircumvention claim: We held above that it is unlikely StorageTek will succeed on the merits of its copyright claim. To the extent that CHE's activities do not constitute copyright infringement or facilitate copyright infringement, StorageTek is foreclosed from maintaining an action under the DMCA. See Chamberlain, 381 F.3d at 1202. Storage Technology, 421 F.2d at 1318. Apple cannot show that Psystar's circumvention of the Apple-encrypted binaries led to infringement. And running OS X is the core of what § 117 protects. The DVD-CSS cases that Apple cites are all inapposite because there is no right to copy a DVD containing a movie, but there is a right to run a PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 2 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page6 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 copy of a computer program that you own. Because of that right, the right granted by § 117, the circumvention in this case is not circumvention that leads to infringement. The alleged infringements that Apple spends most of its pages complaining about -- the imaging process for installing OS X on Psystar computers, the installation of Psystar's software on Psystar computers in addition to OS X, and the sale of Psystar computers to end users -- all have nothing to do with circumvention. Circumvention occurs only in order to run OS X, and this is protected by § 117. IV. PSYSTAR DOES NOT CREATE ADAPTATIONS OR DERIVATIVE WORKS Apple contends that Psystar creates adaptations and derivative works when it installs its own software -- the Psystar boot loader and kernel extensions, now sold separately as Rebel EFI -- in addition to OS X on Psystar computers. This contention is unpersuasive because, by installing its own software in addition to OS X, Psystar is simply combining two interoperable pieces of software, not modifying OS X to create a kind of "OS Eleven." If what Psystar does is the creation of a derivative work, then users create derivative works all the time. For example, if Apple's view is the law, it creates a derivative work for me to install Microsoft Word, replace Apple's Safari web browser with Google's Chrome or Mozilla's Firefox, or use a digital camera that installs its own drivers (kernel extensions). The Ninth Circuit rejected Apple's view of the world for precisely this reason in Lewis Galoob Toys. Galoob made a device, the Game Genie, that, when combined with Nintendo video games, modified the resulting games. For example, Game Genie could give players extra "lives" in the game, or speed them up, or give them special powers. Nintendo argued that, by doing this, the Game Genie was creating derivative works of the games on which it was operating. The Ninth Circuit rejected this argument, distinguishing the combination of interoperable programs from the modification of a program to create a derivative work: [T]echnology often advances by improvement rather than replacement. Some time ago, for example, computer companies began marketing spell-checkers that operate within existing word processors by signaling the writer when a word is misspelled. PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 3 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page7 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 These applications, as well as countless others, could not be produced and marketed if courts were to conclude that the word processor and spell-checker combination is a derivative work based on the word processor alone. The Game Genie is useless by itself, it can only enhance, and cannot duplicate or recast, a Nintendo game's output. It does not contain or produce a Nintendo game's output in some concrete or permanent form, nor does it supplant demand for Nintendo game cartridges. Such innovations rarely will constitute infringing derivative works under the Copyright Act. Lewis Galoob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965, 969 (9th Cir. 1992). Combining computer programs that work together cannot possibly create derivative works because otherwise, to put it starkly, everyone would need a license from everyone -- and innovators like Psystar, that are no one when they start out, won't ever get the licenses they need. Apple's rule would "chill innovation and fail to 'protect society's competing interest in the free flow of ideas, information, and commerce'". Lewis Galoob, 964 F.2d 965, 969. Psystar's software has all the attributes identified by the Ninth Circuit in holding that the Game Genie did not create derivative works: Psystar's software is useless by itself; does not contain or produce OS X's output in some concrete or permanent form; and does not supplant demand for OS X. Indeed, Psystar's kernel extensions can only increase demand for OS X. (Psystar's software reduces demand for Apple hardware, which is why this case is here, but that, of course, is not a right protected by copyright.) Like the spell-checker that interoperates with the word processor, Psystar's software does not create a new derivative work of OS X. Psystar's software simply interoperates with OS X to extend the range of machines on which an end user can run OS X under § 117. If the word processor and the spellchecker, operating together, do not transform the spellchecker into a derivative work of the word processor (or vice versa), then certainly the files stored on disk that contain the software code for the word processor and spellchecker also do not form a derivative work. Similarly, the files that make up the software distribution from Psystar do not somehow merge with OS X to form a new derivative work incorporating OS X. Psystar's kernel extensions and OS X are two separate works that coexist on the computer and that interoperate when PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 4 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page8 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 they run, just like the word processor and spellchecker. Further, Psystar's kernel extensions are not adaptations under § 117, since Psystar makes no modifications to OS X and, having no access to the source code of OS X, could not have made any such modifications. This means that a Psystar computer, which contains unmodified OS X plus Psystar's own software, can be transferred in accord with § 117(b) without the authorization of Apple. Under the Copyright Act: Any exact copies prepared in accordance with the provisions of § 117(b) may be leased, sold, or otherwise transferred, along with the copy from which such copies were prepared, only as part of the lease, sale, or other transfer of all rights in the program. Adaptations so prepared may be transferred only with the authorization of the copyright owner. 17 U.S.C. § 117(b) (emphasis added). Psystar sells OS X unmodified and installed on a hard drive, with its own software included and ready to load at runtime. Along with the copy of OS X installed on the hard drive, Psystar transfers an original DVD of OS X purchased from a retailer. Since only permanent adaptations, such as a modification of the original program code, entail a restriction on transfer, Psystar is entitled to transfer the original DVD and all § 117 prepared copies as long as it transfers all rights in the software, which it does. If Apple's view of the law were correct, one could never sell a used computer with more than one piece of software installed because the two pieces of software would somehow be "adaptations" of each other, barring resale under § 117. V. PSYSTAR INCLUDES AN OS X DVD WITH EVERY COMPUTER IT SELLS Apple makes the unfounded allegation in its response that Psystar does not buy one copy of OS X for every computer it sells. This is flatly inconsistent with Apple's own motion for summary judgment, in which Apple wrote: "As a result, Psystar actually transfers two copies of Mac OS X with every computer it sells. Psystar includes both a Mac OS X DVD . . . and a hard drive copy of Mac OS X on the Psystar computer." Apple M. at 7 (citing Kelly Declaration). This admission binds Apple. Moreover, the allegation that Psystar does not include one copy of OS X with every computer it sells is one that goes to infringement and, hence, one on which Apple has the burden of PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 5 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page9 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 proof. But the only evidence that Apple offers in its response is a declaration of counsel for Apple, Mehrnaz Boroumand Smith (a declaration buried amidst paragraphs of "X is a true and correct copy of X"). R. at 11-12, 12 n.21. Ms. Smith is an undisclosed witness on whom Apple cannot rely to support its response. Ms. Smith's testimony should disqualify her and Townsend & Townsend & Crew as counsel in this case. And her testimony is, anyway, expert testimony from a layman, consisting of summaries of unidentified Psystar financial documents. VI. PSYSTAR'S PRODUCTION PROCESS AND HARD DRIVE IMAGING ARE ALSO FAIR USE The Ninth Circuit addressed incidental infringement for efficiency purposes in Wall Data. Such incidental infringement is protected by the fair use doctrine to the extent that the infringement is not part of a greater scheme of infringement: To be clear, we do not hold that a fair use defense is not available simply because the infringer uses technology to make efficient use of its licenses. The problematic aspect of the Sheriff's Department's use is that it took in excess of what it bargained for, not that it was technologically efficient. Thus, for example, if the Sheriff's Department had saved time and money by hard drive imaging RUMBA software onto the number of computers for which it had licenses, its `efficiency' would not create a problem. Wall Data Inc. v. Los Angeles County Sheriff's Dep't, 447 F.3d 769, 779 n.6 (9th Cir. 2006). (emphasis added). Everything Psystar does can be done by loading each computer individually, as a single user would if they bought a copy of OS X and decided to convert their PC into an OS X machine. The production process that excites Apple so much, detailed with pictures and descriptions of the three "unauthorized" copies, changes not an iota the balance of legal rights. If Psystar is in its rights to do what it does on a single machine with hand installation of the software, its incorporation of efficient production techniques should not change the legal outcome. Apple gets paid the same amount in either scenario, and the customer receives the same machine. VII. PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 6 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page10 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 VIII. COPYRIGHT MISUSE Judge Hand in Reiss v. National Quotation Bureau held that "spontaneous ejaculations" of words that express "nothing" are copyrightable. 276 F. 717, 718 (D.C.N.Y. 1921). The corollary of Hand's analysis is that functional elements like a decryption key, which is essentially a very large number with no semantic meaning, do not become protected merely because the number is expressed in ASCII code as an intelligible fragment of writing. See Lexmark Int'l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 536, 544 (6th Cir. 2004) ("[A] poem in the abstract could be copyrightable. But that does not mean that the poem receives copyright protection when it is used in the context of a lock-out code."). What matters is the function (is it creative expression, in which case copyright protection applies, or functional use, in which case there is no copyright protection), not the form. The CONTU report stated that material that is essential to accomplishing a task can be copied without liability for copyright infringement: In the computer context this means that when specific instructions, even though previously copyrighted, are the only and essential means of accomplishing a given task, their later use by another will not amount to an infringement. CONTU Report at 20. Apple misused its copyrights by using them to assert exclusive rights that go beyond the exclusive rights granted by the Copyright Act. See, e.g., A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1026 (9th Cir. 2001) ("The defense of copyright misuse forbids a copyright holder from securing an exclusive right or limited monopoly not granted by the Copyright Office.") (internal brackets and quotation marks omitted) (collecting cases); Lasercomb America, Inc. v. Reynolds, 911 F.2d 970, 976­77 (4th Cir. 1990) (seminal case). In particular, Apple misused its copyrights by PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 7 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page11 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 asserting copyright-infringement claims that attempt to expand Apple's exclusive rights over copying, distribution, and the creation of derivative works to include an exclusive right that customers run OS X only on a specific brand of personal computers, namely, Apple Macintoshes. The Copyright Act no more grants Apple an exclusive right to control what kind of computer a customer uses than it grants Simon & Schuster the right to control where I read my copy of War and Peace. The assertion of even otherwise valid copyright claims for the purpose of protecting an exclusive right not granted by the Copyright Act is precisely what copyright misuse prevents. The Ninth Circuit applied this rule in Practice Management: "Conditioning the license on HCFA's promise not to use competitors' products constituted a misuse of the copyright by the AMA." Practice Management Information Corp. v. American Medical Ass'n, 121 F.3d 516, 520­21 (9th Cir. 1997). This was because the Copyright Act gave the AMA no right to exclusivity. The same reasoning applies in the case at bar. Apple's exclusive rights in OS X extend to copying, distribution, and the creation of derivative works. But they do not extend to control over the computers on which Apple's customers run OS X. That is simply not a right that the Copyright Act grants. In a case on point, the Fifth Circuit held that it was misuse for the author of an operating system to require that customers use the operating system only on the author's hardware: DGI reasons that, as DSC's software is licensed to customers to be used only in conjunction with DSC-manufactured hardware, DSC indirectly seeks to obtain patentlike protection of its hardware -- its microprocessor card -- through the enforcement of its software copyright. . . . We agree with the DSC I panel's conjecture and the jury's finding that DSC's licensing agreement for its operating system constitutes misuse. . . . A reasonable juror could conclude, based on the licensing agreement, that DSC has used its copyrights to indirectly gain commercial control over products DSC does not have copyrighted,' namely, its microprocessor cards. Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772, 793 (5th Cir. 1999). Apple does exactly the same thing here: "[Apple's operating system] is licensed to customers to be used only in connection with [Apple]-manufactured hardware." Id. For the same reasons, this "licensing agreement for its operating system constitutes misuse." Id. PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 8 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page12 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 9 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page13 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 the plaintiff asserted baseless claims in order to "intimidate[] [the defendant] from using (1) noncopyrightable fact works such as medical records and (2) works to which Defendants did not own or control copyrights." 515 F. Supp. 2d 1068, 1080­81 (N.D. Cal. 2007). And, as with all forms of copyright misuse, misuse by the assertion of baseless infringement claims bars any enforcement of the copyright, even if other infringement claims would otherwise be valid. "When a copyright holder attempts to use legal proceedings to protect an improper extension of a copyright, the court may refuse to enforce the copyright." qad, inc. v. ALN Associates, Inc., 770 F. Supp. 1261, 1266­67 (N.D. Ill. 1991). Again and again in this litigation, Apple has asserted baseless infringement claims. For example: (1) Apple asserted that Psystar did not own the copies of OS X that it bought, even though Apple admits that Psystar owns the so-called retail DVD's containing OS X, which the Copyright Act defines as "copies" of OS X; (2) Apple asserted that Psystar and its end users infringe by running OS X on their computers, when § 117 of the Copyright Act expressly grants purchasers the right to run a purchased copy of a computer program on the their computers; (3) Apple asserted that PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 10 Because that contract term is a contract right only, and not a right granted by the Copyright Act, this constitutes copyright misuse. It was also misuse for Apple to assert superficially plausible but ultimately unfounded copyright claims in litigation in an attempt to intimidate Psystar into leaving the market. In Shloss v. Sweeney, this Court held that it was misuse to even threaten copyright-infringement litigation when Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page14 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Psystar was somehow infringing by reselling copies of OS X that it bought from Apple and thirdparty resellers, when §§ 109 and 117 of the Copyright Act expressly permits such resale; and (4) Apple asserted that copyright infringement is not a predicate for a DMCA violation, when the law is clear that infringement is an element and there was even a case from this Court directly on point. Whether or not this Court believes that some details of Psystar's process, like the use of the imaging station or the incidental renaming of some Apple kernel extensions during the installation of Psystar's software, present close questions, it is clear that many of the infringement claims that Apple asserted are simply baseless. The question is unavoidable why Apple chose to pursue copyright-infringement claims in this motion for summary judgment rather than the breach-of-contract claims on which liability is so clear. And the answer is that Apple stretched to assert copyright infringement because, by its own decision, in violation of the discovery rules, to refuse to testify about profit margins, Apple foreclosed any actual damages. Apple asserted baseless infringement claims in an attempt to intimidate Psystar with the threat of millions of dollars in statutory damages. It is the possibility that threats like this will scare defendants into submission -- look how rarely these issues come to judgment, much less the Courts of Appeal -- that makes it proper to punish baseless infringement claims not merely by denying them, but by refusing to enforce the underlying copyright altogether. As Judge Posner puts it for the Seventh Circuit: The argument for applying copyright misuse beyond the bounds of antitrust, besides the fact that confined to antitrust the doctrine would be redundant, is that for a copyright owner to use an infringement suit to obtain property protection, here in data, that copyright law clearly does not confer, hoping to force a settlement or even achieve an outright victory over an opponent that may lack the resources or the legal sophistication to resist effectively, is an abuse of process. Assessment Technologies of WI, LLC v. WIREdata, Inc., 350 F.3d 640, 647 (7th Cir. 2003) (emphasis added). Apple is free to contract for the right to restrict use of OS X to Apple Macintoshes. It did, in fact, contract for this right. And it is free to enforce its contract by a claim PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 11 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page15 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 for breach of contract on which it can obtain contract remedies. See id. at 646 (distinguishing contract rights from copyright rights). But it is misuse for Apple to attempt to convert that contract claim into a claim for infringement and thereby gain the right to punitive statutory damages. Apple completely failed to respond to these arguments in its opposition brief. The first paragraph of the section on misuse argues that Psystar has failed to establish an antitrust claim. R. at 17. But misuse is not antitrust. As the Ninth Circuit explained in rejecting Apple's argument: The AMA argues the copyright misuse defense fails because Practice Management did not establish an antitrust violation. We agree with the Fourth Circuit that a defendant in a copyright infringement suit need not prove an antitrust violation to prevail on a copyright misuse defense. Practice Management, 121 F.3d at 521 (emphasis added). As the Fourth Circuit put it in the seminal case on point, the question is whether the copyright owner is using copyrights to protect that which the Copyright Act does not protect. An owner can commit misuse by violating the antitrust laws, but can also commit misuse in other ways: So while it is true that the attempted use of a copyright to violate antitrust law probably would give rise to a misuse of copyright defense, the converse is not necessarily true -- a misuse need not be a violation of antitrust law in order to comprise an equitable defense to an infringement action. The question is not whether the copyright is being used in a manner violative of antitrust law (such as whether the licensing agreement is "reasonable"), but whether the copyright is being used in a manner violative of the public policy embodied in the grant of a copyright. Lasercomb, 911 F.2d at 978 (emphasis added). Apple then quotes this Court's statement that, "Apple asks its customers to purchase Mac OS knowing that it is to be used only with Apple computers. It is certainly entitled to do so." R. at 17. This is true, but irrelevant to the present motions. Apple can contract with its customers to run OS X only on Apple Macintoshes. It can enforce these contracts by suing for breach of contract and receiving contract remedies. But it cannot use its contract to convert what is not infringement into infringement. Its attempt to do so constitutes copyright misuse. The rest of Apple's argument is a claim that all its infringement allegations are valid and a giant string cite (with the best cases for Psystar relegated to a footnote) that attempts, in PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 12 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page16 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 parentheticals, to distinguish the misuse cases discussed. R. at 17­18, 17 n.29. Apple does not seem to understand that, if it has maintained baseless infringement claims, as it undoubtedly has, then even its arguably valid infringement claims will be barred by misuse. See Shloss, 515 F. Supp. 2d at 1080­81; qad, 770 F. Supp. at 1266­67; Assessment Technologies, 350 F.2d at 647. And even if Apple's claims are valid, if Apple has asserted them in order to secure an exclusive right not granted by the Copyright Act, such as the exclusive right to provide the hardware on which users use OS X, Apple's claims will be barred by misuse. See Practice Management, 121 F.3d at 520­21; Alcatel, 166 F.3d at 793. Apple's complete failure to effectively address copyright misuse is fatal to its case. IX. MOOTNESS A. Disgorgement Is Not A Remedy For Breach Of Contract. Apple responds to the argument that its damages claims are moot by arguing that California law allows disgorgement as a remedy for breach of contract. It does not. California law makes disgorgement available only under special circumstances, such as when the contract expressly provides for disgorgement. See, e.g., State ex rel. Bowen v. Bank of America Corp., 126 Cal. App. 4th 225, 242 (2005) ("Defendants . . . respond that whether their obligation was created by a breach of contract or a violation of statute, they would not, in either case, be required to disgorge the reconveyance fees . . . . There is no allegation that any of the contracts provided for the specific remedy of disgorgement . . . . The absence of such allegations is fatal to plaintiff's claim."). In an unpublished decision, the Ninth Circuit held that an amendment to add an unfairbusiness-practices claim to a case in which the plaintiff asserted only breach of contract would be prejudicial precisely because such a claim, unlike a claim for breach of contract, might lead to the remedy of disgorgement: Richmond argues that Alliance was not prejudiced by the delay in asserting the new claim. We disagree. The new claim would substantially change the lawsuit. If the new claim were added, instead of a simple breach of contract claim, this case would allege a much broader claim for unfair business practices, where an injunction and disgorgement of profits would be the remedy. PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 13 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page17 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Richmond v. Allianz Life Ins. Co., No. 97-56059, 1999 WL 96499 at *1 (9th Cir. 1999) (unpublished) (emphasis added); Watson Laboratories, Inc. v. Rhone-Poulenc Rorer, Inc., No. CV99-7947-AHM, 2001 WL 1673258 at *1 (C.D. Cal. 2001) ("with the issue now squarely before it, the Court concludes that Watson is not entitled to the `disgorgement' of Cardizem profits as a remedy for breach of contract"). Apple's cases relate not to breach of contract simpliciter, but to breach of contract coupled with a claim for trade-secret misappropriation. See Ajaxo Inc. v. E*Trade Group, Inc., 135 Cal. App. 4th 21, 56­57 (2005) (breach of a non-disclosure agreement); Martone v. Burgess, No. C-08-2379CW, 2008 WL 3916022 at *4 (N.D. Cal. 2008) (misappropriation claim; discusses restitution (return of moneys paid) not disgorgement (transfer of profits)); Foster Poultry Farms, Inc. v. Suntrust Bank, No. 1:4-cv-5513-OWW-SMS, 2008 WL 160960 at *49 (E.D. Cal. 2008) ("disgorgement of improperly obtained profits is a remedy for breach of a contract protecting trade secrets and proprietary confidential information") (emphasis added). Foster goes on to use the example of a disgorgement as a remedy for breach of fiduciary duty. 2008 WL 160960 at *50. There is no suggestion in these cases that disgorgement is available for ordinary breaches of contract. B. Any Injunction Should Be Limited To Leopard. Apple is correct that injunctions in a copyright case should be broad enough to prevent the defendant not only from doing what the defendant did, but also from doing what the defendant did in a different way. But Apple takes this principle to a new and unsupported extreme when it suggests an injunction that would apply to all Apple software, whether or not the subject of this case, whether or not covered by the parallel litigation in Florida, and whether now existing or hereafter created. See Chicago Board of Education v. Substance, Inc., 354 F.3d 624, 632 (7th Cir. 2003) ("The inclusion in the injunction of all other examinations that the school board may someday create . . . is overborad."); Nihon Keizai Shimbun, Inc. v. Comline Business Data, Inc., 166 F.3d 65, 74­75 (2d PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 14 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page18 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Cir. 1999) (limiting injunction to copyrightable parts of works in question); Princeton University Press v. Michigan Document Services, Inc., 99 F.3d 1381, 1397 (6th Cir. 1996) ("In sum, the injunction imposed here -- an injunction that provides blanket copyright protection for all the works of a given publisher without regard to the limitations on copyright protection -- is overbroad."). Each of Apple's products and each of Psystar's products are different. Each must be considered on its own facts. For example, Psystar now offers the software that it installs on Psystar computers to allow OS X to run on those computers as a separate product called Rebel EFI. End users can download Rebel EFI to run OS X on their own computers, whether or not those computers are purchased from Psystar. Rebel EFI presents whole new factual and legal questions. An injunction in this case that simply applies to all Apple software would be grossly overbroad as applied to new products like Rebel EFI. This is not a case about Apple's "integrated business model" as a whole; it is a case about Psystar's alleged infringement of OS X Leopard. An injunction going beyond OS X Leopard would be particularly inappropriate in this case because it would invade the jurisdiction of the United States District Court for the Southern District of Florida, where the legality of several new Psystar products is presently being litigated. See City of San Marcos v. International & G.N. Ry. Co., 167 S.W. 292, 293 (Tex. App. 1914) ("The effect of an injunction by the district court is to invade the jurisdiction of the justice and county courts, and to deny them the right to try causes triable in said courts under the Constitution and laws of this state."). Apple decided to make this case about OS X Leopard. But there is no need to restrain infringement of OS X Leopard because Psystar (and Apple) stopped selling OS X Leopard when Snow Leopard came out. Denial of an injunction would not result in a compulsory license because, again, Psystar does not sell OS X Leopard anymore. Leopard is not associated with any supposed "poor quality" of Psystar's products, because Psystar sells no products that use OS X Leopard. In short, Apple cannot enjoin an activity in which Psystar is no longer engaged. PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 15 Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page19 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 16 Dated: October 28, 2009 Respectfully submitted, CAMARA & SIBLEY LLP By: /s/ K.A.D. Camara____________________________ K.A.D. Camara Attorneys for Defendant / Counterclaimant Psystar Corporation Case3:08-cv-03251-WHA Document204 Filed10/30/09 Page20 of 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 CERTIFICATE OF SERVICE I, Michael Wilson, declare I am employed in the City of Houston and County of Harris, Texas in the office of Camara & Sibley. I am over the age of eighteen and not a party to this action. My business address is Camara & Sibley, 2339 University Boulevard, Houston, Texas 77005. I served the following document(s): PSYSTAR'S REPLY IN SUPPORT OF PSYSTAR'S MOTION FOR SUMMARY JUDGMENT Case No. CV 08-03251 WHA on the interested parties in this action by placing a true and correct copy thereof, on the above date, enclosed in a sealed envelope, following the ordinary business practice of Camara & Sibley LLP. I sent the document(s) to the following: James G. Gilliland, Jr. TOWNSEND AND TOWNSEND AND CREW LLP Two Embarcadero Center, 8th Floor San Francisco, California 94111 Telephone: (415) 576-0200 Facsimile: (415) 576-0300 email: jggilliland@townsend.com [By First Class Mail] I am readily familiar with my employer's practice for collecting and processing documents for mailing with the United States Postal Service. On the date listed herein, following ordinary business practice, I served the within document(s) at my place of business, by placing a true copy thereof, enclosed in a sealed envelope, with postage thereon fully prepaid, for collection and mailing with the United States Postal Service where it would be deposited with the United States Postal Service that same day in the ordinary course of business. [By Overnight Courier] I caused each envelope to be delivered by a commercial carrier service for overnight delivery to the offices of the addressee(s). [By Hand] I directed each envelope to the party(ies) so designated on the service list to be delivered by courier this date. [By Facsimile Transmission] I caused said document to be sent by facsimile transmission to the fax number indicated for the party(ies) listed above. [By Electronic Transmission] I caused said document to be sent by electronic transmission to the e-mail address indicated for the party(ies) listed above via the court's ECF notification system. I declare under penalty of perjury under the laws of the United States of America that the foregoing is true and correct, and that this declaration was executed on October 28, 2009 at Houston, Texas. /s/ Michael Wilson Michael Wilson PSYSTAR'S REPLY IN SUPPORT OF ITS MOTION FOR SUMMARY JUDGMENT (CV 08-03251 WHA) 17

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?