CSS, Inc. v. Herrington et al
Filing
209
MEMORANDUM OPINION AND ORDER denying Plaintiff's 65 MOTION for Preliminary Injunction. Signed by Judge Joseph R. Goodwin on 8/1/2017. (cc: attys; any unrepresented party) (tmr)
IN THE UNITED STATES DISTRICT COURT
FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA
CHARLESTON DIVISION
CSS, INC.,
Plaintiff,
v.
CIVIL ACTION NO.
2:16-cv-01762
CHRISTOPHER HERRINGTON, et al.,
Defendants.
MEMORANDUM OPINION AND ORDER
Pending before the court is Plaintiff’s Motion for Preliminary Injunction
[ECF No. 65]. For the following reasons, the Motion is DENIED.
I.
Background
The plaintiff, CSS, Inc. (“CSS”), has asked the court to preliminarily enjoin
defendants, Christopher Herrington, Gene Yoho, and Compiled Technologies, LLC
(collectively, “CT”), from “advertis[ing], licens[ing], offer[ing] to license, sell[ing] or
otherwise mak[ing] available for use” CT’s land indexing and estate management
software; “offer[ing] or . . . provid[ing] support services” for CSS’s software; or
“mak[ing] use of any trade secrets, confidential information or proprietary
information of CSS.” Pl.’s Mot. Prelim. Inj. 1 [ECF No. 65]. However, CSS is unable
to show a likelihood of success on any of the claims presently before the court, that
irreparable harm will occur absent the injunction, that the balance of the hardships
weighs in its favor, nor that an injunction is in the public interest. Thus, a
preliminary injunction is not warranted.
II.
Procedural History
CSS filed its Complaint [ECF No. 1] on February 23, 2016. On September 16,
2016, CSS filed its First Amended Complaint. First Am. Compl. [ECF No. 59]. CSS
brings actions against CT for copyright infringement, breach of contract, violation of
the duty of loyalty, tortious interference with business relationships, and
misappropriation of trade secrets under the West Virginia Uniform Trade Secrets Act
(“WVUSTA”). In their Answer, CT filed a counterclaim against CSS for tortious
interference. Answer 11 [ECF No. 61].
On November 23, 2016, CSS filed Plaintiff’s Motion for Preliminary Injunction
wherein it asserted that it was likely to succeed on its copyright infringement,
misappropriation of trade secrets claims, and breach of contract. Pl.’s Mot. Prelim.
Inj. [ECF No. 65]. CT responded on December 13, 2016. Defs. Mem. Opp. Pls. Mot.
Prelim. Inj. [ECF No. 68]. On December 16, 2016, CSS moved for an extension of time
to reply to the defendants’ response. Unopposed Mot. for Extension of Time to File a
Reply to Defs. Mem. Opp. Pls. Mot. Prelim. [ECF No. 72]. I granted this Motion
[ECF No. 73], and CSS filed a Reply Brief [ECF No. 74] on December 29, 2016.
On January 25, 2017, the court conducted a hearing on the Plaintiff’s Motion
for Preliminary Injunction. Prelim. Inj. Mot. Hr’g [ECF No. 82]. Because of the
volume and length of evidence put forth, the hearing could not be completed in one
afternoon. This matter was continued to February 23, 2017, and it was ultimately
completed on February 24, 2017. See Order Continuing Prelim. Inj. Hr’g
2
[ECF No. 84]; Mot. Hr’gs [ECF Nos. 89, 90]. On March 22, 2017, both parties filed
their proposed findings of fact and conclusions of law. [ECF Nos. 106, 109, 110]. CSS’s
Motion is ripe for my review.
III.
Findings of Fact
I need only make findings of fact pertinent to determining whether a preliminarily
injunction should issue. I FIND that the facts of this case are as follows:
1. CSS is a company that provides software and related support services to local
government entities, namely county clerks in West Virginia. See Hr’g Tr., Jan.
25, 2017, Auburn Direct, 28:1–9.
2. CSS has been in business since 1983. See Hr’g Tr., Feb. 23, 2017, D. Herrington
Direct, 105:11.
3. Kofile acquired CSS in May 2014. See Hr’g Tr., Jan. 25, 2017, Auburn Direct,
39:18–19.
4. For over twenty years, CSS has provided various software solutions including:
a land records indexing package, an estate management package as well as
utility billing, sheriff’s tax collection, and other applications. See Hr’g Tr., Jan.
25, 2017, Auburn Direct, 28:1–4.
5. Defendant Christopher Herrington was first employed by CSS in October 1991.
See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct, 157:8–12, 190:14–15.
6. Christopher Herrington worked at CSS in the computer software, applications,
and programming business related to county government information and
document management systems. See Hr’g Tr., Feb. 23, 2017, C. Herrington
3
Direct, 157:8–12; see also Hr’g Tr., Jan. 25, 2017, Auburn Direct, 42:10–13.
7. During most of his employment with CSS, Christopher Herrington was a
programmer, and his work included development of CSS’s software, bug fixes,
and modifications. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 14:14–23, 16:22–
17:5.
8. Christopher Herrington also provided support for CSS software packages. Id.
at 15:13–23.
9. Christopher Herrington’s duties included programming responsibilities and
support responsibilities for both the CSS land indexing software and the CSS
estate management software. Id. at 16:2–9.
10. On August 23, 2014, Christopher Herrington resigned as an employee of CSS.
See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct, 190:14–15.
11. On September 6, 2014, Christopher Herrington returned to CSS. See Hr’g Tr.,
Feb. 23, 2017, C. Herrington Direct, 203:22–24.
12. On September 12, 2014, Christopher Herrington was required to sign a
confidentiality agreement. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 44:14–
45:2.
13. CSS had never required Christopher Herrington to sign a confidentiality
agreement prior to September 12, 2014. See Hr’g Tr., Feb. 23, 2017, McCasker
Redirect, 97:6–17; see also Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 239:3–
8.
14. Christopher Herrington was employed by CSS until June 5, 2015. See Hr’g Tr.,
4
Feb. 23, 2017, C. Herrington Direct, 203:22–24.
15. On August 12, 2015, Gene Yoho formed CT. See Hr’g Tr., Feb. 24, 2017,
C. Herrington Direct, 43:19–44:5.
16. Gene Yoho and Christopher Herrington operate CT. See Hr’g Tr., Feb. 24,
2017, C. Herrington Direct, 43:19–44:5.
17. CT is in the business of licensing custom computer software applications. CT
offers one program for land records recording and indexing and one for an
estate management application. See Hr’g Tr., Feb. 24, 2017, C. Herrington
Direct, 44:3–5; see also Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 242:9–11.
18. CT also provides support services to county clerks’ offices related to these
applications. See Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 242:9–11.
19. CT competes with CSS for West Virginia county clerk contracts. See Hr’g Tr.,
Feb. 24, 2017, C. Herrington Direct, 43:19–44:5.
20. CT’s code is not a literal1 copy of CSS’s code. See Mot. by Defs. for Leave to
File Under Seal Ex. 1, at 26 [ECF No. 70-1] (“McCasker Expert Report”); see
also Hr’g Tr., Feb. 23, 2017, McCasker Cross, 9:7–10.
21. The programming language RM/COBOL (“COBOL”) was used in the software
of both CSS and CT. See McCasker Expert Report at 25; see also Mot. by Defs.
for Leave to File Under Seal Ex. 2, at 3 [ECF No. 70-2] (“Zeidman Expert
Report”).
Literal copying is the wholesale copying of the software or its components, while non-literal
copying is “copying that is paraphrased or loosely paraphrased rather than word for word.” Lotus
Dev. Corp. v. Borland Int’l, Inc., 49 F.3d 807, 814 (1st Cir. 1995).
1
5
22. CSS uses COBOL version 11, and CT uses COBOL version 12. See McCasker
Expert Report at 25.
23. CT’s COBOL data files are structured differently than CSS’s COBOL data files.
See Hr’g Tr., Jan. 25, 2017, McCasker Direct, 115:14–15.
24. The parts of CSS’s software relevant to this case consist of the following
architecture and technology: a client application written in the Microsoft
Visual Basic 6 computer language (VB6), a VanGUI Network Communication
Interface Builder (“VanGUI”), TCP (Transmission Control Protocol) Sockets,
an application server with data files written in COBOL, a Relativity Server,
an ODBC (Open Database Connectivity) Interface, and Crystal Reports OCX.
See McCasker Expert Report at 7–9.
25. The parts of CT’s software relevant to this case consist of the following
architecture and technology: a client application written in the C# computer
language (pronounced “C-Sharp”), a Louis Network Communication Interface,
TCP Sockets, an application server with data files written in COBOL, a
Relativity Server, an ODBC Interface, and Crystal Reports. See Hr’g Tr., Feb.
24, 2017, C. Herrington Direct, 9–13.
26. CSS’s software includes third-party components such as VB6, the VanGUI
interface, the COBOL programming language, the Relativity server, and
Crystal Reports. See Zeidman Expert Report at 14–18.
27. The intellectual property rights to the third-party components—VB6, the
VanGUI interface, the COBOL programming language, the Relativity Server,
6
and Crystal Reports—are not owned by any party to this case. See Hr’g Tr.,
Feb. 23, 2017, D. Herrington Cross, 148:21–149:12.
28. The source code was initially provided along with CSS’s software applications
and installed on servers owned by the various West Virginia county clerks’
offices. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:12–18; Defs. Exs.
2, 14 from Prelim. Inj. Mot. Hr’g [ECF Nos. 96-2, 96-13].
29. At some point after 2014, this practice was discontinued, and all of CSS’s
source code was removed from all county servers. See Hr’g Tr., Jan. 25, 2017,
Auburn Direct, 31:1–9, 35:12–18.
30. Source code present on the county servers was available to anyone who had
administrative rights2 authorized by the county. Id. at 31:3–20, 35:15–18.
31. Some of CSS’s contracts with county clerks’ offices did not have any language
requiring the county clerks to protect CSS’s source code on the county servers.
Id.
32. Some of CSS’s contracts with the county clerks’ offices did stipulate that the
county must protect CSS’s source code. Id. at 32:12–22.
33. CSS’s corporate representative, Hubert “Bert” Auburn, does not know how
many of CSS’s contracts required the clerks’ offices to protect CSS’s source
code. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9; 35:15–18.
34. Bert Auburn does not know how many people had access to CSS’s source code.
Id. at 35.
2
This refers to the ability of a person to access the files with an administrative login and password.
7
35. CSS founder, current employee, and father of defendant, Chris Herrington,
Doug Herrington does not know how many people had access to CSS’s source
code. See Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 105:12–13, 106:14–17,
120:13–16, 121:24–122:1.
36. Bert Auburn does not know whether CSS’s source code was passwordprotected. See Auburn Direct, 31:1–9; 35:15–18.
37. Bert Auburn is not aware of the source code being identified as confidential
when on the county servers. See Mot. by Defs. for Leave to File Under Seal Ex.
4, at 60:13–18 [ECF No. 70-4] (“Auburn Dep.”).
38. Bert Auburn does not believe that CSS’s source code was encrypted when on
county servers. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 35:1–9.
39. CSS’s source code was neither password protected nor encrypted on the county
servers. See Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 120:21–23; Test. &
Ex. Submission by CSS, Inc., Ex. 1 at 182:20–24 [ECF No. 105-1] (“Lowers
Dep.”).
40. WVNet is a virtual private network that provides access to the county servers.
See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:15–18.
41. WVNet provides all companies with a contract with any county access to all
West Virginia county servers. Id.
42. Anyone who can access WVNet can access any of the West Virginia county
servers. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:15–18.
43. A competitor of CSS with a password for WVNet may have been able to access
8
CSS’s source code. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–20.
44. The password to access the CSS software application was “top gun.” See Hr’g
Tr., Feb. 23, 2017, D. Herrington Cross, 135:3–11; see also Hr’g Tr., Feb. 23,
2017, Smith Direct, 175:20–22.
45. CSS did not enter into confidentiality agreements with the clerks’ offices that
had the “top gun” password. See Hr’g Tr., Feb. 23, 2017, Smith Direct, 17–19.
Hr’g Tr., Feb. 23, 2017, D. Herrington Cross, 136:20–23.
46. CSS would share the “top gun” password with county employees who attended
training sessions. See Hr’g Tr., Feb. 23, 2017, D. Herrington Cross, 136:6–19;
see also Hr’g Tr., Feb. 23, 2017, Smith Direct, 176:9–16.
47. CSS’s contracts with county clerks’ offices are subject to document requests
pursuant to the state freedom of information act. See Hr’g Tr., Jan. 25, 2017,
Auburn Direct, 38.
48. CSS’s pricing information for its county clients is public information. See
Auburn Dep. 166:15–21.
49. CSS bases its pricing structure, in part, on a publically available tax base
classification of counties that is published every two years. Id. at 167:14–15,
166:24–167:8, 179:5–6.
50. Christopher Herrington obtained CSS pricing information by email, face-toface conversations, and phone calls with county clerks. See Hr’g Tr., Feb. 24,
2017, C. Herrington Direct, 41:16–43:1.
51. CSS has some customers in Ohio. See Hr’g Tr. Auburn Direct, 28:9.
9
52. CT has no customers in Ohio. See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct,
241:9–14.
53. CSS has lost contracts to CT. See Hr’g Tr., Jan. 25, 2017, 9:13–18.
IV.
Standard for Obtaining a Preliminary Injunction
To secure a preliminary injunction, “plaintiffs must demonstrate that (1) they
are likely to succeed on the merits; (2) they will likely suffer irreparable harm absent
an injunction; (3) the balance of hardships weighs in their favor; and (4) the injunction
is in the public interest.” League of Women Voters v. North Carolina, 769 F.3d 224,
236 (4th Cir. 2014) (citing Winter v. Nat. Res. Def. Council, Inc., 555 U.S. 7, 20
(2008)). The Fourth Circuit reviews the grant or denial of a preliminary injunction
for abuse of discretion. The Real Truth About Obama, Inc. v. Fed. Election Comm’n,
575 F.2d 342, 346–47 (4th Cir. 2009), vacated on other grounds, 559 U.S. 1089 (2010).
“[A] a preliminary injunction is an extraordinary and drastic remedy, one that should
not be granted unless the movant, by a clear showing, carries the burden of
persuasion.” 11A Charles Alan Wright & Arthur R. Miller, Federal Practice and
Procedure § 2948 (3d. ed. 2017) (footnotes omitted).
The Fourth Circuit permits district courts to rely on hearsay or other
inadmissible evidence when deciding whether a preliminary injunction should be
awarded. G.G. ex rel. Grimm v. Gloucester Cty. Sch. Bd., 822 F.3d 709, 725 (4th Cir.
2016), vacated on other grounds and remanded, 137 S. Ct. 1239 (2017).
10
V.
Conclusions of Law
A. Likelihood of Success on the Merits for the Copyright Claim
In order to show copyright infringement, CSS must prove (1) it owned a valid
copyright and (2) CT copied original elements of the copyright. Humphreys &
Partners Architects, Ltd. P’ship v. Lessard Design, Inc., 790 F.3d 532, 537
(4th Cir. 2015) (citing Lyons P’ship v. Morris Costumes, Inc., 243 F.3d 789, 801 (4th
Cir. 2001)). A valid copyright gives the owner the exclusive right to reproduce the
copyrighted work and prepare derivative works. 17 U.S.C. § 106. Anyone who violates
this exclusive right infringes the owner’s copyright. Id. at § 501(a).
Copyright law protects “original works of authorship fixed in any tangible
medium of expression.” 17 U.S.C. § 102(a). Computer programs are explicitly covered
as “literary works.” 17 U.S.C. § 101; see Atari Games Corp. v. Nintendo of Am., Inc.,
975 F.2d 832, 838 (Fed. Cir. 1992). Courts have also granted copyright protection over
computer source code. See Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d
1222, 1233 (3d Cir. 1986). Copyright protection extends to the “non-literal elements
of computer programs that embody original expression”. Lotus Dev. Corp. v.
Paperback Software Int’l, 740 F. Supp. 37, 76–77 (D. Mass. 1990).
However, copyright analysis in the computer program context is often a
“difficult task.” Oracle Am., Inc. v. Google Inc., 750 F.3d 1339, 1354 (Fed. Cir. 2014);
see Lotus Dev., 49 F.3d at 820 (Boudin, J., concurring) (“Applying copyright law to
computer programs is like assembling a jigsaw puzzle whose pieces do not quite fit.”);
see also Comput. Assocs. Int’l, Inc. v. Altai, Inc., 982 F.2d 693, 696 (2d Cir. 1992) (“In
11
recent years, the growth of computer science has spawned a number of challenging
legal questions, particularly in the field of copyright law. . . . As scientific knowledge
advances, courts endeavor to keep pace, and sometimes—as in the area of computer
technology—they are required to venture into less than familiar waters.”). As the
Second Circuit remarked:
To be frank, the exact contours of copyright protection for non-literal
program structure are not completely clear. We trust that as future
cases are decided, those limits will become better defined. Indeed, it may
well be that the Copyright Act serves as a relatively weak barrier
against public access to the theoretical interstices behind a program’s
source and object codes. This results from the hybrid nature of a
computer program, which, while it is literary expression, is also a highly
functional, utilitarian component in the larger process of computing.
Comput. Assocs. Int’l, 982 F.2d at 712.
The scope of copyright protection, however, is limited in that it does not cover
“any idea, procedure, process, system, method of operation, concept, principle, or
discovery, regardless of the form in which it is described, explained, illustrated, or
embodied in such a work.” Id. at § 102(b); see Mazer v. Stein, 347 U.S. 201, 217 (1954)
(“Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection
is given only to the expression of the idea—not the idea itself.”); see also Feist Publ’ns,
Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 358 (1991); Avtec Sys., Inc. v. Peiffer, 21
F.3d 568, 572 (4th Cir. 1994) (“To reiterate, copyright protects not original ideas but
their incarnation in a tangible means of expression.”).
A work must be “original” to qualify for copyright protection. 17 U.S.C. § 102(a).
This “originality requirement is not particularly stringent,” however. Feist Publ’ns,
499 U.S. at 358. In the copyright context, “original” means “that the work was
12
independently created by the author (as opposed to copied from other works), and
that it possesses at least some minimal degree of creativity.” Id. at 345. The more
creative a work is, the “thicker” the protection is for the work, and “less similarity is
needed for a court to find the similarity sufficiently ‘substantial’ and thus infringing.”
Lydia Pallas Loren, The Pope’s Copyright? Aligning Incentives with Reality by Using
Creative Motivation to Shape Copyright Protection, 69 La. L. Rev. 1, 30 (2008).
Conversely, highly functional, less creative works have “thin” protection, and more
similarity is needed to show infringement. Id.
1. The Test For Copyright Infringement in the Fourth Circuit
CSS is alleging non-literal copyright infringement, which covers “the
structure, sequence, organization, user interface, screen displays, and menu
structures.” Gen. Universal Sys., Inc. v. Lee, 379 F.3d 131, 142 (5th Cir. 2004).
The Fourth Circuit has not yet explicitly endorsed a test for non-literal
copyright infringement for computer source code. Many jurisdictions have now
adopted the Second Circuit’s abstraction-filtration-comparison test (“AFC Test”) to
deal with this particular type of work. 3 Robert W. Harris, A New Ball Game:
Litigating Copyright Infringement for Nonliteral Software Elements, 76 J. Pat. &
Trademark Off. Soc’y 157, 158 (1994) (“After a period of several years in which courts
applied a rather bewildering variety of tests for substantial similarity of software
products in copyright infringement cases, a consensus has recently emerged among
Whether to adopt the AFC Test has previously been raised on appeal, but the Fourth Circuit did
not decide this issue. Comprehensive Techn. Int’l, Inc. v. Software Artisans, Inc ., 3 F.3d 730, 734–35
(4th Cir. 1993).
3
13
the circuits, on the proper approach for analyzing the substantial similarity of
copyright-protectable elements of computer software, which approach was earlier
recommended by the Nimmer copyright treatise.”). The Fifth, Ninth, Tenth, and
Eleventh Circuits apply the AFC Test. See Gen. Universal Sys., 379 F.3d at 142 (“To
assess a claim of software infringement, we have generally endorsed the ‘abstractionfiltration-comparison’ test first outlined by the Second Circuit in Altai and refined by
the Tenth Circuit in Gates Rubber Co. v. Bando Chemical Industries, Ltd.”); Sega
Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510, 1525 (9th Cir.1992) (“In our view, in
light of the essentially utilitarian nature of computer programs, the Second Circuit’s
approach is an appropriate one.”); Gates Rubber Co. v. Bandon Chem. Indus, Ltd., 9
F.3d 823, 833 (10th Cir. 1993); MiTek Holdings, Inc. v. Arce Eng’g Co., 89 F.3d 1548,
1559 (11th Cir. 1996) (“Our circuit, in applying the Altai test, employs the substantial
similarity standard in comparing what remains after the abstraction and filtration
steps . . . .”). The Sixth Circuit uses a similar test, and the First Circuit addressed the
AFC Test in its case of first impression and viewed it favorably.4 Kevin J. Hickey,
Reframing Similarity Analysis in Copyright, 93 Wash. U.L. Rev. 681, 694 (2016); see,
e.g., Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 534 (6th
Cir. 2004); Lotus Dev., 49 F.3d at 815.
The AFC Test “has the major advantage of being entirely consistent with the
infringement calculus used for infringement issues concerning other types of works.
However, the First Circuit ultimately did not rely on the AFC Test because Lotus involved literal
infringement. Lotus Dev., 49 F.3d at 814–15.
4
14
In effect, it is an adaptation of the traditional infringement test to the medium of
computer programs.” Howard B. Abrams, Copying of Protected Expression—
Technology, Functionality and the Ordinary Observer Test—Commentary, 2 The
Law of Copyright § 14:33 (2016). The AFC Test “arose out of the difficulties of
assessing similarity in computer software cases. At its core, the AFC Test is simply a
formalized system to ensure that elements that are not protected by copyright are
excluded when comparing two works.” Hickey, supra, at 694. In essence, the AFC
Test works as follows:
In ascertaining substantial similarity [between two or more programs]
under this approach, a court would first break down the allegedly
infringed program into its constituent structural parts. Then, by
examining each of these parts for such things as incorporated ideas,
expression that is necessarily incidental to those ideas, and elements
that are taken from the public domain, a court would then be able to sift
out all non-protectable material. Left with a kernel, or possibly kernels,
of creative expression after following this process of elimination, the
court’s last step would be to compare this material with the structure of
an allegedly infringing program. The result of this comparison will
determine whether the protectable elements of the programs at issue
are substantially similar so as to warrant a finding of infringement.
Comput. Assocs. Int’l, 982 F.2d at 706.
I will therefore employ the AFC Test to determine substantial similarity for
alleged non-literal copyright infringement of source code.
2. Relevant Background Information
Given the complexity of this type of copyright infringement analysis, some
background information is helpful. In this case, both CSS and CT’s programs have
client/server architecture. Client/server describes “a program relationship in which
the client requests a service or resource from the server.” Zeidman Expert Report, Ex.
15
J at 1. Both parties’ programs are client/server applications, meaning that there is a
“front end” or “client side” and a “back end” or “server” side. Id.; McCasker Expert
Report at 7, 9.
The three coding languages used in this case are COBOL, VB6, and C#. The
server sides of both CSS and CT are written in COBOL. The client side of CSS is
written in VB6, and the client side of CT is written in C#. COBOL is “exclusively
owned, developed and maintained by Micro Focus.” Defs. Mem. Opp. Pls. Mot. Prelim.
Inj., Ex. 9, at 2 [ECF 68-9] (“Letter from Courtney Wood, Associate General Counsel
for Micro Focus”).
This case also involves several third-party applications: Relativity, VanGUI,
Louis, and Crystal Reports. Relativity is a data-access middleware product,
specifically it is an ODBC-accessible relational database management system. Defs.
Mem. Opp. Pls. Mot. Prelim. Inj., Ex. 9, at 4–5 [ECF 68-9]. It improves access to
COBOL data. Relativity is a COBOL-specific database engine/driver that is
“exclusively owned, developed and maintained by Micro Focus.” 5 Letter from
Courtney Wood, Associate General Counsel for Micro Focus 2. VanGUI is a
communication middleware that allows application programs written in COBOL to
be combined with graphical user interface (GUI) front-ends written in programming
languages that support VB6. Defs. Mem. Opp. Pls. Mot. Prelim. Inj., Ex. 9 at 6–7
[ECF 68-9]. VanGUI is “a way to modernize COBOL applications.” Id. at 1; Zeidman
Liant acquired the rights to use and market Louis with its RM/COBOL and other COBOL products
prior to its acquisition by Micro Focus in 2008.
5
16
Expert Report at 18. Louis is an interface builder that works in conjunction with
COBOL platforms and products and GUIs. Louis is “exclusively owned, developed
and maintained by Micro Focus.” Letter from Courtney Wood, Associate General
Counsel for Micro Focus 2. Crystal Reports is a business intelligence application that
helps generate reports. Zeidman Expert Report, Ex. H at 2.
3. CSS has Valid Copyrights
A certificate of copyright registration is prima facie evidence of ownership of a
valid copyright. 17 U.S.C. § 410(c); Serv. & Training, Inc. v. Data Gen. Corp., 963
F.2d 680, 688 (4th Cir. 1992). CSS is the registered owner of three copyrights in
computer software code: Document Indexing and Imaging for Counties 2015 (TX 8230-758), Estate Management 2015 (TX 8-230-809), and Web Inquiry 2013 (TX 8-230816). CT did not dispute the validity of the copyrights in its Response to CSS’s motion.
The defendants did not introduce evidence calling the validity of the copyright
into question.6 If CT had wished to dispute validity at the hearing, it would have had
the “burden of overcoming the presumption [of validity] arising out of the granting of
the copyright by the Copyright Office.” M. Kramer Mfg. Co. v. Andrews, 783 F.2d 421,
434 (4th Cir. 1986). Thus, I FIND that CSS is likely to show that it owns valid
copyrights.
4. The AFC Test
The next stage of the analysis is more complex. In order to demonstrate
Through cross examination, defendants have implied that the dates of creation on the estate and
indexing software copyright registrations are incorrect. Hr’g, Tr., C. Herrington Direct, 233: 3–234:2.
However, they did not present sufficient evidence to rebut the presumption of validity.
6
17
copyright infringement, CSS must produce either direct evidence of infringement, or
in the alternative, that (1) CT had access to the copyrighted work, and (2) CT’s
software is substantially similar to CSS’s copyrighted material. Comput. Assocs. Int’l,
982 F.2d at 701. CSS argues the latter, which means I must apply the AFC Test for
substantial similarity.
a. Step 1: Abstraction
The first step described in Altai is abstraction. Abstraction is a very factspecific process. The overarching goal of abstraction is to break out a program into its
numerous ideas and expressions. Id. at 706–07. Each level of the AFC Test involves
“dissective analysis.” Pamela Samuelson, A Fresh Look for Nonliteral Copyright
Infringement, 107 Nw. U. L. Rev. 1821, 1838 (2013). The purpose of this step is to
distinguish the copyrightable expressive aspects of software from its underlying
ideas, which are not protectable by copyright. Id. at 707.
Analytic dissection is relevant not only to the copying element of a
copyright infringement claim, but also to the claim’s ownership element.
One aspect of the ownership element is the copyrightability of the
subject matter and, more particularly, the scope of whatever copyright
lies therein. To the extent a plaintiff’s work is unprotected or
unprotectable under copyright, the scope of the copyright must be
limited.
Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1476 (9th Cir. 1992) (citations
omitted). I rely entirely on the report and testimony of CSS’s expert, Andrew
McCasker, and the report of CT’s expert, Dr. Robert Zeidman to perform the
abstraction process.
b. Step 2: Filtration
The second step in the AFC Test is filtration. After the experts identify the
18
abstracted levels of the software in this case, the court must next examine the
structural components and determine if they are copyrightable. Comput. Assocs. Int’l,
982 F.2d at 707. The purpose of filtration is to define the scope of the plaintiff’s
available copyright. Id. Courts have been encouraged to be more explicit about
addressing which elements in protected works are not protectable by copyright. See
Samuelson, supra, at 1839. The Altai case names three specific categories of elements
that cannot be protected: (1) elements dictated by efficiency, which are barred by the
merger doctrine, (2) elements dictated by external factors, similar to scènes à faire in
traditional copyright analysis, and (3) elements from the public domain. Comput.
Assocs. Int’l, 982 F.2d at 707–11.
When there is only one way to express a particular idea, the idea and its
expression are “merged” and copyright will not protect that expression. Id. Coders are
driven to write the leanest, most efficient code in order to make a program run as fast
as possible.7
Efficiency is an industry-wide goal. Since, as we have already noted,
there may be only a limited number of efficient implementations for any
given program task, it is quite possible that multiple programmers,
working independently, will design the identical method employed in
the allegedly infringed work. Of course, if this is the case, there is no
copyright infringement.
“Software is designed and written with the goals of limiting the amount of computer memory
required, accomplishing the task quickly, shortening the design and coding phases, and establishing
an easy to understand user interface.” Crowe, supra, at 212. Coders strive for “program efficiency” in
their applications: the fastest processing speed, lowest memory utilization, and “the quality and
speed of the input/output functions.” See Peter S. Menell, An Analysis of the Scope of Copyright
Protection for Application Programs, 41 Stan. L. Rev. 1045, 1051 (1989).
7
19
Comput. Assocs. Int’l, 982 F.2d at 708 (citations omitted) (emphasis added).
“[E]vidence of similarly efficient structure is not particularly probative of copying[;]
it should be disregarded in the overall substantial similarity analysis.” Id. at 709.
The scènes à faire doctrine refers to standardized features that are not
copyrightable. This doctrine also excludes from copyright protection work serving
functional purposes or work that is dictated by external factors such as particular
business practices. Comp. Mgmt. Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d
396, 401 (5th Cir. 2000). Courts are to consider how a programmer’s freedom of choice
might be impeded by external considerations such as the mechanical specifications of
the computer on which the code will run, compatibility requirements with other
programs, the computer manufacturer’s design standards, industry demands, and
widely accepted programming practices. Comput. Assocs. Int’l, 982 F.2d at 710.
Elements from the public domain are any elements of a computer program that
may have entered the public domain. Id. at 710–11. They cannot be appropriated by
an author even if they are included in a copyrighted work. Id.
c. Step 3: Comparison
The final step is to compare the expressive elements of the plaintiff’s software
that remain with the elements of the defendant’s program alleged to infringe. Finding
infringement is warranted if there is substantial similarity in the programs’
expressions and those similarities were the result of copying. Id.
5. Alleged Copyright Infringement
Mr. McCasker asserts that CT has infringed the “overall structure,
20
architecture, and flow of CSS[’s] programs.” McCasker Expert Report at 2. He created
schematics of each company’s programs, 8 and stated that “[b]y visually scanning
these figures together, the degree to which the architecture components of the two
applications are the same is readily apparent.” McCasker Expert Report at 13. CSS
asserts that “[n]onliteral elements of a computer program may receive copyright
protection even if they are individually unprotectable, if they are compiled in a unique
or creative way.” SecureInfo Corp. v. Telos Corp., 387 F. Supp. 2d 593, 612 (E.D. Va.
2005).
Through Mr. McCasker’s expert report and the evidence given at the hearing,
CSS also alleges, inter alia, the following specific characteristics of CT’s software
constitute non-literal infringement: the decision to use temporary files for the
reporting function; the use of middle level of modularity for the business functions9;
the use of one-to-one level of modularity for the reporting functions; the use of the
program name to call services from the back end with the functions to be performed,
rather than the “superior” approach of passing only the function to be carried out and
letting the server determine the program to run; the “direct call” transaction flow in
the business portion; the fact both companies use Crystal Reports, Relativity, and
VanGUI or Louis; and the use of a letters-only name search algorithm. McCasker
Expert Report at 3–10; Hr’g Tr., McCasker Direct, Jan. 25, 2017, 107:21–25; Hr’g Tr.,
Dr. Zeidman notes that it hasn’t been shown that Mr. McCasker’s representation of the architecture
“actually represents the functionality of the code.” Zeidman Dep. 75:10–16 [ECF No. 105-2]. The court
is unable to opine on this.
8
The business process in both programs use middle level of modularity, meaning there are multiple
actions or grouped actions carried out by a single COBOL program on the server side. Hr’g Tr., Feb.
23, 2017, at 81:18–25, 88:15–21.
9
21
Feb. 23, 2017, McCasker Redirect, 81:18–25, 87:5–8, McCasker Cross, 133:21–25.
I will not address every single allegation in detail, but instead focus on the
overall problems that CSS has in meeting its burden. Mr. McCasker’s testimony was
genuine, and I found him to be sincere and knowledgeable. However, I found him able
to show substantial similarity using the AFC Test.
a. The Choice of COBOL
CSS has indicated that the choice to use COBOL supports the argument that
CT has infringed its software programs, despite the fact that COBOL is not the
intellectual property of CSS. CSS alleged through its expert that the choice of COBOL
was a part of the infringement analysis:
THE COURT: Choosing a language the same as somebody else chose the
same language, you’re not saying that that’s part of the problem, are
you?
MR. MCCASKER: I’m saying that the choice of the language drives
architecture decisions, and there are other choices available to them
that would have resulted in a different architecture.
Hr’g Tr., Jan. 25, 2017, McCasker Direct, 124:8–14.
CSS spent a great deal of time throughout the three days of the hearing, in
moving papers, and in depositions maligning COBOL as a very old, outdated
language that no one10 uses any more. See, e.g., H’rg Tr., Jan. 25, 2017, Auburn
Direct, 41:4 (“COBOL is a very old language.”); McCasker Expert Report at 4
(“COBOL is an outdated language.”); McCasker Expert Report at 25 (“Using
RM/COBOL to build a new application is almost unheard of in the last 20 years.”);
10
Additionally, because CSS’s own software is written in COBOL, this argument is not compelling.
22
Hr’g Tr., Jan. 25, 2017, McCasker Direct, 98:4–5 (“Are you old enough—not to be
insulted—to have programmed in COBOL?”); Id. at 108:13–15 (“[T]here are other
languages that are generally considered better and more modern. That’s one of the
reasons why COBOL programming is in decline.”).
Because the choice of coding language is not protected by CSS’s copyrights, this
was not time well spent. Additionally, CSS’s COBOL database and CT’s COBOL
database are not the same. Hr’g Tr., Jan. 25, 2017, McCasker Direct, 111:16–17.
Mr. McCasker noted during the hearing that structure of the COBOL files is “similar
but different.” Id. at 111:19–25.
I FIND that the choice of COBOL is not evidence of substantial similarity.
b. Structure, Architecture, and Design
CSS’s allegation regarding the similarity of the software applications’
structure and design suffers from many problems. The first is that CSS is unable to
perform the abstraction step of the AFC Test. CSS does not “distinguish the
copyrightable expressive aspects of software from its underlying ideas, which are not
protectable by copyright.” Comput. Assocs. Int’l, 982 F.2d at 707. Copyright
protection is limited “to the expression of an idea and not the underlying idea itself.”
Menell, supra, at 1104 n.7. “Because computer programs are utilitarian works, the
process-expression dichotomy is an important limit on the scope of their protection.”
Steven R. Englund, Idea, Process, or Protected Expression?: Determining the Scope
of Copyright Protection of the Structure of Computer Programs, 88 Mich. L. Rev. 866,
901–02 (1990). Though software “design” as an aesthetic can be protectable, the way
23
CSS refers to “design” is how the programs function.
Mr. McCasker describes the architecture and specific processes he believes are
copied in terms of their functionality rather their expression. Zeidman Dep. 73:14–
18; Zeidman Expert Report at 12. In his expert report, Mr. McCasker defines a
program’s structure as follows:
For the purpose of this expert report, the definition I am using for
software architecture comes from Gates Rubber v. Bando Chemical: The
program’s architecture or structure is a description of how the program
operates in terms of its various functions, which are performed by
discrete modules, and how each of these modules interact with each
other.
McCasker Expert Report at 6. Thus, he found substantial similarity in terms
of how the programs acted, and not how the programs were expressed. McCasker
Expert Report at 15–16. For example, when discussing the Indexing software, he
remarked, “[t]he COBOL program extracts the action from the request array, as well
as the parameters. [] The COBOL program reads, writes, updates, and/or deletes
COBOL permanent data files records.” Id. The same is true of his descriptions of the
transaction flow of the parties’ other applications. CSS fails to perform the
abstraction part of the AFC Test correctly.
The second problem is that Mr. McCasker’s report did not identify specific files
or code at issue. Zeidman Expert Report at 8. In any case, he did not “do so with
enough specificity to be understood.” See, e.g., id. at 11. (“Mr. McCasker does not state
whether Inquiry is a functional executable file, one or more source code files, or a set
of functions in the source code.”). Though this is a case regarding non-literal
infringement, CSS still needed to show specifically which protectable, expressive
24
elements of its software CT had infringed.
Thus, I FIND that CSS is not likely to succeed on the merits of its copyright
infringement claim with respect to the structure, design, architecture, or design of
the parties’ software.
c. Third-Party Components and Transaction Flow
CSS’s allegations regarding the third-party applications and transaction flow
are not viable because third-party components must be filtered out in the second step
of the AFC Test. Comput. Assocs. Int’l, 982 F.2d at 707–11. Thus, even though CT
employed identical and similar applications in its software—such as Relativity or
Crystal Reports—this is not infringement, because CSS does not own the intellectual
property for those applications.
The choice of COBOL played a critical role in defining which third-party
applications CT needed to use in order to run its programs effectively. As Mr.
McCasker noted, “the choice of the language drives architecture decisions.” Hr’g Tr.,
Jan. 25, 2017, McCasker Direct, 124:11–14. He testified that “the choice of the
language dictated . . . the choice of components in between that in turn drive design
decisions that—where the design ends up being the same.” Id. at 125:2:5. Because the
choice of COBOL necessitated the use of the specific third-party applications CT
employed, they should be filtered out because of the scènes à faire doctrine. Comput.
Assocs. Int’l, 982 F.2d at 710.
As Mr. McCasker noted, “the ‘transaction flow’ is dictated for the most part by
the use of the components, their requirements, and how they interact with each other
25
from end-to-end through the applications.” McCasker Expert Report at 6. For
example, “there are some elements of the design that the choice of COBOL is sort of—
makes a natural choice, like a VanGUI interface.” Hr’g Tr., Feb. 23, 2017, McCasker
Direct, 29:4–6. Doug Herrington testified, however, that he was not aware of another
method to connect a VB6 front end to the COBOL back end of a software program
other than with the VanGUI interface. Hr’g Tr., Feb. 23, 2017, D. Herrington Cross,
148:16–20. Also, there is appears to be no method to connect a C# front end of a
software program to the COBOL back end of a software program other than with the
Louis interface, used by CT in the same place as VanGUI.11 Additionally, Relativity
requires an ODBC interface12 and COBOL data files. Zeidman Expert Report at 15.
A TCP socket is a computer industry “standard protocol for exchanging data between
computer applications over a network.” See Zeidman Expert Report at 16–17. These
elements are not protectable by copyright, and they are to be filtered out in the second
step of the AFC Test.
I FIND that neither the choice of third-party components, nor the arrangement
of those third-party components, nor the similar transaction flow of the parties’
software is evidence of substantial similarity.
d. Specific Allegations of Non-Literal Infringement
McCasker states that CT had to “custom code” their own version to use the VanGui technology.
McCasker Expert Report at 25; Hr’g Tr., Jan. 25, 2017, McCasker Direct, 123:15–22. However, at the
preliminary hearing it was established that the defendants utilized Louis, an application created by
Liant, which is now owned by Micro Focus. Letter from Courtney Wood, Associate General Counsel
for Micro Focus 2–3.
11
An ODBC Interface is a computer industry standard tool commonly used by computer
programmers to develop computer applications. See Hr’g Tr., Feb. 24, 2017, C. Herrington Direct,
12–13.
12
26
CSS fails to show that CT’s software packages are substantially similar to the
copyrightable elements of its software. For a defendant to be liable for copyright
infringement, “the court must find that the defendant copied protectable elements of
the plaintiff’s program and that those protectable elements comprise a substantial
part of the plaintiff’s program when it is considered as a whole.” Gates Rubber, 9 F.3d
at 833 (emphasis added). “When similar works resemble each other only in those
unprotected aspects, then defendant prevails.” Melvin B. Nimmer & David Nimmer,
4 Nimmer on Copyright § 13.03 (B)(2) (internal citations omitted). “Infringement is
shown by a substantial similarity of protectable expression, not just an overall
similarity between works. Thus before evaluating substantial similarity, it is
necessary to eliminate from consideration those elements of a [computer] program
that are not protected by copyright.” Id. at § 13.03(F).
With regard to many of the specifically alleged infringement specifics, most of
what CSS has alleged are merely the most efficient or effective ways to implement a
task. The merger doctrine requires evidence of the “similarly efficient structure[s]” to
be disregarded and filtered out in the second step of the AFC Test because the
function and expression are “merged.” Comput. Assocs. Int’l, 982 F.2d at 708. Thus,
despite CT’s software having similar or even identical choices to that by CSS, these
expressions are not protectable.13
For example, as Mr. McCasker asserted: defendants’ program copies CSS’s
“Merely asking the question, ‘Does another way exist to perform a particular function?,’ does not
resolve the idea/expression puzzle. Some ways are better than others. And with respect to computer
programs, ‘better’ typically means more efficient—e.g., faster execution speed, less memory utilization,
compatibility with data storage methods.” Menell, supra, at 1085.
13
27
letters-only name search algorithm that allows for more accurate searches in county
records. Hr’g Tr., Jan. 25, 2017, McCasker Direct, 135:12–136:12 (“[I]t increases the
likelihood that you’ll get a match and it avoids problems . . . . It’s a more accurate
search.”). The use of temporary COBOL data files was also described to be a common
and more efficient way to access data. Hr’g Tr., Feb. 24, 2017, C. Herrington Direct,
35:10–37:2 (“COBOL has created temporary files for as long as it’s been in existence.
. . . So it’s more efficient.”). Thus, these elements are barred by the merger doctrine
and are not copyrightable.
With regard to the “unusual” combination of password and login, Mr.
McCasker testified that “Windows XP actually has the same kind of user interface.”
Id. 138: 3–4. Dr. Zeidman noted in his expert report that, “[t]his is evidence that the
technique is well-known in the industry . . . .” Zeidman Expert Report at 33. Again,
when a particular way for software to run is the most efficient, which can be shown
by common usage—the expression and idea merge—and thus, that part is not
protectable by copyright. See Comput. Assocs. Int’l, 982 F.2d at 707–11
For the additional allegations, CSS has failed to show similarity at all between
its source code and that of CSS. There was only one time in the course of this hearing
that lines of source code were discussed in any detail, and this occurred on the third
day of the hearing when CT introduced Exhibit 11 and Exhibit 12 through
Christopher Herrington. Defs. Exs. 11,12 from Prelim. Inj. Mot. Hr’g [ECF Nos. 9611, 96-12]. There it was established that the parties made very different
28
programming choices in writing their code for the process of invoking a program on
the server side. Hr’g Tr., Feb. 24, 2017, C. Herrington Direct, 16:5–31–22.
When the client application “request[s] a COBOL program to be executed, it
does so by populating an array.” Hr’g Tr., Feb. 23, 2017, McCasker Cross 14:7–22.
CSS alleges that “[t]he way in which that array is populated is the same in both
programs.” Id. Mr. McCasker stated that both parties “embed the name of the COBOL
program to be launched.” Id. at 18:1–17. However, Christopher Herrington, and the
exhibits themselves, showed that in fact the CSS program makes a single array
composed of 100 positions (lines 0 to 99), while the CT program creates two separate
arrays of five lines each (lines 0 to 4) and packages them into one transaction.
Compare Ex. 11, at 1 with Ex. 11, at 2; see also Hr’g Tr., Feb. 23, 2017, C. Herrington
Direct, 23:18–25.
Mr. McCasker also testified that both programs populate the name of the
COBOL program into the array in the first position. Hr’g Tr., Feb. 23, 2017, McCasker
Cross, 28:4–8. But the code and later testimony revealed that CSS’s code places the
program name in the 100th position. See Ex. 11, at 1 (“VGArrayPutString vgvaction,
99, ‘dimnt.cob’”). CT has its COBOL program name in the null position, in line 0. See
Ex. 11, at 2 (a[0] = ‘cbo.cob’;”). The way each program is expressed is thus very
different.
Exhibit 12 illustrates another example of the parties’ different coding choices
for invoking a COBOL program on the server side. In this section of the source code,
CSS again has chosen to create two arrays. See Ex. 12, at 1. The first array is sent by
29
“VGMakeArray vgvacation”, and the second is sent by “VGMakeArray vgvRecord.”
Id. CSS places the COBOL name in position 99 out of 100 positions. Hr’g Tr., Feb. 24,
2017, C. Herrington Direct, 31:6–9. The CSS code passes many parameters (such as
“From Date,” “Format Date,” “Thru Date”), while CT’s code does not pass any
parameters. Id. at 32:10–24; Ex. 12, at 1–2. What this means is that CSS has actually
hard-coded its parameters directly into the code, while CT’s parameters are “read
from a file and retrieved.” Hr’g Tr., Feb. 24, 2017, C. Herrington Direct, 33:2–23. This
is a completely different design decision.
Mr. McCasker testified that these are exceptions—that he missed in his
analysis of the source code—to what he normally observed in CT’s and CSS’s arrays
with “program name being first and the action is second.” Hr’g Tr., Feb. 24, 2017,
McCasker Direct, 78:15–20. Nevertheless, Mr. McCasker was unable to determine
how often this was the case, and CSS did not present to any particular lines of code
to show this was indeed an exception.
I FIND that CSS is not likely to succeed on any of its copyright infringement
claims.
B. Likelihood of Success on the Merits for Misappropriation of Trade Secrets
CSS alleges several trade secrets that CT is to have purportedly used in
creating and selling its software. The claims can be broken down into two categories:
alleged trade secrets related to CSS’s software and alleged trade secrets related to
CSS’s business practices. Specifically, the plaintiff asserts that CT misappropriated
its source code, software upgrades, method of pricing, business strategy, marketing,
30
geographic expansion, customer preferences, and client list. Pl. Proposed Findings of
Fact & Conclusions of Law 14 [ECF No. 106].
1. The Six-Factor Test for Theft of Trade Secrets
West Virginia has adopted the Uniform Trade Secrets Act codified as the West
Virginia Uniform Trade Secrets Act (“WVUSTA”). W. Va. Code § 47–22–9. In
determining whether a violation of the WVUSTA has occurred, the court must first
determine whether there was a trade secret to be protected, and then—if a trade
secret exists—it must determine whether it has been misappropriated. W.Va. Code
Ann. § 47–22–1(d); McGough v. Nalco Co., 496 F. Supp. 2d 729, 739 (N.D. W. Va.
2007). The plaintiff bears the burden of producing evidence that what it is alleging
meets the definition of a trade secret. Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d
655, 661–62 (4th Cir. 1993); IVS Hydro, Inc. v. Robinson, 93 F. App’x 521, 526–27
(4th Cir. 2004); McGough, 496 F. Supp. 2d at 739.
Under this act, a trade secret is defined as “information” that (1) derives
“independent economic value” from “not being generally known” or “readily
ascertainable” by others who can obtain economic value from its use or disclosure,
and (2) is the subject of “efforts that are reasonable under the circumstances to
maintain” the secrecy of the information. W. Va. Code §§ 47–22–1(d)(1)–(2); IVS
Hydro, 93 F. App’x at 526. In State ex rel. Johnson v. Tsapis, 419 S.E.2d 1 (W. Va.
1992), the Supreme Court of Appeals of West Virginia adopted the six-factor test
found in § 757 of the Restatement of Torts to determine whether there was good cause
to issue a protective order to prevent the disclosure of the defendant’s trade secrets.
31
The factors set forth in Tsapis are as follows:
(1) the extent to which the information is known outside of the
defendant’s business;
(2) the extent to which it is known by employees and others involved in
the defendant’s business;
(3) the extent of the measures taken by the defendant to guard the
secrecy of the information;
(4) the value of the information to the defendant and competitors;
(5) the amount of effort or money expended by the defendant in
developing the information; and
(6) the ease or difficulty with which the information could be properly
acquired or duplicated by others.
IVS Hydro, 93 F. App’x at 526–27; McGough, 496 F. Supp. 2d at 739. “[T]he absence
of evidence as to any one factor does not necessarily preclude a finding that a trade
secret exists. The factors should be viewed as instructive guidelines, weighed together
in making that determination.” McGough, 496 F. Supp. 2d at 740 (internal citations
omitted).
The hallmark of a trade secret is not its novelty but its secrecy. Avtec Sys., 21
F.3d at 575. Secrecy is a question of fact. Trandes, 996 F.2d at 664. “Absolute secrecy
is not essential,” and limited disclosure does not destroy secrecy. See id. (“A trade
secret owner, however, does not abandon his secret by a limited public publication for
a restricted purpose.”). The Restatement (First) of Torts advises that to be a trade
secret, “a substantial element of secrecy must exist, so that, except by the use of
improper means, there would be difficulty in acquiring the information.” Restatement
(First) of Torts § 757 cmt. b (Am. Law Inst. 2017); Avtec Sys., 21 F.3d at 575.
32
A trade secret is misappropriated when it is improperly acquired or disclosed
by someone who knew, or had reason to know, of a duty to maintain confidentiality.
Id. 574–5; W. Va. Code Ann. § 47-22-1(b).
2. Source Code and Software-Related Claims
Initially, the source code files for CSS’s software were loaded onto each client’s
servers so in the event CSS went out of business, the client’s work would not be
disrupted. Hr’g Tr., Auburn Direct, Jan. 25, 2017, 35:12–25. CSS provided the source
code as a part of its software package order. See, e.g., Hr’g Tr., Jan. 25, 2017, Auburn
Direct, 31:1–9 and 35:15–18, Defs. Exs. 1, 2, 14 from Prelim. Inj. Mot. Hr’g [ECF Nos.
96-1, 96-2, 96-13]. Bert Auburn stated that this “bad business practice” has not been
continued, and all of CSS’s source code has now been removed from all county servers.
Auburn Dep. 58:21–60:19. However, this removal could not have occurred until Bert
Auburn came on board, which would be at some point after CSS was sold to Kofile in
May 2014. Hr’g Tr., Jan. 25, 2017, Auburn Direct, 39:18–19. Both Doug Herrington
and Bert Auburn were unable to state with certainty who had access to CSS’s
unprotected source code from 1983 until 2014. CSS. Id. at 60:13–18; Hr’g Tr., Feb. 23,
2017, D. Herrington Direct, 120:13–16, 121:24–122.
What I find especially injurious to CSS’s claim is that West Virginia county
servers are all connected through WVNet, “the virtual private network that allowed
vendors to access clients [and] state-run computers.” Defs.’ Mem. Opp’n Pl.’s Mot.
Prelim. Inj., Ex. 3, at 267:7–15. Any and all county vendors can access the servers,
including competitors of CSS. Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 119:9–
33
11.
CSS left decisions regarding who could access its source code on the servers
entirely up to the county clients themselves. The county clients—not CSS—were the
ones who determined who had “admin rights”14 in order to access the files:
MR. HERRING: And it was y’all’s understanding that the counties were
taking appropriate measures to safeguard that system?
BERT AUBURN: Yes, it was our understanding, our belief, and that’s
what we had discussed with clients.
Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:21–24. However, CSS did not uniformly
mandate any type of confidentiality requirements when it provided the county clients
its software nor did CSS otherwise require that the source code be kept confidential.
See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 32:12–24. Bert Auburn did not know if
any of the county contracts had language that required protection of CSS source code.
Id.; Hr’g Tr., Jan. 25, 2017, Auburn Cross, 75:8–14.
When asked what limits, if any, CSS itself put on its software to source code to
limit access, Doug Herrington replied “[n]othing; nothing particularly on the source
code.” Id. at 120:17–20. CSS provided source code to clients in a way that “[the files]
were pretty much editable in Notepad or however else you needed to view them.”
Lowers Dep. 182:20–24; Auburn Dep. 58:21–60:19. Bert Auburn did not know at his
deposition whether the server was in any way “locked,” whether the source code was
password protected, nor whether the source code was identified as confidential. Id. at
60:13–18. While Doug Herrington testified that it was neither password protected
14
This is a reference to “administrative rights.”
34
nor encrypted. CSS. Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 120:21–23.
Additionally, to log into CSS’s applications, Doug Herrington agreed that CSS
maintained the same password, “top gun,” to log into its applications for likely more
than twenty-five years. Hr’g Tr., Feb. 23, 2017, D. Herrington Cross, 135:3–136:14.
The password was told to anyone who attended a training, and CSS did not require
the password to be kept confidential. See Hr’g Tr., Feb. 23, 2017, D. Herrington Cross,
136:6–19; see also Hr’g Tr., Feb. 23, 2017, Smith Direct, 176:9–16.
Thus, when I consider the “ease or difficulty with which the information could
be properly acquired or duplicated by others,” CSS fails to pass muster. IVS Hydro,
93 F. App’x at 526–27; McGough, 496 F. Supp. 2d at 739. CSS argues that the
defendants were unable to prove that anyone had in fact accessed the code, but this
misstates what is required. CSS’s vigorous litigation of this case is not able to undo
decades of neglecting to protect its source code.
When considering the “extent to which the alleged trade secret is known by
employees and others involved in [CSS’s] business,” CSS also did not make
reasonable efforts to protect its confidential material until recently. IVS Hydro, 93 F.
App’x at 526–27; McGough, 496 F. Supp. 2d at 739. Christopher Herrington,15 an
employee since 1991, was never made to sign a confidentiality agreement until 2014.
Pl. Mot. Prelim. Inj. Ex. 2 [ECF 65-2]; Hr’g Tr., Jan. 25, 2017, Auburn Direct, 45:10–
21.
Although he did concede at the hearing that he know the source code was confidential. Hr’g Tr.,
Feb. 23, 2017, C. Herrington Direct, 159:4–7.
15
35
After considering the six Tsapis factors, I FIND that CSS has not made a prima
facie case of misappropriation with respect to its source code under the WVUSTA.
Trandes, 996 F.2d at 661–62; IVS Hydro, 93 F. App’x at 526–27; McGough, 496 F.
Supp. 2d at 739. CSS has failed to meet its burden of proving a trade secret exists.
Thus, I FIND CSS’s source does not meet the definition of a trade secret, and
CSS is not likely to succeed on the merits of its WVUSTA claim with respect to its
source code.
3. Business Practice-Related Claims
a. CSS’s Client List
CSS’s client list cannot be considered a trade secret because the names of CSS’s
clients are publically available information. CSS’s contracts are with public entities
subject to document requests pursuant to the West Virginia Freedom of Information
Act. See W. Va. Code § 29B–1–2-(5). The names of clients are available to anyone who
requests the information. In Avtec Sys., Inc. v. Peiffer, the Fourth Circuit was not
able to find a case that supported the idea that an alleged owner of a trade secret
“could maintain the secrecy of material that is subject . . . to publication at the will of
another.” Avtec Sys., 21 F.3d at 575.
The West Virginia Supreme Court of Appeals has also found that customer
lists do not “constitute[] a protectable employer interest.” Memo. Op. and Order at
12, IVS Hydro, Inc. v. Robinson, No. 2:01-cv-1296 (S.D. W. Va. May 29, 2003) (citing
Voorhees v. Guyan Machinery Co., 446 S.E. 2d 677 (W. Va. 1994)). I found previously
in McGough that “customer lists [would not] be a trade secret” when the accounts are
36
“pretty much common knowledge” in the industry. McGough, 496 F. Supp. 2d at 740.
The evidence also suggests that CT directly solicited all counties in West Virginia,
not just those that were clients of CSS. Defs. Ex. 14 from Prelim. Inj. Mot. Hr’g [ECF
No. 96-14]; Hr’g Tr., Feb. 23, 2017, C. Herrington Direct, 228:1–2.
Thus, I FIND that CSS is not likely to succeed on the merits of its WVUSTA
claim with respect to customer names.
a. CSS’s Pricing Methodology
CSS’s pricing methodology does not meet the definition of trade secret. The
Fourth Circuit has held that pricing may not be a trade secret when the “approach to
pricing [is] not unique and [the company] did not expend a great deal of money
developing its pricing techniques.” IVS Hydro, 93 F. App’x at 528. Bert Auburn
testified that their pricing methodology is based on the tax base in the county, which
is determined by publications that are “completely public information.” Auburn Dep.
166:24–165:8; Hr’g Tr. 54:3–55:9. CSS did not develop or fund the publications that
determined the tax bases for the counties. Auburn Dep. 166:24–165:8. No evidence
was put forth to suggest the pricing methodology required CSS to invest significant
resources.
The Fourth Circuit has also determined that when a company only takes
“minimal steps to ensure the confidentiality of its pricing information” that this
information does not constitute a trade secret. IVS Hydro, 93 F. App’x at 528. The
extent of the measures taken by CSS to guard the secrecy of its customer lists and
prices do not rise to a level sufficient to consider this information a trade secret. Until
37
September 12, 2014, Christopher Herrington was not required to sign any type of
confidentiality agreement. The evidence shows that other CSS employees were also
not required to do so until around that time, despite CSS’s many years in business.
It is not clear who had access to the pricing information internally. There was no
evidence put forth that CSS’s client list was subject to any internal constraints or
confidentiality restrictions.
The Fourth Circuit has also found that when prices are “common knowledge in
the marketplace” that trade secret protection is not available. IVS Hydro, 93 F. App’x
at 528. Again, the prices charged by CSS are also publically available information
subject to document requests pursuant to the West Virginia Freedom of Information
Act. See W. Va. Code § 29B–1–2-(5).
Furthermore, CSS has also failed to meet its burden of persuasion regarding
misappropriation. First, CT has an entirely different pricing model from CSS. CSS
sells its software as well as support services, while CT does not charge anything for
the software, and instead charges only for support. Pl.’s Mot. Prelim. Inj., Ex. B at
108:19–109:2, 342:13–343:19 [ECF No. 65-3] (“C. Herrington Dep.”). Furthermore,
the evidence put forth at the hearing suggests that Christopher Herrington became
aware of or attempted to become aware of contract pricing by directly soliciting
customers himself and by offering to provide the counties a better price. See, e.g., Hr’g
Tr., Feb. 24, 2017, C. Herrington Direct, 41:16–43:1; Defs. Exs. 14, 15, 16 from Prelim.
Inj. Mot. Hr’g [ECF Nos. 96-13, 96-14, 96-15].
Thus, I FIND that CSS is not likely to succeed on the merits of its WVUSTA
38
claim with respect to its pricing methodology.
b. Geographic Expansion to Ohio
CSS’s expansion to Ohio does not constitute a trade secret. I am skeptical that
it is possible to obtain trade secret protection over the idea that a software solution
provider to county governments might one day choose to expand to a neighboring
state, after the company had already established business in that state.
The WVUSTA requires that a trade secret be “the subject of efforts that are
reasonable under the circumstances to maintain its secrecy.” W. Va. Code Ann. § 47–
22–d–2. CSS did not take many measures to keep this confidential. Many within the
company were aware of this desire. Hr’g Tr. Feb. 23, 2017, 163:5–9. Additionally, this
information could be acquired and duplicated very easily by others once CSS actually
established a business presence in Ohio. Hr’g Tr., Feb. 23, 2017, C. Herrington Cross,
254:18–19 (“They [] had one account there.”); State ex rel. Johnson, 419 S.E.2d at 1.
Most importantly, CSS has not been able to show that CT has misappropriated
this information, even if it were considered a trade secret. All CSS has been able to
show thus far is that Christopher Herrington has spoken to an individual with
contacts in Ohio. Id. at 253:22–254:1. CT is not in Ohio nor does it appear to have any
plans to expand into Ohio.
Thus, I FIND that CSS is not likely to succeed on the merits of its WVUSTA
claim with respect to expansion to Ohio.
c. CSS’s Customers’ Preferences
CSS alleges that knowledge it gained through its interactions with county
39
governments constitutes protectable trade secrets. CSS alleges that Christopher
Herrington learned about these county practices in the years he worked at CSS.
Auburn Dep. 156:18–159:20. I FIND that this information does not constitute a trade
secret.
It does not appear that CSS took any measures to keep this information
confidential. Again, CSS presented no evidence that it ever limited the number of
employees who could access this information or that CSS informed employees that
the information was confidential.
Regardless of whether or not this information may be considered a trade secret,
evidence of disclosure or misappropriation by CT or Christopher Herrington was not
presented. The type of information alleged largely has to do with whom to contact at
the office. WVUSTA only prevents someone from acquiring a trade secret using
“improper means.” W. Va. Code § 47–22–1. It does not preclude someone from going
out and developing that information on his own. From the evidence put forth, it is
clear that Christopher Herrington was able to obtain this information on his own by
contacting county clerks on a list provided by the West Virginia Association of
Counties, developing relationships, and asking them to provide feedback about their
preferences. See C. Herrington Dep. at 50:3–11.
Therefore, I FIND that CSS is not likely to succeed on the merits of the
WVUSTA claim as related to CSS’s customer preferences.
C. Likelihood of Success on the Merits for Breach of Contract
The likelihood of CSS prevailing on the merits of its breach of contract claim
40
depends on whether the court will enforce the provisions of the Confidentiality
Agreement.16 To analyze whether those provisions are enforceable, the court first
must determine which state’s law to apply. The court must employ West Virginia’s
choice-of-law principles because this court sits in diversity in West Virginia. See
Klaxon Co. v. Stentor Elect. Mfg. Co., 313 U.S. 487, 496 (1941).
1. Choice of Law
The Confidentiality Agreement contains a choice of law provision, which
identifies Texas law as controlling. Confidentiality Agreement ¶ 7 [ECF No. 65-2].
Nevertheless, no signatory to the Confidentiality Agreement is from Texas, the
agreement was entered into in West Virginia, and the alleged breach occurred in West
Virginia. Under West Virginia’s conflict of laws jurisprudence, “[a] choice of law
provision in a contract will not be given effect when the contract bears no substantial
relationship with the jurisdiction whose laws the parties have chosen to govern the
agreement.” See Gen. Elec. Co., 275 S.E.2d at 290. The parties agree that West
16
The relevant portion of the Confidentiality Agreements states the following:
“Confidential and Proprietary Information” means any and all data and information
which is (1) disclosed to or known by Employee as a consequence of, during, or through
Employee’s association with the Company; (2) not generally known outside the
Company; and (3) which relates to any aspect of the Company or its business, research
or development.
Confidential and Proprietary Information includes, but is not limited to: research,
technology, strategic plans, business plans, information relating to the Company’s
operating plans and methodologies, operational manuals, pricing and marketing
strategies, financial information, and other trade secrets, as well as any or all
information which is disclosed to Employee or in any way acquired by Employee
relating to the Company or its employees, clients, customers, prospective customers or
clients, suppliers, or vendors. Confidential and Proprietary Information may be
written, verbal or recorded by electronic, magnetic or other methods, whether or not
expressly identified as “Confidential” by the Company.
Confidentiality Agreement 1 [ECF No. 65-2].
41
Virginia law applies.17 Pl.’s Mem. Supp. Mot. 5, 6 (“The non-copyright claims of CSS
are generally governed by West Virginia law. . . . The Confidentiality Agreement was
formed and performed in West Virginia and, therefore, its valid[ity] would generally
be governed by West Virginia law.”). Thus, I FIND that West Virginia law should
control the court’s interpretation of the Confidentiality Agreement.
2. Validity of the Confidentiality Agreement
CSS alleges that Christopher Herrington breached the Confidentiality
Agreement. First Am. Compl. ¶ 43 [ECF No. 59]. Specifically, CSS argues that
Christopher Herrington must be in breach of the agreement because he would not be
able to service his new clients without using detailed knowledge of the plaintiff’s
software code acquired during his employment. Pl.’s Mem. Supp. Mot. 8. The plaintiff
states that Christopher Herrington breached the agreement by “(1) using the
Confidential Information to create and market and sell systems to CSS’s customers
and (2) by using the Confidential Information to sell maintenance services for CSS’s
software.” Id. at 9. The plaintiff argues that the Confidentiality Agreement is
reasonable because the agreement applies only to “information not generally known
outside the company which relates to CSS’s business, research, or development,” and
“there is no preclusion on [Christopher Herrington]’s use of general programming
skills or services.” Id. at 8. The defendants assert that the agreement is too broad,
rendering it unenforceable under West Virginia’s “Rule of Reason” test, because “it
encompasses essentially all the information Christopher Herrington was provided by
17
CSS argues that it would also be successful if Texas law were to be applied.
42
CSS or learned during the course of his employment with CSS.” Defs.’ Mem. 4 [ECF
No. 68].
The West Virginia Supreme Court of Appeals has not squarely addressed the
enforceability of a non-disclosure agreement. Nevertheless, I have previously held
that non-disclosure agreements should be examined under the same legal structure
as non-compete agreements. See McGough, 496 F. Supp. 2d at 752. I held that
“[c]ovenants not to disclose and utilize confidential business information are related
to general covenants not to compete because of the similar employer interest in
maintaining competitive advantage.” Id. at 756.
In deciding whether restraints on disclosure are reasonable two factors
are important: (1) whether the employer is attempting to protect
confidential information related to the business, such as trade secrets,
methods of operation, names of customers, and personnel data even
though the information does not rise to the status as a trade secret, and
(2) whether the restraint is reasonably related to the protection of the
information.
Id. (citing Restatement (First) of Contracts §§ 515(a), 516 (Am. Law Inst. 2017)).
The framework to apply to non-disclosure agreements is as follows:
1.
2.
3.
4.
Is the agreement a binding contract at law?
Is the agreement unreasonable on its face?
Does the employer have an interest requiring protection?
Is the employee able to rebut the presumption of enforceability?
See Reddy v. Cmty. Health Found. of Man, 298 S.E.2d 906, 915–17 (W. Va. 1982)
Upon close examination of the Confidentiality Agreement at issue here, I FIND
that it is a properly formed contract. 18 I also FIND that the contract is not
Defendants do not challenge the confidentiality agreement on the grounds of being an improperly
formed contract. Hr’g Tr., Jan. 25, 2017, 22:7–23.
18
43
unreasonable on its face. In fact, what the Confidentiality Agreement covers is
narrow. To be considered “confidential information” under the agreement, three
conditions must be satisfied: (1) Christopher Herrington used information acquired
through his employment that (2) was not generally known outside of the company
and (3) that the information related to the plaintiff’s business, research, or
development.
Whether CSS is likely to succeed on the merits of the breach of contract claim
depends on whether it can show that Christopher Herrington divulged confidential
information as defined by this agreement. As discussed in previous sections of this
opinion, CSS has not done so. Accordingly, I FIND CSS is not likely to succeed on the
merits of this claim.
D. CSS Will Not Suffer Irreparable Harm
Plaintiffs seeking preliminary relief must demonstrate that irreparable injury
is likely in the absence of an injunction. Winter, 555 U.S. at 22; see also 11A Charles
Alan Wright & Arthur R. Miller, Federal Practice and Procedure § 2948.1 (2d ed.
1995). A “possibility of irreparable harm” is not enough to earn a preliminary
injunction. Real Truth About Obama, 575 F.3d at 346. Plaintiffs argue that without
this injunction they will suffer in many ways; however, CSS has not shown it will be
irreparably harmed before trial absent preliminary injunctive relief. Moreover, on
December 16, 2016, CSS moved this court for an extension to a reply to its Motion for
Preliminary Injunction [ECF No. 68]. This further persuades me that CSS is not
44
likely to face irreparable harm.
CSS is concerned that CT will use its IP to become a permanent competitor.
Because CSS is not likely to succeed on the merits of its copyright claim or trade
secret claims, this is not a convincing argument. Courts are not in the business of
removing a plaintiff’s competitors from the marketplace because the plaintiff is losing
business. See Robie v. Price, No. 2:17-CV-03089, 2017 WL 3097529, at *6 (S.D. W.
Va. July 20, 2017) (“[T]he sole fact that a company is losing money does not
irreparable harm make.”).
In addition to CT becoming a permanent competitor, CSS worries
simultaneously CT will no longer be a viable company. That a party may go out of
business as a consequence of litigating a suit is a danger present in any case. There
is also no guarantee that CSS will be able to recover any monetary damages, even
should it receive a final judgment in its favor. Hr’g Tr., Feb. 24, 2017, 67:1–4. This is
a risk that CSS knowingly assumed when it initiated this action.
I am not convinced that monetary damages would be an insufficient remedy in
this case. CSS alleged damages in the form of lost profits, future lost profits, and
future potential earnings from “bundled sales”19—upselling their current customers
on new software offerings. These harms all relate to monetary losses.
However, CSS has not provided any tangible monetary damages or estimates
regarding these potential future earnings or losses. CSS says it is impossible to prove
In the twenty-five year history of the company prior to Christopher Herrington’s 2015 departure,
CSS had regularly made additional “bundle sales.” Hr’g Tr., Feb. 23, 2017, D. Herrington Direct,
127:9–15. Since CT emerged into the market, CSS has made virtually no bundled sales to its
customers. Id. at 127:20–24.
19
45
these exact losses with any substantial certainty and that some of its alleged damages
are difficult to calculate. Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 127:25–128:21;
Hr’g Tr., Jan. 25, 2017, 63:4–7. CSS has sufficient financial information regarding its
own finances and contracts to calculate damages readily for the value of customers
lost to CT.
CSS should also be able to calculate its actual damages for its copyright claim.
Actual damages include those suffered the copyright owner “as a result of the
infringement, and any profits of the infringer that are attributable to the
infringement.” 17 U.S.C. § 504(b) (emphasis added). There is a dispute as to whether
the alleged infringement occurred before or after the effective date of the copyrights.
In either case,“[a]ctual damages are proper for acts of infringement occurring both
before or after the effective registration.” 17 U.S.C. § 504(b).
CSS also alleges that its reputation and goodwill have been damaged as a
result of this litigation. Hr’g Tr., Jan. 25, 2017, 63:17–22; Mem. Law Supp. Pl.’s Mot.
Prelim. Inj. at 17. However, CSS did not present any evidence of this. An expert may
have been able to opine on whether or not this is connected, but it has not been made
clear this is the case.
Thus, I FIND that CSS has not made a showing that it will likely suffer
irreparable harm absent a preliminary injunction.
E. Balancing of Hardships Does Not Tip in CSS’s Favor
A plaintiff seeking a preliminary injunction must establish that the balance of
equities tips in his favor. Winter, 555 U.S. at 20. CSS argues that it would be harmed
46
by continued infringement of its intellectual property. Pls. Mot. Prelim. Inj. 18. CSS
also asserts that nothing in the Confidentiality Agreement would have prohibited
Christopher Herrington from working on programs in an unrelated interest. Id. CT
expresses concerns that it will be unable to stay in business. Defs. Mem. Opp. Pls.
Mot. Prelim. Inj. 19.
CSS has not provided sufficient evidence to show it is likely to succeed on this
factor. Therefore, I FIND that CSS has not made a showing that the balance of
hardships weighs in its favor.
F. An Injunction is Not the Public Interest
CSS asserts that granting its motion for a preliminary injunction is in the
public interest because the Fourth Circuit has recognized that “the public has an
interest in enforcing restrictive covenants that protect business interests, and that
the public has an interest in preventing . . . infringement of copyrights.” Bowe Bell,
145 F. App’x at 404. “Since Congress has elected to grant certain exclusive rights to
the owner of a copyright in a protected work, it is virtually axiomatic that the public
interest can only be served by upholding copyright protections and, correspondingly,
preventing the misappropriation of the skills, creative energies, and resources which
are invested in the protected work.” Klitzner Indus., Inc. v. H. K. James & Co., 535
F. Supp. 1249, 1259–60 (E.D. Pa. 1982) (emphasis added).
However, “[c]opyright law seeks to ‘balance the competing concerns of
providing incentive to authors to create and of fostering competition in such
creativity.’” Daniel A. Crowe, The Scope of Copyright for Non-Literal Design
47
Elements of Computer Software: Computer Associates International, Inc. v. Altai,
Inc., 37 St. Louis U. L.J. 207, 233 (1992). If copyright protection “is extended too far,
it will impede technical innovation by not allowing other developers in the computer
industry to build upon and expand the work of others.” Id. There is not yet a brightline test to determine the scope of software copyright protection, and thus, this task
has been left to the courts. Id.
Given that CSS is not likely to succeed on the merits of its copyright claim or
trade secret claims, this is not a compelling argument for the plaintiff.
The Fourth Circuit also encourages a court to consider the public interest in
making a decision on whether to issue a preliminary injunction. Adkins v. Scott, 597
F.2d 872, 877 (4th Cir. 1979). The Supreme Court instructs courts to “pay particular
regard for the public consequences in employing the extraordinary remedy of
injunction.” Winter, 555 U.S. at 24. CSS asks for CT be estopped from providing
support services to its current customers: twenty clerks’ offices in the State of West
Virginia. See Hr’g Tr., Feb. 24, 2017, C. Herrington Direct, 43:19–44:5. Bert Auburn
states that CSS would be able to provide support services for CT’s clients before
switching them back to CSS’s software. Hr’g Tr., Feb. 24, 2017, Auburn Direct 68:17–
69:3. However, an injunction would no doubt negatively disrupt the operation of the
county clerks’ offices during such a transition.
Thus, I FIND that CSS has not shown that the injunction is in the public
interest.
VI.
Conclusion
48
For the reasons outlined above, the Court ORDERS that Plaintiff’s Motion for
Preliminary Injunction [ECF No. 65] is DENIED.
The Court DIRECTS the Clerk to send a copy of this Order to counsel of record
and any unrepresented parties.
ENTER:
49
August 1, 2017
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?