Trade Secret and Copyright Protection of Computer Software 4 Com
Trade Secret and Copyright Protection of Computer Software 4 Com
Law
Volume 4 Article 3
Issue 4 Computer/Law Journal - Spring 1984
Spring 1984
Part of the Computer Law Commons, Intellectual Property Law Commons, Internet Law Commons,
Privacy Law Commons, and the Science and Technology Law Commons
Recommended Citation
Ray A. Mantle, Trade Secret and Copyright Protection of Computer Software, 4 Computer L.J. 669 (1984)
https://repository.law.uic.edu/jitpl/vol4/iss4/3
This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted
for inclusion in UIC John Marshall Journal of Information Technology & Privacy Law by an authorized administrator
of UIC Law Open Access Repository. For more information, please contact [email protected].
TRADE SECRET AND COPYRIGHT
PROTECTION OF COMPUTER
SOFTWAREt
by RAY A. MANTLE*
TABLE OF CONTENTS
I.
INTRODUCTION ........................................... 669
II.
PATENT PROTECTION ................................... 670
II.TRADE SECRET PROTECTION .......................... 673
IV. COPYRIGHT PROTECTION .............................. 677
V.DUAL PROTECTION BY COMBINING COPYRIGHT
AND TRADE SECRET PROTECTION .................... 689
VI. COPYRIGHT PREEMPTION OF TRADE SECRETS
UNDER SECTION 301 OF THE 1976 COPYRIGHT ACT. 690
VII. CONCLUSION .............................................. 694
I. INTRODUCTION
The software industry has become a major commercial and
technological contributor to the success of United States businesses;
the creators of U.S. software have an undisputed worldwide lead.
With the mounting demand for pre-packaged software, the wide-
spread retail marketing of off-the-shelf software (particularly for
microcomputers), and the shortage of programmers, soft-
ward/firmware has become increasingly valuable.1 The legal system
t © Ray A. Mantle 1983. All rights reserved. Adapted from a speech delivered
by Mr. Mantle on May 12, 1983, at the Fourth Annual University of Southern
California Computer Law Institute.
* Member of Milgrim Thomajan Jacobs & Lee P.C., New York, New York, LL.B.
degree from New York University. The author thanks Lynne Costantini, a student at
New York University Law School, for her important contributions to this Article.
1. "Firmware" is a term of art in the computer industry and refers to micro-in-
structions permanently embodied in hardware elements. Generally, the term
"software" will be used to mean both computer programs and data bases, with spe-
cific reference where necessary to draw a distinction. For the purposes of this Arti-
cle, firmware will be separately identified where it is pertinent to the context, but it
generally will be included in discussion of software, albeit embodied in a different
medium.
COMPUTER/LAW JOURNAL [Vol. IV
11. Id. § 271. See, e.g., Schnadig Corp. v. Gaines Mfg. Co., 620 F2d 1166 (6th Cir.
1980).
12. 35 U.S.C. § 101 (1982).
13. Id. § 102.
14. Id. § 103.
15. See 17 U.S.C. § 271 (1982).
16. See, e.g., Parker v. Flook, 437 U.S. 584 (1978) (method for updating alarm lim-
its during catalytic conversion processes in which the only novel feature was a math-
ematical formula held not patentable); Funk Bros. Seed Co. v. Kalo Inoculant Co., 333
U.S. 127 (1948) (discovery of particular law of nature not patentable).
17. See, e.g., Mackay Radio & Tel. Co. v. Radio Corp. of Am., 306 U.S. 86 (1939),
modified and reh'g denied, 306 U.S. 618 (1939). The Court attempted to clarify this
distinction stating- "While a scientific truth, or the mathematical expression of it, is
not patentable invention, a novel and useful structure created with the aid of knowl-
edge of scientific truth may be." Id. at 94.
18. 450 U.S. 175 (1981) (5-4 decision).
19. See Gottschalk v. Benson, 409 U.S. 63 (1972). There the Court held that the
discovery of a novel and useful mathematical formula was not patentable. The sub-
ject matter in Benson was an algorithm that described a method for converting bi-
nary-coded decimal numbers into pure binary numerals. The Court held that this
method was not a "process" within the meaning of the Patent Act. Id. at 71.
COMPUTER/LAW JOURNAL [Vol. IV
Court granted a patent in Diehr by viewing the claim not "as an at-
tempt to patent a mathematical formula, but rather to [patent] an
industrial process for the molding of rubber products. ' 20 The Court
determined that the process claimed by Diehr was eligible for pat-
ent protection since it fit into the statutory classifications. The
Court held that its conclusion was "not altered by the fact that in
several steps of the process a mathematical equation and a
programmed digital computer are used."'2 1 In other words, the fact
that a programmed computer was utilized in realizing an invention
was of no significance for the purpose of statutory classification
under the Patent Act.
In another case dealing with whether or not patent protection
was applicable to the software/firmware field, In re Application of
23
Bradley,22 an invention that combined tangible firmware elements
was held patentable despite the fact that certain calculations were
made during the operation of the system. 24 In granting the patent,
the court noted the distinction between what a computer does and
how it does it, and explained that the owners of the invention were
claiming a patent for the combination of hardware elements, not for
the information embodied in the firmware or software itself.25 The
court concluded that the presence of calculations would not "trans-
26
form the invention as a whole into a method of calculation."
Although the Diehr and Bradley cases clarified somewhat how
courts will classify computer programs for purposes of patent pro-
tection, the courts' reasoning and the distinctions drawn are still too
unclear to afford an inventor any degree of certainty in obtaining
patent protection for software/firmware. 27 Beyond the certainty
problems, there are other drawbacks and limitations to patent pro-
tection of computer software/firmware. It may take up to three
years to obtain patent approval from the Patent and Trademark Of-
fice; by this time the software may be less marketable due to look-
28. See 35 U.S.C. § 151 (1982) (a patent is issued approximately six months after
written notice to the applicant of allowance of the patent application by the Patent
Office). Procedures for applying for a patent and Patent Office review are set forth in
35 U.S.C. §§ 111-146 (1982).
29. 35 U.S.C. § 112 (1982). But see Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470,
491 (1974) (holding that the extension of trade secret protection to clearly patentable
inventions does not conflict with the patent policy of disclosure). See infra notes 141-
165 and accompanying text for a discussion of Kewanee.
30. See generally R. McGRnI, TRADE SECRETS § 1.01 (1983).
31. See generally id. § 3.01.
32. See generally id. § 5.01.
33. The UNi. TRADE SECRETS ACT (1980), reprinted in R. Mn'oRim, supra note 30,
app. A, has been adopted by Arkansas, Delaware, Kansas, Louisiana, Minnesota,
North Carolina, Utah, and Washington. M. JAGER, TRADE SECRETS LAW HANDBOOK
§ 3.04 (1982).
34. See I. MiwCimu, supra note 30, § 7.08[2].
COMPUTER/LAW JOURNAL [Vol. rV
43. See Lear Siegler, Inc. v. Ark-Ell Springs, Inc., 569 F.2d 286 (5th Cir. 1978).
There the court stated that
it] he term "trade secret" is one of the most elusive and difficult concepts in
the law to define. The question of whether an item taken from an employer
constitutes a "trade secret," is of the type normally resolved by a fact finder
after full presentation of evidence from each side.
Id. at 288-89. See also Kodekey Elecs. v. Mechanex Corp., 486 F.2d 449 (10th Cir. 1966);
Hulsenbusch v. Davidson Rubber Co., 344 F.2d 730 (8th Cir. 1965), cert. denied, 382
U.S. 977 (1966); Sundstrand Corp. v. Hydro-Tech Corp., 202 U.S.P.Q. (BNA) 263 (D.
Colo. 1978), affid, 673 F.2d 1171 (10th Cir. 1982).
44. See Nickelson v. General Motors Corp., 361 F.2d 196 (7th Cir. 1966); Keystone
Plastics, Inc. v. C & P Plastics, Inc., 340 F. Supp. 55 (S.D. Fla. 1972), affid., 506 F.2d 960
(5th Cir. 1975); Bickley v. Frutchey Bean Co., 173 F. Supp. 516 (E.D. Mich. 1959), affid,
279 F.2d 685 (6th Cir. 1960); Wexler v. Greenburg, 399 Pa. 569, 160 A.2d 430 (1960).
45. See R. MULGRim, supra note 30, § 8.03.
46. See id. § 2.02.
47. 416 U.S. 470 (1974) (secret protection granted for processes, procedures, and
techniques developed to grow synthetic crystals useful in detecting ionizing
radiation).
48. See R. MIGmm, supra note 30, § 2.02[11 n.16.
49. See University Computing Co. v. Likes-Youngston Corp., 504 F.2d 518 (5th Cir.
1974); Hancock v. Decker, 379 F.2d 552 (5th Cir. 1967); Warrington Assocs. v. Real-
Time Eng'g Sys., 522 F. Supp. 367 (N.D. Ill. 1981); Management Science Am., Inc. v.
Cyborg Sys., 6 Comp. L Serv. Rep. (Callaghan) 921 (N.D. Il. 1978); Telex Corp. v.
IBM Corp., 367 F. Supp. 258 (ND. Okla. 1973); Com-Share Inc. v. Computer Complex,
COMPUTER/LAW JOURNAL [Vol. IV
Inc., 338 F. Supp. 1229 (E.D. Mich. 1971); Cybertek Computer Prods., Inc. v. Whitfleld,
203 U.S.P.Q. (BNA) 1020 (Cal. Super. Ct. 1977).
50. See infra notes 55-139 and accompanying text (discussion of copyright protec-
tion of computer software/firmware).
51. 17 U.S.C. § 301 (1982); See infra notes 141-69 and accompanying text (discus-
sion of pre-emption under the 1976 Act).
52. For example, Mexico and Brazil have such statutes. Many other South Amer-
ican countries have nationalistic laws limiting the importation and protection of for-
eign technology.
53. But note that non-competition agreements may not be enforceable in some
states. See, e.g., CAi Bus. & PROF. CODE §§ 16600-16602 (West 1964); R. MILGRIM,
s-upra note 30, § 3.05[11 [d).
54. See supra notes 22-26 and accompanying text (discussion of the affirmation of
the patentability of subject matter relying in part on hardware elements and
firmware). Consider the Texas Instruments "GROM" approach. Wall St. J., Mar. 4,
1983, at 25, col. 1.
19841 PROTECTION OF COMPUTER SOFTWARE
55. U.S. CONST. art. I, § 8, cl. 8; See Mazer v. Stein, 347 U.S. 201, reh'g denied, 347
U.S. 949 (1954); White v. Kimmell, 94 F. Supp. 502 (S.D. Cal. 1950), rev'd on other
grounds, 193 F.2d 744 (9th Cir. 1952), cert. denied, 343 U.S. 957 (1952).
56. Act of March 4, 1909, ch. 320, 35 Stat. 1075.
57. See generally, M. NIMMER, NMMER ON COPYRIGHT § 2.04[c] (1983).
58. But cf. Data Gen. Corp. v. Digital Computer Controls, Inc., 357 A.2d 105 (Del.
Ch. 1975) (computer software protected under both trade secrets law and common
law copyright).
59. See infra notes 136-39 and accompanying text.
60. See generally 4 COPYRIGHT, CONGRESS AND TECHNOLOGY: THE PUB. RECORD
(N. Henry ed. 1980). Computer programs were classified as "books" and were af-
COMPUTER/LAW JOURNAL [Vol. IV
forded the degree of protection offered by the copyright laws to literary works. Id. at
357.
61. See, e.g., Data Gen. Corp. v. Digital Computer Controls, Inc., 357 A.2d 105 (Del.
Ch. 1975); Data Gen. Corp. v. Digital Computer Controls, Inc., 297 A.2d 433 (Del. Ch.
1971), affd, 297 A.2d 437 (Del. 1972).
62. Pub. L. No. 95-553, 90 Stat. 2541 (1976).
63. See H.R. REP. No. 1476, 94th Cong., 2d Sess. 129-33, reprinted in 1976 U.S. CODE
CONG. & AD. NEWS 5659, 5744-49.
64. See id. at 51, 54, 56-57, 151-52; 1976 U.S. CODE CONG. & AD. NEWS at 5659, 5667,
5669-70, 5767-68; S. REP. No. 473, 94th Cong., 1st Sess. 50, 52, 54, 134 (1975). See also
FINAL REP. OF THE NAT'L COMM'N ON NEW TECHNOLOGICAL USES OF COPYRIGHTED
WORKS 16 (1978) ("It was clearly the intent of Congress to include computer pro-
grams within the scope of copyrightable subject matter in the Act of 1976.") [herein-
after cited as CONTU REP.]; Tandy Corp. v. Personal Micro Computers, Inc., 524 F.
Supp. 171 (N.D. Cal. 1981).
65. Pub. L No. 96-517, 94 Stat. 3015 (1980). The abbreviation stands for the Na-
tional Commission on New Technological Uses of Copyrighted Works.
66. 17 U.S.C § 101 (1982). A computer program is defined as a "set of statements
or instructions to be used directly or indirectly in a computer in order to bring about
a certain result." Id.
67. Id. § 117.
19841 PROTECTION OF COMPUTER SOFTWARE
68. Id.
69. Id.
70. See Williams Elects., Inc., v. Artic Int'l, Inc., 685 F.2d 870 (3rd Cir. 1982)
(copyrightability of computer programs is firmly established under the 1980 Amend-
ment to the Copyright Act).
71. H.R. REP. No. 1476, supra note 63, at 56-57; 1976 U.S. CODE CONG. & AD. NEWS
at 5669-70.
72. H.R. 6983, 97th Cong., 2d Sess. (1982). The Association of Data Processing
Service Organization (ADAPSO), a trade group whose membership consists of
software houses and service groups, proposed this Bill.
73. Id. at 2.
COMPUTER/LAW JOURNAL [Vol. IV
74
documentation.
Although copyrights can be more easily and inexpensively ob-
tained, the 1976 Act does not offer as complete a protection as the
Patent Act does. A basic principle of copyright law is that a copy-
right only protects the expression of the author's idea, not the ideas,
concepts, principles, systems, or inventions themselves. 75 Although
this copyright principle was equally true under the 1909 Act and its
predecessors, it was not until the introduction of computers that
technological advances pressed this rubric to its limit. The distinc-
tion between "idea" and "expression" was initially drawn under the
1909 Act, albeit with some difficulty, 76 but its application to the na-
ture and use of computer programs, combined with the requirement
of its compatibility with operating system hardware or software,
magnifies the effect of classification as one or the other. The distinc-
tion between particular software applications becomes vital in deter-
77
mining the value of a software copyright.
78
Consider, for example, the steps followed to obtain a ROM
with an embedded program. The analogy of a "writing" protected by
copyright law is easy at the flowchart stage, where high level lan-
guage is used by programmers to create a computer program. Even
the object code resulting from the assembly or compilation of the
source code into a machine-executable binary form can be analo-
gized to a recording of a phonograph record or a tape in a form that
the machine can recognize and play back; both items covered under
copyright law. The transposition, however, of that binary code into a
circuit design that replicates the on-off switching of the binary form
object code using sophisticated optical, electrical, photographic, and
other processes raises serious questions of copyright protectability.
Where is the authorship in this work? How can it be a protected
74. Id. at 2-3. A revised version of the ADAPSO Bill is expected to be fied during
the 98th Session of Congress.
75. 17 U.S.C. § 102(b) (1982); H.R. REP. No. 1476, supra note 63, at 56-57; 1976 U.S.
CODE CONG. & AD NEWS at 5669-70; S. REP. No. 473, supra note 64, at 54.
76. See Nichols v. Universal Pictures Corp., 45 F.2d 119 (2d Cir. 1930), cert. denied,
282 U.S. 902 (1931).
77. Compare Atari, Inc. v. Williams, 1981-1983 COPYRIGHT L. REP. (CCH) 25,412
(E.D. Cal. 1981) (audio-visual display presented no similarity of expression between
Pac Man and Jaw Breaker game displays) with Atari, Inc. v. North Am. Phillips Con-
sumer Elecs. Corp., 672 F.2d 607 (7th Cir. 1982) (audio-visual display with substantial
similarity of expression between Pac Man and K.C. Munchkin game displays); see
also Synercom Technology, Inc. v. University Computing Co., 462 F. Supp. 1003 (N.D.
Tex. 1979). See generally M. NIMMER, supra note 57, §§ 2.18(H) (3) (B), 2.18(J), 8.08.
78. ROM stands for a "read only memory" computer chip; it may be used to store
a computer's operating system software or dedicated applications program that are
sold as part of a computer system.
1984] PROTECTION OF COMPUTER SOFTWARE
79. See Data Gen. Corp. v. Digital Computer Controls, Inc., 357 A.2d 105 (Del. Ch.
1975); Data Gen. Corp. v. Digital Computer Controls, Inc., 297 A.2d 436 (Del. Ch. 1971),
affd, 297 A.2d 437 (Del. 1972).
80. 714 F.2d 1240 (3d Cir. 1983). This case was settled on January 4, 1984 without
further judicial review. The settlement provided for entry of a $2.5 million judgment
against Franklin and Franklin's agreement not to infringe Apple's copyrights in the
future, subject to Franklin's right to dispose of its inventory. Wall St. J., Jan. 5, 1984,
at 10, col. 1.
81. See CONTU REP., supra note 64, at 27 (Commissioner Hersey dissenting).
82. See, e.g., Fred Fisher Music Co. v. Dillingham, 298 F. 145 (S.D.N.Y. 1924).
83. 209 U.S. 1 (1908).
84. Id. at 18.
85. See H.R. REP. No. 1476, supra note 63, at 52; 1976 U.S. CODE CONG. & AD. NEWS
at 5659, which states that the broad language of § 201 of the Copyright Act
is intended to avoid the artificial and largely unjustifiable distinctions, de-
COMPUTER/LAW JOURNAL [Vol. IV
any other form?92 The Data General cases shed some light on this
problem. 93 These cases involved restraint of trade dealing with a
computer operating system that the owner, Data General, would not
license to a computer manufacturer that emulated the Data General
system. From a copyright perspective, the competitors wanted the
right to use Data General's operating system software with the com-
petitors' hardware, in order for their computer to be compatible with
the Data General users' applications programs. Another operating
system would necessarily have most, if not all, of the same charac-
teristics in order to be compatible; however, it probably would be
identical only if it was a direct copy. The question was whether or
not the Data General operating system design/idea was protectible
as an "expression" under copyright law. 94 The district court found
that it was, noting that there were available competitive operating
95
systems for Data General computers.
The 1976 Act affords copyright protection to subject matter cre-
ated after January 1, 1978.96 A work is considered to be created
when it is fixed in a tangible medium of expression sufficient 'to be
perceived, reproduced, or otherwise communicated for a period of
more than transitory duration. '97 Generally, copyright protection
endures for the life of the author and fifty years after the author's
death.9 8
The notice provision of the 1976 Act requires that whenever a
copyrighted work is published9 9 in the United States, or elsewhere,
92. Baker v. Selden, 101 U.S. 99 (1879) (bookkeeping system forms not protected).
In Baker the Court stated: "The description of the art in a book, though entitled to
the beneflt of copyright, lays no foundation for an exclusive claim to the art itself.
The object of one is explanation; the object of the other use. The former is secured
by copyright." Id. at 105. See also Taylor Instrument Cos. v. Fawley-Brost Co., 139
F.2d 98 (7th Cir. 1943) (charts to record temperatures not protected under copyright),
cert. denied, 332 U.S. 801 (1947). In Taylor the Court stated: "The chart is... indis-
pensable to the operation of a recording thermometer.... [T]he chart neither
teaches nor explains the use of the art. It is an essential element of the machine; it is
the art itself." Id. at 100.
93. In re Data General Corp., 1980-1 Trade Cas. (CCH) 63,219 (N.D. 1980); 529 F.
Supp. 801, 1982-1 Trade Cas. (CCH) 64,487 (N.D. Cal. 1980).
94. 529 F. Supp. at 801.
95. Id.
96. 17 U.S.C. § 302(a) (1982).
97. Id. § 101; See H.R. REP. No. 1476, supra note 63, at 52-53 (exclusion of "purely
evanescent or transient reproductions such as those ... captured momentarily in the
'memory' of a computer"); 1976 U.S. CODE CONG. & AD. NEWS at 5665-66.
98. 17 U.S.C. § 302(a) (1982).
99. Publication is defined as "the distribution of copies.., of a work to the pub-
lic by sale or other transfer of ownership, or by rental, lease, or lending [and] [t]he
offering to distribute copies. . . to a group of persons for purposes of further distribu-
tion, public performance, or public display .... " Id. § 101. A public display of a work
COMPUTER/LAW JOURNAL [Vol. IV
does not, of itself, constitute publication. Id. See also H.R. REP. No. 1476, supra note
63, at 143; 1976 U.S. CODE CONG. & AD. NEWS at 5759; S. REP. No. 473, supra note 64, at
126 (no publication upon mere display "through computer transmission"). In the
area of computer programs, it is unclear where the courts will draw the line as to
what constitutes "published" or "unpublished" programs.
100. 17 U.S.C. § 401(a) (1982).
101. 37 C.F.R. § 201.20(a)(1) (1983).
102. Id. § 201.20. This section provides that an "acceptable" notice must be "per-
manently legible to the ordinary user of the work under normal conditions of use,
and affixed to the copies in such a manner and position that, when affixed, it is not
concealed from view upon reasonable examination." Id. § 201.20(c)(1).
103. 17 U.S.C. § 401(c) (1982).
104. 37 C.F.R. § 201.20(g) (1983).
105. See, e.g., Midway Mfg. Co. v. Artic Int'l, Inc., 211 U.S.P.Q. (BNA) 1152 (N.D. Ill.
1981) (the court found that a copyright notice affixed to the cabinet near the display
screen and displayed on the screen prior to and at the commencement of display was
adequate).
106. 17 U.S.C. § 401(b) (1982).
19841 PROTECTION OF COMPUTER SOFTWARE
10 7
validity of the "(c)" form, however, it declined.
Under the Universal Copyright Convention, 0 8 only the symbol
© is authorized. 10 9 Compliance with the Universal Copyright Con-
vention requirement is important for copyright protection outside of
the United States, unless the copyright proprietor intends to rely
solely on other conventions.1 10 The acceptability of "(c)" notices for
this purpose is generally left to determination by the forum country.
Another subject of controversy is whether or not use of the
copyright notice on software or related materials negates trade se-
cret protection. The argument for negation has been expressed in
various forms, including estoppel,"' and waiver or election. 112 To
date, the courts have not adopted the view that use of a copyright
notice alone forfeits trade secret protection." 3 In adopting regula-
tions on affixation of copyright notices, the Copyright Office explic-
itly declined to treat the presence of a copyright notice as evidence
that the work had been published, thus supporting the view that
107. Copyright Office Circular 61 (1964), 46 Fed. Reg. 58,307 (1981). The Copyright
Office stated:
Section 401(b) (1) of the Act specifies that one of the elements contained in
the notice shall be the symbol ©. . . the Copyright Office has no authority to
alter this requirement .... Although the print matrices may not presently
be equipped to print the symbol ©, they can presumably print either of the
alternative indicia....
Id. at 58,310.
108. Much of copyright protection for U.S. citizens under foreign law is obtained
by virtue of the Universal Copyright Convention. See generally M. NIMMER, supra
note 57, §§ 5.05(B) (2) (d), 17.04(B).
109. UNIVERSAL COPYRIGHT CONVENTION art. I1 (1), 25 U.S.T. 1341 (1974).
110. A citizen of the U.S. may still obtain copyright protection even if the nation in
which he seeks such protection is not a party to the Universal Copyright Convention.
There are several bilateral treaties to which the U.S. is a party that would afford such
protection in China (33 Stat. 2208 (1903) & 63 Stat. 1300, 1368-9 (1946)), Hungary (37
Stat. 1631 (1912)), and Thailand (53 Stat. 1731 (1937)). In addition, American copy-
right owners may obtain copyright protection under the Berne Convention to which
the U.S. is not a party and the Buenos Aires Convention, to which the U.S. is a signa-
tory, by following the prescribed requirements. See N. NndmER, supra note 57,
§ 4.01[c] n.35.
111. For example, that the notice is an admission of publication inconsistent with
confidentiality.
112. For example, that the claim of federal copyright is inconsistent with the pres-
ervation of state trade secret relief.
113. See Technicon Medical Information Sys. v. Green Bay Packing, 211 U.S.P.Q.
(BNA) 1001 (E.D. Wis. 1980) (the mere act of affixing a copyright notice does not void
a claim of secrecy under state trade secrets law); Management Science Am., Inc. v.
Cyborg Sys., 6 Computer L Serv. Rep. (Callaghan) 921 (N.D. m11.1978) (affixing a
copyright notice does not preclude a claim of secrecy). See also M. Bryce & Assocs. v.
Gladstone, 107 Wis. 2d 241, 319 N.W.2d 902 (Ct. App. 1982) (owner's use of federal
copyright notice did not prevent the state from applying its trade secrets law), cert.
denied, 103 U.S. 258 (1983).
COMPUTER/LAW JOURNAL [Vol. IV
114. The Copyright Office declined the proposed wording that "presence of a copy-
right notice should not be construed as evidence that the work. . . has, in fact, been
published or as an admission that notice is required," but stated that "affixation of
copyright notice may not necessarily evidence publication." 46 Fed. Reg. 58,307-08
(1981).
115. Section 401(b) requires that the form of copyright notice contain the follow-
ing "(1) the symbol © (the letter C in a circle), the word 'Copyright,' or the abbrevia-
tion 'Copr.', and (2) the year of first publication of the work, and (3) the name of the
owner of copyright in the work...." 17 U.S.C. § 401(b) (1982).
116. Id. § 405.
117. See id. § 406(b), (c).
118. See id. §§ 403, 405(a).
119. Id. § 405(a)(1).
120. Id. § 405(a)(3).
19841 PROTECTION OF COMPUTER SOFTWARE
rather than mere availability of deposited materials. See Carson Prods. Co. v.
Califano, 594 F.2d 453 (5th Cir. 1979); Franke v. Wiltscheck, 209 F.2d 493 (2d Cir. 1953).
138. See Copyright Office Guide Letter R-70 (July, 1981).
139. See Copyright Office Circular R7c.
140. See supra text accompanying note 115.
COMPUTER/LAW JOURNAL [Vol. IV
will suffice; but if the idea is available from the copyrighted work it-
self, then trade secret protection adds another dimension.
Thus, if marketing is restricted to the licensing of software with
express limitations on assignment, resale, adaptation, improvement,
enhancement, modification, reverse assembly, and compilation, as
well as reservation of all rights afforded by copyright, the dual pro-
tection of trade secret law and copyright will cover the weaknesses
inherent in copyright protection of software.
Section 301 of the 1976 Copyright Act in any way preempted these and other
forms of state law protection for computer software [i.e. trade secret or unfair
competition]. On the basis of this advice and advice of its own counsel the
Committee concluded that state remedies for protection of computer
software are not limited by this bill.
Id. See CONTU REP., supra note 64, at 18.
146. See B.P.I. Sys. v. Leith, 532 F. Supp. 208 (W.D. Tex. 1981); Warrington Assocs.
v. Real-Time Eng'g Sys., 522 F. Supp. 367 (N.D. Ill. 1981); Walker v. University Books,
Inc., 382 F. Supp. 126 (N.D. Cal 1974) (Kewanee establishes that claim for misappro-
priation of trade secrets based on state law may exist independently of copyright pro-
tection), affid, 602 F.2d 859 (9th Cir. 1979); M. Bryce & Assocs. v. Gladstone, 107 Wis.
2d 241, 319 N.W.2d 902 (Ct. App. 1982). Cf.Technicon Medical Information Sys. Corp.
v. Green Bay Packaging, Inc., 211 U.S.P.Q. (BNA) 343 (E.D. Wis. 1980); Bromhall v.
Rorvik, 478 F. Supp. 361 (E.D. Pa. 1979) ("ideas" not copyrightable, hence misappro-
priation claim not preempted); Management Science Am., Inc. v. Cyborg Sys., 6 Com-
puter L Serv. Rep. (Callaghan) 921 (N.D. Ill. 1978).
Questions have been raised about the strength of trade secret protection. See,
e.g., Avco Corp. v. Precision Air Parts, Inc., 210 U.S.P.Q. (BNA) 894 (M.D. Ala. 1980)
(trial court held trade secrets claim equivalent to copyright under certain circum-
stances and preempted, appellate court affirmed on statute of limitations grounds),
azffd on other grounds, 676 F.2d 494 (11th Cir. 1982), cert. denied, 51 U.S.L.W. 3419
(1983); Harper & Row Publishers, Inc. v. Nation Enters., Inc., 501 F. Supp. 848
(S.D.N.Y. 1980) (preemption of conversion claim); Mitchell v. Penton Indus. Publish-
ing Co., 486 F. Supp. 22 (N.D. Ohio 1979) (broad misappropriation claim of plaintiff
preempted even though certain types of misappropriation not preempted). Compare
Bromhall v. Rorvik, 478 F. Supp. 361 (E.D. Pa. 1979) (no preemption of "idea" protec-
tion) with Hoehling v. Universal City Studios, Inc., 618 F.2d 972 (2d Cir. 1980) (pre-
emption of "fact" protection). See also J & K Computer Sys. v. Parrish, 642 P.2d 732
(Utah 1982) (preemption defense to trade secret claim could not be raised on appeal
for first time).
147. 416 U.S. 470 (1974). See supra note 47 and accompanying text.
148. 412 U.S. 546 (1973).
149. Id. at 550-51.
150. Pub. L. 92-140, 85 Stat. 391 (codified at 17 U.S.C. §§ 1(f), 5(n), 19, 20, 26, 101(e)
(1982)).
COMPUTER/LAW JOURNAL [Vol. IV
not preempt the California lawi51 despite the Court's previous deci-
sions in Sears, Roebuck & Co. v. Stiffel Co.,152 and Compco Corp. v.
Day-Brite Lighting I s 3 that recognized a congressional policy of es-
tablishing uniform laws throughout the United States in order to
protect original writings.1 5 4 The Court distinguished the
Sears/Compco cases on the grounds that they dealt with high stan-
dards of patentability for mechanical designs and arose in an unfair
competition context. 5 5 The Goldstein Court reasoned that the area
of sound recordings had been left "unattended" by Congress and
therefore was open to state regulation, so long as the regulation did
not interfere with the operation of the copyright laws. 5 6 Goldstein
specifically held that the copyright clause of the United States Con-
15 7
stitution did not vest exclusive power in Congress over "writings.'
In Kewanee Oil Co. v. Bicron Corp.,158 the Supreme Court simi-
larly held that the patent clause of the Constitution did not vest ex-
clusive power in Congress over "discoveries"' 1 9 and that Ohio trade
secret law was not preempted by federal patent law. 60 Moreover,
the Court held that this holding was not contrary to the
Sears/Compco cases, thereby allowing the Sears/Compco holdings
to stand.' 6 ' What is particularly interesting about both the Gold-
stein and Kewanee decisions is precisely how they distinguished
the Sears/Compco cases without overruling them. Both Goldstein
and Kewanee discuss the similarity of goals between the patent,
copyright, and trade secret laws, and the state regulation concerning
the wrongs sought to be redressed in each case; economic issues
and the public interest are also discussed. Goldstein was less
straightforward, in that the Court created a concept of national ver-
rights" under the 1976 Act and the CONTU Amendment. It appears
that Congress seriously considered the limiting effect of Goldstein
and Kewanee on the Sears/Compco cases as section 301 evolved.
This line of cases, read in conjunction with the 1976 Copyright Act,
indicates that an expansive reading should not be given to the
Sears/Compco doctrine; had Congress intended to preempt trade
secret law, it would have explicitly done so.
VII. CONCLUSION
If possible, dual protection under both copyright and trade
secrets law should be utilized to protect software. If trade secret
protection is unavailable due to marketing or other considerations,
then software should be protected by copyright means alone. In
either event, the copyright should be registered with the Copyright
Office as an unpublished work and a notice similar to the one set
out above 170 should be included to protect against inadvertent publi-
cation of the unpublished software.