Andrew Bunner was one

Similar documents
Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes:

ADDITIONAL DEVELOPMENTS-CONSTITUTIONAL LAW

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA SACRAMENTO DIVISION ) ) ) ) ) ) ) ) ) ) ) ) ) E.D. Case No.

Prosecuting the Press for Publishing Classified Information

The Where, When And What Of DTSA Appeals: Part 2

intellectual property law ideas on License to sue Virtually liable Heavy lifting Copyright Office allows expanded DMCA circumvention

Media-Prior Restraint

Protection of trade secrets through IPR and unfair competition law

Covenants Not to Compete in Utah: A Useful Tool for Employers

Title 10: COMMERCE AND TRADE

THE BALANCE BETWEEN ANTITRUST AND INTELLECTUAL PROPERTY LAW

Public Concern - A "Newsworthy" Exception to the Grant of Preliminary Injunctions in Trade Secret Cases

FREEDOM OF SPEECH AND FREEDOM OF PRESS

THE FIRST AMENDMENT TO THE U.S. CONSTITUTION 1

WHAT S HAPPENING TO THE ATTORNEY-CLIENT PRIVILEGE AND WORK PRODUCT DOCTRINE?

ABA Section of Business Law. Audit Response Letters in the New Environment. November 19, Stanley Keller, Chair.

Computer Security Versus the Public's Right to Know

HDCP RESELLER ASSOCIATE AGREEMENT W I T N E S S E T H

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA

Case 3:17-cv LB Document 1 Filed 07/17/17 Page 1 of 11

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF NORTH CAROLINA ASHEVILLE DIVISION 1:08cv230

TERMS AND CONDITIONS

Norway. Norway. By Rune Nordengen, Bull & Co Advokatfirma AS

Privileges Associated with Product Safety Teams

II. CONSTITUTIONAL CHALLENGE

Ownership of Site; Agreement to Terms of Use

Skyrocket LLC Terms of Use for

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Enrolled. Senate Bill 505

Successfully Defending Patents In Inter Partes Reexamination And Inter Partes Review Proceedings Before the USPTO. Matthew A. Smith 1 Sept.

- 6 - the statement will not be filed and will not be a part of the Court s file in the case.

CONSOLIDATED TEXT REFLECTS CHANGES MADE DURING THE SEPTEMBER 2010 TOKYO ROUND. Consolidated Text. Anti-Counterfeiting Trade Agreement

"Certification Authority" means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates.

Terms of Use for the REDCap Non-Profit End-User License Agreement

Trade Secrets Acts Compared to the UTSA

TERMS OF SERVICE Effective Date: March 30 th, 2017

Observations on The Sedona Principles

United States Court of Appeals

THE IMPORTANCE OF TRADE SECRET PROTECTION

GERMAN COMPETITION LAW CHANGES: NEW RULES ON MERGER CONTROL, MARKET DOMINANCE, DAMAGES CLAIMS, AND CARTEL FINES

Patent Law in Cambodia

License Agreement. 1.4 Named User License A Named User License is a license for one (1) Named User to access the Software.

7 Problems Surrounding Intellectual Property Rights under Private International Law

D R A F T : N O T F O R D I S T R I B U T I O N

A Brave New World of Defamation and Libel on the Web

VideoBlocks.com Royalty Free License Agreement

SDL Web Click Wrap DEVELOPER SOFTWARE AND DISTRIBUTION AGREEMENT RESTRICTED TO USE BY DEVELOPERS. Terms and Conditions

In the Supreme Court of the United States

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

COMMERCIAL EVALUATION LICENSE AGREEMENT PURDUE RESEARCH FOUNDATION [ ] PRF Docket No.:

Complaints against Government - Judicial Review

Client Privilege in Intellectual Property Advice

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

ORDER FORM CUSTOMER TERMS OF SERVICE

3T Software Labs EULA

AIA Post-Grant Implementation Begins - Is Your Business Strategy Aligned? August 27, A Web conference hosted by Foley & Lardner LLP

AnyComms Plus. End User Licence Agreement. Agreement for the provision of data exchange software licence for end users

Germany. Stefan Abel and Pascal Böhner. Bardehle Pagenberg

Act No. 2 of the Year A.D relating to Patents, Utility Models, Integrated Circuit Layouts and Undisclosed Information

1. If you have not already done so, please join the conference call.

Case 1:08-cv LPS Document 601 Filed 07/26/10 Page 1 of 57 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Politicians as Media Producers

GENERAL USE PROVISIONS

Terms of Use. 1. Limited Use

ADVANCED ACCESS CONTENT SYSTEM ( AACS ) RESELLER AGREEMENT

2013 Thomson Reuters. No claim to original U.S. Government Works. 1

Privacy & the media. Traditional and emerging protections in an online world.

Changing Landscape, US and Abroad 2017 In House Counsel Conference

AUGUR SITE TERMS OF USE

the Notices section below.

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

WEBSITE TERMS OF USE VERSION 1.0 LAST REVISED ON: JULY [25], 2014

1. ISSUING AGENCY: The City of Albuquerque Human Resources Department.

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

Defend Trade Secrets Act: What You Need to Know. May 31, 2016

THE SUPREME COURT'S DECISION IN

Website Terms of Use

IN-HOUSE COUNSEL AND PRIVILEGE ISSUES. B. John Pendleton, Jr. DLA Piper LLP (US) 21 September 2012

The Defend Trade Secrets Act: New Rights and Obligations for U.S. Employers

Dispute Resolution Service. Guide to Arbitration Clauses

HDCP CONTENT PARTICIPANT AGREEMENT

No IN THE SUPREME COURT OF WASHINGTON FREEDOM FOUNDATION, CHRISTINE O. GREGOIRE, in her official capacity as Governor,

FLEXE.COM TERMS OF SERVICE. (Last Revised: June 1, 2016)

Freedom of Information and Members correspondence with Public Authorities

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016

Chapter 1. Court Systems, Citation, and Procedure. Learning Objectives

OTTO Archive, LLC CONTENT LICENSE AGREEMENT

JW PLASTIC SURGERY. Terms of Service

IRB RELIANCE EXCHANGE PORTAL AGREEMENT

Municipal Code Online Inc. Software as a Service Agreement

Student Worksheet Manning Case Challenges Definition of Whistleblower

Discovery in a patent infringement suit in Japan particularly about secrecy order (protective order)

Intellectual Property Issue-Spotting for the General Practitioner

In re Social Networking Inquiry NCBE DRAFTERS POINT SHEET

October 17, 2017 No Let States Regulate Sports Gambling within their Borders EMBARGOED

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Satya Narayan, Attorney, Royse Law Firm, Palo Alto, Calif.

EMPLOYMENT CONTRACT. This Employment Contract (this "Contract") is made effective as of July 10, 2015, by and between Company of,,, and of,,,.

Washington, DC Washington, DC 20510

Welcome to Gym Launch. We look forward to helping You grow Your on-line sales beyond anything You have done before, so You can take Your business as

Terms of Service and Use Agreement

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA

Transcription:

Pamela Samuelson Trade Secrets vs. Free Speech How to balance the benefits of free speech and the need for secrecy. ROBERT NEUBECKER Andrew Bunner was one of several hundred persons who posted a computer program known as DeCSS on the Internet in the fall of 1999. DeCSS enables users to bypass the Content Scramble System (CSS) used to protect DVD movies. Two months later, DVD Copy Control Association (DVD CCA) charged Bunner and 520 others (including 500 John Does ) with trade secret misappropriation, claiming the defendants posted DeCSS on the Internet, knowing or having reason to know that it embodied or was substantially derived from trade secrets stolen by Jon Johansen, a Norwegian teenager, who, they claimed, reverse engineered CSS secrets in violation of an anti-reverse engineering clause of a DVD player shrinkwrap license. Bunner s main defense was that DeCSS was First Amendmentprotected speech that he and others were entitled to republish. In January 2000, a California judge issued a preliminary injunction forbidding Bunner from posting DeCSS on the Internet or otherwise disclosing CSS secrets. The California Court of Appeal, assumed (without deciding) that DVD CCA had shown a reasonable likelihood of success on the merits of the trade secret claim (a necessary finding for a preliminary injunction to issue), but agreed with Bunner that DeCSS in source code form was First Amendmentprotected speech and that the preliminary injunction was an unconstitutional prior restraint on speech. The California Supreme Court agreed to hear DVD CCA s appeal almost a year ago, but has yet to schedule argument in the case. A previous column ( Reverse Engineering Under Siege, Oct. 2002) explained why Bunner should have won this case on trade secret grounds: first, because reverse engineering of a mass-marketed product is a proper way to acquire a trade secret, notwithstanding a shrinkwrap license provision prohibiting it, and second, because DeCSS has been so widely published on the Internet that any CSS secrets it might have contained have dissipated. In this column, I will consider the merits of Bunner s free speech defense. Defending Free Speech In response to DVD CCA s motion for a preliminary injunction, Bunner filed a document with the court (known as a declaration) stating he had learned about DeCSS from reading postings on the slashdot.org Web site and decided to post DeCSS in source code form on his Web site in order to aid those who, like COMMUNICATIONS OF THE ACM June 2003/Vol. 46, No. 6 19

In rare instances, however, the First Amendment may trump trade secret rights, and Bunner may be such a case. himself, wanted to play DVDs on computers running the GNU/Linux operating system and to aid open source development of a Linux-based DVD player. Publishing a text on the Internet in order to communicate the ideas and information it contains seems to be the kind of activity the First Amendment is meant to protect. The trial judge, however, thought so little of Bunner s First Amendment defense that his opinion did not even mention such a defense had been raised. The California Court of Appeal, in contrast, found the First Amendment defense quite compelling. The court agreed with Bunner that the DeCSS program in source code form was First Amendment-protected expression, which he had a First Amendment right to republish. Regardless of who authored the program, the court said, DeCSS is a written expression of the author s ideas and information about decryption of DVDs without CSS. (The court hinted, without deciding, that object code would be treated differently.) The Court of Appeal characterized the preliminary injunction against publication of DeCSS source code as a regulation of pure speech and a classic prior restraint that bears a heavy presumption against its constitutional validity. The court invoked New York Times v. United States, the Supreme Court s famous decision refusing to enjoin publication of the Pentagon Papers by the New York Times and Washington Post. The Court of Appeal opined that DVD CCA s statutory right to protect its economically valuable trade secret is not an interest that is more fundamental than the First Amendment right of free speech or even on an equal footing with the national security interests and other vital interests that have previously been found insufficient to justify a prior restraint. Hence, it concluded that Bunner s First Amendment defense was sound. The court did not rule out the possibility of permanent injunctive relief if DVD CCA won on the merits (not seeming to realize that allowing CSS secrets to be published on the Internet prior to trial would dispel the secrets and render the claim moot). The concept of prior restraint may not be familiar to many Communications readers; here s the basic idea. The First Amendment was added to the U.S. Constitution because the founders wanted to ensure the new government they were establishing would not be able to prevent critical commentary about the government from being spoken or published, as the British had done prior to the American Revolution. Protecting free speech and a free press was deemed essential to maintaining a free and democratic society. Let people say what they have to say, and if they have violated the law in so saying, punish them afterward. In the famous Pentagon Papers case, for example, the New York Times and Washington Post knew Daniel Ellsberg had purloined the Pentagon Papers they were publishing, and the newspapers risked civil and criminal liability for publishing excerpts from them. However, the Supreme Court decided that even a serious risk of damage to U.S. national security interests did not justify a prior restraint on publication of these documents. The default principle of First Amendment law, then, is to place responsibility on a speaker or publisher to weigh the consequences of possible civil or criminal liability for wrongful speech or publication and to trust that rational assessments of risk will generally deter illegal speech and publication. For the most part, this system works quite well. Before charging a public official with corruption, for example, newspapers tend to double-check 20 June 2003/Vol. 46, No. 6 COMMUNICATIONS OF THE ACM

their facts. This makes news reports more reliable than they might otherwise be, and it also reduces the risk the papers will be sued for millions of dollars in damages for libel. It seems fair to assume the risk of civil and criminal liability substantially deters wrongful disclosures of trade secrets as well as other wrongful speech acts. Spectrum of Theories The trial court decision in Bunner is consistent with the theory that trade secret lawsuits are categorically immune from First Amendment/free speech scrutiny. The judge did not expressly endorse this view, but did so implicitly by ignoring that a First Amendment defense had even been raised. The Court of Appeal decision embraced a polar opposite theory under which preliminary injunctions against disclosure of trade secrets are constitutionally suspect on First Amendment grounds. Briefs submitted by DVD CCA to the California Supreme Court argue that the Court of Appeal s decision will eviscerate trade secrecy law in the state of California. Neither extreme theory is tenable, in my view. Preliminary and permanent injunctions are routinely granted in trade secret cases without offending the First Amendment, and this is as it should be. In the ordinary trade secret case, the misappropriator of trade secrets is an errant licensee, a faithless employee or former employee, an abuser of confidences, a trickster who uses deceit or other wrongful means to obtain the secrets, or a knowing recipient of misappropriated information trying to free-ride on the trade secret developer s investment. In such cases, injunctions merely require persons to abide by express or implicit agreements they have made, respect the confidences under which they acquired secrets, and refrain from wrongful acts vis-à-vis the secrets. The First Amendment does not give anyone the right to engage in unfair competitive activity of the sort that trade secrecy law typically regulates. In rare instances, however, the First Amendment may trump trade secret rights, and Bunner may be such a case. In the small number of trade secret cases in which free speech defenses have succeeded, the alleged misappropriator had neither a contractual nor confidential relationship with the trade secret claimant, and had neither engaged in any wrongful acts in acquiring information, nor aided or abetted the misappropriation, but was merely a recipient of allegedly misappropriated information. In an Oregon case, Sports Management News, Inc. v. Nachtigal, for instance, Adidas charged SMNI with trade secret misappropriation for publishing information about future sneaker designs. Adidas asserted these designs were its trade secrets, that its employees were under obligations not to disclose this information, and SMNI either knew or should have known it was publishing misappropriated trade secrets. A trial judge issued a preliminary injunction against publication of any further information about Adidas designs and ordered SMNI to submit information it planned to publish about Adidas designs to the court for its approval prior to publication. The Oregon Supreme Court agreed with SMNI that this was an unconstitutional prior restraint on speech and lifted the trial court s injunction. Unfortunately, the U.S. Supreme Court has provided little or no guidance about how to resolve conflicts between trade secrets and the First Amendment. Trying to predict how the Supreme Court would rule in Bunner is difficult given that First Amendment law is not entirely consistent. Various theories exist about how much speech the First Amendment protects and why. Some scholars take a narrow view and believe the First Amendment only protects against prior restraints of political speech. However, the Supreme Court has protected many other kinds of speech, including commercial speech (for example, advertisements), art, and entertainment. At least two appellate courts have decided that computer programs, at least in source code form, are First Amendment-protected speech (and the Court of Appeal in Bunner relied on these cases). Code As Speech Universal City Studios v. Corley was one of the decisions that COMMUNICATIONS OF THE ACM June 2003/Vol. 46, No. 6 21

From the standpoint of computer technologists, it may seem strange, or even perverse, for courts to consider making a distinction between source and object code. ruled computer programs can be First Amendment-protected speech. As some readers may know, Corley also involved an injunction against the posting of DeCSS on the Internet (although Corley involved a permanent injunction after trial on the merits, not a preliminary injunction, as in Bunner). Although Corley was also a defendant in Bunner, he didn t appeal that trial court decision, perhaps because he was so intensely engaged in the parallel lawsuit brought by seven major motion picture firms that charged him with violating the Digital Millennium Copyright Act (DMCA) anti-circumvention rules. The Second Circuit Court of Appeals rejected Corley s First Amendment defense and expressly took issue with the Court of Appeal s First Amendment analysis in Bunner. The Second Circuit decided that the functionality of computer program code limited the extent of First Amendment protection courts should accord to code. Corley posted DeCSS in object code form. In that form, DeCSS can fairly be described as a technology primarily designed to bypass a technical measure (CSS) that copyright owners were using to control access to their works (that is, DVD movies), which is what the DMCA anticircumvention rules prohibit from being distributed. Although the Second Circuit enjoined Corley from posting either source or object code forms of DeCSS, it did not discuss the source vs. object code distinction, and its rationale for the broad injunction is more persuasive as to object code than as to source code. From the standpoint of computer technologists, it may seem strange, or even perverse, for courts to consider making a distinction between source and object code. In most respects, these forms of programs are equivalent, and there is, of course, no firm way of distinguishing between them, given it is possible for source code to be directly executed and that some humans can read object code. From the standpoint of First Amendment law, however, it matters whether a person who posts code on the Internet is trying to communicate ideas and information in the program with others in his field or community, or whether the code is being disseminated to enable execution of its functionality. If some defendants in Bunner posted DeCSS as part of a protest against the motion picture industry s aggressive assertions of intellectual property rights or in order to educate people about how CSS works, courts might view these postings differently than postings for purposes of encouraging people to use DeCSS to infringe copyrights in DVD movies. From a First Amendment standpoint, it may make a difference whether someone has posted source or object code, as well as whether he or she posted the program in order to communicate with others about its contents or for other purposes. It is, of course, possible for object code to be disseminated for expressive purposes (for example, as a proof of an algorithmic concept), but object code may more commonly be distributed for non-expressive purposes. But expressiveness and communicative intent are key determinants in First Amendment cases. Ironically, lawyers for DVD CCA and for Bunner are both disinclined to distinguish between source and object code. DVD CCA wants an injunction against both forms of DeCSS, and Bunner s lawyers want the First Amendment to protect object as well as source code. The Right Outcome in Bunner Trade secret law has internal limiting principles that generally suffice to avert conflicts between trade secrets and the First Amendment. Trade secrecy is inherently leaky because secrets are susceptible to reverse engineering, independent discovery, or accidental disclosure, all of 22 June 2003/Vol. 46, No. 6 COMMUNICATIONS OF THE ACM

which trade secrecy law considers as fair means of acquiring secrets. For example, in Chicago Lock v. Fanberg, a court refused to enjoin publication of a compilation of key code information that Chicago Lock considered to be its trade secrets because its authors, the Fanbergs, had acquired the key code information by reverse engineering Chicago locks for their customers and from fellow reverse-engineering locksmiths. Publishing this book was lawful as a matter of trade secret law because reverse engineering is a lawful means of acquiring trade secrets. There was no need to invoke the First Amendment because limiting doctrines of trade secrecy law resolved the dispute. Similarly, the Washington Post was able to persuade a court to dismiss a trade secret misappropriation claim brought by the Religious Technology Center based on the Post s publication of excerpts of Scientology texts in its newspaper, even though the Post knew that RTC claimed proprietary rights in these texts. Documents embodying RTC s secrets had been posted on the Internet for 10 days as well as available in unsealed court records in California. Because of this, the judge dismissed the claim, saying that information in the documents was no longer secret. Again, it was unnecessary to invoke the First Amendment because limiting doctrines of trade secrecy law protected the Post s publication of this information. The same limiting principles should have been applied in Bunner, making resort to the First Amendment unnecessary. Bunner republished information obtained from reverse engineering of a mass marketed product by a person remote in time and place from him. In addition, many people had published this information on the Internet before he did, and as a consequence, the secrets leaked out. If the California Supreme Court decides Bunner violated that state s trade secrecy law, the First Amendment defense should be taken seriously. Unlike the usual defendant in a trade secret case, Bunner did not have a contractual or confidential relationship with DVD CCA, and he engaged in no unlawful conduct in obtaining access to DeCSS. Hence, the usual rationale for enjoining disclosure of trade secrets does not apply. Bunner published source, not object, code and he did so for a communicative purpose. While the contents of DeCSS are obviously of far less public importance than the contents of the Pentagon Papers, the First Amendment protects many communications of similar or lesser importance. On balance, Bunner does have a solid First Amendment defense. Let s hope the California Supreme Court recognizes it. c Pamela Samuelson (pam@sims.berkeley. edu) is a Chancellor s Professor of Law and Information Management at UC Berkeley. 2003 ACM 0002-0782/03/0600 $5.00 COMMUNICATIONS OF THE ACM June 2003/Vol. 46, No. 6 23