`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA
`
`CHARLESTON DIVISION
`
`
`
`CSS, INC.,
`
`
`Plaintiff,
`
`
`
`
`
`
`
`
`v.
`
`CHRISTOPHER HERRINGTON, et al.,
`
`
`
`
`
`
` CIVIL ACTION NO. 2:16-cv-01762
`
`Defendants.
`
`
`
`AMENDED MEMORANDUM OPINION AND ORDER
`
`Pending before the court is Plaintiff’s Motion for Preliminary Injunction
`
`[ECF No. 65]. For the following reasons, the Motion is DENIED.
`
`I.
`
`Background
`
`The plaintiff, CSS, Inc. (“CSS”), has asked the court to preliminarily enjoin
`
`defendants, Christopher Herrington, Gene Yoho, and Compiled Technologies, LLC
`
`(collectively, “CT”), from “advertis[ing], licens[ing], offer[ing] to license, sell[ing] or
`
`otherwise mak[ing] available for use” CT’s land indexing and estate management
`
`software; “offer[ing] or . . . provid[ing] support services” for CSS’s software; or
`
`“mak[ing] use of any trade secrets, confidential information or proprietary
`
`information of CSS.” Pl.’s Mot. Prelim. Inj. 1 [ECF No. 65]. However, CSS is unable
`
`to show a likelihood of success on any of the claims presently before the court, that
`
`irreparable harm will occur absent the injunction, that the balance of the hardships
`
`weighs in its favor, nor that an injunction is in the public interest. Thus, a
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 2 of 49 PageID #: 4218
`
`preliminary injunction is not warranted.
`
`II.
`
`Procedural History
`
`CSS filed its Complaint [ECF No. 1] on February 23, 2016. On September 16,
`
`2016, CSS filed its First Amended Complaint. First Am. Compl. [ECF No. 59]. CSS
`
`brings actions against CT for copyright infringement, breach of contract, violation of
`
`the duty of loyalty, tortious interference with business relationships, and
`
`misappropriation of trade secrets under the West Virginia Uniform Trade Secrets Act
`
`(“WVUSTA”). In their Answer, CT filed a counterclaim against CSS for tortious
`
`interference. Answer 11 [ECF No. 61].
`
`On November 23, 2016, CSS filed Plaintiff’s Motion for Preliminary Injunction
`
`wherein it asserted that it was likely to succeed on its copyright infringement,
`
`misappropriation of trade secrets claims, and breach of contract. Pl.’s Mot. Prelim.
`
`Inj. [ECF No. 65]. CT responded on December 13, 2016. Defs. Mem. Opp. Pls. Mot.
`
`Prelim. Inj. [ECF No. 68]. On December 16, 2016, CSS moved for an extension of time
`
`to reply to the defendants’ response. Unopposed Mot. for Extension of Time to File a
`
`Reply to Defs. Mem. Opp. Pls. Mot. Prelim. [ECF No. 72]. I granted this Motion
`
`[ECF No. 73], and CSS filed a Reply Brief [ECF No. 74] on December 29, 2016.
`
`On January 25, 2017, the court conducted a hearing on the Plaintiff’s Motion
`
`for Preliminary Injunction. Prelim. Inj. Mot. Hr’g [ECF No. 82]. Because of the
`
`volume and length of evidence put forth, the hearing could not be completed in one
`
`afternoon. This matter was continued to February 23, 2017, and it was ultimately
`
`completed on February 24, 2017. See Order Continuing Prelim. Inj. Hr’g
`
`2
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 3 of 49 PageID #: 4219
`
`[ECF No. 84]; Mot. Hr’gs [ECF Nos. 89, 90]. On March 22, 2017, both parties filed
`
`their proposed findings of fact and conclusions of law. [ECF Nos. 106, 109, 110]. CSS’s
`
`Motion is ripe for my review.
`
`III. Findings of Fact
`
`I need only make findings of fact pertinent to determining whether a preliminary
`
`injunction should issue. I FIND that the facts of this case are as follows:
`
`1. CSS is a company that provides software and related support services to local
`
`government entities, namely county clerks in West Virginia. See Hr’g Tr., Jan.
`
`25, 2017, Auburn Direct, 28:1–9.
`
`2. CSS has been in business since 1983. See Hr’g Tr., Feb. 23, 2017, D. Herrington
`
`Direct, 105:11.
`
`3. Kofile acquired CSS in May 2014. See Hr’g Tr., Jan. 25, 2017, Auburn Direct,
`
`39:18–19.
`
`4. For over twenty years, CSS has provided various software solutions including:
`
`a land records indexing package, an estate management package as well as
`
`utility billing, sheriff’s tax collection, and other applications. See Hr’g Tr., Jan.
`
`25, 2017, Auburn Direct, 28:1–4.
`
`5. Defendant Christopher Herrington was first employed by CSS in October 1991.
`
`See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct, 157:8–12, 190:14–15.
`
`6. Christopher Herrington worked at CSS in the computer software, applications,
`
`and programming business related to county government information and
`
`document management systems. See Hr’g Tr., Feb. 23, 2017, C. Herrington
`
`3
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 4 of 49 PageID #: 4220
`
`Direct, 157:8–12; see also Hr’g Tr., Jan. 25, 2017, Auburn Direct, 42:10–13.
`
`7. During most of his employment with CSS, Christopher Herrington was a
`
`programmer, and his work included development of CSS’s software, bug fixes,
`
`and modifications. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 14:14–23, 16:22–
`
`17:5.
`
`8. Christopher Herrington also provided support for CSS software packages. Id.
`
`at 15:13–23.
`
`9. Christopher Herrington’s duties included programming responsibilities and
`
`support responsibilities for both the CSS land indexing software and the CSS
`
`estate management software. Id. at 16:2–9.
`
`10. On August 23, 2014, Christopher Herrington resigned as an employee of CSS.
`
`See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct, 190:14–15.
`
`11. On September 6, 2014, Christopher Herrington returned to CSS. See Hr’g Tr.,
`
`Feb. 23, 2017, C. Herrington Direct, 203:22–24.
`
`12. On September 12, 2014, Christopher Herrington was required to sign a
`
`confidentiality agreement. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 44:14–
`
`45:2.
`
`13. CSS had never required Christopher Herrington to sign a confidentiality
`
`agreement prior to September 12, 2014. See Hr’g Tr., Feb. 23, 2017, McCasker
`
`Redirect, 97:6–17; see also Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 239:3–
`
`8.
`
`14. Christopher Herrington was employed by CSS until June 5, 2015. See Hr’g Tr.,
`
`4
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 5 of 49 PageID #: 4221
`
`Feb. 23, 2017, C. Herrington Direct, 203:22–24.
`
`15. On August 12, 2015, Gene Yoho formed CT. See Hr’g Tr., Feb. 24, 2017,
`
`C. Herrington Direct, 43:19–44:5.
`
`16. Gene Yoho and Christopher Herrington operate CT. See Hr’g Tr., Feb. 24,
`
`2017, C. Herrington Direct, 43:19–44:5.
`
`17. CT is in the business of licensing custom computer software applications. CT
`
`offers one program for land records recording and indexing and one for an
`
`estate management application. See Hr’g Tr., Feb. 24, 2017, C. Herrington
`
`Direct, 44:3–5; see also Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 242:9–11.
`
`18. CT also provides support services to county clerks’ offices related to these
`
`applications. See Hr’g Tr., Feb. 23, 2017, C. Herrington Cross, 242:9–11.
`
`19. CT competes with CSS for West Virginia county clerk contracts. See Hr’g Tr.,
`
`Feb. 24, 2017, C. Herrington Direct, 43:19–44:5.
`
`20. CT’s code is not a literal1 copy of CSS’s code. See Mot. by Defs. for Leave to
`
`File Under Seal Ex. 1, at 26 [ECF No. 70-1] (“McCasker Expert Report”); see
`
`also Hr’g Tr., Feb. 23, 2017, McCasker Cross, 9:7–10.
`
`21. The programming language RM/COBOL (“COBOL”) was used in the software
`
`of both CSS and CT. See McCasker Expert Report at 25; see also Mot. by Defs.
`
`for Leave to File Under Seal Ex. 2, at 3 [ECF No. 70-2] (“Zeidman Expert
`
`Report”).
`
`
`1 Literal copying is the wholesale copying of the software or its components, while non-literal
`copying is “copying that is paraphrased or loosely paraphrased rather than word for word.” Lotus
`Dev. Corp. v. Borland Int’l, Inc., 49 F.3d 807, 814 (1st Cir. 1995).
`
`5
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 6 of 49 PageID #: 4222
`
`22. CSS uses COBOL version 11, and CT uses COBOL version 12. See McCasker
`
`Expert Report at 25.
`
`23. CT’s COBOL data files are structured differently than CSS’s COBOL data files.
`
`See Hr’g Tr., Jan. 25, 2017, McCasker Direct, 115:14–15.
`
`24. The parts of CSS’s software relevant to this case consist of the following
`
`architecture and technology: a client application written in the Microsoft
`
`Visual Basic 6 computer language (VB6), a VanGUI Network Communication
`
`Interface Builder (“VanGUI”), TCP (Transmission Control Protocol) Sockets,
`
`an application server with data files written in COBOL, a Relativity Server,
`
`an ODBC (Open Database Connectivity) Interface, and Crystal Reports OCX.
`
`See McCasker Expert Report at 7–9.
`
`25. The parts of CT’s software relevant to this case consist of the following
`
`architecture and technology: a client application written in the C# computer
`
`language (pronounced “C-Sharp”), a Louis Network Communication Interface,
`
`TCP Sockets, an application server with data files written in COBOL, a
`
`Relativity Server, an ODBC Interface, and Crystal Reports. See Hr’g Tr., Feb.
`
`24, 2017, C. Herrington Direct, 9–13.
`
`26. CSS’s software includes third-party components such as VB6, the VanGUI
`
`interface, the COBOL programming language, the Relativity server, and
`
`Crystal Reports. See Zeidman Expert Report at 14–18.
`
`27. The intellectual property rights to the third-party components—VB6, the
`
`VanGUI interface, the COBOL programming language, the Relativity Server,
`
`6
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 7 of 49 PageID #: 4223
`
`and Crystal Reports—are not owned by any party to this case. See Hr’g Tr.,
`
`Feb. 23, 2017, D. Herrington Cross, 148:21–149:12.
`
`28. The source code was initially provided along with CSS’s software applications
`
`and installed on servers owned by the various West Virginia county clerks’
`
`offices. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:12–18; Defs. Exs.
`
`2, 14 from Prelim. Inj. Mot. Hr’g [ECF Nos. 96-2, 96-13].
`
`29. At some point after 2014, this practice was discontinued, and all of CSS’s
`
`source code was removed from all county servers. See Hr’g Tr., Jan. 25, 2017,
`
`Auburn Direct, 31:1–9, 35:12–18.
`
`30. Source code present on the county servers was available to anyone who had
`
`administrative rights2 authorized by the county. Id. at 31:3–20, 35:15–18.
`
`31. Some of CSS’s contracts with county clerks’ offices did not have any language
`
`requiring the county clerks to protect CSS’s source code on the county servers.
`
`Id.
`
`32. Some of CSS’s contracts with the county clerks’ offices did stipulate that the
`
`county must protect CSS’s source code. Id. at 32:12–22.
`
`33. CSS’s corporate representative, Hubert “Bert” Auburn, does not know how
`
`many of CSS’s contracts required the clerks’ offices to protect CSS’s source
`
`code. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9; 35:15–18.
`
`34. Bert Auburn does not know how many people had access to CSS’s source code.
`
`Id. at 35.
`
`
`2 This refers to the ability of a person to access the files with an administrative login and password.
`
`7
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 8 of 49 PageID #: 4224
`
`35. CSS founder, current employee, and father of defendant, Chris Herrington,
`
`Doug Herrington does not know how many people had access to CSS’s source
`
`code. See Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 105:12–13, 106:14–17,
`
`120:13–16, 121:24–122:1.
`
`36. Bert Auburn does not know whether CSS’s source code was password-
`
`protected. See Auburn Direct, 31:1–9; 35:15–18.
`
`37. Bert Auburn is not aware of the source code being identified as confidential
`
`when on the county servers. See Mot. by Defs. for Leave to File Under Seal Ex.
`
`4, at 60:13–18 [ECF No. 70-4] (“Auburn Dep.”).
`
`38. Bert Auburn does not believe that CSS’s source code was encrypted when on
`
`county servers. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 35:1–9.
`
`39. CSS’s source code was neither password protected nor encrypted on the county
`
`servers. See Hr’g Tr., Feb. 23, 2017, D. Herrington Direct, 120:21–23; Test. &
`
`Ex. Submission by CSS, Inc., Ex. 1 at 182:20–24 [ECF No. 105-1] (“Lowers
`
`Dep.”).
`
`40. WVNet is a virtual private network that provides access to the county servers.
`
`See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:15–18.
`
`41. WVNet provides all companies with a contract with any county access to all
`
`West Virginia county servers. Id.
`
`42. Anyone who can access WVNet can access any of the West Virginia county
`
`servers. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–9, 35:15–18.
`
`43. A competitor of CSS with a password for WVNet may have been able to access
`
`8
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 9 of 49 PageID #: 4225
`
`CSS’s source code. See Hr’g Tr., Jan. 25, 2017, Auburn Direct, 31:1–20.
`
`44. The password to access the CSS software application was “top gun.” See Hr’g
`
`Tr., Feb. 23, 2017, D. Herrington Cross, 135:3–11; see also Hr’g Tr., Feb. 23,
`
`2017, Smith Direct, 175:20–22.
`
`45. CSS did not enter into confidentiality agreements with the clerks’ offices that
`
`had the “top gun” password. See Hr’g Tr., Feb. 23, 2017, Smith Direct, 17–19.
`
`Hr’g Tr., Feb. 23, 2017, D. Herrington Cross, 136:20–23.
`
`46. CSS would share the “top gun” password with county employees who attended
`
`training sessions. See Hr’g Tr., Feb. 23, 2017, D. Herrington Cross, 136:6–19;
`
`see also Hr’g Tr., Feb. 23, 2017, Smith Direct, 176:9–16.
`
`47. CSS’s contracts with county clerks’ offices are subject to document requests
`
`pursuant to the state freedom of information act. See Hr’g Tr., Jan. 25, 2017,
`
`Auburn Direct, 38.
`
`48. CSS’s pricing information for its county clients is public information. See
`
`Auburn Dep. 166:15–21.
`
`49. CSS bases its pricing structure, in part, on a publically available tax base
`
`classification of counties that is published every two years. Id. at 167:14–15,
`
`166:24–167:8, 179:5–6.
`
`50. Christopher Herrington obtained CSS pricing information by email, face-to-
`
`face conversations, and phone calls with county clerks. See Hr’g Tr., Feb. 24,
`
`2017, C. Herrington Direct, 41:16–43:1.
`
`51. CSS has some customers in Ohio. See Hr’g Tr. Auburn Direct, 28:9.
`
`9
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 10 of 49 PageID #: 4226
`
`52. CT has no customers in Ohio. See Hr’g Tr., Feb. 23, 2017, C. Herrington Direct,
`
`241:9–14.
`
`53. CSS has lost contracts to CT. See Hr’g Tr., Jan. 25, 2017, 9:13–18.
`
`IV.
`
`Standard for Obtaining a Preliminary Injunction
`
`
`
`To secure a preliminary injunction, “plaintiffs must demonstrate that (1) they
`
`are likely to succeed on the merits; (2) they will likely suffer irreparable harm absent
`
`an injunction; (3) the balance of hardships weighs in their favor; and (4) the injunction
`
`is in the public interest.” League of Women Voters v. North Carolina, 769 F.3d 224,
`
`236 (4th Cir. 2014) (citing Winter v. Nat. Res. Def. Council, Inc., 555 U.S. 7, 20
`
`(2008)). The Fourth Circuit reviews the grant or denial of a preliminary injunction
`
`for abuse of discretion. The Real Truth About Obama, Inc. v. Fed. Election Comm’n,
`
`575 F.2d 342, 346–47 (4th Cir. 2009), vacated on other grounds, 559 U.S. 1089 (2010).
`
`“[A] a preliminary injunction is an extraordinary and drastic remedy, one that should
`
`not be granted unless the movant, by a clear showing, carries the burden of
`
`persuasion.” 11A Charles Alan Wright & Arthur R. Miller, Federal Practice and
`
`Procedure § 2948 (3d. ed. 2017) (footnotes omitted).
`
`
`
`The Fourth Circuit permits district courts to rely on hearsay or other
`
`inadmissible evidence when deciding whether a preliminary injunction should be
`
`awarded. G.G. ex rel. Grimm v. Gloucester Cty. Sch. Bd., 822 F.3d 709, 725 (4th Cir.
`
`2016), vacated on other grounds and remanded, 137 S. Ct. 1239 (2017).
`
`10
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 11 of 49 PageID #: 4227
`
`V.
`
`Conclusions of Law
`
`A. Likelihood of Success on the Merits for the Copyright Claim
`
`In order to show copyright infringement, CSS must prove (1) it owned a valid
`
`copyright and (2) CT copied original elements of the copyright. Humphreys &
`
`Partners Architects, Ltd. P’ship v. Lessard Design, Inc., 790 F.3d 532, 537
`
`(4th Cir. 2015) (citing Lyons P’ship v. Morris Costumes, Inc., 243 F.3d 789, 801 (4th
`
`Cir. 2001)). A valid copyright gives the owner the exclusive right to reproduce the
`
`copyrighted work and prepare derivative works. 17 U.S.C. § 106. Anyone who violates
`
`this exclusive right infringes the owner’s copyright. Id. at § 501(a).
`
`Copyright law protects “original works of authorship fixed in any tangible
`
`medium of expression.” 17 U.S.C. § 102(a). Computer programs are explicitly covered
`
`as “literary works.” 17 U.S.C. § 101; see Atari Games Corp. v. Nintendo of Am., Inc.,
`
`975 F.2d 832, 838 (Fed. Cir. 1992). Courts have also granted copyright protection over
`
`computer source code. See Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d
`
`1222, 1233 (3d Cir. 1986). Copyright protection extends to the “non-literal elements
`
`of computer programs that embody original expression”. Lotus Dev. Corp. v.
`
`Paperback Software Int’l, 740 F. Supp. 37, 76–77 (D. Mass. 1990).
`
`However, copyright analysis in the computer program context is often a
`
`“difficult task.” Oracle Am., Inc. v. Google Inc., 750 F.3d 1339, 1354 (Fed. Cir. 2014);
`
`see Lotus Dev., 49 F.3d at 820 (Boudin, J., concurring) (“Applying copyright law to
`
`computer programs is like assembling a jigsaw puzzle whose pieces do not quite fit.”);
`
`see also Comput. Assocs. Int’l, Inc. v. Altai, Inc., 982 F.2d 693, 696 (2d Cir. 1992) (“In
`
`11
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 12 of 49 PageID #: 4228
`
`recent years, the growth of computer science has spawned a number of challenging
`
`legal questions, particularly in the field of copyright law. . . . As scientific knowledge
`
`advances, courts endeavor to keep pace, and sometimes—as in the area of computer
`
`technology—they are required to venture into less than familiar waters.”). As the
`
`Second Circuit remarked:
`
`To be frank, the exact contours of copyright protection for non-literal
`program structure are not completely clear. We trust that as future
`cases are decided, those limits will become better defined. Indeed, it may
`well be that the Copyright Act serves as a relatively weak barrier
`against public access to the theoretical interstices behind a program’s
`source and object codes. This results from the hybrid nature of a
`computer program, which, while it is literary expression, is also a highly
`functional, utilitarian component in the larger process of computing.
`
`Comput. Assocs. Int’l, 982 F.2d at 712.
`
`The scope of copyright protection, however, is limited in that it does not cover
`
`“any idea, procedure, process, system, method of operation, concept, principle, or
`
`discovery, regardless of the form in which it is described, explained, illustrated, or
`
`embodied in such a work.” Id. at § 102(b); see Mazer v. Stein, 347 U.S. 201, 217 (1954)
`
`(“Unlike a patent, a copyright gives no exclusive right to the art disclosed; protection
`
`is given only to the expression of the idea—not the idea itself.”); see also Feist Publ’ns,
`
`Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 358 (1991); Avtec Sys., Inc. v. Peiffer, 21
`
`F.3d 568, 572 (4th Cir. 1994) (“To reiterate, copyright protects not original ideas but
`
`their incarnation in a tangible means of expression.”).
`
`A work must be “original” to qualify for copyright protection. 17 U.S.C. § 102(a).
`
`This “originality requirement is not particularly stringent,” however. Feist Publ’ns,
`
`499 U.S. at 358. In the copyright context, “original” means “that the work was
`
`12
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 13 of 49 PageID #: 4229
`
`independently created by the author (as opposed to copied from other works), and
`
`that it possesses at least some minimal degree of creativity.” Id. at 345. The more
`
`creative a work is, the “thicker” the protection is for the work, and “less similarity is
`
`needed for a court to find the similarity sufficiently ‘substantial’ and thus infringing.”
`
`Lydia Pallas Loren, The Pope’s Copyright? Aligning Incentives with Reality by Using
`
`Creative Motivation to Shape Copyright Protection, 69 La. L. Rev. 1, 30 (2008).
`
`Conversely, highly functional, less creative works have “thin” protection, and more
`
`similarity is needed to show infringement. Id.
`
`1. The Test For Copyright Infringement in the Fourth Circuit
`
`CSS is alleging non-literal copyright infringement, which covers “the
`
`structure, sequence, organization, user interface, screen displays, and menu
`
`structures.” Gen. Universal Sys., Inc. v. Lee, 379 F.3d 131, 142 (5th Cir. 2004).
`
`The Fourth Circuit has not yet explicitly endorsed a test for non-literal
`
`copyright infringement for computer source code. Many jurisdictions have now
`
`adopted the Second Circuit’s abstraction-filtration-comparison test (“AFC Test”) to
`
`deal with this particular type of work. 3 Robert W. Harris, A New Ball Game:
`
`Litigating Copyright Infringement for Nonliteral Software Elements, 76 J. Pat. &
`
`Trademark Off. Soc’y 157, 158 (1994) (“After a period of several years in which courts
`
`applied a rather bewildering variety of tests for substantial similarity of software
`
`products in copyright infringement cases, a consensus has recently emerged among
`
`
`3 Whether to adopt the AFC Test has previously been raised on appeal, but the Fourth Circuit did
`not decide this issue. Comprehensive Techn. Int’l, Inc. v. Software Artisans, Inc., 3 F.3d 730, 734–35
`(4th Cir. 1993).
`
`13
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 14 of 49 PageID #: 4230
`
`the circuits, on the proper approach for analyzing the substantial similarity of
`
`copyright-protectable elements of computer software, which approach was earlier
`
`recommended by the Nimmer copyright treatise.”). The Fifth, Ninth, Tenth, and
`
`Eleventh Circuits apply the AFC Test. See Gen. Universal Sys., 379 F.3d at 142 (“To
`
`assess a claim of software infringement, we have generally endorsed the ‘abstraction-
`
`filtration-comparison’ test first outlined by the Second Circuit in Altai and refined by
`
`the Tenth Circuit in Gates Rubber Co. v. Bando Chemical Industries, Ltd.”); Sega
`
`Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510, 1525 (9th Cir.1992) (“In our view, in
`
`light of the essentially utilitarian nature of computer programs, the Second Circuit’s
`
`approach is an appropriate one.”); Gates Rubber Co. v. Bandon Chem. Indus, Ltd., 9
`
`F.3d 823, 833 (10th Cir. 1993); MiTek Holdings, Inc. v. Arce Eng’g Co., 89 F.3d 1548,
`
`1559 (11th Cir. 1996) (“Our circuit, in applying the Altai test, employs the substantial
`
`similarity standard in comparing what remains after the abstraction and filtration
`
`steps . . . .”). The Sixth Circuit uses a similar test, and the First Circuit addressed the
`
`AFC Test in its case of first impression and viewed it favorably.4 Kevin J. Hickey,
`
`Reframing Similarity Analysis in Copyright, 93 Wash. U.L. Rev. 681, 694 (2016); see,
`
`e.g., Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 534 (6th
`
`Cir. 2004); Lotus Dev., 49 F.3d at 815.
`
`The AFC Test “has the major advantage of being entirely consistent with the
`
`infringement calculus used for infringement issues concerning other types of works.
`
`
`4 However, the First Circuit ultimately did not rely on the AFC Test because Lotus involved literal
`infringement. Lotus Dev., 49 F.3d at 814–15.
`
`14
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 15 of 49 PageID #: 4231
`
`In effect, it is an adaptation of the traditional infringement test to the medium of
`
`computer programs.” Howard B. Abrams, Copying of Protected Expression—
`
`Technology, Functionality and the Ordinary Observer Test—Commentary, 2 The
`
`Law of Copyright § 14:33 (2016). The AFC Test “arose out of the difficulties of
`
`assessing similarity in computer software cases. At its core, the AFC Test is simply a
`
`formalized system to ensure that elements that are not protected by copyright are
`
`excluded when comparing two works.” Hickey, supra, at 694. In essence, the AFC
`
`Test works as follows:
`
`In ascertaining substantial similarity [between two or more programs]
`under this approach, a court would first break down the allegedly
`infringed program into its constituent structural parts. Then, by
`examining each of these parts for such things as incorporated ideas,
`expression that is necessarily incidental to those ideas, and elements
`that are taken from the public domain, a court would then be able to sift
`out all non-protectable material. Left with a kernel, or possibly kernels,
`of creative expression after following this process of elimination, the
`court’s last step would be to compare this material with the structure of
`an allegedly infringing program. The result of this comparison will
`determine whether the protectable elements of the programs at issue
`are substantially similar so as to warrant a finding of infringement.
`
`
`Comput. Assocs. Int’l, 982 F.2d at 706.
`
`I will therefore employ the AFC Test to determine substantial similarity for
`
`alleged non-literal copyright infringement of source code.
`
`2. Relevant Background Information
`
`Given the complexity of this type of copyright infringement analysis, some
`
`background information is helpful. In this case, both CSS and CT’s programs have
`
`client/server architecture. Client/server describes “a program relationship in which
`
`the client requests a service or resource from the server.” Zeidman Expert Report, Ex.
`
`15
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 16 of 49 PageID #: 4232
`
`J at 1. Both parties’ programs are client/server applications, meaning that there is a
`
`“front end” or “client side” and a “back end” or “server” side. Id.; McCasker Expert
`
`Report at 7, 9.
`
`The three coding languages used in this case are COBOL, VB6, and C#. The
`
`server sides of both CSS and CT are written in COBOL. The client side of CSS is
`
`written in VB6, and the client side of CT is written in C#. COBOL is “exclusively
`
`owned, developed and maintained by Micro Focus.” Defs. Mem. Opp. Pls. Mot. Prelim.
`
`Inj., Ex. 9, at 2 [ECF 68-9] (“Letter from Courtney Wood, Associate General Counsel
`
`for Micro Focus”).
`
`This case also involves several third-party applications: Relativity, VanGUI,
`
`Louis, and Crystal Reports. Relativity is a data-access middleware product,
`
`specifically it is an ODBC-accessible relational database management system. Defs.
`
`Mem. Opp. Pls. Mot. Prelim. Inj., Ex. 9, at 4–5 [ECF 68-9]. It improves access to
`
`COBOL data. Relativity is a COBOL-specific database engine/driver that is
`
`“exclusively owned, developed and maintained by Micro Focus.” 5 Letter from
`
`Courtney Wood, Associate General Counsel for Micro Focus 2. VanGUI is a
`
`communication middleware that allows application programs written in COBOL to
`
`be combined with graphical user interface (GUI) front-ends written in programming
`
`languages that support VB6. Defs. Mem. Opp. Pls. Mot. Prelim. Inj., Ex. 9 at 6–7
`
`[ECF 68-9]. VanGUI is “a way to modernize COBOL applications.” Id. at 1; Zeidman
`
`
`5 Liant acquired the rights to use and market Louis with its RM/COBOL and other COBOL products
`prior to its acquisition by Micro Focus in 2008.
`
`16
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 17 of 49 PageID #: 4233
`
`Expert Report at 18. Louis is an interface builder that works in conjunction with
`
`COBOL platforms and products and GUIs. Louis is “exclusively owned, developed
`
`and maintained by Micro Focus.” Letter from Courtney Wood, Associate General
`
`Counsel for Micro Focus 2. Crystal Reports is a business intelligence application that
`
`helps generate reports. Zeidman Expert Report, Ex. H at 2.
`
`3. CSS has Valid Copyrights
`
`A certificate of copyright registration is prima facie evidence of ownership of a
`
`valid copyright. 17 U.S.C. § 410(c); Serv. & Training, Inc. v. Data Gen. Corp., 963
`
`F.2d 680, 688 (4th Cir. 1992). CSS is the registered owner of three copyrights in
`
`computer software code: Document Indexing and Imaging for Counties 2015 (TX 8-
`
`230-758), Estate Management 2015 (TX 8-230-809), and Web Inquiry 2013 (TX 8-230-
`
`816). CT did not dispute the validity of the copyrights in its Response to CSS’s motion.
`
`The defendants did not introduce evidence calling the validity of the copyright
`
`into question.6 If CT had wished to dispute validity at the hearing, it would have had
`
`the “burden of overcoming the presumption [of validity] arising out of the granting of
`
`the copyright by the Copyright Office.” M. Kramer Mfg. Co. v. Andrews, 783 F.2d 421,
`
`434 (4th Cir. 1986). Thus, I FIND that CSS is likely to show that it owns valid
`
`copyrights.
`
`4. The AFC Test
`
`The next stage of the analysis is more complex. In order to demonstrate
`
`
`6 Through cross examination, defendants have implied that the dates of creation on the estate and
`indexing software copyright registrations are incorrect. Hr’g, Tr., C. Herrington Direct, 233: 3–234:2.
`However, they did not present sufficient evidence to rebut the presumption of validity.
`
`17
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 18 of 49 PageID #: 4234
`
`copyright infringement, CSS must produce either direct evidence of infringement, or
`
`in the alternative, that (1) CT had access to the copyrighted work, and (2) CT’s
`
`software is substantially similar to CSS’s copyrighted material. Comput. Assocs. Int’l,
`
`982 F.2d at 701. CSS argues the latter, which means I must apply the AFC Test for
`
`substantial similarity.
`
`a. Step 1: Abstraction
`
`
`
`The first step described in Altai is abstraction. Abstraction is a very fact-
`
`specific process. The overarching goal of abstraction is to break out a program into its
`
`numerous ideas and expressions. Id. at 706–07. Each level of the AFC Test involves
`
`“dissective analysis.” Pamela Samuelson, A Fresh Look for Nonliteral Copyright
`
`Infringement, 107 Nw. U. L. Rev. 1821, 1838 (2013). The purpose of this step is to
`
`distinguish the copyrightable expressive aspects of software from its underlying
`
`ideas, which are not protectable by copyright. Id. at 707.
`
`Analytic dissection is relevant not only to the copying element of a
`copyright infringement claim, but also to the claim’s ownership element.
`One aspect of the ownership element is the copyrightability of the
`subject matter and, more particularly, the scope of whatever copyright
`lies therein. To the extent a plaintiff’s work is unprotected or
`unprotectable under copyright, the scope of the copyright must be
`limited.
`
`Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1476 (9th Cir. 1992) (citations
`
`omitted). I rely entirely on the report and testimony of CSS’s expert, Andrew
`
`McCasker, and the report of CT’s expert, Dr. Robert Zeidman to perform the
`
`abstraction process.
`
`b. Step 2: Filtration
`
`
`
`The second step in the AFC Test is filtration. After the experts identify the
`
`18
`
`
`
`Case 2:16-cv-01762 Document 213 Filed 08/04/17 Page 19 of 49 PageID #: 4235
`
`abstracted levels of the software in this case, the court must next examine the
`
`structural components and determine if they are copyrightable. Comput. Assocs. Int’l,
`
`982 F.2d at 707. The purpose of filtration is to define the scope of the plaintiff’s
`
`available copyright. Id. Courts have been encouraged to be more explicit about
`
`addressing which elements in protected works are not protectable by copyright. See
`
`Samuelson, supra, at 1839. The Altai case names three specific categories of elements
`
`that cannot be protected: (1) elements dictated by efficiency, which are barred by the
`
`merger doctrine, (2) elements dictated by external factors, similar to scènes à faire in
`
`traditional copyright analysis, and (3) elements from the public domain. Comput.
`
`Assocs. Int’l, 982 F.2d at 707–11.
`
`When there is only one way to express a particular idea, the idea and its
`
`expression are “merged” and copyright will not protect that expression. Id. Coders are
`
`driven to write the leanest, most efficient code in order to make a program run as fast
`
`as possible.7
`
`Efficiency is an industry-wide goal. Since, as we have alrea