Elawyers Elawyers
Ohio| Change

Engineering Dynamics, Inc. v. Structural Software, Inc., 92-03444 (1994)

Court: Court of Appeals for the Fifth Circuit Number: 92-03444 Visitors: 38
Filed: Jul. 14, 1994
Latest Update: Mar. 02, 2020
Summary: UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT _ No. 92-3444 _ ENGINEERING DYNAMICS, INC., Plaintiff-Appellant-Cross-Appellee, versus STRUCTURAL SOFTWARE, INC. and S. RAO GUNTUR, Defendants-Appellees-Cross-Appellants. _ Appeals from the United States District Court for the Eastern District of Louisiana _ (July 13, 1994) Before JOHNSON, JOLLY, and JONES, Circuit Judges. EDITH H. JONES, Circuit Judge: Fifteen years ago Engineering Dynamics, Inc. (EDI) successfully defended itself against cla
More
                     UNITED STATES COURT OF APPEALS
                          FOR THE FIFTH CIRCUIT

                        _______________________

                              No. 92-3444
                        _______________________


     ENGINEERING DYNAMICS, INC.,

                              Plaintiff-Appellant-Cross-Appellee,

     versus

     STRUCTURAL SOFTWARE, INC.
     and S. RAO GUNTUR,

                              Defendants-Appellees-Cross-Appellants.


_________________________________________________________________

          Appeals from the United States District Court
              for the Eastern District of Louisiana
_________________________________________________________________

                              (July 13, 1994)

Before JOHNSON, JOLLY, and JONES, Circuit Judges.

EDITH H. JONES, Circuit Judge:

           Fifteen    years   ago     Engineering    Dynamics,    Inc.    (EDI)

successfully defended itself against claims that its computer

program   infringed     registered       copyrights       held   by   Synercom

Technology, Inc. on Synercom's user manuals and input formats.

That case held that neither the input formats brought to the

court's   attention    nor    their    sequence     and    organization   were

copyrightable.   Synercom Technology, Inc. v. University Computing

Co., 
462 F. Supp. 1003
(N.D. Tex. 1978).        EDI has now switched sides

and seeks a judgment of copyright infringement against Structural

Software, Inc. (SSI), a competitor who copied many of EDI's input

and output formats. The parties primarily differ over the district
court's holding that computer input and output formats are not

copyrightable and hence cannot infringe a copyright directly or as

a derivative work.             See district court opinion at 
785 F. Supp. 576
,

582 (E.D.La. 1991).

              This opinion examines the extent of copyright and trade

dress law protection of computer/user interfaces and user manuals.

We    reverse      the     district       court's        holding    that     computer/user

interface         in     the    forms     of   input       and     output     formats    are

uncopyrightable and reverse and remand to determine whether there

was infringement.              We affirm the court's other rulings.

                                          BACKGROUND

              In 1970, Synercom brought to market a computer program

called STRAN, designed to solve engineering problems in the field

of structural analysis.                The program required the user to "input"

a    large    amount       of    data,    including        construction       details    and

anticipated environmental and other external forces that would act

upon the structure.                The computer program performed numerous

tedious calculations              using    accepted       engineering       principles    to

generate output which facilitated the design and construction of

the structure.

              In       1975,    EDI    entered     the    market    with     its   computer

program, SACS II,1 which utilized precisely the same input formats

and input sequence as Synercom's STRAN program.                             Both SACS and

STRAN      were    run    only    on     mainframe       computers.         Part   of   EDI's


       1
            There was never a SACS I.            The acronym stands for structural
analysis computer system.

                                               2
marketing strategy was to stress the complete compatibility of SACS

with STRAN's input formats, entered into the computer via decks of

80-column keypunch cards.         
Synercom, 462 F. Supp. at 1008
, 1012.

Synercom had obtained thirteen copyright registrations covering

nine input formats and sued EDI for infringement.             Then-district

judge Higginbotham ruled that the formats of the keypunch cards, as

well as their sequence and organization, were not copyrightable,

thus relieving EDI of any liability for format infringement. Judge

Higginbotham also held, however, that EDI had infringed Synercom's

copyright in its user manuals.        As part of a resulting settlement

agreement, EDI prepared a new edition of its user manual, SACS III,

which did not infringe Synercom's copyright.

          Over the years, EDI refined SACS III and its input

formats   to   accommodate        users'   desire    for    greater   speed,

flexibility,   and   ease    of    operation.       After   many   piecemeal

revisions, EDI changed the name of its program to SACS IV.            Despite

the fact that actual paper keypunch cards are rarely used anymore,

EDI has retained the 80-column data input format.            Most users now

enter data as image files and store the data on a magnetic storage

device, e.g., a floppy disk. The 80-column card format is familiar

to relevant users of these programs, thus facilitating training and

allowing them to reevaluate old data decks.          This opinion follows

industry practice and uses the terms "input format" and "card"

interchangeably.

          The SACS IV input formats instruct the user to place

specific kinds of information in a specific place on the card.           The


                                      3
first five columns or so are reserved for identification of the

card by its name, e.g., WAVE.         The parties' versions of this card

are reproduced in the appendix hereto.               Subsequent columns of

various widths are reserved to enter instructive and descriptive

data.   The WAVE card, for example, is used to calculate ocean wave

forces on structures built offshore.              Several columns allow the

user to instruct the computer as to which wave scenario (load case)

is to be generated and by what wave theory.                  Much of the data

entered describes conditions and parameters needed to generate

hypothetical wave forces, e.g., the waves' size, frequency, and

direction. The placement of the required information on the proper

card and in the proper columns is crucial to obtaining correct

results.     Other input formats instruct or describe many other

structural and environmental factors.

            EDI's structural analysis program is actually a "suite"

of 23 semi-autonomous modules, each created to facilitate certain

aspects of    structural     analysis.      Each    module    is   designed   to

interact    with    other   modules    of   the    suite,    for   example,   by

preprocessing certain data, then feeding it to another module. One

module called SEASTATE generates and calculates the environmental

effects on an offshore structure.            This is an important module

because    most    EDI   customers    use   SACS   for   designing    offshore

structures, such as drilling platforms.              Another module called

JOINTCAN is used to design the "joint cans" which connect tubular

members of a structure, taking into account various stresses,

tolerances, and construction techniques.             The heart of the SACS


                                       4
suite is a module itself called SACS.                 This module processes,

through the computer, user-supplied environmental and design data

and calculates the static and dynamic forces within and upon each

component of the structure.            A large quantity of output data is

then organized and printed in a systematic fashion that facilitates

further engineering or construction efforts, e.g., showing the

kinds and quantities of forces to which each component of the

structure is subject.

           EDI has not copyrighted any of the actual computer

programs comprising the SACS suite, i.e., the source code and

object   code.         Instead,   it   has   chosen   to   protect    itself    by

maintaining      the    program   as   an    unpublished    trade    secret    via

confidentiality contracts with users and other security techniques.

It has, however, obtained four copyright registrations covering the

user manuals for three of the 23 modules:                  SACS III, SACS IV,

SEASTATE, and JOINTCAN.           The SACS suite of programs allegedly

specifies over 200 input formats.               The four copyrighted user

manuals describe 51 formats (excluding nonformatted cards such as

header cards and end cards), most of them pertinent to SACS III2

and SEASTATE.

           In 1986, Rao Guntur began developing a similar structural

analysis program targeted at the offshore platform market that

could be used on a personal computer. Guntur's company, Structural

Software, Inc. (SSI), began marketing his program, StruCAD*3D, that

     2
            The SACS IV user manual was apparently not offered as evidence and
is not found intact in the record on appeal. It is apparently not much
different from SACS III for purposes relevant to this appeal, however.

                                         5
same year.     EDI brought its PC version to market a short time

later.     Although built on a different public-domain structural

analysis program, StruCAD borrowed heavily from the SACS user

interface.    Like SACS, data entry for StruCAD is based on an 80-

column format.    As was the case when EDI copied Synercom's input

format and sequence, many of StruCAD's potential customers were

already familiar with EDI's interface; SSI wanted to minimize

required training for these users and facilitate conversion of SACS

input data files to StruCAD's formats.   StruCAD utilizes 126 input

formats.

            EDI's allegations in the instant case differ in three

important respects from Synercom's allegations in 1978. First, the

decks of computer keypunch cards prepared for use in Synercom's

program STRAN were completely compatible with SACS II when it was

introduced.     In the instant case, many individual data cards

completed for use in SACS would require some, but not extensive,

modification before they could be run in StruCAD.   Second, StruCAD

requires dozens of input formats completely different from those

found in SACS III or SACS IV.   Third, while only nine input formats

were alleged to have been copied in Synercom, and the copyright

registrations on each of the nine were at issue, EDI does not claim

protection for any of its individual input formats and output

reports.    Instead, it contends that the sequence and organization

of formats and reports is as a whole copyrightable.

            EDI brought suit against SSI and against Guntur in his

individual capacity, claiming that they copied 56 of EDI's input


                                  6
formats.     To support its claim, EDI assembled numerous exhibits

highlighting    the       similarities   between     the    alleged    infringing

formats. A close examination of the WAVE input format description,

for example, (see Appendix) reveals that both programs' cards

require precisely the same information in precisely the same data

columns, except that StruCAD requires that columns 5-8 and 31-38 be

left blank while in SACS these columns are optional.                       (But note

that SACS also requires that 31-38 be left blank if columns 25-30

are used.)     In addition to the infringement claim based on input

formats, EDI alleges copying of output report formats, copying of

EDI's user manuals for use in the StruCAD manual, and copying of

portions of EDI's user manuals for use on StruCAD's "help screens."

EDI also brought unfair competition claims against SSI, alleging

violations of section 43(a) of the Lanham Act and La. Rev. Stat.

Ann. § 51:1405(A).

           Guntur and SSI (hereinafter often jointly referred to as

SSI) admit that Guntur copied EDI material when he developed

StruCAD.      SSI   argues,     however,      that   input       formats    are   not

copyrightable in the first instance.             Moreover, SSI asserts that

EDI appropriated many of these formats from Synercom's STRAN

program and contends that EDI cannot now claim a proprietary

interest in something that it copied from Synercom.                        Appellees

raise various other defenses to the other copyright and unfair

competition claims that are addressed in the analysis below.

           After      a    four-day   bench    trial,      the    district     court

dismissed EDI's claims against Guntur in his individual capacity


                                         7
and dismissed all copyright claims involving StruCAD's input and

output formats. The district court agreed, however, that StruCAD's

user manual infringed EDI's copyright in its SACS manuals and

ordered SSI to pay EDI $250,000 in actual damages.    The district

court also enjoined SSI from any further marketing of StruCAD until

the parties agreed on a noninfringing manual for StruCAD.       The

parties were unable to reach an agreement on a new noninfringing

manual, leading the district court to appoint a special master to

decide whether SSI's new manual still infringed.   After reviewing

the manuals and briefs prepared by both parties, the special master

concluded that SSI's new manual did not infringe any of EDI's

copyrights. The recommendations and findings of the special master

were adopted by the district court the same day they were received.

          This opinion will address the appealed issues in the

following order:

         I.     Copyrightability of input/output formats and
                user interfaces;

         II.    The scope of copyright protection for user
                interfaces;

         III.   User manual infringement;

         IV.    Help-screen infringement;

         V.     Objections to the Special Master's report and
                procedures;

         VI.    Rao Guntur's liability in his individual
                capacity;

         VII.   Trade dress infringement and unfair
                competition; and

         VIII. Calculation of damages.



                                 8
                            I.   COPYRIGHTABILITY OF
                    INPUT/OUTPUT FORMATS AND USER INTERFACES

                  EDI    has   registered      copyrights      in    four    user    manuals

containing              detailed      verbal        descriptions        and      pictorial

representations of input and output formats. EDI contends that SSI

and Guntur infringed EDI's copyrights by copying a portion of its

user manuals -- the input and output formats -- and incorporating

them       into    the     StruCAD    user     manual    and    into    StruCAD's       user

interface.         This, EDI maintains, is either direct unlawful copying

under 17 U.S.C. § 106(1) or unlawful preparation of a derivative

work under 17 U.S.C. § 106(2).

                  To establish copyright infringement, a plaintiff must

prove ownership of a valid copyright and copying of constituent

elements of the work that are copyrightable.                        Feist Publications,

Inc. v. Rural Tel. Service Co., 
499 U.S. 340
, 361, 
111 S. Ct. 1282
,

1296 (1991).            Copyright ownership is shown by proof of originality

and copyrightability in the work as a whole and by compliance with

applicable statutory formalities.3                   Plains Cotton Coop. Ass'n. v.

Goodpasture Computer Serv., Inc., 
807 F.2d 1256
, 1260 (5th Cir.),

cert. denied,            
484 U.S. 821
   (1987).      Two       separate    components

underlie proof            of   actionable      copying.        First    is     the   factual

question          whether      the    alleged       infringer       actually     used   the

copyrighted material to create his own work.                        Copying as a factual

matter typically may be inferred from proof of access to the



       3
            EDI complied with the statutory formalities in regard to the user
manuals and input formats and output reports reproduced therein.

                                                9
copyrighted work and "probative similarity."4                 Plains 
Cotton, 807 F.2d at 1260
. Not all copying, however, is copyright infringement.

Feist, 499 U.S. at 361
, 111 S.Ct. at 1296.                 The second and usually

more   difficult      question   is    whether       the    copying    is     legally

actionable.       This requires a court to determine whether there is

substantial similarity between the two works.                 Plains 
Cotton, 807 F.2d at 1260
.

            On appeal, SSI does not contest the validity of EDI's

ownership in the four copyrighted user manuals as a whole.                     Nor is

copying as a factual matter disputed; Guntur candidly testified

that he used EDI's formats when developing StruCAD.                   Instead, SSI

raises several contentions.           First, SSI asserts that under this

court's    Plains    Cotton   decision,      which    allegedly       approved   the

Synercom district court decision, user input formats are not

copyrightable as a matter of law.                SSI elaborates upon this

argument    by    pointing    out     that   nine     of     the    formats    found

uncopyrightable in Synercom are nevertheless alleged by EDI here to

be protected.       Second, SSI asserts that EDI's computer input and

output formats represent unoriginal facts and lists of facts that

are not copyrightable and thus are not subject to infringement.

Third, SSI contends that the SACS IV input and output formats

represent    an     uncopyrightable     idea,    process       or   method.      EDI



      4
            Professor Latman distinguishes between "probative similarity,"
which relates to factual copying, and "substantial similarity," which relates
to actionable copying. See 3 Melville B. & David Nimmer, Nimmer on Copyright
§ 13.01[B] (1993) (hereinafter Nimmer); see also Gates Rubber Co. v. Bando
Chemical Indus., Ltd., 
9 F.3d 823
, 832 (10th Cir. 1993) (adopting same
terminology).

                                        10
distinguishes the instant case from Synercom and responds that its

input and output formats, at least when taken as a whole, are

copyrightable.        EDI further argues that SSI has infringed EDI's

copyright by SSI's "massive appropriation of plaintiff's expression

at the interface."

            This inquiry represents a subset of the general questions

surrounding computer program copyrightability.               Some of the issues

in this novel and complex area of law are slowly being resolved.

Congress has declared that computer programs are in principle

entitled to copyright protection.5 That decision largely overcame,

though it does not fully answer, one major statutory exception to

copyrightability, the "useful article" exception.6                  Most courts

confronted with the issue have determined that copyright protection

extends not only to the literal elements of a program, i.e., its

source    code   and    object   code,7    but   also   to   its    "nonliteral"

elements, such as the program architecture, "structure, sequence

and    organization",      operational       modules,     and      computer-user

interface. See, e.g., Computer Assocs. Int'l, Inc. v. Altai, Inc.,


      5
            A computer program is "a set of statements or instructions to be
used directly or indirectly in a computer in order to bring about a certain
result." 17 U.S.C. § 101.
      6
            In no case does copyright protection for an original
            work of authorship extend to any idea, procedure,
            process, system, method of operation, concept,
            principle, or discovery, regardless of the form in
            which it is described, explained, illustrated, or
            embodied in such work.

17 U.S.C. § 102(b).
      7
            Source code is the programming language readable by human
programmers; object code is the binary expression that controls the computer
hardware.

                                      11

982 F.2d 693
(2d Cir. 1992); Gates Rubber Co. v. Bando Chemical

Indus., 
9 F.3d 823
(10th Cir. 1993); Lotus Development Corp. v.

Paperback Software Int'l, 
740 F. Supp. 37
(D.Mass. 1990) (Lotus I).

But as one moves away from the literal code to more general levels

of a program, it becomes more difficult to distinguish between

unprotectible ideas, processes, methods or functions, on one hand,

and copyrightable expression on the other. Lotus 
I, 740 F. Supp. at 53
.   Court decisions are, generously described, in a state of

creative    ferment   concerning    the   methods    by   which   nonliteral

elements of computer programs may be identified and analyzed for

copyrightability.8

            Until recently, it could be argued that Fifth Circuit

precedent    precluded    recognition     of   the   copyrightability      of

nonliteral elements of computer programs.         This argument was based

on the Plains Cotton case, an alleged Fifth Circuit endorsement of

the district court decision in Synercom.         Synercom, decided before

Congress passed the 1980 amendments to the Copyright Act, held that

80-column data cards, developed for an early species of punch-card

computers, represented an uncopyrightable process or idea because

they could not be divorced from their mode of expression.            SSI and

the district court interpreted Plains Cotton broadly as adopting

Synercom.    That Plains Cotton did not actually do so has now been

settled by this court in Kepner-Tregoe, Inc. v. Leadership Software



      8
            Compare the approaches used by the courts in Whelan Assocs., Inc.
v. Jaslow Dental Lab., Inc., 
797 F.2d 1222
(3d Cir. 1986), cert. denied, 
479 U.S. 1031
(1987); Altai, supra; Lotus 
I, supra
; Brown Bag Software v. Symantec
Corp., 
960 F.2d 1465
(9th Cir.), cert. denied, 
1135 S. Ct. 198
(1992); etc.

                                     12
Inc., 
12 F.3d 527
(5th Cir. 1994).                   Kepner-Tregoe embraced the

"general, noncontroversial proposition that nonliteral aspects of

copyrighted        works          --      like      structure,          sequence       and

organization -- may be protected under copyright law . . 
." 12 F.3d at 536
, n.20.             Thus, SSI benefits from no synergy with

Synercom.9

             But SSI also makes a more particular argument based on

Synercom.    Because Synercom declared that particular input formats

integral     to     SACS     IV's        predecessor         program        (STRAN)    were

noncopyrightable ideas, SSI contends, the same must be true of

those formats descended from STRAN. We disagree. In Synercom, the

plaintiff sought copyright protection for individual input formats;

here, EDI makes a different claim that several dozen input formats

taken together form a copyrightable work, because they represent

but   one   of    many     ways    of     expressing     a    mode     of    computerized

structural       analysis.             This   general    point       renders     Synercom

distinguishable.

             The holding in Kepner-Tregoe resolves only one level of

controversy between the parties, albeit the level on which the

district court rested his decision.                After Kepner-Tregoe, one must

conclude that nonliteral elements of computer programs may be

copyrightable      in    the      Fifth       Circuit,   but    not     that    they   are




      9
            SSI contends that we should not analyze the input formats as
nonliteral elements because that analysis depends on the existence of a
copyright on the underlying program. We reject this argument. It makes no
difference to the formats' copyrightability whether we analyze them as
springing from a computer program or from a user manual.

                                              13
necessarily copyrightable in this case.                  To that issue we must

turn.

                             II. SCOPE OF COPYRIGHT
                         PROTECTION FOR USER INTERFACES

               Two qualifications on this discussion must be noted.

Because of the factual content of many of these issues, it is

expedient to remand to the district court, which conducted a full-

scale trial, to reconsider his decision according to the principles

about to be explained.             The judge's interpretation of Synercom, a

decision by which he believed he was bound, rendered a close

factual analysis unnecessary.            Second, this is not a case in which

the    outer     limits       of   copyright    protection   for   computer-user

interface need be explored.            The input and output formats for SACS

IV are quasi-textual; while they guide the user in performing a

series of sophisticated structural analyses, they consist of a

series of words and a framework of instructions that act as prompts

for the insertion of relevant data. In some computer programs, the

user    interface       may    merge   almost   wholly   with   the   expression,

processes, or ideas embodied in the program -- voice-activated or

virtual reality programs or those attuned to the human heartbeat

furnish some examples that may trouble courts in the future.                 We do

not     presume    to     anticipate     the    legal    consequences   of   such

technological developments.

               The analysis below focuses, as did the parties in their

briefs, on the copyrightability of EDI's input formats.                  There is

no intuitive reason why the analysis should be any different for

output formats.           Indeed, in some cases it may be difficult to

                                          14
classify   a   given   interface   as      one    or    the   other.      Clearly,

therefore, some output formats will contain sufficient original

expression to merit protection.         Cf. Broderbund Software, Inc. v.

Unison World, Inc., 
648 F. Supp. 1127
(N.D. Cal. 1986) (interface of

program which generated customized greeting cards copyrightable).

           Generally,     we   endorse        the       abstraction-filtration-

comparison method of determining copyright protection for computer

programs, which has been ably elucidated by the Tenth Circuit in

Gates Rubber, 
9 F.3d 823
, 834 (10th Cir. 1993).                         The court

summarized this method as follows:

                First, in order to provide a framework
           for analysis, we conclude that a court should
           dissect the program according to its varying
           levels of generality as provided in the
           abstractions test. Second, poised with this
           framework, the court should examine each level
           of abstraction in order to filter out those
           elements    of   the    program    which    are
           unprotectable.    Filtration should eliminate
           from comparison the unprotectable elements of
           ideas,   processes,   facts,    public   domain
           information, merger material, scenes a faire
           material, and other unprotectable elements
           suggested by the particular facts of the
           program under examination. Third, the court
           should then compare the remaining protectable
           elements with the allegedly infringing program
           to determine whether the defendants have
           misappropriated substantial elements of the
           plaintiff's program.

It is unnecessary here to reproduce the Gates Rubber court's

thoughtful explanations of the various components of this approach.

See also discussions in 
Altai, 982 F.2d at 706-11
; 3 Nimmer,

§   13.03[F]   (advocating     much     the      same    test   as     "successive

filtering").     We shall apply that methodology to the parties'

arguments in order to provide guidance and to narrow the issues on

                                      15
remand. The abstraction-filtration-comparison method was developed

in cases dealing with the copyrightability of parts of computer

programs    other       than   user    interface.         Judge    Keeton,    however,

employed a similar systematic approach to the Lotus user interface

cases.     See Lotus 
I, supra
; Lotus Development Corp. v. Borland

Int'l,   Inc.,     788    F.Supp       78   (D.   Mass.    1992)(Lotus    II);      etc.

Describing       this    approach      as    abstraction-filtration-comparison

should not convey a deceptive air of certitude about the outcome of

any particular computer copyright case.                   Protectible originality

can manifest itself in many ways, so the analytic approach may need

to be varied to accommodate each case's facts.                    See 
Altai, 982 F.2d at 706
(three-step test can and should be modified when computer

technology demands it); Gates 
Rubber, 9 F.3d at 834
, n.12 (same).

Given that caveat, we adopt the Gates Rubber/Altai/Nimmer method to

consider EDI's user interface, input formats and output reports.

            A.      Abstraction

            The     purpose      of    segmenting    a     computer    program      into

successive levels of generality is to "help a court separate ideas

[and processes] from expression and eliminate from the substantial

similarity   analysis          those   portions     of    the   work   that   are    not

eligible for copyright protection."                      3 Nimmer, § 13.03[F] at

13-102.17.

            Judge Learned Hand first penned the abstraction method to

analyze the elements of a literary work to distinguish between

protectible expression and abstract unprotectible ideas. Nichols v.

Universal Pictures Corp., 
45 F.2d 119
, 121 (2d Cir. 1930), cert.


                                            16
denied, 
282 U.S. 902
(1931).       Analogizing his formula to computer

programs, at each level of abstraction into which the program can

be segmented, the court determines whether the contents of that

segment depict an idea, process or method, which, inseparable from

its expression or incapable of expression by any other means, is

therefore uncopyrightable.10

            Abstraction of ideas from expression does not pose a

particular conceptual hurdle in this case for three reasons.

First, EDI seeks copyright protection not of its entire suite of

SACS programs but only of approximately 230 input-output formats

that    comprise   the   user   interface.        The   user    interface   is

analytically    distinct   from   other   parts    of   the    program.     See

Ogilvie, supra note 10, 
19 Mich. L
. Rev. at 542 n. 73.            Second, EDI

claimed protection of input and output formats not individually but

en masse. It is thus unnecessary to decide whether each individual

input format card or output format report represents an idea or an

expression.




       10
            The abstraction method makes good sense intuitively, but its
application to computer programs has been problematic. A particular source of
difficulty has been definitional -- how to describe the levels of generality
ascending in computer programs from the literal code to the most general
"idea" of the program itself. Case law has approached the definitional
problem inconsistently. One author, while criticizing the courts' diverse and
halting efforts at using the abstraction method, suggests that the levels of
abstraction can be conformed to six technical component norms recognized among
computer programmers. See John W. L. Ogilvie, Note, Defining Computer Program
Parts under Lerned Hand's Abstraction Test in Software Copyright Infringement
Cases, 
91 Mich. L
. Rev. 526 (1992). His proposed levels of abstraction, in
descending order, are: the main purpose, system architecture, abstract data
types, algorithms and data structures, source code, and object code.
Ogilvie's levels of abstraction have already been approved by one circuit
court. Gates Rubber Co., 
9 F.3d 835
. Ogilvie's levels of abstraction do not
directly apply to the present case, however, because his note does not deal
with user interfaces.

                                     17
           Third, the formats, taken as a whole, readily qualify as

"expression"     measured      against     the    ideas   versus   expression

dichotomy.    Not all user interfaces will so easily pass that test.

The purpose of the SACS input formats is to mediate between the

user and the program, identifying what information is essential and

how it must be ordered to make the program work.                   The output

formats structure the results of calculations performed by the

program informatively for the user.              These formats do not self-

evidently convey only an "idea."

           Because of the functional quality of user interface, the

abstraction    portion    of    the   three-step     methodology    may   pose

difficult questions.        A user interface may often shade into the

"blank form" that epitomizes an uncopyrightable idea, Baker v.

Selden, 
101 U.S. 99
(1880),11 or it can partake of high expression,

like that found in some computerized video games.           In the middle of

the abstraction spectrum sit user interfaces such as that of Lotus


     11
            This approach is consistent with the Supreme Court's analysis in
Feist, where the Court required "some minimal degree of creativity," or a
"minimal creative spark" before finding copyrightability in a compilation of a
telephone book's white 
pages. 499 U.S. at 362
, 
363, 111 S. Ct. at 1296
, 1297.
More than trivial originality is necessary, however. This approach is
consistent with the great majority of blank-form cases decided in other
circuits. See Harper House, Inc. v. Thomas Nelson, Inc., 
889 F.2d 197
(9th
Cir. 1989) (compilation of blank forms in executive organizer copyrightable,
but individual blank diary forms not protectible); Cash Dividend Check Corp.
v. Davis, 
247 F.2d 458
(9th Cir. 1957) (finding copyrightability of check with
accompanying text describing a stamped-check plan to convert savings stamps
into cash); Brown Instrument Co. v. Warner, 
161 F.2d 910
(D.C. Cir. 1947)
(graphic temperature-pressure charts designed to record not copyrightable);
Taylor Instrument Co. v. Fawley-Brost Co., 
139 F.2d 98
(7th Cir. 1943), cert.
denied, 
321 U.S. 785
(1944) (blank form for recording temperatures not
copyrightable); see also Harcourt, Brace & World, Inc. v. Graphic Controls
Corp., 
329 F. Supp. 517
(S.D.N.Y. 1971) (finding copyrightability of optically
scanned answer sheet forms which provided spaces for indicating correct
answers, but which also conveyed certain minimal information). Blank forms
that are designed merely to record information rather than convey it are not
copyrightable. See generally 1 Nimmer, § 2.18[B].

                                      18
1-2-3, whose menu structure, including its long prompts, contains

numerous expressive features.            See Lotus 
I, 740 F. Supp. at 65-68
.

As Judge Keeton put it, if a best-selling program's interface were

not copyrightable, competitors would be free to emulate the popular

interface exactly so long as the underlying programs were not

substantially similar.         This cannot be the law.

            The    scientific,       technical      character     of   the   SACS   IV

program distinguishes it in certain respects from the open-ended,

user-directed spreadsheet user interface found copyrightable in

Lotus I.    But on this initial level of abstraction analysis, it is

certain that there are numerous ways in which either input or

output formats could have been structured in order to achieve the

program's purpose.           Consequently, it is appropriate to proceed

further in considering the copyright protection available to EDI

for its input formats and output reports.

            B.      Filtration

            The filtration component of the analysis seeks to isolate

noncopyrightable elements from each particular level of a program.

Copyright    protects        the    expression      of   ideas,    not    the   ideas

themselves,       and   it    does    not    protect     processes,      methods    or

scientific discoveries.            Other materials not subject to copyright

include facts, information in the public domain, and scenes a

faire, i.e., expressions that are standard, stock or common to a

particular subject matter or are dictated by external factors. See

Gates 
Rubber, 9 F.3d at 837-38
.                  Each of these limitations upon

copyright or defenses against illicit copying follows logically


                                            19
from the purpose of the Copyright Act: to protect an author's

original, creative expression insofar as is compatible with general

advancement of expressive arts and "the free use and development of

non-protectable ideas and processes."             
Altai, 982 F.2d at 711
.

              SSI forcefully advances several of these concepts in

defense of the copying it engaged in to produce StruCAD.                      SSI

contends that EDI's user interface comprises unoriginal facts,

which are not copyrightable.          It asserts that the data formats are

merely a template that enables an engineer to use his tool, the

computer. SSI also denies that EDI's "compilation" of input/output

formats is copyrightable.           Finally, SSI contends that EDI's user

interface depends so heavily on engineering industry standards and

practice    that      it   is   unprotectible   under   the    scenes    a   faire

doctrine.

              1.      Unprotectible Facts versus Original Expression

              SSI describes the input/output data formats as "garden

variety documentation that merely presents column-by-column formats

of input data and describes the information . . . to be stored in

each column, pictures, figures or diagrams, which merely elucidate

basic engineering and mathematical relationships."                     Therefore,

according to SSI, the input/output formats fail to satisfy the

Feist-Zack Meyer originality test.              In Feist, the Supreme Court

held that an alphabetically arranged phonebook lacks the creativity

and originality necessary to sustain a copyright.                    In Donald v.

Zack Meyer's T.V. Sales and Service, 
426 F.2d 1027
(5th Cir. 1970)

(the   Zack        Meyer   case),   this    circuit   held    that    boilerplate


                                           20
contractual language printed on a blank form was insufficiently

original.

            As a comparison with the facts of Feist and Zack Meyer

makes obvious, SSI's argument is simplistic in the present context.

Certainly, one may isolate each individual input requirement or

series of requirements and contend that it is merely shorthand for

a common engineering formula.        Likewise, abbreviations for terms,

dictated by necessity or industry standard, are uncopyrightable by

themselves.       What appears on EDI's input and output formats,

however, are not any kind of formulas or "facts" as such, but

organized, descriptive tables for entry of data on which the

computer will perform necessary calculations.               "Facts" are entered

by the user and "factual" algorithms are applied by the computer,

but the appearance and expression of the user interface are not

themselves a representation of "facts."           SSI does not assert that

there is only one way or a limited number of ways in which such

tables may be or are usually set forth.               Given the complexity of

offshore design projects, it is hardly surprising that a number of

other competing structural design programs exist in the market, and

the trial court found them dissimilar to SACS.              As a matter of law,

the   input      formats   and   output     reports    do     not   embody   only

noncopyrightable "facts."

            2.     Input Formats as a Template, Process or Method

            Because    the   input   data    formats    are    organized     in   a

particular fashion to effectuate the performance of mathematical

calculations, SSI likens them to a template or tool used by the


                                      21
engineer.        We assume this argument relies on Baker v. Selden, 
101 U.S. 99
(1880), although SSI has not cited that seminal case.

Baker rejected a claim of copyright on a book that described a

method of bookkeeping.        Moreover, the author's ledger sheets were

held not copyrightable because they were necessary incidents to the

idea or process embodied in the bookkeeping method.                    Like Baker v.

Selden, whether one denominates the input formats in this case as

a process or as expression "merged" with a process, the demarcation

between their utilitarian and expressive aspects is difficult to

draw.      Compare 
Altai, 982 F.2d at 712
; 
Synercom, 462 F. Supp. at 1013-14
.

                The difficulty may best be illustrated by comparing this

case    with     those   concerning   infringement        of     the   Lotus   1-2-3

spreadsheet program.        The Lotus program enables a user to create

documents adapted to his particular needs in a framework that may

be varied and that may utilize different types of information.                   As

the district court held in Lotus I, the command format and sequence

structure in an original word processing or computer spreadsheet

should     be    copyrightable   because    as    a    whole,    the    interface's

structure and hierarchy constitute a high degree of original

expression.        See Lotus 
I, 740 F. Supp. at 65-68
.

                The SACS input cards, in contrast, perform only one,

admittedly challenging task: they supply engineering data for

offshore structures.         The question is whether the utilitarian

function of the input formats, which ultimately act like switches

in   the    electrical     circuits   of    the       program,    outweigh     their


                                       22
expressive purpose so as to preclude copyright protection.                       On

balance, we believe they do not.              EDI's input formats as a whole

convey substantial information regarding what data the user needs

to gather and how they should be organized for the program to run

properly.        One   of    EDI's   trial    witnesses   testified   that      the

interface "imparts knowledge" by telling the user which data to

collect as well as the order of collection.               This alone does not

necessarily mean that SACS imparts knowledge through protectible

expression.       But, generally, functional interfaces that directly

teach or guide the user's independent decisions are more expressive

than functional interfaces that lack these qualities. Although the

degree of interaction may not be as high as that present in Lotus,

overall,    EDI    has      proved   original   expressive   content      in    the

selection, sequence and coordination of inputs.

            3.     EDI's User Interface as a "Compilation" of "Facts"

            SSI analogizes the copyrightability of the SACS input

formats and output reports to the copyrightability of compilations

as addressed in Feist Publications, Inc. v. Rural Tel Serv. Co.,

Inc., 
499 U.S. 340
, 
111 S. Ct. 1282
(1991).           That case discarded the

"sweat-of-the-brow"          doctrine   for   compilations   in   favor    of   an

analysis focusing on the originality of the compiler's expression.

"[C]opyright protects only the elements that owe their origin to

the compiler -- the selection, coordination, and arrangements of

facts." 499 U.S. at 359
, 111 S.Ct. at 1295.               "No matter how

original the format, however, the facts themselves do not become

original through association. . . . This inevitably means that the


                                         23
copyright in a factual compilation is 
thin." 499 U.S. at 349
, 111

S.Ct. at 1289.          Focusing on Feist's test for originality, SSI

argues that many of the SACS input formats derive directly from

Synercom's STRAN program.           Moreover, SSI posits, "data formats are

data formats": organizing parameters and variables as a series of

columns     of    engineering       data   amounts    to    a   "garden   variety

arrangement" required in any structural analysis program and is

similar to the unoriginal arrangement of names, addresses, and

telephone numbers in a telephone directory. SSI concludes that the

whole    bundle    of    EDI's   input     formats    and   outputs    reports     is

uncopyrightable.

            These arguments construe Feist both too broadly and too

narrowly.        Whether Feist should apply at all to the formats in

question here is doubtful.           As stated earlier, EDI's data cards do

not consist of mere "facts," nor do they portray a "compilation" so

much as a progressive demonstration of a particular engineering

program.    But to the extent that Feist's definition of originality

applies here, it appears that EDI has selected data and arranged

their placement in a way that is unique and original to SACS.                    See

Lotus Dev. Corp. v. Borland Int'l Inc., 
831 F. Supp. 223
, 231 (D.

Mass. 1993) (Lotus V) (finding command menu interface copyrightable

by comparing it to compilation: "The selection, arrangement, and

manner of presentation in a compilation may provide the user with

a method or systematic manner of accessing the (uncopyrightable)

facts.      Thus,       copyright    law   protects    only     that   part   of    a

compilation that the reader actually uses for selection of facts


                                           24
that the reader wants to know").          The creativity inherent in EDI's

program is proved by the existence by other, dissimilar structural

engineering programs available in the market.                The existence of

creativity      is    reinforced    by   SSI's     observation   that    StruCAD

performs the same functions as SACS with significantly fewer input

formats.

           4.        User Formats as Dictated by Industry Standard

           Based       upon   the   nature    of    the   offshore   structural

engineering marketplace, SSI contends, EDI had to use the same or

similar formats to those it chose in order to provide a compatible,

standardized and efficient product for its customers.                   In other

words, scenes a faire dictated EDI's choice of input formats and

output reports in the same way that the external requirements of

the cotton market dictated the program in Plains 
Cotton, supra
,

leading to a rejection of copyright protection in that case.12

Although the parties disagree over application of the doctrine in

this case, neither side cites any evidence to support its position.

On remand, the district court must consider whether or to what




      12
            A programmer's freedom of design choice may be circumscribed by
other extrinsic considerations such as the nature of the hardware on which the
program will run, compatibility requirements of other programs, computer
manufacturers' design standards, the demands of the industry being served, and
widely accepted programming practices within the computer industry. See
Altai, 982 F.2d at 709-10
, citing 3 Nimmer § 13.03[F][3], at 13-65-71. In
Lotus I, for example, the court found that use of a rotated "L" screen display
for spreadsheets, the use of a slash key to invoke a menu system, "Q" for
quitting or exiting a system, and similar other common interfaces are not
copyrightable because their use is unoriginal, nonexpressive, or thoroughly
standardized. See Lotus 
I, 740 F. Supp. at 78
. This opinion deals only with
the externalities raised by SSI.

                                         25
extent industry demand and practice in the offshore engineering

market dictated the SACS IV input and output formats.13

           This finding is only the first step, however, for anyone

may copy uncopyrightable elements in a copyrighted work.                        SSI

argues   that    many    of     EDI's    cards    are    unoriginal      and   thus

uncopyrightable.      A close examination of the actual input formats

is required to determine whether the allegedly infringed cards are

copyrightable.    Among the allegedly infringed cards, for instance,

some may be so generic, e.g., a "header" or an "end" card, that

they lack that minimal degree of creativity required for copyright

protection.      If     other    cards   for     which   EDI   claims    copyright

protection almost wholly derive from the input formats developed by

Synercom many years earlier, they would also lack the requisite

originality.14

           Filtration      has    resulted       in   one   area   of    potential

unprotectibility that must be considered on remand, and that

relates to the impact of the scenes a faire doctrine.                   SSI's other



      13
            Filtration may well render many of EDI's output formats
uncopyrightable. (An example of the parties' output reports is reproduced in
the appendix.) The remarkable similarities in some of these formats may be
due to the inherent qualities of the ideas expressed (merger) or compliance
with industry standards (scenes a faire). For example, each program must
identify individual structural members and the forces acting upon them in a
manner easily understood by engineers. The district judge will determine on
remand whether there are multiple ways to express these concepts consistent
with industry practice.
      14
            It appears that nine cards (TITLE, AMOD, SECT, GRUP, JOINT,
PERSET, LOADCN, LOAD, and LDCOMB) are virtually the same as those developed by
Synercom. A few have very slight modifications from Synercom's cards. For
example, the AMOD cards in SACS and StruCAD provide for three-digit load
condition numbers while STRAN allowed for only two-digit entries. This sort
of originality probably does not meet the minimal requirements demanded by
copyright. Similarly, the addition of columns for commentary is not
sufficient to imbue a recycled Synercom card with copyrightability.

                                         26
global objections to copyright protection for the input formats and

output reports are ill-founded.

             C.   Comparison

             After the district court completes the "filtration" of

the user interface as described, it must then decide whether SSI's

work is substantially similar to the copyrighted works.            See 
n.4 supra
.    The district court never ruled on many of the factual

issues governing substantial similarity because of its view that

computer data formats are not copyrightable.

             To determine substantial similarity, the court should

"focus on whether the defendant copied any aspect of this protected

expression."      
Altai, 982 F.2d at 710
.    In this case, it is probably

advisable for the court first to determine whether variations in

the registered and copyrightable format cards adopted by StruCAD

render the cards noninfringing elements of the larger work at the

individual card level.         Then the court may determine whether the

subset of StruCAD cards that are individually substantially similar

to   their    counterparts      in   SACS,   are,    taken   together,   so

substantially similar to EDI's copyrighted work or a part thereof

as   to   constitute    infringement.        While   a   determination   of

substantial similarity is, in the final analysis, a value judgment

that resists the imposition of a rigid analytical framework, this

only heightens the need for methodical analysis.              The ultimate

focus, in accordance with EDI's contention, should be on the input

formats and output reports taken as a whole.




                                      27
           Another proposition to bear in mind is that the scope of

protection afforded by a copyright is not constant across all

literary works.     Infringement is far more likely to have occurred

where a defendant has copied a memorable phrase from a short poem

than where the defendant has copied an explanatory phrase from a

voluminous textbook on biochemistry, because the law is more

protective of highly original and highly expressive works than it

is   of functional    and   nonfiction     works.    This   distinction    is

recognized in Feist, where, because the allegedly infringed work

was a collection of facts, the Court noted that any copyright was

"
thin." 499 U.S. at 349
, 111 S.Ct. at 1289.           The same cautious

approach to protection is appropriate for computer user interfaces.

To the extent that they are highly functional, or, like the output

formats in this case, to the extent that they contain highly

standardized technical information, they may lie very near the line

of uncopyrightability.15

           This relatively narrow scope of copyright protection has

been adopted by several courts.           In Lotus Dev. Corp. v. Borland

Int'l, Inc., 
831 F. Supp. 202
, 209 (D.Mass. 1993) (Lotus IV), Judge

Keeton referred to the scope of copyright protection as a sliding


      15
            As mentioned earlier, some cases may require courts to vary the
abstraction-filtration-comparison test to accommodate particular facts. We do
not find it necessary to do so, but by way of illustration, our interface
copyrightability analysis in this case has focused on three inquiries. First,
whether the interface is simply a blank form that fails to convey expression
to the user. Second, whether the interface is sufficiently user-directed and
interactive. Third, analogous to a compilation, whether the interface
provides original expression through the selection, sequence, and organization
of information provided to and collected from the user. In this case all of
these requisites were met. After applying other more standard
"copyrightability filters," such as scenes a faire, the district court will
determine whether the thin copyright EDI may enjoy has been infringed.

                                     28
scale that changes with the availability of expressions for a given

idea, and he impliedly accorded computer interfaces only a narrow

protection.      Noting that the menu commands and menu structure of

the   computer     spreadsheet     program           in    that    case     were   highly

functional,      Judge    Keeton   emphasized             that    the     defendant    had

infringed by copying verbatim Lotus's entire command menu hierarchy

despite the availability of many different command structures to

perform the same functions.           See also Apple Computer, Inc. v.

Microsoft     Corp.,     
799 F. Supp. 1006
,           1021    (N.D.    Cal.   1992)

(determining scope of infringement for user interface:                                "[I]f

technical or conceptual constraints limit the available ways to

express an idea. . . copyright law will abhor only a virtually

identical copy of the original."); Atari Games Corp. v. Nintendo of

America, Inc., 
975 F.2d 832
, 840 (Fed. Cir. 1992) (determining

infringement of nonliteral elements of computer program: "Even for

works warranting little copyright protection, verbatim copying is

infringement."); Digital Communications Assocs., Inc. v. Softklone

Distrib.    Corp.,       
659 F. Supp. 449
       (N.D.Ga.      1987)   (finding

infringement in a computer program's status screen which was

"virtually identical" with the plaintiff's); Harcourt Brace &

World, Inc.      v.   Graphic    Controls       Corp.,       
329 F. Supp. 517
,   525

(S.D.N.Y. 1971) (according narrow scope of protection to answer

sheet designed to be optically scanned by computers); 3 Nimmer,

§ 13.03[B][2][b] ("If the only original aspect of a work lies in

its literal expression, then only a very close similarity, verging




                                          29
on the identical, will suffice to constitute an infringing copy.")

(citing cases).

                  III.    INFRINGEMENT OF USER MANUALS

            The   district    court    found    that    the    StruCAD    manual

infringed EDI's copyright in its user manuals.                This finding was

based entirely on text, pictures, diagrams, illustrated examples,

and flow charts depicted in the manuals, but not the input and

output 
formats. 785 F. Supp. at 583
.         After these findings were

entered, SSI revised its manual, but the parties could not agree as

to whether this new manual infringed.          The district judge referred

the matter to a special master under Fed. R. Civ. Proc. 53.                  The

special master issued findings and conclusions of law in a report

in which it determined that SSI's new manual did not infringe.               The

district judge adopted the special master's report the same day it

was filed.

            EDI argues that the findings of the special master, to

the extent they were adopted by the district court, were clearly

erroneous.   In addition to procedural objections, discussed below,

EDI insists that SSI's revised manual contains many examples of

allegedly    infringing     material   from    the    old   manual   which   the

district court had held to be infringing.

            One   example    EDI   emphasizes    in    particular    is   SSI's

repeated use of a table of default values of certain engineering

constants admittedly taken from EDI's copyrighted manuals.                These

constants (specifically, drag and mass coefficients for structural

members) were allegedly researched and compiled by EDI as part of


                                       30
its efforts to accurately represent these forces in its computer

program.    They are not copyrightable, however, because they are

facts, despite the fact that EDI may have discovered them through

great expenditure of time or labor.        See 
Feist, 499 U.S. at 347
,

111 S.Ct. at 1288; Gates 
Rubber, 9 F.3d at 842-43
(mathematical

constants used in computer program uncopyrightable).

           If the district court decides on remand that StruCAD's

input formats infringe EDI's formats, the court must then reexamine

the StruCAD manual after SSI revises it to avoid infringement.            The

district judge's rulings on other portions of SSI's manual seem

somewhat contradictory, for EDI offers considerable evidence that

SSI's   revised    manual   incorporates   many    of   the    objectionable

features that the district court found infringing in its first

opinion. Nevertheless, it is unnecessary to review the revised SSI

manual until it has been reconsidered on remand.

             IV.   INFRINGEMENT RELATING TO HELP SCREENS

           The parties did not thoroughly brief this issue on

appeal.    It is evident, however, that SSI's help screens are not

substantially similar to EDI's copyrighted works. Although in many

cases StruCAD's help screens convey the same ideas and information

as EDI's user manuals, there is little verbatim copying of text.

Naturally, many of EDI's objections to StruCAD's help screens are

grounded in its objections to StruCAD's re-creation of its input

formats, to which the help screens usually refer.                 The final

infringement   determination    relating   to     the   help   screens   must




                                   31
therefore depend upon the court's evaluation of the input formats

on remand.

                         V. OBJECTIONS TO SPECIAL
                      MASTER'S REPORT AND PROCEDURES

               Because of the remand, we need not discuss in detail

EDI's objections to the special master's report and procedure.

Should the district court decide to refer any questions on remand

to a special master under Rule 53, it must allow the parties ten

days to file objections to the master's report before rendering its

decision.       This procedure was overlooked before.                    It is also

unclear whether the master strictly complied with the court's order

of reference and whether the master would have been well advised to

offer    the    parties   a   hearing,      as    Fed.   Rule    Civ.   Proc.   53(d)

provides.

                           VI. LIABILITY OF GUNTUR
                          IN HIS INDIVIDUAL CAPACITY

               EDI claims that the district court erred in dismissing

the claims against Rao Guntur in his individual capacity. Although

both Guntur and SSI were named as defendants, the district court

entered judgment against SSI alone and dismissed the personal

claims    against    Guntur      because    EDI    had   presented      insufficient

justification for "pierc[ing] the corporate 
veil." 785 F. Supp. at 585
.     This holding was erroneous.              EDI was not seeking recovery

against Guntur in his capacity as the principal owner of SSI, but

against    Guntur    as    the    individual       who   first    infringed     EDI's

copyright.      Guntur was not acting at the direction of another but

initiated the copying for direct personal gain.                  As this court has


                                           32
recognized in the context of trademark infringement, requiring a

piercing of the corporate veil to hold individuals liable would be

putting the cart before the horse.           Mead Johnson & Co. v. Baby's

Formula Service, Inc., 
402 F.2d 19
, 23 (5th Cir. 1968) ("the fact

that the persons thus acting are acting for a corporation also, of

course, may make the corporation liable under the doctrine of

respondeat superior.    It does not relieve the individuals of their

responsibility.").     On remand, the district court must apportion

damages between Guntur and SSI.

                           VII. TRADE DRESS
                     AND UNFAIR COMPETITION CLAIMS

           EDI argues that the district court erred in rejecting

EDI's claim that SSI violated section 43(a) of the Lanham Act, 15

U.S.C. § 1125(a), by infringing the trade dress of SACS.               Trade

dress refers to the image and overall appearance of a product.

Allied Marketing Group, Inc. v. CDL Marketing, Inc., 
878 F.2d 806
,

812 (5th Cir. 1989).    The Lanham Act prohibits passing off goods or

services as those of a competitor by employing substantially

similar trade dress which is likely to confuse consumers as to the

sources of the product.         Blue Bell Bio-Medical v. Cin-Bad, Inc.,

864 F.2d 1253
, 1256 (5th Cir. 1989).             In this circuit, there are

two elements of a trade dress infringement claim. First, the trade

dress of a product may be protected as an unregistered trademark if

it is nonfunctional, distinctive, and has acquired a secondary

meaning.     Second,       a    finding     of   infringement   requires   a

consideration   of   the       likelihood   of   confusion.     Taco   Cabana

International, Inc. v. Two Pesos, Inc., 
932 F.2d 1113
, 1117-18 (5th

                                      33
Cir. 1991), aff'd, 
112 S. Ct. 2753
(1992).         This court will reverse

these relevant findings of fact only upon a showing of clear error.

Marathon Mfg. Co. v. Enerlite Products Corp., 
767 F.2d 214
(5th

Cir. 1985).

            The district court's rejection of EDI's trade dress claim

was based on the second stage of the test through its finding that

there was no likelihood of confusion between the two programs.16

We find no clear error in the district court's holding that there

was little likelihood of confusion among the relevant users of the

computer programs at issue.        Testimony at trial established that

both products were targeted at a fairly limited and sophisticated

market.     Moreover, the printed pages of both parties' reports

clearly identify the vendor as EDI or SSI.        No witness testified to

an instance of actual confusion between the products. Finally, the

Lanham Act is grounded in a belief that competitors should not pass

off their products as another's.           Witnesses testified that SSI

explicitly differentiated its product from SACS in its marketing

efforts.      Furthermore, these programs' trade dress is largely

irrelevant    when   sophisticated     users   decide   which   program    to

purchase.      We have no trouble affirming the district court's

finding that there was no likelihood of confusion.




      16
            It is an interesting question, unnecessary to reach here, whether
computer input formats and output reports involving highly technical factual
reports of engineering data are so inherently functional as not to be
protectible. Cf. Computer Care v. Service Systems Enterprises, Inc., 
982 F.2d 1063
(7th Cir. 1992) (finding trade dress violation in copied format of highly
expressive computer form letters dealing with automobile repair business).

                                     34
              The same likelihood of confusion standard used for the

Lanham Act also applies to Louisiana's unfair competition statute.

Louisiana World Exposition, Inc. v. Logue, 221 U.S.P.Q., 589, 594

(E.D.La. 1983). We therefore find no error in the district court's

rejection of EDI's state law claim of unfair competition under La.

Rev. Stat. § 51:1405(A).

                             VIII.      DAMAGES

              The final issue is whether the district court erred in

awarding EDI $250,000 in damages for copyright infringement.             With

the following observations, this issue will be revisited on remand.

EDI argues that the district court placed too much emphasis on the

fact that SSI was first to market, apparently by several months, a

program which was designed for a personal computer.             EDI asserts

that the district court used this factor to reduce EDI's damages

from the $1.9 million it claimed it lost in profits over the years

1986 to 1990 to only $250,000.         We agree that several months delay

in bringing a PC version of SACS to market was not sufficient

reason to reduce damages from nearly $2 million to $250,000.             It is

not clear, however, that the district court relied on this factor

alone in reducing damages to the extent it did.           The district court

also cited Fitzgerald Pub. Co. v. Baylor Pub. Co., 
807 F.2d 1110
,

1118 (2d Cir. 1986), which held that actual damages should reflect

the extent to which the market value of the copyrighted work at the

time of the infringement has been injured or destroyed by the

infringement.      The court also indicated at one point that the

extent   of    copying   might   not   justify    fully   compensating    the


                                       35
copyright owners. The district court may have determined that some

of the decline in EDI's profits was unrelated to SSI's entry to the

market or that SSI only engaged in minimal copying.   This would be

a permissible finding; whether it was supported by the record we

need not decide.

                            CONCLUSION

           The district court erred in concluding that EDI's input

formats and output reports, taken as a whole, may not qualify for

copyright protection.    We must therefore REVERSE the district

court's holding that computer/user interfaces in the form of input

and output formats are uncopyrightable.      We also REVERSE its

holding that Guntur is not personally liable.         We REMAND to

determine whether the existence of industry standards precludes

copyright protection and whether there was infringement of the user

interfaces.   On remand the district court must also reexamine

infringement of EDI's user manuals and help screens and apportion

damages between SSI and Guntur.      We AFFIRM the court's other

rulings.

           AFFIRMED in part, REVERSED in part and REMANDED.




                                36

Source:  CourtListener

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer