WILLIAM H. ORRICK, United States District Judge.
The central issue on this motion for summary judgment is whether defendants can be liable for copyright infringement when there is no evidence that defendants copied or used plaintiff's copyrighted software other than having downloaded (but not installed) a copy of the software onto an external hard drive. To insure that plaintiff had ample opportunity to prove its case, I delayed the hearing on this motion for several months, allowed extensive discovery, and considered supplemental briefing. Because I find that the evidence demonstrates only de minimis copying, defendants' motion for summary judgment must be GRANTED.
Plaintiff Design Data Corporation created and owns copyrighted structural steel detailing software called SDS/2. Declaration of Barry Butler (Docket No. 85-11) ¶ 2. SDS/2 is a computer aided design (CAD) software that can produce two and three dimensional drawings and models of structural steel components. These drawings and models support the design, detailing, fabrication, and erection of structural steel in buildings and other structures. Id. ¶ 4. SDS/2 drawings and models can only be viewed: (1) with the SDS/2 software; (2) with the "SDS/2 Viewer" software; and (3) in electronic
Defendants Louis Liu and Helen Zhang are co-owners of defendants Unigate Enterprise, Inc. (UE) and Unigate Graphic, Inc. (UG). Declaration of Helen Zhang (Docket No 75-1), ¶ 1.
Defendants assert they have never used SDS/2 and simply act as intermediaries between contractors in China and clients in the United States. They admit, however, that they told clients they "could do" steel detailing using SDS/2 and represented that they had offices in China, but in reality they outsourced the work to others in China. Zhang Decl. ¶ 14; Zhang Supplemental Declaration in Support of Reply (Docket No.104-8), ¶ 6; see also Duden Decl. ¶ 8 (email from Zhang explaining detailing work on Hurst Middle School project was done in Unigate's "Shanghai office"), ¶ 11 (email from Zhang stating that Unigate "can do show [sic] drawings by using SDS/2.").
Defendants do not dispute that SDS/2 appears to have been used to create drawings and images for five of UE's projects, but UE contends that the work was actually done in China. Zhang Decl. ¶ 11. Defendants also admit that they forwarded files containing 2D and 3D drawings and models created with SDS/2 to clients and prospective clients — but assert that they did not use SDS/2 themselves. Zhang Decl. ¶ 12; Zhang Supp. Decl. ¶¶ 8-9; Duden Decl. ¶ 7.
Defendants admit that Helen Zhang downloaded a copy of SDS/2 to an external hard drive. The parties dispute the purpose and circumstances surrounding that download. DDC contends that Zhang admitted that she paid to download a "cracked" copy of the software, but that she was unable to make it work. Duden Decl. ¶ 14. Zhang asserts that she downloaded a free demonstration copy of SDS/2 from the internet, which she assumed was a legitimate copy, in order to learn "what the software was all about," but did not install it or try to use it. Zhang Decl. ¶¶ 9, 10, 14; Zhang Supp. Decl. ¶ 7.
DDC has not sold a license for SDS/2 to any of the defendants. Based on their investigations (including viewing materials on UE's website and project files), DDC believed that U E was using SDS/2 without
In July 2013, UE's counsel hired an expert from Setec to make forensic images of its computer hard drives. Declaration of Michael Kunkle (Docket No. 75-3), ¶ 6. That inspection revealed a single reference to SDS/2 on a computer and a copy of SDS/2 on an external hard drive ("G drive"). Id. The reference on the computer was in an antivirus log, showing that the SDS/2 copy was located on the external hard drive. Id. Setec found no evidence that the SDS/2 software ever existed or was installed on the computer. Id. ¶ 7. Examining the copy of SDS/2 on the external hard drive, Setec determined it was still in its original form and found no evidence that the software was ever installed or unpacked on the external drive. Id. ¶ 8; Supplemental Declaration of Michael Kunkle (Docket No. 102), ¶¶ 5-6.
Defendants filed their initial motion for summary judgment in January 2014. Docket No. 63. The Court granted plaintiff's request to continue the hearing on the summary judgment motion and continue the trial dates to allow plaintiff to take discovery from defendants. Docket No. 73. Defendants filed their renewed motion for summary judgment in March 2014. Docket No. 75. At plaintiff's request, the Court again continued the summary judgment briefing and hearing dates to allow plaintiff to conduct additional forensic inspections of the defendants' computers. Docket No. 81.
In April 2014, DDC's expert from IBridge LLC, Joel Brillhart, created forensic images of defendants' computers and also reviewed the forensic copies made by Setec. Declaration of Joel Brillhart (Docket No. 85-12), ¶ 5. Brillhart was not able to locate or recover a copy of the file "1-sds26336crk.exe" which was found by DDC representatives in August 2012. Brillhart Decl. ¶ 6. However, Mr. Brillhart found a reference to that specific file as being located on Zhang's G drive and "quarantined" by an antivirus software program. Id. ¶¶ 7a-e. Brillhart states that because he was unable to locate a copy of the 1-sds2633crk.exe file, he concludes that the file must have been purposefully and permanently removed from Zhang's G drive. Id. ¶ 10. Brillhart also located a file suggesting that a file titled sds2.exe could be found on Zhang's G drive. Id. ¶¶ 7f-g. Brillhart was also unable to locate any evidence suggesting the SDS Viewer program was ever saved or located on any of UE's devices. Id. ¶ 11.
Defendants have moved for summary judgment arguing that U E and its principals cannot be held liable for direct infringement of DDC's copyright in SDS/2 because the mere act of downloading (and not installing or using) a copy of SDS/2 is at most de minimis copying protected under the Copyright Act. Defendants also argue that UE cannot be liable for contributory infringement for any alleged use of SDS/2 by it contractors in China. Finally, defendants assert that summary judgment should be granted for UG, as that entity plays no role in the steel detailing at issue.
Summary judgment is proper "if the movant shows that there is no genuine dispute as to any material fact and the
Once the moving party has met its burden, the burden shifts to the non-moving party to "designate specific facts showing a genuine issue for trial." Id. at 324, 106 S.Ct. 2548 (quotation marks omitted). To carry this burden, the non-moving party must "do more than simply show that there is some metaphysical doubt as to the material facts." Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). "The mere existence of a scintilla of evidence... will be insufficient; there must be evidence on which the jury could reasonably find for the [non-moving party]." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 252, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). Rather, the nonmoving party must "go beyond the pleadings and by her own affidavits, or by the depositions, answers to interrogatories, and admissions on file, designate specific facts showing that there is a genuine issue for trial." Celotex, 477 U.S. at 324, 106 S.Ct. 2548 (internal quotations omitted). "Disputes over irrelevant or unnecessary facts will not preclude a grant of summary judgment." T.W. Elec. Serv., Inc. v. Pacific Elec. Contractors Ass'n, 809 F.2d 626, 630 (9th Cir.1987).
In deciding a summary judgment motion, the court must view the evidence in the light most favorable to the non-moving party and draw all justifiable inferences in its favor. Anderson v. Liberty Lobby, Inc., 477 U.S. at 255, 106 S.Ct. 2505. "Credibility determinations, the weighing of the evidence, and the drawing of legitimate inferences from the facts are jury functions, not those of a judge ... ruling on a motion for summary judgment." Id. However, conclusory or speculative testimony in affidavits is insufficient to raise genuine issues of fact and defeat summary judgment. Thornhill Publ'g Co. v. GTE Corp., 594 F.2d 730, 738 (9th Cir.1979).
Defendants move for summary judgment on DDC's contributory infringement claim. They argue, correctly that a company in the United States cannot be found liable for contributory copyright infringement for authorizing or collaborating with someone that infringes a copyrighted work in a foreign country. See, e.g., Subafilms, Ltd. v. MGM-Pathe Communications Co., 24 F.3d 1088, 1092, 1995 (9th Cir.1994) ("wholly extraterritorial acts of infringement cannot support a claim under the Copyright Act" even when "authorized" by a party in the United States). DDC did not address this issue in its opposition and presents no evidence that any of the steel detailing work (creation of drawings and images) provided by defendants to clients in the United States was actually done in the United States. Accordingly, summary judgment is GRANTED to defendants on DDC's contributory infringement claim.
In opposing defendants' motion, DDC has two arguments that defendants can be liable for direct infringement and asserts that it has raised material issues of fact on
DDC argues that when defendants received the "job files" and images created by its contractors in China, defendants violated the Copyright Act because those files and images constitute a copy or copyrighted portion of SDS/2. Oppo. at 14. It is undisputed that defendants had on their computers: (1) one or more electronic images containing 2D drawings generated with SDS/2; (2) one or more electronic images of 3D models generated with SDS/2; (3) multiple text files generated by SDS/2 during its operation that constitute error logs containing user error reports and DDC instructions regarding those errors; and (4) entire directories of folders generated by SDS/2 ("job files") which contain all information related to the design of structural steel components with SDS/2 in association with two of UE's projects. Id. DDC contends that these files and electronic images are covered under the SDS/2 copyright registration because they are the output of the SDS/2 program, and that it has raised a material issue of fact as to whether the output "contain expression that is protected under the SDS/2 Copyright Registration." Oppo. at 15.
The question here, of course, is not whether the output at issue is expressive so that it is copyrightable, but whether the copyright registration on the software is broad enough to protect the program's outputted files and drawings. DDC relies on a number of cases that are inapposite.
DDC relies first on AtPac, Inc. v. Aptitude Solutions, Inc., 787 F.Supp.2d 1108 (E.D.Cal.2011). The AtPac court recognized the well-established principle that computer programs are entitled to copyright protection as "literary works" (under 17 U.S.C. § 102(a)) and went onto explain that "[p]rotection under the Copyright Act extends to both `literal' and `non-literal' components of computer software.... Literal components include source codes and object codes and non-literal components include the software's structure, organization, and user interface."
In Miller v. Facebook, Inc., 2010 U.S. Dist. LEXIS 75204, *5 (N.D.Cal. July 23, 2010), the court simply clarified a prior order and found that plaintiff's work would be analyzed as a literary work (copyrighted under 17 U.S.C. § 102(a)(1)) and not an audio-visual work (copyrighted under § 102(a)(6)). The court did not determine whether the audio-visual "look and feel" elements of the program were protected. Here, it is not the "look and feel" of the SDS/2 program that DDC accuses defendants
DDC also relies on Atari Games Corp. v. Nintendo of Am., 1993 WL 214886, 1993 U.S. Dist. LEXIS 8183 (N.D.Cal. Apr. 15, 1993). That case draws a distinction between the source code that operates the program (and is protected by the copyright) and the output data (which is not protected by the copyright). As the court explained:
Id. at *3, 1993 U.S. Dist. LEXIS 8183, at *11-12.
Here the "job files" and other documents produced by the program are "data" not covered by the program's copyright. With respect to the drawings produced from SDS/2, those might be copyrightable but they are not automatically entitled to protection as the output of SDS/2.
Id. at 703.
DDC has failed to raise a material question of fact to show that the files and
Defendants do not dispute that Zhang downloaded a copy of SDS/2 to her external drive. Defendants' expert found no evidence that the program was installed or used. Kunkle Decl. ¶¶ 7-8. DDC's expert presents no testimony or evidence to the contrary. Because they never opened or used the software, defendants argue that the mere copying of the program to the drive was de minimis and not actionable under the Act.
The Ninth Circuit has explained the concept of de minimis copying under the Copyright Act as: "[f]or an unauthorized use of a copyrighted work to be actionable, the use must be significant enough to constitute infringement.... This means that even where the fact of copying is conceded, no legal consequences will follow from that fact unless the copying is substantial." Newton v. Diamond, 388 F.3d 1189, 1192-1193 (9th Cir.2004); see also Ringgold v. Black Entertainment TV, 126 F.3d 70, 74 (2d Cir.1997) (de minimis concept "insulates from liability those who cause insignificant violations of the rights of others."). DDC notes that whether or not copying is de minimis is generally a question of fact. However, that does not preclude a court from granting summary judgment where, on undisputed facts, no reasonable juror could find the downloading but not opening or using of the SDS/2 was not significant. Newton at 1195 (granting summary judgment to defendants).
DDC argues that because defendants copied the entire software code for SDS/2, the copying cannot be de minimis as a matter of law. But as defendants point out, the cases discussing de minimis focus on the substantial or insubstantial "use" of the copyrighted material in the copy. As the Second Circuit explained in Ringgold v. Black Entertainment TV, the concept of de minimis use encompasses "a technical violation of a right so trivial that the law will not impose legal consequences," for example a "claim based on a photograph of [the copyright holder's] product in an office copy of a display card of a competitor's product where the display card was never used." Id. at 74 (discussing Knickerbocker Toy Co. v. Azrak-Hamway International, Inc., 668 F.2d 699, 703 (2d Cir.1982))
The cases DDC relies upon describing the test for determining de minimis use as whether an audience would "recognize" the appropriation of a protected work in another
Here, the undisputed facts are that Zhang downloaded a copy of SDS/2, but did not install or use it. Kunkle Decl. ¶ 8; Zhang Decl. ¶ 10; see also Duden Decl. ¶ 14 (Zhang admitted that she had "purchased a cracked copy of SDS/2, but that she had trouble getting it to function on her computer, and so she hadn't actually used any version of SDS/2 on her computer.").
Failing to locate any evidence of defendants' actual use of SDS/2 — despite their extensive forensic efforts and having taken the depositions of defendants — DDC relies on circumstantial evidence to suggest that defendants did use SDS/2 by pointing to statements defendants made to prospective clients in emails and their contracts; that they "used" or could "produce" drawings in SDS/2 and that UE "produces and delivers shop detail drawings" and "Unigate will make an effort to coordinate the architectural and structural set of drawings... while preparing the set of Shop Detail Drawings." See, e.g., Declaration of Kymberleigh Korpus (Docket Nos. 85-13, 85-14), Ex. 2 ("We usually use SDS/2 or Xsteel to do structural part detailing"); Ex. 4 ("We are in California and provide our service all over the US. We usually use SDS2 and XSteel to do detailing."); Ex. 15. However, given the undisputed facts regarding defendants' actual business model, which was solely to act as the middleman between contractors in China and clients in the United States, coupled with the lack of evidence of use, defendants' marketing pitches and statements to their clients do not amount to evidence that defendants used or otherwise copied SDS/2 in any significant way.
I conclude that the downloading of a copy of SDS/2 — without any evidence that the copy was installed or used — amounts at most to a de minimis "technical" violation that is not actionable as a matter of law. See Ringgold, 126 F.3d at 74.
Finally, DDC spends much time painting defendants as untrustworthy. It argues that defendants (i) refused to turn over pertinent information (emails between defendants and clients found by DDC's expert, but not produced by defendants because they may have been deleted), (ii) allegedly deleted the cracked SDS/2 file from their computer (when the forensic evidence from both sides indicates the cracked file was quarantined by an antivirus program and subsequently deleted), (iii) purchased and downloaded a cracked copy of SDS/2 in order to circumvent DDC's license (when defendants claim they downloaded what they thought was a free demonstration copy of SDS/2) and (iv) advertised that they actually used SDS/2 (but now assert they never used SDS/2).
Because the Court has GRANTED the motion for summary judgment as to UE's infringement, summary judgment must likewise be granted to UG, as the substance of the allegations regarding infringement are the same.
Per the parties' request, I gave leave to DDC to a file a supplemental opposition, based on DDC's representation that it "learned information" in the June 24 and 25 depositions of defendants that "needs to be considered by the Court in ruling on the MSJ." Docket No. 109. In DDC's supplemental opposition, DDC cites no new facts that are directly relevant to arguments made in the motion for summary judgment. Instead DDC provides further argument on its theory that defendants' possession and use of the output of SDS/2 (images and files) violated the copyright covering SDS/2. For the reasons discussed above, I reject that argument.
The main focus of DDC's supplemental opposition is an argument that summary judgment should not be granted to defendants because DDC will seek leave to file an amended complaint to allege new causes of action for:
The Court will address whether to grant DDC leave to amend in a separately noticed hearing. The request to amend, however, does not prevent the Court from granting defendant's motion for summary judgment on the existing causes of action in this case.
DDC asks the Court to file under seal various portions of defendants' reply brief and supporting declarations. As discussed below, I am allowing certain portions of the documents to be filed under seal. If this case goes to trial, however, I will reconsider whether it is appropriate to prohibit public access to this evidence. I will address each in turn.
Reply 3:10-11. DDC seeks to seal one sentence describing the confidential and proprietary methods used to investigate and detect copyright infringement. The motion is GRANTED as to this sentence.
Reply 5:18. DDC seeks to seal two words that allegedly disclose a method DDC uses to investigate and detect copyright infringement. The motion is GRANTED.
Reply 13:27-14:2. DDC seeks to seal information regarding a question one of its representatives asked DDC. DDC does not explain why the information in this question would disclose a confidential method DDC employs to investigate and detect copyright infringement. The motion is DENIED.
Zhang Decl., 2:13, 3:3, 4, 6, 10, 11, 15, 18-26; 4:10:11. DDC seeks to seal information describing a confidential and proprietary method it uses to investigate and detect copyright infringement. The motion is GRANTED.
Zhang Decl., 4:12-13, 15-16, 24, 28. DDC seeks to seal this information, but DDC does not explain why the information in question would disclose a confidential method DDC employs to investigate and detect copyright infringement. The motion is DENIED.
Li Decl, Ex. J, portions of pages 3-4. DDC seeks to seal information describing a confidential and proprietary method it uses to investigate and detect copyright infringement. The motion is GRANTED.
Li Decl., Ex. O. This information is public information and DDC does not provide a reason for its sealing. The motion is DENIED.
Li Decl., Ex. P. DDC seeks to seal information describing its confidential and proprietary methods used to investigate and detect copyright infringement. The motion is GRANTED.
Li Decl., Ex. Q. DDC seeks to seal information describing a confidential and proprietary method it uses to investigate and detect copyright infringement. The motion is GRANTED.
Li Decl., Ex. T. This information is public information and DDC does not provide a reason for its sealing. The motion is DENIED.
Li Decl., Ex. U-1 and U-2. DDC seeks to seal information describing a confidential and proprietary method it uses to investigate and detect copyright infringement. The motion is GRANTED.
Within five days of the date of this Order, defendants shall filed revised (redacted as necessary) versions of the Reply brief, Supplemental Zhang Declaration and Li Decl. Ex. O and Ex. T consistent with this Order.
For the foregoing reasons, defendants' motion for summary judgment is GRANTED.