Paul M. Aoki

research scientist

On “Mental Contamination”

This is a document filed in opposition to the 1993 UNIX Systems Laboratories suit against BSDI. It quotes the phrase “mentally contaminated” from a previous USL deposition (not made public), and points out the ethical problem with (1) encouraging students to look at the UNIX source code to learn about operating systems (at Cal, you just had to ask Bob Henry for an account on miro) and then (2) later insisting that anybody who had ever done so could not work on any other operating system without a UNIX source license.

(I obtained this from http://ftp.cdrom.com/pub/obi/BSDI/930108.oppose; the OCR errors are in the original. Dennis Ritchie archived more of these documents, if you’re interested.)

JAMES H. FORTE (2248)
SAIBER SCHLESINGER SATZ & GOLDSTEIN
1 Gateway Center
Newark, New Jersey 07102-5311
(201) 622-3333

HELLER, EHRMAN, WHITE & McAULIFFE
525 University Avenue, 9th Floor
Palo Alto, California 94301
Telephone: (415) 326-7600

Attorneys for Defendant Berkeley Software Design, Inc.

UNITED STATES DISTRICT COURT
DISTRICT OF NEW JERSEY

UNIX SYSTEM LABORATORIES, INC., 

Plaintiff,

v.

BERKELEY SOFTWARE DESIGN, INC.,  
Defendant.

Hon. Dickinson R. Debevoise
Civil Action No. 92-1667  (DRD)

Defendant Berkeley Software Design's Opposition
To USL's Motion For Preliminary Injunction


TABLE OF CONTENTS

INTRODUCTION ...........

FACTUAL BACKGROUND .....................

ARGUMENT . . . . . . . . . . . . . . . . . .  . . . . . . 14

I. 	USL HAS NOT MET ITS HEAVY BURDEN OF ESTABLISHING
	ENTITLEMENT TO A PRELIMINARY INJUNCTION , . . . . . . .  4

II.	USL IS NOT LIKELY TO SUCCEED ON ITS COPYRIGHT
	INFRINGEMENT CLAIM . . . . . . . . . . . . . . . . . . 16

	A. 	USL Has No Valid Copyright in the 32V code . . . lo

		1.	The Limited Publication Doctrine is Inapplicable

		2.	The Header Files Which USL Claims Have Been
			Infringed Have Been Included in Binary 		
			Distributions
			Made By USL Licensees With 
			No Copyright Notice . . . . . . . . , . . . 26

	B. 	THE SIMILARITIES RELIED UPON BY USL WOULD NOT
		ESTABLISH COPYRIGHT INFRINGEMENT EVEN IF THE
		32V CODE WERE COPYRIGHTED...............


		1.	The Features Relied Upon By USL's Experts
			Are Not Protectible

		2. 	The Similarities Relied Upon By USL's Expert
			Are Neither Quantitatively Nor Qualitatively
			Substantial

		3. 	USL Could Not Enforce A 32V Copyright
			Against The University Or BSDI Because
			Of The Lack Of Copyright Notice . . . . . . 3 7

	III. 	USL CANNOT DEMONSTRATE A LIKELIHOOD OF SUCCESS ON
		ITS TRADE SECRET CLAIM

		A.	To Prevail On Its Trade Secret Claim, USL Must 
			Demonstrate
			That BSD/386 Contains USL Trade Secrets

			1.	The License Agreements Authorize Use Of The
				UNIX 32V Code To Create Modifications, 
				Enhancements and Derivative Works

			2.	The License Agreements Permit Derivative 
				Works
				Not Containing USL Trade Secrets To Be Made
				Available to Non-Licensees

			3. 	The Duty of Confidentiality Does Not Apply
To 
				Information That Is Or Becomes Generally 
				Known . . 1l 9

		B .	USL Cannot Demonstrate That Net2 or BSD/386
			Contain Any USL Trade Secrets

	IV.	USL CANNOT SHOW IRREPARABLE HARM

	V.	THE PUBLIC INTEREST FAVORS DENIAL OF THE 
		PRELIMINARY INJUNCTION

	VI.	EVEN IF USL COULD ESTABLISH THAT NET2 CONTAINED 
		SOME USL PROPRIETARY INFORMATION, THE INJUNCTION IT 
		SEEKS IS OVERLY BROAD

		A.	An Injunction Against The Entire BSD/386 Program 
			WouldBe Impermissibly Overbroad

		B.	Plaintiff is Misusing its Copyright by Attempting 
			to EnjoinAll of BSD/386
	,
787 F.2d 875 (3d Cir. 1986) cert. dismissed, 488
U.S. 918 (1988) . . . . . . . . . . . . . . . . . . . . 53

Apollo Technologies Corp. v. Centrosphere Industrial Corp,.,
No. 92-3712 (AJL), 1992 WL 289943 (D.N.J. 1992) . . . . 15

Apple Computer, Inc. v. Franklin Computer Corp.,
714 F.2d 1240 (3d Cir. (1983), cert. dismissed, 464
U.S. 1033 (1984) . . . . . . . . . . . . . . . . . . .	  7

Baker v. Selden,
101 U. S . 99 . . . . . . . . . . .	. . . . . . . . . . .	 3 6

Breffort v. I Had A Ball Co.,
271 F. Supp. 623 (S.D.N.Y. 1967) . . . . . . . . . . . 54

Brown v. Tabb,
714 F.2d 1088 (11th Cir. 1983). . . . . . . . . . . 19, 20, 23, 24

Brown Bag Software v. Symantec Corp.,
960 F.2d 1465 (9th Cir. 1992) . . . . . . . . . . . . . 33

Campbell Soup Co. v. ConAgra. Inc.,
977 F.2d 86 (3d Cir. 1992) . . . . . . . . . . . . . . 15

Colonial Book Co.. Inc. v. AMSCO School Publications. Inc.,
41 F. Supp. 156 (S.D.N.Y. 1941) . . . . . . . . . . . . 54

Craft v. Kobler,
667 F. Supp. 120 (S.D.N.Y. 1987) . . . . . . . . . . . 54

Data General Corp. v. Digital Computer Controls. Inc.,
188 U.S.P.Q. 276 (Del. Ch. 1975) . . . . . . . . . . . 24

Davis v. Romney,
490 F.2d 1360 (3d Cir. 1973) . . . . . . . . . . . . . 53

Educational Testing Services v. Katzman,
793 F.2d 533 (3d Cir. 1986) . . . . . . . . . . . . . . ~5

Feist Publications. Inc. v. Rural Telephone Service Co.,
499 U.S. ___, 113 L. Ed. 2d 358, 111 S. Ct. 1282
(1991) ~                           . . . . . . . . 27, 2~, 29

Ferroline Corp. v. General Aniline & Film Corp.,
207 F.2d 912 (7th Cir. 1953), cert. denied., 347
U.S. 953 (1954) . . . . . . . . . . . . . . . . . . . . 49

Frank's GMC Truck Center. Inc. v. General Motors Corp.,
847 F.2d 100 (3d Cir. 1988) . . . . . . . . . . . . 14, 15

Hubco Data Products Corp. v. Management Assistance. Inc.,
219 U.S.P.Q. 450 (D. Idaho 1983) . . . . . . . . . . . 24

Ideal Toy Corp. v. Plawner Toy Mfg. Corp.,
685 F.2d 78 (3d Cir. 1982) . . . . . . . . . . . . . . 53

International Film Service Co., v. Affiliated Distributors,
283 F. 229 (S.D.N.Y. 1922) . . . . . . . . . . . . . . 54

Landsberg v. Scrabble Crossword Game Players. Inc.,
736 F.2d 485 (9th Cir. 1984) . . . . . . . . . . . 28, 31

Lasercomb America, Inc. v. Reynolds,
911 F.2d 970 (4th Cir. 1990) aff'd without op. 961
F.2d 211 (1992) . . . . . . . . . . . . . . . . . . . . 56

Magic Marketing v. Mailing Services of Pittsburg. Inc.,
634 F. Supp. 769 (W.D. Pa. 198, 1986) . . . . . . . . . 33

McLendon v. Continental Can Co.,
908 F.2d 1171 (3d Cir. 1990) . . . . . . . . . . . . . 53

Merchant & Evans v. Roosevelt Building Products,
963 F.2d 628 (3d Cir. 1992) . . . . . . . . . . . . . . 15

Morton v. Beyer,
822 F.2d 364 (3d Cir. 1987) . . . . . . . . . . . . . . 15

National Broadcasting Co. v. Sonneborn,
630 F. Supp. 524 (D. Conn. 1985) . . . . . . . . . . . 24

Orth-o-Vision. Inc. v Home Box Office,
474 F. Supp. 672 (S.D.N.Y. 1979) . . . . . . . . . 29, 54

Paramount Pictures Corp. v. Rubinowitz,
217 U.S.P.Q. 48 (E.D.N.Y. 1981) . . . . . . . . . . 24, 25

- iv-

qad. inc. v. ALN Associates, Inc.,
770 F. Supp. 1261 (N.D. Ill. 1991) . . . . . . . . . . ,,

Rexnord. Inc. v. Modern Handling Systems, Inc.,
379 F. Supp. 1190 (D. Del. 1974) . . . . . . . . . 16, 13,27

Reyher v. Children's Television Workshop,
533 F.2d 87 (2nd Cir. 1976) . . . . . . . . . . . . . . 29

SEGA Enterprises LTD., Accolade, Inc.,
24 U.S.P.Q. 2d 1561 (9th Cir. 1992) . . . . . . . . . . 31

Salinger v. Random House, Inc.,
811 F.2d 90 (2d Cir.) cert. denied, 484 U.S. 890
(1987) . . . . . . . . . . . . . . . . . . . . . . . . 54

See v. Durang,
711 F.2d 141 (9th Cir. 1983) . . . . . . . . . . . . . 29

Sen-Torq, Inc. v. K Mart Corp.,,
936 F.2d 851 (6th Cir. 1991) . . . . . . . . . . . . . 33

Walker v. Time Life Films. Inc.,
615 F. Supp. 430 (U.S.D.C. SD. NY, 1985) . . . . . . . 30

Warner Bros. Inc. v. American Broadcasting Companies. Inc.,
770 F.2d 231 (2nd Cir. 1983) . . . . . . . . . . . . . 28

Whelan Associates, Inc. v. Jaslow Dental Laboratory. Inc.,
797 F.2d 1222 (3d Cir. 1986), cert. denied . . . . . . 32

White v. Kimmell,
193 F.2d 744 (9th Cir.), cert. denied, 343 U.S. 957
(1952) . . . . . . . . . . . . . . . . . . . . . . 18, 19,
23, 2~,

STATUTES

17 U.S.C. S 401 (former version) . . . . . . . . . . . . . . 16

17 U.S.C. Section 401(a) (former version applicable) . . . . 20

17 U.S.C. S 405 . . . . . . . . . . . . . . . . . . . . . . . 16

37 C.F.R. 202.1(9) (1985) . . . . . . . . . . . . . . . . 27, 3~

37 C.F.R.  202.1(a) . . . . . . . . . . . . . . . . . . . . 33

OTHER AUTHORITIES

3 Nimmer, Nimmer on Copyright,  3.03 [F][5] . . . . . . . . 28

1 Nimmer on Copyright  4.13[A], at 4-70 n.13.1 (1992) . . . 25

11 Wright & Miller, Federal Practice and Procedure: Civil
2947, at 424 (1973) . . . . . . . . . . . . . . .	53

3 Nimmer on Copyright, supra  13.03[F][2], 
 
3 Nimmer on Copyright, supra,  14.06[C]

3 Nimmer on Copyright. supra, 14.06[c]


JAMES H. FORTE (2248)
SAIBER SCHLESINGER SATZ & GOLDSTEIN
1 Gateway Center
Newark, New Jersey 07102-5311
(201) 622-3333

HELLER, EHRMAN, WHITE & McAULIFFE
525 University Avenue, 9th Floor
Palo Alto, California 94301
Telephone: (415) 326-7600

Attorneys for Defendant Berkeley Software Design, Inc.

UNITED STATES DISTRICT COURT
DISTRICT OF NEW JERSEY

	UNIX SYSTEM LABORATORIES, INC.,
	               Plaintiff,	

-against-	

	BERKELEY SOFTWARE DESIGN, INC., and
	the Following lndividuals in their Collective
	Capacity as THE REGENTS OF THE 
	UNIVERSITY OF CALIFORNIA: PETE	
	WILSON, LEO T. MCCARTHY, WILLIE L.	
	BROWN, JR., et al.,
	     Defendants.

		Civil Action No.92-1667 (DRD)

MEMORANDUM OF LAW ON BEHALF OF DEFENDANT
BERKELEY SOFTWARE DESIGN, INC. IN FURTHER OPPOSITION
TO PLAINTIFF'S MOTION FOR PRELIMINARY INJUNCTION

Introduction

With this motion, plaintiff UNIX System Laboratories, Inc., ("USL") 
asks this Court to prohibit Berkeley Software Design, Inc. ("BSDI") 
from selling its only product and from maintaining any of its current 
employees, based on the fact that, like most experienced computer 
programmers, they have had access to UNIX source code. USL's 
supposedly secret source code has been licensed to universities and 
companies around the world for many years and has been so widely 
available that many aspects of it have become industry standards. In 
addition, hundreds of books have been written describing the code in 
great detail with no complaint from USL. (See Joint Declaration of 
Marshall Kirk McKusick and Keith Bostic, ~ 28.5 and 36; Affidavit of 
David Kashtan, ~ 6, 8, 14, 15, 17-19, 23; Affidavit of Michael Karels, 
~ 34-36).[fn1]  Thus, this is hardly the "garden variety" 
misappropriation suit USL claims it is.

Having chosen to disclose its source code to students and computer 
programmers all over the world, and having promoted it as an 
industry standard, USL's attempt to portray it as a closely guarded 
secret, based on its own internal safeguards, is ludicrous.

As in any trade secret case, a finding of misappropriation requires a 
showing that the specific items BSDI allegedly misappropriated are 
in fact secret. No such showing has been or can be made. In fact, 
most of the items USL relies on are standard features, consisting of 
file names and mnemonics commonly used, both in USL-licensed 
products and in UNIX-compatible products for which no USL license 
is required or are disclosed in publicly available materials. (See 
McKusick and Bostic Decl. ~ 26-28.4, 28.6.2, 28.7, 32, 33, 37, 39, 45, 
53, 56, 59, and 61; Karels Aff. ~ 34-36; Kashtan Aff. ~ 3, 5, 7, 12, 
17, 19, 21, 23).

  [fn1]  The Joint Declaration of Marshall Kirk McKusick and Keith 
Bostic shall be referred to as the "McKusick and Bostic Decl.," 
respectively. The Affidavits of David Kashtan and Michael Karels 
shall be referred to as "Kashtan Aff." and "Karels Aff.," respectively.

Unable to find significant similarities in the actual code, USL points 
to these same standard file names and mnemonics as evidence of 
copyright infringement, even though USL forfeited any copyright 
protection in the 32V code long ago, by making it widely available 
with no copyright notice. Even if USL had not forfeited copyright 
protection in the 32V code, it could not show copyright 
infringement, since mnemonics and common industry standards are 
not protectible under copyright law and their use does not prove 
illicit copying.

As for the actual code, out of the over 1.5 million lines of code in 
BSD/386, USL's expert relies solely on a few lines interspersed in 
two functions, ignoring the fact that instructions on how to 
implement those functions are contained in various textbooks. (See 
McKusick and Bostic Decl., ~1 53-56; Kashtan Aff., ~1 4-6). Given 
the specific instructions available in such books, the trivial 
similarities relied on by USL are to be expected and prove neither 
copying nor use of the 32V code.

In short, with this motion, USL seeks to exclude a legitimate 
competitor from the marketplace by attempting to invoke a 
nonexistent copyright, by relying on commonly used industry 
standards as evidence of copying, and by falsely claiming generally 
known information as its trade secrets.

Not content to destroy one potential competitor, USL also seeks to 
keep a stranglehold on the entire market by claiming that everyone 
who has had ever had access to UNIX source code a group that 
include~ most experienced programmers in the industry is "mentally 
contaminated" and may not develop any functionally similar product, 
without first purchasing an exorbitantly expensive license from USL. 
In accordance with this argument, USL requests this Court to 
prohibit BSDI from hiring anyone who has had access to UNIX source 
code. USL's request would not only require BSDI to fire all of its 
current employees, but would make it difficult to find any qualified 
replacements. Having chosen to widely disseminate its source code 
in order to build a market for its product and having succeeded in 
making it an industry standard, USL cannot now claim that everyone 
with knowledge of it is restricted from developing competing 
products.

USL is also unable to show irreparable harm, as it must in order to 
obtain a preliminary injunction. As authorized under its license 
agreements with USL, the University of California has distributed 
the Net2 software on which BSD/386 is based, with no restrictions 
on further disclosure and distribution. The Net2 software was 
written by students and employees of the University of California 
and thousands of other individuals around the world who have 
contributed their work to the University. (See Karels Aff. ~l 13-14). 
Hundreds of thousands of copies of Net2 have been publicly 
distributed and Net2 remains available from a variety of public 
archives. (See Affidavit of Richard F. Adams, Jr., ~1 15-16) ("Adams 
Aff.). In addition, at least one other company has created a complete 
system based on Net2 and continues to market that system. (Adams 
Aff., ~ 17). USL has taken no legal action against that company or 
against any of the numerous other entities still distributing Net2.

The number of additional copies of the code BSDI will sell while this 
case is pending is insignificant relative to the huge number of 
copies already distributed and which remain freely available to the 
public. Thus, USL's claim of irreparable harm is totally divorced 
from reality. BSDI, on the other hand, will be forced out of business 
long before any trial is had and will be unable to pay for its defense, 
if it is prevented from continuing to sell its only product. For all of 
these reasons, USL is unable to meet the standards required for a 
preliminary injunction and its attempt to force BSDI out of business 
without affording it a full trial must be denied.

Factual Background 

A. The Parties.

Plaintiff USL is a majority-owned affiliate of AT&T. It was 
formerly a division within AT&T and was spun off to form a separate 
company with the goal of marketing UNIX source code and other 
software. (Thiel Dep. T. 80-8 to 80-25, 81-1 to 81-24).[fn2]  It has 
recently been announced that AT&T's stock in USL will be sold to 
Novell Corporation. (See Affidavit of James H. Forte, 2) (hereinafter 
"Forte Aff.").

Defendant University of California ("the University") is a world-
renowned university. For many years, the University has distributed, 
on a nonprofit basis, software developed by its Computer Systems 
Research Group ("CSRG"). These distributions are known as Berkeley 
Software Distributions, and have been used by many companies, 
including USL, in a variety of commercial products. (See Karels Aff., 
11 3-10, 12-13, 20).

Some of the Berkeley Software Distributions have included code 
licensed to the University by USL and thus have been provided only to 
USL licensees. (Id., 1 9). Others not including any USL-licensed code 
have been made available to anyone, without requiring proof of a USL 
source code license. (Id., ~1 9-13). As discussed below, such 
distributions were expressly authorized in the University's license 
agreements with USL.


  [fn2] All citations to the deposition transcript of Charles Thiel are 
attached as Exhibit A to the Affidavit of James H. Forte.

In July of 1991, the University began distributing its Second 
Networking Release ("Net2"), which did not contain USL proprietary 
code and thus required no USL license. USL now falsely accuses the 
University of violating its trade secrets and copyrights by releasing 
Net2 to non-licensees.

Defendant BSDI is a small startup company that has spent 
approximately eleven man-years developing the Net2 release into a 
commercially viable product - BSD/386 - which is potentially 
competitive with USL's UNIX operating system. (Adams Aff., ~ 3-6). 
Initially, USL sued only BSDI, even though the claim was based on an 
allegation that the University's release of Net2 violated its 
intellectual property rights. Subsequently, USL added the University 
as a defendant and alleged that the code added to Net2 by BSDI also 
violated its rights. 

B. The Technology

A computer program is a set of instructions implementing 
algorithms that enable a computer to perform various functions. 
Computer programs are written in a form called "source code," 
which consists of humanly-comprehensible instructions in one of 
many computer languages. UNIX source code is usually written in a 
language called "C". Before source code can be run on a computer it 
must be compiled into machine-readable code called object code or 
binary code. Through the use of a compiler program, the source code 
is turned into binary code, which consists of "1s" and "Os" strung 
together in a particular order. The binary code is used to operate the 
computer or perform a particular application.

There are different kinds of computer programs, including operating 
system programs and application programs. An operating system is a 
program that directs the internal operations of the computer and 
interacts with a variety of compatible application programs. An 
application program is a program that enables the computer to 
perform a specific task, such as word processing, accounting or 
mathematical calculations. See Apple Computer. Inc. v. Franklin 
Computer Corp., 714 F.2d 1240, 1243 (3d Cir. (1983), cert. 
dismissed, 464 U.S. 1033 (1984). C. History of the UNIX Source Code
The original UNIX operating system was developed by employees of 
AT&T's Bell Laboratories in the late 1960's, and was based on an 
earlier system called Multics. (See Maurice J. Bach, The Design of 
the UNIX Operating System, pp. 1-3, attached as Exhibit B to the 
Forte Aff.; McKusick and Bostic Decl., f 28.1.3). At that time, AT&T 
was prohibited from selling software and developed the UNIX code 
solely for its own internal use. Subsequently AT&T began licensing 
the UNIX source code to universities for educational use, ;

[REDACTED]

This marketing strategy has been so successful that many aspects of 
the UNIX operating system have become industry standards. (See 
Exhibit D to the Forte Aff.; see generally McKusick and Bostic Decl.).

  [fn3]  All citations to the deposition transcript of Edwin G. Baldwin 
are attached as Exhibit C to the Forte Aff.

Unlike most software companies, who distribute their products only 
in object code, USL has distributed its operating system in source 
code form. (Thiel Dep- T- 95-20 to 96-5). In licensing its source 
code to universities for research and other educational uses, USL has 
required universities to distribute their enhancements and 
derivative works developed using the code to anyone, including 
AT&T, at a nominal cost. (See Karels Decl.,
23). To the extent the enhancements or derivative works have 
included the licensed source code, they could be provided only to 
licensees, but still had to be provided at nominal cost. (See Karels 
Decl., ~ 23). As a result, USL has received the benefit of free 
development work from thousands of computer programmers, and has 
incorporated the best of that work into its own system. (See Karels 
Decl., ~ 20 and 34).

After divestiture, which took place in 1984, AT&T began to market 
its UNIX source code actively in the United States and in many other 
countries as a commercial product. As a result of this widespread 
licensing and the access permitted to students all over the world, as 
USL admits, the UNIX source code has become "world-renowned," and 
many portions of it have become industry standards. Although USL 
may have strict internal safeguards in place, it has so widely 
licensed its UNIX source code that it cannot be considered a "secret" 
by any stretch of the imagination. Indeed, since the source code has 
been licensed to universities all around the country, most people 
who have studied computer science at universities over the past 
fifteen years have had access to the source code at some time,
E to the Forte Aff.). Further, the strict safeguards USL claims to 
observe have not been observed by its thousands of licensees. 
consequently, USL's licensed code periodically appears on publicly 
accessible computers. (Bond Dep. T. 71-24 to 74-16;[fn4] Adams 
Aff., ~ 10).

  [fn4] All citations to the deposition transcript of Mitzi D. Bond are 
attached as Exhibit F to the Forte Aff.


USL has also permitted numerous books to be written on the UNIX 
source code. These books describe nearly every aspect of the code, 
including its design, architecture, sequence, organization, structure, 
implementation and algorithms, and provide instruction on how to 
write UNIX-compatible code. See infra. Among other things, such 
publicly available reference materials disclose the specific features 
USL's expert relies upon as evidence of copying and trade secret 
misappropriation. (See generally McKusick and Bostic Decl.; Kashtan 
Aff., ~l 6, 8). 

D. The Berkeley Distributions

The University began releasing its Berkeley Software Distributions 
in the late 1970's. The original distributions were modifications and 
enhancements of the AT&T-licensed code. Over the years, the 
University continued to modify the licensed code and rewrote many 
of the programs from scratch. It also developed many additional 
programs which it included in its releases and obtained a variety of 
other programs from outside contributors. (See Karels Aff. Il 2-14). 
What is now known as Berkeley UNIX has been very popular and has 
been included in a variety of commercial products including 
operating systems marketed by Sun Microsystems, Digital Equipment 
Corporation, and USL. (See Karels Aff. ~ 6 and 20). Thus, USL has 
benefitted enormously by its licensing of UNIX source code to the 
University and other educational institutions.

In accordance with the terms of its license agreements with USL, 
the University has made several of its releases available to non-
licensees, since they did not contain any of USL's licensed code. The 
first of these was in 1987 and consisted of a reimplementation of a 
particular function for handling daylight savings time that existed 
in the 32V code. The second was a package of networking code 
distributed in 1988. Both of these releases were made via 
anonymous FTP, which means that they were placed on a publicly 
accessible computer network, with over a million users. (See Karels 
Aff. ~ 9-10).

Starting with the BSD4.3-Tahoe release in 1987, the University also 
began marking files which did not contain AT&T code with a special 
legend, indicating that they were freely redistributable. (See Karels 
Aff. ~ 9). Although the University provided the 4.3 Tahoe release only 
to AT&T licensees, USL has never objected to the designation of 
certain files as freely redistributable, and those files have in fact 
been redistributed by those who obtained the release. (See Karels 
Aff. ~ 9-11).

In 1988, the University distributed its first Networking Release 
("Net1"), which consisted of 134 source files from the networking 
portion of the BSD kernel, a login program, and a number of utility 
and C-Library programs. No AT&T source code license was required 
to obtain the Net1 release. (See Karels Aff. I 10). Contrary to USL's 
representation, Net1 did include some code that had a functional 
analogue in 32V and, like the Net2 release, made reference to code 
that was not included. In both the Net1 and Net2 releases, these 
references are present because the code is intended to be used with 
other programs that contain the referenced code. (See Karels Aff. ~ 
10, 15-16). Thus, they do not indicate mindless copying, as USL 
suggests.

After the Net1 release, the University made another release called 
BSD4.3-Reno. Although this release was provided only to USL 
licensees, it contained more files marked freely redistributable, and 
such files have in fact been distributed to non-licensees by others. 
(See Karels Aff. ~ 12). Although USL received a copy of both the 
Tahoe and Reno releases, and used portions of them in its own code, 
USL made no objection to any of the designations. Nor has it ever 
objected to the distribution of Net1 to non-licensees. (See Karels 
Aff. f 12).

The University released its second license-free release, the Net2 
software at issue in this action, in July of 1991. This included not 
only an updated version of the networking software included in the 
earlier Net1 release, but a host of other programs that had been 
written by University students and employees or contributed to the 
University. (See Karels Aff. ~1 13-14). This release was the 
culmination of a project begun years earlier to sort out the 
programs that were not subject to AT&T license restrictions and 
make them available to anyone, as contemplated by the University's 
license agreements with AT&T. (See Karels Aff. 1 17). Thus, it 
includes the work of thousands of authors written at different times 
over a period of many years.

On several occasions, CSRG members attempted to obtain USL's 
views as to whether certain programs contained any USL proprietary 
matter. (Bostic Dep. T. 39-7 to 40-1, 41-11 to 41-i,, and exhibits P-
70 and P-71 attached as Exhibit I to the Forte Aff.; McKusick Dep. T. 
267-2 to 268-24).[fn5]   Although USL has provided such opinions to 
others, USL refused to take any position on the code submitted by 
the CSRG members. (Id.).
Prior to the release of Net2, CSRG members discussed the release 
many times with University counsel and performed a detailed code 
comparison to make sure that the Net2 release did not include USL-
proprietary code, applying criteria received from University counsel. 
The release was then reviewed by University counsel in conjunction 
with outside counsel and a technical expert, and ultimately was 
approved by University officials. (see Karels Aff. ~ 18-27). 

  [fn5]  All citations to the deposition transcripts of Keith Bostic 
and Marshall Kirk McKusick are attached as Exhibits G and H, 
respectively, to the Forte Aff.

E. The Formation of BSDI and the Development of BSD/386

After the release of Net1, CSRG members had made several public 
announcements regarding the additional software they planned to 
include in the next USL-license-free release. After hearing these 
announcements, Richard Adams, who is now the president of BSDI, 
became interested in the possibility of developing a commercial 
product based on the upcoming release and discussed his idea with 
various acquaintances, including three CSRG members, Keith Bostic, 
Kirk McKusick and Michael Karels. (See Karels Aff., ~ 19; Adams Aff., 
~ 4). Believing the release to be imminent, in January of 1991, he 
organized a meeting with these and several other interested 
individuals to explore the feasibility of the idea. Because they were 
concerned that USL would not like a high-quality, lower-priced 
competitor in the market, and might try to drive them out, they also 
discussed the concept with attorneys to satisfy themselves that USL 
would have no basis for interfering with the project. (See Karels 
Aff., 19; Adams Aff., ~ 4).

At the time of that meeting, the CSRG members had nearly 
completed the process of reviewing the University's software to 
determine what could be included in Net2, based on the criteria that 
had been supplied to them by the University's counsel. They also had 
made several public announcements of the upcoming release and 
what programs they anticipated would be included in it. These 
announcements took place long before BSDI existed, and before 
anyone associated with BSDI ever discussed the idea of using the 
release in a product. Thus, USL's suggestion that BSDI instigated the 
release is ridiculous. It was the announcement of the release that 
"induced" the formation of BSDI, not the other way around.

At the time of the January meeting, Mr. Adams was unsuccessful in 
persuading any of the CSRG members to leave the University to join 
the company he was contemplating. The CSRG members also did not 
agree to invest any money in the venture at that time, nor did they 
receive any commitments from BSDI. (See Karels Aff., 1 19-21; 
McKusick Dep. T. 151-20 to 152-17; Bostic Dep. T. 152-16 to 153-7; 
Adams Aff., 1 4). Thus, USL's assertions that the CSRG members had 
a financial interest in BSDI while they were working on the Net2 
release is completely false. No CSRG member had any interest in 
BSDI until after the release of Net2. Although USL has gone to great 
lengths to try to portray BSDI as the driving force behind the Net2 
release - including misrepresenting the testimony of BSDI and CSRG 
employees - USL has failed to present any evidence to support such a 
claim.

BSDI received the Net2 release with the understanding that it 
contained no USL-proprietary code and put a great deal of effort and 
expense into making it a usable operating system.[fn6]  In doing so, 
BSDI relied entirely on publicly available reference materials. (See 
Adams Aff., ~ 5). USL now seeks to enjoin BSDI from continuing to 
sell its BSD/386 product, which it has been selling in pre-
production form for over nine months. USL further seeks to enjoin 
BSDI from hiring any employees that have had access to UNIX source 
code, a limitation that would rule out not only all of its current 
employees, but the thousands of other computer programmers who 
have had access to UNIX source code as students or employees.

  [fn6] USL's argument that the indemnification clause contained in 
the Net2 agreement should have put BSDI on notice of possible 
violations is belied by the fact that the same clause was included in 
the University's earlier licenses of BSD code to AT&T. (See Exhibit J 
to the Forte Aff., ~ 12).

ARGUMENT

I. USL HAS NOT MET ITS BURDEN OF ESTABLISHING ENTITLEMENT TO A 
PRELIMINARY INJUNCTION.

The Third Circuit has held repeatedly that "injunctive relief is an 
extraordinary remedy which should be granted only in limited 
circumstances." Frank's GMC Truck Center. Inc. v. General Motors 
Corp., 847 F.2d 100, 102 (3d Cir. 1988). To obtain such extraordinary 
relief, the moving party bears a heavy burden of establishing:

(1) The probability of irreparable injury to the moving party in the 
absence of relief;
(2) The absence of possibility of harm to the nonmoving party if 
relief were granted;
(3) The likelihood of success on the merits; and
(4) The public interest in granting preliminary relief. Merchant & 
Evans v. Roosevelt Building Products, 963 F.2d 628, 632 (3d Cir. 
1992); Apollo Technologies Corp. v. Centrosphere Industrial Corp., No. 
92-3712 (AJL) 1992 WL 289943 (D.N.J. 1992). The injunction should 
issue only if plaintiff produces sufficient evidence showing that "all 
four factors favor preliminary relief." Merchant & Evans, 963 F.2d at 
632-33.

Of these four requirements, the Third Circuit places particular 
weight on the probability of irreparable harm and the likelihood of 
success on the merits. If "either or both of these prerequisites are 
absent," the circuit court will reverse the grant of an injunction by 
the district court. Frank's GMC, 847 F.2d at 102 (quoting In re Arthur 
Treacher's Franchisee Litigation, 689 F.2d 1137, 1143 (3d Cir. 
1982)); Morton v. Beyer, 822 F.2d 364, 367 (3d Cir. 1987).

Further, the moving party must make a "clear showing of immediate 
irreparable harm." Campbell Soup Co. v. ConAgra. Inc., 977 F.2d 86, 
91, (3d Cir. 1992). To bear this burden, "the plaintiff must 
demonstrate potential harm which cannot be redressed by a legal or 
an equitable remedy following a trial. The preliminary injunction 
must be the only way of protecting the plaintiff from harm." Id.

As shown in detail below, USL has failed to make the required 
showing on any of the four factors necessary to obtain the requested 
preliminary injunction. Thus, its motion should be denied.

II. USL IS NOT LIKELY TO SUCCEED ON ITS COPYRIGHT INFRINGEMENT 
CLAIM. 

A. USL Has No Valid Copyright In The 32V Code.

USL's copyright infringement claim is fundamentally flawed, in that 
USL has no valid copyright in the UNIX/32V source code, which USL 
permitted to be widely published without a copyright notice. Before 
March 1, 1989 (the effective date of the Berne Convention 
Implementation Act), the law required that a copyright notice be 
placed on published works to notify recipients that the author 
intended to claim a copyright in the work. See 17 U.S.C.  401 (former 
version); 17 U.S.C.  405.[fn7]  Without such a notice, those receiving 
the work could assume that the author did not intend to claim 
copyright.

  [fn7] 17 U.S.C.  401 was amended in connection with passage of the 
Berne Convention in 1988, and no longer requires notice to be placed 
on copies of published works.

Thus, publication of a work without a copyright notice resulted in 
forfeiture of any copyright protection, unless adequate steps were 
taken to cure the lack of notice and the work was registered within 
five years. See 17 U.S.C. S 405; see also Rexnord. Inc. v. Modern 
Handling Systems. Inc., 379 F. Supp. 1190, 1197 (D. Del. 1974) 
("Copyrighted material loses its protected status if it is published 
without notice of copyright."). No such steps were taken with 
respect to the 32V code. As recently as 1992, USL belatedly 
registered its copyright in UNIX and 32V. See Exhibits A - D to 
Plaintiffs' Amended Complaint (copyright registration for UNIX 
operating system, editions 5, 6, 7, and 32V).

Prior to 1989, USL made the 32V code available to thousands of 
educational, commercial and governmental entities throughout the 
world, without any copyright notice.

[REDACTED]

In discovery, USL produced a 3-inch-thick list of licenses which 
indicates that, as of 1986, at least [REDACTED] computers were 
licensed under either System III or System V, and thus also were 
licensed under 32V. (A copy of this list is attached to the Forte Aff. 
as Exhibit M).

[REDACTED]

Since AT&T permitted the widespread distribution of the32V source 
code without a copyright notice prior to 1989, USL has lost any 
copyright protection it might otherwise have had in it,and, as a 
matter of law, there can be no claim for copyright infringement of 
the 32V code.

  [fn8] All citations to the deposition transcript of David Frasure are 
attached as Exhibit K to the Forte Aff.

  [fn9] All citations to the deposition transcript of Chuck Greene are 
attached as Exhibit N to the Forte Aff.

1. The Limited Publication Doctrine Is Inapplicable.

In an attempt to dodge this fatal defect in its copyright claim, USL 
makes the incredible assertion that the 32V source code is an 
unpublished work, even though it has been marketed to the 
commercial world for many years and has been made available to 
many thousands of commercial, educational and governmental 
entities. Compare USL's Moving Brief, at 27 with R.L. Martin The UNIX 
System: Preface, and A.V. Aho, The UNIX System: Foreword, AT&T 
Bell Laboratories Technical Journal, Vol. 63, No. 8, October 1984, pp. 
1571-73, a copy of which is attached to the Forte Aff. as Exhibit P. 
To make such a claim, USL contends that its widespread commercial 
distribution has been only a "limited publication," and thus has not 
forfeited its copyright protection.

Although courts have created a narrow exception to the forfeiture 
doctrine known as the doctrine of limited publication, this doctrine 
is not applicable here. Under the doctrine of limited publication, a 
work published without the proper notice will not fall into the 
public domain if the copyright owner can prove that its distribution 
was limited to (1) a definitely selected group, (2) for a limited 
purpose, and (3) without the right of diffusion, reproduction, 
distribution or sale. See White v. Kimmell, 193 F.2d 744, 746-47 
(9th Cir.), cert. denied, 343 U.S. 957 (1952); Rexnord, 379 F. Supp. at 
1197. Unless all three of these criteria are met, however, a 
publication cannot qualify as a limited publication. White, 193 F.2d 
at 746-47.

Accordingly, restrictions on use or redistribution alone are not 
sufficient.
Plainly, USL cannot meet the first of these requirements. 
Distribution of the 32V source code has not been limited to a 
definitely selected group. Rather, the 32V source code has been 
available to 

[REDACTED]

1988, attached as Exhibit 0 to the Forte Aff.; see also AT&T 
Technical Journal, p. 1573 ("UNIX System V is available to the 
commercial world from AT&T in a fully supported form) (emphasis 
added)) (See Exhibit P to the Forte Aff.). USL representatives have 
testified that

[REDACTED] as if the category of [REDACTED] could be a "definitely 
selected group" under the test set forth in White. The limited 
publication exception is much more narrowly drawn than this. See 
Brown, 714 F.2d at 1092 (Court found that group consisting of "all 
automobile dealers or dealers in markets where the [allegedly 
copyrighted work] was not already in use" did not constitute a 
limited group).

Moreover, considering the realities of the marketplace, this so-
called "restriction" is really no restriction at all. As [REDACTED] 
well.[fn10] (Affidavit of Michael J. DeFazio in Support of Plaintiff's 
Motion for Preliminary Injunction, 11 and n.3 at pp. 11-12). In 
reality, rather than limiting its source code to a narrowly selected 
group, USL has actively marketed its UNIX source code [REDACTED]

Forte Aff.). Limitations on sales to particular foreign countries are 
irrelevant to the publication issue, since a copyright notice was 
required to preserve USL's rights upon publication of the code "in the 
United States or elsewhere". 17 U.S.C. Section 401(a) (former 
version applicable).

  [fn10]  The fact that one had to pay for a work in order to receive it 
does not make it a limited publication. See Brown v. Tabb, 71; F.2d 
1088 (11th Cir. 1983).

  [fn11] A copy of Plaintiff's Response to Defendant's Third Set of 
Interrogatories is attached as Exhibit Q to the Forte Aff.

In comparison with the 3-inch thick list of 1986 licensees USL 
produced in discovery, in its interrogatory responses, USL was able 
to identify only [REDACTED] who had been refused a license.

[REDACTED]

  [fn12] A copy of Exh. D-2 is attached as Exhibit S to the Forte Aff.

  [fn13] [REDACTED]

  [fn14] All citations to the deposition transcript of Otis L. Wilson 
are attached as Exhibit U to the Forte Aff.


. T. 86-21 to 87-4, 87-25 to 88-4, 94-15 to 97-3; Bond Dep. T. 17-
23 to 19-21).

[REDACTED]

23).[fn15]  Thus, this practice did not in fact place any significant 
limitation on the group to whom the code was available. Neither the 
ability to pay nor the willingness to adhere to restrictions on use 
are sufficient limitations to establish a limited publication. See 
Brown, 714 F.2d at 1092 (no limited group where the alleged 
copyrighted jingle "was available to any automobile dealer doing 
business in a market not yet exposed to the jingle who would pay the 
price"); White, 193 F.2d at 746-47 (the requirement that there be 
restrictions on use is separate and distinct from the requirement 
that there be a limited group). 

In fact, the instant case is virtually identical to a recent Ninth 
Circuit decision, D.C.I. Computer Systems. Inc. v. Pardini, 1992 U.S. 
App. Lexis 29951; 1992 Copyright L. Rep. (CCH) ~27,005 ( 9th Cir.) (A 
copy of this case is attached as Exhibit V to the Forte Aff.). In D.C.I., 
the Ninth Circuit upheld the district court's ruling that by licensing 
its software to automobile dealers without a copyright notice, D.C.I. 
published the software and forfeited its copyright in the work. Under 
circumstances virtually identical to those in the present case, the 
Court found that the limited publication doctrine did not apply:

D.C.I. did not select a particular group of people and then offer to 
distribute ~the program] to members of that group. It is undisputed 
that D.C.I. licensed its F & I program to any automobile or 
recreational vehicle dealership in the country that would agree to 
enter into a contract, and so fails the select group test. 

The court in D.C.I. also noted that D.C.I. failed to meet the second 
prong of the test: "Moreover, it did not meet the limited purpose 
prong, since its purpose in distribution was pecuniary gain." See also 
Academy of Motion Picture Arts and Sciences v. Creative House 
Promotions, 944 F.2d 1445, 1453 (9th Cir. 1991). Obviously, since 
USL marketed its 32V code commercially, it cannot meet this prong 
of the test either. Having chosen "'the more worldly rewards that 
come with exploitation of [its] work"' (Brown, 714 F.2d at 1092), 
USL's widespread distribution of the 32V source code without a 
copyright notice forfeited any copyright protection in the work.

Both the Hubco case and the Data General case cited by USL are 
inapplicable. In those cases, the code was distributed only to those 
who purchased a computer from the plaintiff. See Hubco Data 
Products Corp. v. Management Assistance. Inc., 219 U.S.P.Q. 450 (D. 
Idaho 1983); Data General Corp. v. Digital Computer Controls. Inc., 
188 U.S.P.Q. 276 (Del. Ch. 1975). There has been no such restriction 
on the UNIX source code. Although AT&T does sell computers, the 
source code itself has been marketed as a separate product.

Nor can USL find solace in a couple of questionable district court 
opinions, in which works distributed to a small number of entities 
through separately negotiated agreements were held to be limited 
publications. See National Broadcasting Co. v. Sonneborn, 630 F. Supp. 
524 (D. Conn. 1985); Paramount Pictures Corp. v. Rubinowitz, 217 
U.S.P.Q. 48 (E.D.N.Y. 1981). These cases are distinguishable in that, as 
explained above, USL has actively marketed its source code

[REDACTED]

13 to 80-17, 81-16 to 18-23); AT&T Technical Journal, Vol. 63, No 
8, p. 1573, attached as Exhibit P to the Forte Aff. ("UNIX System V is 
available to the commercial world from AT&T in a fully supported 
form"). Moreover, these cases have been criticized by Nimmer, who 
reasoned that "[u]nless the [parties] which might engage in such 
negotiations were limited in some manner, it would seem that there 
was no limitation as to persons." I Nimmer on Copyright  4.13[A], at 
4-70 n.13.1 (1992). In the instant case, where USL has permitted 
distribution of its source code to thousands of entities, application 
of the questionable rationale espoused by Paramount and NBC would 
obliterate the notice requirement.

USL emphasizes that its publication has been limited based on the 
fact that it has been distributed subject to restrictive licenses. 
(See USL's Moving Brief, p. 12 n. 4; Affidavit of Michael J. DeFazio in 
Support of Plaintiff's Motion for Preliminary Injunction, p. 27 n. 14). 
Unlike other types of copyrighted works, software is virtually 
always distributed subject to license restrictions. In any event, this 
argument addresses only one prong of the test for limited 
publication. As the court emphasized in White v. Kimmel, "the 
circulation must be restricted k~ as to persons and purpose, or it 
cannot be called a private or limited publication." White, 193 F.2d at 
747 (emphasis added). Thus, USL cannot meet the limited publication 
test, regardless of any restrictions placed on its customers' use of 
the source code.

Because AT&T's distribution of the 32V code constituted a general 
publication, and because such publication occurred without a valid 
copyright notice, AT&T's work has fallen into the public domain. 
Accordingly, USL has absolutely no basis to claim any copyright 
protection for its 32V source code.

2. The Header Files Which USL Claims Have Been Infringed Have Been 
Included in Binary Distributions Made by USL Licensees With No 
Copyright Notice.

The binary version of the UNIX operating system has been even more 
widely distributed than the source code version. Although current 
binary versions of the code contain copyright notices, earlier 
versions did not. (See Bostic & McKusick Decl., 28.4).

Moreover, these binary distributions included some source code 
files, and in particular, included the header files USL accuses the 
University of copying in Net2. (Bostic & McKusick Decl., ~ 28.4; 
Kashtan Aff. ~ 8).

USL itself has never distributed binary code, but has sublicensed 
numerous other companies to distribute binary versions of its UNIX 
operating system, placing no limitations on whom they could license 
it to, other than those required by law. Thus, USL cannot possibly 
argue that the distribution of the binary code (including the header 
files in source form) was a limited publication. Not only is it 
impossible for USL to meet the "definitely selected group" test, but 
simply offering a work "for further distribution," as USL did with its 
binary code, in itself constitutes a general publication of the work. 
See White, 193 F.2d at 746-47; Rexnord, 379 F. Supp. at 1197. Thus, 
USL has no basis for claiming any copyright in the header files.

B. THE SIMILARITIES RELIED UPON BY USL WOULD NOT ESTABLISH 
COPYRIGHT INFRINGEMENT EVEN IF THE 32V CODE WERE COPYRIGHTED.

Even if USL did have a valid copyright in the 32V code, USL would not 
be able to establish a substantial likelihood of success on its 
infringement claim. Copyright law, unlike trade secret or patent 
law, protects only original expression. It does not protect ideas, 
processes, concepts or methods. Computer Associates International. 
Inc. v. Altai. Inc., 1992 WL 372273, at p. 9 (2d. Cir. Dec. 17, 1992). As 
the Supreme Court recently reaffirmed: "The mere fact that a work 
is copyrighted does not mean that every element of the work may be 
protected." Feist Publications. Inc. v. Rural Telephone Service Co., 
499 U.S. 113 L.E.2d 358, 371 (1991). Whether the claim is based on 
direct or indirect evidence of copying, infringement may be found 
only where there is substantial similarity in protectible expression. 
Computer Associates. Inc. v. Altai. Inc., 1992 WL 372273, p. 7; 
Landsberg v. Scrabble Crossword Game Players. Inc., 736 F.2d 485, 
488 (9th Cir. 1984). De minimis copying or copying of unprotectible 
portions of a work do not give rise to an infringement claim. Feist. 
113 L.E.2d at 379 ("not all copying . . . is copyright infringement"); 
Computer Associates v. Altai, 1992 WL 372273, at 22; Warner Bros. 
Inc. v. American Broadcasting Companies. Inc., 720 F.2d at 242; see 
also 3 Nimmer on Copyright, S 13-03 [F][5]. USL has made no attempt 
to distinguish between similarities in protectible elements of its 
software and similarities in unprotectible elements. As explained 
below, virtually all of the specific items discussed in the Carson 
Declaration fall into the category of unprotected elements. Moreover 
the similarities are neither quantitatively nor qualitatively 
substantial.

Indeed, the Carson Declaration seems to be aimed simply at 
establishing that Net2 was "derived" from the 32V code in the 
colloquial sense. For purposes of copyright law, however, a 
derivative work, like any other work, can be infringing only if it 
contains substantial, protectible expression from the prior work. 1 
Nimmer on Copyright, 1 3.01 at p. 3-3 (1992) ("A work is not 
derivative unless it has substantially copied from a prior work. If 
that which is borrowed consists merely of ideas and not of the 
expression of ideas, then although the work may have been in part 
derived from prior works, it is not a derivative work".); Reyher v. 
Children's Television Workshop, 533 F.2d 87, 90 (2nd Cir. 1976) 
(quoting from Treatise). Thus, if Net2 does not contain substantial 
protectible expression from 32V, it cannot infringe any copyright in 
32V. Id.

Merely "using" a prior copyrighted work, or referring to it in 
developing one's own work, does not amount to copyright 
infringement. Feist v. Rural Telephone Service, supra, 111 S. Ct. 
1282, 1290; Sega Enterprises Ltd v. Accolade Inc., 1992 WL 293141, 
at p. 15 (9th Cir.) ("the fundamental purpose of the Copyright Act [is] 
to encourage the production of original works by protecting the 
expressive elements of those works while leaving the ideas, facts, 
and functional concepts in the public domain for others to build on"). 
Anyone is free to make a "derivative work" that uses unprotectible 
aspects of a copyrighted work, such as ideas, methods or concepts.

It is also permissible to remove or replace those portions of an 
otherwise infringing work that are protected by copyright. See, e.q., 
Computer Associates v. Altai, supra, 1992 WL 372273 (program from 
which infringing portions had been removed held non-infringing); See 
v. Durang, 711 F.2d 141, 143 (9th Cir. 1983); Orth-o-Vision. Inc. v 
Home Box Office, 474 F. Supp. 672, 686 n.14 (S.D.N.Y. 1979) ("when 
the infringing portion of a defendants work may be removed from the 
remainder, injunctive relief ought extend only to the former"); see 
also Sega v Accolade, 1992 WL 293941,at p. 6 (intermediate copying 
may infringe regardless of whether the final product infringes). In 
such instances, even if an intermediate version might have 
constituted an infringement, a subsequent version which does not 
contain substantial expression from the copyrighted work does not 
infringe. Id. In the instant case, there can be no claim for 
intermediate copying. As explained at length below in connection 
with the trade secret claim, the University's license agreements 
with USL expressly permit it to make modifications, enhancements 
and derivative works based on the licensed software. Thus, it is not 
copying per se that USL challenges, but the fact that Net2 was 
distributed to non-licensees. Since any prior BSD releases that 
contained AT&T proprietary code were distributed only to licensees, 
there can be no claim of intermediate copying. Thus, regardless of 
whether portions of Net2 were once included in a distribution that 
also included code derived from USL licensed code, the question is 
whether the Net2 distribution itself contains any substantial 
protectible expression from 32V. As explained below, it does not.


1. The Features Relied Upon by USL's Expert Are Not Protectible. 

Not all copyrighted works are entitled to the same level of 
protection. See SEGA Enterprises Ltd. v. Accolade Inc., 1992 WL 
293141 at p 12. In particular, works that are highly factual, 
functional, technical or utilitarian in nature receive less protection 
than fictional works." Id. at p. 12-13. The reason for this distinction 
is that as a work becomes more technical or functional, the range of 
options for expressing ideas narrows. If there are only a limited 
number of ways to express a particular idea, of necessity, there will 
tend to be similarity in two works expressing the same idea. Such 
similarity cannot be the basis for a finding of copyright 
infringement. Otherwise, later authors would be barred from using 
the unprotected ideas, concepts and methods expressed in an earlier 
work a result that is completely contrary to the fundamental tenets 
of copyright law. For this reason, a much greater degree of 
similarity is required before such works will be found to infringe. 
See Landsberg v. Scrabble Crossword Game Players, Inc. v. Crown 
Publishers. Inc., 736 F.2d 485, 488-89 (9th Cir.), cert. denied, 469 
U.S. 1037 (1984). In some cases, an idea, method or concept can be 
expressed in such a limited number of ways that virtual identity in 
expression will be required before infringement will be found. This 
principle is applicable to computer programs as with any other 
copyrighted work:

[C]opyrighted language may be copied without infringing when there 
is but a limited number of ways to express a given idea . . . . In the 
computer context, this means that when specific instructions, even 
though previously copyrighted, are the only and essential means of 
accomplishing a given task, their later use by another will not 
amount to infringement. 

National Commission on Technological Uses of Copyrighted Works 
("CONTU"), Final Report 1, at 20 (1979) ("CONTU Report"). [fn16]

  [fn16] Congress adopted all of the statutory changes recommended 
by CONTU verbatim. Subsequent Congresses, the courts, and 
commentators have regarded the CONTU Report as the authoritative 
guide to Congressional intent. SEGA Enterprises LTD.. Accolade. Inc., 
24 U.S.P.Q. 2d 1561, 1567 fn.5 (9th Cir. 1992).

A computer programmer's choices of expression also are limited by 
efficiency considerations. Thus, although there might be many 
possible ways of implementing a given task, there might be a very 
limited number of ways to do so efficiently. In such instances, two 
programmers attempting to achieve the same result in the most 
efficient manner would be likely to arrive at similar programming 
solutions. As stated in Altai, "while hypothetically, there might be a 
myriad of ways in which a programmer may effectuate certain 
functions within a program, i.e., express the idea embodied in a given 
subroutine efficiency concerns may so narrow the practical range of 
choice as to make only one or two forms of expression workable 
options." See 3 Nimmer on Copyright, supra,  13.03~F][2], at 13-89-
13-90; Whelan Associates. Inc. v. Jaslow Dental Laboratory. Inc., 797 
F.2d 1222, 1243 n.43 (3d Cir. 1986), cert. denied, 479 U.S. 1031 
(1987) ("It is true that for certain tasks there are only a very 
limited number of file structures available, and in such cases the 
structures might not be copyrightable . . . .) Thus, if there are only a 
very limited number of ways to implement a particular feature 
efficiently, similarities in such implementations do not provide 
evidence of copying. Computer Associates v Altai, supra, 1992 WL 
372273, at 15-16.

Other external considerations which limit the range of options for 
programmers and hence limit the degree of protectible expression in 
computer programs include:

(1) the mechanical specifications of the computer on which a 
particular program is intended to run;
(2) compatibility requirements of other programs with which a 
program is designed to operate in conjunction;
(3) computer manufacturers' design standards; and
(4) demands of the industry being serviced.

Computer Associates v Altai, supra, 1992 WL 372273, at 17; Sega v. 
Accolade, supra 1992 WL 293141 at p. 12. If such external factors 
dictate particular features, the use of such features does not give 
rise to an infringement claim. Id.

Copyright law also does not protect "fragmentary words and 
phrases" and "lists of contents". 37 C.F.R. S 202.1(a); Sen-Torq. Inc. v. 
K Mart Corp.., 936 F.2d 851, 854-55 (6th Cir. 1991); Magic Marketing 
v. Mailing Services of Pittsburg. Inc., 634 F. Supp.
769, 771 (W.D. Pa. 1986) (copyright law does not protect 
"fragmentary words and phrases" or "forms of expression dictated by 
functional considerations"). Nor does it protect standard forms of 
expression. This is particularly significant in the computer industry 
where a variety of accepted programming practices, techniques and 
conventions are widely used by programmers. As stated by Nimmer, 
"in many instances it is virtually impossible to write a program to 
perform particular functions in a specific computing environment 
without employing standard techniques." 3 Nimmer on Copyright,  
13.03 [F][3] at 1365. The fact that such standard programming 
techniques appear in two programs does not evidence copying, and 
such techniques cannot be monopolized by one programmer- See 
Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1973 (9th 
Cir.), cert. denied, L.E.2d 141 (1992) ("affirming the district courts' 
finding that [p]laintiffs may not claim copyright protection of an . . . 
expression that is, if not standard, then commonplace in the 
computer software industry"); Computer Associates International. 
Inc. v. Altai Inc., supra, 1992 WL 372273, at 16-17. There is also a 
large amount of software that is freely available and freely 
redistributable. Such material is in the public domain and cannot be 
claimed by a single author simply by including it in a copyrighted 
work. Computer Associates International Inc. v. Altai. Inc., supra, 
1992 WL 372273, at p. 17-18.

Virtually all of the specific features relied on by USL's expert fall 
into one of these categories and thus are not protectible. It is 
notable that with the exception of two extremely short functions 
[REDACTED] which on their face differ from the supposedly copied 
32V Code - Carson does not point out any similarities in the actual 
code itself. Instead, he relies on similarities in things such as file 
names and function names, which consist of simple and obvious 
mnemonics, all of which are standard in the industry and well-
documented in the literature. As noted above, short words and 
phrases are not protectible under copyright law. 37 C.F.R. Section 
202.1(9). Indeed the Compendium of Copyright Office Practices 
includes such "mnemonics" in a list of examples of noncopyrightable 
elements in computer programs. (A copy of this rule is attached as 
Exhibit W to the Forte Aff.). USL's expert also attempts to rely on 
the ordering of such mnemonics, but since the order has no 
significance, it is simply an unprotectible list, devoid of any 
element of authorship or expression. (See Kashtan Aff., ~ 14).

UNIX operating systems are specifically designed to permit users to 
modify, enhance and write their own additions or replacement 
programs. Some of these programs are application programs, while 
others, such as device drivers, become part of the operating system 
itself. To enable customers to write their own programs, the 
required interface definitions are described in the header files. As 
noted above, these header files are included not only in the source 
code distributed by USL, but also in the binary versions distributed 
by various other companies. Header files are provided precisely for 
the purpose of being used by programmers in writing UNIX-
compatible software. (McKusick and Bostic Decl., ~ 28.4 and 28.4; 
Kashtan Aff., I 9). Thus, there can be no claim of copyright 
infringement based on the use of the information contained in such 
files.

Likewise, numerous books describe how to write UNIX-compatible 
programs. These materials provide all the information needed to 
write UNIX-compatible programs, and in particular provide detailed 
information about the interfaces and how to write them, including 
such elements as the file names, function names, and the defined 
symbols which USL's expert relies upon. (See generally McKusick and 
Bostic Decl.; see generally Kashtan Aff.). The fact that these 
features appear in Net2 or BSD/386 thus does not establish copying. 
Id. Nor are these features protectible given that their use is either 
dictated by external considerations, including the need for 
compatibility with other programs, or merely reflects terms that 
are standard in the industry. Id.

With respect to the discussion of [REDACTED] in the Carson 
Declaration, these are simply two functions within a single file 
called [REDACTED].  The implementation of these functions is well-
described in the literature and includes standard features. Numerous 
books have been written telling programmers exactly how to 
implement these functions in the most efficient manner. If one 
follows those instructions, using standard programming 
conventions, the range of options is extremely narrow, and 
similarities are virtually guaranteed. (See McKusick and Bostic 
Decl., 1 53-56; Kashtan Aff., ~ 4-6). For these reasons, similarities 
in the way these functions are implemented do not indicate that the 
code was copied, and cannot form the basis for a copyright 
infringement claim. 3 Nimmer on Copyright,  13.03 [F][3]; see also, 
Baker v. Selden, 101 U.S. 99, 102-04 (one may copy expressive 
elements that must be used to express the underlying ideas, 
functional concepts or facts).

A comparison of the 32V implementation of the [REDACTED] and 
[REDACTED] functions and the implementation of these functions in 
BSD/386 shows that in neither case are they the same. In the 
[REDACTED] function, only [REDACTED]  lines are similar. And in 
[REDACTED]" only [REDACTED] lines are similar. (See tables in 
Affidavit of John H. Carson, at pp. 34 and 36). This degree of 
similarity is to be expected given the various reference books 
available that teach one how to implement such code. (See generally 
McKusick and Bostic Decl.; Kashtan Aff., ~ 4-6).

2. The Similarities Relied upon by USL's Expert Are Neither 
	Quantitatively Nor Qualitatively Substantial.

USL completely ignores how minuscule the points of similarity 
relied upon by their expert are in a quantitative sense. USL further 
distorts their qualitative significance by equating their value with 
the value of the kernel as a whole.

Out of the over 8,000 files in BSD/386, only 80 are accused in this 
motion, only 30 of which have even been named. Moreover, most of 
them are accused simply because they use similar standard 
mnemonics, and not because there was any similarity in the actual 
code. (USL's Moving Brief at 21). Only two functions, both contained 
in the file [REDACTED] are challenged on the basis of actual working 
code. Thus, out of 1.5 million lines of code, only [REDACTED] lines of 
working code are challenged, and only a few of them are even similar 
to lines in 32V. (See Kashtan Aff., ~ 46 and 23). There has been no 
showing whatsoever that these particular lines of code provide any 
significant value to the kernel. With respect to the other items, 
[REDACTED] (See Affidavit of John Carson, ~ 23). They are 
significant now only because they are needed for purposes of 
compatibility with other code. Thus, although the kernel as a whole 
is significant, the particular items USL claims have been copied are 
both unprotectible and de minimis and do not give rise to a claim of 
copyright infringement. (See generally Bostic and McKusick Decl.; 
Kashtan Aff., ~ 4-6 and 23).

3. USL Could not Enforce a 32V Copyright Against the University or 
BSDI Because of the Lack of Copyright Notice.

Even if USL had not forfeited its copyright in the 32V code, such a 
copyright could not be enforced against the University or BSDI due to 
the lack of notice. 17 U.S.C.  405(b). Where notice has been omitted 
from a copyrighted work, section 405 of the Copyright Act bars 
enforcement of the copyright against an innocent infringer who 
relied on the lack of notice, even if the copyright is later recaptured 
by taking the necessary steps to cure the omission. Both the 
University and BSDI believed AT&T did not claim copyright in the 
32V code because it had been widely distributed with no copyright 
notice, and that USL had chosen to rely on trade secret law instead. 
(McKusick Dep. T. 247-1 to 25115; McKusick and Bostic Decl., ~ 28.4 
and 28.5). Thus, to the extent there were any infringement, it would 
not be actionable due to the lack of notice.

III. USL CANNOT DEMONSTRATE A LIKELIHOOD OF SUCCESS ON ITS 
TRADE SECRET CLAIM.

The Affidavits submitted by Keith Bostic, Kirk McKusick and David 
Kashtan establish unequivocally that none of the features USL relies 
on in support of its motion are trade secrets. In an attempt to 
salvage its trade secret claim, USL argues that mere access to its 
licensed code was sufficient to "taint" the authors of Net2, whether 
or not Net2 actually contains or discloses any USL trade secrets. In 
order to make this argument, USL blatantly ignores the terms of its 
own software license agreements with the University, which 
preclude such a claim.

A. To Prevail On Its Trade Secret Claim USL Must Demonstrate That
BSD/386 Contains USL Trade SECRETS.

As USL itself admits, its agreements with the University authorize 
the University to develop its own versions of the UNIX software. 
What is more, those agreements expressly provide that derivative 
works which do not "include" USL proprietary information are to be 
made available to anyone for unrestricted use.

1. The LICENSE Agreements Authorize Use of the UNIX 32-V
Code To Create Modifications, Enhancements and Derivative Works

Over the course of their relationship, in the late 1970s and 1980s, 
USL's predecessors-in-interest and the University entered into a 
series of software license agreements governing use of the UNIX 
32V software. Although those agreements were clarified and made 
more specific over time, all had the same basic meaning concerning 
the University's right to use the licensed software for research 
purposes, to create derivative works based upon it and to publicly 
release its results, modifications, enhancements and derivative 
works, so long as they did not contain the licensed trade secrets.

The first agreement governing use of the UNIX 32V software was the 
April 1, 1979 Software Agreement between Western Electric 
Company and the University of California (the "April 1, 1979 
Agreement"), which USL has attached as Exhibit B to the Affidavit of 
Michael J. DeFazio. This agreement-- the earliest of the series-- is 
the only agreement USL refers to in its motion papers.

The second agreement governing use of the UNIX 32-V 
software,[fnl7] was the August 1, 1981 Software Agreement 
between western Electric and the University of California (the 
"August 1, 1981 Agreement") (attached as Exhibit X to the Forte Aff.).

  [fn17] See, e.q., Baldwin Dep. T. 59-6 to 59-13.

The most recent agreement governing the University's use of the 32V 
source code was entered into on November 12, 1985, and is called 
the Educational Software License Agreement, E-SOFT-00089 
(hereinafter the "E-SOFT-00089 Agreement"). (Bond Dep. T. 32-17 to 
32-25, 33-1 to 33-9, 39-7 to 43-5 and Exhibits D-25 and D-26 (see 
Exh

[REDACTED]

(Wilson Dep. T. 60-11 to 61-2; Bond Dep. T. 32-25 to 33-9, 132-10 
to 133-19). Further, since the E-SOFT-00089 agreement expressly 
supersedes all prior agreements on the subject matter contained 
therein, it is the language of the E-SOFT-00089 that governs in this 
action. See paragraph 4 of the E-SOFT-00089 Agreement (attached 
as Exhibit F to the Forte Aff.).

Although the language in these agreements was clarified over time, 
the basic intent with respect to the University's right to use the 
software and its confidentiality obligation was the same in each of 
them. (See, Karels Aff., 1 24; see also Wilson Dep. T. 36-17 to 37-8). 
Under each of these agreements, the University was authorized to 
make modifications, enhancements and derivative works using the 
licensed software. If a derivative  work contained the licensed 
software or disclosed any proprietary methods or concepts used in 
the licensed software, it could be distributed only to those who had 
purchased a source code license from AT&T. As demonstrated below, 
however, if an enhancement, modification or derivative work did not 
contain or disclose any AT&T proprietary information, it belonged to 
the University, and was not governed by the restrictions applicable 
to the licensed software. See discussion infra.

2. The License Agreements Permit Derivative Works Not Containing 
USL Trade Secrets To Be Made Available To Non Licensees 

Section 2.01(b) of the E-SOFT-00089 Agreement expressly provides 
that the University was to distribute to anyone, on an unrestricted 
basis, modifications and enhancements that did not include USL's 
proprietary information. Likewise, Section 2.01(a) of the E-SOFT-
00089 Agreement, provides that derivative works "that contain" 
licensed software must be treated as licensed software i.e, must be 
subject to the same restrictions on disclosure as the licensed 
software:

[Licensee's] right to use includes the right to modify such software 
product and to prepare derivative works based on such software 
product, *provided that any such modification or derivative work 
that contains any part of a software product subject to this 
Agreement is treated hereunder the same as such software product.*
(See Exhibit D-25 to Bond Dep.T. (emphasis added)). 

The negotiations leading up to the execution of this agreement, as 
well as the prior course of dealing between the parties, make it 
clear that the words "that contains any part of a software product 
subject to this agreement" were intended to distinguish between 
derivative works that actually contained licensed software and 
derivative works that did not- while the former were subject to the 
license restrictions, the latter were not.

In the negotiations leading up to the execution of the E-SOFT-00089 
Agreement, USL initially proposed language providing that any 
derivative work "based on" the licensed materials was to be treated 
as licensed software. The University objected to that language, 
however, and insisted that it be changed to cover only derivative 
works "that contain" licensed software. USL accepted this 
modification, providing a new version of the E-SOFT-00089 
Agreement in which the language "based on" licensed materials had 
been changed to "that contains" licensed software. (Wilson Dep. T., 
Exh. D-67 and D-68 (attached as Exhibits Y and Z to the Forte Aff.).

This same clarification i.e., that only derivative works containing 
AT&T code had to be treated as licensed software had also been 
made in discussions surrounding a prior license agreement, the "UNIX 
System V Agreement". This agreement initially included within the 
definition of "LICENSED SOFTWARE" any derivative works prepared by 
the licensee "based on" the licensed materials. The University 
objected to that provision, which had not appeared in any of its prior 
agreements with AT&T, and was contrary to its understanding of its 
obligations. (See Karels Aff., ~ 23-26). Following discussions 
regarding the provision, USL wrote a letter agreement to the 
University "clarifying" the definition of "Licensed Software" by 
deleting from the definition "derivative works prepared by the 
licensees'.  The letter further stated that AT&T never had intended 
to claim any interest in such works. (See Exhibit B to Karels Aff.; 
Exhibit D-34 to Wilson Dep. T. (Bates P000243) (Exhibit aa to the 
Forte Aff.)). In place of the prior language, a sentence was added 
stating "LICENSEE agrees that any modification or derivative work 
prepared by it *that contains any LICENSED SOFTWARE* shall be 
treated as LICENSED SOFTWARE hereunder." (Emphasis added). 

USL now attempts to read into the earlier 32V agreement (which it 
mistakenly argues applies), the same language that was deleted 
from both the System V Agreement and the E-SOFT-00089 
Agreement even though no such language appears in either of those 
agreements. Contrary to USL's argument, this same point also was 
clarified with respect to the April, 1979 Agreement: In a letter 
dated January 18, 1978, the University inquired whether it could 
distribute UNIX-derived software.[fn18]  In a written response, 
Edwin G. Baldwin, who was AT&T's Director of Technology Licensing 
at the time, stated:

We take no position with regard to your use or distribution of 
software developed by you which does not contain any of our 
proprietary information such as, without limitation, the computer 
programs and documentation, or any portion thereof, related to the 
UNIX operating system, including the methods and concepts utilized 
therein.

With regard to the distribution of any software which does contain 
some of our proprietary information, our primary concern is the 
prevention of unauthorized disclosure, either intentional or 
inadvertent, which might jeopardize our valuable proprietary rights 
in such information.

  [fn18]  Exhibit D-11 to Baldwin Dep. T. (attached as Exhibit bb to 
the Forte Aff.).

(See Exhibit-12 to Baldwin Dep- T- (attached as Exhibit cc to the 
Forte Aff.) (emphasis added)). Mr- Baldwin testified at his

[REDACTED]

(Baldwin Dep. T. 33-15 to 34-16). Mr. Baldwin further testified that

[REDACTED]

Another USL employee, Mitzi Bond, similarly testified to her 
understanding that

[REDACTED]

  [fn19]  ?


(Bond Dep. T. 138-14 to 138-19, 137-13 to 138-13).

After consulting with Ms. Bond during a break at the deposition, 
USL's attorney cross-examined her, at which point she changed her 
testimony, now stating that it was her understanding [REDACTED]

215-24, 216-20 to 216-25, 217-6 to 217-15, 219-3 to 219-15, 
224-18 to 224-25).

[REDACTED]

(Frasure Dep. T. 172-11 to 172-20).

[REDACTED]

36-18 to 39-10, 49-20 to 50-2).

<a name="mental">
Given that USL twice attempted to include a provision that any 
derivative work "based on" the licensed software would have to be 
treated as licensed software (in the 1983 System V Agreement and 
the 198S E-SOFT-00089 Agreement)   and both times the University 
insisted that the language be narrowed to cover only derivative 
works that "contain" licensed software -- the argument that the 
intent was to cover any work "based on" the licensed software, or 
any work benefiting from knowledge of the licensed software, is 
completely unsupportable, much less the argument that anyone who 
has ever seen UNIX source code is "<b>mentally contaminated</b>" and may 
never write another piece of code that is not subject to USL's 
license.
</a>

This argument is further contradicted by USL's own conduct ; 
[REDACTED]

The testimony of USL's witnesses is contradicted by the express 
language of the agreements, the conduct of the parties, the 
testimony given by other USL witnesses, and in some cases, even 
their own prior testimony. Their alleged understanding is also 
contrary to the understanding of the representatives of the 
University who were involved in the negotiation of those 
agreements. (See Karels Aff.     18-36; McKusick Dep. T. 247-1 to 
251-25). In interpreting the agreement, the Court should look to the 
parties' words and conduct before this litigation arose and 
particularly to the language of the agreement itself and not to USL's 
litigation construct. The agreements themselves and the conduct of 
both parties make it very clear that only enhancements, 
modifications and derivative works that contain or disclose USL 
proprietary information must be treated as licensed software.

This interpretation is further confirmed by the confidentiality 
provision in the agreements. Section 7.05(a) of the E-SOFT-00089 
Agreement provides that confidentiality must be maintained for the 
Software Products subject to the Agreement, including methods or 
concepts utilized therein. It does not require that confidentiality be 
maintained for derivative works not containing such Software 
Products or methods and concepts utilized therein.[fn.20]

Likewise, section 5.06 of the August 1, 1981 Agreement and section 
4.06 of the April 1, 1979 Agreement prohibit only disclosure of the 
Licensed Software (including methods or concepts utilized therein." 
At page 9 of the August l, 1981 Agreement and p. 7 of the April 1, 
1979 Agreement, "Licensed Software" is defined to mean "the 
Computer Programs and the documentation, or any portions thereof, 
generally identified below and specifically listed in the attached 
schedule . . . ."

As explained above, the one time when USL attempted to include 
derivative works prepared by the licensee in the definition of 
Licensed Software, the University objected to that definition, and 
the agreement was "clarified" by removing that language from the 
definition. In its place, a new sentence was added providing instead 
that derivative works "that contain" licensed software had to be 
treated as licensed software. Thus, USL's attempt to read into the 
earlier agreements a provision that derivative works not containing 
or disclosing AT&T proprietary information are subject to the same 
confidentiality restrictions as the licensed software must be 
rejected.

Since the license agreements expressly impose a duty of secrecy 
only for the licensed software and methods and concepts utilized 
therein, and the parties' understanding in this regard was repeatedly 
clarified to limit the license restrictions to derivative works that 
actually contain or disclose USL proprietary information, no duty of 
secrecy can be implied for derivative works that do not contain or 
disclose any of USL's proprietary code, methods or concepts. See 
Ferroline Corp. v. General Aniline & Film Corp., 207 F.2d 912, 922, 
925-26 (7th Cir. 1953), cert. denied, 347 U.S. 953 (1954) (where a 
license agreement expressly imposes an obligation of secrecy with 
respect to certain information, no further confidentiality 
restrictions can be implied). Thus, the cases USL cites with respect 
to advantages obtained by familiarity with the code are inapplicable. 
In this case, unlike in those, the University was authorized to use 
licensed software in developing its own code and was prohibited 
from distributing it to non-licensees only if it contained USL trade 
secrets.

3. The Duty of Confidentiality Does Not Apply to Information
That is or Becomes Generally Known. 

Consistent with fundamental trade secret law, the agreements 
governing use of the UNIX 32-V Software expressly provide that no 
duty of confidentiality extends to information already generally 
known. Section 7.05(a) of the E-SOFT-00089 Agreement states:

If information relating to a SOFTWARE PRODUCT subject to this 
Agreement at any time becomes available without restriction to the 
general public by acts not attributable to LICENSEE or its employees, 
students or faculty members, LICENSEE's obligations under this 
section shall not apply to such information after such time. 

Section 5.07 of the August 1, 1981 Agreement and Section 4.07 of 
the April 1, 1979 Agreement contain similar provisions excluding 
information that is or becomes generally known from the 
University's obligation of confidentiality. Thus, there can be no 
claim of misappropriation based on use or disclosure of generally 
known information, regardless of where the numerous authors of 
Net2 obtained that information. 

In this case, therefore, the only issue to be determined is whether 
by releasing Net2 to non-licensees, the University disclosed to non-
licensees any code, method or concept that can be considered a trade 
secret. USL has not made and cannot make any such showing.

B. USL Cannot Demonstrate That Net 2 or BSD/386 Contain any USL Trade Secrets

The affidavit of USL's expert misses the point entirely since he has 
failed to identify any original licensed code, methods or concepts 
contained in Net2 that still qualified as USL trade secrets at the 
time of Net2's release. Although at one time portions of the code, 
methods and concepts may have been trade secrets, UNIX source code 
has now been so widely licensed and is so well-documented in the 
technical literature that its internal operation, algorithms, design, 
sequence, structure and organization, and many portions of the 
specific code, are generally known or readily ascertainable. Indeed 
in many respects it has become a standard in the industry. The 
Affidavits submitted by Keith Bostic, Kirk McKusick and David 
Kashtan demonstrate conclusively that USL has failed to establish 
the presence of any USL trade secrets in Net2 or BSD/386, since all 
the items USL relies on in this motion are disclosed in publicly 
available materials and are commonly known in the industry. Thus, 
USL's trade secret claim cannot possibly succeed.

IV. USL CANNOT SHOW IRREPARABLE HARM

USL also cannot meet the requirement of irreparable harm. Although 
USL has submitted a lengthy declaration outlining the supposed harm 
it will suffer if lower-priced competition is permitted, USL ignores 
the fact that Net2 has been distributed to hundreds of thousands of 
individuals and remains freely available from at least 66 different 
sources. At least one other company has already widely distributed a 
complete system based on Net2 and USL has taken no action against 
that company. (See Adams Aff., 9 -11).

Moreover, a number of other UNIX clones which share many of the 
same features USL relies on in its motion, have been available for 
years. Although these systems are inferior to BSDI's, they disclose 
and make use of the same types of information BSDI is alleged to 
have misappropriated. (Bostic & McKusick Decl., ~ 28.1.3). Thus, in 
reality, USL cannot show any urgent need to put BSDI out of business 
pending the trial in this action.

BSDI, on the other hand, will suffer irreparable harm if the 
preliminary injunction USL requests is granted. BSDI will be forced 
out of business and will have no way to finance its defense of this 
lawsuit. (Adams Aff., ~ 14). USL not only seeks to keep BSDI's only 
product off the market, but also seeks to force BSDI to fire all of its 
employees based on the fact that they, like so many other 
experienced computer programmers, have had access at some point 
to UNIX source code. This is a frivolous request that, if taken 
seriously, would strike fear into the hearts of programmers all over 
the world, who would also potentially be subject to such 
restrictions on their employment opportunities as a result of their 
access to UNIX source code as students or employees.

V. The Public Interest Favors Denial of the Preliminary Injunction.

BSDI makes its system available to programmers who could not 
afford [REDACTED] for a source license from USL. USL is able to 
charge this exorbitant fee only because of the lack of competition. 
Denial of USL's motion thus will serve the public interest by 
promoting competition. Denial will also prevent USL from unjustly 
inhibiting the employment opportunities of the thousands of 
computer programmers who have had access to UNIX source code.

VI. EVEN IF USL COULD ESTABLISH THAT NET2 CONTAINED SOME USL 
PROPRIETARY INFORMATION, THE INJUNCTION IT SEEKS IS OVERLY BROAD.

A. An Injunction Against the Entire BSD/386 Program Would Be 
Impermissibly Overbroad.

Injunctive relief "must be tailored to remedy the specific harms 
shown," Davis v. Romney, 490 F.2d 1360, 1370 (3d Cir. 1973), and 
should "be no broader than necessary to provide full relief to the 
aggrieved plaintiff." McLendon v. Continental Can Co., 908 F.2d 1171, 
1182 (3d Cir. 1990); see also Ameron. Inc. v. U.S. Army Corps of 
Engineers, 787 F.2d 875, 890 (3d Cir. 1986) cert. dismissed, 488 U.S. 
918 (1988) (an injunction which exceeds what is required to provide 
plaintiff with complete relief is contrary to "jurisprudence 
governing injunctive remedies."); Ideal Toy Corp. v. Plawner Toy Mfg. 
Corp., 685 F.2d 78, 84 (3d Cir. 1982) ("The injunctive decree must be 
broad enough to protect the plaintiff, yet sufficiently narrow to 
avoid affording undeserved patent protection, and to permit the 
defendant to participate in activity outside the intended scope of 
the injunction").

This Court thus has the discretion and the responsibility to "mold its 
[preliminary injunction] decree to meet the exigencies of [the] 
particular case." 11 Wright & Miller, Federal Practice and Procedure: 
Civil  2947, at 424 (1973). USL would have this court far exceed 
those boundaries by granting a preliminary injunction whose 
sweeping effect would enjoin the entire BSD/386 product, even 
though USL accuses only 80 of the more than 8000 files, and points 
to only a few lines of similar code out of 1.5 million. Given that the 
Net 2 files were written separately by thousands of different 
authors over a period of many years, there would no basis 
whatsoever for finding copying as to all of them based on 
allegations or evidence against only one. 

Thus, even if USL could establish infringement as to a few lines of 
code, which as explained at length above it has not, there would still 
be no basis for preventing BSDI from using the remaining code in 
BSD/386:

[I]f the infringing portion of defendant's work can be removed 
without destroying the usefulness of the remainder of the work, the 
whole of the work need not be enjoined. 

3 Nimmer on Copyrights. supra, li.06[c], at 14-91-92; see also Orth-
O-Vision. Inc. v. Home Box Office, 474 F. Supp. 672, 686 n.14 (S.D.N.Y. 
1979) ("When the infringing portion of a defendant's work may be 
removed from the remainder, injunctive relief ought extend only to 
the former."); Breffort v. I Had A Ball Co., 271 F. Supp. 623, 625-26 
(S.D.N.Y. 1967) (excluding from injunction prohibiting performance of 
a copyright infringing play the independent performance of original 
music created for the play); Craft v. Kobler, 667 F. Supp. 120, 125 
(S.D.N.Y. 1987) (noting that injunction prohibiting sale of author's 
infringing biography nevertheless allowed author to revise the work 
so as to eliminate the infringing materials); Salinger v. Random 
House. Inc., 811 F.2d 90, 100 (2d Cir.) (same), cert. denied, 484 U.S. 
890 (1987); International Film Service Co. v. Affiliated Distributors, 
283 F 229, 235 (S.D.N.Y. 1922) (allowing defendant to remake movie 
so as to delete those scenes which infringed plaintiff's copyright); 
Colonial Book Co.. Inc. v. AMSCO School Publications Inc., 41 F. Supp. 
156, (S.D.N.Y. 1941) (injunction must be limited to the eleven pages 
of defendant's work which infringed plaintiff's copyright). 
Otherwise, USL would be granted a monopoly over a huge volume of 
material which even USL admits was not copied.

In Educational Testing, plaintiffs' request for a similarly broad 
preliminary injunction was rejected by this circuit. See Educational 
Testing, 793 F.2d 533, 545 (3d Cir. 1986). The plaintiff in 
Educational Testing, claiming that defendant infringed its copyright 
in certain test materials, sought to enjoin defendants' "use of 
information obtained from" plaintiff's copyrighted tests and from 
"adapting" any of plaintiffs' materials. Id. The court noted that such 
an injunction would prohibit legitimate uses of plaintiffs' work as 
well as legitimate original works by defendants. See also 3 Nimmer 
on Copyright, supra,  14.06[C], at 14-92-14-93.

B. Plaintiff is Misusing its Copyright by Attempting to Enjoin All Or BSD/386.

A misuse of copyright protection is found when a copyright holder 
attempts to utilize his copyright to gain protection beyond that 
which copyright law allows. When analyzing a copyright holder's 
conduct for misuse, the court does not look to the validity of the 
copyright, but rather to the manner in which the copyright is being 
used. qad. inc. v. ALN Associates. Inc., 770 F. Supp. 1261, 1266 n.14 
(N.D. Ill. 1991). As the court noted in qad, "[n]o party can use the 
limited grant that a copyright confers to gain control of components 
over which it has no such right." Id. at 1266

The plaintiff in qad asserted copyright infringement of its computer 
software program, alleging that its entire program, of which it 
claimed defendant's was a derivative, was original with plaintiff. 
When it became apparent that, in fact, much of plaintiff's program 
was itself copied from yet another program, the court denied 
plaintiff any relief even with regard to those portions of defendant's 
program which were infringing. The court noted that "[w]hen a 
copyright holder attempts to use legal proceedings to protect an 
improper extension of a copyright, the court may refuse to enforce 
the copyright." See also Lasercomb America. Inc. v. Reynolds, 911 
F.2d 970, 976-78 (4th Cir. 1990), aff'd without op., 961 F.2d 211 
(1992) (plaintiff was guilty of misuse of copyright where it 
licensed copyrighted program on the condition that licensee refrain 
for 99 years from creating a competing program).

Plaintiffs in this action likewise are attempting to use their alleged 
copyright to enjoin BSDI's use not only of those programs accused 
of-being infringing, but of thousands of other files, consisting of 
hundreds of computer programs, that USL does not even accuse. In 
addition, USL improperly seeks to enjoin the use of standard file 
names and mnemonics that are protected neither by copyright nor 
trade secret law.

For all of the reasons outlined above, plaintiffs cannot gain the 
expansive preliminary injunction that they seek in this action. 
Although no injunction is warranted, to the extent the Court grants 
any injunction, it must be narrowly tailored to the few lines of code 
USL relies upon.

Conclusion

Both USL's trade secret claim and its copyright infringement claim 
are fundamentally flawed. One because the information allegedly 
misappropriated is not in fact secret. And the other because USL has 
no valid copyright in 32V and can show no substantial copying of 
protectible expression. A grant of USL's motion will put BSDI out of 
business permanently and will prevent it from having the means to 
defend itself in this action. A denial of USL's motion will simply 
maintain the status quo, since BSDI has been selling BSD/386 for 
over twelve months and the Net2 code is available from dozens of 
other sources. For all the foregoing reasons, BSDI respectfully 
requests that USL's motion for preliminary injunction be denied in 
its entirety.

Respectfully submitted,

SAIBER SCHLESINGER SATZ
& GOLDSTEIN
Attorney f or Defendant
Berkeley Software ~ Design, Inc.

JAMES H. FORTE 
A Member of the Firm
Dated: January 8, 1992

-56-