Vincent van Gogh, “sweat of the brow,” and database protection



Vincent van Gogh, “sweat of the brow,” and database protection



Description:
Principles and protection of Database

I. INTRODUCTION

A recent New York Times article (1) described the plight of a former computer programmer who decided to devote himself full time to the creation of the definitive Vincent van Gogh Web site. Over the course of five years, David Brooks collected, scanned and digitally reproduced copies of every known work of van Gogh, including paintings, drawings, watercolors, sketches and letters–to and from van Gogh. The resulting Web site, The Vincent van Gogh Gallery, (2) is very attractive and comprehensive.

Brooks was extremely upset to learn that someone in the Netherlands had also created a Web site devoted to van Gogh, and had apparently copied many of the graphical images that Brooks had made. Furthermore, the site contained the translated text of the 864 letters that Brooks had compiled. The resulting Web site, About Van Gogh Art, (3) is also very attractive and comprehensive.

Brooks said it took him five years to compile his site, but “the man who stole my site was able to do it in a matter of two hours.” (4) Brooks said there were about fifteen images that “you simply can’t find anywhere else in color, and I found them on this guy’s Web site, the same size, pixel for pixel.” (5)

What was possibly even more painful for Brooks to discover was that most of what had been copied was done so legally. Other than the translated letters, (6) which are subject to copyright protection as derivative works, (7) the rest of the material is part of the public domain and, therefore, freely copyable. (8)

Many readers may sympathize with the plight of David Brooks, who painstakingly, tediously, even lovingly, gathered a great deal of information over a long period of time to create an excellent Web site. However, copyright law does not help him in this situation. In fact, its primary purpose demands that it permit this kind of copying. David Brooks compiled a database containing primarily public domain works. These works cannot be afforded any further protection under copyright law. Instead, if there were any protection to be found, it would be for the creativity in the compilation of the Web site as a whole.

Ever since the advent of the CD-ROM, and particularly since the time that the Internet and World Wide Web became part of our daily lives, there has been a question as to whether the contents of databases should be protected. Before we became “digitized,” copying large quantities of information was often a difficult and tedious task. Now, technology has made the act of copying as simple as clicking a mouse.

One need only to look at the Web to see how easy it has become to collect and copy information of any type. Words, images, music and video are compiled neatly, and digitally, on thousands of Web sites, waiting to be read, viewed, listened to, and copied, by even the most inexperienced computer users. (9)

While some people may view the Web as a utopian environment, where ideas and information are readily and freely exchanged, others may see it as a horrific nightmare, where goods and wares are stolen by thieves who cannot even be seen. The digital media that have evolved and replaced their analog counterparts over the last two decades have all come to roost on the Web. Massive amounts of digital information, in numerous formats, are now available in cyberspace.

This article examines how copyright law and other legal theories have been used to protect databases in general, with a special emphasis on databases found on the Internet. It presents a model for applying copyright principles to databases. The model focuses on the creativity of the compilation and the creativity of its components. This article concludes that copyright law, even with the advent of the Internet, should not be extended to protect non-creative compilations of non-creative works. Such works exhibit no originality or creativity, and therefore, should not be protected by copyright. If a database is worthy of any copyright protection, it is either because its individual components are copyrightable, or because its arrangement, coordination, or selection of data is sufficiently creative. The medium where the database is stored should not change the legal principles.

This article also explores some of the alternate legal theories that have been used to protect databases, including contract law, trespass to personal property, and misappropriation. Finally, this article discusses the sui generis right for databases established by the European Union, and efforts in this country to legislate similar protection.

What is a Database?

The term “database” is very broad. It includes both non-electronic and electronic collections of data. For example, it includes a traditional, paper telephone directory, as well as an electronic version of the directory contained on a CD-ROM or on a Web site. It includes what we could call either “creative” or “non-creative” compilations of data. A creative compilation would exhibit some degree of creativity or originality in the arrangement, coordination, or selection of its data. A non-creative compilation would exhibit no such creativity or originality

Furthermore, databases may contain individual elements that are creative works, worthy of copyright protection themselves. For example, the individual components of a collection of photographs or newspaper articles may each be entitled to copyright protection. In contrast, we may have a compilation of facts, such as names and addresses, or public domain items, like court cases or old songs, that are not individually entitled to copyright protection. We could describe these individual components as being either “creative” or “non-creative” works.

Broadly speaking, a database includes any collection of data. The collection (or compilation) may be creative or non-creative, and the data themselves may be creative or non-creative. Thus, there are four different combinations. As we will see, only some of these combinations should be entitled to copyright protection.

II. PROTECTING DATABASES UNDER COPYRIGHT LAW

A. History of Copyright Law

In order to better understand what the copyright law protects, it is important to trace some of its history. The scope and duration of its protection have changed dramatically over the years as the technology has changed. The source of authority for copyright law comes from the Intellectual Property Clause of the United States Constitution, which states that Congress shall have the power “[t]o promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” (10)

As this language clearly suggests, the main purpose of the copyright and patent systems is to benefit the public at large–to promote the progress of science and the useful arts. (11) This is achieved by granting to authors and inventors exclusive rights, a limited monopoly, for a specified period of time. If the author’s or writer’s creation does not satisfy the minimum requirements of copyright or patent law, the creation is not protected–it becomes part of the public domain. Similarly, even if the creation does warrant protection, once the specified period of time for the exclusive rights expires, the creation becomes part of the public domain. (12)

Facts cannot be copyrighted. Scientific principles and mathematical formulas cannot be patented. They are part of the public domain. Society can benefit from such a public domain only if the information in it is freely accessible. The system rewards authors and inventors in order to provide an incentive for them to continue to create. (13) But the reward comes with a price. After its term of protection expires, that creation becomes part of the public domain.

Over the course of time, the scope of the copyright law expanded to accommodate new technologies. As new media for expression developed, they were added to the reach of the law. At the same time, the duration of the copyright protection also greatly increased.

The first copyright law, the Copyright Act of 1790, granted a copyright interest to authors of maps, charts, and books for a period of fourteen years, renewable for one additional term of fourteen years. (14) In 1802, prints and engravings became eligible for protection. (15) In 1831, musical compositions were added to the list, and the length of the first term was increased from fourteen to twenty-eight years. (16) In 1856, the subject matter was extended to include the public performance of dramatic works, (17) in 1865, photographs, (18) and in 1870, paintings, drawings and statues. (19) In 1909, the copyright law was completely revised (1909 Act). (20) It provided copyright protection for “all the writings of an author,” and extended the length of the second renewal term to twenty-eight years, thus authorizing copyright protection for a period of fifty-six years.

B. The Copyright Act of 1976

The copyright laws were completely overhauled again by the Copyright Act of 1976 (1976 Act). (21) The copyright interest now extends to “original works of authorship fixed in any tangible medium of expression” (22) and includes: “(1) literary works

One of the reasons for the dramatic changes in the 1976 Act was to correct and clarify a number of copyright principles relevant to the protection of databases. (24) Under the 1909 Act, one of the subject matter categories for copyright was “books, including composite and cyclopaedic works, directories, gazetteers, and other compilations.” (25) Despite language in the section that indicated that this did not mean that all compilations were automatically copyrightable, some courts erroneously inferred that directories and other such compilations were copyrightable per se. (26) This misinterpretation also gave rise to the “sweat of the brow” doctrine, which incorrectly awarded copyright protection to compilers of facts or ideas merely because they had gathered together such information. (27)

In passing the 1976 Act, Congress sought to clarify matters. Section 103 explicitly recognizes that compilations receive copyright protection separate from any copyright interests in the underlying matter compiled. (28) Section 101 specifies that a compilation can qualify for this protection in two ways. First, protection extends to compilations “formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship.” (29) In other words, a compiler who selects, coordinates or arranges materials (e.g., contemporary song recordings) or data (e.g., facts or public domain materials) in an original or creative way has a protectable copyright interest in that compilation. Second, copyright protection also is extended to non-creative compilations of creative works. (30) Under this provision, if the constituent materials were themselves copyrighted, or copyrightable, and the compiler accessed those materials in a lawful way, then the compilation would be afforded copyright protection regardless of the creativity employed by the compiler. Section 101 defines this second type of protected compilation as a “collective work.” (31) Section 101 then specifically includes collective works within the statutory definition of a “compilation” that is afforded protection under Section 103 of the 1976 Act. (32)

Sections 101 and 103 recognize copyright protections for certain types of compilations. Sections 102 and 103(b) limit those protections. Section 103(b) states: “The copyright in a compilation … extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work … and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright in the preexisting material.” (33) Pursuant to this section, the rights held in a collective work are twofold: (1) any copyrights in the underlying works remain with the original authors

Congress emphasized that Section 102 was not intended to change the law, but to clarify it. (35) The 1909 Act had provided that copyright protects only the “copyrightable component parts” of a work. (36) There was much confusion as to what this meant. (37) Sections 101, 102, and 103 of the 1976 Act shed some light. Copyright protection would no longer extend to non-creative compilations of facts or to non-creative compilations of public domain materials. (38) In addition, the 1976 Act clarified that a copyright in a compilation is “independent of” any “copyright protection in the preexisting material.” (39) The Act provides that there may be separate copyright interests in a collective work as a whole, and in each separate contribution. (40) Thus, the 1976 Act makes clear the distinction between the database as a whole and its components.

The 1976 Act introduced other changes as well. First, it effectively ended the notion of common law copyright. Under the 1909 Act, the federal copyright protected only published works. A whole body of state common law had evolved alongside federal copyright law to protect unpublished works. Under the 1976 Act, the federal copyright interest attaches upon fixation in a tangible medium

The 1976 Act also increased the length of a copyright to the life of the author plus fifty years. Subsequently, the Sonny Bono Copyright Term Extension Act of 1998 (Copyright Extension Act) further expanded the duration of a copyright to the life of the author plus seventy years. (42) Thus, the term of a copyright has grown from a period of fourteen to twenty-eight years to one that will likely span four generations or more. (43)

C. The Feist Case

While a few lower courts wrestled with the new provisions of the 1976 Act, (44) it was not until 1991 that the Supreme Court decided a major copyright case involving databases, Feist Publications, Inc. v. Rural Telephone Service Company, Inc. (45) Feist, the publisher of a telephone directory, copied the names and addresses of all the listings from competitor Rural’s directory. (46) Rural sued for copyright infringement. The lower courts found for Rural, holding that the telephone directories were copyrightable, that there was copying, and that, therefore, there was copyright infringement. (47)

The Supreme Court reversed, finding no copyright interest in Rural’s directory. (48) The Court emphasized that originality is a constitutional requirement for copyright:

The sine qua non of copyright is originality. To qualify for copyright

protection, a work must be original to the author…. Original, as the term

is used in copyright, means only that the work was independently created by

the author (as opposed to copied from other works), and that it possesses

at least some minimal degree of creativity…. To be sure, the requisite

level of creativity is extremely low

The vast majority of works make the grade quite early, as they possess some

creative spark. (49)

The Court held that Rural’s selection, coordination, and arrangement of its listings, by alphabetical order of surname, could not have been more obvious, and accordingly, did not satisfy this minimum constitutional standard for copyright protection. (50)

The Court discussed the interplay between two well-established propositions: facts are not copyrightable, and compilations of facts generally are, as long as there is some originality in the selection or arrangement of the facts. (51) The Court cautioned that even if there were such originality, the copyright would in no event extend to the facts themselves. (52) The Court made clear that under the 1976 Act, “originality, not `sweat of the brow,’ is the touchstone of copyright protection in directories and other fact-based works.” (53) It also held that “copyright in a factual compilation is thin. Notwithstanding a valid copyright, a subsequent compiler remains free to use the facts contained in another’s publication to aid in preparing a competing work, so long as the competing work does not feature the same selection and arrangement.” (54)

In commenting on the fairness of this result, the Court observed:

It may seem unfair that much of the fruit of the compiler’s labor may be

used by others without compensation. As Justice Brennan has correctly

observed, however, this is not “some unforeseen byproduct of a statutory

scheme.” It is, rather, “the essence of copyright,” and a constitutional

requirement. The primary objective of copyright is not to reward the labor

of authors, but “to promote the Progress of Science and useful Arts.” As

applied to a factual compilation, assuming the absence of original written

expression, only the compiler’s selection and arrangement may be protected

the raw facts may be copied at will. This result is neither unfair nor

unfortunate. It is the means by which copyright advances the progress of

science and art. (55)

Thus, after Feist, it is clear that copyright protection will not extend to databases merely because time or effort is spent compiling information. Rather, copyright protection is only available if either the individual elements are worthy of protection, or the database as a whole, because of some creative selection, coordination, or arrangement, is original enough to qualify for protection. (56) This standard applies regardless of where the database is stored.

Feist was decided in 1991, just as the digital world was beginning to take shape. Personal computers and audio CDs were everywhere and CD-ROMs were beginning to become popular. The Internet was evolving quickly. By the mid- 1990s, the technological landscape had changed. Computers were faster, more powerful, and could store greater amounts of data. Read/write CD drives became available, and probably most importantly, the Web grew exponentially. Anyone with a computer and a modicum of ingenuity could digitize, compile, and copy (or copy and compile) almost anything. Cyberspace became all electronic trading post, with unlimited potential a dream world for some, a nightmare for others. (57)

III. THE MODEL

A number of difficult copyright questions have quickly crystallized in this new digital age. (58) It is extremely important that the copyright law continue to promote the progress of the arts and sciences by rewarding the creativity of authors. It is equally important, however, to recognize that copyright law can easily stifle that progress by overextending protection. (59) It may be tempting to “reward” every “creation” with copyright protection, but we must not lose sight of the basic principles behind the law. The Internet provides unprecedented access to information. We must be careful, however, not to unduly restrict the free flow of that information by extending copyright protection where it does not belong.

The Internet facilitates the easy collection and compilation of data. While some of these compilations may qualify for copyright protection, most will not. A simple table can be very useful in focusing on the criteria necessary to determine whether a compilation is entitled to copyright protection.

Table 1 illustrates the four possible categories of databases, describing each as either a creative or non-creative compilation of either creative or non-creative works. The two left-side quadrants contain creative works, which are considered “collective works” under the 1976 Act. (60) Accordingly, not only would there be copyright protection for the individual elements of these collections, but there would also be protection for the collections as a whole. (61)

In the upper left quadrant, we might have, for example, a CD-ROM containing a collection of copyrighted cartoons or comic strips. As part of this database, an interface would permit a user to access the individual cartoons in a variety of (creative) ways. For example, in addition to being able to access the cartoons, by title, by author, or by date, one might be able to access them by genre (e.g., black humor, satire,Japanese animation), by subject matter (e.g., family, children, sports), or by time (e.g., prehistoric, 1930s, future). Another example would be a Web site created by the New York Times containing a collection of (copyrighted) news photographs. The Web site might be designed to permit access of the photographs in a variety of different ways, making the selection, arrangement, and coordination of the content, if not unique, certainly original. Under current law, any Web site that provides a minimum spark of creativity in its interface would qualify for copyright protection as a creative compilation. If such a Web site has content that also qualifies as a creative work, then this cyberspace database would belong in the upper left quadrant.

In the lower left quadrant are the non-creative compilations of creative works. These also are considered to be “collective works” under the 1976 Act. (62) In this quadrant belong, for example, a journal or magazine containing (only) a collection of (copyrighted) articles, (63) a “Complete Works” CD containing (copyrighted) songs, or a Web site containing a collection of numbered links to (copyrighted) images. In these examples, the copyright owners of the individual works would retain their interests unaffected by inclusion in the “collective work,” and the copyright owner of the “collective work” would acquire only the privilege of reproducing and distributing the individual work as part of that particular “collective work.” (64)

The two upper quadrants contain creative compilations. The upper left quadrant, as we have already seen, contains creative compilations of creative works. The upper right quadrant contains creative compilations of non-creative works (e.g., facts, public domain material). For example, we may have a Yellow Pages directory containing an original selection of categories geared towards a particular community, (65) or a baseball card catalog listing prices and designating certain cards to be “premium.” (66) Similarly, a Web site containing non-creative works, but with a creative interface (i.e., one whose selection or arrangement of facts is original), would belong in the upper right quadrant. (67)

Any database in the two upper quadrants (i.e., a creative, as opposed to a non-creative, compilation) qualifies as a “compilation” under the Copyright Act, as its definition speaks of a collection of preexisting materials or data that are selected, coordinated or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. (68) This is specifically the type of database that Feist addressed. Bear in mind, however, that inclusion in the upper right quadrant does not change the nature of the underlying work. The (“non-creative”) facts or public domain material in a database in the upper right quadrant will not gain any copyright protection for those components. Only the compilation as a whole will warrant any protection. And as we will see from the cases below, this protection may or may not be of,much value. (60)

In the two right-side quadrants are databases containing only noncreative works (facts and public domain materials). These are the databases that are most often the subject of legal discussion. As Feist emphasized, facts (and public domain materials) cannot be protected by copyright. (70) Whether a database containing non-creative works deserves any copyright protection as a “compilation” will be determined by applying the principles of Feist (and placing it above or below the middle line bisecting the quadrants). For example, a Web site with a sufficiently creative interface would belong in the upper right quadrant.

In the lower right quadrant are the non-creative compilations of non-creative works, for example, an alphabetical telephone directory, a table containing the names of all the presidents and vice presidents and the years they served, or a collection of all the works of William Shakespeare. These are databases that do not warrant any copyright protection because they lack creativity–they are non-creative compilations of non-creative works. (71) It is irrelevant whether they exist in electronic or non-electronic form, or whether they are printed in a book or reside in cyberspace. This result is precisely what the copyright law was intended to and should produce.

IV. APPLYING THE MODEL TO DATABASE COPYRIGHT CASES

Most of the database copyright cases involve the two right-side quadrants. That makes sense because the two left-side quadrants contain creative works, that is, databases whose individual components are independently copyrightable. It is of far less concern to get a copyright in a database as a whole if the individual items are themselves protectable. The two right-side quadrants contain noncreative works–databases of facts or public domain works. For most of these cases, the typical approach for a court is to: (1) apply the principles enunciated in Feist and determine whether there is enough originality in the selection, coordination, or arrangement of the facts to confer copyright protection in the compilation, (72) and (2) determine whether there was copyright infringement by comparing the allegedly infringing database to the original to see if there is substantial similarity with the protected portion of the database. (73)

The Second Circuit has decided several copyright cases involving databases, both before and after Feist. (74) In Eckes v. Card Price Update, (75) a pre-Feist case, the court applied principles that nonetheless would be applicable today. It found that the plaintiff had exercised “selection, creativity and judgment” (76) in choosing which among the 18,000 baseball cards in its price guide should be deemed “premium” cards, and so had a copyright interest in the guide. (77) It found infringement upon sufficient evidence of copying by defendant. (78)

In another case decided shortly after Feat, the Second Circuit found sufficient originality, in a Yellow Pages telephone directory to warrant copyright protection. (79) The court upheld the finding of the district court that there was sufficient originality in the selection of the categories in the directory. (80) The court, however, found no infringement since the two directories were not substantially similar. (81) It stated that the “key issue is not whether there is overlap or copying but whether the organizing principle guiding the selection of businesses for the two publications is in fact substantially similar.” (82) It discussed the Feist case, and pointed out that the Second Circuit had rejected the “sweat of the brow” doctrine twenty-five years earlier. (83) It also distinguished the Eckes case on the facts, stating that there was not nearly as much copying of the creative portions of the directory. (84)

Both Eckes and Key Publications were appropriately found to belong in the upper right quadrant. They involved creative compilations of non-creative works. However, it is important to understand that the copyright protection afforded such compilations is very thin. In Eckes, the defendant copied a significant portion of the creative selection of the data

In CCC Information Services, Inc. v. Maclean Hunter Market Reports, Inc., (85) the Second Circuit focused on a database containing used car valuations. The court examined the originality of not only the selection and arrangement of the data, but also of the valuations themselves. It held that both were sufficiently original to warrant copyright protection. (86) The database was a creative compilation of works that were themselves original creations and, therefore, protected by copyright law. Accordingly, this case belongs in the upper left quadrant.

Other circuits also have addressed these issues. In another case involving the upper left quadrant, CDN Inc. v. Kapes, (87) the Ninth Circuit found that the prices of coins in a price guide were sufficiently original to warrant copyright protection. (88) The court agreed with the district court’s determination that the prices in the guide were not merely facts, but rather were “wholly the product of [plaintiff’s] creativity.” (89)

BellSouth Advertising & Publishing Corp. v. Donnelley Information Publishing, Inc. (90) involved another dispute between publishers of competing Yellow Pages. The parties stipulated that BellSouth’s directory qualified for copyright protection as a compilation. (91) After discussing Feist and Key Publications, the Eleventh Circuit reversed the district court’s grant of summary judgment for BellSouth, and instead granted summary judgment for Donnelley. (92) The court stated: “By copying the name, address, telephone number, business type, and unit of advertisement purchased for each listing in the [BellSouth] directory, Donnelley copied no original element of selection, coordination or arrangement.” (93)

The holding in BellSouth is particularly relevant for electronic databases today. While the selection, coordination, or arrangement of the facts might give rise to some degree of copyright protection, it will not extend to the underlying facts themselves. In other words, the copyright protection afforded a creative compilation of noncreative facts is very thin.

The Eleventh Circuit faced a similar situation in Warren Publishing Inc. v. Microdos Data Corp. (94) Warren published a Television & Cable Factbook. It alleged that Microdos’s competing directory infringed the 1) format of the data fields, 2) the coordination and arrangement of these fields, and 3) the selection of the community categories. (95) The district court granted partial summary judgment, holding that 1) the data fields were not sufficiently original to warrant copyright protection, 2) the coordination and arrangement of the fields was sufficiently original, but that Microdos’s coordination and arrangement was not substantially similar, and 3) the selection of the community categories was sufficiently original, and Microdos’s selection was substantially similar. (96) Therefore, the district court granted a permanent injunction against Microdos on the basis of this third finding. (97)

The Eleventh Circuit, noting that the district court did not have the benefit of its BellSouth decision, (98) reversed the third finding. (99) The court explained that copyright protection for a compilation of facts is very thin, and that there is infringement only when the selection, coordination, or arrangement is copied, not when merely the factual material is copied. (100) The court held that Warren’s selection of which community headings to use was not sufficiently original to warrant protection in the first place. (101) Warren used only whatever geographical description the individual cable companies told it to use. Warren “did not exercise any creativity or judgment in `selecting’ cable systems to include in the Factbook, but rather included the entire relevant universe known to it.” (102) The court held:

Simply because Warren may have been the first to discover and report a

certain fact on a cable system does not translate these facts of discovery

into acts of creation entitled to copyright protection … “Just as the

Copyright Act does not protect `industrious collection,’ it affords no

shelter to the resourceful, efficient, or creative collector.” (103)

In two prominent cases involving West Publishing and its publication of court decisions, the Second Circuit explored in detail the issue of which elements of a compilation are entitled to copyright protection and which are not. The court basically had to decide whether the cases belonged in the upper or lower right quadrants. Both cases were captioned Matthew Bender & Co. v. West Publishing Co. (104) In the first case, (105) the court held that only those elements that are original are entitled to copyright protection, and that originality is dependent upon a showing of a modicum of creativity. It stated that court opinions are themselves factual, and therefore part of the public domain. (106) It held that while some of the information that West adds to the opinions is original, for example, the syllabus, the headnotes, and the key numbers, (107) other information is not

The West cases are significant because they deal with public domain material, not just facts. But just like facts, the act of collecting and compiling them does not transform them into a copyrightable product. As the Supreme Court observed in Feist, “[c]ommon sense tells us that 100 uncopyrightable facts do not magically change their status when gathered in one place.” (112)

Applying this legal analysis to the Vincent van Gogh Web sites, there can be no doubt that there is no protection for the individual elements involved, i.e., the images containing van Gogh’s public domain paintings, drawings, watercolors, and sketches. While the creator of a Web site certainly has copyright protection for the original parts of her design, there is very little protection for the “facts.” Unless she adds enough to the original to be considered a derivative work, which is unlikely for the art reproductions, but was apparently accomplished for the translation of the letters, she cannot prevent the copying of works already in the public domain. As discussed above, the public is entitled to, and must have, free access to this material. (113) A copyright interest in the compilation of such public domain material, i.e., a Web site, does not bootstrap protection for the individual components.

V. PROTECTING DATABASES UNDER STATE LAW

A. The Issue of Preemption

A number of cases have attempted to protect the contents of databases (particularly electronic ones) under legal theories other than copyright. (114) They have met with mixed results. The biggest challenge facing a state law claim is surviving preemption under Section 301 of the 1976 Act, which provides, in pertinent part:

(a) On and after January 1, 1978, all legal or equitable rights that are

equivalent to any of the exclusive rights within the general scope of

copyright as specified by section 106 in works of authorship that are fixed

in a tangible medium of expression and come within the subject matter of

copyright as specified by sections 102 and 103, whether created before or

after that date and whether published or unpublished, are governed

exclusively by this title. Thereafter, no person is entitled to any such

right or equivalent right in any such work under the common law or statutes

of any State.

(b) Nothing in this title annuls or limits any rights or remedies under the

common law or statutes of any State with respect to–

(1) subject matter that does not come within the subject matter of

copyright as specified by sections 102 and 103, including works of

authorship not fixed in any tangible medium of expression

(3) activities violating legal or equitable rights that are not equivalent

to any of the exclusive rights within the general scope of copyright as

specified by section 106. (115)

Under this provision, courts have held that a state common law or statutory claim is preempted if the work is within the scope of the subject matter of copyright, and if the rights granted under state law are equivalent to any of the exclusive rights of a federal copyright. (116) In Computer Associates International, Inc. v. Altai, Inc., (117) the Second Circuit held that “Section 301 thus preempts only those state law rights that may be abridged by an act which, in and of itself, would infringe one of the exclusive rights provided by federal copyright law.” (118) The court enunciated the so-called “extra element” test:

But if an “extra element” is “required instead of or in addition to the

acts of reproduction, performance, distribution or display, in order to

constitute a state-created cause of action, then the right does not lie

`within the general scope of copyright,’ and there is no preemption”…. A

state law claim is not preempted if the “extra element” changes the “nature

of the action so that it is qualitatively different from a copyright

infringement claim.” (119)

The court noted that under the “extra element” test, it had previously preempted unfair competition and misappropriation claims grounded solely in the copying of protection expression, and preempted a tortious interference with contract claim grounded in the impairment of a plaintiff’s right under the Copyright Act to publish derivative works. (120) It also noted that other unfair competition claims based upon breach of confidential relationship, breach of fiduciary duty, and trade secrets, had, however, survived preemption under section 301. (121) Probably the hardest task facing a court with a preemption challenge is determining whether the state claim requires such an “extra element.”

In order for a state law claim to successfully survive a copyright preemption challenge, some “extra element” sufficient to distinguish it from the kind of protection afforded by the copyright law needs to be shown. (122) Few attempts have met with success.

B. Contract Cases

Besides misappropriation and unfair competition, other common law claims include contract and trespass. In ProCD v. Zeidenberg, (123) the plaintiff compiled and sold a CD-ROM telephone directory containing listings from over 3,000 print directories. The defendant bought a copy of the consumer version of the CD-ROM, extracted the listings from the disk, and created a Web site where he sold access to those names and numbers. Rather than pursue a (probably unsuccessful) copyright infringement claim, (124) the plaintiff sued the defendant alleging breach of the terms of the license agreement, which prohibited any commercial use of the product. (125) The court found for the plaintiff, holding “shrinkwrap licenses” enforceable under Wisconsin law (126) and not preempted by the Copyright Act. (127) The court noted that a function of preemption is “to prevent states from giving special protection to works of authorship that Congress has decided should be in the public domain.” (128) The court distinguished, however, between the rights granted by contract and those protected by copyright law: “Copyright law forbids duplication, public performance, and so on…. A copyright is a right against the world. Contracts, by contrast, generally affect only their parties

Both of these findings are questionable. First, there has been much controversy over the enforceability of “shrinkwrap licenses”. (130) They are only enforceable in some states. (131) Second, it is questionable whether state contact law can, in effect, give copyright-like protection to otherwise non-protectable “facts” merely by distinguishing the type of use, i.e., commercial vs. noncommercial. (132) The court in Zeidenberg basically held that such a distinction made a qualitative difference in the protection given, and was, therefore, an appropriate “extra element.” (133) In effect, what the court did was transform the contractual relationship between the parties into a trust or fiduciary relationship. (134) It is doubtful that this approach will be widely followed, particularly in cyberspace, where parties typically deal with each other at much greater than arm’s length. (135)

With somewhat similar facts, the District Court for the Southern District of New York, in Matthew Bender & Co. v. Jurisline.com, (136) granted a motion to remand a case to state court for consideration of fraud and breach of contract claims. The plaintiff sought to protect its database of uncopyrightable court decisions by enforcing a shrinkwrap license under which the defendant had agreed not to make use of the data for commercial purposes. (137) The court rejected the defendant’s assertion that it should retain jurisdiction over the case because of the preemption argument, holding that the fraud and breach of contract claims sought protection that was not the equivalent of the rights granted under copyright law. (138) The court pointed out in a footnote that it was not ruling on whether the shrinkwrap license was valid and binding. (139)

Even if such a license agreement is deemed enforceable, it remains to be seen how far the courts will go in distinguishing between the rights granted by the copyright law in the underlying work and the rights, specified by contract, in how “facts” can be used. As discussed above, the copyright system rewards an author for his or her creative work, but then requires that the work become part of the public domain after expiration of the term of protection. (140) Similarly, if a work is determined not to qualify for copyright protection because of lack of originality, the copyright law should preempt any other law from providing equivalent protection

C. Trespass to Personal Property

Two California cases have explored another possible avenue for protection of online databases. In eBay, Inc. v. Bidder’s Edge, Inc., (143) the District Court for the Northern District of California granted eBay’s request for a preliminary injunction on a claim of trespass to personal property. (144) The court held that eBay would likely succeed on its trespass claim, finding that it would be able to establish that the defendant intentionally and without authorization interfered with its possessory interest in its computer system, and that eBay was thereby damaged. (145) The court noted that the injunction prohibited the defendant from automatically querying eBay’s site

The court rejected the defendant’s argument that the Copyright Act preempted the trespass claim. (147) It held that the “right to exclude others from using physical personal property is not equivalent to any other rights protected by copyright and therefore constitutes an extra element that makes trespass qualitatively different from a copyright infringement claim.” (148)

Shortly after the eBay case, another California district court entertained a similar trespass claim. In Ticketmaster Corp. v. Tickets.com, Inc., (149) one of Ticketmaster’s claims against the defendant was for trespass. The District Court for the Central District of California discussed favorably the trespass theory presented in eBay, but refused to grant a preliminary injunction, holding that there was insufficient proof of enough interference with the plaintiff’s property to satisfy the requirements for trespass. (150) While the defendant often accessed Ticketmaster’s site, there was no proof that it interfered to any extent with Ticketmaster’s regular business. (151) Had there been more evidence of interference with plaintiff’s business, as was the case in eBay, the court appeared ready to enjoin such use under a trespass theory. (152)

The trespass theory appears to be a novel way to limit access to information. However, as these two cases illustrate, unless there is a considerable, quantifiable, and detrimental toll taken on one’s personal property (e.g., one’s Web server), the theory will be of limited value.

D. Misappropriation

Another legal theory that has gotten some attention is misappropriation. In NBA v. Motorola, Inc., (153) the Second Circuit reversed a permanent injunction against Motorola that had been granted on that basis. The National Basketball Association wanted to stop the sale by Motorola of hand-held pagers that received updated scores and statistics taken from television and radio broadcasts of NBA games in progress. The state misappropriation claim was based on the “hot-news” doctrine enunciated in an old Supreme Court case, International News Service v. Associated Press. (154) In that case, the Associated Press was able to prevent the International News Service from intercepting and copying its news articles transmitted by wire under a common law misappropriation theory. At the time, there was no federal copyright interest in such transmission. However, since 1976, copyright law specifically covers simultaneously recorded transmissions of live performances and sporting events. (155) Thus, the NBA’s radio and television broadcasts of its games are protected by copyright, but the games themselves, and the scores and statistics they generate, are not. (156) The court held that the copyright law preempts the NBA’s misappropriation claim, and that only a “narrow `hot news’ misappropriation claim survives preemption for actions concerning material within the realm of copyright.” (157) Specifically, the court held that the central elements of an INS misappropriation claim are:

(i) the plaintiff generates or collects information at some cost or

expense,

(ii) the value of the information is highly time-sensitive,

(iii) the defendant’s use of the information constitutes free-riding on the

plaintiff’s costly efforts to generate or collect it,

(iv) the defendant’s use of the information is in direct competition with

a product or service offered by the plaintiff,

(v) the ability of other parties to free-ride on the efforts of the

plaintiff would so reduce the incentive to produce the product or

service that its existence or quality would be substantially

threatened. (158)

The court held that the NBA had satisfied only the first two elements of the INS test. (159) It found that the NBA failed to show that the defendant was free-riding, because the defendant compiled its own scores and statistics of the games, and that the NBA failed to show any direct competition with its primary products, the playing of the games for live attendance and the licensing of broadcasts of the games. (160)

The court also discussed with favor the similar holding of the Zeidenberg case, which held that a function of the copyright preemption statute is to “prevent states from giving special protection to works of authorship that Congress has decided should be in the public domain.” (161) The court concluded that the copyright law preempted the NBA’s misappropriation claim. (162)

Because of its long history, the misappropriation doctrine might very well be successfully applied to electronic or online databases. However, its application would be severely limited to those situations falling within the “hot news” exception. While some online databases might satisfy all five requirements, the biggest hurdle will be proof of the time-sensitive nature of the content. In situations where the database contents were time-sensitive, it is quite conceivable that the other elements could be readily satisfied. (163) Absent the element of time-sensitive data, however, it would be unlikely that there would be a sufficient “extra element” to distinguish the protection afforded by a misappropriation claim from that provided under the copyright law. (164)

While the rational enunciated in INS, that one should not “reap where [one] has not sown,” still may be sound, it is inconsistent with the protection provided under the copyright law if one is reaping merely (unprotectable) facts. (165) If a database contains merely facts, those facts are not protected by copyright, regardless of whether the database is found online or in a traditional place.

VI. THE EUROPEAN UNION DATABASE DIRECTIVE

While the United States struggles with the protection of databases, the European Union has already adopted a Directive on Legal Protection of Databases. (166) The Directive provides that “databases which, by reason of the selection and arrangement of their contents, constitute the author’s own intellectual creation shall be protected as such by copyright.” (167) This is similar to U.S. law. However, it also provides a sui generis right that protects the contents of a database that may or may not exhibit such creative arrangement or selection. (168) The maker of a database can prevent the “extraction and/or re-utilization of the whole or of a substantial part” of a database, as long as the maker can show that there has been “qualitatively and/or quantitatively a substantial investment in either the obtaining, verification or presentation of the contents.” (169) This rewards precisely the “sweat of the brow” that Feist eliminated. This sui generis protection lasts for fifteen years, and starts anew if the database is substantially changed. (170) The protection is available primarily to makers of databases in Member States, and only on a reciprocal basis. (171)

While there was understandably great concern about the potentially unfair advantages afforded to European database producers, there has not been much of a problem because of: (1) reluctance by several Member States to enact legislation

While some of the European courts that have interpreted the new laws have found protection for “sweat of the brow” databases, others have been reluctant to expand the protection much further than traditional U.S. copyright law. (176) An appellate court in a recent British case has referred the matter to the European Court of Justice (ECJ) for clarification of several issues. (177) The court had specifically recognized that decisions of some other Member States, specifically Sweden and the Netherlands, had adopted a narrower approach to database rights than had England, and wanted guidance from the ECJ. (178)

Many of the European cases involved “synthetic data,” data that is produced by the database owner itself and is incapable of collection by independent research, such as telephone listings, sporting event dates, concert times, and broadcast schedules. (179) Some Dutch courts have denied protection to such databases on the basis that there was not a “substantial investment,” as required by the Directive because this information had to be created anyway in conjunction with the non-database activities of the business. (180)

Another familiar theme in many of the European cases was “deep linking,” where one Web site linked directly to data contained within another Web site, bypassing that site’s home page. (181) These cases often focused on the loss of advertising revenue suffered by the site whose banner ads on the home page were bypassed, with some courts finding infringement, and some not. (182) Courts in the Member States will anxiously await the decision of the ECJ.

VII. U.S. LEGISLATIVE RESPONSES

Not surprisingly, after the Directive was adopted in Europe, there were attempts to pass similar legislation in the United States. Bills were introduced in the 104th, (183) 105th, (184) and 106th (185) Congresses, but none were passed. The 105th Congress came close to passing one of the bills, as part of the Digital Millennium Copyright Act, but the database provisions were removed at the last minute after the Department of Commerce, the Department of Justice, and the Federal Trade Commission voiced concern. (186)

A memorandum from the Department of Justice addressed: 1) whether the bill [House Bill 2652] would constitute a valid exercise of Congress’s power under the Intellectual Property Clause

One state is even considering passing a database protection bill. The Georgia Senate unanimously passed a bill in 2001 that is very similar in nature to the European Union Directive and the various bills proposed in Congress. (191) It would essentially prevent the extraction of data from a database for use in commerce. The bill was held over to the 2002 session and assigned to a special judiciary subcommittee. However, it will be even more difficult for a state to pass such legislation than for Congress. While federal legislation would have to overcome the Intellectual Property Clause/Commerce Clause/First Amendment battles, (192) state legislation would have to be drawn extremely narrowly in order to avoid a successful federal preemption challenge. (193)

The sui generis protection provided by the European Union and proposed in various bills in Congress is inappropriate for the United States. The Constitution clearly specifies both the purpose of the copyright law (“to promote the progress of science and the useful arts”), and the means by which to accomplish that goal (“by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries”). (194) There has been great reluctance to enact legislation that would so dramatically alter basic principles of copyright law. Furthermore, it is unlikely that such sui generis protection would be authorized under the Commerce Clause, or be able to survive a First Amendment challenge. (195)

VIII. CONCLUSION

Legal theories in contract, trespass, or misappropriation may be able to coexist with copyright law. However, because preemption will not permit these theories to circumvent equivalent rights provided by copyright law, the application of these theories will remain very limited in scope. In order for a contractual provision to withstand preemption, it must provide protection that is different from that afforded by copyright law. This will be very difficult to do for the content of databases of non-creative works. Furthermore, such a contractual provision also may be subject to challenge if it comes as part of a shrinkwrap or clickwrap license, as probably would be the case in an online or electronic transaction. Trespass and misappropriation theories may have a better chance of surviving preemption challenges, but are typically so narrow as to provide very little protection.

The main purpose of the copyright system is “to promote the progress of science and the useful arts.” (196) This is accomplished largely by encouraging the free flow of information and ideas. (197) The system rewards originality and creativity by giving the author a limited monopoly for a specific period of time. After this time, the work becomes part of the public domain. If a work does not qualify for protection because it lacks the requisite originality and creativity, it also becomes part of the public domain. Digital technology and the Internet have certainly changed the mechanics of copying, but they should not be used to justify a deviation from these basic principles. Neither copyright law nor any other legal theory should be permitted to impede this “life blood of a free society.” (198)

Table 1

Creative Works Non-Creative Works

(constituent (constituent

materials materials not

copyrightable) copyrightable)

Creative * Compilation * Compilation

Compilation Protected because Protected because

of Creative and as Creative

“Collective Work” * E.g., Yellow Pages for

* E.g., CD-ROM of Chinatown

Copyrighted * E.g., Baseball Card

Cartoons Price Guide

* E.g., New York Times

Web Site of

Photographs

Non-Creative * Compilation * Compilation Not

Compilation Protected as Protected

of “Collective Work” * E.g., Alphabetical

* E.g., Complete Telephone Directory

Works CD of * E.g., Complete Works

Copyrighted Songs of Shakespeare

* E.g., Journal Issue of

Scholarly Articles

(1) Nancy Matsumoto, When the Art’s Public, Is the Site Fair Game?, N.Y. TIMES, May 17, 2001, at G6.

(2) The Vincent van Gogh Gallery, at http://www.vaslgoghgallery.com (last visited Mar. 14, 2002).

(3) About Van Gogh Art, at http://www.about-van-gogh-art.com (last visited Mar. 14, 2002).

(4) Matsumoto, supra note 1, at G6.

(5) Id.

(6) The letters were removed from the About Van Gogh Art Web site. Id.

(7) 17 U.S.C. [subsection] 101,103(b) (2001).

(8) The present duration of a copyright in the United States for a natural person is life of the author (artist) plus seventy years. 17 U.S.C. [section] 302. While this duration has varied over the years, there is no question that the works of van Gogh, all created over 100 years ago, have long since entered the public domain.

(9) A search of the name “van Gogh” on the Yahoo! search engine returns over seventy matching Web sites, most of which contain paintings, drawings, and other works of van Gogh, at http://www.yahoo.com/ (last visited Mar. 14, 2002).

(10) U.S. CONST. art. I, [section] 8, cl. 8.

(11) The drafters of the Intellectual Property Clause were greatly influenced by the language from the title to the Statute of Anne, the English Copyright Act of 1710: “An act for the encouragement of learning, by vesting copies of printed books in authors or purchasers of such copies during the times therein mentioned.” Copyright Act, 1710, 8 Ann., c. 19 (Eng.). Professor L. Ray Patterson describes in great detail the probable origin of the Intellectual Property Clause, and the implications of the words and phrases that were included and those that were excluded. See L. Ray Patterson, Copyright Overextended: A Preliminary Inquiry into the Need for a Federal Statute of Unfair Competition, 17 DAYTON L. REV. 385,396-403 (1992). Also significant, and explained in great detail by Professor Patterson, is the fact that two types of copyrights had evolved under English law: a statutory copyright and a common law copyright. The former focused on the rights of the copyright owner to publish and sell the book. These rights lasted only for a finite period of time. The latter focused on a natural law theory under which the author was entitled to a property right in his work that would, theoretically, last forever. This common law copyright was modified, however, by case law that recognized this property interest only until the work was published (at which time the statutory copyright would come into play). Patterson surmises that the Founding Fathers were well aware of the two different types of copyrights under English law, and chose the statutory approach, rather than recognize a property-like interest in the author. Id. at 401-03

(12) In Suntrust, the court stated the copyright laws were enacted to achieve “three main goals: the promotion of learning, the protection of the public domain, and the granting of an exclusive right to the author.” 268 F.3d at 1261.

The second goal of the Copyright Clause is to ensure that works enter the

public domain after an author’s rights, exclusive, but limited, have

expired…. The public is protected in two ways: the grant of a copyright

encourages authors to create new works … and the limitation ensures that

the works will eventually enter the public domain, which protects the

public’s right of access and use.

Id. at 1262.

(13) See Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417 (1984). The Supreme Court held that the sale of home videotape recorders was not a contributory infringement because many of the copyright owners of programs broadcast over the airwaves would not object to the mere “time-shifting” of the recorded programs. Id. at 429. In discussing the purpose of the Intellectual Property Clause, the Court stated:

The monopoly privileges that Congress may authorize are neither unlimited

nor primarily designed to provide a special private benefit. Rather, the

limited grant is a means by which an important public purpose may be

achieved. It is intended to motivate the creative activity of authors and

inventors by the provision of a special reward, and to allow the public

access to the products of their genius after the limited period of

exclusive control has expired.

Id. The court then emphasized the benefits to the public:

The copyright law, like the patent statutes, makes reward to the owner a

secondary consideration. In Fox Film Corp. v. Doyal, 286 U.S. 123, 127

[1932], Chief Justice Hughes spoke as follows respecting the copyright

monopoly granted by Congress, “The sole interest of the United States and

the primary object in conferring the monopoly lie in the general benefits

derived by the public from the labors of authors.” It is said that reward

to the author or artist serves to induce release to the public of the

products of his creative genius. United States v. Paramount Pictures, Inc.,

334 U.S. 131, 158 (1948).

Id.

(14) Copyright Act, ch. 15, 1 Stat. 124 (1790).

(15) Copyright Act, ch. 36, 2 Stat. 171-72 (1802).

(16) Copyright Act, ch. 16, 4 Stat. 436-39 (1831).

(17) Copyright Act, ch. 169, 11 Stat. 138-39 (1856).

(18) Copyright Act, ch. 126, 13 Stat. 540-41 (1865).

(19) Copyright Act, ch. 230, 16 Stat. 212-17 (1870).

(20) 17 U.S.C. [section] 1 (1909)(repealed 1978).

(21) Copyright Act, 90 Stat. 2541 (1976) (current version at 17 U.S.C. [section] 101 (2001)).

(22) 17 U.S.C. [section] 102 (200t).

(23) Id.

(24) See Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 350-60 (1991)

(25) 17 U.S.C. [section] 5(a) (1909) (repealed 1978).

(26) Feist, 499 U.S. at 352.

(27) Id. at 352-56.

(28) Section 103 reads:

Subject matter of copyright: Compilations and derivative works.

(a) The subject matter of copyright as specified by section 102 includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.

(b) The copyright in a compilation or derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material. The copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material.

17 U.S.C. [section] 103 (2001).

(29) 17 U.S.C. [section] 101.

(30) Id.

(31) Section 101 defines a “collective work” as a compilation “such as a periodical issue, anthology, or encyclopedia, in which a number of contributions, constituting separate and independent works in themselves, are assembled into a collective whole.” Id.

(32) Id.

(33) 17 U.S.C. [section] 103(b).

(34) 17 U.S.C. [section] 102.

(35) Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 355-56 (1991). The Court quoted from House and Senate reports stating that “Section 102(b) in no way enlarges or contracts the scope of copyright protection under the present law. Its purpose is to restate … that the basic dichotomy between expression and idea remains unchanged.” Id.

(36) 17 U.S.C. [section] 3 (1909) (repealed 1978).

(37) Feist, 499 U.S. at 355-56.

(38) Id.

(39) Id.

(40) Contributions to collective works.

Copyright in each separate contribution to a collective work is distinct

from copyright in the collective work as a whole, and vests initially in

the author of the contribution. In the absence of an express transfer of

the copyright or of any rights under it, the owner of copyright in the

collective work is presumed to have acquired only the privilege of

reproducing and distributing the contribution as part of that particular

collective work, any revision of that collective work, and any later

collective work in the same series.

17 U.S.C. [section] 201(c) (2001).

(41) 17 U.S.C. [section] 301(a)(b)

(42) Pub. L. No. 105-298, 112 Stat. 2827 (1998) (codified at 17 U.S.C. [subsection] 301-04). See Eldred v. Ashcroft 239 F.3d 372 (D.C. Cir. 2001), reh’g denied, 255 F.3d 849, cert. granted, 70 U.S.L.W. 3514 (U.S. Feb. 19, 2002) (No. 01-618) (action seeking, among other things, a declaratory judgment to hold unconstitutional the extension of copyright terms under the Copyright Extension Act).

(43) L. Ray Patterson, Copyright in the New Millennium: Resolving the Conflict between Property Rights and Political Rights, 62 OHIO ST. L.J. 703,706-07 (2001) (questioning how the public interest is served by increasing the copyright term to the life of the author plus seventy years)

(44) Compare United Tel. Co. of Mo. v. Johnson Pub’g Co., 855 F. 2d 604. (8th Cir. 1988) (finding a copyright infringement for copying portions of a white page phone directory), with Eckes v. Card Prices Update, 736 F.2d 859 (2d Cir. 1984) (finding sufficient originality to warrant copyright protection for a baseball card price guide, and finding copyright infringement because of sufficient evidence of substantial similarity), For a discussion of Eckes, see infra notes 75-78 and accompanying text.

(45) 499 U.S. 340 (1991). Because of the significance of the Court’s rejection of the “sweat of the brow” theory, Professor Patterson states that Feist may well be the Court’s most important copyright decision since its first, Wheaton v. Peters, 33 U.S. (8 Pet.) 591 (1834). Patterson, supra note 11, at 3137.

(46) 499 U.S. at 343-44.

(47) Id. at 344.

(48) Id. at 362-64.

(49) Id

(50) Id. at 362

(51) 499 U.S. at 344-45.

(52) Id. at 349-51.

(53) Id. at 359-60.

(54) Id. at 349.

(55) Id. (citations omitted).

(56) See Patterson, supra note 11, at 404-07, in which the author criticizes a variety of legal fictions that have extended copyright protection from “original works of authorship” to things like “computer databases containing factual material.” Patterson refers to these copyrights as “neo-copyrights”–“works of low authorship granted without: regard to constitutional copyright policies.” Patterson, supra note 11, at 386 (footnote omitted).

(57) See general LAWRENCE LESSIG, CODE AND OTHER LAWS OF CYBERSPACE (1999) (discussing the evolution of cyberspace, and the interplay of code and law, how they impact each other with regard to the regulation and growth of cyberspace).

(58) In addition to the question concerning copyright protection for databases, there have been numerous copyright concerns related to cyberspace and the Internet. Among some of the more notable cases are A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001) (addressing questions concerning the “sharing” of copyrighted songs over the Internet)

(59) See LESSIG, supra note 43. Professor Lessig contends that new, restrictive intellectual property laws have strangled the creativity and innovation that was the hallmark of the early days of the Internet.

(60) 17 U.S.C. [section] 101 (2001)

(61) See supra notes 28-40 and accompanying text.

(62) Id.

(63) See New York Times v. Tasini, 533 U.S. 483, 121 S. Ct. 2381 (2001). The Supreme Court held that magazines and newspapers cannot include, in electronic databases, articles written by freelance writers without additional permission or assignment from the author. The Court held that under the Copyright Act, the author retains his or her rights to the individual contribution (unless, of course, he or she assigns them), and the publisher of the collective work has only the privilege of reproducing the individual work as part of the whole collective work. Id. at 2394. The publishers had contended that inclusion in the electronic database was merely a revision of the collective work, as specified in the statute. Id. at 2390. The Court disagreed, holding that the individual article appeared in the database entirely independent from the collective work and was not a revision at all. It held that the author still retained his rights in that independent work. Id. at 2392.

(64) See 17 U.S.C. [subsection] 103,201(c). It is worth noting at this point that such a “non-creative compilation” of a “creative work” falls within the definition of a “collective work” because its contributions constitute separate and independent works themselves, but would not fit with the definition of a “compilation” because of the absence of preexisting materials that are selected, coordinated, or arranged in such a way that the resulting work would constitute an original work of authorship (i.e., no creative spark) were it not for the last sentence of the definition that specifically includes collective works as a “compilation.” Id. [section] 101. This is significant because only “compilations,” and not “collective works,” are included within the subject matter of copyrights. Id. [section] 103.

(65) See Key Pub’ns, Inc. v. Chinatown Today Publ’g Enters., Inc., 945 F. 2d 509 (2d Cir. 1991) (finding a copyright interest in the yellow pages directory, but not finding sufficient evidence of substantial similarity in the allegedly infringing directory)

(66) See Eckes v. Card Prices Update, 736 F. 2d 859 (2d Cir. 1984) (a pre-Feist case that would be decided the same, wherein the court found sufficient originality to warrant copyright protection for a baseball card price guide, and found copyright infringement because of sufficient evidence of substantial similarity)

(67) See supra notes 51-56 and accompanying text (discussing Feist).

(68) 17 U.S.C. [section] 101.

(69) See infra notes 72-113 and accompanying text.

(70) See supra notes 45-56 and accompanying text.

(71) Id.

(72) E.g., Key Publ’ns, Inc. v. Chinatown Today Pub’g Enters., Inc., 945 F.2d 509, 513 (2d Cir. 1991) (finding sufficient originality in the selection, coordination or arrangement of the listings in the Yellow Pages directory to entitle it to copyright protection). For a further discussion of Key Publications, see infra notes 79-84 and accompanying text.

(73) E.g., Key Publ’ns, 945 F.2d at 515-16 (comparing the two Yellow Pages directories, and holding that there was not infringement because the two directories were not substantially similar). For a further discussion of Key Publications, see infra notes 79-84 and accompanying text.

(74) It should not be surprising that many of these cases have come from the Second Circuit because of the large presence in New York of the publishing industry.

(75) 736 F. 2d 859 (2d Cir. 1984). The defendant published a competing baseball card guide that contained almost exactly the same 5,000 cards that were deemed “premium” by the plaintiff. The court noted that there were many instances of unusual spellings of certain names in the plaintiff’s checklist that were repeated in the defendant’s guide.

(76) Id. at 863.

(77) Id. at 863-64.

(78) Id. at 864.

(79) Key Publ’ns, Inc. v. Chinatown Today Pub’g Enters., Inc., 945 F. 2d 509 (2d Cir. 1991). In addition to predictable categories, such as Accountants and Bridal Shops, there were ones, like Bean Curd & Bean Sprout Shops, that were particularly geared towards the Chinese community to which the directory was aimed.

(80) Id. at 513-14.

(81) Id. at 515-16.

(82) Id. at 516.

(83) Id.

(84) Id. at 516-17.

(85) 44 F. 3d 61 (2d Cir. 1994), cert. denied, 516 U.S. 817 (1995).

(86) Id. at 67-68.

(87) 197 F. 3d 1256 (9th Cir. 1999).

(88) Id. at 1259.

(89) Id. at 1260.

(90) 999 F. 2d 1436 (11th Cir. 1993) (en banc), cert. denied, 510 U.S. 1101 (1994).

(91) Id. at 1438.

(92) Id. at 1446.

(93) Id.

(94) 115 F. 3d 1509 (11th Cir. 1997).

(95) Id. at 1513.

(96) Id. at 1513-14.

(97) Id. at 1514.

(98) Id. at 1511 n.2.

(99) Id. at 1513.

(100) Warren, 115 F.3d at 1515.

(101) Id. at 1517-19.

(102) Id. at 1518. Ironic as it may seem, an argument can be made that the more comprehensive the compilation of data, the less likely that there will be protection from copyright law. If the selection or arrangement of data is merely the inclusion of the entire relevant universe, there is arguably very little or no “creativity” involved. This would likely result in very thin or no copyright protection for such a compilation. See Richard L. Stone & John D. Pernick, Protecting Databases: Copyright? We Don’t Need No Stinkin’ Copyright, 16 COMPUTER L. 17, 17 (1999).

(103) Warren, 115 F.3d at 1520.

(104) 158 F.3d 674 (2d Cir. 1998)

(105) 158 F.3d 674 (2d Cir. 1998).

(106) Id. at 679.

(107) Id. at 676-77.

(108) Id. at 683-84.

(109) Id. at 684-85.

(110) Id. at 685-88.

(111) 158 F.3d 693 (2d Cir. 1998).

(112) Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345 (1991).

(113) See supra note 12 and accompanying text.

(114) ProCD v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996) (contractual restriction in shrinkwrap license)

(115) 17 U.S.C. [section] 301 (2001) (emphasis added).

(116) See United States ex rel. Berge v. Bd. of Trs., 104 F.3d 1453 (4th Cir. 1997) (state conversion claim preempted by copyright law)

(117) 982 F.2d 693 (2d Cir. 1992). Computer Associates (CA) had sued Altai for copyright infringement and trade secret misappropriation. The district court found that Altai had infringed one version of CA’s program, but not another. It also held that copyright law preempted the misappropriation claim. The appellate court affirmed the copyright holdings, but vacated the preemption ruling and remanded for further proceedings. Id. at 696-97.

(118) Id. at 716 (quotations omitted).

(119) Id.

(120) Id. at 717.

(121) Id.

(122) In many of the cases where a state claim was not preempted by Section 301, there was a required element of a breach of a confidential relationship or of a fiduciary duty, such as is often the case in a trade secret claim. See Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1549 (11th Cir. 1996) (state trade secret claim satisfies the “extra element” test)

(123) 86 F.3d 1447 (7th Cir. 1996).

(124) The data itself would not have been protected by copyright. Arguably, the compilation may have warranted some degree of protection, although the court noted early in its discussion that “[w]e may assume that this database cannot be copyrighted, although it is more complex, contains more information (nine-digit zip codes and census industrial codes), is organized differently, and therefore is more original than the single alphabetical directory in Feist.” Id. at 1449 (emphasis omitted).

(125) Id. at 1450.

(126) Id. at 1452-53.

(127) Id. at 1453-54.

(128) Id. at 1453.

(129) Id. at 1454.

(130) Since 1988, there have been questions about the validity and enforceability of shrinkwrap licenses. See Vault Corp. v. Quaid Software Ltd., 847 F.2d 255 (5th Cir. 1988) (first major case to invalidate a shrinkwrap license). Indeed, much of the controversy over the drafting of a proposed Article 2B of the Uniform Commercial Code and subsequent emergence of the Uniform Computer Information Transaction Act pertained to the validity and enforceability of shrinkwrap licenses. See Scott J. Spooner, The Validation of Shrink-Wrap and Click-Wrap Licenses by Virginia’s Uniform Computer Information Transactions Act, 7 RICH. J.L. & TECH. 27 (Winter 2001), at http://www.richmond.edu/jolt/v7i3/article1.html. These same questions are now arising in slightly different form in so-called “click-wrap” and “browse-wrap” license cases. In Specht v. Netscape Communication Corp., 150 F. Supp. 2d 585 (S.D.N.Y. 2001), the court refused to enforce the terms of “click-wrap” and “browse-wrap” licenses, which would have compelled arbitration of any dispute arising thereunder.

(131) See generally Brian D. McDonald, Contract Enforceability: The Uniform Computer Information Transactions Act, 16 BERKELEY TECH. LJ. 461 (2001).

(132) See 1 MELVILLE B. NIMMER & DAVID NIMMER, NIMMER ON COPYRIGHT [section] 3.04[B] [3] [a](1997).

(133) Zeidenberg, 86 F.3d at 1454.

(134) The court acknowledged that Congress is able to preempt even the enforcement of contracts pertaining to copyrights, but nonetheless concluded that private contracts were different. Id. at 1454. It seemed that the court stretched a great deal to try to reach some ground on which prior decisions had successfully withstood preemption challenges. See Altai, 982 F.2d 693

(135) In Specht, a district court in New York refused to enforce the terms of a “click-wrap” or “browse-wrap” license because it was not clear that the user even knew of the license provision or took any action to assent to it. 150 F. Supp. at 591-96.

(136) 91 F. Supp. 2d 677 (S.D.N.Y. 2000).

(137) Id. at 678.

(138) Id.

(139) Id. at678 n. 1.

(140) See supra note 12 and accompanying text.

(141) This position is supported by the legislative history. The House Report states:

As long as a work fits within one of the general subject matter categories

of sections 102 and 103, the bill prevents the States from protecting it

even if it fails to achieve Federal statutory copyright because it is too

minimal or lacking in originality to qualify, or because it has fallen into

the public domain.

H.R. REP. NO. 94-1476, at 131 (1976). See supra note 12 and accompanying text.

(142) See supra note 11 and accompanying text.

(143) 100 F. Supp. 2d 1058 (N.D. Cal. 2000). The defendant operated an aggregation Web site that collected information about various online auctions, eBay operates the largest online auction site. Naturally, the defendant was interested in obtaining as much information as possible from eBay. Accordingly, the defendant used automated robots to query eBay’s site about 100,000 times a day, accounting for 1.53% of the total activity on eBay’s site.

(144) Id. at 1073.

(145) Id. at 1069-72.

(146) Id. at 1073.

(147) Id. at 1072.

(148) Id.

(149) 2000 U.S. Dist. LEXIS 12987 (S.D. Cal. 2000). Ticketmaster is the largest online ticket seller. The defendant also sells some tickets online, but primarily provides information about concerts, including places, dates, times, and where to buy the tickets. If a user of the defendant’s site so desires, he or she can be linked directly to Ticketmaster’s site to buy tickets.

(150) Id. at * 14-18.

(151) Id. at * 17.

(152) Id. at * 18.

(153) 105 F.3d 841 (2d Cir. 1997). The National Basketball Association waited to stop the sale by Motorola of hand-held pagers that received updated scores and statistics taken from television and radio broadcasts of NBA games in progress.

(154) 248 U.S. 215 (1918).

(155) 105 F.3d at 845. See 17 U.S.C. [section] 101 (2001).

(156) 105 F.3d at 847.

(157) Id. at 852.

(158) Id. (citations omitted).

(159) Id. at 853-54.

(160) Id.

(161) Id. at 850.

(162) Id. at 854.

(163.) See supra note 158 and accompanying text.

(164) See Jane C. Ginsburg, Copyright, Common Law, and Sui generis Protection of Databases in the United States and Abroad, 66 U. CIN. L. REV. 151, 157-64 (1997).

(165) 248 U.S. 215,239 (1918). In describing the rationale of the Supreme Court in the INS case, Professor Patterson emphasized that the Court did not find copyright protection for the news content, but rather “the Court proceeded on the ground that the issue involved was not protection for the material, but protection for the service of transmitting the material to clients. The transmission, however, did not give the transmitter rights in the dispatches as against the public.” Patterson, supra note 43, at 730.

(166) Council Directive 96/9, 1996 O.J. (L 77) [hereinafter Directive].

(167) Id. art. 3.

(168) This protection is similar to that given by the copyright laws of Denmark, Finland, Iceland, Norway, and Sweden. The so-called “Nordic Catalogue Rule” provides protection for non-creative compilations of facts regardless of creativity or originality. See Michael J. Bastian, Note, Protection of “Noncreative” Databases. Harmonization of United States, Foreign and International Law, 22 B.C. INT’L & COMP. L. REV. 425, 438-439 (1999). Bastian also compares the copyright law in Japan and the United States to the sui generis protection under the Directive:

In Japan, the courts require more than originality and a modicum of

creativity in the selection or arrangement of its contents

require a modicum of novelty or “new thought.” This approach produces a

“hard to copyright” system. On the other hand, Japanese copyright, once

obtained, is “easy to infringe.” Compare this to the U.S. system. The U.S.

courts set a low threshold of originality and a modicum of creativity for

copyrightability. This produces an “easy to copyright” system. However,

this is counter-balanced by the “thin” protection the U.S. extends to

factual compilations, making databases “hard to infringe”…. Accordingly,

the “easy to protect/easy to infringe” system created by the EU for

databases is functionally incongruous with the Japanese “hard to

protect/easy to infringe” system and the United States’ “easy to

protect/hard to infringe” system.

Id. at 456-57 (footnotes omitted)

(169) Directive, supra note 166, art. 7.

(170) Id. art. 10.

(171) Id. art. 11.

(172) See P. Bernt Hugenholtz, The New Database Right: Early Case Law from Europe (Presentation at the Ninth Annual Conference on International IP Law & Policy, Fordham University School of Law) (Apr. 19-20, 2001), available at http://www.ivir.nl/publications/hugenholtz/fordham2001.html (stating that only Germany, Sweden, and the United Kingdom had met the January 1, 1998 deadline for implementation of the Directive, and that the European Commission brought proceedings against Greece, Ireland, Luxembourg, and Portugal before the ECJ for failure to implement the Directive).

(173) While the Directive requires a “substantial investment” by the database owner, measured either “qualitatively” or “quantitatively,” there is little guidance as to what minimal amount of investment is required. Id. Similarly, while the Directive prohibits reutilization of a “substantial” part of a database, there is no definition or quantification of this term. Id.

(174) Hugenholtz describes twenty-five cases from several different countries with some unusual findings. Id. For example, one French case did not apply the database right where there had been unauthorized use of a CD-ROM on a Web site, but another French case did apply the right, finding that telephone directories were databases, and that their unlicensed use online violated the law. Id. German cases held that a collection of online real estate advertisements, telephone directories, both electronic and non-electronic, and a list of 251 alphabetized links on a Web site were databases, but that a collection of online music files was not. Id.

(175) See Maurer, et al., supra note 174, at 790 (“Furthermore, the Council Directive contains a loophole: If a U.S. company wants database rights, it can get then by moving some of its operations to Europe or else by finding a local partner.”)

(176) For a discussion of some of these cases, see Hugenholtz, supra note 172, and see infra notes 179-82 and accompanying text.

(177) In British Horseracing Bd. Ltd. v. William Hill Organ. Ltd., Case No. CHANI/2001/0632/A3 (Sup. Ct. Jud., Ct. App., Jul. 31, 2001), available at http://www.courtservice.gov.uk/judgments/judg_home.htm, the Supreme Court of Judicature, Court of Appeal, referred the case to the ECJ for clarification of several points pertaining to the Directive. The British Horseracing Board [hereinafter BHB], the governing authority for British horseracing, sued William Hill, an online gambling establishment, for exceeding the scope of the licensed use of BHB’s database on William Hill’s Web site. The trial court, the High Court of Justice, Chancery Division, found for BHB, holding that BHB had a database right, and that William Hill had infringed it by extracting and reutilizing substantial parts of the database, and by repeatedly and systematically extracting and reutilizing insubstantial parts of it. See Revolution, supra note 174, at 20-22

It is not surprising that a British case is the first to go to the ECJ. The British had the strongest pre-Directive protection for non-creative databases (fifty years), and fought hardest for the sui generis protection. See W. Matthew Wayman, Comment, International Database Protection: A Multilateral Treaty Solution to the United States’ Database Dilemma, 37 SANTA CLARA L. REV. 427, 439-40 (1997)

(178) BHB v. William Hill, Case No. CHANI/2001/0632/A3.

(179) See Maurer, et al., supra note 174, at 789-90.

(180) Id.

(181) See Revolution, supra note 174, at 19

(182) For example, a German court found that deep links to a job recruitment Web site resulted in infringement of a database, but a Dutch court found that deep links to a collection of newspaper articles was not infringement because the collection of the headlines of the articles did not constitute a database. See Revolution, supra note 174, at 19.

(183) Database Investment and Intellectual Property Antipiracy Act of 1996, H.R. 3531, 104th Cong. (1996).

(184) Collections of Information Antipiracy Act, H.R. 2652, 105th Cong. (1997) [hereinafter House Bill 2652].

(185) Collections of Information Antipiracy Act, H.R. 354, 106th Cong. (1999) [hereinafter House Bill 354] and Consumer and Investor Access to Information Act, 15 H.R. 1858, 106th Cong. (1999).

(186) The House passed House Bill 2652 as a stand-alone bill, and then as part of the Digital Millennium Copyright Act (DMCA). However, it was dropped from the DMCA in the House-Senate conference before final approval. See Jonathan Band & Makoto Kono, The Database Protection Debate in the 106th Congress, 62 OHIO ST. L.J. 869, 872 (2001)

(187) Memorandum from William Michael Treanor, Deputy Ass’t. Att. Gen., Office of Legal Counsel, Dept. of Justice, to William P. Marshall, Associate White House Counsel (July 28, 1998), at http://www.acm.org/usacm/copyright/doj-hr2652-memo.html [hereinafter Treanor, Memorandum]

(188) Treanor, Memorandum, supra note 187

(189) Treanor, Memorandum, supra note 187.

(190) See supra notes 153-62 and accompanying text.

(191) Georgia Data Base Protection and Economic Development Act of 2001, S. 214 (2001).

(192) See supra notes 187-89 and accompanying text.

(193) See supra notes 114-65 and accompanying text.

(194) U.S. CONST. art. I, [section] 8, cl. 8. See supra notes 11-13, 187-89 and accompanying text.

(195) See supra notes 187-89 and accompanying text.

(196) U.S. CONST. art. I, [section] 8, cl. 8

(197) Professor Patterson states: “copyright is essentially the law of communication and communication is the life blood of a free society.” Patterson, supra note 43, at 731.

(198) Id. Patterson also observes:

The cost of disregarding the past will be the diminution of the right upon

which a free society depends, the freedom to learn, a right guaranteed by

the First Amendment and promoted by the Copyright Clause. Proprietary

rights in information and learning not only reduce free speech rights to

the status of an empty slogan, they also make a mockery of the limited

copyright monopoly that the framers empowered Congress to grant.

Id. at 732.

Jordan M. Blanke, Professor of Computer Information Systems and Law, Stetson School of Business & Economics, Mercer University.