Sie sind auf Seite 1von 38

United States Court of Appeals, Sixth with us in one form or another since 1790

Circuit. and grants copyright protection to “original


LEXMARK INTERNATIONAL, INC., works of authorship fixed in any tangible
Plaintiff-Appellee, medium of expression,”id.§ 102(a), but does
v. not “extend to any idea, procedure, process,
STATIC CONTROL COMPONENTS, INC., system, method of operation, concept,
Defendant-Appellant. principle, or discovery,”id.§ 102(b). The
No. 03-5400. second federal statute, the Digital Millenium
Copyright Act (DMCA), 17 U.S.C. §
Argued: Jan. 30, 2004. 1201et seq., was enacted in 1998 and
Decided and Filed: Oct. 26, 2004. proscribes the sale of products that may be
Rehearing Denied Dec. 29, 2004. used to “circumvent a technological measure
Rehearing En Banc Denied February 15, that effectively controls access to a work”
2005. protected by the copyright statute.

Before: MERRITT and SUTTON, Circuit These statutes became relevant to these
Judges; FEIKENS, District Judge.FN* computer programs when Lexmark began
selling discount toner cartridges for its
FN* The Honorable John Feikens, printers that only Lexmark could re-fill and
United States District Judge for the that contained a microchip designed to
Eastern District of Michigan, sitting prevent Lexmark printers from functioning
by designation. with toner cartridges that Lexmark had not
re-filled. In an effort to support the market
SUTTON, J., delivered the opinion of the for competing toner cartridges, Static
court. MERRITT, J. (pp. 551-53), delivered Control Components (SCC) mimicked
a separate concurring opinion. FEIKENS, Lexmark's computer chip and sold it to
D.J. (pp. 553-65), delivered a separate companies interested in selling
opinion concurring in part and dissenting in remanufactured toner cartridges.
part.
Lexmark brought this action to enjoin the
OPINION sale of SCC's computer chips and raised
three theories of liability in doing so.
SUTTON, Circuit Judge. Lexmark claimed that SCC's chip copied the
This copyright dispute involves two Toner Loading Program in violation of the
computer programs, two federal statutes and federal copyright statute. It claimed that
three theories of liability. The first computer SCC's chip violated the DMCA by
program, known as the “Toner Loading circumventing a technological measure
Program,” calculates toner level in printers designed to control access to the Toner
manufactured by Lexmark International. Loading Program. And it claimed that SCC's
The second computer program, known as chip violated the DMCA by circumventing a
the “Printer Engine Program,” controls technological measure designed to control
various printer functions on Lexmark access to the Printer Engine Program.
printers.
After an evidentiary hearing, the district
The first statute, the general copyright court decided that Lexmark had shown a
statute, 17 U.S.C. § 101et seq., has been likelihood of success on each claim and
entered a preliminary injunction against that threshold, the program executes a
SCC. As we view Lexmark's prospects for different equation to calculate the toner
success on each of these claims differently, level. Goldberg Aff. ¶ 19, JA 576-77. The
we vacate the preliminary injunction and exact code of the Toner Loading Program
remand the case for further proceedings. varies slightly for each printer model, and
this case involves two versions of the
I. program-one for Lexmark's T520 and T522
printer models and another for Lexmark's
A. T620 and T622 printer models. The Toner
Loading Program for the T520/522 printers
The Parties. Headquartered in Lexington, comprises 33 program instructions and
Kentucky, Lexmark is a leading occupies 37 bytes of memory, while the
manufacturer of laser and inkjet printers and Toner Loading Program for the T620/622
has sold printers and toner cartridges for its printers comprises 45 program commands
printers since 1991. Lexmark is a publicly and uses 55 bytes of memory. To illustrate
traded corporation and reported $4.8 billion the modest size of this computer program,
in revenue for 2003. the phrase “Lexmark International, Inc. vs.
Static Control Components, Inc.” in ASCII
Static Control Components is a privately format would occupy more memory than
held company headquartered in Sanford, either version of the Toner Loading
North Carolina. Started in 1987, it currently Program. Burchette Aff. ¶ 13, JA 106. The
employs approximately 1,000 workers and Toner Loading Program is located on a
makes a wide range of technology products, microchip contained in Lexmark's toner
including microchips that it sells to third- cartridges.
party companies for use in remanufactured
toner cartridges. The second program is Lexmark's “Printer
Engine Program.” The Printer Engine
The Two Computer Programs. The first Program occupies far more memory than the
program at issue is Lexmark's “Toner Toner Loading Program and translates into
Loading Program,” which measures the over 20 printed pages of program
amount of toner remaining in the cartridge commands. The program controls a variety
based on the amount of torque (rotational of functions on each printer-e.g., paper feed
force) sensed on the toner cartridge wheel. and movement, and printer motor control. D.
Maggs Aff. ¶ 24, JA 709. The Toner Loading Ct. Op. ¶ 24, at 5. Unlike the Toner Loading
Program relies upon eight program Program, the Printer Engine Program is
commands-“add,” “sub” (an abbreviation for located within Lexmark's printers.
subtract), “mul” (multiply), “pct” (take a
percent), “jump,” “if,” “load,” and “exit”-to Lexmark obtained Certificates of
execute one of several mathematical Registration from the Copyright Office for
equations that convert the torque reading both programs. Neither program is
into an approximation of toner level. encrypted and each can be read (and copied)
Goldberg Aff. ¶ 21, JA 578; Maggs Aff. ¶ directly from its respective memory chip. Id.
24, JA 709. If the torque is less than a ¶ 44, at 8.
certain threshold value, the program
executes one equation to calculate the toner Lexmark's Prebate and Non-Prebate
level, and if the torque equals or exceeds Cartridges. Lexmark markets two types of

2
toner cartridges for its laser printers: printer is turned on or the printer door is
“Prebate” and “Non-Prebate.” Prebate opened and shut. SCC's advertising boasts
cartridges are sold to business consumers at that its chip breaks Lexmark's “secret code”
an up-front discount. In exchange, (the authentication sequence), which “even
consumers agree to use the cartridge just on the fastest computer available today ...
once, then return the empty unit to Lexmark; would take Years to run through all of the
a “shrink-wrap” agreement on the top of possible 8-byte combinations to break.” D.
each cartridge box spells out these Ct. Op. ¶ 103, at 19. SCC sells these chips to
restrictions and confirms that using the third-party cartridge remanufacturers,
cartridge constitutes acceptance of these permitting them to replace Lexmark's chip
terms. Id. ¶¶ 13-14, at 3. Non-Prebate with the SMARTEK chip on refurbished
cartridges are sold without any discount, are Prebate cartridges. These recycled cartridges
not subject to any restrictive agreements and are in turn sold to consumers as a low-cost
may be re-filled with toner and reused by the alternative to new Lexmark toner cartridges.
consumer or a third-party remanufacturer.
Id. ¶¶ 15-18, at 3-4. Each of SCC's SMARTEK chips also
contains a copy of Lexmark's Toner Loading
To ensure that consumers adhere to the Program, which SCC claims is necessary to
Prebate agreement, Lexmark uses an make its product compatible with Lexmark's
“authentication sequence” that performs a printers. The SMARTEK chips thus contain
“secret handshake” between each Lexmark an identical copy of the Toner Loading
printer and a microchip on each Lexmark Program that is appropriate for each
toner cartridge. Both the printer and the chip Lexmark printer, and SCC acknowledges
employ a publicly available encryption that it “slavishly copied” the Toner Loading
algorithm known as “Secure Hash Program “in the exact format and order”
Algorigthm-1” or “SHA-1,” which found on Lexmark's cartridge chip. Id. ¶¶
calculates a “Message Authentication Code” 92, 96, at 18. A side-by-side comparison of
based on data in the microchip's memory. If the two data sequences reveals no
the code calculated by the microchip differences between them. Able Decl. ¶¶ 10-
matches the code calculated by the printer, 15, JA 502-05.
the printer functions normally. If the two
values do not match, the printer returns an The parties agree that Lexmark's printers
error message and will not operate, blocking perform a second calculation independent of
consumers from using toner cartridges that the authentication sequence. After the
Lexmark has not authorized. Yaro Decl. ¶ 7, authentication sequence concludes, the
JA 82 (“To prevent unauthorized toner Printer Engine Program downloads a copy
cartridges from being used with Lexmark's of the Toner Loading Program from the
T520/522 and T620/622 laser printers, toner cartridge chip onto the printer in order
Lexmark utilizes an authentication to measure toner levels. Before the printer
sequence.”). runs the Toner Loading Program, it performs
a “checksum operation,” a “commonly used
SCC's Competing Microchip. SCC sells technique” to ensure the “integrity” of the
its own microchip-the “SMARTEK” chip- data downloaded from the toner cartridge
that permits consumers to satisfy Lexmark's microchip. D. Ct. Op. ¶ 77, at 14. Under this
authentication sequence each time it would operation, the printer compares the result of
otherwise be performed, i.e., when the a calculation performed on the data bytes of

3
the transferred copy of the Toner Loading at 24; see also17 U.S.C. § 410(c).
Program with the “checksum value” located
elsewhere on the toner cartridge microchip. In coming to this conclusion, the district
If the two values do not match, the printer court rejected each of the defenses asserted
assumes that the data was corrupted in the by SCC. First, the district court determined
program download, displays an error that the Toner Loading Program was not a
message and ceases functioning. If the two “lock-out code” (and unprotectable because
values do match, the printer continues to its elements are dictated by functional
operate. compatibility requirements) since “the use
of any Toner Loading Program could still
The Lawsuit. On December 30, 2002, result in a valid authentication sequence and
Lexmark filed a complaint in the United a valid checksum.” Id. ¶ 22, at 26. But even
States District Court for the Eastern District if the Toner Loading Program were a “lock-
of Kentucky seeking to enjoin SCC (on a out code,” the district court believed
preliminary and permanent basis) from copyright infringement had still taken place
distributing the SMARTEK chips. The because “ ‘[s]ecurity systems are just like
complaint contained three theories of any other computer program and are not
liability. First, Lexmark alleged that SCC inherently unprotectable.’ ” Id. ¶ 25, at 27
violated the copyright statute, 17 U.S.C. § (quoting Atari Games Corp. v. Nintendo of
106, by reproducing the Toner Loading Am., Inc., Nos. 88-4805 & 89-0027, 1993
Program on its SMARTEK chip. Second, it WL 214886, at *7 (N.D.Cal. Apr.15, 1993)
alleged that SCC violated the DMCA by (“Atari II ”)). Second, the court rejected
selling a product that circumvents access SCC's fair use defense in view of the
controls on the Toner Loading Program. commercial purpose of the copying, the
Third, it alleged that SCC violated the wholesale nature of the copying and the
DMCA by selling a product that circumvents effect of the copying on the toner cartridge
access controls on the Printer Engine market. Id. at 28-30. Third, the district court
Program. rejected SCC's argument that Lexmark was
“misus[ing]” the copyright laws “to secure
B. an exclusive right or limited monopoly not
expressly granted by copyright law.” Id. at
The district court initially concluded that 38-39.
Lexmark had established a likelihood of
success on its copyright infringement claim The district court next determined that
for SCC's copying of its Toner Loading Lexmark had established a likelihood of
Program. Computer programs are “literary success on its two DMCA claims, one
works” entitled to copyright protection, the relating to the Toner Loading Program, the
court reasoned, and the “requisite level of other relating to the Printer Engine Program.
creativity” necessary to establish the Observing that the anti-trafficking provision
originality of the programs “is extremely of the DMCA, 17 U.S.C. § 1201(a)(2),
low.” D. Ct. Op. ¶¶ 9, 11, at 23. Because the “prohibits any product or device that
Toner Loading Program could be written in circumvents a technological measure that
multiple ways, the district court added, SCC prevents unauthorized access to a
had not rebutted the presumption of validity copyrighted work,” D. Ct. Op. ¶ 64, at 40,
created by Lexmark's copyright registration the district court concluded that Lexmark
for the Toner Loading Program. Id. ¶ 13-14, had established a likelihood of success that

4
SCC's SMARTEK chip did this very thing. II.
In the district court's view, Lexmark's
authentication sequence (not the checksum [1][2] We apply an abuse-of-discretion
calculation) constitutes a “technological standard in reviewing a district court's entry
measure” that “effectively controls access” of a preliminary injunction. Performance
to two copyrighted works-the Toner Loading Unlimited, Inc. v. Questar Publishers, Inc.,
Program and the Printer Engine Program. 52 F.3d 1373, 1378 (6th Cir.1995). A district
The authentication sequence, it determined, court abuses its discretion if it relies upon
“controls access” because it “controls the clearly erroneous findings of fact, employs
consumer's ability to make use of these an incorrect legal standard or improperly
programs.” Id. ¶ 71, at 41. Because SCC applies the correct law to the facts. See id.
designed the SMARTEK chip to circumvent
Lexmark's authentication sequence, because [3][4][5] Four factors govern whether a
circumvention was the sole commercial district court should enter a preliminary
purpose of the SMARTEK chip and because injunction: (1) the plaintiff's likelihood of
SCC markets these chips as performing that success on the merits; (2) the possibility of
function, the court reasoned that SCC likely irreparable harm to the plaintiff in the
had violated the DMCA's prohibitions on absence of an injunction; (3) public interest
marketing circumvention devices. Id. at 42- considerations; and (4) potential harm to
43. See17 U.S.C. 1201(a)(2). third parties. Forry, Inc. v. Neundorfer,
Inc., 837 F.2d 259, 262 (6th Cir.1988). In the
Finally, the district court determined that the copyright context, much rests on the first
DMCA's “reverse engineering” exception to factor because irreparable harm is presumed
liability did not apply. D. Ct. Op. at 47-48; once a likelihood of success has been
see17 U.S.C. § 1201(f)(2), (3). Under the established, id. at 267, and because an
exception, circumvention devices may be injunction likely will serve the public
produced and made available to others interest once a claimant has demonstrated a
“solely for the purpose of enabling likelihood of success in this setting,
interoperability of an independently created Concrete Mach. Co. v. Classic Lawn
program with other programs.” 17 U.S.C. Ornaments, Inc., 843 F.2d 600, 612 (1st
§ 1201(f)(3). The court deemed this defense Cir.1988). We see no reason why a similar
inapplicable because “SCC's SMARTEK presumption of irreparable harm should not
microchips cannot be considered apply to claims under the DMCA. See
independently created computer programs.” Universal City Studios, Inc. v. Reimerdes,
D. Ct. Op. ¶ 94, at 47. 82 F.Supp.2d 211, 215 (S.D.N.Y.2000). Like
the district court before us, we accordingly
Because Lexmark had established a focus on the likelihood that Lexmark will
likelihood of success on the merits, the succeed on its claims under the general
district court presumed irreparable harm, id. copyright statute and the DMCA.
at 48-49, and concluded that the public
interest would favor an injunction against III.
SCC, id. at 50-51. After weighing other
potential hardships, the district court A.
concluded that the preliminary injunction
should issue. The Constitution expressly gives Congress
the power to grant protection to original

5
works of authorship. See U.S. Const. art. I, of statements or instructions to be used
§ 8, cl. 8. Relying on that authority, directly or indirectly in a computer in order
Congress has established the following to bring about a certain result”); 17 U.S.C. §
standard for copyright protection: 117(a) (describing “limitations on exclusive
rights” for “computer programs” and
(a) Copyright protection subsists ... in providing that infringement does not occur
original works of authorship fixed in any when a copy of a computer program is made
tangible medium of expression .... Works of either “as an essential step in the utilization
authorship include the following categories: of the computer program” or “for archival
(1) literary works; (2) musical works ...; purposes”); H.R.Rep. No. 1476 (1976),
(3) dramatic works ...; (4) pantomimes and reprinted in 1976 U.S.C.C.A.N. 5659, 5667
choreographic works; (5) pictorial, graphic, [hereinafter House Report ] (“The term
and sculptural works; (6) motion pictures ‘literary works' ... includes ... computer
and other audiovisual works; (7) sound programs to the extent that they incorporate
recordings; and (8) architectural works. authorship in the programmer's expression
of original ideas, as distinguished from the
(b) In no case does copyright protection for ideas themselves.”); accord Atari Games
an original work of authorship extend to any Corp. v. Nintendo of Am., Inc., 975 F.2d 832,
idea, procedure, process, system, method of 838 (Fed.Cir.1992) (“Atari I ”); Johnson
operation, concept, principle, or discovery, Controls, Inc. v. Phoenix Control Sys., Inc.,
regardless of the form in which it is 886 F.2d 1173, 1175 (9th Cir.1989); Apple
described, explained, illustrated, or Computer, Inc. v. Franklin Computer Corp.,
embodied in such work. 714 F.2d 1240, 1247-49 (3d Cir.1983).

17 U.S.C. § 102 (emphasis added). The The parties also agree that Lexmark has
copyright statute grants owners of protected registered the Toner Loading Program with
works the exclusive right to use them in the Copyright Office, which is an
certain ways. See id.§ 106 (granting infringement suit prerequisite, see17 U.S.C.
copyright owners the exclusive right to § 411(a), and which constitutes prima facie
reproduce copyrighted works, to create evidence of the copyright's validity, see id.§
derivative works based on original works, to 410(c). And the parties agree that SCC
distribute copies of the works, and to shoulders the burden of rebutting the
perform or display the works publicly). presumptive validity of Lexmark's
copyright. See Hi-Tech Video Prods., Inc.
[6] As this case comes to the court, the v. Capital Cities/ABC, Inc., 58 F.3d 1093,
parties agree that computer programs may 1095 (6th Cir.1995).
be entitled to copyright protection as
“literary works” under 17 U.S.C. § 101 and [7][8] The parties also share common
may be protected from infringement under ground when it comes to most of the general
17 U.S.C. § 106. And that is true with principles of copyright infringement
respect to a computer program's object code applicable to this case. A plaintiff may
(the binary code-a series of zeros and ones- establish a claim of copyright infringement
that computers can read) and its source code by showing (1) ownership of a valid
(the spelled-out program commands that copyright in the computer program at issue
humans can read). See17 U.S.C. § 101 (here, the Toner Loading Program) and (2)
(defining “computer program[s]” as “set[s] that the defendant copied protectable

6
elements of the work. See Feist Publ'ns, for an original work of authorship extend to
Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, any idea, procedure, process, system,
361, 111 S.Ct. 1282, 113 L.Ed.2d 358 method of operation, concept, principle, or
(1991); Kohus v. Mariol, 328 F.3d 848, 853 discovery, regardless of [its] form.” 17
(6th Cir.2003). The first prong tests the U.S.C. § 102(b). This provision embodies
originality and non-functionality of the the common-law idea-expression dichotomy
work, see M.M. Bus. Forms Corp. v. Uarco, that distinguishes the spheres of copyright
Inc., 472 F.2d 1137, 1139 (6th Cir.1973), and patent law. “[U]nlike a patent, a
both of which are presumptively established copyright gives no exclusive right to the art
by the copyright registration. The second disclosed; protection is given only to the
prong tests whether any copying occurred (a expression of the idea-not the idea itself.”
factual matter) and whether the portions of Mazer v. Stein, 347 U.S. 201, 217, 74 S.Ct.
the work copied were entitled to copyright 460, 98 L.Ed. 630 (1954); see also Baker v.
protection (a legal matter). See Kepner- Selden, 101 U.S. 99, 101-02, 25 L.Ed. 841
Tregoe, Inc. v. Leadership Software, Inc., 12 (1879) (explaining that while a book
F.3d 527, 534-35 & n. 14 (5th Cir.1994); see describing a bookkeeping system is worthy
generally M. Nimmer & D. Nimmer, of copyright protection, the underlying
Nimmer on Copyright § 13.01[B] (2003) method described is not); Computer
[hereinafter Nimmer]. If no direct evidence Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693,
of copying is available, a claimant may 703 (2d Cir.1992) (“It is a fundamental
establish this element by showing that the principle of copyright law that a copyright
defendant had access to the copyrighted does not protect an idea, but only the
work and that the copyrighted work and the expression of the idea.”). While this general
allegedly copied work are substantially principle applies equally to computer
similar. Kohus, 328 F.3d at 853-54. programs, id.; see also House Report at
5667 (extending copyright protection to
[9] As to the first prong, the Supreme Court computer programs only “to the extent that
has instructed that “[o]riginal ... means only they incorporate authorship in programmer's
that the work was independently created by expression of original ideas, as distinguished
the author (as opposed to copied from other from ideas themselves”), the task of
works), and that it possesses at least some separating expression from idea in this
minimal degree of creativity,” even if the setting is a vexing one, see Altai, 982 F.2d
work is not a “novel” one. Feist, 499 U.S. at at 704 (“The essentially utilitarian nature of
345-46 (originality requires both a computer program further complicates the
“independent creation plus a modicum of task of distilling its idea from its
creativity”). And although constitutionally expression.”); Sega Enters., Ltd. v.
mandated, the threshold showing of Accolade, Inc., 977 F.2d 1510, 1524 (9th
originality is not a demanding one. Id. at Cir.1992); see also Lotus Dev. Corp. v.
345, 111 S.Ct. 1282 (“To be sure, the Borland Int'l, Inc., 49 F.3d 807, 819-20 (1st
requisite level of creativity is extremely low; Cir.1995) (Boudin, J., concurring).
even a slight amount will suffice.”). “[C]ompared to aesthetic works, computer
programs hover even more closely to the
[10][11] But even if a work is in some sense elusive boundary line described in §
“original” under § 102(a), it still may not be 102(b).” Altai, 982 F.2d at 704.
copyrightable because § 102(b) provides
that “[i]n no case does copyright protection [12][13] In ascertaining this “elusive

7
boundary line” between idea and expression, external factors constrain the choice of
between process and non-functional expressive vehicle, the doctrine of “scenes a
expression, courts have looked to two other faire”-“scenes,” in other words, “that must
staples of copyright law-the doctrines of be done”-precludes copyright protection.
merger and scenes a faire. Where the See Twentieth Century Fox Film, 361 F.3d
“expression is essential to the statement of at 319-20; see generally Nimmer §
the idea,” CCC Info. Servs., Inc. v. Maclean 13.03[B][4]. In the literary context, the
Hunter Mkt. Reports, Inc., 44 F.3d 61, 68 doctrine means that certain phrases that are
(2d Cir.1994); see also Lotus Dev., 49 F.3d “standard, stock, ... or that necessarily
at 816 (“If specific words are essential to follow from a common theme or setting”
operating something, then they are part of a may not obtain copyright protection.
‘method of operation’ and, as such, are Gates Rubber, 9 F.3d at 838. In the
unprotectable.”), or where there is only one computer-software context, the doctrine
way or very few ways of expressing the means that the elements of a program
idea, Warren Publ'g, Inc. v. Microdos Data dictated by practical realities-e.g., by
Corp., 115 F.3d 1509, 1519 n. 27 (11th hardware standards and mechanical
Cir.1997), the idea and expression are said specifications, software standards and
to have “merged.” In these instances, compatibility requirements, computer
copyright protection does not exist because manufacturer design standards, target
granting protection to the expressive industry practices, and standard computer
component of the work necessarily would programming practices-may not obtain
extend protection to the work's protection. Id. (citing case examples); see
uncopyrightable ideas as well. See Gates Sega Enters., 977 F.2d at 1524 (“To the
Rubber Co. v. Bando Chem. Indus., Ltd., 9 extent that a work is functional or factual, it
F.3d 823, 838 (10th Cir.1993); see also may be copied.”); Brown Bag Software v.
Murray Hill Publ'ns, Inc. v. Twentieth Symantec Corp., 960 F.2d 1465, 1473 (9th
Century Fox Film Corp., 361 F.3d 312, 319 Cir.1992) (affirming district court's finding
n. 2 (6th Cir.2004) (noting that where idea that “[p]laintiffs may not claim copyright
and expression are intertwined and where protection of an ... expression that is, if not
non-protectable ideas predominate, standard, then commonplace in the
expression is not protected); see generally computer software industry”). As “an
Nimmer § 13.03[B][3]. For computer industry-wide goal,” programming
programs, “if the patentable process is “[e]fficiency” represents an external
embodied inextricably in the line-by-line constraint that figures prominently in the
instructions of the computer program, [ ] copyrightability of computer programs.
then the process merges with the expression Altai, 982 F.2d at 708.
and precludes copyright protection.”
Atari I, 975 F.2d at 839-40; see, e.g., [17] Generally speaking, “lock-out” codes
PRG-Schultz Int'l, Inc. v. Kirix Corp., No. fall on the functional-idea rather than the
03 C 1867, 2003 WL 22232771, at *4 original-expression side of the copyright
(N.D.Ill. Sept.22, 2003) (determining that line. Manufacturers of interoperable devices
copyright infringement claim failed because such as computers and software, game
expression merged with process in computer consoles and video games, printers and toner
software that performed auditing tasks). cartridges, or automobiles and replacement
parts may employ a security system to bar
[14][15][16] For similar reasons, when the use of unauthorized components. To

8
“unlock” and permit operation of the program ... efficiency concerns may so
primary device (i.e., the computer, the game narrow the practical range of choice as to
console, the printer, the car), the component make only one or two forms of expression
must contain either a certain code sequence workable options.”); Atari I, 975 F.2d at
or be able to respond appropriately to an 840 (noting that “no external factor dictated
authentication process. To the extent the bulk of the program” and finding the
compatibility requires that a particular code program copyrightable). In order to
sequence be included in the component characterize a choice between alleged
device to permit its use, the merger and programming alternatives as expressive, in
scenes a faire doctrines generally preclude short, the alternatives must be feasible
the code sequence from obtaining copyright within real-world constraints.
protection. See Sega Enters., 977 F.2d at
1524 (“When specific instructions, even The Supreme Court's decision in Feist helps
though previously copyrighted, are the only to illustrate the point. In Feist, the alleged
and essential means of accomplishing a infringer had included 1,309 of the plaintiff's
given task, their later use by another will not alphabetically-organized telephone book
amount to infringement.”) (quoting National listings in its own telephone directory. 499
Commission on New Technological Uses of U.S. at 344, 111 S.Ct. 1282. The facts
Copyrighted Works, Final Report 20 (1979)) comprising these listings, it was clear,
(emphasis added); Atari Games Corp. v. theoretically could have been organized in
Nintendo of Am., Inc., Nos. 88-4805 & 89- other ways-for instance, by street address or
0027, 1993 WL 207548, at *1 (N.D.Cal. phone number, or by the age or height of the
May 18, 1993) (“Atari III ”) (“Program code individual. But by virtue of tradition and
that is strictly necessary to achieve current settled expectations, the familiar
compatibility presents a merger problem, alphabetical structure copied by the
almost by definition, and is thus excluded defendant amounted to the only
from the scope of any copyright.”). organizational option available to the
defendant. Id. at 363, 111 S.Ct. 1282. For
[18][19] In trying to discern whether these these reasons, the Supreme Court
doctrines apply, courts tend to “focus on determined that alphabetical phone listings
whether the idea is capable of various modes did not satisfy the low threshold of
of expression.” Mason v. Montgomery originality for copyright protection. Id.;
Data, Inc., 967 F.2d 135, 138 (5th Cir.1992) see Altai, 982 F.2d at 711 (noting that
(quoting Franklin Computer, 714 F.2d at although Feist dealt with factual
1253); Atari I, 975 F.2d at 840 (“The compilations under 17 U.S.C. § 101, the
unique arrangement of computer program decision's “underlying tenets apply to much
expression which generates [the] data stream of the work involved in computer
does not merge with the process so long as programming” under 17 U.S.C. § 102(a)).
alternate expressions are available.”). The
question, however, is not whether any [20] One last principle applies here. Even if
alternatives theoretically exist; it is whether the prerequisites for infringement are met-
other options practically exist under the the copyright is valid and SCC copied
circumstances. See Altai, 982 F.2d at 708 protectable elements of the work-Congress
(“While, hypothetically, there might be a has established a fair use defense to
myriad of ways in which a programmer may infringement claims to ensure that
effectuate certain functions within a copyright protection advances rather than

9
thwarts the essential purpose of copyright: does it matter whether SCC copied the Toner
“[t]o promote the Progress of Science and Loading Program knowingly or innocently
useful Arts.”U.S. Const. art. I, § 8, cl. 8; see because copyright infringement does not
also Campbell v. Acuff-Rose Music, Inc., have a scienter requirement. See Repp v.
510 U.S. 569, 577, 114 S.Ct. 1164, 127 Webber, 132 F.3d 882, 889 (2d Cir.1997).
L.Ed.2d 500 (1994). Congress has permitted Finally, when it comes to the merits of the
others to use copyright-protected works, infringement claim, the parties primarily
“including ... by reproduction,” when courts debate whether the Toner Loading Program
determine the use to be “fair” according to a satisfies the originality requirement (prong
non-exhaustive list of factors: one), as distinct from whether any copying
by SCC is substantially similar to the
(1) the purpose and character of the use, Lexmark chip (prong two). That is because
including whether such use is of a the parties agree that SCC's SMARTEK chip
commercial nature or is for nonprofit copied all aspects of the Toner Loading
educational purposes; (2) the nature of the Program.
copyrighted work; (3) the amount and
substantiality of the portion used in relation [22] In our view, the district court
to the copyrighted work as a whole; and (4) committed three related legal errors in
the effect of the use upon the potential determining that Lexmark had a likelihood
market for or value of the copyrighted work. of prevailing on its copyright claim with
respect to the Toner Loading Program. First,
17 U.S.C. § 107. With respect to computer the district court concluded that, because the
programs, “fair use doctrine preserves public Toner Loading Program “could be written in
access to the ideas and functional elements a number of different ways,” it was entitled
embedded in copyrighted computer to copyright protection. D. Ct. Op. ¶ 40, at
software programs.” Sony Computer 32. In refusing to consider whether “external
Entm't, Inc. v. Connectix Corp., 203 F.3d factors such as compatibility requirements,
596, 603 (9th Cir.2000). industry standards, and efficiency”
circumscribed the number of forms that the
B. Toner Loading Program could take, the
district court believed that the idea-
[21] In applying these requirements to this expression divide and accompanying
case, it helps to clarify the terms of debate principles of merger and scenes a faire play
between the parties. Lexmark claims a role only in the “substantial similarity”
copyright protection in, and infringement analysis and do not apply when the first
of, the code that composes its Toner Loading prong of the infringement test
Program. It has not alleged that SCC copied (copyrightability) is primarily at issue. Id. ¶
any other portion of its chip, including any 37, at 31. In taking this path, the district
of the data on which the SHA-1 algorithm- court relied on cases invoking Nimmer's
the authentication sequence or “secret pronouncement that the idea-expression
handshake”-appear. Presumably that is divide “constitutes not so much a limitation
because SCC replaced Lexmark's SHA-1 on the copyrightability of works, as it is a
function with a different publicly available measure of the degree of similarity that must
encryption program to enable exist between a copyrightable work and an
interoperability of its chip with Lexmark's unauthorized copy.” Nimmer § 2.03[D]; see
printers. Burchette Aff. ¶ 9, JA 104. Nor D. Ct. Op. at 31. And in concluding more

10
generally that the copyrightability of a courts to determine whether any of the
computer program turns solely on the former have been copied in substantial
availability of other options for writing the enough part to constitute infringement. Both
program, the court relied on several cases prongs of the infringement test, in other
from other circuits. See, e.g., Apple words, consider “copyrightability,” which at
Computer, Inc. v. Formula Int'l, Inc., 725 its heart turns on the principle that
F.2d 521, 525 (9th Cir.1984); Franklin copyright protection extends to expression,
Computer, 714 F.2d at 1253; Whelan not to ideas. See Brown Bag Software, 960
Assocs., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d at 1475-76 (noting that copyrightability
F.2d 1222, 1240 (3d Cir.1986); E.F. is an aspect of both parts of the infringement
Johnson Co. v. Uniden Corp. of Am., 623 test); see also Bateman v. Mnemonics, Inc.,
F.Supp. 1485, 1502 (D.Minn.1985). 79 F.3d 1532, 1545 (11th Cir.1996)
(deciding that district court erred by not
[23] This reasoning, to start with, conflicts permitting consideration of merger, scenes a
with Feist. As the Supreme Court's recent faire doctrines in instance of literal
decision suggests, one does not satisfy the copying); Lotus Dev., 49 F.3d at 815
originality requirement for copyright (assessing whether the literally copied menu
protection merely by showing that the work command structure is copyrightable in light
could have been put together in different of § 102(b)'s limitation); Whelan Assocs.,
ways. Just as it failed to suffice in Feist that 797 F.2d at 1236-37 (discussing scenes a
the author of the competing telephone book faire doctrine in considering copyrightability
could have organized the listings in some of computer program structure); Franklin
manner other than the individual's last name, Computer, 714 F.2d at 1253 (discussing
so it does not suffice here that SCC could merger in context of copyrightability of
have written the Toner Loading Program in computer operating system program). When
some other way. As in Feist, the court must a work itself constitutes merely an idea,
ask whether the alternative ways of putting process or method of operation, or when any
together the competing work are feasible in discernible expression is inseparable from
that setting. the idea itself, or when external factors
dictate the form of expression, copyright
[24][25][26] Nor does Nimmer support the protection does not extend to the work. See
district court's “a number of different ways” Bateman, 79 F.3d at 1546 n. 28
reasoning. As a matter of practice, Nimmer (“Compatibility and other functionality
is correct that courts most commonly discuss challenges to originality ... are applied so as
the idea-expression dichotomy in to deny copyright protection to a particular
considering whether an original work and a work or portion of a work.”) (emphasis
partial copy of that work are “substantially added); Mason, 967 F.2d at 138 n. 5
similar” (as part of prong two of the (rejecting argument that merger doctrine
infringement test), since the copyrightability applies only to question of infringement and
of a work as a whole (prong one) is less noting that “this court has applied the
frequently contested. But the idea- merger doctrine to the question of
expression divide figures into the substantial copyrightability”).
similarity test not as a measure of
“similarity”; it distinguishes the original Neither do the cited cases support the
work's protectable elements from its district court's initial frame of reference.
unprotectable ones, a distinction that allows Franklin Computer, 714 F.2d 1240, and

11
Formula International, 725 F.2d 521, alternatives in his declaration: (1) different
involved copies of Apple's operating system constants and equations could be used; (2) a
program-a program whose size and lookup table could be used in lieu of
complexity is to the Toner Loading Program equations; (3) some measure other than
what the Sears Tower is to a lamppost. torque could be used to approximate toner
Given the nature of the Apple program, it level (e.g., the number of pages printed); or
would have been exceedingly difficult to say (4) the same equations could be used in a
that practical alternative means of different sequence. Maggs Decl., JA 709-10.
expression did not exist and indeed no He concluded that over 50 different
defendant in the cases advanced that programs could be written to substitute for
argument. And Franklin Computer, 714 F.2d the Toner Loading Program. Maggs Hr'g
at 1253, and Whelan Assocs., 797 F.2d at Test., JA 940.
1236-37, do not establish that any variation
in the modes of expression establishes Dr. Goldberg, SCC's expert, acknowledged
copyrightability, as they acknowledge the that certain changes could be made to the
potential relevance of the merger and scenes program, for example, by changing the
a faire doctrines. While E.F. Johnson sequence of elements in the program, Hr'g
rejected the defendant's argument that the Test., JA 1021, or by writing the Toner
computer software program at issue was not Loading Program in a different
protectable because it was needed for programming language altogether, JA 1023.
“compatibility” with a certain radio system, But Dr. Goldberg conceded this point only
it did so only after finding that “the exact as a theoretical matter, as he concluded that
duplication of the [program] ... was not the functionality and efficiency considerations
‘only and essential’ means of achieving precluded any material changes to the Toner
compatibility.” 623 F.Supp. at 1502. Loading Program. JA 1021.

[27][28] Second, given the district court's Dr. Goldberg concluded that several external
mistaken view of the legal standard for constraints limit the options available in
distinguishing protectable expression from designing the Toner Loading Program. For
unprotectable ideas, the constraints on the one, the Printer Engine Program that
Toner Loading Program established by the downloads and executes the program
evidence need to be reconsidered. To discern understands only a single programming
whether “originality” exists in the work, the language composed of eight simple
court should ask whether the ideas, methods commands. JA 1018-19. For another, the
of operation and facts of the program could program must consist of only 55 bytes
have been expressed in any form other than because the printer downloads only these
that chosen by the programmer, taking into particular bytes. JA 1019. Efficiency
consideration the functionality, compatibility considerations and the physical realities of
and efficiency demanded of the program. the printer and toner cartridge also restrict
the forms that the Toner Loading Program
In presenting evidence in support of its could take. Id. As a result, Dr. Goldberg
motion for a preliminary injunction, concluded, these external factors together
Lexmark focused on establishing that the “dictate the way that the simple toner
Toner Loading Program could have been loading program looks,” and the resulting
written in other ways. Dr. Maggs, Lexmark's program is a “no-thought translation of the
expert, described several possible formulas to the language that the internal

12
loading program must be written in, and [the Am. Dental Ass'n v. Delta Dental Plans
programmer doesn't] have much choice.” Ass'n, 126 F.3d 977, 980 (7th Cir.1997) (“A
Id. Dr. Goldberg responded to Dr. Maggs' lamp may be entirely original, but if the
testimony that the Toner Loading Program novel elements are also functional the lamp
could take alternative forms by noting that cannot be copyrighted.”). Nor would the use
Dr. Maggs' proposed changes were trivial- of a “lookup table” appear to differ
that they did not make any “substantial meaningfully from the use of other
difference to the nature of the program”-or equations directly. Instead of executing a
that they were so inefficient and repetitive as mathematical formula on a given input, this
to be “ridiculous.” JA 1021. Instead, Dr. program merely “looks up” in a data table
Goldberg concluded, the Toner Loading the output of that same formula for the given
Program as it is written is the most input value. Finally, Dr. Maggs' fourth
“straightforward, efficient, natural way to suggestion-that the same equations could be
express the program.” Id. By contrast, Dr. reordered-does not appear to show
Maggs' testimony did not reference any of originality because such alterations may be
these functional considerations discussed by too trivial to support a finding of creative
Goldberg, meaning that the record fails to expression. See M.M. Bus. Forms, 472
establish any affirmative support for the F.2d at 1140 (holding that paraphrasing of
contention that Dr. Maggs' proposed words on legal forms does not contain the
alternatives satisfy the memory restrictions requisite originality for copyright
of the program. protection).

[29] Even aside from Dr. Goldberg's To the extent these alternatives suggest any
testimony that the Toner Loading Program is originality in the Toner Loading Program, at
the most efficient means of calculating toner any rate, the quantum of originality may
levels, the alternatives suggested by Dr. well be de minimis and accordingly
Maggs do not appear to support the district insufficient to support the validity of
court's initial conclusion that the program is Lexmark's copyright in the work. See
expressive. Dr. Maggs' first and third Mitel, Inc. v. Iqtel, Inc., 124 F.3d 1366,
suggestions-that different equations and 1373-74 (10th Cir.1997) (determining that
values or a different means of measuring plaintiff's “arbitrary selection” of several
toner level altogether could have been used- numbers required only “de minimis creative
do not appear to represent alternative means effort” and did not “evince enough
of expressing the ideas or methods of originality to distinguish authorship”)
operations embodied in the Toner Loading (quotation omitted); cf. Sega Enters., 977
Program; they appear to be different ideas or F.2d at 1524 n. 7 (noting that 20-byte code
methods of operation altogether. Selection is of de minimis length and therefore likely a
from among competing ideas or methods of “word” or “short phrase” that is not
operation generally does not result in protected by copyright law); Murray Hill
copyright-protectable expression. See Publ'ns, Inc. v. ABC Comm'ns, Inc., 264 F.3d
Bateman, 79 F.3d at 1546 n.29 (“Generally 622, 633 (6th Cir.2001) (noting that short
there is more than one method of operation movie line was “a phrase or slogan not
or process that can be used to perform a worthy of copyright protection in its own
particular computer program function. right”). Because the district court initially
However, methods of operation and looked at these issues and this evidence
processes are not copyrightable.”); see also through the wrong frame of reference, its

13
conclusion that the Toner Loading Program checksum operation did not operate as a
had sufficient originality to obtain strict constraint on the content of the Toner
copyright protection does not support the Loading Program because “SCC's identical
preliminary injunction. At the permanent copying of Lexmark's Toner Loading
injunction stage of this dispute, we leave it Programs went beyond that which was
to the district court in the first instance to necessary for compatibility.” D. Ct. Op. ¶
decide whether the Toner Loading Program 27, at 27. According to the district court, the
has sufficient originality to warrant program could be altered rather simply, even
copyright protection. in view of the checksum operation, because
reasonable trial and error of no more than
Third, and perhaps most significantly, the 256 different data combinations would have
district court erred in assessing whether the enabled SCC to discover and encode the
Toner Loading Program functions as a lock- correct checksum value on its chip. D. Ct.
out code. Even if the constraints described Op. ¶ 86, at 16. In reaching this conclusion,
by Dr. Goldberg-the programming language, the court downplayed the significance of Dr.
the program size, efficiency concerns-did Goldberg's testimony regarding the
not dictate the content of the Toner Loading importance of contextual information to the
Program, the fact that it also functions as a ease or difficulty of guessing the correct
lock-out code undermines the conclusion checksum value, saying that Dr. Goldberg
that Lexmark had a probability of success on called the task “extraordinarily difficult,”
its infringement claim. then dismissing his testimony without
further explanation. Dr. Goldberg, however,
The Toner Loading Program, recall, serves did not describe this endeavor as
as input to the checksum operation that is “extraordinarily difficult” but as
performed each time the printer is powered “computationally impossible,” Hr'g Test., JA
on or the printer door is opened and closed 1012 (emphasis added)-a point that Lexmark
(i.e., for toner cartridge replacement). After did not then, and does not now, refute.
downloading a copy of the Toner Loading Contrary to Judge Feikens' suggestion,
Program to calculate toner levels, the Printer moreover, Lexmark offered no evidence to
Engine Program runs a calculation-the show that the task of “turning off” the
checksum-using every data byte of the Toner checksum operation altogether (without
Loading Program as input. The program contextual information) would be any
then compares the result of that calculation different from, or any less arduous than, the
with a “checksum value” that is located task of altering the checksum value to
elsewhere on Lexmark's toner cartridge accommodate another program.
chip. If any single byte of the Toner Loading
Program is altered, the checksum value will The difficulty of deriving the proper
not match the checksum calculation result. checksum value and the corresponding
Only if the checksum value is degree to which the checksum operation acts
correspondingly changed to accommodate as a constraint on the content of the bytes
any alterations in the data bytes will the comprising the Toner Loading Program may
printer function. be an open question at the permanent
injunction phase. But for purposes of the
In addition to its general conclusion that preliminary injunction, Dr. Goldberg's
external constraints on the program were not unchallenged testimony that it would be
relevant, the district court concluded that the “computationally impossible” to modify the

14
checksum value without contextual Loading Program is not copyrightable, then
information suffices to establish that the “most computer programs would not be
checksum operation imposes a compatibility copyrightable.” Lexmark Br. at 17. But the
constraint in the most literal sense possible: slope of this decision is neither as slippery
if any single byte of the Toner Loading nor as steep as Lexmark suggests. Most
Program is altered, the printer will not computer programs do not simultaneously
function. On this record, pure compatibility operate as a lock-out code that is
requirements justified SCC's copying of the “computationally impossible” to alter
Toner Loading Program. without input from the programmer; and
most programs are not as brief as this one,
C. see Burchette Aff. ¶ 13, JA 106 (noting that
storing “Lexmark International, Inc. v.
[30] In defense of the district court's Static Control Components, Inc.” in ASCII
decision, Lexmark raises several other format would require more bytes of memory
arguments, all unavailing. First, Lexmark than the Toner Loading Program comprises);
notes that it “creatively inserted” in the Goldberg Aff. ¶ 14, JA 575 (“The simplest
Toner Loading Program a computer code programs, such as those written on the first
representation of its stock ticker symbol, day of [an introductory programming class],
“LXK.” Lexmark Br. at 24. Lexmark are often of a similar complexity to the
describes this segment as “non-functional” Toner Loading Program.”).
because it does not translate into source
code contributing to the toner-calculating In reaching this conclusion, we do not mean
program. It is not clear whether these three to say that brief computer programs are
letters would support a finding of creative ineligible for copyright protection. Short
expression in the work as a whole. See programs may reveal high levels of
Sega Enters., 977 F.2d at 1524 n. 7 (noting creativity and may present simple, yet
that Sega's 20-byte initialization code is of unique, solutions to programming
de minimis length and therefore likely a quandaries. Just as a mathematician may
“word” or “short phrase” that is not develop an elegant proof, or an author may
protected by copyright law as described in express ideas in a spare, simple, but creative
37 C.F.R. § 202.1(a)); see also Feist, 499 manner, see, e.g., e.e. cummings, Selected
U.S. at 344, 111 S.Ct. 1282 (concluding that Poems (Richard S. Kennedy ed., 1994), so a
phone book listings are not copyrightable computer programmer may develop a
even though the listings contained four program that is brief and eligible for
fictitious listings that the plaintiff included protection. But unless a creative flair is
for infringement detection purposes). What shown, a very brief program is less likely to
is clear is that the bytes containing the be copyrightable because it affords fewer
“LXK” reference are functional in the sense opportunities for original expression. See
that they, like the rest of the Toner Loading Nimmer § 2.01[B] (concluding that
Program, also serve as input to the creativity and effort are reciprocally related-
checksum operation and as a result amount that the smaller the effort, the greater the
to a lock-out code that the merger and creativity required to invoke copyright
scenes a faire doctrines preclude from protection); see generally Julie E. Cohen,
obtaining protection. Reverse Engineering and the Rise of
Electronic Vigilantism: Intellectual Property
Second, Lexmark argues that if the Toner Implications of “Lock-Out” Programs, 68 S.

15
Cal. L.Rev. 1091, 1139-1141 (1995) program, when executed, generated an
(describing how “a programmer may be arbitrary stream of data that in turn enabled
efficient, in the sense of getting a task done, the console to function. That same data
without being at all creative, if the most stream, the court concluded, could have
efficient way [of accomplishing the task] ... been produced by a number of alternative
is standard within the industry”; therefore, programs; for this reason, the expression
“industry-standard, efficient routines” in contained in the computer program did not
computer programs are not protectable “merge” with the process. Id. (“The unique
expression unless the programmer arrangement of computer program
incorporates some “idiosyncratic features”); expression which generates that data stream
cf. 37 C.F.R. § 202.1(a) (listing “[w]ords does not merge with the process so long as
and short phrases” as an example of “works alternate expressions are available. In this
not subject to copyright”). case, Nintendo has produced expert
testimony showing a multitude of different
Third, invoking the Federal Circuit's ways to generate a data stream which
decision in Atari I, 975 F.2d at 840, unlocks the NES console.”) (citation
Lexmark argues that even if the Toner omitted); id. (“[N]o external factor dictated
Loading Program amounts to a lock-out the bulk of the [10NES] program.”). Here,
code, it still may be eligible for protection. by contrast, the data bytes comprising the
Lexmark Br. at 22; see also D. Ct. Op. ¶ 25, Toner Loading Program themselves act as
at 27 (“Security systems are just like any the input to the checksum operation that
other computer program and are not must be successfully completed for the
inherently unprotectable.”) (quotation printer to operate. None of these bytes of the
omitted). In Atari I, Nintendo developed a program can be altered without impeding
program (known as “10NES”) that blocked printer functionality given the compatibility
its game console from accepting requirements created by the checksum
unauthorized game cartridges. 975 F.2d at operation. See Atari III, 1993 WL 207548,
836. Relying on this program, Nintendo sold at *1 (distinguishing current compatibility
game cartridges that generated a data stream requirements from future ones, and
that “unlocked” the game console, allowing excluding program code “that is strictly
it to load and run the game. Id. at 836, 840. necessary” to comply with the former from
The Federal Circuit determined that the copyright protection under the merger
10NES program was copyrightable despite concept). Compatibility requirements in
arguments that the program constituted Atari, in short, did not preclude the
unprotectable ideas rather than expression possibility of substituting other programs for
and that the merger doctrine precluded the 10NES, while they do here.
copyright protection. Id. at 840.
For like reasons, Judge Feikens is correct
The Federal Circuit's rationale for accepting that a poem in the abstract could be
copyright protection for the 10NES copyrightable. But that does not mean that
program does not undermine our conclusion the poem receives copyright protection
because the 10NES program was not a “lock when it is used in the context of a lock-out
out” code in the same sense that the Toner code. Similarly, a computer program may be
Loading Program is. In Atari, the data bytes protectable in the abstract but not generally
of the 10NES program did not themselves entitled to protection when used necessarily
do the “unlocking” of the game console; the as a lock-out device.

16
question is whether “the user stands to profit
D. from exploitation of the copyrighted
material without paying the customary
In view of our conclusion on this price.” Id. (emphasis added); see also Kelly
preliminary-injunction record that the Toner v. Arriba Soft Corp., 336 F.3d 811, 818-19
Loading Program is not copyrightable, we (9th Cir.2003) (determining that commercial
need not consider SCC's fair-use defense. use did not weigh against fair use where it
Yet because this defense could regain was “more incidental and less exploitative in
relevance at the permanent injunction phase nature” because the copies were used for a
of the case (e.g., if further evidence different purpose from the originals). In
undermines our conclusion that the program copying the Toner Loading Program into
is not copyrightable), two related aspects of each of its SMARTEK chips, SCC was not
the district court's discussion deserve seeking to exploit or unjustly benefit from
comment. any creative energy that Lexmark devoted to
writing the program code. As in Kelly, SCC's
The district court correctly outlined the four chip uses the Toner Loading Program for a
factors for determining whether SCC fairly different purpose, one unrelated to
used Lexmark's Toner Loading Program: (1) copyright protection. Rather than using the
the purpose and character of the use, Toner Loading Program to calculate toner
including whether it is of a commercial levels, the SMARTEK chip uses the content
nature or is for nonprofit educational of the Toner Loading Program's data bytes
purposes; (2) the nature of the copyrighted as input to the checksum operation and to
work; (3) the amount and substantiality of permit printer functionality. Under these
the portion used in relation to the circumstances, it is far from clear that SCC
copyrighted work as a whole; and (4) the copied the Toner Loading Program for its
effect of the use upon the potential market commercial value as a copyrighted work-at
for or value of the copyrighted work. 17 least on the preliminary-injunction record
U.S.C. § 107. All of these factors except the we have before us.
second, the district court reasoned,
counseled against a finding of fair use, and [32][33] With respect to the fourth factor-the
the second factor favored SCC's position effect of the use on the value of the
only “slightly.” D. Ct. Op. at 29-30. As a copyrighted material-the relevant question
result, the court concluded, the fair-use likewise is whether the infringement
defense did not apply. Id. ¶ 35, at 30-31. impacted the market for the copyrighted
work itself. See Sony Corp. of Am. v.
[31] With respect to the first factor-the Universal City Studios, Inc., 464 U.S. 417,
purpose of the use-it is true that a profit- 450, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984)
making purpose generally militates against a (“[A] use that has no demonstrable effect
finding of fair use. See Campbell, 510 U.S. upon the potential market for, or the value
at 585, 114 S.Ct. 1164. But it is not the case of, the copyrighted work need not be
that any profit-making purpose weighs prohibited in order to protect the author's
against fair use, as the “crux” of this factor incentive to create.”); see also Campbell,
“is not whether the sole motive of the use is 510 U.S. at 590, 114 S.Ct. 1164 (the
monetary gain.” Harper & Row, Publishers, question is “whether ‘unrestricted and
Inc. v. Nation Enters., 471 U.S. 539, 562, widespread conduct of the sort engaged in
105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). The by the defendant ... would result in a

17
substantially adverse impact on the potential component, or part thereof, that-
market’ for the original.”) (quoting Nimmer
§ 13.05[A][4] ). In Kelly, for example, the (A) is primarily designed or produced for
Ninth Circuit concluded that the fourth the purpose of circumventing a
factor favored a finding of fair use because technological measure that effectively
the Internet search engine's utilization of the controls access to a [copyrighted work];
plaintiff's copyrighted images did not harm
the value or marketability of the original (B) has only limited commercially
photos. 336 F.3d at 821-22. Here, the significant purpose or use other than to
district court focused on the wrong market: circumvent a technological measure that
it focused not on the value or marketability effectively controls access to a [copyrighted
of the Toner Loading Program, but on work]; or
Lexmark's market for its toner cartridges.
Lexmark's market for its toner cartridges (C) is marketed by that person or another
and the profitability of its Prebate program acting in concert with that person with that
may well be diminished by the SMARTEK person's knowledge for use in circumventing
chip, but that is not the sort of market or a technological measure that effectively
value that copyright law protects. See controls access to a [copyrighted work].
Connectix, 203 F.3d at 607 (“Sony
understandably seeks control over the Id. § 1201(a)(2). The statute finally bans
market for devices that play games Sony devices that circumvent “technological
produces or licenses. The copyright law, measures” protecting “a right” of the
however, does not confer such a copyright owner. Id. § 1201(b). The last
monopoly.”). Lexmark has not introduced provision prohibits devices aimed at
any evidence showing that an independent circumventing technological measures that
market exists for a program as elementary as allow some forms of “access” but restrict
its Toner Loading Program, and we doubt at other uses of the copyrighted work, see
any rate that the SMARTEK chip could have Universal City Studios, Inc. v. Corley, 273
displaced any value in this market. F.3d 429, 441 (2d Cir.2001); United States
v. Elcom Ltd., 203 F.Supp.2d 1111, 1120
IV. (N.D.Cal.2002), such as streaming media,
which permits users to view or watch a
A. copyrighted work but prevents them from
downloading a permanent copy of the work,
[34] Enacted in 1998, the DMCA has three see RealNetworks, Inc. v. Streambox, Inc.,
liability provisions. The statute first No. 2:99CV02070, 2000 WL 127311, at *1-
prohibits the circumvention of “a 2 (W.D.Wash. Jan.18, 2000).
technological measure that effectively
controls access to a work protected [by The statute also contains three “reverse
copyright].” 17 U.S.C. § 1201(a)(1). The engineering” defenses. A person may
statute then prohibits selling devices that circumvent an access control measure “for
circumvent access-control measures: the sole purpose of identifying and
analyzing those elements of the program that
No person shall manufacture, import, offer are necessary to achieve interoperability of
to the public, provide, or otherwise traffic in an independently created computer program
any technology, product, service, device, with other programs, and that have not

18
previously been readily available to [that
person].” 17 U.S.C. § 1201(f)(1). A person B.
“may develop and employ technological
means” that are “necessary” to enable [35] We initially consider Lexmark's DMCA
interoperability. Id. § 1201(f)(2). And these claim concerning the Printer Engine
technological means may be made available Program, which (the parties agree) is
to others “solely for the purpose of enabling protected by the general copyright statute.
interoperability of an independently created In deciding that Lexmark's authentication
computer program with other programs.” sequence “effectively controls access to a
Id. § 1201(f)(3). All three defenses apply work protected under [the copyright
only when traditional copyright provisions],” the district court relied on a
infringement does not occur and only when definition in the DMCA saying that a
the challenged actions (in the case of the measure “effectively controls access to a
third provision) would not violate other work” if, “in the ordinary course of
“applicable law[s].” Id. operation,” it “requires the application of
information, or a process or treatment, with
In filing its complaint and in its motion for a the authority of the copyright owner, to gain
preliminary injunction, Lexmark invoked access to the work.” 17 U.S.C. §
the second liability provision-the ban on 1201(a)(3). Because Congress did not
distributing devices that circumvent access- explain what it means to “gain access to the
control measures placed on copyrighted work,” the district court relied on the
works. See id. § 1201(a)(2). According to “ordinary, customary meaning” of “access”:
Lexmark, SCC's SMARTEK chip is a “the ability to enter, to obtain, or to make
“device” marketed and sold by SCC that use of,” D. Ct. Op. at 41 (quoting Merriam-
“circumvents” Lexmark's “technological Webster's Collegiate Dictionary 6 (10th
measure” (the SHA-1 authentication ed.1999)). Based on this definition, the court
sequence, not the checksum operation), concluded that “Lexmark's authentication
which “effectively controls access” to its sequence effectively ‘controls access' to the
copyrighted works (the Toner Loading Printer Engine Program because it controls
Program and Printer Engine Program). the consumer's ability to make use of these
Lexmark claims that the SMARTEK chip programs.” D. Ct. Op. at 41 (emphasis
meets all three tests for liability under § added).
1201(a)(2): (1) the chip “is primarily
designed or produced for the purpose of We disagree. It is not Lexmark's
circumventing” Lexmark's authentication authentication sequence that “controls
sequence, 17 U.S.C. § 1201(a)(2)(A); (2) the access” to the Printer Engine Program.
chip “has only limited commercially See17 U.S.C. § 1201(a)(2). It is the purchase
significant purpose or use other than to of a Lexmark printer that allows “access” to
circumvent” the authentication sequence, id. the program. Anyone who buys a Lexmark
§ 1201(a)(2)(B); and (3) SCC “market[s]” printer may read the literal code of the
the chip “for use in circumventing” the Printer Engine Program directly from the
authentication sequence, id. § printer memory, with or without the benefit
1201(a)(2)(C). The district court agreed and of the authentication sequence, and the data
concluded that Lexmark had shown a from the program may be translated into
likelihood of success under all three readable source code after which copies may
provisions. be freely distributed. Maggs Hr'g Test., JA

19
928. No security device, in other words, differences between defendants whose
protects access to the Printer Engine accused products enable copying and those,
Program Code and no security device like Skylink, whose accused products enable
accordingly must be circumvented to obtain only legitimate uses of copyrighted
access to that program code. software.”).

The authentication sequence, it is true, may Nor are we aware of any cases that have
well block one form of “access”-the “ability applied this provision of the DMCA to a
to ... make use of” the Printer Engine situation where the access-control measure
Program by preventing the printer from left the literal code or text of the computer
functioning. But it does not block another program or data freely readable. And several
relevant form of “access”-the “ability to [ ] cases apply the provision in what seems to
obtain” a copy of the work or to “make use us its most natural sense. See, e.g., 321
of” the literal elements of the program (its Studios v. Metro Goldwyn Mayer Studios,
code). Because the statute refers to Inc., 307 F.Supp.2d 1085, 1095
“control[ling] access to a work protected (N.D.Cal.2004) (deciding that the “CSS”
under this title,” it does not naturally apply encryption program, which prevents viewing
when the “work protected under this title” is of DVD movies and copying of the data
otherwise accessible. Just as one would not encoded on the DVD, effectively controls
say that a lock on the back door of a house access to copyrighted DVD movies);
“controls access” to a house whose front Universal City Studios, Inc. v. Reimerdes,
door does not contain a lock and just as one 111 F.Supp.2d 294, 318 (S.D.N.Y.2000),
would not say that a lock on any door of a aff'd sub nom., Corley, 273 F.3d 429;
house “controls access” to the house after its Sony Computer Entm't Am. Inc. v.
purchaser receives the key to the lock, it Gamemasters, 87 F.Supp.2d 976, 987
does not make sense to say that this (N.D.Cal.1999) (deciding that technological
provision of the DMCA applies to measure on PlayStation game console,
otherwise-readily-accessible copyrighted which prevented unauthorized games from
works. Add to this the fact that the DMCA being played, effectively controlled access
not only requires the technological measure to copyrighted CD-ROM video games,
to “control[ ] access” but also requires the which the facts of the case do not describe
measure to control that access “effectively,” as either encrypted or unencrypted); see also
17 U.S.C. § 1201(a)(2), and it seems clear RealNetworks, 2000 WL 127311, at *3
that this provision does not naturally extend (noting that the technological measure at
to a technological measure that restricts one issue was a “successful means of protecting
form of access but leaves another route wide against unauthorized duplication and
open. See also id. § 1201(a)(3) distribution” of copyrighted digital works);
(technological measure must “require [ ] the Pearl Investments, LLC v. Standard I/O,
application of information, or a process or a Inc., 257 F.Supp.2d 326, 349-50
treatment ... to gain access to the work”) (D.Me.2003) (determining that plaintiff's
(emphasis added). See The Chamberlain “encrypted, password-protected virtual
Group, Inc. v. Skylink Techs., Inc., 381 F.3d private network,” which blocked access to
1178, at *1183, 2004 U.S.App. LEXIS data including plaintiff's copyrighted
18513, at *52 (Fed.Cir. Aug. 31, 2004) computer software, was a technological
(“Chamberlain's proposed construction of measure that effectively controlled access to
the DMCA ignores the significant that work).

20
DVDs protected by an encryption algorithm
[36] Lexmark defends the district court's cannot be watched without a player that
contrary ruling on several grounds. First, it contains an access key); Reimerdes, 111
contends that SCC waived this argument by F.Supp.2d at 303 (same); Gamemasters, 87
failing to raise it in the district court. The F.Supp.2d at 981 (Sony's game console
premise of this argument remains unclear. prevented operation of unauthorized video
Below, SCC indeed claimed that the DMCA games). As shown above, the DMCA applies
by its terms did not cover its conduct. While in these settings when the product
SCC may not have anticipated the district manufacturer prevents all access to the
court's specific reliance on the “to make use copyrightable material and the alleged
of” definition of “access” in its preliminary infringer responds by marketing a device
injunction ruling, the district court's ruling that circumvents the technological measure
also does not say that SCC conceded the designed to guard access to the
point. Under these circumstances, it is well copyrightable material.
within our discretion to allow SCC to
explain why the district court's resolution of The copyrightable expression in the Printer
this purely legal question-an interpretation Engine Program, by contrast, operates on
of a statute-is mistaken. See McFarland v. only one plane: in the literal elements of the
Henderson, 307 F.3d 402, 407 (6th program, its source and object code. Unlike
Cir.2002). the code underlying video games or DVDs,
“using” or executing the Printer Engine
Second, Lexmark counters that several cases Program does not in turn create any
have embraced a “to make use of” definition protected expression. Instead, the program's
of “access” in applying the DMCA. While output is purely functional: the Printer
Lexmark is partially correct, these cases Engine Program “controls a number of
(and others as well) ultimately illustrate the operations” in the Lexmark printer such as
liability line that the statute draws and in the “paper feed[,] paper movement[,][and]
end explain why access to the Printer Engine motor control.” Lexmark Br. at 9; cf. Lotus
Program is not covered. Dev., 49 F.3d at 815 (determining that menu
command hierarchy is an “uncopyrightable
In the essential setting where the DMCA method of operation”). And unlike the code
applies, the copyright protection operates underlying video games or DVDs, no
on two planes: in the literal code governing encryption or other technological measure
the work and in the visual or audio prevents access to the Printer Engine
manifestation generated by the code's Program. Presumably, it is precisely because
execution. For example, the encoded data on the Printer Engine Program is not a conduit
CDs translates into music and on DVDs into to protectable expression that explains why
motion pictures, while the program Lexmark (or any other printer company)
commands in software for video games or would not block access to the computer
computers translate into some other visual software that makes the printer work.
and audio manifestation. In the cases upon Because Lexmark's authentication sequence
which Lexmark relies, restricting “use” of does not restrict access to this literal code,
the work means restricting consumers from the DMCA does not apply.
making use of the copyrightable expression
in the work. See 321 Studios, 307 [37] Lexmark next argues that access-
F.Supp.2d at 1095 (movies contained on control measures may “effectively control

21
access” to a copyrighted work within the works will most likely be encrypted and
meaning of the DMCA even though the made available to consumers once payment
measure may be evaded by an “ is made for access to a copy of the work.
‘enterprising end-user.’ ” Lexmark Br. at 46 [People] will try to profit from the works of
(quoting RealNetworks, 2000 WL 127311, at others by decoding the encrypted codes
*9). Doubtless, Lexmark is correct that a protecting copyrighted works, or engaging
precondition for DMCA liability is not the in the business of providing devices or
creation of an impervious shield to the services to enable others to do so.”
copyrighted work. See RealNetworks, H.R.Rep. No. 105-551, pt. 1, at 10. Backing
2000 WL 127311, at *9; Reimerdes, 111 with legal sanctions “the efforts of
F.Supp.2d at 317-18 (rejecting argument that copyright owners to protect their works
an encryption measure does not “effectively from piracy behind digital walls such as
control access” because it is only a “weak encryption codes or password protections,”
cipher”); see also17 U.S.C. § 1201(a)(3). Corley, 273 F.3d at 435, Congress noted,
Otherwise, the DMCA would apply only would encourage copyright owners to make
when it is not needed. digital works more readily available,
seeS.Rep. No. 105-190, at 8. See also
But our reasoning does not turn on the Nimmer § 12A.02[B][1].
degree to which a measure controls access to
a work. It turns on the textual requirement Nowhere in its deliberations over the DMCA
that the challenged circumvention device did Congress express an interest in creating
must indeed circumvent something, which liability for the circumvention of
did not happen with the Printer Engine technological measures designed to prevent
Program. Because Lexmark has not directed consumers from using consumer goods
any of its security efforts, through its while leaving the copyrightable content of a
authentication sequence or otherwise, to work unprotected. In fact, Congress added
ensuring that its copyrighted work (the the interoperability provision in part to
Printer Engine Program) cannot be read and ensure that the DMCA would not diminish
copied, it cannot lay claim to having put in the benefit to consumers of interoperable
place a “technological measure that devices “in the consumer electronics
effectively controls access to a work environment.” 144 Cong. Rec. E2136 (daily
protected under [the copyright statute].” 17 ed. Oct. 13, 1998) (remarks of Rep. Bliley).
U.S.C. § 1201(a)(2)(B). See generally Anti-Circumvention
Rulemaking Hearing, at 44-56, at
Nor can Lexmark tenably claim that this http://www.copyright.gov/1201/2003/hearin
reading of the statute fails to respect gs/transcript-may9.pdf (testimony of
Congress's purpose in enacting it. Congress Professor Jane Ginsburg) (Section 1201(a)
enacted the DMCA to implement the does not “cover[ ] the circumvention of a
Copyright Treaty of the World Intellectual technological measure that controls access
Property Organization, and in doing so to a work not protected under [the
expressed concerns about the threat of Copyright] title. And if we're talking about
“massive piracy” of digital works due to ball point pen cartridges, printer cartridges,
“the ease with which [they] can be copied garage doors and so forth, we're talking
and distributed worldwide virtually about works not protected under this title.”).
instantaneously.” S.Rep. No. 105-190, at 8
(1998). As Congress saw it, “copyrighted C.

22
sequence and ... cannot qualify as
[38][39] In view of our conclusion regarding independently created when they contain
the Printer Engine Program, we can dispose exact copies of Lexmark's Toner Loading
quickly of Lexmark's DMCA claim Programs.” D. Ct. Op. ¶ 94, at 47.
regarding the Toner Loading Program. The
SCC chip does not provide “access” to the Because the issue could become relevant at
Toner Loading Program but replaces the the permanent injunction stage of this
program. And to the extent a copy of the dispute, we briefly explain our disagreement
Toner Loading Program appears on the with this conclusion. In particular, the court
Printer Engine Program, Lexmark fails to did not explain why it rejected SCC's
overcome the same problem that undermines testimony that the SMARTEK chips do
its DMCA claim with respect to the Printer contain other functional computer programs
Engine Program: Namely, it is not the SCC beyond the copied Toner Loading Program
chip that permits access to the Printer data. The affidavit of Lynn Burchette, an
Engine Program but the consumer's SCC manager, states that “[the SMARTEK]
purchase of the printer. One other point chip has a microprocessor, with software
deserves mention. All three liability routines we developed that control its
provisions of this section of the DMCA operation and function. Our chip supports
require the claimant to show that the additional functionality performed by our
“technological measure” at issue “controls software beyond that of [the chip on
access to a work protected under this Lexmark's toner cartridges].” JA 103. And
title,”see17 U.S.C. § 1201(a)(2)(A)-(C), Dr. Goldberg testified that “Static Control
which is to say a work protected under the has written a substantial amount of software
general copyright statute, id.§ 102(a). To for managing this chip; for not only
the extent the Toner Loading Program is not providing the int[er]operability features, but
a “work protected under [the copyright also for managing the additional
statute],” which the district court will functionality that the [chip manufacturer]
consider on remand, the DMCA necessarily provides and which the remanufacturers
would not protect it. may want.” JA 1023.

D. Instead of showing why these statements are


wrong, Lexmark contends that this is not
[40] The district court also rejected SCC's “credible evidence” that “independently
interoperability defense-that its replication created computer programs” exist on the
of the Toner Loading Program data is a SMARTEK chip. Yet Lexmark bears the
“technological means” that SCC may make burden of establishing its likelihood of
“available to others” “solely for the purpose success on the merits of the DMCA claims.
of enabling interoperability of an See Leary v. Daeschner, 228 F.3d 729, 739
independently created computer program (6th Cir.2000). Because Lexmark has
with other programs.” 17 U.S.C. § offered no reason why the testimony of
1201(f)(3). In rejecting this defense, the SCC's experts is not “credible evidence” on
district court said that “SCC's SMARTEK this point and has offered no evidence of its
microchips cannot be considered own to dispute or even overcome the
independently created computer programs. statements of Burchette and Goldberg, SCC
[They] serve no legitimate purpose other also has satisfied the “independently created
than to circumvent Lexmark's authentication computer programs” requirement and may

23
benefit from the interoperability defense, at why SCC's SMARTEK chip violates any
least in the preliminary injunction context. state tort or other state law.

[41] Lexmark argues alternatively that if V.


independently created programs do exist, (1)
they must have existed prior to the “reverse Because Lexmark failed to establish a
engineering” of Lexmark's Toner Loading likelihood of success on any of its claims,
Program, and (2) the technological means whether under the general copyright statute
must be “necessary or absolutely needed” to or under the DMCA, we vacate the district
enable interoperability of SCC's SMARTEK court's preliminary injunction and remand
chip with Lexmark's Printer Engine the case for further proceedings consistent
Program. As to the first argument, nothing in with this opinion.
the statute precludes simultaneous creation MERRITT, Circuit Judge, concurring.
of an interoperability device and another I agree with the Court's opinion as far as it
computer program; it just must be goes; but, on the record now before us, I
“independently” created. As to the second would go further in limiting the scope of the
argument, the statute is silent about the remand. As the Court explains, the Toner
degree to which the “technological means” Loading Program is not copyrightable
must be necessary, if indeed they must be because of the merger and scenes a faire
necessary at all, for interoperability. The doctrines, and even if it were copyrightable
Toner Loading Program copy satisfies any SCC's use of the program in this case
such requirement, however, because without appears to fall under the fair use exception.
that program the checksum operation Its purpose, though commercial in nature,
precludes operation of the printer (and, was only to sell cartridges that could be used
accordingly, operation of the Printer Engine by Lexmark printers rather than to profit by
Program), unless the checksum value infringing any Lexmark copyright. The fact
located elsewhere on the chip is modified- that the Toner Loading Program is not
which appears to be a computational copyrightable defeats both Lexmark's direct
impossibility without the contextual claim to copyright infringement and its
information that Lexmark does not disclose. DMCA claim based on the Toner Loading
See supra. Program (because the DMCA only prevents
the circumvention of measures that protect
Also unavailing is Lexmark's final argument copyright-protected works). And I agree
that the interoperability defense in § that Lexmark's DMCA claim based on the
1201(f)(3) does not apply because clearly copyright-protected Printer Engine
distributing the SMARTEK chip constitutes Program fails because the authentication
infringement and violates other “applicable sequence does not, and is not intended to,
law” (including tortious interference with “effectively control[ ] access” to the Printer
prospective economic relations or Engine Program.
contractual relations). Because the chip
contains only a copy of the thus-far I write separately to emphasize that our
unprotected Toner Loading Program and holding should not be limited to the narrow
does not contain a copy of the Printer facts surrounding either the Toner Loading
Engine Program, infringement is not an Program or the Printer Engine Program. We
issue. And Lexmark has offered no should make clear that in the future
independent, let alone persuasive, reason companies like Lexmark cannot use the

24
DMCA in conjunction with copyright law protective measures “for the purpose” of
to create monopolies of manufactured goods pirating works protected by the copyright
for themselves just by tweaking the facts of statute. Unless a plaintiff can show that a
this case: by, for example, creating a Toner defendant circumvented protective measures
Loading Program that is more complex and for such a purpose, its claim should not be
“creative” than the one here, or by cutting allowed to go forward. If Lexmark wishes to
off other access to the Printer Engine utilize DMCA protections for (allegedly)
Program. The crucial point is that the copyrightable works, it should not use such
DMCA forbids anyone from trafficking in works to prevent competing cartridges from
any technology that “is primarily designed working with its printer.
or produced for the purpose of
circumventing a technological measure that Reading the DMCA in pari materia with the
effectively controls access to a [protected] rest of the copyright code supports this
work.” 17 U.S.C. § 1201(2)(A) (emphasis interpretation. The DMCA should be used as
added). The key question is the “purpose” of part of the copyright code as it applies to
the circumvention technology. The computer software codes and other digital
microchip in SCC's toner cartridges is media. To this extent, the specific “purpose”
intended not to reap any benefit from the language of the DMCA modifies the more
Toner Loading Program-SCC's microchip is abstract language of the previous copyright
not designed to measure toner levels-but law. As the Court explains, the fair use
only for the purpose of making SCC's exception in copyright law explicitly looks
competing toner cartridges work with to the purpose of the one making the copy in
printers manufactured by Lexmark. determining whether or not such copying
violates the statute, and the DMCA itself
By contrast, Lexmark would have us read contains a reverse engineering exception
this statute in such a way that any time a that also demonstrates Congress's aim
manufacturer intentionally circumvents any merely to prevent piracy. I agree with the
technological measure and accesses a Court that both exceptions apply to SCC's
protected work it necessarily violates the actions in this case. But we should be wary
statute regardless of its “purpose.” Such a of shifting the burden to a rival
reading would ignore the precise manufacturer to demonstrate that its conduct
language-“for the purpose of”-as well as the falls under such an exception in cases where
main point of the DMCA-to prohibit the there is no indication that it has any
pirating of copyright-protected works such intention of pirating a protected work. See,
as movies, music, and computer programs. e.g., Lawrence Lessig, Free Culture 187
If we were to adopt Lexmark's reading of (2004) (noting the danger that “in America
the statute, manufacturers could potentially fair use simply means the right to hire a
create monopolies for replacement parts lawyer to defend your right to create”). A
simply by using similar, but more creative, monopolist could enforce its will against a
lock-out codes. Automobile manufacturers, smaller rival simply because the potential
for example, could control the entire market cost of extended litigation and discovery
of replacement parts for their vehicles by where the burden of proof shifts to the
including lock-out chips. Congress did not defendant is itself a deterrent to innovation
intend to allow the DMCA to be used and competition. Misreading the statute to
offensively in this manner, but rather only shift the burden in this way could allow
sought to reach those who circumvented powerful manufacturers in practice to create

25
monopolies where they are not in principle replacement parts like toner cartridges.
supported by law. Instead, a better reading
of the statute is that it requires plaintiffs as For these additional reasons, I concur in the
part of their burden of pleading and Court's opinion reversing the judgment of
persuasion to show a purpose to pirate on the district court. On remand the first
the part of defendants. Only then need the question should be whether Lexmark can
defendants invoke the statutory exceptions, show the requisite “primary purpose” to
such as the reverse engineering exception. In pirate a copyrighted work rather than to
this case, even if the Toner Loading Program ensure that their own cartridges work with
were protected by copyright, and even if the Lexmark's printer. If not, its case against
access to the Printer Engine Program were SCC should be dismissed.
“effectively” controlled, there has been no FEIKENS, District Judge, Concurring in
showing that SCC circumvented the part and Dissenting in part.
authentication sequence for the purpose of I begin this opinion by noting that my
accessing these programs. Indeed, the proof colleagues and I agree on a number of points
so far shows that SCC had no interest in regarding this case. We agree that this
those programs other than ensuring that their opinion does not foreclose any outcome on
own cartridges would work with Lexmark's the case in chief; instead, its decisions are
printers. limited to the grant of the preliminary
injunction below. We also agree that
Finally, this reading of the DMCA is also Plaintiff Lexmark failed to demonstrate a
supported by the provision in the likelihood of success on the merits of
Constitution that grants Congress the power success on the third count, which deals with
to regulate copyright. Article I, section 8, of the Printer Engine Program (PEP) (although
the Constitution gives Congress the power to I write to explain my own reasoning as to
regulate copyright in order to “promote the why that is, I also agree with the reasoning
Progress of Science and useful Arts.”U.S. of my colleagues). We agree that the Digital
Const. art. I, § 8, cl. 8. Congress gives Millennium Copyright Act (DMCA) was
authors and programmers exclusive rights to not intended by Congress to be used to
their expressive works (for a limited time) create a monopoly in the secondary markets
so that they will have an incentive to create for parts or components of products that
works that promote progress. Lexmark's consumers have already purchased. Finally,
reading of the extent of these rights, we agree on the outcome of the second
however, would clearly stifle rather than count, although we come to that conclusion
promote progress. It would allow authors for different reasons.
exclusive control over not only their own
expression, but also over whatever For the reasons explained below, however, I
functional use they can make of that dissent as to the majority's decision on the
expression in manufactured goods. Giving first count, regarding the copyrightability
authors monopolies over manufactured and infringement of the Toner Loading
goods as well as over their creative Program (TLP).
expressions will clearly not “promote the
Progress of Science and the useful Arts,” but I. Count One
rather would stifle progress by stamping out
competition from manufacturers who may The first count before us deals with the
be able to design better or less expensive question of whether the Toner Loading

26
Program (TLP) at issue here is the district court's initial finding that the
copyrightable. My colleagues give three TLP was sufficiently original to be
reasons for their findings: first, that the TLP copyrightable.
is not sufficiently original to qualify for
copyright protection; second, that the My colleagues rely on testimony from
district court erroneously failed to apply the Defendant's expert Goldberg, who
doctrines of merger and scenes a faire to the concluded that external factors dictated the
copyrightability question; and third, the way the TLP was written and that the
district court erred in assessing whether the proposals for alternative ways of writing the
TLP functions as a lock-out code. TLP offered by Plaintiff's expert Maggs
were inefficient and repetitive. My
I feel that the record could support a finding colleagues find both that a lookup table does
that there was enough original expression in not “differ meaningfully” from the use of
the TLP to qualify it for copyright equations and that as a matter of law, the
protection. Second, although I agree that the equations that were used in the TLP,
district court erred in its factual findings alternative equations, and a lookup table are
supporting the conclusion that the TLP was “different ideas or methods of operation
not functioning as a lock-out code, I feel the altogether”. I am at a loss to understand how
record offers support for the proposition that two things that do not differ meaningfully
it is possible and practical for competitors to are altogether different. I would hold that
make toner cartridges that function with the each of these alternatives are different
printer without copying the Toner Loading expressions of the same idea (monitoring
Program, and therefore, I would remand that and reporting on toner levels). I would also
issue to the district court to make a find that there is factual support in the
determination in the first instance. Third, record for the proposition that there are a
although I agree with my colleagues that the variety of expressions that are practical
district court erred in applying the law of the options given the external factors that
doctrine of merger and scenes a faire, I constrain the program. Nothing in the record
would apply the doctrines in this case suggests that a look up table could not be
differently. expressed in the limited number of bytes or
the requisite computer language. In fact,
A. Whether the TLP Contains Original given that sample code was provided for
Expression alternatives, in my mind, I think it is entirely
possible that the district court could
I agree with my colleagues that in discerning conclude, based on this record, that a TLP
whether a work is “original” as required by using (for instance) a lookup table could be
17 U.S.C. § 102(a), and not unprotectable written efficiently and practically. Therefore,
under 17 U.S.C. § 102(b), the court should I would uphold the district court's decision
ask whether the ideas, methods of operation, on originality, or at most, remand the case
and facts of the program could have been for the district court to reconsider its
expressed in any form other than that chosen decision on originality and make more
by the programmer, taking into specific factual findings to support its
consideration the functionality, preliminary injunction.
compatibility, and efficiency demanded of
the program. However, I part ways on the B. Whether the TLP Is a Lock-Out Code
question of whether the record could support

27
My colleagues and I agree that the district colleagues rely on Dr. Goldberg's testimony
court's finding of fact # 79 is inadequate to that the second method is “computationally
support the conclusion the district court impossible”, and though I do not agree that
drew about the practical possibility or the record is unchallenged on this point,FN2 I
impossibility of using the printer without agree that the record leans strongly toward
copying the TLP verbatim.FN1 (If verbatim impossibility as a practical matter. However,
copying was necessary, then the TLP I depart from the opinion of my colleagues
essentially acted as a “password” or a lock- sharply when I consider the third option.
out code.) However, while my colleagues
see the record as supporting only the finding FN2. On cross-examination,
of impossibility, I find the record decidedly Lexmark's expert, Maggs, said “it
mixed on the issue. wouldn't be easy” to figure out
where and what the checksum value
FN1. I also believe the district court should be without contextual
made another clear error in the information. JA 0953. I read this as
factual findings relating to the TLP, contradicting Goldberg's statement
although it was harmless. In finding that it would be “impossible.” In
of fact # 40, the district count found addition, Lexmark offered the
that for one of the printers in statement of another manufacturer of
question, “7 bytes of Toner Loading toner cartridges, who said it was not
Program...are used as an input to the impossible to achieve “a 100 percent
SHA-1 [in the T620/622 printer working solution” for compatibility
model].” JA 0273. Yet in finding of with the printer (presumably the 100
fact # 67, the district court found that percent figure includes access to a
“the contents of the Toner Loading program that would accurately report
Program are irrelevant to the SHA-1 when toner was running low),
for calculating the MAC.”JA 0278. I although “it has become a much
believe this second finding of fact is more difficult endeavor[...]”. JA
inaccurate; the TLP is not irrelevant 0214.
to the SHA-1 if it is used as an input.
However, because the chip's content As I explain below, I believe the record
dictates the input into the SHA-1, the offers strong evidence that the third option
authentication sequence will is possible, even without contextual
complete successfully regardless of information as to the location of the “off”
the TLP content. Therefore, the switch. Therefore, although my colleagues
district court's error is harmless. appear to believe that the checksum
operation must conclude successfully for the
There are three ways to make a chip that printer to operate, I do not believe the record
achieves compatibility between a re-filled supports this finding. I believe there is
Prebate cartridge and the printers at issue: uncontroverted evidence in the record that it
(1) copy Lexmark's chip (and therefore the is possible to manufacture a chip that never
TLP) verbatim; (2) replace the TLP with a triggers the checksum sequence, and the
different program and change the checksum printer can still operate-in fact, this is
value accordingly; or (3) turn the entire TLP exactly what occurs with the non-Prebate
sequence “off” with the flip of a single bit. cartridges. Further, I believe that the record
Here, Defendant chose the first option. My offers evidence that it was unnecessary for

28
Defendant to copy the TLP to make the more than enough evidence for a court to
cartridge compatible with the printer, even find that option three is vastly easier than
with no contextual information about the option two.
location or existence of the “off switch”, and
would remand to the district court to make The record states that the off switch works
new factual findings and determine that regardless of what the values of all other bits
question for itself. on the chip are. JA 0708. Therefore, the
maximum number of tests that must be run
Lexmark offered evidence that the third to find the off switch can be represented as
option was possible. In the testimony of two times the number of bits that might be
Maggs, when the questioning turned to the the off switch (since there are only two
third option of turning the entire TLP values of each bit, 0 and 1). In contrast, the
process off with the flip of a single bit, he checksum's operation is relative to the
said it would take “a few days or a few values of other bits on the chip. In other
weeks maybe” of trial and error to find the words, in contrast to the off switch, a
bit that turned off the TLP process. JA 0953- working checksum value depends on the
4. When asked about the one-bit off switch, position of 55 other bytes,FN3 or 440 other
Goldberg only stated that he did not know it bits. JA 0706. This means that no bit can be
existed, because Defendants could not tested independently, and instead, the tester
determine what the bit did. JA 1030. must search for a “match” between a
However, Goldberg stated previously that particular setting of the TLP bytes and the
Defendant ran a very similar test as part of checksum value. Thus, even though there is
its attempt at reverse engineering, in which clearly more than one way to set all the bits
it flipped one of every eight bits in the TLP. to have the chip function, basic principles of
JA 0575. mathematics tell us that the number of tests
that must be done to find a working
My colleagues argue that Lexmark has checksum and arrangement of bits rises
introduced no evidence that option three, exponentially FN4 in comparison to the test
finding the off switch, was “less arduous” for single, independently-functioning off
than option two, finding a working switch. Therefore, I think this record amply
checksum. This is simply false. Lexmark's supports the proposition that it is much
expert testified that it would take a “few simpler to find the off switch than it is to
days or a few weeks” to reverse engineer the find a working checksum.
one-bit “off switch” by “brute force,”
assuming you did not know where the “off FN3. For the larger of the two TLPs
switch” was. JA 0954. Given this testimony, at issue here.
I think it is improper for my colleagues to
decide that reverse engineering a working FN4. Or, depending on the method
chip was impossible, instead of remanding used to calculate the checksum,
this question to the district court. factorially.

However, even without Maggs' testimony, I The record with regard to what I describe as
think it is evident from this record that the third option, reverse-engineering the off
option three is considerably less arduous switch for the TLP process, could
than option two. The undisputed evidence in reasonably support the finding that it is
the record about the chip's design offers possible to find that switch without

29
contextual information, and hence to 1082 (9th Cir.2000). The Fifth Circuit holds
reverse-engineer a working chip even that merger determines copyrightability.
without a memory map or other contextual Mason, 967 F.2d 135, 138, fn. 5.
information. The factual determination of
whether such reverse engineering is possible As I read the majority's opinion, my
in turn decides the factual question of colleagues have declined to take a position
whether or not the TLP is a lock-out code. on this split, but I would do so, because of
This factual finding significantly impacts the importance of this decision to the
any decision about the use of the merger DMCA count. As I discuss later in my
doctrine as a defense to infringement by analysis of Count II, the DMCA only
Defendant, and therefore the likelihood of protects works that are protected by Title 17
success on the merits by Plaintiff. Because of the U.S.Code or in which the copyright
of the importance of the question, and the owner has a right under Title 17. 17 U.S.C.
insufficiency of the factual findings made by 1201(a)(1)(A); 17 U.S.C. 1201(b)(A).
the district court on this question, I would Therefore, if the doctrine of merger is
remand to the district court for it to make applied at the copyrightability stage, and
that finding in the first instance. merger is found to have occurred, Plaintiff
will have failed to state a claim on which
C. Doctrines of Merger and Scenes a relief can be granted under the DMCA.
Faire However, if the doctrine of merger is applied
at the infringement stage, then even if
1. Merger merger is found to have occurred, some
analysis of the DMCA's scope of protection
I believe my colleagues offer a good of the TLP is in order. Therefore, in my
description of the law of merger, and I will view, it is essential to decide whether merger
not restate that law here. However, there is of a work with a method of operation
one aspect of merger my colleagues do not determines the initial question of
decide that I believe is important to this copyrightability of the work, or operates
case: a Circuit split regarding the law of only as a defense to infringement.
merger.
Although I would exercise judicial economy
Simply put, there is some disagreement and limit the holding to the case of merger
about whether the merger doctrine acts as a with a method of operation (which is the
bar to copyrightability, or simply as a question I believe this case presents FN5), for
defense to particular types of infringement. the reasons below, I would find the merger
See Nimmer 13.03[B][3]; Mason v. doctrine can operate only as a defense to
Montgomery Data, Inc., 967 F.2d 135, 138, infringement in that context, and as such has
fn. 5 (5th Cir.1992); Kregos v. Associated no bearing on the question of
Press, 937 F.2d 700, 705 (2nd Cir.1991). copyrightability.FN6
The Sixth Circuit has not previously taken a
position on this question. The Second and FN5. In an analogous situation, the
Ninth Circuits have taken the position that Ninth Circuit chose to address the
merger operates only as a defense to copying of an access code using the
infringement. Kregos v. Associated Press, fair use doctrine. Sega Enterprises
937 F.2d 700, 705 (2d Cir.1991); Ets- Ltd. v. Accolade, Inc., 977 F.2d 1510
Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, (1993). I think this situation is better

30
understood as a merger with a expressive purposes (for instance, as part of
method of operation, and not as a fair a book of poetry) would not have this
use. However, I will discuss Sega defense. For these reasons, I would hold that
further when I discuss the fair use in cases where the merger is with a method
doctrine. of operation, the merger doctrine should be
applied as a defense to infringement only,
FN6. Nimmer finds this is generally and not as informing the question of
the better view of the merger copyrightability of the work itself.
doctrine. § 1303[B][3].
Applying that reasoning to this case, the
The Copyright Act denies copyright TLP can remain copyrightable as a computer
protection to, among other things, methods program, and therefore retain some of the
of operation. 17 U.S.C. § 102(b). However, protections of copyright law, even if it is a
an otherwise copyrightable text can be used lock-out code. Defendant can still avoid
as a method of operation of a computer-for infringement, however, if it uses the TLP
instance, an original, copyrightable poem only as a method of operation. For instance,
could be used as a password, or a computer Defendant can only claim this defense to
program as a lock-out code. In my view, infringement if it uses the TLP to interface
therefore, it is necessary to know what the with the Lexmark printers at issue, and if it
potential infringer is doing with the material is a necessary method of operation of the
in order to know if merger has occurred. In machine. It would not be able to assert the
other words, if I use my own copyrighted same merger defense to infringement if it
poem as a password or lock-out code, an manufactured its own printers and inserted
individual who published the poem as part the copied TLP as part of its own Printer
of a book could not escape a finding of Loading Program, even if it originally
liability for infringement. The rationale for copied the TLP for the purpose of
the merger doctrine is that without it, certain interfacing with Lexmark printers.
ideas or methods of operation would be Importantly, as this case is concerned,
removed from the public realm because all Defendant could not successfully assert this
ways of expressing them would be defense if (as a practical matter and not as a
copyrighted. When a poem or program is theoretical question) the printer could be
used as a lock-out code, it is being used as a operated without copying the TLP. In my
step in a method of operation of the thing it view, any finding of merger with a method
is locking. Therefore, to protect a work from of operation in this case would act as a
copying when it is used as a password would defense to infringement, but leave the TLP
be to prevent the public from using a method potentially copyrightable (and therefore
of operation. allow it to qualify for the additional
protections of the DMCA).
Under this reasoning, an individual who
copied a poem solely to use as a password I support a remand on the question of
would not have infringed the copyright, whether or not the TLP is operating as a
because in that scenario, the alleged lock-out code on the chips in question.
infringer would have the defense that the Therefore, I would also remand the question
poem has “merged” with a method of of whether the TLP has merged with a
operation (the password). By contrast, method of operation in Defendant's
someone who copied the poem for SMARTEK chip, because the two questions

31
are essentially equivalent.
I believe Feist stands for the proposition that
2. Scenes a Faire a creative enough arrangement of otherwise
uncopyrightable elements would in fact be
In computer programs, the scenes a faire copyrightable. Feist Publications, Inc. v.
doctrine has been restated as a determination Rural Telephone Service Co., 499 U.S. 340,
of whether external constraints on the size 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991). In
and content of a program, and standard that situation, a wholesale copying of the
programming practices, are so deterministic program (such as we have in this case)
of the content of program that the contents might still constitute infringement, even
of the program are analogous to the “stock though the program is entirely made up of
scenes” of literature. Gates Rubber Co. v. scenes a faire, because the copyrightable
Bando Chem. Indus., Ltd., 9 F.3d 823, 838 arrangement would be copied. In addition, a
(10th Cir.1993). Courts have recognized that program (like the one before us) may be a
a rare work may be entirely made up of blend of scenes a faire and material that is
scenes a faire, but many works will be a not dictated by norms or constraints, and in
combination of scenes a faire and more my mind, copying either a substantial part of
original elements. See, e.g., Reed-Union an original arrangement or copying enough
Corp. v. Turtle Wax, Inc., 77 F.3d 909, 914 of the non-scenes a faire elements would
(7th Cir.1996). still constitute infringement.

As I read it, Defendant's argument is Finally, there is a Circuit split regarding the
essentially that because the equations stage at which to apply the scenes a faire
involved in the TLP are standard and their doctrine that parallels the split as to the
arrangement involved no creativity, the merger doctrine. 4 Nimmer § 13.03[B][4], at
program was one of those rare works that is 13-76-7 n. 180.1; Reed-Union Corp. v.
entirely made up of scenes a faire and the Turtle Wax, Inc., 77 F.3d 909, 914 (7th
arrangement of those non-copyrightable Cir.1996) (holding the doctrine of scenes a
elements is not creative enough to allow the faire is separate from the doctrine regarding
work any protections of copyright. The the validity of a copyright); Ets-Hokin v.
record is undisputed on the point that there Skyy Spirits, Inc., 225 F.3d 1068, 1082 (9th
are elements of the program (some code that Cir.2000) (recognizing the split and citing
translates to LMX) that do not play a Reed-Union favorably on this question);
functional role and appear to be installed for Taylor Corp. v. Four Seasons Greetings
the purpose of proving verbatim copying in LLC, 315 F.3d 1039, 1042-3 (8th Cir.2003)
an action like this one. I think it is (finding that the scenes a faire doctrine
unquestionable that these elements are not determined whether substantial similarity
scenes a faire, and they were copied Thus, I existed); Hoehling v. Universal City
believe that regardless of any other finding, Studios, Inc., 618 F.2d 972 (2nd Cir.1980),
there is a likelihood that some portion of the cert. denied, 449 U.S. 841, 101 S.Ct. 121,
work would not be classified scenes a faire. 66 L.Ed.2d 49 (1980) (holding that scenes a
However, because it is not clear whether that faire are not copyrightable). The Sixth
portion alone would be creative enough to Circuit has not explicitly taken a position on
merit copyright, I will discuss the scenes a this split, although in a case regarding “stock
faire doctrine's application to this case, as I scenes” in a movie decided after this case
see it. was argued, the Sixth Circuit held that

32
scenes a faire are “too general to qualify for not the scenes a faire doctrine applies.
copyright protection” and applied the Therefore, I would distinguish Stromback
doctrine before considering substantial and take the other side of the Circuit split for
similarity. Stromback v. New Line Cinema, cases regarding the application of the scenes
384 F.3d 283, 296 (6th Cir.2004). The a faire doctrine, when its extension
district court took the position that the regarding external constraints for computer
scenes a faire doctrine should be applied as a programs is at issue.
defense to infringement, and therefore, on
that position alone, this case would require D. Fair Use
remand for consideration in light of
Stromback, 384 F.3d at 304-05. My I agree with my colleagues that the question
colleagues take the position that Stromback in the first element of the fair use defense is
did, namely that the scenes a faire doctrine “whether the user stands to profit from
determines copyrightability. exploitation of the copyrighted material
without paying the customary price.”
Clearly, this panel is bound to follow the Harper & Row, Publishers, Inc. v. Nation
decision in Stromback. However, I believe Enters., 471 U.S. 539, 562, 105 S.Ct. 2218,
that Stromback can and should be 85 L.Ed.2d 588 (1985) (emphasis added). I
distinguished in the area of computer part ways with my colleagues, however, in
programming. The doctrine of scenes a faire their application of that doctrine here.
has been expanded in the area of computing
beyond the traditional literary “stock Here, we have the curious situation that
scenes” to include those elements that are Defendant says it did not know the TLP
dictated by external constraints. Gates existed, while arguing that the use is fair.
Rubber Co. v. Bando Chem. Indus., Ltd., 9 Thus, while Defendant undoubtedly had the
F.3d 823, 838 (10th Cir.1993). Therefore, in purpose of selling exact copies of the
this area, application of the scenes a faire Lexmark chip (which contained the TLP)
doctrine does require some understanding of “for private commercial gain” (which
how the element is being used: as I read the weighs against a fair use defense), it
case law, if an otherwise copyrightable apparently did not have the purpose of
arrangement was dictated by external selling the TLP itself (although it did so).
constraints, it would classified as scenes a
faire. However, if external constraints, Harper & Row does say that the defendant's
norms, etc. did not dictate a particular use in that case “had not merely the
arrangement in a defendant's work, but a incidental effect but the intended purpose of
defendant copied a particular arrangement supplanting the copyright holder's
anyway, it is not clear to me that the case commercially valuable right.” Id. at 562,
law would still classify that same 105 S.Ct. 2218 (emphasis in original). Thus,
arrangement as scenes a faire-instead, the I believe, my colleagues read the case to say
work might qualify for some protection that Plaintiff, in order to prove a likelihood
from infringement. Thus, I think when of success, must show that the user intended
applying the extension of the scenes a faire to benefit from the copying of the TLP, and
doctrine for computer programs, the district not simply intended to benefit from the sale
court's rule is superior because it is of an exact copy of the Lexmark chip that
necessary to understand the circumstances happened to contain the TLP.
of the copying in order to know whether or

33
Here, I part ways. I think that Defendant had it was doing so. Therefore,
the intended purpose of making money from Defendant potentially benefited from
an exact copy of Plaintiff's chip. I do not the creative energy that Lexmark
think that this prong can or should be devoted to writing the program code.
transformed into a prong weighing in favor Although a commercial use does not
of “fair use” because Plaintiff's alleged necessarily block a finding of a fair
violation of copyright protections was done use, Campbell v. Acuff-Rose Music
unknowingly.FN7 The Court in Harper & Inc., 510 U.S. 569, 114 S.Ct. 1164,
Row said it could not “ignore [the 127 L.Ed.2d 500 (1994), I think this
defendant's] stated purpose of first type of commercial use is what
publication.” Id. Likewise, I think we Congress intended to weigh against a
should not ignore that this Defendant knew finding of fair use.
it was making an exact copy of a computer
chip, and it did so in order to benefit With respect to the fourth factor, which
commercially from whatever content was on involves the effect Defendant's use had on
the chip. In other words, Defendant copied the value of the copyrighted material, I
that chip for the purpose of gaining disagree with my colleagues on the question
whatever commercial value such a chip had. of whether Plaintiff was required to
Therefore, this factor is at best neutralized introduce evidence of the independent
by the fact that Defendant did not know that market for TLPs, or if evidence that the
the commercial value was potentially partly market for the cartridges was impacted was
derived from copyright rights, and this enough. I agree that the Supreme Court
factor therefore should not weigh against instructs us that “[a] use that has no
Lexmark.FN8 demonstrable effect upon the potential
market for, or the value of, the copyrighted
FN7. In my mind, this is consistent work need not be prohibited [...].” Sony
with the understanding that Corp. of Am. v. Universal City Studios, Inc.,
copyright infringement does not 464 U.S. 417, 450, 104 S.Ct. 774, 78
have an element of scienter. L.Ed.2d 574 (1984). My difference with my
colleagues emerges from my belief that the
FN8. Moreover, my colleagues argue words “or value of” suggest that in
that SCC used the TLP for “a situations in which the market for the work
different purpose, one unrelated to itself does not necessarily represent the
copyright protection. Rather than value of the work, the value of the work is
using the Toner Loading Program to what a court should consider. I believe the
calculate toner levels...”. The record value of the TLP is represented by the
is uncontested on the point that it is market for toner cartridges, and therefore, it
the copied TLP that calculates the is not necessary for Plaintiff to introduce
toner levels for the refilled Prebate evidence about the TLP market in order to
cartridges, and governs when the demonstrate a likelihood of success on this
“toner low” message will be factor. In other words, the potential
displayed. Therefore, Defendant's commercial benefit from copying the TLP
product did use the program for the accrues because the TLP on the chip at issue
same purpose as the Plaintiff's did-to adds functionality to the toner cartridge,
monitor and report on toner levels- which in turn may enhance the market for
even if Defendant did not realize that the cartridge itself.

34
court to gather the evidence necessary to
I think the district court could easily find make this determination and reconsider its
that a toner cartridge that accurately tells a findings on fair use in light of that additional
user when the toner is running low is more evidence.
valuable than one that does not. More
specifically, unlike my colleagues, I think II. Count Two
the market for SCC's cartridges containing
the SMARTEK chip might have been As discussed under Count I, the DMCA only
impacted negatively if the printer offers its additional protections to those
inaccurately reported toner levels when works that are already protected by Title 17
using an SCC cartridge. Therefore, as I see of the U.S.Code or those works in which the
it, the TLP on the chip increased the value of copyright owner has a protected right under
Defendant's toner cartridge if the TLP Title 17. 17 U.S.C. 1201(a)(2)(A); 17
Defendant copied is better able to report on U.S.C. 1201(b)(A). Because I believe that
toner consumption than a chip without the this record does not allow the elimination of
TLP would be. If no TLP was on the chip, copyrightability on the grounds of
the printer would use the default TLP code originality, merger, or scenes a faire, I
in the Printer Engine Program to warn users believe some analysis of the DMCA claim
of low toner levels. However, there is no regarding the TLP is necessary. However, I
evidence in the record that speaks to note that the DMCA explicitly leaves the
whether the default TLP that comes with the defenses to copyright infringement,
printer would be able to accurately report including the fair use doctrine, unaltered. 17
the amount of toner in a Prebate cartridge, or U.S.C. § 1201(c). Therefore, if the district
whether it would misreport the level of toner court on remand were to find that the
to the user. Thus, there is no evidence in the merger, scenes a faire, or fair use doctrine
record one way or another regarding supplied an adequate defense to
whether Defendant's cartridge is more infringement, given the copying that went
valuable because the cartridge contains the on in this case, I do not believe Plaintiff
TLP than it would be if the cartridge did not. could meet its burden to show likelihood of
success under 17 U.S.C. § 1201(b), because
In conclusion, I think the market for these there would be no “right of a copyright
cartridges may very well be impacted by the owner” to prevent the TLP's use in this
ability of the toner cartridges to make an fashion.
accurate report of toner levels. I do not
believe Lexmark needs to introduce I believe Plaintiff also failed to meet its
evidence showing that an independent burden under both 1201(a) and 1201(b),
market exists for the TLP-I think the court however, because it failed to present
can assume an impact to the primary market evidence that the chip was primarily
for the re-filled cartridges, provided that the designed or produced for the purpose of
copied TLP lent additional functionality to accessing the TLP.
the cartridge. Therefore, because the benefit
(or lack thereof) gained from copying the Interestingly, unlike traditional copyright
TLP on the chip instead of using the printer's law, there is an element of scienter present
default TLP is necessary to deciding the fair in the DMCA: in order to be a violation of
use question, and because the record is silent the Act, any technology that is marketed
on this point, I would remand to the district must have been “primarily designed or

35
produced for the purpose of circumventing” record, I think a court would have to
a technological measure or other protection carefully weigh whether such a situation
of a work (or a portion of the work) means that Defendant's product was
protected under Title 17. 17 U.S.C. “produced for the purpose of
1201(a)(2)(A); 17 U.S.C. 1201(b)(A). Here, circumventing” protections of the TLP.
I think the evidence before the trial court
was overwhelming on the point that while My reasoning on this count is based on my
Defendant “primarily designed” the chip to belief that consumers did not have an
circumvent any protections of the Printer implied license to use the copyrightable TLP
Engine Program, the chip was not “primarily beyond the first re-fill of the Prebate
designed or produced for the purpose of” cartridge. With the assumption that the
circumventing protections for the TLP. shrinkwrap agreement was valid and
Therefore, even if the checksum sequence enforceable (I believe Lexmark can
can be categorized as a lock-out code that demonstrate a likelihood of success on that
must be circumvented in order for the TLP question FN10), I would conclude consumers'
on the chip to be used, or the primary implied license to use the copyrighted TLP
authentication sequence is seen as a did not extend beyond the first re-fill of the
protection for both the TLP and the Printer Prebate cartridge. The TLP at issue is not
Engine Program, because the chip was present in the printer at purchase. Instead,
primarily designed to allow access to the the consumer gains access to using it by
Printer Engine Program FN9 and not the TLP, purchasing the Prebate toner cartridge
I believe Plaintiff has not demonstrated a (which stores the programs in its microchip).
likelihood of success on this count. The Prebate toner cartridge is only sold
under a special shrinkwrap agreement that
FN9. I discuss why I believe the requires that the cartridge be returned to
DMCA does not reach the Printer Lexmark when it is empty and may not be
Engine Program in my discussion of re-filled by others for reuse. Since the
Count III. consumer is only authorized to use the
Prebate cartridge until the toner runs out, it
However, I emphasize the narrow bounds of follows that the license also blocks the
my position. The record before the trial consumer from using the TLP after that
court at the preliminary injunction stage time.
points overwhelmingly to the conclusion
that Defendant did not realize the TLP was FN10. SCC contends that such
on the chip. If evidence showed Defendant shrinkwrap agreements are not
knew or should have known that there was a enforceable. In support of this, at
program on the chip, and that it was least one amicus brief cites a 2001
practical for the Defendant to manufacture a Federal Circuit court decision that
chip that did not access (and therefore use) held there must be a “meeting of the
the TLP, in my mind, that would be a minds” in order for restrictions in the
different case. Under that scenario, the agreement to be enforceable. Jazz
defendant would know of the protection, be Photo Corp. v. Int'l Trade Comm.,
able to achieve the purpose of operating the 264 F.3d 1094, 1108 (Fed.Cir.2001),
printer without circumventing that cert. denied, 536 U.S. 950, 122 S.Ct.
protection, and yet still choose to 2644, 153 L.Ed.2d 823 (2002). Other
circumvent those protections. On such a circuits have upheld the validity of

36
shrinkwrap agreements. See, e.g., from that of my colleagues.
ProCD, Inc. v. Zeidenberg, 86 F.3d
1447 (7th Cir.1996) (holding that III. Count Three
terms inside a box of software bind
consumers who use the software In contrast to the TLP, I believe the
after an opportunity to read the terms consumer has a right to use the Printer
and to reject them by returning the Engine Program for the life of the printer.
product). Here, the shrinkwrap Because the consumer has this right, there is
agreement was clear and the district no right of the copyright owner to prevent
court could find that it supports the the consumer from using the Printer Engine
conclusion that there was a meeting Program, and therefore, Defendants cannot
of the minds and the agreement is be found to be in violation of the DMCA.
enforceable. To wit: “This all-new Though the words are never used, I think the
cartridge is sold at a special price concept of this license is present in my
subject to a restriction that it may be colleagues opinion. I agree with their
used only once. Following this initial reasoning regarding this count, and write on
use, you agree to return the empty this issue only because I believe it sheds
cartridge only to Lexmark for additional light on my reasoning regarding
remanufacturing and recycling. If Count Two.
you don't accept these terms, return
the unopened package to your point All the Lexmark printers at issue here come
of purchase. A regular price cartridge with the Printer Engine Program installed. In
without these terms is available.” fact, it would be impossible for the printer
Finally, I note this case is factually to work at all without such a program, just at
different from Hewlett-Packard Co. it would be impossible for the printer to
v. Repeat-O-Type Stencil Mfg. Corp. work without an engine. Therefore, when
Inc., 123 F.3d 1445 (Fed.Cir.1997), the consumer buys the printer, the consumer
in which the shrinkwrap agreement must be buying the right to use not just the
contained only a warning against physical printer components, but also the
refilling, and did not condition the Printer Engine Program that allows those
sale on a promise not to refill. physical components to produce printed
pages. By buying a Lexmark printer, the
The TLP was part of the cartridge, and consumer acquires an implied license to use
therefore, when the consumer was able to the Printer Engine Program for the life of
use the TLP after the cartridge had been that printer.
emptied of toner and re-filled by Defendant
(in violation of the shrinkwrap agreement), The DMCA defines “circumventing a
in my mind, he or she gained unauthorized technological measure” to mean avoid,
access to the TLP. However, the record bypass, etc., “a technological measure,
currently supports the finding that without the authority of the copyright
Defendant did not have the requisite owner.” 17 U.S.C. § 1201(a)(3)(A)
knowledge of the TLP to form an intent to (emphasis mine). Therefore, under the plain
primarily design or produce a chip for the meaning of the law, circumventing a
purpose of gaining access to it. Therefore, I technological measure it is only a violation
concur on the outcome of the second count, of § 1201(a) if the device allows consumers
although my reasoning would be different access to a work that they are not otherwise

37
permitted to have. Therefore, even if gaining access to or making a copy of a
Defendant has circumvented the work” [emphasis mine]. HR Rep. 105-846
authentication sequence to gain access to the (Jan. 2, 1999). This understanding of §
Printer Engine Program, or designed a chip 1201(b) was also clear in the Senate
with that as its main purpose, it has not discussions of the DMCA. It stated that the
violated the statute, because it has not given prohibitions in § 1201(a) were made
anyone access to the program who did not “meaningful” through the provisions of §
already have authority from Lexmark to use 1201(b), which were intended to enforce
it. In fact, it would be impossible to use the “the longstanding prohibitions on
toner cartridge's chip to gain illegal access to infringements.” S. Rep. 105-190 (May 11,
the Lexmark Printer Engine Program, 1998). It reiterated that § 1201(b) is intended
because only consumers with Lexmark to attack those devices that “facilitate
printers would use the toner cartridge, and copyright infringement.” Id. Because
they already own the right to use the Printer Defendant's chip can only make non-
Engine Program. infringing uses of the Lexmark Printer
Engine Program, it is clear Congress did not
If this language of the statute were not intend the DMCA to apply in this situation.
enough, it is clear from the legislative
history that Congress did not intend this IV. Conclusion
provision to apply to devices that merely
facilitated legitimate access. In the House of For the reasons stated above, I dissent from
Representative's Commerce Committee's the majority's opinion with regard to Count
report on the DMCA, it stated explicitly that One. Although I concur with the result in
the aim of § 1201(b) was to restrict devices Count Two, I do not agree with the
used primarily for piracy, and not those that reasoning of my colleagues and offer my
facilitate legal use of products. In discussion own approach. Finally, I concur with both
of § 1201(b), the Committee stated, “This the reasoning and result for Count Three, but
provision is not aimed at products that are give my own additional reasons for why that
capable of commercially significant non- is so.
infringing uses, such as consumer
electronics, telecommunications, or C.A.6 (Ky.),2004.
computer products [...] used by businesses Lexmark Intern., Inc. v. Static Control
and consumers for perfectly legitimate Components, Inc.
purposes.” HR Rep. 105-796 (October 8, 387 F.3d 522, 2004 Copr.L.Dec. P 28,887,
1998). The Committee also stated that § 72 U.S.P.Q.2d 1839
1201(b)(1) seeks to prohibit “making or
selling the technological means to overcome END OF DOCUMENT
these protections and thereby facilitate
copyright infringement ” [emphasis mine].
Id. In its January 1999 report discussing §
1201(b), the Commerce Committee again
clarified that the measure was intended to
outlaw trade in “devices with no substantial
non-infringing uses that are expressly
intended to facilitate circumvention of
technological measures for purposes of

38

Das könnte Ihnen auch gefallen