Lead Opinion
delivered the opinion of the Court on Motion for Rehearing,
The motion for rehearing is overruled. Our opinion of June 8, 1995, is withdrawn and the following is substituted in its place.
This case comes to us on certified questions from the United States Court of Appeals for the Second Circuit. Computer Assocs. Int'l, Inc. v. Altai, Inc.,
I
Claude Amey, a developer of computer software, was employed by Computer Associates International, Inc., in its Dallas office from 1978 until January 1984. During his employment, Arney signed an employment agreement which prohibited him from retaining or divulging Computer Associates’ trade secrets. In January 1984, Arney left Computer Associates to accept employment at Altai, Inc. In an exit interview, Arney represented that he retained no proprietary information of Computer Associates and would not divulge Computer Associates’ trade secrets to any third party. However, when Arney left Computer Associates he took copies of the computer source code for two versions of ADAPTER. ADAPTER is an operating system compatibility component of CA-SCHEDULER, which is a job scheduling program for IBM mainframe computers. ADAPTER connects CA-SCHEDULER with the three different operating systems used on IBM mainframe computers and enables CA-SCHEDULER to run on any of the IBM operating systems. ADAPTER was also used with a group of Computer Associates’ programs called the DYNAM line. However, ADAPTER is not a separate product and is not capable of operating as an independent product. Before Arney left Computer Associates, Altai developed ZEKE, a job scheduling program for IBM mainframe computers which was similar to CA-SCHEDULER. In early 1984, Arney copied approximately thirty percent of the ADAPTER source code to write OSCAR 3.4 for Altai. It is undisputed that no one at Altai (other than Arney) knew that Arney possessed the ADAPTER source code or that Amey had copied portions of the source code when he created OSCAR 3.4. OSCAR 3.4 is Altai’s operating system compatibility component which was used in several of Altai’s programs, including ZEKE. Like ADAPTER, OSCAR 3.4 is not a separate product and is not capable of operating as an independent product. From 1985 to August
In July 1988, Computer Associates first discovered that Atai had copied and used the ADAPTER source code in several of its computer programs. In August 1988, Computer Associates sued Atai in federal district court for misappropriation of trade secrets and copyright infringement. Among other things, the federal district court determined that Computer Associates’ action for misappropriation of trade secrets under Texas law was preempted by the federal copyright act. Computer Assocs. Int’l, Inc. v. Altai, Inc.,
II
Computer Associates argues that the discovery rule exception to the two-year statute of limitations should apply to a claim of misappropriation of trade secrets. A trade secret is any formula, pattern, device or compilation of information which is used in one’s business and presents an opportunity to obtain an advantage over competitors who do not know or use it. Hyde Corp. v. Huffines,
To answer this question, we must understand the objective of statutes of limitations. The purpose of statutes of limitations is to compel the assertion of claims within a reasonable period while the evidence is fresh in the minds of the parties and witnesses. Price v. Estate of Anderson,
Similar to the discovery rule exception, where fraud is alleged, we have granted the claimant the benefit of deferring the cause of action until the claimant discovered or should have discovered the fraud. Ruebeck v. Hunt,
Unrelated to fraud or concealment, this Court has permitted the discovery rule exception in certain limited circumstances. From these cases, we can glean a unifying principle which facilitates balancing those factors that are considered before this Court has permitted application of the discovery rule exception to the statute of limitations. Generally, application has been permitted in those cases where the nature of the injury incurred is inherently undiseoverable and the evidence of injury is objectively verifiable. The requirement of inherent undiscoverability recognizes that the discovery rule exception should be permitted only in circumstances where “it is difficult for the injured party to learn of the negligent act or omission.” Willis v. Maverick,
We note that, in Willis, we also relied on the fiduciary relationship obligating an attorney to “render a full and fair disclosure of facts material to the client’s representation.”
We now consider whether to permit the application of the discovery rule exception to the statute of limitations in misappropriation of trade secret cases in light of the unifying principle: (1) whether the injury is inherently undiseoverable; and (2) whether evidence of the injury is objectively verifiable. Computer Associates asserts that it could not have reasonably discovered the theft of its trade secret within two years after Altai’s first actual use. Therefore, Computer Associates argues that its cause of action was inherently undiseoverable. It bolsters its contention by focusing on Altai’s oral stipulation which states that Computer Associates did not know or have reason to know of Altai’s alleged misappropriation within the two-year statute of limitations. Computer Associates misconstrues the meaning of “inherently undiseoverable.” Inherently undis-coverable encompasses the requirement that the existence of the injury is not ordinarily discoverable, even though due diligence has been used.
In this age of technological innovation, intellectual property, including trade secrets, is a jealously guarded commodity. Extensive
Additionally, we live in a world of high employee mobility and easy transportability of information. Under these circumstances, it is not unexpected that a former employee will go to work for a competitor and that the competitor might thereby acquire trade secrets. Dorr & Munch, at xiii; Epstein, at 84-84.1; Seidel, What the General Practitioner Should Know about Trade Secrets and Employment Agreements § 3.01, at 21-22 (2d ed. 1984). This reality is reflected in the confidentiality agreement requested of and exit interview given to Arney by Computer Associates. Vigilance in the area of trade secrets is required, particularly because once a trade secret is made public all ownership is lost. See, e.g., Luccous v. J.C. Kinley Co.,
In the past, this Court has noted the “shocking results” of barring a plaintiffs suit before the injury has even been discovered. See Gaddis,
Before concluding, we note that the principle we have applied has two elements. The second element is that the alleged injury be objectively verifiable. See e.g., Gaddis,
Finally, we recognize that thirty-nine states and the District of Columbia have adopted the Uniform Trade Secrets Act, which provides a discovery rule exception that tolls the statute of limitations in misappropriation of trade secret cases. See Unif. TRADE SECRETS Act § 6,14 U.L.A. 462 (1990) (citing laws of Alabama, Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, District of Colombia, Florida, Georgia, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Minnesota, Mississippi, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Oklahoma, Oregon, Rhode Island, South Carolina, South Dakota, Utah, Virginia, Washington, West Virginia and Wisconsin). No state supreme court, however, has yet adopted the discovery rule exception for trade secret cases as an exercise of its common law jurisdiction. See Pilkington Bros., P.L.C. v. Guardian Indus. Corp.,
Ill
Having determined that the discovery rule exception does not apply in this case, we must address Computer Associates’ challenge to the two-year statute of limitations period provided by section 16.003(a) as violating the “open courts” provision of Article I, Section 13 of the Texas Constitution. It does not. The “open courts” provision guarantees that “meaningful remedies must be afforded, ‘so that the legislature may not abrogate the right to assert a well-established common law cause of action unless the reason for its action outweighs the litigants’ constitutional right of redress.’ ” Trinity River Auth.,
The traditional rule in Texas is that a cause of action accrues and the two-year limitations period begins to run as soon as the owner suffers some injury, regardless of when the injury becomes discoverable. Trinity River Auth.,
IV
We answer the questions certified to us as follows: (1) a discovery rule exception to
APPENDIX
United States Court of Appeals for the Second Circuit
Docket No. 93-7957
Computer Associates International, Inc., Plaintiff-Appellant,
-against-
Altai, Inc., Defendant-Appellee.
Certificate to the Supreme Court of Texas pursuant to Tex.R.App.P. 114(a) (West 1993) (permitting certification of questions of state law for which there is no controlling precedent in the decisions of the Supreme Court of Texas).
In January 1984, Claude F. Arney, III left the Texas offices of his employer of five years, Computer Associates International, Inc. (“CA”), a developer of computer software, to go to work for a competitor, Altai, Inc. (“Altai”). See Computer Assocs. Int’l v. Altai, Inc.,
In late July 1988, CA first learned that Altai might have copied the ADAPTER program. Id. at 554. After confirming its suspicions, CA secured copyrights on versions 2.1 and 7.0 of CA-SCHEDULER. Id. In August 1988, CA brought suit against Altai in federal district court, invoking diversity jurisdiction.
After consulting counsel about how to proceed, Williams organized an operation to rewrite the OSCAR program. Working primarily from a different Altai program, Williams wrote descriptions of various services that the rewritten OSCAR would per
After a bench trial, the district court found that Altai’s OSCAR 3.4 computer program had infringed the ADAPTER component of CA’s copyrighted computer program CA-SCHEDULER. Id. at 558. The court awarded CA a total of $364,444 in actual damages and apportioned profits on copyright claims stemming from OSCAR 3.4. Id. at 572. The district court also determined, however, that OSCAR 3.5 was neither substantially similar to nor copied from ADAPTER, and accordingly denied CA relief on its copyright claims regarding that version of Altai’s program. Id. at 561-62. Finally, although noting that Texas state law would govern CA’s trade secret misappropriation claim, id. at 566, the district court concluded that CA’s misappropriation claim against Altai had been preempted by the federal Copyright Act. Id. at 563-66. While recognizing that the torts of misappropriation and copyright infringement might be distinct in some cases, the district court reasoned that on the facts of this case, the claims “boil[ed] down to the same thing — a right of action for the unauthorized reproduction of, and preparation of derivative works based on, ADAPTER.” Id. at 564. Because both claims involved a copyrightable work, the district court concluded that “all claims concerning copying [are] governed, exclusively, by federal [copyright] law.” Id. at 565.
Altai did not perfect an appeal from the award of damages with respect to OSCAR 3.4, but CA appealed the denial of relief with respect to OSCAR 3.5. See Computer Assocs. Int’l v. Altai, Inc.,
On remand, the parties briefed the trade secret issues under Texas law. Altai also asserted the affirmative defense, first invoked in its answer and also presented in its post-trial memorandum, that CA’s claims were barred by the applicable Texas statute of limitations, Texas Civil Practice & Remedies Code Atm. § 16.003(a) (Vernon 1986).
A person must bring suit for trespass for injury to the estate or to the property of another, conversion of personal property, [or] taking or detaining the personal property of another ... not later than two years after the day the cause of action accrues.
The Texas Court of Civil Appeals (now designated the Court of Appeals) has applied article 5526 of the Texas Civil Statutes, the forerunner of § 16.003, to claims involving the misappropriation of trade secrets. See Reynolds-Southwestern Corp. v. Dresser Indus.,
Under Texas law, the statute of limitations on tort claims generally begins to run when “the wrongful act effects an injury, regardless of when the plaintiff learned of such injury.” Moreno v. Sterling Drug, Inc.,
The district court declined to address the merits of CA’s misappropriation claims on remand, instead dismissing them as barred under § 16.003(a). Although the district court had earlier opined that CA’s claims for misappropriation of trade secrets would be subject to the discovery rule under Texas law, see Altai I,
Altai conceded at trial that CA did not know or have reason to know of Altai’s alleged misappropriation until 1988. Thus, if the discovery rule applied in this case, CA’s misappropriation claims would be timely under Texas law. However, the district court concluded that because the discovery rule did not apply, and because the allegedly wrongful act occurred in 1984 (four years before CA filed suit) when Arney began copying CA’s ADAPTER codes into OSCAR 3.4, the statute of limitations had run and CA’s claim was barred. Id. at 52, 54.
On appeal, CA contends that the district court erred in declining to apply the discovery rule in this case. CA argues that: (1) the Texas Court of Civil Appeals applied the discovery rule to a claim arising from the misappropriation of trade secrets in Reynolds-Southwestern Corp.,
Altai responds that: (1) Reynolds-Southwestern, which is in any event not a disposi-tive statement of Texas law, is distinguishable because, unlike this case, Reynolds-Southwestern involved a claim of fraud that overlapped the claim for misappropriation of trade secrets; (2) the discovery rule has primarily been applied by Texas courts to breaches of fiduciary duty by licensed professionals; (3) its application in other eases has been limited to more inherently undiscovera-ble wrongs than the alleged misappropriation of ADAPTER; and (4) CA’s failure to discover the alleged misappropriation resulted from its own laxity in safeguarding its trade secrets. Altai also points out that the “open courts” constitutional provision has only been invoked in Nelson and other Texas cases to invalidate a specific medical malpractice limitations provision that provided an inflexible two-year limitations period regardless of the discoverability of the injury inflicted by malpractice.
The decision to extend the discovery rule to a type of claim to which it has not previously been applied by the Supreme Court of Texas requires “careful[] eonsider[ation of] opposing policy considerations,” Kelley v. Rinkle,
Accordingly, because CA’s claims raise unsettled and significant questions of Texas law that control the outcome of this ease, see 2d Cir.R. § 0.27, we certify the following questions of law to the Supreme Court of Texas:
1. Does the discovery rule exception to § 16.003(a) apply to claims for misappropriation of trade secrets?
2. If not, would the application to such claims of the two-year limitations period provided by § 16.003(a) contravene the “open courts” provision of article I, § 13 of the Texas Constitution?
The foregoing is hereby certified to the Supreme Court of Texas pursuant to Tex.R.App.P. 114(a) as ordered by the United States Court of Appeals for the Second Circuit.
Dated at New York, New York, this__ day of April, 1994.
George Lange, III Clerk, United States Court of Appeals for the Second Circuit By:/s/ Carolyn Clark Campbell Carolyn Clark Campbell Chief Deputy Clerk
Notes
. The certified questions are included as an appendix to the Court’s opinion.
. See S.V. v. R.V., - S.W.2d - [
. "Source code” refers to "the literal text of a [computer] program's instructions written in a particular programming language,” Gates Rubber Co. v. Bando Chem. Indus.,
. CA is a Delaware corporation with its principal place of business in Garden City, New York. Altai is a Texas corporation, and has its principal place of business in Arlington, Texas. See Altai I,
. A federal court sitting in diversity applies the choice of law rules of the forum state. Klaxon Co. v. Stentor Elec. Mfg. Co.,
Concurrence Opinion
I concur in the judgment of the Court. I write separately because the Court’s opinion does not make it clear that the test of “inherently undiscoverable” and “objectively verifiable” is not determinative in every ease. There may be instances where these elements are present, but limitations should not be deferred because of other considerations. Conversely, there will be instances where the running of limitations should be deferred even though the injury is not “inherently undiscoverable” or “objectively verifiable”, such as some cases where fraud, fraudulent concealment, fiduciary duty or other special relationships are implicated.
The Court’s formulation of a two-step inquiry should not be read as the acid test whenever the discovery rule is invoked.
I
It could be inferred from today’s decision that if the injury is inherently undiscoverable and objectively verifiable, no other factors are to be considered. The discovery rule will apply. However, in certain circumstances, the injury may be inherently undiscoverable and objectively verifiable, yet there are valid reasons to refrain from applying the discovery rule.
This may arise in a trade secret case. The Court defines “inherently undiscoverable” as “not ordinarily discoverable, even though due diligence has been used.”
The Court concludes that the owner of a trade secret is in the best position to guard against theft of the information in the first place and should be required to do so. Id. at 458. The Court recognizes that many owners of intellectual property take extensive precautions to prevent the occurrence of theft or misappropriation. Id. at 456. It also acknowledges that we live in a world of high employee mobility and that the prospect of misappropriation is not a remote one. Id. at 457. The Court further concludes that vigilance in the area of trade secrets is required, particularly because all ownership of a trade secret is lost once it is made public. Id. at 457.
This case could easily have provided an example of a situation where the injury is inherently undiscoverable and objectively verifiable. The conclusion that the misappropriation was not “inherently undiscovera-ble” is a close call. At trial, Altai stipulated that Computer Associates did not know or have reason to know of the alleged misappropriation within the two-year period of limitations. The facts tend to bear this out. Computer Associates’ former employee purloined computer source code listings. He copied approximately thirty percent of these source code listings to create an operating system compatibility component for Altai. However, this operating system compatibility component was not capable of functioning as a separate product and could not be marketed as a separate product. Rather, Altai used it to facilitate the operation of some of its computer programs. It was these programs that were in competition with Computer Associates’ products. After the misappropriation was discovered by Computer Associates and suit was brought, Altai ceased using the component designed by Computer Associates’ former employee. Altai nevertheless was able to create a new system compatibility component for its programs that did not use any of Computer Associates’ trade secrets. These facts indicate that it would have been
II
The application of the “inherently undis-coverable” and “objectively verifiable” analysis also proves troublesome in cases involving a fiduciary duty or other special relationship. Indeed, even as the Court embraces its two-pronged inquiry, the Court struggles to reconcile that test with our decisions in the fiduciary arena. The Court asserts that we simply must presume the injury is inherently undiscoverable, whether it is or not, in fiduciary situations.
In eases where a lawyer has been sued by a client, we have not grounded our decisions on the notion that the injury was inherently undiscoverable or objectively verifiable, or even on the concept that the lawyer possessed superior knowledge. We have recognized that policy considerations and the fiduciary obligation owed by an attorney to a client may require the deferral of the running of limitations in some eases, even where the alleged negligence was actually known or could have been discovered before the statutory period of limitations would otherwise have run.
In Sanchez v. Hastings,
Finally, the analysis employed today by the Court should not govern at least some cases where fraud or fraudulent concealment is alleged. There have been no such allegations in this case, however.
Ill
Our Court has labored to bring clarity, consistency and predictability to our discovery rule jurisprudence, but we have not always been successful. In now articulating what we consider to be the unifying principles, we must also wrestle with some of our prior decisions in cases other than those concerning fraud, fraudulent concealment, a fiduciary duty, or other special relationship. Neither the rationale nor the results in certain of our discovery rule cases can be brought into line with the “inherently undis-coverable” and “objectively verifiable” analysis. This does not cut against utilizing this two-pronged inquiry. Generally, with the qualifications noted above, the “inherently undiscoverable” and “objectively verifiable” test is a good yardstick and should be adopted prospectively. However, we should be candid in admitting that when we apply it to some of our earlier decisions, they do not measure up.
Weaver v. Witt,
Similarly, in Hays v. Hall,
In Nelson v. Krusen,
Nelson v. Krusen also fails to meet the second prong of the test in Altai if we apply the rationale of another case decided today, S.V. v. R.V., — S.W.2d - (Tex.1996). Nelson v. Krusen was a medical misdiagnosis case, requiring expert testimony to establish the negligence. Nelson,
The point is that we have not been consistent in each and every one of our decisions. We should take this opportunity to inject consistency into the discovery rule area, to the extent reasonably possible, but also to recognize explicitly that the rationale of some of our earlier decisions does not fit within the analysis articulated today in Altai.
The two-part inquiry set out in Altai is not appropriate in some cases where fraud, fraudulent concealment, a fiduciary duty, or some other special relationship is implicated. In other cases the “inherently undiscovera-ble, objectively verifiable” analysis should be
. Acts 1975, 64th Leg., R.S., ch. 330, § 4, 1975 Tex.Gen.Laws 864, 865-66, repealed by Acts 1977, 65th Leg., R.S., ch. 817, § 41.03, 1977 Tex.Gen.Laws 2039, 2064.
