MEMORANDUM OPINION
This cases arises from a dispute between two companies involved in the migration of National Geographic film footage onto a searchable Internet website. Pending before the Court is defendant’s motion for summary judgment. Upon consideration of the motion, responses and replies thereto, oral argument during the motions hearing, applicable law, and the entire record, the Court grants in part and denies in part defendant’s motion.
I. BACKGROUND 1
NGT Library, Inc. (“NGTL”) is a wholly owned subsidiary of National Geographic Television, Inc. NGTL manages, preserves, and distributes film footage produced by National Geographic Television and used on the National Geographic Channel. NGTL developed a plan for moving the films produced for National Geographic Television into a searchable
A. DSMCi’s Product
Plaintiff DSMC, Inc. (“DSMCi”) developed its first Media Archive System 2 (“MAS”) in late 1998 while working on contracts with Computer Science Corporation and South Carolina Educational Television. DSMCi released three versions of is MAS Version 1 software. While the basic architecture of the MAS system remained constant in each version, DSMCi customized the product for each client. The third version, MAS Version 1.3, was for NGTL. 3 In customizing DMAS for NGTL, DSMCi used and integrated several third-party products including Oracle and Netscape products and Virage Video-Logger. DMAS consists of a series of HTML and JavaScripts that link the searchable NGTL Database to the Netscape web server, allowing users to access the website from the Internet, search through the database, and view selected video dips. DSMCi claims that its product contains capabilities not found in any other media archive system, including Convera’s Screening Room.
Defendant Convera Corporation (“Conv-era”) claims that DSMCi’s MAS Version 1 closely resembles a product described in a 1997 Virage publication and a 1997 Oracle software guide. Convera also claims that the methods required to implement a web-based, interactive, video-clip-asset indexing, search, and management system with a graphic user interface were published in thirteen patents prior to November 15, 2000. DSMCi disagrees with these characterizations to the extent it suggests that the trade secrets DSMCi claims exist in DMAS were present in these publications. 4
B. Convera’s Product
Convera developed a video database management product similar to MAS Version 1. Convera’s product, Screening Room, is a video cataloging, previewing and retrieval system that manages significant video libraries. Convera began development on Screening Room in 1997 and released the first version of the product in July 1998. As of December 2000, Screening Room included capture, edit, browse, analysis and search capabilities. By 2001, Convera had invested over $30 million in Screening Room and over $30 million in
Convera used Screening Room for a project with NASA to manage video from space shuttle flights and from the international space station. According to Convera, the Screening Room product customized for NASA allowed NASA to download, digitize and store online video feeds. The entire video library could also be searched and selected clips replayed. Convera claims that the Screening Room/ NASA deployment in late 2000 was Conv-era’s first implementation of a clip level search capability.
C. NGTL’s Contract with DSMCi
In November 2000, NGTL signed an Integration Services Agreement (“ISA”) with DSMCi, with an effective date of September 13, 2000. See ISA, Ex. 1 to Def.’s Mot. for Summ. J. Convera was not a party to the ISA and Convera claims that NGTL did not provide Convera a copy of the ISA. Convera further claims that it did not see a copy until this litigation commenced.
Under the ISA, DSMCi was to digitize approximately 2000 hours of NGTL video footage, create a searchable database of the metadata associated with the footage, together with descriptions of video clips, and host the NGTL Database on the Internet from December 6, 2000 until July 9, 2001, unless the hosting term was extended by NGTL. 5 In consultation with NGTL, DSMCi also developed the “structure, graphic design elements, and functionality requirements for the user interface.” ISA, Ex. A: Integration Services ¶ 1. The ISA also provided that DSMCi was to deliver to NGTL the “final NGTL Database backup” and also deliver to NGTL each month a back-up copy of the database. Def.’s Facts ¶ 12.
The ISA also provides that DSMCi granted a license for DSMCi’s software to NGTL during the term of the contract. See ISA ¶ 16(c)(i). Under this licensing agreement, NGTL agreed that it would not authorize any third party to “modify, reproduce, reverse engineer, decompile, cross-compile, disassemble, translate or decode, or otherwise attempt to discover the source code of or any processes or algorithms embodied in” DSMCi’s software. Id.
D. Convera Acquires NGTL Database Migration Project
In Spring 2001, Convera had several meetings with NGTL regarding Convera’s video database management capabilities. In April 2001, Convera and NGTL representatives met at a conference and discussed the future requirements of NGTL’s media archiving project. NGTL invited Convera to send its engineers to NGTL.
On May 10, 2001, Convera engineers Jim Rose and Brian Archibald met at the NGTL offices with representatives from NGTL and DSMCi. DSMCi CEO Duane Shugars attended at least part of this meeting. Shugars explained the DSMCi system to the Convera engineers. NGTL representative Gary Carter then demonstrated the NGTL website for Rose and Archibald. At the meeting, a Convera representative suggested that Convera and DSMCi sign a nondisclosure agreement. Such an agreement was signed by both companies on May 14, 2001.
The parties dispute a number of the facts surrounding the May 10, 2001 meeting. Convera states that Convera engineer Jim Rose asked Carter of NGTL if
On May 11, 2001, NGTL assigned Conv-era a username/password combination for the NGTL website. NGTL assigned Convera the “Wart” username.
That same day, Convera engineer Archibald informed other Convera engineers via email that Convera would have a copy of the “customized Oracle schema” then being used by NGTL so that Convera could “analyze what is necessary to ‘massage’ it and/or our SR schema to make SR work with the current NGS data.” Email from Brian Archibald to Convera engineers (May 11, 2001), Ex. 11 to Def.’s Mot. for Summ. J. Around the same time, NGTL sent Convera a backup copy of the NGTL database on DLT tape. Convera could not read this backup tape nor could it read a second tape sent by NGTL in June.
In mid-July, Convera project manager Shaun Henderson had NGTL load a copy of the NGTL backup for the database onto his laptop and then realized that the database was password protected. He then sent an email to Dean Watts and Gary Carter at NGTL to obtain a password so that Convera could look at the database schema. See Email from Shaun Henderson to Dean Watts and Gary Carter (July 17, 2001) (“I’m excited to report that we have got the DSMCi Oracle DB restored, but have found that it is password protected. Can we obtain the password to that DB, so that we can take a look at that schema?”). Two days later, Henderson obtained the “icepick” password from NGTL, allowing Convera access to the database on the backup tape and, as a result, DSMCi’s database schema.
E. NGTL/Convera Contract
On July 20, 2001, DSMCi and NGTL signed a Master Services Agreement (“MSA”). The contract required Convera to migrate and integrate the NGTL Database into Convera’s Screening Room software, add NGTL-requested functionality to operate Screening Room, and temporarily host the Screening Room/NGTL website. In the MSA, NGTL represented to Convera that “all Digital Content, Meta-data, and other material provided to Conv-era by NGTL or on its behalf may be reproduced and otherwise utilized as necessary by Convera” in its work for NGTL. MSA ¶ 6(a), Ex. 2 to Def.’s Mot. for Sum. J. NGTL tasked Convera with acquiring
F. Convera’s Migration of the NGTL Database to Screening Room
Convera claims that it used its Screening Room/NASA product as a base for creating the Screening Room/NGTL Database. Convera also claims that its engineers used the database schema from the NASA project as the base for Screening Room/NGTL. 7 Plaintiffs dispute this fact to the extent it suggests that Screening Room/NGTL does not include material copied from the DMAS schema. DSMCi points to emails and other documentary evidence that DSMCi claims shows that Convera freely admitted reverse engineering DSMCi’s schema. See, e.cj., High-Level Delay Analysis, Ex. 43 to Pl.’s Opp’n (indicating an understanding of the “database schema,” describing the “[r]eengi-neering effort,” and explaining the need to “reverse engineer the display of the frame images” and “compare how the DSMCi system displays the images to reverse engineer the logic”).
NGTL claims that it needed to have a detailed knowledge of the existing NGTL Database and the target Screening Room/ NGTL database in order to successfully migrate the data. DSMCi disputes that Convera needed detailed knowledge of the schema developed by DSMCi in order to complete the migration. Instead, DSMCi argues that Convera could have developed an independent media archiving system without access to the backup tape or DMAS but DSMCi claims that the cost of doing so would have been more than NGTL was willing to pay and could not have been accomplished within the time-line set by NGTL.
The NGTL Database consisted of approximately 30 million data elements, or approximately 2000 hours of video footage, keyframes (still shots taken from digitized video), and associated metadata. To migrate the database, Convera claims that it wrote program scripts that picked the individual data elements out of the NGTL Database and inserted them into the Screening Room/NGTL database. The DataMover scripts were produced to DSMCi in discovery.
Convera officially started its database conversion work in July 2001 and completed the project nine weeks later. To complete the project, Convera utilized the backup NGTL Database and “icepick” password provided by NGTL, and the full NGTL Database, which included video files and keyframes and was delivered to Convera by DSMCi on a Network Appliance storage device. Convera also used usernames and passwords supplied by NGTL to get basic user access to the NGTL website. NGTL, not DSMCi, had control over the registration of its website users. NGTL was one of only a few hundred registered basic users who had access to the NGTL website while it was being hosted by DSMCi.
Throughout the entire period that Conv-era had access to the DSMCi-hosted NGTL website, registered basic users could not access the software code on DSMCi’s internal network. DSMCi maintained a firewall between the Internet and its internal network. Internet users also
Convera engineers used the “Wart” us-ername to gain access to the NGTL Database from May 14 to August 16, 2001. The record suggests that, at least in May, DSMCi was aware that Convera had access to the NGTL Database. DSMCi had logs that recorded every action on the website, including the log-ons with the Wart username. On August 15, 2001, after learning that NGTL would not continue its hosting contract, DSMCi deleted Wart as a registered user. When Conv-era’s engineer (Stephen Chen) found out that the Wart username did not work, he selected another username “MRice” 8 from the user portion of the database to gain access to the website. DSMCi claims that it was not proper for Convera to use the MRice username to gain access to the NGTL Database. Both the Wart and MRice usernames gave Convera only basic user access. DSMCi claims that Convera also accessed the website on at least one occasion using the “AIQC” username. This username gave administrator access.
On August 21, 2001, Convera was told by NGTL that DSMCi and NGTL were involved in a dispute and Convera should stop all access to the NGTL website. Convera claims that it did so. However, even after Convera lost access to the website, DSMCi claims that Convera employees continued to receive critical information about DMAS’s functionality by having an NGTL employee ask questions of DSMCi and then report back to Convera. See Email from Shaun Henderson to Stephen Chen (Aug. 22, 2001), Ex. 45 to Pl.’s Opp’n.
Convera and DSMCi disagree on whether the August 21 conversation was the first time that Convera was aware that it should not access the NGTL website. On May 31, 2001, Convera representative David Teti spoke with DSMCi representative Gary Clarke. Clarke informed Teti that “DSMCi ... had detected an intruder, with a username starting with W, who was illegally accessing specific functionality in the DSMCi proprietary product developed for Nat Geo and that this was being tracked by an FBI agent.” Email from David Teti to Brian Archibald (May 31, 2001), Ex. 32 to Pl.’s Opp’n. On June 13, 2001, NGTL reaffirmed to DSMCi that NGTL would prevent access to DMAS by representatives and agents of competitors like Convera.
See
Letter from Gary Clarke, DSMCi Vice President, to NGTL representatives Chris Liedel and Bernard Callahan (June 13, 2001), Ex. 34 to Pl.’s Opp’n (recapping “[e]xplicit understanding that DSMCi is open and willing to provide specific and for a fee, professional services to and for Convera or other vendors selected by NGTL, but access to the DMAS by representatives and agents of direct competitors to DSMCi shall be prohibited”). There is some confusion in the deposition testimony of Dean Watts, NGTL’s principal contact with Convera, about whether Watts told Convera to discontinue
G. Allegations of Direct Copying of Client-Side Code
In late August 2001, Convera engineer Stephen Chen discovered that one of his engineers had used some client-side code from the NGTL website LOGIN page when developing webpages for the NGTL/Screening Room project. The client-side code included some code for font, colors, general layout and some JavaScript. Chen identified those webpages that possibly included code from the LOG-IN page and ordered destruction of those pages. He then assigned a second Conv-era engineer to re-create the pages from scratch. DSMCi disputes these facts to the extent that Convera suggests that it is certain that it removed all the infringing code, only relying on the deposition testimony of Chen. Convera notes that no DSMCi copyright information appears on the LOGIN page. Instead, only NGTL copyright information appears there.
II. DISCUSSION
A. Standard of Review
This Case is before the Court on defendant’s motion for summary judgment. Pursuant to Rule 56 of the Federal Rules of Civil Procedure, summary judgment should be granted only if the moving party has shown that there are no genuine issues of material fact and that the moving party is entitled to judgment as a matter of law.
See
Fed.R.Civ.P. 56;
Celotex Corp. v. Catrett,
B. Misappropriation of Trade Secrets
DSMCi claims that Convera misappropriated DSMCi’s trade secrets in violation of the District of Columbia Uniform Trade Secrets Act (“DCUTSA”), D.C.Code § 36-401,
et seq.
9
To establish a trade secret misappropriation claim, DSMCi must demonstrate (1) the existence of a trade secret; and (2) acquisition of the trade secret by improper means, or improper use or disclosure by one under a duty not to disclose.
See
D.C.Code § 36-401;
Catalyst,
1. Trade Secret
The “threshold inquiry” in every trade secret case is “whether or not there [is] a trade secret to be misappropriated.”
Catalyst,
Whether a particular piece of information is a trade secret is generally a question of fact.
Dreamcatcher Software Dev., LLC v. Pop Warner Little Scholars, Inc.,
In order to survive summary judgment, a plaintiff claiming that its software contains trade secrets must come forward with evidence sufficiently identifying those portions of the software or combination of features within the software that are not generally known in the industry.
See, e.g., IDX Systems Corp. v. Epic Systems,
Convera argues that it is entitled to summary judgment because DSMCi has not identified with sufficient particularity the portions of its software program that qualify for trade secret protection, i.e., that were not generally known by those skilled in the video database management industry. DSMCi counters that DMAS contains capabilities not found in any other media archive system, including Convera’s Screening Room. Specifically, DSMCi has identified nine different features of DMAS that it argues constitute protectable trade secrets. Unlike the plaintiff in
IDX Systems,
who just identified its entire software product as a trade secret without pointing to specific features that were trade secrets,
The Court notes that a trade secret “is one of the most elusive and difficult concepts in the law to define.”
Carbo Ceramics, Inc. v. Keefe,
2. Misappropriation
In addition to establishing that there is a trade secret, a plaintiff claiming misappropriation of trade secrets also must show that the defendant gained access to the trade secrets through improper means or that the defendant improperly used or disclosed trade secrets. Under the DCUTSA, “misappropriation” is defined as:
(A) Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or
(B) Disclosure or use of a trade secret of another without express or implied consent by a person who:
(i) Used improper means to acquire knowledge of the trade secret; or
(ii) At the time of disclosure or use, knew or had reason to know that the trade secret was:
(I) Derived from or through a person who had utilized improper means to acquire it;
(II) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use;
(III) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or
(iii)Before a material change in his or her position, knew or had reason to know that the information was a trade secret and knowledge of the trade secret had been acquired by accident or mistake.
D.C.Code § 36-401(2).
The DCUTSA defines “improper means” as “theft, bribery, misrepresentation, breach or inducement of a breach of duty to maintain secrecy, or espionage through electronic or other means.” D.C.Code § 36-401(1). Courts have held, however, that the statute does not provide an exhaustive list of what constitutes improper means.
See, e.g., Reingold v. Swiftships, Inc.,
DSMCi alleges that Convera used stealth, deception and trickery to gain access to DSMCi’s trade secrets. Specifically, DSMCi alleges that Convera (1) gained “wrongful” access to “phony” usernames and passwords to access DMAS; (2) used its “improper access” to reverse engineer DMAS in violation of the ISA signed between NGTL and DSMCi; (3) directly copied DSMCi’s backup tape; (4) conspired with NGTL to gather additional information by exploiting NGTL’s business
Convera counters that DSMCi cannot establish improper means because Conv-era accessed the NGTL website and database with passwords provided by NGTL. Convera further argues that it openly requested access to the NGTL Database at a meeting with NGTL and DSMCi and that Convera and DSMCi executed a nondisclosure agreement covering any confidential information to which Convera gained access during the database migration. Convera also contends that the DSMCi/ NGTL ISA directly contemplates migration of the database. Moreover, Convera argues that migration of the NGTL Database into Screening Room required taking approximately 30 million data elements out of the NGTL Database and inserting them into the Screening Room/NGTL database. Convera claims that the NGTL/Convera MSA required NGTL to provide Convera with a copy of the NGTL Database and its schema. Essentially, Convera argues that all access it has to the NGTL Database was with permission of NGTL and that such access is not misappropriation within the meaning of the DCUTSA. Convera also contends that DSMCi produced no evidence that Convera used or disclosed DSMCi’s trade secrets in violation of the DCUTSA.
The Court finds that there are genuine issues of material fact as to whether Conv-era misappropriated DSMCi’s alleged trade secrets. To name a few of the material disputes, the parties disagree about whether Convera knew that DSMCi did not want Convera to have access to its database schema, when Convera learned that DSMCi did not want Convera to have access, whether Convera used or disclosed DSMCi’s trade secrets, and whether Conv-era knew or should have known that NGTL owed a duty to DSMCi to maintain the secrecy of DSMCi’s intellectual property and keep its trade secrets confidential. Because there are genuine disputes of material fact as to the existence of trade secrets and whether those trade secrets were misappropriated, the Court denies summary judgment to Convera on the misappropriation of trade secrets claim.
C. Copyright Infringement
The Copyright Act provides that, (“no action for infringement of the copyright in any United States work shall be instituted until preregistration or registration of the copyright claim has been made in accordance with [the Copyright Act]”). 17 U.S.C. § 411(a). Copyright registration is a jurisdictional prerequisite to a court hearing a copyright infringement action.
See I.M.S. Inquiry Mgmt. Sys. v. Berkshire Info. Sys.,
On March 1, 2002, DSMCi filed a Certificate of Registration in the United States Copyright Office for the MAS Version 1.3 computer program that it used for NGTL. DSMCi also filed a portion of the MAS Version 1.3 source code with the
DSMCi and Convera disagree as to whether DSMCi’s schema for the NGTL database is part of the materials registered with the Copyright Office. DSMCi argues that the schema is “embodied in” the computer program that was registered in 2002. Pl.’s Opp’n at 31. Convera counters that any claims for copyright infringement of the database schema must be dismissed for lack of subject matter jurisdiction because the registered material does not include the schema. The Court rejects Convera’s narrow reading of what is protectable when a company registers a computer program and therefore declines to dismiss the copyright claim based on lack of subject matter jurisdiction.
A computer program is “a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.” 17 U.S.C. § 101. Copyright protection “extends to all the copyrightable expression
embodied in
the computer program.” United States Copyright Office, Circular 61,
Copyright Registration for Computer Programs
(2006) (emphasis added). Copyright protection extends not only to the literal elements of a computer program — source code and object code
11
— but also to the program’s nonliteral elements, which are “the products that are generated by the code’s interaction with the computer hardware and operating program(s).”
MiTek Holdings,
To prevail on a copyright claim, a plaintiff must demonstrate “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.”
Feist Publications, Inc. v. Rural Tel. Serv. Co.,
To prove the second
Feist
prong, the plaintiff must show that (1) the defendant copied the plaintiffs work as a factual matter and (2) that “the copying of copyrighted material was so extensive that it rendered the offending and copyrighted works substantially similar.”
Lotus,
DSMCi argues that the record is replete with direct evidence of Convera copying DSMCi’s database schema, user interface, and code. DSMCi further argues that Convera had extensive access to its copyrighted material by receiving the backup tape and “icepick” password from NGTL and through alleged wrongful access to the NGTL website. DSMCi also points to email and other documentary evidence in the record from which the Court can draw an inference at this stage that Convera accessed DMAS with the express purpose of examining DSMCi’s database schema and copying it. Accordingly, DSMCi has at least raised a genuine issue of fact as to whether there was copying as a factual matter.
Substantial similarity “is customarily an extremely close question of fact.”
Sturdza,
In this case, DSMCi points to evidence that suggests a “sufficient disagreement” regarding substantial similarity to survive summary judgment. Again, through email evidence and Convera’s internal documents, DSMCi argues that Convera accessed DMAS with the express purpose of creating something substantially similar. DSMCi argues that with access to the backup tape, “icepick” password, and user identification “Wart,” Convera was able to decipher the inner workings of DMAS. DSMCi also argues that there is substantial similarity between DMAS and
In allowing the copyright claim to go forward to trial, the Court also rejects Convera’s argument that any alleged intermediate copying of the database schema in order to write scripts to migrate the NGTL data into Convera’s Screening Room product was fair use under the copyright laws. In support of its claim that any alleged intermediate copying was fair use, Convera cites
Assessment Techs. of WI, LLC v. WIREdata, Inc.,
In this case, Convera is admittedly a direct competitor of DSMCi. The email evidence and internal documents from Convera discussed above suggest that Convera not only wanted to extract raw data but also wanted to create a product similar to DMAS that contained many of the same features as DMAS. Accordingly, Convera is in a very different posture than the parties in WIREdata and Sega who engaged in “intermediate copying.”
D. Conspiracy Claims
In its Third Amended Complaint, DSMCi alleges violations of the Virginia Business Conspiracy Act (“VBCA”), Va. Code §§ 18.2-499 and 18.2-500, and DC common law on civil conspiracy. 13 For both claims, DSMCi alleges that NGTL conspired with Convera “to provide Conv-era with access to the trade secrets and labor of [DSMCi], so that Convera could and did wrongfully engineer, misappropriate, copy, prepare derivatives from and circumvent DSMC’s right in its trade secrets and MAS software, and wrongfully avail itself to [DSMCi’s] labors.” Third Am. Compl. ¶¶ 50, 53. The conspiracy claims in the Third Amended Complaint are clearly focused on misappropriation of trade secrets.
Although DSMCi’s conspiracy claims in its Third Amended Complaint are clearly predicated on misappropriation of trade secrets, DSMCi tries to broaden the conspiracy claims in its opposition to Conv-era’s motion for summary judgment. DSMCi argues in its opposition brief that Convera and NGTL conspired to replace DSMCi as NGTL’s vendor, issued a press release in which Convera took credit for intellectual property developed by DSMCi, and acted in concert to willfully injure DSMCi’s business. DSMCi also argues that Convera and NGTL conspired to violate and did violate a federal criminal computer fraud statute (18 U.S.C. § 1030). The Court rejects DSMCi’s attempts to amend its complaint through its opposition to Convera’s motion for summary judgment.
See Shanahan v. City of Chicago,
E. Digital Millennium Copyright Act
DSMCi originally alleged a violation of the Digital Millennium Copyright Act (“DMCA”) in its Third Amended Complaint. However, in its opposition brief and at oral argument DSMCi indicated that this claim has been dismissed with the consent of counsel. The Court therefore need not reach the merits of this claim.
F. Setoff
The Third Amended Complaint alleged claims against both NGTL and Convera. NGTL, however, settled with DSMCi. If any damages are awarded to DSMCi after trial, Convera is entitled to a pro tanto setoff of the amount of DSMCi’s settlement with NGTL.
III. CONCLUSION
For the foregoing reasons, the Court grants in part and denies in part Conv-era’s Motion for Summary Judgment. The motion is granted as to the DMCA claim (Count III), civil conspiracy claim (Count VII), and VBCA claim (Count VIII). The motion is denied as to the misappropriation of trade secrets claim (Count I) and copyright infringement claim (Count II). An appropriate Order accompanies this Memorandum Opinion.
ORDER
In accordance with the accompanying Memorandum Opinion, it is by the Court hereby
FURTHER ORDERED that summary judgment is granted as to Count III (DMCA), Count VII (civil conspiracy), and Count VIII (VBCA) of the Third Amended Complaint and those claims are DISMISSED WITH PREJUDICE; and it is
FURTHER ORDERED that summary judgment is denied as to Count I (misappropriation of trade secrets) and Count II (copyright infringement) of the Third Amended Complaint; and it is
FURTHER ORDERED that pretrial proceedings shall commence pursuant to a separate Order issued this same day.
SO ORDERED.
Notes
. Unless otherwise indicated, all facts and alleged factual disputes noted in this section draw from the parties' Combined Statement of Material Facts ("Combined Facts”), which includes Convera's Statement of Facts Not Genuinely Disputed ("Def.'s Facts”), DSMCi’s Statement of Facts Genuinely in Issue ("Pl.’s Facts”), and Convera's Reply (“Def.’s Reply Facts”). See Ex. B to Convera's Brief in Response to Sur-Reply of DSMCi.
. "Media archiving systems, also known as media asset management systems, are complex content management systems that enable users to manage terabytes of video.” Expert Report of W. David Elliott ("Elliot Rpt”) at 2, Ex. 1 to DSMCi’s Opp’n to Def.’s Mot. for Summ. J. ("Pl.’s Opp'n”).
. The media archive system that DSMCi customized for NGTL is referred to as "DMAS" throughout this opinion. In the Integration Services Agreement signed by DSMCi and NGTL, "DMAS” refers to the entire NGTL database created pursuant to the ISA. See ISA ¶ 3(b), Ex. 1 to Def.’s Mot. for Summ. J. DMAS includes both "Integrator Software” and “Third Party Software.” Id. Integrator Software is the "object code versions of the software programs developed by or for [DSMC].” Id. ¶ 3(e)(i). Third Party Software refers to other third party software programs necessary to create DMAS, such as Virage VideoLogger, Verity brand search and retrieval software, and Oracle 8i. Id. ¶ 3(e)(ii).
.At times, DSMCi also demonstrated its software at National Association of Broadcasters ("NAB”) conferences and prepared demonstration websites to show its product on the Internet. DSMCi claims that these demonstrations did not reveal any trade secrets to the public.
. DSMC and NGTL agreed to two extensions of the hosting term, first to August 15, 2001, then to September 15, 2001. Def.'s Facts ¶ 14.
. The term "database schema” or “schema” "refers to the organization of data within a database.” Chen Decl. ¶ 7, Ex. 8 to Def.’s Mot. for Summ. J. The schema "may be represented as a diagram that shows the various tables in a database, and within each table identifies the fields and their definitions.” Id. The "complete schema, however, is typically an electronic file that includes details of all the tables, fields and relationships in the database.” Id.
. Convera’s development of the Screening Room/NGTL schema proceeded through multiple iterations and Convera produced all sixteen iterations of this schema to DSMCi in discovery.
. During oral argument, DSMCi’s counsel indicated the MRice was the username of an NGTL employee.
. The DCUTSA is based on the Uniform Trade Secrets Act ("UTSA”), as are the trade secret statutes of a number of states.
Catalyst & Chem. Serv., Inc. v. Global Ground Support,
. The DCUTSA defines a trade secret as:
information, including a formula, pattern, compilation, program, device, method, technique, or process that:
(A) Derives actual or potential independent economic value, from not being generally known to, and not being readily ascertainable by, proper means by another who can obtain economic value from its disclosure or use; and
(B) Is the subject of reasonable efforts to maintain its secrecy.
D.C.Code § 36-401(4).
. "Source code is a symbolic language that humans can read, whereas object code is the translation of the source code into a series of zeros and ones that is readable by a computer.”
MiTek Holdings, Inc. v. Arce Eng’g Co.,
. “This requirement of probative similarity is somewhat akin to, but different than, the requirement of substantial similarity that emerges at the second step in the progression.”
Johnson v. Gordon,
. The Court questions whether DSMCi’s claims under Virginia statutory law and DC common law violate choice-of-law principles. However, the Court need not reach this issue because, as discussed below, the DCUTSA and Virginia UTSA are identical and both conspiracy claims are preempted.
