OPINION
The Trandes Corporation brought this diversity suit against the Guy F. Atkinson Company (Atkinson) and the Washington Metropolitan Area Transit Authority (WMA-TA). Trandes alleged that WMATA improperly disclosed and Atkinson improperly acquired and used the “Tunnel System.” The Tunnel System is a computer program written by Trandes’s president, James Brusse, to perform survey calculations for the construction of subway tunnels. After a three day trial, the district court submitted five issues to the jury: (1) whether WMATA breached its contract with Trandes, (2) whether WMA-TA breached its fiduciary duties to Trandes, (3) whether WMATA misappropriated Trandes’s trade secrets, (4) whether Atkinson misappropriated Trandes’s trade secrets, and (5) whether Atkinson’s actions had been willful, wanton, and malicious. The jury found for Trandes on each claim and awarded $17,400 in compensatory damages. 1 The jury- also found that Atkinson’s actions had been willful, wanton, and malicious and accordingly awarded Trandes $750,000 in punitive damages.
After the jury returned its verdict in favor of Trandes, Atkinson moved for judgment as a matter of law. Atkinson also moved for a remittitur of punitive damages on the ground that any act of misappropriation occurred after the effective date of the Maryland Uniform Trade Secrets Act (MUTSA), Md.Com. .
*658
Law II Code Ann. §§ 11-1201 to -1209 (Mi-chie 1990), and was therefore subject to the statutory cap that limits punitive damages to twice compensatory damages,
id.
§ 11— 1203(d). The district court denied both motions.
Trandes Corp. v. Guy F. Atkinson Co.,
Atkinson now appeals from the district court’s decisions, arguing that (1) Trandes’s claim of trade secret misappropriation is preempted by § 301(a) of the Copyright Act, 17 U.S.C. § 301(a) (1988); (2) Trandes failed to prove that it possessed any trade secrets; (3) Trandes failed to prove that Atkinson ever acquired any of the alleged trade secrets; and (4) Trandes failed to prove that Atkinson’s acquisition of the Tunnel System was improper. We reject these arguments and hold that the district court properly denied Atkinson’s motion for judgment as a matter of law. We therefore affirm Atkinson’s liability for trade secret misappropriation. Atkinson correctly argues, however, that the evidence does not support the district court’s conclusion that Atkinson misappropriated Trandes’s trade secrets before the effective datе of the MUTSA. We therefore reverse the district court’s denial of Atkinson’s motion for a remittitur and remand for an assessment of punitive damages in accordance with § ll-1203(d) of the MUTSA.
I.
Atkinson first argues that § 301(a) of the Copyright Act preempts Trandes’s claim for trade secret misappropriation. This argument raises a question of law, which we review de novo.
Taylor v. Local No. 7, Int’l Union of Journeymen Horseshoers,
The district court did not explicitly rule on Atkinson’s preemption argument, but instead held that the Copyright Act did not govern this case because Trandes did not timely register the Tunnel System for copyright protection.
Trandes Corp.,
Although § 411(a) relates to the validity of Trandes’s copyright infringement claim, it has no bearing on the preemption of state law under § 301. Section § 411(a) merely requires a copyright owner to register its copyright before filing an action for copyright infringement.
Sony Corp. of Am. v. Universal City Studios, Inc.,
Section 301(a) of the Copyright Act provides that
all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright ... in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright ... are governed exclusively by this title.... [N]o person is entitled to any such right or equivalent right in any such work under the common law or statutes of any State.
17 U.S.C. § 301(a) (emphasis added);
but see
17 U.S.C. § 301(b) (1988 & Supp. II 1990).
2
*659
Trandes’s claim for trade secret misappropriation seeks to protect rights in its computer program, which clearly comes within the “subject matter” of copyright. 17 U.S.C. § 102(a) (1988 & Supp. II 1990) (the subject matter of copyright is “original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device”);
see also M. Kramer Mfg. Co. v. Andrews,
The owner of a copyright has the exclusive right to (1) reproduce the work, (2) prepare derivative works based on the work, (3) distribute copies of the work, (4) perform the work publicly, and (5) display the work publicly. 17 U.S.C. § 106 (1988 & Supp. II 1990). Trandes predicated its unsuccessful claim for copyright infringement on Atkinson’s unauthorized acquisition and use of its computer software. Because Trandes based its claim for misappropriation of trade secrets on the same conduct, Atkinson contends that the latter cause of action is preempted. To support its claim, Atkinson relies on the holdings of
Relational Design & Technology, Inc. v. Data Team Corp.,
Atkinson takes the wrong approach by focusing its preemption analysis on the conduct alleged to support the two causes of action. To determine whether a particular cause of action involves rights equivalent to those set forth in § 106, the elements of the causes of action should be compared, not the facts pled to prove them. As the Second Circuit held in
Harper & Row Publishers, Inc. v. Nation Enterprises,
To prove copyright infringement, a plaintiff must show (1) that it owned a valid copyright and (2) that the defendant copied original elements of its copyrighted work.
Feist Publications, Inc. v. Rural Tel. Serv. Co.,
The significant difference of fact between trade secrets and processes or devices which are not secret is that knowledge of the latter is available to the copier without the use of improper means to procure it, while knowledge of the former is ordinarily available to him only by the use of such means. It is the employment of improper means to procure the trade secret, rather than the mere copying or use, which is the basis of [liability].... Apart from breach of contract, abuse of confidence or impropriety in the means of procurement, trade secrets may be copied as freely as devices or processes which are not secret.
Restatement (First) of Torts
§ 757 cmt. a (1939) (emphasis added). We agree with the Second Circuit that the breach of a duty of trust or confidentiality comprises the core of actions for trade secret misappropriation, and “supplies the ‘extra element’ that qualitatively distinguishes such trade secret causes of action from claims for copyright infringement that are based solely upon copying.”
Computer Assocs.,
II.
Atkinson next challenges the sufficiency of the evidence to support the jury verdict in Trandes’s favor. In its motion for judgment as a matter of law, Atkinson raised two points. First, Atkinson contended that Trandes did not prove that it possessed any trade secrets. Second, Atkinson contended that even if Trandes did possess trade secrets, the evidence did not show that Atkinson ever acquired any of them. The district court rejected Atkinson’s arguments and denied the motion.
Trandes Corp.,
We will not disturb the district court’s decision “unless, without weighing the evidence оr assessing witness credibility, we conclude that reasonable people could have returned a verdict only for defendants.”
Cooper v. Dyke,
A.
Atkinson first argues that no reasonable jury could have concluded that Trandes possessed any trade secrets. Maryland law defines a trade secret as
information, including a formula, pattern, compilation, program, device, method, technique, or process, that:
(1) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and
(2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
Md.Com.Law II Code Ann. § ll-1201(e) (emphasis added). Prior to the adoption of the MUTSA, Maryland applied the
Restatement’s
definition of a trade secret.
See Space Aero,
any formula, pattern, device or compilation of information which is used in one’s business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it.
Restatement (First) of Torts § 757 cmt. b. The Restatement set forth six factors for the court to consider in determining whether given information constitutes a trade secret:
(1) the extent to which the information is known outside of his businеss; (2) the extent to which it is known by employees and others involved in his business; (3) the extent of measures taken by him to guard the secrecy of the information; (4) the value of the information to him and to his competitors; (5) the amount of effort or money expended by him in developing the information; (6) the ease or difficulty with which the information could be properly acquired or duplicated by others.
Id.
“Although all of the Restatement’s factors no longer are required to find a trade secret, those factors still provide helpful guidance 'to determine whether the information in a given case constitutes ‘trade secrets’ within the definition of the statute.”
Optic Graphics,
Trandes argues that two aspects of the Tunnel System program constitute trade secrets: (1) the specific engineering formulas and methods of calculation embodied in the Tunnel System and (2) the structure and organization of the Tunnel System modules. Though both of the items could qualify as trade secrets,
see Integrated Cash Management Servs., Inc. v. Digital Transactions, Inc.,
Here, Trandes averred nothing more than that it possessed secret “formulas.” At trial, Trandes refused to provide any infor *662 mation whatsoever about the formulas but instead chose to rely on mere conclusory allegations. 5 Without some evidence of what the formulas werе, the jury could not have differentiated them from “matters of general knowledge in the trade,” id, and consequently Trandes did not sustain even a prima facie case of misappropriation. No rational jury could have concluded that the formulas were not generally known, that they had independent economic value, or that they were not readily ascertainable by proper means.
Trandes similarly failed to meet its burden of production with respect to the structure and organization of the Tunnel System modules. Trandes presented evidence that the Tunnel System had both a structure and an organization, but explained neither how the program was structured nor how it was organized. Without such evidencе, no reasonable jury could have concluded that the structure and organization of the software was unique or was not generally known in the industry. Although the district court concluded that “the ‘secret’ is the combination and interrelationship of the six modules provided to WMATA, and the format of the Input Data Files used to run the System,” and that “[t]here was sufficient evidence on which the jury could reasonably find that ... the design, use and interrelationship of these components was original and provided Trandes with a competitive advantage in the rapid transit industry,”
Trandes Corp.,
B.
Even though Trandes failed to prove that the structure and organization of the program qualified as a trade secret, it produced sufficient evidence for the jury to conclude that the Tunnel System software itself constituted a trade secret. We may affirm the district court’s denial of judgment as a matter of law on this alternative ground.
7
Dennison v. County of Frederick,
Trandes created the Tunnel System in a two-step process. Brusse first wrote in the computer language BASIC a unique set of instructions designed to execute specific survey calculations associаted with the construction of tunnels.
See
17 U.S.C. § 101 (1988) (defining computer program as “a set of statements or instructions to be used di
*663
rectly or indirectly in a computer in order to bring about a certain result.”). This set of instructions is known as source code.
See Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc.,
The source code can and does qualify as a trade secret.
See, e.g., University Computing Co. v. Lykes-Youngstown Corp.,
Whether the object code-is a trade secret is a more difficult question.
8
Atkinson first contends that the object code cannot be a trade secret because it does not derive independent economic value from its secrecy, and therefore fails the first definitional requirement of a trade secret.
See id.
§ 11— 1201(e)(1). This argument has no merit. Trandes generates most of its revenues by providing computer services to engineering firms and construction companies. Trandes receives raw data from its clients, processes the data with the Tunnel System software, and reports the results back to the clients. These services generate substantial revenues, enabling Trandes to earn more than one million dollars on a single contract. Armed with a copy of the object code, an individual would have the means to offer much the same engineering services as Trandes.
9
Because “other persons [could] obtain economic value” from the disclosure or use of the object code, a reasonable jury could conclude that the Tunnel System object code “[d]erives independent economic value ... from not being generally known.”
10
Id.; cf. ISC-Bunker Ramo Corp. v. Altech, Inc.,
Atkinson next argues that the object code cannot be a trade secret because Trandes did not keep it secret, and it therefore fails the second definitional requirement of a trade secret. See Md.Com.Law II Code Ann. § ll-1201(e)(2). Section ll-1201(e)(2) requires the owner of trade secret information to undertake “efforts that are reasonable under the circumstances” to maintain the secrecy of its information. Atkinson asserts that the Tunnel System has been widely disclosed as a mass-marketed product and that its existence and its abilities are not secret. Atkinson relies heavily on the fact *664 that Trandes once placed a two-inch advertisement for the Tunnel System in the back of an engineering periodical. The advertisement described in general terms the capabilities of the Tunnel System and offered a demonstration disk for $100. The demonstration disk did in fact contain an object-code version of the Tunnel System, but was configured to operate in demonstration mode only. The advertisement generated six or seven inquiries, none of which resulted in the sale or shipment of a demonstration disk. Atkinson argues that these actions destroyed the secrecy of the Tunnel System.
Secrecy is a question of fact,
Lehman v. Dow Jones & Co.,
On these facts, the jury could have reasonably concluded that Trandes undertook reasonable efforts to maintain the secrecy of the Tunnel System. Although Trandes may not have achieved absolute secrecy, “[a]bsolute secrecy is not essential.”
Space Aero,
Trandes put sufficient evidence before the jury to justify a conclusion that the Tunnel System object code constituted economically valuable information and that Trandes took reasonable precautions to keep it secret. Because the object code meets the definitional requirements of both § 11 — 1201(e)(1) and (e)(2), it qualifies as a trade secret.
C.
It is undisputed that Atkinson acquired and used the Tunnel System object code.
11
Atkinson nevertheless contends that its acquisition of Trandes’s trade secret ob
*665
ject code does not constitute misappropriation because it did not use the object code to compete with Trandes. Here, Atkinson ignores the language of the statute. The MUTSA does not require proof of competition, but only proof of improper acquisition or improper use.
See
Md.Com.Law II Code Ann. § ll-1201(c);
cf. Schalk v. State,
D.
Atkinson next argues that its acquisition and use of the Tunnel System was not improper because it complied with the terms of WMATA’s license. The license permitted Atkinson, as a contractor of WMATA, to use the Tunnel System if WMATA obtained Trandes’s express written approval. Atkinson admits that neither it nor WMATA sought or obtained Trandes’s approval for the transfer of the software to Atkinson. Still, Atkinson argues that the written approval requirement was not a condition precedent to WMATA’s right to transfer the software to Atkinson, and that even if the written approval requirement is a condition precedent, Trandes waived compliance.
Atkinson presented neither of these arguments to the district court and has therefore waived them on appeal.
See National Wildlife Fed’n v. Hanson,
III.
Finally, we address the district court’s denial of Atkinson’s motion for remittitur of the punitive damages award.
Trandes Corp.,
After the verdict, Atkinson moved for re-mittitur of the punitive damages award on the basis that the award of $750,000 exceeded the statutory cap, which, if applicable, would limit punitive damages to twice compensatory damages, or $34,800. Md.Com. Law II Code Ann. § ll-1203(d). Atkinson also contended that no punitive damages were warranted because Trandes failed to prove by clear and convincing evidence that Atkinson had willfully and maliciously misappropriated its trade secrets. Finally, Atkinson argued that under the MUTSA the imposition of punitive damages was an issue for the court, not the jury.
Sensing that its award of punitive damages was endangered, Trandes filed a motion under Federal Rule of Civil Procedure 15(b) to amend the pleadings to conform to the evidence. In its motion, Trandes asserted for the first time that the MUTSA did not apply to its trade secrets claim because the ¿ct of misappropriation was a сontinuing misappropriation beginning before July 1, 1989, the effective date of the MUTSA. 1989 Md. Laws 598, §§ 2(2) & 3. Atkinson opposed the motion on the ground that the evidence did not support a finding that it misappropriated Trandes’s trade -secrets before July 1, 1989.
The district court found that Atkinson engaged in a continuing misappropriation commencing before. July 1, 1989, and, in accordance with the common law, imposed punitive damages in the amount assessed by the jury.
Trandes Corp.,
We first address Atkinson’s contention that the district court should never have submitted the issue of punitive damages to the jury but instead should have reserved the issue for its own determination. Md.Com. Law II Code Ann. § 11 — 1203(d) (punitive damages are to be awarded by the court). Although Atkinson correctly interprets the Mаryland statute, it overlooks the fact that, in federal court, any award of punitive damages presents a factual question that must be resolved by the jury.
Johnson v. Hugo’s Skateway,
Next we address whether sufficient evidence supports the jury’s finding that Atkinson willfully and maliciously misappropriated Trandes’s trade secrets. The district court did not instruct the jury that Trandes must establish the basis for an award of punitive damages by “clear and convincing evidence,”
Owens-Illinois, Inc. v. Zenobia,
Finally, we must address whether the statutory cap applies. The cap applies if the misappropriation occurred after July 1, 1989. The date of misappropriation is a question of fact, and we may set aside the district court’s factual finding only if it is clearly erroneous. Fed.R.Civ.P. 52(a). 12 To support its finding of a continuing misappropriation, the district court identified only four pieces of evidence that could conceivably show that Atkinson acquired the Tunnel System before July 1, 1989. First, the court mentioned the fact that the Tunnel System was available in WMATA’s on-site trailer at the time that Atkinson began work on the project in 1988. Second, the court credited an employee’s testimony that Atkinson was using the software as early as August 1989. To infer that Atkinson acquired the Tunnel System before July 1, 1989 requires conjecture and speculation, and the evidence is simply insufficient to support the district court’s conclusion.
The remaining evidence cited by the district court similarly fails to support its finding. The district court relied on the testimony of an Atkinson employee that he joined Atkinson in June 1989 and “was introduced to the Tunnel System” by his supervisor.
Trandes Corp.,
Indeed, the remaining evidence strongly suggests the opposite conclusion. Atkinson’s project engineer testified that he overheard an employee of WMATA offer the Tunnel System software to an Atkinson supervisor in March 1990, and that he later witnessed the WMATA employee transfer several disks to the Atkinson supervisor. Moreover, WMA-TA’s survey coordinator testified that he first trained the Atkinson supervisor in the use of the Tunnel System on November 21, 1990, and the record before us contains no evidence that Atkinson generated any Tunnel System reports before January 20, 1991.
Although thеre may be a modicum of evidence to support the district court’s conclusion that Atkinson acquired the Tunnel System before July 1989, our independent review of the evidence leaves us with a definite and firm conviction that a mistake has been made.
Friend v. Leidinger,
IV.
In sum, we affirm the district court’s denial of Atkinson’s motion for judgment as a matter of law. Trandes’s claim for trade secret misappropriation is not preempted by § 301(a) of the Copyright Act, and the jury could have reasonably concluded that- Atkinson acquired Trandes’s trade secret object code in violation of Maryland law. We reverse the district court’s denial of Atkinson’s motion for remittitur and remand for an award consistent with § 11 — 1203(d).
AFFIRMED IN PART, REVERSED IN PART, AND REMANDED.
Notes
. Trandes also asserted causes of action for copyright infringement and intentional interference with contractual relations against Atkinson. The district court did not submit either of these сlaims to the jury. Trandes has not appealed from that decision. Also, WMATA has not appealed its adverse verdict.
. Section 301(b) provides:
Nothing in this title annuls or limits any rights or remedies under the common law or statutes of any State with respect to (1) subject matter that does not come within the subject matter of copyright as specified by sections 102 and 103 ... or (3) activities violating legal or equitable rights that are not equivalent to any of the exclusive *659 rights within the general scope of copyright as specified by section 106.
. Although Videotronics does discuss preemption, it does not mention § 301 and ignores the specific requirements of that section.
. Although we conclude that this action is governed by the MUTSA,
see infra
Section III, the MUTSA was adopted " 'to codify and clarify the existing common law of trade secrets.’ ”
Optic Graphics, Inc. v. Agee, 87
Md.App. 770,
. The following colloquy took place between defense counsel and James Brusse, president of Trandes:
Q: Are the formulas that are utilized to make survey calculations in your tunnel system modules unique to you?
A: Some arc, sir.
Q: And what are those?
A: Do you want me to tell you?
Q: Yes.
A: I don't want to tell you. They're confidential, sir.
(Tr. at 69.) After the district court admonished Brusse to provide more information, Brusse attempted to elaborate, but his testimony amounted to nothing more than a series of assertions that his formulas were "different” and "unique.” (Id. at 69-71.)
. A plaintiff's general fear of disclosure cannot justify the failure to present sufficient evidence to identify its trade secrets. The MUTSA expressly imposes upon the courts the obligation to "preserve the secrecy of an alleged trade secret by reasonable means,” and provides explicit authority to accomplish that objective. See Md.Com. Law II Code Ann. § 11-1205 (authorizing protective orders in discovery, in-camera hearings, sealed records, and orders compelling parties to maintain secrecy).
.Although Trandes does not specifically argue in its appellate brief that the software constituted a trade secret, it did press the argument both before the jury and in its opposition to Atkinson's motion for judgment as a matter of law. Because Atkinson has chosen to address this issue on appeal, it hаs suffered no prejudice.
See Estate of Whitt v. Commissioner,
.This case presents an unusual set of facts. In the ordinary case, the owner of trade secret computer software will maintain the secrecy of the source code but freely distribute the object code.
See, e.g., Q-Co Indus., Inc. v. Hoffman,
. Brusse obtained specific promises from each of his licensees that they would not provide computer services to other parties.
. Similarly, the object code is "information which is used in [Trandes’s] business, and which gives [Trandes] an opportunity to obtain an advantage over competitors who do not know or use it.” Restatement (First) of Torts § 757 cmt. b.
. Trandes does not argue that Atkinson ever acquired the source code. Indeed, Trandes contends that ”[t]he 'source code’ ... was kept secured and never given to any firm or individual.” (Trandes's Br. at 19.)
. Because the date of misappropriation is a factual question, it should have been submitted to the jury. Atkinson failed, however, to object to the omission of this issue from the special ■ verdict form and thereby waived its right to a jury trial on the issue. Fed.R.Civ.P. 49(a). In accordance with Rule 49(a), the district court made its own finding.
Trandes Corp.,
