The Los Angeles County Sheriffs Department purchased 3,663 licenses to Wall Data’s computer software, 1 but installed the software onto 6,007 computers. We are asked to determine whether the Sheriffs Department’s conduct constituted copyright infringement. The wrinkle in *774 this otherwise smooth question is that, although the software was installed onto 6,007 computers, the computers were configured such that the total number of workstations able to access the installed software did not exceed the total number of licenses the Sheriffs Department purchased. We have jurisdiction under 28 U.S.C. § 1291 and hold that such copying constitutes copyright infringement despite the Sheriffs Department’s configuration. We therefore affirm the district court.
1. FACTS AND PROCEDURAL HISTORY
Plaintiff-Appellee Wall Data Incorporated develops, markets, and sells a line of copyrighted computer terminal emulation software products including RUMBA Office and RUMBA Mainframe. Both RUMBA products allow personal computers that use one operating system to access data stored on computers that use a different operating system. RUMBA Office is the more expensive and more powerful computer program.
Between December 1996 and February 1999, the Appellants-Defendants, the Los Angeles County Sheriffs Department and the County of Los Angeles (collectively, “Sheriffs Department”), purchased both of Wall Data’s RUMBA software products through an approved vendor. In December 1996, the Sheriffs Department purchased eight “units” of Wall Data’s RUMBA Office program. Each of the eight units contained a RUMBA Office CD-ROM (compact disc read-only-memory) and a volume license booklet. Each volume license booklet granted the Sheriffs Department 250 licenses to RUMBA Office. In total, the Sheriffs Department paid $175,220 for 2,000 RUMBA Office licenses, at a reduced price of $87.61 per license. 2
Between November 1997 and February 1999, the Sheriffs Department purchased 1,628 licenses to the lower-cost RUMBA Mainframe program. In all, the Sheriffs Department purchased 2,035 licenses to RUMBA Office and 1,628 licenses to RUMBA Mainframe, for a total of 3,663 licenses.
At first, the Sheriffs Department installed RUMBA Office manually, one computer at a time, onto approximately 750 computers in the Sheriffs Department’s new detention facility' — the Twin Towers Correctional Facility (“Twin Towers”). The Sheriffs Department soon realized that this process was too time consuming and would delay opening the Twin Towers. In addition, it was not clear where those employees who would need to use RUMBA programs would be assigned to work. To speed up the process of installation and to ensure that employees would be able to use the RUMBA software regardless of where they were assigned, the Sheriffs Department decided to install a “baseline” of software applications onto the hard drives of the remaining computers in its new detention facility. This was done by simultaneously copying the entire contents of a single “master” hard drive containing the baseline of software applications onto the hard drives of other computers. This method is known as “hard disk imaging,” and saved the Sheriffs Department from having to install the software manually onto each computer.
By the time the Sheriffs Department finished hard disk imaging in mid-2001, RUMBA Office was loaded onto 6,007 eom- *775 puters in the Twin Towers, far in excess of the 3,663 RUMBA licenses the Sheriffs Department had purchased. Although RUMBA Office was installed onto nearly all of the computers in the Twin Towers, the Sheriffs Department configured those computers using a password-based security system such that the number of users who could access RUMBA Office was limited. The Sheriffs Department claims that, at all times, the number of those who could access the software was limited to the number of licenses it had. 3
Shortly thereafter, Wall Data discovered that the number of computers in the Twin Towers that had RUMBA Office installed exceeded the number of licenses held by the Sheriffs Department. As a result, Wall Data claimed that the Sheriffs Department violated the terms of its licenses because the Sheriffs Department was licensed, at most, to install RUMBA software onto only 3,663 computers.
The parties tried unsuccessfully to settle the dispute. After settlement efforts failed, the Sheriffs Department removed RUMBA Office from the computers in the Twin Towers for which it did not have a license. The Sheriffs Department installed the less expensive RUMBA Mainframe program onto many computers to replace the copies of RUMBA Office that were removed.
On January 11, 2002, Wall Data filed suit against the Sheriffs Department. Although Wall Data raised several claims in its complаint, the only claim that went to trial (and the only claim at issue here) was copyright infringement. Wall Data alleged that the Sheriffs Department “over-installed” RUMBA Office onto computers in the Twin Towers and violated the terms of Wall Data’s shrink-wrap license, 4 click-through license, 5 and volume license booklets.
*776 In response, the Sheriffs Department contended that it had not violated the terms of Wall Data’s licenses and that it was entitled to the following affirmative defenses: (1) a “fair use” defense under 17 U.S.C. § 107; and (2) an “essential step” defense under 17 U.S.C. § 117(a)(1). As described above, the Sheriffs Department argued that, even though it had installed RUMBA Office onto 6,007 workstations, it had configured the software so that the software could only be accessed by 3,663 workstations at a time. The Sheriffs Department argued that this constituted a fair use under 17 U.S.C. § 107 because the number of “useable” copies of the software did not exceed the number of licenses held by the Sheriffs Department. The Sheriffs Departmеnt also argued that the copying was an “essential step” under 17 U.S.C. § 117(a)(Z), because the hard drive imaging process was a necessary step of installation. Based on these arguments and affirmative defenses, both parties moved for summary judgment.
The district court made its initial ruling on the parties’ summary judgment motions on May 2, 2003, and concluded that neither party was entitled to summary judgment. On May 15, 2003, both sides filed numerous motions in limine. The district court ruled on these motions on June 17, 2003; it excluded evidence offered by the Sheriffs Department on its fair use defense, and other evidence that the district court ruled irrelevant, time consuming, or confusing to the jury. On the same day, the district court reconsidered its earlier ruling on summary judgment, and granted Wall Data’s motion for summary judgment on the basis that the Sheriffs Department was not entitled to a fair use defense.
Following these rulings on the parties’ motions in limine, a four-day jury trial took place. The only issues remaining for trial were whether the Sheriffs Department had infringed on Wall Data’s copyright and whether any defense barred Wall Data’s copyright infringement claim. At the end of trial, the jury returned a general verdict finding the Sheriffs Department liable for copyright infringement and awarding Wall Data $210,000 in damages. Subsequently, Wall Data filed a motion under 17 U.S.C. § 505 requesting over $1.5 million in attorneys’ fees and nearly $150,000 in costs. The district court granted Wall Data $516,271 in attorneys’ fees and approximately $38,000 in costs. After the district court entered final judgment against the Sheriffs Department, the Sheriffs Department timely appealed.
The Sheriffs Department now challenges (1) the district court’s order granting summary judgment against its § 107 fair use defense; (2) the district court’s evidentiary rulings on motions in limine including those affecting its § 107 fair use defense and § 117 essential step defense; (3) the district court’s jury instructions regarding, inter alia, the Sheriffs Department’s § 117 essential step defense; and (4) the district court’s order granting Wall Data costs and attorneys’ fees.
II. ANALYSIS
The 1976 Copyright Act defines a “computer program” as “a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.” 17 U.S.C. § 101. We have long held that a computer program is copyrightable as a “tangible medium of expression.”
Apple Computer,
*777
Inc. v. Formula Int’l, Inc.,
As the owner of a copyright, Wall Data has exclusive rights in its copyrighted work. See 17 U.S.C. § 106. Exemptions, compulsory licenses, and defenses found in the Copyright Act narrow Wall Data’s rights as a copyright owner. See id. at §§ 107-122. Here, the Sheriffs Department claims that two defenses found in the Copyright Act apply: the § 107 fair use defense and the § 117 essential step defense. As discussed below, we hold that neither of these defenses save the Sheriffs Department from liability to Wall Data for copyright infringement, and we affirm the district court in full.
A. The Sheriffs Department Is Not Entitled to a § 107 Fair Use Defense
For more than a century, courts have excused certain otherwise infringing uses of copyrighted works under the fair use doctrine.
See Folsom v. Marsh,
In this case, the district court granted summary judgment against the Sheriffs Department on its fair use defense. We review
de novo
the district court’s grant of summary judgment.
See Smith v. Jackson,
1. The Four Fair Use Factors
To determine whether the Sheriffs Department’s use was fair, we must balance four factors.
See id.
at 800. These factors are: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential
*778
market for or value of the copyrighted work.
See Dr. Seuss,
Not all of the four factors must favor the Sheriffs Department.
See Sega Enters. Ltd. v. Accolade, Inc.,
2. Balancing of the Four Fair Use Factors
The Sheriffs Department claims that it is entitled to a fair use defense, because it has done nothing more than apply technology to make the broadest authorized use of its licenses. We are mindful that fair use is a tool for adapting copyright law to brisk technological advances and for tempering the over-technical application of copyright law. Nоnetheless, in re-weighing the four fair use factors on appeal, “in light of the purposes of copyright,”
Campbell v. Acuff-Rose Music, Inc.,
a. First Fair Use Factor: Purpose and Character of the Allegedly Infringing Use
We first consider the nature of the work: whether the new work is transfor-mative or simply supplants the original work, and whether the work is commercial in nature.
See Campbell,
Of primary concern is whether the Sheriffs Department’s use was trans-formative; the more “transformative the new work, the less will be the significance of the other factors.”
Id.
A use is considered transformative only where a defendant changes a plaintiffs copyrighted work or uses the plаintiffs copyrighted work in a different context such that the plaintiffs work is transformed into a new creation.
See, e.g., id.
at 578-79,
Next, the Sheriffs Department’s use of hard drive imaging to copy RUMBA Office did not promote the advancement of knowledge and the arts — goals that copyright intends to secure. “[C]opyright law ultimately serves the purpose of enriching
*779
the general public through access to creative works,”
Fogerty v. Fantasy, Inc.,
Finally, the Sheriffs Department use was commercial in nature. The Sheriffs Department alleges that its use was “commercially insignificant” because not all of the copies of Wall Data’s computer software were actually used, and because the Sheriffs Department is a government agency that does not compete with Wall Data. We disagree. As we explained in
Worldwide Church of God,
“repeated and exploitative copying of copyrighted works, even if the copies are not offered for sale, may constitute a commercial use.”
The terms of Wall Data’s RUMBA license clearly restricted the Sheriffs Department’s use to a “single designated computer” and prohibited the Sheriffs Department from using “the Software in any other multiple computer or multiple user arrangement.” Despite this condition, the Sheriffs Department loaded an entire suite of software, including RUMBA Office, onto nearly all of the computers in the Twin Towers. By using hard drive imaging, the Sheriffs Department saved man-hours and eliminated possible errors associated with separately installing the individual software packages onto each computer in the Twin Tower fаcility. Hard drive imaging also ensured that those users who needed to use RUMBA would be able to access the software at whatever computer they were assigned to work. Such flexibility could only have been achieved by purchasing licenses for each of the computers on which the software was loaded, or by negotiating with Wall Data for a less restrictive license. Accordingly, we conclude that “the purpose and character” of the Sheriffs Department’s use was commercial, because the copies “were made to save the expense of purchasing authorized copies,”
Napster,
The Sheriffs Department’s installation of the RUMBA Office software onto nearly *780 all of its computers in the Twin Towers was not transformative, did not promote an advancement of the arts, and was commercial in nature. The first factor therefore weighs against a finding of fair use.
b. Second Fair Use Factor: Nature of the Copyrighted Work
In analyzing the second fair use factor, we look at the nature of the copyrighted work, creative works being “ ‘closer to the core of intended copyright protection’ than informational and functional works.”
Dr. Seuss,
c. Third Fair Use Factor: Amount and Substantiality of the Portion Used
Next, we consider whether the “amount and substantiality of the portion used in relation to the copyright work as a whole,” 17 U.S.C. § 107(3), is “reasonable in relation to the purpose of copying,”
Dr. Seuss,
d.Fourth Fair Use Factor: Effect of the Use Upon the Potential Market
In addressing the final fair use factor, we focus on “the normal market for the copyrighted work” and whether the allegedly infringing use threatens the potential market for, or value of, a copyrighted work.
See Harper & Row,
[t]his inquiry attempts to strike a balance between the benefit the public will derive if the use is permitted and the personal gain the copyright owner will receive if the use is denied. The less adverse effect that an alleged infringing use has on the copyright owner’s expectation of gain, the less public benefit need be shown to justify the use.
Mattel,
The Sheriffs Department contends that its copying was solely an attempt to use efficiently its licensed copies
*781
of the RUMBA software products, and accordingly, there was no negative impact on Wall Data’s market. It points to its own statements that it would not have purchased additional copies of the license had it known that its configuration went beyond its license. We are not persuaded. The Sheriffs Department bought a few licenses and found a way to install the program onto all of its computers without paying the fee required for each installation. The Sheriffs Department could have bargained for the flexibility it desired, but it did not. Whenever.a user puts copyrighted software to uses bеyond the uses it bargained for, it affects the legitimate market for the product. Thus, although hard drive imaging might be an efficient and effective way to install computer software, we conclude that “unrestricted and widespread conduct of the sort engaged in by the defendant” would nonetheless lead to over-use of the software.
Campbell,
Equally important, ghost copies of the software lay dormant and were unuseable only until a Sheriffs Department network administrator decided to activate RUMBA Office on that computer. The Sheriffs Department thus created its own “sub-licensing” system where it granted users permission to use the software and, in essence, asked Wall Data to “trust” that it was not using RUMBA in excess of its authorization under the license. We recognize that computer licensing is generally an “honor system,” in that there is little to stop a person with physical possession of software from instаlling it on multiple computers. But in this case, the Sheriffs Department’s system made tracking infringement almost impossible, because Wall Data could not independently verify which of the computers had been used to access RUMBA and which ones had not— it had to trust the Sheriffs Department that its system was not allowing over-use. In fact, after Wall Data brought the overuse of RUMBA to the Sheriffs Department’s attention, a Sheriffs Department employee admitted, in an email, that he was not sure how to tell which computers had accessed RUMBA. 7 This system therefore made copyright infringement easier (because no physical installation was necessary) and made detection of over-use more difficult.
In recognition of the ease with which software can be over-used, courts have been cautious to extend protection to methods that would make copyright infringement of software any easier:
Software fundamentally differs from more traditional forms of medium, such as print or phonographic materials, in that software can be both, more readily and easily copied on a mass scale in an extraordinarily short amount of time and relatively inexpensively. One of the primary advantages of software, its ability to record, concentrate and convey information with unprecedented ease and speed, makes it extraordinarily vulnerable to illegal copying and piracy. [Thus,] it is important to acknowledge these special characteristics of the software industry and provide enhanced copyright protection for its inventors and developers.
Adobe Sys., Inc. v. Stargate Software Inc.,
* * *
In considering the four fair use factors—thе purpose and character of the work, the nature of the use, the amount and substantiality of the portion used, and the effect on the plaintiffs’ market—none militate in favor of the Sheriffs Department’s fair use defense. We therefore hold that the Sheriffs Department is not entitled to a fair use defense, and we affirm the district court’s order granting summary judgment on the Sheriffs Department’s fair use defense.
B. The District Court’s Evidentiary Rulings Were Not Erroneous
We review a district court’s evi-dentiary rulings for an abuse of discretion.
See Columbia Pictures Television, Inc. v. Krypton Broad of Birmingham, Inc.,
1. Exclusion of Irrelevant Evidence
The district court did not abuse its discretion when it ruled against the Sheriffs Department on the admissibility of the following evidence: (1) excerpts from Wall Data’s 10k repоrt to the Securities and Exchange Commission (“SEC”); (2) the Sheriffs Department’s Master Vendor Agreements; and (3) evidence regarding Wall Data’s communications with other customers and its instructions to its sales personnel describing RUMBA software licenses. We agree with the district court that the evidence offered by the Sheriffs Department was irrelevant, would have consumed an unreasonable amount of time, would have caused jury confusion, or would have unduly prejudiced Wall Data. See Fed.R.Evid. 401, 402, 403. In any event, we find that any error in excluding the evidence was harmless.
First, the district court did not err when it excluded from evidence an excerpt from Wall Data’s 10k report to the SEC. The relevant excerpt consisted of a general statement that Wall Data’s shrink-wrap licenses “may be unenforceable.” Such licenses were clearly enforceable in California and Washington, the relevant jurisdictions in these actions.
See, e.g., Lozano v. AT & T Wireless,
Next, the district court did not abuse its discretion when it excluded evidence of Master Vendor Agreements governing the Sheriffs Department’s purchase of software. The Sheriffs Department ordered RUMBA software products through one of the Sheriffs Department’s resellers, an approved Los Ange-les County vendor, who in turn, ordered the products from a Wall Data distributor. The Master Vendor Agreements governed the relationship between the Sheriffs Department and the reseller, not the relationship between the Sheriffs Department and Wall Data. Because Wall Data was not a party to the Master Vendor Agreements, the district court ruled that the Sheriffs Department could *783 only introduce such documents for purposеs of estoppel if the Sheriffs Department could prove that Wall Data had knowledge of them. The Sheriffs Department conceded that it had no evidence that Wall Data knew of the agreements. Because Wall Data had no knowledge of the agreements, we agree with the district court that the Master Vendor Agreements were not binding on Wall Data and were therefore irrelevant to the proceeding. We thus conclude that the district court did not abuse its discretion in excluding the Master Vendor Agreements.
The district court properly excluded evidence related to Wall Data’s communications with other customers and existence of another Wall Data software product, CYBERPRISE. We agree with the district court that Wall Data’s communication with other customers regarding licenses for the products they purchased was irrelevant to the case at hand. The court also acted properly when it excluded all evidence related to CYBERPRISE. Unlike RUMBA, which was designed to be installed on physical workstations, CYBERPRISE was accessed through the internet. CYBERPRISE was also licensed under a concurrent user licensing system, which made the physical location of the user irrelevant. 8 Because there were clear difference between the two products, information about CYBERPRISE would distract the jury from the relevant issues in this case. Accordingly, the district court did not err in excluding evidence relating to CYBERPRISE.
Finally, the district court decision to exclude Wall Data’s instructions to sales personnel describing RUMBA software licenses was not reversible error. The licenses clearly state that reliance should not be placed on representations made by Wall Data employees. In addition, even though the district court granted a motion in limine excluding this evidence, the Sheriffs Department nonetheless introduced testimony regarding conversations between its employees and Wall Data employees. The Sheriffs Department did not point to any evidence that they were prevented from offering because of the district court’s ruling. The Sheriffs Department has not shown any prejudice based on the district court’s ruling on the motion in limine, and therefore any error was harmless.
The district court did not abuse its discretion when it found that the above evidence would confuse or mislead the jury. Accordingly, the district court’s evidentia-ry rulings on these points are affirmed.
2. Admission of the Sheriffs Department’s Internal Memorandum
Before trial, the district court ruled that internal Sheriffs Department communications concerning settlement negotiations between Wall Data and the Sheriffs Department would be excluded. The district court later allowed Wall Data to introduce an internal memorandum dated March 23, 2001,. prepared by a Sheriffs Department employee related to the dispute. In the memorandum, a Sheriffs Department employee admitted that he “did not know how to tell which [computers] RUMBA is used on and on which ones it has never been used.” The Sheriffs Department objected on the basis that the *784 memorandum was prepared in aid of settlement discussions. The district court overruled the Sheriffs Department’s objection and allowed Wall Data to introduce the document.
On appeal, the Sheriffs Department claims that admission of the document constitutes reversible error because the memorandum was prepared in aid of settlement discussions. Not so. The district court properly determined that the parties’ settlement discussions did not crystallize until March 29, 2001, almost a week after this memorandum was written. This memorandum merely recounted a meeting between Sheriffs Department employees and Wall Data to discuss possible over-use of the RUMBA licenses. Because the memorandum did not contain evidence “furnishing or offering or promising to furnish ... valuable consideration in compromising or attempting to compromise a claim which was disputed as to either validity or amount,” Fed.R.Evid. 408, and because the memorandum was written before settlement discussions began, admission of the memorandum by the district court did not constitute reversible error.
C. The District Court’s Jury Instructions Were Not Erroneous
We review
de novo
whether a jury instruction misstates the law.
See White v. Ford Motor Co.,
1. Jury Instructions Related to the Essential Step Defense Under 17 U.S.C. § 117 Were Not Erroneous
The Sheriffs Department requested that the district court instruct the jury on the difference between a “licensee” and an “owner” for purposes of a § 117 “essential step” defense. We conclude that the district court did not abuse its discretion when it declined to do so.
The essential step defense attempts to strike a balance between the interests of software users and software developers. See 17 U.S.C. § 117. This section permits the owner of a copy of a copyrighted computer program to make (or authorize the making of) another copy of the program, if the copy is created as an “essential step in the utilization of the computer program in connection with the [computer, and] is used in no other manner.” Id. The “essential step” defense also ensures that a software user does not infringe when the user “copies” the software from the computer’s permanent storage (the hard drive, for example) onto its active memory (the random access memory, for example). Section 117 also allows the owner to make a copy of the computer program if the copy is “for archival purposes only and ... all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.” Id.
Section 117, by its own terms, applies only to “the
owner of a copy
of the computer program.” 17 U.S.C. § 117 (emphasis added). In the leading case on
*785
ownership under § 117, we considered an agreement in which MAI, the owner of a software copyright, transferred copies of the copyrighted software to Peak under an agreement that imposed severe restrictions on Peak’s rights with respect to those copies.
See MAI Sys. Corp. v. Peak Computer, Inc.,
Here, we conclude that the Sheriffs Department received licenses to the RUMBA software. Generally, if the copyright owner makes it clear that she or he is granting only a license to the copy of software and imposes significant restrictions on the purchaser’s ability to redistribute or transfer that copy, the purchaser is considered a licensee, not an owner, of the software. In this case, as in MAI, the licensing agreement imposed severe restrictions on the Sheriffs Department’s rights with respect to the software. Such restrictions would not be imposed on a party who owned the software. The Sheriffs Department’s use of and rights to the RUMBA software products were restricted under the terms of the click-through and volume booklet licenses. These restrictions were sufficient to classify the transaction as a grant of license to Wall Data’s software, and not a sale of Wall Data’s software. For these reasons, under MAI, the Sheriffs Department is not the “owner” of copies of Wall Data’s software for purposes of § 117.
Even if we were to accept that the Sheriffs Department was the “owner of copies” of RUMBA for § 117 purposes, 9 the Sheriffs Department’s conduct was not an “essential step,” and therefore any error in instruction was harmless. The Sheriffs Department argued that “it was inherently necessary to copy the entire RUMBA package onto hard drives, albеit within the constraints of a security system that made the challenged copies unusable.” This argument is unpersuasive. Substantial evidence demonstrates that the Sheriffs Department’s decision to copy the RUMBA software products was not an essential step, but a matter of convenience. It copied the software onto 75 computers without the aid of hard drive imaging, and switched to hard drive imaging because its deadline in opening Twin Towers loomed large, not because manual installation had become more difficult. Even under time pressure, there was no need for the Sheriffs Department to copy *786 the RUMBA Office software onto the hard drives of nearly all of its Twin Towers computers. Instead, the Sheriffs Department could have used hard drive imaging to install RUMBA software onto the number of computers for which it had licenses. Its decision not to do so was an effort to save time and preserve flexibility, and was not a necessity. We conclude that the essеntial step defense was not intended to cover such situations. Consequently, any failure by the district court to instruct the jury on the distinction between an owner and a licensee was harmless.
2. The District Court’s Refusal to Instruct the Jury on Rules of Contract Formation
The district court ruled that the click-through, shrink-wrap, and volume booklet licenses constituted the operative contracts, and declined to instruct the jury on the rules of contract formation and construction, as suggested by the Sheriffs Department. Because contract formation and interpretation are questions of law for the court to determine,
see In re Bennett,
3. Jury Instructions Regarding Damages
The district court gave the following jury instructions related to damages:
Damage means the amount of money which will reasonably and fairly compensate Wall Data for any injury you find was caused by the Los Angeles sheriffs department.... Your award must be based on evidence and not speculation, guesswork, or conjecture.... Actual damages means the amount of money to adequately compensate the copyright owner for the reduction of the market value of the copyrighted work caused by the infringement. The reduction of the market value of the copyrighted work is the amount a willing buyer would have been reasonably required to pay a willing seller at the time of the infringement for the actual use made by the Los Angeles Sheriffs department of the plaintiffs work. That amount also could be represented by the lost license feеs Wall Data would have received for the unauthorized copies.
We conclude that such instructions properly state the law of damages in a copyright infringement suit. “Actual damages are usually determined' by the loss in the fair market value of the copyright, measured by the profits lost due to the infringement or by the value of the use of the copyrighted work to the infringer.”
Polar Bear Prods., Inc. v. Timex Corp.,
Moreover, the jury’s finding was appropriate and was not speculative, and therefore any error was harmless. Specifically, the jury heard testimony from Wall Data’s vice president that the average price Wall Data charged the vendor that
*787
sold software to the Sheriffs Department was $189. She admitted on cross-examination that government entities were charged $113 per copy. The jury returned a general verdict awarding Wall Data damages of $210,000. It is not clear how the jury calculated this award: At one extreme, if the jury found that the Sheriffs Department infringed on 2,344 copies (6,007 computers — 3,663 total RUMBA Office and RUMBA Mainframe licenses), the award was approximately $90 per copy. At the other extreme, if the jury found that the Sheriffs Department infringed on 3,962 copies (6,007 computers — 2035 RUMBA Office licenses), the award was $53 per copy. Either way, these amounts were within an acceptable range — $85 original price paid by the Sheriffs Department and $189 average price. Because “the jury’s verdict[ ] find[s] substantial support in the record and lie[s] within the range sustainable by the proof,” any error in instruction was harmless.
Los Angeles Mem’l Coliseum Comm’n v. Nat’l Football League,
D. Wall Data’s Attorneys’ Fees
The Copyright Act provides for an award of reasonable attorneys’ fees “to the prevailing party as part of the costs.” 17 U.S.C. § 505. A district court may consider (but is not limited to) five factors in making an attorneys’ fees determination pursuant to § 505. These factors are (1) the degree of success obtained, (2) frivolousness, (3) motivation, (4) reasonableness of losing party’s legal and factual arguments, and (5) the need to advance considerations of compensation and deterrence.
See Smith v. Jackson,
In this case, the district court cited the above-listed factors in its order granting Wall Data’s motion for attorneys’ fees. It found that Wall Data was the prevailing party, even though Wall Data’s ultimate recovery was less than that which it originally sought. Contrary to the Sheriffs Dеpartment’s argument, this was not an abuse of discretion.
See
Nimmer on Copyright § 14.10[B], at 14-176 to -177 (“The plaintiff will ordinarily be regarded as the prevailing party if he succeeds at trial in establishing the defendant’s liability, even if the damages awarded are nominal or nothing.”). The court therefore concluded that attorneys’ fees furthered the goal of copyright law. It found that the attorneys’ rates were reasonable within the prevailing market, but reduced the total award based on the experience of the attorneys and the complexity of the issues. Reversal is not appropriate here because we lack a definite and firm conviction that the district court committed a clear error of judgment in the conclusion it reached upon a weighing of the relevant factors.
See Smith,
III. CONCLUSION
For the foregoing reasons, we AFFIRM the district court’s orders entering final judgment following a jury trial against the Sheriffs Department and awarding Wall Data attorneys’ fees and costs.
Notes
. We use the terms "computer software," "software application,” and "computer program" interchangeably.
. The Sheriffs Department argues that it bought 2,000 copies of the software, while Wall Data claims that the Sheriff's Department bought 2,000 licenses to the software. As discussed below, we conclude that the Sheriff’s Department bought licenses to, not copies of, Wall Data’s software.
. Specifically, a Sheriffs Department computer network administrator would limit user access to the RUMBA Office program by assigning "logical units” to each computer workstation. These logical units were unique identification numbers that the workstation electronically presented to the host computer. The host computer would then determine whether the electronic identification number matched one of the workstations authorized to communicate with the host computer through the RUMBA software. If the workstation was not on thе list of assigned logical units, the installed copy of the RUMBA software would remain installed, but unused, in the hard drive of that workstation. Hard drive imaging ensured that employees could access RUMBA software on any workstation in the facility, so long as that workstation had been assigned a logical unit by the network administrator.
. A shrink-wrap license is a form on the packing or on the outside of the CD-ROM containing the software which states that by opening the packaging or CD-ROM wrapper, the user agrees to the terms of the license.
See, e.g., Specht v. Netscape Commc'n Corp.,
.A "click-through license” is a form embedded in computer software which requires the person initially installing the software onto a computer to affirmatively click a box or an "accept” button indicating that the user accepts the terms of the license in order to complete the software installation and to use the software after it is installed.
See, e.g., SoftMan Prods. Co. v. Adobe Sys. Inc.,
Wtill Data ... grants you (“You”), the end user, a non-exclusive license to use the enclosed software program ... on a single Designated Computer for which the software has been activated. A "Designated Computer” is either (i) a stand-alone workstation, or (ii) a networked workstation which does not permit the Software to be shared with other networked workstations. You may not use the Software in any other multiple computer or multiple user arrangement. You may not use the Software other than on a Designated Computer, except that You may transfer the Software to another Designated Computer and reacti *776 vate it for use with such other Designated Computer not more than once every 30 days, provided that the Software is removed from the Designated Computer from which it is transferred.
. To be clear, we do not hold that a fair usе defense is not available simply because the infringer uses technology to make efficient use of its licenses. The problematic aspect of the Sheriff’s Department's use is that it took in excess of what it bargained for, not that it was technologically efficient. Thus, for example, if the Sheriff’s Department had saved time and money by hard drive imaging RUMBA software onto the number of computers for which it had licenses, its "efficiency” would not create a problem.
. The Sheriff's Department has argued that this document is inadmissible. As discussed more fully below, we believe the district court did not err in allowing this document to be introduced.
. A concurrent user license allows multiple users to access the same software, but limits the number of simultaneous computer users to the number of licenses purchased. For example, where a licensee purchases five concurrent use licenses, five people wоuld be able to access the software, but when the sixth person tried to access the software, access would be denied.
. We recognize that our decision in
MAI
has been criticized.
See
Nimmer on Copyright § 8.08[B][l][c], at 8-136;
see also DSC Commc’ns Corp. v. Pulse Commc'ns, Inc.,
