Digital Drilling Data Systems LLC v. Petrolink Services Inc. et al, No. 4:2015cv02172 - Document 157 (S.D. Tex. 2018)

Court Description: OPINION AND ORDER granting in part and denying in part 70 Motion for Summary Judgment; granting 73 Sealed Motion; granting in part and denying in part 87 Sealed Motion; mooting 89 Sealed Motion; granting in part and denying in part 90 Sealed Motion; granting in part and denying in part 93 Sealed Motion; mooting 94 Sealed Motion; denying 95 Sealed Motion; denying 96 Sealed Motion; mooting 106 Sealed Motion.(Signed by Judge Melinda Harmon) Parties notified.(jdav, 4)

Download PDF
Digital Drilling Data Systems LLC v. Petrolink Services Inc. et al Doc. 157 United States District Court Southern District of Texas ENTERED UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION DIGITAL DRILLING DATA SYSTEMS LLC, § § Plaintiff, § VS. § § PETROLINK SERVICES INC. and § LEE GEISER § § Defendants. § May 17, 2018 David J. Bradley, Clerk CIVIL ACTION NO. 4:15-CV-02172 OPINION AND ORDER Pending before the Court in the above-referenced cause of action are the following motions: Filed by Plaintiff Digital Drilling Data Systems, LLC (“Digidrill” or “Plaintiff”): 1. 2. 3. 4. Motion for Summary Judgment on Copyrightability (Doc. 93) Motion for Partial Summary Judgment Against Defendants’ Affirmative Defense of Fair Use (Doc. 94) Motion for Summary Judgment on Violation of the Digital Millennium Copyright Act Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 95) Motion for Summary Judgment on Copyright Infringement Under 17 U.S.C. § 501(a) (Doc. 96) Filed by Defendant Lee Geiser, president and chief executive of Petrolink Services, Inc.: 5. Motion for Summary Judgment on Copyright and Unjust Enrichment Causes of Action (Doc. 70) Filed by Defendants Petrolink Services, Inc. and Lee Geiser (“Petrolink” or “Defendants”): 6. 7. 8. Motion for Partial Summary Judgment on Anti-Circumvention Causes of Action under 17 U.S.C. § 1201(a)(1)(A) (Doc. 73) Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 87) Motion for Partial Summary Judgment on Damages Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 89) 1 / 34 Dockets.Justia.com 9. 10. Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 90) Motion for Partial Summary Judgment with Respect to Digidrill’s Indirect Profits Damages (Doc. 106) Having considered the Motions, all responses thereto, the relevant facts and the applicable law, the Court finds that Plaintiff’s Motion for Summary Judgment on Copyrightability (Doc. 93) is granted in part and denied in part, Defendants’ Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 87) is granted in part and denied in part, Defendants’ Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 90) is granted in part and denied in part, Plaintiff’s Motion for Summary Judgment on Copyright Infringement Under 17 U.S.C. § 501(a) (Doc. 96) is denied, Defendants’ Motion for Partial Summary Judgment on AntiCircumvention Causes of Action under 17 U.S.C. § 1201(a)(1)(A) (Doc. 73) is granted, Plaintiff’s Motion for Summary Judgment on Violation of the Digital Millennium Copyright Act Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 95) is denied, Defendant Lee Geiser’s Motion for Summary Judgment on Copyright and Unjust Enrichment Causes of Action (Doc. 70) is denied, Plaintiff’s Motion for Partial Summary Judgment Against Defendants’ Affirmative Defense of Fair Use (Doc. 94) is denied as moot, Defendants’ Motion for Partial Summary Judgment on Damages Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 89) is denied as moot, and Defendants’ Motion for Partial Summary Judgment with Respect to Digidrill’s Indirect Profits Damages (Doc. 106) is denied as moot. I. FACTUAL BACKGROUND A. The DataLogger program This case arises from alleged violations by Defendants Petrolink and its president Lee Geiser of United States copyright law. Specifically, Plaintiff alleges that Defendants Petrolink 2 / 34 and Geiser (1) engaged in copyright infringement in violation of 17 U.S.C. § 501(a); (2) willfully violated the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 1201(a)(1) by circumventing a technological measure that effectively controlled access to Plaintiff’s copyrighted work; and (3) willfully violated the U.S. Copyright Act, 17 U.S.C. §§ 106(1), 501, and 1201(a)(1)(A) by knowingly circumventing the copyright protection measures embedded by Plaintiff for the purpose of extracting copyrighted data for its own commercial gain. Plaintiff further alleges that Defendant Petrolink was unjustly enriched by selling Plaintiff’s copyrighted data as its own and has garnered profits that rightfully belong to Plaintiff. Plaintiff Digidrill is a leading provider of software and hardware to directional drilling companies in North America. Digidrill’s primary product is DataLogger, a “measuring while drilling” (“MWD”) software package popular among independent operators that assists oil and gas companies in their efforts to accurately steer drill bits into specific targets thousands of feet underground. It functions by providing drilling companies and well operators with accurate and real-time data that aids in successfully geosteering the drill bit. DataLogger itself is an application consisting of software installed on a computer that works in conjunction with rig sensors and other tools located at the end of the drill pipe. Doc. 93 at 4–5. Digidrill has registered copyrights in the DataLogger software version 4.9, registration number TXU1842064, and version 5, registration number TXU1842092. First Amended Complaint (“FAC”) at 1–2. When DataLogger is running on a computer, it has two primary processes: one is that the Interface Process receives input and performs calculations which indicate measurements of interest to the user; the other is that the Database Process stores all the raw data upon which the calculations are based as well as the manipulated data in an organized schema. The schema and 3 / 34 the data are available only to licensed users and only in measured pieces allowed by DataLogger. Doc. 95 at 1. The Interface Process receives raw data gathered by MWD tools and sensors from deep in a well as a drill bit cuts through underground formations and performs calculations on the raw data to generate logs, accurate survey reports, corrected gamma readings, and other useful information on a real-time basis. Additionally, the Interface Process uses the host computer to stream the raw data to other entities working at the well site via a Wellsite Transfer Specification (WITS) feed for no additional license fee. Meanwhile, all the data, both raw and manipulated, is written onto, read from, retained, and stored on the Database Process. Of the calculations made to correct the raw data, two are of particular importance in this lawsuit. First, Digidrill applies its own allegedly proprietary formula to raw gamma data received from the downhole gamma ray sensor, using a scaling process which combines multiple correction factors to correct and improve the usability of the raw gamma readings. The corrected gamma reading is stored in a field called “API” in a table called “GAMMA” in the DataLogger Database. Correct gamma readings are essential to properly geosteer a well into a targeted zone. Second, Digidrill applies its own allegedly proprietary method to correct the depth measurements for the drill bit as it cuts through the formation. DataLogger uses a pre- configured, discretionary determination to record depth values at certain intervals, corrects the depth measurement using a method which allows for clean, even-stepped logs, then exports the downhole logging data into a “.LAS” file. The corrective step applied prior to exporting the data reduces the number of ways the measurement values can become skewed due to interpolation. The corrected depth measurement values are stored in the “MD” field in several different DataLogger Database tables, including ones called “WITS” and “GAMMA.” Licensed users of 4 / 34 the DataLogger Application have access to the corrected and accurate drilling data on a real-time basis, but the amended data has never intentionally been made available in real-time to any third parties such as Petrolink. Doc. 93 at 9. In addition to performing corrective calculations on raw data, Digidrill also organizes and sorts the data into a logical schema so that the massive amount of data can be easily read and made use of by Digidrill customers. The Database schema includes 27 separate tables into which the data is sorted and organized, with an aggregate of 433 columns. There are endless ways to potentially organize the data, but the precise number of tables and fields in the schema developed by Digidrill are encoded within the DataLogger source code. Given the vast amount of data needing to be structured and organized into a usable, readable format, it took many years to develop the DataLogger Database schema into its current, user-friendly layout. Id. at 10. Digidrill implemented original nomenclature to designate each table and field and set up a system where the entries in different tables can relate to each other. Id. at 11. These relationships, which are programmed into the source code of DataLogger, allow Digidrill to develop an information hierarchy by connecting pieces of data that are related to each other in some abstract way. The DataLogger Database was originally formatted to be opened using a program called Microsoft Access. As its schema became more complex, however, Digidrill decided to convert the Database from a Microsoft Access format to the Firebird Database format, a different format more capable of smoothly handling the DataLogger Database’s complexity. While Microsoft Access and Firebird are different formats, Digidrill was able to maintain the general database schema in the new format, with a few minor changes. The schema of the DataLogger Database is generated by DataLogger’s 3000 lines of source code using the Firebird Database Server 5 / 34 program upon installation of DataLogger by a user. Doc. 93 at 15. Data stored on the Firebird server is capable of being queried by DataLogger users with off-the-shelf software products. Doc. 73-1 at 1. As will be discussed further, this lawsuit arises because Petrolink managed to gain access to this data gathered by DataLogger and stored in the DataLogger Database, and then Petrolink used the data it acquired to advance its own business interests. B. Petrolink’s Alleged Hack Petrolink is a competitor of Digidrill. Petrolink was developing a real-time drilling data visualization program and Digidrill was also planning to develop a similar type of program. In order to display a visualization of real-time data, Petrolink needed the actual, corrected data, which the DataLogger program had already determined and recorded. Therefore, rather than starting from scratch and gathering its own original drilling data, Petrolink used the corrected data stored in the DataLogger Database as input for its visualization program. Doc. 73-1 at 1. In order to obtain the real-time data it needed from Digidrill, Petrolink developed a program, also called the “hack,” “Scraper,” or “Rig WITSML” program, to break into the DataLogger Database and make copies of the accurate data in real-time, including portions of the database schema and the corrected survey and gamma data. Id.; Doc. 93 at 16. The parties dispute whether Petrolink accessed Digidrill’s information in violation of the DMCA’s anticircumvention rule, how far Digidrill’s copyright in DataLogger extends beyond the source code itself, and whether Petrolink’s actions constitute copyright infringement. II. STANDARD OF REVIEW Summary judgment is appropriate under Rule 56 of the Federal Rules of Civil Procedure only “if the pleadings, depositions, answers to interrogatories, and admissions on file, together with affidavits, if any, show that there is no genuine issue as to any material fact and that the 6 / 34 moving party is entitled to judgment as a matter of law.” FED. R. CIV. P. 56. A dispute is genuine only if the evidence is such that a reasonable jury could return a verdict for the nonmoving party. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 254, 106 S. Ct. 2505, 2513 (1986). The party moving for summary judgment bears the initial burden of “informing the district court of the basis for its motion, and identifying those portions of [the record] which it believes demonstrate the absence of a genuine issue of material fact.” Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S. Ct. 2548, 2553 (1986). The burden then shifts to the nonmoving party to establish the existence of a genuine issue for trial. See Matsushita Elec. Indus. Co., Ltd. v. Zenith Radio Corp., 475 U.S. 574, 585–87, 106 S. Ct. 1348, 1355–56 (1986); Wise v. E.I. Dupont de Nemours & Co., 58 F.3d 193, 195 (5th Cir. 1995). The parties may satisfy their respective burdens by tendering depositions, affidavits, and other competent evidence. Topalian v. Ehrman, 954 F.2d 1125, 1131 (5th Cir. 1992). “Supporting and opposing affidavits shall be made on personal knowledge, shall set forth such facts as would be admissible in evidence, and shall show affirmatively that the affiant is competent to testify to the matters stated therein.” FED. R. CIV. P. 56(e). The Court will view the summary judgment evidence in the light most favorable to the non-movant. Rosado v. Deters, 5 F.3d 110, 122 (5th Cir. 1993). The non-movant must respond to the motion by setting forth particular facts indicating that there is a genuine issue for trial. Mississippi River Basin Alliance v. Westphal, 230 F.3d 170, 174 (5th Cir. 2000). “After the nonmovant has been given the opportunity to raise a genuine factual issue, if no reasonable juror could find for the non-movant, summary judgment will be granted.” Id. III. ANALYSIS A. 7 / 34 Copyrightability It is undisputed that Digidrill’s copyright registrations cover the DataLogger source code; the parties do dispute, however, how far the copyright in the source code extends and what it actually covers beyond the source code itself. Specifically, the parties dispute whether it covers the DataLogger database, the database schema, and the corrected data output. Defendants Petrolink and Lee Geiser filed a motion for summary judgment, Doc. 87, with respect to the causes of action for copyright infringement, Counts 1 and 3 the First Amended Complaint (“FAC”). In that motion, they argue that summary judgment is proper on the copyright infringement causes of action for two reasons: (1) Digidrill’s copyright registrations are only in the DataLogger computer program itself and do not extend to cover the measurements entered by the user, the schema created by the software, or the data output; and (2) Digidrill is not asserting a copyright in the works at issue in this case, the Firebird databases themselves. In other words, Defendants argue that no copyright infringement occurred because the copied works are not subject to copyright in the first place. Plaintiff also filed a motion for summary judgment on the issue of copyrightability, Doc. 93, arguing that both the database schema and the corrected data output are subject to copyright. Plaintiff contends that Digidrill owns the copyright in the DataLogger Database because it is created by DataLogger, and because the DataLogger Database is generated by the copyrighted DataLogger source code, it is a nonliteral element of the copyrighted DataLogger program subject to copyright. Defendants assert that the database is primarily a result of user input, but Plaintiff argues that even though MWD users input information into DataLogger’s wizard screen, the database schema and corrected data reflect the content of the DataLogger program code and fall within Digidrill’s copyright. 8 / 34 Furthermore, while Defendant maintains that the actual data output represents uncopyrightable facts, Plaintiff argues that the data output is the product of DataLogger’s unique and creative formulas and contains a creative spark, rendering it subject to copyright. Plaintiff likens the output to “predictions,” which courts have found to be copyrightable. See CCC Information Services, Inc. v. MacLean Hunter Market Reports, Inc., 44 F. 3d. 61, 67 (2d Cir. 1994) (holding that a company’s prediction of future facts is copyrightable). i. The Firebird databases As a preliminary matter, Defendants’ assertion that Plaintiff attempts to claim that its copyright extends to the source code of the Firebird software and databases is incorrect. See Doc. 87 at 22. As Plaintiff states in its response, Digidrill has never alleged infringement of the Firebird Database software. Doc. 110 at 22. Firebird is merely a template-like application used by DataLogger to serve as a repository for displaying and saving the DataLogger database. Id. at 23. When DataLogger creates a database, it opens the Firebird database server to embody the DataLogger Database created from DataLogger’s source code. Id. at 23–24. The Firebird application itself does not contain any of Digidrill’s schema; rather, Firebird creates the database files exclusively at the direction of the DataLogger source code, which is the sole source of the DataLogger Database schema. Id. at 24–25. The true issue at hand regarding copyrightability, therefore, does not concern the Firebird database, but relates to Petrolink’s alleged infringement and copying of Digidrill’s DataLogger Database schema and data. Therefore, the Court will consider the parties’ arguments relating to the DataLogger Database and whether Digidrill’s copyright extends to: (1) the DataLogger Database schema; and (2) the data logged by the DataLogger program and stored in the DataLogger Database via the Firebird application. 9 / 34 ii. The DataLogger Database schema As previously stated, Digidrill has registered copyrights in the DataLogger software versions 4.9 and 5. The boundaries of copyright in a computer program have been explained by the Fifth Circuit as follows: It is settled that computer programs are entitled to copyright protection. This protection extends not only to the “literal” elements of computer software—the source code and object code—but also to a program’s non-literal elements, including its structure, sequence, organization, user interface, screen displays, and menu structures. To assess a claim of software infringement, we have generally endorsed the “abstraction-filtration-comparison” test first outlined by the Second Circuit in Altai and refined by the Tenth Circuit in Gates Rubber Co. v. Bando Chemical Industries, Ltd. The Altai test deploys a three-step procedure to assess whether protectable expression has been improperly copied. First, at the abstraction stage, the court “dissect[s] the allegedly copied program's structure and isolate[s] each level of abstraction contained within it.” Second, the court filters out unprotectable expression by examining the structural components at each level of abstraction to determine whether they can be protected by copyright. Copyright protection does not extend to ideas, processes, facts, elements dictated by considerations of efficiency, elements required by factors external to the program itself, or items taken from the public domain. With these nonprotectable elements filtered out, there remains a “core of protectable expression,” and we must then “determine whether the defendant's program misappropriated substantial portions of the plaintiff's program.” General Universal Systems, Inc. v. Lee, 379 F.3d 131, 142–43 (5th Cir. 2004) (per curiam) (citations omitted). The parties dispute whether the database schema is a protectable literal or nonliteral element of the copyrighted DataLogger source code. Plaintiff cites an opinion from a district court in Washington, D.C. to support its contention that database schema generated by a program are considered nonliteral elements of the program because they are embodied within the source code of the program: 10 / 34 A computer program is “a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.” 17 U.S.C. § 101. Copyright protection “extends to all the copyrightable expression embodied in the computer program.” United States Copyright Office, Circular 61, Copyright Registration for Computer Programs (2006). Copyright protection extends not only to the literal elements of a computer program—source code and object code—but also to the program's nonliteral elements, which are “the products that are generated by the code's interaction with the computer hardware and operating program(s).” MiTek Holdings, 89 F.3d at 1555 n.15; see also General Universal Sys., Inc. v. Lee, 379 F.3d 131, 142 (5th Cir. 2004) (finding that copyright protection of a computer program extends to nonliteral elements, including “structure, sequence, organization, user interface, screen displays and menu structures”); Whelan Assoc., Inc. v. Jaslow Dental Lab., Inc., 797 F.2d 1222, 1248 (3d Cir. 1986) (holding that copyright protection of computer programs “extend beyond the programs' literal code to their structure, sequence, and organization”). DSMC, Inc. v. Convera Corp., 479 F. Supp. 2d 68, 81 (D.D.C. 2007) (finding that a database schema was “embodied in” a copyrighted computer program). Plaintiff argues that because the DataLogger source code calls a custom script which creates and generates the database schema in each new database file, the schema is embedded in Digidrill’s source code and exists in the database files independently of any raw data from the well site. Doc. 110 at 24. Thus, DataLogger’s database schema is covered by its copyright of the source code as a nonliteral element embodied in the code. Additionally, Digidrill argues it does not need individual copyright restrictions in the DataLogger databases to sue Petrolink for copying the DataLogger source code of the schema and corrected data which are embodied in the source code. In response, Petrolink insists that Digidrill’s copyright registrations are only on the DataLogger computer program itself and, as a matter of law, do not extend to the databases created by the code. Defendants cite to a case from the Northern District of California, Design Data Corporation v. Unigate Corporation, 63 F. Supp. 3d 1062, 1068–69 (N.D. Cal. 2014), 11 / 34 affirmed in part, 847 F. 3d 1169 (9th Cir. 2017) (reversed on other grounds), to argue that the all output from a computer program constitutes “data” not protected by a copyright in the computer program itself. Doc. 102 at 53–54. In that case, on appeal, the Ninth Circuit affirmed the district court’s finding but applied the test from Torah Soft Ltd. v. Drosnin, 136 F. Supp. 3d 276 (S.D.N.Y. 2001), which states that if the copyrighted program does “the lion’s share of the work” in creating the output, and “the user’s role is so ‘marginal’ that the output reflects the program’s contents,” then the copyright protection may indeed extend to the program’s output. Defendants contend that even using the less stringent Torah Soft test, the database is not copyrightable because the user’s role in creating the database is not marginal. Defendants also argue that the database cannot be copyrighted because it does not pass the originality test in Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 345– 48, 111 S. Ct. 1282, 113 L.Ed.2d 358 (1991), the parameters of which were discussed by the Seventh Circuit in deciding whether a database had the requisite originality to be subject to copyright: Copyright law unlike patent law does not require substantial originality. Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 345–48, 111 S. Ct. 1282, 113 L.Ed.2d 358 (1991). In fact, it requires only enough originality to enable a work to be distinguished from similar works that are in the public domain, Bucklew v. Hawkins, Ash, Baptie & Co., 329 F.3d 923, 929 (7th Cir. 2003); Alfred Bell & Co. v. Catalda Fine Arts, Inc., 191 F.2d 99, 102–03 (2d Cir. 1951), since without some discernible distinction it would be impossible to determine whether a subsequent work was copying a copyrighted work or a public-domain work. This modest requirement is satisfied by Market Drive because no other real estate assessment program arranges the data collected by the assessor in these fields grouped into these 34 categories, and because this structure is not so obvious or inevitable as to lack the minimal originality required, Key Publications, Inc. v. Chinatown Today Publishing Enterprises, Inc., 945 F.2d 509, 513–14 (2d Cir. 1991), as it would if the compilation program simply listed data in alphabetical or numerical order. Feist Publications, Inc. v. Rural Telephone Service Co., supra, 499 U.S. at 362–64. The obvious orderings, 12 / 34 the lexical and the numeric, have long been in the public domain, and what is in the public domain cannot be appropriated by claiming copyright. Alternatively, if there is only one way in which to express an idea—for example, alphabetical order for the names in a phone book—then form and idea merge, and in that case since an idea cannot be copyrighted the copying of the form is not an infringement. Ets–Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1082 (9th Cir. 2000); Kregos v. Associated Press, 937 F.2d 700, 705–07 (2d Cir. 1991). That is not the situation here. Assessment Techs. of WI, LLC v. WIREdata, Inc., 350 F.3d 640, 643 (7th Cir. 2003). Here, the database schema passes both the Torah Soft test and the Feist originality test. In terms of the user’s role, it is true that the program relies on data input from the user in order to create the data output. However, the schema itself is not a result of user input; rather, it is an organizational structure that has been pre-formulated and exists in the source code independently of user input. The user input merely fills in the blanks of the schema. Furthermore, the amount of data organized by the schema is so vast, and there are so many possible different ways to arrange and coordinate the data, the Court finds that the database schema satisfies the level of originality required by Feist. The data is not organized in an obvious manner, such as alphabetically or numerically, but in a unique, creative, relational expression of ordering. See, e.g., Snap-on Bus. Sols. Inc. v. O'Neil & Assocs., Inc., 708 F. Supp. 2d 669, 685 (N.D. Ohio 2010) (finding a database’s link structure represents a unique organization of data). For example, Digidrill selects and sorts the raw and corrected data into particular tables and fields which are “linked together in unique ways” that are creative and discretionary. Doc. 93 at 21. In conclusion, considering the nature of its structure, organization, interface and display, the database schema fits the classification of a “nonliteral element” of the copyrighted DataLogger software. See Gen. Universal Sys., Inc. v. Lee, 379 F.3d 131, 142 (5th Cir. 2004). Therefore, because the database is original, and based on the broad understanding of the 13 / 34 nonliteral elements of computer programs, the Court finds that the schema generated by the DataLogger source code is covered by Digidrill’s DataLogger copyright. iii. The DataLogger data As for the data itself, Plaintiff argues that because the source code applies certain significant and unique calculations to the data entered by the user, the data output, or the “corrected data,” reflects the content of the DataLogger code and falls within Digidrill’s copyright as well. Doc. 110 at 28. Plaintiff clarifies that it is not claiming a copyright in the data input by the MWD users or in the raw data input gathered by MWD sensors and tools. Id. Rather, Digidrill alleges that Petrolink (1) created copies of the copyrighted DataLogger database schema in the operating computer’s Random Access Memory (“RAM”) every time its hacking program issued a query to Digidrill’s database; (2) embodied a copy of a portion of the DataLogger schema in its hacking program’s source code; and (3) copied Digidrill’s allegedly copyrighted and proprietary corrected data into memory every time the hacking program was run. Id. at 28–29. Digidrill seeks to apply the Torah Soft test to the data output, arguing that DataLogger did the “lion’s share” of the work in generating the data output because the users did not input any portion of the formulas applied by DataLogger to the raw data inputs. Therefore, argues Plaintiff, the data output is also a nonliteral element of the copyrighted source code. Defendants do not dispute the fact that they copied the corrected data output, but they challenge the notion that the data is capable of being copyrighted in the first place. Defendants present three arguments in defense of their position. First, Defendants contest Plaintiff’s application of the Torah Soft test. Defendants assert that the data logged by the DataLogger program and stored within the databases is not copyrightable because the MWD Company user plays a “significant” and not a “marginal” role in producing the data output, since no output can 14 / 34 be produced without the user providing raw measurement inputs into the program. Doc. 126 at 15. Second, Defendants point out that regardless of whether the corrected data constitutes a nonliteral element of the copyright, the data content is non-copyrightable because it is purely factual. It is well established that there can be no valid copyright in facts. Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 344, 111 S. Ct. 1282, 1287, 113 L. Ed. 2d 358 (1991) (“That there can be no valid copyright in facts is universally understood.”). Defendants interpret the data output to be scientific measurements and values calculated based on those measurements using standard equations; in other words, the corrected data comprises uncopyrightable “facts.” Additionally, relying on an unpublished Northern District of California opinion, Atari Games Corp. v. Nintendo of Am., Inc., No. C 88-4805 FMS, 1993 WL 214886, 1993 U.S. Dist. LEXIS 8183 (N.D. Cal. Apr. 15, 1993), Defendants argue that a copyright over a computer program does not extend to the “program data which is stored somewhere in the memory.” To this argument, Plaintiff responds that according to Atari, data output is not categorically noncopyrightable; rather, the Court must focus on “‘what’ the [output] is, and then determine whether it falls within one of the statutory categories for copyrightable subject matter.” Id. at *3. To support its contention that the corrected data values contained in the DataLogger databases are not mere facts, but creative, copyrightable works, Plaintiff states that the raw data inputted by MWD users is “creatively manipulated” by Digidrill’s “proprietary, unique formulas and calculations contained in the copyrighted DataLogger source code, performed in the DataLogger Interface Process, and embodied in each database file.” Doc. 110 at 24–25. Plaintiff states that though the raw data represent pre-existing facts, the corrected data reflect the “professional judgment and expertise” of Digidrill. Doc. 93 at 22. 15 / 34 It is undisputed by the parties that the raw data initially entered into the DataLogger program is collected by MWD tools and sensors deep down in a well. The sensors gather information relevant to the surrounding underground formations and send the raw data to the DataLogger Interface Process. The raw data, however, is not useful to users in its raw form because much of the downhole information gathered is inaccurate and needs to be corrected. For example, the raw gamma values are inaccurate because some gamma radiation is absorbed by the housing and drill collar that the tool sits in. Doc. 93 at 6–7; Second Benson Decl. at ¶ 15. Therefore, Digidrill has developed formulas to correct these inaccuracies in the raw data so that the corrected data can be useful to the users. The specific formulas in question applied by DataLogger to the raw data include the following: The API (gamma) calculation is based on a standard gamma calculation and correction method wherein the raw, measured gamma value is multiplied by two factors: a Collar Attenuation Factor and a scaling factor, inputs which represent measurements of the gamma radiation properties of the downhole rock formation. Doc. 126 at 16–17. Another measurement in question, MD (measured depth), is calculated by reading the depth measurement from a downhole sensor, determining if the actual depth is close to a desired depth logging interval, then rounding the depth measurement to the nearest logging interval. Doc. 126 at 16. Digidrill chooses the interval and determines in its discretion which data values to record at depth measurements versus time measurements based on the needs of its customers. Doc. 111 at 28. Upon careful review of these formulas, the Court finds that despite the judgment exercised by Digidrill in selecting which data values to record, the resulting calculated values, including MD and API, express geometric relationships that indicate facts about the location of the drill bit and geological formations. This factual information represents empirical realities, 16 / 34 not creative values. Copyrighted works must be original and “no one may claim originality as to facts.” Feist, 499 U.S. at 347. Because the corrected data in the database reflect concrete, factual, numerical measurements, the Court agrees with Defendants regarding the copyrightability of the data outputted by DataLogger: The corrected data calculations are indeed “mere facts” not subject to copyright. In sum, the Court finds that though the DataLogger database schema is subject to Digidrill’s copyright, the actual data entries contained in the database are not copyrightable. Accordingly, Defendants’ Motion for Summary Judgment (Doc. 87) is granted in part and denied in part, and Plaintiff’s Motion for Summary Judgment (Doc. 93) is granted in part and denied in part. B. Copyright Infringement Both parties also filed motions for summary judgment on the issue of copyright infringement: Defendants filed a Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 90) and Plaintiff filed a Motion for Summary Judgment on Copyright Infringement Under 17 U.S.C. § 501(a) (Doc. 96). Substantial portions of both motions address the issue of copyrightability, which has been discussed and decided by the Court above. Having established the extent of Plaintiff’s copyright, namely, that it covers the schema as a nonliteral element of the source code but does not extend to cover the corrected data, the Court moves on to consider remaining issues about whether the copyright as construed by this Court was infringed by Defendants. The main unresolved issue in these motions is whether or not Plaintiff has presented evidence that Defendants’ allegedly infringing works are “substantially similar” to Plaintiff’s copyrighted works, which is required to be shown in order to find copyright infringement has 17 / 34 occurred. The law dictates that to find liability for copyright infringement, the plaintiff must prove: (1) ownership of the copyrighted material and (2) copying by the defendant of constituent elements of the work that are original. Computer Management Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d 396, 400 (5th Cir. 2000); see also Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991). The first prong has already been addressed in this Opinion. The second prong, “[t]he factual question of whether the defendant actually used the copyrighted material[,] can be inferred by showing proof of access to the copyrighted work and probative similarity between the defendant’s work and the copyrighted work.” Id., citing Eng’g Dynamics, 26 F. 3d at 1340–41. However, even once it has been established that copying occurred, there is still another step required in the infringement analysis, because “[n]ot all copying. . . is copyright infringement.” Eng'g Dynamics, Inc. v. Structural Software, Inc., 26 F.3d at 1340–41, citing Feist, 499 U.S. at 361, 111 S. Ct. at 1296. For the copying to be legally actionable, a court must “determine whether there is substantial similarity between the two works.” Id.; Computer Mgmt. Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d 396, 400 (5th Cir. 2000) (“A copy is legally actionable if (1) the alleged infringer actually used the copyrighted material to create his own work, and (2) substantial similarity exists between the two works.”). To answer this second question of whether “substantial similarity” exists between the copyrighted work and the allegedly infringing work, “a side-by-side comparison must be made between the original and the copy to determine whether a layman would view the two works as ‘substantially similar.’” Bridgmon v. Array Sys. Corp., 325 F.3d 572, 576–77 (5th Cir. 2003) (citations omitted); see also Kay Berry, Inc. v. Taylor Gifts, Inc., 421 F.3d 199, 208 (3rd Cir. 2005) (Substantial similarity is determined “without the aid of expert testimony, but with the perspective of the lay observer.”). 18 / 34 i. Defendants’ copying The parties do not dispute the contention that Defendants’ hacking program copied some portion of Plaintiff’s copyrighted database schema. The following occurrences are agreed to be true by the parties: Petrolink installed its hack program on the computers of Digidrill customers at more than 300 different well sites. The hack read and copied parts of five specific tables within the DataLogger Database. Specifically, portions of 17 of the 22 fields contained within those five tables were copied. In total, the Petrolink hacking program copied and used between 4% and 7% of the available fields in the entire schema. Doc. 96 at 17–18. In Plaintiff’s words, Petrolink’s hack program copied the structure and organization of the database in three ways. First, when the hack was run, it issued a query to the DataLogger Database in order to access the desired fields. Each time the hack program queried the database, the queried portions of the schema were reproduced into the Random Access Memory (“RAM”) of the user’s computer. Id. at 18–20. Second, the Petrolink hack program copied the schema into its own memory as part of its normal operation with the Firebird server. Id. at 20–21. Third, the source code for the hack copied the schema of the DataLogger database every time a query was generated. Id. at 21. Though Defendants characterize and describe the copying in different terms, there is no genuine issue of material fact regarding the events that transpired. The true issue is whether the second prong of the test, “substantial similarity,” has been shown. Therefore, the Court will consider the question of whether the two works1 were substantially similar. 1 There is some confusion in the parties’ motions about what the “two works” in question are. For purposes of this copyright infringement analysis, the “original works” include the copyrighted DataLogger source code and the copyrighted DataLogger Database schema. The allegedly “infringing works” include the copies of the DataLogger Database schema made into the RAM of the users’ computers, the copies of the schema made into the memory of the hack program, and the copies of the schema made into the source code of the hack program. The Court compares the original works to the infringing works to determine whether they are substantially similar to each other. 19 / 34 ii. Substantial similarity Defendants’ argument at this stage focuses on the proposition that its program copied such a tiny amount of copyrighted material from Plaintiff relative to the whole database schema that there is no evidence of substantial similarity between Plaintiff’s database schema and Defendants’ copies of the database schema. Defendants explain: Petrolink only selects (i.e., receives and copies into the PetroVault database) data from 4% of the available columns in the entire Firebird database in Data Logger version 5.19—3 of 14 (21%) of the columns within the GAMMA table, 8 of 33 (24%) of the columns within the SURVEY table, 4 of 10 (40%) of the columns in the WITS table, and 2 of 10 (20%) of the columns in the WITSFIELD table. In Data Logger version 5.4, Petrolink only selects (i.e., receives and copies into the PetroVault database) data from 5% of the available columns in the entire Firbird Database. Doc. 90 at 40–41. From Defendants’ perspective, its hacking program replicated a very small percentage of the overall copyrighted work, meaning that each copied work as a whole bears no substantial similarity to the original work as a whole. Defendants cite to case law where other circuits held that such slight proportions of copying do not constitute “substantial similarity” under the Computer Management Assistance test. See Nihon Keizai Shimbun, Inc., 166 F. 3d 65, 71 (2d Cir. 1999); Schoolhouse, Inc. v. Anderson, 275 F. 3d 726, 730 (8th Cir. 2002). Additionally, Defendants argue there is no substantial similarity between the databases because the tables in the Petrolink database contain a different structure from those in Datalogger’s database. Thus, Petrolink argues, based on this miniscule amount of copying, it is impossible for Digidrill to meet its burden of showing substantial similarity, and there can be no finding of copyright infringement. See Computer Management Assistance Co. v. Robert F. DeCastro, Inc., 220 F.3d 396, 400 (5th Cir. 2000). 20 / 34 Additionally, Defendants argue that there is no substantial similarity between its database and the DataLogger database because the three database tables in Petrolink’s database contain a different structure from the ones in the Plaintiff’s database. Doc. 103 at 45. Defendants quote Plaintiff’s other motion for summary judgment, where Plaintiff states: “The schema of the Petrolink database is unique, having a completely different structure than the DataLogger Database. Thus, the schemas of the tables used in Petrolink’s database ‘bear no resemblance to the schemas of the tables within Data Logger.’” Doc. 93 at 16. Plaintiff responds by bringing the focus away from Petrolink’s storage database and back to the actual source code of Petrolink’s hack program, reiterating that Petrolink has infringed Digidrill’s copyright in DataLogger in three separate and distinct ways, none of which involve an examination of Petrolink’s own database: first, by copying the schema generated by DataLogger into the hack program’s memory each time the database was queried; second, by creating a copy of DataLogger’s schema in the operating computer’s RAM each time the database was queried; and third, by copying DataLogger’s exact schema in the source code of the hacking program. Doc. 111 at 22. In other words, while Defendants focus on comparing their own database to Plaintiff’s database, Plaintiff argues that the issue in this case is that Petrolink directly and identically copied DataLogger’s Database schema, a protectable element of its DataLogger source code, into its hack’s own source code and into the RAM of the computer operating the hack; Petrolink’s database itself is irrelevant. Doc. 111 at 29. Thus, according to Plaintiff, both elements of copying are satisfied as to the DataLogger database schema because the hacking program developed by Petrolink incorporated the DataLogger database schema into its source code and made an exact copy of it with every query. Doc. 96 at 24. 21 / 34 Plaintiff asserts there is direct evidence of these types of copying and points to depositions from Mr. Pha and Mr. Navratil. During his deposition, Mr. Pha stated that the Petrolink hacking, or “Scraper” program uses “the structure and organization embedded within DataLogger in order to query and extract data from DataLogger.” Doc. 96 at 25; Ex.1, Pha Tr. at 28:17–25, 18:1–9. He also “confirmed that he typed the exact information from the database’s structure and organization into the Scraper’s code, and that the Scraper embodies knowledge of the database’s structure.” Id. Plaintiff argues that this means the schema of the DataLogger Database is embedded within the Scraper’s source code and is copied every time a query is executed. The copying of the exact schema was necessary to query DataLogger. Id. at 27. In a different deposition, Mr. Navratil agreed that every time the Scraper executed the “fbDataReader” command, a copy of the queried portion of the database schema was read into the RAM of the computer on which the Scraper was running. Id. at 25. Plaintiff also presents circumstantial evidence of the alleged copying. Circumstantial evidence of copying requires showing that the infringer (1) had access to the work in question and (2) that the two works are “probatively” similar. Seastrunk v. Darwell Integrated Tech., 2008 U.S. Dist. LEXIS 26498 at *20 (N.D. Tex. Mar. 28, 2008). Plaintiff argues that access is demonstrated in an email from Mr. Pha to Mr. Geiser which includes an exact copy of the schema. Probative similarity is shown when there are similarities between two works that “would not be expected to arise independently in the two works and that therefore might suggest that the defendant copied part of the plaintiff’s work.” Positive Black Talk, Inc. v. Cash Money Records, 394 F.3d 357, 370 (5th Cir. 2004). Plaintiff points out similarities between the two programs such as that the Scraper’s source code contains DataLogger’s exact schema and that the two database schemas share names and data. 22 / 34 iii. Court’s Decision Though Defendants admit to copying some of Plaintiff’s DataLogger Database schema, Defendants maintain that Digidrill has still failed to prove copyright infringement because there is no evidence of substantial similarity between the original work and the copied works. Plaintiff responds that it is undisputed that Petrolink copied DataLogger’s Database schema and Petrolink misframes the analysis by prompting comparisons between the DataLogger database and its own database, which is irrelevant to Petrolink’s liability for copyright infringement. Plaintiff emphasizes that Petrolink’s hack “(1) identically copied portions of the schema into the Hack’s source code, (2) identically copied portions of the schema into the RAM of the computer executing the Hack, and (2) identically copied portions of the schema into the Hack’s own memory.” Doc. 119 at 5. The Court understands Plaintiff’s argument and agrees that Defendants’ arguments relating to the layout of its own database are not relevant. Yet, beyond arguing that direct copying occurred, Plaintiff does not engage with the question of “substantial similarity” and does not demonstrate how or why the copying is legally actionable. See Doc. 96 at 27 (arguing only that the copied elements were “substantially similar” because they were directly copied). By Plaintiff’s logic, Petrolink’s copy of the DataLogger schema was substantially similar because it was a direct and identical copy. See Doc. 96. However, not all copying is legally actionable, even if it involves direct reproduction of a copyrighted work. See Bridgmon v. Array Sys. Corp., 325 F.3d at 576–77 (5th Cir. 2003) (finding that the plaintiff needed to produce evidence of substantial similarity even when there was evidence of direct copying of the copyrighted material); Creations Unlimited v. McCain, 112 F.3d 814, 816 (5th Cir.1997) (per curiam); Attia v. Soc'y of the New York Hosp., 201 F.3d 50, 53–54 (2d Cir.1999)); King v. Ames, 179 F.3d 370, 23 / 34 376 (5th Cir. 1999). A finding of substantial similarity depends on a “comparison of the works.” Folio Impressions, Inc. v. Byer California, 937 F.2d 759, 766 (2d Cir. 1991). Plaintiff did not present evidence on this point beside the fact that portions of its schema were directly copied. Therefore, Plaintiff has not met its burden of showing substantial similarity. See Armour v. Knowles, No. CIV.A. H-05-2407, 2006 WL 2713787, at *2 (S.D. Tex. Sep. 21, 2006), aff'd on other grounds, 512 F.3d 147 (5th Cir. 2007), citing R. Ready Prods., Inc. v. Cantrell, 85 F.Supp.2d 672, 682 (S.D. Tex. 2000) (“The Court assumes for purposes of the motions for summary judgment that Plaintiff can establish factual copying. . . Therefore, Plaintiff must then prove that the copyrighted work and the allegedly infringing work are substantially similar.”). Accordingly, Plaintiff’s motion for summary judgment on copyright infringement, Doc. 96, is denied. Furthermore, though the question of substantial similarity is typically left to the impressions of a fact finder, summary judgment can be granted in favor of the defendant if the court concludes, after conducting a side-by-side comparison of the two works at issue, “that no reasonable juror could find substantial similarity of ideas and expression.” See General Universal, 379 F.3d at 142. Here, Defendants presented sufficient and convincing evidence that their work was not substantially similar to the copyrighted work. Considering the source code of the RIG WITSML program relative to the DataLogger Database schema, the two works are quite different in multiple ways, including in their content, function, purpose, and utility, and no ordinary observer would regard the works as the same. Cf. R. Ready Prods., Inc. v. Cantrell, 85 F. Supp. 2d 672, 683 (S.D. Tex. 2000), quoting Arica Institute, Inc. v. Palmer, 970 F.2d 1067, 1072 (2d Cir.1992) (“Two works are substantially similar where ‘the ordinary observer, unless he set out to detect 24 / 34 the disparities, would be disposed to overlook them, and regard [the] aesthetic appeal [of the two works] as the same.’”). As for the copies made to the RAM and to the hack program’s memory, Defendants show that they did not copy the Database schema in full, but rather copied only a small portion of the total number of columns—17 of 433—contained in the DataLogger database. Doc. 125 at 33. Moreover, each alleged copy made in RAM and memory is of a single database table, and contains only certain columns from the copied table; taken as a whole, these copies are not substantially similar to Plaintiff’s copyrighted work. See Compaq Computer Corp. v. Ergonome, Inc., 137 F. Supp. 2d 768, 779 (S.D. Tex. 2001) (“[S]ubstantial similarity requires that the copying is quantitatively and qualitatively sufficient to support the legal conclusion that infringement (actionable copying) has occurred.”). Having carefully considered the documentary evidence presented by both sides, including the relatively small percentage of the DataLogger database that was copied as well as the vastly different structure of the database tables copied into RAM and memory as compared to the DataLogger Database schema in whole, the Count concludes that Petrolink’s hack program is not substantially similar to the DataLogger Database schema. See Doc. 90 at 40–41. Accordingly, the portion of Defendants’ motion for partial summary judgment on copyright infringement addressing substantial similarity, Doc. 90, is granted. C. Anti-Circumvention under 17 U.S.C. § 1201(a)(1)(A) The parties have filed cross motions for summary judgment on the issue of whether the Defendants violated the anti-circumvention portion of the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 1201(a)(1)(A): Defendants filed their Motion for Partial Summary Judgment on Anti-Circumvention Causes of Action under 17 U.S.C. § 1201(a)(1)(A) (Doc. 73) and Plaintiff filed its Motion for Summary Judgment on Violation of the Digital Millennium 25 / 34 Copyright Act Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 95). The relevant facts concerning how Petrolink accessed Digidrill’s materials are agreed upon; the parties are, however, at odds over whether the methods used to access the copyrighted material constitute “circumvention” in violation of the statute. The DMCA provides: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” 17 U.S.C. § 1201(a)(1)(A). “[T]o ‘circumvent a technological measure’ means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A). “A technological measure ‘effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” 17 U.S.C. § 1201(a)(3)(B). i. Factual background regarding the hacking program The relevant, undisputed facts are as follows: The DataLogger software is installed on each licensed user’s computer. To run the software, the user must insert a dongle into the USB port of the computer; DataLogger will not operate without the dongle inserted. The dongle is only provided to users licensed to use DataLogger and provides access to the Interface Process, where data is inputted and outputted. Doc. 95 at 2–3. DataLogger’s second process, the Database Process, which generates and stores the data, is also protected by a password. However, the typical DataLogger user does not access the Database Process directly, but via the Interface Process. Id. at 3. The DataLogger Database Process uses the Firebird Database Server to embody its database. Id. at 6. 26 / 34 Plaintiff contends that access to DataLogger and the Database Process is protected by three technological measures. First, it is protected by “obfuscation architecture.” This means that the DataLogger application is structured such that its only “point of entry” is via the Interface Process, which requires insertion of the dongle. Id. at 7–8. The second technological protection measure is the dongle itself. The dongle can only be obtained by purchasing a license to DataLogger and it is embedded with a key corresponding to the DataLogger programming code. Id. at 9. The third technological protection measure is the internal password-protection mechanism which controls entry into the Database Process. The password is not intended to be entered by users, but rather is an internal mechanism designed only to be used by the program itself; the password is embedded within the software. Id. at 11. Petrolink’s hacking program gained access to DataLogger’s Database Process and used the corrected data stored therein to provide an accurate real-time data visualization service to its customers. In its pursuit of this corrected, accurate data held by DataLogger, Petrolink obtained a laptop running the DataLogger software from one of DigiDrill’s customers, with the customer’s permission. The laptop included the protection dongle. Using that computer, Petrolink was able to access the Database. Furthermore, Petrolink discovered that the internal password protecting the Database Process was a default password issued by Firebird that had not been changed. Id. at 14. After Petrolink gained access to the DataLogger Database Process, it developed its own hacking program, also called “Rig WITSML,” which was installed on computers running DataLogger so that Petrolink could have access to the corrected data in real time. The hack accesses the database using the internal-facing password, and, as discussed previously, 27 / 34 periodically copies information from the database for use in its own program, targeting data from the Survey table, the Gamma table, and the WITS table. Id. at 16. Though both parties state that the series of events which occurred are undisputed, unsurprisingly, each side has a different interpretation of these facts. According to Plaintiff, its copyrighted work was protected by three “technological measures,” all of which “effectively control[led] access” to the copyrighted work and all of which were circumvented by Defendant with each query issued by Petrolink’s program. Every ten seconds Petrolink’s hack sent three queries to the database, one for each of the tables containing data it sought, and thus, according to Plaintiff, each and every time this happened all three technological protection mechanisms were circumvented. Doc. 95 at 16. Plaintiff argues that the hack (1) circumvented the obfuscation architecture by avoiding or bypassing the Interface process; (2) circumvented the dongle lock by avoiding or bypassing it; and (3) circumvented the password lock by applying a key guessed by “brute force” from a program other than the Interface Process. Id. Defendant Petrolink counters that it only accessed the work via one of those measures, the internal-facing password guarding the database, and it did not “circumvent” that measure in violation of the DMCA. Additionally, it argues that the other technological measures mentioned by Plaintiff, the dongle and the obfuscation software were not circumvented and did not effectively control access to the copyrighted work. ii. Circumvention According to the undisputed facts, once Defendants learned that the data they sought was stored on a database hosted by Firebird, they discovered through online research that there was a default username and password through which Firebird databases could be accessed. Defendants tested the default log-in credentials, and since Plaintiff had not updated its username and 28 / 34 password, Defendants were able to obtain access. Though their access was unauthorized by Plaintiff, it did not constitute “circumvention” as defined by the DMCA. Many different district courts have held that using the correct username and password to access a copyrighted work, even without authorization to do so, does not constitute circumvention under Section 1201(a) of the DMCA. E.g., I.M.S. Inquiry Management Systems, Ltd. v. Berkshire Info. Systems, Inc., 307 F. Supp. 2d 521, 532 (S.D.N.Y. 2004); Egilman v. Keller & Heckman, LLP, 401 F. Supp. 2d 105, 112 (D.D.C. 2005); Joint Stock Co. Channel One Russia Worldwide v. Infomir LLC, No. 16-CV-1318, 2017 WL 696126, at *18 (S.D.N.Y. Feb. 15, 2017) (“[T]here is no liability under § 1201(a)(1)(A) where the defendant misuses a password, or otherwise uses ‘deceptive’ methods (as opposed to its own technology) to circumvent the technology that the copyright owner relied on for protection.”). Plaintiff argues that the way that Defendants guessed the password can be classified as a “brute force attack” prohibited by the DMCA. The Court disagrees that this was a brute force attack. A brute force attack is when password combinations are guessed at random until the right one is found; here, Defendants simply entered the commonly-known Firebird default credentials and were granted access to the Firebird database since the default username and password had not been modified by Plaintiff. Doc. 101 at 19. Accordingly, the Court finds that by using the default username and password to access the DataLogger database, Defendants did not descramble a scrambled work, decrypt an encrypted work, avoid, bypass, remove, deactivate, or impair a technological measure, and therefore did not by that act “circumvent a technological measure” in violation of 17 U.S.C. § 1201(a)(1)(A). iii. 29 / 34 Effective control Additionally, Plaintiff argues that Defendant circumvented two other protective technological measures: the dongle and the user interface/obfuscation architecture. In response, Defendant disputes that it circumvented those measures and also asserts that those two measures did not effectively control access to the database. Again, the Court agrees with Defendants and finds that those two measure did not effectively control access to the database under the meaning of effective control found in 17 U.S.C. § 1201(a)(3)(B). The obfuscation architecture was not circumvented and does not control access to the Firebird database where DataLogger’s data was stored. See Doc. 101 at 26. On the contrary, it was established and known that the DataLogger data files were stored in the Firebird shared library which could be accessed independently from the DataLogger software. Id. at 26–29. Because the copied files are accessible via the Firebird database without requiring interaction with the obfuscation architecture, the obfuscation architecture was neither circumvented in violation of the DMCA nor did it effectively control access to the work copied by Defendants. Similarly, while the dongle may control access to the DataLogger software, it does not control access to the Firebird Foundation database where the DataLogger schema and data were stored. As Defendants explain, “[e]ven if the dongle is unplugged. . . [the files] can still be accessed and queried on the MWD computers, including by the Rig WITSML program.” Doc. 101 at 31. The Firebird software is separate from the DataLogger software and does not rely on the dongle to allow access to it. Id. Therefore, the Court finds that the dongle was neither circumvented in violation of the DMCA nor did it effectively control access to the work copied by Defendants. iv. 30 / 34 Court’s Decision After having carefully considered both parties’ arguments, the Court agrees with Defendants. Access to the copyrighted work in question is not “effectively controlled,” under its statutory meaning, by the dongle or the obfuscation architecture. Furthermore, Defendants did not circumvent a technological measure by entering the correct username and password to access the Firebird database server. Accordingly, Defendants’ Motion for Partial Summary Judgment on Anti-Circumvention Causes of Action under 17 U.S.C. § 1201(a)(1)(A) (Doc. 73) is granted and Plaintiff’s Motion for Summary Judgment on Violation of the Digital Millennium Copyright Act Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 95) is denied. D. Unjust Enrichment Finally, in its First Amended Complaint, Plaintiff claims that by selling Digidrill’s allegedly copyrighted data as its own, Defendants have been “unjustly enriched and [have] garnered profits that rightfully belong to Digidrill.” Doc. 21 at ¶ 75. Defendants Petrolink and Lee Geiser move for summary judgment, Docs. 87 & 90, arguing that copyright law preempts this claim and also as a matter of law it cannot be proven. Defendant Lee Geiser also moves separately to dismiss the claim on summary judgment, Doc. 70, arguing preemption and that there is no evidence that he personally was “enriched.” Doc. 70 at 9. Under the two-prong analysis provided by the Fifth Circuit, copyright law preempts an unjust enrichment claim when two conditions are satisfied: “First, the work in which the right is asserted must come within the subject matter of copyright as defined in sections 102 and 103 [of the Copyright Act]. Second, the right that the author seeks to protect must be equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 [of the Copyright Act].” Alcatel USA, Inc. v. DGI Techs., Inc., 166 F.3d 772, 785–86 (5th Cir. 1999). 31 / 34 The Court has found that the data at issue is factual and does not fall within the subject matter of copyright as defined in Sections 102 and 103 of the Copyright Act. Therefore, Plaintiff’s claim for unjust enrichment is not preempted by copyright law. In the alternative, Defendants argue that Plaintiff’s unjust enrichment claim should nevertheless be dismissed on summary judgment because Plaintiff cannot satisfy the elements of an unjust enrichment claim as a matter of law. Doc. 90 at 44. The Court disagrees that this claim can be resolved by summary judgment. A person is unjustly enriched when he obtains a “benefit from another by fraud, duress, or the taking of an undue advantage.” Heldenfels Bros., Inc. v. City of Corpus Christi, 832 S.W.2d 39, 41 (Tex. 1992). Defendants argue that if the Court finds that the data is copyrightable, as it has been found here, Plaintiff cannot make a claim for unjust enrichment. However, as Plaintiff argues, the data does not have to be copyrighted in order for Plaintiff to allege unjust enrichment; unjust enrichment occurs when a person has wrongfully obtained a benefit or has passively received one which it would be unconscionable to retain. Stewart Title Guar. Co. v. Mims, 405 S.W.3d 319, 339 (Tex. App.—Dallas 2013, no pet.). Defendants Petrolink and Lee Geiser have not presented summary judgment evidence showing that as a matter of law Plaintiff cannot prove unjust enrichment. Accordingly, since there remains a genuine issue of material fact as to whether unjust enrichment occurred, the portions of Defendants’ motions for summary judgment on unjust enrichment, Docs. 70, 87, and 90, are denied. E. 32 / 34 Remaining Motions for Summary Judgment The remaining motions for summary judgment address Defendants’ fair use defense (Doc. 94), Lee Geiser’s liability for copyright infringement (Doc. 70), Plaintiff’s damages under 17 U.S.C. § 1201(a)(1)(A) (Doc. 89), and Plaintiff’s indirect profits damages (Doc. 106). Based on the foregoing, those motions, or the parts of them that have not been ruled on above, are hereby denied as moot. IV. CONCLUSION In summary, the Court concludes that Plaintiff’s copyright extended beyond the DataLogger source code itself to cover the database schema, but nevertheless, no copyright infringement occurred. Furthermore, there was no violation of 17 U.S.C. § 1201(a)(1)(A). Accordingly, it is hereby ORDERED that Defendants’ Motion for Partial Summary Judgment on AntiCircumvention Causes of Action under 17 U.S.C. § 1201(a)(1)(A) (Doc. 73) is GRANTED; Plaintiff’s Motion for Summary Judgment on Violation of the Digital Millennium Copyright Act Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 95) is DENIED; Plaintiff’s Motion for Summary Judgment on Copyrightability (Doc. 93) is GRANTED in PART and DENIED in PART; Defendants’ Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 87) is GRANTED in PART and DENIED in PART; Defendants’ Motion for Partial Summary Judgment on Copyright Infringement and Unjust Enrichment Causes of Action (Doc. 90) is GRANTED in PART and DENIED in PART; Plaintiff’s Motion for Summary Judgment on Copyright Infringement Under 17 U.S.C. § 501(a) (Doc. 96) is DENIED; and 33 / 34 Defendant Lee Geiser’s Motion for Summary Judgment on Copyright and Unjust Enrichment Causes of Action (Doc. 70) is DENIED in part. It is further ORDERED that Plaintiff’s Motion for Partial Summary Judgment Against Defendants’ Affirmative Defense of Fair Use (Doc. 94) is MOOT; Defendants’ Motion for Partial Summary Judgment on Damages Under 17 U.S.C. § 1201(a)(1)(A) (Doc. 89) is MOOT; and Defendants’ Motion for Partial Summary Judgment with Respect to Digidrill’s Indirect Profits Damages (Doc. 106) is MOOT. SIGNED at Houston, Texas, this 16th day of May, 2018. ___________________________________ MELINDA HARMON UNITED STATES DISTRICT JUDGE 34 / 34

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.