The following paper will take a recent and controversial topic that previously did not have a legal opinion issued and form such an opinion. The actual case was settled out of court, but had this case gotten to trial, the following scenario would have likely taken place . . .
Superior Court of Santa Clara County
State of California
April 16, 1991, Decided
OPINION BY: David D. Johnston, Fictional Judge
Logisticon prepared the software, installed and utilized by Revlon during the last half of 1990. Revlon had paid a total of $420,000 in progress payments toward a final delivery price of $600,000. An additional phase of another $600,000 was not contractual obligated, but was left as an option.
During the software delivery and installation phases certain minor problems or "bugs" were detected but did not substantially impair day to day operations or prevent the shipping of products and the electronic processing of orders.
On October 9, 1990, Revlon informed Logisticon that payment of the final $180,000 will not be made until all the software "bugs" are resolved and added the additional condition that the proprietary source code be delivered to Revlon. Revlon claimed that the software did not generate sales receipts or update inventory records properly.1 Notice was also given that the follow on option of the second phase of the contract would not be exercised.
Had Revlon received the source code for which they had not originally contractually provided for, their own software staff could have completed phase two of the original contract. The defendant has identified the value of the proprietary software as worth several million dollars.
At 2:30 AM on the morning of October 16, 1990, Logisticon electronically "repossessed" the inventory control and accounting software that they had developed for Revlon. This consisted of the executable (machine readable) code. After several months of fruitless negotiations, Logisticon resorted to what they referred to as electronically repossessing software resident in Revlon's computer system. Logisticon used telephone lines and called up the Revlon computer with the access code given to them by Revlon. This crippled Revlon's warehouse distribution centers for three days in Edison, N.J. and Phoenix, Arizona until Logisticon restored the software.2 Workers were idled at the warehouses and product shipments and sales were delayed amounting to $20 million. Revlon sued Logisticon for breach of contract, misappropriation of trade secrets and trespassing. Logisticon then cross-filed for breach of contract and damages.
Secondly, Revlon is found to have negotiated to the point of impasse by requiring the source code in addition to already possessing the executable code (machine readable) before further payment is made.
Minor "bugs" did exist in the software requiring correction by Logisticon. Logisticon did indeed remove the executable code from the storage disks of Revlon's computer system by electronic means through their authorized telephone line access via their computer modem.
Under the self-help clause of Repossession in the Uniform Commercial Code (UCC) act, Section 9-503, Logisticon can make the claim that Revlon was in possession of their property (the collateral) and without judicial process, repossess the collateral if this can be done without a breach of the peace. 8
The courts have held that entering someone's private residence during the repossession of property constitutes a breach of the peace, but the entry onto business grounds generally does not as long as forced entry is not required.9 The question of Logisticon's legitimate access authority versus Revlon's claim of trespass is crucial here. The fact that Judge Ronald Whyte of Santa Clara County declined Revlon's request to issue a temporary restraining order against Logisticon helps strengthen Logisticon's claim of legitimate access 10
Many states have statutes forbidding telephone access that is out of the scope of the granted privilege.11 Judge Whyte's sympathy with Logisticon seems to weigh the matter of legitimate access up against the legitimate security interest Logisticon has in their intellectual property. In going after their property, was the peace breached here by an unauthorized entry by Logisticon to Revlon's work place? Courts have ruled on this countless times and generally hold if a forced entry is used, such as breaking a lock on a door, then a breach of peace occurred.12 Here, Logisticon already possessed a legitimate copy of "electronic" keys to the work place. In this case, Logisticon used a previously authorized mode of entry and entered the premises electronically which is discussed later in the third issue of trespass.
The irony of the second claim in the Revlon lawsuit of misappropriation of trade secrets seems to be misplaced. Logisticon might have been in possession of pricing information Revlon uses when shipping, billing and accounting for their cosmetic lines when the software was being developed. Revlon had entrusted Logisticon with the information before, without risking disclosure of this information to Revlon's competitors. The likelihood of such disclosure now still seems remote given Logisticon's fiduciary duty of loyalty to Revlon as an agent of the corporation.13 Logisticon was simply trying to get paid for the work they had accomplished. If anything, Revlon should be accused of misappropriation of trade secrets by trying to coerce Logisticon in supplying the source code for free. It is the industry norm to enter into a licensing agreement with a software developer that spells out in great detail beforehand how the licensee may modify and extend its use beyond the capabilities supplied by the vendor. A "last minute" contract modification of this magnitude by Revlon is clearly unreasonable, and coercive behavior on the part of Revlon.
On the third claim by Revlon in its lawsuit of electronic trespassing, the court finds that Revlon has given Logisticon access to their computer system using modems working over telephone lines to conduct normal business operations related to the development of their business application software. The real issue of trespass usually leads one to examine if the owner's property has been interfered with.
On this third lawsuit claim of trespass, we find that the access code given to Logisticon for development and maintenance work on the Inventory Control and Accounting software for Revlon was an authorization to enter Revlon's place of work electronically. The so called computer "hacker" programmers are typically outsiders posing as legitimate users.14 If Logisticon had damaged the data already belonging to Revlon then the court could uphold the claim that Logisticon had interfered with Revlon property. The Software Engineer at Logisticon responsible for the electronic repossession maneuver was careful enough not to destroy or disturb the data, just render it useless without having an application software program resident on the computer to use it. Revlon's property that they were clearly entitled to possessing remained in place.
Logisticon will resolve the minor bugs or software problems in the system to conventional operating commercial software standards. At such time, Logisticon will be paid the final $60,000.
Any claim for damages by Revlon caused by Logisticon's temporary repossession were clearly undercut by public statements made to the contrary by Revlon's Special Counsel and Vice President of Public Affairs, James Conroy.15 No damages will be awarded to Revlon in this action.
Court costs will be assessed against Revlon. Attorney fees approved by this court will also be assessed against Revlon.
Licensed Programs
Software Development/Lease Agreement
Logisticon Incorporated, a California Corporation, (hereinafter referred to as "Logisticon"), desires to develop and lease to Revlon Group, Inc. (hereinafter referred to as "Company") the licensed program and user documentation, collectively referred to as "Program" under the terms and conditions appearing in this Agreement.
PURPOSE: This Agreement is entered into for the purpose of allowing the Company to evaluate and utilize the Program to be used in their inventory control and accounting activities.
PROTECTION AND SECURITY: The Company will not disclose any information concerning this Agreement or the Program or provide or otherwise make available the Program to any other person, firm or corporation, except as provided in this Agreement. The Company shall have no obligation with respect to information which becomes public through no wrongful act by the Company; or if the information is independently developed by the Company without breach of this Agreement.
PRODUCT DEVELOPMENT: The Program and business/plans disclosed by Logisticon to the Company in connection with the Program are subject to change.
TERMS AND CONDITIONS:
1. LICENSE
Logisticon grants a nonexclusive nontransferable license to the Company to use the Program during the development and evaluation period for the purpose stated in this Agreement. The Company acknowledges that the Program is a trade secret containing substantial valuable know-how developed by Logisticon and agrees that it will not reverse compile or dissemble the Program. The Company agrees not to provide, or otherwise make available, the Program, or portions or copies thereof, including but not limited to, program listings, object code or source code, in any form, to any person other than the Company's employees, without prior written consent from Logisticon, except under the terms and conditions of this Agreement.
2. TRANSPORTATION AND DELIVERY
Logisticon will pay all transportation and shipping costs for the Program to the Company's place of business and for the return upon termination of this Agreement.
3. TITLE, RISK OF LOSS AND DAMAGE
Title to the original and any whole or partial reproductions of the Program shall remain with Logisticon.
The program is intended for normal usage. The Company shall be responsible for any loss or damage to the Program from the time of delivery of the Program to the Company and until its return to Logisticon.
4. WARRANTY
Logisticon warrants that is has the right to grant temporary use by the Company of the Program during the development and evaluation period. Upon acceptance and payment in full by the Company the use shall be granted in full.
5. TERMINATION
This Agreement shall be automatically terminated at the end of the evaluation period or canceled if the Company fails to use the Program for, or uses the Program other than for purposes specified in this Agreement or becomes insolvent or makes an assignment for the benefit or creditors, or in any part thereof is incumbered, pledged, or attached, seized or taken under any judicial process.
The original Program plus any whole or partial reproductions(s) of the Program shall be returned immediately to Logisticon upon termination or cancellation of this Agreement.
6. EXPORT RESTRICTIONS
This program furnished hereunder may be subject to U.S. Export Control Laws and Regulations. Accordingly, The Company shall not transfer such Program directly or indirectly to any third person or firm, country or countries, without the specific authorization from Logisticon.
1. Maureen Molloy, "Small software firm wages war on Revlon order net", NETWORK WORLD, The Newsweekly of User Networking Strategies, Vol 7, Number 44, October 29, 1990, p.61.
2. Sally Cusack, "Revlon Riles Software Vendor", Computerworld, 29 Oct. 1990, p. 6.
3. Maxwell Oppenheimer, Interview via telephone at Venable, Baetjer and Howard, Baltimore, Maryland, April 12 and 15, 1991.
4. 48 CFR (Chapter 1).
5. Molloy, p. 61.
6. Ken Siegmann, "Computer Firm Shuts Down Revlon: Giant cosmetics company sues small software vendor over incident", The San Francisco Chronicle, 25 October 1990, p. A1.
7. Molloy, p. 61.
8. UCC, Section 9-503.
9. James J. White, Robert S. Summers, Handbook, Uniform Commercial Code, Second Edition, Hornbook Series (West Publishing Co., 1980), Section 26-6, pp. 1095-1096.
10. Ken Siegmann, "Software supplier 'repossesses' Revlon computer systems", Chicago Tribune, 28 October 1990, p. 8, Zone: C.
11. Max Oppenheimer Interview, April 15, 1991.
12. White and Summers, p. 1095.
13. F. William McCarty and John W. Bagby, The Legal Environment of Business(Homewood, IL: Irwin, 1990), p. 398.
14. Clifford Stoll, The Cuckoo's Egg (New York: Doubleday, 1989), p.71.
15. Richard Diennor, "Revlon seen unhurt by computer closing; Computer software tampering", Women's Wear Daily, 26 October 1990, Vol. 106, No. 82, p. 10.
16. Louise Kehoe, "Software group sued over alleged hacking", Financial Times, 26 October 1990, Section I, p. 20.
Black's Law Dictionary 1301 (6th ed. 1990)
Code of Federal Regulations, Vol. 48, Chapter 1: Federal Acquisition Regulations
Cusack, Sally. "Revlon Riles Software Vendor", Computerworld, 29 Oct. 1990, p.6
Diennor, Richard. "Revlon seen unhurt by computer closing; Computer software tampering", Women's Wear Daily, 26 Oct. 1990, 106, No. 82, p. 10.
Kehoe, Louise. "Software group sued over alleged hacking", Financial Times, 26 Oct. 1990, Section I, p 20.
McCarty, F. William and John W. Bagby. The Legal Environment of Business. Homewood, IL: Irwin, 1990.
Molloy, Maureen. "Small software firm wages war on Revlon order net" NETWORK WORLD, The Newsweekly of User Networking Strategies, 7, No. 44, 29 Oct. 1990, p. 61.
Oppenheimer, Maxwell. Telephone interview with Logisticon's Lawyer of Venable, Baetjer and Howard, Baltimore, Maryland, April 12 and 15, 1991.
Siegmann, Ken. "Computer Firm Shuts Down Revlon" Giant cosmetics company sues small software vendor over incident", The San Francisco Chronicle, 25 Oct. 1990, p. A1.
Siegmann, Ken. "Software supplier 'repossesses' Revlon computer systems" Chicago Tribune, 28 Oct. 1990, p. 8, Zone: C.
Stoll, Clifford. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday, 1989.
UCC, Section 9-503: Secured Party's Right to Take Possession After Default
White, James, J. and Robert S. Summers. Handbook, Uniform Commercial Code. St. Paul, Minn.: West Publishing Co., 1980.