Tuesday, March 31, 2020
Swiss Customs - Procédure Destinataire agree; Délai de dépôt de la déclaration en douane; Suspension
Monday, March 30, 2020
U.S. Supreme Court, CITGO Asphalt Refining Co. v. Frescati Shipping Co., Docket No. 18-565, J. Sotomayor
Thursday, March 26, 2020
Supreme Court of Kentucky, Paul Mostert v. The Mostert Group, LLC, Docket No. 2017-SC-000600-DG
Software
Contract Interpretation
Source Code not Included in the Term Software
Contract Drafting
Internet Law
Kentucky Law
Security Agreement
Security Interest
Collateral
Fiduciary Duty (No Fiduciary Duty is Owed Here)
(…) Despite these documents, Mostert and TMG disagreed as to which property constituted the collateral under the Security Agreement and the relationship between the parties deteriorated. More specifically, TMG claimed entitlement to immediate possession of the source code under the Contribution Agreement while Mostert claimed that he had a security interest in the source code which the Security Agreement allowed him to perfect by possession.
The primary issue in this case turns on construction of the Contribution Agreement and the Security Agreement, both executed by the parties on October 31, 2003. Mostert argues that the “software,” identified as collateral in the Security Agreement includes the source code, and therefore the Security Agreement allowed him to retain possession of the source code until the Note was paid in full. TMG counters that the source code was not included as collateral under the Security Agreement, and that Mostert breached the Contribution Agreement by failing to deliver the source code immediately upon execution of that agreement and receipt of his TMG stock. Before turning to the language of the relevant agreements, we acknowledge the general principles of contract construction which guide disposition of this matter.
(…) As this Court has stated, “the fact that one party may have intended different results . . . is insufficient to construe a contract at variance with its plain and unambiguous terms.” Abney v. Nationwide Mut. Ins. Co., 215 S.W. 3d 699, 703 (Ky. 2006).
(…) We turn to the documents executed by Mostert and TMG. Two contracts, the Contribution Agreement and the Security Agreement, reflect the parties’ agreement with respect to entitlement to and possession of the source code at the center of their dispute.
The Contribution Agreement provides for the transfer of assets from Mostert to TMG in exchange for the agreed-upon compensation. That agreement begins with the following “Recitals”:
Whereas, [Mostert] has created certain computer software and other technology and intellectual property for the analysis of horses for racing and breeding purposes, including but not limited to the EquiTrax Technology, a technology for capture and analysis of digital streaming images of racehorses in full gallop, and [Mostert] has been using all of such property in the operation of a business under the assumed names of “The Mostert Group” and “Equimost” (the “Business”);
Whereas, [Mostert] now desires to operate the Business through a Kentucky limited liability company and has formed [TMG] for that purpose; and
Whereas, [Mostert], who collectively owns 100% of the Business, desires to contribute to [TMG] any and all right, title and interest that it may have in any Assets (as defined herein), including without limitation all assets of [Mostert] used or intended to be used in the Business, in exchange for 200 Units in [TMG] and a Promissory Note from [TMG] in the form attached hereto as Exhibit A (the “Note”), all on the terms and subject to the conditions contained herein.
In the “Agreement” section, paragraph 2, the Contribution Agreement states:
Effective as of the date hereof, [Mostert] hereby contributes, transfers, assigns, conveys and delivers to [TMG] all of such [Mostert’s] right, title and interest in and to all of the assets, properties and rights primarily used or employed, or intended by [Mostert] to be primarily used or employed, in connection with the Business (the “Assets”), consisting of those assets listed on Schedule 2A attached hereto.
The referenced Schedule 2A, entitled “Partial List of Contributed Assets,” identifies in paragraph 2.1 the following assets to be transferred and delivered by Mostert to TMG : “all of [Mostert’s] ownership or leasehold rights, as the case may be, in computer and telecommunication equipment, software programs, source codes, object codes, information systems . . . ,” etc. (emphasis added). In paragraph 3 of Schedule 2A, additional assets to be transferred and delivered are identified including “any and all rights of [Mostert] to the following software and other property, and any corresponding patents, trademarks and copyrights: a) Equitrax System . . . .” Thus, pursuant to the aforequoted paragraph 2 of the Contribution Agreement, Mostert agreed to “contribute, transfer, assign, convey and deliver” the identified assets to TMG, effective as of October 31, 2003, the execution date of the Contribution Agreement.
The $500,000 Note issued by TMG to Mostert that same date was secured “as described in that certain Security Agreement of even date herewith by and between the Payee [Mostert] and the Maker [TMG].” The Security Agreement grants Mostert a security interest in specified collateral. It states in relevant part:
This Security Agreement is made as collateral security for the payment and performance of all the following obligations:
$500,000.00 Term Promissory Note. [TMG’s] payment of that certain Term Promissory Note payable to [Mostert] dated effective as of the date hereof in the original principal amount of $500,000.00 (the “Note”) . . . .
The Security Agreement identifies the covered collateral on Schedules A and B. As relevant to the parties’ dispute, Schedule B, lists “any and all rights of [Mostert] to the following ‘Software,’ and any corresponding patents, trademarks and copyrights . . . . ” (emphasis added). Schedule B, a one and one-half page single-spaced document, then continues with a list of the specific “Software,” which includes the EquiTrax System, Palm Profit, Compute 2000 and other named software. Finally, pertinent to our review, Paragraph 4(b)(i) of the Security Agreement provides:
TMG shall have possession of the Collateral, except where expressly otherwise provided in this Security Agreement or where [Mostert] chooses to perfect its security interest by possession.
Faced with two contracts executed by the parties simultaneously, we look to the language employed in those contracts.
The Contribution Agreement, lists “software programs” and “source codes” (followed in the next paragraph by a reference to “software” and a listing of specific programs) as distinct properties that Mostert was obligated to contribute to TMG. By contrast, the Security Agreement only identifies certain named “software” as collateral securing TMG’s performance pursuant to the Note; no mention is made of “source code.” Much of Mostert’s argument centers on his assertion that it is generally understood that “source code” is encompassed within the broader term “software,” and therefore, any reference to “software” in the Security Agreement would necessarily include the source code. In short, he maintains that the term “software” always includes the source code, so it follows that he retained a right to possess the source code to perfect his security interest. In support of this argument, Mostert references dictionary definitions of “software,” the Code of Federal Regulations and federal caselaw. Resort to secondary sources, however, is not appropriate if we can interpret the parties’ intent from the language they employed. North Fork Collieries, 322 S.W.3d at 105; Ky. Shakespeare Festival, 490 S.W.3d at 694. Resolution of this case hinges on interpretation of the language used in the Contribution Agreement and the accompanying Security Agreement, making external definitions offered by Mostert immaterial.
Here, the parties specifically listed source code, object code and software as distinct items in the Contribution Agreement. Schedule 2A paragraph 2.1, as discussed above, specifically states that assets contributed by Mostert to TMG include “all of [Mostert’s] ownership or leasehold rights, as the case may be, in computer and telecommunications equipment, software programs, source codes, object codes, information systems,” etc. (emphasis added). In the subsequent full paragraph, paragraph 3, additional assets to be contributed are listed and they include “any and all rights of [Mostert] to the following software and other property, and any corresponding patents, trademarks and copyrights: a) EquiTrax System . . .” (emphasis added). A plain reading of the documents thus reveals that the parties recognized and intended a difference between the broader term “software” and the more specific “source code.” Applying this reasoning to the Security Agreement leads to the conclusion that Mostert did not have a security interest in the source code and thus was not entitled to possess it, i.e., he had no right to perfect a security interest in property not covered by the Security Agreement. This conclusion is premised on the simple fact that the source code carefully delineated in the Contribution Agreement is not mentioned in the Security Agreement. To read the broader term “software” to encompass the source code would require us to ignore how the parties themselves used terms in the documents they executed.
Moreover, it is clear that the parties never intended the Security Agreement to mirror the Contribution Agreement such that Mostert retained a security interest in every single item he was obligated to contribute, transfer, assign, convey and deliver. The Security Agreement identifies the following software as collateral: EquiTrax, PalmProphet, Compute2000, Old Landscape, New Landscape, MareMatch, NetMatch, StalMatch, the Mostert Business System, and various databases. By contrast, Schedule 2A of the Contribution Agreement lists the contributed assets as including “software programs, source codes, object codes . . .” and in a separate paragraph further down lists “the following software,” which includes all the software listed above, as well as other property. Thus, several additional assets beyond the source code at the center of this litigation are listed in the Contribution Agreement but omitted from the list of collateral in the Security Agreement. This demonstrates that the parties did not intend for the Security Agreement to mirror the Contribution Agreement or, stated differently, TMG did not grant Mostert a security interest in all of the items he was obligated to transfer under the Contribution Agreement, the source code being but one example.
Based on the plain language of both agreements, Mostert agreed to transfer the source code, and by refusing to relinquish possession he breached the Contribution Agreement. Another “fundamental principle in the law of contracts” is that “before one may obtain the benefits the contract confers upon him, he himself must perform the obligation which is imposed upon him.” West Ky. Coal Co. v. Nourse, 320 S.W.2d 311, 314 (Ky. 1959).
In Dalton, 293 S.W.2d at 476, the court noted that when one party refused to perform under a written contract, the other party “had the right to treat this action as a breach, to abandon the contract, and to depart from further performance on his own part and finally demand damages.” That is exactly the procedure TMG employed.
(…) No fiduciary duty is owed by either party to the other in this case but the parties did have contractual obligations as discussed.
(…) We note that both parties raise issues regarding the classification of “software” under Article 9 of Kentucky’s Uniform Commercial Code and whether possession is a valid method of perfection. Given our resolution of this case, we do not reach that issue.
(Supreme Court of Kentucky, March 26, 2020, Paul Mostert v. The Mostert Group, LLC, Docket No. 2017-SC-000600-DG, to be Published)
Saturday, March 14, 2020
Guidance for Businesses and Employers to Plan and Respond to Coronavirus Disease 2019
Friday, March 13, 2020
U.S. Court of Appeals for the Federal Circuit, Personalized Media Communications, LLC v. Apple, Inc., Docket No. 18-1936
U.S. Court of Appeals for the Federal Circuit, Communications Test Design, Inc. v. Contec, LLC, Docket No. 2019-1672
Thursday, March 12, 2020
U.S. Court of Appeals for the Fourth Circuit, SAS Institute, Inc. v. World Programming Ltd., Docket No. 19-1290, Published
Judgment (attack abroad on a US judgment)
Injunctions
Remedies
All Writs Act
Comity
Equity
Preclusive Effect
License Agreement
Breach (Reverse Engineering)
WPL turned to the English courts and engaged in a two-pronged attack on the U.S. judgment
In this appeal, we affirm the district court’s grant of two complementary injunctions issued pursuant to its All Writs Act authority. While we take the occasion to express our respect for the judicial system and judges of the United Kingdom, the district court here needed to ensure that a money judgment reached in an American court under American law—based on damages incurred in America—was not rendered meaningless. The court chose to enforce its judgment in the most measured terms, concentrating on the litigants’ U.S. conduct and collection efforts. Failing to take even these modest steps would have encouraged any foreign company and country to undermine the finality of a U.S. judgment.
World Programming Limited (WPL), a U.K. company, and SAS Institute, a U.S. company, are software developers that compete in the market for statistical analysis software.
When WPL installed the SAS software, it had clicked “Yes” to indicate it would comply with SAS’s license agreement prohibiting “reverse engineering” and allowing only “non-production” use of the software.
(…) Soon after SAS initiated the U.K. enforcement proceedings, it brought additional enforcement proceedings in the Central District of California. The California district court granted an order “providing for direct assignment to SAS of rights to payment from specified WPL customers located anywhere in the world, except in the United Kingdom, until [the U.S.] judgment is satisfied,” (the “assignment order”). SAS Inst., Inc. v. World Programming Ltd., No. 5:10-CV-25-FL, 2019 WL 1447472, at *2 (E.D.N.C. Mar. 18, 2019) [hereinafter SAS-2019]; see also J.A. 3135. WPL appealed the assignment order to the Ninth Circuit.
(…) We agreed that the U.K. litigation did not have a preclusive effect, given the “many legal and factual differences between the U.K. litigation and the present [U.S.] suit.” SAS-2017, 874 F.3d at 378-79.
(…) The U.K. court declined to enforce any portion of the U.S. judgment. Further, the court ordered that WPL could recover two-thirds of any amount it paid towards the U.S. judgment, corresponding to the non-compensatory portion of damages (the “U.K. clawback order”). Clawback could occur even though SAS had “not yet recovered more than the compensatory damages awarded.” J.A. 1030.
The week after the U.K. court issued its judgment, it entered an anti-suit injunction requiring SAS to take certain actions in the United States but forbidding others (the “U.K. injunction”). For instance, the U.K. court ordered SAS to “take all reasonable steps” to prevent entry of the turnover order in California. J.A. 1035. It forbade SAS from seeking— in the United States—an anti-anti-suit injunction or similar relief designed to protect the U.S. judgment and the California collection proceedings. The injunction threatened criminal sanctions if SAS disobeyed.
SAS stayed its motion to the Ninth Circuit to comply with the U.K. injunction.
(…) This court previously declined to issue an injunction impacting WPL’s United States licensing, based on an expectation that WPL would devote some portion of its revenues to satisfaction of the U.S. judgment. SAS-2017, 874 F.3d at 386-88. In a way, we cut WPL a break; the absence of an injunction was intended to help WPL earn additional revenues from U.S. operations that it could use towards the judgment. Things did not go as planned. Since the case was last before this court, WPL has tried to evade, in every way and at every turn, using any revenues for satisfaction of the U.S. judgment. This left the district court with limited options—but options it needed to exercise in order to prevent its judgment from being rendered completely hollow.
Despite a complicated procedural history stemming from years of litigation, the case before us is straightforward. WPL, a foreign company doing business in the United States, has attempted to evade a U.S. judgment. Instead of making a good-faith effort to pay up, WPL has repeatedly engaged in collateral attacks on the district court’s judgment by calling upon the U.K. court system. So far, its tactics have been successful. To date, WPL has only paid a small fraction of the judgment, and it is attempting to undo even that much. The district court could not allow WPL’s evasion to continue. One need look no further than the extensiveness of WPL’s attack on the U.S. judgment to see why the court’s two injunctions were necessary.
Although founded in the U.K., WPL is a company “doing business in America” subject to “American law in American courts.” Laker Airways Ltd. v. Sabena, Belgian World Airlines, 731 F.2d 909, 940 (D.C. Cir. 1984). WPL violated North Carolina law by using SAS software to create a competing product in breach of a license agreement. A jury in North Carolina set compensatory damages at $26.4 million, based solely on harm SAS incurred from lost U.S. customers and revenues. Under North Carolina law, these compensatory damages were trebled to total damages of $79.1 million.
After obtaining the U.S. judgment, SAS set about to collect on it—as it had every right to do. SAS commenced an enforcement action in the Central District of California and received the assignment order assigning to SAS “WPL’s right to payments from” specified non-U.K. customers “until such a time as the North Carolina judgment in the amount of $79,129,905.00 is fully satisfied.” J.A. 3135; see also SAS-2019, 2019 WL 1447472, at *2.
Unhappy with the pace of collections and possessing evidence to suggest that WPL instructed customers to disregard the assignment order, SAS moved for entry of the turnover order obligating WPL to deliver to SAS “all income received from customers located worldwide, except in the United Kingdom.” SAS-2019, 2019 WL 1447472, at *3. Rather than challenge SAS’s efforts in the Ninth Circuit, WPL turned to the English courts and engaged in a two-pronged attack on the U.S. judgment.
First, WPL attacked the U.S. judgment by requesting to claw back two-thirds of SAS’s collections—corresponding to the non-compensatory portion of damages. A U.K. court granted this relief under the PTIA, even though WPL had “not yet paid sums exceeding the value of the compensatory part of the [U.S.] judgment.” J.A. 1026-30; see also SAS-2019, 2019 WL 1447472, at *4. By seeking and receiving the U.K. clawback order, WPL fundamentally altered the U.S. judgment. Practically speaking, WPL relitigated the U.S. damage amount, lowering it by two-thirds.
Second, WPL sought relief designed to interfere with the California collection proceedings. Its efforts were successful. A U.K. court granted an injunction preventing SAS from pursuing normal collection efforts “in this country, the country of origin of the judgment at issue.” SAS-2019, 2019 WL 1447472, at *11. The U.K. injunction forbade SAS from pursuing entry of the turnover order. It explicitly directed SAS not to file a brief with the Ninth Circuit due that very day. It limited SAS’s ability to enforce aspects of the assignment order that WPL did not challenge. It broadly prohibited SAS from seeking an anti-anti-suit injunction or similar relief related to either the California or North Carolina proceedings. Finally, the U.K. injunction warned of criminal sanctions if SAS did not comply, a serious threat since SAS has around 637 employees in the U.K., J.A. 2715, and “none of those employees wants to go to jail,” J.A. 1257.
(…) The combined impact of WPL’s actions was particularly destructive. The U.K. injunction undermined SAS’s ability to enforce the U.S. judgment, while the U.K. clawback order attempted to undo SAS’s limited collection success.
(…) An immediate response was required, so the district court turned to the anti-clawback injunction and the U.S. expansion injunction.
The anti-clawback injunction provides that “no sum previously collected or to be collected by [SAS] in the United States is subject to payment to [WPL] on the basis of the [PTIA].” J.A. 1185.
(…) There is an irony here. Rather than the district court’s anti-clawback injunction being an affront to comity, actions by WPL have shown a lack of respect for American courts and American law. “The conflict . . . we confront today has been precipitated by the attempts of another country to insulate its own business entities from the necessity of complying with legislation of our country designed to protect this country’s domestic policies.” Laker Airways, 731 F.2d at 955. Comity is not advanced when a foreign country condones an action brought solely to interfere with a final U.S. judgment.
In contrast, the district court showed great respect for comity, limiting the impact of its anti-clawback injunction to sums collected in the U.S.—“monies without any nexus to any enforcement proceeding in the United Kingdom.” SAS-2019, 2019 WL 1447472, at *9. Comity does not advise against such measured relief.
(…) “The essence of equity jurisdiction has been the power of the Chancellor . . . to mould each decree to the necessities of the particular case.” Hecht Co. v. Bowles, 321 U.S. 321, 329 (1944).
(U.S. Court of Appeals for the Fourth Circuit, March 12, 2020, SAS Institute, Inc. v. World Programming Ltd., Docket No. 19-1290, Published)