tex4ht=new Array() ; //2007-09-27 13:05:00
tex4ht.fn1x0="
17 U.S.C. §102(a).
";
tex4ht.fn2x0="See R. Anthony Reese, Assistant Professor, School of Law, The University of Texas at Austin, Address at the University of Illinois Law Review Symposium: The Public Display Right: The Copyright Act’s Neglected Solution to the Controversy Over RAM “Copies” (2001).
";
tex4ht.fn3x0="Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1243 (3d Cir. 1983).
";
tex4ht.fn4x0="Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 355 (1991).
";
tex4ht.fn5x0="Id. at 358–359.
";
tex4ht.fn6x0="Id.
";
tex4ht.fn7x0="Id. at 349.
";
tex4ht.fn8x0="Id.
";
tex4ht.fn9x0="17 U.S.C. §102(b).
";
tex4ht.fn10x0="Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 535 (6th Cir. 2004). The earliest and quintessential expression of the merger doctrine is found in the Supreme Court’s 1880 decision in Baker v. Selden, which denied copyright in a ledger sheet which merely embodied the system of accounting described in the plaintiff’s book. Baker v. Selden, 101 U.S. 99 (1880).
";
tex4ht.fn11x0="See Lexmark at 20.
";
tex4ht.fn12x0="See Lexmark at 22.
";
tex4ht.fn13x0="Harper & Row, Publrs. v. Nation Enters., 471 U.S. 539, 546 (1985).
";
tex4ht.fn14x0="499 U.S. at 342.
";
tex4ht.fn15x0="See, e.g., Computer Assocs. Int’l v. Altai, Inc., 982 F.2d 693, 711 (2d Cir. 1992).
";
tex4ht.fn16x0="499 U.S. at 348–349.
";
tex4ht.fn17x0="Id. at 349. “Where the compilation author adds no written expression but rather lets the facts speak for themselves…. [t]he only conceivable expression is the manner in which the compiler has selected and arranged the facts.” Id.
";
tex4ht.fn18x0="Id. at 362.
";
tex4ht.fn19x0="Durham Industries, Inc. v. Tomy Corp., 630 F.2d 905, 909 (2d Cir. 1980).
";
tex4ht.fn20x0="Waldman Publishing Corp. v. Landoll, Inc., 43 F.3d 775, 782 (2d Cir. 1994).
";
tex4ht.fn21x0="630 F.2d 905 (2d Cir. 1980).
";
tex4ht.fn22x0="Id. at 909.
";
tex4ht.fn23x0="191 F.2d 99 (2d Cir. 1951).
";
tex4ht.fn24x0="Id. at 102–103
";
tex4ht.fn25x0="499 U.S. at 358.
";
tex4ht.fn26x0="See, e.g., Leo J. Raskind, Professor of Law, University of Minnesota, Address at the University of Pittsburgh Law Review Symposium: The Uncertain Case for Special Legislation Protecting Computer Software (1986) (citing Durham for the proposition that “A somewhat higher standard of merit is required for copyright protection of derivative works”); Entm’t Research Group v. Genesis Creative Group, 122 F.3d 1211 (9th Cir. 1997) (“[T]he Durham test…ensure[s] that copyright protection is not given to derivative works whose originality is merely trivial.”).
";
tex4ht.fn27x0="See, e.g., L. Batlin & Son, Inc. v. Snyder, 536 F.2d 486, 487 (2d Cir. 1976) (Cast-iron toy bank in the public domain substantially copied in plastic form insufficient variation).
";
tex4ht.fn28x0="See, e.g., Winfield Collection, Ltd. v. Gemmy Indus., Corp., 147 Fed. Appx. 547 (6th Cir. 2005) (Three-dimensional crafts constructed from two-dimensional designs demonstrate only trivial variation).
";
tex4ht.fn29x0="1985 U.S. Dist. LEXIS 12800 (D. Minn. 1985).
";
tex4ht.fn30x0="Id. at 1499.
";
tex4ht.fn31x0="Id.
";
tex4ht.fn32x0="See infra notes 49–61 and accompanying text. ";
tex4ht.fn33x0="See Computer Associates Intern., Inc. v. Altai, Inc., 982 F.2d 693, 707–710 (2d Cir. 1992).
";
tex4ht.fn34x0="See, e.g., Steven S. Boyd, Deriving Originality in Derivative Works: Considering the Quantum of Originality Needed to Attain Copyright Protection in a Derivative Work, 40 Santa Clara L. Rev. 325, 362–365
";
tex4ht.fn35x0="698 F.2d 300 (7th Cir. 1983)
";
tex4ht.fn36x0="See id. at 304.
";
tex4ht.fn37x0="See id. at 305.
";
tex4ht.fn38x0="387 F.3d 522 (6th Cir. 2004).
";
tex4ht.fn39x0="Id. at 535.
";
tex4ht.fn40x0="Id.
";
tex4ht.fn41x0="Id.
";
tex4ht.fn42x0="Id. at 554.
";
tex4ht.fn43x0="Id. at 539.
";
tex4ht.fn44x0="Id. at 541.
";
tex4ht.fn45x0="Id. at 540.
";
tex4ht.fn46x0="Id.
";
tex4ht.fn47x0="Id.
";
tex4ht.fn48x0="Id. at 539–540.
";
tex4ht.fn49x0="Computer Associates Intern., Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992).
";
tex4ht.fn50x0="The court summarized the test: In ascertaining substantial similarity…a court would first break down the allegedly infringed program into its constituent structural parts[, t]hen…sift out all non-protectable material…, [then] compare [the remaining] material with the structure of an allegedly infringing program.
Id. at 706.
";
tex4ht.fn51x0="Id. (quoting Nichols v. Universal Pictures Co., 45 F.2d 119, 121 (2d Cir. 1930).
";
tex4ht.fn52x0="Id. at 707–710.
";
tex4ht.fn53x0="Id. at 708.
";
tex4ht.fn54x0="Id. at 708–709.
";
tex4ht.fn55x0="Id. at 709.
";
tex4ht.fn56x0="This doctrine also informs the court’s third unprotected category, “elements in the public domain.” Altai, 982 F.2d at 710.
";
tex4ht.fn57x0="Id. at 709 (quoting 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright §13.03[F][3], at 13-65.).
";
tex4ht.fn58x0="Id. at 709–10.
";
tex4ht.fn59x0="Id. at 710 (quoting Brown Bag Software v. Symantec Corp., 960 F.2d 1465, (9th Cir. 1992).
";
tex4ht.fn60x0="Id. at 710–711.
";
tex4ht.fn61x0="Id. at 701.
";
tex4ht.fn62x0="Mathews Conveyer Co. v. Palmerbee Co., 135 F.2d 73, 85 (6th Cir. 1943).
";
tex4ht.fn63x0="Gordon v. Nextel Communs., 345 F.3d 922, 924 (6th Cir. 2003).
";
tex4ht.fn64x0="Ringgold v. Black Ent. TV, 126 F.3d 70, 74 (2d Cir. 1997).
";
tex4ht.fn65x0="307 F.3d 197 (3d Cir. 2002)
";
tex4ht.fn66x0="See id. at 208.
";
tex4ht.fn67x0="Council Directive 91/250, 1991 O.J. (L 122) 42 (E.C.) [hereinafter “E.C. Software Directive”].
";
tex4ht.fn68x0="Berne Convention for the Protection of Literary and Artistic Works, Sept. 9, 1886, art. 2, para. 7, as last revised July 24, 1971, 25 U.S.T. 1341, 828 U.N.T.S. 221.
";
tex4ht.fn69x0="Berne Convention for the Protection of Literary and Artistic Works, supra note 68, art. 2, para. 3. ";
ol_hauto = 1;