Page:H.R. Rep. No. 94-1476 (1976) Page 132.djvu

 The numbered clauses of subsection (b) list three general areas left unaffected by the preemption: (1) subject matter that does not come within the subject matter of copyright; (2) causes of action arising under State law before the effective date of the statute; and (3) violations of rights that are not equivalent to any of the exclusive rights under copyright.

The examples in clause (3), while not exhaustive, are intended to illustrate rights and remedies that are different in nature from the rights comprised in a copyright and that may continue to be protected under State common law or statute. The evolving common law rights of “privacy,” “publicity,” and trade secrets, and the general laws of defamation and fraud, would remain unaffected as long as the causes of action contain elements, such as an invasion of personal rights or a breach of trust or confidentiality, that are different in kind from copyright infringement. Nothing in the bill derogates from the rights of parties to contract with each other and to sue for breaches of contract; however, to the extent that the unfair competition concept known as “interference with contract relations” is merely the equivalent of copyright protection, it would be preempted.

The last example listed in clause (3)—“deceptive trade practices such as passing off and false representation”—represents an effort to distinguish between those causes of action known as “unfair competition” that the copyright statute is not intended to preempt and those that it is. Section 301 is not intended to preempt common law protection in cases involving activities such as false labeling, fraudulent representation, and passing off even where the subject matter involved comes within the scope of the copyright statute.

“Misappropriation” is not necessarily synonymous with copyright infringement, and thus a cause of action labeled as “misappropriation” is not preempted if it is in fact based neither on a right within the general scope of copyright as specified by section 106 nor on a right equivalent thereto. For example, state law should have the flexibility to afford a remedy (under traditional principles of equity) against a consistent pattern of unauthorized appropriation by a competitor of the facts (i.e., not the literary expression) constituting “hot” news, whether in the traditional mold of International News Service v. Associated Press, 248 U.S. 215 (1918), or in the newer form of data updates from scientific, business, or financial data bases. Likewise, a person having no trust or other relationship with the proprietor of a computerized data base should not be immunized from sanctions against electronically or cryptographically breaching the proprietor’s security arrangements and accessing the proprietor’s data. The unauthorized data access which should be remediable might also be achieved by the intentional interception of data transmissions by wire, microwave or laser transmissions, or by the common unintentional means of “crossed” telephone lines occasioned by errors in switching.

The proprietor of data displayed on the cathode ray tube of a computer terminal should be afforded protection against unauthorized printouts by third parties (with or without improper access), even if the data are not copyrightable. For example, the data may not be copyrighted because they are not fixed in a tangible medium of expression (i.e., the data are not displayed for a period or not more than transitory duration).