BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales High Court (Technology and Construction Court) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Technology and Construction Court) Decisions >> IBM United Kingdom Ltd v LzLabs GmbH & Ors [2023] EWHC 3015 (TCC) (29 November 2023) URL: http://www.bailii.org/ew/cases/EWHC/TCC/2023/3015.html Cite as: [2023] EWHC 3015 (TCC) |
[New search] [Printable PDF version] [Help]
BUSINESS AND PROPERTY COURTS OF ENGLAND AND WALES
TECHNOLOGY AND CONSTRUCTION COURT (KBD)
Rolls Building London, EC4A 1NL |
||
B e f o r e :
____________________
IBM UNITED KINGDOM LIMITED |
Claimant |
|
- and - |
||
(1) LZLABS GmbH (a company incorporated in Switzerland) (2) WINSOPIA LIMITED (3) LZLABS LIMITED (4) MARK JONATHAN CRESSWELL (5) THILO ROCKMANN |
Defendants |
|
-and- |
||
(6) JOHN JAY MOORES |
Proposed Defendant |
____________________
Roger Stewart KC, Thomas Ogden, Janni Riordan & Joshua Marshall (instructed by Clifford Chance LLP) for the Defendants
Hearing dates: 7th, 8th and 9th November 2023
____________________
Crown Copyright ©
Mrs Justice O'Farrell:
i) a declaration that Winsopia's licence has been lawfully terminated;
ii) an injunction restraining Winsopia from making any further use of the IBM mainframe software, including from offering any services relying on the SDM that contains or uses any part of the IBM mainframe software (and the other defendants from procuring the same); and
iii) an account of profits and/or damages.
i) the claimant's application dated 18 October 2023 to adjourn the trial date and for further directions;
ii) the claimant's applications dated 3 August 2023 and 7 September 2023 to amend the particulars of claim and to join Mr Moores as a defendant;
iii) the claimant's application dated 12 October 2023 to amend its reply;
iv) the defendants' application dated 10 October 2023 to strike out paragraph 48 of the reply;
v) the claimant's application dated 7 September 2023 for permission to serve out of the jurisdiction and Mr Moores' application dated 10 October 2023 challenging jurisdiction;
vi) the defendants' application dated 10 August 2023 for an order that the claimant serve a further response to the RFI dated 29 June 2023;
vii) the defendants' application dated 27 October 2023 seeking further disclosure and information in respect of Mr Knight.
Trial date and revised timetable
i) the seventeenth witness statement of Katherine Vernon dated 27 October 2023;
ii) Ms Vernon's eighteenth witness statement dated 1 November 2023;
iii) Ms Vernon's nineteenth witness statement dated 6 November 2023;
iv) the witness statement of Michael Swanson, the claimant's expert, dated 2 November 2023; and
v) the witness statement of Professor Jon Weissman, also the claimant's expert, dated 6 November 2023.
i) the twenty-third witness statement of Kate Scott dated 20 October 2023 (with corrections dated 27 October 2023);
ii) Ms Scott's twenty-fifth witness statement dated 5 November 2023;
iii) the witness statement of Professor Alastair Donaldson, the defendants' expert, dated 8 November 2023; and
iv) the witness statement of David Stephens, also the defendants' expert, dated 8 November 2023.
i) the parties shall produce a draft list of expert issues, agreed if possible, by 1 December 2023;
ii) the experts of like disciplines shall produce a first joint statement, setting out any matters agreed or not agreed, and any expert issues of principle then identified, by 15 December 2023;
iii) the claimant shall file and serve its expert reports by 5 January 2024;
iv) the defendants shall file and serve their expert reports by 16 February 2024;
v) the claimant shall file and serve any expert reports in reply by 8 March 2024;
vi) the experts of like disciplines shall produce a second joint statement, setting out those issues which are agreed between them and those which are disputed, together with a brief summary of the reasons for disagreement, by 22 March 2024;
vii) the PTR in March 2024 is vacated and will be re-fixed for hearing on 26 and 27 March 2024 (plus 1 day's judicial reading);
viii) skeletons shall be filed by 4pm on 12 April 2024; and
ix) the start of the trial will be pushed back (from 9 April 2024) to 22 April 2024 for judicial reading, followed by the hearing from 29 April 2024 with a revised estimate of 8 hearing weeks (32 sitting days).
Amendments to pleadings / joinder / strikeout applications
i) Ms Vernon's twelfth statement dated 3 August 2023;
ii) Ms Vernon's fourteenth statement dated 7 September 2023;
iii) Ms Vernon's fifteenth statement dated 20 October 2023;
iv) Ms Vernon's sixteenth statement (jurisdiction) dated 23 October 2023;
v) Ms Vernon's seventeenth statement dated 27 October 2023.
vi) Ian Mitchell's witness statement dated 27 October 2023;
vii) Paul Knight's witness statement dated 27 October 2023;
i) Ms Scott's twenty-first statement dated 10 October 2023;
ii) Ms Scott's twenty-third statement dated 20 October 2023 (amended 27 October 23);
iii) Mr Rockmann's second statement dated 20 October 2023;
iv) Mr Cresswell's second statement dated 20 October 2023;
v) Ms Scott's jurisdiction statement dated 10 October 2023;
vi) Mr Moores' statement dated 10 October 2023;
vii) Ms Scott's second jurisdiction statement dated 27 October 2023;
viii) Mr Moore's second statement dated 1 November 2023.
"4.1.1 Authorised Use
Under each licence, IBM authorises the customer to:
a. use the ICA Program's machine-readable portion on only the Designated Machine. If the Designated Machine is inoperable, the Customer may use another machine temporarily. If the Designated Machine cannot assemble or compile the ICA Program, the Customer may assemble or compile the ICA Program on another machine. If the Customer changes a Designated Machine previously identified to IBM, the Customer agrees to notify IBM of the change and its effective date;
b. use the ICA Program to the extent of authorisations the Customer has obtained;
c. make and install copies of the ICA Program, to support the level of use authorised, provided the Customer reproduces the copyright notices and any other legends of ownership on each copy or partial copy; and
d. use any portion of the ICA Program IBM provides i) in source form, or ii) marks restricted (for example "Restricted materials of IBM") only to: (1) resolve problems related to the use of the ICA Program, and (2) modify the ICA Program so that it will work together with other projects.
4.1.2 The Customer's Additional Obligations
For each ICA Program, the Customer agrees to:
…
b. ensure that anyone who uses it (accessed either locally or remotely) does so only for the Customer's authorised use and complies with IBM's terms regarding ICA Programs;
…
4.1.3 Actions The Customer May Not Take
The Customer agrees not to:
a. reverse assemble, reverse compile, otherwise translate, or reverse engineer the ICA Program unless expressly permitted by applicable law without the possibility of contractual waiver; or
b. sublicence, assign, rent, or lease the ICA Program or transfer it outside the Customer's Enterprise."
i) reverse engineering of the IBM mainframe software by disassembly, decompilation and translation;
ii) reverse engineering through the systematic creation and analysis of compiler listings;
iii) reverse engineering through the systematic use of traces, dumps, slip traps, packet sniffing and other debugging tools and techniques;
iv) copying IBM source code, macro expansions and copy books;
v) transferring "unscrubbed" and/or partially "scrubbed" materials containing IBM mainframe software;
vi) reverse engineering through deliberate generation and catching of exceptions; and
vii) further use outside enterprise and use beyond the designated machine.
i) Mr Moores personally decided to use a re-seller to assist Winsopia in entering the ICA for the purpose of deliberately concealing and thus facilitating breaches of the ICA;
ii) he instructed and/or authorised the regular movement of individuals between the first, second and third defendants and Texas Wormhole LLC, another company owned and controlled by Mr Moores, thereby negating any real operational separation between the defendants;
iii) he facilitated communication between employees of LzLabs and Winsopia, circumventing the code of conduct put in place to maintain operational separation between the defendants;
iv) he instructed and/or authorised the transfer of IBM mainframe software from individuals working for Winsopia to individuals working for LzLabs; and
v) he directed and/or approved that Winsopia use machine readable portions of the IBM mainframe software or parts thereof on devices which were not designated machines as defined in the ICA.
i) It is said that the claimant has at all material times since at least 2013 (alternatively, by no later than May 2017) been aware of the existence of LzLabs, the nature of the work in which it was engaged, and the relationship between LzLabs and Winsopia (paragraph 61).
ii) Reliance is placed on the two-year contractual limitation period set out in clause 1.11.4 of the ICA, now said to be enforceable by Winsopia in relation to actions against the other defendants (paragraphs 83-85 & 121).
iii) The claims in contract and tort are said to relate to acts committed prior to 21 September 2015 and therefore, are statute-barred by reason of sections 5 and 2 of the Limitation Act 1980 (paragraph 87).
i) It is said that clause 1.11.4 of the ICA does not apply to these claims (paragraph 47).
ii) Reliance is placed on alleged acts by the defendants that constituted deliberate concealment within the meaning of section 32 of the Limitation Act 1980 (paragraph 52).
iii) It is said that the defendants are estopped from relying on clause 1.11.4 of the ICA because (i) they impliedly represented to the claimant that Winsopia was complying with the ICA by continuing to use the IBM mainframe software and make payments while concealing its wrongdoing, (ii) the claimant relied on those implied representations by not terminating the ICA and suing the defendants forthwith, and (iii) it would be inequitable for Winsopia to be permitted to rely on clause 1.11.4 in those circumstances (paragraph 48).
iv) Clause 1.11.4 does not apply to the claims against the first, third, fourth or fifth defendants (paragraph 49).
i) On a proper construction of clause 1.11.4 of the ICA, alternatively by reason of an implied term (obvious or to give business efficacy), the clause does not apply where the relevant cause of action involves dishonest conduct or there is dishonest concealment.
ii) The contractual time bar does not apply to any breach which has been deliberately concealed by the party in breach.
Test on applications to amend
i) When deciding whether to grant permission to amend, the court must exercise its discretion having regard to the overriding objective.
ii) Applications always involve the court striking a balance between injustice to the applicant if the amendment is refused, and injustice to the opposing party and other litigants in general, if the amendment is permitted.
iii) Although the court will have regard to the desirability of determining the real dispute between the parties, it must also deal with the case justly and at proportionate cost, which includes (amongst other things) saving expense, ensuring that the case is dealt with expeditiously and fairly, and allocating to it no more than a fair share of the court's limited resources.
iv) An application to amend will be refused if it is clear that the proposed amendment has no real prospect of success: Kawasaki Kisen Kaisha Ltd v James Kemball Ltd [2021] EWCA Civ 33 at [18]; Quah Su-Ling v Goldman Sachs International [2015] EWHC 759 per Carr LJ (as she then was) at [36].
v) The court must consider whether the claimant has a "realistic" as opposed to a "fanciful" prospect of success but without conducting a "mini-trial": Swain v Hillman [2001] 1 All ER 91. A "realistic" claim is one that carries some degree of conviction and is more than merely arguable: ED & F Man Liquid Products v Patel [2003] EWCA Civ 472.
i) In exercising the court's discretion whether to allow an amendment, the overriding objective is of the greatest importance. Although the court will have regard to the desirability of determining the real dispute between the parties, it must also deal with the case justly and at proportionate cost, which includes (amongst other things) saving expense, ensuring that the case is dealt with expeditiously and fairly, and allocating to it no more than a fair share of the court's limited resources.
ii) Therefore, such applications always involve the court striking a balance between injustice to the applicant if the amendment is refused, and injustice to the opposing party and other litigants in general, if the amendment is permitted.
iii) The starting point is that the proposed amendment must be arguable, coherent and properly particularised. An application to amend will be refused if it is clear that the proposed amendment has no real prospect of success.
iv) An amendment is late if it could have been advanced earlier, or involves duplication of steps in the litigation, costs and effort. Lateness is not an absolute, but a relative concept. It depends on a review of the nature of the proposed amendment, the quality of the explanation for its timing, and a fair appreciation of the consequences in terms of work wasted and consequential work to be done.
v) It is incumbent on a party seeking the indulgence of the court to be allowed to raise a late claim to provide a good explanation for the delay.
vi) A very late amendment is one made when the trial date has been fixed and where permitting the amendment would cause the trial date to be lost. Parties and the court have a legitimate expectation that trial fixtures will be kept.
vii) Where a very late application to amend is made the correct approach is not that the amendments ought, in general, to be allowed so that the real dispute between the parties can be adjudicated upon. Rather, a heavy burden lies on a party seeking a very late amendment to show the strength of the new case and why justice to him, his opponent and other court users requires him to be able to pursue it. The risk to a trial date may mean that the lateness of the application to amend will of itself cause the balance to be loaded heavily against the grant of permission.
Breach of the ICA
"1. Subject to the provisions of Articles 5 and 6, the exclusive rights of the rightholder within the meaning of Article 2 shall include the right to do or to authorise:
(a) the permanent or temporary reproduction of a computer program by any means and in any form, in part or in whole; in so far as loading, displaying, running, transmission or storage of the computer program necessitate such reproduction, such acts shall be subject to authorisation by the rightholder;
(b) the translation, adaptation, arrangement and any other alteration of a computer program and the reproduction of the results thereof, without prejudice to the rights of the person who alters the program;
(c) any form of distribution to the public, including the rental, of the original computer program or of copies thereof."
"1. In the absence of specific contractual provisions, the acts referred to in points (a) and (b) of Article 4(1) shall not require authorisation by the rightholder where they are necessary for the use of the computer program by the lawful acquirer in accordance with its intended purpose, including for error correction.
2. The making of a back-up copy by a person having a right to use the computer program may not be prevented by contract in so far as it is necessary for that use.
3. The person having a right to use a copy of a computer program shall be entitled, without the authorisation of the rightholder, to observe, study or test the functioning of the program in order to determine the ideas and principles which underlie any element of the program if he does so while performing any of the acts of loading, displaying, running, transmitting or storing the program which he is entitled to do."
"1. The authorisation of the rightholder shall not be required where reproduction of the code and translation of its form within the meaning of points (a) and (b) of Article 4(1) are indispensable to obtain the information necessary to achieve the interoperability of an independently created computer program with other programs, provided that the following conditions are met:
(a) those acts are performed by the licensee or by another person having a right to use a copy of a program, or on their behalf by a person authorised to do so;
(b) the information necessary to achieve interoperability has not previously been readily available to the persons referred to in point (a); and
(c) those acts are confined to the parts of the original program which are necessary in order to achieve interoperability.
2. The provisions of paragraph 1 shall not permit the information obtained through its application:
(a) to be used for goals other than to achieve the interoperability of the independently created computer program;
(b) to be given to others, except when necessary for the interoperability of the independently created computer program; or
(c) to be used for the development, production or marketing of a computer program substantially similar in its expression, or for any other act which infringes copyright.
3. In accordance with the provisions of the Berne Convention for the protection of Literary and Artistic Works, the provisions of this Article may not be interpreted in such a way as to allow its application to be used in a manner which unreasonably prejudices the rightholder's legitimate interests or conflicts with a normal exploitation of the computer program."
Wrongful procurement or unlawful means conspiracy
Contractual limitation
"Further or alternatively, the Defendants are estopped from relying on clause 1.11.4 of the ICA because (i) the Defendants repeatedly impliedly represented to IBM UK that Winsopia was complying with the ICA by continuing to use the IBM mainframe software and to make payments to IBM while concealing its wrongdoing, (ii) IBM UK relied on those implied representations by not terminating the ICA and suing the Defendants forthwith, and (iii) it would be inequitable for Winsopia to be permitted to rely on clause 1.11.4 in those circumstances."
Statutory Limitation
(1) For the purposes of this Act, any new claim made in the course of any action shall be deemed to be a separate action and to have been commenced –
(a) in the case of a new claim made in or by way of third party proceedings, on the date on which those proceedings were commenced; and
(b) in the case of any other new claim, on the same date as the original action.
(2) In this section a new claim means any claim by way of set-off or counterclaim, and any claim involving either –
(a) the addition or substitution of a new cause of action; or
(b) the addition or substitution of a new party;
…
(3) Except as provided by section 33 of this Act or by rules of court, neither the High Court nor any county court shall allow a new claim within subsection (1)(b) above, other than an original set-off or counterclaim, to be made in the course of any action after the expiry of any time limit under this Act which would affect a new action to enforce that claim.
(4) Rules of court may provide for allowing a new claim to which subsection (3) above applies to be made as there mentioned, but only if the conditions specified in subsection (5) below are satisfied, and subject to any further restrictions the rules may impose.
(5) The conditions referred to in subsection (4) above are the following –
(a) in the case of a claim involving a new cause of action, if the new cause of action arises out of the same facts or substantially the same facts as are already an issue on any claim previously made in the original action ..."
"For the purposes of the Claimant's claims against the Sixth Defendant:
11A.1 The Claimant does not pursue any claims in respect of which any time limit under the Limitation Act 1980 (subject to the operation of section 32 of the Limitation Act 1980) would have expired by the date on which the amendments contained in these Re-Re-Re-Amended Particulars are consented to or permitted by the court.
11A.2 The Claimant will not contend that such claims were issued or deemed to have been issued, for the purposes of limitation under the Limitation Act 1980, prior to the date on which the amendments in these Re-Re-Re- Amended Particulars of Claim were consented to by the parties or were permitted by the court."
"For the purposes of the Claimant's claims against the Sixth Defendant, if and insofar as the time limit under clause 1.11.4 of the ICA may apply to any such claims:
a. The Claimant does not pursue any claims in respect of which the time limit under clause 1.11.4 would have expired by the date on which the amendments contained in the Re-Re-Re- Amended Particulars are consented to or permitted by the court.
b. The Claimant will not contend that such claims were issued (or deemed to have been issued), for the purposes of clause 1.11.4 of the ICA, prior to the date on which the amendments in the Re-Re-Re-Amended Particulars of Claim were consented to by the parties or were permitted by the court."
Lateness
Challenge to jurisdiction
i) The claimant must satisfy the court that in relation to the foreign defendant there is a serious issue to be tried on the merits, that is, a substantial question of fact or law or both.
ii) The claimant must satisfy the court that there is a good arguable case that the claim falls within one or more classes of case in which permission to serve out may be given, in this case, one of the gateways set out in CPR PD6B paragraph 3.1.
iii) The claimant must satisfy the court that in all the circumstances this jurisdiction is clearly or distinctly the appropriate forum for the trial of the dispute and that in all the circumstances the court ought to exercise its discretion to permit service of the proceedings out of the jurisdiction.
RFI
"The Defendants bear the burden of proof on limitation and have not adequately set out a case. This request is an attempt to reverse the burden of proof. Without prejudice to that, the Claimant's case is that it discovered the concealment shortly before starting this claim."
"The Claimant responds to this Request and the Requests below without thereby waiving its own privilege in any privileged communications … the Claimant did not know of the relationship between the First Defendant and the Second Defendant (and accordingly of the possible involvement of the Second Defendant in the First Defendant's activities and/or the possibility that the Second Defendant had thereby breached its contract with the Claimant) until 25 August 2020. Therefore, and in any event, the Claimant did not know that it had any potential cause of action against the Defendants or any of them prior to that date."
"1. Please identify the basis for the Claimant's reliance on the date of 25 August 2020.
2. Without prejudice to the generality of the foregoing, please identify what the Claimant says caused it to learn of the relationship between the First Defendant and the Second Defendant on that date, who at the Claimant learned it and how it was learned."
"Not entitled. This Request trespasses on communications which are privileged to the Claimant and/or IBM Corporation."
"9. I am aware that one of the issues in these proceedings is the date on which IBM UK learnt of the link between the Second Defendant, Winsopia Limited ("Winsopia"), and the First Defendant, LzLabs GmbH ("LzLabs").
10. As to this, to the best of my recollection, I confirm that I was not aware of any link between Winsopia and LzLabs until 25 August 2020.
11. I am also aware that IBM UK's claims against the Defendants concern the Defendants' development of the Software Defined Mainframe ("SDM") product, which IBM UK alleges was developed by using and accessing IBM's code, and IBM's mainframe systems, in a way that breached relevant licence agreements.
12. Prior to 25 August 2020, to the best of my recollection, I had no knowledge of any of the Defendants in these proceedings. I was not considering, nor did I have any reason to consider, any claim in respect of the matters raised in these proceedings before that date.
13. Prior to 25 August 2020, I also do not recall having any knowledge of the existence of the SDM, or that any company was developing the SDM, such that I had no reason to think that the development of the SDM somehow constituted a breach of any party's licence agreements with IBM UK. To the extent that kind of monitoring is carried out, it is done by parts of IBM UK's business team and, as a matter of course, if the business had any concerns about competitors or issues which gave rise to potential claims, the business would consult the legal team about these concerns. In this regard, and strictly without waiving privilege, no one from IBM UK's various business teams ever raised any issues with me about the Defendants or the development of the SDM until after I became aware of the link between Winsopia and LzLabs in August 2020. If they had notified anybody else in the IBM UK legal team about potential wrongdoing by Winsopia before that time, I am sure that I would have known about it.
14. In my role as IBM UK's Litigation Counsel, I was responsible for ensuring that IBM UK's relevant senior managers, including its Board of Directors, were appraised of potential litigation matters. Given my role, I consider it inconceivable that IBM UK's senior or Board-level management would have been considering the matters raised in these proceedings without my knowledge."
"Relevance is a necessary precondition for disclosure but it is not itself a sufficient condition for a finding of waiver. The position is the same even where the legal advice is highly relevant, rather than relevant to a lesser extent, and even where an investigation of the issue may be hampered by the absence of the privileged material."
"The law of privilege protects communications. It does not, as a doctrine, protect an inquiry as to what a solicitor knows at any particular point of time. The question of what a solicitor knows is not, per se, a no-go area in litigation. By and large privilege will create a formidable obstacle to trying to prove it, because the communications (and resulting documents) will be privileged and the inquiring party will not be able to penetrate that privilege to get proof. However, if the knowledge can be proved another way then I cannot see a reason in principle why the inquiring party should not be able to seek to do that."
Mr Knight
"71. In my judgment following the July 2023 CMC, I decided that, in the light of the deletion of Mr Knight's documents, the claimant should extract, process and search the .nsf files of Mr Roseblade, Mr Bates, Mr Wilson and Mr Ball. Unfortunately, it has since transpired that the documents of Mr Bates, Mr Wilson and Mr Ball have also been deleted.
72. Mr Pantlin has produced a twelfth witness statement dated 15 August 2023, identifying an alternative individual, Mr Ian Lyon, whose .nsf file would be available for extraction. He explains that Mr Lyon works in the claimant's sales team and was the sales manager to whom Mr Knight reported.
73. The defendants are not satisfied that Mr Lyon is a satisfactory substitution for Messrs Bates, Wilson and Ball, who were themselves substitutes for Mr Knight.
74. In these circumstances, the court considers that it would be appropriate for the claimant to provide information to the defendants as to Mr Knight's position and role in the company, his team, his line manager and any other relevant individuals, so that the defendants can consider appropriate individuals as substitute custodians."
"a. During the relevant period, Mr Knight was part of a group of approximately 6-8 sellers at the Claimant who reported directly to Mr Lyon and either worked directly with end-user customers or through intermediary re-sellers or so-called Business Partners.
b. The group of 6-8 sellers in which Mr Knight worked reported directly to Mr Lyon in his capacity as Sales Leader.
c. Each of the sellers, including Mr Knight, worked individually on client opportunities and only stood to earn commission on their respective assigned accounts. It was not the practice of sellers to share responsibility for a particular customer because they would only be paid on their named accounts. It follows that, other than Mr Knight, no seller at the Claimant would have had day-to-day responsibility for engaging with, or in relation to, Winsopia.
d. Mr Lyon recalls that the commercial arrangements with Winsopia were led by TES as the relevant Business Partner, with support from the Claimant via Mr Knight. To the extent that TES corresponded with Winsopia, such documents would already be in the Defendants' position. They would not be in the possession of the Claimant unless the Claimant was copied or unless a particular communication was forwarded to it.
For the above reasons, other than Mr Lyon, the Claimant has no reason to believe that there are any other individuals at the Claimant who should be added as additional custodians in place of Mr Bates, Mr Ball and/or Mr Wilson. Of course, if Winsopia is aware of any other individuals at the Claimant that it communicated with, it should identify them for our consideration. It has not offered any such names to date."
Conclusion