Legal Document View

Unlock Advanced Research with PRISMAI

- Know your Kanoon - Doc Gen Hub - Counter Argument - Case Predict AI - Talk with IK Doc - ...
Upgrade to Premium
[Cites 8, Cited by 1]

Delhi High Court

Campus Eai India Pvt. Ltd. vs Neeraj Tiwari & Ors on 29 March, 2019

Author: Rajiv Sahai Endlaw

Bench: Rajiv Sahai Endlaw

*      IN THE HIGH COURT OF DELHI AT NEW DELHI

%                                    Date of decision: 29th March, 2019.

+      CS(OS) 482/2016 & IAs No.11735/2016 (u/O XXXIX R-1&2 CPC),
       11736/2016 (u/O XXVI R-9 CPC), 7876/2017 (u/S 151 CPC),
       17171/2018 (u/S 151 CPC) & 17172/2018 (u/O XIII-A CPC)

       CAMPUS EAI INDIA PVT. LTD.                   .... Plaintiff
                    Through: Ms. Anuradha Salhotra, Ms. Achal
                              Shekhar and Mukul Kochar, Advs.

                                Versus

       NEERAJ TIWARI & ORS                                ......Defendants
                   Through:            Mr. Ankit Relan, Ms. Ekta Sharma
                                       and Mr. Vishesh Kumar, Advs. for
                                       D-1.
                                       Ms. Julien George, Ms. Anu Paarcha
                                       and Mr. Arjun Gadhoke, Advs. for D-
                                       2 to 5.
CORAM:
HON'BLE MR. JUSTICE RAJIV SAHAI ENDLAW

1.     The plaintiff instituted this suit against defendants No.1 to 6 namely
(i) Neeraj Tiwari; (ii) Girish Kumar; (iii) Shivendra Kaushik; (iv) Raoul
Ghosh; (v) Orryworx Private Limited; and, (vi) Bigrock Solutions Limited,
pleading (a) that the plaintiff is the exclusive subcontractor and successor in
interest to CampusEAI Inc., a software information technology services and
consulting company incorporated under the Laws of Ohio; (b) that the
plaintiff has developed and markets a single sign-on solution for institutions
of higher education in the United States and other countries; (c) that the
plaintiff‟s single sign-on solution known as QuickLaunch SSO, is a cloud
based, self-service, Identity-as-a-Service application integration platform
CS(OS) 482/2016                                                     Page 1 of 31
 that helps schools, colleges and universities to integrate their applications
irrespective of their integration protocol; (d) that the plaintiff has invested
considerable money and resources in developing goodwill and has spent
millions of dollars in formulating, developing, marketing/advertising and
implementing its trade secret and copyright protected QuickLaunch SSO
application; (e) that the defendant No.1, at the time of institution of the suit
was still an employee of the plaintiff and the defendants No.2 to 4 are ex-
employees of the plaintiff; (f) that the defendants No.1 to 4 have stolen the
plaintiff‟s copyright, trade secret, technical proprietary, confidential
information and Intellectual Property in respect to the aforesaid software
from the plaintiff‟s computers, databases and development and repository
sites; (g) that after extracting the information, the defendants packed it as
their own under the name Loginology, to try and sell the same to the
plaintiff‟s current and prospective customers/clients; (h) that the defendants
No.2 to 4 are also promoters/directors of defendant No.5 incorporated on 28th
June, 2016 and running the website www.loginology.com which offers an
identical application to the plaintiff‟s QuickLaunch SSO application; (i) that
the    defendant   No.6    is   the    Registrar   of    the   domain      name
www.loginology.com; (j) that the defendants No.1 to 4, at the time of their
employment with the plaintiff were working at a senior level under the
confidentiality and employment agreements including the terms of the
plaintiff‟s Employee Handbook and were directly and actively involved in
development of the subject software for and on behalf of the plaintiff; (k)
that the defendants, under their agreements with the plaintiff were not
entitled to take any other employment while working with the plaintiff and
the agreement also had a non-compete clause restraining the defendants from
CS(OS) 482/2016                                                      Page 2 of 31
 taking up competing assignments for a period of two years, after leaving the
employment of the plaintiff; (l) that in or around February, 2016, the
defendant No.1 started taking unauthorised leaves and on account whereof
disciplinary proceedings were initiated against the defendant No.1 and the
salary of the defendant No.1 for the month of June, 2016 withheld; (m) that
on account of defendant No.1 absconding from employment, the plaintiff
took back the company issued laptop assigned to the defendant No.1 as part
of his duties as a Software Developer; (n) that on reviewing the data on the
said laptop, some applications recording nefarious activities of the
defendants as herein below mentioned were found; (o) that it was discovered
that the defendants No.1 to 4, while still in employment of the plaintiff
started working on www.loginology.com and conspired to steal and
subsequently stole the confidential data as well as the copyright protected
and Intellectual Property of the plaintiff, to set up a rival and competing
company; (p) that it was also discovered that after the defendants No.2 to 4
had left the employment of the plaintiff, the defendant No.1 while still in
employment of the plaintiff passed on the sale strategy / operating method
relating to QuickLaunch SSO to the defendants, to enable them to sell their
competing products; (q) that the conduct aforesaid of the defendants No.1 to
4 is in breach of their agreements with the plaintiff and infringes the
copyright of the plaintiff; (r) that a comparative analysis of the works of the
plaintiff and the defendants shows that the defendants‟ work is a copy of the
plaintiff‟s work; and, (s) that the defendants have used QuickLaunch SSO
software and its source code developed by the plaintiff.

2.     The plaintiff has thus sought the reliefs of, (I) permanent injunction
restraining the defendants No.1 to 5 from divulging the confidential material
CS(OS) 482/2016                                                     Page 3 of 31
 of the plaintiff‟s technology, trade secrets, methods and processes, market
sales, list of clients, accounting methods and competitive data to third
parties; (II) permanent injunction restraining the defendants No.1 to 5 from
directly and indirectly approaching the plaintiff‟s current and prospective
clients, employees and suppliers for soliciting business; (III) permanent
injunction restraining the defendants No.1 to 5 from reproducing/printing,
publishing, copying, storing/installing any pirated/unlicensed software of the
plaintiff and its various versions and from infringing the copyright of the
plaintiff in original literary work titled QuickLaunch SSO; (IV) mandatory
injunction directing the defendants to produce the contents of their websites
and hand over their source code to this Court; (V) mandatory injunction
directing the defendant No.6 to pull down the website www.loginology.com
or any other website controlled by defendants No.1 to 5; and, (VI) for
ancillary reliefs.

3.     The suit came up first before this Court on 22 nd September, 2016,
when summons of the suit and notice of the application for interim relief
were ordered to be issued to the defendants for 29th September, 2019.

4.     The defendants No.2 to 5, on 29th September, 2016 stated that they had
not indulged in any of the acts of which they had been accused of and had no
intention also to indulge therein for a period of two years from the date of
cessation of their respective employments with the plaintiff and were ready
to be bound by their said statement. They also stated that the software which
had been developed by them was an entirely different software from the
software of the plaintiff and they were willing to have the two softwares
examined from an independent expert to whom the matter could be referred.

CS(OS) 482/2016                                                    Page 4 of 31
 5.     The defendant No.1 also on 29th September, 2016 stated that he had no
objection to the decree for injunction as claimed being passed against him
also, save qua the allegations of copyright infringement.

6.     Accordingly, on 29th September, 2016, a decree was passed in favour
of the plaintiff and, against the defendants No.2 to 5 in terms of prayer
paragraph 40 (a) to (f) of the plaint; and against the defendant No.1 in terms
of prayer paragraph 40 (a), (b), (e) and (f) of the plaint, with the clarification
that the same shall operate for a period of two years only from the respective
dates of cessation of employment of each of the defendants No.1 to 4 with
the plaintiff.

7.     On 29th September, 2016, with the consent of the counsels, it was
further directed that the plaintiff as well as the defendants No.2 to 5 submit
their respective source code in a sealed envelope to the Director, IIT, Delhi,
as an independent expert, to evaluate the two softwares within one month of
receipt of reference to report whether there is any similarity or infringement
of copyright between the two softwares or whether the two are independent
creation. The Director, IIT, Delhi was further requested to nominate an
expert competent to do the needful and the representatives of both parties
directed to meet with the Director, IIT, Delhi or the said expert for working
out modalities, if any required in this regard. It was further agreed that the
source code submitted to the expert would be as on 22nd September, 2016.

8.     Accordingly, filing of the written statement by the defendants qua the
remaining reliefs was deferred till receipt of report.

9.     On further enquiry, the counsel for the defendants stated that the
defendants had no objection to the reference to the expert being in terms of
CS(OS) 482/2016                                                       Page 5 of 31
 Section 20 of the Indian Evidence Act, 1872. The counsel for the plaintiff,
on similar query, stated that she will obtain instructions in this regard and
inform the Court.

10.    The expert report from IIT, Delhi was not received within the time
envisaged and vide order dated 2nd November, 2017, it was directed that in
the meanwhile the written statement qua the other reliefs claimed by the
plaintiff be filed.

11.    A report dated 19th September, 2018 under cover of letter dated 22nd
September, 2018 has since been received from IIT, Delhi. The plaintiff has
filed IA No.17171/2018 by way of objections to the said report and the
defendants No.2 to 5 have filed IA No.17172/2018 under Order XIII-A of
the Code of Civil Procedure, 1908 (CPC) seeking summary judgment of
dismissal of suit on the basis of the said report.

12.    The counsel for the plaintiff and the counsel for the defendants No.2 to
5 were heard on 28th March, 2019 and have further been heard today with
reference to the said report, the objections of the plaintiff thereto and the
possibility of a summary judgment in the light of the said report.

13.    Though the report of the Three Members Committee constituted, in
pursuance to the direction of this Court by the Director, IIT, Delhi, of two
Professors and one Assistant Professor of Department of Computer Science
and Engineering, IIT, Delhi comprises of 19 pages and the Annexure thereto
comprises of 262 pages but for the purposes of the present order/judgment
suffice it is to reproduce the following passages thereof:




CS(OS) 482/2016                                                      Page 6 of 31
                                  "Abstract
       We present our final comprehensive report from our analysis on
       Source-Code Plagiarism Dispute in terms of the order passed
       by the Hon‟ble Delhi High Court, in the No.CS(OS) 482/2016
       titled as M/s Campus EAI India Private Limited (Plaintiff) and
       Neeraj Tiwari & Ors (Defendant). Our studies indicate that
       there are no instances of plagiarism found in defendant‟s code.
       We have compared the softwares on the basis of structural and
       flow similarities therein while also accounting for programming
       logic and methodology for detecting plagiarism.
       1.         Introduction
       Plagiarism in printed texts is a well understood phenomena and
       there are numerous computer-assisted tools and techniques
       which could be used to detect plagiarism in printed texts.
       However, plagiarism in software is relatively new and an active
       area of research. Software plagiarism is significantly different
       in nature from plagiarism of other literary/technical works.
       According to Parker and Hamblem [11], software plagiarism is
       defined to be an act through which a plagiarized program is
       produced from an original program by applying a number of
       routine program transformations. We, in this report, not only
       subscribe to the definition of software plagiarism from [11], but
       also refine it to cover similarity in semantic structure and
       information processing methodology between softwares. If the
       softwares were developed independently it is highly improbable
       for them to have the same structure and flow. In other words,
       changing the code structure and flow (code-refactoring) while
       maintaining the same functionality is a laborious and a difficult
       exercise (in terms of time and effort) requiring high degree of
       skill.
             A central challenge in automated or manual detection of
       software plagiarism is that while it is fairly straightforward to
       detect simple modifications of software (such as variable
       renaming), it is difficult to detect plagiarism orchestrated
       through function reordering and refactoring. Plagiarism at
CS(OS) 482/2016                                                     Page 7 of 31
        such deep levels can trip any trained eye or a naïve automated
       plagiarism detection tool.
               The two disputing parties, M/s Campus EAI India Private
       Limited and Neeraj Tiwari & Ors, have both implemented their
       backend processing in Java and their frontend processing in
       CSS (Cascading Style Sheets) and Javascript. We have
       analyzed the source-codes as a pair-wise comparison between
       files from the two softwares.
       .....While these tools can assist in highlighting similarities in
       the source codes, a similarity does not imply plagiarism and
       hence, these tools cannot completely automatically detect
       plagiarism.     A further analysis and manual detailed
       examination is required to arrive at a decision whether or not
       plagiarism exists.
              Our assessments reveals no plagiarism in the softwares.
       While the automated tools highlighted 577 instances of
       similarities between the two softwares, of varying number of
       lines-of-codes, all of these cases were assessed as false
       positives, as they were either open-source codes (see Section 3)
       or they showed structural similarity in segments that have a
       standard representation.
       Detailed Results: The detailed analysis data and analysis
       results are provide in an annexure (262) pages.
       ......
       Most softwares‟ source codes are not publicly available and
       only the person, team or organization that created the source
       code has the legal right to modify or reuse them. Such
       softwares are called "proprietary" or "closed source"
       softwares. On the other hand "open-source" softwares are
       distributed along with their source codes. An open-source
       software can be borrowed, modified and redistributed. Many
       open-source software are released with their own licensing and
       copyrights with the sole purpose of further qualifying the
       borrowing, modification and re-distribution of open-source
       code under various settings (commercial, personal, or
       academic) pertaining to the use of it.
CS(OS) 482/2016                                                    Page 8 of 31
              The right over a proprietary source code is held by the
       owner company. If a structural and intentional similarity is
       detected over the company‟s proprietary code segments, a case
       of plagiarism is recorded. However, in case the source code
       segments detected as similar are identified as open-source, the
       similarity would not imply plagiarism as none of the two
       companies hold the license or copyright over the code segment.
             Our assessment for possible plagiarism takes into
       account the proprietary or open-source status of the source
       code segments, as discussed in detail in Section 6.2.
       6.         Comparison Method
       To detect possible plagiarism we performed the following four
       steps:
                  1. Assessment of authenticity of the submitted source
                     code,
                  2. Identification of open-source and proprietary code in
                     software,
                  3. Similarity detection in proprietary code,
                  4. Examination of „similar‟ code for plagiarism.
                  These steps have been described in the forthcoming
                  subsections.
       6.1        Step 1: Assessment of authenticity of the source code
       .......
             In our opinion the data did not suggest any anomaly in
       the software development pattern; this is because the commit
       frequency was fairly regular. Based on the above analysis, in
       our opinion, the source code version submitted to us is
       authentic.
       6.2        Step 2: Identification of open-source and proprietary
                  code in software
       As discussed in Section 3, it is necessary to identify the open-
       source segments in the source code of the two companies as
       similarity detected over open-source code segments cannot be
       recorded as a case of plagiarism. The open-source segments in
CS(OS) 482/2016                                                       Page 9 of 31
        the source codes of the two companies, thus, need to be
       excluded from our analysis process to avoid false results of
       plagiarism detection. A comprehensive study of the two
       software source codes was conducted that revealed use of
       various open-source source codes and dependence over various
       open-source libraries, listed in annexure Section 1 (annexure
       Page 1).
       ......
       6.4        Step 4: Examination of 'similar' code for plagiarism
       ......
              Certain code constructs have a standard structure that
       cannot vary even with distinct developers. Additionally, various
       programming notations have a standard format and style. Such
       cases can result in false positives from the similarity detection
       tool. We found cases of function calls and library imports
       which were classified as similar by the tools, but were false
       alarms. We also found cases of declarations and hierarchical
       tags (in case of CSS files) that have a standard structure and
       were thus detected as similar code segments.
       .......
              Another class of false positives in the similarity detection
       tool‟s results come from similarity detected in open-source code
       segments. Based on the analysis discussed in Section 6.2, the
       source code segments detected as open-source and all source
       code segments belonging to open-source libraries that were
       detected as similar cannot be classified as instances of
       plagiarism. However, it is possible that the defendant may
       include proprietary code segments of plaintiff‟s source code in
       a open-source licensed file. Our analysis ensured that we do
       not overlook the possibility of such cases.
       ........
       7.         Results
       We detected 158 instances of similarity in the backend source
       code and 419 instances of similarity in the frontend source
       code, i.e., a total of 577 instances of varying sizes of code
CS(OS) 482/2016                                                          Page 10 of 31
          segments and varying percentage match (between 1% to 99%).
         However, none of the 577 instances can be recorded as a case
         of plagiarism as discussed further.
               Out of the 577 instances, 433 instances were observed in
         code segments that were verified as open-source code segments
         carrying a license or a copyright where the license terms allow
         companies to import the code. The 433 instances can be put in 2
         categories, as discussed in Section 6.4:
         .......
         ..... The Loginology SSO source code java, css and js files have
         99,374 lines-of-code and Quicklaunch SSO source code java,
         css and js files have 1,69,913 lines-of-code. These instances,
         thus, constitute a very small portion of the source code that is
         0.27% of Loginology SSO‟s source code and 0.19% of
         Quicklaunch SSO‟s source code.
         ......
                All the code segments in Loginology SSO‟s source code
         that contained instance(s) of similarity have been examined and
         classified as un-plagiarized. The same can be seem in table 1
         as the count of instances under column „R‟ (Remaining) is zero.
              Table 1: Similarity and plagiarism report of Loginology
         SSO source code files

               Similar                              Open-    Imports      False        Remaining
              Instances        Open-source          source    Only      Positives     (S-(O+I+F))
                                                    (A+B)              (Structural
                                                                       Similarity)


                          Category A   Category B

                 (S)                                 (O)       (I)        (F)             (R)
                             (A)          (B)
Backend         158          21              1       22       123          13              0
files
(.java)
Frontend        419          371             40      411       0           8               0
files
(.css, .js)
Total files     577          392             41      433      123          21              0


CS(OS) 482/2016                                                                      Page 11 of 31
        8.         Conclusion
             IIT Delhi was given the task of detection of software
              plagiarism in the source codes of M/s Campus EAI India
              Private Limited (Plaintiff) that is, Quicklaunch SSO, and
              of Neeraj Tiwari & Ors (Defendant), that is, Loginology
              SSO.
             It was claimed that the source codes given to IIT Delhi
              for analysis have not been modified after 22 September
              2016.
             We verified the claim that the source code of defendant
              has not been modified after 22 September 2016 and
              studied the development history for ensuring absence of
              unusual patterns in development process, as discussed in
              Section 6.1.
             The source codes were compared for structural similarity
              with the help of similarity detection tools SIM and MOSS,
              as discussed in Section 6.3.
             These automated tools reported 577 instances of
              structural similarity.
             Further analysis, as discussed in Section 5, revealed that,
              out of the 577 instances, 433 instances were recognized
              in open source code. All such similarity instances cannot
              be classified as instances of plagiarism, as discussed in
              Section 6.2.
             Further, 123 instances only matched on import
              statements. As the import statements have a standard
              structure and do not perform any processing they were
              ruled out.
             The 21 instances were manually analyzed for plagiarism,
              as discussed in Section 6.4.
             After manual analysis it was concluded that the 21
              instances of proprietary code detected as structurally
              similar by the automated tools did not qualify as
CS(OS) 482/2016                                                      Page 12 of 31
                   instances of plagiarism. The details of the same are
                  discussed in Section 6.4 and 7.
       Concluding Remark: In our opinion there is no evidence of
       plagiarism between the two source codes. We also did not
       detect any meaningful case of unusual activity in the
       development pattern or any case of tampering with the
       development history. We can conclude with a high degree of
       confidence that the proprietary source codes from M/s Campus
       EAI India Private Limited that is, Quicklaunch SSO, and of
       Neeraj Tiwari & Ors, that is, Loginology SSO are not
       plagiarized."
                                                            (emphasis added)


14.    The plaintiff has objected to the report pleading:

       "a.        Firstly, assuming (but not admitting) to the fact that Open
                  Source codes have been used in both the codes for the rival
                  softwares, reliance needs to be placed on the number of
                  instances in which Open Source codes have been used in both
                  the softwares, in order to construe whether the rational order of
                  the two rival codes is the same or not.

       b.         Secondly, the Open Source codes used by both the parties need
                  to be examined, as the Open Source codes used by the Plaintiff
                  have been re-engineered and tailored to suit the needs of the
                  Plaintiffs software and the same have eventually been
                  bootstrapped by the Defendants.

       c.         Thirdly, the order of the Import Structure of the two rival codes
                  must also be examined in depth, to determine whether the
                  structure of both the codes is similar, as the Import Structure of

CS(OS) 482/2016                                                          Page 13 of 31
                   the Plaintiffs code has been tailor made for the Plaintiff‟s
                  software.

       d.         Fourthly, all of the 433 instances of the Open Source codes and
                  the import structure need to be made known and scrutinized to
                  determine the similarities between the two rival codes."


15.    On the contrary, the counsel for the defendants No.2 to 5 contends that
once a team of experts from an esteemed institution like IIT, Delhi has
concluded that there is no plagiarism by the defendants No.2 to 5 and no
infringement of plaintiff‟s copyright in its asserted software, no other issue
survives and there is no other compelling reason why the claim of the
plaintiff should not be disposed of before recording of oral evidence.

16.    The counsel for the plaintiff has argued that the report erred in
excluding from analysis the open source code segments found in the source
code of the plaintiff as well as the defendants. It is explained that open
source software programs are programs which are available to all, without
any licence or permission for use thereof being required to be taken. It is
further explained that such open source code software programs are like a
dictionary and just like no plagiarism can be attributed to use of words from
a dictionary, no plagiarism can be attributed to use in the source code of
open source code segments as rightly found by the experts also.                It is
however further contended that just like there is copyright in the chronology
in which the words from the dictionary are arranged in framing a sentence or
a passage, similarly there is copyright in the chronology in which the open
source code segments are used in a source code. It is contended that the

CS(OS) 482/2016                                                         Page 14 of 31
 report erred in not analyzing the chronology in which the open source code
segments are used in the source code of the plaintiff and the defendants and
which analysis, if had been carried out, would have demonstrated plagiarism.
It is argued that trial is required in the suit, to grant an opportunity to the
plaintiff to, by examining its experts, prove so.

17.    It is further emphasised by the counsel for the plaintiff that besides the
433 open source segments, the report finds 21 other proprietary segments
and a total of as many as 577 similarities.

18.    I have enquired from the counsel for the plaintiff, whether the plaintiff
represented to the experts aforesaid to carry out the analysis of chronology.

19.    The counsel for the plaintiff draws attention to the letter dated 20 th
February, 2017 of IIT, Delhi to this Court, annexed to IA No.7876/2017 filed
by the plaintiff seeking transfer of the task of conducting source code
examination from IIT, Delhi to any other independent Government
body/Institute such as National Institute of Technology (NIT) and Central
Forensic Science Laboratory (CFSL), informing this Court that the progress
in the matter had been stalled due to demand of the plaintiff that the expert
committee must change its scope of work to include many additional
analysis which the committee felt would be time consuming and not
necessary in the initial phase and that such analysis could be ordered by the
Court, if the initial code comparison analysis results are inconclusive. The
counsel for the plaintiff contends that the plaintiff filed IA No.7876/2017 for
directions of this Court in this respect but the said application was disposed
of, without issuing any fresh direction.


CS(OS) 482/2016                                                       Page 15 of 31
 20.    However, a perusal of IA No.7876/2017 shows the plaintiff to have
pleaded therein that the plaintiff, on enquiry from other Government
institutes capable of conducting detailed source code examination, had been
informed that the same would cost in the range of Rs.4 lacs to Rs.5 lacs only,
while IIT, Delhi was charging Rs.11.88 lacs and seeking more for a detailed
analysis.    The plaintiff however, in the prayer paragraph of the said
application is found to have stated "It is respectfully submitted that the
Professional Cost and time indicated by the IIT Delhi is substantially higher
to conduct the source code examination. It is accordingly prayed that the
task of conducting the source code examination be transferred from the IIT
Delhi to any other independent government body/institute such as National
Institute of Technology, Delhi or CFSL (Central Forensic Science
Laboratory)".

21.    I also find that on 22nd January, 2018, when the aforesaid IA
No.7876/2017 came up before this Court, the same was disposed of vide the
following order:

       "It is agreed and recorded accordingly that the report which
       has to be given by IIT Delhi will be in terms of the order dated
       29.9.2016."


22.    In view of the aforesaid contents of IA No.7876/2017 and the order
thereon, I am unable to agree with the contention of the counsel for the
plaintiff that the plaintiff had taken the objection as is being raised now,
prior to or at the time of examination by the appointed expert and on the
contrary find the plaintiff, in moving IA No.7876/2017 having been guided
by the higher costs being charged by IIT, Delhi and to which also the

CS(OS) 482/2016                                                    Page 16 of 31
 plaintiff agreed on 22nd January, 2018. It thus cannot be held that the
objection raised now was raised during the agreed examination also.

23.    The counsel for the defendants No.2 to 5 has argued that the parties
had consented to examination by the expert to cut short the trial and the
plaintiff cannot now be permitted to, notwithstanding such examination, still
want the suit to go on. It is also argued that the only objection of the
plaintiff was to the charges demanded by IIT, Delhi and which objection also
the plaintiff gave up. Attention in this regard is invited to the email dated
20th January, 2017 of the plaintiff annexed by the defendants No.2 to 5 to
their reply to IA No.7876/2018 aforesaid. It is contended that it is now not
open to the plaintiff to reiterate the same.

24.    The counsel for the defendants No.2 to 5 also draws attention to the
replication of the plaintiff to the written statement of the defendants No.2 to
5 to contend that no such plea, as is being taken now by way of objections, is
taken therein.

25.    The counsel for the defendant No.1 has also contended that the
plaintiff, in the plaint has not even disclosed the name of the author of the
source code in which the plaintiff claims copyright and has not pleaded that
its own source code contained open source code segments or that the
infringement was in sequence / arrangement of open source code segments.

26.    In Hirachand Kothari Vs. State of Rajasthan 1985 (Supp) SCC 17 it
was the claim of the plaintiff/appellant that the State of Rajasthan, in relation
to a dispute as to valuation of a piece of land, had agreed to appointment of
the Town Planning Officer as the Assessor to assess the value of the land and
submit his report. The Town Planning Officer valued the land at
CS(OS) 482/2016                                                       Page 17 of 31
 Rs.35,826.50p. However the State of Rajasthan disputed the said valuation.
The plaintiff/appellant instituted the suit for recovery of the amount at which
the Town Planning Officer had assessed and determined the valuation of the
land, pleading that the State of Rajasthan was bound thereby. The State of
Rajasthan contested the said suit inter alia pleading that it had never agreed
that the assessment or valuation made was to be final and binding on them
and that there was an error in principle in the assessment done/valuation
made. It was held:

                  "6. The main question raised is whether the report of the
                  assessor (Ext. 5) was "information" within the meaning of
                  Section 20 of the Evidence Act and therefore considered to be
                  an admission of the parties as to appraisement or valuation of
                  the disputed land at Rs 35,826.50 p. and such an admission
                  must operate as estoppel. Admissions may operate as estoppel
                  and they do so where parties had agreed to abide by them. The
                  word "information" occurring in Section 20 is not to be
                  understood in the sense that the parties desired to know
                  something which none of them had any knowledge of. Where
                  there is a dispute as regards a certain question and the Court is
                  in need of information regarding the truth on that point, any
                  statement which the referee may make is nevertheless
                  information within the purview of Section 20. The contention on
                  behalf of the State Government on the word "information"
                  occurring in this section is that the parties did not stand in need
                  of obtaining any information from D.N. Gupta and that at any
                  rate the State Government never agreed to abide by the
                  valuation made by him and therefore they were not bound by
                  the same inasmuch as the valuation made by him was not
                  conclusive as to the value of the subject-matter as between the
                  parties.
       7.         Section 20 of the Evidence Act reads as follows:
                  "20. Admissions by persons expressly referred to by party to
                  suit.--Statements made by persons to whom a party to the suit
CS(OS) 482/2016                                                           Page 18 of 31
                   has expressly referred for information in reference to a matter
                  in dispute are admissions."
                  Section 20 is the second exception to the general rule laid down
                  in Section 18. It deals with one class of vicarious admissions
                  that demand of persons other than the parties. Where a party
                  refers to a third person for some information or an opinion on a
                  matter in dispute, the statements made by the third person are
                  receivable as admissions against the person referring. The
                  reason is that when a party refers to another person for a
                  statement of his views, the party approves of his utterance in
                  anticipation and adopts that as his own. The principle is the
                  same as that of reference to arbitration. The reference may be
                  by express words or by conduct, but in any case there must be a
                  clear admission to refer and such admissions are generally
                  conclusive".
       However in the facts of the said case, it was found that the State of
Rajasthan had not consented to the valuation.

27.    Reference in the context of law on Section 20 of the Indian Evidence
Act, 1872 may also be made to Akhil Bhartiya Mahajan Shiromani Sabha
Vs. Dharamveer Mahajan (2008) 154 DLT 320, Anoop Madan Vs. Dena
Bank (2013) SCC OnLine Del 2097 and Takamol Industries Pvt. Ltd. Vs.
Kundan Rice Mills Ltd. 2017 SCC OnLine Del 6450.

28.    Though the order dated 29th September, 2016 does not expressly
contain the consent of the plaintiff to the offer of the defendants of
examination of the two softwares by an independent expert but the tenor of
the order is consensual and as the subsequent orders also confirm; in any
case, on 22nd January, 2018 as aforesaid, it was agreed and recorded that the
report which had to be given by IIT, Delhi will be in terms of order dated
29th September, 2016. There is thus no iota of doubt that the reference for

CS(OS) 482/2016                                                        Page 19 of 31
 information to IIT, Delhi was with the consent of the plaintiff as well as the
defendant.

29.    The aforesaid was/is enough to bind the plaintiff as well as the
defendant to the information submitted by the expert and to dispose of the
suit in accordance therewith. However I had still on 29 th September, 2016
expressly enquired from the counsels whether they were agreeable to the
reference to the expert being in terms of Section 20 of the Indian Evidence
Act. While the counsel for the defendants had readily agreed, the counsel for
the plaintiff had sought time to obtain instructions.

30.    I have enquired from the counsel for the plaintiff, whether the counsel
for the plaintiff at any subsequent time so informed the Court.

31.    The counsel for the plaintiff replies in the negative.

32.    The counsel for the defendants No.2 to 5 contends that though
undoubtedly in none of the subsequent orders/pleadings such consent of the
counsel for the plaintiff is recorded but at the same time, though the counsel
for the plaintiff had taken time to obtain instructions and inform the Court,
the failure to inform the Court should be deemed as consent. It is stated that
had the intention of the plaintiff been to be not bound by the report, the
counsel for the plaintiff would have informed so and which she did not. It is
argued that the plaintiff is also thus deemed to have agreed to the reference
being in terms of Section 20 of the Evidence Act.

33.    I tend to agree with the counsel for the defendants. The plaintiff in a
commercial suit especially of the nature of infringement of copyright in the
source code of a software program, and adjudication whereof is of a highly

CS(OS) 482/2016                                                    Page 20 of 31
 technical nature, cannot be permitted to be a fence-sitter. The plaintiff in
such a suit cannot be permitted to, after receipt of opinion of the expert, if in
favour, claim the same to be binding and if against, claim the same to be not
binding.

34.    It cannot be lost sight of, that the defendants in this suit on the very
first date of appearance before this Court agreed to suffer a decree for
permanent injunction as sought and further offered to the examination of the
source code of the software program of the plaintiff and of the defendants to
be examined by an independent expert and also had no hesitation to make a
statement to be bound by the said report, even if against them and to suffer
the consequences of becoming liable for damages etc. therefor. It is not as if
the plaintiff was not agreeable to the aforesaid offer of the defendants. The
plaintiff also readily agreed thereto, being aware that the adjudication of the
dispute in any case would be ultimately falling in the domain of experts with
this Court also forming an opinion on the basis of such expert opinion.
Though the counsel for the plaintiff on 29th September, 2016 did not consent
to the reference to the expert being under Section 20 of the Evidence Act as
readily consented to by the counsel for the defendants, but it is not as if the
counsel for the plaintiff expressed any aversion thereto. All that transpired
was that though the defendants were present in the Court for their counsels to
readily take instructions, the plaintiff was not. Rather, the counsel for the
plaintiff expressly stated that she will inform. She did not inform to the
contrary. Therefrom, it is well-nigh possible that the defendants proceeded
with the evaluation by the expert, costs whereof even the plaintiff, claiming
itself to be established in the field, was finding to be exorbitant, on the
premise of the said finding of the expert putting an end to the litigation one
CS(OS) 482/2016                                                       Page 21 of 31
 way or the other, without requiring the parties to incur expenditure on trial.
A litigant cannot be permitted to create such a situation. If the counsel for the
plaintiff had informed that the plaintiff was not agreeable to be bound by the
report, the defendants could have very well also reneged from their consent
to Section 20 of the Evidence Act or even to spending money on expert
opinion, even before filing their pleadings.

35.    The counsel for the plaintiff has also drawn attention to pages 148 to
150 of Part III file, being the chat inter se the defendants, to contend that the
same shows a high probability of the defendants having stolen the source
code of the software program of the plaintiff and other confidential data of
the plaintiff.

36.    The defendants, in the said chat are found to be indulging in casual
banter about the fact of their leaving the employment of the plaintiff. I have
enquired from the counsel for the plaintiff, whether not such banter is
common also to advocates in large law firms, who often talk about the
impact of their leaving on the firm.

37.    The counsel for the plaintiff could not disagree, but contends that the
matter requires further investigation and opportunity of trial needs to be
granted. It is further contended that all objections of the plaintiff are within
the four corners of order of reference; that the experts have not used the
proof of innovation test; the experts have done library-wise instead of
product-wise comparison.

38.    I have further enquired from the counsel for the plaintiff, whether
there are any other application / software programs serving the same purpose
as the subject software program of the plaintiff.
CS(OS) 482/2016                                                       Page 22 of 31
 39.    The counsel for the plaintiff admits that there are others also,
explaining that SSO is an abbreviation for "Single Sign-On" and that Google
also has the same application, but contends that the subject software program
of the plaintiff is standard for universities in United States. On further
enquiry, it is admitted that there are other competitors of the plaintiff in the
United States. The counsel for the plaintiff, in response to the contention of
the counsel for the defendant No.1 has also stated that the plaintiff, in
paragraphs 3 & 4 of the plaint itself has pleaded that the defendants are
authors of the source code of the plaintiff. It is however stated that whatever
was authored by the defendants as employees of the plaintiff, belongs to the
plaintiff.

40.    The counsel for the defendants No.2 to 5 has drawn attention to the
replication of the plaintiff to the written statements of the defendants No.2 to
5 to show the plea of the plaintiff that the plaintiff‟s first version of the
software QuickLaunch SSO was launched in the year 2011 and contends that
the defendants No.3&4 joined employment of plaintiff thereafter.             It is
further contended that the plaintiff nowhere pleaded that segments of its
source code are from open source software programs and what is being
alleged now is contrary to what is pleaded. It is further argued that the
plaintiff, in the complaint of criminal offence filed against the defendants,
did not say that the defendants are the authors of the plaintiff‟s source code
and it is further informed that the said complaint has been closed.

41.    The counsel for the plaintiff has placed reliance on R.G. Anand Vs.
Delux Films (1978) 4 SCC 118, in turn relying on Bobbs-Merrill Company
Vs. Isidor Straus and Nathan Straus 210 U.S. 339, holding "the question is

CS(OS) 482/2016                                                       Page 23 of 31
 not whether the alleged infringer could have obtained the same information
by going to the same source used by the plaintiff in his work, but whether he
did in fact go to the same source and do his own independent research. In
other words, the test is whether one charged with the infringement made an
independent production, or made a substantial and unfair use of the
plaintiff‟s work."

42.    The counsel for the defendants No.2 to 5 has drawn attention to L.
Ram Narain Vs. Santosh Kumar 1952 SCC Online P&H 64 holding the
reference in that case to be under Section 20 of Evidence Act.

43.    I have enquired from the counsel for the plaintiff, whether in the facts
and circumstances aforesaid, the plaintiff is willing to give an undertaking to
pay the actual costs of litigation as disclosed by the defendants to the
plaintiff, in the event of the plaintiff, even after trial sought, failing to make
out a case. The names of the Directors of the plaintiff have also been
enquired, upon being informed that the plaintiff company has no assets of its
own from which the costs, if any decreed against the plaintiff can be
recovered.

44.    It is informed that Arun Chopra and Shringi Chopra are the only
Directors of the plaintiff and are of old age. The counsel for the plaintiff
further states that the said Directors are not willing to give an undertaking to
the Court to, in the event of the costs decreed being not recovered from the
plaintiff, being recovered from them personally.           It is stated that an
undertaking can be given for maximum costs of Rs.15 lacs.

45.    The counsel for the defendants states that the defendants have already
incurred 50% of the costs of over Rs.12.5 lacs paid to IIT, Delhi and have
CS(OS) 482/2016                                                       Page 24 of 31
 incurred considerable costs in this litigation for the last over two and a half
years and of which certificate along with proof can be furnished. It is stated
that trial of the suit will entail examination and cross-examination of experts
and all of which will again invite incurring of heavy expenditure, with the
defendants requiring the presence of their expert, even for the cross-
examination of the expert now intended to be examined by the plaintiff. The
counsel for the defendants thus states that the defendants are not willing to
accept the undertaking by the plaintiff and its Directors of maximum costs of
Rs.15 lacs and the plaintiff, if inspite of the report of the IIT, Delhi still
wants to proceed with the litigation, must agree to reimburse the defendants
with full costs thereof, in the event of failing.

46.    Having considered the controversy, I am of the opinion that the
defendants are entitled to summary judgment of dismissal of the suit. My
reasons therefor are recorded below:

       (A)        What is now contended by the counsel for the plaintiff including
       in objections is indeed contrary to the stand of the plaintiff taken in
       replication filed to the written statement of defendants No.2 to 5 prior
       to the report. The plaintiff therein, in response to paragraphs No.28 &
       29 of the written statement of the defendants No.2 to 5 as under:

                  "28. It is further submitted that when the answering
                       Defendants conducted the comparison between the
                       source codes of the "QuickLaunch SSO" and
                       "Loginology", from the very same website that the
                       Plaintiff had used, i.e. www.diffnow.com, the
                       answering Defendants found that with respect to
                       comparisons represented in screenshots II-IV of
                       the Plaint, the website clearly mentions the name
                       of the author of the source codes, to be one Mr.
CS(OS) 482/2016                                                        Page 25 of 31
                         Abdullah A Almsaeed. It is evident that the
                        Plaintiff, with the intention of misleading and
                        defrauding the Hon‟ble Court has malafidely
                        removed the portion of the screenshots, which
                        mentioned Mr. Almsaeed‟s name as the author.
                        Thus, despite being aware that Mr. Almsaeed is the
                        actual author of the source code, who has provided
                        the open source libraries in public domain, the
                        Plaintiff has wrongly claimed copyright over such
                        source codes and filed the instant suit. Further, it
                        is evident from the printouts of the source codes
                        that the source code represented in Screenshot I
                        was published in public domain on 25th May, 2013
                        and the source code represented in Screenshots II-
                        IV was published in public domain on 4th January,
                        2014.
                  29.   It is submitted that such acts of the Plaintiff not
                        only amount to concealment and suppression of
                        material fact, but is also contemptuous and
                        fraudulent deserving to be penalized with
                        exemplary costs by this Hon‟ble Court. Printouts
                        of the abovementioned screenshots, the entire
                        abovementioned source codes from open source
                        libraries and information about Mr. Almasaeed
                        have been filed in the present proceeding for the
                        kind consideration of the Hon‟ble Court. The
                        answering Defendants reserve its right to initiate
                        appropriate legal action against the Plaintiff, for
                        such malicious prosecution and rendering false
                        evidence."


       pleaded as under:

                  "8.   The contents of Paragraphs 28 and 29 are wrong
                        and denied. It is submitted that as per the
                        admission of the Defendant‟s screen shot 1 was
                        first in public domain on May 25, 2013 and a

CS(OS) 482/2016                                                         Page 26 of 31
                         source code represented in screen shot 2 to 4 was
                        first published in public domain on January 4,
                        2014. It is further submitted that the Plaintiffs‟
                        first version of the software Quicklaunch SSO was
                        launched in the year 2011 and therefore it cannot
                        be said that the Plaintiff copied the portions of the
                        source codes which are available in open source
                        libraries. It is therefore clear that the Plaintiffs‟
                        source code is an original work and the
                        Defendants have copied the work of the Plaintiff to
                        develop their own software Loginology. Moreover,
                        it is rather surprising to note that the Plaintiff took
                        almost 3 years to develop their software and the
                        Defendants took only 6 months to develop their
                        software Loginology which is based on same
                        functioning of the code, same architecture and
                        same resources. It is the Defendants who have
                        been suppressing material facts from the Court
                        and not the Plaintiff. The said fact is apparent
                        from the fact that the Defendants have claimed that
                        they have obtained source codes from open source
                        libraries to develop their software Loginology
                        whereas when compared with the open source
                        library, it has been found by the Plaintiff that there
                        are difference on as many as 249 lines, 4 in-line
                        differences and 78 lines have been deleted by the
                        Defendants which proves that Loginology code is
                        not an open source code.              It is therefore
                        respectfully submitted that the Defendant Nos.2 to
                        4 should be permanently injuncted from using the
                        infringing source code and the Defendants deserve
                        to be penalized with exemplary cost by this
                        Hon‟ble Court."


       (B)        Such inconsistencies in a suit of the present nature adjudication
       whereof, as aforesaid, is largely dependent on expert opinion and
       appreciation thereof, are indeed fatal to the claim of the plaintiff.
CS(OS) 482/2016                                                           Page 27 of 31
        (C)        The plaintiff, nowhere in its pleadings is found to have pleaded
       that though segments of the source code of the plaintiff as well as the
       defendants have been sourced from open source code software
       programs but the copyright of the plaintiff is in arrangement or
       sequencing of the said open source code.

       (D)        I have in Vifor (International) Ltd. Vs. Suven Life Sciences
       Ltd. 2019 SCC OnLine Del 7514, in the context of commercial suits,
       held that litigants thereto are required to make sharp to the point
       pleadings culling out the disputes for adjudication and cannot be
       permitted to take general pleas and cannot understand their own case
       during the course of trial. Such pleas make litigation endless, with
       applications after applications for amendment of pleadings and for
       filing of documents and leading of evidence beyond the permitted
       stage being filed and all of which are not envisaged in the timelines for
       disposal provided for with respect to the commercial suits in the
       Commercial Courts Act, 2015.            A litigant to a commercial suit,
       particularly a plaintiff, who defaults has to suffer the consequences.
       There is a mode to move away from what the Britishers labelled as
       „mofussil pleadings‟ at least in relation to commercial suits.

       (E)        The conduct of the defendants of, on the very first date, even
       before filing their written statement, agreeing to suffer a decree for
       permanent injunction as sought and also offering to have the software
       of both compared by an expert to put the matter at rest at the earliest,
       also speaks volumes in favour of the defendants. Not only so, the
       defendants also immediately consented to being bound by the report of

CS(OS) 482/2016                                                         Page 28 of 31
        the expert meaning that if it were to be against them, the consequences
       against the defendants would have followed.

       (F)        The conduct of the plaintiff, of though not having instructions
       on 29th September, 2016 for consent to being bound by the report of
       the expert and undertaking to inform the Court of the same, not
       informing the Court that the plaintiff was not willing therefor is
       indicative of the plaintiff thereby leading the defendants to believe that
       the plaintiff was also agreeable thereto and the report of the expert
       would indeed be final.

       (G)        In this context I may mention that since the date of the decree
       dated 29th September, 2016, the period of two years for which it was
       passed has also expired.

       (H)        The plaintiff allowed the experts to proceed with the
       examination as deemed appropriate by them, by expressly consenting
       thereto on 22nd January, 2018. The plaintiff is now estopped from
       contending that the examination should have been on different
       parameters.         Though the plaintiff claims to have filed IA
       No.7876/2017 in this respect but did not press the same. The plaintiff
       cannot be permitted to blow hot and cold during the course of
       proceeding.

       (I)        No mala fides are attributed to the expert, as indeed cannot be
       considering the stature of the institution to which the experts belong.

       (J)        The expert has given cogent reasons for not finding the
       defendants to have plagiarized the software program of the plaintiff

CS(OS) 482/2016                                                       Page 29 of 31
        and no material at least for the present suit has been shown to the
       contrary.

       (K)        As far as the reliance by the counsel for the plaintiff on R.G.
       Anand supra is concerned, it is the argument of the counsel for the
       plaintiff herself, though the plea is to the contrary, that the defendants
       are the authors of the source code of the software program of the
       plaintiff also. Once the defendants are claimed by the plaintiff to be
       the author, in my opinion, in the facts of the present case, the test as
       enunciated therein, will not apply.

       (L)        The reluctance of the plaintiff to even now bear the actual costs
       of litigation of the defendants in the event of failing in the suit, is akin
       to the fence-sitting indulged in by the plaintiff till now. The plaintiff,
       under the Commercial Courts Act itself is liable for actual costs of the
       defendants, in the event of failing in the suit. It was only because the
       plaintiff, though not entitled in the facts to claim trial, was claiming
       trial, then an offer was made to the plaintiff to assure reimbursement
       of costs. The defendants cannot be compelled to incur expenditure for
       a fishing expedition which the plaintiff appears to be indulging in,
       without the plaintiff, if called upon, bearing the expenditure therefor.
       The same again shows the roving nature of the enquiry which the
       plaintiff desires.

       (M)        The reference to IIT, Delhi, is found to be within the meaning of
       Section 20 of the Evidence Act and the plaintiff, in accordance
       therewith is bound by the report and estopped from contending
       otherwise.

CS(OS) 482/2016                                                         Page 30 of 31
 47.    The suit is thus dismissed. I am for the time being confining costs
incurred by the defendants in the litigation to the amount paid by defendants
No.2 to 5 to IIT, Delhi, being 50% of about Rs.12 lacs i.e. Rs.6 lacs only but
with the clarification that in the event of the plaintiff preferring an appeal,
the defendants shall be entitled to press for costs of the suit till now also, if
the occasion so arises before the Appellate Court. The plaintiff to pay costs
of Rs.6 lacs to defendants No.2 to 5 within four weeks.

       Decree sheet be drawn up.



                                                RAJIV SAHAI ENDLAW, J.

MARCH 29, 2019 „bs‟ (corrected and released on 19th April, 2019) CS(OS) 482/2016 Page 31 of 31