This text of Compulife Software, Inc. v. Rutstein (Compulife Software, Inc. v. Rutstein) is published on Counsel Stack Legal Research, covering District Court, S.D. Florida primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.
Bluebook
Compulife Software, Inc. v. Rutstein, (S.D. Fla. 2025).
Opinion
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
COMPULIFE SOFTWARE, INC.,
Plaintiff, Case No. 9:16-CV-80808-BER v.
BINYOMIN RUTSTEIN A/K/A BEN RUTSTEIN, DAVID RUTSTEIN A/K/A DAVID GORDON A/K/A BOB GORDON A/K/A NATE GOLDEN AND JOHN DOES 1 TO 10,
Defendants.
Plaintiff, Case No. 9:16-CV-81942-BER v.
MOSES NEWMAN, DAVID RUTSTEIN, BINYOMIN RUTSTEIN AND AARON LEVY,
SUPPLEMENTAL FINDINGS OF FACT AND CONCLUSIONS OF LAW
Compulife Software, Inc. (“Compulife”) offers life insurance price quotes. One way for a person to get a quote is to fill out an online form, which triggers Compulife’s proprietary database to generate the quote. In computer-ese, that online form is a “dialog box.” Compulife’s HTML source code causes the dialog box to appear on the user’s computer screen. Defendants copied large portions of that HTML source code, stole Compulife’s database, and began competing against Compulife. After two trials and two trips to the Eleventh Circuit, the remaining legal question is whether copying the HTML source code amounted to copyright
infringement. More specifically, the Eleventh Circuit has directed me to make findings about whether the arrangement of the HTML source code as a whole has copyright protection. For the following reasons, I conclude that it does not. I. PROCEDURAL HISTORY This litigation involves two consolidated cases. The first (Case No. 16-80808) alleged direct copyright infringement (Count I), contributory copyright infringement (Count II), unfair competition under the Lanham Act (Count III), federal theft of
trade secrets (Count IV), Florida theft of trade secrets (Count V), violation of the Florida Computer Abuse and Data Recovery Act (“CADRA”) (Count VI), Florida unfair competition (Count VII), and violating the Florida Deceptive and Unfair Trade Practices Act (“FDUTPA”) (Count VIII). The second (Case No. 16-81942) alleged Federal trade secrets theft (Count I), direct copyright infringement (Count II), contributory copyright infringement (Count III), Lanham Act unfair competition
(Count IV), Florida trade secret theft (Count V), CADRA (Count VI), and Florida unfair competition (Count VII). On March 12, 2018, final judgment was entered for Defendants on all claims in both cases. Compulife appealed. The Eleventh Circuit affirmed the judgments on the Lanham Act, FDUTPA, CADRA, and Florida unfair competition claims. Compulife Software Inc. v. Newman, et. al., 959 F.3d 1288 (11th Cir. 2020) (Compulife
2 I). It remanded the trade secret and copyright infringement claims for further findings.
After a second trial, final judgment was entered for Compulife on its trade secret claims (Counts IV and V in the ’08 case and Counts I and V in the ’42 case). Final judgment was entered in favor of Defendants on the direct and contributory copyright infringement claims (Counts I and II in the ’08 case and Counts II and III in the ’42 case). Both sides appealed the final judgment. The Eleventh Circuit affirmed the final judgments against Defendants on the trade secret claims; it reversed the judgment on the copyright claims and remanded
for further proceedings. 111 F. 4th 1147 (11th Cir. 2024) (Compulife II): Although the district court considered the selection and arrangement of Compulife's code to some degree, the district court never identified the entire arrangement of these variables in the code as a constituent component of the code. For example, the district court expressly evaluated the arrangement of the birth month, birthday, and birth year variables before filtering. But it didn't look at the arrangement of all the variables together. And, relying on Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 347–48, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991), the district court recognized that factual compilations, “like the ones performed by Compulife's software in compiling facts ... to generate a quote” can be protectable. But the arrangement of the code itself can be protectable, not just the results produced by the software. Given that the arrangement of the code may be protectable, we agree with Compulife that the district court should have abstracted the “arrangement” as something to be analyzed at the subsequent filtration step. Compulife II at 1158. 3 II. LEGAL PRINCIPLES Mandate Rule I first acknowledge the limitations imposed by the mandate rule and the law
of the case doctrine. As the Eleventh Circuit has explained: “The mandate rule is a specific application of the ‘law of the case’ doctrine which provides that subsequent courts are bound by any findings of fact or conclusions of law made by the court of appeals in a prior appeal of the same case.” Friedman v. Mkt. St. Mortg. Corp., 520 F.3d 1289, 1294 (11th Cir. 2008) (quotation marks omitted). “The law of the case doctrine and the mandate rule ban courts from revisiting matters decided expressly or by necessary implication in an earlier appeal of the same case.” AIG Baker Sterling Heights, LLC v. Am. Multi- Cinema, Inc., 579 F.3d 1268, 1270–71 (11th Cir. 2009). It has its greatest force when a case is on remand to the district court. “When an appellate court issues a clear and precise mandate, ... the district court is obligated to follow the instruction. Neither the district court nor any party is free to ignore the law of the case.” Litman v. Mass. Mut. Life Ins. Co., 825 F.2d 1506, 1516 (11th Cir. 1987). “A district court when acting under an appellate court's mandate, cannot vary it, or examine it for any other purpose than execution; or give any other or further relief; or review it, even for apparent error, upon a matter decided on appeal; or intermeddle with it, further than to settle so much as has been remanded.” Id. at 1510–11 (quotation marks omitted). Winn-Dixie Stores, Inc. v. Dolgencorp, LLC, 881 F.3d 835, 843 (11th Cir. 2018). These consolidated cases were remanded for the limited purpose of making factual and legal findings about whether the arrangement of the HTML source code is protectable under the federal copyright laws. I therefore will not reopen the record; I will consider only the evidence and arguments presented at trial. Even if the mandate rule allowed me to reopen the record, I would decline to do so. Both sides had a full opportunity at the trial to develop the facts, to argue their legal positions, and to submit proposed findings of fact and conclusions of law. Neither 4 side argued on appeal that I erred by excluding any evidence or by limiting legal arguments. Under these circumstances, the interests of justice do not require that
the parties be given a “second bite at the apple.” Moreover, neither party asked to supplement the record after the mandate issued. Copyright Infringement To succeed on its copyright infringement claim, Compulife must prove (1) it held a valid copyright in the HTML source code and (2) Defendants factually and legally copied constituent elements of the work that are original. Compulife II at 1156. There is no remaining dispute that Compulife held a valid copyright
registration for the HTML source code or that Defendants factually copied portions of that code. Compulife I, 959 F.3d at 1301-02.
Free access — add to your briefcase to read the full text and ask questions with AI
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
COMPULIFE SOFTWARE, INC.,
Plaintiff, Case No. 9:16-CV-80808-BER v.
BINYOMIN RUTSTEIN A/K/A BEN RUTSTEIN, DAVID RUTSTEIN A/K/A DAVID GORDON A/K/A BOB GORDON A/K/A NATE GOLDEN AND JOHN DOES 1 TO 10,
Defendants.
Plaintiff, Case No. 9:16-CV-81942-BER v.
MOSES NEWMAN, DAVID RUTSTEIN, BINYOMIN RUTSTEIN AND AARON LEVY,
SUPPLEMENTAL FINDINGS OF FACT AND CONCLUSIONS OF LAW
Compulife Software, Inc. (“Compulife”) offers life insurance price quotes. One way for a person to get a quote is to fill out an online form, which triggers Compulife’s proprietary database to generate the quote. In computer-ese, that online form is a “dialog box.” Compulife’s HTML source code causes the dialog box to appear on the user’s computer screen. Defendants copied large portions of that HTML source code, stole Compulife’s database, and began competing against Compulife. After two trials and two trips to the Eleventh Circuit, the remaining legal question is whether copying the HTML source code amounted to copyright
infringement. More specifically, the Eleventh Circuit has directed me to make findings about whether the arrangement of the HTML source code as a whole has copyright protection. For the following reasons, I conclude that it does not. I. PROCEDURAL HISTORY This litigation involves two consolidated cases. The first (Case No. 16-80808) alleged direct copyright infringement (Count I), contributory copyright infringement (Count II), unfair competition under the Lanham Act (Count III), federal theft of
trade secrets (Count IV), Florida theft of trade secrets (Count V), violation of the Florida Computer Abuse and Data Recovery Act (“CADRA”) (Count VI), Florida unfair competition (Count VII), and violating the Florida Deceptive and Unfair Trade Practices Act (“FDUTPA”) (Count VIII). The second (Case No. 16-81942) alleged Federal trade secrets theft (Count I), direct copyright infringement (Count II), contributory copyright infringement (Count III), Lanham Act unfair competition
(Count IV), Florida trade secret theft (Count V), CADRA (Count VI), and Florida unfair competition (Count VII). On March 12, 2018, final judgment was entered for Defendants on all claims in both cases. Compulife appealed. The Eleventh Circuit affirmed the judgments on the Lanham Act, FDUTPA, CADRA, and Florida unfair competition claims. Compulife Software Inc. v. Newman, et. al., 959 F.3d 1288 (11th Cir. 2020) (Compulife
2 I). It remanded the trade secret and copyright infringement claims for further findings.
After a second trial, final judgment was entered for Compulife on its trade secret claims (Counts IV and V in the ’08 case and Counts I and V in the ’42 case). Final judgment was entered in favor of Defendants on the direct and contributory copyright infringement claims (Counts I and II in the ’08 case and Counts II and III in the ’42 case). Both sides appealed the final judgment. The Eleventh Circuit affirmed the final judgments against Defendants on the trade secret claims; it reversed the judgment on the copyright claims and remanded
for further proceedings. 111 F. 4th 1147 (11th Cir. 2024) (Compulife II): Although the district court considered the selection and arrangement of Compulife's code to some degree, the district court never identified the entire arrangement of these variables in the code as a constituent component of the code. For example, the district court expressly evaluated the arrangement of the birth month, birthday, and birth year variables before filtering. But it didn't look at the arrangement of all the variables together. And, relying on Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 347–48, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991), the district court recognized that factual compilations, “like the ones performed by Compulife's software in compiling facts ... to generate a quote” can be protectable. But the arrangement of the code itself can be protectable, not just the results produced by the software. Given that the arrangement of the code may be protectable, we agree with Compulife that the district court should have abstracted the “arrangement” as something to be analyzed at the subsequent filtration step. Compulife II at 1158. 3 II. LEGAL PRINCIPLES Mandate Rule I first acknowledge the limitations imposed by the mandate rule and the law
of the case doctrine. As the Eleventh Circuit has explained: “The mandate rule is a specific application of the ‘law of the case’ doctrine which provides that subsequent courts are bound by any findings of fact or conclusions of law made by the court of appeals in a prior appeal of the same case.” Friedman v. Mkt. St. Mortg. Corp., 520 F.3d 1289, 1294 (11th Cir. 2008) (quotation marks omitted). “The law of the case doctrine and the mandate rule ban courts from revisiting matters decided expressly or by necessary implication in an earlier appeal of the same case.” AIG Baker Sterling Heights, LLC v. Am. Multi- Cinema, Inc., 579 F.3d 1268, 1270–71 (11th Cir. 2009). It has its greatest force when a case is on remand to the district court. “When an appellate court issues a clear and precise mandate, ... the district court is obligated to follow the instruction. Neither the district court nor any party is free to ignore the law of the case.” Litman v. Mass. Mut. Life Ins. Co., 825 F.2d 1506, 1516 (11th Cir. 1987). “A district court when acting under an appellate court's mandate, cannot vary it, or examine it for any other purpose than execution; or give any other or further relief; or review it, even for apparent error, upon a matter decided on appeal; or intermeddle with it, further than to settle so much as has been remanded.” Id. at 1510–11 (quotation marks omitted). Winn-Dixie Stores, Inc. v. Dolgencorp, LLC, 881 F.3d 835, 843 (11th Cir. 2018). These consolidated cases were remanded for the limited purpose of making factual and legal findings about whether the arrangement of the HTML source code is protectable under the federal copyright laws. I therefore will not reopen the record; I will consider only the evidence and arguments presented at trial. Even if the mandate rule allowed me to reopen the record, I would decline to do so. Both sides had a full opportunity at the trial to develop the facts, to argue their legal positions, and to submit proposed findings of fact and conclusions of law. Neither 4 side argued on appeal that I erred by excluding any evidence or by limiting legal arguments. Under these circumstances, the interests of justice do not require that
the parties be given a “second bite at the apple.” Moreover, neither party asked to supplement the record after the mandate issued. Copyright Infringement To succeed on its copyright infringement claim, Compulife must prove (1) it held a valid copyright in the HTML source code and (2) Defendants factually and legally copied constituent elements of the work that are original. Compulife II at 1156. There is no remaining dispute that Compulife held a valid copyright
registration for the HTML source code or that Defendants factually copied portions of that code. Compulife I, 959 F.3d at 1301-02. It is the law of the case that the individual variables in the HTML source code were not legally copied. As discussed more fully below, some, but not all, of the arrangement of the code was factually copied. Compulife bears the ultimate burden of proving legal copying. Compulife I at 1301. “‘Legal’— or ‘actionable’ — copying occurs when ‘those elements of the
[copyrighted work] that have been copied are protected expression and of such importance to the copied work that the appropriation is actionable.’” Id. at 1302 (brackets in original) (cleaned up). That is, “the portion of the copyrighted work actually taken [must] satisfy the constitutional requirement of originality.” Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1542 (11th Cir. 1996) (citing Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 345-46 (1991)). And, there must be a 5 “‘substantial similarity’ between the allegedly offending program and the protectable, original elements of the copyrighted works.” Bateman, 79 F.3d at 1542.
To decide whether the legal copying of a computer program is actionable, the Court employs a three-step process: (1) abstraction, (2) filtration, and (3) comparison. Bateman, 79 F.3d 1543-46. For the abstraction step, the Court “break[s] down the allegedly infringed program into its constituent structural parts.” Id. at 1544 (quoting Computer Assocs. Int’l v. Altai, Inc., 982 F.2d 693, 706 (2d Cir. 1992)) (bracket in original). For the filtration step, the Court extracts the unprotectable portions of the
copyrighted work. “It is at this step that the structural components at each level of abstraction are examined ‘to determine whether their particular inclusion at that level was ‘idea’ or was dictated by considerations of efficiency, so as to be necessarily incidental to that idea; required by factors external to the program itself; or taken from the public domain and hence is nonprotectable expression.’” Bateman, 79 F.3d at 1544 (citing Altai, 982 F.2d at 707) (cleaned up).
At the filtration step, the defendant bears the burden of proving unprotectability; he must identify “the species of unprotectability that he is alleging and [must] present supporting evidence where appropriate.” Compulife I at 1306. The plaintiff then faces “the manageable task of responding to the appropriately narrowed issue.” Id. (cleaned up). “That is not to say that the defendant must always introduce evidence in order to enable the district court to filter. The defendant may sometimes
6 be able to demonstrate by argument alone that an element of a copyrighted work is unprotected.” Id., n.8
As relevant here, there are two ways that the arrangement of information can be unprotected. First, it may not be sufficiently original. Compulife I, 959 F.3d at 1304. “The sine qua non of copyright is originality.” Feist, 499 U.S. at 345. “[C]opyright protection extends only to a work’s expressive elements, not to any underlying ‘idea, procedure, process, system, method of operation, concept, principle, or discovery’ expressed therein.” Compulife I at 1304 (citing 17 U.S.C. § 102). “Copyright infringement occurs only if one copies protected elements of a copyrighted
work; in other words, the portion of the copyrighted work that is copied must ‘satisfy the constitutional requirement of originality as set forth in Article I, § 8, cl. 8.’” MiTek Holdings, Inc. v. Arce Eng'g Co., 89 F.3d 1548, 1554 (11th Cir. 1996) (quoting Bateman, 79 F.3d at 1542). [O]riginality is not a stringent standard; it does not require that facts be presented in an innovative or surprising way. It is equally true, however, that the selection and arrangement of facts cannot be so mechanical or routine as to require no creativity whatsoever. The standard of originality is low, but it does exist. As this Court has explained, the Constitution mandates some minimal degree of creativity, and an author who claims infringement must prove “the existence of ... intellectual production, of thought, and conception.” Feist, 499 U.S. at 362 (internal citations omitted). For a compilation, there must be “a creatively original selection of facts” to warrant copyright protection. BUC Int'l Corp. v. Int'l Yacht Council Ltd., 489 F.3d 1129, 1141 (11th Cir. 2007) (emphasis in original). 7 Second, material may be unprotected based on the merger doctrine because there are too few ways of expressing the relevant idea. Id. And, while the selection
and arrangement of information may satisfy the originality requirement in certain circumstances, the merger doctrine precludes a finding of originality where there are “so few ways of expressing an idea.” Id. at 1143. For the comparison step, the Court compares any remaining (i.e., unfiltered) protectable material to the allegedly infringing work. Where, as here, the copied materials are literal elements of the computer program, the plaintiff has the burden of showing that the two works are “substantially similar.”1 Compulife I at 1302.
Substantial similarity has both qualitative and quantitative components. Id. Put simply, a person can copy only a little bit of code, but if that code is qualitatively significant, there is an infringement. Id.
1 Source code is a “literal element” of a computer program. Compulife I, 959 F.3d at 1302 n.6. In contrast, nonliteral elements include “‘the products that are generated by the code’s interaction with the computer hardware and operating program(s),’ of which ‘screen displays and the main menu’ are illustrative examples.” Id. (quoting MiTek Holdings, Inc. v. Arce Eng'g Co., 89 F.3d 1548 (11th Cir. 1996)). A dialog box is a nonliteral element. 8 III. FINDINGS OF FACT2 A. User Input Form and Parameter Blocks 1. Compulife offers internet-based insurance quotes through its
Terms4Sale.com website. ECF No. 309 at 119:14-19.3 2. HTML source code defines how a web page looks to the user. ECF No. 309 at 130:6-12. 3. Chris Bruner wrote the HTML source code for the Terms4Sale.com website by himself. He did not copy any parts of it from anyone else. ECF No. 309 at 120:9-13. 4. Compulife’s HTML source code displayed the following dialog box — a
PX 550 (recited as 505 (ECF No. 304-29 at 9).4 5. The dialog box was used to “gather[] information from the end user to skip parameters for the [search] engine, things like their age, their sex, smoking status, their health, and various other things.” ECF No. 309 at 121:9-17. 6. The HTML source code then sent the collected information to the search engine, which generated a template showing the user the price quote. Jd. at 121:14- 17. 7. Within the HTML environment, the dialog box was a table with multiple rows. ECF No. 310 at 130-131. In HTML programming language, the tag
stands
4 “PX” refers to Plaintiff's Exhibits, which are docketed at ECF Nos. 295 and 304. Defendants’ Exhibits (“DX”) are docketed at ECF No. 298. 10
for “table row.” Id. at 131. It starts a new row in the table. The end of each row was coded with the tag
. ECF No. 311 at 70:9-11.
8. The HTML source code included mandatory programming commands necessary to generate the form. ECF Nos. 310 at 145:15-146:8; 311 at 4-6. 9. The Compulife HTML source code also included comments, which are non-functional portions of the program.5 Each comment began with the “” tag. https://web.mit.edu/thecity/resources/html cheat.html (last visited Dec. 12, 2024). For example, beginning on the first page of PX 542 (ECF No. 295-58), the program contains a block of code beginning with “.” PX 542 at 1-2. Similarly, before the code block for the NewCategory parameter, there is a commented discussion about how that parameter works, including how to allow the user to select multiple categories. Id. at 7.
10. The table could be formatted using tags such as
and
. ECF No. 310 at 8:15-19; 131. The
tag indicates the beginning of a data element. ECF No. 311 at 70:3-5.
5 One Court described comments as “non-executable appendages to lines of executable code.” Tradescape.com v. Shivaram, 77 F. Supp. 2d 408, 418 (S.D.N.Y. 1999).
11 11. Some rows were a static title that was visible to the user, such as “State,” “Birthdate,” and “Gender.”
12. Some rows were designed to obtain information from the user through either a dropdown menu or radio button. The information selected by the user was assigned to a variable.6 13. It might be necessary to have multiple lines of HTML code to generate a visible row in the table. For example, multiple lines of HTML code were needed for each dropdown menu and radio button. 14. A radio button could be added to a row using the
command. Each radio button had a unique value that, when selected, was assigned to a corresponding variable. For example, the following two lines of HTML code created the radio buttons for whether the user was a smoker: Yes No
See PX 542 at 6.7 Depending on the user’s selection, the parameter “Smoker” was assigned either the value “Y” (for “yes”) or “N” (for “no”). ECF No. 309 at 149:19-150:3. 15. To include a dropdown menu in a row, the “
6 I use the terms “variable” and “parameter” as synonyms in this Order. 7 Mr. Bruner testified that “ ” was a formatting code for “non-breaking space.” ECF No. 309 at 146:21-22. 12 selection was assigned to the parameter associated with the “
56 items. Whichever item the user picked assigned a unique value to the parameter “State” based on the command
set of
and
tags). For example, the parameter block for the “State” variable comprises approximately 62 lines of HTML code. See PX 542 (ECF No. 295-58) at 2- 3; PX 149 (ECF No. 295-21) at lines 514-571. The parameter block for the “Sex” variable is seven lines long. PX 542 at 6; PX 149 at lines 735-741. 18. The user-defined variables BirthMonth, Birthday, and BirthYear are all generated by the same row bounded by
and
, so they are part of a single
parameter block of over 160 lines of code. PX 149 (ECF No. 295-21) at lines 572-734.
8 The Compulife HTML source code has a non-functional comment (beginning with ) containing a block of code that would have generated the variable “CompRating.” PX 542 at 9. It has a different non-functional comment containing HTML code that would generate a row titled “Payment Option” with a dropdown menu for the variable ModeUsed. PX-542 at 8. Defendants did not copy either of these commented parameter blocks. 13 19. The Compulife HTML source code also contained two variables: ModeUsed and SortOverride1, which had fixed, preset values that could not be
changed by the user. PX 149 at lines 507-08; PX 542 at 8; ECF No. 309 at 181:12-17. 20. The ModeUsed and SortOverride1 variables did not require user input, so they were not assigned to a row in the table (that is, they are not within a code block bounded by
and
tags). Nevertheless, I will treat them each as a parameter block because Compulife argues they are a constituent component of the HTML source code. Compulife Appellate Brief, 2022 WL 13821778 at *10-11. 21. The Compulife HTML source code had the following nine (9) sequential
parameter blocks (PX 542): Row Title Selection Options Underlying Variable(s) State Dropdown list of state State abbreviations Birthdate Dropdown list of months BirthMonth Dropdown list of 1-31 Birthday Dropdown list of years BirthYear Gender Radio Button: male or Sex female Smoker/Tobacco Radio Button: yes or no Smoker Health Class Dropdown list of health Health categories Type of Insurance Dropdown list of NewCategory different terms and kinds of insurance coverage Not assigned to a row None ModeUsed Not assigned to a row None SortOverride1 Face Amount Dropdown list of amount FaceAmount of coverage requested 14 22. The relevant portion of Defendants’ HTML code contained the following nine (9) sequential parameter blocks (PX 149):
Row Title Selection Options Underlying Code Lines Variable(s) Not assigned to a None ModeUsed 507 row Not assigned to a None SortOverride1 508 row State Dropdown list of state State 514-571 abbreviations Birthdate Dropdown list of months BirthMonth 572-588 Dropdown list of 1-31 Birthday 590-623 Dropdown list of years BirthYear 625-734 Gender Radio Button: male or Sex 735-740 female Smoker? Radio Button: yes or no Smoker 741-746 Health Class Dropdown list of health Health 747-758 categories Type of Dropdown list of different NewCategory 758-793 Insurance terms and kinds of insurance coverage Face Amount Dropdown list of amount FaceAmount 794-836 of coverage requested
23. The dialog box also included a button where the user could submit the relevant information to the Compulife search engine. The Compulife HTML source code showed the user a button with the text “Compare Now.” Within the HTML code, that button was coded using and assigned a value to the parameter “CqsComparison.” 24. There are no programmer’s comments explaining why Mr. Bruner organized or arranged the blocks of code in a particular order. 15 25. Most life insurance companies and products require the same input parameters that Compulife used. ECF No. 309 at 28:18-25.
26. All of the variables were independent. That is, the value selected for one variable did not affect the value of any other variable. 27. The Compulife HTML source code did not analyze or process the variables. ECF No. 309 at 122:10. B. Quote Generating Process 28. Once the user clicked the “Compare Now” button, the HTML source code sent the user’s information to the internet search engine using the