10.07.2015 Views

ALI-ABA Topical Courses Trade Secrets From the ... - ALI CLE

ALI-ABA Topical Courses Trade Secrets From the ... - ALI CLE

ALI-ABA Topical Courses Trade Secrets From the ... - ALI CLE

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

47<strong>ALI</strong>-<strong>ABA</strong> <strong>Topical</strong> <strong>Courses</strong><strong>Trade</strong> <strong>Secrets</strong> <strong>From</strong> <strong>the</strong> Employment Lawyer'sPoint of ViewMarch 28, 2012Telephone Seminar/Audio WebcastCases for <strong>Trade</strong> <strong>Secrets</strong> from <strong>the</strong> Employment LawyerBya. Bimbo Bakeries USA, Inc. v. Chris Botticella, No. 10-1510, United States Court ofAppeals for <strong>the</strong> Third Circuitb. Eagle v. Sandi Morgan, et al., Civil Action No. 11-4303, United States DistrictCourt for <strong>the</strong> Eastern District of Pennsylvaniac. Maremont v. Susan Fredman Design Group, Case No. 10 C 7811, United StatesDistrict Court Nor<strong>the</strong>rn District of Illinois Eastern Divisiond. Phonedog v. Noah Kravitz, No. C 11-03474 MEJ, United States District CourtNor<strong>the</strong>rn District of Californiae. Pure Power Boot Camp, v. Warrior Fitness Boot Camp, No. 08 Civ. 4810, UnitedStates District Court, Sou<strong>the</strong>rn District of New Yorkf. Faiveley Transport Malmo AB v. Wabtec Corporation, No. 08-5126-cv, UnitedStates Court of Appeals for <strong>the</strong> Second Circuitg. Sasqua Group, Inc. v. Courtney, No. CV 10-528, United States District Court,Eastern District of New York


48PRECEDENTIALUNITED STATES COURT OF APPEALSFOR THE THIRD CIRCUITNo. 10-1510BIMBO BAKERIES USA, INC.v.CHRIS BOTTICELLA,AppellantOn Appeal from <strong>the</strong> United States District Courtfor <strong>the</strong> Eastern District of Pennsylvania(D.C. Civil No. 2-10-cv-00194)Honorable R. Barclay Surrick, District JudgeArgued June 3, 2010BEFORE: SMITH, FISHER, andGREENBERG, Circuit Judges(Filed: July 27, 2010)


49Michael L. Banks (argued)Morgan, Lewis & Bockius LLP1701 Market StreetPhiladelphia, PA 19103Attorney for AppelleeElizabeth K. AinslieJoseph Anclien (argued)Schnader Harrison Segal & Lewis LLP1600 Market StreetPhiladelphia, PA 19103Attorneys for AppellantOPINION OF THE COURTGREENBERG, Circuit Judge,I. INTRODUCTIONThis matter comes on before this Court on aninterlocutory appeal from an order of <strong>the</strong> District Court datedFebruary 9, 2010, and entered on February 12, 2010, grantingappellee’s motion for a preliminary injunction. BimboBakeries USA, Inc. v. Botticella, No. 10-0194, 2010 WL2


50571774 (E.D. Pa. Feb. 9, 2010). The issue on appeal iswhe<strong>the</strong>r <strong>the</strong> District Court erred in enjoining appellant ChrisBotticella, formerly a senior executive at appellee BimboBakeries USA, Inc. (“Bimbo”), from working for one ofBimbo’s competitors until after <strong>the</strong> Court resolved <strong>the</strong> meritsof Bimbo’s misappropriation of trade secrets claim againstBotticella. The Court intended that <strong>the</strong> preliminary injunctionwould last for about two months until <strong>the</strong> trial but, because ofthis appeal and a stay of <strong>the</strong> District Court proceedingsfollowing <strong>the</strong> filing of this appeal, <strong>the</strong> preliminary injunctionhas remained in effect. For <strong>the</strong> reasons we set forth below,we will affirm <strong>the</strong> order of <strong>the</strong> District Court.II. BACKGROUNDA. Botticella’s Employment at BimboBimbo, a Delaware corporation with its principal placeof business in Pennsylvania, is one of <strong>the</strong> four largestcompanies in <strong>the</strong> United States baking industry. Bimbo andits affiliates produce and distribute baked goods throughout<strong>the</strong> country under a number of popular brand names includingThomas’, Entenmann’s, Arnold, Oroweat, Mrs. Baird’s,Stroehmann, and Boboli. Botticella, a California resident,who already had experience in <strong>the</strong> baking industry, beganworking for Bimbo in 2001 and was, until January 13, 2010,its Vice President of Operations for California. In thatposition in which Botticella earned an annual salary of$250,000, he was directly responsible for five productionfacilities and oversaw a variety of areas including product3


51quality and cost, labor issues, and new product development.In addition Botticella worked closely with Bimbo’s sales staffon sales promotion and capacity planning, and also wasresponsible for overseeing <strong>the</strong> operations of “co-packers” inhis region, i.e., third-party manufacturers under contract withBimbo.As one of Bimbo’s senior executives, Botticella hadaccess to and acquired a broad range of confidentialinformation about Bimbo, its products, and its businessstrategy. For example, he was one of a select group ofindividuals with access to <strong>the</strong> code books containing <strong>the</strong>formulas and process parameters for all of Bimbo’s products.He also regularly attended high-level meetings with o<strong>the</strong>r topBimbo executives to discuss <strong>the</strong> company’s national businessstrategy. Significantly, as Bimbo repeatedly has notedthroughout <strong>the</strong>se proceedings, Botticella was one of onlyseven people who possessed all of <strong>the</strong> knowledge necessary toreplicate independently Bimbo’s popular line of Thomas’English Muffins, including <strong>the</strong> secret behind <strong>the</strong> muffins’unique “nooks and crannies” texture. Thomas’ EnglishMuffins is <strong>the</strong> source of approximately half a billion dollarsworth of Bimbo’s annual sales income.While employed at Bimbo, Botticella signed a“Confidentiality, Non-Solicitation and Invention AssignmentAgreement” with Bimbo on March 13, 2009, in which heagreed not to compete directly with Bimbo during <strong>the</strong> term ofhis employment, not to use or disclose any of Bimbo’sconfidential or proprietary information during or after <strong>the</strong>term of his employment with Bimbo, and, upon ceasingemployment by Bimbo, to return every document he received4


52from Bimbo during <strong>the</strong> term of his employment. App. at 214-18. The agreement, however, did not include a covenantrestricting where Botticella could work after <strong>the</strong> terminationof his employment with Bimbo. The agreement contained achoice of law provision providing that Pennsylvania lawwould govern any dispute arising from <strong>the</strong> agreement.Moreover, <strong>the</strong> agreement provided that certain state andfederal courts in Pennsylvania would have jurisdiction overlitigation arising from <strong>the</strong> agreement and over <strong>the</strong> parties tothat litigation. Thus, although this litigation seems onlymarginally related to Pennsylvania, Bimbo filed it in <strong>the</strong>United States District Court for <strong>the</strong> Eastern District ofPennsylvania, which has exercised jurisdiction.B. The Hostess Job OfferOn September 28, 2009, one of Bimbo’s primarycompetitors in <strong>the</strong> baking industry—Interstates BrandCorporation, which later changed its name to Hostess Brands,Inc. (collectively, “Hostess”)—offered Botticella a position inTexas as Vice President of Bakery Operations for its easternregion. The proposed position carried a base salary of$200,000, along with various stock option and bonusopportunities. On October 15, 2009, Botticella accepted <strong>the</strong>Hostess position and agreed to begin in January 2010.Botticella did not disclose his plans to Bimbo for severalmonths, and he <strong>the</strong>refore continued to be engaged fully in hiswork at Bimbo and to have full access to Bimbo’sconfidential and proprietary information even after heaccepted <strong>the</strong> Hostess position. Botticella maintains that he5


53continued working for Bimbo notwithstanding his acceptanceof <strong>the</strong> Hostess position in order to receive his 2009 year-endbonus and to complete two Bimbo projects for which he hadresponsibility.After Botticella accepted <strong>the</strong> Hostess offer and whileBimbo still employed him, Hostess directed him to execute an“Acknowledgment and Representation Form,” whichessentially indicated that Hostess was not interested in anyconfidential information, trade secrets, or o<strong>the</strong>r proprietaryinformation that Botticella had acquired from Bimbo, and thatBotticella would not disclose such information to Hostess. 11The agreement stated:I acknowledge that [Hostess] has advisedme that it is not interested in, nor does it want,any confidential information or trade secrets oro<strong>the</strong>r proprietary information that I may haveacquired through any prior employment orbusiness relationship, including without limitationany information or ‘know-how’ related to <strong>the</strong>manufacturing of Thomas brand products. Ifur<strong>the</strong>r acknowledge that I have not previously,and will not in <strong>the</strong> future, disclose to Hostess anyconfidential or proprietary information belongingto any previous employer. Specifically, Iacknowledge that Hostess has instructed me not todisclose to it or to use in <strong>the</strong> course of any job forit that I may be [sic] have at any time, anyconfidential or proprietary information belonging6


54App. at 272. Botticella signed <strong>the</strong> form on December 7, 2009.Botticella informed his supervisor at Bimbo on January4, 2010, that he was planning to leave Bimbo on January 15. 2But Botticella did not at that time indicate that he was leavingApp. at 272.to any previous employer. I represent that I haveand will not bring to Hostess’[s] work place, usefor <strong>the</strong> benefit of, or in any way share withHostess any confidential or proprietaryinformation belonging to any previous employer.I represent that I am not a party to anycurrently effective employment contract, covenantnot to compete or o<strong>the</strong>r agreement that couldpotentially have any bearing on my ability toaccept employment with Hostess, and thatHostess has instructed me that I am not to performany action, directly or indirectly, in <strong>the</strong> course ofany duties or responsibilities that I may have atany time for it, that would violate <strong>the</strong> terms of anycurrently effective contract to which I am a party.2Botticella asserts that he testified in his deposition that headvised “his boss” at Bimbo in early December of 2009 “that hewould be leaving” Bimbo. Appellant’s br. at 8 n.1. But heindicates that this testimony was not introduced at <strong>the</strong> hearingon <strong>the</strong> preliminary injunction. He does not claim, however, thatat that time he advised Bimbo that he was joining Hostess.7


55to work for a competitor. Moreover, <strong>the</strong>re is no indication in<strong>the</strong> record that Bimbo asked him about his future employmentplans. On January 12, Hostess announced that its VicePresident of Bakery Operations for <strong>the</strong> eastern region wasretiring and that Botticella would be replacing him, effectiveJanuary 18. Bimbo personnel learned of <strong>the</strong> announcementand <strong>the</strong> next day, January 13, <strong>the</strong> company’s Vice Presidentfor Human Relations requested that Botticella contact him.Botticella did so at approximately 10:00 a.m. PST and in <strong>the</strong>course of <strong>the</strong> ensuing telephone conversation disclosed hisintention to work for Hostess. Bimbo directed Botticella tovacate its offices that day. 3C. Botticella’s Use of Confidential InformationFollowing <strong>the</strong> Hostess OfferIn <strong>the</strong> period between when Botticella accepted <strong>the</strong>Hostess offer on October 15, 2009, and when he ceasedworking for Bimbo on January 13, 2010, he continued to haveall <strong>the</strong> access to Bimbo’s confidential and proprietaryinformation befitting a trusted senior executive. For instance,Botticella attended a meeting with Bimbo’s president ando<strong>the</strong>r Bimbo officers in December 2009 at which <strong>the</strong>participants discussed confidential information regarding <strong>the</strong>3Because Botticella had accrued eleven weeks of vacation timewith Bimbo, he remained on <strong>the</strong> company’s payroll throughout<strong>the</strong> District Court proceedings. Botticella’s present employmentstatus is not apparent from <strong>the</strong> record.8


56company’s strategic plan for California. Botticella concedesthat if he had disclosed his intention to work for Hostess,Bimbo would have restricted his access to this and o<strong>the</strong>r typesof information. Indeed, Botticella maintains that he no longerfelt “comfortable” being privy to Bimbo’s confidentialinformation following his acceptance of <strong>the</strong> Hostess offer andthat, accordingly, when he received emails and electronicdocuments containing confidential information, he deleted<strong>the</strong>m, and that when he was exposed to confidentialinformation during presentations at meetings, he “blocked it”4out of his head. App. at 195, 197.In one instance over <strong>the</strong> Christmas holiday, Botticelladeleted a number of documents from his company-issuedlaptop computer. These documents included both items of apersonal nature, such as his resume, and a number of workrelateddocuments containing confidential information.Botticella claimed that he deleted <strong>the</strong>se documents because he“didn’t think th[ey] would [have] any value to anybody.”App. at 198. Never<strong>the</strong>less, when Botticella returned to hisoffice at Bimbo on January 4, 2010, he asked a computertechnician to restore <strong>the</strong> files because “he wanted to have<strong>the</strong>m back just in case for <strong>the</strong> next weeks we needed to have ameeting or something.” App. at 198. Bimbo’s technician<strong>the</strong>n restored <strong>the</strong> files to <strong>the</strong> computer.4We are quite uncertain as to how an individual can block outinformation from his head for a human mind does not functionlike a computer from which, through an electronic process,materials may be deleted.9


57Following Botticella’s departure, Bimbo hired E. BrianHarris, a computer forensics expert, to investigate Botticella’suse of his company laptop during December 2009 andJanuary 2010. Harris’s testing revealed that a user whologged in as Botticella had accessed a number of confidentialdocuments during <strong>the</strong> final weeks of Botticella’s employmentat Bimbo. In particular, <strong>the</strong> testing revealed that <strong>the</strong> personlogging in as Botticella had accessed twelve files within aspan of thirteen seconds on January 13, 2010, Botticella’s last5day at Bimbo. Significantly this access occurred minutesafter <strong>the</strong> phone call in which Botticella finally disclosed toBimbo his plans to work for Hostess and Bimbo told him tocease working for it.There were several similar patterns of access in <strong>the</strong>weeks leading up to January 13. According to Harris, thistype of activity—multiple files being accessed more or lesssimultaneously—was “inconsistent with an ordinary usagewhereby individual files are opened and ei<strong>the</strong>r read or edited.”App. at 238. Harris concluded that <strong>the</strong> activity was, however,consistent with copying a group of files at <strong>the</strong> same time, bu<strong>the</strong> could not determine conclusively whe<strong>the</strong>r <strong>the</strong> filesBotticella had accessed had been copied and deleted or nevercopied at all. App. at 238. The testing also revealed thatthree external storage devices—a portable device known as a“thumb” or “flash” drive and two external hard drives—had atone time or ano<strong>the</strong>r been connected to Botticella’s computer,although it was unclear exactly when <strong>the</strong>se devices had been5Botticella does not deny that he was <strong>the</strong> person logging in underhis name.10


58used. Bimbo located <strong>the</strong> thumb drive and one of <strong>the</strong> harddrives but Harris could not determine conclusively whe<strong>the</strong>r ornot any files had been copied onto <strong>the</strong> devices fromBotticella’s computer. Harris was not provided with <strong>the</strong>second external hard drive. According to Bimbo, that device“is unaccounted for.” Appellee’s br. at 11.A number of <strong>the</strong> files accessed from Botticella’s laptopduring his final days at Bimbo were highly sensitive and <strong>the</strong>irpossession by a competitor would have been damaging toBimbo. As described by <strong>the</strong> District Court, <strong>the</strong>se documentsinclude “Bimbo’s cost-reduction strategies, product launchdates, anticipated plant and line closures, labor contractinformation, production strengths and weaknesses of manyBimbo bakeries, and <strong>the</strong> cost structure for individual productsby brand.” Bimbo Bakeries, 2010 WL 571774, at *7. Therewere, however, more mundane documents such as apresentation titled “Safety Short - Wet Floors” included in<strong>the</strong>se groups of files. App. at 237. In his video-tapeddeposition, portions of which were presented at <strong>the</strong>preliminary injunction hearing, Botticella admitted to copyingfiles periodically from his laptop to external devices duringhis final weeks at Bimbo, but maintained that he had done soonly to practice his computer skills in preparation for his newposition at Hostess. Despite an earlier denial, he eventuallyadmitted to conducting such “practice” exercises in January2010. The District Court found that Botticella’s explanationof his use of <strong>the</strong> laptop computer and <strong>the</strong> external devices was“confusing at best” and “not credible.” Bimbo Bakeries, 2010WL 571774, at *6.11


59D. Procedural HistoryAfter Botticella left Bimbo and joined Hostess, Bimbobrought this action seeking to protect its trade secrets and <strong>the</strong>npromptly moved for preliminary injunctive relief. TheDistrict Court held a hearing on Bimbo’s motion at whichBimbo presented portions of Botticella’s video tapeddeposition as well as live testimony from Harris and DanielBabin, one of Bimbo’s senior executives. Botticella’s counselcross-examined Bimbo’s witnesses but did not present anyevidence on Botticella’s behalf. The District Court grantedBimbo’s motion and preliminarily enjoined Botticella fromcommencing employment with Hostess and from divulging toHostess any confidential or proprietary information belongingto Bimbo. The Court fur<strong>the</strong>r ordered Botticella to return toBimbo any of <strong>the</strong> company’s confidential or proprietaryinformation in his possession. The Court issued <strong>the</strong>preliminary injunction on February 9, 2010, and provided thatit was to remain in effect until a determination on <strong>the</strong> meritsof <strong>the</strong> controversy at a trial, which <strong>the</strong> Court scheduled tobegin on April 12, 2010. Never<strong>the</strong>less, notwithstanding <strong>the</strong>early trial date, Botticella appealed from <strong>the</strong> February 9, 2010order to this Court on February 16, 2010. The case remainsuntried and pending in <strong>the</strong> District Court as that Court onMarch 5, 2010, after a conference with <strong>the</strong> attorneys,postponed <strong>the</strong> trial and stayed all proceedings until its fur<strong>the</strong>rorder. We have expedited our consideration of this appeal.III. JURISDICTION AND STANDARD OF REVIEW12


60The District Court had jurisdiction over this diversity6of citizenship action pursuant to 28 U.S.C. § 1332(a). Weexercise jurisdiction over Botticella’s interlocutory appealpursuant to 28 U.S.C. § 1292(a)(1). When reviewing adistrict court’s grant of a preliminary injunction, we review<strong>the</strong> court’s findings of fact for clear error, its conclusions oflaw de novo, and <strong>the</strong> ultimate decision granting <strong>the</strong>preliminary injunction for an abuse of discretion. Miller v.Mitchell, 598 F.3d 139, 145 (3d Cir. 2010) (citing McTernanv. City of York, 577 F.3d 521, 526 (3d Cir. 2009)).IV. DISCUSSIONIn determining whe<strong>the</strong>r to grant a preliminaryinjunction, a court must consider whe<strong>the</strong>r <strong>the</strong> party seeking<strong>the</strong> injunction has satisfied four factors: “(1) a likelihood ofsuccess on <strong>the</strong> merits; (2) he or she will suffer irreparableharm if <strong>the</strong> injunction is denied; (3) granting relief will notresult in even greater harm to <strong>the</strong> nonmoving party; and (4)<strong>the</strong> public interest favors such relief.” Miller, 598 F.3d at 147(citing Child Evangelism Fellowship of New Jersey Inc. v.Stafford Twp. Sch. Dist., 386 F.3d 514, 524 (3d Cir. 2004)).We turn first to <strong>the</strong> question of whe<strong>the</strong>r Bimbo hasdemonstrated a likelihood of success on <strong>the</strong> merits, an inquirythat was <strong>the</strong> primary focus of <strong>the</strong> District Court, and,6Bimbo is a citizen of Delaware and Pennsylvania and Botticellais a citizen of California.13


61consequently, also is <strong>the</strong> primary focus of <strong>the</strong> parties on thisappeal.A. Likelihood of Success on <strong>the</strong> MeritsThe District Court found that Bimbo was likely toprevail on <strong>the</strong> merits of its misappropriation of trade secretsclaim. Under <strong>the</strong> Pennsylvania Uniform <strong>Trade</strong> <strong>Secrets</strong> Act(“PUTSA”), which is applicable in this case, a trade secret isdefined as:Information, including a formula, drawing,pattern, compilation including a customer list,program, device, method, technique or processthat:(1) Derives independent economic value,actual or potential, from not beinggenerally known to, and not beingreadily ascertainable by proper means by,o<strong>the</strong>r persons who can obtain economicvalue from its disclosure or use.(2) Is <strong>the</strong> subject of efforts that arereasonable under <strong>the</strong> circumstances tomaintain its secrecy.14


6212 Pa. Cons. Stat. Ann. § 5302 (West 2004); see also Rohmand Haas Co. v. Lin, 992 A.2d 132, 143 n.4 (Pa. Super. Ct.2010) (“A trade secret may consist of any formula, pattern,device or compilation of information which is used in one’sbusiness, and which gives him an opportunity to obtain anadvantage over competitors who do not know or use it.”)(internal citation omitted). The Pennsylvania courts look to<strong>the</strong> following factors to determine whe<strong>the</strong>r information isprotected as a trade secret: (1) <strong>the</strong> extent to which <strong>the</strong>information is known outside of <strong>the</strong> company’s business; (2)<strong>the</strong> extent to which <strong>the</strong> information is known by employeesand o<strong>the</strong>rs involved in <strong>the</strong> company’s business; (3) <strong>the</strong> extentof <strong>the</strong> measures taken by <strong>the</strong> company to guard <strong>the</strong> secrecy of<strong>the</strong> information; (4) <strong>the</strong> value of <strong>the</strong> information to <strong>the</strong>company and its competitors; (5) <strong>the</strong> amount of effort ormoney <strong>the</strong> company spent in developing <strong>the</strong> information; and(6) <strong>the</strong> ease or difficulty with which <strong>the</strong> information could be7acquired or duplicated legitimately by o<strong>the</strong>rs. Crum v.Bridgestone/Firestone North American Tire, LLC, 907 A.2d578, 585 (Pa. Super. Ct. 2006).Applying <strong>the</strong>se standards, <strong>the</strong> District Courtdetermined that during Botticella’s employment at Bimbo, hehad access to and acquired a number of Bimbo’s trade secrets,including:7“The PUTSA displaced Pennsylvania’s common law tort formisappropriation of trade secrets, but <strong>the</strong>re is no indication that<strong>the</strong> statute effected a substantive shift in <strong>the</strong> definition of ‘tradesecret.’” Youtie v. Macy’s Retail Holding, Inc., 626 F. Supp. 2d511, 522 n.10 (E.D. Pa. 2009).15


63a. Information in Bimbo’s code books, as wellas and including formulas and designs forThomas’ English Muffins, Oroweat brandproducts, Sandwich Thins products, and o<strong>the</strong>rBimbo products.b. Bimbo’s strategy for increasing profitability,embodied in a road map in January of 2009,which included line closures, plant closures,n e w proc e ss imp rovem e n ts, formu laoptimizations, and new product launches, andwhich achieved cost savings of $75 million over<strong>the</strong> course of a year.c. Knowledge of how Bimbo produces bread‘from scratch’ instead of using pre-mixedingredients.d. Documents copied by [Botticella] from hiswork computer onto an external storage devicewith no credible explanation. . . .e. Bimbo’s promotional strategies with respectto specific customers.f. Bimbo’s cost positions.g. Identities of Bimbo’s customers targeted forupcoming bids.Bimbo Bakeries, 2010 WL 571774, at *10. The DistrictCourt <strong>the</strong>n determined that Bimbo likely would be able to16


64prove at trial that Botticella would misappropriate <strong>the</strong>se tradesecrets if allowed to work at Hostess.A person has misappropriated a trade secret underPennsylvania law when he acquires knowledge of ano<strong>the</strong>r’strade secret in circumstances giving rise to a duty to maintainits confidentiality and <strong>the</strong>n discloses or uses that trade secretwithout <strong>the</strong> o<strong>the</strong>r’s consent. 12 Pa. Cons. Stat. Ann. § 5302(West 2004). A court may enjoin <strong>the</strong> actual or threatenedmisappropriation of a trade secret. Id. § 5303(a). Afterdetermining that Bimbo was seeking an injunction on <strong>the</strong>basis of threatened misappropriation, <strong>the</strong> District Court found<strong>the</strong>re was “a substantial likelihood, if not an inevitability, that[Botticella] will disclose or use Bimbo’s trade secrets in <strong>the</strong>course of his employment with Hostess.” Bimbo Bakeries,2010 WL 571775, at **11-14. Accordingly, <strong>the</strong> Courtconcluded that Bimbo had demonstrated a likelihood ofsucceeding on <strong>the</strong> merits of its claim.Botticella contends this conclusion was wrong as amatter of law because (a) a court only can enjoin a defendantfrom beginning a new job to protect a former employer’stechnical trade secrets, (b) such an injunction only can issuewhere it would be “virtually impossible” for <strong>the</strong> defendant toperform his new job without disclosing trade secrets, (c)Bimbo did not present any evidence from which <strong>the</strong> DistrictCourt could conclude that Botticella’s responsibilities atHostess would lead him to disclose Bimbo’s trade secrets, and(d) <strong>the</strong> District Court drew impermissible adverse inferencesagainst Botticella in a way that effectively shifted <strong>the</strong> burdenof proof from Bimbo to Botticella.17


651. Air Products and Inevitable DisclosureThe parties disagree about <strong>the</strong> circumstances that mustbe found to exist before a court can enjoin a defendant frombeginning new employment. In its opinion granting <strong>the</strong>preliminary injunction, <strong>the</strong> District Court stated:When analyzing threatened misappropriation oftrade secrets, Pennsylvania courts apply <strong>the</strong>‘inevitable disclosure doctrine.’ That doctrineessentially posits that ‘a person may be enjoinedfrom engaging in employment or certain aspectsof his employment where that employment islikely to result in <strong>the</strong> disclosure of information,held secret by a former employer, of which <strong>the</strong>employee gained knowledge as a result of hisformer employment situation.[’] The scope of<strong>the</strong> injunctive relief depends on <strong>the</strong> particularcircumstances of <strong>the</strong> case.Bimbo Bakeries, 2010 WL 571774, at *11 (citing VictaulicCo. v. Tieman, 499 F.3d 227, 234 (3d Cir. 2007) (omittingcitations); Air Prods. & Chems., Inc. v. Johnson, 442 A.2d1114, 1120 (Pa. Super. Ct. 1982)). In o<strong>the</strong>r words, <strong>the</strong>District Court concluded, albeit somewhat paradoxically, thatPennsylvania courts apply <strong>the</strong> “inevitable disclosure doctrine”to grant injunctions based not on a trade secret’s inevitabledisclosure but on its likely disclosure. Cf. Pepsico, Inc. v.Redmond, 54 F.3d 1262, 1269 (7th Cir. 1995) (“[a] plaintiffmay prove a claim of trade secret misappropriation by18


66demonstrating that defendant’s new employment willinevitably lead him to rely on <strong>the</strong> plaintiff’s trade secrets.”)(emphasis added). While we agree with <strong>the</strong> District Courtthat Pennsylvania law empowers a court to enjoin <strong>the</strong>threatened disclosure of trade secrets without requiring aplaintiff to show that disclosure is inevitable, we do notconsider that an injunction granted absent such a showing wasissued pursuant to <strong>the</strong> “inevitable disclosure doctrine.”The leading Pennsylvania decision to discuss <strong>the</strong>inevitability of trade secret disclosure is Air Products &8Chemicals, Inc. v. Johnson. In that case Air Products, amanufacturer and distributor of industrial gas, sought an orderenjoining Johnson, one of its former employees who primarilywas responsible for selling on-site gas, from working in <strong>the</strong>on-site gas division of a competitor, Liquid Air, that lagged9behind Air Products in <strong>the</strong> on-site gas market. 442 A.2d at1116-18. The trial court determined that Johnson, who had anengineering background, had acquired a number of technicaland commercial trade secrets relevant to <strong>the</strong> operation and8While courts across <strong>the</strong> country have considered <strong>the</strong>applicability and scope of <strong>the</strong> inevitable disclosure doctrine, seegenerally Brandy L. Treadway, An Overview of IndividualStates’ Application of Inevitable Disclosure: Concrete Doctrineor Equitable Tool?, 55 SMU L. Rev. 621, 626-49 (2002), ourfocus in this diversity action is on <strong>the</strong> decisions of <strong>the</strong>Pennsylvania courts.9“‘On-site’ gas serves large industrial customers. Gas is pipedto <strong>the</strong> customer.” Air Prods., 442 A.2d at 1116.19


67sale of on-site gas during his employment at Air Products, andthat an injunction prohibiting Johnson from working in on-sitesales at Liquid Air was necessary because “[i]t would beimpossible [for Johnson] to perform his managerial functionsin on-site work without drawing on <strong>the</strong> knowledge hepossesses of Air Product[s]’s confidential information.” Id. at1122 (quoting trial court opinion).On appeal, <strong>the</strong> Superior Court affirmed, agreeing with<strong>the</strong> trial court that Johnson possessed trade secrets belongingto Air Products that included technological innovations aswell as commercial information such as “<strong>the</strong> status ofnegotiations with customers, proposed plant configurationsand methods of delivery as well as analysis of marketopportunities.” Id. at 1121 (quoting trial court opinion). Inreaching this conclusion, <strong>the</strong> Court emphasized that “tradesecrets need not be technical in nature” to be protected underPennsylvania law. Id. at 1124 (citing Macbeth-Evans GlassCo. v. Schnelbach, 86 A. 688 (Pa. 1913)).With respect to <strong>the</strong> probability of disclosure required towarrant an injunction, <strong>the</strong> Superior Court stated at <strong>the</strong> outsetof its analysis that Pennsylvania law permits <strong>the</strong> issuance ofan injunction where a defendant’s new employment “is likelyto result in <strong>the</strong> disclosure” of a former employer’s tradesecrets. Id. at 1120 (emphasis added). The Court <strong>the</strong>ndetermined that it was reasonable for <strong>the</strong> trial court to issue aninjunction based on <strong>the</strong> inevitability that Johnson woulddisclose trade secrets, but <strong>the</strong> Superior Court explicitly chose“not [to] adopt <strong>the</strong> reasoning of <strong>the</strong> trial court or its use of <strong>the</strong>term inevitable.” Id. at 1124. Based on <strong>the</strong>se statements itseems clear that <strong>the</strong> Superior Court believed that <strong>the</strong> trial20


68court permissibly could have granted <strong>the</strong> injunction even if<strong>the</strong> disclosure of trade secrets was not inevitable.2. Protection for Non-Technical <strong>Trade</strong><strong>Secrets</strong>Botticella argues that “[w]hile confidential informationconcerning ei<strong>the</strong>r technical or commercial issues can beprotected as a trade secret, <strong>the</strong> inevitable disclosure doctrine,which prevents <strong>the</strong> defendant from taking on employment inhis chosen field, applies only to technical trade secrets.”Appellants br. at 28 (citing Iron Age Corp. v. Dvorak, 880A.2d 657, 665 (Pa. Super. Ct. 2005); Oberg Indus., Inc. v.Finney, 555 A.2d 1324, 1327 (Pa. Super. Ct. 1989)). Ourreview of <strong>the</strong> relevant decisional law leads us to rejectBotticella’s proposed distinction between technical and o<strong>the</strong>rinformation. To start with, it is clear that “trade secrets neednot be technical in nature” to be protected fully byPennsylvania law, Air Prods., 442 A.2d at 1124; see also Den-Tal-Ez, Inc. v. Siemens Capital Corp., 566 A.2d 1214, 1228(Pa. Super. Ct. 1989) (en banc) (“[T]he particular character of<strong>the</strong> information is not relevant . . . . [It] may consist ofcompilations of purely commercial information.”) (citingMorgan’s Home Equip. Corp. v. Martucci, 136 A.2d 838 (Pa.1957)). Fur<strong>the</strong>rmore, courts applying Pennsylvania law areempowered to enjoin both <strong>the</strong> actual and <strong>the</strong> threatenedmisappropriation of trade secrets. 12 Pa. Cons. Stat. Ann. §5303(a) (West 2004). An injunction against employment<strong>the</strong>refore is simply one weapon in an equity court’s arsenal toprevent <strong>the</strong> threatened misappropriation of trade secrets,21


69regardless of those secrets’ technical or non-technicalcharacter.In arguing that a court only may enjoin a defendantfrom beginning a new job to protect a former employer’stechnical trade secrets, Botticella relies primarily on twoopinions of <strong>the</strong> Pennsylvania Superior Court applying AirProducts. In Oberg Industries, Inc. v. Finney, <strong>the</strong> trial courthad enjoined <strong>the</strong> general sales manager of a company thatmanufactured carbide stamping dies from working for one ofthat company’s competitors. 555 A.2d at 1325. The courtbelieved <strong>the</strong> employee, Finney, inevitably would disclose <strong>the</strong>trade secrets of his former employer, Oberg Industries, ifallowed to work in <strong>the</strong> new position. Id. at 1326. Theinformation <strong>the</strong> trial court classified as trade secrets consistedof customer information reports, including a master customerdirectory and histories of quoted prices and completed salesfor various customers. Id. at 1325.On appeal <strong>the</strong> Superior Court did not clearly statewhe<strong>the</strong>r or not it considered this information to constitutetrade secrets under Pennsylvania law. Never<strong>the</strong>less, <strong>the</strong> Courtvacated <strong>the</strong> injunction because (1) <strong>the</strong> case did not involve arestrictive covenant, (2) <strong>the</strong>re was no evidence that Finneytook Oberg’s confidential information to use in his newposition, (3) some of <strong>the</strong> confidential reports at issue, “such as<strong>the</strong> list of customers and <strong>the</strong>ir contact persons, were sovoluminous that <strong>the</strong>y could not have been committed tomemory,” and (4) Finney’s position at Oberg and <strong>the</strong>knowledge he obtained while in that position did notdemonstrate an inevitability of disclosure comparable to thatfound in Air Products. Id. at 1327. With respect to <strong>the</strong> latter22


70point, <strong>the</strong> Court opined that <strong>the</strong> focus of Air Products was on<strong>the</strong> employee’s “engineering background and <strong>the</strong> specialknowledge he possessed relating to a method of oil recoverynot yet developed by <strong>the</strong> competitor company,” despite <strong>the</strong>circumstance that <strong>the</strong> employee, like Finney, was involved insales. Id. at 1327.In Iron Age Corp. v. Dvorak, both <strong>the</strong> trial court and<strong>the</strong> Superior Court refused to enjoin a former district salesmanager of a footwear manufacturer from using or contactingany of <strong>the</strong> company’s current or prospective customers. 880A.2d 567. The employee, Dvorak, had left <strong>the</strong> company, IronAge, to work for a competitor. Id. at 661. The SuperiorCourt affirmed <strong>the</strong> denial of <strong>the</strong> requested injunction because<strong>the</strong> trial court reasonably concluded that <strong>the</strong> information atissue—Iron Age’s customer lists—was “available tocompetitors through legitimate means and cannot be declareda trade secret.” Id. at 664. The Court went on to distinguishAir Products on <strong>the</strong> ground that:In Air Products, <strong>the</strong> employee possessedintimate knowledge of his former employer’sresearch and development data for on-site gasdelivery technologies. The employee’s newemployer was attempting to develop similartechnologies, and <strong>the</strong> employee was hired toprovide research and development data obtainedthrough his previous employment. In <strong>the</strong> instantcase, [Dvorak] possesses no such technicalknowledge, and [his] new employer already hasan extensive customer base. [Dvorak] was not23


71hired to provide information he obtainedthrough his employment with [Iron Age].Id. at 665 (citing Air Prods., 442 A.2d at 1117). The Courtalso noted that Dvorak had signed an agreement with his newemployer promising not to disclose any of Iron Age’s secrets.Id.Though some passages in Oberg and Iron Age suggestthat Pennsylvania courts will enjoin new employment morereadily when <strong>the</strong> disclosure of technical trade secrets, asdistinguished from o<strong>the</strong>r materials, is threatened, those casesdo not purport to establish an inflexible rule defining <strong>the</strong>scope of materials that can be subject to trade secretprotection, nor do <strong>the</strong>y limit <strong>the</strong> granting of injunctive reliefaffecting new employment to circumstances involvingtechnical trade secrets. Ra<strong>the</strong>r, <strong>the</strong>se opinions reach factspecificconclusions that <strong>the</strong> former employer was not entitledto injunctive relief against its departing employee barring himfrom working for a competitor. Overall, we conclude that <strong>the</strong>relevant Pennsylvania decisions, viewed as a group, suggestthat (1) a determination of whe<strong>the</strong>r to grant injunctive relief ina trade secrets case and, if so, <strong>the</strong> proper scope of <strong>the</strong> relief,depends on a highly fact-specific inquiry into <strong>the</strong> situation in<strong>the</strong> case <strong>the</strong> court is considering and (2) a court conductingthis inquiry has discretion to enjoin a defendant frombeginning new employment if <strong>the</strong> facts of <strong>the</strong> casedemonstrate a substantial threat of trade secretmisappropriation.24


72Putting aside <strong>the</strong> fact that Botticella had access to andacquired confidential information of a technical nature about<strong>the</strong> formulas and ingredients for a variety of Bimbo products,he also had access to and acquired confidential informationabout Bimbo’s long term strategies, operating costs, andcustomer negotiations. Botticella does not dispute that <strong>the</strong>setypes of information qualify as trade secrets under10Pennsylvania law. See Air Prods., 442 A.2d at 1121-22.Accordingly, <strong>the</strong> District Court had discretion to enjoinBotticella from working at Hostess to <strong>the</strong> extent this proposedemployment threatened to lead to <strong>the</strong> misappropriation of<strong>the</strong>se trade secrets.3. The District Court Applied <strong>the</strong> CorrectStandardBotticella next argues that an injunction againstemployment can issue under Pennsylvania law only when it10By contrast, in Iron Age <strong>the</strong> Superior Court found that <strong>the</strong>relevant information in that case did not even qualify as a tradesecret. 880 A.2d at 664-65. Hence, <strong>the</strong>re was no threat that <strong>the</strong>defendant’s change in employment would cause him tomisappropriate a trade secret. Likewise, <strong>the</strong> court in Oberg didnot find any threat that trade secrets would be misappropriated,although its reasoning underlying that conclusion was notparticularly clear. See 555 A.2d at 1327 (“Finney’s position in<strong>the</strong> company and <strong>the</strong> knowledge he obtained while in thatposition do not demonstrate an inevitability of disclosure as thatfound in Air Products which would require <strong>the</strong> issuance of aninjunction in this case.”).25


73would be “virtually impossible” for an employee to fulfill hisresponsibilities for a new employer without disclosing aformer employer’s trade secrets. Appellant’s br. at 23.Accordingly, Botticella contends that <strong>the</strong> District Court erredas a matter of law when it granted Bimbo an injunction on <strong>the</strong>basis that Botticella’s employment with Hostess would lead toa “sufficient likelihood or substantial threat of disclosure of atrade secret,” a lesser showing than it would have been“virtually impossible” to avoid <strong>the</strong> disclosure of trade secretsduring Botticella’s employment at Hostess. Appellant’s br. at22. Notwithstanding dictum to <strong>the</strong> contrary in one of our ownrecent opinions, see Victaulic, 499 F.3d at 234, we concludethat <strong>the</strong> District Court applied <strong>the</strong> correct standard.The trial court in Air Products enjoined <strong>the</strong> defendantfrom working in on-site gas sales at his new employerbecause it concluded it would be impossible for <strong>the</strong> defendantto work in that field without disclosing his former employer’strade secrets. 442 A.2d at 1122. On appeal <strong>the</strong> SuperiorCourt affirmed, but noted it was “not adopt[ing] <strong>the</strong> reasoningof <strong>the</strong> trial court or its use of <strong>the</strong> term inevitable.” Id. at 1124.The Superior Court subsequently has stated that “[t]he properinquiry” in determining whe<strong>the</strong>r to grant an injunction toprevent <strong>the</strong> threatened disclosure of trade secrets is “whe<strong>the</strong>r<strong>the</strong>re is sufficient likelihood, or substantial threat” of a11defendant disclosing trade secrets. Den-Tal-Ez, 566 A.2d at11While <strong>the</strong> threat of trade secret disclosure in Den-Tal-Ez arosefrom a proposed merger between two companies and not froman employee leaving one company to work for ano<strong>the</strong>r, <strong>the</strong>re isno indication that <strong>the</strong> Superior Court’s discussion of <strong>the</strong> relevant26


741232 (citing Air Prods., 442 A.2d at 1122-25; SI HandlingSys., Inc. v. Heisley, 753 F.2d 1244, 1263-64 (3d Cir. 1985));see also A.M. Skier Agency, Inc. v. Gold, 747 A.2d 936, 942(Pa. Super. Ct. 2000) (citing Den-Tal-Ez, 566 A.2d at 1232).The District Court in this case applied <strong>the</strong> standard that <strong>the</strong>Superior Court applied in Den-Tal-Ez.In arguing for a “virtual impossibility” standard,Botticella understandably relies heavily on our decision inVictaulic. In that case, Tieman, a sales representative, hadviolated a covenant not to compete with his former employerVictaulic, a mechanical device manufacturer, by working fora competitor. Victaulic, 499 F.3d at 230-31. Victaulicbrought a misappropriation of trade secrets claim in additionto asserting several claims based on <strong>the</strong> covenant not tocompete. Victaulic sought injunctive relief in <strong>the</strong> action. Id.at 231. The District Court dismissed Victaulic’s covenantclaims and requested additional briefing on <strong>the</strong> trade secretsclaim. Id. But before <strong>the</strong> trade secrets claim was resolvedVictaulic filed an interlocutory appeal, asserting that we hadjurisdiction under 28 U.S.C. §1292(a)(1) on <strong>the</strong> ground that<strong>the</strong> District Court’s dismissal of <strong>the</strong> covenant claimseffectively denied Victaulic’s request for a preliminaryinjunction. Id.In determining that we had jurisdiction to hear <strong>the</strong>appeal, we concluded that “Victaulic did not request astandard for injunctive relief in trade secrets cases, which wasgleaned from Air Products, was intended to be limited to <strong>the</strong>merger situation. See Den-Tal-Ez, 566 A.2d at 1232-33.27


75preliminary injunction on its trade secrets claim, so <strong>the</strong>District Court’s dismissal of <strong>the</strong> covenant claims left it withno means of receiving preliminary relief.” Id. at 232. We<strong>the</strong>n went on to state that “[e]ven if we believed that Victaulicrequested a preliminary injunction on its trade secrets claim,we would find jurisdiction” because any trade secretsinjunction potentially available to Victaulic necessarily wouldbe narrower than that requested on <strong>the</strong> covenant claims. Id.We stated:[S]omething like Victaulic’s requested relief(preventing Tieman from selling similarproducts for [his new employer] for a year)could fit a trade secrets claim, as it is possiblefor a court to enjoin an employee working in <strong>the</strong>relevant industry or soliciting customers forsome period of time. But such a wide-ranginginjunction is atypical; ra<strong>the</strong>r, <strong>the</strong> usualinjunction merely prevents <strong>the</strong> employee fromdisclosing specified trade secrets. . . . UnderPennsylvania law, a broader injunction only lieswhen it is ‘virtually impossible . . . [for <strong>the</strong>employee] to perform his . . . duties for [his newemployer] without in effect giving [it] <strong>the</strong>benefit of [his] confidential information.’Id. at 234 (quoting Air Prods., 442 A.2d at 1123). BecauseVictaulic “had not alleged or argued inevitable disclosure” inits trade secrets claim, we concluded that <strong>the</strong> District Courtlacked <strong>the</strong> authority to issue a broad injunction based on thatclaim. Id.28


76In light of <strong>the</strong> scope of <strong>the</strong> District Court’s injunctionin <strong>the</strong> case now on appeal before us, we acknowledge thatafter one reads Victaulic it is possible to conclude that <strong>the</strong>District Court erred by granting <strong>the</strong> injunction withoutrequiring Bimbo to show that it would be “virtuallyimpossible” for Botticella to work at Hostess withoutdisclosing Bimbo’s trade secrets. But that reading wouldleave <strong>the</strong> following questions: (1) did Victaulic correctlyinterpret Pennsylvania law, and (2) if not, are we never<strong>the</strong>lessbound by that interpretation in <strong>the</strong> present case becauseVictaulic is a precedential opinion issued by a prior panel ofthis Court?Our review of Victaulic leads us to conclude that inthat case we did not interpret Air Products in a way preciselyconsistent with Pennsylvania state precedents. The Court inAir Products took <strong>the</strong> passage that Victaulic quoted andcontaining <strong>the</strong> “virtually impossible” language directly from adecision of a United States District Court in Ohio in a caseunder Ohio law that had facts very similar to those in AirProducts. See 442 A.2d at 1123 (quoting Emery Indus., Inc.v. Cottier, 202 U.S.P.Q. 829 (S.D. Ohio 1978)). The SuperiorCourt in Air Products found <strong>the</strong> reasoning of <strong>the</strong> Emerydecision “persuasive” and held that <strong>the</strong> trial court in AirProducts acted reasonably by granting a preliminaryinjunction based on “precisely <strong>the</strong> reasoning of <strong>the</strong> court inEmery.” Id. at 1124-25. Never<strong>the</strong>less, <strong>the</strong> Superior Courtexplicitly chose “not [to] adopt <strong>the</strong> reasoning of <strong>the</strong> trialcourt.” Id. at 1125. It follows that <strong>the</strong> Superior Court alsochose not to adopt <strong>the</strong> reasoning of <strong>the</strong> Emery court, it being“precisely” <strong>the</strong> same as that of <strong>the</strong> trial court in <strong>the</strong> case onappeal before <strong>the</strong> Superior Court.29


77The Superior Court subsequently stated that <strong>the</strong>“proper inquiry” in determining whe<strong>the</strong>r to grant aninjunction to prevent <strong>the</strong> threatened disclosure of trade secretsis not whe<strong>the</strong>r a defendant inevitably will disclose a tradesecret in <strong>the</strong> absence of injunctive relief, but instead whe<strong>the</strong>r“<strong>the</strong>re is sufficient likelihood, or substantial threat, ofdefendant doing so in <strong>the</strong> future.” Den-Tal-Ez, 566 A.2d at1232 (citing Air Prods., 442 A.2d at 1122-25; SI HandlingSys.,753 F.2d at 1263-64). We <strong>the</strong>refore conclude that AirProduct’s repetition of <strong>the</strong> phrase “virtually impossible” indescribing <strong>the</strong> Emery holding should not be interpreted as astatement of Pennsylvania’s standard for granting injunctionsin trade secrets cases, our suggestion to <strong>the</strong> contrary inVictaulic notwithstanding.Inasmuch as we have concluded that Victaulicquestionably interpreted Pennsylvania law, we next mustdetermine whe<strong>the</strong>r we never<strong>the</strong>less are bound by its statementof that law. In this regard we start by recognizing that it is“<strong>the</strong> tradition of this court that <strong>the</strong> holding of a panel in aprecedential opinion is binding on subsequent panels” and12cannot be overruled absent consideration en banc. Internal12A second panel has <strong>the</strong> obligation to follow <strong>the</strong> law that a priorpanel set forth even when <strong>the</strong> prior panel decision applied statelaw unless “<strong>the</strong>re is persuasive evidence that [<strong>the</strong> law] hasundergone a change” in which case “we are not bound by ourprevious panel decision if it reflected our reliance on state lawprior to its modification.” Robinson v. Jiffy ExecutiveLimousine Co., 4 F.3d 237, 239-40 (3d Cir. 1993) (citing Smithv. Calgon Carbon Corp., 917 F.2d 1338, 1343 (3d Cir. 1990)).30


78Operating Procedure 9.1. It is also well established, however,that we are not bound by dictum in an earlier panel opinion.Abdelfattah v. Dept. of Homeland §., 488 F.3d 178, 185 (3dCir. 2007) (citing Mariana v. Fisher, 338 F.3d 189, 201 (3dCir. 2003)).We conclude that <strong>the</strong> Victaulic panel’s discussion ofAir Products and <strong>the</strong> interplay between virtual impossibilityand <strong>the</strong> inevitable disclosure doctrine was dictum and doesnot bind us in <strong>the</strong> present case. That discussion was notnecessary to <strong>the</strong> panel’s jurisdictional holding that Victaulichad failed to request a preliminary injunction on its tradesecrets claim. On <strong>the</strong> contrary, <strong>the</strong> discussion occurred onlyin <strong>the</strong> context of a counterfactual hypo<strong>the</strong>tical in which <strong>the</strong>Victaulic panel posited that, even if Victaulic had requested apreliminary injunction on its trade secrets claim, <strong>the</strong> Courtnever<strong>the</strong>less would have had jurisdiction. While werecognize that “where a decision rests on two or moregrounds, none can be relegated to <strong>the</strong> category of obiterdictum,” Philadelphia Marine <strong>Trade</strong> Ass’n -Int’lLongshoremen’s Ass’n. Pension Fund v. Comm’r, 523 F.3d140, 147 n.5 (3d Cir. 2008) (quoting Woods v. InterstateRealty Co., 337 U.S. 535, 537, 69 S.Ct. 1235, 1237 (1949)),we do not consider <strong>the</strong> Victaulic decision on jurisdiction toWe decided Victaulic in 2007, and since that time so far as weare aware <strong>the</strong>re has not been a “clear statement by <strong>the</strong>Pennsylvania Supreme Court to <strong>the</strong> contrary or o<strong>the</strong>r persuasiveevidence of a change in Pennsylvania law.” See Smith, 917F.2d at 1343 (emphasis removed). Accordingly, <strong>the</strong> holdings of<strong>the</strong> Victaulic panel bind us in <strong>the</strong> present case.31


79have rested on its interpretation of Pennsylvania’s law oftrade secrets with respect to its actual holding because with orwithout discussion of <strong>the</strong> counterfactual hypo<strong>the</strong>tical, wewould have held that we had jurisdiction. At bottom wemerely held that <strong>the</strong> District Court had denied Victaulic allpreliminary relief and thus we had jurisdiction. Accordingly,Victaulic does not prevent us from concluding that <strong>the</strong>13District Court in this case applied <strong>the</strong> correct legal standard.13Botticella fur<strong>the</strong>r argues for an “impossibility” standard bypointing to an unpublished memorandum opinion of <strong>the</strong>Pennsylvania Superior Court in Bacharach, Inc. v. Testo, Inc.,No. 1257 WDA 2001 (Pa. Super. Ct. 2000), App. at 279-301.In that case, an employer argued that <strong>the</strong> Court could issue aninjunction pursuant to Air Products based on “<strong>the</strong> mere‘likelihood’” that a trade secret might be disclosed. App. at 291.The Superior Court rejected this argument noting that in AirProducts it only had “determined that <strong>the</strong> inevitable disclosuredoctrine might be properly applied because ‘it would beimpossible for <strong>the</strong> employee to perform his duties at <strong>the</strong> newemployer without disclosing trade secrets.’” App. at 291-92(quoting Air Prods., 442 A.2d at 1124-25). Pursuant toPennsylvania Superior Court Rule 65.37, an unpublisheddecision such as Bacharach cannot be considered as precedentor cited for any purpose relevant to <strong>the</strong> present case. Thus,Bacharach’s interpretation of Air Products deserves little weightto <strong>the</strong> extent it conflicts with <strong>the</strong> Superior Court’s precedentialopinions. See A.M. Skier Agency, 747 A.2d at 942; Den-Tal-Ez, 566 A.2d at 1232. In any event, Bacharach stopped wellshort of requiring rigid adherence to <strong>the</strong> legal reasoning used by<strong>the</strong> trial court in Air Products. App. at 287 (rejecting notion that32


804. Evidence of Botticella’s Responsibilitiesat HostessBotticella next contends that <strong>the</strong> District Court erred bydetermining <strong>the</strong> probability that Botticella would disclosetrade secrets while working at Hostess without requiringBimbo to provide more detailed evidence of Botticella’santicipated responsibilities at Hostess. The record before <strong>the</strong>District Court contained little evidence in this regard apartfrom what could be inferred from Botticella’s compensationpackage at Hostess and his title as <strong>the</strong> Vice President of14Baking Operations for <strong>the</strong> eastern region. Never<strong>the</strong>less <strong>the</strong>District Court concluded that Botticella’s prospective positionat Hostess was “substantially similar” to his former position atBimbo, noting that <strong>the</strong> Hostess position was “an executivelevel position, with a salary comparable to his salary atBimbo.” Bimbo Bakeries, 2010 WL 571774, at *13. Weagree that <strong>the</strong> record supports <strong>the</strong> conclusion that in his newposition at Hostess, Botticella would have broad oversightover bakery operations, just as he had at Bimbo.Accordingly, <strong>the</strong> District Court did not abuse its discretion bypreliminarily determining that <strong>the</strong> Bimbo and Hostesspositions were substantially similar.“Air Products enshrines <strong>the</strong> ‘inevitable disclosure’ doctrine asan inviolable rule of law”).14The District Court also noted that in his position at Hostess,Botticella would report to Hostess’s Senior Vice President forBakery Operations. Bimbo Bakeries, 2010 WL 571774, at *13.33


815. Adverse Inference Based on Botticella’sFailure to TestifyThe District Court determined that Botticella’s conductfollowing his acceptance of <strong>the</strong> Hostess job offerdemonstrated his intention to use Bimbo’s trade secrets duringhis employment with Hostess. The District Court bolsteredthis determination by drawing an adverse inference fromBotticella’s failure to testify at <strong>the</strong> preliminary injunctionhearing. In so doing, <strong>the</strong> District Court relied on our decisionin SI Handling Systems, Inc. v. Heisley, where we stated thatbecause <strong>the</strong> misappropriation of a trade secret often must beproved by “construct[ing] a web of perhaps ambiguouscircumstantial evidence” that outweighs <strong>the</strong> defendants’ directdenial, <strong>the</strong> failure of defendants to testify in <strong>the</strong> face of astrong showing that a misappropriation or misuse occurred“justifies <strong>the</strong> inference that <strong>the</strong>ir testimony would beunfavorable to <strong>the</strong>ir cause.” 753 F.2d at 1261 (internalcitations omitted). On <strong>the</strong> o<strong>the</strong>r hand, Botticella contends thatan adverse inference was inappropriate because he chose notto put forward any evidence at <strong>the</strong> preliminary injunctionhearing. In support of this position he points to StoweTownship v. Standard Life Ins. Co. of Indiana, where westated that “whatever inference might o<strong>the</strong>rwise be availablefrom <strong>the</strong> failure to call a witness is not permissible when adefendant chooses to put on no evidence at all, in apparentreliance on its determination that plaintiff has not met itsburden.” 507 F.2d 1332, 1338 (3d Cir. 1975).Even assuming that <strong>the</strong> District Court erred by drawingan adverse inference from Botticella’s failure to testify, <strong>the</strong>conclusion that Botticella intended to use Bimbo’s trade34


82secrets during his employment with Hostess rests on a solidevidentiary basis, namely, Botticella’s “not disclosing toBimbo his acceptance of a job offer from a direct competitor,remaining in a position to receive Bimbo’s confidentialinformation and, in fact, receiving such information aftercommitting to <strong>the</strong> Hostess job, and copying Bimbo’s tradesecret information from his work laptop onto external storagedevices.” Bimbo Bakeries, 2010 WL 571774, at *13.Accordingly, <strong>the</strong> District Court did not abuse its discretion bydetermining that Bimbo demonstrated a likelihood of successon its misappropriation of trade secrets claim.B. Irreparable HarmThe District Court concluded that Bimbo would sufferirreparable harm absent injunctive relief because <strong>the</strong>disclosure of its trade secrets to Hostess would put Bimbo at acompetitive disadvantage that a legal remedy could notredress. On appeal, Botticella does not contest this findingapart from arguing that any harm Bimbo potentially mightsuffer from Botticella’s employment at Hostess could beprevented by a narrow injunction—to which Botticella wouldstipulate—prohibiting Botticella only from disclosingBimbo’s trade secrets. We recognize that <strong>the</strong> evidence at trialmay show that if Bimbo is entitled to relief that relief mightbe narrow yet adequate, just as Botticella suggests.Never<strong>the</strong>less, at this preliminary stage of <strong>the</strong> proceedings, <strong>the</strong>District Court did not abuse its discretion when, faced wi<strong>the</strong>vidence of Botticella’s suspicious conduct during his finalweeks at Bimbo, it determined that a stronger remedy was35


83needed in <strong>the</strong> interim to protect Bimbo from imminentirreparable harm. See Den-Tal-Ez, 566 A.2d at 1232 (“It isclear that under Pennsylvania law a court of equity mayfashion a trade secrets injunction that is broad enough toensure that <strong>the</strong> information is protected.”) (quoting SIHandling Sys., 753 F.2d at 1265) (internal alterationremoved).C. Harm to Botticella Caused by Injunctive ReliefThe District Court concluded that <strong>the</strong> harm of Bimbo’strade secrets being disclosed to Hostess outweighed <strong>the</strong> harmto Botticella of not being able to commence employment atHostess until <strong>the</strong> Court made a final determination of <strong>the</strong>merits following a trial, which it scheduled to start about twomonths from <strong>the</strong> date it issued <strong>the</strong> preliminary injunction. 15The Court noted that Botticella would continue to receivecompensation for <strong>the</strong> eleven weeks of vacation time that hehad accrued before leaving Bimbo. We agree with <strong>the</strong>District Court’s determination. In so doing, however, we notethat even a temporary injunction prohibiting someone frompursuing his livelihood in <strong>the</strong> manner he chooses operates as asevere restriction on him that a court should not imposelightly. Never<strong>the</strong>less, such a temporary restriction on his15Botticella in effect extended <strong>the</strong> duration of <strong>the</strong> preliminaryinjunction by pursuing an interlocutory appeal for, as weindicated above, <strong>the</strong> District Court has stayed this case duringthis appeal.36


84employment is warranted where, as here, <strong>the</strong> factsdemonstrate that <strong>the</strong> restriction is necessary to prevent greaterirreparable harm from befalling ano<strong>the</strong>r party. Following adisposition on <strong>the</strong> merits which in <strong>the</strong> normal course of eventswill follow <strong>the</strong> disposition of this appeal and <strong>the</strong> remand of<strong>the</strong> case to <strong>the</strong> District Court, if <strong>the</strong> Court holds that Bimbo isentitled to relief, <strong>the</strong> Court should fashion a remedyappropriate to protect Bimbo’s trade secrets without undulyimposing on Botticella’s right to pursue his chosenoccupation.D. The Public InterestWe agree with <strong>the</strong> District Court’s conclusion thatgranting <strong>the</strong> preliminary injunction was consistent with <strong>the</strong>public interest. There are several public interests at play inthis case. As noted by <strong>the</strong> District Court, <strong>the</strong>re is ageneralized public interest in “upholding <strong>the</strong> inviolability oftrade secrets and enforceability of confidentialityagreements.” Bimbo Bakeries, 2010 WL 571774, at *16.Additionally, <strong>the</strong>re is a public interest in employers being freeto hire whom <strong>the</strong>y please and in employees being free to workfor whom <strong>the</strong>y please. Of <strong>the</strong>se latter two interests,Pennsylvania courts consider <strong>the</strong> right of <strong>the</strong> employee to be<strong>the</strong> more significant. See Renee Beauty Salons, Inc. v. Blose-Venable, 652 A.2d 1345, 1347 (Pa. Super. Ct. 1995) (“[T]heright of a business person to be protected against unfaircompetition stemming from <strong>the</strong> usurpation of his or her tradesecrets must be balanced against <strong>the</strong> right of an individual to<strong>the</strong> unhampered pursuit of <strong>the</strong> occupations and livelihoods for37


85which he or she is best suited.”) (internal citation omitted);see also Wexler v. Greenberg, 160 A.2d 430, 434-35 (Pa.1960) (noting a societal interest in employee mobility). Weare satisfied on <strong>the</strong> facts of this case that <strong>the</strong> public interest inpreventing <strong>the</strong> misappropriation of Bimbo’s trade secretsoutweighs <strong>the</strong> temporary restriction on Botticella’s choice ofemployment. See SI Handling Sys., 753 F.2d at 1265 (findingunnecessary an “extended analysis of <strong>the</strong> public interest[because] extensive precedent supports an injunctive remedywhere <strong>the</strong> elements of a trade secret claim are established”).V. CONCLUSIONFor <strong>the</strong> reasons stated above, we will affirm <strong>the</strong> orderof <strong>the</strong> District Court dated February 9, 2010, and entered onFebruary 12, 2010, granting Bimbo’s motion for a preliminaryinjunction and will remand <strong>the</strong> case to that Court for fur<strong>the</strong>rproceedings.38


07/08/2011 86 11:51 FAX HANSLEY AROHCHICK 1ll003/019Case 2:11-cv-04303-RB Document 7 Filed 07/08/11 Page 1 of 1UNITED STATES DISTRICT COURT EASTERN· DISTRICT. OF PENNSYLVANIA LINDA EAGLE,Plaintiff,v.Civil Action No. 11-4303 (RB)SANDI MORGAN, HAITBAM SAEAD, JOSEPH MELLAC!, ELIZABETH SWEENEY, LISA ARNSPERGER, QAMAR. ZAMAN, aad EDCOMM, INC. Defendants.ORDERAND NOW. upon consideration ofPlaintiffLinda Eagle's Motion for a TemporaryRestraining Order aMl-ftetttJftlHtf"I"':trmmette&"OJ:E,t-Stilftllel9GM4I:1-li!JII'et.:in fur<strong>the</strong>r support of <strong>the</strong>JII~ttoft. it is hereby ORDERED and DEC ED tha;.pefendants Sandi Morgan. Haitham Saead,Joseph Mellaci. Elizabeth S\'IVeeney, Lisa Amsperger, Qamar Zaman and Edcomm, Inc. shall notalter, CfQDceal or destroy <strong>the</strong> LinkedIn account at issue in this aotio~ that was, at least untilJune 20.2011, accessib1e at <strong>the</strong> internet address ''http://1inkedin.comlinllindaeagle."AND IT IS FUR TIiER ORDERED that Plaintiff shall' serve this Order upon counsel forEdcomm, Inc. and upon <strong>the</strong> individual defendants.BY THE COURT:(;c..-J. tII\rLLU. S :_J._


87IN THE UNITED STATES DISTRICT COURTNORTHERN DISTRICT OF ILLINOISEASTERN DIVISIONJILL E. MAREMONT, ))Plaintiff, )) Case No. 10 C 7811v. ))SUSAN FREDMAN DESIGN GROUP, )LTD. and SUSAN FREDMAN, ))Defendants. )AMY J. ST. EVE, District Court Judge:MEMORANDUM OPINION AND ORDERIn her Second Amended Complaint, Plaintiff Jill E. Maremont alleges violations of <strong>the</strong>Lanham Act, 15 U.S.C. § 1125(a), and Stored Communications Act, 18 U.S.C. § 2701, et seq.,against Defendants Susan Fredman Design Group, Ltd. (“SFDG”) and Susan Fredman (Counts Iand II). See 28 U.S.C. § 1331. Pursuant to <strong>the</strong> Court’s supplemental jurisdiction, Maremont alsoalleges a claim under <strong>the</strong> Illinois Right of Publicity Act, 765 ILCS 1075, et seq. (Count III) and acommon law right to privacy claim (Count IV). See 28 U.S.C. § 1367(a).Before <strong>the</strong> Court is Defendants’ motion for summary judgment and Plaintiff’s motion forpartial summary judgment as to Counts I, II, and III of <strong>the</strong> Second Amended Complaint – bothpursuant to Federal Rule of Civil Procedure 56. For <strong>the</strong> following reasons, <strong>the</strong> Court grants inpart and denies in part Defendants’ motion for summary judgment and denies Plaintiff’s motionfor partial summary judgment. The Court dismisses Plaintiff’s Illinois Right of Publicity Actclaim as alleged in Count III and common law right to privacy claim as alleged in Count IV withprejudice.


88BACKGROUNDI. Nor<strong>the</strong>rn District of Illinois Local Rule 56.1Local Rule 56.1 assists <strong>the</strong> Court by “organizing <strong>the</strong> evidence, identifying undisputedfacts, and demonstrating precisely how each side propose[s] to prove a disputed fact withadmissible evidence.” Bordelon v. Chicago Sch. Reform Bd. of Trs., 233 F.3d 524, 527 (7th Cir.2000). “The Rule is designed, in part, to aid <strong>the</strong> district court, ‘which does not have <strong>the</strong>advantage of <strong>the</strong> parties’ familiarity with <strong>the</strong> record and often cannot afford to spend <strong>the</strong> timecombing <strong>the</strong> record to locate <strong>the</strong> relevant information,’ in determining whe<strong>the</strong>r a trial isnecessary.” Delapaz v. Richardson, 634 F.3d 895, 899 (7th Cir. 2011) (citation omitted). LocalRule 56.1(a)(3) requires <strong>the</strong> moving party to provide “a statement of material facts as to which<strong>the</strong> moving party contends <strong>the</strong>re is no genuine issue.” Cracco v. Vitran Exp., Inc., 559 F.3d 625,632 (7th Cir. 2009). “The opposing party is required to file ‘a response to each numberedparagraph in <strong>the</strong> moving party’s statement, including, in <strong>the</strong> case of any disagreement, specificreferences to <strong>the</strong> affidavits, parts of <strong>the</strong> record, and o<strong>the</strong>r supporting materials relied upon.” Id.(citing N.D. Ill. R. 56.1(b)(3)(B)). Also, Local Rule 56.1(b)(3)(C) requires <strong>the</strong> nonmoving partyto present a separate statement of additional facts that requires <strong>the</strong> denial of summary judgment.See Ciomber v. Cooperative Plus, Inc., 527 F.3d 635, 643-44 (7th Cir. 2008).The purpose of Local Rule 56.1 statements is to identify <strong>the</strong> relevant admissible evidencesupporting <strong>the</strong> material facts, not to make factual or legal arguments. See Cady v. Sheahan, 467F.3d 1057, 1060 (7th Cir. 2006) (“statement of material facts did [] not comply with Rule 56.1 asit failed to adequately cite <strong>the</strong> record and was filled with irrelevant information, legal arguments,and conjecture”). Therefore, <strong>the</strong> Court will not address <strong>the</strong> parties’ legal and factual arguments2


89made in <strong>the</strong>ir Rule 56.1 statements and responses. See System Dev. Integration, LLC v.Computer Sciences Corp., 739 F.Supp.2d 1063, 1068 (N.D. Ill. 2010). Moreover, <strong>the</strong>requirements for responses under Local Rule 56.1 are “not satisfied by evasive denials that donot fairly meet <strong>the</strong> substance of <strong>the</strong> material facts asserted.” Bordelon, 233 F.3d at 528.The Court may also disregard statements and responses that do not properly cite to <strong>the</strong>record. See Cady, 467 F.3d at 1060; Cichon v. Exelon Generation Co., LLC, 401 F.3d 803, 809-10 (7th Cir. 2005). Because Defendants failed to respond to Maremont’s Rule 56.1 Statement ofAdditional Facts, all of Maremont’s additional facts are deemed admitted. See N.D. Ill. LocalRule 56.1(b)(3)(C); Parra v. Neal, 614 F.3d 635, 636 (7th Cir. 2010).II.Relevant FactsDefendant SFDG is an interior design firm headquartered in Chicago and incorporated in<strong>the</strong> State of Illinois. (R. 39, Defs.’ Rule 56.1 Stmt. Facts 1.) Defendant Fredman owns SFDG.(Id. 2.) During <strong>the</strong> relevant time period, SFDG employed Maremont as <strong>the</strong> Director ofMarketing, Public Relations, and E-commerce. (Id. 3.) Maremont’s annual compensationincluded a bonus contingent upon SFDG’s gross sales exceeding certain threshold levels. (Id. 14.) Accordingly, Maremont’s social media efforts to promote SFDG’s sales qualified her forbonuses. (Id. 15.) During <strong>the</strong> course of Maremont’s employment at SFDG, she became wellknown in <strong>the</strong> Chicago design community and had developed a personal Twitter following ofapproximately 1,250 people. (R. 44, Pl.’s Rule 56.1 Stmt. Add’l Facts 34.)As part of a social media marketing campaign for SFDG, Maremont created <strong>the</strong> SFDGblog titled “Designer Diaries: Tales from <strong>the</strong> Interior” that was hosted on SFDG’s website. (Id. 40; Defs.’ Stmt. Facts 5.) Although it is undisputed that Maremont opened a Twitter account3


90using an SFDG computer at SFDG’s offices, it is also undisputed that Maremont’s personalTwitter and Facebook accounts were not for <strong>the</strong> benefit of SFDG. (Defs.’ Stmt. Facts 6; Pl.’sStmt. Facts 35.) Maremont, however, also opened a Facebook account for SFDG that was no<strong>the</strong>r personal Facebook account. (Defs.’ Stmt. Facts 9.) Maremont used Facebook and Twitterposts to promote SFDG by linking <strong>the</strong>m to SFDG’s blog and website. (Defs.’ Stmt. Facts 10.)Maremont entered and stored all account access information, including passwords for herTwitter and Facebook accounts, on <strong>the</strong> SFDG server by utilizing a SFDG-owned computer,although <strong>the</strong> folder in which she stored this information was locked and Maremont never gaveauthority to anyone to access her personal Twitter and Facebook accounts. (Id. 11; Pl.’s Stmt.Facts 42.)On September 15, 2009, an automobile struck Maremont and a SFDG co-worker while<strong>the</strong>y were on a work-related errand. (Defs.’ Stmt. Facts 16.) The accident seriously injuredMaremont and her co-worker. (Id.) Specifically, Maremont suffered serious brain trauma andstill suffers from post-concussion syndrome and post-traumatic stress disorder. (Id. 25.) Whileshe was hospitalized for her injuries between September 15 and 24, 2009, Maremont found outthat SFDG had posted entries on her Facebook page promoting SFDG. (Id. 17.) Maremontadmits, however, that she did not see <strong>the</strong>se Facebook entries and has no copies of <strong>the</strong>m. (Id. 18.) Also when she was hospitalized, Maremont discovered that SFDG posted Tweets on herTwitter account promoting SFDG. (Id. 19; Pl.’s Stmt. Facts 51, 63.) Maremont has copiesof seventeen Tweets posted during her absence from SFDG. (Defs.’ Stmt. Facts 20.) The firstof <strong>the</strong>se Tweets was posted on September 21, 2009 and was linked to an SFDG blog written byFredman explaining Maremont’s accident. (Id. 21.) This blog entry also announced that4


91during Maremont’s absence, a guest blogger, Olivia Fink-Larsen, would assume Maremont’srole at SFDG. (Id.) The o<strong>the</strong>r Tweets promoted SFDG and in some cases linked readers to <strong>the</strong>SFDG blog or website. (Id.)Meanwhile, Maremont asked Fredman and her employees to refrain from posting updatesto her Facebook page and Twitter account while she was in <strong>the</strong> hospital and not working atSFDG, yet SFDG employees failed to refrain from doing so. (Pl.’s Stmt. Facts 53, 54.) OnDecember 11, 2009, Maremont and her husband changed <strong>the</strong> password on her Twitter account.(Id. 59, 60; Defs.’ Stmt. Facts 23.) Maremont maintains that she suffered severe emotionaldistress when she realized that Defendants had sent out Tweets and Facebook posts from herpersonal Twitter and Facebook accounts promoting SFDG’s business. (Pl.’s Stmt. Facts 65.)On May 17, 2010, Maremont returned to work at SFDG on a part-time basis. (Defs.’Stmt. Facts 27.) The next day, May 18, 2010, Maremont wrote Facebook and Twitter poststhat she linked to a May 17, 2010 entry on SFDG’s blog in which she announced “Your Editor isBack!” (Id. 28.) In <strong>the</strong>se posts, Maremont thanked her temporary replacements, Olivia Fink-Larson and Michelle Doorman, “for <strong>the</strong>ir amazing posts on Designer Diaries in my absence andMichelle’s giant contribution to <strong>the</strong> Chicago Interior Designers at <strong>the</strong> Susan Fredman DesignGroup as <strong>the</strong> acting Marketing Director.” (Id.) On June 1, 2010, Maremont’s doctorrecommended that she stop work completely due to her post-concussion syndrome symptoms.(Id. 29.) Thereafter, Maremont followed her doctor’s recommendation and stopped working atSFDG. (Id.)On December 10, 2010, Maremont filed <strong>the</strong> present lawsuit and on February 28, 2011,Maremont sent a letter by certified mail to Susan Rosie, SFDG’s President, announcing her5


92intention to return to work part-time at SFDG on March 17, 2011. (Id. 30, 31.) On March 8,2011, SFDG’s lawyer responded by letter to Maremont’s attorneys advising <strong>the</strong>m that SFDG hadfilled Maremont’s position after her fa<strong>the</strong>r directed SFDG employees not to contact Maremontunder any circumstances. (Id. 32.) By March 17, 2011, a public relations firm known as “JoChicago” had hired Maremont. (Id. 33.)SUMMARY JUDGMENT STANDARDSummary judgment is appropriate “if <strong>the</strong> movant shows that <strong>the</strong>re is no genuine disputeas to any material fact and <strong>the</strong> movant is entitled to judgment as a matter of law.” Fed.R.Civ.P.56(a). A genuine dispute as to any material fact exists if “<strong>the</strong> evidence is such that a reasonablejury could return a verdict for <strong>the</strong> nonmoving party.” Anderson v. Liberty Lobby, Inc., 477 U.S.242, 248, 106 S. Ct. 2505, 2510, 91 L. Ed. 2d 202 (1986). In determining summary judgmentmotions, courts must view facts “in <strong>the</strong> light most favorable to <strong>the</strong> nonmoving party only if <strong>the</strong>reis a ‘genuine’ dispute as to those facts.” Scott v. Harris, 550 U.S. 372, 380, 127 S.Ct. 1769, 167L.Ed.2d 686 (2007). The party seeking summary judgment has <strong>the</strong> burden of establishing that<strong>the</strong>re is no genuine dispute as to any material fact. See Celotex Corp. v. Catrett, 477 U.S. 317,323, 106 S. Ct. 2548, 91 L.Ed.2d 265 (1986). After “a properly supported motion for summaryjudgment is made, <strong>the</strong> adverse party ‘must set forth specific facts showing that <strong>the</strong>re is a genuineissue for trial.’” Anderson, 477 U.S. at 255 (quotation omitted).ANALYSISI. Lanham Act Claim – Count IIn Count I of her Second Amended Complaint, Maremont alleges a false associationclaim, also known as a false endorsement claim, under <strong>the</strong> Lanham Act, 15 U.S.C. §6


931125(a)(1)(A). As <strong>the</strong> Seventh Circuit explains, one basis of liability under <strong>the</strong> Lanham Actincludes “false representations concerning <strong>the</strong> origin, association or endorsement of goods orservices through <strong>the</strong> wrongful use of ano<strong>the</strong>r’s distinctive mark, name, trade dress or o<strong>the</strong>rdevice.” L.S. Heath & Son, Inc. v. AT & T Info. Sys., Inc., 9 F.3d 561, 575 (7th Cir. 1993).“False endorsement occurs when a person’s identity is connected with a product or service insuch a way that consumers are likely to be misled about that person’s sponsorship or approval of<strong>the</strong> product or service.” Stayart v. Yahoo! Inc., 651 F.Supp.2d 873, 880 (E.D. Wis. 2009). Morespecifically, a “false endorsement claim based on <strong>the</strong> unauthorized use of a [person’s] identity isa type of false association claim, for it alleges <strong>the</strong> misuse of a trademark, i.e., a symbol or devicesuch as a visual likeness, vocal imitation, or o<strong>the</strong>r uniquely distinguishing characteristic, whichis likely to confuse consumers as to <strong>the</strong> plaintiff’s sponsorship or approval of <strong>the</strong> product.”Waits v. Frito-Lay, Inc., 978 F.2d 1093, 1110 (9th Cir. 1992).In <strong>the</strong>ir motion for summary judgment, Defendants argue that Maremont does not havestanding to bring her false endorsement claim. To have standing to bring a false endorsementclaim under <strong>the</strong> Lanham Act, a “party need not be in direct competition with a defendant tochallenge a defendant’s practices under <strong>the</strong> Act,” instead, “[a]ll a commercial party needs tobring suit under <strong>the</strong> Act is a ‘reasonable interest to be protected’ against activities that violate <strong>the</strong>Act.” Dovenmuehle v. Gilldorn Mortgage Midwest Corp., 871 F.2d 697, 700 (7th Cir. 1989)(citations omitted); see also Waits, 978 F.2d at 1110. In short, to satisfy <strong>the</strong> prudential standingrequirement for a false endorsement claim under <strong>the</strong> Lanham Act, a plaintiff must show an intentto commercialize an interest in her identity. See Dovenmuehle, 871 F.2d at 700; Stayart, 651F.Supp.2d at 881.7


94Although promoting SFDG on Facebook and Twitter was part of Maremont’s marketingstrategy while she was employed as SFDG’s Director of Marketing, Public Relations, and E-Commerce, it is undisputed that Maremont created a personal following on Twitter andFacebook for her own economic benefit and also because if she left her employment at SFDG,she would promote ano<strong>the</strong>r employer with her Facebook and Twitter followers. (Pl.’s Stmt.Facts 47-49.) As such, Maremont has satisfied <strong>the</strong> prudential standing requirement for a falseendorsement claim because she has a protected, commercial interest in her name and identitywithin <strong>the</strong> Chicago design community. See Dovenmuehle, 871 F.2d at 700.Next, Defendants argue that because Maremont did not suffer a financial injury, and herfalse endorsement claim must fail. See L.S. Heath & Son, Inc., 9 F.3d at 575; Web PrintingControls Co. v. Oxy–Dry Corp., 906 F.2d 1202, 1204-05 (7th Cir. 1990). To clarify, in “order torecover damages for a purported Lanham Act violation, <strong>the</strong> plaintiff ‘must demonstrate that ithas been damaged by actual consumer reliance on <strong>the</strong> misleading statements.’” L.S. Heath &Son, Inc., 9 F.3d at 575 (quoting Web Printing, 906 F.2d at 1205). As such, Maremont mustshow that she “suffered actual injury, i.e., a loss of sales, profits, or present value (goodwill)” orthat Defendants were unjustly enriched. See Web Printing, 906 F.2d at 1205; see also BadgerMeter, Inc. v. Grinnell Corp., 13 F.3d 1145, 1157 (7th Cir. 1994).Defendants filed <strong>the</strong>ir summary judgment motion on September 9, 2011 – over twomonths before <strong>the</strong> discovery cutoff date of November 18, 2011. Meanwhile, <strong>the</strong> Court grantedMaremont’s motion to extend <strong>the</strong> discovery deadline on December 1, 2011. In addition, <strong>the</strong>parties recently informed <strong>the</strong> Court that <strong>the</strong>y need expert discovery on <strong>the</strong> issue of damages.Because <strong>the</strong> parties have yet to complete fact discovery in this matter, especially as it relates to8


95damages based on <strong>the</strong>ir representations to <strong>the</strong> Court, it is premature to address whe<strong>the</strong>rMaremont suffered actual injury or if Defendants were unjustly enriched. See Fed.R.Civ.P.56(a). Accordingly, <strong>the</strong> Court denies <strong>the</strong> parties’ cross-motions for summary judgment on CountI of <strong>the</strong> Second Amended Complaint.II.Stored Communications Act Claim – Count IIIn Count II of <strong>the</strong> Second Amended Complaint, Maremont alleges that Defendants,without permission or authorization, used Maremont’s personal Twitter password to access herpersonal Twitter account authoring seventeen Tweets and similarly accessed her Facebookaccount and entered Facebook postings, in violation of <strong>the</strong> Stored Communications Act(“SCA”), 18 U.S.C. § 2701, et seq. In 1986, Congress enacted <strong>the</strong> SCA as Title II of <strong>the</strong>Electronic Communications Privacy Act of 1986, Pub.L. No. 99–508, 100 Stat. 1848 (1986),codified as amended at 18 U.S.C. §§ 2701-2711. See Devine v. Kapasi, 729 F.Supp.2d 1024,1026 (N.D. Ill. 2010). “Congress enacted <strong>the</strong> relevant provision of <strong>the</strong> SCA, id. § 2701, toprotect privacy interests in personal and proprietary information from <strong>the</strong> mounting threat ofcomputer hackers ‘deliberately gaining access to, and sometimes tampering with, electronic orwire communications’ by means of electronic trespass.” Id. (citation omitted). The SCA has aprovision for a private cause of action, which authorizes lawsuits for unauthorized, intentionalaccess to communications that are held in electronic storage. See Shlahtichman v. 1-800Contacts, Inc., 615 F.3d 794, 803 (7th Cir. 2010); 18 U.S.C. §§ 2701(a), 2707(a). The SCAprovision at issue states that whoever “(1) intentionally accesses without authorization a facilitythrough which an electronic communication service is provided; or (2) intentionally exceeds anauthorization to access that facility” and by doing so “obtains, alters, or prevents authorized9


96access to a wire or electronic communication while it is in electronic storage in such system”violates <strong>the</strong> SCA. See 18 U.S.C. § 2701(a); see also Shefts v. Petrakis, 758 F.Supp.2d 620, 635(C.D. Ill. 2010).Although Maremont admits that she never saw <strong>the</strong> Facebook posts that SFDG employeesposted without her consent and that she has no copies of <strong>the</strong>se entries, <strong>the</strong>re is undisputedevidence in <strong>the</strong> record that Defendants accessed Maremont’s personal Facebook account andaccepted friend requests at least five times from September 23, 2009 through November 24,2009. (Pl.’s Stmt. Facts 55-58.) Moreover, evidence in <strong>the</strong> record reveals that Defendantsposted seventeen Tweets to Maremont’s personal Twitter account during <strong>the</strong> relevant timeperiod. As such, <strong>the</strong>re are disputed issues of material fact whe<strong>the</strong>r Defendants exceeded <strong>the</strong>irauthority in obtaining access to Maremont’s personal Twitter and Facebook accounts.None<strong>the</strong>less, Defendants argue that Maremont’s SCA claim fails because she cannotestablish actual damages as required under <strong>the</strong> SCA, more specifically, 18 U.S.C. § 2707(c). SeeDoe v. Chao, 540 U.S. 614, 640, 124 S.Ct. 1204, 157 L.Ed.2d 1122 (2004) (damages underSection 2707(c) include sum of actual damages suffered by plaintiff and profits made by violatoras result of violation). To clarify, although <strong>the</strong> SCA allows for statutory damages, proof of“actual damages” is a prerequisite to recover any such statutory damages. See Van Alstyne v.Electronic Scriptorium, Ltd., 560 F.3d 199, 205 (4th Cir. 2009); Cornerstone Consultants, Inc. v.Production Input Solutions, LLC, 789 F.Supp.2d 1029, 1043 (N.D. Iowa 2011); Cf. Chao, 540U.S. at 626-27 (under Privacy Act, $1,000 minimum statutory damages award was available“only to plaintiffs who suffered some actual damages”). Because <strong>the</strong> parties have yet tocomplete discovery as it pertains to damages, it is premature for <strong>the</strong> Court to address this issue.10


97Therefore, <strong>the</strong> Court denies both Maremont’s and Defendants’ cross-motions for summaryjudgment as to Count II of <strong>the</strong> Second Amended Complaint.III.Illinois Right of Publicity Act Claim – Count IIIIn Count III of <strong>the</strong> Second Amended Complaint, Maremont alleges that Fredman and/orSFDG used her likeness for <strong>the</strong> purpose of promoting Defendants’ design business and retailstore without Maremont’s written consent in violation of Illinois’ Right to Publicity Act. Theelements for an Illinois Right to Publicity Act claim include: (1) an appropriation of one’s nameor likeness; (2) without written consent; and (3) for ano<strong>the</strong>r’s commercial benefit. See Blair v.Nevada Landing P’ship, 369 Ill.App.3d 318, 322, 307 Ill.Dec. 511, 859 N.E.2d 1188 (2d Dist.2006); 765 ILCS 1075/60 (<strong>the</strong> Act does “not affect an individual’s common law rights as <strong>the</strong>yexisted before <strong>the</strong> effective date of this Act.”). “According to <strong>the</strong> Restatement, <strong>the</strong> purpose ofthis tort is to protect <strong>the</strong> ‘interest of <strong>the</strong> individual in <strong>the</strong> exclusive use of his own identity, in sofar as it is represented by his name or likeness.’” Villalovos v. Sundance Assoc., Inc., No. 01 C8468, 2003 WL 115243, at *3 (N.D. Ill. Jan. 13, 2003) (quoting Restatement (Second) of Torts §652C, cmt. a (1977)); see also Dwyer v. American Exp. Co., 273 Ill.App.3d 742, 210 Ill.Dec.375, 652 N.E.2d 1351 (1st Dist. 1995). In addition, “<strong>the</strong> Restatement of Torts makes it clear thatit is not <strong>the</strong> use of <strong>the</strong> plaintiff’s name which constitutes a tort but ra<strong>the</strong>r <strong>the</strong> appropriation of <strong>the</strong>value of his name and reputation.” Hooker v. Columbia Pictures Indus., Inc., 551 F.Supp. 1060,1062 (N.D. Ill. 1982). Thus, “[i]t is not enough that <strong>the</strong> defendant has adopted for himself aname that is <strong>the</strong> same as that of <strong>the</strong> plaintiff, so long as he does not pass himself off as <strong>the</strong>plaintiff or o<strong>the</strong>rwise seek to obtain for himself <strong>the</strong> values or benefits of <strong>the</strong> plaintiff’s name or11


98identity.” Id. (quoting Restatement (Second) of Torts § 652C, cmt. c (1977)). 1Because <strong>the</strong>re is no evidence in <strong>the</strong> record concerning <strong>the</strong> actual Facebook postings and<strong>the</strong>ir content, <strong>the</strong> Court focuses on <strong>the</strong> seventeen Tweets posted in <strong>the</strong> fall of 2009 to determinewhe<strong>the</strong>r Maremont’s Right to Privacy Act claim survives summary judgment. Viewing <strong>the</strong> factsand all reasonable inferences in Maremont’s favor, she cannot fulfill <strong>the</strong> appropriation elementunder <strong>the</strong> Right to Privacy Act because Defendants did not pass <strong>the</strong>mselves off as Maremont in<strong>the</strong> relevant Tweets. More specifically, <strong>the</strong> first of <strong>the</strong>se Tweets was posted on September 21,2009 and was linked to an SFDG blog written by Fredman explaining Maremont’s accident.This blog entry also announced that during Maremont’s absence, a guest blogger, Olivia Fink-Larsen, would assume Maremont’s role at SFDG. It is also undisputed that once Maremontreturned to SFDG in May 2010, she wrote Facebook and Twitter posts that she linked to a May17, 2010 entry on SFDG’s blog in which she announced “Your Editor is Back!” (Defs.’ Stmt.Facts 28.) In <strong>the</strong>se posts, Maremont thanked her temporary replacements, Olivia Fink-Larsonand Michelle Doorman, “for <strong>the</strong>ir amazing posts on Designer Diaries in my absence andMichelle’s giant contribution to <strong>the</strong> Chicago Interior Designers at <strong>the</strong> Susan Fredman DesignGroup as <strong>the</strong> acting Marketing Director.” (Id.) Because Defendants did not appropriateMaremont’s identity and Maremont herself recognizes that SFDG temporarily replaced herduring her absence, Maremont’s Right to Publicity Act claim must fail. The Court thus grantsDefendants’ summary judgment motion and denies Maremont’s motion for partial summary1 Except for citing legal authority listing <strong>the</strong> elements of her Illinois Right of PublicityAct and Intrusion Upon Seclusion claims, Maremont fails to develop her arguments supporting<strong>the</strong>se state law claims with any legal authority. See Judge v. Quinn, 612 F.3d 537, 557 (7th Cir.2010) (“undeveloped arguments, and arguments that are unsupported by pertinent authority, arewaived.”) (citation omitted).12


99judgment as to Count III of <strong>the</strong> Second Amended Complaint.IV.Common Law Right to Privacy Claim – Count IVThe Court previously dismissed Maremont’s common law right to privacy claim –without prejudice – because <strong>the</strong> Right to Publicity Act replaced <strong>the</strong> common law tort ofappropriation of likeness. See Flentye v. Kathrein, 485 F.Supp.2d 903, 923 (N.D. Ill. 2007).Maremont <strong>the</strong>n re-alleged Count IV, bringing a common law intrusion upon seclusion claim,which is also a right to privacy claim under Illinois law. An intrusion upon seclusion claimincludes <strong>the</strong> following elements: “(1) an unauthorized intrusion into seclusion; (2) <strong>the</strong> intrusionwould be highly offensive to a reasonable person; (3) <strong>the</strong> matter intruded upon was private; and(4) <strong>the</strong> intrusion caused <strong>the</strong> plaintiffs anguish and suffering.” Cooney v. Chicago Public Sch.,407 Ill.App.3d 358, 366, 347 Ill.Dec. 733, 943 N.E.2d 23 (1st Dist. 2010). Under <strong>the</strong> thirdelement of an intrusion upon seclusion claim, <strong>the</strong> matter must be private and <strong>the</strong> plaintiff mustshow that she “attempted to keep private facts private.” Acosta v. Scott Labor, LLC, 377F.Supp.2d 647, 650 (N.D. Ill. 2005). In o<strong>the</strong>r words, “persons cannot reasonably maintain anexpectation of privacy in that which <strong>the</strong>y display openly.” Id. (citation omitted).Here, it is undisputed that Maremont had a Twitter following of approximately 1,250people and that she also had Facebook followers. (Pl.’s Stmt. Facts 34, 44.) It is alsoundisputed that Maremont’s posts on Twitter were targeted to <strong>the</strong> design community. (Id. 50.)Fur<strong>the</strong>r, Maremont signed her business emails as SFDG’s Marketing Director with an invitationto “Become a fan of SFDG on Facebook” and to “Follow us on Twitter.” (Defs.’ Stmt. Facts 13.) Also, Maremont’s Facebook and Twitter posts were often linked to <strong>the</strong> SFDG blog,“Designer Diaries: Tales from <strong>the</strong> Interior,” which was accessible to <strong>the</strong> public and was created13


100to enhance SFDG’s sales. (Id. 5, 8.)Viewing <strong>the</strong>se facts and all reasonable inferences in Maremont’s favor, <strong>the</strong>re is nodispute as to <strong>the</strong> material facts that <strong>the</strong> matters discussed in Maremont’s Facebook and Twitterposts were not private and that Maremont did not try to keep any such facts private. 2In short,Maremont fails to point to any private information upon which Defendants intruded. SeeCooney, 407 Ill.App.3d at 367; see also Lovgren v. Citizens First Nat’l Bank of Princeton, 126Ill.2d 411, 417, 128 Ill.Dec. 542, 534 N.E.2d 987 (Ill. 1989) (“<strong>the</strong> core of this tort is <strong>the</strong> offenseprying into <strong>the</strong> private domain of ano<strong>the</strong>r”). Therefore, <strong>the</strong> Court grants Defendants’ summaryjudgment motion as to Count IV of <strong>the</strong> Second Amended Complaint.2Facebook posts are accessible only to those whom <strong>the</strong> user selects, and thus <strong>the</strong>y arenot strictly public. See Crispin v. Christian Audigier, Inc., 717 F.Supp.2d 965, 980 (C.D. Cal.2010); see also Cohen v. Facebook, Inc., ___ F.Supp.2d ___, 2011 WL 3100565, at *1 (N.D.Cal. June 28, 2011) (“As a ‘social networking’ internet site, Facebook exists because its userswant to share information – often about <strong>the</strong>mselves – and to obtain information about o<strong>the</strong>rs,within and among groups and subgroups of persons <strong>the</strong>y already know or with whom <strong>the</strong>ybecome acquainted through using Facebook.”) (emphasis in original). Twitter posts or Tweets,on <strong>the</strong> o<strong>the</strong>r hand, are usually visible and accessible to <strong>the</strong> general public. See Senese v. Hindle,No. 11-CV-0072 (RJD), 2011 WL 4536955, at *5 n.28 (E.D.N.Y. Sept. 9, 2011); see alsoTwitter: New Challenges to Copyright Law in <strong>the</strong> Internet Age, 10 J. Marshall Rev. Intell. Prop.L. 231, 236 (2010) (although Tweets are publicly visible by default, senders can restrictmessages to <strong>the</strong>ir followers).14


101CONCLUSIONFor <strong>the</strong> <strong>the</strong>se reasons, <strong>the</strong> Court grants in part and denies in part Defendants’ motion forsummary judgment and denies Plaintiff’s motion for partial summary judgment brought pursuantto Federal Rule of Civil Procedure 56.Date: December 7, 2011ENTERED_______________________________AMY J. ST. EVEUnited States District Court Judge15


102Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page1 of 1512UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California345678910111213141516171819202122232425262728PHONEDOG,v.NOAH KRAVITZ,UNITED STATES DISTRICT COURTPlaintiff,Defendant._____________________________________/Nor<strong>the</strong>rn District of CaliforniaI. INTRODUCTIONNo. C 11-03474 MEJORDER ON DEFENDANT’S MOTIONTO DISMISS PURSUANT TO FRCP12(B)(1) AND 12(B)(6)[Docket No. 4]Plaintiff PhoneDog brings this action against one of its former employees, Defendant NoahKravitz, based on his continued use of a Twitter account that PhoneDog alleges it owns and containstrade secrets, namely <strong>the</strong> compilation of subscribers and <strong>the</strong> password used to access <strong>the</strong> account.Currently pending before <strong>the</strong> Court is Mr. Kravitz’s Motion to Dismiss PhoneDog’s Complaint forlack of subject matter jurisdiction pursuant to Federal Rule of Civil Procedure (“Rule”) 12(b)(1), andfor failure to state a claim pursuant to Rule 12(b)(6). Mot., Dkt. No. 4. PhoneDog has filed anOpposition (Dkt. No. 13), and Mr. Kravitz has filed a Reply (Dkt. No. 17). On October 13, 2011, <strong>the</strong>Court held a hearing on <strong>the</strong> matter. After carefully considering <strong>the</strong> parties’ arguments and <strong>the</strong>controlling legal authorities, <strong>the</strong> Court DENIES without prejudice Mr. Kravitz’s 12(b)(1) motion andGRANTS IN PART and DENIES IN PART his 12(b)(6) motion as set forth below.II. BACKGROUNDThe relevant allegations, taken from PhoneDog’s Complaint, are as follows.PhoneDog is an “interactive mobile news and reviews web resource,” that reviews mobileproducts and services and provides users with resources needed to research, compare prices, and shopfrom mobile carriers. Compl. 8. PhoneDog uses a variety of social media, including Twitter,Facebook, and YouTube, to market and promote its services to users. Id. 9.


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page2 of 15103UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728Beginning in April 2006, Mr. Kravitz began working for PhoneDog as a product reviewer andvideo blogger. Id. 14. PhoneDog alleges that “[a]s an employee of PhoneDog, [Mr. Kravitz] wasgiven use of and maintained <strong>the</strong> Twitter account “@PhoneDog_Noah” (<strong>the</strong> “Account”). Id. 15. Aspart of Mr. Kravitz’s employment, he submitted written and video content to PhoneDog, which was<strong>the</strong>n transmitted to its users via a variety of mediums, including PhoneDog’s website and <strong>the</strong> TwitterAccount. Id. 14. Mr. Kravitz accessed <strong>the</strong> Twitter Account using a password and used <strong>the</strong> Accountto disseminate information and promote PhoneDog’s services on behalf of PhoneDog. Id. Accordingto PhoneDog, all @PhoneDog_Name Twitter accounts used by its employees, as well as <strong>the</strong>passwords to such accounts, constitute proprietary, confidential information. Id. 12. PhoneDogavers that, during <strong>the</strong> course of Mr. Kravitz’s employment at PhoneDog, <strong>the</strong> @PhoneDog_NoahAccount generated approximately 17,000 Twitter followers. Id. 16.In October 2010, Mr. Kravitz ended his employment with PhoneDog. Id. 17. At that time,PhoneDog requested that he relinquish use of <strong>the</strong> Twitter Account. Id. In response, Mr. Kravitzchanged <strong>the</strong> Account handle to “@noahkravitz,” and continues to use <strong>the</strong> Account. Id. As a result,PhoneDog alleges that it has suffered at least $340,000 in damages. Id. at 9.Based on <strong>the</strong>se allegations, on July 15, 2011, PhoneDog filed this lawsuit against Mr. Kravitz,asserting claims under California law for: (1) misappropriation of trade secrets; (2) intentionalinterference with prospective economic advantage; (3) negligent interference with prospectiveeconomic advantage; and (4) conversion. Id. at 3-7.Mr. Kravitz now moves to dismiss PhoneDog’s Complaint pursuant to Rule 12(b)(1) for lackof subject matter jurisdiction and pursuant to Rule 12(b)(6) for failure to state a claim.III. DISCUSSIONA. Motion to Dismiss for Lack of Subject Matter JurisdictionIn its Complaint, PhoneDog alleges that this Court has subject matter jurisdiction over thisaction pursuant to 28 U.S.C. § 1332(a). Compl. 3. It alleges that it diversity of citizenship existsbetween <strong>the</strong> parties and more than $75,000 is in controversy. Id. There is no dispute as to <strong>the</strong>diversity of citizenship of <strong>the</strong> parties. Mr. Kravitz, however, argues that PhoneDog cannot meet its2


104Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page3 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728burden of establishing that <strong>the</strong> amount in controversy is satisfied in this case. Mot. at 2. Specifically,he challenges PhoneDog’s alleged damages premised on <strong>the</strong> value of <strong>the</strong> Twitter Account. Id. at 3.In response, PhoneDog asserts that it has sufficiently alleged that <strong>the</strong> amount in controversy exceeds$75,000. Opp’n at 3, Dkt. No. 13. It fur<strong>the</strong>r argues that Mr. Kravitz’s extrinsic evidence does notprove to a legal certainty that its damages fall below <strong>the</strong> jurisdictional minimum. Id.1. Legal StandardFederal courts are courts of limited jurisdiction, possessing only that power authorized byArticle III of <strong>the</strong> United States Constitution and statutes enacted by Congress pursuant <strong>the</strong>reto.Bender v. Williamsport Area Sch. Dist., 475 U.S. 534, 541 (1986). Thus, federal courts have nopower to consider claims for which <strong>the</strong>y lack subject matter jurisdiction. Chen–Cheng Wang ex rel.United States v. FMC Corp., 975 F.2d 1412, 1415 (9th Cir. 1992). The Court is under a continuingduty to dismiss an action whenever it appears that it lacks jurisdiction. Id.; see also Spencer Enters.,Inc. v. United States, 345 F.3d 683, 687 (9th Cir. 2003). The burden of establishing that a cause lieswithin this limited jurisdiction rests upon <strong>the</strong> party asserting jurisdiction. Kokkonen v. Guardian LifeIns. Co. of America, 511 U.S. 375, 377 (1994). Thus, in <strong>the</strong> present action, PhoneDog bears <strong>the</strong>burden of demonstrating that subject matter jurisdiction exists over its Complaint. Tosco Corp. v.Communities for a Better Env’t, 236 F.3d 495, 499 (9th Cir. 2001).On a motion to dismiss pursuant to Rule 12(b)(1), <strong>the</strong> applicable standard turns on <strong>the</strong> natureof <strong>the</strong> jurisdictional challenge. A Rule 12(b)(1) jurisdictional attack may be “facial” or “factual.”White v. Lee, 227 F.3d 1214, 1242 (9th Cir. 2000) (citation omitted). In evaluating a facial attack onjurisdiction, <strong>the</strong> Court must accept <strong>the</strong> factual allegations in PhoneDog’ complaint as true and drawall reasonable inferences in its favor. Doe v. Holy See, 557 F.3d 1066, 1073 (9th Cir. 2009). As partof its ruling on such a motion, <strong>the</strong> Court may also consider additional facts that “are contained inmaterials of which <strong>the</strong> court may take judicial notice.” McCarthy v. United States, 850 F.2d 558, 560(9th Cir. 1988).By contrast, in a factual attack, <strong>the</strong> challenger disputes <strong>the</strong> truth of <strong>the</strong> allegations that, by<strong>the</strong>mselves, would o<strong>the</strong>rwise invoke federal jurisdiction. Safe Air for Everyone v. Meyer, 373 F.3d3


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page4 of 15105UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California123456789101112131415161718192021222324252627281035, 1039 (9th Cir. 2004). In such a case, “[n]o presumptive truthfulness attaches to plaintiff’sallegations, and <strong>the</strong> existence of disputed material facts will not preclude <strong>the</strong> trial court fromevaluating for itself <strong>the</strong> merits of jurisdictional claims.” Thornhill Publ’g v. Gen. Tel. & Elec. Corp.,594 F.2d 730, 733 (9th Cir. 1979). “In resolving a factual attack on jurisdiction, <strong>the</strong> district courtmay review evidence beyond <strong>the</strong> complaint without converting <strong>the</strong> motion to dismiss into a motionfor summary judgment.” Safe Air, 373 F.3d at 1039 (citation omitted). However, “[a] jurisdictionalfinding of genuinely disputed facts is inappropriate when <strong>the</strong> jurisdictional issue and substantiveissues are so intertwined that <strong>the</strong> question of jurisdiction is dependent on <strong>the</strong> resolution of factualissues going to <strong>the</strong> merits of <strong>the</strong> action.” Id. “Dismissal is <strong>the</strong>n appropriate ‘where it appears beyonddoubt that <strong>the</strong> plaintiff can prove no set of facts in support of his claim which would entitle him torelief.’” Roberts v. Corro<strong>the</strong>rs, 812 F.2d 1173, 1177 (9th Cir. 1987) (quoting Conley v. Gibson, 355U.S. 41, 45-46 (1957)). “This standard, often cited in Rule 12(b)(6) motions, . . . is equallyapplicable in motions challenging subject matter jurisdiction when such jurisdiction may becontingent upon factual matters in dispute.” Id. (internal quotations and citation omitted). “TheNinth Circuit has held that, where <strong>the</strong> jurisdictional issue is intertwined with <strong>the</strong> merits, a courtcannot determine <strong>the</strong> jurisdictional issue until <strong>the</strong> merits of <strong>the</strong> case are appropriately resolved.” Chiev. Reed Elsevier, Inc., 2011 WL 3879495, at *3 (N.D. Cal. Sep. 02, 2011) (citing Roberts, 812 F.2d at1177).2. DiscussionAs indicated above, in its Complaint PhoneDog alleges that Mr. Kravitz’s unauthorized use of<strong>the</strong> Twitter Account (and o<strong>the</strong>r confidential information associated with <strong>the</strong> Account), have caused itto incur $340,000 in damages. Compl. 16, 41. To reach this calculation, PhoneDog alleges that<strong>the</strong> account generated approximately 17,000 followers, which according to industry standards, areeach valued at $2.50. Id. Thus, PhoneDog contends that its damages amount to $42,500 ($2.50 x17,000) for each month that Mr. Kravitz has used <strong>the</strong> account, which at <strong>the</strong> time of filing amounted to$340,000 for eight months. Id.In his Motion, Mr. Kravitz contends that PhoneDog cannot establish damages over <strong>the</strong>4


106Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page5 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728$75,000 jurisdictional threshold. Mot. at 9. Contrary to PhoneDog’s calculation, Mr. Kravitz assertsthat “PhoneDog cannot establish that it is entitled to any monetary recovery because it does not havecompetent proof that it has ownership or right to possession over <strong>the</strong> Account or <strong>the</strong> followers.” Mot.at 9. According to Mr. Kravitz, pursuant to Twitter’s Terms of Service, “<strong>the</strong> Account, as all Twitteraccounts are, is <strong>the</strong> exclusive property of Twitter and its licensors, not PhoneDog.” Id. As to <strong>the</strong>followers, Mr. Kravitz argues that “‘[f]ollowers’ are human beings who have <strong>the</strong> discretion tosubscribe and/or unsubscribe to <strong>the</strong> Account without <strong>the</strong> consent of PhoneDog,” and are not propertyand cannot be owned. Id. Because PhoneDog cannot own ei<strong>the</strong>r <strong>the</strong> Account or its followers, Mr.Kravitz contends that PhoneDog has no basis for its damages calculation and, as a result, cannot showthat <strong>the</strong> amount in controversy requirement is met. Id.Mr. Kravitz also argues that, “[t]o date, <strong>the</strong> industry precedent has been that absent anagreement prohibiting any employee from doing so, after an employee leaves an employer, <strong>the</strong>y arefree to change <strong>the</strong>ir Twitter handle.” Id. at 10.Fur<strong>the</strong>r, Mr. Kravitz contends that, irrespective of whe<strong>the</strong>r PhoneDog owns <strong>the</strong> account, itcannot establish more than $75,000 in damages because <strong>the</strong>re is no evidence that a Twitter accounthas any monetary value. Mot. at 10. He argues that “PhoneDog nei<strong>the</strong>r states that <strong>the</strong>re is an actualrecognized method to measure <strong>the</strong> value of a Twitter ‘account’, not does it allege that its method ofcalculating <strong>the</strong> value of <strong>the</strong> Account is in accordance with an ‘industry standard.’” Id. He argues thatany value attributed to <strong>the</strong> Account comes from his efforts in posting tweets and <strong>the</strong> individual’sinterest in following him, not from <strong>the</strong> Account itself. Mot. at 11.Finally, Mr. Kravitz challenges PhoneDog’s methodology for assessing <strong>the</strong> value of a Twitteraccount. Mot. at 12. He argues that if any value can be determined, it requires more than simplymultiplying each user by $2.50; ra<strong>the</strong>r multiple factors must be considered, including: (1) <strong>the</strong> numberof followers; (2) <strong>the</strong> number of tweets; (3) <strong>the</strong> content of <strong>the</strong> tweets; (4) <strong>the</strong> person publishing <strong>the</strong>tweets; and (5) <strong>the</strong> person placing <strong>the</strong> value of <strong>the</strong> account. Id.PhoneDog, however, maintains that it has sufficiently alleged that it has incurred more than$75,000 in damages as a result of Mr. Kravitz’s conduct, <strong>the</strong>reby satisfying Rule 8(a)(1)’s liberal5


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page6 of 15107UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728pleading standard. Opp’n at 8. It asserts that it is not required to provide a detailed calculation ofhow its Account is valued in its Complaint. Id.PhoneDog also counters that it has an ownership interest in <strong>the</strong> Account based on <strong>the</strong> licensegranted to it by Twitter to use and access <strong>the</strong> Account, in <strong>the</strong> Account’s list of followers, and in <strong>the</strong>content submitted to <strong>the</strong> Account. Opp’n at 6-7. It argues that, even if Mr. Kravitz created <strong>the</strong>Account, he did so at PhoneDog’s request and for its benefit and in <strong>the</strong> course and scope of hisemployment with PhoneDog. Id. at 6. It argues that <strong>the</strong> list of followers is akin to a businesscustomer list, in which it has an intangible property interest. Id. at 7.PhoneDog fur<strong>the</strong>r argues that, notwithstanding any ownership interest or right to possession ithas in <strong>the</strong> Account, it is entitled to damages based upon Mr. Kravitz’s interference with its access toand use of <strong>the</strong> Account. Opp’n at 5. PhoneDog states that it requests that its representatives maintainTwitter accounts to increase traffic to its website, which generates income from advertisers. Id. Itargues that, “contrary to <strong>the</strong> agreement between PhoneDog and [Mr. Kravitz] that <strong>the</strong> Account was tobe used for <strong>the</strong> benefit of PhoneDog, [Mr. Kravitz] failed to respond to requests from PhoneDog totweet and submit contend to <strong>the</strong> Account promoting PhoneDog and instead used <strong>the</strong> Account topromote himself and TechnoBuffalo, a competitor of PhoneDog. By failing to use <strong>the</strong> Account forPhoneDog’s benefit, [Mr. Kravitz] interfered with PhoneDog’s access to <strong>the</strong> Followers, which in turninterfered with PhoneDog’s economic relations with its advertisers,” <strong>the</strong>reby interfering with its“advantageous relations” and giving rise to a claim for damages Id. at 5-6. Thus, it argues thatTwitter’s prohibition on purchasing or selling a Twitter account is inconsequential because “[t]hevalue of <strong>the</strong> Account lies in <strong>the</strong> Account’s list of Followers and <strong>the</strong> traffic that those Followersgenerate to <strong>the</strong> PhoneDog website.” Id. at 8-9.Finally, PhoneDog argues that Mr. Kravitz cannot establish that <strong>the</strong>re is a legal certainty thatits damages do not exceed $75,000. Id. at 9. It contends that “<strong>the</strong> method of valuing a Twitteraccount is afforded many different interpretations,” and Mr. Kravitz’s method which leads to adifferent valuation is insufficient to defeat subject matter jurisdiction. Id.As <strong>the</strong> foregoing summary illustrates, <strong>the</strong> question whe<strong>the</strong>r <strong>the</strong> amount in controversy6


108Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page7 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728requirement is satisfied in this case is intertwined with factual and legal issues raised by PhoneDog’sclaims. Whe<strong>the</strong>r PhoneDog has any property interest in <strong>the</strong> Twitter account cannot be resolved on<strong>the</strong> record at this stage of <strong>the</strong> case. Likewise, should PhoneDog be able to establish that it has someproperty interest in <strong>the</strong> Twitter account or <strong>the</strong> password and follower list, <strong>the</strong> question becomes whatis <strong>the</strong> proper valuation of such items. Again, <strong>the</strong> parties have proffered competing methodologies forvaluing <strong>the</strong> account, and on this limited record, <strong>the</strong> Court is unable to resolve this dispute at thisjuncture.At <strong>the</strong> same time, PhoneDog has expressly alleged $340,000 in damages stemming from itsmisappropriation and interference with economic advantage claims. The Court cannot say thatPhoneDog’s allegation as to <strong>the</strong> amount in controversy is in bad faith or that it appears beyond a legalcertainty that <strong>the</strong> claim is really for less than <strong>the</strong> jurisdictional amount.Taken toge<strong>the</strong>r, <strong>the</strong> Court finds that a determination of whe<strong>the</strong>r <strong>the</strong> Court has subject matterjurisdiction over this action based on diversity jurisdiction cannot be resolved at this stage of <strong>the</strong>proceeding. Ra<strong>the</strong>r, because <strong>the</strong> issue is tied up with PhoneDog’s claims, <strong>the</strong> issue cannot beresolved until summary judgment on a fully developed evidentiary record. The Court <strong>the</strong>reforeDENIES Mr. Kravitz’s motion to dismiss for lack of subject matter jurisdiction WITHOUTPREJUDICE to Mr. Kravitz re-asserting his challenge on summary judgment.B. Motion to Dismiss for Failure to State a ClaimMr. Kravitz also moves to dismiss each of PhoneDog’s claims pursuant to Rule 12(b)(6). TheCourt will address each challenge in turn.1. Legal StandardA court may dismiss a complaint under Rule 12(b)(6) when it does not contain enough facts tostate a claim to relief that is plausible on its face. See Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570(2007). “A claim has facial plausibility when <strong>the</strong> plaintiff pleads factual content that allows <strong>the</strong> courtto draw <strong>the</strong> reasonable inference that <strong>the</strong> defendant is liable for <strong>the</strong> misconduct alleged.” Ashcroft v.Iqbal, 129 S.Ct. 1937, 1949 (2009). “The plausibility standard is not akin to a ‘probabilityrequirement,’ but it asks for more than a sheer possibility that a defendant has acted unlawfully.” Id.7


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page8 of 15109UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728(quoting Twombly, 550 U.S. at 557.) “While a complaint attacked by a Rule 12(b)(6) motion todismiss does not need detailed factual allegations, a plaintiff’s obligation to provide <strong>the</strong> ‘grounds’ ofhis ‘entitle[ment] to relief’ requires more than labels and conclusions, and a formulaic recitation of<strong>the</strong> elements of a cause of action will not do. Factual allegations must be enough to raise a right torelief above <strong>the</strong> speculative level.” Twombly, 550 U.S. at 555 (internal citations and paren<strong>the</strong>ticalsomitted).In considering a motion to dismiss, a court must accept all of <strong>the</strong> plaintiff’s allegations as trueand construe <strong>the</strong>m in <strong>the</strong> light most favorable to <strong>the</strong> plaintiff. Id. at 550; Erickson v. Pardus, 551U.S. 89, 93-94 (2007); Vasquez v. Los Angeles County, 487 F.3d 1246, 1249 (9th Cir. 2007).If <strong>the</strong> court dismisses <strong>the</strong> complaint, it should grant leave to amend even if no request toamend is made “unless it determines that <strong>the</strong> pleading could not possibly be cured by <strong>the</strong> allegation ofo<strong>the</strong>r facts.” Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir. 2000) (quoting Cook, Perkiss and Liehe,Inc. v. N. Cal. Collection Serv. Inc., 911 F.2d 242, 247 (9th Cir. 1990)).2. Discussiona. Misappropriation of <strong>Trade</strong> <strong>Secrets</strong> ClaimMr. Kravitz challenges PhoneDog’s misappropriation of trade secrets claim.Mr. Kravitz first argues that <strong>the</strong> claim is subject to dismissal because “<strong>the</strong> identity of <strong>the</strong>Account followers and <strong>the</strong> ‘password’ to <strong>the</strong> Account which PhoneDog alleges were misappropriatedby Kravitz are not a ‘trade secret’ within <strong>the</strong> meaning of <strong>the</strong> California Uniform <strong>Trade</strong> <strong>Secrets</strong> Act(“UTSA”).” 1Mot. at 14. Specifically, he argues that “[t]he followers of <strong>the</strong> Account are not secretbecause <strong>the</strong>y are and have been publicly available for all to see at all times.” Id. With respect to <strong>the</strong>password to <strong>the</strong> Account, Mr. Kravitz contends that passwords to Twitter accounts do not derive any1 The UTSA, California Civil Code section 3426.1(d), provides that “‘[t]rade secret’ meansinformation, including a formula, pattern, compilation, program, device, method, technique, orprocess, that: (1) Derives independent economic value, actual or potential, from not being generallyknown to <strong>the</strong> public or to o<strong>the</strong>r persons who can obtain economic value from its disclosure or use;and (2) Is <strong>the</strong> subject of efforts that are reasonable under <strong>the</strong> circumstances to maintain its secrecy.”8


110Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page9 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728actual or potential independent economic value under <strong>the</strong> UTSA because <strong>the</strong>y do not provide anysubstantial business advantage. Mot. at 15. Ra<strong>the</strong>r, he argues that <strong>the</strong> passwords merely allow <strong>the</strong>individual logging on to view information already widely known. Id. Mr. Kravitz also argues that he– not PhoneDog – initially created <strong>the</strong> password and that PhoneDog did not make any reasonableefforts to maintain <strong>the</strong> secrecy of <strong>the</strong> password. Id.Additionally, Mr. Kravitz contends that PhoneDog has failed to allege any act by him thatfalls within <strong>the</strong> definition of misappropriation. 2 Mot. at 16. Ra<strong>the</strong>r, he argues that “PhoneDog onlymakes <strong>the</strong> conclusory allegation that Kravitz used ‘improper means, as such are defined in Civil Code§ 3426.1(a), 3 to obtain and misappropriate <strong>the</strong> Confidential Information’ without providing anyfactual support of <strong>the</strong> actual alleged improper act committed by Kravitz.” Id. (quoting Compl. 23).Finally, Mr. Kravitz argues that PhoneDog has failed to plead misappropriation withparticularity, as required by Rule 9(b) for any claim sounding in fraud. Mot. at 16. Again, Mr.2 California Civil Code section 3426.1(b) provides:(b) “Misappropriation” means:(1) Acquisition of a trade secret of ano<strong>the</strong>r by a person who knows or has reason to know that <strong>the</strong>trade secret was acquired by improper means; or(2) Disclosure or use of a trade secret of ano<strong>the</strong>r without express or implied consent by a personwho:(A) Used improper means to acquire knowledge of <strong>the</strong> trade secret; or(B) At <strong>the</strong> time of disclosure or use, knew or had reason to know that his or her knowledge of<strong>the</strong> trade secret was:(i) Derived from or through a person who had utilized improper means to acquire it;(ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use;or(iii) Derived from or through a person who owed a duty to <strong>the</strong> person seeking relief tomaintain its secrecy or limit its use; or(C) Before a material change of his or her position, knew or had reason to know that it was atrade secret and that knowledge of it had been acquired by accident or mistake.3 California Civil Code section 3426.1(a) provides: “‘Improper means’ includes <strong>the</strong>ft,bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, orespionage through electronic or o<strong>the</strong>r means. Reverse engineering or independent derivation aloneshall not be considered improper means.”9


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page10 of 15111UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728Kravitz asserts that PhoneDog has not alleged any facts regarding his conduct, but has merely allegedthat he used “improper means” to obtain and misappropriate <strong>the</strong> Twitter password. Mot. at 16-17.In its Opposition, PhoneDog contends that it has sufficiently stated its misappropriation oftrade secrets claim, arguing that it has alleged <strong>the</strong> existence of a trade secret in paragraphs 12 and 22of <strong>the</strong> Complaint. Opp’n at 10. It also contends that it has alleged that when it requested that Mr.Kravitz relinquish use of <strong>the</strong> Account, he “merely changed <strong>the</strong> Twitter handle on <strong>the</strong> Account,”continued to use <strong>the</strong> Account, and “used improper means, as such are defined in Civil Code section3426.1(a), to obtain and misappropriate <strong>the</strong> Confidential Information.” Opp’n at 11 (citing Compl. 17, 23).PhoneDog also disputes that Rule 9(b)’s heightened pleading standard applies to <strong>the</strong>misappropriation of trade secrets claim because <strong>the</strong> claim does not sound in fraud or mistake. Id.Finally, PhoneDog argues that Mr. Kravitz’s challenges to whe<strong>the</strong>r PhoneDog has aprotectable trade secret are beyond <strong>the</strong> scope of a 12(b)(6) motion and should be addressed onsummary judgment. Opp’n at 12.The Court has carefully considered <strong>the</strong> parties’ arguments and finds that Mr. Kravitz has notshown any basis for dismissal of <strong>the</strong> misappropriation of trade secrets claim under Rule 12(b)(6).With respect to <strong>the</strong> applicable pleading standard, although courts have applied conflicting standards,<strong>the</strong> Court finds that PhoneDog’s misappropriation claim does not sound in fraud or mistake and thusRule 9(b) does not control. See TMX Funding, Inc. v. Impero Tech., Inc., 2010 WL 2509979, at *2(N.D. Cal. June 17, 2010). PhoneDog has sufficiently described <strong>the</strong> subject matter of <strong>the</strong> trade secretwith sufficient particularity and has alleged that, despite its demand that Mr. Kravitz relinquish use of<strong>the</strong> password and Account, he has refused to do so. At this stage, <strong>the</strong>se allegations are sufficient tostate a claim. Fur<strong>the</strong>r, to <strong>the</strong> extent that Mr. Kravitz has challenged whe<strong>the</strong>r <strong>the</strong> password andAccount followers are trade secrets and whe<strong>the</strong>r Mr. Kravitz’s conduct constitutes misappropriationrequires consideration of evidence beyond <strong>the</strong> scope of <strong>the</strong> pleading. Thus, such challenges shouldbe raised at summary judgment on a fully-developed evidentiary record. The Court <strong>the</strong>reforeDENIES Mr. Kravitz’s request to dismiss PhoneDog’s misappropriation of trade secrets claim.10


112Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page11 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728b. Intentional Interference with Prospective Economic AdvantageMr. Kravitz next urges <strong>the</strong> Court to dismiss PhoneDog’s claim for intentional interferencewith prospective economic advantage, arguing that PhoneDog has failed to allege: (1) <strong>the</strong> existenceof an actual economic relationship between it and <strong>the</strong> Account followers; (2) an economic benefitwould have probably resulted had Mr. Kravitz not disrupted that relationship; and (3) any intentionalacts of Mr. Kravitz that actually disrupted <strong>the</strong> economic relationship. Mot. at 18.Under California law, to prevail on a claim for intentional interference with prospectiveeconomic advantage, a plaintiff must establish: (1) an economic relationship between <strong>the</strong> plaintiff andsome third party with <strong>the</strong> probability of future economic benefit to <strong>the</strong> plaintiffs; (2) <strong>the</strong> defendant’sknowledge of <strong>the</strong> relationship; (3) intentional acts, apart from <strong>the</strong> interference itself, by defendantdesigned to disrupt <strong>the</strong> relationship; (4) actual disruption of <strong>the</strong> relationship; and (5) economic harmto <strong>the</strong> plaintiff proximately caused by <strong>the</strong> acts of defendant. CRST Van Expedited v. Werner Enter.,Inc., 479 F.3d 1099, 1108 (9th Cir. 2007). “Interference with prospective economic advantagerequires a plaintiff to allege an act that is wrongful independent of <strong>the</strong> interference itself.” Bekele v.Ford, 2011 WL 4368566, at 11 (N.D. Cal. Sept. 17, 2011) (citing Della Penna v. Toyota MotorSales, 11 Cal. 4th 376, 392–93 (2007)). Notably, “[t]he tort of interference with prospectiveeconomic advantage does not, however, protect mere ‘potential’ relationships that are ‘at most a hopefor an economic relationship and a desire for a future benefit.’” Id. (quoting Westside Ctr. Assoc. v.Safeway Stores 23, Inc., 42 Cal. App. 4th 507, 527 (1996)).With respect to an economic relationship with <strong>the</strong> probability of future economic benefit,PhoneDog contends that in paragraph 29 of its Complaint, it has sufficiently alleged that “PhoneDoghas had and continues to enjoy relationships with existing and prospective users of its mobile newsand review services.” Opp’n at 13. However, <strong>the</strong> Court agrees with Mr. Kravitz that this allegationis conclusory and fails to meet <strong>the</strong> plausibility standard. In particular, it is unclear who <strong>the</strong> “users”are, .i.e., whe<strong>the</strong>r <strong>the</strong>y are <strong>the</strong> 17,000 Account followers, consumers accessing PhoneDog’s website,or some o<strong>the</strong>r individuals, and what <strong>the</strong> nature of PhoneDog’s purported economic relationship iswith <strong>the</strong>se users.11


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page12 of 15113UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728The Court also agrees with Mr. Kravitz that PhoneDog has failed to sufficiently allege actualdisruption of <strong>the</strong> relationship between it and its users and economic harm caused by Mr. Kravitz’sactions. In response to Mr. Kravitz’s challenge, PhoneDog cites to paragraph 30 of <strong>the</strong> Complaint.Opp’n at 14. However, this paragraph does not contain any facts regarding how Mr. Kravitz’sconduct disrupted PhoneDog’s relationship with its users or resulted in economic harm. In itsOpposition, PhoneDog also indicates that Mr. Kravitz’s conduct disrupted its economic relationshipswith its advertisers and cites to testimony from Tom Klein in support. Id. (citing Klein Decl. 3, 8).However, to <strong>the</strong> extent that Mr. Klein’s statements contain facts not alleged in PhoneDog’sComplaint, it is improper for <strong>the</strong> Court to consider such facts when assessing <strong>the</strong> adequacy ofPhoneDog’s allegations. If PhoneDog contends that an economic relationship existed between it andcustomers who advertised on its website, PhoneDog must allege such facts in its Complaint.Reviewing <strong>the</strong> entirety of PhoneDog’s Complaint, <strong>the</strong> Court finds that PhoneDog has failed to allegefacts regarding how Mr. Kravitz’s conduct disrupted its relationships and what economic harm itcaused. The Court <strong>the</strong>refore GRANTS Mr. Kravitz’s request to dismiss <strong>the</strong> misappropriation of tradesecrets claim.c. Negligent Interference with Prospective Economic AdvantageMr. Kravitz moves to dismiss PhoneDog’s claim for negligent interference with prospectiveeconomic advantage on <strong>the</strong> grounds that it has failed to sufficiently allege: (1) <strong>the</strong> existence of aneconomic relationship that would have probably resulted in economic benefit; or (2) a negligent actby Mr. Kravitz that actually disrupted that relationship. Mot. at 19. To state a claim for negligentinterference with prospective economic advantage, a plaintiff must allege: (1) an economicrelationship existed between <strong>the</strong> plaintiff and a third party which contained a reasonably probablefuture economic benefit or advantage to plaintiff; (2) <strong>the</strong> defendant knew of <strong>the</strong> existence of <strong>the</strong>relationship and was aware or should have been aware that if it did not act with due care its actionswould interfere with this relationship and cause plaintiff to lose in whole or in part <strong>the</strong> probablefuture economic benefit or advantage of <strong>the</strong> relationship; (3) <strong>the</strong> defendant was negligent; and (4)such negligence caused damage to plaintiff in that <strong>the</strong> relationship was actually interfered with or12


114Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page13 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728disrupted and plaintiff lost in whole or in part <strong>the</strong> economic benefits or advantage reasonablyexpected from <strong>the</strong> relationship. N. Am. Chem. Co. v. Super. Ct., 59 Cal. App. 4th 764, 786 (1997).With respect to <strong>the</strong> existence of an economic relationship and <strong>the</strong> causation elements, thisclaim suffers from <strong>the</strong> same pleading deficiencies as PhoneDog’s intentional interference claim. It is<strong>the</strong>refore subject to dismissal on this ground.Additionally, Mr. Kravitz argues that PhoneDog has failed to allege that he owed it a duty ofcare, which is a necessary element of <strong>the</strong> claim. Id. “The tort of negligent interference wi<strong>the</strong>conomic relationship arises only when <strong>the</strong> defendant owes <strong>the</strong> plaintiff a duty of care .... [A]mong<strong>the</strong> criteria for establishing a duty of care is <strong>the</strong> blameworthiness of <strong>the</strong> defendant’s conduct. Fornegligent interference, a defendant’s conduct is blameworthy only if it was independently wrongfulapart from <strong>the</strong> interference itself.” Lange v. TIG Ins. Co., 68 Cal. App. 4th 1179, 1187 (1998)(quotations omitted). With respect to PhoneDog’s allegation that Mr. Kravitz interfered with <strong>the</strong>economic relationship between it and its users, <strong>the</strong> Court agrees with Mr. Kravitz that PhoneDog hasfailed to allege that Mr. Kravitz owed it a duty of care. See AHO Enter., Inc. v. State Farm Mut.Auto. Ins. Co., 2008 WL 4830708, at *4 (N.D. Cal. Nov. 6, 2008) (granting dismissal of negligentinterference with economic advantage claim pursuant to 12(b)(6) because <strong>the</strong> complaint failed toallege that defendant owed a duty of care to <strong>the</strong> plaintiff). The claim is also subject to dismissal onthis basis. The Court <strong>the</strong>refore GRANTS Mr. Kravitz’s Motion with respect to PhoneDog’snegligent interference with prospective economic advantage claim.d. Conversion ClaimFinally, Mr. Kravitz urges <strong>the</strong> Court to dismiss PhoneDog’s conversion claim. Mot. at 19.Under California law, <strong>the</strong> elements of conversion are: (1) ownership of a right to possession ofproperty; (2) wrongful disposition of <strong>the</strong> property right of ano<strong>the</strong>r; and (3) damages. See G.S.Rasmussen & Assoc. v. Kalitta Flying Serv., 958 F.2d 896, 906 (9th Cir. 1992).Mr. Kravitz first argues that PhoneDog has failed to sufficiently allege that it owns or has <strong>the</strong>right to immediately possess <strong>the</strong> Account. Id. PhoneDog, however, maintains that it has adequatelyalleged that it was and still is <strong>the</strong> owner of <strong>the</strong> Account and is entitled to possession of <strong>the</strong> Account.13


Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page14 of 15115UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728Opp’n at 16. It points out that it has alleged that it gave Mr. Kravitz permission to use <strong>the</strong> Accountduring his employment, but he has refused to surrender <strong>the</strong> Account following his departure fromPhoneDog. Id. at 16-17 (citing Compl. 39-40). At this stage of <strong>the</strong> proceedings, <strong>the</strong> Court findsthat PhoneDog has adequately alleged that it owns or has <strong>the</strong> right to possess <strong>the</strong> Account. Asdiscussed above, <strong>the</strong> nature of that claim is at <strong>the</strong> core of this lawsuit and cannot be determined on <strong>the</strong>present record.Mr. Kravitz also argues that PhoneDog has failed to allege that Mr. Kravitz’s act ofconversion was done “knowingly” or “intentionally.” Mot. at 19-20. He fur<strong>the</strong>r contends that <strong>the</strong>conversion claim fails because PhoneDog informed him that he could continue to use <strong>the</strong> Accountand assented to his continued use after he separated from his employment with PhoneDog. Id. at 20.In its Opposition, PhoneDog responds that it has alleged that it expressly requested that Mr. Kravitzrelinquish use of <strong>the</strong> Account, but Mr. Kravitz merely changed <strong>the</strong> Twitter handle. Opp’n at 17(citing to Compl. 17). The Court agrees with PhoneDog that this allegation is sufficient forpurposes of alleging that <strong>the</strong> conversion was knowing or intentional.The Court <strong>the</strong>refore DENIES Mr. Kravitz’s request to dismiss PhoneDog’s conversion claim.IV. CONCLUSIONFor <strong>the</strong> reasons sets forth above, <strong>the</strong> Court GRANTS IN PART and DENIES IN PART Mr.Kravitz’s Motion to Dismiss (Dkt. No. 4) as follows.The Court DENIES WITHOUT PREJUDICE Mr. Kravitz’s Motion to Dismiss for lack ofsubject matter jurisdiction.The Court GRANTS Mr. Kravitz’s Motion to Dismiss PhoneDog’s claims for intentionalinterference with prospective economic advantage and negligent interference with prospectiveeconomic advantage with leave to amend.The Court DENIES Mr. Kravitz’s Motion in all o<strong>the</strong>r respects./ / // / // / /14


116Case3:11-cv-03474-MEJ Document28 Filed11/08/11 Page15 of 15UNITED STATES DISTRICT COURTFor <strong>the</strong> Nor<strong>the</strong>rn District of California12345678910111213141516171819202122232425262728PhoneDog shall file its First Amended Complaint no later than November 29, 2011.IT IS SO ORDERED.Dated: November 8, 201115_______________________________Maria-Elena JamesChief United States Magistrate Judge


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)117Synopsis587 F.Supp.2d 548United States District Court,S.D. New York.PURE POWER BOOT CAMP, et al., Plaintiffs,v.WARRIOR FITNESS BOOTCAMP, et al., Defendants.No. 08 Civ. 4810(JGK). | Oct. 23, 2008.Background: Former employer brought action seekingan injunction and damages, accusing former employeeof stealing employer's business model, customers, andinternal documents, breaching employee fiduciary duties,and infringing employer's trademarks, trade-dress, andcopyrights. Employee filed motion to preclude <strong>the</strong> use ordisclosure of thirty-four of employee's e-mails, obtained byemployer.Holdings: In adopting report and recommendation of UnitedStates Magistrate Judge Theodore H. Katz, <strong>the</strong> District Court,John G. Koeltl, J., held that:1 employer's access of employee's personal e-mails, whichwere stored and accessed directly from accounts maintainedby outside electronic communication service provider, wasunauthorized, and thus violated Stored Communications Act(SCA);2 crime-fraud exception to attorney-client privilege was notapplicable; and3 as a sanction for employer's violations of SCA, courtwould preclude employer from admitting e-mails as evidence,however, such evidence could be used for impeachmentpurposes should employee open <strong>the</strong> door.Order in accordance with opinion.Opinion*551 ORDERJOHN G. KOELTL, District Judge.The plaintiffs' motion for a preliminary injunction is deniedwithout prejudice to renewal.The parties were authorized to begin expedited discovery onor after October 13, 2008. The parties should provide <strong>the</strong>Court with a Scheduling Order by October 29, 2008.The Court has reviewed <strong>the</strong> Report and Recommendationof Magistrate Judge Katz dated August 22, 2008. Noobjections have been filed and <strong>the</strong> time for objections haspassed. Moreover, <strong>the</strong> Court finds that <strong>the</strong> Report andRecommendation is thorough and well founded and <strong>the</strong> Court<strong>the</strong>refore adopts it. Accordingly, <strong>the</strong> Court orders that <strong>the</strong>thirty-four of defendant Alexander Fell's e-mails obtained by<strong>the</strong> plaintiffs be precluded from use in <strong>the</strong> litigation, but notfor impeachment purposes should <strong>the</strong> defendants open <strong>the</strong>door. The plaintiffs are also directed to return or destroy allcopies of E-mail 28, and so certify.SO ORDERED.Report and RecommendationTHEODORE H. KATZ, United States Magistrate Judge.TO: HON. JOHN G. KOELTL, United States DistrictJudge.Plaintiffs bring this action seeking an injunction and damages,accusing Defendants of (1) stealing Plaintiffs' businessmodel, customers, and internal documents, (2) breachingemployee fiduciary duties, and (3) infringing Plaintiffs'trademarks, trade-dress, and copyrights. This case wasreferred to this Court for general pretrial management.Currently before <strong>the</strong> Court is Defendants' motion topreclude <strong>the</strong> use or disclosure of thirty-four of DefendantAlexander Fell's (“Fell”) e-mails, obtained by LaurenBrenner (“Brenner”), <strong>the</strong> principal and owner of <strong>the</strong> Plaintiffcorporations (“Plaintiffs”), and Fell's former employer.Defendants also seek an order requiring <strong>the</strong> e-mails'immediate return and attorneys' fees and costs.The parties have fully briefed <strong>the</strong> issues, and, on July 18,2008, <strong>the</strong> Court heard oral argument on <strong>the</strong> motion. Although<strong>the</strong> preclusion of evidence as a discovery sanction mightnormally be a non-dispositive matter for <strong>the</strong> Court to decideas part of its general pretrial supervision of a case, in this case,because of <strong>the</strong> potentially dispositive nature of <strong>the</strong> instantmotion and its evidentiary implications for matters before <strong>the</strong>District Court, <strong>the</strong> District Court has requested that this Courtprovide a Report and Recommendation containing findings© 2012 Thomson Reuters. No claim to original U.S. Government Works. 1


118Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)of fact, an analysis of <strong>the</strong> legal issues, and a discussion of <strong>the</strong>range of possible remedies available to <strong>the</strong> Court.As explained in greater detail below, <strong>the</strong> Court concludes thatBrenner accessed Fell's e-mails without authorization, in whatwould be a violation of <strong>the</strong> Stored Communications Act, 18U.S.C. § 2707, had a cause of action been brought pursuantto that statute. The Court also concludes that, pursuant to itsinherent equitable authority over <strong>the</strong> litigation process, <strong>the</strong>e-mails should be precluded, in part or in whole. Finally,<strong>the</strong> Court concludes *552 that one e-mail is protectedby <strong>the</strong> attorney-client privilege and should be returned toDefendants.BACKGROUNDFell was hired by Brenner in August of 2005, and worked atPure Power Boot Camp (“PPBC”), a physical fitness center,until March 16, 2008, when Brenner fired him. On April 1,2008, Defendant Ruben Belliard (“Belliard”), who is nowFell's business partner, and was also employed at PPBC,entered Brenner's office when she was not <strong>the</strong>re, stayed <strong>the</strong>refor half an hour, called Brenner on her office telephone, andquit. 1 A few months before he left his employ at PPBC,Belliard entered Brenner's office, again when she was notpresent, removed a copy of a restrictive covenant he hadsigned, and shredded it. (See Belliard Aff. 31.) Soon afterFell and Belliard left PPBC, <strong>the</strong>y opened a competing fitnesscenter, Warrior Fitness Boot Camp (“WFBC”), toge<strong>the</strong>rwith <strong>the</strong>ir girlfriends—Defendants Jennifer Lee (“Lee”) andNancy Baynard (“Baynard”).After Fell and Belliard were no longer working atPPBC, Brenner, on April 28, 2008, and for a week<strong>the</strong>reafter, accessed and printed e-mails from three of Fell'spersonal accounts: “kappamarine@hotmail.com” (“Hotmailaccount”), “kappamarine@gmail.com” (“Gmail account”),and “alex@warriorfitnessbootcamp. com” (“WFBCaccount”). (See Brenner July 10 Aff. 22; see also Exhibit(“Ex.”) A, annexed to Declaration of Daniel Schnapp,Esq. (“Schnapp Decl.”), dated July 1, 2008, E-mails 1–34;Transcript of Oral Argument, dated July 18, 2008 (“Tr.”), at14–15.) 2Brenner states that she was able to access Fell's Hotmailaccount because he left his username and passwordinformation stored on PPBC's computers, such that, when <strong>the</strong>Hotmail website was accessed, <strong>the</strong> username and passwordfields were automatically populated, (See Brenner July 10Aff. 13.) She also alleges that Fell gave his username andpassword to ano<strong>the</strong>r PPBC employee, Elizabeth Lorenzi, sothat she could check on an Ebay sale he was conducting. (SeeAffidavit of Elizabeth Lorenzi, dated July 10, 2008 (“LorenziAff.”), 3, 6.) Plaintiffs allege, and Fell does not deny, thatFell accessed his Hotmail account while at work at PPBC,which is how his username and password came to be storedon <strong>the</strong> company's computers. At oral argument, Plaintiffsadmitted that Brenner was able to access Fell's Gmail accountbecause <strong>the</strong> username and password for <strong>the</strong> Gmail accountwere sent to Fell's Hotmail account, which Brenner accessed.(See Tr. at 17.) Brenner also explained that she was able toaccess Fell's WFBC account by making a “lucky guess” at hispassword, which turned out to be <strong>the</strong> same password he usedfor his o<strong>the</strong>r accounts. (See id. at 15–16.)Plaintiffs have an Employee Handbook which explicitlyaddresses e-mail access on company computers. It states:“e-mail users have no right of personal privacy in anymatter stored in, created on, received from, or sentthrough or over <strong>the</strong> system. This includes <strong>the</strong> use ofpersonal e-mail accounts on Company equipment. TheCompany, in its discretion as owner of <strong>the</strong> E–Mailsystem, reserves <strong>the</strong> right to review, monitor, access,retrieve, *553 and delete any matter stored in, createdon, received from, or sent through <strong>the</strong> system, for anyreason, without <strong>the</strong> permission of any system user, andwithout notice.”(Ex. A, annexed to Supplemental Affidavit of LaurenBrenner, dated June 6, 2008 (“Brenner June 6 Aff.”)(emphasis added).) An additional part of <strong>the</strong> policy states:“Internet access shall not be utilized for shopping orfor conducting o<strong>the</strong>r transactions or personal businessmatters.” (Id.) Plaintiffs have not conducted a forensicevaluation of <strong>the</strong> company computers to determine what e-mails Fell actually received, sent through, read, or accessedfrom <strong>the</strong> company's computers. (See Tr. at 22,)E-mails 1–26 and 28, were obtained from Fell's Hotmailaccount; of those, E-mails 1–13 and 16 are dated prior toMarch 16, 2008, <strong>the</strong> date Fell stopped working at PPBC, E-mails 27, 29–31, 33, and 34 were obtained from Fell's Gmailaccount. E-mail 32 was obtained from Fell's e-mail accountat WFBC.Fell states in his affidavit that all of <strong>the</strong> e-mails were draftedor received on his own home computer. (See Affidavit of AlexFell, dated July 1, 2008 (“Fell Aff.”), 5.) Fell denies tha<strong>the</strong> ever gave his Hotmail information to anyone at PPBC.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 2


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)119(See id. 4.) Fell does not deny, however, that he may haveviewed some of his e-mails on PPBC's computers while hewas working <strong>the</strong>re.While it is not possible to determine from <strong>the</strong> submissionswhen <strong>the</strong> e-mails were read, <strong>the</strong>y do indicate <strong>the</strong> date andtime <strong>the</strong>y were sent. E-mails sent by Fell indicate that <strong>the</strong>ywere sent at all times during <strong>the</strong> day, on various days of <strong>the</strong>week. For example, E-mail 4 shows that Fell sent a messageon Monday, February 11, 2008 at 3:09 p.m. in <strong>the</strong> afternoon.E-mail 6 was sent on Wednesday, February 20, 2008 at 2:37p.m. On Thursday, February 28, 2008, Fell sent E-mail 9 at3:35 in <strong>the</strong> morning. E-mail 16 was sent <strong>the</strong> day before Fellwas fired, Saturday, March 15, 2008 at 5:06 p.m. Each of<strong>the</strong>se e-mails relates to, or discusses his efforts to set up hiscompeting business—WFBC. 3Plaintiffs have relied heavily upon <strong>the</strong> e-mails and haveconsidered <strong>the</strong>m critical to <strong>the</strong>ir case. The e-mails provide adetailed picture of Fell's and Belliard's efforts to set up WFBCbefore <strong>the</strong>y left PPBC, <strong>the</strong> work that Lee and Baynard did tosupport those efforts—including recruiting PPBC clients forWFBC while <strong>the</strong>y <strong>the</strong>mselves were still clients of PPBC, and<strong>the</strong> fallout after Fell and Belliard left PPBC. For example, E-mail 29 is a candid admission that Belliard shredded his noncompetecontract with PPBC, a fact Defendants attempted toavoid revealing during prior state court proceedings. (See Ex.B annexed to Declaration of Daniel Schnapp, dated July 3,2008, transcript of proceedings before Hon. Helen Freedman,New York Supreme Court, dated May 8, 2008 (“NY Tr.”),at 28.) E-mail 21 shows a dramatic expansion of WFBC'scustomer list, and includes a large number of former PPBCclients and <strong>the</strong>ir e-mail addresses, which Plaintiffs rely uponto show that Belliard stole PPBC's client list. (See Declarationof Richard Herzfeld, Esq., dated July 11, 2008, 25.)Some of <strong>the</strong> e-mails were sent to, or received from,Defendants' attorneys. (See E-mails 12, 13, 14, 28.) 4 E-mail13 *554 was sent from a legal assistant at Fox Rothschild,Defendants' counsel, attaching an IRS document containingWFBC's employer ID number. E-mail 14, from <strong>the</strong> sameparalegal, attached WFBC's Articles of Organization, andinformed Fell that <strong>the</strong>y were filed with <strong>the</strong> State of New York.E-mail 28 is from an attorney at Fox Rothschild, and appearsto have been printed from Fell's “sent” file; it is part of an e-mail chain consisting of back-and-forth e-mails from <strong>the</strong> sameFox Rothschild attorney, and contains advice about how tohandle telephone calls from Brenner.When Plaintiffs first filed suit seeking a temporary restrainingorder and preliminary injunction in state court, <strong>the</strong>y used <strong>the</strong>challenged e-mails as exhibits. However, at <strong>the</strong> time <strong>the</strong> e-mails were provided to Defendants, <strong>the</strong> bottom part of <strong>the</strong>page, which shows when an e-mail was printed, was obscuredor removed. (See all e-mails in Ex. A.) Defendants allege thatthis amounts to spoliation of evidence. In response, duringoral argument, Plaintiffs stated that <strong>the</strong>y had <strong>the</strong> originalcopies of <strong>the</strong> e-mails, showing when <strong>the</strong>y were printed, andagreed to provide unredacted copies to Defendants. (See Tr.at 33–34.)DISCUSSIONDefendants seek <strong>the</strong> preclusion and return of Fell'se-mails, claiming that Brenner violated <strong>the</strong> ElectronicCommunications Privacy Act, 18 U.S.C. § 2510 (“ECPA”),<strong>the</strong> Stored Communications Act, 18 U.S.C. § 2707 (“SCA”),and New York Penal Law § 250.05, when she accessed Fell'se-mail accounts. Defendants also argue that some e-mailsare protected by attorney-client privilege. Finally, Defendantsargue that Plaintiffs' production of <strong>the</strong> e-mails with <strong>the</strong> dateson which <strong>the</strong>y were printed obscured, amounts to spoliationof evidence, fur<strong>the</strong>r justifying preclusion.Plaintiffs argue that <strong>the</strong> ECPA and New York Penal Lawdo not apply, and that, in any event, Fell gave impliedconsent which authorized Brenner's access. Plaintiffs alsoargue that <strong>the</strong> crime-fraud exception to confidentiality shouldapply not only to any e-mails covered by <strong>the</strong> attorney-clientprivilege, but to all <strong>the</strong> e-mails accessed by Brenner. Finally,Plaintiffs argue that <strong>the</strong> redaction of <strong>the</strong> printing dates doesnot constitute sanctionable spoliation.It is important to note from <strong>the</strong> outset, that this is not asituation in which an employer is attempting to use e-mailsobtained from <strong>the</strong> employer's own computers or systems.Ra<strong>the</strong>r, <strong>the</strong> e-mails at issue here were stored and accesseddirectly from accounts maintained by outside electroniccommunication service providers. Fur<strong>the</strong>rmore, Defendantshave not directly asserted any claims under <strong>the</strong> statutes<strong>the</strong>y allege Brenner violated, and instead, appeal only to<strong>the</strong> Court's inherent equitable authority to preclude evidencewrongfully obtained, outside of <strong>the</strong> litigation process, frombeing used in <strong>the</strong> litigation. Thus, while Defendants invokefederal and state law, those laws are invoked solely for <strong>the</strong>Court to consider as part of <strong>the</strong> process of weighing <strong>the</strong>competing equitable considerations raised by <strong>the</strong> conduct ofboth sides to this dispute.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 3


120Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)I. The StatutesAll three of <strong>the</strong> statutes Defendants rely upon are criminalstatutes that also provide relief to aggrieved parties in civilcauses of action. Of <strong>the</strong> three statutes, however, only <strong>the</strong>Stored Communications Act is applicable.*555 A. The Stored Communications Act1 The Stored Communications Act, 18 U.S.C. § 2701, et seq.(“SCA”), part of <strong>the</strong> Wiretap Act, provides in part:(a) Offense.—Except as provided in subsection (c) of thissection whoever—(1) intentionally accesses without authorization a facilitythrough which an electronic communication service isprovided; or(2) intentionally exceeds an authorization to access thatfacility; and <strong>the</strong>reby obtains, alters, or prevents authorizedaccess to a wire or electronic communication while it isin electronic storage in such system shall be punished asprovided in subsection (b) of this section.18 U.S.C.A. § 2701 (emphasis added). The Act “aims toprevent hackers from obtaining, altering or destroying certainstored electronic communications.” In re DoubleClick Inc.Privacy Litigation, 154 F.Supp.2d 497, 507 (S.D.N.Y.2001)(citing Sherman & Co. v. Salton Maxim Housewares, Inc.,94 F.Supp.2d 817, 820 (E.D.Mich.2000)). Thus, a personviolates <strong>the</strong> SCA if she accesses an electronic communicationservice, or obtains an electronic communication while it isstill in electronic storage, without authorization.“Electronic storage,” defined in an earlier part of <strong>the</strong>Wiretap Act is: “(A) any temporary, intermediate storageof a wire or electronic communication incidental to <strong>the</strong>electronic transmission <strong>the</strong>reof; and (B) any storage of suchcommunication by an electronic communication service forpurposes of backup protection of such communication ....”18 U.S.C. §§ 2510(17), 2711(1) (definitions of Wiretap Actapplicable to Stored Communications Act).The majority of courts which have addressed <strong>the</strong> issue havedetermined that e-mail stored on an electronic communicationservice provider's systems after it has been delivered, asopposed to e-mail stored on a personal computer, is astored communication subject to <strong>the</strong> SCA. See United Statesv. Councilman, 418 F.3d 67, 79 (1st Cir.2005) (en banc)(describing in detail <strong>the</strong> nature of e-mail, and concludingthat “<strong>the</strong> term ‘electronic communication’ includes transientelectronic storage that is intrinsic to <strong>the</strong> communicationprocess for such communications.”); see also Fraser v.Nationwide Mut. Ins. Co., 352 F.3d 107, 115 (3rd Cir.2003)(holding that e-mail stored on <strong>the</strong> defendant's system wassubject to <strong>the</strong> SCA); cf. Hall v. EarthLink Network, Inc.,396 F.3d 500, 503 n. 1 (2d Cir.2005) (finding unpersuasive<strong>the</strong> argument that an e-mail in storage is not an “electroniccommunication”).In a case analogous to this one, Bailey v. Bailey, No. 07 Civ.11672, 2008 WL 324156 (E.D.Mich. Feb. 6, 2008), <strong>the</strong> exhusbanddefendant installed a keystroke logger on a computershared by him and his <strong>the</strong>n-wife, which allowed him to learnher password to her Yahoo account (among o<strong>the</strong>rs), andwhich he used to access her e-mail directly from her Yahooaccount. See id. at *3. The wife filed suit pursuant to <strong>the</strong>SCA, as well as under 18 U.S.C. § 2511, <strong>the</strong> ECPA. See id.The court denied a motion for summary judgment brought by<strong>the</strong> defendant, who claimed that nei<strong>the</strong>r statute applied, anddetermined that e-mails, “received by <strong>the</strong> intended recipientwhere <strong>the</strong>y remain stored by an electronic communicationservice,” are covered by <strong>the</strong> SCA. Id. at *6 (citing Theofel v.Farey–Jones, 359 F.3d 1066 (9th Cir.2003)).In this case, Brenner obtained Fell's username and passwordto his Hotmail account because he left that information storedon Plaintiffs' computers. She <strong>the</strong>n used that information to gointo his Hotmail account, and read and printed his e-mails.Some of those e-mails may have been read by Fell while hewas at work, but <strong>the</strong>re is no evidence indicating which *556e-mails he may have viewed on Plaintiffs' computers, and<strong>the</strong>re is no evidence that <strong>the</strong> e-mails were downloaded ontoPPBC's computers. At most, only e-mails dated prior to hislast day of work could have been viewed by him and thuspotentially stored on <strong>the</strong> company's systems.In any event, Brenner did not use an examination of PPBC'scomputer's memory to determine what Fell accessed at work.Instead, she logged directly onto Microsoft's Hotmail systemwhere <strong>the</strong> e-mails were stored, and viewed and printed <strong>the</strong>mdirectly off of Hotmail's system. She accessed Fell's o<strong>the</strong>raccounts in <strong>the</strong> same manner, and <strong>the</strong>re is no evidenceindicating that Fell accessed his Gmail or WFBC accountsat any time while he worked at PPBC. By Plaintiffs' ownadmission, Brenner obtained <strong>the</strong> username and password for<strong>the</strong> Gmail account from Fell's Hotmail account, and made a“lucky guess” that Fell would use <strong>the</strong> same password for allthree accounts, including his WFBC account.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 4


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)121Thus, Brenner accessed three separate electroniccommunication services, and she obtained Fell's e-mails while <strong>the</strong>y were in storage on those serviceproviders' systems. Ei<strong>the</strong>r of those actions, if done withoutauthorization, would be a violation of <strong>the</strong> SCA. See WyattTechnology Corp. v. Smithson, No. CV 05–1309(DT), 2006WL 5668246, *9 (C.D.Cal. Aug.14, 2006) (granting summaryjudgment in favor of counter-claimant alleging that <strong>the</strong>plaintiff violated <strong>the</strong> SCA by accessing <strong>the</strong> defendant'spersonal e-mail on a private foreign server, and monitoring<strong>the</strong> personal e-mail account, without authorization).B. The Electronic Communications Privacy Act2 The Electronic Communications Privacy Act, 18 U.S.C.§§ 2510–2511 (“ECPA”), creates criminal sanctions anda civil cause of action against persons who “intercept”electronic communications. 5 In <strong>the</strong> context of unauthorizedaccess to e-mail, <strong>the</strong> question that courts have struggled withis determining whe<strong>the</strong>r one can “intercept” an e-mail that hasalready been delivered. The Second Circuit has not directlyaddressed this question, but has discussed <strong>the</strong> issue in at leastone case. See Hall, 396 F.3d at 503 n. 1.In Hall, <strong>the</strong> Second Circuit held that <strong>the</strong> ECPA wasapplicable to <strong>the</strong> e-mails at issue because “<strong>the</strong> case involve[d]<strong>the</strong> continued receipt of e-mail messages ra<strong>the</strong>r than <strong>the</strong>acquisition of previously stored electronic communication.”396 F.3d at 503 n. 1 (emphasis in original). The Circuitwas unpersuaded by <strong>the</strong> defendant's argument that “an‘interception’ [as required by <strong>the</strong> ECPA,] can only occurwhen messages are in transit,” but did not elaborate fur<strong>the</strong>r.Id. Ra<strong>the</strong>r, it factually distinguished <strong>the</strong> cases cited by <strong>the</strong>defendant—which held that e-mails no longer in transitcannot be “intercepted.” See id. (distinguishing: Fraser, 352F.3d at 110; United States v. Steiger, 318 F.3d 1039, 1048–49 (11th Cir.2003); Konop v. Hawaiian Airlines, Inc., 302F.3d 868, 873, 876–79 (9th Cir.2002); Steve Jackson Games,Inc. v. United States Secret Serv., 36 F.3d 457, 460–64 (5thCir.1994)).Hall is itself factually distinguishable from this case.Hall involved <strong>the</strong> continued *557 and contemporaneousacquisition of e-mails as part of <strong>the</strong> ordinary course of <strong>the</strong>defendant's business—which was <strong>the</strong> internet communicationservice provider for <strong>the</strong> e-mails in question. See id. Here,PPBC is not an internet communications provider, andBrenner did not access <strong>the</strong> e-mails on a continuous basis,contemporaneous with <strong>the</strong>ir transmission. Ra<strong>the</strong>r, by <strong>the</strong> timeBrenner viewed <strong>the</strong> e-mails, <strong>the</strong>y had been delivered to Fell'saccounts, and may have already been viewed by him; thus,<strong>the</strong>y were “previously stored electronic communications”—precisely <strong>the</strong> situation which Hall relied upon to distinguish<strong>the</strong> decisions <strong>the</strong> defendants relied upon in that case. See id.O<strong>the</strong>r courts which have considered <strong>the</strong> question of whe<strong>the</strong>raccessing an electronic communication that has alreadybeen delivered is “intercepted,” have found that <strong>the</strong> ECPAdoes not apply. See Fraser, 352 F.3d at 113–14 (holdingthat <strong>the</strong> defendant did not “intercept” <strong>the</strong> plaintiff's e-mail by accessing e-mail stored on its central file server,because “an ‘intercept’ under <strong>the</strong> ECPA must occurcontemporaneously with transmission”); Steiger, 318 F.3d at1048–49 (declining to suppress evidence obtained by a hackerfrom defendant's computer, pursuant to <strong>the</strong> ECPA, because“a contemporaneous interception—i.e., an acquisition during“flight”—is required to implicate <strong>the</strong> [ECPA] with respectto electronic communications”); Konop, 302 F.3d at 873,878–80 (noting subsequent changes in <strong>the</strong> Wiretap Actsupport <strong>the</strong> conclusion that accessing a secure website did notconstitute an “interception” of an electronic communicationunder <strong>the</strong> ECPA, and narrowly defined interception as“contemporaneous interception”).As <strong>the</strong> court in Bailey explained: “The general reasoningbehind <strong>the</strong>se decisions is that based on <strong>the</strong> statutorydefinition and distinction between ‘wire communication’and ‘electronic communication,’ <strong>the</strong> latter of whichconspicuously does not include electronic storage, Congressintended for electronic communications in storage to behandled solely by <strong>the</strong> Stored Communications Act.” Bailey,2008 WL 324156, at *4; see also Fraser, 352 F.3d at 113–14(explaining <strong>the</strong> statutory interpretation issues). Thus, in thosecases which have examined whe<strong>the</strong>r <strong>the</strong> ECPA or <strong>the</strong> SCAshould apply to delivered e-mails, courts have concluded that<strong>the</strong> SCA, not <strong>the</strong> ECPA, is <strong>the</strong> proper statute to apply insituations similar to this case. See Steiger, 318 F.3d at 1049(noting that “<strong>the</strong> SCA may apply [in this case] to <strong>the</strong> extent<strong>the</strong> source accessed and retrieved any information stored withSteiger's Internet service provider”).Defendants concede that <strong>the</strong> ECPA has a requirement ofcontemporaneous interception. (See Tr. at 12.) None<strong>the</strong>less,Defendants suggest that Brenner's access to Fell's e-mail was“contemporaneous” if it occurred during some undefined,short period of time after <strong>the</strong> e-mail had been delivered. (SeeTr. at 12–13.) However, <strong>the</strong>y have not provided any authorityfor that proposition, nor have <strong>the</strong>y suggested how long a“contemporaneous time frame” would be. (Id.) In any event,© 2012 Thomson Reuters. No claim to original U.S. Government Works. 5


122Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)<strong>the</strong>re is no evidence of when Brenner accessed Fell's e-mails,but its clear that <strong>the</strong> majority of <strong>the</strong> e-mails were sent orreceived prior to April 28, 2008, <strong>the</strong> earliest date that Brenneradmits that she accessed and printed <strong>the</strong>m. Additionally, <strong>the</strong>reis no evidence that <strong>the</strong> later e-mails were intercepted at <strong>the</strong>same time that <strong>the</strong>y were delivered. Ra<strong>the</strong>r, <strong>the</strong> evidenceindicates that Brenner periodically accessed Fell's e-mailaccounts and printed e-mails after <strong>the</strong>y had been delivered.Applying <strong>the</strong> definition of “intercept” accepted by <strong>the</strong>majority of courts to have examined <strong>the</strong> issue, <strong>the</strong> Courtconcludes that Brenner did not access and print *558 Fell'se-mails contemporaneous with <strong>the</strong>ir transmission. See Fraser,352 F.3d at 113–14. Therefore, <strong>the</strong> Court concludes thatBrenner did not violate <strong>the</strong> ECPA.C. New York Eavesdropping and Civil Procedure LawsDefendants argue that Brenner also violated New York'seavesdropping law, and, pursuant to a New York proceduralrule, Fell's e-mails should be precluded. New York Penal Law§ 250.05 makes it a crime for a person to “unlawfully engagein wiretapping, ... or intercepting or accessing [an] electroniccommunication.” N.Y. Penal Law § 250.05 (McKinney2008). New York Civil Practice Law and Rule § 4506(“CPLR § 4506”) states:“The contents of any overheard or recordedcommunication, conversation or discussion, or evidencederived <strong>the</strong>refrom, which has been obtained by conductconstituting <strong>the</strong> crime of eavesdropping, as defined bysection 250.05 of <strong>the</strong> penal law, may not be received inevidence in any trial, hearing or proceeding before anycourt ....”N.Y. C.P.L.R. § 4506 (Consol.2008).3 If a party to a civil action seeks preclusion pursuant to §4506, it must bring a motion “before a justice of <strong>the</strong> supremecourt ....” Id. at § 4506(4). In contrast to <strong>the</strong> federal laws, NewYork's rule does not provide a separate civil cause of action,but, ra<strong>the</strong>r, is only a vehicle through which evidence may beexcluded in an underlying case. See id. It also does not providefor damages, attorneys' fees, costs, or any remedy o<strong>the</strong>r thanexclusion of <strong>the</strong> evidence. See id.There is a notable dearth of state law construing CPLR §4506. Defendants have not cited, and <strong>the</strong> Court has not found,any published cases applying CPLR § 4506 to unauthorizedaccess to e-mail. On its face, however, <strong>the</strong> statute does notappear to apply in this situation. The plain language of<strong>the</strong> statute seems to limit its application to <strong>the</strong> contents ofan “overheard or recorded communication.” CPLR § 4506.Fur<strong>the</strong>rmore an aggrieved person is defined as one whose“communication, conversation or discussion was unlawfullyoverheard or recorded.” Id. at § 4506(3)(a). In addition, <strong>the</strong>statute only makes reference to “telephonic or telegraphiccommunication[s],” not electronic communications. Id. at §4506(2)(a). This language seems to limit <strong>the</strong> application of<strong>the</strong> statute to communications obtained aurally, ra<strong>the</strong>r than toelectronic communications such as e-mail. 6Fur<strong>the</strong>rmore, nei<strong>the</strong>r party has briefed <strong>the</strong> fundamental andmore complex issue of whe<strong>the</strong>r CPLR § 4506, a rulegoverning <strong>the</strong> exclusion of evidence in New York statecourts, ought to be applied by this Court pursuant to ErieR. Co. v. Tompkins, 304 U.S. 64, 58 S.Ct. 817, 82 L.Ed.1188 (1938). 7 Cf. United States v. Canniff, 521 F.2d 565,568 (2d Cir.1975) (“Under New York law (which, however,is not controlling in this federal proceeding), [evidence]of a youthful offender adjudication for <strong>the</strong> purpose ofimpeachment is prohibited ....” (internal citation omitted)).Ultimately, a determination of <strong>the</strong> meaning of CPLR § 4506is unnecessary, and better left to <strong>the</strong> New York state courts.The Court could preclude use of <strong>the</strong> e-mails pursuant to <strong>the</strong>SCA or its inherent authority, without applying CPLR § 4506.Thus, <strong>the</strong>re is no need to resolve <strong>the</strong> issues *559 of whe<strong>the</strong>rCPLR § 4506 is applicable to this action and, if so, whe<strong>the</strong>rit mandates <strong>the</strong> preclusion of <strong>the</strong> e-mails.D. AuthorizationAccessing and obtaining e-mails directly from an electroniccommunication service provider is a violation of <strong>the</strong> SCA ifdone without authorization. Having determined that <strong>the</strong> SCAis applicable to Brenner's conduct, she <strong>the</strong>refore may not haveviolated <strong>the</strong> SCA if she was authorized to access Fell's e-mailaccounts.Plaintiffs argue that Brenner was authorized to view andprint Fell's e-mails, and assert two <strong>the</strong>ories in support ofthis position. First, Plaintiffs claim that PPBC's e-mail policyput Fell on notice that his e-mails could be viewed byBrenner, and thus he had no expectation of privacy in hisHotmail account. Second, Plaintiffs argue that even if hehad an expectation of privacy, Fell, by leaving his usernameand password on PPBC's computers, gave Brenner impliedconsent to access his accounts.Defendants respond by denying that Fell gave PPBC, orany of its agents or employees, authorization to access his© 2012 Thomson Reuters. No claim to original U.S. Government Works. 6


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)123accounts, and specifically deny that Fell gave his usernameand password to Brenner's assistant. Defendants also denythat PPBC had its e-mail policy in place during Fell'semployment, and suggest that it is a recent creation byBrenner. (See Tr. at 4–5.) In any event, <strong>the</strong>y argue that it doesnot cover e-mails sent after Fell left PPBC's employ.Brenner claims Fell had no expectation of privacy in his e-mails and that Fell gave implied consent to unlimited access toall of Fell's personal e-mail accounts, with no time constraints(not even for <strong>the</strong> period after Fell's employment at PPBCended), based on her assertion that Fell accessed his personalHotmail account, at least once, on Plaintiffs' computer. Thesearguments have no sound basis in fact, law, or logic.As an initial matter, Plaintiffs' position is not supported byPPBC's policy. PPBC's e-mail policy—<strong>the</strong> basis of Plaintiffs'consent defense—is, by its own terms, limited to “Companyequipment.” The reservation of rights is explicitly limitedto “any matter stored in, created on, received from, or sentthrough [PPBC's] system.” 8 Therefore, it could not applyto e-mails on systems maintained by outside entities suchas Microsoft or Google. In addition, <strong>the</strong>re is no evidencethat <strong>the</strong> e-mails in issue were created on, sent through,or received from PPBC's computers. Moreover, Plaintiffs'position makes no distinction between <strong>the</strong> Hotmail accountFell accessed while at work, and <strong>the</strong> o<strong>the</strong>r accounts, which byall appearances were never accessed by Fell at work, and maynot even have existed until after he left PPBC's employ.Plaintiffs' position-that Brenner was authorized to accessFell's e-mails on his personal e-mail service providers'systems through his implied consent—also has no supportin <strong>the</strong> law. To understand <strong>the</strong> basis of Plaintiffs' argument,and why it has no legal support, it is important to firstunderstand <strong>the</strong> framework within which <strong>the</strong> typical employeee-mail case usually arises. Courts have routinely found thatemployees have no reasonable expectation of privacy in <strong>the</strong>irworkplace computers, *560 where <strong>the</strong> employer has a policywhich clearly informs employees that company computerscannot be used for personal e-mail activity, and that <strong>the</strong>ywill be monitored. See United States v. Simons, 206 F.3d392, 398 (4th Cir.2000) (“Therefore, regardless of whe<strong>the</strong>rSimons subjectively believed that <strong>the</strong> files he transferred from<strong>the</strong> Internet were private, such a belief was not objectivelyreasonable after FBIS notified him that it would be overseeinghis Internet use.”); Thygeson v. U.S. Bancorp, No. CV–03–467–ST, 2004 WL 2066746, *21 (D.Or. Sept.15, 2004)(“when, as here, an employer accesses its own computernetwork and has an explicit policy banning personal use ofoffice computers and permitting monitoring, an employee hasno reasonable expectation of privacy.”); Muick v. GlenayreElectronics, 280 F.3d 741, 743 (7th Cir.2002) (“But Glenayrehad announced that it could inspect <strong>the</strong> laptops that itfurnished for <strong>the</strong> use of its employees, and this destroyedany reasonable expectation of privacy that Muick might havehad and so scotches his claim.”). In <strong>the</strong>se cases, because<strong>the</strong> employee had no reasonable expectation of privacy, <strong>the</strong>employer did not need consent to search <strong>the</strong> employee'scomputer files.4 This is not, however, a case where an employee was usingan employer's computer or e-mail system, and <strong>the</strong>n claimedthat <strong>the</strong> e-mails contained on <strong>the</strong> employer's computers areprivate. Here, <strong>the</strong> employee—Fell—did not store any of <strong>the</strong>communications which his former employer now seeks to useagainst him on <strong>the</strong> employer's computers, servers, or systems;nor were <strong>the</strong>y sent from or received on <strong>the</strong> company e-mailsystem or computer. These e-mails were located on, andaccessed from, third-party communication service providersystems. There is not even an implication that Fell's personale-mail accounts were used for PPBC work, or that PPBC paidor supported Fell's maintenance of those accounts. See, e.g.,Rozell v. Ross–Hoist, No. 05 Civ. 2936(JGK)(JCF), 2006 WL163143, *2–3 (S.D.N.Y. Jan. 20, 2006) (ordering productionof e-mails taken from a personal third-party communicationservice provider account, which served as a back-up for workrelated communications). Fur<strong>the</strong>rmore, <strong>the</strong>re is nothing in<strong>the</strong> PPBC policy that even suggests that if an employeesimply views a single, personal e-mail from a third partye-mail provider, over PPBC computers, <strong>the</strong>n all of <strong>the</strong> hispersonal e-mails on whatever personal e-mail accounts heuses, would be subject to inspection. In short, this case isdistinguishable from those cases which hold that employeeshave no expectation of privacy in e-mails sent from orreceived and stored on <strong>the</strong> employer's computers.Even in cases involving an employer's search of anemployee's work computer, courts have held that, undercertain circumstances, employees have a reasonableexpectation of privacy in <strong>the</strong> contents of <strong>the</strong>ir work computer.For example, in Leventhal v. Knapek, 266 F.3d 64, 74 (2dCir.2001), <strong>the</strong> Second Circuit held that an employee hada reasonable expectation of privacy in <strong>the</strong> contents of hiscomputer where <strong>the</strong> employee occupied a private officewith a door, had exclusive use of <strong>the</strong> computer in hisoffice, and did not share use of his computer with o<strong>the</strong>remployees or <strong>the</strong> public, notwithstanding <strong>the</strong> fact that <strong>the</strong>rewas a policy which “prohibited ‘using’ state equipment ‘forpersonal business.’ ” In Leventhal, <strong>the</strong>re was no clear policy© 2012 Thomson Reuters. No claim to original U.S. Government Works. 7


124Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)or practice regarding regular monitoring of work computers;technical staff conducted infrequent and selective searches formaintenance purposes only. See id.In Curto v. Medical World Communications, No. 03 Civ.6327 (DRH) (MLO), 2006 WL 1318387 (E.D.N.Y. May 15,2006), <strong>the</strong> employer hired a forensic consultant *561 torestore portions of <strong>the</strong> computer files that <strong>the</strong> employee haddeleted, nearly two years earlier, from a home-based workcomputer, including e-mails of communications with <strong>the</strong>employee's lawyer. See id. at *1. Even though <strong>the</strong> computerbelonged to <strong>the</strong> employer, and <strong>the</strong> employer had a policythat warned employees <strong>the</strong>y had no reasonable expectationof privacy in “anything <strong>the</strong>y create, store, send, or receivedon <strong>the</strong> computer, or through <strong>the</strong> Internet or any computernetwork,” <strong>the</strong> employee successfully asserted attorney-clientprivilege over those e-mails, in part because she had areasonable expectation of privacy in a home-computer whichwas not connected to <strong>the</strong> employer's network. See id. at *8.And, in a recent case from <strong>the</strong> Ninth Circuit Court ofAppeals, in which violations of both <strong>the</strong> SCA and <strong>the</strong> FourthAmendment were alleged, that court held that a police officerhad a reasonable expectation of privacy in text messages sentusing a city-owned pager. See Quon v. Arch Wireless, 529F.3d 892, 908 (9th Cir.2008) (concluding that “a reasonablejuror could conclude ... that plaintiff expected that his callto his wife would be private, and that expectation wasobjectively reasonable”).Here, Fell had a subjective belief that his personal e-mailaccounts, stored on third-party computer systems, protected(albeit ineffectively) by passwords, would be private. Thatexpectation of privacy was also reasonable, as nothing inPPBC's policy suggests that it could extend beyond Plaintiffs'own systems, and beyond <strong>the</strong> employment relationship.Fur<strong>the</strong>rmore, <strong>the</strong>re is no evidence that PPBC's policy wasclearly communicated to its employees, or that it wasconsistently enforced in a manner that would have alertedemployees to <strong>the</strong> possibility that <strong>the</strong>ir private e-mail accounts,such as Hotmail, could also be accessed and viewed by <strong>the</strong>iremployer.Because Fell had a reasonable expectation of privacy in hise-mail accounts, Brenner could only be authorized to accessthose accounts if Fell had given consent. She argues that Fellgave her implied consent to search his e-mails because he lefthis login information stored on PPBC's computers where itcould be discovered and used by Brenner. The Court does notaccept Plaintiffs' argument.There is no sound basis to argue that Fell, by inadvertentlyleaving his Hotmail password accessible, was <strong>the</strong>rebyauthorizing access to all of his Hotmail e-mails, no less <strong>the</strong>e-mails in his two o<strong>the</strong>r accounts. If he had left a key to hishouse on <strong>the</strong> front desk at PPBC, one could not reasonablyargue that he was giving consent to whoever found <strong>the</strong>key, to use it to enter his house and rummage through hisbelongings. And, to take <strong>the</strong> analogy a step fur<strong>the</strong>r, had <strong>the</strong>person rummaging through <strong>the</strong> belongings in Fell's housefound <strong>the</strong> key to Fell's country house, could that be taken asauthorization to search his country house. We think not. TheCourt rejects <strong>the</strong> notion that carelessness equals consent. SeeLipin v. Bender, 193 A.D.2d 424, 426, 597 N.Y.S.2d 340,341 (1st Dep't 1993) (rejecting <strong>the</strong> argument that becausedocuments “had been left unsecured, directly in front of <strong>the</strong>plaintiff, in a public area, ... plaintiff had been ‘invited’ to read<strong>the</strong> documents”).Implied consent, at a minimum, requires clear notice thatone's conduct may result in a search being conducted ofareas which <strong>the</strong> person has been warned are subject tosearch. Cf. United States v. Workman, 80 F.3d 688, 694 (2dCir.1996) (holding that a posted sign and an inmate handbook,providing notice that telephone calls would be monitored,toge<strong>the</strong>r with inmate's “plain awareness that his conversationswere subject to monitoring,” amounted to implied consent tosurveillance); United States v. *562 Amen, 831 F.2d 373,378–79 (2d Cir.1987) (prisoners gave implied consent tointerception of telephone calls because <strong>the</strong>y were on noticefrom at least four sources, including actual direct notice);Sec. and Law Enforcement Employees v. Carey, 737 F.2d187, 202 n. 23 (2d Cir.1984) (noting that an importantconsideration in determining whe<strong>the</strong>r a person has consentedto being searched is “evidence that <strong>the</strong> person had knowledgeof <strong>the</strong> right to refuse to give consent;” and rejecting <strong>the</strong>argument that correction officers consented to being stripsearched“merely by accepting employment and by receiving[a] rule book [giving notice that <strong>the</strong> Department's employees,while on correctional facility property, were subject to beingsearched]”); Anobile v. Pelligrino, 303 F.3d 107, 124–25 (2dCir.2002) (rejecting an assertion that racetrack employees, bysigning a license with a “a blanket waiver of <strong>the</strong> right to objectto any future searches,” gave an effective consent to search<strong>the</strong>ir dormitory rooms, because “<strong>the</strong>re [was] no evidencedemonstrating that <strong>the</strong> plaintiffs were aware of <strong>the</strong>ir right torefuse to give consent to this unconstitutional search or indeedwhe<strong>the</strong>r <strong>the</strong>y could refuse and still obtain employment”).© 2012 Thomson Reuters. No claim to original U.S. Government Works. 8


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)125In this case, Fell only had notice that PPBC's computers couldbe searched for evidence of personal e-mail use, not that hisHotmail, Gmail, or WFBC e-mail accounts would also besearched. He was also never given <strong>the</strong> opportunity to refuseBrenner any authorization to search his e-mails. At most, onecould argue that Fell have consented to Brenner viewing hispassword. But he did not consent to her to using it. Absentclear knowledge of <strong>the</strong> extent of what could be searched, and<strong>the</strong> opportunity to refuse or withdraw his consent, <strong>the</strong> Courtrejects Plaintiffs' argument that Fell gave implied consent toBrenner to search his Hotmail account simply by leaving hispassword on her computer.Even less sustainable is <strong>the</strong> proposition that correctly“guessing” a person's password, as Brenner did, amounts toauthorization to access all accounts which use that password.Were that <strong>the</strong> case, computer hackers across <strong>the</strong> countrycould escape liability for breaking into computer systems bycorrectly “guessing” <strong>the</strong> codes and passwords of <strong>the</strong>ir victims.This absurd result stands in direct conflict with <strong>the</strong> entirepurpose of <strong>the</strong> SCA and basic principles of privacy. See In reDoubleClick, 154 F.Supp.2d at 507.The Court is convinced that Fell accessed his Hotmail accountat some point when he was working at PPBC, and lefthis username and password stored on PPBC's computer.O<strong>the</strong>rwise, Brenner could not have obtained Fell's password,<strong>the</strong>reby making it possible for her to access his Hotmailaccount. 9 None<strong>the</strong>less, <strong>the</strong> Court concludes that Brenner'saccess to Fell's Hotmail account violated <strong>the</strong> SCA and Fell'sprivacy. While Fell arguably “authorized” access to any e-mails which he viewed and saved on PPBC's computers,Brenner was not authorized to access those e-mails directlyfrom Fell's Hotmail account, and was clearly not authorizedto access e-mails from Fell's Gmail and WFBC accounts.II. Privilege and <strong>the</strong> Crime–Fraud ExceptionIndependent of whe<strong>the</strong>r <strong>the</strong> e-mails should be precludedbecause <strong>the</strong>y were improperly secured, Defendants also assertthat certain of <strong>the</strong>se e-mails should be precluded, and <strong>the</strong>yshould be returned, *563 because <strong>the</strong>y are subject to <strong>the</strong>attorney-client privilege.Plaintiffs' respond that <strong>the</strong> e-mails in question are notprivileged communications. Plaintiffs also argue that Fellforfeited any right of privacy to all of his e-mails becausethose e-mails were in fur<strong>the</strong>rance of what Plaintiffs describeas “civil and criminal misconduct.” (Plaintiffs' Memorandumof Law in Opposition to <strong>the</strong> Motion to Preclude Use of E-mails (“Pls.' Mem.”), at 9.) Thus, Plaintiffs invoke <strong>the</strong> crimefraudexception to confidentiality, normally applicable toattorney-client privilege claims, and assert that Fell forfeitedhis right to privacy in all of his e-mails, including, but notlimited to, e-mails covered by <strong>the</strong> attorney-client privilege.5 6 7 The attorney-client privilege affords confidentialityto communications among clients and <strong>the</strong>ir attorneys, for<strong>the</strong> purpose of seeking and rendering an opinion on law orlegal services, or assistance in some legal proceeding, solong as <strong>the</strong> communications were intended to be, and werein fact, kept confidential. See United States v. Int'l Bhd. ofTeamsters, 119 F.3d 210, 214 (2d Cir.1997); United Statesv. Doe (In re Six Grand Jury Witnesses), 979 F.2d 939,943 (2d Cir.1992); John Doe Corp. v. United States (In reJohn Doe Corp.), 675 F.2d 482, 487–88 (2d Cir.1982); BankBrussels Lambert v. Credit Lyonnais (Suisse) S.A., 160 F.R.D.437, 441 (S.D.N.Y.1995) (citing United States v. United ShoeMach. Corp., 89 F.Supp. 357, 358–59 (D.Mass.1950)). Theprivilege is among <strong>the</strong> oldest of <strong>the</strong> common law privilegesand “exists for <strong>the</strong> purpose of encouraging full and truthfulcommunication between an attorney and his client.” In revon Bulow, 828 F.2d 94, 100 (2d Cir.1987); accord UnitedStates v. Bilzerian, 926 F.2d 1285, 1292 (2d Cir.1991).However, because <strong>the</strong> privilege “stands as an obstacle ofsorts to <strong>the</strong> search for truth,” it must be applied “only to<strong>the</strong> extent necessary to achieve its underlying goals.” XYZCorp. v. United States (In re Keeper of <strong>the</strong> Records), 348F.3d 16, 22 (1st Cir.2003); see also Salomon Bros. TreasuryLitig. v. Steinhardt Partners (In re Steinhardt Partners),9 F.3d 230, 235 (2d Cir.1993) (finding that <strong>the</strong> privilegedoes not apply in situations where <strong>the</strong> client's conduct doesnot serve to “improve [ ] <strong>the</strong> attorney-client relationship”)(quoting Permian Corp. v. United States, 665 F.2d 1214,1221 (D.C.Cir.1981)). Thus, in order to merit protection,<strong>the</strong> “predominant purpose” of <strong>the</strong> communication must beto render or solicit legal advice, as opposed to business orpolicy advice. See In re County of Erie, 473 F.3d 413, 420 (2dCir.2007). Finally, “<strong>the</strong> burden of establishing <strong>the</strong> existenceof an attorney-client privilege, in all of its elements, rests with<strong>the</strong> party asserting it.” United States v. Doe (In re Grand JuryProceedings), 219 F.3d 175, 182 (2d Cir.2000) (quoting Int'lBhd. of Teamsters, 119 F.3d at 214).8 9 The attorney-client privilege is waived if <strong>the</strong> holder of<strong>the</strong> privilege voluntarily discloses or consents to disclosure ofany significant part of <strong>the</strong> communication to a third party orstranger to <strong>the</strong> attorney-client relationship. See In re GrandJury Proceedings, No. M–11–189 (LAP), 2001 WL 1167497,at *7 (S.D.N.Y. Oct.3, 2001); In re Kidder Peabody Sec.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 9


126Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)Litig., 168 F.R.D. 459, 468 (S.D.N.Y.1996). Finally, a partywho seeks to uphold <strong>the</strong> privilege must take affirmativemeasures to maintain <strong>the</strong> confidentiality of attorney-clientcommunications. See In re Steinhardt Partners, 9 F.3d at 235;In re von Bulow, 828 F.2d at 100; In re Horowitz, 482 F.2d72, 82 (2d Cir.1973).A. E-mails Protected by Attorney–Client PrivilegeDefendant claims that E-mails 12, 13, 14, and 28 are protectedby <strong>the</strong> attorney-client *564 privilege. E-mail 12, thoughreferred to by <strong>the</strong> parties, was not provided with Defendants'motion papers. Defendants' counsel represents that it is ane-mail sent to Fell by a legal assistant at Fox Rothschild,<strong>the</strong> law firm representing Defendants. E-mail 13 was sent toFell from a paralegal at Fox Rothschild, merely transmittingWFBC's employer ID number; attached is correspondencefrom <strong>the</strong> IRS. E-mail 14, from <strong>the</strong> same paralegal, indicatesthat WFBC's Articles of Organization were filed with <strong>the</strong>State of New York, and <strong>the</strong> Articles are attached. E-mail 28 isfrom an attorney at Fox Rothschild, and appears to be printedfrom Fell's “sent” file because <strong>the</strong> first part of <strong>the</strong> e-mail isa message from Fell to <strong>the</strong> attorney, as <strong>the</strong> end of a chain ofback-and-forth e-mails from <strong>the</strong> same attorney. The e-mailcontains advice about how to handle telephone calls fromBrenner.10 E-mails 13 and 14, sent to Fell from a paralegalat Fox Rothschild, are not communications seeking orrendering an opinion on law or legal services, and <strong>the</strong>information <strong>the</strong>y contain is business information that is amatter of public record. The fact that <strong>the</strong> e-mails containa warning indicating <strong>the</strong>y contain “PRIVILEGED ANDCONFIDENTIAL INFORMATION,” does not transform<strong>the</strong>m from non-privileged communications into privilegedcommunications. See In re Grand Jury Proceedings, 2001WL 1167497, at *10 (“[T]he determination of whe<strong>the</strong>r adocument is privileged does not depend upon ... a privilegelegend.”). The Court <strong>the</strong>refore concludes that E-mails 13 and14 are not privileged.Defendants have not met <strong>the</strong>ir burden of demonstrating thatE-mail 12 should be protected by <strong>the</strong> attorney-client privilege.This e-mail has not been provided to <strong>the</strong> Court for review, and<strong>the</strong> description provided in Defendants' memorandum of lawis far too vague, and simply makes <strong>the</strong> conclusory assertionthat it is subject to attorney-client privilege. Accordingly,<strong>the</strong> Court concludes that E-mail 12 is not privileged. SeeFed.R.Civ.P. 26(b)(5)(A)(ii) (“<strong>the</strong> party must ... describe <strong>the</strong>nature of <strong>the</strong> documents, communications, ... and do so in amanner that ... will enable o<strong>the</strong>r parties to assess <strong>the</strong> claim”).E-mail 28 is different. That e-mail is actually a series ofcommunications, sent a month after Fell left PPBC, in whichFell, using his Hotmail account, sought advice from a FoxRothschild attorney about how to handle telephone callsfrom Brenner. The attorney responds by providing adviceand seeking additional information. Fell <strong>the</strong>n responds with<strong>the</strong> additional information, and <strong>the</strong> attorney again providesspecific legal advice. The communication ends with Fellthanking <strong>the</strong> attorney for <strong>the</strong> advice.The Court concludes that this e-mail is protected by attorneyclientprivilege. It was clearly conveying informationand legal advice, as well as <strong>the</strong> attorney's thoughts andimpressions about <strong>the</strong> strengths of Fell's, and <strong>the</strong> o<strong>the</strong>rDefendants', legal position. There is some question, however,about <strong>the</strong> measures Fell took to keep <strong>the</strong> communicationsconfidential, and whe<strong>the</strong>r it was objectively reasonable forhim to expect that his communications would be kept private.11 On <strong>the</strong> one hand, according to his affidavit, Fell wasusing his own personal home computer to communicatewith his attorney on a private e-mail account. It isgenerally accepted that lawyers and clients may communicateconfidential information through unencrypted e-mail andreasonably maintain an expectation that <strong>the</strong> communicationsare private and confidential. See In re Asia Global Crossing,322 B.R. at 256 (citing N.Y. C.P.L.R. § 4548 (McKinney1999), stating that a privileged communication does notlose its privilege *565 for <strong>the</strong> sole reason it was sentby e-mail); cf. In re County of Erie, 473 F.3d at 422(finding e-mails between county attorney and sheriff's office,sent with <strong>the</strong> predominant purpose of legal advice, wereprivileged so long as <strong>the</strong>y were not shared with o<strong>the</strong>rs);Geer v. Gilman Corp., No. 06 Civ. 889(JBA), 2007 WL1423752, *4 (D.Conn. Feb.12, 2007) (“[P]laintiff's attorneyclientprivilege in communications with her counsel was notwaived by virtue of her having used her fiance's computerand e-mail address ... [because] plaintiff took affirmativesteps to maintain <strong>the</strong> confidentiality of <strong>the</strong> attorney-clientcommunications.”).On <strong>the</strong> o<strong>the</strong>r hand, Fell left his Hotmail account vulnerableto <strong>the</strong> prying eyes of o<strong>the</strong>r parties by leaving his passwordstored on PPBC's computer, and possibly by giving his loginand password information to a PPBC employee.None<strong>the</strong>less, <strong>the</strong> Court has already concluded above thatFell had a reasonable subjective and objective belief that© 2012 Thomson Reuters. No claim to original U.S. Government Works. 10


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)127his communications would be kept confidential—and thisincludes his communications with his attorney. Even if Fellwas fully aware of Plaintiffs' policy concerning e-mail, <strong>the</strong>reis nothing in that policy that would have alerted him that, afterhe left Plaintiffs' employ, Brenner might search his personale-mails sent though his personal computer, and stored on hispersonal internet providers' systems. Although Fell ultimatelyfailed to properly protect his Hotmail password, <strong>the</strong>re is noevidence that leaving it on PPBC's computers was anythingbut inadvertent. Thus, it remained reasonable for him toexpect that <strong>the</strong> contents of his personal e-mails, particularlythose written and sent after his employment at PPBC hadended, would be kept private when he sought <strong>the</strong> advice ofhis attorney. See In re County of Erie, 473 F.3d at 422; Geerv. Gilman Corp., 2007 WL 1423752, at *4.However, finding E-mail 28 is protected by <strong>the</strong> attorneyclientprivilege does not end <strong>the</strong> inquiry. Plaintiffs also arguethat <strong>the</strong> privilege should be overcome based on <strong>the</strong> crimefraudexception.B. The Crime–Fraud ExceptionThe protections of <strong>the</strong> attorney-client privilege may be lostif <strong>the</strong> crime-fraud exception applies. “[T]he purpose of <strong>the</strong>crime-fraud exception to <strong>the</strong> attorney-client privilege [is]to assure that <strong>the</strong> ‘seal of secrecy,’ between lawyer andclient does not extend to communications ‘made for <strong>the</strong>purpose of getting advice for <strong>the</strong> commission of a fraud’or crime.” United States v. Zolin, 491 U.S. 554, 562–563,109 S.Ct. 2619, 2626, 105 L.Ed.2d 469 (1989); see also Inre John Doe, Inc., 13 F.3d 633, 636 (2d Cir.1994) (“Thecrime-fraud exception strips <strong>the</strong> privilege from attorneyclientcommunications that ‘relate to client communicationsin fur<strong>the</strong>rance of contemplated or ongoing criminal orfraudulent conduct.’ ” (quoting In re Grand Jury SubpoenaDuces Tecum Dated September 15, 1983, 731 F.2d 1032,1038 (2d Cir.1984))).12 “A party wishing to invoke <strong>the</strong> crime-fraud exceptionmust demonstrate that <strong>the</strong>re is a factual basis for a showingof probable cause to believe that a fraud or crime has beencommitted and that <strong>the</strong> communications in question were infur<strong>the</strong>rance of <strong>the</strong> fraud or crime.” United States v. Jacobs,117 F.3d 82, 87 (2d Cir.1997). It is not enough to show merelythat privileged communications “might provide evidence of acrime or fraud.” In re Richard Roe, Inc., 168 F.3d 69, 71 (2dCir.1999). “Ra<strong>the</strong>r, <strong>the</strong> communication itself must have beenin fur<strong>the</strong>rance of a fraud or crime and must have been intendedto facilitate <strong>the</strong> fraud or crime.” Shahinian v. Tankian, 242F.R.D. 255, 258 (S.D.N.Y.2007) (citing Jacobs, 117 F.3d at88).*566 1. Application to E-mail 2813 Having reviewed <strong>the</strong> contents of E-mail 28, <strong>the</strong> Courtconcludes that <strong>the</strong>re is no evidence that it was sent infur<strong>the</strong>rance of a fraud or crime. The communication clearlyaddresses <strong>the</strong> legal issues which Fell and o<strong>the</strong>r Defendantsface, and <strong>the</strong> advice is limited to addressing those legal issues,and indicates how Fell and o<strong>the</strong>r Defendants should respondto Brenner, with whom a legal conflict had arisen. The factthat <strong>the</strong> communication arose in <strong>the</strong> larger context of <strong>the</strong>Defendants' attempt to set up a competing business, anddiscusses matters which might, in Plaintiffs' eyes, constitutepast criminal or fraudulent actions, does not transform thisparticular communication into one which fur<strong>the</strong>rs a crimeor fraud. Accordingly, <strong>the</strong> Court concludes that E-mail28 is protected by <strong>the</strong> attorney-client privilege, should beprecluded from use by Plaintiffs, and should be returned toDefendants. Fur<strong>the</strong>r, Plaintiffs should certify that all copieshave been returned or destroyed. See Fed.R.Civ.P. 26(b)(5)(B).2. Application to All E-mails14 Plaintiffs' crime-fraud exception argument is not limited,however, to only those e-mails for which attorney-clientprivilege was asserted. Plaintiffs also ask <strong>the</strong> Court to extend<strong>the</strong> principles underlying <strong>the</strong> crime-fraud exception to all of<strong>the</strong> e-mails in order to justify, and <strong>the</strong>reby excuse, Brenner'swrongful access to Fell's e-mail accounts. The Court declinesto do so.First, Plaintiffs' have not presented any authority forextending <strong>the</strong> crime-fraud exception beyond <strong>the</strong> borders ofits standard application to material covered by <strong>the</strong> attorneyclientprivilege. Second, had Brenner waited and actedappropriately, she would have had access to all of Fell's e-mails, as well as all of <strong>the</strong> o<strong>the</strong>r Defendants' e-mails, in <strong>the</strong>normal course of pre-trial discovery. While Brenner's fearsthat Defendants might attempt to conceal evidence cannot,in this case, be written off as unfounded paranoia, nei<strong>the</strong>rfederal law nor <strong>the</strong> Federal Rules of Civil Procedure can beignored simply because a party believes herself to be wrongedby <strong>the</strong> actions of a dishonest person. If <strong>the</strong> Court were to adoptPlaintiffs' suggestion, <strong>the</strong> crime-fraud exception would engulfall of <strong>the</strong> rules designed to ensure orderly and legal discoveryof evidence, and could be invoked to justify any party'sresort to illegal, extra-judicial measures to secure evidence.Accordingly, <strong>the</strong> Court rejects Plaintiffs' suggestion that <strong>the</strong>© 2012 Thomson Reuters. No claim to original U.S. Government Works. 11


128Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)crime-fraud exception should excuse Brenner's violations of<strong>the</strong> SCA.III. SpoliationDefendants' final argument is that Plaintiffs' initial productionof <strong>the</strong> e-mails, with <strong>the</strong>ir print date obscured, amountsto spoliation of evidence, justifying sanctions, includingpreclusion. The Court does not agree,15 “ ‘Spoliation is <strong>the</strong> destruction or significant alterationof evidence, or failure to preserve property for ano<strong>the</strong>r's useas evidence in pending or reasonably foreseeable litigation.’” Allstate Ins. Co. v. Hamilton Beach/Proctor Silex, Inc., 473F.3d 450, 457 (2d Cir.2007) (quoting West v. Goodyear Tire& Rubber Co., 167 F.3d 776, 779 (2d Cir.1999)). Typically,when evidence is spoiled, a party requests dismissal or an“adverse inference” instruction to counteract <strong>the</strong> fact that <strong>the</strong>evidence is no longer available. See West, 167 F.3d at 780(noting that dismissal is not <strong>the</strong> only sanction for spoliation,and that o<strong>the</strong>r sanctions, including jury instructions, alsoserve to vindicate <strong>the</strong> prejudice suffered by a party due tospoliation); cf. *567 Residential Funding Corp. v. DegeorgeFin. Corp., 306 F.3d 99, 106 (2d Cir.2002) (noting that“adverse inference instruction [s] [are] usually [ ] employedin cases involving spoliation of evidence”). This is not,however, a typical case, because <strong>the</strong> evidence is availablein its original form. Accordingly, nei<strong>the</strong>r of <strong>the</strong>se severesanctions—dismissal or an adverse inference instruction—are commensurate or appropriate sanctions.16 When <strong>the</strong> nature of <strong>the</strong> breach is non-production ofevidence, as opposed to actual destruction or significantalteration, a district court “has broad discretion in fashioningan appropriate sanction”. Residential Funding Corp., 306F.3d at 107. In Residential Funding, a case similar to this case,<strong>the</strong> plaintiff did not destroy “<strong>the</strong> e-mails on <strong>the</strong> back-up tapes.Ra<strong>the</strong>r, [<strong>the</strong> plaintiff] failed to produce <strong>the</strong> e-mails in timefor trial.” Id. at 106. The Second Circuit remanded <strong>the</strong> case,and instructed <strong>the</strong> district court to consider lesser sanctions,including awarding costs, if it determined that <strong>the</strong> defendantwas not prejudiced by <strong>the</strong> delay. See id. at 112. Thus, <strong>the</strong>harm caused by delay in production is a relevant factor indetermining sanctions, if a court determines that sanctions arewarranted. See West, 167 F.3d at 780 (noting that addressingprejudice is an important aim of sanctions imposed for abusesof discovery).17 In this case, <strong>the</strong> original e-mails were not destroyedor altered, and Defendants inspected <strong>the</strong>m prior to making<strong>the</strong>ir final argument to <strong>the</strong> District Court, regarding <strong>the</strong>motion for a preliminary injunction. The date <strong>the</strong> e-mailswere printed was made known to Defendants and <strong>the</strong>Court before <strong>the</strong> preliminary injunction hearing. Thus, atmost, Defendants could argue that production was delayed.However, Defendants were not harmed by <strong>the</strong> delay, as <strong>the</strong>ywere not prevented from addressing <strong>the</strong> evidence or makingany arguments related to <strong>the</strong> e-mails—including <strong>the</strong> currentpreclusion motion. 10 Cf. Residential Funding Corp., 306F.3d at 107.This is not to say that altering evidence, as Plaintiffs did, anddelaying production of unaltered evidence until <strong>the</strong> day of <strong>the</strong>hearing, is excusable. However, Plaintiffs' current counsel hasrepresented that prior counsel provided <strong>the</strong> e-mails in <strong>the</strong> statecourt litigation, and was responsible for obscuring <strong>the</strong> dates.(See Tr. at 14–15.) His explanation for doing so is unknown.Accordingly, <strong>the</strong> Court finds that obscuring <strong>the</strong> dates, alone,does not amount to spoliation warranting <strong>the</strong> imposition ofsanctions, let alone total preclusion.IV. RemediesA. Authority to Impose SanctionsThe SCA allows a person who is “aggrieved by anyviolation of this chapter” to obtain “such relief as may beappropriate” in a civil cause of action. 18 U.S.C. § 2707(a).The statute fur<strong>the</strong>r provides in sub-section (b): “appropriaterelief includes—(1) such preliminary and o<strong>the</strong>r equitableor declaratory relief as may be appropriate; (2) damagesunder subsection (c); and (3) a reasonable attorney's feeand o<strong>the</strong>r litigation costs reasonably incurred.” Id. However,Defendants have not asserted a claim under <strong>the</strong> SCA;<strong>the</strong>refore, <strong>the</strong>se provisions do not define or limit <strong>the</strong> sanctions<strong>the</strong> Court may impose in this case. Ra<strong>the</strong>r, Defendants appealto <strong>the</strong> Court's inherent equitable authority to *568 fashionappropriate sanctions for Brenner's actions.18 19 Federal courts do have “inherent ‘equitable powersof courts of law over <strong>the</strong>ir own process, to prevent abuses,oppression, and injustices,’ ” International Prods. Corp. v.Koons, 325 F.2d 403, 408 (2d Cir.1963) (quoting Gumbel v.Pitkin, 124 U.S. 131, 144, 8 S.Ct. 379, 31 L.Ed. 374 (1888));see also Schlaifer Nance & Co., Inc. v. Estate of Warhol 742F.Supp. 165, 166 (S.D.N.Y.1990) (quoting Koons ). Courtsmay impose sanctions and rely upon <strong>the</strong>ir inherent authorityeven “where <strong>the</strong> conduct at issue is not covered by one of <strong>the</strong>o<strong>the</strong>r sanctioning provisions.” Chambers v. NASCO, Inc., 501U.S. 32, 50, 111 S.Ct. 2123, 2135, 115 L.Ed.2d 27 (1991).Fur<strong>the</strong>rmore, a district court may resort to its “inherent power© 2012 Thomson Reuters. No claim to original U.S. Government Works. 12


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)129to fashion sanctions, even in situations similar or identical tothose contemplated by [a] statute or rule.” DLC Mgmt. Corp.v. Town of Hyde Park, 163 F.3d 124, 136 (2d Cir.1998) (citingChambers ).20 In this situation, <strong>the</strong> sanctions available under <strong>the</strong> FederalRules of Civil Procedure are not directly applicable, sinceBrenner's misconduct occurred prior to <strong>the</strong> filing of <strong>the</strong>litigation and outside <strong>the</strong> normal discovery process, and didnot violate any court orders. See Fayemi v. Hambrecht andQuist, Inc., 174 F.R.D. 319, 325 (S.D.N.Y.1997) (concludingthat <strong>the</strong> Federal Rules of Civil Procedure did “not provide <strong>the</strong>authority for regulating <strong>the</strong> use of information obtained bya party independent of <strong>the</strong> discovery process”). None<strong>the</strong>less,as <strong>the</strong> court in Fayemi found, pursuant to “its inherentequitable powers to sanction a party that seeks to usein litigation evidence that was wrongfully obtained,” <strong>the</strong>court may preclude <strong>the</strong> use of stolen evidence in litigation,notwithstanding <strong>the</strong> fact that it would have been o<strong>the</strong>rwisediscoverable. See id. at 325–26.In ano<strong>the</strong>r analogous case, Herrera v. The Clipper Group,L.P., Nos. 97 Civ. 560 & 561(SAS), 1998 WL 229499(S.D.N.Y. May 6 1998), <strong>the</strong> defendant sought to preclude <strong>the</strong>plaintiff from using at trial documents improperly obtainedoutside <strong>the</strong> discovery process. Relying on its inherentauthority, <strong>the</strong> court concluded that <strong>the</strong> plaintiff acted in badfaith and imposed sanctions, consisting of payment of costsand fees. See id. at *3 However, because <strong>the</strong> plaintiff couldhave properly obtained <strong>the</strong> evidence through <strong>the</strong> discoveryprocess, <strong>the</strong> court declined to preclude <strong>the</strong> use of <strong>the</strong> evidence.See id. at *5. The court was also hesitant to provide <strong>the</strong>defendants with a “windfall” strategic advantage at trial. Seeid.B. Bad FaithThe Second Circuit “has required a finding of bad faith for <strong>the</strong>imposition of sanctions under <strong>the</strong> inherent power doctrine.”Herrera, 1998 WL 229499, at *4 (citing United States v. Int'lBhd. of Teamsters, 948 F.2d 1338, 1345 (2d Cir.1991)). TheCourt concludes that Brenner acted in bad faith. The Courtunderstands Brenner's impulse to unearth evidence of herdisloyal employees' betrayal, after having reason to believe<strong>the</strong>y had stolen important business documents and plans,and after <strong>the</strong>y opened up a competing business after leavingPPBC. This is particularly true in light of Belliard's decisionto invade her office, shred his non-compete agreement, andtake o<strong>the</strong>r actions which caused Brenner to believe tha<strong>the</strong> stole PPBC's client list, including e-mail addresses andtelephone numbers.But it is precisely this conduct which is <strong>the</strong> subject of thislitigation and for which, if proved, Brenner has adequate legalremedies. Her actions—accessing of Fell's Hotmail account,and using that access to open his Gmail account, and <strong>the</strong>nresorting *569 to “guessing” a password in order to gainaccess to Fell's WFBC account—violated federal law andoffend general notions of personal privacy. Fur<strong>the</strong>rmore, heruse of that information in this litigation taints <strong>the</strong> judicialprocess. Thus, even though Brenner's improper actions tookplace prior to <strong>the</strong> filing of <strong>the</strong> litigation, <strong>the</strong> fruits ofBrenner's improper conduct have been heavily relied upon byPlaintiffs in pleading and arguing <strong>the</strong> merits of <strong>the</strong>ir case. TheCourt may <strong>the</strong>refore fashion sanctions for Brenner's wrongfulaccess to Fell's personal e-mail accounts. See Herrera, 1998WL 229499 at *5.C. SanctionsDefendants seek <strong>the</strong> complete preclusion of all of <strong>the</strong> e-mails,including <strong>the</strong>ir use in support of motions, at trial, and evenfor impeachment purposes. There are a variety of options,however, that are available to <strong>the</strong> Court.On <strong>the</strong> mild side of <strong>the</strong> spectrum, <strong>the</strong> Court could preclude<strong>the</strong> use of e-mails obtained from Fell's accounts, but not e-mails properly obtained in <strong>the</strong> course of discovery from o<strong>the</strong>rDefendants or parties—even if <strong>the</strong> permitted e-mails might,in actuality, be <strong>the</strong> same as those precluded. Although thiswould amount to imposing almost no sanction, it recognizes<strong>the</strong> fact that <strong>the</strong> evidence would be o<strong>the</strong>rwise discoverable. 11However, <strong>the</strong> notion that <strong>the</strong> evidence would be o<strong>the</strong>rwisediscoverable also cuts in <strong>the</strong> o<strong>the</strong>r direction. Had Brennerallowed <strong>the</strong> litigation process to move forward, and notviolated federal law to by-pass <strong>the</strong> rules of discovery,she could have properly obtained <strong>the</strong> e-mails in question.Moreover, many of <strong>the</strong> e-mails in issue were authored byo<strong>the</strong>r people and sent to Fell, and in those cases, thoseindividuals were also aggrieved by Brenner's intrusion intoFell's e-mail accounts. Permitting precluded e-mails to beadmitted from o<strong>the</strong>r sources would <strong>the</strong>refore fail to takeinto account <strong>the</strong> fact that Brenner's actions also violated <strong>the</strong>privacy rights of everyone with whom Fell communicated. Asdiscussed, parties should not be excused from complying with<strong>the</strong> law and following <strong>the</strong> rules because of outrage, legitimateor o<strong>the</strong>rwise, over ano<strong>the</strong>r party's actions.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 13


130Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)On <strong>the</strong> harsh side of <strong>the</strong> spectrum, <strong>the</strong> Court could completelypreclude use of <strong>the</strong> e-mails for all purposes, in any context,regardless of whe<strong>the</strong>r <strong>the</strong>y could be secured from someo<strong>the</strong>r source. This option could be tempered, however, byallowing <strong>the</strong> e-mails to be used for impeachment purposes. 12Thus, while precluding <strong>the</strong> use of <strong>the</strong> e-mails as affirmativeevidence, <strong>the</strong> Court would not permit Fell or o<strong>the</strong>rs to testifyfalsely, or open <strong>the</strong> door to a line of testimony that iscontradicted by <strong>the</strong> e-mails, knowing that <strong>the</strong> e-mails couldnot be used to impeach or rebut <strong>the</strong>ir testimony. Additionally,if <strong>the</strong>re are e-mail chains between Defendants that merelycontain a precluded e-mail from Fell, <strong>the</strong> chain of *570conversation would be admissible, and only <strong>the</strong> precluded e-mail would be redacted.Alternatively, selective preclusion of <strong>the</strong> e-mails could alsobe accomplished by carving out categories of e-mails. Forexample, e-mails dated before March 16, 2008, <strong>the</strong> lastdate of Fell's employment with PPBC, could be allowedin evidence, but later e-mails could be precluded; in fact,Defendants recognized this categorical distinction duringoral argument. (See Tr. at 27.) Alternatively, only Gmailand WFBC account e-mails could be precluded, but notHotmail account e-mails, since Fell clearly accessed hisHotmail account on Plaintiffs' computers and left his Hotmailpassword on PPBC's computers. Limited preclusion, suchas one based on <strong>the</strong> date on which <strong>the</strong> e-mail was written(for example, e-mails sent after Fell left PPBC), or <strong>the</strong>type of account from which it was retrieved (e-mails from<strong>the</strong> Gmail or WFBC accounts), might be justified by <strong>the</strong>fact that both parties appear to have “unclean hands;” sucha sanction would punish Brenner's wrongful acts, whilelimiting an evidentiary “windfall” going to Defendants, whoalso engaged in wrongful behavior. See Fayemi, 174 F.R.D.at 326 (permitting evidence that would o<strong>the</strong>rwise have beenprecluded because of <strong>the</strong> “unclean hands” of <strong>the</strong> aggrievedparty); Herrera, 1998 WL 229499, at *5 (declining to grantopposing party an evidentiary “windfall”).The problem with this alternative is that, ultimately, <strong>the</strong>re islittle justifiable basis to distinguish <strong>the</strong> e-mails according to<strong>the</strong>ir source or date. Brenner was not authorized to accessany of Fell's e-mails directly from accounts maintainedby third-party electronic communication service providers.Thus, while it is possible to create categories of e-mails, itis difficult to justify why one category should be precluded,while ano<strong>the</strong>r should be admissible.Finally, <strong>the</strong> Court could impose financial sanctions suchas payment of <strong>the</strong> costs and fees incurred in bringing <strong>the</strong>instant motion. 13 These could be imposed in conjunctionwith a preclusion sanction, or, as <strong>the</strong> court did in Herrera,as an alternative to preclusion. Monetary sanctions, asopposed to full preclusion, would serve <strong>the</strong> Court's interestin favoring full disclosure of evidence. In <strong>the</strong> context oflifting a protective order, <strong>the</strong> Second Circuit has noted that“full disclosure of all evidence that might conceivably berelevant [is an] objective represent[ing] <strong>the</strong> cornerstone of ouradministration of civil justice.” Martindell v. InternationalTel. and Tel. Corp., 594 F.2d 291, 295 (2d Cir.1979).The disadvantage of imposing a monetary sanction is that itdoes not really address <strong>the</strong> underlying injury to Fell's privacy.Fur<strong>the</strong>rmore, preclusion of <strong>the</strong> e-mails is <strong>the</strong> remedy mostcompatible with maintaining <strong>the</strong> integrity of <strong>the</strong> litigationprocess. As one court noted: “The [c]ourt is concernedwith preserving <strong>the</strong> integrity of this judicial proceeding.What matters is balancing <strong>the</strong> scales. That can be done byprohibiting [a party] from making any use of <strong>the</strong> [wrongfullyobtained] documents ....” In re Shell Oil Refinery, 143 F.R.D.105, 108–09 (E.D.La.1992).CONCLUSIONIn fashioning a remedy pursuant to its inherent equitablepowers, <strong>the</strong> Court has a great deal of discretion. See *571DLC Mgmt., 163 F.3d at 136 (upholding sanctions imposedby Magistrate Judge pursuant to <strong>the</strong> court's inherent equitableauthority) (citing Sassower v. Field, 973 F.2d 75, 80–81 (2dCir.1992)). The selection of a remedy for Brenner's actionsis not, however, an easy task. Brenner wrongfully obtainedFell's e-mails, and her actions amount to a violation of <strong>the</strong>SCA. But <strong>the</strong> Court also recognizes that Brenner was reactingto what she perceived as Defendants' betrayal, <strong>the</strong>ft of herproperty, and breaches of <strong>the</strong>ir fiduciary duties. Thus, <strong>the</strong>parties seeking equitable relief, Defendants, stand accusedof having extremely unclean hands <strong>the</strong>mselves. Fur<strong>the</strong>rmore,although Brenner's actions may have given Plaintiffs anadvantage at <strong>the</strong> outset of this litigation, <strong>the</strong>y did not, in <strong>the</strong>end, give <strong>the</strong>m an advantage over Defendants <strong>the</strong>y would noto<strong>the</strong>rwise have had—all of <strong>the</strong> e-mails at issue here, except<strong>the</strong> one protected by <strong>the</strong> attorney-client privilege, would havebeen secured through <strong>the</strong> normal discovery process.Never<strong>the</strong>less, at this stage in <strong>the</strong> litigation, <strong>the</strong> Court has notresolved <strong>the</strong> merits of Plaintiffs' claims, which will determinejust how much dirt is on Defendants' hands. While <strong>the</strong> day© 2012 Thomson Reuters. No claim to original U.S. Government Works. 14


Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)131may come when Defendants will face <strong>the</strong> consequences for<strong>the</strong>ir alleged misconduct, Brenner's wrongdoing has beenestablished, and should not be counter-balanced by, asyet,unproven allegations of wrongdoing on <strong>the</strong> part ofDefendants. Accordingly, <strong>the</strong> imposition of sanctions againstPlaintiffs is justified.In <strong>the</strong> end, <strong>the</strong> one thing that should remain unsullied is<strong>the</strong> integrity of <strong>the</strong> judicial process. In this Court's view,that integrity is threatened by admitting evidence wrongfully,if not unlawfully, secured. See REP MCR Realty, L.L.C. v.Lynch, 363 F.Supp.2d 984, 1012 (N.D.Ill.2005) (“ ‘Litigantsmust know that <strong>the</strong> courts are not open to persons whowould seek justice by fraudulent means.’ ”) (quoting Pope v.Federal Exp. Corp., 138 F.R.D. 675, 683 (W.D.Mo.1990)).Therefore, in light of <strong>the</strong> unique circumstances of this case,<strong>the</strong> Court recommends that <strong>the</strong> e-mails be precluded from usein <strong>the</strong> litigation, but not for impeachment purposes shouldDefendants open <strong>the</strong> door. The Court also recommends thatPlaintiffs should return or destroy all copies of E-mail 28, andso certify.Pursuant to 28 U.S.C. § 636(b)(1)(C) and Rule 72 of <strong>the</strong>Federal Rules of Civil Procedure, <strong>the</strong> parties shall have ten(10) days from service of this Report to file written objections.See also Fed.R.Civ.P. 6(a) and (d). Such objections shall befiled with <strong>the</strong> Clerk of <strong>the</strong> Court, with extra copies deliveredto <strong>the</strong> chambers of <strong>the</strong> Honorable John H. Koeltl, UnitedStates District Judge, and to <strong>the</strong> chambers of <strong>the</strong> undersigned,Room 1660. Any requests for an extension of time for filingobjections must be directed to Judge Koeltl. Failure to fileobjections will result in a waiver of those objections forpurposes of appeal. See Thomas v. Arn, 474 U.S. 140, 145,106 S.Ct. 466, 470, 88 L.Ed.2d 435 (1985); Frank v. Johnson,968 F.2d 298, 300 (2d Cir.1992); Small v. Sec'y of Health &Human Servs., 892 F.2d 15, 16 (2d Cir.1989).August 22, 2008.Footnotes1 Brenner alleges that Belliard stole PPBC's client list and o<strong>the</strong>r items while he was in her office. (See Affidavit of Lauren Brenner,dated July 10, 2008 (“Brenner July 10 Aff.”), 16.) Belliard denies he stole anything. (See Affidavit of Rubin Belliard, dated July29, 2008 (“Belliard Aff.”), 33.)2 All references to e-mails are to <strong>the</strong> e-mails annexed to Schnapp's Declaration.3 Fell makes a general claim that he never did any work related to WFBC while he was at PPBC or on PPBC computers. (See FellAff. 6.) However, he has not provided his PPBC work schedule, so <strong>the</strong>re is no way to confirm whe<strong>the</strong>r or not he was at PPBCwhen he sent any of <strong>the</strong>se e-mails.4 Defendants did not include “E-mail 12” in <strong>the</strong>ir submissions, although it is described and referred to in <strong>the</strong> pleadings. (SeeDefendants' Memorandum of Law in Support of Their Motion for an Order Precluding <strong>the</strong> Use or Disclosure of Specific Emails(“Defs.' Mem.”), at 7.) According to Defendants, E-mail 12 is a privileged e-mail from Defendants' attorneys. (See id.)5 18 U.S.C.A. § 2515 reads;Whenever any wire or oral communication has been intercepted, no part of <strong>the</strong> contents of such communication and no evidencederived <strong>the</strong>refrom may be received in evidence in any trial, hearing, or o<strong>the</strong>r proceeding in or before any court, grand jury,department, officer, agency, regulatory body, legislative committee, or o<strong>the</strong>r authority of <strong>the</strong> United States, a State, or a politicalsubdivision <strong>the</strong>reof if <strong>the</strong> disclosure of that information would be in violation of this chapter.6 The Court also notes that Penal Law § 250.05 explicitly includes “electronic communications” while CPLR § 4506 does not,suggesting that e-mails obtained in violation of Penal Law § 250.05 are not subject to exclusion under CPLR § 4506.7 There are both federal and state law substantive claims in this action.8 Even <strong>the</strong> case Plaintiffs rely upon, in support of <strong>the</strong> argument that Fell waived his right to privacy in his Hotmail account,acknowledges that an employer's e-mail policy is limited only to e-mails viewed by employees while at work. See Scott v. BethIsrael Med. Ctr. Inc., 17 Misc.3d 934, 938, 847 N.Y.S.2d 436, 440 (N.Y.Sup.2007) (noting that “<strong>the</strong> effect of an employer e-mailpolicy ... is to have <strong>the</strong> employer looking over your shoulder each time you send an e-mail”).9 Defendants' suggestion that Brenner used a keystroke logging program is rank speculation, and, even if it were true, would onlyconfirm that Fell entered his Hotmail password into PPBC's computers to access his Hotmail account.10 Defendants only claim as to <strong>the</strong> relevance that <strong>the</strong> obscured dates would have to <strong>the</strong>ir claims is that <strong>the</strong> dates <strong>the</strong> e-mails were printedmight show contemporaneous “interception” under <strong>the</strong> ECPA. However, <strong>the</strong> Court has concluded that <strong>the</strong> ECPA does not apply todelivered e-mails, and <strong>the</strong> date <strong>the</strong> e-mails were printed is not relevant to <strong>the</strong> analysis because only delivered e-mails could be printed.11 In <strong>the</strong> Fourth Amendment context, <strong>the</strong> Independent Source Exception and <strong>the</strong> Inevitable Discovery Exception both allow evidenceo<strong>the</strong>rwise illegally obtained to be admissible in a criminal case if it could and would have been lawfully obtained anyway. SeeMurray v. United States 487 U.S. 533, 108 S.Ct. 2529, 101 L.Ed.2d 472 (1988); Nix v. Williams, 467 U.S. 431, 104 S.Ct. 2501,81 L.Ed.2d 377 (1984).© 2012 Thomson Reuters. No claim to original U.S. Government Works. 15


132Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F.Supp.2d 548 (2008)12 Defendants urge <strong>the</strong> Court to reject an impeachment exception to preclusion, and cite to a Sixth Circuit case which explicitly holdsthat <strong>the</strong> ECPA does not provide for one. See United States v. Wuliger, 981 F.2d 1497, 1506 (6th Cir.1992). As <strong>the</strong> Court hasdetermined that <strong>the</strong> ECPA does not apply, and <strong>the</strong> remedies available under <strong>the</strong> SCA are left to <strong>the</strong> discretion of <strong>the</strong> Court, and asthis Court is acting pursuant to its inherent authority, nothing prevents <strong>the</strong> Court from allowing an impeachment exception.13 Defendants have not specified precisely <strong>the</strong> costs or fees <strong>the</strong>y are seeking. The SCA permits awarding fees and costs, and, if <strong>the</strong>violation was willful, <strong>the</strong> imposition of punitive damages. See 18 U.S.C. § 2707(c); see also Wyatt Technology Corp., 2006 WL5668246, at *9 (awarding punitive damages to a counter-claimant under <strong>the</strong> SCA, because <strong>the</strong> plaintiff accessed <strong>the</strong> defendant'spersonal e-mail on a private foreign server, monitored <strong>the</strong> personal e-mail account, and did not obtain <strong>the</strong> defendant's authorizationto do so).End of Document© 2012 Thomson Reuters. No claim to original U.S. Government Works.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 16


Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312133559 F.3d 110United States Court of Appeals,Second Circuit.FAIVELEY TRANSPORTMALMO AB, Plaintiff-Appellee,v.WABTEC CORPORATION, Defendant-Appellant.SynopsisDocket No. 08-5126-cv. | Argued:Feb. 9, 2009. | Decided: March 9, 2009.Background: Swedish company manufacturing andsupplying railway systems and services brought tradesecret misappropriation action against American company,with which it had a licensing agreement, seeking topreliminarily enjoin American company from undertakingcertain commercial activities. The United States DistrictCourt for <strong>the</strong> Sou<strong>the</strong>rn District of New York, Jed S. Rakoff,J., 572 F.Supp.2d 400, granted in part and denied in partplaintiff's application for preliminary injunction. Defendantappealed.Holdings: The Court of Appeals, José A. Cabranes, CircuitJudge, held that:1 manufacturer had Article III standing to assert trade secretclaims against competitor under expired licensing agreement;2 licensing agreement, providing that disputes arising underagreement were to be “finally settled” in arbitration, did notbar manufacturer's application for preliminary injunction ontrade secret claim;3 manufacturing drawings pertaining to “dimensions andtolerances, surface finishes, material selection and treatments,lubrication specifications, and special instructions formanufacture, testing, and assembly” of product containedtrade secrets;4 competitor likely had used manufacturer's trade secrets inbreach of agreement, confidential relationship, or duty, or asresult of discovery by improper means; and5 manufacturer would not have been irreparably harmedin absence of preliminary injunction for competitor'smisappropriation of trade secrets; disapproving Ivy Mar Co.v. C.R. Seasons, Ltd., 907 F.Supp. 547, 567 (E.D.N.Y.1995).Vacated and remanded.Attorneys and Law Firms*112 A. John P. Mancini (Vanessa M. Biondo, ChristineM. Hernandez, and Daniel B. Kirschner, on <strong>the</strong> brief), MayerBrown LLP, New York, NY, for Faiveley Transport MalmoAB.James C. Martin (Daniel K. Winters, Reed Smith LLP,New York, NY, and Colin E. Wrabley, Reed Smith LLP.Pittsburgh, *113 PA, on <strong>the</strong> brief), Reed Smith LLP,Pittsburgh, PA, for Wabtec Corporation.Before CABRANES and WESLEY, Circuit Judges, andKORMAN, District Judge. *OpinionJOSÉ A. CABRANES, Circuit Judge:The question presented in this case-whe<strong>the</strong>r a manufacturerwho likely misappropriated trade secrets may be preliminarilyenjoined from (a) entering into contracts that will causeit to use those trade secrets and (b) disseminating fur<strong>the</strong>rthose trade secrets-concerns a rarely celebrated but instantlyrecognizable feature of everyday life in New York City:subway brakes. To <strong>the</strong> parties in this case, subway brakesare known as “Brake Friction Cylinder Tread BreakUnits” (“BFC TBU”). For <strong>the</strong> rest of us, BFC TBU are “thatloud squeaking, sparking braking system that so reliably stops<strong>the</strong> New York City Transit subway system.” In re FaiveleyTransp. Malmo AB, 522 F.Supp.2d 639, 640 (S.D.N.Y.2007)(“Faiveley I ”) (internal quotation marks omitted). Twentyfourhours a day and 365 days a year, <strong>the</strong> City's subway carssafely stop at 468 passenger stations-and, as any straphangerknows, many times in between-depositing riders of all classesand descriptions at homes, workplaces, ballparks, and everyo<strong>the</strong>r destination imaginable. See generally MacWade v.Kelly, 460 F.3d 260, 264 (2d Cir.2006) (“The New York Citysubway system ... is an icon of <strong>the</strong> City's culture and history,an engine of its colossal economy, a subterranean repositoryof its art and music, and, most often, <strong>the</strong> place where millionsof diverse New Yorkers and visitors stand elbow to elbow as<strong>the</strong>y traverse <strong>the</strong> metropolis.”).The subway is an indelible feature of <strong>the</strong> City's culture. Itslegend and lore fascinate locals and visitors alike. See, e.g.,Carrie Melago, It's <strong>the</strong> Rail Thing: Subway Ride Record isOfficial, N.Y. Daily News, Aug. 8, 2007, at 24 (reportingthat six alumni of Regis High School set a new world recordfor stopping at all 468 stations on a single fare: 24 hours, 54minutes, and 3 seconds). A point of personal pride for many© 2012 Thomson Reuters. No claim to original U.S. Government Works. 1


134Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312New Yorkers, <strong>the</strong> City's subterranean transit has appearedin song, on stage and screen. See, e.g., Leonard Bernstein,et al., “New York, New York,” from On <strong>the</strong> Town (“NewYork, New York-a helluva town,/The Bronx is up but <strong>the</strong>Battery's down,/And <strong>the</strong> people ride in a hole in <strong>the</strong> ground;/New York, New York-It's a helluva town [!]”), as quoted inThe Oxford Dictionary of Humorous Quotations 329 (NedSherrin, ed., 1995) (attributed to Betty Comden and AdolphGreen, lyricists). The subway's rhythm and sound have alsorumbled into <strong>the</strong> canon of American literature. See, e.g., TomWolfe, The Bonfire of <strong>the</strong> Vanities 36 (Farrar Straus Giroux1998) (1987) (“On <strong>the</strong> subway, <strong>the</strong> D train, heading for <strong>the</strong>Bronx, Kramer stood in <strong>the</strong> aisle holding on to a stainlesssteelpole while <strong>the</strong> car bucked and lurched and screamed.”).Moving forward, our next stop is <strong>the</strong> trade secret disputeconcerning <strong>the</strong> distinctive brakes used by <strong>the</strong> New York Citysubway system.BACKGROUNDDuring <strong>the</strong> 1970s, SAB Wabco-a corporate descendant of <strong>the</strong>Westinghouse Air Brake Company and <strong>the</strong> predecessor-ininterestto plaintiff-appellee Faiveley Transport Malmo AB(“Faiveley”)-developed *114 BFC TBU, a unique air brakesystem designed to stop trains quickly and smoothly, if notalways quietly. The original patents for <strong>the</strong> BFC TBU havesince expired.In 1993, SAB Wabco entered into a license agreement (“<strong>the</strong>1993 Agreement”) with Wabco, <strong>the</strong>n a sister company. 1Pursuant to <strong>the</strong> 1993 Agreement, Wabco was authorizedto use SAB Wabco “know-how”-including “manufacturingdata, specifications, designs, plans, trade secrets” and o<strong>the</strong>rinformation, J.A. 37 (1993 Agreement)-as well as “Patents,Patent Applications, and New Technology,” id. at 38, toproduce and market BFC TBU. The 1993 Agreement wasoriginally scheduled to expire on December 31, 2003, butcould be renewed annually for one-year terms after that timeby agreement of <strong>the</strong> parties. Upon <strong>the</strong> expiration of <strong>the</strong> 1993Agreement, Wabco was to “cease manufacture” of licensedproducts, except insofar as required to meet contracts enteredinto prior to <strong>the</strong> expiration of <strong>the</strong> agreement. Id. at 46.In 2004, Faiveley acquired SAB Wabco. As part of <strong>the</strong>acquisition, Faiveley assumed ownership of SAB Wabco'sintellectual property, including that related to BFC TBU, aswell as SAB Wabco's rights and obligations under <strong>the</strong> 1993Agreement. At that time, Wabtec Corporation (“Wabtec”),<strong>the</strong> successor-in-interest to Wabco, was still producing BFCTBU parts and components pursuant to <strong>the</strong> 1993 Agreement.In December 2004, Faiveley notified Wabtec that <strong>the</strong> 1993Agreement would not be renewed, as a result of which <strong>the</strong>1993 Agreement terminated on December 31, 2005.Beginning in 2005, Wabtec began to develop its own lineof BFC TBU through “reverse engineering.” In 2007, <strong>the</strong>New York City Transit Authority (<strong>the</strong> “Transit Authority”) 2awarded a “sole source” contract to Wabtec whereby Wabtecwas to provide BFC TBU for <strong>the</strong> City's overhaul of a certainclass of subway cars. According *115 to Faiveley, following<strong>the</strong> termination of <strong>the</strong> 1993 Agreement, Wabtec continuedto use Faiveley's proprietary information to produce BFCTBU for its contract with <strong>the</strong> Transit Authority. In May 2007,Faiveley submitted a letter to <strong>the</strong> Transit Authority protesting<strong>the</strong> Wabtec-Transit Authority contract but did not succeed inhaving itself substituted for Wabtec.The 1993 Agreement provided that disputes arising underit would be settled in arbitration proceedings in Stockholm,Sweden. On October 18, 2007, Faiveley filed for sucharbitration with <strong>the</strong> Secretariat of <strong>the</strong> International Courtof Arbitration of <strong>the</strong> International Chamber of Commerce(“ICC”) in Paris, alleging that Wabtec breached <strong>the</strong> 1993Agreement by continuing to use plaintiff's trade secrets tomanufacture BFC TBU after <strong>the</strong> 1993 Agreement terminatedon December 31, 2005. In those arbitration proceedings,which are ongoing, Faiveley seeks, among o<strong>the</strong>r things,damages for breach of <strong>the</strong> 1993 Agreement and an injunctionthat prevents Wabtec from producing BFC TBU or <strong>the</strong>components <strong>the</strong>reof and prevents Wabtec from disclosingFaiveley's proprietary information to third parties. On <strong>the</strong>same day that it filed for arbitration, Faiveley filed suit in <strong>the</strong>United States District Court for <strong>the</strong> Sou<strong>the</strong>rn District of NewYork, seeking a preliminary injunction to prevent Wabtecfrom manufacturing or marketing BCF TBU or disclosingto third parties any trade secrets associated with BCF TBUpending <strong>the</strong> outcome of <strong>the</strong> arbitration.After a four-day evidentiary hearing, <strong>the</strong> United StatesDistrict Court for <strong>the</strong> Sou<strong>the</strong>rn District of New York (JedS. Rakoff, Judge ) granted Faiveley's application in part anddenied it in part. In an August 22, 2008 decision and order, <strong>the</strong>District Court granted <strong>the</strong> application insofar as it enjoinedWabtec from (1) “providing [<strong>the</strong> Transit Authority] with[BFC TBU] manufacturing drawings during <strong>the</strong> course of <strong>the</strong>[<strong>the</strong> Transit Authority] contract,” Faiveley Transp. MalmoAB v. Wabtec Corp., 572 F.Supp.2d 400, 409 (S.D.N.Y.2008)(“Faiveley II ”) (italics omitted), (2) “providing to any thirdparty in some o<strong>the</strong>r context those manufacturing drawings© 2012 Thomson Reuters. No claim to original U.S. Government Works. 2


Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312135or any o<strong>the</strong>r materials that contain Faiveley's trade secrets,”id. at 410 (italics omitted), and (3) “entering into, or biddingfor, any new contracts to manufacture, supply, or sell anyBFC TBUs, or BFC TBU parts, kits or components until <strong>the</strong>Arbitral Tribunal renders a final determination on <strong>the</strong> parties'dispute, and all appeals <strong>the</strong>refrom have been exhausted orconcluded,” id. (italics omitted). The District Court deniedFaiveley's application to enjoin Wabtec from carrying outcontracts entered into before <strong>the</strong> expiration of <strong>the</strong> 1993Agreement, id., and, although it enjoined Wabtec fromdisclosing Faiveley's proprietary information to <strong>the</strong> TransitAuthority, <strong>the</strong> District Court expressly declined to enjoinWabtec from using BFC TBU to carry out <strong>the</strong> TransitAuthority contract, id. at 409.Wabtec <strong>the</strong>n filed this appeal.DISCUSSIONOn appeal, Wabtec contends that (1) Faiveley has notestablished its standing to assert trade secret claims againstWabtec under <strong>the</strong> 1993 Agreement, (2) <strong>the</strong> 1993 Agreementbarred Faiveley's resort to <strong>the</strong> District Court prior to <strong>the</strong>conclusion of <strong>the</strong> arbitral proceedings, and (3) <strong>the</strong> preliminaryinjunction issued by <strong>the</strong> District Court is not supported byevidence in <strong>the</strong> record and, in any event, is overbroad.Only Wabtec's challenge to <strong>the</strong> contours of <strong>the</strong> preliminaryinjunction merits more than brief consideration.1 The record provides ample evidence of Faiveley's standingin light of <strong>the</strong> *116 District Court's findings that (1) Faiveleyowned <strong>the</strong> alleged trade secrets at issue, (2) Wabtec's useor fur<strong>the</strong>r dissemination of those trade secrets constituted aconcrete injury to Faiveley, and (3) any such injury couldbe redressed by <strong>the</strong> relief sought by Faiveley. See Lujan v.Defenders of Wildlife, 504 U.S. 555, 560-61, 112 S.Ct. 2130,119 L.Ed.2d 351 (1992) (describing injury-in-fact, causation,and redressibility as <strong>the</strong> “irreducible constitutional minimum”of Article III standing); Pullman Group, LLC v. PrudentialIns. Co., of Am., 288 A.D.2d 2, 3, 733 N.Y.S.2d 1 (1st Dep't2001) (noting that a plaintiff in a trade secret misappropriationcase cannot establish standing under New York law unless hecan establish that he owned <strong>the</strong> trade secret).2 We also agree with <strong>the</strong> District Court that <strong>the</strong> 1993Agreement did not bar <strong>the</strong> plaintiff's application for apreliminary injunction. See Faiveley I, 522 F.Supp.2d at641. 3 Paragraph 27.1 of <strong>the</strong> 1993 Agreement provides thatdisputes arising under <strong>the</strong> agreement are to be “finally settled”in arbitration, but it does not prohibit resort to appropriateforums for preliminary relief in aid of arbitration. In fact,<strong>the</strong> same paragraph of <strong>the</strong> 1993 Agreement provides that<strong>the</strong> Rules of Conciliation and Arbitration of <strong>the</strong> InternationalChamber of Commerce (“ICC rules”) govern disputesbetween <strong>the</strong> parties. In turn, <strong>the</strong> ICC rules expressly providethat, before <strong>the</strong> matter “is transmitted to <strong>the</strong> Arbitral Tribunal,and in appropriate circumstances even <strong>the</strong>reafter, <strong>the</strong> partiesmay apply to any competent judicial authority for interim orconservatory relief.” Rules of Arbitration art. 23(2) (emphasisadded). That is precisely what Faiveley did in this case. SeeFaiveley I, 522 F.Supp.2d at 641-42.3 4 5 With respect to Wabtec's challenge to <strong>the</strong>preliminary injunction, we review <strong>the</strong> District Court's grantof such relief for abuse of discretion. See, e.g., Somoza v. NewYork City Dep't of Educ., 538 F.3d 106, 112 (2d Cir.2008); cf.In re Sims, 534 F.3d 117, 132 (2d Cir.2008) ( “A district courthas abused its discretion if it based its ruling on an erroneousview of <strong>the</strong> law or on a clearly erroneous assessment of<strong>the</strong> evidence, or rendered a decision that cannot be locatedwithin <strong>the</strong> range of permissible decisions.” (internal citations,alterations, and quotation marks omitted)). A party seekinga preliminary injunction must demonstrate: (1) “ei<strong>the</strong>r (a) alikelihood of success on <strong>the</strong> merits or (b) sufficiently seriousquestions going to <strong>the</strong> merits to make <strong>the</strong>m a fair groundfor litigation and a balance of hardships tipping decidedly in<strong>the</strong> movant's favor,” County of Nassau, N.Y. v. Leavitt, 524F.3d 408, 414 (2d Cir.2008), and (2) “irreparable harm in <strong>the</strong>absence of <strong>the</strong> injunction,” id.A. Likelihood of Success on <strong>the</strong> Merits6 Faiveley is not entitled to preliminary relief unless it hasdemonstrated that *117 Wabtec likely misappropriated atrade secret. Both parties agree that New York law governsthat issue in this case. “To succeed on a claim for <strong>the</strong>misappropriation of trade secrets under New York law, a partymust demonstrate: (1) that it possessed a trade secret, and(2) that <strong>the</strong> defendants used that trade secret in breach of anagreement, confidential relationship or duty, or as a result ofdiscovery by improper means.” N. Atl. Instruments, Inc. v.Haber, 188 F.3d 38, 43-44 (2d Cir.1999) (applying New Yorklaw).7 “A trade secret is any formula, pattern, device orcompilation of information which is used in one's business,and which gives <strong>the</strong> owner an opportunity to obtain anadvantage over competitors who do not know or use it.”Id. at 44 (internal quotation marks and brackets omitted). In© 2012 Thomson Reuters. No claim to original U.S. Government Works. 3


136Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312determining whe<strong>the</strong>r information constitutes a trade secret,New York courts have considered:(1) <strong>the</strong> extent to which <strong>the</strong> information is known outsideof <strong>the</strong> business; (2) <strong>the</strong> extent to which it is known byemployees and o<strong>the</strong>rs involved in <strong>the</strong> business; (3) <strong>the</strong>extent of measures taken by <strong>the</strong> business to guard <strong>the</strong>secrecy of <strong>the</strong> information; (4) <strong>the</strong> value of <strong>the</strong> informationto <strong>the</strong> business and its competitors; (5) <strong>the</strong> amount ofeffort or money expended by <strong>the</strong> business in developing<strong>the</strong> information; (6) <strong>the</strong> ease or difficulty with which <strong>the</strong>information could be properly acquired or duplicated byo<strong>the</strong>rs.Id. (quoting Ashland Mgmt., Inc. v. Janien, 82 N.Y.2d 395,407, 604 N.Y.S.2d 912, 624 N.E.2d 1007 (1993)).We detect no error in <strong>the</strong> District Court's conclusion that <strong>the</strong>BFC TBU manufacturing drawings pertaining to “dimensionsand tolerances, surface finishes, material selection andtreatments, lubrication specifications, and special instructionsfor manufacture, testing, and assembly,” Faiveley II, 572F.Supp.2d at 404, contain trade secrets under New York law.That this information is not widely known is evinced by<strong>the</strong> fact that no company o<strong>the</strong>r than Faiveley-and Wabtecpursuant to <strong>the</strong> 1993 Agreement-has produced a completeBFC TBU. Faiveley has strictly limited <strong>the</strong> access of its ownemployees to <strong>the</strong> information and does not permit customersto view it. It is undisputed that SAB Wabco, Faiveley'spredecessor-in-interest, devoted substantial resources to <strong>the</strong>development of <strong>the</strong> BFC TBU. As demonstrated in <strong>the</strong>testimony of those who took part in Wabtec's engineeringprocess, BFC TBU and BFC TBU components are extremelydifficult to duplicate. The information contained in <strong>the</strong>manufacturing drawings provided Faiveley, as <strong>the</strong> DistrictCourt found, with “far more tha[n][a] ‘slight competitiveedge.’ ” Id. at 405.8 Having established that Faiveley “possessed a tradesecret,” N. Atl. Instruments, Inc., 188 F.3d at 43, we nowconsider whe<strong>the</strong>r Wabtec likely used Faiveley's trade secrets“in breach of an agreement, confidential relationship orduty, or as a result of discovery by improper means,” id. at44. Wabtec argues that it did not misappropriate Faiveley'strade secrets because it independently discovered <strong>the</strong> sameinformation through a “reverse engineering” process. As <strong>the</strong>Supreme Court has noted, “trade secret law ... does not offerprotection against discovery by fair and honest means, suchas by independent invention, accidental disclosure, or by socalledreverse engineering, that is by starting with <strong>the</strong> knownproduct and working backward to divine <strong>the</strong> process whichaided its development or manufacture.” Kewanee Oil Co. v.Bicron Corp., 416 U.S. 470, 476, 94 S.Ct. 1879, 40 L.Ed.2d315 (1974).*118 In this case, <strong>the</strong> record provides ample supportfor <strong>the</strong> District Court's conclusion that Wabtec's reverseengineering process made “important use of Faiveley'strade secrets,” Faiveley II, 572 F.Supp.2d at 408, and was“[a]t a minimum ... fatally tainted,” id. at 407, by <strong>the</strong>involvement of Roland Moore, a Wabtec employee whohad “frequent contact with Faiveley drawings during <strong>the</strong>course of <strong>the</strong> [1993] Agreement,” id. at 406. Wabtec'sfirst effort to reverse engineer BFC TBU, which did notinvolve Moore, produced no usable drawings. However,when Wabtec attempted for a second time to reverse engineerBFC TBU, Moore was selected to play a key role because“he [was] knowledgeable about <strong>the</strong> product.” Tr. 617:9-10(Testimony of Paul E. Jamieson, Chief Engineer, WabtecCorp.). Notwithstanding Moore's “self-serving testimony thathis role in <strong>the</strong> reverse engineering process was minimal,”Faiveley II, 572 F.Supp.2d at 407, <strong>the</strong> record indicates thatMoore made several specific recommendations to draftsmen.Wabtec has not presented us with any compelling reasonnorare we aware of any-to question <strong>the</strong> District Court'sassessment that Moore's testimony was “self-serving.” SeeJoseph v. New York City Bd. of Educ., 171 F.3d 87, 93 (2dCir.1999) (“Assessments of <strong>the</strong> credibility of witnesses arepeculiarly within <strong>the</strong> province of <strong>the</strong> trier of fact and areentitled to considerable deference.”).Accordingly, we hold that <strong>the</strong> District Court did not err infinding that Faiveley is likely to succeed on <strong>the</strong> merits of itsclaim that Wabtec misappropriated Faiveley's trade secrets.B. Irreparable Harm9 10 A showing of irreparable harm is “<strong>the</strong> single mostimportant prerequisite for <strong>the</strong> issuance of a preliminaryinjunction.” Rodriguez v. DeBuono, 175 F.3d 227, 234(2d Cir.1999) (internal quotation marks omitted). We haveexplained that “[t]o satisfy <strong>the</strong> irreparable harm requirement,[p]laintiffs must demonstrate that absent a preliminaryinjunction <strong>the</strong>y will suffer an injury that is nei<strong>the</strong>r remote norspeculative, but actual and imminent, and one that cannot beremedied if a court waits until <strong>the</strong> end of trial to resolve <strong>the</strong>harm.” Grand River Enter. Six Nations, Ltd. v. Pryor, 481F.3d 60, 66 (2d Cir.2007) (internal quotation marks omitted).“Where <strong>the</strong>re is an adequate remedy at law, such as an awardof money damages, injunctions are unavailable except in© 2012 Thomson Reuters. No claim to original U.S. Government Works. 4


Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312137extraordinary circumstances.” Moore v. Consol. Edison Co.of N.Y., 409 F.3d 506, 510 (2d Cir.2005).11 We have previously observed that “<strong>the</strong> loss of tradesecrets cannot be measured in money damages” wherethat secret, once lost, is “lost forever.” FMC Corp. v.Taiwan Tainan Giant Indus. Co., 730 F.2d 61, 63 (2dCir.1984) (per curiam ). Some courts in this Circuit haveread this passing observation to mean that a presumption ofirreparable harm automatically arises upon <strong>the</strong> determinationthat a trade secret has been misappropriated. See, e.g.,Ivy Mar Co. v. C.R. Seasons, Ltd., 907 F.Supp. 547, 567(E.D.N.Y.1995) (“[I]rreparable harm is presumed where atrade secret has been misappropriated.”). That reading is notcorrect. A rebuttable presumption of irreparable harm mightbe warranted in cases where <strong>the</strong>re is a danger that, unlessenjoined, a misappropriator of trade secrets will disseminatethose secrets to a wider audience or o<strong>the</strong>rwise irreparablyimpair <strong>the</strong> value of those secrets. Where a misappropriatorseeks only to use those secrets-without fur<strong>the</strong>r disseminationor irreparable impairment of value-in pursuit of profit, nosuch presumption is warranted because an award of damageswill often provide a complete *119 remedy for such aninjury. Indeed, once a trade secret is misappropriated, <strong>the</strong>misappropriator will often have <strong>the</strong> same incentive as <strong>the</strong>originator to maintain <strong>the</strong> confidentiality of <strong>the</strong> secret in orderto profit from <strong>the</strong> proprietary knowledge. As Judge Connerhas observed, where <strong>the</strong>re is no danger that a misappropriatorwill disseminate proprietary information, “<strong>the</strong> only possibleinjury that [<strong>the</strong>] plaintiff may suffer is loss of sales to acompeting product ... [which] should be fully compensable bymoney damages.” Geritrex Corp. v. Dermarite Indus., LLC,910 F.Supp. 955, 966 (S.D.N.Y.1996) (Conner, J.).12 In cases where <strong>the</strong> presumption applies (and has not beenrebutted) or where irreparable injury has been demonstrated,a “narrowly drawn” preliminary injunction that protects <strong>the</strong>trade secret from fur<strong>the</strong>r disclosure or use may be appropriate.In all cases, <strong>the</strong> relief should be “narrowly tailored to fitspecific legal violations” and to avoid “unnecessary burdenson lawful commercial activity.” Waldman Pub. Corp. v.Landoll, Inc., 43 F.3d 775, 785 (2d Cir.1994).13 Here, <strong>the</strong> evidence showed that, for over twelve years,Wabtec used what is now Faiveley's proprietary informationto manufacture and market BFC TBU and BFC TBU partspursuant to <strong>the</strong> 1993 Agreement. Faiveley has not alleged thatWabtec unlawfully disseminated any trade secrets associatedwith <strong>the</strong> BFC TBU during that period, nor did <strong>the</strong> DistrictCourt find that Wabtec disclosed <strong>the</strong> trade secrets to anythird party after <strong>the</strong> 1993 Agreement expired. The evidencealso indicated that Wabtec incurred considerable expense indeveloping BFC TBU so that it would gain a competitiveadvantage in bidding for contracts like <strong>the</strong> Transit Authority'ssubway car overhaul. Disclosure of Faiveley's trade secretsin connection with a contract to sell BFC TBU or BFCTBU parts would only undermine <strong>the</strong> competitive advantageWabtec has sought.Based on this and o<strong>the</strong>r evidence, <strong>the</strong> District Court found thatWabtec is not disseminating Faiveley's manufacturingdrawings or o<strong>the</strong>r know-how to any third parties; indeed,Wabtec appears to be treating <strong>the</strong>m with <strong>the</strong> sameconfidentiality that <strong>the</strong>y give to <strong>the</strong>ir own proprietaryinformation, that <strong>the</strong>y gave to Faiveley's proprietaryinformation during <strong>the</strong> course of <strong>the</strong> [1993] Agreement,and that <strong>the</strong>y presumably are continuing to give toFaiveley's proprietary information in <strong>the</strong> context of <strong>the</strong>so-called grandfa<strong>the</strong>red contracts.... [T]here is no reasonto conclude that Faiveley's trade secrets will be “lostforever” absent injunctive relief.Faiveley II, 572 F.Supp.2d at 409 (emphasis added). Italso concluded that “nei<strong>the</strong>r Faiveley nor Wabtec, in <strong>the</strong>ordinary course of business, pass on manufacturing drawings(which Faiveley claimed in this case were <strong>the</strong> documentsmemorializing its trade secrets) to customers like New YorkCity Transit.” Id. Accordingly, <strong>the</strong> facts found by <strong>the</strong> DistrictCourt indicate that <strong>the</strong>re is little or no risk that Wabtec willfur<strong>the</strong>r disclose or o<strong>the</strong>rwise irreparably impair Faiveley'strade secrets.In light of Faiveley's failure to demonstrate, and <strong>the</strong> DistrictCourt's failure to find, that Faiveley would suffer irreparableharm unless Wabtec was enjoined from disseminating itstrade secrets, <strong>the</strong> District Court was without authority (1) toenjoin Wabtec from disclosing Faiveley's trade secrets to <strong>the</strong>Transit Authority or o<strong>the</strong>r third parties “as a precautionarymeasure,” id. at 409-10; and (2) to enjoin Wabtec fromentering into new contracts to sell BFC TBU or BFC TBUparts, *120 id. at 410. 4 The District Court did not point toany evidence in <strong>the</strong> record, nor can we find any, to support<strong>the</strong> conclusion that Faiveley would suffer irreparable harmunless Wabtec was enjoined from doing what <strong>the</strong> evidenceindicated it was unlikely to do in <strong>the</strong> absence of an injunctiondisseminateor o<strong>the</strong>rwise irreparably impair Faiveley's tradesecrets. In addition, nothing in <strong>the</strong> record supports <strong>the</strong> DistrictCourt's speculation that new sales contracts would result inan “unacceptably high” risk of dissemination of Faively's© 2012 Thomson Reuters. No claim to original U.S. Government Works. 5


138Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110 (2009)90 U.S.P.Q.2d 1312trade secrets. Id. at 410. In <strong>the</strong> absence of evidentiary supportof irreparable harm, <strong>the</strong>re was no basis for <strong>the</strong> entry of apreliminary injunction against Wabtec in this action.CONCLUSIONFor <strong>the</strong> reasons stated above, <strong>the</strong> August 22, 2008 order of <strong>the</strong>District Court is VACATED and <strong>the</strong> cause is REMANDEDfor fur<strong>the</strong>r proceedings consistent with this opinion.No costs.Parallel Citations90 U.S.P.Q.2d 1312Footnotes* The Honorable Edward R. Korman, of <strong>the</strong> United States District Court for <strong>the</strong> Eastern District of New York, sitting by designation.1 Wabco, like SAB Wabco, is a corporate descendant of <strong>the</strong> Westinghouse Air Brake Company.2 The Transit Authority is a public benefit corporation whose principal business is <strong>the</strong> operation of public subways and buses withinNew York City. It was created by New York State in <strong>the</strong> early 1950s to consolidate <strong>the</strong> multiple subway and bus lines that operatedmore-or-less independently since <strong>the</strong> turn of <strong>the</strong> century. See The Encyclopedia of New York City 827 (Kenneth T. Jackson, ed.,1995); see also Gilchrist v. Interborough Rapid Transit Co., 279 U.S. 159, 190-91, 49 S.Ct. 282, 73 L.Ed. 652 (1929) (summarizing,in a dispute over a proposed fare hike from five cents to seven cents, <strong>the</strong> early financing and development of New York City'ssubway system). We use in this opinion <strong>the</strong> Transit Authority's legal name, see, e.g., Transp. Workers Union, Local 100 v. N.Y.City Transit Auth., 505 F.3d 226 (2d Cir.2007), but note that since <strong>the</strong> mid-1990s <strong>the</strong> agency has “branded” itself “M.T.A. NewYork City Transit.” See James C. McKinley, Jr., What's in a Symbol? A Lot, <strong>the</strong> M.T.A. Is Betting, N.Y. Times, Aug. 28, 1994,at A31 (“Among <strong>the</strong> changes being made, <strong>the</strong> venerable Transit Authority, <strong>the</strong> subsidiary that runs <strong>the</strong> subways and most of <strong>the</strong>city's buses, becomes M.T.A. New York City Transit.”). The “M.T.A.” prefix refers to <strong>the</strong> Metropolitan Transportation Authority,a public benefit corporation created by <strong>the</strong> State of New York in 1968 to oversee <strong>the</strong> various transportation agencies serving NewYork City and its environs, including <strong>the</strong> Transit Authority. See Jackson, supra, at 758. According to what was once known as <strong>the</strong>“newspaper of record,” <strong>the</strong> word “Authority” was dropped from <strong>the</strong> agency's public name “as a way to make <strong>the</strong> service [ ] a littlemore friendly.” McKinley, supra, at A31. Cf. Daniel Okrent, Editorial, Paper of Record? No Way, No Reason, No Thanks, N.Y.Times, April 25, 2004, at D4 (stating that <strong>the</strong> moniker “paper of record” is now “a compliment used as a cudgel,” but noting that“[t]he Times once sort of was”). We, however, are not disturbed by <strong>the</strong> use of “Authority,” and refer to <strong>the</strong> agency by its legal name.3 Wabtec appealed <strong>the</strong> District Court's order immediately after it was entered. However, we dismissed <strong>the</strong> appeal for want ofjurisdiction, as <strong>the</strong> District Court's order-a denial of Wabtec's motion to dismiss Faiveley's petition for preliminary relief-was not afinal order within <strong>the</strong> meaning of 28 U.S.C. § 1291 and was <strong>the</strong>refore not immediately appealable. See Wabtec Corp. v. FaiveleyTransp. Malmo AB, 525 F.3d 135, 141 (2d Cir.2008). We now have jurisdiction to consider <strong>the</strong> order as part of <strong>the</strong> District Court'sfinal decision to grant preliminary injunctive relief to Faiveley. See Coopers & Lybrand v. Livesay, 437 U.S. 463, 467, 98 S.Ct. 2454,57 L.Ed.2d 351 (1978) (noting that “[f]ederal appellate jurisdiction generally depends on <strong>the</strong> existence of a decision by <strong>the</strong> DistrictCourt that ends <strong>the</strong> litigation on <strong>the</strong> merits and leaves nothing for <strong>the</strong> court to do but execute <strong>the</strong> judgment” (internal quotationmarks omitted)).4 We are also concerned that <strong>the</strong> District Court's preliminary injunction against new sales contracts impinges on lawful commercialactivity. See Waldman Pub. Corp. v. Landoll, Inc., 43 F.3d 775, 785 (2d Cir.1994) (“[A]n injunction should not impose unnecessaryburdens on lawful activity.”). Many of <strong>the</strong> parts that make up <strong>the</strong> BFC TBU are in no way associated with Faiveley's trade secrets;<strong>the</strong>y are produced by o<strong>the</strong>r companies and are readily available on <strong>the</strong> market. Although this concern is not <strong>the</strong> basis for our decisionin this case, it may be relevant to any fur<strong>the</strong>r exploration of <strong>the</strong> matter on remand.End of Document© 2012 Thomson Reuters. No claim to original U.S. Government Works.© 2012 Thomson Reuters. No claim to original U.S. Government Works. 6


139Sasqua Group, Inc. v. Courtney, Slip Copy (2010)2010 WL 3613855Only <strong>the</strong> Westlaw citation is currently available.United States District Court,E.D. New York.SASQUA GROUP, INC. and Christopher G. Tors,Plaintiffs,v.Lori COURTNEY and Artemis Consulting, Inc.,Defendants.No. CV 10-528(ADS)(AKT). Aug. 2, 2010.Attorneys and Law FirmsEmily A. Kim, Richard P. Swanson, Arnold & PorterLLP, New York, NY, for Plaintiffs.Martin J. Murray, Nora Von Stange, Law Offices ofMartin J. Murray, New York, NY, for Defendants.OpinionREPORT AND RECOMMENDATIONA. KATHLEEN TOMLINSON, United States MagistrateJudge.*1 This action arises out of a dispute between <strong>the</strong> ownerof Plaintiff Sasqua Group, Inc. (“Sasqua”), namely,Plaintiff Christopher G. Tors (“Tors”) (collectively withSasqua, <strong>the</strong> “Plaintiffs”), and an executive who left <strong>the</strong>company, Defendant Lori Courtney (“Courtney”). Thebusiness relationship between <strong>the</strong> parties is fur<strong>the</strong>rimpacted by <strong>the</strong> fact that Sasqua’s owner, Tors, is <strong>the</strong>uncle of <strong>the</strong> departing executive niece Courtney. Thismatter was referred to me by Judge Leonard Wexler, who,acting as <strong>the</strong> miscellaneous district judge on duty onFebruary 9, 2010, heard argument on Plaintiffs’application for a temporary restraining order, seeking toprevent Defendants (1) from using, disclosing, orproviding access to any of <strong>the</strong> Plaintiff company’sconfidential, propriety and/or trade secret information and(2) contacting or communicating with Plaintiffs’ clientcontacts. Judge Wexler found <strong>the</strong> trade secrets issue to bea “close question,” but denied <strong>the</strong> application, withoutprejudice, and with <strong>the</strong> right to renew. See DE 6.Having determined that <strong>the</strong> issue should be decided in <strong>the</strong>context of a hearing, Judge Wexler referred <strong>the</strong> case to me(1) for a hearing on <strong>the</strong> nature of <strong>the</strong> information soughtto be protected and (2) to issue a Report andRecommendation as to <strong>the</strong> propriety of granting atemporary restraining order. Id. The hearing on <strong>the</strong> tradesecrets issue was conducted on February 11, 2010. Oncethis matter was officially opened on ECF, <strong>the</strong> case wasassigned to <strong>the</strong> Hon. Arthur D. Spatt, to whom this Reportand Recommendation is now directed.I. FACTUAL BACKGROUNDPlaintiff Christopher Tors is a resident of Vermont and<strong>the</strong> president and founder of Sasqua, an executive searchconsulting firm specializing in <strong>the</strong> recruitment andplacement of professionals for <strong>the</strong> financial servicesindustry. Compl. 5-6. Prior to starting Sasqua, Tors hadworked for 15 years at Goldman Sachs as a preciousmetals and foreign currency trader, six years at AIGheading up currency sales, and two years at UBS wherehe was in charge of foreign exchange sales tocorporations. Id., 15. Sasqua works with a small groupof high-caliber clients, including businesses such asBarclays Capital, The Royal Bank of Scotland, NomuraAmerica Holding, Inc., Standard Chartered Bank, BNPParibas and o<strong>the</strong>rs. Lehman Bro<strong>the</strong>rs was one of Sasqua’smajor clients until it closed in 2008. Id., 9.Up until mid-January 2010, Sasqua employed fiveindividuals aside from Tors. Sasqua’s personnel consistedof Defendant and Managing Director Lori Courtney,Vice-President Bridget Schulten, Senior Associate DeboraDoerr Larsen, Research Consultant Kathleen Kelly and acomputer technical expert, Douglas Steinschneider. Theseindividuals were hired on an “independent consultancybasis under contracts that were renewable annually.” Id.Courtney is a New York resident who started working atSasqua in 2000 as a consultant. As Managing Director,Courtney ran <strong>the</strong> day-to-day business of Sasqua and <strong>the</strong>o<strong>the</strong>r “consultants” served as Sasqua’s recruitment staff.Id., 10. At Tors’ direction, Courtney formed ArtemisConsulting LLC in New York in or before 2003 to serveas a vehicle to receive compensation from Sasqua. SeeDeclaration of Christopher G. Tors in Support ofPlaintiffs’ Motion for a Temporary Restraining Order andPreliminary Injunction (“Tors Decl.”), 10. In 2007,Courtney converted <strong>the</strong> LLC into defendant ArtemisConsulting Inc. (“Artemis”), a New York corporationwhich continued to receive Courtney’s compensationfrom Sasqua. Id.*2 Plaintiffs assert that Tors hired Courtney in September2000 as an entry-level research consultant for Sasqua. Shewas paid an hourly fee with bonus opportunities forsuccessful placement of candidates. According to <strong>the</strong>© 2011 Thomson Reuters. No claim to original U.S. Government Works. 1


140Sasqua Group, Inc. v. Courtney, Slip Copy (2010)Complaint, Courtney had no experience in <strong>the</strong> recruitmentand placement of financial industry professionals prior tojoining Sasqua. Id., 12. Tors claims that he trainedCourtney and taught her every aspect of <strong>the</strong> business,including passing on many of his business contacts andrelationships. Id., 13. Courtney asserts that Tors hadonly 2½ years of experience in <strong>the</strong> industry when shestarted to work for him. See Declaration of Lori Courtneyin Opposition to Plaintiffs’ Motion for a TRO andPreliminary Injunction (“Courtney Decl.”), 16. Prior tocommencing work for Sasqua, Courtney had 11 years ofexperience in <strong>the</strong> financial industry and in sales andmarketing work for a publishing company. Id., 17.In 2008, Tors and Courtney entered into negotiations toform a partnership agreement. For a variety of reasons,<strong>the</strong>se negotiations fell through and Courtney continued towork for Sasqua under consulting agreements negotiatedannually. Compl., 22. Beginning in January 2009, Torsand Courtney started sharing equally in <strong>the</strong> profits,expenses and losses of <strong>the</strong> business. Id. Under <strong>the</strong> termsof <strong>the</strong> 2009 contract, it was agreed that anyone whooriginated or executed a placement was able to earnadditional bonus amounts. Id., 24. Sasqua’s businesswas suffering from <strong>the</strong> decline in <strong>the</strong> economy at <strong>the</strong>beginning of 2009, particularly in <strong>the</strong> financial sectorfollowing <strong>the</strong> Lehman failure and AIG bailout. Id ., 25.In light of <strong>the</strong>se circumstances, Tors and Courtney agreedat <strong>the</strong> beginning of 2009 that nei<strong>the</strong>r of <strong>the</strong>m would take itdistribution from <strong>the</strong> profits until <strong>the</strong> financial conditionof <strong>the</strong> company improved. Sasqua’s financial conditiondid improve in mid-2009 and during that summer, Sasquarepaid <strong>the</strong> loans that Tors and Courtney had paid to it and<strong>the</strong>y were both able to start drawing profits again on amonthly basis. Id., 28.According to <strong>the</strong> Complaint, Sasqua maintains on itsserver a central database of client information thatincludes client contact information, individual profiles,contact hiring preferences, employment backgrounds,descriptions of previous interactions with clients, resumesand o<strong>the</strong>r information. This information was placed in <strong>the</strong>database over <strong>the</strong> years by Tors, Courtney, and <strong>the</strong>recruiters whenever <strong>the</strong>y interacted with a client. Id., 30.Sasqua employs a computer technician to maintain <strong>the</strong>database. Id., 31. Plaintiffs assert that <strong>the</strong> database and<strong>the</strong> information it contains are highly confidential toSasqua and only Sasqua personnel have access to it. Id., 35.On January 13, 2010, Tors and Courtney were both inStamford, Connecticut for client meetings. Courtneyrequested a meeting with Tors at that time. Id., 38.During <strong>the</strong> meeting, Courtney advised Tors that she wasterminating her relationship with Sasqua and planned tostart her own executive search consulting firm in NewYork. Id., 39. According to <strong>the</strong> Complaint, Tors wastaken by surprise and had no prior indication thatCourtney contemplated leaving Sasqua or that she wasplanning to start a competing business. Id., 40.Concluding that <strong>the</strong>re was little he could do, Torsnegotiated <strong>the</strong> terms of Courtney’s departure. Tors andCourtney agreed that <strong>the</strong> remaining engagements onwhich Sasqua’s recruitment personnel were currentlyworking would continue as usual until <strong>the</strong> engagementswere closed out. At that point, Courtney’s associationwith Sasqua would end and Sasqua would distribute toCourtney <strong>the</strong> amounts she had earned from thoseengagements, as provided in <strong>the</strong> 2009 contract. Id., 41.The company’s computer technician removed Courtney’saccess to <strong>the</strong> database and erased <strong>the</strong> copy of <strong>the</strong> databasefrom Courtney’s computer. Id., 43.*3 Within <strong>the</strong> week following Courtney’s resignation,Sasqua’s three recruitment consultants approached Torsand advised him that <strong>the</strong>y were terminating <strong>the</strong>iremployment with Sasqua. They fur<strong>the</strong>r stated that <strong>the</strong>ywere going to work for Courtney and Artemis. Id., 44.Tors began immediate negotiations with Schulten, Larsenand Kelly to keep <strong>the</strong>m at Sasqua. He was unsuccessfulwith Larsen and Kelly but was still negotiating withSchulten. Id., 46. When Tors began contacting Sasquaclients to inform <strong>the</strong>m that <strong>the</strong>re would be a change inSasqua’s business going forward, one of <strong>the</strong> clients,Standard Chartered Bank, informed Tors that he alreadyknew about <strong>the</strong> changes. Tors states that he understoodthis to mean that Courtney had contacted StandardChartered Bank and discussed her new business, incompetition with Sasqua. Id., 47. This litigationfollowed.II. THE PARTIES’ CONTENTIONSIn <strong>the</strong> Complaint, Plaintiffs assert that <strong>the</strong>ir trade secretsencompass “<strong>the</strong> confidential proprietary andcompetitively sensitive information about Sasqua’s clientcontacts, <strong>the</strong>ir individual profiles, <strong>the</strong>ir hiring preferences,<strong>the</strong>ir employment backgrounds, and descriptions ofprevious interactions with client contacts.” Compl., 58.Sasqua maintained all of this information in a centraldatabase. Tors Decl., 26. The company had hired acomputer technician to maintain <strong>the</strong> database. Id., 27.According to <strong>the</strong> Plaintiffs,32. The information in <strong>the</strong> database is <strong>the</strong> lifeblood ofSasqua’s business. The database records and reflects<strong>the</strong> company’s ten years of contact-and-relationshipbuilding,which relationship-building is how Sasquagenerates business.33. Such information is not available from a publicsource and it is not information that could be easily© 2011 Thomson Reuters. No claim to original U.S. Government Works. 2


141Sasqua Group, Inc. v. Courtney, Slip Copy (2010)duplicated.Compl., 32, 33; Tors Decl., 28, 29.Tors states that <strong>the</strong> amount of time and resources Sasquahas expended in developing <strong>the</strong> database cannot becalculated and <strong>the</strong> information contained in it is highlyconfidential, available only to Sasqua’s personnel. TorsDecl., 30, 31. Tors believes that since Courtney’sresignation from Sasqua, she has contacted Sasqua clientsin order to solicit business. He also asserts that Courtneyis “poaching all of Sasqua’s recruiters,” <strong>the</strong>rebydebilitating Sasqua,” and that <strong>the</strong>re is “real and substantialrisk that, if no immediate intervention occurs ... Courtneyand Artemis will use Sasqua’s own former consultantsand its confidential business information to put Sasquaout of business.” Id., 57, 58.In opposition, Defendant Courtney states that she has notmisappropriated, nor conspired with anyone tomisappropriate, “any trade secret or confidentialproprietary information belonging to Sasqua, nor have Iused such information since severing my relationship withPlaintiffs.” See Courtney Decl., 2. Courtney adds thatshe is not subject to any restrictive covenants, butnever<strong>the</strong>less has not “solicited any entity or person whoserelationship with Plaintiffs was originated by Tors” andhas not “solicited any of Sasqua’s independent contractorsto come work for me.” Id., 3.*4 Noting that recruitment of professionals for <strong>the</strong>financial services industry is a highly competitive field,Courtney maintains that “Sasqua and o<strong>the</strong>r suchcompanies do not utilize any particular or proprietarymethodology to perform a search.” Id., 8. She fur<strong>the</strong>rstates that “virtually all personnel in <strong>the</strong> capital marketsindustry that Sasqua serves have <strong>the</strong>ir contact informationon Bloomberg, LinkedIn, Facebook or o<strong>the</strong>r publiclyavailable databases.” Id. According to Courtney, <strong>the</strong>people who make up <strong>the</strong> financial services industryworkforce, “including <strong>the</strong> Decision-Makers and o<strong>the</strong>rhigh level executives, typically change employersfrequently ...” and so “<strong>the</strong> contact information that asearch firm may assemble in a database is almostimmediately obsolete.” Id., 10.Courtney states that she informed Tors at <strong>the</strong> meeting onJanuary 13, 2010 that she would no longer serve as aSasqua consultant. She agreed that every deal initiatedprior to that date was attributed to Sasqua and she wouldclose <strong>the</strong> assignments for Sasqua so that Sasqua could bill<strong>the</strong>m and <strong>the</strong>n pay her compensation for initiating andclosing <strong>the</strong> deal. Id., 53. During <strong>the</strong> meeting with Torsthat day, Courtney states Tors agreed that herrelationships were hers to take with her and he wished herluck. Id., 56. Although she asserts that Tors invited herto copy her contacts from <strong>the</strong> Sasqua database, Courtneyrecalls that she declined <strong>the</strong> invitation, explaining to Torsthat she really “didn’t need to do any copying because of<strong>the</strong> accessibility of information from Bloomberg or o<strong>the</strong>rpublic databases.” Id., 61, 62. According to Courtney,Sasqua’s computer technician removed <strong>the</strong> database fromher computer promptly. Moreover, Courtney contendsthat <strong>the</strong> database software used by Sasqua was out of dateand <strong>the</strong> program was not geared to <strong>the</strong> industry. She haspurchased new software “designed for recruiters” and sheis “building [her] own database from scratch in terms of<strong>the</strong> methodology and <strong>the</strong> data.” Id., 64, 65. Courtneymaintains that she has not appropriated any trade secretsfrom Sasqua and that <strong>the</strong> information Tors seeks toprotect is of very little value and is in no way proprietaryto any search firm. Id., 67.III. APPLICABLE STANDARD“A trade secret is ‘any formula, pattern, device orcompilation of information which is used in one’sbusiness and which gives [<strong>the</strong> owner an opportunity toobtain an advantage over competitors who do not know oruse it.’ New York courts consider several factors indetermining whe<strong>the</strong>r information constitutes a tradesecret, including (1) <strong>the</strong> extent to which <strong>the</strong> information isknown outside of <strong>the</strong> business; (2) <strong>the</strong> extent to which it isknown by employees and o<strong>the</strong>rs involved in <strong>the</strong> business;(3) <strong>the</strong> extent of measures taken by <strong>the</strong> business to guard<strong>the</strong> secrecy of <strong>the</strong> information; (4) <strong>the</strong> value of <strong>the</strong>information to <strong>the</strong> business and its competitors; (5) <strong>the</strong>amount of effort or money expended by <strong>the</strong> business indeveloping <strong>the</strong> information; and (6) <strong>the</strong> ease or difficultywith which <strong>the</strong> information could be properly acquired orduplicated by o<strong>the</strong>rs.” Unisource Worldwide, Inc. v.Valenti, 196 F.Supp.2d 269, 278 (quoting Softel, Inc. v.Dragon Med. & Scientific Communications, Inc., 118F.3d 955, 968 (2d Cir.1997) (applying New York law)).These factors were first enumerated in AshlandManagement, Inc. v. Janien, 82 N.Y.2d 395, 407, 604N.Y.S.2d 912, 624 N.E.2d 1007 (1993) (quotingRestatement of Torts § 757, cmt. b).*5 “ ‘A customer list developed by a business throughsubstantial effort and kept in confidence may be treatedand protected at <strong>the</strong> owner’s instance against disclosure toa competitor, provided <strong>the</strong> information it contains is noto<strong>the</strong>rwise readily ascertainable.’ In addition, knowledgeof a customer’s needs and specifications and <strong>the</strong> pricescharged to that customer are considered confidential.”Unisource Worldwide, Inc. v. Valenti, 196 F.Supp.2d 269,278 (quoting Defiance Button Mach. Co. v. C & C MetalProducts. Corp., 759 F.2d 1053, 1063 (2d Cir.), cert.denied, 474 U.S. 844, 106 S.Ct. 131, 88 L.Ed.2d 108(1985)). Therefore, “[a] plaintiff claimingmisappropriation of a trade secret must prove: ‘(1) it© 2011 Thomson Reuters. No claim to original U.S. Government Works. 3


142Sasqua Group, Inc. v. Courtney, Slip Copy (2010)possessed a trade secret, and (2) defendant is using thattrade secret in breach of an agreement, confidence, orduty, or as a result of discovery by improper means.’ “Computer Associates International, Inc. v. Bryan, 784F.Supp. 982, 987 (E.D.N.Y.1992) (citing Integrated CashMgt. Servs., Inc. v. Digital Transactions, Inc., 920 F.2d171, 173 (2d Cir.1990))It is clear that irreparable harm is presumed where a tradesecret has been misappropriated. In <strong>the</strong> words of <strong>the</strong>Second Circuit, “[a] trade secret once lost is, of course,lost forever” and, as a result, and as a result, such a loss“cannot be measured in money damages.” FMC Corp. v.Taiwan Tainan Giant Indus. Co., 730 F.2d 61, 63 (2dCir.1984) (“<strong>the</strong> loss of a trade secret is not measurable interms of money damages”); Computer Assocs. Int’l v.Bryan, 784 F.Supp. 982, 986 (E.D.N.Y.1992) (forpurposes of a motion for a preliminary injunction, loss oftrade secrets is not measurable in terms of moneydamages and is thus considered irreparable harm). Lumex,Inc. v. Highsmith, 919 F.Supp. 624, 628 (E.D.N.Y.1996).IV. DISCUSSIONA. Nature of <strong>the</strong> Information Sought to be ProtectedIt is worth noting at <strong>the</strong> outset that <strong>the</strong>re is no restrictivecovenant between <strong>the</strong> parties here which might o<strong>the</strong>rwisegovern this dispute.1 Compare, BDO Seidman v.Hirschberg, 93 N.Y.2d 382, 388-89, 690 N.Y.S.2d 854,712 N.E.2d 1220 (N.Y.1999); Silipos, Inc. v. Bickel, No.1:06-cv-02205, 2006 WL 2265055, at *3 (S.D.N.Y.Aug.8, 2006) (if an employer can demonstrate at least onelegitimate interest, such as protection of trade secrets, acourt has discretion to partially enforce an o<strong>the</strong>rwiseoverbroad covenant). Plaintiffs maintain that Defendantshave misappropriated Sasqua’s trade secrets. Pls.’ Mem.at 12. To qualify for protection against such allegedmisappropriation, Plaintiffs must demonstrate (1) “that[Sasqua] possessed a trade secret and (2) that <strong>the</strong>Defendants used that trade secret in breach of anagreement, confidential relationship or duty, or as a resultof discovery by improper means.” North AtlanticInstruments v. Haber, 188 F.3d 38, 43-44 (2d Cir.1999).Therefore, <strong>the</strong> threshold question which needs to bedetermined is whe<strong>the</strong>r <strong>the</strong> client database maintained bySasqua is entitled to trade secret protection at this stage of<strong>the</strong> litigation. See Kadant, Inc. v. Seeley Machine, Inc.,244 F.Supp.2d 19, 35 (N.D.N.Y.2003). “The question ofwhe<strong>the</strong>r a customer list is a trade secret is generally aquestion of fact.” Id. at 36 (citing North AtlanticInstruments, 188 F.3d at 44). To analyze <strong>the</strong> alleged“trade secret” information presented here in <strong>the</strong> absenceof a restrictive covenant, <strong>the</strong>n, <strong>the</strong> Court now turns to anassessment of each of <strong>the</strong> Ashland Management factors asapplied to <strong>the</strong> specific circumstances of this case.1. Is <strong>the</strong> Information Known Outside <strong>the</strong> Business?*6 As Plaintiffs have noted, under Second Circuitprecedent, “[a] customer list ‘developed by a businessthrough substantial effort and kept in confidence may betreated as a trade secret and protected at <strong>the</strong> owner’sinstance against disclosure to a competitor, provided <strong>the</strong>information it contains is not o<strong>the</strong>rwise readilyascertainable.’ “ North Atlantic Instruments, 188 F.3d at44 (quoting Defiance Button Mach. Co. v. C & C MetalProds. Corp., 759 F.2d 1053, 1063 (2d Cir.), cert. denied,474 U.S. 844, 106 S.Ct. 131, 88 L.Ed.2d 108 (1985)).This is indeed <strong>the</strong> nub of <strong>the</strong> arguments presented by bothsides in <strong>the</strong> instant case. Plaintiffs claim that Defendantspossess Sasqua’s confidential business information,including its client list and contacts, its list of recruitmentcandidates, its business strategies, its search andplacement methods, its fee structures and o<strong>the</strong>rinformation. Tors Decl., 52; Pls.’ Mem. at 9. Accordingto <strong>the</strong> Plaintiffs, <strong>the</strong> information contained in <strong>the</strong> Sasquadatabase is not available from a public source. Tors Decl., 29; Pls.’ Mem. at 6. Over <strong>the</strong> past 10 years, Sasqua hascompiled “detailed contact information for Sasqua’sclients,” Tors Decl., 53, as well as confidentialinformation concerning each client’s needs, preferences,hiring practices, strategies for business expansion, andpersonal knowledge as well as acquaintance with keydecision-makers at <strong>the</strong> client firms. Id., 53-54.Plaintiffs argue that Sasqua has invested tremendous time,energy and resources into developing <strong>the</strong> contacts andrelationships that are now threatened by <strong>the</strong> Defendantsand that <strong>the</strong> confidential information was not knownoutside Sasqua until Defendant Courtney departed. Id., 55; Pls.’ Mem. at 10.On <strong>the</strong> o<strong>the</strong>r hand, Defendants maintain that Sasqua ando<strong>the</strong>r such companies “do not utilize any particular orproprietary methodology to perform a search. The stocktool of <strong>the</strong> trade is <strong>the</strong> Internet, where informationregarding prospective financial institution customers, aswell as job candidates, is equally and readily available toany recruiter.” Defs.’ Mem. at 2-3. The Defendants go onto note that “virtually all capital markets personnel have<strong>the</strong>ir contact information on Bloomberg, LinkedIn,Facebook or o<strong>the</strong>r publicly available databases, includinga firm’s own media advertising.” Id.Plaintiffs rely primarily on North Atlantic Instruments andWebcraft Technologies, Inc. v. McCaw, 674 F.Supp.1039, 1044 (S.D.N.Y.1987) to support <strong>the</strong>ir position thatSasqua’s client list, contact persons, preferences,operations and hiring practices are subject to trade secret© 2011 Thomson Reuters. No claim to original U.S. Government Works. 4


143Sasqua Group, Inc. v. Courtney, Slip Copy (2010)protection. These two cases, however, dealt with differentproducts and services than what is at issue in <strong>the</strong> currentaction and are factually distinguishable. In North AtlanticInstruments, plaintiff North Atlantic had entered into anAsset Purchase Agreement with Transmagnetics, Inc.(“TMI”), which was engaged in a related businesstargeted toward a particular niche market. TMI designed,manufactured and sold customized electronic devices to alimited number of engineers in <strong>the</strong> aerospace and hightechindustries. North Atlantic Instruments, 188 F.3d at40. North Atlantic’s CEO testified that <strong>the</strong> customizednature of TMI’s business “made <strong>the</strong> identity of <strong>the</strong>relatively small number of engineers who require itsproducts especially crucial to its business success.” Id.Consequently, knowing <strong>the</strong> identity and needs of <strong>the</strong>seengineers was an extremely valuable aspect of TMI’sbusiness and one which would have been difficult forano<strong>the</strong>r company to ascertain on its own. Id. TMI’spresident, Fred Haber, was also TMI’s head of sales.North Atlantic conditioned its purchase of TMI onHaber’s continuing to work for North Atlantic in a rolesimilar to <strong>the</strong> one he occupied at TMI and for whichNorth Atlantic paid him a salary and bonuses. Id. at 40-41.*7 Some three years later, after Haber had access toinformation about North Atlantic’s technology andcustomer base, including lists of customers and contactswith <strong>the</strong>ir individual product needs, Haber left NorthAtlantic and joined a competing company. That companyhired Haber specifically because of <strong>the</strong> contacts hedeveloped at TMI/North Atlantic. At a hearing on NorthAtlantic’s motion for a preliminary injunction, NorthAtlantic produced a printout of confidential clientinformation from its customer database. That list had beenprinted by Haber over a month after he had left NorthAtlantic and it was found in <strong>the</strong> new company’s files. Id.at 42. In his Report and Recommendation, <strong>the</strong> magistratejudge found that <strong>the</strong> list of companies to whom NorthAtlantic’s TMI division sold was not a trade secret;however, <strong>the</strong> magistrate judge concluded that <strong>the</strong> identityof <strong>the</strong> individual contact people with whom Haber dealtwhile at North Atlantic/TMI was a protectable tradesecret. Id. at 44-45. In making that determination, <strong>the</strong>magistrate judge relied on <strong>the</strong> testimony of NorthAtlantic’s chief executive who described <strong>the</strong> “needle-in<strong>the</strong>-haystackcharacter of <strong>the</strong> search for <strong>the</strong> handful ofengineers in companies of 100,000 employees who mighthave a use for one of North Atlantic’s customizedproducts.” Id. at 45. That is clearly not <strong>the</strong> scenario withregard to Sasqua’s clients.Similarly, in Webcraft Technologies, <strong>the</strong> plaintiff soldunusual custom printed materials, as distinguished fromservices, that were produced by an “in-line finishing”process. Webcraft Technologies, 674 F.Supp. at 1041,1045. There, <strong>the</strong> defendant had signed an employmentagreement containing covenants which prohibited herfrom competing with Webcraft or soliciting Webcraftcustomers for a period of two years from <strong>the</strong> date oftermination of her employment. The covenant alsoprohibited plaintiff from disclosing any trade secretsrelating to Webcraft’s business-specifically, names andneeds of customers, pricing information and certaindesignated specifications and lists. A competing companyoffered <strong>the</strong> defendant a job, which she accepted, but sheremained at Webcraft for three additional weeks. Duringthat period, she passed confidential Webcraft informationon to her next employer. Id. The defendant gave her newboss a list of Webcraft customers and viable prospects. Inaddition, she removed certain property from <strong>the</strong> Webcraftoffice. Id. at 1042. Among <strong>the</strong>se items were defendant’sWebcraft rolodex and eight pages of Webcraft quotes andpricing sheets for three possible jobs <strong>the</strong> defendant waspursuing while at Webcraft, along with a statement ofWebcraft’s commission plan. Id. The court held that <strong>the</strong>defendant violated both <strong>the</strong> letter and spirit of <strong>the</strong> tradesecrets provision by blatantly passing to <strong>the</strong> competitorcompany Webcraft’s customer information, projectspecifications and pricing details. Id. Moreover, Webcraftintroduced evidence of <strong>the</strong> long and difficult process toeducate and convert a prospective customer to <strong>the</strong> benefitsof <strong>the</strong> in-line finishing process. Defendant herself testifiedthat developing a customer in that business was an“arduous” process. Id. The evidence also established that<strong>the</strong> specialized nature of Webcraft’s business “was notuseful to many people, many kinds of advertising or directmail customers.” Id.*8 Plaintiffs’ reliance on Giffords Oil Co., Inc. v. Wild,106 A.D.2d 610, 483 N.Y.S.2d 104 (2d Dep’t 1984) isalso unavailing. Like <strong>the</strong> defendant in Webcraft,defendant Michael Wild was subject to an employmentagreement containing a restrictive covenant whichprevented him from soliciting customers for three yearsafter termination of his employment. Id. at 610, 483N.Y.S.2d 104. The Appellate Division held that <strong>the</strong>customer list at issue in Giffords Oil was entitled to tradesecret protection because <strong>the</strong> list also containedinformation such as <strong>the</strong> fuel oil capacity of eachcustomer’s tank and <strong>the</strong> amount certain customers werewilling to pay-information which could only be obtainedthrough personal solicitation. Id. at 611, 483 N.Y.S.2d104. In <strong>the</strong> instant action, aside from <strong>the</strong> absence of aretrictive covenant, Plaintiffs allege that Defendantspossess Sasqua’s fee structure but produced no evidenceat <strong>the</strong> hearing demonstrating that Defendant Courtney wasusing any Sasqua pricing information or customerspecifications. Moreover, from <strong>the</strong> information presentedthus far, it appears that each placement Sasqua makes isunique. As such, <strong>the</strong>re is little, if any, competitiveadvantage to be gained from knowledge of Sasqua’spricing since <strong>the</strong>re is no exact formula for pricing thatCourtney could use to her advantage. See Production© 2011 Thomson Reuters. No claim to original U.S. Government Works. 5


144Sasqua Group, Inc. v. Courtney, Slip Copy (2010)Resource Group, L.L.C. v. Oberman, No. 03 Civ. 5366,2003 WL 22350939, at *14 (S.D.N.Y., Aug. 27, 2003).Here, <strong>the</strong> circumstances involving Defendant Courtney’srelationship with and departure from Sasqua are quitedifferent. For example, <strong>the</strong>re was no non-compete or nonsolicitationagreement in place which bound Courtney inany way at <strong>the</strong> time of her departure from Sasqua. Inaddition, <strong>the</strong> evidence adduced at <strong>the</strong> hearing establishedthat Courtney did not take <strong>the</strong> Sasqua database with her.In addition to Courtney’s own testimony, <strong>the</strong> Declarationof Douglas Steinschneider, Sasqua’s computer technician,submitted in opposition to Plaintiffs’ motion for a TROand preliminary injunction (“Steinschneider Decl.”), setsforth that Tors originally told Steinschneider to remove<strong>the</strong> database from Courtney’s computer at <strong>the</strong> time sheannounced she was leaving Sasqua and would becompeting with Sasqua through her own company,Artemis. Steinschneider Decl. 8. After Steinschneiderremoved <strong>the</strong> database, Tors changed his mind and toldSteinschneider he wanted Courtney to be able to access<strong>the</strong> database since Courtney had agreed to completesearches for Sasqua that she had already begun. At thatpoint, Steinschneider told Tors that he had alreadyremoved <strong>the</strong> database and that Courtney said she did notwant it. On that basis, Steinschneider did not reinstall <strong>the</strong>database. Id.; Courtney Decl., 64.Significantly, Courtney did not sign on to work for acompetitor; ra<strong>the</strong>r, she went into business for herself. Sheis not selling a unique product to a few industry insiders,nor is she educating customers to an unusualmanufacturing process as did <strong>the</strong> defendants in NorthAtlantic Instruments and Webcraft. By contrast, any firmor entity in <strong>the</strong> financial services industry with amanagerial or executive position vacancy is a potentialcustomer of a business such as Courtney’s which offersexecutive placement services. The “product” here is notone “where a company’s availability as a potential patroncannot be readily ascertained. The potential list of[plaintiffs’] customers is not limited in such a way thatany list of ... prior purchasers is a trade secret.” IronMountain Info. Mgt., Inc. v. Taddeo, 455 F.Supp.2d 124,139 (E.D.N.Y.2006).*9 Courtney testified during <strong>the</strong> hearing that <strong>the</strong> identityof capital markets businesses is readily ascertainablethrough an Internet search, in <strong>the</strong> phonebook, in tradepublications or through a firm’s own media advertising.Transcript of <strong>the</strong> February 11, 2010 Hearing, at 28.2 Thepredominant business model that Sasqua followed was toget a search assignment from a capital markets businessand <strong>the</strong>n go out and find a candidate to fill thatassignment. Id. at 31-32. Courtney’s specialty was foreignexchange trading, foreign exchange businesses andemerging markets. In <strong>the</strong> foreign exchange area, Courtneytestified that she could obtain <strong>the</strong> names of <strong>the</strong> globalhead of foreign exchange businesses, <strong>the</strong> sales and tradinghead, <strong>the</strong> regional heads, and specific traders from sourcessuch as Bloomberg, LinkedIn, Facebook and generalGoogle searches. Id. at 37. She added that many peoplewho are found in Bloomberg have <strong>the</strong>ir titles orspecialties listed, along with a substantial amount ofbackground information, including <strong>the</strong>ir resumes or, at <strong>the</strong>very least, <strong>the</strong>ir past work history, education, personal cellphone number, e-mail address and often <strong>the</strong> very desk<strong>the</strong>y work on in <strong>the</strong> foreign exchange business, as well asa listing of <strong>the</strong>ir responsibilities. Id. at 39.Courtney fur<strong>the</strong>r described how she would track downinformation at a capital markets business. Specifically,she would start with an Internet search and look for highturnover at banks. Having obtained that information, shewould <strong>the</strong>n do a search on Bloomberg, LinkedIn orGoogle. Once she had gained as much knowledge aspossible regarding <strong>the</strong> bank or business, she would <strong>the</strong>ncall <strong>the</strong> potential decision-maker, explain that she is arecruiter and has knowledge of that contacted person’sbusiness and <strong>the</strong> kinds of things that <strong>the</strong> business mightneed. Id. at 40-41. The goal would be to set up a meetingor phone call and try to gain <strong>the</strong> contact person’sconfidence. During <strong>the</strong> course of his examination ofCourtney, in an attempt to show that <strong>the</strong> foregoingscenario was not <strong>the</strong> actual manner in which Sasquadrilled down for information regarding specific decisionmakers,Plaintiffs’ counsel asked a series of questionsrelated specifically to <strong>the</strong> foreign exchange business atLehman Bro<strong>the</strong>rs. Prior to <strong>the</strong> economic downturn in <strong>the</strong>Fall of 2008, Lehman Bro<strong>the</strong>rs accounted for two-thirdsof Sasqua’s business. Id. at 47. Plaintiffs’ counsel elicitedtestimony from Courtney establishing that Tors’ businesscard was originally passed down at least four levels froma high ranking senior executive at Lehman Bro<strong>the</strong>rs to <strong>the</strong>head of foreign exchange who was <strong>the</strong> one responsible forutilizing recruiters for searches in that area. Courtneyacknowledged that Sasqua did not obtain foreignexchange searches by cold calling <strong>the</strong> high ranking seniorexecutive. Id. at 64-68. Her job was to get to know <strong>the</strong>appropriate decision-maker and cultivate a relationshipwith him or her. In addition to Lehman Bro<strong>the</strong>rs,Courtney worked with Barclay’s, Nomura and StandardChartered Bank. Id. at 72. When plaintiffs’ counsel asked“And whe<strong>the</strong>r or not you have access to Sasqua’sdatabase, you know how to be in touch with [<strong>the</strong> decisionmakers],”Courtney answered “yes, that’s true.” Tr. at 73.*10 With regard to <strong>the</strong> database used at Sasqua, Courtneytestified that it “served <strong>the</strong> purpose of a rolodex, keepingpeople’s names and phone numbers and <strong>the</strong>n <strong>the</strong>re wassome minimal qualification-type stuff, you know, verybasic.” Id. at 91. The software was very old according toCourtney, so <strong>the</strong> search capability was limited to onedescriptive item. Id. at 92. The database contained anindividual name with a code attached to <strong>the</strong> name. As an© 2011 Thomson Reuters. No claim to original U.S. Government Works. 6


145Sasqua Group, Inc. v. Courtney, Slip Copy (2010)example, Courtney testified that an individual’s namewould appear with a code such as “FX seniormanagement” (“FX” meaning foreign exchange) orsomething like that. Id. at 93. Sasqua recruiters could onlyattach one designation to a name. Id. These assertions aresupported by <strong>the</strong> Steinschneider Declaration in whichSasqua’s computer technician states that “<strong>the</strong> informationon <strong>the</strong> database was exceedingly old and stale, much of itwas never even accessed let alone used, and overall wasof little value.” Steinschneider Decl., 1(d).In applying <strong>the</strong> Ashland Management factors, <strong>the</strong> Courtneeds to consider “whe<strong>the</strong>r <strong>the</strong> effort invested indeveloping <strong>the</strong> customers simply involved widespreadcanvassing, as was <strong>the</strong> case in Leo Silfen, or whe<strong>the</strong>r <strong>the</strong>employer actually worked to create a market for a newservice or good.” Webcraft Technologies, 674 F.Supp. at1045 (referencing Leo Silfen, Inc. v. Cream, 29 N.Y.2d387, 328 N.Y.S.2d 423, 427-29, 278 N.E.2d 636(N.Y.1972)). The service at issue here, executiverecruitment and placement, sometimes referred to as“headhunting,” is not one that is “so specialized that[Sasqua] actually created a new market; ra<strong>the</strong>r, <strong>the</strong> list ofpotential customers appears limitless.” Iron Mountain,458 F.Supp.2d 124, 140 (E.D.N.Y.2006). Put succinctly,<strong>the</strong> list of customer contact information was developedlargely through <strong>the</strong> efforts of Courtney both before andduring her employment with Sasqua, in a market that “isnot so highly specialized but has many, easily identifiable,potential customers.” Id.; see Reed Roberts Assocs., Inc.v. Strauman, 40 N.Y.2d 303, 308, 353 N.E.2d 590, 594,386 N.Y.S.2d 677, 680 (1976) (where former employee’spast or prospective customer names can be readilyascertained from sources outside its business, trade secretprotection will not attach).Courtney also admitted that since leaving Sasqua onJanuary 13, 2010, she has talked to many of <strong>the</strong> samebusiness contacts that she spoke with when she workedfor Sasqua and she did seek new search assignments. Tr.at 79. However, she testified that she never had aconversation prior to leaving Sasqua with any Sasquaclients about getting future work from <strong>the</strong>m for her owncompany, Artemis. Tr. at 83. Courtney spoke withcontacts at Nomura after leaving Sasqua while she wascontinuing to conclude a search for <strong>the</strong>m as part ofSasqua’s business. In those conversations, she advised <strong>the</strong>individuals that she was on her own and that she hoped toget more business from <strong>the</strong>m going forward. Id. at 88, 386N.Y.S.2d 677, 353 N.E.2d 590. According to Courtney,Tors told her at <strong>the</strong> January meeting that her relationshipswere hers to keep and that he did not expect her to refrainfrom contacting <strong>the</strong>m because <strong>the</strong>re was no non-competein place. Id. She has refrained from contacting any ofTors’ relationships, including Interactive Brokers, Hessand Sempra. Id . at 88-89, 386 N.Y.S.2d 677, 353 N.E.2d590. As to Nomura, Courtney has communicated with sixto eight contacts, including by e-mail. Those e-mailaddresses are in her personal Microsoft Outlook as well asin <strong>the</strong> Outlook folders for her new company. Id. at 89, 386N.Y.S.2d 677, 353 N.E.2d 590.*11 Defendants do not dispute <strong>the</strong> standard enunciated inNorth Atlantic Instruments for establishing a trade secretclaim or claim for misappropriation. See Defendants’Mem. at 12. Ra<strong>the</strong>r, drawing upon <strong>the</strong> argument thatwhe<strong>the</strong>r a customer list is a trade secret is generally aquestion of fact, defendants maintain that <strong>the</strong>re are“readily apparent factual dissimilarities” between <strong>the</strong>information at issue in this case and customer lists that <strong>the</strong>courts have found to be trade secrets. Id. at 13.Defendants rely on <strong>the</strong> Second Circuit’s recent decision inFaiveley v. Transport Malmo AB v. Wabtec Corp., 559F.3d 110 (2d Cir.2009), in which <strong>the</strong> court clarified itsprior holdings regarding misappropriation of trade secrets.In Faiveley, <strong>the</strong> trial court had granted a preliminaryinjunction to <strong>the</strong> plaintiff, finding that <strong>the</strong> defendant hadlikely misappropriated certain of plaintiff’s trade secretsinvolving <strong>the</strong> manufacture of an air brake system for <strong>the</strong>New York City subway. The court enjoined <strong>the</strong> defendantfrom entering into contracts that would cause it to usethose trade secrets. Id. at 115. On appeal, <strong>the</strong> SecondCircuit addressed its prior holdings regarding <strong>the</strong>misappropriation of trade secrets and determined that <strong>the</strong>injunction was not warranted. Specifically, <strong>the</strong> courtprovided <strong>the</strong> following guidance:we have previously observed that “<strong>the</strong> loss of tradesecrets cannot be measured in money damages” wherethat secret, once lost, is “lost forever.” FMC Corp. v.Taiwan Tainan Giant Indus. Co., 730 F.2d 61, 63 (2dCir.1984) (per curiam). Some courts in this Circuithave read this passing observation to mean that apresumption of irreparable harm automatically arisesupon <strong>the</strong> determination that a trade secret has beenmisappropriated. See, e.g., Ivy Mar Co. v. C.R. Seasons,Ltd., 907 F.Supp. 547, 567 (E.D.N.Y.1995)(“[I]rreparable harm is presumed where a trade secrethas been misappropriated.”). That reading is notcorrect. A rebuttable presumption of irreparable harmmight be warranted in cases where <strong>the</strong>re is a dangerthat, unless enjoined, a misappropriator of trade secretswill disseminate those secrets to a wider audience oro<strong>the</strong>rwise irreparably impair <strong>the</strong> value of those secrets.Where a misappropriator seeks only to use thosesecrets-without fur<strong>the</strong>r dissemination or irreparableimpairment of value-in pursuit of profit, no suchpresumption is warranted because an award of damageswill often provide a complete remedy for such aninjury. Indeed, once a trade secret is misappropriated,<strong>the</strong> misappropriator will often have <strong>the</strong> same incentiveas <strong>the</strong> originator to maintain <strong>the</strong> confidentiality of <strong>the</strong>secret in order to profit from <strong>the</strong> proprietaryknowledge. As Judge Conner has observed, where© 2011 Thomson Reuters. No claim to original U.S. Government Works. 7


146Sasqua Group, Inc. v. Courtney, Slip Copy (2010)<strong>the</strong>re is no danger that a misappropriator willdisseminate proprietary information, “<strong>the</strong> only possibleinjury that [<strong>the</strong>] plaintiff may suffer is loss of sales to acompeting product ... [which] should be fullycompensable by money damages.” Geritrex Corp. v.Dermarite Indus., LLC, 910 F.Supp. 955, 966(S.D.N.Y.1996).*12 Id. at 118-119. The Second Circuit has <strong>the</strong>reforedrawn a distinction here-one that is important to <strong>the</strong>instant case-between an individual who uses a trade secretand an individual who disseminates a trade secret. In <strong>the</strong>current action, even crediting Sasqua’s claims to <strong>the</strong>fullest extent, <strong>the</strong> information presented shows that, atbest, defendant Courtney was a user of <strong>the</strong> informationand not someone who was disseminating <strong>the</strong> information.In fact, dissemination is not even alleged by <strong>the</strong> Plaintiffs.As <strong>the</strong> court in Faiveley noted, <strong>the</strong> defendant [Courtney]would have <strong>the</strong> same incentive as <strong>the</strong> plaintiff [Tors] tomaintain <strong>the</strong> confidentiality of <strong>the</strong> information in order toprofit from such knowledge. Id. at 119.During <strong>the</strong> hearing, to support Defendants’ contentionthat <strong>the</strong> information in Sasqua’s database is not a tradesecret and is readily ascertainable, Defendants’ counselhad Courtney walk through <strong>the</strong> manner in which shewould conduct a search “if she had amnesia tomorrow,lost her Blackberry” and “needed to identify ... <strong>the</strong>decision-makers in <strong>the</strong> industry....” Tr. at 113. Courtney<strong>the</strong>n testified how she would go about finding <strong>the</strong>sepeople from publicly available information. Defendants’introduced Exhibit 1 (“DX 1”), a copy of which isattached to this Report and Recommendation. Id .Courtney testified that if she had only basic knowledge ofwhat a capital markets business is and was starting fromscratch to find information on key decision-makers, shewould start with an Internet search. With anunderstanding that many banks are hiring personnel inemerging markets, Courtney stated that she would beginby seeking an emerging markets salesperson or decisionmakerwhom she could contact at Standard CharteredBank. Tr. at 114. Courtney described a publication, FXWeek, which carries substantial information about foreignexchange businesses and also touches on emergingmarkets. FX Week has a searchable database, so shewould type into <strong>the</strong> search window <strong>the</strong> terms “emergingmarkets sales” and “Standard Chartered Bank”(www.fxweek.com/search?query=emerging+market+sales+StandardCharteredBank). The database brings up a list of topicsand articles which <strong>the</strong> searcher can click onto, as shownon DX 1 at 1. One of <strong>the</strong> articles listed is entitled“StanChart in U.S. build-up.” Id. By clicking on thatarticle, <strong>the</strong> computer displays <strong>the</strong> story on <strong>the</strong> monitor asreflected in DX 1 at 2. Courtney pointed out informationin <strong>the</strong> article which stated that Standard Chartered Bank(“SCB”) had made 17 new appointments and was lookingto become a core bank for US-based clients. Tr. at 115.The names of <strong>the</strong> 17 appointees are listed in <strong>the</strong> article,<strong>the</strong> first of whom is Harvey Black, who heads SCB’sinvestor sales business for <strong>the</strong> Americas. Black is clearlya decision-maker whom Courtney stated she would wantto contact. Id.; DX 1 at 2. Courtney testified that <strong>the</strong>process of obtaining Black’s name through this type ofsearch took approximately 5 minutes. Tr. at 115-116.*13 The next name appearing in <strong>the</strong> article is Hugo Faria,who recently left UBS to join SCB as <strong>the</strong> head of itsemerging markets structuring for <strong>the</strong> Americas. Tr. at116; DX 1 at 2. This is ano<strong>the</strong>r decision-maker. Inaddition to contact information for Mr. Faria, this dataalso provides “ano<strong>the</strong>r piece of intelligence,” according toCourtney, because it would enable her during a call toUBS to offer assistance in finding a replacement. Tr. at116. After getting <strong>the</strong>se names, Courtney testified that<strong>the</strong>re are several ways to obtain phone numbers. Here, shewent to Google and entered <strong>the</strong> name “Standard CharteredBank.” That search yielded <strong>the</strong> address of <strong>the</strong> bank, <strong>the</strong>phone number and a map showing how to get <strong>the</strong>re. Tr. at117; DX 1 at 3. According to Courtney, her experience atSasqua did not play a role in her ability to find thisinformation on <strong>the</strong> Internet. Tr. at 17-118. What doesassist her in obtaining this kind of information andbuilding relationships with clients is her experience priorto joining Sasqua-prior jobs as an equity derivatives traderon <strong>the</strong> options floor of <strong>the</strong> New York Stock Exchange, acommodity derivatives trader on <strong>the</strong> COMEX, and amarketer of commodity derivatives for Paribas, <strong>the</strong>French investment bank. According to Courtney, withsuch background, clients “trust that you understand <strong>the</strong>irneeds” which streng<strong>the</strong>ns your credibility. Tr. at 118-119.Courtney <strong>the</strong>n described a similar process that she wouldutilize if she were approached by a foreign exchangetrader who was looking for a position at Nomura and ifshe were starting from scratch. Going to Google first thistime, Courtney typed in <strong>the</strong> phrase “global head of FX inNomura.” Tr. at 120. Approximately 72,400 hits came up,<strong>the</strong> first of which was entitled “Nomura Appoints Head ofFixed Income Research.” Clicking on that entry yielded<strong>the</strong> name of <strong>the</strong> appointee, <strong>the</strong> date, and <strong>the</strong> prior positionoccupied by <strong>the</strong> appointee at his previous bank. DX 1 at4. Fur<strong>the</strong>r down <strong>the</strong> page was an entry entitled “NomuraBrings in Lehman FX Team.” Id. Clicking on that entrybrings <strong>the</strong> searcher to a website called “Profit &Loss.com” and a December 2009 article entitled“Nomura’s Richard Gladwin: Global Ambition.” DX 1 at5. Richard Gladwin is listed as <strong>the</strong> global co-head offoreign exchange at Nomura and <strong>the</strong> article is a six-pageinterview with him. The interview provides significantdetail concerning Nomura’s new technology andinitiatives. Gladwin discusses Nomura’s acquisition ofparts of Lehman Bro<strong>the</strong>rs as an element of its strategy to© 2011 Thomson Reuters. No claim to original U.S. Government Works. 8


147Sasqua Group, Inc. v. Courtney, Slip Copy (2010)“become a global wholesaler of foreign exchange.” Id.Since Gladwin’s phone number and contact informationwere not contained in <strong>the</strong> article, Courtney next went toBloomberg.com “because that is <strong>the</strong> database for financialprofessionals.” Tr. at 122. Doing a search on Bloomberg,Courtney was able to find <strong>the</strong> direct phone number forGladwin at Nomura’s offices in London, <strong>the</strong> Londonaddress itself and Gladwin’s direct email address. TheBloomberg site also allows <strong>the</strong> user to send an instantmessage to Gladwin. Tr. at 122.*14 Courtney also explained how such a search could beconducted on LinkedIn, which she described as being“like Facebook but for business” and as being moresearchable than Bloomberg “because people put <strong>the</strong>irwhole profile on LinkedIn.” Tr. at 123-124. UsingLinkedIn, Courtney demonstrated <strong>the</strong> results of putting<strong>the</strong> term “FX Nomura” into <strong>the</strong> search box. The first entrylisted <strong>the</strong> name “Michael Wilson,” Executive Director atNomura; <strong>the</strong> second entry listed <strong>the</strong> name “David Steck,FX at Nomura Securities.” DX 1 at 12. After looking atboth profiles, Courtney determined that David Steck’slisting yielded <strong>the</strong> information she was seeking. Clickingon <strong>the</strong> “David Steck” entry brought up a screen whichlisted Steck’s prior employers and positions, current title,undergraduate school and dates of attendance, e-mailaddress and Steck’s interests. DX 1 at 13; Tr. at 125-126.Fur<strong>the</strong>r researching Steck, Courtney entered his name onBloomberg.com and found a news story regarding Steck’shiring by Nomura as well as “competitive intelligence”about Nomura’s plans and o<strong>the</strong>r new hires. DX 1 at 14.With regard to <strong>the</strong> level of information, Courtney testifiedthat[i]t used to be years ago, that people were veryprotective about <strong>the</strong>ir resumes and personal informationbecause no one ever wanted <strong>the</strong>ir employer to get windthat <strong>the</strong>y were looking for ano<strong>the</strong>r job. But in a post-Lehman bankruptcy world when everyone thought that<strong>the</strong> whole financial markets were going to <strong>the</strong> birds,and everyone was panicked about <strong>the</strong>ir jobs, <strong>the</strong> culturechanged absolutely overnight to one where people wereprotective of <strong>the</strong>ir information to one where almosteveryone ... puts it out <strong>the</strong>re for <strong>the</strong> world to seebecause people want to be connected now. People wantto know-people want <strong>the</strong> recruiters knowing who <strong>the</strong>yare and how to find your information and how to find<strong>the</strong>m if <strong>the</strong>y have a good opportunity. It has completelyshifted.Tr. at 127.Since <strong>the</strong> Bloomberg article did not provide contactinformation for David Steck, Courtney did a search onGoogle for Nomura New York, and came up with Steck’sNew York address, <strong>the</strong> office location in <strong>the</strong> WorldFinancial Center, and <strong>the</strong> office phone number. Tr. at 128;DX 1 at 15. Using Bloomberg.com, Courtney was <strong>the</strong>nable to obtain Steck’s direct phone line and personal e-mail address. DX 1 at 16. Courtney demonstrated similarsearches for information regarding decision-makers at <strong>the</strong>Royal Bank of Scotland (“RBS”) and new senior-levelhires at RBS. DX 1 at 17; Tr. at 129-131. Significantly,when Courtney came upon <strong>the</strong> name of Craig Donaldson,head of RBS’ Financial Institutions Foreign Exchangeand Prime Brokerage Sales for North America, she notedthat Donaldson was responsible for expanding RBS’foreign exchange platform. Tr. at 130. She <strong>the</strong>n went toLinkedIn and posted Donaldson’s name in <strong>the</strong> search box.Donaldson’s profile listed all of his prior employment andpositions, his current position, education and dates,licenses held, and interests. DX 1 at 20-21. In addition,<strong>the</strong> profile listed his wife’s name, his children’s namesand ages, <strong>the</strong> outdoor sports he enjoys, and his birthday.Within <strong>the</strong> time span of Courtney’s testimony, <strong>the</strong>defendants produced evidence of <strong>the</strong> publicly availableinformation regarding decision-makers in foreignexchange firms and businesses that in most cases,according to Courtney, exceeded <strong>the</strong> amount and level ofdetail contained in <strong>the</strong> Sasqua database. Tr. at 132.Plaintiffs did not refute this testimony. Courtney alsonoted that much of <strong>the</strong> information in <strong>the</strong> Sasqua databasewas outdated and did not have any value to her. Tr. at136.*15 On fur<strong>the</strong>r questioning by plaintiffs’ counsel,Courtney acknowledged that she did not utilize <strong>the</strong>methodology she had outlined in discussing DX 1 whencontacting Sasqua clients after January 13, 2010. Tr. at139-140. Plaintiffs’ counsel argued that what <strong>the</strong> clients’preferences are and “finding <strong>the</strong> right decision maker andgetting that right decision maker to act is not nearly aseasy as [Defendant Courtney] is articulating when shewalks through Exhibit 1.” Tr. at 143. However, <strong>the</strong>re wasno contraverting testimony proffered to support Plaintiffs’contention in this regard.At <strong>the</strong> very least, Plaintiffs have failed to prove that <strong>the</strong>general contact information for Sasqua clients is notreadily ascertainable through outside sources, such as <strong>the</strong>Internet or telephone books, or directories of firms in <strong>the</strong>financial services industry, like <strong>the</strong> ones demonstrated by<strong>the</strong> Defendants at <strong>the</strong> hearing. Kadant, Inc., 244F.Supp.2d at 36. Plaintiffs go on to argue, however, thatwith respect to specific names of individuals who are keypersons in <strong>the</strong> chain of command for authorizingplacements and obtaining business at <strong>the</strong>se firms, suchinformation cannot be so readily ascertained. Tr. at 147,149-150. Although Plaintiffs’ counsel argued this pointforcefully several times during <strong>the</strong> hearing, Plaintiffsnever<strong>the</strong>less did not produce a single witness to providesworn testimony supporting this contention orcontradicting Courtney’s testimony in this regard, o<strong>the</strong>rthan by generalized statements in Tors’ Declaration.© 2011 Thomson Reuters. No claim to original U.S. Government Works. 9


148Sasqua Group, Inc. v. Courtney, Slip Copy (2010)Moreover, since <strong>the</strong> general contact information is readilyascertainable through o<strong>the</strong>r sources, and may <strong>the</strong>reforereadily be used, “follow-up questions to <strong>the</strong> company ingeneral would reveal <strong>the</strong> specific names, e-mailaddresses, or phone numbers of individuals involved in<strong>the</strong> [hiring/placement] process for those companies.”Kadant, Inc., 244 F.Supp.2d at 36 (citing InFlightNewspapers, Inc. v. Magazines In-Flight, LLC, 990F.Supp. 119, 129 (E.D.N.Y.1997)); Ability Search, Inc. v.Lawson, 556 F.Supp. 9, 16 (S.D.N.Y.1981) (executiveplacement firm not entitled to injunction with respect toinformation about corporate clients “since it failed toprove that defendants utilize any information about suchclients which was not available from public sources orreadily ascertainable by defendants in conducting <strong>the</strong>irown business”). If <strong>the</strong>se referenced sources did notdirectly disclose <strong>the</strong> appropriate contacts, fur<strong>the</strong>r inquirywith those firms and fur<strong>the</strong>r research on <strong>the</strong> Internetcertainly would. InFlight Newspapers, 990 F.Supp. at129.Plaintiffs also allege that <strong>the</strong> Sasqua database containsinformation on certain firms’ placement preferences andhistories. It is true that while contact information may bereadily ascertainable through o<strong>the</strong>r sources, things such asclient preferences or placement histories may not. SeeNorth Atlantic Instruments, 188 F.3d at 46; InflightNewspapers, 990 F.Supp. at 127. This assertion isnone<strong>the</strong>less subject to <strong>the</strong> same logic presented above.The general contact information is readily availablethrough o<strong>the</strong>r sources. Utilizing those sources to obtaingeneral contact information, Courtney or o<strong>the</strong>rs maysimply have asked <strong>the</strong> clients about <strong>the</strong>ir preferences. SeeKadant, Inc., 244 F.Supp.2d at 37 (citing Tactica Int’l.,Inc. v. Atlantic Horizon Int’l, Inc., 154 F.Supp.2d 586,607 (S.D.N.Y.2001)) (“Information concerning <strong>the</strong>preferences of [plaintiff’s] customers could easily berecalled by [defendants], or obtained by contacting <strong>the</strong>customers directly”); Innoviant Pharmacy, Inc. v.Morganstern, 390 F.Supp.2d 179, 195 (N.D.N.Y.2005)(where referral sources are readily ascertainable frompublicly available sources including <strong>the</strong> Internet, YellowPages, and <strong>the</strong> membership lists of various professionalorganizations providing services in those areas, <strong>the</strong>customer information does not possess <strong>the</strong> attributes of atrade secret); Walter Karl, Inc. v. Wood, 137 A.D.2d 22,27, 528 N.Y.S.2d 94, 98 (2d Dep’t 1988) (“Anemployee’s recollection of information pertaining tospecific needs and business habits of particular customersis not confidential.”). Defendant Courtney has certainlyalleged that this is how <strong>the</strong> process works. “Mere‘knowledge of <strong>the</strong> intricacies of a [former employer’s]business operation’ does not constitute a protectable tradesecret that would justify prohibiting <strong>the</strong> employee ‘fromutilizing his knowledge and talents in this area.’ “ Int’lPaper Co. v. Suwyn, 966 F.Supp. 246, 256(S.D.N.Y.1997) (quoting Reed Roberts, 386 N.Y.S.2d at680, 353 N.E.2d 590). The burden is on <strong>the</strong> plaintiffs toprovide sufficient proof that this is not what occurred. Id.They have not done so. As to this first AshlandManagement factor, Defendants have adequatelyestablished that <strong>the</strong> information Plaintiffs contend is atrade secret was/is known outside Sasqua.2. Extent ofEmployees’ Knowledge*16 There is no real dispute that <strong>the</strong> information in <strong>the</strong>Sasqua database was readily available to those workingfor Sasqua. The company had purchased computers forCourtney and <strong>the</strong> three recruiters/consultants. Tors Decl., 32. Tors states that Sasqua’s entire personnel, including<strong>the</strong> recruiters, Courtney, Steinschneider and Tors himself,had access to <strong>the</strong> database because <strong>the</strong>y required <strong>the</strong>information “in order to conduct <strong>the</strong>ir day-to-daybusiness.” Id., 31, 604 N.Y.S.2d 912, 624 N.E.2d 1007.According to Tors, Steinschneider downloaded a copy of<strong>the</strong> database to each of <strong>the</strong> computers and through a“secure connection,” <strong>the</strong> consultants were able to“manually upload and download any new information thatei<strong>the</strong>r <strong>the</strong>y had entered into <strong>the</strong>ir respective copies of <strong>the</strong>database or that o<strong>the</strong>rs had updated <strong>the</strong> central databasewith.” Id., 33-34, 604 N.Y.S.2d 912, 624 N.E.2d 1007.Tors fur<strong>the</strong>r notes that he instructed each consultant thatshe was <strong>the</strong> only one who was authorized to access <strong>the</strong>computer and that <strong>the</strong> computer was to be used for workpurposes only. Id., 35, 604 N.Y.S.2d 912, 624 N.E.2d1007. However, Tors did not require “that employees signconfidentiality agreements, which cuts against a tradesecret finding.” Freedom Calls Foundation v. Bukstel,No. 05CV5460, 2006 WL 845509, at *16 (E.D.N.Y.Mar.3, 2006). Nor did Sasqua limit <strong>the</strong> number of itsemployees who could access <strong>the</strong> information. Compare B.U.S.A. Corp. v. Ecogloves, Inc., No. 05-CIV. 9988, 2006WL 3302841, at *3 (S.D.N.Y. Jan. 31, 2006) (“plaintiffssufficiently protected <strong>the</strong>ir cost structures and biddinginformation as <strong>the</strong>y limit <strong>the</strong> number of employees thathave access to such information”). All of Sasqua’spersonnel, <strong>the</strong>refore, knew or had access to <strong>the</strong>information for which Plaintiffs seek to assign trade secretprotection because <strong>the</strong>y utilized this information to do<strong>the</strong>ir daily work. These facts militate against a finding oftrade secret protection as to this second factor.3. Measures to Protect Secrecy of <strong>the</strong> InformationAs noted above, Plaintiffs assert that in order to protect<strong>the</strong> confidentiality of <strong>the</strong> database, Sasqua purchasedcomputers for Courtney and <strong>the</strong> three recruiters. TorsDecl., 32. The company’s computer techniciandownloaded a copy of <strong>the</strong> database to each of <strong>the</strong>© 2011 Thomson Reuters. No claim to original U.S. Government Works. 10


149Sasqua Group, Inc. v. Courtney, Slip Copy (2010)computers. Tors states that Sasqua purchased individuallicenses to permit <strong>the</strong> consultants to use certain softwareallowing access to <strong>the</strong> database. Id., 33. There was norestriction on <strong>the</strong> consultants manually uploading anddownloading new information to and from <strong>the</strong> centraldatabase. Id., 34.Of all <strong>the</strong> Ashland Management factors, <strong>the</strong> mostimportant consideration is whe<strong>the</strong>r <strong>the</strong> information waskept secret. See Earthweb, Inc. v. Schlack, 71 F.Supp.2dat 314 (citing Lehman v. Dow Jones & Co., 783 F.2d 285,298 (2d Cir.1986)); Greenblatt v. Prescription PlanServices Corp., 783 F.Supp. 814, 826 (S.D.N.Y.1992) (ifowner of a trade secret fails to take reasonableprecautions to protect <strong>the</strong> information, <strong>the</strong> informationloses <strong>the</strong> protection of trade secret law). Whe<strong>the</strong>rSasqua’s information was kept secret is critical to <strong>the</strong>Court’s determination of <strong>the</strong> trade secret issue.*17 The owner of a trade secret must take reasonablemeasures to protect its secrecy. Defiance Button MachineCo. v. C & C Metal Products, 759 F.2d 1053, 1063 (2dCir.1985); Earth Web, Inc., 71 F.Supp.2d at 314. Some of<strong>the</strong> measures courts have looked to in this regard are <strong>the</strong>use of passwords, alarm systems, and installation offirewalls and security software. See, e.g., Paz Systems,Inc. v. The Dakota Group Corp., 514 F.Supp.2d 402, 406(E.D.N.Y.2007) (employer’s computer network wasstored in a building protected by both commercial locks,passwords and an alarm system, including motiondetectors); Wrap-N-Pack, Inc. v. Eisenberg, No. 04-cv-4887, 2007 WL 952069, at *9 (E.D.N.Y. Mar.29, 2007)(company implemented significant safeguards to protectinformation by requiring user identification and password;installing firewalls and security software that preventedsalesmen from accessing any information regarding o<strong>the</strong>rsalesmen’s customers; installing passwords andrestrictions of all laptop computers; circulating policy andprocedure manual containing a code of conduct definingdisclosure of confidential information as unacceptablebehavior; pursuing litigation to prevent <strong>the</strong> threateneddisclosure of confidential information); B.U.S.A. Corp. v.Ecogloves, Inc., No. 05 CIV. 9988, 2006 WL 3302841, at*4 (S.D.N.Y. Jan. 31, 2006) (“plaintiffs took appropriatemeasures, such as locking files and using computerpasswords, to protect <strong>the</strong> contact information”).In support of <strong>the</strong>ir argument that plaintiffs did notimplement reasonable measures to protect <strong>the</strong> secrecy ofSasqua’s information, Defendants have provided <strong>the</strong>Declaration of Douglas Steinschneider, Sasqua’scomputer technician, who has worked for <strong>the</strong> companysince its inception in 2000. See Declaration of DouglasSteinschneider In Opposition to Plaintiffs’ Motion for aTRO and Preliminary Injunction (“Steinschneider Decl”), 1. Steinschneider tells a very different story fromPlaintiff Tors regarding measures taken to protect <strong>the</strong>secrecy of Sasqua’s database. According toSteinschneider, <strong>the</strong> Sasqua database was not initiallyconstructed by Plaintiff Tors-ra<strong>the</strong>r, Tors purportedlymisappropriated <strong>the</strong> database from his prior employer,Futures International. Id.; Courtney Decl., 2. This is asignificant point in <strong>the</strong> Court’s consideration of whe<strong>the</strong>rtrade secret protection should be afforded. Courts havelooked to <strong>the</strong> method by which <strong>the</strong> data is acquired. As<strong>the</strong> court observed in Ecolab Inc. v. Paolo, 753 F.Supp.1100 (E.D.N.Y.1991),In determining whe<strong>the</strong>r matter is protectable as a tradesecret, courts frequently examine <strong>the</strong> method by whichdefendant acquired it, e.g., such as by stealing orcopying ....Id. at 1111. That same principle is applicable to Plaintiffs’acquisition of <strong>the</strong> database here. In light of <strong>the</strong> unrefutedallegation3 that Tors took <strong>the</strong> database from his prioremployer at <strong>the</strong> time of his departure, <strong>the</strong> issue ariseswhe<strong>the</strong>r Tors comes to this Court seeking equitable reliefwith unclean hands.*18 Fur<strong>the</strong>r, Steinschneider goes on to note that• Tors directed him to leave <strong>the</strong> database on Courtney’scomputer so Courtney could use it for searches she hadagreed to complete after she left Sasqua.Steinschneider Decl., 1.• Sasqua was “extremely lax in <strong>the</strong>ir efforts tosafeguard <strong>the</strong> data.” Id., 3.• <strong>the</strong> Sasqua database was not password protected. Id., 4• <strong>the</strong> database was “freely distributed to many peopleover <strong>the</strong> years, including temporary workers who hadlittle longevity with <strong>the</strong> company.” Id., 5.• The database was not removed from an employee’scomputer after <strong>the</strong> employee left Sasqua and <strong>the</strong>individuals who left still have <strong>the</strong> database. Id., 6.• <strong>the</strong> Sasqua database did not contain legendsdesignating confidential and proprietary informationembedded in its pages to remind employees of <strong>the</strong>confidential nature of <strong>the</strong> information or <strong>the</strong>ir duty tosafeguard it. Id., 7.According to Steinschneider, he removed <strong>the</strong> databasefrom Courtney’s computer as instructed initially by Tors.Subsequently, Tors changed his mind, but Steinschneidertold Tors that he had already removed <strong>the</strong> database andCourtney said she did not want it, so Steinschneider didnot reinstall it. Id., 8. With regard to <strong>the</strong> usefulness of<strong>the</strong> database, Steinschneider states that it was“exceedingly old and stale.” Id., 9. In fact, because he© 2011 Thomson Reuters. No claim to original U.S. Government Works. 11


150Sasqua Group, Inc. v. Courtney, Slip Copy (2010)was able to see whe<strong>the</strong>r data had been accessed and, if so,when that access had occurred, Steinschneider states tha<strong>the</strong> was able to see that “a large part of <strong>the</strong> data was souseless that no Sasqua employee ever even accessed it, letalone used it.” Id. Moreover, Steinschneider claims that“much of plaintiffs’ database was more than 10 years old,because it was taken from Futures International and<strong>the</strong>refore was 10 years old before Sasqua ever got it in2000.” Id. Plaintiffs did not introduce any evidence at <strong>the</strong>hearing to contradict Steinschneider’s sworn assertions. Infact, Tors has made no statement denying <strong>the</strong> claim byCourtney and Steinschneider that he took <strong>the</strong> databaseutilized at Sasqua from Futures International.Likewise, Courtney testified that <strong>the</strong>re were people whonever worked for Sasqua who were in possession of <strong>the</strong>database. Specifically, Courtney noted that a group inLondon called Edge Search with whom Sasqua wasattempting to establish a joint venture possessed <strong>the</strong>database. Tr. at 94. In addition, a similar group, BakiaiInternational, partnered with Sasqua on a specific LehmanCanada search and Courtney testified that <strong>the</strong>y had <strong>the</strong>database and may still have it because it was never takenback to <strong>the</strong> best of her knowledge. Moreover, Torshimself confirmed that from <strong>the</strong> time <strong>the</strong> New York officeclosed in 2008, <strong>the</strong> consultants have been working out of<strong>the</strong>ir own homes. Tors Decl., 8. Courtney notes thatfamily members had access to <strong>the</strong> database by virtue of<strong>the</strong> fact that it was contained on <strong>the</strong> computers utilized byall of <strong>the</strong> consultants at home. Tr. at 94. It is also worthnoting that when I asked Plaintiffs’ counsel at <strong>the</strong> hearingwhe<strong>the</strong>r <strong>the</strong> Sasqua computers were password protected,counsel’s response was that she did not believe so. Id. at16.*19 The evidence here shows that Sasqua failed to takeeven basic steps to protect <strong>the</strong> secrecy of <strong>the</strong> informationcontained in its database-<strong>the</strong> very same information Torsrefers to as “<strong>the</strong> lifeblood of Sasqua’s business.” TorsDecl., 28. Consequently, even if <strong>the</strong> databaseinformation may once have had protection, <strong>the</strong> customerinformation lost its character as a trade secret becauseSasqua failed to take reasonable steps to protect <strong>the</strong>information from coming into o<strong>the</strong>r hands. DefianceButton Machine Co., 759 F.2d at 1063 (even thoughcompetitor may have obtained customer lists by impropermeans, any such impropriety does not create liability foruse of <strong>the</strong> trade secret since <strong>the</strong> failure to protect <strong>the</strong> listfrom ready access resulted in plaintiff forfeiting <strong>the</strong>protections of trade secret law). This most critical of <strong>the</strong>Ashland Management factors, <strong>the</strong>refore, favorsDefendants.4. Value of <strong>the</strong> Information to <strong>the</strong> Business and ItsCompetitorsAs to <strong>the</strong> value of <strong>the</strong> information contained in <strong>the</strong> Sasquadatabase, <strong>the</strong>re is little doubt that <strong>the</strong> information as it wasdeveloped in <strong>the</strong> early years of Sasqua’s history wasessential to <strong>the</strong> business. However, Tors implies thatbecause of his prior career at Goldman Sachs, AIG andUBS, his “very good industry connections” in <strong>the</strong>financial industry were responsible for Sasqua’s success.Tors Decl., 5. According to Tors, Sasqua went fromgrossing several hundred thousand dollars of revenueannually to a multi-million dollar enterprise by 2010. Id.At <strong>the</strong> same time, however, Tors states that <strong>the</strong> only officewhich Sasqua maintained in New York closed as a costsavingmeasure during <strong>the</strong> economic downturn in 2008.Id., 8, 604 N.Y.S.2d 912, 624 N.E.2d 1007. See Doraziov. Capitol Specialty Plastics, Inc., No. CIV.A.01-6548,2002 WL 31750215, at *4 (E.D.Pa. Dec.9, 2002)(plaintiff failed to show that his contact with a substantialclient was <strong>the</strong> but-for cause of <strong>the</strong> company’s successes).Significantly, Courtney’s compensation was based oncommissions and an agreed-upon revenue share. CourtneyDecl., 18. Courtney asserts, and Plaintiffs have notrefuted, that she was responsible for 65% of <strong>the</strong>company’s income in 2007. That number grew to 75% in2008 and <strong>the</strong> remaining 25% was attributable to oneplacement that Tors initiated and Courtney executed. Id., 26. On <strong>the</strong> o<strong>the</strong>r hand, Tors did not make anyplacements that generated revenue for Sasqua in 2009. Id.Ra<strong>the</strong>r, Courtney’s efforts and those of ano<strong>the</strong>r consultantgenerated 87% and 13% respectively of <strong>the</strong> company’stotal revenue for 2009. Id.In addition, both Steinschneider and Courtney haveprovided sworn statements that Tors took <strong>the</strong> informationwhich became <strong>the</strong> Sasqua database from his prioremployer, Futures International. Steinschneider Decl., 2;Courtney Decl., 2. Plaintiffs have not produced contrarytestimony showing that <strong>the</strong> contacts were exclusivelyTors in <strong>the</strong> first instance. Tors’ Declaration leads to <strong>the</strong>conclusion that at least some of his client contacts weredeveloped through his employment prior to establishingSasqua. Tors Decl., 4. Based on this information, it ismore difficult to view <strong>the</strong>se client contacts as trade secretsbelonging to Tors when he developed <strong>the</strong>m while workingfor o<strong>the</strong>r employers. See Ecolab, 753 F.Supp. at 1111.*20 Fur<strong>the</strong>r, Tors’ assertion that <strong>the</strong> database is <strong>the</strong>“lifeblood of Sasqua’s business” is belied bySteinschneider’s sworn statement that <strong>the</strong> information on<strong>the</strong> database was “exceedingly old and stale, much of itwas never even accessed let alone used, and overall wasof little value.” Steinschneider Decl., 1. According toSteinschneider, in <strong>the</strong> information technology field, datais generally considered stale if it is more than a year old.Similarly, Courtney maintains that10. Because <strong>the</strong> people who make up <strong>the</strong> financialindustry workforce, including <strong>the</strong> Decision-Makers and© 2011 Thomson Reuters. No claim to original U.S. Government Works. 12


151Sasqua Group, Inc. v. Courtney, Slip Copy (2010)o<strong>the</strong>r high level executives, typically change employersfrequently, <strong>the</strong> contact information that a search firmmay assemble in a database is almost immediatelyobsolete. Keeping tabs on Decision-Makers of potentialjob candidates is an ongoing part of a recruiter’s job.11.... Even if <strong>the</strong> recruiter makes a record of <strong>the</strong>information collected for one assignment, thatinformation generally is not that relevant to <strong>the</strong> nextassignment. For example, one month a firm may belooking for a junior salesperson to cover hedge fundaccounts, six months later <strong>the</strong> firm may need a directorlevelperson to trade currency derivatives.Courtney Decl., 10, 11. The database software used bySasqua, in addition to being out of date, according toCourtney, is also not geared to <strong>the</strong> industry. Id., 65. Shehas purchased new software designed for recruiters and isbuilding her own database from scratch, both in terms of<strong>the</strong> methodology and data. Id. Courtney states that prior to2008, only about 30% of Sasqua’s information wascurrent and that after <strong>the</strong> upheaval of 2008, only about10% of <strong>the</strong> information was current. Id., 66. She notedthat as soon as a candidate is placed, <strong>the</strong> candidate’sresume, salary history and contact information areoutdated. Id., 10. The Court finds <strong>the</strong>re is some sense tothis latter assertion and Plaintiffs have not presented anyevidence refuting such contention. As a result, whatevervalue to Sasqua <strong>the</strong> database information once possessedclearly diminished over time as its utility to Sasqua’sconsultants declined, and, as a logical consequence, toany would-be competitor of Sasqua.5. Time and Effort Expended in Developing <strong>the</strong>InformationAlthough Sasqua has been in existence for ten years, <strong>the</strong>passage of time alone does not equate to “time and effort”in assessing this particular factor. This is not an instancewhere <strong>the</strong> client lists were gained through extraordinaryeffort or expensive research, although no one woulddispute that Sasqua’s personnel worked long and hard tomake <strong>the</strong> company <strong>the</strong> success that it was. Yet, one doesnot have to look far and wide to determine <strong>the</strong> identity offirms operating in <strong>the</strong> financial services industry. Thesebusinesses regularly hire and terminate personnel andinteract with headhunters while <strong>the</strong>ir employees oftentransition to new positions and new firms. See In-FlightNewspapers, Inc., 990 F.Supp. at 129. The identity of <strong>the</strong>firms and such individuals are not hidden.*21 As to Sasqua’s existing accounts, Courtneyacknowledged that for a long period of time, LehmanBro<strong>the</strong>rs was a key client of Sasqua and that Torsoriginated that account. Both Tors and Courtneydeveloped contacts at Lehman Bro<strong>the</strong>rs after Torsoriginated <strong>the</strong> account. Tr. at 47, 49. Lehman Bro<strong>the</strong>rsaccounted for twothirds of Sasqua’s business up until2008. The financial market downturn in 2008 left Sasquawithout its two biggest clients, Lehman Bro<strong>the</strong>rs andBarclays. Courtney Decl., 31. Courtney testified that shemade an effort to keep tabs on <strong>the</strong> movements of peopleleaving Lehman Bro<strong>the</strong>rs and going o<strong>the</strong>r places in <strong>the</strong>Fall of 2008 and <strong>the</strong>reafter. She stated that many of <strong>the</strong>seindividuals readily sent her <strong>the</strong>ir new contact information,and she placed that information into Sasqua’s database.Tr. at 54.The instant circumstances are different from those setforth in Freedom Calls Foundation, 2006 WL 845509 at *16, where <strong>the</strong> court found that <strong>the</strong> plaintiff organizationhad expended a great deal of resources in developing itsnetwork of supporters and clients, as evidenced by <strong>the</strong>results. There, <strong>the</strong> organization had to develop areputation with both military officials and families inorder to acquire <strong>the</strong> video and tele-conferencingequipment, locations, and participants needed for itsactivities. Id. Sasqua did not need such equipment andapparently did not even need office space. According toCourtney, each of <strong>the</strong> Sasqua consultants/recruiters, likeher, worked from home throughout <strong>the</strong>ir relationship withSasqua. Courtney Decl., 22. The New York “office”was essentially what was known in <strong>the</strong> industry as a“headquarters,” where numerous companies “rent‘offices’ on <strong>the</strong> same floor ...” Id. Sasqua rented its“office” jointly with ano<strong>the</strong>r search firm forapproximately a year or so and <strong>the</strong> office “was visited bySasqua’s consultants only about a dozen times during thatperiod, and primarily for <strong>the</strong> purpose of interviewing jobcandidates.” Id.Although Sasqua had periods of major success, <strong>the</strong> effortand research expended by Sasqua personnel were part of<strong>the</strong>ir daily routine. There was no elaborate computersystem compiling and analyzing data, <strong>the</strong>re was nodeveloped infrastructure, and for most of <strong>the</strong> time, <strong>the</strong>rewas not even an office. As Courtney noted, “recruiting ismatchmaking.” Courtney Decl., 6. The recruiter’s goalis to find and match an employer “needing an employeewho has particular expertise with <strong>the</strong> candidate who canfulfill that need.” Id. The successful way to acquire clientsin such a business is by “establishing a personalreputation for diligent work through personalrelationships with hiring personnel.” Id., 7. Repeatbusiness is based upon satisfied clients. Tors himself hasstated that “relationship-building is how Sasqua generatesbusiness.” Tors Decl., 28. Although <strong>the</strong> information in<strong>the</strong> database may assist <strong>the</strong> process, <strong>the</strong> nature of <strong>the</strong>business focuses on <strong>the</strong> relationship built by <strong>the</strong> recruiterwith <strong>the</strong> client and not what elemental information isstored in a computer. For <strong>the</strong> foregoing reasons, I find thatthis factor is, at best, neutral in <strong>the</strong>se circumstances.© 2011 Thomson Reuters. No claim to original U.S. Government Works. 13


152Sasqua Group, Inc. v. Courtney, Slip Copy (2010)6. Ease With Which <strong>the</strong> Information Could Be ProperlyAcquired or Duplicated*22 The demonstration conducted by defendant Courtneyat <strong>the</strong> hearing established that <strong>the</strong> allegedly secretinformation from <strong>the</strong> Sasqua database could be properlyacquired or duplicated through a straightforward series ofInternet searches in a drilling down exercise that likelycould be duplicated by a recruiter in <strong>the</strong> executive searchbusiness for <strong>the</strong> financial services/foreign exchangeindustry. See Exhibit 1. Although plaintiffs rely onFreedom Calls Foundation, 2006 WL 845509, that case isdistinguishable. There, <strong>the</strong> court found that it would bevery difficult to acquire or duplicate plaintiff’ efforts incompiling its list of non-profit donors and clientsprecisely because <strong>the</strong> personal contact information wasnot publicly available. Id. at *53. As to Sasqua, it wouldnot be too difficult for someone to duplicate <strong>the</strong> names of<strong>the</strong> clients in <strong>the</strong> financial services industry with whomSasqua did business by canvassing <strong>the</strong> market throughgeneral research, Internet exploration and phone calls and<strong>the</strong>n obtaining more detailed information regarding <strong>the</strong>client’s interests and preferences by subsequent researchand fur<strong>the</strong>r calls. See Iron Mountain, 455 F.Supp.2d at140. This factor clearly favors <strong>the</strong> Defendants’s position..In sum, Plaintiffs have failed to prove a physicalappropriation or copying of confidential information orwrongful disclosure or use of a trade secret. See LeoSilfen, 29 N.Y.2d at 389, 328 N.Y.S.2d at 424, 278N.E.2d 636. The information in Sasqua’s databaseconcerning <strong>the</strong> needs of its clients, <strong>the</strong>ir preferences,hiring practices, and business strategies, as well asSasqua’s acquaintance with key decision-makers at thosefirms may well have been a protectable trade secret in <strong>the</strong>early years of Sasqua’s existence when greater time,energy and resources may have been necessary to acquire<strong>the</strong> level of detailed information to build and retain <strong>the</strong>business relationships at issue here. However, for good orbad, <strong>the</strong> exponential proliferation of information madeavailable through full-blown use of <strong>the</strong> Internet and <strong>the</strong>powerful tools it provides to access such information in2010 is a very different story.Having evaluated <strong>the</strong> information contained in Sasqua’sdatabase in <strong>the</strong> context of <strong>the</strong> Ashland Managementfactors as well as o<strong>the</strong>r applicable case law, I find thatsuch information does not constitute a trade secret and Irespectfully make that recommendation to Judge Spatt.B. Propriety of a Temporary Restraining OrderBecause Plaintiffs have not demonstrated a likelihood ofsuccess on <strong>the</strong> merits with respect to <strong>the</strong> misappropriationof trade secrets claim, <strong>the</strong> Court need not address <strong>the</strong>issue of irreparable harm as to that claim. See IronMountain, 455 F.Supp.2d at 141. Notwithstanding <strong>the</strong> factthat Courtney did not take Sasqua’s database with herwhen she left Sasqua-a fact supported by Sasqua’scomputer technician Steinschneider-much of <strong>the</strong> hearingtestimony established that <strong>the</strong> purportedly confidentialand proprietary information was available through o<strong>the</strong>rsources in <strong>the</strong> industry. See Int’l Paper Co., 966 F.Supp.at 258. Moreover, based upon Courtney’s testimony andSteinschneider’s Declaration, <strong>the</strong> Court concludes thatmuch of <strong>the</strong> information that was available to Courtney at<strong>the</strong> time of her departure from Sasqua was stale andremains so. Here, <strong>the</strong> executive search/recruitmentbusiness, unlike some o<strong>the</strong>r highly technical industries, isa comparatively low-technology business and Courtney’swork at Sasqua “was driven by general managerialexpertise as opposed to <strong>the</strong> application of highlytechnical, proprietary, or secret information.” Int’l Paper,966 F.Supp. at 259. Even assuming that proprietaryinformation existed at one time, I find no evidencesupporting a conclusion that Courtney misappropriatedsuch information. Accordingly, <strong>the</strong> level of risk thatwould justify <strong>the</strong> grant of injunctive relief with regard toSasqua’s database is simply not present at this time, and Irespectfully recommend to Judge Spatt that no injunctionbe imposed.*23 The foregoing findings involve solely <strong>the</strong> claimasserted by Plaintiffs for misappropriation of tradesecrets. This Court makes no findings as to <strong>the</strong> claims forunfair competition, breach of fiduciary duty or claimsbrought under <strong>the</strong> common law duty of loyalty to <strong>the</strong>employer. Likewise, although counsel for both sides spenttime at <strong>the</strong> hearing going over issues related to <strong>the</strong>departure and alleged solicitation of <strong>the</strong> Sasqua recruitersas well as Tors’ alleged alcoholism and its impact on <strong>the</strong>business, <strong>the</strong>se issues are not germane to <strong>the</strong>determination of whe<strong>the</strong>r <strong>the</strong> Sasqua database constitutesa protectable trade secret and <strong>the</strong>refore such issues are notaddressed here.V. CONCLUSIONFor <strong>the</strong> reasons set forth in this Report andRecommendation, I respectfully recommend to JudgeSpatt that (1) <strong>the</strong> information contained in Sasqua’sdatabase not be afforded trade secret protection and (2) noinjunction issue here.Pursuant to 28 U.S.C. § 636(b)(1)(c) and Rule 72 of <strong>the</strong>Federal Rules of Civil Procedure, <strong>the</strong> parties shall havefourteen (14) days from service of this Report andRecommendation to file written objections. See also© 2011 Thomson Reuters. No claim to original U.S. Government Works. 14


153Sasqua Group, Inc. v. Courtney, Slip Copy (2010)Fed.R.Civ.P. 6(a) and (e). Such objections shall be filedwith <strong>the</strong> Clerk of <strong>the</strong> Court via ECF. A courtesy copy ofany objections filed is to be sent to <strong>the</strong> chambers of <strong>the</strong>Honorable Arthur D. Spatt, and to <strong>the</strong> chambers of <strong>the</strong>undersigned. Any requests for an extension of time forfiling objections must be directed to Judge Spatt prior to<strong>the</strong> expiration of <strong>the</strong> fourteen (14) day period for filingobjections. Failure to file objections will result in a waiverof those objections for purposes of appeal. Thomas v. Arn,474 U.S. 140, 155, 106 S.Ct. 466, 88 L.Ed.2d 435 (1985);Beverly v. Walker, 118 F.3d 900, 901 (2d Cir.), cert.denied, 522 U.S. 883, 118 S.Ct. 211, 139 L.Ed.2d 147(1997); Savoie v. Merchants Bank, 84 F.3d 52, 60 (2dCir.1996).SO ORDERED.Footnotes1 Defendant Courtney’s 2008 contract with Sasqua did contain certain restrictive covenants. However, when Courtney and Torsentered into an agreement for 2009, <strong>the</strong>y mutually agreed that nei<strong>the</strong>r of <strong>the</strong>m would be held to any non-compete or o<strong>the</strong>rrestriction, and, thus, <strong>the</strong> 2009 agreement contained no restrictive covenants. Courtney Decl. 38; Defendants’ Mem. at 7.Plaintiffs have not refuted this assertion. In fact, as part of <strong>the</strong> 2009 agreement, Courtney put up $40,000 to help pay <strong>the</strong>consultants and o<strong>the</strong>r expenses. Courtney stated, and Tors has not refuted, that <strong>the</strong> outlook for Sasqua was so bleak that Tors didnot offer contracts for 2009 to <strong>the</strong> consultants at Sasqua. Courtney Decl. 39-40; Defendants’ Mem. at 7.2 All subsequent references to <strong>the</strong> record of <strong>the</strong> February 11, 2010 hearing are designated “Tr. at ____.”3 Plaintiff Tors did not appear at <strong>the</strong> hearing. According to Plaintiffs’ counsel, Tors was incapacitated based upon a fall <strong>the</strong> priorevening during which he broke his rib and spent <strong>the</strong> night in <strong>the</strong> hospital. Counsel noted that Tors had broken his ankle just twoweeks earlier and required surgery which counsel believes may have led to <strong>the</strong> fall. Tr. at 5. However, no request for anadjournment of <strong>the</strong> hearing was made.End of Document© 2011 Thomson Reuters. No claim to original U.S. Government Works.© 2011 Thomson Reuters. No claim to original U.S. Government Works. 15


1542

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!