Pixsys Technologies Inc v. Agemni LLC
Filing
9
MEMORANDUM OPINION. Signed by Chief Judge Sharon Lovelace Blackburn on 10/22/2013. (KAM, )
FILED
2013 Oct-22 AM 10:52
U.S. DISTRICT COURT
N.D. OF ALABAMA
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ALABAMA
SOUTHERN DIVISION
PIXSYS TECHNOLOGIES, INC.,
Plaintiff,
vs.
AGEMNI, L.L.C.,
Defendant.
)
)
)
)
)
)
)
)
)
Case No. 2:13-CV-1929-SLB
MEMORANDUM OPINION
This case is presently before the court on plaintiff’s Motion for Temporary
Restraining Order. (Doc. 3.)1 Plaintiff seeks a TRO against defendant to temporarily enjoin
it “from accessing, logging on to, otherwise viewing or obtaining data or information from
any computer or computer system owned, operated, or leased by [plaintiff]” and “from using
any knowledge, information, or data obtained by accessing or logging on to, or otherwise
resulting from unauthorized access to, any such restricted Pixsys computer system.” (Doc.
3 at 1-2.) A hearing was held on October 21, 2013, before the unsigned, which counsel for
both parties attended.
On October 18, 2013, plaintiff filed a Verified Complaint, which asserts the following
facts:
2. Pixsys is a corporation organized under the laws of the State of
Alabama, with its principal place of business in Vestavia Hills, Alabama.
1
Reference to a document number, [“Doc. ___”], refers to the number assigned to each
document as it is filed in the court’s record.
3. Agemni is a limited liability company organized under the laws of
the State of Utah. . . .
...
8. Pixsys is a cloud-based software designer and provider
headquartered in Vestavia Hills, Alabama, focused on the installation and
repair industry [footnote] for DISH satellite television. Pixsys has developed
a software package, called Dish Operations, that enables service providers
throughout the United States for DISH to manage their businesses, in
particular back-office functions of such businesses, more efficiently and
profitably. Dish Operations is “enterprise” software, in that it provides
functionalities affecting all aspects of a customer’s business, including work
order management, inventory, payables and receivables, employee recruitment
and retention, basic human resources, and business and employee performance
and productivity.
[Footnote:] There are two broad categories of independently-owned
installation and repair service providers for DISH Network: Regional
Service Providers with an exclusive service territory and (2)
subcontractors who do not have an exclusive service territory and are
typically smaller that Regional Service Providers. Both categories are
collectively referred to herein as “service providers.”
9. Dish Operations is the product of extensive, long-term development
effort by Pixsys, brought about by its long-term affiliation with a DISH
Regional Service Provider, and by painstaking trial-and-error in determining
the optimal features and their configuration for DISH service provider needs.
Many aspects if Dish Operations are proprietary to Pixsys, including some or
all of its inventory tracking, return authorization, and personnel hiring
functions. Even such features as might not be proprietary standing alone are
proprietary in their configurations and combinations.
10. The configuration and combination of features embodied in the
Dish Operations software are not publicly known (outside of Pixsys’[s] Dish
Operations customers, who receive and use the software pursuant to
agreements strictly requiring user confidentiality and granting a limited license
to use the software), and cannot readily be ascertained in the DISH support
software business. The Dish Operations software, and its configuration and
2
combination of features, have significant economic value, and have been the
subject of significant efforts to guard their secrecy.
11. Pixsys’[s] customers receive a license from Pixsys to use the
software and are provided access to it via the Internet. Customers must have
valid credentialing and passwords in order to have access to their Pixsys
accounts and thus to Dish Operations. Apart from a login screen and
public-facing job application screens, Dish Operations is not accessible
without proper password credentialing.
12. Pixsys'[s] customers are granted a license to use Dish Operations
pursuant to Subscription Agreements. Such Agreements prohibit the
customers from licensing, reselling, distributing or otherwise making the
software available to third parties. The Agreements also require customers to
maintain the confidentiality of all passwords assigned to them, prohibit the
sharing of passwords with third parties, and prohibit the use of passwords by
more than one individual. In addition to limiting access by password, access
to Dish Operations is further limited based on the individual user's role within
the company. For example, technicians may access only that small subset of
the Dish Operations functionality relevant to their job. Higher level
managerial or executive employees, referred to internally as “power users,” are
given broader access to Dish Operations.
13. Agemni is a competitor of Pixsys in the provision of software to the
DISH installation, service and repair industry. Historically, its software has
lacked much of the functionality of Dish Operations. Historically, Agemni has
had a lesser share of the software market for DISH Regional Service Providers
than Pixsys. Over the last year, several Agemni customers have switched to
Pixsys software, while no Pixsys customers have switched to Agemni
software.
14. Among Pixsys’[s] customers is Southern Star, Inc. (“SSI”), a DISH
Network Regional Service Provider with a territory including parts of Texas,
Oklahoma and Arkansas. SSI is licensed to access and use Dish Operations
through its affiliate, JF Leasing, LLC (“JFL”), under a Subscription
Agreement with Pixsys. Under that Agreement, JFL (and SSI, which has
operated under that Agreement) agreed that it would not transfer, distribute,
or make available the Dish Operations software to any third party, would keep
confidential all confidential information made available to it pursuant to the
Agreement, and would not use the software for any non-authorized purpose.
3
JFL (and through it, SSI) also agreed that it would maintain as confidential,
and not share, any password made available to it pursuant to the Agreement.
15. The Vice President of Administration of SSI is, and has at all
relevant times been, an individual named Randy Reed. Reed has at all relevant
times had a password and authorization to access and use the Dish Operations
software in SSI's business. As an executive level employee of SSI, Reed had
been granted “power user” access rights to Dish Operations.
16. For reasons unknown to Pixsys, and commencing at some time in
2013 but not known by Pixsys until very recently, Agemni has repeatedly
accessed Dish Operations though SSI’s customer account, using Randy Reed’s
credentials and password. This access by Agemni (emanating from one or
more Agemni IP addresses) has amounted to hundreds of page views to private
areas of Pixsys’[s] software, not viewable by the public or anyone lacking
valid credentials. These logins have also been focused heavily on Dish
Operations features which Agemni’s software product does not offer. This
access has been done without the knowledge or consent of Pixsys, in violation
of the law, and in violation of the Subscription Agreement referenced in the
preceding paragraph. Such access has made available to Agemni details,
process flows, business know-how, configurations and combinations of
features and functions of Dish Operations.
17. On information and belief, Randy Reed or some other individual
or individuals within SSI provided the Randy Reed log-in credentialing and
password to an individual or individuals within Agemni, allowing the
above-described industrial espionage and theft to take place.
18. On October 11, 2013, Agemni’s Chief Financial Officer, Erik
Felsted, sent the following email to a Pixsys customer. (The “to” and “cc”
lines in the email, and its salutation, have been redacted.)
From: Erik Felsted
Date: October 11, 2013 at 4:21:22 PM CDT
To:
Cc:
Subject: Thank you
I don’t know if you had heard but the largest RSP Southern Star
is switching from Pixsys to AgemniST at the end of this year.
4
We have been working with them for several months
confidentially (so I couldn’t tell you this earlier) on making tons
of enhancements that I know our clients will love. I wouldn’t
be surprised if we don’t see more of the larger RSPs and DNS
companies switching or coming back as the case may be after all
of these new features are rolled out so they don’t have to share
their information with a competitor.
We will be here for you if you need anything.
Best regards,
Erik
19. Prior to the sending of this email (which states that Agemni has
been “working with” SSI “for several months . . . confidentially”), Agemni had
accessed Pixsys’[s] Dish Operations software through unauthorized use of
Randy Reed's credentialing and password on multiple occasions, from one or
more Agemni IP addresses, amounting to hundreds of page views, including
in areas as to which Agemni’s software historically has had no or limited
functionality.
20. Agemni would not have been able to make the “tons of
enhancements” in its software, within the time frame in which it apparently
has, had it not unlawfully and impermissibly taken and used proprietary,
confidential and trade secret information belonging to Pixsys.
(Doc. 1 ¶¶ 2-3, 8-20.)
Rule 65(b) provides:
The court may issue a temporary restraining order without written or
oral notice to the adverse party or its attorney only if:
(A) specific facts in an affidavit or a verified complaint clearly
show that immediate and irreparable injury, loss, or damage will result
to the movant before the adverse party can be heard in opposition; and
(B) the movant’s attorney certifies in writing any efforts made
to give notice and the reasons why it should not be required.
5
Fed. R. Civ. P. 65(b)(1). The Eleventh Circuit has held:
The purpose of a temporary restraining order, like a preliminary
injunction, is to protect against irreparable injury and preserve the status quo
until the district court renders a meaningful decision on the merits. Canal
Auth. of State of Florida v. Callaway, 489 F.2d 567, 572 (5th Cir. 1974). A
district court may grant a preliminary injunction only if the moving party
shows that:
(1) it has a substantial likelihood of success on the merits;
(2) irreparable injury will be suffered unless the injunction issues;
(3) the threatened injury to the movant outweighs whatever damage the
proposed injunction may cause the opposing party; and
(4) if issued, the injunction would not be adverse to the public interest.
Klay v. United Healthgroup, Inc., 376 F.3d 1092, 1097 (11th Cir. 2004);
Suntrust Bank v. Houghton Mifflin Co., 268 F.3d 1257, 1265 (11th Cir. 2001).
A preliminary injunction is “an extraordinary and drastic remedy” and is “not
to be granted unless the movant ‘clearly established the burden of persuasion’
as to the four prerequisites.” United States v. Jefferson County, 720 F.2d 1511,
1519 (11th Cir. 1983)(quoting Canal Auth. of State of Florida, 489 F.2d at
573).
Schiavo ex rel. Schindler v. Schiavo, 403 F.3d 1223, 1232 (11th Cir. 2005). For the reasons
set forth below, the court finds that plaintiff has shown the Motion for Temporary
Restraining Order is due to be granted.
A. Likelihood of Success on the Merits
Plaintiff’s Verified Complaint contains claims for (1) violation of the Computer Fraud
and Abuse Act, 18 U.S.C. § 1030, (2) violation of the Digital Millennium Copyright Act, 17
U.S.C. § 1201, (3) violation of Alabama’s Trade Secrets Act, Ala. Code § 8-27-1, et seq., (4)
6
violation of Alabama’s Digital Crime Act, Ala. Code § 13A-8-112, (5) common-law tortious
interference with business relations, (6) common-law conversion, and (7) common-law
trespass. Given the facts set forth in the Verified Complaint, the court finds that plaintiff has
established a likelihood of success on the merits of its claims. Specifically, as asserted by
plaintiff, defendant used a password without authorization to access, copy, and use for its
own unauthorized purposes plaintiff’s proprietary and copyright protected material – the Dish
Operations systems, its configuration, and combination of features. If true this unauthorized
access, taking, and use provides the basis for finding defendant liable for violations of the
Computer Fraud and Abuse Act,2 the Digital Millennium Copyright Act,3 and Alabama’s
Trade Secrets Act.4
2
The Computer Fraud and Abuse Act is violated whenever an individual (2)
intentionally accesses a computer without authorization or exceeds authorized access, and
thereby obtains . . . (C) information from any protected computer . . . .” 18 U.S.C. §
1030(a)(2)(C).
3
The Digital Millennium Copyright Act provides, “No person shall circumvent a
technological measure that effectively controls access to a work protected under this title.”
17 U.S.C. § 1201(a)(1)(A).
4
The Alabama Trade Secrets Act states:
A person who discloses or uses the trade secret of another, without a privilege
to do so, is liable to the other for misappropriation of the trade secret if:
(1) That person discovered the trade secret by improper means;
...
(3) That person learned the trade secret from a third person, and knew or
should have known that (i) the information was a trade secret and (ii) that the
7
Therefore, the court finds plaintiff has show a substantial likelihood of success of the
merits as to these claims.
B. Immediate and Irreparable Injury
In order to satisfy the requirements for a TRO, plaintiff must “show that immediate
and irreparable injury, loss, or damage will result to the movant before the adverse party can
be heard in opposition” – that is, plaintiff “will suffer irreparable injury and that the
irreparable injury is of such imminence that there is a clear and present need for equitable
relief to prevent harm.” Taxsalelists.com, L.L.C. v. Rainer, Civil Action No. 09-CV-02898
REB-KMT, 2009 WL 4884273, *3 (D. Colo. Dec. 11, 2009)(citing Heiddeman v. S. Salt
Lake City348 F.3d 1182, 1189 (10th Cir. 2003)). As set forth in the Verified Complaint,
plaintiff asserts that defendant has taken its proprietary and copyright protected computer
software package and is using or will use such property to compete with plaintiff.
“Particularly when documents such as database information that is the foundation of
[plaintiff’s] business . . . are being used improperly by one or more competing enterprises,
and the evidence in this case indicates such information is being used improperly in such a
trade secret had been appropriated under circumstances which violate the
provisions of (1) or (2), above . . . .
Ala. Code § 8-27-3. “A ‘trade secret’ is information that: a. Is used or intended for use in
a trade or business; b. Is included or embodied in . . . computer software . . .; c. Is not
publicly known and is not generally known in the trade or business of the person asserting
that it is a trade secret; d. Cannot be readily ascertained or derived from publicly available
information; e. Is the subject of efforts that are reasonable under the circumstances to
maintain its secrecy; and f. Has significant economic value.” Ala. Code § 8-27-2.
8
fashion, [plaintiff] will suffer injuries that are irreparable because they are difficult or
impossible to measure.” Id. Damage to plaintiff’s relationships with its clients and its
position in the marketplace are virtually impossible to calculate and to remedy. See Hal
Wagner Studios, Inc. v. Elliott, No. 09-CV-0031-MJR, 2009 WL 102435, *6 (S.D. Ill. Jan.
15, 2009).
Therefore, the court finds that plaintiff has shown that it will suffer immediate and
irreparable injury if defendant’s unauthorized access and/or use of its software is not
enjoined.
C. Balance of Harms
Plaintiff must show that its “threatened injury . . . outweighs whatever damage the
proposed injunction may cause [defendant].” Four Seasons Hotel and Resorts v. Consorcio
Barr, S.A., 320 F.3d 1205, 1210 (11th Cir. 2003). The Verified Complaint shows that
defendant had no authority to access and/or use the Dish Operations software. Therefore,
defendant “will suffer no harm that is recognized in law if [it is] prohibited from unlawfully
obtaining information from [plaintiff] and from using information to which [it has] no legal
right or which [it has] no legal right to use to support competing enterprises or to conduct a
competing enterprise.” See Taxsalelist.com, 2009 WL 4884273 at *3. Therefore, the harm
to plaintiff outweighs any harm to defendant.
D. Public Interest
9
Nothing before the court indicates any public interest that would be harmed by
enjoining defendant’s unlawful access and use of plaintiff’s software. Therefore, this factor
weighs in favor of granting plaintiff’s requested TRO.
E. Certificate of Counsel
Counsel for plaintiff served the Verified Complaint and Motion for Temporary
Restraining Order on defendant on October 18, 2013. Over the weekend, defendant
contacted attorneys in Alabama to represent them in this matter at the hearing. However,
given the short period of time between service and this hearing, defendant’s ability to
meaningfully respond to plaintiff Motion was limited. Nevertheless, the court finds that
plaintiff has established its injury is imminent and irreparable; therefore, temporary
injunctive relief is appropriate.
F. Bond
“The court may issue a preliminary injunction or a temporary restraining order only
if the movant gives security in an amount that the court considers proper to pay the costs and
damages sustained by any party found to have been wrongfully enjoined or restrained.” Fed.
R. Civ. P. 65(c). “The amount of security required is a matter for the discretion of the trial
court; it may elect to require no security at all.” Corrigan Dispatch Co. v. Casa Guzman, S.
10
A., 569 F.2d 300, 303 (5th Cir. 1978).5 Plaintiff asks for a bond of no more than $10,000.
Defendant argues that a bond of $ 50,000 to $100,000 is appropriate in this case.
Given the limited life span of a TRO the court finds a relatively small bond is
appropriate. Therefore, the court will require plaintiff to post a bond of $5,000. The amount
of the bond will be revisited at the time set for the preliminary injunction hearing.
Based on the foregoing, the court finds that plaintiff is entitled to a TRO prohibiting
defendant from accessing, taking, and/or using plaintiff’s Dish Operations software. An
Order granting plaintiff’s Motion for Temporary Restraining Order will be entered
contemporaneously with this Memorandum Opinion.
DONE, this 22nd day of October, 2013.
SHARON LOVELACE BLACKBURN
CHIEF UNITED STATES DISTRICT JUDGE
5
Decisions of the former Fifth Circuit Court of Appeals rendered prior to October 1,
1981, constitute binding precedent in the Eleventh Circuit. Bonner v. City of Prichard, 661
F.2d 1206, 1209 (11th Cir.1981) (en banc).
11
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?