Food Services of America Incorporated v. Carrington et al
Filing
144
ORDER granting in part and denying in part 105 Plaintiff's Motion for Partial Summary Judgment; denying 109 Defendants' Motion for Summary Judgment; granting in part and denying in part 111 Plaintiff's Motion for Sanctions; grant ing in part and denying in part 134 Defendant's Motion to Strike and Preclude Plaintiff's Untimely Expert Disclosures. The Court awards $500 for attorneys' fees and costs incurred by Plaintiff in bringing its Motion for Sanctio ns. The declarations (Doc. 111-1, Ex. B(Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta Decl.)), are stricken only to the extent that they contain new expert disclosures and not in their entirety (please see attached order for complete information). Signed by Judge G Murray Snow on 8/23/13.(TLJ)
1
WO
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE DISTRICT OF ARIZONA
8
9
Food Services of America, Inc., a Delaware
Corporation
ORDER
10
11
12
13
No. CV-12-00175-PHX-GMS
Plaintiff,
v.
Paul Carrington; et. al.
Defendants.
14
15
Pending before the Court is Plaintiff’s Motion for Partial Summary Judgment,
16
(Doc. 105), and Motion for Sanctions, (Doc. 111), and Defendants’ Motion for Summary
17
Judgment, (Doc. 109), and Motion to Strike, (Doc. 134). For the reasons discussed below,
18
Plaintiff’s Motion for Partial Summary Judgment is granted in part and denied in part, its
19
Motion for Sanctions is granted in part and denied in part, Defendants’ Motion for
20
Summary Judgment is denied, and their Motion to Strike is granted.
21
BACKGROUND
22
This case involves an employer’s claims of misappropriation of trade secrets
23
against former employees. Plaintiff Food Services of America (“FSA”) is a national
24
distributor that wholesales food products to operators such as restaurants and schools.
25
(Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 14.) Defendant Paul Carrington began his
26
employment with FSA as a Supplier Information Specialist (“SIS”) in September 2008.
27
(Doc. 106, PSOF ¶ 2.) Defendant Elba Rubio had previously joined FSA in May 2008
28
and was also an SIS at the time of her termination. (Id. ¶ 3.)
1
As employees of FSA, Defendants received new hire orientation and materials.
2
(Id. ¶¶ 4–5.) Among those materials were an FSA Handbook and Arbitration Agreement
3
that Defendants acknowledged and signed. (Id. ¶¶ 5–6, 10–12.) The Parties dispute
4
whether Defendants were also provided with and signed a Confidentiality Agreement.
5
(Id. ¶¶ 7–8; Doc. 115, DSOF ¶¶ 7–8.) All three documents included provisions regarding
6
the confidentiality of FSA information and the duty of all FSA employees to keep such
7
information secret. (Doc. 106, PSOF ¶¶ 6, 9, 12.)
8
Defendants were granted access to FSA information so they could use it as SISs in
9
their dealings with suppliers, customers, and internal personnel. (Id. ¶ 13.) That
10
information included the following: (1) manufacturer and UPC codes; (2) vendor,
11
customer, and FSA employee contacts and information; (3) product brands, descriptions,
12
and formulae; (4) product cost, pricing, and rebates; (5) product purchase and sales
13
volume; and (6) FSA business strategies. (Id.) FSA information is accessible only
14
through its closed and secure system. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 23.) Access
15
is restricted to those who have passes and electronic passwords which are granted to
16
employees who need to use the information to perform their job functions. (Id.)
17
On March 4, 2011, FSA terminated Rubio’s employment for gross misconduct.
18
(Doc. 106, PSOF ¶ 14.) Consistent with its policy regarding terminated employees, upon
19
termination, Rubio’s access to FSA’s system was cancelled. (Id. ¶ 15.) As of the close of
20
the business on March 4, Defendants knew that Rubio was no longer authorized to access
21
FSA’s system or its information. (Id. ¶ 16.) That evening, Defendants agreed to have
22
Carrington forward specific FSA information to his and Rubio’s personal e-mail accounts
23
from FSA’s system. (Id. ¶ 17.)
24
On March 5, 2011, Carrington went to FSA’s offices when he was not scheduled
25
to work, and obtained access to FSA’s system. (Id. ¶¶ 18–19.) That weekend, Carrington
26
sent approximately 300 e-mail strings to his and Rubio’s personal e-mail accounts after
27
Defendants mutually selected which strings to send. (Id. ¶ 19.) The e-mails included new
28
item requests and customer product information forms in response to operator/customer
-2-
1
inquiries, new product information sheets from suppliers, distribution plans and freight
2
matrices, and letters to specific customers containing product offers. (Docs. 119-1–6, Ex.
3
O.) On March 7, FSA also terminated Carrington’s employment for gross misconduct.
4
(Id. ¶ 23.)
5
FSA sent letters to Defendants on March 8, 2011, demanding the immediate return
6
of electronic or hard copy documents containing FSA information. (Doc. 110, DSOF ¶
7
10.) Carrington responded on March 14, stating that he no longer possessed FSA
8
information and had deleted any documents he may have had. (Id. ¶ 11.) Rubio did not
9
respond to FSA’s letter. (Id. ¶ 13.) Upon receipt of the letters, Defendants knew that they
10
both possessed information that FSA sought. (Doc. 106, PSOF ¶¶ 27–28.)
11
Months later, FSA investigated Carrington’s FSA account and discovered the e-
12
mails he had sent with FSA information to personal accounts in March 2011. (Doc. 110,
13
DSOF ¶ 19; Doc. 133, PSOF ¶¶ 19–20.) On January 24, 2012 an NLRB trial based on
14
Carrington’s discharge began. FSA’s counsel alleged that it first discovered that
15
Carrington still possessed FSA information and had provided false statements in his
16
response to FSA’s March 8 letter on that first trial day. (Doc. 110, DSOF ¶ 26.) FSA
17
asserts that Carrington provided a disc during the morning recess of the trial which
18
contained the information and alerted FSA to the deception. (Doc. 133, PSOF ¶ 26.)
19
FSA brought this action against Defendants the next day on January 25, 2012.
20
(Doc. 1.) The Complaint alleged the following claims: (1) violation of the Computer
21
Fraud and Abuse Act (“CFAA”); (2) violation of the Arizona Uniform Trade Secrets Act
22
(“AUTSA”); (3) violation of the Arizona Anti-Racketeering Statute; (4) breach of
23
fiduciary duty; (5) conversion; and (6) unjust enrichment. On August 7, 2012, Defendants
24
filed a Motion for Judgment on the Pleadings. (Doc. 32.) The Court granted the Motion
25
as to the CFAA claim but denied it as to the remaining claims. (Doc. 57.) Defendants
26
filed another Motion for Judgment on the Pleadings as to counts three through six on
27
December 2, 2012. (Doc. 72.) The Court granted the Motion and found that FSA’s
28
common law tort claims were preempted by the AUTSA because they were based on the
-3-
1
misappropriation of confidential information and not saved by the anti-abrogation clause
2
of the Arizona Constitution. (Doc. 95.) The Court denied Defendants’ Motion for
3
Reconsideration. (Doc. 135.)
4
The Parties now move for summary judgment on FSA’s remaining AUTSA claim.
5
(Docs. 105, 109.) FSA further moves for sanctions against Defendants for spoliation of
6
evidence, (Doc. 111), and Defendants move to strike expert declarations filed in support
7
of FSA’s Motion, (Doc. 134).
DISCUSSION
8
9
I.
LEGAL STANDARD
10
Summary judgment is appropriate if the evidence, viewed in the light most
11
favorable to the nonmoving party, shows “that there is no genuine issue as to any material
12
fact and that the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(c).
13
Substantive law determines which facts are material and “[o]nly disputes over facts that
14
might affect the outcome of the suit under the governing law will properly preclude the
15
entry of summary judgment.” In addition, the dispute must be genuine, that is, the
16
evidence must be “such that a reasonable jury could return a verdict for the nonmoving
17
party.” Anderson, 477 U.S. at 248. “[A] party seeking summary judgment always bears
18
the initial responsibility of informing the district court of the basis for its motion, and
19
identifying those portions of [the record] which it believes demonstrate the absence of a
20
genuine issue of material fact.” Celotex Corp. v. Catrett, 477 U.S. 317, 323 (1986).
21
Because “[c]redibility determinations, the weighing of the evidence, and the
22
drawing of legitimate inferences from the facts are jury functions, not those of a judge, . .
23
. [t]he evidence of the nonmovant is to be believed, and all justifiable inferences are to be
24
drawn in his favor” at the summary judgment stage. Id. at 255 (citing Adickes v. S.H.
25
Kress & Co., 398 U.S. 144, 158–59 (1970)); Harris v. Itzhaki, 183 F.3d 1043, 1051 (9th
26
Cir. 1999) (“Issues of credibility, including questions of intent, should be left to the
27
jury.”) (internal citations omitted).
28
Further, the party opposing summary judgment “may not rest upon the mere
-4-
1
allegations or denials of [the party’s] pleadings, but . . . must set forth specific facts
2
showing that there is a genuine issue for trial.” Fed. R. Civ. P. 56(e); see also LRCiv.
3
1.10(l)(1) (“Any party opposing a motion for summary judgment must . . . set[] forth the
4
specific facts, which the opposing party asserts, including those facts which establish a
5
genuine issue of material fact precluding summary judgment in favor of the moving
6
party.”). If the nonmoving party’s opposition fails to specifically cite to materials either
7
in the court’s record or not in the record, the court is not required to either search the
8
entire record for evidence establishing a genuine issue of material fact or obtain the
9
missing materials. See Carmen v. S.F. Unified Sch. Dist., 237 F.3d 1026, 1028–29 (9th
10
Cir. 2001); Forsberg v. Pac. N.W. Bell Tel. Co., 840 F.2d 1409, 1417–18 (9th Cir. 1988).
11
When parties file cross-motions for summary judgment, “the court must rule on
12
each party’s motion on an individual and separate basis, determining, for each side,
13
whether a judgment may be entered in accordance with the Rule 56 standard.” Fair
14
Housing Council of Riverside County v. Riverside Two, 249 F.3d 1132, 1136 (9th Cir.
15
2001). In fulfilling its duty to review each cross-motion separately, the court must review
16
the evidence submitted in support of each cross-motion. Id.
17
II.
MISAPPROPRIATION OF TRADE SECRETS
18
A.
19
Arizona has adopted the Uniform Trade Secrets Act, “which codifies the basic
20
principles of common-law trade-secret protection, to govern the resolution of trade-secret
21
issues.” Enter. Leasing Co. of Phoenix v. Ehmke, 197 Ariz. 144, 148, 3 P.3d 1064, 1068
22
(Ct. App. 1999). Arizona recognizes the Restatement of Torts in the absence of
23
controlling authority for guidance as to misappropriation claims. Id. Under the AUTSA, a
24
plaintiff may recover damages for misappropriation of a trade secret. A.R.S. § 44-401–
25
07. The AUTSA defines “trade secret” as follows:
26
Existence of Trade Secrets
27
(4) “Trade secret” means information, including a formula, pattern,
compilation, program, device, method, technique or process, that both:
28
(a) Derives independent economic value, actual or potential, from
-5-
not being generally known to, and not being readily ascertainable by
proper means by other persons who can obtain economic value from
its disclosure or use.
1
2
3
(b) Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.
4
5
Id. § 44-401. “The threshold determination whether to protect information as a trade
6
secret therefore depends upon the nature of the information and the circumstances
7
surrounding its secrecy and the maintenance thereof.” Ehmke, 197 Ariz. at 148 (internal
8
citation omitted). The owner of the information has the burden “to establish that the
9
matter is secret . . . [and] that it exercised reasonable care to safeguard the secret.” Id. at
10
150.
11
1.
Independent Economic Value
12
To be entitled to trade secret protection, FSA’s information must derive economic
13
value from the fact that it is not generally known to or readily ascertainable by other
14
persons in the industry. See id. at 149 (“Because the hallmark of a trade secret obviously
15
is its secrecy, not only must the subject-matter of the trade secret be secret, it must be of
16
such a nature that it would not occur to persons in the trade or business.”). Matters that
17
are public knowledge, such as those available in trade journals or known to principal
18
trade persons, are not safeguarded as trade secrets. Id. In particular, “when a process or
19
idea is so common or widely known that it lacks all novelty, uniqueness and originality, it
20
necessarily lacks the element of privacy required to make it legally cognizable as
21
a trade secret.” Id.
22
Using an FSA-issued computer, Carrington transmitted FSA information to his
23
and Rubio’s personal e-mail accounts in March 2011.1 (Doc. 106, PSOF ¶¶ 18–19.) The
24
e-mails included internal FSA communications and external FSA communications with
25
operators (FSA’s customers) and suppliers (manufacturers from which FSA purchases
26
1
27
28
Defendants also admit sending an undisclosed number of FSA e-mails to their
personal accounts in February 2011 but it is not clear from the record whether they
contained trade secret information. (See Doc. 106, PSOF ¶¶ 32–33.) The vast majority of
the e-mails were sent by Carrington in March 2011. (Doc. 115, DSOF ¶¶ 32–33.).
-6-
1
products). Those communications included the following elements of information:
2
manufacturer and UPC codes, brand names and product specifications, product formulae
3
and pricing strategies, rebates, customer contact information, volumes, and pricing, and
4
vendor contact information and data. (Doc. 106, PSOF ¶¶ 13, 30–31.) Defendants
5
contend that some of that information is readily ascertainable; for example, the
6
manufacturer and UPC codes, brand names and product specifications, vendor and
7
customer contact information are generally known to others in the food service industry.
8
FSA argues that even if some of those elements are readily ascertainable, its information
9
is still entitled to protection as compilations of data.
10
“Although matters of general knowledge cannot be appropriated as secret, a trade
11
secret may consist of a combination of elements even though each individual component
12
may be a matter of common knowledge.” Ehmke, 197 Ariz. at 150 (citing Kewanee Oil
13
Co. v. Bicron Corp., 416 U.S. 470, 475 (1974)). A trade secret may include a compilation
14
in which the individual elements “are in the public domain but there has been
15
accomplished an effective, successful and valuable integration of those public elements
16
such that the owner derives a competitive advantage from it.” Ehmke, 197 Ariz. at 149
17
(internal citation omitted). Thus, the analysis depends on whether the compilation as a
18
whole qualifies as a trade secret. Id.
19
Defendants have submitted under seal the e-mails they transmitted in March
20
2011. (Docs. 119-1–6, Ex. O.) A number of these e-mails contained new item requests in
21
relation to inquiries from FSA’s customers. The e-mails attached customer product
22
information (“CPI”) forms. (Docs. 119-1–3, Ex. O (“Exs. A11, A21”).) The CPI forms
23
included the name of the customer and contact person(s), the manufacturer, detailed
24
description and quantity/volume of the product, the customer price or distributor cost, and
25
the time period for which this information was active. (See id.) Other e-mails attached
26
“new product information sheets” presumably from FSA’s suppliers with similar contact
27
information, product detail and pricing per quantity. (Docs. 119-3, Ex. O (“Ex. A23”).)
28
One of the e-mails is a memo describing FSA’s national distribution plan for selected
-7-
1
products sent to its distribution centers. (Id. (“Ex. A21”).) Attached to the memo are
2
spreadsheets containing “freight matrices,” for specific products that list distribution
3
centers and their addresses as well as product price and quantity. (Id.) The e-mails further
4
included letters to individual FSA customers containing product offers with details as to
5
quantity, price, purchasing period, and shipping. (Docs. 119-4, Ex. O (“Ex. A27”).) Also
6
within the e-mails were informal price/quantity quotes for customers with accompanying
7
product images and specifications. (Id. (“Ex. A28”).)
8
FSA sets forth a number of facts about the competitive aspects of its industry,
9
none of which have been contested by Defendants. For example, FSA is a distributor that
10
wholesales various foods and supplies to food service operators, ranging from schools to
11
small restaurant chains. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 14.) Competition among
12
distributors for the business of operators is generally on product price. Because the cost
13
of food and supplies represents a large percentage of their total cost, operators may
14
switch distributors based on slight variations in price. (Id. ¶ 20) (declaring that operators
15
will change distributors “solely because the difference in the negotiated price of ground
16
beef from different distributors is one cent per pound”). Hence, in order to offer lower
17
prices to operators, it is critical that FSA pays lower prices to product suppliers. (Id.)
18
(declaring that “[a] one cent advantage in cost per pound can result in millions of dollars
19
in sales”). Put simply, FSA relies for its competitive advantage on “the products [it]
20
buy[s], who [it] buy[s] them from, who [it] sell[s] them to, what [it] pay[s] for them, and
21
what [it] sell[s] them for.” (Id. ¶ 25.)
22
FSA’s representatives negotiate prices on all products with operators and
23
suppliers. (Id. ¶ 17.) There is no preset price list or publicly available catalogue. (Id.)
24
FSA maintains proprietary information on “each customer and their individual needs,”
25
product pricing for operators, and “acquisition[] costs” negotiated with suppliers. (Id.) In
26
his affidavit submitted in support of FSA’s Motion for Summary Judgment, Steve
27
Manuszak, the Senior VP of FSA, states that if this information were disclosed to other
28
distributors, they could use it to make more favorable contracts with operators or
-8-
1
suppliers and push FSA out of business. (Id. ¶ 21.) It would reveal FSA’s “manner,
2
method and process of doing business.” (Id. ¶ 25.) Further, such disclosure would be
3
contrary to confidentiality agreements that FSA signs with its partners and would cause
4
those partners to lose trust in FSA. (Id. ¶ 22.) Defendants do not contest these facts. The
5
information that Carrington transmitted to himself and Rubio thus contained FSA’s
6
confidential compilations of data. Those compilations provide a competitive advantage to
7
FSA in that they allow FSA to uniquely serve its customers and are not known by other
8
distributors in the industry. See Ehmke, 197 Ariz. at 148 (“[A] trade secret may consist of
9
a compilation of information that is continuously used or has the potential to be used in
10
one’s business and that gives one an opportunity to obtain an advantage over competitors
11
who do not know of or use it.”). Even if the information obtained by Defendants
12
contained elements of common knowledge, such as product specifications, it is the
13
combination of those elements, such as what products each customer requested at what
14
price or what FSA bought from suppliers at what cost that provides economic value to
15
FSA.
16
Further, FSA created and maintained the information through “substantial efforts .
17
. . such that it would be difficult for a competitor to acquire or duplicate the same
18
information.” Calisi v. Unified Fin. Servs., LLC, 232 Ariz. 103, 302 P.3d 628, 632 (Ct.
19
App. 2013); Prudential Ins. Co. of Am. v. Pochiro, 153 Ariz. at 371, 736 P.2d at 1183
20
(Ct. App. 1987) (stating that a list of customers, “if their trade and patronage have been
21
secured by years of business effort and advertising and the expenditure of time and
22
money, . . . is in the nature of a trade secret”). Manuszak declares that the compilations
23
“took millions of dollars and years to develop” over the last 25 years and is the product of
24
the “work [of] thousands of employees.” (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 13.) He
25
further states that the mix of customer, supplier, and product information “has been
26
refined over decades to create our successful business offering in a highly competitive
27
industry.” (Id. ¶ 25.) Thus, the information obtained by Defendants has independent
28
economic value.
-9-
1
Defendants argue that FSA’s delay in bringing this suit shows that the information
2
has minimal value to FSA. Defendants acquired the information in March 2011, but FSA
3
did not bring suit until January 2012. That delay, however, does not establish that the
4
information lacks economic value. The undisputed facts show that during that period,
5
FSA approached Defendants to retrieve any information they had acquired and kept after
6
their termination. On March 8, 2011, FSA sent letters to Defendants demanding the
7
immediate return of any hard copy documents containing FSA information and
8
destruction of electronic records with such information. (Doc. 110, DSOF ¶ 10.)
9
Carrington responded on March 14, stating that he did not have confidential FSA
10
information and had deleted any information pertaining to his employment with FSA. (Id.
11
¶ 11.) Rubio did not respond to FSA’s letter. (Id. ¶ 13.) Some months later2, FSA
12
investigated Carrington’s FSA account and discovered that he had sent information to
13
personal e-mail accounts in February and March 2011. (Id. ¶ 19; Doc. 133, PSOF ¶¶ 19–
14
20.) FSA first discovered that Carrington still possessed FSA information when the
15
NLRB trial commenced on January 24, 2012. (Doc. 110, DSOF ¶ 26.) FSA filed this suit
16
the next day on January 25. (Doc. 1.)
17
FSA did not excessively delay prosecution of its case against Defendants. To the
18
extent it could have investigated Defendants’ conduct earlier, any such delay relates to
19
the amount of damages, if any, to which FSA is entitled and not to whether FSA’s
20
information has independent economic value.
2.
21
Reasonable Efforts to Maintain Secrecy
22
“[T]he most important factor in gaining trade-secret protection is demonstrating
23
that the owner has taken such precautions as are reasonable under the circumstances to
24
preserve the secrecy of the information.” Ehmke, 197 Ariz. at 150. But the secrecy need
25
not be absolute. Miller v. Hehlen, 209 Ariz. 462, 471, 104 P.3d 193, 202 (Ct. App. 2005)
26
27
28
2
The Parties dispute the timing of that analysis and FSA maintains that the
analysis was in response to October 2011 letters from the EEOC and NLRB based on
administrative charges filed by Carrington against FSA. (Doc. 133, PSOF ¶¶ 20–21.)
- 10 -
1
(internal citation omitted). The owner of the secret information need only show that it
2
made reasonable efforts to maintain its secrecy to ensure that it would be difficult for
3
others to discover it without using improper means. Ehmke, 197 Ariz. at 150 (citing K-2
4
Ski Co. v. Head Ski Co., 506 F.2d 471, 474 (9th Cir. 1974)). Reasonable efforts do not
5
require extreme and unduly expensive procedures to protect trade secrets against
6
industrial espionage. Id.
7
Further, “the owner of a trade secret does not relinquish its secret by disclosure to
8
employees on a necessary basis or by limited publication for a restricted purpose.” Miller,
9
209 Ariz. at 471 (customer list was not trade secret when employer gave it to former
10
employee and did not condition its use); see Calisi v. Unified Fin. Servs., LLC, 232 Ariz.
11
103, 302 P.3d 628, 632–33 (Ct. App. 2013) (collecting cases); Restatement (First) of
12
Torts § 757 (1939) (“It is not requisite that only the proprietor of the business know [the
13
trade secret]. He may, without losing his protection, communicate it to employees
14
involved in its use.”). Nevertheless, a substantial element of secrecy must exist, so that,
15
except by the use of improper means, there would be difficulty in acquiring the
16
information. Restatement § 757.
17
FSA took several measures to protect the secrecy of its information. FSA
made
18
Defendants and other employees aware that they were to keep FSA information
19
confidential. It is undisputed that Defendants received instructions during the new hire
20
process that “all information they had access to as employees of FSA was to be treated as
21
confidential.” (Doc. 106, PSOF ¶ 4; Doc. 115, DSOF ¶ 4.) Employees also received an
22
FSA Handbook that had a confidentiality provision. That provision stated the following:
23
24
25
26
27
While many of our competitors are free with disclosing their proprietary
information, we have a very strict policy in that regard. No one outside the
Company needs to know anything about our Company unless the Chairman
or President has identified a specific benefit to the Company. . . .
Unauthorized disclosure of information about our company, no matter how
harmless it may seem, can be grounds for discipline up to and including
termination.
28
- 11 -
1
(Doc. 106, PSOF ¶ 6.) Further, as part of their new-hire paperwork, Defendants and other
2
employees signed an Arbitration Agreement. (Doc. 106, PSOF ¶¶ 10–11; Doc. 115,
3
DSOF ¶¶ 10–11.) By signing the Agreement, employees attested to the following:
4
5
6
7
8
9
10
I know that I may have access to FSA confidential or proprietary
information and that the unauthorized use or disclosure of that information
may violate applicable law and my duties to FSA. I agree that it is
impossible to measure solely in money damages which FSA may suffer if I
violated the law or my duties with regard to FSA’s confidential or
proprietary information. Therefore, I understand and agree that any action
by FSA to protect its rights as to its confidential or proprietary information
is excluded from this arbitration agreement, and that if FSA retains the right
to seek relief in a court from actual or threatened violation of those rights.
(Doc. 106, PSOF ¶ 12; Doc. 115, DSOF ¶ 12.)
11
12
FSA’s information was accessible only through its proprietary computer and e-
13
mail system. Manuszak attests that the system “provides access to that data in a
14
customized fashion at a secure facility that restricts access to those who hold passes or
15
electronic passwords.” (Id.) Keen Chang, FSA’s Senior Information Officer, testified that
16
when a new employee joins FSA, “that employee is assigned an ID and password for the
17
company network. That employee will use that ID and password to log on to the
18
network.” (Doc. 133-2, Ex. G (Chang Depo.) 32:5–9.) Further, access to the information
19
is “only by permission, with proper authorization on a ‘need-to-know’ basis.” (Id.) FSA
20
employees retain access to the extent they need information on suppliers, customers,
21
costs, pricing, and product specifications to perform their functions. (Id.) Manuszak states
22
that FSA has invested “tens of millions of dollars in systems and process development
23
over the last 25 years to safeguard” the information and “each year additional investment
24
is made to improve” those systems. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 23.)
25
Besides admonitions upon hire, FSA took steps upon termination to remind
26
employees of their continuing obligations, retrieve information acquired in violation of its
27
policies, and cancel their access. (Doc. 133, PSOF ¶ 4; Doc. 106-2, Ex. B (Manuszak
28
Decl.) ¶ 12.) For example, Manuszak declares and it is undisputed that upon the departure
- 12 -
1
of a senior director, FSA’s general counsel sent a letter “reminding him of his obligations
2
under the confidentiality and nondisclosure agreement.” (Doc. 110, DSOF ¶ 37; Doc.
3
113-1, Ex. Z (Manuszak Depo.) at 65:7–11.) During the director’s exit interview,
4
Manuszak “reinforced the confidentiality provisions of the policy and spoke to him about
5
his obligations.” (Doc. 113-1, Ex. Z (Manuszak Depo.) at 72:13–20.)
6
FSA took similar protective measures with Defendants upon termination. It is
7
undisputed that upon termination, Rubio’s access to FSA’s system and information “was
8
immediately cancelled, consisted with FSA’s general practice with terminated
9
employees.” (Doc. 106, PSOF ¶ 15; Doc. 115, DSOF ¶ 15.) On March 8, 2011, FSA sent
10
a letter to Carrington stating that he had “wrongfully, illegally, and without authority,
11
transferred information electronically to Elba Rubio that is confidential and proprietary
12
property belonging to FSA.” (Doc. 106, PSOF ¶ 24.) The letter demanded that the
13
information be returned immediately and reminded Carrington of his obligation to
14
maintain confidentiality. FSA sent a similar letter to Rubio on March 8 demanding that
15
all confidential information be returned to FSA and emphasizing that she was prohibited
16
from using that information. (Id. ¶ 25.)
17
These undisputed facts show that FSA took sufficient measures to safeguard its
18
information even as FSA disclosed it for internal purposes. The relevant authorities
19
support that holding. In Ehmke, the Arizona Court of Appeals held that a plaintiff made
20
“reasonable efforts” when it took similar measures. 197 Ariz. at 151. Those measures
21
included “limited disclosure to those employees in need of the information to perform
22
their duties and general directives regarding confidentiality” and “confidentiality
23
provision[s] in its employment agreement[s] . . . as well as in the employee policy
24
handbook that all employees had to acknowledge and sign.” Id. In Calisi, 302 P.3d at
25
632–32, the Arizona Court of Appeals cited to Courtesy Temporary Service, Inc. v.
26
Camacho, 272 Cal. Rptr. 352 (Ct. App. 1990), when discussing the extent to which a
27
company may divulge information while maintaining its secrecy. The Camacho court
28
held that a plaintiff made reasonable efforts when it did not divulge information i.e., its
- 13 -
1
customer lists, to persons outside the business and shared it with employees only as
2
necessary for them to effectively carry out their duties. 272 Cal. Rptr. at 358. The
3
information was accompanied by a reminder to employees that it was confidential and
4
proprietary. The Calisi court also cited in approval to Saturn Sys., Inc. v. Militare, 252
5
P.3d 516, 522 (Colo. Ct. App. 2011), where, as here, the plaintiff’s employees could only
6
access plaintiff’s information with a username and password and access was “strictly
7
limited on a ‘need to know’ basis.”
8
FSA contends that before gaining access to its system, employees also signed
9
Confidentiality Agreements that describe their obligations to maintain secrecy and not to
10
use or disclose, remove or forward FSA information except for FSA business.3 The
11
3
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
The agreement states, in relevant part, the following:
As a condition of the Services Group of America granting you access to its
confidential information, the value of which you hereby acknowledge, and in addition to
any other confidentiality agreements and obligations that govern your conduct, you have
agreed to the following requirements regarding your access to the company’s confidential
information;
“Confidential Information” means any and all information, whenever accessed or
received, related to Company or any affiliate, including but not limited to, information
relating to: financial matters, business plans, strategies, customers, marketing, product or
service promotions, purchasing, vendors, discounts, rebates, earned marketing income
(“EMI”), EMI tracking methods, payroll or employee information (other than payroll or
employee information about Associate), business techniques, business tools (including,
without limitation, Company’s E/I, EIS, payroll and Infinium systems), analysis,
contractual terms, costs, margins, ownership structure, financings or other information.
Confidential information does not include information that is generally available to the
public through no improper action or inaction or breach of Associate.
Confidentiality; Ownership. Associate understands that the Company and its
affiliates value highly their Confidential Information, which they have developed at
substantial cost and effort, and which are important Company and affiliate assets.
Associate agrees that he or she will strictly maintain the confidentiality and proprietary
nature of any and all confidential information. Associate agrees not to use or disclose any
Confidential Information, directly or indirectly, except in furtherance of the Company’s
business or as consented to in writing in each instance by a Company officer, or, upon
reasonable prior notice to the Company, as required by law. Associate agrees not to
access, read, forward, remove from Company premises, copy or otherwise obtain or
retain any Confidential Information except as necessary to perform his or her job with the
Company. This agreement applies to confidential information in any form or formats,
including without limitation, oral, visual, written, computer records, photographs and
tape recordings, and applies to Confidential Information accessed by associate before, as
well was after, entering this Agreement. This Agreement shall apply throughout the
Associate’s employment with Company and after the termination of such employment at
- 14 -
1
Parties dispute whether Defendants and other employees signed the Agreement at the
2
time Defendants were employed with FSA.4 That dispute, however, does not create a
3
6
any time and for any reason (with or without the cause) by Company or Associate.
Associate acknowledges that Company and its affiliates are the sole owners of the
Confidential Information. Associate disclaims any right, title or interest in or to the
Confidential Information, including without limitation any Confidential Information
developed by Associate. Upon termination of employment (for any reason) Associate
agrees to return to the company all documents, discs or other items containing
Confidential Information.
7
(Doc. 106, PSOF ¶ 9.)
4
5
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
4
In support of its contention, FSA submits a confidential agreement with the
above-quoted language that is purportedly “e-signed” by Carrington. (See Doc 133-1, Ex.
A at 3, FSAFED03039) (the signature confirmation reads: “Paul Carrington signed the
confidentiality agreement with the initials PLc on 9/8/2008”) As to Rubio, FSA submits
an acknowledgement form that does not refer to the confidentiality agreement but attests
that Rubio will read the Handbook and “understand the policies well enough to carry out
[her] job duties . . . .” (Id. at 2, FSAFED03121.) FSA also proffers Manuszak’s
declaration that Carrington e-signed the confidentiality agreement and Rubio also signed
the agreement. (Doc. 106-2, Ex. B, Manuszak Decl. ¶¶ 6–7.)
Defendants submit declarations as well as deposition testimony that they do not
recall ever seeing or signing the Confidentiality Agreement. (Doc 110-1, Ex. A (Rubio
Decl.) ¶ 2; Id., Ex. B (Carrington Decl.) ¶ 2; Doc. 115-1, Ex. C (Carrington Depo.) at
57:16–58:17; Id., Ex. D (Rubio Depo.) at 128:16–25.) FSA points to the fact that Rubio
first testified that she had signed the Confidentiality Agreement, that it was part of her
new hire packet, and that her actions in acquiring FSA information was in violation of
what she signed. (Doc. 133-1, Ex. C (Rubio Depo.) at 64:8–10; 64:14–15; 64:22–65:10.)
FSA underscores the fact that Rubio’s later testimony that she in fact signed the
Arbitration Agreement and not the Confidentiality Agreement was only after a break in
the Deposition and in response to defense counsel’s questioning. (See id. at 122–128.)
FSA also asserts that since 2004 or 2005, it has been company policy to require all
employees to e-sign the Confidentiality Agreement before granting access to FSA’s
database and e-mail system. (Doc. 133, PSOF ¶ 33.) Guy Babbitt, FSA’s Chief
Information Officer, whose responsibility it is to ensure that employees e-sign the
agreement, testified that “[i]t was not possible to access the system and information that
[the employee] needed without signing.” (Doc. 110-3, Ex. L (Babbitt Depo.) at 29:2–6.)
Also, Keen Chang, FSA’s Senior Information Officer, testified that when a new
employee joins FSA, he or she is assigned an ID and password for the company network,
and when the log-in for the first time, the employee must read and initial the confidential
agreement before using the system. (Doc. 133-2, Ex. G (Chang Depo.) 31:24–33:5.)
Defendants proffer the statements of two former FSA employees that they were
not aware of any policy or practice to e-sign the Confidentiality Agreement. In response
to an e-mail from Carrington in March 2011, Ryan Peterson recalled that when he was at
FSA he “was not aware of an e-signature being used for [the Confidentiality
Agreement].” (Doc. 115-1, Ex. 3 at 1.) Further, Adam Downer, a former SIS, attests that
“[a]t no time did I submit an ‘e-signature’ to a confidentiality agreement, or any other
agreement for the company.” (Doc. 115-1, Ex. 4 (Downer Decl.) at 3.) Defendants also
point to the fact that FSA did not have a practice or policy of archiving employees’ esignatures to the agreements prior to June 2011. (Doc. 110-2, Ex. E (Manuszak Depo.) at
- 15 -
1
genuine issue of material fact. See Anderson, 477 U.S. at 248 (stating that for a dispute to
2
be genuine, the evidence must be “such that a reasonable jury could return a verdict for
3
the nonmoving party”). Even assuming that Defendants did not sign the Agreement, FSA
4
has shown that it made reasonable efforts to preserve the secrecy of its information. FSA
5
informed Defendants, at least upon hire and termination, of their obligation not to divulge
6
its information to outside parties or to retain it after termination. Further, FSA had in
7
place significant measures to restrict access to employees that needed to use the
8
information to fulfill their duties.
9
Defendants also contend that FSA did not take additional measures to protect its
10
information. For example, Defendants assert that FSA could have labeled the information
11
as “trade secret” or “confidential,” citing to a California case in support. See Morlife, Inc.
12
v. Perry, 56 Cal. App. 4th 1514, 1522 (1997). The Morlife court, however, referred to
13
such labeling in the context of whether the information was readily ascertainable by
14
outside parties. Further, assuming the e-mails submitted by Defendants are copies of the
15
originals, the FSA information had stamps stating “Confidential Trade Secret/Proprietary
16
Information.” (See Docs. 119-1–6, Ex. O.) Even if the information was not thus stamped,
17
FSA is only required to take “reasonable efforts” to maintain secrecy and not all such
18
efforts. FSA is also not required to track the “assignment history of work computers” as
19
Defendants contend, even if that is a useful measure of security. (See Doc. 109 at 21.)
20
Along with measures that FSA did not take, Defendants find fault with the
21
measures it did. Defendants argue that because Carrington was able to acquire FSA
22
information shortly before termination, and others could hypothetically do the same and
23
disclose it to FSA’s competitors, FSA did not make reasonable efforts to maintain the
24
information’s secrecy. This argument proves too much. In essence, Defendants argue that
25
so long as anyone is capable of circumventing security measures, a Plaintiff did not
26
undertake sufficiently reasonable precautions. This argument lacks merit; were it to be
27
31–35; Doc. 110-3, Ex. L (Babbitt Depo.) at 29–38.)
28
- 16 -
1
accepted the tort could not exist. Defendants make another peculiar argument that FSA
2
engaged in “arbitrary enforcement” of its confidentiality policies because when a senior
3
director departed to join a competitor, FSA did no more than remind him of his ongoing
4
obligations. FSA also did not take steps to ensure that the director’s fiancé, an FSA senior
5
manager, did not share information with the director after he left FSA. (Doc. 110, DSOF
6
¶¶ 36, 40.) Both of these arguments are also without merit. Just as FSA is not required to
7
make every conceivable effort to maintain secrecy, it is not obliged to “protect trade
8
secrets against industrial espionage.” Ehmke, 197 Ariz. at 150. FSA consistently
9
implemented policies to remind employees of their obligations and maintained secure
10
access to its information.
11
Defendants also argue that because FSA provided access to several employees, the
12
information is not secret. FSA identified 46 different job titles for employees that had
13
similar access to the information as Defendants. (Doc. 110, DSOF ¶ 4.) But the
14
confidential use of information by several employees for a business purpose does not
15
deprive the information of trade secret protection. See Miller, 209 Ariz. at 471;
16
Restatement § 757. As discussed above, FSA employees had to use a username and
17
password to access the information and were bound to only use it for FSA business.
18
The undisputed facts show that FSA’s measures to safeguard its compilations of
19
data regarding operators, suppliers, products, and pricing were reasonable. Because
20
FSA’s information has independent economic value derived from its non-public nature
21
and FSA took reasonable efforts to maintain secrecy that information consists of
22
protectable trade secrets.
23
B.
24
Under the AUTSA, “misappropriation” consists of either:
25
(a) Acquisition of a trade secret of another by a person who knows or has
reason to know that the trade secret was acquired by improper means.
26
27
Misappropriation
(b) Disclosure or use of a trade secret of another without express or implied
consent by a person who either:
28
- 17 -
1
2
3
4
5
6
7
(i) Used improper means to acquire knowledge of the trade secret.
(ii) At the time of disclosure or use, knew or had reason to know that his
knowledge of the trade secret was derived from or through a person who
had utilized improper means to acquire it, was acquired under
circumstances giving rise to a duty to maintain its secrecy or limit its use or
was derived from or through a person who owed a duty to the person
seeking relief to maintain its secrecy or limit its use.
(iii) Before a material change of his position, knew or had reason to know
that it was a trade secret and that knowledge of it had been acquired by
accident or mistake.
8
9
10
A.R.S. § 44-401(2).
1.
Acquisition and Disclosure or Use
11
Defendants contend that liability only attaches under the AUTSA when a person
12
discloses or uses a trade secret acquired by improper means. The AUTSA is clear on its
13
face; a person who acquires a trade secret is liable if acquired through improper means.
14
The AUTSA does not require disclosure or use of the trade secret before attaching
15
liability. In support of their contention, Defendants refers to the following language from
16
the Restatement:
23
The prior Restatement of this topic imposed liability only for the wrongful
use or disclosure of another’s trade secret. Improper acquisition of a trade
secret was not independently actionable. See Restatement of Torts § 757
(1939). Wrongful use or disclosure is also frequently recited in the case law
as an element of the cause of action for trade secret appropriation. The
cases requiring proof of wrongful use or disclosure, however, typically
involve information that has been acquired by the defendant through a
confidential disclosure from the trade secret owner. In such cases the
acquisition of the secret is not improper; only a subsequent use or
disclosure in breach of the defendant’s duty of confidence is wrongful.
24
Restatement Third, Unfair Competition § 40 cmt. b (1995). Defendants, however, fail to
25
appreciate additional language in that comment:
17
18
19
20
21
22
26
27
28
Subsection (a) of this Section follows the rule adopted in § 1(2)(i) of the
Uniform Trade Secrets Act, which imposes liability for the acquisition of a
trade secret by improper means. Thus, a person who obtains a trade secret
- 18 -
1
2
3
through a wiretap or who induces or knowingly accepts a disclosure of the
secret in breach of confidence is subject to liability. See § 43, Comment c.
Subsequent use or disclosure of a trade secret that has been improperly
acquired constitutes a further appropriation under the rule stated in
Subsection (b)(2) of this Section.
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Id. (emphasis added). Thus, the Restatement accords with the AUTSA in that it imposes
liability for both acquisition and use or disclosure of a trade secret. Nevertheless, the
AUTSA’s language is clear in its imposition of liability for acquisition. When the
language of an Arizona statute is “clear and unambiguous, and thus subject to only one
reasonable meaning,” Arizona courts apply the language without using other means of
statutory construction. Baker v. Univ. Physicians Healthcare, 231 Ariz. 379, 296 P.3d 42,
46 (2013); Tang v. Reno, 77 F.3d 1194, 1196 (9th Cir. 1996) (“If ‘the statute is clear and
unambiguous, that is the end of the matter.’”) (quoting Sullivan v. Stroop, 496 U.S. 478,
482 (1990)).
The undisputed facts show that Carrington acquired and disclosed FSA’s trade
secrets to Rubio who acquired them from Carrington through her e-mail account on
March 5 and 6, 2011.
Defendants argue that FSA may not base its misappropriation claim on the
disclosure of trade secrets by Carrington to Rubio because the claim was not thus alleged
in the Complaint. They contend that in the Complaint, FSA alleged that Defendants
engaged in a criminal conspiracy to steal trade secrets for the purpose of disclosing them
to competitors. But after alleging that Carrington sent FSA trade secrets to Rubio, FSA
alleges that “Defendants willfully and maliciously misappropriated FSA’s Trade Secret . .
. Information, and have and will continue to violate their confidentiality obligations to
FSA, causing continuing degradation in the value of such information.” (Doc. 1 ¶ 66.)
Further, the Complaint states that “FSA is entitled to recover its actual and consequential
damages caused by Defendants’ misappropriation of FSA’s Trade Secret . . .
Information, any unjust enrichment to Defendants and/or others resulting from the
misappropriation, and a reasonable royalty for the Defendants’ unauthorized disclosure
- 19 -
1
and use of FSA trade secrets.” (Id. ¶ 67.) The Complaint does not limit the
2
misappropriation claim to disclosure to FSA’s competitors but alleges misappropriation
3
and disclosure in general. The Complaint is consistent with the undisputed facts which
4
show that Defendants acquired and disclosed FSA trade secrets.
5
2.
Knowledge of Improper Means
6
FSA must further show that Defendants knowingly used improper means to
7
acquire and disclose trade secrets. “‘Improper means’ include theft, bribery,
8
misrepresentation, breach or inducement of a duty to maintain secrecy or espionage
9
through electronic or other means.” A.R.S. § 44-401(1). This list is not exhaustive. The
10
Restatement states that improper means also include fraud, inducement of or knowing
11
participation in a breach of confidence, and other means either wrongful in themselves or
12
wrongful under the circumstances of the case. Restatement § 43. It further states that an
13
employee or former employee who uses or discloses a trade secret owned by the
14
employer or former employer in breach of a duty of confidence is subject to liability for
15
appropriation of the trade secret. Id. § 42.
16
Defendants knew that their transmittal of FSA information from its system to their
17
personal e-mail accounts was unauthorized and therefore improper. First, Carrington sent
18
FSA trade secrets to Rubio’s personal account despite the fact that they knew Rubio was
19
not authorized to access that information. (Doc. 106, PSOF ¶ 16; Doc. 115, DSOF ¶ 16.)
20
Rubio was terminated on March 4, 2011, and her access was immediately cancelled.
21
(Doc. 106, PSOF ¶ 15; Doc. 115, DSOF ¶ 15.) On that day, Defendants discussed and
22
made plans for Carrington to forward Rubio FSA information from its system over the
23
weekend. (Doc. 106, PSOF ¶ 17; Doc. 115, DSOF ¶ 17.) Carrington sent trade secrets to
24
Rubio on March 5 and 6 by going to FSA’s offices during non-working hours, using an
25
FSA computer and his employee log-in. (Doc. 106, PSOF ¶¶ 18–19; Doc. 115, DSOF ¶¶
26
18–19.) Second, Defendants do not argue that they engaged in the acquisition and
27
disclosure of trade secrets for any FSA business purpose.
28
In doing so, Carrington breached his duties of confidence to FSA and to maintain
- 20 -
1
secrecy of FSA information. It is undisputed that Carrington signed an Arbitration
2
Agreement that stated that “the unauthorized use or disclosure of [FSA confidential or
3
proprietary] information may violate applicable law and my duties two [sic] FSA.” (Doc.
4
106, PSOF ¶ 12; Doc. 115, DSOF ¶ 12); see also (Doc. 106, PSOF ¶¶ 5–6; Doc. 115,
5
DSOF ¶¶ 5–6).
6
Defendants thus had a duty not to disclose FSA information to any person outside
7
the company and generally, to use the information for the benefit of FSA. At the time
8
Defendants conspired to acquire FSA trade secrets, they both knew that Rubio was
9
“outside the Company” and that their transmittal was an “unauthorized disclosure of
10
information about [FSA].” Rubio testified that acquiring FSA trade secrets in that manner
11
constituted a violation of either her Confidentiality5 or Arbitration Agreement. (Doc. 106,
12
PSOF ¶ 21; Doc. 115, DSOF ¶ 21.) At the time of transmittal, Carrington knew that
13
providing FSA trade secrets to Rubio violated FSA policy. (Doc. 106, PSOF ¶ 22; Doc.
14
115, DSOF ¶ 22.) Thus Carrington’s disclosure in violation of his duty to maintain
15
secrecy and Rubio’s acquisition when she knew she did not have authorization and that
16
Carrington was violating his duty in transmitting trade secrets to her constitutes
17
misappropriation.6 Summary judgment on the issue of AUTSA liability is granted to
18
FSA.
19
C.
Damages
20
5
21
22
23
24
25
26
27
28
As discussed above, the Parties dispute whether Defendants signed a
confidentiality agreement upon hire. That dispute, however, is not material because FSA
made Defendants aware through the Arbitration Agreement and FSA Handbook of their
duty to maintain secrecy.
6
Defendants argue that FSA has not proven misappropriation because Defendants
did not know that the information in fact constituted trade secrets. But that is not an
element of the claim. The AUTSA requires simply that persons know they are using
improper means to acquire trade secrets or are disclosing trade secrets in breach of their
duty to maintain secrecy. A.R.S. § 44-401(2); see Restatement (First) of Torts § 757
(1939) (“Liability under the rule stated in this Section is based not on the actor’s purpose
to discover another’s trade secret but on the nature of the conduct by which the discovery
is made. . . . [I]f his conduct is improper, he is subject to liability even though he engaged
in the conduct for a purpose other than that of discovering the trade secret.”). Rubio knew
that she acquired the trade secrets using improper means and Carrington knew he was
breaching his duty to maintain secrecy by disclosing them to Rubio.
- 21 -
1
1.
Existence of Damages
2
Under the AUTSA, a plaintiff may seek to recover “both the actual loss caused by
3
misappropriation and the unjust enrichment caused by misappropriation that is not taken
4
into account in computing actual loss.” A.R.S. § 44–403(A). Damages are “an essential
5
element” of a misappropriation claim which fails “without a cognizable theory of
6
proximately caused damages.” W.L. Gore & Associates, Inc. v. GI Dynamics, Inc., 872 F.
7
Supp. 2d 883, 888 (D. Ariz. 2012) (citing Firetrace USA, LLC v. Jesclard, 800 F. Supp.
8
2d 1042, 1054 n.5 (D. Ariz. 2010)). A plaintiff bears the burden of proving the fact and
9
cause of any damages for which recovery is sought. Restatement (Third) of Unfair
10
Competition § 45 cmt. b (1995). The plaintiff is required to prove the amount of such loss
11
with only as much certainty as is reasonable under the circumstances. (Id.) But damages
12
that are “speculative, remote or uncertain” may not form the basis of a judgment. W.L.
13
Gore, 872 F. Supp. 2d at 888 (internal citation omitted).
14
“The proximate cause of an injury is that which, in a natural and continuous
15
sequence, unbroken by any efficient intervening cause, produces an injury, and without
16
which the injury would not have occurred.” Robertson v. Sixpence Inns of Am., Inc., 163
17
Ariz. 539, 546, 789 P.2d 1040, 1047 (1990) (internal citation omitted). Plaintiff need only
18
present probable facts from which the causal relationship reasonably may be inferred. Id;
19
see also Smith v. Johnson, 183 Ariz. 38, 899 P.2d 199, 202 (Ct. App. 1995) (a tort
20
plaintiff “must show a reasonable connection between the defendant’s act or omission
21
and the plaintiff’s injury or damages.”). Whether proximate cause exists is usually a
22
question for the jury, unless the facts are undisputed and reasonable people could not
23
differ as to inferences to be drawn from them. McMurtry v. Weatherford Hotel, Inc., 231
24
Ariz. 244, 293 P.3d 520, 532 (Ct. App. 2013) (internal citation omitted).
25
Defendants argue that because FSA cannot show they used its trade secrets or
26
disclosed them to others, it cannot show that it was injured by their misappropriation.
27
FSA states that it does not contend there was “actual use or commercial implementation”
28
of its trade secrets. (Doc. 132 at 14.) FSA does assert, however, that it was injured by
- 22 -
1
Defendants’ conduct. Manuszak declares that “[t]en FSA employees spent in excess of 75
2
employee hours reviewing the documents” that were misappropriated by Defendants.
3
(Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 26.) FSA argues that this expenditure of company
4
resources was directly caused by the misappropriation.
5
A plaintiff is generally entitled to recover “any proven pecuniary loss attributable
6
to the appropriation of the trade secret” including “the costs of remedial effort.”
7
Restatement § 45 cmts. b, e. The Arizona Supreme Court has stated that when the
8
wrongful act of a defendant “makes it necessary to incur expense to protect [the
9
plaintiff’s] interest, such costs and expenses, . . . should be treated as the legal
10
consequences of the original wrongful act and may be recovered as damages.” U.S. Fid.
11
& Guar. Co. v. Frohmiller, 71 Ariz. 377, 380, 227 P.2d 1007, 1009 (1951) (internal
12
quotation marks and citation omitted). Other state courts determining damages under
13
statutes modeled after the UTSA have found “out-of-pocket expenses” sustained as a
14
result of misappropriation to be an element of damages. See, e.g., Dozor Agency, Inc. v.
15
Rosenberg, 218 A.2d 583, 585 (Pa. 1966); Telex Corp. v. Int’l Bus. Machines Corp., 510
16
F.2d 894, 933 (10th Cir. 1975) (noting that expenses incurred in strengthening security
17
measures after misappropriation would be damages in some circumstances).
18
Even if some of the evidence the Plaintiff offers to demonstrate that it was
19
damaged by Defendant’s misappropriation seems, at least at this stage, to exaggerate such
20
damages beyond the point of reason, the Court finds that FSA has provided some
21
evidence that it incurred expenses to investigate Defendants’ misappropriation. Such
22
expenses incurred as a direct result of Defendants’ conduct are damages for the purpose
23
of proving FSA’s claim under the AUTSA. Although Defendants argue that FSA’s
24
assertion of remedial efforts is “unsubstantiated,” (Doc. 138 at 12), FSA has provided
25
Manuszak’s declaration in support of that assertion. At a minimum, the existence of
26
expenses is a genuine dispute of material fact because if FSA’s assertion is believed by a
27
factfinder, it would be entitled to damages. Therefore, summary judgment is denied to
28
Defendants.
- 23 -
2.
1
Willful and Malicious Conduct
2
FSA contends that it is entitled to exemplary damages and attorneys’ fees based on
3
the willful and malicious nature of Defendants’ misappropriation. Section 44-403(B)
4
states that “[i]f willful and malicious misappropriation exists, the court may award
5
exemplary damages in an amount not exceeding twice any award made under [Section
6
44–403(A)].” Further, the Court may award reasonable attorneys’ fees to the prevailing
7
party for willful and malicious misappropriation. A.R.S. § 44-404(3).
8
Willful misconduct means “intentional, wrongful conduct, done either with
9
knowledge that serious injury to another probably will result or with a wanton and
10
reckless disregard of the possible results and is essentially a question of fact.” Newman v.
11
Sun Valley Crushing Co., 173 Ariz. 456, 460, 844 P.2d 623, 627 (Ct. App. 1992) (internal
12
citation omitted); Smith v. Chapman, 115 Ariz. 211, 214, 564 P.2d 900, 903 (1977).
13
Malice is defined as (1) the intent, without justification or excuse, to commit a wrongful
14
act; (2) reckless disregard of the law or of a person’s legal rights; or (3) ill will or
15
wickedness of heart. Black’s Law Dictionary 1042 (9th ed. 2009); see Sec. Title Agency,
16
Inc. v. Pope, 219 Ariz. 480, 502 n.21, 200 P.3d 977, 999 (Ct. App. 2008). Because the
17
requisite conduct is defined by statute, an “evil mind” required for the common law
18
remedy of punitive damages, see Linthicum v. Nationwide Life Ins. Co., 150 Ariz. 326,
19
331–32, 723 P.2d 675, 680–81 (1986), is not necessary to obtain exemplary damages
20
here.
21
The undisputed facts show that Defendants conspired for Carrington to transmit to
22
himself and Rubio specific FSA information through its system during non-working
23
hours. (Doc. 106, PSOF ¶ 17; Doc. 115, DSOF ¶ 17.) On the weekend of March 6, 2011,
24
Carrington went to FSA’s offices and used an FSA computer to transmit 300 e-mail
25
strings containing trade secrets to his and Rubio’s personal e-mail accounts. (Doc. 106,
26
PSOF ¶¶ 18–19; Doc. 115, DSOF ¶¶ 18–19.) At the time, Carrington knew that Rubio
27
was not authorized to have this information. (Doc. 106, PSOF ¶ 22; Doc. 115, DSOF ¶
28
22.) It is undisputed that Defendants had signed an Arbitration Agreement stating that
- 24 -
1
“the unauthorized use or disclosure of [FSA confidential or proprietary] information may
2
violate applicable law and my duties two [sic] FSA.” (Doc. 106, PSOF ¶¶ 10–12; Doc.
3
115, DSOF ¶¶ 10–12.) They also received an FSA Handbook informing employees that
4
it maintained a “strict policy” of non-disclosure as to proprietary information. (Doc. 106,
5
PSOF ¶ 22; Doc. 115, DSOF ¶ 22.) Thus, Defendants misappropriation was willful.
6
FSA must also establish the presence of malice through undisputed facts.
7
Defendants argue that they were not aware their misappropriation consisted of illegal
8
conduct. Carrington testified that he did not know that by transmitting the e-mails to
9
himself and Rubio he was breaking the law. (Doc. 115, DSOF ¶ 26.) As discussed, it is
10
undisputed that Defendants executed a plan to procure FSA information surreptitiously
11
and transmit it to Rubio when they knew she was not authorized to have it. Further, FSA
12
made them aware that such misappropriation was in violation of their duties as defined in
13
the various materials they received upon hire.
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
FSA also points to post-misappropriation conduct to show the presence of malice.7
7
Defendants’ conduct soon after misappropriation consists of the following. It is
undisputed that FSA sent a letter to Carrington the day after he was terminated that week
demanding the return of FSA information that had been “wrongfully, illegally, and
without authority, transferred . . . electronically to Elba Rubio that is confidential and
proprietary property belonging to FSA” and that he was “legally prohibited from making
any use of such information.” (Doc. 106, PSOF ¶¶ 23–24; Doc. 115, DSOF ¶¶ 23–24.)
Carrington responded: “[a]s defined in your letter, I do not have any proprietary and
confidential FSA information. To the extent that I had any information pertaining to my
employment with FSA, via electronic medium, that information has been permanently
deleted and I have no hard copies or work papers in my possession.” (Doc. 106, PSOF ¶¶
23–24.)
At that time, Carrington possessed trade secrets and later testified that he made
false representations to FSA. (Doc. 106-1, Ex. A (Carrington Depo.) at 66:6–10.) He
testified that he did not know the subject matter within some of the e-mails and “perhaps
he could have done a better job of looking through the emails before responding to FSA’s
March 8 letter.” (Doc. 115, DSOF ¶ 27; Doc. 106-1, Ex. A (Carrington Depo.) at 66:14–
21.), and did not return the trade secrets when FSA informed him within days that his
conduct was illegal. That establishes, at a minimum, that Carrington acted with “reckless
disregard of the law or of [FSA’s] legal rights.” Sec. Title Agency, 219 Ariz. at 502 n.21.
- 25 -
1
Although malice “may be inferred or implied from the nature of the acts complained of
2
and the surrounding circumstances,” Barker v. James, 15 Ariz. App. 83, 87, 486 P.2d
3
195, 199 (1971), those inferences are properly made by a factfinder. There is thus a
4
factual dispute as to whether Defendants acted with malice when misappropriating FSA’s
5
trade secrets. Accordingly, FSA motion for summary judgment as to exemplary damages
6
and reasonable attorneys’ fees is denied.
7
III.
SANCTIONS
8
A.
Defendants’ Motion for Sanctions
9
Section 44-404 provides that “[t]he court may award reasonable attorney fees to
10
the prevailing party for . . . [a] claim of misappropriation made in bad faith.” Rule 11 also
11
provides for sanctions if, among other conduct, a party brings a case for an improper
12
purpose or presents frivolous arguments in support of its claims or defenses. Defendants
13
argue that FSA should be sanctioned for bringing a frivolous lawsuit and continuing to
14
prosecute it for several months although no evidence of Defendants’ wrongful use or
15
disclosure to other parties exists. (Doc. 109 at 20–21.) They contend that FSA has not
16
sought discovery from any third party regarding Defendants’ wrongful use or disclosure.
17
Because FSA has established its claim for misappropriation under the AUTSA, it
18
cannot be found to have brought the claim based on frivolous arguments. Even if FSA did
19
not pursue discovery from third parties or show that Defendants used or disclosed its
20
trade secrets to others, FSA has established that Defendants acquired and disclosed that
21
22
23
24
25
26
27
28
FSA sent a similar letter to Rubio on March 8. It is undisputed the letter demanded
that “all confidential proprietary property in her possession, including the massive quality
[sic] of information unlawfully transmitted by Carrington, be immediately returned,
emphasizing that she is legally prohibited from making use of any such information.”
(Doc. 106, PSOF ¶ 25; Doc. 115, DSOF ¶ 25) (emphasis added). When Rubio received
the letter, she was aware that both she and Carrington possessed information that FSA
sought. (Doc. 106, PSOF ¶ 28; Doc. 115, DSOF ¶ 28.) Despite that knowledge, she
neither responded to FSA’s letter nor returned FSA’s trade secrets. (Id.) In fact, as of the
date of filing of the Complaint on January 25, 2012, neither Defendant had returned any
of the trade secrets to FSA. (Doc. 106, PSOF ¶ 29; Doc. 115, DSOF ¶ 29.)
- 26 -
1
information in violation of the AUTSA. Further, Defendants do not show that FSA
2
brought this action for an improper purpose. Therefore, sanctions will not be imposed on
3
FSA.
4
5
6
B.
FSA’s Motion for Sanctions
1.
Defendants’ Motion to Strike
i.
Form and Timeliness of Defendants’ Motion
7
Defendants move to strike for untimeliness two declarations containing
8
supplemental expert disclosures used in support of FSA’s Motion for Sanctions and
9
attached thereto and to its Reply. (See Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex.
10
1 (Kuchta Decl.).) The declarations are by FSA’s forensic expert, Kelly Kuchta. FSA
11
argues, however, that in filing their Motion to Strike, Defendants did not follow the
12
procedure set out in Local Rule 7.2(m) which states: “[a]n objection to (and any
13
argument regarding) the admissibility of evidence offered in support of or opposition to a
14
motion must be presented in the objecting party’s responsive or reply memorandum and
15
not in a separate motion to strike or other separate filing.”
16
Although Defendants referred to one of the declarations in its Response to FSA’s
17
Motion, (see Doc. 120 at 5, 7), they did not object to the declaration as untimely. Instead,
18
Defendants objected in this separate Motion to Strike on June 17, 2013, nearly one month
19
after their Response on May 20. (Docs. 120, 134.) Defendants were not able to object in
20
their Response to the second offending declaration since it was attached to FSA’s Reply.
21
The Court stated in its Case Management Order (“CMO”) that it “intends to enforce the
22
deadlines set forth in this Order.” (Doc. 30 ¶ 10.) Therefore, although Defendants did not
23
comply with the Local Rules in objecting to one of the declarations, the Court will
24
consider the merits of the untimeliness objections.
25
ii.
Timeliness of FSA’s Expert Disclosures
26
Rule 26(a)(2)(D) demands that disclosures are timely made based on “the times
27
and in the sequence that the court orders.” The CMO states that “[t]he party with the
28
burden of proof shall provide full and complete expert disclosures as required by Rule
- 27 -
1
26(a)(2)(A)-(C) of the Federal Rules of Civil Procedure no later than September 28,
2
2012.” (Doc. 59 ¶ 5(c)). It further states that “[r]ebuttal expert disclosures, if any, shall be
3
made no later than October 26, 2012” and that “[e]xpert depositions shall be completed
4
no later than March 1, 2013.” (Id. ¶¶ 5(d)–(e).) FSA filed the declarations containing
5
supplemental expert disclosures with its Motion and Reply on May 3 and May 30, 2013.
6
(Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta Decl.).)
7
FSA at no time requested the Court to extend the deadlines for expert disclosures
8
set out in the CMO. Therefore, a modification of the schedule pursuant to Rule 16(b)(4)
9
is not applicable here. Although FSA argues that “there is good cause for allowing the
10
expert testimony in issue” under Rule 16(b)(4), it has not requested the Court to modify
11
the schedule. To the extent that FSA implicitly requests the Court to modify the schedule
12
so that its supplemental disclosures are considered timely, that request comes too late. It
13
is not until Defendants moved to strike the disclosures that FSA made such a request to
14
modify in its Reply to Defendants’ Motion. Thus, the supplemental disclosures are
15
untimely.
16
iii.
Sanctions
17
Rule 37(c)(1) describes the consequences for failing to provide timely expert
18
disclosures as required by Rule 26. Rule 37(c)(1) states: “the party is not allowed to use
19
that information or witness to supply evidence on a motion, at a hearing, or at a trial,
20
unless the failure was substantially justified or is harmless.” This discovery sanction is
21
described as a “self-executing, automatic sanction to provide a strong inducement for
22
disclosure of material.” Yeti by Molly Ltd. v. Deckers Outdoor Corp., 259 F.3d 1101,
23
1106 (9th Cir. 2001) (citing the Advisory Committee’s Notes to Rule 37(c)(1) (1993))
24
(internal quotation marks and alterations omitted). FSA may still introduce the expert
25
disclosures if it can prove that its failure to disclose was substantially justified or
26
harmless. Id. at 1106–07. Unless FSA can show that one of these exceptions applies, it
27
will be sanctioned for its untimely disclosures and precluded from using them in support
28
of its Motion for Sanctions. See Yeti, 259 F.3d at 1107. (“It is the obligation of the party
- 28 -
1
facing sanctions for belated disclosure to show that its failure to comply with Rule 26
2
was either justified or harmless . . . .”) (internal citation omitted).
3
a.
Substantial Justification
4
FSA contends its delay in disclosing is “tied to [Defendants’] own litigation
5
misconduct: Defendants, yet again, lied about the information they possess and its
6
availability. It simply took FSA’s expert time to sort through Defendants’ lies.” (Doc.
7
136 at 7.) But FSA does not explain what Defendants’ conduct caused FSA to delay their
8
disclosures more than seven months after expert disclosures were due in September 2012
9
and two months after expert discovery completed in March 2013. The declarations and
10
the substance of FSA’s Motion which they support are based on facts that were in FSA’s
11
possession even before the expert disclosure deadline in September. The crux of the
12
Motion is that Defendants have not produced a hard drive that Carrington used with his
13
computer and that he erased data from his computer before producing it in May 2012.
14
Indeed, the latest factual date in the Motion is June 20, 2012, when Defendants’ counsel
15
informed FSA as to the unavailability of the hard drive.
16
The expert disclosures contained in the declarations are also not based on
17
previously unavailable facts. In the first declaration, Kuchta opines on the hard drive and
18
whether Carrington erased data. (See Doc. 111-1, Ex. B (Kuchta Decl.) ¶¶ 3–5.) That
19
opinion is based on further review of the forensic image of Carrington’s computer on
20
which Kuchta based his earlier report filed on September 28, 2012, (Doc. 46). The
21
declaration also refers to Defendants’ rebuttal expert report which was filed on November
22
26, 2012, (Doc. 65). Kuchta’s second declaration rebuts contentions made in Defendants’
23
Response to FSA’s Motion for Sanctions. It provides additional expert opinion based on
24
the same facts available to Kuchta prior to his September expert report. (See, e.g., Doc.
25
122-1, Ex. 1 (Kuchta Decl.) ¶¶ 5–6, 9–10.) Therefore, FSA’s untimely disclosures
26
contained in the declarations are not substantially justified.
27
b.
28
Harmlessness
FSA’s untimely disclosures were not harmless. The first declaration provides
- 29 -
1
previously undisclosed opinion based on further review of the forensic image. (Doc. 111-
2
1, Ex. B (Kuchta Decl.) ¶¶ 3–4.) Kuchta had mentioned in his original report that the
3
computer had been purchased with a hard drive different than the one it currently had.
4
(Doc. 111-1, Ex. A (Exp. Rep.) ¶ 4(A).) But he opined in the supplemental declaration
5
that the original hard drive was one of the multiple devices connected to the computer
6
hours before Defendants produced it to FSA. (Doc. 111-1, Ex. B (Kuchta Decl.) ¶ 4.)
7
Kuchta had stated in the original report that there was evidence that cleaning software
8
had been used to erase data from Carrington’s computer and that it was installed and
9
uninstalled on May 12, 2012. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 5(A)(3), 6(A)(2).)
10
Kuchta opines in the declaration for the first time, however, that Carrington used the
11
cleaning software on May 12. (Doc. 111-1, Ex. B (Kuchta Decl.) ¶ 5.)
12
In the second declaration, Kuchta rebuts assertions in Defendants’ expert report
13
and Response to FSA’s Motion. Based on additional technical information, he opines as
14
to the plausibility that several USB devices were connected to the computer shortly
15
before production and that cleaning software was used. (Doc. 122-1, Ex. 1 (Kuchta Decl.)
16
¶¶ 5–7, 9–10.)
17
In the briefing for its Motion for Sanctions, FSA cites to Kuchta’s supplemental
18
opinion about the original hard drive and the date on which Carrington used cleaning
19
software. (Doc. 111 at 3; Doc. 122 at 2–4, 6–7.) Defendants, however, did not have an
20
opportunity to rebut Kuchta’s supplemental opinion or depose him about it because it was
21
disclosed after the discovery deadline. Therefore, the declarations are stricken to the
22
extent they contain new expert disclosures because their untimeliness is neither
23
substantially justified nor harmless to Defendants.
24
25
2.
Merits of FSA’s Motion for Sanctions
i.
Spoliation of the Fujitsu Drive
26
“A district court can sanction a party who has despoiled evidence [under] the
27
inherent power of federal courts to levy sanctions in response to abusive litigation
28
practices . . . .” Leon v. IDX Sys. Corp., 464 F.3d 951, 958 (9th Cir. 2006). The court may
- 30 -
1
make factual findings in relation to a Motion for Sanctions based on the spoliation of
2
evidence. Id.; see Pau v. Yosemite Park & Curry Co., 928 F.2d 880, 885 (9th Cir. 1991).
3
“A party’s destruction of evidence qualifies as willful spoliation if the party has
4
some notice that the documents were potentially relevant to the litigation before they
5
were destroyed.” Id. at 959 (internal citation omitted) (emphasis in original). “A party
6
seeking sanctions for spoliation of evidence must prove the following elements: (1) the
7
party having control over the evidence had an obligation to preserve it when it was
8
destroyed or altered; (2) the destruction or loss was accompanied by a ‘culpable state of
9
mind;’ and (3) the evidence that was destroyed or altered was ‘relevant’ to the claims or
10
defenses of the party that sought the discovery of the spoliated evidence.” Surowiec v.
11
Capital Title Agency, Inc., 790 F. Supp. 2d 997, 1005 (D. Ariz. 2011) (internal citations
12
omitted).
13
FSA contends that Defendants have either destroyed or withheld a hard drive that
14
was connected to Carrington’s computer8 before it was produced to FSA. Kuchta opined
15
that based on a forensic image of the computer, a Fujitsu brand hard drive (the “Fujitsu
16
drive”) was used in conjunction with the computer. (Doc. 111-1, Ex. A (Kuchta Exp.
17
Rep.) ¶ 5(A)(2).) Defendants have acknowledged that the Fujitsu drive was the original
18
hard drive installed on the computer. (Doc. 120 at 8.) FSA inquired with Defendants’
19
counsel on June 20, 2012, about storage devices connected to Carrington’s computer,
20
(see Doc. 111-1, Exs. C, D), and requested copies of hard drives used in conjunction with
21
the computer on November 6, (see Doc. 111-1, Ex. E (Pl.’s Req. for Prod.) at 8). In
22
response to the first inquiry, Defendants’ counsel informed FSA that the Fujitsu drive
23
“crashed sometime around April 2011, and was promptly replaced. [Carrington] said he
24
may still have the crashed hard-drive, and I have asked him to try and locate it.” (Doc.
25
111-1, Ex. D.) Defendants have not yet produced the drive.
26
27
8
28
The computer is identified in Kuchta’s expert report as a Lenovo IdeaPad U450p
with serial number CBU0338478. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 4.)
- 31 -
1
a.
Duty to Preserve
2
The duty to preserve “arises when a party knows or should know that certain
3
evidence is relevant to pending or future litigation.” Surowiec, 790 F. Supp. 2d at 1005
4
(D. Ariz. 2011) (internal citations omitted). The existence of a duty to preserve is
5
determined with reference to the point in time when evidence was destroyed or altered.
6
See id. FSA contends that the Fujitsu drive was last used on the day the computer was
7
produced to FSA. In his expert report, Kuchta lists the Fujitsu drive as having a “last
8
written” date and time of May 29, 2012 and 4:17 a.m. and concludes that it was then
9
attached to the computer. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 5(A)(2).)
10
Defendants’ expert, Tim Greer, opined that Kuchta’s conclusion that seven storage
11
devices including the Fujitsu drive were connected to Carrington’s computer at the same
12
time on the day it was produced is “highly suspicious, and likely wrong.” (Doc. 66-1, Ex.
13
A (Greer Exp. Rep.) at 3.) In fact, Greer’s analysis of the data registry showed as many as
14
sixteen devices connected at once and he did not find any “human-caused file activity” in
15
the hours before or after that time. (Id. at 3–4.) He concluded that “[t]he date/stamp must
16
be the result of a system function, a power issue or some sort of standby/sleep anomaly.”
17
(Id. at 3.)
18
Defendants instead assert that Carrington last used the Fujitsu drive in April 2011
19
when it crashed and was replaced by a new hard drive. (Doc. 20 at 7–8; Doc. 111-1, Ex.
20
D.) In support, Defendants proffer declarations from Carrington’s parents recounting
21
conversations around that time and an e-mail exchange from April 2011 in which
22
Carrington and his father discuss the computer issues.9 (Doc. 120-1, Exs. 2 (April 2011 e-
23
mail exch.); C (William Carrington Depo.) ¶ 11, D (Paula Carrington Depo.) ¶ 4.)
24
Nevertheless, based on his analysis of the forensic image, Greer found that that the
25
26
27
28
9
Defendants argue that those declarations and e-mails are hearsay under Rule 802.
They contain Carrington’s out-of-court statements offered for the truth of the matter
asserted, namely, that the Fujitsu drive crashed in April 2011. But the Court may consider
this evidence because it shows facts to which Carrington and/or his parents may testify at
trial.
- 32 -
1
Fujitsu drive was “connected at some point” to the computer after the drive was replaced.
2
(Doc. 66-1, Ex. A (Greer Exp. Rep.) at 3.)
3
FSA contends that the attached e-mails and the conversations between Carrington
4
and his mother therein, prove that Carrington was contemplating litigation against FSA as
5
early as March 30, 2011. (See Doc. 120-1, Ex. 1 (March 2011 e-mail exch.).) But FSA
6
does not show why the Fujitsu drive would have been relevant to that litigation,
7
presumably involving employment claims.
8
In light of this evidence, the Court finds that Carrington replaced the Fujitsu hard
9
drive with a new hard drive in April 2011. Although there is evidence that he used the
10
drive between April 2011 and May 2012, the facts do not show when. Nor was this
11
lawsuit filed until January 2012. The filing of the lawsuit would give sufficient notice to
12
the Defendants of their obligation to preserve the hard drive. But, FSA’s Motion requires
13
it to establish that Defendants destroyed the Fujitsu drive after they knew that they had an
14
obligation to preserve it. This FSA has not done; therefore its Motion for Sanctions for
15
the destruction of this hard drive is denied.
16
ii.
Spoliation of the Western Drive
17
When the Fujitsu drive crashed in April 2011, Carrington replaced it with a
18
Western Digital brand hard drive (the “Western drive”).10 (Doc. 111 at 5.) FSA contends
19
that the Western drive produced along with Carrington’s computer on May 29, 2012, had
20
been materially altered by Carrington. Kuchta’s forensic analysis shows that software
21
called “CCleaner” was used to erase data on the Western drive on May 12; just a few
22
weeks before production. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 6(A).) Defendants
23
admit that Carrington installed and used CCleaner on May 12, but on no date after that.
24
(Doc. 120 at 5.)
25
///
26
27
28
10
The Western drive is identified as a 320 GB Western Digital hard drive, Model
WD3200BPVT-00HX2T1, with serial number WX21A11A5091. (Doc. 111-1, Ex. A
(Kuchta Exp. Rep.) ¶ 4.)
- 33 -
a.
1
Duty to Preserve
2
FSA brought this suit in January 2012. Therefore when Carrington erased data on
3
the Western drive on May 12, 2012, he had a duty to preserve that and other evidence
4
associated with his computer. Further, Defendants’ counsel “initiated dialogue with
5
[FSA] regarding forensic analysis of Defendant Carrington’s personal laptop” as early as
6
March 9, 2012. (Doc. 45 at 3–4.) Carrington knew or should have known at least in
7
March 2012 that he should preserve information on his computer and the Western drive.
b.
8
Culpability
9
When a party on notice intentionally destroys, rather than accidentally loses, that
10
evidence, it is a “willful” spoliator even if it did not intend to deprive an opposing party
11
of relevant evidence. Leon, 464 F.3d at 959 (destruction was willful when a party “knew
12
he was under a duty to preserve [evidence], but intentionally deleted many files and then
13
wrote a program to write over the deleted documents”). Carrington willfully erased data
14
from the Western drive weeks before he produced it to FSA. He knew or should have
15
known at the time that the drive constituted relevant evidence and that he had an
16
obligation to preserve it.
17
Carrington does not declare why he did not preserve data on the Western drive.
18
Defendants in their Response to FSA’s Motion provide the closest statement to an
19
explanation when they ask rhetorically “how much longer than four months after filing of
20
the lawsuit should Defendants have avoided using and maintaining the functionality of
21
the only personal computer available to them?” (Doc. 120 at 12.) They imply that
22
Carrington erased data to improve the performance of his computer. Although the Court
23
can appreciate the practical difficulties with preserving evidence on one’s personal
24
computer, the duty to preserve in the midst of litigation is paramount. Carrington
25
willfully breached that duty.
26
c.
Relevance
27
The Western drive was the primary hard drive on Carrington’s personal computer
28
at least from April 2011 to May 2012 when it was produced to FSA. Since Carrington
- 34 -
1
still possessed FSA trade secrets on the computer during that time period, data on the
2
Western drive was potentially relevant to FSA’s claims. It is not ascertainable what files
3
the CCleaner erased from the drive. But “because the relevance of destroyed documents
4
cannot be clearly ascertained because the documents no longer exist,” Defendants “can
5
hardly assert any presumption of irrelevance as to the destroyed documents.” Leon, 464
6
F.3d at 959 (internal quotation marks and citation omitted). There are facts sufficient to
7
show likelihood that some of the files erased from the Western drive were relevant to
8
FSA’s claims.
9
d.
Sanctions
10
District courts may impose sanctions as part of their inherent power “to manage
11
their own affairs so as to achieve the orderly and expeditious disposition of cases.”
12
Chambers v. NASCO, Inc., 501 U.S. 32, 43, reh’g denied, 501 U.S. 1269 (1991).
13
“Sanctions that a federal court may impose for spoliation include assessing attorney’s
14
fees and costs, giving the jury an adverse inference instruction, precluding evidence, or
15
imposing the harsh, case-dispositive sanctions of dismissal or judgment.” Surowiec, 790
16
F. Supp. 2d at 1008. While using discretion to impose sanctions, if any, “courts generally
17
consider three factors: (1) the degree of fault of the party who altered or destroyed the
18
evidence; (2) the degree of prejudice suffered by the opposing party; and (3) whether
19
there is a lesser sanction that will avoid substantial unfairness to the opposing party.”
20
Apple Inc. v. Samsung Electronics Co., Ltd., 888 F. Supp. 2d 976, 992 (N.D. Cal. 2012)
21
(internal quotation marks and citations omitted).
22
FSA asks for the following sanctions against Defendants: (1) strike the
23
Defendants’ Answer; (2) proscribe Defendants from offering testimony, evidence or
24
argument based on matters likely to have been contained within the Western drive,
25
including argument that Defendants took FSA’s trade secrets for a lawful reason and that
26
they have not and/or do not intend to use the information for profit; (3) an adverse
27
inference instruction to the jury that because Defendants spoliated the Western drive, if
28
the data on the drive were available, it would show that Defendants intended to and/or did
- 35 -
1
exploit FSA’s information for profit and that such actions were willful and malicious; and
2
(4) award attorneys’ fees and costs incurred as a result of Defendants’ spoliation. (Doc.
3
111 at 8–9.)
4
An adverse inference instruction is appropriate. “[A] finding of ‘bad faith’ is not a
5
prerequisite” to an imposition of an adverse inference. Glover v. BIC Corp., 6 F.3d 1318,
6
1329 (9th Cir. 1993). But Defendant’s proposed instruction overreaches; it asks the jury
7
to find that the erased data would show Defendants intended to willfully and maliciously
8
profit from their misappropriation. While a court may take the degree of culpability into
9
account when fashioning an adverse inference, it nevertheless must “impose the ‘least
10
onerous sanction’ given the extent of the offending party’s fault and the prejudice to the
11
opposing party.” Napster, 462 F. Supp. 2d at 1078 (quoting Schmid v. Milwaukee Elec.
12
Tool Corp., 13 F.3d 76, 79 (3d Cir. 1994)).
13
Although FSA has shown that the erased data was likely relevant to its claims,
14
they understandably have not been able to prove the contents of that data. Therefore, a
15
more neutral instruction is appropriate. The Court will instruct the jury as follows:
16
17
18
19
20
21
22
Defendants have failed to prevent the destruction of relevant evidence for
Plaintiff’s use in this litigation. This failure resulted from their failure to
perform their discovery obligations.
You may, if you find it appropriate, presume from that destruction that the
evidence that was destroyed was relevant to Plaintiff’s case, and that the
destroyed evidence was favorable to Plaintiff.
Whether this finding is important to you in reaching a verdict in this case is
for you to decide.
23
Further, the Court awards $500 to FSA for attorneys’ fees and costs related to its Motion
24
for Sanctions.
25
CONCLUSION
26
The undisputed facts show that Defendants misappropriated FSA’s trade secrets.
27
The existence of damages, however, is disputed; there is evidence that FSA incurred
28
expenses from its investigation of Defendants’ misconduct. Further, the existence of
- 36 -
1
malice is disputed. Therefore, an award of exemplary damages and attorneys’ fees are
2
inappropriate at this stage of the litigation.
3
FSA’s expert disclosures contained in declarations attached to its Motion for
4
Sanctions were untimely. Because the delay was not substantially justified or harmless,
5
the declarations are stricken to the extent they contain new expert disclosures. As to the
6
merits of FSA’s Motion, Defendants did not have a duty to preserve the Fujitsu drive in
7
April 2011. Defendants did have a duty to preserve the Western drive in May 2012,
8
willfully spoliated the drive by erasing data on it, and the data may be relevant to FSA’s
9
claims. Therefore, the Court will sanction Defendants by providing an adverse instruction
10
to the jury as described above and awarding attorneys’ fees to FSA in relation to its
11
Motion for Sanctions.
IT IS THEREFORE ORDERED that Plaintiff’s Motion for Partial Summary
12
13
Judgment, (Doc. 105), is granted in part and denied in part.
14
IT IS FURTHER ORDERED that Defendants’ Motion for Summary Judgment
15
on Plaintiff’s Cause of Action Under the Arizona Uniform Trade Secrets Act, (Doc. 109),
16
is denied.
17
IT IS FURTHER ORDERED that Plaintiff’s Motion for Sanctions Due to
18
Defendants’ Spoliation of Material Evidence, (Doc. 111), is granted in part and denied
19
in part as follows:
(1)
20
21
The Court will provide an adverse inference instruction to the jury as
described in this Order.
(2)
22
The Court awards $500 for attorneys’ fees and costs incurred by Plaintiff in
23
bringing its Motion for Sanctions, (Doc. 111).
24
///
25
///
26
///
27
///
28
///
- 37 -
1
IT IS FURTHER ORDERED that Defendant’s Motion to Strike and Preclude
2
Plaintiff’s Untimely Expert Disclosures, (Doc. 134), is granted in part and denied in
3
part. The declarations, (Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta
4
Decl.)), are stricken only to the extent that they contain new expert disclosures and not in
5
their entirety.
6
Dated this 23rd day of August, 2013.
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
- 38 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?