Food Services of America Incorporated v. Carrington et al
Filing
57
ORDER granting in part and denying in part 32 Motion for Judgment on the Pleadings; granting 37 Motion to Exclude Matters Outside the Pleadings ; granting 43 Motion for Order to Show Cause. Defendants shall file a response by 11/26/12 and Plaintiff's reply shall be due 12/3/12. Show Cause Hearing set for 12/5/2012 at 09:00 AM before Judge G Murray Snow. Signed by Judge G Murray Snow on 11/8/12.(TLJ)
1
WO
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE DISTRICT OF ARIZONA
8
9
Food Services of America Incorporated, a
Delaware corporation,
ORDER
10
11
12
No. CV-12-00175-PHX-GMS
Plaintiff,
vs.
Paul Carrington; Elba Rubio, et al.,
13
Defendants.
14
15
Pending before this Court are the following motions: (1) Motion for Judgment on
16
the Pleadings filed by Defendants Paul Carrington and Elba Rubio (“Defendants”) (Doc.
17
32), (2) Motion to Exclude Matters Outside of the Pleadings in Defendant’s Motion for
18
Judgment on the Pleadings filed by Plaintiff Food Services of America Inc. (“FSA”)
19
(Doc. 37), and (3) FSA’s Motion for Order to Show Cause Why Defendants Should Not
20
be Held in Contempt. (Doc. 43). The motions are fully briefed. For the reasons set forth
21
below, the Court grants in part and denies in part Defendants’ Motion for Judgment on
22
the Pleadings, grants FSA’s Motion to Exclude Matters Outside of the Pleadings, and
23
grants FSA’s Motion for Order to Show Cause.
24
I.
Background
25
FSA is a national foodservice distributor, serving customers in 15 states from nine
26
regional distribution centers. (Doc. 1 at 4). FSA invests resources to develop and
27
maintain information, methods, and techniques related to appropriate client pricing,
28
customer preferences, client needs, and effective and appropriate route lists for sales
1
employees. (Id. at 4-5). Such FSA confidential information is not generally known in
2
the public domain and FSA has in place policies and procedures designed to ensure that
3
such information remains confidential.
4
business needs through an employee network that includes employees titled Supplier
5
Information Specialist (“SIS”). Id. SISs have access to FSA confidential information.
6
(Id. at 5, 7-8). As a condition of employment, SISs are required to sign a confidentiality
7
agreement. (Id. at 8). Authorization to access FSA confidential information ends upon
8
employment termination. (Id. at 9). Additionally, SISs’ duties include creating good will
9
for FSA through personal contacts and business relationships with suppliers and
10
(Id. at 5).
FSA services its customers and
customers. (Id. at 8).
In 2008, Defendant Carrington began his employment with FSA as a SIS. (Id. at
11
12
6).
Defendant Rubio also began her employment with FSA in 2008, and she was
13
employed as a SIS at the time FSA terminated her employment.
14
commencement of their employment, FSA advised Defendants of the nature of the
15
information being provided to them, and Defendants both signed confidentiality
16
agreements. (Id. at 6-8).
(Id.).
Upon
17
On March 4, 2011, FSA discharged Defendant Rubio for gross misconduct. (Id.).
18
On March 5, 2011, Defendant Carrington entered a FSA worksite during a time that he
19
was not scheduled to work. While there, he used a FSA provided computer to gain
20
access to and transfer over 300 emails, some of which contained FSA confidential
21
information, to his personal email address, and to Defendant Rubio. (Id.). Thereafter, on
22
March 7, 2011, FSA discharged Defendant Carrington for gross misconduct. (Id. at 10).
23
On March 8, 2011, FSA sent Defendants letters demanding the return of all FSA
24
confidential information in their possession.
(Id.)
FSA’s subsequent investigation
25
revealed that in February 2011, Defendant Carrington used a FSA computer to gain
26
access to and transfer FSA confidential information, to his personal address. (Id.).
27
Thereafter, Defendant Carrington began working for a FSA competitor as a
28
Pricing Analyst. (Id. at 11). Defendant Rubio took an employment position in which she
-2-
1
could use FSA secret information to her new employer’s competitive advantage. (Id.).
2
FSA’s complaint alleges the following six claims: (1) violation of the Computer
3
Fraud and Abuse Act (“CFAA”); (2) violation of the Arizona Trade Secrets Act; (3)
4
violation of the Arizona Anti-Racketeering Statute; (4) breach of fiduciary duty; (5)
5
conversion; and (6) unjust enrichment.
6
II.
7
Discussion
A.
8
Legal Standard for Judgment on the Pleadings / Conversion to Motion
for Summary Judgment
9
“Judgment on the pleadings is proper when, taking all allegations in the pleadings
10
as true and construed in the light most favorable to the nonmoving party, the moving
11
party is entitled to judgment as a matter of law.” Living Designs, Inc. v. E.I. Dupond de
12
Nemours & Co., 431 F. 3d 353, 360 (9th Cir. 2005); see also Elvig v. Calvin Presbyterian
13
Church, 375 F.3d 951, 955 (9th Cir. 2004) (same).
14
judgment on the pleadings is evaluated under the same standards as a motion to dismiss
15
for failure to state a claim, and dismissal pursuant to Rule 12(c) is inappropriate if the
16
facts as pled would entitled the plaintiff to a remedy. Merchants Home Delivery Serv.,
17
Inc. v. Hall & Co., 50 F.3d 1486, 1488 (9th Cir. 1995).
In other words, a motion for
18
In support of their motion for judgment on the pleadings, Defendants have
19
presented evidence outside the pleadings. (Doc. 33, Ex. A-Q). Such information can be
20
considered only if the motion is converted by the Court to a motion for summary
21
judgment. If it were to do so, the Court must give both parties an opportunity to present
22
all material pertinent to such a motion. Fed. R. Civ. P. 12(d).
23
In light of the ongoing discovery disputes between the parties (Docs. 43, 48) and
24
the Case Management Order setting December 28, 2012, as the deadline for completion
25
of fact discovery (Doc. 30 at 2), the Court, in the exercise of its discretion, will not
26
convert Defendants’ Rule 12(c) motion to a motion for summary judgment. See Klingele
27
v. Eikenberry, 849 F.2d 409, 412 (9th Cir. 1988) (“Summary judgment is generally
28
disfavored where relevant evidence remains to be discovered.”).
-3-
Accordingly, the Court
1
grants FSA’s motion to exclude matters outside of the pleadings without prejudice to
2
their submission in a properly filed motion for summary judgment. Nevertheless, the
3
Defendants’ motion is not uniquely based on the excluded materials.
4
complaint plainly alleges that SISs have access to FSA confidential information. (Doc. 1
5
at 5, 7-8).
6
confidentiality agreement. (Id. at 8).
7
8
9
Plaintiff’s
And that, as a condition of employment, SISs are required to sign a
1.
Violation of CFAA
The CFAA prohibits accessing a protected computer without authorization or in
excess of authorization granted. 18 U.S.C. § 1030(a).
The CFAA defines “exceeds
10
authorized access” as “to access a computer with authorization and to use such access to
11
obtain or alter information in the computer that the accesser is not entitled so to obtain or
12
alter.” 18 U.S.C. § 1030(e)(6). In United States v. Nosal, the Ninth Circuit narrowly
13
interpreted this provision in holding that “‘exceeds authorized access’ in the CFAA is
14
limited to violations of restrictions on access to information, and not restrictions on its
15
use.” 676 F.3d 854, 863-64 (9th Cir. 2012). The defendant in Nosal convinced his
16
former colleagues to use their log-in credentials to download information from their
17
employer’s confidential computer database, and then to transfer the information to him.
18
Id. at 856. The government indicted the defendant on twenty counts, including violations
19
of the CFAA for aiding and abetting his former colleagues in “exceeding their authorized
20
access” with intent to defraud. Id. at 856. Defendant filed a motion to dismiss the CFAA
21
counts arguing that the CFAA targets only hackers and not individuals who access a
22
computer with authorization but then misuse information they obtain by means of such
23
access. Id. The district court dismissed the counts. Id. In affirming, the Ninth Circuit
24
noted that the language of the statute does not refer to a person that misuses data he or
25
she is authorized to access, but rather to someone who uses a computer to obtain
26
information that person is not authorized to access. Id. at 863. Therefore, to make a
27
viable claim under the CFAA, a plaintiff must allege that a defendant either had no
28
authorized access whatsoever to the protected computers or that instead a defendant only
-4-
1
had access to certain data or files but notwithstanding that limited access, he or she
2
accessed unauthorized information.
3
In this case, FSA has not alleged that at the time Defendant Carrington used a FSA
4
computer to send confidential and proprietary information to his personal email account,
5
he did not have authorization to access that information. Whether Defendant’s use of
6
such information for personal reasons after his employment had ceased constitutes
7
misappropriation or conversion is not at issue under the CFAA claim. Accordingly,
8
under the Ninth Circuit’s interpretation of “exceeds authorized access” Defendants are
9
entitled to judgment on the pleadings and the CFAA claim is dismissed.
10
2.
Violation of Arizona’s Uniform Trade Secrets Act
11
Arizona has adopted a version of the Uniform Trade Secrets Act (“AUTSA”)
12
under which plaintiffs may recover damages for misappropriation of a trade secret.
13
A.R.S. § 44-401—07. Under Arizona law, misappropriation consists of either:
14
15
(a) Acquisition of a trade secret of another by a person who knows or has
reason to know that the trade secret was acquired by improper means.
16
17
(b) Disclosure or use of a trade secret of another without express or implied
consent by a person who either:
18
19
20
21
(i)
Used improper means to acquire knowledge of the
trade secret.
(ii)
At the time of disclosure or use, knew or had reason to
know that his knowledge of the trade secret was
derived from or through a person who had utilized
improper means to acquire it, was acquired under
circumstances giving rise to a duty to maintain its
secrecy or limit its use or was derived from or through
a person who owed a duty to the person seeking relief
to maintain its secrecy or limit its use.
22
23
24
25
26
A.R.S. § 44–401(2).
27
28
-5-
1
Additionally, “‘improper means’ includes theft, bribery, misrepresentation, breach
2
or inducement of a duty to maintain secrecy or espionage through electronic or other
3
means.” A.R.S. § 44–401(1).
4
Defendants argue FSA’s complaint fails to establish that there has been a wrongful
5
use or disclosure of its confidential and proprietary information.
6
Plaintiff, however, need not “establish” anything in its complaint. It must merely make
7
allegations with sufficient detail to make its claims plausible.
8
“Defendants willfully and maliciously misappropriated FSA’s Trade Secret and
9
Confidential Proprietary Information, and have and will continue to violate their
10
confidentiality obligations to FSA.” (Doc. 1, ¶ 66). FSA specifically alleges “Carrington
11
shared that Trade Secret and Confidential Proprietary Information with Rubio so that they
12
would gain advantages that would make them more valuable to . . . other companies in
13
competition with FSA,” (Id., ¶ 49), and that Defendants have each accepted new
14
employment positions with FSA competitors. (Id., ¶¶ 40, 42). FSA’s allegations are
15
sufficient to give plausibility to the claims that Defendant Rubio acquired the FSA secret
16
information from Defendant Carrington with reason to know Defendant Carrington
17
acquired the information by improper means.
18
confidentiality agreements (Id., ¶ 24), and as a result, Defendant Rubio was on notice that
19
Defendant Carrington was obligated to maintain the confidentiality of the information
20
and not to disclose it to her, a former FSA employee. Therefore, the Court denies the
21
motion for judgment on the pleadings as to the AUTSA claim.
22
3.
(Doc. 37 at 18).
FSA alleges that
Both Defendants signed FSA
Conversion, Breach of Fiduciary Duty, and Unjust Enrichment
23
In addition to its AUTSA claim, the Plaintiff also asserts state law claims for
24
violation of the Arizona Anti-Racketeering Statute, breach of fiduciary duty, conversion,
25
and unjust enrichment. The Defendant asserts a number of external facts to argue that
26
these additional claims should be dismissed. Because the Court declines to convert
27
Plaintiff’s Motion for Judgment on the Pleadings into a motion for summary judgment, it
28
declines to take into account, at least at this point, Defendants’ arguments that rely on
-6-
1
factual assertions that are external to the pleadings. The Motion for Judgment on the
2
Pleadings as to the remaining claims in Plaintiff’s complaint is, therefore, denied without
3
prejudice. Nevertheless, for purposes of streamlining the ongoing discovery and focusing
4
the parties on the issues that remain, the Court notes for the parties benefit that the
5
AUTSA expressly “displaces conflicting tort, restitutionary and other laws of this state
6
providing civil remedies for misappropriation of a trade secret.” A.R.S. § 44-407. “This
7
Court and the majority of courts that have ruled on this issue hold that the AUTSA
8
“preempts all common law tort claims based on misappropriation of information, whether
9
or not it meets the statutory definition of a trade secret.’” Universal Engraving, Inc. v.
10
Metal Magic, Inc. CV-08-1944-PHX-GMS, 2012 WL 4358942, at *2 (D. Ariz. 2012)
11
(quoting Firetrace USA, LLC v. Jesclard, 800 F. Supp. 2d 1042, 1049-52 (D. Ariz. 2010).
12
As a consequence of asserting an AUTSA claim, FSA is not entitled to bring any non-
13
AUTSA claims based on a theory of misappropriation of confidential information,
14
including claims based on state statute such as Arizona’s anti-racketeering law.
15
It appears to the court that FSA bases its claims for racketeering, breach of
16
fiduciary duty, conversion and unjust enrichment on Defendants alleged misappropriation
17
of FSA secret information.1 (Doc. 1, ¶¶ 88, 91, 96). FSA has failed to plead allegations
18
showing that these tort claims are based on actions other than misappropriation of
19
information and therefore, at some point, FSA will likely be obliged to elect whether it
20
21
22
23
24
25
26
27
28
1
FSA’s racketeering claim alleges “Defendants’ misappropriation, retention, and
use of FSA’s Trade Secret and Confidential Proprietary Information constitutes theft”
and that “Defendants’ unauthorized and unlawful use of FSA’s Trade Secret and
Confidential Proprietary Information without disclosing such use to, and concealing it
from, FSA constitutes a scheme or artifice to defraud . . . .” (Doc. 1, ¶¶ 73-74). FSA’s
breach of fiduciary duty claim alleges “Defendants violated their common law fiduciary
duty and duty of loyalty . . . in that, they knowingly, willfully, and maliciously
misappropriated FSA’s Trade Secret and Confidential Proprietary Information.” (Id.,
¶ 88). FSA’s conversion claim alleges “Defendants have conspired to convert, and have
actually converted, FSA’s property to their own use by misappropriating . . . FSA’s Trade
Secret and Confidential Proprietary Information.” (Id., ¶ 91). FSA’s unjust enrichment
claim alleges “Defendants have been enriched by their illegal misappropriation of FSA’s
Trade Secret and Confidential Proprietary Information.” (Id., ¶ 96).
-7-
1
wishes to pursue its AUTSA claims, or its other state-law claims based on the
2
misappropriation of trade secrets.
3
B.
Legal Standard for Motion to Show Cause
4
FSA’s motion for order to show cause (Doc. 43) seeks an order from this Court to
5
require Defendants to show cause why they should not be held in contempt for violating
6
the Court’s Amended Consent Order (“Order”). (Amended Consent Order Feb. 6, 2012
7
Order, Doc. 16). “The moving party has the burden of showing by clear and convincing
8
evidence that the contemnors violated a specific and definite order of the court.” FTC v.
9
Affordable Media, 179 F.3d 1228, 1239 (9th Cir. 1999).
10
The Order provided that “all documents or electronically stored records containing
11
information in the foregoing categories, and all copies thereof, currently in the
12
possession, custody, or control of the Defendants shall be turned over to the Plaintiff
13
within 48 hours of the issuance of this Order, along with a sworn attestation signed by the
14
Defendants confirming that they have surrendered all such documents and electronically
15
stored information . . . .” (Doc. 16 at 3). Pursuant to the terms of the Order, on February
16
12, 2012, Defendants provided Declarations attesting that they had “no electronically
17
stored documents contain confidential information in their possession, custody or
18
control”, that they are “not aware of any other documents containing confidential
19
information, beyond those [] provided to the EEOC and NLRB”, and that to the best of
20
their “knowledge, information and belief, no other such documents exist anywhere or in
21
any form.” (Doc. 43-1, Ex. A at 2-5).
22
On August 28, 2012, Defendants’ counsel emailed FSA’s counsel “30 or so
23
documents from the thumbdrive, which you probably have not seen before.” (Doc. 43-1,
24
Ex. D at 13). Defendants’ counsel had previously stated that the thumb drive at issue
25
only contained documents Defendants provided to the NLRB. (Doc. 43-1, Ex. C at 10.
26
The emails provide clear and convincing evidence that Defendants did not turn over all
27
electronic documents containing confidential information in their possession. In response
28
to FSA’s motion, Defendants argue that they substantially complied with the Order and
-8-
1
that said “relatively minor technical infraction” (Doc. 45 at 5) is most likely “the result of
2
a miscommunication between counsel and Defendants.” (Id. at 6). Defendants’ response
3
fails entirely to comprehend the serious nature of violating a court order. Accordingly,
4
the Court grants FSA’s motion to show cause and thereby directs Defendants to show
5
cause why they should not be held in contempt for violating the Court’s February 6,
6
2012, Amended Consent Order. (Doc. 16).
7
IT IS HEREBY ORDERED:
8
1.
9
10
11
12
The Motion for Judgment on the Pleadings (Doc. 32) is GRANTED IN
PART AND DENIED IN PART.
2.
The Motion to Exclude Matters Outside the Pleadings (Doc. 37) is
GRANTED.
3.
The Motion for Order to Show Cause (Doc. 43) is GRANTED.
13
Defendants shall file a Response by November 26, 2012. Plaintiff’s Reply shall be due
14
December 3, 2012.
15
4.
An Order to Show Cause Hearing is set for December 5, 2012 at 9:00 a.m.
16
in Courtroom 602, Sandra Day O’Connor U.S. Federal Courthouse, 401 W. Washington
17
St., Phoenix, Arizona 85003-2151.
18
Dated this 8th day of November, 2012.
19
20
21
22
23
24
25
26
27
28
-9-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?