Joshua David Mellberg LLC et al v. Will et al
Filing
53
ORDER ADOPTING REPORT AND RECOMMENDATION. The Report and Recommendation 45 is ADOPTED; The pending motions (Docs. 22 , 27 , 30 , and 34 ) are granted and denied as set forth in this Order. Plaintiffs may file a second amended complaint within 30 days of the date of this Order as set forth herein and in the Report and Recommendation. Signed by Judge Cindy K Jorgenson on 3/27/2015. (See Order for details)(ALS)
1
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE DISTRICT OF ARIZONA
8
9
Joshua David Mellberg LLC, et al.,
Plaintiffs,
10
11
ORDER
v.
12
No. CV-14-02025-TUC-CKJ
Jovan Will, et al.,
13
Defendants.
14
15
Plaintiffs Joshua David Mellberg, LLC, dba J.D. Mellberg Financial, and Joshua
16
David Mellberg filed a First Amended Complaint asserting 11 counts against various
17
Defendants. (Doc. 9, FAC) Four motions are now pending before the Court: (1) Partial
18
Motion to Dismiss filed by Defendants Jovan Will and Tree Fine (Doc. 22); (2) Motion to
19
Dismiss filed by Defendant the Impact Partnership (Doc. 27); (3) Partial Motion to
20
Dismiss filed by Defendants Fernando & Geovanna Godinez (Doc. 30); and (4) Motion
21
to Dismiss filed by Defendant Carly Uretz (Doc. 34). Following oral argument on
22
November 13, 2014, Magistrate Judge Charles R. Pyle issued a Report and
23
Recommendation (R & R) on February 9, 2015, (1) denying in part and granting in part
24
Defendant Will and Fine’s Partial Motion to Dismiss; (2) granting Defendant Impact
25
Partnership’s Motion to Dismiss; (3) granting Defendant Godinez’ Partial Motion to
26
Dismiss; and (4) granting Defendant Uretz’ Motion to Dismiss.
27
exception of certain claims in the Third Claim (Unfair Competition), the Magistrate
28
(Doc. 45.) With the
1
Judge recommended that all dismissed claims be dismissed with leave to amend. (Id. at
2
33.)
3
Plaintiffs files objections to the R & R to the extent that it recommends that certain
4
unfair competition claims be dismissed as based on theories too novel to be permitted to
5
go forward. (Doc. 46.) Defendant Jovan Will objects to the R & R on the ground that the
6
FAC contains no plain statement that Will misappropriated trade secrets. (Doc. 47.)
7
Defendant Tree Fine objects to the R & R on the ground that the Confidentiality
8
Agreement is facially unenforceable. (Doc. 48.)
9
10
The Court overrules the objections and adopts the R & R.
I.
Background
11
Plaintiffs are Joshua David Mellberg, LLC, dba J.D. Mellberg Financial, and
12
Joshua David Mellberg, an individual (collectively referred to as “JDM” or “Plaintiffs”).
13
Joshua David Mellberg is the owner and President of JDM. (FAC ¶16.) He is a nationally
14
known financial advisor based in Tucson, Arizona, and “is a pioneer and leader in
15
marketing and selling annuities via the Internet.” (Id. ¶¶17, 18.) JDM Mellberg Financial
16
is a nationwide retail and wholesale insurance agency specializing “in capturing internet
17
based leads and supplying them to a network of agents across the country. JDM began
18
developing internet based marketing and sales funnels in 2009.” (Id. ¶22; see also id. ¶23
19
(JDM has expended in excess of $30 million refining its sales funnels)) JDM advertises
20
and promotes the services and products that it offers, including annuities. (Id. ¶¶21, 22.)
21
A significant portion of JDM’s advertising and promotional activities in the field of
22
annuities is conducted on the internet. (Id. ¶21).
23
The individual Defendants are former employees of JDM. Also named as a
24
Defendant is The Impact Partnership, which is a business entity that some or all of the
25
individual Defendants are alleged to have joined or otherwise furthered the interests
26
thereof. (See e.g., id. ¶¶62, 75, 87-88, 118, 138.) As stated in the R & R, JDM’s theory
27
of the case is that the individual Defendants “devised a scheme to steal JDM’s trade
28
-2-
1
secrets and confidential information, attempted to destroy evidence of their theft, and are
2
now using that stolen information in a competing venture.” (Doc. 45 at 6.)
3
JDM alleges the following claims for relief: (1) violation of the Computer Fraud
4
and Abuse Act, 18 U.S.C. § 1030 (First Claim) against all Defendants; (2) violation of
5
the Arizona Uniform Trade Secrets Act (“AUTSA”), A.R.S. § 44-401, et. seq., against all
6
Defendants (Second Claim); (3) unfair competition against all Defendants (Third Claim);
7
(4) breach of contract against Defendants Fine, Arceo and Godinez (Fourth Claim);
8
(5) unjust enrichment against all Defendants (Fifth Claim); (6) breach of fiduciary
9
duty/duty of loyalty against Defendants Fine and Will (Sixth Claim); (7) breach of duties
10
regarding Alpha Academy Advisors, LLC, against Defendant Will (Seventh Claim);
11
(8) trespass to chattel against Defendant Fine (Eighth Claim); (9) theft/conversion against
12
Defendant Fine (Ninth Claim); (10) civil conspiracy against all Defendants (Tenth
13
Claim); and (11) aiding and abetting against all Defendants (Eleventh Claim).
14
Pursuant to Fed.R.Civ.P. 12(b)(6), Defendants Will, Fine, Godinez, Uretz, and
15
The Impact Partnership seek dismissal of JDM’s Second, Third, Fifth, Tenth, and
16
Eleventh Claims for failure to state a claim. Additionally, Defendants Fine and Godinez
17
seek dismissal of JDM’s Fourth Claim for relief for failure to state a claim, and
18
Defendants Fine and Will seek dismissal of JDM’s Sixth Claim for relief for failure state
19
a claim.
20
II.
Standard of Review
21
The Court reviews de novo the objected-to portions of the Report and
22
Recommendation. 28 U.S.C. § 636(b)(1); Fed. R. Civ. P. 72(b). The Court reviews for
23
clear error the unobjected-to portions of the Report and Recommendation. Johnson v.
24
Zema Systems Corp., 170 F.3d 734, 739 (7th Cir. 1999); see also, Conley v. Crabtree, 14
25
F.Supp.2d 1203, 1204 (D. Or. 1998).
26
27
The standard for a motion to dismiss is correctly stated in the R & R and will not
be repeated here. (Doc. 45 at 3-5.)
28
-3-
1
III.
Findings and Conclusions of the Magistrate Judge and Parties’ Objections
2
A.
3
Plaintiffs’ Third Claim is for unfair competition against all Defendants. The FAC
4
alleges as unfair competition that, inter alia, “Defendants have engaged in unlawful
5
business acts or practices by committing acts including computer fraud, trespass,
6
conversion, and other illegal acts as practices as alleged above, all in an effort to gain
7
unfair competitive advantage over JDM.”1 (FAC ¶147.) The R & R recognizes a cause of
8
action in Arizona for unfair competition based on the misappropriation of confidential
9
information that does not rise to the level of a trade secret under the Arizona Uniform
10
Trade Secrets Act (AUTSA).2 (Doc. 45 at 25.) But Magistrate Judge Pyle dismissed
11
certain claims in the Third Claim; he recommended that the Court should be reluctant to
12
allow Plaintiffs’ unfair competition claims based on specifically alleged unfair business
13
practices—conversion, trespass, and computer fraud—that are novel to Arizona.
14
45 at 25.) Plaintiffs object to the latter recommendation as reflective of an overly narrow
15
view of unfair competition law that is inconsistent with Arizona authorities.
Plaintiffs’ Objection
(Doc.
16
The Arizona Supreme Court has recently held that the AUTSA “creates an
17
exclusive cause of action—and displaces conflicting causes of action—for claims based
18
on the misappropriation of trade secrets.” Orca Commc’ns. Unlimited, LLC v. Noder, 337
19
P.3d 545, 546 (Ariz. 2014) (Orca II). The Court also held that assuming the viability of a
20
common law claim for misappropriation of confidential information, AUTSA “does not
21
displace common-law claims based on alleged misappropriation of confidential
22
information that is not a trade secret.” Id. The Court, which was reviewing the lower
23
courts’ decision on a motion to dismiss, declined to “decide today what aspects, if any, of
24
the confidential information alleged in [the plaintiff’s] unfair competition claim might
25
26
27
28
1
Computer fraud is also separately asserted in the First Claim, Trespass is
separately alleged in the Eighth Claim, and Theft/Conversion is separately alleged in the
Ninth Claim.
2
The claim was dismissed with leave to amend, and Plaintiffs’ objection is not
directed at that portion of the R & R. (Doc. 46 at 4, n.1.)
-4-
1
fall within AUTSA’s broad definition of ‘trade secret’ and therefore be displaced….That
2
determination will not hinge on the claim’s label, but rather will depend on discovery and
3
further litigation that has not yet occurred.” Id. at 549 (citations omitted). Magistrate
4
Judge Pyle ruled that in light of Orca II, it cannot be said at this point in the litigation that
5
JDM’s claim is preempted by AUTSA to the extent it may involve confidential
6
information that does not constitute trade secrets. (Doc. 45 at 23.)
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
The Arizona Supreme Court also declined to decide whether Arizona recognizes a
common-law claim for unfair competition as alleged in Orca’s complaint.
Nor do we decide whether Arizona recognizes a common-law claim for
unfair competition as alleged in Orca’s complaint. Cf. Restatement (First)
of Torts §§ 757, 759 (1939) (enumerating several theories of liability,
including disclosure or use of another's trade secret, and improper
acquisition of information, whether or not it constitutes a trade secret, to
advance a rival business interest). Compare Fairway Constructors, Inc. v.
Ahern, 193 Ariz. 122, 124 ¶¶ 8–9, 970 P.2d 954, 956 (App.1998) (finding
plaintiff's unfair-competition claim preempted by federal copyright law,
and noting that such a claim is “based on principles of equity” and
“encompasses several tort theories,” including “misappropriation”), with
Restatement (Third) of Unfair Competition § 1 cmt. g (1995) (noting that
the “specific forms of unfair competition [described therein] do not fully
exhaust the scope of statutory or common law liability for unfair methods
of competition”), and Restatement (Second) of Agency §§ 395, 396 (1958)
(describing agent’s duty not to use or disclose confidential information
acquired during the course of his agency in competition with principal).
Orca II, 337 P.3d at 549-550.
Plaintiffs argue that Arizona courts have stated that “[t]he common law doctrine of
unfair competition is based on principles of equity,” Fairway Constructors, Inc., 970
P.2d at 956, and because of the doctrine’s equitable underpinning, the “tort of unfair
competition is extremely flexible[.]” Golden Nugget, Inc. v. American Stock Exchange,
Inc., 828 F.2d 586, 591 (9th Cir. 1987). Plaintiffs contend that the only requirements in
Arizona for the tort of unfair competition are that the plaintiff show either “that it was
engaged in competitive business with [the defendant] or that [the defendant’s] actions
were likely to produce public confusion[.]” Sutter Home Winery, Inc. v. Vintage
Selections, Ltd., 971 F.2d 401, 407 (9th Cir. 1992) (emphasis added). In declining to
-5-
1
decide whether Arizona recognizes a common-law claim for unfair competition, the
2
Court pointed to Restatement (Third) of Unfair Competition, which suggests that lower
3
Arizona courts may follow the Restatement: Restatement (Third) of Unfair Competition §
4
1 cmt. g (1995) (noting that the “specific forms of unfair competition [described therein]
5
do not fully exhaust the scope of statutory or common law liability for unfair methods of
6
competition”). Orca II, 337 P.3d at 549. Plaintiffs argue that this is consistent with the
7
rule in Arizona that in the absence of controlling Arizona authority, Arizona courts
8
follow the Restatement of the Law. See Lerner v. DMB Realty, LLC, 322 P.3d 909, 916
9
n.7 (Ariz. App. 2014). The Restatement Third of Unfair Competition acknowledges the
10
11
12
13
14
15
16
flexible nature of the doctrine:
One who causes harm to the commercial relations of another by engaging
in a business or trade is not subject to liability to the other for such harm
unless: (a) the harm results from acts or practices of the actor actionable by
the other under the rules of this Restatement relating to: (1) deceptive
marketing, as specified in Chapter Two; (2) infringement of trademarks and
other indicia of identification, as specified in Chapter Three; (3)
appropriation of intangible trade values including trade secrets and the right
of publicity, as specified in Chapter Four; or from other acts or practices of
the actor determined to be actionable as an unfair method of competition,
taking into account the nature of the conduct and its likely effect on both
the person seeking relief and the public.
17
18
19
20
21
22
23
24
25
§ 1 (emphasis added). Plaintiffs further contend that Comment (g) to this section of the
Restatement further elucidates the broad and flexible application of the doctrine:
A primary purpose of the law of unfair competition is the identification and
redress of business practices that hinder rather than promote the efficient
operation of the market. Certain recurring patterns of objectionable
practices form the basis of the traditional categories of liability specifically
enumerated in Subsection (a)(1)-(3). However, these specific forms of
unfair competition do not fully exhaust the scope of statutory or common
law liability for unfair methods of competition, and Subsection (a)
therefore includes a residual category encompassing other business
practices determined to be unfair.
Restatement (Third) of Unfair Competition § 1 (1995) (emphasis added).
26
Defendant The Impact Partnership files a response, which is joined by Defendants
27
Will, Fine, Godinez, and Uretz. (Docs. 49, 50.) They assert that Sutter Home, on which
28
Plaintiffs rely, contains no analysis of the issue and cites a single Arizona Supreme Court
-6-
1
opinion, from 1945. See Sutter Home, 971 F.2d at 407 (citing Lininger v. Desert Lodge,
2
63 Ariz. 239, 160 P.2d 761 (1945)). They contend that since Desert Lodge, the Arizona
3
Supreme Court has twice held that “the universal test [for unfair competition] is whether
4
the public is likely to be confused.” Boice v. Stevenson, 187 P.2d 648, 653 (Ariz.
5
1947)(emphasis added); see also O’Hara v. Lance, 7267 P.2d 725, 728 (Ariz.
6
1954)(same). They also argue that Desert Lodge was a trade name dispute between the
7
owners of “The Lodge on the Desert” and “Desert Lodge.” The court expressly limited its
8
analysis to disputes over trade names. They point out that this court refused to recognize
9
a claim for unfair competition in the absence of public confusion on two occasions.
10
(Doc. 49 at 2-3, citing Doe v. Arizona Hospital & Healthcare Association, 2009 WL
11
1423378 at *12 (D. Ariz. Mar. 19, 2009) and Act Group, Inc. v. Hamlin, 2012 WL
12
2976724, at *8 (D. Ariz. July 20, 2012).)
13
First, the Court is not persuaded that the Magistrate Judge’s ruling was based on
14
the failure to allege public confusion. In addition, the unfair competition claims in Orca
15
do not appear to involve public confusion. Nevertheless, the Court overrules Plaintiffs’
16
objection. The reference to the Restatements in Orca II was solely in the context of a
17
theory of unfair competition based on misappropriation.
18
previously stated that “the doctrine [of unfair competition] encompasses several tort
19
theories, such as trademark infringement, false advertising, ‘palming off,’ and
20
misappropriation.”
21
Pursuant to Orca II, Plaintiffs will be permitted to amend the claim of unfair competition
22
based on misappropriation of confidential information that is not a trade secret. But this
23
Court does not read the language in Orca II as inviting additional expansion of the
24
doctrine of unfair competition, and Plaintiffs cite no cases outside Arizona that recognize
25
unfair competition as including theories of computer fraud, trespass, or conversion.
26
Moreover, Plaintiffs have separately asserted claims for computer fraud, trespass, and
27
conversion.
The Arizona courts have
Fairway Constructors, Inc., 970 P.2d at 956 (emphasis added).
28
-7-
1
B.
2
The R & R finds that Plaintiffs state a claim against Defendant Will for
3
misappropriation of trade secrets. (Doc. 45 at 11-12.) Defendant Will objects, asserting
4
that the FAC does not contain a plain statement of the claim that Will misappropriated
5
trade secrets. (Doc. 47 at 1.)
Defendant Will’s Objection
6
According to Will, the R & R identifies six paragraphs that address the trade
7
secrets claim against Will, two of which do not rise to the level of misappropriation—¶¶
8
38, 39 alleging access to client lists. (Doc. 47 at 2; ref. Doc. 45 at 11.) The R & R
9
summarizes the remaining four paragraphs against Will as follows:
10
11
12
13
JDM alleges that he . . . hosted an unauthorized webinar using JDM
proprietary materials, (FAC, ¶¶ 47, 48), and postemployment with JDM,
gained unauthorized access to “JDM web domains and, with that access
secured, in November, 2013 . . . illegally downloaded the content of those
sites, including all of JDM’s training and educational videos[]” (FAC ¶¶
121-120).
14
15
(Doc. 45 at 11 (quoting FAC ¶¶ 47-48, 120-121).)
16
Will argues that allegations that he “hosted an unauthorized webinar” (FAC ¶¶ 47,
17
48) cannot support a claim for misappropriation of trade secrets because on their face, the
18
allegations relate to actions Will took “in July of 2013 . . . through AAA” (FAC ¶47),
19
which led to “an agreement to wind down AAA” (FAC ¶48.) The FAC alleges that AAA
20
was at the time an LLC formed by Will and Plaintiff Josh Mellberg (FAC ¶40), “to
21
provide sales and marketing training to agents outside of JDM” and “to market to and
22
recruit agents to work with JDM.” (FAC ¶42.) Will contends that his actions cannot be
23
misappropriation because he owned the entity with Plaintiff.
24
Will asserts that the allegation that he hosted a webinar “using JDM proprietary
25
materials” is conclusory. A “plaintiff seeking relief for misappropriation of trade secrets
26
must describe the subject matter of the trade secret with sufficient particularity to
27
separate it from matters of general knowledge in the trade or of special knowledge of
28
those persons . . . skilled in the trade.” HTS, Inc. v. Boley, 954 F. Supp. 2d 927, 944 (D.
-8-
1
Ariz. 2013) (quoting Imax Corp v. Cinema Tech., Inc., 152 F.3d 1161, 1164-65 (9th Cir.
2
1998)). The FAC does not distinguish the “proprietary materials” from general
3
knowledge in the trade and fail to allege any facts whatsoever to identify what portion of
4
the webinar constituted a trade secret.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Will also argues that Plaintiffs’ FAC allegations fail to plead sufficient facts to
show that the information both
(a) Derives independent economic value, actual or potential, from not being
generally known to, and not being readily ascertainable by proper means
by, other persons who can obtain economic value from its disclosure or use;
and
(b) Is the subject of efforts that are reasonable under the circumstances to
maintain its secrecy.
Ariz. Rev. Stat. § 44-401(4). Both are essential elements for information to rise to the
level of a trade secret.
Will further contends that the allegations of downloaded “web content” are
insufficient because the allegations suggest that the “web content” is not secret; rather, it
is readily available to all of Plaintiffs’ clients. The “hallmark of trade secrets is their
secrecy.” Householder Grp., LLLP v. Van Mason, 2012 WL 4513635 (D. Ariz. Sept. 30,
2012). Plaintiffs admit that the “web content,” including the “training and educational
videos,” were “available on a password-protected basis to agents that register for and pay
for JDM’s services.” (FAC ¶119.) Will argues that information accessible to anyone who
pays for access is not secret. In addition, Plaintiffs have alleged no facts to plausibly
support “trade secret” status for the content they make available on the internet.
Furthermore, the FAC does not allege that Will ever “used” the allegedly illegal
downloads of JDM’s training videos. (See FAC ¶¶ 122-126, alleging that Will was told to
stop using a client list, had launched websites, and was using JDM’s third-party
compliance consultant – not that Will was using the training videos.)
Plaintiffs respond that they allege sufficient facts to state a claim and that Will’s
objections are at odds with the applicable pleading standard. (Doc. 51 at 4.) The FAC’s
detailed identification and description of Plaintiffs’ trade secrets satisfies the notice
-9-
1
pleading standard because it plausibly appears that trade secrets are involved. Plaintiffs
2
are not required to disclose the actual trade secrets in the Complaint. For example, in
3
W.L. Gore & Assocs. v. GI Dynamics, Inc. (Gore I), No. CV-10-8088, 2010 WL
4
5184254, at *8 (D. Ariz. Dec. 15, 2010), the complaint alleged broad categories of
5
confidential information including “market studies, financial information, manufacturing
6
methods, and [counterclaimant’s] future plans.” Id. The court found that these categories
7
were sufficient to state the existence of trade secrets in light of Iqbal. Id.
8
Here, Plaintiffs’ allegations, like the categories of information alleged in Gore I,
9
include misappropriation of their training materials, confidential client and marketing
10
lists, advertising data, call center metrics, proprietary sales processes, metrics, and
11
scripts, sales and marketing programs, advertising copy still in development, and
12
password protected training and educational videos. (FAC ¶¶ 24, 27, 39, 48, 61, 85, 88,
13
96, 105, 115, 117, 119.)3 Plaintiffs assert that the FAC also describes in detail the types
14
of information that are secret (id., ¶ 24(a)-(k)), the effort, cost, and time it took JDM to
15
develop the trade secrets (id., ¶¶ 22-24), and the efforts JDM takes to maintain the
16
secrecy of its trade secrets (id. ¶¶ 28-31).
17
Plaintiffs allege not only that Will misappropriated the ideas or secrets behind
18
Plaintiffs’ trade secrets but also that he systematically and wrongfully misappropriated
19
physical manifestations and embodiments of Plaintiffs’ trade secrets. (See e.g., id. ¶¶ 24-
20
27, 39, 48, 55-58, 61, 64, 69, 75, 85, 88, 96, 105, 114, 115, 117, 119, 121.)
21
Plaintiffs further argue that even if some aspects of the trade secrets are publically
22
available, that would not warrant dismissal of the claim. As the Arizona Court of
23
Appeals observed in the Enterprise Leasing v. Ehmke:
24
25
26
Although matters of general knowledge cannot be appropriated as secret, a
trade secret may consist of a combination of elements even though each
individual component may be a matter of common knowledge.
27
28
3
The Court notes that several of these paragraphs do not allege categories of
materials related to conduct by Will.
- 10 -
1
3 P.3d 1064, 1079 (Ariz. App. 1999). Trade secrets “may consist of a compilation of
2
information that is continuously used or has the potential to be used in one’s business and
3
that gives one an opportunity to obtain an advantage over competitors who do not know
4
of or use it.” Id. at 1068 (citations omitted).
5
customer information, and marketing techniques can be trade secrets.
Thus, training videos, business plans,
6
As to efforts to maintain secrecy, Plaintiffs argue that the owner of the secret
7
information need only show that it made reasonable efforts to maintain its secrecy to
8
ensure that it would be difficult for others to discover it without using improper means.
9
Id. at 1070. The FAC alleges significant, reasonable and sufficient measures to protect
10
the secrecy of the materials and information in issue. (FAC ¶¶ 28-30.)
11
Finally, The FAC alleges misappropriation of more than general knowledge;
12
Defendants are charged with misappropriating and using J.D. Mellberg Financial’s
13
actual, physical proprietary information -- the physical manifestations of Plaintiffs’ trade
14
secrets.
15
The Court overrules Will’s objection. The R & R makes specific findings
16
regarding trade secrets, economic advantage, and protection of trade secrets, including
17
references to website materials. (Doc. 45 at 7-10.) As the Magistrate Judge noted, these
18
issues are common to the motions filed by all Defendants. At this stage of the litigation,
19
the Court need not decide whether the “web content” is, in fact, a trade secret. As the
20
Magistrate Judge found, the allegations of trade secrets are plausible on their face. (Id. at
21
11.)
22
23
24
25
26
27
28
Moreover, in addition to the paragraphs cited by Will, the Magistrate Judge noted
additional allegations in the FAC directed at Will. Specifically, the R & R states:
JDM also alleges that Defendant Will approached Defendant “Impact
Partnership to launch a web-based lead program that mirrors the JDM
program and that clients and agents of Advisors Excel have received
marketing regarding the lead program. JDM’s internal advisors also
received this marketing.” (FAC, ¶122). Further, “Defendant Will launched
several websites very similar to JDM sites….” (FAC, ¶124) and one of his
websites “is purchasing AdWords and keywords identical in name, pattern,
and volume to the purchases conducted by Defendant Fine in his former
role as Marketing Director at JDM.” (FAC, ¶126). The allegations plausibly
suggest that Defendant . . . Will . . . not only had access to trade secret
- 11 -
information, but that [he has] acquired that information and [is] using it as
well.
1
2
3
In other words, although the FAC does not specifically assert that Will used the
4
training and educational videos, it asserts that he illegally downloaded them, and in the
5
next paragraph asserts that Advisors Excel notified Plaintiffs that Will had approached
6
The Impact Partnership to launch a web-based lead program, that mirrors the JDM
7
program and that clients and agents had received the marketing regarding the lead
8
program. (FAC ¶¶121, 122.) The FAC also alleges that Will had launched websites very
9
similar to JDM websites. (Id. ¶124.) This is sufficient factual content to allow the Court
10
to draw the reasonable inference that Will may be liable for misappropriation. Viewed in
11
its entirety, the Court finds the allegations in the FAC sufficient to state a claim against
12
Will for misappropriation of trade secrets.4
13
C.
Defendant Fine’s Objection
14
The R & R finds that Plaintiffs state a claim against Defendant Fine for
15
misappropriation of the physical manifestations of JDM’s trade secrets. (Doc. 45 at 12-
16
13.)
17
misappropriated the physical manifestation of trade secrets—i.e. specifically,
18
spreadsheets compiling internet advertising data—the Confidentiality Agreement
19
constitutes an unenforceable noncompetition agreement. (Doc. 48 at 1-2.)
Defendant Fine argues that even if, as Magistrate Judge Pyle found, Fine
20
In Arizona, an overly broad confidentiality agreement amounts to a
21
noncompetition agreement. See Orca Commc’ns. Unlimited, LLC v. Noder, 314 P.3d 89,
22
95 (Ariz. App. 2013) (Orca I), depublished in part on other grounds, Orca II, 337 P.3d at
23
550 (depublishing ¶¶ 28-31). In turn, a noncompetition agreement must be limited in time
24
and in geography or it is unenforceable. Orca I, 314 P.3d at 95.
25
26
27
28
4
Will is also a Defendant in the First Claim, Computer Fraud and Abuse; the Fifth
Claim, Unjust Enrichment; the Sixth Claim, Breach of Fiduciary Duty; the Seventh
Claim, Breach of Duties Re: Alpha Academy Advisors; the Tenth Claim, Civil
Conspiracy; and Eleventh Claim, Aiding and Abetting.
- 12 -
1
2
3
4
5
6
In the FAC, Plaintiffs allege that Defendant Fine entered into a confidentiality
agreement precluding him from:
disclos[ing] Confidential Information, directly or indirectly, under any
circumstances, or by any means, to any third person without the express
written consent of the Company . . . [or] copy[ing], transmit[ting],
reproduc[ing], summariz[ing], quot[ing], or mak[ing] any commercial or
other use whatsoever of Confidential Information, except as may be
necessary to perform [his] duties for the Company.
7
(Doc. 45 at 26 (quoting FAC ¶¶157, 158 & Ex. 1 §§ 5, 6).)
8
impermissibly broad definition of “Confidential Information” includes:
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
According to Fine, the
(a) proprietary information of the Company, (b) information marked or
designated by the Company as confidential, (c) information, whether or
not in written form and whether or not designated as confidential, that is
known to me as being treated by the Company as confidential; and (d)
information provided to the Company by third parties that the Company is
obligated to keep confidential. Confidential Information includes, but is not
limited to, client lists, financial information related to client accounts,
discoveries, documentation, processes, know-how, marketing plans and
other financial and technical information.
(Doc. 45 at 26 (quoting FAC Ex. 1 § 1) (emphasis added).)
In the Motion to Dismiss, the parties largely disputed the use of the term “knowhow.” The Magistrate Judge adopted the Third Circuit’s definition of “know-how” that is
sufficient to constitute a trade secret; it is not “ability” or “experience,” “but rather the
compiled products of that ability and experience that had been recorded for repetitive
use.” SI Handling Sys. Inc. v. Heisley, 753 F.2d 1244, 1262 (3d Cir. 1985) (such
compilations can be graphs, charts, drawings and other data). “The employee ability and
experience that led to these developments, and presumably will lead to still further
developments, does not belong to” the employer. Id. (“we do not think that, after
employees leave, [the employer] can assert proprietary rights over their problem-solving
ability or knowledge of mistakes to be avoided.”).
Thus, the Magistrate Judge reasoned that “know-how” as used in the Agreement
here means the compilation, i.e., physical manifestation of data or information, such as
spread sheets, not mere knowledge. Furthermore, such a meaning is consistent with the
allegations of trade secret violations that JDM has advanced. The Magistrate Judge also
- 13 -
1
noted there no suggestion that the “discoveries, documentation, processes [and]
2
knowhow” as used in the Agreement are matters of public knowledge. If they were, then
3
they would not fall within the scope of the Agreement because it specifically excludes
4
“information that the Company now or hereafter voluntarily disseminates to the public or
5
that otherwise becomes part of the public domain through lawful means.” (Doc. 45 at 27-
6
28; FAC, Ex. 1, Sec. 8.)
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
In his objection, Fine reasserts that the Agreement is overly broad, and he cites to
Orca I.
In Orca I, the employee Noder signed a confidentiality covenant that
prohibited Noder from ‘directly or indirectly circumvent[ing] or
compet[ing] with The Company with regard to any Confidential
Information.’ The Agreement defined confidential information in section
2.2 as ‘knowledge or information not generally known to the public or in
the public relations industry’ that Noder learned from her employment with
Orca that related to Orca, its business partners, or the business of its
customers or potential customers. This included ‘any information [Noder]
learn[ed] of, possess[ed] as a result of, or access[ed] through’ Noder’s
employment. The definition excluded ‘publicly known’ information,
information ‘readily accessible to the public in a written publication,’ but
included information that was only available through ‘substantial searching
of published literature’ or that had to be ‘pieced together’ from a number of
publications or sources. In the event of a dispute, the covenant placed on
Noder the burden of proving that information was not confidential.
Orca I, 314 P.3d at 92. The Court of Appeals reasoned that the
the Agreement’s definition of ‘confidential information’ extends far beyond
the ‘truly confidential.’ The definition properly excludes ‘publicly known’
information, and further defines ‘publicly known’ as ‘readily accessible to
the public in a written publication,’ but then includes within its ambit
information that is available through ‘substantial searching of published
literature’ or that has to be ‘pieced together’ from a number of publications
or sources. The definition also includes as confidential, ‘any information’
Noder ‘learn[ed] of, possess [ed] as a result of, or access[ed] through
employment’ with Orca.
Id. at 94-95.
Thus the court held that the definition of confidential information was overbroad
because (1) it deemed public information confidential if the public had to do substantial
searching or to combine information, and (2) it deemed confidential any information that
the employee might have come across during her employment with Orca, regardless of
- 14 -
1
whether the information was truly confidential. As to the first ground, the court stated
2
that information available to the public remains public knowledge even if a member of
3
the public has to expend substantial time to gather or comprehend it. As to the second
4
ground, the court said that Orca cannot by fiat deem confidential all information Noder
5
obtained through her employment with Orca. Id. at 95.
6
As noted, according to the Agreement here, “Confidential information”
7
encompasses “discoveries, documentation, processes, [and] know-how, marketing plans,
8
and other financial and technical information.” (Id.) In his objections, Fine argues that as
9
the Confidentiality Agreement extends beyond the “truly confidential,” and includes all
10
information “designated” or “treated” by the company as confidential. (Doc. 48 at 3.) He
11
contends that it is overbroad because it purports to prevent him from using most, if not
12
all, of the information he learned from his employment, including any information the
13
company unilaterally designates as confidential and any information related to his or the
14
company’s “documentation, processes, [or] knowhow” (among other things). This
15
imposes an unlimited restriction against competing with JDM. (Doc. 48 at 3-4.) Even
16
assuming the spreadsheets are confidential, the Confidentiality Agreement is,
17
nevertheless, overly broad because, on its face, it includes much more than spreadsheets.
18
Plaintiffs respond that this Agreement is not like the one in Orca. This Agreement
19
nowhere expressly defines as “Confidential” information that is available to the public; in
20
fact, it expressly excludes such information. And the Agreement at issue here does not
21
define as confidential “any information” acquired by Defendant Fine during his
22
employment with JDM. As the Magistrate Judge held, “know-how” is a term of art
23
typically used in confidentiality provisions to designate a subset of trade secrets or
24
confidential information that is quite distinct from the general knowledge an employee
25
may acquire during employment. See e.g., SI Handling Sys., Inc., 753 F.2d at 1262
26
(noting that while an employee’s “know-how” with regard to specific methods and
27
techniques may be protected under trade secret law, an employee may still be entitled to
28
- 15 -
1
use his “experience, knowledge, memory, and skill, which he gained” from his previous
2
employment) (quotations omitted).
3
The Court finds that the Confidentiality Agreement here is not like the Agreement
4
in Orca I. The Agreement in Orca I was overly broad on its face largely because
5
although it purported to exclude publically known information from what was deemed
6
confidential, it also, in fact, included information available to the public. The Agreement
7
here may include items or information that are not truly confidential but does not do so
8
necessarily.
9
“information that the Company now or hereafter voluntarily disseminates to the public or
10
that otherwise becomes part of the public domain through lawful means.” (FAC, Ex. 1,
11
Sec. 8.) In other words, it does not contain an impermissible limitation on what
12
constitutes public information. And, unlike Orca I, it does not define as confidential
13
“any information” acquired by an employee while working for Plaintiffs.
14
IV.
As the Magistrate Judge noted, the Agreement specifically excludes
Conclusion
15
The Court will overrule the objections to the R & R. In addition, the Court has
16
reviewed and considered the Motions to Dismiss, the responses, the replies, the exhibits,
17
and the R & R and, after an independent review, of the unobjected to portions of the R &
18
R finds no clear error.
19
Accordingly,
20
IT IS ORDERED:
21
(1)
The Report and Recommendation (Doc. 45) is ADOPTED;
22
(2)
The pending motions (Docs. 22, 27, 30, and 34) are granted and denied as
23
24
follows:
(a)
Defendants Will and Fine’s Partial Motion to Dismiss (Doc. 22) is granted
25
to the extent that Plaintiffs’ claims of unfair competition (Third Claim) and unjust
26
enrichment (Fifth Claim) are dismissed. The motion is denied to the extent that they seek
27
dismissal of claims under AUTSA (Second Claim); claims for breach of contract (Fourth
28
- 16 -
1
Claim); claims for breach of fiduciary duty/duty of loyalty (Sixth Claim); claims for civil
2
conspiracy (Tenth Claim); and claims for aiding and abetting (Eleventh Claim);
3
(b)
Defendant Impact Partnership’s Motion to Dismiss (Doc. 27) is granted;
4
(c)
Defendant Godinez’ Partial Motion to Dismiss (Doc. 30) is granted; and
5
(d)
Defendant Carly Uretz’ Motion to Dismiss (Doc. 34) is granted.
6
(3)
Dismissed claims are dismissed with leave to amend, with the exception of
7
certain claims for unfair competition (Third Claim).
8
regarding misappropriation of confidential information that do not rise to the level of a
9
trade secret are dismissed with leave to amend; other claims for unfair competition are
10
11
12
dismissed with prejudice.
(4)
Plaintiffs may file a second amended complaint within 30 days of the date
of this Order as set forth herein and in the Report and Recommendation.
13
14
Claims for unfair competition
Dated this 27th day of March, 2015.
15
16
17
18
19
20
21
22
23
24
25
26
27
28
- 17 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?