Quad Knopf, Inc. v. South Valley Biology Consulting, LLC et al
Filing
21
ORDER GRANTING 12 Defendants' Motion to Dismiss signed by District Judge Anthony W. Ishii on 4/3/2014. CASE CLOSED. (Jessen, A)
1
2
3
UNITED STATES DISTRICT COURT
4
EASTERN DISTRICT OF CALIFORNIA
5
6
QUAD KNOPF, INC.,
7
Plaintiff,
8
9
10
11
12
13
CASE NO. 1:13-CV-01262 AWI SKO
ORDER GRANTING DEFENDANTS’
MOTION TO DISMISS
v.
SOUTH VALLEY BIOLOGY
CONSULTING, LLC, a California limited
liability company; JAMES W. JONES, JR.,
an individual; JASON H. KANG, an
individual; NINA E. HOSTMARK, an
individual; MICHAEL V. PHILLIPS, an
individual; and PAUL ROSEBUSH, an
individual,
(Doc. 12)
Defendants.
14
15
Plaintiff Quad Knopf, Inc. (―Plaintiff‖) brings this action against South Valley Biology
16
17
Consulting LLC (―SVBC‖), James W. Jones, Jr. (―Jones‖), Jason H. Kang (―Kang‖), Nina E.
18
Hostmark (―Hostmark‖), Michael V. Phillips (―Phillips‖), and Paul Rosebush (―Rosebush‖)
19
(collectively ―Defendants‖) for violations of the Computer Fraud and Abuse Act when Hostmark,
20
Phillips, and Rosebush allegedly transmitted information from Plaintiff’s computers while
21
employed by Plaintiff without Plaintiff’s consent, and that information was then used by
22
Defendants to compete with Plaintiff and caused Plaintiff to suffer loss. Plaintiff’s Complaint also
23
alleges nine causes of action arising under California law related to Defendants’ use of Plaintiff's
24
work product and clients. Defendants moves to dismiss eight causes of action. For the following
25
reasons, Defendants’ motion is granted:
26
27
28
I.
BACKGROUND
Plaintiff, a consulting firm with offices in central California, provides professional services
in the areas of civil engineering, land planning, land surveying, landscape architecture,
1
environmental planning, permitting, and biology consulting services. Doc. 1, ¶¶ 2, 9. Plaintiff’s
2
biologists conduct biological field studies and provide detailed reports to its clients. Doc. 1, ¶ 11-
3
12. Among about eighty-five individuals, Plaintiff employed Defendants Jones, Kang, Hostmark,
4
Phillips, and Rosebush. Doc. 1, ¶¶ 11, 14, 15, 6-8. In 2010, Jones and Kang formed SVBC, a
5
competing firm providing the same services as Plaintiff in the area of biological studies and
6
reporting. Doc. 1, ¶ 14. Jones and Kang recruited Hostmark, Phillips, and Rosebush, staff
7
biologists, who left Plaintiff’s employ and joined SVBC. Doc. 1, ¶ 15. Plaintiff soon discovered
8
that biological studies and reports were missing or copied from Plaintiff’s computer, and that
9
identical portions of Plaintiff’s studies and reports were incorporated into SVBC’s reports. Doc. 1,
10
¶¶ 16, 18. Plaintiff later found that SVBC’s website and promotional materials contained
11
Plaintiff’s work product. Doc. 1, ¶ 19.
Plaintiff alleges that Hostmark, Phillips, and Rosebush intentionally removed Plaintiff’s
12
13
work product for two years while still employed by Plaintiff without Plaintiff’s knowledge or
14
consent and transmitted that product to SVBC, Jones, and Kang by e-mail or in person. Doc. 1, ¶¶
15
22-24. Plaintiff also alleges that Defendants intentionally solicited Plaintiff’s clients on behalf of
16
SVBC, and, in fact, several of Plaintiff’s clients terminated contracts with Plaintiff to give them to
17
SVBC. Doc. 1, ¶¶ 23, 17. Plaintiff has suffered damages in investigating the adequacy of its
18
computer security systems, replacing the work product, and lost income. See e.g. Doc. 1, ¶¶ 25,
19
31.
20
Plaintiff’s Complaint brings ten causes of action and seeks compensatory damages,
21
injunctive relief, restitution, punitive damages, costs, and attorney’s fees. Doc. 1. Plaintiff alleges
22
that this Court has subject matter jurisdiction over this action because Plaintiff’s first cause of
23
action is for violations of the Computer Fraud and Abuse Act (―CFAA‖), codified at 18 U.S.C.
24
Section 1030. Doc. 1 ¶ 1. Defendants move to dismiss the Complaint as to the first eight causes of
25
action, and, if the first cause of action is dismissed, for lack of subject matter jurisdiction. Doc. 12.
26
Plaintiff filed an opposition (Doc. 13), Defendant filed a reply (Doc 14), and the matter was taken
27
under submission without oral argument (Doc. 15).
28
2
1
II.
2
THE LEGAL STANDARD
Under Federal Rule of Civil Procedure 12(b)(6), a claim may be dismissed because of the
3
plaintiff's ―failure to state a claim upon which relief can be granted.‖ Fed. R. Civ. P. 12(b)(6). A
4
dismissal under Rule 12(b)(6) may be based on the lack of a cognizable legal theory or on the
5
absence of sufficient facts alleged under a cognizable legal theory. Conservation Force v. Salazar,
6
646 F.3d 1240, 1242 (9th Cir. 2011); Johnson v. Riverside Healthcare Sys., 534 F.3d 1116, 1121
7
(9th Cir. 2008). In reviewing a complaint under Rule 12(b)(6), all allegations of material fact are
8
taken as true and construed in the light most favorable to the non-moving party. Faulkner v. ADT
9
Sec. Servs., 706 F.3d 1017, 1019 (9th Cir. 2013); Johnson, 534 F.3d at 1121.
10
To avoid a Rule 12(b)(6) dismissal, a complaint must contain sufficient factual matter,
11
accepted as true, to state a claim to relief that is plausible on its face. Ashcroft v. Iqbal, 556 U.S.
12
662, 129 S. Ct. 1937, 1949, 173 L. Ed. 2d 868 (2009); see Bell Atl. Corp. v. Twombly, 550 U.S.
13
544, 555, 570, 127 S. Ct. 1955, 167 L. Ed. 2d 929 (2007). ―A claim has facial plausibility when
14
the plaintiff pleads factual content that allows the court draw the reasonable inference that the
15
defendant is liable for the misconduct alleged.‖ Iqbal, 129 S.Ct. at 1949.
―[A] district court should grant leave to amend even if no request to amend the pleading
16
17
was made, unless it determines that the pleading could not possibly be cured by the allegation of
18
other facts.‖ Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir. 2000) (en banc), quoting Doe v. United
19
States, 58 F.3d 494, 497 (9th Cir. 1995). Leave to amend should be granted ―with extreme
20
liberality,‖ so long as factors such as undue delay, bad faith or dilatory motive on the part of the
21
movant, repeated failure to cure deficiencies by amendments previously allowed, undue prejudice
22
to the opposing party by virtue of the amendment, or futility of amendment are not present.
23
Eminence Capital, LLC v. Aspeon, Inc., 316 F.3d 1048, 1051-52 (9th Cir. 2003).
24
III.
THE COMPUTER FRAUD AND ABUSE ACT
25
The CFAA was enacted to enhance the government’s ability to prosecute computer crimes.
26
LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130 (9th Cir. 2009). The CFAA prohibits various
27
computer crimes, which involve accessing computers without authorization or in excess of
28
authorization, and then taking specified forbidden actions, such as from obtaining information and
3
1
2
damaging a computer or computer data. See 18 U.S.C. § 1030(a)(1)-(7).
A private plaintiff may maintain a civil action under Section 1030(g) if the defendant’s
3
conduct violated one of the provisions of § 1030(a)(1)-(7), and that the violation involved one of
4
the factors listed in § 1030(a)(5)(B). 18 U.S.C. § 1030(g); Brekka, 581 F.3d at 1131. To bring an
5
action based on a violation of 18 U.S.C. § 1030(a)(2), a plaintiff must show that the defendant ―(1)
6
intentionally accessed a computer, (2) without authorization or exceeding authorized access, and
7
that he (3) thereby obtained information (4) from any protected computer (if the conduct involved
8
an interstate or foreign communication), and that (5) there was loss to one or more persons during
9
any one-year period aggregating at least $5,000 in value.‖ Id. at 1132. Sections 1030(a)(4) and
10
1030(a)(5) similarly require intentional access of a protected computer without authorization. 18
11
U.S.C. §§ 1030(a)(4), 1030(a)(5). The CFAA defines ―exceeds authorized access‖ as ―to access a
12
computer with authorization and to use such access to obtain or alter information in the computer
13
that the accesser is not entitled so to obtain or alter.‖ 18 U.S.C. § 1030(e)(6).
14
The Ninth Circuit has found that the plain language of the CFAA ―targets the unauthorized
15
procurement or alteration of information, not its misuse or misappropriation.‖ United States v.
16
Nosal, 676 F.3d 854, 860 (9th Cir. 2012). Hence, the requirement that the access was without
17
authorization or exceeded authorized access ―does not extend to violations of use restrictions.‖ Id.
18
at 864. The broader interpretation ―would transform the CFAA from an anti-hacking statute into
19
an expansive misappropriation statute.‖ Id. at 863. The ―narrower interpretation is also a more
20
sensible reading of the text and legislative history of a statute whose general purpose is to punish
21
hacking—the circumvention of technological access barriers—not misappropriation of trade
22
secrets—a subject Congress has dealt with elsewhere.‖ Id. In Nosal, the government failed to meet
23
the element of ―without authorization, or exceeds authorized access‖ under 18 U.S.C. § 1030(a)(4)
24
because the defendant’s accomplices had permission to access the company database and obtain
25
the information contained within. Id. at 864. The defendant was a former employee who
26
convinced some of his former coworkers to use their log-in credentials to download source lists,
27
names and contact information from a confidential database on the company’s computer, and then
28
transfer that information to him, in support of his establishing a competing business. Id at. 856.
4
1
The employees were authorized to access the database, but the company had a policy that forbade
2
disclosing confidential information. Id.
3
Similar facts arose in Farmers Ins. Exch. v. Steele Ins. Agency, Inc., in which the
4
defendants were former employees of an insurance agency who left and began a competing
5
agency. Farmers Ins. Exch. v. Steele Ins. Agency, Inc., 2013 U.S. Dist. LEXIS 104606, *5-6 (E.D.
6
Cal. July 23, 2013). One defendant was still employed when he began accessing the insurance
7
agency’s information, including the customer list, for the benefit of the competing agency. Id. The
8
court found that the employee had permission to access the employer’s confidential proprietary
9
information and did not exceed authorized access, ―even though he may have used the information
10
for an improper purpose.‖ The motion to dismiss the cause of action for violation of the CFAA as
11
to that defendant was dismissed. Id. at 53.
12
13
IV.
DISCUSSION
The facts of Nosal and Farmers Insurance are substantially similar to those alleged in
14
Plaintiff’s Complaint. In these cases former employees began a competing business and convinced
15
current employees to access the employer’s computer database to transmit confidential
16
information to the competing business to the detriment of the employer. Plaintiff’s Complaint
17
alleges that Jones and Kang were former employees of Plaintiff who began a competing firm.
18
They then recruited Hostmark, Phillips, and Rosebush, all still employed by Plaintiff, to transmit
19
confidential data and documents to SVBC and/or Jones and Kang, and then leave Plaintiff’s
20
employ for SVBC’s. The Complaint alleges that Hostmark, Phillips, and Rosebush were staff
21
biologists who produced the studies and reports that Plaintiff alleges were illegally taken and used
22
by Defendants. Doc. 1, ¶¶ 15, 11, 18-19. It says that the removal of Plaintiff’s confidential work
23
product and intellectual property from Plaintiff’s computers was done ―prior to their leaving
24
Plaintiff’s employ.‖ Doc. 1, ¶ 21. Plaintiff also alleges that the solicitation of clients was done
25
―while still employed by Plaintiff.‖ Doc. 1, ¶ 23.
26
Plaintiff argues that Defendants’ authorization ended when Defendants began acting as
27
agents for the other Defendants, and, according to principles of agency, their agency relationship
28
with Plaintiff ended. Doc. 13, p. 5, line 24 – p. 7, line 12. However, the Nosal definition of
5
1
―without authorization‖ as it applies to a violation of the CFAA is the controlling interpretation in
2
this case. Plaintiff relies upon other circuit courts which have interpreted the CFAA to cover
3
violations of corporate computer use restrictions or violations of a duty of loyalty, including
4
International Airport Ctrs., LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006). But this interpretation
5
was explicitly rejected in this Circuit for failing to construe ambiguous criminal statutes narrowly.
6
Nosal at 862; Brekka, supra, 581, F.3d at 1134. Plaintiff’s argument that agency law should apply
7
to determine whether authorization existed is unpersuasive when specific caselaw in this Circuit
8
exists limiting the ―without authorization‖ element in a CFAA claim.
9
Plaintiff cannot sustain a cause of action for violation of the CFAA because it does not
10
properly allege that Defendants acted without authorization or exceeded their authorization.
11
Plaintiff’s opposition states that will seek recovery under 18 U.S.C. §§ 1030(a)(2)(c), 1030(a)(4),
12
1030(a)(5)(A), all of which require that the access was without authorization. Taking the facts in
13
the light most favorable to Plaintiff still indicates that Hostmark, Phillips, and Rosebush did not
14
exceed their authorization to access Plaintiff’s computers and databases. The Complaint does not
15
allege that Hostmark, Phillips, and Rosebush did not rightfully have access to the computers or
16
databases containing the work product that was transmitted and used without consent. Being staff
17
biologists who generate that type of work product, and being employed at the time of the alleged
18
transmittal, Hostmark, Phillips, and Rosebush clearly had permission to access to the work
19
product or other electronically stored information. They were not permitted by Plaintiff to
20
disseminate the information. In the same way, the defendants in Nosal and Farmers Insurance
21
were current employees when they used their employer-given authorization to access the
22
information on the employer’s computers with the intent to transmit the information to the
23
competitor.
24
Plaintiff appears to be alleging violations of use restrictions or misappropriation of trade
25
secrets, but not a cause of action under the CFAA –a statute designed to target hacking crimes.
26
Defendants were employed with Plaintiff and did not exceed their access. Defendants then took
27
the information that they were entitled as an employee to access, and used it in an inappropriate
28
manner contrary to Plaintiff’s interest. As stated in Nosal, the ―without authorization‖ requirement
6
1
does extend to violation of use restrictions. Nosal, supra, 676 F.3d at 864.
Because Plaintiff cannot meet the necessary element of ―without authorization or
2
3
exceeding authorized access,‖ the Complaint does not state a cause of action under the CFAA
4
upon which relief can be granted. The facts as alleged indicate that Defendants, as Plaintiff’s staff
5
biologists, had permission to access to the information at issue. Plaintiff could not possibly cure
6
the deficiency of the CFAA action by the allegation of other facts consistent with those alleged in
7
the present complaint. Amendment being futile, leave to amend the CFAA cause of action is
8
denied and the claim is dismissed with prejudice.
9
V.
JURISDICTION
The CFAA claim is Plaintiff’s only federal claim. Plaintiff specifically disclaims a federal
10
11
Copyright Act claim. Doc. 14, p. 9, lines 17-18. A district court may decline to exercise
12
jurisdiction over supplemental state law claims if ―the district court has dismissed all claims over
13
which it has original jurisdiction.‖ 28 U.S.C. § 1367(c)(3). When federal claims are dismissed
14
before trial pendent state claims also should be dismissed. Religious Technology Center v.
15
Wollersheim, 971 F.2d 364, 367-368 (9th Cir. 1992). Considering judicial economy, convenience,
16
fairness, and comity, and because the only federal claim in this case is dismissed with prejudice,
17
the Court declines to exercise supplemental jurisdiction over Plaintiff’s remaining state law
18
claims.
19
VI.
ORDER
20
Defendants’ Motion to Dismiss is hereby GRANTED.
21
The CFAA claim is DISMISSED WITH PREJUDICE.
22
All other claims are DISMISSED for lack of jurisdiction.
23
24
IT IS SO ORDERED.
25
Dated: April 3, 2014
26
SENIOR DISTRICT JUDGE
27
28
7
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?