Quad Knopf, Inc. v. South Valley Biology Consulting, LLC et al

Filing 21

ORDER GRANTING 12 Defendants' Motion to Dismiss signed by District Judge Anthony W. Ishii on 4/3/2014. CASE CLOSED. (Jessen, A)

Download PDF
1 2 3 UNITED STATES DISTRICT COURT 4 EASTERN DISTRICT OF CALIFORNIA 5 6 QUAD KNOPF, INC., 7 Plaintiff, 8 9 10 11 12 13 CASE NO. 1:13-CV-01262 AWI SKO ORDER GRANTING DEFENDANTS’ MOTION TO DISMISS v. SOUTH VALLEY BIOLOGY CONSULTING, LLC, a California limited liability company; JAMES W. JONES, JR., an individual; JASON H. KANG, an individual; NINA E. HOSTMARK, an individual; MICHAEL V. PHILLIPS, an individual; and PAUL ROSEBUSH, an individual, (Doc. 12) Defendants. 14 15 Plaintiff Quad Knopf, Inc. (―Plaintiff‖) brings this action against South Valley Biology 16 17 Consulting LLC (―SVBC‖), James W. Jones, Jr. (―Jones‖), Jason H. Kang (―Kang‖), Nina E. 18 Hostmark (―Hostmark‖), Michael V. Phillips (―Phillips‖), and Paul Rosebush (―Rosebush‖) 19 (collectively ―Defendants‖) for violations of the Computer Fraud and Abuse Act when Hostmark, 20 Phillips, and Rosebush allegedly transmitted information from Plaintiff’s computers while 21 employed by Plaintiff without Plaintiff’s consent, and that information was then used by 22 Defendants to compete with Plaintiff and caused Plaintiff to suffer loss. Plaintiff’s Complaint also 23 alleges nine causes of action arising under California law related to Defendants’ use of Plaintiff's 24 work product and clients. Defendants moves to dismiss eight causes of action. For the following 25 reasons, Defendants’ motion is granted: 26 27 28 I. BACKGROUND Plaintiff, a consulting firm with offices in central California, provides professional services in the areas of civil engineering, land planning, land surveying, landscape architecture, 1 environmental planning, permitting, and biology consulting services. Doc. 1, ¶¶ 2, 9. Plaintiff’s 2 biologists conduct biological field studies and provide detailed reports to its clients. Doc. 1, ¶ 11- 3 12. Among about eighty-five individuals, Plaintiff employed Defendants Jones, Kang, Hostmark, 4 Phillips, and Rosebush. Doc. 1, ¶¶ 11, 14, 15, 6-8. In 2010, Jones and Kang formed SVBC, a 5 competing firm providing the same services as Plaintiff in the area of biological studies and 6 reporting. Doc. 1, ¶ 14. Jones and Kang recruited Hostmark, Phillips, and Rosebush, staff 7 biologists, who left Plaintiff’s employ and joined SVBC. Doc. 1, ¶ 15. Plaintiff soon discovered 8 that biological studies and reports were missing or copied from Plaintiff’s computer, and that 9 identical portions of Plaintiff’s studies and reports were incorporated into SVBC’s reports. Doc. 1, 10 ¶¶ 16, 18. Plaintiff later found that SVBC’s website and promotional materials contained 11 Plaintiff’s work product. Doc. 1, ¶ 19. Plaintiff alleges that Hostmark, Phillips, and Rosebush intentionally removed Plaintiff’s 12 13 work product for two years while still employed by Plaintiff without Plaintiff’s knowledge or 14 consent and transmitted that product to SVBC, Jones, and Kang by e-mail or in person. Doc. 1, ¶¶ 15 22-24. Plaintiff also alleges that Defendants intentionally solicited Plaintiff’s clients on behalf of 16 SVBC, and, in fact, several of Plaintiff’s clients terminated contracts with Plaintiff to give them to 17 SVBC. Doc. 1, ¶¶ 23, 17. Plaintiff has suffered damages in investigating the adequacy of its 18 computer security systems, replacing the work product, and lost income. See e.g. Doc. 1, ¶¶ 25, 19 31. 20 Plaintiff’s Complaint brings ten causes of action and seeks compensatory damages, 21 injunctive relief, restitution, punitive damages, costs, and attorney’s fees. Doc. 1. Plaintiff alleges 22 that this Court has subject matter jurisdiction over this action because Plaintiff’s first cause of 23 action is for violations of the Computer Fraud and Abuse Act (―CFAA‖), codified at 18 U.S.C. 24 Section 1030. Doc. 1 ¶ 1. Defendants move to dismiss the Complaint as to the first eight causes of 25 action, and, if the first cause of action is dismissed, for lack of subject matter jurisdiction. Doc. 12. 26 Plaintiff filed an opposition (Doc. 13), Defendant filed a reply (Doc 14), and the matter was taken 27 under submission without oral argument (Doc. 15). 28 2 1 II. 2 THE LEGAL STANDARD Under Federal Rule of Civil Procedure 12(b)(6), a claim may be dismissed because of the 3 plaintiff's ―failure to state a claim upon which relief can be granted.‖ Fed. R. Civ. P. 12(b)(6). A 4 dismissal under Rule 12(b)(6) may be based on the lack of a cognizable legal theory or on the 5 absence of sufficient facts alleged under a cognizable legal theory. Conservation Force v. Salazar, 6 646 F.3d 1240, 1242 (9th Cir. 2011); Johnson v. Riverside Healthcare Sys., 534 F.3d 1116, 1121 7 (9th Cir. 2008). In reviewing a complaint under Rule 12(b)(6), all allegations of material fact are 8 taken as true and construed in the light most favorable to the non-moving party. Faulkner v. ADT 9 Sec. Servs., 706 F.3d 1017, 1019 (9th Cir. 2013); Johnson, 534 F.3d at 1121. 10 To avoid a Rule 12(b)(6) dismissal, a complaint must contain sufficient factual matter, 11 accepted as true, to state a claim to relief that is plausible on its face. Ashcroft v. Iqbal, 556 U.S. 12 662, 129 S. Ct. 1937, 1949, 173 L. Ed. 2d 868 (2009); see Bell Atl. Corp. v. Twombly, 550 U.S. 13 544, 555, 570, 127 S. Ct. 1955, 167 L. Ed. 2d 929 (2007). ―A claim has facial plausibility when 14 the plaintiff pleads factual content that allows the court draw the reasonable inference that the 15 defendant is liable for the misconduct alleged.‖ Iqbal, 129 S.Ct. at 1949. ―[A] district court should grant leave to amend even if no request to amend the pleading 16 17 was made, unless it determines that the pleading could not possibly be cured by the allegation of 18 other facts.‖ Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir. 2000) (en banc), quoting Doe v. United 19 States, 58 F.3d 494, 497 (9th Cir. 1995). Leave to amend should be granted ―with extreme 20 liberality,‖ so long as factors such as undue delay, bad faith or dilatory motive on the part of the 21 movant, repeated failure to cure deficiencies by amendments previously allowed, undue prejudice 22 to the opposing party by virtue of the amendment, or futility of amendment are not present. 23 Eminence Capital, LLC v. Aspeon, Inc., 316 F.3d 1048, 1051-52 (9th Cir. 2003). 24 III. THE COMPUTER FRAUD AND ABUSE ACT 25 The CFAA was enacted to enhance the government’s ability to prosecute computer crimes. 26 LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130 (9th Cir. 2009). The CFAA prohibits various 27 computer crimes, which involve accessing computers without authorization or in excess of 28 authorization, and then taking specified forbidden actions, such as from obtaining information and 3 1 2 damaging a computer or computer data. See 18 U.S.C. § 1030(a)(1)-(7). A private plaintiff may maintain a civil action under Section 1030(g) if the defendant’s 3 conduct violated one of the provisions of § 1030(a)(1)-(7), and that the violation involved one of 4 the factors listed in § 1030(a)(5)(B). 18 U.S.C. § 1030(g); Brekka, 581 F.3d at 1131. To bring an 5 action based on a violation of 18 U.S.C. § 1030(a)(2), a plaintiff must show that the defendant ―(1) 6 intentionally accessed a computer, (2) without authorization or exceeding authorized access, and 7 that he (3) thereby obtained information (4) from any protected computer (if the conduct involved 8 an interstate or foreign communication), and that (5) there was loss to one or more persons during 9 any one-year period aggregating at least $5,000 in value.‖ Id. at 1132. Sections 1030(a)(4) and 10 1030(a)(5) similarly require intentional access of a protected computer without authorization. 18 11 U.S.C. §§ 1030(a)(4), 1030(a)(5). The CFAA defines ―exceeds authorized access‖ as ―to access a 12 computer with authorization and to use such access to obtain or alter information in the computer 13 that the accesser is not entitled so to obtain or alter.‖ 18 U.S.C. § 1030(e)(6). 14 The Ninth Circuit has found that the plain language of the CFAA ―targets the unauthorized 15 procurement or alteration of information, not its misuse or misappropriation.‖ United States v. 16 Nosal, 676 F.3d 854, 860 (9th Cir. 2012). Hence, the requirement that the access was without 17 authorization or exceeded authorized access ―does not extend to violations of use restrictions.‖ Id. 18 at 864. The broader interpretation ―would transform the CFAA from an anti-hacking statute into 19 an expansive misappropriation statute.‖ Id. at 863. The ―narrower interpretation is also a more 20 sensible reading of the text and legislative history of a statute whose general purpose is to punish 21 hacking—the circumvention of technological access barriers—not misappropriation of trade 22 secrets—a subject Congress has dealt with elsewhere.‖ Id. In Nosal, the government failed to meet 23 the element of ―without authorization, or exceeds authorized access‖ under 18 U.S.C. § 1030(a)(4) 24 because the defendant’s accomplices had permission to access the company database and obtain 25 the information contained within. Id. at 864. The defendant was a former employee who 26 convinced some of his former coworkers to use their log-in credentials to download source lists, 27 names and contact information from a confidential database on the company’s computer, and then 28 transfer that information to him, in support of his establishing a competing business. Id at. 856. 4 1 The employees were authorized to access the database, but the company had a policy that forbade 2 disclosing confidential information. Id. 3 Similar facts arose in Farmers Ins. Exch. v. Steele Ins. Agency, Inc., in which the 4 defendants were former employees of an insurance agency who left and began a competing 5 agency. Farmers Ins. Exch. v. Steele Ins. Agency, Inc., 2013 U.S. Dist. LEXIS 104606, *5-6 (E.D. 6 Cal. July 23, 2013). One defendant was still employed when he began accessing the insurance 7 agency’s information, including the customer list, for the benefit of the competing agency. Id. The 8 court found that the employee had permission to access the employer’s confidential proprietary 9 information and did not exceed authorized access, ―even though he may have used the information 10 for an improper purpose.‖ The motion to dismiss the cause of action for violation of the CFAA as 11 to that defendant was dismissed. Id. at 53. 12 13 IV. DISCUSSION The facts of Nosal and Farmers Insurance are substantially similar to those alleged in 14 Plaintiff’s Complaint. In these cases former employees began a competing business and convinced 15 current employees to access the employer’s computer database to transmit confidential 16 information to the competing business to the detriment of the employer. Plaintiff’s Complaint 17 alleges that Jones and Kang were former employees of Plaintiff who began a competing firm. 18 They then recruited Hostmark, Phillips, and Rosebush, all still employed by Plaintiff, to transmit 19 confidential data and documents to SVBC and/or Jones and Kang, and then leave Plaintiff’s 20 employ for SVBC’s. The Complaint alleges that Hostmark, Phillips, and Rosebush were staff 21 biologists who produced the studies and reports that Plaintiff alleges were illegally taken and used 22 by Defendants. Doc. 1, ¶¶ 15, 11, 18-19. It says that the removal of Plaintiff’s confidential work 23 product and intellectual property from Plaintiff’s computers was done ―prior to their leaving 24 Plaintiff’s employ.‖ Doc. 1, ¶ 21. Plaintiff also alleges that the solicitation of clients was done 25 ―while still employed by Plaintiff.‖ Doc. 1, ¶ 23. 26 Plaintiff argues that Defendants’ authorization ended when Defendants began acting as 27 agents for the other Defendants, and, according to principles of agency, their agency relationship 28 with Plaintiff ended. Doc. 13, p. 5, line 24 – p. 7, line 12. However, the Nosal definition of 5 1 ―without authorization‖ as it applies to a violation of the CFAA is the controlling interpretation in 2 this case. Plaintiff relies upon other circuit courts which have interpreted the CFAA to cover 3 violations of corporate computer use restrictions or violations of a duty of loyalty, including 4 International Airport Ctrs., LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006). But this interpretation 5 was explicitly rejected in this Circuit for failing to construe ambiguous criminal statutes narrowly. 6 Nosal at 862; Brekka, supra, 581, F.3d at 1134. Plaintiff’s argument that agency law should apply 7 to determine whether authorization existed is unpersuasive when specific caselaw in this Circuit 8 exists limiting the ―without authorization‖ element in a CFAA claim. 9 Plaintiff cannot sustain a cause of action for violation of the CFAA because it does not 10 properly allege that Defendants acted without authorization or exceeded their authorization. 11 Plaintiff’s opposition states that will seek recovery under 18 U.S.C. §§ 1030(a)(2)(c), 1030(a)(4), 12 1030(a)(5)(A), all of which require that the access was without authorization. Taking the facts in 13 the light most favorable to Plaintiff still indicates that Hostmark, Phillips, and Rosebush did not 14 exceed their authorization to access Plaintiff’s computers and databases. The Complaint does not 15 allege that Hostmark, Phillips, and Rosebush did not rightfully have access to the computers or 16 databases containing the work product that was transmitted and used without consent. Being staff 17 biologists who generate that type of work product, and being employed at the time of the alleged 18 transmittal, Hostmark, Phillips, and Rosebush clearly had permission to access to the work 19 product or other electronically stored information. They were not permitted by Plaintiff to 20 disseminate the information. In the same way, the defendants in Nosal and Farmers Insurance 21 were current employees when they used their employer-given authorization to access the 22 information on the employer’s computers with the intent to transmit the information to the 23 competitor. 24 Plaintiff appears to be alleging violations of use restrictions or misappropriation of trade 25 secrets, but not a cause of action under the CFAA –a statute designed to target hacking crimes. 26 Defendants were employed with Plaintiff and did not exceed their access. Defendants then took 27 the information that they were entitled as an employee to access, and used it in an inappropriate 28 manner contrary to Plaintiff’s interest. As stated in Nosal, the ―without authorization‖ requirement 6 1 does extend to violation of use restrictions. Nosal, supra, 676 F.3d at 864. Because Plaintiff cannot meet the necessary element of ―without authorization or 2 3 exceeding authorized access,‖ the Complaint does not state a cause of action under the CFAA 4 upon which relief can be granted. The facts as alleged indicate that Defendants, as Plaintiff’s staff 5 biologists, had permission to access to the information at issue. Plaintiff could not possibly cure 6 the deficiency of the CFAA action by the allegation of other facts consistent with those alleged in 7 the present complaint. Amendment being futile, leave to amend the CFAA cause of action is 8 denied and the claim is dismissed with prejudice. 9 V. JURISDICTION The CFAA claim is Plaintiff’s only federal claim. Plaintiff specifically disclaims a federal 10 11 Copyright Act claim. Doc. 14, p. 9, lines 17-18. A district court may decline to exercise 12 jurisdiction over supplemental state law claims if ―the district court has dismissed all claims over 13 which it has original jurisdiction.‖ 28 U.S.C. § 1367(c)(3). When federal claims are dismissed 14 before trial pendent state claims also should be dismissed. Religious Technology Center v. 15 Wollersheim, 971 F.2d 364, 367-368 (9th Cir. 1992). Considering judicial economy, convenience, 16 fairness, and comity, and because the only federal claim in this case is dismissed with prejudice, 17 the Court declines to exercise supplemental jurisdiction over Plaintiff’s remaining state law 18 claims. 19 VI. ORDER 20 Defendants’ Motion to Dismiss is hereby GRANTED. 21 The CFAA claim is DISMISSED WITH PREJUDICE. 22 All other claims are DISMISSED for lack of jurisdiction. 23 24 IT IS SO ORDERED. 25 Dated: April 3, 2014 26 SENIOR DISTRICT JUDGE 27 28 7

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?