Farmers Insurance Exchange, et al v. Steele Insurance Agency Inc., et al
Filing
47
MEMORANDUM and ORDER signed by Chief Judge Morrison C. England, Jr. on 11/13/2013 ORDERING that Blalock's 37 Motion to Dismiss is DENIED as to Farmer' second cause of action and GRANTED WITH LEAVE TO AMEND as to Farmers' fifth cause of action. The Steele Insurance Agency, Steele, McCarren, Perkins, and Henton's 38 Motion to Dismiss is GRANTED IN PART and DENIED IN PART. Not later than thirty (30) days following the date this Memorandum and Order is electronically filed, Plaintiffs may (but are not required to) file an amended complaint. If no amended complaint is filed within said thirty (30) day period, without further notice to the parties, the cause of action dismissed by virtue of this Memorandum and Order will be dismissed with prejudice. (Zignago, K.)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
EASTERN DISTRICT OF CALIFORNIA
10
11
12
FARMERS INSURANCE EXCHANGE,
et al.,
Plaintiffs,
13
v.
14
15
No. 2:13-CV-00784-MCE-DAD
MEMORANDUM AND ORDER
STEELE INSURANCE AGENCY, INC.,
et al.,
16
Defendants.
17
Through this action, Plaintiffs Farmers Insurance Exchange, Truck Insurance
18
19
Exchange, Fire Insurance Exchange, Mid-Century Insurance Company, and Farmers
20
New World Life Insurance Company (collectively “Plaintiffs” or “Farmers”) seek relief
21
from Defendants Steele Insurance Agency, Troy Steele (“Steele”), Ted Blalock
22
(“Blalock”), Larry McCarren (“McCarren”), Bill Henton (referred to as “Defendant Henton”
23
to distinguish him from his father, “Mr. Henton”), and Cindy Jo Perkins (“Perkins”)
24
(collectively “Defendants”) for the alleged misappropriation of Plaintiffs’ trade secrets, as
25
well as other violations of state and federal law pertaining to the operation of Plaintiffs’
26
and Defendants’ respective insurance companies.
27
///
28
///
1
1
Specifically, the operative First Amended Complaint alleges the following causes of
2
action: (1) breach of contract against McCarren; (2) misappropriation of trade secrets
3
against all Defendants; (3) violation of the Computer Fraud and Abuse Act (“CFAA”), 18
4
U.S.C. § 1030(a)(2)(C), against Defendant Henton and Perkins; (4) violation of the
5
CFAA, 18 U.S.C. § 1030(a)(4), against Defendant Henton and Perkins; and (5) civil
6
conspiracy against all Defendants. FAC, Aug. 14, 2013, ECF No. 35.
7
Presently before the Court is Blalock’s Motion to Dismiss Plaintiffs’ second and
8
fifth causes of action (“Blalock Motion”) pursuant to Federal Rule of Civil Procedure
9
12(b)(6)1 for failure to state a claim upon which relief can be granted. Blalock Mot., Sept.
10
3, 2013, ECF No. 37. Also before the Court is a Motion to Dismiss Plaintiffs’ second,
11
third, fourth, and fifth causes of action by the Steele Insurance Agency, Steele,
12
McCarren, Henton, and Perkins’ (“Steele Motion”) pursuant to Rule 12(b)(6). Steele
13
Mot., Sept. 3, 2013, ECF No. 38. Farmers timely opposed these Motions. Pls.’ Opp’n,
14
Sept. 19, 2013, ECF No. 39; Pls.’ Opp’n, Sept. 19, 2013, ECF No. 40. For the reasons
15
set forth below, the Motions are GRANTED IN PART and DENIED IN PART.2
16
17
BACKGROUND3
18
19
Farmers sells insurance policies to policyholders through independent contractor
20
agents. Farmers’ most valuable assets are their policyholders and the information that
21
Farmers maintains about each policyholder. Farmers agents are exclusive agents for
22
Farmers’ insurance products.
23
///
24
25
26
27
1
All further references to “Rule” or “Rules” are to the Federal Rules of Civil Procedure unless
otherwise stated.
2
Because oral argument will not be of material assistance, the Court ordered this matter
submitted on the briefs. E.D. Cal. Local R. 230(g).
3
28
The following recitation of facts is taken, sometimes verbatim, from Farmers’ First Amended
Complaint. FAC at 4-13.
2
1
The agents may not promote or sell insurance policies issued by other insurers. Each
2
Farmers agent must agree to use Farmers’ trade secret customer information only in the
3
course of the agent’s relationship with Farmers. Each agent must further promise not to
4
divulge Farmers’ trade secret customer information to third parties or to use it in any way
5
detrimental to Farmers. This information is not shared with Farmers’ competitors.
6
Farmers maintains databases, which include the Electronic Customer Marketing
7
System (“eCMS”). eCMS contains information about prospective, current, and former
8
policyholders, including name, address, telephone, social security number, driver’s
9
license number, policy expiration date, insured property, claims history, discount
10
eligibility, and other information of Farmers’ policyholders. eCMS is an important tool on
11
the Farmers’ “Agency Dashboard,” accessed and used by Farmers’ authorized
12
insurance agents. The system enables authorized users to access Confidential
13
Policyholder Information about the policyholders they service, and allows agents to
14
create, among other things, policyholder reports, contact lists, and mailing labels. Use of
15
eCMS is subject to certain confidentiality restrictions and security protections.
16
Farmers invests significant time, labor, and capital in developing the Confidential
17
Policyholder Information stored on eCMS. The Confidential Policyholder Information is
18
not generally available in this aggregated form in the industry or to Farmers’ competitors.
19
If this information was available to Farmers’ competitors, those competitors could more
20
easily solicit Farmers’ policyholders to change insurance providers.
21
Farmers maintains its Confidential Policyholder Information, including policy
22
expirations, on a password and user-ID protected system. When an agent’s Agency
23
Agreement is terminated, Farmers turns off the access of both agents and their staff to
24
eCMS and the Agency Dashboard, and the terminated agent’s user ID and password
25
combination is no longer valid. Farmers also issues company policies regarding access
26
to and preservation of Confidential Policyholder Information, by maintaining copies of
27
those policies on the Agency Dashboard.
28
///
3
1
Periodically, Farmers reminds its insurance agents of its confidentiality policies
2
through bulletins, yearly compliance memoranda, and other communications. Finally,
3
each time an agent accesses Farmers’ proprietary system through the Agency
4
Dashboard, that agent must agree to be bound by the terms of a separate “Legal
5
Disclaimer.” The Legal Disclaimer provides that the information the agent is accessing
6
Farmers’ proprietary, confidential, and trade secret information.
7
Defendants Troy Steele and Steele Insurance Agency
8
Steele was appointed as a District Manager for Farmers in 2001, pursuant to a
9
District Manager Appointment Agreement. Subsequently, in January 2010, Farmers
10
terminated Steele’s Agreement. Thereafter, Steele began his own independent
11
insurance agency, the Steele Insurance Agency. Steele and the Steele Insurance
12
Agency were not appointed or allowed to sell Farmers’ insurance products. Farmers
13
alleges Steele is using improper means to obtain access to Farmers’ policyholder
14
information. Farmers further contends Steele directs current and former Farmers
15
agents, or their staff members, to use Farmers’ customer lists and other trade secret
16
information to solicit Farmers’ customers to switch to the Steele Insurance Agency.
17
Farmers claims it has lost numerous customers previously serviced by McCarren,
18
Charlie Finister, and Defendant Henton’s father, Mr. Henton, to the Steele Insurance
19
Agency as a result of Steele’s trade secret misappropriation.
20
Defendant Larry McCarren
21
McCarren was appointed as a Farmers agent in January 1992, pursuant to an
22
Agency Appointment Agreement. McCarren worked in the district of District Manager
23
Blalock until January 2012. Blalock’s District Manager Appointment Agreement was
24
terminated in January 2012. Blalock then went to work for the Steele Insurance Agency.
25
According to Farmers, while McCarren was still a Farmers agent, he wrote
26
policies for other insurers in violation of his Agency Appointment Agreement.
27
In August 2012, McCarren terminated his Agreement with Farmers.
28
///
4
1
His termination became effective November 3, 2012. McCarren now works as an
2
insurance agent for the Steele Insurance Agency.
3
Following McCarren’s resignation, customers complained to Farmers that
4
McCarren contacted them, attempting to switch their insurance policies to other carriers.
5
Farmers also alleges that prior to leaving Farmers, McCarren accessed Farmers’
6
computer system to download information regarding Farmers’ policyholders, including
7
his entire customer list, so that he could use this information after he was no longer a
8
Farmer’s agent. Downloading this information violated McCarren’s Agency Appointment
9
Agreement. Farmers alleges that at the direction of Steele and Blalock, McCarren is
10
attempting to transfer Farmers’ policyholders from Farmers to other insurers for the
11
benefit of the Steele Insurance Agency.
12
Defendant Cindy Jo Perkins
13
Perkins was McCarren’s longtime employee. However, in 2012, Perkins went to
14
work for another Farmers agent, Charlie Finister. Throughout the year of 2012, Finister
15
was gravely ill with diabetes. Finister resigned and went into hospice in November 2012.
16
Perkins did not have permission to sell Farmers’ insurance products or to access
17
Farmers’ computer systems. Without permission, Perkins used Finister’s user ID and
18
password combination to gain access to information from Farmers’ computer system
19
while she worked in Finister’s office. Perkins is appointed with the Steele Insurance
20
Agency, and was so appointed when she accessed Farmers’ computer system. Perkins
21
now works together with Steele and Blalock to transfer Farmers’ policyholders to other
22
insurers for the benefit of the Steele Insurance Agency.
23
Defendant Bill Henton
24
Mr. Henton, Defendant Henton’s father, was a Farmers agent from 1968 to 2012.
25
In 2012, Mr. Henton’s District Manager, Rudy Cedre, believed that Mr. Henton had
26
developed severe memory problems. Defendant Henton worked in Mr. Henton’s office,
27
but Defendant Henton was not appointed as a Farmers agent.
28
///
5
1
In 2012, Mr. Henton resigned as a Farmers agent. Prior to Mr. Henton’s
2
resignation, Defendant Henton allowed his wife and daughter to access the Farmers
3
computer system to obtain Farmers’ policyholder information. Defendant Henton is also
4
in the process of becoming part of Steele Insurance Agency. Defendant Henton remains
5
in control of the physical files relating to over 1600 Farmers policies, will not allow
6
Farmers to access these files, and arranged for his father’s mail, including Farmers’
7
business mail, to be forwarded to Defendant Henton’s new business address.
8
Defendant Henton is working together with Steele and Blalock to transfer Farmers’
9
policyholders from Farmers to other insurers, for the benefit of the Steele Insurance
10
Agency.
11
12
STANDARD
13
14
On a motion to dismiss for failure to state a claim under Federal Rule of Civil
15
Procedure 12(b)(6), all allegations of material fact must be accepted as true and
16
construed in the light most favorable to the nonmoving party. Cahill v. Liberty Mut. Ins.
17
Co., 80 F.3d 336, 337-38 (9th Cir. 1996). Rule 8(a)(2) requires only “a short and plain
18
statement of the claim showing that the pleader is entitled to relief” in order to “give the
19
defendant fair notice of what the . . . claim is and the grounds upon which it rests.” Bell
20
Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (quoting Conley v. Gibson, 355 U.S. 41,
21
47 (1957)).
22
A complaint attacked by a Rule 12(b)(6) motion to dismiss does not require
23
detailed factual allegations. However, “a plaintiff’s obligation to provide the grounds of
24
his entitlement to relief requires more than labels and conclusions, and a formulaic
25
recitation of the elements of a cause of action will not do.” Id. (internal citations and
26
quotations omitted).
27
///
28
///
6
1
A court is not required to accept as true a “legal conclusion couched as a factual
2
allegation.” Ashcroft v. Iqbal, 129 S. Ct. 1937, 1950 (2009) (quoting Twombly, 550 U.S.
3
at 555). “Factual allegations must be enough to raise a right to relief above the
4
speculative level.” Twombly, 550 U.S. at 555 (citing 5 Charles Alan Wright & Arthur R.
5
Miller, Federal Practice and Procedure § 1216 (3d ed. 2004) (stating that the pleading
6
must contain something more than “a statement of facts that merely creates a suspicion
7
[of] a legally cognizable right of action.”)).
8
Furthermore, “Rule 8(a)(2) . . . requires a showing, rather than a blanket
9
assertion, of entitlement to relief.” Twombly, 550 U.S. at 556 n.3 (internal citations and
10
quotations omitted). Thus, “[w]ithout some factual allegation in the complaint, it is hard
11
to see how a claimant could satisfy the requirements of providing not only ‘fair notice’ of
12
the nature of the claim, but also ‘grounds’ on which the claim rests.” Id. (citing 5 Charles
13
Alan Wright & Arthur R. Miller, supra, at § 1202). A pleading must contain “only enough
14
facts to state a claim to relief that is plausible on its face.” Id. at 570. If the “plaintiffs . . .
15
have not nudged their claims across the line from conceivable to plausible, their
16
complaint must be dismissed.” Id. However, “[a] well-pleaded complaint may proceed
17
even if it strikes a savvy judge that actual proof of those facts is improbable, and ‘that a
18
recovery is very remote and unlikely.’” Id. at 556 (quoting Scheuer v. Rhodes, 416 U.S.
19
232, 236 (1974)).
20
A court granting a motion to dismiss a complaint must then decide whether to
21
grant leave to amend. Leave to amend should be “freely given” where there is no
22
“undue delay, bad faith or dilatory motive on the part of the movant, . . . undue prejudice
23
to the opposing party by virtue of allowance of the amendment, [or] futility of the
24
amendment . . . .” Foman v. Davis, 371 U.S. 178, 182 (1962); Eminence Capital, LLC v.
25
Aspeon, Inc., 316 F.3d 1048, 1052 (9th Cir. 2003) (listing the Foman factors as those to
26
be considered when deciding whether to grant leave to amend). Not all of these factors
27
merit equal weight.
28
///
7
1
Rather, “the consideration of prejudice to the opposing party . . . carries the
2
greatest weight.” Id. (citing DCD Programs, Ltd. v. Leighton, 833 F.2d 183, 185 (9th Cir.
3
1987). Dismissal without leave to amend is proper only if it is clear that “the complaint
4
could not be saved by any amendment.” Intri-Plex Techs. v. Crest Group, Inc., 499 F.3d
5
1048, 1056 (9th Cir. 2007) (citing In re Daou Sys., Inc., 411 F.3d 1006, 1013 (9th Cir.
6
2005); Ascon Props., Inc. v. Mobil Oil Co., 866 F.2d 1149, 1160 (9th Cir. 1989) (“Leave
7
need not be granted where the amendment of the complaint . . . constitutes an exercise
8
in futility . . . .”)).
9
10
ANALYSIS
11
12
Farmers alleges five causes of action under state and federal law. Blalock moves
13
to dismiss all claims alleged against him; namely, the second and fifth causes of action.
14
Blalock Mot. at 2. The Steele Insurance Agency, Steele, McCarren, Henton, and Perkins
15
contend Farmers’ fifth claim for civil conspiracy must be dismissed because it is
16
preempted by the California Uniform Trade Secrets Act (“UTSA”), and because it fails to
17
state a claim upon which relief can be granted. Steele Mot. at 8, 9. The Steele
18
Insurance Agency and Steele also contend that Farmers’ claim for misappropriation of
19
trade secrets fails to state a claim against them. Id. at 11. Finally, Perkins and
20
Defendant Henton seek dismissal of Farmers’ claims for violations of the CFAA. Id. at
21
13.
22
23
A.
Misappropriation of Trade Secrets
24
25
Farmers alleges Defendants’ actions constitute misappropriation of Farmers’
26
trade secrets under California’s UTSA.
27
///
28
///
8
1
To prevail on their trade secret misappropriation claim, Farmers must show: “(1) the
2
existence of a trade secret, and (2) misappropriation of the trade secret.” AccuImage
3
Diagnostics Corp. v. Terarecon, Inc., 260 F. Supp. 2d 941, 950 (N.D. Cal. 2003) (citing
4
Cal. Civ. Code § 3426.1(b)). Here, the existence of a trade secret is not contested.
5
However, Defendants contend that Farmers fails to allege facts sufficient to show
6
misappropriation.
7
The UTSA defines “misappropriation” as:
8
Disclosure or use of a trade secret of another without express
or implied consent by a person who:
9
(A) Used improper means to acquire knowledge of the trade
secret; or
10
11
(B) At the time of disclosure or use, knew or had reason to
know that his or her knowledge of the trade secret was:
12
(i) Derived from or through a person who had utilized
improper means to acquire it;
13
14
(ii) Acquired under circumstances giving rise to a duty
to maintain its secrecy or limits its use; or
15
(iii) Derived from or through a person who owed a duty
to the person seeking relief to maintain its secrecy or
limit its use; . . . .
16
17
18
Cal. Civ. Code § 3426.1(b).
19
“A violation of the UTSA occurs when an individual misappropriates a former
20
employer's protected trade secret client list, for example, by using the list to solicit clients
21
or to otherwise attain an unfair competitive advantage.” Reeves v. Hanlon, 33 Cal. 4th
22
1140, 1155 (2004). While an employee who leaves his employer can “announce his
23
new affiliation” to his clients, the employee cannot “actively solicit business for his new
24
company” using the employer’s trade secrets. Morlife, Inc. v. Perry, 56 Cal. App. 4th
25
1514, 1524 (1997).
26
///
27
///
28
///
9
1
Other courts have found that a letter which “petitions, importunes, and entreats . . .
2
customers to call [the employee] at any time for information about the better policies [the
3
new company] can provide” amounts to solicitation. Id. at 1525 (quoting Am. Credit
4
Indem. Co. v. Sacks, 213 Cal. App. 3d 622, 636-37 (1989)). Thus, using trade secret
5
customer lists to solicit customers constitutes misappropriation. See id.
6
Importantly, “[m]isappropriation and misuse can rarely be proved by convincing
7
direct evidence. In most cases plaintiffs must construct a web of perhaps ambiguous
8
circumstantial evidence from which the trier of fact may draw inferences . . . that it is
9
more probable than not that [misappropriation] did in fact take place.” Hanger
10
Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., 556 F. Supp. 2d 1122, 1136
11
(E.D. Cal. 2008).
12
Farmers alleges that “Blalock’s District Manager Appointment Agreement with
13
Farmers was terminated effective January 2012. Ted Blalock went on to work for the
14
Steele Insurance Agency. He has participated in and aided Steele and the other
15
Defendants in the wrongful acts described herein.” FAC at 8. Furthermore, Farmers
16
alleges that “McCarren is working at the direction of Steele and Blalock in attempting to
17
transfer the insurance business of Farmers’ policyholders from Farmers to other insurers
18
for the benefit of the Steele Insurance Agency, and its owner, agents and employees.”
19
Id. at 9. Moreover, Farmers alleges that “Steele and the other Defendants have retained
20
and/or accessed Farmers' proprietary, confidential and trade secret information for their
21
benefit, to the detriment of Farmers, and in violation of the terms of the AAA, for the
22
benefit of Steele’s competing business, and its owner, agents and employees.” FAC at
23
13. Farmers further claims that Defendants “solicited, switched, and re-[wrote], or
24
assisted other Defendants in doing so, the insurance business of Farmers' policyholders,
25
previously serviced by McCarren, Finister and Bill Henton, Jr., when they were agents, to
26
Steele’s competing agency.” Id. Finally, Farmers alleges each Defendant was the agent
27
of each of the other Defendants in committing the alleged acts.
28
///
10
1
Accepting as true that Blalock “retained and/or accessed Farmers’ proprietary,
2
confidential and trade secret information . . . for the benefit of Steele’s competing
3
business,” FAC at 13, and construing this allegation in the light most favorable to
4
Farmers, Farmers alleges facts sufficient to show that Blalock “disclos[ed] or use[d]”
5
Farmers’ trade secrets, as required by the UTSA, Cal. Civ. Code § 3426.1(b).
6
Furthermore, these allegations, taken together and viewed in the light most favorable to
7
Farmers, are sufficient to show that at the time of Blalock’s use or disclosure, he “knew
8
or had reason to know that his . . . knowledge of the trade secret was . . . [d]erived from
9
or through a person who had utilized improper means to acquire it,” or “[d]erived from or
10
through a person who owed a duty to [Farmers] to maintain its secrecy or limit its use
11
. . . .” Cal. Civ. Code § 3426.1(b). Farmers has therefore successfully provided grounds
12
for their entitlement to relief against Blalock for trade secret misappropriation.
13
Accordingly, Blalock’s motion to dismiss this claim is denied.
14
As to the Steele Insurance Agency and Steele (“the Steele Defendants”), Farmers
15
alleges “Defendants misappropriated farmers’ trade secrets by, among other things,
16
retaining or utilizing Farmers’ Confidential Policyholder Information for the purpose of
17
soliciting directing or advising Farmers’ policyholders to switch their insurance business
18
away from Farmers and to Steele’s competing business.” FAC at 15. The Steele
19
Defendants take issue with Farmers’ allegations on the ground that they are the acts of
20
others, and not the acts of the Steele Defendants. See Steele Mot. at 11; Steele Defs.’
21
Reply 3, Sept. 25, 2013, ECF No. 41.
22
///
23
///
24
///
25
///
26
///
27
///
28
///
11
1
However, this argument completely avoids the issue of agency and the clear
2
allegations that Defendants are acting in concert. Farmers’ allegations that various
3
Defendants left Farmers’ employ, taking with them Farmers’ protected trade secret client
4
lists, and that those individuals are currently “working at the direction of” the Steele
5
Defendants to use those lists to solicit Farmers’ policyholders to switch their insurance
6
business to the Steele Insurance Agency, are more than sufficient to show that the
7
Steele Defendants used Farmers’ trade secrets without Farmers’ consent. See Cal. Civ.
8
Code § 3426.1(b); see also Reeves, 33 Cal. 4th at 1155 (“A violation of the UTSA occurs
9
when an individual misappropriates a former employer's protected trade secret client list,
10
for example, by using the list to solicit clients or to otherwise attain an unfair competitive
11
advantage.”).
12
Moreover, Farmers’ allegations make clear that at the time the Steele Defendants
13
and their agents used these customer lists, any of the three circumstances set forth in
14
subsection (b)(2)(B) of the UTSA might apply. That is, viewing the allegations in the light
15
most favorable to Farmers, the Steele Defendants “knew or had reason to know that
16
[their] knowledge of the trade secret[s] was” either: (1) “[d]erived from or through a
17
person who had utilized improper means to acquire it;” (2) “[a]cquired under
18
circumstances giving rise to a duty to maintain its secrecy or limits its use;” or
19
(3) “[d]erived from or through a person who owed a duty to the person seeking relief to
20
maintain its secrecy or limit its use . . . .” Cal. Civ. Code § 3426.1(b)(2)(B)(i)-(iii); see
21
also Reeves, 33 Cal. 4th at 1155; Perry, 56 Cal. App. 4th at 1524. This finding is based
22
not on the alleged attempts to switch Farmers’ customers to the Steele Insurance
23
Agency, nor on the alleged entice Farmers agents to come work for the Steele Insurance
24
Agency. Rather, this finding is based on the allegations that Defendants have taken
25
Farmers’ trade secret customer lists and have been successful in their efforts to switch
26
Farmers’ customers, as Farmers’ has suffered “loss of profits, loss of premiums, and
27
loss of business” as a result of the alleged misappropriation.
28
///
12
1
Accordingly, the Steele Defendants’ Motion to Dismiss Farmers’ claim for trade secret
2
misappropriation is DENIED.
3
4
B.
CFAA
5
6
Farmers contends Perkins and Defendant Henton violated the CFAA by
7
accessing Farmers’ files and Farmers’ agents’ computers without permission. The
8
CFAA imposes liability, in relevant part, on: “Whoever . . . [i]ntentionally access a
9
computer without authorization or exceeds authorized access, and thereby obtains . . .
10
information from any protected computer . . . .” 18 U.S.C. § 1030(a)(2). The CFAA also
11
imposes liability on anyone who “knowingly and with intent to defraud, accesses a
12
protected computer without authorization, or exceeds authorized access, and by means
13
of such conduct furthers the intended fraud and obtains anything of value, unless the
14
object of the fraud and the thing obtained consists only of the use of the computer and
15
the value of such use is not more than $5,000 in any 1-year period.” 18 U.S.C.
16
§ 1030(a)(4).
17
The CFAA provides a private right of action, stating:
18
Any person who suffers damage or loss by reason of a
violation of this section may maintain a civil action against the
violator to obtain compensatory damages and injunctive relief
or other equitable relief. A civil action for a violation of this
section may be brought only if the conduct involves 1 of the
factors set forth in subclauses (I), (II), (III), (IV), or (V) of
subsection (c)(4)(A)(i). Damages for a violation involving only
conduct described in subsection (c)(4)(A)(i)(I) are limited to
economic damages. No action may be brought under this
subsection unless such action is begun within 2 years of the
date of the act complained of or the date of the discovery of
the damage. . . .”
19
20
21
22
23
24
25
18 U.S.C. § 1030(g).
26
///
27
///
28
///
13
1
Subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i) are as follows:
2
(I) loss to 1 or more persons during any 1-year period (and,
for purposes of an investigation, prosecution, or other
proceeding brought by the United States only, loss resulting
from a related course of conduct affecting 1 or more other
protected computers) aggregating at least $5,000 in value;
3
4
5
6
(II) the modification or impairment, or potential modification or
impairment, of the medical examination, diagnosis, treatment,
or care of 1 or more individuals;
7
(III) physical injury to any person;
8
(IV) a threat to public health or safety;
9
(V) damage affecting a computer used by or for an entity of
the United States Government in furtherance of the
administration of justice, national defense, or national security
10
11
Id. § 1030(c)(4)(A)(i)(I)-(V).
12
Thus, a private plaintiff bringing a claim under the CFAA must prove that the
13
defendant violated one of the provisions of § 1030(a)(1)-(7), and that the violation
14
involved one of the factors listed in § 1030(c)(4)(A)(i)(I)-(V). See id. § 1030(g). In the
15
present case, only one of these factors is relevant: Farmers must allege that their case
16
involves “loss to 1 or more persons during any 1-year period . . . aggregating at least
17
$5,000 in value.” Id. § 1030(c)(4)(A)(i)(1).
18
Here, Farmers alleges that Defendant Henton and Perkins violated
19
18 U.S.C. §§ 1030(a)(4) and 1030(a)(2). To successfully state a claim pursuant to
20
18 U.S.C. § 1030(g) based on a violation of § 1030(a)(2), Farmers must allege that
21
Defendant Henton and Perkins: (1) intentionally accessed a computer, (2) without
22
authorization or exceeding authorized access, and (3) thereby obtained information
23
(4) from any protected computer . . . , and that (5) there was loss to one or more persons
24
during any one-year period aggregating at least $5,000 in value.” LVRC Holdings LLC v.
25
Brekka, 581 F.3d 1127, 1132 (9th Cir. 2009) (citations omitted).
26
///
27
///
28
///
14
1
To successfully bring an action under § 1030(g) based on a violation of § 1030(a)(4),
2
Farmers must show that Defendant Henton and Perkins: (1) accessed a “protected
3
computer,” (2) without authorization or exceeding such authorization that was granted,
4
(3) “knowingly” and with “intent to defraud,” and thereby (4) “further[ed] the intended
5
fraud and obtain[ed] anything of value,” causing (5) a loss to one or more persons during
6
any one-year period aggregating at least $5,000 in value. Id. at 1132 (citing 18 U.S.C. §
7
1030(a); P.C. Yonkers, Inc. v. Celebrations the Party and Seasonal Superstore, LLC,
8
428 F.3d 504, 508 (3d Cir. 2005); Theofel v. Farey-Jones, 359 F.3d 1066, 1078 (9th Cir.
9
2004)).
10
Perkins and Defendant Henton challenge two elements of Farmers’ CFAA claims.
11
They assert Farmers’ CFAA claims fail to adequately plead that Perkins and Defendant
12
Henton accessed a computer “without authorization,” and they contend that Farmers
13
fails to allege “loss” within the meaning of the statute.
14
15
1.
Access Without Authorization/ Exceeding Authorized Access
16
17
An individual who is authorized to use a computer for certain purposes but goes
18
beyond those limitations has “exceed[ed] authorized access” within the meaning of the
19
CFAA. Brekka, 581 F.3d at 1133. By contrast, “a person who uses a computer ‘without
20
authorization’ has no rights, limited or otherwise, to access the computer in question.”
21
Id. Thus, the Brekka court found that “when an employer authorizes an employee to use
22
a company computer subject to certain limitations, the employee remains authorized to
23
use the computer even if the employee violates those limitations. It is the employer's
24
decision to allow or to terminate an employee's authorization to access a computer that
25
determines whether the employee is with or ‘without authorization.’” Id.
26
///
27
///
28
///
15
1
In the instant case, Perkins argues that while Farmers alleges she “did not have
2
permission” to access files on Finister’s computer, Farmers “never alleges whose
3
permission was lacking.” Steele Mot. at 13. Perkins also contends that “Finister is
4
alleged to have been a Farmers’ agent[,] . . . Farmers’ agents have authorized access to
5
the confidential information[,] [and] Finister as authorized agent had access to the
6
alleged confidential information.” Id. at 13-14. Perkins then states that “there is no
7
allegation that Defendant[] Perkins . . . accessed Farmers’ computers without
8
authorization.” Id. at 14. Perkins contend that “the fact [Finister] delegated [his]
9
authority to Perkins . . . does not make the access unauthorized.” Id.
10
However, the Complaint contains no allegations that Finister gave Perkins
11
permission to access his computer files using his user name and password. The First
12
Amended Complaint clearly states that Perkins “used [a Farmer’s Agent’s] user ID and
13
password combination to access files and information on Farmers’ computer system
14
when she did not have permission to do so.” FAC at 11. The Complaint’s failure to
15
specifically state whose permission was lacking is insufficient to warrant dismissal of
16
Farmers’ CFAA claims against Perkins.
17
On a motion to dismiss, the allegations are accepted as true and are construed in
18
the light most favorable to the nonmoving party. Cahill, 80 F.3d 336, 337-38 (9th Cir.
19
1996). Farmers’ allegation, viewed in the light most favorable to Farmers, shows that
20
Perkins was “a person who . . . [had] no rights, limited or otherwise, to access the
21
computer in question.” See Brekka, 581 F.3d at 1133. There are no allegations in the
22
operative Complaint suggesting otherwise. Perkins’ contention that Finister permitted
23
her to use his computer is a factual issue to be decided on a motion for summary
24
judgment; it is not within the purview of a motion to dismiss, where the Court must
25
accept as true the factual allegations contained in the complaint. Farmers’ allegations
26
regarding Perkins therefore meet the “without authorization” prong of both
27
§§ 1030(a)(2)(C) and (a)(4).
28
///
16
1
Defendant Henton raises similar arguments with respect to Farmers’ CFAA
2
claims, contending that his father, a Farmers agent, “delegated [his] authority” to access
3
the Farmers system. Farmers alleges Defendant Henton “worked in his father’s office,”
4
but was not a Farmers agent, and Defendant Henton gave his “wife and daughter
5
unauthorized access to Farmers’ computer system apparently for the purpose of
6
accessing information regarding Farmers’ policyholders.” FAC at 12.
7
The first issue is whether Defendant Henton “lacked authorization” to access to
8
the computer in question. Farmers again fails to make any allegations that Defendant
9
Henton did not have authorization to access the computer(s) at issue. See FAC; Order
10
34, July 25, 2013, ECF No. 34 (“Nowhere do Plaintiffs allege that Defendant Henton was
11
not authorized to access the physical computer(s) in question.”) Thus, as before,
12
Farmers again fails to plead facts sufficient to show that Defendant Henton was a person
13
“without authorization.” See Brekka, 581 F.3d at 1133.
14
Accordingly, the next issue is whether Defendant Henton was a person who
15
“exceeded [his] authorized access” under the CFAA. Farmers alleges that “Defendants
16
were not authorized to access the Agency Dashboard and eCMS,” and that “Defendant[]
17
. . . Henton . . . intentionally and without authorization accessed, caused others to
18
access, and/or [has] utilized others’ user ID and password combination to access the
19
Agency Dashboard or eCMS . . . .” FAC at 16.
20
As before, Farmers’ allegation that “Defendants were not authorized to access the
21
Agency Dashboard and eCMS,” and that “Defendant[] . . . Henton . . . intentionally and
22
without authorization accessed, caused others to access, and/or [has] utilized others’
23
user ID and password combination to access the Agency Dashboard or eCMS,” FAC at
24
16, are sufficient for the Court to find that Farmers has sufficiently alleged that Defendant
25
Henton “exceeded his authorized access” under the CFAA. See Order at 34 (“Viewed in
26
the light most favorable to Plaintiffs, these allegations reveal that Defendant Henton
27
‘violated . . . restrictions on access to information’ . . . and therefore ‘exceeded his
28
authorized access.’”) (citing Nosal, 676 F.3d at 863-64).
17
1
2
Farmers’ allegations as to Defendant Henton therefore meet the “without
authorization” prong of the CFAA analysis.
3
4
2.
Loss
5
6
Perkins and Defendant Henton also challenge the loss element of Farmers’ CFAA
7
claims on the ground that “there is no claim of loss or damage that is compensable
8
under CFAA.” Steele Mot. at 14. However, Farmers alleges:
9
Perkins’ and Henton’s unauthorized intrusion into the Agency
Dashboard or eCMS has caused Farmers a loss in excess of
$5,000 within a one-year period. This cost was incurred in
discovering and confirming the identity of Perkins and Henton
as having had unauthorized access to Farmers’ computer
system, and in discovering the method by which they
accessed the protected information.
10
11
12
13
FAC at 17.
14
The CFAA defines “loss” as “any reasonable cost to any victim, including the cost
15
of responding to an offense, conducting a damage assessment, and restoring the data,
16
program, system, or information to its condition prior to the offense, and any revenue
17
lost, cost incurred, or other consequential damages incurred because of interruption of
18
service . . . .” 18 U.S.C. § 1030(e)(11). “‘Loss,’ therefore, means two things: ‘any
19
reasonable cost to the victim,’ and lost revenue or other damages incurred as a result of
20
an interruption of service.” AtPac, Inc. v. Aptitude Solutions, 730 F. Supp. 2d 1174,
21
1184 (E.D. Cal. 2010). The CFAA defines “damage” as “any impairment to the integrity
22
or availability of data, a program, a system, or information . . . .” 18 U.S.C. § 1030(e)(8).
23
///
24
///
25
///
26
///
27
///
28
///
18
1
To allege a loss under the CFAA, “plaintiffs must identify impairment of or damage
2
to the computer system that was accessed without authorization.” AtPac, Inc.,
3
730 F. Supp. 2d at 1184 (quoting Doyle v. Taylor, No. 09-158, 2010 WL 2163521, at *2
4
(E.D. Wash. May 24, 2010) (holding that where plaintiff alleged defendant accessed
5
plaintiff’s USB thumb drive and retrieved a sealed document, “[p]laintiff would have to
6
show that the thumb drive itself was somehow damaged or impaired by Defendant’s act
7
of accessing the drive.”)). “Cognizable costs also include the costs associated with
8
assessing a hacked system for damage [and] upgrading a system’s defenses to prevent
9
future unauthorized access.” Id. (citing Doyle, 2010 WL 2163521, at *3); see also
10
SuccessFactors, Inc. v. Softscape, Inc., 544 F. Supp. 2d 975 (N.D. Cal. 2008) (“[W]here
11
the offense involves unauthorized access and the use of protected information . . . the
12
cost of discovering the identity of the offender or the method by which the offender
13
accessed the protected information [is] part of the loss for purposes of the CFAA.”).
14
While a number of courts have noted that “costs not related to computer
15
impairment or computer damages are not compensable under the CFAA,” SKF USA,
16
Inc. v. Bjerkness, 636 F. Supp. 2d 696, 721 (N.D. Ill. 2009) (citing numerous cases
17
reaching same conclusion), “courts in the Ninth Circuit have recognized the general
18
principle that ‘costs associated with investigating intrusions into a computer network and
19
taking subsequent remedial measures are losses within the meaning of the state,’”
20
Mintz, 906 F. Supp. 2d at 1029.
21
Here, Farmers’ allegations do not “identify impairment of or damage to the
22
computer system that was accessed without authorization.” Rather, Farmers’ alleged
23
costs are associated with investigating and trying to locate the perpetrator. Several
24
courts within the Ninth Circuit found loss allegations similar to these to be adequate to
25
state a claim. See SuccessFactors, 85 F. Supp. 2d 975 (N.D. Cal. 2008); Kimberlite
26
Corp. v. Does, No. C08-2147 TEH, 2008 WL 2264485, at *1-2 (N.D. Cal. 2008).
27
///
28
///
19
1
2
3
4
5
6
7
8
9
For example, in SuccessFactors the court stated:
In cases like this, where the offense involves unauthorized
access and the use of protected information, the reasonable
‘cost of responding to [the] offense,’ . . . will be different from
such cost in a case where the primary concern is the damage
to the plaintiff's computer system itself. . . . Where the
offender has actually accessed protected information,
discovering who has that information and what information he
or she has is essential to remedying the harm. In such cases
courts have considered the cost of discovering the identity of
the offender or the method by which the offender accessed
the protected information to be part of the loss for purposes
of the CFAA.
544 F. Supp. 2d at 981.
10
Other courts have distinguished SuccessFactors on the facts. In Mintz, the
11
plaintiff offered evidence that after the plaintiff gave notice to the defendant that he
12
would leave the defendant’s employment and would be employed elsewhere, the
13
defendant gained access to the plaintiff’s email account and read the plaintiff’s new
14
employment contract. The plaintiff claimed that he met the CFAA’s loss requirement by
15
incurring $27,796.25 in attorneys’ fees. 906 F. Supp. 2d at 1029.
16
In ruling on a motion for summary judgment, the Central District discussed several
17
factors distinguishing Mintz from SuccessFactors. First, the Mintz court stated that in
18
SuccessFactors, “the relevant ‘harm’ of the unauthorized access was that the plaintiff
19
had no clue whether the hacker might invade the website again or send additional spam
20
emails to the plaintiff's customers, [and thus] . . . it was necessary for the plaintiff to
21
track down the perpetrator.” Id. at 1030. However, in Mintz, the undisputed facts
22
showed that, “within days of the hacking incident, . . . it was pellucid that [the defendant]
23
was responsible for” hacking into the plaintiff’s email and that the defendant had
24
accessed the plaintiff’s new employment contract.” Id. Thus, while SuccessFactors
25
required the victim to expend more than $5,000 to “investigat[e] the extent of the breach
26
and locating the perpetrator’s IP address,” in Mintz, “[a]ll [the p]laintiff needed to do to
27
secure his Gmail account—indeed, all he could do—was to change the password and
28
the back-up email address used to retrieve the password.” Id.
20
1
Thus, the Mintz court stated, “it defies common sense to believe that Plaintiff's
2
subsequent legal efforts to confirm Priority Sports' involvement were ‘essential to
3
remedying the harm’ of the unauthorized access.” 4 Id. at 1030-31.
4
A later motion for summary judgment may reveal that the facts of this case more
5
closely resemble those of Mintz rather than SuccessFactors. However, at this stage of
6
the proceedings, Farmers has alleged facts that, when viewed in the light most favorable
7
to Farmers, are sufficient to show that Farmers incurred at least $5000 in costs
8
associated with investigating the harm and the cause of the damage.
9
Accordingly, Farmers have successfully stated their CFAA claims against Perkins
10
Defendant Henton. Defendant Henton and Perkins’ motion to dismiss these claims is
11
therefore DENIED.
12
13
C.
Civil Conspiracy
14
15
Civil conspiracy “is not a cause of action but a legal doctrine that imposes liability
16
on persons who, although not actually committing a tort themselves, share with the
17
immediate tortfeasors a common plan or design in its perpetration.” Applied Equip.
18
Corp. v. Litton Saudi Arabia Ltd., 7 Cal.4th 503, 510 (1994) (citing Wyatt v. Union
19
Mortgage Co., 24 Cal.3d 773, 784 (1979)); see also Entm’t Research Grp. Inc. v.
20
Genesis Creative Grp., Inc., 122 F.3d 1211, 1228 (9th Cir. 1997). “Standing alone, a
21
conspiracy does no harm and engenders no tort liability. It must be activated by the
22
commission of an actual tort.” Applied Equip. Corp., 7 Cal. 4th at 511.
23
///
24
///
25
///
26
27
28
4
Notably, the Mintz court also found that the plaintiff’s legal fees were paid by his new employer,
who was not a “victim” of the defendant’s alleged activity, and thus not a “loss” within the meaning of the
CFAA. 906 F. Supp. 2d at 1029 (citing 18 U.S.C. § 1030(e)(11)) (“[A] ‘loss’ is defined as “any reasonably
cost to any victim.’”) (emphasis in original). Such is not the case here.
21
1
The elements of a civil conspiracy are: (1) the formation and operation of a
2
conspiracy; (2) wrongful conduct in furtherance of the conspiracy; and (3) damages
3
arising from the wrongful conduct. Applied Equip., 7 Cal. 4th at 511; see also Doctors'
4
Co. v. Super. Ct., 49 Cal. 3d 39, 44 (1989). Each member of the alleged conspiracy
5
must be legally capable of committing the underlying tort -- that is, each member must
6
owe a duty to the plaintiff that is recognized by law and must be potentially subject to
7
liability for breach of that duty -- and must intend the success of the purpose of the
8
conspiracy. Applied Equip., 7 Cal.4th at 511. In addition, all elements of the underlying
9
tort must be satisfied. See id. If the plaintiff fails to adequately plead the underlying
10
claim, the corresponding conspiracy claim must also fail. Id. In the present action,
11
Farmers alleges that “Defendants formed and operated a conspiracy to illegally
12
misappropriate and use Farmers’ trade secret protected policyholder information for the
13
purpose of soliciting Farmers’ customers away from Farmers and towards the Steele
14
Insurance Agency.” FAC at 18.
15
Contrary to Defendants’ assertion, the UTSA does not preempt this claim. Courts
16
applying California law have found that claims “based entirely on the same factual
17
allegations that form the basis of [the] trade secrets claim” are preempted. Callaway
18
Golf Co. v. Dunlop Slazenger Grp. Ams., Inc., 318 F. Supp. 2d 216, 220 (D. Del. 2004)
19
(applying California law); see also Gabriel Techs. Corp. v. Qualcomm Inc.,
20
No. 08cv1992-MME(PQR), 2009 WL 3326631, at *11 (S.D. Cal. Sept. 3, 2009)
21
(“California courts have adopted a broad view of preemption in this area and have held
22
that common law claims that are based on the same nucleus of facts as a
23
misappropriation claim are preempted.”). “Preemption is not triggered where the facts in
24
an independent claim are similar to, but distinct from, those underlying the
25
misappropriation claim.” Gabriel Techs., 2009 WL 3326631, at *11. Thus, “the
26
preemption inquiry for those causes of action not specifically exempted by [section]
27
3426.7(b) focuses on whether other claims are no more than a restatement of the same
28
operative facts supporting trade secret misappropriation.
22
1
If there is no material distinction between the wrongdoing alleged in a UTSA claim and
2
that alleged in a different claim, the USTA preempts the other claim.” Id. (quoting
3
Convolve, Inc. v. Compaq Computer Corp., No. 00 CV 5141(GBD), 2006 WL 839022, at
4
*6 (S.D.N.Y. Mar 31, 2006) (applying California law)).
5
Farmers alleges additional facts, such as the agreement to steal trade secrets
6
and the formation of the conspiracy, that factually differentiate this claim from a
7
misappropriation claim, although the harm is the same. Accordingly, Farmers’
8
conspiracy claim is not preempted by the UTSA.
9
However, Farmers nonetheless fails to state a claim for civil conspiracy upon
10
which relief can be granted. Although Rule 9(b) no longer applies, as Farmers no longer
11
alleges that Defendants acted “fraudulently” in perpetrating the conspiracy, see FAC at
12
18-19, Farmers again states this claim in conclusory terms.
13
Farmers clearly alleges Defendants conspired to misappropriate Farmers’ trade
14
secrets, but Farmers’ allegations regarding the formation and operation of a conspiracy
15
are only that Defendants “formed and operated a conspiracy to illegally misappropriate
16
and use Farmers’ trade secrets for the purpose of soliciting Farmers customers away
17
from Farmers and towards the Steele Insurance Agency.” FAC at 19. Farmers does not
18
actually allege that Defendants engaged in these actions because there was a specific
19
agreement between Defendants. Moreover, Farmers provides only vague details about
20
the conspiracies in which Defendants allegedly participated.
21
To successfully state a claim, Farmers “must more clearly allege specific action
22
on the part of each [D]efendant that corresponds to the elements of a conspiracy cause
23
of action. Such amended allegations, however, must be made within the sections of the
24
complaint that contain [Farmers’] claims for the underlying torts.” AccuImage
25
Diagnostics, 260 F. Supp. 2d at 948 (citing Mox, Inc. v Woods, 202 Cal. 675, 677
26
(1927)).
27
28
Accordingly, the claim for civil conspiracy is dismissed with leave to amend as to
all moving Defendants.
23
1
CONCLUSION
2
3
For the reasons set forth above, IT IS SO ORDERED that:
4
1.
Blalock’s Motion to Dismiss (ECF No. 37) is DENIED as to Farmer’ second
5
cause of action and GRANTED WITH LEAVE TO AMEND as to Farmers’
6
fifth cause of action;
7
2.
The Steele Insurance Agency, Steele, McCarren, Perkins, and Henton’s
8
Motion to Dismiss (ECF No. 38) is GRANTED IN PART and DENIED IN
9
PART, as follows:
10
A.
DENIED as to Farmers’ second cause of action;
11
B.
DENIED as to Farmers’ third cause of action;
12
C.
DENIED as to Farmers’ fourth cause of action;
13
D.
GRANTED WITH LEAVE TO AMEND as to Farmers’ fifth cause of
action.
14
15
3.
Not later than thirty (30) days following the date this Memorandum and
16
Order is electronically filed, Plaintiffs may (but are not required to) file an
17
amended complaint. If no amended complaint is filed within said thirty (30)
18
day period, without further notice to the parties, the cause of action
19
dismissed by virtue of this Memorandum and Order will be dismissed with
20
prejudice.
21
IT IS SO ORDERED.
22
Dated: November 13, 2013
23
24
25
26
27
28
24
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?