Kwan Software Engineering, Inc. v. Foray Technologies, LLC

Filing 62

ORDER DENYING PLAINTIFF'S MOTION FOR A PRELIMINARY INJUNCTION; DENYING MOTIONS FOR LEAVE TO FILE SUPPLEMENTAL EVIDENCE 48 52 22 (Illston, Susan) (Filed on 1/22/2013)

Download PDF
1 2 3 4 5 6 7 8 IN THE UNITED STATES DISTRICT COURT 9 FOR THE NORTHERN DISTRICT OF CALIFORNIA United States District Court For the Northern District of California 10 11 KWAN SOFTWARE ENGINEERING, INC., 12 13 14 15 No. C 12-03762 SI ORDER DENYING PLAINTIFF’S MOTION FOR A PRELIMINARY INJUNCTION; DENYING MOTIONS FOR LEAVE TO FILE SUPPLEMENTAL EVIDENCE Plaintiff, v. FORAY TECHNOLOGIES, LLC, Defendant. / 16 17 Plaintiff Kwan Software Engineering, Inc., d/b/a Veripic, Inc. (“Veripic”) has moved to enjoin 18 defendant Foray Technologies LLC (“Foray”) from making certain public representations that allegedly 19 constitute false advertising under § 43(a) of the Lanham Act and under California law. Foray has filed 20 an opposition, and Veripic has replied. The Court held a hearing on the motion on December 17, 2012. 21 Having considered the parties’ arguments, the Court hereby DENIES plaintiff’s motion for a preliminary 22 injunction, for the reasons discussed below. 23 24 BACKGROUND 25 Veripic is a California corporation that provides software for handling digital evidence to police 26 and fire departments, as well as to other entities that need to store and retrieve photos, video, and audio 27 files. First Amended Complaint (“FAC”) ¶ 1, 7, 9. Veripic and Foray are direct competitors in the 28 digital evidence-related software market, which mainly consists of law enforcement agencies. Id. ¶ 9. 1 Veripic’s complaint states seven causes of action against Foray: (1) copyright infringement; (2) 2 inducement of breach of contract; (3) contributory and induced copyright infringement; (4) violation 3 of the Digital Millennium Copyright Act; (5) false advertising and unfair competition under the Lanham 4 Act; (6) false advertising under California Law; and (7) unfair competition under California Law. 5 However, Veripic’s instant motion only seeks to enjoin Foray’s behavior with respect to allegations of 6 false advertising under § 43(a) of the Lanham Act (15 U.S.C. § 1125(a)) and under Cal. Bus. & Prof. 7 Code § 17500, et seq. Veripic produces and sells the “Digital Photo Lab” (“DPL”) software, which is “a centerpiece 9 of its digital evidence management suite designed for law enforcement agencies.” FAC ¶ 8. The “most 10 United States District Court For the Northern District of California 8 popular” feature of Veripic’s DPL software is the “Calibration Module,” which permits users to measure 11 the real life length of objects (in inches or metric units) or distances between objects in a photo using 12 a “simple point and click.” Id. ¶ 10. As a result, users can know the precise distances within photos and 13 accurately print life-size or scaled images. Id. ¶ 11. 14 Foray produces and sells the Authenticated Digital Asset Management System (“ADAMS”) 15 software to the same customer base as Veripic targets with its DPL software.1 Id. ¶ 9. Foray’s ADAMS 16 software has an “Image Calibration Utility” that performs substantially the same function as Veripic’s 17 “Calibration Module” – to allow users to accurately abstract real-life distance from a photo. Id. ¶ 15-16. 18 However, until July 2009, Foray’s Utility did so in a more “cumbersome” way than Veripic’s “simple 19 point and click” method. Id. Foray’s Utility required customers to know the exact real life horizontal 20 or vertical distance in a photo and to engage in a “multi-step process” in order to obtain real life 21 measurements. Id. ¶ 16. 22 The ADAMS software employs a “hash function,” which allows the user to validate whether a 23 piece of digital evidence has been manipulated or altered between the time it is entered into the ADAMS 24 software system and a later time when a user wishes to make use of that piece of digital evidence. Id. 25 ¶ 32. Veripic’s DPL software has technology that allows the user to validate not only whether digital 26 27 28 1 Although “ADAMS” originally referred to the software at issue in this case, Foray now uses “ADAMS” to cross-brand a suite of related products, including ADAMS Property & Evidence, ADAMS Crime Scene Photo/Video, ADAMS Bag & Tag, ADAMS Latent/ACE-V, and ADAMS Video Interview. 2 1 evidence has been altered since it was entered in the Veripic software system, but also whether the 2 digital evidence has been altered from the moment the picture was originally taken. The gravamen of Veripic’s false advertising claim is that since 2008, Foray has misled the public 4 about certain industry standards and the capabilities of Foray’s own software, and by implication, the 5 capabilities of Veripic’s similar software, insofar as they comply with those standards. FAC ¶ 22-39. 6 In particular, it is alleged that Foray falsely represents that its ADAMS software has the ability to 7 “authenticate” images consistent with guidelines propounded by the Scientific Working Group on 8 Imaging Technology (“SWGIT”). Id. ¶ 23-24. Accordingly, Veripic now seeks to enjoin Foray from 9 (1) using the name “Authenticated Digital Asset Management System” or “ADAMS” or any other name 10 United States District Court For the Northern District of California 3 that states or implies that Foray’s software authenticates digital assets; (2) stating that Foray’s software 11 authenticates digital assets; (3) representing that SWGIT guidelines endorse the use of hash functions 12 as the best way to authenticate digital assets and that Foray’s software complies with SWGIT guidelines; 13 and (4) stating that Foray’s software is the only software that complies with the SWGIT “requirement” 14 contained in the workflow described in SWGIT Section 13. If successful on this motion, Veripic also 15 requests that Foray post in a prominent place on the landing site of its website that it has been 16 preliminarily enjoined from making the above statements and linking a copy of the Court’s order 17 granting the motion. 18 19 LEGAL STANDARD 20 “A plaintiff seeking a preliminary injunction must establish that he is likely to succeed on the 21 merits, that he is likely to suffer irreparable harm in the absence of preliminary relief, that the balance 22 of equities tips in his favor, and that an injunction is in the public interest.” Winter v. Nat. Res. Def. 23 Council, Inc., 555 U.S. 7, 20 (2008). A preliminary injunction is an extraordinary remedy never 24 awarded as of right. Id. at 24 (citing Munaf v. Geren, 553 U.S. 674, 689-690, (2008)). In each case, 25 courts “must balance the competing claims of injury and must consider the effect on each party of the 26 granting or withholding of the requested relief.” Winter v. Nat. Res. Def. Council, Inc., 555 U.S. at 24 27 (citing Amoco Production Co. v. Village of Gambell, AK, 480 U.S. 531, 542 (1987)). 28 3 DISCUSSION 1 2 Veripic contends that an injunction is necessary in order to prevent a loss of prospective 3 customers and damage to its goodwill. Veripic also contends that Foray’s misrepresentations threaten 4 the effectiveness of criminal investigations and prosecutions nationwide, where law enforcement 5 officials are erroneously relying on evidence management software that is not capable of doing what 6 it purports to do. Foray responds that Veripic’s fears are overstated because the purchasers are highly 7 sophisticated consumers capable of discerning whether the product they purchased is actually capable 8 of performing the functions it purports to perform. More important, Foray denies that the three “false” 9 statements at issue here are literally false, as required by the Lanham Act. Therefore, Foray contends United States District Court For the Northern District of California 10 that Veripic has no likelihood of success on the merits. It is to that first issue the Court now turns. 11 12 1. Likelihood of Success on the Merits 13 To succeed on a claim of false advertising under the Lanham Act, the plaintiff must show that: 14 (1) the defendant made a false statement either about its own or another’s product; (2) in a commercial 15 advertisement; (3) that deceived or has the tendency to deceive a substantial segment of its audience; 16 (4) that the deception is material, in that it is likely to influence the purchasing decision; (5) that the 17 defendant caused its false statement to enter interstate commerce; and (6) plaintiff has been or is likely 18 to be injured as a result of the false statement, either by direct diversion of sales from itself to the 19 defendant, or by a lessening of the goodwill associated with plaintiff’s product. Newcal Indus., Inc. v. 20 Ikon Office Solutions, 513 F.3d 1038, 1052 (9th Cir. 2008).2 21 To demonstrate falsity within the meaning of the Lanham Act, a plaintiff may show that the 22 statement was literally false, either on its face or by necessary implication, or that the statement was 23 literally true but likely to mislead or confuse consumers. Southland Sod Farms v. Stover Seed Co., 108 24 F.3d 1134, 1139 (9th Cir. 1997). To be “literally false” the statement must be unambiguously false. 25 In re Century 21-RE/MAX Real Estate Adver. Claims Litig., 882 F. Supp. 915, 923 (C.D. Cal. 1994). 26 27 28 2 The parties agree that false advertising under California law requires the same showing of falsity as the Lanham Act. 4 When evaluating statements for literal falsity, the statements should be analyzed in their full 2 context. Southland Sod Farms,108 F.3d at 1139. Where the statements were made to sophisticated 3 consumers with unique background knowledge and experience, the court should consider that as part 4 of the relevant context. See, e.g.,Core-Vent Corp. v. Nobel Industries, 163 F.3d 605, at * 4 (9th Cir. 5 1998) (unpub.) (“Of course, we do not ignore the context in which these studies were presented ( . . . 6 to a professional conference and . . . in a scientific journal); Campagnolo S.R.L. v. Full Speed Ahead, 7 Inc., 2010 U.S. Dist. LEXIS 46176, at *18 (W.D. Wash. May 11, 2010) ( to determine literal falsity, 8 “the first question is: what does the person to whom the advertisement is addressed find to be the 9 message?”); Utah Medical Products v. Clinical Innovations, 79 F. Supp. 2d 1290, 1309 (D. Utah 1999) 10 United States District Court For the Northern District of California 1 (“While actual consumer confusion is not necessary to assert a claim of literal falsity, the perspective 11 of the relevant consumer population is necessary in determining whether the advertising could be 12 viewed as false.”). 13 Three statements are at the heart of Veripic’s false advertising claim. Foray contends that 14 Veripic cannot establish falsity, materiality, and injury for any of the three statements. As to falsity, 15 Veripic contends only that the statements are literally false. Veripic does not present any evidence that, 16 in the alternative, the statements misled, confused, or deceived consumers. All three statements revolve 17 around the meaning of the term “authenticity” as that term is understood by law enforcement customers 18 and others in the market for digital evidence management software. 19 20 A. 21 Veripic alleges that Foray has disseminated the following false statement in advertisements and 22 responses to requests for proposals: “Foray’s ADAMS software is the only software that complies with 23 the SWGIT ‘requirement’ contained in the workflow described in Section 13, Best Practices for 24 Maintaining the Integrity of Digital Images and Digital Video of the SWGIT Guidelines.” Mot. at 7. 25 Connected with that statement, Foray also advertises “NOTE: While some vendors may claim they are 26 ASCLD or SWGIT compliant, no other digital evidence management vendor complies with the SWGIT 27 workflow #2 [described in Section 13 of the SWGIT Guidelines]. ONLY the FORAY ADAMS solution Statement One 28 5 1 meets this requirement!” Id. at 9. Foray made these statements to law enforcement agencies in Oakland 2 County, Michigan and Seattle, Washington. Kwan Decl., Exs. A, B. 3 Veripic argues that this statement is literally false in two ways: (1) the Section 13 SWGIT 4 workflow (“Section 13”) referenced in Foray’s advertisement is not a “requirement,” but rather it is 5 “workflow #2” of four “example” workflows listed in that section; (2) the word “only” is literally false 6 because ADAMS is not alone among software consistent with this workflow, since Veripic’s DPL 7 software is also consistent with this workflow. Foray contends that this statement is accurate in its 8 context. The “requirement” at issue here is referred to as an “example” in the SWGIT workflow. Siegel 10 United States District Court For the Northern District of California 9 Decl., Ex 1 at 4. Each “workflow” is simply a list of steps users may take in order to achieve some 11 software objective. SWGIT describes these workflows as “best practices” and prefaces that, “[t]he 12 following . . . list of specific workflow examples . . . is not exhaustive as each situation requires tailoring 13 a specific process that should be outlined in an organization’s SOPs.” Id. Veripic contends that calling 14 an example a “requirement” is literally false. Foray argues that its use of “requirement” does not mean 15 that its software is the only way to be consistent with the SWGIT workflow. Rather, its ADAMS 16 software is one known way to comply with SWGIT. In context, the Court agrees with Foray. The 17 Oxford English Dictionary defines “requirement” as “something wanted or needed.” Oxford English 18 Dictionary, 3d Ed. Here, Foray states that its use of “requirement” is intended to convey that its 19 software uses a series of steps known to be wanted or needed by the example workflow – i.e, consistent 20 with it, as it is written. Foray argues that its use of “requirement” does not exclude the possibility that 21 others can add or change steps in the workflow. Its use here only guarantees to customers that Foray’s 22 software, at a minimum, is consistent with the example. 23 Veripic also takes issue with Foray’s assertion that only its ADAMS software complies with 24 workflow #2. Veripic contends that this use of “only” is literally false because Veripic’s DPL software 25 also “fits within the same workflow.” Mot. at 10. However, Veripic undercuts its argument in the very 26 same sentence, noting that in complying with the workflow, DPL “also provides other features to ensure 27 the integrity of digital evidence stored in its stems.” Id. Veripic’s product cannot be literally consistent 28 with the workflow where its product deviates from the steps listed in that workflow in order to “provide 6 other features.” Foray contends that it uses “only” to mean that its software is the only one that meets 2 the workflow’s specific series of steps, not its general outcome. As Foray points out, the left column 3 of workflow #2 describes a series of steps in which copies of the original image are created, so that 4 processing functions can be performed in an outside program, while maintaining the original image. 5 See Kwan Decl., Ex. A at 13. In other words, the user can make working copies of digital files and work 6 on them in other imaging software, such as Adobe Photoshop. Veripic specifically eschewed this 7 process as cumbersome and brags that its DPL “has methods for enhancing images without changing 8 the actual file, and without creating messy duplicates, allowing you to enhance your evidence but never 9 compromise it.” Witzke Decl., Ex. A. Thus, Veripic’s DPL software does not simply have “other 10 United States District Court For the Northern District of California 1 features.” Rather, it has an entirely different, perhaps better or simpler method for achieving the 11 outcome described in workflow #2, that nonetheless does not literally comply with it. Moreover, Foray 12 has shown that it literally complies with the specific set of steps described in the workflow, regardless 13 of whether other workflows can be designed to achieve the same outcome. Therefore, the Court cannot 14 say that Veripic is likely to succeed on the merits of its Lanham Act claim with respect to this statement, 15 where it has not made a threshold showing of literal falsity. 16 17 B. 18 Veripic argues that Foray’s statement “that its ADAMS software complied with SWGIT 19 guidelines that state that the use of a hash function is the best way to authenticate digital assets” is also 20 literally false. According to Veripic, hash functions do not allow a user to authenticate, as SWGIT uses 21 that term, but rather, hash functions validate integrity. Section 13 of the SWGIT guidelines, cited by 22 Foray in support of the above statement, is entitled “Best Practices for Maintaining the Integrity of 23 Digital Images and Digital Video.” Siegel Decl., Ex. 1. Veripic says this section has “nothing to do with 24 authenticating digital assets.” Mot. at 10. On Veripic’s reading, SWGIT guidelines draw a bright line 25 distinction between “integrity” and “authenticity.” SWGIT guidelines state, “authenticity differs 26 significantly from integrity.” Siegel Decl., Ex. 1. Accordingly, “[i]ntegrity ensures that the information 27 presented is complete and unaltered from the time of acquisition until its final disposition. For example, 28 the use of a hash function can verify that a copy of a digital image file is identical to the file from which Statement Two 7 1 it was copied, but it cannot demonstrate the veracity of the scene depicted in the image.” Id., Ex. 2. 2 Authenticating software, however, validates whether “a questioned image or video is an accurate 3 representation of the original data by some defined criteria.” Id. In response, Foray argues that there 4 are various industry understandings of “authenticity” and “integrity,” and that integrity as Veripic 5 defines it, is really a subset of authenticity. In other words, there are at least two types of authenticity: 6 (1) acquisition authenticity (what Veripic calls “integrity”), which ensures that the file itself has not 7 been changed since created or acquired; and (2) subject matter authenticity, which ensures that the photo 8 is what it purports to be, the substance of the photo has not been altered, and one can rely on the photo 9 to draw real world conclusions, such as distance and position. United States District Court For the Northern District of California 10 Although Veripic argues that the distinction between integrity and authenticity is inviolate, Foray 11 presents significant evidence that the terms are ambiguous, overlapping, and sometimes interchangeable. 12 Notwithstanding their warning that the terms are distinct, SWGIT’s guidelines, read in their entirety, 13 use those terms loosely and interchangeably. For example, in Section 13, SWGIT states “authentication 14 is the process of substantiating that the content is an accurate representation of what it purports to be.” 15 Siegel Decl., Ex. 1. Yet in Section 14, SWGIT refers to authenticity, stating, “[i]n the absence of a 16 witness who can testify to the origin of a questioned image or video, it may be possible for an examiner 17 to authenticate such data by identifying its origin.” Id. Ex. 2. In other words, Section 14 suggests that 18 authentication requires confirmation of the origin of data, which is precisely what Veripic says is part 19 of integrity validation, not authentication. In fact, how would one know that data is an accurate 20 representation of what it purports to be (Veripic’s “authenticity”) without necessarily confirming that 21 the data is complete and unaltered (Veripic’s “integrity”) since its creation? Veripic’s own promotional 22 materials define Foray’s ADAMS as “acquisition authentication” software, which “refers to knowing 23 that a photo hasn’t changed starting from when it enters the computer moving forward.” Witzke Decl., 24 ¶ 7, Ex. A, VeriPic FAQ ¶ 2 (emphasis in original). 25 Moreover, law enforcement professionals in the industry use authenticity in a variety of ways, 26 some of which are consistent with what Foray claims its ADAMS software actually does. According 27 to Foray’s expert Kerri McClary, “authenticate” frequently refers to the various steps taken when 28 capturing, processing and handling digital photographs to maintain their “authenticity” in order to 8 1 provide a foundation in court that the digital photograph accurately portrays the scene.3 McClary Decl., 2 ¶ 5. Veripic’s rebuttal declaration by Richard McEvoy, Jr., does not actually dispute this. See McEvoy 3 Decl., ¶ 10 (“procedures for authentication of digital evidence must encompass the entire lifespan of that 4 evidence . . . ”). Authenticity in the legal evidentiary context encompasses both acquisition and subject 5 matter authenticity, i.e., a witness may testify that a photo accurately depicts the then-existing reality, 6 and also by implication, that the photo file has not been manipulated. The evidence presented by the parties demonstrates that at best, that term authenticity is 8 ambiguous as used in Foray’s public statements. The SWGIT definition cited by Veripic states that 9 authentication is used “to discern if a questioned image or video is an accurate representation of the 10 United States District Court For the Northern District of California 7 original data by some defined criteria.” Siegel Decl., Ex. 2. However, SWGIT Guidelines nowhere 11 define the criteria. Accordingly, Veripic has not shown that there is a clear-cut definition of authenticity 12 from which Foray’s statements clearly and unambiguously deviate. Customers in the market for 13 “authenticating” software have multiple understandings of what authenticating software is capable of 14 doing and what criteria to use to set authentication expectations. Sellers and industry experts similarly 15 have multiple understandings. Given this ambiguity, the Court cannot say that Veripic is likely to 16 succeed on the merits of its Lanham Act claim based on this statement. 17 18 C. Statement Three 19 The third Foray statement Veripic alleges is literally false is that the “ADAMS software 20 ‘authenticates’ digital assets” and that therefore, Foray misleads consumer in naming its software 21 “Authenticated Digital Asset Management System” (i.e., ADAMS). The view that its software 22 authenticates is “a foundational part of Foray’s markets and sales of its software.” Mot. at 12. In 23 support, Veripic cites the signature block of Foray employee emails, which describe Foray as offering 24 “image authentication solutions.” Kwan Decl., Ex. E. This signature block, noting that Foray offers 25 “solutions” plural, actually supports Foray’s contention that it uses authentication to refer to its suite 26 of products that involve not just crime scene photographs, but also latent fingerprints, footwear 27 28 3 Veripic’s evidentiary objection to the McClary declaration, that it was unsigned, is OVERRULED. Foray has properly validated the signature. See Docket No. 47. 9 1 impressions, blood spatter, and other kinds of evidence that its software authenticates, as industry 2 consumers think of that term. Moreover, the Court has already discussed why Veripic has not 3 demonstrated literal falsity by using SWGIT guidelines as the standard from which Foray’s claims of 4 authenticity deviate. Veripic contends that Foray’s definition of authenticity is also inconsistent with the way the 6 National Institute of Standards and Technology (“NIST”) uses that term. Foray advertises that, “[o]nly 7 Foray Technologies uses a SHA-256 secure hash algorithm, which is the current NIST standard (NIST 8 FIPTS 180-2 Secure Hash Algorithm) for authenticating digital evidence.” Kwan Decl., Ex. A. NIST 9 FIPTS 180-02 has four algorithms, SHA-1, SHA-256, SHA-384, and SHA-512. Id., Ex. D. These 10 United States District Court For the Northern District of California 5 algorithms, including SHA-256, “produce a condensed representation” of a computer file called a 11 “message digest.” Id. And the message digest for each computer file is unique. Id. Thus, software can 12 deduce whether a file has been altered by comparing message digests at different points in the life of 13 a file. And according to NIST, “[t]hese algorithms enable the determination of a message’s integrity.” 14 Id. Thus, Veripic contends that nowhere does NIST FIPTS 180-2 state that these algorithms have 15 anything to do with authentication. 16 NIST does mention authentication in the very next sentence, stating that message digests help 17 generate “authentication codes,” which are part of confirming “integrity.” Kwan Decl, Ex. D. Thus, 18 rather than resolve the ambiguity, Veripic’s reference to NIST only exacerbates it. Foray points to 19 evidence from an October 2, 2012, press release in which NIST announced the winner of its five-year 20 competition to find a new cryptographic hash algorithm, where it wrote, “[h]ash algorithms are use 21 widely for cryptographic applications that ensure the authenticity of digital documents, such as digital 22 signatures and message authentication codes.” Hennings Decl., ¶ 5, Ex. A. Moreover, Veripic’s 23 president, John Kwan, used a similar understanding of authentication in a patent application, stating, 24 “[t]his invention relates to methods of data authentication and more particularly, but not exclusively, 25 provides a system and method for creating, attaching, and using [hash functions] of digital data to 26 authenticate the claim.” Hennings Decl., ¶ 6, Ex. B. 27 Veripic argues that Foray has for years used NIST and SWGIT as reference points to frame the 28 meaning of “authentication” and it cannot now disclaim that use. As an example, Veripic points to a 10 1 presentation by Foray’s vice president of program management, David Witzke, to the International 2 Association for Identification, wherein he states that SWGIT “provide[s] us with the guidelines for the 3 processing of anything digital.” Wu Decl., ¶¶ 3-4, Ex. W1. But later in that presentation, consistent 4 with Foray’s position here, Witzke states, “[u]nder section 13 of the SWGIT guidelines we actually get 5 into some of the requirements for tracking and maintaining the authentication of images.” Id. In other 6 words, Foray is suggesting publicly that it understands SWGIT Section 13 to address acquisition 7 authenticity. Given the state of the evidence, Foray’s use of authenticity in its advertising is far from being 9 literally false, understood in context. Veripic relies on a hair splitting, literal reading of NIST and 10 United States District Court For the Northern District of California 8 SWGIT statements that are themselves inconsistent or ambiguous. Accordingly, Veripic has not offered 11 evidence sufficient to justify an injunction because it has not shown likely success on the merits. 12 Because Veripic is unlikely to be able to show falsity, the Court need not address the parties’ additional 13 arguments regarding materiality and injury, except to say that Veripic’s arguments here likewise appear 14 to be weak. Similarly, the Court need not address Foray’s argument that Veripic has unclean hands, 15 and that Veripic’s authentication argument is actually an undeclared trademark infringement action. 16 17 2. Irreparable Harm 18 Plaintiffs must also establish a likelihood that they will suffer irreparable harm absent injunctive 19 relief. Winter v. Natural Resources Defense Council, 555 U.S. 7, 20 (2008). In particular, plaintiffs 20 must establish that “remedies available at law, such as monetary damages, are inadequate to compensate 21 for that injury.” Boomerangit, Inc. v. ID Armor, Inc., 2012 U.S. Dist. LEXIS 86382, at *11 (N.D. Cal. 22 June 21, 2012). 23 Veripic’s theory of irreparable harm is that it will lose prospective customers and business 24 goodwill. While goodwill and loss of prospective customers may sometimes support a finding of 25 irreparable harm, see Stuhlbarg Int’l Sale Co. v. John D. Brush & Co., 240 F.3d 832, 841 (9th Cir. 26 2001), Veripic has presented no evidence of actual losses. At best, it presents a speculative declaration 27 from its company president in which he states that six customers have told Veripic that it was their 28 understanding that “Foray authenticated digital images in the same manner as Veripic.” Kwan Decl. 11 ¶ 25. Moreover, Kwan states that he only recently became aware of what Foray was telling customers 2 to deceive them into believing Foray authenticates digital images. Id. ¶ 26. And “on information and 3 belief,” Kwan believes that Veripic has lost several customers to whom Foray previously sent an 4 advertisement regarding Foray’s alleged compliance with SWGIT Section 13’s “requirement.” Id. ¶ 27. 5 Veripic’s arguments are unavailing for several reasons. First, as to the urgency of an injunction, 6 Veripic was made aware, or should have been aware of, Foray’s alleged misrepresentations since at least 7 June 1, 2011, when the City of Seattle made available to Veripic the Foray request for proposal response 8 that contains the offending statements. See Kwan Decl., ¶ 8, Ex. B. Such a delay hardly bespeaks of 9 the urgency typical in successful preliminary injunction motions. See Oakland Tribune, Inc. v. 10 United States District Court For the Northern District of California 1 Chronicle Pub. Co., Inc. 762 F.2d 1374 (9th Cir. 1985) (“Plaintiff’s long standing delay seeking a 11 preliminary injunction implies a lack of urgency and irreparable harm.”). Second, Veripic fails to 12 present any evidence tending to show that the loss of customers is anything more than speculation or 13 the result of legitimate competition. In fact, most customers purchase one of these competing software 14 suites only after first reviewing responses to requests for proposals, company presentations and 15 extensive research. Thus, any loss of customers may be due to the fact that as between ADAMS and 16 DPL, customers with knowledge of the differences between the products – whether called integrity 17 validation or authentication – prefer one brand over the other. 18 19 Veripic has not shown that the harm it imagines is more than speculative. Accordingly, it has not shown irreparable harm sufficient to justify a preliminary injunction. 20 21 3. Balance of Hardships 22 Veripic seeks a broad, five part injunction, wherein Foray would be enjoined from (1) using the 23 name “Authenticated Digital Asset Management System” or “ADAMS” or any other name that states 24 or implies that Foray’s software authenticates digital assets; (2) stating that Foray’s software 25 authenticates digital assets; (3) representing that SWGIT guidelines endorse the use of hash functions 26 as the best way to authenticate digital assets and that Foray’s software complies with SWGIT guidelines; 27 and (4) stating that Foray’s software is the only software that complies with the SWGIT “requirement” 28 contained in the workflow described in SWGIT Section 13. Veripic also requests that Foray post in a 12 1 prominent place on the landing site of its website that it has been preliminarily enjoined from making 2 the above statements and linking a copy of the Court’s order granting the motion. 3 The scope of the relief sought goes far beyond preserving the status quo before trial. Veripic 4 effectively proposes that Foray discontinue or change the entire branding of its products. As Foray 5 states, this would end its business during the pendency of this case. Such drastic relief cannot be 6 supported only by speculation that future customers may not purchase Veripic products. 7 8 4. Public Interest Veripic has not made a sufficient showing that the injunction it seeks is in the public interest. 10 United States District Court For the Northern District of California 9 Veripic is correct that there may be crucial legal implications of having law enforcement erroneously 11 rely on software that does not do what it purports to do. Veripic contends that ultimately, evidence may 12 be thrown out of court because it was not properly authenticated. Mot. at 21. This concern, however, 13 is overstated and unsupported. Here, sophisticated customers invest significant time and energy into 14 purchasing this software, and also have precise understandings of what they need that software to be 15 able to do in order to gather, store, and validate evidence in a legal setting. Veripic presents no evidence 16 to the contrary. Therefore, Veripic has not stated a compelling public interest in an injunction. 17 18 CONCLUSION 19 For the foregoing reasons, Veripic has not shown that an injunction should issue. Accordingly, 20 the Court hereby DENIES Veripic’s motion for a preliminary injunction. The Court also DENIES as 21 MOOT Foray’s motion for leave to file a declaration and deposition testimony and DENIES as untimely 22 Veripic’s administrative motion for leave to file supplemental evidence. This order resolves Docket 23 Nos. 22, 48 and 52. 24 25 IT IS SO ORDERED. 26 27 SUSAN ILLSTON United States District Judge Dated: January 22, 2013 28 13

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?