Synopsys, Inc. v. Atoptech, Inc
Filing
42
Order by Hon. Samuel Conti granting in part and denying in part 9 Motion to Dismiss.(sclc2, COURT STAFF) (Filed on 10/24/2013)
1
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE NORTHERN DISTRICT OF CALIFORNIA
8
9
United States District Court
For the Northern District of California
SYNOPSYS, INC.
10
Plaintiff,
11
v.
12
ATOPTECH, INC.
13
Defendant.
14
15
16
)
)
)
)
)
)
)
)
)
)
)
)
)
)
)
)
Case No. C 13-2965 SC
ORDER GRANTING IN PART AND
DENYING IN PART DEFENDANT'S
MOTION TO DISMISS
17
18
19
I.
20
INTRODUCTION
Now before the Court is Defendant ATopTech, Inc.'s
21
("Defendant") motion to dismiss Plaintiff Synopsys, Inc.'s
22
("Plaintiff") complaint.
23
Defendant moves in the alternative for a more definite statement.
24
The motion is fully briefed, ECF Nos. 24 ("Opp'n"), 32 ("Reply"),
25
and appropriate for decision without oral argument, Civ. L.R. 7-
26
1(b).
27
dismiss.
28
///
ECF Nos. 1 ("Compl."), 9 ("MTD").
As explained below, the Court GRANTS Defendant's motion to
1
II. BACKGROUND
Plaintiff is an electronic design automation ("EDA") company.
2
3
Compl. ¶ 2.
It creates, manufactures, sells, and licenses products
4
and services that enable circuit designers to create, model, and
5
verify complex integrated circuit designs "from concept to
6
silicon."
7
analysis tool" called "PrimeTime" and a piece of software called
8
"IC Compiler."
9
expected timing of a digital circuit without requiring simulation."
Id.
Among Plaintiff's products are a "static timing
Id. ¶¶ 2, 16, 17, 39.
PrimeTime "computes the
United States District Court
For the Northern District of California
10
Id. ¶ 17.
It includes "hundreds of . . . input formats and output
11
formats" that "are proprietary to [Plaintiff] and are not part of
12
any open format or standard."
13
EDA company called Extreme DA Corporation ("Extreme DA"), the
14
developer of a static timing analysis tool called "GoldTime."
15
¶¶ 4, 20.
16
PrimeTime.
17
and documentation collectively the "Copyrighted Software," but does
18
not make clear whether IC Compiler is included in that group.
19
id. ¶ 48.
Id. ¶ 18.
Plaintiff also owns an
Id.
GoldTime is similar to (and incorporates parts of)
Id.
Plaintiff calls GoldTime and PrimeTime's software
See
The input formats, which Plaintiff sometimes calls a "command
20
21
set," are used within larger "scripts" executed by PrimeTime.
Id.
22
¶ 18.
23
Id.
24
("Synopsys Design Constraints" or "SDC") that is separate from the
25
compilation of Plaintiff-proprietary input formats and are used to
26
provide a standard interface that developers can use to create
27
products that are interoperable with PrimeTime or other SDC-
28
compliant EDA tools.
PrimeTime provides feedback to the user via output formats.
PrimeTime also supports a set of open-source commands
Id. ¶ 19.
SDC is available under a free,
2
1
open-source license.
Id.
Plaintiff asserts that its input and output formats, scripts,
2
3
and technical product documentation for the products described
4
above are all confidential, proprietary trade secrets.
5
According to Plaintiff, for example, its software and documentation
6
contain proprietary rights notices, and users of Plaintiff's
7
software and documentation are governed by end-user license
8
agreements ("EULAs") that restrict the users' access to and use of
9
Plaintiff's materials.
Id. ¶¶ 21-22.
Id. ¶ 21.
Plaintiff also uses a
United States District Court
For the Northern District of California
10
variety of physical and electronic security systems to protect its
11
facilities, websites, computers, and communications systems.
12
22.
13
protection systems, encrypted communications technology and vendor,
14
customer and employee non-disclosure agreements."
15
Id. ¶
These protective measures include "access cards, password
Id.
Plaintiff owns all rights to, and has obtained federal
16
copyright registration for, the PrimeTime and GoldTime software and
17
user documentation.
18
Registrations").
19
technologies and techniques related to integrated circuit design.
20
Id. ¶ 24; Exs. 6 ("'348 Patent"), 7 ("'941 Patent"), 8 ("'127
21
Patent"), 9 ("'967 Patent") (collectively the "Patents-in-Suit").
22
Defendant is an EDA company that develops tools for the
Id. ¶¶ 23-24; Compl. Exs. 1-5 ("Copyright
Plaintiff also possesses several patents on
23
physical design of integrated circuits at sixty-five nanometers and
24
below.
25
and route" tool and the "Apogee" "floor-planning" tool.
26
Defendant entered two license agreements with Plaintiff: (1) a
27
Connections Program License Agreement (the "CPLA"), and (2) a
28
license agreement related to a method for parametric on-chip
Id. ¶ 3.
Among these tools are Defendant's "Aprisa" "place
3
Id.
1
variation (the "POCV License") (collectively the "License
2
Agreements").
Id. ¶ 4.
Defendant had originally entered the CPLA with Extreme DA,
3
4
for use of GoldTime, but Plaintiff acquired Extreme DA -- along
5
with all of its intellectual property and rights under the CPLA --
6
in June 2010.
7
Id.
8
and its documentation (and, by extension, the parts of the
9
PrimeTime software and documentation that were incorporated into
Id. ¶ 31.
The CPLA expired on February 15, 2013.
Under the CPLA, Defendant gained access to copies of GoldTime
United States District Court
For the Northern District of California
10
GoldTime).
11
only a limited license to use GoldTime for "specific
12
interoperability purposes."
13
was forbidden from incorporating GoldTime into other software
14
products, reverse-engineering GoldTime, copying GoldTime (including
15
the input and output formats), and disclosing any confidential
16
information provided under the CPLA.
17
Id.
According to Plaintiff, the CPLA gave Defendant
Id. ¶ 33.
Under the CPLA, Defendant
Id.
Under the POCV License, Defendant gained a limited, non-
18
exclusive license to Extreme DA's proprietary POCV technology,
19
which included the '640 Patent.
20
technology to test timing effects resulting from manufacturing-
21
related variations in chips (e.g., variations related to process,
22
voltage, or temperature effects during manufacturing).
23
with the CPLA, Plaintiff obtained all of Extreme DA's rights to the
24
POCV technology, including all of the rights under the POCV
25
License.
26
Id. ¶ 34.
Defendant used this
Id.
As
Id.
Plaintiff alleges that while Defendant was receiving and using
27
Plaintiff's confidential information pursuant to the License
28
Agreements, Defendant "copied portions of the PrimeTime and
4
1
GoldTime software and documentation into Aprisa user documentation
2
and software."
3
portion of Aprisa documentation -- provided by [Defendant] --
4
revealing that Aprisa includes proprietary PrimeTime and GoldTime
5
input and output formats."
6
copying likely is widespread," as evidenced by Defendant's
7
statements that Aprisa has "excellent correlation with sign-off
8
timing" and "tight correlation" with Plaintiff's PrimeTime
9
software.
Id. ¶ 35.
Id. ¶ 36.
Plaintiff claims to possess "a small
Id.
According to Plaintiff, "[t]his
Plaintiff contends that "such correlation is
United States District Court
For the Northern District of California
10
not possible without copying significant portions of the PrimeTime
11
software."
12
Id.
Plaintiff also claims that Defendant "improperly accessed and
13
stole other . . . proprietary documentation, by downloading such
14
materials from [Plaintiff's] 'SolvNet' secure website without
15
permission."
16
website on which Plaintiff "hosts software, user guides, support
17
documentation, and other materials for customers and partners with
18
valid user IDs."
19
passwords must abide by various agreements signed by their
20
companies "regarding the confidential nature of all SolvNet
21
content."
22
Defendant had accessed SolvNet and "engaged in unauthorized access
23
to and downloading of articles, FAQs, and other documentation
24
related to PrimeTime and [IC Compiler]."
25
asserts that such access, downloading, and other use exceeded the
26
scope of Defendant's licenses.
27
Defendant's activity here was undertaken for commercial gain and
28
competitive advantage.
Id.
Id. ¶ 37.
SolvNet is a password-protected support
Id. ¶ 38.
Users who register for SolvNet
Plaintiff states that it discovered in 2013 that
Id.
Id. ¶ 40.
5
Id. ¶ 39.
Plaintiff
Plaintiff alleges that all of
1
Finally, Plaintiff states that on November 28, 2012, it
[A]greements, and thereafter diligently worked to commence and
4
complete the audit."
5
apparent fear that Defendant "wrongfully copied, used, and
6
disclosed portions of the PrimeTime and GoldTime software, and
7
otherwise breached the CPLA and POCV License Agreements."
8
Plaintiff contends that for months it attempted to work with
9
Defendant to establish compliance with the License Agreements, but
10
United States District Court
invoked "its rights to verify compliance under both [L]icense
3
For the Northern District of California
2
that Defendant "systematically frustrated and obstructed the audit
11
process."
12
with a notice of default under the POCV License, which Plaintiff
13
contends also put Defendant on notice of Plaintiff's belief that
14
Defendant had "copied proprietary PrimeTime and GoldTime command
15
sets into Aprisa, in violation of the CPLA agreement and
16
[Plaintiff's] valuable intellectual property rights, including
17
those covered by [Plaintiff's] PrimeTime and GoldTime federal
18
copyright registrations."
19
Id. ¶ 42.
Id. ¶ 41.
Plaintiff did so out of an
Id.
On May 8, 2013, Plaintiff served Defendant
Id. ¶¶ 43-44.
Plaintiff set a June 10 deadline for the completion of its
20
audit.
21
Plaintiff gave Defendant another opportunity to demonstrate "that
22
it had not copied and was in compliance with the license
23
agreements."
24
25
26
Id. ¶ 45.
Id. ¶ 46.
Defendant has not done so.
Id.
On the basis of these facts, Plaintiff asserts the following
twelve causes of action against Defendant:
(1)
copyright infringement under the Copyright Act, 17 U.S.C.
§ 101 et seq.;
27
28
The deadline passed, and one week later
(2)
trade secret misappropriation under the California
6
1
Uniform Trade Secrets Act, Cal. Civ. Code § 3426 et
2
seq.;
3
(3)
'127, and '967 Patents;
4
5
(4)
violation of the Federal Computer Fraud and Abuse Act
("CFAA"), 18 U.S.C. § 1030(a)(2)(C);
6
7
four counts of patent infringement as to the '348, '941,
(5)
violation of California Penal Code section 502(c)(2), the
8
California Comprehensive Data Access and Fraud Act
9
("CDAFA");
United States District Court
For the Northern District of California
10
(6)
unfair and unlawful competition under California's Unfair
11
Competition Law, Cal. Bus. & Prof. Code § 17200 et
12
seq.;
13
(7)
common law misappropriation;
14
(8)
breach of the CPLA; and
15
(9)
breach of the implied covenant of good faith and fair
dealing.
16
17
Defendant now moves to dismiss Plaintiff's complaint, arguing that
18
Plaintiff fails to state claims under any cause of action.
19
20
21
III.
LEGAL STANDARD
A motion to dismiss under Federal Rule of Civil Procedure
22
12(b)(6) "tests the legal sufficiency of a claim."
Navarro v.
23
Block, 250 F.3d 729, 732 (9th Cir. 2001).
24
on the lack of a cognizable legal theory or the absence of
25
sufficient facts alleged under a cognizable legal theory."
26
Balistreri v. Pacifica Police Dep't, 901 F.2d 696, 699 (9th Cir.
27
1988).
28
should assume their veracity and then determine whether they
"Dismissal can be based
"When there are well-pleaded factual allegations, a court
7
1
plausibly give rise to an entitlement to relief."
Ashcroft v.
2
Iqbal, 556 U.S. 662, 679 (2009).
3
must accept as true all of the allegations contained in a complaint
4
is inapplicable to legal conclusions.
5
elements of a cause of action, supported by mere conclusory
6
statements, do not suffice."
7
Twombly, 550 U.S. 544, 555 (2007)).
8
complaint must be both "sufficiently detailed to give fair notice
9
to the opposing party of the nature of the claim so that the party
However, "the tenet that a court
Threadbare recitals of the
Id. (citing Bell Atl. Corp. v.
The allegations made in a
United States District Court
For the Northern District of California
10
may effectively defend against it" and "sufficiently plausible"
11
such that "it is not unfair to require the opposing party to be
12
subjected to the expense of discovery."
13
1202, 1216 (9th Cir. 2011).
Starr v. Baca, 652 F.3d
14
15
IV. DISCUSSION
16
As explained below, the Court dismisses Plaintiff's complaint
17
-- except portions of its copyright infringement and UCL claims --
18
with leave to amend.
19
impermissibly vague and conclusory.
In general, Plaintiff's pleadings are
20
A.
Copyright Infringement
21
A plaintiff claiming copyright infringement must plead: (1)
22
ownership of a valid copyright; and (2) that the defendant violated
23
the copyright owner's exclusive rights under the Copyright Act by
24
copying original elements of the work.
25
Feist Pubs., Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361
26
(1991); Wash. Shoe Co. v. A-Z Sporting Goods, Inc., 704 F.3d 668,
27
674 (9th Cir. 2012).
28
17 U.S.C. § 501(a) (2003);
Defendant argues that Plaintiff fails to allege facts
8
1
indicating access to or copying of any portion of the massive
2
amount of source code and documentation of the Copyrighted
3
Software.
4
sole point of specificity as to what Defendant allegedly copied --
5
Plaintiff's input and output formats -- is insufficient not only
6
because Plaintiff does not specify which formats Defendant copied,
7
but also because copyright does not extend to executable software
8
methods, systems, or processes so long as the line-by-line source
9
code is different, though this is necessarily a fact-dependent
MTD at 6.
Further, Defendant contends that Plaintiff's
United States District Court
For the Northern District of California
10
conclusion.
11
872 F. Supp. 2d 974, 1000 (N.D. Cal. 2012)).
12
claims that Plaintiff's allegations are mere speculation, since
13
Plaintiff pleads that "copying likely is widespread" due to
14
Defendant's advertisements that its software has, for example, a
15
"tight correlation" with Plaintiff's software.
16
Id. at 7-8 (citing Oracle Am., Inc. v. Google Inc.,
Finally, Defendant
Id. at 8.
Plaintiff responds that all it must do to survive a motion to
17
dismiss its claim for copyright infringement is to allege ownership
18
and infringement.
19
providing its copyright registrations and pleading that Defendant
20
had access to the Copyrighted Software and improperly incorporated
21
parts of it into its own software, Aprisa.
22
that the "correlation" of Defendant's software with Plaintiff's
23
would not be possible without copying "significant portions" of
24
PrimeTime, and that this is not mere speculation.
25
also claims that it need not plead with particularity either what
26
parts of its own software were copied, or what of Defendant's
27
software actually infringed.
Opp'n at 3-4.
Plaintiff asserts that it did so,
Id.
Id.
Plaintiff contends
Id.
Plaintiff
Requiring such specificity,
28
9
1
according to Plaintiff, would raise factual issues not appropriate
2
for the pleading stage.
Id. at 4-5.
3
The Court finds for Defendant on this point, except as to the
4
input and output formats that Plaintiff claims Defendant infringed
5
in the Aprisa software and documentation.
6
discussed below, Plaintiff never makes clear what Defendant copied,
7
which makes it impossible for the Court to find Plaintiff's claim
8
plausible.
9
copied, and prepared derivative works based on the Copyrighted
Apart from those works,
Plaintiff alleges simply that Defendant had access to,
United States District Court
For the Northern District of California
10
Software, in contravention of the CPLA.
Compl. ¶¶ 32-33, 38-39,
11
51.
12
allegation that Defendant's quotations about correlation support an
13
inference of copying.
14
However, Plaintiff muddles this claim by also asserting that parts
15
of its software and documentation are open-source, which makes its
16
contention that essentially all of its materials are under
17
Plaintiff's copyright protection less plausible.
18
hamstrings its complaint by simply speculating on how widespread
19
the copying may be, without describing any acts or works that
20
infringe Plaintiff's Copyrighted Software.
21
47-55.
22
particularity for its copyright claims, but those claims must be
23
plausible under Rule 8, Twombly, and Iqbal.
24
Tech. Corp. v. UPI Semiconductor Corp., No. 09-05659 WHA, 2011 WL
25
166198, at *3 (N.D. Cal. Jan. 18, 2011) (dismissing copyright
26
infringement claim for failure to identify acts and works
27
constituting infringement); Salt Optics, Inc. v. Jand, Inc., No.
28
SACV 10-0828 DOC, 2010 WL 4961702, at *6 (N.D. Cal. Nov. 19, 2010).
Plaintiff asserts that this pleading is enough, as is its
See Opp'n at 3-4 (citing Compl. ¶ 36).
Plaintiff further
See Compl. ¶¶ 35-36,
Plaintiff need not reach any heightened level of
10
See, e.g., Richtek
1
Plaintiff must plead some non-speculative facts about what
2
Defendant infringed and how.
3
infringement claim is DISMISSED with leave to amend, except as to
4
the input and output formats allegedly contained in Defendant's
5
Aprisa software and documentation.
6
Accordingly, Plaintiff's copyright
Plaintiff's claim as to those formats is sufficient to state a
7
claim at this point.
See Compl. ¶ 35.
Plaintiff states, in full,
8
"Synopsys is in possession of a small portion of Aprisa
9
documentation -- provided by ATopTech -- revealing that Aprisa
United States District Court
For the Northern District of California
10
includes proprietary PrimeTime and GoldTime input and output
11
formats."
12
these input and output formats from PrimeTime and GoldTime
13
documentation are copyrighted and were duplicated in Defendant's
14
materials, this portion of the complaint is sufficient enough,
15
taken as true, for Plaintiff to state a claim for copyright
16
infringement based on that limited set of materials.
17
Id.
Since Plaintiff has specifically asserted that
On this point, Defendant contends that the Court should find
18
as a matter of law that the input and output formats are not
19
protected under copyright, citing the decision in Oracle v. Google,
20
872 F. Supp. 2d at 997, in support of this contention.
21
decision came at the end of a long bench trial, and the facts as to
22
the input and output formats in that case had been fully developed
23
on the record.
24
Court declines to make a finding as a matter of law as to input and
25
output formats in general.
26
preclude Defendant from making a later motion on this matter.
See id. at 997-98.
That
At the pleading stage, the
This holding does not, of course,
27
Plaintiff's copyright infringement claim based on alleged
28
infringement of Plaintiff's input and output formats in Defendant's
11
1
Aprisa software and documentation is undisturbed.
2
The rest of the
claim is DISMISSED with leave to amend.
3
B.
Trade Secret Misappropriation
4
To plead a claim for trade secret misappropriation under the
5
California Uniform Trade Secrets Act ("CUTSA"), Cal. Civ. Code §
6
3426 et seq., a plaintiff must assert (1) the existence of a trade
7
secret, and (2) misappropriation of the trade secret.
8
DocMagic, Inc. v. Ellie Mae, Inc., 745 F. Supp. 2d 1119, 1145 (N.D.
9
Cal. 2010); Cal. Civ. Code § 3426.1(b).
See, e.g.,
A trade secret is
United States District Court
For the Northern District of California
10
"information, including a formula, pattern, compilation, program,
11
device, method, technique, or process, that: (1) derives
12
independent economic value, actual or potential, from not being
13
generally known to the public or to other persons who can obtain
14
economic value from its disclosure or use; and (2) is the subject
15
of efforts that are reasonable under the circumstances to maintain
16
its secrecy."
17
Cal. Civ. Code § 3426.1.
Before a defendant is compelled to respond to a complaint
upon claimed misappropriation or misuse of a trade secret
and to embark on discovery which may be both prolonged
and expensive, the complainant should describe the
subject matter of the trade secret with sufficient
particularity to separate it from matters of general
knowledge in the trade or of special knowledge of those
persons who are skilled in the trade, and to permit the
defendant to ascertain at least the boundaries within
which the secret lies.
18
19
20
21
22
23
24
Diodes, Inc. v. Franzen, 260 Cal. App. 2d 244, 253 (Cal. Ct. App.
25
1968). 1
26
1
27
28
A plaintiff alleging trade secret misappropriation need
Plaintiff argues that Diodes is inapposite because it predates
CUTSA and a later codification of a rule moving the obligation to
identify the precise trade secrets from the pleading stage to the
discovery stage. See Opp'n at 7. The Court is not convinced on
this point: "[F]ederal courts in the Ninth Circuit look to Diodes
12
1
not "spell out the details of the trade secret" but must identify
2
the trade secret with sufficient particularity to give defendants
3
"reasonable notice of the issues which must be met at the time of
4
trial and to provide reasonable guidance in ascertaining the scope
5
of appropriate discovery."
6
Id. at 252–53.
Defendant argues that Plaintiff neither identifies any trade
7
secrets nor pleads facts that Defendant acquired a trade secret
8
through "improper means" or other circumstances that would give
9
rise to CUTSA liability.
MTD at 8.
According to Defendant,
United States District Court
For the Northern District of California
10
Plaintiff's complaint simply points to everything Plaintiff has
11
created and claims everything is a trade secret.
12
(citing Compl. ¶¶ 18, 21-22, 33-35, 37-38, 40, 42, 44).
13
Defendant claims that because Plaintiff deposited its documentation
14
with the Copyright Office, that material would no longer constitute
15
trade secrets because such deposits are public.
16
See id. at 9
Further,
Id.
Plaintiff responds that its complaint specifically identifies
17
the misappropriated trade secrets as information disclosed and
18
subject matter claimed in Plaintiff's several copyright
19
registrations, including all of the material related to PrimeTime,
20
IC Compiler, GoldTime, and their documentation.
21
Compl. ¶¶ 16-18, 20-21, 24-30, 39).
22
did allege that Defendant used improper means to acquire the trade
23
secrets, since it pled that Defendant breached the parts of the
24
License Agreements that forbid it from incorporating Copyrighted
25
Software into its own products and from disclosing confidential
26
27
28
Id. at 6-7 (citing
Plaintiff then argues that it
for guidance on the applicable pleading standard for claims brought
under the CUTSA." Pellerin v. Honeywell, Int'l, Inc., 877 F. Supp.
2d 983, 988 n.1 (S.D. Cal. 2012); see also Farhang v. Indian Inst.
of Tech., Kharagpur, No. 08-02658 RMW, 2010 WL 2228936, at *13
(citing Diodes, 260 Cal. App. 2d at 253).
13
1
information under the License Agreements.
Id. at 8 (citing Compl.
2
¶ 33).
3
"improperly accessed and stole other . . . proprietary
4
documentation by downloading such materials from [Plaintiff's]
5
'SolvNet' secure website without permission."
6
¶ 37).
7
to protect its trade secrets' secrecy by redacting source code
8
submissions from its Copyright Office filings and employing
9
confidentiality agreements, but Plaintiff contends that in any
Plaintiff also notes that it alleged that Defendant
Id. (quoting Compl.
Plaintiff further states that it took reasonable measures
United States District Court
For the Northern District of California
10
event, this would be a factual issue inappropriate for resolution
11
on a motion to dismiss.
Id. at 8-9.
The Court finds for Defendant on this point.
12
First,
13
Plaintiff's complaint is impermissibly conclusory.
14
Plaintiff alleges that "its trade secrets at issue in this case,
15
which [have] been copied and misappropriated by [Defendant],
16
relates to [Plaintiff's] PrimeTime, GoldTime, and IC Compiler
17
products.
18
input and output formats, scripts, and technical product
19
documentation, which generally are not publicly known, and derive
20
value from being secret."
21
explicitly to Plaintiff's publicly available patents, which
22
Plaintiff improperly refers to as trade secrets.
23
(citing Compl. ¶¶ 25-29). 2
24
2
25
26
27
28
For instance,
Such information includes [Plaintiff's] proprietary
Compl. ¶ 21.
Other pleadings refer
See Opp'n at 7
These are conclusions of law disguised
Farhang held that a patent application cited in an otherwise
vague pleading regarding trade secrets could give reasonable notice
of the scope of a purported trade secret. See 2010 WL 2228936, at
*13. However, the patent applications in Farhang were unpublished
and not publicly available. Plaintiff's patents have issued and
been published. "[I]t is well established that disclosure of a
trade secret in a patent places the information comprising the
secret into the public domain. Once the information is in the
public domain and the element of secrecy is gone, the trade secret
14
1
as factual pleadings, and they do not state claims under Twombly
2
and Iqbal.
3
says they are: there must be some minimally plausible factual
4
explanation for why trade secret protection applies.
5
Materials are not trade secrets just because Plaintiff
Second, it is impossible for the Court, let alone Defendant,
any of this material (e.g., non-redacted portions of public
8
documents, open-source code, and so forth).
9
is too sweeping and vague for Defendant to be on notice of what
10
United States District Court
to determine where trade secret protection begins and ends as to
7
For the Northern District of California
6
trade secrets are at issue and where the boundary between those
11
secrets and general knowledge might lie.
12
2228936, at *13 (citing Diodes, 260 Cal. App. 2d at 253).
13
Plaintiff's complaint
See Farhang, 2010 WL
Plaintiff does refer, as in its copyright infringement claim,
14
to "input and output formats" being protected trade secrets, see ¶¶
15
18-21, which is an iota more precise than the rest of Plaintiff's
16
claims, but the Court finds that Plaintiff's pleading as to how
17
these formats are protected by trade secret law are impermissibly
18
conclusory.
19
secrets, but its vague references to an enormous array of potential
20
sources do not suffice to survive Defendant's motion to dismiss.
21
On this point, unlike in Plaintiff's copyright claim, more is
22
necessary.
23
the Court cannot determine which parts of Plaintiff's code and
24
documentation are supposed to be trade secrets and which parts are
25
publicly available, open source commands.
Plaintiff need not spell out every detail of its trade
For example, examining the manuals filed under seal,
See, e.g., Compl. ¶ 19
26
27
28
is extinguished . . . ." Ultimax Cement Mfg. Corp. v. CTS Cement
Mfg. Corp., 587 F.3d 1339, 1355 (Fed. Cir. 2009) (citation and
quotations omitted).
15
1
(PrimeTime includes open source commands that are distinct from
2
Plaintiff's proprietary code).
3
As to the question of whether Plaintiff's Copyright Office
4
filings are covered by trade secret protection, the Court cannot
5
make a broad finding at this point.
6
material and now claims that material as trade secrets, Plaintiff's
7
claims fail, since that material is publicly accessible.
8
e.g., KEMA, Inc. v. Koperwhats, No. C-09-1587 MMC, 2010 WL 726640,
9
at *4 (N.D. Cal. Mar. 1, 2010) (holding that source code filed with
If Plaintiff filed unredacted
See,
United States District Court
For the Northern District of California
10
the Copyright Office and not redacted can destroy secrecy required
11
under California trade secret law).
12
Copyright Office restricts access to deposited material, but that
13
is not quite true: the Copyright Office indeed places restrictions
14
on requests for reproductions, 37 C.F.R. § 202.20(d), but the same
15
restrictions do not necessarily apply to access and inspection.
16
See 17 U.S.C. § 705(b); see also 37 C.F.R. § 201.2(b)(1) (providing
17
for public "inspection [at the Copyright Office] of . . .
18
deposited in connection with a completed copyright registration").
19
The Court cannot as a matter of law say that restrictions on
20
copying will necessarily protect all publicly filed documents, when
21
those documents are readily accessible for public inspection.
22
KEMA, 2010 WL 726640, at *4.
23
some of its source code from the Copyright Office filings, which
24
could serve to protect trade secrets in some cases, 37 C.F.R. §
25
202.20(c)(2)(vii), but without even slightly more detailed
26
pleadings the Court cannot determine which parts of Plaintiff's
27
publicly filed materials may be trade secrets and which are not.
Plaintiff argues that the
material
See
Plaintiff claims that it redacted
28
16
Plaintiff's pleadings, unsupported by more facts, fail to
1
protected by trade secret law and therefore fail to "raise a right
4
to relief above the speculative level."
5
Plaintiff's trade secret misappropriation claim is DISMISSED with
6
leave to amend, per the guidelines given above.
7
concerned about maintaining its trade secrets' confidentiality,
8
Plaintiff may identify the alleged trade secrets in a sealed
9
filing.
10
United States District Court
provide a reasonable basis for inferring that the formats are
3
For the Northern District of California
2
C.
11
Plaintiff asserts a claim for common law misappropriation
Twombly, 550 U.S. at 555.
If Plaintiff is
Common Law Misappropriation
12
based on the allegation that Defendant improperly acquired, used,
13
and disclosed Plaintiff's Copyrighted Software and confidential and
14
proprietary information, including materials accessed and
15
downloaded from SolvNet.
16
claim in the alternative, "[t]o the extent that any portion of
17
[its] Copyrighted Software is found not to be protectable under
18
copyright or found not to be protectable trade secrets."
19
113.
20
Compl. ¶¶ 113-118.
Plaintiff makes this
Id. ¶
First, Defendant argues that this claim is preempted by CUTSA
21
because CUTSA preempts claims "based on the same nucleus of
22
operative facts" as trade secret claims, regardless of whether the
23
material in question meets the definition of a trade secret.
24
at 12 (citing K.C. Multimedia, Inc. v. Bank of America Tech. &
25
Ops., Inc., 171 Cal. App. 4th 939, 962 (Cal. Ct. App. 2009);
26
SunPower Corp. v. SolarCity Corp., No. 12-CV-694 LHK, 2012 WL
27
6160472, at *4-6 (N.D. Cal. Dec. 11, 2012)).
28
contends that the Copyright Act preempts this claim, since the
17
MTD
Second, Defendant
1
Copyright Act preempts state law causes of action if the work
2
involved falls within the Copyright Act's subject matter and the
3
rights the plaintiff asserts under state law are equivalent to
4
those established in the Copyright Act.
5
U.S.C. § 301(a)).
6
MTD at 13 (citing 17
Plaintiff responds that neither statute preempts its common
7
law misappropriation claim.
Opp'n at 9-10.
First, Plaintiff
8
argues that preemption is a factual issue inappropriate for
9
resolution at this stage, and that in any event, the facts at issue
United States District Court
For the Northern District of California
10
under the common law misappropriation claim are different from the
11
ones supporting the trade secret misappropriation claim.
12
10-11.
13
preempt the common law misappropriation claim because that cause of
14
action contains an "extra element" beyond what copyright law
15
requires: breach of a confidential relationship.
16
to both statutory preemption theories, Plaintiff argues that this
17
claim must survive in any event because Plaintiff pled it in the
18
alternative.
Id. at
Second, Plaintiff argues that the Copyright Act does not
Id. at 11-12.
Id. at 10-12.
19
The Court does not need to reach the copyright preemption
20
issue, because the Court finds that CUTSA preempts Plaintiff's
21
common law misappropriation claim.
22
Court does not find this to be an inappropriate factual dispute.
23
It is a pleading issue and is therefore entirely appropriate for
24
resolution on a Rule 12(b)(6) motion.
25
6160472, at *4-6 (resolving a similar dispute on the pleadings).
26
Moreover, preempted claims are not saved from preemption just
27
because they are pled in the alternative.
28
Blizzard, Inc., C 12-1096 CW, 2012 WL 5199505, at *4 (N.D. Cal.
18
As a threshold matter, the
See SunPower, 2012 WL
Lewis v. Activision
As
1
Oct. 22, 2012).
2
Court had found that portions of the Copyrighted Software were not
3
protectable under copyright or trade secret law -- which it did
4
not, as those dismissals were on pleading grounds -- Plaintiff's
5
claim would still be preempted.
6
In this case, as explained below, even if the
In reference to preemption:
7
8
9
United States District Court
For the Northern District of California
10
11
The preemption inquiry for those causes of action not
specifically
exempted
by §
3426.7(b) focuses
on
whether other claims are not more than a restatement
of the same operative facts supporting trade secret
misappropriation . . . If there is no material
distinction between the wrongdoing alleged in a
[C]UTSA claim and that alleged in a different claim,
the [C]UTSA claim preempts the other claim.
12
Farmers Ins. Exch. v. Steele Ins. Agency, Inc., No. 2:13-CV-0078413
MCE-DAD, 2013 WL 3872950, at *7 (E.D. Cal. July 25, 2013)
14
(quoting Convolve, Inc. v. Compaq Comp. Corp., No. 00 CV 5141(GBD),
15
2006 WL 839022, at *6 (S.D.N.Y. Mar. 31, 2006) (internal quotations
16
omitted) (applying California law)).
17
Plaintiff's argument on this point is that its common law
18
misappropriation claim is based on a different set of facts than
19
its CUTSA claim.
Opp'n at 10.
Plaintiff contends that its common
20
law misappropriation claim covers "additional proprietary technical
21
documents from SovlNet, materials which are not alleged to comprise
22
[Plaintiff's] misappropriation claim under CUTSA."
Id. at 11.
The
23
Court cannot discern this distinction from the pleadings.
24
Plaintiff's trade secret misappropriation claim, Compl. ¶¶ 5725
65, is so vague that it appears to encompass just about every piece
26
of material Plaintiff has ever created or acquired, leading that
27
claim to bleed into its common law misappropriation claim to the
28
19
1
point that the two become indistinct and overlapping.
2
CUTSA claim refers only to "trade secrets," which Plaintiff
3
indiscriminately defines throughout its complaint as (so far as the
4
Court can tell) code and documentation related to PrimeTime,
5
GoldTime, and IC Compiler, all of which -- except the IC Compiler
6
material -- would appear to be part of Plaintiff's Copyrighted
7
Software.
8
common law misappropriation claim in terms of its "Copyrighted
9
Software and confidential and proprietary information, including
See, e.g., id. ¶¶ 18-21, 41-44.
Plaintiff's
Plaintiff alleges its
United States District Court
For the Northern District of California
10
those materials improperly accessed and downloaded from SolvNet."
11
See id. ¶¶ 113-114.
12
were different from those at issue in the CUTSA misappropriation
13
claim, but while SolvNet may not be mentioned specifically in
14
Plaintiff's trade secret sections, throughout the complaint
15
Plaintiff never distinguishes the material on SolvNet from anything
16
else it claims to be a protected work.
17
This all suggests that Plaintiff's trade secret and common law
18
misappropriation claims concern the same material.
Plaintiff contends that the SolvNet materials
See, e.g., Compl. ¶¶ 37-40.
The Court can therefore see no distinction between those two
19
20
claims, except that Plaintiff pled the common law misappropriation
21
claim in the alternative.
22
Plaintiff's allegations, this pleading distinction is meaningless:
23
there is no way to distinguish Plaintiff's common law
24
misappropriation claim from its CUTSA claim.
25
same facts.
26
with leave to amend, if Plaintiff can distinguish it from its trade
27
secret misappropriation claim.
28
///
Absent any real distinction among any of
CUTSA preempts this claim.
20
They are based on the
It is therefore DISMISSED
1
D.
CFAA
2
The CFAA, 18 U.S.C. § 1030 et seq., establishes both civil and
3
criminal causes of action for an array of activities concerning
4
"protected computers," defined in relevant part as computers that
5
are "used in or affecting interstate or foreign commerce or
6
communication."
7
hackers who accessed computers to steal information or to disrupt
8
or destroy computer functionality, as well as criminals who
9
possessed the capacity to access and control high technology
Id. § 1030(e)(2).
The CFAA is "designed to target
United States District Court
For the Northern District of California
10
processes vital to our everyday lives."
LVRC Holdings LLC v.
11
Brekka, 581 F.3d 1127, 1130 (9th Cir. 2009).
12
recently made clear that the CFAA is not meant to serve as a
13
supplement or replacement for misappropriation claims.
14
States v. Nosal, 676 F.3d 854, 862-63 (9th Cir. 2012) (en banc).
15
To prevail in a civil action under the CFAA, "a private
The Ninth Circuit has
United
16
plaintiff must prove that the defendant violated one of the
17
provisions of [section] 1030(a)(1)-(7), and that the violation
18
involved [among other things, loss to one or more persons during
19
any one year period . . . aggregating at least $5,000 in value]."
20
Brekka, 581 F.3d at 1131.
21
Plaintiff alleges that Defendant violated section
22
1030(a)(2)(C) of the CFAA.
Compl. ¶ 95.
That section prohibits
23
"intentionally access[ing] a computer without authorization or
24
exceeds authorized access, and thereby obtain[ing] . . .
25
information from any protected computer."
26
1030(a)(2)(C).
27
Compl. ¶¶ 95-98, is deficient because the Ninth Circuit has made
28
clear that the CFAA, meant to target malicious hackers, prohibits
18 U.S.C. §
Defendant contends that Plaintiff's CFAA claim,
21
1
unauthorized access but not unauthorized use, which is what
2
Plaintiff's complaint charges.
3
argues that Plaintiff equivocates between allegations of
4
"unauthorized" access versus "exceeded authorized access," which
5
Defendant contends is legally significant; that Plaintiff pled no
6
facts about Defendant's alleged access to Plaintiff's computer
7
network SolvNet; and that Plaintiff's allegations describe legally
8
insufficient violations of use restrictions rather than violations
9
of access prohibitions.
See MTD at 14-15.
Id. at 15.
Defendant also
Plaintiff contends that its
United States District Court
For the Northern District of California
10
license agreement and other agreements, like its privacy policy,
11
were sufficient to restrict Defendant's "access" to SolvNet.
12
Opp'n at 17 (citing Compl. ¶¶ 37-39, 94-98).
13
See
Defendant relies in large part on Nosal, 676 F.3d at 854, in
14
which the Ninth Circuit held that the CFAA applied narrowly to
15
punish hacking ("the circumvention of technological access
16
barriers"), not the misappropriation of trade secrets or
17
contravention of use policies.
18
employees of an executive search firm used their authorized log-in
19
credentials to download proprietary information from a confidential
20
database on their employer's computer system, and then transferred
21
that information to a competitor, in violation of their employer's
22
use restrictions on the disclosure of confidential information to
23
third parties or using confidential information for any purpose
24
except company business.
25
that the CFAA prohibits only the unauthorized procurement or
26
alteration of information, not its misuse or appropriation, and
27
therefore the phrase "exceeds authorized access" in the CFAA "does
28
not extend to violations of use restrictions."
676 F.3d at 863.
See id. at 856.
22
In Nosal,
The Ninth Circuit held
Id. at 863-64.
1
Plaintiff responds that Defendant's reliance on Nosal is
2
misplaced because, while that case admittedly distinguished access
3
from use restrictions, Plaintiff insists that what it imposed on
4
Defendant was an access restriction via the license agreements.
5
See Opp'n at 17-18.
6
Defendant agreed to abide by the terms of Plaintiff's Privacy
7
Policy, EULA, and other agreements with Plaintiff regarding
8
confidentiality of SolvNet content prohibits Defendant from
9
accessing SolvNet material for which it lacks a license, rendering
Plaintiff contends that the fact that
United States District Court
For the Northern District of California
10
any such access a violation of the CFAA.
11
According to Plaintiff, when Defendant downloaded "articles, FAQs,
12
and other documentation related to PrimeTime and [IC Compiler],"
13
Defendant's access, downloading, and use of those materials went
14
beyond the scope of its licenses with Plaintiff and therefore
15
breached the CFAA.
16
Compl. ¶¶ 38-39.
Id.
The Court finds that Plaintiff has not stated a CFAA claim.
17
It is true that some courts have held that the CFAA applies to
18
access restrictions that are contractual, as well as technological
19
restrictions.
20
11-3109 EMC, 2012 WL 2327660, at *3 (N.D. Cal. June 19, 2012); see
21
also Nosal, 676 F.3d at 864 (distinguishing between access
22
restrictions and use restrictions, but not the form of the
23
restrictions); Craigslist Inc. v. 3Taps Inc., -- F. Supp. 2d --,
24
2013 WL 1819999, at *3-4 (N.D. Cal. Apr. 30, 2013) (noting Nosal's
25
distinction).
26
the CFAA apply only to breaches of technical barriers.
27
In re Facebook Privacy Litig., 791 F. Supp. 2d 705, 715-16 (N.D.
28
Cal. 2011) (holding, in a California Penal Code section 502 case,
See Weingand v. Harland Fin. Solutions, Inc., No. C
But other courts have asserted that statutes like
23
See, e.g.,
1
that the rule of lenity requires interpreting access "without
2
permission" to apply only to access exceeding technical barriers);
3
Facebook, Inc. v. Power Ventures, Inc., No. C 08-05780-JW, 2010 WL
4
3291750, at *11 (N.D. Cal. July 20, 2010) (same).
5
Neither the Ninth Circuit nor Congress has fully explored the
6
limits of this nuanced distinction.
However, it is clear to the
7
Court that Nosal's discussion of the differences between CFAA-
8
actionable unauthorized access or procurement and non-CFAA misuse
9
or misappropriation requires plaintiffs to plead, clearly and
United States District Court
For the Northern District of California
10
plausibly, that whatever access restriction they allege was not
11
simply a use prohibition disguised as a limit on access.
12
676 F.3d at 863-64; see also Craigslist Inc., 2013 WL 18199999, at
13
*4 (holding that framing a contractual prohibition in terms of
14
"access" was insufficient to state a CFAA claim because the
15
contractual prohibition depended on the accessor's purpose and did
16
not govern "who may access information, what information may be
17
accessed, or the methods by which information may be access").
18
other words, the state of CFAA doctrine in the Ninth Circuit
19
suggests that while a breach of a contractual provision may in some
20
cases be enough to allege unauthorized access, see Craigslist Inc.,
21
2013 WL 1819999, at *4, such an alleged breach must be pled with
22
enough clarity and plausibility to state that access itself -- not
23
just a particular use -- was prohibited.
Nosal,
In
24
Plaintiff fails to plead sufficient facts to support an
25
allegation of unauthorized access either by breach of contract or
26
by technical means.
27
that Defendant breached its license when it accessed SolvNet and
28
downloaded "articles, FAQs, and other documentation" relating to
Plaintiff's sparse allegations simply state
24
1
software for which Defendant had a license.
Compl. ¶¶ 38-39.
The
2
allegation that this activity exceeded authorized access, even
3
though Plaintiff does not suggest that Defendant was not allowed to
4
access SolvNet or that Plaintiff had restricted or revoked
5
Defendant's access prior to Defendant's use of SolvNet, is
6
implausible.
7
believable precision what restricted material Defendant downloaded,
8
given the competing allegation that Defendant had rights to use
9
PrimeTime and GoldTime.
Further, Plaintiff does not allege with any
Absent facts stating that Defendant "has
United States District Court
For the Northern District of California
10
no rights, limited or otherwise, to access the computer in
11
question," Brekka, 581 F.3d at 1133, Plaintiff's mere allegation
12
that Defendant breached a license agreement does not sufficiently
13
indicate that Defendant breached an access prohibition under the
14
CFAA.
15
16
Accordingly, Plaintiff's CFAA claim is DISMISSED with leave to
amend.
17
E.
CDAFA
18
Plaintiff asserts a claim under the CDAFA, which prohibits
19
"[k]nowingly access[ing] and without permission tak[ing],
20
copy[ing], or mak[ing] use of any data from a computer, computer
21
system, or computer network, or tak[ing] or copy[ing]any supporting
22
documentation, whether existing or residing internal or external to
23
a computer, computer system, or computer network."
24
Defendant moves to dismiss Plaintiff's section 502 claim for
25
the same reasons as the CFAA claim.
26
Plaintiff fails to plead unauthorized access under the CFAA or
27
access "without permission" under the CDAFA.
28
Plaintiff responds that it properly alleged Defendant's accessing
25
Defendant argues that
See MTD at 14-17.
1
SolvNet without permission, as described above, and that Defendant
2
cannot use the License Agreements' authorization to argue that it
3
had permission to access SolvNet.
4
that the CDAFA does not require that "access" be without
5
permission: the statutory language requires only that taking,
6
copying, or making use of the accessed data be without permission.
7
Id. at 18-19.
8
9
Opp'n at 18.
Plaintiff adds
Defendant cites a recent case from this Court, which held that
the rule of lenity required limiting the CDAFA's "without
United States District Court
For the Northern District of California
10
permission" language to apply only to the circumvention of
11
technical barriers, since to apply it more broadly -- for example,
12
to breaches of a license agreement -- would be unconstitutionally
13
vague.
14
courts have concurred with this ruling, absent definitive
15
clarification from the legislature or courts of appeal, but there
16
is some disagreement on the point.
17
Consumer Privacy Litig., No. 11-MD-02264 JSW, 2013 WL 1283236, at
18
*11-12 (N.D. Cal. Mar. 26, 2013) (only technical breaches are
19
actionable under the CDAFA), and Facebook, Inc. v. Power Ventures,
20
Inc., 844 F. Supp. 2d 1025, 1036 (N.D. Cal. 2012) (same), with
21
Weingang, 2012 WL 2327660, at *4-6 (discussing split authority on
22
whether the CDAFA should only apply to technical breaches, but not
23
deciding which split to adopt), and Facebook, Inc. v. ConnectU LLC,
24
489 F. Supp. 2d 1087, 1090-91 (N.D. Cal. 2007) (holding that a
25
defendant's access to a plaintiff's website by using information
26
voluntarily supplied by authorized users was "without permission"
27
and a violation of the CDAFA).
28
In re Facebook Privacy, 791 F. Supp. 2d at 716.
Other
Compare In re Google Android
In support of its contention that a contract alone can
26
1
prohibit access per the CDAFA, Plaintiff cites Therapeutic Research
2
Faculty v. NBTY, Inc., 488 F. Supp. 2d 991, 998-99 (E.D. Cal.
3
2007), which held that while some of the defendants' employees'
4
access to the plaintiffs' computers was authorized, some was not,
5
so the plaintiffs could state a CDAFA claim as to the unauthorized
6
accessors.
7
bought a single-user software license -- limited specifically to a
8
single, individual employee of the corporation -- and shared not
9
only among multiple employees but also with at least one other
Specifically, in Therapeutic Research, a corporation
United States District Court
For the Northern District of California
10
corporation.
11
compelling, since the contract at issue there specifically
12
precluded access for a large category of users.
13
the case here.
14
See id. at 993-94.
The Court does not find this case
The same is not
The Court cannot find, as a matter of law, that Plaintiff does
15
not state a claim under the CDAFA solely because Plaintiff relies
16
on the alleged breach of a license agreement instead of a technical
17
breach.
18
under the CDAFA for pleading reasons.
19
SolvNet users "must abide by 'the terms of the Privacy Policy and
20
the end user license agreement and other agreements with
21
[Plaintiff]' that his or her company signed 'regarding the
22
confidential nature of all SolvNet content.'
23
must only access and download materials for which their company has
24
a license."
25
[Plaintiff] discovered that [Defendant] accessed SolvNet and
26
engaged in unauthorized access to and downloading of articles,
27
FAQs, and other documentation related to PrimeTime and [IC
28
Compiler].
However, Plaintiff's complaint does not state a claim
Compl. ¶ 38.
Plaintiff pleads that
This means that users
Plaintiff then states that "[i]n 2013,
[Defendant's] downloading and other use of these
27
1
materials was beyond the scope of its licenses with [Plaintiff.]"
2
Id. ¶ 39.
3
The court finds Plaintiff's allegations do not provide enough
4
detail to be plausible.
Although Plaintiff pleads that Defendant's
5
access or use of the material in question, large portions of the
6
complaint are describe how Defendant was licensed to use much of
7
the material at issue here.
8
to SolvNet unless some contractual term was clear enough to
9
prohibit access or there was some technical prohibition.
Defendant also apparently had access
In this
United States District Court
For the Northern District of California
10
context, alleging that the License Agreements and other contracts
11
Defendant had entered forbade Defendant from using SolvNet is
12
conclusory and not plausible.
13
License Agreements and its other user agreements with Defendant
14
were enough to put Defendant on notice that its access to SolvNet
15
was "without permission."
16
17
Plaintiff must explain how the
Since there are many ways for Plaintiff to repair its CDAFA
claim, the Court DISMISSES this claim with leave to amend.
18
F.
Breach of Contract and Breach of the Implied Covenant
19
Plaintiff asserts claims for breach of contract and breach of
20
the implied covenant of good faith and fair dealing against
21
Defendant, based on Defendant's alleged breaches of the CPLA's
22
confidentiality and proper use provisions, as well as Defendant's
23
alleged refusal to comply with Plaintiff's attempts to verify its
24
compliance with the CPLA.
25
26
i.
See Compl. ¶¶ 121-25, 127-132.
Breach of Contract
"To state a cause of action for breach of contract, a party
27
must plead [1] the existence of a contract, [2] his or her
28
performance of the contract or excuse for nonperformance, [3] the
28
1
defendant's breach, and [4] resulting damage."
2
N.A., No. 11-6598 SC, 2012 WL 2061629, *6 (N.D. Cal. June 7, 2012)
3
(citing Harris v. Rudin, Richman & Appel, 74 Cal. App. 4th 299, 307
4
(Cal. Ct. App. 1999)).
5
existence of a contract, the plaintiff may set forth the contract
6
verbatim, attach it as an exhibit, or plead it according to its
7
legal effect.
8
2011 WL 3607608, at *2 (N.D. Cal. Aug. 15, 2011).
9
Mora v. U.S. Bank,
Additionally, if the plaintiff alleges the
See Lyons v. Bank of America, N.A., No. 11-01232 CW,
Plaintiff has pled the existence of a contract and its
United States District Court
For the Northern District of California
10
performance of it.
11
deficient.
12
as to Defendant's alleged copying of GoldTime's input and output
13
formats, which are the only portions of GoldTime that Plaintiff
14
adequately alleges Defendant copied.
15
allegations are insufficiently vague and conclusory because, as
16
discussed above, Plaintiff does not explain what other parts of the
17
software were copied, or how? Defendant breached any
18
confidentiality clause.
19
the Court to find Plaintiff's claim of breach plausible.
20
Separately, the parties' dispute over whether Defendant continued
21
to use GoldTime's input and output formats after its license's
22
expiration in February 2013 is a factual dispute, inappropriate for
23
decision on a motion to dismiss.
24
does not save the claim, because Plaintiff fails to allege damages.
25
See MTD at 17; Opp'n at 13 n.5.
26
However, Plaintiff's allegation of breach is
Plaintiff's pleadings on this point are sufficient only
Other parts of Plaintiff's
These deficiencies make it impossible for
However, as noted below, this
The more significant pleading deficiency of Plaintiff's breach
27
of contract claim is this failure to allege damages.
28
merely states that Defendant "sought commercial gain and
29
Plaintiff
1
competitive advantage by accessing and using [Plaintiff's]
2
proprietary information to develop its products, including
3
[Defendant's] Aprisa, which incorporate and are derived from
4
[Plaintiff's] confidential information and trade secrets."
5
¶ 40; see also Opp'n at 13.
6
as part of its breach of contract claim, see Compl. ¶¶ 120-25, but
7
even if it had, it does not assert that Plaintiff was damaged by
8
Defendant's seeking commercial gain or competitive advantage -- the
9
mere fact that Defendant sought those things does not indicate harm
Compl.
Plaintiff did not make this allegation
United States District Court
For the Northern District of California
10
to Plaintiff.
11
with leave to amend, so that Plaintiff can more plausibly explain
12
the alleged breach and how it damaged Plaintiff.
13
ii.
Plaintiff's breach of contract claim is DISMISSED
Breach of Implied Covenant
14
"The covenant of good faith and fair dealing, implied by law
15
in every contract, exists merely to prevent one contracting party
16
from unfairly frustrating the other party's right to receive the
17
benefits of the agreement actually made."
18
Inc., 24 Cal. 4th 317, 349 (Cal. 2000).
19
impose substantive duties or limits on the contracting parties
20
beyond those incorporated in the specific terms of their
21
agreement."
22
the covenant of good faith and fair dealing are:
23
24
25
26
27
28
Id. at 349-50.
Guz v. Bechtel Nat.
The covenant "cannot
The elements of a claim for breach of
(1) the plaintiff and the defendant entered
into a contract; (2) the plaintiff did all
or substantially all of the things that the
contract required him to do or that he was
excused
from
having
to
do;
(3)
all
conditions
required
for
the
defendant's
performance had occurred; (4) the defendant
unfairly interfered with the plaintiff's
right
to
receive
the
benefits
of
the
contract; and (5) the defendant's conduct
harmed the plaintiff.
30
1
Woods v. Google, Inc., 889 F. Supp. 2d 1182, 1194 (N.D. Cal. 2012)
2
(citing Judicial Counsel of California Civil Jury Instructions §
3
325 (2011)).
4
Plaintiff alleges that it had a right to confidentiality under
5
the CPLA, that the CPLA contained an implied covenant of good faith
6
and fair dealing, and that Defendant breached the implied covenants
7
by failing to maintain the confidentiality of Plaintiff's
8
proprietary information and by failing to comply with Plaintiff's
9
attempts to verify Defendant's compliance with the CPLA.
Compl. ¶¶
United States District Court
For the Northern District of California
10
127-129.
11
beyond mere breaches of the CPLA, because Defendant allegedly
12
maintained its relationship with Plaintiff to gain access to
13
Plaintiff's confidential material, and that Defendant, in bad
14
faith, frustrated Plaintiff's attempts to ensure confidentiality
15
and compliance with the CPLA.
16
that the CPLA included no "audit right" or "right to verify
17
compliance," and that Plaintiff's breach of the implied covenant
18
claim constitutes nothing but a breach of contract claim because
19
Plaintiff's allegations of bad faith or "independently wrongful"
20
conduct are conclusory allegations, devoid of facts to support the
21
claim.
22
Plaintiff asserts that it was harmed by this behavior
Id. ¶¶ 130-31.
Defendant argues
See MTD at 18, Reply at 11.
The Court agrees with Defendant.
First, as to Plaintiff's
23
allegation that Defendant breached the implied covenant by refusing
24
to allow Plaintiff to audit Defendant's compliance, Plaintiff never
25
alleged that the CPLA contained any clause that granted it a right
26
to verify Defendant's compliance, and breaches of the implied
27
covenant apply only to "benefits of the agreement actually made."
28
Guz, 24 Cal. 4th at 349.
Plaintiff cannot simply add a contractual
31
1
2
term after the fact.
Second, Plaintiff's assertions of bad faith are unacceptably
3
conclusory, because Plaintiff simply asserts -- without supporting
4
facts -- that Defendant acted in bad faith and for independently
5
wrongful purposes.
6
pleading under Twombly and Iqbal.
7
See Compl. ¶¶ 130-31.
This is defective
Finally, Plaintiff does allege that Defendant breached the
8
confidentiality provisions of the CPLA, but this allegation is
9
duplicative of Plaintiff's breach of contract claim.
"If the
United States District Court
For the Northern District of California
10
allegations in a breach of implied covenant claim do not go beyond
11
the statement of a mere contract breach and, relying on the same
12
alleged acts, simply seek the same damages or other relief already
13
claimed in a companion contract cause of action, they may be
14
disregarded as superfluous as no additional claim is actually
15
stated."
16
2010 WL 934252, *6 (N.D. Cal. Mar. 15, 2010) (quoting Schulken v.
17
Wash. Mut. Bank, No. 09–CV–02708, 2009 WL 4173525 (N.D. Cal. Nov.
18
19, 2009)); see also Dunkel v. eBay Inc., No. 12-CV-01452-EJD, 2013
19
WL 415584, at *9-10 (N.D. Cal. Jan. 31, 2013).
20
Plaintiff's breach of implied covenant claim suggests that this
21
claim is at all different from Plaintiff's breach of contract
22
claim.
23
24
Malcolm v. JP Morgan Chase Bank, N.A., No. 09–CV–4496,
Nothing in
Accordingly, Plaintiff's breach of the implied covenant claim
is DISMISSED with leave to amend.
25
G.
UCL
26
The UCL prohibits unfair competition, including, inter alia,
27
"any unlawful, unfair or fraudulent business act."
28
Prof. Code § 17200.
Cal. Bus. &
"Because [section 17200] is written in the
32
1
disjunctive, it establishes three varieties of unfair competition--
2
acts or practices which are unlawful, or unfair, or fraudulent."
3
Berryman v. Merit Prop. Mgmt., Inc., 152 Cal. App. 4th 1544, 1554
4
(Cal. Ct. App. 2007).
5
Plaintiff brings its UCL claim under the unlawful and unfair
6
prongs of the UCL, having conceded that it does not allege
7
violation of the fraudulent prong.
8
Plaintiffs can plead a UCL violation under the "unlawfulness" prong
9
by pleading that a business practice violated a predicate federal,
See Opp'n at 15 n.6.
United States District Court
For the Northern District of California
10
state, or local law.
11
Cellular Tel. Co., 20 Cal. 4th 163, 180 (Cal. 1999) (citing State
12
Farm Fire & Cas. Co. v. Superior Court, 45 Cal. App. 4th 1093, 1103
13
(Cal. Ct. App. 1996)).
14
competitors instead of consumers, California courts have held that
15
the UCL requires the competitor plaintiff to allege an incipient
16
violation of an antitrust law or that law's policy or spirit
17
"because [the unfair practice's effect] are comparable to a
18
violation of the law, or that otherwise significantly threatens or
19
harms competition."
20
See Cel–Tech Commc'ns, Inc. v. Los Angeles
For UCL unfairness claims brought by
Id. at 187.
Plaintiff's UCL unlawfulness claim alleges that Defendant's
21
conduct violated "numerous state and federal statutes and codes,"
22
including the CFAA, the CDAFA, and laws pertaining to improper use
23
of proprietary and confidential materials.
24
noted above, all of these claims failed and are dismissed, except -
25
- as a pleading matter -- Plaintiff's copyright infringement claim
26
as to the input and output formats in Defendant's Aprisa software
27
and documentation.
28
to amend except as to that predicate copyright claim.
Compl. ¶¶ 108-09.
As
Plaintiff's UCL claim is DISMISSED with leave
33
1
As to both Plaintiff's UCL unlawfulness and unfairness claims,
2
Defendant disputes their predication on a breach of contract claim.
3
Defendant is correct that a breach of contract alone cannot be the
4
predicate of a UCL unfairness or unlawfulness claim unless the
5
breach also constitutes conduct that was unlawful, unfair, or
6
fraudulent, see Arce v. Kaiser Found. Health Plan, Inc., 181 Cal.
7
App. 4th 471, 489-90 (Cal. Ct. App. 2010), but Plaintiff's UCL
8
claims are not based solely on a breach of contract.
9
that those claims rely on Plaintiff's breach claim, they are
To the extent
United States District Court
For the Northern District of California
10
DISMISSED, as are Plaintiff's UCL claims based on any other
11
dismissed claim.
Plaintiff's UCL unfairness claim primarily asserts that
12
13
Defendant's alleged access to and copying of Plaintiff's
14
confidential materials, as well as its subsequent refusal to verify
15
a lack of anti-competitive conduct, are actionable anti-competitive
16
behaviors covered by the UCL.
17
36.
18
the CDAFA supports a UCL unfairness claim, see Opp'n at 16, but the
19
Court has dismissed that predicate claim.
20
allegations are, the UCL cognizes them as being sufficient to state
21
a claim at this stage of litigation -- at least for consumers.
22
Williams v. Gerber Prods. Co., 552 F.3d 934, 938-39 (9th Cir. 2008)
23
(dismissals in UCL cases are rare and generally fact-dependent);
24
Cel-Tech, 20 Cal. App. 4th at 181 (the UCL was intentionally framed
25
in broad, sweeping terms).
26
breadth of the UCL's unfairness prong on this point.
27
16-17.
See Opp'n at 16; Compl. ¶¶ 6-7, 35-
Plaintiff also contends that its statement of a claim under
As vague as Plaintiff's
See
Plaintiff appears to rely mainly on the
28
34
See Opp'n at
However, Defendant is correct that when a defendant in a UCL
1
2
unfairness case is a competitor of a plaintiff (as opposed to being
3
a consumer), a business practice is unfair only if it "threatens an
4
incipient violation of an antitrust law, or violates the policy or
5
spirit of one of those laws because its effects are comparable to
6
or the same as a violation of the law, or otherwise significantly
7
threatens or harms competition."
8
187.
9
violation of the letter, policy, or spirit of an antitrust law.
Cel-Tech, 20 Cal. App. 4th at
In this case, Plaintiff has not alleged or even suggested a
United States District Court
For the Northern District of California
10
See id.; see also Drum v. San Fernando Valley Bar Assoc., 182 Cal.
11
App. 4th 247, 254-55 (Cal. Ct. App. 2010).
12
finds that Plaintiff has failed to state a UCL unfairness claim.
13
This claim is DISMISSED with leave to amend.
Accordingly, the Court
14
H.
Patent Infringement
15
Plaintiff asserts claims against Defendant for direct,
16
contributory, induced, and willful infringement of the Patents-in-
17
Suit, based on Defendant's products Aprisa and, as to two patents,
18
Apogee.
19
Defendant's products infringe by operating "in a manner that
20
infringes [the asserted patent]," id., and that Defendant "has
21
been, is currently, and unless enjoined, will continue to actively
22
induce, encourage or contribute to the infringement of [each
23
Patent-in-Suit]," id. ¶¶ 68, 75, 82.
24
Defendant induces and contributes to its customers' patent
25
infringement by providing allegedly infringing products and "by
26
dictating by its design and instructions to users thereto the
27
manner in which the software is used causing such infringement."
28
Id.
See Compl. ¶¶ 67, 74, 81, 88.
35
Plaintiff asserts that
According to Plaintiff,
1
Defendant concedes that the lenient pleading standard for
2
direct patent infringement protects Plaintiff's direct infringement
3
claim at this stage.
4
that Plaintiff's allegations of contributory, induced, and willful
5
patent infringement all fail because Plaintiff does not adequately
6
plead that Defendant knew of the Patents-in-Suit before the
7
complaint was filed, or that Defendant's software at issue here
8
lacks substantial non-infringing uses or is made or adapted for
9
infringement of the Patents-in-Suit.
United States District Court
For the Northern District of California
10
11
i.
MTD at 21 n.5.
However, Defendant asserts
Id. at 21-23.
Induced Infringement
To state a claim for inducement of infringement, a plaintiff
12
must allege sufficient facts -- subject to Twombly and Iqbal -- to
13
raise the reasonable inference that the defendant knowingly induced
14
infringement and possessed specific intent to encourage another's
15
infringement.
16
Sys. Patent Litig., 681 F.3d 1323, 1339 (Fed. Cir. 2012).
17
Plaintiff alleges that Defendant induced or encouraged infringement
18
by providing products "designed and intended to enable"
19
infringement and "by dictating by its design and instructions to
20
users thereto the manner in which the software is used causing such
21
infringement."
22
these are impermissible legal conclusions couched as factual
23
allegations, and that Plaintiff does not allege the element of pre-
24
suit knowledge of the patents.
25
that it put Defendant on notice of the Patents-in-Suit at least by
26
May 8, 2013, via a warning letter, or by November 28, 2012, when it
27
contacted Defendant regarding suspected infringement.
See In re Bill of Lading Transmission & Processing
Compl. ¶¶ 68, 75, 82, 89.
Defendant argues that
MTD at 22-23.
28
36
Plaintiff asserts
Opp'n at 20-
1
21 (citing Compl. ¶¶ 44). 3
2
allegations about Defendant's design and instructions, Compl. ¶¶
3
68, 75, 82, 89, are sufficient to satisfy the relevant pleading
4
standards.
Plaintiff also contends that its
Id.
5
The Court does not find that any of the correspondence
6
Plaintiff references put Defendant on notice of the Patents-in-
7
Suit.
8
supporting its reply brief, and the Court takes judicial notice of
9
these copies under Federal Rule of Evidence 201, because the
Defendant attached copies of these letters in a declaration
United States District Court
For the Northern District of California
10
letters are incorporated by reference into Plaintiff's complaint.
11
See Compl. ¶¶ 41, 44; ECF No. 33 ("Drummond Decl.") Exs. B ("May 8
12
Ltr."), C ("Nov. 20 Ltr.").
13
copying of proprietary command sets, and the November 28 Letter
14
does not refer to any copying at all.
15
with Plaintiff's allegations that Defendant "had knowledge and
16
notice of the [Patents-in-Suit]," Compl. ¶¶ 68, 75, 82, 89, which
17
are merely legal conclusions pled as factual allegations.
The May 8 Letter refers to alleged
Thus, the Court is left only
The Court finds Plaintiff's other allegations of inducement
18
19
conclusory.
Plaintiff need only provide bare facts supporting its
20
claim, and it certainly need not prove its claim at the pleading
21
stage, but descriptions of the Patents-in-Suit and Defendant's
22
products, coupled with bare pleadings of the elements of these
23
infringement claims, do not suffice to allow the Court to make a
24
reasonable inference of Defendant's intent to induce infringement.
25
See Compl. ¶¶ 68, 75, 82, 89.
Plaintiff could, for example, have
26
27
28
3
Defendant notes that it is not aware of a November 28, 2012
letter, but only of a November 20, 2012 letter. The parties do not
further address this point, so the Court analyzes only the November
20, 2012 letter.
37
1
pled facts as to how Defendant's design or instruction were meant
2
to induce or encourage Defendant, but Plaintiff's Complaint simply
3
states that Defendant "induced, encouraged or contributed to its
4
customers' direct infringement by providing, selling or offering
5
for sale the Aprisa software that is designed and intend to [work
6
in a manner infringing the Patents-in-Suit]."
7
not sufficiently alleged that Defendant induced infringement of the
8
Patents-in-Suit.
9
United States District Court
For the Northern District of California
10
Plaintiff has
Accordingly, Plaintiff's induced infringement claims are
DISMISSED with leave to amend.
ii.
11
12
Id.
Contributory Infringement
To state a claim for contributory infringement, a plaintiff
13
must allege sufficient facts to raise the reasonable inference that
14
the defendant sells or offers to sell a material or apparatus (1)
15
for use in practicing a patented process, (2) that is material to
16
practicing the invention, (3) that has no substantial non-
17
infringing uses, and (4) is known by the party "to be especially
18
made or especially adapted for use in an infringement of such
19
patent."
20
contends that the Court should make the inference that Defendant
21
contributed to others' infringement of the Patents-in-Suit because
22
Plaintiff's complaint does not indicate that Defendant's products
23
have substantial non-infringing uses.
24
Compl. ¶¶ 68, 75, 82, 89).
25
burden to allege that Defendant's accused software lacks
26
substantial non-infringing uses or is especially made or adapted
27
for infringement of the Patents-in-Suit, and that Plaintiff failed
28
to do so.
In re Bill of Lading, 681 F.3d at 1337.
Plaintiff
Opp'n at 19-20 (citing
Defendant argues that it is Plaintiff's
MTD at 21-22; Reply at 14-15.
38
1
Per above, the Court finds that Plaintiff fails to allege that
2
Defendant knew that any of its software was made or adapted for
3
infringement of any of the Patents-in-Suit, which leads to a
4
finding here that Plaintiff has failed to allege that Defendant's
5
software was designed to infringe any particular patent.
6
Fujitsu Ltd. v. Netgear Inc., 620 F.3d 1321, 1326 (Fed. Cir. 2010)
7
(plaintiffs must plead, among other things, knowledge of the patent
8
in order to plead a contributory infringement claim).
9
while Plaintiff does not have to prove its claims at the pleading
See
Further,
United States District Court
For the Northern District of California
10
stage, Plaintiff has failed to raise the reasonable inference that
11
Defendant's software has no substantial non-infringing uses.
12
Plaintiff does not have to explain everything that Defendant's
13
software does, but when Plaintiff's complaint is so vague as to its
14
own claims and Defendant's products, the Court cannot find that
15
Defendant's software has no substantial non-infringing uses.
16
Plaintiff's contributory infringement claims are DISMISSED
17
with leave to amend.
18
iii.
19
Willful Infringement
To state a claim for willful infringement, a plaintiff must
20
plead sufficient facts to raise the reasonable inference that the
21
defendant "was aware of the asserted patent, but nonetheless acted
22
despite an objectively high likelihood that its actions constituted
23
infringement of a valid patent."
24
Corp., 598 F.3d 831, 861 (Fed. Cir. 2010) (citation omitted).
25
Plaintiffs need only make out a bare assertion of knowledge of an
26
issued patent, but mere recitation of elements is insufficient.
27
see Avocet Sports Tech., Inc. v. Garmin Int'l, Inc., No. C 11-04049
28
JW, 2012 WL 1030031, at *3 (N.D. Cal. Mar. 22, 2012).
i4i Ltd. P'ship v. Microsoft
39
As stated above, Plaintiff fails to allege that Defendant was
1
2
aware of the Patents-in-Suit.
3
willfulness amount to nothing more than recitation of that claim's
4
elements:
5
Further, Plaintiff's allegations of
[Defendant's] acts of direct and indirect infringement
are willful, as [Defendant] knew or should have known of
the [Patents-in-Suit] and that making, using, offering to
sell and selling within the United States, or importing
into the United States, its Aprisa or Apogee software
products would infringe the [Patents-in-Suit], but acted
despite
an
objectively
high
likelihood
that
such
activities would infringe the patent.
6
7
8
9
United States District Court
For the Northern District of California
10
Compl. ¶¶ 69, 76, 83, 90.
11
a claim for willful infringement.
12
claims are therefore DISMISSED with leave to amend.
Such pleadings are insufficient to state
Plaintiff's willful infringement
13
14
15
V.
CONCLUSION
As explained above, the Court GRANTS in part and DENIES in
16
part Defendant ATopTech Inc.'s motion to dismiss Plaintiff
17
Synopsys, Inc.'s complaint.
18
copyright infringement claim based on its proprietary input and
19
output formats and its UCL unlawfulness claim predicated on that
20
alleged infringement are DISMISSED with leave to amend.
21
All of Plaintiff's claims except its
Plaintiff may file an amended complaint within thirty (30)
22
days of this Order's signature date.
23
in dismissal of this action with prejudice.
Failure to do so may result
24
25
IT IS SO ORDERED.
26
27
Dated: October 24, 2013
UNITED STATES DISTRICT JUDGE
28
40
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?