Gates Corporation v. CRP Industries, Inc.
Filing
78
ORDER by Magistrate Judge Kristen L. Mix on 11/28/17. Rule 12(b)(6) Motion to Dismiss 54 is DENIED. (lgale, )
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLORADO
Civil Action No. 16-cv-01145-KLM
GATES CORPORATION,
Plaintiff,
v.
CRP INDUSTRIES, INC.,
Defendant.
_____________________________________________________________________
ORDER
_____________________________________________________________________
ENTERED BY MAGISTRATE JUDGE KRISTEN L. MIX
This matter is before the Court on Defendant’s Rule 12(b)(6) Motion to Dismiss
[#54]1 (the “Motion”). Plaintiff filed a Response [#55] in opposition to the Motion to Dismiss,
and Defendant filed a Reply [#56]. The Court has reviewed the Motion, the Response, the
Reply, the entire case file, and the applicable law, and is sufficiently advised in the
premises. For the reasons set forth below, the Motion [#54] is DENIED.2
I. Background3
A.
Factual Background
1
“[#54]” is an example of the convention the Court uses to identify the docket number
assigned to a specific paper by the Court’s electronic case filing and management system
(CM/ECF). This convention is used throughout the Order.
2
The parties consented to proceed before the undersigned for all proceedings pursuant to
28 U.S.C. § 636(c) and D.C.COLO.LCivR 40.1(c). See Consent Form [#18].
3
All well-pled facts from the complaint are accepted as true and viewed in the light most
favorable to Plaintiff. See Barnes v. Harris, 783 F.3d 1185, 1191-92 (10th Cir. 2015).
-1-
Plaintiff is a Delaware corporation that manufactures power transmission belts and
fluid power products that are used in diverse industrial and automotive applications. Am.
Compl. [#49] ¶ 8. Defendant is a New Jersey corporation that distributes and sells
automotive and other industrial products. Id. ¶ 9. The parties are direct competitors. Id.
Plaintiff has created an electronic database of confidential business information,
which Plaintiff describes as the “backbone of [its] sales.” Id. ¶¶ 10, 13. The database
includes information about products that Plaintiff plans to offer before the information is
made public, as well as valuable market research. Id. ¶ 13. The database also stores
Vehicles in Operation (“VIO”) data, which is non-public, proprietary data for which Plaintiff
pays an annual premium to access from another source. Id. ¶ 12. Plaintiff’s database is
stored in a password-protected file on a password-protected server. Id. ¶¶ 10-11. Certain
employees are given access to the database after they have signed confidentiality
agreements, and unauthorized or anonymous access is not permitted. Id. ¶ 11. Select
customers are permitted to access only certain classes of information in the database. Id.
Plaintiff pays researchers a combined salary of over $50,000 per month to keep the
information updated. Id. ¶ 13.
Laura Bale (“Bale”) was Plaintiff’s employee for 25 years. Id. ¶ 15. While employed
by Plaintiff, Ms. Bale developed software and was involved with storage of the automotive
parts list in the database. Id. She was assigned a personal username and password to
access the database.
Id.
On August 25, 2009, Plaintiff terminated Ms. Bale’s
employment, at which time her username and password were deactivated and she signed
an “Employee Termination Statement,” which stated her agreement to turn over all
confidential and trade secret information to Plaintiff and agreed not to share that
-2-
information with anyone. Id. ¶16.
Ms. Bale began working for the Defendant in February 2010. Id. ¶17. Plaintiff sent
Ms. Bale a letter on February 15, 2010, reminding her to keep Plaintiff’s information
confidential. Id. Plaintiff copied Defendant on the letter. Id. Two years later, on February
8, 2012, Plaintiff became aware that Ms. Bale had unlawfully accessed Plaintiff’s database.
Id. ¶18. Ms. Bale’s former supervisor, David Haun (“Haun”), received an e-mail from Ms.
Bale that attached VIO data and had the subject line “Present,” with text that read “Check
this out . . . [.]” Id. Mr. Haun suspected that the e-mail was intended for David Hirschhorn
(“Hirschhorn”), Defendant’s Director of Brand Management who was Ms. Bale’s supervisor
at the time, and that Plaintiff had unlawfully accessed Plaintiff’s database and attempted
to send the information to Mr. Hirschhorn. Id. ¶¶ 19, 20. Mr. Haun confirmed that the
attachment to the e-mail contained information that matched VIO data, and on reviewing
the server logs, discovered that the same IP address in the header of Ms. Bale’s e-mail had
been used on several previous occasions to access Plaintiff’s server. Id. ¶ 20. Plaintiff
thereafter notified the Federal Bureau of Investigations (“FBI”), which commenced an
investigation. Id. ¶ 21.
On March 16, 2012, approximately one month after Plaintiff discovered Ms. Bale’s
unlawful database access, Plaintiff sent a letter to Defendant’s President, informing him of
the e-mail that Plaintiff had received from Ms. Bale and asking whether Defendant
possessed any software or other information that Ms. Bale had downloaded. Id. ¶ 52. On
April 29, 2012, Plaintiff received a response letter stating that Defendant was investigating
the matter. Id. ¶ 53. On June 6, 2012, Defendant followed up and informed Plaintiff that
(1) the investigation was complete and Defendant had confirmed that no one affiliated with
-3-
Defendant had downloaded and/or used the confidential information referenced in Plaintiff’s
letter, (2) Defendant did not have any record of the confidential information in either
electronic or hard copy form, and (3) Ms. Bale had represented to Defendant that she had
not used or disclosed any of the confidential information referenced in the March 16, 2012
letter. Lastly, Defendant informed Plaintiff that Ms. Bale was no longer employed by
Defendant. Id.
Defendant later released a new product line of hoses that consisted mostly of
products that Plaintiff did not offer. Id. ¶ 54. Plaintiff became suspicious that Defendant had
in fact used the information gleaned by Ms. Bale, because “it would have taken a
substantial amount of time and money to create such a product line without access to
[Plaintiff’s] trade secrets.”
Id.
On January 10, 2013, Plaintiff’s counsel wrote to
Defendant’s counsel informing them of Plaintiff’s suspicions and requesting that Defendant
undertake a new investigation. Id. ¶ 55. On January 24, 2013, Defendant responded that
it had confirmed that none of Plaintiff’s data referenced in the letters had been used in the
development of Defendant’s hoses or any other product line. Id. ¶ 56.
After the FBI and the United States Attorneys’ Office completed their investigation
in the spring of 2016, the United States Attorneys’ Office provided Plaintiff with a draft
statement of facts, where it was allegedly revealed that Defendant was involved in the
unlawful accessing and downloading of Plaintiff’s trade secrets. Id. ¶ 58. On May 11,
2016, Ms. Bale pled guilty to unauthorized access to a protected computer, in violation of
18 U.S.C. §§ 1030(a)(2)(C) and 1030(c)(2)(B). See id. ¶ 1; see also United States v. Laura
Bale, No. 16-cr-00112-WJM.
B.
Procedural Background
-4-
Plaintiff filed the Complaint [#1] initiating this action on May 17, 2016. The Court
granted Plaintiff’s request for leave to amend, and on April 10, 2017, Plaintiff filed the
Amended Complaint [#49]. Plaintiff raises four claims: (1) misappropriation of trade secrets
under the Colorado Uniform Trade Secrets Act (“CUTSA”), (2) a Colorado tort claim for
misappropriation of business value, (3) a Colorado tort claim for interference with a
contract, and (4) a federal claim under the Computer Fraud and Abuse Act. See generally
Am. Compl. [#49]. Plaintiff seeks a preliminary and permanent injunction prohibiting
Defendant from using any of Plaintiff’s trade secret information and mandating that
Defendant return any such information in its possession.
Plaintiff also demands
compensatory damages, punitive damages, reasonable attorneys’ fees and costs, and preand post-judgment interest on any award of damages. Id. at 25.
Defendant filed the Motion [#54] on April 24, 2017. Defendant argues that all four
of Plaintiff’s claims fail because they are each barred by the applicable statutes of
limitations, and therefore must be dismissed pursuant to Fed. R. Civ. P. 12(b)(6). Motion
[#54] at 11-18. In the alternative, Defendant argues that Plaintiff’s misappropriation of
business values and tortious interference with contract claims should be dismissed
because they are preempted by the CUTSA claim, as all three claims arise out of the same
facts. Id. at 18-19.
II. Legal Standard
The purpose of a motion to dismiss pursuant to Rule 12(b)(6) is to test “the
sufficiency of the allegations within the four corners of the complaint after taking those
allegations as true.” Mobley v. McCormick, 40 F.3d 337, 340 (10th Cir. 1994); Fed. R. Civ.
P. 12(b)(6) (stating that a complaint may be dismissed for “failure to state a claim upon
-5-
which relief can be granted”). “The court’s function on a Rule 12(b)(6) motion is not to
weigh potential evidence that the parties might present at trial, but to assess whether the
plaintiff’s complaint alone is legally sufficient to state a claim for which relief may be
granted.” Sutton v. Utah State Sch. for the Deaf & Blind, 173 F.3d 1226, 1236 (10th Cir.
1999) (citation omitted). To withstand a motion to dismiss pursuant to Rule 12(b)(6), “a
complaint must contain enough allegations of fact ‘to state a claim to relief that is plausible
on its face.’” Robbins v. Oklahoma, 519 F.3d 1242, 1247 (10th Cir. 2008) (quoting Bell
Atlantic Co. v. Twombly, 550 U.S. 544, 570 (2007)); see also Shero v. City of Grove, Okla.,
510 F.3d 1196, 1200 (10th Cir. 2007) (“The complaint must plead sufficient facts, taken as
true, to provide ‘plausible grounds’ that discovery will reveal evidence to support the
plaintiff’s allegations.” (quoting Twombly, 550 U.S. at 570)). “A claim has facial plausibility
when the plaintiff pleads factual content that allows the court to draw the reasonable
inference that the defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556
U.S. 662, 678 (2009). “A pleading that offers labels and conclusions or a formulaic
recitation of the elements of a cause of action will not do. Nor does a complaint suffice if
it tenders naked assertion[s] devoid of further factual enhancement.” Id. (brackets in
original; internal quotation marks omitted).
III. Discussion
A.
Whether Plaintiff’s Claims are Barred by Applicable Statutes of Limitations
“If the allegations . . . show that relief is barred by the applicable statute of
limitations, the complaint is subject to dismissal for failure to state a claim[.]” Jones v.
Bock, 549 U.S. 199, 215 (2007). Defendant argues that each of Plaintiff’s claims are
-6-
barred by the applicable statutes of limitations. Specifically, Defendant explains that, based
on Plaintiff’s allegations, Plaintiff had discovered by January 2013 all of the following
information: (1) Ms. Bale had accessed Plaintiff’s database without authorization, (2) Ms.
Bale intended to send information obtained from the database to her supervisor, (3)
Defendant used the database to gain a competitive advantage in developing a new line of
hoses, (4) Defendant did not conduct a thorough investigation following Plaintiff’s counsel’s
letter, and (5) that the circumstances were “highly suspicious” such that Plaintiff was
considering litigation. Motion [#54] at 12. Defendant is largely referring to information
contained in two letters sent by Plaintiff’s counsel to Defendant. The March 16, 2012 letter
alerted Defendant that Plaintiff had received the misdirected e-mail from Ms. Bale and
asked if Defendant possessed any of the information that Ms. Bale had downloaded. Am.
Compl. [#49] ¶ 52. The January 10, 2013 letter stated Plaintiff’s suspicions that information
had in fact been used by Defendant because Defendant’s new product “filled a gap” in
Plaintiff’s product line, and requested that Defendant undertake a new investigation. Id. ¶
55. Defendant asserts that the content of these letters demonstrates that Plaintiff had
actual knowledge of sufficient facts to assert its claims by January 2013 at the latest. Thus,
according to Defendant, Plaintiff’s claims first asserted in the Complaint [#1] filed on May
17, 2016, are therefore barred by the applicable statutes of limitations. Id.
With the exception of Plaintiff’s federal claim under the Computer Fraud and Abuse
Act, the Court applies Colorado law to determine the applicable statutes of limitations and
whether a particular statute of limitations bars a claim. See Erie R.R. Co. v. Tompkins, 304
U.S. 64, 78 (1938) (“Except in matters governed by the Federal Constitution or by acts of
Congress, the law to be applied in any case is the law of the state. . . . [a]nd whether the
-7-
law of the state shall be declared by its Legislature in a statute or by its highest court in a
decision is not a matter of federal concern.”).
1. State Law Claims
“Whether a [Colorado] statute of limitations bars a particular claim is a question of
fact,” but the issue may be decided as a matter of law “if undisputed facts demonstrate that
the plaintiff had the requisite information as of a particular date.” Burns v. Mac, No. 13-cv2109-WJM-KLM, 2014 WL 1242032, at *11 (D. Colo. Mar. 26, 2014) (citing Trigg v. State
Farm Mut. Auto. Ins. Co., 129 P.3d 1099, 1101 (Colo. App. 2005)). Generally, a cause of
action is considered to accrue on the date both the injury and its cause are known or
should have been known by the exercise of reasonable diligence. Col. Rev. Stat. Ann. §
13-80-108(1). “The critical inquiry of when an action accrues is knowledge of the facts
essential to the cause of action, not knowledge of the legal theory upon which the action
may be brought.” Gognat v. Ellsworth, 224 P.3d 1039, 1045 (Colo. Ct. App. 2009)
(quotation marks and citations omitted).
a. Trade Secret Misappropriation Claim
Plaintiff’s trade secret misappropriation claim under CUTSA is subject to a threeyear statute of limitations. See Colo. Rev. Stat. § 7-74-107. “[T]he statute of limitations on
trade secret misappropriation claims begins to run not when a plaintiff can positively and
directly prove misappropriation rather than independent development, but simply when the
plaintiff has knowledge of sufficient facts from which a reasonable jury could infer
misappropriation.” Id. (citation and quotation marks omitted). Thus, because Plaintiff
initiated this lawsuit on May 17, 2016, the issue here is whether Plaintiff’s allegations
demonstrate that it had knowledge of sufficient facts to assert its claim prior to May 17,
-8-
2013.
Defendant argues that Plaintiff knew of the essential facts of trade secret
misappropriation prior to January 2013 at the latest, based on the letters that Plaintiff sent
to Defendant stating its suspicions and requesting that Defendant conduct an investigation.
Motion [#54] at 14. Plaintiff argues that it did not have sufficient knowledge of the conduct
of Defendant’s management until the spring of 2016 when the FBI and United States
Attorneys’ Office completed their investigation of Ms. Bale and provided Plaintiff with a draft
statement of facts. Response [#55] at 8.
Importantly, Plaintiff’s claims in this matter are based on the alleged conduct of
Defendant, not Ms. Bale. Plaintiff’s allegation that it discovered that Ms. Bale had accessed
the database in February 2012 does not suggest or confirm that Plaintiff was aware that
confidential information had been sent to or shared with Defendant’s other employees or
management at that time.
See Am. Compl. [#49] ¶ 21. Plaintiff’s letters of March 16,
2012, and January 10, 2013, also do not demonstrate that Plaintiff had “knowledge of
sufficient facts from which a reasonable jury could infer misappropriation.” See id. ¶ 37;
Colo. Rev. Stat. § 7-74-107. For example, Defendant references the January 10, 2013
letter, where Plaintiff’s counsel represented that it had “substantial circumstantial evidence
that [Defendant] not only may have gained access to this information but also may have
actually used this information in connection with its business strategy.” Motion [#54] at 14;
January 10, 2013 Letter [#12-6].4 The letter continues, “Most recently, [Plaintiff] has
4
Generally, a court cannot consider facts supported by documents other than the complaint
on a motion to dismiss, unless the motion to dismiss is converted into a motion for summary
judgment. Jackson v. Integra Inc., 952 F.2d 1260, 1261 (10th Cir. 1991). However, one exception
is when outside documents are both central to the plaintiff’s claims and the plaintiff refers to the
-9-
learned that [Defendant] may have used [the] database, in part, to formulate [Defendant’s]
new line of hoses. Thus, it seems likely that [Ms. Bale] communicated Plaintiff’s database
to someone . . . and the database was actually used to [Defendant’s] competitive
advantage.” January 10, 2013 Letter [#12-6]. Plaintiff also acknowledged that “it is
theoretically possible that [Defendant] deduced this information from public sources,”
although that process would have been “painstaking.” Id.
These allegations do not demonstrate that Plaintiff had “facts essential to the cause
of action” by the time it wrote the January 10, 2013 letter. Plaintiff’s statement in the letter
that it had “substantial circumstantial evidence” of access to and use of Plaintiff’s trade
secrets is tempered by its other statements that Defendant “may” have accessed and used
the trade secrets, that it “seems likely” that Ms. Bale communicated the information to
Defendant because Defendant produced a new line of hoses, and that it is “theoretically
possible” that Defendant could have deduced the information from public sources. January
10, 2013 Letter [#12-6]. Plaintiff’s statements that it had suspicions but that Defendant
could have done the market research in order to produce its new line of hoses, and that
Plaintiff did not know whether Ms. Bale had ever successfully transmitted information to
Defendant, do not show that Plaintiff had knowledge of the essential facts from which a
reasonable jury could infer misappropriation. See Gognat, 224 P.3d at 1045.
Defendant cites to Gognat, where the state court found that time started running on
the plaintiff’s trade secret misappropriation claim “when he first had reason to know that
documents in the complaint. GFF Corp. v. Associated Wholesale Grocers, 130 F.3d 1381, 1384
(10th Cir. 1997). Here, Plaintiff refers to the January 10, 2013 letter in the Complaint, the letter is
central to whether Plaintiff’s claims are barred by the statutes of limitations, and Defendant does
not dispute its authenticity. See id.
-10-
defendants had misappropriated a trade secret.” Motion [#54] at 14. However, in Gognat,
the plaintiff admitted during a deposition that he had known that the defendants had begun
acquiring leases “based on” plaintiff’s trade secrets, and that he knew that defendants were
misusing his trade secrets. Gognat, 224 P.3d at 1047. Here, Plaintiff only knew that it had
intercepted an e-mail from Ms. Bale that appeared to be directed to Defendant (meaning
that Defendant never received the e-mail), and that Defendant may have either used trade
secrets in developing its line of hoses, or may have spent substantial time and money to
create such a product line itself. Am. Compl. [#49] ¶ 18-19, 54. Furthermore, Plaintiff was
told by Defendant in its responses to the letters that Defendant had confirmed through its
investigation that no one affiliated with Defendant had downloaded, used, or kept the
information at issue, and that “[n]one of [Plaintiff’s] confidential information . . . was used
in the development” of the hose line. See Am. Compl. [#49] ¶¶ 53, 56. These facts do not
indicate that Plaintiff knew of the essential facts regarding misappropriation prior to May
2013.
Lastly, the Court must address the issue of whether Plaintiff should have known of
the essential facts regarding misappropriation prior to May 2013.
Taking Plaintiff’s
allegations as true, it does not appear that Plaintiff should have had knowledge of
Defendant’s involvement. See Gognat, 224 P.3d at 1045. Plaintiff was diligent in acting
on its discovery of the misdirected e-mail, and Plaintiff thereafter followed up through
several letters to Defendant, and relied on Defendant’s assurances that its employees had
not accessed, used, or retained Plaintiff’s trade secrets. Am. Compl. [#49] ¶¶ 21, 52, 53,
55, 56. Thus, the Court concludes that the allegations do not demonstrate that Plaintiff
should have known of Defendant’s involvement in Ms. Bale’s conduct at an earlier date.
-11-
Plaintiff has sufficiently alleged that its claims did not accrue until spring 2016. See Jones,
549 U.S. at 215.
Accordingly, the Court denies the Motion [#54] with respect to this claim.
b. Tort Claims
Next, the Court addresses Plaintiff’s tort claims for misappropriation of business
values and tortious interference with contract, which both have a two-year statute of
limitations. See Col. Rev. Stat. Ann. § 13-80-102. “[A] cause of action for injury to person,
property, reputation, possession, relationship, or status shall be considered to accrue on
the date both the injury and its cause are known or should have been known by the
exercise of reasonable diligence.” Colo. Rev. Stat. § 13-80-108(1). Defendant raises the
same argument previously addressed – that Plaintiff admitted that it had knowledge
regarding the involvement of Defendant’s management as early as March 2012 and as late
as January 2013. Motion [#54] at 15. For the same reasons discussed above, the Court
finds that the allegations of the Amended Complaint do not demonstrate that these claims
are barred by the statute of limitations. See Gognat, 224 P.3d at 1045. Rather, the
allegations support Plaintiff’s argument that it was not aware of Defendant’s involvement
in misappropriation of business value, or interference with a contract, until spring 2016.
Accordingly, the Court concludes that Plaintiff’s tort claims are not barred by the
applicable statutes of limitations and the Motion [#54] is denied with respect to these
claims.
2. Computer Fraud and Abuse Act
Next, the Court addresses Plaintiff’s sole federal claim, which Plaintiff brings
-12-
pursuant to the Computer Fraud and Abuse Act. For this type of claim, the two-year statute
of limitations begins to run on the “date of the act complained of or the date of the discovery
of the damage.” 18 U.S.C. § 1030(g). As with the other claims, Plaintiff alleges that it was
not aware of Defendant’s involvement until the spring 2016.
Defendant cites to a case from the Eastern District of Louisiana to support its
argument that the statute of limitations has run. Motion [#54] at 15; see Higgins v. NMI
Enterprises, Inc., No. 09-6594, 2013 WL 27556, at *9 (E.D. La. Jan. 2, 2013). In Higgins,
the defendant claimed that the plaintiffs had full knowledge of the alleged violations when
they filed a Citizens’ Complaint based on their suspicions that the defendant had
misappropriated an email password. The court stated that it was “unreasonable for
Plaintiffs to claim that they only became aware of any damage after the Department of
Justice investigation, when it was their Citizens’ Complaint that triggered that investigation
and they admit they suspected [defendant] the whole time.” Id. First, Higgins has no
precedential weight in the District of Colorado. Further, the facts in Higgins differ in a
critical way from the present matter. Here, Plaintiff does not allege that its report to the FBI
that led to an investigation was made based on suspicion of Defendant’s actions – rather,
the report was based on suspicion regarding the actions of Ms. Bale. Am. Compl. [#49] ¶
23. Plaintiff does not allege that it had knowledge of Defendant’s involvement at that time.
Thus, the Court again concludes that Plaintiff’s allegations do not show that it discovered
or should have discovered Defendant’s involvement prior to the running of the statute of
limitations. See Gognat, 224 P.3d at 1045.
Accordingly, the Court concludes that Plaintiff’s Computer Fraud and Abuse Act
claim is not barred by the statute of limitations and the Motion [#54] is denied with respect
-13-
to this claim.5
B.
Whether Plaintiff’s Tort Claims are Preempted
Defendant also argues that Plaintiff’s claims for misppropriation of business values
and tortious interference with contract are preempted by the misappropriation of trade
secrets claim raised under CUTSA. Motion [#54] at 18-19.
This Court has rejected the contention that state law tort claims which arise from a
set of circumstances that happen to involve purported trade secret misappropriation are
uniformly preempted by CUTSA. See Powell Prods., Inc. v. Marks, 948 F. Supp. 1469,
1474 (D. Colo. 1996). Rather, claims are preempted when they “are no more than a
restatement of the same operative facts which would plainly and exclusively spell out only
trade secret misappropriation.” Id. (internal citation omitted). Preemption does not bar
every claim arising from the same set of facts. “Often, a plaintiff will be able to state claims
that do not depend upon the information in question qualifying as trade secrets,” and
further, “a plaintiff may also bring claims that, although involving a trade secret
misappropriation issue, include additional elements not necessary for a misappropriation
claim under the [C]UTSA.” Id.
With respect to the unfair misappropriation of business values claim, the Amended
Complaint alleges that Defendant unfairly misappropriated the “labor, skill, and money” that
Plaintiff spent in developing its software, Gates Database, VIO data, and automotive-parts
product line when Defendant “acquired and used [Plaintiff’s] trade secrets” to develop the
5
Because of the Court’s conclusion that the statutes of limitations did not begin to run until
spring 2016, the Court does not address the parties’ arguments with respect to each claim
regarding tolling.
-14-
hose line. Am. Compl. [#49] ¶¶ 72, 73. Plaintiff’s allegation that Defendant unfairly
misappropriated “labor, skill, and money” expended by Plaintiff on developing its various
business tools is separate from misappropriation of the trade secrets themselves. See
Powell Prods., 948 F. Supp. at 1474 (stating that “a plaintiff may also bring claims that,
although involving a trade secret misappropriation issue, include additional elements not
necessary for a misappropriation claim under the [C]UTSA”). Rather, the misappropriation
of “labor, skill, and money” does not necessarily rely on the existence of a legally
cognizable trade secret. See id. Thus, the claim does not rely on the same facts alleged
to support the CUTSA claim, and therefore is not preempted. See id. Accordingly, the
Motion [#54] is denied with respect to Plaintiff’s unfair misappropriation of business values
claim.
Defendant also argues that Plaintiff’s tortious interference with contract claim is
preempted because it is based on the same allegations as the CUTSA claim. Motion [#54]
at 18-19. Plaintiff argues that the essence of this claim is that Defendant induced Ms. Bale
to breach her confidentiality obligations to Plaintiff, and that it is irrelevant that the contract
was breached by the disclosure of trade secrets. Response [#55] at 19. Employing the
appropriate fact-driven approach set out in Powell, preemption is not appropriate with
respect to this claim because the underlying facts supporting Plaintiff’s claim for tortious
interference are not merely a restatement of the facts alleged to support the trade secret
misappropriation claim. See Powell Prods., 948 F. Supp. at 1474. Rather, interference
with a contract involves consideration of different elements. Here, the contract at issue is
the Employee Termination Statement that Ms. Bale and Plaintiff signed, which contained
non-disclosure provisions. Plaintiff’s Amended Complaint alleges that Defendant knew of
-15-
the contract and intentionally induced Ms. Bale to breach the contract by obtaining and
sending trade secrets to members of Defendant’s management team. Am. Compl. [#49]
¶¶ 77-79. In contrast, the misappropriation of trade secrets claim does not require that
Defendant had knowledge of any contract between Plaintiff and Ms. Bale. Thus, the
tortious interference with contract claim is not preempted because it includes an element
that does not need to be proven for the CUTSA claim. See Powell Prods., 948 F. Supp.
at 1474. Accordingly, the Motion [#54] is denied with respect to Plaintiff’s tortious
interference with contract claim.
IV. Conclusion
For the foregoing reasons,
IT IS HEREBY ORDERED that the Motion [#54] is DENIED.
Dated: November 28, 2017
-16-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?