Mitchell Enterprises, Inc. et al v. Mr. Electric Corp. et al

Filing 57

MEMORANDUM DECISION AND ORDER Defendants' Motion for Summary Judgment (Docket No. 34 ) is GRANTED in its entirety. Signed by Judge Ronald E. Bush. (caused to be mailed to non Registered Participants at the addresses listed on the Notice of Electronic Filing (NEF) by (jp)

Download PDF
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO MITCHELL ENTERPRISES, INC., d/b/a MITCHELL ELECTRIC, an Idaho corporation, DANNY G. MITCHELL and TERESA A. MITCHELL, husband and wife, Idaho residents, Plaintiffs, v. Case No. CV 11-0537-REB MEMORANDUM DECISION AND ORDER RE: DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT (DOCKET NO. 34) MR. ELECTRIC CORP., a Texas corporation, THE DWYER GROUP, a Texas corporation, and DOES 1-10, inclusive, Defendants. Currently pending before the Court is Defendants’ Motion for Summary Judgment (Docket No. 34). Having carefully considered the record, heard the oral argument of counsel, and otherwise being fully advised, the Court enters the following Memorandum Decision and Order: I. GENERAL BACKGROUND 1. Plaintiff Mitchell Electric is a family-owned and family-operated electrical contractor that specializes in renovations and troubleshooting in the Treasure Valley area of Idaho. See Compl., ¶ 11 (Docket No. 2). Mitchell Electric has provided electrical contractor services in the Treasure Valley since 1969. See id. Mitchell Electric’s current owners and operators are Plaintiffs Danny and Teresa Mitchell. See id. 2. In the early-to mid-1990's, Mitchell Electric developed a copyrighted software system to manage all aspects of its business records, including customer lists, contact MEMORANDUM DECISION AND ORDER - 1 information, employee personnel files, time sheets, inventory, project bids, invoices, sales documents, and financial statements. See id. at ¶ 12. 3. In 2007, Mitchell Electric began to develop an upgraded version of its software with the intention of marketing it to other service providers. See id. at ¶ 13. According to Mitchell Electric, the original and upgraded versions of the software (collectively, the “Mitchell Dispatch Software”), along with the proprietary business information it contained (the “Data”), “served as the lifeblood of Mitchell Electric’s business success.” Id. 4. In the same 2007 year, Mitchell Electric explored the possibility of becoming a franchisee of Defendant Mr. Electric. See id. at ¶¶ 14 & 15; see also Defs.’ U.F. No. 4 (Docket No. 34, Att. 2); Pls.’ Stmt. of Disputed Facts No. 4 (Docket No. 53, Att. 1). Since 1994, Mr. Electric has offered franchises which sell, service, and repair electrical systems, equipment, components, and supplies, including installation, upgrades, and remodeling for residential and commercial customers. See Defs.’ U.F. No. 1 (Docket No. 34, Att. 2); Pls.’ Stmt. of Disputed Facts No. 1 (Docket No. 53, Att. 1). 5. On October 26, 2007, Mitchell Electric and Mr. Electric entered into a Franchise Agreement under which Mitchell Electric became Mr. Electric’s franchisee in Ada County and Canyon County, Idaho. See Compl., ¶ 16 (Docket No. 2). Mitchell Electric claims that the Franchise Agreement (1) permitted Mitchell Electric to continue to own and develop the Mitchell Dispatch Software and the Data as a separate business opportunity, and (2) permitted Mitchell Electric to utilize the Mitchell Dispatch Software and the Data for its business operations rather than Mr. Electric’s ZWARE software (a database system designed for Mr. MEMORANDUM DECISION AND ORDER - 2 Electric franchisees and customized for use in Mr. Electric’s franchise system). See id. at ¶¶ 15 & 17; see also Defs.’ U.F. No. 7 (Docket No. 34, Att. 2); Pls.’ Stmt. of Disputed Facts No. 7 (Docket No. 53, Att. 1) . 6. Also on October 26, 2007, Mitchell Electric and Mr. Electric executed a ZWARE License and Maintenance Agreement (the “ZWARE Agreement”), whereby Mitchell Electric agreed to license the ZWARE software from Mr. Electric and to cooperate in installing and supporting the ZWARE software on Mitchell Electric’s computer network. See Compl., ¶ 18 (Docket No. 2); see also Defs.’ U.F. No. 7 (Docket No. 34, Att. 2); Pls.’ Stmt. of Disputed Facts No. 7 (Docket No. 53, Att. 1). Even so, Mitchell Electric insists that, at the time the parties executed the ZWARE Agreement, Mr. Electric assured Mitchell Electric that, although Mr. Electric required each franchisee to install the ZWARE software on its computer network, Mitchell Electric could nonetheless use the Mitchell Dispatch Software and the Data to conduct its business operations rather than the ZWARE software. See Compl., ¶ 19 (Docket No. 2). Soon thereafter, the ZWARE software was installed on Mitchell Electric’s computer network. See Defs.’ U.F. No. 9 (Docket No. 34, Att. 2).1 7. On August 23, 2009, Mitchell Electric met with Mr. Electric, expressing frustrations about various aspects of the franchise relationship and explained that Mitchell Electric was experiencing financial difficulties due to Mr. Electric’s alleged inadequate support and pricing structure. See Compl., ¶ 20 (Docket No. 2); see also Ans., ¶ 20 (Docket No. 11). 1 Mitchell Electric disputes this fact, however, in doing so, states only that Mr. Electric assured Mitchell Electric that Mitchell Electric could continue to use the Mitchell Dispatch Software for its business operations. See Pls.’ Stmt. of Disputed Facts No. 9 (Docket No. 53, Att. 1). In other words, Mitchell Electric does not seem to actually dispute that the ZWARE software was eventually installed on Mitchell Electric’s computer network. MEMORANDUM DECISION AND ORDER - 3 8. Later on August 23, 2009, Mrs. Mitchell attempted to remotely access Mitchell Electric’s computer from a home computer. See Compl., ¶ 21 (Docket No. 2). Mitchell Electric claims that, Upon doing so, [Mrs. Mitchell] noticed unusual activity in Mitchell Electric’s computer network and observed what appeared to be the copying of certain Mitchell Electric computer files from some other remote location. Subsequently, the Mitchells not only lost all access to the Mitchell Electric computer network and the Mitchell Dispatch Software and the Data, but they also found that the Mitchells’ home computers, including the personal computers of the Mitchells’ five children, had seemingly crashed. Id. In turn, on either August 23, 2009 or August 24, 2009, Mitchell Electric contacted Mr. Electric to ask if Mr. Electric’s system had been compromised in a way that might explain the difficulties the Mitchells were experiencing with their office and home computers. See id. at ¶ 22; see also Answer, ¶ 22 (Docket No. 11). Mr. Electric responded that its computer network had not been compromised. See id. 9. Thereafter, Mitchell Electric retained the services of a computer forensics company to evaluate Mitchell Electric’s computer network and the Mitchells’ home computers. See Compl., ¶ 23 (Docket No. 2). 10. Mitchell Electric claims that on November 5, 2009, the forensics company (1) “reported that the ZWARE software had attempted to connect to all thirteen hard drives in Mitchell Electric’s and the Mitchells’ computer network, and the investigation also uncovered numerous link files in the server that referenced ZWARE, Mr. Electric, and [Defendant] Dwyer Group,” and (2) “concluded that Defendants had utilized the ZWARE software to gain unauthorized access to Mitchell Electric’s and the Mitchells’ computers.” Id. at ¶ 24. 10. Claiming damages owing to Mr. Electric’s allegedly “unlawful acts,” Plaintiffs filed a Complaint on November 4, 2011, asserting the following claims against Defendants: (1) MEMORANDUM DECISION AND ORDER - 4 violation of the Computer Fraud and Abuse Act (“CFAA”) (Count 1); (2) violation of the Idaho Trade Secrets Act (“ITSA”) (Count 2); (3) conversion (Count 3); and (4) tortious interference with prospective economic advantage (Count 4). See id. at ¶¶ 25-53.2 11. Defendants deny the allegations. In the pending Motion for Summary Judgment, Defendants argue that: [P]laintiffs have failed to establish a genuine dispute of material fact on elements essential to their claims entitling Defendants to judgment as a matter of law on all claims stated in the Complaint. Plaintiffs have failed to produce any evidence to establish (a) that Defendants gained unauthorized access to Plaintiffs’ computer network (or any specific computer) or (b) that, even assuming arguendo Defendants’ unauthorized access, that Defendants (i) caused any damage to the computers or data contained on the computers, (ii) converted, used, disclosed, or otherwise misappropriated any data or software contained on the computers, or (iii) actually interfered with or caused any harm to any potential or actual economic relationship or expectation of Plaintiffs. Mot. for Summ. J., p. 2 (Docket No. 34). II. DISCUSSION A. Summary Judgment Standard Summary judgment is appropriate where a party can show that, as to any claim or defense, “there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). One of the principal purposes of the summary judgment “is to isolate and dispose of factually unsupported claims . . . .” Celotex Corp. v. Catrett, 477 U.S. 317, 323-34 (1986). It is “not a disfavored procedural shortcut,” but is 2 Apparently, Plaintiffs have clarified that, while Count 1 is brought by all Plaintiffs, Counts 2, 3, and 4 are brought by Plaintiff Mitchell Electric only. See Mem. in Supp. of MSJ, p. 11, n.7 (Docket No. 34, Att. 1). For ease of reference, the term “Plaintiffs” is a collective reference within this Decision, unless otherwise indicated. MEMORANDUM DECISION AND ORDER - 5 instead the “principal tool[ ] by which factually insufficient claims or defenses [can] be isolated and prevented from going to trial with the attendant unwarranted consumption of public and private resources.” Id. at 327. “[T]he mere existence of some alleged factual dispute between the parties will not defeat an otherwise properly supported motion for summary judgment.” Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247-48 (1986). There must be a genuine dispute as to any material fact – a fact “that may affect the outcome of the case.” Id. at 248. The evidence must be viewed in the light most favorable to the non-moving party, and the Court must not make credibility findings. See id. at 255. Direct testimony of the nonmovant must be believed, however implausible. See Leslie v. Grupo ICA, 198 F.3d 1152, 1159 (9th Cir. 1999). On the other hand, the court is not required to adopt unreasonable inferences from circumstantial evidence. See McLaughlin v. Liu, 849 F.2d 1205, 1208 (9th Cir. 1988). The Court must be “guided by the substantive evidentiary standards that apply to the case.” Liberty Lobby, 477 U.S. at 255. If a claim requires clear and convincing evidence, the question on summary judgment is whether a reasonable jury could conclude that clear and convincing evidence supports the claim. See id. The moving party bears the initial burden of demonstrating the absence of a genuine dispute as to material fact. See Devereaux v. Abbey, 263 F.3d 1070, 1076 (9th Cir. 2001) (en banc). To carry this burden, if the nonmoving party bears the burden of persuasion at trial, the moving party need not introduce any affirmative evidence (such as affidavits or deposition excerpts) but may simply point out the absence of evidence to support the nonmoving party’s case. See Fairbank v. Wunderman Cato Johnson, 212 F.3d 528, 532 (9th Cir. 2000). This shifts the burden to the non-moving party to produce evidence sufficient to support a jury verdict in her favor. See Devereaux, 263 F.3d at 1076. The non-moving party must go MEMORANDUM DECISION AND ORDER - 6 beyond the pleadings and show “by her [ ] affidavits, or by the depositions, answers to interrogatories, or admissions on file” that a genuine dispute of material fact exists. See Celotex, 477 U.S. at 324. However, the court is “not required to comb through the record to find some reason to deny a motion for summary judgment.” Carmen v. San Francisco Unified Sch. Dist., 237 F.3d 1026, 1029 (9th Cir. 2001) (quotation omitted). Instead, the “party opposing summary judgment must direct [the court’s] attention to specific triable facts.” S. Cal. Gas Co. v. City of Santa Ana, 336 F.3d 885, 889 (9th Cir. 2003). B. Plaintiffs’ CFAA Claim (Count 1) is Time-Barred In addition to their substantive arguments attacking Plaintiffs’ CFAA claim, Defendants contend that the claim is procedurally barred by the applicable statute of limitations. See Mem. in Supp. of MSJ, pp. 5-6 (Docket No. 34, Att. 1). The CFAA contains a two-year statute of limitations period. It begins on “the date of the act complained of or the date of the discovery of the damage.” 18 U.S.C. § 1030(g). “Damage” is defined as “any impairment to the integrity or availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). Defendants argue that Plaintiffs were aware of the damage to their computer network (and even suspected Defendants and/or the ZWARE software to be the cause of that damage) as of August 23 or 24, 2009 – more than 26 months before filing their Complaint on November 4, 2011. See id. at p. 6 (“On this evidentiary record, there can be no genuine dispute that Plaintiffs’ filed their action under the CFAA beyond the Act’s limitations period. Their CFAA claim is time-barred.”). In response, Plaintiffs do not deny that, on or MEMORANDUM DECISION AND ORDER - 7 around August 23, 2009, they suspected that their computer network was compromised in some way. See Pls.’ Stmt. of Disputed Facts No. 10 (Docket No. 53, Att. 1) (not disputing that “act complained of” for purposes of CFAA occurred on August 23, 2009). However, they submit that their CFAA claim did not actually “accrue” until November 5, 2009, when they received the first computer forensics report detailing the damage to its computer network, the Mitchell Dispatch Software, and the Data. See Opp. to MSJ, p. 4 (Docket No. 53). In other words, Plaintiffs take the position that a later-alleged date reflecting their discovery of the “details of damage” should control the date the statute of limitations begins to run on their CFAA claim. Plaintiffs’ argument that the statute of limitations only began to run upon a forensic confirmation of their behalf of damage, rather than the date that such apparent damage became known to them is without merit. They admit that the act complained of – Mr. Electric’s alleged intrusion of Defendants’ computers – occurred more than two years before they filed this lawsuit. Their argument, however, would add an otherwise unexpressed layer to the statute’s description of the statute of limitations – one that contemplates a more developed level of knowledge surrounding the discovery of claimed damage. To be clear, the CFAA requires a plaintiff to file suit within two years of discovering “‘any impairment to the integrity or availability of data, a program, a system, or information.’” Clark Street Wine and Spirits v. Emporos Sys. Corp., 754 F. Supp. 2d 474, 486 (E.D.N.Y. 2010) (quoting 18 U.S.C. § 1030(e)(8)). Through their Complaint, Plaintiffs admit that the genesis of their CFAA claim began around August 23, 2009 when they first became aware of problems with their computer network, including unauthorized file copying, loss of computer access, and system crashes. See MEMORANDUM DECISION AND ORDER - 8 Compl., ¶¶ 21 & 22 (Docket No. 2).3 There is no requirement that the damage be confirmed by some sort of independent forensic examination. To add such a requirement would create a wandering line in the application of the statute of limitations, a line that would only be set if and when a party obtained such a separate or independent confirmation. That is not required to constitute the “discovery” of “damage” under the CFAA. The fact that Defendants were not exactly aware of whom or what caused the damage as of August 24, 2009 is immaterial, when considering that such detail is unequivocally not required under the CFAA to trigger its two-year limitations period. See, e.g., Higgins v. NMI Enters., Inc., 2013 WL 4525635, *10-11 (E.D. La. 2013) (“There is no mention [in the CFAA] that a plaintiff must know the alleged perpetrator for the statute of limitations to begin. . . . . Here, Smith knew of unauthorized access to the computer system, which prompted Smith to initiate an internal investigation . . . . Thus, it is clear that Smith had an ‘awareness of an unauthorized access into [Thundervision’s] computer system,’ which began the statute of limitations period more than two years before this action was filed.”). Plaintiffs identified what they alleged to be (1) an unauthorized access into their computer system that (2) caused corresponding damage, before November 4, 2009. Accordingly, their CFAA claim against Defendants, even if otherwise viable, is time-barred under the CFAA’s statute of limitations. Defendants’ Motion for Summary Judgment is granted in this respect.4 3 Even disregarding August 23, 2009's factual backdrop, Plaintiffs go on to admit that they then retained the services of a computer forensics company to address the issue. See Compl., ¶ 23 (Docket No. 2). Though it is unclear when this actually took place, it is reasonable to assume it happened well before November 4, 2009 (two years before the Complaint’s November 4, 2011 filing) given the computer forensics company’s November 5, 2009 report back to Defendants. See id. at ¶ 24. 4 Given the Court’s dismissal of Plaintiffs’ CFAA claim on statute of limitations grounds, there is no need to consider Defendants’ other arguments concerning whether Plaintiffs have properly stated a CFAA claim. MEMORANDUM DECISION AND ORDER - 9 C. Defendants are Entitled to Summary Judgment on Plaintiffs’ ITSA Claim (Count 2) The parties agree that, to prevail on a claim for misappropriation of trade secrets under the ITSA, a plaintiff must show that (1) it owned a trade secret; (2) the defendant acquired, disclosed, or used that trade secret through improper means, and (3) the defendant’s actions damaged the plaintiff. See Northwest Bec-Corp v. Home Living Serv., 41 P.3d 263, 268 (Idaho 2002); Basic American, Inc. v. Shatila, 992 P.2d 175, 183 (Idaho 1999); see also I.C. § 48801(2); Compare Mem. in Supp. of MSJ, p. 12 (Docket No. 34, Att. 1), with Opp. to MSJ, pp. 12-13 (Docket No. 53). Defendants argue that “there is no evidence that Defendants acquired, disclosed, or used the Mitchell Dispatch Software or any information, data, or other possible trade secret material belonging to Mitchell Electric.” Mem. in Supp. of MSJ, p. 11 (Docket No. 34, Att. 1). In response, Plaintiffs do not identify evidence that Defendants either disclosed or used the alleged trade secrets; rather, Plaintiffs submit that “[t]here is evidence that Defendants acquired the [Mitchell Dispatch Software] and the data contained therein.” Opp. to MSJ, p. 13 (Docket No. 53). According to Plaintiffs, that evidence is circumstantial, and takes the form of the following: • “Mitchell Electric had never experienced any significant computer issues, problems, or unusual activity before becoming a Mr. Electric franchisee and permitting ZWARE to be installed on its computer network.” Id. (citing Pls.’ Stmt. of Disputed Facts No. 13 (Docket No. 53, Att. 1)). • “After ZWARE was installed, Teresa Mitchell and Danny Mitchell personally witnessed files being copied with no input commands when Teresa Mitchell remotely logged onto her work computer on August 23, 2009.” Id. • “A folder that had never been seen by Teresa Mitchell or Danny Mitchell entitled ZWARE.zip inexplicably appeared on the desktop of Teresa MEMORANDUM DECISION AND ORDER - 10 Mitchell’s work computer and it contained a Quickbooks file with Mitchell accounting data and employee information.” Id. • “A unique, unprecedented browser link appeared in the browser history of Teresa Mitchell’s work computer.” Id. at pp. 13-14. • “Mitchell had never before utilized ZWARE in any form or fashion.” Id. The Court has carefully considered these factual allegations. However, even accepting such facts and any related reasonable inferences in favor of Plaintiffs, such evidence does not establish a prima facie case of Defendants’ “acquisition” of Plaintiffs’ trade secrets, as those terms are used in the ITSA. In other words, none of this evidence points toward Defendants actually coming into possession of Plaintiffs’ claimed trade secrets through improper means or otherwise. Seemingly recognizing this obstacle, Plaintiffs go on to identify additional circumstantial evidence that could be construed as suggestive of Defendants’ ultimate acquisition of Plaintiffs’ trade secrets: • “ZWARE possesses the capability to do everything witnessed by Teresa and Danny Mitchell, and the lone changed variable prior to the unusual activity and damage was the installation of ZWARE on Mitchell’s computers.” Id. at p. 14. • “ZWARE has the ability to create .zip files, just like the ZWARE.zip file that inexplicably appeared on the desktop of Teresa Mitchell’s work computer.” Id. • “The copy of ZWARE installed on Mitchell’s computers was ‘pointed’ at Mitchell’s Quickbooks file.” Id. • “ZWARE has the capability to communicate with and send a query to Quickbooks, to search for Quickbooks data and transmit files through a file transfer protocol.” Id. • “Not only does ZWARE have these capabilities, the Quickbooks files located in the ZWARE.zip file that inexplicably appeared on the desktop of Teresa MEMORANDUM DECISION AND ORDER - 11 Mitchell’s work computer directly interacted with ZWARE and the Quickbooks files were modified during that interaction.” Id. • “Additionally, ZWARE contains components called ‘NES2.’ NES2 opens a port for purposes of remote access to a computer. Significantly, NES2 opens TCP, or remote access, ports and attempts to run a ‘send’ and ‘receive’ transmit function about once a minute. This transmit function packages files from the computer on which it is installed and attempts to send them to a remote server. It appears that NES2 ‘is able to automatically transfer files online without the user’s direct intervention.’” Id. At first blush, these circumstances reflect an argument that, owing to Mr. Electric’s ZWARE software system’s capabilities, a material issue of fact exists as to whether Defendants acquired Plaintiffs’ alleged trade secrets. However, these circumstances do not exist in isolation; when examined more closely, the inferences to be drawn therefrom lose their persuasive sway in establishing a material issue of fact. To begin, in support of their opposition to dismissal of their ITSA, Plaintiffs rely almost exclusively upon Dylan Evans’ June 12, 2013 Declaration and attached reports. See id; see also Pls.’ Stmt. of Disputed Facts No. 13 (Docket No. 53, Att. 1) (citing Evans Decl (Docket No. 53, Att. 5)). But Mr. Evans’ reports are not as conclusive on the issue of Defendants’ liability as Plaintiffs would have this Court believe. For example, while Mr. Evans’ July 24, 2012 report states that the ZWARE software “has the capability to search for Quickbooks data and transmit files through FTP” and “has the capability to create .zip files, backup Quickbooks data, and that the particular copy installed on the Mitchell Electric network was pointed to the company Quickbooks file,” he goes on to concede that these actions/functions require manual/user intervention – “that is, it does not happen without a user first logging in and then clicking the corresponding button.” 7/24/12 Rpt., MEMORANDUM DECISION AND ORDER - 12 attached as Ex. C to Evans Decl. (Docket No. 53, Att. 9).5 Relevant here, Mr. Evans ultimately concludes in no uncertain terms that: No automatically-executing component of the ZWARE software was discovered to be present on the Mitchell Electric network, including the NES2 Components, nor was unauthorized external remote access software detected. Id. (emphasis added). The point here is that the circumstances offered to suggest that Defendants acquired (and, in turn, misappropriated) Plaintiffs’ trade secrets paint an incomplete picture. It is apparently true that the ZWARE software has the capacity to perform in a certain way that could contribute to complications within a computer network system, so long as specific preconditions are satisfied; yet, on the ultimate question of whether Defendants and the ZWARE software bear any responsibility for Plaintiffs’ alleged damages, Mr. Evans defers – even when he had multiple opportunities to say so.6 Mr. Evans’ deposition testimony confirms as much, when in response to Defendants’ counsel’s questions concerning allegations made in Plaintiffs’ Complaint, he testified: Q: Okay. Do you have an understanding in your discussions, either by e-mail or otherwise, with any of the Plaintiffs, either Ms. or Mr. Mitchell of Mr. 5 Mr. Evans’ August 29, 2012 report similarly states that ZWARE’s ability to access Quickbooks company files requires manual intervention. See 8/29/12 Rpt., attached as Ex. D to Evans Decl. (Docket No. 53, Att. 10) (“ZWARE will not automatically interact with Quickbooks unless a user clicks a series of buttons within ZWARE.”). Likewise, Mr. Evans’ April 18, 2012 report states that the NES2 components need to be “extracted from an archive and then installed separately.” 4/18/12 Rpt., attached as Ex. B to Evans Decl. (Docket No. 53, Att. 7). 6 Mr. Evans’ June 12, 2013 report offers an “alternative explanation” to what allegedly took place with Plaintiffs’ computer network system – the presence of ActMon/malware. See 6/12/13 Rpt., attached as Ex. E to Evans Decl. (Docket No. 53, Att. 11). Notably, however, the June 12, 2013 report altogether avoids attributing the ActMon presence to Defendants or the ZWARE software. Separately, even though posited as an “alternative explanation,” Mr. Evans determined that “[t]here is no evidence to conclude that ActMon directly caused any of the behavior or data destruction reported by Mrs. Mitchell . . . .” Id. MEMORANDUM DECISION AND ORDER - 13 Dixon or any of the lawyers for the Plaintiffs in this case, that that issue you just mentioned is at issue in this case, whether there was some unauthorized access to the Mitchells’ computers? A: Yes, I understand that’s an issue in this case. Q: Okay. Do you also understand that another issue in this case is whether or not there was any loss or destruction of data as a result of that kind of unauthorized access to those computers? A: Yes. Q: Okay. Let me ask you this: Do you believe that there’s any evidence that there was unauthorized access by any of the defendants in this case? A: No, I do not. Q: Is there any evidence, to your understanding, that there were any data that has been lost or destroyed as a result of some unauthorized access by the Defendants in this case? A: Could you rephrase that? Q: You bet I could. You’ve indicated you don’t believe there’s any evidence of an unauthorized access event by the Defendants; correct? A: Correct. Q: So you therefore, I assume, would agree with me that there is also no evidence that you’re aware of that data on the Mitchells’ computers was lost or destroyed as a result of that kind of access event? A: That’s correct. Q: You don’t know of such evidence? A: I found none. Evans Dep. at pp. 26-27, attached as Ex. KAC-7 to Cameron Decl. (Docket No. 39, Att. 9). Mr. Evans went on to agree with Defendants’ expert, Jerry Hatchett, that the Complaint’s reference at paragraphs 24 to an alleged forensics investigation/report finding that the ZWARE software MEMORANDUM DECISION AND ORDER - 14 gained unauthorized access (or exceeded any authorized access) to Mitchell Electric’s and the Mitchells’ computers (see supra), was not an opinion that he (Evans) shared: Q: Okay. Now, if we’d just go back to Mr. Hatchett’s report . . . . I think that you mentioned that [paragraph] 24 [of the Complaint] that Mr. Hatchett quotes . . ., it includes some findings, those are not your findings, I think is what you said; is that right? A: That’s correct. Q: Okay. He then says that he can only assume . . . “that the above passage,” and he’s talking about that paragraph 24 from the Complaint, “is referring to a report other than the Evans Report, or else there’s been a gross misinterpretation and presentation of the essence of the Evans Report. Specifically, I find nothing in the Evans Report that substantiates [paragraph] 24 from the Complaint.” Would you agree with him on that? A: I would. Q: You would? A: Yes. Q: Okay. He also indicates, the last sentence of that same paragraph we were just reading, it says, “In fact, I would opine that Mr. Evans quite carefully states that at each step of the process that he cannot conclude that anything suspect took place.” Would you agree with that statement? A: I would. Id. at pp. 31-32. Later, Mr. Evans candidly testified that he disagreed with Plaintiffs’ subjective belief that Defendants and its ZWARE software accessed and damaged Plaintiffs’ computer network system: Q: Okay. Did you know or come to know during the course of your work on this matter that Ms. Mitchell has an opinion about the two questions we talked about, that is, the access event and data destruction as a result of the access event? A: Yes, I am aware of her opinion. MEMORANDUM DECISION AND ORDER - 15 Q: What are her opinions? A: She believes that unauthorized access was gained to her computer. Q: And as a result she believes data was destroyed or lost? A: Correct. Q: Okay. Whether intentionally or unintentionally as a result of the activity of the Defendants; correct? A: Correct. Q: And you disagree with both of those opinions? A: I do. . . . . Q: And just to be clear, “I do,” you do disagree? A: I do disagree. Q: Okay. And that disagreement is a result of your own independent analysis in this case? A: Correct. Id. at pp. 37-38. At its core, Mr. Evans sided with Mr. Hatchett (Defendants’ expert) vis à vis Defendants’ alleged liability: Q: Okay. [Mr. Hatchett] then says [at paragraph 9 of his report], “To date I have seen nothing to indicate anything nefarious has occurred.” Do you agree with that? A: Yes.[7] Q: He also says, “I see no evidence suggesting that defendants used ZWARE to 7 To be fair, Mr. Evans subsequently stated in his June 12, 2013 report that “[n]efarious activity was indeed being performed on the Mitchell network,” due to ActMon and the entity that installed ActMon. See 6/12/13 Rpt., attached as Ex. E to Evans Decl. (Docket No. 53, Att. 11) (discussed supra). Regardless, Mr. Evans never suggests that Defendants or the ZWARE software are associated with this “alternative explanation.” See supra. MEMORANDUM DECISION AND ORDER - 16 gain unauthorized access to Plaintiffs’ systems or data.” Do you agree with that? A: Yes. Q: “Or to cause damage to Plaintiffs’ systems or data.” Do you agree with that as well? A: Yes. Q: Okay. He also says, “Moreover, I do not see any findings or conclusions by Plaintiffs’ own expert that establish such activity.” Do you agree with that? A: Yes. Q: He also says the following . . ., “But I have seen nothing to suggest any intentional cause of such a corruption as opposed to a routine failure of technology, the likes of which happen countless times per day in the computing universe.” Do you agree with that? A: I do. Id. at pp. 41-42. Simply put, Mr. Evans’ opinions do not support Plaintiffs’ allegation that Defendants’ acquired and/or misappropriated their trade secret information. Further, Mr. Evans’ opinions do nothing to cut against Mr. Hatchett’s expert opinion to the contrary. To that end, Mr. Hatchett unequivocally opines that his analysis (incorporating Mr. Evans’ own testimony and reports) indicates that there is no evidence (1) “to support the allegations that Defendants and/or ZWARE committed any unauthorized access, querying, gathering, or intrusion activity on any of Plaintiffs’ computers,” or (2) “that Defendants caused any damage to or unauthorized transmission of Plaintiffs’ data.” Hatchett Decl., ¶¶ 10 & 12 (Docket No. 37); see also 3/20/13 Rpt. (Docket No. 37, Att. 10) (“I found absolutely no evidence in the forensic record (or the reports and testimony of Plaintiffs’ expert, for that matter) that Defendants caused damage to or theft of any of Plaintiffs’ data.”). Mr. Hatchett does not stop MEMORANDUM DECISION AND ORDER - 17 there, he goes on to say: “[A]fter considering the totality of the evidence available in this case, I cannot presently recall investigating another case in which such serious allegations have been made, pursued, and maintained notwithstanding and despite an utter dearth of supporting evidence.” Hatchett Decl., ¶ 9 (Docket No. 37); see also 3/20/13 Rpt. (Docket No. 37, Att. 10). Mr. Hatchett then attributes the situation (and the very continued existence of this litigation) to Plaintiffs’ apparent inability to acknowledge the facts: When deposed, Plaintiffs’ expert and each of the technology-related witnesses who examined the computers and the alleged damage[8] . . . agreed with my position that there is no evidence of any intrusion having taken place in the [Mitchell Data Universe] or that Defendants caused any damage to or unauthorized transmission of Plaintiffs’ data. Despite this position from their own expert and hired technicians, Plaintiffs continue to insist that the evidence does exist. Although Mrs. Mitchell testified that she is not a technical person – and her testimony bears that concession out as accurate – she contradicts her own experts and continues to drive this process forward based on data and artifacts that she obviously has no understanding of, and many of which she is personally responsible for creating. When Mrs. Mitchell is asked to point out the evidence that not one of five involved technologists was able to find, it becomes obvious that virtually any reference to Defendants or to ZWARE anywhere within the [Mitchell Data Universe] is considered by her to be evidence of malfeasance by Defendants, no matter how unconnected, remote, routine, or expected the reference is. As noted above, however, that viewpoint finds absolutely no support in the evidence or the conclusions reached by both me and Plaintiffs’ own expert, Dylan Evans. 8 Defendants argue that “[t]he individuals and/or companies who authored the ‘reports’ referenced and relied in paragraphs 23 through 27 of the Complaint have fully and completely recanted any allegation or inference in such reports charging Defendants with unlawful access and/or causing any damage to Plaintiffs’ computers or data.” Defs.’ U.F. No. 17 (Docket No. 34, Att. 2) (citing G2 Research/Goldston Dep. at pp. 40-48, 73, 76-78, 81-84, 98-99, attached as Ex. KAC-8 to Cameron Decl. (Docket No. 39, Att. 10); Intermountain Network Solutions Dep. at pp. 58, 62-64, 98-99, attached as Ex. KAC-9 to Cameron Decl. (Docket No. 39, Att. 11); Virtual IT Dep. at pp. 90-93, 110-12, 116, 141-43, 146-48, attached as Ex. KAC-10 to Cameron Decl. (Docket No. 39, Atts. 12 & 13)). In response, Plaintiffs simply state that such facts are disputed, while referring back to Mr. Evans’ June 12, 2013 Declaration and attached reports. See Pls.’ Stmt. of Disputed Facts No. 17 (Docket No. 53, Att. 1). This is not enough to dispute that certain allegations in Plaintiffs’ Complaint may no longer accurately apply. MEMORANDUM DECISION AND ORDER - 18 3/20/13 Rpt. (Docket No. 37, Att. 10). Importantly, Mr. Hatchett’s opinions as to Defendants’ alleged liability are unrebutted by anyone with the appropriate level of expertise. With all this in mind, whatever circumstantial evidence may have originally existed in support of a claim that Defendants’ misappropriated Plaintiffs’ trade secrets is not just rebutted, but effectively eviscerated, when contrasted against the more developed, direct, and expert-based evidence in the record.9 Even if the great bulk of the evidence obtained through the experts could be viewed to be disputed by the factual assertions coming from Plaintiffs themselves, no reasonable minds could differ upon the answer to that dispute, and therefore there is no genuine issue of material fact. Hence, without stating here that Plaintiffs have no claim at all for their alleged damage, there is a failure of evidence to support a claim under the ITSA. Defendants’ Motion for Summary Judgment is granted in this respect.10 D. Defendants are Entitled to Summary Judgment on Plaintiffs’ Conversion Claim (Count 3) “Generally, conversion is any distinct act of dominion wrongfully exerted over another’s personal property in denial or inconsistent with his or her rights therein depriving him or her of possession, permanently or for an indefinite time.” Med. Recovery Servs., LLC v. Bonneville 9 Additionally, with respect to any argument that Plaintiffs never experienced significant computer issues before becoming a Mr. Electric franchisee and having the ZWARE software installed on its computer network, it should be pointed out that ZWARE was installed in November 2007 – nearly two years before the events of August 23, 2009. See Reply in Supp. of MSJ, p. 2, n.2 (Docket No. 55). 10 Given the Court’s dismissal of Plaintiffs’ ITSA claim given the absence of evidence that Defendants acquired/misappropriated Defendants’ trade secrets, it need not address Defendants’ other argument that Defendants suffered no damage by the alleged misappropriation. MEMORANDUM DECISION AND ORDER - 19 Billing, 2013 WL 20474, *2 (Idaho Ct. App. 2013) (citing Schlieff v. Bistline, 15 P.2d 726, 728 (Idaho 1932)). Actual possession of the property by the owner is not necessary; all that is required is either title to the property or a “right to possess the property at the time of the conversion.” W. Idaho Prod. Credit Ass’n v. Simplot Feed Lots, Inc., 678 P.2d 52, 54 (1984). Defendants argue that Plaintiffs “cannot make a prima facie case for conversion because there is no evidence that Defendants ever acquired or used the Mitchell Dispatch Software or related business data.” Mem. in Supp. of MSJ, p. 14 (Docket No. 34, Att. 1). In response, Plaintiffs contend that “[t]here is evidence that Defendants took possession and converted the [Mitchell Dispatch Software] and the data contained therein.” Opp. to MSJ, p. 16 (Docket No. 53). To support such a contention, Plaintiffs offer the exact same evidence (indeed, presented verbatim) that they did to oppose Defendants’ efforts to dismiss Plaintiffs’ ITSA claim – essentially, that the ZWARE software has the capability of exercising dominion over Defendants’ computer network system. See id. at pp. 16-17. For the same reasons that Plaintiffs cannot show that Defendants acquired and/or misappropriated their trade secrets (see supra), they likewise cannot show that Defendants converted the Mitchell Dispatch Software or the Data for its own use. Defendants’ Motion for Summary Judgment is granted in this respect.11 E. Defendants are Entitled to Summary Judgment on Plaintiffs’ Tortious Interference with Prospective Economic Advantage Claim (Count 4) Plaintiffs’ claim for tortious interference with a prospective economic advantage requires proof of: (1) the existence of a valid economic expectancy, (2) Defendants’ knowledge of the 11 Given the Court’s dismissal of Plaintiffs’ conversion claim, and the reasons for doing so, it need not address Defendants’ other argument that Defendants suffered no damage by the alleged conversion. MEMORANDUM DECISION AND ORDER - 20 expectancy, (3) intentional interference inducing termination of the expectancy, (4) the interference was wrongful by some measure beyond the fact of the interference itself, and (5) Plaintiffs’ resulting damage whose expectancy has been disrupted. See Cantwell v. City of Boise, 191 P.3d 205, 216 (Idaho 2008); Commercial Ventures, Inc. v. Rex M. & Lynn Lea Family Trust, 177 P.3d 955, 964 (Idaho 2008). Defendants argue that Plaintiffs cannot show (1) that Mitchell Electric had a valid prospective economic expectancy with which Defendants interfered; (2) Defendants actually interfered with any business relationship, customer, or potential customer of Mitchell Electric; or (3) that Defendants’ alleged conduct caused it any actual harm or damages. See Mem. in Supp. of MSJ, p. 16 (Docket No. 34, Att. 1). In response, Plaintiffs contend, in part, that “[t]here is evidence that Defendants “interfered with the [Mitchell Dispatch Software] and the data contained therein.” Opp. to MSJ, p. 18 (Docket No. 53). To support such a contention, Plaintiffs again put forward the exact same evidence (indeed, presented verbatim) offered to oppose Defendants’ efforts to dismiss Plaintiffs’ ITSA and conversion claims – essentially, that the ZWARE software has the capability of interfering with Defendants’ computer network system. See id. at pp. 18-19. For the same reasons that Plaintiffs cannot show that Defendants either acquired and/or misappropriated their trade secrets or converted the Mitchell Dispatch Software or the Data for its own use (see supra), they likewise cannot show that Defendants actually interfered with the Mitchell Dispatch Software or its Data so as to induce the termination of any alleged economic expectancy – even assuming such an expectancy’s existence. Defendants’ Motion for Summary Judgment is granted in this respect.12 12 Given the Court’s dismissal of Plaintiffs’ tortious interference with prospective economic advantage claim based upon the lack of evidence of actual interference with any alleged economic expectancy, it need not address Defendants’ other argument that Defendants had no valid economic expectancy and suffered no damage by the alleged interference. MEMORANDUM DECISION AND ORDER - 21 III. ORDER For the foregoing reasons, IT IS HEREBY ORDERED THAT Defendants’ Motion for Summary Judgment (Docket No. 34) is GRANTED in its entirety. DATED: April 7, 2014 Honorable Ronald E. Bush U. S. Magistrate Judge MEMORANDUM DECISION AND ORDER - 22

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?