Navistar, Inc., et al vs. New Baltimore Garage, Incorporated

Filing 34

MEMORANDUM Opinion and Order Signed by the Honorable Robert M. Dow, Jr on 9/20/2012. Mailed notice(tbk, )

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION NAVISTAR, INC., ET AL. Plaintiffs, v. NEW BALTIMORE GARAGE, INCORPORATED, Defendant. ) ) ) ) ) ) ) ) ) ) Case No. 11-cv-6269 Judge Robert M. Dow, Jr. MEMORANDUM OPINION AND ORDER Plaintiffs Navistar, Inc. (“Navistar”) and International Truck Intellectual Property Company, LLC (“International”) (collectively “Plaintiffs”) allege that Defendant New Baltimore Garage’s unauthorized use and distribution of codes needed to access Plaintiffs’ computer system enabled unauthorized third parties to access Plaintiffs’ proprietary and confidential materials and intellectual property, in direct violation of the parties’ agreements and to the detriment of Plaintiffs and their authorized dealers. Plaintiffs’ original complaint asserts claims for (1) breach of contract; (2) violation of the Digital Millennium Copyright Act (“DMCA”); (3) violation of the Computer Fraud and Abuse Act (“CFAA”); and (4) misappropriation of trade secrets. Defendant has moved to dismiss all claims. In response, Plaintiffs have filed a motion for leave to amend their complaint, which Defendant opposes. Plaintiffs’ amended complaint contains additional factual allegations as well as two new claims for unjust enrichment (Count II) and contributory copyright infringement (Count VI). For the reasons set forth below, the Court grants in part and denies in part Defendant’s motion to dismiss [17] and grants Plaintiffs’ motion for leave to amend [24], subject to the limitations set forth in this opinion. I. Background1 Navistar manufacturers, sells, and services trucks, buses, engines, and parts. Navistar operates in segments, and, as relevant here, the International Truck Intellectual Property Company segment holds and administers the intellectual property of Navistar. Navistar creates, develops, oversees, controls, and utilizes proprietary and confidential information essential to Navistar’s success. Compl. at ¶ 11–12. A significant aspect of Navistar’s business is the merchandising and licensing of distinctive elements associated with its products and services, including material protected under U.S. copyright law. Navistar enters into license agreements before authorizing others to access or use this information, as well as Navistar’s other intellectual property. Id. at ¶¶ 20, 22–24. Navistar has implemented a variety of measures to protect this information, including technological barriers to prevent unauthorized access, such as its “Dealer Communication Network” (“DCN”). Id. at ¶¶ 18–24. Navistar’s DCN is a password-protected computer system that enables only authorized users access to some of Navistar’s confidential information and intellectual property subject to the “DCN System and Services Agreement,” which prohibits use of DCN, or the underlying materials and information, by unauthorized parties. Id. Notably, this agreement specifically prohibits sharing with or otherwise distributing passwords to third parties and using a third party’s password to gain access to DCN. Id. at ¶ 24. Plaintiffs allege that on August 11, 2008, Navistar sent Defendant a cease and desist letter when it was alerted that Defendant may have provided a third party, Liberty Equipment Repair, with unauthorized access to DCN. Id. at ¶ 25. When third party Liberty Equipment’s license with Navistar terminated in 2005, it was no longer authorized to access DCN and the information 1 For purposes of ruling on Defendant’s motion to dismiss and Plaintiff’s motion to amend, the Court assumes as true all well-pleaded allegations set forth in Plaintiffs’ complaint and Plaintiffs’ proposed amended complaint. See, e.g., Killingsworth v. HSBC Bank Nevada, N.A., 507 F.3d 614, 618 (7th Cir. 2007). 2 and materials contained on the network. Id. at ¶ 27–29. New Baltimore responded to the correspondence, denying that it authorized a third party to access DCN. Relying on Defendant New Baltimore’s representation, in July 2009, Navistar hired investigative firm Pinkerton to ascertain whether any unauthorized access had occurred, how, and the extent of the damage resulting from any breach. From July through November 2009, Pinkerton investigated Plaintiffs’ concerns, including an investigation of Liberty. Plaintiffs allege that Pinkerton’s investigation of Liberty revealed evidence of Liberty employees (1) logging into Navistar’s website on August 10, 2009, and printing off a spindle specification, (2) logging into Navistar’s website on August 31, 2009, using a DYY access code, and (3) logging into Navistar’s website on September 18, 2009, using a DYY access code and printing steering gear specifications. Navistar’s authorized dealer, International Trust Sales of Richmond (“ITSR”), eventually filed a complaint against Liberty in Virginia state court. Plaintiffs allege that during discovery in the Virginia case, Liberty Equipment admitted that it and its employees continued to surreptitiously access and utilize DCN with the permission of New Baltimore, which at all times relevant had a DCN password. Id. at ¶¶ 30–32. According to Plaintiffs, this access was in direct contravention of the terms of Navistar’s agreement with New Baltimore. Id. at ¶ 24. II. Legal Standards A motion to dismiss pursuant to Rule 12(b)(6) tests the sufficiency of the complaint, not the merits of the case. See Gibson v. City of Chicago, 910 F.2d 1510, 1520 (7th Cir. 1990). To survive a Rule 12(b)(6) motion to dismiss, the complaint first must comply with Rule 8(a) by providing “a short and plain statement of the claim showing that the pleader is entitled to relief,” Fed. R. Civ. P. 8(a)(2), such that the defendant is given “fair notice of what the * * * claim is and 3 the grounds upon which it rests.” Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 555 (2007) (quoting Conley v. Gibson, 355 U.S. 41, 47 (1957)). Second, the factual allegations in the complaint must be sufficient to raise the possibility of relief above the “speculative level,” assuming that all of the allegations in the complaint are true. E.E.O.C. v. Concentra Health Servs., Inc., 496 F.3d 773, 776 (7th Cir. 2007) (quoting Twombly, 550 U.S. at 555). “[O]nce a claim has been stated adequately, it may be supported by showing any set of facts consistent with the allegations in the complaint.” Twombly, 550 U.S. at 563. The Court accepts as true all of the well-pleaded facts alleged by the plaintiff and all reasonable inferences that can be drawn therefrom. See Barnes v. Briley, 420 F.3d 673, 677 (7th Cir. 2005). Leave to amend a complaint should be freely given “when justice so requires.” Fed. R. Civ. P. 15(a). However, it is well settled that a district court may deny a motion for leave to amend when the amended pleading would be futile. Bethany Phamacal Co. v. QVC, Inc., 241 F.3d 854, 861 (7th Cir. 2001). An amended complaint is futile if it could not withstand a motion to dismiss. See Smart v. Local 702 Int’l Bhd. of Elec. Workers, 562 F.3d 798, 811 (7th Cir. 2009). III. Analysis Plaintiffs seek leave to amend their complaint to add a few new factual allegations and two new counts. Defendants seek dismissal of all counts in the original complaint and maintain that the proposed amended complaint would be futile. In ruling on the parties’ motions, the Court will consider together the various arguments presented by the parties in briefing both motions. A. Violation of DMCA (Count III of Proposed Amended Complaint) Plaintiffs allege that Defendant violated the Digital Millennium Copyright Act (“DMCA”). Specifically, Plaintiffs allege that Defendant “circumvented the digital security of 4 Navistar’s [DCN] and related computers which protected Navistar’s materials and Defendant trafficked in the means to do so.” Congress enacted the DMCA in 1998 “to strengthen copyright protection in the digital age.” Universal City Studios, Inc. v. Corley, 273 F.3d 429, 435 (2d Cir. 2001); see also Egilman v. Keller & Heckman, LLP., 401 F. Supp. 2d 105, 112 (D.D.C. 2005). Section 1201 of the DMCA addresses liability for circumventing systems that protect copyrights. See 17 U.S.C. § 1201. Based on their response brief, Plaintiffs appear to bring their claim pursuant to §§ 1201(a)(1), (a)(2), and (b)(1) of the DMCA. Section 1201(a)(1)(A) provides: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title.” 17 U.S.C. § 1201(a)(1)(A). Section 1201(a)(2)(A) provides that no person “shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that * * * is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under” the copyright laws. 17 U.S.C. § 1201(a)(2)(A). To “circumvent a technological measure” means to “descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A). Further, “a technological measure ‘effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” § 1201(a)(3)(B). Section 1201(b)(1) provides that no person “shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that * * * is primarily designed or produced for the purpose of circumventing 5 protection afforded by a technological measure that effectively controls access to a work protected under” the copyright laws. 17 U.S.C. § 1201(b)(1). To “circumvent protection by a technological measure” means “avoiding, bypassing, removing, deactivating, or otherwise impairing a technological measure.” § 1201(b)(2)(A). Further, “a technological measure ‘effectively protects a right of a copyright owner under this title’ if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.” § 1201(b)(2)(B). Regardless of which section of the statute applies, Plaintiffs’ allegations are the same. Plaintiffs have alleged that they restricted access to their copyright-protected work by using a network that required a username/password combination to access. The precise issue raised by these allegations is whether providing a third party with access to Plaintiffs’ computer system through the unauthorized use of a valid password constitutes circumvention of a technological measure or trafficking in technology designed to circumvent access or copy controls. Defendant asserts that Plaintiffs’ DMCA claim fails because improper use of a password issued by the copyright holder—specifically, providing a third party with that password—does not amount to “circumvention” under the DMCA. Defendant’s position finds support in district court decisions around the country. See, e.g., I.M.S. Inquiry Management Systems, Ltd. v. Berkshire Information Systems, Inc., 307 F. Supp. 2d 521, 532–33 (S.D.N.Y. 2004); R.C. Olmstead, Inc. v. CU Interface LLC, 2009 WL 3049867 (N.D. Ohio 2009); Egilman v. Keller & Heckman, LLP, 401 F. Supp. 2d 105, 113–14 (D.D.C. 2005). Plaintiffs counter that Defendants’ cases are distinguishable because they address claims under section § 1201(a)(1) whereas their claim is asserted under § 1201(a)(2) or (b)(1). A number of California district court cases support Plaintiffs’ interpretation of the statute. See, e.g., Actuate Corp. v. International Business 6 Machines Corp., 2010 WL 1340519, at *5 (N.D. Cal. 2010); 321 Studios v. MGM Studios, Inc., 307 F. Supp. 2d 1085 (N.D. Cal. 2004); Microsoft Corp. v. EEE Business Inc., 555 F. Supp. 2d 1051 (N.D. Cal. 2008). The Seventh Circuit has yet to weigh in on the precise issues identified in this case. In determining whether unauthorized password use constitutes a violation of § 1201 of the DMCA, the court in I.M.S. held that the plaintiff’s password system was within the definition of “technological measure” as the term is defined in the DMCA. 307 F. Supp. 2d at 531-32. Nonetheless, the court concluded that the plaintiff’s allegations did not constitute circumvention under the DMCA because, although the defendant’s actions bypassed permission to access the plaintiff’s copyrighted works, they were not a circumvention of the technological means to protect the copyrighted material. Id. at 532. The I.M.S. court stated: Circumvention requires * * * descrambling, decrypting, avoiding, bypassing, removing, deactivating or impairing a technological measure qua technological measure. In the instant matter, defendant is not said to have avoided or bypassed the deployed technological measure in the measure’s gatekeeping capacity. The Amended Complaint never accuses defendant of accessing the [website] without first entering a plaintiff-generated password. Id. Because the defendant “did not surmount or puncture or evade any technological measure” but instead “used a password intentionally issued by plaintiff to another entity,” the court found that there was no circumvention under § 1201(a)(1). The court noted that “what defendant avoided and bypassed was permission to engage and move through the technological measure from the measure’s author. Unlike the CFAA, a cause of action under the DMCA does not accrue upon unauthorized and injurious access alone; rather, the DMCA targets the circumvention of digital walls guarding copyrighted material.” Id. The Court further concluded that it was irrelevant who provided the username/password combination to the defendant, or, given that the combination itself was legitimate, how it was obtained. 7 Plaintiffs’ allegations demonstrate that “an otherwise legitimate, owner-issued password” (I.M.S., 307 F. Supp. 2d at 531) was used to access their website; these allegations fall squarely within the I.M.S. court’s conclusion that, “[w]hatever the impropriety of defendant’s conduct, the DMCA and the anti-circumvention provision at issue do not target” the unauthorized use of a “password intentionally issued by plaintiff to another entity.” Id. at 533; see also Egilman v. Keller & Heckman, LLP, 401 F. Supp. 2d at 114. Plaintiffs contend that the cases supporting Defendant’s argument focus on a narrow construction of the term “circumvention” because the focus is on the password, rather than the technology at issue (i.e. the password-protected network). Whether the focus is on the password or the network, Plaintiffs must adequately allege circumvention or trafficking. Acts of circumvention expressly limited by the statute are descrambling a work, decrypting an encrypted work, or otherwise avoiding, bypassing, removing, deactivating, or impairing a “technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A). There is no question here that Plaintiffs have alleged that they were attempting to “effectively control[] access to a work.” § 1201(a)(3)(B). However, viewing the allegations in light of persuasive authority, using a password to access a copyrighted work, even without authorization, does not constitute “circumvention” under the DMCA because it does not involve descrambling, decrypting, or otherwise avoiding, bypassing, removing, deactivating, or impairing a “technological measure.” Instead, it amounts to unauthorized access to Plaintiffs’ system, which itself does not appear to be a violation of this particular statute. See also Ground Zero Museum Workshop v. Wilson, 813 F. Supp. 2d 678, 692 (D. Md. 2011). Furthermore, with respect to the anti-trafficking portion of the statute, Plaintiffs have not sufficiently alleged that Defendant trafficked in “any technology, product, service, device, 8 component, or part thereof, that * * * is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively controls access to a work protected under” the copyright laws. 17 U.S.C. § 1201(b)(1). The allegations are that Defendant provided an authorized password to a third-party who was not an authorized user of the password. The allegations do not support a theory that Defendant developed a means (for instance, by creating software, purposely disabling a security measure, or supplying an access key) to distribute Plaintiffs’ materials to the public for profit. Compare Actuate Corp., 2010 WL 1340519, at *5 (posting plaintiff’s software and related materials for sale to consumers for profit); 321 Studios, 307 F. Supp. 2d 1085 (creating and distributing software to the public for profit); Microsoft Corp. v. EEE Business Inc., 555 F. Supp. 2d 1051 (distributing Microsoft software and licensing key outside a licensing restriction to consumers for profit). Instead, Plaintiffs’ allegations amount to a theory that Defendant shared its password with a third-party; such an action simply does not appear to be covered by the DMCA. As evident from the additional causes of action asserted in their proposed amended complaint, Plaintiffs have several avenues by which they can pursue damages for the conduct at issue; however, the Court does not believe that Congress intended the DMCA to cover the conduct complained of in this instance. B. Violation of the CFAA (Count IV of Proposed Amended Complaint) The Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, provides for the entry of civil injunctive relief as well as the recovery of money damages for a violation of its provisions. See 18 U.S.C. § 1030(g) (providing that “[a]ny person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief”). In Count IV of the proposed amended complaint (Count III of the original complaint), Plaintiffs allege that 9 Defendant “intentionally accessed Navistar’s computer system without authorization and/or exceeded the access authorized by Navistar” and, as a result, “accessed and obtained confidential and proprietary business information from a protected computer in interstate commerce.” Plaintiffs also maintain that Defendant’s conduct caused them to suffer “a loss of at least $5,000.” Defendant contends that this claim is time-barred and, in any event, that Plaintiffs have failed to state a cause of action. The CFAA provides for civil liability if one “intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage * * *.” 18 U.S.C. § 1030(a)(5)(A)(iii). A plaintiff must demonstrate damage in order to recover under this provision of the CFAA. See Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 766 (N.D. Ill. Feb. 11, 2009); Garelli Wong & Associates, Inc. v. Nichols, 551 F. Supp. 2d 704, 708-09 (N.D. Ill. 2008). The CFAA defines “damage” as “impairment to the integrity or availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). The CFAA provisions at issue in this case prohibit “intentionally access[ing] a computer without authorization or exceed[ing] authorized access, * * * thereby obtain[ing] information from any protected computer,” (see 18 U.S.C. § 1030(a)(2)(C)), and “knowingly and with intent to defraud, access[ing] a protected computer without authorization, or exceed[ing] authorized access, and by means of such conduct further[ing] the intended fraud and obtain[ing] anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1–year period” (see 18 U.S.C. § 1030(a)(4)).2 2 Congress amended several sections of the CFAA in September 2008. See Identity Theft Enforcement and Restitution Act, Pub.L. No. 110–326, §§ 203–208, 122 Stat. 3560, 3561–63 (2008). Because the parties have identified no substantive change in language relevant to the Court’s current analysis, and because the conduct at issue in this case allegedly occurred both before and after the date of amendment, 10 Although the CFAA generally is criminal in nature, it also provides a private right of action for a person “who suffers damage or loss by reason of a [CFAA] violation.” 18 U.S.C. § 1030(g). “Thus, to recoup compensatory damages, a plaintiff must show either damage or loss.” US Gypsum Co. v. Lafarge N. Am. Inc., 670 F. Supp. 2d 737, 743 (N.D. Ill. Oct. 27, 2009) (emphasis in original); see also Motorola, Inc. v. Lemko Corp., 609 F.Supp.2d 760, 767 (N.D. Ill. Feb. 11, 2009). Defendant argues that Plaintiffs’ CFAA claim must be dismissed for failure to state a claim, because Plaintiffs have failed to adequately allege either “damage” or “loss” as defined by the CFAA. The CFAA defines the term “damage” to mean “any impairment to the integrity or availability of data, a program, a system, or information.” 18 U.S.C. § 1030(e)(8). Courts have interpreted the CFAA’s definition of damage to include the destruction, corruption, or deletion of electronic files, the physical destruction of a hard drive, or any “diminution in the completeness or usability of the data on a computer system.” Cassetica Software, Inc. v. Computer Sciences Corp., 2009 WL 1703015, at *3 (N.D. Ill. June 18, 2009); see also Mintel Int'l Group, Ltd. v. Neergheen, 2010 WL 145786, at *9 (N.D. Ill. Jan. 12, 2010); Del Monte Fresh Produce, N.A., Inc. v. Chiquita Brands Int'l Inc., 616 F. Supp. 2d 805, 810 (N.D. Ill. Mar. 19, 2009); Motorola, 609 F.Supp.2d at 769 (“The plain language of the statutory definition refers to situations in which data is lost or impaired because it was erased or because (for example) a defendant smashed a hard drive with a hammer.”). On the other hand, the mere copying of electronic information from a computer system is not enough to satisfy the CFAA’s damage requirement. See Mintel, 2010 WL 145786, at *9 (“copying, e-mailing or printing electronic files from a computer database is not enough to satisfy the damage requirement of the CFAA”); Del Monte, all citations in this opinion are to the CFAA in its amended form. See SKF USA, Inc. v. Bjerkness, 636 F. Supp. 2d 696, 719 n.12 (N.D. Ill. Apr. 24, 2009). 11 616 F.Supp.2d at 811 (“copying electronic files from a computer database—even when the exemployee e-mails those files to a competitor—is not enough to satisfy the damage requirement of the CFAA”). Courts also have found that the disclosure of trade secrets misappropriated through unauthorized computer access does not qualify as damage under the CFAA’s definition of the term. See U.S. Gypsum Co., 670 F. Supp. 2d at 744 (“the CFAA is not intended to expansively apply to all cases where a trade secret has been misappropriated by use of a computer”); Motorola, 609 F. Supp. 2d at 769 (“The only harm [plaintiff] has alleged is the disclosure to a competitor of its trade secrets and other confidential information. The CFAA’s definition of damage does not cover such harm * * *.”); Nichols, 551 F. Supp. 2d at 710 (“Though [plaintiff] would like us to believe that recent amendments to the CFAA are intended to expand the use of the CFAA to cases where a trade secret has been misappropriated through the use of a computer, we do not believe that such conduct alone can show ‘impairment to the integrity or availability of data, a program, a system, or information.’”) (quoting 18 U.S.C. § 1030(e)(8)). At most, Plaintiffs have alleged that they were concerned that Defendant may have impaired the integrity of its data, thus causing Plaintiffs to investigate the extent of Defendants’ (or third parties) unauthorized access to, and acquisition of, Plaintiffs’ confidential information. Plaintiffs have not pleaded that Defendant actually impaired their databases or data as those terms have been interpreted and therefore have not satisfied the “damage” requirement of the CFAA. In addition to a “damage” component, the CFAA also has a “loss” component. The CFAA defines the term “loss” as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or 12 other consequential damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11). District courts within this circuit have interpreted this language in different ways. Compare Cassetica Software, Inc. v. Computer Sciences Corp., 2009 WL 1703015, at *4 (N.D. Ill. June 18, 2009) (finding that the CFAA’s definition of “loss” applies only to “costs of ‘conducting a damage assessment * * * incurred because of the interruption of service’”) (emphasis in original), with SKF USA, Inc. v. Bjerkness, 636 F. Supp. 2d 696, 721 (N.D. Ill. Apr. 24, 2009) (“As defined in section 1030(e)(11), ‘loss’ means two things: first, ‘any reasonable cost to the victim,’ such as responding to the offense or otherwise restoring lost material; second, lost revenue or other damages incurred as a result of an interruption of service.”). The Seventh Circuit has not yet ruled on this point of law. Plaintiffs have alleged that they incurred costs associated with investigating the extent of unauthorized access to their network. They also claim that Defendant’s activities “impair interfere with, and hinder Navistar’s business, burden and impair Navistar’s computer systems and personnel resources; impair efficiency, fairness and simplicity of Navistar systems and services; and harm, interfere with, and impair Navistar’s relationship, reputation and goodwill with legitimate Navistar users.” Defendant argues that Plaintiffs cannot plausibly allege that they suffered any loss as defined by the CFAA, because Plaintiffs did not sustain any damage to its computers, data, or databases, nor have Plaintiffs alleged any interruption of service. In response, Plaintiffs argue that “any reasonable cost to any victim” can be considered a loss under the CFAA, including “the cost of responding to an offense.” Based on the plain language of the CFAA, the Court concludes that a plaintiff can satisfy the CFAA’s definition of loss by alleging costs reasonably incurred in responding to an alleged CFAA offense, even if the alleged offense ultimately is found to have caused no damage as 13 defined by the CFAA. See Farmers Ins. Exchange v. Auto Club Group, 823 F. Supp. 2d 847, 851-56 (N.D. Ill. 2011); 1st Rate Mortg. Corp. v. Vision Mortg. Servs. Corp., 2011 WL 666088, at *2 (E.D. Wis. Feb. 15, 2011) (agreeing with plaintiffs that “the CFAA allows recovery for losses sustained even if data or computers were not damaged”); Del Monte Fresh Produce, N.A., Inc. v. Chiquita Brands Int'l Inc., 616 F. Supp. 2d 805, 811 (N.D. Ill. Mar. 19, 2009) (“The CFAA states that a company that pays for damage assessment may satisfy the loss requirement.”); Motorola, Inc. v. Lemko Corp., 609 F. Supp. 2d 760, 768 (N.D. Ill. Feb. 11, 2009) (allegations of loss “related to damage and security assessments * * * are sufficient to allege loss for purposes of the CFAA”).3 Thus, at a minimum, Plaintiffs have stated a CFAA claim by alleging that they incurred costs in investigating an alleged CFAA offense. Defendant’s other argument—that Plaintiffs’ CFAA claim is time-barred—fares no better at this stage. It is undisputed that the CFAA is governed by a two-year statute of limitations that “begins to run when the plaintiff knew or reasonably should have known that he or she was wrongfully injured.” Horbach v. Kaczmarek, 288 F.3d 969, 973 (7th Cir. 2002). At this stage, the parties dispute (i) when Plaintiffs learned that they had been injured, and (ii) whether Defendant actively concealed any wrongdoing and involvement. Because of these disputes, the Court cannot determine whether Plaintiffs’ CFAA claim falls outside the two-year statute of limitations; therefore, dismissal of the CFAA claim on a limitation ground at this early stage is not warranted. 3 The Court acknowledges the presence of conflicting case law within this circuit. See Von Holdt v. A–1 Tool Corp., 714 F.Supp.2d 863, 875–76 (N.D.Ill. May 17, 2010) (requiring “damage to the computer or computer system” before a plaintiff can prove “loss” under the CFAA); Cassetica Software, Inc. v. Computer Sciences Corp., 2009 WL 1703015, at *4 (N.D. Ill. June 18, 2009) (“The CFAA only permits the recovery of costs incurred for damage assessment or recovery when the costs are related to an interruption of service.”). 14 C. Misappropriation of Trade Secrets (Count V of Proposed Amended Complaint) Defendant’s argument for dismissal of Plaintiffs’ misappropriation of trade secret claim is not well taken. Defendant maintains that Plaintiffs have brought a common law claim that is preempted by the ITSA. As Plaintiffs state in the first paragraph of both the original complaint and the proposed first amended complaint, “[t]his action has been filed by the Plaintiff to combat Defendant’s wrongful conduct and includes claims for * * * violation of the Illinois Trade Secrets Act (765 Ill. Comp. Stat. 1065/1-9).” Even if Plaintiffs had not made it expressly clear in the first paragraph that their claim was brought under the Illinois Trade Secret Act, pleading each element of the claim (which Plaintiffs have done) would suffice for notice pleading requirements. See, e.g. Rohler v. TRW, Inc., 576 F.2d 1260, 1264 (7th Cir. 1978) (statute need not be cited if facts alleged support claim). Defendant’s motion to dismiss Plaintiffs’ misappropriation of trade secret claim is denied. D. Unjust Enrichment (Count II of Proposed Amended Complaint) Plaintiffs have pled unjust enrichment as an alternative to their breach of contract claim. To state a claim based on a theory of unjust enrichment under Illinois law, “a plaintiff must allege that the defendant has unjustly retained a benefit to the plaintiff’s detriment, and that defendant’s retention of the benefit violates the fundamental principles of justice, equity, and good conscience.” HPI Health Care Servs., Inc. v. Mt. Vernon Hosp., Inc., 545 N.E.2d 672, 679 (Ill. 1989). Under Illinois law, “[w]hen two parties’ relationship is governed by contract, they may not bring a claim of unjust enrichment unless the claim falls outside the contract.” Utility Audit, Inc. v. Horace Mann Serv. Corp., 383 F.3d 683, 688–89 (7th Cir.2004). “In determining whether a claim falls outside a contract, the subject matter of the contract governs, not whether the contract contains terms or provisions related to the claim.” Id. As previously indicated, 15 Plaintiffs have pled this claim in the alternative, which they are entitled to do. Discovery will shed light on whether a contract governs the dealings between the parties and also on whether Plaintiffs’ unjust enrichment claim is preempted by the ITSA; until then, Plaintiffs may proceed with their claim of unjust enrichment. See FAIP North America, Inc. v. Sistema s.r.l., 2005 WL 3436398, at *6 (N.D. Ill. Dec. 14, 2005). E. Contributory Copyright Infringement (Count VI of Proposed Amended Complaint) Plaintiffs’ proposed amended complaint brings a cause of action for contributory copyright infringement. Plaintiffs allege that (1) Navistar owns valid copyright registrations; (2) third party, Liberty Equipment, infringed Navistar’s copyrighted works; (3) Defendant induced/caused/encouraged that third party to infringe Navistar’s copyright or contributed in a significant way to the infringing party’s infringement of Plaintiff’s copyright; and (4) Defendant knew of the third party’s infringing activity. At this stage, no more is required. See, e.g. Flava Works, Inc. v. Gunter, No. 10 C 6517, 2011 U.S. Dist. LEXIS 82955 at *20-*21 (N.D. Ill. July 27, 2011). Plaintiffs have satisfied the notice pleading requirement and sufficiently state a claim for contributory copyright infringement in the proposed amended complaint. F. Breach of Contract (Count I of Proposed Amended Complaint) Plaintiffs have brought a breach of contract claim, alleging that Defendant breached Navistar’s Dealer Communication Network System and Services Agreement through improper use of the DCN, improper use of the Dealer’s ID and password, improper access to the DCN, violation of good faith and fair dealing obligations, improper disclosure, improper reporting, improper communication, violation of confidentiality agreement, copyright violations, improper distribution, and improper grant of permission. Defendant objects to Plaintiffs’ breach of contract claim, arguing that “[b]ecause the conduct underlying the contributory copyright 16 infringement and breach of contract claims is the same, the breach of contract claim – like the contributory copyright infringement claim – would not survive a motion to dismiss.” As the Court indicated in addressing the copyright claim, at this stage, Plaintiffs have provided more than enough information to put Defendant on notice of the contributory copyright infringement claim against it and the grounds upon which that claim rests. Likewise, Plaintiffs have sufficiently apprised Defendant of their breach of contract claim and the grounds upon which this claim rests. The Court denies Defendant’s motion to dismiss Plaintiffs’ breach of contract claim. IV. Conclusion For these reasons, the Court grants in part and denies in part Defendant’s motion to dismiss [17]. The Court grants Defendant’s motion to dismiss Plaintiffs’ DMCA claim and denies the motion in all other respects. The Court grants Plaintiffs’ motion to amend [24], subject to the limitations set forth in this opinion. At this time, Plaintiffs’ DMCA claim is dismissed without prejudice; however, the Court cautions Plaintiffs that the claim as set forth in the proposed amended complaint would not survive a motion to dismiss for the reasons stated in this opinion. If Plaintiffs believe that they can allege additional facts that will cure the deficiencies noted, they may seek leave of court within fourteen days to include a DMCA claim in their amended complaint. Otherwise, Plaintiffs are directed to file their amended complaint (without the DMCA claim) within twenty-one days of the date of this order. Dated: September 20, 2012 _____________________________ Robert M. Dow, Jr. United States District Judge 17

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?