WORKGROUP TECHNOLOGY PARTNERS INC v. WELLPOINT INC

Filing 38

ORDER granting in part and denying in part 15 Motion to Dismiss for Failure to State a Claim. By JUDGE JOHN A. WOODCOCK, JR. (MFS)

Download PDF
UNITED STATES DISTRICT COURT DISTRICT OF MAINE WORKGROUP TECHNOLOGY PARTNERS, INC., Plaintiff, v. ANTHEM, INC., Defendant. ) ) ) ) ) ) ) ) ) ) 2:15-cv-00002-JAW ORDER ON MOTION TO DISMISS A license to use is not a license to steal. I. BACKGROUND A. Procedural History On January 5, 2015, Workgroup Technology Partners, Inc. (Workgroup) filed a complaint against WellPoint, Inc. (WellPoint). Compl. (Injunctive Relief Sought) (ECF No. 1) (Compl.). Workgroup alleges, among other things, that WellPoint carried out a “fraudulent scheme” and “misappropriate[d] valuable and proprietary intellectual property and trade secrets belonging to Workgroup.” Id. ¶ 1. On March 6, 2015, WellPoint filed a consented-to motion to change its party name to Anthem, Inc. (Anthem), and the Court granted the motion on March 9, 2015. Consented-to Mot. to Change Party Name (ECF No. 14); Order (ECF No. 17). On March 6, 2015, Anthem filed a motion to dismiss. Def. WellPoint, Inc.’s Mot. to Dismiss the Compl. (ECF No. 15) (Def.’s Mot.). Workgroup responded in opposition on March 27, 2015. Pl. Workgroup Tech. Partners, Inc.’s Obj. to Def. Anthem, Inc.’s Mot. to Dismiss (ECF No. 20) (Pl.’s Opp’n). On April 10, 2015, Anthem replied. Def. Anthem, Inc.’s Reply in Supp. of its Mot. to Dismiss the Compl. (ECF No. 23) (Def.’s Reply). On May 18, 2015, Workgroup filed a surreply. Pl. Workgroup Tech. Partners, Inc.’s Surreply to Def. Anthem, Inc.’s Reply in Supp. of its Mot. to Dismiss (ECF No. 30) (Pl.’s Surreply). Anthem responded on May 27, 2015. Anthem’s Resp. to Pl.’s Surreply to Anthem’s Mot. to Dismiss (ECF No. 31) (Def.’s Resp. to Pl.’s Surreply). B. Factual Allegations Contained in Workgroup’s Complaint1 1. The Parties Workgroup is a Maine corporation with its office and principal place of business in Westbrook, Maine. Compl. ¶ 6. Workgroup is an information technology company, which, among other things, develops and licenses software applications to clients in the health insurance industry. Id. ¶ 7. Anthem is an Indiana corporation with its office and principal place of business in Indianapolis, Indiana. Id. ¶ 8. Anthem is in the business of providing and administering health insurance plans. Id. ¶ 9. 2. iAutomate Workgroup develops, owns, and licenses business application software that automates a range of business processes, including claims recovery and subrogation for health insurance companies. Id. ¶ 12. This includes software known as iAutomate Workgroup’s Complaint refers to the Defendant as WellPoint. See Compl. On approximately December 3, 2014, the Defendant officially changed its name from WellPoint, Inc. to Anthem, Inc. Consented-to Mot. to Change Party Name at 1. Even though the relevant facts occurred before December 3, 2014, when the Defendant was still known as WellPoint, the Court refers to the Defendant as Anthem—its current name—except where the context requires a distinction between WellPoint and Anthem. 1 2 Recovery CaseManager (“iAutomate”). Id. ¶ 13. This software automates the process of analyzing health insurance claims data and pursues subrogation recovery opportunities against third parties. Id. iAutomate functions on two server computers: (1) the iAutomate database server, which receives and processes large volumes of raw insurance claim data supplied by Workgroup’s licensee and then analyzes the data using complex algorithms to identify potential subrogation recovery opportunities, and (2) an application server, which runs web-based application software that processes data generated by the database server in a user interface with a logical workflow and various tools that help licensed users analyze, manage, and pursue a large volume of subrogation claims. Id. ¶ 14. The database housed on the server (“Database Structure”), and the Claims Data Manager (“CDM”), which is a large package of algorithms and codes that sorts and analyzes raw insurance claims data, generates new analytical results (“Resulting Analytical Outputs”) from the raw data and analyzes these outputs to identify potential subrogation recovery opportunities. Id. ¶ 15. The iAutomate web-based application software (“Application Attributes”) individually and collectively facilitate iAutomate licensees’ efficient analysis, management, and pursuit of subrogation recovery opportunities identified by the database server. Id. ¶ 17. Together, the database and application servers allow licensed iAutomate users to analyze and manage massive volumes of raw claims data and thereby maximize their subrogation recoveries. Id. ¶ 18. 3 Workgroup designed, developed, and refined iAutomate, including the Database Structure, CDM, Resulting Analytical Outputs, and Application Attributes, over more than fifteen years. Id. ¶ 19. The Database Structure, CDM, Resulting Analytical Outputs, and Application Attributes independently and collectively constitute valuable and proprietary intellectual property and trade secrets belonging to Workgroup. Id. ¶ 21. 3. Workgroup’s iAutomate Licensing Relationship with WellPoint On or about December 14, 2003, Anthem entered into a software license (“2003 Software License”) with Sextant HealthCost Solutions (SHCS) for a subrogation claim identification software platform known as CaseMate, a predecessor to iAutomate.2 Id. ¶ 22. In March 2008, Anthem and Workgroup entered into a supplement to the 2003 Software License (“2008 Supplement”). Id. ¶ 24. The 2008 Supplement provided that Workgroup licensed iAutomate to Anthem and agreed, among other things, to maintain and service the iAutomate database server and application server on behalf of Anthem. Id. Furthermore, as provided under the 2008 Supplement, Anthem acquired only a right to use iAutomate for Anthem’s “normal business purposes.” Id. ¶ 25. Also under the terms of the 2008 Supplement, Anthem is required to maintain certain “Supplier Material” belonging to Workgroup “in strict confidence,” and to “use WellPoint’s predecessor, also named Anthem, entered into the 2003 Software License with Sextant. Compl. ¶ 24. WellPoint and Workgroup subsequently succeeded to Anthem’s and Sextant’s interests. Id. ¶ 25. The corporate baton passing from entity to entity is not important to the resolution of the motion to dismiss, and the Court has referred to all the Anthem entities as Anthem. 2 4 such information solely in the course of performing its obligations hereunder, and to make no disclosure of such information except in accordance with the terms of this Agreement.” Id. ¶ 27. “Supplier Material” is defined under the 2008 Supplement as all proprietary and/or intellectual property of Workgroup, including, without limitation, web designs, trade secrets, know-how, “software, algorithms, programming techniques, business rules, business methods, inventions, . . . processes, technology and designs,” and the 2008 Supplement identifies “Supplier Material” as representing “Confidential Information.” Id. ¶¶ 28-29. Workgroup says that the Database Structure, CDM, Resulting Analytical Outputs, and Application Attributes independently and collectively constitute Supplier Material and Confidential Information under the 2008 Supplement. Id. ¶ 31. 4. 2012: Anthem Switches from iAutomate to Subro 2000 According to Workgroup, in approximately 2012, Anthem replaced iAutomate with its own “in-house” subrogation claim identification and recovery solution, a legacy product owned by Anthem known as “Subro 2000.” Id. ¶ 32. However, Workgroup believes that because Subro 2000 was written in an outdated program known as “visual basic,” or “VB,” Anthem needed to rewrite it in a newer programming language, “.NET,” in order to be able to use and receive maintenance for the program. Id. ¶¶ 33-34. In addition, Anthem had to “migrate” all raw claims data (except for Resulting Analytical Outputs) housed on the iAutomate database server over to a database server associated with the rewritten Subro 2000 application. 5 Id. ¶ 35. Anthem did not inform Workgroup of the decision to replace iAutomate with Subro 2000 when the decision was made. Id. ¶ 36. Workgroup alleges that, when compared with iAutomate, Subro 2000 lacked the functionality, scalability, and ability to efficiently process massive volumes of claims data, and therefore, merely rewriting Subro 2000 from VB to .NET programming language would not, in and of itself, address the shortcomings of Subro 2000 relative to iAutomate’s unique capabilities. Id. ¶¶ 37, 39. Instead, according to Workgroup, Anthem devised a scheme to misappropriate the valuable and proprietary intellectual property and trade secrets in iAutomate that made it superior to Subro 2000, including the Database Structure, CDM, Resulting Analytical Outputs, and Application Attributes, and to build them into the rewritten .NET version of Subro 2000. Id. ¶ 40. Workgroup alleges that such action on the part of Anthem was not use for “normal business purposes” as contemplated under the 2008 Supplement. Id. ¶ 41. To carry out this scheme, Workgroup claims that Anthem hired Cognizant Technology Solutions (Cognizant), a Workgroup competitor, to “reverse engineer” the valuable and proprietary intellectual property and trade secrets in iAutomate, which Anthem wanted to misappropriate, and then incorporate into a .NET version of Subro 2000. Id. ¶ 42. 5. May and June 2013: Communications Between Workgroup and Anthem Regarding iAutomate and Subro 2000; Anthem Creates User Accounts for Cognizant Software Engineers Workgroup alleges that Anthem concealed its “scheme” by leading Workgroup to believe that Anthem intended to continue using iAutomate as its principal 6 subrogation claim identification and recovery solution while secretly giving Cognizant access to all the elements of iAutomate that Anthem wanted to misappropriate and incorporate into the .NET version of Subro 2000. Id. ¶ 44. In approximately April 2013, Anthem issued a request for proposals (“RFP”) for a possible replacement to iAutomate. Id. ¶ 45. Before issuing the RFP, Anthem assured Workgroup that the RFP was a mere formality and that Anthem intended to use iAutomate as its principal subrogation claim identification and recovery solution. Id. ¶ 46. Workgroup says that at the time of the RFP, however, Anthem did not tell Workgroup it had hired Cognizant to write a .NET version of Subro 2000 using intellectual property and trade secrets belonging to Workgroup. Id. ¶ 48. As a licensee, Anthem had the ability to create user accounts that gave users access to the iAutomate web-based application software for “normal business purposes.” Id. ¶ 49. On May 20, 2013, Anthem created eight user accounts for Cognizant software engineers, some of whom are based in India, giving them unlimited access to the web-based application; Anthem did not inform Workgroup of this. Id. ¶¶ 50-51. On May 22, 2013, during a monthly meeting between Anthem and Workgroup employees, Anthem informed Workgroup that it wanted to extend the term of the maintenance and support provisions of the 2008 Supplement. Id. ¶ 52. According to Workgroup, Anthem represented that it intended to continue using iAutomate as its principal subrogation claim identification and recovery solution. Id. ¶ 53. Anthem 7 did not tell Workgroup at this meeting that it was working with Cognizant or that it created eight user accounts for Cognizant software engineers. Id. ¶ 55. On June 17, 2013, Anthem created four additional user accounts for Cognizant software engineers, all of whom are based in India, but did not inform Workgroup of this. Id. ¶¶ 56-57. Workgroup says that neither the creation nor purposes of these four and the other eight user accounts for Cognizant software engineers was a use of iAutomate for “normal business purposes.” Id. ¶¶ 58-59. 6. June 17, 2013 to September 30, 2013: Cognizant’s Actions in iAutomate on Behalf of Anthem; Anthem and Workgroup Enter into a Two-Year Extension of the Maintenance and Support Provisions of the 2008 Supplement; Workgroup First Learns of Cognizant Between June 17, 2013 and September 30, 2013, Workgroup alleges that Cognizant software engineers took the following actions relating to iAutomate: (1) logged in to the web-based application software no fewer than 784 times; (2) executed tens of thousands of actions within the web-based application; and (3) systematically explored and tested the properties and characteristics of the iAutomate web-based application software as shown by audit records. Id. ¶¶ 60-63. According to Workgroup, these actions were not for “normal business purposes” within the meaning of the 2008 Supplement, demonstrate they intended to reverse engineer iAutomate for Anthem’s benefit, and gave them access to and/or revealed Supplier Material and Confidential Information. Id. ¶¶ 64-66, 68. Anthem did not inform Workgroup that the Cognizant software engineers had accessed and explored iAutomate during this period. Id. ¶ 69. Instead, according to Workgroup, Anthem 8 falsely continued to lead Workgroup to believe that Anthem intended to continue using iAutomate as its principal subrogation claim identification and recovery solution. Id. ¶ 70. On September 4, 2013, Anthem and Workgroup executed a two-year extension of the maintenance and support provisions of the 2008 Supplement. Id. ¶ 71. In executing this extension, Anthem did not inform Workgroup of the actions taken by Cognizant software engineers. Id. ¶ 72. On September 17, 2013, Anthem sent a purchase order for the renewed maintenance and support term to Workgroup, and in the body of the purchase order, Anthem wrote that “work is underway with Cognizant to update the old Subro 2000 application.” Id. ¶ 73. According to Workgroup, this was the first time it learned from Anthem that it hired Cognizant for any purpose as regards iAutomate. Id. ¶ 74. In addition, Workgroup alleges that Anthem omitted various details relating to Cognizant’s use of iAutomate and intentionally hid Cognizant’s “true role” in order to deceive Workgroup and further its scheme to misappropriate Workgroup’s valuable and proprietary trade secrets and intellectual property. Id. ¶¶ 75-79. 7. The October 10, 2013 Teleconference During an October 10, 2013 teleconference, an Anthem representative informed Workgroup that Anthem had decided to stop using iAutomate as its principal subrogation claim identification solution. Id. ¶ 80. The Anthem representative described his disclosure as a “bombshell” that he would need to report to his superiors, which Workgroup interpreted to mean that it was a disclosure that 9 Anthem had not intended to reveal to Workgroup. Id. ¶ 81. In addition, the Anthem representative revealed that Anthem had hired Cognizant to rewrite the Subro 2000 application software in the .NET language and to assist with migrating data from the iAutomate database server to a database server associated with Subro 2000. Id. ¶ 82. In response, Workgroup expressed interest in supporting Anthem’s transition from iAutomate to Subro 2000, especially by taking a lead role in the migration of raw data from the iAutomate database server to a Subro 2000 database server, and explained that this was due, in part, to protect its trade secrets and intellectual property contained in iAutomate from disclosure to Cognizant. Id. ¶¶ 83, 86. Workgroup says that during this same teleconference, Anthem assured Workgroup that Workgroup would play a central role in the transition from iAutomate to Subro 2000, including the data migration, and assured Workgroup that appropriate measures would be taken to protect Workgroup’s trade secrets and intellectual property from disclosure to Cognizant. Id. ¶¶ 85, 87. Despite these assurances, Workgroup alleges that Anthem still did not disclose that Cognizant had already taken numerous previously described actions on iAutomate, which Workgroup claims were intentionally withheld by Anthem to deceive Workgroup and further its scheme to misappropriate Workgroup’s valuable and proprietary trade secrets and intellectual property. Id. ¶¶ 89-90. 8. October 2013 to February 2014 Events 10 Between October 2013 and February 2014, Workgroup alleges that it repeatedly asked Anthem for some “clear direction” regarding the transition from iAutomate to Subro 2000, and while Anthem repeatedly assured Workgroup it would provide such direction, Anthem failed to do so. Id. ¶¶ 91-92. Also during this time period, Workgroup claims that Anthem failed to disclose that it had also retained Cognizant to reverse engineer iAutomate and that Cognizant software engineers had taken numerous actions on iAutomate as previously described for purposes of furthering its scheme to misappropriate Workgroup’s valuable trade secrets and intellectual property. Id. ¶¶ 93-98. In addition, according to Workgroup, in order to rewrite Subro 2000 in .NET programming language and to assist Anthem with data migration, it was unnecessary for Cognizant engineers to log in to the iAutomate web-based application software hundreds of times or take the tens of thousands of actions in the software. Id. ¶¶ 99-102. Workgroup claims that nearly all of the more than 1,000 log-ins by Cognizant software engineers to the iAutomate web-based application software from June 2013 to July 2014 constituted false representations that the log-ins were for an authorized purpose and/or “normal business purposes.” Id. ¶ 105. 9. 2014: Anthem’s Refusal to Provide Assurances Concerning Cognizant At the beginning of February 2014, Anthem informed Workgroup that Workgroup’s role in Anthem’s transition from iAutomate to the Subro 2000 would be limited to providing “advisory” services that would assist Cognizant. Id. ¶ 110. Workgroup also alleges that beginning in early 2014, Anthem began asking 11 Workgroup pointed technical questions about the structure and functioning of the Database Structure. Id. ¶ 111. Workgroup believes that these “pointed technical questions” originated from Cognizant engineers solely for reverse engineering. Id. ¶ 112. In March 2014, Workgroup sent a letter to Anthem to remind it of Workgroup’s concerns regarding the confidentiality of iAutomate and to seek assurances that Anthem would be mindful of that confidentiality as it transitioned to Subro 2000, especially as Cognizant was involved in the transition process. Id. ¶ 114. In May 2014, counsel for Anthem informed Workgroup that it had not discovered any evidence of “inappropriate” use or disclosure of confidential or proprietary information belonging to Workgroup. Id. ¶ 115. In June 2014, after conducting an audit on Anthem’s users on iAutomate, Workgroup found the access by and activities of the Cognizant engineers over the previous thirteen months. Id. ¶ 116. 10. Anthem’s Refusal to Pay for Excess Users Workgroup alleges that under the terms of the 2008 Supplement and a related 2013 amendment, Anthem could use up to 275 licenses for iAutomate. Id. ¶ 119. However, Workgroup says that between April 2013 and July 2014, Anthem exceeded the authorized number by 73 licenses, and the only steps Anthem took to correct the problem were to deactivate the accounts of 80 users in July 2014. Id. ¶¶ 120-21. When Workgroup demanded that Anthem pay for the license overage during the relevant time period, Anthem refused, saying it had since reduced its number of users to the authorized number of 275. Id. ¶ 122. 12 11. Damages Workgroup requests injunctive relief, claiming that Anthem caused irreparable damage to Workgroup and to the value of iAutomate, especially by giving Cognizant, a competitor of Workgroup, virtually unlimited access to the program. Id. ¶¶ 123-28. It also seeks economic damages, compensatory, consequential, and punitive damages, and attorney’s fees and costs. Id. at 28. C. Counts in Workgroup’s Complaint 1. Count I: Breach of Contract In Count I, Workgroup asserts a claim for breach of contract. Id. ¶¶ 129-31. It alleges that a breach occurred when Anthem (1) allowed Cognizant engineers access to Supplier Material and Confidential Information covered by the 2008 Supplement; (2) failed to ensure Cognizant engineers abided by the terms of the 2008 Supplement; (3) schemed to misappropriate iAutomate; and (4) refused to pay for user overages. Id. ¶ 130. 2. Count II: Unjust Enrichment In Count II, Workgroup claims unjust enrichment. Id. ¶¶ 132-35. Workgroup claims that when Anthem granted Cognizant software engineers access to iAutomate for the purpose of reverse engineering and building its valuable and proprietary features into the .NET version of Subro 2000, Anthem created a valuable benefit for itself from Workgroup, and Workgroup has not been compensated for such benefit. Id. ¶¶ 133-34. 3. Count III: Uniform Trade Secrets Act 13 In Count III, Workgroup alleges a violation of the Maine Uniform Trade Secrets Act (MUTSA), 10 M.R.S. §§ 1541 et seq. Id. ¶¶ 136-44. According to Workgroup, elements of iAutomate, including the Database Structure, CDM, Resulting Analytical Outputs and Application Attributes, constitute “trade secrets” within the meaning of the statute. Id. ¶ 137. In addition, Workgroup says that it took reasonable steps to ensure the secrecy of these trade secrets and that Anthem acquired these trade secrets by improper means, including misrepresentation. Id. ¶¶ 138-39. Specifically, Workgroup repeats that Anthem disclosed trade secrets related to iAutomate through improper means to Cognizant and violated the secrecy and/or “normal business purposes” provisions under the 2008 Supplement, and in doing so, acted willfully and maliciously. Id. ¶¶ 141-43. 4. Count IV: Computer Fraud and Abuse Act In Count IV, Workgroup asserts a violation of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. Id. ¶¶ 145-54. Workgroup alleges that the iAutomate database server and application server are “protected computers” as defined in the CFAA and that Anthem, through Cognizant acting on its behalf, (1) intentionally accessed a protected computer without authorization and/or exceeded authorized access to a protected computer; (2) obtained information from a protected computer; (3) acted knowingly with intent to defraud Workgroup; (4) furthered its intended fraud and obtained information with value far in excess of $5,000; (5) intentionally accessed a protected computer and caused damage or loss in excess of $5,000; (6) trafficked in passwords or similar information through which a protected computer 14 was accessed without authorization and in a manner that affected interstate or foreign commerce; and (7) caused the potential modification of the medical care of one or more individuals. Id. ¶¶ 146-54. 5. Count V: Wire Fraud-Based Violations of the Racketeer Influence in Corrupt Organizations (RICO) Act In Count V, Workgroup alleges a claim for wire fraud under the RICO Act, 18 U.S.C. §§ 1961 et seq. Id. ¶¶ 155-64. According to Workgroup, a confidential relationship existed between it and Anthem by virtue of the 2008 Supplement. No later than May 2013, Anthem and Cognizant formed an “enterprise” within the meaning of 18 U.S.C. § 1961(4), which engaged in and/or conducted activities that affected interstate or foreign commerce. Id. ¶¶ 156-58. In addition, Workgroup alleges that no later than May 2013, Anthem conducted and/or participated in, directly or indirectly, the affairs of its enterprise with Cognizant through a pattern of racketeering activity within the meaning of 18 U.S.C. § 1961(1), specifically by causing or participating in repeated acts of wire fraud by means of wire, radio, or television communication in interstate or foreign commerce, in violation of 18 U.S.C. § 1343. Id. ¶¶ 160-63. 6. Count VI: Fraud In Count VI, Workgroup alleges fraud. Id. ¶¶ 165-68. Workgroup says Anthem made misrepresentations and omissions with the intent to induce Workgroup to rely on them, thereby concealing its scheme to give Cognizant access to iAutomate for the purpose of misappropriating Workgroup’s valuable and proprietary intellectual property and building it into the .NET version of Subro 2000. Id. ¶ 166. In addition, 15 Workgroup says it relied on Anthem’s misrepresentations and omissions to its detriment and failed to discover Cognizant’s access to and activities in iAutomate until long after Cognizant had taken substantial actions in furtherance of the alleged misappropriation. Id. ¶ 167. 7. Count VII: Trespass to Chattel Finally, in Count VII, Workgroup asserts a claim for trespass to chattel. Id. ¶¶ 169-72. Workgroup claims that Anthem trespassed upon Workgroup’s property, including by granting unauthorized and virtually unfettered access to that property to Cognizant for Anthem’s benefit. Id. ¶ 171. Workgroup says it has been damaged as a result of this alleged trespass, including through diminution of the value of iAutomate based on its exposure to examination, analysis, and copying by Cognizant, especially given that many of these software engineers are based in India where Workgroup says protections for such intellectual property are weak and cannot be assured. Id. ¶ 172. II. THE PARTIES’ POSITIONS A. Defendant’s Motion Anthem seeks dismissal of all counts contained in Workgroup’s Complaint. Def.’s Mot. at 1. In Anthem’s view, Workgroup did not want to lose Anthem as a customer and decided to hold “Anthem’s data hostage by refusing to cooperate with the transition and, when that didn’t work, launched this lawsuit accusing Anthem of lying, cheating and stealing.” Id. 16 Anthem contends that it granted Cognizant’s software engineers access to iAutomate because the agreements between Workgroup and Anthem expressly allowed Anthem to do so. Id. at 2-3. Anthem says that pursuant to Section 3.1 of the 2008 Supplement, “[Anthem’s] agents, contractors, consultants, suppliers, customers and third-party service providers are authorized to exercise the rights granted to [Anthem] in this Section but only in direct furtherance of services provided to [Anthem].” Id. at 3 (quoting Def.’s Mot. Attach. 2 2008 Supplement to Software License Agreement § 3.1 (2008 Supplement)) (internal quotation marks omitted). According to Anthem, that section also authorized it and “its contractors to use iAutomate in ‘development environments, testing environments and disaster recovery environments’ as well as for ‘[Anthem’s] normal business purposes.’” Id. (quoting 2008 Supplement § 3.1). Furthermore, it says that Section 8.1 of the 2008 Supplement provides that Anthem “may from time to time hire outsourcers, subcontractors, consultants, or other third Parties . . . to perform services or provide products relating to [Anthem’s] business.” (internal quotation marks omitted). Id. (quoting 2008 Supplement § 8.1) Anthem asserts that Section 8.1 also contemplated that “nothing in the Agreement shall restrict access by such persons to the Software and/or services, as applicable as reasonably required for such Third Party Contractors to perform functions for and on behalf of [Anthem].” Id. (quoting 2008 Supplement § 8.1) (internal quotation marks omitted) (emphasis in Anthem’s original). 17 In short, Anthem argues that “the few ‘wrongful’ facts that Workgroup alleges—access to iAutomate using contractors for the purpose of transitioning from iAutomate—are allowed under the Contract, while the rest of Workgroup’s Complaint reduces to conclusions and speculation.” Id. at 4. 1. Count I: Breach of Contract Anthem accuses Workgroup of misrepresenting the express terms of their contract agreement. Id. at 5. Specifically, it says that Section 3.1 of the 2008 Supplement is “phrased as grants and acknowledgments by ‘Supplier,’ i.e. Workgroup, not restrictions on Anthem.” Id. In its view, Section 3.1 allowed Anthem to use iAutomate by it “or by its contractors, not just for subrogation claims processing but also for development and testing purposes.” Id. It also directs the Court’s attention to the language contained in Section 8.1. Id. at 5-6 (“nothing in the Agreement shall restrict access by such persons to the Software and/or services, as applicable as reasonably required for such Third Party Contractors to perform functions for and on behalf of [Anthem]”). These provisions, Anthem says, mean that “to the extent . . . Workgroup’s claim rests on Anthem’s migration of its data out of iAutomate, that claim fails under the Contract’s plain language.” Id. at 6. Next, Anthem argues that none of the alleged “breaches” by Workgroup supports a plausible claim. Id. As regards Workgroup’s claim that Anthem participated in a “scheme” to “misappropriate” information from iAutomate, Anthem counters that the claim is based entirely on Anthem and Cognizant’s use of the software program, which was authorized under the 2008 Supplement. 18 Id. Workgroup does not allege, for example, “any facts indicating that Anthem (or Cognizant) copied any protected features of iAutomate into any software made by Anthem or Cognizant” or that Cognizant “makes and sells any competing software.” Id. Likewise, regarding Workgroup’s claim that Anthem violated the “Supplier Material” and “Confidential Information” provisions of the 2008 Supplement, Anthem replies that third-party users, like Cognizant, are authorized to use iAutomate in the same fashion as Anthem pursuant to the 2008 Supplement, and Workgroup has not alleged that Cognizant accessed information that Anthem did not already have access to. Id. at 6-7. Third, in response to Workgroup’s allegation that Anthem failed to ensure that Cognizant followed the confidentiality provisions of the 2008 Supplement, Anthem argues “the Complaint fails to allege any actual facts suggesting that Cognizant copied, disclosed or misappropriated Workgroup trade secrets.” Id. at 7 (emphasis in original). Lastly, regarding Workgroup’s claim that Anthem breached its contract with Workgroup for “refusing to pay for user overages,” Anthem says this allegation does not comply with Rule 8 because it is conclusory and because Workgroup fails to explain the categories of “users” as defined under Section 3.1.1 of the 2008 Supplement: “Workgroup fails to mention these distinctions, much less attempt to apportion its user account among these categories.” Id. at 7-8. 2. Counts II through VII: Economic Loss Doctrine 19 Anthem argues that the so-called economic loss doctrine prevents Workgroup from bringing the remaining counts in its Complaint. Id. at 8. It explains that the doctrine “generally bars tort recovery of purely economic damages, unaccompanied by personal injury or property damage, incurred based on a contractual relationship.” Id. (citing In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 671 F. Supp. 2d 198, 201 (D. Me. 2009); Oceanside at Pine Point Condo. Owners Ass’n v. Peachtree Doors, Inc., 659 A.2d 267, 270 (Me. 1995); Schmid Pipeline Constr., Inc. v. Summit Nat. Gas of Me., Inc., No. 1:13-cv-464-GZS, 2014 WL 3600437, at *4 n.4 (D. Me. June 22, 2014)). Here, it contends, Workgroup and Anthem “are two commercially sophisticated parties” who negotiated a contract that allocated risk, and therefore, “Workgroup may not ‘supplement the contract with a tort remedy.’” Id. at 8-9 (quoting Banknorth, N.A. v. BJ’s Wholesale Club, Inc., 442 F. Supp. 2d 206, 213 (M.D. Pa. 2006)). In sum, it concludes that because “the very same conduct forms the basis for both contract and tort claims, the tort claims are barred by the economic loss rule.” Id. at 9 (citing Trico Equip., Inc. v. Manor, Civil No. 08—5561 (RBK/KMW), 2011 WL 705703, at *3 (D.N.J. Feb. 22, 2011)). 3. Counts II through VII: Rule 9(b) Workgroup next argues that the heightened pleading requirement under Rule 9(b) applies to Counts II through VII. Id. First, it asserts that Rule 9(b) “facially applies” to Count V (wire fraud-based claims under RICO) and Count VI (fraud). Id. at 10. Second, it claims that Rule 9(b) applies to Count II (unjust enrichment) because “the action that makes the enrichment culpable is fraud.” Id. at 10 (citing N. Am. 20 Catholic Educ. Programming Found., Inc. v. Cardinale, 567 F.3d 8, 15 n.3 (1st Cir. 2009)). Third, it argues that Rule 9(b) applies to Count III (trade secrets) because it “is expressly premised on misappropriation or ‘misrepresentation.’” Id. Fourth, it says Rule 9(b) applies to Count IV (CFAA) and Count VII (trespass to chattel) because they “are directly linked to and grounded in the same ‘fraudulent scheme,’ and therefore fall under the same pleading standard.” Id. (quoting Hayduk v. Lanna, 775 F.2d 441, 443-44 (1st Cir. 1985)). In Anthem’s opinion, none of the counts complies with Rule 9(b). Id. Anthem argues that because Workgroup’s counts essentially allege “concealment,” Anthem was under no duty to disclose absent a fiduciary or confidential relationship, id. at 10-11 (citing Rared Manchester NH, LLC v. Rite Aid of N.H., Inc., 693 F.3d 48, 56 (1st Cir. 2012)), and it contends that a “[v]endor relationship[]” such as this one is not such a relationship. Id. (citing Eaton v. Sontag, 387 A.2d 33, 37 (Me. 1978)). In addition, Anthem asserts that Workgroup has not identified “who made specific statements, when, or to whom,” or alleged how Workgroup’s position changed to “its disadvantage based on those statements or how those misrepresentations caused its claimed losses (which it also never identifies).” Id. at 11 (citing Alt. Sys. Concepts, Inc. v. Synopsys, Inc., 374 F.3d 23, 29-30 (1st Cir. 2004)). 4. Counts II through V and VII: Rule 12(b)(6) Finally, Anthem explains why, in its view, Counts II through V and VII should be dismissed under Rule 12(b)(6) for failing to state a claim for which relief can be granted. Id. at 12-21. 21 a. Count II: Unjust Enrichment Anthem argues that “[t]he existence of a contract between the parties precludes a claim for unjust enrichment.” Id. at 12-13 (collecting cases). It also contends that the unjust enrichment claim is preempted under the MUTSA. Id. at 13 (citing 10 M.R.S. § 1548). b. Count III: Uniform Trade Secrets Act Anthem states that to make out a claim under the MUTSA, “a plaintiff must allege the (1) ‘misappropriation’ of a (2) ‘trade secret.’” Id. (quoting Cianbro Cos. v. Uremovich, No. 1:12-cv-00330-DBH, 2013 WL 795144, at *10 (D. Me. Jan. 28, 2013)). Citing a number of cases for the proposition that “a plaintiff must identify specific trade secrets that were misappropriated,” Anthem argues that Workgroup “does not identify the specific trade secrets that Anthem supposedly misappropriated, including any particular feature that was (a) secret, and (b) misappropriated by Anthem and put into its own software.” Id. at 14. In sum, it says “Workgroup’s naked assertions, coupled with silence on key facts necessary to plead a [M]UTSA claim, require dismissal of that claim.” Id. at 15. c. Count IV: Computer Fraud and Abuse Act Turning to Workgroup’s Count IV claim under the CFAA, Anthem argues that Workgroup failed to plausibly allege the necessary elements of this claim because: (i) Anthem accessed its own computers (as opposed to Workgroup’s computers), and acted within its contractual authority while accessing those computers; (ii) Workgroup alleges no damage to its own computers or software, or any other loss addressable under the CFAA; and (iii) Workgroup fails to plausibly allege any additional factor from subsection (c)(4)(A)(i). 22 Id. at 15-16 (emphasis in original). d. Count V: Wire Fraud-Based Claims under RICO Addressing Workgroup’s Count V claim under the RICO statute, Anthem contends that Workgroup’s allegations “are specifically authorized by the Contract and . . . Workgroup has not plausibly alleged an ‘enterprise,’ a ‘pattern’ of racketeering activity, or any injury directly related to the ‘racketeering’ conduct.” Id. at 17 (citing Giuliano v. Fulton, 399 F.3d 381, 386 (1st Cir. 2005)). It says that other than making the claim that Cognizant’s log-ins to the iAutomate web-based application were “fraudulent,” Workgroup does not explain why such log-ins were fraudulent, particularly given that “Workgroup had agreed to provisions authorizing third-party contractors such as Cognizant to access the iAutomate system on Anthem’s behalf.” Id. at 18. Anthem also asserts that “Workgroup’s conclusory assertion that Anthem and Cognizant ‘formed an enterprise’ is insufficient to support a RICO claim, especially in light of the other factual allegations in the Complaint,” id., and “Workgroup fails to plausibly allege that Anthem and Cognizant were conducting the affairs of the purported ‘enterprise,’ rather than simply their own affairs.” Id. at 19 (citing Richmond v Nationwide Cassel L.P., 52 F.3d 640, 645–46 (7th Cir. 1995)). Anthem also contends that Workgroup has not plausibly alleged a “pattern of racketeering activity” under either the so-called “closed-ended” or “openended” approaches. Id. at 19-20 (citations omitted). Finally, Anthem argues that “Workgroup has not plausibly alleged any present injuries, let alone a causal 23 connection between its vague claims of injury and the alleged predicate acts.” Id. at 21. e. Count VII: Trespass to Chattel Lastly, Anthem contends that Workgroup’s Count VII (trespass to chattel) claim must fail because “Workgroup has not alleged that Anthem or [Cognizant] used or intermeddled with iAutomate without authorization.” Id. It also argues that this claim is preempted by the MUTSA. Id. (citing 10 M.R.S. § 1548). B. Plaintiff’s Opposition In response, Workgroup counters that Anthem’s motion misses the mark because Anthem relies on the “false premise that the license agreement allowed it to reverse engineer iAutomate and share its proprietary and confidential features with Workgroup’s competitor.” Pl.’s Opp’n at 1. 1. Count I: Breach of Contract Workgroup argues it has plausibly alleged that Anthem breached the license it was granted under the 2008 Supplement by alleging that (1) Anthem reverse engineered iAutomate; and (2) Sections 3.1 and 8.1 of the 2008 Supplement did not allow Anthem to reverse engineer iAutomate (i.e., reverse engineering is not a “normal business purpose” under Section 3.1, and Section 8.1 cannot be interpreted to allow reverse engineering). Id. at 2-4. Workgroup also contends that it has plausibly alleged that Anthem breached the confidentiality provisions under the 2008 Supplement; specifically, that Cognizant software engineers “did not have an ‘absolute need to know’ [“Confidential Information” within the meaning of the 2008 24 Supplement] for the work Anthem claimed (and still claims) they were doing,” and again, Workgroup says the Complaint plausibly alleges that Confidential Information was not to be disclosed for purposes of reverse engineering. Id. at 4-5 (quoting 2008 Supplement § 6.2). Next, Workgroup asserts that it has plausibly alleged that Anthem breached the 2008 Supplement by exceeding the “authorized number of users,” which it claims is inferred by the allegation that Anthem deactivated eighty users after Workgroup alerted it of the overage, thereby coming into compliance with the 2008 Supplement. Id. at 6. It also counters that despite Anthem’s argument that Workgroup’s claim fails because it did not address what types of “users” were contemplated by the 2008 Supplement, identifying that distinction is not fatal because “the Complaint alleges that the total number of Users exceeded the authorized limit. That is all that is necessary to state a claim at this stage.” Id. 2. Count II: Unjust Enrichment Workgroup explains that it pleaded its unjust enrichment claim in the alternative to its breach of contract claim, as is permitted under Rule 8(d), and thus, “the unjust enrichment count should not be dismissed merely because a breach of contract claim has also been pleaded, . . . or because it ultimately may be susceptible to a preemption argument under [MUTSA].” Id. at 16 (citing Fitzpatrick v. Teleflex, Inc., 630 F. Supp. 2d 91, 106 (D. Me. 2009); Alpha Pro Tech., Inc. v. VWR Int’l LLC, 984 F. Supp. 2d 425, 447-48 (E.D. Pa. 2013)). 3. Count III: Maine Uniform Trade Secrets Act 25 As regards its Count III claim for violation of the MUTSA, Workgroup argues that the “Complaint puts Anthem on ample notice of what is being claimed as a trade secret, and how Workgroup believes it was misappropriated.” Id. at 17. That is, the Database Structure, CDM, Resulting Analytical Outputs, and Application Attributes were trade secrets that Workgroup intended to keep confidential, and Anthem misappropriated these features of iAutomate for its own benefit. Id. Workgroup also states that “Anthem has not cited, and Workgroup . . . is not aware of, any Maine case law requiring that a misappropriation of trade secrets claim under [MUTSA] be pleaded with heightened specificity in order to survive a motion to dismiss.” Id. Workgroup directs the Court to cases from other jurisdictions that have refused to apply heightened pleading standards to trade secret claims. Id. at 18 (collecting cases). It also notes that the cases relied upon by Anthem are misleading because some of the rulings came from “later procedural stages,” and for those that occurred at the motion to dismiss stage, Workgroup argues “the allegations in the complaints in those cases were so non-specific that the defendant was not able to determine what was being alleged as a trade secret that had been misappropriated.” Id. at 18-19 (citations omitted). In Workgroup’s view, what makes this case distinguishable is that it identifies the components of iAutomate in its Complaint that it considers to be trade secrets and it alleges what it believes Anthem did with those trade secrets. Id. at 19-20. 4. Count IV: Computer Fraud and Abuse Act 26 Addressing its Count IV claim under the CFAA, Workgroup highlights the elements necessary to make out such a claim and concludes that the “Complaint alleges a plausible cause of action under each of the CFAA provisions.” Id. at 20-21. Workgroup goes on to explain in some detail how each of the provisions is satisfied by the allegations in its Complaint. Id. at 21-23. 5. Count V: Wire Fraud-Based Violations of the RICO Act Regarding its Count V claim under the RICO Act, Workgroup argues that the Complaint plausibly alleges this claim: The Complaint alleges that Anthem and Cognizant associated with each other for the purpose of reverse engineering iAutomate, each for their own benefit, and carried out the business of their association-in-fact through repeated acts of wire fraud lasting more than a year. Pl.’s Opp’n at 23. Workgroup goes on to explain in some detail how each element of a wire fraud claim under the RICO Act is satisfied by the allegations in the Complaint. Id. at 23-24. 6. Count VII: Trespass to Chattel Workgroup argues that its Count VII claim for trespass to chattel survives for the same reasons it contends Count I survives. Pl.’s Opp’n at 7. In addition, it says that even assuming the MUTSA preempts this claim, Count VII should not be dismissed on this basis “at this stage where pleading in the alternative is expressly permitted under” Rule 8. Id. (citing Alpha Pro Tech., 984 F. Supp. 2d at 447-48). 7. Counts II through VII: Economic Loss Doctrine In response to Anthem’s claim that the economic loss doctrine bars Counts II through VII, Workgroup counters that: 27 Maine courts have recognized the doctrine as barring tort claims for damages that a defective product causes to itself, and for damages sustained by a party to a service contract where the services provided did not meet contracted-for standards. This case is neither of those. Even if it were possible for the economic loss doctrine to apply, moreover, it would be too early in this case for the Court to make that determination. Id. at 7-8 (collecting cases). It also argues that courts in Maine and elsewhere do not typically apply the economic loss doctrine to cases where a plaintiff alleges an intentional tort such as fraudulent misrepresentation or misappropriation of trade secrets. Id. at 8-10 (collecting cases). However, Workgroup acknowledges that this Court has previously stated in American Aerial Services, Inc. v. Terex USA, LLC, 39 F. Supp. 3d 95, 110 (D. Me. 2014) that it remains an “open question” whether Maine would apply the doctrine to a case involving fraud. Pl.’s Opp’n at 10. Nevertheless, Workgroup urges the Court to conclude that the Maine Supreme Judicial Court would hold that the economic loss doctrine does not apply to its case. Id. at 10-11. Alternatively, Workgroup contends that even if the Court concluded that the economic loss doctrine could apply to one or more of these counts, “it would be premature for the Court to dismiss those claims under the doctrine.” Id. at 11-12 (collecting cases). In addition, Workgroup asserts that it is permitted under Rule 8(d) to “plead alternative and even inconsistent actions at the outset of a case, particularly where there appears to be a dispute about the scope of the contract at issue.” Id. at 12 (citing IDT Corp. v. Unlimited Recharge, Inc., No. CIV.A. 11-4992 ES, 2012 WL 4050298, at *6 (D.N.J. Sept. 13, 2012)). 8. Counts II through VII: Rule 9(b) 28 In response to Anthem’s Rule 9(b) assertion, Workgroup counters that its Complaint does comply with the Rule, and pursuant to Maine law, “these allegations support claims of fraud by affirmative false statements and by a failure to disclose.” Id. at 13. In addition, Workgroup contends that a failure to disclose can support a fraud claim absent a fiduciary or special relationship where a plaintiff alleges ‘“active concealment of the truth.’” Id. at 14 (quoting Rared, 693 F.3d at 54). Workgroup explains that, in its view, it plausibly alleged that Anthem committed fraud by actively concealing “Cognizant’s conduct and Anthem’s true intentions.” Id. C. Defendant’s Reply In reply, Anthem repeats that “Workgroup fails to point to a single fact showing that Anthem, or its contractor, copied any aspects of iAutomate, much less anything entitled to legal protection,” and argues that “Workgroup’s Complaint fails to allege what was supposedly taken, who took it, how it was misused, or how Workgroup has been damaged . . . .” Def.’s Reply at 1 (emphasis in original). Anthem also repeats its argument that the contract expressly allowed it to take the actions that form the bases of Workgroup’s Complaint, and observes that “Workgroup tacitly admits, neither Anthem nor [Cognizant] ever had access to the source code,” which would allow either to copy iAutomate. Id. at 1-2. It accuses Workgroup of “merely invit[ing] this Court to read something nefarious into a transition process that the parties expressly contemplated in their negotiated agreement.” Id. at 2. Furthermore, Anthem also asserts that “while repeatedly labeling Cognizant a ‘competitor,’ and inviting the Court to conclude that Cognizant might misappropriate 29 Workgroup’s software for a competing offering, Workgroup fails to identify any Cognizant product that competes with iAutomate (because no such product exists).” Id. As regards the economic loss doctrine, Anthem contends that it may still bar Workgroup’s claims because “the Complaint fails to allege any duty owed by Anthem independent from the duties the parties contractually bargained for or any conduct different from the conduct that supports the alleged breach,” and repeats that no “special relationship” existed between it and Workgroup to justify a “recovery in tort.” Id. at 5. Regarding Workgroup’s MUTSA claim, Anthem repeats its assertion that “Workgroup fails to identify the portions of its iAutomate software that it claims are trade secrets” and argues that “Workgroup cannot punt its responsibility to specifically identify its trade secrets until after discovery.” Id. at 6-8 (citing Switch Commc’ns Grp. v. Ballard, No. 2:11-cv-00285-KJD-GWF, 2012 WL 2342929, at *4-5 (D. Nev. June 19, 2012); United Servs. Auto. Ass’n v. Mitek Sys., Inc., 289 F.R.D. 244, 248 (W.D. Tex. 2013)). Anthem also urges the Court to dismiss the CFAA claim because, among other reasons, the alleged “protected computer” did not belong to Workgroup, and it observes that “Workgroup does not cite a single case where a CFAA claim was allowed to stand where the ‘protected computer’ belonged to the person accused of ‘unauthorized access.’” Id. at 8. Such a result, in Anthem’s view, would be “contrary” to the purpose and language of the statute. Id. 30 Likewise, Anthem argues that Workgroup’s RICO claim should be dismissed, asserting that Workgroup’s allegations are merely a recitation of elements and that Workgroup “fails to cite a single case in support of its RICO claim, nor does it contest that the claim is subject to Rule 9(b).” Id. at 9. It also contends that Workgroup “fails to respond in any meaningful way to Anthem’s arguments and fails to show how its allegations plausibly meet RICO’s elements as applied by the First Circuit and other courts . . . .” Id. at 10. Finally, regarding Workgroup’s argument that its trespass to chattel claim survives because its breach of contract claim does, Anthem points out that “Workgroup cites no authority for the proposition that those two claims rise and fall together.” Id. According to Workgroup, because Anthem does not “actually own[] the ‘chattel’ (the computers) at issue,” the claim must fail. Id. D. Plaintiff’s Surreply Workgroup disagrees that it was required to plead with the specificity that Anthem demands, and it believes it to be “improper for Anthem to invite the Court to draw unsupported factual inferences about the significance of iAutomate’s ‘source code’ and similar technical matters at this stage of the case.” Pl.’s Surreply at 2. However, in the event the Court agrees with Anthem that the Complaint lacks specific allegations to survive Anthem’s motion, Workgroup says “it has recently learned specific information that directly refutes Anthem’s argument.” Id. As a result, Workgroup asks that it be permitted to amend its Complaint to allege the following new facts: 31  Anthem has marketed its updated “Subro 2000” subrogation software, which Anthem and Cognizant developed by using iAutomate as a template, to Workgroup’s iAutomate customers specifically as an alternative to iAutomate;  [T]he Subro 2000 user interface Anthem has demonstrated to Workgroup’s customers is identical in material respects, including material functional respects, to iAutomate;  Anthem’s sales pitch to at least one Workgroup customer has included an untrue statement to the effect that Anthem transitioned away from iAutomate because iAutomate “didn’t work”;  [W]ithin the past year Cognizant has begun marketing a new expertise in developing subrogation software, expressly citing its engagement with Anthem to develop Subro 2000 as the wellspring of its knowledge; and  Cognizant has marketed its newfound expertise to Workgroup customers expressly as a means of implementing Subro 2000 as an alternative to iAutomate. Id. at 3. Workgroup argues these facts “further confirm the claims it has already adequately alleged . . . .” Id. E. Defendant’s Response to Plaintiff’s Surreply Anthem takes issue with Workgroup raising new factual allegations in its surreply rather than in its Complaint. Def.’s Resp. to Pl.’s Surreply at 1. However, Anthem contends that even if the Court entertains these new factual allegations, Workgroup “still fails to explain how they shore up any of the Complaint’s pleading deficiencies.” Id. According to Anthem, this is because Workgroup “does not make any new arguments showing how its old ‘facts’ add up to any plausible claim.” Id. at 2. 32 Also, Anthem asserts that while Workgroup “alleges that Anthem has marketed a competing product to Plaintiff’s customers, [Workgroup] fails to name anyone from Anthem who did that marketing, any customer of Plaintiff who received it, when it happened, where it happened, or any of the other ‘who, what, where and when’ details required by Rule 9(b).” Id. at 3 (citing Alt. Sys. Concepts, 374 F.3d at 29). Furthermore, Anthem says that two of these new facts identified by Workgroup in its surreply “relate solely to activities of Anthem’s contractor, Cognizant, a company that Anthem does not own or control,” and Cognizant has not been joined as a defendant in this case. Id. III. LEGAL STANDARD According to Rule 8(a), “[a] pleading that states a claim for relief must contain . . . a short and plain statement of the claim showing that the pleader is entitled to relief.” FED. R. CIV. P. 8(a)(2). The United States Supreme Court has observed that “the pleading standard Rule 8 announces does not require ‘detailed factual allegations,’ but it demands more than an unadorned, the-defendant-unlawfullyharmed-me accusation.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). However, Rule 12(b)(6) provides that a court may dismiss a complaint for “failure to state a claim upon which relief can be granted.” FED. R. CIV. P. 12(b)(6). To survive a motion to dismiss, the plaintiff must plead “sufficient facts to show that he has a plausible entitlement to relief.” Sanchez v. Pereira-Castillo, 590 F.3d 31, 41 (1st Cir. 2009) (citing Iqbal, 556 U.S. at 678). 33 Furthermore, where fraud is plead, “a party must state with particularity the circumstances constituting fraud . . . . Malice, intent, knowledge, and other conditions of a person’s mind may be alleged generally.” FED. R. CIV. P. 9(b). In Schatz, the First Circuit illuminated the proper analytic path: Step one: isolate and ignore statements in the complaint that simply offer legal labels and conclusions or merely rehash cause-of-action elements. Step two: take the complaint’s well-pled (i.e., non-conclusory, non-speculative) facts as true, drawing all reasonable inferences in the pleader’s favor, and see if they plausibly narrate a claim for relief. Schatz v. Republican State Leadership Comm., 669 F.3d 50, 55 (1st Cir. 2012) (internal citations omitted). In addition, “when ‘a complaint’s factual allegations are expressly linked to—and admittedly depend upon—a document (the authenticity of which is not challenged),’ then the court can review it upon a motion to dismiss.” Alt. Energy, Inc. v. St. Paul Fire & Marine Ins. Co., 267 F.3d 30, 34 (1st Cir. 2001) (quoting Beddall v. State St. Bank & Trust Co., 137 F.3d 12, 17 (1st Cir. 1998)); see also TransSpec Truck Serv., Inc. v. Caterpillar Inc., 524 F.3d 315, 321 (1st Cir. 2008) (explaining that a court may consider any documents attached to the complaint when ruling on a motion to dismiss, including any other documents “‘integral to or explicitly relied upon in the complaint, even though not attached to the complaint’”) (quoting Clorox Co. P.R. v. Proctor & Gamble Commercial Co., 228 F.3d 24, 32 (1st Cir. 2000)). Although the Court must accept all factual allegations in the complaint as true, it is “not bound to credit ‘bald assertions, unsupportable conclusions, and opprobrious epithets.’” Campagna v. Mass. Dep’t of Envtl. Prot., 334 F.3d 150, 155 (1st Cir. 2003) (quoting Dartmouth Review v. Dartmouth Coll., 889 F.2d 13, 16 (1st Cir. 1989), 34 overruled on other grounds by Educadores Puertorriqueños en Acción v. Hernández, 367 F.3d 61, 64 (1st Cir. 2004)). Instead, “plaintiffs are obliged to set forth in their complaint ‘factual allegations, either direct or inferential, regarding each material element necessary to sustain recovery under some actionable legal theory.’” Dartmouth Review, 889 F.2d at 16 (quoting Gooley v. Mobil Oil Corp., 851 F.2d 513, 515 (1st Cir. 1988)). IV. DISCUSSION A. Count I: Breach of Contract In Maine, the elements of breach of contract are: “(1) breach of a material contract term; (2) causation; and (3) damages.” Me. Energy Recovery Co. v. United Steel Structures, Inc., 1999 ME 31, ¶ 7, 724 A.2d 1248. Workgroup referenced the contract in its Complaint, and Anthem attached it to its motion; as the terms of the contract are integral to the pleadings, the Court will consider the terms in evaluating the motion to dismiss.3 Alt. Energy, 267 F.3d at 34; Trans-Spec Truck Serv., 524 F.3d at 321. 1. Analytic Tools Under Maine law, courts construe contracts “in accordance with the intention of the parties, which is to be ascertained from an examination of the whole At the hearing on the motion to dismiss on January 21, 2015, Min. Entry (ECF No. 37), Anthem raised for the first time a contractual provision explicitly limiting liability. Def.’s Mot. Attach. 2 2008 Supplement to Software License Agreement § 7.5. Because Anthem failed to properly present the argument, the Court will not address it here. United States v. Pizarro-Berrios, 448 F.3d 1, 5-6 (1st Cir. 2006) (“[E]xcept in extraordinary circumstances, arguments not raised in a party’s initial brief and instead raised for the first time at oral argument are considered waived”) (citing Piazza v. Aponte Roque, 909 F.2d 35, 37 (1st Cir.1990)). This ruling does not foreclose Anthem from raising the issue at a later stage of the litigation. 3 35 instrument.” Middlesex Mut. Assurance Co. v. Fish, 738 F. Supp. 2d 124, 136 (D. Me. 2010) (quoting Am. Prot. Ins. Co. v. Acadia Ins. Co., 2003 ME 6, ¶ 11, 814 A.2d 989). “Determining whether or not a contract is ambiguous is a question of law.” Am. Prot., 2003 ME 6, ¶ 11, 814 A.2d 989. “Contract language is only ‘ambiguous when it is reasonably susceptible [to] different interpretations.’” Camden Nat’l Bank v. S.S. Navigation Co., 2010 ME 29, ¶ 16, 991 A.3d 800 (alteration in original) (quoting Am. Prot., 2003 ME 6, ¶ 11, 814 A.2d 989). If a court determines that a contract is unambiguous, “its interpretation is also a question of law.” Am. Prot., 2003 ME 6, ¶ 11, 814 A.2d 989 (citing Acadia Ins. Co. v. Buck Constr. Co., 2000 ME 154, ¶ 7, 756 A.2d 515) “On the other hand, if the contract is ambiguous, then ‘its interpretation is a question of fact for the factfinder.’” Id. (quoting Acadia Ins. Co., 2000 ME 154, ¶ 7, 756 A.2d 515). “The interpretation of an unambiguous contract ‘must be determined from the plain meaning of the language used and from the four corners of the instrument without resort to extrinsic evidence.’” Id. (quoting Portland Valve Inc. v. Rockwood Sys. Corp., 460 A.2d 1383, 1387 (Me. 1983)). “[A] contract should ‘be construed to give force and effect to all of its provisions’ and not in a way that renders any of its provisions meaningless.” Id. ¶ 12 (quoting Acadia Ins. Co., 2000 ME 154, ¶ 9, 756 A.2d 515). To do so, “[a]ll parts and clauses must be considered together that it may be seen if and how one clause is explained, modified, limited or controlled by the others.” Id. ¶ 11 (quoting Peerless Ins. Co. v. Brennon, 564 A.2d 383, 384-85 (Me. 1989)). 36 2. The 2003 Contract Paragraph 1 of the original contract provides in part: 1. Grant of License. Licensor hereby grants to Anthem a worldwide, perpetual, nonexclusive license to the software listed on the Attachment to this Agreement (the “Software”) pursuant to the terms and conditions set forth in this Agreement. Def.’s Mot. Attach 1 Software License dated Dec. 19, 2003, at 2 (2003 Contract). Paragraph 2 provides in part: 2. Permitted Uses. Anthem shall be permitted to use the software: 1) for its own business; 2) to support an acquired company . . .; and 3) to support an affiliate . . . . Id. Paragraph 8 provides in part: 8. Ownership of Data and Records. a) Software. Title to, ownership of and intellectual property rights in the Software (including, without limitation, all object code, source code, copyrights, patent rights, and other intellectual property rights related thereto), the Documentation, Proprietary Information (as defined below) and all copies thereof shall be and at all times remain with Licensor. All rights not expressly licensed herein are reserved to Licensor. Anthem hereby acknowledges that this Agreement is a license agreement and not an agreement for sale. . . . Anthem shall be entitled to retain copies of documentation for so long as this license is in effect. Anthem will display [Workgroup]’s copyright notice on all copies of the Software. b) Data and Records. Licensor acknowledges and agrees that it receives no ownership rights in the materials, data or records furnished by Anthem. Except as specifically authorized by Anthem in writing, Licensor will not disclose Anthem’s data to a third party or make any other use of Anthem’s data. Id. at 4. 3. Schedule 1 to the Master Software License 37 A Schedule 1 was attached to the 2003 contract. Defs.’ Mot. Attach. 1 Schedule 1 to Master Software License, at 8-9 (Schedule 1). It contained a paragraph on limitations of use: Limitations on Use: The initial license is for 40 unique users. Licensing for additional users may be obtained as described below. A unique user shall be an individual who uses the Software in a production capacity. In addition Anthem shall be permitted to grant access to individuals on a “view only” basis. The number of individuals with view only access shall not exceed three times the number of unique users. Anthem’s technology support staff shall be permitted to access the software without being counted as a user. Id. at 1. Schedule 1 contained a list of charges if Anthem elected to purchase access for additional unique users. Id. 4. The 2008 Supplement Section 3.1 of the 2008 Supplement provides: Supplier hereby grants [Anthem] a perpetual, nonexclusive, enterprisewide, non-transferable (except as provided herein), irrevocable, royaltyfree, fully paid-up, worldwide right and license (the “License”) to access and use (including without limitation via remote access) the Software and all related documentation (the “Documentation”). Supplier acknowledges and agrees that (i) the Software may be accessed and used by 260 users on [Anthem] computers or equipment, as well [as] any other computers owned, leased or otherwise used by [Anthem], its employees or agents that are electronically linked to [Anthem]’s servers; (ii) subject to the terms hereof, [Anthem]’s agents, contractors, consultants, suppliers, customers and third-party service providers are authorized to exercise the rights granted to [Anthem] in this Section but only in direct furtherance of services provided to [Anthem]; (iii) the Software may be accessed and used in development environments, testing environments and disaster recovery environments; and (iv) the Software shall only be used for [Anthem]’s normal business purposes which may include providing data processing services to third parties. Def.’s Mot. Attach. 2 2008 Supplement to Software License Agreement § 3.1(a) (2008 Suppl.). This section also reiterates the original provisions concerning a unique user. 38 A “Unique User” is one “who uses the software in a production capacity. All other users are to be considered ‘View Only’ or ‘Read Only’ users. Three (3) View Only or Read Only Users equal one (1) Unique User for licensing consideration.” Id. § 3.1.1. Section 6.1 of the 2008 Supplement provides: Supplier Materials. In the course of Supplier’s provision of Services to [Anthem], Supplier may provide proprietary information and/or intellectual property, including, but not limited to, technical data, creative designs and concepts, web designs, trade secrets and know-how, customer or Supplier lists and information, business plans, software, algorithms, programming techniques, business rules, business methods, inventions, drawings, engineering, hardware configuration information, marketing and strategic plans, financial data, processes, technology and designs which it maintains (the “Supplier Materials”). All Supplier Materials shall be deemed Confidential Information. Supplier does not grant [Anthem] any interests in, or ownership of, any of the Supplier Materials. Upon completion of the Services, [Anthem] shall promptly return all Supplier Materials in whatever stage of completion to Supplier and shall destroy (and provide written certification of such destruction) all [Anthem]’s files pertaining to the Supplier Materials including deletion of all such Supplier Materials from its hardware, files and systems except to the extent that supplier materials are included in the software purchased. Id. § 6.1. Section 8.1 of the 2008 Supplement provides: Cooperation with and Access by Third Parties. [Anthem] may from time to time hire outsourcers, subcontractors, consultants, or other third Parties (“[Anthem] Third-Party Contractors”) to perform services or provide products relating to [Anthem]’s business, and which may be integrated with the Software and/or services, as applicable provided by Supplier hereunder (an “Integrated Project”). Supplier shall cooperate with and work in good faith with any [Anthem] Third-Party Contractor(s) as requested by [Anthem]. Such cooperation may include knowledge sharing of standards, policies, quality assurance and testing processes, as applicable, to ensure smooth deployment of Integrated Projects and/or the smooth and efficient transition of any Services (or component of Services) to, from, or among [Anthem], Supplier and any Third Party Contractor. Moreover, nothing in the Agreement shall 39 restrict access by such persons to the Software and/or services, as applicable as reasonably required for such Third Party Contractors to perform functions for and on behalf of [Anthem]; and provided that such Third Party Contractors shall use or access the Software and/or services, as applicable for [Anthem]’s benefit and shall have agreed to confidentiality provisions no less restrictive than those contained in this Agreement, and [Anthem] shall remain responsible for such Third Party Contractor’s use or access to the Products and/or Services in accordance with the terms of this Agreement. If any of the services described here are outside the scope of Supplier’s typical service offerings, these additional services will be memorialized in a separate statement of work between the parties with mutually approved rates. Id. § 8.1. 5. The Court’s Interpretation of the Contract Terms The Court views the Workgroup-Anthem contract as garden variety licensing agreement. Workgroup developed and owned certain valuable intellectual property consisting of complex algorithms, and Anthem had a business use for the Workgroup software. Instead of purchasing the Workgroup software, Anthem licensed its use for Anthem’s business purposes. 2003 Contract at ¶ 8 (“Anthem hereby acknowledges that this Agreement is a license agreement and not an agreement for sale”). Thus, the agreement stipulates that Workgroup remained the owner of the software. Id. (“Title to, ownership of and intellectual property rights in the Software (including, without limitation, all object code, source code, copyrights, patent rights, and other intellectual property rights related thereto), the Documentation, Proprietary Information (as defined below) and all copies thereof shall be and at all times remain with Licensor”). The agreement allowed Anthem to make copies of the software but only during the term of the agreement. Id. (“All copies made by Anthem of the Software are the property of the Licensor. Anthem shall be entitled to retain copies 40 of the documentation for so long as this license is in effect”). The agreement required Anthem to post Workgroup’s copyright notice on all copies of the software. Id. Schedule 1 and the 2008 Supplement restricted the number of Anthem employees who could use the software and required Anthem to pay more for broader employee access. Schedule 1 at 1; 2008 Suppl. § 3.1(a). The 2008 Supplement expressly described “Supplier Material” as confidential, owned by Workgroup, and to be returned to Workgroup upon termination of the contract. 2008 Suppl. § 6.1. Finally, although the agreement allows Anthem to hire third parties to assist its use of the Workgroup software, the 2008 Supplement imposes confidentiality on those third parties. Id. § 8.1. An examination of the whole instrument confirms that, viewing the allegations in the Complaint as true, Anthem did not have the legal authority to hire outside software experts to reverse engineer the Workgroup software, to unlock its algorithms, and to appropriate its confidential information. Anthem’s emphasis on two clauses—one that allows Anthem to use the Workgroup software for “normal business purposes” and the other that allows third party contractors to “perform functions for and on behalf of” Anthem—ignores the overall context of the agreement itself under which Workgroup is licensing, not selling, the software for Anthem’s use during the term of the contract. The Court rejects Anthem’s claim that Count I, the breach of contract count, does not state a claim upon which relief may be granted. B. Counts II Through VII: The Economic Loss Doctrine 41 Counts II through VII of the Workgroup Complaint allege tort and statutory claims against Anthem: (1) Count II, unjust enrichment, (2) Count III, the Uniform Trade Secrets Act, (3) Count IV, the Computer Fraud and Abuse Act, (4) Count V, the RICO Act, (5) Count VI, fraud, and (6) Count VII, trespass to chattel. Compl. at 2227. Anthem maintains that these tort and statutory claims are precluded by the economic loss doctrine. Def.’s Mot. at 8-9. The state of Maine adopted the economic loss doctrine in Oceanside at Pine Point Condominium Owners Association v. Peachtree Doors, 659 A.2d 267 (Me. 1995). In Oceanside, a construction company had installed windows and doors manufactured by Peachtree in a new condominium complex. Id. at 268. Following significant water damage, the condominium association and several owners sued Peachtree, alleging breach of contract and breach of warranty claims and several tort and statutory theories, including negligence, negligent misrepresentation, unfair trade practices, and strict liability. Id. Commenting that courts “generally . . . do not permit tort recovery for a defective product’s damage to itself,” the Oceanside Court concluded that absent a claim that the defective product caused personal injury or property damage to property other than the product itself, the purchaser may not proceed against the manufacturer for damages in tort. Id. at 270-71. “As explained in Oceanside, the rationale ‘is that damage to a product itself means simply that the product has not met the customer’s expectations, or, in other words, that the customer has received insufficient product value.’” Gannett v. Pettegrow, No. 03-CV-228-B-W, 2005 U.S. Dist. LEXIS 1357, at *18 (D. Me. Jan. 28, 2005) (quoting Oceanside, 659 42 A.2d at 270). As the United States Supreme Court wrote in East River Steamship Corp. v. Transamerica Delaval, Inc., 476 U.S. 858 (1986), “the tort concern with safety is reduced when an injury is only to the product itself.” Id. at 871. Finally, the Oceanside Court defined “economic loss” within the meaning of this doctrine as “damages for inadequate value, costs of repair and replacement of defective product, or consequent loss of profits . . . .” Oceanside, 659 A.2d at 270 n.4 (quoting Moorman Mfg. Co. v. Nat. Tank Co., 435 N.E.2d 443, 449 (Ill. 1982)). Preliminarily, the Oceanside Court allowed the statutory claim under the Maine Unfair Trade Practices Act (MUTPA) to proceed despite the applicability of the economic loss doctrine. Id. at 272-73. Even though Anthem has taken the position that the economic loss doctrine precludes statutory claims, see Def.’s Mot. at 8-9, it has cited no authority for that proposition. Although the Court has found no Maine caselaw directly on-point, it has found cases where the economic loss doctrine applies but courts have nonetheless allowed statutory claims to proceed. See, e.g., Maine-ly Marine Sales & Serv., Inc. v. Worrey, No. CV-04-369, 2006 Me. Super. LEXIS 79, at *9-10 (Apr. 10, 2006) (granting summary judgment on fraud and negligent misrepresentation claims under the economic loss doctrine but allowing plaintiff’s MUTPA claim to proceed). Thus, even if the economic loss doctrine applies to tort claims, the Court is not convinced that it bars all statutory claims. Next, in American Aerial Services, Inc. v. Terex USA, LLC, 39 F. Supp. 3d 95 (D. Me. 2014), the United States District Court in Maine observed that “[i]t is generally accepted that the economic loss doctrine does not extend to claims of fraud 43 where the alleged misrepresentation is independent of the contract, such as claims of fraud in the inducement.” Id. at 111 (citing Marvin Lumber and Cedar Co. v. PPG Indus., Inc., 223 F.3d 873, 885 (8th Cir. 2000)). An exception may be where “the misrepresentation concerns the quality of the goods or product promised in the sales contract.” Id. Here, however, Workgroup’s fraud claim does not relate to the “quality of the goods or product” that it licensed to Anthem. To the contrary, taking Workgroup’s allegations as true, Anthem misappropriated the Workgroup software not because it was defective but because it worked. Based on the allegations in the Complaint, the fraud count is not precluded by the economic loss doctrine and survives dismissal. Moreover, the context for Oceanside is “product liability when a defective product does not cause personal injury or damage to other property.” Debbie Elliot, Inc. v. Hancock, No. CV-05-280, 2005 Me. Super. LEXIS 146, at *3-4 (Oct. 27, 2005) (citing Oceanside 659 A.2d at 270-71). As the United States District Court for the District of Maine recently observed, “whether the [economic loss] doctrine applies beyond a product liability claim is uncertain.” Schmid Pipeline Constr., 2014 U.S. Dist. LEXIS 100435, at *9; see In re Hannaford Bros., 671 F. Supp. 2d at 201. The claim in this case is not a product liability claim. Nonetheless, the Workgroup-Anthem contract has a service aspect, and the Court assumes that the economic loss doctrine as interpreted in Maine might extend to service contracts. See, e.g., Banknorth, N.A. v. MJ’s Wholesale Club, Inc., 394 F. Supp. 2d 283, 287 (D. Me. 2005) (“Not all states have adopted the economic loss rule, and those that have vary 44 widely in their understanding of the doctrine’s scope”); Me. Rubber Int’l v. Envtl. Mgmt. Group, Inc., 298 F. Supp. 2d 133, 136 (D. Me. 2004) (“The difficult question is whether Maine would carve out an exception to the economic loss doctrine for professional services contracts”). Even so, for the economic loss doctrine to apply, the dispute must center on the subject of the contract. In Schmid and Maine Rubber, for example, the courts were careful to note that the economic loss doctrine barred the tort claims because the critical issue was the “value and quality of what was purchased.” Schmid, 2014 U.S. Dist. LEXIS 100435, at *9 (quoting Maine Rubber, 298 F. Supp. 2d at 138). As the Gannett Court expressed the issue, the economic loss doctrine applies when the damage to the product means that it “has not met the customer’s expectations, or, in other words, that the customer has received insufficient product value.” Gannett, 2005 U.S. Dist. LEXIS 1357, at *18. This explanation of the economic loss doctrine’s rationale is consistent with Oceanside’s definition of “economic loss,” which is inapplicable to Workgroup’s claim. Oceanside, 659 A.2d at 270 n.4 (economic loss refers to inadequate value, costs of repair, replacement of defective product, and consequent loss of profits). Here, as claimed by Workgroup, Anthem’s actions had nothing to do with the adequacy of Workgroup’s performance of the contract itself. Instead, Workgroup alleges that Anthem hired experts to steal Workgroup’s work product and appropriate it for Anthem’s own use. In the context of this case, the Court concludes the economic loss doctrine does not bar the tort or statutory claims.4 Defendants submitted Bowser v. MTGLQ Investors, LP, No. 15-cv-154-LM, 2015 WL 4771337 (D.N.H. Aug. 11, 2015) in the run-up to the hearing on the motion to dismiss. Notice of Suppl. 4 45 C. The Rule 9(b) Heightened Pleading Requirement Federal Rule of Civil Procedure 9(b) provides: “In alleging fraud or mistake, a party must state with particularity the circumstances constituting fraud or mistake. Malice, intent, knowledge, and other conditions of a person’s mind may be alleged generally.” Anthem maintains that because Counts II through VII are based in fraud, the heightened pleading requirements of Rule 9(b) apply and that Workgroup has failed to meet those heightened requirements. Def.’s Mot. at 9-11. Again, Counts II through VII of the Workgroup Complaint allege tort and statutory claims against Anthem: (1) Count II, unjust enrichment; (2) Count III, the Uniform Trade Secrets Act; (3) Count IV, the Computer Fraud and Abuse Act; (4) Count V, the RICO Act; (5) Count VI, fraud; and (6) Count VII, trespass to chattel. Compl. at 22-27. Anthem correctly observes that under First Circuit law if “fraud lies at the core of the action” or is the “lynchpin” of the claim, then Rule 9(b) applies. Def.’s Mot. at 9 (quoting Hayduk v. Lanna, 775 F.2d 441, 443 (1st Cir. 1985)). Rule 9(b) clearly applies to Count VI, which alleges fraud. N. Am. Catholic Educ. Programming Found., Inc. v. Cardinale, 567 F.3d 8, 14 (1st Cir. 2009) (“Count II is also a fraud claim, and so also subject to Rule 9(b)’s particularity requirement”). It also applies to Count V, the RICO Act count, because the count alleges wire fraud. New England Data Servs., Inc. v. Becher, 829 F.2d 286, 290 (1st Cir. 1987) (“We hold that Rule 9(b) requires specificity in the pleading of RICO mail and wire fraud”). The Court is less Authority (ECF. No. 36). Perhaps Bowser can be read to support a more expansive interpretation of the economic loss doctrine than the cited cases, but it was decided under New Hampshire law. Because this case requires an application of Maine law, the Court must rely on Maine precedents especially in view of the limited pronouncements on the proper scope of the economic loss doctrine in Maine. 46 clear that the Rule 9(b) heightened pleading requirements apply to the statutory claims in Count III, the Uniform Trade Secrets Act, and Count IV, the Computer Fraud and Abuse Act. The Court is skeptical that Rule 9(b) applies to Counts II, unjust enrichment, and Count VII, trespass to chattel. Nevertheless, the Court need not rule on whether Anthem is correct in its broad assertions of Rule 9(b) applicability because in its view the Complaint meets the heightened pleading standards. Here, Workgroup alleges that both before and after September 4, 2013—the date when Workgroup and Anthem executed a two-year extension of the maintenance and support provisions of the 2008 Supplement— Anthem had hired engineers from Cognizant Technology Solutions, a Workgroup competitor, to reverse engineer Workgroup’s software in order to allow Cognizant to “build its critical features into replacement software for [Anthem].” Compl. ¶ 3. It also alleges that while Cognizant engineers were doing so, Anthem “concealed and misrepresented the true nature of their activities to Workgroup.” Id. The Complaint claims that in 2012 Anthem resolved to replace the Workgroup program, iAutomate, with an in-house product owned by Anthem and called Subro 2000. Id. ¶ 32. However, merely migrating the data from iAutomate to Subro 2000 or rewriting the programming language would not have been successful because the value of iAutomate is in certain “valuable and proprietary intellectual property and trade secrets” that Workgroup had developed. Id. ¶¶ 38-39. Accordingly, Anthem retained Cognizant to “reverse engineer the valuable and proprietary intellectual 47 property and trade secrets contained in iAutomate . . . and incorporate them into a .NET version of Subro 2000.” Id. ¶ 47. Furthermore the Complaint alleges while this deliberate misappropriation of Workgroup’s intellectual property was ongoing, Anthem continually misrepresented the true state of affairs to Workgroup. Id. ¶¶ 43-59. The Complaint sets forth numerous instances of Anthem misrepresentations or material omissions from early April 2013 through June 17, 2013. Id. ¶¶ 45-56. The Complaint alleges that between June 17, 2013 and September 30, 2013, Cognizant software engineers “logged in to the iAutomate web-based application software no fewer than 784 times” and “executed tens of thousands of actions within the web-based application.” Id. ¶¶ 6061. Following the September 4, 2013 contract extension with Workgroup, the Complaint says that on October 10, 2013, Anthem made a number of misrepresentations about Workgroup’s role in transitioning to Cognizant and its desire and ability to protect Workgroup’s intellectual property from discovery by its competitor. Id. ¶¶ 80-90. Then the Complaint states that from October 2013 to July 2014, Anthem misrepresented Cognizant’s role in the transition and extracted further sensitive information from Workgroup under Cognizant’s direction. Id. ¶¶ 91-117. In the Court’s view, Workgroup’s 172-paragraph Complaint fully satisfies the Rule 9(b) requirements for heightened pleading in counts that sound in fraud. Although Anthem insisted at the hearing that Workgroup has not adequately alleged what was taken, who took it, how they took it, and what was done with it, the Court 48 is well satisfied that Workgroup’s Complaint is sufficiently specific to satisfy Rule 9(b)’s directive to avoid the specter of “groundless claims” or “strike suits” needlessly damaging Anthem’s reputation. New England, 829 F.2d at 292. As this section has recounted, Workgroup alleges that Anthem stole the iAutomate software; that Anthem hired Cognizant to assist in this theft; that Anthem accomplished the theft by reverse engineering a licensed software to create an in-house replacement; and that as a consequence, Anthem terminated its contract with Workgroup. This is enough. In arriving at this conclusion, the Court makes no comment on whether Workgroup will be successful in its claims against Anthem. It only decides that the Complaint survives a Rule 9(b) challenge, and it thus avoids a dismissal that would deny Workgroup its day in court. Id. D. Implausibility Under Rule 8(a) Anthem also maintains that the allegations in the Complaint fail to meet the plausibility standards in Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007). Defs.’ Mot. at 12. Pursuant to Rule 8(a), the plaintiff’s complaint must set forth “a short and plain statement of the claim showing that the pleader is entitled to relief.” FED. R. CIV. P. 8(a)(2). A “short and plain” statement needs only enough detail to provide a defendant with “‘fair notice of what the . . . claim is and the grounds upon which it rests.’” Ocasio-Hernández v. Fortuño-Burset, 640 F.3d 1, 12 (1st Cir. 2011) (quoting Twombly, 550 U.S. at 555). “Despite the liberal pleading standard of Rule 8, to survive a motion to dismiss, a complaint must allege ‘a plausible entitlement to 49 relief.’” Gallagher v. Cigna Healthcare of Me., Inc., 538 F. Supp. 2d 286, 290 (D. Me. 2008) (quoting Twombly, 550 U.S. at 559). The Court disagrees with Anthem’s contention that Workgroup’s Complaint fails to comply with Rule 8(a) and views Anthem’s disagreements with the allegations in the Complaint as a matter of proof, not pleading. E. Count II: Unjust Enrichment Anthem argues that Workgroup may not allege both a breach of contract and unjust enrichment. Id. at 12-13. Anthem is correct that if a valid contract is established, a plaintiff may not recover under both breach of contract and unjust enrichment theories. A.F.A.B., Inc. v. Town of Old Orchard Beach, 639 A.2d 103, 105 n.3 (Me. 1994) (“Unjust enrichment describes recovery for the value of the benefit retained when there is no contractual relationship, but when, on the grounds of fairness and justice, the law compels performance of a legal and moral duty to pay”) (quoting Martin v. Campanaro, 156 F.2d 127, 130–31 n. 3 (2d Cir. 1946); Saunders v. Saunders, 90 Me. 284, 289, 38 A. 172, 173 (1897); 66 AM. JUR. 2D Restitution and Implied Contracts § 166 (1973)). But the notion that a plaintiff may not plead both breach of contract and unjust enrichment in the alternative “has no legs.” Fitzpatrick, 630 F. Supp. 2d at 106, aff’d 630 F. Supp. 2d 91 (D. Me. 2009). F. Count III: Uniform Trade Secrets Act The state of Maine has enacted the Uniform Trade Secrets Act (MUTSA), 10 M.R.S. §§ 1541-48. “A claim under the Uniform Trade Secrets Act requires a showing 50 of ‘misappropriation,’5 10 M.R.S. § 1542(2), of a ‘trade secret,’6 id. § 1542(4).” Cianbro Cos. v. Uremovich, 1:12-CV-00330-DBH, 2013 U.S. Dist. LEXIS 29754, at *28 (D. Me. Jan. 28, 2013), aff’d 1:12-CV-00330-DBH, 2013 U.S. Dist. LEXIS 29703 (D. Me. Mar. 4, 2013). Turning first to misappropriation, Anthem argues that, although Workgroup claimed that Cognizant used its software program thousands of times, Workgroup never alleged “that a single such use resulted in the actual taking of any secret information.” Def.’s Mot. at 15. Furthermore, Anthem asserts that the Complaint 5 Section 1542(2) of title 10 of the Maine Revised Statutes defines “misappropriation”: “Misappropriation” means: A. Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or B. Disclosure or use of a trade secret of another without express or implied consent by a person who: 1) Used improper means to acquire knowledge of the trade secret; 2) At the time of disclosure or use, knew or had reason to know that his knowledge of the trade secret was: i) Derived from or through a person who had utilized improper means to acquire it; ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or iii) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or 3) Before a material change of his position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake. 10 M.R.S. §1542(2). 6 Section 1542(4) of title 10 of the Maine Revised Statutes defines “trade secret”: “Trade secret” means information, including, but not limited to, a formula, pattern, compilation, program, device, method, technique or process, that: A. Derives independent economic value, actual or potential, from not being generally known to and not being readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use; and B. Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. 10 M.R.S. §1542(4). 51 fails to state “a single Cognizant product that competes against Workgroup’s iAutomate.” Id. Comparing the allegations in the Complaint, however, to the MUTSA definition of “misappropriation,” the Court readily concludes that Workgroup has alleged sufficient facts to fit within the statutory definition. Based on the allegations in the Complaint, Anthem had reason to know that Workgroup considered its iAutomate software program a trade secret and yet Anthem proceeded to violate the confidentiality provisions of its agreement with Workgroup, extract iAutomate’s secrets, and use them to its commercial benefit. Turning to the trade secret issue, the Maine Supreme Judicial Court explained in Spottiswoode v. Levine, 1999 ME 79, 730 A.2d 166 that “a court examining a claim under the [M]UTSA must determine whether the information at issue constitutes a ‘trade secret’ as that term is defined in 10 M.R.S. § 1542(4).” Id. ¶ 27 (footnote omitted). To constitute a “trade secret,” “the information must: (1) derive ‘independent economic value, actual or potential, from not being generally known [or] readily ascertainable’; and (2) be ‘the subject of efforts that are reasonable under the circumstances to maintain its secrecy.’” Id. (footnotes omitted) (alterations in original) (quoting 10 M.R.S. § 1542(4)). In Spottiswoode, the Law Court listed five factors that a court may examine to determine whether the information constitutes a trade secret: (1) the value of the information to the plaintiff and to its competitors; (2) the amount of effort or money the plaintiff expended in developing the information; (3) the extent of measures the plaintiff took to guard the secrecy of the information; (4) the ease or difficulty with which others could properly acquire or duplicate the information; and (5) the degree to which third parties have placed the information in the public domain 52 or rendered the information ‘readily ascertainable’ through patent applications or unrestricted product marketing. Id. ¶ 27 n.6 (citations omitted). A fair reading of the Complaint confirms that Workgroup’s software program had an independent economic value from not being generally known and that Workgroup attempted to protect that information from dissemination through the contract provisions. 10 M.R.S. § 1542(4). Even though all of the Spottiswoode factors are not set forth in the Complaint, the Court is satisfied that Workgroup has alleged sufficient facts to place its software program within the statutory definition of a trade secret. According to the Complaint, the inner workings of the Workgroup software program were the essence of the thing of value that Workgroup licensed to Anthem, who then went to unusual lengths to decode the Workgroup software program and to appropriate it as its own. The Complaint generally alleges that Workgroup took time, money, and effort to develop the software program, and there are numerous contractual provisions—ranging from restricted use access to Anthem’s promise to maintain the information as confidential—whereby Workgroup attempted to protect the information from disclosure. For purposes of the motion to dismiss, Workgroup has alleged sufficient facts to withstand dismissal of Count III, the MUTSA count. G. Count IV: The Computer Fraud and Abuse Act, 18 U.S.C. § 1030 In Count IV, Workgroup has claimed that Anthem violated a federal statute, the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. Stating that to prove an action under the CFAA, a plaintiff must demonstrate “access of a computer 53 without authorization or access that exceeds authorization,” Anthem contends that the “CFAA claim is deficient because (i) Anthem accessed its own computers (as opposed to Workgroup’s computers), and acted within its contractual authority while accessing those computers; (ii) Workgroup alleges no damage to its own computers or software, or any other loss addressable under the CFAA; and (iii) Workgroup fails to plausibly allege any additional factor from subsection (c)(4)(A)(i).” Def.’s Mot. at 1516 (emphasis in original). Workgroup responds that it is proceeding under a number of subsections of the CFAA: § 1030(a)(2)(C)—unauthorized access to and obtaining information from a protected computer; § 1030(a)(4)—knowing access to and obtaining information from a protected computer to commit fraud; § 1030(a)(5)(C)— unauthorized and intentional access to a protected computer to cause damage and loss; and § 1030(a)(6)(A)—knowing trafficking in a password to allow unauthorized access to a protected computer. Pl.’s Opp’n at 20-21. Anthem’s first point is that Workgroup has alleged that Anthem accessed its own computers and therefore there can be no CFAA violation. However, the language of the statute does not restrict the definition of “computer” to a computer not owned by the transgressor. The language in Workgroup’s cited subsections is simply “a protected computer,” “any computer,” and “a computer”—not “a computer not owned by the accessor.” See 18 U.S.C. §§ 1030(a)(2)(C) (“information from any protected computer”); § 1030(a)(4) (“a protected computer”); § 1030(a)(5)(C) (“a protected computer”); § 1030(a)(6)(A) (“a computer”). 54 Furthermore, the CFAA recognizes two kinds of illegal access: (1) unauthorized access and (2) access that exceeds authorized access. 18 U.S.C. §§ 1030(a)(2), 1030(a)(4).7 “Congress defined ‘exceeds authorized access’, as accessing ‘a computer with authorization and [using] such access to obtain or alter information in the computer that the access[o]r is not entitled to obtain or alter.” EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 583 (1st Cir. 2001) (quoting 18 U.S.C. § 1030(e)(6)). Exceeding access appears to cover the situation where, as here, it is alleged that the accessor initially had the right to access the computer but went into an unauthorized part of the computer to obtain “proprietary information that goes beyond any authorized use.” Id. Following EF Cultural, however, two lines of authority have emerged among the district courts in the First Circuit; one line reads EF Cultural as endorsing a broader view of “exceeds authorized access,” while the other labels any such endorsement dicta and takes a narrow view of “exceeding authorized access.” See Enargy Power Co. v. Xiaolong Wang, No. 13-11348-DJC, 2013 U.S. Dist. LEXIS 170193, at *9-14 (D. Mass. Dec. 3, 2013) (summarizing the split of district court opinion); Advanced Micro Devices, Inc. v. Feldstein, 951 F. Supp. 2d 212, 217 (D. Mass. 2013) (same). A narrow interpretation is supported by an en banc decision of the Ninth Circuit, United States v. Nosal, 676 F.3d 854 (9th Cir. 2012), which concluded that “the phrase ‘exceeds authorized access’ in the CFAA does not extend to violations An exception is § 1030(a)(6)(A), the password violation subsection, which presupposes that the accessor has no right of access to the computer itself. 18 U.S.C. § 1030(a)(6)(A) (“knowingly and with intent to defraud traffic[k]s . . . in any password or similar information though which a computer may be accessed without authorization, if (A) such trafficking affects interstate or foreign commerce. . . .”). 7 55 of use restrictions.” Id. at 863; see also Advanced Micro Devices, 951 F. Supp. 2d at 217 (“Proponents of a narrower interpretation suggest that Congress’ intent in passing the CFAA was to address computer hacking activities and not to supplement state misappropriation of trade secrets law”) (citing Nosal, 676 F.3d at 857); Wentworth-Douglass Hosp. v. Young & Novis, P.A., Case No. 10-cv-120-SM, 2012 U.S. Dist. LEXIS 90446 (D.N.H. June 29, 2012) (also following Nosal’s narrow interpretation of CFAA). By contrast, other courts have interpreted EF Cultural as calling for a “broader reading of the statute” and held that the “use and abuse” of proprietary information “without authorization” or in excess of “authorized access” violates the CFAA. See e.g., Guest-Tek Interactive Entm’t Inc. v. Pullen, 665 F. Supp. 2d 42, 46 (D. Mass. 2009). As the district court in Massachusetts observed, “[t]he CFAA is anything but a well-settled area of law” and “courts in different circuits have adopted significantly different interpretations of this act of the past decade.” Advanced Micro Devices, 951 F. Supp. 2d at 217 (collecting cases). One issue is that the CFAA is both a criminal and civil statute, and the courts have been concerned about criminalizing otherwise innocuous internet meanderings and information acquisitions. Id. at 218 (discussing “undesirable consequences” of a broad construction including “potentially transforming idle internet browsing at work into a federal crime”) (citing Nosal, 676 F.3d at 860). The narrower Ninth Circuit view, for example, arose in the context of an indictment under the criminal provisions of 18 U.S.C. § 1030 of a former employee who encouraged still-employed individuals to access the company’s computers and 56 transfer confidential information to the defendant so that he could start up a competing business. Nosal, 676 F.3d at 856. The potential problem is compounded by the importation of the terms of a confidentiality agreement entered into between two businesses or between a business and an employee into the substantive provisions of a criminal statute.8 Nevertheless, the “exceeds authorized access” is broad enough to survive the motion to dismiss based on the situation alleged in the Complaint where people with some authorized access enter into an area of a computer—here a protected software program not owned, but merely licensed, by the owner of the computer—and decode it in order to steal its capacity. See Enargy Power, 2013 U.S. Dist. LEXIS 170193, at *14 (“[T]he key issue is whether Wang’s alleged access here exceeded his authority to access Enargy’s server”). Anthem’s second argument is that Workgroup failed to allege a loss cognizable under the CFAA. Def.’s Mot. at 16. Here, the answer from the First Circuit seems clear: Workgroup’s alleged loss of its contract with Anthem, the transfer of the information in its software program without compensation to Anthem, and the In Nosal, the Ninth Circuit applied the rule of lenity in interpreting the statute. Nosal, 676 F.3d at 863. The Ninth Circuit observed that the rule of lenity requires “penal laws . . . to be construed strictly.” Id. (quoting United States v. Wiltberger, 19 U.S. (5 Wheat.) 76, 95 (1820)). One question is whether the rule of lenity should be extended to the civil portion of the statute. In Esquivel-Quintana v. Lynch, No. 15-3101, 2016 U.S. App. LEXIS 646 (6th Cir. Jan. 15, 2016), the Sixth Circuit wrote that “[a]n increasingly emergent view asserts that the rule of lenity ought to apply in civil cases involving statutes that have both civil and criminal applications.” Id. at *7-8 (citations omitted). The EsquivelQuintana Court explained that “statutory terms should not have different meanings in different cases—‘a statute is not a chameleon.’” Id. at *8 (quoting Carter v. Welles-Bowen Realty, Inc., 736 F.3d 722, 730 (6th Cir. 2013) (Sutton, J., concurring)). Also, “ambiguous statutes must be construed in favor of defendants under the rule of lenity.” Id. Even applying the rule of lenity, the Court’s conclusion remains the same. 8 57 reduction in value and commercial viability of the Workgroup iAutomate software program, all are losses within the First Circuit’s interpretation of the term. EF Cultural, 274 F.3d at 585 (“The word ‘loss’ means ‘detriment, disadvantage, or deprivation from failure to keep, have or get”) (quoting THE RANDOM HOUSE DICTIONARY OF THE ENGLISH LANGUAGE 1137 (2d ed. 1983)). Anthem’s final contention is Workgroup failed to effectively allege any of the “required (c)(4)(A)(i) factors.” Def.’s Mot. at 16-17. Here, the Court is confused. The “(c)(4)(A)(i) factors” are factors that potentially enhance the criminal punishment, such as physical injury to any person or a threat to public health or safety. The Court is unclear how this criminal penalty provision applies to the part of § 1030 that provides for a civil action. The answers to two of Anthem’s issues seem apparent. The answer to Anthem’s first contention—computer access—seems less so. At the very least, the Court views Anthem’s first issue as raising questions better addressed in a motion for summary judgment upon a more complete record and more detailed briefing. H. Count V: The RICO Claim In Count V, Workgroup alleged that Anthem violated the RICO statute by engaging in a “pattern of racketeering activity” with Cognizant “by causing or participating in repeated acts of wire fraud.” Compl. ¶ 160. Anthem argues that Workgroup’s claim should be dismissed “because the predicate acts of ‘racketeering’ that Workgroup alleges are specifically authorized by the Contract and because Workgroup has not plausibly alleged an ‘enterprise,’ a ‘pattern’ of racketeering 58 activity, or any injury directly related to the ‘racketeering’ conduct.” Def.’s Mot. at 17-21. “To state a RICO claim, plaintiffs must allege four elements: ‘(1) conduct, (2) of an enterprise, (3) through a pattern, (4) of racketeering activity.’” Giuliano v. Fulton, 399 F.3d 381, 386 (1st Cir. 2005) (quoting Kenda Corp. v. Pot O’Gold Money Leagues, Inc., 329 F.3d 216, 233 (1st Cir. 2003) (quoting Sedima, S.P.R.L. v. Imrex Co., 473 U.S. 479, 496 (1985))). “‘Racketeering activity’ means any act that violates one of the federal laws specified in the RICO statute, see 18 U.S.C. § 1961(1), including the mail and wire fraud statutes, 18 U.S.C. §§ 1341 and 1343.” Id. Anthem first argues that Workgroup failed to properly allege “racketeering” based on “wire fraud.” Def.’s Mot. at 17. “[T]he elements of wire fraud are ‘a scheme to defraud,’ the accused’s ‘knowing and willful participation in the scheme with the intent to defraud,’ and the use of interstate or foreign ‘wire communications’ to further that scheme.” United States v. DiRosa, 761 F.3d 144, 150-51 (1st Cir. 2014) (footnote omitted) (quoting United States v. Denson, 689 F.3d 21, 24 (1st Cir.2012)). “The conduct must ‘be intended to deceive another, by means of false or fraudulent pretenses, representations, promises, or other deceptive conduct.’” Bonilla v. Volvo Car Corp., 150 F.3d 62, 66 (1st Cir. 1998) (emphasis in original) (quoting McEvoy Travel Bureau, Inc. v. Heritage Travel, Inc., 904 F.2d 786, 791 (1st Cir.1990)). Here, Workgroup claims that, without Workgroup’s permission and contrary to its confidentiality agreements, Anthem devised a scheme to defraud Workgroup and commissioned Cognizant to access Workgroup’s iAutomate program, with the express 59 purpose of reverse engineering iAutomate and expropriating the software for Anthem’s own use and benefit and that in order to perform its mission, Cognizant “transmit[ted] by means of wire . . . in interstate or foreign commerce, more than a thousand fraudulent logins to the iAutomate web-based application server in furtherance of [Anthem’s] scheme to defraud Workgroup.” Compl. ¶¶ 159-61. The Court concludes that these allegations are sufficient to state a claim of racketeering based on wire fraud. Anthem also asserts that there is no viable allegation of a RICO “enterprise.” Def.’s Mot. at 18-19. Anthem points to caselaw that requires each entity to share a common purpose and not operate at arms’ length on separate agendas. Id. at 19 (citing United Food & Commercial Workers Unions & Emp’rs Midwest Health Benefits Fund v. Walgreen Co., 719 F.3d 849, 855 (7th Cir. 2013); In re Ins. Brokerage Antitrust Litig., 618 F.3d 300, 374-75 (3d Cir. 2010)). But Workgroup has alleged that both Anthem and Cognizant benefitted from entering into their joint scheme: “Anthem by obtaining a complete revision of Subro 2000 incorporating iAutomate’s proprietary and confidential features, and Cognizant by gaining access to iAutomate’s proprietary and confidential features for its own commercial benefit.” Pl.’s Opp’n at 30. The United States Supreme Court has held on multiple occasions that the definition of “enterprise” found in the RICO statute, 18 U.S.C. § 1961(4), must be interpreted broadly. Boyle v. United States, 556 U.S. 938, 944 (2009); Nat’l Org. for Women, Inc. v. Scheidler, 510 U.S. 249, 257 (1994). 60 Anthem correctly identifies a potential weakness in Workgroup’s RICO theory of liability, namely that Anthem and Cognizant were conducting their own affairs, not the enterprise’s affairs. Reves v. Ernst & Young, 507 U.S. 170, 185 (1993). Nevertheless, the allegations are sufficient to survive dismissal because Workgroup claims that Anthem and Cognizant did not operate at arms’ length and instead effectively conspired together to benefit each other to Workgroup’s detriment. Anthem also claims that Workgroup failed to allege a “pattern” of racketeering activity. “At least two acts of racketeering activity must occur within ten years of each other to constitute a ‘pattern.’” Giuliano, 399 F.3d at 386 (citing 18 U.S.C. § 1961(5)). “The Supreme Court has construed the pattern element as additionally requiring a showing that ‘the racketeering predicates are related, and that they amount to or pose a threat of continued criminal activity.’” Id. at 386-87 (emphasis in original) (quoting H.J. Inc. v. Nw. Bell Tel. Co., 492 U.S. 229, 239 (1989)). “This is the so-called ‘continuity plus relationship’ standard.” Id. at 387 (citing Efron v. Embassy Suites (P.R.), Inc., 223 F.3d 12, 15 (1st Cir. 2000)). Anthem’s main point here is that RICO was not enacted to address a “single narrow criminal episode.” Sys. Mgmt., Inc. v. Loiselle, 303 F.3d 100, 105 (1st Cir. 2002) (citing Apparel Art Int’l, Inc. v. Jacobson, 967 F.2d 720, 723 (1st Cir. 1992)). This is true “even if that single criminal episode involves behavior that amounts to several crimes (for example, several unlawful mailings).” Apparel Art, 967 F.2d at 723. RICO does not reach a criminal enterprise whose efforts are all addressed to “one contract and did not comprise or threaten ‘the kind of “continued” criminal 61 activity at which the RICO statute was aimed.’” Sys. Mgmt., 303 F.3d at 106 (quoting Apparel Art, 967 F.2d at 724). Here, Workgroup’s response is weak. Pl.’s Opp’n at 24. Workgroup merely points out the extensive nature of Cognizant’s engineering activity and Anthem’s refusal to admit its illegal conduct. Id. In Giuliano, the First Circuit gave some helpful guidance to the assessment of this factor. 388 F.3d at 387-89. The Guiliano Court noted that the Supreme Court has “identified two methods for establishing continuity”; there is the “closed-ended” approach and the “open-ended” approach. Id. at 387. Under the closed-ended approach, continuity “is established by showing ‘a series of related predicates extending over a substantial period of time’ that ‘amount to’ a threat of continued criminal activity.” Id. (quoting H.J., 492 U.S. at 242). To fit under this rubric, a plaintiff must allege a “temporal duration . . . and [an] alleged number of predicate acts . . . so extensive that ‘common sense compels a conclusion of continuity.’” Id. (quoting Efron, 223 F.3d at 18). Thus, the First Circuit rejected a RICO claim based on “only a single scheme by the defendants” where there was no evidence of plans for the defendants to act against another company. Kenda, 329 F.3d at 233. In terms of duration, the Supreme Court rejected a RICO claim of only “a few weeks or months,” H.J. Inc., 492 U.S. at 242, and the First Circuit rejected a RICO claim where the criminal activity lasted thirteen months. J.D. Marshall Int’l, Inc. v. Redstart, Inc., 935 F.2d 815, 820 (1st Cir. 1991) (“a relatively short period of time”). In Efron, the First Circuit listed a number of factors to consider when determining whether a broad, continuous pattern of criminal activity exists: (1) 62 whether there were single or multiple victims; (2) whether the defendant’s acts were limited to a single scheme or multiple schemes; (3) the duration of the scheme; and (4) whether the scheme had a singular, fixed objective and finite end point or whether it threatened to continue indefinitely. Efron, 223 F.3d at 18. Here, Workgroup has not alleged that Anthem and Cognizant had more than one victim; it has alleged that the duration of their efforts against Workgroup ran only four to five months—from May through September 2013, according to the Complaint. Compl. ¶¶ 60-70 (“Between June 17, 2013 and September 30, 2013”), ¶¶ 161-62 (“No later than May 2013”). There is no allegation of multiple schemes or that Anthem and Cognizant intended to repeat their performance. Instead, it appears that the object of the Anthem-Cognizant effort was solely Workgroup and its software program, iAutomate. A four to five month enterprise with one victim is not enough under the closed-end approach. Giuliano, 399 F.3d at 387 (“[W]here the period of time is short, continuity can never be established”). Nor has Workgroup alleged enough facts to fit within the “open-ended” approach. To fit under that method, a plaintiff must allege that the “racketeering acts themselves include a specific threat of repetition extending indefinitely into the future [or] . . . are part of an ongoing entity’s regular way of doing business.” Id. The Complaint does not claim that there was any threat of repetition or that the acts are part of Anthem’s regular way of doing business. See Soto-Negrón v. Taber Partners I, 339 F.3d 35, 38-39 (1st Cir. 2003) (dismissing RICO claim for similar reasons). 63 In short, the Court concludes that Workgroup has not stated a claim of a pattern of racketeering sufficient to support a RICO action against Anthem and the Court dismisses Count V, the RICO count. I. Count VII: Trespass to Chattel In Count VII, Workgroup claims that Anthem trespassed on its chattel, namely its iAutomate software program. Compl. ¶¶ 169-72. In its motion to dismiss, quoting Pearl Investments, LLC v. Standard I/O, Inc., 257 F. Supp. 2d 326, 354 (D. Me. 2003), Anthem says that “[a] trespass to chattels occurs when one party intentionally uses or intermeddles with personal property in rightful possession of another without authorization.” Def.’s Mot. at 21. Anthem contends that Workgroup failed to state a claim under this tort because Anthem owned the computer and therefore Anthem could not trespass on its own property. Id. Also, Anthem argues that the trespass to chattels theory has been displaced by the MUTSA. Id. (quoting 10 M.R.S. § 1548). The Court disagrees with Anthem on its main point that it cannot trespass on Workgroup’s software because Anthem owned the computer and had contractually negotiated for authorized access to its iAutomate program. As Workgroup continued to own the iAutomate program, Anthem’s right of access to that software program was conditioned upon its usage in accordance with the purpose of the agreement. Workgroup has claimed that Anthem entered into its program in order to steal it, which—if proved—could constitute a trespass onto Workgroup’s, not Anthem’s, personal property. 64 Turning to the preemption point, section 1548 of title 10 of the Maine Revised Statutes provides: 1. NO EFFECT. Except as provided in this section, this Act displaces conflicting tort, restitutionary and other laws of this State providing civil remedies for misappropriation of a trade secret. This Act does not affect: A. Contractual remedies, whether or not based upon misappropriation of a trade secret; B. Other civil remedies that are not based upon misappropriation of a trade secret; C. Criminal remedies, whether or not based upon misappropriation of a trade secret; D. The duty of any person to disclose information where expressly required by law; or E. The provisions of the Maine Tort Claims Act, Title 14, chapter 741. 10 M.R.S. § 1548. The flaw in Anthem’s argument dovetails with its argument against the application of MUTSA to the facts in this case. If, as Anthem elsewhere argues, MUTSA does not apply to the allegations in this Complaint, Workgroup would presumably be allowed to proceed with its trespass to chattels claim. Count VII is merely pleading in the alternative. See Fitzpatrick, 630 F. Supp. 2d at 106 (D. Me. 2009); Alpha Pro Tech v. VWR, Int’l LLC, 984 F. Supp. 2d 425, 447-48 (E.D. Pa. 2013) (“For example, in this case, if the Court were to dismiss plaintiff’s conversion claim and later make the finding that, although plaintiff had proved that the defendants took its pricing structure and business proposals, such information was not a protected trade secret under the [Pennsylvania Trade Secrets Act], the Court would be in the difficult position of telling the plaintiff that it had no remedy”) (quoting Cenveo Corp. v. Slater, No. 06-2632, 2007 U.S. Dist. LEXIS 9966, at *11 (E.D. Pa. Feb. 12, 2007)). 65 V. CONCLUSION The Court GRANTS in part and DENIES in part Defendant Anthem, Inc.’s Motion to Dismiss the Complaint (ECF No. 15). The Court GRANTS Anthem, Inc.’s Motion to Dismiss Count V, the Racketeer Influence in Corrupt Organizations Act claim; otherwise, the Court DENIES Anthem, Inc.’s Motion to Dismiss. SO ORDERED. /s/ John A. Woodcock, Jr. JOHN A. WOODCOCK, JR. UNITED STATES DISTRICT JUDGE Dated this 3rd day of February, 2016 66

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?