CPI Card Group--Colorado, Inc. v. Lehouck
Filing
31
Judge Nathaniel M. Gorton: ENDORSED ORDER entered. MEMORANDUM AND ORDER: "For the reasons stated in the Memorandum, the Court concludes that the plaintiff has demonstrated that 1) it is likely to succeed on the merits of its claim, 2) it will s uffer irreparable harm in the absence of injunctive relief, 3) the balance of hardships is in its favor and 4) there is a fit (or lack of friction) between the injunction and the public interest. See Nieves-Marquez v. Puerto Rico, 353 F.3d 108, 120 (1st Cir. 2003). Accordingly, plaintiff's motion for a preliminary injunction (Docket No. 3 ) is ALLOWED. So ordered."(Moore, Kellyann)
United States District Court
District of Massachusetts
)
CPI CARD GROUP - COLORADO, INC., )
)
Plaintiff,
)
)
v.
)
)
MICHELLE LEHOUCK,
)
)
Defendant.
)
)
Civil Action No.
14-13435-NMG
MEMORANDUM & ORDER
GORTON, J.
This case arises out of an alleged a breach of an
employment confidentiality agreement.
Plaintiff CPI Card Group
- Colorado, Inc. (“CPI”) is a plastic payment card (e.g. credit
card) production company that also provides related services to
its customers.
Defendant Michelle Lehouck (“Lehouck”) is a
former Senior Manager at CPI who was employed at the company
from November, 2007 until May, 2014.
Pending before the Court is the plaintiff’s motion for a
preliminary injunction to preclude Lehouck from continuing to
use CPI’s confidential and proprietary business information in
violation of her Confidentiality Agreement (“Agreement”) with
CPI.
For the reasons that follow, plaintiff’s motion will be
granted, though the requested scope of the preliminary
injunction has been modified.
-1-
III. Background
Plaintiff CPI is a global leader in the plastic payment
card (e.g. credit card) production industry.
Among other
things, it manufactures EMV-enabled payment cards, which are
cards with embedded computer chips that provide a higher level
of security than magnetic-stripe payment cards and are
customizable to specific client needs.1
The major credit card
brands have announced that they will shift liability for
counterfeit fraud onto credit card issuers and merchants who do
not adopt EMV-enabled systems starting on October 1, 2015.
The
EMV-enabled card migration has thus been a lucrative business
opportunity for CPI.
CPI has been required by its current and
prospective customers to execute non-disclosure agreements with
respect to migration proposals and other work performed for
them.
From July, 2013 until her resignation from the company,
Lehouck worked as a Senior Manager for EMV Technologies in CPI’s
Global Strategic Marketing Team.
Throughout her employment at
CPI, Lehouck provided expert support to the EMV sales teams and
was the primary customer contact.
She had access to
confidential information related to customers’ EMV migration
plans, including 1) the identities and contact information of
1
EMV is an acronym resulting from the original developers
Europay, MasterCard and Visa.
-2-
key decision-makers, 2) business, marketing and information
technology plans and 3) project and proposal specifications.
At
CPI, she also had access to the company’s 1) marketing and
pricing of products and services, 2) business plans, 3)
customers and prospective customers, 4) proposals to customers
and prospective customers and 5) the terms of agreements with
customers.
Following her resignation from CPI, Lehouck became the U.S.
EMV Product Director for Bell Identification B.V. (“Bell ID”).
Bell ID is a software company providing mobile payment
solutions.
It supports many financial institutions with respect
to their migration from magnetic strips to EMV chip technology.
Lehouck’s primary role at Bell ID is to develop business for the
company’s EMV data preparation/lifecycle management software.
A.
Lehouck’s Confidentiality Agreement with CPI
At the outset of her employment at CPI, Lehouck signed the
Agreement at issue in this case.
Section 1, titled
“Confidentiality - Trade Secrets,” provided that she shall not
at any time disclose or use CPI’s confidential information and
trade secrets, including the identities and contact information
of CPI’s customers and potential customers, confidential
information on CPI’s products and services and confidential CPI
marketing and pricing information.
-3-
Section 3 of the Agreement, titled “Unfair Competition,”
provided that for a period of one year following the termination
of employment, Lehouck will not directly or indirectly divert,
attempt to divert, solicit, or attempt to solicit any of CPI’s
customers, “including but not limited to those [with] whom [s]he
became acquainted while engaged as an Employee....”
In the
event of a breach, the Agreement provides for injunctive relief
in addition to any other remedy.
B.
Alleged breach of Agreement
CPI alleges that Lehouck violated the Agreement after she
began working for Bell ID.
Plaintiff contends that Lehouck used
confidential CPI information, including customer contact
information, to divert corporate opportunities from CPI and to
sell Bell ID’s EMV-related products and services to CPI’s
customers and prospective customers.
Specifically, CPI alleges
that Lehouck 1) reached out to a CPI employee to obtain contact
information for one of its customers, 2) contacted three of
CPI’s customers and drew on her knowledge of CPI’s confidential
information in an attempt to sell Bell ID’s products to them and
3) continuously solicited one of CPI’s prospective customers and
used her knowledge of CPI’s confidential information to sell
Bell ID’s products, which directly caused CPI to lose that
potential business.
-4-
When CPI’s outside counsel sent Lehouck a cease-and-desist
letter asking her to confirm her intention to abide by the
confidentiality and non-solicitation provisions of the
Agreement, Bell ID’s outside counsel responded by stating that
the Agreement was void and unenforceable under Colorado law.
Furthermore, counsel asserted that the contact information of
the three CPI customers was not protected by trade secret
because the identity of each had been publicly disclosed.
C.
Choice of law
Both parties agree that the Agreement should be interpreted
under Colorado law, in accordance with the choice of law
provision in the Agreement.
There are no public policy reasons
counseling against the application of Colorado law to the
Agreement.
D.
Procedural History
Plaintiff CPI filed the instant lawsuit on August 22, 2014.
It moved for a preliminary injunction on the same day.
The
Court heard argument on the plaintiff’s motion on September 11,
2014.
After hearing argument by each party, the Court indicated
that it was inclined to enter a preliminary injunction to
prevent defendant from disclosing CPI’s trades secrets and
confidential information.
It urged the parties to agree upon a
limited injunction and to submit a joint proposed order by
September 19, 2014.
The parties have been unable to do so.
-5-
IV.
Plaintiff’s Motion for a Preliminary Injunction
A.
Legal Standard
In order to obtain a preliminary injunction, the moving
party must establish
(1) a substantial likelihood of success on the merits,
(2) a significant risk of irreparable harm if the
injunction is withheld, (3) a favorable balance of
hardships and (4) a fit (or lack of friction) between
the injunction and the public interest.
Nieves-Marquez v. Puerto Rico, 353 F.3d 108, 120 (1st Cir. 2003)
(citation omitted).
Out of these factors, the likelihood of
success on the merits “normally weighs heaviest on the
decisional scales.” Coquico, Inc. v. Rodriguez-Miranda, 562 F.3d
62, 66 (1st Cir. 2009).
The Court may accept as true “well-pleaded allegations [in
the complaint] and uncontroverted affidavits.” Rohm & Haas Elec.
Materials, LLC v. Elec. Circuits, 759 F. Supp. 2d 110, 114, n.2
(D. Mass. 2010) (quoting Elrod v. Burns, 427 U.S. 347, 350, n.1
(1976).
The Court may also rely on otherwise inadmissible
evidence, including hearsay, in deciding a motion for
preliminary injunction. See Asseo v. Pan American Grain Co.,
Inc., 805 F.2d 23, 26 (1st Cir. 1986).
B.
Application
1.
Likelihood of Success
CPI maintains that it is likely to succeed on the merits of
its claims because 1) the non-solicitation and confidentiality
-6-
provisions in the Agreement are enforceable under Colorado law,
2) CPI’s confidential information constitutes trade secrets
under Colorado law and 3) Lehouck has breached her Agreement
with CPI.
All three arguments are contested by Lehouck.
a.
Direct competitors
As a preliminary matter, Lehouck argues that CPI cannot
show a likelihood of success on the merits because CPI and Bell
ID are not competitors.
Instead, defendant claims that card
manufacturers like CPI are Bell ID’s potential customers.
While
CPI is a payment card manufacturer, Bell ID is exclusively a
software developer for devices that interface with EMV-enabled
payment cards, among other applications.
Lehouck asserts that
there is no meaningful competition even though CPI and Bell ID
serve the same kinds of customers.
CPI has explained, both at oral argument and in an
affidavit, that the companies are direct competitors in many
areas within the EMV migration marketplace.
CPI and Bell ID are
direct competitors with respect to 1) EMV-enabled credit and
debit card mobile payment solutions, 2) data preparation
services, 3) personalization services, 4) key management
solutions, which is the process of creating and maintaining keys
for encrypted transport and storage of data, 5) secure trusted
service manager services, which enables secure transmission of
-7-
data and 6) EMV consulting services to customers throughout the
EMV migration process.
The Court concludes that CPI has demonstrated that the
businesses do overlap significantly and that CPI and Bell ID are
direct competitors in many respects.
b.
Enforceability of the Agreement
Under Colorado law,
[a]ny covenant not to compete which restricts the
right of any person to receive compensation for
performance of skilled or unskilled labor for any
employer shall be void, but this subsection [] shall
not apply to...(b) Any contract for the protection of
trade secrets....
Colo. Rev. Stat. § 8-2-113(2).
An agreement not to solicit
customers is considered a form of covenant not to compete.
Saturn Sys., Inc. v. Militare, 252 P.3d 516, 526 (Colo. App.
2011) (citation omitted).
Such a provision is enforceable so
long as 1) its purpose is to protect the employer’s trade
secrets and 2) is reasonably limited in time and geographic
scope. Id.
Colorado courts have looked to the preamble and the
substantive provisions of the contract to determine whether a
restriction was drafted with the purpose of protecting trade
secrets. See Haggard v. Spine, 2009 WL 1655030, at *5 (D. Colo.
June 12, 2009).
In the “RECITALS” section of the Agreement, the
defendant acknowledged that CPI
-8-
uses information and data which it has developed or
acquired at great expense and effort....It is important to
[CPI] that such information and data be solely for the
benefit of [CPI]...and shall remain confidential at all
times during and after the term of Employee’s employment...
Section 1 of the Agreement, titled “Confidentiality - Trade
Secrets,” is dedicated to describing the proprietary information
that the document seeks to protect.
Moreover, there are no
other provisions in the Agreement regarding unrelated subjects,
such as job responsibilities or salary.
The language in the
Agreement signed by Lehouck indicates that the purpose of the
contract was to protect trade secrets.
The Court concludes that the Agreement also meets the
second prong of the trade secret statutory exception because it
is reasonably limited in scope.
Section 3, titled “Unfair
Competition,” precludes Lehouck from soliciting CPI’s customers
for just one year, which is “well within the realm of
enforceable agreements.” Haggard, 2009 WL 1655030, at *10; see
also Taff v. Brayman, 518 P.2d 298 (Colo. App. 1974)(upholding a
two-year noncompetition restriction).
Furthermore, the terms of the Agreement do not limit
defendant from working for any other company, so long as she
does not engage in activity that would call on her “to use any
of [CPI’s] Confidential Information or trade secrets.”
Although
the Agreement lacks a geographic limitation, CPI contends that
the language is justified due to the global nature of companies
-9-
involved in the EMV migration business and the defendant’s
contact with customers that have a global reach.
Colorado
courts, while weary of restrictive covenants without geographic
limitations, have not found it to be dispositive and have been
able to interpret those provisions more narrowly without deeming
them invalid under the statute. See, e.g., Haggard, 2009 WL
1655030, at *10 (“The fact that the restrictive covenants meet
the statutory exception does not end the analysis....As such,
the worldwide restriction on solicitation is unreasonably
broad.”)
Following the example set in Haggard, this Court will
also interpret the non-solicitation provision more narrowly, to
preclude Lehouck from contacting only those customers with whom
she had actual contact during her employment at CPI, rather than
preventing her from soliciting all CPI customers and potential
customers. See id. at *11.
Having determined that the Agreement is enforceable under
Colorado law, the Court will now proceed to consider whether
Lehouck utilized information that constitutes trade secrets, in
violation of her Agreement.
c.
Trade secrets
The Colorado Uniform Trade Secrets Act defines a trade
secret as:
the whole or any portion or phase of any scientific or
technical information, design, process, procedure,
formula,
improvement,
confidential
business
or
-10-
financial information, listing of names, addresses, or
telephone numbers or other information relating to any
business or profession which is secret and of value.
To be a “trade secret” the owner thereof must have
taken measures to prevent the secret from becoming
available to persons other than those selected by the
owner to have access thereto for limited purposes.
Colo. Rev. Stat. § 7-74-102(4).
Colorado courts consider a
number of factors in determining whether information warrants
trade secret protection.
These factors include:
1) the extent to which the information is known
outside the business, 2) the extent to which it is
known to those inside the business, i.e., by the
employees, 3) the precautions taken by the holder of
the trade secret to guard the secrecy of the
information, 4) the savings effected and the value to
the holder in having the information as against
competitors, 5) the amount of effort or money expended
in obtaining and developing the information, and 6)
the amount of time and expense it would take for
others to acquire and duplicate the information.
Porter Indus., Inc. v. Higgins, 680 P.2d 1339, 1341 (Colo. App.
1984).
CPI asserts that its confidential information, including 1)
the identities and contact information of key decision-makers,
2) business, marketing and information technology plans and 3)
project and proposal specifications, constitutes trade secrets.
CPI notes that it has invested significant resources in
developing and marketing its EMV-related technology.
As a
result of its efforts, it has aggregated significant amounts of
information on its customers’ EMV-migration plans.
CPI has
taken measures to protect such information, including requiring
-11-
employees to sign Confidentiality Agreements, requiring
employees to relinquish all CPI property upon the termination of
their employment and maintaining extensive external and internal
security systems.
Lehouck disputes that the terms describing CPI’s trade
secrets and confidential information in the Agreement meet the
requisite level of particularity necessary for trade secret
protection.
She asserts that the descriptions in the Agreement,
with the possible exception of identities of customers and their
key decision-makers, are overly vague and therefore the nonsolicitation provision of the Agreement is unenforceable under
Colorado law.
Lehouck’s assessment is unpersuasive.
The Agreement lists
specific areas of information that constitute CPI’s trade
secrets, including
the names, addresses, telephone numbers of customers,
their buying habits, terms of sale extended to
customers, including credit terms, if any, or other
practices
of
any
of
Company’s
customers
[and]
Company’s marketing methods, related information and
the costs thereof.
A company’s confidential information consisting of “client
lists, customer contracts, pricing information, detailed debtor
information, client information and customer log-in codes” has
been found to qualify as trade secrets. Saturn Sys., 252 P.3d at
-12-
527.
CPI describes its trade secrets in a similar manner and
thus they do not appear to be overly vague.
The defendant also contends that the names of a number of
CPI customers, including the ones she contacted, are not trade
secrets because they were publicly disclosed as customers or
otherwise publically known to be potential EMV migration
customers.
For example, CPI referred to Interactive
Communications International (“InComm”) as one of its
“partners.”
The same relationship was disclosed on the
Paybefore.com website on January 20, 2014 in which CPI was
referred to as a “partner” of InComm.
Lehouck also asserts that
the members of the EMV Migration Forum, a group created by the
Smart Card Alliance in July, 2012 to address issues that require
cooperation and coordination to introduce secure EMV contact and
contactless technology in the United States, are publicly known
and therefore she should not be restrained from contacting the
12 CPI’s customers participating in the Forum.
Lehouck alleges that Colorado has found that the
intermittent provision of customer leads and other shared
customer information is not a trade secret, even if the entirety
of customer information contained in a database might be a trade
secret. Frontrange Solutions USA, Inc. v. Newroad Software,
Inc., 505 F. Supp. 2d 821, 836 (D. Colo. 2007).
In Frontrange,
the company seeking to protect its customer database through
-13-
trade secrecy had prominently advertised “the identities of many
of its customers on its website as a marketing tool,” had
permitted “free sharing of customer information at its user
group meetings and at supplier-sponsored events,” and others
could “obtain this information without restriction at trade
shows.” Id. at 837.
However, CPI is distinguishable because it has not
advertised its customer relationships to the extent publicized
by the plaintiff in Frontrange.
Listing a company as a
“partner” does not necessarily indicate that the company is a
customer of CPI.
CPI has also taken precautionary measures to
protect its confidential information through maintaining
extensive external and internal security systems, requiring
employees to sign Confidentiality Agreements and requiring
employees to relinquish all CPI property upon termination of
their employment.
More importantly, throughout her years of employment at
CPI, Lehouck learned not only the identities and contact
information of CPI’s customers, but also their strategies,
buying preferences, pricing requirements, technical
specifications and long-term plans.
No public listing would
give a salesperson that level of insight. See Haggard, 2009 WL
1655030, at *9 (rejecting the argument that customer contact
information could not be trade secret simply because it was
-14-
obtainable from the internet and finding that relationships with
customers and knowledge of their business preferences and
primary contacts that were developed through the employment were
protected as trade secrets).
Thus, the confidential information
categories enumerated in the Agreement, including customer
information, constitute trade secrets.
d.
Breach of the Agreement
CPI alleges that Lehouck initiated contact with three CPI
customers and that she used her knowledge of CPI’s confidential
information to divert business away from CPI.
Plaintiff
informed the Court at the September, 2014 hearing that in
addition to using her knowledge of the identities of and contact
information for the customers, Lehouck also relied on her
acquired knowledge of the customers’ needs and concerns during
the EMV migration in her attempt to lure them away to Bell ID.
CPI provided examples of two emails written by Lehouck to CPI
customers in which she urged them to conduct “side by side”
comparisons of a CPI product and a Bell ID product.
Lehouck disputes that she used any of CPI’s confidential
information during her contacts with the customers.
She asserts
that none of the emails she sent revealed any trade secrets
belonging to CPI.
The evidence brought forth by the plaintiff,
however, suggests otherwise.
Even if she did not explicitly
reveal confidential information in the emails, Lehouck
-15-
necessarily relied on the knowledge that she developed while
employed at CPI in order to address the customers’ concerns and
attempt to dissuade them from purchasing the CPI product in
favor of the Bell ID product.
The Court concludes that plaintiff is likely to prove that
the defendant improperly used CPI confidential information
following her resignation from CPI.
That is so because Lehouck
is unlikely to be able to separate out her intimate knowledge of
CPI’s confidential information and trade secrets in her attempt
to sell Bell ID’s products to the same customers.
2.
Remaining factors
a.
Irreparable harm
Irreparable injury is “a substantial injury that is not
accurately measureable or adequately compensable by money
damages.” Ross-Simons of Warwick v. Baccarat, Inc., 102 F.3d 12,
19 (1st Cir. 1996).
Plaintiffs alleging irreparable injury must
show more than a “tenuous or overly speculative forecast of
anticipated harm.” Id.
Examples of irreparable injuries include
loss of incalculable revenue and harm to goodwill or reputation.
Id. at 19-20.
In the preliminary injunction context, the First
Circuit Court of Appeals measures irreparable harm
on a sliding scale, working in conjunction with a
moving party’s likelihood of success on the merits,
such that the strength of the showing necessary on
irreparable harm depends in part on the degree of
likelihood of success shown.
-16-
Braintree Labs, 622 F.3d at 42-43 (internal quotation marks and
citations omitted).
CPI asserts that there is a significant risk of irreparable
harm if the Court does not grant the preliminary injunction due
to the October 1, 2015 deadline imposed by major credit card
payment brands for credit card issuers and merchants to upgrade
their systems to accept EMV-enabled cards.
Once that deadline
has passed, many of the major credit card issuers and merchants
will already have their EMV technologies in place and the
opportunity to compete for these customers will have passed.
The unique time-sensitive nature of the EMV migration makes
potential damages suffered by CPI difficult to calculate.
Lehouck responds that even if the Court finds that the
plaintiff has shown a likelihood of success on the merits, CPI
will not suffer irreparable harm if it does not receive a
preliminary injunction because it can receive an adequate remedy
at law in the form of pecuniary damages for lost profits after
trial.
Defendant’s argument fails to acknowledge that a loss of
confidentiality of trade secrets and loss of competitive
position does not merely decrease a company’s profits.
It
affects the company’s position in the marketplace and its
goodwill with customers which are difficult to quantify
-17-
monetarily.
As such, CPI is likely to be able to demonstrate
that it will suffer irreparable harm if defendant is not
enjoined from violating her Agreement.
b.
Balance of harms
Pursuant to the terms of the Agreement, the restrictions
placed on the defendant end one year after separation.
Any
injunction imposed, therefore, has a finite termination date.
Although defendant would be precluded from soliciting a limited
number of CPI’s customers until that date, there are numerous
other business prospects, many of which are listed as members in
the EMV Migration Forum.
c.
Public interest
The fourth element requires plaintiff to show that entry of
a preliminary injunction would not be adverse to the public
interest.
Although Colorado disfavors noncompetition
agreements, the Colorado legislature has created an exception to
the prohibition when the agreement relates to the protection of
trade secrets. See Colo. Rev. Stat. § 7-74-102(4).
Thus, a
preliminary injunction enforcing the confidentiality and nonsolicitation provisions of the Agreement does not violate the
public interest.
C.
Security under Fed. R. Civ. P. 65(c)
A movant for a preliminary injunction must give “security
in an amount that the court considers proper to pay the costs
-18-
and damages sustained by any party found to have been wrongfully
enjoined or restrained.” Fed. R. Civ. P. 65(c).
At the
September, 2014 hearing, the plaintiff suggested a security in
the amount of $10,000 while the defendant suggested a range of
$50,000 to $100,000.
Those numbers were calculated based on a
representation that defendant earns about $150,000 per year.
Following the hearing, the defendant submitted a supplemental
memorandum in opposition to the plaintiff’s motion for
preliminary injunction in which she requested a security of
$840,000.
She derives that figure based on the assumption that
she would receive a maximum commission on sales to all 23
companies that CPI seeks to enjoin Lehouck from contacting.
Court finds Lehouck’s assumption to be unrealistic and deems
$50,000 to be an appropriate security.
-19-
The
ORDER
For the reasons stated in the Memorandum, the Court
concludes that the plaintiff has demonstrated that 1) it is
likely to succeed on the merits of its claim, 2) it will suffer
irreparable harm in the absence of injunctive relief, 3) the
balance of hardships is in its favor and 4) there is a fit (or
lack of friction) between the injunction and the public
interest. See Nieves-Márquez v. Puerto Rico, 353 F.3d 108, 120
(1st Cir. 2003).
Accordingly, plaintiff’s motion for a
preliminary injunction (Docket No. 3) is ALLOWED.
So ordered.
/s/ Nathaniel M. Gorton
Nathaniel M. Gorton
United States District Judge
Dated October 8, 2014
-20-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?