Dice Corporation v. Bold Technologies LTD
Filing
93
Opinion and ORDER granting 61 Motion for Summary Judgment ; denying as moot 49 Motion to Bar Plaintiff from Presenting Damages Evidence, 65 Motion in Limine, 86 Motion to Strike, 88 Motion for Sanctions and 92 Motion for Continuance; and Dismissing Complaint with Prejudice. Signed by District Judge Thomas L. Ludington. (SGam)
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF MICHIGAN
NORTHERN DIVISION
DICE CORPORATION,
Plaintiff,
Case Number 11-13578
Honorable Thomas L. Ludington
v.
BOLD TECHNOLOGIES,
Defendant.
__________________________________________/
OPINION AND ORDER GRANTING DEFENDANT’S MOTION FOR
SUMMARY JUDGMENT AND DISMISSING COMPLAINT WITH PREJUDICE
In this intellectual property dispute, Plaintiff Dice Corporation alleges that Defendant
Bold Technology accessed Plaintiff’s servers and stole its software. Defendant denies that it did
any such thing. Relying on deposition testimony, affidavits, and other evidence showing that it
neither accessed Plaintiff’s servers nor its software, Defendant now moves for summary
judgment. Plaintiff opposes the motion. The opposition, however, is based on conclusory
assertions, not evidence. The Court will grant Defendant’s motion.
I
A
Plaintiff is a Michigan corporation with its principal place of business in Bay City,
Michigan. Second Am. Compl. ¶ 1. It was founded in 1992 by Mr. Clifford Dice, who is its
president, chief executive officer, and sole owner. Dice Dep. 7, Feb. 29, 2012, attached as
Def.’s Mot. for Summ. J. Ex. A. Defendant is an Illinois corporation with its principal place of
business in Colorado Springs, Colorado. Id. ¶ 2.
Competitors, Plaintiff and Defendant both provide software for companies in the alarm
industry. Dice Dep. 8, 13; Coles Aff. ¶ 3, attached as Def.’s Mot. Ex. B. That is, Plaintiff and
Defendant license software enabling alarm companies to monitor their customers’ alarms.
Customers pay the alarm companies to monitor various types of alarms (such as burglar and fire
alarms). Coles Aff. ¶ 3; see Dice Aff. ¶ 4, attached as Pl.’s Resp. to Def.’s Mot. for Summ. J.
Ex. A. The alarms send signals to receivers located at the alarm companies. Coles Aff. ¶ 3.
When an emergency signal is sent, the company contacts the appropriate authorities (such as
police or fire departments).
Id.
Larger alarm companies have hundreds of thousands of
customers. Id. ¶ 4. Companies like Plaintiff and Defendant create the software that monitors the
signals. Id.
To operate their businesses, the alarm companies must also collect large amounts of data
regarding their customers, including “names, addresses, contact information, billing information,
[and] information regarding the type and location of alarms.” Id. The data is compiled in
databases within software that the alarm companies license from companies like Plaintiff and
Defendant. Id.
On a basic level, Plaintiff’s and Defendant’s software thus performs the same functions:
compiling information and monitoring signals for the alarm companies. Coles Aff. ¶ 3. On a
technical level, however, the software is much different. Plaintiff’s software operates on a Linux
platform and is written in the Thoroughbred Basic computer language.1 Narowski Aff. ¶ 5,
attached as Def.’s Mot. Ex. D. Defendant’s software operates on a Windows platform and is
written in the Microsoft computer languages C++ and Visual Basic. Id. Plaintiff licenses its
1
See generally Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 305 (S.D.N.Y. 2000)
(discussing operating systems and computer languages), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273
F.3d 429 (2d Cir. 2001).
-2-
software simply as “Dice software”; Defendant licenses its software under the trade name
“Manitou.” Coles Aff. ¶¶ 2–3.
B
One such alarm company, ESC Central, was one of Plaintiff’s customers for a decade; it
is now one of Defendant’s customers. See Jennings (formerly Harris) Dep. 13, attached as
Def.’s Mot. Ex. F. The present litigation arises out of this transition.
ESC Central provides services to about 400 dealers and 50,000 customers. Jennings Dep.
7. Located in Birmingham, Alabama, it began licensing Dice software in 2001. Id. at 6, 10.
ESC Central’s operations manager is Kristi Jennings (formerly Harris). During the
decade that ESC Central was one of Plaintiff’s customers, Ms. Jennings was actively involved in
Plaintiff’s operations, chairing its “user group,” serving on its “chart committee,” and even
selling software on Plaintiff’s behalf.
The “user group” received suggested software changes to Plaintiff’s software from
customers. Id. at 12. The group would then meet and vote on which features to incorporate into
future editions of Plaintiff’s software. Id. Ms. Jennings chaired Plaintiff’s user group from 2005
through 2010. Id. at 11.
Ms. Jennings was also a member of Plaintiff’s “chart code committee.” Id. at 20. The
alarms are programed to send signals to receivers located at the alarm companies’ offices.
Signals include alerts for fire, flood, burglary, and other types of events. The “event codes,”
however, vary from manufacturer (for example, one manufacture would code fire as “1” while
another would code fire as “3”). Id.
Plaintiff’s chart code committee compiled this manufacturer information to update
Plaintiff’s “ALSCHART” file. Id. This file, Plaintiff’s user manual explains, is a data file
-3-
containing information regarding “incoming signals from zones and other information about
processing.” Dice Knowledge Base Article 3-1.2 (Sept. 12, 2003), attached as Def.’s Mot. Ex.
G. Discussing the chart committee’s responsibility, Ms. Jennings explained in her deposition:
“Our task was to chart codes from manufacturers and submit them to Dice.” Jennings Dep. 20.
She was then asked:
Q: So how would you go about doing that?
A: We would contact the manufacturers and ask them . . . .
Q: So what did Dice do with the chart codes that were submitted by the
committee?
A: They would take it and update it inside Dice software.
Q: And where in the Dice software would we go to find this listing of all the
codes?
A: Within their chart codes.
Q: Where is that? What is the name of that file?
A: The ALS[CHART] codes.
Q: ALS[CHART]?
A: Yes. . . .
Q: And just to be clear, they were — these codes were simply the manufacturers’
codes that had been assigned by the various manufacturers for these various
types of signals, and then these codes were all accumulated within this file
called ALS[CHART] which was part of the Dice software?
A: Yes.
Jennings Dep. 20–22. See also Dice Knowledge Base Article (Sept. 12, 2003). And Ms.
Jennings also sold software on Plaintiff’s behalf. Id. at 13. In her deposition, she was asked:
Q: Well, to be able to do that, did you have any particular training or knowledge
on the software that would allow you to effectively sell the software for Dice?
A: The best sales tool to me is the fact that I used it every day, and I knew the in’s
and out’s of the software and how it worked.
Q: Would you consider yourself to be extremely knowledgeable on the Dice
software?
A: Yes.
Q: So how many times do you think you actually did sales demos for Dice?
A: I don’t know an exact number. If I was to estimate, I would say at least 20
times.
Jennings Dep. 13–14.
-4-
C
Before the Dice user group meeting in August 2010, Ms. Jennings emailed Plaintiff with
concerns. Def.’s Mot. Ex. H. “I’m going to tell you that this may be a make or break year for
[the Dice user group],” Ms. Jennings wrote, elaborating: “There are several companies not
coming because ‘Dice is going to do what they want not what the users want’ and ‘it’s just a
waste of time and money.’ . . . I am not going to sugar coat all the things that I have heard and I
don’t want a call telling me how great things are or how many systems are being sold. There are
a number of unhappy customers.” Id. at 2.
Plaintiff’s founder and CEO, Mr. Dice, responded via email: “[W]e are not trying to sell
anything. We have to [pare] down the number of clients we have and serve due to the larger
scale of the product line currently.
Once folks see what our direction is and what our
development cycles are[,] [i]f they are not pleased with our direction, they should contact the
competition and move quickly to another [software provider] as you indicated, [and] I would
encourage it.” Id.
In September 2010, Ms. Jennings again emailed Plaintiff with concerns. Def.’s Mot. Ex.
I. Noting that the software had crashed ESC Central’s phone system, Ms. Jennings wrote: “We
are aware that DICE seems to think that the Altigen flakiness might be fixed by upgrading.
However, before doing anything else with this stupid phone system I want assurances in writing
from someone at DICE that this will stop these issues.” Id. at 2.
Mr. Dice responded: “On one hand, I feel responsible for not configuring multiple boxes,
but after kicking myself over and over again[,] I am not sure how I would have known that I
needed to. Given the fact that you were a beta site, we all know that the expectation is, that we
will all learn things and may change the situation. To make things worse, the relationship
-5-
between you and I has not been good, and getting worse.” Id. at 1. He concluded: “So I am
sorry that you have had the bad experience. And I want you to know that I want to fix it, but you
have to trust us and we have to work closely again. Otherwise, I think it’s just better if you start
backing out of what you have and planning longer term a change to some other automation
system.” Id. at 2; but see Dice Aff. ¶ 9 (“ESC was not asked to terminate its relationship with
Dice and did not leave Dice because of quality issues.”).
D
In October 2010, Ms. Jennings took up Mr. Dice on his suggestion that she should
contact the competition if she was dissatisfied and emailed Defendant. Jennings Dep. 32–33. In
Ms. Jennings’ deposition, she was asked:
Q: [Was] this the first contact that you had in terms of moving from Dice over to
Bold?
A: Yes.
Q: At this point in time in October 2010, I mean, had you absolutely made up
your mind you were leaving or you were just looking around?
A: No, I just started looking.
Q: Did you look at other Dice competitors beside Bold?
A: Yes.
Id. Also in October 2010, Mr. Dice disbanded the users group. Id. at 22.
In February 2011, Ms. Jennings reached what she “called my final straw.” Jennings Dep.
36. Finding ESC Central’s system was crashing each night, she wrote to Defendant: “I am being
blasted by complaints from operators, dealers, and anyone else that is having to deal with this
system. I can pretty much guarantee that if we call with a problem it involves some aspect of the
phone system not working properly. . . . We now have more points of failure than was ever
imaginable before! We haven’t heard a solution other than reboot it and see if it works better.”
Def.’s Mot. Ex. J.
-6-
Dissatisfied with Plaintiff’s response to this problem, in April 2011 ESC Central signed
a software licensing agreement with Defendant. Jennings Dep. 38; but see Dice Aff. ¶ 9
(asserting ESC Central “did not leave Dice because of quality issues”).
E
Defendant then began converting ESC Central from Plaintiff’s software system to
Defendant’s system.
“Generally speaking,” Defendant’s chief of operations explains, “the
process of converting a customer from one software system to another must be done carefully.
Because the customer is actively monitoring alarm signals from thousands of subscribers, the
transition from one software to another must be done seamlessly.” Coles Aff. ¶ 5. He notes that
the transition can take several months, elaborating:
After the customer signs a license agreement for the new software, one of the first
steps in the conversion process is the conversion of the customer’s data regarding
their subscribers from databases in the old software to databases in the new
software. After the customer data is extracted and converted, there will be a
period of time, usually about three months, when a customer’s central station is
running live on the old software, but the new software is running in parallel on
different servers. The purpose of running the two software systems in parallel is
to ensure that the new software is monitoring the alarm signals consistent with the
old software. After this period is completed the customer will go live on the new
software and will often terminate its license for the old software.
Id. ¶ 6; see also Dice Dep. 72 (noting that Plaintiff moves customers onto its system by having
the two systems run parallel for a time).
To transition ESC Central from Plaintiff’s system to Defendant’s system without
interrupting customer operations, Defendant first extracted ESC Central customer data from
Plaintiff’s software databases.
See Coles Aff. ¶ 6 (quoted above); Narowski Aff. ¶ 4.
Specifically, Defendant extracted ESC Central’s customer “names, addresses, contact
information, billing information, information regarding the type and location of alarms.” Coles
-7-
Aff. 4; see Dice Dep. 24, 147 (acknowledging that this information is owned by the customer,
not Plaintiff).
Matt Narowski, a computer programmer employed by Defendant, wrote the program to
extract this data from Plaintiff’s software (written in Thoroughbred basic) and convert it into a
format that can be read by Defendant’s software (written in C++ and Visual Basic). Narowski
Aff. ¶¶ 4–7. He explains:
The function of the Extraction Program is to extract the customer data from
databases stored on the Linux operating platform used by Dice software. The
customer data is extracted in a comma-separated text file, which is a format that
Bold uses to convert the customer data into Manitou, which is the trade name of
Bold software. It is my understanding that the extraction program is run after the
customer has decided to replace its Dice software with Bold’s software and the
customer wants to extract its data from the databases where it is stored. There are
several other programs available which could extract the customer data from the
databases, such as Thoroughbred Query, which is a Thoroughbred product, and
products available through Linux. The Extraction Program that I wrote differs
from these methods because it converts the customer data into the commaseparated text file format which is more easily utilized for conversion into Bold’s
Manitou software.
The Extraction Program is not capable of operating an alarm company central
station or of monitoring or processing an alarm signal, which is my general
understanding of the function of the Dice software.
Id. ¶¶ 7–8. Discussing how he created the program, Mr. Narowski continues:
I wrote the Extraction Program using information available to the public
regarding Thoroughbred Basic together with my general knowledge of computer
programming. I did not read, review, copy, or rely upon any information about
Dice source code or Dice object code when I wrote the Extraction Program, and
the Extraction Program does not contain any Dice source code or object code. In
fact, since I have been employed at Bold I have not seen a copy of Dice source
code or Dice object code.
Id. ¶ 6.2 He emphasizes:
2
For those unfamiliar with computer programing, Judge Kaplan explains:
Computers come down to one basic premise: They operate with a series of on and off switches,
using two digits in the binary (base 2) number system—0 (for off) and 1 (for on). All data and
instructions input to or contained in computers therefore must be reduced to . . . 1 and 0. . . .
-8-
The Extraction Program does not read or copy any source code, object code or
signal processing software of Dice and is not capable of doing so.
The Extraction Program does not circumvent any security feature built into the
Dice software. Dice has security features built into portions of its software which
prevent unauthorized users from running those protected portions of the software.
However, the database files where the customer data is stored are not subject to
any Dice security features and can be accessed by anyone who has a copy of
Thoroughbred basic, which Bold licensed from that company.
Id. ¶¶ 9–10. Mr. Dice acknowledged in his deposition that Plaintiff has offered no evidence, at
least no evidence that is admissible,3 that Defendant has copied Plaintiff’s source code. He was
asked:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Are you claiming that Bold has actually copied Dice’s source code?
To some extent, yes.
What source code are you claiming they copied?
The copywritten materials.
And what is your proof that they copied your source code?
At this point the only proof we have is that they’ve been converting our
customers using our data that was supplied with the system because they took
it . . . .
So you’ve never looked at Bold’s code; is that right?
Absolutely not.
So you don’t know for a fact that Bold copied Dice’s source code, right?
No, we don’t know that for a fact.
Some highly skilled human beings can reduce data and instructions to strings of 1’s and 0’s and
thus program computers to perform complex tasks by inputting commands and data in that form.
But it would be inconvenient, inefficient and, for most people, probably impossible to do so. In
consequence, computer science has developed programming languages. These languages, like
other written languages, employ symbols and syntax to convey meaning. The text of programs
written in these languages is referred to as source code. And whether directly or through the
medium of another program, the sets of instructions written in programming languages — the
source code — ultimately are translated into machine “readable” strings of 1’s and 0’s, known in
the computer world as object code, which typically are executable by the computer.
Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 306 (S.D.N.Y. 2000) (quotation marks, footnotes,
and internal alterations omitted), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001).
3
In Mr. Dice’s deposition, he also references hearsay assertions made by third parties. See, e.g., Dice Dep.
166–68, 172–73.
-9-
Dice Dep. 166–67; see id. at 61 (acknowledging that Plaintiff’s assertion that Defendant copied
Plaintiff’s source code is “an assumption”); but see Dice Aff. ¶ 6 (“The program which Bold has
created for converting information belonging to Dice customers cannot operate without access to
Dice software and the source code contained within that software”). Questioned further, Mr.
Dice again acknowledged that he did not know if Defendant used Plaintiff’s code:
Q: [D]o you have any evidence that Bold is using the identical codes that Dice is
using?
A: Not until we go through all of their software and drivers.
Q: So the answer to that question would be no, you don’t?
A: No, not at this point.
Dice Dep. 173.
Mr. Dice also acknowledged that ESC Central could access database files where
customer data is stored and retrieve the data without circumventing any of Plaintiff’s security
measures. Dice Dep. 159. Third-party applications such as Thoroughbred Query allow users to
type in commands, or “queries,” to retrieve the data. In Mr. Dice’s deposition, he was asked:
Q:
A:
Q:
A:
So no administrative password would have been used —
No.
— for all these queries?
It just required knowledge.
Dice Dep. 159. And Mr. Dice acknowledged that Plaintiff’s software is not encrypted. In his
deposition, he was asked:
Q: [D]oes Dice . . . encrypt its software?
A: We don’t have the capacity to encrypt at an object code level. We can encrypt
a source code, but we’ve had problems with it in the past so we tend not to
encrypt anything.
Dice Dep. 28; see id. at 81 (acknowledging “We don’t have a way of encrypting files”).
-10-
E
In Mr. Narowski’s deposition, he was also asked about another alarm company, Sonitrol,
that has transferred its business from Plaintiff to Defendant. See Narowski Dep. 49–50, May 23,
2012, attached as Pl.’s Resp. Ex. C. Counsel asked:
Q: And do you recall what form that data [conversion] took in Sonitrol matter?
A: I don’t recall. . . .
Q: Showing you what has been marked as Exhibit 22, which is Bold document
3334.
A: Huh. I did not re-collect — or recollect, sorry.
Q: Is this another way to obtain information?
A: It appears that they sent us an external hard drive with data on it. . . .
Q: This Dice data would have included Dice programs?
A: I can’t recollect, but I would assume.
Q: Dice data would include Dice drivers?
A: That, I don’t know.
Q: But whatever was on this hard drive?
A: We would have copied off.
Id. Mr. Narowski later elaborated:
The “Dice Data” that I was referring to was data that was owned by [the client]
regarding its subscribers that was stored in the databases that were on the hard
drive I received for the purpose of converting the customer data from Dice
software into Bold. . . . I do not know exactly what was included on the hard
drive that [the customer] sent me. My concern was that the hard drive contain all
of the customer data that [the client] needed converted. . . .
As I explained in my original affidavit, the Bold extraction program does not
circumvent any security features built into Dice software as it access databases in
the Dice software . . . . During the conversion process Bold does not utilize any
source code nor does it run any of the Dice software programs, such as the Dice
receiver driver programs. Bold has never used Dice software for the purpose of
monitoring alarm signals.
Narrowski Supp. Aff. ¶¶ 3, 7, attached as Def.’s Reply in Supp. Mot. for Summ. J. Ex. Z.
F
On May 27, 2011, Amy Condon left Plaintiff’s employment and joined Defendant’s firm.
Second Am. Compl. ¶ 11. Over the next two weeks, Plaintiff’s second amended complaint
-11-
alleges, “Ms. Condon accessed Dice servers located in Dice’s Bay City facility and accessed file
layouts that contained proprietary signal processing intelligence software.” Id. ¶ 12. Ms.
Condon flatly denies this. “Since I terminated my employment at Dice,” her affidavit provides,
“I have never accessed or attempted to access any server owned by Dice at its Bay City office or
any other location.” Condon Aff. ¶ 6, attached as Def.’s Mot. Ex. C.
Mr. Dice acknowledges that Plaintiff has no evidence that Ms. Condon accessed Dice
servers. In his deposition, he was asked:
Q: Are you claiming that Amy Condon hacked into the Dice servers in Bay City
Michigan, yes or no?
A: I don’t think she hacked into anything. I don’t — I don’t know if she did or
not. . . .
Q: Did any Bold employees hack into Dice servers located in Bay City,
Michigan?
A: I don’t know how Bold got our — got all of our intelligence. . . . It’s not a
question for me to answer, it’s a question for you to answer. How did Bold
get access to those files[?] . . .
Q: So the answer to the question that I asked you is you don’t know if some Bold
employees hacked into the Dice servers located in Bay City, Michigan?
A: I don’t know how Bold got the information to be able to do what they’ve
done. I have no idea. All I know is that they have it. . . .
Q: Okay. I want to know [about] is this sentence [in paragraph twelve of the
complaint] claiming that after Ms. Condon left her employment at Dice she
somehow hacked into Dice’s Bay City servers?
A: That’s what that says . . . .
Q: All right. So on what dates did Miss Condon hack into the servers located in
Dice’s Bay City facility; what dates did that happen?
A: We don’t know.
Q: Okay. How did she hack into the system?
A: We don’t know. . . .
Q: And what are those things that you say prove that Ms. Condon hacked into the
system, what are those things?
A: You can see the query commands and what data she’s accessing, which is our
data, not client data.
Dice Dep. 35–41. Probing into this assertion later in the deposition, counsel asked Mr. Dice:
Q: And what is the actual query command?
A: It’s basically — let’s see. This one is of — our proprietary file that contains
our data, ALSCHART.
-12-
Q:
A:
Q:
A:
ALSCHART?
Yeah. It’s the file that we provide with our software, and —
So is the — is the customer allowed to access the ALSCHART [file]?
No.
Dice Dep. 129.
Notwithstanding Mr. Dice’s assertion, Plaintiff’s own director of software development,
Julie Coppens, acknowledges that customers were allowed to access the ALSCHART file.
Coppens Dep. 19, attached as Def.’s Mot. Ex. O.
In her deposition, Ms. Coppens first explained that she was the person who had first
discovered that the queries at issue in this case had been run, testifying that in August 2011
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
I logged into Dice and checked some files and then I went to see what queries
were ran.
Okay. And what did you find?
It appeared that queries were ran in July that could have been used to convert
off of Dice.
To convert what?
Data off Dice.
You mean the customer data?
Yes.
Now the data that we are talking about, that belongs to the customer, right?
Specific data belongs to the customer.
Just the data we’re talking about that you are talking about being converted,
right?
Yes.
So these queries led you to believe that ESC wanted to take its data off of the
Dice software and move it to a different software, right?
Uh-huh.
Is that a yes?
Yes.
That’s what you suspected was going on?
Yes.
Does the customer have the right to do that?
Yes.
Coppens Dep. 29.
-13-
G
Ms. Coppens further acknowledged that customers were specifically permitted access to
the ALSCHART. Initially taking a contrary position in her deposition, Ms. Coppens first
asserted that customers were prohibited from accessing the ALSCHART file. Coppens Dep. 18–
19. On further questioning, however, Ms. Coppens revised her response:
Q: Has it always been the case that Dice hasn’t allowed access to the customers
to see the chart table?
A: Yes.
Q: What’s the chart table called, what’s the code name for it?
A: ALSCHART.
Q: So if you put into Query select start ALSCHART with just a user’s normal
login, what would come up?
A: Well, you can’t use it in Query . . . .
Q: So you can’t access it through Query, this ALSCHART file?
A: You cannot see the tables. You have to know — you have to know the
specific field names in the table.
Q: Give me an example. What’s a specific field name in the table?
A: When — say I had a database with customer field, let’s say I had customer
name, address, what type of panel that they were using, I can actually do a
lookup on that file and see those field names in there. . . .
Q: Why allow Query to access it though?
A: To access what?
Q: The ALSCHART table.
A: We — previously we allowed the ability to create a table but you can’t query
the table anymore.
Q: Wait a minute. You said previously you allowed the ability to query the
table?
A: Uh-huh.
Q: When was that?
A: Before September. You have to have knowledge of what to query.
Q: So before September of 2011 —
A: Uh-huh.
Q: — okay, you were able to query the chart table, the ALSCHART table?
A: Right.
Q: So what changed in September of 2011?
A: We found that you could query it.
Q: So what you are telling me about today you can’t query the ALSCHART
table[,] that wasn’t true a year ago, right?
A: Right. A year ago you could type in the ALSCHART and the field names if
you knew the field names.
Q: And it would all come up?
-14-
A: Absolutely.
Q: It was not protected from the user, right? If you had the user login you could
gain complete access to the [ALSCHART] — ALSCHART table a year ago,
right?
A: Yes.
Coppens Dep. 19, 22–23; but see Dice Aff. ¶ 8 (“Bold also misleads this Court when it indicates
that the information which Dice claims was misappropriated by Bold was readily available to
Dice customers.
Although Dice (or former Dice) personnel could access such proprietary
information, this information was hidden from customers themselves.”).
H
Ms. Coppens also confirms that an administrative password was not required to run the
queries and that Plaintiff has no evidence of unauthorized access. Coppens Dep. 32, 77. She
was asked:
Q: Is there any evidence that . . . Miss Condon after she left her employment at
Dice or anyone else on Bold’s behalf . . . somehow gain[ed] unauthorized
access to Dice’s software?
A: No one changed the code generator, if that’s what you are asking.
Q: I’m — I’m asking you do you have any information or evidence that either
Amy Condon or someone else at Bold Technologies somehow circumvented
the Dice code generator protection on its software at any time?
A: Not to my knowledge.
Q: At any of [Plaintiff’s] meetings or director meetings did anyone else indicate
to you that they had learned that either Miss Condon or someone else on
behalf of Bold had done something to circumvent this Dice code generator
protection?
A: No.
Coppens Dep. 77–78.
Plaintiff’s chief technical officer, the person directly responsible “for maintaining the
security of the Dice servers in Bay City,” confirms that Plaintiff has no evidence that any of
Defendant’s employees accessed Plaintiff’s servers. Grecko Dep. 12, 21, 25, Mar. 1, 2012,
attached as Def.’s Mot. Ex. Q. In his deposition, the gentleman was asked:
-15-
Q: Are you aware of any evidence, do you have any fact that you could point to
to say that [Ms. Condon] actually accessed the Dice servers in Bay City,
Michigan after she left the company?
A: No, there’s no proof I can give you saying here’s a document to say Amy did
X, Y, Z.
Q: And there’s no record or any — anything that would indicate that Amy made
some type of unauthorized access the Dice system after she left her
employment?
A: Well, as I explained earlier to you, that there’s no way for me to tell. . . .
Q: So if Amy were to deny that she ever did that, that she ever accessed the Dice
server [after] she left her employment, you would have no way to disprove
that; is that fair?
A: That’s fair.
Greko Dep. 21, 25.
I
Plaintiff’s complaint alleges that not only did Ms. Condon hack servers located in Dice’s
Bay City facility over the first two weeks of July 2011, but also over the next two weeks “Ms.
Condon accessed Dice servers located at client sites and initiated file transfers of proprietary
signal processing intelligence software.” Second Am. Compl. ¶ 12. Ms. Condon again denies
this accusation, explaining:
In July 2011 I was asked by an employee of ESC Central to assist her in writing a
report using a product known as Thoroughbred Query which can locate files
within the Dice software and generate a report. It is my understanding that ESC
owns the servers located in the Birmingham, Alabama office where the Query
report was being run. I did not log on to the ESC servers where the Query report
was being run. The login was done by the ESC employee using an ESC
authorized user password.
One Thoroughbred Query which I drafted related to a file known as ALSCHART.
Based on my prior employment with Dice, I knew that the ALSCHART file was
available for access to any customer such as ESC and I was not aware of any
restriction prohibiting a Dice customer such as ESC from accessing the
ALSCHART file.
I did not obtain a copy of any reports generated by the Query searches run during
the incident in question referred to in the complaint by Dice, nor did I provide
copies of the generated reports to Bold which were solely for ESC’s own use. I
have never on any occasion provided Bold with a copy of the ALSCHART file.
-16-
Condon Aff. ¶¶ 3–5; see also Coles Aff. ¶ 7 (“Bold does not use Dice’s ALSCHART codes as
Bold has its own set of alarm codes that it uses.”).
Plaintiff’s director of software development, as noted, acknowledges that customers were
permitted to query the ALSCHART file. Coppens Dep. 22–23 (quoted above). ESC Central’s
vice president, Ms. Jennings, confirms this. In her deposition, she was asked:
Q: There was some claim by Mr. Dice in his deposition that this ALS[CHART]
was off limits to customers. You were on that system for almost ten years.
Did you ever hear anything like that before?
A: No, never.
Q: What was the F10 function?
A: That was a part of the [Thoroughbred] Query function. We had actually paid
for — we had actually paid Dice the year before for Amy to come down and
do a training for us on Query, and it’s something that we always struggled
with, which is why that particular day that Amy was there she assisted in
doing that whole functionality, but the ALS[CHART] codes was something
that we were always in on a daily basis just about.
Jennings Dep. 48–49; see also Dice Knowledge Base Article 3 (Sept. 12, 2003) (user manual
discussed above). Turning to why Ms. Condon assisted ESC in querying the ALSCHART file in
2011, counsel asked:
Q: Had the data conversion from Dice to Bold been completed by the time Amy
started working at Bold?
A: Yes.
Q: That was all done?
A: Yes.
Q: Okay. Did you any have any role with respect to converting the customer data
from your Dice system to Bold?
A: No. . . .
Q: Now, just to be clear, Amy then had no role at all in converting the customer
information from the old Dice system over to Bold?
A: No.
Q: Okay. Now did Amy assist your company with an inquiry that you wanted
done regarding the ALS[CHART] file in early August?
A: Yes.
Q: Tell me about that.
A: It was a query that was ran.
Q: Okay. Who wanted the query run?
-17-
A: One of my employees, I believe.
Q: Okay. And what information did ESC want?
A: We actually had set up — upon moving off of Dice, we ran a lot of different
things that we may have used then or may have used months earlier.
Basically, we were just getting any information that we had that we might
need in the future.
Q: I’m sorry. I really didn’t follow. I mean, what — what exactly from the
ALS[CHART] did you need?
A: Essentially, we — as far as the ALS[CHART] code goes, that’s everywhere
that I had gone in and established whether or not an operator would see the
signal or if it was system handled, all of that. So we just wanted a query that
was a basis of here’s what we’ve done over the last ten years of what we’ve
created of how we handle every signal. . . .
Q: Okay. Do you know, the day Amy assisted with the query, what login was
used?
A: It was my login.
Q: Your personal login?
A: Yes.
Q: Did you give permission for that?
A: Yes.
Jennings Dep. 45–48, 51.
J
ESC Central’s conversion from Plaintiff’s software to Defendant’s was completed in
August 2011. Jennings Dep. 10. On August 5, Ms. Jennings posted a picture of herself holding
two disconnected Dice cables on Facebook. Greko Dep. 37. Ms. Coppens, one of Ms. Jennings
Facebook friends, saw the picture. Coppens Dep. 27. In her deposition, she was asked:
Q:
A:
Q:
A:
Q:
A:
Q:
A:
Okay. So what did you do when you saw the picture?
I decided I needed to find out what was going on with our software.
And so how did you go about doing that?
I went into the office and logged onto our — her system.
Whose system?
ESC’s system.
And how were you able to do that, I thought she had disconnected you?
She actually had a web — had a phone system of ours and they did not
remove access, so we were able to remote desktop into the machine, and they
did not change any passwords, so you’re able to log right in. . . .
Q: Okay. So why did you access her system?
A: I wanted to see what happened.
Q: Did you pick up the phone and call and ask her?
-18-
A: There’s no need to call her and ask her.
Q: You didn’t want to know why she unplugged your system?
A: No.
Coppens Dep. 27–28. Inquiring into what Ms. Coppens found after logging into ESC Central’s
system, counsel asked:
Q: Okay. And what happened next?
A: I logged into Dice and checked some files and then I went to see what queries
were ran.
Q: Okay. And what did you find?
A: It appeared that queries were ran in July that could have been used to convert
off of Dice.
Q: To convert what?
A: Data off Dice.
Q: You mean the customer data?
A: Yes. . . .
Q: So these queries led you to believe that ESC wanted to take its data off of the
Dice software and move it to a different software, right?
A: Uh-huh.
Q: Is that a yes?
A: Yes.
Q: That is what you suspected was going on?
A: Yes.
Q: Does the customer have the right to do that?
A: Sure.
Coppens Dep. 29–30. Ms. Coppens took several screenshots of what she found before logging
off ESC Central’s system. In Mr. Dice’s deposition, he was shown the screen shots and asked:
Q: [I]n terms of the actual data that’s in these files, has any of that data, the
information, the comp numbers, the identifiers, does any of that information
belong to Dice or is that the customer’s?
A: [It] is customer data, but again, it’s — it’s the — what’s typed there and the
extraction is very suspect because if you look at all of these as a whole — you
know, you’re trying to break it down one by one. That isn’t what it’s about.
The fact that there’s a thousand — there’s over thousands of files and there’s
tens of thousands of fields and this particular site wrote some isolated queries
that specifically not only took Dice property but actually systematically took
exactly what was needed is an indication that the person who did this had
more knowledge than a customer would.
Dice Dep. 147. Asking Mr. Dice to elaborate, counsel later asked:
-19-
Q: As I understand the overall complaint, you’re not complaining that Bold took
the customer data, right, you’re not complaining about that?
A: No.
Q: They have the right to do that, correct?
A: It was available to them on a CIS report.
Q: You’re just saying that there was a more labor-intensive way that they should
have gone about doing the same thing that they did, right?
A: Yeah, exactly.
Q: And you’re saying that there was a more labor-intensive way that they should
have gone about doing the same thing that they did, right?
A: Yeah, exactly.
Dice Dep. 221–22. Mr. Dice’s assertion, however, is in some tension with Plaintiff’s own
“customer implementation guide” that recommends electronic data transfer for new customers
converting to Plaintiff’s software, specifying:
DICE provides three primary methods to help you populate your DICE databases:
manual conversion, medium data conversion, and wire-to-wire transfer. . . .
Dice usually recommends converting as much data as possible electronically . . . .
Conversion Method #2: Medium Data Conversion
Medium data conversion allows you to download database files from your old
[software] system to compatible disks or tapes DICE can use. Many reasons
determine why this is a good one to use, including the following:
Selection — from your existing data, you can select only the data that is
necessary to transfer.
Control — you control what fields to send to DICE for conversion.
Speed — it is faster to use medium data conversion than trying to capture a
report using wire-to-wire transfer.
Conversion Method #3: Wire-To-Wire Transfer
Wire-to-wire transfer captures reports from your current system into a file and
then builds the data using the printed text data. As with medium data transfers,
many reasons determine why this method is beneficial, including the following:
Compatibility — your current system might not have the capability to output
data to a compatible disk or tape.
-20-
Ease of use — you might not have the technical ability to format your data in
a compatible format or compatible medium.
Dice Success Customer Implementation Guide 22–24 (2002) (emphasis omitted), attached as
Def.’s Mot. Ex. E; but see Dice Aff. ¶ 7 (“Bold suggests that it is not unlawful to convert a
customer’s data utilizing a competitor’s software and that Dice converts data in the same way.
This is simply untrue. The conversion method referenced in Exhibit “E” to Bold’s brief refers to
the downloading of client data only.”).
About ten days after Ms. Jennings posted the pictures on Facebook, Plaintiff brought suit
in this Court.
K
On August 16, 2011, Plaintiff filed a complaint against Defendant asserting claims for
violations of Michigan’s Uniform Trade Secrets Act, conversion, and unjust enrichment. In
October, Plaintiff filed its first amended complaint, adding claims for violations of the Computer
Fraud and Abuse Act, the Digital Millennium Copyright Act, and copyright infringement.
In November 2011, the Court entered a stipulated order dismissing the conversion and
unjust enrichment claims and permitting Plaintiff to file a second amended complaint to revise its
Computer Fraud and Abuse Act claim. ECF No. 19. Plaintiff did so.
Defendant then moved to dismiss the Computer Fraud and Abuse Act claim. The motion
was denied. Defendant now moves for summary judgment.
II
A motion for summary judgment should be granted if the “movant shows that there is no
genuine dispute as to any material fact and that the movant is entitled to judgment as a matter of
law.” Fed. R. Civ. P. 56(a). The moving party has the initial burden of identifying where to look
in the record for evidence “which it believes demonstrate the absence of a genuine issue of
-21-
material fact.” Celotex Corp. v. Catrett, 477 U.S. 317, 323 (1986). The burden then shifts to the
opposing party who must “set out specific facts showing a genuine issue for trial.” Anderson v.
Liberty Lobby, Inc., 477 U.S. 242, 250 (1986) (citation omitted). The court must view the
evidence and draw all reasonable inferences in favor of the non-movant and determine “whether
the evidence presents a sufficient disagreement to require submission to a jury or whether it is so
one-sided that one party must prevail as a matter of law.” Id. at 251–52.
III
Defendant moves for summary judgment on each of the four counts of the second
amended complaint. Each is addressed in turn.
A
Count one of the second amended complaint alleges that Defendant violated the
Michigan Uniform Trade Secrets Act, Mich. Comp. Laws §§ 445.1901–1910. Specifically,
count one alleges that in July 2011 Ms. Condon misappropriated Plaintiff’s trade secrets when
she “initiated file transfers of proprietary signal processing intelligence software,” the
ALSCHART file. Second Am. Compl. ¶ 12; see id. ¶¶ 13–19. “Prior to its theft by Defendant in
July of 2011,” count one elaborates, “the signal processing intelligence at issue was neither
known nor readily ascertainable by any proper means . . . . Dice protected the secrecy of this
information by restricting access to this information to its employees.” Id. ¶ 14.
The Michigan Uniform Trade Secrets Act, as its name suggests, protects a specific type
of information: secret information that has commercial value.
Mich. Comp. Laws §
445.1902(d); Kubik, Inc. v. Hull, 224 N.W.2d 80, 87 (Mich. Ct. App. 1974) (“To be a trade
secret, the information must, of necessity, be a Secret”). The act defines a “trade secret” as
information, including a formula, pattern, compilation, program, device, method,
technique, or process, that is both of the following:
-22-
(i)
Derives independent economic value, actual or potential, from not being
generally known to, and not being readily ascertainable by proper means
by, other persons who can obtain economic value from its disclosure or
use.
(ii)
Is the subject of efforts that are reasonable under the circumstances to
maintain its secrecy.
§ 445.1902(d); see also Hayes-Albion v. Kuberski, 364 N.W.2d 609, 614 (Mich. 1984) (quoting
Restatement (First) of Torts § 757 cmt. b. (1939)).4
A claim of misappropriation of trade secrets has three elements: “(1) the existence of a
trade secret; (2) the defendant’s acquisition of the trade secret in confidence; and (3) the
defendant’s unauthorized use of it.” Stromback v. New Line Cinema, 384 F.3d 283, 302 (6th Cir.
2004). In this case, Plaintiff establishes none of the three elements.
1
“The first element a plaintiff alleging misappropriation of trade secrets must prove is that
the information at issue actually constitutes a trade secret.” Mike’s Train House, Inc. v. Lionel,
L.L.C., 472 F.3d 398, 410 (6th Cir. 2006). “To be a trade secret,” as noted, “the information
must, of necessity, be a Secret: specifically, there must be evidence presented that sufficient
measures have been taken to guard the secrecy of the information and preserve its
confidentiality.” Kubik, 224 N.W.2d at 87.
In this case, the data obtained for ESC Central from the ALSCHART file in July 2011 via
the Thoroughbred query was not a secret, much less Plaintiff’s trade secret.
4
The purpose of protecting trade secrets, the United States Supreme Court explains, is to “encourage
invention in areas where patent law does not reach, and . . . prompt the independent innovator to proceed with the
discovery and exploitation of his invention.” Kewanee Oil v. Bicron Corp., 416 U.S. 470, 485 (1974) (citing
Gordon Doerfer, The Limits on Trade Street Law Imposed by Federal Patent and Antitrust Supremacy, 80 Harv. L.
Rev. 1432, 1454 (1967)); see generally Restatement (First) of Torts cmt. a § 757 (1939) (discussing reasons for
recognizing trade secret protections).
-23-
First, the information was not kept secret from customers like ESC Central. Plaintiff’s
user manual lists ALSCHART among the files that customers are able to query.
Dice
Knowledge Base Article 1, 3 (Sept. 12, 2003). Plaintiff’s director of software development, Ms.
Coppens, acknowledges that customers had unrestricted access to the ALSCHART file. In her
deposition, she was asked:
Q: It was not protected from the user, right? If you had the user login you could
gain complete access to the [ALSCHART] — ALSCHART [file in July
2011], right?
A: Yes.
Coppens Dep. 23. And Mr. Dice acknowledged in his deposition that Plaintiff’s customers were
not restricted from accessing the ALSCHART file (although at points in his deposition and
subsequent affidavit he also takes a contrary position). He was asked:
Q:
A:
Q:
A:
So no administrative password would have been used —
No.
— for all these queries?
It just required knowledge.
Dice Dep. 159; but see Dice Dep. 129 (asserting that customers were not able to access the
ALSCHART file); Dice Aff. ¶ 8 (“Bold also misleads this Court when it indicates that the
information which Dice claims was misappropriated by Bold was readily available to Dice
customers.”).
Moreover, the information obtained from Ms. Condon’s query of the ALSCHART file
belongs to ESC Central — not Plaintiff. In Ms. Coppens’ deposition, as noted, she explained
that she was the person who first discovered that the queries had been run, testifying that in
August 2011 “I logged into Dice and checked some files and then I went to see what queries
were ran.” Coppens Dep. 29. Counsel asked:
Q: Okay. And what did you find?
-24-
A: It appeared that queries were ran in July that could have been used to convert
off of Dice.
Q: To convert what?
A: Data off Dice.
Q: You mean the customer data?
A: Yes.
Q: Now the data that we are talking about, that belongs to the customer, right?
A: Specific data belongs to the customer.
Q: Just the data we’re talking about that you are talking about being converted,
right?
A: Yes.
Q: So these queries led you to believe that ESC wanted to take its data off of the
Dice software and move it to a different software, right?
A: Uh-huh.
Q: Is that a yes?
A: Yes.
Q: That’s what you suspected was going on?
A: Yes.
Q: Does the customer have the right to do that?
A: Yes.
Id. ESC Central’s vice president, Ms. Jennings, confirms that the information was ESC Central’s
— not Plaintiff’s. See Jennings Dep. 48 (quoted above). And Mr. Dice himself acknowledges as
much. In Mr. Dice’s deposition, he was asked:
Q: [I]n terms of the actual data that’s in these files, has any of that data, the
information, the comp numbers, the identifiers, does any of that information
belong to Dice or is that the customer’s?
A: [It] is customer data.
Dice Dep. 147.
In sum, the undisputed evidence shows that the information obtained from the query of
the ALSCHART file in July 2011 was not a secret, much less a trade secret of Plaintiff. Plaintiff
has not established the first element of a misappropriation of trade secrets claim.
-25-
2
Moreover, the information was not acquired by Defendant. As noted, the second element
of a claim for misappropriation of trade secrets is “the defendant’s acquisition of the trade secret
in confidence.” Stromback, 384 F.3d at 302.
In Ms. Condon’s affidavit, she asserts: “I did not obtain a copy of any reports generated
by the Query searches run during the incident in question referred to in the complaint by Dice,
nor did I provide copies of the generated reports to Bold which were solely for ESC’s own use. I
have never on any occasion provided Bold with a copy of the ALSCHART file.” Condon Aff. ¶
5; see also Coles Aff. ¶ 7 (“Bold does not use Dice’s ALSCHART codes.”).
Plaintiff offers no evidence to dispute this assertion.
Again, Mr. Dice himself
acknowledges as much. In his deposition, he was asked:
Q: [D]o you have any evidence that Bold is using the identical codes that Dice is
using?
A: Not until we go through all of their software and drivers.
Q: So the answer to that question would be no, you don’t?
A: No, not at this point.
Dice Dep. 173. As the undisputed evidence is that the data queried by Ms. Condon from the
ALSCHART file in July 2011 was not “acquired” by Defendant, Plaintiff has not established the
second element of claim for misappropriation of trade secrets.
3
Finally, because the information is not a trade secret and has not been acquired by
Defendant, Plaintiff cannot establish the final element of a misappropriation of trade secrets
claim: Defendant’s “unauthorized use” Plaintiff’s trade secrets. Stromback, 384 F.3d at 302.
Defendant is entitled to summary judgment on Plaintiff’s misappropriation of trade secrets claim.
-26-
4
Arguing against this conclusion, Plaintiff asserts that there is “overwhelming evidence
indicating that Bold routinely takes Dice’s software and utilizes that software as a tool for
converting customer data.” Pl.’s Resp. 4. What this overwhelming evidence is, however, is left
to the reader’s imagination. Plaintiff does offer any support for its assertion.
Moreover, an independent review of the evidence put forward by the parties in this case
reveals that there is no issue of fact regarding whether Defendant used Plaintiff’s software in
converting ESC Central’s customer data: The undisputed evidence is that Defendant did not.
Compare, e.g., Narowski Aff. ¶¶ 6, 9 (“I did not read, review, copy, or rely upon any information
about Dice source code or Dice object code when I wrote the Extraction Program, and the
Extraction Program does not contain any Dice source code or object code. . . . The Extraction
Program does not read or copy any source code, object code or signal processing software of
Dice and is not capable of doing so.”), with Dice Dep. 166–67, 173 (acknowledging that Plaintiff
has no evidence that Defendant copied Plaintiff’s source or object code).
Similarly unpersuasive is Plaintiff’s conclusory assertion that “Defendant clearly
obtained Dice software and used this software without permission.” Pl.’s Resp. 4. Again, what
the evidence is that demonstrates that Defendant “clearly obtained” Plaintiff’s software is not
identified. As noted, a defendant moving for summary judgment bears the initial burden of
demonstrating that there is no genuine issue of fact, “but the plaintiff is not thereby relieved of
his own burden of producing in turn evidence that would support a jury verdict. . . . Instead, the
plaintiff must present affirmative evidence in order to defeat a properly supported motion for
summary judgment. This is true even where the evidence is likely to be within the possession of
-27-
the defendant, as long as the plaintiff has had a full opportunity to conduct discovery.” Anderson
v. Liberty Lobby, Inc., 477 U.S. 242, 256–57 (1986).
Defendant is entitled to summary judgment on count one of the complaint.
B
Count two of the second amended complaint alleges that Defendant violated the Digital
Millennium Copyright Act, 17 U.S.C. § 1201 et seq. Specifically, count two alleges that “Dice’s
encryption of its software is a technological measure that effectively controls access to its
products. Bold’s use of former Dice employees with knowledge of methods to circumvent this
encryption has permitted Bold access to Dice software without permission from Dice. Bold has
utilized this unauthorized access to Dice software to unfairly compete against Dice.” Second
Am. Compl. ¶¶ 21–23 (formatting omitted).
The Digital Millennium Copyright Act was enacted by Congress in 1998 to “strengthen
copyright protection in the digital age.” Universal City Studios, Inc. v. Corley, 273 F.3d 429,
435 (2d Cir. 2001); see also Chamberlain Grp., Inc. v. Skylink Techs., Inc., 381 F.3d 1178, 1192
(Fed. Cir. 2004) (observing that the act creates new “causes of action for liability,” not new
property rights).
Prohibiting the circumvention of copyright protection systems, the act provides: “No
person shall circumvent a technological measure that effectively controls access to a work
protected under this title.”
17 U.S.C. § 1201(A)(1)(A).
To “circumvent a technological
measure,” the act specifies, “means to descramble a scrambled work, to decrypt an encrypted
work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure,
without the authority of the copyright owner.” § 1201(A)(3)(A).
-28-
“The plain language of the statute therefore requires a plaintiff alleging circumvention (or
trafficking) to prove that the defendant’s access was unauthorized.” Chamberlain Group, 381
F.3d at 1193. Illustrating the rule with an analogy, the Sixth Circuit explains: “Just as one
would not say that a lock on the back door of a house ‘controls access’ to a house whose front
door does not contain a lock and just as one would not say that a lock on any door of a house
‘controls access’ to the house after its purchaser receives the key to the lock, it does not make
sense to say that this provision of the DMCA applies to otherwise-readily-accessible copyrighted
works.” Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 547 (6th Cir.
2004). Rather, “the DMCA targets the circumvention of digital walls guarding copyrighted
material (and trafficking in circumvention tools) but does not concern itself with the use of those
materials after circumvention has occurred.” Universal City Studios, Inc. v. Corley, 273 F.3d
429, 443 (2d Cir. 2001) (emphasis in original).
In this case, there is no evidence of unauthorized access of Plaintiff’s copyrighted
materials by Defendant.
For example, Plaintiff’s chief technical officer — the person
responsible for Plaintiff’s security — was asked in his deposition:
Q: [Is there any] record or any — anything that would indicate that Amy made
some type of unauthorized access to the Dice system after she left her
employment?
A: Well, as I explained earlier to you, that there’s no way for me to tell. . . .
Q: So if Amy were to deny that she ever did that, that she ever accessed the Dice
server [after] she left her employment, you would have no way to disprove
that; is that fair?
A: That’s fair.
Greko Dep. 21, 25. Ms. Coppens likewise acknowledges that customers were not restricted from
accessing ALSCHART:
Q: So what you are telling me about today you can’t query the ALSCHART
table[,] that wasn’t true a year ago, right?
-29-
A: Right. A year ago you could type in the ALSCHART and the field names if
you knew the field names.
Q: And it would all come up?
A: Absolutely.
Q: It was not protected from the user, right? If you had the user login you could
gain complete access to the [ALSCHART] — ALSCHART table a year ago,
right?
A: Yes.
Coppens Dep. 19, 22–23. Confirming this, in Mr. Dice’s deposition he was asked:
Q:
A:
Q:
A:
So no administrative password would have been used —
No.
— for all these queries?
It just required knowledge.
Dice Dep. 159. Mr. Dice further acknowledged that Plaintiff’s software is not encrypted. In his
deposition, he was asked:
Q: [D]oes Dice . . . encrypt its software?
A: We don’t have the capacity to encrypt at an object code level. We can encrypt
a source code, but we’ve had problems with it in the past so we tend not to
encrypt anything.
Dice Dep. 28; see id. at 81 (acknowledging “We don’t have a way of encrypting files”).
Ms. Condon — the person that the second amended complaint accuses of the
unauthorized access — denies this accusation, explaining:
In July 2011 I was asked by an employee of ESC Central to assist her in writing a
report using a product known as Thoroughbred Query which can locate files
within the Dice software and generate a report. It is my understanding that ESC
owns the servers located in the Birmingham, Alabama office where the Query
report was being run. I did not log on to the ESC servers where the Query report
was being run. The login was done by the ESC employee using an ESC
authorized user password.
Condon Aff. ¶¶ 3. ESC Central’s vice president, Ms. Jennings, confirms that there was no
unauthorized access of Plaintiff’s copyrighted materials by Defendant:
Q: Do you know, the day [Ms. Condon] assisted with the query, what login was
used?
A: It was my login.
-30-
Q:
A:
Q:
A:
Your personal login?
Yes.
Did you give permission for that?
Yes.
Jennings Dep. 51. And finally, Mr. Narowski, the gentleman who created Defendant’s extraction
program, explains that he has not accessed any of Plaintiff’s copyrighted materials, elaborating:
I wrote the Extraction Program using information available to the public
regarding Thoroughbred Basic together with my general knowledge of computer
programming. I did not read, review, copy, or rely upon any information about
Dice source code or Dice object code when I wrote the Extraction Program, and
the Extraction Program does not contain any Dice source code or object code. In
fact, since I have been employed at Bold I have not seen a copy of Dice source
code or Dice object code.
Id. ¶ 6. He emphasizes:
The Extraction Program does not circumvent any security feature built into the
Dice software. Dice has security features built into portions of its software which
prevent unauthorized users from running those protected portions of the software.
However, the database files where the customer data is stored are not subject to
any Dice security features and can be accessed by anyone who has a copy of
Thoroughbred basic, which Bold licensed from that company.
Id. ¶ 10.
In sum, there is no evidence that Defendant circumvented Plaintiff’s security measures to
gain unauthorized access to Plaintiff’s copyrighted materials. Defendant is entitled to judgment
on count two of the second amended complaint.
Opposing this conclusion, Plaintiff writes: “Mr. Narowski’s deposition testimony and the
Dice Affidavit both confirm that Bold’s conversion software requires access to Dice software
and the source code contained within that software.” Pl.’s Resp. 5. Plaintiff does not assert,
however, that Defendant gained unauthorized access to Plaintiff’s copyrighted materials, much
less offer any evidence suggesting this.
-31-
Instead, Plaintiff boldly asserts “Bold’s conduct is precisely the type of ‘decryption’
prohibited by the DCMA.” Pl.’s Resp. 5. Plaintiff does not elaborate on how Defendant
allegedly decrypted Plaintiff’s software, much less offer facts suggesting this. Moreover, as
noted, Mr. Dice acknowledges that Plaintiff does not encrypt its software. Dice Dep. 28, 81
(quoted above).
Defendant is entitled to judgment on Plaintiff’s Digital Millennium Copyright Act claim.
C
Count three of the second amended complaint alleges that Defendant willfully infringed
Plaintiff’s copyrights in violation of 17 U.S.C. § 106. Specifically, the complaint alleges “Bold
has incorporated Dice’s copyrighted software into Bold’s conversion program.
Bold’s
conversion program is a ‘derivative work’ as that term is defined in 17 U.S.C. § 101. Bold’s
derivative conversion program was created without Dice’s authorization and contrary to Dice’s
exclusive rights to its software as provided in 17 U.S.C. § 106.” Second Am. Compl. ¶¶ 26–28
(formatting omitted).
The Copyright Act gives the copyright holder “exclusive rights” to “prepare derivative
works based upon the copyrighted work.” 17 U.S.C. § 106(2). A “derivative work” is defined
under the act as “a work based upon one or more preexisting works.” § 101.
“To prevail in an action for copyright infringement,” the Sixth Circuit instructs, “a
plaintiff must establish that he or she owns the copyright creation, and that the defendant copied
it.” R.C. Olmstead, Inc. v. CU Interface, LLC, 606 F.3d 262, 274 (6th Cir. 2010) (quotation
marks omitted) (quoting Kohus v. Mariol, 328 F.3d 848, 853 (6th Cir. 2003)).
Yet not all copying is actionable. The Sixth Circuit cautions that “it is a constitutional
requirement that a plaintiff bringing an infringement claim must prove copying of constituent
-32-
elements of the work that are original.” Kohus, 328 F.3d at 853 (quotation marks and emphasis
omitted) (quoting Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991).
This can be established through either direct or indirect evidence. When the plaintiff has
no direct evidence of copying, as in this case,5 “a plaintiff must show (1) access to the allegedlyinfringed work by the defendant(s) and (2) a substantial similarity between the two works at
issue.” R.C. Olmstead, 606 F.3d at 274 (quotation marks omitted) (quoting Kohus, 328 F.3d at
853).
Because only original elements are protected, however, “before comparing similarities
between two works a court should first identify and eliminate those elements that are unoriginal
and therefore unprotected.” R.C. Olmstead, 606 F.3d at 274 (citing Kohus, 328 F.3d at 853).
After distilling the work to protected elements, the court must then determine “whether the
second work involves elements that are substantially similar to the protected elements of the
original work.” R.C. Olmstead, 606 F.3d at 274 (citing Kohus, 328 F.3d at 855). The Sixth
Circuit refers to this as an “abstraction-filtration-comparison analysis.” R.C. Olmstead, 606 F.3d
at 274 (citing Kohus, 328 F.3d at 855).
In R.C. Olmstead, for example, the plaintiff brought a copyright infringement claim
alleging that the defendant had copied the plaintiff’s software. 606 F.3d at 268. In support of its
claim, the plaintiff produced the testimony of an expert, Robert Reid, and nearly two hundred
pages of exhibits comparing the two companies’ software. Id. at 267. The district court
excluded the expert’s testimony, explaining “Reid woefully fails to provide any reasoning or
logical support for his conclusions. Reid vaguely lists a sampling of ‘similarities’ between the
[plaintiff’s] and [the defendant’s] softwares, but he never explains why the alleged similarities
5
See, e.g., Narowski Aff. ¶¶ 6, 8–10 (quoted above); Narowski Supp. Aff. ¶ 7 (“During the conversion
process Bold does not utilize any Dice source code nor does it run any of the Dice software programs, such as the
Dice receiver driver programs.”), attached as Def.’s Reply Ex. Z.
-33-
indicate actual copying of Plaintiff’s software rather than that the softwares simply perform
similar functions (and thus would be expected to function similarly).” Id. at 268. The court then
granted the defendant summary judgment on the copyright infringement claim.
The Sixth
Circuit affirmed, writing:
[The plaintiff] has not attempted to identify any original elements of its software
that [the defendant] copied. Because [the plaintiff] has failed to produce evidence
creating a question of fact as to whether [the defendant] copied original elements
of its software, [the defendant] was entitled to summary judgment on [the
plaintiff’s] copyright infringement claims.
Id. at 275. Writing in the alternative, the court noted that even if the expert’s testimony had not
been excluded, the defendant would nevertheless be entitled to summary judgment:
Neither Reid’s report, nor Reid’s additional declaration provided by Olmstead in
an attempt to cure the deficiencies in the report, even begins to provide the kind of
abstraction-filtration-comparison analysis we applied in Kohus and that the
district court found lacking. As mentioned above, under Kohus, the factfinder
determines substantial similarity first by asking what aspects of the copyrighted
work, if any, are protected, and then by asking whether the second work involves
elements that are substantially similar to the protected elements of the copyrighted
work. All of the evidence offered by [the plaintiff] clearly lacks the abstraction
and filtration elements. [The plaintiff] has not attempted to identify those
elements of its software that are original; thus its substantial similarity analysis
does not filter elements that would be expected to be common to any credit union
software, those dictated by the particular business practices.
Id. (citations omitted) (citing Kohus, 328 F.3d at 855 & 855 n.1).
In this case, as in R.C. Olmstead, Plaintiff does not attempt to identify any original
elements of its software that Defendant allegedly copied. Unlike R.C. Olmstead, moreover,
Plaintiff does not even offer a comparison of the software of the respective companies.
Instead, Plaintiff tersely alleges that “loading validly copyrighted software onto a
computer without the owner’s permission, then using the software for the principal purpose for
which it was designed is a form of copyright infringement. Bold’s Matt Narowski admits that
this precisely how his conversion program operated.” Pl.’s Resp. 5–6 (citation and quotation
-34-
marks omitted) (quoting R.C. Olmstead, Inc. v. CU Interface, LLC, 657 F. Supp. 2d 878, 890
(N.D. Ohio 2009) aff’d, 606 F.3d 262 (6th Cir. 2010).
Contrary to Plaintiff’s contention, Mr. Narowksi acknowledges no such thing. In his
affidavit, as noted, he explains:
The function of the Extraction Program is to extract the customer data from
databases stored on the Linux operating platform used by Dice software. The
customer data is extracted in a comma-separated text file, which is a format that
Bold uses to convert the customer data into Manitou . . . .
The Extraction Program is not capable of operating an alarm company central
station or of monitoring or processing an alarm signal, which is my general
understanding of the function of the Dice software.
Narowski Aff. ¶¶ 7–8.
Discussing how he created the extraction program, Mr. Narowski
continues:
I wrote the Extraction Program using information available to the public
regarding Thoroughbred Basic together with my general knowledge of computer
programming. I did not read, review, copy, or rely upon any information about
Dice source code or Dice object code when I wrote the Extraction Program, and
the Extraction Program does not contain any Dice source code or object code. In
fact, since I have been employed at Bold I have not seen a copy of Dice source
code or Dice object code.
Id. ¶ 6. And he emphasizes: “The Extraction Program does not read or copy any source code,
object code or signal processing software of Dice and is not capable of doing so.” Id. ¶ 9.
In his deposition, Mr. Narowski did acknowledge he had received an external hard drive
from another of Plaintiff’s former clients (Sonitrol) when it transferred its business to Defendant.
See Narowski Dep. 49–50. He emphasized however, that he did not use any of Plaintiff’s
software for the principal purpose for which it was designed (alarm monitoring), explaining:
The “Dice Data” that I was referring to was data that was owned by [the client]
regarding its subscribers that was stored in the databases that were on the hard
drive I received for the purpose of converting the customer data from Dice
software into Bold. . . . I do not know exactly what was included on the hard
-35-
drive that [the customer] sent me. My concern was that the hard drive contain all
of the customer data that [the client] needed converted. . . .
During the conversion process Bold does not utilize any source code nor does it
run any of the Dice software programs, such as the Dice receiver driver programs.
Bold has never used Dice software for the purpose of monitoring alarm signals.
Narrowski Supp. Aff. ¶ 3, 7. Plaintiff offers no evidence to dispute this.
As the undisputed evidence is that Defendant did not use Plaintiff’s software, much less
use it for the principal purpose for which it was designed, Defendant is entitled to summary
judgment on Plaintiff’s copyright infringement claim.
D
Count four of the second amended complaint alleges that Defendant violated the
Computer Fraud and Abuse Act, 18 U.S.C.A. § 1030. Specifically, the complaint alleges: “The
Dice servers accessed by Bold are used in both interstate and foreign commerce and are thus
‘protected computers’ as defined at 18 USC § 1030(e)(2). Bold’s access to confidential and
proprietary information contained on the Dice servers was both intentional and without
authorization. Dice has sustained a ‘loss’ significantly in excess of $5,000.” Second Am.
Compl. ¶¶ 32–34 (formatting omitted).
The Computer Fraud and Abuse Act, the “first Federal computer crime statute,” S. Rep.
104–357, at 3 (1996), had its genesis in the enactment of “a massive omnibus crime bill known
as the Comprehensive Crime Control Act [of 1984, Pub. L. No. 98–473, 98 Stat. 1976].” Orin
Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 Minn. L. Rev. 1561,
1563 (2010).
Codified at 18 U.S.C. § 1030, it criminalized “three specific [actions]: computer misuse
to obtain national security secrets, computer misuse to obtain personal financial records, and
-36-
hacking into U.S. government computers.” Id. at 1564 (citing 18 U.S.C. § 1030(a)(1)–(3)). Two
years later, Congress criminalized three more computer activities:
Section 1030(a)(4) prohibited unauthorized access with intent to defraud;
essentially, the traditional crime of wire fraud committed using a computer.
Section 1030(a)(5) prohibited accessing a computer without authorization and
altering, damaging, or destroying information, thereby causing either $1,000 or
more of aggregated loss . . . . Section 1030(a)(6) prohibited trafficking in
computer passwords.
Kerr, supra, at 1565 (footnotes omitted). Eight years passed. In 1994, Congress enacted another
omnibus crime bill, the Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No.
103–322, 108 Stat. 1796. Although better known for its provisions regarding a federal assault
weapons ban, the bill also included the Computer Abuse Amendments Act, which added civil
remedies for violations of § 1030. See generally Deborah F. Buckman, Validity, Construction,
and Application of Computer Fraud and Abuse Act, 174 A.L.R. Fed. 101 (2001).
“Any person who suffers damage or loss by reason of a violation of the section,”
subsection (g) provides in pertinent part, “may maintain a civil action against the violator to
obtain compensatory damages and injunctive relief or other equitable relief.” 18 U.S.C. §
1030(g).
In this case, as noted, the second amended complaint alleges that Defendant violated the
act when Ms. Condon accessed Plaintiff’s servers during July 2011. See Second Am. Compl. ¶¶
12, 31–34. Ms. Condon unequivocally denies doing so. Condon Aff. ¶ 6 (“Since I terminated
my employment at Dice [in May 2011], I have never accessed or attempted to access any server
owned by Dice at its Bay City office or any other location.”). And Mr. Dice acknowledges that
Plaintiff has no evidence that Ms. Condon accessed Dice servers. In his deposition, he was
asked:
-37-
Q: Are you claiming that Amy Condon hacked into the Dice servers in Bay City
Michigan, yes or no?
A: I don’t think she hacked into anything. I don’t — I don’t know if she did or
not. . . .
Q: Did any Bold employees hack into Dice servers located in Bay City,
Michigan?
A: I don’t know how Bold got our — got all of our intelligence. . . . It’s not a
question for me to answer, it’s a question for you to answer. How did Bold
get access to those files[?] . . .
Q: So the answer to the question that I asked you is you don’t know if some Bold
employees hacked into the Dice servers located in Bay City, Michigan?
A: I don’t know how Bold got the information to be able to do what they’ve
done. I have no idea. All I know is that they have it. . . .
Q: Okay. I want to know [about] is this sentence [in paragraph twelve of the
complaint] claiming that after Ms. Condon left her employment at Dice she
somehow hacked into Dice’s Bay City servers?
A: That’s what that says . . . .
Q: All right. So on what dates did Miss Condon hack into the servers located in
Dice’s Bay City facility; what dates did that happen?
A: We don’t know.
Q: Okay. How did she hack into the system?
A: We don’t know.
Dice Dep. 35–41.
Plaintiff’s chief technical officer, the person directly responsible “for
maintaining the security of the Dice servers in Bay City,” confirms that Plaintiff has no evidence
that any of Defendant’s employees accessed Plaintiff’s servers. Grecko Dep. 12, 21, 25. In his
deposition, the gentleman was asked:
Q: Are you aware of any evidence, do you have any fact that you could point to
to say that [Ms. Condon] actually accessed the Dice servers in Bay City,
Michigan after she left the company?
A: No, there’s no proof I can give you saying here’s a document to say Amy did
X, Y, Z.
Q: And there’s no record or any — anything that would indicate that Amy made
some type of unauthorized access the Dice system after she left her
employment?
A: Well, as I explained earlier to you, that there’s no way for me to tell. . . .
Q: So if Amy were to deny that she ever did that, that she ever accessed the Dice
server [after] she left her employment, you would have no way to disprove
that; is that fair?
A: That’s fair.
-38-
Greko Dep. 21, 25. Because there is no evidence that Defendant accessed Plaintiff’s servers,
Defendant is entitled summary judgment on count four of the second amended complaint.
Against this conclusion, Plaintiff writes that it is not Ms. Condon but Mr. Narowski who
accessed Plaintiff’s servers. Pl.’s Resp. 6. (Mr. Narowski is not mentioned in either the original
complaint, the first amended complaint, or the second amended complaint.) Plaintiff attaches an
email Mr. Narowski sent to another alarm company, Doyle Security, that was converting from
Plaintiff’s software to Defendant’s system. Pl.’s Resp. Ex. E, at 4. “I can do a gotoassist session
with you,” Mr. Narowski wrote, “and we can login on the DICE server to find out if that works
for you.” Id.
In isolation, this email appears to support Plaintiff’s argument. Yet as Judge Learned
Hand cautioned, “There is no surer way to misread any document than to read it literally.”
Guiseppi v. Walling, 144 F.2d 608, 624 (2d Cir.1944) (L.Hand, J., concurring).
Explaining what the reference to a “dice server” meant, Mr. Narowski explains that it was
shorthand for the Doyle Security server running Plaintiff’s software during the conversion
process — not one of Plaintiff’s servers, elaborating:
During the phase of the conversion process where the customer is running the
Dice software on one server in parallel to the Bold software on another server, we
will often call the server running Dice the “Dice Server” and the server running
Manitou the “Bold Server” or the “Manitou Server” even though both servers are
owned by the customer, not Dice or Bold. The “Dice Server” that I was referring
to [in the email Plaintiff relies on] was a server owned by Doyle which was part
of the Doyle computer system that was running Dice software. As far as I am
aware this server was not connected to the Dice computer system in Bay City[,]
Michigan. In my email to Mr. Ritch I was explaining the capability of the
GoToAssist function and I do not recall if I ever accessed the Doyle server
running Dice software using GoToAssist. I have never used GoToAssist to
access any server owned by Dice.
Narowski Supp. Aff. ¶ 4; see also Condon Supp. Aff. ¶ 4 (asserting that she did not use the
GoToAssist function to access Dice servers). Plaintiff offers no evidence to dispute this. On the
-39-
contrary, as noted, Plaintiff acknowledges that it does not know whether Defendant has ever
accessed Plaintiff’s servers.
Defendant is entitled to summary judgment on count four of the second amended
complaint.
IV
Accordingly, it is ORDERED that Defendant’s motion for summary judgment (ECF No.
61) is GRANTED.
Is further ORDERED that the motion to bar plaintiff from presenting damages evidence
(ECF No. 49), motion in limine (ECF No. 65), motion to strike (ECF No. 86), motion for
sanctions (ECF No. 88) and motion for continuance (ECF No. 92) are DENIED AS MOOT.
Is further ORDERED that the second amended complaint is DISMISSED WITH
PREJUDICE.
Dated: October 25, 2012
s/Thomas L. Ludington
THOMAS L. LUDINGTON
United States District Judge
PROOF OF SERVICE
The undersigned certifies that a copy of the foregoing order was served
upon each attorney or party of record herein by electronic means or first
class U.S. mail on October 25, 2012.
s/Tracy A. Jacobs
TRACY A. JACOBS
-40-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?