General Motors LLC et al v. Dorman Products, Incorporated et al

Filing 25

ORDER Denying Defendants' 20 Partial Motion to Dismiss Plaintiffs' Second Amended Complaint. Signed by District Judge Victoria A. Roberts. (LVer)

Download PDF
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION GENERAL MOTORS LLC., ET AL., Plaintiffs, v. Case No.: 15-12917 Honorable Victoria A. Roberts DORMAN PRODUCTS, INC., ET AL., Defendants. __________________________________/ ORDER DENYING DEFENDANTS’ PARTIAL MOTION TO DISMISS PLAINTIFFS’ SECOND AMENDED COMPLAINT [DOC. 20] I. INTRODUCTION In August 2015, Plaintiffs General Motors LLC and GM Global Technology Operations LLC (“Plaintiffs” or “GM”) filed suit against Defendants Dorman Products Inc. (“Dorman”) and Electronics Remanufacturing Company LLC (“ERC”; collectively “Defendants”), alleging copyright infringement under the Copyright Act, 17 U.S.C. 101 et seq., and unlawful circumvention under the Digital Millennium Copyright Act, 17 U.S.C. 1201 et seq. In September 2016, this Court granted in part Defendants’ Motion to Dismiss Plaintiffs’ Amended Complaint because the complaint did not meet Rule 12(b)(6)’s plausibility standards. The Court also granted Plaintiffs an opportunity to cure the deficiencies. Plaintiffs submitted a Second Amended Complaint in October, adding two more counts (trade secret misappropriation and unlawful trafficking under the Digital Millennium Copyright Act). 1 Defendants filed another Motion to Dismiss, currently before this Court, seeking to dismiss Count I (copyright infringement) with respect to four out of Plaintiffs’ five copyrighted works, and Count II (illegal circumvention of security measures) in its entirety. Defendants’ Partial Motion to Dismiss Plaintiffs’ Second Amended Complaint (ECF No. 20) is DENIED. II. FACTUAL BACKGROUND For the purposes of a Rule 12(b)(6) motion, “the complaint is viewed in the light most favorable to the plaintiff, the allegations in the complaint are accepted as true, and all reasonable inferences are drawn in favor of the plaintiff.” See Bassett v. Nat'l Collegiate Athletic Ass'n, 528 F.3d 426, 430 (6th Cir. 2008). Plaintiffs, automobile manufacturers, have registered valid copyrights in the software and computer files which run on the control modules installed in their vehicles, and allege that Defendants are illegally stealing and reselling this software. (Plaintiffs include copies of five of their copyright registrations as an exhibit with their complaint; it may be considered as part of the pleading for purposes of a motion to dismiss. See Commercial Money Ctr., Inc. v. Illinois Union Ins. Co., 508 F.3d 327, 335 (6th Cir. 2007) (“documents attached to the pleadings become part of the pleadings and may be considered on a motion to dismiss.”)) GM alleges that Defendants Dorman and ERC worked together to violate copyright law by: (1) illegally stealing GM’s copyrighted software; and (2) installing it into blank control modules, and then reselling the modules to the general public, allowing users to avoid paying GM for the software. GM believes that Dorman purchases blank 2 control modules from an authorized GM distributor and then sends these modules to ERC. Individuals associated with ERC created accounts on websites owned by GM, which allow paid subscribers to access GM software. ERC copies this software from GM’s websites in violation of user agreements. GM says ERC then programs Dorman’s modules with unauthorized and infringing copies of GM’s copyrighted software and sends the programmed modules back to Dorman, which resells them to the general public, advertising them as “pre-programmed.” Dorman also manufactures, advertises, and sells a product called a “Software Transfer Tool.” GM alleges this tool allows users to access, copy, and transfer GM’s copyrighted software to other modules, circumventing GM’s technological protection measure in violation of law. GM acquired both a pre-programmed module and a Software Transfer Tool from Dorman. By inspecting and testing the module, GM confirmed that it contained an unauthorized copy of GM software, covered by copyright registration number TXu-1917-502. By testing the Software Transfer Tool, GM confirmed that it allows users to bypass security measures to illegally transfer copyrighted software. III. Legal Standard A complaint must contain “a short and plain statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). Defendants seek to dismiss the majority of Count I and the entirety of Count II under Fed. R. Civ. P. 12(b)(6). To survive a 12(b)(6) motion to dismiss, “a complaint must contain sufficient factual matter, accepted as true, to state a claim that is plausible on its face.” R.S. Scott Associates, Inc. v. Timm Const. Co. LLC, 2014 WL 7184448 at *3 (E.D. Mich. 2014). “A claim has 3 facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (quoting Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 556, 570). While the court is required to take all factual allegations as true and view the complaint in the light most favorable to the plaintiff, the court does not have to accept legal conclusions as true. Id. Legal conclusions must be backed by plausible factual assertions. To establish a plausible claim of copyright infringement, a plaintiff must allege: 1) ownership of a valid copyright, and 2) copying of constituent elements of the copyrighted work that are original. Ford Motor Company v. Autel US Inc., 2015 WL 5729067 at *3; see also Ross, Brovins & Oehmke, P.C. v. Lexis Nexis Group, 463 F.3d 478, 482, 2006 WL 2639749 (6th Cir.2006). While other courts in this district have held that copyright infringement claims require a heightened pleading standard under National Business Development Services, Inc. v. American Credit Education & Consulting, Inc., 299 F. App’x 509 (6th Cir. 2008), this Court has interpreted National Business as consistent with the plausibility standard set forth in Twombly and Iqbal. Accordingly, the “Twiqbal” standard governs; the two elements of a copyright infringement claim must have facial plausibility as described in Ashcroft, supra. With regard to the illegal circumvention claim, 17 U.S.C. 1201(a)(1)(A) provides that “no person shall circumvent a technological measure that effectively controls access to a work protected under [copyright law].” No courts within the Sixth Circuit have analyzed the sufficiency of a pleading under this provision yet. IV. Analysis 4 A. Deficiencies In Plaintiffs’ Original Pleading This Court previously found that Plaintiffs’ copyright infringement claim was deficient in that it “fail[ed] to forge any sort of connection between [Plaintiffs’] list of six copyrighted works and the control modules installed in Plaintiffs’ vehicles.” While Plaintiffs alleged generally that Defendants infringed on copyrighted software by installing it into control modules, they failed to identify specifically how the six mentioned copyrights were involved in Defendants’ actions. Without further clarification, “a party could plead the first element of a claim of copyright infringement merely by citing to a laundry list of copyright registrations…without any effort to identify which of the party’s copyrighted works were involved in the defendant’s allegedly infringing activities.” Next, this Court agreed with Defendants that screenshots taken of Defendant Dorman’s website, where Dorman describes modules as “pre-programmed” with a “plug-and-play design,” were insufficient to support a plausible inference that Defendants had pre-programmed the modules with Plaintiffs’ copyrighted software. The Court found that Plaintiffs’ allegation that they purchased a module from Dorman and found that it contained an unauthorized copy of Plaintiffs’ copyrighted software was sufficient to support a plausible inference that Defendants copied the protected software. Finally, this Court found that Plaintiffs’ claim of unlawful circumvention of a technological protection measure was deficient because Plaintiffs alleged that their technological protection measure protected access to their vehicle control modules, not to their copyrighted software or any other works protected by copyright. 5 The Court granted Plaintiffs leave to amend their complaint in order to cure these deficiencies, bringing us to Defendants’ current Motion to Dismiss Plaintiffs’ Second Amended Complaint. B. Revisions in Second Amended Complaint Defendant seeks to dismiss Count I with respect to four out of the five copyright registrations provided by Plaintiffs. Defendants say Plaintiffs did not cure the deficiencies in their first pleading: they still fail to connect the copyright registrations to the control modules at issue. Defendants seek to dismiss Count II in its entirety on the grounds that Plaintiffs’ allegations regarding the Software Transfer Tool still fail to establish a plausible inference that Defendants themselves circumvented any of Plaintiffs’ technological measures--even if they did create and sell a tool that allows others to do so. a. Count One: Copyright Infringement In their first complaint, Plaintiffs merely provided a list of six copyright registrations, then concluded that Defendant Dorman had offered to sell modules with GM’s software. This Court asked Plaintiffs to cure this deficiency by specifying which of their copyrighted works are installed on control modules found in their vehicles. Plaintiffs complied by removing one of the registrations named in their original pleading, and clarifying that the remaining five copyright registrations cover software that is installed on GM control modules. Defendants claim that Plaintiffs are required to allege specifically which software is associated with which copyright registrations. Plaintiffs did so for one copyright registration: TXu-1-917-502. This covers the software for GM’s Transmission Electro- 6 Hydraulic Control Module. Defendants’ say Plaintiffs’ failure to specify what software is covered by the other four registrations is fatal to their allegations of infringement. However, Defendants cite no legal authority, other than Twombly and Iqbal, to suggest that a software copyright infringement claim requires Plaintiffs to plead “detailed factual allegations,” not typically required at the pleading stage. Twombly at 555. On the contrary, “relevant case law counsels a court to view the individual allegations in [the] context of the whole complaint.” R.S. Scott Assocs., Inc. v. Timm Const. Co. LLC, 2014 WL 7184448 at *5 (E.D. Mich. 2014). And “determining whether a complaint states a plausible claim for relief [is] … a context-specific task that requires the reviewing court to draw on its judicial experience and common sense.” Ashcroft at 679. Plaintiffs have shown that one of their copyright registrations (TXu-1-917-502) covers software installed on a module sold by Defendant Dorman. Just because they cannot yet show that Defendants have copied software covered by the other four copyright registrations does not mean that allegations regarding those four registrations are insufficiently plausible to survive a motion to dismiss. Plaintiffs went above and beyond the plausibility standard required for the TXu-1-917-502 copyright registration-but that doesn’t obligate them to meet that same heightened standard for the other four copyrights. Plaintiffs are not required to continue attempting to purchase modules from Dorman until they acquire one that corresponds to each copyrighted work. Viewed in the context of the complaint as a whole, and using common sense, it is plausible to infer that, if the software covered by TXu-1-917-502 was found on a Dorman module, then it is more likely that software covered by GM’s other copyright registrations may also be found on additional Dorman modules. “The plausibility standard “does not impose a 7 probability requirement at the pleading stage; it simply calls for enough fact to raise a reasonable expectation that discovery will reveal evidence of illegal [conduct].”” Gabay v. Park W. Galleries, Inc., 2010 WL 5391464, at *4 (E.D. Mich. 2010) (quoting Twombly, 550 U.S. at 556). Despite not pleading in detail that the other four GM copyright registrations cover software found on Dorman modules, Plaintiffs allege enough facts to raise a reasonable expectation that discovery will reveal Dorman modules containing more of GM’s copyrighted software. Defendants’ motion to dismiss Count I with respect to four out of five of Plaintiffs’ registered copyrights is denied. b. Count Two: Unlawful Circumvention Plaintiffs allege that Dorman’s production and distribution of their Software Transfer Tool violates the provision of the Digital Millennium Copyright Act. It provides “no person shall circumvent a technological measure that effectively controls access to a work protected under [copyright law].” 17 U.S.C. 1201(a)(1)(A). This Court previously found that Plaintiffs’ allegations were deficient because the technological measures cited in Plaintiffs’ complaint protected access to GM control modules, not to Plaintiffs’ copyrighted software. Plaintiffs attempt to remedy this deficiency by alleging in their Second Amended Complaint that “GM uses a technological protection measure to protect access to the software contained on its vehicle control modules.” Specifically, Plaintiffs allege that GM uses a technological protection measure or “Security Access” that “includes a softwarebased lock to effectively control access to (and unauthorized programming of) original GM software that is installed on vehicle control modules in GM vehicles.” The Security 8 Access lock is “designed to prevent people from accessing GM’s software contained on the module and making unauthorized copies of it.” Plaintiffs believe that “Defendants have defeated and are defeating this security measure and accessing the software contained on the modules in order to program the modules with unauthorized copies of GM’s copyrighted vehicle control software” either by “making an illegal copy of the software-based security key” or by otherwise “hacking through or circumventing” the software-based lock to gain access to the module’s software. Plaintiffs allege that the tool “circumvents GM’s technological protection measure so that Service Technicians and other users of the tool can access, copy, and transfer [GM]’s copyrighted software and data files contained on [GM]’s vehicle modules.” Defendants seek to dismiss this claim on the grounds that Plaintiffs allegations involving the Software Transfer Tool essentially accuse Defendants not of illegally circumventing the technological protection measure themselves, but of creating a device that allows others to do the circumventing. In Defendants’ view, this is not a violation of 17 U.S.C. 1201(a)(1)(A), and the allegations regarding the Software Transfer Tool are better suited to Count III (Trafficking in Illegal Means for Circumvention of Security Measures). While the allegations regarding the Software Transfer Tool also support Count III, it is not so far-fetched for this Court to infer that Defendants themselves must have also circumvented GM’s technological measures at some point. Taken as true and viewed in the context of the complaint as a whole, Plaintiffs’ factual allegations do support a claim that Defendants must have circumvented GM’s Security Access feature-- whether 9 during the development and distribution of the Software Transfer Tool, or prior to that, when Defendants were allegedly copying the software onto blank modules themselves. Courts within this District have found that courts may view a complaint as a whole, considering all the factual allegations contained in the complaint (not just under one count), in determining whether a plausible claim for relief has been established. See In re: Packaged Ice Antitrust Litig., 723 F. Supp. 2d 987, 1005-06 (E.D. Mich. 2010); see also Empire Home Services, L.L.C. v. Empire Iron Works, Inc., 2006 WL 2269507 at *4 (E.D. Mich. 2006). Plaintiffs’ factual allegations are somewhat disorganized. But considering the allegations under Count II in conjunction with those under Count I’s copyright infringement claim, they do constitute a reasonable expectation that discovery will reveal that Defendants circumvented GM’s technological protection measures at some point. Defendants’ motion to dismiss Count II is DENIED. V. Conclusion When considering a motion to dismiss, a court is required simply to use its common sense and experience to determine if plaintiffs allege sufficient facts to create a plausible claim for relief. A claim is plausible if the court can draw a reasonable inference that the defendant is liable for the misconduct alleged. See Ashcroft, supra. Although Plaintiffs have not pled with specificity the details of how their software was allegedly copied, their factual allegations, taken as true and viewed both in a light most favorable to the Plaintiffs and in the context of the complaint as a whole, are sufficient to create a reasonable inference that Defendants are liable for circumventing GM’s 10 technological protection measures and infringing upon GM’s copyrighted software. Discovery in this case may answer any remaining questions. Defendants’ motion is DENIED. S/Victoria A. Roberts Victoria A. Roberts United States District Judge Dated: March 1, 2017 The undersigned certifies that a copy of this document was served on the attorneys of record by electronic means or U.S. Mail on March 1, 2017. s/Linda Vertriest Deputy Clerk 11

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?