State Bank of Bellingham v. BancInsure, Inc.
Filing
121
ORDER granting 76 Motion for Summary Judgment; denying 88 Motion for Summary Judgment; granting in part and denying in part 15 Motion for Partial Summary Judgment. Plaintiff shall submit, within ten days of the date of this Order an affidavit and documentation of its reasonable attorneys fees and costs associated with bringing its Motion for Partial Summary Judgment.(Written Opinion) Signed by Judge Susan Richard Nelson on 09/29/2014. (SMD)
UNITED STATES DISTRICT COURT
DISTRICT OF MINNESOTA
State Bank of Bellingham,
Case No. 13-cv-0900 (SRN/JJG)
Plaintiff and Counterclaim
Defendant,
v.
MEMORANDUM OPINION
AND ORDER
BancInsure, Inc.,
Defendant and Counterclaim
Plaintiff.
Jonathan M. Bye and Bryan R. Freeman, Lindquist & Vennum, PLLP, 4200 IDS Center,
80 South Eighth Street, Minneapolis, MN 55402, for Plaintiff.
Joseph A. Nilan, Mark J. Johnson, T. James Power, and Joshua A. Dorothy, Gregerson,
Rosow, Johnson & Nilan, Ltd., 650 Third Avenue South, Suite 1600, Minneapolis, MN
55402, for Defendant.
SUSAN RICHARD NELSON, United States District Judge
I.
INTRODUCTION
This matter is before the Court on Plaintiff State Bank of Bellingham’s Motion for
Partial Summary Judgment, for Attorney’s Fees and for Punitive Damages [Doc. No. 15], as
well as the parties’ cross-motions for summary judgment [Doc. Nos. 76, 88]. For the
reasons stated below, the Court grants in part and denies in part Plaintiff’s Motion for Partial
Summary Judgment [Doc. No. 15], grants Plaintiff’s Motion for Summary Judgment [Doc.
No. 76], and denies Defendant BancInsure Inc.’s Motion for Summary Judgment [Doc. No.
88].
II.
BACKGROUND
A.
The Parties and the Bond
Plaintiff is a “Minnesota state bank with five employees and one location in
Bellingham, Minnesota.” (Carman Decl. [Doc. No. 80], ¶ 2.) Defendant is an insurance
company that is incorporated in Oklahoma. (Compl. [Doc. No. 1], ¶ 5; Amended Answer
and Counterclaim [Doc. No. 36], ¶ 5.) In October 2010, Defendant issued Financial
Institution Bond No. FIB0011607 (the “Bond”) to Bellingham Corporation, with coverage
effective from October 17, 2010, to October 17, 2013. (Bye Decl. dated April 25, 2014
[Doc. No. 79] (“Second Bye Decl.”), Ex. A (BancInsure Financial Institution Bond), at
1661.) Plaintiff is a named insured on the Bond. (Id. at 168.) Under the Bond, Defendant
agrees to indemnify Plaintiff in various circumstances, collectively referred to as “Insuring
Agreements,” including—relevant to this case—in the case of “computer systems fraud.”
(Id. at 166.) Under that provision, referred to as “Insuring Agreement (H)”:
Loss resulting directly from a fraudulent
(1)
entry of Electronic Data or Computer Program into, or
(2)
change of Electronic Data or Computer Program within
any Computer System operated by the Insured, whether owned or leased, or
any Computer System identified in the application for this Bond, or a
Computer System first used by the Insured during the Bond Period, provided
the entry or change causes
(1)
property to be transferred, paid or delivered,
1
Many of the exhibits in this case consist of documents with Bates-labels beginning
with “BI_000.” The Court will omit all but the final numerical digits from its citations to
these page numbers.
2
(2)
an account of the Insured or of its customer to be added, deleted,
debited or credited, or
(3)
an unauthorized account or a fictitious account to be debited or
credited.
In this Insuring Agreement (H), fraudulent entry or change shall include such
entry or change made by an employee of the Insured acting in good faith
(1)
on an instruction from a software contractor who has a written
agreement with the Insured to design, implement or service programs
for a Computer System covered by this Insuring Agreement (H), or
(2)
on an instruction transmitted by Tested telex or similar means of
Tested communication identified in the application for this Bond
purportedly sent by a customer, financial institution, or automated
clearing house.
(Id. at 173.) Coverage under Insuring Agreement (H) provides a single loss limit of liability
of $500,000, with a $5,000 deductible. (Id. at 166.)
The Bond also includes numerous exclusions. Relevant to the present motions,
Section 2 of the Bond states that it “does not cover”:
....
(h)
loss caused by an Employee, except when covered under Insuring
Agreement (A) or when covered under Insuring Agreement (B), (C) or
(R) and resulting directly from misplacement, mysterious
unexplainable disappearance or destruction of or damage to Property;
....
(bb)
under Insuring Agreements (H), (I), (J), (K), (L), (M), (N) and (O), in
addition to all of the other Exclusions
....
(4)
loss resulting directly or indirectly from theft of confidential
information,
3
....
(12)
loss resulting directly or indirectly from
(a)
mechanical failure, faulty construction, error in design,
latent defect, fire, wear or tear, gradual deterioration,
electrical disturbance or electrical surge which affects a
Computer System,
(b)
failure or breakdown of electronic data processing
media, or
(c)
error or omission in programming or processing,
....
(17)
loss caused by a director or Employee of the Insured or by a
person in collusion with any director or Employee of the
Insured . . . except when loss is caused by an Employee and
covered under Insuring Agreement (L) or (M) . . . .
(Id. at 186, 188.) Section 5 of the Bond requires the following in the event of a loss:
(a)
At the earliest practicable moment, not to exceed sixty (60) days, after
discovery of loss, the Insured shall give the Company notice of the
loss.
(b)
Within 6 months after such discovery, the Insured shall furnish to the
Company proof of loss, duly sworn to, with full particulars.
....
(Id. at 190.) Finally, Section 7 states:
....
(d)
Upon the Company’s request and at reasonable times and places
designated by the Company the Insured shall
(1)
submit to examination by the Company and subscribe to the
same under oath,
4
(2)
(3)
(e)
produce for the Company’s examination all pertinent records,
and
cooperate with the Company in all matters pertaining to the
loss.
The Insured shall execute all papers and render assistance to secure to
the Company the rights and causes of action provided for in this
Section 7. The Insured shall do nothing after discovery of loss to
prejudice such rights or causes of action.
(Id. at 191.)
B.
Wire Transfers at the Bank
The loss at issue stems from a fraudulent wire transfer. At the time the loss occurred,
Plaintiff made its wire transfers through the Federal Reserve’s FedLine Advantage Plus
system (“FedLine”). (Carman Decl. ¶ 4.) Plaintiff used a desktop computer that was
connected to a Virtual Private Network device (“VPN”) provided by the Federal Reserve.
(Id.) The VPN was both a modem and an encryptor. (Id.) It encrypted the information
entered on the computer and transmitted it over the internet to the Federal Reserve, where
the information was then decrypted. (Id.) In order to complete a wire transfer on FedLine,
a user had to enter an authorized user name and three passwords. (Id. ¶ 5.) One of the
passwords was provided by a security token issued by FedLine that had to be inserted into a
USB port on the computer. (Id.) The other two passwords were typed in by the user. (Id.)
And, although it was not required by FedLine, wire instructions had to be verified by entry
of a second user name and set of passwords. (Id.)
5
C.
The Day Before the Loss
On October 27, 2011, one of Plaintiff’s employees, Sharon Kirchberg, accessed
FedLine in order to complete a wire transfer. (Nilan Aff. [Doc. No. 90], Ex. 4 (Kirchberg
Dep. 49:2–6).) Ms. Kirchberg’s token, password, and pass phrase, as well as the token,
password, and pass phrase of another employee, were used to complete the transfer. (See
id., Ex. 4 (Kirchberg Dep. 49:13–53:15).) When Ms. Kirchberg left the Bank for the day,
she left both tokens in the computer and left the computer running. (Id., Ex. 4 (Kirchberg
Dep. 53:18–54:13).)
D.
The Loss
On October 28, Ms. Kirchberg arrived at work and accessed Fedline’s Account
Information Management application, which shows Plaintiff’s account balance with the
Federal Reserve. (Second Bye Decl., Ex. H (Proof of Loss), at 444.) At approximately 8:12
a.m. CST, she noticed that $940,000 had been transferred out of the bank using Fedwire
Funds, which is part of FedLine. (Id.) She began investigating the entry and discovered
that someone had attempted to initiate two wire transfers from a Demand Deposit Account
at the bank to two different banks in Poland. (Id. at 444–45.) The first transfer, to a
Citibank account in Warsaw, was in the amount of $485,000 and was initiated at 7:12 a.m.
CST (Id. at 444.) That transfer was completed at 7:25 a.m. CST using the user name and
passwords of Ms. Kirchberg and one other employee. (Id. at 444–45.) However, neither of
those employees authorized or verified the transfer or had access to FedLine at the time of
the transfer. (Id. at 445.) The second transfer, to an ING Bank account in Katowice, was in
the amount of $455,000 and was initiated at 7:21 a.m. CST and completed at 7:25 a.m.
6
CST. (Id.) The same user names and passwords were used, but, again, neither employee
even had access to FedLine at the time of the transfer. (Id.) Both transferee accounts were
in the name of Markus Vorreas. (Id.)
Ms. Kirchberg immediately attempted to reverse the wire transfers using FedLine.
(Id.) However, shortly after 8:00 a.m., Plaintiff’s internet service provider experienced a
distributed denial-of-service attack (“DDoS”), which disabled internet service near Plaintiff.
(Id.) Accordingly, Ms. Kirchberg was unable to electronically request reversal of the
transfers. (Id.) She then called the Federal Reserve and requested the reversals, but her
request was denied. (Id.)
On October 31, the Federal Reserve notified the two intermediary institutions for the
transfers that the transfers were fraudulent. (Id. at 446.) While the intermediary institution
for the second transfer was able to revert the transferred funds to Plaintiff, the $485,000 that
was transferred to the Citibank account in Warsaw has never been credited or reverted. (Id.)
E.
The Investigation
Plaintiff notified Defendant of the loss on October 28—the day it occurred—by
faxing a copy of the transaction details of the two transfers. (See Nilan Aff., Ex. 21 (Fax
Transmittal).) On November 3, BancInsure acknowledged receipt of Plaintiff’s notice and
advised Plaintiff that the claim had been assigned to Karbal Cohen Economou Silk Dunne
(“KCESD”) for investigation. (Dorothy Aff. [Doc. No. 22], Ex. 5 (Letter), at 272.) In a
letter dated November 9, KCESD reminded Plaintiff of its obligation under Section 5(b) of
the Bond to provide Defendant with “‘proof of loss, duly sworn to, with full particulars,’”
within six months of discovering the loss. (Nilan Aff., Ex. 22, at 381.) The letter included a
7
Proof of Loss form and requested that the proof of loss include documentation of the loss,
“full details concerning the transactions involved,” “as detailed a narrative as possible
regarding the circumstances surrounding the Bank’s discovery of [the] loss,” contact
information for any law enforcement authorities investigating the matter, pleadings in any
legal proceedings that were initiated, and any other relevant documents. (Id. at 382.) The
letter also requested that the proof of loss “detail the Bank’s security procedures” and that
Plaintiff provide copies of the transaction records involving the transfers at issue. (Id.)
Defendant reserved the right to make further inquiries and requests. (Id.)
Defendant received Plaintiff’s Proof of Loss, in which Plaintiff claimed a net loss of
$485,100, on December 27, 2011. (Second Bye Decl., Ex. H (Proof of Loss), at 442–43.)
In the “Details of Loss” section of the form, Plaintiff stated that “an unknown individual or
individuals gained unauthorized access to the FedLine Advantage Plus service on the State
Bank of Bellingham’s computer systems and fraudulently authorized two wire transfers.”
(Id. at 444.) Plaintiff went on to describe Ms. Kirchberg’s discovery and attempted reversal
of the transfers. (See id. at 444–45.) Plaintiff stated that, in addition to the Federal Reserve,
it had notified various law enforcement agencies and that the FBI had examined Plaintiff’s
computers but Plaintiff was not aware of the status of any investigations. (Id. at 446.) As
for its security measures, Plaintiff provided as follows:
. . . Internally, the Bank follows standard security procedures with respect to
user names and passwords for its systems in accordance with the Federal
Reserve Banks’ Password Practice Statement. All systems on the internal
network have Symantec Small Business Endpoint Protection 12.5, with not
only antivirus and antispyware features but a desktop firewall and intrusion
detection/protection. This security suite is centrally managed by the network
server for definitions and threat management and updates automatically.
8
Additionally, the native Windows firewall is activated on computers on the
internal network and the computers are configured to limit the software that
can be installed on the device.
As for external threats, the Bank uses a Sonic WALL NSA 240 firewall. The
firewall has Gateway Antivirus and Gateway Anti-Spyware inspecting all
traffic before passing through the gateway and uses Gateway Intrusion
Protection. This security suite likewise is updated automatically on a daily
basis, meaning no user accesses or modifies the firewall or the settings of the
software overall.
The Bank also has surveillance cameras on premises. The recordings of
October 27 and October 28 show no one entered the Bank between the time it
closed on October 27 and the time employees returned on the morning of
October 28.
(Id. at 446–47.) Plaintiff attached a print-out of its account balance activity with the Federal
Reserve banks as of 8:12 a.m. CST on October 28, 2011; the transaction details for each of
the two wire transfers; a letter from Plaintiff’s internet service provider explaining the
service outage on October 28, 2011; communications from the intermediary institutions
involved in the transfers; and contact information for the law enforcement authorities that
Plaintiff had contacted. (See id. at 448–59.)
In early February 2012, KCESD requested that Plaintiff and its counsel participate in
a conference call or face-to-face meeting to discuss the loss, but Plaintiff’s counsel asked
that any questions instead be presented in writing. (Nilan Aff., Ex. 23 (Letter), at 527.)
Accordingly, on February 6, KCESD provided Plaintiff’s counsel with a list of questions
and document requests regarding Plaintiff’s security procedures, Fedline, proof of coverage,
Plaintiff’s computer system, and Plaintiff’s investigation of the loss. (See id. at 528–32.)
Plaintiff’s counsel responded on February 29, providing answers to the questions, a letter
9
from the FBI to Ms. Kirchberg, and surveillance videos. (Id., Ex. 25 (Letter).) In response
to the questions regarding proof of loss, Plaintiff stated as follows:
SBB does not know the exact method by which the cyber thieves initiated the
transfers but believe[s] that since access could be achieved only through a
bank computer and Federal Reserve-provided hardware and software, hackers
may have somehow installed a computer program, e.g., a Trojan, worm or
other malware, that did keystroke logging or otherwise modified, deleted or
stole data in order to gain information necessary for the transfers or such other
steps to enable them to obtain that information and initiate the transfers.
....
SBB does not know the exact method by which the cyber thieves initiated the
transfers but the customer account attempted to be used for the transfers had
reoccurring wire transfers with a particular bank. To accomplish the
transfers, the thieves would have to fraudulently enter or change data or
information on SBB’s computers regarding that client, including such items
as the intermediary bank, the receiving bank and account numbers.
(Id. at 591–92.) Plaintiff indicated that it had not done a forensic analysis of its computer
system, but that the FBI had. (Id.) In addition, Plaintiff noted that in the ninety days
preceding the fraudulent transfers, there may have been some automatic updates in the
hardware and software but that Plaintiff had not initiated any updates. (Id. at 593.)
On May 9, 2012, Defendant issued its preliminary coverage evaluation of Plaintiff’s
claim. (Id., Ex. 26 (Letter).) Defendant noted that Plaintiff had not conducted a forensic
investigation of the loss and that the government would not provide the results of its
investigation to Defendant. (Id. at 792.) Accordingly, Defendant concluded that there was
“insufficient evidence” in the record before it to determine whether the loss was covered by
the Bond and that it was necessary to hire a forensic computer specialist to conduct an
investigation. (Id. at 787.)
10
On May 15, Defendant’s counsel informed Plaintiff’s counsel that it had retained
forensic computer specialist Mark Lanterman of Computer Forensic Services, Inc. (“CFS”),
and asked Plaintiff to request from the FBI the forensic images it had taken during its
investigation. (Id., Ex. 27 (Letter), at 825.) Plaintiff’s counsel stated that they would not
request the FBI’s images “unless and until appropriate confidentiality agreements necessary
to ensure compliance with federal banking and privacy laws ha[d] been executed.” (Id., Ex.
28 (E-mail Exchange), at 840.) Plaintiff’s counsel also expressed “dismay[]” that it had
taken Defendant five months to issue its preliminary coverage decision. (Id.) In response,
Defendant’s counsel noted that Defendant had been “exhausting all attempts to obtain
analysis and results concerning th[e] incident from other sources who may have conducted
investigations closer in time to the incident.” (Id. at 839.) He stated that, rather than
conducting its own investigation, Defendant could simply have determined that Plaintiff had
not met its burden to establish coverage or waited until the FBI concluded and released its
investigation. (Id.)
On May 21, Plaintiff’s counsel informed Defendant’s counsel that he had recently
learned that Plaintiff’s outside IT provider, Kiel Zinter, had sent documents to the FBI on
November 15, including logs and reports showing that the computer had been infected with
a virus, and information related to the DDoS attack. (Id., Ex. 16 (Letter), at 893–94.) He
forwarded those documents to Defendant’s counsel on May 23 and apologized for not
providing them sooner. (Id.) On June 13, Defendant’s counsel acknowledged receipt of the
documents but stated that it would still be necessary for Mr. Lanterman to have access to the
FBI’s forensic images. (Id., Ex. 29 (Letter), at 1073.) One week later, Plaintiff’s counsel
11
informed Defendant’s counsel that it had the hard drive in the condition it was in at the time
of the loss. (Id., Ex. 30 (E-mail), at 1288.) Plaintiff agreed to provide the hard drive to Mr.
Lanterman for examination under certain conditions, including after a confidentiality
agreement was executed. (Id., Ex. 31 (E-mail).)
Mr. Lanterman received the hard drive on August 8, and issued his report on October
10. (Id., Ex. 32 (Forensic Services Report), at 1399.) His report states the following:
Introduction of Zeus Virus
The analysis identified an email message, sent to the address
“bellinghambank@farmers.net”, which contained a hyperlink to a malicious
webserver. CFS further determined that this email had been read and the
embedded link clicked on.
....
The user’s action of clicking on the hyperlink ultimately lead to the download
of multiple files associated with the Zeus virus.
....
Understanding the Zeus Virus
....
Once a user accesses the malicious webserver and consequently installs the
virus, Zeus then periodically checks for instructions from the criminal.
Hackers post code to the compromised web servers that is later downloaded
and executed on the victim’s computer. . . .
Zeus often remains dormant until a user accesses a financial services web site.
Once Zeus identifies financial activity, it will then collect confidential data to
include a log of all keystrokes and screenshots. This compromised data is
then transmitted to the hacker.
The hacker then uses this data to initiate illegitimate financial
transactions . . . .
12
....
Anti-virus Software
....
The analysis revealed that [Zeus] was detected on October 13, 2011. Given
[Symantec’s] settings, it is more likely than not that Symantec notified the
user of the infection. The analysis revealed that [Zeus] was quarantined on
October 18, 2011 but the infection was never completely removed by
Symantec Antivirus. Given [Symantec’s] settings, it is more likely than not
that Symantec notified the user of the quarantine. . . . Once [Zeus] executed, it
remained resident, ultimately downloading a rash of subsequent infections
that resulted in the unauthorized ACH transactions. The continued use of the
computer after receiving multiple virus warnings is contrary to generally
accepted computer security practices.
Three additional malicious executable files, downloaded automatically by
[Zeus], still reside on the system. There is no evidence these files were
detected by Symantec. [One of the files] resulted in the download of . . . a
virus. This file . . . was downloaded and launched on October 26, 2011. This
file is considered to be directly responsible for the unauthorized wire
transfers.
....
Symantec Antivirus failed to identify these additional viruses. It was
determined that Symantec Antivirus was configured to complete a full scan
once weekly. Further, Symantec “Proactive Threat Protection” was disabled
due to the fact that it was last updated July 30, 2008. This left the system
vulnerable to viruses created after 2008. . . . Generally accepted security
practices would include daily virus scans and ensuring the virus definitions
are current.
Overview of Prior Infections
Additionally, the system was previously compromised on August 8, 2011.
Symantec Antivirus, however, successfully removed that infection. This
demonstrates that the computer has a history of vulnerabilities due to user
activity. The user(s) was also aware of this compromise after receiving
Symantec’s alert.
13
Computer Usage Patterns
After establishing a chronology for the deployment of the Zeus virus
executable file, CFS further analyzed the system to identify usage patterns
that contributed to the compromise.
As described above, CFS reviewed email activity on the system and was able
to identify the specific message containing the malicious hyperlink. Other
messages within the Outlook Express inbox also suggest that the email
application was being used for purposes other than FedLink. For instance, the
email account was used to order and track company purchases. This is
contrary to generally accepted security practices. The use of email on a
computer that’s purpose is to initiate FedLink transactions resulted in that
system’s compromise. Additionally, CFS determined that messages in the
spam folder had been opened or read. Spam is a typical vehicle for malware.
CFS recovered and analyzed nearly one million URLs from Internet browser
histories on the system. . . . Much of the history was found to relate to activity
other than banking. For example, the user “FedLine” visited Facebook.com
multiple times, with and without private browsing activated, before and after
the initial infection. . . . This is contrary to generally accepted computer
security practices.
CFS also determined that the administrator user accounts, “Administrator”
and “FedLine”, were not password protected. This would have allowed the
virus to execute itself as an administrator without the need of a password.
This is contrary to generally accepted computer security practices.
Conclusions
After a thorough review CFS is able to provide the following conclusions:
• The FedLine computer was used for email and personal activity such
as web browsing.
• The Administrator and FedLine user accounts on the system were not
password protected.
• Symantec Antivirus was configured to warn the user of threats.
• Symantec Antivirus “Proactive Threat Protection” was disabled.
• User activity resulted in the download and execution of the Zeus virus.
• Symantec Antivirus notified the user of the Zeus infection on October
13, 2011 and October 18, 2011. The computer remained in use after
these warnings.
14
• Symantec Antivirus failed to remove the persistent Zeus Trojan in a
timely manner.
• Multiple viruses exist on the system.
(Id. at 1400–06.)
On October 11, as part of its “supplemental phase of its coverage investigation,”
Defendant made eighteen additional document requests of Plaintiff pursuant to Section 7(d)
of the Bond. (Id., Ex. 33 (Letter), at 1392–93.) These requests sought Plaintiff’s policies
relating to FedLine, policies regarding employee training and use of computers, policies
regarding wire transfers, FedLine manuals, anti-virus program manuals, and documents
provided by the Federal Reserve, among other things. (Id.) Plaintiff objected, stating that
Section 7(d) only requires the production of “‘pertinent records,’” and that none of the
requested documents were pertinent to the coverage determination. (Id., Ex. 34 (Letter), at
1427.) On October 19, Defendant sent a letter explaining its position that, especially in light
of Mr. Lanterman’s report, the documents were necessary to determine the “‘direct cause’”
of the loss and whether any exclusions applied. (Id., Ex. 35 (Letter), at 1439–40.) On
November 19, Plaintiff’s counsel reiterated its view that the requested documents were not
relevant to coverage under Insuring Agreement (H) and that it did not intend to provide
them. (Id., Ex. 36 (Letter), at 1490.) However, Plaintiff submitted its responses to the
document requests on December 17, noting that several of the documents were publicly
available or had to be obtained from the FDIC or with the consent of the Federal Reserve.
(Id., Ex. 37 (Letter), at 3088–92.) Plaintiff stated that there was only one document that it
had the ability to release, and that the document could only be released subject to a
confidentiality agreement. (Id. at 3088, 3092.)
15
Defendant issued its coverage decision on March 6, 2013. (Id., Ex. 39 (Letter).)
Defendant determined that the loss was not covered by the Bond based upon the employee
exclusions in Section 2(h) and 2(bb)(17), the exclusion for theft of confidential information
in Section 2(bb)(4), and the exclusion for mechanical breakdown or deterioration of a
computer system in Section 2(bb)(12). (Id. at 3208–09.)
F.
Communications With the Minnesota Department of Commerce
Meanwhile, on October 26, 2012, counsel for Plaintiff sent a six-page letter to the
Department of Commerce (“DOC”), which states in relevant part:
The State Bank of Bellingham has been struggling for close to a year on a
claim under a Financial Institution Bond issued by BancInsure. Kevin
Murphy of the Minnesota Bankers Association is aware of this claim and has
discussed it with the [B]ank. He suggested that the [B]ank consider filing a
complaint with your department. As it appears the Bank is no closer to seeing
this claim resolved than it was months ago, please consider this the Bank’s
formal complaint against BancInsure for its actions and delay in handling the
claim discussed below. . . .
....
This loss occurred and was reported a year ago. Since then, the Bank has
submitted the Proof of Loss and supporting documentation, responded in
detail to follow-up questions and provided a DVD of the premises, provided
copies of information its IT consultant provided the FBI, and even let the
pertinent hard drive out of its possession to allow BancInsure to conduct a
forensic analysis. Now that the analysis is complete and shows that a covered
loss occurred in the method the Bank contended, BancInsure requests
extensive documents that have no bearing on whether the loss is within policy
coverage.
As the foregoing indicates, the Bank is rightfully concerned that these latest
requests are simply another step in an ongoing pattern of delay. And while
the latest letter from BancInsure’s attorney once again seeks to place the
blame for delay on the Bank, the Bank certainly invites the Division or its
investigator to see what BancInsure requested from the Bank and what the
Bank provided in response to those specific requests.
16
We believe BancInsure’s actions in handling this claim are unacceptable and
plainly violate the Minnesota Claims Practices statutes, if not the bad faith
laws. Therefore, the State Bank of Bellingham requests the Commissioner
enter an administrative order fining BancInsure and ordering payment of the
claim to the full extent of the coverage afforded the Bank, together with
interest from the date of loss and legal expenses.
Any assistance you can provide the Bank to conclude this Bond Claim with
BancInsure would be greatly appreciated.
(Bye Decl. dated Oct. 18, 2013 [Doc. No. 18] (“First Bye Decl.”), Ex. A (Letter), at 1, 5–6.)
The DOC forwarded the letter to Defendant on December 19 and asked for a
response. (Dorothy Aff., Ex. 25 (Letter).) On the same day, the DOC sent a letter to
Plaintiff with the following information:
Please take note that the Department’s authority is limited to the
determination of a licensee’s compliance with Minnesota law and/or policy
provisions, where applicable. Our Department cannot compel a company to
make a claim settlement, obtain damages on your behalf, or determine who is
correct in a factual dispute. This authority rests solely with a court of law. To
obtain the remedies you seek, you may have to seek legal counsel.
(Supplemental Nilan Aff. dated Jan. 13, 2014 [Doc. No. 33] (“Supplemental Nilan Aff.”),
Ex. 29 (Letter).)
Defendant responded on January 16, 2013, stating that “[t]he major themes in the
Bank’s complaint to the Department are that BancInsure has unduly delayed the review of
this claim, and that it has not asked pertinent questions in its investigation of the claim.”
(First Bye Decl., Ex. C (Letter), at 1.) Defendant explained its version of events and stated
its belief that the “concerns [were] unfounded” because the delays were due to Plaintiff’s
“withholding of information critical to the investigation,” and that the supplemental
information requests were “directly relevant to BancInsure’s coverage analysis.” (Id. at 1,
17
8.) According to Defendant, “[i]t is clear that the Bank has not submitted the ‘necessary
documentation required from the insured to establish entitlement to payment under a
policy,’” as required under the Minnesota Fair Claims Practices Act. (Id. (quoting Minn.
Stat. § 72A.201, subd. 3(12)).) In a subsequent letter to the DOC, dated March 13, 2013,
Defendant noted that it had issued a supplemental coverage position to Plaintiff on March 6
in which it denied coverage for the Bank’s claim “because of the Bond’s exclusions for loss
caused by an employee, theft of confidential information, and breakdown or deterioration of
computer software systems.” (Id., Ex. F (Letter), at 3.) Defendant also stated:
Although the Bank has been represented by an outside law firm throughout
this process, a second law firm recently informed us that the Bank will now
commence litigation against BancInsure relating to this loss. While we fully
understand the Bank has a right to the assistance of the Department of
Commerce, we believe it is also important to recognize that the Bank is a
sophisticated consumer, and the Department’s work should not be used to
further a litigation strategy.
We respectfully request that the Department at this time either (1) end this
investigation based upon the complete record available, or at least (2) defer
any further consideration until the Bank concludes the lawsuit it now intends
to pursue.
(Id.)
After receiving this letter from Defendant, the DOC closed the file. (See id., Ex. G
(Letter).) In a letter to Plaintiff, it stated:
. . . For our investigation and assessment of this matter, our Department may
only review the information and documentation that has been presented. In
this regard, the evidence does not appear to support our Department’s pursuit
of formal disciplinary action in this matter. Additionally, it is our
understanding that the company has denied the claim based on provisions
contained in the bond and that your company will be [pursuing] litigation to
debate the merits of the provisions cited given the events and circumstances
18
of the loss. It would appear such a forum would be most appropriate for this
dispute.
In light of the above, our Department does not have a sufficient basis to
pursue this matter further and will close our file at this time. Information
from this file will be retained should similar situations arise. Thank you for
bringing this matter to our attention.
(Id.)
G.
This Lawsuit
Plaintiff filed its Complaint in this matter on April 19, 2013, asserting a claim for
breach of contract based on Defendant’s denial of coverage under the Bond. (Compl.
¶¶ 28–32.) Plaintiff seeks an award of damages (including consequential damages),
attorney’s fees, and interest. (Id. ¶ 3.) In its Amended Answer and Counterclaim,
Defendant denies breaching the Bond and asserts numerous affirmative defenses. (See
Def.’s Amended Answer and Counterclaim ¶¶ 31, 34–41.) Defendant also asserts three
counterclaims. In Count I, Defendant seeks “a declaratory judgment that BancInsure owes
no duty under the Bond to provide coverage for or indemnify the Bank for any of its losses
described in the Complaint,” and claims that it is entitled to recover the costs and expenses
associated with the investigation. (Id. ¶ 35.) In Count II, Defendant asserts a claim for
breach of contract based on Plaintiff’s alleged failure to provide a complete and accurate
Proof of Loss and its alleged failure to cooperate with Defendant. (Id. ¶¶ 36–41.)
According to Defendant, this alleged breach of contract bars Plaintiff from recovering any
of the loss it claims. (Id. ¶ 41.) Finally, in Count III, Defendant brings a claim for
malicious prosecution based on Plaintiff’s complaint to the DOC. (Id. ¶¶ 42–46.) Plaintiff
denies these allegations and asserts numerous affirmative defenses. (See Reply to
19
Counterclaims [Doc. No. 9], ¶¶ 31–47, 1–15; Stip. to Amend Answer and Counterclaim
[Doc. No. 37], at 1.)
On October 18, 2013, Plaintiff filed its Motion for Partial Summary Judgment, for
Attorney’s Fees and for Punitive Damages. In that motion, Plaintiff seeks dismissal of
Defendant’s malicious prosecution counterclaim on the grounds that its letter to the DOC
constitutes “public participation” under Minnesota’s Strategic Lawsuits Against Public
Participation (“anti-SLAPP”) statute, Minnesota Statutes § 554.01 et seq. (Pl.’s Mem.
Supporting Mot. for Partial Summ. J., for Attorney’s Fees and for Punitive Damages [Doc.
No. 17] (“Pl.’s Partial SJ Mem.”), at 2.)2 Plaintiff notified the DOC of Defendant’s
counterclaim “alleging that [Plaintiff] did not have the right to seek the assistance of the
[DOC],” and of the pending motion for partial summary judgment. (Supplemental Bye
Decl. dated Jan. 2, 2014 [Doc. No. 32], Ex. J (Letter).) The DOC then informed Defendant
that it “disagrees with your company’s position” and that, “[s]hould your company continue
with this position, [the DOC] may seek to pursue administrative sanctions for violations of
Minn. Stat. § 72A.20, subd. 18 (b), as well as other applicable statutes.” (Id., Ex. K
(Letter).) Defendant argued that its position was that Plaintiff is liable for malicious
2
On February 28, Plaintiff moved to amend its Complaint to add a bad-faith
insurance claim under Minnesota Statutes § 604.18. (Pl.’s Mot. to Amend to Add Claim
Under Minn. Stat. § 604.18 [Doc. No. 44].) This motion was fully briefed by both parties
and heard by the Magistrate Judge on March 31 [Doc. No. 74]. The Magistrate Judge
denied the motion without prejudice and without ruling on the merits based on Plaintiff’s
statement that its arguments on the motion overlapped with its arguments in support of its
summary judgment motion. (Order dated Aug. 6, 2014 [Doc. No. 112], at 1–2.) The
Magistrate Judge noted that the parties could revive their submissions if the disposition of
the summary judgment motions “would favorably affect the outcome of the motion to
amend.” (Id. at 2.)
20
prosecution not simply for contacting the DOC, but rather based on Plaintiff’s continued
request that the DOC order payment of the disputed claim in light of the DOC’s December
19 letter to Plaintiff explaining the DOC’s limited authority. (Supplemental Nilan Aff., Ex.
28 (Letter), at 1–2.) Plaintiff’s motion was heard on January 24.
On April 25, 2014, Plaintiff moved for summary judgment on the remaining
claims—i.e., Plaintiff’s claim for breach of contract and Defendant’s counterclaims for
declaratory judgment and breach of contract. (Pl.’s Mem. in Support of Mot. for Summ. J.
[Doc. No. 78] (“Pl.’s SJ Mem.”), at 1.) On May 9, Defendant also moved for summary
judgment on those claims. (Def.’s Mot. for Summ. J. [Doc. No. 88], at 1.) Both motions
were heard on June 16.
III.
DISCUSSION
“Summary judgment procedure is properly regarded not as a disfavored procedural
shortcut, but rather as an integral part of the Federal Rules as a whole, which are designed
‘to secure the just, speedy, and inexpensive determination of every action.’” Celotex
Corp. v. Catrett, 477 U.S. 317, 327 (1986) (quoting Fed. R. Civ. P. 1). Summary
judgment is proper if, drawing all reasonable inferences in favor of the non-moving party,
there is no genuine issue as to any material fact and the moving party is entitled to
judgment as a matter of law. Fed. R. Civ. P. 56(a); Celotex Corp., 477 U.S. at 322–23;
Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249–50, 255 (1986). A dispute over a
fact is “material” only if its resolution might affect the outcome of the lawsuit under the
substantive law. Anderson, 477 U.S. at 248. A dispute over a fact is “genuine” if “the
21
evidence is such that a reasonable jury could return a verdict for the non-moving party.”
Id.
Although the party moving for summary judgment bears the burden of showing
that the material facts in the case are undisputed, Celotex Corp., 477 U.S. at 323, “a party
opposing a properly supported motion for summary judgment may not rest upon mere
allegation or denials of his pleading, but must set forth specific facts showing that there is
a genuine issue for trial,” Anderson, 477 U.S. at 256. Thus, the movant is entitled to
summary judgment where the nonmoving party has failed “to establish the existence of
an element essential to that party’s case, and on which that party will bear the burden of
proof at trial.” Celotex Corp., 477 U.S. at 322. No genuine issue of material fact exists
in such a case because “a complete failure of proof concerning an essential element of the
nonmoving party’s case necessarily renders all other facts immaterial.” Id. at 323.
A.
Malicious Prosecution
In its partial summary judgment motion, Plaintiff seeks dismissal, under Minnesota’s
anti-SLAPP statute, of Defendant’s counterclaim for malicious prosecution. The antiSLAPP statute was enacted “to ‘protect[] citizens and organizations from civil lawsuits for
exercising their rights of public participation in government.’” Middle-Snake-Tamarac
Rivers Watershed Dist. v. Stengrim, 784 N.W.2d 834, 839 (Minn. 2010) (quoting Act of
May 5, 1994, ch. 566, 1994 Minn. Laws 895, 895)). Under the statute, a party may move
“to dispose of a judicial claim on the grounds that the claim materially relates to an act of
the moving party that involves public participation,” Minn. Stat. § 554.02, subd. 1, and “the
22
responding party has the burden of proof, of going forward with the evidence, and of
persuasion on the motion,” id. § 554.02, subd. 2(2).
Accordingly, once the moving party meets its “minimal burden” of “mak[ing] a
threshold showing that the acts that are ‘materially’ related to the responding party’s claim
are themselves public participation,” Stengrim, 784 N.W.2d at 841, “the court shall grant
the motion and dismiss the judicial claim unless the court finds that the responding party has
produced clear and convincing evidence that the acts of the moving party are not
immunized from liability under section 554.03,” Minn. Stat. § 554.02, subd. 2(3) (emphasis
added). Under that section, “[l]awful conduct or speech that is genuinely aimed in whole or
in part at procuring favorable government action is immune from liability, unless the
conduct or speech constitutes a tort or a violation of a person’s constitutional rights.” Id.
§ 554.03. While the clear-and-convincing-evidence burden is “heavy,” it “is not
insurmountable for parties with meritorious claims.” Stengrim, 784 N.W.2d at 839.
If the moving party prevails, it is entitled to its attorney’s fees and costs associated
with bringing the motion. Minn. Stat. § 554.04, subd. 1. The moving party is also entitled
to actual damages if it can demonstrate that the responding party brought the underlying
claim for purposes of harassment, inhibiting public participation, interfering with the
exercise of constitutional rights, or “otherwise wrongfully injur[ing] the moving party.” Id.
§ 554.04, subd. 2(b). Finally, a court may award punitive damages if the moving party can
satisfy the requirements of Minnesota Statutes section 549.191.3 Id.
3
However, the moving party need not move to amend the pleadings as required
under that section. Minn. Stat. § 554.04, subd. 2(b).
23
Here, the Court finds that Plaintiff has met its minimal burden of showing that its
letter to the DOC constituted public participation, and that Defendant has failed to meet its
higher burden of demonstrating that Plaintiff’s conduct was not immunized from liability.
Accordingly, Plaintiff is entitled to its attorney’s fees and costs related to bringing its
motion for partial summary judgment. However, the Court declines to award Plaintiff
actual or punitive damages.
1.
Public participation
Plaintiff has made a threshold showing that its letter to the DOC, which is the basis
of Defendant’s malicious prosecution claim, constituted public participation. “Public
participation” consists of “speech or lawful conduct that is genuinely aimed in whole or in
part at procuring favorable government4 action.” Minn. Stat. § 554.01, subd. 6. The
Minnesota Court of Appeals has stated that “the use of ‘genuinely’ requires an analysis of
whether the speech was aimed at procuring favorable government action that is not solely
determined by post-litigation statements in which the speaker asserts subjective intent that
the speech was to procure such action.” Freeman v. Swift, 776 N.W.2d 485, 489 (Minn. Ct.
App. 2009).
Here, Plaintiff argues that its letter to the DOC “was aimed solely at procuring
favorable government action in its dispute with BancInsure.” (Pl.’s Partial SJ Mem., at 8.)
In support of its argument, Plaintiff points to its request in the letter for “‘any assistance you
4
“Government” is defined to “include[] a branch, department, agency, official,
employee, agent, or other person with authority to act on behalf of the federal government,
[Minnesota], or any political subdivision of [Minnesota] . . . .” Minn. Stat. § 554.01, subd.
2. There is no dispute in this case that the DOC is encompassed by this definition.
24
can provide the Bank to conclude this Bond Claim with BancInsure,’” (id.), and its request
that the DOC fine Defendant, (Pl.’s Reply Mem. Supporting Mot. for Partial Summ. J., for
Attorney’s Fees, and for Punitive Damages [Doc. No. 28] (“Pl.’s Partial SJ Reply”), at 4).
Defendant, on the other hand, contends that the letter was not “public participation” because
the DOC has no authority to order one of the forms of relief sought by Plaintiff— “payment
of the claim to the full extent of the coverage afforded the Bank.” (Def.’s Mem. in Opp. to
Pl.’s Mot. for Partial Summ. J., for Attorney’s Fees, and for Punitive Damages [Doc. No.
21] (“Def.’s Partial SJ Opp.”), at 22.) According to Defendant, “[t]he nature and purpose of
[Plaintiff’s] speech are the exact opposite of the speech the statute seeks to protect, which is
speech ‘genuinely aimed’ at procuring a result the government audience can legitimately
grant,” and instead Plaintiff’s letter was meant to “coerc[e]” Defendant into paying the
claim. (Id. at 22–23.)
The Court finds that Plaintiff’s letter was aimed at procuring favorable government
action. The letter describes what Plaintiff perceived to be Defendant’s “delay in handling
the claim” in violation of the Minnesota Claims Practices statutes and bad faith laws, and it
plainly states as Plaintiff’s goal the receipt of any assistance the DOC could provide to
conclude Plaintiff’s claim with Defendant. Because the intended result is expressly stated in
the letter and not based solely on Plaintiff’s present statements of past subjective intent, the
Court also finds that it was genuine. Defendant cites to no authority for the proposition that
the government’s inability to provide every form of relief sought precludes Plaintiff from
invoking the anti-SLAPP statute, and the Court has found none. Accordingly, the burden
25
shifts to Defendant to establish clear and convincing evidence that Plaintiff’s actions are not
immune from liability.
2.
Immunity
To meet its burden, the party responding to an anti-SLAPP motion must persuade
the court with clear and convincing evidence—rather than relying on the allegations in its
complaint—that the moving party’s conduct is not immune under Minnesota Statutes
section 554.03. Leiendecker v. Asian Women United of Minn., 848 N.W.2d 224, 226, 233
(Minn. 2014), as modified Sept. 3, 2014. The responding party can do so “by establishing
that the moving party’s conduct or speech was not aimed in whole or in part at procuring
favorable government action, that the conduct or speech constituted a tort, or that the
conduct or speech violated another’s constitutional rights.” Id. at 229. The Minnesota
Supreme Court in Leiendecker v. Asian Women United of Minnesota recently explained the
discrepancy between this standard and the summary judgment standard:
[T]he summary-judgment standard and the statutory framework for
evaluating an anti-SLAPP motion are mutually inconsistent.
For summary judgment motions, a court evaluates the evidence to determine
whether there are any genuine issues of material fact and whether either of the
parties is entitled to judgment as a matter of law. Minn. R. Civ. P. 56.03. An
anti-SLAPP motion, by contrast, requires the court to make a finding about
whether “the responding party has produced clear and convincing evidence
that the acts of the moving party” are not immune. Minn.Stat. § 554.02, subd.
2(3). However, according to the immediately preceding provision, Minn.Stat.
§ 554.02, subd. 2(2), the responding party carries three distinct burdens “on
the motion”: the burden of proof, the burden of production, and the burden of
persuasion. . . . Reading subdivisions 2(2) and 2(3) together, the responding
party bears the burden to persuade the trier of fact—here, the district court—
of the truth of a proposition—here, that the acts of the moving party are not
immune—and if it does not do so, then the court must “grant the motion and
dismiss the judicial claim,” Minn.Stat. § 554.02, subd. 2(3). Under the anti26
SLAPP statutes, therefore, the court is required to dismiss the claim, even in
the face of genuine issues of material fact, if the responding party has failed to
carry its burden of persuasion that the moving party is not immune by clear
and convincing evidence. Under a summary-judgment standard, by contrast,
genuine issues of material fact preclude summary judgment. Thus, the two
standards, which operate differently when genuine issues of material fact
exist, are incompatible with one another.
Id. at 231. Accordingly, the court rejected the Minnesota Court of Appeals’ statement in
Nexus v. Swift that, “if a party brings a motion for summary judgment asserting antiSLAPP immunity, the responding party is only ‘required to produce clear and convincing
evidence in light of the Rule 56 standard for granting summary judgment.’” Id. at 230
(quoting Nexus v. Swift, 785 F.W.2d 771, 782 (Minn. Ct. App. 2010)).5
Defendant argues that Plaintiff’s conduct is not immune under Minnesota Statutes
section 554.03 because it constitutes the tort of malicious prosecution. (See Def.’s Partial
SJ Opp., at 23.) “[T]o state a claim for malicious prosecution a plaintiff must demonstrate
that: (1) the action was brought without probable cause or reasonable belief that the plaintiff
5
Because the Minnesota Supreme Court’s opinion in Leiendecker was issued in
June 2014, the parties briefed the motion using the standard articulated in Nexus. (See
Pl.’s Partial SJ Mem., at 8; Def.’s Partial SJ Opp., at 20–21.) Defendant also relied on
the lower court’s holding in Leiendecker that the responding party need only allege facts,
rather than produce evidence, that clearly and convincingly demonstrate that the moving
party’s actions are not immune. (Def.’s Partial SJ Opp., at 21 (citing Leiendecker v.
Asian Women United of Minn., 834 N.W.2d 741, 751 (Minn. Ct. App. 2013)). That
holding was, however, reversed by the Minnesota Supreme Court, as discussed above.
Defendant filed a copy of the Minnesota Supreme Court’s opinion in Leiendecker with
this Court on June 30 and stated its belief that the opinion was relevant to Plaintiff’s
motion for partial summary judgment. (Letter dated June 30, 2014 [Doc. No. 110].)
Defendant asked the Court to advise counsel if it would like additional briefing. (Id.)
However, neither party sought leave to file supplemental briefing, and the Court finds
that additional briefing would be unnecessary.
27
would ultimately prevail on the merits; (2) the action must be instituted and prosecuted with
malicious intent; and (3) the action must terminate in favor of the defendant.” Kellar v.
VonHoltum, 568 N.W.2d 186, 192 (Minn. Ct. App. 1997) (citation omitted). Moreover, in
order to trigger the tort of malicious prosecution, “some formal legal action must be
instituted.” Stead-Bowers v. Langley, 636 N.W.2d 334, 341 (Minn. Ct. App. 2001) (finding
that a criminal charge or indictment would constitute “formal legal action” sufficient to
trigger a malicious prosecution claim, but that the initiation of a criminal investigation alone
would not).
The parties, as an initial matter, dispute whether Plaintiff’s letter to the DOC can
even constitute action sufficient to form the basis of a malicious prosecution claim. (See
Pl.’s Partial SJ Mem., at 8–10; Def.’s Partial SJ Opp., at 24–26; Pl.’s Partial SJ Reply, at 5–
8.) However, the Court need not reach this issue. Rather, even assuming that Plaintiff’s
letter to the DOC was conduct that could trigger the tort, Defendant has failed to present
clear and convincing evidence that Plaintiff’s actions constituted malicious prosecution.
a.
Probable cause
Defendant has not demonstrated that Plaintiff lacked probable cause to send the letter
to the DOC. “‘Probable cause for pursuing a civil action consists of such facts and
circumstances as will warrant a cautious, reasonable and prudent person in the honest belief
that his action and the means taken in prosecution of it are just, legal, and proper.’”
Mendota Heights Assocs. v. Friel, 414 N.W.2d 480, 484 (Minn. Ct. App. 1987) (quoting
First Nat’l Bank of Omaha v. Marquette Nat’l Bank of Minneapolis, 482 F. Supp. 514, 523
(D. Minn. 1979), aff'd, 636 F.2d 195 (8th Cir. 1980)). Moreover, to prevail on a claim for
28
malicious prosecution, “the want of probable cause must be very palpable.” Id. (citing
Virtue v. Creamery Package Mfg. Co., 142 N.W. 930, 936 (Minn. 1913); Eickhoff v.
Fidelity & Cas. Co., 76 N.W. 1030, 1031 (Minn. 1898)).
Defendant’s sole argument regarding probable cause is the same as its argument
regarding public participation—i.e., that because Plaintiff sought relief that the DOC was
without authority to grant, Plaintiff lacked probable cause or a reasonable belief that it
would prevail. (Def.’s Partial SJ Opp., at 26.) Plaintiff, on the other hand, argues that it had
a reasonable belief that the DOC could help the parties resolve their dispute because the
circumstances of the loss fall directly under the coverage provided by the Bond, yet
Defendant had been evaluating the claim for a year. (Pl.’s Partial SJ Mem., at 11.)
According to Plaintiff, Minnesota’s unfair claims handling statutes make it unlawful for an
insurer to fail to issue a coverage decision within a reasonable time after the proof of loss is
submitted or to demand information that is not relevant to the claims decision, and the DOC
enforces these statutes. (Pl.’s Partial SJ Reply, at 10 (citing Minn. Stat. § 72A.20, subd.
12(5); id. § 74A.201, subds. 1, 3(6), 4(9)). Moreover, Plaintiff points out, the DOC’s
website invites insureds to seek the DOC’s assistance in resolving disputes with their
insurers by filing a written complaint. (Id.; First Bye Decl., Ex. I.)
Defendant has not established by clear and convincing evidence that Plaintiff lacked
probable cause to seek assistance from the DOC through its letter. As discussed above, the
letter describes what Plaintiff perceived to be Defendant’s “delay in handling the claim” in
violation of the Minnesota Claims Practices statutes and bad faith laws, and it plainly states
as Plaintiff’s goal the receipt of any assistance the DOC could provide to Plaintiff. Based
29
on the unfair claims practices statutes and the DOC’s website, Plaintiff’s belief that it could
obtain assistance by submitting its written complaint to the DOC was reasonable.
Defendant even acknowledged in its follow-up letter to the DOC on March 13, 2013, that
Plaintiff had a right to the DOC’s assistance. Accordingly, any supposed want of probable
cause evidenced by the fact that the DOC may not have been able to provide every form of
relief referenced in the letter is not “very palpable,” and Defendant’s claim fails on this
element.
b.
No malicious intent
Defendant’s claim also fails for a want of evidence of malicious intent. “[T]o prevail
on a malicious-prosecution claim, a plaintiff must prove, at a minimum, that the defendant
knew that its actions were wrong.” Hirtzinger v. Pinnacle Airlines, Inc., No. 06-CV-1609
(PJS/RLE), 2008 WL 835644, at *16 (D. Minn. Mar. 27, 2008) (citing Allen v. Osco Drug,
Inc., 265 N.W.2d 639, 645 (Minn. 1978)), aff’d on other grounds, 310 Fed. App’x 949 (8th
Cir. 2009) (per curiam).
Here, Defendant argues that Plaintiff pursued its complaint with the DOC “with the
malicious intent to coerce BancInsure to abandon its investigation” and pay the claim.
(Def.’s Partial SJ Opp., at 27.) Defendant argues that, at the time Plaintiff complained, it
had misrepresented that it had not conducted an investigation, had withheld the hard drive,
had seen Mr. Lanterman’s report detailing the security deficiencies, and had received
Defendant’s supplemental document requests; and that the timing of the letter therefore
demonstrates Plaintiff’s malicious intent. (Id. at 28.) Defendant also points out that
Plaintiff did not notify Defendant of the letter when it was sent. (Id.)
30
The Court finds that Defendant has not provided clear and convincing evidence of
malicious intent on Plaintiff’s part. It appears, as Plaintiff notes, that Defendant had access
to Plaintiff’s IT consultant’s images and the hard drive at the time the letter was sent, (see
Pl.’s Partial SJ Reply, at 13), and that Mr. Lanterman had already issued his report. Despite
having this information, Defendant still had not issued its coverage decision, but instead had
made supplemental document requests, and the delay was the basis of Plaintiff’s letter.
Moreover, the DOC’s website states that it will contact the parties named in an insured’s
complaint. Accordingly, there is no evidence—let alone clear and convincing evidence—
that Plaintiff knew its actions were wrong when it sent the letter requesting the DOC’s
assistance.
c.
Neutral outcome
Finally, Defendant contends that the DOC’s proceedings terminated in favor of
Defendant because the DOC stated that the evidence did not support pursuit of formal
disciplinary action and decided not to grant Plaintiff any relief. (See Def.’s Partial SJ Opp.,
at 29.) Plaintiff, on the other hand, argues that the proceedings were not resolved in
Defendant’s favor because the DOC only stated that the pursuit of disciplinary action was
not appropriate “‘at this time,’” (Pl.’s Partial SJ Mem., at 12), and that a court would be the
“‘most appropriate’” forum for the parties’ dispute, (Pl.’s Partial SJ Reply, at 15). In fact,
Plaintiff claims that the proceedings resulted in Defendant finally announcing its coverage
decision, which is what Plaintiff sought. (Id.)
The Court finds that the DOC’s proceedings terminated in a neutral manner.
Although the DOC stated that it would not pursue formal disciplinary action against
31
Defendant based on the evidence before it, the DOC also acknowledged that there was
another forum available for resolving the issue. Even if this outcome were considered to be
favorable to Defendant, Defendant’s claim fails because it has not satisfied the first two
elements of malicious prosecution by clear and convincing evidence. Therefore, Defendant
has not met its burden under the anti-SLAPP statute, and its counterclaim for malicious
prosecution must be dismissed.
3.
Attorney’s fees and costs
As noted above, a moving party who prevails on a motion for dismissal based on the
anti-SLAPP statute is entitled to an award of attorney’s fees and costs associated with
bringing the motion. Minn. Stat. § 554.04, subd. 1. The moving party is also entitled to
actual damages if it can demonstrate that the opposing party brought the underlying claim
for purposes of wrongfully injuring the moving party. Id. § 554.04, subd. 2(b). However,
an award of punitive damages is permissive and can only be awarded if the moving party
satisfies the requirements of Minnesota Statutes section 549.191. Id. One such requirement
is meeting the standard in section 549.20:
(a)
Punitive damages shall be allowed in civil actions only upon clear and
convincing evidence that the acts of the defendant show deliberate
disregard for the rights or safety of others.
(b)
A defendant has acted with deliberate disregard for the rights or safety
of others if the defendant has knowledge of facts or intentionally
disregards facts that create a high probability of injury to the rights or
safety of others and:
(1)
deliberately proceeds to act in conscious or intentional
disregard of the high degree of probability of injury to the rights
or safety of others; or
32
(2)
deliberately proceeds to act with indifference to the high
probability of injury to the rights or safety of others.
Id. § 549.20, subd. 1.
In its motion, Plaintiff argues that—should it prevail—it is entitled to an award of
both attorney’s fees and punitive damages. (Pl.’s Partial SJ Reply, at 13.) Plaintiff does not
seek actual damages. As for punitive damages, Plaintiff asserts that Defendant retaliated
against Plaintiff for complaining to the DOC “by filing a baseless malicious prosecution
claim,” thereby deliberately disregarding Plaintiff’s rights and entitling Plaintiff to an award
of $25,000. (Id. at 16; see Pl.’s Partial SJ Mem., at 13–14.) Although Defendant does not
dispute that Plaintiff is entitled to its attorney’s fees if it prevails on the motion, Defendant
does argue that Plaintiff has failed to establish its entitlement to punitive damages. (Def.’s
Partial SJ Resp., at 29–30.) Specifically, Defendant contends that Plaintiff has not
demonstrated that Defendant intended to threaten Plaintiff’s rights by asserting the
counterclaim, and that, in fact, Defendant sought to protect its own rights to make coverage
determinations free from coercion. (Id. at 30–31.) Moreover, Defendant argues, the amount
requested by Plaintiff is arbitrary. (Id. at 31.)
Because Plaintiff is the moving party, and because the Court finds that Plaintiff has
prevailed on its anti-SLAPP motion, the Court will award Plaintiff its reasonable attorney’s
fees and costs associated with bringing the motion. Accordingly, within ten days of the date
of this Order, Plaintiff shall submit an affidavit documenting its reasonable attorney’s fees
and costs. Defendant may submit a responsive affidavit within ten days thereafter.
However, the Court declines to award Plaintiff punitive damages because Plaintiff has not
33
provided clear and convincing evidence that Defendant acted in deliberate disregard of
Plaintiff’s rights by asserting its malicious prosecution counterclaim. While Defendant was
ultimately unsuccessful on that claim, Defendant presented at least a colorable basis for it.
For these reasons, Plaintiff’s partial summary judgment motion is granted in part and denied
in part.
B.
Breach of the Bond
Resolution of the remaining claims—Plaintiff’s claim for breach of contract based on
Defendant’s denial of coverage, and Defendant’s counterclaims for a declaratory judgment
that it owes no coverage and for breach of contract based on Plaintiff’s alleged failure to
cooperate with Defendant—depends on the applicability of various provisions of the Bond.
State law governs the interpretation of insurance policies, Nat’l Union Fire Ins. Co. of
Pittsburgh v. Terra Indus., Inc., 346 F.3d 1160, 1164 (8th Cir. 2003), and the parties agree
that Minnesota law controls, (Pl.’s SJ Mem., at 5; Def.’s Mem. Supporting Its Mot. for
Summ. J. and Opposing Pl.’s Mot. for Summ. J. [Doc. No. 89] (“Def.’s SJ Mem.”), at 25).
Under Minnesota law, the interpretation and construction of an insurance policy is a matter
of law for the court, Watson v. United Servs. Auto. Ass’n, 566 N.W.2d 683, 688 (Minn.
1997), and “[g]eneral principles of contract interpretation apply,” Lobeck v. State Farm
Mut. Auto. Ins. Co., 582 N.W.2d 246, 249 (Minn. 1998). “While the insured bears the
initial burden of demonstrating coverage, the insurer carries the burden of establishing the
applicability of exclusions.” Travelers Indem. Co. v. Bloomington Steel & Supply Co., 718
N.W.2d 888, 894 (Minn. 2006) (citation omitted).
34
As an initial matter, the parties dispute whether contra proferentem—the doctrine
under which ambiguous insurance policy terms are construed in favor of the insured—
applies to financial institution bonds. (See Pl.’s SJ Mem., at 5–11; Def.’s SJ Mem., at 26–
27; Pl.’s Mem. in Reply Supporting Its Summ. J. Mot. and Opposing Def.’s Summ. J. Mot.
[Doc. No. 99] (“Pl.’s SJ Reply”), at 2–3; Def.’s Reply Mem. Supporting Its Mot. for Summ.
J. [Doc. No. 103] (“Def.’s SJ Reply”), at 2–3.) However, the Court need not address that
issue because there is no dispute that Plaintiff’s loss falls under the coverage provided in
Insuring Agreement (H),6 and even if one of the asserted exclusions was implicated in this
case, Defendant has failed to show that the excluded cause was the overriding cause of
Plaintiff’s loss. In addition, Defendant has failed to demonstrate substantial prejudice
resulting from Plaintiff’s alleged breach of the Bond’s cooperation provisions.
Accordingly, Defendant is liable for coverage of Plaintiff’s loss, as well as for prejudgment
interest.
1.
Coverage liability
Defendant argues that the Bond’s exclusions for “loss caused by an Employee”
(Section 2(h) and 2(bb)(17)), “loss resulting directly or indirectly from theft of confidential
information” (Section 2(bb)(4)), and “loss resulting directly or indirectly from mechanical
failure . . . [or] gradual deterioration” of a computer system (Section 2(bb)(12)), preclude
coverage of Plaintiff’s claim. As for the employee exclusion, Defendant argues that “Bank
6
Defendant’s 30(b)(6) deposition witness agreed that, unless an exclusion applies,
Plaintiff’s loss is covered by Insuring Agreement (H). (Second Bye Decl., Ex. D (Cross
Dep. 27:5–8).)
35
employees caused the loss by intentionally disregarding Bank policies, Federal Reserve
policies, and good banking practices.” (Def.’s SJ Mem., at 30.) Specifically, Defendant
points to the employees’ downloading of the Zeus virus through spam email, the
employees’ continued use of the computer after it detected a virus, the employees’ failure to
enable and update antivirus software, the employees’ failure to password-protect the
FedLine user accounts, Ms. Kirchberg’s use of another employee’s password and token to
complete a transfer on the day preceding the loss, and Ms. Kirchberg’s failure to remove the
tokens from the computer or shut down the computer on the day preceding the loss. (See id.
at 30–35; Def.’s SJ Reply, at 4–5.) According to Defendant, “[t]hese actions caused the loss
by opening the door for cyber thefts.” (Def.’s SJ Reply, at 6.) As for the theft of
confidential information exclusion, Defendant argues that the employees’ passwords and
pass phrases were confidential, that those passwords and pass phrases were used to make
the transfers, and, therefore, that “[t]he theft of [the] passwords and pass phrases caused the
loss.” (Def.’s SJ Mem., at 39.) Finally, as for the mechanical failure or gradual
deterioration exclusion, Defendant asserts that, because Proactive Threat Protection was
disabled and its definitions not updated, the computer’s antivirus software gradually
deteriorated and allowed malware to be downloaded, which led to the unauthorized
transfers. (See id. at 41.) To the contrary, Plaintiff argues that none of these exclusions
were triggered by the circumstances of the loss, but that even if they had been, Defendant
cannot satisfy its burden under Minnesota’s concurrent causation doctrine of establishing
that an excluded cause was the “overriding” cause of the loss. (See Pl.’s SJ Mem., at 16–
27.)
36
The Court agrees with Plaintiff. When there are multiple causes of an insured’s loss,
one of which is a “covered peril” and the other of which is an “excluded peril,” Minnesota’s
concurrent causation doctrine provides that the availability of coverage or the applicability
of the exclusion depends on which peril was the “‘overriding cause’” of the loss. Friedberg
v. Chubb & Son, Inc., 691 F.3d 948, 952 (8th Cir. 2012) (quoting Henning Nelson Constr.
Co. v. Fireman’s Fund Am. Life Ins. Co., 383 N.W.2d 645, 653 (Minn. 1986)). In
Friedberg v. Chubb & Son, Inc., the Eighth Circuit recently examined the Minnesota
Supreme Court cases that form the basis of this doctrine: Henning Nelson Construction Co.
v. Fireman’s Fund American Life Insurance Co., 383 N.W.2d 645 (Minn. 1986), the case
that coined the term “overriding cause”; and Fawcett House, Inc. v. Great Central Insurance
Co., 159 N.W.2d 268 (Minn. 1968), and Anderson v. Connecticut Fire Insurance Co., 43
N.W.2d 807 (Minn. 1950), the two cases the court in Henning relied upon. The Eighth
Circuit summarized those cases as follows:
In Henning, an insurer denied the plaintiff coverage for the collapse of the
foundational wall of a construction project. The court rejected the insurer’s
argument to apply any of three exclusions, including one that excluded
coverage if loss was “caused by, resulting from, contributed to, or aggravated
by” water below the surface of the ground. But the court also held in the
alternative that “[e]ven if one of the three causes discussed above had been
established,” the insurer could not deny coverage, because “the testimony
established there were eight possible causes of the collapse, but no one factor
was considered to be the overriding cause.”
. . . . Fawcett House involved an insurance claim arising from destruction of
the plaintiff’s heating and plumbing system after vandals had entered and
turned off the electricity. The vandalism caused a “freeze-up” of the system.
The plaintiff’s policy covered “direct loss by Vandalism and Malicious
Mischief” but excluded “any loss resulting from change in temperature or
humidity.” The Supreme Court of Minnesota held that the exclusion did not
apply, and reasoned that “loss from ‘change in temperature or humidity’
37
encompasse[s] only losses directly caused by such changes, not those
incidentally aggravated by a change in temperature but which would not have
occurred except for acts of vandalism.” Anderson turned on whether a
building was damaged by a windstorm, a covered peril, or a blizzard, an
excluded cause. The Minnesota court concluded that coverage applied
because a jury reasonably could have found the windstorm to be the “efficient
and proximate cause” of the building’s collapse. Although wind was “not the
sole cause,” the windstorm weakened the building and resulted in a “collapse
[that] would not have taken place had not the structure first been weakened by
the wind.”
Fawcett House and Anderson illustrate what the court in Henning meant by
“overriding cause.” According to Henning, the earlier decisions hold that
even where an excluded peril “contributed to the loss,” an insured may
recover if a covered peril is what Anderson called “the efficient and
proximate cause” of the loss. Conversely, it follows that if an excluded peril
is the efficient and proximate cause of the loss, then coverage is excluded. An
“efficient and proximate cause,” in other words, is an “overriding cause.”
Friedberg, 691 F.3d 948, 952 (8th Cir. 2012) (internal citations omitted).
At issue in Friedberg was a claim for coverage for water damage to a home under an
insurance policy that covered “‘all risk of physical loss’” except for certain exclusions,
including for any loss caused by “‘[f]aulty planning, construction or maintenance.’” Id. at
950. Based on the cases discussed above, the Eighth Circuit concluded that the policy’s
exclusion for loss caused by faulty construction precluded coverage:
The faulty construction of the Friedbergs’ house, like the vandals in Fawcett
House and the windstorm in Anderson, was the efficient and proximate cause
of the loss. But for the faulty construction, the water damage would not have
taken place. Once the house was plagued with faulty construction, it was a
foreseeable and natural consequence that water would enter. Although water
intrusion played an essential role in the damage to the Friedbergs’ house, it
was not an independent and efficient cause of the loss. The water’s role was
comparable to the temperature change in Fawcett House and the snowfall in
Anderson, neither of which precluded the coexistence of an efficient and
proximate cause. . . .
Id. at 952.
38
Applying this precedent to the present set of facts, this Court finds that the computer
systems fraud was the efficient and proximate cause of Plaintiff’s loss. But for the hacker’s
fraudulent conduct, the $485,000 would not have been transferred. Conversely, neither the
employees’ violations of policies and practices (no matter how numerous), the taking of
confidential passwords, nor the failure to update the computer’s antivirus software was the
efficient and proximate cause of Plaintiff’s loss. Assuming all of these circumstances
existed as Defendant argues, it was not then a “foreseeable and natural consequence” that a
hacker would make a fraudulent wire transfer. Thus, even if those circumstances “played an
essential role” in the loss, they were not “independent and efficient causes” of the loss. In
other words, without the fraudster’s actions, there would have been no loss even if all of the
other circumstances existed. Therefore, according to Friedberg, Fawcett House, Anderson,
and Henning, the computer systems fraud was the overriding cause of Plaintiff’s loss.
Defendant’s arguments to the contrary are unavailing. First, Defendant argues that
the Eighth Circuit in Empire Bank v. Fidelity & Deposit Co., 27 F.3d 333 (8th Cir. 1994),
held that the employee exclusion does not require that the employee’s conduct be the only
cause of the loss in order for the exclusion to apply. (Def.’s SJ Mem., at 36.) However, as
Plaintiff notes, neither does the concurrent causation doctrine require that the employee’s
conduct be the sole cause of the loss in order for the exclusion to apply; rather, it requires
only that the employee’s conduct be the “overriding cause.”7 (See Pl.’s SJ Reply, at 4.)
7
In addition, Empire Bank is also inapposite because it involved Missouri law. See
27 F.3d at 334.
39
Second, Defendant asserts that the concurrent causation doctrine cannot apply in the
context of the theft of confidential information or mechanical failure or gradual
deterioration exclusions because those exclusions include losses “indirectly” caused by
those perils. (See Def.’s SJ Mem., at 40–41.) This argument, too, is unavailing. The
exclusion for faulty construction at issue in Friedberg applied to “‘any loss that is
contributed to, made worse by, or in any way results from that peril.’” 691 F.3d at 951.
Nevertheless, the Eighth Circuit conducted a thorough analysis to determine whether that
excluded peril was the overriding cause of the loss. See id. at 952. Only after determining
that faulty construction was, in fact, the overriding cause did the court determine that the
exclusion applied. See id.
Finally, Defendant argues that no Minnesota court has applied the concurrent
causation doctrine to a financial institution bond, and that other courts have declined to do
so. (Def.’s SJ Reply, at 8–9.) However, Defendant cites to no Minnesota cases in which a
court has determined that the exclusion cannot apply to financial institution bonds, and none
of the cases cited by Defendant applies Minnesota law. See Universal Mortg. Corp. v.
Wurttembergische Versicherung AG, 651 F.3d 759, 762 (7th Cir. 2011) (applying
Wisconsin law); Empire Bank, 27 F.3d at 334 (applying Missouri law); Bay Area Bank v.
Fidelity & Deposit Co., 629 F. Supp. 693, 697 (N.D. Cal. 1986) (applying California law).
Moreover, the state law in the one case cited by Defendant where the court declined to
apply the doctrine because it would nullify the exclusions is materially different than
Minnesota’s law—it did not require that a concurrent cause be the “overriding cause,” but
only “a” cause of the loss. See Bay Area Bank, 629 F. Supp. at 697–98 (applying
40
California’s concurrent causation doctrine, which “provides that ‘coverage under a . . .
policy is equally available to an insured whenever an insured risk constitutes simply a
concurrent proximate cause of the injury’”) (citation omitted). The courts in the other two
cases cited by Defendant for the proposition that courts do not apply the concurrent
causation doctrine to financial institution bonds simply did not mention “concurrent
causation” at all, so it is not clear that those courts would find that the concurrent causation
doctrine could never apply to a financial institution bond. See Universal Mortg. Corp., 651
F.3d at 761–64; Empire Bank, 27 F.3d at 335–36.
Because Defendant has presented no set of facts from which a reasonable jury could
find that one of the excluded perils—and not the computer systems fraud—was the
overriding cause of Plaintiff’s loss, Plaintiff is entitled to summary judgment on its claim for
breach of contract and on Defendant’s claim for a declaratory judgment that it is not liable
for coverage. Accordingly, Defendant owes Plaintiff $480,000 under the Bond, which is the
amount of the loss less the $5,000 deductible.
2.
Failure to cooperate
The parties also each seek summary judgment on Defendant’s counterclaim for
breach of the Bond’s cooperation provisions. In this type of claim, “the insurer has the
burden of proving a substantial and material lack of cooperation resulting in substantial
prejudice to its position.” Rieschl v. Travelers Ins. Co., 313 N.W.2d 615, 617 (Minn. 1981)
(citation omitted). Accordingly, it is not enough to simply show a lack of cooperation;
rather, the insurer must also show that the lack of cooperation resulted in substantial
prejudice. Id. at 618 (citing White v. Boulton, 107 N.W.2d 370, 372 (Minn. 1961)).
41
Although the question of whether an insured has breached a cooperation clause is a question
of fact, id. at 617, summary judgment is appropriate in this case because Defendant has not
presented evidence from which a reasonable jury could find that Defendant suffered
substantial prejudice due to Plaintiff’s actions. See Parr v. Gonzalez, 669 N.W.2d 401,
407–08 (Minn. Ct. App. 2003) (affirming the district court’s award of summary judgment
against the insurer where it “failed to present any evidence raising a material fact question
as to whether [the insured’s failure to cooperate] substantially prejudiced [the insurer’s]
position”).
As discussed above, Section 7 of the Bond required Plaintiff, “[u]pon the Company’s
request” to “submit to examination by the Company,” “produce for the Company’s
examination all pertinent records,” and “cooperate with the Company in all matters
pertaining to the loss.” And, Section 5 required Plaintiff to provide a “proof of loss, duly
sworn to, with full particulars.” Defendant argues that Plaintiff breached these provisions
by making countless misrepresentations and omissions regarding, for example, the fact that
the computer was left running with the tokens in it on the night of the loss, how the wire
transfer process should work and how the transfers at issue were initiated, the various ways
in which Plaintiff’s employees violated policies, Plaintiff’s IT consultant’s analysis of the
computer and storage of the hard drive, and Plaintiff’s correspondence with law
enforcement agencies. (See Def.’s SJ Mem., at 43–46.) Defendant also claims that Plaintiff
breached the Bond’s provisions by refusing to disclose the Federal Reserve documents or to
comply with KCESD’s request for a face-to-face meeting with Plaintiff’s employees. (See
id. at 46.)
42
While Defendant goes to great lengths to describe the many ways in which Plaintiff
allegedly breached its duty to cooperate, Defendant’s only descriptions of the prejudice it
allegedly suffered as a result are that Plaintiff “materially prejudiced BancInsure’s ability to
evaluate the claim” by “obscuring the true cause of the loss,” (id. at 46–47), and that, had
Plaintiff disclosed this information in its Proof of Loss, Defendant could have denied
coverage in early 2012 rather than conduct its own forensic analysis and spend two years
trying to obtain the information necessary to evaluate the claim, (Def.’s SJ Reply, at 13).
As discussed above, however, the true cause of the loss was computer systems fraud caused
by a hacker, as was initially represented by Plaintiff. Moreover, the evidence shows that
Defendant retained its own forensic computer specialist to conduct an investigation because
Plaintiff had not conducted its own investigation and the FBI was not willing to share the
results of its investigation. However, even after Plaintiff provided to Defendant the logs and
images collected by Plaintiff’s IT consultant following the loss, Defendant went forward
with its own forensic analysis conducted by Mr. Lanterman. Accordingly, Defendant’s
claim fails because it has not presented evidence from which a reasonable jury could
conclude that any alleged lack of cooperation resulted in prejudice—let alone substantial
prejudice—to Defendant.
3.
Prejudgment interest
In Minnesota,
[a]n insured who prevails in any claim against an insurer based on the
insurer’s breach or repudiation of, or failure to fulfill, a duty to provide
services or make payments is entitled to recover ten percent per annum
interest on monetary amounts due under the insurance policy, calculated from
the date the request for payment of those benefits was made to the insurer.
43
Minn. Stat. § 60A.0811, subd. 2(a); see Schwan’s Sales Enters., Inc. v. SIG Pack, Inc., 476
F.3d 594, 595 (8th Cir. 2007) (stating that “[p]rejudgment interest is a substantive matter of
state law”). Accordingly, Plaintiff is entitled to an award of prejudgment interest in the
amount of ten percent per annum on the $480,000 due under the Bond. The only dispute
between the parties is the date the interest began to accrue—i.e., when “the date the request
for payment of th[e] benefits was made to the insurer.” (See Def.’s SJ Mem., at 47 n.19.)
Plaintiff argues that the request was made on October 28, 2011, when it notified Defendant
of its loss. (Pl.’s SJ Mem., at 34.) Defendant argues that the earliest date on which interest
could have begun to accrue was when Plaintiff submitted its Proof of Loss, but that Plaintiff
did not submit the necessary information and so interest never began to accrue. (Def.’s SJ
Mem., at 47 n.19.) However, Defendant cites to no authority for these propositions, and the
plain language of the statute does not support them. Rather, as Plaintiff notes, the only
reason that it would have notified its insurance company of the fraud would be to request
benefits. (See Pl.’s SJ Reply, at 21.) Therefore, Plaintiff is entitled to an award of
prejudgment interest beginning on October 28, 2011, for a total of $140,187.36.8
IV.
ORDER
THEREFORE, IT IS HEREBY ORDERED THAT:
1.
Plaintiff’s Motion for Partial Summary Judgment [Doc. No. 15] is
GRANTED IN PART AND DENIED IN PART as detailed herein;
8
Ten percent per annum on $480,000 is $48,000. The daily rate is $131.51
($48,000 / 365). Assuming that judgment is entered on the date of this Order, September
29, 2014, the amount of prejudgment interest owed from October 28, 2011, is
$140,187.36 ($48,000 + 48,000 + (336 days x $131.51)).
44
2.
Plaintiff shall submit, within ten days of the date of this Order an affidavit and
documentation of its reasonable attorney’s fees and costs associated with
bringing its Motion for Partial Summary Judgment;
3.
Defendant may submit a responsive affidavit within ten days thereafter;
4.
Plaintiff’s Motion for Summary Judgment [Doc. No. 76] is GRANTED;
5.
Defendant’s Motion for Summary Judgment [Doc. No. 88] is DENIED; and
6.
Plaintiff is awarded the principal amount of $480,000 under the Bond, with
prejudgment interest of $140,187.36, for a total of $620,187.36.
LET JUDGMENT BE ENTERED ACCORDINGLY.
Dated: September 29, 2014
s/Susan Richard Nelson
SUSAN RICHARD NELSON
United States District Judge
45
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?