Bartech Systems International, Inc. v. Mobile Simple Solutions, Inc. et al

Filing 96

ORDER granting in part Plaintiff's ECF Nos. 16 , 67 , 87 Motion for Preliminary Injunction; granting Defendants' ECF No. 41 Motion to File an Errata. Signed by Judge Miranda M. Du on 5/24/2016. (Copies have been distributed pursuant to the NEF - KR)

Download PDF
1 2 3 4 5 UNITED STATES DISTRICT COURT 6 DISTRICT OF NEVADA 7 *** 8 BARTECH SYSTEMS INTERNATIONAL, INC., Case No. 2:15-cv-02422-MMD-NJK ORDER 9 Plaintiff, v. 10 11 (Pl.’s Motion for Preliminary Injunction) 12 MOBILE SIMPLE SOLUTIONS, INC.; MOBILE SIMPLE SOLUTIONS (IAS), INC.; VINCENT TESSIER; CHRISTELLE PIGEAT 13 Defendants. 14 15 I. SUMMARY 16 Defendant Vincent Tessier is a former employee of Plaintiff Bartech Systems 17 International, Inc. (“Bartech”), which provides hardware and software services for 18 managing hotel minibars and other amenities. (ECF No. 1-32 at 5.) After leaving 19 Bartech, Tessier partnered with Defendant Christelle Pigeat to create Mobile Simple 20 Solutions, Inc. and Mobile Simple Solutions (IAS), Inc. (together, “Mobile Simple”), which 21 also offer software solutions for minibar and amenities management. (See id. at 13.) 22 Bartech claims, among other allegations, that Defendants misappropriated trade secrets 23 and used copyrighted material in developing and marketing Mobile Simple’s software. 24 (Id. at 19-21, 28-29.) Bartech has filed a Motion for a Preliminary Injunction (“PI Motion”) 25 to foreclose Defendants from marketing and selling their software, or otherwise 26 possessing or using Bartech’s proprietary information. (ECF No. 16 at 5.)1 After 27 28 1 Bartech has filed three identical PI Motions due to sealing issues. (ECF Nos. 16, 67, 87.) This Order addresses all three. 1 reviewing the parties’ response and reply briefs (ECF Nos. 42, 47) and holding a two-day 2 evidentiary hearing, the Court will grant the PI Motion in part. 3 II. BACKGROUND 4 Bartech’s core business is selling minibars and their accompanying software to 5 high-end hotels. (ECF No. 1-32 at 5; ECF No. 94 at 50.) Bartech’s minibar models fall 6 into two broad categories: automatic minibars, which automatically sense when items 7 have been removed and charge customers accordingly; and manual minibars, which 8 must be stocked and maintained by hotel staff.2 (ECF No. 1-32 at 6.) 9 Tessier began working for Bartech as a software and hardware developer in 10 1997. (ECF No. 16-2 at 4.) He was promoted to Bartech’s Vice President of Research 11 and Development in 2005 (id.); he remained in that role until he resigned in May 2014. 12 (See ECF No. 42 at 31.) Throughout his years at Bartech, Tessier oversaw the 13 development of WebBart, a software system that allows Bartech customers to manage 14 their minibar operations electronically. (ECF No. 16-2 at 3-4; ECF No. 42 at 29.) 15 WebBart interfaces directly with hotels’ property management systems (“PMS”) to 16 ensure that any charges incurred for in-room amenities are posted to a guest’s account. 17 (ECF No. 16-2 at 3.) The software also interacts with Bartech’s automatic minibars. (See 18 id. at 3-4.) According to Bartech’s employees, some hotels also use Bartech’s software 19 to manage manual minibars. (See ECF No. 94 at 45-46.) 20 In 2010, Tessier met Pigeat at a hospitality conference; the two remained in 21 touch, and, in 2013, they began conceptualizing a new software business to serve hotels 22 using manual minibars. (ECF No. 42 at 29-30, 36-37.) Between 2013 and 2014, Pigeat 23 drafted a business plan and worked with a graphic designer to move forward with the 24 software business. (Id. at 36-37.) In February and March 2014, before resigning from 25 Bartech in May 2014, Tessier worked with a freelance web developer to begin 26 27 28 2 Bartech also offers semi-automatic minibars, which monitor door openings and refrigerator temperatures. (ECF No. 94 at 9.) These minibars do not have sensors that facilitate automatically charging a guest who removes an item. 2 1 implementing Pigeat’s specifications. (Id.) Tessier and Pigeat launched Mobile Simple 2 Solutions — by way of its flagship ABreez software — at a hospitality trade show in June 3 2014. (Id. at 31, 38.) The software, however, required further development after the trade 4 show; Mobile Simple outsourced some portion of the remaining development, but 5 Tessier drafted the code that would allow ABreez to communicate directly with hotels’ 6 PMS systems (the “PMS interface”). (Id. at 32, 38.) The PMS interface makes ABreez 7 more useful, but the software could still function without it. (Id. at 32.) 8 During this development period, between July and November 2014, Tessier 9 contacted several hotels in Las Vegas, seeking their feedback on ABreez, and offering a 10 free trial of the software. (ECF No. 95 at 129-30; see ECF Nos. 17-3 to 17-6.) 11 Meanwhile, in June 2014, Bartech announced BarTouch, a new web-based application 12 capable of managing non-Bartech minibars. (ECF No. 94 at 80-81.) Mobile Simple’s 13 launch of the ABreez software helped prompt the BarTouch unveiling. (Id. at 81.) Mobile 14 Simple completed its first installation of the ABreez software in a Canadian hotel in May 15 2015. (ECF No. 42 at 38.) Since then, Mobile Simple and Bartech have both solicited 16 several of the same hotels as prospective customers of amenities software. (See ECF 17 No. 94 at 18-19, 269-70; ECF No. 16-20 at 2-3.) 18 Bartech initiated this lawsuit in Nevada state court on December 23, 2014, 19 claiming, in part, that Defendants had misappropriated Bartech’s trade secrets and were 20 using them to compete unfairly. (ECF No. 1-1.) The case was removed on December 18, 21 2015, after Bartech discovered grounds for a federal copyright claim.3 (Id.) Bartech filed 22 the PI Motion a month later, on January 14, 2016. (ECF No. 16.) After the PI Motion was 23 fully briefed, the Court held a two-day evidentiary hearing on the PI Motion on April 18 24 and 19, 2016. (See ECF Nos. 73, 74.) 25 /// 26 27 28 3 Because Bartech raises a claim of copyright infringement under the Copyright Act, 17 U.S.C. § 106, the Court has federal question jurisdiction over this action. 28 U.S.C. § 1338. The Court may reach Bartech’s related state-law claims by exercising its supplemental jurisdiction. 28 U.S.C. § 1367. 3 1 III. LEGAL STANDARD 2 “‘An injunction is a matter of equitable discretion’ and is ‘an extraordinary remedy 3 that may only be awarded upon a clear showing that the plaintiff is entitled to such 4 relief.’” Earth Island Inst. v. Carlton, 626 F.3d 462, 469 (9th Cir. 2010) (quoting Winter v. 5 Nat. Res. Def. Council, 555 U.S. 7, 22, 32 (2008)). To qualify for a preliminary injunction, 6 a plaintiff must demonstrate: (1) a likelihood of success on the merits; (2) a likelihood of 7 irreparable harm; (3) that the balance of equities favors the plaintiff; and (4) that the 8 injunction is in the public interest. Winter, 555 U.S. at 20. 9 Alternatively, in the Ninth Circuit, an injunction may issue under a “sliding scale” 10 approach if there are serious questions going to the merits and the balance of equities 11 tips sharply in the plaintiff’s favor. All. for the Wild Rockies v. Cottrell, 632 F.3d 1127, 12 1134-35 (9th Cir. 2011). The plaintiff, however, must still show a likelihood of irreparable 13 harm and that an injunction is in the public interest. Id. at 1135. “[S]erious questions are 14 those ‘which cannot be resolved one way or the other at the hearing on the injunction.’” 15 Bernhardt v. Los Angeles Cty., 339 F.3d 920, 926-27 (9th Cir. 2003) (quoting Republic of 16 the Philippines v. Marcos, 862 F.2d 1355, 1362 (9th Cir. 1988)). They “need not promise 17 a certainty of success, nor even present a probability of success, but must involve a ‘fair 18 chance of success on the merits.’” Marcos, 862 F.2d at 1362 (quoting Nat’l Wildlife Fed’n 19 v. Coston, 773 F.2d 1513, 1517 (9th Cir. 1985)). 20 IV. ANALYSIS 21 Bartech seeks preliminary injunctive relief under three theories: copyright 22 infringement, wrongful misappropriation of trade secrets, and unlawful computer access. 23 (ECF No. 16 at 18-26.) Absent a preliminary injunction, Bartech insists that it will lose 24 customers and consumer goodwill due to Defendants’ infringing products and improper 25 use of trade secrets. (Id. at 27-29.) Defendants counter that Bartech’s business model is 26 so different from Mobile Simple’s that no direct competition exists between the two 27 businesses. (ECF No. 42 at 5, 22-23.) Without direct competition, Defendants contend, 28 Bartech cannot show that it would be irreparably harmed absent a preliminary injunction 4 1 — instead, any alleged harms could be remedied by damages and a forfeiture of 2 Defendants’ intellectual property. (Id. at 22-23.) Defendants further argue that Bartech’s 3 copyright, trade secrets, and unlawful computer access claims fall short on the merits. 4 (Id. at 16-22.) Both parties assert that the equities and the public interest tip in their 5 favor. The Court will address these arguments in turn. 6 A. Likelihood of Irreparable Harm 7 There is no presumption of irreparable harm to a party seeking a preliminary 8 injunction in a copyright infringement action. Flexible Lifeline Sys., Inc. v. Precision Lift, 9 Inc., 654 F.3d 989, 998 (9th Cir. 2011). Nor does such a presumption extend to 10 Bartech’s trade secret and computer access claims. See V’Guara Inc. v. Dec, 925 F. 11 Supp. 2d 1120, 1126 (D. Nev. 2013) (citing Flexible Lifeline Systems in declining to 12 presume irreparable harm for a trade secret claim under Nevada law). Rather, the 13 moving party “must proffer evidence sufficient to establish a likelihood of irreparable 14 harm.” Herb Reed Enters., LLC v. Fla. Entm’t Mgmt., Inc., 736 F.3d 1239, 1251 (9th Cir. 15 2013). The Ninth Circuit has recognized that “[e]vidence of threatened loss of 16 prospective customers or goodwill certainly supports a finding of the possibility of 17 irreparable harm.” Stuhlbarg Int’l Sales Co., Inc. v. John D. Brush & Co., Inc., 240 F.3d 18 832, 841 (9th Cir. 2001). But “[e]vidence of loss of control over business reputation and 19 damage to goodwill” must demonstrate the likelihood — not simply a possibility — of 20 irreparable harm. Herb Reed Enters., 736 F.3d at 1250. In short, the moving party must 21 offer “evidence that the claimed loss of customers or goodwill is real and imminent, not 22 just speculative or potential.” Giftango, LLC v. Rosenberg, 925 F. Supp. 2d 1128, 1140 23 (D. Or. 2013). 24 Bartech asserts that it will lose customers and consumer goodwill without a 25 preliminary injunction. (ECF No. 16 at 27.) To date, however, Bartech has not lost any 26 existing customers to Mobile Simple. (ECF No. 94 at 76.) Rather, Bartech contends, 27 evidence that Mobile Simple is soliciting Bartech’s existing customers and directly 28 competing against Bartech for prospective customers is sufficient to demonstrate a 5 1 likelihood of irreparable harm. (See ECF No. 16 at 27 (citing Douglas Dynamics, LLC v. 2 Buyers Prods. Co., 717 F.3d 1336, 1345 (Fed. Cir. 2013) (“Where two companies are in 3 competition against one another, the patentee suffers the harm — often irreparable — of 4 being forced to compete against products that incorporate and infringe its own patented 5 inventions.”)).) Defendants dispute Bartech’s characterization of their competition as 6 direct, claiming that Mobile Simple’s ABreez software differs so drastically from Bartech’s 7 suite of minibars that the two entities compete only indirectly — Mobile Simple targets 8 only hotels with manual minibars, whereas Bartech focuses on automatic minibars. (ECF 9 No. 42 at 22-23; ECF No. 95 at 24-25, 59.) Defendants concede, however, that Mobile 10 Simple and Bartech target similar prospective customers. (ECF No. 95 at 59-61.) But, 11 they contend, the possibility of indirect competition for prospective customers is too 12 speculative to establish a likelihood of irreparable harm. The Court disagrees. Bartech’s 13 evidence demonstrates a likelihood of lost customers and consumer goodwill absent a 14 preliminary injunction. 15 First, the Court is unpersuaded by Defendants’ attempts to construe Bartech’s 16 business as singly focused on automatic minibars. While Bartech describes its “core 17 business” as the sale of automatic and semi-automatic minibars (ECF No. 94 at 50), 18 Bartech has presented evidence showing that it also sells manual minibars and 19 amenities-management software. Globally, nearly half of the hotels in Bartech’s market 20 use manual minibars; a much smaller number (about 5%) of hotels in the company’s 21 North American market have manual minibars. (Id.) But at least several of those North 22 American hotels use Bartech software to help manually manage minibars. Bartech’s 23 president, Mario Agrario, identified one hotel — the W in Miami — that uses Bartech’s 24 software as a stand-alone product. (Id. at 45-46.) Bartech’s Accounting Training 25 Manager, Albert Huerta, testified that the following hotels use Bartech software 26 alongside the company’s manual minibars: the Archer, the Intercontinental Willard, the 27 Bellagio, and the Aria. (Id. at 270-72.) Finally, as explained below, Bartech and Mobile 28 /// 6 1 Simple have attempted to sell software to several of the same prospective customers. 2 This evidence suggests that Bartech’s customer base overlaps with Mobile Simple’s. 3 Bartech’s evidence further indicates that Mobile Simple is competing for Bartech’s 4 existing customers. First, Bartech offers emails that Tessier sent to several Las Vegas 5 hotels — which are Bartech customers — between July and November 2014.4 (ECF 6 Nos. 17-3 to 17-6.) In one email to the Aria, a known Bartech customer with both manual 7 and automatic minibars, Tessier states: “I think you will be interested to see how an 8 innovative solution can shake up two decades of minibar management. . . . Obviously I 9 know you already have a minibar solution but I would like to show you a demo of our 10 solution just to get your opinion.” (ECF No. 17-4 at 3-4; ECF No. 94 at 267-68.) Tessier 11 wrote a nearly identical message to the Bellagio, which, like the Aria, uses Bartech’s 12 automatic and manual minibars. (ECF No. 17-6; ECF No. 95 at 121-22.) Although 13 Defendants initially insisted that these emails were designed only to solicit feedback on 14 the ABreez product (ECF No. 95 at 210-11), Defendants admitted at the hearing that if 15 those hotels had offered to purchase ABreez during Tessier’s demonstrations, they 16 would have made the sale. (Id. at 122-23.) Thus, even assuming that Tessier wanted 17 feedback from these hotels, his demonstrations also appear to have been marketing 18 pitches. 19 Defendants’ attempt to characterize Tessier’s demonstrations as solicitations for 20 feedback is further undermined by the fact that Tessier offered a free trial of ABreez 21 during his pitches. (Id. at 129.) Tessier testified, however, that the software was not fully 22 developed when he met with the Aria and other Las Vegas hotels. (Id. at 210-11.) At that 23 point, in the summer of 2014, all Tessier could offer was the ABreez mobile application 24 — the back end of the product, which would allow managers to consolidate inputs to the 25 26 27 28 4 In addition to the Las Vegas hotels, Bartech asserts that Defendants approached a longtime Bartech customer in Paris with the ABreez solution. (ECF No. 47-6 at 3.) That customer uses Bartech’s automatic minibars, but, after being approached by Mobile Simple, asked Bartech whether it offered any software like ABreez. (Id.; ECF No. 94 at 19.) 7 1 mobile application, was still under development. (Id.) Nevertheless, despite the 2 software’s ongoing development, at least one hotel — the Aria in Las Vegas — took the 3 offer. (Id. at 129-30.) Shortly thereafter, an Aria employee contacted Bartech with a 4 technical question regarding the ABreez software, seemingly confusing the Mobile 5 Simple product with Bartech’s products. (ECF No. 94 at 267-69.) Similarly, a 6 representative of the Mirage suggested to Huerta that she was confused about the 7 ABreez product after attending Tessier’s demonstration.5 (Id. at 260-66.) These 8 reactions demonstrate that Bartech’s customers expressed interest in, and were 9 confused by, Defendants’ marketing of the ABreez product. Such confusion indicates a 10 likelihood of customer loss and reputational harm to Bartech. 11 Bartech’s evidence likewise suggests — and neither party disputes — that 12 Defendants are competing against Bartech for prospective customers. A declaration by 13 the president of Bartech’s French subsidiary, for example, identifies two luxury hotels in 14 Paris that Bartech and Mobile Simple solicited. (ECF No. 47-6 at 3.) Several witnesses 15 also testified during the hearing that Bartech and Mobile Simple competed to sell 16 software to the Trump Vancouver. (ECF No. 94 at 83-84; ECF No. 95 at 34-35.) The 17 hotel had purchased Bartech’s manual minibars, but was entertaining a sales offer from 18 Mobile Simple in lieu of Bartech’s software. (ECF No. 95 at 34-35.) Huerta described the 19 Trump as being dissatisfied with Bartech’s software offerings after the hotel had seen a 20 demonstration of ABreez. (ECF No. 94 at 269-70.) As of the hearing, the Trump had not 21 yet decided on a software provider. (ECF No. 95 at 61.) Coupled with the testimony 22 regarding the parties’ competition for the hotel, Huerta’s testimony that the Trump had 23 expressed dissatisfaction with Bartech’s software further illustrates that Defendants’ use 24 25 26 27 28 5 This testimony involves an out of court statement offered for the truth of the matter asserted — that a Mirage employee told the witness that she was confused by Tessier’s outreach emails. Courts, however, may “consider hearsay in deciding whether to issue a preliminary injunction.” Johnson v. Couturier, 572 F.3d 1067, 1083 (9th Cir. 2009). The Court overruled a hearsay objection to this line of testimony during the hearing on these grounds, and the Court has given “some weight” to the evidence. Id. (quoting Flynt Distrib. Co. v. Harvey, 734 F.2d 1389, 1394 (9th Cir. 1984)). 8 1 of ABreez in its current state poses a likelihood of lost customers and consumer goodwill 2 to Bartech. The Court accordingly finds that Bartech has presented sufficient evidence to 3 demonstrate a likelihood of irreparable harm absent an injunction in the form of lost 4 customers, diminished consumer goodwill, and reputational harm. 5 B. Likelihood of Success on the Merits 6 Bartech premises its PI Motion on three claims: copyright infringement, trade 7 secret misappropriation, and violations of the Nevada Computer Crimes Law (“NCCL”), 8 NRS § 205.4765. (ECF No. 16 at 18-26.) At the close of the hearing, the Court issued an 9 oral ruling on the NCCL claim, finding that Bartech failed to establish a likelihood of 10 success on the merits of the claim. (ECF No. 95 at 298-99.) The Court explained that 11 Bartech’s evidence and arguments focused on Tessier’s uses of Bartech’s source code 12 and emails, rather than his alleged unauthorized access to the company’s computers, 13 systems, or networks. (Id. at 299.) In light of the oral ruling, the Court need address only 14 the misappropriation and copyright claims. Furthermore, because the Court finds a 15 likelihood of success on the misappropriation claim, the Court will not reach the copyright 16 claim. 17 Nevada’s Uniform Trade Secrets Act (“UTSA”), which governs Bartech’s 18 misappropriation claim, provides that “[a]ctual or threatened misappropriation [of a trade 19 secret] may be enjoined.” NRS § 600A.040(1). To demonstrate misappropriation under 20 the UTSA, Bartech must show: 21 23 (1) a valuable trade secret; (2) misappropriation of the trade secret through use, disclosure, or nondisclosure of use of the trade secret; and (3) the requirement that the misappropriation be wrongful because it was made in breach of an express or implied contract or by a party with a duty not to disclose. 24 Frantz v. Johnson, 999 P.2d 351, 358 (Nev. 2000) (per curiam). The UTSA further 25 defines a trade secret as “information, including, without limitation, a . . . pattern, 26 compilation . . . product, system, process, design . . . procedure, computer programming 27 instruction or code” that “[d]erives independent economic value . . . from not being 28 generally known to,” or readily ascertainable to, the public. NRS § 600A.030(5). The 22 9 1 information must also be “the subject of efforts that are reasonable under the 2 circumstances to maintain its secrecy.” NRS § 600A.030(5)(b). Misappropriation, in turn, 3 includes the “[d]isclosure or use of a trade secret of another without express or implied 4 consent by a person who” knew about the trade secret through improper means, or 5 through circumstances giving rise to a duty to maintain its secrecy. NRS 6 § 600A.030(2)(c). 1. 7 Trade Secrets 8 Bartech contends that Defendants misappropriated the WebBart source code, 9 including the PMS interface; specifications for the PMS interface; and an internal and 10 confidential list of Bartech customers. (ECF No. 16 at 21.) According to Defendants, 11 however, Bartech has failed to establish that the source code, PMS specifications, and 12 customer list qualify as trade secrets, or that Tessier misappropriated them. (ECF No. 42 13 at 21-22.) Defendants additionally insist that Bartech never took the requisite steps to 14 protect those alleged trade secrets. (Id.) Defendants’ arguments fall short. 15 The source code, PMS specifications, and customer list constitute information that 16 “[d]erives independent economic value . . . from not being generally known” or 17 ascertainable to the public. NRS § 600A.030(5)(a). Agrario testified that the source code 18 is not publicly available. (ECF No. 94 at 16.) Bartech keeps the source code confidential 19 to protect the investment that the company made in creating it. (Id. at 16-17.) Agrario 20 likewise testified that Bartech keeps its PMS specifications confidential to foreclose 21 competitors from profiting from them. (Id. at 29-30.) Similar to the source code, 22 competitors could save time and money that would otherwise be required to create the 23 specifications. (Id. at 30.) Bartech’s customer list also contains confidential information 24 about all of Bartech’s existing customers, including a subjective ranking system that 25 Bartech uses to record the quality of its relationship with each customer. 6 (Id. at 34-36.) 26 27 28 6 Defendants point out that the customer list at issue was last updated in 2011, three years before Tessier emailed the list to his personal email account. (See ECF No. 94 at 299.) Bartech’s witnesses confirmed that the customer list has changed since 2011, but also clarified that many contacts on the list continue to be Bartech’s clients (fn. cont…) 10 1 Agrario testified that Bartech would be harmed if its customers knew how the company 2 had subjectively evaluated their relationships. (Id. at 36.) 3 Next, given the confidential nature of this information, Bartech also offered 4 testimony regarding the measures the company takes to protect its source code, 5 specifications, and customer list from public disclosure. See NRS § 600A.030(5)(b) 6 (trade secrets must be subject to reasonable efforts to maintain their secrecy). The 7 company’s source code is kept within a password-protected, internal server, and only 8 Bartech’s own developers have access to it. (ECF No. 94 at 16-17, 95.) The PMS 9 specifications are also kept on an internal server that requires a password. (Id. at 96.) 10 Bartech has shared its PMS specifications with its partners, including PMS companies, 11 in the course of its business. (Id. at 96-97.) But Bartech requires any third party to sign a 12 non-disclosure agreement (“NDA”) before that party can gain access to Bartech’s PMS 13 specifications.7 (Id. at 30-31, 96-97.) Finally, Bartech’s customer list is shared internally 14 with employees, and is stored in a folder to which only select employees have access. 15 (Id. at 33, 287.) 16 Taken together, this evidence suggests that Bartech is likely to succeed in 17 establishing that the source code, PMS specifications, and customer list are trade 18 secrets under the UTSA. 2. 19 Misappropriation 20 Bartech must also demonstrate that Defendants wrongfully misappropriated its 21 source code, PMS specifications, and customer list. NRS § 600A.030(2). The UTSA 22 /// 23 (…fn. cont.) 24 25 26 27 28 because they have long-term contracts with the company. (Id.) Absent evidence that the list has become stale or unusable, the fact that the list was several years old at the time of Tessier’s resignation does not affect its status as a trade secret. 7 There is some uncertainty over whether Bartech ever disclosed to Defendants an NDA that Justin Freund (one of Bartech’s employees) allegedly signed with a third party. (ECF No. 94 at 174-75; ECF No. 95 at 319.) Two of Bartech’s witnesses, however, testified that the company’s practice is to require NDAs before disclosing the PMS specifications. Thus, despite this uncertainty, the evidence suggests that Bartech takes reasonable steps to protect the PMS specifications. 11 1 identifies three permutations of misappropriation: (1) improperly acquiring another’s 2 trade secret; (2) acquiring a trade secret with knowledge, or reason to know, that the 3 trade secret was improperly obtained; or (3) disclosing or using another’s trade secret 4 without consent, where the trade secret was “[a]cquired under circumstances giving rise 5 to a duty to maintain its secrecy or limit its use.” NRS § 600A.030(2). Bartech focuses on 6 the third, claiming that Tessier used or disclosed Bartech’s non-public information — 7 which he had acquired as a Bartech employee — to Pigeat and Mobile Simple. (ECF No. 8 16 at 24-25.) Bartech additionally emphasizes that the UTSA provides for injunctive relief 9 to both actual and threatened misappropriation — even if Tessier has not used or 10 disclosed the trade secrets at issue, his possession of Bartech’s non-public information 11 should warrant a preliminary injunction. (ECF No. 47 at 17-18.) 12 While analyzing a trade secret claim under an identical Idaho law, the Ninth 13 Circuit held that trade secrets obtained by an employee through his work were acquired 14 “under circumstances giving rise to a duty to maintain [the trade secret’s] security or limit 15 its use.” JustMed, Inc. v. Byce, 600 F.3d 1118, 1129 (9th Cir. 2010) (quoting Idaho Code 16 Ann. § 48-801(2)(b)(B)(ii)). There, a former employee deleted source code that he had 17 drafted from his employer’s computers, threatened to withhold it, and disclosed a portion 18 of the code to the Copyright Office. Id. at 1122-23, 1129-30. The court reasoned that the 19 employee’s disclosure to the Copyright Office “in itself, [was] not necessarily inconsistent 20 with maintaining the secrecy and value of the trade secret,” particularly in light of the 21 Copyright Office’s policy of keeping files under review confidential. Id. at 1129-30. 22 The court similarly found that the employee had not made “use” of the source 23 code. Id. at 1131. “The term ‘use’ in the context of misappropriation of a trade secret,” 24 the court explained, “generally contemplates some type of use that reduces the value of 25 the trade secret to the trade secret owner.” Id. at 1130. Establishing improper use of a 26 trade secret requires “demonstrat[ing] that the defendant received some sort of unfair 27 trade advantage” from his or her use. Id. (quoting Omnitech Int’l, Inc. v. Clorox Co., 11 28 F.3d 1316, 1325 (5th Cir. 1994)). Rather than using the source code, the employee had 12 1 merely possessed it and retained it in attempting to negotiate with his former employer. 2 Id. at 1131. The court noted, however, that the employee’s threatened use of the source 3 code could be enjoined under Idaho law, which, like Nevada’s UTSA, provides for 4 injunctions of actual or threatened misappropriation. Id. (citing Idaho Code Ann. § 48- 5 802). Although the employer could not establish damages for its misappropriation claim, 6 it could seek injunctive relief against the employee’s threatened use or disclosure. Id. 7 Here, Bartech has presented at least enough evidence to establish a basis for 8 enjoining Defendants’ threatened use of its trade secrets. First, in contrast to JustMed, 9 Inc., Bartech has offered evidence suggesting that Defendants have obtained an unfair 10 competitive advantage from their use — or threatened use — of Bartech’s source code, 11 specifications, and customer list. As discussed above, Bartech has identified multiple 12 examples of customers for which Bartech and Mobile Simple are either directly or 13 indirectly competing. (See supra Section IV.A.) With regard to the source code and PMS 14 specifications, Bartech claims that Mobile Simple’s ability to compete is bolstered — if 15 not facilitated — by its use of infringing source code for the PMS interface of the ABreez 16 software. (See ECF Nos. 16-17, 57.) Indeed, Mobile Simple’s marketing materials 17 highlight the fact that ABreez can interface directly with PMS systems, a functionality that 18 requires the source code at issue here. (See ECF No. 42 at 9 (depicting a figure entitled 19 “How ABreez works,” which describes one of the software’s components as “interfac[ing] 20 with third party vendors via Mobile Simple Interface Software”).) And while Defendants 21 deny using Bartech’s customer list to market their product (ECF No. 395 at 75), it is 22 undisputed that Tessier reached out to at least several contacts that appear on the list. 23 (See ECF No. 94 at 60.) Thus, there is little question that Defendants could derive a 24 competitive advantage over Bartech by using the source code, specifications, and 25 customer list. 26 Nor is there any dispute over Tessier’s access to these materials. Bartech has 27 reproduced emails that Tessier sent to his personal email account in the months leading 28 up to his resignation — one contains Bartech’s 2011 customer list, while the other 13 1 includes Bartech’s PMS interface specifications. (See ECF Nos. 16-18, 16-19.) Tessier 2 forwarded these emails from his Bartech account to his personal email address in 3 January and March 2014, respectively. 8 As for the PMS source code, Tessier admitted 4 to authoring the code used by both Bartech and Mobile Simple, indicating that he had 5 ready access to the code as a Bartech employee. (See ECF No. 95 at 240-47, 266.) 6 Bartech has shown that Tessier acquired the source code, specifications, and customer 7 list through his role as a Bartech employee, which is a “circumstance[] giving rise to a 8 duty to maintain [the trade secrets’] secrecy or limit [their] use.” JustMed, Inc., 600 F.3d 9 at 1129. 10 The parties’ primary dispute is whether the source code that appears in the 11 ABreez PMS interface is similar enough to Bartech’s code to establish that Tessier used 12 or disclosed the trade secret. Bartech’s expert witness testified that, after examining the 13 ABreez source code alongside the Bartech source code, he concluded “[t]at the PMS 14 interface code in the Mobile Simple code base is substantially copied from the PMS 15 interface code in the Bartech code base.” (ECF No. 94 at 184.) More important, although 16 Defendants’ expert witness disagreed with the conclusion that Mobile Simple copied its 17 source code from Bartech, he nevertheless conceded that he saw “substantial 18 duplication” in the PMS interface codes. (ECF No. 95 at 274.) He ultimately testified that 19 there was “substantial similar[ity]” between the ABreez PMS source code and Bartech’s 20 analogous code. (Id. at 283-84.) Finally, Tessier admitted during the hearing that he 21 memorized at least some of Bartech’s source code and included it in the ABreez code. 22 (Id. at 246-47.) 23 In all, this evidence indicates that Defendants have gained an unfair advantage by 24 using Bartech’s source code to develop substantially similar software for the ABreez 25 PMS interface. Bartech’s evidence also demonstrates that Defendants could use the 26 /// 27 28 8 The Court finds Tessier’s explanations for why he forwarded these emails a few months before his resignation to be unpersuasive. 14 1 customer list and the PMS specifications to gain a competitive advantage over Bartech. 2 Bartech is therefore likely to succeed on the merits of its misappropriation claim. 3 C. Balance of the Equities 4 “To determine which way the balance of the hardships tips, a court must identify 5 the possible harm caused by the preliminary injunction against the possibility of the harm 6 caused by not issuing it.” Univ. of Haw. Prof’l Assembly v. Cayetano, 183 F.3d 1096, 7 1108 (9th Cir. 1999). The court must then weigh “the hardships of each party against 8 one another.” Id. 9 Defendants insist that a preliminary injunction would “put an unrecoverable 10 burden upon them” because their business could not function without the ability to sell 11 ABreez. (ECF No. 42 at 23; see ECF No. 95 at 62.) But Defendants also admit that 12 ABreez can function without the PMS interface. (ECF No. 42 at 12.) Indeed, Pigeat 13 testified during the hearing that as of April 2016, Mobile Simple had two customers who 14 had opted to use ABreez without a PMS interface. (ECF No. 95 at 64-65.) By contrast, 15 as discussed above, Bartech faces a likelihood of lost customers and consumer goodwill 16 if Defendants continue to create consumer confusion by marketing and selling ABreez in 17 its current state. Recognizing, however, that Defendants are in the initial stages of their 18 venture, the Court will narrowly tailor the injunctive relief to minimize harm to 19 Defendants. 20 D. Public Interest 21 The Ninth Circuit has explained that “[w]hen the reach of an injunction is narrow, 22 limited only to the parties, and has no impact on non-parties, the public interest will be ‘at 23 most a neutral factor in the analysis.’” Stormans, Inc. v. Selecky, 586 F.3d 1109, 1138- 24 39 (9th Cir. 2009) (quoting Bernhardt v. Los Angeles Cty., 339 F.3d 920, 931 (9th Cir. 25 2003)). But if an injunction has “a potential for public consequences, the public interest 26 will be relevant to whether the district court grants the preliminary injunction.” Id. at 1139. 27 Both parties assert that the public interest would be served by their respective 28 positions on the PI Motion. The preliminary injunction here, however, would be of limited 15 1 reach, requiring Defendants to stop any threatened or actual use of Bartech’s trade 2 secrets. To the extent that the injunction would affect non-parties — Mobile Simple’s 3 customers, for example — the Court finds that the public interest would be served by 4 injunction because consumer confusion would be minimized, and Bartech’s intellectual 5 property preserved. 6 E. 7 Because Bartech has established a likelihood of success on the merits, a 8 likelihood of irreparable harm, that the balance of the equities tips in its favor, and that 9 the public interest would favor an injunction, the Court finds that a preliminary injunction 10 Scope of the Injunction is appropriate. Winter, 555 U.S. at 20. 11 Bartech requests an injunction that would stop Defendants “from selling, leasing, 12 renting, or offering for sale, lease, rent, or subscription” any software or services that 13 contain Bartech’s trade secrets. (ECF No. 16 at 5.) The injunction would also require 14 Defendants 15 misappropriated materials to Bartech, and avoid further infringement or misappropriation 16 of Bartech’s intellectual property. (Id.) to notify their existing customers of the injunction, return any 17 The Court disagrees with the broad scope of Bartech’s requested relief. Instead, 18 to ensure that Defendants are not unfairly harmed by the injunction, the Court will tailor 19 the preliminary injunction as follows: 20 (1) Except as provided for in this Order, Defendants must not sell, lease, rent, or 21 offer for sale, lease, rent or subscription, to any future customers, any 22 software applications or services that contain Bartech’s source code or other 23 misappropriated trade secrets. Defendants may continue offering the ABreez 24 software to the approximately thirty customers who are using the software as 25 Pigeat testified. (ECF No. 95 at 62.) This provision does not cover any 26 current or future customers who utilize Defendants’ “stand alone solution” 27 /// 28 /// 16 1 (i.e. customers who use ABreez software applications without the PMS 2 interface).9 3 (2) Defendants must not possess, use, or disclose Bartech’s trade secrets or 4 other confidential or proprietary information, other than as described above. 5 (3) Within five (5) days, Defendants must return to Bartech the customer list, 6 source code, PMS specifications, and any other confidential or proprietary 7 information that Defendants obtained from Bartech. Defendants must file a 8 status report with the Court that certifies the return of these materials. 9 (4) During the pendency of this action, Defendants must not misappropriate any 10 of Bartech’s trade secrets in violation of NRS § 600A et seq., or infringe on 11 any of Bartech’s copyrighted works in violation of 17 U.S.C. § 101 et seq. 12 V. CONCLUSION 13 It is therefore ordered that Plaintiff’s Motion for Preliminary Injunction (ECF Nos. 14 16, 67, 87) is granted in part. During the pendency of this action, Defendants must 15 comply with the preliminary injunction described in Section IV.E of this Order. 16 17 18 It is further ordered that Defendants’ Motion to File an Errata to their opposition to the Motion for Preliminary Injunction (ECF No. 41) is granted. DATED THIS 24th day of May 2016 19 20 21 MIRANDA M. DU UNITED STATES DISTRICT JUDGE 22 23 24 25 26 27 28 9 Defendants represent that they currently have two customers in this category. (ECF No. 95 at 64.) 17

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?