Next Communications, Inc. et al v. Viber Media, Inc.
Filing
149
OPINION AND ORDER. For the reasons stated above, IT IS HEREBY ORDERED THAT Defendant's motion for summary judgment is GRANTED, and Defendant's motions for sanctions and fees are DENIED. The Clerk of the Court is respectfully directed to ter minate the motion pending at docket number 111, enter judgment for Defendant, and close this case. SO ORDERED. re: 111 MOTION for Summary Judgment and for Sanctions filed by Viber Media, Inc. (Signed by Judge Richard J. Sullivan on 9/30/2017) (rjm)
videoconferencing: (1) NxtGn Proprietary
Services, an allegedly “unique combination
of networking hardware, signaling servers,
and proprietary software” that enables
mobile devices to participate in highdefinition videoconference calls; (2) the
NxtGen App, which allegedly “uses a
proprietary process to scale individual
routers, which allows millions of people to
connect simultaneously to the same
videoconferencing feed”; and (3) the
Celebrity Event Management business idea,
which envisioned “millions of simultaneous
users . . . participat[ing] in an interactive
videoconference with a celebrity from any
device.” (Doc. No. 67, Amended Complaint
(“Am. Compl.”) ¶¶ 10, 13, 17, 87.)
Frenklakh met again at another trade show
in May 2013, where Maimon gave
Frenklakh a hard copy of a third PowerPoint
presentation titled “NxtGn HD Video Cloud
Platform (2013).” (Id. ¶¶ 14–15.) A month
later,
Maimon
gave
Frenklakh
a
demonstration of the still-unfinished NxtGen
App. (Id. ¶ 19.) Maimon and Frenklakh
also participated in a June 13, 2013
conference call with several representatives
from Next, Viber, and Telarix, one of Next’s
technology partners, to discuss Next’s and
Telarix’s videoconferencing solutions. (Id.
¶¶ 20–22.) According to Maimon, Viber’s
representatives seemed more interested in
Next’s NxtGn Proprietary Services than in
Telarix’s solution. (Id. ¶ 22.) Shortly after
this meeting, however, Viber stopped
communicating with Next for about seven
months. (Id. ¶ 26.)
Next and Viber, the maker of a widely
used mobile VoIP app, both attended a trade
show in May of 2012, at which Viber
employee Arie Frenklakh spoke with Next
CEO Arik Maimon about Next’s
videoconferencing technology. (Doc. No.
138 (“Maimon Decl.”) ¶¶ 5–7.) A month
later, Next and Viber entered into a
Nondisclosure
and
Confidentiality
Agreement (“NDA”) “in order to facilitate a
possible business transaction.” (Def. 56.1 ¶¶
9–10; Maimon Decl. ¶ 9.) The NDA
prohibited the disclosure of proprietary
information to third parties and defined
“proprietary
information”
to
mean
information designated as proprietary by the
disclosing party and not generally known to
the public. (Def. 56.1 ¶ 14.)
In January of 2014, Frenklakh and
Maimon met again in Miami. (Id. ¶ 27.) A
month later, Maimon learned that Viber had
been acquired by Rakuten, Inc., a Japanese
online retailer. (Id. ¶ 28.) Shortly after the
acquisition, Maimon had lunch with a Viber
shareholder, who described “an unfinished
feature in Viber’s app” that Maimon thought
sounded “nearly identical to a presentation
[he] had given to Viber regarding NxtGn
[Proprietary Services’] videoconferencing
capabilities” and was “subject to [the
parties’] NDA.” (Id. ¶¶ 29–30, 32.)
B. Procedural History
Next commenced this action on October
14, 2014, alleging that Viber was “using the
information it learned about the NxtGn
Proprietary Services to develop its own
advanced videoconferencing technology,”
and that Viber had taken a step toward
implementing its own version of Next’s
Celebrity Event Management business idea.
(Am. Compl. ¶¶ 54, 56–57.)
More
In November of 2012, Frenklakh visited
Next’s Miami offices to learn more about
Next’s
videoconferencing
solutions.
(Maimon Decl. ¶¶ 11.) After a meeting with
Next’s engineering team, Maimon gave
Frenklakh hard copies of two PowerPoint
presentations, titled “Technology Offerings
– NxtGn – 2012” and “NxtGn HD Video
Cloud Platform.” (Id. ¶ 13.) Maimon and
2
specifically, Next’s Amended Complaint
asserted four claims: (1) misappropriation
of trade secrets; (2) misappropriation of a
business idea; (3) breach of contract; and (4)
unjust enrichment. (Doc. No. 54.) On
March 30, 2016, the Court granted Viber’s
motion to dismiss with respect to the claim
for misappropriation of a business idea but
denied it with respect to the other three
claims. (Doc. No. 72.) The Court then
issued a scheduling order requiring the
parties to participate in “Phase I” of
discovery, during which Next had to
produce to Viber “all materials and
information [that it alleged] (i) were
disclosed and/or provided to Viber, and (ii)
contain and/or constitute trade secrets or
confidential
information
of
[Next],
including, without limitation, the alleged
Proprietary
Information,
the
NxtGn
Proprietary Technology, the NxtGn App,
and the Celebrity Event Management
business idea.” (Doc. No. 87 ¶ 9.) The
order added, “[Next] shall identify with
particularity in writing to Viber which parts,
if any, of the Phase I Production constitute
Proprietary Information or trade secrets.”
(Id. ¶ 10 (emphasis added).)
Yurchenko Declaration as the only pages of
[Next’s] Phase I Production [that Next]
contend[s]
contain
[p]roprietary
[i]nformation or trade secrets.” (Id. ¶ 45.)2
Phase I discovery closed on August 23,
2016, and on October 11, 2016, Viber
moved for summary judgment on the ground
that the materials contained in Next’s Phase
I production did not include any trade
secrets or proprietary information within the
meaning of the parties’ NDA. (Doc. No.
111.) After Next’s counsel withdrew on
November 28, 2016, the Court granted Next
an extension of time until February 6, 2017
to retain new counsel and submit its
opposition. (Doc. Nos. 126, 129, 132.) The
motion was fully submitted on February 16,
2017. (Doc. No. 144.)
II. LEGAL STANDARD
Under Rule 56(a) of the Federal Rules of
Civil Procedure, “[t]he court shall grant
summary judgment if the movant shows that
there is no genuine dispute as to any
material fact and the movant is entitled to
judgment as a matter of law.” Fed. R. Civ.
P. 56(a). There is “no genuine dispute as to
any material fact” where (1) the parties
agree on all facts (that is, there are no
disputed facts); (2) the parties disagree on
some or all facts, but a reasonable factfinder could never accept the nonmoving
party’s version of the facts (that is, there are
On June 30, 2016, Next completed its
Phase I production, which consisted of email
correspondence, several PowerPoint slide
decks, and declarations from Maimon and
Next technical advisor Vitaliy Yurchenko.
(Def. 56.1 ¶¶ 5–6, 16.) Pursuant to the
scheduling order, Viber then deposed Next’s
Rule 30(b)(6) witness, Michael De Prado,
the company’s President and Chief
Operating Officer. (Id. ¶ 5; Doc. No. 114-2
at 5 (“De Prado Tr.”)) At his deposition, De
Prado identified the particular pages of the
Phase I production that Next alleges contain
or constitute trade secrets or proprietary
information within the meaning of the NDA.
(Def. 56.1 ¶ 17.) Specifically, De Prado
“identified the [s]lide [d]ecks and the
2
The slide decks De Prado identified include (1) a
PowerPoint presentation marked “Telarix Proprietary
and Confidential,” (2) a PowerPoint presentation
titled
“NxtGn:
Elegant,
efficient
Telecommunications Platforms for PTTs, Telcos,
Network Operators, and Enterprises,” which has a
confidentiality marking on only one page, (3) a
PowerPoint presentation titled “2012 NxtGn
Technology
Offerings”
(marked
“highly
confidential”), and (4) a PowerPoint presentation
titled “NxtGn HD Video Cloud Platform (2013).”
(Id. ¶ 53.)
3
no genuinely disputed facts), see Matsushita
Elec. Indus. Co., Ltd. v. Zenith Radio Corp.,
475 U.S. 574, 587 (1986); or (3) the parties
disagree on some or all facts, but even on
the nonmoving party’s version of the facts,
the moving party would win as a matter of
law (that is, none of the factual disputes are
material), see Anderson v. Liberty Lobby,
Inc., 477 U.S. 242, 248 (1986).
III. DISCUSSION
Viber now moves for summary
judgment on each of Next’s three causes of
action – misappropriation of trade secrets,
breach of contract, and unjust enrichment –
as well as for sanctions and attorney’s fees.
A. Misappropriation of Trade Secrets
To succeed on a claim for
misappropriation of trade secrets under New
York law,3 a party must show “(1) that it
possessed a trade secret, and (2) that the
defendants used that trade secret in breach
of an agreement, confidential relationship or
duty, or as a result of discovery by improper
means.” Faiveley Transp. Malmo AB v.
Wabtec Corp., 559 F.3d 110, 117 (2d Cir.
2009) (citation omitted).
The parties’
dispute here focuses almost entirely on the
first element, whether Next possessed a
trade secret.
In determining whether a fact is
genuinely disputed, the court “is not to
weigh the evidence but is instead required to
view the evidence in the light most
favorable to the party opposing summary
judgment, to draw all reasonable inferences
in favor of that party, and to eschew
credibility assessments.” Weyant v. Okst,
101 F.3d 845, 854 (2d Cir. 1996).
Nevertheless, to show a genuine dispute, the
nonmoving party must provide “hard
evidence,” D’Amico v. City of N.Y., 132
F.3d 145, 149 (2d Cir. 1998), “from which a
reasonable inference in [its] favor may be
drawn,” Binder & Binder PC v. Barnhart,
481 F.3d 141, 148 (2d Cir. 2007) (internal
quotation marks omitted).
“Conclusory
allegations, conjecture, and speculation,”
Kerzer v. Kingly Mfg., 156 F.3d 396, 400
(2d Cir. 1998), as well as the existence of a
mere “scintilla of evidence in support of the
[nonmoving party’s] position,” Anderson,
477 U.S. at 252, are insufficient to create a
genuinely disputed fact. A moving party is
“entitled to judgment as a matter of law” on
an issue if (1) it bears the burden of proof on
the issue and the undisputed facts meet that
burden; or (2) the nonmoving party bears the
burden of proof on the issue and the moving
party “‘show[s]’ – that is, point[s] out . . . –
that there is an absence of evidence [in the
record] to support the nonmoving party’s
[position].” Celotex Corp. v. Catrett, 477
U.S. 317, 325 (1986).
“A trade secret is any formula, pattern,
device or compilation of information which
is used in one’s business, and which gives
the owner an opportunity to obtain an
advantage over competitors who do not
know or use it.” Id. (citation omitted).
Under New York law, “a trade secret can
exist in a combination of characteristics and
components, each of which, by itself, is in
the public domain, but the unified process,
design and operation of which, in unique
3
Since both parties rely on New York law in their
briefs, and since the NDA contains a New York
choice-of-law provision, the Court applies New York
law to Next’s claims. See Krumme v. West Point,
238 F.3d 133, 138 (2d Cir. 2000); Clarex Ltd. v.
Natixis Sec. Am. LLC, No. 12-cv-7908 (PAE), 2013
WL 2631043, at *2 (S.D.N.Y. June 11, 2013)
(“Where “[t]he parties’ briefs assume that New York
law controls . . . such ‘implied consent . . . is
sufficient to establish choice of law.’” (quoting
Wolfson v. Bruno, 844 F. Supp. 2d 348, 354
(S.D.N.Y. 2011))).
4
combination,
affords
a
competitive
advantage and is a protectable secret.”
Integrated Cash Mgmt. Serv., Inc. v. Dig.
Transactions, Inc., 920 F.2d 171, 174 (2d
Cir. 1990) (citation omitted). A trade secret
claimant must, however, “describe the secret
with sufficient specificity that its
protectability can be assessed and to show
that its compilation is unique.” Sit-Up Ltd.
v. IAC/InterActiveCorp., No. 05-cv-9292
(DLC), 2008 WL 463884, at *10 (S.D.N.Y.
Feb. 20, 2008); see Heyman v. AR.
Winarick, Inc., 325 F.2d 584, 590 (2d Cir.
1963). In addition, New York courts have
approvingly cited the First Restatement’s list
of suggested factors to help determine
whether information constitutes a trade
secret, e.g., id., which includes:
Lehman v. Dow Jones & Co., 783 F.2d 285,
298 (2d Cir. 1986).
Having considered the materials
produced in Phase I of discovery, the Court
finds that Viber is entitled to judgment as a
matter of law on Next’s first cause of action,
since Next has failed both to identify its
alleged trade secrets with sufficient
specificity and to adduce adequate evidence
that its information was in fact secret.
First, Next must demonstrate with
particularity the trade secrets that it
allegedly disclosed to Viber.
At the
pleading stage, “specificity as to the precise
trade secrets misappropriated is not
required.” Medtech Prods. Inc. v. Ranir,
LLC, 596 F. Supp. 2d 778, 789 (S.D.N.Y.
2008).
In order to survive summary
judgment, however, the plaintiff must
describe the secrets with greater precision;
“vague and indefinite” illustrations will not
suffice. Big Vision Private Ltd. v. E.I.
DuPont De Nemours & Co., 1 F. Supp. 3d
224, 257 (S.D.N.Y. 2014) (citing Heyman,
325 F.2d at 588–90); Sit-Up, 2008 WL
463884, at *9–10. Although Next’s general
descriptions of its alleged secrets were
enough to survive a motion to dismiss, the
purpose of Phase I discovery in this case
was for Next to identify those secrets more
specifically. (See Doc. No. 87 ¶¶ 9–10.)
(1) the extent to which the
information is known outside of the
business; (2) the extent to which it is
known by employees and others
involved in the business; (3) the
extent of measures taken by the
business to guard the secrecy of the
information; (4) the value of the
information to the business and its
competitors; (5) the amount of effort
or money expended by the business
in developing the information; (6)
the ease or difficulty with which the
information could be properly
acquired or duplicated by others.
As an initial matter, Next seems not to
have been entirely consistent in how it has
characterized its putative secrets. At the
motion-to-dismiss stage, Next identified
NxtGn Proprietary Services, the NxtGen
App, and Celebrity Event Management as
the bases for its trade-secret claim. During
Phase I of discovery, however, Next
identified its putative secrets as the “GSMIP Mobile Network,” “Secure Financial
Network,” and “HD Video Cloud
Architecture” – as reflected in three slide
Restatement (First) of Torts § 757, cmt b;
see also Ashland Mgmt. Inc. v. Janien, 82
N.Y.2d 395, 407 (1993) (“There is no
generally accepted definition of a trade
secret[,] but that found in section 757 of
Restatement of Torts, comment b has been
cited with approval by this and other
courts.”) The first factor, of course, is
crucial: “the most important consideration
[is] whether the information was secret.”
5
decks:
“2012
NxtGn
Technology
Offerings,” “NxtGn HD Video Cloud,” and
“NxtGn HD Video Cloud 2013.” (Def. 56.1
¶¶ 17, 18, 19, 42, 45, 47; Pl. 56.1 ¶¶ 18, 19,
42, 45, 47, 58; Maimon Decl. ¶ 4; Doc. No.
114-6 (“Yurchenko Decl.”)). In its response
to Viber’s statement of material facts, Next
concedes that the GSM-IP Mobile Network
and the Secure Financial Network are
components that Next identified as trade
secrets for the first time during Phase I
discovery. (Def. 56.1 ¶ 42; Pl. 56.1 ¶ 42.)
But none of the three components are named
in Next’s Amended Complaint. Nor does
the complaint reveal the titles of the
supposedly crucial slide presentations that,
Next now alleges, contain Next’s trade
secrets and proprietary information. The
complaint does allege that Next’s partner,
Telarix, sent Viber two presentations that
contained Next’s confidential information,
but whether those presentations contained
the slides now at issue is unclear. Thus,
Next appears to have presented Viber with a
moving target.
pages 14 and 15 of “2012 NxtGn
Technology Offerings”) is “designed in a
way that software-defined radio controls
sending/receiving electronics in [Base
Transceiver System] and all other functions
are done via [Session Initiation Protocol]
infrastructure,” which “reduces cost . . .
while preserving all expected functions.”
(Yurchenko Decl. ¶ 6.) But Yurchenko fails
to identify what specific aspects of this
design are supposedly unique, valuable, and
secret. See Sit-Up, 2008 WL 463884, at
*10.
Meanwhile, Viber has produced
undisputed evidence that the diagram on
page 14 of the presentation is “virtually
identical” to a diagram that is publicly
available online from a third party, Range
Networks, Inc., in a user manual bearing a
2011 copyright designation. (See Def. 56.1
¶ 62; Doc. No. 114-1)
As already
established, “a trade secret can exist in a
combination
of
characteristics
and
components, each of which, by itself, is in
the public domain, but the unified process,
design and operation of which, in unique
combination,
affords
a
competitive
advantage and is a protectable secret.”
Integrated Cash Mgmt., 920 F.2d at 174.
But it is equally clear that “information that
is public knowledge or that is generally
known in an industry cannot be a trade
secret,” including information that is
available in publications. Ruckelshaus v.
Monsanto Co., 467 U.S. 986, 1002 (1984)
(internal citation omitted); Speedry Chem.
Prod., Inc. v. Carter's Ink Co., 306 F.2d 328,
331 (2d Cir. 1962) (“Matters of . . . general
knowledge in an industry cannot be
appropriated by one as his secret.” (internal
citation omitted)). Significantly, Yurchenko
does not explain how, if at all, the diagrams
on pages 14 and 15 combine to form a trade
secret. This failure is fatal, since “New
York and Second Circuit law establish that
compilation trade secrets are protectable but
. . . the law requires the trade secret claimant
To make matters worse, Next’s Phase I
discovery materials offer little clarification
about how the GSM-IP Mobile Network,
Secure Financial Network, and HD Video
Cloud Architecture, alone or in combination,
constitute trade secrets. To begin with, the
slide decks themselves merely consist of
vague descriptions and rudimentary graphics
and concepts; they neither describe trade
secrets with particularity nor explain how
various components fit together to form
compilation
trade
secrets.
Perhaps
recognizing this problem, Next also
provided an affidavit from its technical
advisor, Yurchenko, which purports to
interpret the information in the slides. But
those interpretations are hardly illuminating.
For example, according to Yurchenko, the
GSM-IP Mobile Network (allegedly
depicted in two cartoonish diagrams on
6
to describe the secret with sufficient
specificity that its protectability can be
assessed and to show that its compilation is
unique.’’ Sit–Up, 2008 WL 463884, at *10.
what protected materials were disclosed to
Viber during the relevant time period.
Logically, to make out a claim for the
misappropriation of a trade secret, a plaintiff
must show not only that it possessed a secret
but that the secret was misappropriated. See
Faiveley Transp. Malmo AB, 559 F.3d at
116–17. That requires identifying “the route
through which [the alleged secret] was
provided to the defendants.” Sit-Up, 2008
WL 463884, at *8. Here, Next does not
contend that its alleged secrets were readily
ascertainable from the slides themselves,
which consist only of elementary diagrams
and barebones descriptions. (See, e.g., Doc.
No. 114-12.) And Next concedes that
Yurchenko himself never had direct
communication or contact with Viber. (Def.
56.1 ¶ 26.)
Yurchenko’s Declaration
purports to “detail the information found” in
the slide presentations, but does not
represent that he gave that information to
Viber. (Yurchenko Decl. ¶ 3.) According to
De Prado, Yurchenko did not speak Hebrew,
so Next’s primary liaisons to Viber were
two Hebrew-speaking technologists, Ariel
Dayan and Yitzhak Greenberg. (Def. 56.1
¶¶ 26—27.) In his deposition, De Prado
ultimately conceded that he had no direct
knowledge of what Yurchenko said to
Greenberg and Dayan, or what they in turn
told Viber, because De Prado never
participated in those conversations. (See id.
¶ 25.) Thus, although De Prado testified
that the “ideas and abstracts” referenced in
the Yurchenko Declaration were conveyed
to Viber (De Prado Tr. at 147), that appears
to be mere speculation.
As for the Secure Financial Network and
HD Video Cloud Architecture, Yurchenko’s
descriptions are similarly unilluminating.
Regarding the Secure Financial Network, for
instance,
Yurchenko
states
that
“[e]ncapsulation of multiple encryptions,
one inside of another, creates unique type
[sic] of secure networks, which insures the
security
of
financial
transitions.”
(Yurchenko Decl. ¶ 12.) But that general
description does not reveal how the
encryptions are encapsulated, what elements
of that process (if any) are secret or
proprietary, or how those elements “in
unique combination, afford[] a competitive
advantage.” Integrated Cash Mgmt., 920
F.2d at 174; see BondPro Corp. v. Siemens
Power Gen., Inc., 463 F.3d 702, 710 (7th
Cir. 2006) (“One expects a trade secret to be
rich in detail, because a process described in
general terms [...] will usually be widely
known and thus not worth incurring costs to
try to conceal and so not a trade secret.”).
Regarding
the
HD
Video
Cloud
Architecture, Yurchenko describes a “video
router” that “produces several types of audio
or video streams, rather than a single one,
alleviating congestion.” (Yurchenko Decl. ¶
16). But again, Yurchenko does not explain
how the video router does this, or what
aspects of that process, if any, are unique
and therefore protectable. And finally,
Yurchenko offers no hint of how, if at all,
the GSM-IP Mobile Network, Secure
Financial Network, and HD Video Cloud
Architecture function together as a unique,
competitively advantageous compilation.
Obscuring matters even further, Next’s
opposition brief reflects yet another
evolution in Next’s trade-secret claim.
There, Next makes only a passing reference
to Yurchenko and instead zeroes in on a
single, allegedly “crucial slide” that
supposedly demonstrates Next’s “secret
Furthermore, even if Yurchenko had
described Next’s alleged secrets with
adequate specificity, Next has not shown
7
recipe” for “teleconferencing with upwards
of 10,000 individuals . . . with the ability to
monetize[.]” (Pl. Opp’n at 6 (citing Doc.
No. 114-12 at 30).)
The slide itself,
however, merely depicts a simplistic
diagram illustrating connections between
various
telecommunications
devices.
Relying on another post-hoc exegesis, this
time from expert Roger Marks, Next
conclusorily asserts that this slide contains a
“unique blueprint” for a concept allegedly
“so novel no one else has previously been
capable of performing [sic].” (Pl. Opp’n at
7.) According to Next, this network design
is unique because it uses a “completely
different module (video router), but utilizes
[it] in a way not traditionally applied or
known to be applied previously.” (Id.) But
Next does not specify what that “way” is or
how that “way” can be ascertained from the
generic graphics on the slides.
billing indicates an approach that is
not a typical [sic] in the
videoconference and video delivery
business. Some providers use other
models; for example, I earlier
referenced information indicating
that the Vidyo business is or was
based on charges for hardware and
for an annual per-line access license.
(Pl. Opp’n at 8.) But the slide, which
consists merely of an array of icons
clustered in blue and yellow boxes, neither
demonstrates how Next generates “Call
Detail Records” nor how Next uses CDRs
to monetize its videoconferencing products.
And obviously, Marks’s “belief” that
Next’s focus on accounting and billing is
“not typical” because “some providers use
other models” is hardly evidence of a trade
secret – that is, a unique formula generally
unknown in the industry, Big Vision, 1 F.
Supp. 3d at 259 – much less one that was
actually conveyed to Viber.
Next also briefly discusses another slide,
which supposedly depicts a “novel and
distinctive business model associated with
the telecommunications system.” (Id. at 8.)
To support that claim, Next relies solely on
the following quotation from Marks:
In sum, after more than two years of
litigation, including several months of Phase
I discovery in which the Court ordered Next
to define its alleged trade secrets with the
required particularity (Doc. No. 87), Next
still has not done so. The contours of Next’s
alleged secrets, and the means by which they
were supposedly conveyed to Viber, remain
“vague and indefinite.” Big Vision, 1 F.
Supp. 3d at 270. Meanwhile, as Viber
justifiably complains, the Court and the
parties have been forced to play a game of
trade-secret “whack-a-mole.” (Def. Mem. at
24); see Big Vision, 1 F. Supp. 3d at 263 (“It
does not require a [science] degree to realize
that the putative trade secret has differed
meaningfully and materially throughout the
litigation.”) Next offers no reason why that
game should continue – only more evasion
and obfuscation. Thus, Viber is entitled to
This slides [sic] . . . indicate [sic]
that Payments and Accounting SVC
are part of the Accounting and CDR
Service Clusters, which includes
“CDRs.” In the telecommunication
industry, “CDR” is understood to
mean “Call Detail Record, which is a
record of a service event typically
used as the basis of billing. The
generation of CDRs is essential to
the development of traditional prepaid and post-paid billing services.
Thus, the technical capability to
generate CDRs underlies various
opportunities to monetize the
network capabilities. I believe that
this focus on service accounting and
8
summary judgment on Next’s trade-secret
misappropriation claim.
unavailable
information
designated as proprietary.
B. Breach of Contract
that
Next
The parties do not dispute that the NDA
is a valid contract, so the only question is
whether Viber violated its terms. In its
complaint, Next alleged that Viber breached
the NDA in two ways. First, Next alleged,
Viber “used the Proprietary Information to
develop
its
own
advanced
videoconferencing technology like that
found in the NxtGn App.” Second, Viber
allegedly
“shar[ed]
the
Proprietary
Information with Rakuten before Rakuten
acquired Viber.” (Am. Comp. ¶¶ 67-68.)
Next brings a similar claim against Viber
on a breach-of-contract theory.
The
elements of breach of contract are: “(1) the
existence of a contract, (2) performance by
the party seeking recovery, (3) nonperformance by the other party, and (4)
damages attributable to the breach.” RCN
Telecom Servs., Inc. v. 202 Centre St. Realty
LLC, 156 F. App’x 349, 350–51 (2d Cir.
2005) (citation omitted). “Because [Next]
must prove each of these elements, the
absence of a genuine issue of material fact”
as to whether Next has established “any one
of them will require an award of summary
judgment in favor of [Viber.]” Marks v.
N.Y. Univ., 61 F. Supp. 2d 81, 88–89
(S.D.N.Y. 1999).
As with Next’s putative trade secrets,
however, Next still has not identified
precisely what proprietary information Viber
(1) allegedly received and (2) used or
transferred to a third party. De Prado,
Next’s 30(b)(6) witness, testified in his
deposition that the only pages of Next’s
Phase I production that contain proprietary
information or trade secrets are the slide
presentations
and
the
Yurchenko
Declaration. (Def. 56.1 ¶ 45.) As discussed
above, the slide presentations contain only
rudimentary
graphics
and
vague
descriptions. Next has not identified what
specific information in those presentations is
“not generally available to the public” (Doc.
No. 67-1 at 1).
For example, in its
complaint, Next alleged that the NxGn App
“is not currently available for use by the
general public” and “cannot be used without
a code that is provided by Next.” (Am.
Comp. ¶¶ 16, 35.) As Viber points out,
however, Next now appears to concede that
the NxtGn App has been publicly available
for download “99 percent of the time” since
around 2012, the year before Next
demonstrated the NxGn App to Viber. (See
Def. 56.1 ¶ 72; Am. Compl. ¶ 35.) In his
deposition, De Prado acknowledged that
people who downloaded the app could “use
Here, the contract at issue is the NonDisclosure Agreement, which purports to
govern the exchange of “Proprietary
Information” between Next and Viber. (See
Doc. No. 67-1 at 2.)
“Proprietary
Information” is defined as “that Information
which the Party disclosing such Information
(hereinafter the “Disclosing Party”) desires
to protect against unrestricted disclosure or
competitive use, which is not generally
available to the public and which the
Disclosing Party designates as such.” (Doc.
No. 54-1 at 1.) Under the terms of the
NDA, Viber was authorized to “[u]se the
Proprietary Information . . . only for the
purposes directly related to the purpose
expressed herein above and for no other
purposes.” (Id. at 2.) The NDA defines its
purpose as “assessing possible business
transactions between the Parties.” (Id. at 1.)
Thus, as relevant here, the NDA prohibited
Viber from disclosing to third parties, or
using in its own business, any publicly
9
it and see how it would work.” (Doc. No.
114-4 at 204.) To be sure, Next could
conceivably have showed Viber features of
the app that were unavailable to the public,
but Next has produced no “hard evidence”
to that effect, D’Amico, 132 F.3d at 149,
“from which a reasonable inference in
[Next’s] favor may be drawn,” Binder &
Binder, 481 F.3d at 148.
permitting [Viber] to retain what [Next] is
seeking to recover.” Ashland Inc. v. Morgan
Stanley & Co., 652 F.3d 333, 339 (2d Cir.
2011) (citation omitted). However, “when a
valid agreement governs the subject matter
of a dispute between parties, claims arising
from that dispute are contractual; attempts to
repackage them as sounding in . . . unjust
enrichment . . . are generally precluded,
unless based on a duty independent of the
contract.”
Poplar Lane Farm LLC v.
Fathers of Our Lady of Mercy, 449 F. App’x
57, 59 (2d Cir. 2011). Nonetheless, a claim
for unjust enrichment may still proceed
“where there is a bona fide dispute as to the
existence of a contract or where the contract
does not cover the dispute in issue.” Id.
(citation omitted).
Nor has Next shown how Viber
allegedly used proprietary information for
an impermissible purpose (e.g., enhancing
its own videoconferencing technology).
Next’s CEO, Maimon, stated in an affidavit
that in 2014 he observed a Viber investor
describing an “unfinished feature” on
Viber’s app in a way that sounded “nearly
identical to a presentation [Maimon] had
given to Viber regarding NxtGn’s
videoconferencing capabilities[.]” (Maimon
Decl. ¶ 30.)
Based on that vague
observation – which does not even identify
the presentation – Maimon concludes that
Viber must have stolen technology from
Next in violation of the NDA. (See id. ¶¶
31–32.) But such “[c]onclusory allegations,
conjecture, and speculation” cannot raise a
genuine dispute of material fact at this stage
of a litigation. Kerzer, 156 F.3d at 400.
Here, Next asserts vaguely that Viber
enriched itself at Next’s expense by
appropriating a “secret . . . of value.” (Pl.
Opp’n at 10.) But Next does not appear to
contest that any dispute regarding Viber’s
alleged misappropriation of secrets or
proprietary information is covered by a
contract – namely, the non-disclosure
agreement. Nor does Next contend that
Viber is bound by a “duty independent” of
that agreement. Poplar Lane, 449 F. App’x
at 59. Thus, Next’s attempt to repackage its
contractual claim as a claim for unjust
enrichment must fail. See id. Moreover, to
the extent that the dispute here falls outside
the scope of the non-disclosure agreement,
Next must still demonstrate specifically how
“[Viber] was enriched . . . at Next’s
expense.” Ashland Inc., 652 F.3d at 339.
Next has not done so. Because, as noted
above, Next cannot identify any trade
secrets or proprietary information with
sufficient particularity, it cannot adequately
identify an unjustly appropriated benefit.
Thus, Next’s unjust-enrichment claim fails.
In sum, Next has failed to provide
adequate support for its claim that Viber
breached the NDA by using Next’s
proprietary information in its own business
or disclosed that information to third parties.
The Court therefore grants summary
judgment to Viber on Next’s breach-ofcontract claim.
C. Unjust Enrichment
To prevail on its unjust enrichment claim
under New York law, Next must
demonstrate that:
“(1) [Viber] was
enriched, (2) at [Next’s] expense, and (3)
equity and good conscience militate against
10
D. Attorneys’ Fees and Sanctions
within the ambit of Rule 11, not Rule 37.
See Cooter & Gell v. Hartmarx Corp., 496
U.S. 384, 393 (1990) (noting that “the
central purpose of Rule 11 is to deter
baseless filings in district court”)
Accordingly, since Viber does not cite any
basis for sanctions other than Rule 37, which
is inapposite, the Court denies Viber’s
sanctions motion.
Having prevailed in this lawsuit, Viber
urges the Court to impose sanctions on Next
under Rule 37 of the Federal Rules of Civil
Procedure. (Def. Mem. at 34–35.) See Fed.
R. Civ. P. 37. Specifically, Viber requests
“dismissal of this [a]ction in its entirety with
prejudice” and “all of [Viber’s] attorneys’
fees and costs incurred in defending against
the [a]ction.” (Def. Mem. at 35.) The Court
has already held that Viber is entitled to
summary judgment on all of Next’s claims,
so that leaves only Viber’s request for fees
and costs.
Viber also contends that it is entitled to
its attorneys’ fees, costs, and expenses
pursuant to a fee-shifting provision in the
NDA. In relevant part, Paragraph 11 of the
NDA provides that “[i]f any action at law or
in equity is necessary to enforce or interpret
the terms of this Agreement, the prevailing
party shall be entitled to reasonable
attorney’s fees and paralegal fees, costs and
expenses[.]” (Doc. 67-1 at 3–4.) This case
appears to fall within the plain terms of that
provision, and indeed, Next does not appear
to contend otherwise. (See generally Pl.
Opp’n.) And where “a contract authorizes
an award of attorneys’ fees,” as the NDA
does here, such an award is mandatory.
McGuire v. Russell Miller, Inc., 1 F.3d
1306, 1313 (2d Cir. 1993). However, since
the fee-shifting provision here is contractual,
and since the Court is only now granting
summary judgment to Viber, Viber’s request
for fees under the NDA is premature. As of
this moment, neither party has had the
opportunity to exercise its rights under the
fee-shifting provision, and neither party is in
breach of that provision. Cf. Bellevue v.
Kafka, No. 92 C 4589, 1994 WL 127213, at
*2 (N.D. Ill. Apr. 7, 1994) (declining to treat
a claim for attorney’s fees as a compulsory
counterclaim because the claim was
“premature until after the original suit was
adjudicated”). Accordingly, if Viber wishes
to seek attorney’s fees pursuant to the NDA,
it should first demand them from Next; if
Next refuses the demand, then Viber may
file a complaint for breach of the fee-
Viber contends that Rule 37 sanctions
are appropriate here because, in Viber’s
view, “Plaintiffs have wasted this Court’s
resources and caused Viber to spend many
tens of thousands of dollars . . . to deal with
this frivolous lawsuit,” which was
“commenced and pursued . . . in bad faith.”
(Def. Mem. at 34–35.) Rule 37, however,
addresses sanctions for discovery violations.
See Roadway Exp., Inc. v. Piper, 447 U.S.
752, 763 (1980). And while it could be
argued that Next’s shifting theories of tradesecret misappropriation constituted a
discovery violation, since they persisted
throughout Phase I discovery, Viber’s
grievances seem more appropriate for a
motion pursuant to Rule 11, 28 U.S.C. §
1927, or the courts’ “inherent power to
control their own proceedings,” which
“includes the power to impose appropriate
monetary sanctions on counsel or a litigant,
including the assessment of attorney[s’]
fees.” Baker v. Urban Outfitters, Inc., 431
F. Supp. 2d 351, 362 (S.D.N.Y. 2006), aff’d,
249 F. App’x 845 (2d Cir. 2007) (citing
Chambers v. NASCO, Inc., 501 U.S. 32, 44–
45 (1991)). Indeed, Viber is principally
challenging Next’s good-faith belief at the
outset of this litigation that its claims were
not groundless, a charge that clearly falls
11
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?