Paysys International, Inc. v. Atos Se et al
Filing
231
OPINION & ORDER re: 163 MOTION for Summary Judgment ON TRADE SECRET MISAPPROPRIATION CLAIMS, filed by Sema SA, Atos IT Services Ltd., Atos Se, Worldline SA. For the reasons set forth above, the Court GRANTS defendants' moti on for summary judgment with regard to plaintiff's trade secret claims. Accordingly, the Second and Third Causes of Action are dismissed. The Clerk of Court is directed to terminate the motion at ECF No. 163. (Signed by Judge Katherine B. Forrest on 12/5/2016) (cla)
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
------------------------------------------------------------------ X
:
PAYSYS INTERNATIONAL, INC.,
:
:
Plaintiff,
:
:
-v:
:
ATOS SE, WORLDLINE SA, ATOS IT
:
SERVICES LTD.,
:
:
Defendants.
:
:
------------------------------------------------------------------ :
:
ATOS SE, WORLDLINE SA, ATOS IT
:
:
SERVICES LTD.,
:
Counterclaim :
:
Plaintiffs,
:
-v:
PAYSYS INTERNATIONAL, INC. and FIRST :
:
DATA CORPORATION,
:
Counterclaim :
:
Defendants.
------------------------------------------------------------------ X
USDC SDNY
DOCUMENT
ELECTRONICALLY FILED
DOC #: _________________
DATE FILED: December 5, 2016
14-cv-10105 (KBF)
OPINION & ORDER
KATHERINE B. FORREST, United States District Judge:
This action concerns claims by PaySys International, Inc. (“PaySys”) that a
licensee of its software has exceeded the bounds of its license agreement. PaySys has
alleged ten separate causes of action against the licensee and its affiliates for, inter
alia, breach of the license agreement, misappropriation of trade secrets, copyright
infringement and other state law claims. (ECF No. 103.) Various prior decisions by
1
this Court have narrowed those claims. This Opinion & Order addresses a motion by
Atos Se, Atos IT Services Ltd. (“Atos IT”) and Worldline SA (“Wordline”) for
summary judgment with regard to the trade secret claims asserted under New York
and Florida law in the Second and Third Causes of Action. (ECF No. 163.)
For the reasons set forth below, this Court finds that there are two separate
and equally dispositive bases to GRANT defendants’ motion: first, plaintiff has
failed to identify its trade secrets with the requisite specificity, instead asserting that
every line of source code in a licensed software program (“CardPac”) and other
materials provided under confidentiality provisions of the license agreement
constitute protectable trade secrets under New York and Florida law. This is far too
broad, vague and ambiguous a claim to survive. But, in addition, this Court finds
that the statute of limitations for any such claim ran long ago.
I.
FACTUAL BACKGROUND1
Plaintiff PaySys owns and licenses financial transaction processing software
that it first licensed to Sema Group SA in 1988. (Pl.’s Local R. 56.1 Stmt. of
Undisputed Facts (“Pl.’s 56.1”, ECF No. 213) ¶¶ 8-9.) As discussed above, this
motion concerns PaySys’s trade secret claims against three entities that acquired or
became affiliated with Sema Group SA: Atos Se, Atos IT and Worldline. To
understand the parties’ position on this motion and the Court’s decision, the Court
The facts set forth herein are undisputed unless otherwise noted. The facts of this case have
previously been set forth in the opinion by the Honorable Shira A. Scheindlin dated July 24, 2015,
No. 14-cv-10105 (SAS), 2015 WL 4533141 (S.D.N.Y. July 24, 2015) (ECF No. 73), and this Court’s
opinion dated July 14, 2016 (ECF No. 183). The reader is also referred to this Court’s Opinion &
Order issued relatively contemporaneously herewith narrowing PaySys’s copyright infringement
claims. The Court here only details those facts necessary for resolution of this motion.
1
2
begins by briefly summarizing certain aspects of the parties’ corporate history, the
license arrangement between the parties, plaintiff’s identification of the alleged
trade secrets at issue and plaintiff’s copyright deposits.
A. Relevant Corporate History
Plaintiff PaySys was founded in 1981 under the name “Credit Card Software,
Inc.” (“CCSI”). (Pl.’s 56.1 ¶ 6.) In 1995, CCSI changed its name to PaySys
International, Inc. (Id.) Since 2001, PaySys has been a wholly-owned subsidiary of
counterclaim-defendant First Data Corporation (“First Data”). (Id. ¶ 7.)
Defendants are entities that acquired or became affiliated with Sema Group
SA, one of PaySys’s licensees. In a press release dated September 23, 2003, Atos
Origin announced its acquisition of Sema Ltd., the parent of Sema Group SA, one of
PaySys’s licensees;2 that transaction closed on January 22, 2004. (Id. ¶¶ 12-13; see
also id. ¶ 10 (stating that Sema Group PLC is the “parent to Sema Group SA”); ¶ 16
(stating that Sema Group PLC became known as Sema Ltd. on September 4, 2001).)
Through a series of publicly disclosed name changes—the last of which occurred on
June 29, 2011—Sema Ltd. became known as Atos IT, one of the three defendants in
this matter. (Id. ¶ 16.)3 On December 31, 2003, various Atos businesses merged
together and Atos Origin became part of Atos Worldline. (Id. ¶ 14.) In 2013, Atos
As discussed in more depth below, Sema Group SA was the signatory on a license agreement with
PaySys that extended to its affiliates, including Sema Ltd.
2
The following name changes are reflected on documents that Atos IT filed publicly with the U.K.
Registrar of Companies: Cap Group PLC became Sema Group PLC on September 13, 1988; Sema
Group PLC became Sema PLC on December 1, 2000; Sema PLC became Sema Ltd. on September 4,
2001; Sema Ltd. became Atos Origin IT Services Ltd. on February 23, 2004; and Atos Origin IT
Services Ltd. became Atos IT Services Ltd. on June 29, 2011. (Id.)
3
3
Worldline became Worldline, another of the defendants in this matter. (Id. ¶ 15.)
Worldline is a subsidiary of Atos Se, the third defendant in this matter. (Declaration
of Leon Medzhibovsky, dated June 20, 2016 (“Medzhibovksy Decl.”, ECF No. 165),
Ex. 7 at PAY00003072.)
B. The License Arrangement
On October 31, 1988, CCSI (which was later renamed “PaySys”), entered into
a software acquisition agreement (the “Software Acquisition Agreement” or “October
1988 Agreement”) with Sema Group SA. (Id. ¶¶ 9-10; see also Medzhibovksy Decl.,
Ex. 1.) That agreement was amended by letter agreement dated December 28, 1988,
an amendment dated February 19, 1990, and a memorandum agreement dated
October 24, 1990. (Medzhibovsky Decl., Ex. 3 at ATOS007746.) The initial Software
Acquisition Agreement and its various amendments are known collectively as the
“Software Agreement”. (Id.) Following a dispute regarding various rights and
obligations under the Software Agreement, PaySys, Sema Group SA and Sema PLC
entered into a Confidential Settlement Agreement on April 27, 2001, pursuant to
which these parties confirmed and ratified the terms of the Software Agreement and
agreed to certain additional amendments. (Id.)4
The parties do not dispute that the signatory to the Software Acquisition Agreement, Sema Group
SA, later became a subsidiary of Atos IT, a defendant in this action. (Pl.’s 56.1 ¶¶ 10, 16.) A
question that need not be resolved on this motion (but is resolved in the Court’s Opinion & Order
addressing PaySys’s August 10, 2016 motion for summary judgment) is whether Worldline is a
licensee under the Software Agreement. Without resolving that question here, the Court notes a
following points that would be relevant to its resolution: the Software Acquisition Agreement
defines “Affiliate” as “any corporation or other business entity which controls, is controlled by or is
under common control with a party to this Agreement.” (Id. ¶ 21; Medzhibovsky Decl., Ex. 1 § 1(a).)
It further provides that “an Affiliate of SEMA may exercise and enjoy any and all of the benefits or
rights conferred upon SEMA under this Agreement and, provided, further, than [sic] SEMA may
assign all or any portion of this Agreement to any such Affiliate.” (Medzhibovksy Decl., Ex. 1 §
4
4
The Software Agreement defines “Products”,5 in relevant part, as:
[T]he standard IBM version of the computer software programs supplied by
CCSI known as Cardpac Transaction Management System, including, without
limitation, Cardpac Customer Account Management System, On-Line
Collections (“OLC”), On-Line Authorizations (“OLA”), Memo Tickler System
(“MTS”), Interchange Tracking System (“ITS”), Transaction Management
System 1 (“TMS 1”) and Transaction Management System 2 (“TMS 2”); all
Enhancements and Special Enhancements thereto; and all programs and
system documentation, reference manuals , user manuals and flow charts
associated therewith.
(Medzhibovsky Decl., Ex. 1 § 1(i).)
The Software Agreement contains confidentiality provisions requiring the
licensees to maintain the Products supplied thereunder as confidential, except with
regard to:
any information or data supplied by CCSI that: (i) was known to Sema or an
Affiliate thereof prior to disclosure thereof by CCSI; (ii) is or becomes
generally available to the public other than by breach of this Agreement; or
(iii) otherwise becomes lawfully available on a non-confidential basis from a
third party who is not under an obligation of confidentiality to CCSI.
(Id., Ex. 2, § 14(b).)
17(b).) It additionally states that “[t]o the extent an Affiliate of either party exercises any rights or
privileges under this Agreement, such Affiliate shall be deemed to be a party to this Agreement and
shall be bound by all the terms and conditions hereof.” (Id. § 17(m).) There is therefore a substantial
argument that Worldline is an Affiliate of Sema’s successor entity Atos IT, and is therefore a bona
fide licensee. The Court notes that there is also a substantial argument that the phrase “provided,
further” in Section 17(b) of the Software Acquisition Agreement does not create a condition precedent
to an Affiliate’s enjoyment of any licensing rights, but rather provides a separate and additional
right of assignment. These provisions were not altered in the December 1988 amendment or in the
2001 Confidential Settlement Agreement. (Id., Exs. 2, 3.) The Court notes that the Confidential
Settlement Agreement appears to have adopted the same definition and scope regarding the term
“Affiliates” as that set forth in the October 1988 Agreement. (See, e.g., id., Ex. 3, § 5(c) (referring to
“Sema or its Affiliates” granting licenses to third parties).)
As described below, PaySys identifies its trade secrets by referring to the definition of “Products”
under the Software Agreement.
5
5
C. PaySys’s Identification of Trade Secrets in This Litigation
PaySys has purported to identify the nature of the trade secrets at issue in
this litigation through written discovery and employee declarations submitted in
opposition to this motion.
1.
Written Discovery
This action was filed on December 23, 2014. (ECF No. 1.) When discovery
commenced (which followed initiation of the litigation by a number of months),
defendants began requesting that plaintiff specify the trade secrets it claimed were
at issue. On November 6, 2015, defendants served a set of interrogatories to which
PaySys responded on December 16, 2015. (Pl.’s 56.1 ¶¶ 51-52.) In Interrogatory No.
5, defendants requested that PaySys:
[i]dentify and describe all purported trade secrets that PaySys alleges were
misappropriated by Defendants in this Action, and describe all measures,
procedures and policies, if any, PaySys has adopted to ensure the
confidentiality or secrecy of those alleged trade secrets, from the period of
2001 to present.
(Id. ¶ 51.) PaySys responded by incorporating the definition of “Software” set forth
in its Second Verified Amended Complaint (the “SVAC”, ECF No. 103), and stated
that this definition refers to:
the CardPac software created by PaySys, including object code, source code
and related documentation, any complete or partial copy thereof contained in
any other work or medium, and the confidential information embodied in or
associated with that software.
(Id. ¶ 52.) PaySys further referred defendants to the “Agreement, including but not
limited to its provisions regarding confidentiality required by the Agreement and
required of Sema and its successors to be included in all customer agreements.” (Id.)
6
In Interrogatory No. 6, defendants requested that plaintiff “[i]dentify and
describe the facts and circumstances relating to PaySys’s disclosure of its purported
trade secrets to Defendants, and each alleged misappropriation of PaySys’s
purported trade secrets by Defendants or third-parties”. (Id. ¶ 53.) PaySys
responded by stating:
PaySys identifies as a misappropriation of its trade secrets every single
transaction, use, act or omission that exceeded what was contractually
permitted by, among other things, Schedule F of the 1988 letter agreement or
the confidentiality or other terms of the relevant agreements, including the
2001 Settlement Agreement.
(Id. ¶ 54.)
On November 5, 2015, defendants served PaySys with requests for the
production of documents. (Id. ¶ 57) Document Request No. 32 sought “[d]ocuments
sufficient to show, describe or identify the purported trade secrets that PaySys
alleges were misappropriated by Defendants.” (Id.) PaySys responded on December
16, 2015 by objecting to the request in its entirety as “overly broad and unduly
burdensome”, and stating that, “The Agreement identifies the trade secrets.”
(Id. ¶ 58.)
On December 24, 2015, defendants requested that PaySys supplement its
responses to Interrogatory No. 5 and/or Document Request No. 32 in order to
describe its purported trade secrets with the requisite particularity. (Id. ¶ 65.)
Defendants repeated that request on January 26, February 26 and March 9, 2016.
(Id. ¶¶ 66-68.)
7
On March 25, 2016, PaySys served an amended response to Document
Request No. 32, stating:
The trade secrets at issue in this litigation are “the Products, all
Enhancements to the Products and all proprietary information, data,
documentation and derivative works related to the Products” (See Agreement,
Schedule F, paragraph 2), all of which are or were in Defendants’ possession.
These contractual provisions are sufficient to identify the trade secrets.
(Id. ¶ 59.)
On April 6, 2016, defendants reiterated their request that PaySys amend its
response to Interrogatory No. 5, repeating their position that PaySys failed to
adequately describe its trade secrets with the requisite particularity. (Id. ¶ 69.) On
May 23, 2016, PaySys provided defendants with an amended response that identified
the trade secrets at issue as:
The source code for each of the following CardPac software application
systems, or any substantial portion thereof: “CPS Application System;” “OLC
Application System;” “OLA Application System;” “CSM Application System;”
“IMP Application System;” “APS Application System;” “ITS Application
System;” and “SSC Application System.”
(Id. ¶ 71.) The amendment further stated:
The combination of the source code for each of the above-described application
systems, working together, is a trade secret. On information and belief, no
portions of the source code of any of the foregoing application systems are
publicly available or readily ascertainable, except for the binary code deposits,
but even if a portion of any of the foregoing application systems were publicly
available, the combination of that code with other interdependent parts of the
application system is a trade secret.
(Id. ¶ 72.)
2.
Employee Declarations
In opposition to defendants’ motion, PaySys submitted declarations from three
employees: Larry Phillips, a former programmer at First Data (Declaration of Larry
8
Phillips, dated July 22, 2016 (“Phillips Decl.”, ECF No. 210); Eva Hughes, Vice
President of Product Management of VisionPLUS at First Data (Declaration of Eva
Hughes, dated August 15, 2016 (“Hughes Decl.”, ECF No. 208); and Greg Piel, Senior
Vice President and Associate General Counsel of First Data (Declaration of Greg
Piel, dated August 15, 2016 (“Piel Decl.”, ECF No. 211). These declarations describe
various aspects of CardPac that PaySys cites as proof that CardPac contains trade
secrets.
Phillips states that he was a member of the original development team for the
CardPac software package and “worked as part of that team from 1983 until the
early 1990’s.” (Phillips Decl. ¶ 4.) According to Phillips, CardPac was written
“entirely from scratch” and “consists of literally millions of lines of code over a
thousand component files.” (Id. ¶¶ 5, 7.) Phillips further states that “[t]he original
CardPac development team consisted of approximately 10 people but over the years
in excess of one hundred programmers and technicians worked on the CardPac
applications.” (Id. ¶ 5.)
Phillips describes CardPac as a set of eight separate software “application
systems” that together comprise the CardPac “software package”. (Id. ¶ 8.) The
application systems are as follows:
OLA 606 – An online authorization system that runs the main program and
drives updates thereto;
SSC 140 – The security system and common routines system;
OLC 400 – The online collections system, which processes all of the requests
from the previous day and is the interface with the CPS system;
9
CSM 700 – The customer service management system;
APD 400 – The application processing system that processes credit application
and interfaces with credit bureaus;
IMP 420 – The installation maintenance program and credit card software
utility program, “which is basically an installation wizard”;
ITS 700 – An interchange tracking system that handles exceptions items going
to and from Visa and MasterCard; and
CPS 612 – The CardPac system which does the daily posting.
(Id.) Phillips describes these eight “application systems” as themselves being
comprised of thousands of underlying “component files” that work individually and
in combination to “accomplish CardPac’s essential function.” (Id. ¶ 9.) For example,
the CPS application system has 1,254 component files and consists of 1,163,784
separate lines of source code; the OLC application system has 457 component files
and 258,524 separate lines of source code; the CSM has 312 component files and
181,093 separate lines of source code, etc. (See id. ¶ 11.)
Hughes has a degree in computer science and initially joined First Data in
1994. (Hughes Decl. ¶ 2.) Following First Data’s acquisition of PaySys in 2001, she
supported various PaySys affiliates in Latin America, Europe, South Africa and
Australia. (Id.) During that time, she had responsibility for client maintenance
services, product support, training and documentation for a software application
called “VisionPLUS.” (Id.) VisionPLUS is PaySys’s successor to CardPac. (Id. ¶ 3.)
Hughes describes CardPac as a payments processing software system that
processes card accounts and merchant accounts that accept card transactions.
(Id. ¶ 4.) “It was written to manage the life cycle of issuing credit cards and also for
10
the process of acquiring card transactions accepted by merchants which must handle
the complex rules of international card networks such as MasterCard and Visa.”
(Id. ¶ 4.) Hughes states that she “understands [that CardPac] comprises millions of
lines of COBOL programming code” and was initially written to run on IBM
mainframe computers. (Id. ¶ 5.) PaySys licensed CardPac “around the world” to
bank and non-bank financial institutions as well as third-party processors. (Id. ¶ 5.)
Hughes states that “[t]he core code of CardPac continues to be very valuable
technology.” (Id. ¶ 6.) She refers to CardPac as a “core technology [that] is a staple
of the payments processing industry[,] as evident in PaySys’s newer product lines
(VisionPLUS), which is in wide use.” (Id. ¶ 6.) Hughes also states that the “core
technology” has an “extensive license base.” (Id.) Finally, Hughes states that:
It is common knowledge in the industry, based on public information of Atos
and Worldine, that Worldline’s original CardLinK program was a 1998 version
of CardPac that Sema simply renamed CardLinK.
(Id. ¶ 13.)
In his declaration, Piel states that he has been employed by First Data since
2002 and is responsible for legal support of First Data’s non-US businesses.
(Piel Decl. ¶ 2.) He states that as a global payment solutions company, First Data
uses computer software programs extensively and obtains significant value from its
possession of such software. (Id. ¶¶ 3-4.) He identifies CardPac as one such
program. (Id. ¶ 4.) Piel states that “Company records show [that CardPac] was first
created in the 1980s” and that “[i]t is still in use by some customers.” (Id.) Piel
further states that understands that “the CardPac source code has been incorporated
11
into other software programs that have been adapted to run on various data
processing platforms and in various data processing operating systems.” (Id.)
Piel also states that:
With regard to CardPac and its progeny, a high level of secrecy is necessary in
order for PaySys to control and limit the use of the CardPac software and
protect PaySys’s ability to profit from licensing the original software and
subsequent versions.
(Id. ¶ 5.) He further states that, to the best of his knowledge, “[T]here has been no
broad disclosure that placed the source code underlying the CardPac program into
the public domain or otherwise destroyed the confidentiality of the CardPac source
code.” (Id. ¶ 6.) He states more affirmatively, “I know such disclosure has not
occurred since I joined First Data in 2002.” (Id.)
D. PaySys’s Copyright Registrations
The Court notes that PaySys has filed for copyright registrations with regard
to CardPac. The parties dispute whether those registrations encompass some or all
of the underlying source code. Resolution of that question is unnecessary to this
particular motion, and has been addressed by separate Opinion & Order issued
relatively contemporaneously herewith. All that is pertinent here is the fact that
PaySys deposited copies of source code with regard to PaySys’s registration; those
deposit copies contain thousands of lines of code.6
The registrations and deposit copies are attached to the Declaration of Ivan Zatkovich, dated
August 10, 2016 (“Zatkovich Decl.”, ECF No. 204), submitted in connection with a separate motion
for summary judgment motion. These materials are deposited with a governmental institution and
bear obvious indicia of reliability. The Court therefore takes judicial notice of those materials, as it
is entitled to do. See Fed. R. Evid. 201(b) (providing that a court may judicially notice a fact “that is
not subject to reasonable dispute because it . . . (2) can be accurately and readily determined from
sources whose accuracy cannot be readily questioned.”); United States v. Alexander, 123 F. App’x
6
12
II.
RELEVANT LEGAL STANDARDS
A. Standard of Review
Summary judgment may not be granted unless a movant shows, based on
admissible evidence in the record, “that there is no genuine dispute as to any
material fact and the movant is entitled to judgment as a matter of law”. Fed. R.
Civ. P. 56(a). The moving party bears the initial burden of demonstrating “the
absence of a genuine issue of material fact”. Celotex Corp. v. Catrett, 477 U.S. 317,
323 (1986). When the moving party does not bear the ultimate burden on a
particular claim or issue, it need only make a showing that the non-moving party
lacks evidence from which a reasonable jury could find in the non-moving party's
favor at trial. Id. at 322-23.
In making a determination on summary judgment, the court must “construe
all evidence in the light most favorable to the nonmoving party, drawing all
inferences and resolving all ambiguities in its favor”. Dickerson v. Napolitano, 604
F.3d 732, 740 (2d Cir. 2010) (citing LaSalle Bank Nat’l Ass’n v. Nomura Asset
Capital Corp., 424 F.3d 195, 205 (2d Cir. 2005)). Once the moving party has
discharged its burden, the opposing party must set out specific facts showing a
genuine issue of material fact for trial. Wright v. Goord, 554 F.3d 255, 266 (2d Cir.
2009). “A party may not rely on mere speculation or conjecture as to the true
nature of the facts to overcome a motion for summary judgment,” as “mere
444, 445 (2d Cir. 2005) (taking judicial notice of a certificate of disposition, i.e., an official document
issued by a court).
13
conclusory allegations or denials cannot by themselves create a genuine issue of
material fact where none would otherwise exist”. Hicks v. Baines, 593 F.3d 159,
166 (2d Cir. 2010) (internal quotation marks, citations and alterations omitted). In
addition, “only admissible evidence need be considered by the trial court in ruling
on a motion for summary judgment”. Porter v. Quarantillo, 722 F.3d 94, 97 (2d Cir.
2013) (internal quotation marks, citation and alterations omitted).
B. Trade Secret Claims
Whereas trade secret claims under Florida law are governed by the Florida
Uniform Trade Secrets Act (the “FUTSA”), Fla. Stat. § 688.001 et seq., New York
applies a common law test, Sarkissian Mason, Inc. v. Enter. Holdings, Inc., 955 F.
Supp. 2d 247, 253-54 (S.D.N.Y. 2013), aff'd, 572 F. App'x 19 (2d Cir. 2014). New York
and Florida’s trade secret laws share many key features.7
For a party to succeed on a claim for the misappropriation of trade secrets
under New York law, it must demonstrate “(1) that it possessed a trade secret, and
(2) that the defendants used that trade secret in breach of an agreement, confidential
relationship or duty, or as the result of discovery by improper means.” Faiveley
Transp. Malmo AB v. Wabtec Corp., 559 F.3d 110, 117 (2d Cir. 2009) (quoting N. Atl.
Instruments, Inc. v. Haber, 188 F.3d 38, 43-44 (2d Cir. 1999)). Florida similarly
requires a plaintiff to demonstrate that “(1) the plaintiff possessed secret information
Plaintiff has asserted trade secrets claims under both New York and Florida law, both of which
flow from alleged breaches of the Software Agreement. The Court notes that the Software
Acquisition Agreement contains a New York forum and choice of law provision. (See Medzhibovsky
Decl., Ex. 1 § 17(a).) Although the outcome of this motion is the same irrespective of which law is
applied, the Court has nevertheless analyzed the legal issues under the laws of both states.
7
14
and took reasonable steps to protect its secrecy and (2) the secret was
misappropriated, either by one who knew or had reason to know that the secret was
improperly obtained or by one who used improper means to obtain it.” XTec, Inc. v.
Hembree Consulting Servs., Inc., __ F. Supp. 3d __, No. 14-21029-cvALTONAGA/O’Sullivan, 2016 WL 1702223, at *3 (S.D. Fla. Apr. 28, 2016) (quoting
Axiom Worldwide, Inc. v. HTRD Grp. Hong Kong Ltd., No. 8:11-cv-1468-T-33TBM,
2013 WL 2712787, at *4 (M.D. Fla. June 12, 2013)); see also Fla. Stat. § 688.002(2)
(defining “misappropriation” as the “[a]cquisition of a trade secret of another by a
person who knows or has reason to know that the trade secret was acquired by
improper means” or the “[d]isclosure or use of a trade secret of another without
express or implied consent” in certain enumerated circumstances).
Under New York law, “a trade secret is any pattern, formula, device or
compilation of information which is used in one’s business and which gives him an
opportunity to obtain an advantage over competitors who do not know or use it.”
Softel Inc. v. Dragon Med. & Scientific Commc’ns, Inc., 118 F.3d 955, 968 (2d Cir.
1997) (internal quotation marks and citations omitted). The FUTSA defines a “trade
secret” as “information” that:
(a) derives independent economic value, actual or potential, from not being
generally known to, and not being readily ascertainable by proper means
by, other persons who can obtain economic value from its disclosure or use;
and
(b) is the subject of efforts that are reasonable under the circumstances to
maintain its secrecy.
15
Sea Coast Fire, Inc. v. Triangle Fire, Inc., 170 So. 3d 804, 808 (Fla. Dist. Ct. App.
2014), reh'g denied (Aug. 10, 2015) (quoting Fla. Stat. § 688.002(4)); Bright House
Networks, LLC v. Cassidy, 129 So. 3d 501, 506 (Fla. Dist. Ct. App. 2014) (same). A
trade secret is “not simply information as to a single or ephemeral events in the
conduct of the business; rather, it is a process or device for continuous use in the
operation of the business.” Softel Inc., 118 F.3d at 968 (2d Cir. 1997) (citation
omitted) (applying New York law); see also Summitbridge Nat. Investments LLC v.
1221 Palm Harbor, L.L.C., 67 So. 3d 448, 450 (Fla. Dist. Ct. App. 2011) (citation
omitted) (applying Florida law); Default Proof Credit Card Sys., Inc. v. State St.
Bank & Trust Co., 753 F. Supp. 1566, 1573 (S.D. Fla. 1990) (citation omitted)
(applying Florida law). A “trade secret can exist in a combination of characteristics
and components, each of which, by itself, is in the public domain, but the unified
process, design and operation of which, in unique combination, affords a competitive
advantage and is a protectable trade secret.” Integrated Cash Mgmt. Serv., Inc. v.
Digital Transactions, Inc., 920 F.2d 171, 174 (2d Cir. 1990) (citations omitted)
(applying New York law); SmokEnders, Inc. v. Smoke No More, Inc., No. 73-1637,
1974 WL 20234, at *11 (S.D. Fla. Oct. 21, 1974) (citation omitted) (applying Florida
law); see also Developmental Techs., LLC v. Valmont Indus., Inc., No. 8:14-cv-2796T-35JSS, 2016 WL 1271566, at *2 (M.D. Fla. Mar. 31, 2016) (same, after passage of
FUTSA).
The Copyright Office has specific procedures to protect trade secrets in
computer programs for which registrations are sought. See 37 C.F.R. §
16
202.20(c)(2)(vii). Such procedures provide for redactions, inter alia, in order to
protect trade secret material. Id. Failure to abide by such procedures—by, for
instance, depositing copies without redaction—renders the deposited material
publicly accessible and vitiates a trade secret claim. See, e.g., KEMA, Inc. v.
Koperwhats, 658 F. Supp. 2d 1022, 1031 (N.D. Cal. 2009) (concluding that deposit of
unredacted source code with the Copyright Office defeated a trade secret claim based
on such material); see also Synopsys, Inc. v. ATopTech, Inc., No. C 13-cv-2965 (SC),
2013 WL 5770542, at *7 (N.D. Cal. Oct. 24, 2013) (noting that placing a copy of a
work on deposit with the Copyright Office can render such work accessible to the
public, thereby vitiating a trade secret claim).
1.
Specificity in Identification
The plaintiff bears the burden of demonstrating that it has a protectable trade
secret. N. Atl. Instruments, 188 F.3d at 43-44 (citations omitted) (applying New
York law); Am. Red Cross v. Palm Beach Blood Bank, Inc., 143 F.3d 1407, 1410 (11th
Cir. 1998) (citations omitted) (applying Florida law). It must specify its trade secrets
with sufficient specificity to inform the defendants of what they are alleged to have
misappropriated. See Big Vision Private Ltd. v. E.I. DuPont De Nemours & Co., 1 F.
Supp. 3d 224, 258 (S.D.N.Y. 2014), aff'd sub nom. Big Vision Private Ltd. v. E.I. du
Pont de Nemours & Co., 610 F. App'x 69 (2d Cir. 2015) (noting that Second Circuit
has not expressly required specificity, but collecting cases in this District that have
done so and noting that “each Circuit Court of Appeals to have opined on this issue
has required a comparable degree of specificity”); Sit-Up Ltd. v.
IAC/InterActiveCorp., No. 05-cv-9292 (DLC), 2008 WL 463884, at *11 (S.D.N.Y. Feb.
17
20, 2008) (“Although the Second Circuit has not squarely articulated a specificity
requirement, there is no reason to believe that it would permit a party to advance a
trade secret claim in vague and ambiguous terms.”); DynCorp Int'l v. AAR Airlift
Grp., Inc., No. 16-10451, 2016 WL 6833333, at *3 (11th Cir. Nov. 21, 2016) (“Florida
courts adjudicating FUTSA cases have said that the plaintiff is required to identify
with reasonable particularity the trade secrets at issue before proceeding with
discovery.”) (internal quotation marks and citations omitted).
Under both New York and Florida law, failure to identify a trade secret with
specificity has resulted in dismissal or a grant of summary judgment for failure to
raise a triable issue on an essential element of the claim. See, e.g., Big Vision
Private Ltd., 1 F. Supp. 3d at 224 (applying New York law); Sit-Up Ltd., 2008 WL
463884, at **10-11 (applying New York law); DynCorp Int'l, 2016 WL 6833333, at *4
(applying Florida law); Enteris Biopharma, Inc. v. Clinical Pharmacology of Miami,
Inc., No. 1:14-cv-22770-UU, 2015 WL 12085848, at *10 (S.D. Fla. Mar. 20, 2015)
(applying Florida law).
2.
Statute of Limitations
While New York and Florida both have three-year statutes of limitations for
trade secrets claims, they are triggered in different ways. See Ferring B.V. v.
Allergan, Inc., 932 F. Supp. 2d 493, 510 (S.D.N.Y. 2013); Knights Armament Co. v.
Optical Sys. Tech., Inc., 654 F.3d 1179, 1184 (11th Cir. 2011) (quoting Fla. Stat. §
688.007). Under New York law, trade secret “misappropriation claims must be
brought within three years of when the defendant discloses the trade secret or when
he first makes use of plaintiff’s ideas.” Ferring B.V., 932 F. Supp. 2d at 510 (internal
18
quotation marks and citations omitted). Florida, however, follows a “discovery rule”,
under which “[a]n action for misappropriation must be brought within 3 years after
the misappropriation is discovered or by the exercise of reasonable diligence should
have been discovered.” Knights Armament Co., 654 F.3d at 1184 (quoting Fla. Stat.
§ 688.007)).
Under both New York and Florida law, continued acts of misappropriation do
not generally give rise to separate causes of action triggering the statute of
limitations anew. See Galet v. Carolace Embroidery Co., No. 97-cv-5702 (DLC), 1998
WL 386434, at *2 (S.D.N.Y. July 10, 1998) (applying New York law and rejecting
contention that defendant continued to misappropriate trade secrets because “[o]nce
a defendant has disclosed the information . . . it is no longer a trade secret.”) (citation
omitted); Fla. Stat. § 688.07 (“For the purposes of this section, a continuing
misappropriation constitutes a single claim.”) New York (but not Florida) recognizes
a “continuing tort” exception that applies when a defendant keeps the alleged trade
secret confidential, yet continues to use it for its own benefit. See Ferring B.V. v.
Allergan, Inc., 4 F. Supp. 3d 612, 628-29 (S.D.N.Y. 2014) (citation omitted). Where,
however, the “plaintiff had knowledge of the defendant’s misappropriation and use of
its trade secret, the continuing tort doctrine does not apply.” VoiceOne Commc’ns,
LLC v. Google Inc., No. 12-cv-9433 (PGG), 2014 WL 10936546, at *10 (S.D.N.Y. Mar.
31, 2014) (citations omitted); Synergetics USA, Inc. v. Alcon, Inc., No. 08-cv-3669
(DLC), 2009 WL 2016872, at *2 (S.D.N.Y. July 9, 2009) (same).
19
III.
DISCUSSION
PaySys’s Second and Third Causes of Action seek relief for misappropriation of
trade secrets under New York and Florida law. (SVAC ¶¶ 163-71.) The allegations
with regard to these claims are quite short: PaySys alleges it possesses trade
secrets, that it has taken steps to protect them including confidentiality provisions in
the relevant agreement(s), and that defendants have engaged in unauthorized
disclosure or use under New York and Florida law. (Id.) The core of PaySys’s
argument is two-fold: (1) that Sema Group SA’s license was never properly assigned
to defendants, and therefore any licensing of CardPac by these defendants has
exceeded the bounds of the Software Agreement and resulted in a misuse of its
source code trade secrets; and/or (2) that defendants’ own agreements with third
parties to license CardLinK do not contain confidentiality provisions to protect
PaySys’s source code from disclosure, thereby resulting in a misappropriation of
trade secrets.
There are two separate reasons why, based on the undisputed facts, the trade
secret claims cannot withstand summary judgment. First, PaySys has failed to
proffer sufficient facts to raise a triable issue as to whether it has protectable trade
secrets. This failure derives from PaySys’s overbroad assertion that every line of the
CardPac source code—either alone or in combination—constitutes a trade secret.
This extreme position avoids the identification of a single specific (and therefore
testable) trade secret; the requisite particularity is therefore lacking. Second, and in
addition, the undisputed facts demonstrate that plaintiff has long been on notice of
20
defendants’ acquisition of the Sema entities and continued licensing thereafter. As a
result, the statutes of limitations governing the trade secret claims ran prior to the
commencement of this lawsuit.
A. Identification of Trade Secrets
As discussed above, the first element of a trade secret claim under either New
York or Florida law is the existence of a trade secret. See Faiveley Transp. Malmo
AB, 559 F.3d at 117 (citation omitted); XTec, Inc., 2016 WL 1702223, at *3 (citation
omitted). To support that threshold issue, a plaintiff must identify the trade secrets
at issue with sufficient specificity to allow a defendant to counter the claim. See, e.g.,
Big Vision Private Ltd., 1 F. Supp. 3d at 258 (applying New York law); Sit-Up Ltd.,
2008 WL 463884, at *11 (same); DynCorp Int'l, 2016 WL 6833333, at *3 (applying
Florida law). Plaintiff here has failed to comply with this basic requirement.
Instead, based on the procedural history set out above, PaySys has attempted
throughout this litigation to avoid identifying which the trade secrets its claims are
at issue. The history of plaintiff’s efforts in this regard are revealing. First, PaySys
objected to Document Request No. 32—which sought documents identifying the trade
secrets at issue—as “overly broad and unduly burdensome” given that “[t]he
Agreement identifies the [relevant] trade secrets”. (Pl.’s 56.1 ¶¶ 57-58.) This answer
makes little sense. In so objecting, PaySys effectively conceded its alleged trade
secrets lacked the requisite specificity.
PaySys’s initial interrogatory response was no better. In response to
Interrogatory No. 5, plaintiff referred to the broad definition of “Software” set forth
21
in the SVAC and stated that its claimed secrets constituted all of the object code and
source code comprising the CardPac software, as well as “related documentation”;
plaintiff did not specify what such documentation consisted of. (Id. ¶ 52.) Plaintiff
went even further, asserting that its trade secrets constituted any “complete or
partial copy [of the software] contained in any other work or medium, and the
confidential information embodied in or associated with that software.” (Id.)
In March 2016, plaintiffs amended this incredibly broad identification with a
nearly equally broad statement:
The trade secrets at issue in this litigation are “the Products, all
Enhancements to the Products and all proprietary information, data,
documentation and derivative works related to the Products” (see Agreement,
Schedule F, paragraph 2), all of which are or were in Defendants’ possession.
These contractual provisions are sufficient to identify the trade secrets.
(Id. ¶ 59.) Finally, two months later, in May 2016—six months after the initial
interrogatory was served and nearly a year and a half after filing suit—PaySys
narrowed the claimed trade secrets to the entirety of the source code for each of
CardPac’s application systems. (See id. ¶ 71.) Specifically, plaintiff stated that its
trade secrets are:
[t]he source code for each of the following CardPac software application
systems, or any substantial portion thereof: “CPS Application System;” “OLC
Application System;” “OLA Application System;” “CSM Application System;”
“IMP Application System;” “APS Application System;” “ITS Application
System;” and “SSC Application System.”
(Id.) Aside from the briefing on this motion, this statement represents PaySys’s final
articulation of the trade secrets it identifies.
22
It is worth pausing to consider what plaintiff is claiming here in light of the
declarations of its own employees. As described above, the CardPac application
systems consist of millions of lines of source code with diverse functionality (Phillips
Decl. ¶¶ 8-9), which was written more than thirty years ago and licensed widely
(Hughes Decl. ¶ 6; Piel Decl. ¶¶ 3-4). The application systems are further broken
down into more than a thousand “component files”. (Phillips Decl. ¶ 5.) The volume,
age and dissemination of the CardPac source code undermine plaintiff’s argument.
How can a million lines of code written thirty years ago and licensed to people all
over the world still be trade secret? It may be valuable, but not every asset of value
constitutes a trade secret. Both New York and Florida law require more, namely
that the trade secret remain confidential. See Softel Inc., 118 F.3d at 968 (defining
“trade secret” under New York law); Fla. Stat. § 688.002(4) (defining “trade secret”
under Florida law).
Even the Software Agreement acknowledges that there may be information or
data supplied by CCSI (PaySys) pursuant to the Agreement that does not remain
confidential. (See, e.g., Medzhibovksy Decl., Ex. 2 § 14(b).) In this regard, the
Agreement defines as exceptions to what must be maintained as confidential (1) that
which was known to Sema Group SA or its Affiliates prior to disclosure, (2) is or
becomes available to the general public other than by way of a breach of the
agreement, or (3) otherwise becomes lawfully available on a non-confidential basis
from a third-party. (Id.) The record is devoid of any facts suggesting PaySys has
23
confirmed that the alleged trade secrets embodied within its source code have not
become otherwise known to the general public.
Rather than carefully determining which code may in fact remain secret after
the substantial passage of time, plaintiff has sought to shift the burden to
defendants to prove what is not secret. That is the reverse of what the law requires.
See N. Atl. Instruments, 188 F.3d at 43-44 (citations omitted) (applying New York
law); Am. Red Cross, 143 F.3d at 1410 (citations omitted) (applying Florida law).
PaySys cannot avoid its obligation to carefully delineate precisely what in fact
remains secret by designating “all” of its source code as secret. To state the obvious,
after thirty years, and in light of the breadth of PaySys’s own licensing efforts, it is
more than reasonable to assume that certain aspects of the CardPac systems may be
widely known in the industry—different entities having arrived at the same
functionality on their own. Further, as Piel states, the code “has been incorporated
into other software programs that have been adapted to run on various data
processing platforms in various data processing operating systems.” (Piel Decl. ¶ 4.)
Nothing in the record confirms that such software programs are all under license to
PaySys as opposed to programs now owned in their entirety by third parties.
In fact, none of PaySys’s declarants definitively states that each and every line
of code is, ever was, or remains a trade secret. First, neither Hughes nor Piel have
firsthand knowledge of the code’s development. Hughes has worked at First Data on
a product related to CardPac (VisionPLUS)—but that is not CardPac. (Hughes Decl.
¶ 2.) The most Hughes professes to know about CardPac is that the technology
24
comprises “millions of lines of COBOL programming code” and has been licensed
“around the world.” (Id. ¶ 5.) While she states that the technology remains valuable
(id. ¶ 6), she does not go so far as to say that each and every line has remained
secret. Indeed, there is a fair inference that the opposite is true based on her
statement that “[i]n the cards software industry it is common for technology
professionals that have come into contact with the evolution of CardPac to refer to
Cardlink as ‘CardPac for mainframe’”, as CardPac code is contained in various
products. (Id. ¶ 7.)
Piel’s declaration leaves even more questions open. His experience is also
with First Data, and he started with that company almost twenty years after
CardPac was developed. (Piel Decl. ¶ 2.) There is no indication that Piel has any
information regarding what disclosures may have occurred or did occur during that
period. In his declaration, he states that to the “best of his knowledge” there has
been no “broad disclosure that placed the source code underlying the CardPac
program into the public domain”. (Id. ¶ 6.) This statement suggests that there has
been “some” disclosure—just not what Piel would characterize as “broad” disclosure.
Plaintiff bears the burden of determining with precision what remains secret and
what does not; it may not leave defendants wondering what disclosure has occurred
and what has not.
Phillips—the sole declarant to have personal knowledge of the CardPac code
in any granular sense—likewise never states that all of the code has remained a
trade secret. (See Phillips Decl. ¶ 4.) Rather, he discusses how much time and
25
energy it took to create (id. ¶ 5), and that it was written “entirely from scratch”
(id. ¶ 7).
The copies of CardPac source code deposited with the Copyright Office also
undercut plaintiff’s claim. (See Zatkovich Decl., Exs. 1-8.) It cannot be the case that
all of the source code remains a trade secret when PaySys itself has deposited—
without redaction—CardPac source code with the Copyright Office. See Synopsys,
Inc., 2013 WL 5770542, at *7 (“If Plaintiff filed [with the Copyright Office]
unredacted material and now claims that material as trade secrets, Plaintiff's claims
fail, since that material is publicly accessible.”).
Accordingly, PaySys has failed to identify its trade secrets with the requisite
level of specificity. The undisputed facts reveal that at least a portion of PaySys’s
claimed trade secrets has been made publicly available with the Copyright Office.
Plaintiff has also failed to proffer a witness who can swear that all of the lines of
code—i.e., all of the thousands of components that comprise CardPac—are not only
valuable but truly remain secret. Without such a factual statement, plaintiff has
failed to raise a triable issue with regard to an essential element of its claim.
Defendants’ motion for judgment as to the trade secret claims must therefore be
granted.
B. Statute of Limitations
A separate and equally dispositive basis for dismissal of the trade secret
claims is the statute of limitations. The relevant statute of limitations under both
New York and Florida law is three years, with the caveat that Florida permits the
26
three-year period to run from the date of discovery. The record contains undisputed
facts indicating that PaySys knew about the alleged acts of misappropriation by
defendants more than three years before filing the initial complaint on December 23,
2014. (ECF No. 1.) As discussed above, PaySys alleges defendants misappropriated
its trade secrets by continuing to license CardPac after acquiring Sema Ltd. (ECF
No. 214 at 19-22.) PaySys additionally asserts that each instance of third party
licensing of CardPac constitutes a separate act of misappropriation. (Id.) There is,
however, no triable issue on these points. To the contrary, the record clearly shows
that PaySys was on notice long before 2011 that the Atos defendants had stepped
into the shoes of PaySys’s licensee, Sema Group SA, by acquiring its parent, Sema
Ltd. In this regard the Court notes the following:
In its response to defendants’ uncontested statement of facts, plaintiff
acknowledged that, through a series of acquisitions and name changes the signatory
to the Software Acquisition Agreement, Sema Group SA, became affiliated with the
three defendants in this lawsuit, Atos IT, Atos Se and Worldline. (Pl.’s 56.1 ¶¶ 1116.) It is undisputed that Atos Origin publicly announced its acquisition of Sema
Group SA’s parent in 2003 (id. ¶¶ 12-13), and that the Atos Origin businesses
“relating to card payment processing and electronic transactional services were
merged” into a subsidiary known as Atos Worldline (id. ¶ 14), which later became
Wordline (id. ¶ 15.)
PaySys asserts that while these facts may have been known, it did not know
that the Software Agreement it entered into with Sema Group SA would then be
27
utilized by defendants. (ECF No. 214 at 20.) Put otherwise, while plaintiff concedes
it was on notice of the merger, it nevertheless claims that it did not know that
defendants were continuing to license third parties under the Software Acquisition
Agreement. (Id,) This contention is belied by several facts in the record. First, on its
face, the Software Agreement applies to Affiliates. (Id. ¶ 21; Medzhibovsky Decl.,
Ex. 1 §§ 1(a), 17(b), 17(m).) There is no change of control provision that would
terminate the contract or prevent it from following Sema Group SA as it merged into
another entity. Thus, no reasonable juror could believe that plaintiff was not on
notice of the continued licensing of CardPac (or derivatives thereof) following Sema
Group SA’s acquisition. In addition, in a document dated March 2007, First Data
recognized that Atos Origin had purchased Sema in 2003, and that its successor,
Atos Worldline, “was set up in 2004, with the mission to regroup all of Atos Origin’s
card capabilities in one Europe-wide company.” (Pl.’s 56.1 ¶ 43.)
In addition, the undisputed facts reveal that First Data—a competitor of the
defendants—was actively monitoring defendants’ business more than a decade before
it filed suit. Indeed, First Data performed a high level comparison of Atos’s
CardLinK product to PaySys’s own VisionPlus program in the 2004-2005 timeframe.
(Pl.’s 56.1 ¶¶ 38-39.) Internal First Data / PaySys documents from 2005 also
acknowledge active competition and comparison between Atos’s CardLinK and
VisionPlus programs. (Pl.’s 56.1 ¶ 41.)
There are also undisputed facts with regard to defendants’ licensing to third
parties. In the complaint itself—prior to any discovery—plaintiff alleges that,
28
“Beginning in 2008 and at several times thereafter, both Atos SE and (subsequently)
Worldline granted a distributorship to Accellence and its successor NTT Data
(Thailand) Co. Ltd.”, contrary to rights it alleges were granted under the Agreement.
(SVAC ¶ 140.) This allegation is consistent with documents demonstrating that
plaintiff internally monitored defendants’ competitive licensing activities. (E.g., Pl.’s
56.1 ¶¶ 38-42, 46, 48-49.)
Taken together, these facts, among others, leave no doubt that PaySys had
long been on notice of the defendants’ alleged misappropriation of trade secrets.
Analysis under Florida’s discovery rule does not alter the result. The facts discussed
above reveal that PaySys either in fact discovered, or with reasonable diligence could
have discovered, defendants’ use of the source code more than three years prior to
when the suit was filed. See Knights Armament Co., 654 F.3d at 1184 (quoting Fla.
Stat. § 688.007).
29
IV.
CONCLUSION
For the reasons set forth above, the Court GRANTS defendants’ motion for
summary judgment with regard to plaintiff’s trade secret claims. Accordingly, the
Second and Third Causes of Action are dismissed.
The Clerk of Court is directed to terminate the motion at ECF No. 163.
SO ORDERED.
Dated:
New York, New York
December 5, 2016
KATHERINE B. FORREST
United States District Judge
30
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?