ELMAGIN CAPITAL, LLC v. CHEN et al

Filing 248

MEMORANDUM AND/OR OPINION (UNREDACTED VERSION OF DOC 94). SIGNED BY HONORABLE TIMOTHY J. SAVAGE ON 8/17/21. 4/20/22 ENTERED AND COPIES E-MAILED.(mbh)

Download PDF
Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA ELMAGIN CAPITAL, LLC : : v. : : CHAO CHEN, KARL PETTY, ENTERGRID : LLC and ENTERGRID FUND I LLC : Savage, J. CIVIL ACTION NO. 20-2576 MEMORANDUM OPINION August 17, 2021 In this action for misappropriation of trade secrets and breach of contract, plaintiff Elmagin Capital, LLC claims that defendant Chao Chen, one of its founders and former employee, used its algorithmic trading strategies in wholesale electricity markets to develop and use similar strategies at his new trading company, Entergrid LLC and Entergrid Fund I LLC (collectively, “Entergrid”). Elmagin also contends that Chen and defendant Karl Petty, its former consultant, breached their non-disclosure agreements, disclosing its confidential trade secret information. The defendants argue that Elmagin’s trading strategies are not protectable trade secrets and were not misappropriated. They contend that the agreements are unenforceable. They deny disclosing Elmagin’s confidential information. The parties have moved for summary judgment. There are fact issues concerning whether Elmagin’s trading strategies constitute protectable trade secrets and whether the defendants misappropriated them in developing their own trading strategies. We conclude that the defendants’ non-disclosure agreements are valid and enforceable, but fact issues remain as to whether they were breached. Therefore, we shall deny the cross-motions for summary judgment. Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 2 of 21 Factual Background In 2014, Richard Gates, Kevin Gates, and Chao Chen founded Elmagin Capital, LLC. 1 Elmagin was established to trade in financial transmission rights (“FTRs”) 2 in wholesale electricity markets. 3 In 2020, Elmagin generated approximately three million dollars in revenue on an accrual basis. 4 Elmagin uses computer algorithms to predict variable prices in order to calculate advantageous bids in the highly volatile and competitive electricity markets. 5 Algorithms are essentially a precise set of instructions to a computer to accomplish a result. 6 Algorithms are often expressed in words, and those words are translated into code, also known as a program, to implement the algorithm. 7 Utilizing his educational and professional background in electricity, programming, network design, and algorithmic trading, Chen developed trading strategies for Elmagin. 8 Pl.’s Resp. to Defs.’ Mot. for Summ. J. Exh. EE at 70:11-24, 106:9-14 (ECF No. 72) (“K. Gates Deposition Transcript”); Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. B at 24:3-24:8 (ECF No. 59) (“Chen Deposition Transcript”). 1 2 FTRs are financial instruments entitling the holder to receive a share of the charges collected when the transmission grid is congested between the electricity delivery and receipt points specified in the FTR. Market participants submit bids for FTRs with certain delivery and receipt points in auctions. FTRs are acquired when bids are cleared in the auction. K. Gates Dep. Tr. at 78:20-79:5, 112:4-19; Pl.’s Resp. Exh. KKK at 53:4-7, 57:25-58:4 (“R. Gates Deposition Transcript”); Pl.’s Resp. Exh. NN; Memo. in Supp. of Defs.’ Mot. for Summ. J. Exh. 11 at ¶ A (ECF No. 60) (“Consulting Agreement”). 3 4 K. Gates Dep. Tr. at 132:6-133:20. Pl.’s Resp. Exh. YY at 14:1-6, 17:5-25, 29:10-30:6, 34:12-14, 34:24-35:14, 36:15-16 (“Yuros Deposition Transcript”); Defs.’ Resp. to Pl.’s Mot. for Summ. J. Exh. 49 at 66-67 (ECF No. 70); Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. P71 at ¶¶ 51, 63 (“Zarcu Expert Report”). 5 6 Pl.’s Resp. Exh. TT at 3 (“C++ Textbook Excerpt”); Pl.’s Resp. Exh. VV at 18-19. 7 C++ Textbook Excerpt at 3; Pl.’s Resp. Exh. VV at 18-19. Decl. of Chao Chen in Supp. of Defs.’ Mot. for Summ. J. at ¶¶ 2, 4 (“Chen Summary Judgment Declaration”). 8 2 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 3 of 21 During his tenure at Elmagin, he developed or participated in developing the three trading strategies at issue in this case: “Breck,” “Chloe,” and “Faber.” 9 While at Elmagin, Chen engaged defendant Karl Petty as a consultant to provide historical data analysis services. 10 The contemplated project involved creating a software tool to analyze the profitability of public FTR bids based on public data. 11 Before doing any work for Elmagin, Petty signed a Consulting Agreement that prohibited him from using, exploiting, or disclosing Elmagin’s “confidential information.” 12 In 2016, Chen informed the Gates brothers that he wished to leave Elmagin. 13 He sold his 20% membership interest to the Gates brothers and remained with Elmagin through the end of 2017. 14 He signed a Membership Interest Agreement (“MIA”) selling his interest, effective January 1, 2018. 15 Under the MIA, Chen was to be paid as an 8% owner of Elmagin in 2018 and a 6% owner in 2019 and 2020. 16 To date, Chen has received $15,000 for his ownership stake in Elmagin. 17 He also signed a Non-Disclosure Chen Dep. Tr. at 82:10-15; Chen Summ. J. Decl. at ¶ 5; Decl. of Chao Chen in Supp. of Defs.’ Resp. to Pl.’s Mot. for Summ. J. at ¶¶ 8, 10 (ECF No. 73) (“Chen Response Declaration”); Yuros Dep. Tr. at 37:23-38:2, 114:20-24; Pl.’s Resp. Exh. AAA; Pl.’s Resp. Exh. ZZ. The parties focus their arguments on Breck and Faber. We assume Chloe is no longer in play. 9 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 42:18-21, 121:8-19, 214:13-215:7 (“Petty Deposition Transcript”); Consulting Agreement at ¶¶ C, 2. 10 11 Chen Dep. Tr. at 187:15-188:7. 12 Consulting Agreement at ¶ 5(b). 13 Defs.’ Resp. Exh. 12. 14 Defs.’ Resp. Exhs. 12, 13; Chen Resp. Decl. at ¶ 27. 15 Memo. in Supp. of Defs.’ Mot. for Summ. J. Exh. 10 (“MIA”); K. Gates Dep. at 107:12-16. 16 Chen Resp. Decl. at ¶ 27. 17 Id. at ¶ 29. 3 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 4 of 21 and Non-Competition Agreement (“NDNC”) that prohibited him from engaging in a competing business for one year and from ever using, exploiting, or disclosing Elmagin’s confidential information, including its trading strategies. 18 He left Elmagin on December 31, 2017. 19 Chen spent the next year investing in real estate and small businesses and developing trading strategies for digital currencies. 20 On January 10, 2019, he formed Entergrid, LLC and Entergrid Fund I, LLC for the purpose of trading in FTRs in wholesale electricity markets. 21 He used algorithms to develop FTR trading strategies and wrote computer codes to implement the strategies. 22 These strategies included “Hydra” and “Gryphon.” 23 Petty joined Entergrid in spring 2019. 24 Chen recruited other consultants and employees, none of whom had ever worked for Elmagin. 25 Entergrid began trading in wholesale electricity markets around May or June 2019. 26 18 Memo. in Supp. of Defs.’ Mot. for Summ. J. Exh. 9 at ¶¶ 2(b), 4(a) (“NDNC”). 19 Chen Dep. Tr. at 25:20-26:3; Chen Summ. J. Decl. ¶ 13. 20 Chen Dep. Tr. at 28:1-10, 28:17-20, 31:16-32:6, 197:13-198:4; Chen Resp. Decl. at ¶ 22. Chen Dep. Tr. 34:20-35:1; Petty Dep. Tr. at 59:7-60:4; Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. E at 56:6-57:13, 70:6-17 (“Petty Rule 30(b)(6) Deposition Transcript”). Entergrid, LLC conducts its trading activity in wholesale electricity markets through Entergrid Fund I, LLC. Petty R. 30(b)(6) Dep. Tr. at 57:14-58:1. 21 Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. H at 22:11-24:16, 86:20-87:3, 113:9-114:12, 157:1-9, 185:6-24, 197:21-198:23 (“Chen Rule 30(b)(6) Deposition Transcript”). 22 23 Id. at 22:11-24:16, 113:9-114:12. 24 Petty Dep. Tr. at 56:23-57:6. 25 Chen Summ. J. Decl. at ¶ 22. 26 Petty R. 30(b)(6) Dep. Tr. at 196:21-197:2. 4 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 5 of 21 Elmagin filed suit on June 1, 2020, claiming the defendants misappropriated Elmagin’s trade secrets and breached their contractual obligations by using Elmagin’s trading strategies in developing their own algorithms. 27 Both sides have moved for summary judgment. 28 Legal Standard Summary judgment is appropriate “if the movant shows there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” FED. R. CIV. P. 56(a). Judgment will be entered against a party who fails to sufficiently establish any element essential to that party’s case and who bears the ultimate burden of proof at trial. See Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986). In examining the motion, we must draw all reasonable inferences in the nonmovant’s favor. InterVest, Inc. v. Bloomberg, L.P., 340 F.3d 144, 159-60 (3d Cir. 2003). Disagreements over what inferences may be drawn from the facts, even undisputed ones, preclude summary judgment. Ideal Dairy Farms, Inc. v. John Labatt, Ltd., 90 F.3d 737, 744 (3d Cir. 1996) (citation omitted). Credibility determinations, the drawing of legitimate inferences from facts, and the weighing of evidence are matters left to the jury. Anderson v. Liberty Lobby, 477 U.S. 242, 255 (1986). A party moving for summary judgment may use depositions and affidavits or declarations to show a fact is not genuinely disputed, and a party opposing the motion may also rely on them to demonstrate that a fact is disputed. See FED. R. CIV. P. 56(c)(1)(A) (“A party asserting that a fact cannot be or is genuinely disputed must support 27 Pl.’s Compl. (ECF No. 1). 28 Pl.’s Mot. for Summ. J. (ECF No. 58); Defs.’ Mot. for Summ. J. (ECF No. 57). 5 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 6 of 21 the assertion by . . . citing to particular parts of materials in the record, including depositions . . . affidavits or declarations.”). Because depositions provide all parties an opportunity to probe the witness, they are preferred to declarations and affidavits that are generally prepared by attorneys rather than the declarant or affiant. See In re CitX Corp., 448 F.3d 672, 680 (3d Cir. 2006) (citing 10A Charles Alan Wright et al., Fed. Prac. & Proc. § 2722, at 373, 379 (3d ed. 1998)). The affiant must set forth specific facts that reveal a genuine issue of material fact. Lujan v. Nat’l Wildlife Fed’n, 497 U.S. 871, 888 (1990) (collecting cases). Because they are not subject to cross-examination, affidavits are scrutinized carefully. In re CitX Corp., 448 F.3d at 680 (citing 10A Charles Alan Wright et al., Fed. Prac. & Proc. § 2722, at 373, 379). Discussion Misappropriation of Trade Secrets Elmagin asserts claims for misappropriation of trade secrets under both the Defend Trade Secret Act (“DTSA”), 18 U.S.C. § 1836 et seq., and the Pennsylvania Uniform Trade Secret Act (“PUTSA”), 12 Pa. C.S. § 5301 et seq. To prevail on a claim for misappropriation of trade secrets under DTSA and PUTSA, a plaintiff must first establish the existence of a trade secret. 18 U.S.C. §§ 1836(b)(1), 1839(3), (5); 12 Pa. C.S. § 5302. See also Par Pharm., Inc. v. QuVa Pharma, Inc., 764 F. App’x 273, 278 (3d Cir. 2019) (applying the identical New Jersey Trade Secrets Act); Fishkin v. Susquehanna Partners, G.P., 563 F. Supp. 2d 547, 581 (E.D. Pa. 2008), aff’d in part, 340 F. App’x 110 (3d Cir. 2009). DTSA defines a “trade secret” as “all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, 6 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 7 of 21 compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes.” 18 U.S.C. § 1839(3). The PUTSA similarly defines a trade secret as “[i]nformation, including a formula, drawing, pattern, compilation including a customer list, program, device, method, technique or process.” 12 Pa. C.S. § 5302. The defendants argue that Elmagin has not sufficiently identified its alleged trade secrets as a matter of law. 29 They claim that Elmagin only relies on vague, high-level summaries of its strategies, without examining or referencing the actual source code. 30 They also dispute the accuracy and completeness of Elmagin’s high-level summaries of its strategies. 31 To establish the existence of a trade secret, a plaintiff must describe it with a “‘reasonable degree of precision and specificity . . . such that a reasonable jury could find that plaintiff established each statutory element of a trade secret.’” Synygy Inc. v. ZS Assocs., Inc., No. 07-3536, 2015 WL 899408, at *6 (E.D. Pa. Mar. 3, 2015) (quoting Dow Chem. Canada Inc. v. HRD Corp., 909 F. Supp. 2d 340, 346 (D. Del. 2012)). “This identification must be particular enough as to separate the trade secret from matters of general knowledge in the trade . . . or special knowledge of persons skilled in the trade.” Id. See also Oakwood Lab’ys LLC v. Thanoo, 999 F.3d 892, 906 (3d Cir. 2021) (same); Givaudan Fragrances Corp. v. Krivda, 639 F. App’x 840, 845 (3d Cir. 2016) (“It is patently obvious that trade secrets must be identified with enough specificity to put a defendant 29 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 19-21, 23-24 (ECF No. 62). 30 Id. at 27-29; Defs.’ Resp. to Pl.’s Mot. for Summ. J. at 33-35; Defs.’ Reply at 1 (ECF No. 84). 31 Defs.’ Resp. at 38-39. 7 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 8 of 21 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 9 of 21 they essentially protect the same type of information. Both define a trade secret as information that: (a) the owner has taken reasonable means to keep secret; (b) derives independent economic value, actual or potential, from being kept secret; (c) is not readily ascertainable by proper means; and (d) others who cannot readily access it would obtain economic value from its disclosure or use. 18 U.S.C. § 1839(3); 12 Pa. C.S. § 5302. Elmagin claims that its trading strategies are protectable trade secrets. It contends that Breck and Faber consist of unique combinations of algorithmic elements that are not publicly known or readily ascertainable through reverse engineering. 34 It argues that it took reasonable steps to protect the secrecy of its strategies, including through its employee handbook and non-disclosure agreements with its employees and contractors. 35 The defendants counter that Elmagin has not established that Breck and Faber are protectable trade secrets. 36 They contend Elmagin has not shown that its trading strategies are a sufficiently unique combination of known elements to qualify for trade secret protection. 37 They claim that the strategies consist of elements that are commonly known among algorithmic traders, and a reasonably sophisticated trader could develop a similar strategy based on the known elements. 38 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 39-42; Pl.’s Resp. to Defs.’ Mot. for Summ. J. at 2932; Pl.’s Reply at 7 (ECF No. 85). 34 35 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 33-37. 36 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 19-27; Defs.’ Resp. at 35-38. 37 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 25; Defs.’ Resp. at 29; Defs.’ Reply at 2. 38 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 22-24; Defs.’ Resp. at 35-37. 9 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 10 of 21 Both DTSA and PUTSA include a “compilation” of different pieces of information in their definitions of a trade secret. A combination of different elements may constitute a trade secret, even if each element is otherwise generally known or readily ascertainable, as long as the combination is unique and offers a competitive advantage. Anaconda Co. v. Metric Tool & Die Co., 485 F. Supp. 410, 422 (E.D. Pa. 1980) (quoting Imperial Chem. Indus., Ltd. v. Nat’l Distillers and Chem. Corp., 342 F.2d 737, 742 (2d Cir. 1965)) (“‘[A] trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which, in unique combination, affords a competitive advantage and is a protectable secret.’”); SI Handling Sys., Inc. v. Heisley, 753 F.2d 1244, 1255 (3d Cir. 1985) (quoting Anaconda, 485 F. Supp. at 422) (“‘A trade secret may be no more than a slight mechanical advance over common knowledge and practice in the art.’”). Whether a particular piece of information or a combination of pieces of information constitutes a trade secret is generally a question of fact. Bro-Tech Corp. v. Thermax, Inc., 651 F. Supp. 2d 378, 410 (E.D. Pa. 2009) (citations omitted); Synygy, 2015 WL 899408, at *9 (citations omitted). Thus, whether Elmagin’s strategies are unique combinations of elements is for the jury to determine. We next turn to the defendants’ contention that the strategies are generally known or readily ascertainable to sophisticated algorithmic traders. Factors considered in determining whether a purported trade secret is “generally known” or “readily ascertainable” include the extent to which the information is known outside of the plaintiff’s business, the extent to which the information is known by employees and others involved in the plaintiff’s business, the amount of effort or money the plaintiff spent in developing 10 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 11 of 21 the information, and the ease or difficulty with which the information could be acquired or legitimately duplicated by others. Bimbo Bakeries USA, Inc. v. Botticella, 613 F.3d 102, 109 (3d Cir. 2010) (citations omitted). Confidential business information is not a trade secret if it can be “‘easily or readily obtained, without great difficulty, through some independent source other than the trade secret holder.’” Synthes, Inc. v. Emerge Med., Inc., 25 F. Supp. 3d 617, 706 (E.D. Pa. 2014) (quoting BIEC Int’l, Inc. v. Glob. Steel Servs., Ltd., 791 F. Supp. 489, 545 (E.D. Pa. 1992)). There are disputed facts regarding whether Elmagin’s strategies are or are not generally known or readily ascertainable. On one hand, Elmagin proffers expert opinions that Breck and Faber have not been publicly disclosed. The experts opine that even if some of the strategies’ individual elements may be known to traders in the industry, there are elements that are unique and the combination of these elements is not known. 39 Elmagin points to expert testimony that its trading strategies are not readily ascertainable because they cannot be reverse-engineered based on the data input to the trading strategies and the resulting bids. 40 On the other hand, the defendants have offered expert evidence that the strategies consist of common building blocks that any reasonably sophisticated trader could use to design such algorithms. 41 These conflicting expert 39 See Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. D at 50:21-52:24, 286:7-287:4. 40 See id. at 208:22-210:6. See Zarcu Exp. Rep. at ¶¶ 24, 25, 88, 155-174. For example, the defendants’ expert Cristian Zarcu testified that the strategies use “common finance techniques, such as moving averages, or techniques widely used by participants in electricity markets, such as shift factors . . . [which] would be known to reasonably sophisticated algorithmic trading practitioners.” Id. at ¶¶ 24-25. He also testified that the strategies’ components “are either common principles of portfolio selection and finance (e.g., reducing portfolio overlap), reflect the application of these common principles to the specific features of FTRs (e.g., use of Dayzer modeling), or both (e.g., use of historical moving averages to estimate prices).” Id. at ¶ 156. 41 11 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 12 of 21 opinions create a factual issue whether Elmagin’s strategies are not generally known or readily ascertainable. The defendants also argue that Elmagin has not proven its strategies derive independent economic value. 42 There is evidence from which a jury could conclude that Elmagin’s strategies derive independent economic value from being kept secret. The Gates brothers testified that the strategies generated millions in trading profits, and that if others used them, it would adversely affect Elmagin’s profitability. 43 Elmagin generated $3 million in revenue on an accrual basis in 2020 alone. 44 Matthew Yuros, Elmagin’s current head of trading, testified that Elmagin derived “high economic value” from Breck and that its trading strategies were “highly profitable.” 45 Chen himself admitted in his declaration that Breck was “making money.” 46 Moreover, the defendants’ argument that there is no evidence of the strategies’ economic value is undercut by their contention regarding the value of Chen’s 20% membership interest in Elmagin. Chen stated that he would have preferred to keep his ownership stake in Elmagin because doing so “would have led to significantly more compensation than was ultimately agreed to in the Membership Interest Agreement.” 47 He insists that he did not receive the fair market value for his interest in Elmagin. He testified that “[b]ased on the returns from Elmagin’s management of the funds, I believe that the value of my 20% ownership stake in Elmagin 42 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 26-27; Defs.’ Resp. at 29-32, 37-38. 43 K. Gates Dep. Tr. at 219:22-220:6; R. Gates Dep. Tr. at 116:12-117:19, 130:7-17. 44 K. Gates Dep. Tr. at 121:23-122:5. 45 Pl.’s Resp. Exh. PP at ¶¶ 1-3; Yuros Dep. Tr. at 98:13-22, 135:12-16. 46 Chen Summ. J. Decl. at ¶ 17. 47 Chen Resp. Decl. at ¶ 28. 12 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 13 of 21 was actually worth at least approximately $3 million, and potentially significantly more.” 48 A reasonable jury could infer from this evidence that Elmagin derives independent economic value from the secrecy of its trading strategies. Having concluded that fact issues exist regarding whether Elmagin’s trading strategies constitute protectable trade secrets under DTSA and PUTSA, we now consider whether the defendants misappropriated those strategies. Both DTSA and PUTSA define “misappropriation” as including “disclosure or use of a trade secret of another without express or implied consent.” 18 U.S.C. § 1839(5)(B); 12 Pa. C.S. § 5302. Whether misappropriation has occurred is a fact question. Neither DTSA nor PUTSA define “use.” The Third Circuit has interpreted “use” to mean “‘any exploitation of the trade secret that is likely to result in injury to the trade secret owner or enrichment to the defendant[.]’” Oakwood, 999 F.3d at 909 (quoting Gen. Universal Sys., Inc. v. HAL, Inc., 500 F.3d 444, 451 (5th Cir. 2007)) (internal citations omitted). The defendant may misappropriate the plaintiff’s trade secrets without replicating the plaintiff’s product. Id. at 911. Replication is one, but not the only, way to use a trade secret. Id. “‘[E]mploying the trade secret in manufacturing or production . . . [or] relying on the trade secret to assist or accelerate research or development . . . all constitute ‘use.’” Id. at 909 (quoting Gen. Universal Sys., 500 F.3d at 451). Therefore, using the elements or building blocks of a plaintiff’s trade secret to develop a competing product constitutes use in the misappropriation context. Rarely can a plaintiff demonstrate misappropriation through direct evidence. Instead, a plaintiff may rely on circumstantial evidence, such as proof that the defendants 48 Id. at ¶¶ 31, 32. 13 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 14 of 21 had access to its trade secret material and that there are similarities between its products and the defendants’ products. See id. at 911 (quoting Stratienko v. Cordis Corp., 429 F.3d 592, 600 (6th Cir. 2005)) (“‘[O]nce evidence of access and similarity is proffered, it is entirely reasonable for [the jury] to infer that [defendant] used [plaintiff’s] trade secret.’”) (internal quotations omitted). Elmagin claims the defendants have misappropriated its trading strategies by using them to develop their own strategies. Elmagin argues that we can infer that misappropriation occurred because Breck and Faber are substantially similar to Hydra and Gryphon in terms of their internal components and resulting bids. 49 Elmagin points to Chen and Petty having had access to its strategies and other confidential information when they worked at Elmagin. 50 The defendants respond that the strategies are not substantially similar in either the structure of the source codes or the output. 51 Although they do not dispute that Chen had access to Breck during his tenure at Elmagin, they claim that Faber was not fully developed when he left and he had limited knowledge of how it worked. 52 The defendants also argue that Petty did not have access to any of Elmagin’s strategies because he never completed any consulting work for Elmagin. 53 Elmagin has introduced evidence of similarities in the strategies’ structures and functions. It cites testimony and emails from Elmagin and Entergrid personnel discussing 49 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 43-57; Pl.’s Resp. at 19-20. 50 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 42-43. 51 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 27-29; Defs.’ Resp. at 42-48. 52 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 5-6; Defs.’ Resp. at 5, 39-40. 53 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 8, 17, 31-32; Defs.’ Resp. at 45, 55. 14 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 15 of 21 how the strategies were constructed and how they select bids based on certain parameters. 54 It has presented expert opinion that there are significant similarities in the strategies’ component elements and the correlation between their bids and the reference prices produced by the strategies. 55 For example, Elmagin’s expert Craig Pirrong opined that Breck/Hydra and Faber/Gryphon are “functionally identical” concerning the methods they use to formulate their bids. 56 To counter Elmagin’s claimed similarities, the defendants have proffered evidence of differences in the strategies’ underlying source codes, including expert testimony opining on those differences. 57 Defense expert Cristian Zarcu compared the parties’ actual trades for January 2019 to December 2020 and claims he found only a minimal 1% to 6% overlap each month between the bids, suggesting the strategies are not the same. 58 A jury must consider the competing evidence, examine the strategies side-by-side, and determine if they are similar enough to infer the defendants used Elmagin’s strategies in researching and developing their strategies. 59 See Chen R. 30(b)(6) Dep. Tr. at 20:3-4, 20:13-22:9, 37:12-15, 41:5-45:9, 50:2-15, 75:1-7, 78:919, 117:21-118:3, 118:22-119:16, 126:12-129:6, 130:2-132:4; Chen Dep. Tr. at 103:14-16, 106:3-108:15, 150:1-10, 153:6-15, 155:22-156:12, 177:19-178:3; Memo. in Supp. of Pl.’s Mot. for Summ. J. Exhs. I, J, K, L, M, N, O, P, Q, R, S, X, Z, AA. 54 55 Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. DX-15 at 9-16, 18-19. 56 Id. at 17-19. 57 Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. BB at 23-26. 58 Zarcu Exp. Rep. at ¶¶ 175-76. Elmagin argues that the defendants’ other strategies, such as Ziggi, Tuva, and Uma, also derive from the defendants’ misappropriation because they evolved from Gryphon and Hydra. Memo. in Supp. of Pl.’s Mot. for Summ. J. at 57. Genuine issues of material fact exist as to the similarities between Hydra, Gryphon, and the other strategies. Though Elmagin does not provide a breakdown or side-by-side comparison of the other strategies’ elements, it does point to testimony from Chen and the defendants’ source code expert about the clear relationship between the strategies. Chen R. 30(b)(6) Dep. Tr. at 114:712, 120:11-14, 129:7-130:1; Memo. in Supp. of Pl.’s Mot. for Summ. J. Exh. F at 147:7-20. The defendants counter with evidence that there are significant differences between them. Zarcu Exp. Rep. at ¶¶ 130, 133, 135, 137-140. It is for the jury to determine whether any or all of the defendants’ strategies resulted from misappropriation. 59 15 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 16 of 21 It is undisputed that Chen had access to Breck. He developed it. 60 Whether he had access to Faber is disputed. Elmagin has pointed to evidence that Chen had some role in developing Faber and that Faber was in use before he left Elmagin at the end of 2017. 61 The defendants counter with evidence that Faber was still in its infancy at the time Chen left Elmagin and he had limited knowledge about it. 62 The parties also dispute whether Petty had access to any of Elmagin’s trading strategies. Elmagin has introduced evidence that Petty was granted access to their private computer network as part of his consulting services in 2016, suggesting he had access to all of its confidential information, including its trading strategies. 63 The defendants point to evidence suggesting that Petty did very little work for Elmagin. 64 Whether the defendants’ had sufficient access to the strategies allowing them to misappropriate them is a jury question. Elmagin also argues that the defendants misappropriated its trade secrets when they disclosed information containing or derived from its trade secrets to their employees and contractors, none of whom signed non-disclosure agreements with Elmagin or were otherwise authorized to receive Elmagin’s confidential information. 65 The defendants counter that there is no evidence that they shared Elmagin’s confidential information, such as its source codes or other documents discussing its strategies, with anyone. 66 60 Chen Summ. J. Decl. at ¶¶ 5, 7; Chen Resp. Decl. at ¶ 8. 61 Chen Resp. Decl. at ¶ 10; Exh. PPP. 62 Chen Resp. Decl. at ¶¶ 11-14; Yuros Dep. Tr. at 114:20-115:4, 126:11-128:18. 63 Petty Dep. Tr. at 121:8-122:8; Chen Dep. Tr. at 183:22-185:7, 186:6-187:2. 64 Chen Dep. Tr. at 185:8-186:5; Declaration of Karl Petty in Supp. of Defs.’ Resp. at ¶ 3 (“Petty Declaration”). 65 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 58-60. 66 Defs.’ Resp. at 49. 16 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 17 of 21 According to the defendants, Elmagin has at most shown that the defendants disclosed Entergrid’s strategies to others, but there is no evidence that Entergrid’s strategies resulted from misappropriation. 67 The same fact issues preclude a finding of misappropriation through disclosure. There is no dispute that Chen disclosed Entergrid’s strategies to Petty or that Chen and Petty disclosed Entergrid’s strategies to Entergrid’s other employees and contractors. Whether Chen and Petty disclosed strategies derivative of Elmagin’s is for the jury to determine. If the jury finds that the defendants used Breck and Faber in developing Hydra and Gryphon, then their disclosure of Hydra and Gryphon to others constitutes misappropriation and a breach of the NDNC. If the jury finds that they did not use Breck and Faber to develop Hydra and Gryphon, there is no liability for the defendants’ disclosure of Hydra and Gryphon to their employees and contractors. In summary, fact issues exist as to whether Elmagin’s trading strategies are trade secrets and whether the defendants misappropriated them through either use or disclosure. A jury must determine whether Elmagin’s strategies are generally known or readily ascertainable, whether they derive independent economic value from being kept secret, whether the parties’ strategies are substantially similar, and whether the defendants had access to Elmagin’s strategies. Thus, we shall deny the cross-motions for summary judgment on the trade secret misappropriation claims. Breach of Contract Elmagin asserts claims against Chen and Petty for breach of contract based on the NDNC and Consulting Agreement. Elmagin argues that by misappropriating its trading 67 Id. at 49-50. 17 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 18 of 21 strategies, Chen and Petty breached the non-disclosure/non-exploitation provision of the NDNC and Consulting Agreement, respectively. 68 The defendants counter that the non-disclosure/non-exploitation provisions of the NDNC and Consulting Agreement are overly broad because they define “confidential information” expansively to cover every aspect of Elmagin’s business, including matters that are only generally related. 69 The defendants further argue the provisions are unenforceable and against public policy because they restrict employees’ ability to use the broadly-defined confidential information for personal trading and asset management, with no time limit. 70 They claim these restrictions reveal that the provisions were not meant to protect Elmagin’s legitimate business interests against competitors. 71 Lastly, the defendants contend that the NDNC and Consulting Agreement lacked proper consideration. 72 The NDNC provides the following definition of “Confidential Information”: Confidential Information. Seller recognizes and acknowledges that during his time of being a member of Elmagin, Seller had access to, learned, was provided with and, in some cases, prepared, created or improved certain proprietary business information, trade secrets and confidential information of Elmagin, including, but not limited to, quantitative models and methods, business methods, trade secrets, confidential information, formulas, practices, ideas, inventions or research and development information, client and candidate information, client and candidate lists, and prospective client and candidate lists and information, notes, know-how, processes or techniques, trading methods, marketing and sales methods and strategies, identities or lists of Elmagin employees, contractors, agents, 68 Memo. in Supp. of Pl.’s Mot. for Summ. J. at 66-67, 69. 69 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 32-34; Defs.’ Resp. at 50-52. 70 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 34-35; Defs.’ Resp. at 52-54. 71 Memo. in Supp. of Defs.’ Mot. for Summ. J. at 35. 72 Defs.’ Resp. at 54-55. Elmagin does not respond to these arguments. 18 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 19 of 21 representatives and investors, employment, payroll and compensation structure, forecasts, budgets, projections and other non-public financial information, information about the internal organization and business structure of Elmagin and the work assignments or capabilities of Elmagin employees, owners and officers, expansion plans, management policies and other business strategies and policies, software configurations, proprietary computer code and instructions, computer inputs and outputs (regardless of the media on which stored or located), and computer processing systems, software programs, web-based processes, techniques, designs, architecture and interfaces, and any other information which gives Elmagin a competitive advantage or the confidentiality of which provides independent economic value or, if divulged to a third party, would have an adverse impact on Elmagin, or on any third party to which Elmagin owes a confidential obligation, all of which are of substantial value to Elmagin (hereinafter referred to as “Confidential Information”). 73 The NDNC contains the following non-disclosure provision: Non-Disclosure/Non-Exploitation. Seller agrees that he shall not, at any time, directly or indirectly, use, exploit, publish, disclose, reveal, provide, make known, or otherwise make available in any manner whatsoever to any person or entity, whether in oral, written, graphic, electronic or other form, any Confidential Information, except that which is public knowledge, of or relating to the business of Elmagin without the prior express written consent of Elmagin. Without limiting the foregoing, and by way of example only, this means that Seller may not use any Confidential Information for the purpose of trading or management of his or her own or any family member’s or friend’s assets, unless done with Elmagin’s express written permission. Seller understands and agrees that this NDNC Agreement applies to any Confidential Information acquired before, during or after the date of this Agreement. All obligations hereunder to maintain the confidentiality of Confidential Information shall survive and remain in full force and effect without regard to the reason for Seller’s separation from Elmagin. The parties acknowledge and agree that this NDNC Agreement is not intended to, and does not, alter either Elmagin’s rights or Seller’s obligations under any state or federal statutory or common law regarding trade secrets and unfair trade practices. Seller acknowledges that the restriction contained above shall be perpetual in nature. 74 73 NDNC at ¶ 2(a). The Consulting Agreement contains almost identical language. Consulting Agreement at ¶ 5(a). NDNC at ¶ 2(b). The Consulting Agreement contains almost identical language. Consulting Agreement at ¶ 5(b). 74 19 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 20 of 21 In Pennsylvania, post-employment restrictive covenants, including non-disclosure provisions, are generally disfavored. Rullex Co., LLC v. Tel-Stream, Inc., 232 A.3d 620, 624 (Pa. 2020). Courts will enforce them only where “they are incident to an employment relationship between the parties; the restrictions imposed by the covenant are reasonably necessary for the protection of the employer; and the restrictions imposed are reasonably limited in duration and geographic extent.” Hess v. Gebhard & Co. Inc., 808 A.2d 912, 917 (Pa. 2002). The non-disclosure provisions are indisputably incidental to the employment relationship between the parties, and they serve Elmagin’s legitimate interest in protecting its trade secrets and other confidential information from disclosure. Though there are no limitations on their duration and geographic reach, they do not present an unreasonable restraint preventing former employees from earning a living. Id. They merely restrict former employees from using or divulging Elmagin’s confidential information. They do not prohibit them from working for a competitor or otherwise finding new employment. Moreover, the contracts’ broad definition of “Confidential Information” and restriction on activities such as personal trading do not render the entire non-disclosure provision unenforceable. The Pennsylvania Supreme Court has frequently held that enforcement of restrictive covenants may be limited to the portions reasonably necessary to protect the employer. Id. at 920 (citations omitted). Thus, these covenants are enforceable to the extent they protect Elmagin’s trading strategies and any other confidential information related to the strategies. Whether Chen and Petty breached the non-disclosure provisions of their contracts with Elmagin requires resolving the same fact issues that preclude summary judgment on 20 Case 2:20-cv-02576 Document 248 Filed 04/20/22 Page 21 of 21 Elmagin’s claims of misappropriation based on disclosure. If the jury finds that the defendants misappropriated Elmagin’s trading strategies in developing their own strategies, the disclosure of their own derivative strategies to others constitutes breach of the non-disclosure provisions. Thus, we shall deny the motions for summary judgment on the breach of contract claims. 75 Conclusion There are genuine issues of material fact bearing on whether Elmagin’s trading strategies are protectable trade secrets and whether the defendants’ used or otherwise disclosed Elmagin’s trading strategies when developing their own algorithms. Thus, we shall deny both parties’ motions for summary judgment. Similarly, issues of fact preclude finding that the contracts lacked proper consideration. The MIA provides that Chen would receive a closing payment and trailing payments for three years following his departure, in exchange for his shares of Elmagin and for signing the NDNC. MIA at ¶ 3; NDNC at ¶ B; Chen Resp. Decl. at ¶ 27. Petty’s Consulting Agreement provides for an hourly consulting fee. Consulting Agreement at ¶ 4. However, the defendants point to evidence that Chen has only received $15,000 for his shares of Elmagin to date and that the fair market value for his shares is closer to $3 million. Chen Resp. Decl. at ¶¶ 29-32. The defendants have introduced evidence that Petty did not submit any invoices to Elmagin for his work, nor did Elmagin pay him. Petty Decl. at ¶ 3; Chen Summ. J. Decl. at ¶ 23. Therefore, whether the contracts were supported by adequate consideration is for the jury to determine. 75 21

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?