BRAND ENERGY & INFRASTRUCTURE SERVICES, INC. et al v. IREX CONTRACTING GROUP et al
Filing
115
MEMORANDUM AND/OR OPINION. SIGNED BY HONORABLE LAWRENCE F. STENGEL ON 3/23/2017. 3/24/2017 ENTERED AND COPIES E-MAILED.(sg, )
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF PENNSYLVANIA
BRAND ENERGY &
INFRASTRUCTURE SERVICES,
INC., et al.,
Plaintiffs,
v.
IREX CONTRACTING GROUP, et
al.,
Defendants.
:
:
:
:
:
:
:
:
:
:
:
:
:
CIVIL ACTION
NO. 16-2499
MEMORANDUM
STENGEL, J.
March 23, 2017
Brand Energy & Infrastructure Services, Inc., a construction company, contends
that some of its former employees stole its trade secrets and equipment, and
misappropriated its proprietary business information. These former employees have since
left Brand and joined one of Brand’s competitors: Irex Corporation. Brand claims these
individuals have been using Brand’s stolen equipment and trade secrets to benefit Irex
and poach business from Brand.
Brand’s federal claims are under the recently enacted Defend Trade Secrets Act of
2016, 18 U.S.C. § 1832, et seq. (DTSA), the Racketeer Influenced and Corrupt
Organizations Act, 18 U.S.C. § 1961 et seq. (RICO), and the Computer Fraud and Abuse
Act, 18 U.S.C. § 1030 et seq. (CFAA). Brand also brings eleven claims under
Pennsylvania law.
1
Irex filed a motion to dismiss Brand’s amended complaint. I will deny the motion
to dismiss.
I.
BACKGROUND 1
Brand Energy & Infrastructure Services, Inc., is a company that provides
scaffolding, industrial coatings, industrial insulation, fireproofing, asbestos remediation,
and other construction-related services. Brand has a strong presence throughout the
country, including in Pennsylvania and New Jersey. Irex Corporation is a Pennsylvania
corporation with various subsidiaries in Pennsylvania that compete with Brand. 2
The individual defendants in this case formerly worked in high-level positions at
Brand. In 2011, Irex and another company, Harsco Infrastructure, entered into an
agreement to attempt to compete with Brand in the construction industry. However, two
years later, Brand acquired Harsco. From 2014 to 2015, all of the individual defendants
left Brand and joined Irex.
According to the plaintiff, while some of the individual defendants were moving
to Irex, other individual defendants (who were still employed at Brand) were siphoning
them Brand’s protected business information. This conspiracy allegedly began in early
2014. It involved the individual defendants accessing Brand’s revenues, customers,
drawings, and business opportunities. According to Brand, the defendants planned all
1
Because this is a motion to dismiss for failure to state a claim, I will “accept all [plaintiff’s]
factual allegations as true” and “construe the complaint in the light most favorable to the plaintiff.” Bruni
v. City of Pittsburgh, 824 F.3d 353, 360 (3d Cir. 2016). However, my acceptance of all allegations as true
does not apply to “legal conclusions.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009).
2
There are numerous defendants that are subsidiaries or companies formed under the Irex
Corporation. For simplicity, all the Irex-affiliated defendants will be referred to, collectively, as “Irex.”
2
along to steal Brand’s business information, leave Brand, join Irex, and then run Brand
out of business.
One specific item Brand alleges the defendants stole is Brand’s “Market
Playbook.” The Market Playbook is a database that is only accessible on Brand-network
computers. 3 It contains billions of dollars in proprietary information, including Brand’s
future business plans and targets. Brand alleges that after the individual defendants left
and went to Irex, Cathy Walls (a Brand employee) began accessing Brand information
from the Market Playbook and giving it to the individual defendants. Brand claims, to
this day, the individual defendants continue to use information they illegally obtained
from the Market Playbook.
Brand further claims that defendants have fraudulently transformed the business
information they stole from Brand into their own. For example, Brand alleges that many
documents Irex now uses are really Brand documents that were modified to remove the
Brand logo and add the Irex logo. Brand maintains it discovered much of this information
through forensic analysis of the computers that the individual defendants used while
employees at Brand.
Brand claims it has lost business opportunities as a result of the defendants’
conduct. For years, Brand held a contract to provide scaffolding to the Westvaco Paper
Mill in Maryland. While at Brand, one of the individual defendants, John Kwiatkoski,
handled the Brand-Westvaco contract. Brand avers that, after Kwiatkoski left Brand, in
conjunction with the other defendants, he used Brand’s stolen equipment and business
3
In other words, only Brand employees can access it using Brand computers.
3
information to win over the Westvaco contract for Irex. In the process of doing so,
Kwiatkoski transported stolen Brand scaffolding equipment from West Virginia to
Maryland. According to Brand, the Westvaco contract yielded Brand about $600,000 in
yearly revenue. In addition, Brand alleges the defendants used Brand’s stolen property to
steal away and out-bid Brand on various other scaffolding projects that had previously
been performed by Brand for years.
Although this alleged conspiracy began in 2014, Brand alleges the defendants’
theft and misappropriation continued consistently through 2015 and 2016, and continues
to this day. Brand claims it has suffered millions of dollars in losses as a result of the
defendants’ alleged theft and misappropriation.
II.
LEGAL STANDARD
A motion to dismiss under Rule 12(b)(6) of the Federal Rules of Civil Procedure
for failure to state a claim upon which relief can be granted examines the legal
sufficiency of the complaint. Conley v. Gibson, 355 U.S. 41, 45–46 (1957). The factual
allegations must be sufficient to make the claim for relief more than just speculative. Bell
Atlantic Corp. v. Twombly, 550 U.S. 544, 555 (2007). In determining whether to grant a
motion to dismiss, a federal court must construe the complaint liberally, accept all factual
allegations in the complaint as true, and draw all reasonable inferences in favor of the
plaintiff. Id.; see also D.P. Enters. v. Bucks County Cmty. Coll., 725 F.2d 943, 944 (3d
Cir. 1984).
The Federal Rules of Civil Procedure do not require a plaintiff to plead in detail all
of the facts upon which she bases her claim. Conley, 355 U.S. at 47. Rather, the Rules
4
require a “short and plain statement” of the claim that will give the defendant fair notice
of the plaintiff’s claim and the grounds upon which it rests. Id. The “complaint must
allege facts suggestive of [the proscribed] conduct.” Twombly, 550 U.S. at 564. Neither
“bald assertions” nor “vague and conclusory allegations” are accepted as true. See Morse
v. Lower Merion School Dist., 132 F.3d 902, 906 (3d Cir. 1997); Sterling v. Southeastern
Pennsylvania Transp. Auth., 897 F. Supp. 893 (E.D. Pa. 1995). The claim must contain
enough factual matters to suggest the required elements of the claim or to “raise a
reasonable expectation that discovery will reveal evidence of” those elements. Phillips v.
County of Allegheny, 515 F.3d 224, 234 (3d Cir. 2008) (quoting Twombly, 550 U.S. at
556).
In Ashcroft v. Iqbal, 556 U.S. 662 (2009), the Supreme Court defined a twopronged approach to a court’s review of a motion to dismiss. “First, the tenet that a court
must accept as true all of the allegations contained in a complaint is inapplicable to legal
conclusions. Threadbare recitals of the elements of a cause of action, supported by mere
conclusory statements, do not suffice.” Id. at 678. Thus, while “Rule 8 marks a notable
and generous departure from the hyper-technical, code-pleading regime of a prior era . . .
it does not unlock the doors of discovery for a plaintiff armed with nothing more than
conclusions.” Id. at 678–79.
A court “may dismiss a complaint only if it is clear that no relief could be granted
under any set of facts that could be proved consistent with the allegations.” Brown v.
Card Service Center, 464 F.3d 450, 456 (3d Cir. 2006) (quoting Hishon v. King &
Spalding, 467 U.S. 69, 73 (1984)).
5
III.
DISCUSSION
Irex moves to dismiss Brand’s claims under the DTSA, RICO, and CFAA. I will
deny Irex’s motion to dismiss in its entirety.
A.
Defend Trade Secrets Act (DTSA) Claim
Irex argues that the DTSA does not apply to this action because the DTSA was
enacted after the allegedly unlawful acts took place. 4 Irex also contends that application
of the DTSA here would be unconstitutionally retroactive. The DTSA’s statutory
language and history, emerging DTSA case law, and constitutional principles on
retroactivity refute Irex’s position.
1.
The DTSA’s Statutory Framework
The DTSA is the first federal law to create a private right of action for the
misappropriation of trade secrets. 5 The DTSA was formally enacted on May 11, 2016.
See Defend Trade Secrets Act of 2016, Pub. L. No. 114–153, § 2, 130 Stat. 376 (2016)
(codified as amended at 18 U.S.C. § 1831 et seq.). Now, the owner of a trade secret can
bring a private cause of action in federal court for trade secret misappropriation. 18
U.S.C. § 1836(b)(1).
Under the DTSA, “misappropriation” is defined in several different ways. The
“acquisition of a trade secret of another by a person who knows or has reason to know
that the trade secret was acquired by improper means” constitutes a misappropriation. Id.
4
The DTSA became effective on May 11, 2016. Brand filed its amended complaint on August
17, 2016.
5
Prior to the DTSA, such claims could only be brought in state courts pursuant to a state’s trade
secrets statute. See, e.g., 12 Pa. C.S. §§ 5301–5308 (Pennsylvania’s Uniform Trade Secrets Act).
6
§ 1839(5)(A). A misappropriation also occurs when one “disclos[es]” or “use[s]”
another’s trade secret without the consent of the trade-secret owner. Id. § 1839(5)(B). The
DTSA applies to the “misappropriation of a trade secret . . . for which any act occurs on
or after the date of the enactment of [the DTSA].” Defend Trade Secrets Act of 2016,
Pub. L. No. 114–153, § 2(e), 130 Stat. 376 (2016). 6
There are key differences between the DTSA’s language and the language of other
trade secrets statutes. One useful comparison comes from the Uniform Trade Secrets Act
(UTSA). A large majority of states used the UTSA as a model while drafting their own
trade secrets statutes. The UTSA contains a provision stating that it “does not apply to
misappropriation occurring prior to the effective date.” UNIF. TRADE SECRETS ACT § 11(
NAT’L CONFERENCE COMM’RS ON UNIF. STATE LAWS 1985) [hereinafter UTSA]. The
UTSA also does not apply to a “continuing misappropriation that occurs after the
effective date.” Id. Pennsylvania’s Uniform Trade Secrets Act (PUTSA) contains a nearly
identical provision that has the same effect. Pennsylvania Uniform Trade Secrets Act,
Pub. L. No. 143, § 4 (2004). Unlike the UTSA and the PUTSA, the DTSA does not
contain such a provision.
2.
Emerging DTSA Case Law
Other district courts have analyzed the applicability of the DTSA to
misappropriations that occurred before the DTSA was enacted. 7 These courts have all
6
Both parties recognize and cite this provision but, as seen below, they have differing
interpretations of it.
7
Given that the DTSA was enacted months ago, there is sparse case law addressing its
application. The U.S. Court of Appeals for the Third Circuit has not yet addressed the DTSA. No district
7
held that the DTSA applies to misappropriations that began prior to the DTSA’s
enactment if the misappropriation continues to occur after the enactment date. See Syntel
Sterling Best Shores Mauritius Ltd. v. Trizetto Grp., Inc., 15–cv–211, 2016 WL 5338550,
at *6 (S.D.N.Y. Sept. 23, 2016) (finding viable a continuing misappropriation claim that
began pre-enactment because the DTSA defines misappropriation as the “disclosure or
use of a trade secret” and the complaint alleged that the defendants “continue[d] to use”
the trade secrets after the DTSA was enacted) (emphasis in original) (quoting 18 U.S.C. §
1839(5)(B)); Adams Arms, LLC v. Unified Weapon Sys., Inc., 16–cv–1503, 2016 WL
5391394, at *5–7 (M.D. Fla. Sept. 27, 2016) (same). One of these courts rested its
decision, in part, on the fact that the DTSA—unlike the UTSA—does not preclude
application to continuing misappropriations that continue to occur after the enactment
date. Adams Arms, 2016 WL 5391394, at *6.
Other cases have, without question, applied the DTSA to misappropriations that
occurred before and continued after the statute’s enactment. See Allstate Ins. Co. v. Rote,
16–cv–1432, 2016 WL 4191015, at *1–5 (D. Or. Aug. 7, 2016) (granting preliminary
injunction in DTSA case where the defendant left her job before the DTSA was enacted
but remained in possession of alleged trade secrets after the DTSA’s enactment); Henry
Schein, Inc. v. Cook, 191 F. Supp. 3d 1072, 1076–78 (N.D. Cal. 2016) (same with
temporary restraining order).
judge in the Eastern District of Pennsylvania has addressed the merits of a DTSA claim. But see ASI Bus.
Solutions, Inc. v. Otsuka Am. Pharm., Inc., --- F. Supp. 3d ----, 2017 WL 542366 (E.D. Pa. Feb. 10, 2017)
(briefly addressing the DTSA in the context of a motion for preliminary injunction, but not addressing
any merits of the DTSA claim itself).
8
3.
Brand Adequately Pleads a Continuing Misappropriation
Brand’s amended complaint alleges various times, after the enactment of the
DTSA, that the defendants “used” Brand’s alleged trade secrets.
Brand alleges that, to this day, the defendants continue to “obtain access to
Brand’s confidential and proprietary business information.” (Doc. No. 61 ¶ 189). Brand
also alleges “many documents currently in use in [defendants’] business are Brand
documents that [defendants] . . . modified only to remove the Brand logo, insert the
[defendants’] logos, and adjust pricing.” (Id. ¶ 201). Brand’s amended complaint contains
various other allegations that defendants continued to use Brand’s trade secrets after the
DTSA’s effective date. (Id. ¶¶ 214, 363). 8
The “use” of another’s trade secret explicitly qualifies as an act of
misappropriation under the DTSA. 18 U.S.C. § 1839(5)(B); Syntel Sterling Best Shores,
2016 WL 5338550, at *7. Brand’s amended complaint alleges multiple uses of its trade
secrets that continued to occur after the date the DTSA was enacted. Accordingly, Brand
may pursue its claim under the DTSA. 9
8
Brand’s allegations of continued use are factually specific. They contain details regarding who
continued to use the trade secrets, what the trade secrets were, and under what circumstances they are
continuing to be used. (Doc. No. 61 ¶¶ 189, 201, 214, 363); cf. Hydrogen Master Rights, Ltd v. Weston, -- F. Supp. 3d ----, 2017 WL 78582, at *10 (D. Del. 2017) (dismissing DTSA claim because the
allegations regarding “continued use” were conclusory).
9
Defendants’ motion to dismiss does not cite to the DTSA’s definition of “misappropriation.”
Nor does it cite to a single case on this point. Instead, defendants rely on the DTSA’s statute of
limitations, which states that “[f]or purposes of this subsection, a continuing misappropriation constitutes
a single claim of misappropriation.” 18 U.S.C. § 1836(d). According to defendants, this provision evinces
Congress’s overarching intent that a misappropriation be considered a single act that occurs and ends on
the date of the alleged misappropriation. This argument misses the mark given that an “alleged
misappropriation” occurs on any date that a person “uses” another’s trade secret. 18 U.S.C. § 1839(5)(B);
see also Adams Arms, 2016 WL 5391394, at *6 (rejecting identical argument and finding that the
9
4.
Constitutional Analysis
Defendants next raise constitutional concerns with an application of the DTSA to
this case. They argue that application of the DTSA here would render the statute an
unconstitutional ex post facto law. After careful consideration, I find that applying the
DTSA to the claim in this case does not violate the Ex Post Facto Clause of the United
States Constitution. Thus, the DTSA, as applied here, is not impermissibly retroactive.
a.
Ex Post Facto Analytical Framework
The United States Constitution proclaims that no “ex post facto Law shall be
passed.” U.S. Const. art. I § 9, cl. 3. An ex post facto inquiry is really a question of
whether it is permissible for a statute to apply retroactively. Fernandez-Vargas v.
Gonzalez, 548 U.S. 30, 37 (2006).
A retroactive statute is one that takes away or impairs vested rights, creates new
obligations, imposes a new duty, or attaches a new disability with respect to transactions
or events that have already passed. Id. (citing Soc’y for the Propagation of the Gospel v.
Wheeler, 22 F. Cas. 756, 767 (C.C.N.H. 1814) (No. 13,156) (Story, J.)). Such retroactive
statutes are disfavored “when their application would impair rights a party possessed
when he acted, increase a party’s liability for past conduct, or impose new duties with
DTSA’s statute of limitations “addresses only when a claim accrues for statute of limitations purposes,
and it does not purport to address . . . whether an owner may recover under the DTSA when the
misappropriation occurs both before and after the effective date”). Congress specifically limited the
“single claim” language to the DTSA’s statute of limitations provision. See 18 U.S.C. § 1836(d) (“For
purposes of this subsection, a continuing misappropriation constitutes a single claim of
misappropriation.”) (emphasis added). Plaintiffs correctly point out that defendants have misread a
“misappropriation” as occurring only when there is an “acquisition” of a trade secret. The statutory
definition, however, is much broader than that, clearly including the “use” or “disclosure” of a trade
secret. 18 U.S.C. § 1839(5)(B).
10
respect to transactions already completed.” Fernandez-Vargas, 548 U.S. at 37 (quoting
Landgraf v. USI Film Prods., 511 U.S. 244, 280 (1994)). Nevertheless, a statute is not
impermissibly retroactive simply because it is applied in a case arising from conduct that
pre-dates the statute’s enactment. Landgraf, 511 U.S. at 269. “Rather, the court must ask
whether the new provision attaches new legal consequences to events completed before
its enactment.” Id. at 269–70.
The United States Supreme Court has set forth a framework for courts to apply in
determining whether a statute may or may not apply retroactively. This test is applicable
when, as here, the “case implicates a federal statute enacted after the events in suit.”
Landgraf, 511 U.S. at 280. 10 First, courts must look to “whether Congress has expressly
prescribed the statute’s proper reach.” Fernandez-Vargas, 548 U.S. at 37 (quoting
Landgraf, 511 U.S. at 280). If it has, the inquiry ends there. Id. In the absence of an
express congressional command, however, courts “try to draw a comparably firm
conclusion about the temporal reach specifically intended by applying our normal rules of
construction.” Id.
If applying normal rules of statutory construction proves unavailing, courts finally
ask “whether applying the statute to the person objecting would have a retroactive
consequence in the disfavored sense of affecting substantive rights, liabilities, or duties
10
At the outset, it is worth noting that the ex post facto inquiry applies to this case. Although
Brand stresses that it has alleged a continuing misappropriation, even so, Brand’s complaint contains
dozens of allegations of misappropriation that pre-date the enactment of the DTSA. Thus, we have here a
case that “implicates a federal statute enacted after the events in suit.” Landgraf, 511 U.S. at 280. With
that said, the instances of misappropriation that occurred after enactment of the DTSA are irrelevant to
my ex post facto analysis. However, I must consider whether application of the DTSA to alleged instances
of misappropriation that occurred prior to the DTSA’s enactment would violate the Ex Post Facto Clause.
11
[on the basis of] conduct arising before [its] enactment.” Id. (quoting Landgraf, 548 U.S.
at 37) (alterations in original)). “If the answer is yes, we then apply the presumption
against retroactivity by construing the statute as inapplicable to the event or act in
question owing to the absen[ce of] a clear indication from Congress that it intended such
a result.” Id. (alterations in original). 11
b.
Express Congressional Command
The first step of the present analysis requires looking to “whether Congress has
expressly prescribed the [DTSA]’s proper reach.” Fernandez-Vargas, 548 U.S. at 37
(quoting Landgraf, 511 U.S. at 280). I find that Congress has not expressly prescribed the
DTSA’s proper reach.
Congress decided that the DTSA shall apply to the “misappropriation of a trade
secret . . . for which any act occurs on or after the date of the enactment of this Act.”
Defend Trade Secrets Act of 2016, Pub. L. No. 114–153, § 2(e), 130 Stat. 376 (2016).
This provision is susceptible to multiple different readings. On one hand, it could be read
as only applying to misappropriations that occur on or after the date of enactment.
Conversely, the phrase “for which any act occurs” seems to suggest that, so long as any
11
The U.S. Court of Appeals for the Third Circuit appears to have interpreted the retroactivity
analysis in Landgraf to allow for application of a statute to pre-enactment conduct as long as the statute
was enacted at the time a plaintiff filed his or her complaint. Monoson v. United States, 516 F.3d 163,
169 (3d Cir. 2008). Following this precedent would easily result in a finding that the DTSA is permissibly
retroactive because Brand filed its complaint after the DTSA was enacted. Thus, presumably, like the
plaintiff in Monoson, “when [Brand] filed suit . . . [it] was entitled to damages” under the DTSA. 516
F.3d at 169. Nevertheless, in deference to Landgraf’s emphasis on the enactment of the statute (rather
than the filing of the complaint) as the operative date, I will analyze whether the DTSA applies to alleged
conduct that occurred prior to May 11, 2016.
12
act of misappropriation occurs after the enactment date, other related acts of
misappropriation that began pre-enactment are also actionable.
To be sure, Congress could have simply stated that the DTSA applies to “any
misappropriation of a trade secret that occurs after the enactment date.” It did not.
Instead, Congress inserted qualifying language: “for which any act occurs.” Id. This
phrase could reasonably be read to make the DTSA applicable to a pattern of
misappropriations or one continuing misappropriation composed of multiple “acts.”
Similar statutory language has previously been held too ambiguous to provide a
resolution of the retroactivity question at this first stage of an ex post facto inquiry. See
Landgraf, 511 U.S. at 257–58 (finding that such statutory “language does not, by itself,
resolve the question” of whether a federal statute should apply retroactively). 12 Therefore,
the DTSA’s express congressional language alone does not resolve this dispute.
c.
Application of Normal Rules of Construction
In the absence of an express congressional command, I must “try to draw a
comparably firm conclusion about the temporal reach [of the DTSA] specifically
intended by applying . . . normal rules of construction.” Fernandez-Vargas, 548 U.S. at
12
The effective-date provision at issue in Landgraf stated: “Except as otherwise specifically
provided, this Act and the amendments made by this Act shall take effect upon enactment.” 511 U.S. at
257 (quoting Title VII of the Civil Rights Act, § 402(a) (1991)). Although the DTSA provision here states
that the DTSA shall apply to acts of misappropriation that occur “on or after” the DTSA’s enactment, like
the provision in Landgraf, the DTSA’s “language does not, by itself, resolve the question before us.” 511
U.S. at 257. As explained by the U.S. Supreme Court, “[a] statement that a statute will become effective
on a certain date does not even arguably suggest that it has any application to conduct that occurred at an
earlier date.” Id. It is clear from the DTSA’s language that the DTSA applies to acts of misappropriation
that occur after the enactment date. However, the DTSA’s text does not answer the question of whether
the DTSA applies to misappropriations—or continuing misappropriations—that began prior to the
enactment date and continued afterward.
13
37 (quoting Landgraf, 511 U.S. at 280); accord Monoson v. United States, 516 F.3d 163,
166 (3d Cir. 2008). In doing so, I conclude that application of the DTSA to this case is
permissible. 13
The statutory language and legislative history of the DTSA reveal Congress’s
intent to apply the DTSA to continuing misappropriations that began prior to its
enactment but continued post-enactment. While § 2(e) of the DTSA may be ambiguous
regarding the temporal reach of the Act, the DTSA’s legislative history eliminates this
ambiguity. At the same time, it evinces Congress’s clear intent for the DTSA to apply to
the type of continuing misappropriation alleged here. 14
In formulating the DTSA, Congress had at its disposal a plethora of potential
statutory blueprints: (1) the UTSA; and (2) forty-eight states’ trade secrets laws. 15
Congress explicitly acknowledged its intent to follow these statutory frameworks in
drafting the DTSA. H.R. REP. NO. 114-529, at 2–5, 12–14 (2016). 16 Indeed, Congress
13
Early case law sometimes suggested that there is a general presumption against retroactivity
attendant at every step of the Landgraf analysis. The U.S. Supreme Court has since rejected this notion.
Instead, a court is only to apply a presumption against retroactivity after it has determined there is no
express congressional command and Congress’s intent cannot be gleaned from applying normal rules of
construction. Fernandez-Vargas, 548 U.S. at 37–38, 40. The presumption does not apply at the outset
because, if it did, “a statute lacking an express provision about temporal reach would never be construed
as having a retroactive potential and the final two steps in the Landgraf enquiry would never occur.” Id. at
40.
14
That is, a continuing misappropriation that began prior to the enactment of the DTSA but
continued after the enactment date.
15
The UTSA has formed the basis of trade secrets laws in almost every state that has passed one.
H.R. REP. NO. 114-529, at 12.
16
Congress has stated that the DTSA’s equitable remedy provision is “drawn directly from . . . the
[UTSA].” H.R. REP. NO. 114-529, at 12. Congress also stated that the following DTSA provisions are
“drawn directly” from, “identical to,” “similar to,” or “modeled after,” the UTSA: (1) the actual damages
provision; (2) exemplary damages provision; (3) attorney’s fees provision; (4) statute of limitations
14
expressed its specific intent to model the DTSA in large part after the UTSA. For
example, Congress directly modeled the DTSA’s damages provisions after the UTSA’s
damages provisions. Id. at 12–13. Congress made the DTSA’s statute of limitations
period identical to the UTSA’s. Id. at 13. Congress also copied UTSA provisions in
defining the DTSA’s most influential and significant terms. The DTSA’s definition of
“trade secret” conforms to the UTSA’s definition of the same term. Id. at 13–14. The
definitions of “misappropriation” and “improper means” are also the same under the
DTSA as they are under the UTSA. Id. at 14.
It is clear that Congress borrowed heavily from the UTSA and the states’ trade
secrets laws in drafting many (if not most) provisions of the DTSA. The enactment of the
DTSA was not a response to an inherent inadequacy in the states’ trade secrets laws.
Rather, it was merely an answer to the growing need for a uniform federal cause of action
for trade-secret misappropriation in an increasingly “national and global economy.” Id. at
4. Congress intended the DTSA to apply in substantially the same way as the states’ trade
secrets laws, but with a much broader geographic and jurisdictional reach. Id. at 2–5, 12–
14. 17
provision; (5) definition of “trade secret”; (6) definition of “misappropriation”; and (7) definition of
“improper means”. Id. at 2, 13–14.
17
According to Congress, “[t]he [DTSA]’s definition of misappropriation is modeled on the
[UTSA], versions of which have been adopted by 48 states.” H.R. REP. NO. 114-529, at 5. Congress went
out of its way to make clear that the DTSA does not preempt state trade secret laws. Id. Rather, the DTSA
merely provides “a complementary Federal remedy if the jurisdictional threshold for Federal jurisdiction
is satisfied.” Id. The reason for creating such federal jurisdiction is that the states’ trade secrets laws
“contain built-in limitations that make them not wholly effective in a national and global economy.” Id. at
4. These limitations are: (1) the state laws require companies to maintain “costly compliance plans”; (2)
“trade secret theft today is often not confined to a single state”; and (3) “trade secret cases often require
swift action by courts across state lines to preserve evidence . . . .” Id.
15
Congress’s heavy reliance on the UTSA makes its exclusion of certain UTSA
provisions from the DTSA especially revealing. 18 The UTSA states: “This [Act] . . . does
not apply to misappropriation occurring prior to the effective date. With respect to a
continuing misappropriation that began prior to the effective date, the [Act] also does not
apply to the continuing misappropriation that occurs after the effective date.” UTSA § 11.
Pennsylvania’s Uniform Trade Secrets Act contains nearly identical language: “This act
shall not apply to misappropriation occurring prior to the effective date of this act,
including a continuing misappropriation that began prior to the effective date of this act
and which continues to occur after the effective date of this act.” PUTSA, Pub. L. No.
143, § 4 (2004). Many other states have also included similar or identical provisions in
their respective trade secrets laws. See, e.g., Wy. Stat. Ann. § 40-24-110; Mo. Stat. §
417.467; S.D. Cod. L. §37-29-11; Az. H.B. 2013, ch. 37, § 3 (1990); N.J. Trade Secrets
Act, ch. 161, ass. 921, § 10 (2011); Tenn. Unif. Trade Secrets Act, Pub. Ch. 647, H.B.
No. 2350, § 11 (2000).
The DTSA’s “effective date” provision, however, is very different. Congress
specifically omitted the language (from the UTSA and states’ trade secrets laws) that
would have precluded the DTSA from applying to misappropriations that occurred preenactment. Congress also omitted the language that would have made the DTSA
inapplicable to a misappropriation that begins before, but continues after, the effective
date.
18
It is generally presumed that “Congress acts intentionally and purposely in the disparate
inclusion or exclusion” of language in a particular statute. Burlington N. & Santa Fe Ry. Co. v. White,
548 U.S. 53, 63 (2006).
16
If Congress had wished to prevent application of the DTSA to continuing
misappropriations that began pre-enactment, it easily could have. This simply would have
required it to (as it did with countless other provisions) “rubberstamp” § 11 of the UTSA
into the DTSA. Given its obvious familiarity with the UTSA’s—and other state trade
secrets laws’—provisions, any suggestion that Congress was unaware of the availability
and import of § 11 would be nonsensical. It only follows that, when Congress did not
adopt the anti-retroactivity provisions found in the UTSA and many states’ trade secret
laws, it did so consciously and for a reason.
Accordingly, I find that Congress clearly expressed its intent to apply the DTSA to
continuing misappropriations that began prior to—but continued after—the DTSA’s
enactment. 19 In short, because Brand’s claim is that the defendants continued to
misappropriate its trade secrets after the DTSA’s enactment, the events giving rise to
Brand’s DTSA claim were not “completed before [the DTSA’s] enactment.” Landgraf,
511 U.S. at 269–70.
Defendants’ motion to dismiss Brand’s claim under the DTSA is denied.
19
This conclusion was reached after applying ordinary rules of construction as required by
applicable retroactivity and ex post facto jurisprudence. Courts routinely rely on the ordinary rules of
construction at the second stage of a retroactivity analysis in deciphering Congress’s intent regarding a
statute’s applicability to pre-enactment conduct. E.g., Fernandez-Vargas, 548 U.S. at 50. My finding here
is not unique. In other contexts, laws have been held to be applicable to pre-enactment conduct, without
violating the Ex Post Facto clause, when the conduct continued post-enactment. E.g., United States v.
Moscony, 927 F.2d 742, 754–55 (3d Cir. 1991). It should be remembered that a statute is not
impermissibly retroactive simply because it is applied in a case arising from conduct that pre-dates the
statute’s enactment. Landgraf, 511 U.S. at 269. “Rather, the court must ask whether the new provision
attaches new legal consequences to events completed before its enactment.” Id. at 269–70.
17
B.
Racketeer Influenced and Corrupt Organizations Act (RICO) Claim
Defendants want me to dismiss Brand’s RICO claim because: (1) Brand has failed
to allege facts establishing the “existence of an enterprise”; and (2) Brand has failed to
sufficiently plead a “pattern of racketeering activity.”
1.
Existence of An Enterprise
RICO makes it unlawful “for any person employed by or associated with any
enterprise engaged in, or the activities of which affect, interstate or foreign commerce, to
conduct or participate, directly or indirectly, in the conduct of such enterprise’s affairs
through a pattern of racketeering activity.” 18 U.S.C. § 1962(c). This prohibition
necessarily requires the existence of an “enterprise.” Id. To state a claim under § 1962(c),
the plaintiff must allege that a “person” employed by or associated with an “enterprise”:
“(1) conducted (2) an enterprise (3) through a pattern (4) of racketeering activity.” Lum
v. Bank of Am., 361 F.3d 217, 233 (3d Cir. 2004) (citations omitted).
There are two types of associations that constitute valid “enterprises” under RICO.
In re Ins. Brokerage Antitrust Litig., 618 F.3d 300, 364 (3d Cir. 2010). The first type is
any sort of formal legal entity, such as a corporation or partnership. Id. The second type
is an “association-in-fact,” which is “any union or group of individuals associated in fact
although not a legal entity.” Id. (quoting United States v. Turkette, 452 U.S. 576, 581–82
(1981)).
In pleading the first type of enterprise, a legal entity, all aspects of the enterprise
structure are met by mere proof of the existence of the legal entity. In re Ins. Brokerage
Antitrust Litig., 618 F.3d at 364. Necessary to any RICO claim, however, is that the
18
“person” alleged to have committed violations is separate and distinct from the
“enterprise.” Jaguar Cars, Inc. v. Royal Oaks Motor Car Co., 46 F.3d 258, 268 (3d Cir.
1995). In other words, there must be a person acting through an enterprise; a corporation
may not serve as both the “person” and the “enterprise.” Id.
In light of this separate-and-distinct requirement, courts at one time struggled with
how to approach RICO claims where the alleged “person” is a corporate employee of the
alleged “enterprise.” However, the U.S. Supreme Court has since made clear that an
enterprise is properly pled where a corporate employee “allegedly conducts the
corporation’s affairs in a RICO-forbidden way.” Cedric Kushner Promotions, Ltd v.
King, 533 U.S. 158, 163 (2001). The Court explained: “an employee who conducts the
affairs of a corporation through illegal acts comes within the terms of a statute that
forbids any ‘person’ unlawfully to conduct an ‘enterprise,’ particularly when the statute
explicitly defines ‘person’ to include ‘any individual . . . capable of holding a legal or
beneficial interest in property,’ and defines ‘enterprise’ to include a ‘corporation.’” Id.
(quoting 18 U.S.C. § 1961(3), (4)). This is the case whether the alleged enterprise is
legitimate or illegitimate. Id. at 164–65; Jaguar Cars, 46 F.3d at 268–69. Accordingly,
when a plaintiff asserts a legal entity as the “enterprise,” her pleading requirements may
be met “without great difficulty.” In re Ins. Brokerage Antitrust Litig., 618 F.3d at 364. 20
In pleading the second type of enterprise, an association-in-fact, the plaintiff must
allege “a group of persons associated together for a common purpose of engaging in a
20
Conversely, a plaintiff cannot make out a valid RICO claim by asserting that “a corporation
was the ‘person’ and the corporation, together with all its employees and agents, were the ‘enterprise.’”
Cedric Kushner, 533 U.S. at 164.
19
course of conduct.” Boyle v. United States, 556 U.S. 938, 946 (2009). The plaintiff must
establish three structural components to an association-in-fact enterprise: (1) a purpose;
(2) relationships among those alleged to be associated with the enterprise; and (3)
longevity sufficient to allow the enterprise to pursue its purpose. Macauley v. Nicholas, 7
F. Supp. 3d 468, 482 (E.D. Pa. 2014) (citing Boyle, 556 U.S. at 946).
Brand alleges three enterprises: (1) Irex; (2) Vertical Access; and (3) an associatein-fact comprised of several individual defendants. 21 I find that Brand has pled sufficient
facts establishing each of these enterprises.
a.
Irex and Vertical Access (Legal Entity Enterprises)
Brand alleges that, as legal entities, both Irex and Vertical Access are RICO
enterprises that were used by the defendants to carry out their allegedly unlawful scheme.
Defendants contend that neither Irex nor Vertical Access are proper “enterprises” because
they are not distinct and separate from the individual defendants.
It is clear from Brand’s amended complaint that Irex and Vertical Access are
sufficiently pled enterprises. Both Brand and Vertical Irex are corporate entities.
Consequently, “all aspects of the enterprise element . . . are satisfied by the mere proof
that [Brand and Irex] do[] in fact have a legal existence.” In re Ins. Brokerage Antitrust
Litig., 618 F.3d at 364. Defendants’ argument that the individual defendants are not
21
Courts consider the viability of each alleged enterprise even when pled in the alternative. In re
Ins. Brokerage Antitrust Litig., 618 F.3d at 373–84; Schwartz v. Lawyers Title Ins. Co., 970 F. Supp. 2d
395, 403 (E.D. Pa. 2013) (“Plaintiffs may allege alternative enterprise theories in their complaint without
limit.”). Vertical Access, also a defendant here, is an Irex-affiliated company where some of the
individual defendants worked or currently work.
20
distinct and separate from Irex or Vertical access is foreclosed by Cedric Kushner and
Third Circuit precedent.
Brand specifically pleads that the individual defendants, who are corporate
employees, used Irex and Vertical Access to “conduct[] the corporation’s affairs in a
RICO-forbidden way.” Cedric Kushner, 533 U.S. at 163. Brand claims the individual
defendants did this by stealing Brand’s proprietary trade information, committing mail
and wire fraud, and stealing Brand equipment. Once the individual defendants—former
Brand employees—were working at Irex, they allegedly carried on Irex’s affairs by
improperly using Brand’s proprietary information on customers, sales, data, and
marketing. As legal entities, Irex and Vertical Access are sufficiently separate and
distinct from the individual defendants. Id. at 163–64; Jaguar Cars, 46 F.3d at 269
(“[W]hen . . . employees operate and manage a legitimate corporation, and use it to
conduct, through interstate commerce, a pattern of racketeering activity, those defendant
persons are properly liable under § 1962(c).”).
Therefore, Irex and Vertical Access are properly pled RICO enterprises. 22
22
Brand does not plead that Irex and Vertical Access used the individual defendants to carry out a
RICO-forbidden scheme. Conversely, Brand pleads that the individual defendants used Irex and Vertical
Access to carry out their own RICO-forbidden scheme. Such allegations make out a valid RICO
enterprise. Cedric Kushner, 533 U.S. at 164. Defendants cite to a string of cases (some non-binding, some
from the early 1990s) in an attempt to convince me that the individual defendants are not separate and
distinct from Irex or Vertical Access. However, defendants fail to call into question Brand’s reliance on
much more recent Supreme Court and Third Circuit precedent, all of which supports Brand’s enterprise
argument.
21
b.
Individual Defendants (Association-in-Fact Enterprise)
Brand alleges that defendants Rowe, Kwiatkoski, Altmeyer, Shriver, Maupin, and
Keane make up an association-in-fact enterprise. Defendants counter, arguing that this
association-in-fact lacks the requisite structure and longevity under RICO.
The U.S. Supreme Court has held that an association-in-fact is proven by showing
that: (1) there is an ongoing organization, formal or informal; (2) the associates of the
group function as a continuing unit; and (3) the organization has an existence separate
and apart from the alleged pattern of racketeering activity. Turkette, 452 U.S. at 583. The
Supreme Court later expounded upon these requirements, holding that an association-infact must have three structural components: (1) a purpose, (2) relationships among those
associated with the enterprise, and (3) longevity sufficient to permit these associates to
pursue the enterprise’s purpose. Boyle, 556 U.S. at 940. An enterprise is properly pled
where the associates “engage in spurts of activity punctuated by periods of quiescence.”
Id.
In In re Insurance Brokerage Antitrust Litigation, the U.S. Court of Appeals for
the Third Circuit outlined the requirements for pleading an association-in-fact enterprise.
618 F.3d 300 (3d Cir. 2010). It stressed that an enterprise does not require a formal
structure or systemic plan. In re Insurance Brokerage Antitrust Litig., 618 F.3d at 403.
Brand has sufficiently pled an association-in-fact enterprise. The facts alleged
show that defendants Rowe, Kwiatkoski, and Altmeyer were the “leaders” of the other
individual defendants. These associates allegedly acted together, initially as co-workers at
Brand, to download and steal Brand’s proprietary business information and trade secrets.
22
Later, they acted together as employees at Irex. These members allegedly stole Brand’s
scaffolding equipment, which they later used for their own benefit as employees at Irex
and Vertical Access. This conduct occurred over several years with varying periods of
severity, according to the amended complaint. Brand alleges these members had meetings
in furtherance of their common scheme to defraud Brand by misappropriating and
stealing Brand’s trade secrets and equipment.
At this stage of the case, I am satisfied that Brand has met the Boyle standard.
Brand alleges the members of the association-in-fact had a purpose: to use Brand’s
business information and equipment to benefit themselves by eliminating Brand as a
competitor of Irex. The individual defendants had a relationship in that they held
meetings in furtherance of their common scheme, which was spearheaded by the alleged
leaders, Rowe, Kwiatkoski, and Altmeyer. The longevity of this alleged association-infact (over two years) is sufficient. See Devon Drive Lionville, LP v. Parke Bancorp, Inc.,
2:15–cv–3435, 2016 WL 7475816, at *8 (E.D. Pa. Dec. 29, 2016) (recognizing that a
span of “approximately two years” and “two years” is sufficient to satisfy Boyle’s
longevity requirement); see also United States v. Eiland, 738 F.3d 338, 360 (D.C. Cir.
2013) (two years sufficient); CIT Grp./Equip. Fin., Inc. v. Krones, Inc., Civ. A. No. 9–
432, 2009 WL 3579037, at *9 (W.D. Pa. Sept. 16, 2009) (holding that 18-month period
of alleged unlawful conduct was sufficient to satisfy RICO’s longevity requirement). 23
23
In its motion to dismiss, Irex does not do much more than recite the three requirements of an
association-in-fact under Boyle. (Doc. No. 72 at 25). While Irex contends that some members of the
association-in-fact did not participate in every single predicate act with the other members, “there is no
need for a plaintiff to prove that each conspirator had contact with all other members.” Schwartz, 970 F.
Supp. 2d at 404.
23
For all these reasons, I find that the purported association-in-fact is adequately
pled.
2.
Pattern of Racketeering Activity
Irex also attacks Brand’s RICO claims on the basis that Brand has not sufficiently
alleged a “pattern of racketeering activity.”
In order to make out a claim under RICO, a plaintiff must plead a “pattern of
racketeering activity.” 18 U.S.C. § 1961(5); H.J. Inc. v. Nw. Bell Tel. Co., 492 U.S. 229,
237 (1989); United States v. Bergrin, 650 F.3d 257, 266–67 (3d Cir. 2011). A “pattern of
racketeering activity” requires at least two predicate acts of racketeering activity. Bergrin,
650 F.3d at 266–67. The predicate acts must be related and pose the risk of continued
criminal activity. Id. at 267. ‘“Relatedness’ can be shown through evidence that the
criminal activities ‘have the same or similar purposes, results, participants, victims, or
methods of commission, or otherwise are interrelated by distinguishing characteristics
and are not isolated events.’” Id. (quoting H.J. Inc., 492 U.S. at 240).
Under RICO, “racketeering activity” consists of a list of dozens of enumerated
crimes. 18 U.S.C. § 1961(1). This list of crimes includes the theft of trade secrets, mail
and wire fraud, and interstate transportation of stolen property. Id. (citing 18 U.S.C. §§
1832, 1341, 1343, 2314–15). The continuity of predicate acts may be established in two
different ways: (1) close-ended continuity, and (2) open-ended continuity. Bergrin, 650
F.3d at 267. A plaintiff can prove close-ended continuity by demonstrating “a series of
related predicates extending over a substantial period of time.” Id. Whether a plaintiff can
24
prove open-ended continuity depends upon whether a “threat of continuity is
demonstrated.” Id. (emphasis in original). 24
Brand’s amended complaint alleges a series of alleged “predicate acts.” As already
discussed, Brand alleges that the defendants stole Brand’s trade secrets in violation of the
DTSA. Brand alleges dozens of DTSA violations. There is also a threat that the DTSA
violations will continue because, allegedly, the defendants continue to use Brand’s trade
secrets in their business affairs at Irex. These allegations alone are sufficient to constitute
a “pattern of racketeering activity” under RICO. 25
Brand pleads more than just DTSA allegations to make out a pattern of
racketeering activity. Brand also alleges the defendants committed various acts of mail
and wire fraud, which is a predicate act under RICO. The elements of mail and wire fraud
are: (1) a scheme to defraud; (2) use of the mails to further that scheme; and (3)
fraudulent intent. United States v. Pharis, 298 F.3d 228, 233–34 (3d Cir. 2002).
According to the amended complaint, defendants committed mail and wire fraud by
sharing stolen Brand information via email and communicating via email to defraud Irex
24
The United States Supreme Court has recognized that the two concepts of “relatedness” and
“continuity” must be stated separately “[f]or analytical purposes,” but “in practice their proof will often
overlap.” H.J. Inc., 492 U.S. at 239.
25
In its motion to dismiss, Irex purports to challenge the sufficiency of Brand’s allegations under
the DTSA, but it never does. See Doc. No. 72 at 20 (“As discussed above, Brand’s [DTSA] claim fails as
a matter of law. See supra __.”); id. at 4 n.4 (“With respect to the few alleged trade secrets Brand does
purport to identify, Irex will demonstrate that none of the information is actually a trade secret as the
information was learned from other, non-Brand sources, was readily available to competitors and others
within the industry, and was not treated or protected by Brand as a trade secret.”). Despite its promise to
demonstrate that none of the alleged information Brand relies on were “trade secrets,” Irex never delivers
on this promise. Nor does Irex challenge the sufficiency of Brand’s DTSA allegations on any other
substantive ground. Instead, Irex limits its argument regarding the DTSA to its retroactive effect. Id. at
6–7.
25
and poach construction projects from Brand. (Doc. No. 61 ¶ 391). Brand further alleges
the defendants “used the mails and wires to transfer and download Brand drawings, trade
secrets, and other proprietary business information to usurp [Brand]’s business
opportunities, existing and prospective contracts, and otherwise harm Plaintiffs.” (Id. ¶
392). Brand relies on specific factual allegations—i.e., who, what, when, where—in
support of these allegations. (Id. ¶ 391).
At the motion to dismiss stage, these allegations are sufficient to establish a
plausible claim for mail and wire fraud even under the heightened pleading standard set
forth in Federal Rule of Civil Procedure 9(b). “A scheme to defraud encompasses any
deliberate plan of action or course of conduct by which someone intends to deceive or
cheat another or by which someone intends to deprive another of something of value.”
Devon IT, Inc. v. IBM Corp., 805 F. Supp. 2d 110, 123 (E.D. Pa. 2011). A plaintiff’s
pleading burden is satisfied by alleging “some sort of fraudulent misrepresentation or
omissions reasonably calculated to deceive persons of ordinary prudence and
comprehension.” Id. (citing Kehr Packages, Inc. v. Fidelcor, Inc., 926 F.2d 1406, 1415
(3d Cir. 1992)). To prove a scheme to defraud, “[t]he scheme need not involve
affirmative misrepresentation.” Fidelcor, 926 F.2d at 1415. To “defraud,” statutorily,
means to deprive another “of something of value by trick deceit, chicane, or
overreaching.” Id. (citing McNally v. United States, 483 U.S. 350, 358 (1987), abrogated
on other grounds, Skilling v. United States, 561 U.S. 358, 401–02 (2010)).
While Brand does not plead an “affirmative misrepresentation,” its allegations that
defendants stole Brand’s trade secrets and used thousands of email transmissions to
26
further their scheme certainly communicates an intent to deprive Brand of something of
value: its business. Contrary to Irex’s argument, reliance is not a required element of
proof with respect to pleading mail and wire fraud. See Bridge v. Phoenix Bond &
Indem. Co., 553 U.S. 639, 648 (2008) (emphasizing that alleging mail and wire fraud is a
sufficient predicate act under RICO “even if no one relied on any misrepresentation”).
In addition to DTSA violations and mail and wire fraud, Brand alleges another
predicate act: defendants transported stolen property across state lines. Specifically,
Brand avers that, in furtherance of a scheme to defraud, defendant Kwiatkoski stole
scaffolding equipment from Brand and transported it from West Virginia to Maryland.
(Doc. No. 61 ¶ 259). Viewing this allegation as true, as I must at this stage, this conduct
amounts to a predicate act under RICO. 18 U.S.C. § 1961(1) (citing 18 U.S.C. §§ 2314,
2315). 26
To summarize, Brand has sufficiently alleged a RICO claim against defendants.
Brand pleads several viable enterprises. These enterprises, according to Brand,
orchestrated a scheme to defraud Brand by stealing its trade secrets, stealing its
equipment, and using its proprietary business information. Viewed together, the
voluminous allegations of trade secrets theft, mail and wire fraud, and interstate
transportation of stolen property form a plausible pattern of racketeering activity.
26
The defendants’ alleged predicate acts, including the mail and wire fraud, are all related; each
act was allegedly committed in furtherance of the same overall purpose: to deprive Brand of business and
profits by using Brand’s stolen property. I need not consider the second allegation of transportation of
stolen property across state lines because the previously mentioned predicate acts are sufficient in their
own right to form a pattern of racketeering activity. Discovery will reveal whether this second instance of
alleged equipment theft was “interstate” in nature.
27
For all these reasons, I will deny Irex’s motion to dismiss Brand’s RICO claims. 27
C.
Computer Fraud and Abuse Act (CFAA) Claim
Brand’s final federal claim is brought under the Computer Fraud and Abuse Act
(CFAA). I find that Brand has stated a plausible claim for indirect access under the
CFAA. Therefore, I will deny Irex’s motion to dismiss the CFAA claim.
The CFAA was enacted by Congress in an attempt to create a cause of action
against computer hackers. Dresser-Rand Co. v. Jones, 957 F. Supp. 2d 610, 613 (E.D. Pa.
2013). The CFAA provision relevant to this case imposes civil liability on anyone who
knowingly “accesses a protected computer without authorization, or exceeds authorized
access” of a protected computer. 18 U.S.C. § 1030(a)(4). The CFAA does not define the
term “access.” Dresser-Rand, 957 F. Supp. 2d at 614. The CFAA defines the term
“exceeds authorized access” as “to access a computer with authorization and to use such
access to obtain or alter information in the computer that the accesser is not entitled so to
obtain or alter.” 18 U.S.C. § 1030(e)(6).
Irex argues that Brand’s CFAA claim must be dismissed because the individual
defendants were authorized, as employees of Brand, to access Brand’s computers. The
law favors Irex on this point. However, Brand has alleged a plausible indirect-access
claim under CFAA. Therefore, I will deny defendants’ motion to dismiss the CFAA
claim.
27
Irex argues that Brand’s RICO conspiracy claim under § 1962(d) fails because Brand has not
alleged any substantive RICO violation. Because I have already concluded that Brand has alleged various
substantive RICO violations (i.e. trade secret theft, mail and wire fraud, and interstate transportation of
stolen property) I will deny Irex’s motion to dismiss the RICO conspiracy claim.
28
1.
Authorized Access
Circuit courts are split on the issue of what constitutes “without authorization”
under Section 1030(a)(4) of the CFAA.
Some circuits have adopted the view that an employee who has access to a work
computer is authorized to access that computer regardless of his or her intent to
subsequently misuse the information and any policies to regulate the use of information.
WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199 (4th Cir. 2012); United
States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc); LVRC Holdings LLC v. Brekka,
581 F.3d 1127 (9th Cir. 2009); accord Dresser-Rand, 957 F. Supp. 2d at 616. Under this
view, because the employee has authorization at the time of access, there is no CFAA
claim against the employee. Id. Although the U.S. Court of Appeals for the Third Circuit
has not yet addressed this question, district courts within the Third Circuit have endorsed
this approach. See, e.g., Kappe Assocs., Inc. v. Chesapeake Environ. Equip., LLC, No.
15-2211, 2016 WL 1257665, at *8 (E.D. Pa. Mar. 31, 2016) (Leeson, J.); Dresser-Rand,
957 F. Supp. 2d at 616 (Brody, J.); Grant Mfg. & Alloying, Inc. v. McIlvain, No. 101029, 2011 WL 4467767, at *6–7 (E.D. Pa. Sept. 23, 2011) (Sánchez, J.), aff’d, 499 F.
App’x 157 (3d Cir. 2012); Clinton Plumbing & Heating of Trenton, Inc. v. Ciacco, No.
09-2751, 2010 WL 4224473, at *5 (E.D. Pa. Oct. 22, 2010) (Rufe, J.); Integrated Waste
Solutions, Inc. v. Goverdhanam, No. 10-2155, 2010 WL 4910176, at *8 (E.D. Pa. Nov.
30, 2010) (Buckwalter, J.); Bro-Tech Corp. v. Thermax, Inc., 651 F. Supp. 2d 378, 407
(E.D. Pa. 2009) (Rufe, J.); Brett Senior & Assocs., P.C. v. Fitzgerald, No. 06-1412, 2007
WL 2043377, at *3 (E.D. Pa. July 13, 2007) (McLaughlin, J.).
29
The second competing view is broader in that it creates CFAA liability for any
employee who exceeds his or her access by misusing information obtained on a work
computer. United States v. John, 597 F.3d 263 (5th Cir. 2010); United States v.
Rodriguez, 628 F.3d 1258 (11th Cir. 2010); Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d
418 (7th Cir. 2006); EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir.
2001). Unlike the first view, an employee may be liable under this view, even if it has
authorization at the time of access, if the employee subsequently misuses the information
accessed.
I see no reason to stray from my fellow district judges within the Third Circuit
who have adopted the more narrow view. This view aptly recognizes that the other view
would subject too wide a class of individuals—such as family members of employees—
to CFAA liability. Dresser-Rand, 957 F. Supp. 2d at 618. This was not the intent of
CFAA. Id. Furthermore, since CFAA was aimed at preventing access to computers (not
use), the subjective intent of the accesser should not be taken into account if that person
had authorization to access the computer. Id. 28
Brand’s amended complaint alleges that, while employees at Brand, the individual
defendants used Brand computers to access Brand’s proprietary business information.
They allegedly used this information after they left Brand. This type of claim has been
rejected by courts within this district. Because the defendants had authorization to access
Brand’s computers when they did, their subsequent misuse of this information is not
28
This is not to say that such conduct would not be a violation of some other federal statute or
state law.
30
actionable. Cf. Dresser-Rand, 957 F. Supp. 2d at 620 (“[Defendants] accessed their work
laptops and downloaded thousands of documents to external storage devices. If [the
defendants] were authorized to access their work laptops and to download files from
them, they cannot be liable under the CFAA even if they subsequently misused those
documents to compete against [plaintiff].”).
2.
Indirect Access
Brand presents an additional and alternative theory of liability: indirect access.
Brand’s allegations of indirect access are sufficient to state a claim under the CFAA.
Brand alleges that the defendants acted in concert to have Cathy Walls, who was
an employee at Brand after the defendants left, access Brand’s computers. Brand further
alleges that the individual defendants then used the information Walls accessed to their
benefit while at Irex and Vertical Access. Unlike claims of direct authorized access, a
person may be liable if he directs, encourages, or induces someone else to access a
computer that he himself is not authorized to access. E.g., Advanced Fluid Sys., Inc. v.
Huber, 28 F. Supp. 3d 306, 327 (M.D. Pa. 2014). 29 This theory of liability is premised on
the concept that “access” may be achieved through another person. This is especially true
in our current era, and to hold otherwise would be to ignore the nature of technological
communication.
Confronted with a similar indirect-access claim under CFAA, Judge Buckwalter
reached the same result as I do. In doing so, he reasoned that although the defendants’
29
Irex recognizes this alternate theory in its briefing, but it does not provide a single case to
contradict or call into question Brand’s precedent, which fully supports this theory. (Doc. No. 72 at 10
n.8).
31
access was “not personal . . . . the plain language of the statute requires only ‘access’—no
modifying term suggesting the need for ‘personal access’ is included.” Synthes, Inc. v.
Emerge Med., Inc., No. 11-1566, 2012 WL 4205476, at *17 (E.D. Pa. Sept. 19, 2012). I
agree with this distinction.
I will deny defendants’ motion to dismiss Brand’s CFAA claim. However, Brand
is limited to pursuing its CFAA claim under an indirect-access theory.
IV.
CONCLUSION
Brand states plausible claims under the DTSA, RICO, and CFAA. Accordingly, I
will deny defendants’ motion to dismiss in its entirety. 30
30
Irex’s only basis for dismissal of Brand’s state-law claims is that I should decline to exercise
supplemental jurisdiction over them after I dismiss Brand’s federal-question claims. Because I am not
dismissing Brand’s federal-question claims, Brand’s supplemental state-law claims are properly before
me. 28 U.S.C. § 1367. Accordingly, I will deny defendants’ motion to dismiss these claims.
32
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?