Sterling Computers Corporation v. Haskell

Filing 35

ORDER denying 18 Motion to Dismiss. Signed by U.S. District Judge Karen E. Schreier on 2/1/18. (DJP)

Download PDF
UNITED STATES DISTRICT COURT DISTRICT OF SOUTH DAKOTA SOUTHERN DIVISION STERLING COMPUTERS CORPORATION, 4:17-CV-04073-KES Plaintiff, ORDER DENYING MOTION TO DISMISS vs. JULIE HASKELL, Defendant. On May 30, 2017, plaintiff, Sterling Computers Corporation, filed a complaint alleging a violation of the Defend Trade Secrets Act (DTSA) and misappropriation of trade secrets under South Dakota’s Uniform Trade Secrets Act (UTSA) against defendant, Julie Haskell. Docket 1. On May 31, 2017, Sterling filed an Emergency Motion for Expedited Discovery and to Preserve Evidence. Docket 6. Haskell moves to dismiss both counts of the complaint for failure to state a claim under Federal Rule of Civil Procedure 12(b)(6). Docket 18. Sterling opposes the motion. Docket 28. The parties stipulated to set aside Sterling’s Emergency Motion for Expedited Discovery and to Preserve Evidence pending the outcome of Haskell’s motion to dismiss (Docket 22), and the court entered an order adopting the stipulation. Docket 23. For the reasons that follow, the court denies Haskell’s motion to dismiss. BACKGROUND The facts alleged in the complaint, accepted as true, are as follows: Sterling, a California corporation with its principal place of business in Dakota Dunes, South Dakota, sells information technology solutions and products to government and education clients. On or about November 6, 2006, Haskell began her employment with Sterling as a Senior Account Executive while living in Nebraska. Upon her request, Haskell was transferred to Colorado Springs, Colorado in August 2016. As a value-added reseller of IT products, Sterling utilizes a variety of vendors when its salespersons bid for client contracts. Sterling uses Salesforce, an internet database, to store and retrieve information relevant to its business operations. Such information includes client lists, contact information, notes on clients and potential clients, and current project bids submitted by Sterling. Current employees of Sterling can access the Salesforce database with a unique username and password. Sterling maintains reports on its employees’ access to Salesforce. When Haskell began her employment with Sterling in 2006, she signed a form acknowledging that she received and read Sterling’s employee handbook, which contained a confidentiality policy. In 2011 and 2015, Haskell signed additional forms acknowledging her receipt of the revised handbooks. Both the 2011 and 2015 handbooks contained non-disclosure policies and listed some of Sterling’s confidential information subject to the non-disclosure policies. 2 On or about February 10, 2017, Haskell terminated her employment with Sterling to accept a position with a competitor, M2 Technology, a Texas corporation with an office in Colorado. The next day, the President of Sterling began to shut off Haskell’s access to Sterling’s email and network when he noticed that Haskell was signed into the network and deleting emails from her inbox. He then terminated Haskell’s connection and locked her out of Sterling’s system. Following Haskell’s termination, Mike Porach, a Sterling Pre-Sales Solutions Architect, was assigned to follow up with the Missile Defense Agency account that Haskell had been in charge of prior to leaving Sterling. Porach discovered that Haskell did not ask Neutanix, a vendor whose products were quoted to the Missile Defense Agency by Sterling, to perform a deal registration. A deal registration is a feature used by Neutanix that gives the channel partner—here Sterling—priority for a lead and guaranteed pricing during the negotiation. Competitors cannot negotiate with the lead during a set period of time if a deal registration is in place. Porach then discovered that Haskell had asked Neutanix to put the deal registration in her name rather than in Sterling’s name, which led Sterling to search Haskell’s previous emails and Salesforce log. Sterling discovered that on or about January 13, 2017, a few weeks before terminating her employment with Sterling, Haskell had requested assistance from another Sterling employee to create a list on Salesforce of all Colorado contacts, which is highly unusual. Additionally, several Sterling customers have attempted to reply to Haskell’s 3 prior Sterling email address regarding sales projects that Haskell initiated while at Sterling. Sterling alleges that Haskell continues to possess confidential information, specifically the details of the Missile Defense Agency project and a list of Sterling’s Colorado contacts from Salesforce, and she is misusing such information to unfairly compete with Sterling. Thus, Sterling brings suit against Haskell for violation of the DTSA and UTSA. LEGAL STANDARD A court may dismiss a complaint “for failure to state a claim upon which relief can be granted.” Fed. R. Civ. P. 12(b)(6). “To survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’ ” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). “A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Id. “The plausibility standard is not akin to a ‘probability requirement,’ but it asks for more than a sheer possibility that a defendant has acted unlawfully.” Id. The court assesses plausibility by considering only the materials in the pleadings and exhibits attached to the complaint, drawing on experience and common sense, and reviewing the plaintiff’s claim as a whole. Whitney v. Guys, Inc., 700 F.3d 1118, 1128 (8th Cir. 2012). Inferences are construed in favor of the nonmoving party. Id. at 1129 (citing Braden v. Wal-Mart Stores, Inc., 588 4 F.3d 585, 595 (8th Cir. 2009)). A well-pleaded complaint should survive a motion to dismiss “even if it strikes a savvy judge that actual proof of those facts is improbable, and that a recovery is very remote and unlikely.” Twombly, 550 U.S. at 556 (internal quotations omitted). DISCUSSION Count 1 of Sterling’s complaint alleges that Haskell violated the DTSA, and Count 2 alleges that Haskell misappropriated trade secrets in violation of South Dakota’s UTSA. Docket 1. Haskell argues that Sterling’s complaint fails to state a claim because it fails to provide sufficient facts to establish the existence of a trade secret and fails to allege actual or potential damages. Docket 19 at 1. I. Allegation of the Existence of a Trade Secret Under both the DTSA and UTSA, information, such as “patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes,” is a trade secret if it derives actual or potential independent economic value from not being generally known or readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use, and the owner has taken reasonable measures under the circumstances to maintain its secrecy. See 18 U.S.C. § 1839(3); SDCL § 37-29-1(4). In its complaint, Sterling alleges Haskell had access to, among other things, information regarding past and current client projects; customer lists, profiles, and preferences; deal registrations; and pricing structures with clients. Docket 1 ¶ 70. 5 A. Contact List Haskell argues Sterling’s allegation that a “contact list” is a trade secret is insufficient to survive under Iqbal because it does not identify what information in the contact list is a trade secret. Docket 19 at 8. The court disagrees. The factual allegations in the complaint, taken as a whole, do identify plausible trade secret information contained in the contact list that is sufficient to survive a motion to dismiss. See Braden, 588 F.3d at 594 (stating “the complaint should be read as a whole, not parsed piece by piece to determine whether each allegation, in isolation, is plausible.”). Sterling has pleaded facts that Haskell compiled a list of Sterling’s clients and other contacts in Colorado from information in the Salesforce database, which is highly unusual for Sterling salespersons to do, only a few weeks before she terminated her employment with Sterling to work for a competitor. Docket 1 ¶ 21. Haskell further argues Sterling has not explained how the “contact list” derives independent economic value from not being generally known or readily ascertainable. Docket 19 at 8. Haskell also states that the contact list is not a trade secret because many of Sterling’s clients and potential clients are listed on its public website and many of its federal projects are subject to a public bidding process. Id. at 9-10. In its complaint, Sterling outlines how it uses Salesforce, which is a database maintained in Sterling’s secure file server and only accessible by employees through a unique username and password. Docket 1 ¶ 39-40. 6 Sterling also alleges how it had employees, including Haskell, sign confidentiality and non-disclosure agreements. Id. ¶ 4-8. Its Salesforce database includes client lists, contact information, and current projects of Sterling. Id. ¶ 38. It is reasonable to infer that, based on what Sterling alleges in the complaint, the information contained in the restricted Salesforce database is broader than what can be found on public websites. Because Sterling has taken efforts to restrict access to its Salesforce database, Sterling has plausibly established that it derives independent economic value from the information in the database—including the Colorado client contact list—that is not generally known or readily accessible. Finally, Haskell argues Sterling has failed to provide details explaining how Haskell misappropriated the trade secrets in the contact list. Docket 19 at 9. In response, Sterling contends it alleged sufficient facts regarding the Colorado contact list requested and obtained by Haskell, and it is plausible that Haskell misrepresented her purpose in requesting the list. Docket 28 at 15. Under the DTSA, the definition of misappropriation includes the “acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means” or “disclosure or use of a trade secret of another without express or implied consent” by someone who improperly acquired the trade secret. 18 U.S.C. § 1839(5). See also SDCL § 37-29-1(2) (defining misappropriation identically). “All that is required at this [motion to dismiss] stage of the proceedings is an allegation 7 that [the defendant] misappropriated [the plaintiff’s] trade secrets sufficient to put the defense on notice as to the nature of the claim.” Aggreko, LLC v. Barreto, 2017 WL 963170, at *2 (D.N.D. Mar. 13, 2017). Accepting Sterling’s facts as true, the court finds that Sterling plausibly alleges that Haskell misappropriated the Colorado contact list. It was highly unusual for Sterling employees to compile geographical lists like Haskell is alleged to have done here. The list was created on the access-restricted Salesforce database. Additionally, Sterling’s president noticed Haskell actively deleting her emails the day after she terminated her employment with Sterling. Thus, it is plausible that, as Sterling alleges, Haskell did not create the list to “drive more business” as she stated, and instead used the information contained in the list to unfairly compete with Sterling once she began employment with a competitor. B. Bid Structure and Pricing Haskell also argues that Sterling’s allegations regarding “bid structure,” “pricing structure,” and pricing information related to Sterling’s Missile Defense Agency project fail to plead a trade secret because Sterling “has not described the nature or format of the information” to explain how it is a trade secret. Docket 19 at 12-13. A complaint does not need to “precisely describe all of the reasons” its product is a trade secret because “ ‘[t]he exact nature of the trade secret is a matter for discovery.’ ” Superior Edge, Inc. v. Monsanto Co., 964 F. Supp. 2d 1017, 1042 (D. Minn. 2013) (quoting SL Montevideo Tech., Inc. v. Eaton 8 Aerospace, LLC, 292 F. Supp. 2d 1173, 1179 (D. Minn. 2003)). The court finds that Sterling’s complaint contains sufficient factual allegations to plausibly allege that the pricing information about the Missile Defense Agency project is a trade secret. Haskell began working on the Missile Defense Agency project in October 2016. Docket 1 ¶ 15. She put Neutanix’s deal registration for the Missile Defense Agency project in her own name instead of Sterling’s name, and a deal registration contains guaranteed pricing for a set period of time. Id. ¶ 17-18. After she terminated her employment with Sterling, Haskell possessed “information about the pricing structure between Neutanix and Sterling, and the pricing structure between Sterling and the Missile Defense Agency,” which was confidential. Id. ¶ 55. Thus, there are factual allegations to support Sterling’s assertion that Haskell improperly retained information related to Missile Defense Agency bids from Sterling vendors and the proposed pricing of those bids. Haskell also argues “Sterling must plead how Haskell allegedly obtained and used the alleged trade secret to Sterling’s disadvantage.” Docket 19 at 14. Sterling’s complaint states that “Haskell misappropriated the trade secret data, documents and information described herein by secretly emailing key documents to herself,” and by putting the Neutanix deal registration in her own name. Docket 1 ¶ 83. She was also found to be actively deleting her emails after her employment ended. Thus, Sterling has pleaded sufficient facts regarding an alleged misappropriation of the bid structure and pricing information. 9 II. Allegation of Damages A court may grant an injunction to protect an actual or threatened misappropriated trade secret. 18 U.S.C. § 1836(b)(3)(A); SDCL § 37-29-2. Both the DTSA and UTSA also authorize an award of damages for the actual loss and any unjust enrichment caused by the misappropriation, or a court may impose a reasonable royalty on the misappropriator. 18 U.S.C. § 1836(b)(3)(B); SDCL § 37-29-3(a). Finally, both laws allow a court to award exemplary damages if a misappropriation is willful and malicious. 18 U.S.C. § 1836(b)(3)(C); SDCL § 37-29-3(b). Haskell argues that under both claims, Sterling must establish that it suffered damages because of Haskell’s misappropriation. Docket 19 at 4-5. Haskell contends that Sterling’s complaint is flawed because it does not allege a specific proof of harm, actual or threatened, and instead presents legal conclusions void of factual allegations. Id. at 15. Haskell cites to Fedders Corp. v. Haier America Trading, LLC, 2002 WL 519733, at *5 (S.D.N.Y. Apr. 4, 2002) and Alphamed Pharmaceuticals Corp. v. Arriva Pharmaceuticals, Inc., 432 F. Supp. 2d 1319, 1335-36 (S.D. Fla. 2006) as support. Fedders Corp. and Alphamed Pharmaceuticals are not persuasive here because, in addition to being non-binding authorities on this court, neither case is postured at the motion to dismiss stage. In Fedders Corp., the Southern District of New York, applying Illinois law, stated that damages are “[a] necessary element” in order for a plaintiff to recover compensatory or exemplary damages in a trade secret claim. 2002 WL 519733, at *5. But this 10 analysis arose at the summary judgment stage. Id. at *1. In Alphamed Pharmaceuticals, the Southern District of Florida concluded that because the plaintiff’s trade secret claim was statutorily based, its damages were governed by the statute rather than common law. 432 F. Supp. 2d at 1335-36. Thus, the court concluded nominal damages were not permitted and the plaintiff failed to prove permissible trade secret damages at trial. Id. But this damages discussion arose when the defendant moved for judgment as a matter of law. Id. at 1334. Thus, Sterling does not need to establish specific proof of harm, actual or threatened, to survive a motion to dismiss. Sterling has plausibly alleged that Haskell retained trade secret information that, if shared with competitors or used to improperly solicit Sterling clients, could entitle Sterling to injunctive or monetary relief as permitted by both federal and South Dakota law. CONCLUSION Sterling has pleaded sufficient facts to plausibly establish that the contact list, pricing and bid information, and other pieces of potentially confidential information are trade secrets that derive independent economic value from not being generally known or readily ascertainable. Sterling has also plausibly alleged how Haskell accessed these trade secrets and may have improperly retained them once she terminated her employment with Sterling to work for a competitor. Finally, Sterling is not required to demonstrate proof of damages at the pleading stage. Thus, it is ORDERED that Haskell’s motion to dismiss (Docket 18) is denied. 11 IT IS FURTHER ORDERED that as stated in the parties’ stipulation to set aside Sterling’s Emergency Motion for Expedited Discovery and to Preserve Evidence (Docket 22) and the court’s order adopting the stipulation (Docket 23), Sterling’s reply brief for its Motion for Expedited Discovery and to Preserve Evidence (Docket 6) is due on or before February 15, 2018. DATED this 1st day of February, 2018. BY THE COURT: /s/ Karen E. Schreier KAREN E. SCHREIER UNITED STATES DISTRICT JUDGE 12

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?