Cen Com, Inc v. Numerex Corp et al

Filing 60

ORDER granting Defendants' 22 Motion for Judgment on the Pleadings. Any Amended complaint to be filed within 20 days of this Order; denying Plaintiff's 27 Motion for Protective Order; granting Defendants' 35 Motion for Sanc tions and an Order to Show Cause. No later than fourteen (14) days from the date of this Order, Plaintiff shall disclose whether Attorney's Eyes Only information was shared with anyone not so permitted in the Protective Order, and shall show cause why it should not be sanctioned as proposed by Defendant for violating this Court's Protective Order. Signed by Judge Ricardo S Martinez. (PM)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 5 6 7 8 CEN COM INC., a Washington corporation d/b/a American Digital Monitoring, 9 Plaintiff, 10 v. 11 12 13 14 NUMEREX CORP., a Pennsylvania corporation; NEXTALARM, LLC, a Georgia limited liability corporation, and DOES 1-10, Defendants. 15 16 17 I. 18 ) ) CASE NO. C17-0560RSM ) ) ORDER ON PENDING MOTIONS ) ) ) ) ) ) ) ) ) ) ) INTRODUCTION This matter comes before the Court on the following motions: 19 1) Defendants’ Motion for Judgment on the Pleadings (Dkt. #22); 20 21 2) Plaintiff’s Motion for Protective Order (Dkt. #27); and 22 3) Defendants’ Motion for Sanctions and an Order to Show Cause (Dkt. #35). 23 24 For the reasons set forth below, the Court resolves the motions as follows. Defendants’ and Plaintiff’s remaining discovery motions (Dkts. #39, #41 #58 and #59) will be resolved by 25 26 separate Order(s). 27 /// 28 /// ORDER PAGE - 1 II. 1 BACKGROUND 2 This breach of contract/trade secret matter was removed to this Court on April 11, 2017. 3 Dkt. #1. According to the Complaint, Defendant NextAlarm, LLC (“NextAlarm”) and Plaintiff 4 Cen Com, Inc. (“Cen Com”) are businesses in the alarm-monitoring industry. Dkt. #1-2 at ¶ ¶ 5 1.1 and 1.2. The parties worked together for several years. Id. at ¶ 4.4. That business relationship 6 7 allowed Cen Com to monitor NextAlarm accounts and respond to signals from those accounts to 8 summon the appropriate first responders. Id. Cen Com contends that while providing those 9 services, its employees learned that NextAlarm lacked crucial and commercially valuable 10 information/data regarding NextAlarm customers. See ¶ ¶ 4.6-4.7. Cen Com allegedly acquired 11 that missing information/data while providing services for NextAlarm. Id. When NextAlarm 12 13 notified Cen Com that Cen Com’s services would no longer be needed, Cen Com offered to sell 14 that data to NextAlarm, but a sale never materialized. Instead, the parties entered into a deal 15 whereby Cen Com agreed to act solely as an intermediary by forwarding NextAlarm signals to a 16 new vendor whose live operators would dispatch emergency services or contact customers as 17 18 needed. Id. at ¶ 4.8 and Ex. A thereto. The agreement required NextAlarm to use reasonable 19 efforts to ensure that the new vendor did not use Cen Com’s data for improper purposes. Id. and 20 ¶ 4.10. 21 22 Cen Com contends that NextAlarm violated the agreement by working with the new vendor to steal commercially valuable and confidential information from Cen Com databases. 23 24 Id. at ¶ ¶ 4.13-4.20. Based on these allegations, Cen Com asserts twelve claims against 25 NextAlarm, including claims for breach of contract, negligence, fraud/misrepresentation, 26 negligent misrepresentation, tortious interference with a business expectancy, conversion (stolen 27 data), violation of Washington’s Consumer Protection Act (“CPA”), unjust enrichment, aiding 28 ORDER PAGE - 2 1 2 and abetting, trade secret misappropriation (Uniform Trade Secrets Act), civil conspiracy and vicarious liability. Id. at ¶ ¶ 5.1-16.2. III. 3 4 DISCUSSION A. Defendants’ Motion for Judgment on the Pleadings 5 1. Legal Standard 6 7 Rule 12(c) of the Federal Rules of Civil Procedure permits a party to move to dismiss a 8 suit “[a]fter the pleadings are closed . . . but early enough not to delay trial.” Fed. R. Civ. P. 9 12(c). “Judgment on the pleadings is proper when, taking all allegations in the pleading as true, 10 the moving party is entitled to judgment as a matter of law.” Stanley v. Trustees of Cal. State 11 Univ., 433 F.3d 1129, 1133 (9th Cir. 2006); see also Fleming v. Pickard, 581 F.3d 922, 925 (9th 12 13 Cir. 2009). Because a motion for judgment on the pleadings is “functionally identical” to a 14 motion to dismiss, the standard for a Rule 12(c) motion is the same as for a Rule 12(b)(6) motion. 15 See Platt Elec. Supply, Inc. v. EOFF Elec., Inc., 522 F.3d 1049, 1052 n.1 (9th Cir. 2008). 16 In deciding a 12(b)(6) or 12(c) motion, this Court is limited to the allegations on the face 17 18 of the Complaint (including documents attached thereto), matters which are properly judicially 19 noticeable and other extrinsic documents when “the plaintiff’s claim depends on the contents of 20 a document, the defendant attaches the document to its motion to dismiss, and the parties do not 21 dispute the authenticity of the document, even though the plaintiff does not explicitly allege the 22 contents of that document in the complaint.” Knievel v. ESPN, 393 F.3d 1068, 1076 (9th Cir. 23 24 2005). The Court must construe the complaint in the light most favorable to the Plaintiff and 25 must accept all factual allegations as true. Cahill v. Liberty Mutual Ins. Co., 80 F.3d 336, 337- 26 38 (9th Cir. 1996). The Court must also accept as true all reasonable inferences to be drawn from 27 the material allegations in the Complaint. See Brown v. Elec. Arts, Inc., 724 F.3d 1235, 1247-48 28 ORDER PAGE - 3 1 (9th Cir. 2013); Pareto v. F.D.I.C., 139 F.3d 696, 699 (9th Cir. 1998). However, the Court is not 2 required to accept as true a “legal conclusion couched as a factual allegation.” Ashcroft v. Iqbal, 3 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007)). 4 2. Claims at Issue 5 Defendant now moves for the dismissal of all causes of action in this matter, except for 6 7 the trade secret misappropriation claim, on the basis that Washington’s trade secret laws displace 8 those theories of liability. Dkt. #22 at 3-4. Plaintiff opposes the motion. Dkt. #25. For the 9 reasons discussed herein, the Court agrees in part with Defendant and dismisses some of 10 Plaintiff’s claims. 11 Washington’s Uniform Trade Secrets Act (“UTSA”) prohibits misappropriation of trade 12 13 secrets. RCW 19.108, et seq.; Thola v. Henschell, 140 Wn. App. 70, 76, 164 P.3d 524, 528 14 (2007). Before the legislature enacted the UTSA, the common law prohibited similar acts. See, 15 e.g., J.L. Cooper & Co. v. Anchor Secs. Co., 9 Wn.2d 45, 64, 113 P.2d 845 (1941) (allowing 16 equitable action against a former employee who used a confidential customer list in his new 17 18 business venture). But the UTSA is not a catch-all for industrial torts. Electro-Craft Corp. v. 19 Controlled Motion, Inc., 332 N.W.2d 890, 897 (Minn. 1983). The UTSA “displaces conflicting 20 tort, restitutionary, and other law of this state pertaining to civil liability for misappropriation of 21 a trade secret.” RCW 19.108.900(1). However, it does not affect “[c]ontractual or other civil 22 liability or relief that is not based upon misappropriation of a trade secret.” RCW 23 24 19.108.900(2)(a). 25 When examining whether a civil claim is preempted by the UTSA, courts often utilize a 26 three-step analytical framework as a “helpful guide,” beginning with the premise that a plaintiff 27 “may not rely on acts that constitute trade secret misappropriation to support other causes of 28 ORDER PAGE - 4 1 action.” Thola, 140 Wn. App. at 82 (citing to Mortgage Specialists, Inc. v. Davey, 153 N.H. 764, 2 778-79, 904 A.2d 652 (2006) and Ed Nowogroski Ins., Inc. v. Rucker, 88 Wn. App. 350, 358, 3 944 P.2d 1093 (1997), aff'd, 137 Wn.2d 427 (1999) (Rucker I)). Using this framework, the Court: 4 (1) assesses the facts that support the plaintiff’s civil claim, (2) asks whether those facts are the 5 same as those that support the plaintiff’s UTSA claim, and (3) will conclude that the UTSA 6 7 preempts liability on the civil claim unless the common law claim is factually independent from 8 the UTSA claim. See Mortgage Specialists, Inc. v. Davey, 153 N.H. 764, 778-79, 904 A.2d 652 9 (2006). This three-step analysis is meant to preclude duplicate recovery for a single wrong. 10 Accordingly, the Court now turns to each of Plaintiff’s claims. 11 In Claim One, Plaintiff asserts a breach of contract. Dkt. #1-2 at ¶ ¶ 5.1-5.5. “Cen Com 12 13 alleges that the conduct described in this Complaint constitutes a breach of contract by 14 NextAlarm and Numerex.” Id. at ¶ 5.3. The alleged facts focus on the history of the business 15 relationship between Plaintiff and Defendant, the theft/data mining of proprietary information, 16 and Plaintiff’s belief that Defendant is still actively data mining and intentionally stealing 17 18 Plaintiff’s information. Id. at ¶ ¶ 4.1-4.24. Plaintiff’s Trade Secret Misappropriation claim relies 19 on the same facts. Id. at ¶ ¶ 14.1-14.9. Indeed, Plaintiff alleges that its data constitutes a protected 20 trade secret, it took steps to protect that data, it has economic value, that Defendant stole the data 21 and retained it even after Plaintiff demanded its return, that Defendant assisted others in stealing 22 the data, and that Plaintiff was harmed as a result. The Court concludes that the breach of contract 23 24 claim is not factually independent from the UTSA claim, and will dismiss it. 25 Likewise, the Court will dismiss Claims Two through Eight. In each of those claims, 26 Plaintiff relies on the conduct described in the Complaint. The conduct described centers on the 27 alleged theft/data mining of proprietary information, and Plaintiff’s belief that Defendant is still 28 ORDER PAGE - 5 1 actively data mining and intentionally stealing Plaintiff’s information. Id. at ¶ ¶ 4.1-4.24. As 2 with the breach of contract claim, Claims Two through Eight are not factually independent from 3 the UTSA claim. Compare Dkt. #1-2 at ¶ ¶ 6.1-12.4 with ¶ ¶ 14.1-14.9. Accordingly, those 4 claims will also be dismissed. 5 With respect to Claim Nine for aiding and abetting, and Claim Eleven for civil conspiracy, 6 7 those claims rely on the now dismissed claims, as well as the conduct described in the Complaint. 8 See Dkt. #1-2 at ¶ ¶ 13.1-13.4 and 15.1-15.6. Therefore, those claims must be dismissed as well. 9 Finally, with respect to Plaintiff’s Claim Twelve for vicarious liability, id. at ¶ ¶ 16.1- 10 16.2, the Court notes that Washington courts have explicitly determined that “one may violate 11 the UTSA vicariously and be held responsible for such violation.” Thola, 140 Wn. App at 78. 12 13 Defendant argues that this claim fails because the underlying tort claims fail. Dkt. #22 at 11. 14 However, as Washington courts also recognize, vicarious liability is a general theory of civil 15 liability that is not based on trade secret misappropriation and, therefore, the UTSA does not 16 preempt it. See RCW 19.108.900(2)(a). Thola, 140 Wn. App. at 81. Accordingly, the Court 17 18 declines to dismiss this claim. 19 3. Leave to Amend 20 Ordinarily, leave to amend a complaint should be freely given following an order of 21 dismissal, “unless it is absolutely clear that the deficiencies of the complaint could not be cured 22 by amendment.” Noll v. Carlson, 809 F.2d 1446, 1448 (9th Cir. 1987); see also DeSoto v. Yellow 23 24 Freight Sys., Inc., 957 F.2d 655, 658 (9th Cir. 1992) (“A district court does not err in denying 25 leave to amend where the amendment would be futile.” (citing Reddy v. Litton Indus., Inc., 912 26 F.2d 291, 296 (9th Cir. 1990)). Although in this case, the Court has determined that Plaintiff’s 27 claims are not factually distinct as drafted, Plaintiff has attempted to distinguish the claims in 28 ORDER PAGE - 6 1 2 3 4 briefing. See Dkt. #25. Thus, the Court will allow Plaintiff to attempt to cure its deficiencies through amendment. B. Plaintiff’s Motion for Protective Order The Court now turns to Plaintiff’s Motion for a Protective Order. Strangely, by way of 5 this motion, Plaintiff asks the Court for an Order deeming documents previously designated by 6 7 Defendants as confidential or for attorney’s eyes only, as non-confidential, and directing 8 Defendant to remove those designations on a series of documents produced under Bates Stamp 9 Nos. Numerex_0000329-0000340. Dkt. #27. The Court will deny this motion. 10 On June 26, 2017, this Court entered the parties’ proposed Protective Order to govern this 11 matter. Dkt. #19. With respect to documents marked by a party as confidential or attorney’s 12 13 eyes only, the Order directs: Before filing confidential material or discussing or referencing such material in court filings, the filing party shall confer with the designating party to determine whether the designating party will remove the confidential designation, whether the document can be redacted, or whether a motion to seal or stipulation and proposed order is warranted. Local Civil Rule 5(g) sets forth the procedures that must be followed and the standards that will be applied when a party seeks permission from the court to file material under seal. 14 15 16 17 18 19 ... 20 7. CHALLENGING CONFIDENTIALITY DESIGNATIONS 21 7.1 Timing of Challenges. Any party or non-party may challenge a designation of confidentiality at any time. Unless a prompt challenge to a designating party’s confidentiality designation is necessary to avoid foreseeable, substantial unfairness, unnecessary economic burdens, or a significant disruption or delay of the litigation, a party does not waive its right to challenge a confidentiality designation by electing not to mount a challenge promptly after the original designation is disclosed. 22 23 24 25 26 7.2 Meet and Confer. The parties must make every attempt to resolve any dispute regarding confidential designations without court involvement. Any motion regarding confidential designations or for a protective order must 27 28 ORDER PAGE - 7 include a certification, in the motion or in a declaration or affidavit, that the movant has engaged in a good faith meet and confer conference with other affected parties in an effort to resolve the dispute without court action. The certification must list the date, manner, and participants to the conference. A good faith effort to confer requires a face-to-face meeting or a telephone conference. 1 2 3 4 7.3 Judicial Intervention. If the parties cannot resolve a challenge without court intervention, the designating party may file and serve a motion to retain confidentiality under Local Civil Rule 7 (and in compliance with Local Civil Rule 5(g), if applicable). The burden of persuasion in any such motion shall be on the designating party. Frivolous challenges, and those made for an improper purpose (e.g., to harass or impose unnecessary expenses and burdens on other parties) may expose the challenging party to sanctions. All parties shall continue to maintain the material in question as confidential until the court rules on the challenge. 5 6 7 8 9 10 11 Dkt. #19 at ¶ ¶ 5.4 and 7.1-7.3. There are numerous deficiencies with Plaintiff’s motion. First, Plaintiff improperly 12 13 brings the motion as one for a Protective Order under Federal Rule of Civil Procedure 26(c). 14 Dkt. #27 at 6. That Rule does not pertain to the type of relief requested by Plaintiff through its 15 16 motion. Moreover, Plaintiff fails to acknowledge the governing Protective Order and the 17 provisions of that Order that do pertain to the relief that Plaintiff requests, as described above. 18 19 More importantly, Plaintiff failed to engage in a good faith meet and confer prior to filing the instant motion. Whether the motion is brought under FRCP 26(c) or pursuant to the 20 21 Protective Order, Plaintiff was required to meet and confer. See LCR 1, 5(g)(1)(A) and 26(c)(1). 22 Asking an opposing party to respond to an email request the same day the party plans to file a 23 document does not meet the Court’s requirements for a good faith meet and confer. See Dkt. #28 24 at ¶ 13. 25 Finally, after failing to properly meet and confer, Plaintiff then violated the Protective 26 27 Order by filing the documents marked confidential and/or attorney’s eyes only on the public 28 docket. See Dkt. #26, Exs. G and I. The Court will not excuse this violation after the fact. ORDER PAGE - 8 Defendant seeks an award of fees and costs pursuant to Federal Rule 26 for successfully 1 2 opposing this motion, and that such award be granted against both Plaintiff and its counsel. Dkt. 3 #30 at 11. The Court denies this request as it has already determined that Federal Rule of Civil 4 Procedure 26 is not applicable to the issue presented by Plaintiff in its motion, but will address 5 appropriate relief in the context of Defendants’ Motion for Sanctions. 6 7 C. Defendants’ Motion for Sanctions 8 Finally, the Court turns to Defendants’ Motions for Sanctions and an Order to Show 9 Cause. Dkt. #35. In that motion, Defendant seeks an Order requiring Plaintiff to show cause for 10 its actions, requiring Plaintiff to show cause whether “Attorney’s Eyes Only” information was 11 shared with anyone not so permitted in the Protective Order, and requiring Plaintiff to pay those 12 13 fees and costs which Defendants incurred to cure the problem and bring this motion. Dkt. #35 14 at 1-2. 15 16 Rule 37(b)(2)(A) provides that if a party “fails to obey an order to provide or permit discovery, including an order under Rule 26(f), 35, or 37(a), the court where the action is pending 17 18 may issue further just orders.” Fed. R. Civ. P. 37(b)(2)(A). “The definition of ‘order’ in Rule 19 37(b) has been read broadly. The rule grants courts the authority to impose sanctions where a 20 party has violated a protective order. See O’Connor v. Uber Techs., Inc., No. 13-CV-03826- 21 EMC, 2017 U.S. Dist. LEXIS 141095, 2017 WL 3782101, at *4 (N.D. Cal. Aug. 31, 2017) 22 (quoting Life Techs. Corp. v. Biosearch Tech., Inc., No. C-12-00852 WHA (JCS), 2012 U.S. 23 24 Dist. LEXIS 63974, 2012 WL 1600393, at *8 (N.D. Cal. May 7, 2012)); Avago Techs., Inc. v. 25 IPtronics Inc., No. 5:10-CV-02863-EJD, 2015 U.S. Dist. LEXIS 75948, 2015 WL 3640626, at 26 *3 (N.D. Cal. June 11, 2015). See also Falstaff Brewing Corp. v. Miller Brewing Co., 702 F.2d 27 28 ORDER PAGE - 9 1 2 770, 784 (9th Cir. 1983) (affirming assessment of attorney’s fees as sanction for violation of stipulated protective order). 3 Rule 37(b)(2)(C) provides that “[i]nstead of or in addition to the orders above, the court 4 must order the disobedient party, the attorney advising that party, or both to pay the reasonable 5 expenses, including attorney’s fees, caused by the failure unless the failure was substantially 6 7 justified or other circumstances make an award of expenses unjust.” Fed. R. Civ. P. 37(b)(2)(C). 8 In addition, District Courts may impose sanctions as part of their inherent power “to 9 manage their own affairs so as to achieve the orderly and expeditious disposition of cases.” 10 Chambers v. NASCO, Inc., 501 U.S. 32, 43, 111 S. Ct. 2123, 115 L. Ed. 2d 27 (1991). Indeed, 11 district courts can impose sanctions for a “full range of litigation abuses.” Id. at 55. A finding 12 13 of bad faith is usually required before a court can enter sanctions pursuant to its inherent 14 authority. Lahiri v. Universal Music and Video Distribution Corp., 606 F.3d 1216, 1219 (9th 15 Cir. 2010) (citing B.K.B. v. Maui Police Dep't, 276 F.3d 1091, 1107-08 (9th Cir. 2002); Fink v. 16 Gomez, 239 F.3d 989, 993-94 (9th Cir. 2001)). However, “a ‘willful’ violation of a court order 17 18 does not require proof of mental intent such as bad faith or an improper motive, but rather, it is 19 enough that a party acted deliberately.” Evon v. Law Offices of Sidney Mickell, 688 F.3d 1015, 20 1035 (9th Cir. 2012) (holding that counsel acted willfully when he knowingly filed a class 21 certification motion without redacting confidential information in violation of protective order). 22 The Court agrees with Defendants that sanctions are appropriate in this matter. The Court 23 24 expects all parties and their counsel to follow the Orders issued by the Court, and to act in a 25 manner that is professional, efficient and in the best interests of justice. Further, this Court does 26 not look kindly on gamesmanship and tit-for-tat arguments between counsel. Accordingly, 27 Plaintiff shall show cause as ordered below. 28 ORDER PAGE - 10 IV. 1 2 3 4 CONCLUSION Having reviewed the parties’ motions, along with the remainder of the record, the Court hereby finds and ORDERS: 1. Defendants’ Motion for Judgment on the Pleadings (Dkt. #22) is GRANTED as 5 discussed above, with leave to amend. Any amended complaint shall be filed no later 6 than 20 days from the date of this Order. Should Plaintiff decline to file any Amended 7 8 Complaint, all claims except for the trade misappropriation claim will be dismissed 9 with prejudice. 10 2. Plaintiff’s Motion for Protective Order (Dkt. #27) is DENIED as discussed above. 11 3. Defendants’ Motion for Sanctions and an Order to Show Cause (Dkt. #35) is 12 13 GRANTED. No later than fourteen (14) days from the date of this Order, 14 Plaintiff shall disclose whether “Attorney’s Eyes Only” information was shared 15 with anyone not so permitted in the Protective Order, and shall show cause why 16 it should not be sanctioned as proposed by Defendant for violating this Court’s 17 Protective Order. Defendant shall not file a response unless requested by the Court. 18 19 Nothing in this Order precludes the parties from resolving this issue, or any other 20 pending discovery issue, without further Court intervention. 21 DATED this 7 day of March, 2018. 22 23 A 24 RICARDO S. MARTINEZ CHIEF UNITED STATES DISTRICT JUDGE 25 26 27 28 ORDER PAGE - 11

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?