MUFG Union Bank, NA v. Tyler et al

Filing 78

ORDER granting in part and denying in part Defendants' 62 63 Motions to Dismiss. Any amended complaint to be filed within 20 days this order. Plaintiff's First, Second and Fourth Claims for Relief are DISMISSED with prejudice. Plaintiff's Third and Fifth Claims for trade misappropriation under state and federal law will proceed at this time. Defendant U.S. Bank's 71 Motion to Stay Discovery is denied as moot. Signed by Judge Ricardo S Martinez. (PM)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 5 6 7 8 MUFG UNION BANK, N.A., a national association, 9 Plaintiff, 10 11 v. AARON TYLER, an individual, et al., 12 Defendants. 13 ) ) ) ) ) ) ) ) ) ) ) CASE NO. C17-1766RSM ORDER GRANTING IN PART AND DENYING IN PART MOTIONS TO DISMISS 14 I. 15 INTRODUCTION 16 This matter comes before the Court on Defendant U.S. Bank’s Motion to Dismiss and the 17 individual Defendants’ joinder in that motion. Dkts. #62 and #63. Defendants argue that: 1) 18 Plaintiff’s claims for conversion, intentional interference with business relationships and breach 19 20 of fiduciary duty of loyalty are all preempted by Washington’s Uniform Trade Secret Act 21 (“UTSA”); 2) Plaintiff fails to state a claim for relief for misappropriation of trade secrets under 22 state and federal law; and 3) Plaintiff fails to state a claim for relief under the Computer Fraud 23 and Abuse Act (“CFAA”) against the individual Defendants. Id. Plaintiff responds that it has 24 adequately pled facts to support its claims separate and apart from those facts that support its 25 26 statutory trade secrets claims, and that its remaining claims have been adequately pled under 27 Federal Rule of Civil Procedure 8. Dkt. #64. For the reasons set forth below, the Court now 28 GRANTS IN PART and DENIES IN PART Defendants’ motions to dismiss. ORDER PAGE - 1 II. 1 BACKGROUND 2 The instant matter was filed in this Court on November 22, 2017. Dkt. #1. Plaintiff 3 MUFG Union Bank, N.A. (“Union Bank”) alleges that a group of its former employees resigned 4 en masse after planning for several months to take trade secrets, documents and confidential 5 information that they are now utilizing to take business from it and unfairly compete with it. Dkt. 6 7 #1 at ¶ ¶ 8-22. Plaintiff further alleges that Defendant U.S. Bank knew of the individuals’ actions 8 and encouraged them. Id. at ¶ ¶ 19-22. Based on these allegations, Union Bank asserts six claims 9 for relief against the Defendants: 1) breach of fiduciary duty of loyalty (against all Defendants); 10 2) intentional interference with business relationships (against all Defendants); 3) 11 misappropriation of trade secrets under Washington’s UTSA, RCW 19.108.010, et seq. (against 12 13 all Defendants); 4) conversion (against all Defendants); 5) misappropriation of trade secrets 14 under the Defend Trade Secrets Act (“DTSA”), 18 U.S.C. § 1831, et seq. (against all 15 Defendants); and 6) violations of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 16 1030, et seq. (against the individual Defendants). Id. at ¶ ¶ 23-56.1 Defendants have now moved 17 18 to dismiss all claims. III. 19 A. Legal Standard 20 21 22 DISCUSSION In deciding a 12(b)(6) motion, this Court is limited to the allegations on the face of the Complaint (including documents attached thereto), matters which are properly judicially 23 24 25 noticeable and other extrinsic documents when “the plaintiff’s claim depends on the contents of a document, the defendant attaches the document to its motion to dismiss, and the parties do not 26 27 28 1 Plaintiff erroneously pleads two “Fifth” Claims for Relief in its Complaint. Dkt. #1 at ¶ ¶ 4556. For ease of reference, the Court will refer to the CFAA claim against the individual Defendants as the CFAA claim or as Plaintiff’s sixth claim for relief. ORDER PAGE - 2 1 dispute the authenticity of the document, even though the plaintiff does not explicitly allege the 2 contents of that document in the complaint.” Knievel v. ESPN, 393 F.3d 1068, 1076 (9th Cir. 3 2005). The Court must construe the complaint in the light most favorable to the Plaintiff and 4 must accept all factual allegations as true. Cahill v. Liberty Mutual Ins. Co., 80 F.3d 336, 337- 5 38 (9th Cir. 1996). The Court must also accept as true all reasonable inferences to be drawn from 6 7 the material allegations in the Complaint. See Brown v. Elec. Arts, Inc., 724 F.3d 1235, 1247-48 8 (9th Cir. 2013); Pareto v. F.D.I.C., 139 F.3d 696, 699 (9th Cir. 1998). However, the Court is not 9 required to accept as true a “legal conclusion couched as a factual allegation.” Ashcroft v. Iqbal, 10 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007)). 11 B. Claims at Issue 12 13 14 15 Defendants move for the dismissal of all causes of action in this matter. The Court addresses each of those claims, in turn, below. 16 1. Plaintiff’s Claims for Breach of Fiduciary Loyalty, Intentional Interference with Business Relationships and Conversion 17 Defendants first move to dismiss Plaintiff’s First, Second and Fourth Claims for Relief 18 alleged against all Defendants, on the basis that Washington’s trade secret laws displace those 19 theories of liability. Dkts. #62 at 4-8 and #63 at 3-5. Plaintiff opposes the motion, arguing that 20 21 the facts supporting the claims for breach of fiduciary duty of loyalty, intentional interference 22 with business relationships, and conversion are different that those facts it relies on in support of 23 its claim for misappropriation of trade secrets. Dkt. #64 at 5-9. 24 Washington’s UTSA prohibits misappropriation of trade secrets. RCW 19.108, et seq.; 25 Thola v. Henschell, 140 Wn. App. 70, 76, 164 P.3d 524, 528 (2007). Before the legislature 26 27 enacted the UTSA, the common law prohibited similar acts. See, e.g., J.L. Cooper & Co. v. 28 Anchor Secs. Co., 9 Wn.2d 45, 64, 113 P.2d 845 (1941) (allowing equitable action against a ORDER PAGE - 3 1 former employee who used a confidential customer list in his new business venture). But the 2 UTSA is not a catch-all for industrial torts. Electro-Craft Corp. v. Controlled Motion, Inc., 332 3 N.W.2d 890, 897 (Minn. 1983). The UTSA “displaces conflicting tort, restitutionary, and other 4 law of this state pertaining to civil liability for misappropriation of a trade secret.” RCW 5 19.108.900(1). However, it does not affect “[c]ontractual or other civil liability or relief that is 6 7 not based upon misappropriation of a trade secret.” RCW 19.108.900(2)(a). 8 When examining whether a civil claim is preempted by the UTSA, courts often utilize a 9 three-step analytical framework as a “helpful guide,” beginning with the premise that a plaintiff 10 “may not rely on acts that constitute trade secret misappropriation to support other causes of 11 action.” Thola, 140 Wn. App. at 82 (citing to Mortgage Specialists, Inc. v. Davey, 153 N.H. 764, 12 13 778-79, 904 A.2d 652 (2006) and Ed Nowogroski Ins., Inc. v. Rucker, 88 Wn. App. 350, 358, 14 944 P.2d 1093 (1997), aff'd, 137 Wn.2d 427 (1999) (Rucker I)). Using this framework, the Court: 15 (1) assesses the facts that support the plaintiff’s civil claim, (2) asks whether those facts are the 16 same as those that support the plaintiff’s UTSA claim, and (3) will conclude that the UTSA 17 18 preempts liability on the civil claim unless the common law claim is factually independent from 19 the UTSA claim. See Mortgage Specialists, Inc. v. Davey, 153 N.H. 764, 778-79, 904 A.2d 652 20 (2006). This three-step analysis is meant to preclude duplicate recovery for a single wrong. 21 Accordingly, the Court now turns to each of Plaintiff’s claims. 22 In Claim One, Plaintiff asserts a breach of the fiduciary duty of loyalty. Dkt. #1 ¶ ¶ 23- 23 24 29. Plaintiff alleges that the individual Defendants owed Union Bank an undivided duty of 25 loyalty which prohibited them from soliciting customers for their own benefit and/or for rival 26 businesses and from acting in direct competition with Union Banks’ business interests, and that 27 they breach that duty by soliciting Amazon.com business on behalf of themselves and U.S. Bank 28 ORDER PAGE - 4 1 while still employed by Union Bank, soliciting individuals who had received pre-approval from 2 Union Bank to move their business to U.S. Bank, and stealing Union Bank’s confidential and 3 trade secret business and customer information in order to unfairly compete against Union Bank. 4 Dkt. #1 at ¶ ¶ 24-25. Plaintiff further alleges that individual Defendants Tyler and Fogliani, who 5 worked in managerial positions, breached the duty by soliciting other employees to leave and 6 7 work for their competitor, and by disclosing Plaintiff’s confidential financial compensation 8 information to Defendant U.S. Bank. Id. at ¶ 26. Finally, Plaintiff alleges that Defendant U.S. 9 Bank conspired and agreed with the individual Defendants to misappropriate Plaintiff’s trade 10 secrets and confidential information, and aided, abetted, and assisted the individual Defendants 11 in breaching the duty owed to Plaintiff. Id. at ¶ ¶ 27-28. 12 13 The Court agrees with Defendants that those facts focus on the alleged misappropriation 14 of confidential and proprietary information, and that Plaintiff’s UTSA claim relies on the same 15 facts. Id. at ¶ ¶ 35-39. Indeed, in its Third Claim for Relief, Plaintiff alleges that prior to leaving 16 employment, the individual Defendants misappropriated customer lists, pricing information, 17 18 customer contact information, customer financial data, social security numbers, and forms 1003 19 Uniform Residential Loan Applications, that U.S. Bank aided, abetted and facilitated those 20 actions, and that Defendants used the information for their own benefit. Id. 21 22 Plaintiff attempts to salvage Claim One by noting it alleged specifically that the individual Defendants solicited Amazon.com in support of its breach of duty claim but not in support of its 23 24 trade misappropriate claim, and therefore the claims do not rest on the same facts. Dkt. #64 at 25 6-7. The Court is not persuaded. When comparing the two claims, the essence of both is that the 26 Defendants allegedly used misappropriated information to make such solicitations, inter alia, for 27 28 ORDER PAGE - 5 1 2 their own benefit. Thus, the Court agrees that the claim for breach of fiduciary duty of loyalty is preempted or “displaced” by UTSA and the claim should be dismissed. 3 Likewise, the Court will dismiss the Second and Fourth Claims for Relief. In Claim Two, 4 Plaintiff asserts intentional interference with business relationships, and in Claim Four Plaintiff 5 asserts conversion. Dkt. #1 at ¶ ¶ 30-34 and 40-44. In each of those claims, Plaintiff relies on 6 7 the same conduct. Id. For example, in Claim Two, Plaintiff alleges that Defendants used pre- 8 financing approvals to interfere with the business relationship with Amazon.com. Id. at ¶ ¶ 30- 9 34. In Claim Four, Plaintiff alleges that Defendants took proprietary documents and information 10 and used them to unfairly compete for business. Id. at ¶ ¶ 40-44. As with the breach of duty 11 claim, Claims Two and Four are not factually independent from the UTSA claim. Compare Dkt. 12 13 14 15 16 #1 ¶ ¶ 35-39 with ¶ ¶ 30-34 and 40-44. Accordingly, those claims will also be dismissed. C. Misappropriation of Trade Secrets Under State and Federal Law Defendant U.S. Bank next argues that Plaintiff has failed to adequately allege claims for misappropriation of trade secrets under state and federal law. Dkt. #62 at 14-18. Defendant 17 18 argues that under both Washington’s UTSA and under the federal DTSA, Plaintiff alleges only 19 bare legal conclusions, not supported by sufficient factual allegations. Dkt. #62 at 14-18. The 20 Court disagrees. 21 22 To state a claim under Washington’s UTSA, a plaintiff must plead (1) the existence of a protectable trade secret, and (2) facts constituting misappropriation. Inteum Co., LLC v. Nat’l 23 24 Univ., 2017 U.S. Dist. LEXIS 212095, *8-9 (W.D. Wash. Dec. 27, 2017) (citing RCW § 19.108). 25 A trade secret is “any information, including a formula, pattern, compilation, program, device, 26 method, technique, or process.” Id. (citing § 19.108.010). A trade secret is protectable if it 27 “derives independent economic value . . . from not being generally known” and is the “subject 28 ORDER PAGE - 6 1 of efforts that are reasonable under the circumstances to maintain its secrecy.” Inteum Co., LLC 2 v. Nat’l Univ., 2017 U.S. Dist. LEXIS 212095, *8-9 (citing § 19.108.010). Misappropriation 3 includes disclosure “of a trade secret of another without express or implied consent, by [an entity 4 that] . . . at the time of disclosure or use, knew or had reason to know that” it was under “a duty 5 to maintain its secrecy or limit its use.” Id. (citing § 19.108.010(2)(b)(ii)). The federal DTSA 6 7 provides nearly identical definitions. See 18 U.S.C. § 1839. 8 As it highlights in its response brief, Plaintiff has alleged facts that go beyond a mere 9 recitation of the elements of misappropriation and states a claim that is plausible on its face. In 10 its Complaint, Plaintiff alleges that: 11 Employees’ plan included, and Employees in fact engaged in, taking and misappropriating Union Bank’s trade secrets and confidential, proprietary information as well as taking and misappropriating documents . . . . 12 13 14 15 Dkt. #1 at ¶ 14. Plaintiffs further allege that:  16 “Defendants Tyler and Fogliani, both of whom worked for Union Bank in managerial positions, had access to confidential compensation and performance-related 17 information for the Employees and disclosed that information to U.S. Bank.” (Dkt. 18 #1 at ¶ 17); 19 20  21 “[p]rior to the end of their employment with Union Bank, Employees misappropriated, inter alia, Union Bank’s customer lists, pricing information, 22 customer contact information, customer financial data, social security numbers, and 23 forms 1003 Uniform Residential Loan Applications” (Dkt. #1 at ¶ 36); 24 25  26 “U.S. Bank was aware of Employees’ intentions to take Union Bank’s confidential and trade secret information and use that information to solicit Union Bank’s 27 28 ORDER PAGE - 7 customers to move their business to U.S. Bank and encouraged Employees to do so” 1 (Dkt. #1 ¶ 20); 2 3  4 “[s]ince becoming employed by U.S. Bank, Employees have wrongfully possessed and used Union Bank’s confidential trade secrets and information to solicit pre- 5 approved customer loans from Union Bank to U.S. Bank and otherwise take business 6 7 away from Union Bank and accrue that business to U.S. Bank and Employees” (Dkt. 8 #1 at ¶ 19); and 9  10 “U.S. Bank continues to profit from, possess, and have custody over the confidential and trade secret information which Employees misappropriated from Union Bank and 11 took with them to U.S. Bank.” (Dkt. #1 at ¶ 21). 12 13 Whether Plaintiff can prove those facts, and whether such facts will ultimately satisfy the 14 elements of the claims remains for another day. At this time, the Court finds that a plausible 15 claim has been pled, and will not dismiss these claims. 16 D. Consumer Fraud and Abuse Act Claim 17 18 Finally, the individual Defendants ask the Court to dismiss Plaintiff’s CFAA claim 19 against them. Dkt. #63 at 5-6. The CFAA was enacted in 1984 to enhance the government’s 20 ability to prosecute computer crimes. LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130 (9th 21 Cir. 2009). The Act was originally designed to target hackers who accessed computers to steal 22 information or to disrupt or destroy computer functionality, as well as criminals who possessed 23 24 the capacity to “access and control high technology processes vital to our everyday lives . . . .” 25 Id. at 1130-31. The CFAA prohibits a number of different computer crimes, the majority of 26 which involve accessing computers without authorization or in excess of authorization, and then 27 taking specified forbidden actions, ranging from obtaining information to damaging a computer 28 ORDER PAGE - 8 1 or computer data. Brekka, 581 F.3d at 1130-31 (citing 18 U.S.C. § 1030(a)(1)-(7) (2004). The 2 individual Defendants argue that the Ninth Circuit Court of Appeals’ decision in Brekka, supra, 3 forecloses Plaintiff’s claim against them. Dkt. #63 at 5-6. The Court agrees. 4 Plaintiff alleges that the individual Defendants violated CFAA, but do not specify the 5 subsection of the statute. See Dkt. #1 at ¶ ¶ 53-56. However, it appears that Plaintiff alleges a 6 7 violation of 18 U.S.C. § 1030(a)(4), in that Plaintiff alleges the individual Defendants without 8 authorization or exceeding authorized access, and with the intent to defraud, intentionally 9 accessed and obtained information from a protected computer. Id. Through briefing, it appears 10 that Plaintiff is now focusing on the “exceeds authorized access” language of that subsection. 11 Dkt. #64 at 10. 12 13 14 The CFAA creates a right of action for private persons injured by such crimes. Section 1030(g) provides in pertinent part: 15 Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in clause (I), (II), (III), (IV), or (V) of subsection (c)(4)(a)(i). 16 17 18 19 18 U.S.C. § 1030(g). Subsection (c)(4)(a)(i) includes “loss to 1 or more persons during any 1- 20 year period (and, for purposes of an investigation, prosecution, or other proceeding brought by 21 the United States only, loss resulting from a related course of conduct affecting 1 or more other 22 protected computers) aggregating at least $5,000 in value.” 18 U.S.C. § 1030(c)(4)(a)(i)(I). 23 24 Plaintiff alleges that the violation caused such a loss. Dkt. #1 at ¶ 56. Thus, to bring an action 25 successfully under 18 U.S.C. § 1030(g) based on a violation of 18 U.S.C. § 1030(a)(2), Plaintiff 26 must show that the individual Defendants: (1) accessed a “protected computer,” (2) without 27 authorization or exceeding such authorization that was granted, 3) “knowingly” and with “intent 28 ORDER PAGE - 9 1 to defraud,” and thereby (4) “further[ed] the intended fraud and obtain[ed] anything of value,” 2 causing (5) a loss to one or more persons during any one-year period aggregating at least $ 5,000 3 in value. See 18 U.S.C. § 1030(a). 4 In Brekka, the Ninth Circuit Court of Appeals held: 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 In interpreting the phrase “without authorization,” we start with the plain language of the statute. See United States v. Blixt, 548 F.3d 882, 887 (9th Cir. 2008). The CFAA does not define “authorization,” and it is a “fundamental canon of statutory construction . . . that, unless otherwise defined, words will be interpreted as taking their ordinary, contemporary, common meaning.” Perrin v. United States, 444 U.S. 37, 42, 100 S. Ct. 311, 62 L. Ed. 2d 199 (1979); see also United States v. Morris, 928 F.2d 504, 511 (2d Cir. 1991) (holding that the word “authorization” for purposes of the CFAA is “of common usage, without any technical or ambiguous meaning,” and therefore the district court “was not obliged to instruct the jury on its meaning”). Authorization is defined in the dictionary as “permission or power granted by an authority.” RANDOM HOUSE UNABRIDGED DICTIONARY, 139 (2001); see also WEBSTER’S THIRD INTERNATIONAL DICTIONARY, 146 (2002) (defining authorization as “the state of being authorized” and “authorize” as “to endorse, empower, justify, permit by or as if by some recognized or proper authority”). Based on this definition, an employer gives an employee “authorization” to access a company computer when the employer gives the employee permission to use it. Because LVRC permitted Brekka to use the company computer, the “ordinary, contemporary, common meaning,” Perrin, 444 U.S. at 42, of the statute suggests that Brekka did not act “without authorization.” No language in the CFAA supports LVRC’s argument that authorization to use a computer ceases when an employee resolves to use the computer contrary to the employer's interest. Rather, the definition of “exceeds authorized access” in § 1030(e)(6) indicates that Congress did not intend to include such an implicit limitation in the word “authorization.” Section 1030(e)(6) provides: “the term ‘exceeds authorized access’ means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). As this definition makes clear, an individual who is authorized to use a computer for certain purposes but goes beyond those limitations is considered by the CFAA as someone who has “exceed[ed] authorized access.” On the other hand, a person who uses a computer “without authorization” has no rights, limited or otherwise, to access the computer in question. In other words, for purposes of the CFAA, when an employer authorizes an employee to use a company computer subject to certain limitations, the employee remains authorized to use the ORDER PAGE - 10 computer even if the employee violates those limitations. It is the employer’s decision to allow or to terminate an employee’s authorization to access a computer that determines whether the employee is with or “without authorization.” 1 2 3 This leads to a sensible interpretation of §§ 1030(a)(2) and (4), which gives effect to both the phrase “without authorization” and the phrase “exceeds authorized access”: a person who “intentionally accesses a computer without authorization,” §§ 1030(a)(2) and (4), accesses a computer without any permission at all, while a person who “exceeds authorized access,” id., has permission to access the computer, but accesses information on the computer that the person is not entitled to access. 4 5 6 7 8 Brekka, 581 F.3d at 1132-33 (emphasis added). 9 10 In the instant matter, Plaintiff alleged that prior to November 6, 2017, the individual 11 Defendants were employed by Plaintiff. Dkt. #1 at ¶ 8. Plaintiff further alleges that the individual 12 Defendants sold residential mortgages, and that two of the individual Defendants had access to 13 certain confidential information in their managerial positions. Id. at ¶ ¶ 10 and 17. There appears 14 to be no dispute that the individual Defendants had permission to access their computers, and in 15 16 fact were required to do so for their jobs. See id. at ¶ 54. Further, Plaintiff alleges that various 17 proprietary documents and electronically stored trade secrets were taken while the individual 18 Defendants were still employed. Id. at ¶ 18. Thus, this Court can only conclude that the 19 individual Defendants had authorization to use their computers. See Brekka, 581 F.3d at 1132- 20 21 33. 22 Plaintiff argues that their claim rests on the allegation that the individual Defendants 23 exceeded their authorized access and therefore violated the CFAA. Dkt. #64 at 10. It is true that 24 the definition of the term “exceeds authorized access” from § 1030(e)(6) implies that an 25 employee can violate employer-placed limits on accessing information stored on the computer. 26 27 Brekka, 581 F.3d at 1135. However, Plaintiff fails to plead a single fact to support that 28 conclusory allegation. See Dkt. #1 at ¶ ¶ 8-22. Thus, the Court finds that Plaintiff has failed to ORDER PAGE - 11 1 2 3 4 adequately plead a claim that the individual Defendants exceeded their authorized access, and the Court will dismiss this claim. E. Leave to Amend Ordinarily, leave to amend a complaint should be freely given following an order of 5 dismissal, “unless it is absolutely clear that the deficiencies of the complaint could not be cured 6 7 by amendment.” Noll v. Carlson, 809 F.2d 1446, 1448 (9th Cir. 1987); see also DeSoto v. Yellow 8 Freight Sys., Inc., 957 F.2d 655, 658 (9th Cir. 1992) (“A district court does not err in denying 9 leave to amend where the amendment would be futile.” (citing Reddy v. Litton Indus., Inc., 912 10 F.2d 291, 296 (9th Cir. 1990)). 11 With respect the Plaintiff’s First, Second and Fourth Claims for Relief, the Court has 12 13 determined that Plaintiff’s claims are not factually distinct as drafted. Further, the Court 14 concludes that granting leave to amend those claims would be futile. The Court can conceive of 15 no possible cure for the deficiencies in Plaintiff’s Complaint as to those claims, particularly given 16 the invalidity of Plaintiff’s arguments as discussed above. Accordingly, leave to amend these 17 18 claims will not be granted. 19 With respect to the CFAA claim against the individual Defendants, although the Court 20 has determined that the Complaint is factually deficient, Plaintiff asserts arguments in its brief 21 which, if adequately supported by alleged facts, may state a claim for relief. Thus, the Court will 22 allow Plaintiff to attempt to cure its deficiencies through amendment as to that claim. 23 24 F. Defendant U.S. Bank’s Motion to Stay Discovery 25 Defendant U.S. Bank has filed a motion to stay discovery pending a determination on the 26 motions to dismiss, which was noted for consideration on April 27, 2018. Dkt. #71. Given the 27 28 ORDER PAGE - 12 1 2 Court’s decision on these motions, the Court now DENIES the pending motion to stay discovery AS MOOT. IV. 3 4 CONCLUSION Having reviewed the parties’ motions, along with the remainder of the record, the Court 5 hereby finds and ORDERS: 6 7 1. Defendants’ Motions to Dismiss (Dkts. #62 and #63) are GRANTED IN PART and 8 DENIED IN PART as discussed above, with leave to amend the CFAA claim only. 9 Any amended complaint shall be filed no later than 20 days from the date of this 10 Order. Should Plaintiff decline to file any Amended Complaint, Plaintiff’s “Sixth” 11 claim for relief under the CFAA will be dismissed with prejudice. 12 13 2. Plaintiff’s First, Second and Fourth Claims for Relief are DISMISSED with prejudice. 14 3. Plaintiff’s Third and Fifth Claims for trade misappropriation under state and federal 15 16 law will proceed at this time. 4. Defendant U.S. Bank’s pending Motion to Stay Discovery (Dkt. #71) is DENIED AS 17 MOOT. 18 19 DATED this 2 day of May 2018. 20 A 21 22 RICARDO S. MARTINEZ CHIEF UNITED STATES DISTRICT JUDGE 23 24 25 26 27 28 ORDER PAGE - 13

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?