RLM Communications v. Tuschen, No. 14-2351 (4th Cir. 2016)

Annotate this Case
Justia Opinion Summary

Amy Tuschen worked for RLM for six years and then joined a competitor, eScience. RLM filed suit against eScience and Tuschen, alleging principally that Tuschen breached a covenant not to compete and unlawfully took confidential information from RLM and shared it with eScience. The district court granted summary judgment to defendants. The court concluded that the covenant not to compete was not enforceable because it was overbroad, and RLM failed to present sufficient evidence that Tuschen took or shared RLM’s confidential information. The court rejected RLM's remaining claims and affirmed the judgment.

Download PDF
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 14-2351 RLM COMMUNICATIONS, INC., Plaintiff - Appellant, v. AMY E. TUSCHEN; ESCIENCE AND TECHNOLOGY SOLUTIONS, INC., Defendants - Appellees. Appeal from the United States District Court for the Eastern District of North Carolina, at Raleigh. Louise W. Flanagan, District Judge. (5:14−cv−00250−FL) Argued: March 24, 2016 Decided: July 28, 2016 Before KING, DIAZ, and HARRIS, Circuit Judges. Affirmed by published opinion. Judge Diaz wrote the opinion, in which Judge King and Judge Harris joined. ARGUED: R. Jonathan Charleston, THE CHARLESTON GROUP, Fayetteville, North Carolina; Coy E. Brewer, Jr., COY E. BREWER, JR., ATTORNEY AT LAW, Fayetteville, North Carolina, for Appellant. Michael Coghlan Lord, WILLIAMS MULLEN, Raleigh, North Carolina, for Appellees. ON BRIEF: Jose A. Coker, Dharmi B. Tailor, THE CHARLESTON GROUP, Fayetteville, North Carolina, for Appellant. DIAZ, Circuit Judge: After working for six years at RLM Communications, Inc., Amy Tuschen Technology resigned Solutions, and joined Inc. a competitor, Although RLM and eScience and eScience had offices just a few miles from each other, RLM did not initially object to Tuschen’s move. Later, however, RLM discovered that eScience was planning to bid against it on a government contract very similar to one that Tuschen had managed during her tenure at RLM. RLM also learned that Tuschen was soliciting her former RLM colleagues to join eScience in the event her new employer won the contract. RLM brought multiple claims against eScience and Tuschen, alleging principally that Tuschen breached a covenant not to compete and unlawfully took confidential information from RLM and shared it with eScience. After discovery, the district court granted summary judgment to eScience and Tuschen on all of RLM’s claims. Because the covenant not to compete was not enforceable and RLM failed to present sufficient evidence that Tuschen took or shared RLM’s affirm. 2 confidential information, we I. A. RLM such as is a government cyber contractor security, specializing information technology, in services information assurance (i.e., managing the various risks associated with an organization’s support. RLM, information and data systems), and management On June 5, 2007, Tuschen signed an offer letter from accepting a position Representative. instruction at In the this U.S. as a role, Army Training Tuschen Leader Technology at Fort Gordon, Georgia. and was College Development to of provide Information On her first day of work, Tuschen executed two more documents: a Confidentiality Agreement and a Covenant Not to Compete (the “Noncompete”). 1 Over the next six years, RLM promoted Tuschen several times, ultimately making her Director of Information Assurance. One of Tuschen’s responsibilities in this position was to manage an information-assurance contract with the U.S. government (the “Contract”). The Contract was set to expire on June 30, 2014, at which time the government was to rebid the services as a new contract (the “Follow-on Contract”). Contract expired, resignation. 1 Tuschen Prior to gave About a year before the RLM two weeks’ notice departing, she copied several We discuss these agreements in more detail below. 3 of her files related to the Contract from her employer-issued laptop computer onto a CD, which she gave to her successor, Dennis Yelverton. Before Tuschen’s departure, RLM learned that she planned to join eScience, a competing federal contractor with an office just down the street from RLM. Not only did RLM not object to Tuschen’s plan to work for eScience, but it gave her $1,000 in gift cards and a “giant bouquet of roses” as parting gifts. J.A. 257. Within days of resigning from RLM, Tuschen began working for eScience as its Director of Cyber and IT Solutions. At eScience, she was charged with helping the company develop a bid for the Follow-on Contract and with reaching out to former colleagues at RLM to secure their services should eScience win the Follow-on Contract. She contacted several RLM employees for this purpose. Meanwhile, the government issued its request for proposals for the Follow-on Contract in May 2014. This led to some technical jockeying between RLM and eScience over how large a company would be permitted to serve as prime contractor. The original request for proposals assigned the Follow-on Contract a North American Industry Classification System (NAICS) code that had the effect of enabling eScience to bid as prime contractor but disqualifying the larger RLM. But the day after the request for proposals was released, the government amended it, assigning 4 a different NAICS code that would allow RLM to bid as prime contractor. Seeking to avoid competition from larger firms such as RLM, eScience appealed to the U.S. Small Business which reinstated the original NAICS code. victory: RLM, which could Administration, It was a fleeting participate in a bid as a subcontractor rather than as prime contractor, was part of the team that won the Follow-on Contract. B. RLM filed Tuschen and (“TRO”) and suit in eScience, North Carolina seeking asserting nine a state temporary claims: court against restraining (1) breach of order contract (related to the Noncompete); (2) breach of contract (related to the Confidentiality Agreement); (3) unfair and deceptive trade practices; (4) tortious interference with contractual relations; (5) misappropriation of trade secrets; (6) unjust enrichment; (7) civil conspiracy; (8) preliminary and permanent injunction; and (9) conversion. The state court granted the TRO, and Tuschen and eScience removed to federal court, where they moved to dismiss all claims. The district court converted their motion to dismiss into a motion for summary judgment to be supplemented after discovery. RLM quickly moved for a TRO and a preliminary injunction (as relevant here). The district court granted a TRO on the same 5 terms set forth in state court, but soon after replaced it with a preliminary injunction based in part on the parties’ consent. It also converted the request for a preliminary injunction into a motion for a permanent injunction. In November 2014, the district court granted Tuschen and eScience’s motion for summary judgment on all claims and denied RLM’s motion for a permanent injunction. RLM Commc’ns, Inc. v. Tuschen, 66 F. Supp. 3d 681 (E.D.N.C. 2014). This appeal followed. II. We review the district court’s grant of summary judgment de novo, viewing the facts in the light most favorable to RLM, the nonmovant. 2016). See Askew v. HRFC, LLC, 810 F.3d 263, 266 (4th Cir. We may affirm “on any legal ground supported by the record and are not limited to the grounds relied on by the district court.” Cir. 1993). genuine Jackson v. Kimel, 992 F.2d 1318, 1322 (4th Summary judgment is warranted where “there is no dispute as to any material fact entitled to judgment as a matter of law.” 56(a). and the movant is Fed. R. Civ. P. Because we are sitting in diversity, addressing matters of North Carolina law, we apply governing North Carolina law or, if necessary, predict how the Supreme Court of North Carolina would rule on an unsettled issue. 6 See Askew, 810 F.3d at 266. On appeal, RLM has abandoned its unjust-enrichment claim. We address the remaining issues in the following order: breach of the Noncompete, breach of misappropriation of interference contractual with trade the Confidentiality secrets, conversion, relations, unfair and Agreement, tortious deceptive trade practices, civil conspiracy, and permanent injunction. III. First, RLM faults the district court for granting summary judgment on its claim that Tuschen breached the terms of the Noncompete. The district concluded invalid for lack of consideration. 693. that the Noncompete was Tuschen, 66 F. Supp. 3d at In RLM’s view, however, the Noncompete was part of the larger employment contract, and so employment itself was the consideration. Moreover, RLM argues, even if the Noncompete was a separate contract requiring separate consideration, it recited adequate consideration, promising that RLM would give Tuschen access to “company private information.” Appellant’s Br. at 28. In Tuschen and eScience’s view, the Noncompete was not part of the employment contract, and the recited consideration was illusory because RLM never promised to provide Tuschen access to the company private information. In the alternative, they argue that the Noncompete is impermissibly broad. 7 Because we agree with Tuschen and eScience that the Noncompete is overbroad, we do not address the consideration issues. 2 Covenants not to compete are disfavored in North Carolina. See Kadis v. Britt, 29 S.E.2d 543, 546 (N.C. 1944); VisionAIR, Inc. v. James, 606 S.E.2d 359, 362 (N.C. Ct. App. 2004). They are valid only if they are “(1) in writing; (2) made a part of the employment contract; (3) based on valuable consideration; (4) reasonable as to time and territory; and (5) designed to protect a legitimate business interest of the employer.” Farr Assocs., Inc. v. Baskin, 530 S.E.2d 878, 881 (N.C. Ct. App. 2000). The restrictions on an employee’s future employment “must be no wider in scope than is necessary to protect the business of the employer.” Manpower of Guilford Cty., Inc. v. Hedgecock, 257 S.E.2d 109, 114 (N.C. Ct. App. 1979). More specifically, “restrictive covenants are unenforceable where they prohibit the employee from engaging in future work that is distinct employee.” 321, 327 from the duties actually performed by the Med. Staffing Network, Inc. v. Ridgway, 670 S.E.2d (N.C. Ct. App. 2009); 2 see also Copypro, Inc. v. Similarly, we do not reach the issue of whether the Noncompete violates public policy as expressed by Executive Order Number 13495 (Jan. 30, 2009). See Appellees’ Br. at 4546. 8 Musgrove, 754 S.E.2d 188, 192 (N.C. Ct. App. 2014) (“[W]e have held on numerous occasions that covenants restricting an employee from working in a capacity unrelated to that in which he or she worked for the employer are generally overbroad and unenforceable.”). The Noncompete, in relevant part, provides as follows: While I, the Employee, am employed by Employer, and for 1 years/months afterward, I will not directly or indirectly participate in a business that is similar to a business now or later operated by Employer in the same geographical area. This includes participating in my own business or as a co-owner, director, officer, consultant, independent contractor, employee, or agent of another business. J.A. 37. The restriction on Tuschen’s future employment is largely unmoored from ignoring for RLM’s a legitimate moment the bar business on interests. indirect Even participation in similar businesses, the Noncompete is overly broad by preventing direct participation in similar businesses. merely prohibited from working for RLM’s position like the one she held at RLM. Tuschen is competitors in not a She may also not mow their lawns, cater their business lunches, and serve as their realtor. S.E.2d See 912, Hartman 920 (N.C. v. W.H. Ct. Odell App. and 1994) Assocs., (finding Inc., a 450 covenant unenforceable where it “would appear to prevent plaintiff from 9 working as a custodian for any ‘entity’ which provides ‘actuarial services’” (quoting the record)). And if RLM were to take up software development as a new line of business Employer”), (i.e., Tuschen would “a business . . . be barred from later working representative for a nearby software developer. 606 S.E.2d software at when employee] did 363 (striking sales for work [the down was a operated employer]”). to The a sales See VisionAIR, restriction “unrelated as by that ban on selling which on [the indirect participation could have even more startling consequences: if Tuschen has retirement accounts invested in mutual funds, she may have to monitor their holdings to investing in companies similar to RLM. be sure she is not See id. Such a broad prohibition on future employment (let alone investment) concerns. cannot be justified by RLM’s legitimate business “With everything Tuschen knew . . . in her leadership positions,” RLM asserts, “she could singlehandedly affect RLM’s future in terms of its ability to bid on and secure upcoming contracts.” Appellant’s Br. at 34. Assuming this is true (despite RLM’s beating out eScience for the Follow-on Contract), RLM’s legitimate business interests fall well short of justifying the Noncompete’s prohibitions. Instead of focusing on employment that raises the risk that Tuschen will use knowledge obtained from RLM to RLM’s detriment, 10 the Noncompete targets the similarity of a new employer to RLM. That is not a sufficient limiting factor for a covenant not to compete. See Henley Paper Co. v. McAllister, 117 S.E.2d 431, 434 (N.C. 1960) (holding that a covenant was overbroad where it barred a salesman of “fine” paper products from “‘either directly or indirectly’ engaging ‘in the manufacture, sale or distribution of paper or paper products’”); Kinesis Advert., Inc. v. Hill, 652 S.E.2d 284, 294 (N.C. Ct. App. 2007) (“We have previously held that a covenant-not-to-compete is ‘overly broad in that, rather than attempting to prevent [the former employee] from competing for [] business, it requires [the former employee] to have no association whatsoever with any business that provides [similar] services.’” (quoting Hartman, 450 S.E.2d at 920)). Simply put, the Noncompete is overly broad and cannot be enforced as written. 3 RLM encourages us to take up North Carolina’s “blue-pencil” doctrine and strike the offending language. 35-36. Appellant’s Br. at Under this doctrine, a court “may choose not to enforce a distinctly separable part of a covenant in order to render the provision reasonable.” Hartman, 450 S.E.2d at 920. But North Carolina’s blue-pencil rule “severely limits what the court may do to alter” an overly broad covenant not to compete. 3 Id. We do not reach the question whether the Noncompete is reasonable as to time and territory. 11 “[W]hen an agreement not to compete is found to be unreasonable, . . . the court is powerless unilaterally to amend the terms of the contract.” Beverage Sys. of the Carolinas, LLC v. Associated Beverage Repair, LLC, 784 S.E.2d 457, 461 (N.C. 2016). from We therefore cannot rewrite the Noncompete to save it its fatal flaws. Moreover, even if we assume blue- penciling were appropriate in this case, we do not see how it would help RLM. RLM suggests that we strike the term “indirectly,” but we have already explained that a prohibition limited to direct participation in a similar business is overbroad. Because the Noncompete is unenforceable and cannot be mended by blue-penciling, the district court properly dismissed the associated claim for breach of contract. IV. RLM’s second breach-of-contract claim alleges that Tuschen violated the district court terms of granted the summary consideration illusory. Confidentiality Confidentiality Agreement judgment, Agreement. finding the The cited We assume without deciding that the was valid and affirm on the alternative ground that RLM has failed to put forth sufficient evidence of breach. 12 In relevant part, the Confidentiality Agreement reads as follows: “While I am employed by Employer and afterward, I will not, except in performing my duties, remove or copy any confidential information or materials or assist anyone in doing so without Employer’s written permission.” J.A. 39. In the Verified Complaint, RLM alleges that the breach occurred when “Tuschen disclosed confidential information acquired during her employment with RLM.” J.A. 23. On appeal, RLM has pivoted to a new breached the theory: merely by Tuschen copying confidential Confidentiality information without Agreement permission and not in performance of her duties. Tuschen readily admits that before she left RLM, she copied confidential information employer-issued laptop regarding onto a CD the without Contract written from her permission. The question is whether she did so “in performing [her] duties.” According to Tuschen, she made the CD to gather all of the files relevant to the Contract in “a single, one-stop source of information that [her successor, Dennis Yelverton,] would not otherwise have.” J.A. 258. Although Tuschen knew that RLM would retain the laptop and all of the information in it, she believed the CD would ease the transition for Yelverton. She also testified that she gave the only copy to Yelverton, and RLM has conceded it has no evidence to the contrary. 13 Tuschen has also presented evidence that (1) Yelverton lacked access to many of the files on the CD and her computer was to be sent to a different office and would not be immediately available to Yelverton; (2) before she created the CD, RLM’s Vice President of IT Services and Solutions had similarly created a CD for his successor when he resigned, and there had been no “Corporate pushback,” J.A. 428; (3) no one at RLM objected upon learning that Tuschen had made the CD; (4) “[t]he CD was used extensively to access the information on it to manage the Contract following Ms. Tuschen’s resignation,” J.A. 429; and (5) Yelverton, upon his own resignation, “passed the CD to the incoming Program Manager as well as providing a copy of the CD to the Senior Program Manager,” J.A. 434. RLM provides no evidence to contradict Tuschen’s contention that she created the CD to ease the transition for Yelverton. Nonetheless, RLM asserts that nobody told Tuschen to create the CD, and doing so was not a common practice at RLM. In most workplaces, however, such an employee would be lauded for her initiative, rather than accused of wrongdoing. is required to raise an inference that Something more Tuschen, as RLM’s Director of Information Assurance and the person responsible for managing the Contract, was not performing her duties when she made the CD for her successor. 14 Because RLM has not shown a genuine issue of fact that Tuschen breached the Confidentiality Agreement, we affirm the grant of summary judgment as to this claim. V. RLM’s misappropriation-of-trade-secrets claim is similar to its claim for breach of the Confidentiality Agreement. Here, RLM alleges not only that Tuschen created the CD, but also that she kept a copy for herself and shared confidential information with eScience. A. In North Carolina, “‘[m]isappropriation’ means acquisition, disclosure, or use of a trade secret of another without express or implied authority or consent, unless such trade secret was arrived at by independent development, reverse engineering, or was obtained from another person with a right to disclose the trade secret.” statute also N.C. Gen. Stat. § 66-152. sets out a scheme for The misappropriation shifting the burden production: Misappropriation of a trade secret is prima facie established by the introduction of substantial evidence that the person against whom relief is sought both: (1) Knows or should have known of the trade secret; and (2) Has had a specific opportunity to acquire it for disclosure or use or has acquired, disclosed, or 15 of used it without the express or implied consent or authority of the owner. This prima facie evidence is rebutted by the introduction of substantial evidence that the person against whom relief is sought acquired the information comprising the trade secret by independent development, reverse engineering, or it was obtained from another person with a right to disclose the trade secret. This section shall not be construed to deprive the person against whom relief is sought of any other defenses provided under the law. Id. § 66-155. The first prong of the prima facie case plainly requires that the defendant “[k]nows or should have known of the trade secret.” Id. The second prong provides two alternatives, requiring that the defendant “[1] has had a specific opportunity to acquire [the trade secret] for disclosure or use or [2] has acquired, disclosed, or used it without the express or implied consent or authority of the owner.” Id. (emphasis added). At first blush, this second prong appears to allow a plaintiff to show either that the defendant had an opportunity to acquire trade secrets or that the defendant in fact acquired them without permission. But there is a problem with this reading. To understand why, it is first important to note the effect of a trade-secrets prima facie Interpreting case the in phrase the context “prima facie of summary evidence” judgment. in another statute, the Supreme Court of North Carolina has explained that “prima facie evidence means, and means no more, than evidence 16 sufficient to justify, but not to compel an inference” of the fact in question. Home Fin. Co. of Georgetown v. O’Daniel, 74 S.E.2d 717, 721 (N.C. 1953) (citing N.C. Gen. Stat. § 44-38.1(a) (repealed 1967)). Prima facie evidence “furnishes evidence to be weighed, but not necessarily to be accepted, by the jury. It simply carries the case to the jury for determination, and no more.” Id. Therefore, a prima facie case of misappropriation permits a plaintiff to survive summary judgment. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248-49 (1986); Collingwood v. Gen. Elec. Real Estate Equities, Inc., 376 S.E.2d 425, 427 (N.C. 1989). In the employment suffice for a employer can prima state context, facie a case prima if knowledge of misappropriation, facie case and against opportunity its then an employee merely by showing that it gave the employee access to its trade secrets. The employer can therefore force such an employee to go to trial on a misappropriation claim—unless the employee can rebut the prima facie case. Unfortunately, the statute does not clearly address rebuttal in a case such as this one, where the employee claims that she never acquired or used trade secrets at all. The statute provides three grounds for rebutting the prima facie evidence, but all grounds assume that the employee has in fact acquired the trade secrets: “prima facie evidence is rebutted by the introduction of substantial evidence that the 17 person against whom relief is sought acquired the information comprising the trade secret by independent development, reverse engineering, or it was obtained from another person with a right to disclose the trade secret.” exclusive, an absurd result § 66-155. would If these grounds were follow: Every employee in North Carolina who had access to her employer’s trade secrets but did not acquire them would have to go to trial to fend off the employer’s claim of misappropriation. B. We do not think the Supreme Court of North Carolina, which has not had occasion to consider the meaning of the statute, would adopt such an interpretation. See State v. Hunt, 591 S.E.2d 502, 503 (N.C. 2003) (“[W]here a literal interpretation of the language of a statute will lead to absurd results, or contravene the manifest purpose of the Legislature, as otherwise expressed, the reason and purpose of the law shall control and the strict letter thereof shall be disregarded.” (quoting Mazda Motors of Am., Inc. v. Sw. Motors, Inc., 250 S.E.2d 250, 253 (N.C. 1979))). Nor do other North Carolina interpreted the statute this way. whether a prima facie case courts appear to have Instead, when determining exists, North Carolina courts generally look for proof of more than a mere opportunity to misappropriate; they require evidence 18 that the defendant actually acquired or used trade secrets. See, e.g., Modular Techs., Inc. v. Modular Sols., Inc., 646 S.E.2d 864, at *4 (N.C. Ct. App. 2007) (unpublished) (“[E]ven assuming that at least some of the qualifies information as trade to which secrets, [the employee] plaintiff had [employer] access has not introduced substantial evidence that [the employee] acquired the information for disclosure or use, or disclosed or used the information.”); Static Control Components, Inc. v. Summix, Inc., No. 1:08CV928, 2012 WL 1379380, at *7 (M.D.N.C. Apr. 20, 2012) (granting summary judgment to a defendant–competitor where the employer could show that an employee had access to its trade secrets but could not make the further showing that the employee shared them with the competitor); Amerigas Propane, L.P. v. Coffey, No. 14 CVS 376, 2015 WL 6093207, at *13 (N.C. Super. Ct. Oct. 15, 2015) (finding no prima facie case because the employer “has not offered evidence that [the employee] accessed or downloaded customer information from [the employer’s] computer database in connection with his departure from the company”); cf. Sunbelt Rentals, Inc. v. Head & Engquist Equip., L.L.C., 620 S.E.2d 222, 229 (N.C. Ct. App. 2005) (holding that a prima facie case of misappropriation was established where a competitor hired employees from an employer and immediately expanded into the employer’s territory, taking a large chunk of the employer’s business); Byrd’s Lawn & Landscaping, Inc. v. Smith, 542 S.E.2d 19 689, 693 (N.C. Ct. App. 2001) (finding that a prima facie case was established employer’s an confidential contracts underbid where resigned the who cost-history and employer employee started on a several had access information competing contracts). on to his customer business But that see Barr- Mullin, Inc. v. Browning, 424 S.E.2d 226, 230 (N.C. Ct. App. 1993) (“[A] prima facie case of misappropriation exists since defendant during Browning his employ helped with to develop plaintiff the and COMPU–RIP Browning had software access to copies of the COMPU–RIP source code prior to his resignation.”). At least two potential interpretations of the statute would produce results consistent with those of the North Carolina courts, and we think the Supreme Court of North Carolina would adopt one of them. 1. First, reading of available. prima facie a more the sensible—if second prong less of grammatically the prima facie obvious— case is As we have pointed out, the second prong of the case presents two alternate scenarios for a plaintiff to prove: Either the defendant “has had a specific opportunity to acquire [the trade secret] for disclosure or use or has acquired, disclosed, or used it without the express or implied consent or authority of the owner.” final phrase—“without the express 20 or § 66-155. implied consent The or authority of the owner”—may be read to apply only to the second scenario; but one could also reasonably read it to apply to the first. Thus, in the first scenario the plaintiff would have to show that the defendant “[h]as had a specific opportunity to acquire [the trade secret] for disclosure or use . . . without the express or implied consent or authority of the owner.” Read this way, the employer would have to prove not merely that its employee had access to trade secrets, but also that the employee abused such access—the employer would have to show knowledge and an unauthorized opportunity to acquire or use trade secrets. Cf. Ridgway, 670 S.E.2d at 329 (finding a prima facie case where an employer proved that its employee accessed confidential files “with unusual frequency” shortly before attending a meeting with a competitor). Although this is perhaps not the most natural reading statute, of the it would avoid the problem outlined above and produce results consistent with decisions of North Carolina courts. 2. Alternatively, a second interpretation would accept our original reading of the prima facie case, permitting an employer to show mere knowledge and opportunity. As we have noted, the grounds set out in the statute for rebutting the prima facie case do not assist an employee who wishes to rebut by arguing 21 that she never acquired or used any trade secrets at all. because the statute does not expressly limit a defendant But to these grounds for rebuttal—indeed, section 66-155 states that “[t]his section shall not be construed to deprive the person against whom relief is sought of any other defenses provided under the law”—we may infer the existence of another ground for rebuttal that would avoid the absurd result outlined above. If a defendant’s opportunity to steal trade secrets may give rise to an inference of misappropriation, we think the defendant rebuts the inference by showing that the circumstances surrounding the opportunity were not suspicious. In the employment context, if an employee can show that the opportunity was provided with the consent of the employer—as will often be the case—then justified. an inference of misappropriation is no longer The burden of production then shifts back to the employer to show evidence sufficient to raise an inference of actual acquisition or use. The practical effect of this burden shifting, of course, is that an employer accusing an employee of misappropriation will often gain little benefit from making a prima facie case based on opportunity. will collapse into the question Instead, the framework whether the employer has sufficient evidence of misappropriation to raise an inference of actual acquisition or use of its trade secrets. 22 Here again, this result is generally consistent with the practice of the North Carolina courts. 3. To summarize: we conclude that the Supreme Court of North Carolina would adopt one of the two interpretations of section 66-155 we have discussed. Both produce a rule sufficient to resolve this case: When an employer brings a misappropriation claim against an employee, admitting that the employee had authorized access to its trade secrets at all relevant times, the employer must raise an inference of actual acquisition or use of trade secrets to survive summary judgment. We note finally that this rule is consistent with the parties’ views of the law, and that neither raised the meaning of section 66-155 as an issue in their briefs. See, e.g., Appellant’s Br. at 17-18 (noting that Tuschen “had access to all of the documents and information,” but arguing that RLM should have survived summary judgment because it had raised “a compelling circumstantial inference that a copy of the CD was taken by Tuschen and used by her and eScience”); Appellees’ Br. at 19 (arguing that summary judgment was warranted because RLM could not raise an inference that Tuschen made an extra copy of the CD for herself or took the information stored on it). 23 C. The rule we have just stated applies straightforwardly to this case. RLM admits it gave Tuschen access to its trade secrets, and it does not claim she ever accessed them without authorization. On either of our interpretations, these facts would prevent an inference of misappropriation from Tuschen’s access alone: on the first, RLM fails to state a prima facie case, and on the second, though RLM states the prima facie case, Tuschen successfully rebuts it. an inference of RLM’s burden, then, is to raise misappropriation, evidence if necessary. relying on circumstantial GE Betz, Inc. v. Conrad, 752 S.E.2d 634, 649 (N.C. Ct. App. 2013). RLM has admitted “[it] doesn’t have any” evidence “that Ms. Tuschen retained any of the information on the CD,” J.A. 169, and we have already explained (in affirming the dismissal of RLM’s claim that Tuschen breached the Confidentiality Agreement) why Tuschen’s creation of the CD cannot raise an inference that she retained trade secrets. 4 4 RLM’s reliance on Ridgway to urge a different result is misplaced. There, the employer put forth evidence that the employee “accessed [the employer’s] ‘game plan’ and other confidential documents from [the employer’s] network with unusual frequency” just prior to a meeting with a competitor. 670 S.E.2d at 329 (emphasis added). RLM has no comparable evidence that Tuschen’s creation of the CD was suspicious. 24 Nevertheless, RLM contends that after hiring Tuschen, eScience underwent an “unexplained leap in technical capacity” that permits an inference of misappropriation. at 18. Appellant’s Br. RLM cites Static Control Components, Inc. v. Darkprint Imaging, Inc., 200 F. Supp. 2d 541, 545-46 (M.D.N.C. 2002), which found “strong circumstantial evidence” of misappropriation where an aftermarket-toner distributor alleged that a competitor developed new toner product lines unusually quickly after hiring five of its employees. evidence was products similar But undisputed to the unlike that the in Darkprint, competitor distributor’s soon where the developed new after hiring its employees, id., RLM’s evidence fails to raise a genuine issue of fact as to whether eScience made a “leap in technical capacity.” Its sole evidence is that eScience had never bid on the Contract before Tuschen joined, but afterward it was able to bid on the Follow-on Contract. We do not think submitting a bid, particularly an unsuccessful one, represents the same sort of “leap in technical capacity” described in Darkprint. 5 5 RLM also contends that, during discovery, Tuschen produced a document “virtually identical” to one on the CD. Appellant’s Br. at 20. (RLM does not contend the document itself contains trade secrets.) But Tuschen testified she received the document from a third-party source and RLM has no evidence to suggest otherwise. While a fact finder could conclude that Tuschen acquired the document from RLM rather than the third-party, this would provide negligible evidence that she also acquired documents containing trade secrets. 25 D. Because RLM has not produced sufficient evidence to permit an inference of misappropriation, summary judgment was properly granted on the trade-secrets claim. VI. RLM’s conversion claim is easily dispatched based on the analysis above. In North Carolina, conversion is “an unauthorized assumption and exercise of the right of ownership over goods or personal chattels belonging to another, to the alteration of their condition or the exclusion of an owner’s rights.” Peed v. Burleson’s, Inc., 94 S.E.2d 351, 353 (N.C. 1956) (quoting 89 C.J.S., Trover & Conversion § 1). For the reasons set forth above, RLM’s evidence does not make a genuine issue of its allegation that “Tuschen took RLM’s confidential and proprietary information on a CD.” Appellant’s Br. at 23. VII. RLM next contests the district court’s grant of summary judgment on its claim against eScience for tortious interference with contractual relations. The tort has four elements: First, that a valid contract existed between the plaintiff and a third person, conferring upon the plaintiff some contractual right against the third person. Second, that the outsider had knowledge of the plaintiff’s contract with the third person. Third, that the outsider intentionally induced the 26 third person not to perform his contract with the plaintiff. Fourth, that in so doing the outsider acted without justification. Fifth, that the outsider’s act caused the plaintiff actual damages. Peoples Sec. Life Ins. Co. v. Hooks, 367 S.E.2d 647, 649-50 (N.C. 1988) (quoting Childress v. Abeles, 84 S.E.2d 176, 181-82 (N.C. 1954)). of North In explaining the fourth prong, the Supreme Court Carolina constitutes has stated justifiable that interference “competition in in business another’s business relations and is not actionable so long as it is carried on in furtherance lawful.” for of one’s own interests and by means that are Id. at 650 (holding that a competitor is not liable tortious interference for hiring employees away from an employer and placing them in competition with the employer, so long as the competitor was motivated by competition rather than malice). The district court correctly relied on Hooks, explaining that “[t]here is no genuine issue of fact that plaintiff and defendant [eScience] are competitors in the same field, and that [eScience] hired Tuschen to work on government contracts similar to those that she worked on with plaintiff.” Supp. 3d at 694. Tuschen, 66 F. Because the record discloses no evidence that eScience was motivated by anything other than competition, its interference with Tuschen and RLM’s employment contract justified and summary judgment was therefore appropriate. 27 was VIII. RLM’s remaining claims all rely in one way or another on claims we have already found meritless. First, RLM bases its claim for unfair and deceptive trade practices on its claims for misappropriation and tortious interference. at 49-50. See Appellant’s Br. Because we have held that those claims lack merit, so does this one. Second, civil conspiracy requires “an underlying claim for unlawful conduct,” Sellers v. Morton, 661 S.E.2d 915, 922 (N.C. Ct. App. 2008) (quoting Toomer v. Garrett, 574 S.E.2d 76, 92 (N.C. Ct. App. 2002)), and none remains. Finally, RLM’s request for a permanent injunction is unwarranted because there is no basis on which to enjoin Tuschen or eScience. IX. For the foregoing reasons, we affirm the district court’s judgment. AFFIRMED 28

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.