NW Monitoring LLC v. Hollander et al, No. 3:2020cv05572 - Document 26 (W.D. Wash. 2021)

Court Description: ORDER granting in part and denying in part Jeffery Parkinson, 4319 Consulting, Inc., and Marital Community of Jeffery Parkinson's 13 Motion to Dismiss Complaint; granting in part and denying in part Defendant Hollander's Motion for Parti al Dismissal of Plaintiff's Complaint & to Join Defendants 4319 Consulting's and Parkinson's 16 Motion to Dismiss for Failure to State a Claim. The following claims are DISMISSED: Counts 2, 3, 4, 5, and 6 are DISMISSED without pre judice as to all defendants. Counts 7 and 8 are DISMISSED with prejudice. Count 10 is DISMISSED without prejudice. Count 15 is DISMISSED without prejudice as to Defendant Charlene Wolfe, Defendant 4319 Consulting, Inc., and Defendant Jeffery D. Parkinson. Count 16 is DISMISSED without prejudice as to Defendant 4319 Consulting, Inc., and Defendant Jeffery D. Parkinson. Plaintiff NW Monitoring LLC is GRANTED leave to amend its complaint no later than (21) days from the date of this Order. Signed by Judge Ricardo S. Martinez. (PM)

Download PDF
NW Monitoring LLC v. Hollander et al Doc. 26 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 1 of 21 1 2 3 4 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 6 7 NW MONITORING LLC, 8 CASE NO. C20-5572 RSM Plaintiff, 9 ORDER PARTIALLY GRANTING MOTIONS TO DISMISS v. 10 SUSAN L. HOLLANDER, et al., 11 Defendants. 12 13 14 I. INTRODUCTION 15 This matter is before the Court on two motions to dismiss and two notices of joinder 16 wherein all defendants seek dismissal of some, or all, of Plaintiff NW Monitoring LLC’s many 17 claims.1 Plaintiff NW Monitoring LLC’s claims, against two former employees and two business 18 competitors, vary from misappropriation of trade secrets, computer fraud and abuse, 19 racketeering, interference with contractual relationships and business expectancies, breach of the 20 duty of loyalty, breach of contract, and numerous civil conspiracies. See generally Dkt. #1. 21 Defendants 4319 Consulting, Inc. and Jeffery D. Parkinson—the competitors—seek dismissal of 22 1 23 24 In addition to the individual defendants to be addressed in this Order, Plaintiff NW Monitoring LLC’s complaint named spouses Jane Doe Parkinson, John Doe Hollander, and John Doe Wolfe to address community property concerns. Dkt. #1 at ¶¶ 4.2–4.5. Following the parties’ lead, the Court does not address spouses or the marital communities separately. ORDER – 1 Dockets.Justia.com Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 2 of 21 1 all Plaintiff NW Monitoring LLC’s claims against them.2 Dkt. #13. Defendant Susan L. 2 Hollander, a past employee, seeks dismissal of claims under RICO and claims related to the 3 misappropriation of trade secrets and computer fraud.3 Dkt. #16. Defendant Charlene Wolfe, 4 also a past employee, joins the motions to dismiss to the extent any successful arguments may 5 apply to her as well, but makes no individualized argument for dismissal. Dkt. #17 and #18. 6 Plaintiff NW Monitoring responds, arguing that it has sufficiently alleged all of its claims and 7 that dismissal is not warranted. Dkt. #19. Defendants have further replied in support of their 8 arguments. Dkts. #22 and #23. Having considered the issues and the briefing, the Court grants 9 the motions in part, for the following reasons. 10 II. 11 BACKGROUND A. Factual Background 12 Plaintiff NW Monitoring LLC (“NW Monitoring”) “provides intraoperative 13 neuromonitoring and intraoperative oversight services throughout the United States.” Dkt. #1 at 14 ¶ 5.1. NW Monitoring employed Defendant Susan L. Hollander (“Hollander”) as its Chief 15 Medical Officer and Defendant Charlene Wolfe (“Wolfe”) as its Credentialing Manager. Id. at 16 ¶¶ 5.4–5.5. Defendant 4319 Consulting, Inc. (“4319 Consulting”) and its sole shareholder 17 Defendant Jeffery D. Parkinson (“Parkinson”) (collectively, with 4319 Consulting, the 18 “Parkinson Defendants”) directly compete with NW Monitoring for business. Id. at ¶ 5.7. 19 // 20 21 22 2 20 of Plaintiff NW Monitoring’s 22 claims are brought against Defendants 4319 Consulting, Inc. and Jeffery D. Parkinson. See Dkt. #1 (Claims 1–16 and 19–22). 3 23 24 Defendant Susan L. Hollander does not seek dismissal of claims for breach of contract, breach of the duty of loyalty, intentional interference with contractual relationships and business expectancies, and related conspiracies. Dkt. #16 (challenging claims 1–10 and indicating that Defendant Susan L. Hollander “does not seek dismissal of the remaining counts”). ORDER – 2 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 3 of 21 1 This case arises out of Hollander’s transition from employment with NW Monitoring to 2 employment with 4319 Consulting. NW Monitoring alleges broadly that while Hollander and 3 Wolfe were still employed by NW Monitoring, they conspired with the Parkinson Defendants to 4 illegally deprive NW Monitoring of customers and business expectancies, trade secrets, and 5 employees, thereby damaging NW Monitoring’s business. Id. at ¶¶ 5.6–5.8. Specifically, NW 6 Monitoring alleges misappropriation of trade secrets arising from Wolfe emailing “information 7 related to hospital credentialing and physician license renewals” from NW Monitoring to her 8 personal email and later using that information for Parkinson Defendants’ benefit. Id. at ¶ 6.3. 9 As to Hollander’s misappropriation, NW Monitoring primarily alleges that she created 10 unauthorized user accounts allowing her and the Parkinson Defendants to later access “electronic 11 medical records and customer pricing information” on NW Monitoring’s protected computer 12 system. Id. at ¶ 6.6. Additionally, NW Monitoring alleges that Hollander interfered in business 13 relationships, stealing two NW Monitoring customers on the way out and diverting two more 14 new clients away from their interest in NW Monitoring and to Parkinson Defendants. Id. at 15 ¶ 20.5. 16 B. Procedural Background 17 On the basis of these allegations, NW Monitoring asserted numerous claims for violations 18 of federal law under the Defend Trade Secrets Act (“DTSA”),4 the Computer Fraud and Abuse 19 Act (“CFAA”),5 and the Racketeer Influenced and Corrupt Organizations Act (“RICO”),6 20 21 4 18 U.S.C. § 1832 et seq. 5 18 U.S.C. § 1030(g). 6 18 U.S.C. §§ 1962(c), 1964(c). 22 23 24 ORDER – 3 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 4 of 21 1 violations of state law under Washington’s Uniform Trade Secrets Act (“WUTSA”),7 and claims 2 for intentional interference with contractual relations, tortious interference with a business 3 expectancy, breaches of the duty of loyalty, breaches of contracts, and civil conspiracies. 4 Defendants seek dismissal of these claims pursuant to Federal Rule of Civil Procedure 12(b)(6). 5 III. 6 DISCUSSION A. Legal Standard 7 Dismissal under Federal Rule of Civil Procedure 12(b)(6) “can be based on the lack of a 8 cognizable legal theory or the absence of sufficient facts alleged under a cognizable legal theory.” 9 Balistreri v. Pacifica Police Dep’t, 901 F.2d 696, 699 (9th Cir. 1990); see also FED. R. CIV. P. 10 8(a)(2). While considering a Rule 12(b)(6) motion, the court accepts all facts alleged in the 11 complaint as true and makes all inferences in the light most favorable to the non-moving party. 12 Baker v. Riverside Cnty. Office of Educ., 584 F.3d 821, 824 (9th Cir. 2009) (citations omitted). 13 The court is not required, however, to accept as true a “legal conclusion couched as a factual 14 allegation.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 15 550 U.S. 544, 555 (2007)). “Determining whether a complaint states a plausible claim for relief 16 will . . . be a context-specific task that requires the reviewing court to draw on its judicial 17 experience and common sense.” Id. at 679 (citations omitted). 18 “To survive a motion to dismiss, a complaint must contain sufficient factual matter, 19 accepted as true, to ‘state a claim to relief that is plausible on its face.’” Id. at 678 (quoting 20 Twombly, 550 U.S. at 570). This requirement is met when the plaintiff “pleads factual content 21 that allows the court to draw the reasonable inference that the defendant is liable for the 22 misconduct alleged.” Id. (quoting Twombly, 550 U.S. at 556). The complaint need not include 23 24 7 Title 19.105 WASH. REV. CODE. ORDER – 4 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 5 of 21 1 detailed allegations, but it must have “more than labels and conclusions, and a formulaic 2 recitation of the elements of a cause of action will not do.” Twombly, 550 U.S. at 555. “The 3 plausibility standard is not akin to a probability requirement, but it asks for more than a sheer 4 possibility that a defendant has acted unlawfully. . . . Where a complaint pleads facts that are 5 merely consistent with a defendant’s liability, it stops short of the line between possibility and 6 plausibility of entitlement to relief.” Iqbal, 556 U.S. at 678 (citing Twombly, 550 U.S. at 556, 7 557). Absent facial plausibility, a plaintiff’s claims must be dismissed. 8 B. Federal and State Trade Secret Misappropriation Claims (Counts 1–2, and 9–10) 9 Defendants’ primary contention with NW Monitoring’s trade secret misappropriation 10 claims is that NW Monitoring has not adequately identified the trade secrets at issue. Dkt. #13 11 at 9;8 Dkt. #16 at 5. A claim under the WUTSA requires a plaintiff to plead (1) the existence of 12 a protectable trade secret, and (2) facts constituting misappropriation. MUFG Union Bank, N.A. 13 v. Tyler, Case No. 17-cv-1766-RSM, 2018 WL 2046290, at *3 (W.D. Wash. May 2, 2018) 14 (citations omitted). 15 § 19.108.010(4) (indicating that a trade secret is “information, including a formula, pattern, 16 compilation, program, device, method, technique, or process”). But the trade secret must derive 17 “independent economic value, actual or potential, from not being generally known” and must be 18 protected by reasonable efforts. Id. A defendant may be held liable for misappropriation where 19 the defendant disclosed or used a trade secret, without express or implied consent, while knowing 20 or having reason to know the secrecy of the trade secret. WASH. REV. CODE § 19.108.010(2). 21 Claims under the federal DTSA are substantially similar. See 18 U.S.C. § 1839; Philips N. Am., The definition of a trade secret is broad. See WASH. REV. CODE 22 23 8 24 Throughout, the Court cites to the docket and page numbers applied by the Court’s CM/ECF system. Where appropriate, the Court cites to numbered paragraphs or page and line numbers. ORDER – 5 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 6 of 21 1 LLC v. Summit Imaging Inc., Case No. 19-cv-1745-JLR, 2020 WL 1515624, at *5 (W.D. Wash. 2 Mar. 30, 2020). 3 1. Identification of Trade Secrets 4 NW Monitoring’s complaint identifies the alleged trade secrets as “hospital credentialing 5 information, physician license renewal information, and customer pricing information.” Dkt. #1 6 at ¶ 6.2. More specifically, NW Monitoring alleges that Wolfe emailed herself “trade secret 7 information related to hospital credentialing and physician license renewals.” Id. at ¶ 6.3. As to 8 Hollander, NW Monitoring alleges that she accessed protected computer systems containing 9 “electronic medical records and customer pricing information,” and created two unauthorized 10 user accounts associated with a “4319consulting.com” domain name. Id. at ¶ 6.6. Further, NW 11 Monitoring alleges that “Hollander, 4319 Consulting, and Parkinson accessed NW Monitoring’s” 12 protected computer system after the accounts were created. Id. at ¶ 6.7. 13 Defendants argue that these general allegations are not sufficient to put them on notice of 14 the trade secrets at issue. Specifically, defendants argue that “[p]art of sufficiently stating a claim 15 for trade secret misappropriation is sufficiently identifying the alleged trade secrets and showing 16 that they existed.” Dkt. #13 at 9 (quoting Digital Mentor, Inc. v. Ovivo USA, LLC, Case No. 17- 17 cv-1935-RAJ, 2018 WL 6724765, at *8 (W.D. Wash. Dec. 21, 2018)); see also Dkt. #16 at 5 18 (citing MAI Sys. Corp. v. Peak Comput., Inc., 991 F.2d 511, 522 (9th Cir. 1993)). But the Court 19 finds defendants’ arguments unavailing. 20 “[T]he determination in a given case whether specific information is a trade secret is a 21 factual question.” Multifab, Inc. v. Zweiger, Case No. 19-cv-6164-BHS, 2020 WL 2614736, at 22 *3 (W.D. Wash. May 22, 2020) (quoting Nowogroski Ins., Inc. v. Rucker, 137 Wash. 2d 427, 23 436, 971 P.2d 936, 941 (1999) (en banc) (citations omitted)). At this stage in the case, the Court 24 is faced with a question of law: “whether a particular type or format of information is protected.” ORDER – 6 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 7 of 21 1 Id. (citing Nowogroski Ins., Inc., 137 Wash. 2d at 436, 971 P.2d at 941) (emphasis added). Thus, 2 the appropriate question is whether “hospital credentialing information,” “physician license 3 renewal” information, “electronic medical records[,] and customer pricing information” can ever 4 constitute trade secrets. 5 While evidence may lead to a different factual conclusion, at the pleading stage, the 6 answer is that NW Monitoring has clearly alleged a protectable trade secret in at least its customer 7 pricing information. Nowogroski Ins., Inc., 137 Wash. 2d at 440–50, 971 P.2d at 943–49 8 (concluding that a customer list, whether written or memorized, constituted protectable trade 9 secret).9 Defendants’ reliance on Digital Mentor, Inc. to argue otherwise is misplaced. There, 10 the trade secrets alleged by plaintiff were only nondescript “designs,” “processes,” “algorithms,” 11 and “modules.” Digital Mentor, Inc., 2018 WL 6724765, at *8. The Court finds those generic 12 descriptions are quite distinct from NW Monitoring’s allegations in this case. 13 Hollander, a doctor, makes a somewhat convincing argument that her “hospital 14 credentialing information” cannot possibly constitute a trade secret because she has personal 15 knowledge of her credentialing information. Dkt. #16 at 5; Dkt. #22 at 6–7. But Hollander’s 16 knowledge of base information does not mean that all form of the same information are not 17 protectable trade secrets. See United States v. Nosal, 844 F.3d 1024, 1042 (9th Cir. 2016) cert. 18 denied, 138 S. Ct. 314 (2017)) (noting that the manner in which the information was compiled 19 or the selection of information to retain could turn public information into a proprietary trade 20 secret) (“Nosal II”). Factual challenges may remain, but the allegations are sufficient to state a 21 claim. 22 23 24 9 The Court notes the numerous allegations NW Monitoring has made that defendants accessed customer pricing information. See e.g. Dkt. #1 at ¶¶ 5.6, 5.8, 6.2, 6.6. Discussion of these allegations was conspicuously absent from defendants’ briefing. ORDER – 7 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 8 of 21 1 2. Misappropriation of Trade Secrets 2 The Court further concludes that NW Monitoring has adequately alleged 3 misappropriation of its trade secrets. NW Monitoring alleges that Wolfe, near the end of her 4 employment with NW Monitoring, moved hospital credentialing information from NW 5 Monitoring to her private email and later performed credentialing services for Parkinson 6 Defendants. Dkt. #1 at ¶¶ 6.3, 20.5.e. NW Monitoring also alleges that Hollander created user 7 accounts for NW Monitoring’s protected computer systems associated with a “4319 Consulting” 8 domain name and later accessed NW Monitoring’s protected computer systems with Parkinson 9 Defendants. Id. at ¶¶ 6.6–6.7. 10 Defendants fault NW Monitoring’s allegations as nonspecific. But the Court does not 11 expect NW Monitoring to know all of the relevant facts surrounding defendants’ 12 misappropriation at this stage of the proceedings. NW Monitoring’s allegations state a plausible 13 case for misappropriation. For instance, Hollander argues that even if she created user accounts 14 associated with a “4319 Consulting” domain, NW Monitoring cannot allege that she actually 15 accessed the information on its protected computer systems. Dkt. #22 at 8. But the facts alleged 16 lead to the inference that Hollander and Wolfe each believed NW Monitoring’s trade secrets 17 would be beneficial to their work for Parkinson Defendants and accessed the trade secrets to the 18 benefit of Parkinson Defendants. Further, NW Monitoring alleges that Hollander accessed 19 customer pricing information, emailed NW Monitoring customers to explain “how the 20 relationship would work” once she was working for Parkinson Defendants, and succeed in having 21 two of NW Monitoring’s existing customers become Parkinson Defendants’ customers. Dkt. #1 22 at ¶¶ 5.2, 5.3 16.2–16.8, 20.5.f. These allegations give rise to the reasonable inference that 23 Hollander’s knowledge of NW Monitoring’s customer pricing was able to offer existing NW 24 Monitoring customers a more attractive pricing model with 4319 Consulting. ORDER – 8 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 9 of 21 1 Lastly, the Court finds that NW Monitoring’s allegations are sufficient to state a plausible 2 claim against the Parkinson Defendants despite limited allegations related to Parkinson 3 Defendants’ actions. First, NW Monitoring alleges that the Parkinson Defendants “directly or 4 indirectly aided, assisted, abetted, advised, encouraged, or counseled” both Wolfe and Hollander 5 in their misappropriation of NW Monitoring’s trade secrets. Id. at ¶¶ 6.5, 6.9. These allegations 6 strike the Court as somewhat conclusory and are based upon information and belief, but the 7 allegations are sufficient in light of NW Monitoring’s additional allegations. See nexTUNE, Inc. 8 v. McKinney, Case No. 12-cv-1974-TSZ, 2013 WL 5211778, at *3 (W.D. Wash. Sept. 17, 2013) 9 (information and belief allegations can support misappropriation where additional facts support 10 adequate inferences). Here, NW Monitoring does not allege only that Parkinson Defendants 11 hired Wolfe and Hollander. 12 “involvement in this case extends no further than a business hiring a new employee”). Instead, 13 NW Monitoring alleges that Wolfe was performing credentialing work for Parkinson Defendants 14 at the time she was emailing trade secret information to her personal email address and that at 15 least part of the actions taken were at the direction of the Parkinson Defendants. Dkt. #1 at 16 ¶¶ 20.5.c, .h. This clear instance, combined with additional allegations related to Hollander’s 17 actions on behalf of Parkinson Defendants, gives rise to the reasonable inference that Hollander’s 18 and Wolfe’s actions were similarly taken at the direction of Parkinson Defendants and for their 19 benefit. The Court finds the NW Monitoring’s trade secret claims plausible. C.f. Dkt. #13 at 6 (asserting that Parkinson Defendants’ 20 3. Conspiracy (Counts 2 and 10) 21 The Court finds, however, that NW Monitoring has failed to adequately state a claim for 22 conspiracy to misappropriate trade secrets. While definitive answers are lacking, the weight of 23 authority tips against the viability of conspiracy claims based on misappropriation of trade secrets 24 under the DTSA. See Genentech, Inc. v. JHL Biotech, Inc., Case No. 18-cv-06582-WHA, 2019 ORDER – 9 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 10 of 21 1 WL 1045911, at *12 (N.D. Cal. Mar. 5, 2019) (agreeing that 18 U.S.C. § 1832(a)(5), which 2 criminalizes conspiracy to violate the DTSA, does not provide a private right of action) (citing 3 Steves & Sons, Inc. v. JELD-WEN, Inc., 271 F. Supp. 3d 835, 840–44 (E.D. Va. 2017) (same)). 4 Similarly, the prevailing view is that the WUTSA preempts any common law claims for 5 conspiracy to misappropriate trade secrets. See Inteum Co., LLC v. Nat’l Univ. of Singapore, 6 Case No. 17-cv-1252-JCC, 2018 WL 2317606, at *2 (W.D. Wash. May 22, 2018). In Inteum 7 Co. the Court noted “strong” and “weak” forms of preemption and that this Court has “predicted 8 that the Washington Supreme Court would embrace [the strong] approach.” Id. (citing T-Mobile 9 USA, Inc. v. Huawei Device USA, Inc., 115 F. Supp. 3d 1184, 1199 (W.D. Wash. 2015) 10 (collecting cases applying Washington law); Int’l Paper Co. v. Stuit, Case No. 11-cv-2139-JLR, 11 slip op. at 8 (W.D. Wash. May 21, 2012) (“the weight of authority has tipped away from” the 12 view that common law claims are not preempted if the claims require additional elements)). 13 Under the applicable “strong” form, “a plaintiff ‘may not rely on acts that constitute trade secret 14 misappropriation to support [another cause] of action’ even if it requires proof of additional 15 elements.” Inteum Co., LLC, 2018 WL 2317606, at *2 (quoting T-Mobile USA, Inc., 115 F. 16 Supp. 3d at 1198) (citing Thola v. Henschell, 164 P.3d 524, 530 (Wash. Ct. App. 2007)). Plaintiff 17 does not allege facts separately supporting a conspiracy to misappropriate trade secrets and the 18 claim is therefore preempted by the WUTSA. The Court dismisses both conspiracy claims. 19 C. Computer Fraud and Abuse Claims (Counts 3–6) 20 As an initial matter, NW Monitoring does not specify which subsection of 18 U.S.C. 21 § 1030(a) it proceeds under.10 Regardless, the United States Court of Appeals for the Ninth 22 Circuit has succinctly summarized the portions of the CFAA most likely to apply: 23 10 24 Paragraph 8.2 of NW Monitoring’s complaint appears to track 18 U.S.C. § 1030(a)(2)(C). Paragraph 8.3 of NW Monitoring’s complaint appears to track 18 U.S.C. § 1030(a)(4). ORDER – 10 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 11 of 21 1 2 3 4 5 6 7 The CFAA prohibits acts of computer trespass by those who are not authorized users or who exceed authorized use. It creates criminal and civil liability for whoever “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer.” 18 U.S.C. § 1030(a)(2)(C). “The statute thus provides two ways of committing the crime of improperly accessing a protected computer: (1) obtaining access without authorization; and (2) obtaining access with authorization but then using that access improperly.” Musacchio v. United States, [577 U.S. 237, 239] (2016). The CFAA provides a private right of action for “[a]ny person who suffers damage or loss by reason of a violation of this section.” 18 U.S.C. § 1030(g). Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1065–66 (9th Cir. 2016). 8 Under this framework, NW Monitoring’s CFAA claims against both Wolfe and 9 Hollander fail. First, NW Monitoring does not allege—beyond conclusory assertions—that 10 Wolfe and Hollander lacked authorization to access NW Monitoring’s computers. hiQ Labs, Inc. 11 v. LinkedIn Corp., 938 F.3d 985, 999–1000 (9th Cir. 2019) (“We have held in another context 12 that the phrase ‘“without authorization” is a non-technical term that, given its plain and ordinary 13 meaning, means accessing a protected computer without permission.’”) (quoting Nosal II, 844 14 F.3d at 1028–29). While NW Monitoring argues that any authorization ceased because Wolfe 15 and Hollander were “working for” Parkinson Defendants at the time of access, Dkt. #19 at 26– 16 27, the law requires express revocation of previously granted authorization. Facebook, Inc. v. 17 Power Ventures, Inc., 844 F.3d 1058, 1066 (9th Cir. 2016) (one authorized to access a computer 18 subsequently accesses the computer “without authorization” only “when the employer has 19 rescinded permission to access the computer and the defendant uses the computer anyway”) 20 (citations omitted); see also Domain Name Comm’n Ltd. v. DomainTools, LLC, 449 F. Supp. 3d 21 1024, 1029 (W.D. Wash. 2020) (“Permission or authorization to access a computer does not 22 evaporate simply because the user has violated a duty owed to the owner of the computer.”) 23 (citing LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1134–35 (9th Cir. 2009)). 24 ORDER – 11 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 12 of 21 1 Second, NW Monitoring does not state a claim under the CFAA by alleging that Wolfe 2 or Hollander exceeded their authorized access. The Ninth Circuit has explained that the “exceeds 3 authorization” prong of the CFAA applies to individuals “whose initial access to a computer is 4 authorized but who access unauthorized information or files.” DomainTools, 449 F. Supp. 3d at 5 1029 (citing United States v. Nosal, 676 F.3d 854, 858 (9th Cir. 2012) (“Nosal I”)).11 In so 6 concluding, the Ninth Circuit held that the CFAA does not target the “misuse or 7 misappropriation” of information. Nosal I, 676 F.3d at 858 (quoting Shamrock Foods Co. v. 8 Gast, 535 F. Supp. 2d 962, 965 (D. Ariz. 2008)). Because NW Monitoring does not allege that 9 Wolfe of Hollander accessed information they were not authorized to access, its claims under the 10 CFAA against Wolfe and Hollander fail and are dismissed. 11 The Court further concludes that NW Monitoring’s CFAA allegations as to Parkinson 12 Defendants must fail. NW Monitoring does not point to any authority showing that Parkinson 13 Defendants may be held liable for unauthorized access based on incidences of authorized access 14 by Wolfe and Hollander. NW Monitoring does broadly allege that Parkinson Defendants 15 accessed its computer systems without authorization. See Dkt. #1 at ¶ 8.2. However, NW 16 Monitoring does not plead additional facts to make it plausible as opposed to merely possible 17 that Parkinson Defendants themselves accessed NW Monitoring’s computer system. This 18 contrasts directly with NW Monitoring’s additional allegations allowing the Court to infer that 19 Wolfe and Hollander were working with or on behalf of Parkinson Defendants in 20 misappropriating trade secrets. The Court dismisses the claims. 21 22 23 24 11 Plaintiff cites to Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121 (W.D. Wash. 2000), to support its argument that Wolfe and Hollander can be considered “secret agents” of Parkinson Defendants, making their access unauthorized. Dkt. #19 at 26 n.46. But Shurgard clearly conflicts with later Ninth Circuit opinions, calling into question its reasoning and its value as precedent. ORDER – 12 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 13 of 21 1 Lastly, NW Monitoring’s conspiracy claims fail in regard to its CFAA allegations 2 because it has failed to adequately allege an actionable underlying act or claim under the CFAA. 3 See Nw. Laborers-Emps. Health & Sec. Tr. Fund v. Philip Morris, Inc., 58 F. Supp. 2d 1211, 4 1216 (W.D. Wash. 1999) (“In Washington . . . a civil conspiracy claim must be premised on 5 underlying ‘actionable wrongs,’ ‘overt acts,’ or a ‘tort working damage to the plaintiffs. A 6 conspiracy claim fails if the underlying act or claim is not actionable.”) (citations omitted). NW 7 Monitoring’s conspiracy claims premised on violations of CFAA are dismissed. 8 D. RICO Claims (Counts 7–8) 9 Defendants argue persuasively against the sufficiency of NW Monitoring’s RICO claims 10 while NW Monitoring provides little in defense of the claims. To successfully state a claim under 11 RICO, a plaintiff must allege “(1) conduct (2) of an enterprise (3) through a pattern (4) of 12 racketeering activity (known as ‘predicate acts’) (5) causing injury to the plaintiff’s ‘business or 13 property.’” Grimmet v. Brown, 75 F.3d 506, 510 (9th Cir. 1996) (citing 18 U.S.C. §§ 1964(c), 14 1962(c)). Several deficiencies plague NW Monitoring’s RICO claims. 15 First, NW Monitoring does not adequately allege the existence of an enterprise. See U.S. 16 v. Turkette, 452 U.S. 576, 583 (1981) (noting that an “enterprise” is an entity or “group of persons 17 associated together for a common purpose of engaging in a course of conduct”); Dkt. #1 at ¶ 12.2 18 (merely alleging that defendants “were associated with an enterprise”). The Court can infer that 19 NW Monitoring intends for the defendants to collectively form the enterprise. But an enterprise 20 must have more, including “a purpose, relationships among those associated with the enterprise, 21 and longevity sufficient to permit these associates to pursue the enterprise’s purpose.” Boyle v. 22 United States, 556 U.S. 938, 946 (2009). More importantly, the enterprise must be “an entity 23 separate and apart from the pattern of activity in which it engages.” Turkette, 452 U.S. at 583. 24 Here, NW Monitoring appears to do nothing but allege that the enterprise is the association of ORDER – 13 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 14 of 21 1 individuals involved in the predicate acts. The complaint’s simplified allegations are not 2 sufficient to state a claim under RICO. 3 Second, the Court also notes that NW Monitoring failed to adequately allege a pattern of 4 racketeering activity. “[T]he term ‘pattern’ itself requires the showing of a relationship between 5 the predicates and of the threat of continuing activity.” Howard v. Am. Online Inc., 208 F.3d 6 741, 746 (9th Cir. 2000) (quoting H.J., Inc. v. Northwestern Bell Tel. Co., 492 U.S. 229, 239 7 (1989)). Quite simply, “[a]ctivity that lasts only a few months is not sufficiently continuous.” 8 Id. at 750 (citing Allwaste, Inc. v. Hecht, 65 F.3d 1523, 1528 (9th Cir.1995); Religious Tech. Ctr. 9 v. Wollersheim, 971 F.2d 364, 366 n.4 (9th Cir.1992)). NW Monitoring’s RICO claims also fail 10 on this deficiency. 11 These readily identifiable pleading deficiencies, in concert with the additional reasons 12 detailed in defendants’ motions,12 require dismissal of NW Monitoring’s RICO claims. Because 13 the underlying RICO claims fail, the Parkinson Defendants note, NW Monitoring is also 14 precluded from alleging a conspiracy to violate RICO. See Dkt. #13 at 16 n.7 (citing Howard, 15 208 F.3d at 751 (“Plaintiffs cannot claim that a conspiracy to violate RICO existed if they do not 16 adequately plead a substantive violation of RICO.”)). 17 Perhaps recognizing the deficiencies, NW Monitoring does little to support its claims on 18 defendants’ motions to dismiss. See Dkt. #19 at 27–28 (single paragraph merely reasserting 19 complaints allegations and arguing, without legal support, that the allegations are sufficient). The 20 Court additionally takes the lack of substantive response as an admission that defendants’ 21 motions have merit. See LOCAL RULES W.D. WASH. LCR 7(b)(2) (“Except for motions for 22 summary judgment, if a party fails to file papers in opposition to a motion, such failure may be 23 24 12 See Dkt. #13 at 14–16; Dkt. #16 at 7. ORDER – 14 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 15 of 21 1 considered by the court as an admission that the motion has merit.”). NW Monitoring’s RICO 2 claims are accordingly dismissed with prejudice. 3 E. Tortious Interference Claims and Conspiracies (Counts 11–14, and 19–22) 4 NW Monitoring alleges that some or all of the defendants interfered with its contracts 5 with its existing customers, business expectancies, and its employee contracts. Parkinson 6 Defendants and Wolfe seek dismissal of NW Monitoring’s claims.13 See Dkt. #16 at 4. Under 7 Washington law, NW Monitoring’s tortious interference claims require: 10 (1) the existence of a valid contractual relationship or business expectancy; (2) that defendants had knowledge of that relationship; (3) an intentional interference inducing or causing a breach or termination of the relationship or expectancy; (4) that defendants interfered for an improper purpose or used improper means; and (5) resultant damage. 11 Pac. Nw. Shooting Park Ass’n v. City of Sequim, 158 Wash. 2d 342, 351, 144 P.3d 276, 280 12 (2006) (quoting Leingang v. Pierce County Med. Bureau, Inc., 131 Wash. 2d 133, 157, 930 P.2d 13 288 (1997)). The Court addresses each category of claim in turn. 8 9 14 1. Interference with Existing Customers (Count 11) 15 NW Monitoring first alleges that all defendants tortiously interfered with its contractual 16 relationships with The Neuromonitoring Group and The Phoenix (the “Existing Customers”) to 17 provide intraoperative oversight services. Dkt. #1 at ¶¶ 16.2–16.3. The Court first notes that 18 NW Monitoring baldly alleges, in a conclusory fashion, the elements of a tortious interference 19 claim. Id. at ¶¶ 16.2–16.7. Nevertheless, Plaintiff incorporates, and the Court is to consider, the 20 additional allegations of the complaint and provides additional detail. Most relevant here are 21 NW Monitoring’s allegations that Hollander first agreed to employment with 4913 Consulting 22 13 23 24 Because Wolfe has not made any individualized arguments as to why NW Monitoring’s claims fail to state a claim against her, the Court is unable to conclude that NW Monitoring fails to state its various tortious interference claims as to Wolfe. Unless otherwise noted, the Court denies dismissal of the claims against Wolfe. ORDER – 15 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 16 of 21 1 and then, while still working for NW Monitoring, used her NW Monitoring account to email the 2 Parkinson Defendants and the Existing Customers to discuss their transition to 4319 Consulting. 3 Id. at ¶ 20.5.f. These allegations give rise to the clear inference that prior communications among 4 these parties had occurred, that an agreement was likely already in place for the transfer of 5 business to 4319 Consulting, and that Parkinson Defendants were involved or aware of 6 Hollander’s interactions. 7 In light of the stage of the litigation, the Court again finds the allegations sufficient to 8 state a claim. Plaintiff’s allegations give rise to the inference that Parkinson Defendants and 9 Hollander discussed the possibility that Hollander could attract customers to leave NW 10 Monitoring and begin working with 4319 Consulting in the course of their employment 11 negotiations. Further, it is reasonable to infer that Parkinson Defendants’ involvement in 12 Hollander’s actions was intentional as Hollander performed the work for the benefit of Parkinson 13 Defendants prior to the beginning of her work for Parkinson Defendants. More detailed 14 determinations, such as intent, may wait for later stages of this proceeding. The Court declines 15 the request to dismiss this claim. 16 2. Business Expectancies (Count 13) 17 NW Monitoring also alleges that Hollander and Parkinson Defendants tortiously 18 interfered with its business expectancies associated with potential customers Neuro Alert and 19 Spine-Tek (the “Business Expectancies”). Id. at ¶¶ 18.1–18.7. Upon consideration, the Court 20 finds the allegations sufficient to state a claim. 21 Similar to the existing customers claims, the timing of events gives rise to inferences 22 supporting NW Monitoring’s business expectancy claims. Hollander received inquiry from the 23 Business Expectancies in 2019 about the Business Expectancies’ desire to work with NW 24 Monitoring. ORDER – 16 Id. at ¶ 18.2. Hollander did not disclose these potential customers to NW Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 17 of 21 1 Monitoring. Id. at ¶ 18.4. Then, after agreeing to work for 4319 Consulting and providing NW 2 Monitoring a letter or resignation, Hollander emailed the Business Expectancies and Parkinson 3 Defendants to solicit the Business Expectancies to become customers of 4319 Consulting. Id. at 4 ¶¶ 18.4–18.5. 5 3. Contractual Relationships (Counts 19 and 21) 6 NW Monitoring alleges that Parkinson Defendants similarly joined with Wolfe to 7 intentionally interfere with Hollander’s employment contract and with Hollander to intentionally 8 interfere with Wolfe’s employment contract. 9 consideration, the Court finds the allegations sufficient to state a claim and denies dismissal. Id. at ¶¶ 24.1–24.9, 26.1–26.9. Upon 10 Once again, NW Monitoring’s allegations give rise to inferences adequately supporting 11 its claims at this stage. Here, and with regards to Hollander, Hollander no doubt knew of her 12 contractual obligations and discussed the issue with Parkinson. NW Monitoring further alleges 13 that Hollander and Parkinson Defendants conspired to interfere with its business customers and 14 convert them to customers of Parkinson Defendants. This gives rise to an inference of improper 15 motive sufficient to state a claim at this stage of the proceedings.14 Similarly, NW Monitoring’s 16 allegations related to Wolfe’s employment contract are likewise sufficient at this stage. 17 4. Conspiracy (Counts 12, 14, 20, and 22) 18 A claim for civil conspiracy requires that a plaintiff prove, “by clear, cogent and 19 convincing evidence that (1) two or more people combined to accomplish an unlawful purpose, 20 or combined to accomplish a lawful purpose by unlawful means; and (2) the conspirators entered 21 into an agreement to accomplish the object of the conspiracy.” Wilson v. State, 84 Wash. App. 22 23 14 24 NW Monitoring’s allegations as to Wolfe’s involvement are perhaps lacking, but Wolfe has not submitted argument specific to the allegations against her. ORDER – 17 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 18 of 21 1 332, 350–51, 929 P.2d 448, 459 (1996) (citing Corbit v. J.I. Case Co., 70 Wash.2d 522, 528–29, 2 424 P.2d 290 (1967)). 3 Here, the Court concludes that NW Monitoring adequately pleads concurrent conspiracy 4 claims related to the tortious interference with NW Monitoring’s Existing Customers and 5 Business Expectancies. Parkinson Defendants are certainly correct that NW Monitoring’s 6 conspiracy claims are stated in broad and conclusory allegations. See Dkt. #1 at ¶¶ 17.2–17.3, 7 19.2–19.3. These allegations would be insufficient on their own. However, when they are read 8 in the context of the complaint, NW Monitoring’s additional allegations support inferences 9 sufficient to adequately state a claim. 10 One can infer that Parkinson Defendants conspired, with at least Hollander, to tortiously 11 interfere with NW Monitoring’s Existing Customers and Business Expectancies. Again, the 12 timing of Hollander’s agreement to work with 4319 Consulting and events giving rise to NW 13 Monitoring’s tortious interference claim support the inference that the matters were discussed as 14 Parkinson Defendants and Hollander negotiated Hollander’s employment for 4319 Consulting. 15 When the events of the tortious interference then occurred, the Court reasonably infers that 16 Parkinson Defendants and Hollander jointly agreed to pursue the course of conduct. Of course, 17 the evidence may ultimately demonstrate otherwise, but NW Monitoring’s claims are sufficiently 18 stated and are not dismissed. 19 F. Breach of Loyalty Claims (Counts 15 and 16) 20 With regard to NW Monitoring’s claims that Parkinson Defendants violated duties of 21 loyalty owed by Wolfe and Hollander, the Court finds the allegations overly speculative. NW 22 Monitoring asserts that Parkinson Defendants and Wolfe “directly or indirectly aided, assisted, 23 abetted, advised, encouraged, or counseled Hollander in breaching her duty of loyalty.” Dkt. #1 24 at ¶ 20.6. Whatever is made of NW Monitoring’s allegations, they do not establish a clear theory ORDER – 18 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 19 of 21 1 upon which Parkinson Defendants can be held liable for Wolfe’s and Hollander’s alleged 2 breaches of their duties of loyalty to NW Monitoring. Conversely, Parkinson Defendants cite to 3 authority indicating that a claim for “aiding and abetting” a breach of a fiduciary duty must be 4 set forth separately from the underlying claim related to the breach. See Dkt. #13 at 20 (citing 5 In re Washington Mut., Inc. Sec., Derivative & ERISA Litig., Case No. 08-md-1919-MJP, 2010 6 WL 1734848, at *8 (W.D. Wash. Apr. 28, 2010) (“Plaintiffs have not pleaded a separate claim 7 for aiding and abetting [a breach of fiduciary duties]. This alone is fatal.”)). In the same manner, 8 NW Monitoring does not establish that Wolfe may be held liable for Hollander’s alleged breach 9 of her duty of loyalty. Accordingly, the Court dismisses these claims as to Parkinson Defendants 10 and, as to Wolfe, dismisses NW Monitoring’s claims based on a breach of Hollander’s duty of 11 loyalty. 12 G. Breach of Contract Claims (Counts 17 and 18) 13 No party has sought dismissal of Counts 17 and 18, related to Wolfe and Hollander 14 breaching their individual employment contracts, as Parkinson Defendants are not included in 15 those claims. 16 H. Leave to Amend 17 In closing, NW Monitoring requests that “[i]f Defendants’ motions are not denied in their 18 entirety, Plaintiff requests that it be granted leave to amend.” Dkt. #19 at 32. Where a complaint 19 is dismissed for failure to state a claim, “leave to amend should be granted unless the court 20 determines that the allegation of other facts consistent with the challenged pleading could not 21 possibly cure the deficiency.” Schreiber Distrib. Co. v. Serv-Well Furniture Co., 806 F.2d 1393, 22 1401 (9th Cir. 1986). The Court finds on the whole that NW Monitoring may be able to remedy 23 many of the deficiencies identified in this Order and accordingly grants NW Monitoring leave to 24 amend its complaint. ORDER – 19 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 20 of 21 1 The sole exception is NW Monitoring’s RICO claims. As to those claims, the Court 2 concludes that NW Monitoring has abandoned the claims by failing to respond to the motions to 3 dismiss. The lack of argument as to the sufficiency of those claims leaves the Court without a 4 basis upon which to consider the feasibility of further amendments. The RICO claims are 5 dismissed with prejudice. 6 7 8 IV. CONCLUSION Accordingly, and having reviewed the motions to dismiss, the briefing submitted, and the remainder of the record, the Court finds and ORDERS: 9 1. Defendants Jeffery Parkinson, 4319 Consulting, Inc., and Marital Community of Jeffery 10 Parkinson’s Motion to Dismiss Complaint (Dkt. #13) is GRANTED in part and DENIED 11 in part, consistent with this Order and as set forth below. 12 2. Defendant Hollander’s Motion for Partial Dismissal of Plaintiff’s Complaint & to Join 13 Defendants 4319 Consulting’s and Parkinson’s Motion to Dismiss (Dkt. #16) is 14 GRANTED in part and DENIED in part, consistent with this Order and as set forth below. 15 3. Defendant Wolfe’s Joinder in Defendants Jeffery Parkinson, 4319 Consulting Inc., and 16 Marital Community of Jeffery Parkinson’s Motion to Dismiss Complaint (Dkt. #17), to 17 the extent necessary, is GRANTED. 18 19 20 4. Defendant Wolfe’s Joinder in Defendant Hollander’s Motion for Partial Dismissal of Plaintiff’s Complaint (Dkt. #18), to the extent necessary, is GRANTED. 5. As set forth in this Order, the following claims are DISMISSED: 21 Counts 2, 3, 4, 5, and 6 are DISMISSED without prejudice as to all defendants. 22 Counts 7 and 8 are DISMISSED with prejudice. 23 Count 10 is DISMISSED without prejudice. 24 ORDER – 20 Case 3:20-cv-05572-RSM Document 26 Filed 04/15/21 Page 21 of 21 1 2 3 4 5 Count 15 is DISMISSED without prejudice as to Defendant Charlene Wolfe, Defendant 4319 Consulting, Inc., and Defendant Jeffery D. Parkinson. Count 16 is DISMISSED without prejudice as to Defendant 4319 Consulting, Inc., and Defendant Jeffery D. Parkinson. 6. Plaintiff NW Monitoring LLC is GRANTED leave to amend its complaint no later than 6 (21) days from the date of this Order. 7 Dated this 15th day of April, 2021. 8 9 10 A 11 RICARDO S. MARTINEZ CHIEF UNITED STATES DISTRICT JUDGE 12 13 14 15 16 17 18 19 20 21 22 23 24 ORDER – 21

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.