MSCI Inc. v Jacob

Annotate this Case
[*1] MSCI Inc. v Jacob 2012 NY Slip Op 22110 Decided on April 20, 2012 Supreme Court, New York County Kornreich, J. Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431. This opinion is uncorrected and subject to revision before publication in the printed Official Reports.

Decided on April 20, 2012
Supreme Court, New York County

MSCI Inc., Financial Engineering Associates, Inc., RiskMetrics Group, Inc., and RiskMetrics Solutions, Inc., Plaintiffs,

against

Philip Jacob, Axioma, Inc. and John Does I-X and XYZ Corporation, Defendants.



651451/2011



For Plaintiffs: Todd E. Soloway; Lisa M. Buckley; Mona Simonian (Pryor Cashman)

For Defendant Axioma: David P. Kasakove (Bryan Cave)

For Defendant Jacob: Lance J. Gotko (Friedman Kaplan)

Shirley Werner Kornreich, J.



This action arises from an alleged misappropriation of trade secrets. Plaintiffs offer sophisticated computer software to clients who participate in the global financial market. Defendant Philip Jacob worked for plaintiffs. Defendant Axioma, Inc., is Jacob's new employer.

As a result of the allegations, discovery has centered on computer source codes and their components and sequencing. Essential to discovery, is what portion of plaintiffs' source codes are trade secrets and, of course, what portion of those trade secrets were or were not misappropriated by either or both defendants. Per the court's March 29, 2012 Order, the parties submitted simultaneous 6-page letters with exhibits, on the issue of "whether the plaintiff has to affirmatively identify its trade secrets at this juncture or is it sufficient to identify the components [of the source codes] not claimed to be trade secrets."[FN1] The court had previously made a ruling on the issue, early in the discovery process. The issue arose at a discovery conference and was not briefed. That ruling is the subject of the letters.

I.Plaintiffs' Position

Plaintiff argues that, on November 21, 2011, the court ruled that the plaintiff could identify what parts of its source codes underlying three technologies - Risk Server, PnP and Structure Tool - are claimed to be trade secrets by identifying those aspects not claimed to be trade secrets. The court ordered plaintiffs to supplement their responses to defendants' interrogatories by providing a list of source code components: (i) that are covered by third party licenses; (ii) that are in the public domain; or (iii) over which plaintiffs do not claim trade secret [*2]status. See plaintiffs' April 9, 2012 letter, Ex. B.

Plaintiffs maintain that this is a practical and cost effective solution to meet their burden of trade secret identification, is legally sufficient, and reflects the court's intent to move the case forward. Plaintiffs also assert that defendants request to modify the November 21, 2011 Order is untimely and would put discovery back four months. Plaintiffs further contend that their identification of the entirety of the source code in their interrogatory responses as a trade secret, is adequate because the source code underlying their products constitutes a compilation and sequencing of component parts. In support of this position, plaintiffs rely on a number of cases — almost none of which squarely address the issue.[FN2] See plaintiffs' April 9, 2012 letter, at 5.

For example, plaintiffs' reliance on Member Servs., Inc. v Security Mut. Life Ins. Co., 2010 WL 3907489, *9 (ND NY 2011), a case where the plaintiffs asserted that their trade secret was the entire combination, is misplaced. That is because here, plaintiffs' not only claim that the "entirety" of the source code is a trade secret, but admit parts of the codes are in the public domain and parts are licensed. Plaintiffs claim that (i) component parts are trade secrets; (ii) "certain detailsof the specific implementation . . . constitute trade secrets"; and (iii) the knowledge obtained by defendant Philip Jacob during his employment with plaintiffs, including the specific pitfalls or development strategies to avoid,is inevitably benefitting Axioma and allowing it to develop its product more quickly and efficiently.[FN3] See defendants' April 9, 2012 letter, at 3.

II.Defendant's Position

Defendants argue, and the court agrees, that it did not intend its November 21, 2011 ruling to be the final word on the subject. Upon consideration of the case law cited by plaintiffs,[FN4] the court is persuaded that the law requires that a trade secret plaintiff identify trade secrets with reasonable particularity early in the case.[FN5] See Xerox Corp. v IBM Corp., 64 FRD 367, 371 (SD NY 1974) ("[t]he burden is upon the plaintiff to specify [the alleged trade secrets], not upon the defendant to guess at what they are . . . Clearly until this is done, neither the court nor the parties can know, with any degree of certainty, whether discovery is relevant or not; and it is doubtful [*3]whether [defendant] can undertake a meaningful discovery program ...."). Only by distinguishing between the general knowledge in their field and their trade secrets, will the court be capable of setting the parameters of discovery and will defendants be able to prepare their defense.

Here, plaintiffs' misappropriation claim alleges a number of different trade secrets beyond its compilation theory. Plaintiffs who have brought this action, bear the burden of proving their allegations. Merely providing defendants with plaintiffs' "reference library" to establish what portions of their source code are in the public domain shifts the burden to defendants to clarify plaintiffs' claim. See Sit-Up Ltd. v IAC/Interactive Corp., 2008 WL 463884 (ordering plaintiff to identify its trade secrets within 40 days and stating that plaintiffs "have to be able to identify with specificity what information they consider to have been a trade secret . . . If the plaintiff can't do that now, it can't proceed on that theory, because the defendants have a right during discovery to test whatever the plaintiff's theory is . . .Plaintiff is the only one who can know what it believes its trade secrets are. . . . And it is unfair to ... the defendants to conduct discovery without knowing what the assertions are."). Id. at *6-7; see also 3 Milgram on Trade Secrets § 14.02 (2011) ("it is essentially necessary for a plaintiff to identify its trade secrets before the defendant proceeds with disclosure of its confidential information"). Additionally, the disclosure does not enlighten either defendants or the court as to what sequencing of publicly known components or licensed components, are trade secrets. Hence, it is insufficient.

Moreover, it would be unfair to allow plaintiffs to discover Axioma's trade secrets prior to revealing their own. Should defendants remain in the dark as to the explicit portions of the source codes that plaintiffs deem to be trade secrets misappropriated by defendants, plaintiffs, once privy to Axioma's source codes, could tailor their theory of misappropriation to Axioma's work.

Indeed, Axioma's work could be misappropriated. For this reason, plaintiffs are precluded from seeking further discovery from defendants until they identify, with reasonable particularity, which of the component parts or sequencing of their source code are not (1) publicly available information, (2) commonly-used algorithms, or (3) third-party licensing. Plaintiffs shall further supplement its "paths not taken" response to defendants' interrogatory requests.

The court is not insensitive to the costs of its order. However, discovery in this age of electronically stored information and, thus litigation, has become an exceedingly expensive venture. This is even more the case, when the subject of the action is computer software and programming. Accordingly, it is

ORDERED that plaintiffs are to identify to defendants, on or before June 8, 2012, the trade secret components of their source code.

Dated: April 20, 2012ENTER:

_____________________________

J.S.C. Footnotes

Footnote 1: In reaching its decision, the court did not consider the attorney affidavit or the expert affidavit submitted by defendants as exhibits to their letter.

Footnote 2: For example, in Insite Servs. Corp., LLC v American Electric Power Co., 287 BR 79, 89-90 (Bankr SD NY 2002), the court, in assessing the sufficiency of the claim at the motion to dismiss stage, found that, giving the plaintiff the benefit of all favorable inferences, the identification in the complaint sufficed for the claim to survive. This is clearly not the posture of, or the standard to be followed, in discovery.

Footnote 3: Jacob is not bound by a non-compete agreement.

Footnote 4: See plaintiffs' letter, at 4 n 5 (gathering cases, treatises and a February 16, 2010 New York Law Journal article).

Footnote 5: At least one state, California, has already adopted legislation codifying this requirement. See Cal Code Civ Proc § 2019.210 (in action alleging misappropriation of trade secret, before commencing discovery, party alleging misappropriation must identify trade secret with reasonable particularity).



Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.