Food Services of America Incorporated v. Carrington et al, No. 2:2012cv00175 - Document 144 (D. Ariz. 2013)

Court Description: ORDER granting in part and denying in part 105 Plaintiff's Motion for Partial Summary Judgment; denying 109 Defendants' Motion for Summary Judgment; granting in part and denying in part 111 Plaintiff's Motion for Sanctions; grant ing in part and denying in part 134 Defendant's Motion to Strike and Preclude Plaintiff's Untimely Expert Disclosures. The Court awards $500 for attorneys' fees and costs incurred by Plaintiff in bringing its Motion for Sanctio ns. The declarations (Doc. 111-1, Ex. B(Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta Decl.)), are stricken only to the extent that they contain new expert disclosures and not in their entirety (please see attached order for complete information). Signed by Judge G Murray Snow on 8/23/13.(TLJ)

Download PDF
Food Services of America Incorporated v. Carrington et al 1 Doc. 144 WO 2 3 4 5 6 IN THE UNITED STATES DISTRICT COURT 7 FOR THE DISTRICT OF ARIZONA 8 9 Food Services of America, Inc., a Delaware Corporation ORDER 10 11 12 13 No. CV-12-00175-PHX-GMS Plaintiff, v. Paul Carrington; et. al. Defendants. 14 15 Pending before the Court is Plaintiff’s Motion for Partial Summary Judgment, 16 (Doc. 105), and Motion for Sanctions, (Doc. 111), and Defendants’ Motion for Summary 17 Judgment, (Doc. 109), and Motion to Strike, (Doc. 134). For the reasons discussed below, 18 Plaintiff’s Motion for Partial Summary Judgment is granted in part and denied in part, its 19 Motion for Sanctions is granted in part and denied in part, Defendants’ Motion for 20 Summary Judgment is denied, and their Motion to Strike is granted. 21 BACKGROUND 22 This case involves an employer’s claims of misappropriation of trade secrets 23 against former employees. Plaintiff Food Services of America (“FSA”) is a national 24 distributor that wholesales food products to operators such as restaurants and schools. 25 (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 14.) Defendant Paul Carrington began his 26 employment with FSA as a Supplier Information Specialist (“SIS”) in September 2008. 27 (Doc. 106, PSOF ¶ 2.) Defendant Elba Rubio had previously joined FSA in May 2008 28 and was also an SIS at the time of her termination. (Id. ¶ 3.) Dockets.Justia.com 1 As employees of FSA, Defendants received new hire orientation and materials. 2 (Id. ¶¶ 4–5.) Among those materials were an FSA Handbook and Arbitration Agreement 3 that Defendants acknowledged and signed. (Id. ¶¶ 5–6, 10–12.) The Parties dispute 4 whether Defendants were also provided with and signed a Confidentiality Agreement. 5 (Id. ¶¶ 7–8; Doc. 115, DSOF ¶¶ 7–8.) All three documents included provisions regarding 6 the confidentiality of FSA information and the duty of all FSA employees to keep such 7 information secret. (Doc. 106, PSOF ¶¶ 6, 9, 12.) 8 Defendants were granted access to FSA information so they could use it as SISs in 9 their dealings with suppliers, customers, and internal personnel. (Id. ¶ 13.) That 10 information included the following: (1) manufacturer and UPC codes; (2) vendor, 11 customer, and FSA employee contacts and information; (3) product brands, descriptions, 12 and formulae; (4) product cost, pricing, and rebates; (5) product purchase and sales 13 volume; and (6) FSA business strategies. (Id.) FSA information is accessible only 14 through its closed and secure system. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 23.) Access 15 is restricted to those who have passes and electronic passwords which are granted to 16 employees who need to use the information to perform their job functions. (Id.) 17 On March 4, 2011, FSA terminated Rubio’s employment for gross misconduct. 18 (Doc. 106, PSOF ¶ 14.) Consistent with its policy regarding terminated employees, upon 19 termination, Rubio’s access to FSA’s system was cancelled. (Id. ¶ 15.) As of the close of 20 the business on March 4, Defendants knew that Rubio was no longer authorized to access 21 FSA’s system or its information. (Id. ¶ 16.) That evening, Defendants agreed to have 22 Carrington forward specific FSA information to his and Rubio’s personal e-mail accounts 23 from FSA’s system. (Id. ¶ 17.) 24 On March 5, 2011, Carrington went to FSA’s offices when he was not scheduled 25 to work, and obtained access to FSA’s system. (Id. ¶¶ 18–19.) That weekend, Carrington 26 sent approximately 300 e-mail strings to his and Rubio’s personal e-mail accounts after 27 Defendants mutually selected which strings to send. (Id. ¶ 19.) The e-mails included new 28 item requests and customer product information forms in response to operator/customer -2- 1 inquiries, new product information sheets from suppliers, distribution plans and freight 2 matrices, and letters to specific customers containing product offers. (Docs. 119-1–6, Ex. 3 O.) On March 7, FSA also terminated Carrington’s employment for gross misconduct. 4 (Id. ¶ 23.) 5 FSA sent letters to Defendants on March 8, 2011, demanding the immediate return 6 of electronic or hard copy documents containing FSA information. (Doc. 110, DSOF ¶ 7 10.) Carrington responded on March 14, stating that he no longer possessed FSA 8 information and had deleted any documents he may have had. (Id. ¶ 11.) Rubio did not 9 respond to FSA’s letter. (Id. ¶ 13.) Upon receipt of the letters, Defendants knew that they 10 both possessed information that FSA sought. (Doc. 106, PSOF ¶¶ 27–28.) 11 Months later, FSA investigated Carrington’s FSA account and discovered the e- 12 mails he had sent with FSA information to personal accounts in March 2011. (Doc. 110, 13 DSOF ¶ 19; Doc. 133, PSOF ¶¶ 19–20.) On January 24, 2012 an NLRB trial based on 14 Carrington’s discharge began. FSA’s counsel alleged that it first discovered that 15 Carrington still possessed FSA information and had provided false statements in his 16 response to FSA’s March 8 letter on that first trial day. (Doc. 110, DSOF ¶ 26.) FSA 17 asserts that Carrington provided a disc during the morning recess of the trial which 18 contained the information and alerted FSA to the deception. (Doc. 133, PSOF ¶ 26.) 19 FSA brought this action against Defendants the next day on January 25, 2012. 20 (Doc. 1.) The Complaint alleged the following claims: (1) violation of the Computer 21 Fraud and Abuse Act (“CFAA”); (2) violation of the Arizona Uniform Trade Secrets Act 22 (“AUTSA”); (3) violation of the Arizona Anti-Racketeering Statute; (4) breach of 23 fiduciary duty; (5) conversion; and (6) unjust enrichment. On August 7, 2012, Defendants 24 filed a Motion for Judgment on the Pleadings. (Doc. 32.) The Court granted the Motion 25 as to the CFAA claim but denied it as to the remaining claims. (Doc. 57.) Defendants 26 filed another Motion for Judgment on the Pleadings as to counts three through six on 27 December 2, 2012. (Doc. 72.) The Court granted the Motion and found that FSA’s 28 common law tort claims were preempted by the AUTSA because they were based on the -3- 1 misappropriation of confidential information and not saved by the anti-abrogation clause 2 of the Arizona Constitution. (Doc. 95.) The Court denied Defendants’ Motion for 3 Reconsideration. (Doc. 135.) 4 The Parties now move for summary judgment on FSA’s remaining AUTSA claim. 5 (Docs. 105, 109.) FSA further moves for sanctions against Defendants for spoliation of 6 evidence, (Doc. 111), and Defendants move to strike expert declarations filed in support 7 of FSA’s Motion, (Doc. 134). DISCUSSION 8 9 I. LEGAL STANDARD 10 Summary judgment is appropriate if the evidence, viewed in the light most 11 favorable to the nonmoving party, shows “that there is no genuine issue as to any material 12 fact and that the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(c). 13 Substantive law determines which facts are material and “[o]nly disputes over facts that 14 might affect the outcome of the suit under the governing law will properly preclude the 15 entry of summary judgment.” In addition, the dispute must be genuine, that is, the 16 evidence must be “such that a reasonable jury could return a verdict for the nonmoving 17 party.” Anderson, 477 U.S. at 248. “[A] party seeking summary judgment always bears 18 the initial responsibility of informing the district court of the basis for its motion, and 19 identifying those portions of [the record] which it believes demonstrate the absence of a 20 genuine issue of material fact.” Celotex Corp. v. Catrett, 477 U.S. 317, 323 (1986). 21 Because “[c]redibility determinations, the weighing of the evidence, and the 22 drawing of legitimate inferences from the facts are jury functions, not those of a judge, . . 23 . [t]he evidence of the nonmovant is to be believed, and all justifiable inferences are to be 24 drawn in his favor” at the summary judgment stage. Id. at 255 (citing Adickes v. S.H. 25 Kress & Co., 398 U.S. 144, 158–59 (1970)); Harris v. Itzhaki, 183 F.3d 1043, 1051 (9th 26 Cir. 1999) (“Issues of credibility, including questions of intent, should be left to the 27 jury.”) (internal citations omitted). 28 Further, the party opposing summary judgment “may not rest upon the mere -4- 1 allegations or denials of [the party’s] pleadings, but . . . must set forth specific facts 2 showing that there is a genuine issue for trial.” Fed. R. Civ. P. 56(e); see also LRCiv. 3 1.10(l)(1) (“Any party opposing a motion for summary judgment must . . . set[] forth the 4 specific facts, which the opposing party asserts, including those facts which establish a 5 genuine issue of material fact precluding summary judgment in favor of the moving 6 party.”). If the nonmoving party’s opposition fails to specifically cite to materials either 7 in the court’s record or not in the record, the court is not required to either search the 8 entire record for evidence establishing a genuine issue of material fact or obtain the 9 missing materials. See Carmen v. S.F. Unified Sch. Dist., 237 F.3d 1026, 1028–29 (9th 10 Cir. 2001); Forsberg v. Pac. N.W. Bell Tel. Co., 840 F.2d 1409, 1417–18 (9th Cir. 1988). 11 When parties file cross-motions for summary judgment, “the court must rule on 12 each party’s motion on an individual and separate basis, determining, for each side, 13 whether a judgment may be entered in accordance with the Rule 56 standard.” Fair 14 Housing Council of Riverside County v. Riverside Two, 249 F.3d 1132, 1136 (9th Cir. 15 2001). In fulfilling its duty to review each cross-motion separately, the court must review 16 the evidence submitted in support of each cross-motion. Id. 17 II. MISAPPROPRIATION OF TRADE SECRETS 18 A. 19 Arizona has adopted the Uniform Trade Secrets Act, “which codifies the basic 20 principles of common-law trade-secret protection, to govern the resolution of trade-secret 21 issues.” Enter. Leasing Co. of Phoenix v. Ehmke, 197 Ariz. 144, 148, 3 P.3d 1064, 1068 22 (Ct. App. 1999). Arizona recognizes the Restatement of Torts in the absence of 23 controlling authority for guidance as to misappropriation claims. Id. Under the AUTSA, a 24 plaintiff may recover damages for misappropriation of a trade secret. A.R.S. § 44-401– 25 07. The AUTSA defines “trade secret” as follows: 26 Existence of Trade Secrets 27 (4) “Trade secret” means information, including a formula, pattern, compilation, program, device, method, technique or process, that both: 28 (a) Derives independent economic value, actual or potential, from -5- not being generally known to, and not being readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use. 1 2 3 (b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. 4 5 Id. § 44-401. “The threshold determination whether to protect information as a trade 6 secret therefore depends upon the nature of the information and the circumstances 7 surrounding its secrecy and the maintenance thereof.” Ehmke, 197 Ariz. at 148 (internal 8 citation omitted). The owner of the information has the burden “to establish that the 9 matter is secret . . . [and] that it exercised reasonable care to safeguard the secret.” Id. at 10 150. 11 1. Independent Economic Value 12 To be entitled to trade secret protection, FSA’s information must derive economic 13 value from the fact that it is not generally known to or readily ascertainable by other 14 persons in the industry. See id. at 149 (“Because the hallmark of a trade secret obviously 15 is its secrecy, not only must the subject-matter of the trade secret be secret, it must be of 16 such a nature that it would not occur to persons in the trade or business.”). Matters that 17 are public knowledge, such as those available in trade journals or known to principal 18 trade persons, are not safeguarded as trade secrets. Id. In particular, “when a process or 19 idea is so common or widely known that it lacks all novelty, uniqueness and originality, it 20 necessarily lacks the element of privacy required to make it legally cognizable as 21 a trade secret.” Id. 22 Using an FSA-issued computer, Carrington transmitted FSA information to his 23 and Rubio’s personal e-mail accounts in March 2011.1 (Doc. 106, PSOF ¶¶ 18–19.) The 24 e-mails included internal FSA communications and external FSA communications with 25 operators (FSA’s customers) and suppliers (manufacturers from which FSA purchases 26 1 27 28 Defendants also admit sending an undisclosed number of FSA e-mails to their personal accounts in February 2011 but it is not clear from the record whether they contained trade secret information. (See Doc. 106, PSOF ¶¶ 32–33.) The vast majority of the e-mails were sent by Carrington in March 2011. (Doc. 115, DSOF ¶¶ 32–33.). -6- 1 products). Those communications included the following elements of information: 2 manufacturer and UPC codes, brand names and product specifications, product formulae 3 and pricing strategies, rebates, customer contact information, volumes, and pricing, and 4 vendor contact information and data. (Doc. 106, PSOF ¶¶ 13, 30–31.) Defendants 5 contend that some of that information is readily ascertainable; for example, the 6 manufacturer and UPC codes, brand names and product specifications, vendor and 7 customer contact information are generally known to others in the food service industry. 8 FSA argues that even if some of those elements are readily ascertainable, its information 9 is still entitled to protection as compilations of data. 10 “Although matters of general knowledge cannot be appropriated as secret, a trade 11 secret may consist of a combination of elements even though each individual component 12 may be a matter of common knowledge.” Ehmke, 197 Ariz. at 150 (citing Kewanee Oil 13 Co. v. Bicron Corp., 416 U.S. 470, 475 (1974)). A trade secret may include a compilation 14 in which the individual elements “are in the public domain but there has been 15 accomplished an effective, successful and valuable integration of those public elements 16 such that the owner derives a competitive advantage from it.” Ehmke, 197 Ariz. at 149 17 (internal citation omitted). Thus, the analysis depends on whether the compilation as a 18 whole qualifies as a trade secret. Id. 19 Defendants have submitted under seal the e-mails they transmitted in March 20 2011. (Docs. 119-1–6, Ex. O.) A number of these e-mails contained new item requests in 21 relation to inquiries from FSA’s customers. The e-mails attached customer product 22 information (“CPI”) forms. (Docs. 119-1–3, Ex. O (“Exs. A11, A21”).) The CPI forms 23 included the name of the customer and contact person(s), the manufacturer, detailed 24 description and quantity/volume of the product, the customer price or distributor cost, and 25 the time period for which this information was active. (See id.) Other e-mails attached 26 “new product information sheets” presumably from FSA’s suppliers with similar contact 27 information, product detail and pricing per quantity. (Docs. 119-3, Ex. O (“Ex. A23”).) 28 One of the e-mails is a memo describing FSA’s national distribution plan for selected -7- 1 products sent to its distribution centers. (Id. (“Ex. A21”).) Attached to the memo are 2 spreadsheets containing “freight matrices,” for specific products that list distribution 3 centers and their addresses as well as product price and quantity. (Id.) The e-mails further 4 included letters to individual FSA customers containing product offers with details as to 5 quantity, price, purchasing period, and shipping. (Docs. 119-4, Ex. O (“Ex. A27”).) Also 6 within the e-mails were informal price/quantity quotes for customers with accompanying 7 product images and specifications. (Id. (“Ex. A28”).) 8 FSA sets forth a number of facts about the competitive aspects of its industry, 9 none of which have been contested by Defendants. For example, FSA is a distributor that 10 wholesales various foods and supplies to food service operators, ranging from schools to 11 small restaurant chains. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 14.) Competition among 12 distributors for the business of operators is generally on product price. Because the cost 13 of food and supplies represents a large percentage of their total cost, operators may 14 switch distributors based on slight variations in price. (Id. ¶ 20) (declaring that operators 15 will change distributors “solely because the difference in the negotiated price of ground 16 beef from different distributors is one cent per pound”). Hence, in order to offer lower 17 prices to operators, it is critical that FSA pays lower prices to product suppliers. (Id.) 18 (declaring that “[a] one cent advantage in cost per pound can result in millions of dollars 19 in sales”). Put simply, FSA relies for its competitive advantage on “the products [it] 20 buy[s], who [it] buy[s] them from, who [it] sell[s] them to, what [it] pay[s] for them, and 21 what [it] sell[s] them for.” (Id. ¶ 25.) 22 FSA’s representatives negotiate prices on all products with operators and 23 suppliers. (Id. ¶ 17.) There is no preset price list or publicly available catalogue. (Id.) 24 FSA maintains proprietary information on “each customer and their individual needs,” 25 product pricing for operators, and “acquisition[] costs” negotiated with suppliers. (Id.) In 26 his affidavit submitted in support of FSA’s Motion for Summary Judgment, Steve 27 Manuszak, the Senior VP of FSA, states that if this information were disclosed to other 28 distributors, they could use it to make more favorable contracts with operators or -8- 1 suppliers and push FSA out of business. (Id. ¶ 21.) It would reveal FSA’s “manner, 2 method and process of doing business.” (Id. ¶ 25.) Further, such disclosure would be 3 contrary to confidentiality agreements that FSA signs with its partners and would cause 4 those partners to lose trust in FSA. (Id. ¶ 22.) Defendants do not contest these facts. The 5 information that Carrington transmitted to himself and Rubio thus contained FSA’s 6 confidential compilations of data. Those compilations provide a competitive advantage to 7 FSA in that they allow FSA to uniquely serve its customers and are not known by other 8 distributors in the industry. See Ehmke, 197 Ariz. at 148 (“[A] trade secret may consist of 9 a compilation of information that is continuously used or has the potential to be used in 10 one’s business and that gives one an opportunity to obtain an advantage over competitors 11 who do not know of or use it.”). Even if the information obtained by Defendants 12 contained elements of common knowledge, such as product specifications, it is the 13 combination of those elements, such as what products each customer requested at what 14 price or what FSA bought from suppliers at what cost that provides economic value to 15 FSA. 16 Further, FSA created and maintained the information through “substantial efforts . 17 . . such that it would be difficult for a competitor to acquire or duplicate the same 18 information.” Calisi v. Unified Fin. Servs., LLC, 232 Ariz. 103, 302 P.3d 628, 632 (Ct. 19 App. 2013); Prudential Ins. Co. of Am. v. Pochiro, 153 Ariz. at 371, 736 P.2d at 1183 20 (Ct. App. 1987) (stating that a list of customers, “if their trade and patronage have been 21 secured by years of business effort and advertising and the expenditure of time and 22 money, . . . is in the nature of a trade secret”). Manuszak declares that the compilations 23 “took millions of dollars and years to develop” over the last 25 years and is the product of 24 the “work [of] thousands of employees.” (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 13.) He 25 further states that the mix of customer, supplier, and product information “has been 26 refined over decades to create our successful business offering in a highly competitive 27 industry.” (Id. ¶ 25.) Thus, the information obtained by Defendants has independent 28 economic value. -9- 1 Defendants argue that FSA’s delay in bringing this suit shows that the information 2 has minimal value to FSA. Defendants acquired the information in March 2011, but FSA 3 did not bring suit until January 2012. That delay, however, does not establish that the 4 information lacks economic value. The undisputed facts show that during that period, 5 FSA approached Defendants to retrieve any information they had acquired and kept after 6 their termination. On March 8, 2011, FSA sent letters to Defendants demanding the 7 immediate return of any hard copy documents containing FSA information and 8 destruction of electronic records with such information. (Doc. 110, DSOF ¶ 10.) 9 Carrington responded on March 14, stating that he did not have confidential FSA 10 information and had deleted any information pertaining to his employment with FSA. (Id. 11 ¶ 11.) Rubio did not respond to FSA’s letter. (Id. ¶ 13.) Some months later2, FSA 12 investigated Carrington’s FSA account and discovered that he had sent information to 13 personal e-mail accounts in February and March 2011. (Id. ¶ 19; Doc. 133, PSOF ¶¶ 19– 14 20.) FSA first discovered that Carrington still possessed FSA information when the 15 NLRB trial commenced on January 24, 2012. (Doc. 110, DSOF ¶ 26.) FSA filed this suit 16 the next day on January 25. (Doc. 1.) 17 FSA did not excessively delay prosecution of its case against Defendants. To the 18 extent it could have investigated Defendants’ conduct earlier, any such delay relates to 19 the amount of damages, if any, to which FSA is entitled and not to whether FSA’s 20 information has independent economic value. 2. 21 Reasonable Efforts to Maintain Secrecy 22 “[T]he most important factor in gaining trade-secret protection is demonstrating 23 that the owner has taken such precautions as are reasonable under the circumstances to 24 preserve the secrecy of the information.” Ehmke, 197 Ariz. at 150. But the secrecy need 25 not be absolute. Miller v. Hehlen, 209 Ariz. 462, 471, 104 P.3d 193, 202 (Ct. App. 2005) 26 27 28 2 The Parties dispute the timing of that analysis and FSA maintains that the analysis was in response to October 2011 letters from the EEOC and NLRB based on administrative charges filed by Carrington against FSA. (Doc. 133, PSOF ¶¶ 20–21.) - 10 - 1 (internal citation omitted). The owner of the secret information need only show that it 2 made reasonable efforts to maintain its secrecy to ensure that it would be difficult for 3 others to discover it without using improper means. Ehmke, 197 Ariz. at 150 (citing K-2 4 Ski Co. v. Head Ski Co., 506 F.2d 471, 474 (9th Cir. 1974)). Reasonable efforts do not 5 require extreme and unduly expensive procedures to protect trade secrets against 6 industrial espionage. Id. 7 Further, “the owner of a trade secret does not relinquish its secret by disclosure to 8 employees on a necessary basis or by limited publication for a restricted purpose.” Miller, 9 209 Ariz. at 471 (customer list was not trade secret when employer gave it to former 10 employee and did not condition its use); see Calisi v. Unified Fin. Servs., LLC, 232 Ariz. 11 103, 302 P.3d 628, 632–33 (Ct. App. 2013) (collecting cases); Restatement (First) of 12 Torts § 757 (1939) (“It is not requisite that only the proprietor of the business know [the 13 trade secret]. He may, without losing his protection, communicate it to employees 14 involved in its use.”). Nevertheless, a substantial element of secrecy must exist, so that, 15 except by the use of improper means, there would be difficulty in acquiring the 16 information. Restatement § 757. 17 FSA took several measures to protect the secrecy of its information. FSA made 18 Defendants and other employees aware that they were to keep FSA information 19 confidential. It is undisputed that Defendants received instructions during the new hire 20 process that “all information they had access to as employees of FSA was to be treated as 21 confidential.” (Doc. 106, PSOF ¶ 4; Doc. 115, DSOF ¶ 4.) Employees also received an 22 FSA Handbook that had a confidentiality provision. That provision stated the following: 23 24 25 26 27 While many of our competitors are free with disclosing their proprietary information, we have a very strict policy in that regard. No one outside the Company needs to know anything about our Company unless the Chairman or President has identified a specific benefit to the Company. . . . Unauthorized disclosure of information about our company, no matter how harmless it may seem, can be grounds for discipline up to and including termination. 28 - 11 - 1 (Doc. 106, PSOF ¶ 6.) Further, as part of their new-hire paperwork, Defendants and other 2 employees signed an Arbitration Agreement. (Doc. 106, PSOF ¶¶ 10–11; Doc. 115, 3 DSOF ¶¶ 10–11.) By signing the Agreement, employees attested to the following: 4 5 6 7 8 9 10 I know that I may have access to FSA confidential or proprietary information and that the unauthorized use or disclosure of that information may violate applicable law and my duties to FSA. I agree that it is impossible to measure solely in money damages which FSA may suffer if I violated the law or my duties with regard to FSA’s confidential or proprietary information. Therefore, I understand and agree that any action by FSA to protect its rights as to its confidential or proprietary information is excluded from this arbitration agreement, and that if FSA retains the right to seek relief in a court from actual or threatened violation of those rights. (Doc. 106, PSOF ¶ 12; Doc. 115, DSOF ¶ 12.) 11 12 FSA’s information was accessible only through its proprietary computer and e- 13 mail system. Manuszak attests that the system “provides access to that data in a 14 customized fashion at a secure facility that restricts access to those who hold passes or 15 electronic passwords.” (Id.) Keen Chang, FSA’s Senior Information Officer, testified that 16 when a new employee joins FSA, “that employee is assigned an ID and password for the 17 company network. That employee will use that ID and password to log on to the 18 network.” (Doc. 133-2, Ex. G (Chang Depo.) 32:5–9.) Further, access to the information 19 is “only by permission, with proper authorization on a ‘need-to-know’ basis.” (Id.) FSA 20 employees retain access to the extent they need information on suppliers, customers, 21 costs, pricing, and product specifications to perform their functions. (Id.) Manuszak states 22 that FSA has invested “tens of millions of dollars in systems and process development 23 over the last 25 years to safeguard” the information and “each year additional investment 24 is made to improve” those systems. (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 23.) 25 Besides admonitions upon hire, FSA took steps upon termination to remind 26 employees of their continuing obligations, retrieve information acquired in violation of its 27 policies, and cancel their access. (Doc. 133, PSOF ¶ 4; Doc. 106-2, Ex. B (Manuszak 28 Decl.) ¶ 12.) For example, Manuszak declares and it is undisputed that upon the departure - 12 - 1 of a senior director, FSA’s general counsel sent a letter “reminding him of his obligations 2 under the confidentiality and nondisclosure agreement.” (Doc. 110, DSOF ¶ 37; Doc. 3 113-1, Ex. Z (Manuszak Depo.) at 65:7–11.) During the director’s exit interview, 4 Manuszak “reinforced the confidentiality provisions of the policy and spoke to him about 5 his obligations.” (Doc. 113-1, Ex. Z (Manuszak Depo.) at 72:13–20.) 6 FSA took similar protective measures with Defendants upon termination. It is 7 undisputed that upon termination, Rubio’s access to FSA’s system and information “was 8 immediately cancelled, consisted with FSA’s general practice with terminated 9 employees.” (Doc. 106, PSOF ¶ 15; Doc. 115, DSOF ¶ 15.) On March 8, 2011, FSA sent 10 a letter to Carrington stating that he had “wrongfully, illegally, and without authority, 11 transferred information electronically to Elba Rubio that is confidential and proprietary 12 property belonging to FSA.” (Doc. 106, PSOF ¶ 24.) The letter demanded that the 13 information be returned immediately and reminded Carrington of his obligation to 14 maintain confidentiality. FSA sent a similar letter to Rubio on March 8 demanding that 15 all confidential information be returned to FSA and emphasizing that she was prohibited 16 from using that information. (Id. ¶ 25.) 17 These undisputed facts show that FSA took sufficient measures to safeguard its 18 information even as FSA disclosed it for internal purposes. The relevant authorities 19 support that holding. In Ehmke, the Arizona Court of Appeals held that a plaintiff made 20 “reasonable efforts” when it took similar measures. 197 Ariz. at 151. Those measures 21 included “limited disclosure to those employees in need of the information to perform 22 their duties and general directives regarding confidentiality” and “confidentiality 23 provision[s] in its employment agreement[s] . . . as well as in the employee policy 24 handbook that all employees had to acknowledge and sign.” Id. In Calisi, 302 P.3d at 25 632–32, the Arizona Court of Appeals cited to Courtesy Temporary Service, Inc. v. 26 Camacho, 272 Cal. Rptr. 352 (Ct. App. 1990), when discussing the extent to which a 27 company may divulge information while maintaining its secrecy. The Camacho court 28 held that a plaintiff made reasonable efforts when it did not divulge information i.e., its - 13 - 1 customer lists, to persons outside the business and shared it with employees only as 2 necessary for them to effectively carry out their duties. 272 Cal. Rptr. at 358. The 3 information was accompanied by a reminder to employees that it was confidential and 4 proprietary. The Calisi court also cited in approval to Saturn Sys., Inc. v. Militare, 252 5 P.3d 516, 522 (Colo. Ct. App. 2011), where, as here, the plaintiff’s employees could only 6 access plaintiff’s information with a username and password and access was “strictly 7 limited on a ‘need to know’ basis.” 8 FSA contends that before gaining access to its system, employees also signed 9 Confidentiality Agreements that describe their obligations to maintain secrecy and not to 10 use or disclose, remove or forward FSA information except for FSA business.3 The 11 3 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 The agreement states, in relevant part, the following: As a condition of the Services Group of America granting you access to its confidential information, the value of which you hereby acknowledge, and in addition to any other confidentiality agreements and obligations that govern your conduct, you have agreed to the following requirements regarding your access to the company’s confidential information; “Confidential Information” means any and all information, whenever accessed or received, related to Company or any affiliate, including but not limited to, information relating to: financial matters, business plans, strategies, customers, marketing, product or service promotions, purchasing, vendors, discounts, rebates, earned marketing income (“EMI”), EMI tracking methods, payroll or employee information (other than payroll or employee information about Associate), business techniques, business tools (including, without limitation, Company’s E/I, EIS, payroll and Infinium systems), analysis, contractual terms, costs, margins, ownership structure, financings or other information. Confidential information does not include information that is generally available to the public through no improper action or inaction or breach of Associate. Confidentiality; Ownership. Associate understands that the Company and its affiliates value highly their Confidential Information, which they have developed at substantial cost and effort, and which are important Company and affiliate assets. Associate agrees that he or she will strictly maintain the confidentiality and proprietary nature of any and all confidential information. Associate agrees not to use or disclose any Confidential Information, directly or indirectly, except in furtherance of the Company’s business or as consented to in writing in each instance by a Company officer, or, upon reasonable prior notice to the Company, as required by law. Associate agrees not to access, read, forward, remove from Company premises, copy or otherwise obtain or retain any Confidential Information except as necessary to perform his or her job with the Company. This agreement applies to confidential information in any form or formats, including without limitation, oral, visual, written, computer records, photographs and tape recordings, and applies to Confidential Information accessed by associate before, as well was after, entering this Agreement. This Agreement shall apply throughout the Associate’s employment with Company and after the termination of such employment at - 14 - 1 Parties dispute whether Defendants and other employees signed the Agreement at the 2 time Defendants were employed with FSA.4 That dispute, however, does not create a 3 6 any time and for any reason (with or without the cause) by Company or Associate. Associate acknowledges that Company and its affiliates are the sole owners of the Confidential Information. Associate disclaims any right, title or interest in or to the Confidential Information, including without limitation any Confidential Information developed by Associate. Upon termination of employment (for any reason) Associate agrees to return to the company all documents, discs or other items containing Confidential Information. 7 (Doc. 106, PSOF ¶ 9.) 4 5 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 4 In support of its contention, FSA submits a confidential agreement with the above-quoted language that is purportedly “e-signed” by Carrington. (See Doc 133-1, Ex. A at 3, FSAFED03039) (the signature confirmation reads: “Paul Carrington signed the confidentiality agreement with the initials PLc on 9/8/2008”) As to Rubio, FSA submits an acknowledgement form that does not refer to the confidentiality agreement but attests that Rubio will read the Handbook and “understand the policies well enough to carry out [her] job duties . . . .” (Id. at 2, FSAFED03121.) FSA also proffers Manuszak’s declaration that Carrington e-signed the confidentiality agreement and Rubio also signed the agreement. (Doc. 106-2, Ex. B, Manuszak Decl. ¶¶ 6–7.) Defendants submit declarations as well as deposition testimony that they do not recall ever seeing or signing the Confidentiality Agreement. (Doc 110-1, Ex. A (Rubio Decl.) ¶ 2; Id., Ex. B (Carrington Decl.) ¶ 2; Doc. 115-1, Ex. C (Carrington Depo.) at 57:16–58:17; Id., Ex. D (Rubio Depo.) at 128:16–25.) FSA points to the fact that Rubio first testified that she had signed the Confidentiality Agreement, that it was part of her new hire packet, and that her actions in acquiring FSA information was in violation of what she signed. (Doc. 133-1, Ex. C (Rubio Depo.) at 64:8–10; 64:14–15; 64:22–65:10.) FSA underscores the fact that Rubio’s later testimony that she in fact signed the Arbitration Agreement and not the Confidentiality Agreement was only after a break in the Deposition and in response to defense counsel’s questioning. (See id. at 122–128.) FSA also asserts that since 2004 or 2005, it has been company policy to require all employees to e-sign the Confidentiality Agreement before granting access to FSA’s database and e-mail system. (Doc. 133, PSOF ¶ 33.) Guy Babbitt, FSA’s Chief Information Officer, whose responsibility it is to ensure that employees e-sign the agreement, testified that “[i]t was not possible to access the system and information that [the employee] needed without signing.” (Doc. 110-3, Ex. L (Babbitt Depo.) at 29:2–6.) Also, Keen Chang, FSA’s Senior Information Officer, testified that when a new employee joins FSA, he or she is assigned an ID and password for the company network, and when the log-in for the first time, the employee must read and initial the confidential agreement before using the system. (Doc. 133-2, Ex. G (Chang Depo.) 31:24–33:5.) Defendants proffer the statements of two former FSA employees that they were not aware of any policy or practice to e-sign the Confidentiality Agreement. In response to an e-mail from Carrington in March 2011, Ryan Peterson recalled that when he was at FSA he “was not aware of an e-signature being used for [the Confidentiality Agreement].” (Doc. 115-1, Ex. 3 at 1.) Further, Adam Downer, a former SIS, attests that “[a]t no time did I submit an ‘e-signature’ to a confidentiality agreement, or any other agreement for the company.” (Doc. 115-1, Ex. 4 (Downer Decl.) at 3.) Defendants also point to the fact that FSA did not have a practice or policy of archiving employees’ esignatures to the agreements prior to June 2011. (Doc. 110-2, Ex. E (Manuszak Depo.) at - 15 - 1 genuine issue of material fact. See Anderson, 477 U.S. at 248 (stating that for a dispute to 2 be genuine, the evidence must be “such that a reasonable jury could return a verdict for 3 the nonmoving party”). Even assuming that Defendants did not sign the Agreement, FSA 4 has shown that it made reasonable efforts to preserve the secrecy of its information. FSA 5 informed Defendants, at least upon hire and termination, of their obligation not to divulge 6 its information to outside parties or to retain it after termination. Further, FSA had in 7 place significant measures to restrict access to employees that needed to use the 8 information to fulfill their duties. 9 Defendants also contend that FSA did not take additional measures to protect its 10 information. For example, Defendants assert that FSA could have labeled the information 11 as “trade secret” or “confidential,” citing to a California case in support. See Morlife, Inc. 12 v. Perry, 56 Cal. App. 4th 1514, 1522 (1997). The Morlife court, however, referred to 13 such labeling in the context of whether the information was readily ascertainable by 14 outside parties. Further, assuming the e-mails submitted by Defendants are copies of the 15 originals, the FSA information had stamps stating “Confidential Trade Secret/Proprietary 16 Information.” (See Docs. 119-1–6, Ex. O.) Even if the information was not thus stamped, 17 FSA is only required to take “reasonable efforts” to maintain secrecy and not all such 18 efforts. FSA is also not required to track the “assignment history of work computers” as 19 Defendants contend, even if that is a useful measure of security. (See Doc. 109 at 21.) 20 Along with measures that FSA did not take, Defendants find fault with the 21 measures it did. Defendants argue that because Carrington was able to acquire FSA 22 information shortly before termination, and others could hypothetically do the same and 23 disclose it to FSA’s competitors, FSA did not make reasonable efforts to maintain the 24 information’s secrecy. This argument proves too much. In essence, Defendants argue that 25 so long as anyone is capable of circumventing security measures, a Plaintiff did not 26 undertake sufficiently reasonable precautions. This argument lacks merit; were it to be 27 31–35; Doc. 110-3, Ex. L (Babbitt Depo.) at 29–38.) 28 - 16 - 1 accepted the tort could not exist. Defendants make another peculiar argument that FSA 2 engaged in “arbitrary enforcement” of its confidentiality policies because when a senior 3 director departed to join a competitor, FSA did no more than remind him of his ongoing 4 obligations. FSA also did not take steps to ensure that the director’s fiancé, an FSA senior 5 manager, did not share information with the director after he left FSA. (Doc. 110, DSOF 6 ¶¶ 36, 40.) Both of these arguments are also without merit. Just as FSA is not required to 7 make every conceivable effort to maintain secrecy, it is not obliged to “protect trade 8 secrets against industrial espionage.” Ehmke, 197 Ariz. at 150. FSA consistently 9 implemented policies to remind employees of their obligations and maintained secure 10 access to its information. 11 Defendants also argue that because FSA provided access to several employees, the 12 information is not secret. FSA identified 46 different job titles for employees that had 13 similar access to the information as Defendants. (Doc. 110, DSOF ¶ 4.) But the 14 confidential use of information by several employees for a business purpose does not 15 deprive the information of trade secret protection. See Miller, 209 Ariz. at 471; 16 Restatement § 757. As discussed above, FSA employees had to use a username and 17 password to access the information and were bound to only use it for FSA business. 18 The undisputed facts show that FSA’s measures to safeguard its compilations of 19 data regarding operators, suppliers, products, and pricing were reasonable. Because 20 FSA’s information has independent economic value derived from its non-public nature 21 and FSA took reasonable efforts to maintain secrecy that information consists of 22 protectable trade secrets. 23 B. 24 Under the AUTSA, “misappropriation” consists of either: 25 (a) Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means. 26 27 Misappropriation (b) Disclosure or use of a trade secret of another without express or implied consent by a person who either: 28 - 17 - 1 2 3 4 5 6 7 (i) Used improper means to acquire knowledge of the trade secret. (ii) At the time of disclosure or use, knew or had reason to know that his knowledge of the trade secret was derived from or through a person who had utilized improper means to acquire it, was acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use or was derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use. (iii) Before a material change of his position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake. 8 9 10 A.R.S. § 44-401(2). 1. Acquisition and Disclosure or Use 11 Defendants contend that liability only attaches under the AUTSA when a person 12 discloses or uses a trade secret acquired by improper means. The AUTSA is clear on its 13 face; a person who acquires a trade secret is liable if acquired through improper means. 14 The AUTSA does not require disclosure or use of the trade secret before attaching 15 liability. In support of their contention, Defendants refers to the following language from 16 the Restatement: 23 The prior Restatement of this topic imposed liability only for the wrongful use or disclosure of another’s trade secret. Improper acquisition of a trade secret was not independently actionable. See Restatement of Torts § 757 (1939). Wrongful use or disclosure is also frequently recited in the case law as an element of the cause of action for trade secret appropriation. The cases requiring proof of wrongful use or disclosure, however, typically involve information that has been acquired by the defendant through a confidential disclosure from the trade secret owner. In such cases the acquisition of the secret is not improper; only a subsequent use or disclosure in breach of the defendant’s duty of confidence is wrongful. 24 Restatement Third, Unfair Competition § 40 cmt. b (1995). Defendants, however, fail to 25 appreciate additional language in that comment: 17 18 19 20 21 22 26 27 28 Subsection (a) of this Section follows the rule adopted in § 1(2)(i) of the Uniform Trade Secrets Act, which imposes liability for the acquisition of a trade secret by improper means. Thus, a person who obtains a trade secret - 18 - 1 2 3 through a wiretap or who induces or knowingly accepts a disclosure of the secret in breach of confidence is subject to liability. See § 43, Comment c. Subsequent use or disclosure of a trade secret that has been improperly acquired constitutes a further appropriation under the rule stated in Subsection (b)(2) of this Section. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Id. (emphasis added). Thus, the Restatement accords with the AUTSA in that it imposes liability for both acquisition and use or disclosure of a trade secret. Nevertheless, the AUTSA’s language is clear in its imposition of liability for acquisition. When the language of an Arizona statute is “clear and unambiguous, and thus subject to only one reasonable meaning,” Arizona courts apply the language without using other means of statutory construction. Baker v. Univ. Physicians Healthcare, 231 Ariz. 379, 296 P.3d 42, 46 (2013); Tang v. Reno, 77 F.3d 1194, 1196 (9th Cir. 1996) (“If ‘the statute is clear and unambiguous, that is the end of the matter.’”) (quoting Sullivan v. Stroop, 496 U.S. 478, 482 (1990)). The undisputed facts show that Carrington acquired and disclosed FSA’s trade secrets to Rubio who acquired them from Carrington through her e-mail account on March 5 and 6, 2011. Defendants argue that FSA may not base its misappropriation claim on the disclosure of trade secrets by Carrington to Rubio because the claim was not thus alleged in the Complaint. They contend that in the Complaint, FSA alleged that Defendants engaged in a criminal conspiracy to steal trade secrets for the purpose of disclosing them to competitors. But after alleging that Carrington sent FSA trade secrets to Rubio, FSA alleges that “Defendants willfully and maliciously misappropriated FSA’s Trade Secret . . . Information, and have and will continue to violate their confidentiality obligations to FSA, causing continuing degradation in the value of such information.” (Doc. 1 ¶ 66.) Further, the Complaint states that “FSA is entitled to recover its actual and consequential damages caused by Defendants’ misappropriation of FSA’s Trade Secret . . . Information, any unjust enrichment to Defendants and/or others resulting from the misappropriation, and a reasonable royalty for the Defendants’ unauthorized disclosure - 19 - 1 and use of FSA trade secrets.” (Id. ¶ 67.) The Complaint does not limit the 2 misappropriation claim to disclosure to FSA’s competitors but alleges misappropriation 3 and disclosure in general. The Complaint is consistent with the undisputed facts which 4 show that Defendants acquired and disclosed FSA trade secrets. 5 2. Knowledge of Improper Means 6 FSA must further show that Defendants knowingly used improper means to 7 acquire and disclose trade secrets. “‘Improper means’ include theft, bribery, 8 misrepresentation, breach or inducement of a duty to maintain secrecy or espionage 9 through electronic or other means.” A.R.S. § 44-401(1). This list is not exhaustive. The 10 Restatement states that improper means also include fraud, inducement of or knowing 11 participation in a breach of confidence, and other means either wrongful in themselves or 12 wrongful under the circumstances of the case. Restatement § 43. It further states that an 13 employee or former employee who uses or discloses a trade secret owned by the 14 employer or former employer in breach of a duty of confidence is subject to liability for 15 appropriation of the trade secret. Id. § 42. 16 Defendants knew that their transmittal of FSA information from its system to their 17 personal e-mail accounts was unauthorized and therefore improper. First, Carrington sent 18 FSA trade secrets to Rubio’s personal account despite the fact that they knew Rubio was 19 not authorized to access that information. (Doc. 106, PSOF ¶ 16; Doc. 115, DSOF ¶ 16.) 20 Rubio was terminated on March 4, 2011, and her access was immediately cancelled. 21 (Doc. 106, PSOF ¶ 15; Doc. 115, DSOF ¶ 15.) On that day, Defendants discussed and 22 made plans for Carrington to forward Rubio FSA information from its system over the 23 weekend. (Doc. 106, PSOF ¶ 17; Doc. 115, DSOF ¶ 17.) Carrington sent trade secrets to 24 Rubio on March 5 and 6 by going to FSA’s offices during non-working hours, using an 25 FSA computer and his employee log-in. (Doc. 106, PSOF ¶¶ 18–19; Doc. 115, DSOF ¶¶ 26 18–19.) Second, Defendants do not argue that they engaged in the acquisition and 27 disclosure of trade secrets for any FSA business purpose. 28 In doing so, Carrington breached his duties of confidence to FSA and to maintain - 20 - 1 secrecy of FSA information. It is undisputed that Carrington signed an Arbitration 2 Agreement that stated that “the unauthorized use or disclosure of [FSA confidential or 3 proprietary] information may violate applicable law and my duties two [sic] FSA.” (Doc. 4 106, PSOF ¶ 12; Doc. 115, DSOF ¶ 12); see also (Doc. 106, PSOF ¶¶ 5–6; Doc. 115, 5 DSOF ¶¶ 5–6). 6 Defendants thus had a duty not to disclose FSA information to any person outside 7 the company and generally, to use the information for the benefit of FSA. At the time 8 Defendants conspired to acquire FSA trade secrets, they both knew that Rubio was 9 “outside the Company” and that their transmittal was an “unauthorized disclosure of 10 information about [FSA].” Rubio testified that acquiring FSA trade secrets in that manner 11 constituted a violation of either her Confidentiality5 or Arbitration Agreement. (Doc. 106, 12 PSOF ¶ 21; Doc. 115, DSOF ¶ 21.) At the time of transmittal, Carrington knew that 13 providing FSA trade secrets to Rubio violated FSA policy. (Doc. 106, PSOF ¶ 22; Doc. 14 115, DSOF ¶ 22.) Thus Carrington’s disclosure in violation of his duty to maintain 15 secrecy and Rubio’s acquisition when she knew she did not have authorization and that 16 Carrington was violating his duty in transmitting trade secrets to her constitutes 17 misappropriation.6 Summary judgment on the issue of AUTSA liability is granted to 18 FSA. 19 C. Damages 20 5 21 22 23 24 25 26 27 28 As discussed above, the Parties dispute whether Defendants signed a confidentiality agreement upon hire. That dispute, however, is not material because FSA made Defendants aware through the Arbitration Agreement and FSA Handbook of their duty to maintain secrecy. 6 Defendants argue that FSA has not proven misappropriation because Defendants did not know that the information in fact constituted trade secrets. But that is not an element of the claim. The AUTSA requires simply that persons know they are using improper means to acquire trade secrets or are disclosing trade secrets in breach of their duty to maintain secrecy. A.R.S. § 44-401(2); see Restatement (First) of Torts § 757 (1939) (“Liability under the rule stated in this Section is based not on the actor’s purpose to discover another’s trade secret but on the nature of the conduct by which the discovery is made. . . . [I]f his conduct is improper, he is subject to liability even though he engaged in the conduct for a purpose other than that of discovering the trade secret.”). Rubio knew that she acquired the trade secrets using improper means and Carrington knew he was breaching his duty to maintain secrecy by disclosing them to Rubio. - 21 - 1 1. Existence of Damages 2 Under the AUTSA, a plaintiff may seek to recover “both the actual loss caused by 3 misappropriation and the unjust enrichment caused by misappropriation that is not taken 4 into account in computing actual loss.” A.R.S. § 44–403(A). Damages are “an essential 5 element” of a misappropriation claim which fails “without a cognizable theory of 6 proximately caused damages.” W.L. Gore & Associates, Inc. v. GI Dynamics, Inc., 872 F. 7 Supp. 2d 883, 888 (D. Ariz. 2012) (citing Firetrace USA, LLC v. Jesclard, 800 F. Supp. 8 2d 1042, 1054 n.5 (D. Ariz. 2010)). A plaintiff bears the burden of proving the fact and 9 cause of any damages for which recovery is sought. Restatement (Third) of Unfair 10 Competition § 45 cmt. b (1995). The plaintiff is required to prove the amount of such loss 11 with only as much certainty as is reasonable under the circumstances. (Id.) But damages 12 that are “speculative, remote or uncertain” may not form the basis of a judgment. W.L. 13 Gore, 872 F. Supp. 2d at 888 (internal citation omitted). 14 “The proximate cause of an injury is that which, in a natural and continuous 15 sequence, unbroken by any efficient intervening cause, produces an injury, and without 16 which the injury would not have occurred.” Robertson v. Sixpence Inns of Am., Inc., 163 17 Ariz. 539, 546, 789 P.2d 1040, 1047 (1990) (internal citation omitted). Plaintiff need only 18 present probable facts from which the causal relationship reasonably may be inferred. Id; 19 see also Smith v. Johnson, 183 Ariz. 38, 899 P.2d 199, 202 (Ct. App. 1995) (a tort 20 plaintiff “must show a reasonable connection between the defendant’s act or omission 21 and the plaintiff’s injury or damages.”). Whether proximate cause exists is usually a 22 question for the jury, unless the facts are undisputed and reasonable people could not 23 differ as to inferences to be drawn from them. McMurtry v. Weatherford Hotel, Inc., 231 24 Ariz. 244, 293 P.3d 520, 532 (Ct. App. 2013) (internal citation omitted). 25 Defendants argue that because FSA cannot show they used its trade secrets or 26 disclosed them to others, it cannot show that it was injured by their misappropriation. 27 FSA states that it does not contend there was “actual use or commercial implementation” 28 of its trade secrets. (Doc. 132 at 14.) FSA does assert, however, that it was injured by - 22 - 1 Defendants’ conduct. Manuszak declares that “[t]en FSA employees spent in excess of 75 2 employee hours reviewing the documents” that were misappropriated by Defendants. 3 (Doc. 106-2, Ex. B (Manuszak Decl.) ¶ 26.) FSA argues that this expenditure of company 4 resources was directly caused by the misappropriation. 5 A plaintiff is generally entitled to recover “any proven pecuniary loss attributable 6 to the appropriation of the trade secret” including “the costs of remedial effort.” 7 Restatement § 45 cmts. b, e. The Arizona Supreme Court has stated that when the 8 wrongful act of a defendant “makes it necessary to incur expense to protect [the 9 plaintiff’s] interest, such costs and expenses, . . . should be treated as the legal 10 consequences of the original wrongful act and may be recovered as damages.” U.S. Fid. 11 & Guar. Co. v. Frohmiller, 71 Ariz. 377, 380, 227 P.2d 1007, 1009 (1951) (internal 12 quotation marks and citation omitted). Other state courts determining damages under 13 statutes modeled after the UTSA have found “out-of-pocket expenses” sustained as a 14 result of misappropriation to be an element of damages. See, e.g., Dozor Agency, Inc. v. 15 Rosenberg, 218 A.2d 583, 585 (Pa. 1966); Telex Corp. v. Int’l Bus. Machines Corp., 510 16 F.2d 894, 933 (10th Cir. 1975) (noting that expenses incurred in strengthening security 17 measures after misappropriation would be damages in some circumstances). 18 Even if some of the evidence the Plaintiff offers to demonstrate that it was 19 damaged by Defendant’s misappropriation seems, at least at this stage, to exaggerate such 20 damages beyond the point of reason, the Court finds that FSA has provided some 21 evidence that it incurred expenses to investigate Defendants’ misappropriation. Such 22 expenses incurred as a direct result of Defendants’ conduct are damages for the purpose 23 of proving FSA’s claim under the AUTSA. Although Defendants argue that FSA’s 24 assertion of remedial efforts is “unsubstantiated,” (Doc. 138 at 12), FSA has provided 25 Manuszak’s declaration in support of that assertion. At a minimum, the existence of 26 expenses is a genuine dispute of material fact because if FSA’s assertion is believed by a 27 factfinder, it would be entitled to damages. Therefore, summary judgment is denied to 28 Defendants. - 23 - 2. 1 Willful and Malicious Conduct 2 FSA contends that it is entitled to exemplary damages and attorneys’ fees based on 3 the willful and malicious nature of Defendants’ misappropriation. Section 44-403(B) 4 states that “[i]f willful and malicious misappropriation exists, the court may award 5 exemplary damages in an amount not exceeding twice any award made under [Section 6 44–403(A)].” Further, the Court may award reasonable attorneys’ fees to the prevailing 7 party for willful and malicious misappropriation. A.R.S. § 44-404(3). 8 Willful misconduct means “intentional, wrongful conduct, done either with 9 knowledge that serious injury to another probably will result or with a wanton and 10 reckless disregard of the possible results and is essentially a question of fact.” Newman v. 11 Sun Valley Crushing Co., 173 Ariz. 456, 460, 844 P.2d 623, 627 (Ct. App. 1992) (internal 12 citation omitted); Smith v. Chapman, 115 Ariz. 211, 214, 564 P.2d 900, 903 (1977). 13 Malice is defined as (1) the intent, without justification or excuse, to commit a wrongful 14 act; (2) reckless disregard of the law or of a person’s legal rights; or (3) ill will or 15 wickedness of heart. Black’s Law Dictionary 1042 (9th ed. 2009); see Sec. Title Agency, 16 Inc. v. Pope, 219 Ariz. 480, 502 n.21, 200 P.3d 977, 999 (Ct. App. 2008). Because the 17 requisite conduct is defined by statute, an “evil mind” required for the common law 18 remedy of punitive damages, see Linthicum v. Nationwide Life Ins. Co., 150 Ariz. 326, 19 331–32, 723 P.2d 675, 680–81 (1986), is not necessary to obtain exemplary damages 20 here. 21 The undisputed facts show that Defendants conspired for Carrington to transmit to 22 himself and Rubio specific FSA information through its system during non-working 23 hours. (Doc. 106, PSOF ¶ 17; Doc. 115, DSOF ¶ 17.) On the weekend of March 6, 2011, 24 Carrington went to FSA’s offices and used an FSA computer to transmit 300 e-mail 25 strings containing trade secrets to his and Rubio’s personal e-mail accounts. (Doc. 106, 26 PSOF ¶¶ 18–19; Doc. 115, DSOF ¶¶ 18–19.) At the time, Carrington knew that Rubio 27 was not authorized to have this information. (Doc. 106, PSOF ¶ 22; Doc. 115, DSOF ¶ 28 22.) It is undisputed that Defendants had signed an Arbitration Agreement stating that - 24 - 1 “the unauthorized use or disclosure of [FSA confidential or proprietary] information may 2 violate applicable law and my duties two [sic] FSA.” (Doc. 106, PSOF ¶¶ 10–12; Doc. 3 115, DSOF ¶¶ 10–12.) They also received an FSA Handbook informing employees that 4 it maintained a “strict policy” of non-disclosure as to proprietary information. (Doc. 106, 5 PSOF ¶ 22; Doc. 115, DSOF ¶ 22.) Thus, Defendants misappropriation was willful. 6 FSA must also establish the presence of malice through undisputed facts. 7 Defendants argue that they were not aware their misappropriation consisted of illegal 8 conduct. Carrington testified that he did not know that by transmitting the e-mails to 9 himself and Rubio he was breaking the law. (Doc. 115, DSOF ¶ 26.) As discussed, it is 10 undisputed that Defendants executed a plan to procure FSA information surreptitiously 11 and transmit it to Rubio when they knew she was not authorized to have it. Further, FSA 12 made them aware that such misappropriation was in violation of their duties as defined in 13 the various materials they received upon hire. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 FSA also points to post-misappropriation conduct to show the presence of malice.7 7 Defendants’ conduct soon after misappropriation consists of the following. It is undisputed that FSA sent a letter to Carrington the day after he was terminated that week demanding the return of FSA information that had been “wrongfully, illegally, and without authority, transferred . . . electronically to Elba Rubio that is confidential and proprietary property belonging to FSA” and that he was “legally prohibited from making any use of such information.” (Doc. 106, PSOF ¶¶ 23–24; Doc. 115, DSOF ¶¶ 23–24.) Carrington responded: “[a]s defined in your letter, I do not have any proprietary and confidential FSA information. To the extent that I had any information pertaining to my employment with FSA, via electronic medium, that information has been permanently deleted and I have no hard copies or work papers in my possession.” (Doc. 106, PSOF ¶¶ 23–24.) At that time, Carrington possessed trade secrets and later testified that he made false representations to FSA. (Doc. 106-1, Ex. A (Carrington Depo.) at 66:6–10.) He testified that he did not know the subject matter within some of the e-mails and “perhaps he could have done a better job of looking through the emails before responding to FSA’s March 8 letter.” (Doc. 115, DSOF ¶ 27; Doc. 106-1, Ex. A (Carrington Depo.) at 66:14– 21.), and did not return the trade secrets when FSA informed him within days that his conduct was illegal. That establishes, at a minimum, that Carrington acted with “reckless disregard of the law or of [FSA’s] legal rights.” Sec. Title Agency, 219 Ariz. at 502 n.21. - 25 - 1 Although malice “may be inferred or implied from the nature of the acts complained of 2 and the surrounding circumstances,” Barker v. James, 15 Ariz. App. 83, 87, 486 P.2d 3 195, 199 (1971), those inferences are properly made by a factfinder. There is thus a 4 factual dispute as to whether Defendants acted with malice when misappropriating FSA’s 5 trade secrets. Accordingly, FSA motion for summary judgment as to exemplary damages 6 and reasonable attorneys’ fees is denied. 7 III. SANCTIONS 8 A. Defendants’ Motion for Sanctions 9 Section 44-404 provides that “[t]he court may award reasonable attorney fees to 10 the prevailing party for . . . [a] claim of misappropriation made in bad faith.” Rule 11 also 11 provides for sanctions if, among other conduct, a party brings a case for an improper 12 purpose or presents frivolous arguments in support of its claims or defenses. Defendants 13 argue that FSA should be sanctioned for bringing a frivolous lawsuit and continuing to 14 prosecute it for several months although no evidence of Defendants’ wrongful use or 15 disclosure to other parties exists. (Doc. 109 at 20–21.) They contend that FSA has not 16 sought discovery from any third party regarding Defendants’ wrongful use or disclosure. 17 Because FSA has established its claim for misappropriation under the AUTSA, it 18 cannot be found to have brought the claim based on frivolous arguments. Even if FSA did 19 not pursue discovery from third parties or show that Defendants used or disclosed its 20 trade secrets to others, FSA has established that Defendants acquired and disclosed that 21 22 23 24 25 26 27 28 FSA sent a similar letter to Rubio on March 8. It is undisputed the letter demanded that “all confidential proprietary property in her possession, including the massive quality [sic] of information unlawfully transmitted by Carrington, be immediately returned, emphasizing that she is legally prohibited from making use of any such information.” (Doc. 106, PSOF ¶ 25; Doc. 115, DSOF ¶ 25) (emphasis added). When Rubio received the letter, she was aware that both she and Carrington possessed information that FSA sought. (Doc. 106, PSOF ¶ 28; Doc. 115, DSOF ¶ 28.) Despite that knowledge, she neither responded to FSA’s letter nor returned FSA’s trade secrets. (Id.) In fact, as of the date of filing of the Complaint on January 25, 2012, neither Defendant had returned any of the trade secrets to FSA. (Doc. 106, PSOF ¶ 29; Doc. 115, DSOF ¶ 29.) - 26 - 1 information in violation of the AUTSA. Further, Defendants do not show that FSA 2 brought this action for an improper purpose. Therefore, sanctions will not be imposed on 3 FSA. 4 5 6 B. FSA’s Motion for Sanctions 1. Defendants’ Motion to Strike i. Form and Timeliness of Defendants’ Motion 7 Defendants move to strike for untimeliness two declarations containing 8 supplemental expert disclosures used in support of FSA’s Motion for Sanctions and 9 attached thereto and to its Reply. (See Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex. 10 1 (Kuchta Decl.).) The declarations are by FSA’s forensic expert, Kelly Kuchta. FSA 11 argues, however, that in filing their Motion to Strike, Defendants did not follow the 12 procedure set out in Local Rule 7.2(m) which states: “[a]n objection to (and any 13 argument regarding) the admissibility of evidence offered in support of or opposition to a 14 motion must be presented in the objecting party’s responsive or reply memorandum and 15 not in a separate motion to strike or other separate filing.” 16 Although Defendants referred to one of the declarations in its Response to FSA’s 17 Motion, (see Doc. 120 at 5, 7), they did not object to the declaration as untimely. Instead, 18 Defendants objected in this separate Motion to Strike on June 17, 2013, nearly one month 19 after their Response on May 20. (Docs. 120, 134.) Defendants were not able to object in 20 their Response to the second offending declaration since it was attached to FSA’s Reply. 21 The Court stated in its Case Management Order (“CMO”) that it “intends to enforce the 22 deadlines set forth in this Order.” (Doc. 30 ¶ 10.) Therefore, although Defendants did not 23 comply with the Local Rules in objecting to one of the declarations, the Court will 24 consider the merits of the untimeliness objections. 25 ii. Timeliness of FSA’s Expert Disclosures 26 Rule 26(a)(2)(D) demands that disclosures are timely made based on “the times 27 and in the sequence that the court orders.” The CMO states that “[t]he party with the 28 burden of proof shall provide full and complete expert disclosures as required by Rule - 27 - 1 26(a)(2)(A)-(C) of the Federal Rules of Civil Procedure no later than September 28, 2 2012.” (Doc. 59 ¶ 5(c)). It further states that “[r]ebuttal expert disclosures, if any, shall be 3 made no later than October 26, 2012” and that “[e]xpert depositions shall be completed 4 no later than March 1, 2013.” (Id. ¶¶ 5(d)–(e).) FSA filed the declarations containing 5 supplemental expert disclosures with its Motion and Reply on May 3 and May 30, 2013. 6 (Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta Decl.).) 7 FSA at no time requested the Court to extend the deadlines for expert disclosures 8 set out in the CMO. Therefore, a modification of the schedule pursuant to Rule 16(b)(4) 9 is not applicable here. Although FSA argues that “there is good cause for allowing the 10 expert testimony in issue” under Rule 16(b)(4), it has not requested the Court to modify 11 the schedule. To the extent that FSA implicitly requests the Court to modify the schedule 12 so that its supplemental disclosures are considered timely, that request comes too late. It 13 is not until Defendants moved to strike the disclosures that FSA made such a request to 14 modify in its Reply to Defendants’ Motion. Thus, the supplemental disclosures are 15 untimely. 16 iii. Sanctions 17 Rule 37(c)(1) describes the consequences for failing to provide timely expert 18 disclosures as required by Rule 26. Rule 37(c)(1) states: “the party is not allowed to use 19 that information or witness to supply evidence on a motion, at a hearing, or at a trial, 20 unless the failure was substantially justified or is harmless.” This discovery sanction is 21 described as a “self-executing, automatic sanction to provide a strong inducement for 22 disclosure of material.” Yeti by Molly Ltd. v. Deckers Outdoor Corp., 259 F.3d 1101, 23 1106 (9th Cir. 2001) (citing the Advisory Committee’s Notes to Rule 37(c)(1) (1993)) 24 (internal quotation marks and alterations omitted). FSA may still introduce the expert 25 disclosures if it can prove that its failure to disclose was substantially justified or 26 harmless. Id. at 1106–07. Unless FSA can show that one of these exceptions applies, it 27 will be sanctioned for its untimely disclosures and precluded from using them in support 28 of its Motion for Sanctions. See Yeti, 259 F.3d at 1107. (“It is the obligation of the party - 28 - 1 facing sanctions for belated disclosure to show that its failure to comply with Rule 26 2 was either justified or harmless . . . .”) (internal citation omitted). 3 a. Substantial Justification 4 FSA contends its delay in disclosing is “tied to [Defendants’] own litigation 5 misconduct: Defendants, yet again, lied about the information they possess and its 6 availability. It simply took FSA’s expert time to sort through Defendants’ lies.” (Doc. 7 136 at 7.) But FSA does not explain what Defendants’ conduct caused FSA to delay their 8 disclosures more than seven months after expert disclosures were due in September 2012 9 and two months after expert discovery completed in March 2013. The declarations and 10 the substance of FSA’s Motion which they support are based on facts that were in FSA’s 11 possession even before the expert disclosure deadline in September. The crux of the 12 Motion is that Defendants have not produced a hard drive that Carrington used with his 13 computer and that he erased data from his computer before producing it in May 2012. 14 Indeed, the latest factual date in the Motion is June 20, 2012, when Defendants’ counsel 15 informed FSA as to the unavailability of the hard drive. 16 The expert disclosures contained in the declarations are also not based on 17 previously unavailable facts. In the first declaration, Kuchta opines on the hard drive and 18 whether Carrington erased data. (See Doc. 111-1, Ex. B (Kuchta Decl.) ¶¶ 3–5.) That 19 opinion is based on further review of the forensic image of Carrington’s computer on 20 which Kuchta based his earlier report filed on September 28, 2012, (Doc. 46). The 21 declaration also refers to Defendants’ rebuttal expert report which was filed on November 22 26, 2012, (Doc. 65). Kuchta’s second declaration rebuts contentions made in Defendants’ 23 Response to FSA’s Motion for Sanctions. It provides additional expert opinion based on 24 the same facts available to Kuchta prior to his September expert report. (See, e.g., Doc. 25 122-1, Ex. 1 (Kuchta Decl.) ¶¶ 5–6, 9–10.) Therefore, FSA’s untimely disclosures 26 contained in the declarations are not substantially justified. 27 b. 28 Harmlessness FSA’s untimely disclosures were not harmless. The first declaration provides - 29 - 1 previously undisclosed opinion based on further review of the forensic image. (Doc. 111- 2 1, Ex. B (Kuchta Decl.) ¶¶ 3–4.) Kuchta had mentioned in his original report that the 3 computer had been purchased with a hard drive different than the one it currently had. 4 (Doc. 111-1, Ex. A (Exp. Rep.) ¶ 4(A).) But he opined in the supplemental declaration 5 that the original hard drive was one of the multiple devices connected to the computer 6 hours before Defendants produced it to FSA. (Doc. 111-1, Ex. B (Kuchta Decl.) ¶ 4.) 7 Kuchta had stated in the original report that there was evidence that cleaning software 8 had been used to erase data from Carrington’s computer and that it was installed and 9 uninstalled on May 12, 2012. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 5(A)(3), 6(A)(2).) 10 Kuchta opines in the declaration for the first time, however, that Carrington used the 11 cleaning software on May 12. (Doc. 111-1, Ex. B (Kuchta Decl.) ¶ 5.) 12 In the second declaration, Kuchta rebuts assertions in Defendants’ expert report 13 and Response to FSA’s Motion. Based on additional technical information, he opines as 14 to the plausibility that several USB devices were connected to the computer shortly 15 before production and that cleaning software was used. (Doc. 122-1, Ex. 1 (Kuchta Decl.) 16 ¶¶ 5–7, 9–10.) 17 In the briefing for its Motion for Sanctions, FSA cites to Kuchta’s supplemental 18 opinion about the original hard drive and the date on which Carrington used cleaning 19 software. (Doc. 111 at 3; Doc. 122 at 2–4, 6–7.) Defendants, however, did not have an 20 opportunity to rebut Kuchta’s supplemental opinion or depose him about it because it was 21 disclosed after the discovery deadline. Therefore, the declarations are stricken to the 22 extent they contain new expert disclosures because their untimeliness is neither 23 substantially justified nor harmless to Defendants. 24 25 2. Merits of FSA’s Motion for Sanctions i. Spoliation of the Fujitsu Drive 26 “A district court can sanction a party who has despoiled evidence [under] the 27 inherent power of federal courts to levy sanctions in response to abusive litigation 28 practices . . . .” Leon v. IDX Sys. Corp., 464 F.3d 951, 958 (9th Cir. 2006). The court may - 30 - 1 make factual findings in relation to a Motion for Sanctions based on the spoliation of 2 evidence. Id.; see Pau v. Yosemite Park & Curry Co., 928 F.2d 880, 885 (9th Cir. 1991). 3 “A party’s destruction of evidence qualifies as willful spoliation if the party has 4 some notice that the documents were potentially relevant to the litigation before they 5 were destroyed.” Id. at 959 (internal citation omitted) (emphasis in original). “A party 6 seeking sanctions for spoliation of evidence must prove the following elements: (1) the 7 party having control over the evidence had an obligation to preserve it when it was 8 destroyed or altered; (2) the destruction or loss was accompanied by a ‘culpable state of 9 mind;’ and (3) the evidence that was destroyed or altered was ‘relevant’ to the claims or 10 defenses of the party that sought the discovery of the spoliated evidence.” Surowiec v. 11 Capital Title Agency, Inc., 790 F. Supp. 2d 997, 1005 (D. Ariz. 2011) (internal citations 12 omitted). 13 FSA contends that Defendants have either destroyed or withheld a hard drive that 14 was connected to Carrington’s computer8 before it was produced to FSA. Kuchta opined 15 that based on a forensic image of the computer, a Fujitsu brand hard drive (the “Fujitsu 16 drive”) was used in conjunction with the computer. (Doc. 111-1, Ex. A (Kuchta Exp. 17 Rep.) ¶ 5(A)(2).) Defendants have acknowledged that the Fujitsu drive was the original 18 hard drive installed on the computer. (Doc. 120 at 8.) FSA inquired with Defendants’ 19 counsel on June 20, 2012, about storage devices connected to Carrington’s computer, 20 (see Doc. 111-1, Exs. C, D), and requested copies of hard drives used in conjunction with 21 the computer on November 6, (see Doc. 111-1, Ex. E (Pl.’s Req. for Prod.) at 8). In 22 response to the first inquiry, Defendants’ counsel informed FSA that the Fujitsu drive 23 “crashed sometime around April 2011, and was promptly replaced. [Carrington] said he 24 may still have the crashed hard-drive, and I have asked him to try and locate it.” (Doc. 25 111-1, Ex. D.) Defendants have not yet produced the drive. 26 27 8 28 The computer is identified in Kuchta’s expert report as a Lenovo IdeaPad U450p with serial number CBU0338478. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 4.) - 31 - 1 a. Duty to Preserve 2 The duty to preserve “arises when a party knows or should know that certain 3 evidence is relevant to pending or future litigation.” Surowiec, 790 F. Supp. 2d at 1005 4 (D. Ariz. 2011) (internal citations omitted). The existence of a duty to preserve is 5 determined with reference to the point in time when evidence was destroyed or altered. 6 See id. FSA contends that the Fujitsu drive was last used on the day the computer was 7 produced to FSA. In his expert report, Kuchta lists the Fujitsu drive as having a “last 8 written” date and time of May 29, 2012 and 4:17 a.m. and concludes that it was then 9 attached to the computer. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 5(A)(2).) 10 Defendants’ expert, Tim Greer, opined that Kuchta’s conclusion that seven storage 11 devices including the Fujitsu drive were connected to Carrington’s computer at the same 12 time on the day it was produced is “highly suspicious, and likely wrong.” (Doc. 66-1, Ex. 13 A (Greer Exp. Rep.) at 3.) In fact, Greer’s analysis of the data registry showed as many as 14 sixteen devices connected at once and he did not find any “human-caused file activity” in 15 the hours before or after that time. (Id. at 3–4.) He concluded that “[t]he date/stamp must 16 be the result of a system function, a power issue or some sort of standby/sleep anomaly.” 17 (Id. at 3.) 18 Defendants instead assert that Carrington last used the Fujitsu drive in April 2011 19 when it crashed and was replaced by a new hard drive. (Doc. 20 at 7–8; Doc. 111-1, Ex. 20 D.) In support, Defendants proffer declarations from Carrington’s parents recounting 21 conversations around that time and an e-mail exchange from April 2011 in which 22 Carrington and his father discuss the computer issues.9 (Doc. 120-1, Exs. 2 (April 2011 e- 23 mail exch.); C (William Carrington Depo.) ¶ 11, D (Paula Carrington Depo.) ¶ 4.) 24 Nevertheless, based on his analysis of the forensic image, Greer found that that the 25 26 27 28 9 Defendants argue that those declarations and e-mails are hearsay under Rule 802. They contain Carrington’s out-of-court statements offered for the truth of the matter asserted, namely, that the Fujitsu drive crashed in April 2011. But the Court may consider this evidence because it shows facts to which Carrington and/or his parents may testify at trial. - 32 - 1 Fujitsu drive was “connected at some point” to the computer after the drive was replaced. 2 (Doc. 66-1, Ex. A (Greer Exp. Rep.) at 3.) 3 FSA contends that the attached e-mails and the conversations between Carrington 4 and his mother therein, prove that Carrington was contemplating litigation against FSA as 5 early as March 30, 2011. (See Doc. 120-1, Ex. 1 (March 2011 e-mail exch.).) But FSA 6 does not show why the Fujitsu drive would have been relevant to that litigation, 7 presumably involving employment claims. 8 In light of this evidence, the Court finds that Carrington replaced the Fujitsu hard 9 drive with a new hard drive in April 2011. Although there is evidence that he used the 10 drive between April 2011 and May 2012, the facts do not show when. Nor was this 11 lawsuit filed until January 2012. The filing of the lawsuit would give sufficient notice to 12 the Defendants of their obligation to preserve the hard drive. But, FSA’s Motion requires 13 it to establish that Defendants destroyed the Fujitsu drive after they knew that they had an 14 obligation to preserve it. This FSA has not done; therefore its Motion for Sanctions for 15 the destruction of this hard drive is denied. 16 ii. Spoliation of the Western Drive 17 When the Fujitsu drive crashed in April 2011, Carrington replaced it with a 18 Western Digital brand hard drive (the “Western drive”).10 (Doc. 111 at 5.) FSA contends 19 that the Western drive produced along with Carrington’s computer on May 29, 2012, had 20 been materially altered by Carrington. Kuchta’s forensic analysis shows that software 21 called “CCleaner” was used to erase data on the Western drive on May 12; just a few 22 weeks before production. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 6(A).) Defendants 23 admit that Carrington installed and used CCleaner on May 12, but on no date after that. 24 (Doc. 120 at 5.) 25 /// 26 27 28 10 The Western drive is identified as a 320 GB Western Digital hard drive, Model WD3200BPVT-00HX2T1, with serial number WX21A11A5091. (Doc. 111-1, Ex. A (Kuchta Exp. Rep.) ¶ 4.) - 33 - a. 1 Duty to Preserve 2 FSA brought this suit in January 2012. Therefore when Carrington erased data on 3 the Western drive on May 12, 2012, he had a duty to preserve that and other evidence 4 associated with his computer. Further, Defendants’ counsel “initiated dialogue with 5 [FSA] regarding forensic analysis of Defendant Carrington’s personal laptop” as early as 6 March 9, 2012. (Doc. 45 at 3–4.) Carrington knew or should have known at least in 7 March 2012 that he should preserve information on his computer and the Western drive. b. 8 Culpability 9 When a party on notice intentionally destroys, rather than accidentally loses, that 10 evidence, it is a “willful” spoliator even if it did not intend to deprive an opposing party 11 of relevant evidence. Leon, 464 F.3d at 959 (destruction was willful when a party “knew 12 he was under a duty to preserve [evidence], but intentionally deleted many files and then 13 wrote a program to write over the deleted documents”). Carrington willfully erased data 14 from the Western drive weeks before he produced it to FSA. He knew or should have 15 known at the time that the drive constituted relevant evidence and that he had an 16 obligation to preserve it. 17 Carrington does not declare why he did not preserve data on the Western drive. 18 Defendants in their Response to FSA’s Motion provide the closest statement to an 19 explanation when they ask rhetorically “how much longer than four months after filing of 20 the lawsuit should Defendants have avoided using and maintaining the functionality of 21 the only personal computer available to them?” (Doc. 120 at 12.) They imply that 22 Carrington erased data to improve the performance of his computer. Although the Court 23 can appreciate the practical difficulties with preserving evidence on one’s personal 24 computer, the duty to preserve in the midst of litigation is paramount. Carrington 25 willfully breached that duty. 26 c. Relevance 27 The Western drive was the primary hard drive on Carrington’s personal computer 28 at least from April 2011 to May 2012 when it was produced to FSA. Since Carrington - 34 - 1 still possessed FSA trade secrets on the computer during that time period, data on the 2 Western drive was potentially relevant to FSA’s claims. It is not ascertainable what files 3 the CCleaner erased from the drive. But “because the relevance of destroyed documents 4 cannot be clearly ascertained because the documents no longer exist,” Defendants “can 5 hardly assert any presumption of irrelevance as to the destroyed documents.” Leon, 464 6 F.3d at 959 (internal quotation marks and citation omitted). There are facts sufficient to 7 show likelihood that some of the files erased from the Western drive were relevant to 8 FSA’s claims. 9 d. Sanctions 10 District courts may impose sanctions as part of their inherent power “to manage 11 their own affairs so as to achieve the orderly and expeditious disposition of cases.” 12 Chambers v. NASCO, Inc., 501 U.S. 32, 43, reh’g denied, 501 U.S. 1269 (1991). 13 “Sanctions that a federal court may impose for spoliation include assessing attorney’s 14 fees and costs, giving the jury an adverse inference instruction, precluding evidence, or 15 imposing the harsh, case-dispositive sanctions of dismissal or judgment.” Surowiec, 790 16 F. Supp. 2d at 1008. While using discretion to impose sanctions, if any, “courts generally 17 consider three factors: (1) the degree of fault of the party who altered or destroyed the 18 evidence; (2) the degree of prejudice suffered by the opposing party; and (3) whether 19 there is a lesser sanction that will avoid substantial unfairness to the opposing party.” 20 Apple Inc. v. Samsung Electronics Co., Ltd., 888 F. Supp. 2d 976, 992 (N.D. Cal. 2012) 21 (internal quotation marks and citations omitted). 22 FSA asks for the following sanctions against Defendants: (1) strike the 23 Defendants’ Answer; (2) proscribe Defendants from offering testimony, evidence or 24 argument based on matters likely to have been contained within the Western drive, 25 including argument that Defendants took FSA’s trade secrets for a lawful reason and that 26 they have not and/or do not intend to use the information for profit; (3) an adverse 27 inference instruction to the jury that because Defendants spoliated the Western drive, if 28 the data on the drive were available, it would show that Defendants intended to and/or did - 35 - 1 exploit FSA’s information for profit and that such actions were willful and malicious; and 2 (4) award attorneys’ fees and costs incurred as a result of Defendants’ spoliation. (Doc. 3 111 at 8–9.) 4 An adverse inference instruction is appropriate. “[A] finding of ‘bad faith’ is not a 5 prerequisite” to an imposition of an adverse inference. Glover v. BIC Corp., 6 F.3d 1318, 6 1329 (9th Cir. 1993). But Defendant’s proposed instruction overreaches; it asks the jury 7 to find that the erased data would show Defendants intended to willfully and maliciously 8 profit from their misappropriation. While a court may take the degree of culpability into 9 account when fashioning an adverse inference, it nevertheless must “impose the ‘least 10 onerous sanction’ given the extent of the offending party’s fault and the prejudice to the 11 opposing party.” Napster, 462 F. Supp. 2d at 1078 (quoting Schmid v. Milwaukee Elec. 12 Tool Corp., 13 F.3d 76, 79 (3d Cir. 1994)). 13 Although FSA has shown that the erased data was likely relevant to its claims, 14 they understandably have not been able to prove the contents of that data. Therefore, a 15 more neutral instruction is appropriate. The Court will instruct the jury as follows: 16 17 18 19 20 21 22 Defendants have failed to prevent the destruction of relevant evidence for Plaintiff’s use in this litigation. This failure resulted from their failure to perform their discovery obligations. You may, if you find it appropriate, presume from that destruction that the evidence that was destroyed was relevant to Plaintiff’s case, and that the destroyed evidence was favorable to Plaintiff. Whether this finding is important to you in reaching a verdict in this case is for you to decide. 23 Further, the Court awards $500 to FSA for attorneys’ fees and costs related to its Motion 24 for Sanctions. 25 CONCLUSION 26 The undisputed facts show that Defendants misappropriated FSA’s trade secrets. 27 The existence of damages, however, is disputed; there is evidence that FSA incurred 28 expenses from its investigation of Defendants’ misconduct. Further, the existence of - 36 - 1 malice is disputed. Therefore, an award of exemplary damages and attorneys’ fees are 2 inappropriate at this stage of the litigation. 3 FSA’s expert disclosures contained in declarations attached to its Motion for 4 Sanctions were untimely. Because the delay was not substantially justified or harmless, 5 the declarations are stricken to the extent they contain new expert disclosures. As to the 6 merits of FSA’s Motion, Defendants did not have a duty to preserve the Fujitsu drive in 7 April 2011. Defendants did have a duty to preserve the Western drive in May 2012, 8 willfully spoliated the drive by erasing data on it, and the data may be relevant to FSA’s 9 claims. Therefore, the Court will sanction Defendants by providing an adverse instruction 10 to the jury as described above and awarding attorneys’ fees to FSA in relation to its 11 Motion for Sanctions. IT IS THEREFORE ORDERED that Plaintiff’s Motion for Partial Summary 12 13 Judgment, (Doc. 105), is granted in part and denied in part. 14 IT IS FURTHER ORDERED that Defendants’ Motion for Summary Judgment 15 on Plaintiff’s Cause of Action Under the Arizona Uniform Trade Secrets Act, (Doc. 109), 16 is denied. 17 IT IS FURTHER ORDERED that Plaintiff’s Motion for Sanctions Due to 18 Defendants’ Spoliation of Material Evidence, (Doc. 111), is granted in part and denied 19 in part as follows: (1) 20 21 The Court will provide an adverse inference instruction to the jury as described in this Order. (2) 22 The Court awards $500 for attorneys’ fees and costs incurred by Plaintiff in 23 bringing its Motion for Sanctions, (Doc. 111). 24 /// 25 /// 26 /// 27 /// 28 /// - 37 - 1 IT IS FURTHER ORDERED that Defendant’s Motion to Strike and Preclude 2 Plaintiff’s Untimely Expert Disclosures, (Doc. 134), is granted in part and denied in 3 part. The declarations, (Doc. 111-1, Ex. B (Kuchta Decl.); Doc. 122-1, Ex. 1 (Kuchta 4 Decl.)), are stricken only to the extent that they contain new expert disclosures and not in 5 their entirety. 6 Dated this 23rd day of August, 2013. 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 - 38 -

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.