Silver Fern Chemical Inc v. Lyons et al, No. 2:2023cv00775 - Document 70 (W.D. Wash. 2023)

Court Description: ORDER granting in part and denying in part Defendants' 45 Motion to Dismiss. Plaintiff's CFAA claim is DISMISSED with leave to amend. Should Plaintiff choose to amend, the amended complaint should be filed within thirty (30) days of this Order. Signed by Judge Tana Lin. (MJV)

Download PDF
Silver Fern Chemical Inc v. Lyons et al Doc. 70 1 2 3 4 5 6 7 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 8 9 10 11 SILVER FERN CHEMICAL, INC., a Washington corporation, 12 13 14 15 16 Plaintiff, CASE NO. 2:23-cv-00775-TL ORDER ON MOTION TO DISMISS v. SCOTT LYONS, an individual; TROY KINTO, an individual; KING HOLMES, an individual; ROWLAND MORGAN, an individual; and AMBYTH CHEMICAL COMPANY, a Washington corporation, Defendants. 17 18 19 This is an action for damages and injunctive relief for the misappropriation of trade 20 secrets, breach of contract, and other related claims. This matter is before the Court on 21 Defendants’ Motion to Dismiss. Dkt. Nos. 45 (motion), 49-1 (praecipe). Having reviewed 22 Plaintiff’s response (Dkt. No. 47), Defendants’ reply (Dkt. No. 48), and the relevant record, and 23 finding oral argument unnecessary, see Local Civil Rule 7(b)(4), the Court GRANTS IN PART and 24 DENIES IN PART the motion with leave to amend. ORDER ON MOTION TO DISMISS - 1 Dockets.Justia.com 1 2 3 I. A. BACKGROUND Factual Background Plaintiff Silver Fern Chemical, Inc., is a chemical distribution company based in Seattle, 4 Washington. Dkt. No. 7 (sealed complaint) ¶¶ 1, 9. Defendants Scott Lyons, Troy Kinto, and 5 King Holmes are former employees and salespeople of Plaintiff and current employees of 6 Defendant Ambyth Chemical Company, also based in Seattle. Id. ¶ 1, 10–12, 14. Defendant 7 Rowland Morgan is the operator of Defendant Ambyth. Id. ¶¶ 13, 68. 8 The general background of this matter was detailed in the Court’s Order denying 9 Plaintiff’s motion for a temporary restraining order (“TRO”). See Dkt. No. 40 at 2–3. The Court 10 recites below the factual allegations relevant to the instant motion, as alleged by Plaintiff in the 11 Complaint. 12 1. 13 Plaintiff has spent years and millions of dollars building customer relationships. Dkt. Trade Secrets 14 No. 7 ¶ 24. To maintain relationships and serve its customers, Plaintiff collects and maintains 15 extensive information regarding each customer’s needs and how that customer conducts 16 business: product needs and specifications, timing needs, delivery needs, the employees and 17 owners who handle a diverse range of responsibilities for the customer, and contact information 18 for the point person that purchases its chemicals. Id. ¶¶ 26, 28, 31. 19 Plaintiff also invests a lot of employee time and money to evaluate each of its vendors, 20 and to ensure the quality and unique specifications of the chemicals that each vendor supplies. 21 Id. ¶¶ 33–34. This information includes evaluations of risk in working with a prospective vendor, 22 the outcomes of those relationships, the vendor’s products, and details about the vendor’s 23 manufacturing, logistics, and business practices. Id. ¶¶ 35, 43. Plaintiff also engages in a long 24 and labor-intensive process of vendor and product qualification with any given customer. Id. ORDER ON MOTION TO DISMISS - 2 1 ¶ 41. This process includes providing samples and documentation to the customer, and can 2 involve layers of technical, regulatory, and quality assessments regarding the specific product 3 and specific manufacturer. Id. ¶ 41. Plaintiff’s customer and vendor information is maintained in two main password- 4 5 protected databases and under multiple layers of access and password restrictions. Id. 6 ¶¶ 29, 61(f)–(h). Employees are required to acknowledge confidentiality requirements and to 7 sign a separate Confidentiality Agreement. Id. ¶ 63. The information Plaintiff seeks to protect is 8 not generally known, and Plaintiff has invested millions of dollars in collecting, analyzing, and 9 storing this information for its sole economic benefit. Id. ¶¶ 64–65. 10 2. 11 Between January 17 and April 17, 2023, Defendants Holmes, Kinto, and Lyons attempted Computer Activity 12 to “permanently delete” thousands of items from their email mailboxes with Plaintiff. Dkt. No. 7 13 ¶¶ 92–94. A large portion of those items were deleted on April 14, their last day of employment. 14 Id. However, during this period, Defendants’ email accounts were on a litigation hold, meaning 15 that their deleted items were not, in fact, permanently deleted. Id. ¶ 96. Defendants did not have a 16 legitimate business purpose for attempting to delete the items. Id. ¶ 95. Plaintiff specifically 17 advised its employees—including multiple times during Defendants’ employment—that emails 18 were company property and should not be deleted. Id. 19 B. Procedural History 20 On May 24, 2023, Plaintiff filed the instant action. Dkt. Nos. 1, 7 (sealed). On June 2, the 21 Court denied Plaintiff’s motion for a TRO. Dkt. No. 40. On June 14, Defendants filed the instant 22 motion to dismiss all federal claims and the remaining state claims for lack of subject matter 23 jurisdiction. Dkt. Nos. 45, 49-1; see also Dkt. No. 48 (reply). Plaintiff opposes. Dkt. No. 47. 24 ORDER ON MOTION TO DISMISS - 3 1 2 II. LEGAL STANDARD A defendant may seek dismissal when a plaintiff fails to state a claim upon which relief 3 can be granted. Fed. R. Civ. P. 12(b)(6). In reviewing a Rule 12(b)(6) motion to dismiss, the 4 Court takes all well-pleaded factual allegations as true and considers whether the complaint 5 “state[s] a claim to relief that is plausible on its face.” Ashcroft v. Iqbal, 556 U.S. 662, 678 6 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). While “[t]hreadbare 7 recitals of the elements of a cause of action, supported by mere conclusory statements” are 8 insufficient, a claim has “facial plausibility” when the party seeking relief “pleads factual content 9 that allows the court to draw the reasonable inference that the defendant is liable for the 10 misconduct alleged.” Iqbal, 556 U.S. at 672. “When reviewing a dismissal pursuant to Rule . . . 11 12(b)(6), ‘we accept as true all facts alleged in the complaint and construe them in the 12 light most favorable to plaintiff[ ], the non-moving party.’” DaVinci Aircraft, Inc. v. United 13 States, 926 F.3d 1117, 1122 (9th Cir. 2019) (alteration in original) (quoting Snyder & Assocs. 14 Acquisitions LLC v. United States, 859 F.3d 1152, 1156–57 (9th Cir. 2017)). 15 III. DISCUSSION 16 Defendants argue that Plaintiff has not stated a federal claim under the Computer Fraud 17 and Abuse Act (“CFAA”), 18 U.S.C. § 1030, or for misappropriation of trade secrets under the 18 Defend Trade Secrets Act (“DTSA”), 18 U.S.C. § 1836 et seq., and the analogous state law, the 19 Washington Uniform Trade Secrets Act (“WUTSA”), RCW 19.108.010 et seq. See Dkt. No. 49- 20 1 at 9-17; Dkt. No. 48 at 5–15. Defendants further argue that the Court should decline to exercise 21 supplemental jurisdiction over the remaining state-law claims. See Dkt. No. 49-1 at 17; Dkt. 22 No. 48 at 15–16. Plaintiff opposes on all grounds. See Dkt. No. 47. 23 24 ORDER ON MOTION TO DISMISS - 4 1 2 A. First Cause of Action: CFAA Plaintiff alleges that Defendants Lyons, Kinto, and Holmes “permanently deleted” 3 company emails, even after Plaintiff instructed them not to delete emails. See Dkt. No. 7 ¶¶ 91– 4 96, 130–33. Defendants argue that these allegations do not state a claim under the CFAA 5 because Plaintiff does not allege that these Defendants exceeded their authorization to access the 6 information. See Dkt. No. 49-1 at 9–11; Dkt. No. 48 at 5–7. Plaintiff responds that the 7 Defendants “utilized their authorized access to unlawfully alter—i.e., delete—information that 8 they were not entitled to delete.” Dkt. No. 47 at 15. 9 10 11 12 13 14 15 16 17 The CFAA states in relevant part: Whoever . . . knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period . . . shall be punished as provided in subsection (c) of this section. 18 U.S.C. § 1030(a)(4); see also 18 U.S.C. § 1030(g) (creating private right of action). To bring a private action under § 1030(a)(4), a plaintiff must show that a defendant: 18 “(1) accessed a ‘protected computer,’ (2) without authorization or exceeding such authorization 19 that was granted, (3) ‘knowingly’ and with ‘intent to defraud,’ and thereby (4) ‘further[ed] the 20 intended fraud and obtain[ed] anything of value,’ causing (5) a loss to one or more persons 21 during any one-year period aggregating at least $5,000 in value.” LVRC Holdings LLC v. Brekka, 22 581 F.3d 1127, 1132 (9th Cir. 2009). “The statute thus provides two ways of committing the 23 crime of improperly accessing a protected computer: (1) obtaining access without authorization; 24 and (2) obtaining access with authorization but then using that access improperly.” Facebook, ORDER ON MOTION TO DISMISS - 5 1 Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1066 (9th Cir. 2016) (quoting Musacchio v. United 2 States, 577 U.S. 237, 240 (2016)). 3 “The term ‘exceeds authorized access’ means to access a computer with authorization 4 and to use such access to obtain or alter information in the computer that the accesser is not 5 entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). “As this definition makes clear, an 6 individual who is authorized to use a computer for certain purposes but goes beyond those 7 limitations is considered by the CFAA as someone who has ‘exceed[ed] authorized access.’” 8 Brekka, 581 F.3d at 1133. “‘[E]xceeds authorized access’ is limited to violations of restrictions 9 on access to information, and not restrictions on its use.” United States v. Nosal, 676 F.3d 854, 10 863 (9th Cir. 2012) (en banc) (emphases in original); see also Van Buren v. United States, 141 S. 11 Ct. 1648, 1662 (2021) (“[A]n individual ‘exceeds authorized access’ when he accesses a 12 computer with authorization but then obtains information located in particular areas of the 13 computer—such as files, folders, or databases—that are off limits to him.”). 14 Here, the Court finds that Plaintiff has not stated a claim under the CFAA. Plaintiff 15 essentially alleges that Defendants Lyons, Kinto, and Holmes violated a use restriction imposed 16 by Plaintiff—that is, deletion of emails in violation of company policy, which amounts to 17 “altering” information that they were not entitled to delete. See Dkt. No. 7 ¶¶ 92–96; Dkt. No. 47 18 at 15. But this argument is squarely foreclosed by Nosal and Van Buren, in which both the Ninth 19 Circuit and the United States Supreme Court rejected Plaintiff’s understanding of the CFAA. 20 In Nosal, employees of an executive search firm were authorized to access a computer 21 database of confidential information, but they downloaded and transferred information to the 22 defendant in violation of a company policy forbidding disclosure of confidential information. 23 676 F.3d at 856. In a prosecution under 18 U.S.C. § 1030(a)(4), the government argued (among 24 other things) that the word “so” in 18 U.S.C. § 1030(e)(6) means “in that manner,” which would ORDER ON MOTION TO DISMISS - 6 1 refer to “use restrictions.” Nosal, 676 F.3d at 857. The court found that Congress enacted the 2 CFAA “primarily to address the growing problem of computer hacking” and that the phrase 3 “exceeds unauthorized access” thus would apply not to persons who use a computer for an 4 unauthorized purpose, but rather to “individuals whose initial access to a computer is authorized 5 but who access unauthorized information or files.” Id. (emphasis added). Notably, the court 6 observed that “[e]mployer-employee and company-consumer relationships are traditionally 7 governed by tort and contract law,” but the government’s proposed interpretation “allows private 8 parties to manipulate their computer-use and personnel policies so as to turn these relationships 9 into ones policed by the criminal law.” Id. at 860. 10 Similarly, in Van Buren, a police sergeant was authorized to access a law enforcement 11 computer database, but he ran a license-plate search in exchange for money in violation of 12 department policy. 141 S. Ct. at 1653. In a prosecution under 18 U.S.C. § 1030(a)(2), which 13 relies on the same statutory definition of “exceeds authorized access” at issue here, 18 U.S.C. 14 § 1030(e)(6), the government argued (as it did in Nosal) that the defendant was not “entitled [ ] 15 to obtain” the records at issue. Van Buren, 141 S. Ct. at 1654. Like the Ninth Circuit, the 16 Supreme Court rejected the government’s interpretation as inconsistent with the statutory text, 17 context, and structure, as well as leading to far-reaching (and undesirable) consequences. Id. at 18 1654–62. Notably, the Supreme Court described CFAA liability as “a gates-up-or-down 19 inquiry—one either can or cannot access a computer system, and one either can or cannot access 20 certain areas within the system.” Id. at 1658–59. 21 Nosal and Van Buren are materially indistinguishable from this matter. There is no 22 dispute that Defendants Lyons, Kinto, and Holmes had authorization to access their company 23 emails when they did (compare Dkt. No. 49-1 at 11, with Dkt. No. 47 at 15), just as the 24 employees in Nosal had authorization to access the confidential database, 676 F.3d at 856, and ORDER ON MOTION TO DISMISS - 7 1 just as the sergeant in Van Buren had authorization to access the law enforcement database, 141 2 S. Ct. at 1653. Further, Plaintiff states the “gravamen” of its complaint is that the Defendants 3 altered (i.e., deleted) information that they were not entitled to delete under company policy 4 (Dkt. No. 47 at 15), just as the employees in Nosal (and the defendant-recipient) were alleged to 5 have obtained (i.e., downloaded and transferred) information they were not entitled to transfer 6 under company policy, and just as the sergeant in Van Buren was alleged to have obtained (i.e., 7 searched database for) information he was not entitled to access under department policy. 1 Thus, 8 like the defendants in Nosal and Van Buren, Defendants are not liable under the CFAA for either 9 obtaining information that they were otherwise authorized to access or for allegedly misusing 10 that information. See also, e.g., United Fed’n of Churches, LLC v. Johnson, 598 F. Supp.3d 11 1084, 1095 n.8 (W.D. Wash. 2022) (holding defendants did not exceed authorized access where 12 there was “no allegation that Defendants obtained or altered information from areas of [a 13 website] beyond their authorized access” (emphasis added)). Therefore, Plaintiff’s CFAA claim 14 will be dismissed. However, Plaintiff offers to amend its complaint to state a claim under a different 15 16 provision of the CFAA, 18 U.S.C. § 1030(a)(5)(A). See Dkt. No. 47 at 15 n.2 (citing 1-800 17 Remodel, Inc. v. Bodor, No. C18-472, 2018 WL 6340759, at *7 (C.D. Cal. Oct. 17, 2018) and 18 United States v. Grupe, No. CR17-90, 2018 WL 775358, at *3 (D. Minn. Feb. 8, 2018)). 19 Defendants oppose granting leave to amend, arguing that Plaintiff “cannot cure its deficiencies” 20 because “the emails were not, in fact, deleted” (citing Dkt. No. 7 ¶ 96) and that Plaintiff “already 21 22 23 24 1 Plaintiff protests that Defendants cite no cases involving deletion of data (as opposed to downloads and transfers). See Dkt. No. 47 at 15–16. This distinction is unavailing, as “obtain” and “alter” are textually located in the same part of the statute. See 18 U.S.C. § 1030(e)(6). ORDER ON MOTION TO DISMISS - 8 1 declined an opportunity to amend.” 2 Dkt. No. 48 at 7. But Defendants cite no authorities for their 2 argument that Plaintiff cannot cure. Without the benefit of a proper pleading and full briefing on 3 a motion to dismiss, the Court cannot say at this early stage that amendment would be futile. Accordingly, as to Plaintiff’s CFAA claim, Defendants’ motion is GRANTED with leave to amend. 4 5 B. Fourth and Fifth Causes of Action: DTSA & WUTSA 6 Plaintiff alleges that its subject trade secrets are “its compilation of information related to 7 its customers and vendors.” Dkt. No. 47 at 17; see Dkt. No. 7 ¶¶ 1–44, 147–74. Defendants argue 8 only that Plaintiff has not described the trade secrets with sufficient particularity, instead offering 9 “impermissible conclusory allegations” with “vague” and “nonspecific” references. 3 See Dkt. 10 No. 49-1 at 11–16; Dkt. No. 48 at 9–11. Defendants also briefly argue that Plaintiff has not 11 sufficiently alleged knowledge or acquisition of trade secrets by Defendants Morgan or Ambyth. 12 See Dkt. No. 49-1 at 16–17. Plaintiff opposes. See Dkt. No. 47 at 17–26. The DTSA defines “trade secret” as 13 all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if— 14 15 16 17 18 19 2 20 21 22 23 24 Defendants certify that prior to filing this motion, they offered to withdraw the motion and stipulate to an amendment, but Plaintiff did not accept the offer. See Dkt. No. 48 at 18. Going forward, the Court expects the Parties to work together to resolve disputes efficiently and thus conserve judicial resources. 3 “Defendants do not disagree that ‘[c]ompliations of customer information may be a trade secret.’ ” Dkt. No. 48 at 8 (quoting Robbins, Geller, Rudman & Dowd, LLP v. State, 328 P.3d 905, 911 (Wash. Ct. App. 2014) (emphasis in original)). Further, in their reply, Defendants raise new arguments regarding other aspects of Plaintiff’s misappropriation claims, such as the confidentiality of the subject information and evidence of misconduct. See Dkt. No. 48 at 9, 12–15. Defendants did not move for dismissal on these grounds. “The district court need not consider arguments raised for the first time in a reply brief.” Zamani v. Carnes, 491 F.3d 990, 997 (9th Cir. 2007). Therefore, the Court will disregard these arguments. ORDER ON MOTION TO DISMISS - 9 1 (A) the owner thereof has taken reasonable measures to keep such information secret; and 2 3 4 (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information. 5 18 U.S.C. § 1839(3); see also 18 U.S.C. 1836(b)(1) (creating private right of action). 6 Similarly, the WUTSA defines trade secret as 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 information, including a formula, pattern, compilation, program, device, method, technique, or process that: (a) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. RCW 19.108.010(4); see also RCW 19.108.030–19.108.040 (establishing remedies). “Under either statute, ‘[t]herefore, the definition of trade secret consists of three elements: (1) information, (2) that is valuable because it is unknown to others, and (3) that the owner has attempted to keep secret.’” Genasys Inc. v. Vector Acoustics, LLC, 638 F. Supp. 3d 1135, 1151 (S.D. Cal. 2022) (analyzing DTSA and California’s version of the Uniform Trade Secrets Act, substantially similar to the WUTSA) (quoting InteliClear, LLC v. ETC Glob. Holdings, Inc., 978 F.3d 653, 657 (9th Cir. 2020)). “Although the complaint need not ‘spell out the details of the trade secret,’ a plaintiff seeking relief for trade secret misappropriation must identify the trade secret ‘with sufficient particularity . . . to permit the defendant to ascertain at least the boundaries within which the secret lies.’” Bombardier Inc. v. Mitsubishi Aircraft Corp., 383 F. Supp. 3d 1169, 1178 (W.D. Wash. 2019) (quoting SMS Signature Cars v. Connects Mktg. LLC, No. C12-1300, 2012 24 ORDER ON MOTION TO DISMISS - 10 1 WL 12893935, at *2 (C.D. Cal. Oct. 29, 2012)). “The relevant portions of the DTSA and 2 [W]UTSA are almost identical,” and thus they can be analyzed together. Id. 3 Finally, this Court has held that “at the motion to dismiss stage, ‘a plaintiff should not be 4 compelled to divulge with specificity all of its possible trade secrets . . . in order to proceed to 5 discovery.’” RealD Spark LLC v. Microsoft Corp., No. C22-942, 2023 WL 3304250, at *3 (W.D. 6 Wash. May 8, 2023) (emphasis in original) (quoting T-Mobile USA, Inc. v. Huawei Device USA, 7 Inc., 115 F. Supp. 3d 1184, 1193 (W.D. Wash. 2015)). “In a trade secret case, a plaintiff should 8 not be expected to publicly disclose the details that would expose—and therefore, destroy—the 9 trade secret in order to begin a case. Therefore, it is ordinarily sufficient for a plaintiff to provide 10 descriptions of the categories of the asserted trade secrets in a complaint.” Id. (citing The Sedona 11 Conference, The Sedona Conference Commentary on the Proper Identification of Asserted Trade 12 Secrets in Misappropriation Cases, 22 Sedona Conf. J. 223, 248 (2021)). 13 Here, the Court finds that Plaintiff has described its trade secrets with sufficient 14 particularity to state a claim under the DTSA and WUTSA. Plaintiff essentially pleads that its 15 compilations of customer and vendor information are its trade secrets. Dkt. No. 7 ¶¶ 23–66; see 16 also Dkt. No. 47 at 9–11. Plaintiff explains that it collects and maintains information on 17 customer needs “and how that customer conducts business: its product needs and specifications, 18 its timing needs, its delivery needs, the employees and owners who handle a diverse range of 19 responsibilities for the customer, and more.” Dkt. No. 7 ¶ 26; see also id. ¶ 31 (describing its 20 “compilation of customer data” as including “confidential information regarding customers’ 21 products, timing, delivery needs, and much more”); id. ¶¶ 61(f)–(g) (detailing contents of 22 “Salesforce Database” and “Customer information files,” including approved manufacturers and 23 products, requirements, special requests, and more). Similarly, Plaintiff alleges that it collects 24 and maintains information about its vendors, including assessments of risk in working with a ORDER ON MOTION TO DISMISS - 11 1 particular vendor (id. ¶ 35), confidential information about their products (id. ¶ 43), and “details 2 about their manufacturing, logistics and business practices” (id.). See also id. ¶¶ 61(f), (h) 3 (detailing contents of “Salesforce Database” and “Vendor information files,” including detail of 4 products offered, pricing, certifications and guarantees, and more). 5 Plaintiff’s descriptions of its customer and vendor information are sufficient to permit 6 Defendants to ascertain the boundaries within which the trade secrets lie. Bombardier, 383 F. 7 Supp. 3d at 1178; see NW Monitoring LLC v. Hollander, 534 F. Supp. 3d 1329, 1336–37 (W.D. 8 Wash. 2021) (at motion-to-dismiss stage, holding allegation of “customer pricing information” 9 was sufficient to identify trade secret); Bite Tech Inc. v. X2 Impact, Inc., No. C12-1267, 2012 10 WL 13018749, at *4 (W.D. Wash. Dec. 21, 2012) (at motion-to-dismiss stage, holding 11 allegations of disclosures to plaintiff “regarding [defendant’s] technology, research and 12 development, future products, business plans and business partners” was sufficient to identify 13 trade secret in impact sensing technology); Albert’s Organics, Inc. v. Holzman, 445 F. Supp. 3d 14 463, 473 (N.D. Cal. 2020) (at motion-to-dismiss stage, holding allegations of customer 15 information including “names of [plaintiff’s] customers and suppliers,” “pricing and financial 16 resources,” and “key confidential business relationships” were sufficient to identify trade secret); 17 cf. Brocade Commc’ns Sys., Inc. v. A10 Networks, Inc., 873 F. Supp. 2d 1192, 1214 (N.D. Cal. 18 2012) (denying defendant’s motion for summary judgment on particularity of trade secret where 19 defined to include “confidential customer-related information including customer lists and 20 contact information, pricing guidelines, historical purchasing information, and customers’ 21 business needs/preferences”). 22 Defendants’ authorities are distinguishable. See Dkt. No. 49-1 at 13–15. In Vendavo, Inc. 23 v. Price f(x) AG, the alleged categories of trade secrets were more varied and swept more broadly 24 than they do here. No. C17-6930, 2018 WL 1456697, at *3 (N.D. Cal. Mar. 23, 2018) (alleging ORDER ON MOTION TO DISMISS - 12 1 theft of customer and vendor information, but also, inter alia, “source code,” “marketing plans 2 and strategic business development initiatives,” and “other information related to the 3 development of its price-optimization software”). In Genasys, the plaintiff did not explain “how 4 and why” the categories of information (including client data and pricing information) were 5 protected trade secrets, instead relying on “conclusory buzzwords.” 638 F. Supp. 3d at 1151–52. 6 In both Olson Kundig, Inc. v. 12th Avenue Iron, Inc. and Synopsys, Inc. v. ATopTech, Inc., trade 7 secret allegations arose in the context of product design where identification of specific 8 components would be needed. No. C22-825, 2022 WL 4534422, at *8 (W.D. Wash. Sept. 28, 9 2022); No. C13-2965, 2013 WL 5770542, at *6 (N.D. Cal. Oct. 24, 2013). While Multifab, Inc. 10 v. Zweiger involved customer information, the case turned on whether a trade secret existed in a 11 single customer’s information when the customer’s identity was already known. No. C19-6164, 12 2020 WL 2614736, at *4 (W.D. Wash. May 22, 2020). And while CAE Integrated, LLC v. Moov 13 Technologies Inc. involved customer identities, the case turned on whether the customer list at 14 issue qualified as a trade secret given the bounded nature of the relevant industry. No. C21-377, 15 2021 WL 6497092, at *4–5 (W.D. Tex. Dec. 22, 2021). 16 The Court makes no comment on whether the subject information is ultimately a 17 protected trade secret, or whether this level of particularity will be sufficient at later stages of this 18 litigation. But Defendants are currently on notice that information about the needs and offerings 19 of Plaintiff’s customers and vendors are the alleged secrets—categories of information that 20 should be readily familiar to a firm in the chemical distribution industry. It is difficult to imagine 21 greater particularity without requiring Plaintiff to divulge the very compilations at issue. 22 The Court also finds that at this stage, Plaintiff has stated a claim of misappropriation 23 against Defendants Morgan and Ambyth. Defendants offers only four sentences of argument 24 (with no authorities) that Plaintiff makes a “speculative leap” between the alleged facts and these ORDER ON MOTION TO DISMISS - 13 1 Defendants’ liability. See Dkt. No. 49-1 at 16–17. The argument is buried at the end of a seven- 2 page section nominally about the particularity of trade secrets. See id. at 11–17. It is thus little 3 surprise that Plaintiff does not address the argument in its response. Regardless, Plaintiff pleads 4 that Defendants Lyons, Kinto, and Holmes had communications with Defendants Morgan and 5 Ambyth not long before their departure from Plaintiff (Dkt. No. 7 ¶¶ 67–77) and that some of 6 Plaintiff’s customers made or attempted communications with Defendants after their departure 7 from Plaintiff (id. ¶¶ 113–25), all of which plausibly allege that Defendants Morgan and Ambyth 8 encouraged or conspired to commit the alleged misappropriation of trade secrets. Accordingly, as to Plaintiff’s trade secrets claims, Defendants’ motion is DENIED. 9 10 11 C. Supplemental Jurisdiction Finally, Defendants argue that if no legally sufficient federal claims remain in this matter, 12 the Court should decline supplemental jurisdiction over Plaintiff’s state law claims. See Dkt. 13 No. 49-1 at 17; Dkt. No. 48 at 15–16. Plaintiff opposes. See Dkt. No. 47 at 26–28. 14 As discussed above, the Court will allow Plaintiff to replead its CFAA claim and will not 15 dismiss Plaintiff’s trade secrets claims. Therefore, the Court will retain jurisdiction over 16 Plaintiff’s state law claims. See 28 U.S.C. § 1367(c). 17 18 IV. CONCLUSION Accordingly, Defendants’ Motion to Dismiss (Dkt. Nos. 45, 49-1) is GRANTED IN PART 19 and DENIED IN PART. Plaintiff’s CFAA claim is DISMISSED with leave to amend. Should Plaintiff 20 choose to amend, the amended complaint should be filed within thirty (30) days of this Order. 21 Dated this 19th day of December 2023. A 22 23 Tana Lin United States District Judge 24 ORDER ON MOTION TO DISMISS - 14

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.