throbber
Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 1 of 15 Page ID #:533
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` O
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`CENTRAL DISTRICT OF CALIFORNIA
`
` Case No.: 2:21-cv-06815-MEMF(MARx)
`
`ORDER GRANTING DEFENDANTS
`NADYA TEYFUKOVA AND
`ENTERTAINMENT DATA ORACLE, INC.’S
`MOTION TO DISMISS [ECF NO. 75] AND
`DENYING PLAINTIFF ISPOT.TV, INC’S
`REQUEST FOR CERTIFICATION FOR
`INTERLOCTORY APPEAL [ECF NO. 79]
`
`
`
`ISPOT.TV, INC.,
`
`Plaintiff,
`
`
`
`v.
`
`
`
`NADEZHDA TEYFUKOVA a/k/a NADYA
`TEYFUKOVA, AND ENTERTAINMENT
`DATA ORACLE, INC.,
`
`Defendants.
`
`
`
`
`
`
`
`
`
`Before the Court is the Motion to Dismiss Plaintiff’s Digital Millennium Copyright claim
`filed by Defendants Nadezhda Teyfukova and Entertainment Data Oracle, Inc. ECF No. 75. Also
`before the Court is the Request for Certification for Interlocutory Appeal, filed by Plaintiff iSpot.TV,
`Inc. ECF No. 79. For the reasons stated herein, the Motion to Dismiss is GRANTED. The Request
`for Certification for Interlocutory Appeal is DENIED.
`
`
`
`1
`
` /
`
` / /
`/ / /
`
`
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 2 of 15 Page ID #:534
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`I.
`
`Factual and Procedural Background1
`The Court previously summarized the case background in its Order Granting in Part and
`Denying in Part Defendants’ Motions to Dismiss. ECF No. 71 (“Order”). As such, the Court only
`recites the factual and procedural background as it is relevant to the instant Motion.
`A. Factual Background
`Plaintiff iSpot.tv, Inc. (“iSpot”) is a data and analytics company which provides its clients
`with real-time television advertising data and analytics. SAC ¶ 2. iSpot stores its data in a database
`(the “Database”) that is only accessible to customers that have entered into a subscription agreement
`(“Agreement”) and pay a subscription fee. Id. The Agreement binds all customers to iSpot’s terms of
`service. Id. Customers can only access the Database with a “unique account login and security
`credentials associated with a specific customer and that customer’s subscription.” Id.
`Defendant Entertainment Data Oracle, Inc. (“EDO”) is a “data, measurement, and analytics
`company that advances the success of marketing, research, and creative professionals.” Id. EDO
`provides companies with “insights” into the efficacy of TV ads, specifically as the data relates to
`consumer engagement and purchase activity. Id. ¶ 24.
`From 2014 to 2017, EDO and iSpot entered into three Agreements, granting EDO access to
`the Database. See id. ¶¶ 3–5. However, EDO—in violation of the Agreements—downloaded tens of
`thousands of iSpot’s ads and data. Id. ¶ 7. In 2018, upon expiration of iSpot and EDO’s final
`Agreement, EDO launched two new products: the “TV Ad Database” and the “TV Ad Engagement”
`platforms. Id. ¶ 8. Both products appear to compete with the Database. Id.
` Defendant Nadezhda Teyfukova a/k/a Nadya Teyfukova (“Teyfukova”), is an EDO
`employee. Id. ¶ 9. Prior to joining EDO in 2019, Teyfukova was an employee of Horizon Media
`(“Horizon”), a media services agency that provided services to an iSpot customer. Id. ¶¶ 51–52. As
`part of her role at Horizon, Teyfukova was granted login credentials (the “Horizon credentials”) to
`the Database, including a username linked specifically to her Horizon email address,
`nteyfukova@horizonmedia.com. Id. ¶¶ 51–52.
`
`1 Unless otherwise indicated, the following facts are derived from the Second Amended Complaint. ECF No.
`74 (“SAC”).
`
`
`
`2
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 3 of 15 Page ID #:535
`
`
` Teyfukova was “only permitted to use these login credentials” for the explicit purpose of
`accessing iSpot’s database in the course of her work for Horizon’s customer. Id. ¶ 52. In September
`2019, Teyfukova left Horizon for her current role at EDO. Id. ¶ 54. At EDO, she continued to use the
`Horizon credentials during typical work hours, to access the iSpot database, doing so over 150 times
`including many times from EDO’s Culver City location and her personal home in Los Angeles. Id.
`¶¶ 9, 54–55. She accessed and downloaded over 40 reports related to the movie industry. Id. ¶¶ 55–
`56.
`
`B. Procedural Background
`On August 24, 2021, iSpot filed its initial complaint against Teyfukova pleading the
`
`following: (1) violation of the Defend Trade Secrets Act, 18 U.S.C. § 1836, et seq.; (2)
`misappropriation of trade secrets, CAL. CIV. CODE § 3426.1, et seq.; and (2) violation of the Digital
`Millennium Copyright Act, 17 U.S.C. § 1201, et seq. (“DMCA”) ECF No. 1. On February 7, 2022,
`see ECF Nos. 23, 28, Teyfukova filed a motion to dismiss. ECF No. 34.
`
`On April 15, 2022, the EDO Defendants filed a motion to dismiss all four claims for failure
`to state a claim. ECF No. 55. On October 3, 2022, EDO filed an additional motion to dismiss
`pursuant to Federal Rule of Civil Procedure 12(b)(1) seeking dismissal of iSpot’s breach of contract
`claim for lack of subject matter jurisdiction. ECF No. 62. On January 25, 2023, the Court issued an
`order granting in part and denying in part the EDO Defendants’ Motion to Dismiss for failure to
`state a claim, and denied EDO’s Motion to Dismiss for lack of subject matter jurisdiction. See
`generally Order. The Court granted the Motion to Dismiss as to iSpot’s DMCA claim with leave to
`amend. Id. at 17–22.
`On February 24, 2023, iSpot filed a timely SAC. See SAC. On March 20, 2023, the EDO
`Defendants filed a Motion to Dismiss the DMCA claim. ECF No. 75 (“Motion” or “Mot.”). The
`Motion was fully briefed as of April 14, 2023. ECF Nos. 79 (“Opposition” or “Opp’n”); 81
`(“Reply”). The Court heard oral argument on May 4, 2023.
`
`3
`
` /
`
` / /
`/ / /
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 4 of 15 Page ID #:536
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`II.
`
`Applicable Law
`A. Motion to Dismiss pursuant to Rule 12(b)(6)
`Under Federal Rule of Civil Procedure Rule 12(b)(6), a party may file a motion to dismiss
`for “failure to state a claim upon which relief can be granted.” FED. R. CIV. P. 12(b)(6). The purpose
`of Rule 12(b)(6) is to “enable defendants to challenge the legal sufficiency of claims asserted in a
`complaint.” Rutman Wine Co. v. E. & J. Gallo Winery, 829 F.2d 729, 738 (9th Cir. 1987). A district
`court may properly dismiss a claim under Rule 12(b)(6) if the complaint fails to allege sufficient
`facts to support a cognizable legal theory. Caltex Plastics, Inc. v. Lockheed Martin Corp., 824 F.3d
`1156, 1159 (9th Cir. 2016).
`“To survive a motion to dismiss, a complaint must contain sufficient factual matter . . . to
`‘state a claim for relief that is plausible on its face.’” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009)
`(quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). “The plausibility standard is not
`akin to a ‘probability requirement,’ but it asks for more than a sheer possibility that a defendant has
`acted unlawfully.” Id. While a complaint does not need detailed factual allegations, a plaintiff’s
`obligation to provide the grounds of his entitlement to relief requires more than “threadbare recitals
`of the elements of a cause of action.” Id. at 678. “Determining whether a complaint states a plausible
`claim for relief is ‘a context-specific task that requires the reviewing court to draw on its judicial
`experience and common sense.’” Ebner v. Fresh, Inc., 838 F.3d 958, 963 (9th Cir. 2016) (quoting
`Iqbal, 556 U.S. at 679).
`When evaluating a complaint under Rule 12(b)(6), the court “must accept all well-pleaded
`material facts as true and draw all reasonable inferences in favor of the plaintiff.” Caltex, 824 F.3d at
`1159; Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008) (“We
`accept factual allegations in the complaint as true and construe the pleadings in the light most
`favorable to the nonmoving party.”). This tenet, however, is “inapplicable to legal conclusions.”
`Iqbal, 556 U.S. at 678.
`While the Court is required to “take all allegations of material fact as true and construe them
`in the light most favorable to the nonmoving party” on a Rule 12(b)(6) motion to dismiss, In re Nat’l
`Football League’s Sunday Ticket Antitrust Litig., 933 F.3d 1136, 1149 (9th Cir. 2019), the plaintiff
`
`
`
`
`
`4
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 5 of 15 Page ID #:537
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`is required to plead sufficient facts showing “more than a sheer possibility that a defendant has acted
`unlawfully.” Iqbal, 556 U.S. at 678. However, when the plaintiff has met the possibility threshold
`and, in response, the defendant has advanced an alternative explanation that is also more than
`possible, the Ninth Circuit requires that the plaintiff’s complaint survive motion to dismiss. Starr v.
`Baca, 652 F.3d 1202, 1216 (9th Cir. 2011). Put differently, “[i]f there are two alternative
`explanations, one advanced by defendant and the other advanced by plaintiff, both of which are
`plausible, plaintiff’s complaint survives a motion to dismiss under Rule 12(b)(6).” Id.
`Plausibility is more than mere possibility. Plausibility requires that the plaintiff “do more
`than allege facts that are merely consistent with both their explanation and defendants’ competing
`explanation.” In re Century Aluminum Co. Sec. Litig., 729 F.3d 1104, 1108 (9th Cir. 2013) (citing
`Iqbal, 556 U.S. at 678). Thus, when both parties have advanced “possible explanations,” where only
`one is true and “only one of which results in liability,” a plaintiff must offer allegations that are more
`than “merely consistent” with their advanced explanation. Id. Instead, “[s]omething more is needed,
`such as facts tending to exclude the possibility that the alternative explanation is true in order to
`render plaintiffs’ allegations plausible within the meaning of [Iqbal] and [Twombly].” Id. (internal
`citations omitted) (citing Iqbal, 556 U.S. at 678 and Twombly, 550 U.S. at 554).
`
`III. Discussion
`The EDO Defendants seek to dismiss the DMCA claim ag on the grounds that the SAC fails
`to cure the defects identified in the Court’s Order as it does not allege conduct that rises to
`circumvention under the meaning of DMCA. Mot. at 1, 4–8.
`
`A. Summary of new allegations
`The Court begins by recounting the new allegations raised in the SAC as to the DMCA
`claim. iSpot alleges as follows:
`
` Through her employment with Horizon, Ms. Teyfukova was provided confidential
`password and account login credentials allowing her to access iSpot’s secure
`database. Ms. Teyfukova’s user ID for access to iSpot’s database was
`“nteyfukova@horizonmedia.com”, an email address reflecting that she was
`employed at Horizon and was conducting work on behalf of Horizon’s specific
`iSpot customer. Ms. Teyfukova knew that she was only permitted to use these
`
`
`
`
`
`5
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 6 of 15 Page ID #:538
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`confidential login credentials and access iSpot’s database in the course and
`furtherance of her work at Horizon on behalf of that single iSpot customer. SAC ¶
`52;
`
`In September 2019, Ms. Teyfukova left Horizon and began working for EDO as a
`Media Analytics Manager servicing EDO’s movie studio clients. At the time, EDO
`had over 100 employees. Ms. Teyfukova reported to a direct supervisor at EDO and
`was also under the direction and control of other EDO employees and officers
`during her employment. Id. ¶ 54;
`
` Even though she was only authorized to use the iSpot services while at Horizon and
`in the course of her work on behalf of the single iSpot client Horizon was assisting,
`Ms. Teyfukova took her confidential iSpot access credentials with her when she
`left Horizon and joined EDO in early September 2019. She then used those stolen
`credentials for the benefit of EDO, and at the knowing direction and control of EDO,
`with the purpose of evading and bypassing the technological security barriers that
`restricted access to the iSpot database and services to only authorized users in order
`to continue logging into the iSpot database and using the iSpot services after leaving
`Horizon when she was no longer authorized to do so. Ms. Teyfukova was aware of
`these technological security barriers from her prior work at Horizon and knew they
`were intended to prevent unauthorized access to the iSpot database and services,
`but she intentionally used the stolen Horizon credentials at EDO’s knowing
`direction and control to benefit EDO in violation of her duty of loyalty to Horizon
`and with the primary purpose of evading those barriers in order to gain access to
`iSpot’s system. Each time that Ms. Teyfukova logged into the iSpot database, she
`committed at least two separate wrongful acts. First, she intentionally and falsely
`misrepresented that she was still an employee of Horizon, acting within the course
`of scope of such employment and on the behalf of iSpot’s customer that Horizon
`was assisting, by entering the username nteyfukova@horizonmedia.com. Second,
`with knowledge that she was not authorized to do so, she utilized the password that
`had been authorized for her use solely for work in the course and scope of her
`employment at Horizon on behalf of the iSpot customer that Horizon was assisting.
`Ms. Teyfukova repeated these separate wrongful acts over 150 times to access
`iSpot’s database after joining EDO, viewing thousands of pages of information in
`iSpot’s database and generating and downloading hundreds of reports that
`contained proprietary information from iSpot’s database. Id. ¶ 55;
`
` Ms. Teyfukova accessed iSpot’s database and stole its data in the course of her
`employment with EDO, at the knowing direction and control of her direct
`supervisor and others at EDO, and for EDO’s benefit, using the confidential login
`credentials provided to her by Horizon and in violation of her duty of loyalty to
`Horizon. Once Ms. Teyfukova joined EDO, the IP addresses used to login to iSpot’s
`database with her credentials almost immediately shifted to Culver City, where
`EDO is headquartered. When COVID shelter-in-place orders were issued and Ms.
`Teyfukova began working from home full time for EDO, the IP addresses used for
`many logins with her credentials shifted to the zip code where she resides. For
`example, during a two-day stretch in November 2019, the Teyfukova credentials
`were used to access the iSpot database multiple times from both Culver City and
`from Ms. Teyfukova’s home zip code, and nearly 40 detailed data reports generated
`
`6
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 7 of 15 Page ID #:539
`
`
`and downloaded related to the movie industry (EDO’s and Ms. Teyfukova’s focus)
`taken during those logins. The majority of logins using the Teyfukova credentials
`also occurred during normal business hours on weekdays, at times when Ms.
`Teyfukova would be at work for EDO. Id. ¶ 56;
`
` Additionally, iSpot is informed and believes, and based on such information and
`belief alleges, that EDO knowingly and intentionally induced Ms. Teyfukova, as a
`condition of her employment at EDO, to further violate her duty of loyalty to
`Horizon, her former employer, by also turning over to EDO the sensitive and
`confidential iSpot password and username given to her solely for her use as an
`employee of Horizon to enable other employees of EDO, including Ms.
`Teyfukova’s direct supervisor at EDO and other additional employees of EDO, as
`well as automated software and information technology systems of EDO under
`EDO’s control, to access iSpot’s proprietary database by bypassing its password
`protection gating system to view and download valuable information under the
`knowingly false pretext of supposedly being “nteyfukova@horizonmedia.com” –
`an employee of Horizon. The primary purpose of the actions of Ms. Teyfukova,
`EDO, and other EDO employees, including Ms. Teyfukova’s supervisor, was to
`knowingly evade iSpot’s technological database protections and break into its
`database by bypassing the iSpot’s credential gating system restricting access to the
`database to only properly authorized users, including certain employees of Horizon.
`Id. ¶ 57.
`
`
`B. iSpot fails to state a claim under the Digital Millennium Copyright Act.
`iSpot brings a claim against the EDO Defendants under the anticircumvention provision of
`the DMCA on two grounds: (1) Teyfukova’s use of the Horizon credentials during her time at EDO
`and (2) the use of the Horizon credentials by EDO employees other than Teyfukova. See SAC ¶¶ 54,
`56–57.
`To state a claim under the anticircumvention provision of the DMCA, iSpot must allege that
`(i) the work at issue was protected under the Copyright Act, (ii) the copyrighted work was protected
`by a “technological measure,” and (iii) the technological measure was “circumvented” in order to
`obtain access to the copyrighted work.” 17 U.S.C. § 1201(a)(1)(A); see also MDY Indus., LLC v.
`Blizzard Ent., Inc., 629 F.3d 928, 944 (9th Cir. 2010) (noting that 17 U.S.C. § 1201(a) “prohibits the
`circumvention of any technological measure that effectively controls access to a protected work and
`grants copyright owners the right to enforce that prohibition.”).
`A technological measure “effectively controls access to a work if the measure, in the
`ordinary course of its operation, requires the application of information, or a process or a treatment,
`with the authority of the copyright owner, to gain access to the work.” Id. (a)(3)(B) (internal
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`7
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 8 of 15 Page ID #:540
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`quotation marks omitted). “Circumvention” is “to descramble a scrambled work, to decrypt an
`encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological
`measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A).
`
`1. Teyfukova’s use of the Horizon credentials does not qualify as circumvention.
`The EDO Defendants argue that the SAC “presents no new allegations” as to whether
`Teyfukova’s individual use of the Horizon credentials qualifies as circumvention. Mot. at 5. iSpot’s
`DMCA claim now appears to proceed on three theories: (1) that Teyfukova’s use of the Horizon
`credentials after the end of her tenure at Horizon qualifies as a violation of the DMCA; (2) that
`Teyfukova engaged in circumvention by sharing the Horizon credentials with other EDO employees;
`and (3) that the other EDO employees’ use of the Horizon credentials qualifies as circumvention. See
`Opp’n at 7–16; SAC ¶¶ 51–52, 55–57.
`However, before the Court turns to its substantive analysis, it reiterates2 that as the Ninth
`Circuit has yet to rule on circumvention in this particular context, the Court’s analysis must begin
`with the text of the DMCA. See Texaco Inc. v. United States, 528 F.3d 703, 707 (9th Cir. 2008)
`(“The first step in interpreting a statute ‘is to determine whether the language at issue has a plain and
`unambiguous meaning with regard to the particular dispute in the case.’” (citing Robinson v. Shell
`Oil Co., 519 U.S. 337, 340 (1997))).3 The statute provides the following definition of circumvention:
`“to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass,
`remove, deactivate, or impair a technological measure, without the authority of the copyright
`owner.” 17 U.S.C. § 1201(a)(3)(A). To determine whether iSpot has properly pleaded
`circumvention, therefore, this Court must consider whether iSpot has properly alleged that
`Teyfukova “avoid[ed], bypass[ed], remove[d], deactivate[d], or impair[ed]” the technological
`measure at issue—namely the password and username system. Id.
`/ / /
`
`
`
`2 See Order at 19–21.
`3 See also Food Mktg. Inst. v. Argus Leader Media, 139 S. Ct. 2356, 2364 (2019) (“In statutory interpretation
`disputes, a court’s proper starting point lies in a careful examination of the ordinary meaning and structure of
`the law itself.”).
`
`
`
`8
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 9 of 15 Page ID #:541
`
`
`a. Teyfukova’s individual use of the Horizon credentials does not qualify as circumvention.
`
`The Court previously found that “[t]he allegations in the FAC indicate that, rather than
`avoiding or bypassing the system, Teyfukova simply used the Horizon credentials as they were
`intended to be used.” Order at 19. The new allegations in the SAC do not lead the Court to a
`different conclusion.
`The SAC now appears to advance the theory that EDO utilized Teyfukova—as the possessor
`of the Horizon credentials—as a tool by which EDO gained access to the system. SAC ¶¶ 55
`(Teyfukova used the “stolen credentials for the benefit of EDO, and at the knowing direction and
`control of EDO, with the purpose of evading and bypassing the technological security barriers that
`restricted access to the iSpot database and services to only authorized users in order to continue
`logging into the iSpot database and using the iSpot services after leaving Horizon when she was no
`longer authorized to do so”); 56 (“at the knowing direction and control of her direct supervisor and
`others at EDO, and for EDO’s benefit, using the confidential login credentials provided to her by
`Horizon and in violation of her duty of loyalty to Horizon.”); 57 (“EDO knowingly and intentionally
`induced Ms. Teyfukova, as a condition of her employment at EDO, to further violate her duty of
`loyalty to Horizon, her former employer, by also turning over to EDO the sensitive and confidential
`iSpot password and username given to her solely for her use as an employee of Horizon.”).
` iSpot relies heavily on section 2860 of the California Labor Code, which provides that
`“[e]verything which an employee acquires by virtue of his employment, except the compensation
`which is due to him from his employer, belongs to the employer, whether acquired lawfully or
`unlawfully, or during or after the expiration of the term of his employment.” CAL. LAB. CODE §
`2860. iSpot argues that this provision indicates that Horizon retained ownership of the credentials
`upon Teyfukova’s departure from Horizon, and that Teyfukova “violated her duty of loyalty to
`Horizon” when she knowingly used the credentials outside the scope of her employment at Horizon.
`Opp’n at 13. The EDO Defendants argue that the legitimacy of the login credentials is the
`dispositive factor because it forecloses the possibility that Teyfukova personally took any steps to
`qualify as circumvention under the plain meaning of the statute. Mot. at 4–7.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`9
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 10 of 15 Page ID #:542
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`The Court finds iSpot’s argument unavailing. Even if EDO directed Teyfukova to utilize the
`Horizon credentials to access the Database, it does not change the fact that Teyfukova did not take
`any steps that qualify as circumvention within the plain meaning of the statute. The SAC still only
`alleges that Teyfukova individually used the credentials in the technological manner by which she
`was authorized to do so—albeit without authorization. Indeed, the SAC still does not allege that
`Teyfukova took any steps to avoid, bypass, remove, deactivate, or impair the Horizon credentials.
`Adding that the purpose of her actions was to bypass the technological security barriers is not
`enough given what is alleged to be “bypassing.” Put another way, she simply did not evade the
`protections of the database in the means prohibited by the statute. Accordingly, the SAC has not
`addressed the flaw identified in the Court’s Order.4
`Similarly, whether Horizon maintained ownership over the credentials has no bearing on
`whether Teyfukova’s use of the credentials qualifies as circumvention. The SAC still only indicates
`that “Teyfukova utilized a username and password that was duly provided to her long after she was
`authorized to use it.” Order at 20. Whether Teyfukova violated any loyalty to Horizon or whether
`Horizon retained ownership of the credentials is irrelevant to the question of whether she
`“avoid[ed],” “bypass[ed],” or “impair[ed]” the Horizon credentials. See Order at 19–20.
`As such, Teyfukova’s individual use of the Horizon credentials does not constitute
`circumvention within the meaning of the DMCA.
`
`b. That Teyfukova shared the Horizon credentials with other EDO employees, or that other
`EDO employees used the credentials to access the Database, does not qualify as
`circumvention.
`
`The SAC is not any more successful with respect to Teyfukova’s sharing of the Horizon
`credentials with other EDO employees. The SAC alleges that
`
`
`4 iSpot makes much of this Court’s prior statement that “There are no allegations that the primary
`purpose of Teyfukova’s actions was to evade iSpot’s database protections. In the absence of such
`allegations, the Court finds that Teyfukova’s actions—as alleged in the FAC—do not qualify as
`circumvention within the meaning of the DMCA.” Order at 21. Taken in context, it is clear that the
`Court did not hold that pleading such a purpose would be sufficient. The purpose obviously cannot
`change the act itself—which in this instance, does not qualify as circumvention.
`
`
`
`
`
`10
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 11 of 15 Page ID #:543
`
`
`
`that EDO . . . induced Ms. Teyfukova . . . to further violate her duty of loyalty to
`Horizon, her former employer, by also turning over to EDO the sensitive and
`confidential iSpot password and username given to her solely for her use as an
`employee of Horizon to enable other employees of EDO, including Ms.
`Teyfukova’s direct supervisor at EDO and other additional employees of EDO,
`as well as automated software and information technology systems of EDO under
`EDO’s control, to access iSpot’s proprietary database by bypassing its password
`protection gating system to view and download valuable information under the
`knowingly false pretext of supposedly being “nteyfukova@horizonmedia.com” –
`an employee of Horizon.
`
`SAC ¶ 57 (emphasis added).
`
`iSpot argues that these allegations are sufficient as they indicate that individuals other than
`
`Teyfukova, used the Horizon credentials to access the Database. Opp’n at 15–16. The EDO
`Defendants, however, contend these allegations are insufficient as they incorrectly focus on the
`individuals who used the technological measure rather than the “manner” by which the measure was
`used. Reply at 6. Thus, according to the EDO Defendants, iSpot has failed to state a claim as the
`SAC fails to “differentiat[e] the means by which other EDO employees allegedly accessed iSpot’s
`database from the means by which Ms. Teyfukova allegedly accessed iSpot’s database.” Mot. at 7.
`The Court agrees.
`Even upon amendment, the SAC solely relies on the EDO Defendants’ “intent” and “primary
`purpose” of utilizing the Horizon credentials. Opp’n at 15–16. iSpot argues that Teyfukova acted as
`a “housekeeper who [did] not return the door key of her former employer and then [was] induced to
`give the key to a burglar,” and thus used the key outside of the scope of its intended use. Id. at 11.
`But this argument still fails to show that Teyfukova, or any other EDO employee, made any material
`changes to the proverbial key itself—or the lock or the door.
`To reiterate, “circumvention” is “to descramble a scrambled work, to decrypt an encrypted
`work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without
`the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A) (emphasis added). Most relevant
`here is the statute’s relationship between “circumvention” and “technological measure.” The
`wording of the statute indicates that “circumvention” requires some manipulation of the
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`11
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 12 of 15 Page ID #:544
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`technological measure at hand and certainly more than that a username and password was simply
`transferred into the hands of another.
`As such, the accessing of the Database with unaltered Horizon credentials by EDO
`employees, see SAC ¶ 57, does not constitute circumvention. 5
`
`The SAC appears to suffer from the same deficiencies that existed in the previous complaint.
`iSpot still fails to allege that the Horizon credentials were “descramble[d] . . . decrypt[ed] . . . or
`otherwise to avoid[ed], bypass[ed], remove[d], deactivate[d], or impair[ed].” Absent such
`allegations, the SAC again fails to plausibly allege a violation the DMCA. Thus, the Court GRANTS
`Motion to Dismiss with respect to iSpot’s third cause of action for violation of the DMCA.
`As a general rule, leave to amend a dismissed complaint should be freely granted unless it is
`clear the complaint could not be saved by any amendment.  Fed. R. Civ. P. 15(a); Manzarek v. St.
`Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). In this instance, in light of the
`theory advanced by iSpot to date, it appears that iSpot cannot save this claim by amendment. It is
`therefore dismissed WITHOUT LEAVE TO AMEND.
`C. The Court grants iSpot’s request for certification for interlocutory appeal.
`
`Finally, iSpot requests that, in the event the Court grants the instant Motion to Dismiss, the
`Court certify the instant order for interlocutory appeal. Opp’n at 16. This request is premised on the
`“split of authority in the case law” and lack of circuit authority “as to whether the unauthorized use
`of a password and username qualify as circumvention under the DMCA.” Id.6
`
`
`5 iSpot focuses heavily on the Court’s statement that “In the absence of facts indicating that an EDO
`employee other than Teyfukova used the Horizon credentials, the Court finds that its analysis as to
`Teyfukova’s use of the credentials stands.” Order at 22. But merely alleging that others used the credentials in
`the manner they were designed and intended to and with permission of Teyfukova—as opposed to a
`hypothetical scenario where a third-party managed to steal the credentials—does not transform these actions
`into circumvention. (To be clear, this hypothetical scenario is not considered here and itself might not
`constitute circumvention.)
`6 The EDO Defendants contend that the request is premature and thus must be denied. Reply at 7. But as this
`Order includes a final determination on the EDO Defendants’ Motion to Dismiss, and as iSpot’s request is
`contingent on the Court having granted the Motion, the Court finds the request’s timing appropriate.
`
`
`
`
`
`12
`
`

`

`Case 2:21-cv-06815-MEMF-MAR Document 90 Filed 05/22/23 Page 13 of 15 Page ID #:545
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`A district judge may certify for immediate appeal an otherwise unappealable interlocutory
`order if (1) “such order involves a controlling question of law”; (2) “there is substantial ground for
`difference of opinion” on the issue; and (3) “an immediate appeal from the order may materially
`advance the ultimate termination of the litigation.” 28 U.S.C. § 1292(b).
`Because Section 1292(b) “is a departure from the normal rule that only final judgments are
`appealable,” it “must be construed narrowly” and invoked only in “rare circumstances.” James v.
`Price Stern Sloan, Inc., 283 F.3d 1064, 1067 n.6 (9th Cir. 2002)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket