throbber
Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 1 of 16
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF CALIFORNIA
`
`)
`)
`
`))
`
`THERAPEUTIC RESEARCH FACULTY,
`Plaintiff,
`)
`v.
`)
`NBTY, INC., REXALL SUNDOWN, INC., )
`)
`and LE NATURISTE J.M.B. INC.,
`
`)
`Defendants.
`)
` )
`Defendants NBTY, Inc. (“NBTY”) and Rexall Sundown, Inc.
`(“Rexall Sundown”) (collectively “Defendants”) move to dismiss eight
`of the thirteen claims alleged in Plaintiff’s Second Amended Complaint
`(“Complaint”) under Federal Rule of Civil Procedure 12(b)(6).1
`Plaintiff opposes the motion. For the following reasons, Defendants’
`motion is denied.
`
`2:05-cv-2322-GEB-DAD
`
`ORDER*
`
`BACKGROUND
`Plaintiff is an organization that provides analysis of drug
`therapy information and advice for professionals in the medical
`
`This case was determined to be suitable for decision without
` *
`oral argument. L.R. 78-230(h).
`Defendant Le Naturiste has not joined in this Motion.
` 1
`
`1
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 2 of 16
`
`community. (Compl. ¶ 12.) Plaintiff owns copyrights in the Natural
`Medicines Comprehensive Database (the “Publication”) which “includes
`over 1,100 pharmacist-prepared monographs containing detailed
`evidence-based information.” (Id. ¶¶ 2, 12.) The Publication is
`available both annually, in a hard copy print edition, and through
`subscription, in a continually updated online version contained in a
`passcode-protected area of Plaintiff’s website. (Id. ¶ 2.) There are
`two different types of subscriptions: “[a]n annual single user
`limited-purpose subscription for Internet access . . . which was made
`available in April and May 2002 for under $100” and “site licenses for
`organizations or corporations with higher usage patterns [which] are
`sold for many thousand dollars.” (Id. ¶ 15.)
`NBTY purchased a single user subscription to the Publication
`and thereby entered into a single user license agreement with
`Plaintiff. (Id. ¶ 3.) The single user license agreement “limits
`access to ‘one and only one person,’ either ‘accessing information for
`personal use’ or ‘for the benefit of an individual patient or as part
`of an educational exercise.’” (Id. ¶ 5.) In addition,
`[e]ach . . . [s]ingle [u]ser [l]icense
`specifically provides that access is limited to
`the individual employee and that ‘under no
`circumstances may [the employee] permit any person
`or entity, including [] fellow employees or
`employer, to use [the employee’s] passcodes for
`the purpose of accessing the site, nor may [the
`employee] use [his/her] passcodes to access the
`site for anyone else.’
`
`(Id.) Nonetheless, Plaintiff claims that NBTY “shared the
`confidential username and passcode among many [of its employees] for
`two-and-a-half years, thereby infringing on [Plaintiff’s] rights in
`the Publication.” (Id. ¶ 3.)
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`2
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 3 of 16
`
`Plaintiff also alleges that NBTY and Rexall Sundown
`infringed on its rights in the Publication when Rexall Sundown used
`the confidential username and passcode from NBTY’s single user
`subscription without authorization. (Id.) Finally, Plaintiff claims
`that NBTY “improperly and deceptively obtained access to the
`Publication for Le Naturiste employees” under a group license
`agreement entered into between Plaintiff and NBTY to address the
`previously alleged violations of the single user license agreement.
`(Id. ¶¶ 3, 40.) Under the group license agreement, only twelve
`designated researchers employed by NBTY or Rexall Sundown were
`permitted to access the Publication. (Id. ¶ 3.)
`Defendants move to dismiss eight claims: copyright
`infringement, contributory copyright infringement, vicarious copyright
`infringement, violation of the Computer Fraud and Abuse Act (“CFAA”)
`(under 18 U.S.C. § 1030), violation of Title II of the Electronic
`Communications Privacy Act (“ECPA”) (under 18 U.S.C. § 2701),
`violation of the California Comprehensive Data Access and Fraud Act
`(under section 502 of the California Penal Code), trespass and
`misappropriation of trade secret. (Mot. at 2.)
`DISCUSSION
`Dismissal is appropriate under Rule 12(b)(6) if Plaintiff
`failed to (1) present a cognizable legal theory, or (2) plead
`sufficient facts to support a cognizable legal theory. Robertson v.
`Dean Witter Reynolds, Inc., 749 F.2d 530, 533-34 (9th Cir. 1984).
`When considering a motion to dismiss, all material allegations in the
`Complaint must be accepted as true and construed in the light most
`favorable to Plaintiff. Scheuer v. Rhodes, 416 U.S. 232, 236 (1974);
`Cahill v. Liberty Mut. Ins. Co., 80 F.3d 336, 337-38 (9th Cir. 1996).
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`3
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 4 of 16
`
`In addition, Plaintiff is given the benefit of every reasonable
`inference that can be drawn from the allegations in the Complaint.
`Retail Clerks Int’l Ass’n v. Shermahorn, 373 U.S. 746, 753 n.6 (1963).
`Accordingly, a motion to dismiss must be denied “unless it appears
`beyond doubt that [Plaintiff] can prove no set of facts in support of
`[its] claim which would entitle [it] to relief.” Conley v. Gibson,
`355 U.S. 41, 45-46 (1957).
`I. Copyright Infringement
`“A plaintiff must meet two requirements to establish a prima
`facie case of copyright infringement: (1) ownership of the allegedly
`infringed material and (2) violation by the alleged infringer of at
`least one of the exclusive rights granted to copyright holders.” LGS
`Architects, Inc. v. Concordia Homes of Nev., 434 F.3d 1150, 1156 (9th
`Cir. 1996). Under § 106 of the Copyright Act:
`[T]he owner of copyright . . . has the exclusive
`rights to do and to authorize any of the
`following: (1) to reproduce the copyrighted works
`in copies or phonorecords;(2) prepare derivative
`works based on the copyrighted words; (3) to
`distribute copies or phonorecords of the
`copyrighted work to the public by sale or other
`transfer of ownership, or by rental, lease, or
`lending; (4) in the case of literary, musical,
`dramatic, and choreographic works, pantomimes, and
`motion pictures and other audiovisual works, to
`perform the copyrighted work publicly; (5) in the
`case of literary, musical, dramatic, and
`choreographic works, pantomines, and pictorial,
`graphic or sculptural works, including the
`individual images of a motion picture or other
`audiovisual work, to display the copyrighted work
`publicly; (6) in the case of sound recordings, to
`perform the copyrighted work publicly, by means of
`a digital audio transmission.
`17 U.S.C. § 106.
`The parties dispute whether Plaintiff has sufficiently
`alleged a violation of any of its exclusive rights under § 106 of the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`4
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 5 of 16
`
`Copyright Act. Defendants argue that Plaintiff’s contention that its
`copyrights have been infringed by unauthorized access to the
`Publication “is not the type of conduct subject to protection by the
`copyright laws--the allegation simply has nothing to do with
`Defendants copying Plaintiff’s work.” (Mot. at 3.) Plaintiff
`responds that the term “copying” is used to describe a violation of
`any one of the copyright holder’s exclusive rights, such as the right
`to reproduce, display and distribute, and Plaintiff has adequately
`alleged that Defendant has violated these rights. (Opp’n at 9-10.)
`Plaintiff alleges in its Complaint that Defendants “have
`willfully and without [Plaintiff’s] permission infringed [its]
`copyrights by engaging in the systematic, regular and repeated
`unauthorized access to the Publication” and that Plaintiff “has been
`irreparably harmed by [D]efendants’ unauthorized access to and
`reproduction of its copyrighted works.” (Compl. ¶¶ 48, 49.) In
`particular, Plaintiff alleges that an “employee pasted text from the
`Publication into an email and forwarded it to three other employees”
`who were unauthorized users and that “NBTY employees improperly
`accessed the Publication for the purpose of preparing [] FDA
`notifications and maintaining files evidencing support for product
`labeling . . . .” (Id. ¶¶ 31, 26.)
`“The word ‘copying’ is shorthand for the infringing of any
`of the copyright owner’s exclusive rights, described [in § 106 of the
`Copyright Act].” S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085,
`n.3 (9th Cir. 1989). “‘[C]opying’ for purposes of copyright law
`occurs when [copyrighted material] is transferred from [the memory of
`one computer to the other].” MAI Sys. Corp. v. Peak Computer, Inc.,
`991 F.2d 511, 519 (9th Cir. 1993). Plaintiff’s claim of “unauthorized
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`5
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 6 of 16
`
`access,” including allegations regarding pasting of text from the
`copyrighted work into an email, sending of emails to unauthorized
`users and improperly accessing the Publication for purposes of
`preparing FDA notifications, sufficiently alleges a violation of
`Plaintiff’s exclusive rights to display, reproduce and distribute its
`work protected by the Copyright Act. (Id. ¶¶ 48, 31, 26.)
`Defendants also argue that “Plaintiff fails to allege that
`Defendants’ allegedly infringing conduct involved Plaintiff’s original
`work” since “[p]urely factual information . . . may not be
`copyrighted.” (Mot. at 4.) Plaintiff alleges in its Complaint that
`the Publication “includes over 1,100 pharmacist-prepared monographs
`containing detailed evidence-based information” and that it
`“constitutes original material authored by Therapeutic Research
`pursuant to the Copyright Act.” (Compl. ¶¶ 12, 16.)
`“Addressing the threshold of copyrightability . . ., the
`Supreme Court [has] held that ‘[t]he sine quanon of copyright[ability]
`is originality’ and that ‘[o]riginal, as the term is used in
`copyright, means only that the work was independently created by the
`author (as opposed to copied from other works), and that it possesses
`at least some minimal degree of creativity.’” Ets-Hokin v. Skyy
`Spirits, Inc., 225 F.3d 1068, 1076 (9th Cir. 2000) (quoting Feist
`Pub’lns, Inc. v. Rural Tel. Servs. Co., 499 U.S. 340, 345 (1991)).
`“Feist . . . described the requisite degree of creativity as
`‘extremely low, even a slight amount will suffice. The vast majority
`of works make the grade quite easily, as they possess some creative
`spark . . . .’” Id. Accordingly, given the low threshold of
`creativity required to create an “original work” and accepting the
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`6
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 7 of 16
`
`allegations in the Complaint as true, Plaintiff has adequately pled
`that Defendants’ conduct infringed its “original work.”
`For the stated reasons, Defendants’ Motion to dismiss
`Plaintiff’s copyright infringement claim is denied. Further, since
`Defendants’ move to dismiss Plaintiff’s claims for contributory and
`vicarious copyright infringement for the same reasons discussed above,
`Defendants’ motion to dismiss those claims are also denied. (Mot. at
`4-5.)
`II. The CFAA
`Defendants also seek dismissal of Plaintiff’s CFAA claim,
`arguing that Plaintiff “has not plead the requisite type of economic
`damages . . . under [the CFAA]” since Plaintiff has not “allege[d]
`that it has incurred a ‘loss’ of $5,000, as contemplated by
`[subsection (a)(5)(B)(i) of the CFAA, 18 U.S.C. § 1030(a)(5)(B)(i)]”
`where “loss” refers to damage to a computer. (Id. at 5, 6.)
`Plaintiff alleges in its Complaint that it “has suffered damage and
`loss by reason of [Defendants’ violations of 18 U.S.C. § 1030(a)(2),
`(5) and (6)]” and thus it “is entitled to damages, injunctive relief
`and other equitable relief as provided by 18 U.S.C. § 1030(g).”2
`
`18 U.S.C. § 1030 (a)(2), (5) and (6) provide for relief in
` 2
`accordance with § 1030(g) when one:
`[I]ntentionally accesses a computer without authorization or
`exceeds such authorized access, and thereby obtains . . .
`information from any protected computer if the conduct
`involved an interstate or foreign communication [;]
`knowingly causes the transmission of a . . . code . . . and
`as a result of such conduct, intentionally causes damage
`without authorization, to a protected computer [;] and
`knowingly, and with intent to defraud traffics . . . in any
`password or similar information through which a computer may
`be accessed without authorization, if . . . such trafficking
`affects interstate or foreign commerce . . . .
`(continued...)
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`7
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 8 of 16
`
`(Compl. ¶ 74.) Plaintiff further contends that the access unlawfully
`obtained by [] Defendants was valued at materially more than $5,000
`per year” and that given the statutory definitions of “loss” and
`“damage,” “courts have . . . routinely applied the [CFAA] to losses
`that do not involve impairment to a computer, including those arising
`from unauthorized access or the infringement of intellectual
`property.” (Opp’n at 15, 16.)
`Section 1030(g) states, in relevant part:
`Any person who suffers damages or loss by reason
`of this section may maintain a civil action
`against the violator to obtain compensatory
`damages and injunctive relief or other equitable
`relief. A civil action for violation of this
`section may be brought only if the conduct
`involves 1 of the factors set forth in clause (i),
`(ii), (iii), (iv) or (v) of subsection (a)(5)(B).
`Damages for a violation involving any conduct
`described in subsection (a)(5)(b)(i) are limited
`to economic damages.
`18 U.S.C. § 1030(g). Subsection (a)(5)(B)(i) allows recovery of
`damages.3 Id. § 1030(a)(5)(B)(i). Section 1030(e)(8) defines
`“damage” as “any impairment to the integrity or availability of data,
`a program, a system or information.” Id. § 1030(e)(8). See generally
`Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F.
`Supp. 2d 1121, 1126 (W.D. Wash. 2000) (stating “the alleged access and
`disclosure of trade secrets” constituted an “impairment to the
`integrity of data . . . or information.”). The alleged unauthorized
`
` 2(...continued)
`18 U.S.C. § 1030(a)(2)(c); (a)(5)(A)(i); (a)(6)(A).
`
`18 U.S.C. § 1030 (a)(5)(B)(i) provides that “by conduct
` 3
`described in clause (i), (ii), or (iii) of subparagraph (A), [whoever]
`caused . . . (i) loss to 1 or more persons during any 1-year period .
`. .aggregating at least $5,000 in value . . . shall be punished as
`provided in subsection (c) of this section.”
`
`8
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 9 of 16
`
`access to the Publication and the disclosure of its information may
`constitute an impairment to the integrity of data or information even
`though “no data was physically changed or erased.” Id.
`Section 1030(e)(11) defines “loss” as “any reasonable cost
`to any victim, including the cost of responding to an offense,
`conducting a damage assessment, and restoring the data, program,
`system or information to its condition prior to the offense, and any
`revenue lost, cost incurred, or other consequential damages incurred
`because of interruption of service.” 18 U.S.C. § 1030(e)(11).
`Plaintiff’s loss allegation includes the claim that it suffered loss
`as a result of Defendants’ breach of the single user license
`agreement. (Compl. ¶¶ 37, 15.) Plaintiff argues “a full corporate
`license for NBTY and its subsidiaries would cost approximately forty
`thousand dollars . . . per year,” as opposed to under $100 for “an
`annual single user limited-purpose subscription for Internet
`access . . . .” (Id. ¶ 15.)
`
`Plaintiff’s allegations sufficiently state a claim under the
`CFAA. See generally Charles Schwab & Co. v. Carter, 2005 WL 351929,
`at *3 (N.D. Ill. Feb. 11, 2005) (stating “several district courts have
`recognized that damage caused by unauthorized access or access in
`excess of authorization to a computer system may be redressed under
`the CFAA.”) (internal citations omitted). Therefore, Defendants’
`motion to dismiss the CFAA claim is denied.
`III. Electronic Communications Privacy Act (“ECPA”)
`Defendants seek dismissal of Plaintiff’s claim under the
`ECPA. (Mot. at 7.) Plaintiff alleges that Defendants violated Title
`II of the ECPA, which states in pertinent part:
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`9
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 10 of 16
`
`[W]hoever . . . intentionally accesses without
`authorization a facility through which an
`electronic communication service is provided; or .
`. . intentionally exceeds an authorization to
`access that facility; and thereby obtains, alters,
`or prevents authorized access to a wire or
`electronic communication while it is in electronic
`storage in such system shall be punished . . . .
`18 U.S.C. § 2702.
`Specifically, Plaintiff alleges that Defendants
`“intentionally access[ed] without authorization, or [] intentionally
`exceed[ed] an authorization to access, the password-protected areas of
`[its] Internet web site[;]” obtained “access to electronic
`communications while such communications were in electronic storage on
`that web site . . . [;and,] disclos[ed] such communications to third
`parties [who were] not authorized to receive them [] and []
`conspir[ed], encourag[ed], aid[ed], abett[ed], and participat[ed] in
`efforts to do so.” (Compl. ¶ 76.)
` Defendants argue dismissal is appropriate because the
`claims are barred by an exception prescribed in § 2701(c). Section
`2701(c) of the ECPA provides, in relevant part, that an exception
`exists “with respect to conduct authorized (1) by the person or entity
`providing a wire or electronic communications service; [or] (2) by a
`user of that service with respect to a communication of or intended
`for that user.” 18 U.S.C. § 2701(c)(1), (2). Defendants argue
`“[b]ecause [they] were authorized to access the [Publication], the
`authorization exception to the ECPA is triggered . . . .” (Mot. at
`7.) Plaintiff counters that “the vast majority of [Defendants’]
`access was not authorized, as repeatedly alleged in the Complaint.”
`(Opp’n at 17.) Defendants neither show how they satisfy the first
`exception nor that they come within the ambit of the second exception.
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`10
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 11 of 16
`
`Defendants also argue that Plaintiff does not state an ECPA
`claim because even though “Plaintiff contends that [] Defendants used
`the [Publication] in excess of the usage permitted under the relevant
`license agreements, such conduct does not trigger a claim under the
`ECPA.” (Id.) But it is “‘evident that the sort of trespasses to
`which the [ECPA] applies are those in which the trespasser gains
`access to information . . . which he is not entitled to see . . . .’”
`Int’l Ass’n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F.
`Supp. 2d 479, 497 (D. Md. 2005) (quoting Educ. Testing Serv. v.
`Stanley H. Kaplan, Educ. Ctr., Ltd., 965 F. Supp. 731, 740 (D. Md.
`1997)); see also Crowley v. CyberSource Corp., 166 F. Supp. 2d 1263,
`1271 (N.D. Cal. 2001) (“[F]or [Plaintiff] to be liable for
`unauthorized access under the ECPA, it must have gained unauthorized
`access to a facility through which electronic communications services
`are provided, (or its access must have exceeded the scope of authority
`given), it must thereby have accessed electronic communications in
`storage, and its access must not fall within the exception of
`subsection (c).”) Since Defendants’ have not shown that Plaintiff
`fails to state a claim under the ECPA, this portion of the motion is
`denied.
`IV. California Penal Code Section 502 (Comprehensive Computer Data
`Access and Fraud Act)
`Defendants seek dismissal of Plaintiff’s claim that
`Defendants violated California Penal Code section 502(c)(2), (3), (6),
`(7), which provides:
`[A]ny person who commits any of the following acts
`is guilty of a public offense: (2) [k]nowingly
`accesses and without permission takes, copies, or
`makes use of any data from a computer, computer
`system, or computer network, or takes or copies
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`11
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 12 of 16
`
`any supporting documentation, whether existing or
`residing internal or external a computer, computer
`system, or computer network[;] (3) [k]nowingly and
`without permission uses or causes to be used
`computer services[;] (6) [k]nowingly and without
`permission provides or assists in providing a
`means of accessing a computer, computer system, or
`computer network[;] (7) [k]nowingly and without
`permission accesses or causes to be accessed any
`computer, computer system, or computer network.
`Cal. Penal Code § 502(c)(2), (3), (6) and (7).
`Plaintiff claims that it “has been injured by these violations . . .
`and is entitled to damages and attorneys’ fees pursuant to California
`Penal Code § 502(e).” (Compl. ¶ 83).
`Defendants argue that Plaintiff fails to state a claim under
`this provision because “Plaintiff’s allegations themselves . . .
`directly refute any claim that Defendant acted ‘knowingly and without
`permission[,]’” since “Plaintiff alleged that Defendants ‘purchased’
`various Site Licenses to access the [Publication], such that any
`access to [it] by Defendants was with permission, not without.” (Mot.
`at 8.) Plaintiff replies that “[a]s numerous employees of
`[D]efendants accessed the Publication without any authorization
`whatsoever, their conduct falls well within the ambit of this statute,
`and [Plaintiff] has therefore properly stated a claim.” (Opp’n at
`18.) Since the focus of Plaintiff’s allegations is on the
`unauthorized access to the Publication and not the authorized access
`provided under the license agreements, Defendants’ arguments are
`unavailing.
`Defendants shift focus in their Reply from an emphasis on
`their permission to access the Publication to whether Plaintiff has
`adequately specified the nature of its “injury.” (Reply at 8.)
`Defendants rely on California Penal Code section 502(e)(1) and
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`12
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 13 of 16
`
`(b)(8),4 arguing that “[g]iven the statutory requirements [at]
`issue . . . , [Plaintiff’s] bald representation that an injury has
`occurred . . . is insufficient to state a claim under Penal Code §
`502.” (Id.) However, nothing in those statutes supports Defendants’
`position that Plaintiff’s allegation of “injury” is insufficient.
`Therefore, Defendants motion to dismiss Plaintiff’s claims under
`California Penal Code section 502 is denied.
`V. Common Law Claims
`A. Trespass
`Defendants argue that Plaintiff’s trespass claim should be
`dismissed because it “has not alleged the required damage or
`impairment to state a legally cognizable cause of action for
`trespass.” (Opp’n at 9.) Plaintiff alleges in its Complaint that it
`has suffered “irreparable damages” because “Defendants, without
`permission . . . or exceeding the scope of such permission, willfully
`and maliciously entered upon [its] passcode-protected web site.”
`
`California Penal Code section 502(e)(1) provides in
` 4
`pertinent part:
`[T]he owner . . . of the computer, computer system, computer
`network, computer program, or data who suffers damage or
`loss by reason of a violation of any of the provisions of
`subdivision (c) may bring a civil action against the
`violator for compensatory damages and injunctive relief or
`other equitable relief. Compensatory damages shall include
`any expenditures reasonably and necessarily incurred by the
`owner or lessee to verify that a computer, computer system,
`computer network, computer program, or data was or was not
`altered, damaged, or deleted by the access.
`Section 502(b)(8) defines injury as “any alteration, deletion,
`damage, or destruction of a computer system, computer network,
`computer program or, data caused by the access, or the denial of
`access to the legitimate users of a computer system, network, or
`program.”
`
`13
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 14 of 16
`
`(Compl. ¶¶ 96, 95.) Since Defendants fail to show Plaintiff’s
`allegations are insufficient to state a trespass claim, this portion
`of their motion is denied.
`B. Misappropriation of Trade Secret
`Defendants also seek dismissal of Plaintiff’s
`misappropriation of trade secret claim. Plaintiff alleges that
`“[w]ithout authorization . . . [D]efendants misappropriated the
`usernames and passwords and used them for [their] benefit.” (Compl.
`¶ 102.) Defendants argue that “Plaintiff fails to allege that the
`information, which Defendants allegedly misappropriated, constitutes a
`trade secret.” (Opp’n at 10.) The Uniform Trade Secrets Act
`(“UTSA”), adopted by California with minor modifications, “codifies a
`cause of action for misappropriation of trade secrets.” Fas Techs,
`Ltd. v. Dainippon Screen MFG., Co., Ltd., 2001 WL 637451, at *3 (N.D.
`Cal. May 31, 2001); Cal. Civ. Code §§ 3426.2, 3426.3. “To prevail on
`[this] claim . . . plaintiff must show that (1) the misappropriated
`information constitutes a trade secret, (2) the defendant “used” the
`trade secret, and (3) the plaintiff was actually damaged by the
`misappropriation or the defendant was unjustly enriched by such
`misappropriation and use.” Fas Techs. Ltd., 2001 WL 637451, at *3
`(internal citations omitted).
`A “trade secret” is defined as “information, including a
`formula, pattern, compilation, program, device, method, technique or
`process, that: (1) [d]erives independent economic value, actual or
`potential, from not being generally known to the public or to other
`persons who can obtain economic value from its disclosure or use; and
`(2) [i]s subject to efforts that are reasonable under the
`circumstances to maintain its secrecy.” Cal. Civ. Code § 3426.1(d).
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`14
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 15 of 16
`
`Defendants argue Plaintiff does not allege “that the username and
`passcode combination constituted a trade secret” and that even had
`Plaintiff made such an allegation, “its claim would nevertheless fail
`because the username-passcode combination ‘does not derive independent
`economic value’–it only provides access to the [Publication], and
`Defendants had access in print form.” (Mot. at 10.)
`However, Plaintiff has adequately alleged that its username
`and passcode constitute a “trade secret” under the definition provided
`in California Civil Code section 3426.1(d). Plaintiff alleges in its
`Complaint that it “issued a confidential username and passcode [to
`Defendants under its various license agreements,] and that username
`and passcode combination was an item of independent economic value”.
`(Compl. ¶¶ 98-100.) Plaintiff also alleges that “[t]he confidential
`username and passcodes’ value is derived from not being generally
`known to, and not being readily ascertainable by, other persons who
`can obtain economic value from disclosure or use of the username and
`passcode.” (Id. ¶ 101.) Defendants have not shown the insufficiency
`of these allegations.
`Defendants also argue that “Plaintiff . . . fails to allege
`that Defendants were unjustly enriched by any misappropriation of the
`combination.” But Plaintiff could prevail on its claim of
`misappropriation of trade secrets by showing either damage as a result
`of the misappropriation or unjust enrichment. See Fas Techs. Ltd.,
`2001 WL 637451, at *3, (“To prevail on [this] claim . . . plaintiff
`must that . . . [it] was actually damaged by the misappropriation or
`the defendant was unjustly enriched . . . .”). Plaintiff adequately
`alleges in its Complaint that it has been damaged by the alleged
`misappropriation. “Defendants’ misappropriation of [Plaintiff’s]
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`15
`
`

`
`Case 2:05-cv-02322-GEB-DAD Document 93 Filed 01/25/07 Page 16 of 16
`
`confidential usernames and passcodes was willful and malicious and
`caused irreparable damage to [Plaintiff].” (Compl. ¶ 103.)
`Accordingly, Defendants’ motion to dismiss Plaintiff’s claim for
`misappropriation of trade secret is denied.
`CONCLUSION
`For the stated reasons, Defendants’ motion to dismiss is
`
`denied.
`
`IT IS SO ORDERED.
`Dated: January 25, 2007
`
`
`GARLAND E. BURRELL, JR.
`United States District Judge
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`16

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket