From Casetext: Smarter Legal Research

Farmers Insurance Exchange v. Steele Insurance Agency, Inc.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA
Nov 13, 2013
No. 2:13-CV-00784-MCE-DAD (E.D. Cal. Nov. 13, 2013)

Opinion

No. 2:13-CV-00784-MCE-DAD

11-13-2013

FARMERS INSURANCE EXCHANGE, et al., Plaintiffs, v. STEELE INSURANCE AGENCY, INC., et al., Defendants.


MEMORANDUM AND ORDER

Through this action, Plaintiffs Farmers Insurance Exchange, Truck Insurance Exchange, Fire Insurance Exchange, Mid-Century Insurance Company, and Farmers New World Life Insurance Company (collectively "Plaintiffs" or "Farmers") seek relief from Defendants Steele Insurance Agency, Troy Steele ("Steele"), Ted Blalock ("Blalock"), Larry McCarren ("McCarren"), Bill Henton (referred to as "Defendant Henton" to distinguish him from his father, "Mr. Henton"), and Cindy Jo Perkins ("Perkins") (collectively "Defendants") for the alleged misappropriation of Plaintiffs' trade secrets, as well as other violations of state and federal law pertaining to the operation of Plaintiffs' and Defendants' respective insurance companies. Specifically, the operative First Amended Complaint alleges the following causes of action: (1) breach of contract against McCarren; (2) misappropriation of trade secrets against all Defendants; (3) violation of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030(a)(2)(C), against Defendant Henton and Perkins; (4) violation of the CFAA, 18 U.S.C. § 1030(a)(4), against Defendant Henton and Perkins; and (5) civil conspiracy against all Defendants. FAC, Aug. 14, 2013, ECF No. 35.

Presently before the Court is Blalock's Motion to Dismiss Plaintiffs' second and fifth causes of action ("Blalock Motion") pursuant to Federal Rule of Civil Procedure 12(b)(6) for failure to state a claim upon which relief can be granted. Blalock Mot., Sept. 3, 2013, ECF No. 37. Also before the Court is a Motion to Dismiss Plaintiffs' second, third, fourth, and fifth causes of action by the Steele Insurance Agency, Steele, McCarren, Henton, and Perkins' ("Steele Motion") pursuant to Rule 12(b)(6). Steele Mot., Sept. 3, 2013, ECF No. 38. Farmers timely opposed these Motions. Pls.' Opp'n, Sept. 19, 2013, ECF No. 39; Pls.' Opp'n, Sept. 19, 2013, ECF No. 40. For the reasons set forth below, the Motions are GRANTED IN PART and DENIED IN PART.

All further references to "Rule" or "Rules" are to the Federal Rules of Civil Procedure unless otherwise stated.

Because oral argument will not be of material assistance, the Court ordered this matter submitted on the briefs. E.D. Cal. Local R. 230(g).

BACKGROUND

The following recitation of facts is taken, sometimes verbatim, from Farmers' First Amended Complaint. FAC at 4-13.

Farmers sells insurance policies to policyholders through independent contractor agents. Farmers' most valuable assets are their policyholders and the information that Farmers maintains about each policyholder. Farmers agents are exclusive agents for Farmers' insurance products. The agents may not promote or sell insurance policies issued by other insurers. Each Farmers agent must agree to use Farmers' trade secret customer information only in the course of the agent's relationship with Farmers. Each agent must further promise not to divulge Farmers' trade secret customer information to third parties or to use it in any way detrimental to Farmers. This information is not shared with Farmers' competitors.

Farmers maintains databases, which include the Electronic Customer Marketing System ("eCMS"). eCMS contains information about prospective, current, and former policyholders, including name, address, telephone, social security number, driver's license number, policy expiration date, insured property, claims history, discount eligibility, and other information of Farmers' policyholders. eCMS is an important tool on the Farmers' "Agency Dashboard," accessed and used by Farmers' authorized insurance agents. The system enables authorized users to access Confidential Policyholder Information about the policyholders they service, and allows agents to create, among other things, policyholder reports, contact lists, and mailing labels. Use of eCMS is subject to certain confidentiality restrictions and security protections.

Farmers invests significant time, labor, and capital in developing the Confidential Policyholder Information stored on eCMS. The Confidential Policyholder Information is not generally available in this aggregated form in the industry or to Farmers' competitors. If this information was available to Farmers' competitors, those competitors could more easily solicit Farmers' policyholders to change insurance providers.

Farmers maintains its Confidential Policyholder Information, including policy expirations, on a password and user-ID protected system. When an agent's Agency Agreement is terminated, Farmers turns off the access of both agents and their staff to eCMS and the Agency Dashboard, and the terminated agent's user ID and password combination is no longer valid. Farmers also issues company policies regarding access to and preservation of Confidential Policyholder Information, by maintaining copies of those policies on the Agency Dashboard.

Periodically, Farmers reminds its insurance agents of its confidentiality policies through bulletins, yearly compliance memoranda, and other communications. Finally, each time an agent accesses Farmers' proprietary system through the Agency Dashboard, that agent must agree to be bound by the terms of a separate "Legal Disclaimer." The Legal Disclaimer provides that the information the agent is accessing Farmers' proprietary, confidential, and trade secret information.

Defendants Troy Steele and Steele Insurance Agency

Steele was appointed as a District Manager for Farmers in 2001, pursuant to a District Manager Appointment Agreement. Subsequently, in January 2010, Farmers terminated Steele's Agreement. Thereafter, Steele began his own independent insurance agency, the Steele Insurance Agency. Steele and the Steele Insurance Agency were not appointed or allowed to sell Farmers' insurance products. Farmers alleges Steele is using improper means to obtain access to Farmers' policyholder information. Farmers further contends Steele directs current and former Farmers agents, or their staff members, to use Farmers' customer lists and other trade secret information to solicit Farmers' customers to switch to the Steele Insurance Agency. Farmers claims it has lost numerous customers previously serviced by McCarren, Charlie Finister, and Defendant Henton's father, Mr. Henton, to the Steele Insurance Agency as a result of Steele's trade secret misappropriation.

Defendant Larry McCarren

McCarren was appointed as a Farmers agent in January 1992, pursuant to an Agency Appointment Agreement. McCarren worked in the district of District Manager Blalock until January 2012. Blalock's District Manager Appointment Agreement was terminated in January 2012. Blalock then went to work for the Steele Insurance Agency.

According to Farmers, while McCarren was still a Farmers agent, he wrote policies for other insurers in violation of his Agency Appointment Agreement. In August 2012, McCarren terminated his Agreement with Farmers. His termination became effective November 3, 2012. McCarren now works as an insurance agent for the Steele Insurance Agency.

Following McCarren's resignation, customers complained to Farmers that McCarren contacted them, attempting to switch their insurance policies to other carriers. Farmers also alleges that prior to leaving Farmers, McCarren accessed Farmers' computer system to download information regarding Farmers' policyholders, including his entire customer list, so that he could use this information after he was no longer a Farmer's agent. Downloading this information violated McCarren's Agency Appointment Agreement. Farmers alleges that at the direction of Steele and Blalock, McCarren is attempting to transfer Farmers' policyholders from Farmers to other insurers for the benefit of the Steele Insurance Agency.

Defendant Cindy Jo Perkins

Perkins was McCarren's longtime employee. However, in 2012, Perkins went to work for another Farmers agent, Charlie Finister. Throughout the year of 2012, Finister was gravely ill with diabetes. Finister resigned and went into hospice in November 2012. Perkins did not have permission to sell Farmers' insurance products or to access Farmers' computer systems. Without permission, Perkins used Finister's user ID and password combination to gain access to information from Farmers' computer system while she worked in Finister's office. Perkins is appointed with the Steele Insurance Agency, and was so appointed when she accessed Farmers' computer system. Perkins now works together with Steele and Blalock to transfer Farmers' policyholders to other insurers for the benefit of the Steele Insurance Agency.

Defendant Bill Henton

Mr. Henton, Defendant Henton's father, was a Farmers agent from 1968 to 2012. In 2012, Mr. Henton's District Manager, Rudy Cedre, believed that Mr. Henton had developed severe memory problems. Defendant Henton worked in Mr. Henton's office, but Defendant Henton was not appointed as a Farmers agent.

In 2012, Mr. Henton resigned as a Farmers agent. Prior to Mr. Henton's resignation, Defendant Henton allowed his wife and daughter to access the Farmers computer system to obtain Farmers' policyholder information. Defendant Henton is also in the process of becoming part of Steele Insurance Agency. Defendant Henton remains in control of the physical files relating to over 1600 Farmers policies, will not allow Farmers to access these files, and arranged for his father's mail, including Farmers' business mail, to be forwarded to Defendant Henton's new business address. Defendant Henton is working together with Steele and Blalock to transfer Farmers' policyholders from Farmers to other insurers, for the benefit of the Steele Insurance Agency.

STANDARD

On a motion to dismiss for failure to state a claim under Federal Rule of Civil Procedure 12(b)(6), all allegations of material fact must be accepted as true and construed in the light most favorable to the nonmoving party. Cahill v. Liberty Mut. Ins. Co., 80 F.3d 336, 337-38 (9th Cir. 1996). Rule 8(a)(2) requires only "a short and plain statement of the claim showing that the pleader is entitled to relief" in order to "give the defendant fair notice of what the . . . claim is and the grounds upon which it rests." Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (quoting Conley v. Gibson, 355 U.S. 41, 47 (1957)).

A complaint attacked by a Rule 12(b)(6) motion to dismiss does not require detailed factual allegations. However, "a plaintiff's obligation to provide the grounds of his entitlement to relief requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do." Id. (internal citations and quotations omitted). A court is not required to accept as true a "legal conclusion couched as a factual allegation." Ashcroft v. Iqbal, 129 S. Ct. 1937, 1950 (2009) (quoting Twombly, 550 U.S. at 555). "Factual allegations must be enough to raise a right to relief above the speculative level." Twombly, 550 U.S. at 555 (citing 5 Charles Alan Wright & Arthur R. Miller, Federal Practice and Procedure § 1216 (3d ed. 2004) (stating that the pleading must contain something more than "a statement of facts that merely creates a suspicion [of] a legally cognizable right of action.")).

Furthermore, "Rule 8(a)(2) . . . requires a showing, rather than a blanket assertion, of entitlement to relief." Twombly, 550 U.S. at 556 n.3 (internal citations and quotations omitted). Thus, "[w]ithout some factual allegation in the complaint, it is hard to see how a claimant could satisfy the requirements of providing not only 'fair notice' of the nature of the claim, but also 'grounds' on which the claim rests." Id. (citing 5 Charles Alan Wright & Arthur R. Miller, supra, at § 1202). A pleading must contain "only enough facts to state a claim to relief that is plausible on its face." Id. at 570. If the "plaintiffs . . . have not nudged their claims across the line from conceivable to plausible, their complaint must be dismissed." Id. However, "[a] well-pleaded complaint may proceed even if it strikes a savvy judge that actual proof of those facts is improbable, and 'that a recovery is very remote and unlikely.'" Id. at 556 (quoting Scheuer v. Rhodes, 416 U.S. 232, 236 (1974)).

A court granting a motion to dismiss a complaint must then decide whether to grant leave to amend. Leave to amend should be "freely given" where there is no "undue delay, bad faith or dilatory motive on the part of the movant, . . . undue prejudice to the opposing party by virtue of allowance of the amendment, [or] futility of the amendment . . . ." Foman v. Davis, 371 U.S. 178, 182 (1962); Eminence Capital, LLC v. Aspeon, Inc., 316 F.3d 1048, 1052 (9th Cir. 2003) (listing the Foman factors as those to be considered when deciding whether to grant leave to amend). Not all of these factors merit equal weight.

Rather, "the consideration of prejudice to the opposing party . . . carries the greatest weight." Id. (citing DCD Programs, Ltd. v. Leighton, 833 F.2d 183, 185 (9th Cir. 1987). Dismissal without leave to amend is proper only if it is clear that "the complaint could not be saved by any amendment." Intri-Plex Techs. v. Crest Group, Inc., 499 F.3d 1048, 1056 (9th Cir. 2007) (citing In re Daou Sys., Inc., 411 F.3d 1006, 1013 (9th Cir. 2005); Ascon Props., Inc. v. Mobil Oil Co., 866 F.2d 1149, 1160 (9th Cir. 1989) ("Leave need not be granted where the amendment of the complaint . . . constitutes an exercise in futility . . . .")).

ANALYSIS

Farmers alleges five causes of action under state and federal law. Blalock moves to dismiss all claims alleged against him; namely, the second and fifth causes of action. Blalock Mot. at 2. The Steele Insurance Agency, Steele, McCarren, Henton, and Perkins contend Farmers' fifth claim for civil conspiracy must be dismissed because it is preempted by the California Uniform Trade Secrets Act ("UTSA"), and because it fails to state a claim upon which relief can be granted. Steele Mot. at 8, 9. The Steele Insurance Agency and Steele also contend that Farmers' claim for misappropriation of trade secrets fails to state a claim against them. Id. at 11. Finally, Perkins and Defendant Henton seek dismissal of Farmers' claims for violations of the CFAA. Id. at 13.

A. Misappropriation of Trade Secrets

Farmers alleges Defendants' actions constitute misappropriation of Farmers' trade secrets under California's UTSA. To prevail on their trade secret misappropriation claim, Farmers must show: "(1) the existence of a trade secret, and (2) misappropriation of the trade secret." AccuImage Diagnostics Corp. v. Terarecon, Inc., 260 F. Supp. 2d 941, 950 (N.D. Cal. 2003) (citing Cal. Civ. Code § 3426.1(b)). Here, the existence of a trade secret is not contested. However, Defendants contend that Farmers fails to allege facts sufficient to show misappropriation.

The UTSA defines "misappropriation" as:

Disclosure or use of a trade secret of another without express or implied consent by a person who:
(A) Used improper means to acquire knowledge of the trade secret; or
(B) At the time of disclosure or use, knew or had reason to know that his or her knowledge of the trade secret was:
(i) Derived from or through a person who had utilized improper means to acquire it;
(ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limits its use; or
(iii) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; . . . .
Cal. Civ. Code § 3426.1(b).

"A violation of the UTSA occurs when an individual misappropriates a former employer's protected trade secret client list, for example, by using the list to solicit clients or to otherwise attain an unfair competitive advantage." Reeves v. Hanlon, 33 Cal. 4th 1140, 1155 (2004). While an employee who leaves his employer can "announce his new affiliation" to his clients, the employee cannot "actively solicit business for his new company" using the employer's trade secrets. Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514, 1524 (1997). Other courts have found that a letter which "petitions, importunes, and entreats . . . customers to call [the employee] at any time for information about the better policies [the new company] can provide" amounts to solicitation. Id. at 1525 (quoting Am. Credit Indem. Co. v. Sacks, 213 Cal. App. 3d 622, 636-37 (1989)). Thus, using trade secret customer lists to solicit customers constitutes misappropriation. See Id.

Importantly, "[m]isappropriation and misuse can rarely be proved by convincing direct evidence. In most cases plaintiffs must construct a web of perhaps ambiguous circumstantial evidence from which the trier of fact may draw inferences . . . that it is more probable than not that [misappropriation] did in fact take place." Hanger Prosthetics & Orthotics, Inc. v. Capstone Orthopedic, Inc., 556 F. Supp. 2d 1122, 1136 (E.D. Cal. 2008).

Farmers alleges that "Blalock's District Manager Appointment Agreement with Farmers was terminated effective January 2012. Ted Blalock went on to work for the Steele Insurance Agency. He has participated in and aided Steele and the other Defendants in the wrongful acts described herein." FAC at 8. Furthermore, Farmers alleges that "McCarren is working at the direction of Steele and Blalock in attempting to transfer the insurance business of Farmers' policyholders from Farmers to other insurers for the benefit of the Steele Insurance Agency, and its owner, agents and employees." Id. at 9. Moreover, Farmers alleges that "Steele and the other Defendants have retained and/or accessed Farmers' proprietary, confidential and trade secret information for their benefit, to the detriment of Farmers, and in violation of the terms of the AAA, for the benefit of Steele's competing business, and its owner, agents and employees." FAC at 13. Farmers further claims that Defendants "solicited, switched, and re-[wrote], or assisted other Defendants in doing so, the insurance business of Farmers' policyholders, previously serviced by McCarren, Finister and Bill Henton, Jr., when they were agents, to Steele's competing agency." Id. Finally, Farmers alleges each Defendant was the agent of each of the other Defendants in committing the alleged acts.

Accepting as true that Blalock "retained and/or accessed Farmers' proprietary, confidential and trade secret information . . . for the benefit of Steele's competing business," FAC at 13, and construing this allegation in the light most favorable to Farmers, Farmers alleges facts sufficient to show that Blalock "disclos[ed] or use[d]" Farmers' trade secrets, as required by the UTSA, Cal. Civ. Code § 3426.1(b). Furthermore, these allegations, taken together and viewed in the light most favorable to Farmers, are sufficient to show that at the time of Blalock's use or disclosure, he "knew or had reason to know that his . . . knowledge of the trade secret was . . . [d]erived from or through a person who had utilized improper means to acquire it," or "[d]erived from or through a person who owed a duty to [Farmers] to maintain its secrecy or limit its use . . . ." Cal. Civ. Code § 3426.1(b). Farmers has therefore successfully provided grounds for their entitlement to relief against Blalock for trade secret misappropriation. Accordingly, Blalock's motion to dismiss this claim is denied.

As to the Steele Insurance Agency and Steele ("the Steele Defendants"), Farmers alleges "Defendants misappropriated farmers' trade secrets by, among other things, retaining or utilizing Farmers' Confidential Policyholder Information for the purpose of soliciting directing or advising Farmers' policyholders to switch their insurance business away from Farmers and to Steele's competing business." FAC at 15. The Steele Defendants take issue with Farmers' allegations on the ground that they are the acts of others, and not the acts of the Steele Defendants. See Steele Mot. at 11; Steele Defs.' Reply 3, Sept. 25, 2013, ECF No. 41.

However, this argument completely avoids the issue of agency and the clear allegations that Defendants are acting in concert. Farmers' allegations that various Defendants left Farmers' employ, taking with them Farmers' protected trade secret client lists, and that those individuals are currently "working at the direction of" the Steele Defendants to use those lists to solicit Farmers' policyholders to switch their insurance business to the Steele Insurance Agency, are more than sufficient to show that the Steele Defendants used Farmers' trade secrets without Farmers' consent. See Cal. Civ. Code § 3426.1 (b); see also Reeves, 33 Cal. 4th at 1155 ("A violation of the UTSA occurs when an individual misappropriates a former employer's protected trade secret client list, for example, by using the list to solicit clients or to otherwise attain an unfair competitive advantage.").

Moreover, Farmers' allegations make clear that at the time the Steele Defendants and their agents used these customer lists, any of the three circumstances set forth in subsection (b)(2)(B) of the UTSA might apply. That is, viewing the allegations in the light most favorable to Farmers, the Steele Defendants "knew or had reason to know that [their] knowledge of the trade secret[s] was" either: (1) "[d]erived from or through a person who had utilized improper means to acquire it;" (2) "[a]cquired under circumstances giving rise to a duty to maintain its secrecy or limits its use;" or (3) "[d]erived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use . . . ." Cal. Civ. Code § 3426.1 (b)(2)(B)(i)-(iii); see also Reeves, 33 Cal. 4th at 1155; Perry, 56 Cal. App. 4th at 1524. This finding is based not on the alleged attempts to switch Farmers' customers to the Steele Insurance Agency, nor on the alleged entice Farmers agents to come work for the Steele Insurance Agency. Rather, this finding is based on the allegations that Defendants have taken Farmers' trade secret customer lists and have been successful in their efforts to switch Farmers' customers, as Farmers' has suffered "loss of profits, loss of premiums, and loss of business" as a result of the alleged misappropriation. Accordingly, the Steele Defendants' Motion to Dismiss Farmers' claim for trade secret misappropriation is DENIED.

B. CFAA

Farmers contends Perkins and Defendant Henton violated the CFAA by accessing Farmers' files and Farmers' agents' computers without permission. The CFAA imposes liability, in relevant part, on: "Whoever . . . [i]ntentionally access a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer . . . ." 18 U.S.C. § 1030(a)(2). The CFAA also imposes liability on anyone who "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period." 18 U.S.C. § 1030(a)(4).

The CFAA provides a private right of action, stating:

Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i). Damages for a violation involving only conduct described in subsection (c)(4)(A)(i)(I) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage. . . ."
18 U.S.C. § 1030(g). Subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i) are as follows:
(I) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value;
(II) the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals;
(III) physical injury to any person;
(IV) a threat to public health or safety;
(V) damage affecting a computer used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security
Id. § 1030(c)(4)(A)(i)(I)-(V).

Thus, a private plaintiff bringing a claim under the CFAA must prove that the defendant violated one of the provisions of § 1030(a)(1 )-(7), and that the violation involved one of the factors listed in § 1030(c)(4)(A)(i)(I)-(V). See id. § 1030(g). In the present case, only one of these factors is relevant: Farmers must allege that their case involves "loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value." Id. § 1030(c)(4)(A)(i)(1).

Here, Farmers alleges that Defendant Henton and Perkins violated 18 U.S.C. §§ 1030(a)(4) and 1030(a)(2). To successfully state a claim pursuant to 18 U.S.C. § 1030(g) based on a violation of § 1030(a)(2), Farmers must allege that Defendant Henton and Perkins: (1) intentionally accessed a computer, (2) without authorization or exceeding authorized access, and (3) thereby obtained information (4) from any protected computer . . . , and that (5) there was loss to one or more persons during any one-year period aggregating at least $5,000 in value." LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1132 (9th Cir. 2009) (citations omitted). To successfully bring an action under § 1030(g) based on a violation of § 1030(a)(4), Farmers must show that Defendant Henton and Perkins: (1) accessed a "protected computer," (2) without authorization or exceeding such authorization that was granted, (3) "knowingly" and with "intent to defraud," and thereby (4) "further[ed] the intended fraud and obtain[ed] anything of value," causing (5) a loss to one or more persons during any one-year period aggregating at least $5,000 in value. Id. at 1132 (citing 18 U.S.C. § 1030(a); P.C. Yonkers, Inc. v. Celebrations the Party and Seasonal Superstore, LLC, 428 F.3d 504, 508 (3d Cir. 2005); Theofel v. Farey-Jones, 359 F.3d 1066, 1078 (9th Cir. 2004)).

Perkins and Defendant Henton challenge two elements of Farmers' CFAA claims. They assert Farmers' CFAA claims fail to adequately plead that Perkins and Defendant Henton accessed a computer "without authorization," and they contend that Farmers fails to allege "loss" within the meaning of the statute.

1. Access Without Authorization/ Exceeding Authorized Access

An individual who is authorized to use a computer for certain purposes but goes beyond those limitations has "exceed[ed] authorized access" within the meaning of the CFAA. Brekka, 581 F.3d at 1133. By contrast, "a person who uses a computer 'without authorization' has no rights, limited or otherwise, to access the computer in question." Id. Thus, the Brekka court found that "when an employer authorizes an employee to use a company computer subject to certain limitations, the employee remains authorized to use the computer even if the employee violates those limitations. It is the employer's decision to allow or to terminate an employee's authorization to access a computer that determines whether the employee is with or 'without authorization.'" Id.

In the instant case, Perkins argues that while Farmers alleges she "did not have permission" to access files on Finister's computer, Farmers "never alleges whose permission was lacking." Steele Mot. at 13. Perkins also contends that "Finister is alleged to have been a Farmers' agent[,] . . . Farmers' agents have authorized access to the confidential information[,] [and] Finister as authorized agent had access to the alleged confidential information." Id. at 13-14. Perkins then states that "there is no allegation that Defendant[] Perkins . . . accessed Farmers' computers without authorization." Id. at 14. Perkins contend that "the fact [Finister] delegated [his] authority to Perkins . . . does not make the access unauthorized." Id.

However, the Complaint contains no allegations that Finister gave Perkins permission to access his computer files using his user name and password. The First Amended Complaint clearly states that Perkins "used [a Farmer's Agent's] user ID and password combination to access files and information on Farmers' computer system when she did not have permission to do so." FAC at 11. The Complaint's failure to specifically state whose permission was lacking is insufficient to warrant dismissal of Farmers' CFAA claims against Perkins.

On a motion to dismiss, the allegations are accepted as true and are construed in the light most favorable to the nonmoving party. Cahill, 80 F.3d 336, 337-38 (9th Cir. 1996). Farmers' allegation, viewed in the light most favorable to Farmers, shows that Perkins was "a person who . . . [had] no rights, limited or otherwise, to access the computer in question." See Brekka, 581 F.3d at 1133. There are no allegations in the operative Complaint suggesting otherwise. Perkins' contention that Finister permitted her to use his computer is a factual issue to be decided on a motion for summary judgment; it is not within the purview of a motion to dismiss, where the Court must accept as true the factual allegations contained in the complaint. Farmers' allegations regarding Perkins therefore meet the "without authorization" prong of both §§ 1030(a)(2)(C) and (a)(4).

Defendant Henton raises similar arguments with respect to Farmers' CFAA claims, contending that his father, a Farmers agent, "delegated [his] authority" to access the Farmers system. Farmers alleges Defendant Henton "worked in his father's office," but was not a Farmers agent, and Defendant Henton gave his "wife and daughter unauthorized access to Farmers' computer system apparently for the purpose of accessing information regarding Farmers' policyholders." FAC at 12.

The first issue is whether Defendant Henton "lacked authorization" to access to the computer in question. Farmers again fails to make any allegations that Defendant Henton did not have authorization to access the computer(s) at issue. See FAC; Order 34, July 25, 2013, ECF No. 34 ("Nowhere do Plaintiffs allege that Defendant Henton was not authorized to access the physical computer(s) in question.") Thus, as before, Farmers again fails to plead facts sufficient to show that Defendant Henton was a person "without authorization." See Brekka, 581 F.3d at 1133.

Accordingly, the next issue is whether Defendant Henton was a person who "exceeded [his] authorized access" under the CFAA. Farmers alleges that "Defendants were not authorized to access the Agency Dashboard and eCMS," and that "Defendant[] . . . Henton . . . intentionally and without authorization accessed, caused others to access, and/or [has] utilized others' user ID and password combination to access the Agency Dashboard or eCMS . . . ." FAC at 16.

As before, Farmers' allegation that "Defendants were not authorized to access the Agency Dashboard and eCMS," and that "Defendant[] . . . Henton . . . intentionally and without authorization accessed, caused others to access, and/or [has] utilized others' user ID and password combination to access the Agency Dashboard or eCMS," FAC at 16, are sufficient for the Court to find that Farmers has sufficiently alleged that Defendant Henton "exceeded his authorized access" under the CFAA. See Order at 34 ("Viewed in the light most favorable to Plaintiffs, these allegations reveal that Defendant Henton 'violated . . . restrictions on access to information' . . . and therefore 'exceeded his authorized access.'") (citing Nosal, 676 F.3d at 863-64).

Farmers' allegations as to Defendant Henton therefore meet the "without authorization" prong of the CFAA analysis.

2. Loss

Perkins and Defendant Henton also challenge the loss element of Farmers' CFAA claims on the ground that "there is no claim of loss or damage that is compensable under CFAA." Steele Mot. at 14. However, Farmers alleges:

Perkins' and Henton's unauthorized intrusion into the Agency Dashboard or eCMS has caused Farmers a loss in excess of $5,000 within a one-year period. This cost was incurred in discovering and confirming the identity of Perkins and Henton as having had unauthorized access to Farmers' computer system, and in discovering the method by which they accessed the protected information.
FAC at 17.

The CFAA defines "loss" as "any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service . . . ." 18 U.S.C. § 1030(e)(11). "'Loss,' therefore, means two things: 'any reasonable cost to the victim,' and lost revenue or other damages incurred as a result of an interruption of service." AtPac, Inc. v. Aptitude Solutions, 730 F. Supp. 2d 1174, 1184 (E.D. Cal. 2010). The CFAA defines "damage" as "any impairment to the integrity or availability of data, a program, a system, or information . . . ." 18 U.S.C. § 1030(e)(8).

To allege a loss under the CFAA, "plaintiffs must identify impairment of or damage to the computer system that was accessed without authorization." AtPac, Inc., 730 F. Supp. 2d at 1184 (quoting Doyle v. Taylor, No. 09-158, 2010 WL 2163521, at *2 (E.D. Wash. May 24, 2010) (holding that where plaintiff alleged defendant accessed plaintiff's USB thumb drive and retrieved a sealed document, "[p]laintiff would have to show that the thumb drive itself was somehow damaged or impaired by Defendant's act of accessing the drive.")). "Cognizable costs also include the costs associated with assessing a hacked system for damage [and] upgrading a system's defenses to prevent future unauthorized access." Id. (citing Doyle, 2010 WL 2163521, at *3); see also SuccessFactors, Inc. v. Softscape, Inc., 544 F. Supp. 2d 975 (N.D. Cal. 2008) ("[W]here the offense involves unauthorized access and the use of protected information . . . the cost of discovering the identity of the offender or the method by which the offender accessed the protected information [is] part of the loss for purposes of the CFAA.").

While a number of courts have noted that "costs not related to computer impairment or computer damages are not compensable under the CFAA," SKF USA, Inc. v. Bjerkness, 636 F. Supp. 2d 696, 721 (N.D. Ill. 2009) (citing numerous cases reaching same conclusion), "courts in the Ninth Circuit have recognized the general principle that 'costs associated with investigating intrusions into a computer network and taking subsequent remedial measures are losses within the meaning of the state,'" Mintz, 906 F. Supp. 2d at 1029.

Here, Farmers' allegations do not "identify impairment of or damage to the computer system that was accessed without authorization." Rather, Farmers' alleged costs are associated with investigating and trying to locate the perpetrator. Several courts within the Ninth Circuit found loss allegations similar to these to be adequate to state a claim. See SuccessFactors, 85 F. Supp. 2d 975 (N.D. Cal. 2008); Kimberlite Corp. v. Does, No. C08-2147 TEH, 2008 WL 2264485, at *1-2 (N.D. Cal. 2008). For example, in SuccessFactors the court stated:

In cases like this, where the offense involves unauthorized access and the use of protected information, the reasonable 'cost of responding to [the] offense,' . . . will be different from such cost in a case where the primary concern is the damage to the plaintiff's computer system itself. . . . Where the offender has actually accessed protected information, discovering who has that information and what information he or she has is essential to remedying the harm. In such cases courts have considered the cost of discovering the identity of the offender or the method by which the offender accessed the protected information to be part of the loss for purposes of the CFAA.
544 F. Supp. 2d at 981.

Other courts have distinguished SuccessFactors on the facts. In Mintz, the plaintiff offered evidence that after the plaintiff gave notice to the defendant that he would leave the defendant's employment and would be employed elsewhere, the defendant gained access to the plaintiff's email account and read the plaintiff's new employment contract. The plaintiff claimed that he met the CFAA's loss requirement by incurring $27,796.25 in attorneys' fees. 906 F. Supp. 2d at 1029.

In ruling on a motion for summary judgment, the Central District discussed several factors distinguishing Mintz from SuccessFactors. First, the Mintz court stated that in SuccessFactors, "the relevant 'harm' of the unauthorized access was that the plaintiff had no clue whether the hacker might invade the website again or send additional spam emails to the plaintiff's customers, [and thus] . . . it was necessary for the plaintiff to track down the perpetrator." Id. at 1030. However, in Mintz, the undisputed facts showed that, "within days of the hacking incident, . . . it was pellucid that [the defendant] was responsible for" hacking into the plaintiff's email and that the defendant had accessed the plaintiff's new employment contract." Id. Thus, while SuccessFactors required the victim to expend more than $5,000 to "investigate] the extent of the breach and locating the perpetrator's IP address," in Mintz, "[a]ll [the p]laintiff needed to do to secure his Gmail account—indeed, all he could do—was to change the password and the back-up email address used to retrieve the password." Id. Thus, the Mintz court stated, "it defies common sense to believe that Plaintiff's subsequent legal efforts to confirm Priority Sports' involvement were 'essential to remedying the harm' of the unauthorized access." Id. at 1030-31.

Notably, the Mintz court also found that the plaintiff's legal fees were paid by his new employer, who was not a "victim" of the defendant's alleged activity, and thus not a "loss" within the meaning of the CFAA. 906 F. Supp. 2d at 1029 (citing 18 U.S.C. § 1030(e)(11)) ("[A] 'loss' is defined as "any reasonably cost to any victim.'") (emphasis in original). Such is not the case here.
--------

A later motion for summary judgment may reveal that the facts of this case more closely resemble those of Mintz rather than SuccessFactors. However, at this stage of the proceedings, Farmers has alleged facts that, when viewed in the light most favorable to Farmers, are sufficient to show that Farmers incurred at least $5000 in costs associated with investigating the harm and the cause of the damage.

Accordingly, Farmers have successfully stated their CFAA claims against Perkins Defendant Henton. Defendant Henton and Perkins' motion to dismiss these claims is therefore DENIED.

C. Civil Conspiracy

Civil conspiracy "is not a cause of action but a legal doctrine that imposes liability on persons who, although not actually committing a tort themselves, share with the immediate tortfeasors a common plan or design in its perpetration." Applied Equip. Corp. v. Litton Saudi Arabia Ltd., 7 Cal.4th 503, 510 (1994) (citing Wyatt v. Union Mortgage Co., 24 Cal.3d 773, 784 (1979)); see also Entm't Research Grp. Inc. v. Genesis Creative Grp., Inc., 122 F.3d 1211, 1228 (9th Cir. 1997). "Standing alone, a conspiracy does no harm and engenders no tort liability. It must be activated by the commission of an actual tort." Applied Equip. Corp., 7 Cal. 4th at 511.

The elements of a civil conspiracy are: (1) the formation and operation of a conspiracy; (2) wrongful conduct in furtherance of the conspiracy; and (3) damages arising from the wrongful conduct. Applied Equip., 7 Cal. 4th at 511; see also Doctors' Co. v. Super. Ct., 49 Cal. 3d 39, 44 (1989). Each member of the alleged conspiracy must be legally capable of committing the underlying tort -- that is, each member must owe a duty to the plaintiff that is recognized by law and must be potentially subject to liability for breach of that duty -- and must intend the success of the purpose of the conspiracy. Applied Equip., 7 Cal.4th at 511. In addition, all elements of the underlying tort must be satisfied. See id. If the plaintiff fails to adequately plead the underlying claim, the corresponding conspiracy claim must also fail. Id. In the present action, Farmers alleges that "Defendants formed and operated a conspiracy to illegally misappropriate and use Farmers' trade secret protected policyholder information for the purpose of soliciting Farmers' customers away from Farmers and towards the Steele Insurance Agency." FAC at 18.

Contrary to Defendants' assertion, the UTSA does not preempt this claim. Courts applying California law have found that claims "based entirely on the same factual allegations that form the basis of [the] trade secrets claim" are preempted. Callaway Golf Co. v. Dunlop Slazenger Grp. Ams., Inc., 318 F. Supp. 2d 216, 220 (D. Del. 2004) (applying California law); see also Gabriel Techs. Corp. v. Qualcomm Inc., No. 08cv1992-MME(PQR), 2009 WL 3326631, at *11 (S.D. Cal. Sept. 3, 2009) ("California courts have adopted a broad view of preemption in this area and have held that common law claims that are based on the same nucleus of facts as a misappropriation claim are preempted."). "Preemption is not triggered where the facts in an independent claim are similar to, but distinct from, those underlying the misappropriation claim." Gabriel Techs., 2009 WL 3326631, at *11. Thus, "the preemption inquiry for those causes of action not specifically exempted by [section] 3426.7(b) focuses on whether other claims are no more than a restatement of the same operative facts supporting trade secret misappropriation. If there is no material distinction between the wrongdoing alleged in a UTSA claim and that alleged in a different claim, the USTA preempts the other claim." Id. (quoting Convolve, Inc. v. Compaq Computer Corp., No. 00 CV 5141(GBD), 2006 WL 839022, at *6 (S.D.N.Y. Mar 31, 2006) (applying California law)).

Farmers alleges additional facts, such as the agreement to steal trade secrets and the formation of the conspiracy, that factually differentiate this claim from a misappropriation claim, although the harm is the same. Accordingly, Farmers' conspiracy claim is not preempted by the UTSA.

However, Farmers nonetheless fails to state a claim for civil conspiracy upon which relief can be granted. Although Rule 9(b) no longer applies, as Farmers no longer alleges that Defendants acted "fraudulently" in perpetrating the conspiracy, see FAC at 18-19, Farmers again states this claim in conclusory terms.

Farmers clearly alleges Defendants conspired to misappropriate Farmers' trade secrets, but Farmers' allegations regarding the formation and operation of a conspiracy are only that Defendants "formed and operated a conspiracy to illegally misappropriate and use Farmers' trade secrets for the purpose of soliciting Farmers customers away from Farmers and towards the Steele Insurance Agency." FAC at 19. Farmers does not actually allege that Defendants engaged in these actions because there was a specific agreement between Defendants. Moreover, Farmers provides only vague details about the conspiracies in which Defendants allegedly participated.

To successfully state a claim, Farmers "must more clearly allege specific action on the part of each [D]efendant that corresponds to the elements of a conspiracy cause of action. Such amended allegations, however, must be made within the sections of the complaint that contain [Farmers'] claims for the underlying torts." AccuImage Diagnostics, 260 F. Supp. 2d at 948 (citing Mox, Inc. v Woods, 202 Cal. 675, 677 (1927)).

Accordingly, the claim for civil conspiracy is dismissed with leave to amend as to all moving Defendants.

CONCLUSION

For the reasons set forth above, IT IS SO ORDERED that:

1. Blalock's Motion to Dismiss (ECF No. 37) is DENIED as to Farmer' second cause of action and GRANTED WITH LEAVE TO AMEND as to Farmers' fifth cause of action;
2. The Steele Insurance Agency, Steele, McCarren, Perkins, and Henton's Motion to Dismiss (ECF No. 38) is GRANTED IN PART and DENIED IN PART, as follows:
A. DENIED as to Farmers' second cause of action;
B. DENIED as to Farmers' third cause of action;
C. DENIED as to Farmers' fourth cause of action;
D. GRANTED WITH LEAVE TO AMEND as to Farmers' fifth cause of action.
3. Not later than thirty (30) days following the date this Memorandum and Order is electronically filed, Plaintiffs may (but are not required to) file an amended complaint. If no amended complaint is filed within said thirty (30) day period, without further notice to the parties, the cause of action dismissed by virtue of this Memorandum and Order will be dismissed with prejudice.

IT IS SO ORDERED.

____________________________

MORRISON C. ENGLAND, JR. CHIEF JUDGE

UNITED STATES DISTRICT COURT


Summaries of

Farmers Insurance Exchange v. Steele Insurance Agency, Inc.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA
Nov 13, 2013
No. 2:13-CV-00784-MCE-DAD (E.D. Cal. Nov. 13, 2013)
Case details for

Farmers Insurance Exchange v. Steele Insurance Agency, Inc.

Case Details

Full title:FARMERS INSURANCE EXCHANGE, et al., Plaintiffs, v. STEELE INSURANCE…

Court:UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA

Date published: Nov 13, 2013

Citations

No. 2:13-CV-00784-MCE-DAD (E.D. Cal. Nov. 13, 2013)