Enigma Software Group USA, LLC v. Malwarebytes, Inc. ( 2023 )


Menu:
  •                     FOR PUBLICATION
    UNITED STATES COURT OF APPEALS
    FOR THE NINTH CIRCUIT
    ENIGMA SOFTWARE GROUP                             No. 21-16466
    USA, LLC,
    Plaintiff-Appellant,                      D.C. No.
    5:17-cv-02915-
    v.                                                EJD
    MALWAREBYTES, INC.,
    Defendant-Appellee.                         OPINION
    Appeal from the United States District Court
    for the Northern District of California
    Edward J. Davila, District Judge, Presiding
    Argued and Submitted November 8, 2022
    Portland, Oregon
    Filed June 2, 2023
    Before: Richard R. Clifton and Patrick J. Bumatay, Circuit
    Judges, and M. Miller Baker,* International Trade Judge.
    Opinion by Judge Clifton;
    Concurrence by Judge Baker;
    Dissent by Judge Bumatay
    *
    The Honorable M. Miller Baker, Judge for the United States Court of
    International Trade, sitting by designation.
    2    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    SUMMARY**
    Lanham Act
    The panel affirmed in part and reversed in part the
    district court’s judgment dismissing a lawsuit brought by
    Enigma Software Group USA LLC, a computer security
    software provider, against its competitor Malwarebytes, Inc.
    for designating its products as “malicious,” “threats,” and
    “potentially unwanted programs”; and remanded for further
    proceedings.
    Enigma’s operative complaint alleged a false advertising
    claim under Section 43(a) of the Lanham Act, 
    15 U.S.C. § 1125
    (a)(1)(B), and tort claims under New York
    law. Dismissing the motion under Fed. R. Civ. P. 12(b)(6),
    the district court concluded that all of Enigma’s claims were
    insufficient as a matter of law.
    The district court primarily based the dismissal on its
    conclusion that Malwarebytes’s designations of Enigma’s
    products were “non-actionable statements of opinion.” The
    panel disagreed with that assessment. In the context of this
    case, the panel concluded that when a company in the
    computer security business describes a competitor’s
    software as “malicious” and a “threat” to a customer’s
    computer, that is more a statement of objective fact than a
    non-actionable opinion. It is potentially actionable under the
    Lanham Act provided Enigma plausibly alleges the other
    elements of a false advertising claim.
    **
    This summary constitutes no part of the opinion of the court. It has
    been prepared by court staff for the convenience of the reader.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.    3
    The district court held that the tort claims under New
    York law failed because Malwarebytes was not properly
    subject to personal jurisdiction in New York. That meant
    Enigma’s claim for relief under New York General Business
    Law (NYGBL) § 349 failed because that statute did not
    apply to the alleged misconduct. The panel disagreed and
    concluded that Malwarebytes is subject to personal
    jurisdiction in New York. As this action was initially filed
    in New York, the law of that state properly applies.
    The common law claims for tortious interference with
    contractual relations and tortious interference with business
    relations were also dismissed by the district court. Those
    torts are recognized as actionable under California law, as
    they are under New York law, but the district court
    concluded that Enigma failed to allege essential elements for
    those claims under California law. The contractual relations
    claim failed because Enigma did not identify a specific
    contractual obligation with which Malwarebytes interfered.
    The business relations claim was dismissed because that
    claim required an allegation of independently wrongful
    conduct, and that requirement was not satisfied following the
    dismissal of the Lanham Act and NYGBL § 349
    claims. Because the panel held that the Lanham Act and
    NYGBL § 349 claims should not have been dismissed, the
    panel concluded that the tortious interference with business
    relations claim should similarly not have been
    dismissed. The panel agreed with the district court regarding
    dismissal of the claim for tortious interference with
    contractual relations, however, and affirmed the dismissal of
    that claim.
    Concurring, Court of International Trade Judge Baker
    wrote separately to touch on choice of law. He wrote that
    ordinarily the application of a transferor jurisdiction’s law
    4   ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    carries with it the choice-of-law rules of that jurisdiction, but
    here the parties did not address the choice of law beyond the
    dispute over whether personal jurisdiction existed in the
    Southern District of New York. The opinion assumes—as
    the parties did in their briefing by not addressing choice of
    law—that under New York choice-of-law rules, New York
    substantive law applies to Enigma’s state-law claims, save
    for the claims based on Malwarebytes’ transactions with
    customers outside of New York.
    Judge Bumatay dissented. He wrote that the Lanham
    Act protects against false or misleading representations of
    fact, but flagging a competitor’s products as “potentially
    unwanted,” a “threat,” or “malicious” is no expression of
    fact—these are subjective statements, not readily verifiable,
    which means they are opinions. He wrote that by treating
    these terms as actionable statements of fact under the
    Lanham Act, the court sends a chilling message to
    cybersecurity companies—civil liability may now attach if a
    court later disagrees with your classification of a program as
    “malware.” He wrote that Enigma’s failure to allege a
    misstatement of fact is also dispositive on its state-law
    claims.
    COUNSEL
    Terry Budd (argued), Budd Law PLLC, Wexford,
    Pennsylvania; Christopher M. Verdini and Anna Shabalov,
    K&L Gates LLP, Pittsburgh, Pennsylvania; Edward P.
    Sangster, K&L Gates LLP, San Francisco, California; for
    Plaintiff-Appellant.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.     5
    Moez M. Kaba (argued), Michael H. Todisco, and Warren
    S. Crandall, Hueston Hennigan LLP, Los Angeles,
    California; John C. Hueston, Hueston Hennigan LLP,
    Newport Beach, California; for Defendant-Appellee.
    OPINION
    CLIFTON, Circuit Judge:
    Plaintiff-Appellant Enigma Software Group USA LLC
    (“Enigma”), a computer security software provider, sued a
    competitor, Defendant-Appellee Malwarebytes, Inc.
    (“Malwarebytes”), for designating its products as
    “malicious,” “threats,” and “potentially unwanted
    programs” (“PUPs”). Enigma’s operative complaint alleged
    a false advertising claim under Section 43(a) of the Lanham
    Act, 
    15 U.S.C. § 1125
    (a)(1)(B), and tort claims under New
    York law.
    Malwarebytes moved to dismiss under Federal Rule of
    Civil Procedure 12(b)(6). The district court granted the
    motion, concluding that all of Enigma’s claims were
    insufficient as a matter of law. It primarily based the
    dismissal on its conclusion that Malwarebytes’s
    designations of Enigma’s products were “non-actionable
    statements of opinion.” As we explain in more detail below,
    we disagree with that assessment. In the context of this case,
    we conclude that when a company in the computer security
    business describes a competitor’s software as “malicious”
    and a “threat” to a customer’s computer, that is more a
    statement of objective fact than a non-actionable opinion. It
    is potentially actionable under the Lanham Act provided
    6   ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    Enigma plausibly alleges the other elements of a false
    advertising claim.
    The district court also held that the tort claims under New
    York law failed because Malwarebytes was not properly
    subject to personal jurisdiction in New York. That meant
    Enigma’s claim for relief under New York General Business
    Law (“NYGBL”) § 349 failed because that statute did not
    apply to the alleged misconduct. We disagree and conclude
    that Malwarebytes is subject to personal jurisdiction in New
    York. As this action was initially filed in New York, the law
    of that state properly applies.
    The common law claims for tortious interference with
    contractual relations and tortious interference with business
    relations were also dismissed by the district court. Those
    torts are recognized as actionable under California law, as
    they are under New York law, but the district court
    concluded that Enigma failed to allege essential elements for
    those claims under California law.
    The contractual relations claim failed because Enigma
    did not identify a specific contractual obligation with which
    Malwarebytes interfered. The business relations claim was
    dismissed because that claim required an allegation of
    independently wrongful conduct, and that requirement was
    not satisfied following the dismissal of the Lanham Act and
    NYGBL § 349 claims. Because we hold that the Lanham Act
    and NYGBL § 349 claims should not have been dismissed,
    we conclude that the tortious interference with business
    relations claim should similarly not have been dismissed.
    We agree with the district court regarding dismissal of the
    claim for tortious interference with contractual relations,
    however, and affirm the dismissal of that claim.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.       7
    In sum, we affirm in part, reverse in part, and remand for
    further proceedings.
    I.      Background and Procedural History
    Enigma is a Florida company that markets and sells
    computer security software nationwide. Its products,
    according to its Second Amended Complaint (“SAC”), “(i)
    detect and remove malicious software (i.e., malware)” such
    as “viruses, spyware, adware, ransomware, and Trojans; (ii)
    enhance users’ Internet privacy; (iii) offer users the choice
    to block ‘Potentially Unwanted Programs’ (‘PUPs’); and/or
    (iv) eliminate security threats and risks from problematic
    software programs.” SAC ¶ 2.
    Malwarebytes is a Delaware corporation, headquartered
    in California. It is a direct competitor of Enigma in the anti-
    malware and computer security market. Founded in 2008, its
    flagship anti-malware products are aimed, according to the
    complaint, at “detect[ing] and remov[ing] malware, PUPs,
    and other potentially threatening programs on users’
    computers.” SAC ¶ 7.
    Enigma commenced this lawsuit against Malwarebytes
    in the U.S. District Court for the Southern District of New
    York asserting Lanham Act false advertising and
    supplemental tort claims under New York law. See Enigma
    Software Grp. USA, LLC v. Malwarebytes Inc., 
    260 F. Supp. 3d 401
     (S.D.N.Y. 2017). Malwarebytes moved to dismiss for
    lack of personal jurisdiction and failure to state a claim or,
    in the alternative, to transfer the case to the Northern District
    of California under 
    28 U.S.C. § 1404
    . 
    Id. at 404
    . The district
    court granted the motion to transfer and declined to reach the
    motion to dismiss. 
    Id.
    8   ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    In the California federal court, Malwarebytes renewed its
    motion to dismiss, arguing that Enigma failed to state a claim
    and, in the alternative, that Malwarebytes was immune from
    suit as all of Enigma’s claims were barred by Section 230 of
    the Communications Decency Act of 1996, 
    47 U.S.C. § 230
    (c)(2). See Enigma Software Grp. USA LLC v.
    Malwarebytes Inc., No. 5:17-CV-02915-EJD, 
    2017 WL 5153698
    , at *1 (N.D. Cal. Nov. 7, 2017). The district court
    granted the motion, holding that Malwarebytes was immune
    from suit under Section 230. It did not examine whether
    Enigma failed to state a claim. 
    Id. at *4
    .
    Enigma appealed the district court’s ruling. This court
    reversed and remanded, holding that Section 230 did not
    apply to “blocking and filtering decisions that [we]re driven
    by anticompetitive animus.” Enigma Software Grp. USA,
    LLC v. Malwarebytes, Inc., 
    946 F.3d 1040
    , 1050 (9th Cir.
    2019).
    On remand, Enigma filed its SAC asserting four causes
    of action: (1) false advertising in violation of the Lanham
    Act, 
    15 U.S.C. § 1125
    (a)(1)(B); (2) a violation of NYGBL
    § 349, prohibiting deceptive and unlawful business
    practices; (3) tortious interference with contractual relations;
    and (4) tortious interference with business relations.
    Enigma alleged that from 2008 to October 2016,
    Malwarebytes’s products did not identify any of Enigma’s
    products as “malicious,” “threats,” “PUPs,” or any other
    type of malware, nor did it quarantine or block consumers
    from using any of them. SAC ¶ 11. But starting in October
    2016, the complaint alleged, Malwarebytes started to do so.
    Enigma alleged it was in retaliation for Enigma suing an
    affiliate of Malwarebytes called Bleeping Computer, which
    held itself out to the public as an independent website
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.    9
    reviewing software products. SAC ¶ 11. According to
    Enigma, Bleeping Computer was not independent and
    conveyed “false, misleading, and deceptive information” on
    its website about Enigma and its products, as well as
    “instruct[ing] users not to install, or to uninstall,” Enigma
    products and “instead purchase Malwarebytes’ competing
    products.” SAC ¶ 23. Enigma alleged that Bleeping
    Computer disseminated this false information in exchange
    for sales commissions from Malwarebytes. SAC ¶ 11.
    Enigma further alleged that Malwarebytes retaliated
    against it because the former subpoenaed the latter in the
    Bleeping Computer lawsuit seeking evidence of a
    “profiteering scheme” between Malwarebytes and Bleeping
    Computer “employing anticompetitive, unfair trade
    practices” to Enigma’s detriment.
    Malwarebytes moved to dismiss for failure to state a
    claim, and the district court again dismissed the case, as
    described above. Regarding the Lanham Act claim, the
    district court reasoned that Enigma alleged that
    Malwarebytes’s designations of the former’s products were
    “just [nonactionable] subjective opinions” rather than
    “verifiably false.” As to Enigma’s state law claims, the
    district court concluded that California law applied because
    New York lacked personal jurisdiction over Malwarebytes.
    For that reason alone, the district court held, the NYGBL
    § 349 claim failed. But even if New York law applied, the
    claim failed for the same reasons that the Lanham Act claim
    failed. The district court concluded that Enigma’s tortious
    interference claims failed under California law. The district
    court reasoned that the contractual interference claim failed
    to identify “a specific contractual obligation with which
    Malwarebytes interfered” and failed to “plead that
    Malwarebytes engaged in any independently wrongful act
    10 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    which interfered with a specific contractual obligation under
    its at-will agreements with users.” The interference with
    business relations claim failed because Enigma did not
    “allege any other independently wrongful conduct,”—
    meaning conduct “proscribed by some [statutory or common
    law] standard,”—beyond the failed Lanham Act and
    NYGBL § 349 claims.
    In dismissing the case, the district court also denied leave
    to amend, reasoning that “there are no further facts Enigma
    can allege to cure the complaint.” Enigma timely appealed.
    II.        Discussion
    We review de novo a district court’s dismissal for failure
    to state a claim, crediting all factual allegations as true and
    construing the pleadings in the light most favorable to the
    non-moving party. Tingley v. Ferguson, 
    47 F.4th 1055
    , 1066
    (9th Cir. 2022).
    A.      Lanham Act
    Enigma argues that the district court erred in dismissing
    its Lanham Act claim. Enigma alleged that Malwarebytes
    designated its products and domains as “malicious,”
    “threats,” and “PUPs” and that such statements were
    “factually false” and misrepresented the very purpose of its
    software. The district court held that these statements were
    non-actionable statements of opinion. As to the statements
    that Enigma’s products are “malicious” and “threats,” we
    disagree.1
    1
    Enigma also argues that our previous opinion in Enigma Software Grp.
    USA, LLC v. Malwarebytes, Inc., 
    946 F.3d 1040
     (9th Cir. 2019), compels
    reversing the district court’s dismissal of the Lanham Act claim. There,
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 11
    To state a claim for false advertising under Section 43(a)
    of the Lanham Act, Enigma had to allege that (1)
    Malwarebytes made a false statement of fact in a commercial
    advertisement; (2) the statement deceived or had the
    tendency to deceive a substantial segment of its audience;
    (3) the deception was material, in that it was likely to
    influence the purchasing decision; (4) the false statement
    entered interstate commerce; and (5) Enigma has been or is
    likely to be injured as a result of the false statement.
    Southland Sod Farms v. Stover Seed Co., 
    108 F.3d 1134
    ,
    1139 (9th Cir. 1997). Because the district court concluded
    that Malwarebytes’s challenged designations were non-
    actionable statements of opinion rather than fact, the court
    did not consider whether the company plausibly alleged the
    other applicable requirements.2
    To show falsity under the Lanham Act, a plaintiff must
    allege that “the statement was literally false, either on its face
    or by necessary implication, or that the statement was
    literally true but likely to mislead or confuse consumers.”
    Id.; see also Ariix, LLC v. NutriSearch Corp., 
    985 F.3d 1107
    ,
    1121 (9th Cir. 2021) (quoting Coastal Abstract Serv., Inc. v.
    First Am. Title Ins. Co., 
    173 F.3d 725
    , 731 (9th Cir. 1999))
    we held that Enigma’s Lanham Act claim did not fall under Section 230
    of the Communications Decency Act’s intellectual property exception.
    
    Id.
     at 1052–53. We did not decide, however, whether Enigma stated a
    claim under the Lanham Act.
    2
    In addition to the defending the district court’s determination that the
    challenged designations were nonactionable opinions rather than
    statements of fact, Malwarebytes defends dismissal of the Lanham Act
    claim on the alternative grounds that those designations were not
    commercial speech, and that they did not deceive a substantial segment
    of the relevant audience. We remand those issues to the district court to
    consider in the first instance.
    12 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    (“An actionable statement is a specific and measurable
    claim, capable of being proved false or of being reasonably
    interpreted as a statement of objective fact.”).
    Taken as true at the stage of a motion to dismiss,
    Enigma’s allegations are sufficient to state a Lanham Act
    claim. Malwarebytes’s designations employ terminology
    that is substantively meaningful and verifiable in the
    cybersecurity context. Unlike non-actionable statements of
    puffery, which are “extremely unlikely to induce consumer
    reliance,” Malwarebytes’s designations of Enigma’s
    products “make[] a claim as to the specific or absolute
    characteristics of a product” and are accordingly actionable
    statements of fact under the Lanham Act. Newcal Indus., Inc.
    v. Ikon Off. Sol., 
    513 F.3d 1038
    , 1053 (9th Cir. 2008)
    (internal quotation marks and citation omitted). As Enigma
    points out, its products either contain malicious files and
    threaten the security of users’ computers, or they do not.
    These statements are not the type of general, subjective
    claims typically deemed non-actionable opinions.
    We must look to “the totality of the circumstances” when
    assessing whether a statement implies a factual assertion.
    Underwager v. Channel 9 Australia, 
    69 F.3d 361
    , 366 (9th
    Cir. 1995). Although “malicious” and “threatening” are
    “adjectives [that] admit of numerous interpretations,”
    Partington v. Bugliosi, 
    56 F.3d 1147
    , 1158 (9th Cir. 1995),
    “[t]he context . . . is paramount” because “the reasonable
    interpretation of a word can change depending on the context
    in which it appears.” Knievel v. ESPN, 
    393 F.3d 1068
    , 1075
    (9th Cir. 2005). Malwarebytes’s anti-malware program
    specifically labeled Enigma’s software as “malicious” and a
    “threat,” which a reasonable person would plausibly
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 13
    interpret as the identification of malware.3 SAC ¶¶ 143–64.
    Because whether software qualifies as malware is largely a
    question of objective fact, at least when that designation is
    given by a cybersecurity company in the business of
    identifying malware for its customers, Enigma plausibly
    alleged that Malwarebytes’s statements are factual
    assertions.
    Our dissenting colleague disagrees. The dissent
    contends, at 36, that “[c]ontrary to Enigma’s claims, a
    program isn’t simply ‘potentially unwanted’ or not. A
    software program isn’t verifiably a ‘threat’ or not. And a
    website isn’t measurably ‘malicious’ or not. In the
    cybersecurity context, these terms refer to a spectrum of
    digital features with no verifiable line to cross to determine
    when they apply.”
    We agree that “potentially unwanted” is too unspecific to
    provide a basis for a Lanham Act claim, as we noted above
    at 13, n.3. But the premise of the dissent regarding the terms
    “threat” and “malicious” rests on an understanding of the
    meaning of those words in this context that we do not share.
    Malware, in its ordinary meaning, refers to software
    “written with the intent of being disruptive or damaging to
    (the user of) a computer or other electronic device; viruses,
    worms, spyware, etc., collectively.” Oxford English
    Dictionary Online (2022); see also Malware, Black’s Law
    Dictionary (11th ed. 2019) (defining malware as “software,
    used to monitor or gain access to another’s computer system
    3
    Unlike the terms “malicious” and “threat,” which a cybersecurity
    application would use to describe malware, “potentially unwanted
    program” is too vague to be considered a factual assertion.
    14 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    without authorization for the purpose of impairing or
    disabling the system.”).
    We think such a definition lends itself to verification.
    Enigma’s complaint indicates that malware can come in
    many forms, including “viruses, spyware, adware,
    ransomware, and Trojans.” SAC ¶ 2. But at bottom, as
    demonstrated by the dictionary definitions quoted above, the
    term necessarily implies that someone created software with
    the intent to gain unauthorized access to a computer for some
    nefarious purpose. The dissent offers no compelling reason
    why that cannot be determined objectively. Just like the
    certification at issue in Ariix, whether a given software
    qualifies as malware can be reduced to “a binary
    determination” based on “falsifiable criteria.” 985 F.3d at
    1122. The dissent’s characterization of malware as “a
    spectrum of digital features with no verifiable line” is
    therefore incorrect.4
    4
    The dissent contends that we have manufactured a claim against
    Malwarebytes stating, “Enigma has never alleged that Malwarebytes
    violated the Lanham Act based on the use of the term ‘malware.’”
    Dissent at 42–43. Not so. Enigma alleged that Malwarebytes’s software
    tells users that conducting a recommended “Threat Scan” “scans all the
    places malware is known to hide.” SAC ¶ 132 (emphasis added). If
    Malwarebytes’s software detected something as a “threat” or “PUP,” the
    default configuration was to “treat detections as malware.” SAC ¶¶ 133–
    34. The result is that Enigma customers using Malwarebytes’s software
    to conduct a “Threat Scan” were left with the impression that Enigma’s
    products were malware. See, e.g., SAC ¶ 147 (stating that one customer
    contacted Enigma to inquire why “Malware bites [sic] says [Enigma’s
    software] is an infection” and “another customer reported the ‘malware
    bytes’ program keeps detecting malware every time I try to download
    your software.’”); SAC ¶ 149 (“Please advise why your SpyHunter and
    RegHunter applications are being detected as malware.”) (emphasis in
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 15
    More importantly, judges are not experts in the
    cybersecurity field. We should not presume that we are.
    Enigma has alleged that those terms have implied meaning
    in that field which was understood by a significant portion
    of its users, SAC ¶¶ 143–64, such that Malwarebytes’s
    allegedly false use of those terms can be proved or disproved
    as a matter of objective fact. Those allegations are not
    implausible, and the dissent does not claim that they are. To
    prevail, Enigma must ultimately prove that Malwarebytes’s
    designation of its software was false. But at the motion to
    dismiss stage, the allegations are sufficient.
    At root, the dissent’s disagreement with our conclusion
    rests on its purported effort to protect expressions of
    “opinion” based on its misperception of the First
    Amendment. It makes that clear from its first paragraph.
    Dissent at 27. The dissent acknowledges that the protection
    afforded to commercial speech is limited and that “there can
    be no constitutional objection to the suppression of
    commercial messages that do not accurately inform the
    public.” Dissent at 32 (quoting Cent. Hudson Gas & Elec.
    Corp. v. Pub. Serv. Comm’n of New York, 
    447 U.S. 557
    , 562–
    63 (1980)). But it does not heed that distinction. As we said
    in Ariix,
    Today,    consumers     face     waves     of
    advertisements amid a sea of product choices.
    To navigate the seemingly unending stream
    of advertisements, consumers often depend
    on independent reviews for candid and
    accurate assessments. But when someone
    original). In short, the dissent’s contention is premised on a misreading
    of the record.
    16 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    falsely claims to be independent, rigs the
    ratings in exchange for compensation, and
    then profits from that perceived objectivity,
    that speaker has drowned the public trust for
    economic gain. Society has little interest in
    protecting such conduct under the mantle of
    the First Amendment.
    Ariix, 985 F.3d at 1118–19.
    In that case, we held that a five-star rating system
    comparing nutritional supplement products from the view of
    the speaker was an opinion not actionable under the Lanham
    Act. Id. at 1121. If Malwarebytes had said that its product
    was better than Enigma’s product, that statement would be
    covered by Ariix and not subject to a Lanham Act claim. That
    is not the statement challenged by Enigma in this action,
    though. Malwarebytes stated that Enigma’s products were a
    “threat” and “malicious.” We conclude that those statements
    could be found to be statements of objective fact, subject to
    being found false. Like the “Medal of Achievement”
    certification in Ariix, those statements may properly be the
    subjects of a claim, outside the protection of the First
    Amendment, as we held in that decision. Id. at 1121–22.
    The facts of this case do not closely match Ariix, but the
    principle is the same. Enigma has alleged that Malwarebytes
    disparaged Enigma’s products for commercial advantage by
    making misleading statements of fact. If those allegations
    are true, and at this stage we must presume that they are,
    trying to wrap them in a First Amendment flag does not
    make them any less offensive or any less actionable.
    “Society has little interest in protecting such conduct under
    the mantle of the First Amendment.” Id. at 1119.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 17
    B.       Personal Jurisdiction
    Enigma also argues the district court erred in holding that
    Malwarebytes was not subject to personal jurisdiction in
    New York and that California law applied to the dispute. We
    review personal jurisdiction rulings de novo. Ayla, LLC v.
    Alya Skin Pty. Ltd., 
    11 F.4th 972
    , 978 (9th Cir. 2021).
    As noted above, the Southern District of New York
    transferred this case to the Northern District of California.5
    Generally, diversity cases transferred under 
    28 U.S.C. § 1404
    (a) require that the transferee district court apply the
    state law, including the choice-of-law rules, of the original
    transferor court. See Van Dusen v. Barrack, 
    376 U.S. 612
    ,
    639 (1964) (holding, in a diversity case transferred at the
    request of the defendant, that “[a] change of venue under
    § 1404(a) generally should be, with respect to state law, but
    a change of courtrooms”); Ferens v. John Deere Co., 
    494 U.S. 516
    , 529 (1990) (in another diversity case, extending
    the rule of Van Dusen to cases transferred at the request of
    the plaintiff); Muldoon v. Tropitone Furniture Co., 
    1 F.3d 964
    , 965–66 (9th Cir. 1993) (under Van Dusen and Ferens,
    “the transferee court must follow the choice-of-law rules of
    the transferor court”).
    To apply the state law of the transferor jurisdiction in a
    § 1404(a) transfer case, the transferor court must have had
    personal jurisdiction over the defendant. Because the court
    in New York declined to rule on Malwarebytes’s challenge
    to personal jurisdiction before transferring this case, “the
    5
    The district court exercised federal question jurisdiction over Enigma’s
    Lanham Act claim, see 
    28 U.S.C. § 1331
    , and—because the parties are
    citizens of different states—diversity jurisdiction over its state-law
    claims, 
    id.
     § 1332.
    18 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    transferee court must determine whether . . . jurisdiction
    would have been proper in the transferor court in order to
    decide which forum state’s law will apply under Erie” and
    Van Dusen. Davis v. Costa–Gavras, 
    580 F. Supp. 1082
    ,
    1086 (S.D.N.Y. 1984) (citing Roofing & Sheet Metal Servs.,
    Inc. v. La Quinta Motor Inns, Inc., 
    689 F.2d 982
    , 992–93
    (11th Cir. 1982); Ellis v. Great Southwestern Corp., 
    646 F.2d 1099
    , 1107 (5th Cir. Unit A June 1981); Martin v.
    Stokes, 
    623 F.2d 469
    , 474 (6th Cir. 1980)); see also Nelson
    v. Int’l Paint Co., 
    716 F.2d 640
    , 643 (9th Cir. 1983) (where
    transferor court lacked personal jurisdiction, state law of
    transferee court applies).
    Accordingly, we must determine whether the court in
    New York had personal jurisdiction over Malwarebytes. If
    New York had such jurisdiction, as discussed above we must
    apply the law of New York to the state law claims; if the
    New York court lacked personal jurisdiction, we would
    apply the law of California.
    “An exercise of personal jurisdiction in federal court
    must comport with both the applicable state’s long-arm
    statute and the federal Due Process Clause.” Burri L. PA v.
    Skurla, 
    35 F.4th 1207
    , 1212 (9th Cir. 2022). New York’s
    long-arm statute states that a court may exercise specific
    personal jurisdiction over a non-resident if it “transacts any
    business within the state,” 
    N.Y. C.P.L.R. § 302
    (a)(1), and if
    the “cause of action ‘aris[es] from’ such a business
    transaction.” Best Van Lines, Inc. v. Walker, 
    490 F.3d 239
    ,
    246 (2d Cir. 2007) (alteration in original) (quoting Deutsche
    Bank Sec., Inc. v. Montana Bd. of Invs., 
    850 N.E.2d 1140
    ,
    1142 (N.Y. 2006)).
    “A defendant transacts business within the meaning of
    § 302(a)(1) when it purposefully ‘avails itself of the
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 19
    privilege of conducting activities [in New York], thus
    invoking the benefits and protections of its laws.’” Brown v.
    Web.com Grp., Inc., 
    57 F. Supp. 3d 345
    , 356 (S.D.N.Y.
    2014) (alteration in original) (quoting Fischbarg v. Doucet,
    
    880 N.E.2d 22
    , 26 (N.Y. 2007)). “[P]roof of one transaction
    in New York is sufficient to invoke jurisdiction, even though
    the defendant never enters New York, so long as the
    defendant’s activities [there] were purposeful and there is a
    substantial relationship between the transaction and the
    claim asserted.” Eades v. Kennedy, PC L. Offices, 
    799 F.3d 161
    , 168 (2d Cir. 2015) (quoting Chloé v. Queen Bee of
    Beverly Hills, LLC, 
    616 F.3d 158
    , 163 (2d Cir. 2010)).
    Whether there is personal jurisdiction based on the
    operation of a website depends on where the website falls on
    the “spectrum of interactivity.” Weiss v. Barc, Inc., No. 12
    CV 7571(TPG), 
    2013 WL 2355509
    , at *4 (S.D.N.Y. May
    29, 2013). “Passive websites . . . are limited to making
    information available to users” and do not establish personal
    jurisdiction. 
    Id.
     “Interactive websites knowingly transmit
    goods or services to users and if made available to New York
    residents, the activities can be sufficient for establishing
    personal jurisdiction over a defendant.” 
    Id.
     The website
    operated by Malwarebytes easily qualifies as interactive
    under Weiss.
    As for whether the claim “arises from” a business
    transaction, the New York Court of Appeals has held that the
    “arising from” prong of Section 302(a)(1) does not require
    but-for causation between a defendant’s New York business
    activity and a plaintiff’s injury. Licci v. Lebanese Canadian
    Bank, 
    984 N.E.2d 893
    , 900 (N.Y. 2012). Instead, it requires
    “a relatedness between the transaction and the legal claim
    such that the latter is not completely unmoored from the
    former . . . . In effect, the ‘arise-from’ prong limits the
    20 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    broader ‘transaction-of-business’ prong to confer
    jurisdiction only over those claims in some way arguably
    connected to the transaction.” 
    Id.
     at 900–01.
    Applying these standards, Malwarebytes is subject to
    personal jurisdiction in New York. First, Malwarebytes
    “transacts business” in New York through its website, which
    allows New York–based users to buy and download
    products.6 Malwarebytes does not have to be physically
    present in New York to transact business there within the
    meaning of the first clause of Section 302(a)(1). See Chloé,
    
    616 F.3d at 169
     (collecting cases). Second, Enigma’s claims
    in this lawsuit arise at least in part out of Malwarebytes’s
    transaction of business in New York. Courts in New York
    have held that the sale of copyright- and trademark-
    infringing works into New York through the internet is
    sufficient to establish personal jurisdiction under the “arising
    under” prong.7
    New York’s exercise of personal jurisdiction is also
    consistent with the Due Process Clause. See Knight v.
    Standard Chartered Bank, 
    531 F. Supp. 3d 755
    , 763
    6
    Cf. Citigroup Inc. v. City Holding Co., 
    97 F. Supp. 2d 549
    , 565–66
    (S.D.N.Y. 2000) (finding that a website permitting New Yorkers to apply
    for loans and communicate with defendant’s employees was
    “unqualifiedly commercial in nature,” rising to the level of transacting
    business required by § 302(a)(1)); NFL v. Miller, No. 99 Civ. 11846
    JSM, 
    2000 WL 335566
    , at *1 (S.D.N.Y. Mar. 30, 2000) (“[O]ne who
    uses a web site to make sales to customers in a distant state can thereby
    become subject to the jurisdiction of that state’s courts.”).
    7
    See, e.g., Mattel, Inc. v. www.fisher-price.online, No. 21-CV-9608
    (LJL), 
    2022 WL 2801022
    , at *4 (S.D.N.Y. July 18, 2022) (defendant’s
    sale of counterfeit products in New York had “a substantial relationship
    with Plaintiff’s claim that Defendant counterfeited and infringed upon
    [its trademarks] in violation of the Lanham Act”).
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 21
    (S.D.N.Y. 2021) (“[B]ecause the Due Process Clause
    permits the exercise of jurisdiction in a broader range of
    circumstances [than] 
    N.Y. C.P.L.R. § 302
    , . . . a foreign
    defendant meeting the standards of § 302 will satisfy the due
    process standard.”) (internal quotation marks and citation
    omitted). Therefore, if an exercise of personal jurisdiction
    satisfies New York’s long-arm statute, it also satisfies the
    Due Process Clause. See D.H. Blair & Co. v. Gottdiener, 
    462 F.3d 95
    , 105 (2d Cir. 2006) (“[T]he constitutional
    requirements of personal jurisdiction are satisfied because
    application of [§ 302(a)] meets due process requirements.”).
    We therefore reverse the district court’s holding that
    New York lacked personal jurisdiction over Malwarebytes
    and that California law applies to Enigma’s state law claims.
    New York has personal jurisdiction over Malwarebytes with
    respect to its sales to New York–based customers, and
    therefore New York law applies to Enigma’s state-law
    claims based on those transactions. We do not decide
    whether New York law applies to Malwarebytes’s
    transactions with other customers outside the state of New
    York. That choice of law question is not before us in the
    current appeal.
    C.        State-law Claims
    1.      NYGBL § 349
    The district court dismissed Enigma’s NYGBL § 349
    claim for two reasons. The first was that New York law did
    not apply. The second was that “an opinion that is not
    actionable under the Lanham Act is also not actionable under
    the NYGBL § 349.” Because we hold that New York law
    applies and that Enigma’s Lanham Act claim is actionable,
    we reverse the dismissal of the NYGBL claim and remand
    to the district court to reinstate.
    22 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    2.      Tortious interference claims
    Enigma also argues that the district court erred in
    dismissing its claims for tortious interference with
    contractual and business relations. The district court
    construed the tortious interference claims under California
    law, but as discussed above, New York law applies to these
    claims. Reading the complaint in the light most favorable to
    the plaintiff, as we must, Enigma has sufficiently pled its
    cause of action for tortious interference with business
    relations but has failed to do so for tortious interference with
    contractual relations.
    a. Tortious interference with business relations
    To state a claim for tortious interference with business
    relations, New York requires a plaintiff to establish that:
    (1) it had a business relationship with a third
    party; (2) the defendant knew of that
    relationship and intentionally interfered with
    it; (3) the defendant acted solely out of
    malice, or used dishonest, unfair, or improper
    means; and (4) the defendant’s interference
    caused injury to the relationship.
    Kirch v. Liberty Media Corp., 
    449 F.3d 388
    , 400 (2d Cir.
    2006) (quoting Carvel Corp. v. Noonan, 
    350 F.3d 6
    , 17 (2d
    Cir. 2003)). Enigma’s complaint plausibly demonstrated
    each of these factors.
    Enigma stated in its complaint that it had contracts with
    customers who purchased subscription-based licenses to use
    its SpyHunter 4 and RegHunter 2 software. SAC ¶ 235.
    Enigma also stated that it and Malwarebytes had some
    customers in common who, seeking added levels of security,
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 23
    simultaneously used both companies’ products. SAC ¶ 236.
    Enigma further alleged Malwarebytes took a series of steps
    to interfere with its prospective relationships with
    customers. For instance, Enigma stated that Malwarebytes
    (1) falsely labelled Enigma’s products as “threats” and
    “PUPs,” (2) automatically blocked customers from installing
    Enigma’s software, and (3) automatically quarantined and
    preselected Enigma software for deletion. SAC ¶¶ 237–39.
    The result of this conduct, Enigma alleges, is that
    Malwarebytes induced Enigma’s customers to choose either
    not to install, or to delete, Enigma’s programs from their
    computers without any legitimate justification. SAC ¶ 240.
    Further, Enigma alleged the prospective relationships
    with the requisite specificity to establish a claim for tortious
    interference with business relations. New York requires that
    a “plaintiff . . . identify a specific customer that the plaintiff
    would have obtained ‘but for’ the defendant’s wrongful
    conduct,” Zetes v. Stephens, 
    969 N.Y.S.2d 298
    , 304 (4th
    Dep’t 2013), as relief should not be afforded for merely
    speculative damage, see, e.g., Parekh v. Cain, 
    948 N.Y.S.2d 72
    , 76 (2d Dep’t 2012) (dismissing a claim for tortious
    interference with business relations because the plaintiff did
    not identify a third party with which the plaintiff had
    business relations). For this, Enigma asserted that certain
    customers downloaded its software before paying for a full
    subscription. SAC ¶¶ 244–46. Because Enigma points to
    identifiable customers whose business it lost, its complaint
    plausibly alleges that it had business relationships with third
    parties.
    The district court’s dismissal of this claim for Enigma’s
    inability to identify an independent wrongful act was
    erroneous for two reasons. First, Enigma’s reinstated claims
    under the Lanham Act and NYGBL § 349 could serve as
    24 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    independent wrongful acts if such a showing were necessary.
    More importantly—and unlike under California law, see
    Ixchel Pharma, LLC v. Biogen, Inc., 
    470 P.3d 571
    , 576 (Cal.
    2020) (“[I]ntentionally interfering with prospective
    economic advantage requires pleading that the defendant
    committed an independently wrongful act.”)—a claim for
    tortious interference with business relations under New York
    law does not require the plaintiff to show an “independent
    wrongful act.” Instead, Enigma only needs to allege that
    Malwarebytes acted “solely out of malice, or used dishonest,
    unfair, or improper means,” Kirch, 
    449 F.3d at 400
    , which it
    did in its complaint. See SAC ¶ 249 (Malwarebytes acted
    “for the sole purpose of inflicting intentional harm upon
    [Enigma]”). Accordingly, we hold that Enigma sufficiently
    alleged the elements of a claim for tortious interference with
    business relations.
    b. Tortious interference       with    contractual
    relations
    To establish a claim of tortious interference with contract
    under New York law, a plaintiff must plead the following
    elements:
    (1) the existence of a valid contract between
    the plaintiff and a third party; (2) the
    defendant’s knowledge of the contract; (3)
    the defendant’s intentional procurement of
    the third-party’s breach of the contract
    without justification; (4) actual breach of the
    contract; and (5) damages resulting
    therefrom.
    Kirch, 
    449 F.3d at 401
     (internal quotation marks and citation
    omitted).
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 25
    The district court held that the contractual relations
    interference claim failed because Enigma did not identify
    any contractual breach that Malwarebytes induced.
    Although the district court improperly analyzed this claim
    under California law, the bottom-line result was still correct
    under New York law.
    To state a claim for tortious interference with contractual
    relations under New York law, a plaintiff must allege that
    the defendant induced an actual breach of contract. See NBT
    Bancorp Inc. v. Fleet/Norstar Fin. Grp., Inc., 
    664 N.E.2d 492
    , 495–96 (N.Y. 1996) (holding that, although tortious
    interference can take many forms, New York mandates that
    actual breach be shown). Here, Enigma alleged that its
    preexisting customers cancelled their subscriptions and
    requested refunds because of Malwarebytes’s conduct. SAC
    ¶¶ 239–41. And although this amounts to disruption of the
    contractual relationship between Enigma and its customers,
    it falls short of alleging any contractual breach by those
    customers. Because New York law requires such a breach,
    Enigma has not adequately pled one of the required elements
    for a claim of tortious interference with contractual relations.
    III.      Conclusion
    We affirm the district court’s dismissal of Enigma’s
    claim of tortious interference with contractual relations. We
    reverse the district court’s dismissal of Enigma’s remaining
    claims and remand for further proceedings consistent with
    this opinion. Each party is to bear its own costs.
    AFFIRMED in PART, REVERSED in PART, and
    REMANDED for further proceedings.
    26 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    BAKER, Judge, concurring:
    I join the majority opinion in full and write separately to
    briefly touch on choice of law. As the opinion
    acknowledges, ordinarily the application of a transferor
    jurisdiction’s law under Van Dusen and Ferens carries with
    it the choice-of-law rules of that jurisdiction. See Muldoon
    v. Tropitone Furniture Co., 
    1 F.3d 964
    , 965 (9th Cir. 1993)
    (under Van Dusen and Ferens, “the transferee court must
    follow the choice-of-law rules of the transferor court”).
    Here, however, the parties have not addressed choice of
    law beyond the dispute over whether personal jurisdiction
    existed in the Southern District of New York. They appear
    to agree that if such jurisdiction existed, then New York
    substantive law would govern Enigma’s state-law claims
    and, conversely, if such jurisdiction were lacking, then
    California substantive law would apply. The opinion
    therefore assumes—as the parties did in their briefing by not
    addressing choice of law—that New York’s choice-of-law
    rules require application of that state’s substantive law to
    Enigma’s state-law claims, save for the claims based on
    Malwarebytes’s transactions with customers located
    elsewhere.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 27
    BUMATAY, Circuit Judge, dissenting:
    When a cybersecurity company flags another company’s
    products as “potentially unwanted programs,” “threats,” or
    “malicious,” could it be liable for false advertising under the
    Lanham Act? The answer is plainly “no.” The Lanham Act
    protects against false or misleading representations of fact.
    See 
    15 U.S.C. § 1125
    (a)(1)(B). But flagging a competitor’s
    products as “potentially unwanted,” a “threat,” or
    “malicious” is no expression of fact—these are subjective
    statements, not readily verifiable. That means they are
    opinions. The freedom to express opinions is at the core of
    the First Amendment. And that guarantee doesn’t change
    because the opinions are about cybersecurity, malware, or
    internet domains.
    Thus, even in the commercial context, we must be
    careful not to expand Lanham Act liability to encompass
    protected opinions. Unfortunately, that is exactly what our
    court does here. We mistake subjective expressions of
    opinion for provable statements of fact—falling for the claim
    that some of these terms have an uncontested, objective
    meaning in the cybersecurity field. Yet even a cursory
    review shows that’s not true. By treating these terms as
    actionable statements of fact under the Lanham Act, our
    court sends a chilling message to cybersecurity companies—
    civil liability may now attach if a court later disagrees with
    your classification of a program as “malware.” But we have
    neither the authority nor the competence to arrogate to
    ourselves regulatory oversight over cybersecurity.
    For these reasons, I respectfully dissent.
    28 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    I.
    Enigma Software Group USA, LLC and Malwarebytes,
    Inc. develop competing anti-malware software products.
    “Malware” is a portmanteau of “malicious” and “software.”
    Oxford English Dictionary Online (2022). So, as the term
    implies, anti-malware programs are designed to detect and
    remove potentially unwanted, threatening, or malicious
    programs from users’ computers. For eight years, from 2008
    to 2016, the two companies’ products coexisted on users’
    systems without issue. But in 2016, things changed. In
    October of that year, Malwarebytes announced that it was
    getting “tougher” on potentially unwanted programs. The
    move was purportedly a response to software developers’
    efforts to circumvent the company’s detection criteria.
    Malwarebytes provided a statement announcing its new
    criteria:
    How do we identify potentially unwanted
    software?
    Analyzing and categorizing potentially
    unwanted software is a complex problem.
    Developers of potentially unwanted software
    rapidly evolve their products. Some even
    contain a few characteristics that resemble
    legitimate software to mask the unwanted
    functionality. It’s an on-going process, and
    we work hard to identify common behaviors
    that help provide you the highest level of
    protection.    In some cases, where the
    behavior is questionable, we will list the
    application even if it does not neatly fit into
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 29
    the listed criteria. In other words, we use our
    judgment.
    While we highlight potentially unwanted
    programs, you then make a choice in the
    exclusions list and select what you want to
    keep or remove.
    Here are some of the criteria we use:
    • obtrusive, misleading, or deceptive
    advertising, branding, or search practices
    • excessive or deceptive distribution, affiliate
    or opt-out bundling practices
    • aggressive or deceptive behavior especially
    surrounding purchasing or licensing
    • unwarranted, unnecessary, excessive,
    illegitimate, or deceptive modifications of
    system settings or configuration (including
    browser settings and toolbars)
    • difficulty uninstalling or removing the
    software
    • predominantly negative feedback or ratings
    from the user community
    • diminishes user experience
    • other practices generally accepted as
    riskware, scareware, adware, greyware, or
    otherwise commonly unwanted software by
    the user community
    Malwarebytes informed its users that it must “regularly
    update” its software to meet these criteria. The company
    30 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    also warned that “sometimes [it] get[s] it wrong” and
    provided an email address to ask for “reconsideration” of its
    decisions. Noting the need to respond promptly to “new
    forms of potentially unwanted software” that “frequently
    emerge and proliferate,” Malwarebytes “reserve[d] the right
    to adjust, expand and update [its] criteria without prior notice
    or announcements.”
    Under the new criteria, Malwarebytes’ software
    designated two of Enigma’s anti-malware products—
    “SpyHunter 4” and “RegHunter 2”—as “potentially
    unwanted programs” and “threats.”           As a result,
    Malwarebytes’ program blocked, quarantined, or disabled
    SpyHunter 4 and RegHunter 2’s operation on users’
    computers. Enigma contends that Malwarebytes blocked its
    programs because of “anticompetitive animus” and in
    retaliation for Enigma suing a Malwarebytes affiliate.
    According to Malwarebytes, its program flagged SpyHunter
    4 and RegHunter 2 as “scareware”—which Malwarebytes
    defines as programs that detect harmless system files and
    browser cookies and present them with alarming graphics
    “to convince users their systems have problems.”
    Malwarebytes’ users had at least two options available if
    they wished to continue using Enigma’s products. They
    could exclude Enigma’s programs from scans by
    “unchecking” and “ignor[ing]” the detection following
    Malwarebytes’ instructions, or they could stop using
    Malwarebytes’ program. But Enigma disputes whether both
    programs can operate together. It argues that Malwarebytes’
    default settings effectively prevent users from excluding
    Enigma’s programs from scans, citing complaints from users
    who struggled to change them.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 31
    In December 2016, in response to Malwarebytes’ change
    of criteria, Enigma issued a “Countermeasure,” which
    allowed Enigma’s customers to download an installer that
    disabled Malwarebytes’ products.          Shortly after,
    Malwarebytes responded by having its anti-malware
    program block access to Enigma’s web domains—URLs
    ending in “.enigmasoftware.com.” Malwarebytes’ program
    flagged the domains with a pop-up—“Malicious Website
    Blocked.” Enigma alleges that Malwarebytes’ domain
    blocking was retaliation for the “Countermeasure.” After
    some time, Malwarebytes stopped flagging Enigma’s
    domains, which Enigma takes as a concession that
    quarantining its websites was improper.
    Enigma sued, alleging false advertising under the
    Lanham Act and various torts under New York state law.
    Enigma first brought suit in the Southern District of New
    York, which transferred the case to the Northern District of
    California. In the Northern District of California, the district
    court granted Malwarebytes’ first motion to dismiss based
    on immunity under § 230 of the Communications Decency
    Act, 
    47 U.S.C. § 230
    . A divided panel of this court reversed
    because we held that “immunity under [§ 230] does not
    extend to anticompetitive conduct.” Enigma Software Grp.
    USA, LLC v. Malwarebytes, Inc., 
    946 F.3d 1040
    , 1054 (9th
    Cir. 2019). Dissenting, Judge Rawlinson noted that the
    majority’s policy justifications for the carveout contravened
    both text and precedent. 
    Id.
     at 1054–55 (Rawlinson, J.,
    dissenting).
    On remand, the district court again granted
    Malwarebytes’ motion to dismiss. This time, the district
    court held that Malwarebytes’ flagging of Enigma’s
    products conveyed “non-actionable statements of opinion.”
    Enigma Software Grp. USA, LLC v. Malwarebytes Inc.,
    32 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    
    2021 WL 3493764
    , at *11 (N.D. Cal. 2021).             Enigma
    appealed.
    On de novo review, this should have been an easy affirm.
    II.
    A.
    When it comes to the regulation of any speech, we
    should always begin with the First Amendment. The First
    Amendment protects against laws that abridge the freedom
    of speech. U.S. Const. amend. I. And that’s true even in the
    commercial context. Since Virginia Pharmacy Board v.
    Virginia Citizens Consumer Council, Inc., 
    425 U.S. 748
    (1976), the Supreme Court has recognized that First
    Amendment protections apply to the regulation of purely
    commercial speech. 
    Id. at 761, 770
    . Such freedom advances
    at least three purposes: it “serves the economic interest of
    the speaker,” it “assists consumers,” and it “furthers societal
    interest in the fullest possible dissemination of information.”
    Central Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n of
    New York, 
    447 U.S. 557
    , 561–62 (1980).
    Of course, the Constitution “accords a lesser protection
    to commercial speech than to other constitutionally
    guaranteed expression,” and so “there can be no
    constitutional objection to the suppression of commercial
    messages that do not accurately inform the public.” 
    Id.
     at
    562–63. But unless the commercial communication is
    “misleading,” the government’s power to circumscribe
    commercial speech is limited. 
    Id. at 564
    .
    This is where the Lanham Act fits in. In 1946, Congress
    created a cause of action for “unfair competition through
    misleading advertising or labeling.” POM Wonderful LLC
    v. Coca-Cola Co., 
    573 U.S. 102
    , 107 (2014). To protect
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 33
    companies from competitors’ false attacks, § 43(a) of the
    Lanham Act creates civil liability for:
    Any person who, on or in connection with
    any goods or services, . . . uses in commerce
    any . . . false or misleading description of
    fact, or false or misleading representation of
    fact, which . . . in commercial advertising or
    promotion, misrepresents the nature,
    characteristics, qualities, or geographic
    origin of his or her or another person’s goods,
    services, or commercial activities[.]
    
    15 U.S.C. § 1125
    (a)(1)(B). So, on one hand, to state a claim
    under the Lanham Act, a plaintiff must show that the
    defendant made “false or misleading representations of
    fact.” Ariix, LLC v. NutriSearch Corp., 
    985 F.3d 1107
    , 1121
    (9th Cir. 2021). On the other hand, given the freedom of
    speech, “statements of opinion” are beyond the purview of
    the Lanham Act. 
    Id.
    With the First Amendment overlay here, we must be
    careful in delineating what constitutes “fact” versus
    “opinion.” While statements of fact are actionable under the
    Lanham Act, “[s]tatements of opinion and puffery . . . are
    not.” 
    Id.
     And it makes no difference if the statements of
    opinion are made for the purpose of anticompetitive gain.
    After all, the suppression of “opinions”—even in the
    commercial space—gets into murky constitutional waters.
    Even so, it’s not always easy to distinguish between the two.
    See, e.g., Cochran v. NYP Holdings, Inc., 
    210 F.3d 1036
    ,
    1038 (9th Cir. 2000) (per curiam) (“[A] statement of opinion
    is not automatically entitled to First Amendment protection
    simply by virtue of its status as opinion; rather, a statement
    34 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    of opinion may be actionable to the extent that it implies a
    false assertion of fact.” (simplified)).
    But our court has developed some good guideposts.
    Commercial speech is actionable if it is “specific and
    measurable,” “capable of being proved false or of being
    reasonably interpreted as a statement of objective fact.”
    Ariix, 985 F.3d at 1121. In other words, “a statement that is
    quantifiable, that makes a claim as to the specific or absolute
    characteristics of a product” may be actionable under the
    Lanham Act. Newcal Indus., Inc. v. Ikon Off. Sol., 
    513 F.3d 1038
    , 1053 (9th Cir. 2008) (simplified). Given the serious
    creep on First Amendment protections when we curtail
    speech, when “it is highly debatable” whether a statement is
    verifiable enough to be actionable, we must “err on the side
    of nonactionability.” Partington v. Bugliosi, 
    56 F.3d 1147
    ,
    1158–59 (9th Cir. 1995) (simplified).
    Ariix is a good example of how these principles work. In
    that case, a nutrition-and-health research company published
    a guide that compared and reviewed nutritional supplements
    using a five-star rating system based on 18 criteria. 985 F.3d
    at 1111. It also awarded a “Medal of Achievement” to
    nutritional supplements manufacturers that meet two
    measurable conditions: (1) compliance with FDA’s “good
    manufacturing practices” and (2) certification of product
    labels by an approved laboratory. Id. The research company
    portrayed itself to the public as independent, presenting only
    objective data and scientific analyses. But privately the
    company allegedly had financial ties to one manufacturer of
    nutritional products. Id. at 1112. The company was then
    accused of improperly manipulating the rating system and
    withholding the certification from a competing manufacturer
    that met the two conditions. Id. at 1112–13.
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 35
    We first considered whether the company’s five-star
    ratings were actionable. 985 F.3d at 1121. We said no.
    Even though the ratings were purportedly based on
    “objective and scientific criteria,” we still held that they were
    not factual. Id. That’s because “there is an inherently
    subjective element in deciding which scientific and objective
    criteria to consider.” Id. As an example, we compared the
    ratings to college or law school rankings. While objective
    criteria go into the rankings (like acceptance rates, test
    scores, and class size), “selecting those criteria involves
    subjective decision-making.” Id. Thus, we concluded that
    the ratings were “simply statements of opinion about the
    relative quality of various nutritional supplement products.”
    Id.; cf. Underwager v. Channel 9 Australia, 
    69 F.3d 361
    , 367
    (9th Cir. 1995) (concluding statements must rest “on a core
    of objective evidence” to be provable as true or false under
    defamation law).
    But the “Medal of Achievement” certification was
    different. The award (or more precisely, the lack of an
    award) makes “specific and measurable statements” about a
    nutritional supplements manufacturer. Ariix, 985 F.3d at
    1121–22.      The company’s certification is “a binary
    determination” based on “falsifiable criteria” and the failure
    to award the certification (when a manufacturer complies
    with the two criteria) “falsely implies to consumers” that the
    manufacturer did not meet manufacturing or labeling
    standards. Id. at 1122. Because “[t]hese implications are
    specific, measurable, and capable of being falsified,” we
    held that they were actionable statements under the Lanham
    Act. Id.
    So boiled down, whether commercial speech is
    actionable depends on whether the statement implies
    something that can be proven false.
    36 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    With this legal background, I turn to Enigma’s claims
    against Malwarebytes.
    B.
    Here, we must determine whether Malwarebytes’
    statements calling Enigma’s products “potentially
    unwanted,” a “threat,” or “malicious” can be proven false.
    Given that each warning has an “inherently subjective
    element,” id. at 1121, the answer is no.              Even if
    Malwarebytes employed these terms to protect its products
    from competition from Enigma, there are no dispositive,
    objective criteria that would allow us to police whether the
    three terms were falsely used against Enigma. In other
    words, unlike the certification in Ariix, the three statements
    aren’t “binary determinations.” Id. Contrary to Enigma’s
    claims, a program isn’t simply “potentially unwanted” or
    not. A software program isn’t verifiably a “threat” or not.
    And a website isn’t measurably “malicious” or not. In the
    cybersecurity context, these terms refer to a spectrum of
    digital features with no verifiable line to cross to determine
    when they apply. Cf. Underwager, 
    69 F.3d at 367
     (“the term
    ‘lying’ applies to a spectrum of untruths including ‘white
    lies,’ ‘partial truths,’ ‘misinterpretation,’ and ‘deception’”
    and so is nonactionable). They thus depend on “subjective
    decision-making,” Ariix, 985 F.3d at 1121, requiring the
    exercise of judgment to determine when the warning is
    warranted.
    Without a “core of objective evidence” to assess the
    accuracy of the use of the warnings, Underwager, 
    69 F.3d at 367
    , no reasonable factfinder can say that Malwarebytes
    made a false representation of fact in labeling Enigma’s
    products or website as a “threat,” “malicious,” or
    “potentially unwanted.” In fact, nowhere does Enigma offer
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 37
    an objective, measurable definition of the warnings from
    which we may draw an implication of testable falsehoods.
    Instead, Enigma hints that they carry “specific factual
    meanings” in the cybersecurity field and discovery is
    required before we may fully understand this. As shown
    below, this is not enough to state a claim under the Lanham
    Act, and we should have affirmed the dismissal of Enigma’s
    claims.
    i.      Potentially Unwanted Program
    Take the phrase “potentially unwanted program.” That
    designation inherently requires some guesswork—
    estimating whether a program would be wanted—as made
    clear by using the term “potentially.” And “unwanted” fits
    within the type of nonactionable “personal assessments or
    criticisms” that enjoy First Amendment protections. See
    Partington, 
    56 F.3d at 1158
     (observing that “fake,” “phony,”
    “hefty mark-up,” and “unfair” are too subjective or
    unprovable to be actionable). So the ordinary meaning of
    the phrase conveys both uncertainty and subjectivity—not
    falsifiability.
    If there were any question about the subjective nature of
    the phrase, Malwarebytes made it clear that it developed its
    own criteria to determine what’s “potentially unwanted.”
    Malwarebytes announced eight criteria for the designation,
    including obtrusive or misleading advertising, negative
    feedback, the difficulty in uninstalling or removing a
    program, and whether the program can be considered
    “riskware, scareware, adware, greyware, or otherwise
    commonly unwanted by the community.”                  It also
    acknowledged that some malware didn’t “neatly fit into the
    listed criteria,” which only represented “some of the
    criteria.” It explained that identifying malware was
    38 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    ultimately a judgment call, and “sometimes we get it
    wrong.”    To address the changes in programming,
    Malwarebytes expressly “reserve[d] the right to adjust,
    expand and update [its] criteria without prior notice or
    announcements.”
    Malwarebytes was thus explicit that subjectivity inhered
    in its “potentially unwanted program” determinations. As in
    Ariix, when a company develops a rating or designation
    containing “inherently subjective element[s],” like the eight
    criteria here, the designation cannot be actionable. Even if
    some of Malwarebytes’ criteria could be treated as objective
    and technical, it would have no impact on the analysis.
    That’s because “there is an inherently subjective element in
    deciding which scientific and objective criteria to consider.”
    Ariix, 985 F.3d at 1121. And the weight assigned to each
    criterion would also reflect Malwarebytes’ subjective
    assessment of what constitutes a “potentially unwanted
    product.” Id.
    In response, Enigma offers no objective, factual
    definition of its own. Nor does Enigma provide any
    evidence that the term has an agreed-upon and well-known
    meaning in the cybersecurity world. Indeed, Enigma’s own
    allegations prove the phrase’s subjective nature. For
    instance, Enigma’s complaint alleges “Malwarebytes’ new
    criteria rejected specific objective or scientific standards in
    favor of subjective characteristics.” Similarly, Enigma
    repeatedly criticized Malwarebytes’ criteria as “subjective,”
    “vague,” and “self-serving”—grounds on which we have
    previously held statements unactionable under the Lanham
    Act. See Coastal Abstract, 173 F.3d at 731 (“vague and
    subjective” statements are not liable under the Lanham Act).
    So crediting the complaint’s allegations (as we must),
    Enigma “may [have] plead[ed] [it]self out of court.”
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 39
    Weisbuch v. County of Los Angeles, 
    119 F.3d 778
    , 783 n.1
    (9th Cir. 1997).
    ii.     Threat
    The analysis of the “threat” designation fares no better.
    Start with its ordinary meaning.          Like “potentially”
    unwanted programs, “threat” generally refers to a “possible
    source of harm or danger.” American Heritage Dictionary
    of the English Language (5th ed. 2011) (emphasis added).
    Given its tentative nature, it is not an absolute or specific
    measurement. And, as with “unwanted,” a “source of harm
    or danger” involves a subjective determination. See, e.g.,
    Hernandez v. Scottsdale Hotel Grp. LLC, 
    2020 WL 6827745
    , at *3 (D. Ariz. Nov. 20, 2020) (holding the word
    “threatening” in a defamation suit “is not provable or
    falsifiable”). Indeed, Malwarebytes’ user guide emphasizes
    that some programs or files categorized as “threats” are “not
    malicious” and “[i]t is up to individual users to research and
    make this determination.” Malwarebytes User Guide,
    “Quarantine,” § 8.1 (2016).
    Enigma, for its part, doesn’t contend that there is a single
    criterion for identifying software as a “threat.” Instead, it
    suggests that the term is “widely used” and “commonly
    understood” in cybersecurity—pointing to several
    definitions from federal statutes and governmental and
    software industry authorities. But even accepting these
    definitions, they also confirm the subjective nature of the
    term “threats” and so undermine Enigma’s assertions.
    First, Enigma offers the National Institute of Standards
    and Technology (“NIST”) glossary for a definition of
    “threat.” But NIST’s glossary has no fewer than 20
    40 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    definitions for “threat.”1 Those definitions range from
    “[a]ny circumstance or event with the potential to adversely
    impact organizational operations . . . through an information
    system via unauthorized access, destruction, disclosure,
    modification of information, and/or denial of service” to “an
    activity, deliberate or unintentional, with the potential for
    causing harm to an automated information system or
    activity.” Id. Thus, “threat” is defined in only the broadest
    terms—“potential” for “harm” and “adverse[] impacts”—
    with no attempt to narrow the field. And NIST prefaces its
    glossary with the warning that “[t]erminology changes over
    time” and its definitions may “contain potentially biased
    terminology.” Id.
    Next, Enigma asks us to adopt the International
    Organization for Standardization’s (“ISO”) definition of
    “threat.” It provides that a “threat” is “a potential cause of
    an unwanted incident, which can result in harm to a system
    or organization.” ISO/IEC 27000, Info. Sec. Mgmt.
    Standard, at 10 (2018). The problems with this definition
    are obvious. It requires a subjective assessment of what is
    “unwanted,” and it requires some guessing because it applies
    to anything that “potential[ly]” causes harm. As with
    “potentially unwanted programs,” such a definition offers no
    measurable or objective guidance.
    Finally, Enigma looks to the definition of “cybersecurity
    threat” from the Cybersecurity Act of 2015, 
    6 U.S.C. §§ 650
    ,
    1501. The Act defines “threat” as:
    1
    Comput. Sec. Res. Ctr. Glossary, U.S. Dep’t. of Com. Nat’l Inst. of
    Standards and Tech. (NIST), available at: https://csrc.nist.gov/glossary/t
    erm/threat [https://archive.is/5yDWa].
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 41
    “[A]n action, not protected by the First
    Amendment to the Constitution of the United
    States, on or through an information system
    that may result in an unauthorized effort to
    adversely impact the security, availability,
    confidentiality, or integrity of an information
    system or information that is stored on,
    processed by, or transiting an information
    system.”
    
    6 U.S.C. § 650
    (8)(A). Thus, this federal definition applies
    to a broad range of “impact[s]” and requires a subjective
    assessment of what is “adverse[].” Acknowledging the
    ambiguity of its definition, the Act excludes “any action that
    solely involves a violation of a consumer term of service or
    a consumer licensing agreement.” § 650(8)(B).
    Nothing in these definitions supplies an objective,
    measurable basis to assess the term’s veracity. In fact,
    Enigma’s identification of multiple meanings for “threats”
    by itself shows that the term represents an opinion rather than
    a fact. See Steam Press Holdings, Inc. v. Hawaii Teamsters,
    Allied Workers Union, Loc. 996, 
    302 F.3d 998
    , 1008–09 (9th
    Cir. 2002) (approving argument that a phrase “subject to
    multiple interpretations” is not “susceptible of verification”).
    As we’ve said, when a term or phrase lacks a “singular” and
    “concrete” meaning, it cannot be “readily verifiable.” 
    Id. at 1009
    . So Enigma’s own attempt to provide meaning to the
    term only establishes its vague and unfalsifiable nature.
    iii.      Malicious
    Nor does “malicious” have an objective and absolute
    measurement. In its complaint, Enigma pleads that calling a
    website “malicious” has a common meaning in the
    42 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    “cybersecurity and privacy software markets”—“that the
    website is harmful and can be disruptive to [users’]
    computers.” Even if we accept this allegation as pleaded
    fact, this definition of “malicious” reeks of subjectivity.
    Because of the vagueness and inherent non-objectiveness of
    “harmful” and “disruptive” in the definition of “malicious,”
    the designation suffers from the same deficiencies as the
    other two—there is no implied objective fact that can be
    proven right or wrong. What can be “harmful” or
    “disruptive” is necessarily in the eye of the beholder.
    Imagine an energetic child in the classroom. Some might
    view the child as “playful,” while others view him as
    “disruptive.” Or spicy food. Some may find it enjoyable,
    while others might find it “harmful” to their digestion.
    Likewise, whether Enigma’s “Countermeasure” to
    disable Malwarebytes’ software was “harmful” and
    “disruptive” is a matter of opinion. To Malwarebytes, a
    website that offered a program that deliberately targeted and
    removed its anti-malware products could fit the bill. To
    Enigma, its website was innocuous and only allowed its
    customers the choice to continue to use its products without
    interference from Malwarebytes. Rather than weighing in
    on this difference of opinion, we should have allowed the
    market to decide who is right.
    C.
    Ignoring the problems with the inherent subjectivity of
    these terms, the majority presses on with the expansion of
    Lanham Act liability here because, it claims, the term
    “malware” lends itself to verification. Maj. Op. 14. There
    are several problems with this.
    First, Enigma has never alleged that Malwarebytes
    violated the Lanham Act based on the use of the term
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 43
    “malware.” To prove the Lanham Act claim, Enigma’s
    complaint alleges that Malwarebytes used “false and
    misleading statements” in commerce based on “statements
    that SpyHunter 4 and RegHunter 2 are ‘threats’ and/or
    ‘potentially unwanted programs’ and that [Enigma’s]
    website and domains are ‘malicious’ and disruptive.” The
    term “malware” is not included among the statements
    allegedly violative of § 1125(a)(1)(B). Indeed, there’s no
    basis to equate the terms “threats,” “potential unwanted,”
    and “malicious” with “malware.” Malwarebytes’ user guide
    defines “potentially unwanted programs” as a “class[] of
    non-malware,” and explains that some programs “may [be]
    categorized as threats” even though they “are not malicious.”
    Malwarebytes User Guide, “Quarantine,” § 8.1 (2016). And
    Malwarebytes only referred to Enigma’s website domains as
    “malicious,” not its software. A malicious website may host
    malware, but calling a website malware is like calling a street
    address a criminal. So the majority is manufacturing its own
    claim against Malwarebytes—one that isn’t even supported
    by the record.
    To justify the sua sponte amendment of Enigma’s
    complaint, the majority looks to Malwarebytes’ user guide,
    which explains that a default setting for its scan
    configuration “[t]reat[s] detections” of potentially unwanted
    programs “as malware.” Maj. Op. 14 n.4. But this allegation
    is irrelevant because the majority agrees that calling
    something “potentially unwanted” is “too unspecific” to be
    actionable under the Lanham Act. The majority also relies
    on the user guide’s reference to a “Threat Scan,” which
    “captures all programs treated as ‘malware’ in all the places
    malware is known to hide.” Id. But user guide statements
    that Malwarebytes’ program treats something as “malware”
    or scans where malware is known to be isn’t the same thing
    44 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    as calling Enigma’s products “malware” in commerce. The
    majority then somehow finds it actionable that Enigma’s
    own customers called Enigma’s programs “malware.” Id.
    (citing allegations that Enigma’s customers thought
    Enigma’s products were “malware”). But what Enigma’s
    customers say about Enigma is not a basis to find Lanham
    Act liability against Malwarebytes.
    Second, while acknowledging that “judges are not
    experts in the cybersecurity field,” the majority invents its
    own verifiable definition of “malware” for the field—
    “software [created] with the intent to gain unauthorized
    access to a computer for some nefarious purpose.” Id. The
    majority then concludes that “malware can come in many in
    forms including ‘viruses, spyware, adware, ransomware, and
    Trojans.’” Id. at 14. And finally, the majority says that these
    terms can be objectively determined. Id. at 14.
    Even if Enigma’s complaint had alleged that
    Malwarebytes designated Enigma’s products as “malware”
    and if this definition were plausible, the majority’s
    terminology admits subjectivity. One needn’t be an expert
    in cybersecurity to see why. Take “adware.” Adware
    monitors users’ online activities and habits, typically
    without their knowledge, and uses the collected data to
    display targeted advertisements or sell to third parties.
    Adware usually comes bundled with free software (e.g.,
    games, browser extensions, media players), allowing
    developers to generate revenue and continue developing
    useful and free software. Adware can expose sensitive data
    and slow or disrupt one’s computer, though it also helps
    serve users with more relevant ads. And typically, the user
    has inadvertently authorized and consented to the adware’s
    operation via a terms and conditions agreement. In such
    cases, has the adware been created and employed for “some
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 45
    nefarious purpose?” This is plainly a subjective question
    that will elicit different responses from different people.
    The majority also insists that “[j]ust like the certification
    at issue in Ariix,” the “malware” designation “can be
    reduced to ‘a binary determination’ based on ‘falsifiable
    criteria.’” Maj. Op. 14. It would seem the majority
    conflates the ability to phrase something as a binary
    determination,         with       the objectivity of         that
    determination. One could also say, “whether green is the
    best color is objective and verifiable, because either it is the
    best, or it’s not the best.” But clearly that’s a subjective
    question—appending “it is or it isn’t” doesn’t make the
    determination objective and verifiable. See ZL Techs, Inc. v.
    Gartner, Inc., 
    709 F. Supp. 2d 789
    , 798 (N. D. Cal. May 3,
    2010). And calling Enigma’s products a “threat” or
    “malicious” is far from Ariix saying a manufacturer didn’t
    comply with FDA standards or obtain the appropriate
    laboratory certification—both falsifiable criteria. Ariix, 985
    F.3d at 1122.
    ***
    In sum, Enigma cannot base its false advertising claim
    on nonactionable opinions, like the phrases here. We thus
    should have affirmed the dismissal of the Lanham Act claim.
    III.
    Not only is Enigma’s failure to allege a misstatement of
    fact dispositive on the Lanham Act claim, but it’s also
    dispositive on its state-law claims. We thus should have also
    affirmed the dismissal of Enigma’s claims for (1) violation
    of New York General Business Law § 349, (2) tortious
    interference with business relations, and (3) tortious
    interference with contractual relations. In reviving the § 349
    46 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    and business relations claims, the majority concludes that
    New York has personal jurisdiction over Malwarebytes.
    While I have serious reservations about the majority’s
    jurisdictional analysis, we didn’t need to reach that question
    because Enigma’s claims would fail under either New York
    or California law.
    First, General Business Law § 349, New York’s law
    against deceptive business acts and practices, generally
    follows the Lanham Act. “[W]hat is non-actionable opinion
    under the Lanham Act is also non-actionable . . . under
    General Business Law § 349.” ONY, Inc. v. Cornerstone
    Therapeutics, Inc., 
    720 F.3d 490
    , 498 (2d Cir. 2013). Since
    I would conclude that Malwarebytes’ flagging of Enigma’s
    products was non-actionable opinion, Enigma’s § 349 claim
    must be dismissed as well.
    Second, Enigma’s claim for tortious interference with
    business relations is not viable under either California or
    New York law. In California, “interference with prospective
    economic advantage requires a plaintiff to allege an act that
    is wrongful independent of the interference itself.” CRST
    Van Expedited, Inc. v. Werner Enters., Inc., 
    479 F.3d 1099
    ,
    1108 (9th Cir. 2007). “[A]n act is independently wrongful
    if it is unlawful, that is, if it is proscribed by some
    constitutional, statutory, regulatory, common law, or other
    determinable legal standard.” Korea Supply Co. v. Lockheed
    Martin Corp., 
    63 P.3d 937
    , 954 (Cal. 2003). New York has
    adopted a similar general rule requiring an “independently
    unlawful act” for tortious interference with a business
    relationship. Carvel Corp. v. Noonan, 
    818 N.E.2d 1100
    ,
    1103 (N.Y. 2004). There is an “exception” in New York,
    however, when a defendant engages in “egregious
    wrongdoing” in the absence of an independent act, like
    ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC. 47
    acting for the “sole purpose of inflicting intentional harm on
    plaintiffs.” 
    Id.
     at 1102–03 (simplified).
    Here, because Enigma’s Lanham Act claim fails, it
    hasn’t shown that Malwarebytes engaged in independent
    wrongdoing for a business interference tort. And while
    Enigma alleges that Malwarebytes acted with anti-
    competitive animus, that is not enough to invoke New
    York’s exception to the general rule because the exception
    does not apply to “normal economic self-interest.” 
    Id. at 1103
    . As Enigma alleged, Malwarebytes also sought to
    increase sales and “secur[e] a stronger, more dominant”
    market position for itself. Thus, Enigma concedes that
    Malwarebytes did not act “solely” to target Enigma, which
    the exception requires. See 
    id. at 1103
    . So Enigma’s
    business tort claim fails.
    Third, I agree with the majority that Enigma failed to
    plead tortious interference with a contract—although I
    would hold it failed to do so under both New York and
    California law. Enigma’s claim fails under California law
    because it doesn’t allege an “independently wrongful act,”
    as discussed above. See Ixchel Pharma, LLC v. Biogen, Inc.,
    
    470 P.3d 571
    , 580 (Cal. 2020) (“We therefore hold that to
    state a claim for interference with an at-will contract by a
    third party, the plaintiff must allege that the defendant
    engaged in an independently wrongful act.”). And the claim
    must be dismissed under New York law because Enigma
    hasn’t alleged a breach of a specific contract. See NBT
    Bancorp Inc. v. Fleet/Norstar Fin. Grp., Inc., 
    664 N.E.2d 492
    , 495–96 (N.Y. 1996) (Absent wrongful means, there is
    no tort “[w]here there has been no breach of an existing
    contract[.]”).
    48 ENIGMA SOFTWARE GRP. USA, LLC V. MALWAREBYTES, INC.
    So, in sum, the lack of an actionable Lanham Act claim
    deprives Enigma of its other claims.
    IV.
    For all these reasons, we should have affirmed the
    district court’s order. I respectfully dissent.
    

Document Info

Docket Number: 21-16466

Filed Date: 6/2/2023

Precedential Status: Precedential

Modified Date: 6/2/2023

Authorities (30)

Alfred Gerome Nelson and Vida Nelson v. International Paint ... , 716 F.2d 640 ( 1983 )

Ferens v. John Deere Co. , 110 S. Ct. 1274 ( 1990 )

Parekh v. Cain , 948 N.Y.S.2d 72 ( 2012 )

D.H. Blair & Co. v. Gottdiener , 462 F.3d 95 ( 2006 )

ZETES, JAMES P. v. STEPHENS, KELLY A. , 969 N.Y.S.2d 298 ( 2013 )

Citigroup Inc. v. City Holding Co. , 97 F. Supp. 2d 549 ( 2000 )

Weisbuch v. County of Los Angeles , 119 F.3d 778 ( 1997 )

Carvel Corp. v. Noonan , 350 F.3d 6 ( 2003 )

Chloé v. Queen Bee of Beverly Hills, LLC , 616 F.3d 158 ( 2010 )

Best Van Lines, Inc. v. Tim Walker, Docket No. 04-3924-Cv , 490 F.3d 239 ( 2007 )

ONY, Inc. v. Cornerstone Therapeutics, Inc. , 720 F.3d 490 ( 2013 )

Johnnie L. Cochran, Jr. v. Nyp Holdings, Inc., a Delaware ... , 210 F.3d 1036 ( 2000 )

Newcal Industries, Inc. v. IKON Office Solution , 513 F.3d 1038 ( 2008 )

Korea Supply Co. v. Lockheed Martin Corp. , 131 Cal. Rptr. 2d 29 ( 2003 )

Enigma Software Group USA, LLC v. Malwarebytes Inc. , 260 F. Supp. 3d 401 ( 2017 )

Partington v. Bugliosi , 56 F.3d 1147 ( 1995 )

Underwager v. Channel 9 Australia , 69 F.3d 361 ( 1995 )

Evel Knievel Krystal Knievel v. Espn, a Subsidiary of Walt ... , 393 F.3d 1068 ( 2005 )

Diane C. Martin v. Nelson Stokes T/a Nelson Stokes Garage ... , 623 F.2d 469 ( 1980 )

Van Dusen v. Barrack , 84 S. Ct. 805 ( 1964 )

View All Authorities »