All Courts |
Federal Courts |
US Federal District Court Cases |
District Court, District of Columbia |
2010-07 |
-
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA LEWIS-BURKE ASSOCIATES LLC, Plaintiff, v. Civil Action No. 09-302 (JMF) JOEL WIDDER, Defendant. MEMORANDUM OPINION This case is before me for all purposes, including trial. It was scheduled to go to trial in February of this year; however, on the eve of the pre-trial conference, defendant filed a motion to dismiss based on lack of subject-matter jurisdiction, and the plaintiff filed a motion to amend the complaint. Due to the pending motion and the extreme weather conditions at the time of the scheduled trial, I found that it was both impossible and improvident to proceed to trial as originally scheduled. Memorandum Order [#44], February 16, 2010. I will now address all remaining motions before the Court, in the hopes of bringing this case to its conclusion. I. Background Plaintiff brings this case against Joel Widder, a former employee, alleging that he violated a Non-Competition and Confidentiality Agreement that he had entered into with plaintiff. Complaint (“Compl.”) ¶¶ 9-19. According to plaintiff, Widder took confidential and proprietary information with him when he left the firm and solicited clients for a competing business.
Id. at ¶34. Plaintiff filed a motion for a temporary restraining order, which I granted in part, enjoining defendant from (1) using for any purpose or sharing with anyone confidential or proprietary information belonging to the plaintiff; and from (2) contacting plaintiff’s current and former clients for purposes of soliciting them. Order Granting in Part and Denying in Part Motion for a Temporary Restraining Order [#4], February 19, 2009. I also ordered the parties to discuss the most appropriate means of preserving relevant electronically stored information (“ESI”) and protecting privileged or confidential information contained therein.
Id. The partiessubmitted their report on the ESI, and I issued an order on the review of electronic devices. Order Regarding Review of Electronic Devices [#11], March 13, 2009. Discovery closed on October 15, 2009, and on November 13, 2009 plaintiff filed a motion to compel production of documents and a motion to compel compliance with document subpoenas. See Plaintiff’s Motion to Compel Production of Documents [#26]; and Plaintiff’s Motion to Compel Compliance with Document Subpoenas [#27]. Defendant did not submit any opposition to the motions, and I granted the motions on December 8, 2009. On January 8, 2010, plaintiff filed a motion for sanctions, which is currently pending before me, in relation to the two motions to compel. See Plaintiff’s Motion for Sanctions [#29] (“Pl. Mot. for Sanctions”). On January 28, 2010, plaintiff filed a motion in limine that sought to exclude certain testimony and to preclude defendant from introducing into evidence a change in Lewis-Burke Associates LLC’s (“Lewis-Burke”) commission policy. Plaintiff’s Motion In Limine [#32] (“Pl. Mot. In Limine”). On February 8, 2010, defendant filed a motion to dismiss for lack of subject-matter jurisdiction. Motion to Dismiss [#38] (“Mot. to Dismiss”). The parties then filed their pre-trial statement on February 11, 2010, and plaintiff filed a motion to amend the same day. Plaintiff’s Motion to Amend Complaint [#42] (“Mot. to Amend”). The Court was closed, due to inclement weather, from 2 noon on February 5, 2010 until 10:00 am on February 12, 2010, the day of the pre-trial conference. Thus, because the Court was closed for this long period of time, the motion to dismiss, motion to amend, and pre-trial statements were not accessible to the Court until February 12, 2010, the day of the pre-trial conference. In light of the pending motions, I continued the trial until the pending motions were resolved. At the pre-trial conference, I determined that I would hold an evidentiary hearing regarding the motion for sanctions. That hearing was to be set after the scheduled jury selection; however, in light of the continuance of the trial, the hearing was not held. I will reset the evidentiary hearing on the motion for sanctions in a separate order. I will address the remaining motions in turn. II. Motion to Dismiss Defendant moves to dismiss the case for lack of subject-matter jurisdiction under Rule 12(b)(1) of the Federal Rules of Civil Procedure. Mot. to Dismiss 1. Defendant argues that the federal court’s jurisdiction over the matter is predicated on plaintiff’s claim under the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, et seq.,1 and that plaintiff failed to meet the jurisdictional threshold for the claim. Mot. to Dismiss 1. Rule 12(b)(1) concerns the power of the Court to hear plaintiff’s case; as such, a party may raise the objection that a federal court lacks subject-matter jurisdiction at any stage of the litigation. Fed. R. Civ. P. 12(b)(1); Ghawanmeh v. Islamic Saudi Academy,
672 F. Supp. 2d 3, 7 (D.D.C. 2009) (quoting Arbaugh v. Y & H Corp.,
546 U.S. 500, 506 (2006); and Casanova v. Marathon Corp.,
256 F.R.D. 11, 12 1 All references to the United States Code or the Code of Federal Regulations are to the electronic versions that appear in Westlaw or Lexis. 3 (D.D.C. 2009)). Thus, “‘a Rule 12(b)(1) motion imposes on the court an affirmative obligation to ensure that it is acting within the scope of its jurisdictional authority.’” Ghawanmeh, 672 F. Supp. 2d at 7 (quoting Grand Lodge of Fraternal Order of Police v. Ashcroft,
185 F. Supp. 2d 9, 13 (D.D.C. 2001)). Defendant also invokes Rule 12(b)(6) of the Federal Rules of Civil Procedure as grounds for dismissal for plaintiff’s failure to state a CFAA claim. Mot. to Dismiss 1. The Federal Rules of Civil Procedure require a pleading to contain “a short and plain statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). The pleading should, thus, “‘give the defendant fair notice of what the . . . claim is and the grounds upon which it rests.’” Bell Atl. Corp. v. Twombly,
550 U.S. 544, 555 (2007) (quoting Conley v. Gibson,
355 U.S. 41, 47 (1957)). More than a mere “formulaic recitation of the elements of a cause of action” must be alleged to survive a motion to dismiss.
Twombly, 550 U.S. at 555(citing Papasan v. Allain,
478 U.S. 265, 286 (1986) (on a motion to dismiss, courts “are not bound to accept as true a legal conclusion couched as a factual allegation”)). Thus, for a complaint to survive a motion to dismiss, “[it] must contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. Iqbal,
129 S. Ct. 1937, 1949 (2009) (quoting
Twombly, 550 U.S. at 570). The CFAA is a criminal statute; however, subsection (g) of the statute provides a civil cause of action to “any person who suffers damage or loss by reason of a violation” of the CFAA. 18 U.S.C. § 1030(g). Under the statute, such a person may obtain compensatory damages and injunctive relief or other equitable relief, but only if the conduct leading to the violation of the CFAA involves one of the factors “set forth in subclauses (I), (II), (III), (IV), or (V) of subsection 4 (c)(4)(A)(i).”
Id. The conductrelevant in this case is set forth in 18 U.S.C. § 1030(c)(4)(A)(i)(I), which states that the CFAA is violated when there is a “loss to 1 or more persons during any 1- year period . . . aggregating at least $5,000 in value.” 18 U.S.C. § 1030(c)(4)(A)(i)(I). Under the statute, loss is defined as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11). Thus, a “private plaintiff must prove that the defendant violated one of the provisions of § 1030(a)(1)-(7), and that the violation involved one of the factors listed in § 1030(a)(5)(B).” LVRC Holdings LLC v. Brekka,
581 F.3d 1127, 1131 (9th Cir. 2009). Plaintiff alleges that defendant violated subsection (a)(2) of the CFAA, which prohibits “intentionally access[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] . . . information from any protected computer.” 18 U.S.C. § 1030(a)(2). Under the statute, “exceeds authorized access” is defined as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Further, a “protected computer” means “a computer . . . which is used in or affecting interstate or foreign commerce or communication . . .”
Id. at (e)(2)(B).Therefore, to bring an action successfully under 18 U.S.C. § 1030(g) based on a violation of 18 U.S.C. § 1030(a)(2), plaintiff must show that defendant: (1) intentionally accessed a computer, (2) without authorization or exceeding authorized access, and that he (3) thereby obtained information (4) from any protected computer (if the conduct 5 involved an interstate or foreign communication), and that (5) there was loss to one or more persons during any one-year period aggregating at least $5,000 in value.
Brekka, 581 F.3d at 1132. Plaintiff alleges that defendant “was not authorized by Lewis-Burke to access, via its protected computer systems, the Confidential and Proprietary Information for his personal gain or that of a competitor.” Compl. ¶ 39. Further, it is through these actions that defendant “has intentionally accessed a computer system without authorization and has exceeded his authority to obtain information from a protected computer in violation of 18 U.S.C. § 1030(a)(2)(C).”
Id. at ¶40. Plaintiff further alleges that it has suffered damages and loss a result of defendant’s action in an amount to be determined at trial.
Id. at ¶41. Nevertheless, upon information and belief, plaintiff alleges “the damages caused by Widder’s theft of highly confidential and proprietary information far exceeds (sic) $5,000,” that “the reasonable expenditure of funds to conduct the forensic analysis of Widder’s USB drive and Lewis-Burke’s computer has exceeded $5,000,” and that the damages due to compromised integrity and the resulting reduced value of the Confidential and Proprietary Information because of Widder’s actions far exceed $5,000.
Id. Defendant arguesthat the complaint “fails to make sufficient allegations of lack of authorization on defendant’s part in accessing or copying Lewis-Burke’s computer data.” Mot. to Dismiss 4. Further, defendant argues that “the complaint fails to allege damage or loss within the statutory definition and fails to establish that the $5,000 jurisdictional threshold was met.”
Id. I willaddress each of these in turn. 6 A. Access Without Authorization or Exceeding Authorization The complaint alleges that when defendant accessed and obtained data from the computer for personal use or that of a competitor, he acted without authorization or in excess of the authorization he had to access that data. Compl. ¶¶ 39-40. In other words, according to plaintiff, the defendant’s authorization to access certain information turns on defendant’s intent for using the information once he obtained it. There is currently a split among the circuits that have considered this question, but the United States Court of Appeals for the District of Columbia Circuit has not yet considered the issue. Plaintiff relies on a line of cases, referred to as the Citrin cases, which determine whether authorization exists in light of a person’s duty of loyalty. See Int’l Airport Ctrs., LLC v. Citrin,
440 F.3d 418, 420-421 (7th Cir. 2006). In Citrin, Judge Posner determined that when a contractor breached his duty of loyalty, his authorization to use an employer-provided laptop ceased because his interests were adverse to the interests of the employer.
Id. at 420.Thus, for the Seventh Circuit, and courts following Citrin, violating the duty of loyalty or acting with interests adverse to the employer voids the authorization an employee may have to access the computer.
Id. at 421(citing State v. DiGiulio,
835 P.2d 488, 492 (Ariz. 1992). Plaintiff adopts this argument and insists that defendant’s authorization ceased when he decided to leave the firm and join a competing institution. Defendant, however, urges the Court to follow the Brekka line of cases. In Brekka, the Ninth Circuit Court of Appeals found that the plain language of the statute should be understood to mean that when “an employer gives an employee permission to use [a company computer],” 7 the employer is giving that “employee ‘authorization’ to access [it].”
Brekka, 581 F.3d at 1133. Thus, according to Brekka, “for purposes of the CFAA, when an employer authorizes an employee to use a company computer subject to certain limitations, the employee remains authorized to use the computer even if the employee violates those limitations.”
Id. Only theemployer’s decision “to allow or to terminate an employee’s authorization to access a computer . . . determines whether the employee is with or ‘without authorization.’”
Id. “Exceeds authorizedaccess” is defined by the statute as “access[ing] a computer with authorization and [using] such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). The court in Brekka understood this to mean that “for purposes of the CFAA, when an employer authorizes an employee to use a company computer subject to certain limitations, the employee remains authorized to use the computer even if the employee violates those limitations.”
Brekka, 581 F.3d at 1133. Thus, according to Brekka, an employer’s decision to allow or terminate an employee’s authorization is the determining factor as to whether the employee is with or without authorization.
Id. In thiscase, there is no dispute that Widder was still an employee of Lewis-Burke when he allegedly copied certain files to a thumb drive. Plaintiff claims that some of the access occurred on defendant’s very last day as an employee of plaintiff; however, it still occurred while he was in the employ of plaintiff, and plaintiff has not alleged to have terminated his authorization to access the computer before he left its employ. There is an allegation that the forensic exam demonstrated that certain files were accessed from the thumb drive after Widder was no longer employed by Lewis-Burke; however, there is no allegation that Widder accessed his Lewis-Burke computer or the server after his employment with it ended. The CFAA is 8 concerned with access to a computer; Widder’s alleged access to data on a thumb drive would fall outside of plaintiff’s CFAA claim. In determining whether Widder exceeded his authorization, I am persuaded by the Brekka line of cases, which have recently gained critical mass. See, e.g., Nat’l City Bank, N.A. v. Republic Mortgage Home Loans, LLC, No. 09-CV-1550,
2010 WL 959925, at *2 (W.D. Wash. Mar. 12, 2010); Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc.,
690 F. Supp. 2d 1267, 1272 (M.D. Ala. 2010); ReMedPar, Inc. v. AllParts Medical, LLC,
683 F. Supp. 2d 605, 611 (M.D. Tenn. 2010). In Brekka, the court adopts a statutory interpretation of the CFAA that reflects the plain reading of the statute. See
Brekka, 581 F.3d at 1135. In doing so, the court determines that “‘authorization’ depends on actions taken by the employer.”
Id. Thus, asBrekka notes: Nothing in the CFAA suggests that a defendant’s liability for accessing a computer without authorization turns on whether the defendant breached a state law duty of loyalty to an employer. If the employer has not rescinded the defendant’s right to use the computer, the defendant would have no reason to know that making personal use of the company computer in breach of a state law fiduciary duty to an employer would constitute a criminal violation of the CFAA. It would be improper to interpret a criminal statute in such an unexpected manner. See United States v. Carr,
513 F.3d 1164, 1168 (9th Cir. 2008).
Brekka, 581 F.3d at 1135. I believe that the D.C. Circuit, faced with this issue, would rule in a manner consistent with both the Brekka cases and the plain meaning of the statute. The interpretation proposed by Citrin would mean that the same employee might have different authorization to access the same document on the same computer throughout his or her employ. For example, an employee might 9 generate a report during the course of his employment, to which he would have authorized access. If, as time progressed, the employee began looking for employment elsewhere, and he accessed the report to refresh his memory as to what he did on the report so that he could better describe his skills and abilities on his résumé or in an interview, under Citrin, he would have accessed the report without authorization. Then, if the employee was internally promoted, decided not to seek outside employment, and accessed the report to provide an example to one of his new subordinates of how he liked reports written, his interests would again be aligned with the employer, and his access would be authorized. In the extreme example, the same employee’s authorization to access a document could concurrently be both with authorization and exceeding authorization. For example, the employee could have authority to access a report to e-mail it out for a superior to review, but his authorization might be exceeded if he then also decided to blind copy his personal e-mail account, so that he would have a copy of the report to use as a writing sample for a future job search. Congress could not have intended a person’s criminal and civil liability to be so fluid, turning on whether a person’s interests were adverse to the interests of an entity authorizing the person’s access. See, e.g., S. Rep. No. 99-432, at 21 (1986), as reprinted in 1986 U.S.C.C.A.N. 2479, 2494-95 (discussing amendment that “remove[d] from the sweep of the statute one of the murkier grounds of liability, under which [an] employee’s access to computerized data might be legitimate in some circumstances, but criminal in other (not clearly distinguishable) circumstances that might be held to exceed his authorization”). Such an interpretation is not only confusing, but antithetical to the rule of lenity, which forbids the Court from “‘interpret[ing] a federal criminal statute so as to increase the penalty that it places on an individual when such an interpretation can be based on no more than a guess as to what Congress 10 intended.’” United States v. Villanueva-Sotelo,
515 F.3d 1234, 1246 (D.C. Cir. 2008) (quoting Ladner v. United States,
358 U.S. 169, 178 (1958)). The CFAA is primarily a criminal statute, with a civil cause of action, and a court is bound to interpret the statute consistently; thus, the rule of lenity must be considered even in its civil application. See Leocal v. Ashcroft, 543 U.S. 1,12 n.8 (2004). The CFAA was designed primarily to deter computer hacking. See A.V. ex rel. Vanderhye v. iParadigms, LLC,
562 F.3d 630, 645 (4th Cir. 2009). Whatever Widder is alleged to have done, he did not hack into the computer or access it without authorization. Further, he had valid authorization to access the computer, and did not exceed that authorization by accessing information that Lewis-Widder had indicated he was not entitled to access. See, e.g.,
Brekka, 581 F.3d at 1133. Whether Widder had permission to copy documents onto his thumb drive or to subsequently use the data from a non-Lewis Burke computer, after he had left its employ, is not a question that relates to his liability under the CFAA. “‘Exceeds authorized access’ should not be confused with exceeds authorized use.” Bell Aerospace Servs., Inc., 690 F. Supp. 2d at 1272-73, (citing Diamond Power Int’l, Inc. v. Davidson,
540 F. Supp. 2d 1322, 1343 (N.D. Ga. 2007)). I will grant defendant’s motion to dismiss the CFAA claim. Defendant, however, also seeks to dismiss the entire case, based on lack of subject-matter jurisdiction, arguing that the Court only has jurisdiction over the other claims via supplemental jurisdiction. Plaintiff counters that the Court has diversity jurisdiction and has moved to amend the complaint to reflect this. I now will consider plaintiff’s motion to amend. 11 III. Motion to Amend Plaintiff’s initial response to defendant’s motion to dismiss was to file a motion to amend the complaint. See Mot. to Amend. On the eve of trial, plaintiff presumably thought that the most expeditious way to oppose defendant’s motion to dismiss was to ensure that the Court had subject-matter jurisdiction by amending its complaint to allege diversity jurisdiction. Rule 15 of the Federal Rules of Civil Procedure governs the amending and supplementing of pleadings. See Fed. R. Civ. P. 15. Rule 15(a)(2) allows a party to amend its pleading with the written consent of the opposing party or the court’s leave, noting that “the court should freely give leave when justice so requires.”
Id. “The decisionto grant or deny leave to amend is within the sound discretion of the trial court, [and] it is an abuse of discretion to deny leave without a sufficient reason;” however, the liberal standard by which a court may grant leave to amend does have its limitations. See, e.g., Becker v. District of Columbia,
258 F.R.D. 182, 184-86 (D.D.C. 2009) (citing Dove v. Wash. Metro. Area Transit Auth.,
221 F.R.D. 246, 247 (D.D.C. 2004)). While the Supreme Court has instructed that “the leave to amend shall be ‘freely given,’” it also provides examples of when such leave may be denied, including undue delay, bad faith or dilatory motive on the part of the movant, repeated failure to cure deficiencies by amendments previously allowed, undue prejudice to the opposing party, and futility of amendment. Foman v. Davis,
371 U.S. 178, 182 (1962); see also Belizan v. Hershon,
434 F.3d 579, 582 (D.C. Cir. 2006). The party opposing the amendment bears the burden of showing why leave should not be granted.
Becker, 258 F.R.D. at 184(citing
Dove, 221 F.R.D. at 247)). Defendant asserts that the motion should be denied because: (1) the amendment would be 12 futile; (2) the amount in controversy is insufficient to trigger the Court’s jurisdiction; and (3) denying the motion would allow for “an orderly exploration of the jurisdictional issue” raised by defendant. Defendant’s Opposition to Motion to Amend Complaint [#43] (“Def. Opp. to Amend”) at 2-11. The third point is moot, as I have explored above the jurisdictional issue raised by defendant. Thus, I will consider the first two points. Defendant claims that the amendment would be futile. While a court may deny a motion to amend on the grounds of futility,2 it may do so only “if the proposed claim would not survive a motion to dismiss.” James Madison Ltd. by Hecht v. Ludwig,
82 F.3d 1085, 1099 (D.C. Cir. 1996) (citing
Foman, 371 U.S. at 181-82; Moldea v. New York Times,
22 F.3d 310, 319 (D.C. Cir.), cert. denied,
513 U.S. 875(1994)). Defendant attacks plaintiff’s claim of diversity jurisdiction on two fronts: (1) plaintiff’s amended complaint alleges diversity as of the date of the amendment, and not at the time the action commenced, requiring the Court to draw an inference; and (2) “the Second Amended Complaint [does] not rule out the possibility that the LLC had other ‘members’ of unknown citizenship at the time the case was filed.” Def. Opp. to Amend 3. Defendant argues that “the federal pleading standard . . . is not so flexible as to allow plaintiff to demand the [C]ourt’s acceptance of all possible inferences,”3 but then he asks the Court to infer that the parties’ citizenship at the time of the motion to amend was different than it was when the complaint was filed, without providing any indication, other than speculation, as to why. The standard of finding futility is whether or not the amendment would survive a motion 2 Foman v.
Davis, 371 U.S. at 182. 3 Def. Opp. to Amend 4 (citing Iqbal,
129 S. Ct. 1937(2009); Twombly,
550 U.S. 544(2007)). 13 to dismiss. James Madison Ltd. by
Hecht, 82 F.3d at 1099. When considering a Rule 12(b)(1) motion to dismiss, a court may consider materials outside of the pleadings. Lipsman v. Sec’y of Army,
257 F. Supp. 2d 3, 6 (D.D.C. 2003) (citing Herbert v. Nat’l Acad. of Scis.,
974 F.2d 192, 197 (D.C. Cir. 1992)). Plaintiff’s reply brief in support of its motion to amend includes a declaration by April L. Burke, which clearly states that Burke is both the sole member of Lewis- Burke and has continuously resided in Virginia. Plaintiff’s Reply Memorandum in Support of Its Motion to Amend Complaint [#48] at Ex. A. Widder admits to residing in Maryland. See Answer to Plaintiff’s First Amended Complaint [#25] at ¶ 2. In light of this, I cannot find that plaintiff’s proposed amendment would be futile. Defendant also claims that plaintiff’s claim of $75,000 is a bald assertion and that “plaintiff fails to make any allegations that allow the [C]ourt to assess the validity of the claim that the amount in controversy exceeds $75,000.” Def. Opp. to Amend 4. Plaintiff’s proposed Second Amended Complaint does allege that the amount in controversy exceeds $75,000. See Mot. to Amend, Ex. 1 at ¶ 3. Nevertheless, defendant wants the Court to deny plaintiff’s motion to amend and refer to its damage calculations as fanciful. Mot. to Amend 5. A court should be “very confident that a party cannot recover the jurisdictional amount before dismissing the case for want of jurisdiction.” Rosenboro v. Kim,
994 F.2d 13, 17 (D.C. Cir. 1993). In the parties’ joint pretrial statement, plaintiff claims to have calculated damages to be $834,213. See Joint Pretrial Statement [#35] at 16. Defendant characterizes these calculations as “beyond speculation” and “into the realm of fantasy,” however, the Court may dismiss the case (or deny a motion to amend), if “from the face of the pleadings, it is apparent, to a legal certainty, that the plaintiff cannot recover the amount claimed . . .”
Rosenboro, 994 F.2d at 17. It is not apparent 14 from the face of the pleadings, “to a legal certainty,” that plaintiff cannot recover in excess of $75,000. I will grant plaintiff’s motion to amend. III. Motion In Limine Plaintiff seeks to exclude from trial: (1) evidence of communications in September and October 2008 between April Burke of Lewis-Burke and Andrew Givens of Public Broadcasting Service (“PBS”), a client of Lewis-Burke, regarding Widder’s departure and Lewis-Burke’s work for PBS; and (2) “any defense by Widder at trial that a putative change in his compensation at Lewis-Burke somehow excuses his breach of his Non-Competition and Confidentiality Agreement with Lewis-Burke (‘Non-Compete’).” Memorandum of Points and Authorities in Support of Plaintiff’s Motion In Limine [#32] (“Memo. to Mot. in limine”) at 1. A. Introduction of E-mail Communications between Burke and Givens Plaintiff seeks to exclude evidence of the communications between Burke and Givens. Specifically, plaintiff argues that DEX #1, a series of e-mail exchanges between Burke and Givens, should be excluded on the following grounds: (1) that defendant failed to assert waiver as an affirmative defense in his original answer or in his answer to plaintiff’s amended complaint; (2) that the defense is futile, irrelevant, and predicated on inadmissible hearsay; and (3) that its admission would be unduly prejudicial.
Id. at 2.Defendant claims that it will call Givens to testify at trial, and that his testimony will “show that plaintiff failed to show certain elements of its prima facie case.” Defendant’s Opposition to Motion In Limine [#34] (“Def. Opp. Mot. in limine”) at 1-2. Thus, according to defendant, the evidence does not implicate an affirmative defense.
Id. While motionsin limine can be useful, on occasion, they can create confusion because it 15 is impossible to predict confidently the exact flow and significance of the evidence elicited at trial. It may be helpful to clear some brush away to expose what really is at stake. An e-mail exchange between Burke and Givens is Exhibit 1 to Plaintiff’s motion. See Pl. Mot. In Limine at Ex. 1. In the opening e-mail, dated March 24, 2008, Burke indicates to Givens that she has the “distinct feeling” that Givens knows that defendant, Joel Widder, is leaving plaintiff’s employ to go to work for what Burke calls “the National Group/Oldecker law firm.”
Id. She notesthat since this entity consists of “guys [who] are [Given’s] close buddies from the Hill” [i.e. Capitol Hill], she thinks that she can predict that PBS will be terminating its relationship with Lewis-Burke.
Id. There musthave been an intervening phone call, because Givens refers to it and indicates that it was “concerning” the departure of Joel Widder from Lewis-Burke.
Id. Givens thenindicates that it is his understanding that “pursuant to Section 6 of our contract [i.e., between PBS and Lewis-Burke] we have concluded our relationship in a very amicable and professional manner.”
Id. Givens thenconveys his belief that PBS is current on all of its outstanding balances and thanks Lewis-Burke’s for all of its work on behalf of PBS. Burke then replies, within three minutes, that all of PBS’s payments are current.
Id. First, Givens’se-mail is hearsay insofar as it is offered for the truth of its contents. Burke’s e-mails are not hearsay because they are statements of a party or of the representative of a party. Fed. R. Evid. 801(d)(2). Second, the relevance of Givens’s e-mail is questionable. There is nothing in it from which a reasonable person could deduce that Burke was excusing or condoning any violation of Widder’s contractual obligation to Lewis-Burke to neither solicit business from Lewis-Burke’s 16 clients nor work for them after he left Lewis-Burke’s employ. I appreciate that during his deposition Widder seemed to suggest that, although he never spoke to Burke, he somehow deduced from his conversations with Givens that his working for PBS had been excused by Burke in her conversations with Givens. But, clearly, what Givens may have told plaintiff is hearsay and Widder cannot testify to it. B. Givens’s Testimony Widder adjures any reliance on out of court statements by Givens but plans to call him as a witness to establish that the departure of PBS from Lewis-Burke was not caused by Widder’s departure and would have happened in any event. But, Widder ignores that the only evidence I presently have is Burke’s e-mail of September 24, 2008 in which she directly attributes the loss of the PBS business to Widder’s departure from Lewis-Burke, a statement perfectly consistent with a claim that Widder’s departure caused the loss of the PBS business. I emphasize that I am speaking only of the information I presently have. I do not know as much as I want to know about any conversations between Burke and Givens, or any other PBS representative, about the how, why, and ultimate effect of Widder’s departure upon the termination of the relationship between PBS and Lewis-Burke. Subject to an additional discussion at the pre-trial conference and to a possible voir dire of the pertinent witnesses as to this question, out of the hearing of the jury, I will defer ruling on the relevance of the potential testimony I have summarized. I should note in this context that I certainly appreciate Lewis-Burke’s point that Widder violates the covenant by either soliciting PBS’s business or working for PBS while employed by any one other than Lewis-Burke. Thus, how Widder’s new firm got PBS’s business may be 17 irrelevant, if Lewis-Burke presses only its contention that Widder’s working for PBS was the violation of the covenant. C. Evidence Regarding Changes in Widder’s Compensation Another issue raised in plaintiff’s motion in limine is the question of the relevance of any testimony from Widder about a diminution of his expected compensation and its relation to any alleged breach of his covenant not to compete. As Lewis-Burke correctly points out, the covenant not to compete is, by its stated terms, an integrated agreement. There is not a word in it about plaintiff’s compensation that could be interpreted to mean that his compensation and the covenant not to compete were mutual obligations in that one was given in consideration of the other. Accordingly, any testimony about his compensation is irrelevant. IV. Conclusion For the reasons stated herein, defendant’s motion to dismiss plaintiff’s CFAA claim will be granted. Plaintiff’s motion to amend will also be granted. Defendant’s motion to dismiss the case for lack of subject matter jurisdiction will be denied. Plaintiff’s motion in limine will be denied in part and granted in part. A status conference and evidentiary hearing in this case will be set in a separate order. The parties should be prepared at the status conference to set a trial date in early October 2010. A separate order accompanies this memorandum opinion. Digitally signed by John M. Facciola Date: 2010.07.28 10:00:21 -04'00' JOHN M. FACCIOLA UNITED STATES MAGISTRATE JUDGE 18
Document Info
Docket Number: Civil Action No. 2009-0302
Judges: Magistrate Judge John M. Facciola
Filed Date: 7/28/2010
Precedential Status: Precedential
Modified Date: 10/30/2014