Lewis-Burke Associates LLC v. Widder ( 2010 )


Menu:
  •                             UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    LEWIS-BURKE ASSOCIATES LLC,
    Plaintiff,
    v.                                          Civil Action No. 09-302 (JMF)
    JOEL WIDDER,
    Defendant.
    MEMORANDUM OPINION
    This case is before me for all purposes, including trial. It was scheduled to go to trial in
    February of this year; however, on the eve of the pre-trial conference, defendant filed a motion to
    dismiss based on lack of subject-matter jurisdiction, and the plaintiff filed a motion to amend the
    complaint. Due to the pending motion and the extreme weather conditions at the time of the
    scheduled trial, I found that it was both impossible and improvident to proceed to trial as
    originally scheduled. Memorandum Order [#44], February 16, 2010. I will now address all
    remaining motions before the Court, in the hopes of bringing this case to its conclusion.
    I. Background
    Plaintiff brings this case against Joel Widder, a former employee, alleging that he violated
    a Non-Competition and Confidentiality Agreement that he had entered into with plaintiff.
    Complaint (“Compl.”) ¶¶ 9-19. According to plaintiff, Widder took confidential and proprietary
    information with him when he left the firm and solicited clients for a competing business. 
    Id. at ¶
    34. Plaintiff filed a motion for a temporary restraining order, which I granted in part, enjoining
    defendant from (1) using for any purpose or sharing with anyone confidential or proprietary
    information belonging to the plaintiff; and from (2) contacting plaintiff’s current and former
    clients for purposes of soliciting them. Order Granting in Part and Denying in Part Motion for a
    Temporary Restraining Order [#4], February 19, 2009. I also ordered the parties to discuss the
    most appropriate means of preserving relevant electronically stored information (“ESI”) and
    protecting privileged or confidential information contained therein. 
    Id. The parties
    submitted
    their report on the ESI, and I issued an order on the review of electronic devices. Order
    Regarding Review of Electronic Devices [#11], March 13, 2009. Discovery closed on October
    15, 2009, and on November 13, 2009 plaintiff filed a motion to compel production of documents
    and a motion to compel compliance with document subpoenas. See Plaintiff’s Motion to
    Compel Production of Documents [#26]; and Plaintiff’s Motion to Compel Compliance with
    Document Subpoenas [#27]. Defendant did not submit any opposition to the motions, and I
    granted the motions on December 8, 2009. On January 8, 2010, plaintiff filed a motion for
    sanctions, which is currently pending before me, in relation to the two motions to compel. See
    Plaintiff’s Motion for Sanctions [#29] (“Pl. Mot. for Sanctions”). On January 28, 2010, plaintiff
    filed a motion in limine that sought to exclude certain testimony and to preclude defendant from
    introducing into evidence a change in Lewis-Burke Associates LLC’s (“Lewis-Burke”)
    commission policy. Plaintiff’s Motion In Limine [#32] (“Pl. Mot. In Limine”). On February 8,
    2010, defendant filed a motion to dismiss for lack of subject-matter jurisdiction. Motion to
    Dismiss [#38] (“Mot. to Dismiss”). The parties then filed their pre-trial statement on February
    11, 2010, and plaintiff filed a motion to amend the same day. Plaintiff’s Motion to Amend
    Complaint [#42] (“Mot. to Amend”). The Court was closed, due to inclement weather, from
    2
    noon on February 5, 2010 until 10:00 am on February 12, 2010, the day of the pre-trial
    conference. Thus, because the Court was closed for this long period of time, the motion to
    dismiss, motion to amend, and pre-trial statements were not accessible to the Court until
    February 12, 2010, the day of the pre-trial conference.
    In light of the pending motions, I continued the trial until the pending motions were
    resolved. At the pre-trial conference, I determined that I would hold an evidentiary hearing
    regarding the motion for sanctions. That hearing was to be set after the scheduled jury selection;
    however, in light of the continuance of the trial, the hearing was not held. I will reset the
    evidentiary hearing on the motion for sanctions in a separate order. I will address the remaining
    motions in turn.
    II. Motion to Dismiss
    Defendant moves to dismiss the case for lack of subject-matter jurisdiction under Rule
    12(b)(1) of the Federal Rules of Civil Procedure. Mot. to Dismiss 1. Defendant argues that the
    federal court’s jurisdiction over the matter is predicated on plaintiff’s claim under the Computer
    Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, et seq.,1 and that plaintiff failed to meet the
    jurisdictional threshold for the claim. Mot. to Dismiss 1. Rule 12(b)(1) concerns the power of
    the Court to hear plaintiff’s case; as such, a party may raise the objection that a federal court
    lacks subject-matter jurisdiction at any stage of the litigation. Fed. R. Civ. P. 12(b)(1);
    Ghawanmeh v. Islamic Saudi Academy, 
    672 F. Supp. 2d 3
    , 7 (D.D.C. 2009) (quoting Arbaugh v.
    Y & H Corp., 
    546 U.S. 500
    , 506 (2006); and Casanova v. Marathon Corp., 
    256 F.R.D. 11
    , 12
    1
    All references to the United States Code or the Code of Federal Regulations are to the
    electronic versions that appear in Westlaw or Lexis.
    3
    (D.D.C. 2009)). Thus, “‘a Rule 12(b)(1) motion imposes on the court an affirmative obligation
    to ensure that it is acting within the scope of its jurisdictional authority.’” Ghawanmeh, 672 F.
    Supp. 2d at 7 (quoting Grand Lodge of Fraternal Order of Police v. Ashcroft, 
    185 F. Supp. 2d 9
    ,
    13 (D.D.C. 2001)).
    Defendant also invokes Rule 12(b)(6) of the Federal Rules of Civil Procedure as grounds
    for dismissal for plaintiff’s failure to state a CFAA claim. Mot. to Dismiss 1. The Federal Rules
    of Civil Procedure require a pleading to contain “a short and plain statement of the claim
    showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). The pleading should, thus,
    “‘give the defendant fair notice of what the . . . claim is and the grounds upon which it rests.’”
    Bell Atl. Corp. v. Twombly, 
    550 U.S. 544
    , 555 (2007) (quoting Conley v. Gibson, 
    355 U.S. 41
    ,
    47 (1957)). More than a mere “formulaic recitation of the elements of a cause of action” must be
    alleged to survive a motion to dismiss. 
    Twombly, 550 U.S. at 555
    (citing Papasan v. Allain, 
    478 U.S. 265
    , 286 (1986) (on a motion to dismiss, courts “are not bound to accept as true a legal
    conclusion couched as a factual allegation”)). Thus, for a complaint to survive a motion to
    dismiss, “[it] must contain sufficient factual matter, accepted as true, to ‘state a claim to relief
    that is plausible on its face.’” Ashcroft v. Iqbal, 
    129 S. Ct. 1937
    , 1949 (2009) (quoting 
    Twombly, 550 U.S. at 570
    ).
    The CFAA is a criminal statute; however, subsection (g) of the statute provides a civil
    cause of action to “any person who suffers damage or loss by reason of a violation” of the CFAA.
    18 U.S.C. § 1030(g). Under the statute, such a person may obtain compensatory damages and
    injunctive relief or other equitable relief, but only if the conduct leading to the violation of the
    CFAA involves one of the factors “set forth in subclauses (I), (II), (III), (IV), or (V) of subsection
    4
    (c)(4)(A)(i).” 
    Id. The conduct
    relevant in this case is set forth in 18 U.S.C. § 1030(c)(4)(A)(i)(I),
    which states that the CFAA is violated when there is a “loss to 1 or more persons during any 1-
    year period . . . aggregating at least $5,000 in value.” 18 U.S.C. § 1030(c)(4)(A)(i)(I). Under the
    statute, loss is defined as “any reasonable cost to any victim, including the cost of responding to
    an offense, conducting a damage assessment, and restoring the data, program, system, or
    information to its condition prior to the offense, and any revenue lost, cost incurred, or other
    consequential damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11).
    Thus, a “private plaintiff must prove that the defendant violated one of the provisions of §
    1030(a)(1)-(7), and that the violation involved one of the factors listed in § 1030(a)(5)(B).”
    LVRC Holdings LLC v. Brekka, 
    581 F.3d 1127
    , 1131 (9th Cir. 2009).
    Plaintiff alleges that defendant violated subsection (a)(2) of the CFAA, which prohibits
    “intentionally access[ing] a computer without authorization or exceed[ing] authorized access,
    and thereby obtain[ing] . . . information from any protected computer.” 18 U.S.C. § 1030(a)(2).
    Under the statute, “exceeds authorized access” is defined as “to access a computer with
    authorization and to use such access to obtain or alter information in the computer that the
    accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Further, a “protected
    computer” means “a computer . . . which is used in or affecting interstate or foreign commerce or
    communication . . .” 
    Id. at (e)(2)(B).
    Therefore, to bring an action successfully under 18 U.S.C. § 1030(g) based on a violation
    of 18 U.S.C. § 1030(a)(2), plaintiff must show that defendant:
    (1) intentionally accessed a computer, (2) without authorization or
    exceeding authorized access, and that he (3) thereby obtained
    information (4) from any protected computer (if the conduct
    5
    involved an interstate or foreign communication), and that (5) there
    was loss to one or more persons during any one-year period
    aggregating at least $5,000 in value.
    
    Brekka, 581 F.3d at 1132
    .
    Plaintiff alleges that defendant “was not authorized by Lewis-Burke to access, via its
    protected computer systems, the Confidential and Proprietary Information for his personal gain or
    that of a competitor.” Compl. ¶ 39. Further, it is through these actions that defendant “has
    intentionally accessed a computer system without authorization and has exceeded his authority to
    obtain information from a protected computer in violation of 18 U.S.C. § 1030(a)(2)(C).” 
    Id. at ¶
    40. Plaintiff further alleges that it has suffered damages and loss a result of defendant’s action in
    an amount to be determined at trial. 
    Id. at ¶
    41. Nevertheless, upon information and belief,
    plaintiff alleges “the damages caused by Widder’s theft of highly confidential and proprietary
    information far exceeds (sic) $5,000,” that “the reasonable expenditure of funds to conduct the
    forensic analysis of Widder’s USB drive and Lewis-Burke’s computer has exceeded $5,000,” and
    that the damages due to compromised integrity and the resulting reduced value of the
    Confidential and Proprietary Information because of Widder’s actions far exceed $5,000. 
    Id. Defendant argues
    that the complaint “fails to make sufficient allegations of lack of
    authorization on defendant’s part in accessing or copying Lewis-Burke’s computer data.” Mot. to
    Dismiss 4. Further, defendant argues that “the complaint fails to allege damage or loss within the
    statutory definition and fails to establish that the $5,000 jurisdictional threshold was met.” 
    Id. I will
    address each of these in turn.
    6
    A. Access Without Authorization or Exceeding Authorization
    The complaint alleges that when defendant accessed and obtained data from the
    computer for personal use or that of a competitor, he acted without authorization or in excess of
    the authorization he had to access that data. Compl. ¶¶ 39-40. In other words, according to
    plaintiff, the defendant’s authorization to access certain information turns on defendant’s intent
    for using the information once he obtained it. There is currently a split among the circuits that
    have considered this question, but the United States Court of Appeals for the District of
    Columbia Circuit has not yet considered the issue.
    Plaintiff relies on a line of cases, referred to as the Citrin cases, which determine whether
    authorization exists in light of a person’s duty of loyalty. See Int’l Airport Ctrs., LLC v. Citrin,
    
    440 F.3d 418
    , 420-421 (7th Cir. 2006). In Citrin, Judge Posner determined that when a
    contractor breached his duty of loyalty, his authorization to use an employer-provided laptop
    ceased because his interests were adverse to the interests of the employer. 
    Id. at 420.
    Thus, for
    the Seventh Circuit, and courts following Citrin, violating the duty of loyalty or acting with
    interests adverse to the employer voids the authorization an employee may have to access the
    computer. 
    Id. at 421
    (citing State v. DiGiulio, 
    835 P.2d 488
    , 492 (Ariz. 1992). Plaintiff adopts
    this argument and insists that defendant’s authorization ceased when he decided to leave the firm
    and join a competing institution.
    Defendant, however, urges the Court to follow the Brekka line of cases. In Brekka, the
    Ninth Circuit Court of Appeals found that the plain language of the statute should be understood
    to mean that when “an employer gives an employee permission to use [a company computer],”
    7
    the employer is giving that “employee ‘authorization’ to access [it].” 
    Brekka, 581 F.3d at 1133
    .
    Thus, according to Brekka, “for purposes of the CFAA, when an employer authorizes an
    employee to use a company computer subject to certain limitations, the employee remains
    authorized to use the computer even if the employee violates those limitations.” 
    Id. Only the
    employer’s decision “to allow or to terminate an employee’s authorization to access a computer .
    . . determines whether the employee is with or ‘without authorization.’” 
    Id. “Exceeds authorized
    access” is defined by the statute as “access[ing] a computer with authorization and [using] such
    access to obtain or alter information in the computer that the accesser is not entitled so to obtain
    or alter.” 18 U.S.C. § 1030(e)(6). The court in Brekka understood this to mean that “for purposes
    of the CFAA, when an employer authorizes an employee to use a company computer subject to
    certain limitations, the employee remains authorized to use the computer even if the employee
    violates those limitations.” 
    Brekka, 581 F.3d at 1133
    . Thus, according to Brekka, an employer’s
    decision to allow or terminate an employee’s authorization is the determining factor as to
    whether the employee is with or without authorization. 
    Id. In this
    case, there is no dispute that Widder was still an employee of Lewis-Burke when
    he allegedly copied certain files to a thumb drive. Plaintiff claims that some of the access
    occurred on defendant’s very last day as an employee of plaintiff; however, it still occurred while
    he was in the employ of plaintiff, and plaintiff has not alleged to have terminated his
    authorization to access the computer before he left its employ. There is an allegation that the
    forensic exam demonstrated that certain files were accessed from the thumb drive after Widder
    was no longer employed by Lewis-Burke; however, there is no allegation that Widder accessed
    his Lewis-Burke computer or the server after his employment with it ended. The CFAA is
    8
    concerned with access to a computer; Widder’s alleged access to data on a thumb drive would
    fall outside of plaintiff’s CFAA claim.
    In determining whether Widder exceeded his authorization, I am persuaded by the Brekka
    line of cases, which have recently gained critical mass. See, e.g., Nat’l City Bank, N.A. v.
    Republic Mortgage Home Loans, LLC, No. 09-CV-1550, 
    2010 WL 959925
    , at *2 (W.D. Wash.
    Mar. 12, 2010); Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc., 
    690 F. Supp. 2d 1267
    , 1272
    (M.D. Ala. 2010); ReMedPar, Inc. v. AllParts Medical, LLC, 
    683 F. Supp. 2d 605
    , 611 (M.D.
    Tenn. 2010). In Brekka, the court adopts a statutory interpretation of the CFAA that reflects the
    plain reading of the statute. See 
    Brekka, 581 F.3d at 1135
    . In doing so, the court determines that
    “‘authorization’ depends on actions taken by the employer.” 
    Id. Thus, as
    Brekka notes:
    Nothing in the CFAA suggests that a defendant’s liability for
    accessing a computer without authorization turns on whether the
    defendant breached a state law duty of loyalty to an employer. If
    the employer has not rescinded the defendant’s right to use the
    computer, the defendant would have no reason to know that
    making personal use of the company computer in breach of a state
    law fiduciary duty to an employer would constitute a criminal
    violation of the CFAA. It would be improper to interpret a
    criminal statute in such an unexpected manner. See United States
    v. Carr, 
    513 F.3d 1164
    , 1168 (9th Cir. 2008).
    
    Brekka, 581 F.3d at 1135
    .
    I believe that the D.C. Circuit, faced with this issue, would rule in a manner consistent
    with both the Brekka cases and the plain meaning of the statute. The interpretation proposed by
    Citrin would mean that the same employee might have different authorization to access the same
    document on the same computer throughout his or her employ. For example, an employee might
    9
    generate a report during the course of his employment, to which he would have authorized
    access. If, as time progressed, the employee began looking for employment elsewhere, and he
    accessed the report to refresh his memory as to what he did on the report so that he could better
    describe his skills and abilities on his résumé or in an interview, under Citrin, he would have
    accessed the report without authorization. Then, if the employee was internally promoted,
    decided not to seek outside employment, and accessed the report to provide an example to one of
    his new subordinates of how he liked reports written, his interests would again be aligned with
    the employer, and his access would be authorized. In the extreme example, the same employee’s
    authorization to access a document could concurrently be both with authorization and exceeding
    authorization. For example, the employee could have authority to access a report to e-mail it out
    for a superior to review, but his authorization might be exceeded if he then also decided to blind
    copy his personal e-mail account, so that he would have a copy of the report to use as a writing
    sample for a future job search. Congress could not have intended a person’s criminal and civil
    liability to be so fluid, turning on whether a person’s interests were adverse to the interests of an
    entity authorizing the person’s access. See, e.g., S. Rep. No. 99-432, at 21 (1986), as reprinted in
    1986 U.S.C.C.A.N. 2479, 2494-95 (discussing amendment that “remove[d] from the sweep of
    the statute one of the murkier grounds of liability, under which [an] employee’s access to
    computerized data might be legitimate in some circumstances, but criminal in other (not clearly
    distinguishable) circumstances that might be held to exceed his authorization”). Such an
    interpretation is not only confusing, but antithetical to the rule of lenity, which forbids the Court
    from “‘interpret[ing] a federal criminal statute so as to increase the penalty that it places on an
    individual when such an interpretation can be based on no more than a guess as to what Congress
    10
    intended.’” United States v. Villanueva-Sotelo, 
    515 F.3d 1234
    , 1246 (D.C. Cir. 2008) (quoting
    Ladner v. United States, 
    358 U.S. 169
    , 178 (1958)). The CFAA is primarily a criminal statute,
    with a civil cause of action, and a court is bound to interpret the statute consistently; thus, the
    rule of lenity must be considered even in its civil application. See Leocal v. Ashcroft, 543 U.S.
    1,12 n.8 (2004).
    The CFAA was designed primarily to deter computer hacking. See A.V. ex rel.
    Vanderhye v. iParadigms, LLC, 
    562 F.3d 630
    , 645 (4th Cir. 2009). Whatever Widder is alleged
    to have done, he did not hack into the computer or access it without authorization. Further, he
    had valid authorization to access the computer, and did not exceed that authorization by
    accessing information that Lewis-Widder had indicated he was not entitled to access. See, e.g.,
    
    Brekka, 581 F.3d at 1133
    . Whether Widder had permission to copy documents onto his thumb
    drive or to subsequently use the data from a non-Lewis Burke computer, after he had left its
    employ, is not a question that relates to his liability under the CFAA. “‘Exceeds authorized
    access’ should not be confused with exceeds authorized use.” Bell Aerospace Servs., Inc., 690 F.
    Supp. 2d at 1272-73, (citing Diamond Power Int’l, Inc. v. Davidson, 
    540 F. Supp. 2d 1322
    , 1343
    (N.D. Ga. 2007)).
    I will grant defendant’s motion to dismiss the CFAA claim. Defendant, however, also
    seeks to dismiss the entire case, based on lack of subject-matter jurisdiction, arguing that the
    Court only has jurisdiction over the other claims via supplemental jurisdiction. Plaintiff counters
    that the Court has diversity jurisdiction and has moved to amend the complaint to reflect this. I
    now will consider plaintiff’s motion to amend.
    11
    III. Motion to Amend
    Plaintiff’s initial response to defendant’s motion to dismiss was to file a motion to amend
    the complaint. See Mot. to Amend. On the eve of trial, plaintiff presumably thought that the
    most expeditious way to oppose defendant’s motion to dismiss was to ensure that the Court had
    subject-matter jurisdiction by amending its complaint to allege diversity jurisdiction.
    Rule 15 of the Federal Rules of Civil Procedure governs the amending and supplementing
    of pleadings. See Fed. R. Civ. P. 15. Rule 15(a)(2) allows a party to amend its pleading with the
    written consent of the opposing party or the court’s leave, noting that “the court should freely
    give leave when justice so requires.” 
    Id. “The decision
    to grant or deny leave to amend is within
    the sound discretion of the trial court, [and] it is an abuse of discretion to deny leave without a
    sufficient reason;” however, the liberal standard by which a court may grant leave to amend does
    have its limitations. See, e.g., Becker v. District of Columbia, 
    258 F.R.D. 182
    , 184-86 (D.D.C.
    2009) (citing Dove v. Wash. Metro. Area Transit Auth., 
    221 F.R.D. 246
    , 247 (D.D.C. 2004)).
    While the Supreme Court has instructed that “the leave to amend shall be ‘freely given,’” it also
    provides examples of when such leave may be denied, including undue delay, bad faith or
    dilatory motive on the part of the movant, repeated failure to cure deficiencies by amendments
    previously allowed, undue prejudice to the opposing party, and futility of amendment. Foman v.
    Davis, 
    371 U.S. 178
    , 182 (1962); see also Belizan v. Hershon, 
    434 F.3d 579
    , 582 (D.C. Cir.
    2006). The party opposing the amendment bears the burden of showing why leave should not be
    granted. 
    Becker, 258 F.R.D. at 184
    (citing 
    Dove, 221 F.R.D. at 247
    )).
    Defendant asserts that the motion should be denied because: (1) the amendment would be
    12
    futile; (2) the amount in controversy is insufficient to trigger the Court’s jurisdiction; and (3)
    denying the motion would allow for “an orderly exploration of the jurisdictional issue” raised by
    defendant. Defendant’s Opposition to Motion to Amend Complaint [#43] (“Def. Opp. to
    Amend”) at 2-11. The third point is moot, as I have explored above the jurisdictional issue
    raised by defendant. Thus, I will consider the first two points.
    Defendant claims that the amendment would be futile. While a court may deny a motion
    to amend on the grounds of futility,2 it may do so only “if the proposed claim would not survive a
    motion to dismiss.” James Madison Ltd. by Hecht v. Ludwig, 
    82 F.3d 1085
    , 1099 (D.C. Cir.
    1996) (citing 
    Foman, 371 U.S. at 181-82
    ; Moldea v. New York Times, 
    22 F.3d 310
    , 319 (D.C.
    Cir.), cert. denied, 
    513 U.S. 875
    (1994)). Defendant attacks plaintiff’s claim of diversity
    jurisdiction on two fronts: (1) plaintiff’s amended complaint alleges diversity as of the date of the
    amendment, and not at the time the action commenced, requiring the Court to draw an inference;
    and (2) “the Second Amended Complaint [does] not rule out the possibility that the LLC had
    other ‘members’ of unknown citizenship at the time the case was filed.” Def. Opp. to Amend 3.
    Defendant argues that “the federal pleading standard . . . is not so flexible as to allow plaintiff to
    demand the [C]ourt’s acceptance of all possible inferences,”3 but then he asks the Court to infer
    that the parties’ citizenship at the time of the motion to amend was different than it was when the
    complaint was filed, without providing any indication, other than speculation, as to why.
    The standard of finding futility is whether or not the amendment would survive a motion
    2
    Foman v. 
    Davis, 371 U.S. at 182
    .
    3
    Def. Opp. to Amend 4 (citing Iqbal, 
    129 S. Ct. 1937
    (2009); Twombly, 
    550 U.S. 544
               (2007)).
    13
    to dismiss. James Madison Ltd. by 
    Hecht, 82 F.3d at 1099
    . When considering a Rule 12(b)(1)
    motion to dismiss, a court may consider materials outside of the pleadings. Lipsman v. Sec’y of
    Army, 
    257 F. Supp. 2d 3
    , 6 (D.D.C. 2003) (citing Herbert v. Nat’l Acad. of Scis., 
    974 F.2d 192
    ,
    197 (D.C. Cir. 1992)). Plaintiff’s reply brief in support of its motion to amend includes a
    declaration by April L. Burke, which clearly states that Burke is both the sole member of Lewis-
    Burke and has continuously resided in Virginia. Plaintiff’s Reply Memorandum in Support of Its
    Motion to Amend Complaint [#48] at Ex. A. Widder admits to residing in Maryland. See
    Answer to Plaintiff’s First Amended Complaint [#25] at ¶ 2. In light of this, I cannot find that
    plaintiff’s proposed amendment would be futile.
    Defendant also claims that plaintiff’s claim of $75,000 is a bald assertion and that
    “plaintiff fails to make any allegations that allow the [C]ourt to assess the validity of the claim
    that the amount in controversy exceeds $75,000.” Def. Opp. to Amend 4. Plaintiff’s proposed
    Second Amended Complaint does allege that the amount in controversy exceeds $75,000. See
    Mot. to Amend, Ex. 1 at ¶ 3. Nevertheless, defendant wants the Court to deny plaintiff’s motion
    to amend and refer to its damage calculations as fanciful. Mot. to Amend 5. A court should be
    “very confident that a party cannot recover the jurisdictional amount before dismissing the case
    for want of jurisdiction.” Rosenboro v. Kim, 
    994 F.2d 13
    , 17 (D.C. Cir. 1993). In the parties’
    joint pretrial statement, plaintiff claims to have calculated damages to be $834,213. See Joint
    Pretrial Statement [#35] at 16. Defendant characterizes these calculations as “beyond
    speculation” and “into the realm of fantasy,” however, the Court may dismiss the case (or deny a
    motion to amend), if “from the face of the pleadings, it is apparent, to a legal certainty, that the
    plaintiff cannot recover the amount claimed . . .” 
    Rosenboro, 994 F.2d at 17
    . It is not apparent
    14
    from the face of the pleadings, “to a legal certainty,” that plaintiff cannot recover in excess of
    $75,000. I will grant plaintiff’s motion to amend.
    III. Motion In Limine
    Plaintiff seeks to exclude from trial: (1) evidence of communications in September and
    October 2008 between April Burke of Lewis-Burke and Andrew Givens of Public Broadcasting
    Service (“PBS”), a client of Lewis-Burke, regarding Widder’s departure and Lewis-Burke’s work
    for PBS; and (2) “any defense by Widder at trial that a putative change in his compensation at
    Lewis-Burke somehow excuses his breach of his Non-Competition and Confidentiality
    Agreement with Lewis-Burke (‘Non-Compete’).” Memorandum of Points and Authorities in
    Support of Plaintiff’s Motion In Limine [#32] (“Memo. to Mot. in limine”) at 1.
    A. Introduction of E-mail Communications between Burke and Givens
    Plaintiff seeks to exclude evidence of the communications between Burke and Givens.
    Specifically, plaintiff argues that DEX #1, a series of e-mail exchanges between Burke and
    Givens, should be excluded on the following grounds: (1) that defendant failed to assert waiver
    as an affirmative defense in his original answer or in his answer to plaintiff’s amended
    complaint; (2) that the defense is futile, irrelevant, and predicated on inadmissible hearsay; and
    (3) that its admission would be unduly prejudicial. 
    Id. at 2.
    Defendant claims that it will call
    Givens to testify at trial, and that his testimony will “show that plaintiff failed to show certain
    elements of its prima facie case.” Defendant’s Opposition to Motion In Limine [#34] (“Def. Opp.
    Mot. in limine”) at 1-2. Thus, according to defendant, the evidence does not implicate an
    affirmative defense. 
    Id. While motions
    in limine can be useful, on occasion, they can create confusion because it
    15
    is impossible to predict confidently the exact flow and significance of the evidence elicited at
    trial. It may be helpful to clear some brush away to expose what really is at stake.
    An e-mail exchange between Burke and Givens is Exhibit 1 to Plaintiff’s motion. See Pl.
    Mot. In Limine at Ex. 1. In the opening e-mail, dated March 24, 2008, Burke indicates to Givens
    that she has the “distinct feeling” that Givens knows that defendant, Joel Widder, is leaving
    plaintiff’s employ to go to work for what Burke calls “the National Group/Oldecker law firm.”
    
    Id. She notes
    that since this entity consists of “guys [who] are [Given’s] close buddies from the
    Hill” [i.e. Capitol Hill], she thinks that she can predict that PBS will be terminating its
    relationship with Lewis-Burke. 
    Id. There must
    have been an intervening phone call, because Givens refers to it and indicates
    that it was “concerning” the departure of Joel Widder from Lewis-Burke. 
    Id. Givens then
    indicates that it is his understanding that “pursuant to Section 6 of our contract [i.e., between
    PBS and Lewis-Burke] we have concluded our relationship in a very amicable and professional
    manner.” 
    Id. Givens then
    conveys his belief that PBS is current on all of its outstanding balances
    and thanks Lewis-Burke’s for all of its work on behalf of PBS. Burke then replies, within three
    minutes, that all of PBS’s payments are current. 
    Id. First, Givens’s
    e-mail is hearsay insofar as it is offered for the truth of its contents.
    Burke’s e-mails are not hearsay because they are statements of a party or of the representative of
    a party. Fed. R. Evid. 801(d)(2).
    Second, the relevance of Givens’s e-mail is questionable. There is nothing in it from
    which a reasonable person could deduce that Burke was excusing or condoning any violation of
    Widder’s contractual obligation to Lewis-Burke to neither solicit business from Lewis-Burke’s
    16
    clients nor work for them after he left Lewis-Burke’s employ. I appreciate that during his
    deposition Widder seemed to suggest that, although he never spoke to Burke, he somehow
    deduced from his conversations with Givens that his working for PBS had been excused by
    Burke in her conversations with Givens. But, clearly, what Givens may have told plaintiff is
    hearsay and Widder cannot testify to it.
    B. Givens’s Testimony
    Widder adjures any reliance on out of court statements by Givens but plans to call him as
    a witness to establish that the departure of PBS from Lewis-Burke was not caused by Widder’s
    departure and would have happened in any event. But, Widder ignores that the only evidence I
    presently have is Burke’s e-mail of September 24, 2008 in which she directly attributes the loss
    of the PBS business to Widder’s departure from Lewis-Burke, a statement perfectly consistent
    with a claim that Widder’s departure caused the loss of the PBS business.
    I emphasize that I am speaking only of the information I presently have. I do not know as
    much as I want to know about any conversations between Burke and Givens, or any other PBS
    representative, about the how, why, and ultimate effect of Widder’s departure upon the
    termination of the relationship between PBS and Lewis-Burke. Subject to an additional
    discussion at the pre-trial conference and to a possible voir dire of the pertinent witnesses as to
    this question, out of the hearing of the jury, I will defer ruling on the relevance of the potential
    testimony I have summarized.
    I should note in this context that I certainly appreciate Lewis-Burke’s point that Widder
    violates the covenant by either soliciting PBS’s business or working for PBS while employed by
    any one other than Lewis-Burke. Thus, how Widder’s new firm got PBS’s business may be
    17
    irrelevant, if Lewis-Burke presses only its contention that Widder’s working for PBS was the
    violation of the covenant.
    C. Evidence Regarding Changes in Widder’s Compensation
    Another issue raised in plaintiff’s motion in limine is the question of the relevance of any
    testimony from Widder about a diminution of his expected compensation and its relation to any
    alleged breach of his covenant not to compete. As Lewis-Burke correctly points out, the
    covenant not to compete is, by its stated terms, an integrated agreement. There is not a word in it
    about plaintiff’s compensation that could be interpreted to mean that his compensation and the
    covenant not to compete were mutual obligations in that one was given in consideration of the
    other. Accordingly, any testimony about his compensation is irrelevant.
    IV. Conclusion
    For the reasons stated herein, defendant’s motion to dismiss plaintiff’s CFAA claim will
    be granted. Plaintiff’s motion to amend will also be granted. Defendant’s motion to dismiss the
    case for lack of subject matter jurisdiction will be denied. Plaintiff’s motion in limine will be
    denied in part and granted in part. A status conference and evidentiary hearing in this case will
    be set in a separate order. The parties should be prepared at the status conference to set a trial
    date in early October 2010.
    A separate order accompanies this memorandum opinion.
    Digitally signed by
    John M. Facciola
    Date: 2010.07.28
    10:00:21 -04'00'
    JOHN M. FACCIOLA
    UNITED STATES MAGISTRATE JUDGE
    18
    

Document Info

Docket Number: Civil Action No. 2009-0302

Judges: Magistrate Judge John M. Facciola

Filed Date: 7/28/2010

Precedential Status: Precedential

Modified Date: 10/30/2014

Authorities (22)

International Airport Centers, L.L.C. v. Jacob Citrin , 440 F.3d 418 ( 2006 )

Ghawanmeh v. Islamic Saudi Academy , 672 F. Supp. 2d 3 ( 2009 )

Papasan v. Allain , 106 S. Ct. 2932 ( 1986 )

Belizan, Monica v. Hershon, Simon , 434 F.3d 579 ( 2006 )

Lipsman v. Secretary of the Army , 257 F. Supp. 2d 3 ( 2003 )

Victor Herbert v. National Academy of Sciences , 974 F.2d 192 ( 1992 )

Grand Lodge of the Fraternal Order of Police v. Ashcroft , 185 F. Supp. 2d 9 ( 2001 )

ReMedPar, Inc. v. AllParts Medical, LLC , 683 F. Supp. 2d 605 ( 2010 )

Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc. , 690 F. Supp. 2d 1267 ( 2010 )

Bell Atlantic Corp. v. Twombly , 127 S. Ct. 1955 ( 2007 )

Ashcroft v. Iqbal , 129 S. Ct. 1937 ( 2009 )

Willard J. Rosenboro v. Dr. Andrew Kim , 994 F.2d 13 ( 1993 )

Diamond Power International, Inc. v. Davidson , 540 F. Supp. 2d 1322 ( 2007 )

United States v. Carr , 513 F.3d 1164 ( 2008 )

Conley v. Gibson , 78 S. Ct. 99 ( 1957 )

Ladner v. United States , 79 S. Ct. 209 ( 1958 )

James Madison Limited, by Norman F. Hecht, Sr., Assignee v. ... , 82 F.3d 1085 ( 1996 )

Arbaugh v. Y & H Corp. , 126 S. Ct. 1235 ( 2006 )

Dan E. Moldea v. New York Times Company , 22 F.3d 310 ( 1994 )

LVRC HOLDINGS LCC v. Brekka , 581 F.3d 1127 ( 2009 )

View All Authorities »