-
In the United States Court of Federal Claims No. 15-945C (Filed: April 23, 2019) (Re-Filed: May 10, 2019) 1 ************************** Contracts; partial motion to 4DD HOLDINGS, LLC, and dismiss for lack of subject T4 DATA GROUP, LLC, matter jurisdiction; motion for sanctions; RCFC Plaintiffs, 12(b)(1); RCFC 37(e); 28 U.S.C. § 1498(b) (2012); v. authorization or consent; spoliation; electronically THE UNITED STATES, stored information Defendant, and IMMIX TECHNOLOGY, INC., Third-Party. ************************** Edward H. Meyers, Washington, DC, for plaintiffs, with whom were Robert B. Gilmore and Philip J. O’Beirne. John J. Todor, Senior Trial Counsel, United States Department of Justice, Civil Division, Commercial Litigation Branch, Washington, DC, with whom were Joseph H. Hunt, Assistant Attorney General, Robert E. Kirschman, Jr., Director, Elizabeth M. Hosford, Assistant Director, for defendant. 1 This opinion was originally issued under seal to permit the parties an opportunity to propose redactions on or before May 7, 2019. The government filed a response on May 7, 2019, representing that “it has conferred with counsel for plaintiffs and does not propose any redactions to the April 23, 2019 opinion.” ECF No. 183. We thus reissue this opinion unredacted. Sara M. Lord, Washington, DC, for third-party defendant. OPINION BRUGGINK, Judge. Plaintiffs, 4DD Holdings, LLC and T4 Data Group, LLC (collectively, “4DD”), filed a claim for copyright infringement in August 2015, alleging that the United States infringed plaintiffs’ copyright in its data federation 2 software. 4DD claims that the government, acting through its contractors, infringed on 4DD’s copyright by copying 3 4DD’s software and installing the software in excess of the purchased license. Defendant filed a motion to partially dismiss plaintiffs’ claim in June 2016. The government argues that the court does not have subject matter jurisdiction over the claim as it relates to alleged infringement by the agency’s contractor Systems Made Simple, Inc. (“SMS”) when SMS was working with 4DD’s copyrighted software in SMS labs. The court stayed the motion to allow for discovery and lifted the stay in December 2018. The motion is fully briefed, and we held oral argument on April 9, 2019. Because plaintiffs have established that the government authorized and consented to its contractor’s use of TETRA in SMS labs, we deny defendant’s motion to dismiss. On November 21, 2018, plaintiffs filed a motion for sanctions against the government for the spoliation of evidence. That motion also is fully briefed, and we held oral argument on plaintiffs’ motion on April 9, 2019, as well. Because we find that the government destroyed relevant evidence that it had a duty to preserve, we grant plaintiffs’ motion for sanctions. 2 Data federation “refers to the systems and processes that permit disparate data sources to be combined into a single source of data.” Def.’s Mot to Dismiss 2. Where databases are concerned, data federation permits information from multiple databases to be combined without creating a new database in the process.
Id. 3 Theparties use the terms copying and cloning interchangeably when referring to an action that allegedly infringed on 4DD’s copyright. We use the same terms throughout to describe the allegedly infringing activity. We do not draw a conclusion regarding whether the agency’s actions constitute copyright infringement. 2 BACKGROUND 4 When providing healthcare to servicemembers, veterans, and their families, the Department of Defense (“DoD”) and Department of Veterans Affairs (“VA”) historically have been unable to share healthcare records among data systems. In 2011, DoD and VA committed to finding a data federation solution that would allow the agencies to share health records. The effort was coined the integrated Electronic Health Record (“iEHR”) and would be developed by the Interagency Program Office (“IPO”). After a few years of working together, DoD and VA agreed to develop their own solutions to data federation. The Defense Medical Information Exchange (“DMIX”) project emerged in 2013 as DoD’s effort to develop interoperability among the systems. IPO supervised the DMIX project with assistance from DoD’s Defense Health Agency (“DHA”). The Chief Engineer on the DMIX project was David Calvin. The configuration and testing of data federation software for the DMIX project would be carried out by the agency’s Systems Integration and Engineering Support contractor, SMS. SMS performed its work through task orders issued under an indefinite delivery indefinite quantity contract, the Chief Information Officer – Solutions and Partners 3 contract. David Calvin was also the agency’s Contracting Officer’s Representative on the SMS contract. Before the agency licensed 4DD’s software, SMS prepared to test and configure data federation software. The agency had planned to develop a software solution in the agency’s Development Test Center (“DTC”). 5 But the DTC fell behind schedule and the agency provided more resources to SMS so that SMS could perform some of its DMIX project work in its own labs. Throughout the course of its work, SMS performed its duties both in 4 The background section is drawn from the parties’ briefing on both motions and the appendices attached to the briefing. 5 This center housed computer servers and supported various projects, including the DMIX project. Programmers, including SMS employees, used remote access through a Virtual Private Network or similar connection to work on the DTC servers. The DMIX project on DTC servers was housed in nine data environments divided into two areas, including DotCOM environments and DotMIL environments that were more secure. 3 its own labs and by remote access to the DTC. Furthermore, the agency repeatedly required SMS to perform work on the DMIX project using 4DD’s copyrighted software in the contractor’s own labs. E.g., Pls.’ Mot. Exs. E, F, G, X. The first recorded SMS installation of 4DD’s software in the SMS labs occurred in August 2013, before the agency purchased a license to use 4DD’s software. 4DD and SMS apparently had agreed to a limited license to allow SMS to do preliminary work on the DMIX project prior to the agency licensing 4DD’s products. Following an Analysis of Alternatives and a fly-off competition, the agency chose to license two of 4DD’s copyrighted software products: TETRA Healthcare Federator and TETRA Enterprise Studio. 4DD’s software hopefully would provide the ability to seamlessly connect data across legacy systems. Although plaintiffs’ claim includes copyright infringement of both products, the present motions discuss only TETRA Healthcare Federator, referred to as TETRA. TETRA is a package of server components that provides data federation capability, allowing medical records to be transferred and viewed between systems. TETRA runs in the background on a computer server. A computer server may have varying numbers of central processing unit cores; anywhere from one to several dozen cores. Thus, TETRA server components are licensed per core to account for numbers of cores on different devices. In other words, the number of cores the user should license depends on the number and type of machines on which the user plans to install TETRA. 6 The agency purchased a TETRA license from 4DD’s authorized reseller ImmixTechnology, Inc. (“Immix”) for 64 cores. Immix and the agency also incorporated an End User License Agreement (“EULA”) into their contract. The EULA provides that TETRA could be used “solely for the purpose of supporting your organization’s objectives in accordance with the terms of this EULA.” Def.’s Mot. to 6 4DD’s other software product, TETRA Enterprise Studio, is a graphic interface that enables a user to instruct TETRA Healthcare Federator to use data. TETRA Enterprise Studio is purchased separately and licensed by user seat instead of core. 4 Dismiss Ex. 9 at 423. 7 The EULA permitted the agency to make “one (1) copy of the object code to [TETRA] solely for back-up purposes,” which it could only use “if the original copy is damaged or destroyed.”
Id. Other thanthe single back-up copy, the license agreement forbade copying TETRA, distributing copies of TETRA, or permitting others to copy or distribute copies of TETRA. The agency required 4DD to disable its TETRA tracking feature, which otherwise would communicate with 4DD’s systems to inform 4DD if a TETRA installation occurred. Consequently, as of September 26, 2013, the agency had purchased a license to deploy TETRA on up to 64 cores and to make only one back-up copy of TETRA, but 4DD could not track the use of its software. 8 Sheila Swenson was the Contracting Officer’s Representative on the contract with Immix for the TETRA license. After the agency entered into the TETRA license, SMS testing and configuration work began in earnest. Mr. Calvin, deposed as a designated representative on October 3, 2018, confirmed that, “yes,” “the general workflow was, SMS would conduct development or testing, integration activities, in their environment, and then move the results of that into a production environment on the SMS side before it came over to the DTC[.]” Pls.’ Resp. Mot. to Dismiss Ex. C at 14. Mr. Calvin also agreed, “yes,” “the overall workflow involves the cloning of OVA images, and copying fully configured virtual machines from the SMS lab to the DTC[.]”
Id. at 15.Mr. Calvin went on to say “yes,” SMS’s work “in the SMS lab with TETRA would have involved cloning TETRA virtual machines in their labs[.]”
Id. When asked,“And you understood [that SMS was] doing that, and they had your authorization to do so,” Mr. Calvin responded, “Yes.”
Id. Similarly, whenasked if SMS’s testing activities “to the extent that it included cloning virtual machines of TETRA” were carried out with his 7 Citations to the government’s appendices refer to the page number at the bottom of the appendix page. Citations to plaintiffs’ appendices refer to the page number at the top of the appendix page. 8 The agency did not have an effective way to track TETRA use either. Communications between Ms. Swenson, 4DD, Mr. Calvin, and SMS demonstrate that the agency took responsibility for TETRA installations, but also that it spent several months in late 2013 attempting to find an accurate way to track TETRA use on the DMIX project. E.g., Pls.’ Resp. Ex. N, Ex. O at 196, Ex. P at 198. 5 authorization, Mr. Calvin responded, “Yes.”
Id. at 16.In short, Mr. Calvin explained, “Did they discuss with me what their plans were? Yes. Did they say this is the direction we’re going with, and get concurrence? Yes.”
Id. On December27, 2013, the agency issued a change order for environment builds. It directed copying service-oriented architecture software from the initial DTC domain where TETRA was installed to other DTC environments. Mr. Calvin stated in his July 30, 2018 declaration that, when that software was copied, “the TETRA software, being also installed in that environment, would have been copied as well . . . .” Def.’s Resp. Mot. for Sanctions Ex. B. Following the December 2013 copying on DTC servers, on March 7, 2014, SMS Deputy Project Manager William Eubank provided a status report to Mr. Calvin on activities in the DTC for the week. Mr. Eubank wrote, It appears the DFA software was cloned and moved[.] This should not have happened[;] SMS did not request this to be completed . . . . I need to know how you would like us to proceed: (Delete, Leave or Reimage) . . . . We will have to reimage in the future with newer version of DFA since we have delivered new versions since the clone of ICO1. Pls.’ Mot. for Sanctions Ex. T. The attached “Weekly Project Status Report” states that TETRA had been copied in at least three environments.
Id. Mr. Calvinresponded on March 10, “I would say delete at this point.” Pls.’ Mot. Ex. U. On May 14, 2014, Mr. Eubank reported in a “TETRA License Tracker” document that reconciling the number of cores in use had been completed and all licenses from Tetra that were installed in the DTC have not been pulled due to government not wanting to break down the environments. We have been told to leave the DTC and we have stopped all work in those environments. I have also advised the government that they do not have enough licenses to support all the current environments within the DTC. I’m confirming with 4DD on how we can remove the keys from the DTC. 4DD is confirming the information. 6 Pls.’ Resp. Ex. BB (emphasis added). In short, as early as May 2014, the agency knew that the project required broader use of TETRA than the agency had contracted for on the servers in the DTC alone, not accounting for the work being performed in SMS labs. On May 20, 2014, Mr. Matus emailed the SMS test plan proposal for the DTC to Mr. Calvin. Mr. Calvin responded by asking, “Do we have enough TETRA licenses to cover testing?” Pls.’ Mot. Ex. W. Mr. Matus responded with an accounting of TETRA downloads obtained by SMS. He noted that the DTC had “the same licenses in multiple environments,” concluding “[t]hose TETRA instances really need to be deleted.”
Id. 4DD contactedMs. Swenson on August 29, 2014, alleging that more than 64 cores were in use. 4DD’s 4DD Vice President of Business Development Patrick Truxillo wrote, “The original purchase was for a block of 64 cores, which was fulfilled on November 20, 2013.” Pls.’ Mot. Ex. Z. Mr. Truxillo concluded that “68 additional cores” were in use for a total of 132 cores. Ms. Swenson replied, “Thank you for this report[.] We will evaluate the data and get back to you to discuss.”
Id. Ms. Swensonpromptly forwarded Mr. Truxillo’s email to Mr. Calvin, writing, “This is what I need to talk to you about…….!!!! over[-]installs, I should have been paying attention.” Pls.’ Mot. Ex. X. The agency agreed to engage in a true up with 4DD regarding the use of TETRA. By this point Mr. Calvin had directed SMS to “remove the cloned copie[s] (if there were any) from DMS in other environments.” Pls.’ Mot. Ex. AA. 4DD was not informed at the time that the agencies intended to delete copies. Communications within the agency from September 2-4, 2014, illustrate that the agency had not been keeping a detailed, easily accessible record of TETRA use. After fifteen months of TETRA use, on September 2, 2014, Mr. Calvin asked: “Anyway for someone to tell me how many licenses of TETRA are in the DTC?”
Id. When KenAllgood, involved in DTC oversight, asked, “Would TETRA be included as part of each DMS install/build that SMS has deployed,” Mr. Calvin responded, “Should be.”
Id. 7 Justas the true up was getting underway, on September 6, 2014, SMS’s Mr. Eubank emailed the agency, “Attached are the servers, IP’s and environments that we will be deleting from the DTC environments. . . . Our COR has purchased enough licenses and wants to maintain the ICO1 environment as it was set up and installed in the beginning.” Pls.’ Mot. Ex. BB. A September 9, 2014 change request signed by Mr. Calvin, states, “Need to remove all cloned VM of TETRA from .com and .mil except ICO1 environment,” and, “Remove all DMS/TETRA instances in the DTC on the .com/.mil environments. The only exception is the ICO1 environment.” Pls.’ Mot. Ex. CC. The scheduling explanation section states, “This is a license issue that we must clear up with ICO1 environment being the only environment that we have paid for this year.”
Id. Regarding thischange request, during his May 16, 2018 deposition in his personal capacity, Mr. Calvin stated that he would have discussed the change request approving the deletion of TETRA copies with Ms. Swenson. Pls.’ Mot. Ex. C. He stated that she could have shared the decision to delete copies of TETRA with 4DD but that she did not do so.
Id. Ms. Swensonindeed did not inform 4DD of the deletions. During November 10 and 14, 2014 conference calls, the agency agreed to research the cores in use in the DTC and SMS environments. Between these calls, on November 12, Mr. Calvin emailed Ms. Swenson and other agency employees, “I’m attaching the original request to delete the VMs that have been talked about and a new request to delete the one remaining environment that was left in .com.” Pls.’ Mot. Ex. HH. He attached the September deletion order as well as a new November order, which states, “Remove all DMS/TETRA instances in the DTC on the .com/.mil environments.”
Id. The newdeletion order also refers to the reason for deletion as “a license issue.”
Id. A thirddeletion order was created November 14. Pls.’ Mot. Ex. CC. During a conference call on December 12, 2014, the agency represented that it was continuing to gather information and confirm the number of cores allocated to the DTC. By December 16, 2014, the agency reported to 4DD that 64 cores were in use on DTC servers. The agency also had “identified an over deployment of 168 core licenses to development servers.” Def.’s Mot. Ex. 12 at 459. Despite these representations, Ms. Swenson explained in her May 21, 2018 deposition that 64 cores were reported because that was the number of cores the agency had originally paid for in the TETRA license. In fact, 8 although she “knew something was wrong” and was “suspicious,” she had “no idea” how many cores were in use on DTC servers when the agency represented to 4DD that only 64 cores were in use. Pls.’ Mot. Ex. JJ. As the true up continued, a few relevant events occurred in early 2015. In January 2015, SMS communicated to the agency through a slide presentation that it was the contractor’s position that SMS labs “was not Government directed or tasked” and that 4DD was aware it would not receive compensation for TETRA installations in SMS labs. Def.’s Mot. Ex. 5 at 202–07. In its privilege log, defendant claimed work product protection for a document dated January 23, 2015, because it was an “[e]mail [that] contains information for the purpose of receiving legal advice, and prepared in anticipation of 4DD Holdings, LLC v US litigation.” Pls.’ Mot. Ex. OO. Finally, in February 2015, the agency began the preliminary steps of decommissioning the DTC. Personnel from DHA were staffed with the decommissioning process, namely Joshua Zamarripa and Lauro Salais, who worked with contractors from ICS Nett and KSJ, particularly KSJ’s Denise Stokely. The true up concluded on March 16, 2015, with the agency and Immix modifying the TETRA license to increase the licensed quantity by 168 cores. The agency thus paid for 232 cores: 64 cores under the 2013 TETRA license, which the agency represented were used on DTC servers, and 168 cores under the 2015 modification, which the agency represented were used in SMS labs. The modification also states, “[T]he contractor hereby releases the Government from any and all liability under this contract for further equitable adjustments attributable to such facts and circumstances giving rise to this particular modification. All other terms and conditions remain unchanged.” Def.’s Mot. Ex. 3 at 194. TETRA ultimately did not continue in use beyond the DMIX project. 4DD filed this lawsuit on August 28, 2015. On September 9, 2015, the Department of Justice sent the statutorily-required call letter to DoD, alerting DoD of its responsibility to provide a litigation report and to furnish all evidence in DoD’s possession. Def.’s Resp. Ex. H. The letter includes these notes regarding evidence preservation: IMPORTANT: In the past it has been discovered that documents and papers necessary to the defense of an already pending suit were destroyed by an agency under its regular records screening and destruction program. In order to obviate 9 such costly and detrimental occurrences, it is requested that all records storage centers and other facilities where records are kept be immediately notified to forthwith identify, physically segregate and withhold from destruction all documents and papers touching upon the claims set forth in the complaint. As soon as practicable, you are requested to send me a separate report designating each location where records are being held, together with a brief description of the nature of the records being held. It has also been our experience that in some cases there has been a failure to communicate with all field offices and installations having knowledge of the facts. . . . To assist you in communicating with these field offices, we are enclosing an extra copy of this document. If you need further copies, we shall be glad to furnish them.
Id. Despite thatnotice, the decommissioning process did not change or stop to accommodate the need for evidence preservation. A month after 4DD filed its complaint, on September 22, 2015, Ms. Stokely emailed DHA personnel, “It looks like we are a go for the destruction of the hard drives on Saturday.” Pls.’ Mot. Ex. MM. She copied DHA’s Mr. Zamarripa who was responsible for DTC oversight. The DTC hard drives were shredded, destroying all of the information on those hard drives, on September 26, 2015. Nearly three months after 4DD filed this lawsuit, on November 13, 2015, the government sent out litigation hold notices. Mr. Salais, supervisor of the DTC decommissioning, did not receive a litigation hold notice until two years later, shortly before he was deposed. As SMS concluded its work on the DMIX project, it began returning agency-issued laptops. On August 10, 2015, SMS returned 15 laptops to the agency. On October 1, 2015, SMS returned an additional 19 laptops. The government represents, based on DHA’s deposition preparation chart, that most of the laptops that SMS returned were reimaged or retired and destroyed around or during March 2016. Def.’s Resp. 13. Reimaging erases the laptop’s hard drives. The reimaging occurred months after the preservation hold had been issued. 10 During this period, Ms. Stokely also returned a laptop to the agency and was issued a second laptop. On March 16, 2016, the agency reimaged Ms. Stokely’s first laptop, erasing all data on its hard drive. Ms. Swenson testified as the government’s representative regarding the laptop reimaging. In her October 19, 2017 deposition, Ms. Swenson acknowledged that she was aware of the lawsuit as of October 2015. She explained that her focus was gathering data relating to the true up. She stated that she “[d]id not even consider that SMS was a player in relevance of the case, since we already had their data from the true-up.” Def.’s Resp. Ex N. Furthermore, she explained that SMS had other ways than the project laptops to document their work and communicate with the government. She explained the process of reimaging as follows: “I followed my standard process of I get laptops in, I give them to IT, I reissue them as needed. I inadvertently didn’t even consider those laptops having anything relevant to this case because they are laptops, not servers, with 4DD documentation.”
Id. In asubsequent December 21, 2017 deposition as a designated representative, Ms. Swenson stated that she was responsible for accepting the laptops at the end of the contract. She explained that neither she, nor any other agency employee, evaluated the laptops returned by SMS for relevant material that should have been preserved. She stated, “It became a blinding flash of the obvious when it was discussed in May of 2017.” Pls.’ Mot. Ex. TT. The government was able to produce responsive documents from a few of the laptops that had not been reimaged. Furthermore, the government produced the contents of laptops issued to contractor ICS Nett, which was involved in both the execution of the 2014 deletion orders and the later DTC decommissioning. The government filed its partial motion to dismiss plaintiffs’ claim on June 24, 2016. The court ultimately stayed this motion to allow for discovery. In July 2016, Mr. Zamarripa corresponded with DHA contractors regarding a preservation and search order from Glinda Hodgkin, DHA’s Records Management Officer. He was seeking information regarding where TETRA had been installed in the past and whether any instances of it were 11 presently installed in listed labs. Some contractors responded that they did not find a record of TETRA, but Ms. Stokely responded on July 12, 2016, “[W]e can substantiate the existence of TETRA software in our prior lab. . . . the TETRA software did reside on a number of VMs in the DTC that were decommissioned . . . . Attached is a document containing a list of the VMs that were in the DTC as well as the CR requesting the decommission of said VMs.” Pls.’ Mot. Ex. UU. Mr. Zamarripa reported this information to the government’s counsel at the time. He explained that he had “just been informed that the DTC did indeed have the software in the decommissioned DTC. Prior to decommissioning the DTC all Virtual Machines which contained the software were permanently deleted.” Pls.’ Mot. Ex. VV. Ms. Stokely returned her second laptop to the agency on November 14, 2016. On May 3, 2017, the government’s counsel reminded DHA of its obligations to follow-up regarding data from these various agency-issued laptops. Despite its preservation obligation, on August 28, 2017, DHA erased the hard drive on the second Stokely laptop. The government was able to produce the emailed referenced above and the attached spreadsheet. As discovery wound down, plaintiffs filed their motion for sanctions on November 21, 2018. DISCUSSION Plaintiffs claim that the government infringed 4DD’s copyright by making more copies of TETRA than the single back-up copy permitted by the EULA and by using TETRA beyond the number of installations that the TETRA license permitted. At issue here are both the government’s partial motion to dismiss for lack of jurisdiction and plaintiffs’ motion for sanctions due to the government’s spoliation of evidence. I. We Deny The Partial Motion To Dismiss, Because Plaintiffs Established That The Government Authorized Or Consented To Its Contractor’s Excessive Use Of TETRA In The Contractor’s Labs. Plaintiffs bear the burden of establishing this court’s subject matter jurisdiction by a preponderance of the evidence. Trusted Integration, Inc. v. United States,
659 F.3d 1159, 1163 (Fed. Cir. 2011) (citing Reynolds v. Army & Air Force Exch. Serv.,
846 F.2d 746, 748 (Fed. Cir. 1988)). When 12 considering a motion to dismiss for lack of jurisdiction, the court accepts as true the undisputed facts in plaintiffs’ complaint and draws reasonable inferences in plaintiffs’ favor.
Id. To determinewhether it has jurisdiction, however, the court also may consider other relevant evidence.
Reynolds, 846 F.2d at 748. Defendant argues that this court does not have jurisdiction over part of plaintiffs’ claim because 28 U.S.C. § 1498(b) (2012) requires that the government authorize or consent to its contractor’s infringement for the government to be held responsible for that infringement. 9 The government concedes that it authorized or consented to any infringing activity that occurred when SMS, or other contractors, worked with TETRA on DTC servers, but it contends that it did not authorize or consent to infringing activity that occurred when SMS worked with TETRA in SMS labs. Section 1498(b) states, [W]henever the copyright in any work protected under the copyright laws of the United States shall be infringed . . . by a contractor, subcontractor, or any person, firm, or corporation acting for the Government and with the authorization or consent of the Government, the exclusive action which may be brought for such infringement shall be an action by the copyright owner against the United States in the Court of Federal Claims . . . . The question here is whether SMS was acting (1) “for the Government” and (2) “with the authorization or consent of the Government” when it performed any infringing activity in SMS labs.
Id. The answeris plainly yes. To establish that the contractor was acting for the government, plaintiffs must show that the “infringing activity has been performed by a government contractor pursuant to a government contract and for the benefit 9 Defendant also argues that plaintiffs cannot rely on the EULA as a substantive source of subject matter jurisdiction. Because 4DD states unequivocally that its “sole claim is for copyright infringement under 17 U.S.C. §§ 106, 504 and 28 U.S.C. § 1498(b)—not a breach of contract claim under the EULA,” Pls.’ Resp. 35, the EULA is not the potential source of jurisdiction. 13 of the government . . . .” Sevenson Environ. Servs., Inc. v. Shaw Environ., Inc.,
477 F.3d 1361, 1366 (Fed. Cir. 2007) (interpreting “for the United States” in the patent infringement section, 28 U.S.C. § 1498(a)). The evidence presented shows that SMS was at all relevant times the agency’s contractor for testing and configuring TETRA on the DMIX project. The communications between SMS and the government also reflect that the only reason SMS was using TETRA was for the DMIX project, despite SMS statements to the agency that SMS did not believe that its TETRA use was agency-directed. Thus, SMS’s actions were undertaken for the government. Plaintiffs also must establish that the government “authorize[d] or consent[ed] to infringement by a third party acting for it.” Boyle v. United States,
200 F.3d 1369, 1373 (Fed. Cir. 2000). The Federal Circuit in Boyle cited Auerbach v. Sverdup Corp.,
829 F.2d 175, 179 (D.C. Cir. 1987), to explain that although the government is liable for infringing activity it authorizes, it is not responsible for “any copyright infringement the third party may choose to undertake within the sphere of the authorized action,” i.e., on its own initiative. Plaintiffs must point to “explicit acts or extrinsic evidence sufficient to prove the government’s intention to accept liability for a specific act of infringement.”
Id. at 177.Authorization or consent may be either express, such as a contract clause, or implied, such as when infringement is necessary to the contractor’s performance of its contract.
Id. at 180.In TVI Energy Corp. v. Blane,
806 F.2d 1057, 1060 (Fed. Cir. 1986), the Federal Circuit found that the government’s authorization could be implied where bidding procedures required the offeror to include certain allegedly infringing material. The court reasoned that “[t]he mere fact that the Government specifications for the targets did not absolutely require Blane to infringe TVI’s patent at that demonstration does not extinguish the Government’s consent.”
Id. at 1060.The court explained that the “coverage of § 1498 should be broad so as not to limit the Government’s freedom in procurement . . . .”
Id. Similarly, inAdvanced Software Design Corp. v. Fed. Reserve Bank of St. Louis,
583 F.3d 1371, 1376 (Fed. Cir. 2009), the Federal Circuit found government authorization when the Treasury had sent letters and made statements to certain banks directing the allegedly infringing use of a technology. The Court of Claims summarized in Hughes Aircraft Co. v. United States,
534 F.2d 889, 901 (Ct. Cl. 1976), that 14 ‘authorization or consent’ on the part of the Government may be given in many ways other than by letter or other direct form of communication—e.g., by contracting officer instructions, by specifications or drawings which impliedly sanction and necessitate infringement, [or] by post hoc intervention of the Government in pending infringement litigation against individual contractors. On the other hand, the fact that the government simply benefits from infringement is insufficient to demonstrate authorization or consent. In Auerbach, a contractor copied an architect’s plans to build a garage for the government. The court held that “[t]he fact that the federal government might benefit from the copying because it subsequently will have ownership of the building does not make the United States a party to the copyright
violation.” 829 F.2d at 180. Since there was not an authorization clause, a statement or action authorizing copying the plans, or some requirement that necessitated using the plans, the government did not authorize or consent to that infringing activity.
Id. The governmentargues that any infringing use of TETRA in SMS labs was on the contractor’s own initiative, perhaps within the range of options SMS could have used to accomplish its tasks but not endorsed by the agency. The government explained that although it would have authorized actions relating to the DTC, it did not know how SMS was using TETRA in its own labs. Defendant points out that there was no authorization clause in the contract and that the agency attempted to determine how many cores the license should include. Defendant also relies on SMS statements to the agency that it did not believe the agency had directed its actions. We find that the agency did authorize or consent to its contractor’s allegedly infringing use of TETRA in SMS labs, namely making additional copies of TETRA and installing TETRA in excess of the purchased license. Plaintiffs allege that any copying would have exceeded the license and any direction to copy would have constituted a direction to exceed the license. Plaintiffs also allege that any use beyond the purchased cores exceeds the license and constitutes infringement. Plaintiffs have demonstrated authorization or consent to these actions by SMS in at least two ways. First, the agency directed SMS to engage in actions that necessitated copying TETRA and it approved SMS’s plan to copy virtual machines containing 15 TETRA. Second, the agency accepted liability for SMS’s excessive use of TETRA in SMS labs in the 2015 TETRA license modification. First, Mr. Calvin approved SMS’s plan to copy virtual machines containing TETRA and directed SMS to accomplish tasks that required cloning the software. When it directed SMS to perform work in its own labs, the agency understood that SMS’s work necessarily would have involved cloning virtual machines containing TETRA, and Mr. Calvin stated that such copying was done with his authorization. The agency expressly directed a DTC environment that contained TETRA to be cloned in December 2013. Furthermore, the agency’s approved workflow in the DTC alone required SMS to exceed the licensed amount of TETRA use, meaning that, of necessity, SMS’s work in its own labs would exceed the licensed number of cores. Even if SMS could have accomplished the tasks another way, which defendant did not argue, “the mere fact that” options exist “does not extinguish the Government’s consent.” TVI Energy
Corp., 806 F.2d at 1060. Defendant is correct that SMS’s contract lacked an authorization clause, but such a clause is not the only way to demonstrate authorization. Here, the agency directed software copying and SMS’s reports on its work further alerted the agency to SMS’s copying. Mr. Calvin did not shy away from the fact that the agency approved the copying. SMS’s statements that it did not believe the agency was directing its work are contradicted by the agency’s directions, SMS’s reports, and Mr. Calvin’s statements. Moreover, defendant’s attempt to draw a distinction between SMS engaging in infringing activity in its own labs versus in the DTC is unavailing. There is no appreciable difference between the work completed in the two locations. The agency expressly authorized SMS to perform TETRA testing and configuration in both SMS labs and the DTC. Mr. Calvin confirmed that SMS accomplished its duties by copying software from its own labs into the DTC—the work performed in the different locations was inextricably linked. Second, when 4DD requested an investigation into whether TETRA was being used in accordance with the license agreement, the agency included SMS labs in its assessment and chose to pay for over-installations of TETRA in SMS labs. The agency did not treat the use of TETRA in SMS 16 labs any differently than the use of TETRA in the DTC. Instead, the agency assumed responsibility for SMS activities in both locations. In fact, the agency maintained that the 168 additional cores that it paid for in March 2015 were those cores found in SMS labs, not those on the DTC servers. Furthermore, the TETRA license modification flowed naturally from the agency’s statements at the beginning of project that it was responsible for how TETRA was deployed. Mr. Calvin and Ms. Swenson expressly communicated to both 4DD and SMS, just after purchasing the TETRA license, that the agency would manage the TETRA license and that it was responsible for TETRA use on virtual machines. SMS was not given a general objective and permitted to execute it however it saw fit. Instead, Mr. Calvin and Ms. Swenson sought accounting of TETRA installations; SMS reported to the agency weekly; and Mr. Calvin conceded that he approved the virtual machine copying. When SMS thought that its use of TETRA between the DTC and its labs would exceed the license purchased, SMS sought direction from Mr. Calvin, involving him at every turn. The government may not have known exactly how widespread the usage was, but it was certainly hands-on in its directions on where to use the TETRA software. Its hand-on approach culminated in accepting responsibility for excessive use of TETRA in SMS labs. Taken together, the agency’s instructions, concessions, and acceptance of responsibility demonstrate that the agency authorized or consented to SMS’s allegedly infringing use of the TETRA software. II. The Government With A Culpable State Of Mind Destroyed Relevant Evidence That It Had A Duty To Preserve And Sanctions Are Appropriate. We now turn to plaintiffs’ motion for sanctions. 4DD argues that the government destroyed evidence relevant to prove that infringement occurred and to determine the damages associated with any infringement. Plaintiffs contend that the court should impose all available sanctions for this destruction of evidence, including granting 4DD a default judgment on liability and imposing an adverse inference against the government with respect to damages. It argues that the court also should preclude the government from cross-examining 4DD’s witnesses, submitting secondary evidence, and arguing that evidentiary gaps should be construed in the government’s favor. Finally, plaintiffs ask the court to award it fees and costs 17 for bringing the motion and for conducting additional discovery necessary to assess and ameliorate the government’s spoliation. The parties agree on the key events: The agency deleted instances of TETRA during the true-up period without informing 4DD. The agency destroyed the DTC servers’ hard drives. The agency erased all the information on many laptops used on the DMIX project. The government nevertheless argues that these three categories of evidence destruction do not constitute spoliation. It contends that the agency had no duty to preserve this evidence, that some of it was not relevant, and that the evidence can be replaced by other discovery. The government also contends that the most severe sanctions cannot be imposed because the evidence was not destroyed with intent to deprive 4DD of its use in litigation. Spoliation occurs when a party destroys or materially alters relevant evidence that it had a duty to preserve. United Med. Supply Co. v. United States,
77 Fed. Cl. 257, 268 (2007). The court may impose sanctions for spoliation based on the court’s inherent authority to govern the judicial process and pursuant to Rule 37 of the Rules of the United States Court of Federal Claims. Chambers v. NASCO, Inc.,
501 U.S. 32, 45–46 (1991). Parties have a duty to preserve evidence when litigation is “‘pending or reasonably foreseeable.’” Micron Tech., Inc. v. Rambus Inc.,
645 F.3d 1311, 1320 (Fed. Cir. 2011) (quoting Silvestri v. General Motors Corp.,
271 F.3d 583, 590 (4th Cir. 2001)). Determining when litigation is reasonably foreseeable “is a flexible fact-specific standard,” allowing the court to exercise its discretion.
Id. The dutyis not triggered by the “distant possibility of litigation” but does not require imminent litigation.
Id. at 1319–20.“This is an objective standard, asking not whether the party in fact reasonably foresaw litigation, but whether a reasonable party in the same factual circumstances would have reasonably foreseen litigation.”
Id. at 1320.When determining what sanctions are warranted, the spoliator’s state of mind is relevant. United Med. Supply
Co., 77 Fed. Cl. at 268–70. Ordinary negligence may be sufficient to show the culpable state of mind, but for more severe sanctions, the showing of culpability may require more than negligence.
Id. When theevidence at issue is electronically stored information, Rule 37(e) sets out the framework for imposing sanctions. Rule 37(e) adopts the traditional spoliation standards but adds the requirement that the court find 18 “intent to deprive another party of the information’s use in litigation” before imposing the most severe sanctions: If electronically stored information that should have been preserved in the anticipation or conduct of litigation is lost because a party failed to take reasonable steps to preserve it, and it cannot be restored or replaced through additional discovery, the court: (1) upon finding prejudice to another party from loss of the information, may order measures no greater than necessary to cure the prejudice; or (2) only upon finding that the party acted with the intent to deprive another party of the information’s use in the litigation may: (A) presume that the lost information as unfavorable to the party; . . . or (C) dismiss the action or enter a default judgment. Since the evidence at issue here is electronically stored information, we will follow the elements set out in Rule 37(e)(2). 10 The first question is whether the government had a duty to preserve any of this evidence. Plaintiffs successfully demonstrated that the evidence at issue is relevant. The deleted copies of TETRA and data stored on DTC servers are at the heart of the claim: the copying on DTC servers is one of the alleged infringing acts. In addition, based on the limited laptop production, plaintiffs have shown that the reimaged laptops likely contained communications and other information relevant to how TETRA was used. The government argues that the deleted copies of TETRA are not evidence that the agency should have preserved because they were “nonfunctional,” in other words not configured or not usable. The notion of “nonfunctional” installations of TETRA arose after litigation commenced during discovery disagreements. Mr. Calvin appears to have first raised the concept. At oral argument defendant took the position that if an installation of TETRA either could not work in a particular environment because it was not properly configured or because of security constraints, it was 10 Rule 37(e) does not define electronically stored information, but plaintiffs concede that the deleted copies of TETRA and the data erased from the project laptops are electronically stored information. Plaintiffs argue that the shredded DTC hard drives could be viewed as physical evidence. We disagree: the hard drives are not the relevant evidence here; the evidence is the data that the DTC servers stored prior to their destruction. Thus, all three categories are electronically stored information. 19 “nonfunctional” and the agency could delete those copies with impunity; it had no duty to preserve, or make reasonable efforts to preserve, such copies and the deletion was not prejudicial because the agency would not need to pay 4DD for those copies. The government is unable to point to a single instance, during the DMIX project, in which anyone referred to copies of TETRA as “nonfunctional.” Nor could defendant point to an instance where anyone suggested that certain copies of or use of TETRA would not need to be paid for if they exceeded the rights granted under the TETRA license— functional or otherwise. The evidence shows the opposite: the deletion orders explain the reason for deletion as a concern with “a license issue,” not because the software was not fully configured or because it was inconsistent with security protocols. Turning to when the duty to preserve evidence arose, at the point at which the DTC hard drives were shredded and when many of the laptops were reimaged, litigation was already pending. Defendant undoubtedly had a duty to preserve the evidence contained on the DTC servers and the laptops after litigation had commenced. The agency should have preserved evidence in the anticipation of litigation before 4DD filed its complaint, however. On August 29, 2014, 4DD placed the agency on notice that it believed the agency had used its software inconsistently with the agency’s rights under the TETRA license. The agency agreed to investigate the use of TETRA in agency- and contractor-owned labs. A reasonable party would certainly anticipate litigation when faced with an allegation that it had exceeded rights under a contract and when it agreed to investigate that allegation. Furthermore, the agency spent several months agreeing to investigate the extent of copying while simultaneously deleting evidence of what 4DD had asked the agency to enumerate. Indeed, during the true up process, the agency created documents that the government later marked as work product on its privilege log, stating that this material was created in anticipation of litigation. Although defendant later waived its claim of privilege for those documents, the fact remains that the agency had reason to anticipate litigation with plaintiffs at the beginning of the true up period. The agency in fact foresaw litigation as early as January 2015. 20 Since the government had a duty to preserve the evidence at issue, the next question is whether the government took reasonable steps to preserve it. Regarding copies of TETRA deleted during the true up process, the agency chose to destroy rather than preserve evidence. Also, the government never attempted to accurately account for TETRA used on the DTC servers. It simply arbitrarily assigned the original 64 paid-for cores to the DTC and allowed the DTC to continue along the path to decommissioning without making records of how many copies of TETRA had existed. During the true up process and thereafter, the agency did the opposite of taking reasonable steps to preserve a record of TETRA use, leaving the DTC servers and other environments where TETRA was installed as the only complete record. After 4DD filed its complaint, the government delayed nearly three months in issuing preservation notices, by which point data on the DTC hard drives was lost. The exact danger that the call letter predicted came to pass. Had the government more promptly notified DHA, perhaps the DTC destruction could have been averted or the data stored there archived for future access. Even when the government did issue a preservation hold, that notice failed to reach the personnel responsible for the decommissioning until nearly two years later. In addition to the delayed release of the preservation hold, the government continued to allow evidence to slip through the cracks: laptop reimaging occurred long after the complaint was filed, apparently because no process was in place to check for relevant data. Even though the government eventually produced some information from a few laptops, the effort to preserve electronically stored information was inexcusably shoddy. The government argues that sanctions are inappropriate because the information that has been lost can be replaced by other discovery. For instance, the government contends that images of hard drives containing data made before decommissioning, server diagrams, change orders, and SMS weekly progress reports are sufficient to demonstrate where and in what quantities TETRA was installed. Those copies, however, are incomplete. Also, as plaintiffs note, the change orders list environments in which to delete TETRA without an accompanying instruction to note the copies of TETRA or the cores in use. SMS weekly reports merely reflect TETRA use in general terms. Likewise, license trackers were incomplete and voluntary from the beginning, making them unreliable sources of data. Furthermore, plaintiffs argue that SMS project data could have been stored on the project laptops and plaintiffs represent that SMS production has 21 not included a replacement way to account for TETRA copies and cores. Although plaintiffs have been able to access some evidence of where TETRA was present, this evidence is partial and cannot offer a comprehensive, reliable picture. To impose sanctions, the only remaining step is to determine whether plaintiffs suffer prejudice because of the agency’s spoliation. Prejudice may appear in many forms, such as plaintiffs being “unable to fully respond to the secondary evidence” or being required to go to great lengths in discovery to fill in the gaps in the evidence. Lab. Corp. v. United States,
108 Fed. Cl. 549, 562 (Fed. Cl. 2012); see also United Med. Supply
Co., 77 Fed. Cl. at 274–75. We find that the government’s destruction of evidence prejudices plaintiffs in their attempt to demonstrate both the fact of infringement and any damages flowing from that infringement. First, the government’s consistent deletion of evidence—whether purposeful or inadvertent—created gaps that plaintiffs must now try to fill by cobbling together secondary evidence. Plaintiffs note that the government’s argument that the deleted copies of TETRA were nonfunctional is a perfect example of how the deletion works in the government’s favor. If that allegation were relevant, plaintiffs effectively cannot combat the assertion because the copies no longer exist. The government’s failure to preserve also dramatically added to the time and resources dedicated to discovery. We find that it is appropriate to award 4DD fees and costs for bringing this motion and conducting additional discovery necessary to assess and ameliorate the government’s spoliation. Furthermore, the government will be precluded from arguing that evidentiary gaps created by its spoliation should be construed in the government’s favor. Rule 37(e)(2) imposes a prerequisite to going further, however, to presume that the lost information is unfavorable to the spoliator. The court first must find that the party acted with the intent to deprive another party of the information’s use in litigation. This 2015 addition to Rule 37 has been interpreted by various trial courts to require a showing of anything from bad faith to irresponsible behavior that lacks any other explanation than intent to deprive. E.g., Brewer v. Leprino Foods Co.,
2019 WL 356657, *10 (E.D. Cal. Jan. 29, 2019) (finding that the “pattern of conduct suggests intentional spoliation”); Oracle Am., Inc. v. Hewlett Packard Enter. Co.,
328 F.R.D. 543, 549 (N.D. Cal. 2018) (“not merely negligent or even grossly negligent, but an intentional effort to keep the ESI from the opposing party”); Alabama Aircraft Indus. v. Boeing Co.,
319 F.R.D. 730, 746 (N.D. Ala. 2017) 22 (“blatantly irresponsible behavior”); Ottoson v. SMBC Leasing & Finance, Inc.,
268 F. Supp. 3d 570, 584 (S.D.N.Y 2017) (“acted willfully or in bad faith”). The matching Federal Rule of Civil Procedure 37(e)(2) Advisory Committee Notes state that the amendment rejects cases “that authorize the giving of adverse-inference instructions on a finding of negligence or gross negligence.” Here, Mr. Calvin’s orders directing contractors to delete instances of TETRA in listed environments because of “a license issue” is sufficient to demonstrate that he intentionally deprived 4DD of the use of that information in litigation. 4DD had made the agency aware of its contention that it was owed money for over-installation of the software at a time when the agency held out that it was engaged in a “true up.” While the agency represented to 4DD that it was still counting instances of TETRA, Mr. Calvin was ordering that evidence of installation be deleted. We can conclude based on Mr. Calvin’s direction and his explanation that the agency intended to deprive 4DD of the use of that information at a time when litigation was plainly foreseeable. Therefore, it is appropriate to presume that a preserved, accurate count of the number of copies of TETRA on DTC servers would have been unfavorable to the government. The DTC decommissioning and laptop reimaging are not as clear cut. Regarding the SMS laptops, Ms. Swenson apparently did not consider whether those laptops contained relevant information at all, much less whether to delete information intentionally to avoid its disclosure to another party. But that explanation is conveniently narrow: why would the agency only be retaining information related to the true up when the complaint and preservation hold were not limited in that way? Long after litigation had begun, there was no effort made to alert people who had been intimately involved with TETRA installations, like Ms. Swenson, to the need to retain all relevant information and not undertake any deletions. The lack of any credible explanation for the deletion of the laptop data months into this litigation and in the face of a preservation hold is sufficient to infer that the agency deleted information that was detrimental to it. The decommissioning, on the other hand, appears to have occurred according to regular process rather than an intentional effort to keep that information from plaintiffs. We agree with plaintiffs that, at a minimum, the agency acted negligently regarding the information stored on DTC servers. The agency should have availed itself of alternatives to retaining those hard drives, such as creating a record of how software was used and where it was 23 installed on DTC and its contractor’s servers. The result of the destruction is that both parties are left without any complete record of the contents of the DTC servers. But there is not a pattern of willful behavior here as there is with repeated laptop reimaging. Instead, the agency suffered from the exact problem that the Department of Justice call letter predicted: a failure to communicate within this sprawling project. The process began in February 2015 as the project wound down and continued to completion without any regard for this lawsuit. The appropriate personnel apparently did not know about the litigation hold prior to the decommissioning. The contractors responsible for giving the “go” for shredding similarly did not know the effect that decommissioning would have. This communication failure is undoubtedly negligent but falls short of the intentional behavior expected under Rule 37(e)(2). We therefore will not draw an adverse inference against the government regarding the content of the destroyed hard drives. Ultimately, all three sources of evidence discussed in this section would have aided in determining the extent of the government’s use of 4DD’s software, and, if it exceeded the government’s rights in the software, in determining what damages are owed. As discussed at oral argument, we will not enter a default judgment on liability, but we will draw the necessary adverse inferences against the government to account for deletion of TETRA on DTC servers and deletion of project data from agency laptops. This remedy is sufficient, particularly when coupled with fees and costs associated with this motion and conducting additional discovery and precluding the government from arguing that evidentiary gaps created by its spoliation should be construed in its favor. Because the parties currently are working toward the conclusion of discovery, we will defer until summary judgment or trial the question of how specifically to apply the inferences that plaintiffs ask us to draw against defendant. CONCLUSION Because plaintiffs established that the government authorized or consented to SMS’s allegedly infringing activity when working in SMS labs, we deny defendant’s motion to dismiss. Furthermore, we grant plaintiffs’ motion for sanctions because the government destroyed relevant evidence that it had a duty to preserve. Plaintiffs are directed to file a motion, appropriately supported, seeking a recovery of its costs and fees related to the motion for sanctions and with respect to discovery prompted by the 24 destruction of evidence. The court will defer until summary judgment or trial the application of the evidentiary implications of this ruling. s/Eric G. Bruggink ERIC G. BRUGGINK Senior Judge 25
Document Info
Docket Number: 15-945
Filed Date: 5/10/2019
Precedential Status: Precedential
Modified Date: 5/10/2019