CHRISTOPHER J. BURKE, Magistrate Judge.
In one case of this consolidated action pitting Plaintiff/Counterclaim Defendant PhishMe, Inc. ("Plaintiff' or "PhishMe"). against Defendant/Counterclaim Plaintiff Wombat Security Technologies, Inc. ("Defendant" or "Wombat"), Plaintiff currently alleges infringement of United States Patent No. 9,398,038 ("the '038 patent"). (D.I. 16 at ¶ 1) Presently before the Court is PhishMe's Motion to Dismiss Wombat's State Law and Lanham Act Counterclaims, filed pursuant to Federal Rule of Civil Procedure 12(b)(6) (the "Motion"). (D.I. 20) For the following reasons, the Court recommends that PhishMe's Motion be GRANTED-IN-PART and DENIED-IN-PART.
PhishMe is a Delaware corporation with its principal place of business in Leesburg, Virginia. (D.I. 16 at ¶ 3) It provides cybersecurity services aimed at reducing targeted phishing threats and cyberattacks. (Id. at ¶ 12) PhishMe's e-mail software plug-in, "Reporter™," enhances phishing detection and response by, among other things, automatically distinguishing between simulated and potentially real phishing e-mails, so that reports of possibly malicious e-mails are delivered to appropriate security operations and incident response teams: (Id at ¶ 13) PhishMe is the owner by assignment of the patent-in-suit. (Id. at ¶ 14 & ex. A)
Wombat is a Delaware corporation with its principal place of business in Pittsburgh, Pennsylvania. (Id. at ¶ 4) Ittoo is a provider of cybersecurity products, including phishing awareness technology. (Id. at ¶ 17) Wombat is alleged to be a major competitor of PhishMe in, inter alia, the phishing attack simulation market, and it commercially provides the cybersecurity product ThreatSim®. (Id.; see also id. at ¶ 24; D.I. 18 at ¶ 16)
Although the current allegations of patent infringement relate to the '038 patent, the issues at play regarding this Motion involve a related patent owned by PhishMe, U.S. Patent No. 9,356,948 (the "'948 patent"). The '948 patent is entitled "Collaborative Phishing Attack Detection." This patent relates to "methods, network devices and machine-readable media for detecting phishing attacks, and . . . relies upon the responses of individuals . . . to classify or not classify a message as a phishing attack." ('948 patent, col. 1:19-24)
The claimed invention of the '948 patent, inter alia, enables employees to recognize and report potentially malicious phishing e-mails. For example, claim 1 of the patent describes a method by which a network device sends an e-mail that simulates a phishing attack to a computer device, and wherein certain "header" information used to identify the e-mail is then eleetronically stored. (Id., cols. 12:59-13:6) The computer user then reports that the e-mail is potentially malicious through the use of a "user interface action[,]" and, in response, the invention compares the e-mail's header information with the previously-stored header information, all in order to determine whether the e-mail is a known simulated phishing attack or a potentially real phishing attack. (Id., col. 13:1-12) If the comparison shows that the e-mail is a known simulated attack, the user then receives feedback indicating that he or she successfully reported it as a phishing attack. (Id., col. 13:13-21) And ifthe comparison shows that the e-mail is not a known simulated attack, the invention forwards the e-mail on for further review, so that a determination can be made as to whether it was areal phishing attack. (Id., col. 13:22-:30)
Claim 1 of the '948 patent is set out in its entirety below:
('948 patent, cols. 12:59-13:30) There are two other independent claims of the patent: claims 13 and 27. Both of those claims largely mirror claim 1—that is, claim 13 claims "[a] system" rather than a method, but includes all of the language of claim 1 (as the system claimed performs all of the steps set out in claim 1), (see id., col. 14:13-56), and claim 27 is a method claim that is identical to claim 1, with the exception of the addition of one limitation, (see id., cols. 15:50-16:38). The discussion below as to the '948 patent applies equally to every claim of that patent.
PhishMe filed suit against Wombat (Civil Action No. 16-403-LPS-CJB) on June 1, 2016, alleging, inter alia, infringement of '948 patent. (D.I. 1) On June 9, 2016, Chief Judge Leonard P. Starkreferred the case to the Court for any and all matters related to scheduling, and to resolve any and all motions to dismiss, stay, and/or transfer venue. (D.I. 5) Since then, PhishMe has filed two amended complaints in the case, including the currently operative Second Amended Complaint ("SAC"); the SAC was filed on September 6, 2016 and alleges infringement of only the '038 patent. (D.I. 16 at ¶ 1) On September 20, 2016, Wombat filed its Answer to the SAC, including counterclaims for, inter alia: (1) tortious interference with prospective business relations under Delaware law (the "tortious interference" claim); (2) violation of the Lanham Act, 15 U.S.C. § 1125; and (3) abuse of process under Delaware law. (D.I. 18 at ¶¶ 137-63)
PhishMe filed the instant Motion on October 14, 2016 in that case; seeking dismissal of Wombat's Lanham Act and Delaware state law counterclaims pursuant to Rule 12(b)(6). (D.I. 20) Briefing on the Motion was complete as of November 10, 2016. (D.I. 27)
The counterclaims at issue here, (D.I. 18, Counts I-III, hereinafter, the "counterclaims"), relate to PhishMe's prior (now dropped) assertion that Wombat infringed the '948 patent. (See id. at ¶¶ 137-63) As was noted above, PhishMe's original Complaint alleged infringement of that patent. (D.I. 1) The same is true of PhishMe's First Amended Complaint (which alleged infringement of both the '948 patent and the '038 patent). (D.I. 8) It was only with the filing of the SAC, on September 6, 2016, that PhishMe withdrew its claim that Wombat infringed the '948 patent. (D.I. 16)
Wombat's key factual allegations regarding the three counterclaims at issue are that: (1) PhishMe's claims of patent infringement related to the '948 patent were objectively and subjectively baseless, (D.I. 18 at ¶¶ 20-36); (2) PhishMe issued a false and misleading press release (the "Press Release") accusing Wombat of infringement of the '948 patent, (id. at ¶¶ 37-48); (3) PhishMe's dissemination of the Press Release harmed Wombat's customer relations and derailed its fundraising process, (id. at ¶¶ 49-66); and (4) PhishMe then pressured Wombat into merger negotiations on terms unfavorable to Wombat, (id. at ¶¶ 67-71).
More specifically, Wombat's counterclaims assert that one day after the '948 patent was issued (that is, on June 1, 2016), PhishMe "filed a baseless claim [of patent infringement] relying solely on a few isolated quotes from a [publicly available] `ThreatSim® for Outlook Administrator Guide [the "Administrator Guide",]'" without contacting Wombat ''to request any information about how Wombat's products operated or to discuss its accusation that Wombat infringes the '948 Patent[.]" (Id at ¶¶ 20-23 (citing D.I. 1 at ¶ 16))
According to Wombat's counterclaims, PhishMe then issued the Press Release, entitled "`PhishMe® Initiates Intellectual Property Enforcement Action Against Wombat Security Technologies®, Inc.'" on June 23, 2016 (22 days after filing the original Complaint). (Id. at ¶ 37; see also id. ex. 1) The Press Release stated, inter alia, that PhishMe's suit against Wombat was "a result of [Wombat's] infringement of the '948 Patent . . . which covers PhishMe's ReporterTM technologies" and that PhishMe had "`clear evidence of Wombat infringing PhishMe's innovative solutions.'" (Id., ex. 1 at 1) However, Wombat alleges that, in fact, "PhishMe had no evidence, let alone `clear' evidence, of the alleged infringement." (Id. at ¶ 42) The Press Release, which was disseminated in various ways, stated that PhishMe "fully intends to protect its investments . . . with legal enforcement where necessary[,]" (id., ex. 1 at 1), which Wombat takes to suggest that PhishMe "would pursue litigation against Wombat's customers who use ThreatSim®[,]" (id. at ¶ 44-46).
Wombat further alleges that "[s]hortly after PhishMe issued its Press Release, existing and prospective customers of Wombat contacted Wombat to express concern about PhishMe's infringement claims." (Id. at ¶ 49) It also alleges, "[u]pon information and belief," that aside from the Press Release, "PhishMe sent similar emails to other existing and prospective customers of Wombat." (Id. at ¶ 52) Wombat asserts that multiple prospective customers either expressed serious concerns about contracting with Wombat after reading the Press Release, or in fact elected not tq contract with Wombat after doing so. (See id. at ¶¶ 54-56) In addition, Wombat alleges that it "was forced to offer extensive indemnification to potential and existing customers during contract negotiations" because of "PhishMe's bad faith accusations[.]" (Id. at ¶ 59) And Wombat asserts that PhishMe's suit completely derailed Wombat's efforts to fundraise from third parties, and that "but for PhishMe's baseless accusations, Wombat would have received a higher number of concrete offers and the concrete offers it received would have been based on higher valuations." (Id. at ¶ 64)
Finally, Wombat alleges that "[o]n the same day the final prospective investor withdrew its offer to Wombat, Bessemer Venture Partners (`BVP')," a significant investor in PhishMe,
Wombat then alleges that PhishMe's actions, described above, help provide the factual basis for the three counterclaims at issue. (Id. at ¶¶ 137-63)
Pursuant to Rule 12(b)(6), a party may move to dismiss a plaintiff's complaint based on the failure to state a claim upon which relief can be granted. Fed. R. Civ. P. 12(b)(6). The sufficiency of pleadings for non-fraud cases is governed by Federal Rule of Civil Procedure 8, which requires "a short and plain statement of the claim showing that the pleader is entitled to relief[.]" Fed. R. Civ. P. 8(a)(2).
When presented with a Rule 12(b)(6) motion to dismiss for failure to state a claim, a court conducts a two-part analysis. Fowler v. UPMC Shadyside, 578 F.3d 203, 210 (3d Cir. 2009). First, the court separates the factual and legal elements of a claim, accepting "all of the complaint's well-pleaded facts as true, but [disregarding] any legal conclusions." Id. at 210-11. Second, the court determines "whether the facts alleged in the complaint are sufficient to show that the plaintiff has a `plausible claim for relief.'" Id. at 211 (quoting Ashcroft v. Iqbal, 556 U.S. 662, 679 (2009)).
Determining whether a claim is plausible is "a context-specific task that requires the reviewing court to draw on its judicial experience and common sense." Iqbal, 556 U.S. at 679. A plausible claim does more than merely allege entitlement to relief; it must also demonstrate the basis for that "entitlement with its facts." Fowler, 578 F.3d at 211. Thus, a claimant's "obligation to provide the `grounds' of his `entitle[ment] to relief' requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do[.]" Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007); accord Iqbal, 556 U.S. at 678 ("Threadbare recitals of the elements of a cause of action, supported by mere conclusory statements, do not suffice."). In assessing the plausibility of a claim, the court must "`construe the complaint in the light most favorable to the plaintiff, and determine whether, under any reasonable reading of the complaint, the plaintiff may be entitled to relief.'" Fowler, 578 F.3d at 210 (quoting Phillips v. Cnty. of Allegheny, 515 F.3d 224, 233 (3d Cir. 2008)).
The Court will first address Wombat's state law counterclaims, and then will assess its Lanham Act counterclaim.
Counts I and III of Wombat's counterclaims (the tortious interference and abuse of process claims) arise under Delaware state law. (See, e.g., D.I. 21 at 9) PhishMe argues that these state law counterclaims are preempted by federal patent law. (See id. at 9-12; D.I. 27 at 2-6)
"[F]ederal patent law preempts state-law tort liability for a patentholder's good faith conduct in communications asserting infringement of its patent and warning about potential litigation." Globetrotter Software, Inc. v. Elan Comput. Grp., 362 F.3d 1367, 1374 (Fed. Cir. 2004) (citing Zenith Elecs. Corp. v. Exzec, Inc., 182 F.3d 1340, 1355 (Fed. Cir. 1999)). "State-law claims [of this nature] can survive federal preemption only to the extent that those claims are based on a showing of `bad faith' action in asserting infringement." Id. Accordingly, to avoid preemption, "bad faith must be alleged and ultimately proven, even if bad faith is not otherwise an element of the tort claim." Zenith, 182 F.3d at 1355. "In general, a threshold showing of incorrectness or falsity, or disregard for either, is required in order to find bad faith in the communication of information about the existence or pendency of patent rights." Mikohn Gaming Corp. v. Acres Gaming, Inc., 165 F.3d 891, 897 (Fed. Cir. 1998).
"Bad faith includes separate objective and subjective components." Dominant Semiconductors Sdn. Bhd. v. OSRAM GmbH, 524 F.3d 1254, 1260 (Fed. Cir. 2008) (citing Mikohn Gaming, 165 F.3d at 897). "The objective component requires a showing that the infringement allegations are `objectively baseless.'" 800 Adept, Inc. v. Murex Sec., Ltd., 539 F.3d 1354, 1370 (Fed. Cir. 2008) (quoting Globetrotter, 362 F.3d at 1375). Infringement allegations are objectively baseless if "no reasonable litigant could realistically expect to secure favorable relief." Prof'l Real Estate Inv'rs, Inc. v. Columbia Pictures Indus., Inc., 508 U.S. 49, 62 (1993) (citation omitted); see also Dominant Semiconductors, 524 F.3d at 1260. Therefore, a counterclaimant seeking to prove bad faith in this regard must "prove that the [counterclaim] defendant lacked probable cause . . . and . . . pressed the action for an improper, malicious purpose." Prof'l Real Estate Inv'rs, 508 U.S. at 62. The subjective component relates to a showing that the patentee demonstrated subjective bad faith in enforcing the patent. 800 Adept, 539 F.3d at 1370.
Here, the Court finds that Wombat has not sufficiently pleaded objective bad faith, as required in order to overcome Patent Act preemption of Wombat's tortious interference state law counterclaim (Count 1).
(Id. at ¶¶ 24-25 (emphasis in original)) Finally, Wombat pleaded that PhishMe dropped its allegedly baseless claim after PhishMe "achieved its objective of derailing potential investments in Wombat, and positioned itself to try to acquire Wombat at an artificially depressed price tllrough its Press Release and emails containing bad faith assertions that Wombat infringes the '948 Patent." (Id. at ¶ 72; see also id. at ¶ 74)
As can be seen from the previous paragraph, the core of Wombat's "bad faith" argument (laid out in paragraphs 24 and 25 of the counterclaims) is that: (1) the ThreatSim product clearly did not meet one identified limitation of the independent claims of the '948 patent; (2) the Administrator Guide—the sole resource that PhishMe relied upon to assert infringement—made this clear; and (3) yet PhishMe leveled its baseless allegations anyway, all to the detriment of Wombat. What is the key claim limitation at issue (that Wombat says ThreatSim clearly did not meet)? Paragraphs 24 and 25 again appear to make clear Wombat's answer: (1) Wombat is pointing to the claims' requirement (as set out, for example, in claim 1) that when an identified e-mail is determined to be a known, simulated phishing attack, that "feedback" be provided to the individual computer user "confirming that the identified email was a simulated fishing attack[,]" ('948 patent, col. 13:13-21)
Candidly, it would not have been the Court's first thought that the claims require "providing feedback" directly "in response to" the network device receiving the "notification" at issue. Claim 1, for example, does explicitly talk about something happening directly "in response to" something else—but there, it is that a determination as to whether the identified e-mail is a simulated phishing e-mail is to be made "in response to" the network device's having received the "notification." ('948 patent, col. 13:7-12) And, as PhishMe argues, if the step of "providing feedback" can be said to be taken directly in response to anything, it appears to be taken not in response to the act of receiving the "notification," but instead in response to the occurrence of the "determining" step (i.e., to the act wherein "the identified email is determined to be a known simulated phishing attack based on the comparison" of certain information), (id., col. 13:7-21). (D.I. 27 at 4 ("In addition, contrary to Wombat's assertion, claim 1 requires `providing feedback' `when the identified email is determined to be a known simulated phishing attack' based on a certain `comparison'[]—not in response to the network device receiving a `notification'")) This is because in the claims, the "notification" step occurs at an earlier stage then the "determining" step, and both occur before the "feedback" is provided.
However, even if at the claim construction stage, the claims are somehow found to require that the "feedback" be provided directly "in response to" the receipt by the "network device" of the "notification," then, in the Court's view, Wombat still would not have demonstrated that it is plausible that PhishMe had an objectively baseless infringement claim. That is because even if this ends up being found to be a claim requirement, for the reasons stated above, that requirement surely was not clear at the time PhishMe took the actions called out by Count I. The Court does not believe that "no reasonable litigant [in PhishMe's shoes] could realistically [have] expect[ed] to secure favorable relief' by arguing that the claim does not require what Wombat now says it does. Prof'l Real Estate Inv'rs, Inc., 508 U.S. at 62; cf. Wilco AG v. Packaging Techs. & Inspection LLC, 615 F.Supp.2d 320, 325-26 (D. Del. 2009) (finding that a defendant's Delaware state law tortious interference claim was preempted for the failure to sufficiently allege bad faith, where the defendant made general allegations that a plaintiff representative "inaccurately" advised a third party of defendant's purported infringement—a "sentiment shared by any accused infringer, but not indicative of any disregard on the part of plaintiff for the accuracy of [its representative's] statement").
For these reasons, Wombat has failed to sufficiently plead objective bad faith as to Count I, and thus Count I is preempted by federal patent law.
While it is undisputed that a failure to sufficiently plead bad faith compels dismissal of Count I, Wombat separately argues that federal patent law preemption (and the associated bad faith requirement) do not extend to abuse of process claims such as that found in Count III. (See D.I. 23 at 9) Specifically, Wombat asserts that "courts have held that preemption does not apply to such claims when they are based on misuse of judicial proceedings." (Id.) For this proposition, Wombat cites two district court cases.
In the first case, Verve, L.L.C. v. Hypercom Corp., No. CV-05-0365-PHX-FJM, 2006 WL 2390505 (D. Ariz. Aug. 16, 2006), the United States District Court for the District of Arizona indeed held that the defendant's malicious prosecution and abuse of process counterclaims (which arose under state law) were not preempted by federal patent law. 2006 WL 2390505, at *2 (citing US. Aluminum Corp. v. Alumax, Inc., 831F.2d878, 881 (9th Cir. 1987) ("While we do not deny that conflict is possible between state malicious prosecution laws and federal patent laws, the policies underlying each are not inherently antithetical. Patents do not create an exemption from state malicious prosecution laws.")). In the second case, Artemi Ltd v. Safe-Strap Co., Inc., Civ. Action No. 03-3382 (JEI/AMD), 2013 WL 6860734 (D.N.J. Dec. 30, 2013), the United States District Court for the District of New Jersey held that the defendant's New Jersey state abuse of process counterclaim was not preempted by federal patent law, noting that "[t]he federal preemption cases [plaintiff] relies upon[] merely stand for the proposition that common law tort claims of abuse of process cannot be based on `bad faith misconduct before the [United States Patent and Trademark Office, or "PTO"].'" 2013 WL 6860734, at *5 (quoting Semiconductor Energy Lab. Co., Ltd v. Samsung Elecs. Co., Ltd, 204 F.3d 1368, 1382 (Fed. Cir. 2000)). Accordingly, the Artemi Court determined that "allegations supporting an inequitable conduct defense cannot simultaneously support an abuse of process claim." Id. However, the defendant's abuse of process counterclaim, which was "not based on [plaintiff's] alleged actions before the PTO, but rather the initiation and continued pursuit of the instant suit[,]" was not preempted. Id.
In response to these cases, PhishMe argues that "controlling Federal Circuit law"—specifically, Globetrotter Software, Inc. v. Elan Comput. Grp., 362 F.3d 1367 (Fed. Cir. 2004)—indicates that: (1) Wombat is required to allege bad faith in support of its abuse of process claim; and (2) the abuse of process claim is the kind of claim that is subject to preemption by federal patent law in the absence of a sufficient allegation of bad faith. (D.I. 27 at 2-3 (quoting Globetrotter, 362 F.3d at 1377 ("A plaintiff claiming a patent holder has engaged in wrongful conduct by asserting claims of patent infringement must establish that the claims of infringement were objectively baseless."))) But Globetrotter did not address an abuse of process claim; indeed, it focused specifically on "pre-litigation communications alleging patent infringement" and "conduct in communications asserting infringement of [a] patent and warning about potential litigation." 362 F.3d at 1377 (emphasis added). In this case, by contrast, Wombat's abuse of process counterclaim is based on PhishMe's alleged activities "[a]fter filing the Complaint[.]" (D.I. 18 at ¶ 159 (emphasis added))
Moreover, the Court notes that to impose an "objectively baseless" requirement in the context of an abuse of process counterclaim seems particularly discordant, as such a requirement is fundamentally at odds with the very purpose of the tort. The abuse of process tort was created (and is distinguishable from, for example, a malicious prosecution claim) in order to prevent a plaintiff from "us[ing] an otherwise valid action as a pretext to achieve a collateral objective, and avoid liability for malfoious prosecution because there was probable cause to bring the action." Toll Bros., Inc. v. Gen. Accident Ins. Co., No. C.A. 98C-08-203 WTQ,'1999 WL 744426, at *5 (Del. Super. Ct. Aug. 4, 1999) (emphasis added) (citation omitted). "The quintessential case of abuse of process is the initiation of a valid law suit to compel the payment of a debt unrelated to the suit (a collateral purpose) and an offer to terminate such litigation upon payment of the unrelated debt." Id. (emphasis added) (citation omitted); see also Carr v. Town of Dewey Beach, 730 F.Supp. 591, 599 (D. Del. 1990); Pfeiffer v. State Farm Mut. Auto. Ins. Co., C.A. No. N10A-12-006 JRS, 2011 WL 7062498, at *5 n.50 (Del. Sup. Ct. Dec. 20, 2011). It seems strange, even in the context of a preemption inquiry, to require Wombat to allege that PhishMe's infringement claim as to the '948 patent was wholly baseless—all in order that Wombat be permitted to assert a counterclaim whose very raison d'etre is to allow for a claim where the underlying cause of action (or use of process) is not, in fact, wholly baseless.
In sum, the Court cannot find binding law supporting PhishMe's assertion of federal patent law preemption for state law abuse of process claims (and there is case law affirmatively to the contrary). PhishMe has thus not met its burden to demonstrate that Count III is preempted by federal patent law. The Court will therefore proceed to assess whether Wombat has sufficiently pleaded that counterclaim pursuant to Rule 8(a).
To establish an abuse of process claim under Delaware law, a plaintiff must prove: "`(1) an ulterior purpose; and (2) a willful act in the use of the process not proper in the regular conduct of the proceedings.'" Paoli v. Stetser, Civil Action No. 12-66-GMS-CJB, 2014 WL 3386037, at *35 (D. Del. July 11, 2014) (citing Esposito v. Townsend, C.A. 12C-08-006 (RBY), 2013 WL 493321, at *5 (Del. Super. Ct. Feb. 8, 2013)), report and recommendation adopted in part, rejected in part on other grounds, C.A. No. 12-66-GMS-CJB, 2014 WL 5847567 (D. Del. Nov. 10, 2014). "[S]ome definite act or threat, not consistent with process, or designed for an illegitimate objective in the use of process, is required." Chase Bank USA, N.A. v. Hess, C.A. No. 08-121-LPS-MPT, 2013 WL 867542, at *4 (D. Del. Mar. 7, 2013) (citing Nix v. Sawyer, 466 A.2d 407, 412 (Del. Super. Ct. 1983)). "Some form of coercion to obtain a collateral advantage, not properly involved in the proceeding itself, must also be shown." Id. (citing Nix, 466 A.2d at 412). On the other hand, merely carrying out the process to its authorized conclusion, even though with bad intentions, does not result in liability. Nix, 466 A.2d at 412 (citation omitted).
PhishMe contends that Wombat's abuse of process counterclaim cannot survive because "Wombat bases [that] counterclaim on PhishMe's infringement claim for the '948 Patent,[] but this accuses PhishMe's pleading, not the use of a court process." (D.I. 21 at 18 (emphasis in original)) PhishMe asserts that "[a]lleged misstatements in pleadings cannot support an abuse of process claim." (Id. (citations omitted))
But Wombat's allegations go well beyond PhishMe's statements in its first two complaints (in which PhishMe alleged infringement of the '948 patent). (D.I. 23 at 2) Indeed, Wombat specifically pleads that PhishMe-with the ulterior motive of attempting to gain an unfair advantage over Wombat in the marketplace—"[a]fter filing the Complaint . . . used the litigation [via the dissemination of the Press Release, related social media posts and via direct communications with Wombat customers] as means to interfere with Wombat's business and dissuade third parties from doing business with Wombat." (D.I. 18 at ¶¶ 158-59 (emphasis added); see also id. at ¶¶ 37-71) PhishMe's ultimate plan, Wombat alleges, was for these actions to permit PhishMe to acquire Wombat on unfair commercial terms (and for Wombat to understand that only were it to accede to that kind of acquisition, would this lawsuit then be resolved). (Id. at ¶¶ 160-62) This Court and Delaware state courts have repeatedly found that if a party files a lawsuit, and then is alleged to have (with an ulterior motive) tried to use the fact of that suit to cause extra-litigation or extra-judicial injury to another party, a Delaware state law claim for abuse of process can stand.
Accordingly, the Court will recommend denial of PhishMe's Motion as it pertains to Count III.
In Count II, Wombat alleges that PhishMe committed false advertising when it issued the "false and misleading" Press Release, in violation of the Lanham Act, 15 U.S.C. § 1125(a)(1)(B). (D.I. 18 at ¶¶ 145-56) Wombat's primary allegation is that what was false and misleading about the Press Release was that it contained statements to the effect that Wombat infringed the '948 patent, and that PhishMe had clear evidence of the same; Wombat alleges that this amounted to a "bad faith" attempt by PhishMe to "influence consumers not to purchase Wombat's products and/or to purchase PhishMe's product's instead" or to cause other harm to Wombat. (D.I. 18 at ¶¶ 148, 151-53)
The parties agree that "a bad faith standard applies to Lanham Act claims to avoid a potential conflict with federal patent laws." (D.I. 23 at 10 n.2; D.I. 27 at 2 (citing Zenith, 182 F.3d at 1353 ("[B]efore a patentee may be held liable under Section 43(a) [of the Lanham Act] for marketplace activity in support of its patent, and thus be deprived of the right to make statements about potential infringement of its patent, the marketplace activity must have been undertaken in bad faith."))) "Exactly what constitutes bad faith [in this context] remains to be determined on a case by case basis." Zenith, 182 F.3d at 1354. Nonetheless, "a clear case of bad faith exists when `the patentee knows that the patent is invalid, unenforceable, or not infringed, yet represents to the marketplace that a competitor is infringing the patent.'" Isco Int'l, Inc. v. Conductus, Inc., 279 F.Supp.2d 489, 504 (D. Del. 2003) (quoting Zenith, 182 F.3d at 1354). "By contrast, a patentee does not commit [a Lanham Act violation] when it makes representations that ultimately prove to be inaccurate, provided they make them in good faith." Id. (citing Golan v. Pingel Enter., 310 F.3d 1360, 1371 (Fed. Cir. 2002)). "In general, a threshold showing of incorrectness or falsity, or disregard for either, is required in order to find bad faith in the communication of information about the pendency of patent rights." Mikohn Gaming, 165 F.3d at 897.
For the reasons described in Section III.A.I, supra, Wombat has not pleaded facts sufficient to support a plausible inference of bad faith as to this theory of Lanham Act liability. Accordingly, the Court will recommend that PhishMe's Motion be granted as to Count II, with regard to the theory of liability in Count II premised on PhishMe's statements in the Press Release to the effect that Wombat infringed the '948 patent, and that PhishMe had clear evidence of such infringement.
For the reasons set forth above, the Court recommends that PhishMe's Motion be GRANTED-IN-PART and DENIED-IN-PART.
This Report and Recommendation is filed pursuant to 28 U.S.C. § 636(b)(1)(B), Fed. R. Civ. P. 72(b)(1), and D. Del. LR 72.1. The parties may serve and file specific written objections within fourteen (14) days after being served with a copy of this Report and Recommendation. Fed. R. Civ. P. 72(b). The failure of a party to.object to legal conclusions may result in the loss of the right to de novo review in the district court. See Henderson v. Carlson, 812 F.2d 874, 878-79 (3d Cir. 1987); Sincavage v. Barnhart, 171 F. App'x 924, 925 n.1 (3d Cir. 2006).
The parties are directed to the Court's Standing Order for Objections Filed Under Fed. R. Civ. P. 72, dated October 9, 2013, a copy of which is available on the District Court's website, located at http://www.ded.uscourts.gov.
Warner-Lamb.ert Co. v. BreathAsure, Inc., 204 F.3d. 87, 91-92 (3d Cir. 2000). Here, there are so few factUal allegations in Wombat's counterclaims that actually speak directly to this aspect of the Press Release, that the Court is unable to conclude that a Lanham Act claim based on this statement has been sufficiently pleaded. For example, there is little factual articulation in the counterclaims as to why it is that PhishMe's statement that the '948 patent "covers PhishMe's Reporter™ technologies[,]" (D.I. 18, ex. 1 at 1; see also D.I. 18 at ¶¶ 39-40, 149, 153, 156), is asserted to be material or likely to cause injury to Wombat. In light of this, the Court recommends dismissal of Count III without prejudice, only as to this particular theory of Lanham Act liability. This will allow Wombat, if it actually wishes to move forward with such a claim, to re-plead it With greater factual specificity. Cf. Keeton v. Bd. of Educ. of Sussex Tech. Sch. Dist., Civil Action No. 15-1036-LPS, 2016 WL 5938699, at *11-12 (D. Del. Oct. 12, 2016) (recommending dismissal without prejudice where the deficiencies of the plaintiffs claims "may simply go to a failtire of articlliation, not a failure to possess sufficient facts").