DANIEL C. IRICK, Magistrate Judge.
This cause comes before the Court for consideration without oral argument on the following motions:
On July 3, 2017, Plaintiff Coll Builders Supply, Inc. filed a six-count Amended Complaint that, in Count III, contained alleged violations of the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. Doc. 27. Plaintiff alleged state law torts in Counts I, II, IV, V, and VI of the Amended Complaint. Id. The CFAA violations in the Amended Complaint gave rise to this Court's federal question jurisdiction, and the remaining state law claims came within the Court's supplemental jurisdiction.
Pursuant to Federal Rule of Civil Procedure 12(b)(6), Defendants have moved to dismiss the CFAA violations within Count III and, assuming the Court dismissed those CFAA violations, requested that the Court decline to exercise jurisdiction over the remaining state law claims and dismiss the Amended Complaint. Docs. 36; 42. Defendant Apex Tool & Fastener, Inc. moved to dismiss (Doc. 36) the Amended Complaint separately from Defendants Robert J. Velez and Rosaly Mendez Velez (collectively, the Individual Defendants) (Doc. 42).
In the Amended Complaint, within Count III, Plaintiff alleged four, separate, alternative grounds for relief under the CFAA. Specifically, Plaintiff alleged the following violations against the following Defendants:
Doc. 27 at 11-14. At the outset, it should be noted that while both § 1030(a)(2)(C) and § 1030(a)(4) may be violated by a person who acts "without authorization"
In addition, it must be noted that, in its Motion to Dismiss, Apex sought only to dismiss the CFAA violations made pursuant to § 1030(a)(2)(C) and § 1030(b). Doc. 36 at 1, 3, 5, 7-8. However, Apex is not even named in the § 1030(a)(2)(C) violation. Doc. 27 at 11. And, even if the Court construed the portions of Apex's motion to dismiss attacking the allegations related to "exceeding authorized access" also to be attacking the § 1030(a)(4) violation (which the undersigned will not do), Apex has made absolutely no argument to dismiss the § 1030(a)(5)(A) violation. Thus, if the Court were to grant the relief Apex actually requested, there would still remain two CFAA violations pending against Apex, this Court would still have subject matter jurisdiction over this case, and it would still be appropriate to exercise supplemental jurisdiction over the remaining state law claims. See Aquent LLC v. Stapleton, 65 F.Supp.3d 1339, 1346 (M.D. Fla. 2014) (in the context of a Rule 12(b)(6) motion to dismiss, analyzing each alleged violation of § 1030 as a separate violation, and dismissing one of those violations while declining to dismiss the other two).
Finally, the Defendants' requests to dismiss the remaining state law claims is contingent entirely on the Court dismissing the CFAA claims in whole — there is no assertion by any Defendant that the state law claims fail to state a cause of action. See Docs. 36; 42. With that backdrop, the undersigned will consider the pending motions to dismiss.
Because the undersigned is considering motions to dismiss made pursuant to Rule 12(b)(6), the undersigned must take as true the factual allegations in the Complaint. Specifically relevant to the CFAA violations are the following factual allegations, all of which were incorporated by reference in the CFAA violations contained within Count III (all paragraph citations are to the Amended Complaint (Doc. 27)):
Doc. 27 at 2-8.
In addition to the foregoing allegations, Plaintiff made specific allegations in Count III relevant to each of the four ways in which it alleged the Defendants violated the CFAA. Those violations including the following paragraphs (all paragraph citations are to the Amended Complaint (Doc. 27)):
Doc. 27 at 11-13.
In its motion to dismiss, Apex asserted that the § 1030(a)(2)(C) violation should be dismissed because Rodriguez had access to Plaintiff's computer systems and thus did not "exceed authorized access" and also because Plaintiff's allegations are conclusory. Doc. 36 at 3-7. Apex asserted that the § 1030(b) conspiracy claim should be dismissed because the underlying tort claim cannot proceed and also because Plaintiff's allegations are conclusory. Doc. 36 at 7-8. As noted earlier, Apex made no motion to dismiss the aspects of Count III alleging violations of § 1030(a)(4) and § 1030(a)(5)(A).
In making its first argument, Apex relied almost entirely on a discussion of "the controlling precedent in both" Allied Portables, LLC. v. Youmans, 2015 WL 3720107 (MD. Fla. June 15, 2015) and Enhanced Recovery Co., LLC v. Frady, 2015 WL 1470852 (M.D. Fla. March 31, 2015). Doc. 36 at 3-7. Apex asserted that, pursuant to those decisions, Rodriguez cannot be liable for exceeding authorized access because Plaintiff had previously granted her access to its computer systems. Id. Further, Apex claimed that, even if Rodriguez violated the CFAA, the decision in Enhanced Recovery would bar Apex from being vicariously liable for Rodriguez's violation of the CFAA. Id. at 5. Apex then asserted, without citation to authority, that Plaintiff's allegations are conclusory and fail to satisfy the special pleading requirements of Federal Rule of Civil Procedure 9(b). Doc. 36 at 7. As to the § 1030(b) conspiracy violation, Apex asserted that that violation should be dismissed because the underlying tort claim cannot proceed, and because Plaintiff's allegations in relation to the conspiracy are conclusory. Doc. 36 at 7-8.
Plaintiff responded that it appropriately alleged violations of the CFAA. Doc. 41.
In their motion to dismiss, the Individual Defendants made a generalized argument pursuant to Rule 12(b)(6), while also citing to Rule 9(b), that the CFAA violations within the Amended Complaint should be dismissed. Doc. 42 at 5-14. At one point in the motion, the Individual Defendants asserted that the sole federal claim is a "violation of 18 U.S.C. § 1030(a)(2)(C), (a)(4), and (a)(5)," without reference to the § 1030(b) conspiracy. Doc. 42 at 6. At another point, the Individual Defendants described the "one federal claim" in the Amended Complaint as an allegation that "Rodriguez, knowingly and with intent to defraud accessed [Plaintiff's] internal computer on July 20, 2016, for the benefit of" Velez and Apex — which, although not identified as such, is a reference to the elements of a violation of § 1030(a)(4). Id. at 7. But in yet another portion of the Individual Defendants' motion, they stated generally that the elements of the CFAA claim at issue are the elements of a violation of § 1030(a)(2)(C), although the elements identified by the Individual Defendants are not identified as such. Doc. 42 at 8. There is also a portion of the motion attacking the conspiracy allegation as insufficient. Id. at 12. The remainder of the motion attacked the plausibility of the allegations, and asserted that the allegations are not true. Id. at 8-14. Although § 1030(a)(5) was mentioned in passing at the outset of the Individual Defendants' motion, the Individual Defendants' motion does not contain any particular arguments attacking the sufficiency of the § 1030(a)(5)(A) allegations contained within Count III of the Amended Complaint.
Plaintiff responded that it appropriately alleged violations of the CFAA, and requested that the Court consider the arguments Plaintiff made in response to Apex's motion to dismiss. Doc. 43. In addition, Plaintiff requested that the Court not consider the Individual Defendants' factual challenges to the Amended Complaint, which, it was asserted, are best made at the summary judgment stage. Id. Finally, Plaintiff asserted that Rule 9(b) does not apply to pleading under the CFAA. Doc. 43.
In the considering a motion to dismiss, a court must view the challenged complaint in the light most favorable to the plaintiff. See, e.g., Jackson v. Okaloosa Cty., Fla., 21 F.3d 1531, 1534 (11th Cir. 1994). The court is limited in its consideration to the pleadings and any exhibits attached to those pleadings. Fed. R. Civ. P. 10(c); see also GSW, Inc. v. Long Cty., Ga., 999 F.2d 1508, 1510 (11th Cir. 1993). And the court will liberally construe a plaintiff's allegations in the complaint in the plaintiff's favor. Jenkins v. McKeithen, 395 U.S. 411, 421 (1969). But "conclusory allegations, unwarranted factual deductions or legal conclusions masquerading as facts will not prevent dismissal." Davila v. Delta Air Lines, Inc., 326 F.3d 1183, 1185 (11th Cir. 2003). As has recently been succinctly explained in this District:
Destra v. Demings, No. 6:15-cv-1143-Orl-31TBS, Doc. 46 at 3-4 (M.D. Fla. Nov. 10, 2015).
The CFAA was designed to target hackers who access computers to steal information or to disrupt or destroy computer functionality, as well as criminals who possess the capacity to "access and control high technology processes vital to our everyday lives." LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1130-31 (9th Cir. 2009) (quoting H.R. Rep. 98-894, 1984 U.S.C.C.A.N. 3689, 3694 (July 24, 1984)). The CFAA is primarily a criminal statute, but also provides a private right of action to "[a]ny person who suffers damage or loss by reason of a violation of this section," who "may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief." 18 U.S.C. § 1030(g).
"The CFAA defines seven categories of conduct that can give rise to civil or criminal liability. . . ." Trademotion, LLC v. Marketcliq, Inc., 857 F.Supp.2d 1285, 1289-90 (M.D. Fla. 2012) (citing 18 U.S.C. § 1030(a)(5)(C)). Those seven categories of conduct are contained within § 1030(a)(1) through (7). The first category of conduct relevant here is prohibited by the CFAA in § 1030(a)(2)(C), which provides that whoever "intentionally accesses a computer without authorization or exceeds authorized access and thereby obtains . . . information from any protected computer" commits an offense. Second, § 1030(a)(4) provides that whoever "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value" also commits an offense. Third, one who "knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage to a protected computer" commits an offense under § 1030(a)(5)(A). Finally, while a criminal defendant may be held liable for attempting or conspiring to commit a violation of one of those seven subsections, § 1030(b), it remains a somewhat unsettled question of law as to whether a civil defendant may be held liable for attempting or conspiring to violate the CFAA. See Agilysys, Inc. v. Hall, ___ F. Supp. 3d ___, 2017 WL 2903364, at *4 (N.D. Ga. May 25, 2017) (dismissing a § 1030(b) conspiracy violation in a civil complaint for a failure to state a claim, and also citing to authority suggesting that such a conspiracy may not be a viable claim in a civil action).
To establish civil liability under the CFAA, a plaintiff must make an additional showing: "A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(I)." 18 U.S.C. § 1030(g). As relevant here, in order to establish civil liability, a plaintiff must show that a defendant violated subsection (I) by causing "loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value." 18 U.S.C. § 1030(c)(4)(A)(i)(I). Such losses are limited to economic damages, 18 U.S.C. § 1030(g), and may include "any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service." 18 U.S.C. § 1030(e)(11).
In the Amended Complaint, Plaintiff attempted to allege three substantive violations of the CFAA and one conspiracy violation. The undersigned will consider the substantive violations first, and then the conspiracy violation. Ultimately, the undersigned finds that Plaintiff has sufficiently alleged substantive violations of the CFAA, but that the conspiracy violation made pursuant to § 1030(b) is insufficient and should be dismissed.
As to the substantive violations (i.e., the violations of 18 U.S.C. § 1030(a)(2)(C), (a)(4), and (a)(5)(A)), the undersigned finds that Plaintiff has made specific, detailed factual allegations that address each element of those violations. Indeed, the undersigned has taken the somewhat unusual step of block-quoting much of the Amended Complaint in this report for the simple reason that the factual allegations stand on their own, and state appropriately specific and detailed factual allegations to support the alleged violations. See supra (quoting Doc. 27 at 2-8, 11-13). And thus there is no basis for Defendants' arguments that the allegations within the Amended Complaint are conclusory or lack plausibility.
Specifically, as to Rodriguez (who it is alleged violated each substantive provision at issue in the Amended Complaint), it was alleged that Plaintiff maintained computer systems that housed valuable commercial information; that those computer systems were connected to the Internet and thus were protected computers under the CFAA; that Rodriguez had authorized access to those computer systems while she was employed by Plaintiff; that Rodriguez's employment with Plaintiff ended; that Rodriguez's authorized access to Plaintiff's computer systems was terminated when her employment ended; that Rodriguez knew she no longer had authorized access to Plaintiff's computer systems, both because she had enforced such a policy in the past on behalf of Plaintiff and because Plaintiff affirmatively told her so; that, thereafter, Rodriguez accessed Plaintiff's computer systems without authorization; and, in doing so, Plaintiff obtained something valued in excess of $5,000.00 (i.e., information), and intentionally caused in excess of $5,000.00 in damage to Plaintiff's computer systems. Doc. 27 at 2-8, 11-13. Finally, it is alleged that Rodriguez acted knowingly and with an intent to defraud. Id. at 11-13. Those factual allegations (concerning which the Amended Complaint has additional, factual elaboration) are sufficient to establish that Rodriguez violated each of 18 U.S.C. § 1030(a)(2)(C), (a)(4), and (a)(5)(A).
The Defendants also attacked Rodriguez's liability for the substantive violations on the basis that the decisions in Allied Portables and Enhanced Recovery, undercut Plaintiff's overall legal theory in the Amended Complaint. Defendants' reliance on those cases is entirely without merit for a number of reasons. First, the decisions in Allied Portables and Enhanced Recovery involved cases in which an employee used their authorized access — while employed — to obtain information for a nefarious, and otherwise "unauthorized," purpose. Allied Portables, 2015 WL 3720107, at *2; Enhanced Recovery, 2015 WL 1470852, at *1-2. The courts in those decisions made findings that such conduct did not fall within the purview of the CFAA; findings that are in line with the "narrow" interpretation of "exceeding authorized access" under the CFAA. Allied Portables, 2015 WL 3720107, at *3-7; Enhanced Recovery, 2015 WL 1470852, at *2. As noted by Plaintiff in its responses, the issue of a "broad" versus a "narrow" interpretation of "exceeding authorized access" under the CFAA is an ongoing debate and the subject of a split amongst federal courts, and the undersigned expresses no position on that issue at this time, because deciding that issue is not necessary to determining the motions before the Court. See Agilysys, Inc. v. Hall, ___ F. Supp. 3d ___, 2017 WL 2903364, at *4 (N.D. Ga. May 25, 2017) ("The Court recognizes the split in this District as well as across the Circuits regarding the broad and narrow views of the CFAA and the use of information versus the access to information.") (collecting cases); compare Enhanced Recovery, 2015 WL 1470852, at *2 (following the "narrow" interpretation), with Aquent LLC v. Stapleton, 65 F.Supp.3d 1339, 1346 (M.D. Fla. 2014) (following the "broad" interpretation).
Here, the only substantive violations in the Amended Complaint that involve the "exceeding authorized access" language are the alleged violations of § 1030(a)(2)(C) and § 1030(a)(4). Doc. 27 at 11-12. However, a defendant can also violate those sections if the access at issue is simply "unauthorized." In the Amended Complaint, Plaintiff alleges that Rodriguez's accesses was "unauthorized" under the CFAA, and alleges specific facts in support of that allegation — specifically, that Rodriguez was terminated, knew she no longer had authorized access to Plaintiff's computer systems, and nevertheless knowingly, intentionally, and with intent to defraud accessed those computer systems to steal information and do damage. Doc. 27 at 2-8, 11-13. Thus, liability in this case, as alleged in the Amended Complaint, does not hinge on whether Rodriguez, while employed with Plaintiff, exceeded her authorized access.
In addition, in reliance upon Enhanced Recovery, Apex asserted that it cannot be held vicariously liable for Rodriguez's violation of § 1030(a)(2)(C) of the CFAA. Doc. 36 at 5. Again, Plaintiff did not allege in the Amended Complaint that Apex violated § 1030(a)(2)(C) of the CFAA. Doc. 27 at 11-12. Nonetheless, the undersigned agrees with Plaintiff that Apex's reading of Enhanced Recovery is incorrect. Indeed, as explained by Plaintiff, the report and recommendation in Enhanced Recovery, which report ultimately was not adopted by the district judge, found that the CFAA supported a theory of vicarious liability. Enhanced Recovery Co., LLC v. Frady, No. 3:13-CV-1262-J-34JBT, 2015 WL 1470839, at *6 (M.D. Fla. Jan. 20, 2015), report and recommendation adopted in part, rejected in part, 2015 WL 1470852 (M.D. Fla. Mar. 31, 2015). When the district judge rejected the report and recommendation, the rejection was on the basis of the issue (already addressed supra) concerning the "broad" versus "narrow" interpretation of "exceeds authorized access." Enhanced Recovery, 2015 WL 1470852, at *6-11. The rejection had nothing to do with the magistrate judge's discussion of vicarious liability under the CFAA. Id. In fact, as the Plaintiff's note in their response, the district judge in Enhanced Recovery stated in a footnote that the court did "not necessarily disagree with the proposition that a third party could be held vicariously liable for directing a person to exceed authorized access to a protected computer." 2015 WL 1470852, at n.10. And in the report and recommendation in Enhanced Recovery, the magistrate judge noted several cases supporting such vicarious liability with which, as did the magistrate judge in that case, the undersigned agrees. Enhanced Recovery, 2015 WL 1470839, at *6 (citing Binary Semantics Ltd. v. Minitab, Inc., 2008 WL 763575, at *5 (M.D. Pa. Mar. 20, 2008) ("[T]he complaint sufficiently alleges that defendant Asha was acting at the direction of Minitab when she allegedly accessed plaintiff's protected computer and stole plaintiff's trade secrets. Therefore, we conclude that Minitab may be held liable for the CFAA violation.") and Se. Mech. Servs. v. Brody, 2008 WL 4613046, at *14 (M.D. Fla. Oct. 15, 2008) ("Where a new employer seeks a competitive edge through the wrongful use of information from the former employer's computer system, plaintiff will likely win on the merits of a CFAA claim.")); see also NetApp, Inc. v. Nimble Storage, Inc., 41 F.Supp.3d 816, 835 (N.D. Cal. 2014) ("As to vicarious liability, courts have held that an employer can be vicariously liable for an employee's violations of the CFAA if those transgressions occur in the scope of employment or the employer directs the employee's conduct."); but see, e.g., Doe v. Dartmouth-Hitchcock Med. Ctr., 2001 WL 873063, at *5 (D.N.H. July 19, 2001) ("Expanding the private cause of action created by Congress to include one for vicarious liability against persons who did not act with criminal intent and cannot be said to have violated the statute . . . would be entirely inconsistent with the plain language of the statute.").
Here, Plaintiff alleged in the Amended Complaint that Apex is vicariously liable for Rodriguez's violations of the CFAA, stating explicitly that Apex is liable for Rodriguez's violations of § 1030(a)(4) and § 1030(a)(5)(A). Doc. 27 at 12-13. In support, Plaintiff alleged that "APEX is vicariously liable for Rodriguez' CFAA violations because it explicitly or implicitly took part in, encouraged, directed, induced and/or benefitted from Defendant Rodriguez' access of Plaintiff's protected computer systems." Id. at 13. Further, Plaintiff made factual allegations in various parts of the Amended Complaint that: Apex was a direct competitor of Plaintiff; Apex aggressively recruited Velez, who ended his employment with Plaintiff on July 11, 2016 and immediately began using Plaintiff's confidential information to benefit Apex; Rodriguez ended her employment with Plaintiff on July 11, 2016 and immediately began working for Apex as well; thereafter, Rodriguez accessed Plaintiff's computer systems and stole confidential information and caused damage in a way that would benefit Apex and harm Plaintiff, including by altering work orders and invoices that caused Plaintiff's clients to pay Velez on behalf of Apex, and altering and deleting data from Plaintiff's computer systems so that Apex would receive Plaintiff's customers' business; Rodriguez currently works for Apex; "APEX directly or indirectly took part in, encouraged, directed, induced and/or benefitted from both Rodriguez' and Velez' efforts to obtain Plaintiff's trade secrets, alter Plaintiff's computerized documents and data, and steal Plaintiff's money and clients"; and APEX continues to benefit financially from the wrongful use of Plaintiff's information. Doc. 27 at 2-8, 11-14. The undersigned finds that those allegations, taking the Amended Complaint as a whole, are sufficient to allege that Apex is vicariously liable for Rodriguez's violations of § 1030(a)(4) and § 1030(a)(5)(A), and that such vicarious liability is a viable theory under the CFAA.
Finally, as to the substantive violations of the CFAA, Defendants asserted, without legal support, that the alleged violations of the CFAA at issue here are subject to the heightened pleading standard of Rule 9(b). To the contrary, as identified by Plaintiff, the case law indicates that, despite the title "Computer Fraud and Abuse Act," Rule 9(b) does not apply to violations brought under the CFAA. Further, only one alleged violation at issue in the Amended Complaint even involves, as an element, an "intent to defraud" — the alleged violation of § 1030(a)(4). And even in regards to the § 1030(a)(4) violation, courts have found that Rule 9(b)'s heightened pleading standard does not apply. See NetApp, Inc. 41 F. Supp. 3d at 833 (distinguishing violations of § 1030(a)(2)(C) and § 1030(a)(5), which involve no element of an intent to defraud, from § 1030(a)(4) violations, which do involve an intent to defraud, but nonetheless finding that Rule 9(b) does not apply to any of those violations). Here, even if Rule 9(b) did apply, the undersigned finds that the allegations contained within the Amended Complaint "state with particularity the circumstances constituting fraud," understanding that "intent, knowledge, and other conditions of a person's mind may be alleged generally." Recently, a district court in this Circuit, faced with a similar issue, came to a similar conclusion:
Agilysys, 2017 WL 2903364, at *5-6. Here, the specific factual allegations include details of the exact date of the alleged fraud, the alleged perpetrator, the nature of the information obtained, stolen and damaged, the allegedly fraudulent purpose for which the information was obtained, stolen and damaged (including the intent of the alleged perpetrator), the value of the information obtained, stolen and damaged, and the reason for its value, amongst other things. Doc. 27 at 2-8, 11-13. As alleged, the Amended Complaint satisfies Rule 9(b) and reasonably notifies Defendants of the alleged fraud. Thus, it is unnecessary for this Court to decide explicitly the issue of whether Rule 9(b) actually applies to the CFAA violations at issue in the Amended Complaint.
In relation to the alleged conspiracy in violation of § 1030(b), the undersigned finds that the allegations contained within the Amended Complaint are insufficient. In the Amended Complaint, Plaintiff asserted that Apex, Rodriguez, and Velez were involved in a conspiracy on the basis of the following allegations:
Doc. 27 at 13-14.
The crux of a conspiracy is an agreement to violate the law. See Agilysys, 2017 WL 2903364, at *6 (explaining that a "claim under section [1030](b) requires evidence of an agreement and common activities in furtherance of the unlawful act.") (quoting Welenco, Inc. v. Corbell, 126 F.Supp.3d 1154, 1176 (E.D. Cal. 2015) (collecting various cases holding the same and citing Trademotion, 857 F. Supp. 2d at 1294). Here, Plaintiff has made an allegation that a conspiracy existed, but Plaintiff has not pled facts supporting that legal allegation, and specifically has not pled facts that allege an agreement to violate the law. Even assuming that the factual allegations set forth in the Amended Complaint are true, factual allegations that two co-workers (Rodriguez and Velez) left an employer at the same time, and one's illegal activity benefited another, are not sufficient to establish — or plead — the existence of a conspiracy.
In addition, the conspiracy allegation fails because the Amended Complaint does not state the object of the conspiracy. Where, as here, there are various, separate theories of § 1030(a) stated as substantive violations, a single, general § 1030(b) allegation of a conspiracy, without a reference to the objects of that conspiracy (by relevant factual allegations or even through citation), fails to put Defendants on notice of what it is that Plaintiff alleges they conspired to do.
Further, and also because there are no factual allegations supporting an agreement, there are no factual allegations concerning who agreed with whom and, more importantly, who at Apex agreed with Rodriguez, resulting in liability for Apex as a conspiring business entity. A corporation can only act through its employees and agents. Assuming — as the undersigned finds — that the factual allegations are insufficient to establish Velez as a co-conspirator of Rodriguez, Apex cannot be held to have conspired with Rodriguez if Rodriguez is the only individual conspirator and the one acting on behalf of Apex — one cannot conspire with themselves. See McAndrew v. Lockheed Martin Corp., 206 F.3d 1031, 1036 (11th Cir. 2000) (explaining, in the context of the intracorporate conspiracy doctrine, that "just as it is not legally possible for an individual person to conspire with himself, it is not possible for a single legal entity consisting of the corporation and its agents to conspire with itself").
Thus, for all of the foregoing reasons, the § 1030(b) violations fails the basic pleading standard of Rule 8(a) that requires Plaintiff make "a short, plain statement of the claim showing the pleader is entitled to relief." See Trademotion, 857 F. Supp. 2d at 1289-90 (recommending dismissal of § 1030(b) conspiracy due to insufficient factual allegations to establish a "knowing agreement with another to commit [an] unlawful act"). Accordingly, it is recommended that the Court dismiss Count III to the extent that it alleges a conspiracy in violation of § 1030(b). If this recommendation is adopted, it would result in there being no claim for relief under the CFAA against Velez, as he is only alleged to have violated the CFAA by conspiring to violate that statute.
The only basis to dismiss the state law claims set forth in the motions to dismiss was the argument that, if the Court dismisses the CFAA claims as a whole, then the Court should decline to exercise supplemental jurisdiction over the remaining state law claims. Doc. 36 at 8-9; 42 at 14-15. If the undersigned's recommendation is adopted as to the CFAA claims, and the federal claims remain as to Apex and Rodriguez, then it is respectfully recommended that the Court retain supplemental jurisdiction over the remaining state law claims, including those against Velez.
If the recommendation is not adopted as to the CFAA claims, and the Court dismisses the CFAA claims in their entirety, then the undersigned respectfully recommends that the Court should decline to exercise jurisdiction over this case and dismiss without prejudice the remaining state law claims, such that Plaintiff can file its action in state court.
Accordingly, it is respectfully