SUSAN OKI MOLLWAY, Chief District Judge.
Currently before the court is Defendant Keala Rodenhurst James and Lee Miller's motion to dismiss Plaintiff Property Rights Law Group's Complaint ("Motion"). The court grants the Motion with respect to the breach of contract claim and part of the statutory trade secrets claim. In all other respects, the Motion is denied.
Property Rights Law Group ("PRLG") says that it employed attorney Sandra Lynch from May 1, 2012, through April 24, 2013, to work on PRLG's cases in Illinois and Hawaii. Compl. ¶ 3. PRLG asserts that "Defendant John Kang, alias Lee Miller," as Lynch's "employee and business partner," as well as her agent, secretly worked with Lynch in violation of Lynch's employment agreement (the "Agreement") with PRLG.
PRLG alleges that James, Miller, and Lynch "conspired to breach the terms of Defendant Lynch's Agreement with PRL Group; to violate the Illinois Trade Secret Act; to violate the Computer Fraud and Abuse Act; to slander Mrs. Lynch's and Mrs. James's employer publically and with clients and to interfere with their employer's prospective economic advantage."
At the hearing, the parties disagreed over whether it was appropriate to apply Hawaii law or Illinois law with respect to Counts I, IV, and V. James and Miller contend that Hawaii law applies. Even accepting that argument, the court denies the motion with respect to those claims, without deciding the issue of choice of law.
"[T]o survive a Rule 12(b)(6) motion to dismiss, factual allegations must be enough to raise a right to relief above the speculative level, on the assumption that all the allegations in the complaint are true even if doubtful in fact."
James and Miller say that Count I is deficient because "Plaintiff merely alleges that Defendant James `worked for' PRL Group in Hawaii." Motion at 9. Defendants also say that "the complaint makes a naked allegation that `John Kang' is an `alias' for `Lee Miller' without any context."
To prevail on a claim for breach of contract, a party must prove: "(1) the contract at issue; (2) the parties to the contract; (3) whether Plaintiff performed under the contract; (4) the particular provision of the contract allegedly violated by Defendants; and (5) when and how Defendants allegedly breached the contract."
Count I is not adequately supported by factual allegations that support a breach of contract claim against James and Miller. PRLG complains that James and Miller's "actions in their pre-termination solicitation of PRL Group's clients, Defendants Lynch's and James's manner of leaving PRL Group, and their wrongful down-loading and use of confidential information all constitute clear breaches of the terms of the Agreement and of the fiduciary relationship between employer and employees." Compl. ¶ 34.
At the hearing, PRLG admitted that the Agreement in issue was only between Lynch and PRLG. PRLG argued it was nonetheless entitled to sue James and Miller for breach of contract under either a principal/agent relationship or an implied contract theory. No agency relationship is pled. The only reference to Lynch's alleged agents does not speak to whether James or Miller is or was Lynch's agent. Instead, that reference (in paragraph 39 of the Complaint) is part of the prayer for injunctive relief and states that such relief is sought against: "Defendant Lynch, her agents, servants, employees, officers, attorneys, successors and assigns, and all persons, firms, and corporations acting in connection or participation with her or on her behalf. . . ." Compl. ¶ 39(c)(3). The term "agents" in the quoted language in no way makes it clear that any Defendant is an alleged agent of a co-Defendant.
Nor is an implied contract sufficiently pled. The terms of and parties to any implied contract are not described at all.
To the extent Count I is intended to be a breach of fiduciary duty claim notwithstanding its heading, the alleged duty is not identified at all.
Under these circumstances, Count I is dismissed as to James and Miller.
Count II asserts violations of the Illinois Trade Secrets Act ("ITSA"). James and Miller claim that, while "it is unclear exactly what Defendants are alleged to have done and "what trade secrets PRLG claims to have," it is impossible for Defendants to have violated ITSA because "any information PRLG provided to Ms. Lynch or Ms. James (if any) is not and has never been sufficiently secret to satisfy the statute)." Motion at 19. In particular, responding to allegations that they "downloaded" PRLG's documents, James and Miller say that "there is no factual basis to conclude that any of the alleged `documents' `downloaded' contained trade secrets, especially since the allegations concern a law firm."
To establish trade secret misappropriation under the ITSA, a claimant must show that: "(1) a trade secret existed; (2) the secret was misappropriated through improper acquisition, disclosure, or use; and (3) the owner of the trade secret was damaged by the misappropriation."
PRLG's Complaint says that "Defendants' actions in downloading and retaining PRL Group's clients list, forensic research, draft pleadings, research library, and strategic documents" constitute a violation of ITSA. Compl. ¶ 42. James and Miller argue in their Motion that the ITSA refers to a "list of actual or potential customers" as a trade secret, but that, as a law firm, PRLG did not have "customers." Motion at 19. This court is not persuaded. Nothing about the word "customers" excludes a lawyer's clients, or, for that matter, a piano teacher's students. One does not need to call patrons "customers" to fall within the ITSA. Moreover, PRLG articulates numerous injuries, so that even if a law firm's list of clients is not covered by the ITSA, that would not defeat Count II in its entirety.
Count III asserts a violation of the Computer Fraud and Abuse Act ("CFAA"). James and Miller argue that Count III is deficient because the CFAA prohibits the intentional accessing of a
The CFAA creates a private right of action for "[a]ny person who suffers damage or loss" when an individual "intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage."
18 U.S.C. § 1030.
PRLG cites to §§ 1030(a)(2),(a)(4), and (a)(5). Violations of subsections (a)(2) and (a)(5) do not need to be pled with particularity.
It is not entirely clear which portions of the statute PRLG is relying on for the various portions of its CFAA claim. To the extent PRLG is relying on subsections (a)(2) and (a)(5), the Complaint passes muster at this stage in the proceedings. However, PRLG does not sufficiently allege circumstances constituting fraud for purposes of subsection (a)(4), and any portion of Count III brought under that portion fo the CFAA is dismissed.
Count IV states a claim for defamation. James and Miller argue that Count IV is deficient because "Plaintiff can provide no evidence that any of the documents it alleges are defamatory were read by anyone, believed by anyone, or known to be published at all."
To sustain a claim for defamation, a claimant must show: "(1) a false and defamatory statement concerning another; (2) an unprivileged publication to a third party; (3) fault amounting at least to negligence on the part of the publisher [actual malice where the plaintiff is a public figure]; and (4) either actionability of the statement irrespective of special harm or the existence of special harm caused by the publication."
PRLG attaches to the Complaint copies of the allegedly defamatory statements, which appear to have been posted on the internet. At this stage of the litigation, the court allows Count IV to proceed.
Count V asserts a claim for tortious interference with prospective business advantage. James and Miller argue that "Plaintiff has not properly alleged elements of the tort, nor provided any factual allegations sufficient to support" a claim for tortious interference with prospective business advantage. Motion at 18.
The elements this claim are:
The court dismisses Count I and the portion of Count III relating to 18 U.S.C. § 1030(a)(4). The remaining portions of Count III, as well as Counts II, IV, and V, remain for adjudication.
IT IS SO ORDERED.