SARA DARROW, UNITED STATES DISTRICT JUDGE.
Fidlar Technologies ("Fidlar") sued LPS Real Estate Data Solutions, Inc. ("LPS") under the civil-suit provision of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030(g), and under the civil-suit provision the Illinois Computer Crime Prevention Law ("CCPL"), 720 ILCS 5/17-51 (2011). Fidlar also alleged a common law trespass to chattels claim. Am. Compl. 11-14; ECF No. 31-1. LPS counter-claimed for various forms of tortious interference and sought declaratory and injunctive relief. Am. Counterclaim 13-30; ECF No. 19. The dispute between the parties rests on LPS's method of accessing real estate information that Fidlar helps counties digitize and make available online. Before the Court are LPS's Motion for Summary Judgment and Request for Oral Argument, ECF No. 77, and LPS's Alternative Motion for Partial Summary Judgment on Certain of Fidlar's Claims for Damages and Request for Oral Argument, ECF No. 79. For the following reasons, Fidlar's Motion for Summary Judgment is GRANTED. Because the Court grants this motion in its entirety, LPS's motion for partial summary judgment is MOOT.
Fidlar is a technology company that creates and licenses software to the county offices that maintain land records. Some of this software helps counties digitize their paper records by scanning images of the documents and indexing these images. Some of the software allows counties to make these records available over the internet. If counties wish to make the records available online, they can either host them on their own servers, or contract with Fidlar to host them on its servers. During the time period relevant to this case, the hosting of records using either method was accomplished using a group of software components, collectively called "Laredo," created by Fidlar.
Laredo consisted of a database which stored the index and image data gathered from paper land records; a "middle tier"; and a user interface contained in a client.
Fidlar made the client available on its website for people interested in accessing county land records. By downloading the client, remote users could download and view on their own computers land record information that counties had digitized. Regardless of whether Fidlar or the counties hosted the land record information, that information remained the property of the counties who granted users access to the information, often via written agreement and sometimes for a fee. Fidlar was not a party to these agreements. The client did contain an End User License Agreement ("EULA"), written by Fidlar, that was packaged with the client software and was made available to users. In order to use the client, users had to accept the EULA's terms and conditions. See Fidlar Technologies Laredo End User License Agreement, Mem. Supp. Mot. Summ. J. Ex. 15, ECF No. 78-15.
LPS is a real estate data analytics company that gathers and sells information about real property.
LPS's preferred method of getting access to land records digitally, in non-Fidlar counties, was via file transfer protocol or some other means by which records could be grabbed en masse. For reasons that the parties dispute, but at the very least, to speed up the process of accessing and analyzing land records, LPS developed its own method of retrieving images through the middle tier in each of the Fidlar counties.
Whether by accident, design, or indifference, the LPS client's SOAP calls lacked the data necessary for the middle tier to track usage minutes on LPS's account, or to determine whether LPS had used the functionality of the Laredo client that permitted users to print documents they had downloaded. Thus, although LPS was generating many calls and downloading many land records, Fidlar and the counties contracting with it saw LPS's account as not logging any minutes, and not having printed any land records. There is no evidence that this volume of requests or their content hindered the operation of Fidlar or county servers.
Eventually, Fidlar and the counties discovered LPS's improvised method of accessing the middle tier, and litigation followed. Fidlar filed suit on March 11, 2013. ECF No. 1. LPS moved to dismiss, ECF Nos. 6, 35, filed a counterclaim, ECF No. 8, and moved for a temporary restraining order and preliminary injunction, ECF No. 9, to stop Fidlar from communicating negative things about LPS to certain counties. On November 8, 2013, the Court issued an order, ECF No. 42, denying the motion to dismiss and the motion for temporary restraining order and preliminary injunction. LPS moved for summary judgment on December 1, 2014. After the close of discovery, there was some dispute between the parties about the admissibility of evidence, particularly with respect to the report and testimony of one of Fidlar's experts, Dr. Ouri Wolfson, ECF No. 76-7, which LPS argued, ECF No. 75, had been untimely disclosed. On December 14, Magistrate Judge Hawley ruled that Fidlar could use Dr. Wolfson solely as a rebuttal expert against LPS's expert. Dec. 17, 2014 Hr'g Tr. 19-25, ECF No. 86-1.
Summary judgment is the "put up or shut up moment in a lawsuit, when a party must show what evidence it has that would convince a trier of fact to accept its version of events." Johnson v. Cambridge Indus., Inc., 325 F.3d 892, 901 (7th Cir.2003) (internal quotation marks omitted). A court should grant summary judgment "if the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law." Fed. R. Civ. P. 56(a).
At the summary judgment stage the court's function is not to weigh the evidence and determine the truth of the matter but to determine whether there is a
The movant in a summary judgment motion bears the initial burden of production—pointing the court to the materials in the record that "demonstrate the absence of a genuine issue of material fact" for trial. Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). Where the nonmovant bears the ultimate burden of persuasion on a particular issue, however the requirements on the movant are "not onerous," and "may be discharged by showing—that is, point[ing] out to the district court—that there is an absence of evidence to support the nonmoving party's case." Modrowski v. Pigatto, 712 F.3d 1166, 1168 (7th Cir. 2013) (internal quotation marks omitted). Once the movant discharges her burden, the burden shifts to the nonmovant to "make a showing sufficient to establish the existence of an element essential to that party's case." Celotex, 477 U.S. at 322, 106 S.Ct. 2548. To satisfy this burden, a nonmovant must "go beyond the pleadings. . . to demonstrate that there is evidence upon which a jury could properly proceed to find a verdict in her favor." Modrowski, 712 F.3d at 1169 (internal quotation marks omitted). "A plaintiff may not defeat the defendant's properly supported motion for summary judgment without offering any significant probative evidence tending to support the complaint." Tri-Gen Inc. v. Int'l Union of Operating Engineers, Local 150, AFL-CIO, 433 F.3d 1024, 1038 (7th Cir.2006) (internal quotation marks omitted).
LPS moves for summary judgment on all three counts of Fidlar's Amended Complaint: Fidlar's CFAA claim, Am. Compl. 11-13, Mem. Supp. Mot. Summ. J. 27-40; Fidlar's CCPL claim, Am. Compl. 13-14, Mem. Supp. Mot. Summ. J. 40-44; and Fidlar's trespass to chattels claim, Am. Compl. 14, Mem. Supp. Mot. Summ. J. 44-45. The Court addresses each claim individually below.
The CFAA, enacted in 1984, is "primarily a criminal statute designed to combat hacking." WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199, 201 (4th Cir.2012). However, it grants the right to maintain a civil action to "[a]ny person who suffers damage or loss by reason of a violation of this section." 18 U.S.C. § 1030(g). Two provisions of the CFAA are relevant here. The first, § 1030(a)(4), applies to anyone who knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period[.] 18 U.S.C. § 1030(a)(4). The second, § 1030(a)(5)(A) applies to anyone who "knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally
Relevant to these subsections are several definitions the statute supplies. A "computer" is "an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions." 18 U.S.C. § 1030(e)(1). A "protected computer" is any computer "which is used in or affecting interstate or foreign commerce or communication." Id. § 1030(e)(2)(B). "Exceeds authorized access" means "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." Id. § 1030(e)(6). "Damage" is "any impairment to the integrity or availability of data, a program, a system, or information." Id. § 1030(e)(8). "Loss" is "any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service." Id. § 1030(e)(11).
As a preliminary matter, the parties dispute what sections of the CFAA Fidlar may seek relief under at this phase of the proceedings.
In its Memorandum in Support of Motion for Summary Judgment, LPS states that Fidlar "specifically bases its CFAA claim on Section 1030(a)(5)(A)," Mem. Supp. Mot. Summ. J. 27, and cites to the Court's remark, in its Order denying dismissal, that "the specific section [of the statute] that Fidlar invokes (§ 1030(a)(5)(A)) requires damage to a protected computer," Order Mot. Dismiss 14. In a footnote, LPS states that Fidlar in fact did mention a claim under § 1030(a)(4) in its briefing on the motion to dismiss, but did so in a footnote "[p]resumably to hedge its bets." Mem. Supp. Mot. Summ. J. 27 n.20. LPS argues that there is, in any event, insufficient evidence in the record to support a claim under § 1030(a)(4).
In its Response, Fidlar counters that it originally made and seeks now to maintain a claim under § 1030(a)(4), because its Amended Complaint "broadly alleges a violation of 18 U.S.C. § 1030 without limiting its claim to a particular section of the CFAA," Resp. Mot. Summ. J. 67. Fidlar offers to "hereby [clarify] for this Court that it is claiming a violation of both (a)(4) and (a)(5)(A) of the CFAA." Id. Fidlar duly proceeds to argue that there is support in the record to sustain claims under both subsections.
A review of the Amended Complaint shows that Fidlar did broadly plead a violation of 18 U.S.C. § 1030, without naming any subsection. Am. Compl. 11. Furthermore, Fidlar also pleaded damages "in excess of $5,000 in the past calendar year," id. at 12, as required to maintain a private action under § 1030(g), and was obviously seeking to invoke the statute's civil-suit provision.
Although the Court and LPS treated Fidlar's claim as restricted to § 1030(a)(5)(A) at the motion to dismiss phase, none of Fidlar's possible claims were thereby foreclosed—the motion to dismiss, apparently only as to claims under § 1030(a)(5)(A), was denied, and Fidlar's other claims under § 1030 have survived up to this point. Fidlar may argue, in opposition to the Motion for Summary Judgment, as many viable theories of liability under § 1030 as it can sustain, and it has clarified for the Court that in its view, there are two: one arising under § 1030(a)(4) and one under § 1030(a)(5)(A).
In order to maintain a claim under 18 U.S.C. § 1030(a)(4), Fidlar must show that LPS acted knowingly and with intent to defraud, accessed a protected computer without authorization or exceeding authorized access, furthered the intended fraud by means of this conduct, and obtained anything of value (unless that value was less than $5,000 in a one-year period). 18 U.S.C. § 1030(a)(4). The Court addresses only the intent to defraud here because, as explained below, there is no evidence in the record upon which a jury could find for Fidlar on this element.
The Seventh Circuit has determined that to act with intent to defraud means to act "willfully and with specific intent to deceive or cheat, usually for the purpose of getting financial gain for one's self or causing financial loss to another." United States v. Henningsen, 387 F.3d 585, 590-91 (7th Cir.2004) (quoting United States v. Moede, 48 F.3d 238, 241 (7th Cir.1995)). The act of fraud allegedly intended here is the digital copying of land records belonging to the counties in such a way as to evade logging detectable time during access, and to evade the print fee some counties charged.
As a moving party who will not bear the burden of proof at trial, LPS needs to show "that there is an absence of evidence to support the nonmoving party's case." Modrowski, 712 F.3d at 1168. Here, this means an absence of evidence that LPS acted knowingly and with intent to defraud by downloading land records without paying print fees it would otherwise incur. In order to make this showing, LPS points out that its behavior—using its custom client in all Fidlar counties, not just those where it might evade a print fee by doing so—is inconsistent with an intent to use the client to avoid paying print fees. Mem. Supp. Mot. Summ. J. 27 n. 20. If the aim of the client was to defraud counties that charged print fees,
LPS points to sufficient evidence in the record to support these contentions. It cites the deposition of Erick Marroquin, a former Senior Vice President at LPS and Rule 30(b)(6) witness, which reads in relevant part:
Marroquin 30(b)(6) Dep. 185:6-17, ECF No. 78-3. LPS also points to the deposition of Scott Moore, Fidlar's Vice President of Sales and Marketing, who indicated that Fidlar did not share in any of fees that counties might charge for printing documents, Moore 30(b)(6) Dep. 73:8-10, ECF No. 78-2. While the latter record materials appear to bear only on Fidlar's stake in print fees, the former clearly indicates that, from LPS's perspective, paying for unlimited minutes entitled the company to download the images without printing them and thus without paying the fee that Fidlar alleges was fraudulently evaded.
Illuminating Marroquin's testimony is one of the paragraphs of LPS's amended counterclaim, the answer to which LPS cites in its motion for summary judgment as to Fidlar's § 1030(a)(4) claim. The paragraph reads:
Fidlar's Answer to LPS's Am. Counterclaim ¶ 16. This paragraph explains the essential nature of LPS's intentions toward the land record files that it first downloaded and viewed in Fidlar's client, and then in its own.
By pointing to evidence in the record supporting the inference that it had no fraudulent intent, and by citing to depositions asserting its non-fraudulent intent, LPS has met its initial burden of production, and preliminarily "demonstrate[d] the absence of a genuine issue of material fact" for trial. Celotex, 477 U.S. at 323, 106 S.Ct. 2548. It now lies with Fidlar to "demonstrate that there is evidence upon which a jury could properly proceed to find a verdict in [its] favor" on the element of intent to defraud. Modrowski, 712 F.3d at 1169 (internal quotation marks omitted).
In support of its position, Fidlar first tries to contend that "[w]hether LPS acted with an intent to defraud by replacing the Laredo Client with its own client is a material fact under section (a)(4) that remains in dispute." Resp. Mot. Summ. J. 68. Fidlar is mistaken. The intent to defraud is not a material fact, but rather an element of the offense upon which Fidlar bears the ultimate burden of proof. Fidlar must now point to material facts to "make a showing sufficient to establish the existence" of that element. Celotex, 477 U.S. at 322,106 S.Ct. 2548.
To make this showing, Fidlar first observes that there is evidence suggesting "LPS knew that its web-harvester allowed it to search county databases and download images of documents without its usage being tracked." Resp. Mot. Summ. J. 68. There certainly is evidence to support this contention; Fidlar cites to several invoices it generated on behalf of the counties and sent to LPS showing extensive usage time and in some cases a few print fees, followed by a total disappearance of usage time and print fees after a certain point in 2012.
Fidlar next suggests that LPS's payment for "unlimited" minutes in some counties is irrelevant, because depositions of some county officials indicate that the counties' interpretation of the contracts with LPS differed from LPS's on the question of what exactly LPS had bought by paying for "unlimited minutes." Resp. Mot. Summ. J. 69. Specifically, Fidlar suggests that some counties thought their agreements with LPS required LPS to use Fidlar's client. Id. However, LPS's payment for the maximum amount of time available in each county, coupled with its statements that it believed this entitled it to access files in the way that it did, is relevant in that it is probative of a lack of intent to defraud.
Fidlar points to no other material in the record suggesting that it could carry its burden of proof at trial. While intent to defraud can be proven by circumstantial evidence, Moede, 48 F.3d at 241, Fidlar has pointed to no evidence in the record, circumstantial or otherwise, that LPS had the intent to defraud any of the counties or Fidlar itself. Summary judgment is proper against Fidlar's claim under 18 U.S.C. § 1030(a)(4) because Fidlar cannot present a sufficient showing to establish the existence of fraudulent intent.
In order to maintain a claim under § 1030(a)(5)(A), Fidlar must show that LPS knowingly caused the transmission of a program, information, code, or command, and that as a result of that conduct LPS intentionally caused damage to a protected computer without authorization. 18 U.S.C. § 1030(a)(5)(A). The Court addresses only whether LPS intentionally caused damage to a protected computer because there is no evidence in the record upon which a jury could find for Fidlar on this element.
It is undisputed that the computers in question here are (1) the Fidlar servers running the middle tier that LPS accessed, and (2) potentially any servers owned by the counties running the middle tier. See Noe 30(b)(6) Dep. 25:15-19. Damage is broadly defined under the CFAA as "any impairment to the integrity or availability of data, a program, a system, or information." § 1030(e)(8). However, access to or disclosure of information on remote servers is generally not understood in the Seventh Circuit as "damage" within the meaning of the statute. Landmark Credit Union v. Doberstein, 746 F.Supp.2d 990, 993 (E.D.Wis.2010) ("[S]eemingly every court in this circuit that has interpreted the meaning of the word `damage' in the CFAA has held that `damage' does not encompass harm from the mere disclosure of information" (internal quotation marks omitted) (collecting cases)). This reflects the aim of the CFAA's drafters to punish those who access computers with the intention of deleting, destroying, or otherwise
The damage alleged here is the use of LPS's client in such a way as to avoid minutes being logged or prints accounted for.
In response, Fidlar does not point to any other information in the record supporting its contention that LPS caused damage; rather, it argues that because LPS's client did not log minutes or provide print data, it "prevented Laredo from functioning as a revenue generation mechanism for the counties." Resp. Mot. Summ. J. 76. Thus, Fidlar does not argue that there exist disputed issues of material fact or other record material supporting the claim that damage was done to a protected computer, but rather attempts to assert that the behavior all parties agree occurred, as a matter of law, qualifies as "damage" within the meaning of § 1030(a)(5)(A). However, it does not.
The harm that Fidlar alleges is far more akin to the theft of trade secrets than it is to the disruption or destruction of information. The damage Fidlar points to, essentially, is that LPS may have evaded some of the fees it might otherwise have been liable for (ignoring the fact that LPS always paid the monthly access fees). This is not damage within the meaning of the statute; it is not damage or loss to information or the means by which information is kept. It is a far cry from a defendant "smash[ing] a hard drive with a hammer." Motorola, 609 F.Supp.2d at 769. And Fidlar's claim that in accessing the middle tier with a client of its own devising, LPS compromised the "completeness or usability" of the "Laredo system," Resp. Mot. Summ. J. 76, is almost metaphysical in its abstraction. To even make sense, the claim requires the Court to construe database, middle tier, and client all as one "system" within the meaning of
Such an interpretation does not comport, however, with the way that courts have consistently understood the term "system" in CFAA litigation, as a discrete program or database running on a computer or group of computers owned and operated by a single entity. See Citrin, 440 F.3d at 420 (discussing different types of damage including "attacks by disgruntled programmers who decide to trash the employer's data system on the way out" (emphasis added)); Farmers Ins. Exch. v. Auto Club Grp., 823 F.Supp.2d 847, 852 (N.D.Ill.2011) ("[M]ere copying of electronic information from a computer system is not enough to satisfy the CFAA's damage requirement." (emphasis added)); George S. May Int'l Co. v. Hostetler, No. 04 C 1606, 2004 WL 1197395, at *4 (N.D.Ill. May 28, 2004) ("We see no principled reason. . . why infringement of copyrighted material taken from a protected computer system would not qualify as impairment of the integrity of the copyrighted information." (emphasis added)). If followed, Fidlar's proposed understanding of "system" for purposes of CFAA damage would mean that damage results and liability may follow anytime a software developer's program, designed to communicate with another of its programs, is communicated with by other software in a way unexpected by the developer. This is an absurd result.
Neither the bare act of accessing the middle tier without using Fidlar's client, nor the generation of SOAP calls that failed to contain usage and print information, are "damage" under § 1030(a)(5)(A). LPS is entitled to judgment on the § 1030(a)(5)(A) claim as a matter of law.
The Computer Crime Prevention Law, like the CFAA, is primarily a criminal statute with a civil-suit provision. Subsection (c) of the statute states, "Whoever suffers loss by reason of a violation of subdivision (a)(4) of this Section may, in a civil action against the violator, obtain appropriate relief." Subdivision (a)(4) in turn provides, in relevant part:
720 ILCS 5/17-51(a)(4). Relevantly, the term "program" under the CCPL is to be
Because Fidlar cannot show that there is a genuine issue for trial as to (a)(4)—whether LPS inserted a program knowing or having reason to know that the program would cause one of the enumerated effects—the Court does not address the other required elements of computer tampering.
LPS makes two arguments as to why it did not insert a computer program into Fidlar's servers knowing that it would cause enumerated damages. First, it claims that the SOAP calls were not a "program" within the meaning of the statute. "Rather than inserting a program, LPS simply used its own client to communicate with Fidlar's servers." Mem. Supp. Summ. J. 41. To support this assertion, LPS points to the absence of record evidence that LPS "inserted" any software between Fidlar's client and its servers, performed an "SQL insertion,"
While it comports with common sense to contend that merely communicating with Fidlar's servers was not "inserting a program," the meaning of "program" under the CCPL is so broad that LPS has not met its burden of production with respect to the program-status of the SOAP calls. That is, LPS has not pointed to record material suggesting that the SOAP calls were not "a series of coded instructions or statements in a form acceptable to a computer," 720 ILCS 5/17-0.5, or pointed to an absence of evidence in the record that they were. Nor has it pointed to an absence of evidence in the record that sending the calls to the middle tier and allowing them to be processed there was "inserting" them. However, LPS has met its burden to identify evidence in the record, in the form of witness testimony, that LPS did not know or have reason to know that the SOAP calls it generated would: cause damage; alter, delete, or remove a computer program or data; or cause loss within the meaning of the CCPL. Noe 30(b)(6) Dep. 129:16-130:14; McCabe 30(b)(6) Dep. 38:21, 60:11-61:6, 67:1-17, 68:18-24, 88:17-24, 121:18-21. Therefore, Fidlar must show that there is a genuine issue for trial on this point.
However, in the same way that Fidlar's purported evidence of intent to defraud under the CFAA was inapposite, this information misses the mark and is not relevant to whether LPS knew or had reason to know that its SOAP calls would cause loss to Fidlar or the counties. Whatever interpretation of "loss" one applies to the word as used in the CCPA (a statute for which there is not a wealth of judicial interpretation), Fidlar does nothing to show that LPS knew or should have known that any loss—from lost printing revenues to cancellation of some of Fidlar's contracts—would result from the use of its client.
From the mere fact that the counties made money from Fidlar's product—obvious to LPS, presumably, since LPS paid the counties for access—it does not follow that LPS knew or should have known that it was depriving the counties of money, or even that it did deprive them of money. As described above, it was never LPS's aim to print documents, the process which by which Fidlar claims the counties were deprived of money; it was LPS's aim to copy and aggregate certain data from the land records it downloaded, which its client provided a means of doing. See McCabe 30(b)(6) Dep. 40:16-41:16. LPS could have done this by slower means than the one it eventually developed, including one that did not involve bypassing the intentionally restrictive Fidlar client interface (copying by hand, for instance).
The contention that LPS deprived counties of money rests on the assumption, unstated but everywhere present in Fidlar's briefing, that any act of copying the digital land records entitled the counties to a fee. Fidlar may wish this were so; indeed, Fidlar may have marketed its products to counties by endorsing just this kind of sweeping commodification of public land records. Be that as it may, Fidlar points to no information in the record that could give rise to the inference the LPS knew or should have known that this was the case, or that it was the case with respect to any individual contract. The evidence provided by Fidlar merely suggests that some counties charged a print fee, and that LPS never made a practice of printing and incurring the fee and never sought to. LPS's use of its own client to aggregate data from the documents does not suggest that it would have, or was contractually obligated to, print any of the associated documents and pay the counties for that printing.
Fidlar points to no evidence in the record that LPS knew or should have known that its use of its client caused the counties "loss" under the CFAA. Additionally, Fidlar has pointed to no evidence that suggests LPS knew or should have known that Fidlar would suffer loss of goodwill with counties, lost customers, or lost subscription revenue. Because Fidlar has not shown that there is a genuine issue for trial under the CCPL, summary judgment
Trespass to chattels is, as the Court explained in its order denying LPS's Motion to Dismiss, "an oft-forgotten common law tort usually familiar only to first-year law students, [which] provides redress for unauthorized use of or intermeddling with another's physical property." Order Mot. Dismiss 19. As the Court explained in that Order at length, and will not repeat here, trespass to chattels is experiencing a strange afterlife as a cause of action for unauthorized intermeddling with another's computer or network. Id. at 20-21. However, the requirement that the trespass involve an act of "direct physical interference" remains. Antonelli v. Sherrow, No. 02 C 8714, 2005 WL 2338813, at *10 (N.D.Ill. Sept. 21, 2005) aff'd, 246 Fed.App'x. 381 (7th Cir.2007). In allowing this claim to proceed past the motion to dismiss phase, the Court found unpersuasive all of Fidlar's arguments about data theft and interference with computer programs. Order Mot. Dismiss 21. The trespass to chattels count remained because Fidlar had plausibly alleged a "threat" to the continued operation of its servers caused by LPS's actions. Id. The claim proceeded on that possible threat alone.
The Court noted at the time that Fidlar's allegations on this score were not "dripping with detail," id., and indeed, no details at all about such interference appear to have surfaced in discovery. LPS observes that there is no evidence of any interference with the operation of Fidlar's servers at all. Mem. Supp. Mot. Summ. J. 44-45; Noe 30(b)(6) Dep. 109:20-22, 110:13, 110:16-21; Moore 30(b)(6) Dep. 206:13-16; Watkins 30(b)(6) Dep. 64:14-65:5. Given that the operating condition of Fidlar's servers was the only issue that remained, LPS has carried its burden. In response, Fidlar only argues that LPS's web harvester commands "physically touched Fidlar's computers," Resp. Mot. Summ. J. 79, and that the SOAP calls sent by LPS "did cause a substantial interference with Fidlar's computer network," id. But the only "substantial interference" Fidlar identifies is, once again, the attenuated form of loss it maintains it has suffered, which is not the same thing as a threat to the proper functioning of Fidlar's servers. Since Fidlar points to no information in the record beyond its conclusory assertion that its computer network was interfered with and its computer physically "touched," it has not shown the existence of anything in the record that a jury could rely upon to find for it on the trespass to chattels claim. Summary judgment against Fidlar is warranted on this count.
Accordingly, LPS's Motion for Summary Judgment, ECF No. 77, is GRANTED and summary judgment is granted as to all counts of Fidlar's Amended Complaint, ECF No. 31-1. Because the motion is granted in its entirety, LPS's Alternative Motion for Partial Summary Judgment on Certain of Fidlar's Claims for Damages, ECF No. 79, is MOOT. Because other claims remain in this matter—namely, LPS's claims for equitable relief, tortious interference with contract, and tortious interference with business expectancy—entry of judgment is not appropriate at this time.