JACK B. SCHMETTERER, Bankruptcy Judge.
Following trial both parties rested and argued by written submissions.
The following Findings of Fact and Conclusions of Law are now made and entered. Defendant filed only a Trial Memorandum by way of his argument and did not file proposed findings of fact as ordered. Defendant thereby failed to challenge findings proposed by Plaintiff except as he may have impliedly done so in his Trial Memorandum.
Debtor/Defendant held a responsible leadership position within the Plaintiff business, but resigned after an incident that angered him. He had received much proprietary data and information of the company while employed, but did not return it after resigning. His counsel promised to allow the Plaintiff's experts to see what was included in the retained data only if Plaintiff offered him a severance package. Related threats were submitted to the Plaintiff. The Plaintiff hired experts to find out what data was retained by Debtor and incurred great expense in that endeavor.
Ultimately, Debtor destroyed the technology containing the data he had continued to hold following his resignation, without first showing it to Plaintiff.
1. The Plaintiff FNA is an Illinois Corporation that manufactures and sells pressure washers. (FNA's Uncontested Facts [Dkt. No. 25] ¶ 1; Defendant's Response to Uncontested Facts [Dkt No. 31] ¶ 1)
2. FNA sells power washers, both gas and electric, under the Delco, Simpson and Power Washer brands, and it also licenses the DeWalt and Black & Decker pressure washer brands. (11/4/13 Contempt Hearing Testimony of Gus Alexander, Exhibit 39 at p. 8, ln. 15-20)
3. In 2012, FNA had facilities in Elk Grove Village, Illinois and in Arkansas. (Ex. 39 at p. 8, ln. 2-6) FNA also had affiliations with facilities in Shanghai and Ningbo, China. (Ex. 39 at p. 8, ln. 7-12)
4. FNA customers include Home Depot, Costco, Sam's Club, Walmart, Tractor Supply, Blaine's Mills and Farm and Fleet. FNA also makes a variety of hoses, pumps, engines generators and similar products. (Ex. 39 at pp. 8-9, ln. 1-16)
5. Defendant was an employee of FNA for 16 years — from September 9, 1996 to on or about August 29, 2012 (the "
6. On the date of his departure from FNA, Defendant was Director of Operations and Logistics whose job responsibilities included supervising FNA facilities and operations and security for FNA's buildings. (Stipulation ¶ 2); (Exhibit 39 at p. 11, ln. 1-5; Trial Transcript at p. 130, ln. 5-11; p. 330, ln. 11-22)
7. As Director of Logistics, Defendant worked directly with steamship lines and domestic carriers to arrange for shipment of goods into and out of the United States and to arrange for transportation of goods to and from any FNA facility. (Trial Transcript at 331; Exhibit 39 at 11-12)
8. As Director of Operations and Logistics, Defendant had access to FNA's information regarding its shipping, logistics and world-wide freight forwarders. (Trial Transcript at p. 201, ln. 12-25) Defendant knew that such shipping and pricing information was confidential. (Transcript at p. 202, ln. 3-12)
9. During the Employment Period, Defendant also was responsible for managing the people and the area in which pumps and other equipment were refurbished. (Trial Transcript at p. 331, ln. 18-25). FNA refurbished some of the machines that were returned from customers and, once refurbished, those machines were resold. (Exhibit 39 at p. 12, ln. 1-11; p. 45, ln. 8-24)
10. During the Employment Period, Defendant also was in charge of all security for FNA, and for each of FNA's facilities. (Trial Transcript at p. 200, ln. 1-8; p. 331, ln. 3-7) Because of Defendant's responsibilities as head of security and his other duties at FNA, Defendant had access to and was entrusted with all confidential FNA information. (Trial Transcript at p. 332, ln. 1-10; Exhibit 39 at p. 10, ln. 18-20; p. 12, ln. 12-17)
11. FNA's security systems were entrusted to Defendant, and the FNA security system was connected to Defendant's computer. (Trial Transcript at p. 200, ln. 1-8; Exhibit 39 at p. 130, ln. 2-17)
12. On September 9, 1996, Defendant executed a Trade Secret/Non-Disclosure Agreement as a condition of his employment by FAIP North America, Inc., (the
13. On page 1 of the Trade Secret Agreement, the term "trade secrets" was defined as follows:
(Exhibit 20 at 1)
14. On page 2, the Trade Secret Agreement, in relevant part, provided:
(Exhibit 20 at 2)
15. The Trade Secret Agreement, in relevant part, further provided:
(Exhibit 20 at 2-3)
16. Based on Defendant's execution of the document, Defendant was at all times bound by the terms of the Trade Secret Agreement. (Defendant's Response to Uncontested Facts [Dkt. No. 31] ¶ 11)
17. Defendant does not dispute that he was bound by the Trade Secret Agreement, and he admits that the signature on the Trade Secret Agreement looks like his signature. (Trial Transcript at p. 306, ln. 18-25; Exhibit 20)
18. Defendant is aware that, during his employment, a confidentiality policy existed at FNA and that, once he left FNA's employment, he was obligated by his Trade Secret Agreement to return all FNA property in his possession to FNA. (Trial Transcript at p. 307, ln. 1-13)
19. During the Employment Period, FNA maintained a Virtual Private Network system (
20. To access the VPN System, a Defendant brought his personal laptop (
21. After the VPN System software was installed on his Laptop, Defendant created a user name and password in order to "authenticate" his Laptop with the FNA VPN System. (Exhibit 43 at p. 104, ln. 14-20; Trial Transcript at p. 142-43). Defendant's user name and password which enabled Defendant to remotely access his Desktop were known only to Defendant. (Exhibit 43 at p. 104)
22. Once installed, the VPN System software enabled Defendant to log into the FNA VPN System and his Desktop from any remote location, such as his home or a hotel, as if Defendant were sitting in front of his Desktop. (Trial Transcript at p. 142-43, ln. 15-4; Exhibit 40 at p. 63, ln 15-22).
23. The VPN System allows a remote user, like Defendant, to transfer, copy, move, delete files as if the user were sitting at his Desktop. (Exhibit 43 at p. 105, ln. 1-21; p. 119, ln. 20-24; and p. 128, ln. 6-16) Using the VPN System, Defendant could print any FNA file on his Desktop to a remote printer. (Exhibit 43 at p. 105, ln. 1-21; p. 119, ln. 20-24; and p. 128, ln. 6-16)
24. Remotely accessing Defendant's Desktop files required knowledge of Defendant's user name and password. (Exhibit 43 at p. 135-36, ln. 21-8) No one was able to access a user's FNA computer unless the user gave the password to that person. (Exhibit 43 at pp. 135-136, ln. 21-8)
25. It was not Defendant's custom or practice to give out his user name and password, and he did not remember giving his user name and password to FNA ownership. (Trial Transcript at p. 253-54, ln. 17-8)
26. Defendant testified that he shared his user name and password only with the IT Manager and with Sonia Bell, the FNA office administrator, who logged onto Defendant's Desktop for payroll purposes. (Trial Transcript at p. 254, ln. 14-17). Defendant further testified that he "cannot imagine" that Ms. Bell used his password to transfer files other than those concerning payroll or employment. (Trial Transcript at p. 254, ln. 18-21)
27. Defendant admitted that, at times, he asked the IT Manager to access Defendant's Desktop in order to fix some difficulty he had with that computer. (Trial Transcript at p. 254-55, ln. 22-15) However, Defendant does not know of any other instance in which the IT Manager logged onto Defendant's Desktop. (Trial Transcript at p. 255)
28. FNA's IT Manager, Shawn Hamm, and FNA's expert, Nicholas Barone, testified that Defendant's password was known only to Defendant. (Exhibit 43 at p. 135-36, ln. 21-8; Exhibit 40 at p. 64, ln. 6-22)
29. While Defendant was an FNA employee, he used his Laptop for business purposes. (Trial Transcript at p. 203, ln. 2-4; 4/3/14 Contempt Hearing Testimony of Demetrios Arvanitis, Exhibit 42 at p. 31, ln. 18-20) Defendant testified that, between 2009 and August 30, 2012, he used the VPN System more than 500 times in order to access his Desktop and the FNA computer system. (Trial Transcript at p. 203, ln. 5-7; Exhibit 43 at p. 103, ln. 1-5, 18-20)
30. As an FNA employee, Defendant would remotely access his Desktop to transfer FNA documents to his personal email account for use wherever he was located. (Trial Transcript at p. 203-204, ln. 13-2)
31. Defendant also used a flash drive to transfer documents from his Desktop so that he could work on FNA documents from wherever he might be located. (Trial Transcript at p. 204, ln. 3-15)
32. Defendant used a computer from home with the path name of Demetrios-PC to remotely access his FNA Desktop. (Exhibit 43 at p. 103, ln. 18-20) Defendant also used another computer named Demetri-PC to remotely access his Desktop. (Exhibit 43 at 104, ln. 5-21; p. 105, ln. 22-24; p. 107, ln. 20-23)
33. On April 15, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
34. Such information is confidential and proprietary and, if FNA competitors learned this information, they could calculate FNA's manufacturing costs as well as its margins. (Exhibit 39 at p. 79, ln. 2-18)
35. The information contained in the April 15 Transfer constituted "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
36. The information and documents contained in the April 15 Transfer were never returned to FNA. (Trial Transcript at p. 304, ln. 7-14; Exhibit 39 at p. 79, ln. 19-21)
37. Defendant testified that the information and documents contained in the April 15 Transfer remained in Defendant's personal email account until such documents were deleted sometime in early 2013. (Trial Testimony at p. 208, ln. 16-20) Defendant testified that he had no concerns about holding that material after resigning, that he "didn't give it the time of day" referring to the fact that he retained the April 15 Transfer material until early 2013. (Trial Testimony at p. 208, ln. 21-24)
38. On May 11, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
39. The May 11 Transfer contains FNA business documents sent to Defendant from an employee at the FNA Arkansas facility. (Trial Transcript at p. 212, ln. 16-25)
40. The information contained in the May 11 Transfer was subject to confidentiality agreements between FNA and many of its major vendors such as Walmart, Sam's Club and Home Depot. (Exhibit 39 at pp. 82-83, ln. 20-5)
41. The information and documents contained in the May 11 Transfer constituted "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
42. The information and documents contained in the May 11 Transfer were never returned to FNA. (Trial Transcript at p. 304, ln. 7-16; Exhibit 39 at p. 82, ln. 17-19)
43. Defendant testified that the information and documents contained in the May 11 Transfer remained in Defendant's personal email account until the time that Defendant destroyed his personal Laptop sometime in early 2013. (Trial Testimony at p. 214, ln. 2-8)
44. On May 14, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
45. Such information was confidential and proprietary consisting of a final valuation of returned FNA product relating to a dispute with FNA's Italian counterparts. (Exhibit 39 at pp. 80-81, ln. 24-13)
46. The information and documents contained in the May 14 Transfer constituted "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
47. The information and documents contained in the May 14 Transfer were never returned to FNA. (Trial Testimony at p. 210, ln. 13-22; p. 304, ln. 7-16; Exhibit 39 at p. 80, ln. 21-23)
48. Defendant testified that he does not remember deleting the information and documents contained in the May 14 Transfer. (Trial Testimony at p. 210, ln. 13-16)
49. On June 15, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
50. The information and documents transferred by Defendant to his personal email account on June 15, 2012 were confidential. (Trial Transcript at p. 214, ln. 1-4; Exhibit 39 at p. 84, ln. 7-11)
51. The information and documents contained in the June 15 Transfer constituted "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
52. The information and documents contained in the June 15 Transfer were never returned to FNA. (Trial Transcript at p. 304, ln. 13-16; Exhibit 39 at p. 84, ln. 12-14)
53. Defendant testified that he does not remember deleting the information and documents contained in the June 15 Transfer but that those materials were deleted no later than the date Defendant's Laptop was destroyed in early 2013. (Trial Transcript at p. 214, ln. 18-24)
54. On June 22, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
55. The information and documents transferred by Defendant to his personal email account on June 22, 2012 is confidential. (Trial Transcript at p. 216, ln. 18-20; Exhibit 39 at p. 85, ln. 13-18)
56. The information and documents contained in the June 22 Transfer constitute "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
57. The information and documents contained in the June 22 Transfer were never returned to FNA. (Trial Transcript at p. 304, ln. 13-16; Exhibit 39 at p. 85, ln. 18-22)
58. Defendant testified that he does not remember deleting the information and documents contained in the June 22 Transfer, but they were deleted no later than the date when Defendant's Laptop was destroyed in early 2013. (Trial Transcript at pp. 216-17, ln. 21-4)
59. On August 5, 2012, while he was an FNA employee, Defendant transferred to his personal email account, designated as
60. The information and documents transferred by Defendant to his personal email account on August 5, 2012 were confidential data of the Plaintiff. (Trial Transcript at p. 215, ln. 17-19; Exhibit 39 at p. 77, ln. 5-21)
61. The information and documents contained in the August 5 Transfer constitute "trade secrets," as defined in the Trade Secret Agreement, which Defendant was required to return to FNA after his resignation on August 29, 2012. (Exhibit 20).
62. The information and documents contained in the August 5 Transfer were never returned to FNA. (Trial Transcript at p. 304, ln. 13-16; Exhibit 39 at p. 77, ln. 22-24)
63. Defendant testified that he does not remember deleting the information and documents contained in the August 5 Transfer, but they were deleted no later than the date when Defendant's Laptop was destroyed in early 2013. (Trial Transcript at pp. 215-216, ln. 20-1)
64. By using the FNA VPN System, Defendant could access his Desktop and Hard Drive remotely through the FNA network. (Exhibit 40 at p. 63, ln. 17-22)
65. Mr. Nicholas Barone, an FNA computer forensics expert whose testimony is summarized below, found evidence that at 1:51 a.m. on August 29, 2012, Defendant's user I.D. was used to log onto the FNA VPN System. (Exhibit 40 at pp. 61-62, ln. 16-14)
66. Exhibit 17 was prepared by Mr. Barone and consists of all the active and deleted files that Mr. Barone and Navigant were able to identify on the Defendant's Western Digital Hard Drive. (Trial Testimony at p. 58, ln. 6-25; Exhibit 40 at p. 21, ln. 1-8)
67. Mr. Barone testified that Exhibit 17 shows, on lines 642 (page 14) through 5277 (page 11), that approximately 4,600 files in the Hard Drive were accessed at 1:51 a.m. on August 29, 2012, which means that those files could have been opened, moved or copied at that time and date. (Trial Testimony at pp. 60-63; Exhibit 40 at pp. 27-29; Exhibit 17)
68. Mr. Barone's expert opinion was that Defendant copied the 4,600 files which Exhibit 17 identifies as having been accessed on August 29, 2012. (Exhibit 40 at p. 29, ln. 1-11).
69. The 4,600 files copied on August 29, 2012 contained a variety of FNA proprietary and confidential information and documents, including FNA financial spreadsheets, photographs of FNA operations, invoicing documents and AutoCAD files which are engineering drawings of products that FNA manufactures or contracts out to sub-manufacturers under confidentiality agreements. (Exhibit 39 at pp. 69-72, p. 75, ln. 2-17; Exhibit 17)
70. The 4,600 files were copied by Defendant about seven hours before Defendant sent his resignation email to FNA's President, Gus Alexander. (Exhibit 1; Exhibit 39 at p. 70, ln. 17-20)
71. Disclosure to third parties of the confidential files accessed on August 29, 2012, would be devastating to FNA. (Exhibit 39 at p. 75, ln. 2-17)
72. On February 13, 2014, after hearing evidence over several days, Judge Kennedy of the Circuit Court of Cook County entered an order of civil contempt against the Defendant which found, by a preponderance of the evidence, that Defendant still retained possession of FNA documents and materials which he failed to turn over to FNA as ordered. (Stipulation ¶ 10)
73. Defendant testified that, on August 28, 2012, he had an argument with Chris Alexander, an executive with FNA, concerning a number of issues, including Defendant's job performance, refurbishing and how Defendant was handing his duties as Director of Operations and Logistics. (Trial Transcript at p. 315, ln. 4-22)
74. On August 29, 2012, at 8:44 a.m., Defendant sent an email to Gus Alexander (the
75. Defendant's employment with FNA ended on August 29, 2012. (Stipulation ¶ 3)
76. After sending the Resignation Email, Defendant retained counsel, Mr. John A. Dienner, III, to negotiate a severance package with FNA. (Trial Transcript at p. 265, ln. 16-22; p. 316, ln. 19-23)
77. Defendant testified that he filed a constructive discharge complaint against FNA with the Illinois Department of Labor but that the Department did not follow up with him. (Trial Transcript at pp. 265-66, ln. 23-10)
78. On August 30, 2012, Gus Alexander, FNA's President, responded to and denied the allegations contained in the Resignation Email, and Mr. Alexander attempted to contact Defendant about such allegations. (Exhibit 1)
79. On September 5, 2012, Gus Alexander sent an email to Defendant requesting that Defendant return, immediately, all FNA property in his possession. Specifically, in the September 5, 2012 email, Mr. Alexander requested the return of all FNA equipment, files and record, as follows:
(Exhibit 23)
80. On September 19, 2012, Mr. Alexander sent an email to Defendant which, at line 6, again requested examination of Defendant's personal Laptop for FNA data and software:
(Exhibit 26)
81. Defendant testified that he received the September 5, 2012 email and the September 19, 2012 email and acknowledged that he had no right to keep FNA's confidential and proprietary information. (Exhibit 42 at p. 30, ln. 2-16; Trial Transcript at p. 220, ln. 8-23; p. 222, ln. 5-9)
82. Defendant also testified that he knew FNA believed that Defendant's personal Laptop contained FNA documents and information. (Trial Transcript at p. 311, ln. 8-13) Yet, Defendant refused to submit his Laptop to FNA for inspection by its technical experts. (Trial Transcript at p. 311, ln. 8-22)
83. However, from September 2012 through January 2013, Defendant's counsel, Mr. Dienner, continued to offer to allow Defendant's personal computer to be examined by an "independent 3
84. Defendant testified that he destroyed his personal Laptop in early 2013 rather than turn it over to FNA for inspection. (Trial Transcript at p. 214, ln. 5-8; p. 311, ln. 8-13; Exhibit 42 at p. 7, ln. 18-20)
85. The business of manufacturing and selling pressure washers and power equipment is based on high volume and low margins. (Trial Transcript at p. 332, ln. 19-24; p. 333, ln. 1-6; Exhibit 39 at p. 9, ln. 4-18)
86. Providing equipment to big-box retailers and original equipment manufacturers ("
87. Any information regarding technology, manufacturing process and cost is extremely confidential because it represents FNA's advantage over its competition. (Trial Transcript at pp. 332-33, ln. 19-6)
88. As Director of Operations and Logistics, Defendant had access to most of FNA's information regarding its shipping, logistics and world-wide freight forwarders. (Trial Transcript at p. 201, ln. 16-21; p. 331, ln. 8-17)
89. All pricing information, shipping analysis and spreadsheets regarding the import of spare parts are confidential. (Trial Transcript at p. 202, ln. 3-12; pp. 213-216)
90. Defendant was responsible for Security at FNA, and in that role Defendant controlled a local video system in the Elk Grove Village facility and a web-based system for the Arkansas facility, both of which were useful for business purposes in case there was an accident, theft or a workers' compensation claim. (Trial Transcript at p. 200, ln. 1-8; p. 331, ln. 3-7)
91. Defendant was a trusted confidante and employee and, because of his position and longevity at FNA, he had access to FNA confidential information. (Trial Transcript at p. 332, ln. 1-10; Exhibit 39 at p. 10, ln. 16-20)
92. Following Defendant's resignation, FNA retained Navigant Consulting to provide investigative and computer forensic services in connection with Defendant's resignation from FNA. (Trial Transcript at p. 46, ln. 15-23). Mr. Scott Solomon, who heads Navigant's computer forensic investigations practice in Chicago, lead the Navigant Consulting team. (Trial Transcript at p. 46, ln. 1-7)
93. FNA directed Navigant to examine Defendant's files located on Defendant's FNA-supplied desktop, devices and email account. (Trial Transcript at p. 47, ln. 3-9; Exhibit 39 at p. 75-76, ln. 18-2) Specifically, Navigant examined Defendant's FNA-supplied desktop computer (
94. The purpose of engaging Navigant to examine the Hard Drive, used by Defendant while he was an FNA employee, was to determine the type of information contained on the Hard Drive and to determine whether any information had been copied from the Hard Drive. (Trial Transcript at p. 57, ln. 10-19)
95. Mr. Solomon, who leads the Navigant computer forensics team, described the standard-protocol methodology used by Navigant to conduct its forensic analysis of the FNA devices used by Defendant. (Trial Transcript at pp. 48-51) The methodology employed by Navigant is the ordinary and customary manner in which to conduct such forensic analysis of such computer devices. (Trial Transcript at p. 53, ln. 3-25)
96. More than ten Navigant employees provided investigative and computer forensic services to FNA in connection with Defendant's resignation from FNA, created a number of exhibits used during the State Court Contempt Hearing and provided the services of Mr. Nicholas Barone who provided expert opinion testimony. (Trial Transcript at p. 48, ln. 3-25)
97. Mr. Solomon testified that Navigant has invoiced more than $200,000 for its services to FNA in connection with Navigant's forensic and computer analysis of Defendant's Desktop, Hard Drive and devices and for Navigant's preparation of exhibits and the testimony provided for the State Court Hearings by Nicholas Barone. (Trial Transcript at 69-70)
98. Mr. Solomon also testified that FNA has paid more than half of the amount invoiced by Navigant and Navigant expects that FNA will pay the full amount of its invoices relating to Defendant's actions. (Trial Transcript at p. 71, ln. 3-8)
99. On December 9, 2013, at the State Court trial on FNA's Motion for Contempt (
100. Mr. Barone has been involved with more than 1,000 cases over a period of 27 years involving collection, preservation and analysis of electronically stored data ("
101. Mr. Barone was allowed to testify as an expert witness in the State Court Contempt Hearing (Exhibit 40 at pp. 9-10, ln. 23-4)
102. Mr. Barone and the Navigant team prepared Exhibit 16 which is referred to as the USB Registry Report and which is commonly described as a list of all devices plugged into Defendant's Desktop. (Trial Transcript at p. 54, ln. 9-25; p. 55, ln. 1-6; Exhibit 40 at p. 15, ln. 1-8)
103. A Western Digital Hard Drive (described as WD My Passport 0730 USB device) was one of the devices listed on Exhibit 16 as having been connected to Defendant's Desktop at FNA. (Trial Transcript at pp. 54-55, ln. 24-6)
104. Exhibit 16 shows that the Hard Drive was plugged into Defendant's Desktop on August 26 and, because the computer registry does not change the date a device is unplugged, Mr. Barone's expert opinion was based on the assumption that the Hard Drive remained plugged into the Defendant's Desktop through and including August 29, 2012. (Trial Transcript at pp. 55-56, ln. 17-14; Exhibit 40 at pp. 89-90, ln. 13-7)
105. Navigant examined all active and deleted files on the Hard Drive by creating an exact digital image of the Hard Drive pursuant to forensically sound practices described in detail by Mr. Barone. (Exhibit 40 at p. 21, ln. 1-8, 19-24; p. 22, ln. 1-24; p. 23, ln. 1-7)
106. Exhibit 17 is a report generated by Mr. Barone and Navigant based on their forensic examination of the Hard Drive and was admitted into evidence in the State Court Contempt Hearing. (Exhibit 40 at p. 23, ln. 3-9; p. 24, ln. 13-16)
107. Exhibit 17 consists of all the active and deleted files that Mr. Barone and Navigant were able to identify on the Western Digital Hard Drive. (Trial Testimony at p. 58, ln. 4-25; Exhibit 40 at p. 21, ln. 1-3)
108. Exhibit 17 shows, on lines 642 (page 14) through 5277 (page 11), that approximately 4,600 files in the Hard Drive were accessed at 1:51 a.m. on August 29, 2012, which means that those files could have been opened, moved or copied at that time and date. (Trial Testimony at pp. 60-63; Exhibit 40 at pp. 27-29; Exhibit 17)
109. The 4,600 files on the Hard Drive were accessed while Defendant was still an employee of FNA and while Defendant still had use of the FNA VPN System to remotely access FNA files. (Exhibit 39 at pp. 69-70) Defendant did not delete the VPN System software from his personal Laptop until a day after he resigned on August 29, 2012. (Trial Transcript at p. 150, ln. 15-22)
110. The 4,600 files accessed on August 29, 2012 contained a variety of FNA proprietary and confidential information and documents, including FNA financial spreadsheets, photographs of FNA operations, invoicing documents and AutoCAD files which are engineering drawings of products that FNA manufactures or contracts out to sub-manufacturers under confidentiality agreements. (Exhibit 39 at p. 70, ln. 21-24; p. 71, ln. 1-24; p. 72, ln. 1-2; p. 75, ln. 1-17; Exhibit 17)
111. Any disclosure to third parties of the confidential files accessed by Defendant on August 29, 2012, would be economically harmful to FNA. (Exhibit 39 at p. 75, ln. 10-17)
112. Mr. Barone's expert opinion was that Defendant copied the 4,600 files shown on Exhibit 17 as having been accessed on August 29, 2012. (Exhibit 40 at p. 29, ln. 1-11). Mr. Barone's conclusion was based on the fact that copying of files produces the kind of file signature pattern shown in the "accessed" column of Exhibit 17, that the Hard Drive was used by Defendant, and that the Hard Drive was attached to Defendant's Desktop. (Exhibit 40 at p. 29, ln. 14-24; p. 30, ln. 1-9) The conclusion was not rebutted.
113. On cross-examination by Defendant's counsel, Mr. Parisi, Mr. Barone testified that it was not possible that an automatic backup program accessed the 4,600 files on August 29, 2012. (Exhibit 40 at p. 52, ln. 13-24)
114. Mr. Barone's testimony is based on the fact that he searched and did not find a program on the Hard Drive associated with backing up of files. (Exhibit 40 at p. 52, ln. 13-24)
115. Mr. Barone further testified on cross-examination that his search of files on the Hard Drive included a search for deleted files, shown on 815 of Exhibit 17, which search produced no deleted files associated with backing up programs. (Exhibit 40 at p. 53, ln. 1-18)
116. Mr. Barone further testified on cross-examination that he examined the active and deleted files of Defendant's Desktop and found no program associated with the backing up of files on the Desktop hard drive. (Exhibit 40 at p. 58, ln. 14-20)
117. Mr. Barone explained that Defendant did not need to be physically present at the FNA building at 1:30 on August 29, 2012 to access the 4,600 files because FNA provided remote access to his Desktop and Hard Drive. (Exhibit 40 at p. 61, ln. 16-20).
118. Additionally, Mr. Barone found evidence that, at 1:51 a.m. on August 29, 2012, Defendant's user I.D. was used to log onto the FNA VPN System. (Exhibit 40 at pp. 61-62, ln. 23-17) Logging onto the FNA VPN System is synonymous with logging on to Defendant's Desktop. (Exhibit 40 at p. 63, ln. 17-22)
119. Defendant offered no expert at the State Court Contempt Hearing or at the trial in this Court to contradict the testimony of Mr. Barone. (Trial Transcript at p. 278, ln. 5-12)
120. The information and documents transferred by Defendant to his personal computer on August 29, 2012 are proprietary and confidential but were never returned to FNA. (Exhibit 39 at p. 70, ln. 17-24; p. 71, ln. 1-24; p. 72, ln. 1-20; p. 73, ln. 18-20; p. 74, ln. 1-22; p. 75, ln. 1-17; Trial Transcript at p. 307, ln. 14-22)
121. Defendant made no effort to return to FNA any digital copies of information and documents that he may have transferred to himself when he was an FNA employee. (Trial Transcript at p. 307, ln. 14-22)
122. On December 9, 2013, at the State Court Contempt Hearing, FNA offered the expert testimony of Jerry Saperstein, a computer forensics specialist. (Exhibit 41 at p. 96, ln. 7-16) Mr. Saperstein's Curriculum Vitae is admitted in the Bankruptcy Trial as
123. Much of Mr. Saperstein's work concerns examination and retrieval of data from computer storage devices, such as hard drives and CD-ROMs. (Exhibit 41 at p. 97, ln. 19-24)
124. Mr. Saperstein was engaged by FNA to examine a CD-ROM which he received from FNA counsel and which was marked, "Samples time stamped of illegal wiretaps" (the
125. The CD-ROM was contained in a sealed box that was delivered to FNA's Elk Grove Village facility in November or December 2012. (Exhibit 39 at pp. 18-19) Also in the sealed box was an anonymous, threatening letter which was admitted in the Bankruptcy Trial as
126. Mr. Saperstein created an exact digital duplicate of the CD-ROM containing every bit of the original, and he then examined the contents of the digital duplicate in a forensically sound manner. (Exhibit 41 at p. 104, ln. 1-4)
127. Based on his examination, Mr. Saperstein concluded that the CD-ROM contained three audio files ("
128. The path on the CD-ROM showed that the Audio Files came from a computer named Demetrios-PC or that the Audio Files resided in a folder created for a user on a PC named Demetrios. (Exhibit 41 at p. 105, ln. 11-20; p. 118, ln. 11-23) Mr. Saperstein found no other path or names on the CD-ROM. (Exhibit 41 at p. 105, ln. 11-20)
129. Mr. Saperstein's expert opinion is that the Audio Files were associated with an authorized user by the name of "Demetrios." (Exhibit 41 at p. 105, ln. 21-24; p. 106, ln. 1-6)
130. According to FNA's VPN log, Defendant remotely accessed FNA's VPN System 524 times using a remote computer with the name Demetrios-PC. (Exhibit 43 at p. 103, ln. 18-20)
131. Mr. Saperstein also concluded that the Audio Files did not exist originally on the CD-ROM. Rather, they were transferred to the CD-ROM from an MP3 audio file from a computer designated as Demetrios-PC. (Exhibit 41 at p. 120, ln. 1-7)
132. The Audio Files contained conversations at FNA offices that Defendant taped while he was an FNA employee. (Exhibit 39 at p. 42, ln. 11-24)
133. Defendant was responsible for security at FNA and the camera system throughout the building merged into a digital video recorder in Defendant's office. (Trial Transcript at p. 200, ln. 1-8).
134. Defendant testified that the video system served a business purpose and Defendant would review video tapes if there was an accident, or a workers compensation claim, or if there were theft. (Trial Testimony at p. 247, ln. 4-21)
135. Defendant used his personal Laptop for business purposes and remotely accessed FNA's VPN System hundreds of times while he was an FNA employee. (Trial Transcript at p. 203, ln. 2-7; Exhibit 42 at p. 31, ln. 18-20; Exhibit 43 at p. 103, ln. 18-20)
136. Defendant was aware that FNA demanded that he produce his personal Laptop to have it examined by FNA's forensic experts but he refused to do so. (Trial Transcript at p. 311, ln. 8-15; Exhibit 42 at p. 29, ln. 16-19; p. 31, ln. 3-20)
137. Through his counsel, John A. Dienner, III, Defendant continued to negotiate for a severance package in return for which he would allow third-party examination of his personal computer and other devices sought for inspection by FNA's computer experts. (Exhibits 27 and 30)
138. On January 25, 2013, Mr. Dienner sent an email to FNA counsel setting out deal terms for a settlement with FNA which included the examination of his personal computer by third-party forensic specialists. (Exhibit 30)
139. On March 11, 2013, Gus Alexander received an anonymous email (the
(March 11, 2013 email, Exhibit 29)
140. FNA counsel notified Defendant's counsel, John Dienner, about the Threatening Email and, in response, Mr. Dienner admitted that the March 11, 2013 email was sent by Defendant:
(March 12, 2013 email from John A Dienner, III to Mark Flessner, Exhibit 29)
141. At the time the Threatening Email was sent, Defendant had authorized John Dienner, his attorney, to communicate with FNA to attempt to arrange for a severance package. (Trial Transcript at p. 256, ln. 4-25; p. 259, ln. 7-20; Exhibit 42 at pp. 36-37, ln. 15-6)
142. The State Court Judge found that the statements of Mr. Dienner constituted an admission by Defendant through his agent, and this Court so finds. (Exhibit 42 at p. 58, ln. 1-12)
143. Mr. Dienner continued to negotiate with FNA counsel regarding possible settlement, including an offer of passcodes and an examination of Defendant's laptop as part of settlement. (Exhibit 42 at pp. 36-37, ln. 15-6; Exhibit 27; Exhibit 30)
144. On April 10, 2013, Dienner sent another email to FNA counsel setting out deal terms for a settlement with FNA which also offered, "third party examination of my client's computer . . ." (Exhibit 27)
145. On April 23, 2013, Mr. Dienner sent an email to FNA counsel offering, "My client will accept $90,000 (plus the other terms)," which included examination of Defendant's computer. (Exhibit 28)
146. Negotiations between FNA and Defendant were not successful because, in FNA's view, there was "no foundation" for Defendant's request for severance payment. (Exhibit 39 at p. 16, ln. 3-18)
147. In mid-2013, FNA commenced a State Court Lawsuit against Defendant seeking return of FNA's confidential information and documents. (Exhibit 39 at p. 16, ln. 13-15)
148. On July 17, 2013, FNA filed a Third Amended Complaint against Defendant in the Circuit Court of Cook County, Chancery Division, Case No. 13 CH 13616 (the "
149. On July 2, 2013, FNA filed a Motion for Temporary Restraining Order and a Preliminary Injunction ("
150. On October 2, 2013, after a hearing and submission of briefs, Cook County Circuit Court Judge Kathleen G. Kennedy, granted FNA's TRO Motion finding, by a preponderance of the evidence, that FNA has a "clearly ascertainable right in need of protection on at least some of its claims, including breach of trade secret/non-disclosure agreement." (Stipulation ¶ 6)
151. On October 23, 2013, FNA filed an Emergency Motion for Indirect Civil Contempt against Defendant for his willful failure to comply with the TRO Order (the "
152. On February 13, 2014, after hearing evidence over several days, Judge Kennedy entered an order of civil contempt against the Defendant (the "
153. The Civil Contempt Order states, in relevant part:
(Stipulation ¶ 11)
154. In the Civil Contempt Order, Judge Kennedy held that Defendant was in Civil Contempt of the TRO Order entered on October 2, 2013 and imposed a fine in the amount of $2,500 per day:
(Stipulation ¶ 12)
155. On June 19, 2014, following many evidentiary hearings conducted by Judge Kennedy, the Second Contempt Order was issued that "reinstated" the Contempt Order:
(Stipulation ¶ 13)
156. Debtor failed to appeal or seek a stay of the Second Contempt Order. (Stipulation ¶ 14)
157. Exhibits 1 through 43, inclusive, offered by FNA were admitted at trial without objection by Defendant. (Trial Transcript p. 27, ln. 13-20)
158. Additional Facts set forth below in the Conclusions of Law will stand as additional Findings of Fact.
The discharge provided by the Bankruptcy Code is meant to effectuate the "fresh start" goal of bankruptcy relief. Vill. of San Jose v. McWilliams, 284 F.3d 785, 790 (7
Furthermore, Exceptions to discharge are to be construed strictly against the creditor seeking the exception and liberally in favor of a debtor. In re Morris, 223 F.3d 548, 552 (7
Plaintiff filed a two count complaint; Count I alleging Embezzlement, 11 U.S.C. 523(a)(4); and Count II alleging Willful and Malicious Injury, 11 U.S.C. 523 (a)(6). Plaintiff's Complaint failed to allege larceny. However, Plaintiff argues for a judgment based on larceny in its memorandum although never pleaded in its Complaint.
This court has jurisdiction over this adversary proceeding pursuant to 28 U.S.C. § 1334. This matter involves a core proceeding pursuant to 28 U.S.C. § 157(b)(2)(I) as to determination as to dischargeability of particular debts.
Venue is proper in the Northern District of Illinois pursuant to 28 U.S.C. § 1409(a) as a proceeding arising under title 11, U.S.C.
This adversary proceeding was filed prior to the expiration of time for filing of complaints objecting to discharge provided under Rule 4004 of the Federal Rules of Bankruptcy Procedure.
The preponderance of the evidence standard of proof applies to all exceptions from dischargeability of debts contained in 11 U.S.C. § 523(a), including nondischargeability for fraud provisions of 11 U.S.C. § 523(a). Grogan v. Garner, 498 U.S. 279, 286-287 (1991).
It must be conceded at the outset that evidence did not show any of the following:
1. That Debtor sold or made any commercial use of the data, or allowed any other business or person to use or copy it.
2. That Debtor did harm or destroy the Plaintiff's data in any way so as to prevent Plaintiff's further use of it.
Nonetheless, the issue to be decided is whether Debtor's continued possession of the data in light of threats received by Plaintiffs, and Debtor's lawyer agreement to show the tapes only if a severance package was agreed to, amounted to an injury of Plaintiff that resulted in nondischargeable damages consisting of consequential expenses incurred by employing of experts to find out what secret data Defendant took with him after leaving the business.
A state court judgment is entitled to the same preclusive effect in federal court as that judgment would have in state court. Allen v. McCurry, 449 U.S. 90, 96 (1980); see 28 U.S.C. § 1738.
This rule applies with equal force in bankruptcy cases. First Weber Group, Inc. v. Horsfall, 738 F.3d 767, 772 (7
Under Illinois state law, collateral estoppel applies when:
In re Owens, 125 Ill.2d 390, 399-400 (1988)
Under Illinois state law, a judgment for contempt is a final judgment. "The imposition of a sanction for contempt is final and appealable because, although occurring with the context of another proceeding and thus having the appearance of being interlocutory, it is an original special proceeding, collateral to and independent of, the case in which the contempt arises." People ex rel. Scott v. Silverstein, 87 Ill.2d 167, 172 (1981).
"While collateral estoppel applies only to issues that have been necessarily and unambiguously decided, express factual findings are not required because an issue may be decided from findings implicit in the judgment." Leventhal v. Schenberg (In re Leventhal), 481 B.R. 409, 420 (N.D. Ill. 2012). "In order to determine whether the elements of collateral estoppel have been satisfied in a dischargeability proceeding, the bankruptcy court should look at the entire record of the state proceeding, not just the judgment." In re Tapper, 123 B.R. 594, 600 (Bankr. N.D. Ill. 1991).
In the State Court Action, by Contempt Order dated February 13, 2014, found that:
(Exhibit 37)
The items "set forth in the TRO" were "any and all documents and materials of any nature pertaining to any work performed for or related to FNA Group, Inc., . . ." and "any computer hardware and software containing any of the information contained in Paragraph 1 . . ." (Exhibit 36 at 2)
The issues determined by the State Court in the Initial Contempt Order, restated by the second Contempt Order dated June 19, 2014 (the "Second Contempt Order"), were that: (a) as of the date of the Second Contempt Order, Defendant had possession of proprietary and confidential FNA documents and materials; and (b) Defendant failed to return the items as ordered by the state court. These issues have already been determined by the State Court and this Court concludes that Defendant is precluded from relitigating such issues in this Adversary proceeding, although the same facts are also found from evidence at trial in this Court by preponderance of evidence.
However, the state court Contempt Order did not contain findings relating to how Defendant came to possess FNA's confidential documents and materials and whether Defendant did so with the requisite fraudulent intend and deceit necessary to establish embezzlement or larceny under § 523(a)(4), or whether Defendant's actions were willful and malicious under § 523(a)(6).
Count I of the adversary proceeding complaint filed by FNA seeks a declaration that FNA's claim against Defendant is not dischargeable on grounds of embezzlement and larceny pursuant to 11 U.S.C. § 523(a)(4).
Embezzlement under § 523(a)(4) is defined as the "fraudulent appropriation of property by a person to whom such property was entrusted or into whose hands it has lawfully come." Matter of Weber, 892 F.2d 534, 538 (7
To prove embezzlement, the creditor must show that: (1) the debtor appropriated funds or property for his or her own benefit; and (2) the debtor did so with fraudulent intent or deceit. Id. For purposes of embezzlement, fraudulent intent "is knowledge that the use is devoid of authorization." In re Sherman, 603 F.3d 11 (1
Defendant admits that, while he was an FNA employee, he used the FNA VPN System to transfer trade secrets and confidential FNA materials to his personal email account and he also used a flash drive to copy such materials so he could work outside the office.
For example, Defendant admits that:
These documents constitute trade secrets and confidential information within the meaning of the Trade Secret Agreement. (Exhibit 20)
Defendant understood that he was required by his said Agreement to return all copies of such materials and information to FNA but admitted that he made no effort to return such materials to FNA following the termination of his relationship with FNA on August 29, 2012. (Trial Transcript at 307)
Defendant transferred the above-described FNA trade secrets and confidential information to his personal email account while he was an employee of FNA and then had authorized access to such documents and materials.
Defendant retained counsel to negotiate with FNA for a severance package in exchange for which Defendant offered, among other things, to allow FNA's experts to inspect his personal computer, return confidential security access codes and return other confidential information belonging to FNA. (Trial Transcript at 256-57, 259; Exhibit 42 at 35-38; Exhibits 27, 28, 30)
On March 11, 2013, Mr. Alexander received the Threatening Email warning that confidential FNA documents, such as shipping documents, invoices and e-mails would be sent to clients and others unless FNA did "what is right." (Exhibit 29)
The next day, Defendant's counsel admitted to FNA's counsel that "I'm advised that the quoted [anonymous] email was in response to Gus [Alexander's] text to my client . . ." (Exhibit 29)
Defendant has admitted that, at that time, his counsel was authorized to represent Defendant in settlement with FNA, and the state court found that Defendant's counsel admitted that Defendant was the source of the Threatening Email. (Trial Transcript at 256-57, 259; Exhibit 42 at 35-38; Exhibit 42 at 58)
Likewise this Court finds that Defendant was the source of the Threatening Email.
Defendant improperly continued to withhold FNA's trade secret and confidential documents and information and used such possessions in conjunction with his threats in an attempt to extort FNA while he was negotiating a severance package with FNA, thereby using FNA property as a lever in an effort to obtain a severance package for his benefit.
In connection with his employment at FNA, Defendant executed a Trade Secret/Non-Disclosure Agreement which defined "Trade Secret" to mean:
(Exhibit 20 at 1)
The Trade Secret Agreement required Defendant to acknowledge that the trade secrets were the sole and exclusive property of FNA and that Defendant was required to "surrender possession of all such trade secrets" to FNA upon termination of his relationship with FNA. (Exhibit 20 at 2)
The Trade Secret Agreement also defined "confidential information" to include:
(Exhibit 20 at 3)
The Trade Secret Agreement required that upon termination of his relationship with FNA, Defendant was to return all physical "evidence" of confidential information," which included "copies, records, documents, models or other expressions of the confidential information." (Exhibit 20 at 4)
Defendant does not dispute that he was bound by the Trade Secret Agreement and admits that the signature on that document looks like his signature. (Trial Transcript at 306)
Defendant had a duty to return all trade secrets and confidential information to FNA at or soon after the time he resigned as an employee of FNA.
Debtor was aware that FNA requested him to honor his duty under the Trade Secrets Agreement to return all confidential materials; within days after Defendant's resignation, FNA's president, Gus Alexander, sent an email to Defendant which, among other things, requested return of all FNA property, files and records. Mr. Alexander also requested that Defendant deliver his personal Laptop and other devices to FNA so that confidential data and software could be removed:
September 5, 2012 email from Mr. Alexander to Defendant, Exhibit 23)
Defendant did not respond to this request and, on September 19, 2012, Mr. Alexander sent another email reminding Defendant of his duty to return all confidential materials and documents to FNA and again requesting inspection of Defendant's personal Laptop.
(Exhibit 26)
FNA requested an inspection of Defendant's Laptop and other devices because Defendant frequently used the FNA VPN System which allowed him to access, from a remote location, his FNA Desktop and Hard Drive. (Trial Transcript 203; Exhibit 43 at 103)
As Director of Operations and Logistics and as head of Security, Defendant had access to of FNA's confidential information and documents regarding its shipping, logistics and worldwide freight forwarders. (Trial Transcript at 201, 331)
Defendant had access to confidential pricing information, shipping analysis and spreadsheets regarding the import of spare parts. (Trial Transcript at 202, 214-216)
FNA believed that any information regarding technology, manufacturing process and cost was extremely confidential because it represents FNA's advantage over its competition. (Trial Transcript at 332-333)
FNA notified Defendant that it believed confidential documents were on Defendant's personal Laptop, yet Defendant refused to turn over the Laptop for inspection. (Trial Transcript at 311).
FNA requested return of its trade secret and confidential documents and information and requested inspection of Defendant's personal Laptop.
Defendant willfully breached his duty to FNA and retained such confidential information and trade secrets for his own purposes and for his own benefit.
Defendant retained FNA's confidential documents after resigning from FNA and did so with the knowledge that retaining FNA documents was "devoid of authorization." In re Sherman, 603 F.3d 11 (1
Defendant offered to allow inspection of his Laptop, which FNA believed contained confidential FNA documents, only if he obtained a satisfactory severance agreement with FNA.
Defendant's retention of FNA's documents was unauthorized and was done for his own benefit and purpose, that is, to provide Defendant with leverage in connection with the severance package negotiations with FNA.
Defendant threatened to release FNA's trade secret and confidential documents and information unless FNA agreed to a severance package acceptable to Defendant.
Accordingly, FNA has established by a preponderance of the evidence that it is entitled to relief under § 523(a)(4) based on the Defendant's embezzlement of FNA's confidential documents and materials. The relief it is entitled to consists of expenses that FNA must pay to Navigant Consulting and such other consequent damages that FNA is able to prove to the State Court in subsequent proceedings, all of which will be non-dischargeable.
"Larceny is proven for § 523(a)(4) purposes if the debtor has wrongfully and with fraudulent intent taken property from its owner." Matter of Rose, 934 F.2d 901, 903 (7
"Embezzlement differs from larceny only in that the original taking was lawful." Schaffer v. Dempster (In re Dempster), 182 B.R. 790, 802 (Bankr. N.D. Ill. 1995)
As provided by the testimony of its computer forensic expert, Mr. Nicholas Barone, FNA has established by a preponderance of the evidence that Defendant unlawfully transferred 4,600 FNA confidential and trade secret files at 1:51 a.m. on August 29, 2012. (Exhibit 17) The transfer was made approximately seven hours before Defendant formally resigned from FNA. (Exhibit 1)
The 4,600 files contained a variety of FNA trade secret and confidential information and documents including FNA financial spreadsheets, photographs of FNA operations, invoicing documents and AutoCAD files which are engineering drawings of products that FNA manufactures or contracts out to sub-manufacturers under confidentiality agreements. (Exhibit 39 at 69-72, 75; Exhibit 17)
Mr. Barone's expert opinion was that Defendant copied the 4,600 files shown on Exhibit 17 as having been accessed on August 29, 2012. (Exhibit 40 at 29).
Defendant offered no expert to contradict the expert opinion offered by Mr. Barone at the State Court Contempt Hearing. (Trial Transcript at 278) Rather, Defendant suggests that the 4,600 files, copied from Defendant's Western Digital Hard Drive at 1:51 a.m. were being backed up to FNA's server at odd hours in the middle of the night. (Trial Transcript at 154)
For reasons stated below, the testimony of Mr. Barone is found to be more credible than the explanation offered by Defendant that the 4,600 files were simply being backed up by FNA's server.
To begin with, Mr. Barone testified that he examined the Western Digital Hard Drive and he did not find a program on the Hard Drive associated with backing up of files. (Exhibit 40 at 52)
Mr. Barone also explained that, because the VPN System provided remote access to Desktop and Hard Drive, Defendant did not need to be physically present to transfer the 4,600 files on his Hard Drive. (Exhibit 40 at 61).
Additionally, Mr. Barone found evidence that, at that particular time, that is, 1:51 a.m. on August 29, 2012, Defendant's user I.D. was used to log onto the FNA VPN System. (Exhibit 40 at 61-60; Trial Transcript at 151) Logging onto the FNA VPN System is synonymous with logging on to Defendant's Desktop. (Exhibit 40 at 63)
Defendant is a layman with only limited technical knowledge of computer systems. (Trial Transcript at 199)
Defendant's testimony on the issue of possible backup was equivocal and he testified that the transfer of 4,600 files on August 29, 2012 "could be" a backup. (Trial Transcript at 197) Defendant continued, "I couldn't say for sure, but I testified that I believe it could be." (Id)
Defendant also testified that the backup of his Desktop was scheduled by the FNA IT Manager. (Trial Transcript at 158, 284) Defendant has no personal knowledge that the IT Manager scheduled the transfer of 4,600 files at 1:51 a.m. on August 29, 2012 (Trial Transcript at 158)
In response to a question from this Court, Defendant testified that, "When I use the word `backup,' it means it's storing the most recent information." (Trial Testimony at 154)
Yet, the overwhelming majority of files transferred at 1:51 a.m. on August 29, 2012 were old files, created many months and years prior to August 29, 2012. (See "File Created Date" column 4 of Exhibit 17)
The list, created by Mr. Barone, shows that hundreds of the 4,600 files transferred on August 29, 2012 at 1:51 a.m. were MP3 music files that were created on October 28, 2008 rather than recently created files. (Exhibit 17, column 1, ref. no. 1741 through 1252)
Defendant did not explain or demonstrate why an FNA backup system, which he testified copied only recent information, would copy hundreds of MP3 music and other FNA files created months and years before August 29, 2012.
On questioning by his own counsel, Defendant admitted that he had no personal knowledge as to when his Desktop was backed up:
Defendant offered no evidence, other than his denial, to contradict Mr. Barone's testimony that Defendant's I.D. was used to log onto the FNA VPN System at 1:51 a.m. on August 29, 2012. (Trial Testimony at 293-94)
FNA's other expert computer forensic witness, Mr. Saperstein, testified that confidential FNA Audio Files came from a non-FNA computer designated Demetrios-PC. (Exhibit 41 at 105, 106, 118)
The Audio Files of confidential FNA conversations were contained on a CD-ROM which was delivered in a sealed box in November or December, 2012, together with a threatening unsigned letter admitted as
Defendant offered no evidence to contradict the testimony of Mr. Saperstein. (Trial Transcript at 253)
Based on the evidence introduced at trial and the evidence offered at the State Court Contempt Hearing, the Court finds that Defendant logged onto the FNA VPN System at 1:51 a.m. on August 29, 2012 and transferred 4,600 FNA files to a location known to Defendant.
A great number of those 4,600 files, transferred by Defendant on August 29, 2012, contained trade secret and confidential information which Defendant was not authorized to possess given that he would resign seven hours later.
Based on Mr. Saperstein's expert testimony, the Court finds that Defendant obtained and then possessed the Audio Files which he was not authorized to remove from the FNA facility.
This Court further finds that Defendant's retention of FNA's documents was unauthorized and was done for his own benefit and purpose, that is, to provide Defendant with leverage in connection with the severance package negotiations with FNA.
This Court further finds that Defendant threatened to release FNA's trade secret and confidential documents and information unless FNA agreed to a severance package acceptable to Defendant. (Exhibit 3; Exhibit 29)
The evidence of fraudulent intent, offered by FNA at the State Court Contempt Hearings, and reintroduced into evidence before this Court is sufficient to establish embezzlement and is also sufficient to establish the fraudulent intent element required to establish larceny under § 523(a)(4).
Accordingly, FNA has established, by a preponderance of the evidence, that it is entitled to relief under § 523(a)(4) based on the Defendant's transfer to his control and then retention of FNA's confidential documents and materials. The amounts which FNA will pay to Navigant Consulting and such other consequent damages that FNA is able to prove to the State Court and which it may be awarded as a judgment in subsequent proceedings is non-dischargeable.
In Count II, FNA seeks nondischargeability for (i) injury to a party or its property caused by the Defendant; (ii) willfully; and (iii) maliciously. First Weber Group, Inc. v. Horsfall, 738 F.3d 767, 774 (7
An "injury" is a violation of another's legal right, for which the law provides a remedy. Id. Willfulness requires "a deliberate or intentional injury, not merely a deliberate intentional act that leads to injury." Id. (quoting Kawaauhua v. Geiger, 523 U.S. 57, 61 (1998)) (emphasis in original). Maliciousness requires proof of conscious disregard of a duty without just cause or excuse. Id.
Based on the evidence submitted at the State Court Contempt Hearings, and reintroduced here, it is found that Defendant injured FNA by causing the transfer of thousands of proprietary and confidential FNA files to Defendant's personal computer and Defendant's refusal to return such to FNA upon demand.
The transfer of these files by Defendant and Defendant's continued possession was willful and it forced FNA to retain forensic computer experts to examine all of the files on Defendant's Desktop and on the external hard drive connected to Defendant's Desktop at FNA. FNA has been invoiced over $200,000 by its forensic experts in connection with its attempt to recover its confidential information from Defendant.
Further, Plaintiff was required to retain counsel not only to negotiate with Defendant but also to seek recovery of the thousands of transferred files through state court litigation against Defendant during which the Contempt Orders were entered.
As discussed above, by a preponderance of the evidence, FNA established that, without authorization or excuse, Defendant transferred the Audio Tapes and, on August 29, 2012, the 4,600 files many of which contained confidential and trade secret materials belonging to FNA.
Defendant knew that he had a duty to return such information to FNA when he resigned on August 29, 2012, and yet Defendant retained such confidential and trade secret material.
Defendant was the author of the Threatening Email, sent to FNA's President, Mr. Alexander, on March 11, 2013 and Defendant threatened to release FNA files unless an acceptable severance payment was paid.
The Defendant failed to provide FNA with access to his personal laptop, and Defendant failed to return any of the thousands of proprietary and confidential files which FNA established that he transferred to his personal computer.
Based upon the evidence presented by FNA at trial and at the state court Contempt Hearing, the Court finds that the Debtor thereby inflicted an injury upon the Plaintiff knowing he had no legal justification to do so, and either desiring to inflict financial injury through expenses required for a technical investigation, knowing it was highly likely to result from his willful actions. The injury consisted of depriving Plaintiff of its right to sole possession and control of its secret data which created a threat to its commercial interests.
As discussed above, by a preponderance of the evidence, FNA established that Defendant committed intentional and wrongful acts which caused deliberate injuries to FNA by imposing expenses resulting from need to ascertain the nature of withheld data and recover Plaintiffs data without any just cause or excuse.
Accordingly, this Court concludes that the Defendant caused a willful and malicious injury and that FNA's claims are nondischargeable under § 523(a)(6).
Separate judgment orders will issue in favor of Plaintiff in accord with these Findings and Conclusions, each finding nondischargeable damages caused by Defendant's conduct described herein that may be adjudged in state court proceeding.