M. PAGE KELLEY, Magistrate Judge.
On April 7, 2017, plaintiff Trust Safe Pay, LLC (Trust Safe)
Presently before the court is defendants' motion to dismiss the amended complaint for failure to state a claim (##52, 53). Plaintiff has responded in opposition (#59), and defendants have replied (#62).
The facts as set forth in the amended complaint are as follows. In 2007, plaintiff's principal, Evelina, hired defendant Vilma to assist with a house cleaning business which Evelina owned. (#48 ¶ 7.) For the next seven years, Evelina, Darius, and the individual defendants interacted socially and became friends. Id. ¶ 8.
In 2009, Evelina and Darius began a business "representing weight loss products." Id. ¶ 9. As part of this process, they created an "algorithm" to facilitate the online marketing of their business. Id. ¶ 12. According to plaintiff, "the algorithm had a significant value" because it "generated substantially improved visitor intention accuracy, visitor time retention on the websites, increased percentage of sales for any given visitor amount (new end users to Plaintiff's websites) and new sales generated." Id. ¶ 14. In an effort to protect the algorithm, Evelina and Darius locked the basement of their home — the room out of which the business was operating — and password protected the computer that held "the passwords to all the third party advertising accounts[ ] and the secret words and word combinations that formed the algorithm." Id. ¶ 16.
In April of 2012, Evelina and Darius needed someone to run the packaging and shipping portion of the business while they took a vacation. Id. ¶ 17. Vilma offered her assistance and was paid for the work she performed. Id. ¶¶ 18, 19. Vilma was afforded access to confidential information to include: "revenues generated, the costs of the business, the number of customers Plaintiff had and was acquiring daily, the location of Plaintiff's biggest customer base, and the profit margin realized by Plaintiff." Id. ¶ 20.
It is plaintiff's position that, after learning the inner workings of the business, the individual defendants decided to "misappropriate the algorithm and all other proprietary information [that] made Plaintiff a successful business" and "to start their own diet/supplement internet business." Id. ¶ 21. Thereafter, Vilma offered repeatedly to babysit Evelina and Darius's children and was allowed to do so. Id. ¶¶ 23, 24. According to plaintiff, Vilma, who knew the location of the key to the locked basement from her prior work for the business, used her time babysitting to attempt to learn the password to plaintiff's computers
From April 2012 through January —, Kostas spoke with Darius regularly regarding Kostas's intention to start an online electronic cigarette business, asking Darius how to run such a business and increase sales. Id. ¶ 28. During this same period, Vilma spoke regularly with Evelina about Trust Safe and what "solutions [Evelina] [was] implementing to advance her business." Id.
In April and July of —, the individual defendants purchased domain names for their "copycat" websites. Id. ¶ 30. In January 2015, the individual defendants incorporated Dynamic. Id. ¶ 32. At this point plaintiff became aware of "a new competitor that was bidding on the same keywords Plaintiff used in its algorithms."
Plaintiff contends that since the launch of defendants' competing websites, in January 2015, Trust Safe's revenue generated from California, which is the location from which it obtains the largest portion of its customer base and sales, has shown the "largest decline." Id. ¶¶ 37, 38.
A Rule 12(b)(6) motion to dismiss challenges a party's complaint for failing to state a claim. In deciding such a motion, a court must "`accept as true all well-pleaded facts set forth in the complaint and draw all reasonable inferences therefrom in the pleader's favor.'" Haley v. City of Boston, 657 F.3d 39, 46 (1st Cir. 2011) (quoting Artuso v. Vertex Pharm., Inc., 637 F.3d 1, 5 (1st Cir. 2011)). When considering a motion to dismiss, a court "may augment these facts and inferences with data points gleaned from documents incorporated by reference into the complaint, matters of public record, and facts susceptible to judicial notice." Haley, 657 F.3d at 46 (citing In re Colonial Mortg. Bankers Corp., 324 F.3d 12, 15 (1st Cir. 2003)).
In order to survive a motion to dismiss under Rule 12(b)(6), the plaintiff must provide "enough facts to state a claim to relief that is plausible on its face." See Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007). The "obligation to provide the grounds of [the plaintiff's] entitlement to relief requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do." Id. at 555 (internal quotation marks and alteration omitted). The "[f]actual allegations must be enough to raise a right to relief above the speculative level," and to cross the "line from conceivable to plausible." Id. at 555, 570.
"A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged." Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (citing Twombly, 550 U.S. at 556). However, the court is "`not bound to accept as true a legal conclusion couched as a factual allegation.'" Id. at 678 (quoting Twombly, 550 U.S. at 555). Simply put, the court should assume that well-pleaded facts are genuine and then determine whether such facts state a plausible claim for relief. Id. at 679.
"To establish copyright infringement under the Copyright Act, `two elements must be proven: (1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.'" Johnson v. Gordon, 409 F.3d 12, 17 (1st Cir. 2005) (quoting Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361 (1991)). Plaintiff bears the burden of proof on both elements. Id.
Subsection (A) of 17 U.S.C. § 411 states that "no civil action for infringement of the copyright in any United States work shall be instituted until preregistration or registration of the copyright claim has been made in accordance with this title." Nowhere in the amended complaint does Trust Safe claim to be the owner of a validly registered copyright. Thus, plaintiff's claim, if viable, must satisfy the "preregistration" component of the statute. The amended complaint asserts that "Plaintiff is the assignee of three (3) applications for copyright registrations in works of visual art, which include[] various web-pages of Plaintiff's websites, application numbers 1-3998164856; 1-3998164250; 1-4018230311 . . . ." (#48 ¶ 41.) Trust Safe takes the position that this allegation is sufficient to pass muster under § 411. See #59 at 10.
The mere allegation that a defendant copied the work of a plaintiff is insufficient, on its own, to establish a claim for copyright infringement. See Johnson, 409 F. 3d at 18 ("copying does not invariably constitute copyright infringement") (citing Feist, 499 U.S. at 361).
McGee v. Benjamin, No. CIV.A. 08-11818-DPW, 2012 WL 959377, at *5 (D. Mass. Mar. 20, 2012) (alteration in original); Calden v. Arnold Worldwide LLC, No. CIV.A. 12-10874-FDS, 2012 WL 5964576, at *4 (D. Mass. Nov. 27, 2012).
Actual copying may be shown via direct or circumstantial evidence. Johnson, 409 F.3d at 18 (citing Segrets, Inc. v. Gillman Knitwear Co., 207 F.3d 56, 60 (1st Cir. 2000)).
Id. (citing Lotus Dev. Corp. v. Borland Int'l, Inc., 49 F.3d 807, 813 (1st Cir. 1995), aff'd, 516 U.S. 233 (1996)). Taking the facts alleged in a light most favorable to plaintiff, defendants, through Vilma's babysitting and/or defendants' repeated visits to plaintiff's website, may well have had access to plaintiff's protected material.
The next step in establishing actual copying requires plaintiff to demonstrate the existence of some probative similarity
As a threshold matter, it is unclear whether plaintiff's algorithm is even included in its copyright applications. More troubling is the amended complaint's failure to allege with any specificity how defendants copied these protected materials. Plaintiff merely asserts that defendants visited plaintiff's website repeatedly, and that "Defendants' websites would be changed in the exact ways Plaintiff would change its website." (#48 ¶ 36); see also #59 at 13 ("the [amended complaint] details the facts and circumstances of the misappropriation and that Defendants have been copying the website, verbatim, each time any alteration was made.[ ] This simultaneously illustrates the substantial similarity between Plaintiff's protectable works and Defendants' infringement of the works.") (internal citation omitted).
Plaintiff's conclusory assertions, without identification of the specific content that was protected or any explanation as to how defendants' conduct violated plaintiff's copyright protection, frustrate any effort to compare the parties'materials. See Iqbal, 556 U.S. at 678; see also McGee, 2012 WL 959377, at *6 (addressing a plaintiff's claim for copyright infringement with respect to animated television programs, the court concluded that "the plaintiff must point to some more specific similarities than `location, characters, content, format, and dramatis personnae' for his claim to survive.") (emphasis in original). As plaintiff fails to proffer any specific similarities, it thus fails to show that defendants actually copied its protected material.
The substantial similarity requirement focuses holistically on the works in question and entails proof that the copying was so extensive that it rendered the works so similar that the later work represented a wrongful appropriation of expression. See Yankee Candle Co. v. Bridgewater Candle Co., 259 F.3d 25, 33 (1st Cir. 2001); Segrets, 207 F.3d at 60. [. . .]
Johnson, 409 F.3d at 18 (some alteration in original).
The court need not, and cannot, address the question of substantial similarity in this case. See Calden, 2012 WL 5964576, at *5 ("A court must only address the question of substantial similarity if it identifies any probative similarity from which it can infer actual copying. Because the complaint fails to sufficiently allege actual copying and the Court is unable to identify any probative similarity, the Court need not determine whether the complaint adequately alleges substantial similarity.") (citing McGee, 2012 WL 959377, at *5). In like manner to its failure to satisfy the probative similarity component of actual copying, the amended complaint fails to provide enough detail with respect the works in issue to allow for any analysis of their supposed substantial similarity. As such, the amended complaint, as pled, fails to state a viable claim for copyright infringement. Plaintiff's claim for copyright infringement is dismissed without prejudice.
As explained above, Trust Safe fails to make a prima facie showing of direct copyright infringement by defendants: it is unclear whether plaintiff has satisfied the preregistration requirement; Trust Safe has not identified adequately the protected material or defendants' infringement of it; and the court is unable to discern any similarity between the parties' materials. Given these deficiencies in the amended complaint, Trust Safe's claims of secondary liability crumble. See Greenspan v. Random House, Inc., 859 F.Supp.2d 206, 219 (D. Mass. 2012), aff'd sub nom. Greenspan v. Random House, Inc., No. 12-1594, 2012 WL 5188792 (1st Cir. Oct. 16, 2012) ("Absent an actionable claim for direct copyright infringement, the claims for contributory or vicarious infringement must also fail.").
Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 930-31 (2005) (alteration in original) (footnote omitted).
Greenspan, 859 F. Supp. 2d at 219 (some alteration in original). For these reasons, Trust Safe's secondary liability claims are dismissed without prejudice.
Trust Safe advances claims for the misappropriation of trade secrets under Mass. Gen. Laws ch. 93, §§ 42 and 42A as well as the common-law equivalent. See #48 ¶¶ 62-68, 78-85. When such claims are premised on the same factual basis, as is the case here, they may be deemed essentially equivalent. See Incase Inc. v. Timex Corp., 488 F.3d 46, 59 n. 10 (1st Cir. 2007); Burten v. Milton Bradley Co., 763 F.2d 461, 462 (1st Cir. 1985) ("Appellants amended complaint alleged . . . two counts of trade secret misappropriation, one based on common law tort and the other on Mass. Gen. Laws Ann. ch. 93, § 42, which essentially codifies the common law.") (footnote omitted); Karter v. Pleasant View Gardens, Inc., No. CV 16-11080-RWZ, 2017 WL 1224543, at *8 n. 8 (D. Mass. Mar. 31, 2017).
Under Massachusetts General Laws,
Mass. Gen. Laws ch. 93, § 42.
"A trade secret may consist of any formula, pattern, device or compilation of information which is used in ones business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it." J.T. Healy & Son, Inc. v. James A. Murphy & Son, Inc., 357 Mass. 728, 736 (1970) (citing Restatement of Torts, § 757, comment b); see also Mass. Gen. Laws ch. 266, § 30(4) ("The term `trade secret' . . . means and includes anything tangible or intangible or electronically kept or stored, which constitutes, represents, evidences or records a secret scientific, technical, merchandising, production or management information, design, process, procedure, formula, invention or improvement."). "It is hornbook law that the parties and the court cannot accurately decide the question of whether a trade secret exists without first understanding what precisely is asserted as a secret. . . . Analysis becomes difficult, however, when a plaintiff is unable or simply refuses to identify its alleged trade secret adequately." Sutra, Inc. v. Iceland Exp., ehf, No. CIV.A. 04-11360-DPW, 2008 WL 2705580, at *3 (D. Mass. July 10, 2008) (internal citation and quotation marks omitted).
EMC Corp. v. Pure Storage, Inc., No. CV 13-12789-JGD, 2016 WL 7826662, at *5 (D. Mass. Aug. 19, 2016).
The crux of both of Trust Safe's misappropriation claims is that defendants wrongfully took and used its algorithm.
As stated in the amended complaint,
(#48 ¶ 12.)
Trust Safe's misappropriation claims fail for want of adequate identification of the trade secret in issue. See Sutra, Inc., 2008 WL 2705580, at *4 ("A plaintiff has no cognizable trade secret claim until it has adequately identified the specific trade secrets that are at issue.") (citing Cambridge Internet Solutions v. Avicon Group, No. 99-1841, 1999 WL 959673, at *2 (Mass. Super. Sept. 21, 1999) (internal quotation marks omitted)). Given that plaintiff may well have a valid claim, and the basis for dismissal is a lack of detail in the allegations, Trust Safe's misappropriation of trade secrets claims, Counts IV and VI, are dismissed without prejudice.
To make out a viable claim for fraud, plaintiff "must establish that the defendants [1] made a false representation of material fact, [2] with knowledge of its falsity, [3] for the purpose of inducing the plaintiffs to act on this representation, [4] that the plaintiffs reasonably relied on the representation as true, and [5] that they acted upon it to their damage." Cumis Ins. Soc'y, Inc. v. BJ's Wholesale Club, Inc., 455 Mass. 458, 471 (2009) (citing Masingill v. EMC Corp., 449 Mass. 532, 540, 870 N.E.2d 81 (2007)). Rule 9(b), Fed. R. Civ. P., mandates that a heightened pleading standard be applied to fraud claims, including state law fraud claims asserted in federal court. See N. Am. Catholic Educ. Programming Found., Inc. v. Cardinale, 567 F.3d 8, 13 (1st Cir. 2009). "The heightened requirement serves `(1) to place the defendants on notice and enable them to prepare meaningful responses; (2) to preclude the use of a groundless fraud claim as a pretext to discovering a wrong or as a "strike suit"; and (3) to safeguard defendants from frivolous charges which might damage their reputations.'" Enercon v. Glob. Computer Supplies, Inc., 675 F.Supp.2d 188, 191 (D. Me. 2009) (quoting New England Data Servs., Inc. v. Becher, 829 F.2d 286, 289 (1st Cir. 1987)).
The fraudulent representations as alleged in the amended complaint are twofold: 1) Vilma's offer to babysit Evelina and Darius's children; and 2) Kostas's
"A party will be liable under Chapter 93A if it engages in an `unfair method of competition' or an `unfair or deceptive act or practice.'" Incase Inc., 488 F.3d at 56 (quoting Mass. Gen. Laws ch. 93A, § 11). Understanding that Trust Safe's 93A claim is tethered to defendants' actions as limned in the preceding six claims, and that those claims are dismissed without prejudice for want of detail, the court is unable to address the merits of plaintiff's 93A claim. As such, Trust Safe's 93A claim, Count VII, is dismissed without prejudice.
For all of the reasons stated, Defendants' Motion to Dismiss for Failure to State a Claim (#52) is ALLOWED without prejudice to Trust Safe's filing of a second amended complaint.
CMI Assocs., LLC v. Reg'l Fin. Co., LLC, 775 F.Supp.2d 281, 288 (D. Mass. 2011) (quoting Mass. Gen. Laws ch. 156C, § 22) (some alteration in original). There thus exists the potential that some of the claims asserted against the individual defendants are statutorily barred if they were acting in their official capacity as members of Dynamic. Dynamic's status as a LLC is unclear, and therefore the court need not address the potential of piercing the corporate veil at this time. Should Trust Safe choose to file a repleader, the issues concerning Dynamic's LLC status and the lack of specificity in the amended complaint's allegations must be addressed. Trust Safe's bald assertion that "Defendants . . . conspired and. . . act[ed] pursuant to said conspiracy" (#48 ¶ 6), does not ameliorate these problems.