WILLIAM L. OSTEEN, Jr., District Judge
Advanced Instructional Systems, Inc. ("AIS") has brought suit against Competentum USA, Ltd. ("Competentum"), for theft of trade secrets, copyright infringement, and computer trespass among others.
This court finds that AIS has met the requirements for a TRO. AIS has advanced evidence that (1) Competentum or employees acting on Competentum's behalf have repeatedly and systematically accessed AIS's secured server; (2) Competentum has admitted to this access; (3) Competentum is working on releasing a rival software suite similar to WebAssign; and (4) planning materials found on the internet that involve the development of this rival platform reference WebAssign's proprietary software architecture as well as terminology found only in its proprietary Grading Statements, located on the secure server.
WebAssign in an employee-owned benefit corporation organized under Virginia law, whose business provides online instructional systems software that allows teachers to deploy assignments and tests that are graded automatically. (
In 2006, WebAssign contracted with a predecessor of Competentum, named Open Teach Software, Inc. ("Open Teach"), and all work was completed under that contract in January 2009. WebAssign contracted with Competentum in January 2012 and in March 2012, and all work was completed under those contracts by August 2012. (First Am. Compl. (Doc. 10) ¶¶ 29-35.) During the course of this contracting, employees of both Open Teach and Competentum were given access credentials to WebAssign's secured server, access that WebAssign contends was limited by the terms of their agreements to the specifically defined work and were explicitly not to be used after the expiration of the contract at issue. (
Sometime in April of 2014, as part of a routine review of existing accounts, WebAssign discovered that two user IDs that had been assigned as part of already completed work had been used to access the secured server.
WebAssign contacted the CEO of Competentum, who admitted that they had accessed the server, claimed that it was done as part of a "content review" that had been commissioned by Cengage, and promised to explain further, which apparently never happened.
WebAssign has also discovered, via online searches, that Competentum and Cengage are attempting to create a competitor to WebAssign, and, according to WebAssign, materials that also confirm the use of WebAssign's proprietary material. The materials make reference to Grading Statements, reference employees whose accounts were used to access the secured server as helping to create the content, and refer to efforts to build a Parser system. (
This court has jurisdiction over the parties pursuant to 28 U.S.C. §§ 1331 and 1332.
Federal Rule of Civil Procedure 65(b) governs the availability of a TRO to preserve the status quo until a hearing on a motion for preliminary injunction can be held.
The requirements for obtaining temporary and preliminary injunctive relief are the same.
WebAssign discusses three of its claims in its brief in support of its motion. Because this court finds, at this preliminary stage, that the trade secrets claim and the trespass claim support the issuance of a TRO, this order will analyze only those claims for likelihood of success on the merits. Plaintiff bears a heavy burden and must make "`a clear showing' that, among other things, it is likely to succeed on the merits."
Plaintiff bears a heavy burden and must "make a strong showing of likelihood of success on the merits."
A trade secret is defined in N.C. Gen. Stat. § 66-152(3) as:
N.C. Gen. Stat. § 66-152(3).
Here, it seems clear that the software code for Grading Statements and Parser qualify as trade secrets.
In order to succeed on a prima facie case for misappropriation of a trade secret, Plaintiff must present substantial evidence that "(1) defendant knows or should have known of the trade secret; and (2) defendant has had a specific opportunity to acquire the trade secret."
First, Plaintiff have proffered documented evidence that Defendant knew of the trade secrets at issue in that they were contracted to work on the server that contained them (and were thus exposed to at least the Grading Statements), as well as evidence that they are not only attempting to create their own, but that they also have specifically and repeatedly referenced proprietary terminology from the trade secrets at issue in their internal materials, as well as attempted to break down and replicate the WebAssign internal architecture. (
As for the second prong, Plaintiff has offered ample evidence that Competentum had a specific opportunity to acquire those trade secrets. Plaintiff has offered documented evidence of repeated and systematic access of its secured server via the use of former contractors that currently work for Competentum or an affiliate, and on top of that, Competentum has admitted to the access. As such, this prong seems clearly met. Given the evidence presented, Plaintiffs have shown a likelihood of success on the merits for their trade secrets claim.
WebAssign's computer trespass claim is also likely to succeed on the merits. Under N.C. Gen. Stat. § 14-458, it is a violation of the statute to use a computer or computer network "without authorization," and with the intent to do any of the following:
N.C. Gen. Stat. § 14-458.
"[W]ithout authorization" is defined in the statute as
Here, it seems clear that the employee accounts that were used by Competentum's employees to access the secured server were used beyond the scope of the authorization granted. Those user IDs had been granted only for specific work over a specific timeframe (
WebAssign has further provided evidence that, while accessing the server without permission, they altered and/or erased data within the system, which constitutes the second prong of Computer Trespass. Given that they have what seems to be evidence of unauthorized access, and alteration or deletion of information during that access,
Defendant has presented evidence of a defense to Plaintiff's claims which, if viable, might affect the foregoing analysis. However, at this preliminary stage, this court does not find Defendant's evidence compelling.
Defendant argues that its access to Plaintiff's confidential information was authorized by Cengage, a third-party doing business with Plaintiff. While this allegation may ultimately turn out to be correct, Defendant's claim, when considered in light of Defendant's use of authorizations which do not appear to have been issued for the purposes claimed, their use of older authorizations after some authorizations had been discontinued, and in light of the material accessed, is not persuasive at this preliminary juncture.
Relatedly, Defendant has filed with the court a contract presently existing between Plaintiff and Cengage, and argues that provisions in the contract further support Cengage, and therefore Defendant's authorization to access the trade secret information. While Defendant's interpretation of the contract may ultimately prove correct, this court does not preliminarily read the contract so broadly as Defendant contends.
It further seems that, at least based on their claim for Misappropriation of Trade Secrets, that Plaintiff will suffer irreparable harm if injunctive relief is not granted. While Plaintiff must make a "clear showing" of immediate and irreparable harm, the loss of permanent relationships with customers and the loss of proprietary information may constitute irreparable harm.
Defendant argues that Plaintiff has delayed in seeking preliminary relief, and therefore a temporary restraining order is not required. Defendant contends Plaintiff was aware of Defendant's access as early as April, 2014, and certainly by October, 2014. Plaintiff responds that while it was aware of the access, it initially contacted Defendant to determine what had occurred and resolve the matter. Plaintiff only recently discovered that in November, 2014, when Defendant had claimed any unauthorized access was inadvertent, it was at that same time presenting information apparently derived from Plaintiff's trade secret information. This court does not find Defendant's argument presently compelling.
As an initial matter, it is not clear that Defendant has shown or that WebAssign knew that a trade secret was taken or used when the initial unauthorized access was discovered. This court, again preliminarily, finds that WebAssign's discovery of the nature of the access to its servers and potential use of any information derived therefrom, only came later.
The Fourth Circuit has addressed the issue of delay in
23 F. App'x 134, at *3 (2001).
Although it is a close question, this court finds that the balance of the equities also tips in WebAssign's favor. As stated above, it seems clear that WebAssign will undergo significant hardship if Competentum is not prevented from using WebAssign's trade secrets to launch a competing software suite and likely steal a valuable client.
At the very least, it is far less clear what harm will befall Competentum by the issuance of a temporary injunction until a preliminary injunction can be completed. While Competentum may be delayed in launching their software, there is no evidence that time is of the essence in that endeavor, or that they will lose any current business opportunities by the issuance of a temporary injunction.
Further, it should be noted that Competentum was approached by WebAssign and given a chance to explain its actions
Finally, the public interest also favors WebAssign. "Put simply, the public interest favors the protection of trade secrets."
For the reasons described herein, this court finds that a Temporary Restraining Order should be issued, returnable within 14 days of the date of this Memorandum Opinion and Order. Because of the limited scope of this Memorandum Opinion and Order and the limited time during which this Memorandum Opinion and Order shall remain effective, this court finds that a bond in the amount of $10,000.00 shall be sufficient.