CDK GLOBAL, LLC, Plаintiff, v. TEKION CORP., et al., Defendants.
Case No. 25-cv-01394-JSC
UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA
July 15, 2025
Re: Dkt. Nos. 45, 52
ORDER RE: CDK‘S MOTION FOR PRELIMINARY INJUNCTION & INDESIGN‘S MOTION TO DISMISS
CDK Global, LLC (“CDK“) sues Tekion Corp. (“Tekion“) and InDesign Data, LLC (“InDesign“) for illicitly entering its Dealer Management System (DMS) to extract CDK‘s proprietary data. (Dkt. No. 1.)1 Now before the Court are CDK‘s motion for preliminary injunction and InDesign‘s motion to dismiss the complaint. (Dkt. Nos. 45, 52.) After careful consideration of the parties’ briefing, and having had the benefit of oral argument on June 26, 2025, the Court DENIES CDK‘s motion for preliminary injunction and GRANTS in part and DENIES in part InDesign‘s motion to dismiss.
BACKGROUND
I. Complaint Allegations
“CDK is the leading automotive retail software provider[,]” that serves dealerships in the automotive and trucking industry. (Dkt. No. 1 ¶ 1.) CDK‘s Dealer Management System (“DMS“) “is a suite of powerful software tools that equip dealers with the solutions they need in one fully integrated platform.” (Id. ¶¶ 2-3.) The DMS “provides the infrastructure and intellectual property necessary for [CDK‘s automotive] ecosystem to function.” (Id. ¶ 24.) “CDK‘s DMS and related
“As CDK‘s contracts with Dealerships and third parties make clear, the DMS is the sole and exclusive property of CDK.” (Id. ¶ 27.) “CDK grants dealerships who purchase its DMS services a personal, non-transferable, license to use CDK‘s DMS in accordance with the terms and conditions of their agreement with CDK.” (Id. ¶ 28.) “The Dealerships, through their access to the DMS, have access to highly sensitive, commercially valuable data belonging to consumers (e.g., the car-buying public), OEMs [“original equipment manufacturers“],2 other third parties, and CDK itself.” (Id. ¶ 33.) Similarly, CDK‘s “trade secrets and proprietary information are embedded within the DMS.” (Id. ¶ 35.)
Given the sensitivity of much of this information, “CDK keeps its applications behind firewalls and demands access only through private networks.” (Id. ¶ 39.) Thus, Dealerships use a virtual private network (“VPN“) or a lease-line multiprotocol label switching network (“MPLS“) to communicate between the dealership‘s network and CDK‘s network. (Id. ¶¶ 38, 42.) “By design, the CDK network only accepts electronic communications from devices (i.e., computer workstations) tied to internet protocol (‘IP‘) addresses on the corresponding local Dealership network that have been authorized by CDK to access” CDK‘s DMS. (Id. ¶ 43.) Dealership employees “only ha[ve] access to the parts of the DMS necessary to perform their job functions.” (Id. ¶ 47.) So, typically, employees lack “administrator-level privileges to access all DMS functions, create new DMS users, or access CDK‘s proprietary formulas, code, and similar confidential CDK data. CDK requires Dealerships to designate a limited group of employees, qualified in information management and technology, to receive administrator-level access privileges.” (Id.) And each employee accessing the DMS “must certify that she is a Dealership employee authorized to access the DMS.” (Id. ¶ 49.)
“Dealerships are contractually prohibited from giving unauthorized third parties access to the DMS and the CDK Trade Secrets, including login credentials meant for use solely by Dealership employees.” (Id. ¶ 50.) CDK and dealerships enter into a Master Services Agreement (“MSA“) where each dealership agrees to only “use CDK‘s software for its own internal business purposes and will not sell or otherwise provide, directly or indirectly, any Products or Services, or any portiоn thereof, to any third party.” (Id. ¶ 53.) Importantly, “CDK‘s standard MSA expressly prohibits the Dealership from supplying login credentials to third parties or otherwise granting third parties access to the DMS.” (Id. ¶ 55.) But at the expiration of an MSA, dealerships sometimes seek to move to a different DMS provider, such as Tekion, which necessitates “transferring the Dealership‘s data to the new provider under the terms of the MSA.” (Id. ¶ 62.) “Since April 2020, CDK has completed dozens of data conversions for Dealerships leaving CDL for Tekion and has likewise received from Tekion dozens of data conversions for customers joining CDK.” (Id. ¶ 63.)
“In April 2024, CDK learned that Tekion had entered an engagement to provide ‘Automotive Retail Cloud’ services at four locations for one of CDK‘s Dealerships before the end of the year,” but this dealership had already elected to renew its MSA with CDK through April 2025. (Id. ¶¶ 64-65.) So, “CDK wrote Tekion on April 2, 2024, advising of CDK‘s rights and the Dealership‘s obligations under the MSA,” specifically noting Tekion was prohibited from accessing CDK‘s DMS and its trade secrets. (Id. ¶¶ 67-69.) Tekion acknowledged receipt of the letter on April 5, 2024, but at some point that same year, “Tekion began working hand-in-hand with InDesign to provide Dealerships software scripts and technical assistance to conduct mass data exports from the DMS.” (Id. ¶¶ 70-71.) InDesign‘s product DMSConnect, also known as 1DMS, “is designed for InDesign to be able to access, scrape, and collect data from CDK‘s DMS without CDK‘s permission.” (Id. ¶¶ 72-73.) InDesign and Tekion solicit dealerships conducting data transfers to Tekion to sign engagements with InDesign whereby “InDesign would be provided unauthorized access to the DMS in order to allow InDesign to install its data extraction software, ‘1DMS’ on the Dealership‘s computers, which arе connected by VPN or MPLS to CDK‘s servers containing the DMS.” (Id. ¶ 75.) “Deploying 1DMS necessarily requires that
In November 2024, CDK began an investigation into Tekion‘s conduct after it received a forwarded email conversation from one of its customer dealerships. (Id. ¶¶ 78-80.) In the underlying email chain, a Tekion employee claimed he was tasked with “gaining access to the CDK system,” and said he would ship the dealership a VPN endpoint device which “would allow Tekion to build a ‘tunnel’ from its network to the Dealership network.” (Id. ¶ 81.) The Tekion employee then requested the dealership “provide login credentials for the DMS” and explained that, once the VPN device was installed, “Tekion would be able to extract dаta from the DMS.” (Id.) CDK thereafter began an investigation where it discovered Tekion would “create user accounts and run software scripts that download information from the DMS to Tekion‘s virtual desktops.” (Id. ¶¶ 83-85.) CDK then “disabled the [Tekion] user credentials to prevent further unauthorized access.” (Id. ¶ 86.) Since November 1, 2024, “CDK has disabled dozens of Tekion user credentials.” (Id. ¶¶ 87-89.) CDK sent Tekion a cease-and-desist letter on December 6, 2024, regarding this activity, but “Tekion persisted in using a multitude of methods to gain unauthorized access to the DMS and computer systems.” (Id. ¶¶ 90-92.)
On December 10, 2024, CDK was informed by another dealership Tekion had contacted it to perform the same process to extract its data from the CDK DMS. (Id. ¶¶ 93-94.) And again, on December 17, 2024, the same dealership forwarded another email chain from Tekion and InDesign where both Defendants “were attempting to pеrsuade the Dealership to covertly allow Defendants to latch onto the DMS to extract data.” (Id. ¶¶ 94-97.) Specifically, after the dealership expressed its MSA had a designated process for data transfer, InDesign responded “If for any reason they‘re not able to [approve data transfer], or they don‘t give you AR Approval, then we can be your Plan B.” (Id. ¶¶ 99-100.) “Each time that Defendants access the DMS through a Dealership computer, they access and use valuable pieces of CDK‘s intellectual property,” creating copies of CDK‘s DMS program code, page layouts, graphics, text, organization, and displays in their computers’ temporary memory. (Id. ¶¶ 110-11.)
II. Procedural Background
CDK sues Tekion and InDesign for:
- Violation of the Computer Fraud and Abuse Act (CFAA)
18 U.S.C. § 1030 ; - Violation of the Digital Millenium Copyright Act (DMCA)
17 U.S.C. § 1201 ; - Violation of the Stored Communications Act (SCA)
18 U.S.C. § 2701 ; - Misappropriation of trade secrets under
18 U.S.C. § 1836 ; - Violation of California‘s Comprehensive Computer Data Access and Fraud Act (DAFA);
- Misappropriation of trade secrets under
California Civil Code § 3426 ; - Tortious Interference with existing business relations under California law;
- Unfаir business practices under the Unfair Competition Law (“UCL“).
(Id.) CDK seeks injunctive relief and damages against both Defendants.
Tekion sued CDK in December 2024 for alleged antitrust violations. Tekion v. CDK, No. 24-cv-08879 (Dkt. No. 1). On February 10, 2025, CDK moved to dismiss Tekion‘s complaint under Federal Rule of Civil Procedure 12(b)(6), and instituted the present action against both Tekion and InDesign. The Court then related both cases. (Dkt. No. 19.) CDK moved for a preliminary injunction in this case and at the same time moved to dismiss the complaint against it in the related case. (Dkt. No. 45); Tekion v. CDK., No. 24-cv-08879 (Dkt. No. 23). InDesign subsequently filed a motion for summary dismissal of CDK‘s motion for preliminary injunction and to expedite briefing, which the Court denied. (Dkt. Nos. 46, 47, 51.) The Court extended the briefing schedule for CDK‘s motion for preliminary injunction after the parties stipulated to do so. (Dkt. No. 49.)
Now pending before the Court is CDK‘s motion to preliminarily enjoin Defendants’ access to dealer data on its proprietary DMS (Dkt. No. 45), and InDesign‘s motion to dismiss CDK‘s complaint for failure to state a claim under Federal Rule of Civil Procedure 12(b)(6). (Dkt. No. 52.)
//
//
ANALYSIS
I. Motion for Preliminary Injunction
“A preliminary injunction is an extraordinary and drastic remedy, one that should not be granted unless the movant, by a clear showing, carries the burden of persuasion.” Apartment Ass‘n of Los Angeles Cnty., Inc. v. City of Los Angeles, 10 F.4th 905, 911 (9th Cir. 2021) (emphasis in original); see also Atwood v. Shinn, 36 F.4th 901, 903 (9th Cir. 2022) (holding the movant must make a “clear showing” it is entitled to preliminary injunctive relief) (quoting Mazurek v. Armstrong, 520 U.S. 968, 972 (1997) (per curium)).
To obtain a preliminary injunction, a plaintiff “must establish that he is likely to succeed on the merits, that he is likely to suffer irreparable harm in the absence of preliminary relief, that the balance of equities tips in his favor, and that an injunction is in the public interest.” Winter v. Natural Res. Def. Council, Inc., 555 U.S. 7, 20 (2008). “A preliminary injunction may also be appropriate if a movant raises ‘serious questions going to the merits’ and the ‘balance of hardships ... tips sharply towards’ it, as long as the second and third Winter factors are satisfied.” Disney Enters., Inc. v. VidAngel, Inc., 869 F.3d 848, 856 (9th Cir. 2017) (citation omitted).
The Court need not consider all the Winter factors here bеcause the irreparable harm requirement disposes of the motion.
A. Tekion
In its preliminary injunction opposition, Tekion represented that upon receipt of CDK‘s December 2024 cease and desist letter it stopped accessing CDK‘s DMS through dealership-provided credentials—precisely the conduct CDK seeks to preliminarily enjoin. (Dkt. No. 65-1 at ¶ 27 (“Tekion received a cease-and-desist letter dated December 6, 2024, from CDK‘s attorneys demanding that Tekion cease using dealership accounts to access and export data for migration to Tekion, which I understand CDK has included as an exhibit to its preliminary injunction motion. Dkt. 45-10. Upon receiving this correspondence, Tekion stopped providing data access assistance to dealers by using dealership-provided credentials as described in Sections IV and V, аbove. Tekion has not resumed this activity.“).) At the June 26, 2025 hearing, Tekion confirmed it will not access CDK‘s DMS by using dealership-provided credentials—upon penalty of contempt—
B. InDesign
CDK has not made a “clear showing” that it will be irreparably harmed by continuation of the status quo as to InDesign because it has been aware of precisely how InDesign operates since at least June 2019 and has not identified a single instance of harm from InDesign‘s long-time operations.
A “long delay before seeking a preliminary injunction implies a lack of urgency and irreparable harm.” Oakland Trib., Inc. v. Chron. Pub. Co., 762 F.2d 1374, 1377 (9th Cir. 1985) (citing Lydo Ents. v. City of Las Vegas, 745 F.2d 1211, 1213-14 (9th Cir. 1984); GTE Corp. v. Williams, 731 F.2d 676, 678-79 (10th Cir. 1984)). CDK has been aware of InDesign‘s activities since at least 2016 (Dkt No. 72-4 ¶¶ 3-4), and in June 2019 deposed InDesign‘s CEO who testified to the exact same practices CDK now seeks to еnjoin six years later. (Dkt. No. 46-3 at 9-13.) So, CDK did not act diligently to enjoin InDesign‘s activities after it discovered them. Indeed, CDK did not send a cease and desist letter or even raise any concern with InDesign about its activities until it filed its present motion. (Dkt. Nos. 73-1 ¶¶ 3-14; 62-2 ¶ 48 (“In all those years, CDK never contacted us, or raised any concerns, about InDesign‘s dealer-authorized access methods.“)).3 CDK does not dispute that “[o]n February 11, 2025—the day after CDK filed its lawsuit against InDesign—CDK sent InDesign a cease-and-desist letter” for the first time. (Dkt. No. 62-2 ¶ 51; see also Dkt. No. 73-1 ¶ 37 (Mr. LaGreca attesting to the same).)
CDK‘s reliance on Disney Enters., Inc. v. VidAngel, Inc., 869 F.3d 848 (9th Cir. 2017), for the proposition its investigation was a proper basis for delaying legal action is unpersuasive. There, in July 2015 the defendant notified the studios of its services, indicating it was in beta-testing, and the defendant began its service in earnest in August 2015. Id. at 854. The studios that
So, CDK has failed to make a “clear showing” that it will be irreparably harmed by the maintenance of the years-long status quo as to InDesign.
*
*
*
Accordingly, CDK‘s motion for preliminary injunction is DENIED.
II. Motion to Dismiss
InDesign moves to dismiss each of CDK‘s claims against it. (Dkt. No. 52.)
A. CFAA Claim (Claim 1)
The Computer Fraud and Abuse Act “prohibits acts of computer trespass by those who are not authorized users or who exceed authorized use. It creates criminal and civil liability for whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer.” Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1065-66 (9th Cir. 2016) (cleaned up). “In other words, it is an anti-hacking statute.” Watters v. Breja, No. 23-cv-03183-HSG, 2024 WL 201356, at *2 (N.D. Cal. Jan. 18, 2024).
While the complaint cites several CFAA provisions (Dkt. No. 1 at ¶¶ 137-145.), CDK‘s opposition argues it states a claim under
The crux of InDesign‘s argument is that it always had and has the dealers’ permission to access dealer-owned data within CDK‘s DMS. So, the claim fails because (1) InDesign had authorization to access the DMS, and (2) InDesign‘s access was not analogous to breaking-and-entering. Separately, InDesign finally argues CDK did not suffer financial loss.
i. Intentional access without authorization
The “pivotal CFAA question here” is whether, as alleged in the complaint, InDesign‘s access of CDK‘s DMS using Dealer credentials “was ‘without authorization’ within the meaning of the CFAA and thus a violation of the statute.” hiQ Labs, 31 F.4th at 1195 (quoting
Here, drawing all reasonable inferences in CDK‘s favor, it has plausibly alleged InDesign accessed CDK‘s DMS without authorization. It limits DMS access through private networks and only accepts electronic communications from computer workstations tied to IP addresses on dealership networks specifically authorized by CDK. As InDesign is not a dealer to which CDK authorized private network access tied to InDesign‘s IP address, the complaint supports an inference InDesign intentional accessed CDK‘s DMS “without authorization.”
And the allegations also plausibly support an inference “the conduct at issue is analogous to ‘breaking and entering.‘” hiQ Labs, 31 F.4th at 1197 (quoting H.R. Rep. No. 98-894, at 20). “The legislative history of section 1030 thus makes clear that the prohibition on unauthorized access is properly understood to apply only to private information—information delineated as private through use of a permission requirement of some sort.” Id. So, the breaking-and-entering inquiry involves determining whether the computer system accessed was “one which no one could access without authorization.” Id. at 1199 (citing Nosal II, 844 F.3d at 1038). See, e.g., Watters, 2024 WL 201356 at *3 (holding a person who accessed “a public, unrestricted webpage” did not commit conduct analogous to breaking and entering). CDK plausibly alleges the DMS was not publicly accessible as dealers required a VPN and valid login credentials, and even all login credentials were not granted administrator-level privileges and “required [employees] to complete multi-factor authentication to confirm their identity.” (Dkt. No. 1 ¶ 47.)
InDesign responds that the complaint itself alleges the dealerships voluntarily shared their authorized access with InDesign so its access of CDK‘s DMS was “with authorization.” See CDK Global, LLC v. Brnovich, 461 F. Supp. 3d 906, 915 (D. Ariz. 2020) (noting the CFAA “does not limit how access might be authorized“). For purposes of this motion, the Court assumes the dealerships’ voluntary sharing of their access, without more, means InDesign‘s access was authorized. See hiQ Labs, 31 F.4th at 1200 (holding the rule of lenity applies given the court “must interpret the statute consistently, whether [it] encounter[s] its application in a criminal or
InDesign‘s cited cases do not persuade the Court otherwise, at least at this early stage in the litigation. In WalkMe Ltd. v. Whatfix, Inc., the plaintiff similarly alleged the dеfendant “used customer credentials to access the [plaintiff‘s] platform, which [the plaintiff] alleges was ‘expressly prohibited under the terms of [its] agreements with its customers.‘” WalkMe Ltd. v. Whatfix, Inc., No. 23-cv-03991-JSW, 2024 WL 1221960, at *5 (N.D. Cal. Mar. 21, 2024). The court held such allegations were insufficient to state a claim because “[t]he phrase ‘exceeds authorized access’ in the CFAA does not extend to violations of use restrictions.” Id. (quoting United States v. Nosal, 676 F.3d 854, 864 (9th Cir. 2012) (”Nosal I“)). But CDK‘s claim is not that InDesign exceeded authorized access, it is that the dealerships could not authorize InDesign‘s access and InDesign knew that fact as of December 2024—so after that date no access at all was authorized. Further, WalkMe did not indicate that the defendant knew that the plaintiff‘s customers’ contracts with the plaintiff prohibited the customer from authorizing access to third parties.
Similarly, in AtPac, Inc. v. Aptitude Solutions, Inc., 730 F. Supp. 2d 1174 (E.D. Cal. 2010), the court concluded that the plaintiff‘s licensee‘s sharing of access with the defendant meant that the defendant did not act “without authorization,” but expressly noted the defendant was not on
InDesign next argues that to state a CFAA claim, CDK must affirmatively revoke InDesign‘s dealership-authorized access and that such affirmative act—the cease and desist letter to InDesign—did not occur until after the complaint was filed and therefore the claim, as currently pled, fails. As support InDesign reliеs on Power Ventures, 844 F.3d at 1067. There, Facebook, a social media platform where users were required to have password-protected accounts to make website posts, sued the defendant, a company whose business model involved obtaining user permission to access and post on those users’ Facebook accounts. Id. at 1062-63. When Facebook became aware of the defendant‘s activities, it immediately sent a cease-and-desist letter and subsequently sued under various state and federal laws, including under the CFAA. Id. In upholding the lower court‘s grant of summary judgment in favor of Facebook, the Ninth Circuit held “after receiving the cease-and-desist letter from Facebook, Power intentionally accessed Facebook‘s computers knowing that it was not authorized to do so, making Power liable under the CFAA.” Id. at 1069. Specifically, “[p]еrmission from the users alone was not sufficient to constitute authorization after Facebook issued the cease and desist letter.” Id. at 1068. Relevant to InDesign‘s argument, the court also held the defendant‘s initial access prior to the cease and desist letter did not violate the CFAA because it “reasonably could have thought that consent from Facebook users to share the promotion was permission for [the defendant] to access Facebook‘s computers.” Id. at 1067.
Powers does not mandate dismissal. First, Powers was on review of summary judgment in the plaintiff‘s favor; so, when the court recited what the defendant “could have thought,” it was applying the summary judgment standard that all reasonable inferences had to be drawn in the non-moving party‘s favor. See id. at 1064 (holding the court assumed all facts in favor of the non-moving party in reference to a different claim). Here, on InDesign‘s mоtion to dismiss, all
ii. Cognizable harm or financial loss
The final CFAA element is “loss to one or more persons during any one-year period aggregating at least $5,000 in value.” Brekka, 581 F.3d at 1132. “Loss” means “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense.”
*
*
*
So, because CDK plausibly alleges a claim under the CFAA, InDesign‘s motion to dismiss this claim is DENIED.
B. CCDAFA Claim (Count 5)
InDesign‘s only argument for dismissal of CDK‘s claim under California‘s analogue computer-hacking statute, the Comprehensive Data Access and Fraud Act (“CCDAFA“), is that
C. DMCA Claim (Count 2)
Congress enacted the DMCA,
To state a claim under these provisions a plaintiff “must allege that (i) the work at issue was protected under the Copyright Act, (ii) the copyrighted work was protected by a ‘technological measure,’ and (iii) the technological measure was ‘circumvented’ in order to obtain access to the copyrighted work.” iSpot.tv, Inc. v. Teyfukova, No. 21-cv-06815-MEMF (MARx), 2023 WL 3602806, at *4 (C.D. Cal. May 22, 2023) (citing
i. Copyrighted work
InDesign first argues CDK‘s claim fails the first element because the Ninth Circuit‘s 2021 decision in Brnovich held that CDK “[does] not hold a copyright in the data itself, which consists of facts about dealers’ customers and business operations.” CDK Glob. LLC v. Brnovich, 16 F.4th 1266, 1278 (9th Cir. 2021).4 But CDK does not allege that the dealer data itsеlf is the protected copyright material; instead, it alleges CDK‘s systems and infrastructure are copyright protected. CDK “owns valid copyrights over its proprietary DMS system” and InDesign‘s 1DMS allows it to
ii. Circumvention of a technological measure
Circumvention under the DMCA “means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.”
Drawing reasоnable inferences from the allegations in CDK‘s favor, CDK‘s password protected database is a technological measure. For the most part, its applications are behind a firewall and only allow private network access. (Dkt. No. 1 ¶ 39.) CDK deploys specialized hardware at the dealerships to secure the connections between the dealers and CDK‘s network. (Id. ¶ 41.) CDK‘s system only accepts communications from the dealers’ IP address that CDK has previously authorized. (Id. ¶ 43.) And the communications between the dealers and CDK are all encrypted. (Id. at ¶¶ 44-45.)
And CDK also plausibly alleges that technological measures to ensure dealer-only access to CDK‘s DMS were “avoided” or “bypassed” by InDesign‘s use of the dealers’ credentials to create an InDesign log in. (Id. ¶¶ 74-75, 96.) See, e.g., Actuate Corp. v. Int‘l Bus. Machns. Corp., 2010 WL 1340519 *9 (N.D. Cal. April. 5, 2010) (holding “unauthorized distribution of passwords and usernames avoids and bypasses a technological measure in violation of sections 1201(a)(2) and (b)(1)“); Microsoft Corp. v. EEE Bus. Inc., 555 F. Supp. 2d 1051, 1059 (N.D. Cal. 2008) (holding a license holder violated the statute by “distributing a[n] [access key] without authorization,” because, in doing so, it “effectively circumvented [plaintiff‘s] technological measure to control access to a copyrighted work in violation of the DCMA.“); 321 Studios v. MGM Studios, Inc., 307 F. Supp. 2d 1085, 1098 (N.D. Cal. 2004) (“However, while [the defendant‘s] software does use the authorized key to access the DVD, it does not have authority to
The cases InDesign cites do not persuade the Court otherwise. In iSpot.tv, for example, the defendant used a username and password to access the plaintiff‘s system after having ended her employment with the entity that gave her credentials to access the plaintiff‘s system. iSpot.tv, 2023 WL 3602806 at *5. The court held the defendant “individually used the credentials in the technological manner by which she was authorized to do so albeit without authorization,” so she did not circumvent the plaintiff‘s technological measures. Id. But more than mere unauthorized use of an originally lawfully-obtained password is alleged here: CDK implemented certain technological measures—such as permitting electronic communications only with CDK authorized dealer-networks—that were “avoided” or “bypassed” by InDesign using the dealers’ network and credentials to access CDK‘s system. Adobe Sys. Inc. v. A&S Elecs. Inc., 15-cv-2288-SBA, 2015 WL 13022288 (N.D. Cal. Aug. 19, 2015) and Egilman v. Keller & Hackman, LLP, 401 F. Supp. 2d 105 (D.D.C. 2005) are distinguishable for the same reasons. None of these cases involve a defendant “getting around” a plaintiff‘s technological measure of restricting access to its copyrighted material to approved IP networks.
Accordingly, InDesign‘s actions, as alleged in the complaint and drawing reasonable inferences in CDK‘s favor, plausibly constitute circumvention of a technological measure.
iii. Primarily designed to circumvent technological measures
InDesign argues CDK does not plead a claim under
CDK alleges facts that plausibly support an inference of a § 1201(a)(2)(C) violation. CDK alleges InDesign‘s “business model appears to revolve around designing technology to circumvent the security and access protocols established by CDK to protect its intellectual property and confidential information.” (Dkt. No. 1 ¶ 73.) And InDesign markets to users that its 1DMS software allows users to “access ‘every part of the DMS that your application demands,’ including sales, service, parts, accounting, and customer resource management, ‘to mention a few.‘” (Id. ¶ 74.) Further, InDesign sent solicitation emails from its “Support Team” that stated “We convert dealers to Tekion (data and docs). I‘ve already got your 2 dealerships in my system with Tekion ID numbers,” through a process that includes “installing our automation software” and then “creating a CDK user so we can extract all the data and docs before your CDK service ends.” (Id. ¶ 96.) In all, these allegations sufficiently allege InDesign “marketed” itself and its 1DMS “for use in circumventing a technological measure that effectively controls access to a work protected.”
InDesign counters that because the 1DMS itself does not circumvent the password and IP protections, a “marketing” violation is inadequately pled. But
*
*
*
As CDK plausibly alleges its DMCA claim, InDesign‘s motion to dismiss this claim is DENIED.
//
D. SCA Claim (Claim 3)
The SCA prohibits unauthorized access to information and is “nearly identical to the CFAA.” hiQ Labs, 31 F.4th at 1199-1200 (comparing
Accordingly, CDK‘s SCA claim against InDesign is DISMISSED with leave to amend.
E. Trade Secrets Claims under DTSA (Claim 4) and CUTSA (Claim 6)
To state a claim under either the DTSA or CUTSA, a plaintiff must allege “(1) the plaintiff owned a trade secret; (2) the defendant misappropriated the trade secret; and (3) the defendant‘s actions damaged the plaintiff.” Alta Devices, Inc. v. LG Elecs., Inc., 343 F. Supp. 3d 868, 877 (N.D. Cal. 2018). Under both statutes, misappropriation means “either (1) the ‘[a]cquisition of a trade secret by another person who knows or has reason to know that the trade secret was acquired by improper means;’ оr (2) the ‘[d]isclosure or use of a trade secret of another without express or implied consent.‘” Id. at 877 (quoting
CDK plausibly alleges, when drawing reasonable inferences in its favor, that InDesign accessed CDK‘s trade secrets and disclosed them to Tekion without CDK‘s express or implied consent. InDesign‘s 1DMS software “is designed for InDesign to be able to access, scrape, and collect data from CDK‘s DMS without CDK‘s permission.” (Dkt. No. 1 ¶ 73.) “Deploying
InDesign‘s challenge to CDK‘s use of “Defendants” throughout the complaint fails because CDK alleges Tekion and InDesign both accessed its trade secrets through their data-scraping methods. Indeed, while CDK uses the plural “Defendants” in parts of its complaint its allegations laying out each actor‘s conduct, taken together with allegations where Defendants are grouped, gives each Defendant notice of what role each played in the alleged harm. Cf. Sebastian Brown Prods., LLC v. Muzooka, Inc., 143 F. Supp. 3d 1026, 1037 (N.D. Cal. 2015) (cleaned up) (“As a general rule, when a pleading fails to allege what role each Defendant played in the alleged harm, this makes it exceedingly difficult, if not impossible, for individual Defendants to respond to Plaintiffs’ allegations.“); (see Dkt No. 1 ¶¶ 72-77; 99-102; 105-112; 124.) So, InDesign has “fair notice of what the claim is and the grounds upon which it rests.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (cleaned up).
Accordingly, InDesign‘s motion to dismiss the trade secrets claims is DENIED.
F. Tortious Interference Claim (Claim 7)
To state a claim under California‘s intentional interference with contractual relations, a plaintiff must allege “(1) the existence of a valid contract between the plaintiff and a third party, (2) the defendant‘s knowledge of that contract, (3) the defendant‘s intentional acts designed to induce a breach or disruption of the contractual relationship, (4) actual breach or disruption of the contractual relationshiр, and (5) resulting damage.” Tradeshift, Inc. v. BuyerQuest, Inc., No. 20- cv-01294-RS, 2020 WL 8920622, at *4 (N.D. Cal. May 20, 2020) (citing Reeves v. Hanlon, 33 Cal. 4th 1140, 1148 (2004)). “To establish the claim, the plaintiff need not prove that a defendant acted with the primary purpose of disrupting the contract, but must show the defendant‘s knowledge that the interference was certain or substantially certain to occur as a result of his or her action.” Reeves, 33 Cal. 4th at 1148. InDesign argues CDK fails to allege intent (3) and actual breach (4). (Dkt. No. 52 at 29.)
The complaint does not plausibly allege intent and actual breach. The complaint alleges InDesign, since at least December 2024, was aware CDK had agreements with dealerships that prohibited its unauthorized access of CDK‘s DMS. (Dkt. No. 1 ¶¶ 99-102.) But CDK only alleges InDesign attempted to induce the breach of the contract between it and a dealership. (Id. ¶¶ 99-102.) It does not allege InDesign acted intentionally to induce breach of any particular contract after it bеcame aware that CDK did not permit dealers to share their credentials. So, while CDK alleges InDesign had knowledge of the operative master services agreement provision, it does not allege InDesign then subsequently “induce[d] a breach or disruption of the contractual relationship” between CDK and any particular dealership. Tradeshift, Inc., 2020 WL 8920622, at *4 (citing Reeves, 33 Cal. 4th at 1148). Accordingly, CDK has failed to “specify the [] contracts at issue, [and] adequately allege how” InDesign‘s conduct “led to the disruption of these [MSAs].” DirecTV, LLC v. E&E Enters. Glob., Inc., No. 17-cv-06110-DDP-PLA, 2017 WL 6888500, at *5 (C.D. Cal. Nov. 20, 2017).
So, InDesign‘s motion to dismiss the tortious interference with existing business relation claim is GRANTED with leave to amend.
G. UCL Claim (Claim 8)
CDK‘s final claim is brought under California‘s Unfair Competition Law (“UCL“),
i. “Unfair” practice
In a case arising from a “claim of unfair competition between direct competitors,’ conduct is ‘unfair’ pursuant to Section 17200 if it has some ‘actual or threatened impact on competition,‘”
CDK does not plausibly allege harm to competition. Indeed, it opposes dismissal on the grounds it “does not allege that InDesign is its direct competitor or has violated antitrust and false advertising laws, [so] CDK does not need to allege gеneral harm to competition to state a UCL claim.” (Dkt. No. 69 at 30.) But CDK does allege it is in direct competition with InDesign. (Dkt. No. 1 ¶ 208.) And the Cel-Tech court did not limit the harm to competition test to cases involving the antitrust or false advertising laws. To the contrary, it held the test applies “[w]hen a plaintiff [] claims to have suffered injury from a direct competitor[].” Cel-Tech, 20 Cal. 4th 186. Since CDK alleges the parties are direct competitors, it is required to allege harm to competition. And since CDK has not alleged any harm to competition, but instead only alleges harm to itself and its business, CDK fails to plausibly allege an UCL unfair prong violation.
ii. “Unlawful” Business Practice
CDK does not allege a UCL violation based on fraud, but it does allege a UCL violation based on InDesign‘s “unlawful” activity. And while CDK‘s allegations against InDesign do not pass the direct-competitor test, the California Supreme Court cautioned in Cel-Tech, “[n]othing we say relates to actions by consumers or by competitors alleging other kinds of violations of the unfair competition law such as ‘fraudulent’ or ‘unlawful’ business practices or ‘unfair, deceptive, untrue or misleading advertising.‘” Id. at 187 n.12. As the Court concludes above that CDK has plausibly alleged violations under the CFAA, DAFA, and the DMCA, so CDK plausibly alleges
So, InDesign‘s motion to dismiss this claim is GRANTED insofar as CDK brings an unfair prong claim, but DENIED as to the “unlawful” prong.
CONCLUSION
Because CDK has not shown it will suffer irreparable harm, preliminary injunction is not warranted, and CDK‘s motion is therefore DENIED. Further, for the reasons stated above, InDesign‘s motion to dismiss is GRANTED on its SCA, tortious interference with business relations, and UCL unfair prong claims with leave to amend. InDesign‘s motion to dismiss is otherwise DENIED. An amended complaint, if any, must be filed by August 7, 2025. The amended complaint should identify the statutory subsections under which each claim is brought.
This Order disposes of Docket Nos. 45 and 52.
IT IS SO ORDERED.
Dated: July 15, 2025
JACQUELINE SCOTT CORLEY
United States District Judge
