In this action alleging several intentional torts, plaintiff, H. Scott Dailey, appeals as of right a circuit court order granting defendants summary disposition pursuant to MCR 2.116(C)(8). We affirm in part, reverse in part, and remand for further proceedings.
I. FACTS AND UNDERLYING PROCEEDINGS
A. THE FEDERAL CASE
This case finds its genesis in a dispute between an insurance company and its agent. On April 13, 2004, defendants Lincoln National Life Insurance Company and Lincoln Financial Advisors Corporation (collectively Lincoln) sued Rodney Ellis, a Lincoln agent, and Lucasse, Ellis, Inc. (Lucasse), a company partially owned by Ellis, in the United States District Court for the Western District of Michigan. Lincoln’s federal court complaint alleged fraud, breach of fiduciary duty, conversion, breach of contract, and tortious interference with business expectancies or relations. Defen *300 dants Dykema Gossett EL.L.C. (Dykema) and John Ferroli, a Dykema member, represented Lincoln in the federal court action.
On April 15, 2004, a federal judge entered a temporary restraining order (TRO) prohibiting Ellis, Lucasse, and instant plaintiff Dailey from “deleting, erasing, destroying, shredding, secreting, removing, modifying, overwriting, replacing, or ‘wiping’ ” any computer data or files containing information related to Lincoln’s customers and financial records. The paragraphs of the TRO directly relevant to plaintiffs present intentional tort action provide as follows:
9. Rodney D. Ellis and Lucasse, Ellis, Inc., all officers, owners, employees, principals, and agents of either of them who receive actual notice of this Order by personal service or otherwise, including but not limited to H. Scott Dailey, and all persons or entities acting in concert with any of them, are hereby ordered immediately upon service of this order to make available to a computer/data consultant retained by Plaintiffs all hard drives and other magnetic, optical or electronic media in the possession, custody, or control of any of them, including those hard drives and other magnetic, optical, or electronic media that they have the effective power to obtain, which contain any Lincoln Customer Records, for prompt non-destructive copying at Plaintiffs’ expense. Plaintiffs shall minimize disruption to the producing person’s business to the extent practicable. Plaintiffs shall return all hard drives and other magnetic, optical, or electronic media supplied pursuant to this Order within 24 hours, or such longer time as may be stipulated to or ordered by this Court. Plaintiffs’ computer consultant shall maintain the copied data in a secure, locked location, and shall not review or inspect the data copied, or show it to Plaintiffs or their attorneys, until further order of this Court.
10. Rodney D. Ellis and Lucasse, Ellis, Inc., all officers, owners, employees, principals, and agents of either of them, including, but not limited to, H. Scott Dailey, and all *301 persons or entities acting in concert with any of them who receive actual notice of this Order by personal service or otherwise, are hereby ordered immediately upon service of this order to provide for prompt copying of, at Plaintiffs’ expense, (i) any and all “notes” data, files or records of present or former customers of any Lincoln affiliate, and (ii) any and all “Alice Reports,” “A-Roll” lists, and any other documents relating to any contemplated or processed change-in-employment status for any employees of the Henry Ford Health System with an account at any Lincoln affiliate.[ 1 ]
On April 19,2004, Lincoln’s agents served plaintiff with the TRO in his Kentwood apartment, and with the assistance of personnel employed by defendant Guidance Software, Inc. (Guidance Software), copied all the data from all of plaintiffs computers. The events surrounding defendants’ entry into plaintiffs apartment and the copying of his computer data form the basis of the instant lawsuit.
B. THE STATE COURT COMPLAINT
Plaintiff commenced this action on April 18, 2007, by filing in the Kent Circuit Court a complaint against Dykema, Ferroli, Lincoln, and Guidance Software. 2 Plaintiff subsequently filed a substantially similar first *302 amended complaint, which describes in detail the circumstances surrounding defendants’ conduct in serving the TRO and copying plaintiff s computer data. Because the allegations within the amended complaint supply the facts necessary to our resolution of this case, we turn to an examination of that pleading.
The amended complaint avers that in April 2004, plaintiff worked out of his apartment as an independent computer consultant for several small businesses, including Lucasse. The computers in his apartment provided the means to generate his livelihood and held confidential information concerning all his clients, such as their user identifications and passwords. Plaintiff, who suffers from AIDS, also stored on his computers highly personal information, medical records, photographs, and tax returns.
On April 19, 2004, plaintiffs doorbell rang and someone requested that plaintiff permit entry into his apartment building. Because plaintiff was not expecting visitors, he did not respond. At approximately 11:00 a.m., loud pounding on his door “jolted” plaintiff awake and he “realized that the men outside had managed to slip through the security system downstairs.” Plaintiff saw papers slid under his door, and he read them after the men had departed. The papers included the TRO, which “completely blindsided” plaintiff. Soon thereafter, plaintiffs telephone rang, but he did not answer it. The caller, Ferroli, left a message declaring that a federal court subpoena allowed him and others to enter plaintiffs apartment “to either take his computers and hard drives or copy what was on them.” Plaintiff “reasonably believed that he could not let Ferroli simply walk out the door with the computers,” and that “he had no choice and would go to jail” if he refused Ferroli access to his computers. Plaintiff thus “returned Ferro *303 li’s call and agreed to” allow Ferroli “to copy the information on his computers.”
Ferroli and several Guidance Software employees arrived, and plaintiff “led the group to the master bedroom where he kept two computers and four hard drives and, having seen from the subpoena that the case had something to do with Lincoln and Ellis, pointed them to the one and only hard drive that would contain Lincoln data.” But “[t]he intruders . .. demanded everything.” The Guidance Software personnel connected laptop computers to plaintiffs machines and transferred “every bit of information on all [plaintiffs] computers and hard drives.” Only a “small percentage” of the information copied by the Guidance Software personnel related to Ellis, Lucasse, or Lincoln. The data transfer and copying process consumed 11 hours, during which period Ferroli “wandered in and out.” In frail health and underweight, plaintiff “did not sleep for several days thereafter.”
Four days after Ferroli and the Guidance Software technicians entered plaintiffs home, a Dykema attorney took plaintiffs deposition, urging him “to state on the record that he was suffering from AIDS[.]” As a result of illness, plaintiff had to complete the deposition later, by telephone from his bed. On July 1, 2004, Lincoln’s attorneys informed the federal judge in the Ellis case that plaintiff had violated the TRO. Despite this claim and similar allegations in Lincoln’s federal court complaint, defendants never uncovered or presented any evidence of wrongdoing by plaintiff or Ellis. Defendants’ actions “traumatized [plaintiff], devastated his best customer, and thereby destroyed [plaintiffs] business.” According to the amended complaint, Lincoln bore vicarious liability for the conduct of Dykema, Ferroli, and Guidance Software, because these *304 defendants “were Lincoln’s agents and were acting within the scope of their agency.”
The amended complaint sets forth five intentional tort claims: invasion of privacy in the form of intrusion on seclusion or into private affairs; trespass; intentional or reckless infliction of emotional distress; abuse of process; and tortious interference with business relationships or expectancies. All defendants sought summary disposition of plaintiffs claims pursuant to MCR 2.116(C)(8). Dykema, Ferroli and Guidance Software filed a separate motion seeking summary disposition under MCR 2.116(C)(10). In a written opinion and order entered on September 9, 2008, the circuit court granted defendants’ motions under (C)(8) and dismissed the entirety of plaintiffs complaint.
II. SUMMARY DISPOSITION ANALYSIS
A. STANDARD OF REVIEW
Plaintiff challenges the circuit court’s grant of summary disposition in favor of defendants regarding all five counts of his complaint. This Court reviews de novo a circuit court’s summary disposition ruling.
Walsh v Taylor,
Because the circuit court granted defendants summary disposition solely under subrule (C)(8), we examine the pleaded allegations pertaining to each of the asserted intentional torts. Well-established principles guide our review. A complaint must contain “[a] statement of the facts, without repetition, on which the pleader relies in stating the cause of action, with the specific allegations necessary reasonably to inform the adverse party of the nature of the claims the adverse party is called on to defend. . . .” MCR 2.111(B)(1). “[T]he primary function of a pleading in Michigan is to give notice of the nature of the claim or defense sufficient to permit the opposite party to take a responsive position.”
Stanke v State Farm Mut Auto Ins Co,
B. INVASION OF PRIVACY
“Michigan has long recognized the common-law tort of invasion of privacy.”
Lewis v LeGrow,
has evolved into four distinct tort theories: (1) the intrusion upon another’s seclusion or solitude, or into another’s private affairs; (2) a public disclosure of private facts about the individual; (3) publicity that places someone in a false light in the public eye; and (4) the appropriation of another’s likeness for the defendant’s advantage.” [Lewis,258 Mich App at 193 .]
Count I of plaintiffs amended complaint invokes intrusion on seclusion, the first of these theories.
There are three necessary elements to establish a prima facie case of intrusion upon seclusion: (1) the existence of a secret and private subject matter; (2) a right possessed by the plaintiff to keep that subject matter private; and (3) the obtaining of information about that subject matter through some method objectionable to a reasonable man. [Doe v Mills,212 Mich App 73 , 88;536 NW2d 824 (1995).]
The circuit court granted summary disposition in favor of defendants of plaintiffs intrusion on seclusion claim on the basis that the complaint failed to set forth facts “that show that he had a right to privacy in those areas of the apartment necessary to carry out the mandate of the TRO.” Relying on this Court’s opinion
*307
in
Saldana v Kelsey-Hayes Co,
With respect to the plaintiffs personal information on the computers, the complaint further alleges that plaintiff pointed the Dykema defendants to the “one and only hard drive that would contain Lincoln data” but that the employees of defendant Guidance copied all of the information contained on all of plaintiffs computers and hard drives. Pursuant to the TRO, the Dykema defendants had a right to copy hard drives that were potential sources of Lincoln information. Thus, even when viewed in plaintiffs favor, the complaint does not allege facts that show he had a right to privacy in his hard drives for purposes of carrying out the TRO. [Citation omitted.]
Plaintiff asserts that the circuit court misconstrued both Saldana and the TRO, insisting that the TRO neither invested defendants with a right to violate plaintiffs privacy nor deprived plaintiff of his common-law privacy rights.
The plaintiff in Saldana, a supervisor in one of the defendant’s facilities, fell from a bicycle in the course of his employment. Id. at 232. The defendant suspected the plaintiff of malingering and hired a private investigation firm to “investigate plaintiff and to attempt to determine the extent of plaintiffs injuries.” Id. The investigators employed a variety of surveillance techniques, including observing the plaintiff through an open window with a 1,200-millimeter camera lens and posing as a process server “for the purpose of looking around plaintiffs home[.]” Id. at 233. The plaintiff brought an invasion of privacy action asserting an intrusion on his seclusion. Id.
This Court first determined that the plaintiff “can show an intrusion,” because “agents of defendants *308 entered plaintiffs home under false pretenses” and “the use of a powerful lens to observe the interior of a home or of a subterfuge to enter a home could be found objectionable to a reasonable person.” Id. at 234. However, because the defendants’ surveillance of the plaintiff “involved matters which defendants had a legitimate right to investigate,” this Court concluded that the plaintiff failed to allege facts that showed the intrusions “were into matters which plaintiff had a right to keep private.” Id. This Court explained that the “duty to refrain from intrusion into another’s private affairs is not absolute in nature, but rather is limited by those rights which arise from social conditions, including the business relationship of the parties.” Id. (emphasis in original). The Court concluded that the plaintiffs privacy interest in his home “was subject to the legitimate interest of his employer in investigating suspicions that plaintiffs work-related disability was a pretext.” Id. at 235.
We find Saldana readily distinguishable from this case. In Saldana, the nature of the parties’ relationship limited the plaintiffs right to privacy concerning the matter the defendant investigated: whether the plaintiff suffered from work-related disabilities. Here, defendants and plaintiff shared no special relationship, business or otherwise, and defendants possessed no legitimate interest in viewing plaintiffs apartment or copying computer data unrelated to Lincoln. Furthermore, we reject the circuit court’s conclusion that the TRO divested plaintiff of his right to privacy in his apartment and computer hard drives. The TRO afforded defendants no right whatsoever to enter or search plaintiffs apartment. 4 Regarding plaintiffs com *309 puters, the TRO entitled Lincoln’s agent to copy hard drives and other electronic media “which contain any Lincoln Customer Records...But no provision in the TRO authorized defendants to copy personal computer data unrelated to Lincoln. 5 Moreover, we find no support for the circuit court’s determination that defendants “had a right to copy hard drives that were potential sources of Lincoln information.” (Emphasis added.) The TRO neither mentions “potential” sources of information nor in any manner expands the reach of defendants’ copying authority beyond matters directly related to Lincoln.
Plaintiffs amended complaint avers that he “had a right to privacy in his own home and a right to keep private the private information on his computers and hard drives,” and that defendants invaded plaintiffs *310 privacy “by intruding upon his seclusion or solitude and into his private affairs, and obtained access to [plaintiffs] home and information about his private affairs by methods objectionable to a reasonable person.” This averment adequately sets forth a claim of invasion of privacy by intrusion on seclusion. The plain language of the TKO in no way renders unenforceable plaintiffs intrusion on seclusion claim.
Defendants alternatively maintain that plaintiff expressly or impliedly consented to the intrusion on his seclusion by allowing Ferroli and the Guidance Software personnel into his apartment and permitting them to copy his computer data. We resolve this contention by referring to our Supreme Court’s landmark decision in
De May
and this Court’s analysis in
Lewis.
The defendant in
De May,
a physician, set out on “a dark and stormy” night to attend to the plaintiff, a patient in labor.
De May,
*311 The Supreme Court held that the “plaintiff had a legal right to the privacy of her apartment at such a time, and the law secures to her this right by requiring others to observe it, and to abstain from its violation.” Id. at 165-166. Notwithstanding that Scattergood and Dr. De May “were bidden to enter, treated kindly and no objection whatever [was] made to the presence of defendant Scattergood,” id. at 162, the Supreme Court declined to hold that the plaintiff had consented to Scattergood’s intrusion on her privacy:
The fact that at the time, she consented to the presence of Scattergood supposing him to be a physician, does not preclude her from maintaining an action and recovering substantial damages upon afterwards ascertaining his true character. In obtaining admission at such a time and under such circumstances without fully disclosing his true character, both parties were guilty of deceit, and the wrong thus done entitles the injured party to recover the damages afterwards sustained, from shame and mortification upon discovering the true character of the defendants. [Id. at 166.]
This Court revisited
De May
in
Lewis,
a case that “involve[d] the surreptitious, nonconsensual videotaping of intimate acts of sexual relations in defendant[’s] .. . bedroom.”
Lewis,
The Court in
Lewis
characterized
De May
as illustrating that “[t]he deceitful presence of a medically unqualified, unnecessary person” exceeded the plaintiffs consent to the presence of “any necessary physician’s assistants.”
Id.
The Court in
Lewis
further referenced the following statement from this Court’s opinion in
Earp v Detroit,
The right of privacy may be waived by the individual or by anyone authorized by him, and this waiver may be either express or implied.... The existence of a waiver carries with it the right to an invasion of privacy only to such an extent, however, as may be legitimately necessary and proper in dealing with the matter which has brought about the waiver, or, as otherwise stated, only to the extent warranted by the circumstances which brought about the waiver. [Quotation marks and citation omitted.]
And in
Saldana,
Here, plaintiffs amended complaint alleges that defendants obtained consent to enter the apartment through a combination of subterfuge and threat: “Ferroli said he had a federal court subpoena that allowed him and the other men to come inside [plaintiffs] apartment to either take his computers and hard drives
*313
or copy what was on them.” The amended complaint also avers that plaintiff withheld consent to defendants’ copying of anything other than “the one and only hard drive that would contain Lincoln data.” These averments fall squarely within the legal analyses and holdings presented in
De May
and
Lewis.
As described in the amended complaint, the circumstances surrounding defendants’ entry into plaintiffs apartment and the copying of his computer hard drives reasonably suggest that defendants’ artifice and dishonesty enticed plaintiffs consent. “Generally, the scope of a waiver or consent will present a question of fact for the jury[.]”
Lewis,
Defendants lastly argue regarding the invasion of privacy count that plaintiffs complaint contains no facts supporting plaintiffs allegation that defendants obtained private information through a method that might be objectionable to a reasonable person, or that defendants ever viewed the information they copied. Whether a reasonable person would find an intrusion objectionable constitutes a factual question best determined by a jury.
Saldana,
[t]he type of invasion of privacy asserted by plaintiff does not depend upon any publicity given to the person whose interest is invaded, but consists solely of an intentional interference with his or her interest in solitude or seclusion of a kind that would be highly offensive to a reasonable person. [Id,., citing 3 Restatement Torts, 2d, § 652B, p 378.]
Therefore, irrespective of whether defendants ever viewed the copied information, the amended complaint’s description of the methods defendants employed to obtain the data adequately pleaded an invasion of plaintiffs seclusion.
In summary, because plaintiffs amended complaint adequately sets forth a claim for invasion of privacy by intrusion on seclusion, we conclude that the circuit court improperly granted defendants summary disposition of this claim under MCR 2.116(C)(8).
C. TRESPASS
Plaintiff next challenges the circuit court’s ruling that his amended complaint “failed to state the element of unauthorized entry that is necessary for a claim of trespass.” The circuit court reasoned that defendants “had a nonconsensual privilege to enter plaintiffs apartment for the purpose of” executing the TRO. In support of this conclusion, the circuit court cited this Court’s decision in
Antkiewicz v Motorists Mut Ins Co,
A trespass is an unauthorized invasion on the private property of another.
American Transmission, Inc v Channel 7 of Detroit, Inc,
The privilege to execute an order of a court directing the actor to put a third person in possession of land of which another is in possession, or to do any other act on the land, carries with it the privilege to enter the land for the purpose of executing the order, provided that any writ issued for the execution of the order is valid or fair on its face.
Irrespective that Michigan has not adopted this section of the Restatement, we decline to apply § 210 here because it bears no relevance to the facts of this case. The TRO neither authorized defendants to take possession of plaintiffs land nor invested them with the authority “to do any other act on the land ....” The TRO required plaintiff “to provide for prompt copying” of his computer data concerning Lincoln and permitted Lincoln’s agents to copy the data, but it afforded defendants no right to enter plaintiffs apartment, either to obtain the computer hard drives or to accomplish the copying. Consequently, we reject as unfounded the circuit court’s conclusion that the language of the TRO contemplated or authorized an entry into plaintiffs apartment.
*316
Whether plaintiff consented to defendants’ entry into his apartment presents a more difficult question. Plaintiffs amended complaint avers that he allowed defendants to enter his apartment on the basis of their misrepresentation that the TRO permitted them “to either take his computers and hard drives or copy what was on them.” Michigan has not squarely considered whether in an action for trespass a misrepresentation utilized to secure a homeowner’s consent to enter a private home vitiates the homeowner’s consent. In
American Transmission,
this Court considered a somewhat similar issue. The
American Transmission
plaintiffs sued a television station that had recorded the interactions between a decoy customer and the plaintiffs’ transmission repair personnel. The plaintiffs’ complaint asserted that the defendants had committed a trespass when they “gained entry by concealing their true identity and misrepresenting their agent’s relationship to them . . . .”
American Transmission,
In
American Transmission,
any of the specific interests that the tort of trespass seeks to protect. The test patients entered offices that were open to anyone expressing a desire for ophthalmic services and videotaped physicians engaged in professional, not personal, communications with strangers (the testers themselves). The activities of the offices were not disrupted .... Nor was there any inva[sion of] a person’s private space,... as in the famous case of De May v. Roberts,46 Mich 160 ,9 N.W. 146 (1881) (where a doctor, called to the plaintiffs home to deliver her baby, brought along with him a friend who was curious to see a birth but was not a medical doctor, and represented the friend to be his medical assistant).... [Id. at 1352 (quotation marks omitted).]
As the Seventh Circuit recognized in Desnick, important distinctions differentiate misrepresentations directed to gain entry to business concerns and those employed to enter a private home. The Seventh Circuit acknowledged that in a true trespass case, “there can be no implied consent in any nonfictitious sense of the term when express consent is procured by a misrepresentation or a misleading omission.” Id. at 1351. The court posited the following illustrative example: “If a homeowner opens his door to a purported meter reader who is in fact nothing of the sort — just a busybody curious about the interior of the home — the homeowner’s consent to his entry is not a defense to a suit for trespass.” Id. at 1352. Nevertheless, the law sometimes deems effective in the trespass context a consent procured by misrepresentation. The Seventh Circuit in *318 Desnick explained the difference between the two classes of cases by contrasting the phony meter reader intruding into a home with a phony customer, reminiscent of the defendants in American Transmission:
T]he homeowner victimized by the phony meter reader does not want strangers in his house unless they have authorized service functions. The dealer’s objection to the customer who claims falsely to have a lower price from a competing dealer is not to the physical presence of the customer, but to the fraud that he is trying to perpetuate. [Id.]
A decision of the United States Court of Appeals for the Ninth Circuit,
Theofel v Farey-Jones,
A defendant is not liable for trespass if the plaintiff authorized his entry. See Prosser & Keeton § 13, at 70. But “an overt manifestation of assent or willingness would not be effective ... if the defendant knew, or probably if he ought to have known in the exercise of reasonable care, that the plaintiff was mistaken as to the nature and quality of the invasion intended.” Id. § 18, at 119 ....
Not all deceit vitiates consent. “[T]he mistake must extend to the essential character of the act itself, which is to say that which makes it harmful or offensive, rather than to some collateral matter which merely operates as an inducement.” Prosser & Keeton § 18, at 120 .... In other *319 words, it must be a “substantial mistake[] .. . concerning the nature of the invasion or the extent of the harm.” Restatement (Second) of Torts § 892B(2) cmt. g... .
[T]he theory is that some invited mistakes go to the essential nature of the invasion while others are merely collateral. Classification depends on the extent to which the intrusion trenches on “the specific interests that the tort of trespass seeks to protect.” Desnick,44 F.3d at 1352 ....
Under this standard, plaintiffs have alleged facts that vitiate [their internet service provider] NetGate’s consent. NetGate disclosed the sample in response to defendants’ purported subpoena. Unbeknownst to NetGate, that subpoena was invalid. This mistake went to the essential nature of the invasion of privacy. The subpoena’s falsity transformed the access from a bona fide state-sanctioned inspection into private snooping. The false subpoena caused disclosure of documents that otherwise would have remained private; it effected an “invasion ... of the specific interests that the [statute] seeks to protect.” Desnick,44 F.3d at 1352 . [Theofel,359 F3d at 1073-1074 (some citations omitted).]
The Ninth Circuit concluded that “[b]ecause defendants procured consent by exploiting a mistake of which they had constructive knowledge, the district court erred by dismissing based on that consent.” Id. at 1075. 6
*320
“[T]respass is an invasion of the plaintiffs interest in the exclusive possession of his
land...Adams v Cleveland-Cliffs Iron Co,
D. INTENTIONAL OR RECKLESS INFLICTION OF EMOTIONAL DISTRESS
Plaintiff further asserts that the circuit court erred by granting in defendants’ favor summary disposition of his claim for intentional or reckless infliction of emotional distress. According to plaintiff, reasonable minds could differ with respect to whether defendants’ conduct qualified as outrageous in light of Ferroli’s status as a lawyer,
*321
plaintiffs AIDS-related disability, and the prolonged time defendants spent in plaintiffs bedroom. “To establish a prima facie claim of intentional infliction of emotional distress, the plaintiff must present evidence of (1) the defendant’s extreme and outrageous conduct, (2) the defendant’s intent or recklessness, (3) causation, and (4) the severe emotional distress of the plaintiff.”
Walsh,
Even accepting as true the allegations in plaintiffs amended complaint, they fail to describe conduct so extreme or outrageous that it surpasses all bounds of decency in a civilized society. Assuming that Ferroli misled plaintiff about the scope of the TRO, defendants’ conduct inside plaintiffs apartment simply does not amount to atrocious or extreme behavior. At worst, defendants’ engaged in actions that were annoying and oppressive, but these actions do not rise to the level of outrageousness necessary to establish a claim for intentional infliction of emotional distress. We thus conclude that the circuit court correctly dismissed this claim under MCR 2.116(C)(8).
*322 E. ABUSE OF PROCESS
Plaintiff additionally contends that the circuit court improperly granted summary disposition in defendants’ favor of his abuse of process count.
A meritorious claim of abuse of process contemplates a situation where the defendant has availed himself of a proper legal procedure for a purpose collateral to the intended use of that procedure, e.g., where the defendant utilizes discovery in a manner consistent with the rules of procedure, hut for the improper purpose of imposing an added burden and expense on the opposing party in an effort to conclude the litigation on favorable terms. Vallance v Brewbaker,161 Mich App 642 , 646;411 NW2d 808 (1987).]
In a case alleging abuse of process, the pleadings must allege with specificity an act committed in the use of process “that is improper in the regular prosecution of the proceeding.”
Early Detection Ctr, PC v New York Life Ins Co,
Plaintiffs amended complaint alleges that defendants harbored an “ulterior purpose” to “serve Lincoln’s strategy of intimidating and harassing Ellis, and give Lincoln a tactical business advantage over Ellis when there was no factual basis for the proceeding.”
*323
Even assuming that plaintiff may properly assert a collateral purpose directed solely at harming a third party, the amended complaint fails to allege with specificity any acts committed in furtherance of this purpose. Moreover, “the ulterior purpose alleged must be more than harassment, defamation, exposure to excessive litigation costs, or even coercion to discontinue business.”
Early Detection Ctr,
E TORTIOUS INTERFERENCE WITH A BUSINESS RELATIONSHIP OR EXPECTANCY
Plaintiff lastly disputes the circuit court’s grant of summary disposition in defendants’ favor concerning his claim for tortious interference with a business relationship or expectancy.
The elements of tortious interference with a business relationship are the existence of a valid business relationship or expectancy, knowledge of the relationship or expectancy on the part of the defendant, an intentional interference by the defendant inducing or causing a breach or termination of the relationship or expectancy, and resultant damage to the plaintiff. [BPS Clinical Laboratories v Blue Cross & Blue Shield of Michigan (On Remand),217 Mich App 687 , 698-699;552 NW2d 919 (1996).]
To fulfill the third element, intentional interference inducing or causing a breach of a business relationship, a plaintiff must demonstrate that the defendant acted both intentionally and either improperly or without justification.
Bonelli v Volkswagen of America, Inc,
166
*324
Mich App 483, 498;
Plaintiffs amended complaint asserts that defendants knew or should have known that their pursuit of the TRO and a vindictive, groundless lawsuit against Ellis would disrupt plaintiffs business relationship with Ellis and Lucasse. These allegations do not set forth a claim for tortious interference with a business relationship. “[I]n order to succeed under a claim of tortious interference with a business relationship, the plaintiffs must allege that the interferer did something illegal, unethical or fraudulent. There is nothing illegal, unethical or fraudulent in filing a lawsuit, whether groundless or not.”
Early Detection Ctr,
III. ADDITIONAL ISSUES
Because the circuit court granted defendants summary disposition of all claims pleaded in the amended complaint, the court declined to address (1) Lincoln’s argument that as a matter of law plaintiff cannot establish its vicarious liability; (2) Dykema and Ferroli’s motion for summary disposition premised on MCR
*325
2.116(C)(10); and (3) Dykema and Ferroli’s contention that a litigation privilege entitles them to judgment as a matter of law. We similarly decline to address these additional issues raised by defendants on which the circuit court reserved ruling.
People v Herrick,
Affirmed in part, reversed in part, and remanded for further proceedings consistent with this opinion. We do not retain jurisdiction.
Notes
Despite that this case involves a summary disposition motion brought under MCR 2.116(C)(8), we consider the TRO because defendants rely, in part, on the language of the TRO, which is a matter of public record, see MCR 2.113(F)(1)(a), and plaintiffs complaint references the TRO.
On June 13, 2007, defendants removed this action to federal court, averring that “the allegations of Plaintiffs Complaint raise substantial disputed issues concerning the scope and interpretation of a Temporary Restraining Order entered by the United States District Court for the Western District of Michigan ....” However, a federal judge later granted plaintiffs motion to remand, finding that “the TRO is not a complex document and did not specifically retain jurisdiction in a federal court for the purpose of interpreting and enforcing it.”
In contrast, a motion brought “under MCR 2.116(0(10) tests the
factual
sufficiency of the complaint.”
Maiden v Rozwood,
The common law reflects “reverence ... for the individual’s right of privacy in his house.”
Miller v United States,
Defendants offer a patently unreasonable suggested interpretation of ¶ 9 of the TRO, the meaning of which “involves questions of law that we review de novo on appeal.”
Silberstein v Pro-Golf of America, Inc,
make available ... all hard drives and other magnetic, optical or electronic media in the possession, custody, or control of any of them, including those hard drives and other magnetic, optical, or electronic media that they have the effective power to obtain, which contain any Lincoln Customer Records, for prompt nondestructive copying .. ..” [Emphasis added.]
Our reading of this provision clearly and unambiguously conveys that the italicized qualifying language, “which contain any Lincoln Customer Records,” refers and applies to the previously referenced electronic media whether in the possession of the specifically identified individuals like plaintiff or within their “effective power to obtain .. ..” Stated differently, in this case defendants plainly had entitlement to access only those Lincoln customer records in plaintiffs actual or constructive possession.
Although Theofel involved an invalid subpoena rather than a valid TRO, we find instructive its discussion regarding the duties attendant on those who invoke the powers of the court:
The subpoena power is a substantial delegation of authority to private parties, and those who invoke it have a grave responsibility to ensure it is not abused. Informing the person served of his right to object is a good start, see Fed.R.Civ.E 45(a)(1)(D), but it is no substitute for the exercise of independent judgment about the subpoena’s reasonableness. Fighting a subpoena in court is not *320 cheap, and many may be cowed into compliance with even over-broad subpoenas, especially if they are not represented by counsel or have no personal interest at stake. [Id. at 1074-1075.]
