OPINION AND ORDER
Fujitsu has moved for a judgment as a matter of law (“JMOL”) at the close of LinkCo’s case, arguing that LinkCo failed to present sufficient evidence for a jury to find in its favor on any of the remaining three causes of action: (1) tortious interference with contract, (2) misappropriation of trade secret, and (3) unfair competition. 1 The parties have fully briefed the issue and this Court has heard oral argument. 2
Fujitsu submits that a JMOL is required because LinkCo has failed to offer sufficient proof on at least one element of each claim. See Def. Outline at 1. Fujitsu further argues that LinkCo has presented insufficient proof of damages, which is a necessary element of each of its claims. See Id. at 2. LinkCo contends that there are numerous grounds upon which a reasonable jury could find Fujitsu liable on each of its claims. See PI. Mem. at 1. For the reasons set forth below, the tortious interference with contract and misappropriation of trade secret claims are dismissed. The unfair competition claim, however, must be decided by the jury.
I. STANDARD FOR JUDGMENT AS A MATTER OF LAW
After a party presents its case, judgment as a matter of law is appropriate when “there is no legally sufficient eviden-tiary basis for a reasonable jury to find for that party on that issue.... ” Fed.R.Civ.P. 50(a)(1). Such motions “should be granted cautiously and sparingly.”
Meloff v. New York Life Ins. Co.,
II. FACTUAL BACKGROUND
In 1995, LinkCo began developing an architecture for computer software to be
*494
used by Japanese companies for purposes of corporate financial disclosure and data management.
See Linkco, Inc. v. Fujitsu Ltd.,
No. 00 Civ. 7242,
According to Webster, LinkCo’s system architecture was comprised of 26 elements.
See id.
at 1193. The system was divided into three parts: “investor relations, corporate financial disclosure, аnd public relations ... within the context of database management.”
Id.
at 1194. The goal of the end product was to create a database of information in the public and commercial domain and assist companies with their regulatory filings. LinkCo then intended to market this program to the business community.
See id.
Ultimately, LinkCo never commercialized any product related to its designs and the company ceased operations in December 1997.
See Linkco,
LinkCo took substantial steps to keep its development efforts secret. It required all employees and consultants to sign confidentiality and nondisclosure agreements. See Testimony of David Israel-Rosen (“Israel-Rosen Testimony”), Tr. at 724. It also required prospective customers and corporаte partners to sign confidentiality agreements before giving them access to its confidential information. See Testimony of Oded Maimón (“Maimón Testimony”), Tr. at 370, 492.
In May 1996, LinkCo hired Kyoto Kan-da. LinkCo alleges that it entered into an Employment, Noncompetition, Nondisclosure and Nonsolicitation Agreement (“Employment Agreement”) with Kanda.
See
Complaint (“Compl.”) ¶21. Kanda was the Chief Executive Officer of LinkCo Japan and remained with LinkCo until December 31, 1997.
See Linkco,
In June 1997, Professor Ajit Kambil, a Management Information Systems expert at the Stern Business School of New York University (“NYU”), entered into a Mutual Confidential Nondisclosure Agreement (“Nondisclosure Agreement”) with LinkCo, in which he agreed not to disclose “confidential information” to any third party. See 11/20/02 Letter from Irving B. Levin-son, plaintiffs attorney, Plaintiffs Exhibit (“Pl.Ex.”) 9 at L00744-45.
In September 1997, LinkCo met with Fujitsu to discuss a possible collaboration, but those negotiations were unsuccessful.
See Linkco,
Several months later, Fujitsu met secretly with Kanda and Kambil in New York.
See Linkco,
III. DISCUSSION
A. Tortious Interference with Contract Claim
Fujitsu submits that judgment as a matter of law is appropriate on LinkCo’s claim of tortious interference with the following two contracts: (1) the Employment Agree *495 ment bеtween LinkCo and Kanda, and (2) the Nondisclosure Agreement between LinkCo and Kambil.
Under New York law, the elements of a tortious interference with contract claim are: “[1] that a valid contract exists, [2] that a ‘third party’ had knowledge of that contract, [3] that the third party intentionally and improperly procured the breach of the contract, and [4] that the breach resulted in damage to the plaintiff.”
Albert v. Loksen,
“The existence of a valid contract is an essential element of the cause of action, and the courts have consistently rejected claims of tortious interferences in its absence.”
Mobile Data Shred, Inc. v. United Bank of Suntzerland,
No. 99 Civ 10315,
1. Kanda Contract
a. Is There a Valid Contract?
Fujitsu argues that LinkCo has failed to provide a sufficient evidentiary basis upon which a reasonable jury could: (1) conclude that Kanda was a party to a “valid” contract with LinkCo, and (2) determine the nature of any such contractual obligations. See Def. Outline at 4.
When a party alleges that a written agreement exists and was breached, it is incumbent upon that party to provide the contract or sufficient evidence from which the essential terms of that written agreement can be ascertained.
See Sims v. Blanchris,
Although the Complaint alleges that Kanda entered into an Employment Agreement with LinkCo, in which he agreed not to disclose any of LinkCo’s intellectual property to a third party, Link-Co produced no such written contract at triаl. See Compl. ¶¶ 21-22; 1Ó/9/02 Israel-Rosen Testimony, Tr. at 730-31 (acknowledging LinkCo’s inability to locate Kanda’s Employment Agreement). Link-Co did, however, offer into evidence: (1) testimony to the effect that Kanda signed one or more written contracts at a meeting that took place in 1996, see Maimón Testimony, Tr. at 339; Israel-Rosen Testimony, Tr. at 725-26; and (2) a written contract between LinkCo and Oded Maimón, which LinkCo asserts to be the same form of contract as the one signed by Kanda, see Pl.Ex. 10 at L09696-700.
*496 The testimony at trial could not support a finding by a reasonable jury that Kanda signed a contract identical to the one signed by Maimón. See Israel-Rosen Testimony, Tr. at 724-26 (expressing confusion as to whether Kanda signed an employment agreement with a nondisclosure provision or three separate documents, the second of which was a nondisclosure agreement); Maimón Testimony, Tr. at 342 (discussing individualized provision in Maim-on’s contract regarding the purchase of a motorcycle). But see Maimón Testimony, Tr. at 341 (stating belief that language regarding obligation to protect confidential information was identical in all employment agreements).
The fact that employment contracts typically contain nondisclosure and noncom-pete provisions, as noted by LinkCo,
see
PI. Mem. at 1-2, is insufficient to prove that a party is bound by such provisions.
See McKay v. Communispond, Inc.,
Without prоof of the written contract, or the terms contained therein, there is minimal evidence from which a jury could conclude that Kanda was party to a valid contract. Nevertheless, because a reasonable jury could infer from Maimon’s testimony that Kanda signed a nondisclosure agreement, although the form of the contract containing such provision is unknown, the jury should be permitted to assess the credibility of the witnesses and weigh the evidence on this element. However, because LinkCo has failed to offer sufficient evidence on two of the remaining elements of tortious interference with contract, the claim must nonetheless be dismissed.
b. Knowledge and Inducement
First,
the trial record is devoid of any evidence of Fujitsu’s direct knowledge of the employment contract between LinkCo and Kanda with which it is alleged to have interfered.
See
Ito Testimony, Tr. at 188-89 (acknowledging that Fujitsu did not ask, prior to hiring Kanda, whether Kanda had an employment agreement with Link-Co).
3
LinkCo relies on testimony that Takeshi Ito, a Fujitsu executive, thought nondisclosure agreements were “a matter of course” and “common practice” in employment.
See
PI. Mem. at 4-5 (citing Ito Testimony, Tr. at 681-82). LinkCo argues that there is an implied contractual obligation in all employment contracts not to disclose trade secrets, and that Fujitsu is therefore presumed to have knowledge of the two contracts.
See
PI. Mem. at 4. Assuming,
arguendo,
that Fujitsu had knowledge of this implicit obligation, which is highly unlikely, it did not have actual knowledge of the contracts at issue, as required by law.
See Sovereign Bus. Forms,
In support of the proposition that Fujitsu had implied knowledge of Kanda’s contract, LinkCo relies on
North Atlantic Instruments, Inc. v. Haber,
Second,
there is no evidence in the record from which a reasonable jury could conclude that Fujitsu induced Kanda to breach his contract with LinkCo. LinkCo points to two pieces of evidence in the record as proof of inducement: (1) the transmission of documents by Kanda to Fujitsu in the Fall of 1997, and (2) the payments Kanda received from Fujitsu in 1998.
See
PI. Mem. at 5-6. The fact that Kanda transmitted one or more documents to Fujitsu is irrelevant, unless LinkCo can show that Fujitsu caused the transmission to haрpen, which it has not done. Likewise, the fact that Fujitsu made payments to Kanda on consulting agreements in June 1998, many months after the transmission of the November 20, 1997 memorandum,
see
Pl.Ex. 2, the alleged breaching act, is meaningless in the absence of evidence that the payments were in exchange for the information contained in that document.
See
PI. Mem. at 6 (citing Maimón Testimony, Tr. at 399-403, 463). If the jury were to conclude from either of these two pieces of evidence, without further proof, that Fujitsu induced Kanda to breach his contract, such a conclusion would be mere speculation, which is impermissible.
See D’Amico v. City of New York,
Without evidence of Fujitsu’s actual knowledge of Kanda’s employment agreement or proof of inducement, this Court is compelled to grant judgment as a matter of law on LinkCo’s tortious interference with contract claim. 4
2. Kambil Contract
LinkCo has produced the Nondisclosure Agreement it had with Kambil. See Pl.Ex. 9 at L00744-45. However, there is no evidence of Fujitsu’s direct knowledge of Kambil’s contract or of Fujitsu’s inducement of Kambil to breach that contract. In addition, there is no evidence as to what “confidential” information Kambil allegedly disclosed to Fujitsu, without which a breach cannot be established. See Def. Outline at 5. Fujitsu’s motion for a JMOL with respect to tortious interference with Kambil’s contract is also granted.
B. Misappropriation of Trade Secret Claim
Tо succeed on a claim for trade secret misappropriation under New York law, a plaintiff must establish “(1) that it possessed a trade secret, and (2) that the defendants used that trade secret in
*498
breach of an agreement, confidential relationship or duty, or as a result of discovery by improper means.”
North Atlantic,
1. What Is a Trade Secret?
New York courts have adopted the general definition of a trade secret set forth in the Restatement of Torts § 757, comment b (1939), which states as follows: “A trade secret may consist of any formula, pattern, device or compilation of information which is
used in one’s business,
and which gives [the owner] the opportunity to obtain an advantage over competitors who do not know or use it.”
See Softel, Inc. v. Dragon Med. & Scientific Communications, Inc.,
There are two types of trade secrets: customer lists and special knowledge or information that relates to manufacturing or business operations.
See
2 N.Y. PJI3d 407 (2001). New York courts have recognized that computer software, or programs, can be a trade secret.
See Business Intelligence Servs., Inc. v. Hudson,
2. Is “Software Architecture” a Trade Secret?
“In determining whether information constitutes a trade secret, New York courts have considered the following factors: (1) the extent to which the information is known outside of the business; (2) the extent to which it is known by employees and others involved in the business; (3) the extent of measures taken by the business to guard the secrecy of the information; (4) the value of the information to the business and its competitors; (5) the amount of effort or money expended by the business in developing the information; and (6) the ease or difficulty with which the information could be properly acquired оr duplicated by others.”
North Atlantic,
a. Secrecy
“[T]he most important consideration [is] whether the information was secret.”
6
See Lehman v. Dow Jones, & Co., Inc.,
Computer programs have been found to constitute a trade secret where the source code is not easily copied or ascertainable by inspection of the program.
See, e.g., Q-Co Indus., Inc. v. Hoffman,
In this case, however, the alleged trade secret is not a computer program or combination of programs with one or more source codes. It is merely a system architecture.
See
Webster Testimony, Tr. at 1181 (distinguishing between the design and architecture of a software system and the ultimate product that gets derived from that design). In fact, plaintiffs counsel and witnesses have compared LinkCo’s system to the architecture of a building.
See
Tr. at 48; Webster Testimony, Tr. at 1180. While this analogy helps to explain how LinkCo’s combination of elements may be novel, it also demonstrates how the architecture will be easily ascertainable by the public once the product is marketed. Similar to the architecture of a building, once the combination of LinkCo’s elements is seen by the public, the system’s architecture will become obvious and easily duplicated. In
Hudson Hotels,
the court found that once thе hotel room is “built, marketed, and occupied, the features of the room would necessarily be disclosed publicly.”
Hudson Hotels,
b. Alternative Ground for Rejecting Trade Secret
It is well-established that marketing concepts and new product ideas are not
*500
considered trade secrets.
See Hudson Hotels,
Similarly, information consisting simply of business possibilities or goals is not a trade secret.
See PSC Inc. v. Reiss,
While I find it highly unlikely, it is possible that a reasonable jury could find that LinkCo’s software architecture system is something more than a marketing concept, new product idea, possibility, goal or some combination thereof. Because I conclude that LinkCo’s 26-element corporate disclosure system cannot be a trade secret as it is does not satisfy the element of being “used secretly and continuously in commerce”,
Hudson Hotels,
C. Unfair Competition Claim
The central principle underlying a claim for unfair competition under New York law is that one may not misappropriate the results of the labor, skill, and expenditures of another.
See Saratoga Vichy Spring Co., Inc. v. Lehman,
The New York pattern jury instructions identify several types of unfair competition: trade secrets, trademark, trade name infringement, palming off, misappropriation, and false labeling or advertising.
See
2 N.Y. PJI3d 405 (2001). However, the Second Circuit has made clear that unfair competition is not limited to the categories of infringement that have been described in New York’s pattern jury instructions or recognized by courts, but instead encompasses a broad range of conduct.
See National Basketball Ass’n v. Motorola, Inc.,
1. Misappropriation of Trade Secrets and Ideas
Fujitsu argues that there are only two possible predicates to LinkCo’s unfair competition claim: trade secret misappropriation and idea misappropriation.
See
Def. Outline at 7-8. The parties agree that if the predicate is trade secret misaрpropriation, then LinkCo’s unfair competition claim is duplicative of its trade secret claim.
See
Def. Outline at 7; Oral Arg. Tr. at 1961;
see also Abernathy-Thomas Eng’g Co. v. Pall Corp.,
Under New York law, a claim for idea misapprоpriation requires: (1) a legal relationship between the parties in the form of a fiduciary relationship, an express or implied-in-fact-contract,' or quasi-contract, and (2) a novel and concrete idea.
See Adsani v. Miller, PMA,
No. 94 Civ. 9131,
2. Misappropriation of Information
Instead, LinkCo argues that there can be a misappropriation of labor, skill, and expenditures that does not fall within either trade secret or idea misappropriation. See Pl. Mem. at 23. In support of this claim, LinkCo points to the fact that New York courts have recognized an additional tort — unfair competition based on “investment” misappropriation — despite the fact that there are separate torts for trade secret misappropriation and idea misappropriation, which suggests that unfair competition is a broader cause of action. See id. at 22.
Indeed, the doctrine of unfair competition has been applied in various situations, like this, where a plaintiff alleges misappropriation of information that does not rise to the level of misappropriation of trade secrets or ideas.
See, e.g,, Robotic Vision Sys., Inc. v. General Scanning, Inc.,
No. 96-CV-3884,
A claim for unfair competition based on misappropriation generally involves the taking of a property right.
Roy Export,
D. Damages
Because the claims for tortious interference with contract and misappropriation of trade secret are dismissed, the sole remaining question is whether there is a legally sufficient evidentiary basis for a jury to calculate an award of damages on LinkCo’s unfair competition claim. See Def. Outline at 2. Fujitsu argues that there is insufficient proof in the record from which a jury can “fill in the blanks” in the methodology for calculating damages offered by LinkCo’s expert, Aron Levko. Id. LinkCo contends that the evidence is not only greater than Fujitsu suggests, but also sufficient for a jury to either “fill[ ] in Levko’s blanks” or use alternate methods to detеrmine damages. Pl. Mem. at 19.
The assumption underlying the parties’ damages arguments is that this is a trade secret misappropriation case, for which this Court has ruled that the most appropriate measure of damages is a reasonable royalty. See 9/4/02 Tr. at 3-4. However, it is now necessary to determine the appropriate measure of damages on an unfair *503 competition claim, an issue upon which this Court has not yet ruled. Once a method for calculating damages has been established, the final question is whether Link-Co has offered sufficient proof from which a reasonable jury can determine the amount of damages.
Damages in unfair competition cases are typically determined by plaintiffs lost profits resulting from defendаnt’s improper conduct.
See American Safety Table Co. v. Schreiber,
In trade secret misappropriation cases, however, the courts have diverged from a straight lost profits analysis in cases where plaintiffs losses and defendant’s actual gain cannot be easily computed.
See Vermont Microsystems, Inc. v. Autodesk, Inc.,
I have already held that a reasonable royalty would have been the best method for calculating damages for Fujitsu’s alleged misappropriation of a trade secret because lost profits would be difficult to establish given that: (1) LinkCo ceased operations not long after the alleged misappropriation, and (2) Fujitsu made no significant profits from such misappropriation. See 9/4/02 Tr. at 4. A similar method should be used with respect to the lost profits elеment of damages in an unfair competition claim because the same difficulties exist with respect to calculating potential profits.
Moreover, it is well established that if there is a claim, there must be a remedy.
Cf. Commercial Union Assurance,
The following factors should be considered when assessing damages on an unfair competition claim based on the misappropriation of information: (1) the time spent *504 developing the information, (2) the money invested, (3) the labor invested, and (4) a reasonable portion of the expected profitability of the final product that incorporates the misappropriated information, measured at the time of a hypothetical negotiation for the sale or licensing of the property created -by plaintiffs labor, skill and expenditures. In determining the “reasonable portion of the expected profitability,” the jury must evaluate how much of the final product was based on plaintiffs information. Because plaintiffs work does not rise to the level of a trade secret, plaintiff is not entitled to the full reasonable royalty that would be paid fоr the use of a trade secret. Trade secret law places a premium on the value of secrecy, and creates exclusive rights in the holder of the secret. Misappropriation of information cannot be used as an end-run around the secrecy requirement.
The absence of evidence of any of these factors is not dispositive. For example, the inability to find profits does not preclude a damage award. A jury may choose to award damages solely for the amount of money or time plaintiff invested in developing the information.
LinkCo has presented many documents and hours of testimony concerning its damages. Although much of the evidence is circumstantial, the Court may not weigh the credibility of witnessеs or consider the weight of the evidence.
See Reeves,
IV. CONCLUSION
For the reasons set forth above, Link-Co’s claims for tortious interference with contract and misappropriation of trade secret are dismissed. Fujitsu’s motion to dismiss LinkCо’s claim of unfair competition is denied.
Notes
. LinkCo withdrew its conversion claim at the start of the trial and previously withdrew its misappropriation of trade secret claim under Massachusetts law. See 9/30/02 Trial Transcript ("Tr.”) at 6.
. On October 17, 2002, Fujitsu prepared an outline setting forth the legal and factual bases for its JMOL motion. See Outline of Fujitsu's Argument Pursuant to Fed.R.Civ.P. 50(a) ("Def.Outline”). On October 18, 2002, the Court heard oral argument. See 10/18/02 Transcript of Oral Argument on Motion for Judgment as a Matter of Law ("Oral Arg. Tr.”). On October 22, 2002, LinkCo filed its opposition. See Memorandum of Law in Opposition to Fujitsu's Motion for Judgment as a Matter of Law (“Pl.Mem.”). On the same day, Fujitsu submitted a revised version of its October 17, 2002 outline, see Memorandum in Support of Fujitsu's Motion for Judgment as a Matter of Law Pursuant to Fed.R.Civ.P. 50(a) ("Def.Mem.”), as well as a supplemental memorandum in support оf its motion. See Supplemental Memorandum in Support of Fujitsu’s Motion for Judgment as a Matter of Law Pursuant to Fed.R.Civ.P. 50(a) ("Def.Supp.Memo”). On the following day, Fujitsu submitted a reply to LinkCo’s opposition. See Reply Memorandum in Support of Fujitsu's Motion for Judgment as a Matter of Law Pursuant to Fed.R.Civ.P. 50(a) ("Def. Reply Mem.”).
. The absence of proof is so evident that Link-Co has not even attempted to identify trial testimony to illustrate Fujitsu's direct knowledge of Kanda's contract. See PL Mem. at 2-4 (citing testimony that Fujitsu only knew Kanda was employed by LinkCo).
. In a pretrial telephone conference, this Court ruled that the only way LinkCo could recover damages for its claim regarding Fujitsu’s use of the TanshinStation name is if the elements of the tortious interference claim were established, and the use of "TanshinStation” by Fujitsu were found to be a consequence of that interference. Because I am dismissing the tortious interference claim, there is no basis for an award of damages for the use of the TanshinStation name.
. The parties agree that a trade secret can consist of separate elements, each of which is in the public domain, when there is something novel and unique about the combination of the elements creating a unified process, design or operation. See PI. Mem. at 9; Def. Reply Mem. at 3.
. Four of these six factors concern secrecy: factors 1, 2 3, and 6.
. Because the system architecture cannot be a trade secret, there is no need to discuss the proof as to whether defendant used the alleged trade secret in breach of an agreement, confidential relationship or duty, or as a result of discovery by improper means. See supra Part 1II.B.
