MEMORANDUM AND ORDER
Pending before the Court are Defendants’ Joint Motion to Dismiss for Plaintiffs Failure to State a Claim (Doc. No. 91); Defendants Benton T. Knobloch and Wellbore Energy Solutions, LLC’s Motion for Partial Summary Judgment as a Matter of Law (Doc. No. 181); Defendants’ Joint Expedited Motion for Protection from Discovery of Proprietary Trade Secret Information (Doc. No. 300). After considering the parties’ filings, all responses and replies thereto, and the applicable law, the Court finds that Defendants’ motion to dismiss should be granted in part and denied in part, Defendants’ motion for partial summary judgment should be granted in part and denied in part, and Defendants’ joint expedited motion for protection should be denied.
I. BACKGROUND
This suit involves the alleged misappropriation of trade secrets and violation of non-compete agreements by former employees of Plaintiff M-I LLC (“M-I”), including Chad Stelly, Stephen Squyres, and Benton T. Knobloch, three of the Defendants in this case. 1
M-I LLC (“M-I”) is an oilfield contractor that provides “products and services to oilfield drillers and operators who are involved in successful completion of down-hole operations and the cleanout of well-bores.” (Second Am. Compl., Doc. No. 355, ¶ 8.) Defendants Chad Stelly (“Stelly”) and Stephen Squyres (“Squyres”) were employees of M-I at its Houston offices. Both employees signed trade secret agreements and covenants not to compete during their employment at M-I. Pursuant to these and other agreements, Stelly and Squyres agreed to maintain confidential all of M-I’s trade secrets and proprietary information both during employment and afterward, and also agreed not to compete against M-I for a period of two years after termination of employment. (Id. ¶ 9.) In their employment capacity, Stelly and Squyres specialized in rental and technical support of wellbore cleanout equipment. Stelly and Squyres promoted tools to M-I customers throughout the Gulf of Mexico, Texas, Louisiana, and Alabama. M-I alleges that it “provided and entrusted” to Stelly and Squyres extensive trade secret and other proprietary information, including tool drawings, designs, and specifications. (Id. ¶¶ 10-11.)
Defendant Benton T. Knobloch (“Knob-loch”) was an employee with Specialised Petroleum Services International, Inc. f/k/a Global Completion Services, Inc. (“SPS/GCS”), which was a subsidiary of SPS Petroleum Services Group Limited (“SPS”). M-I acquired SPS and SPS/GCS on August 2, 2006, and received assignment of all contractual rights.
(Id.
¶ 18.) Knobloch signed agreements promising not to disclose any confidential information, solicit SPS/GCS’s customers, interfere with SPS/GCS’s customer relationships, or compete with SPS/GCS. M-I avers that SPS/GCS and M-I gave Knob-loch access to confidential information, including tool drawings, designs, and specifi
After Knobloch formed WES, M-I alleges that he began “raiding” employees from M-I, ultimately hiring a total of thirteen employees from M-I. Squyres joined WES in 2008, and Stelly joined in 2009. M-I asserts that Defendants have both stolen M-I’s trade secrets and other confidential information, and violated their respective covenants not to compete. (Id. ¶¶ 15-16.) M-I believes that WES designed twelve of its wellbore tools by relying on M-I’s trade secrets.
Based on these averments, M-I brings fourteen counts against Stelly, Squyres, Knobloch, and WES. Those counts include: breaches of various employment agreements, including trade secret agreements, covenants not to compete, and confidentiality contracts; common law misappropriation of trade secrets; tortious interference with M-I’s customer contracts, prospective business relations, and employment contracts; breach of fiduciary duty; violations of the Texas Theft Liability Act, Tex. Crv. Prac. & Rem.Code Ann. §§ 134.001-134.005 (Vernon 2005); conspiracy; unfair competition by misappropriation; violations of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030; and conversion.
Defendants have filed a motion to dismiss M-I’s claims, arguing that they fail to state a claim upon which relief can be granted. They have also filed a motion for summary judgment, arguing that M-I’s state tort claims are preempted by federal copyright law, and that Knobloch’s covenants not to compete are unenforceable because they are unreasonable restraints of trade. Last, Defendants have filed a motion for protection, arguing that M-I has not made the requisite showing of necessity to obtain trade secret materials in discovery. The Court takes up each of the arguments in turn.
II. MOTION TO DISMISS
Defendants have filed a joint motion to dismiss for failure to state a claim. They argue that M-I’s complaint fails to comply with Rule 8 under the Supreme Court’s Twombly and Iqbal decisions. (Defs.’ Joint Mot. to Dismiss for Pl.’s Failure to State Claim, Doc. No. 91, ¶ 14.) Specifically, Defendants argue that the complaint does not contain sufficient allegations to state a claim for misappropriation of trade secrets, fails to state facts in support of MI’s three tortious interference claims, and fails to state more than legal conclusions for the remaining ten claims. (Id. ¶¶ 15-19.) M-I responds that Defendants’ motion is untimely, and in any case, that their pleading meets Rule 12(b)(6) standards.
A. Legal Standard
A court may dismiss a complaint for “failure to state a claim upon which relief can be granted.” Fed. R. Civ. P. 12(b)(6). “To survive a Rule 12(b)(6) motion to dismiss, a complaint ‘does not need detailed factual allegations,’ but must pro-. vide the plaintiffs grounds for entitlement to relief — including factual allegations that when assumed to be true ‘raise a right to relief above the speculative level.’ ”
Cuvillier v. Taylor,
When considering a Rule 12(b)(6) motion to dismiss, a court must “accept the complaint’s well-pleaded facts as true and view them in the light most favorable to the plaintiff.”
Johnson v. Johnson,
Ultimately, the question for the court to decide is whether the complaint states a valid claim when viewed in the light most favorable to the plaintiff. The court must accept well-pleaded facts as true, but legal conclusions are not entitled to the same assumption of truth.
Iqbal,
B. Analysis
The Court notes, at the outset, that subsequent to Defendants’ motion to dismiss, M-I amended its complaint. The live pleading is M-I’s Second Amended Complaint (Doc. No. 355). The Court will apply the motion to dismiss to the live pleading.
1. Waiver
The Court first considers whether Defendants have waived their Rule 12(b)(6) arguments by filing responsive pleadings before moving to dismiss. Defendants answered M-I’s original complaint.
{See
Doc. Nos. 7, 9, & 28.) They now move to dismiss M-I’s amended complaint. M-I argues that Defendants have waived their Rule 12(b)(6) arguments, because the rule “expressly mandates” that a motion brought pursuant to the rule “ ‘shall be made before pleading.’ ” (PI. M-I LLC’s Resp. to Defs.’ Mot. to Dismiss for Failure to State a Claim Pursuant to FRCP 12(b)(6)
&
Mot. for Leave to File Am. Compl., Doc. No. 113, at 2 (quoting Fed. R. Civ. P. 12(b)(6).) Because Defendants already filed responsive pleadings to M-I’s original complaint, M-I argues that they may not now oppose an amended complaint. Defendants respond that their motion is timely and not waived. They argue that, because Defendants are allowed to file a responsive pleading to M-I’s amended complaint, they are also allowed to “challenge that complaint’s validity under
Defendants rely on
Bromfield v. McBurney
in arguing that their motion to dismiss is timely. In that case, the defendants moved to dismiss plaintiffs original complaint. The court subsequently ordered plaintiff to file an amended complaint curing certain deficiencies. The plaintiff did so, and defendants filed a second motion to dismiss. Plaintiff responded that the defendants motion should be denied, because only one 12(b)(6) motion could be filed. The court rejected that argument, noting that Rule 12(b)(6) “merely provides that a motion asserting a defense for failure to state a claim upon which relief can be granted, or any of the other specific defenses set forth therein, ‘must be made before pleading if a responsive pleading is allowed.’”
Though Bromfield supports Defendants’ general argument that an amended complaint grants defendants the opportunity to challenge its validity anew under Rule 12(b)(6), the circumstances of the cases are different. The defendants in Bromfield never answered the original complaint. Instead, they challenged both the original and amended complaint on Rule 12(b)(6) grounds. In this case, by contrast, each Defendant answered M-I’s original complaint, and urged this Court to dismiss on 12(b)(6) grounds only after the amended complaint had been filed.
The Court does not have to decide that question, however, because Defendants prevail for another reason. Each Defendant raised the defense of failure to state a claim upon which relief can be granted in their answers.
{See
Chad Stelly’s Am. Answer, Doc. No. 7, ¶ 89 (“Stelly affirmatively asserts that M-I’s claims are barred, in whole or in part, because M-I has failed to state a claim upon which relief may be granted”); Stephen Squyres’ Am. Answer, Doc. No. 9, ¶ 89 (same); Defs. Benton Knobloch & Wellbore Energy Solutions, LLC’s Original Answer and Counterclaim, Doc. No. 28, ¶ 95 (“Knob-loch and [WES] plead failure to state a claim”).) Rule 12(b) provides that “[n]o defense or objection is waived by joining it with one or more other defenses or objections in a responsive pleading.” Rule 12(i) provides that “[i]f a party so moves, any defense listed in Rule 12(b)(l)-(7) — whether made in a pleading or by motion ... must be heard and decided before trial unless the court orders a deferral until trial.” Fed. R. Civ. P. 12(i). Because the Defendants’ motion to dismiss is based on a defense they raised originally in their answers, M-I’s waiver argument fails.
See Desperado Motor Racing & Motorcycles, Inc. v. Robinson,
2. Misappropriation of trade secrets
Defendants aver that M-I has failed to plead adequately its misappropriation of trade secrets claim. Under Texas law, the elements of misappropriation of trade secrets are: (1) a trade secret existed, (2) the trade secret was acquired through a breach of a confidential relationship or discovered by improper means, and (3) the defendant used the trade secret without authorization from the plaintiff.
CQ, Inc. v. TXU Mining Co.,
M-I’s Second Amended Complaint alleges that Stelly, Squyres, and Knobloch had access to “nonconformance reports, tool drawings, tool designs, tech units, tool utility reports, scrap reports, job proposals and procedures, sales forecasts, job tracker, customer preferences, tool research and developments and project information,” and other confidential information. (Doc. No. 355, ¶ 11; see also id. ¶ 19.) MI further alleges that Defendants induced Stelly to misappropriate M-I’s technology and trade secrets for use in WES’s business operations, and that:
In the days before he notified M-I that he was quitting, Stelly connected external memory devices to his M-I laptop and transferred files to these devices from the laptop. A forensic analysis of Stelly’s External Hard Drive and USB Drive revealed that M-I’s files were on these devices and that some of these files had been transferred from Stelly’s laptop. In addition, on March 8, 2009, Stelly began downloading M-I’s files on to his M-I laptop immediately after ending a cell phone conversation with Knob-loch. Similarly, on March 6, 2009, Stelly called Knobloch minutes before he plugged in an external memory device to his laptop. Because this computer activity occurred after Stelly accepted employment with WES and in close proximity to phone calls with Knobloch, M-I has reason to believe that Stelly was accessing M-I’s Confidential Information and files for his and for WES’s use.
(Doc. No. 355, ¶ 15.) 2 Finally, M-I maintains that Knobloch resigned from M-I and immediately formed WES. (Id. ¶ 24.) M-I provides a list of fourteen specific tools whose designs and technologies were allegedly used by WES. (Id. ¶ 21.)
Nevertheless, Defendants argue that MI has failed to allege facts to support its claim because there are no facts showing what trade secret was misappropriated, that Nil’s trade secrets were actually used or disclosed by Defendants, and what injury was suffered by M-I. The Court disagrees. On the contrary, M-I has alleged that its designs and technologies related to fourteen tools constitute trade secrets, that Defendants took the information in violation of their confidentiality agreements, and have used it to build its own tools. While, of course, it is true that at least some of M-I’s allegations rest on circumstantial factual support, the Court believes that, through discovery, M-I may be able to collect evidence of the allegedly unlawful behavior to more fully support its claims. Of course, in the final calculus, it may not be able to prove its allegations and the case could very well be dismissed on a future motion for summary judgment or at trial. What is material at this stage, however, is that M-I has alleged facts that “ ‘raise a right to relief above the specula
3. Tortious interference with customer contracts
Count Four alleges tortious interference with M-I’s customer contracts. A plaintiff must establish the following elements to succeed on a tortious interference with contract claim: (1) the existence of a contract subject to interference, (2) willful and intentional interference, (3) that proximately causes damage, and (4) actual damage or loss.
Specialties of Mex. Inc. v. Masterfoods USA
The Court agrees with Defendants. After combing through M-I’s complaint, the Court can discern only two passages that even tangentially put forth facts relating to Nil’s tortious interference with customer contracts claim. First, M-I alleges:
Stelly and Squyres are ... soliciting MI’s customers based on the relationships they formed and further developed while at M-I. Stelly has solicited and/or is soliciting and renting competing tools to: BP p.l.c., Chevron Corporation, Devon Energy Corporation, Exxon Mobil Corporation, Walter Oil and Gas Corporation, Marathon Oil Corporation, and Eni S.p.A. Squyres is soliciting and renting WES tools primarily to BP p.l.c. just as he did while at M-I.
(Doc. No. 355, ¶ 13.) Second, M-I asserts:
The Defendants’ misappropriation, breaches of contract, and interference has caused M-I substantial harm. M-I has learned that it lost at least one well to WES when BP awarded the ThunderHorse Project 778 #2 Well to WES instead of M-I because of Squyres’s sales efforts. M-I has provided Well-bore cleanout tools and services to BP for other ThunderHorse wells, and expected to provide the same for 778 # 2. Defendants have unfairly competed and continue to unfairly compete with M-I on other projects using M-I’s former employees and M-I’s Confidential Information. WES was awarded the ThunderHorse 778 # 2 because of Squyres’s breach of his contracts with M-I, WES’s interference with those contracts, the inevitable use and disclosure of and continued use of M-I’s Confidential Information, and the use of M-I’s tool designs.
(Id.
¶29.) The Court finds that these pleadings fail for two reasons. First, while M-I avers that it “had valid contracts with certain customers,” it fails entirely to allege or designate a specific contract that is the subject of interference.
Second, the Court finds that M-I has failed to adequately plead the proximate cause element of this cause of action. To show proximate cause, “a plaintiff must allege that ‘the defendant took an active part in persuading a party to a contract to breach it.’ ”
Hambric Sports Mgmt., LLC v. Team AK, Inc.,
Thus, the Court finds that M-I has not set forth sufficient factual matter that states a plausible claim for relief.
Iqbal,
4. Tortious interference with prospective business relations
Count Five alleges tortious interference with prospective business relations. In order to establish this claim, a plaintiff must prove: (1) a reasonable probability that the plaintiff would have entered into a business relationship; (2) an independently tortious or unlawful act by the defendant that prevented the relationship from occurring; (3) the defendant did such act with a conscious desire to prevent the relationship from occurring or the defendant knew the interference was certain or substantially certain to occur as a result of the conduct; and (4) the plaintiff suffered actual harm or damages as a result of the defendant’s interference.
Specialties of Mex. Inc. v. Masterfoods USA,
M-I counters that it “has produced documents” during discovery “showing that it had a relationship with BP and that it submitted a quote” on the BP ThunderHorse Well project. (Doc. No. 113, ¶ at 10.) The Court may not look to documents not referenced or included in the pleadings when considering a Rule 12(b)(6) motion to dismiss.
Collins v. Morgan Stanley Dean Witter,
After examining the pleading, the Court concludes that this tortious interference claim falls short of the Rule 12(b)(6) pleading standard. M-I fails to set forth any allegations establishing a reasonable probability that it would have entered into a business relationship. The closest it comes -is its averment that it “has provided [w]ellbore cleanout tools and services to BP for other ThunderHorse wells, and expected to provide the same for 778 #2,” but instead lost the project to WES. (Doc. No. 355, ¶ 29.) This statement, however, does not plead a reasonable probability that M-I and BP would have entered into a contractual relationship for the ThunderHorse project. Furthermore, M-I fails to plead any other business relationships that are the subject of this claim.
The Court also finds that M-I has failed to adequately plead the third claim, which requires a plaintiff to establish that the defendant committed an independently tortious act with a conscious desire to prevent the relationship from occurring, or knew the interference was certain or substantially certain to occur as a result of the conduct. M-I has not pled that Defendants committed misappropriation and/or breach of fiduciary duty with a conscious desire to cause, or with the certain knowledge that, it was preventing Mi’s specific business relationship from forming. For these reasons, M-I’s tortious interference with prospective business relations claim is dismissed. M-I may replead.
5. Tortious interference with MI’s employment contracts
Count Six alleges tortious interference with M-I’s employment contracts. The elements of a tortious interference with contract claim are: (1) the existence of a contract subject to interference, (2) willful and intentional interference, (3) that proximately causes damage, and (4) actual damage or loss.
Specialties of Mex. Inc. v. Masterfoods USA,
M-I identifies several contracts as the subject of this interference claim, including the M-I Trade Secret Agreement and Covenant Not to Compete, M-I Employee Invention and Confidential Information Agreement, GCS and SPS Confidentiality Agreements, and/or at-will employment agreements. (Doc. No. 355, ¶ 59.) The Court finds that the first element is satisfied.
Next, as to a showing of willful and intentional interference, M-I pleads, “WES and its agents, including Knobloch and Squyres, knew or had reason to know of those of [the] contracts, specifically the employment agreement^] and Trade Secret Agreement and Covenant Not to Compete, because Squyres and other WES agents had essentially the same agreements with M-I and WES.” (Doc. No. 355, ¶ 60.) M-I alleges further that a number of its employees left M-I to join WES. (Id. ¶¶ 24-28.) Finally, M-I alleges:
On March 3, 2009, Knobloch induced Stelly to breach his employee agreement with M-I. Before he quit, Stelly told WES and Knobloch that Stelly had a noncompete agreement with M-I. WES and Knobloch willfully disregarded that M-I contract just as it had disregarded the previously raided employees’ contracts with M-I and as it has continued to disregard them.
(Id. ¶27.) M-I provides enough factual allegations to support the second element of its tortious interference claim.
Third, in order to prove proximate damage, M-I has pled that “Knobloch and WES induced each of aforementioned employees and possibly others to quit M-I for increased compensation and/or other benefits or a total increased employment package.” (Doc. No. 355, ¶ 28.) Finally, M-I pleads actual damage in the form of lost employees and the cost of retraining new employees.
Accordingly, the Court finds that M-I has alleged and provided factual support for each element of its tortious interference with employment contracts claim, thereby stating a plausible claim for relief.
Iqbal,
6. The remaining arguments
Defendants do not provide specific arguments for dismissal of each of the remaining claims, but instead aver generally that “the remaining 10 claims are no more than conclusions, which are not entitled to the assumption of truth and are unsupported by factual allegations.” (Doc. No. 91, ¶ 19.) Defendants then list a series of arguments aimed at various causes of action. The Court considers each argument in turn:
a. Texas Theft Liability Act
Defendants argue that there are no allegations in support of an unlawful appropriation of trade secrets under Texas Penal Code § 31.05, which is required in order to support M-I’s Texas Theft Liability Act claim. Section 31.05 provides that a person commits an offense if, without the owner’s consent, he knowingly steals a trade secret, makes a copy of an article representing a trade secret, or communicates or transmits a trade secret. Tex. Penal Code Ann. § 31.05 (Vernon 2003). As stated above, M-I alleges that, in the days before Stelly notified M-I he was quitting, he transferred files onto an external memory device. (Doc. No. 355, ¶ 15.) The Court finds that this factual allegation is sufficient to support a claim of theft of
b. Unfair competition
Count Ten alleges unfair competition by misappropriation against all Defendants. Defendants insist that there are no facts in support of unfair competition. Specifically, Defendants aver that “the complaint is silent on facts to show the creation of MI’s trade secret information through extensive time, labor, skill and money, that Defendants used M-I’s trade secrets in competition with M-I or commercial damage with M-I.” (Doc. No. 91, ¶ 19.)
In order to show unfair competition by misappropriation, a plaintiff must establish: (1) the creation by plaintiff of a product through extensive time, labor, skill, and money; (2) the use of that product by defendant in competition with plaintiff, thereby giving the defendant a special competitive advantage because he was burdened with little or none of the expense incurred by plaintiff in the creation of the product; and (3) commercial damage to plaintiff.
Cable Elecs., Inc. v. N. Am. Cable Equip., Inc.,
M-I emphasizes its efforts in creating wellbore cleanout products in several places in the complaint. For example, MI avers, “M-I spent considerable amounts to create information [including tool drawings, designs, sales forecasts, tool research and development, market strategies, etc.] This information is M-I’s institutional knowledge and history of its wellbore cleanout tool business. It is the product of many years of experience, dozens of skilled employees’ labor, and millions of dollars spent in research, testing and application.” (Doc. No. 355, ¶ 12.) With information that M-I acquired in its asset purchase agreement with SPS/GCS, M-I states, “SPS/GCS spent considerable amounts of time and money to create this information and develop it. M-I spent a substantial amount of money to obtain the rights to this information. This information is SPS/ GCS’s and M-I’s institutional knowledge and history of its wellbore cleanout tool business. It is the product of many years of experience, dozens of skilled employees’ labor, and millions of dollars spent.”
(Id.
¶ 19.) With respect to M-I’s tool designs, M-I pleads, “M-I spent considerable amounts of time and money to research and develop this information and keep it secret. M-I employs engineers and designers to research and develop these tool designs. These designers and engineers take years to research and develop a tool, and it takes substantial additional time and money to test and market these tools.”
(Id.
¶ 22.) The Court finds that these averments are sufficient to plead the element of expended time, labor, skill, and money. Though M-I’s allegations are not particularly detailed at this point, the Fifth Circuit has instructed that they need not be. What matters, instead, is that M-I sets forth facts that “ ‘raise a right to relief above the speculative level.’ ”
Cuvillier,
Similarly, the Court finds that M-I has pled that WES is using M-I’s trade secrets in competition with M-I, and that MI has suffered commercial damage. M-I has listed twelve WES tools that it claims are being used in competition with its own tools. (Doc. No. 355, ¶ 21.) Further, it has alleged that it has lost at least one project, the BP Thunder Horse well, resulting in commercial damage.
(Id.
¶ 29.) The Court finds that, through its allegations, M-I has set forth a plausible basis
c. Computer fraud and abuse
Count Eleven alleges violations under the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. The CFAA prohibits, among other conduct, the unauthorized access to a “ ‘protected computer’ for the purposes of obtaining information, causing damage, or perpetrating fraud.”
Quantlab Techs. Ltd. (BVI) v. Godlevsky,
In its complaint, M-I has two passages that relate to this claim. First, M-I alleges that:
Stelly connected external memory devices to his M-I laptop and transferred files to these devices from the laptop .... In addition, on March 8, 2009, Stelly began downloading M-I files on to his M-I laptop immediately after ending a cell phone conversation with Knobloch. Similarly, on March 6, 2009, Stelly called Knobloch minutes before he plugged in an external memory device to his laptop.
(Doc. No. 355, ¶ 15.) Second, M-I asserts:
Defendants knowingly and with intent to defraud, accessed and used the computers) assigned to by M-I, without authorization or in a manner exceeding any authorization they may claim that they had. By means of such conduct, Defendants furthered the intended fraud. M-I believes that, because of Stelly’s activities in March 2009, Defendants used M-I’s computer to misappropriate, use, and share M-I’s trade secrets and proprietary Confidential Information without authorization.
(Id. ¶¶ 80-81.)
The CFAA is a criminal statute, but civil actions are authorized for some violations of its substantive provisions.
Fiber Sys. Int’l, Inc. v. Roehrs,
Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in subclauses (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i).
The only subclause potentially applicable here is subclause (I), which covers “loss to 1 or more persons during any 1-year period ... aggregating at least $5,000 in value.” 4 18 U.S.C. § 1030(c)(4)(A)(i)(I). The CFAA defines “loss” as follows:
[T]he term “loss” means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.
18 U.S.C. § 1030(e)(ll). “Damage” is defined as “any impairment to the integrity or availability of data, a program, a system, or information.” Id. § 1030(e)(8).
The Court finds that M-I fails to plead loss as it is defined in the CCPA. They have not alleged that any loss meets
In sum, M-I’s CCPA claim fails because M-I does not allege any facts showing at least $5,000 of loss, or any loss as a result of investigation or interruption of computer service. M-I’s current CCPA pleadings thus run afoul of Rule 12(b)(6) requirements, because they do not put forth facts that allow the Court to make an inference that Defendants are liable for any misconduct under the CCPA.
Iqbal,
III. MOTION FOR SUMMARY JUDGMENT
Defendants Knobloch and WES move for partial summary judgment on two grounds. First, they argue that M-I’s tort claims based on wrongful copying of tool designs are preempted by federal copyright law. Second, they argue that Knobloch’s covenants not to compete are unenforceable as a matter of law. (Defs. Benton T. Knobloch & Wellbore Energy Solutions, LLC’s Mot. for Partial Summ. J. as a Matter of Law, Doc. No. 181, at 1.)
A. Legal Standard
A motion for summary judgment under Federal Rule of Civil Procedure 56 requires the Court to determine whether the moving party is entitled to judgment as a matter of law based on the evidence thus far presented.
See
Fed. R. Civ. P. 56(c). Summary judgment is proper “if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law.”
Kee v. City of Rowlett,
1. Copyright preemption
Knobloch and WES move to dismiss “M-I’s tort claims based on wrongful copying of tool designs because the claims are preempted” by the U.S. Copyright Act, 17 U.S.C. §§ 101-1332. (Doc. No. 181, ¶ 7.) Whether a federal statute preempts state law is a question of law for this Court.
Franks Inv. Co. v. Union Pac. R.R. Co.,
Section 301(a) of the Copyright Act “accomplishes the general federal policy of creating a uniform method for protecting and enforcing certain rights in intellectual property by preempting other claims.”
Daboub v. Gibbons,
On and after January 1, 1978, all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103, whether created before or after that date and whether published or unpublished, are governed exclusively by this title. Thereafter, no person is entitled to any such right or equivalent right in any such work under the common law or statutes of any State.
17 U.S.C. § 301(a). The Fifth Circuit has established a two-part test to determine whether a state law claim is preempted. First, the cause of action is “examined to determine whether it falls “within the subject matter of copyright.’”
Daboub,
The first step requires the Court to determine whether the claim falls within the subject matter of copyright. Knobloch and WES argue that this case’s “implication of the copyright laws relates to the drawings, designs, technical manuals, specifications and plans of M-I’s tools which M-I alleges it owns and Defendants, copied.” (Doc. No. 181, ¶ 12.) They urge that those items fall within the subject matter of copyright. M-I does not dispute that its tool drawings and other material are copyrightable, but instead argues that the claims in this suit are based on “replicating tools using trade secret information, not copying copyright-protected drawings.” (PL M-I LLC’s Request for Relief & Resp. to Defs. Benton Knobloch & Wellbore Energy Solutions, LLC’s Mot. for Partial Summ. J. as a Matter of Law, Doc. No. 195, ¶ 7) (emphasis in original). Focusing on tool copying rather than tool drawing copying is important, M-I argues, because tools are useful articles that do not qualify for copyright protection under the Copyright Act.
Neither party, however, disputes the other’s argument regarding what is copyrightable matter. That is, M-I does not dispute that its drawings, designs, technical manuals, specifications, and plans fall under the subject matter of copyright. The Court agrees. Section 102 of the Copyright Act extends copyright protection to “original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” It then provides a list of categories of works of au
Similarly, Knobloch and WES do not dispute that the tools themselves do not qualify for copyright protection. The definition of a pictorial, graphic, or sculptural work under the Copyright Act is subject to a “useful article” exception:
[T]he design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.
17 U.S.C. § 101. A “useful article” is “an article having an intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information.” Id. M-I asserts, and Knob-loch and WES do not dispute, that the tools in question are useful articles whose aesthetic elements, if any, cannot be identified separately from, and exist independently of, the utilitarian aspects of the tool.
Given that the parties agree that the drawings of the tools are subject to copyright, but the tools themselves are not, the question for this Court to decide is whether the claim in question concerns the drawings or tools. After a review of the Second Amended Complaint (Doc. No. 355), the live pleading in this case, the Court concludes that M-I’s claims relate to tool drawings and similar information, and thus fall within the scope of copyright. In the relevant counts, M-I focuses on the theft of tool drawings and other information. M-I asserts, for example, that Knobloch, Stelly, and Squyres “received access to M-I’s tool design and technology, and drawings and specifications, especially the SPS and GCS tools which were acquired by M-I in 2006” (Doc. No. 355, ¶ 47); that “M-I’s tool designs and technology are proprietary information used by M-I in its business”
(id.
IT 49); that “Defendants have unlawfully obtained, used, and taken M-I’s Confidential Information in violation of agreements and Texas law”
(id.
¶ 69); and that “Defendants have taken and/or used, without permission, information and other property from M-I”
(id.
¶ 84). Taken as a whole, the gravamen of M-I’s complaint focuses almost exclusively on Stelly, Squyres, and Knobloch’s alleged theft of tool drawings, designs, and other confidential information from WES. The Court finds that the claims fall under the subject matter of
Next, the Court must consider whether the claim protects rights equivalent to any of the exclusive rights of a federal copyright. A state law claim protects rights equivalent to federal copyright claim where the core of the state law theory of recovery speaks to wrongful copying.
Daboub v. Gibbons,
The Fifth Circuit “evaluate[s] the equivalency of rights under what is commonly referred to as the ‘extra element’ test.”
Alcatel,
WES and Knobloeh assert that M-I’s state tort claims are equivalent to copyright claims. The claims include common law misappropriation of trade secrets, tortious interference with M-I’s customer contracts, tortious interference with prospective business relations, tortious interference with M-I’s employment contract, breach of fiduciary duty, violations of the Texas Theft Liability Act, conspiracy, unfair competition by misappropriation, and conversion.
WES and Knobloeh argue that the “core theory” of M-I’s state law tort claims is that Defendants wrongfully copied M-I’s tool designs through its drawings, designs, technical manuals, specifications, and plans. Knobloeh and WES assert that MI has stated throughout this case, including in answers to interrogatories and in hearings before the Court, that WES has copied its engineering drawings, specifications, and technical units. M-I argues that its state tort claims are not equivalent to copyright law claims, because each cause of action “requires at least one additional element not found in copyright law.” (Doc. No. 195, ¶ 10.) Specifically, M-I asserts that its claims of trade secrets and technology misappropriation includes the additional elements of (a) use of Mi’s trade secrets to create competing tools, (b) in direct violation of their contractual obligations and fiduciary duty to M-I. M-I believes that its allegations that certain defendants downloaded confidential information and took it to a new company is simply a prologue to its main allegation of the Defendants’ wrongful use of the misappropriated documents. Knobloeh and WES counter that M-I has drawn a distinction without a difference, arguing that to “make a tool from a design is to reproduce the design,” because the design itself must be copied in order to be used. (Defs. Benton T. Knobloeh & Wellbore Energy Solutions, LLC’s Reply to PI. M-I LLC’s Resp. to Defs.’ Mot. for Partial Summ. J. as a Matter of Law, Doc. No. 211, ¶ 4.)
The Court does not believe that the element of
use
of the copyrighted drawings to make tools constitutes qualitatively different behavior from the elements
Were [plaintiff] claiming an exclusive right to copy the manual, the drawings and plans or the [certificate] itself, his claim would surely be preempted by the Copyright Act. [Plaintiff] claims a much different interest, however: The right to use the [certificate] as a basis for obtaining an airworthiness certificate for an airplane that is modified in a particular way. [Plaintiff] thus complains not about the actual copying of the documents, but of their use as a shortcut in obtaining a valuable government privilege — the right to modify an airplane in a particular way without going to the trouble and expense of proving that the modification meets FAA standards.
Based on its review of the case law discussing federal copyright preemption, the Court concludes that some of M-I’s state tort claims are equivalent to federal copyright legal rights, and are therefore at least partially preempted. At least some of the claims, at their core, allege that Defendants copied and used tool designs, technologies, drawings, and specifications. The Court believes that the tort elements for some of M-I’s claims do not include qualitatively different elements than the elements for an action under the Copyright Act. The narrative that M-I has invariably constructed for this Court recounts the story of M-I’s former employees downloading and taking with them tool drawings, which WES then used to create, manufacture, and sell tools. Indeed, the overarching theme of the allega
In that way, this case is similar to
Gemcraft Homes v. Sumurdy.
In that case, the court analyzed a similar preemption question and determined that copyright law preempted plaintiffs conversion and tortious interference claims. There, two of the plaintiffs employees left their employment as sales counselors to start a new company. They had previously entered into employment agreements with the employer, promising that they would not take or use plaintiffs documents. Plaintiff sued its former employees, accusing them of stealing, copying, and plagiarizing building plans, and using them to build “ ‘identically virtual’ ” floor plans.
The Court finds instructive “Gemcraft Homes” facts and reasoning. Given that the basis of liability for many of M-I’s state tort claims is the theft of its trade drawings, and little else, the Court finds them to be preempted. The Court now turns to M-I’s individual tort claims to determine whether the rights therein are equivalent to, and thus preempted by, federal copyright law.
a. Common law misappropriation of trade secrets
Count 3 of the Second Amended Complaint accuses Knobloeh, WES, Stelly, and Squyres of common law misappropriation of trade secrets. “To prevail on a misappropriation claim under Texas law, ‘a plaintiff must show that (1) a trade secret existed, (2) the trade secret was acquired through a breach of a confidential relationship or discovered by improper means, and (3) the defendant used the trade secret without authorization from the plaintiff ”
CQ, Inc. v. TXU Mining Co.,
Texas’s misappropriation claim is typical of trade secrets claims nationwide, which “ ‘often are grounded upon a defendant’s breach of duty of trust or confidence to the plaintiff through improper disclosure of confidential material.’ ”
Stromback v. New Line Cinema,
The Court concludes that the additional element in trade secret misappropriation, which requires either a breach of confidential relationship or discovery by improper means, “regulates conduct qualitatively different from that regulated by federal copyright law.”
DSC Commc’ns Corp. v. Pulse Commc’ns, Inc.,
This Court’s own precedent also establishes that the breach of a confidential relationship provides the necessary additional element that makes a state tort claim qualitatively different from a federal copyright claim.
See, e.g., Baisden v. I’m Ready Prod., Inc.,
WES and Knobloch’s citations to the contrary do not sway this Court’s opinion. First, WES and Knobloch do not analyze each state tort claim element by element, but instead aver generally that the “core theory” of
all
of M-I’s state tort claims is that Defendants committed wrongful copying. Defendants fail to proffer any argument regarding the confidential relationship element discussed above. Second, Defendants’ citations to case law refer the Court to cases that either do not actually decide the question of preemption of a trade secrets claim,
see Ultraflo Corp. v. Pelican Tank Parts, Inc.,
b. Tortious interference with M-I’s customer contracts
Count Four of the Second Amended Complaint alleges tortious interference with M-I’s customer contracts. “Texas law protects existing contracts from interference by third parties.”
Specialties of Mex. Inc. v. Masterfoods USA,
In both cases, it is the act of unauthorized publication which causes the violation. The enjoyment of benefits from derivative use is so intimately bound up with the right itself that it could not possibly be deemed a separate element. See 1 Nimmer on Copyright § 1.01[B], at n. 46 (1983). As the trial court noted, the fact that cross-appellants pleaded additional elements of awareness and intentional interference, not part of a copyright infringement claim, goes merely to the scope of the right; it does not establish qualitatively different conduct on the part of the infringing party, nor a fundamental nonequivalence between the state and federal rights implicated.
Harper & Row Publishers, Inc. v. Nation Enters.,
Based on this case law, the Court holds that, to the extent M-I’s tortious interference claims are based on M-I losing benefits flowing from its exclusive right to tool drawings, designs, and other copyrightable material, its claims are preempted. To the extent the tortious interference claims relate to other than the benefits lost from exclusive enjoyment of tool drawings and other copyrightable material, however, they are not preempted. 6
The Court does not believe that the presence of a confidential relationship is material to M-I’s tortious interference claims. A breach of duty or trust does not constitute a necessary element for tortious interference, and courts have found such claims to be preempted in the context of theft of trade secrets.
Huckshold v. HSSL, LLC,
c. Tortious interference with prospective business relations
Count Five alleges that Defendants tortiously interfered with M-I’s prospective business relations. In addition to protecting existing contracts from interference, “Texas law also protects contracts that are not yet formed, but have a reasonable probability of being formed, from wrongful interference.” In order to establish tortious interference with prospective business relations, a plaintiff must prove: (1) a reasonable probability that the plaintiff would have entered into a business relationship; (2) an independently tortious or unlawful act by the defendant that prevented the relationship from occurring; (3) the defendant did such act with a conscious desire to prevent the relationship from occurring or the defendant knew the interference was certain or substantially certain to occur as a result of
d.Tortious interference with MI’s employment contracts
Count Six accuses Knobloeh, WES, and Squyres of tortiously interfering with M-I’s employment contracts. The elements of tortious interference with contract are outlined supra Part 111(B)(1)(b). The Court holds that Count Six is preempted to the extent it alleges that Defendants induced one another, and Stelly, to steal, copy, download, or otherwise reproduce M-I’s tool drawings, designs, and other copyrightable material. The Court finds that this claim fails the extra element test and thus is preempted. All other allegations under this cause of action survive.
e.Breach of fiduciary duty
Count Seven asserts breach of fiduciary duty claims against Stelly, Squyres, and Knobloeh. The Fifth Circuit is clear that such a claim survives copyright preemption.
See Daboub v. Gibbons,
f.Texas Theft Liability Act
Count Eight alleges violations under the Texas Theft Liability Act, Tex. Civ. Prac.
&
Rem.Code Ann. §§ 134.001-134.005 (Vernon 2005). Under the Texas Theft Liability Act, “[a] person who commits theft is liable for the damages resulting from the theft.”
Id.
§ 134.003. Theft, in turn, is defined as “unlawfully appropriating property or unlawfully obtaining services as described by” certain sections of the Texas Penal Code.
Id.
§ 134.002(2). M-I asserts theft under Section 31.05 of the Penal Code, which states that a “person commits an offense if, without the owner’s effective consent, he knowingly: (1) steals a trade secret; (2) makes a copy of an article representing a trade secret; or (3) communicates or transmits a trade secret.” Tex. Penal Code Ann. § 31.05 (Vernon 2003). The only potential extra element in theft liability is the “knowingly” requirement; however, as discussed
supra
Part 111(B)(1)(b), elements of knowledge do not establish an element that is qualitatively different from a copyright infringe
g. Conspiracy
Count Nine alleges civil conspiracy against all Defendants. The elements of civil conspiracy in Texas are: (1) a combination of two or more persons; (2) an object to be accomplished (an unlawful purpose or a lawful purpose by unlawful means); (3) a meeting of the minds on the object or course of action; (4) one or more unlawful, overt acts; and (5) damages as the proximate result.
Finserv Cas. Corp. v. Settlement Funding, LLC,
h. Unfair competition by misappropriation
Count Ten brings an unfair competition by misappropriation claim against all Defendants. The elements of unfair competition by misappropriation are: (1) the creation by plaintiff of a product through extensive time, labor, skill, and money; (2) the use of that product by defendant in competition with plaintiff, thereby giving the defendant a special competitive advantage because he was burdened with little or none of the expense incurred by plaintiff in the creation of the product; and (3) commercial damage to plaintiff.
Cable Elecs., Inc. v. N. Am. Cable Equip., Inc.,
i. Conversion
M-I’s last tort claim alleges that Defendants have committed conversion. The elements of conversion under Texas law are as follows: (1) the plaintiff owned, had legal possession of, or was entitled to possession of the property; (2) the defendant assumed and exercised dominion and control over the property in an unlawful and unauthorized manner, to the exclusion of and inconsistent with the plaintiffs rights; and (3) the defendant refused the plaintiffs demand for the return of the property.
City Bank v. Compass Bank,
2. Covenant not to compete enforceability
As its second basis for partial summary judgment, WES and Knobloch argue that the covenant not to compete in Knobloch’s Confidentiality Agreement and Employment Agreement are unenforceable under Texas law. WES and Knobloch assert that the covenant not to compete in Knob-loch’s confidentiality agreement is invalid due to a lack of limitation on geographic area or scope of activity limitation. Next, they aver that a separate covenant, contained in Knobloch’s employment agreement, is unenforceable because it operates as an industry-wide exclusion, is overbroad as to customer contact, and contains no reasonable geographic limitation. Finally, WES and Knobloch argue that the covenant not to compete in the employment
The Texas Business and Commerce Code governs the enforceability of covenants not to compete. It provides:
[A] covenant not to compete is enforceable if it is ancillary to or part of an otherwise enforceable agreement at the time the agreement is made to the extent that it contains limitations as to time, geographical area, and scope of activity to be restrained that are reasonable and do not impose a greater restraint than is necessary to protect the goodwill or other business interest of the promisee.
Tex. Bus. & Com.Code § 15.50(a) (Vernon 2005). The law relating to covenants not to compete adopted the Texas common law in many respects.
John R. Ray & Sons, Inc. v. Stroman,
Courts generally disfavor covenants not to compete “because of the public policy against restraints of trade and the hardships resulting from interference with a person’s means of livelihood.”
Zep Mfg. Co. v. Harthcock,
Knobloch appears to have signed two covenants not to compete during his tenure with M-I. The first is contained in his Confidentiality Agreement, and the second in his Employment Agreement. WES and Knobloch ask this Court to find the Confidentiality Agreement’s covenant to be unenforceable. The Court sees no need to take this action, however, because M-I has not sued Knobloch for violation of this covenant. Instead, M-I pleads:
Knobloch has breached and continues to breach these contracts. Knobloch breached and continues to breach the contracts by using and disclosing SPS/ GCS’s Confidential Information. Further, Knobloch has breached the Employment Agreement by forming and operating WES, competing and soliciting SPS/GCS employees and customers within six months of his termination at M-I.
(Doc. No. 355, ¶ 88.) Upon its reading of M-I’s pleading, the Court believes that MI alleges only that Knobloch has breached the covenant not to compete located in the Employment Agreement. In its briefing, M-I affirms this, arguing that they have not plead a non-compete claim under the Confidentiality Agreement. (Doc. No. 195, at 29.) The Court accepts and binds M-I to this representation; it is therefore unnecessary to consider the enforceability of the Confidentiality Agreement’s covenant not to compete.
The Court now turns to the covenant not to compete located in the Employment Agreement. M-I’s pleading, reproduced above, clearly brings a cause of
Noncompete; Working for Competitor: In consideration of Employee’s employment by Employer, the specialized training and access to confidential information promised by and given to Employee by Employer and other good and valuable consideration provided to Employee by Employer, Employee will not, at any time during the term of this Agreement or at any time for six (6) months subsequent to the termination of Employee’s employment for any reason (except as provided in Section 5 upon termination without cause), directly or indirectly, individually or as an agent, employee, owner, manager, consultant or representative of any entity, in any geographic area where Employer does business or is authorized to do business:
a. solicit, influence or attempt to influence any Customer, Potential Customer, or supplier of Employer to stop doing business with Employer or to do business with any of Employer’s competitors in the area of the Restricted Business. For purposes of this Section 8(a), “Customer” means any natural person or any entity that conducts business with Employer or has an account with Employer, and any parent, affiliates or subsidiaries of such persons or entities. Also, for purposes of this Section 8(a), “Potential Customer” means any natural person or any entity that might reasonably be expected to conduct business with Employer because Employer has, within the immediately prior six (6) month period, offered or presented its services to such persons or entities;
b. interfere with the relationship between Employer and any of Employer’s affiliates, Customers, Potential Customers or suppliers;
c.engage in the Restricted Business with any of Employer’s competitors. For purposes of this Agreement, “Restricted Business” shall mean any business or transaction involving oilfield displacement tools or services or any other businesses then conducted by Employer.
(Doc. No. 181, Ex. 2, at 6.) WES and Knobloch do not dispute that the covenant meets the first requirement under Texas law — that is, that the covenant was ancillary to or part of an otherwise enforceable agreement at the time it was made. Thus, the Court turns to the second requirement for covenants not to compete, and examines whether the covenant is reasonable and does not impose a greater restraint than is necessary to protect M-I’s business interest.
Knobloch and WES advance three objections to Knobloch’s covenant not to compete. First, they argue that the covenant imposes upon Knobloch an impermissible industry-wide work exclusion. The covenant not to compete prevents Knob-loch from engaging in the “Restricted Business” with any of the employer’s competitors. “Restricted Business” is defined as “any business or transaction involving oilfield displacement tools or services or any other businesses then conducted by” the employer. (Doc. No. 181, Ex. 2, at 6.) Defendants argue that, according to Texas law, a covenant not to compete containing an industry-wide exclusion from subsequent employment is unenforceable. (Doc. No. 181, ¶ 29.)
Second, Knobloch and WES argue that the covenant’s restriction on soliciting “potential customers” is overly broad and unduly restrictive. They urge this Court that, because the clause is not limited to clients with whom Knobloch actually interacted, the covenant not to compete is unenforceable.
(Id.
¶ 33.) The covenant not
Third, Knobloch and WES argue that the covenant is unenforceable because it contains no reasonable geographic limitation. The limitation in the covenant forbids Knobloch from competing in “any geographic area where Employer does business or is authorized to do business,” which Defendants argue covers a broad area encompassing at least 300 locations in 75 countries. Given such an indefinite description of geographic restriction, Knob-loch and WES urge this court to rule the covenant to be unenforceable.
M-I disputes each of these points. It asserts first that the relevant employer, as defined in the covenant, is SPS/GCS, not M-I. Next, M-I argues that the geographic and scope of activity limitations are reasonable given Knobloch’s position as a high level employee. M-I urges the Court to take a holistic approach in assessing the reasonableness of the covenant not to compete by considering the combination of the time, geographic, and scope of activity limitations together, rather than apart. M-I insists that the covenant not to compete’s geographical and scope of activity limitations should be viewed in light of the short six month duration of the entire covenant.
The Court considers M-I’s first counterpoint — that the relevant employer is SPS/ GCS, and not M-I — before moving to the merits of the covenant’s enforceability. Defining the relevant employer is an important step, of course, because that definitively sets the geographic and scope of activity limitations.
The Employment Agreement, which contains the covenant not to compete at issue, defines “Global Completion Services, Inc.” as the employer. (Doc. No. 181, Ex. 2, at 1.) M-I explains that Global Completion Services changed its name to SPS when it was acquired by M-I. (Doc. No. 195, ¶ 32.) M-I argues that the covenant not to compete relates to SPS/GCS business needs, rather than M-I’s business needs. The Court agrees. “An assignee stands in the same position as the assign- or, and may assert only those rights that the assignor had.”
Adams v. Petrade Int’l, Inc.,
WES and Knobloch respond that, although M-I argues that the relevant employer is SPS/GCS, M-I is nevertheless seeking damages based on M-I’s own lost profits, customers, and loss of future business opportunities. (Doc. No. 211, ¶ 13.) M-I’s pleading does state damages in terms of M-I’s lost money, employees, and opportunity. M-I is not, however, the proper benchmark for determining loss under the covenant not to compete. If M-I prevails on this claim, it must submit evidence showing the loss to SPS/GCS as a result of Knobloch’s alleged breach. The Court will award damages only on this basis. To do otherwise, by granting M-I damages based on its total losses, would
The Court now turns to the three objections to the covenant advanced by WES and Knobloch. They argue that the covenant not to compete operates as an “industrywide exclusion,” which they assert is impermissible under Texas case law. M-I argues that the covenant is not an industry-wide ban, but instead, applies only to well completion services. Thus, M-I insists, Knobloch “could have chosen to work in any of the multitude of other service sectors in the oil and gas industry.” (Doc. No. 195, ¶ 50.) WES and Knobloch appear to concede as much in their reply, but argue that, nevertheless, “[t]o an individual ... a global industry-wide prohibition for half a year, banning his ability to work in the oilfield displacement tools or services industry for six months, is not reasonable” because it imposes an undue hardship on an individual’s livelihood. (Doc. No 211, ¶ 15.)
In support of their position, WES and Knobloch cite
John R. Ray & Sons, Inc. v. Stroman.
In that case, an employee was hired as an insurance agent by a family-owned insurance agency. Pursuant to his employment contract, the employee could not “engage in or have an interest in any business that sold insurance policies or engaged in the insurance agency business within [the county] and all adjacent counties” for a period of five years from the date of the contract.
The combination of factors presented in Stroman convinces the Court that the case is readily distinguishable. First, as the Stroman court noted, the covenant not to compete in that case restricted the employee’s ability to work in the insurance business altogether. By contrast, as WES and Knobloch concede, Knobloch’s covenant not to compete does not bar him from working in the oil and gas industry altogether. As M-I notes, Knobloch could work in other service sectors within that industry, particularly given his engineering background.
Knobloch’s situation strikes the Court as more similar to the employee in
Curtis v. Ziff Energy Grp.
In that case, the employee worked for employer as the Vice President of Pipelines and Energy Marketing. The relevant covenant not to compete in that case prohibited the employee from engaging in competitive business in Canada or the United States. In the ensuing litigation over the covenant’s enforceability, the employee claimed that he was restricted from working for any oil and gas company in North America. The employer disagreed, and submitted evidence to show the court that it limited its competitors to twenty companies, which were comprised
According to Knobloch’s covenant not to compete, he is prohibited from competing in the “Restricted Business,” which is defined as “any business or transaction involving oilfield displacement tools or services or any other businesses then conducted by Employer.” (Doc. No. 181, Ex. 2, at 6.) Though M-I, unlike the employer in Curtis, did not provide evidence of SPS/GCS’s competitors in support of its argument that the covenant is not an industry-wide exclusion, the Court is satisfied that the plain language of the agreement does not create an industry-wide exclusion that encompasses all oil and gas, but instead restricts Knobloch from working for a competitor within the oil displacement tools or services industry. M-I asserts that SPS/GCS provided “niche” services to the oil and gas industry, and WES and Knobloch do not refute that characterization. Furthermore, although the definition of “Restricted Business” contains a catchall phrase that encompasses “any other business then conducted” by SPS/GCS, no allegation has been made that SPS/GCS operated businesses outside of well completion services. The Court finds that Knobloch’s covenant not to compete does not impose an impermissible industry-wide exclusion, but instead, restricts his competition to a reasonably narrow business area that correlates to his work with SPS/GCS.
The Court now turns to Knob-loch’s and WES’s argument that the covenant is unenforceable because it contains no reasonable geographic limitation. Texas courts generally require some geographic limitation in a valid covenant not to compete.
See, e.g., Goodin v. Jolliff,
WES and Knobloch rely on
Goodin v. Jolliff
for their argument that the covenant should fail because it fails to set forth a reasonable geographic limitation.
Goo-din
is inapposite. The covenant in that case failed to include “any limitation as to geographic scope whatsoever.”
“[N]on-compete covenants with restrictions covering a wide geographic area may be reasonable if they are limited in scope to a firm’s current or prospective clients such that they do not pose a greater restraint than necessary to protect the
Knobloch and WES’s third and last objection to the covenant not to compete concerns the limits on Knobloch interacting with all customers and potential customers. They argue that such a restriction is overbroad and unreasonable.
The covenant provides that Knobloch may not solicit any customers or potential customers for a period of six months. A customer is defined as an entity that conducts business or has an account with SPS/ GCS. A “potential customer” is defined as someone who “might reasonably be expected to conduct business” with SPS/GCS because SPS/GCS has, “within the immediately prior six (6) month period, offered or presented its services to such persons or entities.” (Doc. No. 181, Ex. 2, at 6.) WES and Knobloch cite Goodin v. Jolliff for the proposition that restricting Knobloch from contacting all customers, including those with whom he had no contact, is unreasonable. WES and Knobloch also object to the covenant’s requirement that Knobloch not “directly or indirectly ” compete with SPS/GCS. (Doc. No. 181, Ex. 2, at 6) (emphasis added). They argue that this language, similar to that found in Goodin, is also overbroad.
The Court addresses the second argument first. The pertinent part of the covenant in
Goodin
provided that the employees could not start a competing business, directly or indirectly, without “any limitation as to geographic scope whatsoever.”
The Court finds more troubling Knob-loch and WES’s central argument in this objection — the restriction on contacting customers. The covenant’s restriction on solicitation of all customers and potential customers, which surely covers clients with whom Knobloch had no contact. Texas courts have struck down such covenants as unenforceable.
TransPerfect Translations, Inc. v. Leslie,
The Court agrees with M-I that the factors included in the covenant not to compete should be considered in combination with one another, rather than as stand alone requirements. Applying that approach, the Court cannot say that the ban on all customer and potential customer contacts is unreasonable to protect SPS/ GCS’s business interest. Three important factors bring the Court to this conclusion. First, the short six-month duration of the covenant not to compete imposes a limited burden on Knobloeh. During that six-month period, Knobloeh still had several options: he could have chosen to work outside the wellbore completion industry, to work in that industry but outside of the Americas, or not to work and launch a competing business six months later. The Court is convinced that, given Knobloch’s scientific background and in-depth knowledge of the industry, all of those options remained open to him when he left his employment with SPS/GCS.
The second factor is the upper management position held by Knobloeh at SPS/ GCS. M-I has submitted evidence showing that Knobloeh was much more than a manager and salesman for his former employer. He oversaw SPS/GCS’s relationships with major international clients. (Knobloeh Dep. 85:15-86:25; Doc. No. 196, Exs. 25-27.) An engineer by training, Knobloeh participated in the design of SPS/GCS’s tools and in facilitating well-bore completions. He delivered technical presentations internationally, formulated company growth strategies, and discussed product development with engineers. (Doc. No. 196, Ex. 16.) Given Knobloch’s high level of involvement in the company’s growth and development, the Court believes that restricting him from contacting SPS/GCS’s customer base was reasonable.
The third, and perhaps most important, factor goes to SPS/GCS’s protect-able interest. Texas courts are generally concerned about customer contract restrictions where the client base is the protectable business interest.
See, e.g., Peat Marwick Main & Co. v. Haass,
The Court declines to grant WES and Knobloch summary judgment on the covenant not to compete. The covenant not to compete is a reasonable restraint of trade, and is therefore enforceable.
IV. DEFENDANTS’ MOTION FOR PROTECTION
Defendants have filed a joint expedited motion for protection from discovery of their trade secret information. They argue that, under the burden shifting mechanism applied in Texas state courts, when a party seeking protection has established that the information sought is a trade secret, the party requesting the information must establish that the information is necessary for a fair adjudication of its claim or defense. (Defs.’ Joint Expedited Mot. for Protection from Disc, of Proprietary Trade Secret Information, Doc. No. 300, ¶¶ 8-9.) Defendants assert that M-I has failed to make this critical showing, and thus is not entitled to discovery. (Id. ¶¶ 17-21.) They argue further that the depositions recently taken in Scotland of M-I engineers shows that M-I has little proof of its claims that Defendants have stolen its trade secrets. (Id. ¶¶ 1-6.) M-I counters that Defendants are flouting this Court’s discovery orders, which have already provided that Defendants must produce trade secret information, and argue further that they have met their burden to show that the trade secrets are necessary for a fair adjudication of their claims. (M-I LLC’s Resp. to Defs.’ Joint Expedited Mot. for Protection from Disc, of Proprietary Trade Secret Information, Doc. No. 316, ¶¶ 5, 35-40.) M-I also argues that its engineers identified several suspected misappropriations of trade secrets. (Id. ¶¶ 8-28.)
Discovery in this case has been far from smooth. In November 2009, this Court ordered discovery to proceed along a certain schedule, due to the sensitive nature of the discoverable material. The Court divided discovery into two phases. The first phase was to include discovery of all matters “exclusive of trade secrets.” (Disc. Hr’g Tr. 33, Nov. 24, 2009.) After the first phase, the Defendants would be allowed to depose certain M-I engineers in order to obtain more detail as to the trade secret theft at issue. Following the depositions, the case was to proceed to a second round of discovery where “trade secret information [would] be disclosed” pursuant to the agreed protective order in this case. (Id.) The Court subsequently issued a written order outlining the planned discovery schedule. (See Doc. No. 155.)
Despite M-I’s protests that the first phase of discovery had not yet been completed, the Court ordered depositions of four key M-I employees to go forward in April 2010. The depositions of George Telfer, Mark Temple, Graeme Laws, and Dennis Hanks tool place in Scotland from April 5-7, 2010.
According to the discovery schedule, then, phase two discovery requiring trade secret disclosure should have begun after the Scotland depositions. Defendants, however, have adamantly objected to producing any of their trade secrets, and M-I has complained equally loudly that Defendants are circumventing this Court’s orders by refusing to produce sensitive information. After adjudicating a large number of disputes in April and May, the Court stayed the case in order to decide the pending dispositive motions.
A. Analysis
Defendants, in some ways, make a pitch for a question already decided. They seek protection under Texas Rule of Evidence 507 by arguing that M-I has failed to meet
Texas Rule of Evidence 507 protects discovery of trade secrets, allowing a person to refuse to disclose a trade secret under certain circumstances. The rule provides:
A person has a privilege, which may be claimed by the person or the person’s agent or employee, to refuse to disclose and to prevent other persons from disclosing a trade secret owned by the person, if the allowance of the privilege will not tend to conceal fraud or otherwise work injustice. When disclosure is directed, the judge shall take such protective measures as the interests of the holder of the privilege and of the parties and the furtherance of justice may require.
The Texas Supreme Court has established a burden shifting mechanism by which evidence must be produced under Rule 507.
First, the party resisting discovery must establish that the information is a trade secret. The burden then shifts to the requesting party to establish that the information is necessary for a fair adjudication of its clams. If the requesting party meets this burden, the trial court should ordinarily compel disclosure of the information, subject to an appropriate protective order. In each circumstance, the trial court must weigh the degree of the requesting party’s need for the information with the potential harm of disclosure to the resisting party.
In re Continental Gen. Tire, Inc.,
The Federal Rules of Civil Procedure also provide for the protection of trade secret information under certain circumstances. Rule 26(c)(1) provides:
A party or any person from whom discovery is sought may move for a protective order in the court where the action is pending — or as an alternative on matters relating to a deposition, in the court for the district where the deposition will be taken.... The court may, for good cause, issue an order to protect a party or person from annoyance, embarrassment, oppression, or undue burden or expense, including ... requiring that a trade secret or other confidential research, development, or commercial information not be revealed or be revealed only in a specified way....”
It is “well settled that there is no absolute privilege for trade secrets and similar confidential information.” 8 Charles Alan Wright, Arthur R. Miller & Richard L. Marcus, Federal Practice and Procedure § 2043 (2d ed.1994). Rather, federal courts follow a similar scheme in determining whether and how to order the disclosure of trade secrets or other confidential information. First, the party seeking protection must establish that the relevant information falls within the provision of this rule.
Id.
“ ‘[T]he burden is upon [the party seeking the protective order] to show the necessity of its issuance, which contemplates a particular and specific demonstration of fact as distinguished from stereotyped and conclusory statements.’ ”
Sanchez v. Property & Cas.,
If the party seeking protection establishes that the information sought is both confidential and that disclosure would cause harm, then the burden falls on the
The state and federal standards are very similar. Given its federal question jurisdiction over this case, the Court applies the Texas procedural rules here. As to Defendants’ initial burden of proving that the matter is a trade secret, M-I does not dispute, and the Court does not doubt, that the materials in question qualify. Defendants’ trade secrets include sensitive information such as tool drawings, engineering data, individual component sketches, pricing and inventory lists, certain communications with manufacturers, and more. (Doc. No. 300, ¶ 13.) Both parties have acknowledged from the outset of the case that such material qualifies as trade secrets. The Court agrees.
As discussed at length in this opinion, M-I brings several state law causes of action against Defendants in this suit. Their core allegation is that Defendants misappropriated their trade secrets. M-I has stated a claim for misappropriation of trade secrets, and now seeks discovery in order to support those claims with evidence. Importantly, trade secrets are the subject of this litigation. M-I is not seeking WES’s trade secrets so it may use the information to prove a tangential or connected point. Rather, the trade secrets are sought because M-I alleges that the trade secrets themselves were stolen, and needs evidence to bolster its claim. Specifically, the third element of trade secret misappropriation requires that a plaintiff prove that the defendant is using the trade secret. In order to prove this element, M-I must establish that WES’s tools incorporate M-I’s design features. Indeed, M-I has submitted affidavits from two retained experts who state that they cannot come to any determination of whether WES has misappropriated M-I trade secrets in its own tool line without first inspecting tools drawings and other proprietary information. (Doc. No. 317, Exs. J & K.) The trade secrets are both relevant and necessary for that reason. Not being able to argue that certain tool diameters were identical, or that WES adopted the same unique material as M-I in the construction of its tools, would be fatal to M-I’s claims. What Defendants seek in protection, then, is not a slight modification of discovery, but instead a dismissal of all of M-I’s claims. This the Court cannot do. M-I’s case has cleared the 12(b)(6) hurdle, and as such, it is entitled to certain discovery that will allow it to litigate this case. The Court finds that the trade secret drawings and other confidential information, which form the crux of this entire case, to be discoverable.
The Court is not convinced, as Defendants insist, that the deposition of the Scotland engineers exposed the frivolity of M-I’s claims. Although all deponents stopped short of claiming that WES tools were exact copies of M-I tools, each of them was able to point to specific design features that were unique to M-I before WES launched its suite of wellbore clean-out tools. The engineers pointed to stabilizer sleeve sizes, pressure equalization
The Court does not finding convincing Defendants’ citation to case law on trade secret protection. The seminal case interpreting and applying Rule 507,
In re Continental General Tire, Inc.,
is readily distinguishable. In that case, a driver’s front tire blew out, and he struck an oncoming vehicle, killing two people. Certain heirs brought a products liability action against defendant, the manufacturer of the failed tire. Plaintiffs contended that either a design or manufacturing defect prevented the belts of the failed tire from properly bonding. During discovery, the plaintiffs requested defendant to produce the chemical formula for what is known at “skim stock,” in order to prove its claim.
The Court finds Defendants’ other citations similarly unconvincing. In those cases, the courts rejected discovery of trade secret information where plaintiffs failed to indicate how the trade secret information would show whether the final product was defective, were able to prove defectiveness of products without discovery of the information, failed to establish that the information would be necessary to its experts rather than merely useful, or failed entirely to offer any evidence showing production was necessary.
See, e.g., In re Bridgestone/Firestone, Inc.,
Additionally, neither party disputes that M-I has virtually no other source for the information. Although it may go after the manufacturers of the tools, a strategy that M-I has undertaken, this is simply a more circuitous way of obtaining the materials from WES itself. All of WES’s manufacturers have signed confidentiality agreements not to disclose the trade secrets, and so have referred requested items to WES so that WES could assert the trade secret privilege.
The Court points out that it is not only WES’s disclosure that is at issue here. Rather, it is clear that M-I will need to produce its own tool drawings and other information to Defendants so that Defendants may build their defense in this case. The Court is satisfied that, with both parties disclosing the material at the heart of their companies’ success, each of them will have strong incentives to rigorously apply the protective order and safeguard one another’s trade secrets. The Court trusts the attorneys on all sides of this case to abide by the terms of the protective order.
Parties are generally given wide latitude in conducting discovery, even as to trade secret matters. Indeed, in most cases concerning trade secret discovery, “the key issue is not whether the information will be disclosed but under what conditions.” 8 Charles Alan Wright, Arthur R. Miller
&
Richard L. Marcus, Federal Practice and Procedure § 2043 (2d ed.1994). The Supreme Court has recognized that “orders forbidding any disclosure of trade secrets or confidential commercial information are rare.”
Fed. Open Market Comm, of the Fed. Reserve Sys. v. Merrill,
Of course, the Court prefers that the parties have a mutually agreeable protective order in place. Defendants have indicated that the current protective order is insufficient. The Court will convene the parties to discuss how the terms of the current protective order may be modified. Given the sensitive nature of the information, the Court is amenable to making the order as strict as possible to ensure the continuing secrecy of the information disclosed.
Y. CONCLUSION
For the reasons stated in the order, Defendants’ motion to dismiss (Doc. No. 91) is granted in part and denied in part. Counts Four, Five, and Eleven are dismissed. Defendants’ motion for partial summary judgment (Doc. No. 181) is granted in part and denied in part. Counts Four, Five, Six, Eight, Nine, Ten, and Twelve are preempted to the extent they are based on M-I’s tool drawings and other copyrightable material. Defendants’ motion for partial summary judgment is denied as to M-I’s misappropriation of trade secrets claim, and its covenant not to compete argument. Defendants’ motion for protection (Doc. No. 300) is denied.
M-I must file an amended complaint within twenty (20) days of the date of this Order that reflect the rulings herein.
IT IS SO ORDERED.
Notes
. Unless otherwise noted, the background facts of this case are not in dispute.
. The Court is aware that there is considerable controversy over this allegation, because M-I initially submitted, and subsequently withdrew, evidence supporting its claims that Stelly had downloaded material from his M-I laptop onto an external hard drive. (See Aff. in Supp. of M-I LLC's Emergency Mot. for Prelim. Inj., Doc. No. 14, ¶¶ 12-13; M-I LLC's Notice of Withdrawal of Portions of Keith Pope’s Aff., Doc. No. 81.) As Defendants acknowledge, however, it is the Court's task at this stage to consider only the pleadings in its 12(b)(6) determination. Thus, it must ignore both favorable and detrimental evidence that exist outside the pleadings, and focus on the factual allegations in M-I’s complaint only. M-I continues to assert that Stelly downloaded sensitive M-I material before leaving his job, and for the purposes of this motion, the Court is bound to accept these allegations as true.
. Defendants also argue that M-I pleads the inapplicable “inevitable disclosure” doctrine in support of its trade secret misappropriations claims. Defendants claim that the doctrine has not been recognized or adopted by any Texas court, and that this Court expressly held the doctrine inapplicable as a matter of law in the earlier injunction proceedings. (See Mem. & Order, Doc. No. 75, at 12-13.) Because the Court has found that M-I succeeds in setting forth sufficient allegations that Stelly actually downloaded trade secrets before he left M-I, it has no need to consider now whether pleading the "inevitable disclosure” doctrine meets Rule 12(b)(6) requirements.
. The other factors involve medical care, physical injury, public health and safety, and damage affecting a government computer, none of which are alleged here. See 18 U.S.C. § 1030(c)(4)(A)(i)(II)-(V).
. Both
Butler
and
Microsource
focus on the conduct alleged to support a misappropriation of trade secrets claim, rather than the elements required to prove the claim. However, "[t]o determine whether a particular cause of action involves rights equivalent to those set forth in [Section] 106, the elements of the causes of action should be compared, not the facts pled to prove them.”
Trandes Corp. v. Guy F. Atkinson Co.,
. The Court is unclear on the basis for M-I’s tortious interference claims. If they relate to any matters other than M-I’s right to the tool drawings and other copyrightable material, they are not preempted. For example, Count Five alleges that Defendants used both the knowledge and position of M-I’s former employees, as well as the trade secret information, to encourage clients to divert their business to WES. Matters falling within the “knowledge and position” of former M-I employees, for example, contacting former customers to solicit their business, would not fall within copyright law preemption. Neither would the theft and use of confidential information that is not subject to copyright.
. Again, it is unclear from M-I's conspiracy claim, as pled, what the object of the conspiracy is. So, for example, this Count is not preempted to the extent it claims that Defendants conspired to steal non-copyrightable information, to solicit M-I’s customers, or to commit other acts relating to materials other than M-I's copyrightable information.
