SUMMARY ORDER
Plaintiff-appellant Lacroix & Kress GMBH
1. Summary Judgment
The CFAA penalizes, inter alia, unau
any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage6 assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service....
18 U.S.C. § 1030(e)(11) (footnote added). L & K submits that the district court erred in concluding that, as a matter of law, L & K had failed to adduce sufficient evidence of the requisite $5000 loss to defeat defendants’ motion for summary judgment. See Nexans Wires S.A. v. Sark-USA, Inc.,
a. Lost Revenue
L & K claims that defendants’ misappropriation of its confidential data caused it to lose “profits of at least $10 million.” The CFAA defines recoverable loss as “any reasonable cost to any victim, ... and any revenue lost ... because of interruption of service.” 18 U.S.C. § 1030(e)(11). As the district court correctly recognized, the plain language of the statute treats lost revenue as a different concept from incurred costs, and permits recovery of the former only where connected to an “interruption in service.” See Nexans Wires S.A. v. Sark-USA, Inc.,
b. Travel Expenses
L & K argues that it nevertheless satisfies the statute’s $5000 loss requirement because it spent approximately $8000 to send its executives from Germany to New York to investigate the misappropriations of its stored data. L & K asserts that these expenses fall within the CFAA’s definition of loss as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense.... ” 18 U.S.C. § 1030(e)(11). The district court disagreed. After a thorough and detailed analysis, it concluded that this statutory language consistently has been construed to refer to costs associated with “investigating and remedying damage to a computer, or a cost incurred because the computer’s service was interrupted,” not costs incurred investigating business losses unrelated to actual computers or computer services. Nexans Wires, S.A. v. Sark-U.S.A., Inc.,
We need not here decide whether the costs of business damage assessments relating to data stolen in the course of a CFAA violation can ever qualify as cognizable losses under the statute. In this case, L & K has failed to show any connection between the travel costs incurred by its executives in visiting New York City and “any type of computer investigation or repair,” or any preventative security measures or inspections. Id. at 476-77. Rather, the record indicates that the sole focus of the New York meetings was the business loss associated with the misappropriation. No court has construed the CFAA’s loss definition to extend that far. See id. at 477-78. Accordingly, the grant of summary judgment is affirmed.
2. Judgment After Trial
After the district court dismissed L & K’s CFAA claims, it exercised supplemental jurisdiction to proceed to trial on the remaining state law misappropriation and unfair competition claims. See id. at 478. Having failed to secure a jury verdict in its favor, L & K argues that several charging errors require a retrial.
a. Locus of Injury: New York and North Carolina
L & K claims that the district court improperly charged the jury that under New York misappropriation law, plaintiff had to prove that L & K sustained injury in New York. L & K claims also that the district court erred in charging that, on the same tort theory under North Carolina law, plaintiff had to prove that actual misconduct occurred in that state. Preliminarily, we note that the district court gave these instructions only after several lengthy discussions with trial counsel and after requesting further submissions from the parties, particularly with respect to New York law, which were never forthcoming.
No matter. We need not decide the merits of L & K’s New York law challenges to the charge because the asserted error is, in any event, harmless. See United States v. Gaudin,
We review the North Carolina misappropriation instruction for fundamental error, because L & K did not object to it before or during the charging conference. See SCS Commc’ns, Inc. v. Herrick Co.,
b. Proposed Language in North Carolina Trade Secret Claim Instruction
L & K claims that the district court committed a further charging error by shifting the burden of proof on its North Carolina trade secret misappropriation claim from defendant to plaintiff. Because L & K objected to this instruction at trial, we review the challenged instruction de novo in light of the charge as a whole. See United States v. Carr,
The North Carolina trade secret law penalizes “misappropriation” of trade secrets, and defines “misappropriation” as “acquisition, disclosure, or use of a trade secret of another without express or implied authority or consent, unless such trade secret was arrived at by independent development, reverse engineering, or was obtained from another person with a right to disclose the trade secret.” N.C. Gen. Stat. § 66-151(1). The statute defining the burden of proof for misappropriation claims prescribes that “prima facie” proof of misappropriation can be established by “the introduction of substantial evidence that the person against whom relief is sought both: (1) Knows or should have known of the trade secret, and (2) Has had a specific opportunity to acquire it for disclosure or use or has acquired, disclosed, or used it without the express or implied consent or authority of the owner.” Id. § 66-155. The statute further provides that this prima facie evidence may be rebutted by the defendant’s introduction of evidence that the information was acquired independently. Id.
L & K must prove by a preponderance of the credible evidence that Sarkuysan misappropriated in North Carolina, the process by which L & K manufactures silver plated copper wire. Under North Carolina law, misappropriation means the acquisition of another person’s trade secret without that person’s express or implied consent, unless the secret is arrived at by independent development, reverse engineering, or was obtained from another person with a right to disclose the trade secret. A person may be liable for trade secret misappropriation if that person knew or should have known of the trade secret, and acquired or used it without the express or implied consent or authority of the owner.
Reading the charge as a whole, the district court’s instructions were not erroneous, but a reasonable resolution of any ambiguities in the state law. Burden-shifting principles are often helpful to courts in deciding whether there are material questions of fact warranting trial. But they should not be permitted to confuse a jury as to a plaintiffs ultimate burden of proof. See Sharkey v. Lasmo (AUL Ltd.),
c. Verdict Form
Finally, L & K claims that one of the special verdict questions submitted to jurors on L & K’s North Carolina unfair trade practices claim incorrectly framed the issue and was unnecessarily confusing. See Vichare v. AMBAC Inc.,
The challenged instruction was designed to aid the district court in determining whether the acts found by the jury constituted unfair competition, as required by North Carolina law. See N.C. GemStat. § 75-1.1; United Labs., Inc. v. Kuykendall,
The district court’s award of summary judgment in favor of defendants SarkUSA and Sarkuysan, entered on May 28, 2004, and the posttrial judgment in favor of Sarkuysan, entered on June 10, 2005, are hereby AFFIRMED.
Notes
. Nexans Wires S.A. withdrew as a plaintiff in this action during the trial.
. L & K also initially invoked South Carolina law, but ultimately elected not to submit its claim under that states’s law to the trial jury.
. At trial, the District Court dismissed the case against Sark-USA, and L & K does not challenge that dismissal on appeal.
. A "protected computer” is one used by a financial institution or by the United States Government, or one which is used in interstate or foreign commerce or communication. 18 U.S.C. § 1030(e)(2).
. "Damage” is defined as "any impairment to the integrity or availability of data, a program, a system, or information.” Id. § 1030(e)(8).
