MEMORANDUM OPINION
I. INTRODUCTION
Before this Court are challenges by Defendants Beckstrom Electric Co. (“Beckstrom”) and Extensia Technologies (“Extensia”) that certain causes of action asserted by Plaintiff TEGG Corporation (“Plaintiff’) in its Second Amended Complaint (Docket No. 56) 1 are preempted by the Copyright Act of 1976, 17 U.S.C. § 101 et seq. (“the Copyright Act”). Underlying this action is the sale of competing computer software by rival businesses. Plaintiff has brought claims of copyright infringement, tortious interference, and civil conspiracy against both Defendants, breach of contract against Beckstrom, only; and, conversion against Extensia, only. (Docket No. 56). The following motions are currently pending before the Court: (1) Defendant Beckstrom’s motion to dismiss Plaintiffs claims of tortious interference and civil conspiracy (Docket No. 60); and, (2) Defendant Extensia’s motion to dismiss Plaintiffs claims of conversion, tortious interference, and civil conspiracy (Docket No. 63). Based on the following, Extensia’s Motion to Dismiss [63] is GRANTED, Plaintiffs civil conspiracy claim against Beckstrom is DISMISSED and *416 Beckstrom’s Motion to Dismiss [60] is GRANTED IN PART AND DENIED IN PART.
II. FACTUAL BACKGROUND 2
In response to this Court’s Memorandum Opinion and Order issued July 1, 2008 (Docket No. 51), TEGG amended its previous complaint by adding detailed claims stating that all versions of the TEGGTask software applications and databases have registered copyrights. (Docket No.56 at ¶¶ 18-27). TEGG also added a more detailed description about how the EMX software is allegedly similar to the TEGG software. (Id. at ¶¶ 77-84). For example, TEGG avers that its software is structured into three modules: TEGGTask Central, which manages a franchisee’s inspection and maintenance programs, TEGGTask Remote, which is the data collection component and is tailored for use by technicians while at customer sites, and TEGGTask View, which interfaces with the computers of a franchisee’s customers and allows the customers to access live inspection and maintenance data. (Id. at ¶ 78). TEGG claims that the EMX software is also structured into three modules with similar functionality. (Id. at ¶ 80).
In addition, TEGG supplemented all of its claims with the following allegations:
49. On or about October 22, 2002, TEGG and Beckstrom entered into a TEGG Franchise Agreement (the “Beckstrom Agreement”).
54.TEGG provided Beckstrom with non-transferable licenses to operate on Beckstrom’s computers the TEGGTask 5 Software Application and the TEGGTask 6 Software Application, as well as the TEGGTask 5 Database and the TEGGTask 6 Database.
55. In the Beckstrom Agreement, Beckstrom agreed that the materials that TEGG provided to Beckstrom concerning the TEGG System, including the TEGGTask 5 Software Application and the TEGGTask 6 Software Application and the TEGGTask 5 Database and the TEGGTask 6 Database: (a) were confidential and proprietary to TEGG; (b) remained the sole property of TEGG; (c) would be used solely for the operation of Beckstrom’s franchise; (d) would not be copied; and (e) would not be disclosed to third parties and/or be made accessible to third parties.
56. The Beckstrom Agreement expressly prohibits Beckstrom from making copies of any materials concerning the TEGG System, including the TEGGTask 5 Software Application, TEGGTask 6 Software Application, TEGGTask 5 Database, and TEGGTask 6 Database, and/or disclosing those materials to others without the prior written consent of TEGG.
57. The Beckstrom Agreement provides that, upon any breach of its confidentiality and termination obligations, Beckstrom shall pay all costs and expenses, including reasonable attorneys’ fees incurred by TEGG.
58. On or about December 16, 2005, TEGG and Beckstrom mutually agreed in writing to terminate the Beckstrom Agreement (the “Termination Agreement”).
59. The Termination Agreement terminated the Beckstrom Agreement effective February 1, 2006.
60. Pursuant to the Termination Agreement, Beckstrom affirmatively agreed to discontinue use of TEGG’s confidential and proprietary materials, *417 specifically including the TEGG System and all software that TEGG had provided to Beckstrom, which included the TEGGTask 5 Software Application, TEGGTask 6 Software Application, TEGGTask 5 Database, and TEGGTask 6 Database.
61. Beckstrom, both in the Termination Agreement and in a separate Affidavit notarized on January 30, 2006, further represented that it had returned to TEGG and/or discontinued use of all of TEGG’s confidential and proprietary materials and systems, specifically including the software that TEGG had provided to Beckstrom — which included the TEGGTask 5 Software Application, TEGGTask 6 Software Application, TEGGTask 5 Database, and TEGGTask 6 Database — and that Beckstrom’s use of such materials, systems, and computer programs have been discontinued.
62. The Termination Agreement specifically provides that Beckstrom has a continuing duty to comply with the confidentiality obligations of the Beckstrom Agreement.
63. In violation of both the Beckstrom Agreement and the Termination Agreement, as well as in violation of federal copyright laws, in order to assist with the development of the EMX Software, Beckstrom provided Extensia with a copy of and/or unauthorized access to the TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application, including the copyrighted TEGGTask 5 Database and/or the copyrighted TEGGTask 6 Database programmed with confidential and proprietary database schema, and other confidential and proprietary information and documentation relating to TEGG software.
69. This unauthorized access, provided by Beckstrom in violation of the Agreement and the Termination Agreement, provided Extensia with a significant advantage in developing the EMX Software. From the blueprint of the copyrighted TEGGTask 5 Database and/or the copyrighted TEGGTask 6 Database programmed with confidential and proprietary database schema, Extensia learned the structure, organization, and sequence of the entire TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application, respectively. This learning process permitted Extensia to save hundreds if not thousands of hours of software development time because it learned what to do, or not to do, when developing the EMX Software.
123. Extensia and Beckstrom do not have, and have not sought, TEGG’s permission to sell the EMX Software, which is a derivative version of the copyrighted TEGGTask 5 Software Application and/or the copyrighted TEGGTask 6 Software Application, including the copyrighted TEGGTask 5 Database and/or the copyrighted TEGGTask 6 Database programmed with confidential and proprietary database schema.
129. Despite the fact that Extensia has neither sought TEGG’s permission nor provided attribution, Extensia has utilized the “TEGG” registered Trademark in its marketing efforts for the EMX Software.
(Docket No. 56 at ¶¶49, 54-63, 69, 123, 129).
TEGG also supplemented its claims for conversion, tortious interference, and civil conspiracy. First, TEGG alleges that Ex-tensia converted TEGG’s copyrighted property for its own use, including the TEGG software, databases, and screen images. (Docket No. 56 at ¶ 159). Secondly, TEGG avers that Beckstrom, as a former franchisee, is aware of the confidentiality *418 agreements contained in the written franchise agreements between TEGG and its franchisees. (Id. at ¶ 167). TEGG further states that by actively marketing its EMX software and/or requesting TEGG’s franchisees to provide it with access to or a copy of the TEGG database, Extensia is intentionally and knowingly interfering with TEGG’s existing contractual relationships with its franchisees. (Id. at ¶ 171). By assisting Extensia with the marketing of Extensia’s EMX software, TEGG contends Beckstrom is also intentionally and knowingly interfering with TEGG’s contractual relationships with its franchisees, including the confidentiality agreements. (Id. at ¶ 172). Thirdly, TEGG alleges that Extensia and Beckstrom formed an agreement to infringe upon TEGG’s copyrights, (Id. at ¶ 177), and each Defendant then acted on the agreement through unauthorized delivery of the TEGG software and databases to Extensia, and by the marketing of the allegedly infringing EMX software. (Id. ¶¶ 179-80).
III. PROCEDURAL HISTORY 3
TEGG filed its Second Amended Complaint on July 30, 2008. (Docket No. 56). Beckstrom filed its Answer to Plaintiffs copyright claim and breach of contract claim in response to the Second Amended Complaint on August 18, 2008. (Docket No. 59). Simultaneously, Beckstrom filed a Motion to Dismiss the tortious interference and civil conspiracy claims contained in the Second Amended Complaint under Rule 12(b)(6) of the Federal Rules of Civil Procedure, arguing that the Copyright Act of 1976 (“the Copyright Act”) preempts the tortious interference claim and that both the tortious interference and civil conspiracy claims are improperly pled. (Docket No. 60). On the same day, Extensia filed its Answer to the copyright claim asserted in the Second Amended Complaint (Docket No. 62) as well as a Motion to Dismiss the conversion, tortious interference, and civil conspiracy claims of the Second Amended Complaint, alleging that the Copyright Act preempts all three counts. (Docket No. 63).
Both Defendants filed Briefs in Support of their respective motions to dismiss (Docket Nos. 61 and 64). TEGG, in turn, filed a Response to both motions to dismiss on September 5, 2008. (Docket Nos. 65 and 66). On September 22, both defendants issued a Reply to the Response to the Motion to Dismiss. (Docket Nos. 68 and 69). The pending motions are now fully briefed and ripe for disposition. 4
IV. LEGAL STANDARD
In light of the Supreme Court’s decision in
Bell Atlantic Corp. v. Twombly,
In considering a Rule 12(b)(6) motion, a court accepts all of the plaintiffs allegations as true and construes all inferences in the light most favorable to the non-moving party.
Umland v. PLANCO Fin. Servs.,
After amending a complaint once as a matter of course or after an answer has been filed, a plaintiff may amend only with the leave of court or the written consent of the opposing party, but “leave shall be freely given when justice so requires.” Fed.R.Civ.P. 15(a). While the grant or denial of opportunity to amend is within the discretion of the district court, “outright refusal to grant leave without any justifying reason appearing for the denial is not an exercise of discretion; it is merely an abuse of that discretion and inconsistent with the spirit of the Federal Rules.”
Shane v. Fauver,
V. DISCUSSION
Preemption of State Law Claims
In their respective motions to dismiss, Defendants assert that Section 301 of the Copyright Act, 17 U.S.C. § 301, (“Section 301”) preempts Plaintiffs state law claims of tortious interference, conversion, and civil conspiracy. 5 Section 301 provides, in pertinent part:
All legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103 ... are governed exclusively by this title.... No person is entitled to any such right or equivalent right in any such work under the common law or statutes of any state.
17 U.S.C. § 301(a). Congress clearly expressed its purpose: “the intention of Section 301 is to preempt and abolish any rights under common law and state statutes that are equivalent to copyright and extend to works within the Federal Copyright Law.” H.R.Rep. No. 1476, 94th Cong.2d Sess. 130, reprinted in 1976 U.S.C.C.A.N. 5659, 5746. However, nothing within the Copyright Act annuls or limits any rights or remedies under the common law statutes of any state “with respect to activities violating legal or equitable rights that are not equivalent to any of the exclusive rights within the general scope of copyright as specified by Section 106.” 17 U.S.C. § 301(b)(3) (emphasis added).
The Senate version of section 301(b)(3) contained a list of illustrative examples of rights that were not equivalent to any rights within the general scope of copyright, namely rights against misappropriation, breaches of contract, and breaches of trust. Conference Comm. Notes, H.R. Conf. Rep. No. 94-1733, 94th Cong.2d Sess. 130,
reprinted in
1976 U.S.C.C.A.N. 5809, 5820. The House version of section 301, the version ultimately adopted by Congress, deleted the list of examples. In the legislative history, Congress noted that under section 301(b)(3), the “evolving common law rights of ‘privacy,’ ‘publicity,’ and trade secrets, and the general laws of defamation and fraud, would remain unaffected as long as the causes of action contain elements, such as ... a breach of trust or confidentiality, that are different in kind from copyright.” 1976 U.S.C.C.A.N. at 5748. Congress also noted that “to the extent that the unfair competition concept known as ‘interference with contractual relations’ is merely the equivalent of copyright protection, it would be preempted.”
Id.
However, despite this legislative history, federal courts must still grapple with whether a particular cause of action is preempted because any direct reference to specific actions was deleted from the main bill.
See Dun & Bradstreet Software Services, Inc. v. Grace Consulting, Inc.,
As stated in this Court’s previous Memorandum Opinion, “ ‘[i]n order for a state common law or statutory claim to be preempted by the Copyright Act, the Defendant must demonstrate . that (1) the work in question falls within the type of works protected by the Copyright Act;
*421
and (2) the state law seeks to enforce rights that are equivalent to any of the exclusive rights of copyright found in Section 106 of the Copyright Act.’ ” (Docket No. 51) (quoting
Tartan Software, Inc. v. DRS Sensors & Targeting Systems, Inc.,
Civ. A. No. 06-1147,
The Copyright Act provides for a number of exclusive rights, including the right to distribute, reproduce, and display a work, as well as the right to produce derivative works. 17 U.S.C. § 106.
6
Section 301 preempts only those state law rights which may be abridged by an act that itself would infringe on one of these exclusive rights.
Briarpatch Ltd., L.P. v. Phoenix Pictures, Inc.,
To determine whether a claim is either functionally equivalent to or qualitatively different from a right protected by the Copyright Act, the United States Court of Appeals for the Third Circuit has adopted the “extra element” test.
Dun & Bradstreet,
Even if a state cause of action has an element that appears to be beyond the scope of a copyright claim, “not every extra element is sufficient to establish a qualitative variance between rights protected by federal copyright law and that by state law.”
Dun & Bradstreet,
Plaintiffs software easily satisfies the first prong of the preemption test. It is well-settled that computer source codes may be protected by copyright.
See Long,
A. Civil Conspiracy
1. Choice of Law
In its brief in support of its Motion to Dismiss, Defendant Extensia raises a choice of law issue regarding Plaintiffs claim of civil conspiracy. (Docket No. 64 at 9). As acknowledged by both Plaintiff and Defendant Extensia,
8
the primary difference in the law is not between the elements of the state law causes of action, but rather the determination of federal district courts within the Third and Fourth Circuits as to whether a state law civil conspiracy claim is preempted by Section 301 of the Copyright Act.
{See
Docket No. 64 at 9; Docket No. 66 at 11). As this matter involves interpretation of a federal statute, this Court is required to apply the decisions of the United States Court of Ap
*423
peals for the Third Circuit interpreting this statute.
See, e.g., Vujosevic v. Rafferty,
As state law will govern only if the claims are not preempted, the Court need not discuss any choice of law issue unless it first determines that Plaintiffs state law civil conspiracy claims are not preempted.
9
See Johnston v. Katz,
Civ. A. No. 94-6693,
2. Preemption of Plaintiff’s Civil Conspiracy Claims
In its Second Amended Complaint, Plaintiff avers the following facts in support of its civil conspiracy claim:
176. TEGG incorporates herein by reference paragraphs 1-175 of this Second Amended Complaint as though set forth in full. 10
*424 177. Sometime in the period between the beginning of 2005 and the present, Extensia and Beckstrom formed an agreement to infringe upon TEGG’s copyrights in the TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application, including the TEGGTask 5 Database and/or the TEGGTask 6 Database programmed with confidential and proprietary database schema, and/or the TEGGTask 5 Screen Images and/or the TEGGTask 6 Screen Images.
179. In furtherance of the conspiracy, Beckstrom delivered a copy to, and/or provided unauthorized access to, Extensia, of the TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application and/or the TEGGTask 5 Database and/or the TEGGTask 6 Database programmed with confidential and proprietary database schema, and other confidential and proprietary information and documentation relating to TEGG software to Extensia.
180. Also in furtherance of the conspiracy, Beckstrom and Extensia have coilaborated in the marketing of the infringing EMX Software.
(Docket No. 56 at ¶¶ 176-77,179-80).
Given these allegations, Defendant Ex-tensia argues that Plaintiffs civil conspiracy claim is functionally equivalent to a copyright claim and therefore preempted, citing district court decisions from the Fourth Circuit in support of its argument. (Docket No. 64 at 9). To the contrary, Plaintiff, relying on a decision from a district court within the Third Circuit,
Sullivan Assoc’s, Inc. v. Dellots, Inc.,
Civ. A. No. 97-5457,
As noted, the parties have not identified a binding decision helpful to the Court’s analysis of the preemption of Plaintiffs civil conspiracy claim by the Copyright Act.
11
The Court, however, is instructed by
*425
the analytical framework for determining preemption under the Copyright Act set forth by the United States Court of Appeals for the Third Circuit in
Dun & Bradstreet
described above, and will apply such framework to determine whether Plaintiffs civil conspiracy claims are preempted.
See Dun & Bradstreet,
The elements of civil conspiracy under Pennsylvania, Delaware and Virginia law are similar, and for convenience, the Court will reference Pennsylvania law in its preemption analysis.
12
To state a claim
*426
for civil conspiracy under Pennsylvania law, a plaintiff must allege the following: (1) a combination of two or more persons acting with a common purpose to do an unlawful act or to do a lawful act by unlawful means or for an unlawful purpose; (2) an overt act done in pursuance of the common purpose; and (3) actual legal damage.
Strickland v. University of Scranton,
With respect to the alleged agreement element of Plaintiffs civil conspiracy claim, federal district courts have held that such element is not qualitatively different from a copyright infringement claim. These courts so hold because an agreement to infringe is not qualitatively different from the elements of a claim under the copyright laws, which recognize the theory of contributory infringement. For example, in
Irwin,
the District Court for the Southern District of New York determined that although a claim of conspiracy may require proof of elements different than those required to prove copyright infringement, “the nature of the misconduct that conspiracy law seeks to redress is
not qualitatively different from that addressed by contributory and vicarious infringement claims.” Irwin,
The United States Court of Appeals for the Third Circuit has recognized that contributory infringement extends joint and several liability to those who participate in copyright infringement.
See Columbia Pictures Indus. v. Redd Horne,
Here, Plaintiff essentially avers that Defendants formed a conspiracy to commit copyright infringement. In fact, Plaintiff alleges that Extensia and Beckstrom formed an agreement to provide unauthorized access to Plaintiffs copyrighted soft
*427
ware and databases, used that access to gain an advantage in developing the EMX software and agreed to collaborate in marketing the allegedly infringing software.
(See
Docket No. 56 at ¶¶ 176-84). Based on these allegations, both Beckstrom and Extensia could be liable under the Copyright Act as contributory infringers. As the Third Circuit recognizes the theory of contributory infringement, the Court finds the agreement element of a state law civil conspiracy claim, to the extent that it covers an agreement to commit copyright infringement, does not establish conduct that is qualitatively different from a copyright infringement claim because the copyright law already covers such conduct.
See Dun & Bradstreet,
Regarding the claimed difference of the intent element of Plaintiffs civil conspiracy claim from its copyright action, the Court is mindful of decisions which have analyzed whether the element of intent in other state law causes of action is qualitatively different. Generally, the element of intent in any cause of action will not establish qualitatively different conduct if it merely “goes to the scope of the right.”
Harper & Row,
In this Court’s estimation, like the intent element present in other state law causes of action, the intent element of a state law civil conspiracy claim does not make such claim qualitatively different from a copyright claim when the underlying action is copyright infringement and the intent alleged is only an intent to form an agreement to commit copyright infringement. Accordingly, the Court finds that the intent element alleged here is not an extra element which makes Plaintiffs conspiracy claim qualitatively different than its copyright claim.
Overall, Plaintiff wishes to use the Copyright Act, coupled with related state law claims, to protect its copyrighted software and databases and enforce its rights to distribute, reproduce, and create derivative works based on its copyrighted software. These are all rights governed by the Copyright Act. 17 U.S.C. § 106. Unlike the situation in
Dun & Bradstreet,
where the plaintiff sought to protect rights violated by the breach of an agreement that the court found was beyond the scope
*428
of copyright,
Dun & Bradstreet,
B. Preemption of Plaintiffs Tortious Interference Claims
As to Plaintiffs claim for tortious interference, Plaintiff alleges that:
165. TEGG incorporates herein by reference paragraphs 1-164 of this Second Amended Complaint as though set forth in full. 15
167. Beckstrom, as a former franchisee of TEGG, is acutely aware of the fact that TEGG has written franchise agreements with its franchisees that contain confidentiality obligations.
168. The written franchise agreements between TEGG and its franchisees bar a franchisee from the disclosure of TEGG’s confidential and proprietary information, including the TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application, including the TEGGTask 5 Database and/or the TEGGTask 6 Database, and/or the TEGGTask 5 Screen Images and/or the TEGGTask 6 Screen Images.
171. Extensia’s conduct in (a) actively marketing the infringing EMX Software *429 and/or (b) requesting TEGG’s franchisee’s to provide Extensia with access to and/or a copy of the franchisee’s TEGGTask 5 Database and/or TEGGTask 6 Database intentionally, knowingly, and without justification or privilege interferes with TEGG’s existing contractual relationships with its franchisees.
172. Beckstrom’s conduct in assisting Extensia with the marketing of the infringing EMX Software, including serving as a reference for the EMX Software, intentionally, knowingly, and without justification or privilege interferes with TEGG’s contractual relationships with its franchisees.
(Docket No. 56 at ¶¶ 165, 167-68, 171-72).
Defendants both argue that Plaintiffs tortious interference claim is preempted by the Copyright Act because such a claim does not require any “extra” element that would make it qualitatively different than a copyright action. {See Docket No. 61 at 4; Docket No. 64 at 8). Plaintiff counters that its tortious interference claim alleges specific acts by both Defendants that make its claim qualitatively different than a copyright claim and therefore, not susceptible to preemption. {See Docket No. 65 at 8 and Docket No. 66 at 9). Consequently, the primary issue before this Court is whether TEGG’s tortious interference claim is functionally equivalent to a claim allowed by the Copyright Act.
Under Pennsylvania law, 16 a claim of tortious interference must include allegations satisfying the following four elements:
(1) The existence of a contractual or prospective contractual relation between the complainant and a third party; (2) purposeful action on the part of the defendant, specifically intended to harm the existing relation from occurring; (3) the absence of privilege or justification on the part of the defendant; and (4) the occasioning of actual legal damage as a result of the defendant’s conduct.
MCS Services,
Plaintiff argues that the efforts of both Defendants to market the EMX software directly to TEGG franchisees violated the franchise agreement between TEGG and its franchisees. (Docket 65 at 7). Accord
*430
ing to Plaintiff, both Defendants knew that these efforts would result in the violation of the confidentiality obligations contained therein. (Docket No. 65 at 7 and Docket No. 66 at 8). In support of this argument, Plaintiff cites to a single case,
Cassway v. Chelsea Historic Props. I, L.P.,
Civ. A. No. 92-4124,
That case involved a contract the plaintiff had with two of its consultants.
Cassway,
Defendant Beekstrom asserts in its Responses to Defendants’ Motions to Dismiss (Docket Nos. 65 and 66) that Plaintiff alleges for the first time that Defendants marketed the EMX software with the intent to induce the breach of confidentiality obligations. (Docket No. 69 at 3). According to Defendant Beekstrom, these allegations do not appear within the Second Amended Complaint and, thus, should not be considered here. (Docket No. 69 at 3). To be clear, on the face of the Second Amended Complaint, Plaintiff alleges that both Defendants were aware of existing confidentiality agreements with franchisees. (Docket No. 56 at ¶ 167). Plaintiff alleges further that Extensia’s conduct in marketing the EMX software and providing access to the TEGG databases as well as Beckstrom’s conduct in assisting Extensia “intentionally, knowingly, and without justification or privilege interferes with TEGG’s existing contractual relationships with its franchisees.” (Docket No. 56 at ¶¶ 171-72). Thus, reading the allegations in the light most favorable to Plaintiff, the allegations on the face of the Second Amended Complaint describe an awareness of confidentiality agreements and knowing and intentional interference with existing contractual relationships. (Id).
The Court agrees with Defendants that the present facts are distinguishable from
Cassway
and, applying the “extra element” test set forth in
Dun & Bradstreet,
finds that the act of marketing with intent to interfere with existing contractual relationships does not constitute an extra element necessary to protect the tortious
*431
interference claim from preemption.
Dun & Bradstreet,
Here, the crux of Plaintiffs tortious interference claim is that Beckstrom and Extensia’s conduct led to the improper distribution of Plaintiffs copyrighted databases as well as the production and sale of the allegedly infringing EMX software. In other words, to prevail on its claim of tortious interference, Plaintiff must eventually prove that Extensia induced Plaintiffs franchisees to deliver copies of Plaintiffs copyrighted databases so that Extensia, with Beckstrom’s assistance, could produce, market, and sell the infringing EMX software. The right to distribute, reproduce, and produce derivative works based on copyrighted material is clearly governed by the federal Copyright Act. 17 U.S.C. § 106. Upon evaluation of this claim, the court finds that while an alleged breach of confidentiality in these transactions between Extensia and TEGG’s franchisees may have occurred, Plaintiffs ultimate claim is based on its right to prevent unlawful interference with its right to distribute and reproduce its copyrighted software and databases to current and future parties, and create for those parties derivative works based on its copyrighted software and databases. Furthermore, stating a claim for tortious interference does not require an allegation of a breach of confidentiality.
MCS Services,
In this Court’s estimation, allegations that Extensia induced franchisees to provide unauthorized access to Plaintiffs copyrighted material, that Defendants may have marketed the EMX software in full awareness of the existing contractual relationships between Plaintiff and its franchisees, and that Defendants had intent to interfere with their relationships do not avoid preemption under Section 301. The awareness and intent elements of tortious interference merely go to the scope of the right and do not establish “qualitatively different conduct on the part of the infringing party, nor a fundamental nonequivalence between the state and federal rights implicated.”
Id.
at *7,
*432 C. Preemption of Plaintiffs Conversion Claim
As to its conversion claim, Plaintiff alleges the following:
158. TEGG incorporates herein by reference paragraphs 1-157 of this Second Amended Complaint as though set forth in full. 19
159. Extensia, upon information and belief, converted property of TEGG, including but not limited to the TEGGTask 5 Software Application and/or the TEGGTask 6 Software Application, the TEGGTask 5 Database and/or the TEGGTask 6 Database, and/or the TEGGTask 5 Screen Images and/or the TEGGTask 6 Screen Images, all of which are protected by copyright, for its own use and benefit.
160. The conversion of TEGG’s copyrighted property by Extensia will cause substantial competitive disadvantage to TEGG which will be substantially and irreparably harmed.
161. The conversion is wrongful.
162. Extensia has caused TEGG to sustain damages as a result of the conversion, which damages, at this time, are not fully ascertainable, but which are in excess of $75,000 exclusive of interest and cost.
(Docket No. 56 at ¶¶ 158-162).
Defendant Extensia argues that Plaintiffs conversion claim is functionally equivalent to a copyright claim and is therefore preempted by the Copyright Act. (Docket No. 64 at 6). In response, Plaintiff argues that because Defendant Extensia possesses the physical embodiment of its copyrighted materials, Plaintiffs claim for conversion contains an extra element that would make it qualitatively different than a copyright claim. (Docket No. 65 at 7). Under Pennsylvania law,
20
conversion is “an act of willful interference with the dominion and control over a chattel done without lawful justification, by which any person entitled to the chattel is deprived of its use and possession.”
Gemel Precision Tool Co., Inc. v. Pharma Tool Corp.,
Civ. A. No. 94-5305,
District courts within the Third Circuit have found that the Copyright Act preempts state law conversion claims regarding copyrighted property. In
Apparel Bus. Sys., LLC v. Tom James Co.,
In contrast, district courts within the Third Circuit have found limited situations in which a conversion claim is not preempted by the Copyright Act.
See Peirson v. Clemens, Inc.,
Civ. A. No. 03-1145 JJF,
Plaintiff claims that Extensia received Plaintiffs tangible property, namely the TEGGTask Software Applications, the TEGG databases, and sample pages of inspection reports showing information that Extensia would need to properly customize the EMX software for a particular customer. (Docket No. 56 at ¶¶ 63-64, 70, 159). According to Plaintiff, because Extensia had physical possession of Plaintiffs property, Plaintiffs conversion claim contains the requisite extra element to survive preemption.
See Dun & Bradstreet,
Plaintiff relies on
Peirson
because it stands for the proposition that a conversion claim involves the possession of the physical embodiment of a particular item that belonged to the plaintiff. However, software has been generally found to be intangible property not physically embodied in a document and, therefore, not subject to a conversion claim.
See Apparel,
As to Plaintiffs reliance on
Stenograph,
the facts in the present case are also distinguishable. In that case, the plaintiff claimed conversion of a software key, a tangible object that a user must insert into a computer to use the software.
Stenograph,
While the Copyright Act does not necessarily protect possession, “implicit in the ownership conferred by § 106 [of the Copyright Act] is the power to control the use of the copyrighted materials.”
Gemel,
Plaintiff seeks to protect its copyrighted software and databases, recover for their unauthorized distribution and reproduction, and enforce its right to control the use of such property. As all of these rights are governed under the Copyright Act, 17 U.S.C. § 106, the Court finds that Plaintiffs claim for conversion of its software and databases is functionally equivalent to its exclusive right to copy, distribute, and create derivative works from the copyrighted TEGG software and databases.
See Gemel,
Next, Plaintiff argues that its claim of conversion as to the sample pages should not be preempted. Plaintiff avers in its Second Amended Complaint that “Beckstrom also provided Extensia with sample pages taken from customer inspection reports showing the information that the EMX software would need to manage.” (Docket No. 56 at ¶ 70). Further, “the TEGGTask 5 Software Application and/or TEGGTask 6 Software Application, including the copyrighted TEGGTask 5 database and/or the copyrighted TEGGTask 6 data *435 base programmed with confidential and proprietary database schema was the source of the sample pages provided by Beckstrom to Extensia.” (Docket No. 56 at ¶ 71) (emphasis added).
While these sample pages may at first glance appear closer to a “manuscript” than a “poem,” Plaintiffs conversion claim is preempted. To the extent that Plaintiff avers these sample pages are generated by the copyrighted TEGG Software Applications, they may be considered screen output. Screen output is considered an audiovisual work that falls within the subject matter of copyright.
See Whelan Assocs., Inc. v. Jaslow Dental Lab., Inc.,
The Court has found that the Plaintiffs claim that Defendant Extensia converted software, databases, screen images, and inspection reports is preempted. Accordingly, Defendant Extensia’s Motion to Dismiss Plaintiffs conversion claim is GRANTED.
VI. CONCLUSION
Based on the foregoing, the Court makes the following rulings. Defendant Extensia’s Motion to Dismiss Plaintiffs conversion, tortious interference and civil conspiracy claims [63] is GRANTED as said claims are preempted by the Copyright Act. Likewise, Plaintiffs civil conspiracy claim against Defendant Beckstrom is also preempted and is DISMISSED. Defendant Beckstrom’s Motion to Dismiss Plaintiffs tortious interference and civil conspiracy claims [60] is GRANTED IN PART AND DENIED IN PART. Defendant Beckstrom’s Motion to Dismiss is granted to the extent that Defendant Beckstrom argues that Plaintiffs tortious interference claim is preempted. Defendant Beckstrom’s Motion to Dismiss is denied to the extent that it argues that Plaintiffs civil conspiracy claim should be dismissed for failure to properly plead damages, as moot. As Plaintiffs claims of conversion, tortious interference and civil conspiracy are preempted by the Copyright Act, said claims are hereby dismissed, with prejudice. Plaintiff is not granted leave to amend a second time because the Court finds that Plaintiff cannot amend these claims in such a way to avoid preemption, and therefore such amendment would be futile. See
Shane,
Notes
. Plaintiff's Second Amended Complaint is indeed its third complaint in this action.
. For a more detailed recitation of the factual background, refer to Part II of the Court's previous Memorandum Opinion
Tegg Corp. v. Beckstrom Elec. Co.,
Civ. A. No. 08-435,
. For a more detailed discussion of the procedural history preceding Plaintiff’s Second Amended Complaint, refer to Part III of the Court’s previous Memorandum Opinion.
Tegg,
. Since the filing of the pending motions to dismiss, the parties have been ordered to Early Neutral Evaluation pursuant to this Court's Alternative Dispute Resolution Policies and Procedures. ADR Policies and Procedures for the United States District Court for the Western District of Pennsylvania, available at: http:// coldfusion.pawd.uscourts.gov/adr/Documents/ adrpoliciesprocedures.pdf. They are also engaged in limited discovery and expert review in preparation for same.
. In die previous Memorandum Opinion, this Court did not resolve Defendants’ argument that Plaintiff's common law claims were preempted by the copyright laws because Plaintiff had not properly pled a copyright infringement claim.
Tegg,
. Section 106, Exclusive Rights in Copyrighted Works, provides:
Subject to Sections 107 through 122, the owner of a copyright has the exclusive right to do and authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based on the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work by sale or other transfer of ownership;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures or other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical dramatic, and choreographic works, pantomimes, and motion pictures or other audiovisual works, to display the copyrighted work publicly;
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission.
17 U.S.C. § 106.
. For example, a claim such as misappropriation of trade secrets based on a breach of duty of confidentiality does contain an extra element that makes the claim qualitatively different from a copyright claim, namely the breach of a duty separate from the statutory rights protected by the Copyright Act.
Dun & Bradstreet,
. In its Brief in Support, Defendant Extensia argues that "[t]he elements of a civil conspiracy claim are similar under Virginia and Pennsylvania law. However, Fourth Circuit courts have held that civil conspiracy claims are preempted by copyright law,
see, e.g. Hoey v. Dexel Systems Corp.,
. As this Court sits within the Commonwealth of Pennsylvania, the Court must apply Pennsylvania's choice of law rules to decide which state’s law applies.
See Klaxon v. Stentor Elec. Mfg. Co.,
. Paragraphs 1-175 in Plaintiff's Second Amended Complaint contain factual allegations in support of its claims of copyright infringement, breach of contract, conversion, tortious interference with contractual rela *424 tions and civil conspiracy. See Section II, Facts, supra. With respect to its copyright infringement claim, Plaintiff sets forth factual allegations regarding the copyright registration of its TEGGTask Software, modules, and databases as well as the alleged infringement thereof by Extensia including averments that Beckstrom provided Extensia with unauthorized access to the Tegg software which was then used by Extensia in its production of similar software. (Docket No. 56 at ¶¶ 14-49, 63-122). Plaintiff avers that the two software programs are similar in functioning, performance and in sequence, structure and organization. In addition, Plaintiff sets forth the applicable terms and conditions of its agreements with Beckstrom and allegations of certain conduct which Plaintiff maintains constitute a breach of said agreements. (Id. at ¶¶ 49-76). Plaintiff also maintains that Beckstrom and Extensia collaborated in marketing the Extensia software, including to Plaintiff's current franchisees. (Id. at ¶¶ 123-129). Finally, paragraphs 130-188 contain the facts pled in support of each of the claims in Plaintiff's Second Amended Complaint: (1) Count I, copyright infringement (Id. at ¶¶ 130 — 149); (2) Count II, breach of contract against Beckstrom (Id. at ¶¶ 150-157); (3) Count III, conversion against Extensia (Id. at ¶¶ 158-164); (4) Count IV tortious interference with contractual relations (Id. at ¶¶ 165-175); and (5), Count V, civil conspiracy (Id. at ¶¶ 176-188).
. Plaintiff’s reliance on
Sullivan
in support of its argument that a claim of civil conspiracy is not preempted by the Copyright Act is not persuasive for the following reasons. First, it is a district court decision which is not controlling on this Court. Second, the court in
Sullivan
quoted a standard similar to the extra element test ultimately adopted by the Third Circuit in
Dun & Bradstreet. Sullivan,
. Virginia defines civil conspiracy as "a combination of two or more persons to accomplish an unlawful purpose or to accomplish a lawful purpose by unlawful means, resulting in damage to the plaintiff.”
Glass v. Glass,
. As discussed below, Courts have also reasoned that the intent element of a tortious interference claim does not establish conduct qualitatively different from copyright infringement.
See MCS Services, Inc. v. Raleigh Johnsen, et al.,
Civ. A. No. 01-4430,
. The Court notes that Defendant Beckstrom argues in its Motion to Dismiss that Plaintiff did not properly plead actual damages in its civil conspiracy claim but does not argue that Plaintiff's civil conspiracy claim is preempted by the Copyright Act. (Docket No. 61). While Beckstrom did not argue or otherwise join in Extensia’s motion to dismiss on preemption grounds, "a court may dismiss claims
sua sponte
where the inadequacy of a claim is apparent as a matter of law.”
WM High Yield Fund v. O’Hanlon,
Having dismissed the civil conspiracy claim against Defendant Beckstrom, the Court need not resolve Beckstrom's argument that said claim must be dismissed based on alleged pleading deficiencies. Accordingly, Beckstrom's motion to dismiss Plaintiff's civil conspiracy claim is therefore denied, as moot.
. See n. 10, supra.
. Defendant Extensia concedes that the state law claims of tortious interference and conversion under Pennsylvania and Virginia law are "virtually identical" and does not raise a choice of law issue regarding these claims. (Docket No. 64). For convenience, the Court references Pennsylvania law with respect to those claims.
. The Court notes that like
Sullivan,
the decision in
Cassway
is not controlling and did not apply the precise test set forth by the United States Court of Appeals for the Third Circuit in
Dun & Bradstreet. See
n. 11,
supra.
However, the analysis set forth by the district court in
Cassway
is persuasive in that the tortious interference claim there was found to not be preempted because that claim relied on a contract that protected rights which were not akin to those protected by the Copyright Act.
See Cassway,
. Having found that Plaintiff's tortious interference claim is preempted by the Copyright Act, the Court need not address Defendant Beckstrom’s alternative argument that said claim must be dismissed for failure to plead *432 all necessary elements. (See Docket No. 61 at 6-7).
. See n. 10, supra.
. See n. 16, supra.
. Peirson, a Delaware case, appears to present the minority opinion regarding the preemption of a conversion claim involving computer software.
. Outside of the
Apparel, Sullivan,
and
Gemel
decisions, many courts in other circuits have found that a claim of conversion of copyrighted software is preempted.
See U.S. ex rel Berge v. Bd. of Trustees of the Univ. of Ala.,
