UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 07-1596
DECISION INSIGHTS, INCORPORATED,
Plaintiff - Appellant,
v.
SENTIA GROUP, INCORPORATED; THOMAS H. SCOTT; MARK
ABDOLLAHIAN; JACEK KUGLER; BRIAN EFIRD,
Defendants - Appellees.
Appeal from the United States District Court for the Eastern
District of Virginia, at Alexandria. Claude M. Hilton, Senior
District Judge. (1:06-cv-00766)
Argued: September 25, 2008 Decided: February 12, 2009
Before WILLIAMS, Chief Judge, WILKINSON, Circuit Judge, and
Richard L. VOORHEES, United States District Judge for the
Western District of North Carolina, sitting by designation.
Affirmed in part, reversed in part, and remanded by unpublished
per curiam opinion.
Nicholas Hantzes, HANTZES & REITER, McLean, Virginia, for
Appellant. Edward Francis O’Connor, O’CONNOR, CHRISTENSEN &
MCLAUGHLIN, Irvine, California, for Appellees.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM:
Decision Insights, Inc. (“DII”) appeals the district
court’s grant of summary judgment on all claims in favor of
Sentia Group, Inc. (“Sentia”), Mark Abdollahian (“Abdollahian”),
Brian Efird (“Efird”), Jacek Kugler (“Kugler”), and Thomas H.
Scott (“Scott”). DII also appeals an adverse sanctions ruling
for purported discovery violations.
The underlying civil action arises from a dispute between
DII and Sentia surrounding the latter’s development and use of a
competing software application that implements a decision-making
model using expected utility theory. 1 More specifically, DII
alleges that Abdollahian, Efird, Kugler, and Carol Alsharabati
(“Alsharabati”), who was not named as a defendant, disclosed
trade secrets to Sentia in violation of Virginia’s Trade Secret
Misappropriations Act, Va. Code Ann. § 59.1-336. DII also
asserts that Efird, Kugler, and Abdollahian breached their
respective contractual and fiduciary obligations by disclosing
other confidential and proprietary information protected by DII.
DII alleges that Scott conspired with Sentia to induce DII’s
former employees to breach their agreements with DII. Because
the district court did not consider DII’s software compilation
1
Expected utility theory, described below, encompasses
several disciplines, including mathematics, economics, political
science, and psychology.
2
claim as a separate and independent alleged trade secret, we
affirm in part, reverse in part, and remand with instructions.
I.
A.
DII first developed software called a “Dynamic Expected
Utility Model” (“EU Model”) in the nineteen-eighties. 2 The EU
Model, DII’s primary asset, is an analytical tool used in
preparing negotiating strategies by assessing risk, comparing
the impact of differing operating positions, and detailing
trade-offs among various alternatives. 3 DII has used the EU
2
DII’s “Dynamic Expected Utility Model” (“EU Model”) is
also known as DII’s “Political Analysis Information System”
(“PAIS”) software.
3
DII first defines the component issues and then implements
state-of-the-art data collecting procedures (including
utilization of a subject area expert), in order to identify the
key data relative to each of the following:
1) identification of the stakeholders (i.e., groups,
individuals, companies or governments) with potential
interest in issue;
2) identify and quantify the policy positions of each
stakeholder;
3) identify and quantify the resources that each
stakeholder may employ to influence their or its
preference on the issue; and
4) identify and quantify the actual importance each
stakeholder attaches to the policy outcome, thereby
deriving their salience toward the issue.
(JA at 888-89) After research and data collection, numerical
values are associated with the responses to these four elements.
(Continued)
3
Model in the operation of its business since its inception in
1989. DII owns the assets, copyright, and all proprietary rights
to the EU Model.
Dr. Bruce Bueno de Mesquita (“Dr. Bueno de Mesquita”), a
former employee of DII and leading published authority on
expected utility theory generally, created the original source
code for DII’s software in the mid-1980s. 4 Gary Slack (“Slack”),
a DII analyst and member of DII’s Board of Directors, modified
and updated DII’s software in the early 1990s. Slack testified
that he and Dr. Bueno de Mesquita essentially wrote DII’s
software program from scratch.
In 1998, DII hired Carol Alsharabati to make additional
modifications to the EU Model. Alsharabati, who then lacked any
formal or informal computer programming training, was provided a
copy of DII’s computer code and required to sign a
Based on this data, the EU Model computer software calculates
dynamic bargaining positions with respect to stakeholder
positions over bargaining rounds based on calculating and
predicting changes in stakeholder positions.
4
The terms “source code” or “code” refer to “a document
written in computer language which contains a set of
instructions designed to be used directly or indirectly in a
computer to bring about a certain result.” Trandes Corp. v. Guy
F. Atkinson Co., 996 F.2d 655, 655 (4th Cir. 1993).
4
confidentiality agreement. 5 Alsharabati’s work with DII was her
first experience writing code for an EU Model. Alsharabati had
a copy of the DII code on her computer but testified that she
erased it after her work for DII was complete. Alsharabati
concedes she gained valuable experience while working on the DII
project.
During their work on behalf of DII, Abdollahian, Efird, and
Kugler all worked with Alsharabati and had access to the DII
source code for the EU Model and the other alleged confidential
and proprietary materials DII now seeks to protect. 6 Both
Abdollahian and Efird entered into Trade Secret Nondisclosure
Agreements (“Agreements”) with DII. 7 Efird’s contract also
included a restrictive covenant not to compete. Kugler executed
an Agreement that was never signed by DII. Between October 2001
and December 2002, Abdollahian, Efird, and Kugler all left DII
to form Sentia Group, Inc.
5
Alsharabati, who describes herself as “self-taught” in the
field of computer programming, has masters and doctorate degrees
in political science.
6
Abdollahian was in an exclusive consulting role with DII
between 2000 and 2002. Efird was employed with DII during the
same time period. Kugler was a director and major owner of
stock in DII through December 2002.
7
Abdollahian refused to sign a Consultant Agreement
presented to him by DII in 1997.
5
B.
On November 5, 2002, Abdollahian, Kugler, and Scott
incorporated Sentia Group, Inc. Scott was appointed Sentia’s
Chief Executive Officer, Abdollahian became Sentia’s Chief
Operating Officer, and Efird became an executive vice president.
Kugler, a major shareholder, performed consultant work.
According to Scott, Sentia was initially formed with the
idea that Sentia would obtain a software license from DII and
the two companies would divide responsibilities based upon
geographic territory. In late 2002, while acting on behalf of
Sentia, Kugler attempted to negotiate a nonexclusive worldwide
royalty license with DII but the parties did not reach
agreement.
Rather than continue to negotiate with DII, Sentia decided
to develop its own software application to perform the same
essential functions and analysis as DII’s software. Sentia
sought legal advice and was advised in December 2002 as follows:
“[W]e emphasize that preferably any individuals who had contact
with or access to the code of the prior company not be involved
in development of the new software program.” (JA at 790) Counsel
cautioned Sentia that if this were deemed unavoidable given the
requisite expertise, the “new code [should] bear no resemblance,
functionally, structurally, or otherwise, to the code of the
prior company.” (JA at 790) Sentia’s counsel also suggested that
6
Sentia carefully document aspects of the development process -
its intended function as well as design development and actual
development. 8 (JA at 791)
At the suggestion of Abdollahian, Kugler, or both, and
notwithstanding counsel’s advice, Sentia hired Alsharabati to
develop software for Sentia. Working with a group of software
students with no prior experience in EU Models, Alsharabati
wrote Sentia’s first code in what DII describes as “record
time,” or approximately six weeks. 9
According to DII, Sentia’s software is the same as its own
EU Model in terms of method. DII alleges that in running both
programs, its comparisons obtain “equal results.” 10 DII contends
that achieving equal results is not possible unless all of the
8
The same letter explained counsel’s understanding that
because Sentia sought to implement “vastly new and improved
theoretical models, and that any theoretical models used by the
prior company have largely been the subject of academic
publications and are well known in the field, it appears
possible to develop a new software program that has no
substantial similarity to the software program used by the prior
company.” (JA at 790-91)
9
Sentia’s software was initially named the “Machiavelli”
code, and later referred to as the “Senturion” application or
model. Although presently in different computer languages, the
first version of Sentia’s code was in the same computer language
as DII’s code – Visual Basic.
10
DII explains that when it compares the two programs,
Sentia’s output results are identical to DII’s model “to 2
decimal places of accuracy.”
7
parameters, variables and sequencing associated with the
expected utility are equal. DII also claims that the Machiavelli
code contains portions of DII’s source code which are “commented
out” and that this fact provides “proof positive” that Sentia
used the DII code as a reference in writing the Sentia software
program. 11
DII asserts that Sentia is conducting business in direct
competition with DII and using the EU Model in its business to
DII’s detriment.
C.
DII commenced its suit on June 30, 2006, and alleged causes
of action for breach of contract (Count I), conspiracy to commit
breach of contract (Count II), conspiracy to injure another in
trade, business or profession (Count III), misappropriation of
trade secrets (Count IV), breach of fiduciary duty (Count V),
and conversion (Count VI). 12
11
Here, the term “comment” refers to computer language in a
source code that is not part of the functional code, but
functions instead as a guide to future programmers working with
the source code and a mechanism for explaining changes in the
development of the code.
12
DII does not advance its claims for conspiracy to commit
breach of contract, conspiracy to injure another in trade,
business or profession, breach of fiduciary duty, or conversion
on appeal and is therefore deemed to have abandoned those
particular claims. Thus, only Counts I and IV remain.
8
The parties grappled with the framing of the legal issues
before the district court. On February 13, 2007, the magistrate
judge granted partial relief on a motion to compel filed by
Sentia. The magistrate judge determined that DII’s discovery
responses were inadequate, in part, due to DII’s failure to
identify its trade secrets with specificity. The magistrate
judge held Sentia’s request for monetary sanctions in abeyance
and directed DII to produce:
“[A] clear and express verified statement containing
only those items which Plaintiff considers to be
actual trade secrets and which Plaintiff has
reasonable grounds to believe were misappropriated by
Defendant. Plaintiff shall clearly differentiate
between the material which is public knowledge from
that material which is allegedly Plaintiff’s trade
secret, proprietary, or confidential material.”
(JA at 281)(emphasis added).
On February 20, 2007, Sentia filed a second motion for
sanctions claiming that DII’s Fourth Supplemental Answer to
Interrogatories was still deficient. DII’s Fourth Supplemental
response separately identified each of the twelve components of
the code as processes implemented within the code. DII
attempted to identify each individual component by including the
lines of source code (i.e., mathematical equations) that
corresponded to each. DII’s response unequivocally identified as
a trade secret its entire DII source code as a total
compilation.
9
On February 23, 2007, the magistrate judge conducted a
hearing to resolve several discovery disputes, including
Sentia’s motion for sanctions. Sentia argued that because DII
did not allege Sentia copied its code, the only thing left was
DII’s claim regarding the 12 processes. 13 The parties engaged in
a lengthy debate over whether lines of code were sufficient to
identify and define the alleged proprietary process claims.
Sentia argued that, as framed by DII, Sentia was unable to
defend on the trade secret claims.
On March 2, 2007, DII produced to Sentia an expert report
prepared by Gary Slack containing additional narrative and
detailed flow charts showing the structure of the code and
identifying each alleged proprietary process. The same report
contained the identity and description of the alleged
proprietary processes, the variables, the constants and the
parameters. Slack’s report also explained how the DII code
operates as a whole.
On March 5, 2007, the magistrate judge directed DII to
produce by March 9, 2007, “to the extent they exist, all
13
Sentia’s counsel made the following argument: “Remember
their specific representation isn’t that they [Appellees] copied
their code, although they say the entire code is trade secret,
because their own expert acknowledges we didn’t copy their code,
it’s what lies within the code.” (JA at 88, 91)
10
algorithms, block flow diagrams, narratives, and other documents
associated with the development of the twelve sections” of
software code DII asserts constitute trade secrets as well as
“all other sections of software code” DII has identified as its
trade secrets. 14 (JA at 125)(emphasis added) The magistrate judge
awarded Sentia the costs and attorneys’ fees associated with its
original motion to compel and its initial motion for sanctions.
On March 9, 2007, DII requested clarification as to whether
the magistrate judge contemplated production of existing
documentation only, or whether DII was expected to reverse
engineer algorithms from its current version of the source
code. 15 DII explained in its motion that, because the EU Model
was created over fifteen years ago, DII no longer had in its
possession documentation associated with the development of the
EU Model, including algorithms that would have been initially
14
An algorithm is “[a] step-by-step problem-solving
procedure, especially an established, recursive computational
procedure for solving a problem in a finite number of steps.”
THE AMERICAN HERITAGE DICTIONARY OF THE ENGLISH LANGUAGE 45 (3rd
ed. 1992).
15
The term “reverse engineer” means “to analyze a product
to try to figure out its components, construction, and inner
workings, often with the intent of creating something similar.”
WEBSTER’S NEW MILLENIUM DICTIONARY OF ENGLISH (Preview ed.
2008), available at http://www.dictionary.com.
11
relied upon. 16 DII reiterated the significant costs (as much as
$100,000) associated with reverse engineering the existing
source code for the purpose of creating new algorithms. DII
also submitted additional expert reports by Dr. Bueno de
Mesquita and Andrew Fahey. 17
On March 16, 2007, the magistrate judge issued an order
clarifying his March 5, 2007 ruling. The magistrate judge
explained that at the sanctions hearing held on February 23,
2007, the Court told DII that “it was not required to create any
algorithms, block flow diagrams, narratives, and other documents
associated with the development of its software or engage in
reverse engineering, but that [DII] should search and produce
any such responsive documents which already exist.” (JA at 144)
The order then stated that in light of DII’s representation that
no such responses exist, “this discovery matter is closed.” (JA
16
DII explained that its failure to retain such records is
not suspect. According to DII, unavailability can be attributed
to the fact that once a software code is debugged and made
operational, the original algorithms are of little value.
Similarly, as the software code is improved upon, the original
algorithms are seldom updated or referenced.
17
The Bueno de Mesquita report addressed Sentia’s claim
that certain DII processes were in the public domain and could
not be considered trade secrets. The Fahey report sought to
identify the alleged proprietary portions of the DII code also
found within the Sentia code.
12
at 144-45) Sanctions were imposed against DII for a total of
$13,256.25. 18
DII objected to the magistrate judge’s ruling. On March
30, 2007, the district court summarily affirmed the magistrate
judge’s March 5, 2007 Order, finding that the imposition of
sanctions was not “clearly erroneous or contrary to law.” (JA at
224-25)
D.
Sentia moved for summary judgment on all of DII’s causes of
action. The district court heard oral argument and opined on
June 5, 2007, that summary judgment was proper on all of DII’s
claims. Regarding Claims III through VI, the district court
found that DII failed to meet its burden as to the existence of
a trade secret. The district court likewise based his ruling on
Counts I and II, the non-trade secret claims, on DII’s failure
to identify “any confidential or proprietary information
obtained by [Appellees] while employed at DII that were
thereafter misappropriated.” (JA at 271) The district court
also ruled that DII did not have an enforceable contract to
assert against Kugler.
18
After briefing, the magistrate judge held that DII was
subject to sanctions in the amount of $13,256.25. The award to
Sentia was based upon costs in the amount of $2,956.25 and
$10,300 in attorneys’ fees.
13
DII’s appeal is timely and we have jurisdiction pursuant to
28 U.S.C. § 1291.
II.
On appeal, DII contends the trial court erred by finding,
as a matter of law, that DII failed adequately to identify any
trade secrets relating to its software. DII also challenges the
trial court’s rulings on its contractual claims as well as the
imposition of monetary sanctions for the alleged failure to
comply with its discovery obligations.
III.
This court reviews the district court’s decision granting
summary judgment de novo. See Cont’l Airlines, Inc. v. United
Airlines, Inc., 277 F.3d 499, 508 (4th Cir. 2002).
Under Rule 56(c) of the Federal Rules of Civil Procedure,
summary judgment may be granted where Athe pleadings,
depositions, answers to interrogatories, and admissions on file,
together with affidavits, if any, show that there is no genuine
issue of material fact and that the moving party is entitled to
judgment as a matter of law.@ Fed. R. Civ. P. 56(c); Anderson v.
Liberty Lobby, 477 U.S. 242 (1986); Celotex Corp. v. Catrett,
477 U.S. 317 (1986). A genuine issue exists only if Athe evidence
14
is such that a reasonable jury could return a verdict for the
non-moving party.@ Anderson, 477 U.S. at 248.
Under Rule 56(e), “an adverse party may not rest upon the
mere allegations or denials of his pleading, but his response,
by affidavits or as otherwise provided in this rule, must set
forth specific facts showing that there is a genuine issue for
trial. . . .” Fed. R. Civ. P. 56(e). Thus, in order to
survive summary judgment, DII is required to produce evidence
setting forth specific facts that demonstrate the existence of a
genuine issue for trial. In conducting its analysis, the court
must view the evidence in the light most favorable to the non-
moving party. See Celotex Corp., 477 U.S. at 325.
A. Trade Secret Claims – Va. Code Ann. § 59.1-336
The success of DII’s appeal largely depends upon whether
DII presented sufficient evidence at summary judgment in support
of its contention that its software may be deemed a trade
secret.
Virginia’s version of the Uniform Trade Secrets Act defines
a “trade secret” as “information, including but not limited to a
formula, pattern, compilation, program, device, method,
technique, or process, that:
1. Derives independent economic value, actual or
potential, from not being generally known to, and not being
readily ascertainable by proper means by, other persons who
can obtain economic value from its disclosure or use, and
15
2. Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.
Va. Code. § 59.1-336 (emphasis added). 19
“The crucial characteristic of a trade secret is secrecy
rather than novelty.” Dionne v. Southeast Foam Converting &
Packaging, Inc., 397 S.E.2d 110, 113 (Va. 1990); Avtec Syss.,
Inc. v. Peiffer, 21 F.3d 568, 575 (4th Cir. 1994) (same). “The
secrecy need not be absolute; the owner of a trade secret may,
without losing protection, disclose to a licensee, an employee,
or a stranger, if the disclosure is made in confidence, express
or implied.” Dionne, 397 S.E.2d at 113 (citing Kewanee Oil Co.
v. Bicron Corp., 416 U.S. 470, 475 (1974)); Trandes Corp. v. Guy
F. Atkinson Co., 996 F.2d 655, 664 (4th Cir. 1993). “Although
the subject of a trade secret may be novel in the sense that it
is something generally unknown in the trade or business,
“[n]ovelty, in the patent law sense, is not required for a trade
secret.” Id. (citing Kewanee Oil Co., 416 U.S. at 476.)
Whether or not a trade secret exists is a “fact-intensive
question to be resolved at trial.” Hoechst Diafoil Co. v. Nan
Ya Plastics Corp., 174 F.3d 411, 419 (4th Cir. 1999); Trandes,
996 F.2d at 661; Microstrategy, Inc. v. Li, 601 S.E.2d 580, 589
19
Virginia’s Trade Secrets Act is modeled after the Uniform
Trade Secrets Act. See Dionne, 397 S.E.2d at 114; Avtec Syss.,
21 F.3d at 574 (Virginia’s statute “closely tracks the Uniform
Trade Secrets Act.”)
16
(Va. 2004)(“[T]he determination whether a trade secret exists
ordinarily presents a question of fact to be determined by the
fact finder from the greater weight of the evidence.”)
DII’s first trade secret claim is founded upon its software
as a total compilation. In addition, DII contends that twelve
specific functions within the DII Code amount to one or more
protected trade secrets. DII suggests that the proper analysis
is to evaluate each identified trade secret claim independently
as in Trandes. See e.g., Trandes, 996 F.2d 655 (4th Cir. 1993)
(applying identical Maryland’s Uniform Trade Secrets Act in
post-trial context). We agree. Because the district court did
not consider whether DII’s entire software compilation might
qualify as a “trade secret” under the Virginia statute, we
remand to the district court with guidance as follows:
1. Software Compilation Claim
The district court found that, “Plaintiff [DII] could not
provide adequate identification of its trade secrets and
confidential information, making it almost impossible for this
Court and Defendants [Sentia] to ascertain what aspects of the
EU Model are trade secrets, and which portions of the code are
publicly available.” (JA at 270) The district court did not
address whether or not the software program, as a total
compilation, could qualify as a trade secret.
17
Understandably, identification of DII’s alleged trade
secrets presented difficulty for the court. As noted, supra, the
parties argued over DII’s actual legal theory. Sentia insisted
that because DII did not assert a copyright claim, the
application itself was not at issue. Sentia dedicated little
time to DII’s software compilation claim. Sentia’s expert
devoted only one paragraph within his original expert
declaration to this aspect of DII’s trade secret claim. Before
DII produced the flowchart and block diagram of its source code,
Dr. Alexander stated:
“I am unable to respond to the first
identification relating to the entire code to the
engine of DII’s software as a compilation.” In the
source code provided I can see numerous standard Basic
language extensions to Basic that Microsoft itself
would most likely consider proprietary. DII
proprietary contributions, if any, are not apparent
from the entirety of the code module.”
(JA at 200) Similarly, Dr. Alexander’s rebuttal report focused
almost entirely on DII’s twelve process claims. Citing no legal
authority, Sentia then faulted DII for its failure to produce
algorithms corresponding to its source code.
Our opinion in Trandes is instructive regarding DII’s
burden. Trandes involved a computer program that performed
survey calculations for the construction of subway tunnels. See
Trandes, 996 F.2d at 657. In addition to an independent software
compilation claim, the Trandes plaintiff alleged that both the
18
“specific engineering formulas and methods of calculation
embodied in the Tunnel System” and “the structure and
organization of the Tunnel system modules” constituted
additional trade secrets. Trandes, 996 F.2d at 661, 662 n.7.
These two claims were dismissed, however, because Trandes did
not provide “any information whatsoever about the formulas” and
likewise failed to explain “how the program was structured [or]
how the program was organized.” Trandes, 996 F.2d at 661-662
(plaintiff is required “to describe the subject matter of its
alleged trade secrets in sufficient detail to establish each
element of a trade secret”). Although the Trandes plaintiff was
ultimately unsuccessful on two of its trade secret claims, we
determined that Trandes presented sufficient evidence that the
software itself, which was identified by source code and
produced at trial, constituted a trade secret. Trandes, 996
F.2d at 662-663. Accordingly, we upheld the jury’s verdict that
the software compilation was a protected trade secret. Id.
Thus, Trandes teaches that a plaintiff’s alleged software
compilation trade secret is to be analyzed separate and apart
from other software trade secret claims, and that production of
source code is an acceptable method of identifying an alleged
compilation trade secret. Trandes, 996 F.2d at 661-63.
With respect to algorithms, DII represents that because its
code was created over fifteen years ago, it had none to produce.
19
However, in addition to producing a complete copy of its source
code, DII also presented detailed block diagram flow charts as
well as expert testimony in support of its position that its
source code is unique. Sentia’s own expert recognized that a
flow chart is an acceptable and “equally precise” alternative to
the production of algorithms for purposes of identification of
alleged proprietary software. (JA at 197-98)
DII produced its entire source code, as well as a flow
chart and narrative explaining its software program as a whole.
Accordingly, we remand DII’s software compilation claim to the
district court for independent consideration. On remand, should
the district court determine that DII adequately identified its
software compilation claim, the district court should then
consider the sufficiency of DII’s showing as to the existence of
a trade secret and thence a triable issue of fact. In doing so,
the district court should specifically address the relevant
criteria for establishing the existence of a trade secret under
Va. Code. § 59.1-336, namely, whether or not the compilation has
independent economic value, is generally known or readily
ascertainable by proper means, and is subject to reasonable
efforts to main secrecy. 20 If, in light of these statutory
20
On the question of whether or not DII’s software
compilation is generally known or readily ascertainable by
proper means, we refer the district court to our opinion in
(Continued)
20
criteria, the district court finds that a triable issue is
presented, it should next consider whether sufficient evidence
of misappropriation exists to survive summary judgment.
2. Twelve Process Claims
DII also alleges that each of twelve individual portions of
the program within its source code (i.e., the twelve process
claims) constitute a trade secret. The parties’ experts disagree
regarding the adequacy of identification and proprietary status.
DII attempts to identify each of the twelve individual
components by including the lines of source code that apply or
correspond to each. DII’s expert explains that the twelve
alleged trade secret functions “are not located in a single
location in the Code, and therefore cannot easily be isolated
independent of the other code as currently written . . . .” (JA
at 188) DII also contends that “the annotation of the Code
which identifies the location of each of the functions
eliminates this impediment to identifying their functions within
the Code.” (JA at 188) DII does not describe what the lines of
code teach, or how they translate to a protectable trade secret.
Servo Corp. of Am. v. Con. Elec. Co., 393 F.2d 551, 554 (4th
Cir. 1968) (recognizing that plaintiff’s trade secret “might
consist of several discrete elements, any one of which could
have been discovered by study of material available to the
public . . . .”)
21
Sentia’s expert persuasively describes the difficulty in
analyzing the twelve processes independently. According to Dr.
Alexander, if each individual process is considered
independently, the information provided by DII is incomplete and
fragmented. We agree that the information on the twelve process
claims is presented by DII in such a way as to prohibit
meaningful analysis by Sentia, the court, or a jury. For this
reason, we find that DII has not met its evidentiary burden with
respect to the twelve process claims and we affirm the district
court’s grant of summary judgment on this issue.
3. Other Proprietary Claims
DII’s other claims seek protection of DII reports
containing marketing and research material, specific information
identified in DII’s user manual, and specific client contact
information. The district court determined that Counts III
through VI “presuppose the existence of confidential information
and trade secrets” and that DII’s “failure to identify [any such
information] with reasonable particularity” required dismissal.
(JA at 270) As a result, these specific categories of alleged
proprietary materials were not discussed by the district court
at all. Depending on the circumstances, any of this information
could be characterized as trade secrets. (See Section “III,
A.”) On remand, the district court will have an opportunity to
22
consider DII’s other proprietary claims under the statutory
criteria consistent with this court’s opinion.
B. Contractual Claims
1. Trade Secret Nondisclosure Agreements
Abdollahian entered into an Agreement on December 12, 1994,
agreeing not to disclose DII’s proprietary information. Efird
signed a similar Agreement on April 3, 1998. The Agreements
entered into by DII’s former employees contain nearly identical
language and call for the application of Virginia state law.
The Agreements include provisions for assignment of work product
to DII and the return of confidential material upon agreement
termination. The confidentiality clauses, entitled “Covenant To
Retain Confidence,” read as follows:
The Consultant / Representative 21 acknowledges that he
will, as a result of an association with Decision
Insights, Inc., have access to and be in a position to
receive information of a confidential or proprietary
nature including trade secrets. The Consultant /
Representative agrees that he will not, during the
association with Decision Insights or thereafter,
disclose to anyone whomsoever or use in any manner
whatsoever any confidential or proprietary
information, whether patentable or unpatentable,
concerning any inventions, discoveries, improvements,
processes, methods, trade secrets, research or secret
data (including but not limited to, models, formulas,
computer programs and software developments), or other
confidential matters possessed, owned, or used by
21
In their respective Agreements, Abdollahian is identified
as a “Consultant” and Efird is identified as a “Representative.”
23
Decision Insights that may be obtained or learned by
the Consultant / Representative in the course of, or
as a result of his association with Decision Insights,
except as such disclosure or use may be required in
the normal course of doing business with Decision
Insights and pursuant to Decision Insights Inc.[‘s]
prior written consent.
(JA at 386-387) The Agreements provide that the agreement shall
continue to bind the parties after their association ends. (JA
at 387)
With respect to Abdollahian and Efird, the district court
did not discuss enforceability of the respective confidentiality
provisions. Rather, the district court relied upon an asserted
lack of evidence of a breach and simply stated that DII “failed
to come forward with any evidence identifying any confidential
or proprietary information obtained by Defendants while employed
at DII that were[sic] thereafter misappropriated.” (JA at 271)
Because this court has determined that remand is proper
with respect to DII’s claim that its software as a compilation
may constitute a trade secret, remand is also proper on the
contractual claims in order for the district court to address
DII’s contractual claims in light of its findings with respect
to the existence of a trade secret.
Kugler was presented with a similar Trade Secret
Nondisclosure Agreement but DII never executed it. DII contends
that the parties’ agreement is reflected within a document
signed by Kugler on January 30, 1998. (JA at 860-62) Per
24
handwritten additions to the typed text (initialed “JK”), the
Agreement carves out an exception for academic use of Kugler’s
work product. (JA at 861) DII posits that Kugler intended to be
bound to the terms set forth in the January 30, 1998 document,
particularly confidentiality and nondisclosure, notwithstanding
the fact that DII never executed the written contract.
DII relies upon the Virginia State Supreme Court’s opinion
in Manss-Owens, which held that “the mere fact that a written
contract was contemplated does not necessarily show that no
binding agreement had been entered into.” Manss-Owens Co. v.
H.S. Owens Son, 105 S.E. 543, 547 (Va. 1921). The rationale for
the rule is explained as follows:
The whole question is one of intention. If the parties
are fully agreed, there is a binding contract,
notwithstanding the fact that a formal contract is to
be prepared and signed; but the parties must be fully
agreed and must intend the agreement to be binding.
If though fully agreed on the terms of their contract,
they do not intend to be bound until a formal contract
is prepared, there is no contract, and the
circumstances that the parties do intend a formal
contract to be drawn up is strong evidence that they
did not intend the previous negotiations to amount to
an agreement.
If it appears from the evidence that the minds of the
parties have met; that, on the one side, there was a
proposition for a contract, which proposition has been
accepted by the other party; that the terms were in
all respects agreed upon; and that a part of the
mutual understanding was that a written contract
embodying those terms should thereafter be executed by
the respective parties – there results an obligatory
contract which neither party is at liberty to
repudiate.
25
Manss-Owens Co., 105 S.E. at 547 (quoting Boisseau v. Fuller, 30
S.E.457 (Va. 1898)); see also Charbonnages de France v. Smith,
597 F.2d 406, 414-16 (4th Cir.1979) (explaining that questions
of mutual assent and the parties’ intentions are
“quintessentially disputes about ‘states of mind’” and that
“subjective states and objective manifestations of intention
present interpretive issues traditionally understood to be for
the trier of fact.”)
DII claims a genuine issue of material fact exists with
respect to whether Kugler intended to be bound in light of
Kugler’s deposition testimony that he had an agreement with DII
that he could use DII’s technology for academic purposes. (JA at
1376-77) According to DII, it would never have shared its
proprietary information with Kugler had he not intimated
agreement not to disclose its trade secret and confidential
information. In fact, after their disassociation, on January
22, 2003, Kugler wrote to DII to assure the company that he had
no intention of disclosing or making improper use of any
confidential DII information. In the same letter, Kugler refers
to the modifications he made to the January 30, 1998 document
and states, “it is unclear to me if the agreement was
consummated or to what extent the terms of such an agreement are
even enforceable.” (JA at 864, 1378) For these reasons, we also
26
remand as to this issue. Should the district court determine on
remand that DII in fact possessed trade secret, confidential, or
proprietary information, the district court should likewise
consider whether an implied agreement existed between DII and
Kugler as suggested by DII that prohibited Kugler from
disclosing this information. 22
2. Non-Competition Clause
Efird’s Agreement contained a non-competition clause or
restrictive covenant. Paragraph 4 of the Agreement reads in
pertinent part:
[D]uring the term of this agreement and for a period
of two years after termination of association, the
representative shall not, for any reason, directly or
indirectly, enter into or engage in any business
competition with the precise business as it now exists
[or] may exist at any time during the period of the
representative’s engagement . . . .
(JA at 387) The restrictive covenant seeks to prohibit Efird
from directly or indirectly engaging in any “business
competition” with DII’s “precise business as it now exists [or]
22
Sentia’s brief is of little help. Sentia fails to cite to
the record, or any case law, in support of its argument that the
district court correctly found, as a matter of law, that no
contract existed. In addition, Sentia confuses Abdollahian and
Kugler in its terse discussion of the contractual claims.
(Sentia claims that the Abdollahian contract was never signed by
DII. That is incorrect. Rather, the Kugler agreement is the one
DII never executed.)
27
may exist at any time during the period of [Efird’s] engagement”
with DII.
Under Virginia law, the following criteria determine
the validity of non-competition agreements:
(1) Is the restraint, from the standpoint of the
employer, reasonable in the sense that it is no
greater than is necessary to protect the employer
in some legitimate business interest?
(2) From the standpoint of the employee, is the
restraint reasonable in the sense that it is not
unduly harsh and oppressive in curtailing his
legitimate efforts to earn a livelihood?
(3) Is the restraint reasonable from the
standpoint of a sound public policy?
Non-competition covenants which pass these tests in
the light of the facts of each case will be enforced
in equity.
Blue Ridge Anesthesia & Critical Care, Inc. v. Gidick, 389
S.E.2d 467, 470 (Va. 1990) (quoting Roanoke Eng’g Sales v.
Rosenbaum, 290 S.E.2d 882, 884 (Va. 1982)). In other words, the
Court must determine whether the non-competition clause or
restraint is greater than necessary to protect DII’s interest or
unreasonable in limiting Efird’s ability to obtain other
suitable employment. See Blue Ridge Anesthesia & Critical Care,
Inc., 389 S.E.2d at 470.
Virginia law does not generally favor restrictive covenants
because such covenants are a restraint on trade. See Grant v.
Carotek, 737 F.2d 410, 411-412 (4th Cir. 1984). For this reason,
restrictive covenants are strictly construed against the
28
employer. Grant, 737 F.2d at 412; accord Roanoke Eng’g Sales
Co., 290 S.E.2d 882 (Va. 1982) (other citations omitted).
Moreover, the employer bears the burden of proving that the
restraint is reasonable under the circumstances of the case.
Id. (citing, inter alia, Richardson v. Paxton Co., 127 S.E.2d
113 (Va. 1962)).
In this case, Sentia attacks this provision of Efird’s
contract as ambiguous and overbroad. Sentia’s chief criticism
of the non-competition agreement is that the contract is vague
regarding the business of the company. Indeed, the district
court found the non-compete unenforceable on this basis. 23
Construing the non-compete clause against the employer, the
district court determined that the clause was “broader than
necessary” to protect DII’s legitimate business interests and
“unduly restrictive of Efird’s efforts to pursue his
livelihood.” (JA at 273)
In evaluating the reasonableness of the restraint from the
employer’s perspective, the first inquiry necessarily requires
the court to consider the nature of the legitimate business
23
Based on the purported lack of evidence establishing that
DII’s business was conducted worldwide, the district court also
found the absence of a geographic limitation unreasonable. The
district court likewise found the two-year time limitation
unreasonable. Given our analysis, we need not discuss these
issues.
29
interest at stake, namely, whether DII possessed trade secrets
or other confidential and proprietary information. See Meissel
v. Finley, 95 S.E.2d 186, 191 (Va. Ct. App. 1956) (“The
possession of trade secrets and confidential information is an
important consideration in testing the reasonableness of a
restriction on competition.”)(citing Stoneman v. Wilson, 192
S.E. 816, 819 (Va. 1937)); But see Paramount Termite Control
Co., Inc. v. Rector, 380 S.E.2d 922, 925 (Va. 1989) (“Although
often used as a justification for non-competition agreements, it
is not necessary that the employees actually had acquired or
possessed specific information that could be legally defined as
confidential or a trade secret, . . . .”)(internal quotations
omitted). Here, the district court determined, in effect, that
DII did not have any legitimate business interests worthy of
protection. As a result, the district court’s analysis of the
restrictive covenant was likely skewed by its conclusion that
DII failed to demonstrate the existence of a trade secret.
Each of Virginia’s tests for validity of a non-competition
clause prompts a reasonableness inquiry in which the analysis
would necessarily include consideration of the existence of a
trade secret to be protected. More importantly, the competing
interests of the employer and employee must be balanced by the
court and then squared with public policy. As explained by the
Supreme Court of Virginia, “[t]hese standards have been
30
developed over the years to strike a balance between an
employee’s right to secure gainful employment and the employer’s
legitimate interest in protection from competition by a former
employee based on the employee’s ability to use information or
other elements associated with the employee’s former
employment.” Omniplex World Servs. Corp. v. U.S. Investigations
Servs., Inc., 618 S.E.2d 340, 342 (Va. 2005) (citing Worrie v.
Boze, 62 S.E.2d 876, 882 (1951)). For these reasons, we
conclude that remand is also proper on this issue so that the
requisite balancing and analysis may be conducted by the trial
court.
IV.
DII’s final argument on appeal is its challenge of the
district court’s March 5, 2007 Order imposing monetary sanctions
for alleged failure to comply with discovery obligations. The
district court’s decision to affirm the magistrate judge’s
sanctions order is reviewed for an abuse of discretion. See
Nat’l Hockey League v. Metro. Hockey Club, Inc., 427 U.S. 639,
642 (1976).
The sanctions order was driven by the district court’s
concern that DII, for strategic reasons, refused adequately to
identify its purported trade secrets. However, the record tends
to show that both the magistrate judge and district court were
31
hampered by less than thorough showings by the parties and did
not come to understand fully the contours of DII’s compilation
argument.
Rule 37 of the Federal Rules of Civil Procedure governs
imposition of sanctions for discovery violations. 24 Rule
37(a)(5)(A)(ii) provides that a district court “must not” order
sanctions if the opposing party’s nondisclosure was
“substantially justified.” A legal position is “substantially
justified” if there is a “genuine dispute” as to proper
resolution or if “a reasonable person could think it correct,
that is, if it has a reasonable basis in law and fact.” See
Pierce v. Underwood, 487 U.S. 552, 565-66 n.2 (1988).
As noted, the alleged factual basis for the imposition of
sanctions was that DII repeatedly responded inadequately to the
discovery requests of Sentia, namely, identification of what it
contended constituted trade secret material. To the extent DII
was deemed to have failed in its efforts adequately to identify
the twelve processes it contended were trade secrets, we agree
with the district court. (Section “III, A, 2,” supra) However,
the parties also legitimately disagreed about what was required
by DII in terms of identification.
24
The magistrate judge did not explain what provision of
Rule 37 he was applying.
32
As for the software compilation, DII argues first that the
magistrate judge did not expressly direct DII to produce
existing algorithms or other developmental documents prior to
March 5, 2007. In fact, DII contends that the first time
algorithms were even requested by Sentia was during the February
23, 2007 hearing on Sentia’s motion for sanctions. The record
confirms DII’s representation. (JA at 90-91, 95) Sentia
originally requested, and the magistrate judge first ordered, a
narrative description of the alleged trade secrets. In producing
the Slack report, DII complied with the February 17, 2007 Order.
Here, the parties had a “genuine dispute” as to the method
of identifying the alleged trade secrets. Algorithms were not
designated by Sentia or the court as the preferred method of
identification prior to February 23, 2007. In addition, DII had
reasonable cause to believe its production was sufficient in
light of our holding in Trandes. See Maddow v. Proctor & Gamble
Co., Inc., 107 F.3d 846, 853 (11th Cir. 1997) (reliance on case
law is a relevant consideration in determining whether or not a
party’s actions during a discovery dispute are justified).
Accordingly, we find that DII’s failure to produce algorithms
was “substantially justified.” For these reasons, the
imposition of sanctions was not appropriate. On remand, the
district court is instructed to vacate this portion of its
33
earlier order and otherwise proceed in accordance with the
guidance herein provided.
AFFIRMED IN PART,
REVERSED IN PART,
AND REMANDED
34