UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
LEWIS-BURKE ASSOCIATES LLC,
Plaintiff,
v. Civil Action No. 09-302 (JMF)
JOEL WIDDER,
Defendant.
MEMORANDUM OPINION
This case is before me for all purposes, including trial. It was scheduled to go to trial in
February of this year; however, on the eve of the pre-trial conference, defendant filed a motion to
dismiss based on lack of subject-matter jurisdiction, and the plaintiff filed a motion to amend the
complaint. Due to the pending motion and the extreme weather conditions at the time of the
scheduled trial, I found that it was both impossible and improvident to proceed to trial as
originally scheduled. Memorandum Order [#44], February 16, 2010. I will now address all
remaining motions before the Court, in the hopes of bringing this case to its conclusion.
I. Background
Plaintiff brings this case against Joel Widder, a former employee, alleging that he violated
a Non-Competition and Confidentiality Agreement that he had entered into with plaintiff.
Complaint (“Compl.”) ¶¶ 9-19. According to plaintiff, Widder took confidential and proprietary
information with him when he left the firm and solicited clients for a competing business. Id. at ¶
34. Plaintiff filed a motion for a temporary restraining order, which I granted in part, enjoining
defendant from (1) using for any purpose or sharing with anyone confidential or proprietary
information belonging to the plaintiff; and from (2) contacting plaintiff’s current and former
clients for purposes of soliciting them. Order Granting in Part and Denying in Part Motion for a
Temporary Restraining Order [#4], February 19, 2009. I also ordered the parties to discuss the
most appropriate means of preserving relevant electronically stored information (“ESI”) and
protecting privileged or confidential information contained therein. Id. The parties submitted
their report on the ESI, and I issued an order on the review of electronic devices. Order
Regarding Review of Electronic Devices [#11], March 13, 2009. Discovery closed on October
15, 2009, and on November 13, 2009 plaintiff filed a motion to compel production of documents
and a motion to compel compliance with document subpoenas. See Plaintiff’s Motion to
Compel Production of Documents [#26]; and Plaintiff’s Motion to Compel Compliance with
Document Subpoenas [#27]. Defendant did not submit any opposition to the motions, and I
granted the motions on December 8, 2009. On January 8, 2010, plaintiff filed a motion for
sanctions, which is currently pending before me, in relation to the two motions to compel. See
Plaintiff’s Motion for Sanctions [#29] (“Pl. Mot. for Sanctions”). On January 28, 2010, plaintiff
filed a motion in limine that sought to exclude certain testimony and to preclude defendant from
introducing into evidence a change in Lewis-Burke Associates LLC’s (“Lewis-Burke”)
commission policy. Plaintiff’s Motion In Limine [#32] (“Pl. Mot. In Limine”). On February 8,
2010, defendant filed a motion to dismiss for lack of subject-matter jurisdiction. Motion to
Dismiss [#38] (“Mot. to Dismiss”). The parties then filed their pre-trial statement on February
11, 2010, and plaintiff filed a motion to amend the same day. Plaintiff’s Motion to Amend
Complaint [#42] (“Mot. to Amend”). The Court was closed, due to inclement weather, from
2
noon on February 5, 2010 until 10:00 am on February 12, 2010, the day of the pre-trial
conference. Thus, because the Court was closed for this long period of time, the motion to
dismiss, motion to amend, and pre-trial statements were not accessible to the Court until
February 12, 2010, the day of the pre-trial conference.
In light of the pending motions, I continued the trial until the pending motions were
resolved. At the pre-trial conference, I determined that I would hold an evidentiary hearing
regarding the motion for sanctions. That hearing was to be set after the scheduled jury selection;
however, in light of the continuance of the trial, the hearing was not held. I will reset the
evidentiary hearing on the motion for sanctions in a separate order. I will address the remaining
motions in turn.
II. Motion to Dismiss
Defendant moves to dismiss the case for lack of subject-matter jurisdiction under Rule
12(b)(1) of the Federal Rules of Civil Procedure. Mot. to Dismiss 1. Defendant argues that the
federal court’s jurisdiction over the matter is predicated on plaintiff’s claim under the Computer
Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, et seq.,1 and that plaintiff failed to meet the
jurisdictional threshold for the claim. Mot. to Dismiss 1. Rule 12(b)(1) concerns the power of
the Court to hear plaintiff’s case; as such, a party may raise the objection that a federal court
lacks subject-matter jurisdiction at any stage of the litigation. Fed. R. Civ. P. 12(b)(1);
Ghawanmeh v. Islamic Saudi Academy, 672 F. Supp. 2d 3, 7 (D.D.C. 2009) (quoting Arbaugh v.
Y & H Corp., 546 U.S. 500, 506 (2006); and Casanova v. Marathon Corp., 256 F.R.D. 11, 12
1
All references to the United States Code or the Code of Federal Regulations are to the
electronic versions that appear in Westlaw or Lexis.
3
(D.D.C. 2009)). Thus, “‘a Rule 12(b)(1) motion imposes on the court an affirmative obligation
to ensure that it is acting within the scope of its jurisdictional authority.’” Ghawanmeh, 672 F.
Supp. 2d at 7 (quoting Grand Lodge of Fraternal Order of Police v. Ashcroft, 185 F. Supp. 2d 9,
13 (D.D.C. 2001)).
Defendant also invokes Rule 12(b)(6) of the Federal Rules of Civil Procedure as grounds
for dismissal for plaintiff’s failure to state a CFAA claim. Mot. to Dismiss 1. The Federal Rules
of Civil Procedure require a pleading to contain “a short and plain statement of the claim
showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). The pleading should, thus,
“‘give the defendant fair notice of what the . . . claim is and the grounds upon which it rests.’”
Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (quoting Conley v. Gibson, 355 U.S. 41,
47 (1957)). More than a mere “formulaic recitation of the elements of a cause of action” must be
alleged to survive a motion to dismiss. Twombly, 550 U.S. at 555 (citing Papasan v. Allain, 478
U.S. 265, 286 (1986) (on a motion to dismiss, courts “are not bound to accept as true a legal
conclusion couched as a factual allegation”)). Thus, for a complaint to survive a motion to
dismiss, “[it] must contain sufficient factual matter, accepted as true, to ‘state a claim to relief
that is plausible on its face.’” Ashcroft v. Iqbal, 129 S.Ct. 1937, 1949 (2009) (quoting Twombly,
550 U.S. at 570).
The CFAA is a criminal statute; however, subsection (g) of the statute provides a civil
cause of action to “any person who suffers damage or loss by reason of a violation” of the CFAA.
18 U.S.C. § 1030(g). Under the statute, such a person may obtain compensatory damages and
injunctive relief or other equitable relief, but only if the conduct leading to the violation of the
CFAA involves one of the factors “set forth in subclauses (I), (II), (III), (IV), or (V) of subsection
4
(c)(4)(A)(i).” Id. The conduct relevant in this case is set forth in 18 U.S.C. § 1030(c)(4)(A)(i)(I),
which states that the CFAA is violated when there is a “loss to 1 or more persons during any 1-
year period . . . aggregating at least $5,000 in value.” 18 U.S.C. § 1030(c)(4)(A)(i)(I). Under the
statute, loss is defined as “any reasonable cost to any victim, including the cost of responding to
an offense, conducting a damage assessment, and restoring the data, program, system, or
information to its condition prior to the offense, and any revenue lost, cost incurred, or other
consequential damages incurred because of interruption of service.” 18 U.S.C. § 1030(e)(11).
Thus, a “private plaintiff must prove that the defendant violated one of the provisions of §
1030(a)(1)-(7), and that the violation involved one of the factors listed in § 1030(a)(5)(B).”
LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1131 (9th Cir. 2009).
Plaintiff alleges that defendant violated subsection (a)(2) of the CFAA, which prohibits
“intentionally access[ing] a computer without authorization or exceed[ing] authorized access,
and thereby obtain[ing] . . . information from any protected computer.” 18 U.S.C. § 1030(a)(2).
Under the statute, “exceeds authorized access” is defined as “to access a computer with
authorization and to use such access to obtain or alter information in the computer that the
accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Further, a “protected
computer” means “a computer . . . which is used in or affecting interstate or foreign commerce or
communication . . .” Id. at (e)(2)(B).
Therefore, to bring an action successfully under 18 U.S.C. § 1030(g) based on a violation
of 18 U.S.C. § 1030(a)(2), plaintiff must show that defendant:
(1) intentionally accessed a computer, (2) without authorization or
exceeding authorized access, and that he (3) thereby obtained
information (4) from any protected computer (if the conduct
5
involved an interstate or foreign communication), and that (5) there
was loss to one or more persons during any one-year period
aggregating at least $5,000 in value.
Brekka, 581 F.3d at 1132.
Plaintiff alleges that defendant “was not authorized by Lewis-Burke to access, via its
protected computer systems, the Confidential and Proprietary Information for his personal gain or
that of a competitor.” Compl. ¶ 39. Further, it is through these actions that defendant “has
intentionally accessed a computer system without authorization and has exceeded his authority to
obtain information from a protected computer in violation of 18 U.S.C. § 1030(a)(2)(C).” Id. at ¶
40. Plaintiff further alleges that it has suffered damages and loss a result of defendant’s action in
an amount to be determined at trial. Id. at ¶ 41. Nevertheless, upon information and belief,
plaintiff alleges “the damages caused by Widder’s theft of highly confidential and proprietary
information far exceeds (sic) $5,000,” that “the reasonable expenditure of funds to conduct the
forensic analysis of Widder’s USB drive and Lewis-Burke’s computer has exceeded $5,000,” and
that the damages due to compromised integrity and the resulting reduced value of the
Confidential and Proprietary Information because of Widder’s actions far exceed $5,000. Id.
Defendant argues that the complaint “fails to make sufficient allegations of lack of
authorization on defendant’s part in accessing or copying Lewis-Burke’s computer data.” Mot. to
Dismiss 4. Further, defendant argues that “the complaint fails to allege damage or loss within the
statutory definition and fails to establish that the $5,000 jurisdictional threshold was met.” Id. I
will address each of these in turn.
6
A. Access Without Authorization or Exceeding Authorization
The complaint alleges that when defendant accessed and obtained data from the
computer for personal use or that of a competitor, he acted without authorization or in excess of
the authorization he had to access that data. Compl. ¶¶ 39-40. In other words, according to
plaintiff, the defendant’s authorization to access certain information turns on defendant’s intent
for using the information once he obtained it. There is currently a split among the circuits that
have considered this question, but the United States Court of Appeals for the District of
Columbia Circuit has not yet considered the issue.
Plaintiff relies on a line of cases, referred to as the Citrin cases, which determine whether
authorization exists in light of a person’s duty of loyalty. See Int’l Airport Ctrs., LLC v. Citrin,
440 F.3d 418, 420-421 (7th Cir. 2006). In Citrin, Judge Posner determined that when a
contractor breached his duty of loyalty, his authorization to use an employer-provided laptop
ceased because his interests were adverse to the interests of the employer. Id. at 420. Thus, for
the Seventh Circuit, and courts following Citrin, violating the duty of loyalty or acting with
interests adverse to the employer voids the authorization an employee may have to access the
computer. Id. at 421 (citing State v. DiGiulio, 835 P.2d 488, 492 (Ariz. 1992). Plaintiff adopts
this argument and insists that defendant’s authorization ceased when he decided to leave the firm
and join a competing institution.
Defendant, however, urges the Court to follow the Brekka line of cases. In Brekka, the
Ninth Circuit Court of Appeals found that the plain language of the statute should be understood
to mean that when “an employer gives an employee permission to use [a company computer],”
7
the employer is giving that “employee ‘authorization’ to access [it].” Brekka, 581 F.3d at 1133.
Thus, according to Brekka, “for purposes of the CFAA, when an employer authorizes an
employee to use a company computer subject to certain limitations, the employee remains
authorized to use the computer even if the employee violates those limitations.” Id. Only the
employer’s decision “to allow or to terminate an employee’s authorization to access a computer .
. . determines whether the employee is with or ‘without authorization.’” Id. “Exceeds authorized
access” is defined by the statute as “access[ing] a computer with authorization and [using] such
access to obtain or alter information in the computer that the accesser is not entitled so to obtain
or alter.” 18 U.S.C. § 1030(e)(6). The court in Brekka understood this to mean that “for purposes
of the CFAA, when an employer authorizes an employee to use a company computer subject to
certain limitations, the employee remains authorized to use the computer even if the employee
violates those limitations.” Brekka, 581 F.3d at 1133. Thus, according to Brekka, an employer’s
decision to allow or terminate an employee’s authorization is the determining factor as to
whether the employee is with or without authorization. Id.
In this case, there is no dispute that Widder was still an employee of Lewis-Burke when
he allegedly copied certain files to a thumb drive. Plaintiff claims that some of the access
occurred on defendant’s very last day as an employee of plaintiff; however, it still occurred while
he was in the employ of plaintiff, and plaintiff has not alleged to have terminated his
authorization to access the computer before he left its employ. There is an allegation that the
forensic exam demonstrated that certain files were accessed from the thumb drive after Widder
was no longer employed by Lewis-Burke; however, there is no allegation that Widder accessed
his Lewis-Burke computer or the server after his employment with it ended. The CFAA is
8
concerned with access to a computer; Widder’s alleged access to data on a thumb drive would
fall outside of plaintiff’s CFAA claim.
In determining whether Widder exceeded his authorization, I am persuaded by the Brekka
line of cases, which have recently gained critical mass. See, e.g., Nat’l City Bank, N.A. v.
Republic Mortgage Home Loans, LLC, No. 09-CV-1550, 2010 WL 959925, at *2 (W.D. Wash.
Mar. 12, 2010); Bell Aerospace Servs., Inc. v. U.S. Aero Servs., Inc., 690 F. Supp. 2d 1267, 1272
(M.D. Ala. 2010); ReMedPar, Inc. v. AllParts Medical, LLC, 683 F. Supp. 2d 605, 611 (M.D.
Tenn. 2010). In Brekka, the court adopts a statutory interpretation of the CFAA that reflects the
plain reading of the statute. See Brekka, 581 F.3d at 1135. In doing so, the court determines that
“‘authorization’ depends on actions taken by the employer.” Id. Thus, as Brekka notes:
Nothing in the CFAA suggests that a defendant’s liability for
accessing a computer without authorization turns on whether the
defendant breached a state law duty of loyalty to an employer. If
the employer has not rescinded the defendant’s right to use the
computer, the defendant would have no reason to know that
making personal use of the company computer in breach of a state
law fiduciary duty to an employer would constitute a criminal
violation of the CFAA. It would be improper to interpret a
criminal statute in such an unexpected manner. See United States
v. Carr, 513 F.3d 1164, 1168 (9th Cir. 2008).
Brekka, 581 F.3d at 1135.
I believe that the D.C. Circuit, faced with this issue, would rule in a manner consistent
with both the Brekka cases and the plain meaning of the statute. The interpretation proposed by
Citrin would mean that the same employee might have different authorization to access the same
document on the same computer throughout his or her employ. For example, an employee might
9
generate a report during the course of his employment, to which he would have authorized
access. If, as time progressed, the employee began looking for employment elsewhere, and he
accessed the report to refresh his memory as to what he did on the report so that he could better
describe his skills and abilities on his résumé or in an interview, under Citrin, he would have
accessed the report without authorization. Then, if the employee was internally promoted,
decided not to seek outside employment, and accessed the report to provide an example to one of
his new subordinates of how he liked reports written, his interests would again be aligned with
the employer, and his access would be authorized. In the extreme example, the same employee’s
authorization to access a document could concurrently be both with authorization and exceeding
authorization. For example, the employee could have authority to access a report to e-mail it out
for a superior to review, but his authorization might be exceeded if he then also decided to blind
copy his personal e-mail account, so that he would have a copy of the report to use as a writing
sample for a future job search. Congress could not have intended a person’s criminal and civil
liability to be so fluid, turning on whether a person’s interests were adverse to the interests of an
entity authorizing the person’s access. See, e.g., S. Rep. No. 99-432, at 21 (1986), as reprinted in
1986 U.S.C.C.A.N. 2479, 2494-95 (discussing amendment that “remove[d] from the sweep of
the statute one of the murkier grounds of liability, under which [an] employee’s access to
computerized data might be legitimate in some circumstances, but criminal in other (not clearly
distinguishable) circumstances that might be held to exceed his authorization”). Such an
interpretation is not only confusing, but antithetical to the rule of lenity, which forbids the Court
from “‘interpret[ing] a federal criminal statute so as to increase the penalty that it places on an
individual when such an interpretation can be based on no more than a guess as to what Congress
10
intended.’” United States v. Villanueva-Sotelo, 515 F.3d 1234, 1246 (D.C. Cir. 2008) (quoting
Ladner v. United States, 358 U.S. 169, 178 (1958)). The CFAA is primarily a criminal statute,
with a civil cause of action, and a court is bound to interpret the statute consistently; thus, the
rule of lenity must be considered even in its civil application. See Leocal v. Ashcroft, 543 U.S.
1,12 n.8 (2004).
The CFAA was designed primarily to deter computer hacking. See A.V. ex rel.
Vanderhye v. iParadigms, LLC, 562 F.3d 630, 645 (4th Cir. 2009). Whatever Widder is alleged
to have done, he did not hack into the computer or access it without authorization. Further, he
had valid authorization to access the computer, and did not exceed that authorization by
accessing information that Lewis-Widder had indicated he was not entitled to access. See, e.g.,
Brekka, 581 F.3d at 1133. Whether Widder had permission to copy documents onto his thumb
drive or to subsequently use the data from a non-Lewis Burke computer, after he had left its
employ, is not a question that relates to his liability under the CFAA. “‘Exceeds authorized
access’ should not be confused with exceeds authorized use.” Bell Aerospace Servs., Inc., 690 F.
Supp. 2d at 1272-73, (citing Diamond Power Int’l, Inc. v. Davidson, 540 F. Supp. 2d 1322, 1343
(N.D. Ga. 2007)).
I will grant defendant’s motion to dismiss the CFAA claim. Defendant, however, also
seeks to dismiss the entire case, based on lack of subject-matter jurisdiction, arguing that the
Court only has jurisdiction over the other claims via supplemental jurisdiction. Plaintiff counters
that the Court has diversity jurisdiction and has moved to amend the complaint to reflect this. I
now will consider plaintiff’s motion to amend.
11
III. Motion to Amend
Plaintiff’s initial response to defendant’s motion to dismiss was to file a motion to amend
the complaint. See Mot. to Amend. On the eve of trial, plaintiff presumably thought that the
most expeditious way to oppose defendant’s motion to dismiss was to ensure that the Court had
subject-matter jurisdiction by amending its complaint to allege diversity jurisdiction.
Rule 15 of the Federal Rules of Civil Procedure governs the amending and supplementing
of pleadings. See Fed. R. Civ. P. 15. Rule 15(a)(2) allows a party to amend its pleading with the
written consent of the opposing party or the court’s leave, noting that “the court should freely
give leave when justice so requires.” Id. “The decision to grant or deny leave to amend is within
the sound discretion of the trial court, [and] it is an abuse of discretion to deny leave without a
sufficient reason;” however, the liberal standard by which a court may grant leave to amend does
have its limitations. See, e.g., Becker v. District of Columbia, 258 F.R.D. 182, 184-86 (D.D.C.
2009) (citing Dove v. Wash. Metro. Area Transit Auth., 221 F.R.D. 246, 247 (D.D.C. 2004)).
While the Supreme Court has instructed that “the leave to amend shall be ‘freely given,’” it also
provides examples of when such leave may be denied, including undue delay, bad faith or
dilatory motive on the part of the movant, repeated failure to cure deficiencies by amendments
previously allowed, undue prejudice to the opposing party, and futility of amendment. Foman v.
Davis, 371 U.S. 178, 182 (1962); see also Belizan v. Hershon, 434 F.3d 579, 582 (D.C. Cir.
2006). The party opposing the amendment bears the burden of showing why leave should not be
granted. Becker, 258 F.R.D. at 184 (citing Dove, 221 F.R.D. at 247)).
Defendant asserts that the motion should be denied because: (1) the amendment would be
12
futile; (2) the amount in controversy is insufficient to trigger the Court’s jurisdiction; and (3)
denying the motion would allow for “an orderly exploration of the jurisdictional issue” raised by
defendant. Defendant’s Opposition to Motion to Amend Complaint [#43] (“Def. Opp. to
Amend”) at 2-11. The third point is moot, as I have explored above the jurisdictional issue
raised by defendant. Thus, I will consider the first two points.
Defendant claims that the amendment would be futile. While a court may deny a motion
to amend on the grounds of futility,2 it may do so only “if the proposed claim would not survive a
motion to dismiss.” James Madison Ltd. by Hecht v. Ludwig, 82 F.3d 1085, 1099 (D.C. Cir.
1996) (citing Foman, 371 U.S. at 181-82; Moldea v. New York Times, 22 F.3d 310, 319 (D.C.
Cir.), cert. denied, 513 U.S. 875 (1994)). Defendant attacks plaintiff’s claim of diversity
jurisdiction on two fronts: (1) plaintiff’s amended complaint alleges diversity as of the date of the
amendment, and not at the time the action commenced, requiring the Court to draw an inference;
and (2) “the Second Amended Complaint [does] not rule out the possibility that the LLC had
other ‘members’ of unknown citizenship at the time the case was filed.” Def. Opp. to Amend 3.
Defendant argues that “the federal pleading standard . . . is not so flexible as to allow plaintiff to
demand the [C]ourt’s acceptance of all possible inferences,”3 but then he asks the Court to infer
that the parties’ citizenship at the time of the motion to amend was different than it was when the
complaint was filed, without providing any indication, other than speculation, as to why.
The standard of finding futility is whether or not the amendment would survive a motion
2
Foman v. Davis, 371 U.S. at 182.
3
Def. Opp. to Amend 4 (citing Iqbal, 129 S. Ct. 1937 (2009); Twombly, 550 U.S. 544
(2007)).
13
to dismiss. James Madison Ltd. by Hecht, 82 F.3d at 1099. When considering a Rule 12(b)(1)
motion to dismiss, a court may consider materials outside of the pleadings. Lipsman v. Sec’y of
Army, 257 F. Supp. 2d 3, 6 (D.D.C. 2003) (citing Herbert v. Nat’l Acad. of Scis., 974 F.2d 192,
197 (D.C. Cir. 1992)). Plaintiff’s reply brief in support of its motion to amend includes a
declaration by April L. Burke, which clearly states that Burke is both the sole member of Lewis-
Burke and has continuously resided in Virginia. Plaintiff’s Reply Memorandum in Support of Its
Motion to Amend Complaint [#48] at Ex. A. Widder admits to residing in Maryland. See
Answer to Plaintiff’s First Amended Complaint [#25] at ¶ 2. In light of this, I cannot find that
plaintiff’s proposed amendment would be futile.
Defendant also claims that plaintiff’s claim of $75,000 is a bald assertion and that
“plaintiff fails to make any allegations that allow the [C]ourt to assess the validity of the claim
that the amount in controversy exceeds $75,000.” Def. Opp. to Amend 4. Plaintiff’s proposed
Second Amended Complaint does allege that the amount in controversy exceeds $75,000. See
Mot. to Amend, Ex. 1 at ¶ 3. Nevertheless, defendant wants the Court to deny plaintiff’s motion
to amend and refer to its damage calculations as fanciful. Mot. to Amend 5. A court should be
“very confident that a party cannot recover the jurisdictional amount before dismissing the case
for want of jurisdiction.” Rosenboro v. Kim, 994 F.2d 13, 17 (D.C. Cir. 1993). In the parties’
joint pretrial statement, plaintiff claims to have calculated damages to be $834,213. See Joint
Pretrial Statement [#35] at 16. Defendant characterizes these calculations as “beyond
speculation” and “into the realm of fantasy,” however, the Court may dismiss the case (or deny a
motion to amend), if “from the face of the pleadings, it is apparent, to a legal certainty, that the
plaintiff cannot recover the amount claimed . . .” Rosenboro, 994 F.2d at 17. It is not apparent
14
from the face of the pleadings, “to a legal certainty,” that plaintiff cannot recover in excess of
$75,000. I will grant plaintiff’s motion to amend.
III. Motion In Limine
Plaintiff seeks to exclude from trial: (1) evidence of communications in September and
October 2008 between April Burke of Lewis-Burke and Andrew Givens of Public Broadcasting
Service (“PBS”), a client of Lewis-Burke, regarding Widder’s departure and Lewis-Burke’s work
for PBS; and (2) “any defense by Widder at trial that a putative change in his compensation at
Lewis-Burke somehow excuses his breach of his Non-Competition and Confidentiality
Agreement with Lewis-Burke (‘Non-Compete’).” Memorandum of Points and Authorities in
Support of Plaintiff’s Motion In Limine [#32] (“Memo. to Mot. in limine”) at 1.
A. Introduction of E-mail Communications between Burke and Givens
Plaintiff seeks to exclude evidence of the communications between Burke and Givens.
Specifically, plaintiff argues that DEX #1, a series of e-mail exchanges between Burke and
Givens, should be excluded on the following grounds: (1) that defendant failed to assert waiver
as an affirmative defense in his original answer or in his answer to plaintiff’s amended
complaint; (2) that the defense is futile, irrelevant, and predicated on inadmissible hearsay; and
(3) that its admission would be unduly prejudicial. Id. at 2. Defendant claims that it will call
Givens to testify at trial, and that his testimony will “show that plaintiff failed to show certain
elements of its prima facie case.” Defendant’s Opposition to Motion In Limine [#34] (“Def. Opp.
Mot. in limine”) at 1-2. Thus, according to defendant, the evidence does not implicate an
affirmative defense. Id.
While motions in limine can be useful, on occasion, they can create confusion because it
15
is impossible to predict confidently the exact flow and significance of the evidence elicited at
trial. It may be helpful to clear some brush away to expose what really is at stake.
An e-mail exchange between Burke and Givens is Exhibit 1 to Plaintiff’s motion. See Pl.
Mot. In Limine at Ex. 1. In the opening e-mail, dated March 24, 2008, Burke indicates to Givens
that she has the “distinct feeling” that Givens knows that defendant, Joel Widder, is leaving
plaintiff’s employ to go to work for what Burke calls “the National Group/Oldecker law firm.”
Id. She notes that since this entity consists of “guys [who] are [Given’s] close buddies from the
Hill” [i.e. Capitol Hill], she thinks that she can predict that PBS will be terminating its
relationship with Lewis-Burke. Id.
There must have been an intervening phone call, because Givens refers to it and indicates
that it was “concerning” the departure of Joel Widder from Lewis-Burke. Id. Givens then
indicates that it is his understanding that “pursuant to Section 6 of our contract [i.e., between
PBS and Lewis-Burke] we have concluded our relationship in a very amicable and professional
manner.” Id. Givens then conveys his belief that PBS is current on all of its outstanding balances
and thanks Lewis-Burke’s for all of its work on behalf of PBS. Burke then replies, within three
minutes, that all of PBS’s payments are current. Id.
First, Givens’s e-mail is hearsay insofar as it is offered for the truth of its contents.
Burke’s e-mails are not hearsay because they are statements of a party or of the representative of
a party. Fed. R. Evid. 801(d)(2).
Second, the relevance of Givens’s e-mail is questionable. There is nothing in it from
which a reasonable person could deduce that Burke was excusing or condoning any violation of
Widder’s contractual obligation to Lewis-Burke to neither solicit business from Lewis-Burke’s
16
clients nor work for them after he left Lewis-Burke’s employ. I appreciate that during his
deposition Widder seemed to suggest that, although he never spoke to Burke, he somehow
deduced from his conversations with Givens that his working for PBS had been excused by
Burke in her conversations with Givens. But, clearly, what Givens may have told plaintiff is
hearsay and Widder cannot testify to it.
B. Givens’s Testimony
Widder adjures any reliance on out of court statements by Givens but plans to call him as
a witness to establish that the departure of PBS from Lewis-Burke was not caused by Widder’s
departure and would have happened in any event. But, Widder ignores that the only evidence I
presently have is Burke’s e-mail of September 24, 2008 in which she directly attributes the loss
of the PBS business to Widder’s departure from Lewis-Burke, a statement perfectly consistent
with a claim that Widder’s departure caused the loss of the PBS business.
I emphasize that I am speaking only of the information I presently have. I do not know as
much as I want to know about any conversations between Burke and Givens, or any other PBS
representative, about the how, why, and ultimate effect of Widder’s departure upon the
termination of the relationship between PBS and Lewis-Burke. Subject to an additional
discussion at the pre-trial conference and to a possible voir dire of the pertinent witnesses as to
this question, out of the hearing of the jury, I will defer ruling on the relevance of the potential
testimony I have summarized.
I should note in this context that I certainly appreciate Lewis-Burke’s point that Widder
violates the covenant by either soliciting PBS’s business or working for PBS while employed by
any one other than Lewis-Burke. Thus, how Widder’s new firm got PBS’s business may be
17
irrelevant, if Lewis-Burke presses only its contention that Widder’s working for PBS was the
violation of the covenant.
C. Evidence Regarding Changes in Widder’s Compensation
Another issue raised in plaintiff’s motion in limine is the question of the relevance of any
testimony from Widder about a diminution of his expected compensation and its relation to any
alleged breach of his covenant not to compete. As Lewis-Burke correctly points out, the
covenant not to compete is, by its stated terms, an integrated agreement. There is not a word in it
about plaintiff’s compensation that could be interpreted to mean that his compensation and the
covenant not to compete were mutual obligations in that one was given in consideration of the
other. Accordingly, any testimony about his compensation is irrelevant.
IV. Conclusion
For the reasons stated herein, defendant’s motion to dismiss plaintiff’s CFAA claim will
be granted. Plaintiff’s motion to amend will also be granted. Defendant’s motion to dismiss the
case for lack of subject matter jurisdiction will be denied. Plaintiff’s motion in limine will be
denied in part and granted in part. A status conference and evidentiary hearing in this case will
be set in a separate order. The parties should be prepared at the status conference to set a trial
date in early October 2010.
A separate order accompanies this memorandum opinion.
Digitally signed by
John M. Facciola
Date: 2010.07.28
10:00:21 -04'00'
JOHN M. FACCIOLA
UNITED STATES MAGISTRATE JUDGE
18