Innosys, Inc. v. Mercer

This opinion is subject to revision before final publication in the Pacific Reporter. 2015 UT 80 IN THE SUPREME COURT OF THE STATE OF UTAH ——————— INNOSYS, INC., Appellant, v. AMANDA MERCER, Appellee. ——————— No. 20110261 Filed August 28, 2015 ——————— Third District, West Jordan Dep‘t The Honorable Robert Adkins No. 090421501 ——————— Attorneys: Daniel L. Day, Sandy, Erik A. Olson, Salt Lake City, for appellant Kathleen M. McConkie, Michelle R. O‘Neil, Bountiful, Sara Pfrommer, Park City, for appellee ——————— ASSOCIATE CHIEF JUSTICE LEE authored the opinion of the Court, in which CHIEF JUSTICE DURRANT, and JUSTICE HIMONAS joined. JUSTICE DURHAM filed a dissenting opinion, in which JUSTICE PARRISH joined. ——————— ASSOCIATE CHIEF JUSTICE LEE, opinion of the Court: ¶1 This is an appeal from a decision granting summary judg- ment to Amanda Mercer in a suit filed against her by InnoSys, Inc. Mercer worked for InnoSys, a technology company focusing on the defense industry, as an engineer. In its suit against her, InnoSys alleged that Mercer had violated a non-disclosure agree- ment and misappropriated company trade secrets. Mercer‘s dis- closures and misappropriations were undisputed. During and af- ter her employment with InnoSys, Mercer forwarded confidential INNOSYS v. MERCER Opinion of the Court emails to her private Gmail account, copied a confidential busi- ness plan to a thumb drive, and placed protected information on the record in an administrative (unemployment) proceeding. ¶2 Despite these admitted disclosures, the district court grant- ed summary judgment for Mercer. It did so on the basis of its de- termination that InnoSys had failed to make an adequate showing of harm. And in granting summary judgment, the district court entered rule 11 sanctions against InnoSys and awarded attorney fees to Mercer under Utah Code section 78B-5-825. ¶3 We reverse. Mercer‘s disclosures at least arguably sustain a presumption of harm to InnoSys—a presumption that stands un- rebutted on the summary judgment record before us on appeal. Genuine issues of material fact regarding the risk of future disclo- sures also preclude summary judgment on InnoSys‘s claims. We accordingly reverse the decisions before us on appeal, including the decision entering rule 11 sanctions and awarding attorney fees to Mercer. I ¶4 In January of 2008, immediately following Amanda Mer- cer‘s graduation from the University of Utah, InnoSys hired her as an engineer. Per its standard practice, InnoSys had Mercer sign a non-disclosure agreement (NDA). By signing, Mercer promised not to ―copy, transmit, reproduce, summarize, quote or make any commercial or other use of any Protected Information, except for the benefit of [InnoSys].‖ She also agreed, upon termination, to ―return to [InnoSys] all items and material in [Mercer‘s] posses- sion or control which contain any Protected Information.‖ And she acknowledged that ―it may be impossible to measure in mon- ey the damage to [InnoSys] resulting from [a] breach [of the NDA],‖ and thus agreed that ―in the event of any such violation or threatened violation, [InnoSys] shall be entitled to an injunc- tion . . . to minimize or prevent damage to [InnoSys].‖1 1 The facts as stated here are in the light most favorable to InnoSys, the non-moving party. See, e.g., USA Power, LLC v. Pacifi- Corp, 2010 UT 31, ¶ 65, 235 P.3d 749. 2 Cite as: 2015 UT 80 Opinion of the Court ¶5 In time InnoSys became dissatisfied with Mercer‘s job per- formance. It accordingly fired her. Mercer later filed a claim for unemployment benefits with the Department of Workforce Ser- vices. That claim was initially denied by DWS. When Mercer ap- pealed, she submitted a number of protected documents— protected emails and a confidential business plan—into the ad- ministrative record. ¶6 InnoSys was displeased. At a subsequent hearing, it assert- ed that Mercer‘s possession and disclosure of the emails and busi- ness plan constituted a breach of the non-disclosure agreement and threatened an ―injur[y] [to] the company.‖ In light of this con- cern, InnoSys‘s counsel pressed Mercer for details as to when and how she gained access to the protected material. In response, Mercer insisted that she ―[had] permission from the IT depart- ment‖ to forward confidential InnoSys emails to a personal Gmail account. And, when asked why she didn‘t ―leave‖ the confidential business plan with InnoSys at the time of her termination, Mercer asserted that she ―didn‘t have it with [her]‖ at the time, indicating that she left it ―[a]t home‖ because she ―was asked to review it‖ previously and had been working on it at home over the weekend before she was fired. ¶7 The day after the hearing, Mercer—on the advice and in the presence of her sister and then-attorney—deleted all ―emails‖ and ―files‖ containing information about InnoSys. She then sent InnoSys a fax informing it of her actions. According to an affidavit from InnoSys, InnoSys‘s counsel made the decision to sue Mercer that same day and began drafting the complaint just three days later. A little less than two weeks after receiving Mercer‘s fax, InnoSys sent Mercer a demand letter informing her that, in InnoSys‘s view, she had spoliated evidence and should recover and return all protected information in her possession. ¶8 InnoSys then filed this suit. Its complaint asserted claims for breach of contract, misappropriation of trade secrets under the Uniform Trade Secrets Act (UTSA), and breach of fiduciary duty. Mercer subsequently filed a motion to dismiss (later converted to a motion for summary judgment), asserting that InnoSys‘s claims failed in light of its failure to establish any actual or threatened harm. 3 INNOSYS v. MERCER Opinion of the Court ¶9 The district court granted Mercer‘s summary judgment motion in full. It also entered rule 11 sanctions against Innosys and awarded Mercer attorney fees. But the path to those decisions was a bit convoluted—involving a ―conditional‖ ruling from the district court, a first round of limited discovery by the parties, a first motion to reconsider, a rule 11 hearing, two more motions to reconsider, three reassignments of the case (from the original judge to a second judge, back to the original judge, and then to a third judge), a second round of limited discovery, and a motion for attorney fees. We recount the relevant details of that proce- dural history below. ¶10 During the first round of discovery, Mercer changed her story regarding the use of her Gmail account and the timing of her acquisition of the confidential business plan. InnoSys‘s IT chief, Christopher Strong, submitted a declaration in which he stated he ―did not instruct Ms. Mercer to use Gmail‖ and never ―help[ed] her set up Gmail in any way.‖ He reiterated this point in his dep- osition, stating that he could not recall ever having instructed Mercer on how she could forward her emails to her Gmail ac- count. In response to a request for admission, Mercer then admit- ted ―Chris Strong did not give permission to transfer InnoSys e- mail to her g-mail account,‖ and that no particular person ―gave her ‗permission‘‖ to forward her emails. She maintained however, that Strong ―failed to tell her not to transfer emails when she told him her intention and he even went so far as to provide direction as to how she could establish the connection.‖ ¶11 As to the business plan, Mercer testified in her deposition that she had received an email asking her to review the plan the day before her termination. But she said she was unable to access it via InnoSys‘s secure remote network. Thus, Mercer also changed her story regarding the business plan. She admitted that she did not have the business plan in her possession at home the day before she was fired, but instead copied it on the day of her termination. And when pressed on why her story had changed, Mercer responded that she felt InnoSys was ―pressuring [her]‖ at the earlier DWS hearing. ¶12 This discovery was followed by additional briefing and a hearing in the district court. At the hearing, the court ―condition- ally‖ dismissed InnoSys‘s UTSA, breach of contract, and breach of 4 Cite as: 2015 UT 80 Opinion of the Court fiduciary duty claims. The dismissal was with prejudice, but ―condition[ed]‖ on the outcome of further forensic discovery.2 The court also expressed its concerns that InnoSys had yet to produce a copy of the NDA signed by Mercer. ¶13 InnoSys then proceeded with a preliminary forensic analy- sis of Mercer‘s email accounts and her thumb drive. Its expert concluded that Mercer‘s deletion of the ―sent‖ and ―trash‖ folders in her Gmail account prevented anyone from determining ―what particular emails she copied from her InnoSys account to her Gmail accounts and when,‖ ―what InnoSys related documents or emails were sent from this Gmail account to other email accounts or to third parties and when,‖ and which ―sent or received items were deleted‖ and when they were deleted. The expert also con- cluded that at some point prior to April 21, 2010, Mercer per- formed a data wipe on the thumb drive. According to the expert, this deleted all data and made it ―impossible to determine from the drive itself when the data wipe occurred.‖ Finally, the expert concluded that someone had reformatted the thumb drive, that this was a ―destructive act,‖ and that it had occurred either on or prior to April 21, 2010. ¶14 The parties then returned to the district court on two mo- tions by InnoSys—one to reconsider, and another seeking spolia- tion sanctions against Mercer. The district court rejected the spoli- ation claim and confirmed the dismissal of InnoSys‘s claims. First, the district court concluded that InnoSys‘s claims all hinged on the existence of an actual NDA signed by Mercer, which InnoSys had not yet located and thus had not produced. And, in response to InnoSys‘s proposal to submit a copy of a sample agreement evi- dencing the NDA Mercer would have signed, the court suggested that such a document would be barred by the best evidence rule, while also noting a concern that the sample agreement may have been ―altered.‖ 2 We are aware of no basis in our civil rules for a conditional dis- missal of this nature. But the district court styled its order in this way, and no party raised any objection (in the district court or on appeal). So we do not resolve the matter. 5 INNOSYS v. MERCER Opinion of the Court ¶15 Second, the district court also reinforced its conditional rul- ing on the merits of InnoSys‘s claims. It held that InnoSys had failed to produce evidence of actual or threatened harm and thus that there was ―no genuine issue as to any material fact‖ and Mer- cer was ―entitled to judgment as a matter of law.‖ Finally, the dis- trict court ruled that Mercer ―neither knew nor should have known that there was anticipated litigation at the time she deleted the electronic information‖ at issue, and that her actions were a ―good-faith attempt to appease InnoSys.‖ On that basis, the dis- trict court rejected InnoSys‘s claim of spoliation. ¶16 At about this same time Mercer also filed a rule 11 motion. The district court granted the motion. It based its decision on sev- eral factors: (1) the missing NDA, (2) InnoSys‘s alleged repeated assurances that it actually had the NDA, (3) the alleged ―doc- tored‖ nature of the replacement NDA, (4) InnoSys‘s alleged retal- iatory motives for filing suit, and (5) the fact that InnoSys could not prove actual or threatened harm. ¶17 InnoSys then filed a petition for interlocutory review. That petition was denied. At that point the case was reassigned to a new judge. InnoSys then filed a second motion to reconsider—a motion it withdrew in part when the case was later returned to the original judge. Then the case was again reassigned to yet an- other new judge. That judge allowed forty-five days of additional discovery. InnoSys chose not to pursue any further discovery. But at about this time it did finally locate Mercer‘s signed NDA. And it then filed its third motion to reconsider. Mercer then filed a mo- tion for an award of attorney fees. ¶18 The district court again ruled against InnoSys and in favor of Mercer. It concluded that the discovery of the NDA changed nothing, since ―there was no objectively reasonable basis to be- lieve that Mercer had harmed InnoSys or was threatening to do so.‖ And it upheld the rule 11 sanctions on the ground that InnoSys had repeatedly implied that it possessed a signed copy of Mercer‘s NDA. As to spoliation, the district court reiterated its earlier conclusion that Mercer had no duty to preserve documents because she had no way of knowing of threatened litigation at the relevant time. 6 Cite as: 2015 UT 80 Opinion of the Court ¶19 The district court also granted Mercer‘s motion for fees un- der Utah Code section 78B-5-825 (authorizing an award of fees to a ―prevailing party‖ if the court finds the losing claims were ―without merit‖ and not brought ―in good faith‖), awarding a sum of $229,481.58. In so doing it cited InnoSys‘s ―hast[y]‖ deci- sion to sue prior to locating her NDA as evidence of the ―retaliato- ry nature of the lawsuit‖ and hence InnoSys‘s ―demonstrable‖ lack of ―good faith.‖ The court then interpreted the NDA in a manner sustaining an award of all of Mercer‘s fees (rather than an amount apportioned to the claims deemed frivolous under Utah Code section 78B-5-825). ¶20 InnoSys filed this appeal. We initially heard oral argument in May of 2013. Then, when we were unable to reach a decision prior to the retirement of Justice Ronald E. Nehring (who sat on the panel that heard the initial appeal), we reheard the case on March 4, 2015. Our review of a decision on summary judgment is de novo. Bahr v. Imus, 2011 UT 19, ¶¶ 12–18, 250 P.3d 56. II ¶21 Some of the key facts in this case are undisputed. As a threshold matter, it is undisputed that InnoSys eventually found and produced the NDA signed by Mercer—a development elimi- nating one of the grounds for the district court‘s entry of sum- mary judgment and for sanctioning and awarding fees against InnoSys.3 There is likewise no dispute, at least with respect to Mercer‘s summary judgment motion, that Mercer misappropriat- ed material belonging to InnoSys that is protected under the Uni- 3 That ground was already questionable under our evidentiary rule allowing secondary evidence to replace best evidence when ―all the originals are lost or destroyed, and not by the proponent acting in bad faith.‖ UTAH R. EVID. 1004. From all that appears, there were at least genuine issues of fact as to whether InnoSys‘s inability to find the lost NDA was a result of any sort of ―bad faith.‖ That seems unlikely, as it was in its interest to locate and produce the document. But we need not address that issue in de- tail here, as InnoSys‘s discovery of the original NDA mooted the district court‘s concerns regarding ―best evidence.‖ 7 INNOSYS v. MERCER Opinion of the Court form Trade Secrets Act and under the NDA. The core remaining question on the merits of InnoSys‘s claims concerns the question of its evidence of harm. InnoSys‘s purported failure to present such proof formed the basis of the district court‘s decision below. ¶22 According to the district court, Mercer‘s ―use of the InnoSys emails at the unemployment hearing . . . did no damage to InnoSys and did not create any threatened harm.‖ The district court raised the same concern regarding Mercer‘s use of the con- fidential business plan and her use of a private Gmail account. Mercer echoes these same points on this appeal. She contends that InnoSys failed to produce ―evidence of any damages suffered as a result of the alleged wrongdoings by Mercer.‖4 ¶23 We reverse. We find sufficient evidence of threatened harm—or at least genuine issues of material fact concerning such harm—to defeat Mercer‘s motion. First, we conclude that InnoSys 4 The dissent seeks to distinguish InnoSys‘s ―damages claims‖ from its ―claims for injunctive relief,‖ see infra ¶ 65 and concludes that evidence of actual economic harm was required to sustain the former, while the latter fails absent proof of a threat of future harm, infra ¶¶ 66–70 (economic harm), 71–73 (future harm). But the case was neither pleaded nor argued in the manner formulat- ed by the dissent. InnoSys never asserted separate ―claims‖ for damages or injunctive relief. It simply pleaded claims for misap- propriation of trade secrets and for breach of the NDA. The fact that its prayer for relief sought both damages and an injunction did not create two separate sets of claims, only two requested remedies. So the lack of proof of economic harm is beside the point on this motion before us on appeal. If InnoSys has a viable basis for injunctive relief on its claims for misappropriation and for breach of contract—as we conclude it does for reasons ex- plained below—then the fact that the record as it now stands may not sustain a damages award is beside the point. Thus, the dissent errs in arguing for ―summary judgment as to InnoSys‘s damages claims,‖ infra ¶ 69, as the case as pleaded and argued does not concern ―damages claims.‖ Mercer never sought ―partial summary judgment‖ on such claims, infra ¶ 70, and we are accordingly in no position to award it. 8 Cite as: 2015 UT 80 Opinion of the Court has asserted a prima facie case of misappropriation of trade se- crets under the UTSA, and hold that such a showing at least argu- ably sustains a presumption of irreparable harm. Second, we deem that presumption—along with affirmative evidence of threatened harm—to also sustain a prima facie case of breach of the NDA. Third, for these and other reasons, we reverse summary judgment on Innosys‘s breach of fiduciary duty claim. And final- ly, we reverse the entry of rule 11 sanctions and attorney fees against InnoSys. A. Misappropriation Under the UTSA ¶24 Under our Uniform Trade Secret Act, a prima facie case of misappropriation is established on the basis of two essential ele- ments: existence of a protectable ―trade secret‖ of a plaintiff and demonstration of ―misappropriation‖ by a defendant. UTAH CODE § 13-24-2. These elements are at least arguably established under the undisputed facts of this case.5 ¶25 First, InnoSys appears to have established the existence of protectable trade secrets in its business plan and other confiden- tial information. It is undisputed that such materials (a) ―derive[] independent economic value . . . from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from [their] disclosure or use,‖ and (b) are ―the subject of efforts that are reasonable under the circumstances to maintain [their] secrecy.‖ Id. § 13-24-2(4). 5 In so concluding, we do not rule that InnoSys is entitled to summary judgment, as it made no such motion and that question is accordingly not before us on this appeal. But the question of Mercer‘s right to summary judgment encompasses more than just the issue whether there are genuine issues of material fact. In as- sessing Mercer‘s motion, we must also decide whether she is enti- tled to judgment as a matter of law. UTAH R. CIV. P. 56(c). We re- solve that question, at least in part, on the basis of our determina- tion that InnoSys has arguably made a prima facie showing of in- fringement under the UTSA and breach of the NDA, which show- ing sustains a presumption of irreparable harm. 9 INNOSYS v. MERCER Opinion of the Court ¶26 Second, misappropriation was also evident on the sum- mary judgment record. Under the Utah statute, misappropriation may be established upon proof of either unlawful disclosure or unlawful acquisition. Id. § 13-24-2(2)(a), (b). The record includes undisputed evidence of both. ¶27 It was undisputed that Mercer disclosed the InnoSys trade secrets by forwarding them from the secure company computer system to her unsecure Gmail account and by filing them with the DWS. This at least arguably amounts to misappropriation by un- lawful disclosure under Utah Code section 13-24-2(2)(b). The def- inition of ―misappropriation‖ under this provision encompasses ―disclosure . . . of a trade secret of another without express or im- plied consent by a person who . . . knew or had reason to know that his knowledge of the trade secret was . . . acquired under cir- cumstances giving rise to a duty to maintain its secrecy or limit its use.‖ Id. § 13-24-2(2)(b). Mercer at least arguably disclosed InnoSys‘s trade secrets to Google and to the DWS without InnoSys‘s consent. And she did so even though she knew or should have known that she had a duty to maintain the secrecy of that information. ¶28 Alternatively, there was also evidence of misappropriation by unlawful acquisition under Utah Code section 13-24-2(2)(a). This subsection defines misappropriation as ―acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means.‖ Id. § 13-24-2(2)(a). Mercer at least arguably violated this subsection by copying a confidential InnoSys business plan onto a thumb drive under suspicious circumstances on the day of her termination. Ini- tially, Mercer claimed that her acquisition of the business plan was legitimate and proper—that she had simply taken it home with her to review in the ordinary course of her employment. But she eventually recanted that assertion, admitting that she had cop- ied it onto a thumb drive on the day she was terminated. And she never provided any explanation for why she took the thumb drive home (after having been fired) and never returned the infor- mation. That is further evidence of misappropriation—at least enough evidence to establish a genuine issue of material fact as to Mercer‘s acquisition of the business plan by ―improper means.‖ See Id. § 13-24-2(1) (defining ―[i]mproper means‖ as ―theft, brib- 10 Cite as: 2015 UT 80 Opinion of the Court ery, misrepresentation, breach or inducement of a breach of a du- ty to maintain secrecy, or espionage through electronic or other means‖). ¶29 The district court effectively acknowledged InnoSys‘s proof of misappropriation in its disposition of Mercer‘s motion for summary judgment. Instead of finding a lack of unlawful disclo- sure or acquisition, the district court found that ―[a]ny and all dis- closures regarding InnoSys made by Defendant whether verbal or in the form of emails, specifically to Workforce Services; to the Administrative Law Judge; and to defendant‘s attorneys were nec- essary and appropriate in dealing with the issue of unemployment com- pensation.‖ (emphasis added) Yet that conclusion only underscores the strength of InnoSys‘s claim. The UTSA states no basis for a ―necessary and appropriate‖ defense to the unauthorized disclo- sure of a trade secret. And absent such basis, we cannot conclude that Mercer is entitled to judgment as a matter of law; InnoSys has at least arguably established a prima facie case of misappropria- tion. ¶30 Mercer‘s only challenge to this point on appeal is her vague assertion that she was entitled as an InnoSys employee ―to com- plete the work she was hired to perform,‖ and that she therefore ―never obtained a trade secret by improper means.‖ But as noted above, misappropriation may be established under subsection (2)(b) upon proof of unauthorized disclosure or use, without proof of acquisition by improper means. See id. § 13-24-2(2)(b)(ii)(B) (de- fining misappropriation as ―disclosure or use of a trade secret of another without express or implied consent by a person who . . . knew or had reason to know that his knowledge of the trade se- cret was . . . acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use‖). The undisputed evidence shows that Mercer copied protected trade secrets onto her person- al email account and thumb drive, allowing her to take those se- crets with her after her employment ended. And she did so de- spite having signed a non-disclosure agreement, showing that she owed a duty to InnoSys to maintain the secrecy of those trade se- crets and limit their use. These facts easily satisfy the statutory standard when viewed in the light most favorable to InnoSys on summary judgment. 11 INNOSYS v. MERCER Opinion of the Court ¶31 In any event, as also noted above, there is evidence of mis- appropriation by Mercer in the form of acquisition by ―improper means‖ under sub-section (2)(a). The evidence under this sub- section focuses on the suspicious circumstances of Mercer‘s copy- ing of the confidential business plan onto a thumb drive on the day of her termination. When viewed in the light most favorable to InnoSys as the non-moving party, the record indicates that there is at least a genuine issue of material fact as to whether Mer- cer‘s appropriation of the business plan amounted to ―theft,‖ ―breach of a duty to maintain secrecy,‖ or ―espionage through electronic or other means.‖ Id. § 13-24-2(1).6 ¶32 The above facts are at least arguably sufficient to sustain a prima facie case of misappropriation under the UTSA. And these same facts are sufficient to allow InnoSys to withstand Mercer‘s motion for summary judgment. First, under well-settled princi- ples of trade secret law, InnoSys‘s prima facie case gives rise to a rebuttable presumption of irreparable harm. Second, despite some contrary arguments raised by the dissent, the presumption has not been rebutted by Mercer on the record before us on summary judgment. We reverse summary judgment on that basis. 1. The Presumption of Irreparable Harm ¶33 A trade secret is a right of property.7 Such rights are pro- tected by a legal presumption of harm.8 Thus, a trespass on a right 6 It is black letter law that ―[a]n appellate court . . . . views the facts and all reasonable inferences drawn therefrom in the light most favorable to the nonmoving party.‖ R & R Indus. Park, L.L.C. v. Utah Prop. & Cas. Ins. Guar. Ass’n, 2008 UT 80, ¶ 18, 199 P.3d 917 (internal quotation marks omitted). Yet the dissent declares that ―inconsistencies in Ms. Mercer‘s testimony are susceptible to an innocent explanation,‖ and theorizes alternative ―innocent‖ rea- sons for Mercer‘s behavior. Infra ¶ 93. This theorizing is incompat- ible with our summary judgment standard. 7 Microbiological Research Corp. v. Muna, 625 P.2d 690, 696 (Utah 1981) (―A trade secret . . . is under the majority view held to be property, with power in the owner thereof to make use of it to the exclusion of the world or to deal with it as he pleases. As a prop- (continued…) 12 Cite as: 2015 UT 80 Opinion of the Court of property is actionable upon any physical invasion of it, regard- less of whether the invasion causes measurable damage.9 The pre- sumption of harm flows from the very nature of a property right, which at its core is a right to exclude others.10 With this in mind, the law presumes that the infringement of a property right is erty right, the trade secret is protected against its appropriation or use without the consent of the owner.‖ (footnote omitted)). 8 RESTATEMENT (SECOND) OF TORTS § 158 (1965) (a trespasser is ―subject to liability . . . irrespective of whether he thereby causes harm to any legally protected interest of the other‖); 8 DAVID A. THOMAS, THOMPSON ON REAL PROPERTY § 68.01(2d ed. 2005) (―[A] trespass is actionable when any physical invasion at all can be proved, no matter how slight or inconsequential.‖); 8 RICHARD R. POWELL, POWELL ON REAL PROPERTY § P6.07[1] (2015) (―Trespass . . . is actionable even if no damage actually occurs as a result of the entry.‖); see also Purkey v. Roberts, 2012 UT App 241, ¶ 19, 285 P.3d 1242 (neighbor who built a fence on adjoining property was liable for trespass ―irrespective of whether [his neighbors] suffered any harm other than to their legally protected interest‖). 9 POWELL, supra 8, § P6.07[5][b]; THOMPSON, supra 8, § 68.06(d)(2). 10 Alliant Techsystems, Inc. v. Salt Lake Cnty. Bd. of Equalization, 2012 UT 4, ¶ 23, 270 P.3d 441 (―[I]t is well recognized that an own- er traditionally has rights to use and possess property to the ex- clusion of others.‖). The legally protectable interests of an owner of property encompass the right of exclusion, and the law pre- sumes that an infringement of that right is inherently harmful. RESTATEMENT (SECOND) OF TORTS § 163, cmt. d (―The wrong for which a remedy is given . . . consists of an interference with the possessor‘s interest in excluding others from the land.‖); 1 DAN B. DOBBS, ET AL., THE LAW OF TORTS § 49 (2d ed. 2011) (―The gist of the tort [of trespass] is intentional interference with rights of ex- clusive possession; no other harm is required.‖); W. PAGE KEETON, ET AL., PROSSER AND KEETON ON THE LAW OF TORTS § 13 (5th ed. 1984) (action of trespass, at bottom, is ―[a]n interference with [the] exclusive possessory interest‖). 13 INNOSYS v. MERCER Opinion of the Court harmful, and sustains a remedy of an injunction to vindicate that right and prevent future harm.11 ¶34 The property right in a trade secret partakes of these ele- ments. A long-settled principle of trade secret law recognizes a presumption of harm upon proof of misappropriation. ―Over the years, courts have often ruled that a trade secret claimant is enti- tled to a rebuttable presumption of irreparable harm for the pur- poses of injunctive relief . . . .‖ 4 ROBERT M. MILGRIM & ERIC E. BENSEN, MILGRIM ON TRADE SECRETS § 15.02[1][c] (2013) (citing ex- tensive cases).12 The basis of this presumption is the difficulty of measuring the extent of actual economic injury. The courts have acknowledged that ―it is axiomatic that unprotected disclosure of a trade secret destroys the secret and [that] it is self-evident that unauthorized use of a trade secret ordinarily enlarges the risk of unauthorized disclosure.‖ Id. And they have consistently noted that the impact on the value of a trade secret ―often will not be readily compensable in damages because of the difficulties in- volved in valuing the consequences of the destruction of a trade secret.‖ Id. These concerns combine to sustain the basis for a pre- sumption of irreparable harm, and a right under the UTSA to the 11 DOBBS, supra 10, § 56 (―Courts will issue injunctions to prevent trespasses that threaten to continue or to be repeated.‖); POWELL, supra 8, § P6.07[5][b] (“The nature of the tort of trespass indicates that it may be continuous or repeated or threatened to be repeat- ed. Injunctive relief is appropriate in any of these cases.‖). 12 See also 2 RUDOLF CALLMANN, CALLMANN ON UNFAIR COMPETITION, TRADEMARKS AND MONOPOLIES § 14:39 (4th ed. 2015) (explaining that ―[a] remedy at law normally is inadequate‖ in cases of trade secret misappropriation, and noting that ―an injunc- tion is a proper response of equity‖); 4 DAN B. DOBBS, ET AL., THE LAW OF TORTS , § 739 (―[W]here future revelation is threatened, the owner may frequently obtain an injunction.‖); Sylmark Holdings Ltd. v. Silicone Zone Int’l Ltd., 783 N.Y.S.2d 758, 772 (N.Y. Sup. Ct. 2004) (same). 14 Cite as: 2015 UT 80 Opinion of the Court issuance of an injunction without regard to proof of measurable economic injury to the plaintiff.13 ¶35 This principle is well-ingrained in the caselaw under the UTSA14 and under related Utah cases.15 The presumption of irrep- arable harm is widely endorsed and rarely questioned. And 13 The point is not ―that a plaintiff‘s allegations of threatened fu- ture use or disclosure are particularly trustworthy.‖ Infra ¶ 76 (emphasis added). It is that a prima facie case of misappropriation establishes a presumption of irreparable harm. Such a presump- tion, moreover, is not conclusive. It may be rebutted by a defend- ant. Absent rebuttal, however, the benefit of the doubt on the need for an injunction goes to the party whose trade secret has been misappropriated. That is particularly appropriate on a mo- tion for summary judgment filed by the accused misappropriator, given that the non-moving party is entitled to reasonable infer- ences in its favor. 14 See, e.g., Kendall Holdings, Ltd. v. Eden Cryogenics LLC., 630 F. Supp. 2d 853, 867 (S.D. Ohio 2008) (under the Ohio UTSA, ―irrep- arable harm is generally presumed‖); Computer Assocs. Int’l v. Quest Software, Inc., 333 F. Supp. 2d 688, 700 (N.D. Ill. 2004) (under the Illinois UTSA, ―[t]here is a presumption of irreparable harm to the plaintiff in cases of trade secret misappropriation‖); Union Nat’l Life Ins. Co. v. Tillman, 143 F. Supp. 2d 638, 641–42 (N.D. Miss. 2000) (under the Mississippi UTSA, ―to be awarded an in- junction,‖ a plaintiff ―need not demonstrate irreparable injury; a violation of the Act itself constitutes irreparable injury‖); Tracer Research Corp. v. Nat’l Env’t Serv. Co., 843 F. Supp. 568, 582 (D. Ariz. 1993) (once a plaintiff has established misappropriation un- der the Arizona UTSA, ―it is presumed that it will suffer irrepara- ble and immediate harm‖). 15 See Sys. Concepts, Inc. v. Dixon, 669 P.2d 421, 428 (Utah 1983) (holding that ―a likely or actual ‗threatened‘ harm‖ is sufficient to sustain injunctive relief, as it is ―an anticipatory remedy purposed to prevent the perpetration of a threatened wrong or compel the cessation of a continuing one,‖ and concluding that a former em- ployee working for a competitor is enough to infer such future harm (internal quotation marks omitted)). 15 INNOSYS v. MERCER Opinion of the Court where it has been questioned, it has usually been only to clarify that the presumption may be rebutted,16 as in circumstances 16 See cases cited supra 14. The dissent proffers a different stand- ard. Citing Faiveley Transport Malmo AB v. Wabtec Corp., 559 F.3d 110, 118–19 (2d Cir. 2009), it suggests that the presumption of ir- reparable harm should not apply absent ―a showing of future harm through unauthorized disclosure.‖ Infra ¶ 77. But the Faive- ley formulation assumes away the problem presented here; it acknowledges that a ―rebuttable presumption of irreparable harm might be warranted in cases where there is a danger that, unless enjoined, a misappropriator of trade secrets will disseminate those secrets to a wider audience or otherwise irreparably impair the value of those secrets.‖ 559 F.3d at 118. The key question concerns whether there is a sufficient ―risk of ‗further dissemination or ir- reparable impairment of value.‘‖ Infra ¶ 77 (quoting Faiveley, 559 F.3d at 118). For reasons explained below, we conclude that there is a sufficient risk to sustain the presumption in this case— particularly given the summary judgment posture of the case. In any event, the Faiveley standard is not universally accepted. On its face, the Faiveley opinion acknowledges decisions in the same cir- cuit holding ―that a presumption of irreparable harm automatical- ly arises upon the determination that a trade secret has been mis- appropriated.‖ 559 F.3d at 118. And other courts have repudiated the Faiveley analysis. See E.I. DuPont de Nemours & Co. v. Kolon In- dus., Inc., 894 F. Supp. 2d 691, 707 (E.D. Va. 2012) (criticizing Faive- ley as ―remarkable, overly simplified,‖ and inconsistent with the basic premise that ―difficulty in establishing monetary damages permits injunctive relief‖). The key question is who gets the benefit of the doubt as to the threat of future harm in a case of alleged misappropriation of a trade secret. The dissent would give it to Ms. Mercer, entitling her to summary judgment absent proof by InnoSys of an actual threat of future disclosure. We see the matter differently. Because InnoSys has at least arguably established a prima facie case of misappropriation, InnoSys gets the benefit of the doubt (particu- larly on summary judgment)—a benefit translating into a rebutta- ble presumption of irreparable harm. There is no need for a ―re- buttable presumption,‖ after all, if proof is required at the outset. 16 Cite as: 2015 UT 80 Opinion of the Court where the trade secret has become so generally known that it no longer exists.17 ¶36 And even when it is questioned, it is not generally on the grounds identified by Mercer and echoed in the dissent. See infra ¶¶ 74, 76–84 (requiring, as a precondition of the presumption of irreparable harm, proof of a likelihood of disclosure beyond the initial misappropriation). When the courts have questioned the presumption of irreparable harm, they have not generally re- quired proof of a likelihood of additional disclosures or of meas- urable economic harm as a prerequisite to the issuance of injunc- tive relief.18 Instead, the courts have simply suggested that the presumption of irreparable harm may be rebuttable, as in circum- stances where the trade secret has become so generally known that it no longer exists. ¶37 Those circumstances are not presented here. In fact, as ex- plained below, infra ¶¶ 55–59, here the presumption of irreparable 17 DVD Copy Control Ass’n Inc. v. Bunner, 10 Cal. Rptr. 3d 185, 194–95 (Cal. Ct. App. 2004) (reversing entry of preliminary injunc- tion in the face of evidence that the secret may have become ―gen- erally known,‖ such that ―a preliminary injunction prohibiting disclosure would have done nothing to protect the secret because the secret would have ceased to exist‖). 18 That would turn the venerable element of irreparable harm on its head. The essence of this element is in reserving equitable relief for cases where the evidence of measurable economic damage is unreliable—rendering the legal remedy of monetary damages in- adequate. It would turn that principle upside down to require proof of measurable economic harm, or even a likelihood of dis- closure beyond the initial misappropriation, as a prerequisite to injunctive relief. The ―threat of disclosure of the trade secret‖ enti- tles trade secret claimants ―to a rebuttable presumption of irrepa- rable harm for the purposes of injunctive relief.‖ MILGRIM § 15.02[1][c]. And here that threat is easily present given that Mer- cer has (a) shown a willingness to disclose the secrets before; and (b) forensic analysis cannot determine whether she still has the misappropriated material, and she is unwilling to submit her hard drives and e-mail account to further analysis. 17 INNOSYS v. MERCER Opinion of the Court harm was affirmatively reinforced by evidence of irreparable harm presented by InnoSys. So InnoSys‘s only deficiency was in failing to quantify the monetary impact of Mercer‘s misappropria- tion, and that failure is beside the point under the authority cited above. 2. Applicability and Rebuttal of the Presumption ¶38 In an attempt to avoid or rebut the presumption of irrepa- rable harm, the dissent alleges that there is no ―evidence of a threatened disclosure‖ of trade secrets given Mercer‘s assertion that she ―deleted the [InnoSys material] from her Gmail account and the thumb drive‖ and InnoSys‘s alleged failure to establish Mercer‘s ―continued possession of InnoSys‘s documents.‖ Infra ¶ 81. On that basis, the dissent insists that InnoSys‘s claim fails in light of InnoSys‘s purported failure to present evidence of threat- ened harm sufficient to sustain an injunction. ¶39 The dissent‘s approach falls short on two grounds: (a) the issue it raises was not preserved; and (b) Mercer‘s deletion of her email messages fails to rebut the presumption of irreparable harm in the circumstances of this case. a. Preservation ¶40 First, the issue raised by the dissent is not properly before us. Mercer never asserted—in the district court or on appeal—that there was no basis for an injunction because InnoSys had not rebut- ted Mercer‘s assertion that she ―deleted‖ the files in question.19 19 Mercer has asserted that ―InnoSys failed to produce evidence of any actual or threatened harm.‖ But the basis of that argument has always been that InnoSys failed to ―provide a single shred of evidence of any actual or threatened damage‖ to its business. So the focus of InnoSys‘s briefing and argument has been on the im- pact on its business, not on Mercer‘s continued access to InnoSys‘s files. On one narrow point, Mercer has asserted that her deletion of InnoSys material from her Gmail account and thumb drive ―mooted‖ one of InnoSys‘s claims. But that argument was limited (continued…) 18 Cite as: 2015 UT 80 Opinion of the Court Thus, we cannot properly fault InnoSys for failing to marshal ―ev- idence that Ms. Mercer had retained electronic files containing InnoSys‘s trade secrets.‖ Infra ¶ 83. That was not an issue in the district court and it is not an issue on appeal. ¶41 We have the authority to affirm on grounds that differ from those relied on by the court below. 20 But that authority is limited. It is confined to circumstances in which the alternative grounds for affirmance are ―apparent‖ on the face of the record. Commercial Real Estate Inv., L.C. v. Comcast of Utah II, Inc., 2012 UT 49, ¶ 14, 285 P.3d 1193. And that is hardly the case here (for rea- sons explained below). InnoSys, moreover, is at least entitled to an opportunity to be heard on this matter. We will not affirm sum- to InnoSys‘s replevin action—a claim that is not before us on this appeal. The limited nature of that argument only underscores the problem. It emphasizes that InnoSys could not properly have an- ticipated the need to establish Mercer‘s continued access to InnoSys files as a predicate to the showing of threatened harm necessary to justify an injunction. 20 As the dissent indicates, we have previously asserted the right to affirm on a ground ―not raised in the lower court.‖ Infra ¶ 85; Blaisdell v. Dentrix Dental Sys., Inc., 2012 UT 37, ¶ 5 n.1, 284 P.3d 616 (internal quotation marks omitted). But the general authority to affirm on unpreserved grounds does not sustain the propriety of so doing in any particular case. We should do so, in any event, only where the basis for affirmance is ―apparent on the record.‖ Id. (internal quotation marks omitted). And in this case the dis- sent‘s basis is simply not apparent—and cannot be, given that Mercer never challenged InnoSys‘s right to an injunction on the ground that it had not rebutted Mercer‘s assertion that she deleted the files in question, so InnoSys had no reason to put such evi- dence in the record. (For that reason, any lack of evidence is in no way telling, and no basis for affirmance.) The general question of ―whether evidence of a threatened harm precluded summary judgment‖ on InnoSys‘s request for injunctive relief was certainly before the court. Infra ¶ 86. But the specific issue of a need to rebut Mercer‘s assertion that the files in question had been deleted was neither raised nor ruled upon. 19 INNOSYS v. MERCER Opinion of the Court mary judgment against a claimant on a ground on which it has never been heard. b. Mercer‘s ―voluntary reform‖ ¶42 The dissent‘s approach ultimately fails on its merits in any event. A defendant‘s voluntary reformation and cessation of un- lawful activity forecloses the need for an injunction only in the ra- re case in which the defendant‘s reform is ―irrefutably demon- strated and total.‖ 5 J. THOMAS MCCARTHY, MCCARTHY ON TRADEMARKS AND UNFAIR COMPETITION § 30:11 (4th ed. 2015) (cit- ing cases). In other words, ―a defendant claiming that its volun- tary compliance moots a case bears the formidable burden of showing that it is absolutely clear the allegedly wrongful behavior could not reasonably be expected to recur.‖ Friends of the Earth, Inc. v. Laidlaw Envtl. Servs. (TOC), Inc., 528 U.S. 167, 190 (2000). ―Otherwise, a defendant could engage in unlawful conduct, stop when sued to have the case declared moot, then pick up where he left off, repeating this cycle until he achieves all his unlawful ends.‖ Already, LLC v. Nike, Inc., 133 S. Ct. 721, 727 (2013).21 21 The dissent seeks to avoid the burden-shifting impact of these precedents by attempting to distinguish Mercer‘s circumstances from those at issue in the cited cases. Thus, while a voluntary re- former ―retains the capability to reinitiate the harmful conduct in the future,‖ the dissent insists that Mercer ―undisputedly deleted InnoSys‘s emails and files,‖ such that ―the future use or dissemi- nation of the files is not just a matter of self-restraint.‖ Infra ¶ 88. And in light of such evidence, the dissent faults InnoSys for not ―produc[ing] evidence that Ms. Mercer retains the capacity to use its documents in the future.‖ Id. That response falls short because it assumes facts not in evidence, and on a point not raised below, and gives the benefit of the doubt on the matter to the moving party on summary judgment. Because all reasonable inferences go to InnoSys (as the non-moving party), we cannot presume that Mercer lacks anything but self-restraint. And her failure to make an irrefutable, clear showing of a lack of capacity is significant. The point is not to shift the burden to Mercer ―to prove that an injunction should not issue.‖ Infra ¶ 90. InnoSys retains that bur- (continued…) 20 Cite as: 2015 UT 80 Opinion of the Court ¶43 Under this authority, InnoSys is not required to accept Mercer‘s claim of voluntary compliance at face value. Instead the burden shifts to Mercer to carry the ―formidable burden of show- ing that it is absolutely clear [that] the allegedly wrongful behav- ior could not reasonably be expected to recur.‖ Already, Inc., 133 S. Ct. at 727(citing Friends of the Earth, 528 U.S. at 190). And here she has failed to do so; the record, in fact, includes ample grounds for suspicion of Mercer‘s self-serving assertions as to her destruction of her copies of InnoSys‘s trade secrets, see infra ¶¶ 10–11, 28, 31, and those grounds alone are enough to defeat summary judg- den. By carrying the burden of establishing a prima facie case of misappropriation, however, InnoSys shifted to Mercer the burden of showing that her alleged voluntary reform was enough to allay its concerns of irreparable harm. Such a showing, moreover, con- cerns more than just the question of mootness. See id. (suggesting that the issue is purely one of mootness). The voluntary reform issue also goes to the risk of threatened harm, and in the circum- stances of this case the burden fell to Mercer to show that her vol- untary reform from her apparent misappropriation cannot rea- sonably be expected to recur. Mercer failed to do so. First, the notion that Mercer may have destroyed existing electronic documents does not rule out the possibility that she retained other copies elsewhere. The forensic expert never ruled that out. He said that ―it is difficult to verify one way or the other whether InnoSys emails were forwarded to third parties, whether InnoSys data was moved to other external drives, whether other email accounts were used to forward data, or whether InnoSys data was used in some other way, shape, or form.‖ (emphasis added). And the forensic analysis found over 2000 hits for ―innosys‖ on Mercer‘s hard drive, and concluded that even after being deleted, files still exist in unallocated and slack space on the hard drive until they are overwritten by saving a new file in that space. The report also cautioned that no searches for words other than ―innosys‖ were conducted, and that key- word searches are limited in what they find. The expert hardly gave reason for a clean bill as to Mercer; instead he recommended a more complete forensic examination. 21 INNOSYS v. MERCER Opinion of the Court ment.22 Thus, to the extent evidence of Mercer‘s possession of trade secrets is somehow lacking, it is Mercer, and not InnoSys, whose case is undermined. See Polo Fashions, Inc. v. Dick Bruhn, Inc., 793 F.2d 1132, 1135 (9th Cir. 1986).23 22 See 5 J. THOMAS MCCARTHY, MCCARTHY ON TRADEMARKS AND UNFAIR COMPETITION § 30:11 (4th ed. 2015) (―Even if the defendant has ceased wrongful activities, an injunction should be granted where defendant‘s intentions are in doubt.‖). 23 The dissent‘s cases are distinguishable on the above grounds. Thus, the notion that the threatened harm targeted by the injunc- tion is a risk ―too ‗remote and speculative‘ to merit an injunction,‖ infra ¶ 84 (quoting Almurbati v. Bush, 366 F. Supp. 2d 72, 78 (D.D.C. 2005)), has no application here, where InnoSys has made a prima facie showing of misappropriation and the burden of prov- ing reform has shifted to Mercer. In Almurbati, the plaintiffs ―ex- tensively rel[ied] on news reports and articles that suggest that the government is involved in a conspiracy,‖ as well as declarations only the plaintiffs were privy to from unidentified officials who had no decision-making authority. Id. It was on that basis that the Almurbati court found that there was ―no evidence in the record . . . support[ing] the petitioners‘ allegations.‖ Id. That is far from the case here. And unlike in Am. Airlines, Inc. v. Imhof, 620 F. Supp. 2d 574, 580 (S.D.N.Y. 2009), Mercer has hardly ―made clear‖ that third parties ―would not receive‖ the InnoSys trade secrets. In- stead there is a substantial risk of such disclosure—for all the rea- sons set forth above. The dissent also relies on Johnson v. Hermes Assocs., Ltd., 2005 UT 82, 128 P.3d 1151, but the facts of that case support our conclu- sions. In Johnson, this court affirmed the district court‘s grant of injunctive relief to the plaintiffs because the defendant failed to contest the plaintiff‘s sworn evidence with his own specific sworn evidence. Id. ¶¶ 21–27. That is also the case here. InnoSys has pro- duced evidence arguably supporting a prima facie case of misap- propriation, with its presumption of irreparable harm, and rein- forced it with evidence arguably establishing irreparable harm. Mercer has, at most, shown there are genuine issues of this mate- (continued…) 22 Cite as: 2015 UT 80 Opinion of the Court ¶44 The Polo Fashions case is instructive. In that case the district court refused to grant a permanent injunction against a trademark infringer on the ground that the plaintiff presented no evidence that the defendant planned to repeat its acts of infringement. Id. at 1135–36. In light of the nature of the infringement and defendant‘s refusal to stop until the risk of liability was apparent, the Ninth Circuit reversed under an abuse of discretion standard, holding that the plaintiff has no burden to introduce evidence that de- fendants are likely to infringe again. Id. The court‘s commentary is equally applicable here: ―If the defendants sincerely intend not to infringe, the injunction harms them little; if they do, it gives [plaintiff] substantial protection.‖ Id. at 1135. ¶45 The same should be said of Mercer. If she sincerely intends not to infringe the InnoSys trade secrets, an injunction harms her little; if on the other hand she harbors such ideas, an injunction will provide substantial protection for InnoSys. ¶46 On this record, Mercer has failed to rebut the presumption of irreparable harm. There are, at a minimum, genuine issues of material fact defeating her motion for summary judgment.24 Even without the presumption of irreparable harm, moreover, InnoSys‘s claim would likely survive summary judgment in light of the actual proof of irreparable harm advanced by InnoSys (and described in part II.B. below). B. Breach of the Non-Disclosure Agreement ¶47 Much of the above also suffices to foreclose summary judgment on InnoSys‘s claim for breach of the NDA. The pre- rial fact, and, more likely, actually failed to refute Innosys‘s evi- dence. 24 Our holding on this point does not foreclose the possibility of a more fulsome showing by Mercer after remand. Perhaps at a later stage she will carry the ―formidable burden of showing that it is absolutely clear the allegedly wrongful behavior could not reasonably be expected to recur.‖ Already, LLC v. Nike, Inc., 133 S. Ct. 721, 727 (2013) (internal quotation marks omitted). She has not done so on this record, however, and we reverse on that basis. 23 INNOSYS v. MERCER Opinion of the Court sumption of irreparable harm also precludes summary judgment on InnoSys‘s NDA claim.25 ¶48 Moreover, InnoSys‘s claim would survive summary judg- ment even absent the presumption, as it has presented actual evi- dence of threatened harm. InnoSys‘s evidence is at least sufficient to establish genuine issues of material fact on the question of Mer- cer‘s continued access to the trade secret information, and thus a threat of future harm. ¶49 First, InnoSys introduced evidence concerning Mercer‘s use of a web-based Gmail account to access InnoSys‘s trade secrets. On this issue, InnoSys established that the InnoSys material had been transferred to Google‘s possession, that the actual content of Gmail messages is screened and employed for Google‘s business and advertising purposes, and that Google retains deleted emails from Gmail accounts.26 25 See Brake Parts, Inc. v. Lewis, 443 F. App‘x 27, 32 (6th Cir. 2011) (recognizing that the nature of irreparable harm is the same in a non-disclosure agreement case as it is in a trade secret case); Bowe Bell & Howell Co. v. Harris, 145 F. App‘x 401, 404 (4th Cir. 2005) (af- firming preliminary injunction on claim for misappropriation of trade secrets and breach of nondisclosure agreement based on a ―likely misappropriat[ion]‖ of trade secrets and ―likely vio- lat[ion]‖ of nondisclosure agreements); see also UTAH CODE § 13-24-2(2)(b)(ii)(B) (recognizing, as a basis for establishing trade secret misappropriation, proof of use of trade secret information with knowledge that the information was ―acquired under cir- cumstances giving rise to a duty to maintain its secrecy or limit its use‖ (emphasis added)). 26 InnoSys argued that Gmail is not bound by a confidentiality agreement. InnoSys‘s CTO stated, among other things, that ―Gmail maintains and processes the content of e-mail messages for the purpose of delivering advertising,‖ and that InnoSys ―no longer has the ability to control and maintain [the information ] . . . Ms. Mercer transferred to her Gmail account.‖ InnoSys addi- tionally submitted evidence of Google‘s privacy policy, which stated that Gmail uses the ―content of messages‖ in its advertising (continued…) 24 Cite as: 2015 UT 80 Opinion of the Court ¶50 InnoSys also submitted a declaration from an intellectual property attorney attesting to the harmful effects of the disclosure to Google. This witness stated that ―[i]nventions cannot be patent- ed in other countries after public disclosure, and cannot be pa- tented in the US after the expiration of a one year grace period fol- lowing a public disclosure.‖ He further explained that as a result, ―[t]he Google Terms of Service associated with Gmail accounts in force at the time of this statement do cast a colorable cloud on the value of confidential intellectual property transmitted using a Gmail account.‖ ¶51 InnoSys even submitted evidence of Mercer‘s continued access to InnoSys‘s trade secrets and of the ongoing threat of dis- closure. One piece of such evidence came from InnoSys‘s IT spe- cialist. He testified that Gmail ―would never let you delete a mes- sage,‖ and that ―[o]nce it went to their servers . . . you can‘t make it go away.‖ That alone is enough to establish an ongoing threat of disclosure, or at least a genuine issue of such a threat.27 services. InnoSys‘s CTO also stated that ―merely . . . deleting emails from one email account will not necessarily result in the data being destroyed.‖ Finally, in a deposition, InnoSys‘s IT spe- cialist referred to tech news reports that Gmail ―would never let you delete a message,‖ and that ―[o]nce it went to their servers . . . you can‘t make it go away‖ because ―Google always keeps a copy of it.‖ 27 The above evidence cannot be dismissed on the grounds iden- tified by the dissent. First, the declaration from legal counsel was no mere ―legal opinion[],‖ as in the cases cited in the dissent. Infra ¶ 94 n.3. The declaration in question proffered a legal and factual basis for concluding that InnoSys was subject to future risk as a result of Mercer‘s misappropriations. Mercer, moreover, raised no objection to the declaration (neither in the district court nor on appeal)—certainly not on the ground raised by the dissent. So InnoSys had no opportunity to respond, and we have no basis for questioning this evidence (as does the dissent). The same goes for the dissent‘s challenge to InnoSys‘s evidence of the potential for access to Mercer‘s Gmail. Absent any objection questioning the declarant‘s ―personal knowledge‖ or basis for ―giv[ing] expert tes- (continued…) 25 INNOSYS v. MERCER Opinion of the Court ¶52 That same point was hammered home by further evidence presented by InnoSys. As to the trade secrets that Mercer misap- propriated by disclosing them to DWS in her unemployment hearing, for example, the record was sufficient to establish Mer- cer‘s ongoing authority to reopen the file in her case and thereby access the relevant trade secrets. Thus, when InnoSys sought an order protecting against any further disclosure of its trade secrets, the ALJ openly denied having the authority to enter such an or- der, and indicated that all he could offer was the department‘s pol- icy of ―resist[ing] all attempts by outside agencies to access these records.‖ That is hardly reassuring. If anything, it establishes that Mercer is an ongoing threat—since a former claimant in a DWS proceeding is entitled to access to her own file in a prior DWS pro- ceeding to which she was a party.28 ¶53 A further piece of the evidentiary picture concerns the equivocations and inconsistencies in Mercer‘s own testimony. She ultimately admitted telling two different stories about when and why she had accessed InnoSys‘s protected business plan. Supra ¶¶ 10–11, 28, 31. These equivocations and inconsistencies under- mine her credibility and introduce a core genuine issue as to her supposed intent to reform and never again harm InnoSys. timony‖ on the matter, infra ¶ 94 n.3, we are no in position to re- ject the evidence on these grounds, as they have been neither pre- served nor briefed. 28 Compare UTAH CODE §§ 63G-2-201(3)(a), -302(1)(a) (classifying ―records concerning an individual‘s eligibility for unemployment insurance benefits‖ as ―private‖ records), with id. § 63G-2-202(1)(a) (―Upon request . . . a government entity shall disclose a private rec- ord to . . . the subject of the record.‖ (emphasis added)). The dissent would reject this point on the ground that ―[t]here appears to be no record evidence that suggests the emails were retained in DWS‘s files,‖ and thus ―no indication that Ms. Mercer would seek to access the DWS files in the future.‖ Infra ¶ 94 n.3. This point, however, is a matter subject to inference from legal principles on which we can take judicial notice. And any doubt on the matter should go to InnoSys as the non-moving party. 26 Cite as: 2015 UT 80 Opinion of the Court ¶54 Finally, the evidence advanced to this point by InnoSys does not attempt to quantify the economic impact on InnoSys or to measure the extent of any unjust enrichment flowing to Mercer. Those failures might be a barrier to InnoSys‘s ultimate recovery of monetary damages. But they have nothing to do with any failure to establish ―irreparable harm.‖ And where injunctive relief is an available remedy, the claim cannot properly be dismissed on the ground that InnoSys has failed to develop a basis for a monetary damages remedy. ¶55 The NDA itself specifically contemplated this circum- stance. It expressly stated that in the event of a breach ―it may be impossible to measure in money the damage to [InnoSys].‖ And it accordingly authorized InnoSys to seek ―an injunction‖ to ―mini- mize or prevent damage‖ to InnoSys. ¶56 InnoSys made an ample showing of irreparable harm. And we cannot properly fault it for not framing that harm in quantifia- ble terms. Cf. Overholt Crop Ins. Serv. Co. v. Travis, 941 F.2d 1361, 1371 (8th Cir. 1991) (holding that plaintiff was entitled to injunc- tive relief to prevent disclosure of trade secrets under a non- disclosure agreement as to future harms, as well as monetary damages for actual harm that had already occurred and was quantifiable). We accordingly reverse summary judgment on the NDA claim and remand for further proceedings not inconsistent with this opinion.29 C. Breach of Fiduciary Duty ¶57 The above grounds are also sufficient to sustain reversal of InnoSys‘s claim for breach of fiduciary duty. This claim, like the others, was dismissed on the basis of InnoSys‘s purported failure to present evidence of actual economic harm. And again, the am- ple grounds for a finding of irreparable injury suffice to reverse that decision. See Norand Corp. v. Parkin, 785 F. Supp. 1353, 1355 29 The dissent asserts, without elaboration, that ―InnoSys‘s claim for breach of fiduciary duty is preempted by the UTSA.‖ Infra ¶ 97. That question was not raised below or briefed on appeal, however, so we do not reach it. 27 INNOSYS v. MERCER Opinion of the Court (N.D. Iowa 1990) (enjoining a former employee from working with a competitor because of the likely existence of a fiduciary du- ty not to disclose trade secrets and other confidential infor- mation). We reverse on that basis. ¶58 In so holding, we need not and do not address the caselaw endorsed by the dissent. See infra ¶¶ 96–97 (discussing CDC Resto- ration & Constr., LC v. Tradesmen Contractors, LLC, 2012 UT App 60, ¶ 48, 274 P.3d 317, and Frantz v. Johnson, 999 P.2d 351, 357–58 (Nev. 2000)). These cases address an important question of preemption—of whether a common law fiduciary duty claim is preempted by the UTSA. But that issue was neither preserved be- low nor argued on appeal, and we accordingly decline to reach it. D. Rule 11 Sanctions and Fee Award ¶59 Finally, the merits analysis above is also sufficient to sus- tain the reversal of the district court‘s decisions entering rule 11 sanctions against InnoSys and awarding Mercer attorney fees. Now that InnoSys has prevailed on Mercer‘s motion for summary judgment on all counts, Mercer cannot be entitled to sanctions or fees. ¶60 Mercer‘s claim to a fee award arose under a provision of the NDA and under Utah Code section 78B-5-825. Yet both of those provisions limit their authorization of fee awards to prevail- ing parties. See UTAH CODE § 78B-5-825(1) (providing for ―reasona- ble attorney fees to a prevailing party‖ where the action or defense was ―without merit and not brought or asserted in good faith‖ (emphasis added)); (InnoSys NDA section providing that the re- covery of ―reasonable attorneys‘ fees‖ ―may be granted‖ to ―the prevailing party‖ in any ―action at law or in equity brought to en- force . . . the terms of this Agreement‖ (emphasis added)). Now that Mercer‘s motion for summary judgment has been denied on all counts, she is in no sense a prevailing party. Her request for fees must accordingly also be denied. ¶61 The same goes for Mercer‘s request for sanctions under UTAH R. CIV. P. 11. In entering sanctions, the district court con- cluded that InnoSys had asserted its claims for an improper pur- pose—in violation of UTAH R. CIV. P. 11(b)(1). Any possible prem- ise for that conclusion is eliminated by our decision reversing the 28 Cite as: 2015 UT 80 Opinion of the Court entry of summary judgment against InnoSys. For reasons dis- cussed in detail above, InnoSys has, to this point in this litigation, identified good faith grounds in fact and law to assert its claims against Mercer. And that is sufficient to defeat Mercer‘s request for sanctions under rule 11(b)(1). ¶62 The filing of a complaint with a good faith basis in law and fact cannot sustain sanctions on the grounds of ―being presented for an[] improper purpose‖ under rule 11(b)(1).30 The rationale for this conclusion is straightforward: If a complaint has a good faith basis in law and fact, its assertion is at least presumptively for a proper purpose—to assert the plaintiff‘s right to recover on its claims. In other words, ―[a] party should not be penalized for or deterred from seeking and obtaining warranted judicial relief merely because one of his multiple purposes in seeking that relief 30 See Sussman v. Bank of Israel, 56 F.3d 450, 458–59 (2d Cir. 1995); Nat’l Ass’n of Gov’t Emps., Inc. v. Nat’l Fed’n of Fed. Emps., 844 F.2d 216, 223–224 (5th Cir. 1988); Townsend v. Holman Consulting Corp., 929 F.3d 1358, 1362 (9th Cir. 1990) (―With regard to complaints which initiate actions, we have held that such complaints are not filed for an improper purpose if they are non-frivolous.‖); Burkhart ex rel. Meeks v. Kinsley Bank, 852 F.2d 512, 515 (10th Cir. 1988) (―[I]f counsel filed [a] . . . complaint which was warranted by existing law or a good faith argument for the extension, modifica- tion, or reversal of existing law, then any suggestion of harass- ment would necessarily fail.‖ (internal quotation marks omitted)). See also Oliveri v. Thompson, 803 F.2d 1265, 1272 (2d Cir. 1986) (―[Under the court‘s inherent power to impose sanctions,] we have declined to uphold [sanctions] . . . absent both clear evidence that the challenged actions are entirely without color, and [are tak- en] for reasons of harassment or delay or for other improper pur- poses‖ (third alteration in original) (emphasis added) (internal quotation marks omitted)); William W. Schwarzer, Sanctions Un- der the New Federal Rule 11, 104 F.R.D. 181, 196 (1985) (―If a reason- ably clear legal justification can be shown for the filing of the pa- per in question, no improper purpose can be found and sanctions are inappropriate.‖). 29 INNOSYS v. MERCER Opinion of the Court may have been improper.‖ Sussman v. Bank of Israel, 56 F.3d 450, 459 (2d Cir. 1995).31 ¶63 That is not to say that ―the filing of a[ny] paper for an im- proper purpose is immunized from Rule 11 sanctions simply be- cause it is well grounded in fact and law.‖ Nat’l Ass’n of Gov’t Emps., 844 F.2d at 224. In cases involving ―repetitious or excessive filings,‖ the courts have recognized that even a meritorious claim may be advanced for an improper purpose like harassment. Id.32 As to the ―filing of an original complaint,‖ however, there is no possibility of any repetition or excessiveness, and thus the courts have generally held that the filing of a ―well grounded‖ complaint ―cannot generally serve as a basis for imposing sanctions.‖ Id. ¶64 We apply that general rule here. And we reverse on that basis. Several of the grounds for sanctions identified by the dis- trict court went to InnoSys‘s failure to present a copy of the NDA signed by Mercer. Those grounds went by the wayside when InnoSys discovered the original document. The other grounds, moreover—regarding InnoSys‘s alleged retaliatory motives for filing suit—are irrelevant as a matter of law. If InnoSys had a good faith basis in fact and law for its claims (as we conclude that it did), it matters not that it may have harbored an ulterior motive of retaliation. —————— 31 Cf. Eldrige v. Johndrow, 2015 UT 21, ¶ 68, 345 P.3d 553 (―[I]t will never be the defendant‘s motivation by itself that leads to liabil- ity.‖). 32 See also id. (noting relevance of motive in abuse of process cas- es). 30 Cite as: 2015 UT 80 J. DURHAM, dissenting JUSTICE DURHAM, dissenting: ¶65 I respectfully dissent from the majority opinion. I would affirm summary judgment against InnoSys on all claims. InnoSys failed to create a dispute of material fact that would preclude summary judgment on both its damages claims and its claims for injunctive relief. I. SUMMARY JUDGMENT ON INNOSYS‘S DAMAGES CLAIMS FOR MISAPPROPRIATION OF TRADE SECRETS AND FOR BREACH OF CONTRACT ¶66 It is well established in Utah that to overcome a motion for summary judgment on a claim for which damages is an ele- ment, the plaintiff must show evidence of damages. Borghetti v. Sys. & Comput. Tech Inc., 2008 UT 77, ¶ 31, 199 P.3d 907 (―[I]n or- der to overcome summary judgment [plaintiff] must come for- ward with admissible ‗evidence that rises above speculation and provides a reasonable, even though not necessarily precise, esti- mate of damages.‘‖). ―At the pleading stage, general factual alle- gations of injury resulting from the defendant‘s conduct may suf- fice . . . . In response to a summary judgment motion, however, the plaintiff can no longer rest on such mere allegations, but must set forth by affidavit or other evidence specific facts, which for purposes of the summary judgment motion will be taken to be true.‖ Brown v. Div. of Water Rights of the Dep’t of Nat. Res., 2010 UT 14, ¶ 14, 228 P.3d 747 (quoting Lujan v. Defs. of Wildlife, 504 U.S. 555, 561 (1992)). ¶67 Damages constitute a necessary element of a contract claim. Bair v. Axiom Design, L.L.C., 2001 UT 20, ¶ 14, 20 P.3d 388. If, by the summary judgment stage, a plaintiff has made no show- ing of damages on a contract claim, there is no reason to proceed to trial because the plaintiff has not presented evidence on which a jury could find that it is entitled to relief. See Giusti v. Sterling Wentworth Corp., 2009 UT 2, ¶ 52, 201 P.3d 966. ¶68 Actual damages is also a necessary element of a damages claim under the Uniform Trade Secrets Act (UTSA). The UTSA provides for three specific forms of damages: compensation for actual loss, disgorgement of unjust enrichment, and reasonable royalties. UTAH CODE § 13-24-4(1). Where a statute provides for a particular amount or form of damages, ―[a]ny expansion of the damages that may be recovered must be undertaken by the legis- 31 INNOSYS, INC. v. MERCER J. DURHAM, dissenting lature, not the courts.‖ Adkins v. Uncle Bart’s, Inc., 2000 UT 14, ¶ 40, 1 P.3d 528; see also Transamerica Mortg. Advisors, Inc. (TAMA) v. Lewis, 444 U.S. 11, 19 (1979) (―[I]t is an elemental canon of statu- tory construction that where a statute expressly provides a partic- ular remedy or remedies, a court must be chary of reading others into it.‖). Federal and state courts have unanimously interpreted the UTSA‘s list of forms of damages to be exclusive and have therefore required plaintiffs to show evidence of damages in one of these categories.1 1 See Litton Sys., Inc. v. Ssangyong Cement Indus. Co., 107 F.3d 30, 1997 WL 59360, at *7–8 (Fed. Cir. 1997) (holding that California‘s codification of the UTSA requires plaintiffs to show damages in one of the three listed categories); Firetrace USA, LLC v. Jesclard, 800 F. Supp. 2d 1042, 1054 (D. Ariz. 2010) (granting summary judgment to defendant former employee because ―[p]laintiffs ha[d] not met their burden to overcome summary judgment by showing evidence they were proximately damaged by [defend- ant‘s] use of confidential information‖); Furmanite Am., Inc. v. T.D. Williamson, Inc., 506 F. Supp. 2d 1134, 1142 & n.8 (M.D. Fla. 2007) (holding that ―[i]f [plaintiff] cannot show at trial . . . that [it] suf- fered any damages in the actual loss of such materials, [plaintiff] cannot recover for the misappropriation‖); Alphamed Pharm. Corp. v. Arriva Pharm., Inc., 432 F. Supp. 2d 1319, 1335–39 (S.D. Fla. 2006) (granting judgment as a matter of law in favor of a defendant be- cause the plaintiff produced no evidence of ―an actual loss, unjust enrichment, or a reasonable royalty related to the misappropria- tion of [the plaintiff‘s] trade secrets‖), aff’d, 294 F. App‘x 501 (11th Cir. 2008); Storage Tech. Corp. v. Cisco Sys., Inc., No. CIV.00-2253 (JNE/JGL), 2003 WL 22231544, at *9–10 (D. Minn. Sept. 25, 2003) (holding that the defendant was ―entitled to summary judgment because [the plaintiff] fail[ed] to submit a viable damages theory‖ for actual losses, unjust enrichment, or a reasonable royalty) aff’d, 395 F.3d 921 (8th Cir. 2005); FAS Techs., Ltd. v. Dainippon Screen Mfg. Co., No. C 00-01879 CRB, 2001 WL 637451, at *3–4 (N.D. Cal. May 31, 2001) (holding that a plaintiff seeking to recover damages under the California codification of the UTSA must show evi- dence of harm); News Am. Mktg. In-Store, Inc. v. Marquis, 862 A.2d 837, 846 (Conn. App. Ct. 2004) (―Actual damage is a necessary el- (continued…) 32 Cite as: 2015 UT 80 J. DURHAM, dissenting ¶69 InnoSys produced no evidence of any damages caused by Ms. Mercer‘s breach of the NDA or misappropriation of trade se- crets. According to the evidence produced by InnoSys, Ms. Mercer kept work emails after she was terminated. She also failed to re- turn a business plan that her supervisor instructed her to review shortly before she was fired. She then used some of the emails in an administrative unemployment benefits hearing to defend her- self from InnoSys‘s assertion that she was fired for incompetence. After Ms. Mercer learned that InnoSys was displeased that she still possessed work emails and the business plan, she deleted them. InnoSys produced no evidence that Ms. Mercer ever used or disclosed the documents in any way that harmed InnoSys or un- justly enriched herself. Absent any evidence of actual loss, unjust enrichment, or a basis for an award of reasonable royalties, sum- mary judgment as to InnoSys‘s damages claims was not error. See Carbo Ceramics, Inc. v. Keefe, 166 F. App‘x 714, 725 (5th Cir. 2006) (affirming summary judgment because the plaintiff ―failed to meet its burden of presenting sufficient evidence demonstrating a triable issue of material fact as to actual damages recoverable un- der its trade secret misappropriation claim‖); Firetrace USA, LLC v. Jesclard, 800 F. Supp. 2d 1042, 1054 (D. Ariz. 2010) (granting sum- mary judgment in a misappropriation and breach-of-contract case against a former employee because ―[p]laintiffs ha[d] not met their burden to overcome summary judgment by showing evi- dence they were proximately damaged by [defendant‘s] use of confidential information‖); U.S. Gypsum Co. v. LaFarge N. Am., Inc., 508 F. Supp. 2d 601, 639–41 (N.D. Ill. 2007) (dismissing contract- based breach-of-confidentiality claims against a former employee because the former employer made no showing of damages). ¶70 At minimum, therefore, Ms. Mercer is entitled to partial summary judgment in her favor on InnoSys‘s claims for damages. ement that must be proven by the plaintiff to prevail on its trade secrets claim.‖); Unilogic, Inc. v. Burroughs Corp., 12 Cal. Rptr. 2d 741, 748–750 (Ct. App. 1992) (affirming judgment of nonsuit where plaintiff admitted it suffered no financial loss and did not show evidence of unjust enrichment or reasonable royalty). 33 INNOSYS, INC. v. MERCER J. DURHAM, dissenting II. SUMMARY JUDGMENT ON INNOSYS‘S INJUNCTIVE RELIEF CLAIMS FOR MISAPPROPRIATION OF TRADE SECRETS AND FOR BREACH OF CONTRACT ¶71 In addition to damages, InnoSys sought injunctive relief for its misappropriation of trade secrets and breach of contract claims. An injunction does not require proof of actual damages; a court may grant equitable injunctive relief upon a showing of threatened future harm. Sys. Concepts, Inc. v. Dixon, 669 P.2d 421, 428 (Utah 1983). The majority opinion bases its reversal of sum- mary judgment upon its conclusion that even if there is no evi- dence of actual damages or unjust enrichment, there is a dispute of fact as to whether there is a threat of future harm that could jus- tify injunctive relief. I disagree. A. The Presumption of Irreparable Harm ¶72 One of the necessary elements of a claim for injunctive re- lief is proof of irreparable harm. See UTAH R. CIV. P. 65A(e) (a pre- liminary injunction requires a showing that ―[t]he applicant will suffer irreparable harm unless the order or injunction issues‖). ―Irreparable injury justifying an injunction is that which cannot be adequately compensated in damages or for which damages cannot be compensable in money.‖ Hunsaker v. Kersh, 1999 UT 106, ¶ 9, 991 P.2d 67 (internal quotation marks omitted). ―It is thus well- established that an injury is irreparable only if it cannot be un- done through monetary remedies.‖ Dennis Melancon, Inc. v. City of New Orleans, 703 F.3d 262, 279 (5th Cir. 2012) (internal quotation marks omitted). ¶73 Several jurisdictions have adopted a presumption that the disclosure of a trade secret constitutes an irreparable harm that justifies an injunction. The presumption of irreparable harm is based upon the fact that the disclosure of a trade secret has the po- tential to destroy the legal protections afforded to a trade secret if it becomes generally known. See 4 ROBERT M. MILGRIM & ERIC E. BENSEN, MILGRIM ON TRADE SECRETS § 15.02[1][c] (2013) (noting that ―unprotected disclosure of a trade secret destroys the secret‖). Because ―of the difficulties involved in valuing the consequences of the destruction of a trade secret,‖ id., some courts have adopted a presumption that the harm associated with an unauthorized disclosure is irreparable, see FMC Corp. v. Taiwan Tainan Giant In- dus. Co., 730 F.2d 61, 63 (2d Cir. 1984) (holding that ―the loss of 34 Cite as: 2015 UT 80 J. DURHAM, dissenting trade secrets cannot be measured in money damages‖); Kendall Holdings, Ltd. v. Eden Cryogenics LLC, 630 F. Supp. 2d 853, 867 (S.D. Ohio 2008) (holding that ―[t]he loss of trade secrets is usually con- sidered an irreparable harm [that] cannot be measured in money damages― (alterations in original) (internal quotation marks omit- ted)). Thus, once the risk of future disclosure has been established, courts have presumed that the harm caused by the disclosure would be irreparable, justifying injunctive relief. ¶74 But we need not decide whether to espouse this judicially created presumption because it does not apply here. The key issue in this case is not whether an unprotected disclosure of InnoSys‘s trade secrets would produce an irreparable harm that could not be readily measured in money damages. Rather, the question pre- sented is whether InnoSys produced evidence of a threatened fu- ture disclosure of InnoSys‘s files. Infra ¶¶ 79–86. ¶75 The majority, however, adopts a broader interpretation of the judicially created presumption that the harm occasioned by an unauthorized disclosure of a trade secret is irreparable—i.e., not easily remedied by money damages. The majority opinion holds that there is ―a presumption of harm upon proof of misappropria- tion.‖ Supra ¶ 34. Thus the majority appears to endorse the propo- sition that when a plaintiff seeks an injunction in a case involving trade secrets, there is a presumption of a threat of future harm ra- ther than merely a presumption that any harm would be irrepara- ble. ¶76 The majority‘s broad interpretation of the presumption of irreparable harm, however, is not supported by the reasoning that produced the presumption in the first place. The unauthorized disclosure of a trade secret has been presumed to lead to irrepara- ble harm because of the difficulty of assigning a monetary value to the loss of the secret. The presumption of irreparable harm is not based upon an assumption that a plaintiff‘s allegations of threatened future use or disclosure are particularly trustworthy, shifting the burden of proof on this issue. See Water & Energy Sys. Tech., Inc. v. Keil, 1999 UT 16, ¶¶ 8, 14, 974 P.2d 821 (party seeking an injunction for misappropriation of trade secrets bears the bur- den of proof); Amylin Pharm., Inc. v. Eli Lilly & Co., No. 11-CV-1061 JLS NLS, 2011 WL 5237558, at *2 (S.D. Cal. June 8, 2011) (rejecting as speculative a plaintiff‘s assertion that the defendant would misuse confidential information at a future date), aff’d, 456 F. 35 INNOSYS, INC. v. MERCER J. DURHAM, dissenting App‘x 676 (9th Cir. 2011). Indeed, the leading commentator on trade secrets has noted that the presumption of irreparable harm is not a presumption that harm will occur: ―[C]ourts have often ruled that a trade secret claimant is entitled to a rebuttable pre- sumption of irreparable harm for the purposes of injunctive relief, at least where there is a threat of disclosure of the trade secret.‖ 4 ROBERT M. MILGRIM & ERIC E. BENSEN, MILGRIM ON TRADE SECRETS § 15.02[1][c] (2013) (emphasis added) (footnote omitted). ¶77 The Second Circuit has affirmed that absent evidence of a risk of prospective disclosure, a presumption of irreparable harm simply would not arise: We have previously observed that the loss of trade secrets cannot be measured in money damages where that secret, once lost, is lost forever. Some courts in this Circuit have read this passing observa- tion to mean that a presumption of irreparable harm automatically arises upon the determination that a trade secret has been misappropriated. That reading is not correct. A rebuttable presumption of irrepara- ble harm might be warranted in cases where there is a danger that, unless enjoined, a misappropriator of trade secrets will disseminate those secrets to a wid- er audience or otherwise irreparably impair the val- ue of those secrets. Faiveley Transp. Malmo AB v. Wabtec Corp., 559 F.3d 110, 118 (2d Cir. 2009) (internal quotation marks omitted). The presumption of irreparable harm does not apply, however, where there is not a risk of ―further dissemination or irreparable impairment of val- ue.‖ Id. Thus the Second Circuit directly rejected the proposition that the presumption applies in the absence of a showing of future harm through unauthorized disclosure. See also Campbell Soup Co. v. ConAgra, Inc., 977 F.2d 86, 92–93 (3d Cir. 1992) (rejecting a plain- tiff‘s argument that ―irreparable harm must be presumed where . . . the elements of a trade secret claim have been satisfied‖ and refusing to apply the presumption where the plaintiff did not show that the defendant intended to use or disclose the trade se- cret). ¶78 Therefore, the presumption of irreparable harm does not apply to the threshold question of whether InnoSys has produced 36 Cite as: 2015 UT 80 J. DURHAM, dissenting evidence of a threat of future injury through unauthorized disclo- sure of its trade secrets. The issue in this case is not whether a fu- ture harm is irreparable because it cannot be remedied through money damages, but rather whether there is evidence of a threat of future harm at all. I turn now to that question. B. No Evidence of Threatened Harm ¶79 In addition to actual damages, InnoSys sought injunctive relief. But ―[t]he fact the relief sought is injunctive does not excuse a showing of injury, whether actual or threatened.‖ Intel Corp. v. Hamidi, 71 P.3d 296, 303 (Cal. 2003) (alteration in original) (inter- nal quotation marks omitted). In Utah, a party seeking a perma- nent injunction must show that ―irreparable harm would result‖ without the injunction. Johnson v. Hermes Assocs., Ltd., 2005 UT 82, ¶ 13, 128 P.3d 1151 (emphasis added) (listing the requirements for a permanent injunction); 42 AM. JUR. 2D Injunctions § 33 (2010) (―An injunction will not be granted to restrain acts, however ir- regular or unauthorized, that do not injure the complainant.‖) The threatened injury must be ―a real and immediate injury, not an abstract injury or one that is conjectural or hypothetical.‖ Ramos- Santos v. Hernandez-Nogueras, 867 F. Supp. 2d 235, 260 (D.P.R. 2012). A court will not exercise its power to grant injunctive relief ―to allay a mere apprehension of injury at an indefinite future time.‖ 42 AM. JUR. 2D Injunctions § 34 (2010); accord United States v. W. T. Grant Co., 345 U.S. 629, 633 (1953) (injunction requires a de- termination ―that there exists some cognizable danger of recurrent violation, something more than [a] mere possibility‖). ¶80 If the evidence presented by a plaintiff seeking injunctive relief ―is insufficient to justify issuance of a permanent injunction, the trial court simply ha[s] no discretion to exercise,‖ and sum- mary judgment is proper. DVD Copy Control Ass’n, Inc. v. Kaleides- cape, Inc., 97 Cal. Rptr. 3d 856, 876 (Ct. App. 2009) (internal quota- tion marks omitted); Shaw v. Tampa Elec. Co., 949 So. 2d 1066, 1070 (Fla. Ct. App. 2007) (holding that a court may deny a request for injunctive relief in a summary judgment proceeding if it is clear the plaintiff cannot meet the requirements for an injunction). ¶81 InnoSys did not present evidence of a threatened disclo- sure of its trade secrets that would cause it harm. InnoSys argued below that Ms. Mercer‘s retention of emails and other electronic documents after she was terminated created a threat of future 37 INNOSYS, INC. v. MERCER J. DURHAM, dissenting harm that justified an injunction against her. Ms. Mercer present- ed evidence that she no longer had access to InnoSys‘s documents because she deleted them. InnoSys agrees that Ms. Mercer deleted the files from her Gmail account and the thumb drive—indeed, it brought a spoliation claim based upon the deletions. Furthermore, InnoSys‘s forensic analysis of Ms. Mercer‘s computers, thumb drive, and Gmail account confirmed that she no longer had the electronic documents. But InnoSys contends that Ms. Mercer‘s as- sertions that she did not forward the files to another electronic storage device or email account prior to deletion may be false, and that she may have had the continuing ability to disclose or use InnoSys‘s documents in the future. Thus, the propriety of sum- mary judgment on the injunctive relief claim hinges upon whether a dispute of material fact existed as to Ms. Mercer‘s continued possession of InnoSys‘s documents. ¶82 The party opposing summary judgment ―may not rest upon the mere allegations or denials of the pleadings, but the re- sponse, by affidavits or as otherwise provided in this rule, must set forth specific facts showing that there is a genuine issue for tri- al.‖ UTAH R. CIV. P. 56(e). If the opposing party fails to produce specific evidence creating a dispute of material fact, summary judgment shall be entered. Id.; Johnson, 2005 UT 82, ¶ 21 (affirming summary judgment on injunction claim where the opposing party ―failed to contest [the moving party‘s evidence] with specific sworn evidence as required under rule 56(e)‖). ¶83 Here, InnoSys did not produce any evidence that Ms. Mercer had retained electronic files containing InnoSys‘s trade se- crets. Before this litigation began, Ms. Mercer sent a letter to InnoSys asserting she did not copy or transfer InnoSys emails pri- or to deleting them. In her depositions, she affirmed that she no longer had access to the emails or the business plan because she permanently deleted them. And forensic scrutiny of Ms. Mercer‘s email account and electronic storage devices yielded no evidence that relevant files had been copied prior to deletion. In short, InnoSys produced no evidence indicating that Ms. Mercer secretly retained copies of InnoSys‘s files. It merely speculates that Ms. Mercer may still have access to the files. See Titaness Light Shop, LLC v. Sunlight Supply, Inc., 585 F. App‘x 390, 391 (9th Cir. 2014) (―To establish a likelihood of irreparable harm, conclusory or speculative allegations are not enough.‖). 38 Cite as: 2015 UT 80 J. DURHAM, dissenting ¶84 Absent evidence supporting a conclusion that Ms. Mercer retained the ability to use or disseminate the InnoSys files, sum- mary judgment was appropriate because InnoSys‘s allegations that Ms. Mercer posed a potential future risk to the company and its trade secrets are too ―remote and speculative‖ to merit an in- junction. Almurbati v. Bush, 366 F. Supp. 2d 72, 78 (D.D.C. 2005); Johnson, 2005 UT 82, ¶ 13 (requiring parties seeking injunctions to show that harm ―would‖ result from the absence of an injunc- tion); see also Am. Airlines, Inc. v. Imhof, 620 F. Supp. 2d 574, 580 (S.D.N.Y. 2009) (where a former employee offered to delete or re- turn all copies of documents and computer files he had taken from his former employer, injunctive relief was not warranted be- cause the former employer ―failed to establish the requisite threat of irreparable injury in respect of the copied documents‖). C. Preservation ¶85 The majority asserts that because Ms. Mercer did not spe- cifically argue below that InnoSys‘s injunctive relief claims failed because it did not produce evidence of a threatened future harm of unauthorized disclosure, this issue was not preserved and should not be considered by this court. Supra ¶¶ 40–41. But this argument ignores our well-established rule that the preservation rule does not apply to arguments for the affirmance of a judgment below: The appellate court will affirm the judgment, order, or decree appealed from if it is sustainable on any legal ground or theory apparent on the record, even though such ground or theory differs from that stat- ed by the trial court to be the basis of its ruling or ac- tion, and this is true even though such ground or theory is not urged or argued on appeal by appellee, was not raised in the lower court, and was not considered or passed on by the lower court. Blaisdell v. Dentrix Dental Sys., Inc., 2012 UT 37, ¶ 5 n.1, 284 P.3d 616 (emphasis added) (internal quotation marks omitted); accord Bailey v. Bayles, 2002 UT 58, ¶ 10, 52 P.3d 1158; Goodsel v. Dep’t of Bus. Regulation, 523 P.2d 1230, 1232 (Utah 1974). ¶86 At any rate, InnoSys raised the issue of whether evidence of a threatened harm precluded summary judgment as to the in- junctive relief claims. The issue of whether there was a dispute of 39 INNOSYS, INC. v. MERCER J. DURHAM, dissenting fact regarding future harm, therefore, was preserved because it was presented to the district court for resolution. Gressman v. State, 2013 UT 63, ¶ 45, 323 P.3d 998 (an issue is preserved if one party presents it to the district court in a manner that gives the court the opportunity to rule on it). D. Voluntary Reform ¶87 Citing trademark caselaw, the majority also argues that Ms. Mercer‘s ―voluntary reformation and cessation of unlawful activity‖ by deleting InnoSys‘s files does not necessarily defeat InnoSys‘s claim for injunctive relief. Supra ¶¶ 42–46. As the Su- preme Court has noted, ―the court‘s power to grant injunctive re- lief survives discontinuance of the illegal conduct.‖ W. T. Grant Co., 345 U.S. at 633. The principle that voluntary reformation does not necessarily defeat an injunctive relief claim makes sense in situations where a trademark infringer voluntarily stops the ille- gal activity after a lawsuit is filed. Where the only impediment to future harmful conduct is the defendant‘s self-imposed restraint, the likelihood of prospective infringement of an intellectual prop- erty right is a question of fact for the court. See id. (if the defendant discontinues the illegal conduct, the moving party must still show ―that there exists some cognizable danger of recurrent violation‖). ¶88 This case, however, is fundamentally different from the voluntary reformation caselaw cited by the majority. Unlike the typical trademark infringer who ceases illegal activity but retains the capability to reinitiate the harmful conduct in the future, Ms. Mercer undisputedly deleted InnoSys‘s emails and files. Thus, the future use or dissemination of the files is not just a matter of self- restraint. InnoSys has not produced evidence that Ms. Mercer re- tains the capacity to use its documents in the future. Absent evi- dence that she retained the ability to use or distribute the files, summary judgment was appropriate.2 2 In support of its argument that the district court improperly granted summary judgment, the majority also quotes Polo Fash- ions, Inc. v. Dick Bruhn, Inc., 793 F.2d 1132, 1135–36 (9th Cir. 1986), which states: ―If the defendants sincerely intend not to infringe, the injunction harms them little; if they do, it gives [the plaintiff] substantial protection of its trademark.‖ Supra ¶ 44. Although the (continued…) 40 Cite as: 2015 UT 80 J. DURHAM, dissenting ¶89 The majority cites Supreme Court precedent for the proposition that ―‗a defendant claiming that its voluntary compli- ance moots a case bears the formidable burden of showing that it is absolutely clear the allegedly wrongful behavior could not rea- sonably be expected to recur.‘‖ Already, LLC v. Nike, Inc., 133 S. Ct. 721, 727 (2013) (quoting Friends of the Earth, Inc. v. Laidlaw Envtl. Servs. (TOC), Inc., 528 U.S. 167, 190 (2000)). The majority concludes that under this precedent, ―the burden shifts to Mercer to carry the ‗formidable burden of showing that it is absolutely clear [that] the allegedly wrongful behavior could not reasonably be expected to recur‖ in order to avoid an injunction against her. Supra ¶ 43 (alteration in original); see also supra ¶ 43 n.24 (―[T]he burden of proving reform has shifted to Mercer.‖). The majority also sug- gests that Ms. Mercer must satisfy this ―‘formidable burden‘‖ in order to prevail on remand. Supra ¶ 46 n.25. ¶90 Already, LLC and Friends of the Earth, however, do not shift the burden to a defendant to prove that an injunction should not issue. In both of these cases, the defendant claimed that a fed- eral court had no Article III authority to adjudicate an injunctive relief claim because the defendant‘s actions had rendered the case or controversy moot. Already, LLC, 133 S. Ct. at 726–27; Friends of the Earth, 528 U.S. at 173–74. Thus, the Supreme Court‘s pro- nouncement that a defendant bears a ―formidable burden‖ was made in the specific context of the defendant‘s argument that a federal court lacked the authority to even adjudicate the injunc- tive relief claim. Because Ms. Mercer never claimed that InnoSys‘s injunctive relief claims were moot or challenged the district court‘s authority to decide these claims, Already, LLC and Friends of the Earth do not apply here. relative burden borne by the defendant is certainly relevant when a court weighs the equities of granting an injunction, a plaintiff may not be relieved of the burden of providing evidence of a threatened irreparable harm. ―[I]njunctions will not be issued merely to allay the fears and apprehensions or to soothe the anxie- ties of the parties. Nor will an injunction be issued to restrain one from doing what he is not attempting and does not intend to do.‖ Campbell Soup Co. v. ConAgra, Inc., 977 F.2d 86, 92 (3d Cir. 1992) (internal quotation marks omitted). 41 INNOSYS, INC. v. MERCER J. DURHAM, dissenting ¶91 Indeed, the Supreme Court has long recognized that alt- hough the court‘s power to grant injunctive relief survives discontinuance of the illegal conduct[,] . . . . the mov- ing party must satisfy the court that relief is needed. The necessary determination is that there exists some cognizable danger of recurrent violation, something more than the mere possibility which serves to keep the case alive. W. T. Grant Co., 345 U.S. at 633. Even though voluntary refor- mation does not divest the court of power to issue an injunction, it also does not relieve the moving party of the burden of meeting the requirements of proving an injunction is required. As noted above, InnoSys has failed to meet this burden by creating a dis- pute of material fact regarding a threat of future harm. But even if the majority disagrees with my conclusion regarding the proprie- ty of summary judgment on the injunctive relief claims, on re- mand, InnoSys still bears the burden of showing that the elements of a permanent injunctive relief claim have been satisfied in this case. Johnson, 2005 UT 82, ¶ 13 (listing the requirements for a per- manent injunction); Water & Energy Sys., 1999 UT 16, ¶¶ 8, 14. (party seeking an injunction bears the burden of proof). E. Inconsistent Testimony ¶92 On appeal, InnoSys contends that summary judgment on the injunction claim was inappropriate because it alleges Ms. Mer- cer gave false sworn testimony during a hearing on her unem- ployment benefits claim. InnoSys notes that Ms. Mercer incorrect- ly stated in the unemployment benefits hearing that she obtained the business plan the day before she was terminated because her supervisor instructed her to review it. She later clarified in this lit- igation that she acquired the plan on the day of her termination, although before InnoSys fired her. Ms. Mercer also testified in the unemployment benefits hearing that InnoSys‘s IT specialist gave her permission to transfer her work emails to her personal Gmail account. She then clarified in this litigation that she informed the IT specialist of her intention to forward the emails and he never told her not to do so. ¶93 The inconsistencies in Ms. Mercer‘s testimony are suscep- tible to an innocent explanation. The minor discrepancies may be 42 Cite as: 2015 UT 80 J. DURHAM, dissenting explained by the fact that Ms. Mercer did not anticipate that InnoSys would question her about her retention of work emails or the business plan, which was unrelated to the reasons for her ter- mination at issue in the unemployment benefits hearing. Once she was given notice of the claims InnoSys raised in this litigation, she could have simply produced more precise testimony. Moreover, her transfer of work emails to her Gmail account and her acquisi- tion of an electronic copy of the business plan also do not neces- sarily bespeak a nefarious intent to acquire InnoSys‘s trade secrets for later distribution or use. Ms. Mercer informed InnoSys‘s IT specialist of her intent to forward her work emails to Gmail and InnoSys does not contend that it discouraged or forbade this ac- tion. And Ms. Mercer‘s supervisor instructed her to review the business plan the day before she copied it to a thumb drive. Thus, her actions could have been motivated by nothing more than her stated desire to work from home, something she often did. Fur- thermore, the fact that she openly revealed to InnoSys that she had the emails and business plan by filing them in the unem- ployment benefits proceeding, apparently unaware that she had violated any legal duties by retaining the files after her termina- tion, indicates that she did not intend to secretly use or distribute InnoSys‘s documents. ¶94 However, these are not the only inferences that could be drawn from the evidence. A fact-finder could conclude that Ms. Mercer intentionally lied during the employment benefits hearing in an attempt to avoid suspicion of wrongdoing. And the acquisi- tion of emails and the business plan in a manner that allowed Ms. Mercer to retain them after her termination could itself be seen as an indication of an intent to use or distribute these documents. See E.I. DuPont de Nemours & Co. v. Kolon Indus., 894 F. Supp. 2d 691, 711 (E.D. Va. 2012) (in determining the scope of an injunction, courts may ―assess[] the misappropriator‘s conduct in effecting the misappropriation‖). Thus, if Ms. Mercer had access to InnoSys‘s trade secrets, summary judgment on the injunction claim likely would be inappropriate because Ms. Mercer‘s intent to use or distribute the information at some point in the future would be subject to conflicting inferences. But that is not the case here. InnoSys argued below that Ms. Mercer‘s acquisition of work emails and documents created a danger of future harm. InnoSys did not, however, present any evidence that Ms. Mercer retained copies of InnoSys documents after she deleted them from her 43 INNOSYS, INC. v. MERCER J. DURHAM, dissenting Gmail account and thumb drive. Supra ¶¶ 79–86. Absent any evi- dence that Ms. Mercer had the ability to use or distribute the doc- uments, the question of her intent to do so is irrelevant.3 3 The majority argues that there is a dispute of material fact precluding summary judgment for several other reasons. The ma- jority opinion cites, for example, the declaration of an attorney who opined that Google‘s terms of service agreement may permit Google to claim ownership of intellectual property transmitted through its email service and that the use of Gmail may constitute a public disclosure for the purpose of obtaining patent protection. Supra ¶ 50. But these are legal opinions (and unsupported legal opinions to boot). A nonmoving party ―cannot avoid summary judgment by reference to inadmissible legal opinions.‖ Hein- Muniz v. Aiken Reg’l Med. Ctrs., 905 F. Supp. 2d 729, 742 (D.S.C. 2012), aff’d, 532 F. App‘x 342 (4th Cir. 2013); see also Owen v. Kerr- McGee Corp., 698 F.2d 236, 240 (5th Cir. 1983) (―[A]llowing an ex- pert to give his opinion on the legal conclusions to be drawn from the evidence both invades the court‘s province and is irrelevant.‖). The majority also argues that there is a dispute of material fact as to whether Ms. Mercer could gain access to the work emails in the future because she might be able to recover them from Google despite being deleted. Supra ¶ 51. InnoSys, however, produced only the equivocal testimony of its IT employee to support its claim that the emails still resided on Google‘s servers. The InnoSys employee testified: I don‘t know much about it, but there was much talk on tech news about the fact Gmail would never let you delete a message. . . . [E]ven if a user deletes - - this may have changed - - at least for a considerable period of time, if a user deletes an e-mail from Google, you can‘t make it go away. This is not evidence because InnoSys‘s IT employee has no per- sonal knowledge regarding the presence of deleted emails on Google‘s servers, nor was he qualified to give expert testimony regarding Google‘s servers. Moreover, the employee gave no tes- timony regarding a user‘s ability to retrieve deleted emails from Google. (continued…) 44 Cite as: 2015 UT 80 J. DURHAM, dissenting III. SUMMARY JUDGMENT ON INNOSYS‘S BREACH OF FIDUCIARY DUTY CLAIM ¶95 As with the contract and misappropriation claims, the district court dismissed InnoSys‘s claim for breach of fiduciary duty on the grounds that InnoSys failed to establish damages stemming from Ms. Mercer‘s alleged breach. Because the breach of fiduciary duty claim rests upon the same evidence and reason- ing as the contract and misappropriation claims, I would affirm for the same reasons stated above. I would also affirm on the ad- ditional ground that the breach of fiduciary duty cause of action is precluded by the UTSA. ¶96 The UTSA explicitly states that ―this chapter displaces conflicting tort, restitutionary, and other law of this state provid- ing civil remedies for misappropriation of a trade secret,‖ UTAH CODE § 13-24-8(1), unless the remedy sought is contractual, a civil remedy that is ―not based upon misappropriation of a trade se- cret,‖ or criminal, id. § 13-24-8(2). Thus, civil remedies that are ―based upon misappropriation of a trade secret‖ are precluded by the UTSA. In other words, ―a claim is preempted to the extent that it is based on factual allegations supporting a misappropriation of trade secrets or otherwise confidential information.‖ CDC Restora- tion & Constr., LC v. Tradesmen Contractors, LLC, 2012 UT App 60, ¶ 48, 274 P.3d 317; accord Frantz v. Johnson, 999 P.2d 351, 357–58 (Nev. 2000) (examining an identical statutory provision and de- termining that a breach of fiduciary duty claim was preempted by Nevada‘s UTSA). Finally, the majority suggests that Ms. Mercer could retrieve paper copies of the emails from the file of her DWS proceedings. Supra ¶ 52. But because this theory was not advanced below or in the appellate briefs, a key factual predicate to this argument is missing from the record. There appears to be no record evidence that suggests the emails were retained in DWS‘s files of the un- employment benefits proceedings. Furthermore, there is no indi- cation that Ms. Mercer would seek to access the DWS files in the future. See Campbell Soup Co., 977 F.2d at 92 (―[A]n injunction [will not] be issued to restrain one from doing what he is not attempt- ing and does not intend to do.‖ (internal quotation marks omit- ted)). 45 INNOSYS, INC. v. MERCER J. DURHAM, dissenting ¶97 It is clear that in this case InnoSys‘s claim for breach of fi- duciary duty is based upon the same factual allegations that would support its claim for misappropriation of trade secrets. InnoSys argues that Utah law imposes a fiduciary duty upon em- ployees who receive confidential information during the course of their employment to (a) keep that information confidential, (b) not compete with their employer by using that information, and (c) return the information upon termination. InnoSys then alleges that it disclosed confidential information to Ms. Mercer under the protection of a signed NDA (thereby giving rise to the fiduciary duty) and that Ms. Mercer subsequently breached that duty by disclosing the confidential information during the DWS hearing. But as shown above, InnoSys must utilize these same facts to sub- stantiate its claim for misappropriation of trade secrets. Therefore, InnoSys‘s claim for breach of fiduciary duty is preempted by the UTSA, and its dismissal was proper for this additional reason. 46