Case: 15-11893 Date Filed: 07/27/2017 Page: 1 of 25
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 15-11893
________________________
D.C. Docket No. 1:11-cv-02278-WSD
EARTHCAM, INC.,
a Delaware corporation,
Plaintiff - Counter
Defendant - Appellant,
versus
OXBLUE CORPORATION,
a Georgia corporation,
CHANDLER MCCORMACK,
Individually,
JOHN PAULSON,
Individually,
BRYAN MATTERN,
Individually,
Defendants - Counter
Claimant - Appellees,
RICHARD P. HERMANN, II,
Defendant - Appellee.
Case: 15-11893 Date Filed: 07/27/2017 Page: 2 of 25
________________________
Appeal from the United States District Court
for the Northern District of Georgia
________________________
(July 27, 2017)
Before ED CARNES, Chief Judge, JORDAN, Circuit Judge, and SMITH, * District
Judge.
PER CURIAM:
EarthCam, Inc., appeals the summary judgment entered in favor of OxBlue
Corporation, Chandler McCormack, and Bryan Mattern (collectively known as the
“OxBlue Defendants”), and Richard Hermann. EarthCam contends that the district
court erred by (1) granting summary judgment on its trade secrets misappropriation
claim against the OxBlue Defendants on grounds they allegedly never raised; (2)
concluding that it had failed to assert a claim for injunctive relief; (3) granting
summary judgment on its claim of unauthorized computer access despite a genuine
issue over whether the OxBlue Defendants had accessed its computer system
without or in excess of authorization; and (4) granting summary judgment on its
trade secrets misappropriation claim against Mr. Hermann. EarthCam also appeals
the district court’s denial of its motion to reopen forensic discovery, arguing that it
*
Honorable C. Lynwood Smith, Jr., United States District Judge for the Northern District
of Alabama, sitting by designation.
2
Case: 15-11893 Date Filed: 07/27/2017 Page: 3 of 25
should be allowed to ascertain whether certain forensic information was withheld
and altered.
Following a review of the record and the parties’ briefs, and with the benefit
of oral argument, we affirm.
I
We exercise plenary review over a district court’s grant of summary
judgment. See Moton v. Cowart, 631 F.3d 1337, 1341 (11th Cir. 2011). In doing
so, we draw all inferences and review all of the evidence in the light most
favorable to the non-moving party. Id. The party moving for summary judgment
bears the burden of demonstrating that there is no genuine dispute of any material
fact and that it is entitled to judgment as a matter of law. Id. If the evidence
supporting the nonmoving party is merely colorable or not significantly probative,
summary judgment may be granted. See Anderson v. Liberty Lobby, Inc., 477 U.S.
242, 249–50 (1986).
We review the district court’s denial of a motion to reopen discovery for
abuse of discretion. See Artistic Entm’t, Inc. v. City of Warner Robins, 331 F.3d
1196, 1202 (11th Cir. 2003).
II
EarthCam raises five issues in its initial brief. We address the specific
arguments advanced by EarthCam and nothing more. See Access Now, Inc. v. Sw.
3
Case: 15-11893 Date Filed: 07/27/2017 Page: 4 of 25
Airlines Co., 385 F.3d 1324, 1330 (11th Cir. 2004) (“[A] legal claim or argument
that has not been briefed before the court is deemed abandoned and its merits will
not be addressed.”). Because we write for the parties, we set out only what is
necessary to explain our decision.
A
EarthCam argues that the district court erroneously granted summary
judgment on its trade secrets misappropriation claim against the OxBlue
Defendants under the Georgia Trade Secrets Act, O.C.G. § 10-1-760 et seq.
Specifically, with respect to two instances of alleged misappropriation (the so-
called “brute force attack” and the “OxBlue 3019” file), EarthCam contends that
the district court’s order was based on arguments not raised by the OxBlue
Defendants: (1) that the information obtained in the 2006 brute force attack lacked
economic value; and (2) that the data in the OxBlue 3019 file was not a trade
secret. The lack of notice, EarthCam contends, deprived it of an opportunity to
respond, in violation of Federal Rule of Civil Procedure 56(f).
The district court’s order and the motion filed by the OxBlue Defendants
belie EarthCam’s cry of summary judgment by ambush. In the portion of the
summary judgment motion attacking EarthCam’s trade secrets misappropriation
claim, the OxBlue Defendants maintained that EarthCam had to prove “(a) the
existence of a trade secret[ ] (b) that was misappropriated.” D.E. 228-1 at 7. After
4
Case: 15-11893 Date Filed: 07/27/2017 Page: 5 of 25
defining a “trade secret” as information that derives economic value from not
being generally known to others and that is the subject of reasonable efforts to
keep secret, see id. at 8 (citing O.C.G. § 10-1-761(4)), the OxBlue Defendants
generally argued that none of the information EarthCam identified—including
information obtained in the 2006 brute force attack and the OxBlue 3019 data, see
D.E. 228-20 ¶¶ 2, 5, 8—constituted “trade secrets” because the information was
“public,” belonged to third parties, or was general customer or business
information. See D.E. 228-1 at 7.
If this general assertion were not enough, the OxBlue Defendants then
lodged specific attacks against the 2006 brute force attack and the OxBlue 3019
data. With respect to the brute force attack, the OxBlue Defendants maintained
that any information they “scraped” from EarthCam’s website was regularly made
public by EarthCam, often for marketing purposes. See id. at 9–10. And
information intentionally publicized by EarthCam could not have derived its
economic value from secrecy, as required by § 10-1-761(4). See id. The district
court agreed with this argument, ruling against EarthCam in part because it “ha[d]
not presented any evidence to support that the information gathered in [the brute
force attack of] 2006 even potentially derived economic value from not being
generally known.” D.E. 292 at 31. The district court, in other words, based its
decision in part on an argument explicitly raised by the OxBlue Defendants.
5
Case: 15-11893 Date Filed: 07/27/2017 Page: 6 of 25
The OxBlue Defendants similarly contested OxBlue 3019’s status as a trade
secret, insisting throughout the motion that EarthCam had failed to identify what
exactly in the OxBlue 3019 file constituted a trade secret. See D.E. 228-1 at 11–12
(arguing that none of the information Mr. Hermann allegedly gave to OxBlue,
including the OxBlue 3019 file, was a trade secret), 12 n.13 (“[EarthCam] has not
specified what information contained [in OxBlue 3019] is a ‘trade secret.’”)
(citing the OxBlue Defendants’ statement of undisputed material facts in support of
their renewed motion for summary judgment, D.E. 228-2).
In sum, we conclude that EarthCam was sufficiently on notice that it had to
respond to the contention that the information obtained in the 2006 brute force
attack and the OxBlue 3019 data were not trade secrets under the GTSA. Because
we reject the only two grounds raised by EarthCam for reversing the summary
judgment granted on its trade secrets claim against the OxBlue Defendants, see Br.
of Appellant at 12–13, we affirm that portion of the district court’s order.
B
According to EarthCam, the OxBlue Defendants moved for summary
judgment solely as to the damages portion of its GTSA claim, so EarthCam
responded in part by arguing that it also sought an injunction prohibiting future use
or disclosure of trade secrets. The district court allegedly refused to consider this
argument on the ground that it was a “newly raised claim.” Br. of Appellant at 23
6
Case: 15-11893 Date Filed: 07/27/2017 Page: 7 of 25
(quoting D.E. 292 at 35). EarthCam argues that the district court was incorrect
because the request for injunctive relief had previously appeared in the second
amended complaint. See D.E. 117.
The OxBlue Defendants dispute EarthCam’s characterization of the district
court’s decision. See Br. of Appellees at 27–30. But even assuming everything
played out as EarthCam says it did, reversal is unwarranted because this issue is
mooted by our affirmance of the district court’s grant of summary judgment on the
merits of the GTSA claim against the OxBlue Defendants. By failing on the
merits, EarthCam cannot obtain any relief whatsoever under the GTSA.
C
EarthCam contends that the OxBlue Defendants violated the Computer
Fraud and Abuse Act, 18 U.S.C. § 1030, in May of 2011 when they accessed the
account webpage of an EarthCam customer, Forest City Ratner. The CFAA
prohibits, among other things, “intentionally access[ing] a computer without
authorization or [in excess of] authorized access, and . . . obtain[ing] . . .
information.” § 1030(a)(2)(C). EarthCam says that OxBlue personnel captured
and downloaded screenshots of the graphical user-interface running on FCR’s
7
Case: 15-11893 Date Filed: 07/27/2017 Page: 8 of 25
account webpage. See D.E. 255-4 at 4 ¶ 12 (describing the screenshots allegedly
captured by OxBlue personnel). 1
It turns out (and it is undisputed), however, that a man by the name of Chip
Foley, who was with FCR, had asked the OxBlue Defendants to troubleshoot
certain issues FCR was having with EarthCam equipment and had provided
OxBlue personnel his account login credentials to do so. See D.E. 255-1 at 47–51
¶¶ 11–23, at 66–67 ¶¶ 93–98. The district court found no CFAA violation given
this evidence, reasoning that the OxBlue Defendants had accessed the account
webpage with FCR’s authorization. The district court also concluded that nothing
in the End-User License Agreement applicable to FCR’s account prohibited FCR
from sharing its login credentials, and that the OxBlue Defendants did not
knowingly violate the EULA’s terms because there was “no evidence that the
OxBlue Defendants were familiar with the EULA, or that the OxBlue Defendants
viewed the EULA when they accessed FCR’s EarthCam account [on May 20 and
21, 2011].” D.E. 292 at 38.
EarthCam does not dispute that the OxBlue Defendants accessed the account
webpage under FCR’s authorization, and that the EULA did not prohibit FCR from
sharing its login credentials. Even so, EarthCam claims summary judgment was
incorrectly granted for two reasons.
1
This is the only alleged instance of unauthorized access at issue on appeal. See Br. of
Appellant at 25–26 & n.27 (relying on the FCR access as the basis for the CFAA claim).
8
Case: 15-11893 Date Filed: 07/27/2017 Page: 9 of 25
First, EarthCam argues that the access of the OxBlue Defendants was
without authorization because, in order to log on to FCR’s account, they
knowingly circumvented EarthCam’s security measures aimed at blocking OxBlue
personnel from accessing its webpage. See Br. of Appellant at 27. There is
evidence in the record that Mr. McCormack acknowledged that EarthCam was
blocking OxBlue’s IP address and that OxBlue personnel got around this by
masking their IP address. The OxBlue Defendants maintain, however, that this
argument is a complete nonstarter because it was never raised below. See Br. of
Appellees at 34 & n.21. EarthCam, in response, urges us not to disregard
OxBlue’s furtive evasion of its security measures, arguing that it properly
preserved that argument by presenting the facts to the district court in its response
to the OxBlue Defendants’ motion for summary judgment. See Reply Br. at 17–18
& n.8.
We agree with the OxBlue Defendants that EarthCam failed to preserve this
argument. EarthCam briefly addressed the OxBlue Defendants’ CFAA arguments
at summary judgment in Part III.B of its response. See D.E. 255 at 21–22. That
portion of the response made only two arguments: (1) that the OxBlue Defendants’
access was unauthorized, even though it was under the auspices of FCR’s
authority, because it violated the EULA; and (2) that there was sufficient evidence
in the record demonstrating that OxBlue personnel had previously viewed and
9
Case: 15-11893 Date Filed: 07/27/2017 Page: 10 of 25
accepted the EULA. See id. The IP-masking argument, as a basis for CFAA
liability, is nowhere to be found. Because EarthCam failed to press that below, we
will not consider it now. See Resolution Trust Corp. v. Dunmar Corp., 43 F.3d
587, 599 (11th Cir. 1995).
Second, EarthCam contends that there is a genuine dispute over whether the
OxBlue Defendants were “‘presumably familiar with the terms’ of the EULA”
applicable to FCR’s account, Br. of Appellant at 30 (quoting State Analysis, Inc. v.
Am. Fin. Servs. Assoc., 621 F. Supp. 2d 309, 316 (E.D. Va. 2009)), such that they
can be said to have knowingly violated the EULA’s prohibition against
“downloading screenshots of EarthCam’s software.” Id. At the end of the day, we
are not persuaded.
EarthCam relies on State Analysis for the proposition that knowingly
violating the terms of a licensing agreement renders access unauthorized. See Br.
of Appellant at 30. But that case is not exactly on point. The licensing agreement
in State Analysis prohibited licensees from sharing their login credentials. See
State Analysis, 621 F. Supp. 2d at 316 (“[The plaintiff-licensor] has pled that under
the terms of their contract, only clients were authorized to use [its] subscription
services . . . .”). And the defendant unquestionably knew this because it had once
been a client of the licensor’s and subject to the same licensing agreement. See id.
10
Case: 15-11893 Date Filed: 07/27/2017 Page: 11 of 25
The district court concluded that, because the defendant knew of this prohibition, it
could not “hide” behind any authorization derived from the licensee. See id.
FCR, on the other hand, was not prohibited from sharing its login
credentials. In fact, FCR could have made its account webpage public if it wished.
See D.E. 255-1 at 46 ¶ 5 (citing D.E. 255-4 at 8 ¶ 28). So, in contrast to State
Analysis, where the third-party access was unauthorized from inception by the
licensing agreement, this case presents the much more difficult question of whether
a person who otherwise has authorized access to a computer (as the OxBlue
Defendants undoubtedly had when FCR gave them permission to access its
account) exceeds authorization if he or she uses that access in a way that
contravenes any policy or term of use governing the computer in question (here,
the EULA’s prohibition against downloading screenshots, see Br. of Appellant at
30).
The CFAA does not define the phrase “without authorization,” but it defines
“exceeds authorized access” as “to access a computer with authorization and to use
such access to obtain or alter information in the computer that the accesser is not
entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). We have, in one published
opinion, expounded on what it means to “exceed authorized access.” See United
States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010). In Rodriguez, the defendant
had access, through his work as a TeleService representative for the Social
11
Case: 15-11893 Date Filed: 07/27/2017 Page: 12 of 25
Security Administration, to certain SSA databases containing sensitive personal
information. SSA policy authorized the defendant’s access to the databases only
for official business purposes. The defendant knew this, but chose to access the
database and obtain information for nonbusiness reasons. See id. at 1263. We
concluded that the defendant’s access, which had been in furtherance of
nonbusiness purposes, exceeded the authorization the SSA had given him, and
affirmed his conviction under the CFAA. See id. at 1263–64.
Although it is not entirely clear, one of the lessons from Rodriguez may be
that a person exceeds authorized access if he or she uses the access in a way that
contravenes any policy or term of use governing the computer in question. So,
assuming that the OxBlue Defendants actually violated the EULA, there is an
argument that downloading the screenshots “exceeded authorized access” under
Rodriguez.2
Even if this is a valid reading of Rodriguez, there is insufficient evidence
that the OxBlue Defendants knowingly violated the EULA, which is (and has been)
EarthCam’s theory of CFAA liability and, therefore, the only argument we are
2
We decided Rodriguez in 2010 without the benefit of a national discourse on the CFAA. Since
then, several of our sister circuits have roundly criticized decisions like Rodriguez because, in
their view, simply defining “authorized access” according to the terms of use of a software or
program risks criminalizing everyday behavior. See United States v. Valle, 807 F.3d 508, 527
(2d Cir. 2015); WEC Carolina Energy Sols. LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012);
United States v. Nosal, 676 F.3d 854, 862–63 (9th Cir. 2012) (en banc). Neither the text, nor the
purpose, nor the legislative history of the CFAA, those courts maintain, requires such a
draconian outcome. We are, of course, bound by Rodriguez, but note its lack of acceptance.
12
Case: 15-11893 Date Filed: 07/27/2017 Page: 13 of 25
obligated to address on appeal. See Access Now, 385 F.3d at 1330. Under that
theory, we think that EarthCam’s contention that the OxBlue Defendants
“presumably” knew the terms of the EULA governing FCR’s license is too much
of an inferential leap to withstand summary judgment.
Everyone agrees that OxBlue personnel did not encounter and accept the
EULA when they troubleshot FCR’s issues on May 20 and 21, 2011. See Reply
Br. at 18. But EarthCam says that OxBlue personnel had done so before, as
evidenced by log files showing that users with OxBlue IP addresses had “viewed
and accepted the EULA restrictions ‘numerous’ times between May 2010 and May
2011.” Br. of Appellant at 28 (quoting D.E. 255-4 at 5–6 ¶¶ 17–18). And so, the
argument goes, since OxBlue personnel had accepted the EULA in the past while
accessing other users’ accounts, they must have known that the EULA applied to
FCR’s account on May 20 and 21, 2011. See Reply Br. at 18 (conceding that the
relevant “intrusion” occurred on May 20 and 21, 2011, and that there is no direct
evidence that OxBlue personnel accepted the EULA on those dates). See also D.E.
255-1 at 49 ¶ 19 (describing EarthCam’s access onto FCR’s account as the “May
2011 intrusion”).
Bill Sharp, EarthCam’s vice president of technology, explained how the
EULA worked. He testified that all users with an EarthCam account must accept
the EULA the very first time they log on to their accounts. See D.E. 255-19 at
13
Case: 15-11893 Date Filed: 07/27/2017 Page: 14 of 25
147–48. EarthCam’s system automatically prompts them. See id. After accepting
it once, the system does not prompt users again unless there is a change in terms.
See id. But there is no evidence that the OxBlue Defendants knew any of this. The
log files, even in the light most favorable to EarthCam, only indicate that users
with OxBlue’s IP address had accepted the EULA in the past. See D.E. 255-1 at
48 ¶ 16. It is unclear whether the version those users accepted is the same version
that applied to FCR’s account on May 20 and 21, 2011. But even if it was the
same version, nothing in the record indicates that the OxBlue Defendants knew
that the EULA governing FCR’s account was the same one they had previously
accepted. It would not be odd, for instance, if the terms of the EULA varied by
customer, depending on the customer’s needs and bargaining power.
Unlike the surefire evidence establishing knowledge in State Analysis,
EarthCam’s assertion that the OxBlue Defendants had knowledge of the EULA’s
terms hinges on layers of inference. From the simple fact that users with an
OxBlue IP address had previously accepted the EULA, EarthCam wants us to
allow a jury to find that the OxBlue Defendants knew the specifics of the EULA
governing FCR’s account. In between those two points, however, are a string of
inferences about EarthCam’s knowledge, including knowing that every EarthCam
customer was subject to an EULA, that all customers were all subject to the same
EULA, and that there had not been a new version between logins. We believe this
14
Case: 15-11893 Date Filed: 07/27/2017 Page: 15 of 25
too attenuated to create a jury question on knowledge. See Salter v. Westra, 904
F.2d 1517, 1525 (11th Cir. 1990) (“When inferences are built upon inferences, the
probability of the last or ultimate inference is attenuated by each underlying
inference.”).
Accordingly, we affirm the district court’s grant of summary judgment on
EarthCam’s CFAA claim.
D
EarthCam next argues that the district court erroneously granted summary
judgment on its GTSA claim against Mr. Hermann. The district court made two
rulings as to this particular claim. First, the district court found that EarthCam and
Mr. Hermann had executed a general release on August 13, 2008, that now
precluded EarthCam from relying on any pre-release conduct to substantiate its
GTSA claim. Second, the district court analyzed the email correspondence
between Mr. Hermann and the OxBlue Defendants after August 13, 2008, and
concluded that none of the information exchanged constituted a trade secret.
EarthCam does not challenge the district court’s interpretation of the general
release. See Br. of Appellant at 31. Instead, EarthCam only appeals the district
15
Case: 15-11893 Date Filed: 07/27/2017 Page: 16 of 25
court’s conclusion that none of the information Mr. Hermann allegedly provided to
OxBlue in emails after August 13, 2008, constituted a trade secret. 3
Under the GTSA, a plaintiff must prove that “(1) it had a trade secret and (2)
the opposing party misappropriated the trade secret.” Camp Creek Hosp. Inns,
Inc. v. Sheraton Franchise Corp., 139 F.3d 1396, 1410 (11th Cir. 1998). The
GTSA defines trade secret as information that derives economic value from not
being well known to others and is the subject of reasonable efforts to maintain its
secrecy. See O.C.G. § 10-1-761(4). “Whether a particular type of information
constitutes a trade secret is a question of fact.” Camp Creek, 139 F.3d at 1410–11.
See also Outside Carpets, Inc. v. Indus. Rug Co., 228 Ga. 263, 267 (1971). That
being said, we have “consistently held that conclusory allegations without specific
3
In addition to the various emails exchanged after August 13, 2008, EarthCam also argues that
Mr. Hermann gave the OxBlue Defendants trade secrets in a file called OxBlue 3019. The
parties dispute exactly when the OxBlue Defendants obtained the 3019 file. EarthCam says it
was in June of 2009, while the OxBlue Defendants contend that it was in July of 2008. See Br.
of Appellant at 6; Br. of Mr. Hermann at 9. The date of the transfer is important because it
determines whether the general release applies, such that EarthCam may rely on the 3019 file to
substantiate its GTSA claim against Mr. Hermann.
EarthCam’s theory on the date of the transfer stems from an email sent on June 19, 2009, in
which Mr. Hermann asked Mr. McCormack for an FTP site to upload several files. FTP sites,
according to EarthCam, are used to transfer large amounts of data. The 3019 file being a very
large file, EarthCam argues that the “logical[ ] infer[ence]” is that Mr. Hermann transferred the
3019 file using the FTP site, in 2009. See Br. of Appellant at 6.
Yet again, EarthCam overreaches. On its face, the email does not reference the 3019 data. The
capabilities of an FTP site tell us nothing about what the medium was actually used for. Making
conclusions about the 3019 data, without more, is nothing more than sheer speculation. Mr.
McCormack, in contrast, affirmatively testified that he acquired the 3019 file in 2008. See D.E.
256-33 at 373. In short, we agree with the district court that the June 19 email is not enough to
create a jury question on whether the 3019 data was transferred in 2009.
16
Case: 15-11893 Date Filed: 07/27/2017 Page: 17 of 25
supporting facts have no probative value for a party resisting summary judgment.”
Bazemore v. Jefferson Capital Sys., LLC, 827 F.3d 1325, 1333 (11th Cir. 2016)
(internal quotation marks omitted).
The district court granted summary judgment after concluding that the
emails only contained general information that Mr. Hermann had learned during
his tenure with EarthCam. Information stored in an employee’s mind, the district
court explained, was not protected by the GTSA. See Manuel v. Convergys Corp.,
430 F.3d 1132, 1140 (11th Cir. 2005) (collecting Georgia cases holding that the
GTSA does not prohibit a former employee from exploiting the knowledge he or
she accumulated during the prior employment). EarthCam, citing several emails as
evidence, argues that the district court incorrectly characterized the exchanges as
information “in [Mr. Hermann’s] head.” Br. of Appellant at 32.
The debate over whether the information was truly in Mr. Hermann’s head is
a sideshow because, as the district court recognized, even if we agree that Mr.
Hermann was not merely recalling general information from memory, EarthCam
did not provide sufficient evidence demonstrating that the email correspondence
after August 13, 2008, contained trade secrets. See D.E. 292 at 53 (describing the
17
Case: 15-11893 Date Filed: 07/27/2017 Page: 18 of 25
email correspondence from 2009–2010 as suffering from the same flaw as the
other evidence presented by EarthCam). 4
Almost exclusively, EarthCam relies on an affidavit by Mr. Sharp to
establish that the emails contained trade secrets. See D.E. 256-3. See also D.E.
256-1. His affidavit is littered with conclusory allegations, all following the same
script. First, Mr. Sharp vaguely alleges that Mr. Hermann gave away some kind of
information, such as EarthCam’s “revenue sources and income model.” D.E. 256-
3 at 17 ¶ 54. Then, he labels the information a “proprietary trade secret.” Id. at
16–18 ¶¶ 53–55, 58–62. And finally, instead of fleshing out what he means, Mr.
Sharp flatly declares that the particular piece of information “was not publicly
available and gave EarthCam a competitive advantage.” Id. at 16–19 ¶¶ 53–62.
This sort of conclusory labeling and bare recitation of a statutory definition is
precisely the kind of evidence that we have held cannot withstand summary
judgment. See Bazemore, 827 F.3d at 1333.
As an example of the circular nature of EarthCam’s evidence, take an email
sent by Mr. Hermann referencing EarthCam’s use of timers in its solar system. See
D.E. 230-21. The parties dispute whether this information is a trade secret. At
summary judgment, Mr. Hermann argued that the information is not a trade secret
4
For purposes of our review of EarthCam’s GTSA claim against Mr. Hermann, these post-
release emails are the only evidence EarthCam has left to substantiate its claim and survive
summary judgment. Recall that EarthCam has abandoned a GTSA claim against Mr. Hermann
based on pre-release misappropriation, and that we have agreed with the district court that no
reasonable juror could find that the OxBlue 3019 file was transferred after the release.
18
Case: 15-11893 Date Filed: 07/27/2017 Page: 19 of 25
because any purchaser of an EarthCam camera would know about the timer. To
support his contention, Mr. Hermann cited the deposition of Mr. McCormack, in
which he explained that the use of timers in these systems is “standard” and that
OxBlue itself had an integrated timer for purposes of making its systems more
efficient. See D.E. 230-1 at 4 ¶ 28 (citing D.E. 230-7 at 12). Mr. McCormack
further explained that the timers themselves are made by a company called Dial,
and that the integrated timer is provided by SunWize. See D.E. 230-7 at 13. If
these factual allegations are true, then the information disclosed by Mr. Hermann is
not protected because information available in the public domain, such as
information sold to customers or known throughout the industry, does not
constitute a trade secret. See Roboserve, Ltd. v. Tom’s Foods, Inc., 940 F.2d 1441,
1454 (11th Cir. 1991) (explaining that placing information in the public domain
destroys any reasonable expectation of privacy and is not protected by Georgia
law). Without a genuine dispute as to these facts, then, Mr. Hermann would be
entitled to summary judgment on EarthCam’s GTSA claim.
EarthCam responded by alleging, in relevant part, that Mr. Hermann
“provide[d] OxBlue information that EarthCam considered confidential.” D.E.
256-1 at 10. And it supported this allegation with a citation to its own statement of
material facts that reads:
On October 12, 2009, Hermann provided information EarthCam
considered confidential on EarthCam’s solar timer system and the
19
Case: 15-11893 Date Filed: 07/27/2017 Page: 20 of 25
way in which EarthCam received better run times and performance
from their systems.
Id. at 33 ¶ 88. But allegations in a party’s statement of material facts are
themselves not evidence. See Fed. R. Civ. P. 56(c)(1)(A). Such statements require
a foundation in the record. See id. The only record support cited by EarthCam was
to the very same email at issue. See D.E. 256-1 at 33 ¶ 88 (citing Exhibit 45, D.E.
256-50); D.E. 256-50. That email tells us what Mr. Hermann communicated to
Mr. McCormack, but it does not explain why the information is a trade secret, nor
does it refute Mr. McCormack’s testimony (cited by Mr. Hermann) that the timers
were industry standard, that OxBlue’s systems already used integrated timers, and
that the timers were manufactured and provided by third-party vendors.
EarthCam’s other allegations about the timer similarly fail to create a
genuine dispute. Immediately after it asserted (with no evidentiary support) that
the timer was “confidential,” EarthCam repeated its usual incantation that the
information on the timer “was not publicly available and gave EarthCam a
competitive advantage.” D.E. 256-1 at 33 ¶ 89. And, in support, it cites none
other than Mr. Sharp’s own verbatim recitation of this conclusory statement. See
id. (citing Exhibit 3, D.E. 256-3, ¶ 61); D.E. 256-3 at 19 ¶ 61.
This exercise in tautology is not limited to the disclosure of the timer.
Nearly every assertion on the information disclosed in the post-release emails
eventually makes its way back to Mr. Sharp’s affidavit. See, e.g., D.E. 256-1 at
20
Case: 15-11893 Date Filed: 07/27/2017 Page: 21 of 25
29–33 ¶¶ 61, 63, 67, 69, 71, 77, 79, 81, 83, 85, 89, 91. Declaring that something
is confidential and a trade secret is not the same thing as providing evidence that
the information (a) “is not commonly known by or available to the public,” (b)
“[d]erives economic value . . . from not being generally known,” and (c) “[i]s the
subject of efforts that are reasonable under the circumstances to maintain its
secrecy.” See O.C.G. § 10-1-761. And so, we agree with the district court that
EarthCam has failed to provide sufficient evidence from which a reasonable juror
could conclude that Mr. Hermann disclosed, in the email correspondence after
August 13, 2008, EarthCam’s trade secrets.
E
EarthCam appeals the denial of its motion to reopen discovery. According
to EarthCam, it was entitled to reopen discovery because John deCraen, the
OxBlue Defendants’ computer forensic expert, violated the forensic investigation
protocol the parties had agreed upon in several ways: first, by failing to turn over
all of the 3019 data he encountered during his forensic analysis; second, for the
3019 data he did produce, by providing an incomplete image of the device that
contained the data, which made it impossible for EarthCam’s expert to determine
what exactly was done with the data; and third, by not following and applying
industry standard practices in his analysis. We conclude that the district court did
not abuse its discretion in denying EarthCam’s motion.
21
Case: 15-11893 Date Filed: 07/27/2017 Page: 22 of 25
When a party fails to complete discovery in time, it may move to reopen
discovery and the court may, “for good cause,” grant the motion if the party shows
that it failed “because of excusable neglect.” Fed. R. Civ. P. 6(b)(1)(2). The
Supreme Court has generally instructed courts to consider four factors in
determining whether a party has shown excusable neglect: (1) the danger of
prejudice to the nonmovant; (2) the length of the delay and its potential impact on
judicial proceedings; (3) the reason for the delay, including whether it was within
the reasonable control of the movant; and (4) whether the movant acted in good
faith. See Pioneer Inv. Servs. Co. v. Brunswick Assocs. Ltd. P'ship, 507 U.S. 380,
395 (1993).
EarthCam bears significant responsibility for failing to complete forensic
discovery within the original period prescribed by the district court. EarthCam
filed this lawsuit on July 12, 2011, and discovery did not end until August 30,
2013, after several extensions by the district court. See, e.g., D.E. 27; D.E. 189;
D.E. 202. Forensic discovery was pursuant to an investigation protocol that the
parties, together with a court-appointed computer forensic mediator, had negotiated
and agreed upon. See D.E. 249-8. The OxBlue Defendants produced the
information required by the protocol in May of 2013, but EarthCam did not move
to reopen discovery until October 1, 2013.
22
Case: 15-11893 Date Filed: 07/27/2017 Page: 23 of 25
Part of EarthCam’s justification for the delay was that it did not know of
several alleged shortcomings in the OxBlue Defendants’ forensic production until
it deposed Mr. deCraen. See D.E. 292 at 71. It is not entirely clear why EarthCam
could not figure out the alleged shortcomings sooner, especially since it had
already retained its own computer forensic expert, Jim Persinger. Mr. Persinger, at
least as contemplated by the investigation protocol, played a significant role in
reviewing Mr. deCraen’s production. More importantly, as the district court
pointed out, EarthCam chose to depose Mr. deCraen on the last day of discovery.
See id. So even if a deposition was necessary, it was EarthCam’s fault for not
deposing him sooner.
Additionally, at the time of the motion, the OxBlue Defendants had already
filed two fully-briefed motions for summary judgment. The district court had
previously denied, without prejudice, the OxBlue Defendants’ motion for summary
judgment after it granted EarthCam’s motion to expand discovery and designate
Mr. Persinger (whom the district court allowed EarthCam to designate after the
initial discovery period, see D.E. 189 at 10, 12–14) as its computer forensic expert
witness. See D.E. 202 at 2 n.1. Like their first motion, the OxBlue Defendants’
second motion would most likely have been rendered moot by additional
discovery. In light of EarthCam’s unjustified delay, it would have been prejudicial
23
Case: 15-11893 Date Filed: 07/27/2017 Page: 24 of 25
to require the OxBlue Defendants to brief and file a third motion for summary
judgment.
We also doubt EarthCam’s contention that Mr. deCraen’s performance was
substandard. Mr. deCraen’s forensic production was pursuant to a protocol that he
crafted along with Mr. Persinger and a neutral court expert. Mr. deCraen’s
techniques, and any problems EarthCam may have had with them, could and
should have been addressed upfront. Yet EarthCam never challenged, by way of a
Daubert motion, Mr. deCraen’s capabilities as an expert at any time before the
district court. It cannot do so now in stoppage time.
Finally, try as it may to paint its request for additional discovery as a
necessary byproduct of austere discovery orders, we are not convinced by
EarthCam’s arguments. Because the impact on judicial proceedings of extending
discovery varies from case to case, district courts have considerable leeway in
handling discovery matters. The district court in this case struck a careful balance
between unwieldy discovery costs and the search for truth. It allowed considerable
and lengthy forensic discovery of several computer devices that EarthCam
believed to be involved in the alleged computer attacks. And it did so with the aid
of both neutral and partisan experts (four computer forensic experts have worked
on this case at one point or another), several of whom filed expert reports in this
case.
24
Case: 15-11893 Date Filed: 07/27/2017 Page: 25 of 25
On this record, and given the protracted nature of this litigation and the
district court’s thorough order, we do not find an abuse of discretion. See Macklin
v. Singletary, 24 F.3d 1307, 1311 (11th Cir. 1994) (explaining that the abuse of
discretion standard allows a “range of choice” for the district court as long as there
is no “clear error of judgment”) (citation and internal quotation marks omitted).
III
For these reasons, we affirm the district court’s grant of summary judgment.
AFFIRMED.
25