UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
HEDGEYE RISK MANAGEMENT, LLC,
Plaintiff,
v. Civil Action No. 16-935 (RDM)
PAUL HELDMAN, et al.,
Defendants.
MEMORANDUM OPINION AND ORDER
This is round two in a dispute between an investment advisory company, Hedgeye Risk
Management, and one of its former employees, Paul Heldman. Hedgeye purchased the assets of
Heldman’s former employer, Potomac Research Group (“PRG”), in December 2015. After the
purchase, Hedgeye and Heldman were unable to come to terms on an employment agreement.
Heldman, accordingly, left Hedgeye after just five weeks to start his own firm. In round one,
Hedgeye brought suit against Heldman and his new company, Heldman Simpson Partners
(“HSP”), seeking, among other things, a preliminary injunction to enforce non-compete and non-
solicitation clauses in Heldman’s employment contract with PRG. Defendants, in turn, opposed
Hedgeye’s motion and moved to dismiss or, in the alternative, for summary judgment. The
Court agreed with Defendants and, thus, denied Hedgeye’s motion for a preliminary injunction,
granted Defendants summary judgment on Hedgeye’s claim for breach of the non-compete and
non-solicitation provisions, and dismissed Hedgeye’s remaining claims without prejudice. See
Hedgeye Risk Mgmt., LLC v. Heldman, 196 F. Supp. 3d 40 (D.D.C. 2016).
In round two, Hedgeye has now filed an amended complaint renewing and supplementing
its claims for breach of fiduciary duty, interference with advantageous business relations, and
constructive trust. And, once again, Heldman and HSP have moved to dismiss or, in the
alternative, for summary judgment. Hedgeye opposes that motion and also seeks leave to file a
second amended complaint, which would add claims for violation of the Computer Fraud and
Abuse Act (“CFAA”), 18 U.S.C. § 1030, and conversion.
For the reasons that follow, the Court will DENY Defendants’ motion for summary
judgment without prejudice, will GRANT in part and DENY in part Defendants’ motion to
dismiss, and will DENY without prejudice Hedgeye’s motion for leave to amend.
I. BACKGROUND
The Court recounted much of the relevant background in its prior opinion, see Hedgeye,
196 F. Supp. 3d at 42–45, and will, accordingly, only briefly outline the facts and allegations
relevant to the pending motions. In considering Heldman’s motion to dismiss and Hedgeye’s
motion for leave to amend, moreover, the Court will accept Hedgeye’s factual allegations as true.
See Ashcroft v. Iqbal, 556 U.S. 662, 679 (2009). Although that standard does not apply to
Heldman’s motion for summary judgment, Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248–
49 (1986), that distinction will have no bearing on the Court’s decision for reasons explained
below, see infra Part II.A.
Hedgeye is an investment advisory firm that “provides financial and economic research
and analysis to institutional investors and newsletter products to mass market customers.” Dkt.
28 at 2 (Am. Compl. ¶ 5). On December 15, 2015, Hedgeye purchased the assets of Heldman’s
employer, PRG. Id. (Am. Compl. ¶ 8). Heldman worked for Hedgeye for approximately five
weeks following the sale. Id. (Am. Compl. ¶ 9). He left on January 21, 2016 to found HSP,
which “directly competes with Hedgeye.” Id. at 2–3 (Am. Compl. ¶¶ 11, 20).
2
While he was still employed by Hedgeye, Heldman allegedly recruited Hedgeye
employees, solicited Hedgeye clients, and used Hedgeye resources to start his own firm.
Hedgeye alleges, for example, that Heldman “recruited two other Hedgeye employees to join
him in the new business.” Id. at 3 (Am. Compl. ¶ 20). In addition, although the amended
complaint does not identify any particular companies, Hedgeye alleges—on “information and
belief”—that Heldman solicited Hedgeye’s clients before leaving the firm. 1 Id. at 4 (Am.
Compl. ¶ 22). Finally, Hedgeye alleges that Heldman “used [Hedgeye’s] instrumentalities to
start his business while he was still employed with Hedgeye.” Id. at 3 (Am. Compl. ¶ 19).
After Heldman’s exit, Hedgeye enlisted Setec Security Technologies, Inc. (“Setec”) “to
perform a forensic examination of the laptop computer used by Heldman.” Id. at 2 (Am. Compl.
¶ 12). Setec’s investigation revealed the following: First, “Heldman’s computer was found to
have logged several USB storage devices during his employment with Hedgeye,” which
Hedgeye asserts “suggest[s] improper information downloads.” Id. at 3 (Am. Compl. ¶ 14).
Second, Heldman “open[ed] a large number of files and folders on the Hedgeye network shared
drive,” including “[d]ozens of . . . files and folders [that were] highly sensitive and contain[ed]
documents that Heldman would not have . . . access[ed] in his normal and ordinary course of
business.” Id. (Am. Compl. ¶¶ 15–16). Third, “many emails were sent [by Heldman] to
individuals requesting in-person meetings.” Id. (Am. Compl. ¶ 17). Fourth, “Heldman’s web-
1
Without this temporal limitation, the amended complaint alleges generally that, “[a]s a result
of Heldman’s activities, several clients have left Hedgeye, or have moved all or portions of their
business from Hedgeye, including Partner Fund Management, L.P. (U.S.) and Redmile [G]roup,
LLC,” which has “had a significant and detrimental financial impact [on] Hedgeye’s revenue.”
Dkt. 28 at 4 (Am. Compl. ¶¶ 23–24). There is a material difference, however, between soliciting
Hedgeye’s clients while still employed by Hedgeye and competing for those clients after leaving
the firm. With respect to the specific clients referenced in the amended complaint, Hedgeye fails
to address this critical distinction.
3
browsing history revealed contact lookups, contact searches and dozens of individual contacts
being referenced in late December 2015, through January 13, 2016.” Id. (Am. Compl. ¶ 18).
Against this backdrop, the amended complaint asserts three causes of action. First,
Hedgeye alleges that Heldman breached his duty of loyalty to Hedgeye “by actively soliciting
[Hedgeye’s] clients and employees while employed [by] Hedgeye” and “by using and
appropriating confidential and sensitive Hedgeye information” through the use of “Hedgeye
instrumentalities.” Id. at 4 (Am. Compl. ¶ 28). Second, it avers that Heldman tortiously
interfered with Hedgeye’s “business relationships.” Id. at 5 (Am. Compl. ¶ 31). Third, it asserts
a claim for “constructive trust” and requests that the Court declare that “Defendants are
involuntary trustees holding . . . profits in constructive trust” for Hedgeye. Id. at 6 (Am. Compl.
¶ 36).
Defendants move to dismiss and, in the alternative, move for summary judgment. Dkt.
30. Hedgeye opposes both motions, Dkt. 33, and also moves for leave to file a second amended
complaint, Dkt. 38, which would add claims for violation of the CFAA and for common law
conversion.
II. ANALYSIS
A. Defendants’ Motion for Summary Judgment
As an initial matter, the Court concludes that Defendants’ motion for summary judgment
is premature. That motion is supported by Heldman’s own declaration, which denies the core
allegations of the amended complaint. He attests, for example, that before his departure he
“worked diligently with the best interests of Hedgeye in mind” and “sought to contact clients
who had engaged PRG in order to facilitate a transition of their business to Hedgeye,” Dkt. 30-1
at 2 (Heldman Decl. ¶ 6); that, while he worked at Hedgeye, he “did not access or review any
files, folders, documents or information that [he] was not authorized to access,” id. (Heldman
4
Decl. ¶ 8); that he has not “used any property or information belonging to Hedgeye” while at
HSP, id. at 3 (Heldman Decl. ¶ 9); that “[a]t no time while [he] worked at Hedgeye did [he]
suggest or request that a client move its business away from Hegdeye,” id. (Heldman Decl. ¶ 12);
and that he “did not encourage” the two former Hedgeye employees who joined him at HSP “to
terminate their employment with Hedgeye” but, rather, that “they approached [him],” id. at 4
(Heldman Decl. ¶ 15).
Although Heldman’s declaration provides important evidence, it is asking too much to
require Hedgeye to controvert this evidence without first having any opportunity to engage in
discovery. Federal Rule of Civil Procedure 56(d) speaks directly to this concern and provides
that, “[i]f a nonmovant shows by affidavit or declaration that, for specified reasons, it cannot
present facts essential to justify its opposition,” the Court may deny the motion and permit the
nonmovant to take appropriate discovery. Fed. R. Civ. P. 56(d). Such an affidavit must satisfy
three criteria. See Convertino v. U.S. Dep’t of Justice, 684 F.3d 93, 99–100 (D.C. Cir. 2012); see
also U.S. ex rel. Folliard v. Gov’t Acquisitions, Inc., 764 F.3d 19, 26 (D.C. Cir. 2014) (“[D]istrict
courts must assess all the requirements discussed in Convertino.”). First, it must “outline the
particular facts [the party] intends to discover and describe why those facts are necessary to the
litigation.” Convertino, 684 F.3d at 99. Second, it must explain “why [the party] could not
produce [the facts] in opposition to the motion [for summary judgment].” Id. at 99–100 (second
and third alterations in original) (quoting Carpenter v. Fed. Nat’l Mortg. Ass’n, 174 F.3d 231,
237 (D.C. Cir. 1999)). Finally, the affidavit must demonstrate that “the information is in fact
discoverable.” Id. at 100.
Consistent with Rule 56(d) and these requirements, Hedgeye has submitted an affidavit
describing the specific discovery it needs to respond to Defendants’ motion for summary
5
judgment. As explained in that affidavit, Hedgeye seeks to discover two categories of
information: (1) “the nature of [the] conversations . . . Heldman had with approximately eleven
clients of [Hedgeye] who subsequently hired [HSP] . . . and [with] two employees who
subsequently left Hedgeye for [HSP],” and (2) “facts surrounding how [Heldman] used
[Hedgeye’s] property and highly proprietary intellectual property to start [HSP] . . . includ[ing]
whether [Hedgeye’s] proprietary data can be found on [HSP’s] systems and whether Defendants
used such data in the production of their research reports.” Dkt. 33-1 at 1 (Prisby Aff. ¶¶ 1–2).
The affidavit also explains that Hedgeye has been unable to obtain this information “despite
diligent investigation” because it has not been able “to depose Heldman, the departed Hedgeye
employees, or anyone at the Hedgeye client firms,” nor has it had the chance to inspect
Heldman’s Hedgeye-issued smartphone or HSP’s “electronic storage systems.” Id. at 2 (Prisby
Aff. ¶¶ 3–4). Importantly, the affidavit further avers that several former Hedgeye clients have
stated that they will not “provide testimony” without a subpoena. Id. (Prisby Aff. ¶ 3). Finally,
the affidavit attests that Hedgeye would be able to obtain this information if permitted to depose
witnesses and to inspect the electronic devices and systems in question. Id. (Prisby Aff. ¶ 5).
The affidavit readily satisfies the requirements of Rule 56(d), as explicated by the D.C.
Circuit. Because “summary judgment is [typically] premature unless all parties have ‘had a full
opportunity to conduct discovery,’” Convertino, 684 F.3d at 99 (quoting Liberty Lobby, 477 U.S.
at 257), and because Hedgeye has made the required showing, the Court will deny Defendants’
motion for summary judgment as premature. Heldman, of course, remains free to move for
summary judgment after Hedgeye has had the opportunity to take appropriate discovery. 2
2
The Court recognizes the burden that discovery might impose on both parties by, among other
things, potentially intruding on existing business relationships, and it will monitor the discovery
6
B. Defendants’ Motion To Dismiss
To survive a motion to dismiss, a complaint “must contain sufficient factual matter,
accepted as true, to ‘state a claim to relief that is plausible on its face.’” Iqbal, 556 U.S. at 678
(quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). The “plausibility standard . . .
asks for more than a sheer possibility that a defendant has acted unlawfully.” Id. To meet the
threshold of plausibility, the plaintiff must plead “factual content that allows the court to draw
the reasonable inference that the defendant is liable for the misconduct alleged.” Id. The Court,
in assessing plausibility, must “assume [the] veracity” of “well-pleaded factual allegations,” id.
at 679, and it must “grant [the] plaintiff the benefit of all inferences that can be derived from the
facts alleged,” Sparrow v. United Air Lines, Inc., 216 F.3d 1111, 1113 (D.C. Cir. 2000) (internal
quotation marks omitted). Unlike well-pleaded factual assertions, however, “[t]hreadbare
recitals of the elements of a cause of action [and] mere conclusory statements” are “not entitled
to the assumption of truth.” Iqbal, 556 U.S. at 678–79.
1. Breach of Fiduciary Duty
The Court concludes that Hedgeye’s amended complaint includes enough factual detail to
state a plausible claim for breach of fiduciary duty. To plead a claim for breach of fiduciary duty
under D.C. law, a plaintiff must allege facts sufficient to show that (1) the defendant owed the
plaintiff a fiduciary duty; (2) the defendant breached that duty; and (3) the breach proximately
caused an injury. See Dorsey v. Am. Express Co., 680 F. Supp. 2d 250, 254 (D.D.C. 2010). For
present purposes, Defendants focus on only the second element and argue that “Hedgeye does
not allege any facts showing an actual breach of [Heldman’s] duty of loyalty.” Dkt. 30 at 12.
process to ensure that any discovery is “proportional to the needs of the case,” as specified in
Rule 26(b). See Fed R. Civ. P. 26(b)(1).
7
As Defendants observe, an employee “is entitled to make arrangements to compete” with
his employer—even before terminating his employment—subject to several limitations. Mercer
Mgmt. Consulting, Inc. v. Wilde, 920 F. Supp. 219, 233 (D.D.C. 1996) (quoting Restatement
(Second) of Agency § 393 cmt. e). The employee, “[i]n preparing to compete, . . . may not
commit fraudulent, unfair, or wrongful acts, such as misuse of confidential information.” Id. at
234 (citing Sci. Accessories Corp. v. Summagraphics Corp., 425 A.2d 957, 965 (Del. 1980).
And the employee “must refrain from actively and directly competing with [his existing]
employer for customers and employees” through solicitation, while he is still employed. Id.
(quoting William M. Fletcher, Fletcher Cyclopedia of the Law of Private Corporations § 856
(1994)).
Hedgeye alleges that Heldman misused proprietary information and solicited Hedgeye
clients and employees. See Dkt. 28 at 4 (Am. Compl. ¶ 28). Unlike Hedgeye’s original
complaint, moreover, the amended complaint alleges facts that permit a reasonable inference that
Heldman used Hedgeye resources for his own benefit, and to Hedgeye’s detriment, before he left
the company. The amended complaint asserts that Heldman formed a competing firm and
staffed it with Hedgeye employees within just a week or so of his departure. Id. at 3 (Am.
Compl. ¶ 20). More importantly, it alleges that, while still employed by Hedgeye, Heldman
engaged in conduct arguably indicative of efforts to misappropriate Hedgeye’s proprietary
information and customer base. The amended complaint avers, for example, that Heldman
connected storage devices to his computer, accessed a large number of files and folders on the
Hedgeye shared drive that he ordinarily would not have accessed, searched for contacts, and
requested in-person meetings. Id. at 3 (Am. Compl. ¶¶ 14–18). Although it is certainly
possible—as Heldman asserts—that all of his actions were entirely innocent, the Court may not
8
make factual findings on a motion to dismiss, and the allegations that Hedgeye has added in its
amended complaint elevate Hedgeye’s breach of fiduciary duty claim from merely “possible” to
“plausible.” Iqbal, 556 U.S. at 678.
Defendants offer three arguments in support of their motion to dismiss. First, they attack
Hedgeye’s need to rely upon its “information and belief” in alleging that Heldman solicited the
firm’s clients, Dkt. 30 at 14 (quoting Dkt. 28 at 4 (Am. Compl. ¶ 22)), and they emphasize that
the amended complaint “does not identify a single client [that] was solicited by Heldman,” id. at
6. Although Heldman is correct that a plaintiff must offer “more than labels and conclusions,”
id. at 14, that requirement extends to the complaint as a whole, not to each individual allegation
within it. Even after the Supreme Court’s decisions in Twombly and Iqbal, a plaintiff may still
plead facts upon information and belief “where the facts are peculiarly within the possession and
control of the defendant, or where the belief is based on factual information that makes the
inference of culpability plausible.” Evangelou v. District of Columbia, 901 F. Supp. 2d, 159, 170
(D.D.C. 2012) (quoting Arista Records LLC v. Doe 3, 604 F.3d 110, 120 (2d Cir. 2010)); see
Kelleher v. Dream Catcher, L.L.C., --- F. Supp. ---, No. 16-2092, 2017 WL 3499961, at *2
(D.D.C. Aug. 15, 2017). Hedgeye’s allegation that Heldman solicited the firm’s clients while
still employed by Hedgeye is supported, moreover, by specific—albeit inconclusive—factual
allegations regarding Heldman’s use of his computer and electronic files during his final weeks
at the firm. Thus, although Hedgeye does not identify particular clients that Heldman allegedly
solicited while employed by Hedgeye, the complaint nonetheless clears the modest hurdle of
alleging sufficient facts to “state a claim to relief that is plausible on its face.” Twombly, 550
U.S. at 570.
9
Second, Defendants posit an alternative explanation for Setec’s findings, reasoning that
they are “consistent with Heldman’s proper, lawful, and loyal conduct seeking to ensure that
PRG clients would continue to use Hedgeye after the sale.” Dkt. 30 at 12. That argument,
however, misapprehends the standard governing a motion to dismiss. The question is not
whether Heldman’s actions admit of an innocent explanation or, indeed, who is right about what
happened. Rather, at this early stage of the litigation, the Court’s role is limited to deciding
whether the amended complaint contains sufficient “factual content” to permit the Court “to
draw the reasonable inference that the defendant is liable for the misconduct alleged.” Iqbal, 556
U.S. at 678. As a result, a complaint will survive a motion to dismiss “even ‘[i]f there are two
alternative explanations, one advanced by [the] defendant and the other advanced by [the]
plaintiff, both of which are plausible.’” Banneker Ventures, LLC v. Graham, 798 F.3d 1119,
1129 (D.C. Cir. 2015) (alterations in original) (quoting Starr v. Baca, 652 F.3d 1202, 1216 (9th
Cir. 2011)). In other words, “a well-pleaded complaint may proceed even if it strikes a savvy
judge that actual proof of those facts is improbable, and that a recovery is very remote and
unlikely.” Twombly, 550 U.S. at 556 (internal quotation marks omitted). Although Heldman
may ultimately prevail on the merits, his alternative explanation for the facts alleged in the
amended complaint does not render Hedgeye’s theory of the case implausible.
Finally, Defendants cite a number of decisions holding that “it is not solicitation or a
breach of an employee’s fiduciary duty to inform his employer’s clients that he intends to leave
. . . or even to start his own competing business.” Dkt. 30 at 14; see id. at 12–14 (citing Bro-
Tech Corp. v. Thermax, Inc., 651 F. Supp. 2d 378, 414 (E.D. Pa. 2009); Mercer Mgmt.
Consulting, 920 F. Supp. at 234; Benfield, Inc. v. Moline, No. 04-3513, 2006 WL 452903, at *6
(D. Minn. Feb. 22, 2006)). Hedgeye does not take issue with that statement of the law. It is
10
beside the point, however, because Hedgeye alleges that Heldman did more than this; it alleges
that Heldman solicited Hedgeye’s clients and used Hedgeye’s resources and proprietary
information while still employed at Hedgeye.
The Court will therefore deny the motion to dismiss Hedgeye’s claim for breach of
fiduciary duty.
2. Tortious Interference with Business Relations
Hedgeye also alleges that Heldman interfered with Hedgeye’s business relations. Dkt. 28
at 5 (Am. Compl. ¶¶ 31–32). “To survive a motion to dismiss on this claim, [Hedgeye] must
plead ‘(1) the existence of a valid business relationship or expectancy, (2) knowledge of the
relationship or expectancy on the part of the interferer, (3) intentional interference inducing or
causing a breach or termination of the relationship or expectancy, and (4) resultant damage.’”
Browning v. Clinton, 292 F.3d 235, 242 (D.C. Cir. 2002) (quoting Bennett Enters. v. Domino’s
Pizza, Inc., 45 F.3d 493, 499 (D.C. Cir. 1995)). Defendants contend that the amended complaint
fails to allege sufficient facts to satisfy the third and fourth elements of the tort. Dkt. 30 at 14–
15. Hedgeye, in turn, offers no response to Defendants’ contentions. See generally Dkt. 33.
“It is well understood in this Circuit that when a plaintiff files an opposition to a
dispositive motion and addresses only certain arguments raised by the defendant, a court may
treat those arguments that the plaintiff failed to address as conceded.” 3 Xenophon Strategies,
3
In a related context, the D.C. Circuit has “expressed concern about the interaction of Local
Rule 7(b),” which permits the Court to treat a motion that is not opposed in a timely manner as
conceded, and Federal Rule of Civil Procedure 12(b)(6). Washington v. United States, --- F.
Supp. 3d ---, No. 17-111, 2017 WL 1232400, at *1 (D.D.C. Apr. 3, 2017); see also Texas v.
United States, 798 F.3d 1108, 1110 (D.C. Cir. 2015) (noting that Local Rule 7(b) “is understood
to mean that if a party files an opposition to a motion and therein addresses only some of the
movant’s arguments, the court may treat the unaddressed arguments as conceded” (quoting
Wannall v. Honeywell, Inc., 775 F.3d 425, 428 (D.C. Cir. 2014))). The Court of Appeals,
however, has nonetheless affirmed the discretion of district courts to apply Local Rule 7(b) to
11
Inc. v. Jernigan Copeland & Anderson, PLLC, --- F. Supp. 3d ---, No. 15-1774, 2017 WL
3278839, at *7 (D.D.C. Aug. 1, 2017) (quoting Hopkins v. Women’s Div., Gen. Bd. of Glob.
Ministries, 284 F. Supp. 15, 25 (D.D.C. 2003)); see also Davis v. Transp. Sec. Admin., --- F.
Supp. 3d ---, No. 15-135, 2017 WL 3723862, at *3 (D.D.C. Aug. 28, 2017) (quoting Xenophon
Strategies, 2017 WL 3278839, at *7). The present context presents a particularly compelling
setting for applying the rule that unopposed arguments may be treated as conceded: Hedgeye is
represented by counsel; Defendants unambiguously moved to dismiss the tortious interference
claim; and Hedgeye unambiguously failed to respond to that entire section of Defendants’
motion. Because Hedgeye otherwise opposed Defendants’ motion, it is fair to infer that Hedgeye
made a considered—and perhaps strategic—decision not to oppose dismissal of the tortious
interference claim. That inference finds further support, moreover, in counsel’s concession
during round one of this litigation that a similar claim in Hedgeye’s original complaint was
simply “derivative of its other claims.” Hedgeye, 196 F. Supp. 3d at 53. It is one thing for the
Court to ensure that an unopposed, dispositive motion has legal merit, see Cohen v. Bd. of
Trustees of Univ. of D.C., 819 F.3d 476, 480 (D.C. Cir. 2016); it is altogether a different thing
for the Court to second guess the decisions made by counsel regarding which arguments to
counter and which to leave unanswered.
The Court will, accordingly, grant Defendants’ motion to dismiss the amended
complaint’s tortious interference claim as conceded but will do so without prejudice.
unopposed motions to dismiss, so long as such a dismissal is without prejudice. See Cohen v.
Bd. of Trustees of Univ. of D.C., 819 F.3d 476, 480 (D.C. Cir. 2016).
12
3. Constructive Trust
The amended complaint’s request for a constructive trust is styled as a third cause of
action. See Dkt. 28 at 5–6 (Am. Compl. ¶¶ 33–36). Defendants argue that “a constructive trust
is not a cause of action, but rather a remedy.” Dkt. 30 at 16. In its opposition, Hedgeye
concedes that a constructive trust “is an equitable remedy” and volunteers to move its request “to
its prayer for relief.” Dkt. 33 at 7. The Court will grant Defendants’ motion to dismiss this
count for failure to state a claim and will treat the request for a constructive trust as part of
Hedgeye’s request for relief.
C. Hedgeye’s Motion To Amend
Hedgeye seeks leave to file a second amended complaint, principally for the purpose of
adding two new claims—one for a violation of the CFAA and one for conversion. The Court
will deny that motion, but will provide Hedgeye with the opportunity, if possible, to cure the
deficiencies discussed below.
Under the Federal Rules of Civil Procedure, the Court must “freely” grant leave to amend
“when justice so requires.” Fed. R. Civ. P. 15(a)(2). Although the Supreme Court has
admonished that “this mandate is to be heeded,” Foman v. Davis, 371 U.S. 178, 182 (1962), that
does not mean that a motion for leave to amend must be granted as a matter of course. Rather,
the Court must consider whether “any apparent or declared reason—such as undue delay, bad
faith or dilatory motive on the part of the movant, repeated failure to cure deficiencies by
amendments previously allowed, undue prejudice to the opposing party . . . [or] futility of
amendment”—counsels against allowing the proposed amendment. Id. For present purposes,
only one of these factors—futility—is relevant. That factor, however, is also dispositive.
13
1. Computer Fraud and Abuse Act
Hedgeye’s first proposed amendment would add a claim against Heldman (but not HSP)
for allegedly violating the CFAA. The proposed amendment avers that Heldman violated 18
U.S.C. § 1030(a)(4) by “knowingly and with intent to defraud, access[ing] a protected computer
without authorization, or exceed[ing] [his] authorized access, and by means of such conduct
further[ing] the intended fraud and obtain[ing] [some]thing of value.” 18 U.S.C. § 1030(a)(4);
see also Dkt. 38-4 at 6–7 (Prop. Compl. ¶ 38) (tracking § 1030(a)(4)). In support of this claim,
Hedgeye alleges that Heldman was informed of his duty of confidentiality; that he was notified
that Hedgeye’s “computers were for business use . . . and that information on its systems was the
property of” Hedgeye; that he nevertheless “accessed a series of highly confidential documents”
and “may have . . . altered or disclosed” those documents; and that he accessed specific
documents that he was not “authorized to access.” Dkt. 38-4 at 7 (Prop. Compl. ¶¶ 39–44).
Defendants, in response, assert that the amendment would be futile because Hedgeye has failed
to plead facts sufficient to satisfy (1) the “protected computer” element and (2) the “without
authorization” or “exceeds authorized access” element of § 1030(a)(4). Dkt. 39 at 7–8.
a. Access to a “Protected Computer”
Defendants’ first argument—that Hedgeye has not adequately pled that he accessed a
“protected computer”—carries little force. The CFAA defines both “computer” and “protected
computer.” The term “computer” means “an electronic, magnetic, optical, electrochemical, or
other high speed data processing device performing logical, arithmetic, or storage functions, and
includes any data storage facility or communications facility directly related to or operating in
conjunction with such device.” 18 U.S.C. § 1030(e)(1). The term “protected computer” means
“a computer . . . which is used in or affecting interstate or foreign commerce or communication.”
Id. § 1030(e)(2). In light of these broad definitions, “effectively all computers with Internet
14
access” constitute “protected computers.” United States v. Nosal, 676 F.3d 854, 859 (9th Cir.
2012) (en banc); see also United States v. Yücel, 97 F. Supp. 3d 413, 418–19 (S.D.N.Y. 2015)
(collecting cases and noting “widespread agreement in the case law on the meaning of ‘protected
computer’”); Human Touch DC, Inc. v. Merriweather, No. 15-741, 2015 WL 12564166, at *4
(D.D.C. May 26, 2015) (holding that “the computer from which [the defendant] obtained the
information at issue was ‘protected’” because it “was connected to the internet”).
Heldman gestures at the argument that the proposed second amended complaint
(“proposed complaint”) merely alleges that he accessed “documents” and does not assert that he
found those documents on a “protected computer.” Dkt. 39 at 7. But, as Hedgeye notes, it is
“abundantly clear from the [proposed] complaint . . . [that] [Hedgeye] was referring to
electronically stored documents.” Dkt. 40 at 4. It is equally clear, moreover, that Hedgeye
alleges that those “electronically stored documents” were found on, or accessed through,
computers that were connected to the Internet. The proposed pleading, for example, alleges that
(1) Setec “perform[ed] a forensic examination of the laptop computer used by Heldman during
his employment with Hedgeye,” Dkt. 38-4 at 2 (Prop. Compl. ¶ 12); (2) “Setec looked for . . .
suspicious emails, . . . suspicious internet browsing and search history, and nonstandard file
access,” id. (Prop. Compl. ¶ 13); (3) Heldman “open[ed] a large number of files and folders on
the Hedgeye network shared drive,” id. at 3 (Prop. Compl. ¶ 15); and (4) “many emails were sent
[by Heldman] to individuals requesting in-person meetings,” id. (Prop. Compl. ¶ 17). These
allegations are more than sufficient to satisfy the “protected computer” element of a CFAA
claim.
15
b. “Without Authorization” or “Exceeds Authorized Access”
Hedgeye’s effort to satisfy the “without authorization” or “exceeds authorized access”
element, however, does not fare as well. As an initial matter, the Court notes that Hedgeye fails
to offer any response to Defendants’ argument on this point, and, for the reasons explained
above, see supra Part II.B.2, that would justify treating the issue as conceded and denying
Hegdeye’s motion for leave to amend. Nonetheless, to avoid future confusion, the Court will
address the substance of Defendants’ contention.
Hedgeye’s proposed CFAA claim turns on the allegation that Heldman accessed files “to
which he did not have authorized access.” Dkt. 38-4 at 7 (Prop. Compl. ¶¶ 41–42). This
allegation parallels 18 U.S.C. § 1030(a)(4), which applies to those who either “access[] a
protected computer without authorization” or “exceed[] [their] authorized access” in obtaining
information. Although the meaning of the first clause—“without authorization”—is fairly
straightforward, the second clause—“exceeds authorized access”—has generated substantial
debate and disagreement.
In the present context, not a great deal turns on the first clause because the proposed
complaint plainly fails to allege that Heldman “accesse[d] a . . . computer without authorization.”
This is not a case, for example, in which the plaintiff alleges that a former employee hacked into
a computer system, used someone else’s credentials, or managed to access a private server after
leaving the firm. There is no suggestion that Heldman lacked permission to access “the laptop
computer [he] used . . . during his employment with Hedgeye.” Dkt. 38-4 at 2 (Prop. Compl. ¶
12). See LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 1133 (9th Cir. 2009) (“[A]n employer
gives an employee ‘authorization’ to access a company computer when the employer gives the
employee permission to use it.”). Instead of asserting that Heldman accessed a computer without
16
authorization, the proposed complaint alleges that he accessed particular files “to which he did
not have authorized access.” The “without authorization” prong, therefore, is inapplicable here.
Application of the “exceeds authorized access” clause is less straightforward. That
phrase is defined to mean “to access a computer with authorization and to use such access to
obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”
18 U.S.C. § 1030(e)(6). The question, then, is whether this clause applies only to someone who
accesses information or particular files without authorization or, alternatively, whether it also
reaches one who is authorized to access the information or files at issue but then uses those files
or information for unauthorized purposes. See Nosal, 676 F.3d at 856–57. The D.C. Circuit has
yet to opine on this issue, and the Courts of Appeals that have done so are divided.
The Fifth, Seventh, and Eleventh Circuits have taken the latter, more expansive view of
the “exceeds authorized access” clause. The Court of Appeals for the Fifth Circuit, for example,
has held that an employee who is authorized “to utilize computers for any lawful purposes . . .
and only in furtherance of the employer’s business” may run afoul of § 1030(a) “if he or she
use[s] that access to obtain or [to] steal information as part of a criminal scheme.” United States
v. John, 597 F.3d 263, 271 (5th Cir. 2010). Likewise, the Court of Appeals for the Eleventh
Circuit has held that an individual who violates a clear employer policy barring use of databases
for non-business purposes can be prosecuted under the CFAA for “exceed[ing] [his] authorized
access” to a protected computer. United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir.
2010). And, in perhaps the broadest reading of both the “without authorization” and “exceeds
authorized access” prongs of the CFAA, the Court of Appeals for the Seventh Circuit has held
that an employee’s authorization to access a computer system or computer files is “terminated”
when the employee accesses the computer or files to harm his employer; that is, the employee’s
17
“breach of his duty of loyalty” may “terminate[] his agency relationship . . . and with it his
authority to access the” computer. Int’l Airport Centers, LLC v. Citrin, 440 F.3d 418, 420–21
(7th Cir. 2006).
That view of the law, however, has met with strong opposition from a number of other
Courts of Appeals. In the words of the Court of Appeals for the Ninth Circuit, “the CFAA
target[s] the unauthorized procurement or alteration of information, not its misuse or
misappropriation.” Nosal, 676 F.3d at 863 (internal quotation marks omitted); see also Brekka,
581 F.3d at 1133 (“No language in the CFAA supports [the] argument that authorization to use a
computer ceases when an employee resolves to use the computer contrary to the employer’s
interests.”). Under this view of the CFAA, a person “exceeds [his] authorized access” only if he
“has permission to access the computer, but [then] accesses information on the computer that
[he] is not entitled to access.” Id. (emphases added).
The Courts of Appeals for the Fourth and Second Circuits concur with this reading of the
statute. Thus, the Fourth Circuit has held that “an employee ‘exceeds authorized access’ when
he has approval to access a computer, but uses his access to obtain or alter information that falls
outside the bounds of his approved access.” WEC Carolina Energy Sols., LLC v. Miller, 687
F.3d 199, 204 (4th Cir. 2012). The Second Circuit, likewise, has held that “by its plain terms the
statute is directed to improper ‘access’” and that the “exceeds authorized access” clause is best
construed to apply “where a user has permission to access the computer but proceeds to ‘exceed’
the parameters of authorized access by entering an area of the computer to which his
authorization does not extend.” United States v. Valle, 807 F.3d 508, 524 (2d Cir. 2015).
In short, unlike the Fifth, Seventh, and Eleventh Circuits, these Courts read both
potentially relevant clauses of the CFAA as targeted at unauthorized access to a computer
18
(“without authorization”) and particular files or “area[s]” (“exceeds authorized access”). They
do not read the statute to “extend[] to the improper use of information validly accessed.” WEC
Carolina, 687 F.3d at 204. For the reasons detailed in those decisions, this Court agrees.
Although the Court recognizes that the statutory definition of “exceeds authorized
access” is not crystal clear, the Second, Fourth and Ninth Circuits have identified the more
persuasive reading of that phrase. It bears emphasis that, even without the benefit of the
definition, the relevant phrase—“exceeds authorized access”—focuses on “access” and not
“use.” Nor does the definition change that focus. To be sure, the definition refers to “use,” but it
does so in discussing a person’s “use” of his “access” to a computer “to obtain or alter
information in the computer that the accesser is not entitled so to obtain or alter,” 18 U.S.C. §
1030(e)(6), not his “use” of the information found on the computer. The operative term,
moreover, is “entitled;” a violation occurs only if the “accesser” is “not entitled” to obtain or to
alter the information. Id. And, in context, the most “sensible reading of ‘entitled’ is as a
synonym for ‘authorized.’” Nosal, 676 F.3d at 857. Thus, the CFAA prohibits the authorized
computer user from accessing “information” that he is not “authorized” to obtain or alter. The
statute says nothing about the misuse of information that the user was authorized to access.
Furthermore, the Court is cognizant that the CFAA is both a criminal and civil statute.
As a result, interpretations of its provisions apply across both domains. See Leocal v. Ashcroft,
543 U.S. 1, 11 n.8 (2004). Construing the CFAA to impose criminal liability for the violation of
private computer use policies would “criminalize the conduct of millions of ordinary computer
users.” Valle, 807 F.3d at 527. It is safe to assume that, had Congress intended to impose
criminal penalties on such a broad swath of conduct ordinarily left to local employment and tort
law, it would have done so with far greater clarity. See Nosal, 676 F.3d at 859; WEC Carolina,
19
687 F.3d at 206 (“[T]he [plaintiff’s] theory has far-reaching effects unintended by Congress.”).
A similar concern is reflected in the rule of lenity, which counsels in favor of reading ambiguous
statutes in a manner that “ensure[s] both that there is fair warning of the boundaries of criminal
conduct and that legislatures, not courts, define criminal liability.” Crandon v. United States,
494 U.S. 152, 158 (1990); see also United States v. Santos, 553 U.S. 507, 514 (2008).
Finally, this reading of the statute comports with other decisions of this Court. See Econ.
Research Servs., Inc. v. Resolution Econ., LLC, 208 F. Supp. 3d 219, 232 (D.D.C. 2016); Roe v.
Bernabei & Wachtel PLLC, 85 F. Supp. 3d 89, 103 (D.D.C. 2015); Lewis-Burke Assocs., LLC v.
Widder, 725 F. Supp. 2d 187, 194 (D.D.C. 2010). In each of those cases, as here, the Court
concluded that the CFAA “speaks only of authorized access to data and not of use.” Bernabei &
Wachtel PLLC, 85 F. Supp. 3d at 103 (internal quotation marks omitted). That view represents
the best reading of the statute, it is consistent with the purpose of the CFAA to target “hackers,”
Brekka, 581 F.3d at 1130; WEC Carolina, 687 F.3d at 207, and it avoids creating uncertainty
regarding the breadth of the criminal law.
Returning to the case at hand, the Court must determine whether Hedgeye’s proposed
complaint adequately alleges that Heldman “exceeded [his] authorized access” to particular files
by violating a restriction on his authority to access those files. The pleading contains conclusory
allegations that Heldman “accessed” files “to which he did not have authorized access.” Dkt. 38-
4 at 7 (Prop. Compl. ¶¶ 41–43). The Court need not, however, credit legal conclusions that are
not supported by factual allegations, Iqbal, 556 U.S. at 678–79, and the risk of doing so in this
context—where there is substantial dispute in the law about the meaning of the legal terms that
are parroted in the claim—is particularly acute. The relevant factual allegations, moreover,
suggest that Hedgeye’s proposed CFAA claim likely falls on the wrong side of the legal divide
20
discussed above. Most notably, the sole factual allegation that purports to define the conditions
that were imposed on Heldman’s use of the Hedgeye computer system does not indicate that he
was denied access to particular files or segments of the system. Instead, that allegation posits
that Heldman received “compliance training” and was instructed (1) that he had a “duty of
confidentiality,” (2) that Hedgeye’s “computers were for business use” alone, and (3) that
“information on [Hedgeye’s] system was the property of [Hedgeye].” Dkt. 38-4 at 7 (Prop.
Compl. ¶ 39). All of those instructions echo the theory of the “exceeds authorized access” clause
that the Court considered, and rejected, above.
The Court, accordingly, concludes that the allegations contained in Hedgeye’s proposed
complaint fail to state a claim and that, as a result, the proposed amendment is futile. The Court
will, however, permit Hedgeye to renew its motion—if it can in good faith allege a claim
consistent with the construction of the CFAA set forth above.
2. Conversion
Finally, Hedgeye’s proposed complaint would assert a conversion claim against Heldman
and HSP. Dkt. 38-4 at 8 (Prop. Compl. ¶¶ 47–51). Hedgeye alleges the following in support of
this claim: (1) “Heldman converted propriet[ar]y ideas and information from [Hedgeye],
including, but not limited to, customer lists, employee lists, employee salaries, proprietary
research and customer payments,” id. (Prop. Compl. ¶ 48); (2) “Heldman used and shared these
converted ideas and information with . . . [HSP],” id. (Prop. Compl. ¶ 49); (3) “Both [Heldman
and HSP] disseminated these ideas and information causing damage to [Hedgeye] because these
ideas and information were not widely known,” id. (Prop. Compl. ¶ 50); and (4) “Both [Heldman
and HSP] also caused damage by exercising dominion over these ideas and information” in a
way that was “inconsistent with [Hedgeye’s] ownership,” id. (Prop. Compl. ¶ 51).
21
To state a claim for conversion under District of Columbia law, a plaintiff must allege
“(1) an unlawful exercise, (2) of ownership, dominion, or control, (3) over the personal property
of another, (4) in denial or repudiation of that person’s rights thereto.” Campbell v. Nat’l Union
Fire Ins. Co. of Pittsburgh, 130 F. Supp. 3d 236, 258 (D.D.C. 2015) (quoting Johnson v.
McCool, 808 F. Supp. 2d 304, 308 (D.D.C. 2011)). The proposed complaint, however, offers
little more than conclusory assertions that Heldman “converted” Hedgeye’s property and
“exercis[ed] dominion over [Hedgeye’s] ideas and information.” Dkt. 38-4 at 8 (Prop. Compl.
¶¶ 48, 51). “[T]he tenet that a court must accept as true all of the allegations contained in a
complaint is inapplicable to legal conclusions.” Iqbal, 556 U.S. at 678. To plead the element of
“ownership, dominion, or control,” a plaintiff must allege that the defendant “d[id] something
that ‘seriously interfere[d]’ with the plaintiff’s right to control the property in question.” Council
on Am.-Islamic Relations Action Network, Inc. v. Gaubatz, 793 F. Supp. 2d 311, 340 (D.D.C.
2011) (quoting Blanken v. Harris, Upham & Co., Inc., 359 A.2d 281, 283 (D.C. 1976)).
Hedgeye’s proposed complaint “is devoid of factual allegations indicating that [Heldman and
HSP] exercised the requisite ownership, dominion, or control over [Hedgeye’s] electronic data.”
Id. The proposed complaint does not allege, for instance, that Heldman deleted or destroyed the
materials in question or even that Heldman copied them. Because the proposed complaint fails
to state a claim for conversion, the Court will deny Hedgeye leave to amend, but will, again,
permit Hedgeye to renew its motion if it can identify specific property that Defendants allegedly
misappropriated and the means by which they did so.
22
CONCLUSION
For the reasons stated above, Defendants’ motion for summary judgment, Dkt. 29, is
hereby DENIED without prejudice. Defendants’ motion to dismiss, Dkt. 29, is hereby
GRANTED in part and DENIED in part. Plaintiff’s motion for leave to amend, Dkt. 38, is
hereby DENIED without prejudice.
SO ORDERED.
/s/ Randolph D. Moss
RANDOLPH D. MOSS
United States District Judge
Date: September 23, 2017
23