A.M. Castle & Co. v. Byrne
A.M. Castle & Co. v. Byrne
Opinion of the Court
OPINION AND ORDER
Pending before the Court in the above referenced cause, alleging. breach of employee confidentiality agreement, breach of fiduciary duty, unjust enrichment, tortious interference with contract, tortious interference with prospective economic advantage, and civil conspiracy, and seeking compensatory and injunctive relief against a former employee of Plaintiff A.M. Castle & Co. (“Castle”), Thomas K. Byrne (“Byrne”), and his new employer, Oilfield Steel Supply, LLC (“OSS”) .(collectively “Defendants”), are Castle’s objections (instrument #53) to United States Magistrate Judge Frances Stacy’s order (#52) granting in part and denying in part Defendants’ motion to compel (# 42) and denying Castle’s motion to compel and request for show cause order (# 44).
Castle and OSS are direct competitors in supplying pipe and materials to the oil
In its objections to the Magistrate Judge Stacy’s rulings on Castle’s motions to compel, Castle contends that Defendants did not perform a thorough search of all computers and electronic devices potentially having relevant information and therefore ask the Court to give it physical access to Defendants’ electronic devices.
Standard of Review
This Court referred the motions to compel to United States Magistrate Judge Frances Stacy under 28 U.S.C. section 636(b)(1)(A) for resolution.-
A magistrate judge is permitted broad discretion in resolving' nondispositive pretrial motions. Id. A magistrate’s order for nondispositive matters may only be -reconsidered where it has been shown that the magistrate judge’s order is clearly erroneous or contrary to law. Id.; Fed.R.Civ.P. 72(a)
Relevant Discovery Rules
Under Federal Rule of Civil Procedure 26(b)(1), “Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense.” Moreover, “[Relevant information need not be admissible at trial if the discovery appears reasonably calculated to lead to discovery of admissible evidence.” Id. “Relevant evidence” is “evidence having any tendency to make the existence of- any fact more probable or less probable than it would be without the evidence.” Fed.R.Evid. 401.
In 2006 Federal Rule of Civil Procedure 34 was amended to allow a party to explicitly request production of electronically stored information just as it had been allowed to seek production of paper documents.
The party receiving the request “must respond in writing within 30 days after being served” [Rule 34(b)(2)(A) ] and “[f]or each item or category, the response must either state that the inspection ... will be permitted as requested or staté an objection to the request, including the reasons [Rule 34(b)(2)(B) ].” When a request for production or an interrogatory is not answered, the party seeking discovery may move for an order compelling production against the nonresponding party under Federal Rule of Civil Procedure 37(a)(3). An evasive or incomplete answer each item or category, of items to be inspected; is deemed to be a failure to respond. Fed.R.Civ.P. 37(a)(4).
Federal Rule of Civil Procedure 26(b)(2)(B) permits the district court to compel production of information that is not reasonably 'available only “if the requesting party shows good cause.”
Given the concerns about intrusiveness and privacy, one area where courts have allowed a requesting party to obtain a mirror image
To establish a cause of action for misappropriation of trade secrets under Texas common law, Castle must show that (1) a trade secret existed, (2) that Defendants acquired the trade secret through improper means, and (3) that they disclosed the trade secret without Castle’s consent. Wellogix, Inc. v. Accenture, LLP, 716 F.3d 867, 874 (5th Cir. 2013); Texas Uniform Trade Secrets Act (“TUT-SA”), Tex. Civ. Prac. & Rem.Code section 134A.002.
any formula, pattern device or compilation of information which is used in one’s business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it. It may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a patter for a machine or other device, or a list of customers.
4 Restatement of Torts sec. 757, Comment b (1939), cited with approval, Hyde Corp. v. Huffines, 158 Tex. 566, 314 S.W.2d 763, 776 (1958). Texas requires that a trade secret be “secret”, i.e., that it be neither generally known by others in the same business nor readily ascertainable by an
An exact definition of 'a trade secret is not possible. Some factors to be considered in determining whether given information is one’s trade secret are: (1) The extent to which the information is known outside his business; (2) The extent to which ■ it is known by employees and others involved in his business; (3) The extent -of measures taken by .him to guard the secrecy of the information; (4) The value of the information to him ,or his competitors; (5) The amount- of effort or money expended by him in developing the information; (6) The ease - or difficulty with which the information could be properly acquired or duplicated by others. ■ . ,
The owner of the trade secret does not have to satisfy all six factors because trade secrets do -not fit neatly into all factors every time, General Univ, Sys., 379 F.3d at 150, citing In re Bass, 113 S.W.3d 735, 739-40 (Tex. 2003).
Because of the secrecy requirement, the owner of a trade secret must take measures to prevent it from becoming known to persons other than those permitted by the owner to have access for limited purposes. The existence of a trade secret is a. question of fact to be decided by the judge or the jury as factfinder. General Univ. Systems, Inc. v. Lee, 379 F.3d 131, 150 (5th Cir. 2004), citing Restatement (Third) Unfair Competition sec. 39 cmt. (1995). Items such as customer lists, pricing information, client information, customer' preferences, and buyer contacts may be -trade secrets if they meet the criteria for such. Global Water Group, Inc. v. Atchley, 244 S.W.3d 924, 928 (Tex. App. Dallas 2008, pet. denied), citing T-N-T Motorsports, Inc. v. Hennessey Motorsports, Inc., 965 S.W.2d 18, 22 (Tex.App.Houston [1st Dist.] 1998, no pet.). See, e.g., Guy Carpenter & Co. v. Provenzale, 334 F.3d 459, 467 (5th Cir. 2003) (holding that a customer list may be a trade secret if it is secret and the court examines if it satisfies three factors: “(1) what steps, if any, an employer has taken to maintain the confidentiality of a customer list; (2) whether a departing employee acknowledges that the customer list is confidential; and (3) whether the content of the list is readily ascertainable.”).
Background
United States Magistrate Judge Stacy has issued two orders (# 41, on February 13, 2014; -and #52, on September 12, 2014) regarding Castle’s continuing effort to obtain access to and inspect all computer equipment and electronic devices in the custody or control of Defendants in order to discover “confidential information” allegedly misappropriated from Castle by Byrne.
The first order (#41) denied Castle’s request to examine Defendants’ electronic devices because it was overly broad and because Castle, in light of the discovery that had been produced by Defendants, had not shown that Defendants defaulted on their discovery obligations. Furthermore the Magistrate Judge opined that “Defendants should be required to search any electronic device used by any former employee or independent contractor of Plaintiff who is now employed by Defendant OSS, for any documents that may belong to Plaintiff.” # 41 at p. 2. She instructed the parties to discuss their differ-
On March 6, 2014 Defendants sent a letter report (#44-6) to Castle stating that an independent search by Chorus Consulting LLC through CloudNine Discovery
In the Magistrate Judge’s second order of September 12, 2014(# 52), addressing Castle’s request for a show cause order, and, again, for an order allowing Castle to inspect Defendants’ electronic devices, and Defendants’ motion to compel complete responses to specified interrogatories and production requests, Magistrate Judge Stacy granted in part Defendants’ requests for supplemental informátion, but limited it to information “related solely to Plaintiffs ‘oil and gas business unit,’ where Thomas K.' Byrne was employed.” She also denied Castle’s show cause order request, she found that Defendants had produced information to Castle on numerous occasions, had searched their computers and electronic storage devices for '288 terms
Castle’s Objections (# 53)
Because the Court finds that some of Castle’s representations about the contents of the evidence attached to #44 are not accurate or are taken out of context, the Court has modified or supplemented some of Castle’s quotations to reflect what the documents actually state. It should also be noted that the June 20, 2012 letter .from Byrne’s counsel to Castle’s attorney shortly after the litigation began, quoted by Castle below, reflects that counsel’s own review of Byrne’s personal laptop and the laptop issued to Byrne by OSS, as well as Byrne’s iPhone, was far from complete, so' counsel’s statements are tentative and contingent on what discovery might reveal since he did not yet know what would be found on the hard drives.
Observing that in response to Castle’s cease and desist letter, Byrne’s counsel, asserting that “we intend to continue our cooperative stance,” initially stated that before Byrne’s resignation from Castle, “some” of the e-mails he sent from his Castle e-mail account to his home account were “entirely of a personal nature” and one included a “detailed report on fracking provided to Mr. Byrne by a customer, which he sent home intending to review later.” # 44-1. Counsel acknowledged that Byrne “sent some information to his personal account containing Castle customer contact information and later forwarded those emails to his OSS e-mail account.” Id. Byrne also sent sales reports, including some “provided to him automatically from Castle detailing his daily sales so that he could keep track of his generation' of commission based compensation,” and that “these reports may contain sales data about other salespeople as well as his own.” Id. He represents that Byrne “has contacted some of the customers whose contact information he e-mailed to himself since his employment with OSS. Mr. Byrne may have provided the contact information he e-mailed to his assistant at OSS for Mr. Byrne’s own use. Mr. Byrne has not disseminated any of this information to any other person or entity.” Id. The letter concludes, “[W]e believe that none of this information at issue is confidential. In particular, the contact information that Mr. Byrne emailed himself is information that he could have (and frankly should have) simply reconstructed via Google searches and other publicly available means after leaving Castle.” -
Similarly, in a letter from counsel for OSS, counsel also maintained that the email addresses of Byrne’s contacts, found on his OSS-issued computer, “are publically available and are certainly not confidential information of Castle.” # 44-2.
Castle contends that Byrne sent Castle copies of documents that Byrne had in his possession, including reports “clearly marked ‘Confidential,’ lists of open transactions with Castle’s customers, lists identifying the volume of business Castle has transacted with certain customers, lists identifying the largest customers Defendant Byrne serviced while employed at Castle, and contact information for roughly fifty of Castle’s customers and vendors.” #53 at pp. 2-3. After this lawsuit was filed and written discovery requests were served, Defendants again denied that OSS had confidential information belonging to Castle, and OSS responded that it had no information and no documents regarding work performed by Byrne when he was employed by Castle. Castle then sent out subpoenas to four of its ex-employees who had been interacting'with Byrne on OSS-related business before Byrne resigned and who purportedly possessed Castle’s information: Nick Jones, Humberto Len-iek, Chad Williams, and Corbin Redd. Cas-
Castle charges that Magistrate Judge Stacy erred in failing to enforce the terms of her February 13, 2014 order (#41). Defendants limited their search to exclude the OSS e-mail server and OSS equipment used by ex-Castle employees Nick Jones, Chad Williams and Corbin Redd, even though there was evidence that Byrne had been communicating with these individuals via e-mail before Byrne resigned from Castle and despite evidence that each had confidential Castle information in his possession while employed by OSS. #44-9. Moreover the Magistrate Judge’s September 12, 2014 order does not explain why she failed to enforce the prior order’ regarding the scope of the search (“any electronic device used by any former employee or independent contractor of Plaintiff who is now employed by Defendant OSS, for any documents that may belong to Plaintiff’ [# 41 at p. 2.]).
Castle asks the Court to vacate the Magistrate Judge’s order denying Castle’s motion to compel and request for a show cause order because Defendants failed to comply with the Court’s February 13, 2014 order. Although on September 9, 2013 Defendants responded to discovery requests that OSS had no documents regarding work performed by Byrne for OSS before he resigned from Castle (# 44, Ex. C, par. 4), three weeks later Defendants produced such documents showing that Byrne had performed such work (# 44-9, Byrne provided OSS employees Chad Williams, Humberto Leniek, and OSS CEO Nick Jones with specifications for materials that OSS- and ex-Castle-employee Chad Williams intended to order from Tenaris, a Castle supplier), Castle insists that in response to Castle’s request for production (# 44-3 and -4), it is entitled to know if that transaction was coinpleted and its result.
. Castle also objects to Magistrate Judge Stacy’s September 12, 2014 order because it allowed discovery of so much irrelevant information in Castle’s - records about its employees, e.g., separation dates and reasons for termination, names of all employees who had access to the proprietary and confidential information that Defendants allegedly took from Castle, and information relating to customer-issues or losses.
Defendants’ Response (# 57)
In response, Defendants point out that in her September Order, Judge Stacy ruled that Defendants had complied with her February order and Plaintiffs failed to meet the high burden of proof to be entitled to conduct its own forensic examination of Defendants’ electronic devices; since the Magistrate Judge authored the February order, they urge that she is in the best position to interpret it. Moreover they, argue that because the order was not clearly erroneous, Castle’s objection should be overruled.
Defendants also contend that the Magistrate Judge did not err in granting their motion to compel additional information because Castle had failed to produce documents supporting its allegations of tortious interference with customer relations, losses relating to a diminishment of Plaintiffs competitive standing in the market, loss of clients and business opportunities, loss of customer good will, and loss of business reputation.
Defendants maintain that they complied with the February 13, 2014 order because they performed searches of their electronic devices, including a term search for all 378 terms proposed by Castle, even though -the request was unreasonable in light of their number and because the terms were so generic that- they captured more “noise” than information. They 'point out that they did so before Plaintiff filed its second motion to compel, yet Castle’s second motion to compel did not inform the Court that the forensic term search had already occurred.
Defendants insist that Castle has failed to produce any evidence of any default in Defendants’ discovery responses, and highlight the fact that Magistrate Judge Stacy’s February order found no default of discovery obligations or improper conduct by Defendants. As for her second order, Castle’s deceptive reliance on the single email that had been prodúced three times, clearly not “new” evidence, does not prove that Byrne solicited business from Castle’s customers before he resigned. Noting Castle’s reliance on Ameriwood, Indus., 2006 WL 3826291, at *4, for the proposition that “discrepancies or inconsistencies in the responding parteé discovery responses may justify a party’s request to create and examine a mirror image of the hard drive,” Defendants point out that the facts here differ from those in Ameriwood Indus.: no evidence has been produced that shows that OSS or Byrne failed to produce a document that has otherwise been shown to exist. Instead Castle’s allegations aré'pure speculation and its repeated motions have become both an impermissible fishing expedition and harassment.
Although the September order compelled Castle to respond to Defendants’ discovery requests to identify employees given access to Castle’s purported proprietary and confidential business information and evidence of damages it suffered' as a result of lost business, goodwill, and reputation, limited to . the oil and gas business unit where Byrne and other employees of OSS had worked,-Castle failed to do so, but instead merely responded to each request, “Subject "to and without waiving the foregoing general and specific objections, Castle states that its investigation continues.” #57, Ex. A, Castle’s supplemental responses to Defendants’ First Request for Production.
Castle also objects that the Magistrate Judge failed to explain why' she overruled Castle’s objections and puts forth three reasons why Castle should riot be required to: comply with the September order: (1) when and why other employees left Castle is irrelevant to whether Defendants have been unfairly competing against Castle; (2) whether other employees had access to records taken by Defendants does not affect whether they consist-of confidential information that Defendants should not have been using against Castle, nor does it relate to the merits of the claims. Castle has asserted against them;' and (3) the identity and complaints of .other Castle customers who are not doing business with Byrne and OSS are not relevant to Castle’s claims relating to customers that OSS has pursued using its information wrongfully obtained by Castle. Regarding (1), Defendants highlight Castle’s sworn response to an interrogatory that JO,343 of the 10,600 docriments produced by Deferi-dants (mainly thousands of e-mails dating back to 2006 on Leniek’s -non-Castle computer
In conclusion, Defendants urge the Court to overrule Castle’s objections in their entirety for the reasons they give in their response. Castle has failed to show that it is entitled to the forensic search it seeks, Defendants’ motion to compel was reasonably tailored to obtain relevant, non-privileged information from Plaintiff to which it is entitled, and Castle has failed to show that Magistrate Judge Stacy’s September 12,2014 order was erroneous.
Castle’s Reply (# 51)
Castle’s reply makes numerous speculative charges against Defendants of misrepresentation, concealment, and incompleteness of Defendants production of discovery without supporting evidence, reiterating some of its earlier challenges and trying to expand the scope of permissible discovery.
Court’s Decision
Magistrate- Judge Frances Stacy had broad discretion in reviewing the discovery challenges and she did not abuse that discretion. The Court finds that the Magistrate Judge’s orders are not erroneous in fact or in law, but are thoughtful and tempered rulings that comply with the Federal Rules of Civil Procedure and the law regarding misappropriation of trade secrets and related claims. It agrees with Defendants that as the author, she is the best person to construe those orders and whether the parties complied with them, and she has done so convincingly.
Castle has failed to meet its burden to show that it is entitled to a court-supervised forensic inspection of Defendants’ computers and devices. “[A] party may not inspect the physical hard drives of a computer merely because the party wants to search for additional documents responsive to the party’s document requests.” Ameriwood Indus., 2006 WL 3825291, at *4, citing McCurdy, 9 Fed.Appx. at 831. The Court finds that Magistrate Judge Stacy did not err in finding that Defendants did not “default[ ] in [their] obligation to search [their records] and produce the requested data.” In re Weekley Homes, 295 S.W.3d at 317. Castle has not shown that Defendants are in wrongful possession of any company documents. They have not provided an expert’s testimony, no less any other evidence, of their need to have the Court determine that Defendants were or have been deleting files. Meanwhile the Court agrees with Judge Stacy that Defendants have responded adequately to discovery requests and even hired an independent firm to perform a forensic examination to their computers that included a search for hundreds of terms requested by Castle.
Furthermore, for purposes of its objections and request for such a search, Castle has not even met its burden to establish that it had trade secrets, while Defendants have raised substantial questions whether trade secrets existed in this dispute (e.g., whether the alleged materials were secret, whether Byrne acquired them by improper means, whether other employees and ex-employees knew about them and considered them to be confidential, and whether Castle took adequate measures to keep them secret).
Accordingly, the Court
ORDERS that Castle’s objections (# 53) are OVERRULED.
. Rule 72(a), "Nondispositive Matters, provides,
When a pretrial matter not dispositive of a party’s -claini Or defense is referred to a magistrate judge to hear and decide, the magistrate judge must promptly conduct the required proceedings and, when appropriate, issue a written order stating the decision. A party may serve and file objections to the order within 14 days after being served with a copy. A party may not assign as error a defect in the order not timely objected to. The district judge in the case must consider timely objections and modify or set aside any,part, of the order that is clearly erroneous or contrary to law.
. Rule 34 provides in relevant part,
*899 (a) In General. A party may serve On any other party a request within the scope of Rule 26(b):
(1) to produce and permit the requesting party or its representative to inspect, copy, test or sample the following items in the responding party’s possession, custody, or control:
(A) any designated documents or electronically stored information-including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data-stored in any medium from which information can be obtained either directly, or if necessary, after translation by the responding party into a reasonably usable form; or
(B) any designated tangible things; or
(2) to permit entry onto designated land or other property possesses or controlled by the responding party, so the requesting party may inspect, measure, survey, photograph, -test or sample the property or any designated object or operation on it.
(b) Procedure
(1) Contents of the Reguest. The request:
(A) must describe with reasonable particularity
(B) must specify a reasonable time, place, and manner for the inspection and for performing the related acts; and
(C)may specify the form or forms in which electronically stored information is to be produced.
. The Advisory Committee notes to the 2006 amendment state, "Rule 34(a) is amended to confirm that the discovery of electronically stored information stands on equal footing with the discovery, of paper documents.... [A] Rule 34 request for production of 'documents’ should be understood tó encompass, and the response should include, electronically stored information unless discovery in the , action has clearly distinguished between electronically stored information and ‘documents.’ ”
. Rule 26(b)(2)(B) ("Specific Limitations on Electronically Stored Information’’) provides,
A party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. On motion to compel discovery or for a protective order, the party from whom discovery is sought must show that the information is not reasonably accessible because of undue -burden or cost. If that showing is made, the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C).
. See U.S. v. Triumph Capital Group, Inc., 211 F.R.D. 31, 48 (D.Conn. 2002) (“A mirror image is an exact duplicate of the entire hard drive, and includes all the scattered clusters of the active and deleted files and the slack and free space,”); Balboa Threadworks, Inc. v. Stucky, 2006 WL 763668, at *3 (D.Kan. 2006) (A "mirror image” is “a forensic duplicate, which replicates bit for bit, sector for sector, all allocated and unallocated space, including slack space, on a computer hard drive,”).
. XUTSA specifically states that "Except as . provided by .Subsection (b), this chapter displaces conflicting tort ,.. law of this state providing civil remedies for misappropriation of a trade secret.” Tex. Civ. Prac. & Rem. Code section 134A.007. Subsection (b)(1) states that “[t]his chapter does not affect ... contractual remedies, whether or not based upon misappropriation of a trade secret." Therefore Castle’s breach of confidentiality agreement claim continues even if its misappropriation of trade secret does not.
. The letter report indicates that Chorus "created forensic images of each device utilizing accepted industry practices,” that the original devices were then either quarantined in Chorus’ offices or returned to the áppropriate custodian,”'that they were searched for "files that might exist or have existéd on these devices arising out of [these individuals’] prior employment or association with Castle or Tube Supply,” that the resulting 10,000 plus emails and two files were produced to Castle, and that none of the forensic images and quarantined devices were accessible to Byrne or OSS. # 44-6, pp. 2-3.
. The “288” appears to be a typographical error because the letter report indicating compliance with the February 23, 2014 order states that Castle provided a list of 388 search terms, which were searched and which identified 54,785 files, which were then searched for those terms. The resulting-148 data files were then produced to Castle. See # 44-8.
In their response (# 57 at pp. 4-6 and n. 1) to Castle’s objections, Defendants, also asserting a typographical error, state that the correct number bf such terms was 378, all of which it searched for as detailed in its letter report of July 23, 2014 (# 44-8).
. Defendants point out that the Request for production No. 4 was not the subject of Plaintiff’s first motion to compel nor of Magistrate Judge Stacy’s February order, both of which dealt with the return to Castle of information that Castle had produced, and which Defendants promised to, and did, return. Defendants maintain that Castle is now trying to expand the February order to cover any document regardless of the objections, to discovery requests that Defendants had previously raised, as well as to obtain an completely different subset of discovery requests not raised in Castle’s previous motions and which the Magistrate Judge was not asked to consider.
, Castle finally admitted that the e-mail had been produced previously in its reply, # 48-1,
. In its reply, Castle concedes it did receive the three productions of this e-mail, but argues that the last had a different bates label
-. Defendants explain that Leniek worked as an independent contractor consultant for Castle and other companies 'in the' oil and gas business and focused on South America. In
Reference
- Full Case Name
- A.M. CASTLE & CO. v. Thomas K. BYRNE and Oilfield Steel Supply, LLC
- Cited By
- 15 cases
- Status
- Published