De Lage Landen Operational Services, LLC v. Third Pillar Systems, Inc.

851 F. Supp. 2d 850, 2012 WL 315510, 2012 U.S. Dist. LEXIS 12728
CourtDistrict Court, E.D. Pennsylvania
DecidedFebruary 2, 2012
DocketCivil Action No. 09-2439
StatusPublished
Cited by2 cases

This text of 851 F. Supp. 2d 850 (De Lage Landen Operational Services, LLC v. Third Pillar Systems, Inc.) is published on Counsel Stack Legal Research, covering District Court, E.D. Pennsylvania primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
De Lage Landen Operational Services, LLC v. Third Pillar Systems, Inc., 851 F. Supp. 2d 850, 2012 WL 315510, 2012 U.S. Dist. LEXIS 12728 (E.D. Pa. 2012).

Opinion

MEMORANDUM

BARTLE, District Judge.

Plaintiff De Lage Landen Operational Services, LLC (“DLL”) has sued defendant Third Pillar Systems, Inc. (“Third Pillar”) for breach of contract and violation of the California Uniform Trade Secrets Act (“CUTSA”), Cal. Civ.Code § 3426 et seq.1 Before the court is DLL’s motion in limine to introduce in its case in chief the deposition testimony of Third Pillar’s expert James Woods in support of unjust enrichment damages and/or to introduce evidence of a reasonable royalty for Third Pillar’s misappropriation of DLL’s trade secrets. As part of its response, Third Pillar has also filed a renewed motion for summary judgment based on the ground that DLL cannot establish damages on any theory and consequently there is nothing more to be tried.

DLL’s claims stem from a series of agreements in which DLL engaged Third Pillar to develop and customize a software platform, known as the “Beacon” project, for use in DLL’s vendor finance lending and leasing business. After a three-day permanent injunction hearing,2 the court found that under DLL’s contracts with Third Pillar DLL owned twelve “use cases,” which are detailed step-by-step models of DLL’s trade secret business practices that were created in the course of the Beacon project. The court further found that Third Pillar had misappropriated DLL’s trade secrets in the twelve use cases that DLL owned, and in doing so, breached its contracts with DLL. Finally, the court concluded that “mere pecuniary compensation would not afford adequate relief’ and issued a permanent injunction requiring that Third Pillar “return and/or destroy ... all copies ... of the foregoing twelve Beacon Use Cases.”3 De Lage Landen Operational Servs., LLC v. Third Pillar Sys., 693 F.Supp.2d 423, 441-42 (E.D.Pa.2010).

The remainder of the case was scheduled for trial on May 11, 2011. However, the trial was postponed because the parties revived settlement discussions and negotiated for several months under the court’s supervision. When the parties failed to reach a settlement, the court entered a Fifth Scheduling Order, calling for plaintiffs motions in limine to be served on or before December 22, 2011 and defendant’s motions in limine to be served on or before January 9, 2012.

Under CUTSA, three kinds of damages are available. See Cal. Civ.Code § 3426.3. This section of the CUTSA provides in relevant part:

(a) A complainant may recover damages for the actual loss caused by misappropriation. A complainant also may recover for the unjust enrichment caused by misappropriation that is not taken into account in computing damages for actual loss.
(b) If neither damages nor unjust enrichment caused by misappropriation are provable, the court may order payment of a reasonable royalty for no long[853]*853er than the period of time the use could have been prohibited.

Accordingly, depending on the circumstances of the case, a plaintiff may recover damages for actual loss, unjust enrichment, or a reasonable royalty. Reasonable royalty damages, however, are only available if both actual loss and unjust enrichment are unprovable. See Cal. Civ.Code § 3426.3; Ajaxo, Inc. v. E*Trade Fin. Corp., 187 Cal.App.4th 1295, 115 Cal.Rptr.3d 168, 179 (2010). DLL and Third Pillar have agreed that damages in the form of actual losses cannot be proven. DLL’s expert Barry Sussman opined in his report that there was insufficient evidence to prove unjust enrichment damages and then proceeded to calculate a reasonable royalty to be paid to DLL. In contrast, Third Pillar’s expert James Woods set forth in his report in response that DLL’s unjust enrichment damages were calculable and provable. Accordingly, based on this part of Woods’ report, DLL would have no basis to obtain a reasonable royalty. Thereafter, each expert was deposed.

In an Order dated May 9, 2011, the court granted the motion of Third Pillar in limine to exclude the testimony of Suss-man regarding a reasonable royalty. The court explained that Sussman’s opinion was unreliable because it lacked a “factual foundation in the record” for the point in time when Third Pillar’s misappropriation of DLL’s trade secret information began. See De Lage Landen Operational Servs., LLC v. Third Pillar Sys., LLC, 2011 WL 1752330, 2011 U.S. Dist. LEXIS 49438 (E.D.Pa. May 9, 2011). With no expert testimony on the issue of a reasonable royalty, DLL has now moved to introduce the deposition testimony of Woods, Third Pillar’s expert, to prove unjust enrichment damages.

The weight of authority favors allowing DLL to introduce the opinion testimony of Third Pillar’s expert. See, e.g., Peterson v. Willie, 81 F.3d 1033 (11th Cir.1996); Penn Nat’l Ins. Co. v. HNI Corp., 245 F.R.D. 190 (M.D.Pa.2007); House v. Combined Ins. Co. of Am., 168 F.R.D. 236 (N.D.Iowa 1996). Rule 26(b)(4)(A) of the Federal Rules of Civil Procedure provides that “[a] party may depose any person who has been identified as an expert whose opinions may be presented at trial.” See Fed.R.Civ.P. 26(b)(4)(A); 245 F.R.D. at 193. Under this Rule, DLL deposed Woods months ago. Clearly, a party may introduce the deposition testimony of its expert at trial should the expert become unavailable and such testimony may be used for impeachment purposes. See Penn Nat’l Ins., 245 F.R.D. at 193. The Penn National court reasoned persuasively that because an expert’s deposition would already be admissible at trial in these circumstances, there is no reason not to allow a party to call the opposing party’s expert witnesses to testify at trial. Id. at 194-95.

We also agree with the analysis of other courts that either party may introduce the deposition of an opposing party’s expert if the expert is identified as someone who may testify at trial because “those opinions do not belong to one party or another but rather are available for all parties to use at trial.” See, e.g., Olsen v. Delcore, No. 2:07-CV-334 TS, 2009 WL 3055411 at *1, 2009 U.S. Dist. LEXIS 88263 at *2-3 (D.Utah Sept. 24, 2009) (citations omitted).

Allowing one party to use the testimony of the opponent’s expert witness causes no “undue prejudice” particularly when timely notice of the intention to call the expert has been given. See Penn Nat’l Ins., 245 F.R.D. at 194. Here, DLL listed Woods in its pre-trial memorandum on April 21, 2011 when it identified witnesses from whom it “reserve[d] the right to present direct or rebuttal testimony ... [854]*854either live or via videotaped deposition testimony or transcript from depositions or hearings.” DLL had named Woods before this court excluded the testimony of Suss-man on May 9, 2011. Furthermore, any of Woods’ testimony which is presented at trial will necessarily be limited to his deposition, to which both Third Pillar and DLL have had access for months.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
851 F. Supp. 2d 850, 2012 WL 315510, 2012 U.S. Dist. LEXIS 12728, Counsel Stack Legal Research, https://law.counselstack.com/opinion/de-lage-landen-operational-services-llc-v-third-pillar-systems-inc-paed-2012.