Reliable Property Services, LLC v. Capital Growth Partners, LLC

1 F. Supp. 3d 961, 2014 U.S. Dist. LEXIS 18880, 2014 WL 583421
CourtDistrict Court, D. Minnesota
DecidedFebruary 14, 2014
DocketCase No. 14-CV-0055 (PJS/TNL)
StatusPublished
Cited by5 cases

This text of 1 F. Supp. 3d 961 (Reliable Property Services, LLC v. Capital Growth Partners, LLC) is published on Counsel Stack Legal Research, covering District Court, D. Minnesota primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Reliable Property Services, LLC v. Capital Growth Partners, LLC, 1 F. Supp. 3d 961, 2014 U.S. Dist. LEXIS 18880, 2014 WL 583421 (mnd 2014).

Opinion

ORDER

PATRICK J. SCHILTZ, District Judge.

Plaintiff Reliable Property Services, LLC (“Reliable”) provides snow-removal services to retail and commercial establishments, medical facilities, and other customers. Reliable alleges that defendant Carl George recently accessed Reliable’s computer system and stole confidential customer information. Reliable brings this action against George and his company, Capital Growth Partners, LLC (“Capital”), alleging violations of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, the Digital Millenium Copyright Act, 17 U.S.C. § 1201, and the Minnesota Uniform Trade Secrets Act, Minn.Stat. § 325C.01 et seq.

This matter is before the Court on Reliable’s motion for a preliminary injunction seeking to enjoin defendants from using the customer information and to require defendants to return it.2 For the reasons stated below, the motion is granted.

I. BACKGROUND

Reliable uses a software program called “SnowMaster” to facilitate almost all aspects of its business, from coordinating work crews to invoicing. Reliable, George, and Capital are embroiled in a dispute over the rights to the SnowMaster program. In December, Capital filed a lawsuit against Reliable and others in which Capital alleged, among other things, that the defendants had infringed Capital’s copyright in the SnowMaster program. See Capital Growth Partners LLC v. Reliable Property Service LLC, No. 4:13-CV-2489 (JCH) (E.D. Mo. filed Dec. 13, 2013).

On the same day that Capital filed the Missouri lawsuit, Reliable learned that the SnowMaster program on its computer system had been disabled. There is no dispute that George was responsible for the shutdown. It appears that George accessed Reliable’s computer system and installed or activated a piece of software— which Reliable calls a “time bomb” and which George calls a “license management control” — which allows George to disable the system and thus to cripple Reliable’s business. George later agreed to re-enable the program, but he threatened to shut it down again unless Reliable met his demands with respect to the copyright dispute.

[963]*963Reliable filed this lawsuit and sought a temporary restraining order and a preliminary injunction. At the hearing on Reliable’s motion for a preliminary injunction, George agreed that he would not access Reliable’s computer system nor do anything to disable the SnowMaster program on Reliable’s system without the prior permission of a judge. Based on George’s promise, the Court denied Reliable’s motion for a preliminary injunction as moot.

A few days later, Reliable learned that, when George accessed its system, he not only implanted or activated the “time bomb,” but he also obtained Reliable’s confidential customer information, including invoices and billing information. See Walz Aff. Ex. 1. Reliable learned this in an email from George in which George threatened to publish the customer information that he had obtained unless Reliable met his demands with respect to the copyright dispute. Id. George claimed that the customer information showed that Reliable had grossly over-billed its customers for many years. Id. George threatened to organize a class-action lawsuit against Reliable to help its customers recover the alleged overcharges. Id. About a week later, dissatisfied with Reliable’s response to his demands, George created two websites soliciting Reliable customers to join a proposed class action and disseminating the information that George obtained by accessing Reliable’s computer system. Walz Aff. Ex. 2.

Reliable now moves for a preliminary injunction to prohibit George and Capital from using or disclosing any of the customer information that George obtained from Reliable, to require George and Capital to return all copies of that information to Reliable, and to order George and Capital to disable the websites through which they have been distributing the information. Capital failed to respond to Reliable’s motion, and thus Reliable’s motion is granted insofar as it applies to Capital and all of its members, managers, employees, agents, representatives, and attorneys. Cf. Van Stelton, 988 F.2d at 70 (corporations cannot appear pro se). Because George is a member and agent of Capital, the injunction against Capital affords Reliable all of the relief that it seeks. In the interest of thoroughness, however, the Court will separately analyze Reliable’s motion as it applies to George individually.

II. ANALYSIS

A. Standard of Review

A court must consider four factors in deciding whether to grant a preliminary injunction: (1) the movant’s likelihood of success oh the merits; (2) the threat of irreparable harm to the movant if the injunction is not granted; (3) the balance between this harm and the injury that granting the injunction will inflict on the other parties; and (4) the public interest. Dataphase Sys., Inc. v. CL Sys., Inc., 640 F.2d 109, 114 (8th Cir.1981). Preliminary injunctions are extraordinary remedies, and the party seeking such relief bears the burden of establishing its entitlement to an injunction under the Dataphase factors. Watkins Inc. v. Lewis, 346 F.3d 841, 844 (8th Cir.2003).

B. CFAA

Reliable moves for injunctive relief on its CFAA claims. The Court need not address all of Reliable’s CFAA claims because it finds that Reliable is likely to succeed on its claim under 18 U.S.C. § 1030(a)(2).3

[964]*9641. Likelihood of Success

Section 1030(a)(2) of title 18 of the United States Code provides that whoever “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains ... information from any protected computer” has violated the CFAA. There is no question that Reliable’s computer system qualifies as a “protected computer” under the CFAA. See § 1030(e)(2)(B) (defining “protected computer” to include a computer “which is used in or affecting interstate or foreign commerce or communication”). Although at one point in his briefing George seems to deny that he obtained any information from Reliable’s computer, the evidence that he did so is overwhelming. George has disseminated billing and other information about Reliable’s customers, and that information is clearly derived from the billing and other data that he accessed on Reliable’s system.

As discussed at the Court’s hearing on Reliable’s earlier motion for injunctive relief, it is far from clear whether George accessed Reliable’s computer “without authorization. ...” But § 1030(a)(2) prohibits not only accessing a computer “without authorization,” but also accessing a computer in a manner that “exceeds authorized access.... ” George may have been authorized to access

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
1 F. Supp. 3d 961, 2014 U.S. Dist. LEXIS 18880, 2014 WL 583421, Counsel Stack Legal Research, https://law.counselstack.com/opinion/reliable-property-services-llc-v-capital-growth-partners-llc-mnd-2014.