Role Models America, Inc. v. Jones

305 F. Supp. 2d 564, 2004 U.S. Dist. LEXIS 2854, 2004 WL 354294
CourtDistrict Court, D. Maryland
DecidedFebruary 25, 2004
DocketCIV. 03-1857
StatusPublished
Cited by7 cases

This text of 305 F. Supp. 2d 564 (Role Models America, Inc. v. Jones) is published on Counsel Stack Legal Research, covering District Court, D. Maryland primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Role Models America, Inc. v. Jones, 305 F. Supp. 2d 564, 2004 U.S. Dist. LEXIS 2854, 2004 WL 354294 (D. Md. 2004).

Opinion

MEMORANDUM

BLAKE, District Judge.

Role Models America, Inc. (“RMA” or “Role Models”), the plaintiff in this case, operates a residential, military-style academy for high school dropouts. To fulfill a requirement of a two-year multimillion dollar grant Role Models received from the federal government, RMA hired Social Consultants International (“SCI”) in June 2000 to monitor and evaluate the academy’s performance during the grant period. During roughly the first year of the grant period, between approximately July 3, 2000 and August 28, 2001, 1 one of the defendants, Dr. Jimmie Jones, served as the academy’s principal. RMA alleges that Dr. Jones used “proprietary” information, including data compiled by SCI, to complete an Internet-based doctoral program offered by Nova Southeastern University, Inc. (“NSU”), the other defendant in this case. RMA claims that NSU’s conduct entitles RMA to damages under the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, a criminal statute that affords a private right of action, see id. § 1030(g), and the Maryland Uniform Trade Secrets Act (“MUTSA”), Md.Code Ann., Com. Law §§ 11-1201-09. NSU disagrees; it has filed a motion to dismiss both claims under Rule 12(b)(6) of the Federal Rules of Civil Procedure. (Docket no. 22.) The motion has been fully briefed and no oral argument is necessary. Local Rule 105.6. For the reasons that follow, the court will grant NSU’s motion as to the CFAA count, but deny it as to RMA’s MUTSA claim.

“The purpose of a Rule 12(b)(6) motion is to test the sufficiency of a complaint; importantly, a Rule 12(b)(6) motion does not resolve contests surrounding the facts, the merits of a claim, or the applicability of defenses.” Edwards v. City of Goldsboro, 178 F.3d 231, 243 (4th Cir.1999) (internal quotation marks and alterations omitted). When ruling on such a motion, the court must “accept the well-pled allegations of *566 the complaint as true,” and “construe the facts and reasonable inferences derived therefrom in the light most favorable to the plaintiff.” Ibarra v. United States, 120 F.3d 472, 474 (4th Cir.1997). Consequently, a motion to dismiss under Rule 12(b)(6) may be granted only when “it appears beyond doubt that the plaintiff can prove no set of facts in support of his claim which would entitle him to relief.” Conley v. Gibson, 355 U.S. 41, 45-46, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957); see also Edwards, 178 F.3d at 244. In addition, because the court is testing the legal sufficiency of the claims, the court is not bound by the plaintiffs legal conclusions. See, e.g., Young v. City of Mount Ranier, 238 F.3d 567, 577 (4th Cir.2001) (noting that the “presence ... of a few conclusory legal terms does not insulate a complaint from dismissal under Rule 12(b)(6)” when the facts alleged do not support the legal conclusions); Labram v. Havel, 43 F.3d 918, 921 (4th Cir.1995) (affirming Rule 12(b)(6) dismissal with prejudice because the plaintiffs alleged facts failed to support her conclusion that the defendant owed her a fiduciary duty at common law).

Even accepting the allegations as true and reading them in RMA’s favor, RMA’s first count fails to indicate a basis for recovery from NSU. Each of the CFAA provisions RMA cites would apply only if NSU “intentionally accesse[d]” information on a protected computer, 18 U.S.C. §§ 1030(a)(2)(C), 1030(a)(5)(C), or accessed such information “knowingly and with intent to defraud,” id. § 1030(a)(4). 2 RMA, however, has not alleged that NSU “accessed” RMA’s computers at all, much less “intentionally” or “knowingly and with intent to defraud.” 3 What the complaint indicates, at best, is that NSU received information about RMA from Dr. Jones as Dr. Jones prepared his dissertation (Compl.lffl 26, 31, 35-36), that Dr. Jones had begun writing the dissertation by late 2000 (see id. ¶ 29), and that RMA’s lawyer notified NSU on June 20, 2002— roughly a year before Dr. Jones graduated — that the information came from RMA computers (id. ¶ 41). Receipt of information under such circumstances, even with notice of its source, cannot qualify as “accessing” an RMA computer. As another *567 district court has noted, the word “access,” in this context, is an active verb: it means “to gain access to,” or “to exercise the freedom or ability to make use of something.” Am. Online, Inc. v. Nat’l Health Care Discount, Inc., 121 F.Supp.2d 1255, 1272-73 (N.D.Iowa 2000) (citing Mimiam-Webster’s Collegiate Dictionary 6 (10th ed.1994)) (internal quotations and alterations omitted). Because there is no indication in the complaint that NSU did anything more than permit Dr. Jones to complete his dissertation, NSU’s alleged conduct does not meet the definition of “accesses,” and RMA has not stated a violation of the CFAA with respect to NSU. 4

Recognizing, perhaps, that NSU has not accessed its computers in any direct sense, RMA falls back on the argument that access to Dr. Jones’s computer should suffice to establish NSU’s liability. According to RMA, Dr. Jones’s computer became a “clone” of RMA’s computers when Dr. Jones placed proprietary information on it after leaving his employment with RMA; hence, RMA argues, accessing Dr. Jones’s computer was tantamount to unauthorized access to RMA’s computers. There are at least two errors in this argument. First, according to the complaint, Dr. Jones “sent” the information at issue to NSU by email. (Comply 35.) Receiving electronic information is, again, not the same as “accessing” the computer from which the information derived; the former conduct is passive, whereas the latter is active. Furthermore, even if the theory were consistent with the complaint, NSU’s conduct would not support liability under the CFAA, for the provisions RMA cites would apply only if NSU had accessed Dr. Jones’s computer “without authorization.” See 18 U.S.C. §§ 1030(a)(2)(C), 1030(a)(4), 1030(a)(5)(C). 5 Even granting — rather improbably — that NSU may have actively retrieved assignments from Dr. Jones’s computer, it would be unreasonable to suppose that it did so without Dr. Jones’s authorization. Whether RMA would have given NSU the same authorization to access its own computers is irrelevant. See Davies v. Afilias Ltd.,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Estes Forwarding Worldwide LLC v. Cuellar
239 F. Supp. 3d 918 (E.D. Virginia, 2017)
Fink v. Time Warner Cable
810 F. Supp. 2d 633 (S.D. New York, 2011)
Océ North America, Inc. v. MCS Services, Inc.
748 F. Supp. 2d 481 (D. Maryland, 2010)
United States v. Drew
259 F.R.D. 449 (C.D. California, 2009)
United States v. Phillips
477 F.3d 215 (Fifth Circuit, 2007)
Butera & Andrews v. International Business MacHines Corp.
456 F. Supp. 2d 104 (District of Columbia, 2006)

Cite This Page — Counsel Stack

Bluebook (online)
305 F. Supp. 2d 564, 2004 U.S. Dist. LEXIS 2854, 2004 WL 354294, Counsel Stack Legal Research, https://law.counselstack.com/opinion/role-models-america-inc-v-jones-mdd-2004.